diff options
Diffstat (limited to 'meta/recipes-kernel')
105 files changed, 18736 insertions, 3969 deletions
diff --git a/meta/recipes-kernel/blktrace/blktrace/0001-bno_plot.py-btt_plot.py-Ask-for-python3-specifically.patch b/meta/recipes-kernel/blktrace/blktrace/0001-bno_plot.py-btt_plot.py-Ask-for-python3-specifically.patch new file mode 100644 index 0000000000..e2305a1111 --- /dev/null +++ b/meta/recipes-kernel/blktrace/blktrace/0001-bno_plot.py-btt_plot.py-Ask-for-python3-specifically.patch | |||
@@ -0,0 +1,35 @@ | |||
1 | From 6f4769e6e2c5cdc1262891470995e6dead937c7a Mon Sep 17 00:00:00 2001 | ||
2 | From: Sakib Sajal <sakib.sajal@windriver.com> | ||
3 | Date: Mon, 26 Jun 2023 17:57:36 -0400 | ||
4 | Subject: [PATCH] bno_plot.py, btt_plot.py: Ask for python3 specifically | ||
5 | |||
6 | python2 is deprecated, use python3. | ||
7 | |||
8 | Upstream-Status: Denied [https://www.spinics.net/lists/linux-btrace/msg01364.html] | ||
9 | |||
10 | Signed-off-by: Sakib Sajal <sakib.sajal@windriver.com> | ||
11 | --- | ||
12 | btt/bno_plot.py | 2 +- | ||
13 | btt/btt_plot.py | 2 +- | ||
14 | 2 files changed, 2 insertions(+), 2 deletions(-) | ||
15 | |||
16 | diff --git a/btt/bno_plot.py b/btt/bno_plot.py | ||
17 | index 3aa4e19..d7d7159 100644 | ||
18 | --- a/btt/bno_plot.py | ||
19 | +++ b/btt/bno_plot.py | ||
20 | @@ -1,4 +1,4 @@ | ||
21 | -#! /usr/bin/env python | ||
22 | +#! /usr/bin/env python3 | ||
23 | # | ||
24 | # btt blkno plotting interface | ||
25 | # | ||
26 | diff --git a/btt/btt_plot.py b/btt/btt_plot.py | ||
27 | index 40bc71f..8620d31 100755 | ||
28 | --- a/btt/btt_plot.py | ||
29 | +++ b/btt/btt_plot.py | ||
30 | @@ -1,4 +1,4 @@ | ||
31 | -#! /usr/bin/env python | ||
32 | +#! /usr/bin/env python3 | ||
33 | # | ||
34 | # btt_plot.py: Generate matplotlib plots for BTT generate data files | ||
35 | # | ||
diff --git a/meta/recipes-kernel/blktrace/blktrace_git.bb b/meta/recipes-kernel/blktrace/blktrace_1.3.0.bb index b108676df4..f053490409 100644 --- a/meta/recipes-kernel/blktrace/blktrace_git.bb +++ b/meta/recipes-kernel/blktrace/blktrace_1.3.0.bb | |||
@@ -5,18 +5,16 @@ are three major components: a kernel component, a utility to record the i/o \ | |||
5 | trace information for the kernel to user space, and utilities to analyse and \ | 5 | trace information for the kernel to user space, and utilities to analyse and \ |
6 | view the trace information." | 6 | view the trace information." |
7 | HOMEPAGE = "http://brick.kernel.dk/snaps/" | 7 | HOMEPAGE = "http://brick.kernel.dk/snaps/" |
8 | LICENSE = "GPLv2" | 8 | LICENSE = "GPL-2.0-only" |
9 | LIC_FILES_CHKSUM = "file://COPYING;md5=393a5ca445f6965873eca0259a17f833" | 9 | LIC_FILES_CHKSUM = "file://COPYING;md5=393a5ca445f6965873eca0259a17f833" |
10 | 10 | ||
11 | DEPENDS = "libaio" | 11 | DEPENDS = "libaio" |
12 | 12 | ||
13 | SRCREV = "366d30b9cdb20345c5d064af850d686da79b89eb" | 13 | SRC_URI = "git://git.kernel.dk/blktrace.git;protocol=https;branch=master \ |
14 | 14 | file://0001-bno_plot.py-btt_plot.py-Ask-for-python3-specifically.patch \ | |
15 | PV = "1.3.0+git${SRCPV}" | 15 | " |
16 | 16 | ||
17 | SRC_URI = "git://git.kernel.dk/blktrace.git;branch=master" | 17 | SRCREV = "366d30b9cdb20345c5d064af850d686da79b89eb" |
18 | |||
19 | S = "${WORKDIR}/git" | ||
20 | 18 | ||
21 | EXTRA_OEMAKE = "\ | 19 | EXTRA_OEMAKE = "\ |
22 | 'CC=${CC}' \ | 20 | 'CC=${CC}' \ |
diff --git a/meta/recipes-kernel/cryptodev/cryptodev-linux_1.12.bb b/meta/recipes-kernel/cryptodev/cryptodev-linux_1.14.bb index d5ea9d8529..451a8d7ef8 100644 --- a/meta/recipes-kernel/cryptodev/cryptodev-linux_1.12.bb +++ b/meta/recipes-kernel/cryptodev/cryptodev-linux_1.14.bb | |||
@@ -4,9 +4,8 @@ SUMMARY = "A /dev/crypto device driver header file" | |||
4 | 4 | ||
5 | do_compile[noexec] = "1" | 5 | do_compile[noexec] = "1" |
6 | 6 | ||
7 | # Just install cryptodev.h which is the only header file needed to be exported | ||
8 | do_install() { | 7 | do_install() { |
9 | install -D ${S}/crypto/cryptodev.h ${D}${includedir}/crypto/cryptodev.h | 8 | oe_runmake headers_install DESTDIR="${D}" |
10 | } | 9 | } |
11 | 10 | ||
12 | ALLOW_EMPTY:${PN} = "1" | 11 | ALLOW_EMPTY:${PN} = "1" |
diff --git a/meta/recipes-kernel/cryptodev/cryptodev-module_1.12.bb b/meta/recipes-kernel/cryptodev/cryptodev-module_1.14.bb index 5192cf03ed..88d76c9d23 100644 --- a/meta/recipes-kernel/cryptodev/cryptodev-module_1.12.bb +++ b/meta/recipes-kernel/cryptodev/cryptodev-module_1.14.bb | |||
@@ -7,10 +7,7 @@ inherit module | |||
7 | # Header file provided by a separate package | 7 | # Header file provided by a separate package |
8 | DEPENDS += "cryptodev-linux" | 8 | DEPENDS += "cryptodev-linux" |
9 | 9 | ||
10 | SRC_URI += "file://0001-Disable-installing-header-file-provided-by-another-p.patch \ | 10 | EXTRA_OEMAKE = 'KERNEL_DIR="${STAGING_KERNEL_DIR}" PREFIX="${D}"' |
11 | " | ||
12 | |||
13 | EXTRA_OEMAKE='KERNEL_DIR="${STAGING_KERNEL_DIR}" PREFIX="${D}"' | ||
14 | 11 | ||
15 | RCONFLICTS:${PN} = "ocf-linux" | 12 | RCONFLICTS:${PN} = "ocf-linux" |
16 | RREPLACES:${PN} = "ocf-linux" | 13 | RREPLACES:${PN} = "ocf-linux" |
diff --git a/meta/recipes-kernel/cryptodev/cryptodev-tests_1.12.bb b/meta/recipes-kernel/cryptodev/cryptodev-tests_1.12.bb deleted file mode 100644 index c541478796..0000000000 --- a/meta/recipes-kernel/cryptodev/cryptodev-tests_1.12.bb +++ /dev/null | |||
@@ -1,22 +0,0 @@ | |||
1 | require cryptodev.inc | ||
2 | |||
3 | SUMMARY = "A test suite for /dev/crypto device driver" | ||
4 | |||
5 | DEPENDS += "openssl" | ||
6 | |||
7 | SRC_URI += " \ | ||
8 | file://0001-Add-the-compile-and-install-rules-for-cryptodev-test.patch \ | ||
9 | file://0001-tests-Makefile-do-not-use-Werror.patch \ | ||
10 | " | ||
11 | |||
12 | EXTRA_OEMAKE='KERNEL_DIR="${STAGING_EXECPREFIXDIR}" PREFIX="${D}"' | ||
13 | |||
14 | do_compile() { | ||
15 | oe_runmake testprogs | ||
16 | } | ||
17 | |||
18 | do_install() { | ||
19 | oe_runmake install_tests | ||
20 | } | ||
21 | |||
22 | FILES:${PN} = "${bindir}/*" | ||
diff --git a/meta/recipes-kernel/cryptodev/cryptodev-tests_1.14.bb b/meta/recipes-kernel/cryptodev/cryptodev-tests_1.14.bb new file mode 100644 index 0000000000..2cbee8a348 --- /dev/null +++ b/meta/recipes-kernel/cryptodev/cryptodev-tests_1.14.bb | |||
@@ -0,0 +1,17 @@ | |||
1 | require cryptodev.inc | ||
2 | |||
3 | SUMMARY = "A test suite for /dev/crypto device driver" | ||
4 | |||
5 | DEPENDS += "openssl" | ||
6 | |||
7 | EXTRA_OEMAKE = 'KERNEL_DIR="${STAGING_EXECPREFIXDIR}" PREFIX="${D}"' | ||
8 | |||
9 | do_compile() { | ||
10 | oe_runmake tests | ||
11 | } | ||
12 | |||
13 | do_install() { | ||
14 | oe_runmake install_tests | ||
15 | } | ||
16 | |||
17 | FILES:${PN} = "${bindir}/*" | ||
diff --git a/meta/recipes-kernel/cryptodev/cryptodev.inc b/meta/recipes-kernel/cryptodev/cryptodev.inc index 6ada0b0295..16a8eb610a 100644 --- a/meta/recipes-kernel/cryptodev/cryptodev.inc +++ b/meta/recipes-kernel/cryptodev/cryptodev.inc | |||
@@ -5,13 +5,12 @@ of hardware accelerators. Cryptodev-linux is implemented as a standalone \ | |||
5 | module that requires no dependencies other than a stock linux kernel. Its \ | 5 | module that requires no dependencies other than a stock linux kernel. Its \ |
6 | API is compatible with OpenBSD's cryptodev userspace API (/dev/crypto)." | 6 | API is compatible with OpenBSD's cryptodev userspace API (/dev/crypto)." |
7 | 7 | ||
8 | LICENSE = "GPLv2" | 8 | LICENSE = "GPL-2.0-only" |
9 | LIC_FILES_CHKSUM = "file://COPYING;md5=b234ee4d69f5fce4486a80fdaf4a4263" | 9 | LIC_FILES_CHKSUM = "file://COPYING;md5=b234ee4d69f5fce4486a80fdaf4a4263" |
10 | 10 | ||
11 | SRC_URI = "git://github.com/cryptodev-linux/cryptodev-linux;branch=master;protocol=https \ | 11 | SRC_URI = "git://github.com/cryptodev-linux/cryptodev-linux;branch=master;protocol=https \ |
12 | " | 12 | " |
13 | SRCREV = "e0c25e289d6baf1d83c2b9cb523d3bc237d0c0c9" | 13 | SRCREV = "135cbff90af2ba97d88f1472be595ce78721972c" |
14 | 14 | PV = "1.14" | |
15 | S = "${WORKDIR}/git" | ||
16 | 15 | ||
17 | CLEANBROKEN = "1" | 16 | CLEANBROKEN = "1" |
diff --git a/meta/recipes-kernel/cryptodev/files/0001-Add-the-compile-and-install-rules-for-cryptodev-test.patch b/meta/recipes-kernel/cryptodev/files/0001-Add-the-compile-and-install-rules-for-cryptodev-test.patch deleted file mode 100644 index 84fd27e681..0000000000 --- a/meta/recipes-kernel/cryptodev/files/0001-Add-the-compile-and-install-rules-for-cryptodev-test.patch +++ /dev/null | |||
@@ -1,66 +0,0 @@ | |||
1 | From 1980a8f4779a955e73285e7a0d86549b69bea5c8 Mon Sep 17 00:00:00 2001 | ||
2 | From: Yu Zongchun <b40527@freescale.com> | ||
3 | Date: Sun, 28 Apr 2013 14:39:22 +0800 | ||
4 | Subject: [PATCH] Add the compile and install rules for cryptodev tests folder | ||
5 | |||
6 | This is required to install the cryptodev tests folder to rootfs | ||
7 | |||
8 | Signed-off-by: Yu Zongchun <b40527@freescale.com> | ||
9 | |||
10 | Upstream-Status: Pending | ||
11 | |||
12 | --- | ||
13 | Makefile | 6 ++++++ | ||
14 | tests/Makefile | 8 ++++++++ | ||
15 | 2 files changed, 14 insertions(+), 0 deletions(-) | ||
16 | |||
17 | Index: git/Makefile | ||
18 | =================================================================== | ||
19 | --- git.orig/Makefile | ||
20 | +++ git/Makefile | ||
21 | @@ -35,6 +35,9 @@ modules_install: | ||
22 | $(MAKE) $(KERNEL_MAKE_OPTS) modules_install | ||
23 | install -m 644 -D crypto/cryptodev.h $(DESTDIR)/$(includedir)/crypto/cryptodev.h | ||
24 | |||
25 | +install_tests: | ||
26 | + make -C tests install DESTDIR=$(PREFIX) | ||
27 | + | ||
28 | clean: | ||
29 | $(MAKE) $(KERNEL_MAKE_OPTS) clean | ||
30 | rm -f $(hostprogs) *~ | ||
31 | @@ -43,6 +46,9 @@ clean: | ||
32 | check: | ||
33 | CFLAGS=$(CRYPTODEV_CFLAGS) KERNEL_DIR=$(KERNEL_DIR) $(MAKE) -C tests check | ||
34 | |||
35 | +testprogs: | ||
36 | + KERNEL_DIR=$(KERNEL_DIR) make -C tests testprogs | ||
37 | + | ||
38 | CPOPTS = | ||
39 | ifneq ($(SHOW_TYPES),) | ||
40 | CPOPTS += --show-types | ||
41 | Index: git/tests/Makefile | ||
42 | =================================================================== | ||
43 | --- git.orig/tests/Makefile | ||
44 | +++ git/tests/Makefile | ||
45 | @@ -23,6 +23,12 @@ bindir = $(execprefix)/bin | ||
46 | |||
47 | all: $(hostprogs) | ||
48 | |||
49 | +install: | ||
50 | + install -d $(DESTDIR)/usr/bin/tests_cryptodev | ||
51 | + for bin in $(hostprogs); do \ | ||
52 | + install -m 755 $${bin} $(DESTDIR)/usr/bin/tests_cryptodev/; \ | ||
53 | + done | ||
54 | + | ||
55 | check: $(hostprogs) | ||
56 | ./cipher | ||
57 | ./hmac | ||
58 | @@ -38,6 +44,8 @@ install: | ||
59 | install -m 755 $$prog $(DESTDIR)/$(bindir); \ | ||
60 | done | ||
61 | |||
62 | +testprogs: $(hostprogs) | ||
63 | + | ||
64 | clean: | ||
65 | rm -f *.o *~ $(hostprogs) | ||
66 | |||
diff --git a/meta/recipes-kernel/cryptodev/files/0001-Disable-installing-header-file-provided-by-another-p.patch b/meta/recipes-kernel/cryptodev/files/0001-Disable-installing-header-file-provided-by-another-p.patch deleted file mode 100644 index 885b5823e4..0000000000 --- a/meta/recipes-kernel/cryptodev/files/0001-Disable-installing-header-file-provided-by-another-p.patch +++ /dev/null | |||
@@ -1,24 +0,0 @@ | |||
1 | From 8a884f55bd1527baa82fab68c186ba546273860c Mon Sep 17 00:00:00 2001 | ||
2 | From: Denys Dmytriyenko <denys@ti.com> | ||
3 | Date: Sun, 6 Apr 2014 19:51:39 -0400 | ||
4 | Subject: [PATCH] Disable installing header file provided by another package | ||
5 | |||
6 | Signed-off-by: Denys Dmytriyenko <denys@ti.com> | ||
7 | |||
8 | Upstream-Status: Inappropriate [ OE specific ] | ||
9 | --- | ||
10 | Makefile | 1 - | ||
11 | 1 file changed, 1 deletion(-) | ||
12 | |||
13 | diff --git a/Makefile b/Makefile | ||
14 | index 5a080e0..bf02396 100644 | ||
15 | --- a/Makefile | ||
16 | +++ b/Makefile | ||
17 | @@ -33,7 +33,6 @@ install: modules_install | ||
18 | |||
19 | modules_install: | ||
20 | $(MAKE) $(KERNEL_MAKE_OPTS) modules_install | ||
21 | - install -m 644 -D crypto/cryptodev.h $(DESTDIR)/$(includedir)/crypto/cryptodev.h | ||
22 | |||
23 | clean: | ||
24 | $(MAKE) $(KERNEL_MAKE_OPTS) clean | ||
diff --git a/meta/recipes-kernel/cryptodev/files/0001-tests-Makefile-do-not-use-Werror.patch b/meta/recipes-kernel/cryptodev/files/0001-tests-Makefile-do-not-use-Werror.patch deleted file mode 100644 index 347a4aef0f..0000000000 --- a/meta/recipes-kernel/cryptodev/files/0001-tests-Makefile-do-not-use-Werror.patch +++ /dev/null | |||
@@ -1,24 +0,0 @@ | |||
1 | From e2c2895d52761ddc6384a31364236dd13f677c34 Mon Sep 17 00:00:00 2001 | ||
2 | From: Alexander Kanavin <alex@linutronix.de> | ||
3 | Date: Fri, 10 Sep 2021 10:44:42 +0200 | ||
4 | Subject: [PATCH] tests/Makefile: do not use -Werror | ||
5 | |||
6 | Otherwise, openssl 3 deprecation warnings become errors. | ||
7 | Reported at https://github.com/cryptodev-linux/cryptodev-linux/issues/67 | ||
8 | |||
9 | Upstream-Status: Inappropriate [upstream needs to update the code] | ||
10 | Signed-off-by: Alexander Kanavin <alex@linutronix.de> | ||
11 | --- | ||
12 | tests/Makefile | 2 +- | ||
13 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
14 | |||
15 | diff --git a/tests/Makefile b/tests/Makefile | ||
16 | index 2fb7a9a..e94f80e 100644 | ||
17 | --- a/tests/Makefile | ||
18 | +++ b/tests/Makefile | ||
19 | @@ -1,4 +1,4 @@ | ||
20 | -CFLAGS += -I.. $(CRYPTODEV_CFLAGS) -Wall -Werror | ||
21 | +CFLAGS += -I.. $(CRYPTODEV_CFLAGS) -Wall | ||
22 | |||
23 | comp_progs := cipher_comp hash_comp hmac_comp | ||
24 | |||
diff --git a/meta/recipes-kernel/dtc/dtc/0001-fdtdump-fix-Werror-int-to-pointer-cast.patch b/meta/recipes-kernel/dtc/dtc/0001-fdtdump-fix-Werror-int-to-pointer-cast.patch deleted file mode 100644 index 4c3e34b1ff..0000000000 --- a/meta/recipes-kernel/dtc/dtc/0001-fdtdump-fix-Werror-int-to-pointer-cast.patch +++ /dev/null | |||
@@ -1,40 +0,0 @@ | |||
1 | Fix the build of fdtdump with mingw. | ||
2 | |||
3 | Upstream-Status: Backport | ||
4 | Signed-off-by: Ross Burton <ross.burton@arm.com> | ||
5 | |||
6 | From ae0ce1fa7f4d679b5f8df1fc0e797246e43547fe Mon Sep 17 00:00:00 2001 | ||
7 | From: =?UTF-8?q?Marc-Andr=C3=A9=20Lureau?= <marcandre.lureau@redhat.com> | ||
8 | Date: Wed, 25 Aug 2021 16:13:50 +0400 | ||
9 | Subject: [PATCH] fdtdump: fix -Werror=int-to-pointer-cast | ||
10 | MIME-Version: 1.0 | ||
11 | Content-Type: text/plain; charset=UTF-8 | ||
12 | Content-Transfer-Encoding: 8bit | ||
13 | |||
14 | With mingw64-gcc, the compiler complains with various warnings: | ||
15 | error: cast from pointer to integer of different size [-Werror=pointer-to-int-cast] | ||
16 | |||
17 | Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com> | ||
18 | Message-Id: <20210825121350.213551-1-marcandre.lureau@redhat.com> | ||
19 | Acked-by: Rob Herring <robh@kernel.org> | ||
20 | Signed-off-by: David Gibson <david@gibson.dropbear.id.au> | ||
21 | --- | ||
22 | fdtdump.c | 2 +- | ||
23 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
24 | |||
25 | diff --git a/fdtdump.c b/fdtdump.c | ||
26 | index d9fb374..483f367 100644 | ||
27 | --- a/fdtdump.c | ||
28 | +++ b/fdtdump.c | ||
29 | @@ -21,7 +21,7 @@ | ||
30 | #define MAX_VERSION 17 | ||
31 | |||
32 | #define ALIGN(x, a) (((x) + ((a) - 1)) & ~((a) - 1)) | ||
33 | -#define PALIGN(p, a) ((void *)(ALIGN((unsigned long)(p), (a)))) | ||
34 | +#define PALIGN(p, a) ((void *)(ALIGN((uintptr_t)(p), (a)))) | ||
35 | #define GET_CELL(p) (p += 4, *((const fdt32_t *)(p-4))) | ||
36 | |||
37 | static const char *tagname(uint32_t tag) | ||
38 | -- | ||
39 | 2.25.1 | ||
40 | |||
diff --git a/meta/recipes-kernel/dtc/dtc_1.6.1.bb b/meta/recipes-kernel/dtc/dtc_1.7.2.bb index 2610b26a94..92e83a9404 100644 --- a/meta/recipes-kernel/dtc/dtc_1.6.1.bb +++ b/meta/recipes-kernel/dtc/dtc_1.7.2.bb | |||
@@ -1,25 +1,26 @@ | |||
1 | SUMMARY = "Device Tree Compiler" | 1 | SUMMARY = "Device Tree Compiler" |
2 | HOMEPAGE = "https://devicetree.org/" | 2 | HOMEPAGE = "https://devicetree.org/" |
3 | DESCRIPTION = "The Device Tree Compiler is a tool used to manipulate the Open-Firmware-like device tree used by PowerPC kernels." | 3 | DESCRIPTION = "The Device Tree Compiler is a toolchain for working with device tree source and binary files." |
4 | SECTION = "bootloader" | 4 | SECTION = "bootloader" |
5 | LICENSE = "GPLv2 | BSD-2-Clause" | 5 | LICENSE = "GPL-2.0-only | BSD-2-Clause" |
6 | 6 | ||
7 | LIC_FILES_CHKSUM = "file://GPL;md5=b234ee4d69f5fce4486a80fdaf4a4263 \ | 7 | LIC_FILES_CHKSUM = "file://GPL;md5=b234ee4d69f5fce4486a80fdaf4a4263 \ |
8 | file://libfdt/libfdt.h;beginline=4;endline=7;md5=05bb357cfb75cae7d2b01d2ee8d76407" | 8 | file://BSD-2-Clause;md5=5d6306d1b08f8df623178dfd81880927 \ |
9 | file://README.license;md5=a1eb22e37f09df5b5511b8a278992d0e" | ||
9 | 10 | ||
10 | SRC_URI = "git://git.kernel.org/pub/scm/utils/dtc/dtc.git;branch=master \ | 11 | SRC_URI = " \ |
11 | file://0001-fdtdump-fix-Werror-int-to-pointer-cast.patch" | 12 | git://git.kernel.org/pub/scm/utils/dtc/dtc.git;branch=main;protocol=https \ |
12 | SRCREV = "b6910bec11614980a21e46fbccc35934b671bd81" | 13 | " |
14 | SRCREV = "2d10aa2afe35527728db30b35ec491ecb6959e5c" | ||
13 | 15 | ||
14 | UPSTREAM_CHECK_GITTAGREGEX = "v(?P<pver>\d+(\.\d+)+)" | 16 | UPSTREAM_CHECK_GITTAGREGEX = "v(?P<pver>\d+(\.\d+)+)" |
15 | 17 | ||
16 | S = "${WORKDIR}/git" | ||
17 | |||
18 | inherit meson pkgconfig | 18 | inherit meson pkgconfig |
19 | 19 | ||
20 | EXTRA_OEMESON = "-Dpython=disabled -Dvalgrind=disabled" | 20 | EXTRA_OEMESON = "-Dpython=disabled -Dvalgrind=disabled" |
21 | 21 | ||
22 | PACKAGECONFIG ??= "tools" | 22 | PACKAGECONFIG ??= "tools" |
23 | PACKAGECONFIG[tests] = "-Dtests=true,-Dtests=false," | ||
23 | PACKAGECONFIG[tools] = "-Dtools=true,-Dtools=false,flex-native bison-native" | 24 | PACKAGECONFIG[tools] = "-Dtools=true,-Dtools=false,flex-native bison-native" |
24 | PACKAGECONFIG[yaml] = "-Dyaml=enabled,-Dyaml=disabled,libyaml" | 25 | PACKAGECONFIG[yaml] = "-Dyaml=enabled,-Dyaml=disabled,libyaml" |
25 | 26 | ||
diff --git a/meta/recipes-kernel/dtc/python3-dtschema-wrapper_2021.10.bb b/meta/recipes-kernel/dtc/python3-dtschema-wrapper_2021.10.bb index c869274d09..b19f53e20d 100644 --- a/meta/recipes-kernel/dtc/python3-dtschema-wrapper_2021.10.bb +++ b/meta/recipes-kernel/dtc/python3-dtschema-wrapper_2021.10.bb | |||
@@ -1,4 +1,4 @@ | |||
1 | DESCRIPTION = "Wrapper for tooling for devicetree validation using YAML and jsonschema" | 1 | SUMMARY = "Wrapper for tooling for devicetree validation using YAML and jsonschema" |
2 | HOMEPAGE = "https://yoctoproject.org" | 2 | HOMEPAGE = "https://yoctoproject.org" |
3 | LICENSE = "MIT" | 3 | LICENSE = "MIT" |
4 | LIC_FILES_CHKSUM = "file://${COREBASE}/meta/COPYING.MIT;md5=3da9cfbcb788c80a0384361b4de20420" | 4 | LIC_FILES_CHKSUM = "file://${COREBASE}/meta/COPYING.MIT;md5=3da9cfbcb788c80a0384361b4de20420" |
@@ -7,11 +7,13 @@ SRC_URI = "file://dt-doc-validate \ | |||
7 | file://dt-mk-schema \ | 7 | file://dt-mk-schema \ |
8 | file://dt-validate" | 8 | file://dt-validate" |
9 | 9 | ||
10 | S = "${UNPACKDIR}" | ||
11 | |||
10 | do_install() { | 12 | do_install() { |
11 | install -d ${D}${bindir}/ | 13 | install -d ${D}${bindir}/ |
12 | install -m 755 ${WORKDIR}/dt-doc-validate ${D}${bindir}/ | 14 | install -m 755 ${UNPACKDIR}/dt-doc-validate ${D}${bindir}/ |
13 | install -m 755 ${WORKDIR}/dt-mk-schema ${D}${bindir}/ | 15 | install -m 755 ${UNPACKDIR}/dt-mk-schema ${D}${bindir}/ |
14 | install -m 755 ${WORKDIR}/dt-validate ${D}${bindir}/ | 16 | install -m 755 ${UNPACKDIR}/dt-validate ${D}${bindir}/ |
15 | } | 17 | } |
16 | 18 | ||
17 | BBCLASSEXTEND = "native nativesdk" | 19 | BBCLASSEXTEND = "native nativesdk" |
diff --git a/meta/recipes-kernel/kern-tools/kern-tools-native_git.bb b/meta/recipes-kernel/kern-tools/kern-tools-native_git.bb index ef035aed23..84b8b10a26 100644 --- a/meta/recipes-kernel/kern-tools/kern-tools-native_git.bb +++ b/meta/recipes-kernel/kern-tools/kern-tools-native_git.bb | |||
@@ -3,20 +3,20 @@ DESCRIPTION = "Powerful set of tools or managing Yocto Linux kernel sources \ | |||
3 | and configuration data. You can use these tools to make a single configuration \ | 3 | and configuration data. You can use these tools to make a single configuration \ |
4 | change, apply multiple patches, or work with your own kernel sources." | 4 | change, apply multiple patches, or work with your own kernel sources." |
5 | HOMEPAGE = "https://www.yoctoproject.org/" | 5 | HOMEPAGE = "https://www.yoctoproject.org/" |
6 | LICENSE = "GPLv2" | 6 | LICENSE = "GPL-2.0-only & MIT" |
7 | LIC_FILES_CHKSUM = "file://tools/kgit;beginline=5;endline=9;md5=9c30e971d435e249624278c3e343e501" | 7 | LIC_FILES_CHKSUM = "\ |
8 | file://tools/kgit;beginline=5;endline=9;md5=9c30e971d435e249624278c3e343e501 \ | ||
9 | file://Kconfiglib/LICENSE.txt;md5=712177a72a3937909543eda3ad1bfb7c \ | ||
10 | " | ||
8 | 11 | ||
9 | DEPENDS = "git-native" | 12 | DEPENDS += "git-replacement-native" |
10 | 13 | ||
11 | SRCREV = "d220b063852245fdd16b9731a395ace525f932d6" | 14 | SRCREV = "fe67c98d2e9b74af44d0c4b660fa18e3a95e7edd" |
12 | PR = "r12" | 15 | PV = "0.3+git" |
13 | PV = "0.2+git${SRCPV}" | ||
14 | 16 | ||
15 | inherit native | 17 | inherit native |
16 | 18 | ||
17 | SRC_URI = "git://git.yoctoproject.org/yocto-kernel-tools.git;branch=master" | 19 | SRC_URI = "git://git.yoctoproject.org/yocto-kernel-tools.git;branch=master;protocol=https" |
18 | S = "${WORKDIR}/git" | ||
19 | UPSTREAM_CHECK_COMMITS = "1" | ||
20 | 20 | ||
21 | do_configure() { | 21 | do_configure() { |
22 | : | 22 | : |
diff --git a/meta/recipes-kernel/kernel-signing-keys/kernel-signing-keys-native.bb b/meta/recipes-kernel/kernel-signing-keys/kernel-signing-keys-native.bb new file mode 100644 index 0000000000..f346f1648a --- /dev/null +++ b/meta/recipes-kernel/kernel-signing-keys/kernel-signing-keys-native.bb | |||
@@ -0,0 +1,73 @@ | |||
1 | # Automatically generate key pairs in UBOOT_SIGN_KEYDIR if they do not exist. | ||
2 | # The key pair is generated by the kernel-signing-keys-native recipe and is not | ||
3 | # stored in the sstate cache. This can be beneficial from a security standpoint, | ||
4 | # as it avoids unintentionally caching and distributing private keys. | ||
5 | # However, this behavior can lead to non-reproducible builds. For example, if | ||
6 | # the keys are deleted, they must be manually restored, or you must run: | ||
7 | # bitbake -c cleanall kernel-signing-keys-native | ||
8 | # before new key pairs are generated. | ||
9 | # | ||
10 | # However, this approach is only suitable for simple or local development use | ||
11 | # cases. For more advanced or production-grade scenarios, a more robust solution | ||
12 | # is usually required—such as external signing or re-signing using e.g a HSM. | ||
13 | |||
14 | SUMMARY = "Signing keys for the kernel FIT image" | ||
15 | LICENSE = "MIT" | ||
16 | LIC_FILES_CHKSUM = "file://${COREBASE}/meta/COPYING.MIT;md5=3da9cfbcb788c80a0384361b4de20420" | ||
17 | |||
18 | require conf/image-fitimage.conf | ||
19 | |||
20 | DEPENDS += "openssl-native" | ||
21 | |||
22 | inherit native | ||
23 | |||
24 | do_fetch[noexec] = "1" | ||
25 | do_unpack[noexec] = "1" | ||
26 | do_patch[noexec] = "1" | ||
27 | do_configure[noexec] = "1" | ||
28 | do_install[noexec] = "1" | ||
29 | |||
30 | do_compile() { | ||
31 | if [ "${UBOOT_SIGN_ENABLE}" = "0" ] && [ "${FIT_GENERATE_KEYS}" = "1" ]; then | ||
32 | bbwarn "FIT_GENERATE_KEYS is set to 1 even though UBOOT_SIGN_ENABLE is set to 0. The keys will not be generated as they won't be used." | ||
33 | fi | ||
34 | |||
35 | if [ "${UBOOT_SIGN_ENABLE}" = "1" ] && [ "${FIT_GENERATE_KEYS}" = "1" ]; then | ||
36 | |||
37 | # Generate keys to sign configuration nodes, only if they don't already exist | ||
38 | if [ ! -f "${UBOOT_SIGN_KEYDIR}/${UBOOT_SIGN_KEYNAME}".key ] || \ | ||
39 | [ ! -f "${UBOOT_SIGN_KEYDIR}/${UBOOT_SIGN_KEYNAME}".crt ]; then | ||
40 | |||
41 | # make directory if it does not already exist | ||
42 | mkdir -p "${UBOOT_SIGN_KEYDIR}" | ||
43 | |||
44 | bbnote "Generating RSA private key for signing fitImage" | ||
45 | openssl genrsa ${FIT_KEY_GENRSA_ARGS} -out \ | ||
46 | "${UBOOT_SIGN_KEYDIR}/${UBOOT_SIGN_KEYNAME}".key \ | ||
47 | "${FIT_SIGN_NUMBITS}" | ||
48 | |||
49 | bbnote "Generating certificate for signing fitImage" | ||
50 | openssl req ${FIT_KEY_REQ_ARGS} "${FIT_KEY_SIGN_PKCS}" \ | ||
51 | -key "${UBOOT_SIGN_KEYDIR}/${UBOOT_SIGN_KEYNAME}".key \ | ||
52 | -out "${UBOOT_SIGN_KEYDIR}/${UBOOT_SIGN_KEYNAME}".crt | ||
53 | fi | ||
54 | |||
55 | # Generate keys to sign image nodes, only if they don't already exist | ||
56 | if [ ! -f "${UBOOT_SIGN_KEYDIR}/${UBOOT_SIGN_IMG_KEYNAME}".key ] || \ | ||
57 | [ ! -f "${UBOOT_SIGN_KEYDIR}/${UBOOT_SIGN_IMG_KEYNAME}".crt ]; then | ||
58 | |||
59 | # make directory if it does not already exist | ||
60 | mkdir -p "${UBOOT_SIGN_KEYDIR}" | ||
61 | |||
62 | bbnote "Generating RSA private key for signing fitImage" | ||
63 | openssl genrsa ${FIT_KEY_GENRSA_ARGS} -out \ | ||
64 | "${UBOOT_SIGN_KEYDIR}/${UBOOT_SIGN_IMG_KEYNAME}".key \ | ||
65 | "${FIT_SIGN_NUMBITS}" | ||
66 | |||
67 | bbnote "Generating certificate for signing fitImage" | ||
68 | openssl req ${FIT_KEY_REQ_ARGS} "${FIT_KEY_SIGN_PKCS}" \ | ||
69 | -key "${UBOOT_SIGN_KEYDIR}/${UBOOT_SIGN_IMG_KEYNAME}".key \ | ||
70 | -out "${UBOOT_SIGN_KEYDIR}/${UBOOT_SIGN_IMG_KEYNAME}".crt | ||
71 | fi | ||
72 | fi | ||
73 | } | ||
diff --git a/meta/recipes-kernel/kexec/kexec-tools/0001-arm64-kexec-disabled-check-if-kaslr-seed-dtb-propert.patch b/meta/recipes-kernel/kexec/kexec-tools/0001-arm64-kexec-disabled-check-if-kaslr-seed-dtb-propert.patch index c2301e711d..ee731cea4b 100644 --- a/meta/recipes-kernel/kexec/kexec-tools/0001-arm64-kexec-disabled-check-if-kaslr-seed-dtb-propert.patch +++ b/meta/recipes-kernel/kexec/kexec-tools/0001-arm64-kexec-disabled-check-if-kaslr-seed-dtb-propert.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From d48ec5e1a5fb7907520dee71b1d94045486a0c29 Mon Sep 17 00:00:00 2001 | 1 | From 9e95f8933bded10fdd664fc95492825347ec59a7 Mon Sep 17 00:00:00 2001 |
2 | From: Alexander Kamensky <alexander.kamensky42@gmail.com> | 2 | From: Alexander Kamensky <alexander.kamensky42@gmail.com> |
3 | Date: Thu, 12 Nov 2020 12:56:46 -0800 | 3 | Date: Thu, 12 Nov 2020 12:56:46 -0800 |
4 | Subject: [PATCH] arm64: kexec: disabled check if kaslr-seed dtb property was | 4 | Subject: [PATCH] arm64: kexec: disabled check if kaslr-seed dtb property was |
@@ -33,20 +33,20 @@ Upstream-Status: Submitted [http://lists.infradead.org/pipermail/kexec/2020-Nove | |||
33 | kexec/arch/arm64/kexec-arm64.c | 14 +------------- | 33 | kexec/arch/arm64/kexec-arm64.c | 14 +------------- |
34 | 1 file changed, 1 insertion(+), 13 deletions(-) | 34 | 1 file changed, 1 insertion(+), 13 deletions(-) |
35 | 35 | ||
36 | Index: kexec-tools-2.0.20/kexec/arch/arm64/kexec-arm64.c | 36 | diff --git a/kexec/arch/arm64/kexec-arm64.c b/kexec/arch/arm64/kexec-arm64.c |
37 | =================================================================== | 37 | index 9091f40..ea304f9 100644 |
38 | --- kexec-tools-2.0.20.orig/kexec/arch/arm64/kexec-arm64.c | 38 | --- a/kexec/arch/arm64/kexec-arm64.c |
39 | +++ kexec-tools-2.0.20/kexec/arch/arm64/kexec-arm64.c | 39 | +++ b/kexec/arch/arm64/kexec-arm64.c |
40 | @@ -428,7 +428,7 @@ static int setup_2nd_dtb(struct dtb *dtb | 40 | @@ -504,7 +504,7 @@ static int setup_2nd_dtb(struct dtb *dtb, char *command_line, int on_crash) |
41 | int len, range_len; | 41 | int len, range_len; |
42 | int nodeoffset; | 42 | int nodeoffset; |
43 | int new_size; | 43 | int new_size; |
44 | - int result, kaslr_seed; | 44 | - int i, result, kaslr_seed; |
45 | + int result; | 45 | + int i, result; |
46 | 46 | ||
47 | result = fdt_check_header(dtb->buf); | 47 | result = fdt_check_header(dtb->buf); |
48 | 48 | ||
49 | @@ -499,18 +499,6 @@ static int setup_2nd_dtb(struct dtb *dtb | 49 | @@ -577,18 +577,6 @@ static int setup_2nd_dtb(struct dtb *dtb, char *command_line, int on_crash) |
50 | return result; | 50 | return result; |
51 | } | 51 | } |
52 | } else { | 52 | } else { |
diff --git a/meta/recipes-kernel/kexec/kexec-tools/0001-kexec.c-add-MFD_NOEXEC_SEAL-flag-explicitly.patch b/meta/recipes-kernel/kexec/kexec-tools/0001-kexec.c-add-MFD_NOEXEC_SEAL-flag-explicitly.patch new file mode 100644 index 0000000000..5d994d9ffb --- /dev/null +++ b/meta/recipes-kernel/kexec/kexec-tools/0001-kexec.c-add-MFD_NOEXEC_SEAL-flag-explicitly.patch | |||
@@ -0,0 +1,43 @@ | |||
1 | From 0b176595ca1610037d1175e1786d1a8aff1fb43f Mon Sep 17 00:00:00 2001 | ||
2 | From: Chen Qi <Qi.Chen@windriver.com> | ||
3 | Date: Tue, 6 Aug 2024 21:42:43 -0700 | ||
4 | Subject: [PATCH] kexec.c: add MFD_NOEXEC_SEAL flag explicitly | ||
5 | |||
6 | Add MFD_NOEXEC_SEAL to avoid kernel warning like below: | ||
7 | |||
8 | kexec[970]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set | ||
9 | |||
10 | For old kernels, there will be no MFD_NOEXEC_SEAL definition, so fallback | ||
11 | to define it to 0. | ||
12 | |||
13 | Upstream-Status: Submitted [https://github.com/horms/kexec-tools/pull/7] | ||
14 | |||
15 | Signed-off-by: Chen Qi <Qi.Chen@windriver.com> | ||
16 | --- | ||
17 | kexec/kexec.c | 6 +++++- | ||
18 | 1 file changed, 5 insertions(+), 1 deletion(-) | ||
19 | |||
20 | diff --git a/kexec/kexec.c b/kexec/kexec.c | ||
21 | index 6bf12d7..2f8e7cc 100644 | ||
22 | --- a/kexec/kexec.c | ||
23 | +++ b/kexec/kexec.c | ||
24 | @@ -61,6 +61,10 @@ | ||
25 | #define KEXEC_LOADED_PATH "/sys/kernel/kexec_loaded" | ||
26 | #define KEXEC_CRASH_LOADED_PATH "/sys/kernel/kexec_crash_loaded" | ||
27 | |||
28 | +#ifndef MFD_NOEXEC_SEAL | ||
29 | +#define MFD_NOEXEC_SEAL 0 | ||
30 | +#endif | ||
31 | + | ||
32 | unsigned long long mem_min = 0; | ||
33 | unsigned long long mem_max = ULONG_MAX; | ||
34 | unsigned long elfcorehdrsz = 0; | ||
35 | @@ -661,7 +665,7 @@ static int copybuf_memfd(const char *kernel_buf, size_t size) | ||
36 | { | ||
37 | int fd, count; | ||
38 | |||
39 | - fd = memfd_create("kernel", MFD_ALLOW_SEALING); | ||
40 | + fd = memfd_create("kernel", MFD_ALLOW_SEALING | MFD_NOEXEC_SEAL); | ||
41 | if (fd == -1) | ||
42 | return fd; | ||
43 | |||
diff --git a/meta/recipes-kernel/kexec/kexec-tools/0001-ppc-fs2dt-Match-function-signatures.patch b/meta/recipes-kernel/kexec/kexec-tools/0001-ppc-fs2dt-Match-function-signatures.patch new file mode 100644 index 0000000000..483e5195a9 --- /dev/null +++ b/meta/recipes-kernel/kexec/kexec-tools/0001-ppc-fs2dt-Match-function-signatures.patch | |||
@@ -0,0 +1,31 @@ | |||
1 | From 4a07e8f22b4f224dca79767e5cb86a0de91498dc Mon Sep 17 00:00:00 2001 | ||
2 | From: Khem Raj <raj.khem@gmail.com> | ||
3 | Date: Sat, 17 May 2025 07:48:50 -0700 | ||
4 | Subject: [PATCH] ppc/fs2dt: Match function signatures | ||
5 | |||
6 | The prototypes of function pointers is analysed and | ||
7 | compiler finds the signature mismatches and complain about it. | ||
8 | |||
9 | ../kexec-tools-2.0.31/kexec/arch/ppc/fs2dt.c:338:44: error: incompatible function pointer types passing 'int (const void *, const void *)' to parameter of type 'int (*)(const struct dirent **, const struct dirent **)' [-Wincompatible-function-pointer-types] | ||
10 | 338 | numlist = scandir(pathname, &namelist, 0, comparefunc); | ||
11 | | ^~~~~~~~~~~ | ||
12 | |||
13 | Upstream-Status: Submitted [https://lore.kernel.org/kexec/20250517145852.2488183-1-raj.khem@gmail.com/T/#u] | ||
14 | Signed-off-by: Khem Raj <raj.khem@gmail.com> | ||
15 | --- | ||
16 | kexec/arch/ppc/fs2dt.c | 2 +- | ||
17 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
18 | |||
19 | diff --git a/kexec/arch/ppc/fs2dt.c b/kexec/arch/ppc/fs2dt.c | ||
20 | index fed499b..4952bfc 100644 | ||
21 | --- a/kexec/arch/ppc/fs2dt.c | ||
22 | +++ b/kexec/arch/ppc/fs2dt.c | ||
23 | @@ -292,7 +292,7 @@ static void putprops(char *fn, struct dirent **nlist, int numlist) | ||
24 | * Compare function used to sort the device-tree directories | ||
25 | * This function will be passed to scandir. | ||
26 | */ | ||
27 | -static int comparefunc(const void *dentry1, const void *dentry2) | ||
28 | +static int comparefunc(const struct dirent ** dentry1, const struct dirent **dentry2) | ||
29 | { | ||
30 | char *str1 = (*(struct dirent **)dentry1)->d_name; | ||
31 | char *str2 = (*(struct dirent **)dentry2)->d_name; | ||
diff --git a/meta/recipes-kernel/kexec/kexec-tools/0002-purgatory-Pass-r-directly-to-linker.patch b/meta/recipes-kernel/kexec/kexec-tools/0002-purgatory-Pass-r-directly-to-linker.patch index 363d5da4ae..a537ac2f0b 100644 --- a/meta/recipes-kernel/kexec/kexec-tools/0002-purgatory-Pass-r-directly-to-linker.patch +++ b/meta/recipes-kernel/kexec/kexec-tools/0002-purgatory-Pass-r-directly-to-linker.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From a04bcf8f683c1a5a7d015920124457ad56fb7cf0 Mon Sep 17 00:00:00 2001 | 1 | From e5bc9fbd6029057a4e3815a5326af5bd83a450e6 Mon Sep 17 00:00:00 2001 |
2 | From: Khem Raj <raj.khem@gmail.com> | 2 | From: Khem Raj <raj.khem@gmail.com> |
3 | Date: Mon, 7 Sep 2015 07:59:45 +0000 | 3 | Date: Mon, 7 Sep 2015 07:59:45 +0000 |
4 | Subject: [PATCH] purgatory: Pass -r directly to linker | 4 | Subject: [PATCH] purgatory: Pass -r directly to linker |
@@ -10,15 +10,16 @@ unfiltered | |||
10 | Signed-off-by: Khem Raj <raj.khem@gmail.com> | 10 | Signed-off-by: Khem Raj <raj.khem@gmail.com> |
11 | 11 | ||
12 | Upstream-Status: Pending | 12 | Upstream-Status: Pending |
13 | |||
13 | --- | 14 | --- |
14 | purgatory/Makefile | 2 +- | 15 | purgatory/Makefile | 2 +- |
15 | 1 file changed, 1 insertion(+), 1 deletion(-) | 16 | 1 file changed, 1 insertion(+), 1 deletion(-) |
16 | 17 | ||
17 | diff --git a/purgatory/Makefile b/purgatory/Makefile | 18 | diff --git a/purgatory/Makefile b/purgatory/Makefile |
18 | index 2dd6c47..416e6b9 100644 | 19 | index 4d2d071..6673423 100644 |
19 | --- a/purgatory/Makefile | 20 | --- a/purgatory/Makefile |
20 | +++ b/purgatory/Makefile | 21 | +++ b/purgatory/Makefile |
21 | @@ -60,7 +60,7 @@ $(PURGATORY): CPPFLAGS=$($(ARCH)_PURGATORY_EXTRA_CFLAGS) \ | 22 | @@ -61,7 +61,7 @@ $(PURGATORY): CPPFLAGS=$($(ARCH)_PURGATORY_EXTRA_CFLAGS) \ |
22 | -I$(shell $(CC) -print-file-name=include) | 23 | -I$(shell $(CC) -print-file-name=include) |
23 | $(PURGATORY): LDFLAGS=$($(ARCH)_PURGATORY_EXTRA_CFLAGS)\ | 24 | $(PURGATORY): LDFLAGS=$($(ARCH)_PURGATORY_EXTRA_CFLAGS)\ |
24 | -Wl,--no-undefined -nostartfiles -nostdlib \ | 25 | -Wl,--no-undefined -nostartfiles -nostdlib \ |
diff --git a/meta/recipes-kernel/kexec/kexec-tools/0003-kexec-ARM-Fix-add_buffer_phys_virt-align-issue.patch b/meta/recipes-kernel/kexec/kexec-tools/0003-kexec-ARM-Fix-add_buffer_phys_virt-align-issue.patch deleted file mode 100644 index 832fe67716..0000000000 --- a/meta/recipes-kernel/kexec/kexec-tools/0003-kexec-ARM-Fix-add_buffer_phys_virt-align-issue.patch +++ /dev/null | |||
@@ -1,49 +0,0 @@ | |||
1 | From 55e583d20651e829afbbc8dba0f8ec3017cda2d5 Mon Sep 17 00:00:00 2001 | ||
2 | From: Haiqing Bai <Haiqing.Bai@windriver.com> | ||
3 | Date: Mon, 9 Jan 2017 15:26:29 +0800 | ||
4 | Subject: [PATCH] kexec: ARM: Fix add_buffer_phys_virt() align issue | ||
5 | |||
6 | When "CONFIG_ARM_LPAE" is enabled,3 level page table | ||
7 | is used by MMU, the "SECTION_SIZE" is defined with | ||
8 | (1 << 21), but 'add_buffer_phys_virt()' hardcode this | ||
9 | to (1 << 20). | ||
10 | |||
11 | Upstream-Status: Pending | ||
12 | |||
13 | Suggested-By:fredrik.markstrom@gmail.com | ||
14 | Signed-off-by: Haiqing Bai <Haiqing.Bai@windriver.com> | ||
15 | --- | ||
16 | kexec/arch/arm/crashdump-arm.c | 5 ++++- | ||
17 | 1 file changed, 4 insertions(+), 1 deletion(-) | ||
18 | |||
19 | diff --git a/kexec/arch/arm/crashdump-arm.c b/kexec/arch/arm/crashdump-arm.c | ||
20 | index daa4788..3f72b38 100644 | ||
21 | --- a/kexec/arch/arm/crashdump-arm.c | ||
22 | +++ b/kexec/arch/arm/crashdump-arm.c | ||
23 | @@ -240,6 +240,7 @@ int load_crashdump_segments(struct kexec_info *info, char *mod_cmdline) | ||
24 | void *buf; | ||
25 | int err; | ||
26 | int last_ranges; | ||
27 | + unsigned short align_bit_shift = 20; | ||
28 | |||
29 | /* | ||
30 | * First fetch all the memory (RAM) ranges that we are going to pass to | ||
31 | @@ -281,6 +282,7 @@ int load_crashdump_segments(struct kexec_info *info, char *mod_cmdline) | ||
32 | |||
33 | /* for support LPAE enabled kernel*/ | ||
34 | elf_info.class = ELFCLASS64; | ||
35 | + align_bit_shift = 21; | ||
36 | |||
37 | err = crash_create_elf64_headers(info, &elf_info, | ||
38 | usablemem_rgns.ranges, | ||
39 | @@ -302,8 +304,9 @@ int load_crashdump_segments(struct kexec_info *info, char *mod_cmdline) | ||
40 | * 1MB) so that available memory passed in kernel command line will be | ||
41 | * aligned to 1MB. This is because kernel create_mapping() wants memory | ||
42 | * regions to be aligned to SECTION_SIZE. | ||
43 | + * The SECTION_SIZE of LPAE kernel is '1UL << 21' defined in pgtable-3level.h | ||
44 | */ | ||
45 | - elfcorehdr = add_buffer_phys_virt(info, buf, bufsz, bufsz, 1 << 20, | ||
46 | + elfcorehdr = add_buffer_phys_virt(info, buf, bufsz, bufsz, 1 << align_bit_shift, | ||
47 | crash_kernel_mem.start, | ||
48 | crash_kernel_mem.end, -1, 0); | ||
49 | |||
diff --git a/meta/recipes-kernel/kexec/kexec-tools/0005-Disable-PIE-during-link.patch b/meta/recipes-kernel/kexec/kexec-tools/0005-Disable-PIE-during-link.patch index 7a4b8548ca..6a21744ac1 100644 --- a/meta/recipes-kernel/kexec/kexec-tools/0005-Disable-PIE-during-link.patch +++ b/meta/recipes-kernel/kexec/kexec-tools/0005-Disable-PIE-during-link.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From c54488ad5fd657e0f154d76d7456d9080be24836 Mon Sep 17 00:00:00 2001 | 1 | From 494888bcc3bbf070dfce1b2686ee34c8619aa33d Mon Sep 17 00:00:00 2001 |
2 | From: Khem Raj <raj.khem@gmail.com> | 2 | From: Khem Raj <raj.khem@gmail.com> |
3 | Date: Sat, 10 Jun 2017 11:18:49 -0700 | 3 | Date: Sat, 10 Jun 2017 11:18:49 -0700 |
4 | Subject: [PATCH] Disable PIE during link | 4 | Subject: [PATCH] Disable PIE during link |
@@ -9,15 +9,16 @@ just need to match it with linker flags | |||
9 | Upstream-Status: Pending | 9 | Upstream-Status: Pending |
10 | 10 | ||
11 | Signed-off-by: Khem Raj <raj.khem@gmail.com> | 11 | Signed-off-by: Khem Raj <raj.khem@gmail.com> |
12 | |||
12 | --- | 13 | --- |
13 | purgatory/Makefile | 2 +- | 14 | purgatory/Makefile | 2 +- |
14 | 1 file changed, 1 insertion(+), 1 deletion(-) | 15 | 1 file changed, 1 insertion(+), 1 deletion(-) |
15 | 16 | ||
16 | diff --git a/purgatory/Makefile b/purgatory/Makefile | 17 | diff --git a/purgatory/Makefile b/purgatory/Makefile |
17 | index 416e6b9..f00edb4 100644 | 18 | index 6673423..a7405ea 100644 |
18 | --- a/purgatory/Makefile | 19 | --- a/purgatory/Makefile |
19 | +++ b/purgatory/Makefile | 20 | +++ b/purgatory/Makefile |
20 | @@ -59,7 +59,7 @@ $(PURGATORY): CPPFLAGS=$($(ARCH)_PURGATORY_EXTRA_CFLAGS) \ | 21 | @@ -60,7 +60,7 @@ $(PURGATORY): CPPFLAGS=$($(ARCH)_PURGATORY_EXTRA_CFLAGS) \ |
21 | -Iinclude \ | 22 | -Iinclude \ |
22 | -I$(shell $(CC) -print-file-name=include) | 23 | -I$(shell $(CC) -print-file-name=include) |
23 | $(PURGATORY): LDFLAGS=$($(ARCH)_PURGATORY_EXTRA_CFLAGS)\ | 24 | $(PURGATORY): LDFLAGS=$($(ARCH)_PURGATORY_EXTRA_CFLAGS)\ |
diff --git a/meta/recipes-kernel/kexec/kexec-tools_2.0.23.bb b/meta/recipes-kernel/kexec/kexec-tools_2.0.31.bb index 066de99fad..7333aa73c1 100644 --- a/meta/recipes-kernel/kexec/kexec-tools_2.0.23.bb +++ b/meta/recipes-kernel/kexec/kexec-tools_2.0.31.bb | |||
@@ -1,13 +1,13 @@ | |||
1 | |||
2 | SUMMARY = "Kexec fast reboot tools" | 1 | SUMMARY = "Kexec fast reboot tools" |
3 | DESCRIPTION = "Kexec is a fast reboot feature that lets you reboot to a new Linux kernel" | 2 | DESCRIPTION = "Kexec is a fast reboot feature that lets you reboot to a new Linux kernel" |
4 | AUTHOR = "Eric Biederman" | ||
5 | HOMEPAGE = "http://kernel.org/pub/linux/utils/kernel/kexec/" | 3 | HOMEPAGE = "http://kernel.org/pub/linux/utils/kernel/kexec/" |
6 | SECTION = "kernel/userland" | 4 | SECTION = "kernel/userland" |
7 | LICENSE = "GPLv2" | 5 | LICENSE = "GPL-2.0-only" |
8 | LIC_FILES_CHKSUM = "file://COPYING;md5=ea5bed2f60d357618ca161ad539f7c0a \ | 6 | LIC_FILES_CHKSUM = "file://COPYING;md5=b234ee4d69f5fce4486a80fdaf4a4263 \ |
9 | file://kexec/kexec.c;beginline=1;endline=20;md5=af10f6ae4a8715965e648aa687ad3e09" | 7 | file://kexec/kexec.c;beginline=1;endline=20;md5=af10f6ae4a8715965e648aa687ad3e09 \ |
8 | " | ||
10 | DEPENDS = "zlib xz" | 9 | DEPENDS = "zlib xz" |
10 | RDEPENDS:${PN} = "makedumpfile" | ||
11 | 11 | ||
12 | SRC_URI = "${KERNELORG_MIRROR}/linux/utils/kernel/kexec/kexec-tools-${PV}.tar.gz \ | 12 | SRC_URI = "${KERNELORG_MIRROR}/linux/utils/kernel/kexec/kexec-tools-${PV}.tar.gz \ |
13 | file://kdump \ | 13 | file://kdump \ |
@@ -15,18 +15,22 @@ SRC_URI = "${KERNELORG_MIRROR}/linux/utils/kernel/kexec/kexec-tools-${PV}.tar.gz | |||
15 | file://kdump.service \ | 15 | file://kdump.service \ |
16 | file://0001-powerpc-change-the-memory-size-limit.patch \ | 16 | file://0001-powerpc-change-the-memory-size-limit.patch \ |
17 | file://0002-purgatory-Pass-r-directly-to-linker.patch \ | 17 | file://0002-purgatory-Pass-r-directly-to-linker.patch \ |
18 | file://0003-kexec-ARM-Fix-add_buffer_phys_virt-align-issue.patch \ | ||
19 | file://0005-Disable-PIE-during-link.patch \ | 18 | file://0005-Disable-PIE-during-link.patch \ |
20 | file://0001-arm64-kexec-disabled-check-if-kaslr-seed-dtb-propert.patch \ | 19 | file://0001-arm64-kexec-disabled-check-if-kaslr-seed-dtb-propert.patch \ |
20 | file://0001-kexec.c-add-MFD_NOEXEC_SEAL-flag-explicitly.patch \ | ||
21 | file://0001-ppc-fs2dt-Match-function-signatures.patch \ | ||
21 | " | 22 | " |
22 | 23 | ||
23 | SRC_URI[sha256sum] = "c7dcc59f5b66004d9d91264324e20e0387ea263dbb449708fbf84a4e5ff7decc" | 24 | SRC_URI[sha256sum] = "ddaaa65b02b4f8aa9222586b1f26565b93a4baeffd35bcbd523f15fae7aa4897" |
24 | 25 | ||
25 | inherit autotools update-rc.d systemd | 26 | inherit autotools update-rc.d systemd |
26 | 27 | ||
27 | export LDFLAGS = "-L${STAGING_LIBDIR}" | 28 | export LDFLAGS = "-L${STAGING_LIBDIR}" |
28 | EXTRA_OECONF = " --with-zlib=yes" | 29 | EXTRA_OECONF = " --with-zlib=yes" |
29 | 30 | ||
31 | # purgatory uses -msoft-float for ppc32/ppc64, it does not go with -maltivec | ||
32 | TUNE_CCARGS:remove:powerpc = "-maltivec" | ||
33 | |||
30 | do_compile:prepend() { | 34 | do_compile:prepend() { |
31 | # Remove the prepackaged config.h from the source tree as it overrides | 35 | # Remove the prepackaged config.h from the source tree as it overrides |
32 | # the same file generated by configure and placed in the build tree | 36 | # the same file generated by configure and placed in the build tree |
@@ -44,15 +48,15 @@ do_compile:prepend() { | |||
44 | 48 | ||
45 | do_install:append () { | 49 | do_install:append () { |
46 | install -d ${D}${sysconfdir}/sysconfig | 50 | install -d ${D}${sysconfdir}/sysconfig |
47 | install -m 0644 ${WORKDIR}/kdump.conf ${D}${sysconfdir}/sysconfig | 51 | install -m 0644 ${UNPACKDIR}/kdump.conf ${D}${sysconfdir}/sysconfig |
48 | 52 | ||
49 | if ${@bb.utils.contains('DISTRO_FEATURES', 'sysvinit', 'true', 'false', d)}; then | 53 | if ${@bb.utils.contains('DISTRO_FEATURES', 'sysvinit', 'true', 'false', d)}; then |
50 | install -D -m 0755 ${WORKDIR}/kdump ${D}${sysconfdir}/init.d/kdump | 54 | install -D -m 0755 ${UNPACKDIR}/kdump ${D}${sysconfdir}/init.d/kdump |
51 | fi | 55 | fi |
52 | 56 | ||
53 | if ${@bb.utils.contains('DISTRO_FEATURES', 'systemd', 'true', 'false', d)}; then | 57 | if ${@bb.utils.contains('DISTRO_FEATURES', 'systemd', 'true', 'false', d)}; then |
54 | install -D -m 0755 ${WORKDIR}/kdump ${D}${libexecdir}/kdump-helper | 58 | install -D -m 0755 ${UNPACKDIR}/kdump ${D}${libexecdir}/kdump-helper |
55 | install -D -m 0644 ${WORKDIR}/kdump.service ${D}${systemd_system_unitdir}/kdump.service | 59 | install -D -m 0644 ${UNPACKDIR}/kdump.service ${D}${systemd_system_unitdir}/kdump.service |
56 | sed -i -e 's,@LIBEXECDIR@,${libexecdir},g' ${D}${systemd_system_unitdir}/kdump.service | 60 | sed -i -e 's,@LIBEXECDIR@,${libexecdir},g' ${D}${systemd_system_unitdir}/kdump.service |
57 | fi | 61 | fi |
58 | } | 62 | } |
@@ -82,5 +86,8 @@ SYSTEMD_SERVICE:kdump = "kdump.service" | |||
82 | SECURITY_PIE_CFLAGS:remove = "-fPIE -pie" | 86 | SECURITY_PIE_CFLAGS:remove = "-fPIE -pie" |
83 | 87 | ||
84 | COMPATIBLE_HOST = '(x86_64.*|i.86.*|arm.*|aarch64.*|powerpc.*|mips.*)-(linux|freebsd.*)' | 88 | COMPATIBLE_HOST = '(x86_64.*|i.86.*|arm.*|aarch64.*|powerpc.*|mips.*)-(linux|freebsd.*)' |
89 | # makedumpfile would not compile on mips/rv32 | ||
90 | COMPATIBLE_HOST:mipsarcho32 = "null" | ||
91 | COMPATIBLE_HOST:riscv32 = "null" | ||
85 | 92 | ||
86 | INSANE_SKIP:${PN} = "arch" | 93 | INSANE_SKIP:${PN} = "arch" |
diff --git a/meta/recipes-kernel/kmod/depmodwrapper-cross_1.0.bb b/meta/recipes-kernel/kmod/depmodwrapper-cross_1.0.bb index 9a172675af..5e70e01102 100644 --- a/meta/recipes-kernel/kmod/depmodwrapper-cross_1.0.bb +++ b/meta/recipes-kernel/kmod/depmodwrapper-cross_1.0.bb | |||
@@ -1,7 +1,7 @@ | |||
1 | SUMMARY = "Wrapper script for the Linux kernel module dependency indexer" | 1 | SUMMARY = "Wrapper script for the Linux kernel module dependency indexer" |
2 | LICENSE = "MIT" | 2 | LICENSE = "MIT" |
3 | 3 | ||
4 | S = "${WORKDIR}" | 4 | S = "${UNPACKDIR}" |
5 | 5 | ||
6 | INHIBIT_DEFAULT_DEPS = "1" | 6 | INHIBIT_DEFAULT_DEPS = "1" |
7 | # The kernel and the staging dir for it is machine specific | 7 | # The kernel and the staging dir for it is machine specific |
@@ -21,20 +21,29 @@ do_install() { | |||
21 | #!/bin/sh | 21 | #!/bin/sh |
22 | # Expected to be called as: depmodwrapper -a KERNEL_VERSION | 22 | # Expected to be called as: depmodwrapper -a KERNEL_VERSION |
23 | if [ "\$1" != "-a" -o "\$2" != "-b" ]; then | 23 | if [ "\$1" != "-a" -o "\$2" != "-b" ]; then |
24 | echo "Usage: depmodwrapper -a -b rootfs KERNEL_VERSION" >&2 | 24 | echo "Usage: depmodwrapper -a -b rootfs KERNEL_VERSION [KERNEL_PACKAGE_NAME]" >&2 |
25 | exit 1 | 25 | exit 1 |
26 | fi | 26 | fi |
27 | 27 | ||
28 | kernelpkgname="kernel" | ||
29 | # If no KERNEL_PACKAGE_NAME, assume "kernel". | ||
30 | [ -z "\$5" ] || kernelpkgname="\$5" | ||
31 | |||
28 | kernelabi="" | 32 | kernelabi="" |
29 | if [ -r "${PKGDATA_DIR}/kernel-depmod/kernel-abiversion" ]; then | 33 | if [ -r "${PKGDATA_DIR}/\${kernelpkgname}-depmod/\${kernelpkgname}-abiversion" ]; then |
30 | kernelabi=\$(cat "${PKGDATA_DIR}/kernel-depmod/kernel-abiversion") | 34 | kernelabi=\$(cat "${PKGDATA_DIR}/\${kernelpkgname}-depmod/\${kernelpkgname}-abiversion") |
35 | fi | ||
36 | |||
37 | if [ ! -e "\$3${nonarch_base_libdir}/depmod.d/exclude.conf" ]; then | ||
38 | mkdir -p "\$3${nonarch_base_libdir}/depmod.d" | ||
39 | echo "exclude .debug" > "\$3${nonarch_base_libdir}/depmod.d/exclude.conf" | ||
31 | fi | 40 | fi |
32 | 41 | ||
33 | if [ ! -r ${PKGDATA_DIR}/kernel-depmod/System.map-\$4 ] || [ "\$kernelabi" != "\$4" ]; then | 42 | if [ ! -r ${PKGDATA_DIR}/\${kernelpkgname}-depmod/System.map-\$4 ] || [ "\$kernelabi" != "\$4" ]; then |
34 | echo "Unable to read: ${PKGDATA_DIR}/kernel-depmod/System.map-\$4" >&2 | 43 | echo "Unable to read: ${PKGDATA_DIR}/\${kernelpkgname}-depmod/System.map-\$4" >&2 |
35 | exec env depmod "\$1" "\$2" "\$3" "\$4" | 44 | exec env depmod -C "\$3${nonarch_base_libdir}/depmod.d" "\$1" "\$2" "\$3" "\$4" |
36 | else | 45 | else |
37 | exec env depmod "\$1" "\$2" "\$3" -F "${PKGDATA_DIR}/kernel-depmod/System.map-\$4" "\$4" | 46 | exec env depmod -C "\$3${nonarch_base_libdir}/depmod.d" "\$1" "\$2" "\$3" -F "${PKGDATA_DIR}/\${kernelpkgname}-depmod/System.map-\$4" "\$4" |
38 | fi | 47 | fi |
39 | EOF | 48 | EOF |
40 | chmod +x ${D}${bindir_crossscripts}/depmodwrapper | 49 | chmod +x ${D}${bindir_crossscripts}/depmodwrapper |
diff --git a/meta/recipes-kernel/kmod/kmod-native_git.bb b/meta/recipes-kernel/kmod/kmod-native_git.bb deleted file mode 100644 index 4dd34b1c82..0000000000 --- a/meta/recipes-kernel/kmod/kmod-native_git.bb +++ /dev/null | |||
@@ -1,15 +0,0 @@ | |||
1 | # Copyright (C) 2012 Khem Raj <raj.khem@gmail.com> | ||
2 | # Released under the MIT license (see COPYING.MIT for the terms) | ||
3 | |||
4 | require kmod.inc | ||
5 | |||
6 | DEPENDS += "zlib-native" | ||
7 | |||
8 | inherit native | ||
9 | |||
10 | do_install:append (){ | ||
11 | for tool in depmod insmod lsmod modinfo modprobe rmmod | ||
12 | do | ||
13 | ln -s kmod ${D}${bindir}/$tool | ||
14 | done | ||
15 | } | ||
diff --git a/meta/recipes-kernel/kmod/kmod.inc b/meta/recipes-kernel/kmod/kmod.inc deleted file mode 100644 index d527887b78..0000000000 --- a/meta/recipes-kernel/kmod/kmod.inc +++ /dev/null | |||
@@ -1,37 +0,0 @@ | |||
1 | # Copyright (C) 2012 Khem Raj <raj.khem@gmail.com> | ||
2 | # Released under the MIT license (see COPYING.MIT for the terms) | ||
3 | |||
4 | SUMMARY = "Tools for managing Linux kernel modules" | ||
5 | DESCRIPTION = "kmod is a set of tools to handle common tasks with Linux kernel modules like \ | ||
6 | insert, remove, list, check properties, resolve dependencies and aliases." | ||
7 | HOMEPAGE = "http://kernel.org/pub/linux/utils/kernel/kmod/" | ||
8 | LICENSE = "GPL-2.0+ & LGPL-2.1+" | ||
9 | LICENSE:libkmod = "LGPL-2.1+" | ||
10 | SECTION = "base" | ||
11 | |||
12 | LIC_FILES_CHKSUM = "file://COPYING;md5=a6f89e2100d9b6cdffcea4f398e37343 \ | ||
13 | file://libkmod/COPYING;md5=a6f89e2100d9b6cdffcea4f398e37343 \ | ||
14 | file://tools/COPYING;md5=751419260aa954499f7abaabaa882bbe \ | ||
15 | " | ||
16 | inherit autotools gtk-doc pkgconfig manpages | ||
17 | |||
18 | SRCREV = "b6ecfc916a17eab8f93be5b09f4e4f845aabd3d1" | ||
19 | # Lookout for PV bump too when SRCREV is changed | ||
20 | PV = "29" | ||
21 | |||
22 | SRC_URI = "git://git.kernel.org/pub/scm/utils/kernel/kmod/kmod.git;branch=master \ | ||
23 | file://depmod-search.conf \ | ||
24 | file://avoid_parallel_tests.patch \ | ||
25 | " | ||
26 | |||
27 | S = "${WORKDIR}/git" | ||
28 | |||
29 | EXTRA_OECONF +=" --enable-tools --with-zlib" | ||
30 | |||
31 | PACKAGECONFIG[debug] = "--enable-debug,--disable-debug" | ||
32 | PACKAGECONFIG[logging] = " --enable-logging,--disable-logging" | ||
33 | PACKAGECONFIG[manpages] = "--enable-manpages, --disable-manpages, libxslt-native xmlto-native" | ||
34 | PACKAGECONFIG[xz] = "--with-xz,--without-xz,xz" | ||
35 | PACKAGECONFIG[openssl] = "--with-openssl,--without-openssl,openssl" | ||
36 | |||
37 | GTKDOC_DOCDIR = "${S}/libkmod/docs" | ||
diff --git a/meta/recipes-kernel/kmod/kmod/avoid_parallel_tests.patch b/meta/recipes-kernel/kmod/kmod/avoid_parallel_tests.patch deleted file mode 100644 index 04a8204815..0000000000 --- a/meta/recipes-kernel/kmod/kmod/avoid_parallel_tests.patch +++ /dev/null | |||
@@ -1,32 +0,0 @@ | |||
1 | From be6f82c54f694617c646ca1f8b5bcf93694e20ad Mon Sep 17 00:00:00 2001 | ||
2 | From: Tudor Florea <tudor.florea@enea.com> | ||
3 | Date: Fri, 6 Sep 2013 21:11:57 +0000 | ||
4 | Subject: [PATCH] kmod: avoid parallel-tests | ||
5 | |||
6 | Avoid parallel-tests as it remove | ||
7 | buildtest-TESTS and runtest-TESTS targets required by ptest. | ||
8 | In automake 1.13.4 parallel-tests is assumed by defauls. | ||
9 | In order to have buildtest-TESTS and runtest-TESTS targets | ||
10 | serial-tests is now required | ||
11 | |||
12 | Signed-off-by: Tudor Florea <tudor.florea@enea.com> | ||
13 | Upstream-Status: Inappropriate (disable feature incompatible with ptest) | ||
14 | |||
15 | --- | ||
16 | configure.ac | 2 +- | ||
17 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
18 | |||
19 | diff --git a/configure.ac b/configure.ac | ||
20 | index ee72283..60980c0 100644 | ||
21 | --- a/configure.ac | ||
22 | +++ b/configure.ac | ||
23 | @@ -14,8 +14,8 @@ AC_USE_SYSTEM_EXTENSIONS | ||
24 | AC_SYS_LARGEFILE | ||
25 | AC_PREFIX_DEFAULT([/usr]) | ||
26 | AM_MAINTAINER_MODE([enable]) | ||
27 | -AM_INIT_AUTOMAKE([check-news foreign 1.11 silent-rules tar-pax no-dist-gzip dist-xz subdir-objects color-tests parallel-tests]) | ||
28 | +AM_INIT_AUTOMAKE([check-news foreign 1.11 silent-rules tar-pax no-dist-gzip dist-xz subdir-objects color-tests serial-tests]) | ||
29 | AM_SILENT_RULES([yes]) | ||
30 | LT_INIT([disable-static pic-only]) | ||
31 | |||
32 | AS_IF([test "x$enable_static" = "xyes"], [AC_MSG_ERROR([--enable-static is not supported by kmod])]) | ||
diff --git a/meta/recipes-kernel/kmod/kmod/ptest.patch b/meta/recipes-kernel/kmod/kmod/ptest.patch deleted file mode 100644 index 831dbcb909..0000000000 --- a/meta/recipes-kernel/kmod/kmod/ptest.patch +++ /dev/null | |||
@@ -1,25 +0,0 @@ | |||
1 | Add 'install-ptest' rule. | ||
2 | |||
3 | Signed-off-by: Tudor Florea <tudor.florea@enea.com> | ||
4 | Upstream-Status: Pending | ||
5 | |||
6 | diff -ruN a/Makefile.am b/Makefile.am | ||
7 | --- a/Makefile.am 2013-07-12 17:11:05.278331557 +0200 | ||
8 | +++ b/Makefile.am 2013-07-12 17:14:27.033788016 +0200 | ||
9 | @@ -204,6 +204,16 @@ | ||
10 | |||
11 | distclean-local: $(DISTCLEAN_LOCAL_HOOKS) | ||
12 | |||
13 | +install-ptest: | ||
14 | + @$(MKDIR_P) $(DESTDIR)/testsuite | ||
15 | + @for file in $(TESTSUITE); do \ | ||
16 | + install $$file $(DESTDIR)/testsuite; \ | ||
17 | + done; | ||
18 | + @sed -e 's/^Makefile/_Makefile/' < Makefile > $(DESTDIR)/Makefile | ||
19 | + @$(MKDIR_P) $(DESTDIR)/tools | ||
20 | + @cp $(noinst_SCRIPTS) $(noinst_PROGRAMS) $(DESTDIR)/tools | ||
21 | + @cp -r testsuite/rootfs testsuite/.libs $(DESTDIR)/testsuite | ||
22 | + | ||
23 | # ------------------------------------------------------------------------------ | ||
24 | # custom release helpers | ||
25 | # ------------------------------------------------------------------------------ | ||
diff --git a/meta/recipes-kernel/kmod/kmod/run-ptest b/meta/recipes-kernel/kmod/kmod/run-ptest deleted file mode 100755 index 598dd2cb5f..0000000000 --- a/meta/recipes-kernel/kmod/kmod/run-ptest +++ /dev/null | |||
@@ -1,5 +0,0 @@ | |||
1 | #!/bin/sh | ||
2 | touch testsuite/stamp-rootfs | ||
3 | tar xf testmodule.tar | ||
4 | make -k runtest-TESTS 2>/dev/null| grep -e ^PASS -e ^FAIL | ||
5 | find testsuite -name *.ko -exec rm -f {} \; | ||
diff --git a/meta/recipes-kernel/kmod/kmod_34.2.bb b/meta/recipes-kernel/kmod/kmod_34.2.bb new file mode 100644 index 0000000000..e5923a64cf --- /dev/null +++ b/meta/recipes-kernel/kmod/kmod_34.2.bb | |||
@@ -0,0 +1,77 @@ | |||
1 | # Copyright (C) 2012 Khem Raj <raj.khem@gmail.com> | ||
2 | # Released under the MIT license (see COPYING.MIT for the terms) | ||
3 | |||
4 | SUMMARY = "Tools for managing Linux kernel modules" | ||
5 | DESCRIPTION = "kmod is a set of tools to handle common tasks with Linux kernel modules like \ | ||
6 | insert, remove, list, check properties, resolve dependencies and aliases." | ||
7 | HOMEPAGE = "http://kernel.org/pub/linux/utils/kernel/kmod/" | ||
8 | LICENSE = "GPL-2.0-or-later & LGPL-2.1-or-later" | ||
9 | LICENSE:libkmod = "LGPL-2.1-or-later" | ||
10 | SECTION = "base" | ||
11 | |||
12 | LIC_FILES_CHKSUM = "file://COPYING;md5=a6f89e2100d9b6cdffcea4f398e37343 \ | ||
13 | file://libkmod/COPYING;md5=a6f89e2100d9b6cdffcea4f398e37343 \ | ||
14 | file://tools/COPYING;md5=751419260aa954499f7abaabaa882bbe \ | ||
15 | " | ||
16 | inherit bash-completion gtk-doc manpages meson pkgconfig update-alternatives | ||
17 | |||
18 | SRC_URI = "https://www.kernel.org/pub/linux/utils/kernel/${BPN}/${BP}.tar.xz \ | ||
19 | file://depmod-search.conf \ | ||
20 | " | ||
21 | SRC_URI[sha256sum] = "5a5d5073070cc7e0c7a7a3c6ec2a0e1780850c8b47b3e3892226b93ffcb9cb54" | ||
22 | |||
23 | EXTRA_OEMESON += "\ | ||
24 | -Ddistconfdir=${nonarch_base_libdir} \ | ||
25 | --bindir=${base_bindir} \ | ||
26 | --sbindir=${base_sbindir} \ | ||
27 | -Dtools=true \ | ||
28 | " | ||
29 | |||
30 | PACKAGECONFIG ??= "zlib xz openssl" | ||
31 | PACKAGECONFIG[debug] = "-Ddebug-messages=true,-Ddebug-messages=false" | ||
32 | PACKAGECONFIG[logging] = " -Dlogging=true,-Dlogging=false" | ||
33 | PACKAGECONFIG[manpages] = "-Dmanpages=true,-Dmanpages=false,scdoc-native" | ||
34 | PACKAGECONFIG[openssl] = "-Dopenssl=enabled,-Dopenssl=disabled,openssl" | ||
35 | PACKAGECONFIG[xz] = "-Dxz=enabled,-Dxz=disabled,xz" | ||
36 | PACKAGECONFIG[zlib] = "-Dzlib=enabled,-Dzlib=disabled,zlib" | ||
37 | PACKAGECONFIG[zstd] = "-Dzstd=enabled,-Dzstd=disabled,zstd" | ||
38 | |||
39 | PROVIDES += "module-init-tools-insmod-static module-init-tools-depmod module-init-tools" | ||
40 | RPROVIDES:${PN} += "module-init-tools-insmod-static module-init-tools-depmod module-init-tools" | ||
41 | RCONFLICTS:${PN} += "module-init-tools-insmod-static module-init-tools-depmod module-init-tools" | ||
42 | RREPLACES:${PN} += "module-init-tools-insmod-static module-init-tools-depmod module-init-tools" | ||
43 | |||
44 | # to force user to remove old module-init-tools and replace them with kmod variants | ||
45 | RCONFLICTS:libkmod2 += "module-init-tools-insmod-static module-init-tools-depmod module-init-tools" | ||
46 | |||
47 | do_install:append () { | ||
48 | # install depmod.d file for search/ dir | ||
49 | install -Dm644 "${UNPACKDIR}/depmod-search.conf" "${D}${nonarch_base_libdir}/depmod.d/search.conf" | ||
50 | |||
51 | # Add .debug to the exclude path for depmod | ||
52 | echo "exclude .debug" > ${D}${nonarch_base_libdir}/depmod.d/exclude.conf | ||
53 | } | ||
54 | |||
55 | PACKAGES += "${PN}-fish-completion ${PN}-zsh-completion" | ||
56 | |||
57 | FILES:${PN}-fish-completion = "${datadir}/fish" | ||
58 | FILES:${PN}-zsh-completion = "${datadir}/zsh" | ||
59 | |||
60 | ALTERNATIVE_PRIORITY = "70" | ||
61 | |||
62 | ALTERNATIVE:kmod = "insmod modprobe rmmod modinfo bin-lsmod lsmod depmod" | ||
63 | |||
64 | ALTERNATIVE_LINK_NAME[depmod] = "${base_sbindir}/depmod" | ||
65 | ALTERNATIVE_LINK_NAME[insmod] = "${base_sbindir}/insmod" | ||
66 | ALTERNATIVE_LINK_NAME[modprobe] = "${base_sbindir}/modprobe" | ||
67 | ALTERNATIVE_LINK_NAME[rmmod] = "${base_sbindir}/rmmod" | ||
68 | ALTERNATIVE_LINK_NAME[modinfo] = "${base_sbindir}/modinfo" | ||
69 | ALTERNATIVE_LINK_NAME[bin-lsmod] = "${base_sbindir}/lsmod" | ||
70 | ALTERNATIVE_LINK_NAME[lsmod] = "${base_sbindir}/lsmod" | ||
71 | ALTERNATIVE_TARGET[lsmod] = "${base_sbindir}/lsmod.${BPN}" | ||
72 | |||
73 | PACKAGES =+ "libkmod" | ||
74 | FILES:libkmod = "${base_libdir}/libkmod*${SOLIBS} ${libdir}/libkmod*${SOLIBS}" | ||
75 | FILES:${PN} += "${nonarch_base_libdir}/depmod.d ${nonarch_base_libdir}/modprobe.d" | ||
76 | |||
77 | BBCLASSEXTEND = "native nativesdk" | ||
diff --git a/meta/recipes-kernel/kmod/kmod_git.bb b/meta/recipes-kernel/kmod/kmod_git.bb deleted file mode 100644 index 9bd66de430..0000000000 --- a/meta/recipes-kernel/kmod/kmod_git.bb +++ /dev/null | |||
@@ -1,62 +0,0 @@ | |||
1 | # Copyright (C) 2012 Khem Raj <raj.khem@gmail.com> | ||
2 | # Released under the MIT license (see COPYING.MIT for the terms) | ||
3 | |||
4 | require kmod.inc | ||
5 | |||
6 | DEPENDS += "zlib" | ||
7 | PROVIDES += "module-init-tools-insmod-static module-init-tools-depmod module-init-tools" | ||
8 | RPROVIDES:${PN} += "module-init-tools-insmod-static module-init-tools-depmod module-init-tools" | ||
9 | RCONFLICTS:${PN} += "module-init-tools-insmod-static module-init-tools-depmod module-init-tools" | ||
10 | RREPLACES:${PN} += "module-init-tools-insmod-static module-init-tools-depmod module-init-tools" | ||
11 | |||
12 | # to force user to remove old module-init-tools and replace them with kmod variants | ||
13 | RCONFLICTS:libkmod2 += "module-init-tools-insmod-static module-init-tools-depmod module-init-tools" | ||
14 | |||
15 | # autotools set prefix to /usr, however we want them in /bin and /sbin | ||
16 | EXTRA_OECONF += " --bindir=${base_bindir} --sbindir=${base_sbindir}" | ||
17 | |||
18 | do_install:append () { | ||
19 | install -dm755 ${D}${base_bindir} | ||
20 | install -dm755 ${D}${base_sbindir} | ||
21 | # add symlinks to kmod | ||
22 | ln -rs ${D}${base_bindir}/kmod ${D}${base_bindir}/lsmod | ||
23 | for tool in insmod rmmod depmod modinfo modprobe; do | ||
24 | ln -rs ${D}${base_bindir}/kmod ${D}${base_sbindir}/${tool} | ||
25 | done | ||
26 | # configuration directories | ||
27 | install -dm755 ${D}${nonarch_base_libdir}/depmod.d | ||
28 | install -dm755 ${D}${nonarch_base_libdir}/modprobe.d | ||
29 | install -dm755 ${D}${sysconfdir}/depmod.d | ||
30 | install -dm755 ${D}${sysconfdir}/modprobe.d | ||
31 | |||
32 | # install depmod.d file for search/ dir | ||
33 | install -Dm644 "${WORKDIR}/depmod-search.conf" "${D}${nonarch_base_libdir}/depmod.d/search.conf" | ||
34 | } | ||
35 | |||
36 | do_compile:prepend() { | ||
37 | sed -i 's/ac_pwd=/#ac_pwd=/' config.status ; sed -i "/#ac_pwd=/a\ac_pwd='.'" config.status | ||
38 | } | ||
39 | |||
40 | inherit update-alternatives bash-completion | ||
41 | |||
42 | ALTERNATIVE_PRIORITY = "70" | ||
43 | |||
44 | ALTERNATIVE:kmod = "insmod modprobe rmmod modinfo bin-lsmod lsmod depmod" | ||
45 | |||
46 | ALTERNATIVE_LINK_NAME[insmod] = "${base_sbindir}/insmod" | ||
47 | ALTERNATIVE_LINK_NAME[modprobe] = "${base_sbindir}/modprobe" | ||
48 | ALTERNATIVE_LINK_NAME[rmmod] = "${base_sbindir}/rmmod" | ||
49 | ALTERNATIVE_LINK_NAME[modinfo] = "${base_sbindir}/modinfo" | ||
50 | ALTERNATIVE_LINK_NAME[bin-lsmod] = "${base_bindir}/lsmod" | ||
51 | |||
52 | ALTERNATIVE_LINK_NAME[lsmod] = "${base_sbindir}/lsmod" | ||
53 | ALTERNATIVE_TARGET[lsmod] = "${base_bindir}/lsmod.${BPN}" | ||
54 | |||
55 | ALTERNATIVE_LINK_NAME[depmod] = "${base_sbindir}/depmod" | ||
56 | |||
57 | PACKAGES =+ "libkmod" | ||
58 | |||
59 | FILES:libkmod = "${base_libdir}/libkmod*${SOLIBS} ${libdir}/libkmod*${SOLIBS}" | ||
60 | FILES:${PN} += "${nonarch_base_libdir}/depmod.d ${nonarch_base_libdir}/modprobe.d" | ||
61 | |||
62 | BBCLASSEXTEND = "nativesdk" | ||
diff --git a/meta/recipes-kernel/libtraceevent/libtraceevent_1.8.4.bb b/meta/recipes-kernel/libtraceevent/libtraceevent_1.8.4.bb new file mode 100644 index 0000000000..75762e4def --- /dev/null +++ b/meta/recipes-kernel/libtraceevent/libtraceevent_1.8.4.bb | |||
@@ -0,0 +1,21 @@ | |||
1 | # Copyright (C) 2022 Khem Raj <raj.khem@gmail.com> | ||
2 | # Released under the MIT license (see COPYING.MIT for the terms) | ||
3 | |||
4 | SUMMARY = "API to access the kernel tracefs directory" | ||
5 | HOMEPAGE = "https://git.kernel.org/pub/scm/libs/libtrace/libtracefs.git/" | ||
6 | LICENSE = "GPL-2.0-or-later & LGPL-2.1-or-later" | ||
7 | LIC_FILES_CHKSUM = "file://LICENSES/GPL-2.0;md5=e6a75371ba4d16749254a51215d13f97 \ | ||
8 | file://LICENSES/LGPL-2.1;md5=b370887980db5dd40659b50909238dbd" | ||
9 | SECTION = "libs" | ||
10 | |||
11 | SRCREV = "bd47bd544c9ebc9f44bd88c2b2f2049230741058" | ||
12 | SRC_URI = "git://git.kernel.org/pub/scm/libs/libtrace/libtraceevent.git;branch=${BPN};protocol=https \ | ||
13 | " | ||
14 | |||
15 | inherit meson pkgconfig | ||
16 | |||
17 | EXTRA_OEMESON = "-Ddoc=false" | ||
18 | |||
19 | PACKAGES += "${PN}-plugins" | ||
20 | |||
21 | FILES:${PN}-plugins += "${libdir}/traceevent/plugins" | ||
diff --git a/meta/recipes-kernel/linux-firmware/linux-firmware_20211027.bb b/meta/recipes-kernel/linux-firmware/linux-firmware_20211027.bb deleted file mode 100644 index 97d42e98e2..0000000000 --- a/meta/recipes-kernel/linux-firmware/linux-firmware_20211027.bb +++ /dev/null | |||
@@ -1,1067 +0,0 @@ | |||
1 | SUMMARY = "Firmware files for use with Linux kernel" | ||
2 | HOMEPAGE = "https://www.kernel.org/" | ||
3 | DESCRIPTION = "Linux firmware is a package distributed alongside the Linux kernel \ | ||
4 | that contains firmware binary blobs necessary for partial or full functionality \ | ||
5 | of certain hardware devices." | ||
6 | SECTION = "kernel" | ||
7 | |||
8 | LICENSE = "\ | ||
9 | Firmware-Abilis \ | ||
10 | & Firmware-adsp_sst \ | ||
11 | & Firmware-agere \ | ||
12 | & Firmware-amdgpu \ | ||
13 | & Firmware-amd-ucode \ | ||
14 | & Firmware-amlogic_vdec \ | ||
15 | & Firmware-atheros_firmware \ | ||
16 | & Firmware-atmel \ | ||
17 | & Firmware-broadcom_bcm43xx \ | ||
18 | & Firmware-ca0132 \ | ||
19 | & Firmware-cavium \ | ||
20 | & Firmware-chelsio_firmware \ | ||
21 | & Firmware-cw1200 \ | ||
22 | & Firmware-cypress \ | ||
23 | & Firmware-dib0700 \ | ||
24 | & Firmware-e100 \ | ||
25 | & Firmware-ene_firmware \ | ||
26 | & Firmware-fw_sst_0f28 \ | ||
27 | & Firmware-go7007 \ | ||
28 | & Firmware-GPLv2 \ | ||
29 | & Firmware-hfi1_firmware \ | ||
30 | & Firmware-i2400m \ | ||
31 | & Firmware-i915 \ | ||
32 | & Firmware-ibt_firmware \ | ||
33 | & Firmware-ice \ | ||
34 | & Firmware-it913x \ | ||
35 | & Firmware-iwlwifi_firmware \ | ||
36 | & Firmware-IntcSST2 \ | ||
37 | & Firmware-kaweth \ | ||
38 | & Firmware-Lontium \ | ||
39 | & Firmware-Marvell \ | ||
40 | & Firmware-moxa \ | ||
41 | & Firmware-myri10ge_firmware \ | ||
42 | & Firmware-netronome \ | ||
43 | & Firmware-nvidia \ | ||
44 | & Firmware-OLPC \ | ||
45 | & Firmware-ath9k-htc \ | ||
46 | & Firmware-phanfw \ | ||
47 | & Firmware-qat \ | ||
48 | & Firmware-qcom \ | ||
49 | & Firmware-qla1280 \ | ||
50 | & Firmware-qla2xxx \ | ||
51 | & Firmware-qualcommAthos_ar3k \ | ||
52 | & Firmware-qualcommAthos_ath10k \ | ||
53 | & Firmware-r8a779x_usb3 \ | ||
54 | & Firmware-radeon \ | ||
55 | & Firmware-ralink_a_mediatek_company_firmware \ | ||
56 | & Firmware-ralink-firmware \ | ||
57 | & Firmware-rtlwifi_firmware \ | ||
58 | & Firmware-imx-sdma_firmware \ | ||
59 | & Firmware-siano \ | ||
60 | & Firmware-tda7706-firmware \ | ||
61 | & Firmware-ti-connectivity \ | ||
62 | & Firmware-ti-keystone \ | ||
63 | & Firmware-ueagle-atm4-firmware \ | ||
64 | & Firmware-via_vt6656 \ | ||
65 | & Firmware-wl1251 \ | ||
66 | & Firmware-xc4000 \ | ||
67 | & Firmware-xc5000 \ | ||
68 | & Firmware-xc5000c \ | ||
69 | & WHENCE \ | ||
70 | " | ||
71 | |||
72 | LIC_FILES_CHKSUM = "file://LICENCE.Abilis;md5=b5ee3f410780e56711ad48eadc22b8bc \ | ||
73 | file://LICENCE.adsp_sst;md5=615c45b91a5a4a9fe046d6ab9a2df728 \ | ||
74 | file://LICENCE.agere;md5=af0133de6b4a9b2522defd5f188afd31 \ | ||
75 | file://LICENSE.amdgpu;md5=d357524f5099e2a3db3c1838921c593f \ | ||
76 | file://LICENSE.amd-ucode;md5=3c5399dc9148d7f0e1f41e34b69cf14f \ | ||
77 | file://LICENSE.amlogic_vdec;md5=dc44f59bf64a81643e500ad3f39a468a \ | ||
78 | file://LICENCE.atheros_firmware;md5=30a14c7823beedac9fa39c64fdd01a13 \ | ||
79 | file://LICENSE.atmel;md5=aa74ac0c60595dee4d4e239107ea77a3 \ | ||
80 | file://LICENCE.broadcom_bcm43xx;md5=3160c14df7228891b868060e1951dfbc \ | ||
81 | file://LICENCE.ca0132;md5=209b33e66ee5be0461f13d31da392198 \ | ||
82 | file://LICENCE.cadence;md5=009f46816f6956cfb75ede13d3e1cee0 \ | ||
83 | file://LICENCE.cavium;md5=c37aaffb1ebe5939b2580d073a95daea \ | ||
84 | file://LICENCE.chelsio_firmware;md5=819aa8c3fa453f1b258ed8d168a9d903 \ | ||
85 | file://LICENCE.cw1200;md5=f0f770864e7a8444a5c5aa9d12a3a7ed \ | ||
86 | file://LICENCE.cypress;md5=48cd9436c763bf873961f9ed7b5c147b \ | ||
87 | file://LICENSE.dib0700;md5=f7411825c8a555a1a3e5eab9ca773431 \ | ||
88 | file://LICENCE.e100;md5=ec0f84136766df159a3ae6d02acdf5a8 \ | ||
89 | file://LICENCE.ene_firmware;md5=ed67f0f62f8f798130c296720b7d3921 \ | ||
90 | file://LICENCE.fw_sst_0f28;md5=6353931c988ad52818ae733ac61cd293 \ | ||
91 | file://LICENCE.go7007;md5=c0bb9f6aaaba55b0529ee9b30aa66beb \ | ||
92 | file://GPL-2;md5=b234ee4d69f5fce4486a80fdaf4a4263 \ | ||
93 | file://LICENSE.hfi1_firmware;md5=5e7b6e586ce7339d12689e49931ad444 \ | ||
94 | file://LICENCE.i2400m;md5=14b901969e23c41881327c0d9e4b7d36 \ | ||
95 | file://LICENSE.i915;md5=2b0b2e0d20984affd4490ba2cba02570 \ | ||
96 | file://LICENCE.ibt_firmware;md5=fdbee1ddfe0fb7ab0b2fcd6b454a366b \ | ||
97 | file://LICENSE.ice;md5=742ab4850f2670792940e6d15c974b2f \ | ||
98 | file://LICENCE.IntcSST2;md5=9e7d8bea77612d7cc7d9e9b54b623062 \ | ||
99 | file://LICENCE.it913x;md5=1fbf727bfb6a949810c4dbfa7e6ce4f8 \ | ||
100 | file://LICENCE.iwlwifi_firmware;md5=2ce6786e0fc11ac6e36b54bb9b799f1b \ | ||
101 | file://LICENCE.kaweth;md5=b1d876e562f4b3b8d391ad8395dfe03f \ | ||
102 | file://LICENSE.Lontium;md5=4ec8dc582ff7295f39e2ca6a7b0be2b6 \ | ||
103 | file://LICENCE.Marvell;md5=28b6ed8bd04ba105af6e4dcd6e997772 \ | ||
104 | file://LICENCE.mediatek;md5=7c1976b63217d76ce47d0a11d8a79cf2 \ | ||
105 | file://LICENCE.moxa;md5=1086614767d8ccf744a923289d3d4261 \ | ||
106 | file://LICENCE.myri10ge_firmware;md5=42e32fb89f6b959ca222e25ac8df8fed \ | ||
107 | file://LICENCE.Netronome;md5=4add08f2577086d44447996503cddf5f \ | ||
108 | file://LICENCE.nvidia;md5=4428a922ed3ba2ceec95f076a488ce07 \ | ||
109 | file://LICENCE.NXP;md5=58bb8ba632cd729b9ba6183bc6aed36f \ | ||
110 | file://LICENCE.OLPC;md5=5b917f9d8c061991be4f6f5f108719cd \ | ||
111 | file://LICENCE.open-ath9k-htc-firmware;md5=1b33c9f4d17bc4d457bdb23727046837 \ | ||
112 | file://LICENCE.phanfw;md5=954dcec0e051f9409812b561ea743bfa \ | ||
113 | file://LICENCE.qat_firmware;md5=9e7d8bea77612d7cc7d9e9b54b623062 \ | ||
114 | file://LICENSE.qcom;md5=164e3362a538eb11d3ac51e8e134294b \ | ||
115 | file://LICENCE.qla1280;md5=d6895732e622d950609093223a2c4f5d \ | ||
116 | file://LICENCE.qla2xxx;md5=505855e921b75f1be4a437ad9b79dff0 \ | ||
117 | file://LICENSE.QualcommAtheros_ar3k;md5=b5fe244fb2b532311de1472a3bc06da5 \ | ||
118 | file://LICENSE.QualcommAtheros_ath10k;md5=cb42b686ee5f5cb890275e4321db60a8 \ | ||
119 | file://LICENCE.r8a779x_usb3;md5=4c1671656153025d7076105a5da7e498 \ | ||
120 | file://LICENSE.radeon;md5=68ec28bacb3613200bca44f404c69b16 \ | ||
121 | file://LICENCE.ralink_a_mediatek_company_firmware;md5=728f1a85fd53fd67fa8d7afb080bc435 \ | ||
122 | file://LICENCE.ralink-firmware.txt;md5=ab2c269277c45476fb449673911a2dfd \ | ||
123 | file://LICENCE.rtlwifi_firmware.txt;md5=00d06cfd3eddd5a2698948ead2ad54a5 \ | ||
124 | file://LICENSE.sdma_firmware;md5=51e8c19ecc2270f4b8ea30341ad63ce9 \ | ||
125 | file://LICENCE.siano;md5=4556c1bf830067f12ca151ad953ec2a5 \ | ||
126 | file://LICENCE.tda7706-firmware.txt;md5=835997cf5e3c131d0dddd695c7d9103e \ | ||
127 | file://LICENCE.ti-connectivity;md5=c5e02be633f1499c109d1652514d85ec \ | ||
128 | file://LICENCE.ti-keystone;md5=3a86335d32864b0bef996bee26cc0f2c \ | ||
129 | file://LICENCE.ueagle-atm4-firmware;md5=4ed7ea6b507ccc583b9d594417714118 \ | ||
130 | file://LICENCE.via_vt6656;md5=e4159694cba42d4377a912e78a6e850f \ | ||
131 | file://LICENCE.wl1251;md5=ad3f81922bb9e197014bb187289d3b5b \ | ||
132 | file://LICENCE.xc4000;md5=0ff51d2dc49fce04814c9155081092f0 \ | ||
133 | file://LICENCE.xc5000;md5=1e170c13175323c32c7f4d0998d53f66 \ | ||
134 | file://LICENCE.xc5000c;md5=12b02efa3049db65d524aeb418dd87ca \ | ||
135 | file://WHENCE;md5=d627873bd934d7c52b2c8191304a8eb7 \ | ||
136 | " | ||
137 | |||
138 | # These are not common licenses, set NO_GENERIC_LICENSE for them | ||
139 | # so that the license files will be copied from fetched source | ||
140 | NO_GENERIC_LICENSE[Firmware-Abilis] = "LICENCE.Abilis" | ||
141 | NO_GENERIC_LICENSE[Firmware-adsp_sst] = "LICENCE.adsp_sst" | ||
142 | NO_GENERIC_LICENSE[Firmware-agere] = "LICENCE.agere" | ||
143 | NO_GENERIC_LICENSE[Firmware-amdgpu] = "LICENSE.amdgpu" | ||
144 | NO_GENERIC_LICENSE[Firmware-amd-ucode] = "LICENSE.amd-ucode" | ||
145 | NO_GENERIC_LICENSE[Firmware-amlogic_vdec] = "LICENSE.amlogic_vdec" | ||
146 | NO_GENERIC_LICENSE[Firmware-atheros_firmware] = "LICENCE.atheros_firmware" | ||
147 | NO_GENERIC_LICENSE[Firmware-atmel] = "LICENSE.atmel" | ||
148 | NO_GENERIC_LICENSE[Firmware-broadcom_bcm43xx] = "LICENCE.broadcom_bcm43xx" | ||
149 | NO_GENERIC_LICENSE[Firmware-ca0132] = "LICENCE.ca0132" | ||
150 | NO_GENERIC_LICENSE[Firmware-cadence] = "LICENCE.cadence" | ||
151 | NO_GENERIC_LICENSE[Firmware-cavium] = "LICENCE.cavium" | ||
152 | NO_GENERIC_LICENSE[Firmware-chelsio_firmware] = "LICENCE.chelsio_firmware" | ||
153 | NO_GENERIC_LICENSE[Firmware-cw1200] = "LICENCE.cw1200" | ||
154 | NO_GENERIC_LICENSE[Firmware-cypress] = "LICENCE.cypress" | ||
155 | NO_GENERIC_LICENSE[Firmware-dib0700] = "LICENSE.dib0700" | ||
156 | NO_GENERIC_LICENSE[Firmware-e100] = "LICENCE.e100" | ||
157 | NO_GENERIC_LICENSE[Firmware-ene_firmware] = "LICENCE.ene_firmware" | ||
158 | NO_GENERIC_LICENSE[Firmware-fw_sst_0f28] = "LICENCE.fw_sst_0f28" | ||
159 | NO_GENERIC_LICENSE[Firmware-go7007] = "LICENCE.go7007" | ||
160 | NO_GENERIC_LICENSE[Firmware-GPLv2] = "GPL-2" | ||
161 | NO_GENERIC_LICENSE[Firmware-hfi1_firmware] = "LICENSE.hfi1_firmware" | ||
162 | NO_GENERIC_LICENSE[Firmware-i2400m] = "LICENCE.i2400m" | ||
163 | NO_GENERIC_LICENSE[Firmware-i915] = "LICENSE.i915" | ||
164 | NO_GENERIC_LICENSE[Firmware-ibt_firmware] = "LICENCE.ibt_firmware" | ||
165 | NO_GENERIC_LICENSE[Firmware-ice] = "LICENSE.ice" | ||
166 | NO_GENERIC_LICENSE[Firmware-IntcSST2] = "LICENCE.IntcSST2" | ||
167 | NO_GENERIC_LICENSE[Firmware-it913x] = "LICENCE.it913x" | ||
168 | NO_GENERIC_LICENSE[Firmware-iwlwifi_firmware] = "LICENCE.iwlwifi_firmware" | ||
169 | NO_GENERIC_LICENSE[Firmware-kaweth] = "LICENCE.kaweth" | ||
170 | NO_GENERIC_LICENSE[Firmware-Lontium] = "LICENSE.Lontium" | ||
171 | NO_GENERIC_LICENSE[Firmware-Marvell] = "LICENCE.Marvell" | ||
172 | NO_GENERIC_LICENSE[Firmware-mediatek] = "LICENCE.mediatek" | ||
173 | NO_GENERIC_LICENSE[Firmware-moxa] = "LICENCE.moxa" | ||
174 | NO_GENERIC_LICENSE[Firmware-myri10ge_firmware] = "LICENCE.myri10ge_firmware" | ||
175 | NO_GENERIC_LICENSE[Firmware-netronome] = "LICENCE.Netronome" | ||
176 | NO_GENERIC_LICENSE[Firmware-nvidia] = "LICENCE.nvidia" | ||
177 | NO_GENERIC_LICENSE[Firmware-OLPC] = "LICENCE.OLPC" | ||
178 | NO_GENERIC_LICENSE[Firmware-ath9k-htc] = "LICENCE.open-ath9k-htc-firmware" | ||
179 | NO_GENERIC_LICENSE[Firmware-phanfw] = "LICENCE.phanfw" | ||
180 | NO_GENERIC_LICENSE[Firmware-qat] = "LICENCE.qat_firmware" | ||
181 | NO_GENERIC_LICENSE[Firmware-qcom] = "LICENSE.qcom" | ||
182 | NO_GENERIC_LICENSE[Firmware-qla1280] = "LICENCE.qla1280" | ||
183 | NO_GENERIC_LICENSE[Firmware-qla2xxx] = "LICENCE.qla2xxx" | ||
184 | NO_GENERIC_LICENSE[Firmware-qualcommAthos_ar3k] = "LICENSE.QualcommAtheros_ar3k" | ||
185 | NO_GENERIC_LICENSE[Firmware-qualcommAthos_ath10k] = "LICENSE.QualcommAtheros_ath10k" | ||
186 | NO_GENERIC_LICENSE[Firmware-r8a779x_usb3] = "LICENCE.r8a779x_usb3" | ||
187 | NO_GENERIC_LICENSE[Firmware-radeon] = "LICENSE.radeon" | ||
188 | NO_GENERIC_LICENSE[Firmware-ralink_a_mediatek_company_firmware] = "LICENCE.ralink_a_mediatek_company_firmware" | ||
189 | NO_GENERIC_LICENSE[Firmware-ralink-firmware] = "LICENCE.ralink-firmware.txt" | ||
190 | NO_GENERIC_LICENSE[Firmware-rtlwifi_firmware] = "LICENCE.rtlwifi_firmware.txt" | ||
191 | NO_GENERIC_LICENSE[Firmware-siano] = "LICENCE.siano" | ||
192 | NO_GENERIC_LICENSE[Firmware-imx-sdma_firmware] = "LICENSE.sdma_firmware" | ||
193 | NO_GENERIC_LICENSE[Firmware-tda7706-firmware] = "LICENCE.tda7706-firmware.txt" | ||
194 | NO_GENERIC_LICENSE[Firmware-ti-connectivity] = "LICENCE.ti-connectivity" | ||
195 | NO_GENERIC_LICENSE[Firmware-ti-keystone] = "LICENCE.ti-keystone" | ||
196 | NO_GENERIC_LICENSE[Firmware-ueagle-atm4-firmware] = "LICENCE.ueagle-atm4-firmware" | ||
197 | NO_GENERIC_LICENSE[Firmware-via_vt6656] = "LICENCE.via_vt6656" | ||
198 | NO_GENERIC_LICENSE[Firmware-wl1251] = "LICENCE.wl1251" | ||
199 | NO_GENERIC_LICENSE[Firmware-xc4000] = "LICENCE.xc4000" | ||
200 | NO_GENERIC_LICENSE[Firmware-xc5000] = "LICENCE.xc5000" | ||
201 | NO_GENERIC_LICENSE[Firmware-xc5000c] = "LICENCE.xc5000c" | ||
202 | NO_GENERIC_LICENSE[WHENCE] = "WHENCE" | ||
203 | |||
204 | PE = "1" | ||
205 | |||
206 | SRC_URI = "${KERNELORG_MIRROR}/linux/kernel/firmware/${BPN}-${PV}.tar.xz" | ||
207 | |||
208 | SRC_URI[sha256sum] = "bc2657dd8eb82386a9a7ec6df9ccf31c32c7e9073c05d37786c1edc273f9440a" | ||
209 | |||
210 | inherit allarch | ||
211 | |||
212 | CLEANBROKEN = "1" | ||
213 | |||
214 | do_compile() { | ||
215 | : | ||
216 | } | ||
217 | |||
218 | do_install() { | ||
219 | oe_runmake 'DESTDIR=${D}' 'FIRMWAREDIR=${nonarch_base_libdir}/firmware' install | ||
220 | cp GPL-2 LICEN[CS]E.* WHENCE ${D}${nonarch_base_libdir}/firmware/ | ||
221 | } | ||
222 | |||
223 | |||
224 | PACKAGES =+ "${PN}-ralink-license ${PN}-ralink \ | ||
225 | ${PN}-mt7601u-license ${PN}-mt7601u \ | ||
226 | ${PN}-radeon-license ${PN}-radeon \ | ||
227 | ${PN}-marvell-license ${PN}-pcie8897 ${PN}-pcie8997 \ | ||
228 | ${PN}-sd8686 ${PN}-sd8688 ${PN}-sd8787 ${PN}-sd8797 ${PN}-sd8801 \ | ||
229 | ${PN}-sd8887 ${PN}-sd8897 ${PN}-sd8997 ${PN}-usb8997 \ | ||
230 | ${PN}-ti-connectivity-license ${PN}-wlcommon ${PN}-wl12xx ${PN}-wl18xx \ | ||
231 | ${PN}-vt6656-license ${PN}-vt6656 \ | ||
232 | ${PN}-rs9113 ${PN}-rs9116 \ | ||
233 | ${PN}-rtl-license ${PN}-rtl8188 ${PN}-rtl8192cu ${PN}-rtl8192ce ${PN}-rtl8192su ${PN}-rtl8723 ${PN}-rtl8821 \ | ||
234 | ${PN}-rtl8168 \ | ||
235 | ${PN}-cypress-license \ | ||
236 | ${PN}-broadcom-license \ | ||
237 | ${PN}-bcm-0bb4-0306 \ | ||
238 | ${PN}-bcm43143 \ | ||
239 | ${PN}-bcm43236b \ | ||
240 | ${PN}-bcm43241b0 \ | ||
241 | ${PN}-bcm43241b4 \ | ||
242 | ${PN}-bcm43241b5 \ | ||
243 | ${PN}-bcm43242a \ | ||
244 | ${PN}-bcm4329 \ | ||
245 | ${PN}-bcm4329-fullmac \ | ||
246 | ${PN}-bcm4330 \ | ||
247 | ${PN}-bcm4334 \ | ||
248 | ${PN}-bcm43340 \ | ||
249 | ${PN}-bcm4335 \ | ||
250 | ${PN}-bcm43362 \ | ||
251 | ${PN}-bcm4339 \ | ||
252 | ${PN}-bcm43430 \ | ||
253 | ${PN}-bcm43430a0 \ | ||
254 | ${PN}-bcm43455 \ | ||
255 | ${PN}-bcm4350 \ | ||
256 | ${PN}-bcm4350c2 \ | ||
257 | ${PN}-bcm4354 \ | ||
258 | ${PN}-bcm4356 \ | ||
259 | ${PN}-bcm4356-pcie \ | ||
260 | ${PN}-bcm43569 \ | ||
261 | ${PN}-bcm43570 \ | ||
262 | ${PN}-bcm4358 \ | ||
263 | ${PN}-bcm43602 \ | ||
264 | ${PN}-bcm4366b \ | ||
265 | ${PN}-bcm4366c \ | ||
266 | ${PN}-bcm4371 \ | ||
267 | ${PN}-bcm4373 \ | ||
268 | ${PN}-bcm43xx \ | ||
269 | ${PN}-bcm43xx-hdr \ | ||
270 | ${PN}-atheros-license ${PN}-ar9170 ${PN}-ath6k ${PN}-ath9k \ | ||
271 | ${PN}-gplv2-license ${PN}-carl9170 \ | ||
272 | ${PN}-ar3k-license ${PN}-ar3k ${PN}-ath10k-license ${PN}-ath10k ${PN}-ath11k ${PN}-qca \ | ||
273 | \ | ||
274 | ${PN}-imx-sdma-license ${PN}-imx-sdma-imx6q ${PN}-imx-sdma-imx7d \ | ||
275 | \ | ||
276 | ${PN}-iwlwifi-license ${PN}-iwlwifi \ | ||
277 | ${PN}-iwlwifi-135-6 \ | ||
278 | ${PN}-iwlwifi-3160-7 ${PN}-iwlwifi-3160-8 ${PN}-iwlwifi-3160-9 \ | ||
279 | ${PN}-iwlwifi-3160-10 ${PN}-iwlwifi-3160-12 ${PN}-iwlwifi-3160-13 \ | ||
280 | ${PN}-iwlwifi-3160-16 ${PN}-iwlwifi-3160-17 \ | ||
281 | ${PN}-iwlwifi-6000-4 ${PN}-iwlwifi-6000g2a-5 ${PN}-iwlwifi-6000g2a-6 \ | ||
282 | ${PN}-iwlwifi-6000g2b-5 ${PN}-iwlwifi-6000g2b-6 \ | ||
283 | ${PN}-iwlwifi-6050-4 ${PN}-iwlwifi-6050-5 \ | ||
284 | ${PN}-iwlwifi-7260 \ | ||
285 | ${PN}-iwlwifi-7265 \ | ||
286 | ${PN}-iwlwifi-7265d ${PN}-iwlwifi-8000c ${PN}-iwlwifi-8265 \ | ||
287 | ${PN}-iwlwifi-9000 \ | ||
288 | ${PN}-iwlwifi-misc \ | ||
289 | ${PN}-ibt-license ${PN}-ibt \ | ||
290 | ${PN}-ibt-11-5 ${PN}-ibt-12-16 ${PN}-ibt-hw-37-7 ${PN}-ibt-hw-37-8 \ | ||
291 | ${PN}-ibt-17 \ | ||
292 | ${PN}-ibt-20 \ | ||
293 | ${PN}-ibt-misc \ | ||
294 | ${PN}-i915-license ${PN}-i915 \ | ||
295 | ${PN}-ice-license ${PN}-ice \ | ||
296 | ${PN}-adsp-sst-license ${PN}-adsp-sst \ | ||
297 | ${PN}-bnx2-mips \ | ||
298 | ${PN}-liquidio \ | ||
299 | ${PN}-nvidia-license \ | ||
300 | ${PN}-nvidia-tegra-k1 ${PN}-nvidia-tegra \ | ||
301 | ${PN}-nvidia-gpu \ | ||
302 | ${PN}-netronome-license ${PN}-netronome \ | ||
303 | ${PN}-qat ${PN}-qat-license \ | ||
304 | ${PN}-qcom-license \ | ||
305 | ${PN}-qcom-venus-1.8 ${PN}-qcom-venus-4.2 ${PN}-qcom-venus-5.2 ${PN}-qcom-venus-5.4 \ | ||
306 | ${PN}-qcom-vpu-1.0 ${PN}-qcom-vpu-2.0 \ | ||
307 | ${PN}-qcom-adreno-a3xx ${PN}-qcom-adreno-a530 \ | ||
308 | ${PN}-qcom-adreno-a630 ${PN}-qcom-adreno-a650 ${PN}-qcom-adreno-a660 \ | ||
309 | ${PN}-qcom-sdm845-audio ${PN}-qcom-sdm845-compute ${PN}-qcom-sdm845-modem \ | ||
310 | ${PN}-qcom-sm8250-audio ${PN}-qcom-sm8250-compute \ | ||
311 | ${PN}-amlogic-vdec-license ${PN}-amlogic-vdec \ | ||
312 | ${PN}-lt9611uxc ${PN}-lontium-license \ | ||
313 | ${PN}-whence-license \ | ||
314 | ${PN}-license \ | ||
315 | " | ||
316 | |||
317 | # For atheros | ||
318 | LICENSE:${PN}-ar9170 = "Firmware-atheros_firmware" | ||
319 | LICENSE:${PN}-ath6k = "Firmware-atheros_firmware" | ||
320 | LICENSE:${PN}-ath9k = "Firmware-atheros_firmware" | ||
321 | LICENSE:${PN}-atheros-license = "Firmware-atheros_firmware" | ||
322 | |||
323 | FILES:${PN}-atheros-license = "${nonarch_base_libdir}/firmware/LICENCE.atheros_firmware" | ||
324 | FILES:${PN}-ar9170 = " \ | ||
325 | ${nonarch_base_libdir}/firmware/ar9170*.fw \ | ||
326 | " | ||
327 | FILES:${PN}-ath6k = " \ | ||
328 | ${nonarch_base_libdir}/firmware/ath6k \ | ||
329 | " | ||
330 | FILES:${PN}-ath9k = " \ | ||
331 | ${nonarch_base_libdir}/firmware/ar9271.fw \ | ||
332 | ${nonarch_base_libdir}/firmware/ar7010*.fw \ | ||
333 | ${nonarch_base_libdir}/firmware/htc_9271.fw \ | ||
334 | ${nonarch_base_libdir}/firmware/htc_7010.fw \ | ||
335 | ${nonarch_base_libdir}/firmware/ath9k_htc/htc_7010-1.4.0.fw \ | ||
336 | ${nonarch_base_libdir}/firmware/ath9k_htc/htc_9271-1.4.0.fw \ | ||
337 | " | ||
338 | |||
339 | RDEPENDS:${PN}-ar9170 += "${PN}-atheros-license" | ||
340 | RDEPENDS:${PN}-ath6k += "${PN}-atheros-license" | ||
341 | RDEPENDS:${PN}-ath9k += "${PN}-atheros-license" | ||
342 | |||
343 | # For carl9170 | ||
344 | LICENSE:${PN}-carl9170 = "Firmware-GPLv2" | ||
345 | LICENSE:${PN}-gplv2-license = "Firmware-GPLv2" | ||
346 | |||
347 | FILES:${PN}-gplv2-license = "${nonarch_base_libdir}/firmware/GPL-2" | ||
348 | FILES:${PN}-carl9170 = " \ | ||
349 | ${nonarch_base_libdir}/firmware/carl9170*.fw \ | ||
350 | " | ||
351 | |||
352 | RDEPENDS:${PN}-carl9170 += "${PN}-gplv2-license" | ||
353 | |||
354 | # For QualCommAthos | ||
355 | LICENSE:${PN}-ar3k = "Firmware-qualcommAthos_ar3k" | ||
356 | LICENSE:${PN}-ar3k-license = "Firmware-qualcommAthos_ar3k" | ||
357 | LICENSE:${PN}-ath10k = "Firmware-qualcommAthos_ath10k" | ||
358 | LICENSE:${PN}-ath10k-license = "Firmware-qualcommAthos_ath10k" | ||
359 | LICENSE:${PN}-qca = "Firmware-qualcommAthos_ath10k" | ||
360 | |||
361 | FILES:${PN}-ar3k-license = "${nonarch_base_libdir}/firmware/LICENSE.QualcommAtheros_ar3k" | ||
362 | FILES:${PN}-ar3k = " \ | ||
363 | ${nonarch_base_libdir}/firmware/ar3k \ | ||
364 | " | ||
365 | |||
366 | FILES:${PN}-ath10k-license = "${nonarch_base_libdir}/firmware/LICENSE.QualcommAtheros_ath10k" | ||
367 | FILES:${PN}-ath10k = " \ | ||
368 | ${nonarch_base_libdir}/firmware/ath10k \ | ||
369 | " | ||
370 | |||
371 | FILES:${PN}-ath11k = " \ | ||
372 | ${nonarch_base_libdir}/firmware/ath11k \ | ||
373 | " | ||
374 | |||
375 | FILES:${PN}-qca = " \ | ||
376 | ${nonarch_base_libdir}/firmware/qca \ | ||
377 | " | ||
378 | |||
379 | RDEPENDS:${PN}-ar3k += "${PN}-ar3k-license" | ||
380 | RDEPENDS:${PN}-ath10k += "${PN}-ath10k-license" | ||
381 | RDEPENDS:${PN}-ath11k += "${PN}-ath10k-license" | ||
382 | RDEPENDS:${PN}-qca += "${PN}-ath10k-license" | ||
383 | |||
384 | # For ralink | ||
385 | LICENSE:${PN}-ralink = "Firmware-ralink-firmware" | ||
386 | LICENSE:${PN}-ralink-license = "Firmware-ralink-firmware" | ||
387 | |||
388 | FILES:${PN}-ralink-license = "${nonarch_base_libdir}/firmware/LICENCE.ralink-firmware.txt" | ||
389 | FILES:${PN}-ralink = " \ | ||
390 | ${nonarch_base_libdir}/firmware/rt*.bin \ | ||
391 | " | ||
392 | |||
393 | RDEPENDS:${PN}-ralink += "${PN}-ralink-license" | ||
394 | |||
395 | # For mediatek MT7601U | ||
396 | LICENSE:${PN}-mt7601u = "Firmware-ralink_a_mediatek_company_firmware" | ||
397 | LICENSE:${PN}-mt7601u-license = "Firmware-ralink_a_mediatek_company_firmware" | ||
398 | |||
399 | FILES:${PN}-mt7601u-license = "${nonarch_base_libdir}/firmware/LICENCE.ralink_a_mediatek_company_firmware" | ||
400 | FILES:${PN}-mt7601u = " \ | ||
401 | ${nonarch_base_libdir}/firmware/mt7601u.bin \ | ||
402 | " | ||
403 | |||
404 | RDEPENDS:${PN}-mt7601u += "${PN}-mt7601u-license" | ||
405 | |||
406 | # For radeon | ||
407 | LICENSE:${PN}-radeon = "Firmware-radeon" | ||
408 | LICENSE:${PN}-radeon-license = "Firmware-radeon" | ||
409 | |||
410 | FILES:${PN}-radeon-license = "${nonarch_base_libdir}/firmware/LICENSE.radeon" | ||
411 | FILES:${PN}-radeon = " \ | ||
412 | ${nonarch_base_libdir}/firmware/radeon \ | ||
413 | " | ||
414 | |||
415 | RDEPENDS:${PN}-radeon += "${PN}-radeon-license" | ||
416 | |||
417 | # For lontium | ||
418 | LICENSE:${PN}-lt9611uxc = "Firmware-Lontium" | ||
419 | |||
420 | FILES:${PN}-lontium-license = "${nonarch_base_libdir}/firmware/LICENSE.Lontium" | ||
421 | FILES:${PN}-lt9611uxc = "${nonarch_base_libdir}/firmware/lt9611uxc_fw.bin" | ||
422 | |||
423 | # For marvell | ||
424 | LICENSE:${PN}-pcie8897 = "Firmware-Marvell" | ||
425 | LICENSE:${PN}-pcie8997 = "Firmware-Marvell" | ||
426 | LICENSE:${PN}-sd8686 = "Firmware-Marvell" | ||
427 | LICENSE:${PN}-sd8688 = "Firmware-Marvell" | ||
428 | LICENSE:${PN}-sd8787 = "Firmware-Marvell" | ||
429 | LICENSE:${PN}-sd8797 = "Firmware-Marvell" | ||
430 | LICENSE:${PN}-sd8801 = "Firmware-Marvell" | ||
431 | LICENSE:${PN}-sd8887 = "Firmware-Marvell" | ||
432 | LICENSE:${PN}-sd8897 = "Firmware-Marvell" | ||
433 | LICENSE:${PN}-sd8997 = "Firmware-Marvell" | ||
434 | LICENSE:${PN}-usb8997 = "Firmware-Marvell" | ||
435 | LICENSE:${PN}-marvell-license = "Firmware-Marvell" | ||
436 | |||
437 | FILES:${PN}-marvell-license = "${nonarch_base_libdir}/firmware/LICENCE.Marvell" | ||
438 | FILES:${PN}-pcie8897 = " \ | ||
439 | ${nonarch_base_libdir}/firmware/mrvl/pcie8897_uapsta.bin \ | ||
440 | " | ||
441 | FILES:${PN}-pcie8997 = " \ | ||
442 | ${nonarch_base_libdir}/firmware/mrvl/pcie8997_wlan_v4.bin \ | ||
443 | ${nonarch_base_libdir}/firmware/mrvl/pcieuart8997_combo_v4.bin \ | ||
444 | ${nonarch_base_libdir}/firmware/mrvl/pcieusb8997_combo_v4.bin \ | ||
445 | " | ||
446 | FILES:${PN}-sd8686 = " \ | ||
447 | ${nonarch_base_libdir}/firmware/libertas/sd8686_v9* \ | ||
448 | ${nonarch_base_libdir}/firmware/sd8686* \ | ||
449 | " | ||
450 | FILES:${PN}-sd8688 = " \ | ||
451 | ${nonarch_base_libdir}/firmware/libertas/sd8688* \ | ||
452 | ${nonarch_base_libdir}/firmware/mrvl/sd8688* \ | ||
453 | " | ||
454 | FILES:${PN}-sd8787 = " \ | ||
455 | ${nonarch_base_libdir}/firmware/mrvl/sd8787_uapsta.bin \ | ||
456 | " | ||
457 | FILES:${PN}-sd8797 = " \ | ||
458 | ${nonarch_base_libdir}/firmware/mrvl/sd8797_uapsta.bin \ | ||
459 | " | ||
460 | FILES:${PN}-sd8801 = " \ | ||
461 | ${nonarch_base_libdir}/firmware/mrvl/sd8801_uapsta.bin \ | ||
462 | " | ||
463 | FILES:${PN}-sd8887 = " \ | ||
464 | ${nonarch_base_libdir}/firmware/mrvl/sd8887_uapsta.bin \ | ||
465 | " | ||
466 | FILES:${PN}-sd8897 = " \ | ||
467 | ${nonarch_base_libdir}/firmware/mrvl/sd8897_uapsta.bin \ | ||
468 | " | ||
469 | do_install:append() { | ||
470 | # The kernel 5.6.x driver still uses the old name, provide a symlink for | ||
471 | # older kernels | ||
472 | ln -fs sdsd8997_combo_v4.bin ${D}${nonarch_base_libdir}/firmware/mrvl/sd8997_uapsta.bin | ||
473 | } | ||
474 | FILES:${PN}-sd8997 = " \ | ||
475 | ${nonarch_base_libdir}/firmware/mrvl/sd8997_uapsta.bin \ | ||
476 | ${nonarch_base_libdir}/firmware/mrvl/sdsd8997_combo_v4.bin \ | ||
477 | " | ||
478 | FILES:${PN}-usb8997 = " \ | ||
479 | ${nonarch_base_libdir}/firmware/mrvl/usbusb8997_combo_v4.bin \ | ||
480 | " | ||
481 | |||
482 | RDEPENDS:${PN}-sd8686 += "${PN}-marvell-license" | ||
483 | RDEPENDS:${PN}-sd8688 += "${PN}-marvell-license" | ||
484 | RDEPENDS:${PN}-sd8787 += "${PN}-marvell-license" | ||
485 | RDEPENDS:${PN}-sd8797 += "${PN}-marvell-license" | ||
486 | RDEPENDS:${PN}-sd8801 += "${PN}-marvell-license" | ||
487 | RDEPENDS:${PN}-sd8887 += "${PN}-marvell-license" | ||
488 | RDEPENDS:${PN}-sd8897 += "${PN}-marvell-license" | ||
489 | RDEPENDS:${PN}-sd8997 += "${PN}-marvell-license" | ||
490 | RDEPENDS:${PN}-usb8997 += "${PN}-marvell-license" | ||
491 | |||
492 | # For netronome | ||
493 | LICENSE:${PN}-netronome = "Firmware-netronome" | ||
494 | |||
495 | FILES:${PN}-netronome-license = " \ | ||
496 | ${nonarch_base_libdir}/firmware/LICENCE.Netronome \ | ||
497 | " | ||
498 | FILES:${PN}-netronome = " \ | ||
499 | ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0081*.nffw \ | ||
500 | ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0096*.nffw \ | ||
501 | ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0097*.nffw \ | ||
502 | ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0099*.nffw \ | ||
503 | ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0058-0011_2x40.nffw \ | ||
504 | ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0058-0012_2x40.nffw \ | ||
505 | ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0078-0011_1x100.nffw \ | ||
506 | ${nonarch_base_libdir}/firmware/netronome/bpf \ | ||
507 | ${nonarch_base_libdir}/firmware/netronome/flower \ | ||
508 | ${nonarch_base_libdir}/firmware/netronome/nic \ | ||
509 | ${nonarch_base_libdir}/firmware/netronome/nic-sriov \ | ||
510 | " | ||
511 | |||
512 | RDEPENDS:${PN}-netronome += "${PN}-netronome-license" | ||
513 | |||
514 | # For Nvidia | ||
515 | LICENSE:${PN}-nvidia-gpu = "Firmware-nvidia" | ||
516 | LICENSE:${PN}-nvidia-tegra = "Firmware-nvidia" | ||
517 | LICENSE:${PN}-nvidia-tegra-k1 = "Firmware-nvidia" | ||
518 | LICENSE:${PN}-nvidia-license = "Firmware-nvidia" | ||
519 | |||
520 | FILES:${PN}-nvidia-gpu = "${nonarch_base_libdir}/firmware/nvidia" | ||
521 | FILES:${PN}-nvidia-tegra = " \ | ||
522 | ${nonarch_base_libdir}/firmware/nvidia/tegra* \ | ||
523 | ${nonarch_base_libdir}/firmware/nvidia/gm20b \ | ||
524 | ${nonarch_base_libdir}/firmware/nvidia/gp10b \ | ||
525 | " | ||
526 | FILES:${PN}-nvidia-tegra-k1 = " \ | ||
527 | ${nonarch_base_libdir}/firmware/nvidia/tegra124 \ | ||
528 | ${nonarch_base_libdir}/firmware/nvidia/gk20a \ | ||
529 | " | ||
530 | FILES:${PN}-nvidia-license = "${nonarch_base_libdir}/firmware/LICENCE.nvidia" | ||
531 | |||
532 | RDEPENDS:${PN}-nvidia-gpu += "${PN}-nvidia-license" | ||
533 | RDEPENDS:${PN}-nvidia-tegra += "${PN}-nvidia-license" | ||
534 | RDEPENDS:${PN}-nvidia-tegra-k1 += "${PN}-nvidia-license" | ||
535 | |||
536 | # For RSI RS911x WiFi | ||
537 | LICENSE:${PN}-rs9113 = "WHENCE" | ||
538 | LICENSE:${PN}-rs9116 = "WHENCE" | ||
539 | |||
540 | FILES:${PN}-rs9113 = " ${nonarch_base_libdir}/firmware/rsi/rs9113*.rps " | ||
541 | FILES:${PN}-rs9116 = " ${nonarch_base_libdir}/firmware/rsi/rs9116*.rps " | ||
542 | |||
543 | RDEPENDS:${PN}-rs9113 += "${PN}-whence-license" | ||
544 | RDEPENDS:${PN}-rs9116 += "${PN}-whence-license" | ||
545 | |||
546 | # For rtl | ||
547 | LICENSE:${PN}-rtl8188 = "Firmware-rtlwifi_firmware" | ||
548 | LICENSE:${PN}-rtl8192cu = "Firmware-rtlwifi_firmware" | ||
549 | LICENSE:${PN}-rtl8192ce = "Firmware-rtlwifi_firmware" | ||
550 | LICENSE:${PN}-rtl8192su = "Firmware-rtlwifi_firmware" | ||
551 | LICENSE:${PN}-rtl8723 = "Firmware-rtlwifi_firmware" | ||
552 | LICENSE:${PN}-rtl8821 = "Firmware-rtlwifi_firmware" | ||
553 | LICENSE:${PN}-rtl-license = "Firmware-rtlwifi_firmware" | ||
554 | LICENSE:${PN}-rtl8168 = "WHENCE" | ||
555 | |||
556 | FILES:${PN}-rtl-license = " \ | ||
557 | ${nonarch_base_libdir}/firmware/LICENCE.rtlwifi_firmware.txt \ | ||
558 | " | ||
559 | FILES:${PN}-rtl8188 = " \ | ||
560 | ${nonarch_base_libdir}/firmware/rtlwifi/rtl8188*.bin \ | ||
561 | " | ||
562 | FILES:${PN}-rtl8192cu = " \ | ||
563 | ${nonarch_base_libdir}/firmware/rtlwifi/rtl8192cufw*.bin \ | ||
564 | " | ||
565 | FILES:${PN}-rtl8192ce = " \ | ||
566 | ${nonarch_base_libdir}/firmware/rtlwifi/rtl8192cfw*.bin \ | ||
567 | " | ||
568 | FILES:${PN}-rtl8192su = " \ | ||
569 | ${nonarch_base_libdir}/firmware/rtlwifi/rtl8712u.bin \ | ||
570 | " | ||
571 | FILES:${PN}-rtl8723 = " \ | ||
572 | ${nonarch_base_libdir}/firmware/rtlwifi/rtl8723*.bin \ | ||
573 | " | ||
574 | FILES:${PN}-rtl8821 = " \ | ||
575 | ${nonarch_base_libdir}/firmware/rtlwifi/rtl8821*.bin \ | ||
576 | " | ||
577 | FILES:${PN}-rtl8168 = " \ | ||
578 | ${nonarch_base_libdir}/firmware/rtl_nic/rtl8168*.fw \ | ||
579 | " | ||
580 | |||
581 | RDEPENDS:${PN}-rtl8188 += "${PN}-rtl-license" | ||
582 | RDEPENDS:${PN}-rtl8192ce += "${PN}-rtl-license" | ||
583 | RDEPENDS:${PN}-rtl8192cu += "${PN}-rtl-license" | ||
584 | RDEPENDS:${PN}-rtl8192su = "${PN}-rtl-license" | ||
585 | RDEPENDS:${PN}-rtl8723 += "${PN}-rtl-license" | ||
586 | RDEPENDS:${PN}-rtl8821 += "${PN}-rtl-license" | ||
587 | RDEPENDS:${PN}-rtl8168 += "${PN}-whence-license" | ||
588 | |||
589 | # For ti-connectivity | ||
590 | LICENSE:${PN}-wlcommon = "Firmware-ti-connectivity" | ||
591 | LICENSE:${PN}-wl12xx = "Firmware-ti-connectivity" | ||
592 | LICENSE:${PN}-wl18xx = "Firmware-ti-connectivity" | ||
593 | LICENSE:${PN}-ti-connectivity-license = "Firmware-ti-connectivity" | ||
594 | |||
595 | FILES:${PN}-ti-connectivity-license = "${nonarch_base_libdir}/firmware/LICENCE.ti-connectivity" | ||
596 | # wl18xx optionally needs wl1271-nvs.bin (which itself is a symlink to | ||
597 | # wl127x-nvs.bin) - see linux/drivers/net/wireless/ti/wlcore/sdio.c | ||
598 | # and drivers/net/wireless/ti/wlcore/spi.c. | ||
599 | # While they're optional and actually only used to override the MAC | ||
600 | # address on wl18xx, driver loading will delay (by udev timout - 60s) | ||
601 | # if not there. So let's make it available always. Because it's a | ||
602 | # symlink, both need to go to wlcommon. | ||
603 | FILES:${PN}-wlcommon = " \ | ||
604 | ${nonarch_base_libdir}/firmware/ti-connectivity/TI* \ | ||
605 | ${nonarch_base_libdir}/firmware/ti-connectivity/wl127x-nvs.bin \ | ||
606 | ${nonarch_base_libdir}/firmware/ti-connectivity/wl1271-nvs.bin \ | ||
607 | " | ||
608 | FILES:${PN}-wl12xx = " \ | ||
609 | ${nonarch_base_libdir}/firmware/ti-connectivity/wl12* \ | ||
610 | " | ||
611 | FILES:${PN}-wl18xx = " \ | ||
612 | ${nonarch_base_libdir}/firmware/ti-connectivity/wl18* \ | ||
613 | " | ||
614 | |||
615 | RDEPENDS:${PN}-wl12xx = "${PN}-ti-connectivity-license ${PN}-wlcommon" | ||
616 | RDEPENDS:${PN}-wl18xx = "${PN}-ti-connectivity-license ${PN}-wlcommon" | ||
617 | |||
618 | # For vt6656 | ||
619 | LICENSE:${PN}-vt6656 = "Firmware-via_vt6656" | ||
620 | LICENSE:${PN}-vt6656-license = "Firmware-via_vt6656" | ||
621 | |||
622 | FILES:${PN}-vt6656-license = "${nonarch_base_libdir}/firmware/LICENCE.via_vt6656" | ||
623 | FILES:${PN}-vt6656 = " \ | ||
624 | ${nonarch_base_libdir}/firmware/vntwusb.fw \ | ||
625 | " | ||
626 | |||
627 | RDEPENDS:${PN}-vt6656 = "${PN}-vt6656-license" | ||
628 | |||
629 | # For broadcom | ||
630 | |||
631 | # for i in `grep brcm WHENCE | grep ^File | sed 's/File: brcm.//g'`; do pkg=`echo $i | sed 's/-[sp40].*//g; s/\.bin//g; s/brcmfmac/bcm/g; s/_hdr/-hdr/g; s/BCM/bcm-0bb4-0306/g'`; echo -e " \${PN}-$pkg \\"; done | sort -u | ||
632 | |||
633 | LICENSE:${PN}-broadcom-license = "Firmware-broadcom_bcm43xx" | ||
634 | FILES:${PN}-broadcom-license = "${nonarch_base_libdir}/firmware/LICENCE.broadcom_bcm43xx" | ||
635 | |||
636 | # for i in `grep brcm WHENCE | grep ^File | sed 's/File: brcm.//g'`; do pkg=`echo $i | sed 's/-[sp40].*//g; s/\.bin//g; s/brcmfmac/bcm/g; s/_hdr/-hdr/g; s/BCM/bcm-0bb4-0306/g'`; echo "$i - $pkg"; echo -e "FILES:\${PN}-$pkg = \"\${nonarch_base_libdir}/firmware/brcm/$i\""; done | grep ^FILES | ||
637 | |||
638 | FILES:${PN}-bcm43xx = "${nonarch_base_libdir}/firmware/brcm/bcm43xx-0.fw" | ||
639 | FILES:${PN}-bcm43xx-hdr = "${nonarch_base_libdir}/firmware/brcm/bcm43xx_hdr-0.fw" | ||
640 | FILES:${PN}-bcm4329-fullmac = "${nonarch_base_libdir}/firmware/brcm/bcm4329-fullmac-4.bin" | ||
641 | FILES:${PN}-bcm43236b = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43236b.bin" | ||
642 | FILES:${PN}-bcm4329 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4329-sdio.bin" | ||
643 | FILES:${PN}-bcm4330 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4330-sdio.*" | ||
644 | FILES:${PN}-bcm4334 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4334-sdio.bin" | ||
645 | FILES:${PN}-bcm4335 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4335-sdio.bin" | ||
646 | FILES:${PN}-bcm4339 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4339-sdio.bin \ | ||
647 | ${nonarch_base_libdir}/firmware/cypress/cyfmac4339-sdio.bin \ | ||
648 | " | ||
649 | FILES:${PN}-bcm43241b0 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43241b0-sdio.bin" | ||
650 | FILES:${PN}-bcm43241b4 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43241b4-sdio.bin" | ||
651 | FILES:${PN}-bcm43241b5 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43241b5-sdio.bin" | ||
652 | FILES:${PN}-bcm43242a = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43242a.bin" | ||
653 | FILES:${PN}-bcm43143 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43143.bin \ | ||
654 | ${nonarch_base_libdir}/firmware/brcm/brcmfmac43143-sdio.bin \ | ||
655 | " | ||
656 | FILES:${PN}-bcm43430a0 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43430a0-sdio.*" | ||
657 | FILES:${PN}-bcm43455 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43455-sdio.* \ | ||
658 | ${nonarch_base_libdir}/firmware/cypress/cyfmac43455-sdio.* \ | ||
659 | " | ||
660 | FILES:${PN}-bcm4350c2 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4350c2-pcie.bin" | ||
661 | FILES:${PN}-bcm4350 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4350-pcie.bin" | ||
662 | FILES:${PN}-bcm4356 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4356-sdio.* \ | ||
663 | ${nonarch_base_libdir}/firmware/cypress/cyfmac4356-sdio.* \ | ||
664 | " | ||
665 | FILES:${PN}-bcm43569 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43569.bin" | ||
666 | FILES:${PN}-bcm43570 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43570-pcie.bin \ | ||
667 | ${nonarch_base_libdir}/firmware/cypress/cyfmac43570-pcie.bin \ | ||
668 | " | ||
669 | FILES:${PN}-bcm4358 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4358-pcie.bin" | ||
670 | FILES:${PN}-bcm43602 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43602-pcie.bin \ | ||
671 | ${nonarch_base_libdir}/firmware/brcm/brcmfmac43602-pcie.ap.bin \ | ||
672 | " | ||
673 | FILES:${PN}-bcm4366b = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4366b-pcie.bin" | ||
674 | FILES:${PN}-bcm4366c = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4366c-pcie.bin" | ||
675 | FILES:${PN}-bcm4371 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4371-pcie.bin" | ||
676 | |||
677 | # for i in `grep brcm WHENCE | grep ^File | sed 's/File: brcm.//g'`; do pkg=`echo $i | sed 's/-[sp40].*//g; s/\.bin//g; s/brcmfmac/bcm/g; s/_hdr/-hdr/g; s/BCM/bcm-0bb4-0306/g'`; echo -e "LICENSE:\${PN}-$pkg = \"Firmware-broadcom_bcm43xx\"\nRDEPENDS_\${PN}-$pkg += \"\${PN}-broadcom-license\""; done | ||
678 | # Currently 1st one and last 6 have cypress LICENSE | ||
679 | |||
680 | LICENSE:${PN}-bcm43xx = "Firmware-broadcom_bcm43xx" | ||
681 | RDEPENDS:${PN}-bcm43xx += "${PN}-broadcom-license" | ||
682 | LICENSE:${PN}-bcm43xx-hdr = "Firmware-broadcom_bcm43xx" | ||
683 | RDEPENDS:${PN}-bcm43xx-hdr += "${PN}-broadcom-license" | ||
684 | LICENSE:${PN}-bcm4329-fullmac = "Firmware-broadcom_bcm43xx" | ||
685 | RDEPENDS:${PN}-bcm4329-fullmac += "${PN}-broadcom-license" | ||
686 | LICENSE:${PN}-bcm43236b = "Firmware-broadcom_bcm43xx" | ||
687 | RDEPENDS:${PN}-bcm43236b += "${PN}-broadcom-license" | ||
688 | LICENSE:${PN}-bcm4329 = "Firmware-broadcom_bcm43xx" | ||
689 | RDEPENDS:${PN}-bcm4329 += "${PN}-broadcom-license" | ||
690 | LICENSE:${PN}-bcm4330 = "Firmware-broadcom_bcm43xx" | ||
691 | RDEPENDS:${PN}-bcm4330 += "${PN}-broadcom-license" | ||
692 | LICENSE:${PN}-bcm4334 = "Firmware-broadcom_bcm43xx" | ||
693 | RDEPENDS:${PN}-bcm4334 += "${PN}-broadcom-license" | ||
694 | LICENSE:${PN}-bcm4335 = "Firmware-broadcom_bcm43xx" | ||
695 | RDEPENDS:${PN}-bcm4335 += "${PN}-broadcom-license" | ||
696 | LICENSE:${PN}-bcm4339 = "Firmware-broadcom_bcm43xx" | ||
697 | RDEPENDS:${PN}-bcm4339 += "${PN}-broadcom-license" | ||
698 | LICENSE:${PN}-bcm43241b0 = "Firmware-broadcom_bcm43xx" | ||
699 | RDEPENDS:${PN}-bcm43241b0 += "${PN}-broadcom-license" | ||
700 | LICENSE:${PN}-bcm43241b4 = "Firmware-broadcom_bcm43xx" | ||
701 | RDEPENDS:${PN}-bcm43241b4 += "${PN}-broadcom-license" | ||
702 | LICENSE:${PN}-bcm43241b5 = "Firmware-broadcom_bcm43xx" | ||
703 | RDEPENDS:${PN}-bcm43241b5 += "${PN}-broadcom-license" | ||
704 | LICENSE:${PN}-bcm43242a = "Firmware-broadcom_bcm43xx" | ||
705 | RDEPENDS:${PN}-bcm43242a += "${PN}-broadcom-license" | ||
706 | LICENSE:${PN}-bcm43143 = "Firmware-broadcom_bcm43xx" | ||
707 | RDEPENDS:${PN}-bcm43143 += "${PN}-broadcom-license" | ||
708 | LICENSE:${PN}-bcm43430a0 = "Firmware-broadcom_bcm43xx" | ||
709 | RDEPENDS:${PN}-bcm43430a0 += "${PN}-broadcom-license" | ||
710 | LICENSE:${PN}-bcm43455 = "Firmware-broadcom_bcm43xx" | ||
711 | RDEPENDS:${PN}-bcm43455 += "${PN}-broadcom-license" | ||
712 | LICENSE:${PN}-bcm4350c2 = "Firmware-broadcom_bcm43xx" | ||
713 | RDEPENDS:${PN}-bcm4350c2 += "${PN}-broadcom-license" | ||
714 | LICENSE:${PN}-bcm4350 = "Firmware-broadcom_bcm43xx" | ||
715 | RDEPENDS:${PN}-bcm4350 += "${PN}-broadcom-license" | ||
716 | LICENSE:${PN}-bcm4356 = "Firmware-broadcom_bcm43xx" | ||
717 | RDEPENDS:${PN}-bcm4356 += "${PN}-broadcom-license" | ||
718 | LICENSE:${PN}-bcm43569 = "Firmware-broadcom_bcm43xx" | ||
719 | RDEPENDS:${PN}-bcm43569 += "${PN}-broadcom-license" | ||
720 | LICENSE:${PN}-bcm43570 = "Firmware-broadcom_bcm43xx" | ||
721 | RDEPENDS:${PN}-bcm43570 += "${PN}-broadcom-license" | ||
722 | LICENSE:${PN}-bcm4358 = "Firmware-broadcom_bcm43xx" | ||
723 | RDEPENDS:${PN}-bcm4358 += "${PN}-broadcom-license" | ||
724 | LICENSE:${PN}-bcm43602 = "Firmware-broadcom_bcm43xx" | ||
725 | RDEPENDS:${PN}-bcm43602 += "${PN}-broadcom-license" | ||
726 | LICENSE:${PN}-bcm4366b = "Firmware-broadcom_bcm43xx" | ||
727 | RDEPENDS:${PN}-bcm4366b += "${PN}-broadcom-license" | ||
728 | LICENSE:${PN}-bcm4366c = "Firmware-broadcom_bcm43xx" | ||
729 | RDEPENDS:${PN}-bcm4366c += "${PN}-broadcom-license" | ||
730 | LICENSE:${PN}-bcm4371 = "Firmware-broadcom_bcm43xx" | ||
731 | RDEPENDS:${PN}-bcm4371 += "${PN}-broadcom-license" | ||
732 | |||
733 | # For broadcom cypress | ||
734 | |||
735 | LICENSE:${PN}-cypress-license = "Firmware-cypress" | ||
736 | FILES:${PN}-cypress-license = "${nonarch_base_libdir}/firmware/LICENCE.cypress" | ||
737 | |||
738 | FILES:${PN}-bcm-0bb4-0306 = "${nonarch_base_libdir}/firmware/brcm/BCM-0bb4-0306.hcd" | ||
739 | FILES:${PN}-bcm43340 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43340-sdio.* \ | ||
740 | ${nonarch_base_libdir}/firmware/cypress/cyfmac43340-sdio.*" | ||
741 | FILES:${PN}-bcm43362 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43362-sdio.* \ | ||
742 | ${nonarch_base_libdir}/firmware/cypress/cyfmac43362-sdio.*" | ||
743 | FILES:${PN}-bcm43430 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43430-sdio.* \ | ||
744 | ${nonarch_base_libdir}/firmware/cypress/cyfmac43430-sdio.*" | ||
745 | FILES:${PN}-bcm4354 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4354-sdio.bin \ | ||
746 | ${nonarch_base_libdir}/firmware/cypress/cyfmac4354-sdio.bin \ | ||
747 | " | ||
748 | FILES:${PN}-bcm4356-pcie = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4356-pcie.* \ | ||
749 | ${nonarch_base_libdir}/firmware/cypress/cyfmac4356-pcie.* \ | ||
750 | " | ||
751 | FILES:${PN}-bcm4373 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4373-sdio.bin \ | ||
752 | ${nonarch_base_libdir}/firmware/brcm/brcmfmac4373.bin \ | ||
753 | ${nonarch_base_libdir}/firmware/cypress/cyfmac4373-sdio.bin \ | ||
754 | " | ||
755 | |||
756 | LICENSE:${PN}-bcm-0bb4-0306 = "Firmware-cypress" | ||
757 | RDEPENDS:${PN}-bcm-0bb4-0306 += "${PN}-cypress-license" | ||
758 | LICENSE:${PN}-bcm43340 = "Firmware-cypress" | ||
759 | RDEPENDS:${PN}-bcm43340 += "${PN}-cypress-license" | ||
760 | LICENSE:${PN}-bcm43362 = "Firmware-cypress" | ||
761 | RDEPENDS:${PN}-bcm43362 += "${PN}-cypress-license" | ||
762 | LICENSE:${PN}-bcm43430 = "Firmware-cypress" | ||
763 | RDEPENDS:${PN}-bcm43430 += "${PN}-cypress-license" | ||
764 | LICENSE:${PN}-bcm4354 = "Firmware-cypress" | ||
765 | RDEPENDS:${PN}-bcm4354 += "${PN}-cypress-license" | ||
766 | LICENSE:${PN}-bcm4356-pcie = "Firmware-cypress" | ||
767 | RDEPENDS:${PN}-bcm4356-pcie += "${PN}-cypress-license" | ||
768 | LICENSE:${PN}-bcm4373 = "Firmware-cypress" | ||
769 | RDEPENDS:${PN}-bcm4373 += "${PN}-cypress-license" | ||
770 | |||
771 | # For Broadcom bnx2-mips | ||
772 | # | ||
773 | # which is a separate case to the other Broadcom firmwares since its | ||
774 | # license is contained in the shared WHENCE file. | ||
775 | |||
776 | LICENSE:${PN}-bnx2-mips = "WHENCE" | ||
777 | LICENSE:${PN}-whence-license = "WHENCE" | ||
778 | |||
779 | FILES:${PN}-bnx2-mips = "${nonarch_base_libdir}/firmware/bnx2/bnx2-mips-09-6.2.1b.fw" | ||
780 | FILES:${PN}-whence-license = "${nonarch_base_libdir}/firmware/WHENCE" | ||
781 | |||
782 | RDEPENDS:${PN}-bnx2-mips += "${PN}-whence-license" | ||
783 | |||
784 | # For imx-sdma | ||
785 | LICENSE:${PN}-imx-sdma-imx6q = "Firmware-imx-sdma_firmware" | ||
786 | LICENSE:${PN}-imx-sdma-imx7d = "Firmware-imx-sdma_firmware" | ||
787 | LICENSE:${PN}-imx-sdma-license = "Firmware-imx-sdma_firmware" | ||
788 | |||
789 | FILES:${PN}-imx-sdma-imx6q = "${nonarch_base_libdir}/firmware/imx/sdma/sdma-imx6q.bin" | ||
790 | |||
791 | RPROVIDES:${PN}-imx-sdma-imx6q = "firmware-imx-sdma-imx6q" | ||
792 | RREPLACES:${PN}-imx-sdma-imx6q = "firmware-imx-sdma-imx6q" | ||
793 | RCONFLICTS:${PN}-imx-sdma-imx6q = "firmware-imx-sdma-imx6q" | ||
794 | |||
795 | FILES:${PN}-imx-sdma-imx7d = "${nonarch_base_libdir}/firmware/imx/sdma/sdma-imx7d.bin" | ||
796 | |||
797 | FILES:${PN}-imx-sdma-license = "${nonarch_base_libdir}/firmware/LICENSE.sdma_firmware" | ||
798 | |||
799 | RDEPENDS:${PN}-imx-sdma-imx6q += "${PN}-imx-sdma-license" | ||
800 | RDEPENDS:${PN}-imx-sdma-imx7d += "${PN}-imx-sdma-license" | ||
801 | |||
802 | # For iwlwifi | ||
803 | LICENSE:${PN}-iwlwifi = "Firmware-iwlwifi_firmware" | ||
804 | LICENSE:${PN}-iwlwifi-135-6 = "Firmware-iwlwifi_firmware" | ||
805 | LICENSE:${PN}-iwlwifi-3160-7 = "Firmware-iwlwifi_firmware" | ||
806 | LICENSE:${PN}-iwlwifi-3160-8 = "Firmware-iwlwifi_firmware" | ||
807 | LICENSE:${PN}-iwlwifi-3160-9 = "Firmware-iwlwifi_firmware" | ||
808 | LICENSE:${PN}-iwlwifi-3160-10 = "Firmware-iwlwifi_firmware" | ||
809 | LICENSE:${PN}-iwlwifi-3160-12 = "Firmware-iwlwifi_firmware" | ||
810 | LICENSE:${PN}-iwlwifi-3160-13 = "Firmware-iwlwifi_firmware" | ||
811 | LICENSE:${PN}-iwlwifi-3160-16 = "Firmware-iwlwifi_firmware" | ||
812 | LICENSE:${PN}-iwlwifi-3160-17 = "Firmware-iwlwifi_firmware" | ||
813 | LICENSE:${PN}-iwlwifi-6000-4 = "Firmware-iwlwifi_firmware" | ||
814 | LICENSE:${PN}-iwlwifi-6000g2a-5 = "Firmware-iwlwifi_firmware" | ||
815 | LICENSE:${PN}-iwlwifi-6000g2a-6 = "Firmware-iwlwifi_firmware" | ||
816 | LICENSE:${PN}-iwlwifi-6000g2b-5 = "Firmware-iwlwifi_firmware" | ||
817 | LICENSE:${PN}-iwlwifi-6000g2b-6 = "Firmware-iwlwifi_firmware" | ||
818 | LICENSE:${PN}-iwlwifi-6050-4 = "Firmware-iwlwifi_firmware" | ||
819 | LICENSE:${PN}-iwlwifi-6050-5 = "Firmware-iwlwifi_firmware" | ||
820 | LICENSE:${PN}-iwlwifi-7260 = "Firmware-iwlwifi_firmware" | ||
821 | LICENSE:${PN}-iwlwifi-7265 = "Firmware-iwlwifi_firmware" | ||
822 | LICENSE:${PN}-iwlwifi-7265d = "Firmware-iwlwifi_firmware" | ||
823 | LICENSE:${PN}-iwlwifi-8000c = "Firmware-iwlwifi_firmware" | ||
824 | LICENSE:${PN}-iwlwifi-8265 = "Firmware-iwlwifi_firmware" | ||
825 | LICENSE:${PN}-iwlwifi-9000 = "Firmware-iwlwifi_firmware" | ||
826 | LICENSE:${PN}-iwlwifi-misc = "Firmware-iwlwifi_firmware" | ||
827 | LICENSE:${PN}-iwlwifi-license = "Firmware-iwlwifi_firmware" | ||
828 | |||
829 | |||
830 | FILES:${PN}-iwlwifi-license = "${nonarch_base_libdir}/firmware/LICENCE.iwlwifi_firmware" | ||
831 | FILES:${PN}-iwlwifi-135-6 = "${nonarch_base_libdir}/firmware/iwlwifi-135-6.ucode" | ||
832 | FILES:${PN}-iwlwifi-3160-7 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-7.ucode" | ||
833 | FILES:${PN}-iwlwifi-3160-8 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-8.ucode" | ||
834 | FILES:${PN}-iwlwifi-3160-9 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-9.ucode" | ||
835 | FILES:${PN}-iwlwifi-3160-10 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-10.ucode" | ||
836 | FILES:${PN}-iwlwifi-3160-12 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-12.ucode" | ||
837 | FILES:${PN}-iwlwifi-3160-13 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-13.ucode" | ||
838 | FILES:${PN}-iwlwifi-3160-16 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-16.ucode" | ||
839 | FILES:${PN}-iwlwifi-3160-17 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-17.ucode" | ||
840 | FILES:${PN}-iwlwifi-6000-4 = "${nonarch_base_libdir}/firmware/iwlwifi-6000-4.ucode" | ||
841 | FILES:${PN}-iwlwifi-6000g2a-5 = "${nonarch_base_libdir}/firmware/iwlwifi-6000g2a-5.ucode" | ||
842 | FILES:${PN}-iwlwifi-6000g2a-6 = "${nonarch_base_libdir}/firmware/iwlwifi-6000g2a-6.ucode" | ||
843 | FILES:${PN}-iwlwifi-6000g2b-5 = "${nonarch_base_libdir}/firmware/iwlwifi-6000g2b-5.ucode" | ||
844 | FILES:${PN}-iwlwifi-6000g2b-6 = "${nonarch_base_libdir}/firmware/iwlwifi-6000g2b-6.ucode" | ||
845 | FILES:${PN}-iwlwifi-6050-4 = "${nonarch_base_libdir}/firmware/iwlwifi-6050-4.ucode" | ||
846 | FILES:${PN}-iwlwifi-6050-5 = "${nonarch_base_libdir}/firmware/iwlwifi-6050-5.ucode" | ||
847 | FILES:${PN}-iwlwifi-7260 = "${nonarch_base_libdir}/firmware/iwlwifi-7260-*.ucode" | ||
848 | FILES:${PN}-iwlwifi-7265 = "${nonarch_base_libdir}/firmware/iwlwifi-7265-*.ucode" | ||
849 | FILES:${PN}-iwlwifi-7265d = "${nonarch_base_libdir}/firmware/iwlwifi-7265D-*.ucode" | ||
850 | FILES:${PN}-iwlwifi-8000c = "${nonarch_base_libdir}/firmware/iwlwifi-8000C-*.ucode" | ||
851 | FILES:${PN}-iwlwifi-8265 = "${nonarch_base_libdir}/firmware/iwlwifi-8265-*.ucode" | ||
852 | FILES:${PN}-iwlwifi-9000 = "${nonarch_base_libdir}/firmware/iwlwifi-9000-*.ucode" | ||
853 | FILES:${PN}-iwlwifi-misc = "${nonarch_base_libdir}/firmware/iwlwifi-*.ucode" | ||
854 | |||
855 | RDEPENDS:${PN}-iwlwifi-135-6 = "${PN}-iwlwifi-license" | ||
856 | RDEPENDS:${PN}-iwlwifi-3160-7 = "${PN}-iwlwifi-license" | ||
857 | RDEPENDS:${PN}-iwlwifi-3160-8 = "${PN}-iwlwifi-license" | ||
858 | RDEPENDS:${PN}-iwlwifi-3160-9 = "${PN}-iwlwifi-license" | ||
859 | RDEPENDS:${PN}-iwlwifi-3160-10 = "${PN}-iwlwifi-license" | ||
860 | RDEPENDS:${PN}-iwlwifi-3160-12 = "${PN}-iwlwifi-license" | ||
861 | RDEPENDS:${PN}-iwlwifi-3160-13 = "${PN}-iwlwifi-license" | ||
862 | RDEPENDS:${PN}-iwlwifi-3160-16 = "${PN}-iwlwifi-license" | ||
863 | RDEPENDS:${PN}-iwlwifi-3160-17 = "${PN}-iwlwifi-license" | ||
864 | RDEPENDS:${PN}-iwlwifi-6000-4 = "${PN}-iwlwifi-license" | ||
865 | RDEPENDS:${PN}-iwlwifi-6000g2a-5 = "${PN}-iwlwifi-license" | ||
866 | RDEPENDS:${PN}-iwlwifi-6000g2a-6 = "${PN}-iwlwifi-license" | ||
867 | RDEPENDS:${PN}-iwlwifi-6000g2b-5 = "${PN}-iwlwifi-license" | ||
868 | RDEPENDS:${PN}-iwlwifi-6000g2b-6 = "${PN}-iwlwifi-license" | ||
869 | RDEPENDS:${PN}-iwlwifi-6050-4 = "${PN}-iwlwifi-license" | ||
870 | RDEPENDS:${PN}-iwlwifi-6050-5 = "${PN}-iwlwifi-license" | ||
871 | RDEPENDS:${PN}-iwlwifi-7260 = "${PN}-iwlwifi-license" | ||
872 | RDEPENDS:${PN}-iwlwifi-7265 = "${PN}-iwlwifi-license" | ||
873 | RDEPENDS:${PN}-iwlwifi-7265d = "${PN}-iwlwifi-license" | ||
874 | RDEPENDS:${PN}-iwlwifi-8000c = "${PN}-iwlwifi-license" | ||
875 | RDEPENDS:${PN}-iwlwifi-8265 = "${PN}-iwlwifi-license" | ||
876 | RDEPENDS:${PN}-iwlwifi-9000 = "${PN}-iwlwifi-license" | ||
877 | RDEPENDS:${PN}-iwlwifi-misc = "${PN}-iwlwifi-license" | ||
878 | |||
879 | # -iwlwifi-misc is a "catch all" package that includes all the iwlwifi | ||
880 | # firmwares that are not already included in other -iwlwifi- packages. | ||
881 | # -iwlwifi is a virtual package that depends upon all iwlwifi packages. | ||
882 | # These are distinct in order to allow the -misc firmwares to be installed | ||
883 | # without pulling in every other iwlwifi package. | ||
884 | ALLOW_EMPTY:${PN}-iwlwifi = "1" | ||
885 | ALLOW_EMPTY:${PN}-iwlwifi-misc = "1" | ||
886 | |||
887 | # Handle package updating for the newly merged iwlwifi groupings | ||
888 | RPROVIDES:${PN}-iwlwifi-7265 = "${PN}-iwlwifi-7265-8 ${PN}-iwlwifi-7265-9" | ||
889 | RREPLACES:${PN}-iwlwifi-7265 = "${PN}-iwlwifi-7265-8 ${PN}-iwlwifi-7265-9" | ||
890 | RCONFLICTS:${PN}-iwlwifi-7265 = "${PN}-iwlwifi-7265-8 ${PN}-iwlwifi-7265-9" | ||
891 | |||
892 | RPROVIDES:${PN}-iwlwifi-7260 = "${PN}-iwlwifi-7260-7 ${PN}-iwlwifi-7260-8 ${PN}-iwlwifi-7260-9" | ||
893 | RREPLACES:${PN}-iwlwifi-7260 = "${PN}-iwlwifi-7260-7 ${PN}-iwlwifi-7260-8 ${PN}-iwlwifi-7260-9" | ||
894 | RCONFLICTS:${PN}-iwlwifi-7260 = "${PN}-iwlwifi-7260-7 ${PN}-iwlwifi-7260-8 ${PN}-iwlwifi-7260-9" | ||
895 | |||
896 | # For ibt | ||
897 | LICENSE:${PN}-ibt-license = "Firmware-ibt_firmware" | ||
898 | LICENSE:${PN}-ibt-hw-37-7 = "Firmware-ibt_firmware" | ||
899 | LICENSE:${PN}-ibt-hw-37-8 = "Firmware-ibt_firmware" | ||
900 | LICENSE:${PN}-ibt-11-5 = "Firmware-ibt_firmware" | ||
901 | LICENSE:${PN}-ibt-12-16 = "Firmware-ibt_firmware" | ||
902 | LICENSE:${PN}-ibt-17 = "Firmware-ibt_firmware" | ||
903 | LICENSE:${PN}-ibt-20 = "Firmware-ibt_firmware" | ||
904 | LICENSE:${PN}-ibt-misc = "Firmware-ibt_firmware" | ||
905 | |||
906 | FILES:${PN}-ibt-license = "${nonarch_base_libdir}/firmware/LICENCE.ibt_firmware" | ||
907 | FILES:${PN}-ibt-hw-37-7 = "${nonarch_base_libdir}/firmware/intel/ibt-hw-37.7*.bseq" | ||
908 | FILES:${PN}-ibt-hw-37-8 = "${nonarch_base_libdir}/firmware/intel/ibt-hw-37.8*.bseq" | ||
909 | FILES:${PN}-ibt-11-5 = "${nonarch_base_libdir}/firmware/intel/ibt-11-5.sfi ${nonarch_base_libdir}/firmware/intel/ibt-11-5.ddc" | ||
910 | FILES:${PN}-ibt-12-16 = "${nonarch_base_libdir}/firmware/intel/ibt-12-16.sfi ${nonarch_base_libdir}/firmware/intel/ibt-12-16.ddc" | ||
911 | FILES:${PN}-ibt-17 = "${nonarch_base_libdir}/firmware/intel/ibt-17-*.sfi ${nonarch_base_libdir}/firmware/intel/ibt-17-*.ddc" | ||
912 | FILES:${PN}-ibt-20 = "${nonarch_base_libdir}/firmware/intel/ibt-20-*.sfi ${nonarch_base_libdir}/firmware/intel/ibt-20-*.ddc" | ||
913 | FILES:${PN}-ibt-misc = "${nonarch_base_libdir}/firmware/intel/ibt-*" | ||
914 | |||
915 | RDEPENDS:${PN}-ibt-hw-37-7 = "${PN}-ibt-license" | ||
916 | RDEPENDS:${PN}-ibt-hw-37.8 = "${PN}-ibt-license" | ||
917 | RDEPENDS:${PN}-ibt-11-5 = "${PN}-ibt-license" | ||
918 | RDEPENDS:${PN}-ibt-12-16 = "${PN}-ibt-license" | ||
919 | RDEPENDS:${PN}-ibt-17 = "${PN}-ibt-license" | ||
920 | RDEPENDS:${PN}-ibt-20 = "${PN}-ibt-license" | ||
921 | RDEPENDS:${PN}-ibt-misc = "${PN}-ibt-license" | ||
922 | |||
923 | ALLOW_EMPTY:${PN}-ibt= "1" | ||
924 | ALLOW_EMPTY:${PN}-ibt-misc = "1" | ||
925 | |||
926 | LICENSE:${PN}-i915 = "Firmware-i915" | ||
927 | LICENSE:${PN}-i915-license = "Firmware-i915" | ||
928 | FILES:${PN}-i915-license = "${nonarch_base_libdir}/firmware/LICENSE.i915" | ||
929 | FILES:${PN}-i915 = "${nonarch_base_libdir}/firmware/i915" | ||
930 | RDEPENDS:${PN}-i915 = "${PN}-i915-license" | ||
931 | |||
932 | LICENSE:${PN}-ice = "Firmware-ice" | ||
933 | LICENSE:${PN}-ice-license = "Firmware-ice" | ||
934 | FILES:${PN}-ice-license = "${nonarch_base_libdir}/firmware/LICENSE.ice" | ||
935 | FILES:${PN}-ice = "${nonarch_base_libdir}/firmware/intel/ice" | ||
936 | RDEPENDS:${PN}-ice = "${PN}-ice-license" | ||
937 | |||
938 | FILES:${PN}-adsp-sst-license = "${nonarch_base_libdir}/firmware/LICENCE.adsp_sst" | ||
939 | LICENSE:${PN}-adsp-sst = "Firmware-adsp_sst" | ||
940 | LICENSE:${PN}-adsp-sst-license = "Firmware-adsp_sst" | ||
941 | FILES:${PN}-adsp-sst = "${nonarch_base_libdir}/firmware/intel/dsp_fw*" | ||
942 | RDEPENDS:${PN}-adsp-sst = "${PN}-adsp-sst-license" | ||
943 | |||
944 | # For QAT | ||
945 | LICENSE:${PN}-qat = "Firmware-qat" | ||
946 | LICENSE:${PN}-qat-license = "Firmware-qat" | ||
947 | FILES:${PN}-qat-license = "${nonarch_base_libdir}/firmware/LICENCE.qat_firmware" | ||
948 | FILES:${PN}-qat = "${nonarch_base_libdir}/firmware/qat*.bin" | ||
949 | RDEPENDS:${PN}-qat = "${PN}-qat-license" | ||
950 | |||
951 | # For QCOM VPU/GPU and SDM845 | ||
952 | LICENSE:${PN}-qcom-license = "Firmware-qcom" | ||
953 | FILES:${PN}-qcom-license = "${nonarch_base_libdir}/firmware/LICENSE.qcom ${nonarch_base_libdir}/firmware/qcom/NOTICE.txt" | ||
954 | FILES:${PN}-qcom-venus-1.8 = "${nonarch_base_libdir}/firmware/qcom/venus-1.8/*" | ||
955 | FILES:${PN}-qcom-venus-4.2 = "${nonarch_base_libdir}/firmware/qcom/venus-4.2/*" | ||
956 | FILES:${PN}-qcom-venus-5.2 = "${nonarch_base_libdir}/firmware/qcom/venus-5.2/*" | ||
957 | FILES:${PN}-qcom-venus-5.4 = "${nonarch_base_libdir}/firmware/qcom/venus-5.4/*" | ||
958 | FILES:${PN}-qcom-vpu-1.0 = "${nonarch_base_libdir}/firmware/qcom/vpu-1.0/*" | ||
959 | FILES:${PN}-qcom-vpu-2.0 = "${nonarch_base_libdir}/firmware/qcom/vpu-2.0/*" | ||
960 | FILES:${PN}-qcom-adreno-a3xx = "${nonarch_base_libdir}/firmware/qcom/a300_*.fw ${nonarch_base_libdir}/firmware/a300_*.fw" | ||
961 | FILES:${PN}-qcom-adreno-a530 = "${nonarch_base_libdir}/firmware/qcom/a530*.*" | ||
962 | FILES:${PN}-qcom-adreno-a630 = "${nonarch_base_libdir}/firmware/qcom/a630*.* ${nonarch_base_libdir}/firmware/qcom/sdm845/a630*.*" | ||
963 | FILES:${PN}-qcom-adreno-a650 = "${nonarch_base_libdir}/firmware/qcom/a650*.* ${nonarch_base_libdir}/firmware/qcom/sm8250/a650*.*" | ||
964 | FILES:${PN}-qcom-adreno-a660 = "${nonarch_base_libdir}/firmware/qcom/a660*.*" | ||
965 | FILES:${PN}-qcom-sdm845-audio = "${nonarch_base_libdir}/firmware/qcom/sdm845/adsp*.*" | ||
966 | FILES:${PN}-qcom-sdm845-compute = "${nonarch_base_libdir}/firmware/qcom/sdm845/cdsp*.*" | ||
967 | FILES:${PN}-qcom-sdm845-modem = "${nonarch_base_libdir}/firmware/qcom/sdm845/mba.mbn ${nonarch_base_libdir}/firmware/qcom/sdm845/modem*.* ${nonarch_base_libdir}/firmware/qcom/sdm845/wlanmdsp.mbn" | ||
968 | FILES:${PN}-qcom-sm8250-audio = "${nonarch_base_libdir}/firmware/qcom/sm8250/adsp*.*" | ||
969 | FILES:${PN}-qcom-sm8250-compute = "${nonarch_base_libdir}/firmware/qcom/sm8250/cdsp*.*" | ||
970 | RDEPENDS:${PN}-qcom-venus-1.8 = "${PN}-qcom-license" | ||
971 | RDEPENDS:${PN}-qcom-venus-4.2 = "${PN}-qcom-license" | ||
972 | RDEPENDS:${PN}-qcom-venus-5.2 = "${PN}-qcom-license" | ||
973 | RDEPENDS:${PN}-qcom-venus-5.4 = "${PN}-qcom-license" | ||
974 | RDEPENDS:${PN}-qcom-vpu-1.0 = "${PN}-qcom-license" | ||
975 | RDEPENDS:${PN}-qcom-vpu-2.0 = "${PN}-qcom-license" | ||
976 | RDEPENDS:${PN}-qcom-adreno-a3xx = "${PN}-qcom-license" | ||
977 | RDEPENDS:${PN}-qcom-adreno-a530 = "${PN}-qcom-license" | ||
978 | RDEPENDS:${PN}-qcom-adreno-a630 = "${PN}-qcom-license" | ||
979 | RDEPENDS:${PN}-qcom-adreno-a650 = "${PN}-qcom-license" | ||
980 | RDEPENDS:${PN}-qcom-adreno-a660 = "${PN}-qcom-license" | ||
981 | RDEPENDS:${PN}-qcom-sdm845-audio = "${PN}-qcom-license" | ||
982 | RDEPENDS:${PN}-qcom-sdm845-compute = "${PN}-qcom-license" | ||
983 | RDEPENDS:${PN}-qcom-sdm845-modem = "${PN}-qcom-license" | ||
984 | RDEPENDS:${PN}-qcom-sm8250-audio = "${PN}-qcom-license" | ||
985 | RDEPENDS:${PN}-qcom-sm8250-compute = "${PN}-qcom-license" | ||
986 | |||
987 | FILES:${PN}-liquidio = "${nonarch_base_libdir}/firmware/liquidio" | ||
988 | |||
989 | # For Amlogic VDEC | ||
990 | LICENSE:${PN}-amlogic-vdec = "Firmware-amlogic_vdec" | ||
991 | FILES:${PN}-amlogic-vdec-license = "${nonarch_base_libdir}/firmware/LICENSE.amlogic_vdec" | ||
992 | FILES:${PN}-amlogic-vdec = "${nonarch_base_libdir}/firmware/meson/vdec/*" | ||
993 | RDEPENDS:${PN}-amlogic-vdec = "${PN}-amlogic-vdec-license" | ||
994 | |||
995 | # For other firmwares | ||
996 | # Maybe split out to separate packages when needed. | ||
997 | LICENSE:${PN} = "\ | ||
998 | Firmware-Abilis \ | ||
999 | & Firmware-agere \ | ||
1000 | & Firmware-amdgpu \ | ||
1001 | & Firmware-amd-ucode \ | ||
1002 | & Firmware-amlogic_vdec \ | ||
1003 | & Firmware-atmel \ | ||
1004 | & Firmware-ca0132 \ | ||
1005 | & Firmware-cavium \ | ||
1006 | & Firmware-chelsio_firmware \ | ||
1007 | & Firmware-cw1200 \ | ||
1008 | & Firmware-dib0700 \ | ||
1009 | & Firmware-e100 \ | ||
1010 | & Firmware-ene_firmware \ | ||
1011 | & Firmware-fw_sst_0f28 \ | ||
1012 | & Firmware-go7007 \ | ||
1013 | & Firmware-hfi1_firmware \ | ||
1014 | & Firmware-i2400m \ | ||
1015 | & Firmware-ibt_firmware \ | ||
1016 | & Firmware-it913x \ | ||
1017 | & Firmware-IntcSST2 \ | ||
1018 | & Firmware-kaweth \ | ||
1019 | & Firmware-moxa \ | ||
1020 | & Firmware-myri10ge_firmware \ | ||
1021 | & Firmware-nvidia \ | ||
1022 | & Firmware-OLPC \ | ||
1023 | & Firmware-ath9k-htc \ | ||
1024 | & Firmware-phanfw \ | ||
1025 | & Firmware-qat \ | ||
1026 | & Firmware-qcom \ | ||
1027 | & Firmware-qla1280 \ | ||
1028 | & Firmware-qla2xxx \ | ||
1029 | & Firmware-r8a779x_usb3 \ | ||
1030 | & Firmware-radeon \ | ||
1031 | & Firmware-ralink_a_mediatek_company_firmware \ | ||
1032 | & Firmware-ralink-firmware \ | ||
1033 | & Firmware-imx-sdma_firmware \ | ||
1034 | & Firmware-siano \ | ||
1035 | & Firmware-tda7706-firmware \ | ||
1036 | & Firmware-ti-connectivity \ | ||
1037 | & Firmware-ti-keystone \ | ||
1038 | & Firmware-ueagle-atm4-firmware \ | ||
1039 | & Firmware-wl1251 \ | ||
1040 | & Firmware-xc4000 \ | ||
1041 | & Firmware-xc5000 \ | ||
1042 | & Firmware-xc5000c \ | ||
1043 | & WHENCE \ | ||
1044 | " | ||
1045 | |||
1046 | FILES:${PN}-license += "${nonarch_base_libdir}/firmware/LICEN*" | ||
1047 | FILES:${PN} += "${nonarch_base_libdir}/firmware/*" | ||
1048 | RDEPENDS:${PN} += "${PN}-license" | ||
1049 | RDEPENDS:${PN} += "${PN}-whence-license" | ||
1050 | |||
1051 | # Make linux-firmware depend on all of the split-out packages. | ||
1052 | # Make linux-firmware-iwlwifi depend on all of the split-out iwlwifi packages. | ||
1053 | # Make linux-firmware-ibt depend on all of the split-out ibt packages. | ||
1054 | python populate_packages:prepend () { | ||
1055 | firmware_pkgs = oe.utils.packages_filter_out_system(d) | ||
1056 | d.appendVar('RRECOMMENDS:linux-firmware', ' ' + ' '.join(firmware_pkgs)) | ||
1057 | |||
1058 | iwlwifi_pkgs = filter(lambda x: x.find('-iwlwifi-') != -1, firmware_pkgs) | ||
1059 | d.appendVar('RRECOMMENDS:linux-firmware-iwlwifi', ' ' + ' '.join(iwlwifi_pkgs)) | ||
1060 | |||
1061 | ibt_pkgs = filter(lambda x: x.find('-ibt-') != -1, firmware_pkgs) | ||
1062 | d.appendVar('RRECOMMENDS:linux-firmware-ibt', ' ' + ' '.join(ibt_pkgs)) | ||
1063 | } | ||
1064 | |||
1065 | # Firmware files are generally not ran on the CPU, so they can be | ||
1066 | # allarch despite being architecture specific | ||
1067 | INSANE_SKIP = "arch" | ||
diff --git a/meta/recipes-kernel/linux-firmware/linux-firmware_20250627.bb b/meta/recipes-kernel/linux-firmware/linux-firmware_20250627.bb new file mode 100644 index 0000000000..4bdb36ea67 --- /dev/null +++ b/meta/recipes-kernel/linux-firmware/linux-firmware_20250627.bb | |||
@@ -0,0 +1,2273 @@ | |||
1 | SUMMARY = "Firmware files for use with Linux kernel" | ||
2 | HOMEPAGE = "https://www.kernel.org/" | ||
3 | DESCRIPTION = "Linux firmware is a package distributed alongside the Linux kernel \ | ||
4 | that contains firmware binary blobs necessary for partial or full functionality \ | ||
5 | of certain hardware devices." | ||
6 | SECTION = "kernel" | ||
7 | |||
8 | LICENSE = "\ | ||
9 | Firmware-Abilis \ | ||
10 | & Firmware-adsp_sst \ | ||
11 | & Firmware-aeonsemi \ | ||
12 | & Firmware-agere \ | ||
13 | & Firmware-airoha \ | ||
14 | & Firmware-alacritech \ | ||
15 | & Firmware-amdgpu \ | ||
16 | & Firmware-amdisp \ | ||
17 | & Firmware-amdnpu \ | ||
18 | & Firmware-amd_pmf \ | ||
19 | & Firmware-amd-sev \ | ||
20 | & Firmware-amd-ucode \ | ||
21 | & Firmware-amlogic \ | ||
22 | & Firmware-amlogic_vdec \ | ||
23 | & Firmware-amphion_vpu \ | ||
24 | & Firmware-atheros_firmware \ | ||
25 | & Firmware-atmel \ | ||
26 | & Firmware-bmi260 \ | ||
27 | & Firmware-bnx2 \ | ||
28 | & Firmware-bnx2x \ | ||
29 | & Firmware-broadcom_bcm43xx \ | ||
30 | & Firmware-ca0132 \ | ||
31 | & Firmware-cavium \ | ||
32 | & Firmware-chelsio_firmware \ | ||
33 | & Firmware-cirrus \ | ||
34 | & Firmware-cnm \ | ||
35 | & Firmware-cw1200 \ | ||
36 | & Firmware-cw1200-sdd \ | ||
37 | & Firmware-cxgb3 \ | ||
38 | & Firmware-cypress \ | ||
39 | & Firmware-dabusb \ | ||
40 | & Firmware-dib0700 \ | ||
41 | & Firmware-e100 \ | ||
42 | & Firmware-emi26 \ | ||
43 | & Firmware-ene_firmware \ | ||
44 | & Firmware-fw_sst_0f28 \ | ||
45 | & Firmware-go7007 \ | ||
46 | & Firmware-hfi1_firmware \ | ||
47 | & Firmware-i915 \ | ||
48 | & Firmware-ibt_firmware \ | ||
49 | & Firmware-ice \ | ||
50 | & Firmware-ice_enhanced \ | ||
51 | & Firmware-intel \ | ||
52 | & Firmware-intel_vpu \ | ||
53 | & Firmware-ipu3_firmware \ | ||
54 | & Firmware-it913x \ | ||
55 | & Firmware-ivsc \ | ||
56 | & Firmware-iwlwifi_firmware \ | ||
57 | & Firmware-ixp4xx \ | ||
58 | & Firmware-IntcSST2 \ | ||
59 | & Firmware-kaweth \ | ||
60 | & Firmware-keyspan \ | ||
61 | & Firmware-linaro \ | ||
62 | & Firmware-Lontium \ | ||
63 | & Firmware-mali_csffw \ | ||
64 | & Firmware-Marvell \ | ||
65 | & Firmware-mediatek \ | ||
66 | & Firmware-microchip \ | ||
67 | & Firmware-montage \ | ||
68 | & Firmware-moxa \ | ||
69 | & Firmware-myri10ge_firmware \ | ||
70 | & Firmware-netronome \ | ||
71 | & Firmware-nvidia \ | ||
72 | & Firmware-nxp \ | ||
73 | & Firmware-nxp_mc_firmware \ | ||
74 | & Firmware-OLPC \ | ||
75 | & Firmware-ath9k-htc \ | ||
76 | & Firmware-phanfw \ | ||
77 | & Firmware-powervr \ | ||
78 | & Firmware-qat \ | ||
79 | & Firmware-qcom \ | ||
80 | & Firmware-qcom-2 \ | ||
81 | & Firmware-qcom-yamato \ | ||
82 | & Firmware-qla1280 \ | ||
83 | & Firmware-qla2xxx \ | ||
84 | & Firmware-qualcommAthos_ar3k \ | ||
85 | & Firmware-qualcommAthos_ath10k \ | ||
86 | & Firmware-r8a779x_usb3 \ | ||
87 | & Firmware-radeon \ | ||
88 | & Firmware-ralink_a_mediatek_company_firmware \ | ||
89 | & Firmware-ralink-firmware \ | ||
90 | & Firmware-rockchip \ | ||
91 | & Firmware-rtlwifi_firmware \ | ||
92 | & Firmware-imx-sdma_firmware \ | ||
93 | & Firmware-siano \ | ||
94 | & Firmware-ti-connectivity \ | ||
95 | & Firmware-ti-keystone \ | ||
96 | & Firmware-ti-tspa \ | ||
97 | & Firmware-tigon \ | ||
98 | & Firmware-typhoon \ | ||
99 | & Firmware-ueagle-atm4-firmware \ | ||
100 | & Firmware-via_vt6656 \ | ||
101 | & Firmware-wfx \ | ||
102 | & Firmware-wl1251 \ | ||
103 | & Firmware-xc4000 \ | ||
104 | & Firmware-xc5000 \ | ||
105 | & Firmware-xc5000c \ | ||
106 | & Firmware-xe \ | ||
107 | & WHENCE \ | ||
108 | & GPL-2.0-or-later \ | ||
109 | " | ||
110 | |||
111 | LIC_FILES_CHKSUM = "file://LICENCE.Abilis;md5=b5ee3f410780e56711ad48eadc22b8bc \ | ||
112 | file://LICENCE.adsp_sst;md5=615c45b91a5a4a9fe046d6ab9a2df728 \ | ||
113 | file://LICENSE.aeonsemi;md5=521c00bae0077c90d6ffb9ccf66905ae \ | ||
114 | file://LICENCE.agere;md5=af0133de6b4a9b2522defd5f188afd31 \ | ||
115 | file://LICENSE.airoha;md5=fa3dedb960e2673aea51aa509f7b537d \ | ||
116 | file://LICENCE.alacritech;md5=75dabc07cc2fb59d929baa6bd6aae48a \ | ||
117 | file://LICENSE.amdgpu;md5=1433dfea38c97a2e563a248a863dcb94 \ | ||
118 | file://LICENSE.amdisp;md5=f040a36bf52c9643edb7c009d6f1b141 \ | ||
119 | file://LICENSE.amdnpu;md5=ea42c0f38f2d42aad08bd50c822460dc \ | ||
120 | file://LICENSE.amd_pmf;md5=a2589a05ea5b6bd2b7f4f623c7e7a649 \ | ||
121 | file://LICENSE.amd-sev;md5=e750538791a8be0b7249c579edefb035 \ | ||
122 | file://LICENSE.amd-ucode;md5=6ca90c57f7b248de1e25c7f68ffc4698 \ | ||
123 | file://LICENSE.amlogic;md5=80e4e3f27def8bc4b232009c3a587c07 \ | ||
124 | file://LICENSE.amlogic_vdec;md5=dc44f59bf64a81643e500ad3f39a468a \ | ||
125 | file://LICENSE.amphion_vpu;md5=2bcdc00527b2d0542bd92b52aaec2b60 \ | ||
126 | file://LICENCE.atheros_firmware;md5=30a14c7823beedac9fa39c64fdd01a13 \ | ||
127 | file://LICENSE.atmel;md5=aa74ac0c60595dee4d4e239107ea77a3 \ | ||
128 | file://LICENSE.bmi260;md5=0008c039ec4281e382bd0cb41b66866c \ | ||
129 | file://LICENCE.bnx2;md5=d156fb810e162c4b0065ec8316efcd38 \ | ||
130 | file://LICENCE.bnx2x;md5=9494ec1462e461dec5322d1a1f0adf81 \ | ||
131 | file://LICENCE.broadcom_bcm43xx;md5=3160c14df7228891b868060e1951dfbc \ | ||
132 | file://LICENCE.ca0132;md5=209b33e66ee5be0461f13d31da392198 \ | ||
133 | file://LICENCE.cadence;md5=009f46816f6956cfb75ede13d3e1cee0 \ | ||
134 | file://LICENCE.cavium;md5=c37aaffb1ebe5939b2580d073a95daea \ | ||
135 | file://LICENCE.chelsio_firmware;md5=819aa8c3fa453f1b258ed8d168a9d903 \ | ||
136 | file://LICENSE.cirrus;md5=662ea2c1a8888f7d79ed7f27c27472e1 \ | ||
137 | file://LICENCE.cnm;md5=df3992006621b797e36de43f36336e36 \ | ||
138 | file://LICENCE.cw1200;md5=f0f770864e7a8444a5c5aa9d12a3a7ed \ | ||
139 | file://LICENCE.cw1200-sdd;md5=7e99e5e15c3668e96504a82ebd532ee4 \ | ||
140 | file://LICENCE.cxgb3;md5=1cf82d9e2a4b301e20c7936e61cd0e45 \ | ||
141 | file://LICENCE.cypress;md5=48cd9436c763bf873961f9ed7b5c147b \ | ||
142 | file://LICENCE.dabusb;md5=fd785fc5f935c950a3423e4b1b996657 \ | ||
143 | file://LICENSE.dib0700;md5=f7411825c8a555a1a3e5eab9ca773431 \ | ||
144 | file://LICENCE.e100;md5=ec0f84136766df159a3ae6d02acdf5a8 \ | ||
145 | file://LICENCE.emi26;md5=2d1cd6e732b81824fe2f0fbf595b1413 \ | ||
146 | file://LICENCE.ene_firmware;md5=ed67f0f62f8f798130c296720b7d3921 \ | ||
147 | file://LICENCE.fw_sst_0f28;md5=6353931c988ad52818ae733ac61cd293 \ | ||
148 | file://LICENCE.go7007;md5=c0bb9f6aaaba55b0529ee9b30aa66beb \ | ||
149 | file://LICENSE.hfi1_firmware;md5=5e7b6e586ce7339d12689e49931ad444 \ | ||
150 | file://LICENSE.i915;md5=2b0b2e0d20984affd4490ba2cba02570 \ | ||
151 | file://LICENCE.ibt_firmware;md5=fdbee1ddfe0fb7ab0b2fcd6b454a366b \ | ||
152 | file://LICENSE.ice;md5=742ab4850f2670792940e6d15c974b2f \ | ||
153 | file://LICENSE.ice_enhanced;md5=f305cfc31b64f95f774f9edd9df0224d \ | ||
154 | file://LICENCE.IntcSST2;md5=9e7d8bea77612d7cc7d9e9b54b623062 \ | ||
155 | file://LICENSE.intel;md5=5c22a4ab607349c89ffcbb1595e493f8 \ | ||
156 | file://LICENSE.intel_vpu;md5=1e231b7287d5a5018740041c352eb58e \ | ||
157 | file://LICENSE.ipu3_firmware;md5=38fe8238c06bf7dcfd0eedbebf452c3b \ | ||
158 | file://LICENCE.it913x;md5=1fbf727bfb6a949810c4dbfa7e6ce4f8 \ | ||
159 | file://LICENSE.ivsc;md5=4f1f696a12c18dd058d3cc51006c640d \ | ||
160 | file://LICENCE.iwlwifi_firmware;md5=2ce6786e0fc11ac6e36b54bb9b799f1b \ | ||
161 | file://LICENSE.ixp4xx;md5=ddc5cd6cbc6745343926fe7ecc2cdeb2 \ | ||
162 | file://LICENCE.kaweth;md5=b1d876e562f4b3b8d391ad8395dfe03f \ | ||
163 | file://LICENCE.keyspan;md5=676af26017c45772c972ce4a75d467d9 \ | ||
164 | file://LICENCE.linaro;md5=936d91e71cf9cd30e733db4bf11661cc \ | ||
165 | file://LICENSE.Lontium;md5=4ec8dc582ff7295f39e2ca6a7b0be2b6 \ | ||
166 | file://LICENCE.mali_csffw;md5=e064aaec4d21ef856e1b76a6f5dc435f \ | ||
167 | file://LICENCE.Marvell;md5=28b6ed8bd04ba105af6e4dcd6e997772 \ | ||
168 | file://LICENCE.mediatek;md5=7c1976b63217d76ce47d0a11d8a79cf2 \ | ||
169 | file://LICENCE.microchip;md5=db753b00305675dfbf120e3f24a47277 \ | ||
170 | file://LICENSE.montage;md5=12a9f2b351f60fc9374da61c8b2f11ed \ | ||
171 | file://LICENCE.moxa;md5=1086614767d8ccf744a923289d3d4261 \ | ||
172 | file://LICENCE.myri10ge_firmware;md5=42e32fb89f6b959ca222e25ac8df8fed \ | ||
173 | file://LICENCE.Netronome;md5=4add08f2577086d44447996503cddf5f \ | ||
174 | file://LICENCE.nvidia;md5=4428a922ed3ba2ceec95f076a488ce07 \ | ||
175 | file://LICENCE.NXP;md5=58bb8ba632cd729b9ba6183bc6aed36f \ | ||
176 | file://LICENSE.nxp;md5=cca321ca1524d6a1e4fed87486cd82dc \ | ||
177 | file://LICENSE.nxp_mc_firmware;md5=9dc97e4b279b3858cae8879ae2fe5dd7 \ | ||
178 | file://LICENCE.OLPC;md5=5b917f9d8c061991be4f6f5f108719cd \ | ||
179 | file://LICENCE.open-ath9k-htc-firmware;md5=1b33c9f4d17bc4d457bdb23727046837 \ | ||
180 | file://LICENCE.phanfw;md5=954dcec0e051f9409812b561ea743bfa \ | ||
181 | file://LICENSE.powervr;md5=83045ed2a2cda15b4eaff682c98c9533 \ | ||
182 | file://LICENCE.qat_firmware;md5=72de83dfd9b87be7685ed099a39fbea4 \ | ||
183 | file://LICENSE.qcom;md5=164e3362a538eb11d3ac51e8e134294b \ | ||
184 | file://LICENSE.qcom-2;md5=165287851294f2fb8ac8cbc5e24b02b0 \ | ||
185 | file://LICENSE.qcom_yamato;md5=d0de0eeccaf1843a850bf7a6777eec5c \ | ||
186 | file://LICENCE.qla1280;md5=d6895732e622d950609093223a2c4f5d \ | ||
187 | file://LICENCE.qla2xxx;md5=505855e921b75f1be4a437ad9b79dff0 \ | ||
188 | file://LICENSE.QualcommAtheros_ar3k;md5=b5fe244fb2b532311de1472a3bc06da5 \ | ||
189 | file://LICENSE.QualcommAtheros_ath10k;md5=cb42b686ee5f5cb890275e4321db60a8 \ | ||
190 | file://LICENCE.r8a779x_usb3;md5=4c1671656153025d7076105a5da7e498 \ | ||
191 | file://LICENSE.radeon;md5=68ec28bacb3613200bca44f404c69b16 \ | ||
192 | file://LICENCE.ralink_a_mediatek_company_firmware;md5=728f1a85fd53fd67fa8d7afb080bc435 \ | ||
193 | file://LICENCE.ralink-firmware.txt;md5=ab2c269277c45476fb449673911a2dfd \ | ||
194 | file://LICENCE.rockchip;md5=5fd70190c5ed39734baceada8ecced26 \ | ||
195 | file://LICENCE.rtlwifi_firmware.txt;md5=00d06cfd3eddd5a2698948ead2ad54a5 \ | ||
196 | file://LICENSE.sdma_firmware;md5=51e8c19ecc2270f4b8ea30341ad63ce9 \ | ||
197 | file://LICENCE.siano;md5=4556c1bf830067f12ca151ad953ec2a5 \ | ||
198 | file://LICENCE.ti-connectivity;md5=3b1e9cf54aba8146dad4b735777d406f \ | ||
199 | file://LICENCE.ti-keystone;md5=3a86335d32864b0bef996bee26cc0f2c \ | ||
200 | file://LICENCE.ti-tspa;md5=d1a0eb27d0020752040190b9d51ad9be \ | ||
201 | file://LICENCE.tigon;md5=49d104a32337f4a4c89478a86ce9ae4f \ | ||
202 | file://LICENCE.typhoon;md5=43b30243a6bda91f54c8e00600c4add5 \ | ||
203 | file://LICENCE.ueagle-atm4-firmware;md5=4ed7ea6b507ccc583b9d594417714118 \ | ||
204 | file://LICENCE.via_vt6656;md5=e4159694cba42d4377a912e78a6e850f \ | ||
205 | file://LICENCE.wl1251;md5=ad3f81922bb9e197014bb187289d3b5b \ | ||
206 | file://LICENCE.xc4000;md5=0ff51d2dc49fce04814c9155081092f0 \ | ||
207 | file://LICENCE.xc5000;md5=1e170c13175323c32c7f4d0998d53f66 \ | ||
208 | file://LICENCE.xc5000c;md5=12b02efa3049db65d524aeb418dd87ca \ | ||
209 | file://LICENSE.xe;md5=c674d38774242bc0c528214721488118 \ | ||
210 | file://wfx/LICENCE.wf200;md5=4d1beff00d902c05c9c7e95a5d8eb52d \ | ||
211 | file://WHENCE;md5=${WHENCE_CHKSUM} \ | ||
212 | " | ||
213 | # WHENCE checksum is defined separately to ease overriding it if | ||
214 | # class-devupstream is selected. | ||
215 | WHENCE_CHKSUM = "3b864f69afb6609b4558a074bb428348" | ||
216 | |||
217 | # These are not common licenses, set NO_GENERIC_LICENSE for them | ||
218 | # so that the license files will be copied from fetched source | ||
219 | NO_GENERIC_LICENSE[Firmware-Abilis] = "LICENCE.Abilis" | ||
220 | NO_GENERIC_LICENSE[Firmware-adsp_sst] = "LICENCE.adsp_sst" | ||
221 | NO_GENERIC_LICENSE[Firmware-aeonsemi] = "LICENSE.aeonsemi" | ||
222 | NO_GENERIC_LICENSE[Firmware-agere] = "LICENCE.agere" | ||
223 | NO_GENERIC_LICENSE[Firmware-airoha] = "LICENSE.airoha" | ||
224 | NO_GENERIC_LICENSE[Firmware-alacritech] = "LICENCE.alacritech" | ||
225 | NO_GENERIC_LICENSE[Firmware-amdgpu] = "LICENSE.amdgpu" | ||
226 | NO_GENERIC_LICENSE[Firmware-amdisp] = "LICENSE.amdisp" | ||
227 | NO_GENERIC_LICENSE[Firmware-amdnpu] = "LICENSE.amdnpu" | ||
228 | NO_GENERIC_LICENSE[Firmware-amd_pmf] = "LICENSE.amd_pmf" | ||
229 | NO_GENERIC_LICENSE[Firmware-amd-sev] = "LICENSE.amd-sev" | ||
230 | NO_GENERIC_LICENSE[Firmware-amd-ucode] = "LICENSE.amd-ucode" | ||
231 | NO_GENERIC_LICENSE[Firmware-amlogic] = "LICENSE.amlogic" | ||
232 | NO_GENERIC_LICENSE[Firmware-amlogic_vdec] = "LICENSE.amlogic_vdec" | ||
233 | NO_GENERIC_LICENSE[Firmware-amphion_vpu] = "LICENSE.amphion_vpu" | ||
234 | NO_GENERIC_LICENSE[Firmware-atheros_firmware] = "LICENCE.atheros_firmware" | ||
235 | NO_GENERIC_LICENSE[Firmware-atmel] = "LICENSE.atmel" | ||
236 | NO_GENERIC_LICENSE[Firmware-bmi260] = "LICENSE.bmi260" | ||
237 | NO_GENERIC_LICENSE[Firmware-bnx2] = "LICENCE.bnx2" | ||
238 | NO_GENERIC_LICENSE[Firmware-bnx2x] = "LICENCE.bnx2x" | ||
239 | NO_GENERIC_LICENSE[Firmware-broadcom_bcm43xx] = "LICENCE.broadcom_bcm43xx" | ||
240 | NO_GENERIC_LICENSE[Firmware-ca0132] = "LICENCE.ca0132" | ||
241 | NO_GENERIC_LICENSE[Firmware-cadence] = "LICENCE.cadence" | ||
242 | NO_GENERIC_LICENSE[Firmware-cavium] = "LICENCE.cavium" | ||
243 | NO_GENERIC_LICENSE[Firmware-chelsio_firmware] = "LICENCE.chelsio_firmware" | ||
244 | NO_GENERIC_LICENSE[Firmware-cirrus] = "LICENSE.cirrus" | ||
245 | NO_GENERIC_LICENSE[Firmware-cnm] = "LICENCE.cnm" | ||
246 | NO_GENERIC_LICENSE[Firmware-cw1200] = "LICENCE.cw1200" | ||
247 | NO_GENERIC_LICENSE[Firmware-cw1200-sdd] = "LICENCE.cw1200-sdd" | ||
248 | NO_GENERIC_LICENSE[Firmware-cxgb3] = "LICENCE.cxgb3" | ||
249 | NO_GENERIC_LICENSE[Firmware-cypress] = "LICENCE.cypress" | ||
250 | NO_GENERIC_LICENSE[Firmware-dabusb] = "LICENCE.dabusb" | ||
251 | NO_GENERIC_LICENSE[Firmware-dib0700] = "LICENSE.dib0700" | ||
252 | NO_GENERIC_LICENSE[Firmware-e100] = "LICENCE.e100" | ||
253 | NO_GENERIC_LICENSE[Firmware-emi26] = "LICENCE.emi26" | ||
254 | NO_GENERIC_LICENSE[Firmware-ene_firmware] = "LICENCE.ene_firmware" | ||
255 | NO_GENERIC_LICENSE[Firmware-fw_sst_0f28] = "LICENCE.fw_sst_0f28" | ||
256 | NO_GENERIC_LICENSE[Firmware-go7007] = "LICENCE.go7007" | ||
257 | NO_GENERIC_LICENSE[Firmware-hfi1_firmware] = "LICENSE.hfi1_firmware" | ||
258 | NO_GENERIC_LICENSE[Firmware-i915] = "LICENSE.i915" | ||
259 | NO_GENERIC_LICENSE[Firmware-ibt_firmware] = "LICENCE.ibt_firmware" | ||
260 | NO_GENERIC_LICENSE[Firmware-ice] = "LICENSE.ice" | ||
261 | NO_GENERIC_LICENSE[Firmware-ice_enhanced] = "LICENSE.ice_enhanced" | ||
262 | NO_GENERIC_LICENSE[Firmware-IntcSST2] = "LICENCE.IntcSST2" | ||
263 | NO_GENERIC_LICENSE[Firmware-intel] = "LICENSE.intel" | ||
264 | NO_GENERIC_LICENSE[Firmware-intel_vpu] = "LICENSE.intel_vpu" | ||
265 | NO_GENERIC_LICENSE[Firmware-ipu3_firmware] = "LICENSE.ipu3_firmware" | ||
266 | NO_GENERIC_LICENSE[Firmware-it913x] = "LICENCE.it913x" | ||
267 | NO_GENERIC_LICENSE[Firmware-ivsc] = "LICENSE.ivsc" | ||
268 | NO_GENERIC_LICENSE[Firmware-iwlwifi_firmware] = "LICENCE.iwlwifi_firmware" | ||
269 | NO_GENERIC_LICENSE[Firmware-ixp4xx] = "LICENSE.ixp4xx" | ||
270 | NO_GENERIC_LICENSE[Firmware-kaweth] = "LICENCE.kaweth" | ||
271 | NO_GENERIC_LICENSE[Firmware-keyspan] = "LICENCE.keyspan" | ||
272 | NO_GENERIC_LICENSE[Firmware-linaro] = "LICENCE.linaro" | ||
273 | NO_GENERIC_LICENSE[Firmware-Lontium] = "LICENSE.Lontium" | ||
274 | NO_GENERIC_LICENSE[Firmware-mali_csffw] = "LICENCE.mali_csffw" | ||
275 | NO_GENERIC_LICENSE[Firmware-Marvell] = "LICENCE.Marvell" | ||
276 | NO_GENERIC_LICENSE[Firmware-mediatek] = "LICENCE.mediatek" | ||
277 | NO_GENERIC_LICENSE[Firmware-microchip] = "LICENCE.microchip" | ||
278 | NO_GENERIC_LICENSE[Firmware-montage] = "LICENSE.montage" | ||
279 | NO_GENERIC_LICENSE[Firmware-moxa] = "LICENCE.moxa" | ||
280 | NO_GENERIC_LICENSE[Firmware-myri10ge_firmware] = "LICENCE.myri10ge_firmware" | ||
281 | NO_GENERIC_LICENSE[Firmware-netronome] = "LICENCE.Netronome" | ||
282 | NO_GENERIC_LICENSE[Firmware-nvidia] = "LICENCE.nvidia" | ||
283 | NO_GENERIC_LICENSE[Firmware-nxp] = "LICENSE.nxp" | ||
284 | NO_GENERIC_LICENSE[Firmware-nxp_mc_firmware] = "LICENSE.nxp_mc_firmware" | ||
285 | NO_GENERIC_LICENSE[Firmware-OLPC] = "LICENCE.OLPC" | ||
286 | NO_GENERIC_LICENSE[Firmware-ath9k-htc] = "LICENCE.open-ath9k-htc-firmware" | ||
287 | NO_GENERIC_LICENSE[Firmware-phanfw] = "LICENCE.phanfw" | ||
288 | NO_GENERIC_LICENSE[Firmware-powervr] = "LICENSE.powervr" | ||
289 | NO_GENERIC_LICENSE[Firmware-qat] = "LICENCE.qat_firmware" | ||
290 | NO_GENERIC_LICENSE[Firmware-qcom] = "LICENSE.qcom" | ||
291 | NO_GENERIC_LICENSE[Firmware-qcom-2] = "LICENSE.qcom-2" | ||
292 | NO_GENERIC_LICENSE[Firmware-qcom-yamato] = "LICENSE.qcom_yamato" | ||
293 | NO_GENERIC_LICENSE[Firmware-qla1280] = "LICENCE.qla1280" | ||
294 | NO_GENERIC_LICENSE[Firmware-qla2xxx] = "LICENCE.qla2xxx" | ||
295 | NO_GENERIC_LICENSE[Firmware-qualcommAthos_ar3k] = "LICENSE.QualcommAtheros_ar3k" | ||
296 | NO_GENERIC_LICENSE[Firmware-qualcommAthos_ath10k] = "LICENSE.QualcommAtheros_ath10k" | ||
297 | NO_GENERIC_LICENSE[Firmware-r8a779x_usb3] = "LICENCE.r8a779x_usb3" | ||
298 | NO_GENERIC_LICENSE[Firmware-radeon] = "LICENSE.radeon" | ||
299 | NO_GENERIC_LICENSE[Firmware-ralink_a_mediatek_company_firmware] = "LICENCE.ralink_a_mediatek_company_firmware" | ||
300 | NO_GENERIC_LICENSE[Firmware-ralink-firmware] = "LICENCE.ralink-firmware.txt" | ||
301 | NO_GENERIC_LICENSE[Firmware-rockchip] = "LICENCE.rockchip" | ||
302 | NO_GENERIC_LICENSE[Firmware-rtlwifi_firmware] = "LICENCE.rtlwifi_firmware.txt" | ||
303 | NO_GENERIC_LICENSE[Firmware-siano] = "LICENCE.siano" | ||
304 | NO_GENERIC_LICENSE[Firmware-imx-sdma_firmware] = "LICENSE.sdma_firmware" | ||
305 | NO_GENERIC_LICENSE[Firmware-ti-connectivity] = "LICENCE.ti-connectivity" | ||
306 | NO_GENERIC_LICENSE[Firmware-ti-keystone] = "LICENCE.ti-keystone" | ||
307 | NO_GENERIC_LICENSE[Firmware-ti-tspa] = "LICENCE.ti-tspa" | ||
308 | NO_GENERIC_LICENSE[Firmware-tigon] = "LICENCE.tigon" | ||
309 | NO_GENERIC_LICENSE[Firmware-typhoon] = "LICENCE.typhoon" | ||
310 | NO_GENERIC_LICENSE[Firmware-ueagle-atm4-firmware] = "LICENCE.ueagle-atm4-firmware" | ||
311 | NO_GENERIC_LICENSE[Firmware-via_vt6656] = "LICENCE.via_vt6656" | ||
312 | NO_GENERIC_LICENSE[Firmware-wfx] = "wfx/LICENCE.wf200" | ||
313 | NO_GENERIC_LICENSE[Firmware-wl1251] = "LICENCE.wl1251" | ||
314 | NO_GENERIC_LICENSE[Firmware-xc4000] = "LICENCE.xc4000" | ||
315 | NO_GENERIC_LICENSE[Firmware-xc5000] = "LICENCE.xc5000" | ||
316 | NO_GENERIC_LICENSE[Firmware-xc5000c] = "LICENCE.xc5000c" | ||
317 | NO_GENERIC_LICENSE[Firmware-xe] = "LICENSE.xe" | ||
318 | NO_GENERIC_LICENSE[WHENCE] = "WHENCE" | ||
319 | |||
320 | PE = "1" | ||
321 | |||
322 | SRC_URI = "\ | ||
323 | ${KERNELORG_MIRROR}/linux/kernel/firmware/${BPN}-${PV}.tar.xz \ | ||
324 | " | ||
325 | |||
326 | BBCLASSEXTEND = "devupstream:target" | ||
327 | SRC_URI:class-devupstream = "git://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git;protocol=https;branch=main" | ||
328 | # Pin this to the 20220509 release, override this in local.conf | ||
329 | SRCREV:class-devupstream ?= "b19cbdca78ab2adfd210c91be15a22568e8b8cae" | ||
330 | |||
331 | SRC_URI[sha256sum] = "edefb1d2a538367abf9558802fee3cd135ebb19a4a5890c8eefb3416a92a6b89" | ||
332 | |||
333 | inherit allarch | ||
334 | |||
335 | CLEANBROKEN = "1" | ||
336 | |||
337 | PACKAGECONFIG ??= "" | ||
338 | PACKAGECONFIG[deduplicate] = ",,rdfind-native" | ||
339 | |||
340 | # Possible values are "xz" and "zst". | ||
341 | FIRMWARE_COMPRESSION ?= "" | ||
342 | |||
343 | # Specifying -j requires GNU parallel, which is a part of meta-oe | ||
344 | PARALLEL_MAKE = "" | ||
345 | |||
346 | def fw_compr_suffix(d): | ||
347 | compr = d.getVar('FIRMWARE_COMPRESSION') | ||
348 | if compr == '': | ||
349 | return '' | ||
350 | if compr == 'zstd': | ||
351 | compr = 'zst' | ||
352 | return '-' + compr | ||
353 | |||
354 | do_compile() { | ||
355 | : | ||
356 | } | ||
357 | |||
358 | do_install() { | ||
359 | sed -i 's:^./check_whence.py:#./check_whence.py:' ${S}/copy-firmware.sh | ||
360 | |||
361 | oe_runmake 'DESTDIR=${D}' 'FIRMWAREDIR=${nonarch_base_libdir}/firmware' install${@fw_compr_suffix(d)} | ||
362 | if [ "${@bb.utils.contains('PACKAGECONFIG', 'deduplicate', '1', '0', d)}" = "1" ]; then | ||
363 | oe_runmake 'DESTDIR=${D}' 'FIRMWAREDIR=${nonarch_base_libdir}/firmware' dedup | ||
364 | fi | ||
365 | cp LICEN[CS]E.* WHENCE ${D}${nonarch_base_libdir}/firmware/ | ||
366 | cp wfx/LICEN[CS]E.* ${D}${nonarch_base_libdir}/firmware/wfx/ | ||
367 | } | ||
368 | |||
369 | PACKAGES =+ "${PN}-amphion-vpu-license ${PN}-amphion-vpu \ | ||
370 | ${PN}-cw1200-license ${PN}-cw1200 \ | ||
371 | ${PN}-ralink-license ${PN}-ralink \ | ||
372 | ${PN}-mt76x-license ${PN}-mt7601u ${PN}-mt7650 ${PN}-mt76x2 \ | ||
373 | ${PN}-radeon-license ${PN}-radeon \ | ||
374 | ${PN}-amdgpu-license ${PN}-amdgpu \ | ||
375 | ${PN}-amdgpu-aldebaran \ | ||
376 | ${PN}-amdgpu-carrizo \ | ||
377 | ${PN}-amdgpu-cezanne \ | ||
378 | ${PN}-amdgpu-fiji \ | ||
379 | ${PN}-amdgpu-hawaii \ | ||
380 | ${PN}-amdgpu-navi10 \ | ||
381 | ${PN}-amdgpu-navi14 \ | ||
382 | ${PN}-amdgpu-navi21 \ | ||
383 | ${PN}-amdgpu-navi22 \ | ||
384 | ${PN}-amdgpu-navi23 \ | ||
385 | ${PN}-amdgpu-navi24 \ | ||
386 | ${PN}-amdgpu-navi31 \ | ||
387 | ${PN}-amdgpu-navi32 \ | ||
388 | ${PN}-amdgpu-oland \ | ||
389 | ${PN}-amdgpu-polaris10 \ | ||
390 | ${PN}-amdgpu-polaris11 \ | ||
391 | ${PN}-amdgpu-polaris12 \ | ||
392 | ${PN}-amdgpu-raven \ | ||
393 | ${PN}-amdgpu-rembrandt \ | ||
394 | ${PN}-amdgpu-renoir \ | ||
395 | ${PN}-amdgpu-stoney \ | ||
396 | ${PN}-amdgpu-tonga \ | ||
397 | ${PN}-amdgpu-topaz \ | ||
398 | ${PN}-amdgpu-vega10 \ | ||
399 | ${PN}-amdgpu-vega12 \ | ||
400 | ${PN}-amdgpu-misc \ | ||
401 | ${PN}-marvell-license ${PN}-pcie8897 ${PN}-pcie8997 \ | ||
402 | ${PN}-mediatek-license ${PN}-mediatek \ | ||
403 | ${PN}-microchip-license ${PN}-microchip \ | ||
404 | ${PN}-moxa-license ${PN}-moxa \ | ||
405 | ${PN}-sd8686 ${PN}-sd8688 ${PN}-sd8787 ${PN}-sd8797 ${PN}-sd8801 \ | ||
406 | ${PN}-sd8887 ${PN}-sd8897 ${PN}-sd8997 ${PN}-usb8997 \ | ||
407 | ${PN}-ti-connectivity-license ${PN}-wlcommon ${PN}-wl12xx ${PN}-wl18xx ${PN}-cc33xx \ | ||
408 | ${PN}-ti-keystone-license ${PN}-ti-keystone \ | ||
409 | ${PN}-vt6656-license ${PN}-vt6656 \ | ||
410 | ${PN}-rs9113 ${PN}-rs9116 \ | ||
411 | ${PN}-rtl-license ${PN}-rtl8188 ${PN}-rtl8192cu ${PN}-rtl8192ce ${PN}-rtl8192su ${PN}-rtl8723 ${PN}-rtl8821 \ | ||
412 | ${PN}-rtl8761 \ | ||
413 | ${PN}-rtl8168 \ | ||
414 | ${PN}-rtl8822 \ | ||
415 | ${PN}-rtl-nic \ | ||
416 | ${PN}-cypress-license \ | ||
417 | ${PN}-broadcom-license \ | ||
418 | ${PN}-bcm-0bb4-0306 \ | ||
419 | ${PN}-bcm43143 \ | ||
420 | ${PN}-bcm43236b \ | ||
421 | ${PN}-bcm43241b0 \ | ||
422 | ${PN}-bcm43241b4 \ | ||
423 | ${PN}-bcm43241b5 \ | ||
424 | ${PN}-bcm43242a \ | ||
425 | ${PN}-bcm4329 \ | ||
426 | ${PN}-bcm4329-fullmac \ | ||
427 | ${PN}-bcm4330 \ | ||
428 | ${PN}-bcm4334 \ | ||
429 | ${PN}-bcm43340 \ | ||
430 | ${PN}-bcm4335 \ | ||
431 | ${PN}-bcm43362 \ | ||
432 | ${PN}-bcm4339 \ | ||
433 | ${PN}-bcm43430 \ | ||
434 | ${PN}-bcm43430a0 \ | ||
435 | ${PN}-bcm43455 \ | ||
436 | ${PN}-bcm4350 \ | ||
437 | ${PN}-bcm4350c2 \ | ||
438 | ${PN}-bcm4354 \ | ||
439 | ${PN}-bcm4356 \ | ||
440 | ${PN}-bcm4356-pcie \ | ||
441 | ${PN}-bcm43569 \ | ||
442 | ${PN}-bcm43570 \ | ||
443 | ${PN}-bcm4358 \ | ||
444 | ${PN}-bcm43602 \ | ||
445 | ${PN}-bcm4366b \ | ||
446 | ${PN}-bcm4366c \ | ||
447 | ${PN}-bcm4371 \ | ||
448 | ${PN}-bcm4373 \ | ||
449 | ${PN}-bcm43xx \ | ||
450 | ${PN}-bcm43xx-hdr \ | ||
451 | ${PN}-cirrus-license ${PN}-cirrus \ | ||
452 | ${PN}-cnm-license ${PN}-cnm \ | ||
453 | ${PN}-atheros-license ${PN}-ar5523 ${PN}-ar9170 ${PN}-ath6k ${PN}-ath9k ${PN}-ath3k \ | ||
454 | ${PN}-carl9170 \ | ||
455 | ${PN}-qcom-qcm2290-wifi ${PN}-qcom-qrb4210-wifi ${PN}-qcom-sdm845-modem \ | ||
456 | ${PN}-ar3k-license ${PN}-ar3k \ | ||
457 | ${PN}-ath10k-license ${PN}-ath10k \ | ||
458 | ${PN}-ath10k-qca4019 \ | ||
459 | ${PN}-ath10k-qca6174 \ | ||
460 | ${PN}-ath10k-qca9377 \ | ||
461 | ${PN}-ath10k-qca9887 \ | ||
462 | ${PN}-ath10k-qca9888 \ | ||
463 | ${PN}-ath10k-qca988x \ | ||
464 | ${PN}-ath10k-qca9984 \ | ||
465 | ${PN}-ath10k-qca99x0 \ | ||
466 | ${PN}-ath10k-wcn3990 \ | ||
467 | ${PN}-ath10k-misc \ | ||
468 | ${PN}-ath11k \ | ||
469 | ${PN}-ath11k-ipq5018 \ | ||
470 | ${PN}-ath11k-ipq6018 \ | ||
471 | ${PN}-ath11k-ipq8074 \ | ||
472 | ${PN}-ath11k-qca2066 \ | ||
473 | ${PN}-ath11k-qca6390 \ | ||
474 | ${PN}-ath11k-qca6698aq \ | ||
475 | ${PN}-ath11k-qcn9074 \ | ||
476 | ${PN}-ath11k-wcn6750 \ | ||
477 | ${PN}-ath11k-wcn6855 \ | ||
478 | ${PN}-ath11k-misc \ | ||
479 | ${PN}-ath12k \ | ||
480 | ${PN}-ath12k-qcn9274 \ | ||
481 | ${PN}-ath12k-wcn7850 \ | ||
482 | ${PN}-ath12k-misc \ | ||
483 | ${PN}-qca \ | ||
484 | ${PN}-qca-qca61x4-serial \ | ||
485 | ${PN}-qca-qca61x4-usb \ | ||
486 | ${PN}-qca-qca6390 \ | ||
487 | ${PN}-qca-qca6698 \ | ||
488 | ${PN}-qca-wcn3950 \ | ||
489 | ${PN}-qca-wcn3988 \ | ||
490 | ${PN}-qca-wcn399x \ | ||
491 | ${PN}-qca-wcn6750 \ | ||
492 | ${PN}-qca-qca2066 \ | ||
493 | ${PN}-qca-wcn7850 \ | ||
494 | ${PN}-qca-misc \ | ||
495 | \ | ||
496 | ${PN}-imx-sdma-license ${PN}-imx-sdma-imx6q ${PN}-imx-sdma-imx7d \ | ||
497 | \ | ||
498 | ${PN}-iwlwifi-license ${PN}-iwlwifi \ | ||
499 | ${PN}-iwlwifi-135-6 \ | ||
500 | ${PN}-iwlwifi-3160-7 ${PN}-iwlwifi-3160-8 ${PN}-iwlwifi-3160-9 \ | ||
501 | ${PN}-iwlwifi-3160-10 ${PN}-iwlwifi-3160-12 ${PN}-iwlwifi-3160-13 \ | ||
502 | ${PN}-iwlwifi-3160-16 ${PN}-iwlwifi-3160-17 \ | ||
503 | ${PN}-iwlwifi-6000-4 ${PN}-iwlwifi-6000g2a-5 ${PN}-iwlwifi-6000g2a-6 \ | ||
504 | ${PN}-iwlwifi-6000g2b-5 ${PN}-iwlwifi-6000g2b-6 \ | ||
505 | ${PN}-iwlwifi-6050-4 ${PN}-iwlwifi-6050-5 \ | ||
506 | ${PN}-iwlwifi-7260 \ | ||
507 | ${PN}-iwlwifi-7265 \ | ||
508 | ${PN}-iwlwifi-7265d ${PN}-iwlwifi-8000c ${PN}-iwlwifi-8265 \ | ||
509 | ${PN}-iwlwifi-9000 \ | ||
510 | ${PN}-iwlwifi-9260 \ | ||
511 | ${PN}-iwlwifi-misc \ | ||
512 | ${PN}-ibt-license ${PN}-ibt \ | ||
513 | ${PN}-ibt-11-5 ${PN}-ibt-12-16 ${PN}-ibt-hw-37-7 ${PN}-ibt-hw-37-8 \ | ||
514 | ${PN}-ibt-17 \ | ||
515 | ${PN}-ibt-18 \ | ||
516 | ${PN}-ibt-20 \ | ||
517 | ${PN}-ibt-misc \ | ||
518 | ${PN}-i915-license ${PN}-i915 \ | ||
519 | ${PN}-ice-license ${PN}-ice \ | ||
520 | ${PN}-ice-enhanced-license ${PN}-ice-enhanced \ | ||
521 | ${PN}-adsp-sst-license ${PN}-adsp-sst \ | ||
522 | ${PN}-bnx2 \ | ||
523 | ${PN}-bnx2x \ | ||
524 | ${PN}-liquidio \ | ||
525 | ${PN}-linaro-license \ | ||
526 | ${PN}-mali-csffw-arch108 ${PN}-mali-csffw-license \ | ||
527 | ${PN}-mellanox \ | ||
528 | ${PN}-nvidia-license \ | ||
529 | ${PN}-nvidia-tegra-k1 ${PN}-nvidia-tegra \ | ||
530 | ${PN}-nvidia-gpu \ | ||
531 | ${PN}-nxp-license \ | ||
532 | ${PN}-nxp8987-sdio \ | ||
533 | ${PN}-nxp8997-common \ | ||
534 | ${PN}-nxp8997-pcie \ | ||
535 | ${PN}-nxp8997-sdio \ | ||
536 | ${PN}-nxp9098-common \ | ||
537 | ${PN}-nxp9098-pcie \ | ||
538 | ${PN}-nxp9098-sdio \ | ||
539 | ${PN}-nxpiw416-sdio \ | ||
540 | ${PN}-nxpiw612-sdio \ | ||
541 | ${PN}-nxp-mc-license ${PN}-nxp-mc \ | ||
542 | ${PN}-netronome-license ${PN}-netronome \ | ||
543 | ${PN}-olpc-license ${PN}-olpc \ | ||
544 | ${PN}-phanfw-license ${PN}-phanfw \ | ||
545 | ${PN}-powervr-license ${PN}-powervr \ | ||
546 | ${PN}-prestera \ | ||
547 | ${PN}-qat ${PN}-qat-license \ | ||
548 | ${PN}-qed \ | ||
549 | ${PN}-qcom-license ${PN}-qcom-2-license ${PN}-qcom-yamato-license \ | ||
550 | ${PN}-qcom-aic100 ${PN}-qcom-qdu100 \ | ||
551 | ${PN}-qcom-venus-1.8 ${PN}-qcom-venus-4.2 ${PN}-qcom-venus-5.2 ${PN}-qcom-venus-5.4 ${PN}-qcom-venus-6.0 \ | ||
552 | ${PN}-qcom-vpu \ | ||
553 | ${PN}-qcom-adreno-a2xx ${PN}-qcom-adreno-a3xx ${PN}-qcom-adreno-a4xx ${PN}-qcom-adreno-a530 \ | ||
554 | ${PN}-qcom-adreno-a623 ${PN}-qcom-adreno-a630 ${PN}-qcom-adreno-a650 ${PN}-qcom-adreno-a660 \ | ||
555 | ${PN}-qcom-adreno-a663 ${PN}-qcom-adreno-a702 ${PN}-qcom-adreno-g715 ${PN}-qcom-adreno-g750 \ | ||
556 | ${PN}-qcom-apq8016-modem ${PN}-qcom-apq8016-wifi \ | ||
557 | ${PN}-qcom-apq8096-adreno ${PN}-qcom-apq8096-audio ${PN}-qcom-apq8096-modem \ | ||
558 | ${PN}-qcom-qcm2290-adreno ${PN}-qcom-qcm2290-audio ${PN}-qcom-qcm2290-modem \ | ||
559 | ${PN}-qcom-qcm6490-adreno ${PN}-qcom-qcm6490-audio ${PN}-qcom-qcm6490-compute \ | ||
560 | ${PN}-qcom-qcm6490-ipa ${PN}-qcom-qcm6490-wifi ${PN}-qcom-qcm6490-qupv3fw \ | ||
561 | ${PN}-qcom-qcs615-adreno \ | ||
562 | ${PN}-qcom-qcs8300-adreno ${PN}-qcom-qcs8300-audio ${PN}-qcom-qcs8300-compute \ | ||
563 | ${PN}-qcom-qcs8300-generalpurpose ${PN}-qcom-qcs8300-qupv3fw \ | ||
564 | ${PN}-qcom-qrb4210-adreno \ | ||
565 | ${PN}-qcom-qrb4210-audio ${PN}-qcom-qrb4210-compute ${PN}-qcom-qrb4210-modem \ | ||
566 | ${PN}-qcom-sa8775p-adreno ${PN}-qcom-sa8775p-audio ${PN}-qcom-sa8775p-compute \ | ||
567 | ${PN}-qcom-sa8775p-generalpurpose ${PN}-qcom-sa8775p-qupv3fw \ | ||
568 | ${PN}-qcom-sc8280xp-lenovo-x13s-compat \ | ||
569 | ${PN}-qcom-sc8280xp-lenovo-x13s-audio \ | ||
570 | ${PN}-qcom-sc8280xp-lenovo-x13s-adreno \ | ||
571 | ${PN}-qcom-sc8280xp-lenovo-x13s-compute \ | ||
572 | ${PN}-qcom-sc8280xp-lenovo-x13s-sensors \ | ||
573 | ${PN}-qcom-sc8280xp-lenovo-x13s-vpu \ | ||
574 | ${PN}-qcom-sdm845-adreno ${PN}-qcom-sdm845-audio ${PN}-qcom-sdm845-compute \ | ||
575 | ${PN}-qcom-sdm845-thundercomm-db845c-sensors \ | ||
576 | ${PN}-qcom-sm8250-adreno ${PN}-qcom-sm8250-audio ${PN}-qcom-sm8250-compute \ | ||
577 | ${PN}-qcom-sm8250-thundercomm-rb5-sensors \ | ||
578 | ${PN}-qcom-sm8550-audio-tplg \ | ||
579 | ${PN}-qcom-sm8650-audio-tplg \ | ||
580 | ${PN}-qcom-x1e80100-adreno ${PN}-qcom-x1e80100-audio \ | ||
581 | ${PN}-qcom-x1e80100-lenovo-t14s-g6-adreno ${PN}-qcom-x1e80100-lenovo-t14s-g6-audio \ | ||
582 | ${PN}-qcom-x1e80100-lenovo-t14s-g6-compute ${PN}-qcom-x1e80100-lenovo-t14s-g6-vpu \ | ||
583 | ${PN}-qcom-x1e80100-lenovo-yoga-slim7x-adreno ${PN}-qcom-x1e80100-lenovo-yoga-slim7x-audio \ | ||
584 | ${PN}-qcom-x1e80100-lenovo-yoga-slim7x-compute ${PN}-qcom-x1e80100-lenovo-yoga-slim7x-vpu \ | ||
585 | ${PN}-qcom-x1p42100-adreno \ | ||
586 | ${PN}-qla2xxx ${PN}-qla2xxx-license \ | ||
587 | ${PN}-rockchip-license ${PN}-rockchip-dptx \ | ||
588 | ${PN}-amlogic-vdec-license ${PN}-amlogic-vdec \ | ||
589 | ${PN}-lt9611uxc ${PN}-lontium-license \ | ||
590 | ${PN}-wfx-license ${PN}-wfx \ | ||
591 | ${PN}-whence-license \ | ||
592 | ${PN}-wl1251-license ${PN}-wl1251 \ | ||
593 | ${PN}-xc4000-license ${PN}-xc4000 \ | ||
594 | ${PN}-xc5000-license ${PN}-xc5000 \ | ||
595 | ${PN}-xc5000c-license ${PN}-xc5000c \ | ||
596 | ${PN}-license \ | ||
597 | " | ||
598 | |||
599 | # For Amphion VPU | ||
600 | LICENSE:${PN}-amphion-vpu = "Firmware-amphion_vpu" | ||
601 | LICENSE:${PN}-amphion-vpu-license = "Firmware-amphion_vpu" | ||
602 | |||
603 | FILES:${PN}-amphion-vpu = "${nonarch_base_libdir}/firmware/amphion/*" | ||
604 | FILES:${PN}-amphion-vpu-license = " \ | ||
605 | ${nonarch_base_libdir}/firmware/LICENSE.amphion_vpu \ | ||
606 | " | ||
607 | RDEPENDS:${PN}-amphion-vpu += "${PN}-amphion-vpu-license" | ||
608 | |||
609 | # For cw1200 | ||
610 | LICENSE:${PN}-cw1200 = "Firmware-cw1200" | ||
611 | LICENSE:${PN}-cw1200-license = "Firmware-cw1200" | ||
612 | |||
613 | FILES:${PN}-cw1200 = "${nonarch_base_libdir}/firmware/wsm_22.bin*" | ||
614 | FILES:${PN}-cw1200-license = "${nonarch_base_libdir}/firmware/LICENCE.cw1200" | ||
615 | |||
616 | RDEPENDS:${PN}-cw1200 += "${PN}-cw1200-license" | ||
617 | |||
618 | # For atheros | ||
619 | LICENSE:${PN}-ar5523 = "Firmware-atheros_firmware" | ||
620 | LICENSE:${PN}-ar9170 = "Firmware-atheros_firmware" | ||
621 | LICENSE:${PN}-ath3k = "Firmware-atheros_firmware" | ||
622 | LICENSE:${PN}-ath6k = "Firmware-atheros_firmware" | ||
623 | LICENSE:${PN}-ath9k = "Firmware-atheros_firmware" | ||
624 | LICENSE:${PN}-atheros-license = "Firmware-atheros_firmware" | ||
625 | |||
626 | FILES:${PN}-atheros-license = "${nonarch_base_libdir}/firmware/LICENCE.atheros_firmware" | ||
627 | FILES:${PN}-ar5523 = " \ | ||
628 | ${nonarch_base_libdir}/firmware/ar5523.bin* \ | ||
629 | " | ||
630 | FILES:${PN}-ar9170 = " \ | ||
631 | ${nonarch_base_libdir}/firmware/ar9170*.fw* \ | ||
632 | " | ||
633 | FILES:${PN}-ath3k = " \ | ||
634 | ${nonarch_base_libdir}/firmware/ath3k*fw* \ | ||
635 | " | ||
636 | FILES:${PN}-ath6k = " \ | ||
637 | ${nonarch_base_libdir}/firmware/ath6k \ | ||
638 | " | ||
639 | FILES:${PN}-ath9k = " \ | ||
640 | ${nonarch_base_libdir}/firmware/ar9271.fw* \ | ||
641 | ${nonarch_base_libdir}/firmware/ar7010*.fw* \ | ||
642 | ${nonarch_base_libdir}/firmware/htc_9271.fw* \ | ||
643 | ${nonarch_base_libdir}/firmware/htc_7010.fw* \ | ||
644 | ${nonarch_base_libdir}/firmware/ath9k_htc/htc_7010-1.4.0.fw* \ | ||
645 | ${nonarch_base_libdir}/firmware/ath9k_htc/htc_9271-1.4.0.fw* \ | ||
646 | " | ||
647 | |||
648 | RDEPENDS:${PN}-ar5523 += "${PN}-atheros-license" | ||
649 | RDEPENDS:${PN}-ar9170 += "${PN}-atheros-license" | ||
650 | RDEPENDS:${PN}-ath6k += "${PN}-atheros-license" | ||
651 | RDEPENDS:${PN}-ath9k += "${PN}-atheros-license" | ||
652 | |||
653 | # For carl9170 | ||
654 | |||
655 | FILES:${PN}-carl9170 = " \ | ||
656 | ${nonarch_base_libdir}/firmware/carl9170*.fw* \ | ||
657 | " | ||
658 | LICENSE:${PN}-carl9170 = "GPL-2.0-or-later" | ||
659 | |||
660 | # For QualCommAthos | ||
661 | LICENSE:${PN}-ar3k = "Firmware-qualcommAthos_ar3k & Firmware-atheros_firmware" | ||
662 | LICENSE:${PN}-ar3k-license = "Firmware-qualcommAthos_ar3k" | ||
663 | LICENSE:${PN}-ath10k = "Firmware-qualcommAthos_ath10k" | ||
664 | LICENSE:${PN}-ath10k-qca4019 = "Firmware-qualcommAthos_ath10k" | ||
665 | LICENSE:${PN}-ath10k-qca6174 = "Firmware-qualcommAthos_ath10k" | ||
666 | LICENSE:${PN}-ath10k-qca9377 = "Firmware-qualcommAthos_ath10k" | ||
667 | LICENSE:${PN}-ath10k-qca9887 = "Firmware-qualcommAthos_ath10k" | ||
668 | LICENSE:${PN}-ath10k-qca9888 = "Firmware-qualcommAthos_ath10k" | ||
669 | LICENSE:${PN}-ath10k-qca988x = "Firmware-qualcommAthos_ath10k" | ||
670 | LICENSE:${PN}-ath10k-qca9984 = "Firmware-qualcommAthos_ath10k" | ||
671 | LICENSE:${PN}-ath10k-qca99x0 = "Firmware-qualcommAthos_ath10k" | ||
672 | LICENSE:${PN}-ath10k-wcn3990 = "Firmware-qualcommAthos_ath10k" | ||
673 | LICENSE:${PN}-ath10k-misc = "Firmware-qualcommAthos_ath10k" | ||
674 | LICENSE:${PN}-ath10k-license = "Firmware-qualcommAthos_ath10k" | ||
675 | LICENSE:${PN}-ath11k = "Firmware-qualcommAthos_ath10k" | ||
676 | LICENSE:${PN}-ath11k-ipq5018 = "Firmware-qualcommAthos_ath10k" | ||
677 | LICENSE:${PN}-ath11k-ipq6018 = "Firmware-qualcommAthos_ath10k" | ||
678 | LICENSE:${PN}-ath11k-ipq8074 = "Firmware-qualcommAthos_ath10k" | ||
679 | LICENSE:${PN}-ath11k-qca2066 = "Firmware-qualcommAthos_ath10k" | ||
680 | LICENSE:${PN}-ath11k-qca6390 = "Firmware-qualcommAthos_ath10k" | ||
681 | LICENSE:${PN}-ath11k-qca6698aq = "Firmware-qualcommAthos_ath10k" | ||
682 | LICENSE:${PN}-ath11k-qcn9074 = "Firmware-qualcommAthos_ath10k" | ||
683 | LICENSE:${PN}-ath11k-wcn6750 = "Firmware-qualcommAthos_ath10k" | ||
684 | LICENSE:${PN}-ath11k-wcn6855 = "Firmware-qualcommAthos_ath10k" | ||
685 | LICENSE:${PN}-ath11k-misc = "Firmware-qualcommAthos_ath10k" | ||
686 | LICENSE:${PN}-ath12k = "Firmware-qualcommAthos_ath10k" | ||
687 | LICENSE:${PN}-ath12k-qcn9274 = "Firmware-qualcommAthos_ath10k" | ||
688 | LICENSE:${PN}-ath12k-wcn7850 = "Firmware-qualcommAthos_ath10k" | ||
689 | LICENSE:${PN}-ath12k-misc = "Firmware-qualcommAthos_ath10k" | ||
690 | LICENSE:${PN}-qca-qca61x4-serial = "Firmware-qualcommAthos_ath10k" | ||
691 | LICENSE:${PN}-qca-qca61x4-usb = "Firmware-qualcommAthos_ath10k" | ||
692 | LICENSE:${PN}-qca-qca6390 = "Firmware-qualcommAthos_ath10k" | ||
693 | LICENSE:${PN}-qca-qca6698 = "Firmware-qualcommAthos_ath10k" | ||
694 | LICENSE:${PN}-qca-wcn3950 = "Firmware-qcom" | ||
695 | LICENSE:${PN}-qca-wcn3988 = "Firmware-qcom" | ||
696 | LICENSE:${PN}-qca-wcn399x = "Firmware-qualcommAthos_ath10k" | ||
697 | LICENSE:${PN}-qca-wcn6750 = "Firmware-qualcommAthos_ath10k" | ||
698 | LICENSE:${PN}-qca-qca2066 = "Firmware-qualcommAthos_ath10k" | ||
699 | LICENSE:${PN}-qca-wcn7850 = "Firmware-qcom" | ||
700 | LICENSE:${PN}-qca-misc = "Firmware-qualcommAthos_ath10k & Firmware-qcom" | ||
701 | |||
702 | FILES:${PN}-ar3k-license = "${nonarch_base_libdir}/firmware/LICENSE.QualcommAtheros_ar3k" | ||
703 | FILES:${PN}-ar3k = " \ | ||
704 | ${nonarch_base_libdir}/firmware/ar3k \ | ||
705 | " | ||
706 | |||
707 | FILES:${PN}-ath10k-license = "${nonarch_base_libdir}/firmware/LICENSE.QualcommAtheros_ath10k" | ||
708 | FILES:${PN}-ath10k-qca4019 = "${nonarch_base_libdir}/firmware/ath10k/QCA4019" | ||
709 | FILES:${PN}-ath10k-qca6174 = "${nonarch_base_libdir}/firmware/ath10k/QCA6174" | ||
710 | FILES:${PN}-ath10k-qca9377 = "${nonarch_base_libdir}/firmware/ath10k/QCA9377" | ||
711 | FILES:${PN}-ath10k-qca9887 = "${nonarch_base_libdir}/firmware/ath10k/QCA9887" | ||
712 | FILES:${PN}-ath10k-qca9888 = "${nonarch_base_libdir}/firmware/ath10k/QCA9888" | ||
713 | FILES:${PN}-ath10k-qca988x = "${nonarch_base_libdir}/firmware/ath10k/QCA988X" | ||
714 | FILES:${PN}-ath10k-qca9984 = "${nonarch_base_libdir}/firmware/ath10k/QCA9984" | ||
715 | FILES:${PN}-ath10k-qca99x0 = "${nonarch_base_libdir}/firmware/ath10k/QCA99X0" | ||
716 | FILES:${PN}-ath10k-wcn3990 = "${nonarch_base_libdir}/firmware/ath10k/WCN3990" | ||
717 | FILES:${PN}-ath10k-misc = "${nonarch_base_libdir}/firmware/ath10k/*" | ||
718 | # -ath10k is a virtual package that depends upon all ath10k packages. | ||
719 | ALLOW_EMPTY:${PN}-ath10k = "1" | ||
720 | # -ath10k-misc is a catch all package that includes all the ath10k | ||
721 | # firmwares that are not already included in other -ath10k- packages. | ||
722 | ALLOW_EMPTY:${PN}-ath10k-misc = "1" | ||
723 | |||
724 | FILES:${PN}-ath11k-ipq5018 = "${nonarch_base_libdir}/firmware/ath11k/IPQ5018" | ||
725 | FILES:${PN}-ath11k-ipq6018 = "${nonarch_base_libdir}/firmware/ath11k/IPQ6018" | ||
726 | FILES:${PN}-ath11k-ipq8074 = "${nonarch_base_libdir}/firmware/ath11k/IPQ8074" | ||
727 | FILES:${PN}-ath11k-qca2066 = "${nonarch_base_libdir}/firmware/ath11k/QCA2066" | ||
728 | FILES:${PN}-ath11k-qca6390 = "${nonarch_base_libdir}/firmware/ath11k/QCA6390" | ||
729 | FILES:${PN}-ath11k-qca6698aq = "${nonarch_base_libdir}/firmware/ath11k/QCA6698AQ" | ||
730 | FILES:${PN}-ath11k-qcn9074 = "${nonarch_base_libdir}/firmware/ath11k/QCN9074" | ||
731 | FILES:${PN}-ath11k-wcn6750 = "${nonarch_base_libdir}/firmware/ath11k/WCN6750" | ||
732 | FILES:${PN}-ath11k-wcn6855 = "${nonarch_base_libdir}/firmware/ath11k/WCN6855" | ||
733 | FILES:${PN}-ath11k-misc = "${nonarch_base_libdir}/firmware/ath11k/*" | ||
734 | # -ath11k is a virtual package that depends upon all ath11k packages. | ||
735 | ALLOW_EMPTY:${PN}-ath11k = "1" | ||
736 | # -ath11k-misc is a catch all package that includes all the ath11k | ||
737 | # firmwares that are not already included in other -ath11k- packages. | ||
738 | ALLOW_EMPTY:${PN}-ath11k-misc = "1" | ||
739 | |||
740 | FILES:${PN}-ath12k-qcn9274 = "${nonarch_base_libdir}/firmware/ath12k/QCN9274" | ||
741 | FILES:${PN}-ath12k-wcn7850 = "${nonarch_base_libdir}/firmware/ath12k/WCN7850" | ||
742 | FILES:${PN}-ath12k-misc = "${nonarch_base_libdir}/firmware/ath12k/*" | ||
743 | # -ath12k is a virtual package that depends upon all ath12k packages. | ||
744 | ALLOW_EMPTY:${PN}-ath12k = "1" | ||
745 | # -ath12k-misc is a catch all package that includes all the ath12k | ||
746 | # firmwares that are not already included in other -ath12k- packages. | ||
747 | ALLOW_EMPTY:${PN}-ath12k-misc = "1" | ||
748 | |||
749 | FILES:${PN}-qca-qca61x4-serial = " \ | ||
750 | ${nonarch_base_libdir}/firmware/qca/nvm_0*.bin* \ | ||
751 | ${nonarch_base_libdir}/firmware/qca/rampatch_0*.bin* \ | ||
752 | " | ||
753 | FILES:${PN}-qca-qca61x4-usb = " \ | ||
754 | ${nonarch_base_libdir}/firmware/qca/nvm_usb_*.bin* \ | ||
755 | ${nonarch_base_libdir}/firmware/qca/rampatch_usb_*.bin* \ | ||
756 | ${nonarch_base_libdir}/firmware/qca/QCA2066/nvm_usb_00130201_030a.bin* \ | ||
757 | ${nonarch_base_libdir}/firmware/qca/QCA2066/nvm_usb_00130201_gf_030a.bin* \ | ||
758 | ${nonarch_base_libdir}/firmware/qca/QCA2066/rampatch_usb_00130201.bin* \ | ||
759 | " | ||
760 | FILES:${PN}-qca-qca6390 = " \ | ||
761 | ${nonarch_base_libdir}/firmware/qca/htbtfw20.tlv* \ | ||
762 | ${nonarch_base_libdir}/firmware/qca/htnv20.bin* \ | ||
763 | " | ||
764 | FILES:${PN}-qca-qca6698 = " \ | ||
765 | ${nonarch_base_libdir}/firmware/qca/QCA6698/hpbtfw21.tlv* \ | ||
766 | ${nonarch_base_libdir}/firmware/qca/QCA6698/hpnv21.b206* \ | ||
767 | ${nonarch_base_libdir}/firmware/qca/QCA6698/hpnv21.b207* \ | ||
768 | ${nonarch_base_libdir}/firmware/qca/QCA6698/hpnv21.bin* \ | ||
769 | " | ||
770 | FILES:${PN}-qca-wcn3950 = " \ | ||
771 | ${nonarch_base_libdir}/firmware/qca/cmbtfw12.tlv* \ | ||
772 | ${nonarch_base_libdir}/firmware/qca/cmbtfw13.tlv* \ | ||
773 | ${nonarch_base_libdir}/firmware/qca/cmnv12.bin* \ | ||
774 | ${nonarch_base_libdir}/firmware/qca/cmnv13.bin* \ | ||
775 | ${nonarch_base_libdir}/firmware/qca/cmnv13s.bin* \ | ||
776 | ${nonarch_base_libdir}/firmware/qca/cmnv13t.bin* \ | ||
777 | " | ||
778 | FILES:${PN}-qca-wcn3988 = " \ | ||
779 | ${nonarch_base_libdir}/firmware/qca/apbtfw10.tlv* \ | ||
780 | ${nonarch_base_libdir}/firmware/qca/apbtfw11.tlv* \ | ||
781 | ${nonarch_base_libdir}/firmware/qca/apnv10.bin* \ | ||
782 | ${nonarch_base_libdir}/firmware/qca/apnv11.bin* \ | ||
783 | " | ||
784 | FILES:${PN}-qca-wcn399x = " \ | ||
785 | ${nonarch_base_libdir}/firmware/qca/crbtfw21.tlv* \ | ||
786 | ${nonarch_base_libdir}/firmware/qca/crnv21.bin* \ | ||
787 | ${nonarch_base_libdir}/firmware/qca/crbtfw32.tlv* \ | ||
788 | ${nonarch_base_libdir}/firmware/qca/crnv32.bin* \ | ||
789 | ${nonarch_base_libdir}/firmware/qca/crnv32u.bin* \ | ||
790 | " | ||
791 | FILES:${PN}-qca-wcn6750 = " \ | ||
792 | ${nonarch_base_libdir}/firmware/qca/msbtfw11.mbn* \ | ||
793 | ${nonarch_base_libdir}/firmware/qca/msbtfw11.tlv* \ | ||
794 | ${nonarch_base_libdir}/firmware/qca/msnv11.bin* \ | ||
795 | ${nonarch_base_libdir}/firmware/qca/msnv11.b0a* \ | ||
796 | ${nonarch_base_libdir}/firmware/qca/msnv11.b09* \ | ||
797 | " | ||
798 | FILES:${PN}-qca-qca2066 = " \ | ||
799 | ${nonarch_base_libdir}/firmware/qca/hpbtfw21.tlv* \ | ||
800 | ${nonarch_base_libdir}/firmware/qca/hpnv21.bin* \ | ||
801 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.bin* \ | ||
802 | ${nonarch_base_libdir}/firmware/qca/hpnv21.301* \ | ||
803 | ${nonarch_base_libdir}/firmware/qca/hpnv21.302* \ | ||
804 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.301* \ | ||
805 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.302* \ | ||
806 | ${nonarch_base_libdir}/firmware/qca/hpnv21.309* \ | ||
807 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.309* \ | ||
808 | ${nonarch_base_libdir}/firmware/qca/hpnv21.30a* \ | ||
809 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.30a* \ | ||
810 | ${nonarch_base_libdir}/firmware/qca/hpnv21.b8c* \ | ||
811 | ${nonarch_base_libdir}/firmware/qca/hpnv21.b9f* \ | ||
812 | ${nonarch_base_libdir}/firmware/qca/hpnv21.ba0* \ | ||
813 | ${nonarch_base_libdir}/firmware/qca/hpnv21.ba1* \ | ||
814 | ${nonarch_base_libdir}/firmware/qca/hpnv21.ba2* \ | ||
815 | ${nonarch_base_libdir}/firmware/qca/hpnv21.ba3* \ | ||
816 | ${nonarch_base_libdir}/firmware/qca/hpnv21.ba4* \ | ||
817 | ${nonarch_base_libdir}/firmware/qca/hpnv21.baa* \ | ||
818 | ${nonarch_base_libdir}/firmware/qca/hpnv21.bb8* \ | ||
819 | ${nonarch_base_libdir}/firmware/qca/hpnv21.b10c* \ | ||
820 | ${nonarch_base_libdir}/firmware/qca/hpnv21.b111* \ | ||
821 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.b8c* \ | ||
822 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.b9f* \ | ||
823 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.ba0* \ | ||
824 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.ba1* \ | ||
825 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.ba2* \ | ||
826 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.ba3* \ | ||
827 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.ba4* \ | ||
828 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.baa* \ | ||
829 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.bb8* \ | ||
830 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.b10c* \ | ||
831 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.b111* \ | ||
832 | " | ||
833 | FILES:${PN}-qca-wcn7850 = " \ | ||
834 | ${nonarch_base_libdir}/firmware/qca/hmtbtfw20.tlv* \ | ||
835 | ${nonarch_base_libdir}/firmware/qca/hmtnv20.b10f* \ | ||
836 | ${nonarch_base_libdir}/firmware/qca/hmtnv20.b112* \ | ||
837 | ${nonarch_base_libdir}/firmware/qca/hmtnv20.bin* \ | ||
838 | " | ||
839 | FILES:${PN}-qca-misc = "${nonarch_base_libdir}/firmware/qca/*" | ||
840 | # -qca is a virtual package that depends upon all qca packages. | ||
841 | ALLOW_EMPTY:${PN}-qca = "1" | ||
842 | # -qca-misc is a catch all package that includes all the qca | ||
843 | # firmwares that are not already included in other -qca- packages. | ||
844 | ALLOW_EMPTY:${PN}-qca-misc = "1" | ||
845 | |||
846 | RDEPENDS:${PN}-ar3k += "${PN}-ar3k-license ${PN}-atheros-license" | ||
847 | RDEPENDS:${PN}-ath10k += "${PN}-ath10k-license" | ||
848 | RDEPENDS:${PN}-ath10k-qca4019 += "${PN}-ath10k-license" | ||
849 | RDEPENDS:${PN}-ath10k-qca6174 += "${PN}-ath10k-license" | ||
850 | RDEPENDS:${PN}-ath10k-qca9377 += "${PN}-ath10k-license" | ||
851 | RDEPENDS:${PN}-ath10k-qca9887 += "${PN}-ath10k-license" | ||
852 | RDEPENDS:${PN}-ath10k-qca9888 += "${PN}-ath10k-license" | ||
853 | RDEPENDS:${PN}-ath10k-qca988x += "${PN}-ath10k-license" | ||
854 | RDEPENDS:${PN}-ath10k-qca9984 += "${PN}-ath10k-license" | ||
855 | RDEPENDS:${PN}-ath10k-qca99x0 += "${PN}-ath10k-license" | ||
856 | RDEPENDS:${PN}-ath10k-wcn3990 += "${PN}-ath10k-license" | ||
857 | RDEPENDS:${PN}-ath10k-misc += "${PN}-ath10k-license" | ||
858 | RDEPENDS:${PN}-ath11k += "${PN}-ath10k-license" | ||
859 | RDEPENDS:${PN}-ath11k-ipq5018 += "${PN}-ath10k-license" | ||
860 | RDEPENDS:${PN}-ath11k-ipq6018 += "${PN}-ath10k-license" | ||
861 | RDEPENDS:${PN}-ath11k-ipq8074 += "${PN}-ath10k-license" | ||
862 | RDEPENDS:${PN}-ath11k-qca2066 += "${PN}-ath10k-license" | ||
863 | RDEPENDS:${PN}-ath11k-qca6390 += "${PN}-ath10k-license" | ||
864 | RDEPENDS:${PN}-ath11k-qca6698aq += "${PN}-ath10k-license" | ||
865 | RDEPENDS:${PN}-ath11k-qcn9074 += "${PN}-ath10k-license" | ||
866 | RDEPENDS:${PN}-ath11k-wcn6750 += "${PN}-ath10k-license" | ||
867 | RDEPENDS:${PN}-ath11k-wcn6855 += "${PN}-ath10k-license" | ||
868 | RDEPENDS:${PN}-ath11k-misc += "${PN}-ath10k-license" | ||
869 | RDEPENDS:${PN}-ath12k += "${PN}-ath10k-license" | ||
870 | RDEPENDS:${PN}-ath12k-qcn9274 += "${PN}-ath10k-license" | ||
871 | RDEPENDS:${PN}-ath12k-wcn7850 += "${PN}-ath10k-license" | ||
872 | RDEPENDS:${PN}-ath12k-misc += "${PN}-ath10k-license" | ||
873 | RDEPENDS:${PN}-qca += "${PN}-ath10k-license ${PN}-qcom-license" | ||
874 | RDEPENDS:${PN}-qca-qca61x4-serial += "${PN}-ath10k-license" | ||
875 | RDEPENDS:${PN}-qca-qca61x4-usb += "${PN}-ath10k-license" | ||
876 | RDEPENDS:${PN}-qca-qca6390 += "${PN}-ath10k-license" | ||
877 | RDEPENDS:${PN}-qca-qca6698 += "${PN}-ath10k-license" | ||
878 | RDEPENDS:${PN}-qca-wcn3950 += "${PN}-qcom-license" | ||
879 | RDEPENDS:${PN}-qca-wcn3988 += "${PN}-qcom-license" | ||
880 | RDEPENDS:${PN}-qca-wcn399x += "${PN}-ath10k-license" | ||
881 | RDEPENDS:${PN}-qca-wcn6750 += "${PN}-ath10k-license" | ||
882 | RDEPENDS:${PN}-qca-qca2066 += "${PN}-ath10k-license" | ||
883 | RDEPENDS:${PN}-qca-wcn7850 += "${PN}-qcom-license" | ||
884 | RDEPENDS:${PN}-qca-misc += "${PN}-ath10k-license ${PN}-qcom-license" | ||
885 | # For ralink | ||
886 | LICENSE:${PN}-ralink = "Firmware-ralink-firmware" | ||
887 | LICENSE:${PN}-ralink-license = "Firmware-ralink-firmware" | ||
888 | |||
889 | FILES:${PN}-ralink-license = "${nonarch_base_libdir}/firmware/LICENCE.ralink-firmware.txt" | ||
890 | FILES:${PN}-ralink = " \ | ||
891 | ${nonarch_base_libdir}/firmware/rt*.bin* \ | ||
892 | " | ||
893 | |||
894 | RDEPENDS:${PN}-ralink += "${PN}-ralink-license" | ||
895 | |||
896 | # For mediatek MT7601U | ||
897 | LICENSE:${PN}-mt76x-license = "Firmware-ralink_a_mediatek_company_firmware" | ||
898 | FILES:${PN}-mt76x-license = "${nonarch_base_libdir}/firmware/LICENCE.ralink_a_mediatek_company_firmware" | ||
899 | |||
900 | LICENSE:${PN}-mt7601u = "Firmware-ralink_a_mediatek_company_firmware" | ||
901 | |||
902 | FILES:${PN}-mt7601u = " \ | ||
903 | ${nonarch_base_libdir}/firmware/mediatek/mt7601u.bin* \ | ||
904 | ${nonarch_base_libdir}/firmware/mt7601u.bin* \ | ||
905 | " | ||
906 | RDEPENDS:${PN}-mt7601u += "${PN}-mt76x-license" | ||
907 | |||
908 | # For MediaTek Bluetooth USB driver 7650 | ||
909 | LICENSE:${PN}-mt7650 = "Firmware-ralink_a_mediatek_company_firmware" | ||
910 | |||
911 | FILES:${PN}-mt7650 = " \ | ||
912 | ${nonarch_base_libdir}/firmware/mediatek/mt7650.bin* \ | ||
913 | ${nonarch_base_libdir}/firmware/mt7650.bin* \ | ||
914 | " | ||
915 | RDEPENDS:${PN}-mt7650 += "${PN}-mt76x-license" | ||
916 | |||
917 | # For MediaTek MT76x2 Wireless MACs | ||
918 | LICENSE:${PN}-mt76x2 = "Firmware-ralink_a_mediatek_company_firmware" | ||
919 | |||
920 | FILES:${PN}-mt76x2 = " \ | ||
921 | ${nonarch_base_libdir}/firmware/mediatek/mt7662.bin* \ | ||
922 | ${nonarch_base_libdir}/firmware/mt7662.bin* \ | ||
923 | ${nonarch_base_libdir}/firmware/mediatek/mt7662_rom_patch.bin* \ | ||
924 | ${nonarch_base_libdir}/firmware/mt7662_rom_patch.bin* \ | ||
925 | " | ||
926 | RDEPENDS:${PN}-mt76x2 += "${PN}-mt76x-license" | ||
927 | |||
928 | # For MediaTek | ||
929 | LICENSE:${PN}-mediatek = "Firmware-mediatek" | ||
930 | LICENSE:${PN}-mediatek-license = "Firmware-mediatek" | ||
931 | |||
932 | FILES:${PN}-mediatek = " \ | ||
933 | ${nonarch_base_libdir}/firmware/mediatek/* \ | ||
934 | ${nonarch_base_libdir}/firmware/vpu_d.bin* \ | ||
935 | ${nonarch_base_libdir}/firmware/vpu_p.bin* \ | ||
936 | " | ||
937 | FILES:${PN}-mediatek-license = " \ | ||
938 | ${nonarch_base_libdir}/firmware/LICENCE.mediatek \ | ||
939 | " | ||
940 | RDEPENDS:${PN}-mediatek += "${PN}-mediatek-license" | ||
941 | |||
942 | # For Microchip | ||
943 | LICENSE:${PN}-microchip = "Firmware-microchip" | ||
944 | LICENSE:${PN}-microchip-license = "Firmware-microchip" | ||
945 | |||
946 | FILES:${PN}-microchip = "${nonarch_base_libdir}/firmware/microchip/*" | ||
947 | FILES:${PN}-microchip-license = " \ | ||
948 | ${nonarch_base_libdir}/firmware/LICENCE.microchip \ | ||
949 | " | ||
950 | RDEPENDS:${PN}-microchip += "${PN}-microchip-license" | ||
951 | |||
952 | # For MOXA | ||
953 | LICENSE:${PN}-moxa = "Firmware-moxa" | ||
954 | LICENSE:${PN}-moxa-license = "Firmware-moxa" | ||
955 | |||
956 | FILES:${PN}-moxa = "${nonarch_base_libdir}/firmware/moxa" | ||
957 | FILES:${PN}-moxa-license = "${nonarch_base_libdir}/firmware/LICENCE.moxa" | ||
958 | |||
959 | RDEPENDS:${PN}-moxa += "${PN}-moxa-license" | ||
960 | |||
961 | # For radeon | ||
962 | |||
963 | LICENSE:${PN}-radeon = "Firmware-radeon" | ||
964 | LICENSE:${PN}-radeon-license = "Firmware-radeon" | ||
965 | |||
966 | FILES:${PN}-radeon-license = "${nonarch_base_libdir}/firmware/LICENSE.radeon" | ||
967 | FILES:${PN}-radeon = " \ | ||
968 | ${nonarch_base_libdir}/firmware/radeon \ | ||
969 | " | ||
970 | |||
971 | RDEPENDS:${PN}-radeon += "${PN}-radeon-license" | ||
972 | |||
973 | # For amdgpu | ||
974 | LICENSE:${PN}-amdgpu = "Firmware-amdgpu" | ||
975 | LICENSE:${PN}-amdgpu-license = "Firmware-amdgpu" | ||
976 | LICENSE:${PN}-amdgpu-aldebaran = "Firmware-amdgpu" | ||
977 | LICENSE:${PN}-amdgpu-carrizo = "Firmware-amdgpu" | ||
978 | LICENSE:${PN}-amdgpu-cezanne = "Firmware-amdgpu" | ||
979 | LICENSE:${PN}-amdgpu-fiji = "Firmware-amdgpu" | ||
980 | LICENSE:${PN}-amdgpu-hawaii = "Firmware-amdgpu" | ||
981 | LICENSE:${PN}-amdgpu-navi10 = "Firmware-amdgpu" | ||
982 | LICENSE:${PN}-amdgpu-navi14 = "Firmware-amdgpu" | ||
983 | LICENSE:${PN}-amdgpu-navi21 = "Firmware-amdgpu" | ||
984 | LICENSE:${PN}-amdgpu-navi22 = "Firmware-amdgpu" | ||
985 | LICENSE:${PN}-amdgpu-navi23 = "Firmware-amdgpu" | ||
986 | LICENSE:${PN}-amdgpu-navi24 = "Firmware-amdgpu" | ||
987 | LICENSE:${PN}-amdgpu-navi31 = "Firmware-amdgpu" | ||
988 | LICENSE:${PN}-amdgpu-navi32 = "Firmware-amdgpu" | ||
989 | LICENSE:${PN}-amdgpu-oland = "Firmware-amdgpu" | ||
990 | LICENSE:${PN}-amdgpu-polaris10 = "Firmware-amdgpu" | ||
991 | LICENSE:${PN}-amdgpu-polaris11 = "Firmware-amdgpu" | ||
992 | LICENSE:${PN}-amdgpu-polaris12 = "Firmware-amdgpu" | ||
993 | LICENSE:${PN}-amdgpu-raven = "Firmware-amdgpu" | ||
994 | LICENSE:${PN}-amdgpu-rembrandt = "Firmware-amdgpu" | ||
995 | LICENSE:${PN}-amdgpu-renoir = "Firmware-amdgpu" | ||
996 | LICENSE:${PN}-amdgpu-stoney = "Firmware-amdgpu" | ||
997 | LICENSE:${PN}-amdgpu-tonga = "Firmware-amdgpu" | ||
998 | LICENSE:${PN}-amdgpu-topaz = "Firmware-amdgpu" | ||
999 | LICENSE:${PN}-amdgpu-vega10 = "Firmware-amdgpu" | ||
1000 | LICENSE:${PN}-amdgpu-vega12 = "Firmware-amdgpu" | ||
1001 | LICENSE:${PN}-amdgpu-misc = "Firmware-amdgpu" | ||
1002 | |||
1003 | FILES:${PN}-amdgpu-license = "${nonarch_base_libdir}/firmware/LICENSE.amdgpu" | ||
1004 | FILES:${PN}-amdgpu-aldebaran = "${nonarch_base_libdir}/firmware/amdgpu/aldebaran_*.bin*" | ||
1005 | FILES:${PN}-amdgpu-carrizo = "${nonarch_base_libdir}/firmware/amdgpu/carrizo_*.bin*" | ||
1006 | FILES:${PN}-amdgpu-cezanne = "${nonarch_base_libdir}/firmware/amdgpu/green_sardine_*.bin*" | ||
1007 | FILES:${PN}-amdgpu-fiji = "${nonarch_base_libdir}/firmware/amdgpu/fiji_*.bin*" | ||
1008 | FILES:${PN}-amdgpu-hawaii = "${nonarch_base_libdir}/firmware/amdgpu/hawaii_*.bin*" | ||
1009 | FILES:${PN}-amdgpu-navi10 = "${nonarch_base_libdir}/firmware/amdgpu/navi10_*.bin*" | ||
1010 | FILES:${PN}-amdgpu-navi14 = "${nonarch_base_libdir}/firmware/amdgpu/navi14_*.bin*" | ||
1011 | FILES:${PN}-amdgpu-navi21 = "${nonarch_base_libdir}/firmware/amdgpu/sienna_cichlid_*.bin*" | ||
1012 | FILES:${PN}-amdgpu-navi22 = "${nonarch_base_libdir}/firmware/amdgpu/navy_flounder_*.bin*" | ||
1013 | FILES:${PN}-amdgpu-navi23 = "${nonarch_base_libdir}/firmware/amdgpu/dimgrey_cavefish_*.bin*" | ||
1014 | FILES:${PN}-amdgpu-navi24 = "${nonarch_base_libdir}/firmware/amdgpu/beige_goby_*.bin*" | ||
1015 | FILES:${PN}-amdgpu-navi31 = "${nonarch_base_libdir}/firmware/amdgpu/gc_11_0_0_*.bin* \ | ||
1016 | ${nonarch_base_libdir}/firmware/amdgpu/psp_13_0_0_sos.bin* \ | ||
1017 | ${nonarch_base_libdir}/firmware/amdgpu/psp_13_0_0_ta.bin* \ | ||
1018 | ${nonarch_base_libdir}/firmware/amdgpu/smu_13_0_0.bin* \ | ||
1019 | ${nonarch_base_libdir}/firmware/amdgpu/dcn_3_2_0_dmcub.bin* \ | ||
1020 | ${nonarch_base_libdir}/firmware/amdgpu/sdma_6_0_0.bin* \ | ||
1021 | ${nonarch_base_libdir}/firmware/amdgpu/vcn_4_0_0.bin* \ | ||
1022 | " | ||
1023 | FILES:${PN}-amdgpu-navi32 = "${nonarch_base_libdir}/firmware/amdgpu/dcn_3_2_0_dmcub.bin* \ | ||
1024 | ${nonarch_base_libdir}/firmware/amdgpu/gc_11_0_3_*.bin* \ | ||
1025 | ${nonarch_base_libdir}/firmware/amdgpu/psp_13_0_10_sos.bin* \ | ||
1026 | ${nonarch_base_libdir}/firmware/amdgpu/psp_13_0_10_ta.bin* \ | ||
1027 | ${nonarch_base_libdir}/firmware/amdgpu/sdma_6_0_3.bin* \ | ||
1028 | ${nonarch_base_libdir}/firmware/amdgpu/smu_13_0_10.bin* \ | ||
1029 | ${nonarch_base_libdir}/firmware/amdgpu/vcn_4_0_0.bin* \ | ||
1030 | " | ||
1031 | FILES:${PN}-amdgpu-oland = "${nonarch_base_libdir}/firmware/amdgpu/oland_*.bin*" | ||
1032 | FILES:${PN}-amdgpu-polaris10 = "${nonarch_base_libdir}/firmware/amdgpu/polaris10_*.bin*" | ||
1033 | FILES:${PN}-amdgpu-polaris11 = "${nonarch_base_libdir}/firmware/amdgpu/polaris11_*.bin*" | ||
1034 | FILES:${PN}-amdgpu-polaris12 = "${nonarch_base_libdir}/firmware/amdgpu/polaris12_*.bin*" | ||
1035 | FILES:${PN}-amdgpu-raven = "${nonarch_base_libdir}/firmware/amdgpu/raven_*.bin*" | ||
1036 | FILES:${PN}-amdgpu-rembrandt = "${nonarch_base_libdir}/firmware/amdgpu/yellow_carp_*.bin*" | ||
1037 | FILES:${PN}-amdgpu-renoir = "${nonarch_base_libdir}/firmware/amdgpu/renoir_*.bin*" | ||
1038 | FILES:${PN}-amdgpu-stoney = "${nonarch_base_libdir}/firmware/amdgpu/stoney_*.bin*" | ||
1039 | FILES:${PN}-amdgpu-tonga = "${nonarch_base_libdir}/firmware/amdgpu/tonga_*.bin*" | ||
1040 | FILES:${PN}-amdgpu-topaz = "${nonarch_base_libdir}/firmware/amdgpu/topaz_*.bin*" | ||
1041 | FILES:${PN}-amdgpu-vega10 = "${nonarch_base_libdir}/firmware/amdgpu/vega10_*.bin*" | ||
1042 | FILES:${PN}-amdgpu-vega12 = "${nonarch_base_libdir}/firmware/amdgpu/vega12_*.bin*" | ||
1043 | FILES:${PN}-amdgpu-misc = "${nonarch_base_libdir}/firmware/amdgpu/*" | ||
1044 | # -amdgpu is a virtual package that depends upon all amdgpu packages. | ||
1045 | ALLOW_EMPTY:${PN}-amdgpu = "1" | ||
1046 | # -amdgpu-misc is a catch all package that includes all the amdgpu | ||
1047 | # firmwares that are not already included in other -amdgpu- packages. | ||
1048 | ALLOW_EMPTY:${PN}-amdgpu-misc = "1" | ||
1049 | |||
1050 | RDEPENDS:${PN}-amdgpu += "${PN}-amdgpu-license" | ||
1051 | RDEPENDS:${PN}-amdgpu-aldebaran += "${PN}-amdgpu-license" | ||
1052 | RDEPENDS:${PN}-amdgpu-carrizo += "${PN}-amdgpu-license" | ||
1053 | RDEPENDS:${PN}-amdgpu-cezanne += "${PN}-amdgpu-license" | ||
1054 | RDEPENDS:${PN}-amdgpu-fiji += "${PN}-amdgpu-license" | ||
1055 | RDEPENDS:${PN}-amdgpu-hawaii += "${PN}-amdgpu-license" | ||
1056 | RDEPENDS:${PN}-amdgpu-navi10 += "${PN}-amdgpu-license" | ||
1057 | RDEPENDS:${PN}-amdgpu-navi14 += "${PN}-amdgpu-license" | ||
1058 | RDEPENDS:${PN}-amdgpu-navi21 += "${PN}-amdgpu-license" | ||
1059 | RDEPENDS:${PN}-amdgpu-navi22 += "${PN}-amdgpu-license" | ||
1060 | RDEPENDS:${PN}-amdgpu-navi23 += "${PN}-amdgpu-license" | ||
1061 | RDEPENDS:${PN}-amdgpu-navi24 += "${PN}-amdgpu-license" | ||
1062 | RDEPENDS:${PN}-amdgpu-navi31 += "${PN}-amdgpu-license" | ||
1063 | RDEPENDS:${PN}-amdgpu-navi32 += "${PN}-amdgpu-license" | ||
1064 | RDEPENDS:${PN}-amdgpu-oland += "${PN}-amdgpu-license" | ||
1065 | RDEPENDS:${PN}-amdgpu-polaris10 += "${PN}-amdgpu-license" | ||
1066 | RDEPENDS:${PN}-amdgpu-polaris11 += "${PN}-amdgpu-license" | ||
1067 | RDEPENDS:${PN}-amdgpu-polaris12 += "${PN}-amdgpu-license" | ||
1068 | RDEPENDS:${PN}-amdgpu-raven += "${PN}-amdgpu-license" | ||
1069 | RDEPENDS:${PN}-amdgpu-rembrandt += "${PN}-amdgpu-license" | ||
1070 | RDEPENDS:${PN}-amdgpu-renoir += "${PN}-amdgpu-license" | ||
1071 | RDEPENDS:${PN}-amdgpu-stoney += "${PN}-amdgpu-license" | ||
1072 | RDEPENDS:${PN}-amdgpu-tonga += "${PN}-amdgpu-license" | ||
1073 | RDEPENDS:${PN}-amdgpu-topaz += "${PN}-amdgpu-license" | ||
1074 | RDEPENDS:${PN}-amdgpu-vega10 += "${PN}-amdgpu-license" | ||
1075 | RDEPENDS:${PN}-amdgpu-vega12 += "${PN}-amdgpu-license" | ||
1076 | RDEPENDS:${PN}-amdgpu-misc += "${PN}-amdgpu-license" | ||
1077 | |||
1078 | # For lontium | ||
1079 | LICENSE:${PN}-lt9611uxc = "Firmware-Lontium" | ||
1080 | |||
1081 | FILES:${PN}-lontium-license = "${nonarch_base_libdir}/firmware/LICENSE.Lontium" | ||
1082 | FILES:${PN}-lt9611uxc = "${nonarch_base_libdir}/firmware/lt9611uxc_fw.bin*" | ||
1083 | |||
1084 | # For Arm Mali | ||
1085 | LICENSE:${PN}-mali-csffw-arch108 = "Firmware-mali_csffw" | ||
1086 | FILES:${PN}-mali-csffw-license = "${nonarch_base_libdir}/firmware/LICENCE.mali_csffw" | ||
1087 | FILES:${PN}-mali-csffw-arch108 = "${nonarch_base_libdir}/firmware/arm/mali/arch10.8/mali_csffw.bin*" | ||
1088 | |||
1089 | RDEPENDS:${PN}-mali-csffw-arch108 += "${PN}-mali-csffw-license" | ||
1090 | |||
1091 | # For marvell | ||
1092 | LICENSE:${PN}-pcie8897 = "Firmware-Marvell" | ||
1093 | LICENSE:${PN}-pcie8997 = "Firmware-Marvell" | ||
1094 | LICENSE:${PN}-sd8686 = "Firmware-Marvell" | ||
1095 | LICENSE:${PN}-sd8688 = "Firmware-Marvell" | ||
1096 | LICENSE:${PN}-sd8787 = "Firmware-Marvell" | ||
1097 | LICENSE:${PN}-sd8797 = "Firmware-Marvell" | ||
1098 | LICENSE:${PN}-sd8801 = "Firmware-Marvell" | ||
1099 | LICENSE:${PN}-sd8887 = "Firmware-Marvell" | ||
1100 | LICENSE:${PN}-sd8897 = "Firmware-Marvell" | ||
1101 | LICENSE:${PN}-sd8997 = "Firmware-Marvell" | ||
1102 | LICENSE:${PN}-usb8997 = "Firmware-Marvell" | ||
1103 | LICENSE:${PN}-marvell-license = "Firmware-Marvell" | ||
1104 | |||
1105 | FILES:${PN}-marvell-license = "${nonarch_base_libdir}/firmware/LICENCE.Marvell" | ||
1106 | FILES:${PN}-pcie8897 = " \ | ||
1107 | ${nonarch_base_libdir}/firmware/mrvl/pcie8897_uapsta.bin* \ | ||
1108 | " | ||
1109 | FILES:${PN}-pcie8997 = " \ | ||
1110 | ${nonarch_base_libdir}/firmware/mrvl/pcie8997_wlan_v4.bin* \ | ||
1111 | ${nonarch_base_libdir}/firmware/mrvl/pcieuart8997_combo_v4.bin* \ | ||
1112 | ${nonarch_base_libdir}/firmware/mrvl/pcieusb8997_combo_v4.bin* \ | ||
1113 | " | ||
1114 | FILES:${PN}-sd8686 = " \ | ||
1115 | ${nonarch_base_libdir}/firmware/libertas/sd8686_v9* \ | ||
1116 | ${nonarch_base_libdir}/firmware/sd8686* \ | ||
1117 | " | ||
1118 | FILES:${PN}-sd8688 = " \ | ||
1119 | ${nonarch_base_libdir}/firmware/libertas/sd8688* \ | ||
1120 | ${nonarch_base_libdir}/firmware/mrvl/sd8688* \ | ||
1121 | " | ||
1122 | FILES:${PN}-sd8787 = " \ | ||
1123 | ${nonarch_base_libdir}/firmware/mrvl/sd8787_uapsta.bin* \ | ||
1124 | " | ||
1125 | FILES:${PN}-sd8797 = " \ | ||
1126 | ${nonarch_base_libdir}/firmware/mrvl/sd8797_uapsta.bin* \ | ||
1127 | " | ||
1128 | FILES:${PN}-sd8801 = " \ | ||
1129 | ${nonarch_base_libdir}/firmware/mrvl/sd8801_uapsta.bin* \ | ||
1130 | " | ||
1131 | FILES:${PN}-sd8887 = " \ | ||
1132 | ${nonarch_base_libdir}/firmware/mrvl/sd8887_uapsta.bin* \ | ||
1133 | " | ||
1134 | FILES:${PN}-sd8897 = " \ | ||
1135 | ${nonarch_base_libdir}/firmware/mrvl/sd8897_uapsta.bin* \ | ||
1136 | " | ||
1137 | do_install:append() { | ||
1138 | # The kernel 5.6.x driver still uses the old name, provide a symlink for | ||
1139 | # older kernels | ||
1140 | COMPR=$(echo ${@fw_compr_suffix(d)} | tr -d '-') | ||
1141 | if [ -n "$COMPR" ]; then | ||
1142 | COMPR=".$COMPR" | ||
1143 | fi | ||
1144 | ln -fs sdsd8997_combo_v4.bin$COMPR ${D}${nonarch_base_libdir}/firmware/mrvl/sd8997_uapsta.bin$COMPR | ||
1145 | } | ||
1146 | FILES:${PN}-sd8997 = " \ | ||
1147 | ${nonarch_base_libdir}/firmware/mrvl/sd8997_uapsta.bin* \ | ||
1148 | ${nonarch_base_libdir}/firmware/mrvl/sdsd8997_combo_v4.bin* \ | ||
1149 | " | ||
1150 | FILES:${PN}-usb8997 = " \ | ||
1151 | ${nonarch_base_libdir}/firmware/mrvl/usbusb8997_combo_v4.bin* \ | ||
1152 | " | ||
1153 | |||
1154 | RDEPENDS:${PN}-sd8686 += "${PN}-marvell-license" | ||
1155 | RDEPENDS:${PN}-sd8688 += "${PN}-marvell-license" | ||
1156 | RDEPENDS:${PN}-sd8787 += "${PN}-marvell-license" | ||
1157 | RDEPENDS:${PN}-sd8797 += "${PN}-marvell-license" | ||
1158 | RDEPENDS:${PN}-sd8801 += "${PN}-marvell-license" | ||
1159 | RDEPENDS:${PN}-sd8887 += "${PN}-marvell-license" | ||
1160 | RDEPENDS:${PN}-sd8897 += "${PN}-marvell-license" | ||
1161 | RDEPENDS:${PN}-sd8997 += "${PN}-marvell-license" | ||
1162 | RDEPENDS:${PN}-usb8997 += "${PN}-marvell-license" | ||
1163 | |||
1164 | # For netronome | ||
1165 | LICENSE:${PN}-netronome = "Firmware-netronome" | ||
1166 | |||
1167 | FILES:${PN}-netronome-license = " \ | ||
1168 | ${nonarch_base_libdir}/firmware/LICENCE.Netronome \ | ||
1169 | " | ||
1170 | FILES:${PN}-netronome = " \ | ||
1171 | ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0081*.nffw* \ | ||
1172 | ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0096*.nffw* \ | ||
1173 | ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0097*.nffw* \ | ||
1174 | ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0099*.nffw* \ | ||
1175 | ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0058-0011_2x40.nffw* \ | ||
1176 | ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0058-0012_2x40.nffw* \ | ||
1177 | ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0078-0011_1x100.nffw* \ | ||
1178 | ${nonarch_base_libdir}/firmware/netronome/bpf \ | ||
1179 | ${nonarch_base_libdir}/firmware/netronome/flower \ | ||
1180 | ${nonarch_base_libdir}/firmware/netronome/nic \ | ||
1181 | ${nonarch_base_libdir}/firmware/netronome/nic-sriov \ | ||
1182 | " | ||
1183 | |||
1184 | RDEPENDS:${PN}-netronome += "${PN}-netronome-license" | ||
1185 | |||
1186 | # For NXP | ||
1187 | LICENSE:${PN}-nxp8987-sdio = "Firmware-nxp" | ||
1188 | LICENSE:${PN}-nxp8997-common = "Firmware-nxp" | ||
1189 | LICENSE:${PN}-nxp8997-pcie = "Firmware-nxp" | ||
1190 | LICENSE:${PN}-nxp8997-sdio = "Firmware-nxp" | ||
1191 | LICENSE:${PN}-nxp9098-common = "Firmware-nxp" | ||
1192 | LICENSE:${PN}-nxp9098-pcie = "Firmware-nxp" | ||
1193 | LICENSE:${PN}-nxp9098-sdio = "Firmware-nxp" | ||
1194 | LICENSE:${PN}-nxpiw416-sdio = "Firmware-nxp" | ||
1195 | LICENSE:${PN}-nxpiw612-sdio = "Firmware-nxp" | ||
1196 | LICENSE:${PN}-nxp-license = "Firmware-nxp" | ||
1197 | |||
1198 | FILES:${PN}-nxp8987-sdio = "${nonarch_base_libdir}/firmware/nxp/*8987*" | ||
1199 | FILES:${PN}-nxp8997-common = " \ | ||
1200 | ${nonarch_base_libdir}/firmware/nxp/uartuart8997_bt_v4.bin* \ | ||
1201 | ${nonarch_base_libdir}/firmware/nxp/helper_uart_3000000.bin* \ | ||
1202 | " | ||
1203 | ALLOW_EMPTY:${PN}-nxp8997-pcie = "1" | ||
1204 | ALLOW_EMPTY:${PN}-nxp8997-sdio = "1" | ||
1205 | FILES:${PN}-nxp9098-common = "${nonarch_base_libdir}/firmware/nxp/uartuart9098_bt_v1.bin*" | ||
1206 | ALLOW_EMPTY:${PN}-nxp9098-pcie = "1" | ||
1207 | ALLOW_EMPTY:${PN}-nxp9098-sdio = "1" | ||
1208 | FILES:${PN}-nxpiw416-sdio = "${nonarch_base_libdir}/firmware/nxp/*iw416*" | ||
1209 | FILES:${PN}-nxpiw612-sdio = "${nonarch_base_libdir}/firmware/nxp/uartspi_n61x_v1.bin.se*" | ||
1210 | FILES:${PN}-nxp-license = "${nonarch_base_libdir}/firmware/LICENSE.nxp" | ||
1211 | |||
1212 | RDEPENDS:${PN}-nxp8987-sdio += "${PN}-nxp-license" | ||
1213 | RDEPENDS:${PN}-nxp8997-common += "${PN}-nxp-license" | ||
1214 | RDEPENDS:${PN}-nxp8997-pcie += "${PN}-nxp8997-common" | ||
1215 | RDEPENDS:${PN}-nxp8997-sdio += "${PN}-nxp8997-common" | ||
1216 | RDEPENDS:${PN}-nxp9098-common += "${PN}-nxp-license" | ||
1217 | RDEPENDS:${PN}-nxp9098-pcie += "${PN}-nxp9098-common" | ||
1218 | RDEPENDS:${PN}-nxp9098-sdio += "${PN}-nxp9098-common" | ||
1219 | RDEPENDS:${PN}-nxpiw416-sdio += "${PN}-nxp-license" | ||
1220 | RDEPENDS:${PN}-nxpiw612-sdio += "${PN}-nxp-license" | ||
1221 | |||
1222 | # For nxp-mc | ||
1223 | LICENSE:${PN}-nxp-mc = "Firmware-nxp_mc_firmware" | ||
1224 | LICENSE:${PN}-nxp-mc-license = "Firmware-nxp_mc_firmware" | ||
1225 | |||
1226 | FILES:${PN}-nxp-mc = "${nonarch_base_libdir}/firmware/dpaa2/mc/*" | ||
1227 | FILES:${PN}-nxp-mc-license = " \ | ||
1228 | ${nonarch_base_libdir}/firmware/LICENSE.nxp_mc_firmware \ | ||
1229 | " | ||
1230 | RDEPENDS:${PN}-nxp-mc += "${PN}-nxp-mc-license" | ||
1231 | |||
1232 | # For Nvidia | ||
1233 | LICENSE:${PN}-nvidia-gpu = "Firmware-nvidia" | ||
1234 | LICENSE:${PN}-nvidia-tegra = "Firmware-nvidia" | ||
1235 | LICENSE:${PN}-nvidia-tegra-k1 = "Firmware-nvidia" | ||
1236 | LICENSE:${PN}-nvidia-license = "Firmware-nvidia" | ||
1237 | |||
1238 | FILES:${PN}-nvidia-gpu = "${nonarch_base_libdir}/firmware/nvidia" | ||
1239 | FILES:${PN}-nvidia-tegra = " \ | ||
1240 | ${nonarch_base_libdir}/firmware/nvidia/tegra* \ | ||
1241 | ${nonarch_base_libdir}/firmware/nvidia/gm20b \ | ||
1242 | ${nonarch_base_libdir}/firmware/nvidia/gp10b \ | ||
1243 | " | ||
1244 | FILES:${PN}-nvidia-tegra-k1 = " \ | ||
1245 | ${nonarch_base_libdir}/firmware/nvidia/tegra124 \ | ||
1246 | ${nonarch_base_libdir}/firmware/nvidia/gk20a \ | ||
1247 | " | ||
1248 | FILES:${PN}-nvidia-license = "${nonarch_base_libdir}/firmware/LICENCE.nvidia" | ||
1249 | |||
1250 | RDEPENDS:${PN}-nvidia-gpu += "${PN}-nvidia-license" | ||
1251 | RDEPENDS:${PN}-nvidia-tegra += "${PN}-nvidia-license" | ||
1252 | RDEPENDS:${PN}-nvidia-tegra-k1 += "${PN}-nvidia-license" | ||
1253 | |||
1254 | # For OLPC | ||
1255 | LICENSE:${PN}-olpc = "Firmware-OLPC" | ||
1256 | LICENSE:${PN}-olpc-license = "Firmware-OLPC" | ||
1257 | |||
1258 | FILES:${PN}-olpc = " \ | ||
1259 | ${nonarch_base_libdir}/firmware/libertas/lbtf_sdio.bin* \ | ||
1260 | ${nonarch_base_libdir}/firmware/lbtf_usb.bin* \ | ||
1261 | ${nonarch_base_libdir}/firmware/libertas/usb8388_olpc.bin* \ | ||
1262 | " | ||
1263 | FILES:${PN}-olpc-license = "${nonarch_base_libdir}/firmware/LICENCE.OLPC" | ||
1264 | |||
1265 | RDEPENDS:${PN}-olpc += "${PN}-olpc-license" | ||
1266 | |||
1267 | # For phanfw | ||
1268 | LICENSE:${PN}-phanfw = "Firmware-phanfw" | ||
1269 | LICENSE:${PN}-phanfw-license = "Firmware-phanfw" | ||
1270 | |||
1271 | FILES:${PN}-phanfw = "${nonarch_base_libdir}/firmware/phanfw.bin*" | ||
1272 | FILES:${PN}-phanfw-license = "${nonarch_base_libdir}/firmware/LICENCE.phanfw" | ||
1273 | |||
1274 | RDEPENDS:${PN}-phanfw += "${PN}-phanfw-license" | ||
1275 | |||
1276 | # For PowerVR | ||
1277 | LICENSE:${PN}-powervr = "Firmware-powervr" | ||
1278 | LICENSE:${PN}-powervr-license = "Firmware-powervr" | ||
1279 | |||
1280 | FILES:${PN}-powervr = "${nonarch_base_libdir}/firmware/powervr" | ||
1281 | FILES:${PN}-powervr-license = "${nonarch_base_libdir}/firmware/LICENSE.powervr" | ||
1282 | |||
1283 | RDEPENDS:${PN}-powervr += "${PN}-powervr-license" | ||
1284 | |||
1285 | # For qla2xxx | ||
1286 | LICENSE:${PN}-qla2xxx = "Firmware-qla2xxx" | ||
1287 | LICENSE:${PN}-qla2xxx-license = "Firmware-qla2xxx" | ||
1288 | |||
1289 | FILES:${PN}-qla2xxx = "${nonarch_base_libdir}/firmware/ql2*" | ||
1290 | FILES:${PN}-qla2xxx-license = "${nonarch_base_libdir}/firmware/LICENCE.qla2xxx" | ||
1291 | |||
1292 | RDEPENDS:${PN}-qla2xxx += "${PN}-qla2xxx-license" | ||
1293 | |||
1294 | # For RSI RS911x WiFi | ||
1295 | LICENSE:${PN}-rs9113 = "WHENCE" | ||
1296 | LICENSE:${PN}-rs9116 = "WHENCE" | ||
1297 | |||
1298 | FILES:${PN}-rs9113 = " ${nonarch_base_libdir}/firmware/rsi/rs9113*.rps* " | ||
1299 | FILES:${PN}-rs9116 = " ${nonarch_base_libdir}/firmware/rsi/rs9116*.rps* " | ||
1300 | |||
1301 | RDEPENDS:${PN}-rs9113 += "${PN}-whence-license" | ||
1302 | RDEPENDS:${PN}-rs9116 += "${PN}-whence-license" | ||
1303 | |||
1304 | # For rtl | ||
1305 | LICENSE:${PN}-rtl8188 = "Firmware-rtlwifi_firmware" | ||
1306 | LICENSE:${PN}-rtl8192cu = "Firmware-rtlwifi_firmware" | ||
1307 | LICENSE:${PN}-rtl8192ce = "Firmware-rtlwifi_firmware" | ||
1308 | LICENSE:${PN}-rtl8192su = "Firmware-rtlwifi_firmware" | ||
1309 | LICENSE:${PN}-rtl8723 = "Firmware-rtlwifi_firmware" | ||
1310 | LICENSE:${PN}-rtl8761 = "Firmware-rtlwifi_firmware" | ||
1311 | LICENSE:${PN}-rtl8821 = "Firmware-rtlwifi_firmware" | ||
1312 | LICENSE:${PN}-rtl8822 = "Firmware-rtlwifi_firmware" | ||
1313 | LICENSE:${PN}-rtl-license = "Firmware-rtlwifi_firmware" | ||
1314 | LICENSE:${PN}-rtl-nic = "WHENCE" | ||
1315 | LICENSE:${PN}-rtl8168 = "WHENCE" | ||
1316 | |||
1317 | FILES:${PN}-rtl-license = " \ | ||
1318 | ${nonarch_base_libdir}/firmware/LICENCE.rtlwifi_firmware.txt \ | ||
1319 | " | ||
1320 | FILES:${PN}-rtl8188 = " \ | ||
1321 | ${nonarch_base_libdir}/firmware/rtlwifi/rtl8188*.bin* \ | ||
1322 | " | ||
1323 | FILES:${PN}-rtl8192cu = " \ | ||
1324 | ${nonarch_base_libdir}/firmware/rtlwifi/rtl8192cufw*.bin* \ | ||
1325 | " | ||
1326 | FILES:${PN}-rtl8192ce = " \ | ||
1327 | ${nonarch_base_libdir}/firmware/rtlwifi/rtl8192cfw*.bin* \ | ||
1328 | " | ||
1329 | FILES:${PN}-rtl8192su = " \ | ||
1330 | ${nonarch_base_libdir}/firmware/rtlwifi/rtl8712u.bin* \ | ||
1331 | " | ||
1332 | FILES:${PN}-rtl8723 = " \ | ||
1333 | ${nonarch_base_libdir}/firmware/rtlwifi/rtl8723*.bin* \ | ||
1334 | ${nonarch_base_libdir}/firmware/rtw88/rtw8723*.bin* \ | ||
1335 | ${nonarch_base_libdir}/firmware/rtl_bt/rtl8723*.bin* \ | ||
1336 | " | ||
1337 | FILES:${PN}-rtl8821 = " \ | ||
1338 | ${nonarch_base_libdir}/firmware/rtlwifi/rtl8821*.bin* \ | ||
1339 | ${nonarch_base_libdir}/firmware/rtw88/rtw8821*.bin* \ | ||
1340 | ${nonarch_base_libdir}/firmware/rtl_bt/rtl8821*.bin \ | ||
1341 | " | ||
1342 | FILES:${PN}-rtl8761 = " \ | ||
1343 | ${nonarch_base_libdir}/firmware/rtl_bt/rtl8761*.bin* \ | ||
1344 | " | ||
1345 | FILES:${PN}-rtl8168 = " \ | ||
1346 | ${nonarch_base_libdir}/firmware/rtl_nic/rtl8168*.fw* \ | ||
1347 | " | ||
1348 | FILES:${PN}-rtl8822 = " \ | ||
1349 | ${nonarch_base_libdir}/firmware/rtl_bt/rtl8822*.bin* \ | ||
1350 | ${nonarch_base_libdir}/firmware/rtw88/rtw8822*.bin* \ | ||
1351 | ${nonarch_base_libdir}/firmware/rtlwifi/rtl8822*.bin* \ | ||
1352 | " | ||
1353 | FILES:${PN}-rtl-nic = " \ | ||
1354 | ${nonarch_base_libdir}/firmware/rtl_nic/*.fw* \ | ||
1355 | " | ||
1356 | |||
1357 | RDEPENDS:${PN}-rtl8188 += "${PN}-rtl-license" | ||
1358 | RDEPENDS:${PN}-rtl8192ce += "${PN}-rtl-license" | ||
1359 | RDEPENDS:${PN}-rtl8192cu += "${PN}-rtl-license" | ||
1360 | RDEPENDS:${PN}-rtl8192su = "${PN}-rtl-license" | ||
1361 | RDEPENDS:${PN}-rtl8723 += "${PN}-rtl-license" | ||
1362 | RDEPENDS:${PN}-rtl8821 += "${PN}-rtl-license" | ||
1363 | RDEPENDS:${PN}-rtl8761 += "${PN}-rtl-license" | ||
1364 | RDEPENDS:${PN}-rtl8822 += "${PN}-rtl-license" | ||
1365 | RDEPENDS:${PN}-rtl8168 += "${PN}-whence-license" | ||
1366 | RDEPENDS:${PN}-rtl-nic += "${PN}-whence-license" | ||
1367 | |||
1368 | # For Silabs | ||
1369 | LICENSE:${PN}-wfx = "Firmware-wfx" | ||
1370 | LICENSE:${PN}-wfx-license = "Firmware-wfx" | ||
1371 | |||
1372 | FILES:${PN}-wfx = " \ | ||
1373 | ${nonarch_base_libdir}/firmware/wfx/*.pds* \ | ||
1374 | ${nonarch_base_libdir}/firmware/wfx/*.sec* \ | ||
1375 | " | ||
1376 | FILES:${PN}-wfx-license = "${nonarch_base_libdir}/firmware/wfx/LICENCE.wf200" | ||
1377 | |||
1378 | RDEPENDS:${PN}-wfx += "${PN}-wfx-license" | ||
1379 | |||
1380 | # For TI wl1251 | ||
1381 | LICENSE:${PN}-wl1251 = "Firmware-wl1251" | ||
1382 | LICENSE:${PN}-wl1251-license = "Firmware-wl1251" | ||
1383 | |||
1384 | FILES:${PN}-wl1251 = " \ | ||
1385 | ${nonarch_base_libdir}/firmware/ti-connectivity/wl1251-fw.bin* \ | ||
1386 | ${nonarch_base_libdir}/firmware/ti-connectivity/wl1251-nvs.bin* \ | ||
1387 | " | ||
1388 | FILES:${PN}-wl1251-license = "${nonarch_base_libdir}/firmware/LICENCE.wl1251" | ||
1389 | |||
1390 | RDEPENDS:${PN}-wl1251 += "${PN}-wl1251-license" | ||
1391 | |||
1392 | # For ti-connectivity | ||
1393 | LICENSE:${PN}-wlcommon = "Firmware-ti-connectivity" | ||
1394 | LICENSE:${PN}-wl12xx = "Firmware-ti-connectivity" | ||
1395 | LICENSE:${PN}-wl18xx = "Firmware-ti-connectivity" | ||
1396 | LICENSE:${PN}-cc33xx = "Firmware-ti-connectivity" | ||
1397 | LICENSE:${PN}-ti-connectivity-license = "Firmware-ti-connectivity" | ||
1398 | |||
1399 | FILES:${PN}-ti-connectivity-license = "${nonarch_base_libdir}/firmware/LICENCE.ti-connectivity" | ||
1400 | # wl18xx optionally needs wl1271-nvs.bin (which itself is a symlink to | ||
1401 | # wl127x-nvs.bin) - see linux/drivers/net/wireless/ti/wlcore/sdio.c | ||
1402 | # and drivers/net/wireless/ti/wlcore/spi.c. | ||
1403 | # While they're optional and actually only used to override the MAC | ||
1404 | # address on wl18xx, driver loading will delay (by udev timout - 60s) | ||
1405 | # if not there. So let's make it available always. Because it's a | ||
1406 | # symlink, both need to go to wlcommon. | ||
1407 | FILES:${PN}-wlcommon = " \ | ||
1408 | ${nonarch_base_libdir}/firmware/ti-connectivity/TI* \ | ||
1409 | ${nonarch_base_libdir}/firmware/ti-connectivity/wl127x-nvs.bin* \ | ||
1410 | ${nonarch_base_libdir}/firmware/ti-connectivity/wl1271-nvs.bin* \ | ||
1411 | " | ||
1412 | FILES:${PN}-wl12xx = " \ | ||
1413 | ${nonarch_base_libdir}/firmware/ti-connectivity/wl12* \ | ||
1414 | " | ||
1415 | FILES:${PN}-wl18xx = " \ | ||
1416 | ${nonarch_base_libdir}/firmware/ti-connectivity/wl18* \ | ||
1417 | " | ||
1418 | |||
1419 | FILES:${PN}-cc33xx = " \ | ||
1420 | ${nonarch_base_libdir}/firmware/ti-connectivity/cc33* \ | ||
1421 | " | ||
1422 | |||
1423 | RDEPENDS:${PN}-wl12xx = "${PN}-ti-connectivity-license ${PN}-wlcommon" | ||
1424 | RDEPENDS:${PN}-wl18xx = "${PN}-ti-connectivity-license ${PN}-wlcommon" | ||
1425 | RDEPENDS:${PN}-cc33xx = "${PN}-ti-connectivity-license" | ||
1426 | |||
1427 | # For ti-keystone | ||
1428 | LICENSE:${PN}-ti-keystone = "Firmware-ti-keystone" | ||
1429 | LICENSE:${PN}-ti-keystone-license = "Firmware-ti-keystone" | ||
1430 | |||
1431 | FILES:${PN}-ti-keystone = "${nonarch_base_libdir}/firmware/ti-keystone/*" | ||
1432 | FILES:${PN}-ti-keystone-license = " \ | ||
1433 | ${nonarch_base_libdir}/firmware/LICENCE.ti-keystone \ | ||
1434 | " | ||
1435 | RDEPENDS:${PN}-ti-keystone += "${PN}-ti-keystone-license" | ||
1436 | |||
1437 | # For vt6656 | ||
1438 | LICENSE:${PN}-vt6656 = "Firmware-via_vt6656" | ||
1439 | LICENSE:${PN}-vt6656-license = "Firmware-via_vt6656" | ||
1440 | |||
1441 | FILES:${PN}-vt6656-license = "${nonarch_base_libdir}/firmware/LICENCE.via_vt6656" | ||
1442 | FILES:${PN}-vt6656 = " \ | ||
1443 | ${nonarch_base_libdir}/firmware/vntwusb.fw* \ | ||
1444 | " | ||
1445 | |||
1446 | RDEPENDS:${PN}-vt6656 = "${PN}-vt6656-license" | ||
1447 | |||
1448 | # For xc4000 | ||
1449 | LICENSE:${PN}-xc4000 = "Firmware-xc4000" | ||
1450 | LICENSE:${PN}-xc4000-license = "Firmware-xc4000" | ||
1451 | |||
1452 | FILES:${PN}-xc4000 = "${nonarch_base_libdir}/firmware/dvb-fe-xc4000-1.4.1.fw*" | ||
1453 | FILES:${PN}-xc4000-license = "${nonarch_base_libdir}/firmware/LICENCE.xc4000" | ||
1454 | |||
1455 | RDEPENDS:${PN}-xc4000 += "${PN}-xc4000-license" | ||
1456 | |||
1457 | # For xc5000 | ||
1458 | LICENSE:${PN}-xc5000 = "Firmware-xc5000" | ||
1459 | LICENSE:${PN}-xc5000-license = "Firmware-xc5000" | ||
1460 | |||
1461 | FILES:${PN}-xc5000 = "${nonarch_base_libdir}/firmware/dvb-fe-xc5000-1.6.114.fw*" | ||
1462 | FILES:${PN}-xc5000-license = "${nonarch_base_libdir}/firmware/LICENCE.xc5000" | ||
1463 | |||
1464 | RDEPENDS:${PN}-xc5000 += "${PN}-xc5000-license" | ||
1465 | |||
1466 | # For xc5000c | ||
1467 | LICENSE:${PN}-xc5000c = "Firmware-xc5000c" | ||
1468 | LICENSE:${PN}-xc5000c-license = "Firmware-xc5000c" | ||
1469 | |||
1470 | FILES:${PN}-xc5000c = " \ | ||
1471 | ${nonarch_base_libdir}/firmware/dvb-fe-xc5000c-4.1.30.7.fw* \ | ||
1472 | " | ||
1473 | FILES:${PN}-xc5000c-license = "${nonarch_base_libdir}/firmware/LICENCE.xc5000c" | ||
1474 | |||
1475 | RDEPENDS:${PN}-xc5000c += "${PN}-xc5000c-license" | ||
1476 | |||
1477 | # For broadcom | ||
1478 | |||
1479 | # for i in `grep brcm WHENCE | grep ^File | sed 's/File: brcm.//g'`; do pkg=`echo $i | sed 's/-[sp40].*//g; s/\.bin//g; s/brcmfmac/bcm/g; s/_hdr/-hdr/g; s/BCM/bcm-0bb4-0306/g'`; echo -e " \${PN}-$pkg \\"; done | sort -u | ||
1480 | |||
1481 | LICENSE:${PN}-broadcom-license = "Firmware-broadcom_bcm43xx" | ||
1482 | FILES:${PN}-broadcom-license = "${nonarch_base_libdir}/firmware/LICENCE.broadcom_bcm43xx" | ||
1483 | |||
1484 | # for i in `grep brcm WHENCE | grep ^File | sed 's/File: brcm.//g'`; do pkg=`echo $i | sed 's/-[sp40].*//g; s/\.bin//g; s/brcmfmac/bcm/g; s/_hdr/-hdr/g; s/BCM/bcm-0bb4-0306/g'`; echo "$i - $pkg"; echo -e "FILES:\${PN}-$pkg = \"\${nonarch_base_libdir}/firmware/brcm/$i\""; done | grep ^FILES | ||
1485 | |||
1486 | FILES:${PN}-bcm43xx = "${nonarch_base_libdir}/firmware/brcm/bcm43xx-0.fw*" | ||
1487 | FILES:${PN}-bcm43xx-hdr = "${nonarch_base_libdir}/firmware/brcm/bcm43xx_hdr-0.fw*" | ||
1488 | FILES:${PN}-bcm4329-fullmac = "${nonarch_base_libdir}/firmware/brcm/bcm4329-fullmac-4.bin*" | ||
1489 | FILES:${PN}-bcm43236b = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43236b.bin*" | ||
1490 | FILES:${PN}-bcm4329 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4329-sdio.bin*" | ||
1491 | FILES:${PN}-bcm4330 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4330-sdio.*" | ||
1492 | FILES:${PN}-bcm4334 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4334-sdio.bin*" | ||
1493 | FILES:${PN}-bcm4335 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4335-sdio.bin*" | ||
1494 | FILES:${PN}-bcm4339 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4339-sdio.bin* \ | ||
1495 | ${nonarch_base_libdir}/firmware/cypress/cyfmac4339-sdio.bin* \ | ||
1496 | " | ||
1497 | FILES:${PN}-bcm43241b0 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43241b0-sdio.bin*" | ||
1498 | FILES:${PN}-bcm43241b4 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43241b4-sdio.bin*" | ||
1499 | FILES:${PN}-bcm43241b5 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43241b5-sdio.bin*" | ||
1500 | FILES:${PN}-bcm43242a = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43242a.bin*" | ||
1501 | FILES:${PN}-bcm43143 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43143.bin* \ | ||
1502 | ${nonarch_base_libdir}/firmware/brcm/brcmfmac43143-sdio.bin* \ | ||
1503 | " | ||
1504 | FILES:${PN}-bcm43430a0 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43430a0-sdio.*" | ||
1505 | FILES:${PN}-bcm43455 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43455-sdio.* \ | ||
1506 | ${nonarch_base_libdir}/firmware/cypress/cyfmac43455-sdio.* \ | ||
1507 | " | ||
1508 | FILES:${PN}-bcm4350c2 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4350c2-pcie.bin*" | ||
1509 | FILES:${PN}-bcm4350 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4350-pcie.bin*" | ||
1510 | FILES:${PN}-bcm4356 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4356-sdio.* \ | ||
1511 | ${nonarch_base_libdir}/firmware/cypress/cyfmac4356-sdio.* \ | ||
1512 | " | ||
1513 | FILES:${PN}-bcm43569 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43569.bin*" | ||
1514 | FILES:${PN}-bcm43570 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43570-pcie.bin* \ | ||
1515 | ${nonarch_base_libdir}/firmware/cypress/cyfmac43570-pcie.bin* \ | ||
1516 | " | ||
1517 | FILES:${PN}-bcm4358 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4358-pcie.bin*" | ||
1518 | FILES:${PN}-bcm43602 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43602-pcie.bin* \ | ||
1519 | ${nonarch_base_libdir}/firmware/brcm/brcmfmac43602-pcie.ap.bin* \ | ||
1520 | " | ||
1521 | FILES:${PN}-bcm4366b = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4366b-pcie.bin*" | ||
1522 | FILES:${PN}-bcm4366c = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4366c-pcie.bin*" | ||
1523 | FILES:${PN}-bcm4371 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4371-pcie.bin*" | ||
1524 | |||
1525 | # for i in `grep brcm WHENCE | grep ^File | sed 's/File: brcm.//g'`; do pkg=`echo $i | sed 's/-[sp40].*//g; s/\.bin//g; s/brcmfmac/bcm/g; s/_hdr/-hdr/g; s/BCM/bcm-0bb4-0306/g'`; echo -e "LICENSE:\${PN}-$pkg = \"Firmware-broadcom_bcm43xx\"\nRDEPENDS_\${PN}-$pkg += \"\${PN}-broadcom-license\""; done | ||
1526 | # Currently 1st one and last 6 have cypress LICENSE | ||
1527 | |||
1528 | LICENSE:${PN}-bcm43xx = "Firmware-broadcom_bcm43xx" | ||
1529 | RDEPENDS:${PN}-bcm43xx += "${PN}-broadcom-license" | ||
1530 | LICENSE:${PN}-bcm43xx-hdr = "Firmware-broadcom_bcm43xx" | ||
1531 | RDEPENDS:${PN}-bcm43xx-hdr += "${PN}-broadcom-license" | ||
1532 | LICENSE:${PN}-bcm4329-fullmac = "Firmware-broadcom_bcm43xx" | ||
1533 | RDEPENDS:${PN}-bcm4329-fullmac += "${PN}-broadcom-license" | ||
1534 | LICENSE:${PN}-bcm43236b = "Firmware-broadcom_bcm43xx" | ||
1535 | RDEPENDS:${PN}-bcm43236b += "${PN}-broadcom-license" | ||
1536 | LICENSE:${PN}-bcm4329 = "Firmware-broadcom_bcm43xx" | ||
1537 | RDEPENDS:${PN}-bcm4329 += "${PN}-broadcom-license" | ||
1538 | LICENSE:${PN}-bcm4330 = "Firmware-broadcom_bcm43xx" | ||
1539 | RDEPENDS:${PN}-bcm4330 += "${PN}-broadcom-license" | ||
1540 | LICENSE:${PN}-bcm4334 = "Firmware-broadcom_bcm43xx" | ||
1541 | RDEPENDS:${PN}-bcm4334 += "${PN}-broadcom-license" | ||
1542 | LICENSE:${PN}-bcm4335 = "Firmware-broadcom_bcm43xx" | ||
1543 | RDEPENDS:${PN}-bcm4335 += "${PN}-broadcom-license" | ||
1544 | LICENSE:${PN}-bcm4339 = "Firmware-broadcom_bcm43xx" | ||
1545 | RDEPENDS:${PN}-bcm4339 += "${PN}-broadcom-license" | ||
1546 | LICENSE:${PN}-bcm43241b0 = "Firmware-broadcom_bcm43xx" | ||
1547 | RDEPENDS:${PN}-bcm43241b0 += "${PN}-broadcom-license" | ||
1548 | LICENSE:${PN}-bcm43241b4 = "Firmware-broadcom_bcm43xx" | ||
1549 | RDEPENDS:${PN}-bcm43241b4 += "${PN}-broadcom-license" | ||
1550 | LICENSE:${PN}-bcm43241b5 = "Firmware-broadcom_bcm43xx" | ||
1551 | RDEPENDS:${PN}-bcm43241b5 += "${PN}-broadcom-license" | ||
1552 | LICENSE:${PN}-bcm43242a = "Firmware-broadcom_bcm43xx" | ||
1553 | RDEPENDS:${PN}-bcm43242a += "${PN}-broadcom-license" | ||
1554 | LICENSE:${PN}-bcm43143 = "Firmware-broadcom_bcm43xx" | ||
1555 | RDEPENDS:${PN}-bcm43143 += "${PN}-broadcom-license" | ||
1556 | LICENSE:${PN}-bcm43430a0 = "Firmware-broadcom_bcm43xx" | ||
1557 | RDEPENDS:${PN}-bcm43430a0 += "${PN}-broadcom-license" | ||
1558 | LICENSE:${PN}-bcm43455 = "Firmware-broadcom_bcm43xx" | ||
1559 | RDEPENDS:${PN}-bcm43455 += "${PN}-broadcom-license" | ||
1560 | LICENSE:${PN}-bcm4350c2 = "Firmware-broadcom_bcm43xx" | ||
1561 | RDEPENDS:${PN}-bcm4350c2 += "${PN}-broadcom-license" | ||
1562 | LICENSE:${PN}-bcm4350 = "Firmware-broadcom_bcm43xx" | ||
1563 | RDEPENDS:${PN}-bcm4350 += "${PN}-broadcom-license" | ||
1564 | LICENSE:${PN}-bcm4356 = "Firmware-broadcom_bcm43xx" | ||
1565 | RDEPENDS:${PN}-bcm4356 += "${PN}-broadcom-license" | ||
1566 | LICENSE:${PN}-bcm43569 = "Firmware-broadcom_bcm43xx" | ||
1567 | RDEPENDS:${PN}-bcm43569 += "${PN}-broadcom-license" | ||
1568 | LICENSE:${PN}-bcm43570 = "Firmware-broadcom_bcm43xx" | ||
1569 | RDEPENDS:${PN}-bcm43570 += "${PN}-broadcom-license" | ||
1570 | LICENSE:${PN}-bcm4358 = "Firmware-broadcom_bcm43xx" | ||
1571 | RDEPENDS:${PN}-bcm4358 += "${PN}-broadcom-license" | ||
1572 | LICENSE:${PN}-bcm43602 = "Firmware-broadcom_bcm43xx" | ||
1573 | RDEPENDS:${PN}-bcm43602 += "${PN}-broadcom-license" | ||
1574 | LICENSE:${PN}-bcm4366b = "Firmware-broadcom_bcm43xx" | ||
1575 | RDEPENDS:${PN}-bcm4366b += "${PN}-broadcom-license" | ||
1576 | LICENSE:${PN}-bcm4366c = "Firmware-broadcom_bcm43xx" | ||
1577 | RDEPENDS:${PN}-bcm4366c += "${PN}-broadcom-license" | ||
1578 | LICENSE:${PN}-bcm4371 = "Firmware-broadcom_bcm43xx" | ||
1579 | RDEPENDS:${PN}-bcm4371 += "${PN}-broadcom-license" | ||
1580 | |||
1581 | # For broadcom cypress | ||
1582 | |||
1583 | LICENSE:${PN}-cypress-license = "Firmware-cypress" | ||
1584 | FILES:${PN}-cypress-license = "${nonarch_base_libdir}/firmware/LICENCE.cypress" | ||
1585 | |||
1586 | FILES:${PN}-bcm-0bb4-0306 = "${nonarch_base_libdir}/firmware/brcm/BCM-0bb4-0306.hcd*" | ||
1587 | FILES:${PN}-bcm43340 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43340-sdio.* \ | ||
1588 | ${nonarch_base_libdir}/firmware/cypress/cyfmac43340-sdio.*" | ||
1589 | FILES:${PN}-bcm43362 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43362-sdio.* \ | ||
1590 | ${nonarch_base_libdir}/firmware/cypress/cyfmac43362-sdio.*" | ||
1591 | FILES:${PN}-bcm43430 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43430-sdio.* \ | ||
1592 | ${nonarch_base_libdir}/firmware/cypress/cyfmac43430-sdio.*" | ||
1593 | FILES:${PN}-bcm4354 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4354-sdio.bin* \ | ||
1594 | ${nonarch_base_libdir}/firmware/cypress/cyfmac4354-sdio.bin* \ | ||
1595 | " | ||
1596 | FILES:${PN}-bcm4356-pcie = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4356-pcie.* \ | ||
1597 | ${nonarch_base_libdir}/firmware/cypress/cyfmac4356-pcie.* \ | ||
1598 | " | ||
1599 | FILES:${PN}-bcm4373 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4373-sdio.bin* \ | ||
1600 | ${nonarch_base_libdir}/firmware/brcm/brcmfmac4373.bin* \ | ||
1601 | ${nonarch_base_libdir}/firmware/cypress/cyfmac4373-sdio.bin* \ | ||
1602 | ${nonarch_base_libdir}/firmware/brcm/brcmfmac4373-sdio.clm_blob* \ | ||
1603 | ${nonarch_base_libdir}/firmware/cypress/cyfmac4373-sdio.clm_blob* \ | ||
1604 | " | ||
1605 | |||
1606 | LICENSE:${PN}-bcm-0bb4-0306 = "Firmware-cypress" | ||
1607 | RDEPENDS:${PN}-bcm-0bb4-0306 += "${PN}-cypress-license" | ||
1608 | LICENSE:${PN}-bcm43340 = "Firmware-cypress" | ||
1609 | RDEPENDS:${PN}-bcm43340 += "${PN}-cypress-license" | ||
1610 | LICENSE:${PN}-bcm43362 = "Firmware-cypress" | ||
1611 | RDEPENDS:${PN}-bcm43362 += "${PN}-cypress-license" | ||
1612 | LICENSE:${PN}-bcm43430 = "Firmware-cypress" | ||
1613 | RDEPENDS:${PN}-bcm43430 += "${PN}-cypress-license" | ||
1614 | LICENSE:${PN}-bcm4354 = "Firmware-cypress" | ||
1615 | RDEPENDS:${PN}-bcm4354 += "${PN}-cypress-license" | ||
1616 | LICENSE:${PN}-bcm4356-pcie = "Firmware-cypress" | ||
1617 | RDEPENDS:${PN}-bcm4356-pcie += "${PN}-cypress-license" | ||
1618 | LICENSE:${PN}-bcm4373 = "Firmware-cypress" | ||
1619 | RDEPENDS:${PN}-bcm4373 += "${PN}-cypress-license" | ||
1620 | |||
1621 | # For Broadcom bnx2 | ||
1622 | # | ||
1623 | # which is a separate case to the other Broadcom firmwares since its | ||
1624 | # license is contained in the shared WHENCE file. | ||
1625 | |||
1626 | LICENSE:${PN}-bnx2 = "WHENCE" | ||
1627 | LICENSE:${PN}-whence-license = "WHENCE" | ||
1628 | |||
1629 | FILES:${PN}-bnx2 = " \ | ||
1630 | ${nonarch_base_libdir}/firmware/bnx2/bnx2-mips*.fw* \ | ||
1631 | ${nonarch_base_libdir}/firmware/bnx2/bnx2-rv2p*.fw* \ | ||
1632 | " | ||
1633 | FILES:${PN}-whence-license = "${nonarch_base_libdir}/firmware/WHENCE" | ||
1634 | |||
1635 | RDEPENDS:${PN}-bnx2 += "${PN}-whence-license" | ||
1636 | RPROVIDES:${PN}-bnx2 = "${PN}-bnx2-mips" | ||
1637 | |||
1638 | LICENSE:${PN}-bnx2x = "WHENCE" | ||
1639 | |||
1640 | FILES:${PN}-bnx2x = "${nonarch_base_libdir}/firmware/bnx2x/bnx2x*.fw*" | ||
1641 | |||
1642 | RDEPENDS:${PN}-bnx2x += "${PN}-whence-license" | ||
1643 | |||
1644 | # For cirrus | ||
1645 | LICENSE:${PN}-cirrus = "Firmware-cirrus" | ||
1646 | LICENSE:${PN}-cirrus-license = "Firmware-cirrus" | ||
1647 | |||
1648 | FILES:${PN}-cirrus = "${nonarch_base_libdir}/firmware/cirrus/*" | ||
1649 | FILES:${PN}-cirrus-license = "${nonarch_base_libdir}/firmware/LICENSE.cirrus" | ||
1650 | |||
1651 | RDEPENDS:${PN}-cirrus += "${PN}-cirrus-license" | ||
1652 | |||
1653 | # For cnm | ||
1654 | LICENSE:${PN}-cnm = "Firmware-cnm" | ||
1655 | LICENSE:${PN}-cnm-license = "Firmware-cnm" | ||
1656 | |||
1657 | FILES:${PN}-cnm = "${nonarch_base_libdir}/firmware/cnm/wave521c_k3_codec_fw.bin*" | ||
1658 | FILES:${PN}-cnm-license = "${nonarch_base_libdir}/firmware/LICENCE.cnm" | ||
1659 | |||
1660 | RDEPENDS:${PN}-cnm += "${PN}-cnm-license" | ||
1661 | |||
1662 | # For imx-sdma | ||
1663 | LICENSE:${PN}-imx-sdma-imx6q = "Firmware-imx-sdma_firmware" | ||
1664 | LICENSE:${PN}-imx-sdma-imx7d = "Firmware-imx-sdma_firmware" | ||
1665 | LICENSE:${PN}-imx-sdma-license = "Firmware-imx-sdma_firmware" | ||
1666 | |||
1667 | FILES:${PN}-imx-sdma-imx6q = "${nonarch_base_libdir}/firmware/imx/sdma/sdma-imx6q.bin*" | ||
1668 | |||
1669 | RPROVIDES:${PN}-imx-sdma-imx6q = "firmware-imx-sdma-imx6q" | ||
1670 | RREPLACES:${PN}-imx-sdma-imx6q = "firmware-imx-sdma-imx6q" | ||
1671 | RCONFLICTS:${PN}-imx-sdma-imx6q = "firmware-imx-sdma-imx6q" | ||
1672 | |||
1673 | FILES:${PN}-imx-sdma-imx7d = "${nonarch_base_libdir}/firmware/imx/sdma/sdma-imx7d.bin*" | ||
1674 | |||
1675 | FILES:${PN}-imx-sdma-license = "${nonarch_base_libdir}/firmware/LICENSE.sdma_firmware" | ||
1676 | |||
1677 | RDEPENDS:${PN}-imx-sdma-imx6q += "${PN}-imx-sdma-license" | ||
1678 | RDEPENDS:${PN}-imx-sdma-imx7d += "${PN}-imx-sdma-license" | ||
1679 | |||
1680 | # For iwlwifi | ||
1681 | LICENSE:${PN}-iwlwifi = "Firmware-iwlwifi_firmware" | ||
1682 | LICENSE:${PN}-iwlwifi-135-6 = "Firmware-iwlwifi_firmware" | ||
1683 | LICENSE:${PN}-iwlwifi-3160-7 = "Firmware-iwlwifi_firmware" | ||
1684 | LICENSE:${PN}-iwlwifi-3160-8 = "Firmware-iwlwifi_firmware" | ||
1685 | LICENSE:${PN}-iwlwifi-3160-9 = "Firmware-iwlwifi_firmware" | ||
1686 | LICENSE:${PN}-iwlwifi-3160-10 = "Firmware-iwlwifi_firmware" | ||
1687 | LICENSE:${PN}-iwlwifi-3160-12 = "Firmware-iwlwifi_firmware" | ||
1688 | LICENSE:${PN}-iwlwifi-3160-13 = "Firmware-iwlwifi_firmware" | ||
1689 | LICENSE:${PN}-iwlwifi-3160-16 = "Firmware-iwlwifi_firmware" | ||
1690 | LICENSE:${PN}-iwlwifi-3160-17 = "Firmware-iwlwifi_firmware" | ||
1691 | LICENSE:${PN}-iwlwifi-6000-4 = "Firmware-iwlwifi_firmware" | ||
1692 | LICENSE:${PN}-iwlwifi-6000g2a-5 = "Firmware-iwlwifi_firmware" | ||
1693 | LICENSE:${PN}-iwlwifi-6000g2a-6 = "Firmware-iwlwifi_firmware" | ||
1694 | LICENSE:${PN}-iwlwifi-6000g2b-5 = "Firmware-iwlwifi_firmware" | ||
1695 | LICENSE:${PN}-iwlwifi-6000g2b-6 = "Firmware-iwlwifi_firmware" | ||
1696 | LICENSE:${PN}-iwlwifi-6050-4 = "Firmware-iwlwifi_firmware" | ||
1697 | LICENSE:${PN}-iwlwifi-6050-5 = "Firmware-iwlwifi_firmware" | ||
1698 | LICENSE:${PN}-iwlwifi-7260 = "Firmware-iwlwifi_firmware" | ||
1699 | LICENSE:${PN}-iwlwifi-7265 = "Firmware-iwlwifi_firmware" | ||
1700 | LICENSE:${PN}-iwlwifi-7265d = "Firmware-iwlwifi_firmware" | ||
1701 | LICENSE:${PN}-iwlwifi-8000c = "Firmware-iwlwifi_firmware" | ||
1702 | LICENSE:${PN}-iwlwifi-8265 = "Firmware-iwlwifi_firmware" | ||
1703 | LICENSE:${PN}-iwlwifi-9000 = "Firmware-iwlwifi_firmware" | ||
1704 | LICENSE:${PN}-iwlwifi-9260 = "Firmware-iwlwifi_firmware" | ||
1705 | LICENSE:${PN}-iwlwifi-misc = "Firmware-iwlwifi_firmware" | ||
1706 | LICENSE:${PN}-iwlwifi-license = "Firmware-iwlwifi_firmware" | ||
1707 | |||
1708 | FILES:${PN}-iwlwifi-license = "${nonarch_base_libdir}/firmware/LICENCE.iwlwifi_firmware" | ||
1709 | FILES:${PN}-iwlwifi-135-6 = "${nonarch_base_libdir}/firmware/iwlwifi-135-6.ucode*" | ||
1710 | FILES:${PN}-iwlwifi-3160-7 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-7.ucode*" | ||
1711 | FILES:${PN}-iwlwifi-3160-8 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-8.ucode*" | ||
1712 | FILES:${PN}-iwlwifi-3160-9 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-9.ucode*" | ||
1713 | FILES:${PN}-iwlwifi-3160-10 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-10.ucode*" | ||
1714 | FILES:${PN}-iwlwifi-3160-12 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-12.ucode*" | ||
1715 | FILES:${PN}-iwlwifi-3160-13 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-13.ucode*" | ||
1716 | FILES:${PN}-iwlwifi-3160-16 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-16.ucode*" | ||
1717 | FILES:${PN}-iwlwifi-3160-17 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-17.ucode*" | ||
1718 | FILES:${PN}-iwlwifi-6000-4 = "${nonarch_base_libdir}/firmware/iwlwifi-6000-4.ucode*" | ||
1719 | FILES:${PN}-iwlwifi-6000g2a-5 = "${nonarch_base_libdir}/firmware/iwlwifi-6000g2a-5.ucode*" | ||
1720 | FILES:${PN}-iwlwifi-6000g2a-6 = "${nonarch_base_libdir}/firmware/iwlwifi-6000g2a-6.ucode*" | ||
1721 | FILES:${PN}-iwlwifi-6000g2b-5 = "${nonarch_base_libdir}/firmware/iwlwifi-6000g2b-5.ucode*" | ||
1722 | FILES:${PN}-iwlwifi-6000g2b-6 = "${nonarch_base_libdir}/firmware/iwlwifi-6000g2b-6.ucode*" | ||
1723 | FILES:${PN}-iwlwifi-6050-4 = "${nonarch_base_libdir}/firmware/iwlwifi-6050-4.ucode*" | ||
1724 | FILES:${PN}-iwlwifi-6050-5 = "${nonarch_base_libdir}/firmware/iwlwifi-6050-5.ucode*" | ||
1725 | FILES:${PN}-iwlwifi-7260 = "${nonarch_base_libdir}/firmware/iwlwifi-7260-*.ucode*" | ||
1726 | FILES:${PN}-iwlwifi-7265 = "${nonarch_base_libdir}/firmware/iwlwifi-7265-*.ucode*" | ||
1727 | FILES:${PN}-iwlwifi-7265d = "${nonarch_base_libdir}/firmware/iwlwifi-7265D-*.ucode*" | ||
1728 | FILES:${PN}-iwlwifi-8000c = "${nonarch_base_libdir}/firmware/iwlwifi-8000C-*.ucode*" | ||
1729 | FILES:${PN}-iwlwifi-8265 = "${nonarch_base_libdir}/firmware/iwlwifi-8265-*.ucode*" | ||
1730 | FILES:${PN}-iwlwifi-9000 = "${nonarch_base_libdir}/firmware/iwlwifi-9000-*.ucode*" | ||
1731 | FILES:${PN}-iwlwifi-9260 = "${nonarch_base_libdir}/firmware/iwlwifi-9260-*.ucode*" | ||
1732 | FILES:${PN}-iwlwifi-misc = " \ | ||
1733 | ${nonarch_base_libdir}/firmware/iwlwifi-*.ucode* \ | ||
1734 | ${nonarch_base_libdir}/firmware/iwlwifi-*.pnvm* \ | ||
1735 | " | ||
1736 | |||
1737 | RDEPENDS:${PN}-iwlwifi-135-6 = "${PN}-iwlwifi-license" | ||
1738 | RDEPENDS:${PN}-iwlwifi-3160-7 = "${PN}-iwlwifi-license" | ||
1739 | RDEPENDS:${PN}-iwlwifi-3160-8 = "${PN}-iwlwifi-license" | ||
1740 | RDEPENDS:${PN}-iwlwifi-3160-9 = "${PN}-iwlwifi-license" | ||
1741 | RDEPENDS:${PN}-iwlwifi-3160-10 = "${PN}-iwlwifi-license" | ||
1742 | RDEPENDS:${PN}-iwlwifi-3160-12 = "${PN}-iwlwifi-license" | ||
1743 | RDEPENDS:${PN}-iwlwifi-3160-13 = "${PN}-iwlwifi-license" | ||
1744 | RDEPENDS:${PN}-iwlwifi-3160-16 = "${PN}-iwlwifi-license" | ||
1745 | RDEPENDS:${PN}-iwlwifi-3160-17 = "${PN}-iwlwifi-license" | ||
1746 | RDEPENDS:${PN}-iwlwifi-6000-4 = "${PN}-iwlwifi-license" | ||
1747 | RDEPENDS:${PN}-iwlwifi-6000g2a-5 = "${PN}-iwlwifi-license" | ||
1748 | RDEPENDS:${PN}-iwlwifi-6000g2a-6 = "${PN}-iwlwifi-license" | ||
1749 | RDEPENDS:${PN}-iwlwifi-6000g2b-5 = "${PN}-iwlwifi-license" | ||
1750 | RDEPENDS:${PN}-iwlwifi-6000g2b-6 = "${PN}-iwlwifi-license" | ||
1751 | RDEPENDS:${PN}-iwlwifi-6050-4 = "${PN}-iwlwifi-license" | ||
1752 | RDEPENDS:${PN}-iwlwifi-6050-5 = "${PN}-iwlwifi-license" | ||
1753 | RDEPENDS:${PN}-iwlwifi-7260 = "${PN}-iwlwifi-license" | ||
1754 | RDEPENDS:${PN}-iwlwifi-7265 = "${PN}-iwlwifi-license" | ||
1755 | RDEPENDS:${PN}-iwlwifi-7265d = "${PN}-iwlwifi-license" | ||
1756 | RDEPENDS:${PN}-iwlwifi-8000c = "${PN}-iwlwifi-license" | ||
1757 | RDEPENDS:${PN}-iwlwifi-8265 = "${PN}-iwlwifi-license" | ||
1758 | RDEPENDS:${PN}-iwlwifi-9000 = "${PN}-iwlwifi-license" | ||
1759 | RDEPENDS:${PN}-iwlwifi-9260 = "${PN}-iwlwifi-license" | ||
1760 | RDEPENDS:${PN}-iwlwifi-misc = "${PN}-iwlwifi-license" | ||
1761 | |||
1762 | # -iwlwifi-misc is a "catch all" package that includes all the iwlwifi | ||
1763 | # firmwares that are not already included in other -iwlwifi- packages. | ||
1764 | # -iwlwifi is a virtual package that depends upon all iwlwifi packages. | ||
1765 | # These are distinct in order to allow the -misc firmwares to be installed | ||
1766 | # without pulling in every other iwlwifi package. | ||
1767 | ALLOW_EMPTY:${PN}-iwlwifi = "1" | ||
1768 | ALLOW_EMPTY:${PN}-iwlwifi-misc = "1" | ||
1769 | |||
1770 | # Handle package updating for the newly merged iwlwifi groupings | ||
1771 | RPROVIDES:${PN}-iwlwifi-7265 = "${PN}-iwlwifi-7265-8 ${PN}-iwlwifi-7265-9" | ||
1772 | RREPLACES:${PN}-iwlwifi-7265 = "${PN}-iwlwifi-7265-8 ${PN}-iwlwifi-7265-9" | ||
1773 | RCONFLICTS:${PN}-iwlwifi-7265 = "${PN}-iwlwifi-7265-8 ${PN}-iwlwifi-7265-9" | ||
1774 | |||
1775 | RPROVIDES:${PN}-iwlwifi-7260 = "${PN}-iwlwifi-7260-7 ${PN}-iwlwifi-7260-8 ${PN}-iwlwifi-7260-9" | ||
1776 | RREPLACES:${PN}-iwlwifi-7260 = "${PN}-iwlwifi-7260-7 ${PN}-iwlwifi-7260-8 ${PN}-iwlwifi-7260-9" | ||
1777 | RCONFLICTS:${PN}-iwlwifi-7260 = "${PN}-iwlwifi-7260-7 ${PN}-iwlwifi-7260-8 ${PN}-iwlwifi-7260-9" | ||
1778 | |||
1779 | # For ibt | ||
1780 | LICENSE:${PN}-ibt-license = "Firmware-ibt_firmware" | ||
1781 | LICENSE:${PN}-ibt-hw-37-7 = "Firmware-ibt_firmware" | ||
1782 | LICENSE:${PN}-ibt-hw-37-8 = "Firmware-ibt_firmware" | ||
1783 | LICENSE:${PN}-ibt-11-5 = "Firmware-ibt_firmware" | ||
1784 | LICENSE:${PN}-ibt-12-16 = "Firmware-ibt_firmware" | ||
1785 | LICENSE:${PN}-ibt-17 = "Firmware-ibt_firmware" | ||
1786 | LICENSE:${PN}-ibt-18 = "Firmware-ibt_firmware" | ||
1787 | LICENSE:${PN}-ibt-20 = "Firmware-ibt_firmware" | ||
1788 | LICENSE:${PN}-ibt-misc = "Firmware-ibt_firmware" | ||
1789 | |||
1790 | FILES:${PN}-ibt-license = "${nonarch_base_libdir}/firmware/LICENCE.ibt_firmware" | ||
1791 | FILES:${PN}-ibt-hw-37-7 = "${nonarch_base_libdir}/firmware/intel/ibt-hw-37.7*.bseq*" | ||
1792 | FILES:${PN}-ibt-hw-37-8 = "${nonarch_base_libdir}/firmware/intel/ibt-hw-37.8*.bseq*" | ||
1793 | FILES:${PN}-ibt-11-5 = "${nonarch_base_libdir}/firmware/intel/ibt-11-5.sfi* ${nonarch_base_libdir}/firmware/intel/ibt-11-5.ddc*" | ||
1794 | FILES:${PN}-ibt-12-16 = "${nonarch_base_libdir}/firmware/intel/ibt-12-16.sfi* ${nonarch_base_libdir}/firmware/intel/ibt-12-16.ddc*" | ||
1795 | FILES:${PN}-ibt-17 = "${nonarch_base_libdir}/firmware/intel/ibt-17-*.sfi* ${nonarch_base_libdir}/firmware/intel/ibt-17-*.ddc*" | ||
1796 | FILES:${PN}-ibt-18 = "${nonarch_base_libdir}/firmware/intel/ibt-18-*.sfi* ${nonarch_base_libdir}/firmware/intel/ibt-18-*.ddc*" | ||
1797 | FILES:${PN}-ibt-20 = "${nonarch_base_libdir}/firmware/intel/ibt-20-*.sfi* ${nonarch_base_libdir}/firmware/intel/ibt-20-*.ddc*" | ||
1798 | FILES:${PN}-ibt-misc = "${nonarch_base_libdir}/firmware/intel/ibt-*" | ||
1799 | |||
1800 | RDEPENDS:${PN}-ibt-hw-37-7 = "${PN}-ibt-license" | ||
1801 | RDEPENDS:${PN}-ibt-hw-37.8 = "${PN}-ibt-license" | ||
1802 | RDEPENDS:${PN}-ibt-11-5 = "${PN}-ibt-license" | ||
1803 | RDEPENDS:${PN}-ibt-12-16 = "${PN}-ibt-license" | ||
1804 | RDEPENDS:${PN}-ibt-17 = "${PN}-ibt-license" | ||
1805 | RDEPENDS:${PN}-ibt-18 = "${PN}-ibt-license" | ||
1806 | RDEPENDS:${PN}-ibt-20 = "${PN}-ibt-license" | ||
1807 | RDEPENDS:${PN}-ibt-misc = "${PN}-ibt-license" | ||
1808 | |||
1809 | ALLOW_EMPTY:${PN}-ibt = "1" | ||
1810 | ALLOW_EMPTY:${PN}-ibt-misc = "1" | ||
1811 | |||
1812 | LICENSE:${PN}-i915 = "Firmware-i915" | ||
1813 | LICENSE:${PN}-i915-license = "Firmware-i915" | ||
1814 | FILES:${PN}-i915-license = "${nonarch_base_libdir}/firmware/LICENSE.i915" | ||
1815 | FILES:${PN}-i915 = "${nonarch_base_libdir}/firmware/i915" | ||
1816 | RDEPENDS:${PN}-i915 = "${PN}-i915-license" | ||
1817 | |||
1818 | # For ice-enhanced | ||
1819 | LICENSE:${PN}-ice-enhanced = "Firmware-ice_enhanced" | ||
1820 | LICENSE:${PN}-ice-enhanced-license = "Firmware-ice_enhanced" | ||
1821 | |||
1822 | FILES:${PN}-ice-enhanced = " \ | ||
1823 | ${nonarch_base_libdir}/firmware/intel/ice/ddp-comms/* \ | ||
1824 | ${nonarch_base_libdir}/firmware/intel/ice/ddp-wireless_edge/* \ | ||
1825 | " | ||
1826 | FILES:${PN}-ice-enhanced-license = " \ | ||
1827 | ${nonarch_base_libdir}/firmware/LICENSE.ice_enhanced \ | ||
1828 | " | ||
1829 | RDEPENDS:${PN}-ice-enhanced = "${PN}-ice-enhanced-license" | ||
1830 | |||
1831 | LICENSE:${PN}-ice = "Firmware-ice" | ||
1832 | LICENSE:${PN}-ice-license = "Firmware-ice" | ||
1833 | FILES:${PN}-ice-license = "${nonarch_base_libdir}/firmware/LICENSE.ice" | ||
1834 | FILES:${PN}-ice = " \ | ||
1835 | ${nonarch_base_libdir}/firmware/intel/ice/ddp/* \ | ||
1836 | ${nonarch_base_libdir}/firmware/intel/ice/ddp-lag/* \ | ||
1837 | " | ||
1838 | RDEPENDS:${PN}-ice = "${PN}-ice-license" | ||
1839 | |||
1840 | FILES:${PN}-adsp-sst-license = "${nonarch_base_libdir}/firmware/LICENCE.adsp_sst" | ||
1841 | LICENSE:${PN}-adsp-sst = "Firmware-adsp_sst" | ||
1842 | LICENSE:${PN}-adsp-sst-license = "Firmware-adsp_sst" | ||
1843 | FILES:${PN}-adsp-sst = "\ | ||
1844 | ${nonarch_base_libdir}/firmware/intel/dsp_fw* \ | ||
1845 | ${nonarch_base_libdir}/firmware/intel/avs/*/dsp_basefw.bin \ | ||
1846 | " | ||
1847 | RDEPENDS:${PN}-adsp-sst = "${PN}-adsp-sst-license" | ||
1848 | |||
1849 | # For QAT | ||
1850 | LICENSE:${PN}-qat = "Firmware-qat" | ||
1851 | LICENSE:${PN}-qat-license = "Firmware-qat" | ||
1852 | FILES:${PN}-qat-license = "${nonarch_base_libdir}/firmware/LICENCE.qat_firmware" | ||
1853 | FILES:${PN}-qat = "${nonarch_base_libdir}/firmware/qat*.bin*" | ||
1854 | RDEPENDS:${PN}-qat = "${PN}-qat-license" | ||
1855 | |||
1856 | LICENSE:${PN}-qed = "WHENCE" | ||
1857 | FILES:${PN}-qed = "${nonarch_base_libdir}/firmware/qed/*" | ||
1858 | |||
1859 | LICENSE:${PN}-linaro-license = "Firmware-linaro" | ||
1860 | FILES:${PN}-linaro-license = "${nonarch_base_libdir}/firmware/LICENCE.linaro" | ||
1861 | |||
1862 | # For QCOM VPU/GPU and SDM845 | ||
1863 | LICENSE:${PN}-qcom-license = "Firmware-qcom" | ||
1864 | LICENSE:${PN}-qcom-2-license = "Firmware-qcom-2" | ||
1865 | LICENSE:${PN}-qcom-yamato-license = "Firmware-qcom-yamato" | ||
1866 | LICENSE:${PN}-qcom-aic100 = "Firmware-qcom" | ||
1867 | LICENSE:${PN}-qcom-qdu100 = "Firmware-qcom" | ||
1868 | LICENSE:${PN}-qcom-venus-1.8 = "Firmware-qcom" | ||
1869 | LICENSE:${PN}-qcom-venus-4.2 = "Firmware-qcom" | ||
1870 | LICENSE:${PN}-qcom-venus-5.2 = "Firmware-qcom" | ||
1871 | LICENSE:${PN}-qcom-venus-5.4 = "Firmware-qcom" | ||
1872 | LICENSE:${PN}-qcom-venus-6.0 = "Firmware-qcom" | ||
1873 | LICENSE:${PN}-qcom-vpu = "Firmware-qcom" | ||
1874 | LICENSE:${PN}-qcom-adreno-a2xx = "Firmware-qcom Firmware-qcom-yamato" | ||
1875 | LICENSE:${PN}-qcom-adreno-a3xx = "Firmware-qcom" | ||
1876 | LICENSE:${PN}-qcom-adreno-a4xx = "Firmware-qcom" | ||
1877 | LICENSE:${PN}-qcom-adreno-a530 = "Firmware-qcom" | ||
1878 | LICENSE:${PN}-qcom-adreno-a623 = "Firmware-qcom" | ||
1879 | LICENSE:${PN}-qcom-adreno-a630 = "Firmware-qcom" | ||
1880 | LICENSE:${PN}-qcom-adreno-a650 = "Firmware-qcom" | ||
1881 | LICENSE:${PN}-qcom-adreno-a660 = "Firmware-qcom" | ||
1882 | LICENSE:${PN}-qcom-adreno-a663 = "Firmware-qcom" | ||
1883 | LICENSE:${PN}-qcom-adreno-a702 = "Firmware-qcom" | ||
1884 | LICENSE:${PN}-qcom-adreno-g715 = "Firmware-qcom" | ||
1885 | LICENSE:${PN}-qcom-adreno-g750 = "Firmware-qcom" | ||
1886 | LICENSE:${PN}-qcom-apq8016-modem = "Firmware-qcom" | ||
1887 | LICENSE:${PN}-qcom-apq8016-wifi = "Firmware-qcom" | ||
1888 | LICENSE:${PN}-qcom-apq8096-audio = "Firmware-qcom" | ||
1889 | LICENSE:${PN}-qcom-apq8096-adreno = "Firmware-qcom" | ||
1890 | LICENSE:${PN}-qcom-apq8096-modem = "Firmware-qcom" | ||
1891 | LICENSE:${PN}-qcom-qcm2290-adreno = "Firmware-qcom" | ||
1892 | LICENSE:${PN}-qcom-qcm2290-audio = "Firmware-qcom" | ||
1893 | LICENSE:${PN}-qcom-qcm2290-modem = "Firmware-qcom" | ||
1894 | LICENSE:${PN}-qcom-qcm2290-wifi = "Firmware-qcom" | ||
1895 | LICENSE:${PN}-qcom-qcm6490-adreno = "Firmware-qcom" | ||
1896 | LICENSE:${PN}-qcom-qcm6490-audio = "Firmware-qcom" | ||
1897 | LICENSE:${PN}-qcom-qcm6490-compute = "Firmware-qcom" | ||
1898 | LICENSE:${PN}-qcom-qcm6490-ipa = "Firmware-qcom" | ||
1899 | LICENSE:${PN}-qcom-qcm6490-wifi = "Firmware-qcom" | ||
1900 | LICENSE:${PN}-qcom-qcm6490-qupv3fw = "Firmware-qcom" | ||
1901 | LICENSE:${PN}-qcom-qcs615-adreno = "Firmware-qcom" | ||
1902 | LICENSE:${PN}-qcom-qcs8300-adreno = "Firmware-qcom" | ||
1903 | LICENSE:${PN}-qcom-qcs8300-audio = "Firmware-qcom-2" | ||
1904 | LICENSE:${PN}-qcom-qcs8300-compute = "Firmware-qcom-2" | ||
1905 | LICENSE:${PN}-qcom-qcs8300-generalpurpose = "Firmware-qcom-2" | ||
1906 | LICENSE:${PN}-qcom-qcs8300-qupv3fw = "Firmware-qcom" | ||
1907 | LICENSE:${PN}-qcom-qrb4210-adreno = "Firmware-qcom" | ||
1908 | LICENSE:${PN}-qcom-qrb4210-audio = "Firmware-qcom" | ||
1909 | LICENSE:${PN}-qcom-qrb4210-compute = "Firmware-qcom" | ||
1910 | LICENSE:${PN}-qcom-qrb4210-modem = "Firmware-qcom" | ||
1911 | LICENSE:${PN}-qcom-qrb4210-wifi = "Firmware-qcom" | ||
1912 | LICENSE:${PN}-qcom-sa8775p-adreno = "Firmware-qcom" | ||
1913 | LICENSE:${PN}-qcom-sa8775p-audio = "Firmware-qcom-2" | ||
1914 | LICENSE:${PN}-qcom-sa8775p-compute = "Firmware-qcom-2" | ||
1915 | LICENSE:${PN}-qcom-sa8775p-generalpurpose = "Firmware-qcom-2" | ||
1916 | LICENSE:${PN}-qcom-sa8775p-qupv3fw = "Firmware-qcom" | ||
1917 | LICENSE:${PN}-qcom-sc8280xp-lenovo-x13s-audio = "Firmware-qcom & Firmware-linaro" | ||
1918 | LICENSE:${PN}-qcom-sc8280xp-lenovo-x13s-adreno = "Firmware-qcom" | ||
1919 | LICENSE:${PN}-qcom-sc8280xp-lenovo-x13s-compute = "Firmware-qcom" | ||
1920 | LICENSE:${PN}-qcom-sc8280xp-lenovo-x13s-sensors = "Firmware-qcom" | ||
1921 | LICENSE:${PN}-qcom-sc8280xp-lenovo-x13s-vpu = "Firmware-qcom" | ||
1922 | LICENSE:${PN}-qcom-sdm845-audio = "Firmware-qcom" | ||
1923 | LICENSE:${PN}-qcom-sdm845-adreno = "Firmware-qcom" | ||
1924 | LICENSE:${PN}-qcom-sdm845-compute = "Firmware-qcom" | ||
1925 | LICENSE:${PN}-qcom-sdm845-modem = "Firmware-qcom" | ||
1926 | LICENSE:${PN}-qcom-sdm845-thundercomm-db845c-sensors = "Firmware-qcom" | ||
1927 | LICENSE:${PN}-qcom-sm8250-audio = "Firmware-qcom" | ||
1928 | LICENSE:${PN}-qcom-sm8250-adreno = "Firmware-qcom" | ||
1929 | LICENSE:${PN}-qcom-sm8250-compute = "Firmware-qcom" | ||
1930 | LICENSE:${PN}-qcom-sm8250-thundercomm-rb5-sensors = "Firmware-qcom" | ||
1931 | LICENSE:${PN}-qcom-sm8550-audio-tplg = "Firmware-linaro" | ||
1932 | LICENSE:${PN}-qcom-sm8650-audio-tplg = "Firmware-linaro" | ||
1933 | LICENSE:${PN}-qcom-x1e80100-adreno = "Firmware-qcom" | ||
1934 | LICENSE:${PN}-qcom-x1e80100-audio = "Firmware-qcom" | ||
1935 | LICENSE:${PN}-qcom-x1e80100-lenovo-t14s-g6-adreno = "Firmware-qcom" | ||
1936 | LICENSE:${PN}-qcom-x1e80100-lenovo-t14s-g6-audio = "Firmware-qcom & Firmware-linaro" | ||
1937 | LICENSE:${PN}-qcom-x1e80100-lenovo-t14s-g6-compute = "Firmware-qcom" | ||
1938 | LICENSE:${PN}-qcom-x1e80100-lenovo-t14s-g6-vpu = "Firmware-qcom" | ||
1939 | LICENSE:${PN}-qcom-x1e80100-lenovo-yoga-slim7x-adreno = "Firmware-qcom" | ||
1940 | LICENSE:${PN}-qcom-x1e80100-lenovo-yoga-slim7x-audio = "Firmware-qcom & Firmware-linaro" | ||
1941 | LICENSE:${PN}-qcom-x1e80100-lenovo-yoga-slim7x-compute = "Firmware-qcom" | ||
1942 | LICENSE:${PN}-qcom-x1e80100-lenovo-yoga-slim7x-vpu = "Firmware-qcom" | ||
1943 | LICENSE:${PN}-qcom-x1p42100-adreno = "Firmware-qcom" | ||
1944 | |||
1945 | FILES:${PN}-qcom-license = "${nonarch_base_libdir}/firmware/LICENSE.qcom ${nonarch_base_libdir}/firmware/qcom/NOTICE.txt" | ||
1946 | FILES:${PN}-qcom-2-license = "${nonarch_base_libdir}/firmware/LICENSE.qcom-2" | ||
1947 | FILES:${PN}-qcom-yamato-license = "${nonarch_base_libdir}/firmware/LICENSE.qcom_yamato" | ||
1948 | |||
1949 | FILES:${PN}-qcom-aic100 = "${nonarch_base_libdir}/firmware/qcom/aic100/*" | ||
1950 | FILES:${PN}-qcom-qdu100 = "${nonarch_base_libdir}/firmware/qcom/qdu100/*" | ||
1951 | |||
1952 | FILES:${PN}-qcom-venus-1.8 = "${nonarch_base_libdir}/firmware/qcom/venus-1.8/*" | ||
1953 | FILES:${PN}-qcom-venus-4.2 = "${nonarch_base_libdir}/firmware/qcom/venus-4.2/*" | ||
1954 | FILES:${PN}-qcom-venus-5.2 = "${nonarch_base_libdir}/firmware/qcom/venus-5.2/*" | ||
1955 | FILES:${PN}-qcom-venus-5.4 = "${nonarch_base_libdir}/firmware/qcom/venus-5.4/*" | ||
1956 | FILES:${PN}-qcom-venus-6.0 = "${nonarch_base_libdir}/firmware/qcom/venus-6.0/*" | ||
1957 | FILES:${PN}-qcom-vpu = " \ | ||
1958 | ${nonarch_base_libdir}/firmware/qcom/vpu/* \ | ||
1959 | ${nonarch_base_libdir}/firmware/qcom/vpu-1.0/* \ | ||
1960 | ${nonarch_base_libdir}/firmware/qcom/vpu-2.0/* \ | ||
1961 | " | ||
1962 | FILES:${PN}-qcom-adreno-a2xx = "${nonarch_base_libdir}/firmware/qcom/leia_*.fw* ${nonarch_base_libdir}/firmware/qcom/yamato_*.fw* ${nonarch_base_libdir}/firmware/qcom/a2*_*.fw*" | ||
1963 | FILES:${PN}-qcom-adreno-a3xx = "${nonarch_base_libdir}/firmware/qcom/a3*_*.fw* ${nonarch_base_libdir}/firmware/a300_*.fw*" | ||
1964 | FILES:${PN}-qcom-adreno-a4xx = "${nonarch_base_libdir}/firmware/qcom/a4*_*.fw*" | ||
1965 | FILES:${PN}-qcom-adreno-a530 = "${nonarch_base_libdir}/firmware/qcom/a530*.fw*" | ||
1966 | FILES:${PN}-qcom-adreno-a623 = "${nonarch_base_libdir}/firmware/qcom/a623*.*" | ||
1967 | FILES:${PN}-qcom-adreno-a630 = "${nonarch_base_libdir}/firmware/qcom/a630*.*" | ||
1968 | FILES:${PN}-qcom-adreno-a650 = "${nonarch_base_libdir}/firmware/qcom/a650*.*" | ||
1969 | FILES:${PN}-qcom-adreno-a660 = "${nonarch_base_libdir}/firmware/qcom/a660*.*" | ||
1970 | FILES:${PN}-qcom-adreno-a663 = "${nonarch_base_libdir}/firmware/qcom/a663*.*" | ||
1971 | FILES:${PN}-qcom-adreno-a702 = "${nonarch_base_libdir}/firmware/qcom/a702*.*" | ||
1972 | FILES:${PN}-qcom-adreno-g750 = "${nonarch_base_libdir}/firmware/qcom/gen70500_*.*" | ||
1973 | FILES:${PN}-qcom-adreno-g715 = "${nonarch_base_libdir}/firmware/qcom/gen71500_*.*" | ||
1974 | FILES:${PN}-qcom-apq8016-modem = "${nonarch_base_libdir}/firmware/qcom/apq8016/mba.mbn* ${nonarch_base_libdir}/firmware/qcom/apq8016/modem.mbn*" | ||
1975 | FILES:${PN}-qcom-apq8016-wifi = "${nonarch_base_libdir}/firmware/qcom/apq8016/wcnss.mbn* ${nonarch_base_libdir}/firmware/qcom/apq8016/WCNSS*" | ||
1976 | FILES:${PN}-qcom-apq8096-adreno = "${nonarch_base_libdir}/firmware/qcom/apq8096/a530_zap.mbn* ${nonarch_base_libdir}/firmware/qcom/a530_zap.mdt*" | ||
1977 | FILES:${PN}-qcom-apq8096-audio = "${nonarch_base_libdir}/firmware/qcom/apq8096/adsp*.*" | ||
1978 | FILES:${PN}-qcom-apq8096-modem = "${nonarch_base_libdir}/firmware/qcom/apq8096/mba.mbn* ${nonarch_base_libdir}/firmware/qcom/apq8096/modem*.* ${nonarch_base_libdir}/firmware/qcom/apq8096/wlanmdsp.mbn*" | ||
1979 | FILES:${PN}-qcom-qcm2290-adreno = "${nonarch_base_libdir}/firmware/qcom/qcm2290/a702_zap.mbn*" | ||
1980 | FILES:${PN}-qcom-qcm2290-audio = "${nonarch_base_libdir}/firmware/qcom/qcm2290/adsp*.*" | ||
1981 | FILES:${PN}-qcom-qcm2290-modem = "${nonarch_base_libdir}/firmware/qcom/qcm2290/modem*.*" | ||
1982 | FILES:${PN}-qcom-qcm2290-wifi = "${nonarch_base_libdir}/firmware/qcom/qcm2290/wlanmdsp.mbn* ${nonarch_base_libdir}/firmware/ath10k/WCN3990/hw1.0/qcm2290/*" | ||
1983 | FILES:${PN}-qcom-qcm6490-adreno = "${nonarch_base_libdir}/firmware/qcom/qc[ms]6490/a660_zap.mbn*" | ||
1984 | FILES:${PN}-qcom-qcm6490-audio = "${nonarch_base_libdir}/firmware/qcom/qc[ms]6490/adsp*.* ${nonarch_base_libdir}/firmware/qcom/qc[ms]6490/battmgr.jsn" | ||
1985 | FILES:${PN}-qcom-qcm6490-compute = "${nonarch_base_libdir}/firmware/qcom/qc[ms]6490/cdsp*.*" | ||
1986 | FILES:${PN}-qcom-qcm6490-ipa = "${nonarch_base_libdir}/firmware/qcom/qcm6490/ipa_fws.mbn" | ||
1987 | FILES:${PN}-qcom-qcm6490-wifi = "${nonarch_base_libdir}/firmware/qcom/qc[ms]6490/wpss.mbn*" | ||
1988 | FILES:${PN}-qcom-qcm6490-qupv3fw = "${nonarch_base_libdir}/firmware/qcom/qcm6490/qupv3fw.elf*" | ||
1989 | FILES:${PN}-qcom-qcs615-adreno = "${nonarch_base_libdir}/firmware/qcom/qcs615/a612_zap.mbn*" | ||
1990 | FILES:${PN}-qcom-qcs8300-adreno = "${nonarch_base_libdir}/firmware/qcom/qcs8300/a623_zap.mbn*" | ||
1991 | FILES:${PN}-qcom-qcs8300-audio = "${nonarch_base_libdir}/firmware/qcom/qcs8300/adsp*.*" | ||
1992 | FILES:${PN}-qcom-qcs8300-compute = "${nonarch_base_libdir}/firmware/qcom/qcs8300/cdsp*.*" | ||
1993 | FILES:${PN}-qcom-qcs8300-generalpurpose = "${nonarch_base_libdir}/firmware/qcom/qcs8300/gpdsp*.*" | ||
1994 | FILES:${PN}-qcom-qcs8300-qupv3fw = "${nonarch_base_libdir}/firmware/qcom/qcs8300/qupv3fw.elf*" | ||
1995 | FILES:${PN}-qcom-qrb4210-adreno = "${nonarch_base_libdir}/firmware/qcom/qrb4210/a610_zap.mbn*" | ||
1996 | FILES:${PN}-qcom-qrb4210-audio = "${nonarch_base_libdir}/firmware/qcom/qrb4210/adsp*.*" | ||
1997 | FILES:${PN}-qcom-qrb4210-compute = "${nonarch_base_libdir}/firmware/qcom/qrb4210/cdsp*.*" | ||
1998 | FILES:${PN}-qcom-qrb4210-modem = "${nonarch_base_libdir}/firmware/qcom/qrb4210/modem*.*" | ||
1999 | FILES:${PN}-qcom-qrb4210-wifi = "${nonarch_base_libdir}/firmware/qcom/qrb4210/wlanmdsp.mbn* ${nonarch_base_libdir}/firmware/ath10k/WCN3990/hw1.0/qrb4210/*" | ||
2000 | FILES:${PN}-qcom-sa8775p-adreno = "${nonarch_base_libdir}/firmware/qcom/sa8775p/a663_zap.mbn*" | ||
2001 | FILES:${PN}-qcom-sa8775p-audio = "${nonarch_base_libdir}/firmware/qcom/sa8775p/adsp*.*" | ||
2002 | FILES:${PN}-qcom-sa8775p-compute = "${nonarch_base_libdir}/firmware/qcom/sa8775p/cdsp*.*" | ||
2003 | FILES:${PN}-qcom-sa8775p-generalpurpose = "${nonarch_base_libdir}/firmware/qcom/sa8775p/gpdsp*.*" | ||
2004 | FILES:${PN}-qcom-sa8775p-qupv3fw = "${nonarch_base_libdir}/firmware/qcom/sa8775p/qupv3fw.elf*" | ||
2005 | FILES:${PN}-qcom-sc8280xp-lenovo-x13s-compat = "${nonarch_base_libdir}/firmware/qcom/LENOVO/21BX" | ||
2006 | FILES:${PN}-qcom-sc8280xp-lenovo-x13s-audio = "${nonarch_base_libdir}/firmware/qcom/sc8280xp/LENOVO/21BX/*adsp*.* ${nonarch_base_libdir}/firmware/qcom/sc8280xp/LENOVO/21BX/battmgr.jsn* ${nonarch_base_libdir}/firmware/qcom/sc8280xp/LENOVO/21BX/audioreach-tplg.bin* ${nonarch_base_libdir}/firmware/qcom/sc8280xp/SC8280XP-LENOVO-X13S-tplg.bin*" | ||
2007 | FILES:${PN}-qcom-sc8280xp-lenovo-x13s-adreno = "${nonarch_base_libdir}/firmware/qcom/sc8280xp/LENOVO/21BX/qcdxkmsuc8280.mbn*" | ||
2008 | FILES:${PN}-qcom-sc8280xp-lenovo-x13s-compute = "${nonarch_base_libdir}/firmware/qcom/sc8280xp/LENOVO/21BX/*cdsp*.*" | ||
2009 | FILES:${PN}-qcom-sc8280xp-lenovo-x13s-sensors = "${nonarch_base_libdir}/firmware/qcom/sc8280xp/LENOVO/21BX/*slpi*.*" | ||
2010 | FILES:${PN}-qcom-sc8280xp-lenovo-x13s-vpu = "${nonarch_base_libdir}/firmware/qcom/sc8280xp/LENOVO/21BX/qcvss8280.mbn*" | ||
2011 | FILES:${PN}-qcom-sdm845-adreno = "${nonarch_base_libdir}/firmware/qcom/sdm845/a630*.*" | ||
2012 | FILES:${PN}-qcom-sdm845-audio = "${nonarch_base_libdir}/firmware/qcom/sdm845/adsp*.*" | ||
2013 | FILES:${PN}-qcom-sdm845-compute = "${nonarch_base_libdir}/firmware/qcom/sdm845/cdsp*.*" | ||
2014 | FILES:${PN}-qcom-sdm845-modem = "${nonarch_base_libdir}/firmware/qcom/sdm845/mba.mbn* ${nonarch_base_libdir}/firmware/qcom/sdm845/modem*.* ${nonarch_base_libdir}/firmware/qcom/sdm845/wlanmdsp.mbn* ${nonarch_base_libdir}/firmware/qcom/sdm845/notice.txt_wlanmdsp* \ | ||
2015 | ${nonarch_base_libdir}/firmware/ath10k/WCN3990/hw1.0/wlanmdsp.mbn* ${nonarch_base_libdir}/firmware/ath10k/WCN3990/hw1.0/notice.txt_wlanmdsp" | ||
2016 | FILES:${PN}-qcom-sdm845-thundercomm-db845c-sensors = "${nonarch_base_libdir}/firmware/qcom/sdm845/Thundercomm/db845c/slpi*.*" | ||
2017 | FILES:${PN}-qcom-sm8250-adreno = "${nonarch_base_libdir}/firmware/qcom/sm8250/a650*.*" | ||
2018 | FILES:${PN}-qcom-sm8250-audio = "${nonarch_base_libdir}/firmware/qcom/sm8250/adsp*.*" | ||
2019 | FILES:${PN}-qcom-sm8250-compute = "${nonarch_base_libdir}/firmware/qcom/sm8250/cdsp*.*" | ||
2020 | FILES:${PN}-qcom-sm8250-thundercomm-rb5-sensors = "${nonarch_base_libdir}/firmware/qcom/sm8250/Thundercomm/RB5/slpi*.*" | ||
2021 | FILES:${PN}-qcom-sm8550-audio-tplg = "${nonarch_base_libdir}/firmware/qcom/sm8550/*tplg.bin*" | ||
2022 | FILES:${PN}-qcom-sm8650-audio-tplg = "${nonarch_base_libdir}/firmware/qcom/sm8650/*tplg.bin*" | ||
2023 | FILES:${PN}-qcom-x1e80100-adreno = "${nonarch_base_libdir}/firmware/qcom/x1e80100/gen70500_zap.mbn*" | ||
2024 | FILES:${PN}-qcom-x1e80100-audio = "${nonarch_base_libdir}/firmware/qcom/x1e80100/adsp*.* ${nonarch_base_libdir}/firmware/qcom/x1e80100/battmgr.jsn" | ||
2025 | FILES:${PN}-qcom-x1e80100-lenovo-t14s-g6-adreno = "${nonarch_base_libdir}/firmware/qcom/x1e80100/LENOVO/21N1/qcdxkmsuc8380.mbn*" | ||
2026 | FILES:${PN}-qcom-x1e80100-lenovo-t14s-g6-audio = "${nonarch_base_libdir}/firmware/qcom/x1e80100/LENOVO/21N1/*adsp*.* ${nonarch_base_libdir}/firmware/qcom/x1e80100/LENOVO/21N1/battmgr.jsn* ${nonarch_base_libdir}/firmware/qcom/x1e80100/LENOVO/21N1/X1E80100-LENOVO-Thinkpad-T14s-tplg.bin* ${nonarch_base_libdir}/firmware/qcom/x1e80100/X1E80100-LENOVO-Thinkpad-T14s-tplg.bin*" | ||
2027 | FILES:${PN}-qcom-x1e80100-lenovo-t14s-g6-compute = "${nonarch_base_libdir}/firmware/qcom/x1e80100/LENOVO/21N1/*cdsp*.*" | ||
2028 | FILES:${PN}-qcom-x1e80100-lenovo-t14s-g6-vpu = "${nonarch_base_libdir}/firmware/qcom/x1e80100/LENOVO/21N1/qcvss8380.mbn*" | ||
2029 | FILES:${PN}-qcom-x1e80100-lenovo-yoga-slim7x-adreno = "${nonarch_base_libdir}/firmware/qcom/x1e80100/LENOVO/83ED/qcdxkmsuc8380.mbn*" | ||
2030 | FILES:${PN}-qcom-x1e80100-lenovo-yoga-slim7x-audio = "${nonarch_base_libdir}/firmware/qcom/x1e80100/LENOVO/83ED/*adsp*.* ${nonarch_base_libdir}/firmware/qcom/x1e80100/LENOVO/83ED/battmgr.jsn* ${nonarch_base_libdir}/firmware/qcom/x1e80100/LENOVO/83ED/X1E80100-LENOVO-Yoga-Slim7x-tplg.bin* ${nonarch_base_libdir}/firmware/qcom/x1e80100/X1E80100-LENOVO-Yoga-Slim7x-tplg.bin*" | ||
2031 | FILES:${PN}-qcom-x1e80100-lenovo-yoga-slim7x-compute = "${nonarch_base_libdir}/firmware/qcom/x1e80100/LENOVO/83ED/*cdsp*.*" | ||
2032 | FILES:${PN}-qcom-x1e80100-lenovo-yoga-slim7x-vpu = "${nonarch_base_libdir}/firmware/qcom/x1e80100/LENOVO/83ED/qcvss8380.mbn* ${nonarch_base_libdir}/firmware/qcom/x1e80100/LENOVO/83ED/qcav1e8380.mbn*" | ||
2033 | FILES:${PN}-qcom-x1p42100-adreno = "${nonarch_base_libdir}/firmware/qcom/x1p42100/gen71500_zap.mbn*" | ||
2034 | |||
2035 | RDEPENDS:${PN}-qcom-aic100 = "${PN}-qcom-license" | ||
2036 | RDEPENDS:${PN}-qcom-qdu100 = "${PN}-qcom-license" | ||
2037 | |||
2038 | RDEPENDS:${PN}-qcom-venus-1.8 = "${PN}-qcom-license" | ||
2039 | RDEPENDS:${PN}-qcom-venus-4.2 = "${PN}-qcom-license" | ||
2040 | RDEPENDS:${PN}-qcom-venus-5.2 = "${PN}-qcom-license" | ||
2041 | RDEPENDS:${PN}-qcom-venus-5.4 = "${PN}-qcom-license" | ||
2042 | RDEPENDS:${PN}-qcom-venus-6.0 = "${PN}-qcom-license" | ||
2043 | RDEPENDS:${PN}-qcom-vpu = "${PN}-qcom-license" | ||
2044 | RDEPENDS:${PN}-qcom-adreno-a2xx = "${PN}-qcom-license ${PN}-qcom-yamato-license" | ||
2045 | RDEPENDS:${PN}-qcom-adreno-a3xx = "${PN}-qcom-license" | ||
2046 | RDEPENDS:${PN}-qcom-adreno-a4xx = "${PN}-qcom-license" | ||
2047 | RDEPENDS:${PN}-qcom-adreno-a530 = "${PN}-qcom-license" | ||
2048 | RDEPENDS:${PN}-qcom-adreno-a623 = "${PN}-qcom-license" | ||
2049 | RDEPENDS:${PN}-qcom-adreno-a630 = "${PN}-qcom-license" | ||
2050 | RDEPENDS:${PN}-qcom-adreno-a650 = "${PN}-qcom-license" | ||
2051 | RDEPENDS:${PN}-qcom-adreno-a660 = "${PN}-qcom-license" | ||
2052 | RDEPENDS:${PN}-qcom-adreno-a663 = "${PN}-qcom-license ${PN}-qcom-adreno-a660" | ||
2053 | RDEPENDS:${PN}-qcom-adreno-a702 = "${PN}-qcom-license" | ||
2054 | RDEPENDS:${PN}-qcom-adreno-g715 = "${PN}-qcom-license" | ||
2055 | RDEPENDS:${PN}-qcom-adreno-g750 = "${PN}-qcom-license" | ||
2056 | RDEPENDS:${PN}-qcom-apq8016-modem = "${PN}-qcom-license" | ||
2057 | RDEPENDS:${PN}-qcom-apq8016-wifi = "${PN}-qcom-license" | ||
2058 | RDEPENDS:${PN}-qcom-apq8096-adreno = "${PN}-qcom-license" | ||
2059 | RDEPENDS:${PN}-qcom-apq8096-audio = "${PN}-qcom-license" | ||
2060 | RDEPENDS:${PN}-qcom-apq8096-modem = "${PN}-qcom-license" | ||
2061 | RDEPENDS:${PN}-qcom-qcm2290-adreno = "${PN}-qcom-license" | ||
2062 | RDEPENDS:${PN}-qcom-qcm2290-audio = "${PN}-qcom-license" | ||
2063 | RDEPENDS:${PN}-qcom-qcm2290-modem = "${PN}-qcom-license" | ||
2064 | RDEPENDS:${PN}-qcom-qcm2290-wifi = "${PN}-qcom-license" | ||
2065 | RDEPENDS:${PN}-qcom-qcm6490-adreno = "${PN}-qcom-license" | ||
2066 | RPROVIDES:${PN}-qcom-qcm6490-adreno = "${PN}-qcom-qcs6490-adreno" | ||
2067 | RDEPENDS:${PN}-qcom-qcm6490-audio = "${PN}-qcom-license" | ||
2068 | RPROVIDES:${PN}-qcom-qcm6490-audio = "${PN}-qcom-qcs6490-audio" | ||
2069 | RDEPENDS:${PN}-qcom-qcm6490-compute = "${PN}-qcom-license" | ||
2070 | RPROVIDES:${PN}-qcom-qcm6490-compute = "${PN}-qcom-qcs6490-compute" | ||
2071 | RDEPENDS:${PN}-qcom-qcm6490-ipa = "${PN}-qcom-license" | ||
2072 | RDEPENDS:${PN}-qcom-qcm6490-wifi = "${PN}-qcom-license" | ||
2073 | RPROVIDES:${PN}-qcom-qcm6490-wifi = "${PN}-qcom-qcs6490-wifi" | ||
2074 | RDEPENDS:${PN}-qcom-qcm6490-qupv3fw = "${PN}-qcom-license" | ||
2075 | RDEPENDS:${PN}-qcom-qcs615-adreno = "${PN}-qcom-license" | ||
2076 | RDEPENDS:${PN}-qcom-qcs8300-adreno = "${PN}-qcom-license" | ||
2077 | RDEPENDS:${PN}-qcom-qcs8300-audio = "${PN}-qcom-2-license" | ||
2078 | RDEPENDS:${PN}-qcom-qcs8300-compute = "${PN}-qcom-2-license" | ||
2079 | RDEPENDS:${PN}-qcom-qcs8300-generalpurpose = "${PN}-qcom-2-license" | ||
2080 | RDEPENDS:${PN}-qcom-qcs8300-qupv3fw = "${PN}-qcom-license" | ||
2081 | RDEPENDS:${PN}-qcom-qrb4210-adreno = "${PN}-qcom-license" | ||
2082 | RDEPENDS:${PN}-qcom-qrb4210-audio = "${PN}-qcom-license" | ||
2083 | RDEPENDS:${PN}-qcom-qrb4210-compute = "${PN}-qcom-license" | ||
2084 | RDEPENDS:${PN}-qcom-qrb4210-modem = "${PN}-qcom-license" | ||
2085 | # Only symlinks in qcom-qrb4210-wifi, firmware is in qcom-qcm2290-wifi | ||
2086 | # c.f. https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/commit/?id=650e88378e76d5fad3997a5398f1ade47a74d924 | ||
2087 | RDEPENDS:${PN}-qcom-qrb4210-wifi = "${PN}-qcom-license ${PN}-qcom-qcm2290-wifi" | ||
2088 | RDEPENDS:${PN}-qcom-sa8775p-adreno = "${PN}-qcom-license" | ||
2089 | RDEPENDS:${PN}-qcom-sa8775p-audio = "${PN}-qcom-2-license" | ||
2090 | RDEPENDS:${PN}-qcom-sa8775p-compute = "${PN}-qcom-2-license" | ||
2091 | RDEPENDS:${PN}-qcom-sa8775p-generalpurpose = "${PN}-qcom-2-license" | ||
2092 | RDEPENDS:${PN}-qcom-sa8775p-qupv3fw = "${PN}-qcom-license" | ||
2093 | RDEPENDS:${PN}-qcom-sc8280xp-lenovo-x13s-audio = "${PN}-qcom-license ${PN}-linaro-license" | ||
2094 | RDEPENDS:${PN}-qcom-sc8280xp-lenovo-x13s-adreno = "${PN}-qcom-license" | ||
2095 | RDEPENDS:${PN}-qcom-sc8280xp-lenovo-x13s-compute = "${PN}-qcom-license" | ||
2096 | RDEPENDS:${PN}-qcom-sc8280xp-lenovo-x13s-sensors = "${PN}-qcom-license" | ||
2097 | RDEPENDS:${PN}-qcom-sc8280xp-lenovo-x13s-vpu = "${PN}-qcom-license" | ||
2098 | RDEPENDS:${PN}-qcom-sdm845-adreno = "${PN}-qcom-license" | ||
2099 | RDEPENDS:${PN}-qcom-sdm845-audio = "${PN}-qcom-license" | ||
2100 | RDEPENDS:${PN}-qcom-sdm845-compute = "${PN}-qcom-license" | ||
2101 | RDEPENDS:${PN}-qcom-sdm845-modem = "${PN}-qcom-license" | ||
2102 | RDEPENDS:${PN}-qcom-sdm845-thundercomm-db845c-sensors = "${PN}-qcom-license" | ||
2103 | RDEPENDS:${PN}-qcom-sm8250-adreno = "${PN}-qcom-license" | ||
2104 | RDEPENDS:${PN}-qcom-sm8250-audio = "${PN}-qcom-license" | ||
2105 | RDEPENDS:${PN}-qcom-sm8250-compute = "${PN}-qcom-license" | ||
2106 | RDEPENDS:${PN}-qcom-sm8250-thundercomm-rb5-sensors = "${PN}-qcom-license" | ||
2107 | RDEPENDS:${PN}-qcom-sm8550-audio-tplg = "${PN}-linaro-license" | ||
2108 | RDEPENDS:${PN}-qcom-sm8650-audio-tplg = "${PN}-linaro-license" | ||
2109 | RDEPENDS:${PN}-qcom-x1e80100-adreno = "${PN}-qcom-license" | ||
2110 | RDEPENDS:${PN}-qcom-x1e80100-audio = "${PN}-qcom-license" | ||
2111 | RDEPENDS:${PN}-qcom-x1e80100-lenovo-t14s-g6-adreno = "${PN}-qcom-license" | ||
2112 | RDEPENDS:${PN}-qcom-x1e80100-lenovo-t14s-g6-audio = "${PN}-qcom-license ${PN}-linaro-license" | ||
2113 | RDEPENDS:${PN}-qcom-x1e80100-lenovo-t14s-g6-compute = "${PN}-qcom-license" | ||
2114 | RDEPENDS:${PN}-qcom-x1e80100-lenovo-yoga-slim7x-adreno = "${PN}-qcom-license" | ||
2115 | RDEPENDS:${PN}-qcom-x1e80100-lenovo-yoga-slim7x-audio = "${PN}-qcom-license ${PN}-linaro-license" | ||
2116 | RDEPENDS:${PN}-qcom-x1e80100-lenovo-yoga-slim7x-compute = "${PN}-qcom-license" | ||
2117 | RDEPENDS:${PN}-qcom-x1e80100-lenovo-yoga-slim7x-vpu = "${PN}-qcom-license" | ||
2118 | RDEPENDS:${PN}-qcom-x1p42100-adreno = "${PN}-qcom-license" | ||
2119 | |||
2120 | RRECOMMENDS:${PN}-qcom-sc8280xp-lenovo-x13s-audio = "${PN}-qcom-sc8280xp-lenovo-x13s-compat" | ||
2121 | RRECOMMENDS:${PN}-qcom-sc8280xp-lenovo-x13s-adreno = "${PN}-qcom-sc8280xp-lenovo-x13s-compat" | ||
2122 | RRECOMMENDS:${PN}-qcom-sc8280xp-lenovo-x13s-compute = "${PN}-qcom-sc8280xp-lenovo-x13s-compat" | ||
2123 | RRECOMMENDS:${PN}-qcom-sc8280xp-lenovo-x13s-sensors = "${PN}-qcom-sc8280xp-lenovo-x13s-compat" | ||
2124 | RRECOMMENDS:${PN}-qcom-sc8280xp-lenovo-x13s-vpu = "${PN}-qcom-sc8280xp-lenovo-x13s-compat" | ||
2125 | |||
2126 | LICENSE:${PN}-liquidui = "Firmware-cavium_liquidio" | ||
2127 | FILES:${PN}-liquidio = "${nonarch_base_libdir}/firmware/liquidio" | ||
2128 | |||
2129 | LICENSE:${PN}-mellanox = "WHENCE" | ||
2130 | FILES:${PN}-mellanox = "${nonarch_base_libdir}/firmware/mellanox" | ||
2131 | |||
2132 | LICENSE:${PN}-prestera = "Firmware-Marvell" | ||
2133 | FILES:${PN}-prestera = "${nonarch_base_libdir}/firmware/mrvl/prestera" | ||
2134 | RDEPENDS:${PN}-prestera = "${PN}-marvell-license" | ||
2135 | |||
2136 | # For Rockchip | ||
2137 | LICENSE:${PN}-rockchip-dptx = "Firmware-rockchip" | ||
2138 | FILES:${PN}-rockchip-license = "${nonarch_base_libdir}/firmware/LICENCE.rockchip" | ||
2139 | FILES:${PN}-rockchip-dptx = "${nonarch_base_libdir}/firmware/rockchip/dptx.bin*" | ||
2140 | RDEPENDS:${PN}-rockchip-dptx = "${PN}-rockchip-license" | ||
2141 | |||
2142 | # For Amlogic VDEC | ||
2143 | LICENSE:${PN}-amlogic-vdec = "Firmware-amlogic_vdec" | ||
2144 | FILES:${PN}-amlogic-vdec-license = "${nonarch_base_libdir}/firmware/LICENSE.amlogic_vdec" | ||
2145 | FILES:${PN}-amlogic-vdec = "${nonarch_base_libdir}/firmware/meson/vdec/*" | ||
2146 | RDEPENDS:${PN}-amlogic-vdec = "${PN}-amlogic-vdec-license" | ||
2147 | |||
2148 | # For other firmwares | ||
2149 | # Maybe split out to separate packages when needed. | ||
2150 | LICENSE:${PN} = "\ | ||
2151 | Firmware-Abilis \ | ||
2152 | & Firmware-aeonsemi \ | ||
2153 | & Firmware-agere \ | ||
2154 | & Firmware-airoha \ | ||
2155 | & Firmware-alacritech \ | ||
2156 | & Firmware-amdgpu \ | ||
2157 | & Firmware-amdisp \ | ||
2158 | & Firmware-amdnpu \ | ||
2159 | & Firmware-amd_pmf \ | ||
2160 | & Firmware-amd-sev \ | ||
2161 | & Firmware-amd-ucode \ | ||
2162 | & Firmware-amlogic \ | ||
2163 | & Firmware-amlogic_vdec \ | ||
2164 | & Firmware-atmel \ | ||
2165 | & Firmware-bmi260 \ | ||
2166 | & Firmware-bnx2 \ | ||
2167 | & Firmware-bnx2x \ | ||
2168 | & Firmware-ca0132 \ | ||
2169 | & Firmware-cavium \ | ||
2170 | & Firmware-chelsio_firmware \ | ||
2171 | & Firmware-cirrus \ | ||
2172 | & Firmware-cnm \ | ||
2173 | & Firmware-cw1200 \ | ||
2174 | & Firmware-cw1200-sdd \ | ||
2175 | & Firmware-cxgb3 \ | ||
2176 | & Firmware-dabusb \ | ||
2177 | & Firmware-dib0700 \ | ||
2178 | & Firmware-e100 \ | ||
2179 | & Firmware-emi26 \ | ||
2180 | & Firmware-ene_firmware \ | ||
2181 | & Firmware-fw_sst_0f28 \ | ||
2182 | & Firmware-go7007 \ | ||
2183 | & Firmware-hfi1_firmware \ | ||
2184 | & Firmware-ibt_firmware \ | ||
2185 | & Firmware-intel \ | ||
2186 | & Firmware-intel_vpu \ | ||
2187 | & Firmware-ipu3_firmware \ | ||
2188 | & Firmware-it913x \ | ||
2189 | & Firmware-ivsc \ | ||
2190 | & Firmware-ixp4xx \ | ||
2191 | & Firmware-IntcSST2 \ | ||
2192 | & Firmware-kaweth \ | ||
2193 | & Firmware-keyspan \ | ||
2194 | & Firmware-montage \ | ||
2195 | & Firmware-moxa \ | ||
2196 | & Firmware-myri10ge_firmware \ | ||
2197 | & Firmware-nvidia \ | ||
2198 | & Firmware-nxp \ | ||
2199 | & Firmware-OLPC \ | ||
2200 | & Firmware-ath9k-htc \ | ||
2201 | & Firmware-phanfw \ | ||
2202 | & Firmware-qat \ | ||
2203 | & Firmware-qcom \ | ||
2204 | & Firmware-qla1280 \ | ||
2205 | & Firmware-qla2xxx \ | ||
2206 | & Firmware-r8a779x_usb3 \ | ||
2207 | & Firmware-radeon \ | ||
2208 | & Firmware-ralink_a_mediatek_company_firmware \ | ||
2209 | & Firmware-ralink-firmware \ | ||
2210 | & Firmware-imx-sdma_firmware \ | ||
2211 | & Firmware-siano \ | ||
2212 | & Firmware-ti-connectivity \ | ||
2213 | & Firmware-ti-keystone \ | ||
2214 | & Firmware-ti-tspa \ | ||
2215 | & Firmware-tigon \ | ||
2216 | & Firmware-typhoon \ | ||
2217 | & Firmware-ueagle-atm4-firmware \ | ||
2218 | & Firmware-wl1251 \ | ||
2219 | & Firmware-xc4000 \ | ||
2220 | & Firmware-xc5000 \ | ||
2221 | & Firmware-xc5000c \ | ||
2222 | & Firmware-xe \ | ||
2223 | & WHENCE \ | ||
2224 | " | ||
2225 | |||
2226 | FILES:${PN}-license += "${nonarch_base_libdir}/firmware/LICEN*" | ||
2227 | FILES:${PN} += "${nonarch_base_libdir}/firmware/*" | ||
2228 | RDEPENDS:${PN} += "${PN}-license" | ||
2229 | RDEPENDS:${PN} += "${PN}-whence-license" | ||
2230 | |||
2231 | # Make linux-firmware depend on all of the split-out packages. | ||
2232 | # Make linux-firmware-iwlwifi depend on all of the split-out iwlwifi packages. | ||
2233 | # Make linux-firmware-ibt depend on all of the split-out ibt packages. | ||
2234 | # Make linux-firmware-ath10k depend on all of the split-out ath10k packages. | ||
2235 | # Make linux-firmware-ath11k depend on all of the split-out ath11k packages. | ||
2236 | # Make linux-firmware-ath12k depend on all of the split-out ath12k packages. | ||
2237 | # Make linux-firmware-qca depend on all of the split-out qca packages. | ||
2238 | # Make linux-firmware-amdgpu depend on all of the split-out amdgpu packages. | ||
2239 | python populate_packages:prepend () { | ||
2240 | firmware_pkgs = oe.utils.packages_filter_out_system(d) | ||
2241 | d.appendVar('RRECOMMENDS:linux-firmware', ' ' + ' '.join(firmware_pkgs)) | ||
2242 | |||
2243 | iwlwifi_pkgs = filter(lambda x: x.find('-iwlwifi-') != -1, firmware_pkgs) | ||
2244 | d.appendVar('RRECOMMENDS:linux-firmware-iwlwifi', ' ' + ' '.join(iwlwifi_pkgs)) | ||
2245 | |||
2246 | ibt_pkgs = filter(lambda x: x.find('-ibt-') != -1, firmware_pkgs) | ||
2247 | d.appendVar('RRECOMMENDS:linux-firmware-ibt', ' ' + ' '.join(ibt_pkgs)) | ||
2248 | |||
2249 | ath10k_pkgs = filter(lambda x: x.find('-ath10k-') != -1, firmware_pkgs) | ||
2250 | d.appendVar('RRECOMMENDS:linux-firmware-ath10k', ' ' + ' '.join(ath10k_pkgs)) | ||
2251 | |||
2252 | ath11k_pkgs = filter(lambda x: x.find('-ath11k-') != -1, firmware_pkgs) | ||
2253 | d.appendVar('RRECOMMENDS:linux-firmware-ath11k', ' ' + ' '.join(ath11k_pkgs)) | ||
2254 | |||
2255 | ath12k_pkgs = filter(lambda x: x.find('-ath12k-') != -1, firmware_pkgs) | ||
2256 | d.appendVar('RRECOMMENDS:linux-firmware-ath12k', ' ' + ' '.join(ath12k_pkgs)) | ||
2257 | |||
2258 | qca_pkgs = filter(lambda x: x.find('-qca-') != -1, firmware_pkgs) | ||
2259 | d.appendVar('RRECOMMENDS:linux-firmware-qca', ' ' + ' '.join(qca_pkgs)) | ||
2260 | |||
2261 | amdgpu_pkgs = filter(lambda x: x.find('-amdgpu-') != -1, firmware_pkgs) | ||
2262 | d.appendVar('RRECOMMENDS:linux-firmware-amdgpu', ' ' + ' '.join(amdgpu_pkgs)) | ||
2263 | } | ||
2264 | |||
2265 | # Firmware files are generally not ran on the CPU, so they can be | ||
2266 | # allarch despite being architecture specific | ||
2267 | INSANE_SKIP = "arch" | ||
2268 | |||
2269 | # Don't warn about already stripped files | ||
2270 | INSANE_SKIP:${PN} = "already-stripped" | ||
2271 | |||
2272 | # No need to put firmware into the sysroot | ||
2273 | SYSROOT_DIRS_IGNORE += "${nonarch_base_libdir}/firmware" | ||
diff --git a/meta/recipes-kernel/linux-libc-headers/linux-libc-headers.inc b/meta/recipes-kernel/linux-libc-headers/linux-libc-headers.inc index 3867d09d08..1f5c47f453 100644 --- a/meta/recipes-kernel/linux-libc-headers/linux-libc-headers.inc +++ b/meta/recipes-kernel/linux-libc-headers/linux-libc-headers.inc | |||
@@ -2,7 +2,7 @@ SUMMARY = "Sanitized set of kernel headers for the C library's use" | |||
2 | HOMEPAGE = "https://www.kernel.org/" | 2 | HOMEPAGE = "https://www.kernel.org/" |
3 | DESCRIPTION = "Designed to maintain an Application Programming Interface (API) stable version of the Linux headers" | 3 | DESCRIPTION = "Designed to maintain an Application Programming Interface (API) stable version of the Linux headers" |
4 | SECTION = "devel" | 4 | SECTION = "devel" |
5 | LICENSE = "GPLv2" | 5 | LICENSE = "GPL-2.0-only" |
6 | 6 | ||
7 | ######################################################################### | 7 | ######################################################################### |
8 | #### PLEASE READ | 8 | #### PLEASE READ |
@@ -44,6 +44,8 @@ python __anonymous () { | |||
44 | d.setVar("HEADER_FETCH_VER", "4.x") | 44 | d.setVar("HEADER_FETCH_VER", "4.x") |
45 | elif major == "5": | 45 | elif major == "5": |
46 | d.setVar("HEADER_FETCH_VER", "5.x") | 46 | d.setVar("HEADER_FETCH_VER", "5.x") |
47 | elif major == "6": | ||
48 | d.setVar("HEADER_FETCH_VER", "6.x") | ||
47 | else: | 49 | else: |
48 | d.setVar("HEADER_FETCH_VER", "2.6") | 50 | d.setVar("HEADER_FETCH_VER", "2.6") |
49 | } | 51 | } |
@@ -58,7 +60,7 @@ KORG_ARCHIVE_COMPRESSION ?= "xz" | |||
58 | SRC_URI = "${KERNELORG_MIRROR}/linux/kernel/v${HEADER_FETCH_VER}/linux-${PV}.tar.${KORG_ARCHIVE_COMPRESSION}" | 60 | SRC_URI = "${KERNELORG_MIRROR}/linux/kernel/v${HEADER_FETCH_VER}/linux-${PV}.tar.${KORG_ARCHIVE_COMPRESSION}" |
59 | UPSTREAM_CHECK_URI = "https://www.kernel.org/" | 61 | UPSTREAM_CHECK_URI = "https://www.kernel.org/" |
60 | 62 | ||
61 | S = "${WORKDIR}/linux-${PV}" | 63 | S = "${UNPACKDIR}/linux-${PV}" |
62 | 64 | ||
63 | EXTRA_OEMAKE = " HOSTCC="${BUILD_CC}" HOSTCPP="${BUILD_CPP}"" | 65 | EXTRA_OEMAKE = " HOSTCC="${BUILD_CC}" HOSTCPP="${BUILD_CPP}"" |
64 | 66 | ||
@@ -103,7 +105,7 @@ do_install_armmultilib () { | |||
103 | 105 | ||
104 | BBCLASSEXTEND = "nativesdk" | 106 | BBCLASSEXTEND = "nativesdk" |
105 | 107 | ||
106 | RDEPENDS:${PN}-dev = "" | 108 | DEV_PKG_DEPENDENCY = "" |
107 | RRECOMMENDS:${PN}-dbg = "${PN}-dev (= ${EXTENDPKGV})" | 109 | RRECOMMENDS:${PN}-dbg = "${PN}-dev (= ${EXTENDPKGV})" |
108 | 110 | ||
109 | INHIBIT_DEFAULT_DEPS = "1" | 111 | INHIBIT_DEFAULT_DEPS = "1" |
diff --git a/meta/recipes-kernel/linux-libc-headers/linux-libc-headers/0001-include-linux-stddef.h-in-swab.h-uapi-header.patch b/meta/recipes-kernel/linux-libc-headers/linux-libc-headers/0001-include-linux-stddef.h-in-swab.h-uapi-header.patch deleted file mode 100644 index 5b7c1b6e21..0000000000 --- a/meta/recipes-kernel/linux-libc-headers/linux-libc-headers/0001-include-linux-stddef.h-in-swab.h-uapi-header.patch +++ /dev/null | |||
@@ -1,42 +0,0 @@ | |||
1 | From dc221138c809125dc1bbff8506c70cb7bd846368 Mon Sep 17 00:00:00 2001 | ||
2 | From: Khem Raj <raj.khem@gmail.com> | ||
3 | Date: Wed, 12 Sep 2018 17:08:58 -0700 | ||
4 | Subject: [PATCH] include linux/stddef.h in swab.h uapi header | ||
5 | |||
6 | swab.h uses __always_inline without including the header where it is | ||
7 | defined, this is exposed by musl based distributions where this macro is | ||
8 | not defined by system C library headers unlike glibc where it is defined | ||
9 | in sys/cdefs.h and that header gets pulled in indirectly via | ||
10 | |||
11 | features.h -> sys/cdefs.h | ||
12 | |||
13 | and features.h gets pulled in a lot of headers. Therefore it may work in | ||
14 | cases where features.h is includes but not otherwise. | ||
15 | |||
16 | Adding linux/stddef.h here ensures that __always_inline is always | ||
17 | defined independent of which C library is used in userspace | ||
18 | |||
19 | Upstream-Status: Submitted [https://lkml.org/lkml/2018/9/13/78] | ||
20 | |||
21 | Signed-off-by: Khem Raj <raj.khem@gmail.com> | ||
22 | Cc: Philippe Ombredanne <pombredanne@nexb.com> | ||
23 | Cc: Kate Stewart <kstewart@linuxfoundation.org> | ||
24 | Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org> | ||
25 | Cc: Thomas Gleixner <tglx@linutronix.de> | ||
26 | |||
27 | --- | ||
28 | include/uapi/linux/swab.h | 1 + | ||
29 | 1 file changed, 1 insertion(+) | ||
30 | |||
31 | diff --git a/include/uapi/linux/swab.h b/include/uapi/linux/swab.h | ||
32 | index 7272f85d6..2912fe463 100644 | ||
33 | --- a/include/uapi/linux/swab.h | ||
34 | +++ b/include/uapi/linux/swab.h | ||
35 | @@ -3,6 +3,7 @@ | ||
36 | #define _UAPI_LINUX_SWAB_H | ||
37 | |||
38 | #include <linux/types.h> | ||
39 | +#include <linux/stddef.h> | ||
40 | #include <linux/compiler.h> | ||
41 | #include <asm/bitsperlong.h> | ||
42 | #include <asm/swab.h> | ||
diff --git a/meta/recipes-kernel/linux-libc-headers/linux-libc-headers/0001-kbuild-install_headers.sh-Strip-_UAPI-from-if-define.patch b/meta/recipes-kernel/linux-libc-headers/linux-libc-headers/0001-kbuild-install_headers.sh-Strip-_UAPI-from-if-define.patch deleted file mode 100644 index 54528b6e6a..0000000000 --- a/meta/recipes-kernel/linux-libc-headers/linux-libc-headers/0001-kbuild-install_headers.sh-Strip-_UAPI-from-if-define.patch +++ /dev/null | |||
@@ -1,38 +0,0 @@ | |||
1 | From 9ca6c6a510bda90954aa2532711200b89dd1df89 Mon Sep 17 00:00:00 2001 | ||
2 | From: Dave Martin <Dave.Martin@arm.com> | ||
3 | Date: Tue, 11 Dec 2018 19:26:45 +0000 | ||
4 | Subject: [PATCH 1/3] kbuild: install_headers.sh: Strip _UAPI from | ||
5 | #if-defined() guards | ||
6 | |||
7 | install_headers.sh knows how to strip the _UAPI prefix from #ifdef/ | ||
8 | ifndef and #define directives used to guard headers against multiple | ||
9 | or inappropriate inclusion. Currently this does not work for guards | ||
10 | in the "#if defined()" style, which may be needed for non-trivial | ||
11 | cases. | ||
12 | |||
13 | This patch adds similar logic so that the _UAPI prefix is also | ||
14 | stripped from guard directives written using "#if defined()" etc. | ||
15 | |||
16 | This is not completely foolproof, but will work for simple cases of | ||
17 | using #if defined() to guard against inappropriate header inclusion. | ||
18 | |||
19 | Signed-off-by: Dave Martin <Dave.Martin@arm.com> | ||
20 | Signed-off-by: Bruce Ashfield <bruce.ashfield@windriver.com> | ||
21 | |||
22 | Upstream-Status: Submitted [https://www.spinics.net/lists/arm-kernel/msg694800.html] | ||
23 | --- | ||
24 | scripts/headers_install.sh | 1 + | ||
25 | 1 file changed, 1 insertion(+) | ||
26 | |||
27 | Index: linux-5.4/scripts/headers_install.sh | ||
28 | =================================================================== | ||
29 | --- linux-5.4.orig/scripts/headers_install.sh | ||
30 | +++ linux-5.4/scripts/headers_install.sh | ||
31 | @@ -36,6 +36,7 @@ | ||
32 | s/(^|[^a-zA-Z0-9])__packed([^a-zA-Z0-9_]|$)/\1__attribute__((packed))\2/g | ||
33 | s/(^|[[:space:](])(inline|asm|volatile)([[:space:](]|$)/\1__\2__\3/g | ||
34 | s@#(ifndef|define|endif[[:space:]]*/[*])[[:space:]]*_UAPI@#\1 @ | ||
35 | + :1;s/(#(if|elif)(.*[^A-Za-z0-9_])defined\([[:space:]]*)_UAPI/\1/;t1 | ||
36 | ' $INFILE > $TMPFILE || exit 1 | ||
37 | |||
38 | scripts/unifdef -U__KERNEL__ -D__EXPORTED_HEADERS__ $TMPFILE > $OUTFILE | ||
diff --git a/meta/recipes-kernel/linux-libc-headers/linux-libc-headers/0001-scripts-Use-fixed-input-and-output-files-instead-of-.patch b/meta/recipes-kernel/linux-libc-headers/linux-libc-headers/0001-scripts-Use-fixed-input-and-output-files-instead-of-.patch deleted file mode 100644 index a5ded602e5..0000000000 --- a/meta/recipes-kernel/linux-libc-headers/linux-libc-headers/0001-scripts-Use-fixed-input-and-output-files-instead-of-.patch +++ /dev/null | |||
@@ -1,67 +0,0 @@ | |||
1 | From 694eba7bb974f6b8bd308804cb24350150108b2b Mon Sep 17 00:00:00 2001 | ||
2 | From: He Zhe <zhe.he@windriver.com> | ||
3 | Date: Wed, 21 Nov 2018 15:12:43 +0800 | ||
4 | Subject: [PATCH] scripts: Use fixed input and output files instead of pipe for here-doc | ||
5 | |||
6 | There was a bug of "as" in binutils that when it checks if the input file and | ||
7 | output file are the same one, it would not check if they are on the same block | ||
8 | device. The check is introduced by the following commit in v2.31. | ||
9 | |||
10 | https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;a=commit;h= | ||
11 | 67f846b59b32f3d704c601669409c2584383fea9 | ||
12 | |||
13 | The here-doc usage in this script creates temporary file in /tmp. When we run in | ||
14 | an environment where /tmp has rarely been used, the newly created temporary file | ||
15 | may have a very low inode number. If the inode number was 6 which is the same as | ||
16 | /dev/null, the as would wrongly think the input file and the output file are the | ||
17 | same and report the following error. | ||
18 | |||
19 | *** Compiler lacks asm-goto support.. Stop. | ||
20 | |||
21 | One observed case happened in docker where the /tmp could be so rarely used that | ||
22 | very low number inode may be allocated and triggers the error. | ||
23 | |||
24 | The fix below for the bug only exists on the master branch of binutils so far | ||
25 | and has not been released from upstream. As the convict is introduced since | ||
26 | v2.31, only v2.31 is affected. | ||
27 | |||
28 | https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;a=commit;h= | ||
29 | 2a50366ded329bfb39d387253450c9d5302c3503 | ||
30 | |||
31 | When building linux-libc-headers we need to use "as" in binutils which does not | ||
32 | contain the fix for the moment. To work around the error, we create a fixed | ||
33 | temporary file to contain the program being tested. | ||
34 | |||
35 | This patch also removes ">/dev/null 2>&1" so we will have more direct error | ||
36 | information in case something else wrong happened. | ||
37 | |||
38 | Upstream-Status: Inappropriate [A work around for binutils v2.31] | ||
39 | |||
40 | Signed-off-by: He Zhe <zhe.he@windriver.com> | ||
41 | --- | ||
42 | scripts/gcc-goto.sh | 5 ++++- | ||
43 | 1 file changed, 4 insertions(+), 1 deletion(-) | ||
44 | |||
45 | diff --git a/scripts/gcc-goto.sh b/scripts/gcc-goto.sh | ||
46 | index 8b980fb22..d256a9438 100755 | ||
47 | --- a/scripts/gcc-goto.sh | ||
48 | +++ b/scripts/gcc-goto.sh | ||
49 | @@ -3,7 +3,7 @@ | ||
50 | # Test for gcc 'asm goto' support | ||
51 | # Copyright (C) 2010, Jason Baron <jbaron@redhat.com> | ||
52 | |||
53 | -cat << "END" | $@ -x c - -fno-PIE -c -o /dev/null | ||
54 | +cat << "END" > ./input | ||
55 | int main(void) | ||
56 | { | ||
57 | #if defined(__arm__) || defined(__aarch64__) | ||
58 | @@ -20,3 +20,6 @@ entry: | ||
59 | return 0; | ||
60 | } | ||
61 | END | ||
62 | + | ||
63 | +$@ -x c ./input -fno-PIE -c -o ./output | ||
64 | +rm ./input ./output | ||
65 | -- | ||
66 | 2.19.1 | ||
67 | |||
diff --git a/meta/recipes-kernel/linux-libc-headers/linux-libc-headers_5.15.bb b/meta/recipes-kernel/linux-libc-headers/linux-libc-headers_5.15.bb deleted file mode 100644 index 588cc3acd1..0000000000 --- a/meta/recipes-kernel/linux-libc-headers/linux-libc-headers_5.15.bb +++ /dev/null | |||
@@ -1,20 +0,0 @@ | |||
1 | require linux-libc-headers.inc | ||
2 | |||
3 | SRC_URI:append:libc-musl = "\ | ||
4 | file://0001-libc-compat.h-fix-some-issues-arising-from-in6.h.patch \ | ||
5 | file://0003-remove-inclusion-of-sysinfo.h-in-kernel.h.patch \ | ||
6 | file://0001-libc-compat.h-musl-_does_-define-IFF_LOWER_UP-DORMAN.patch \ | ||
7 | file://0001-include-linux-stddef.h-in-swab.h-uapi-header.patch \ | ||
8 | " | ||
9 | |||
10 | SRC_URI:append = "\ | ||
11 | file://0001-scripts-Use-fixed-input-and-output-files-instead-of-.patch \ | ||
12 | file://0001-kbuild-install_headers.sh-Strip-_UAPI-from-if-define.patch \ | ||
13 | " | ||
14 | |||
15 | LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" | ||
16 | |||
17 | SRC_URI[md5sum] = "071d49ff4e020d58c04f9f3f76d3b594" | ||
18 | SRC_URI[sha256sum] = "57b2cf6991910e3b67a1b3490022e8a0674b6965c74c12da1e99d138d1991ee8" | ||
19 | |||
20 | |||
diff --git a/meta/recipes-kernel/linux-libc-headers/linux-libc-headers_6.12.bb b/meta/recipes-kernel/linux-libc-headers/linux-libc-headers_6.12.bb new file mode 100644 index 0000000000..dd6add38de --- /dev/null +++ b/meta/recipes-kernel/linux-libc-headers/linux-libc-headers_6.12.bb | |||
@@ -0,0 +1,12 @@ | |||
1 | require linux-libc-headers.inc | ||
2 | |||
3 | SRC_URI:append:libc-musl = "\ | ||
4 | file://0001-libc-compat.h-fix-some-issues-arising-from-in6.h.patch \ | ||
5 | file://0003-remove-inclusion-of-sysinfo.h-in-kernel.h.patch \ | ||
6 | file://0001-libc-compat.h-musl-_does_-define-IFF_LOWER_UP-DORMAN.patch \ | ||
7 | " | ||
8 | |||
9 | LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" | ||
10 | |||
11 | SRC_URI[sha256sum] = "b1a2562be56e42afb3f8489d4c2a7ac472ac23098f1ef1c1e40da601f54625eb" | ||
12 | |||
diff --git a/meta/recipes-kernel/linux/cve-exclusion.inc b/meta/recipes-kernel/linux/cve-exclusion.inc new file mode 100644 index 0000000000..80c76433ef --- /dev/null +++ b/meta/recipes-kernel/linux/cve-exclusion.inc | |||
@@ -0,0 +1,159 @@ | |||
1 | CVE_STATUS[CVE-1999-0656] = "not-applicable-config: specific to ugidd, part of the old user-mode NFS server" | ||
2 | |||
3 | CVE_STATUS[CVE-2006-2932] = "not-applicable-platform: specific to RHEL" | ||
4 | |||
5 | CVE_STATUS[CVE-2007-2764] = "not-applicable-platform: specific to Sun/Brocade SilkWorm switches" | ||
6 | |||
7 | CVE_STATUS[CVE-2007-4998] = "cpe-incorrect: a historic cp bug, no longer an issue as per https://bugzilla.redhat.com/show_bug.cgi?id=356471#c5" | ||
8 | |||
9 | CVE_STATUS[CVE-2008-2544] = "disputed: not an issue as per https://bugzilla.redhat.com/show_bug.cgi?id=449089#c22" | ||
10 | |||
11 | CVE_STATUS[CVE-2010-0298] = "fixed-version: 2.6.34 (1871c6)" | ||
12 | |||
13 | CVE_STATUS[CVE-2014-2648] = "cpe-incorrect: not Linux" | ||
14 | |||
15 | CVE_STATUS[CVE-2016-0774] = "ignored: result of incomplete backport" | ||
16 | |||
17 | CVE_STATUS[CVE-2016-3695] = "not-applicable-platform: specific to RHEL with securelevel patches" | ||
18 | |||
19 | CVE_STATUS[CVE-2016-3699] = "not-applicable-platform: specific to RHEL with securelevel patches" | ||
20 | |||
21 | CVE_STATUS[CVE-2017-6264] = "not-applicable-platform: Android specific" | ||
22 | |||
23 | CVE_STATUS[CVE-2017-1000377] = "not-applicable-platform: GRSecurity specific" | ||
24 | |||
25 | CVE_STATUS[CVE-2018-6559] = "not-applicable-platform: Issue only affects Ubuntu" | ||
26 | |||
27 | CVE_STATUS[CVE-2020-11935] = "not-applicable-config: Issue only affects aufs, which is not in linux-yocto" | ||
28 | |||
29 | # Introduced in version v6.1 7b88bda3761b95856cf97822efe8281c8100067b | ||
30 | # Patched in kernel since v6.2 4a625ceee8a0ab0273534cb6b432ce6b331db5ee | ||
31 | # But, the CVE is disputed: | ||
32 | CVE_STATUS[CVE-2023-23005] = "disputed: There are no realistic cases \ | ||
33 | in which a user can cause the alloc_memory_type error case to be reached. \ | ||
34 | See: https://bugzilla.suse.com/show_bug.cgi?id=1208844#c2" | ||
35 | |||
36 | # Old CVES taken before using new data from kernel CNA | ||
37 | |||
38 | CVE_STATUS[CVE-2014-8171] = "fixed-version: Fixed from version 3.12rc1" | ||
39 | |||
40 | CVE_STATUS[CVE-2017-1000255] = "fixed-version: Fixed from version 4.14rc5" | ||
41 | |||
42 | CVE_STATUS[CVE-2018-10840] = "fixed-version: Fixed from version 4.18rc1" | ||
43 | |||
44 | CVE_STATUS[CVE-2018-10876] = "fixed-version: Fixed from version 4.18rc4" | ||
45 | |||
46 | CVE_STATUS[CVE-2018-10882] = "fixed-version: Fixed from version 4.18rc4" | ||
47 | |||
48 | CVE_STATUS[CVE-2018-10902] = "fixed-version: Fixed from version 4.18rc6" | ||
49 | |||
50 | CVE_STATUS[CVE-2018-14625] = "fixed-version: Fixed from version 4.20rc6" | ||
51 | |||
52 | CVE_STATUS[CVE-2019-3016] = "fixed-version: Fixed from version 5.6rc1" | ||
53 | |||
54 | CVE_STATUS[CVE-2019-3819] = "fixed-version: Fixed from version 5.0rc6" | ||
55 | |||
56 | CVE_STATUS[CVE-2019-3887] = "fixed-version: Fixed from version 5.1rc4" | ||
57 | |||
58 | CVE_STATUS[CVE-2020-10742] = "fixed-version: Fixed from version 3.16rc1" | ||
59 | |||
60 | CVE_STATUS[CVE-2020-16119] = "fixed-version: Fixed from version 5.15rc2" | ||
61 | |||
62 | CVE_STATUS[CVE-2020-1749] = "fixed-version: Fixed from version 5.5rc1" | ||
63 | |||
64 | CVE_STATUS[CVE-2020-25672] = "fixed-version: Fixed from version 5.12rc7" | ||
65 | |||
66 | CVE_STATUS[CVE-2020-27815] = "fixed-version: Fixed from version 5.11rc1" | ||
67 | |||
68 | CVE_STATUS[CVE-2020-8834] = "fixed-version: Fixed from version 4.18rc1" | ||
69 | |||
70 | CVE_STATUS[CVE-2021-20194] = "fixed-version: Fixed from version 5.10rc1" | ||
71 | |||
72 | CVE_STATUS[CVE-2021-20265] = "fixed-version: Fixed from version 4.5rc3" | ||
73 | |||
74 | CVE_STATUS[CVE-2021-3564] = "fixed-version: Fixed from version 5.13rc5" | ||
75 | |||
76 | CVE_STATUS[CVE-2021-3669] = "fixed-version: Fixed from version 5.15rc1" | ||
77 | |||
78 | CVE_STATUS[CVE-2021-3759] = "fixed-version: Fixed from version 5.15rc1" | ||
79 | |||
80 | CVE_STATUS[CVE-2021-4218] = "fixed-version: Fixed from version 5.8rc1" | ||
81 | |||
82 | CVE_STATUS[CVE-2022-0286] = "fixed-version: Fixed from version 5.14rc2" | ||
83 | |||
84 | CVE_STATUS[CVE-2022-1462] = "fixed-version: Fixed from version 5.19rc7" | ||
85 | |||
86 | CVE_STATUS[CVE-2022-2308] = "fixed-version: Fixed from version 6.0" | ||
87 | |||
88 | CVE_STATUS[CVE-2022-2327] = "fixed-version: Fixed from version 5.12rc1" | ||
89 | |||
90 | CVE_STATUS[CVE-2022-2663] = "fixed-version: Fixed from version 6.0rc5" | ||
91 | |||
92 | CVE_STATUS[CVE-2022-2785] = "fixed-version: Fixed from version 6.0rc1" | ||
93 | |||
94 | CVE_STATUS[CVE-2022-3435] = "fixed-version: Fixed from version 6.1rc1" | ||
95 | |||
96 | CVE_STATUS[CVE-2022-3523] = "fixed-version: Fixed from version 6.1rc1" | ||
97 | |||
98 | CVE_STATUS[CVE-2022-3534] = "fixed-version: Fixed from version 6.2rc1" | ||
99 | |||
100 | CVE_STATUS[CVE-2022-3566] = "fixed-version: Fixed from version 6.1rc1" | ||
101 | |||
102 | CVE_STATUS[CVE-2022-3567] = "fixed-version: Fixed from version 6.1rc1" | ||
103 | |||
104 | CVE_STATUS[CVE-2022-3619] = "fixed-version: Fixed from version 6.1rc4" | ||
105 | |||
106 | CVE_STATUS[CVE-2022-3621] = "fixed-version: Fixed from version 6.1rc1" | ||
107 | |||
108 | CVE_STATUS[CVE-2022-3624] = "fixed-version: Fixed from version 6.0rc1" | ||
109 | |||
110 | CVE_STATUS[CVE-2022-3629] = "fixed-version: Fixed from version 6.0rc1" | ||
111 | |||
112 | CVE_STATUS[CVE-2022-3630] = "fixed-version: Fixed from version 6.0rc1" | ||
113 | |||
114 | CVE_STATUS[CVE-2022-3633] = "fixed-version: Fixed from version 6.0rc1" | ||
115 | |||
116 | CVE_STATUS[CVE-2022-3636] = "fixed-version: Fixed from version 5.19rc1" | ||
117 | |||
118 | CVE_STATUS[CVE-2022-36402] = "fixed-version: Fixed from version 6.5" | ||
119 | |||
120 | CVE_STATUS[CVE-2022-3646] = "fixed-version: Fixed from version 6.1rc1" | ||
121 | |||
122 | CVE_STATUS[CVE-2022-42895] = "fixed-version: Fixed from version 6.1rc4" | ||
123 | |||
124 | CVE_STATUS[CVE-2022-4382] = "fixed-version: Fixed from version 6.2rc5" | ||
125 | |||
126 | CVE_STATUS[CVE-2023-1073] = "fixed-version: Fixed from version 6.2rc5" | ||
127 | |||
128 | CVE_STATUS[CVE-2023-1074] = "fixed-version: Fixed from version 6.2rc6" | ||
129 | |||
130 | CVE_STATUS[CVE-2023-1075] = "fixed-version: Fixed from version 6.2rc7" | ||
131 | |||
132 | CVE_STATUS[CVE-2023-1076] = "fixed-version: Fixed from version 6.3rc1" | ||
133 | |||
134 | CVE_STATUS[CVE-2023-2898] = "fixed-version: Fixed from version 6.5rc1" | ||
135 | |||
136 | CVE_STATUS[CVE-2023-3079] = "not-applicable-config: Issue only affects chromium, which is not in linux-yocto" | ||
137 | |||
138 | CVE_STATUS[CVE-2023-3772] = "fixed-version: Fixed from version 6.5rc7" | ||
139 | |||
140 | CVE_STATUS[CVE-2023-3773] = "fixed-version: Fixed from version 6.5rc7" | ||
141 | |||
142 | CVE_STATUS[CVE-2023-4155] = "fixed-version: Fixed from version 6.5rc6" | ||
143 | |||
144 | CVE_STATUS[CVE-2023-6176] = "fixed-version: Fixed from version 6.6rc2" | ||
145 | |||
146 | # Fix https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=f98364e926626c678fb4b9004b75cacf92ff0662 | ||
147 | CVE_STATUS[CVE-2023-6270] = "fixed-version: Fixed from 6.9" | ||
148 | |||
149 | # Fix https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=567320c46a60a3c39b69aa1df802d753817a3f86 | ||
150 | CVE_STATUS[CVE-2023-6610] = "fixed-version: Fixed from 6.7rc7" | ||
151 | |||
152 | #Fix https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=65c95f78917ea6fa7ff189a2c19879c4fe161873 | ||
153 | CVE_STATUS[CVE-2023-6679] = "fixed-version: Fixed from 6.7rc6" | ||
154 | |||
155 | #Fix https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=ad25ee36f00172f7d53242dc77c69fff7ced0755 | ||
156 | CVE_STATUS[CVE-2023-7042] = "fixed-version: Fixed from 6.9rc1" | ||
157 | |||
158 | #Fix https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=7315dc1e122c85ffdfc8defffbb8f8b616c2eb1a | ||
159 | CVE_STATUS[CVE-2024-0193] = "fixed-version: Fixed from 6.7" | ||
diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc new file mode 100644 index 0000000000..b6082edf5c --- /dev/null +++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc | |||
@@ -0,0 +1,13023 @@ | |||
1 | |||
2 | # Auto-generated CVE metadata, DO NOT EDIT BY HAND. | ||
3 | # Generated at 2025-06-05 16:29:20.725105+00:00 for kernel version 6.12.31 | ||
4 | # From cvelistV5 cve_2025-06-05_1600Z | ||
5 | |||
6 | python check_kernel_cve_status_version() { | ||
7 | this_version = "6.12.31" | ||
8 | kernel_version = d.getVar("LINUX_VERSION") | ||
9 | if kernel_version != this_version: | ||
10 | bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) | ||
11 | } | ||
12 | do_cve_check[prefuncs] += "check_kernel_cve_status_version" | ||
13 | |||
14 | CVE_STATUS[CVE-2019-25160] = "fixed-version: Fixed from version 5.0" | ||
15 | |||
16 | CVE_STATUS[CVE-2019-25162] = "fixed-version: Fixed from version 6.0" | ||
17 | |||
18 | # CVE-2019-3459 has no known resolution | ||
19 | |||
20 | # CVE-2019-3460 has no known resolution | ||
21 | |||
22 | CVE_STATUS[CVE-2020-36775] = "fixed-version: Fixed from version 5.7" | ||
23 | |||
24 | CVE_STATUS[CVE-2020-36776] = "fixed-version: Fixed from version 5.13" | ||
25 | |||
26 | CVE_STATUS[CVE-2020-36777] = "fixed-version: Fixed from version 5.13" | ||
27 | |||
28 | CVE_STATUS[CVE-2020-36778] = "fixed-version: Fixed from version 5.13" | ||
29 | |||
30 | CVE_STATUS[CVE-2020-36779] = "fixed-version: Fixed from version 5.13" | ||
31 | |||
32 | CVE_STATUS[CVE-2020-36780] = "fixed-version: Fixed from version 5.13" | ||
33 | |||
34 | CVE_STATUS[CVE-2020-36781] = "fixed-version: Fixed from version 5.13" | ||
35 | |||
36 | CVE_STATUS[CVE-2020-36782] = "fixed-version: Fixed from version 5.13" | ||
37 | |||
38 | CVE_STATUS[CVE-2020-36783] = "fixed-version: Fixed from version 5.13" | ||
39 | |||
40 | CVE_STATUS[CVE-2020-36784] = "fixed-version: Fixed from version 5.13" | ||
41 | |||
42 | CVE_STATUS[CVE-2020-36785] = "fixed-version: Fixed from version 5.13" | ||
43 | |||
44 | CVE_STATUS[CVE-2020-36786] = "fixed-version: Fixed from version 5.13" | ||
45 | |||
46 | CVE_STATUS[CVE-2020-36787] = "fixed-version: Fixed from version 5.13" | ||
47 | |||
48 | CVE_STATUS[CVE-2020-36788] = "fixed-version: Fixed from version 5.15" | ||
49 | |||
50 | CVE_STATUS[CVE-2020-36789] = "fixed-version: Fixed from version 5.10" | ||
51 | |||
52 | CVE_STATUS[CVE-2020-36790] = "fixed-version: Fixed from version 5.9" | ||
53 | |||
54 | CVE_STATUS[CVE-2020-36791] = "fixed-version: Fixed from version 5.5.14" | ||
55 | |||
56 | # CVE-2021-28688 has no known resolution | ||
57 | |||
58 | # CVE-2021-28691 has no known resolution | ||
59 | |||
60 | # CVE-2021-28711 has no known resolution | ||
61 | |||
62 | # CVE-2021-28712 has no known resolution | ||
63 | |||
64 | # CVE-2021-28713 has no known resolution | ||
65 | |||
66 | # CVE-2021-28714 has no known resolution | ||
67 | |||
68 | # CVE-2021-28715 has no known resolution | ||
69 | |||
70 | CVE_STATUS[CVE-2021-46904] = "fixed-version: Fixed from version 5.12" | ||
71 | |||
72 | CVE_STATUS[CVE-2021-46905] = "fixed-version: Fixed from version 5.13" | ||
73 | |||
74 | CVE_STATUS[CVE-2021-46906] = "fixed-version: Fixed from version 5.13" | ||
75 | |||
76 | CVE_STATUS[CVE-2021-46908] = "fixed-version: Fixed from version 5.12" | ||
77 | |||
78 | CVE_STATUS[CVE-2021-46909] = "fixed-version: Fixed from version 5.12" | ||
79 | |||
80 | CVE_STATUS[CVE-2021-46910] = "fixed-version: Fixed from version 5.12" | ||
81 | |||
82 | CVE_STATUS[CVE-2021-46911] = "fixed-version: Fixed from version 5.12" | ||
83 | |||
84 | CVE_STATUS[CVE-2021-46912] = "fixed-version: Fixed from version 5.12" | ||
85 | |||
86 | CVE_STATUS[CVE-2021-46913] = "fixed-version: Fixed from version 5.12" | ||
87 | |||
88 | CVE_STATUS[CVE-2021-46914] = "fixed-version: Fixed from version 5.12" | ||
89 | |||
90 | CVE_STATUS[CVE-2021-46915] = "fixed-version: Fixed from version 5.12" | ||
91 | |||
92 | CVE_STATUS[CVE-2021-46916] = "fixed-version: Fixed from version 5.12" | ||
93 | |||
94 | CVE_STATUS[CVE-2021-46917] = "fixed-version: Fixed from version 5.12" | ||
95 | |||
96 | CVE_STATUS[CVE-2021-46918] = "fixed-version: Fixed from version 5.12" | ||
97 | |||
98 | CVE_STATUS[CVE-2021-46919] = "fixed-version: Fixed from version 5.12" | ||
99 | |||
100 | CVE_STATUS[CVE-2021-46920] = "fixed-version: Fixed from version 5.12" | ||
101 | |||
102 | CVE_STATUS[CVE-2021-46921] = "fixed-version: Fixed from version 5.12" | ||
103 | |||
104 | CVE_STATUS[CVE-2021-46922] = "fixed-version: Fixed from version 5.11.17" | ||
105 | |||
106 | CVE_STATUS[CVE-2021-46923] = "fixed-version: Fixed from version 5.16" | ||
107 | |||
108 | CVE_STATUS[CVE-2021-46924] = "fixed-version: Fixed from version 5.16" | ||
109 | |||
110 | CVE_STATUS[CVE-2021-46925] = "fixed-version: Fixed from version 5.16" | ||
111 | |||
112 | CVE_STATUS[CVE-2021-46926] = "fixed-version: Fixed from version 5.16" | ||
113 | |||
114 | CVE_STATUS[CVE-2021-46927] = "fixed-version: Fixed from version 5.16" | ||
115 | |||
116 | CVE_STATUS[CVE-2021-46928] = "fixed-version: Fixed from version 5.16" | ||
117 | |||
118 | CVE_STATUS[CVE-2021-46929] = "fixed-version: Fixed from version 5.16" | ||
119 | |||
120 | CVE_STATUS[CVE-2021-46930] = "fixed-version: Fixed from version 5.16" | ||
121 | |||
122 | CVE_STATUS[CVE-2021-46931] = "fixed-version: Fixed from version 5.16" | ||
123 | |||
124 | CVE_STATUS[CVE-2021-46932] = "fixed-version: Fixed from version 5.16" | ||
125 | |||
126 | CVE_STATUS[CVE-2021-46933] = "fixed-version: Fixed from version 5.16" | ||
127 | |||
128 | CVE_STATUS[CVE-2021-46934] = "fixed-version: Fixed from version 5.16" | ||
129 | |||
130 | CVE_STATUS[CVE-2021-46935] = "fixed-version: Fixed from version 5.16" | ||
131 | |||
132 | CVE_STATUS[CVE-2021-46936] = "fixed-version: Fixed from version 5.16" | ||
133 | |||
134 | CVE_STATUS[CVE-2021-46937] = "fixed-version: Fixed from version 5.16" | ||
135 | |||
136 | CVE_STATUS[CVE-2021-46938] = "fixed-version: Fixed from version 5.13" | ||
137 | |||
138 | CVE_STATUS[CVE-2021-46939] = "fixed-version: Fixed from version 5.13" | ||
139 | |||
140 | CVE_STATUS[CVE-2021-46940] = "fixed-version: Fixed from version 5.13" | ||
141 | |||
142 | CVE_STATUS[CVE-2021-46941] = "fixed-version: Fixed from version 5.13" | ||
143 | |||
144 | CVE_STATUS[CVE-2021-46942] = "fixed-version: Fixed from version 5.13" | ||
145 | |||
146 | CVE_STATUS[CVE-2021-46943] = "fixed-version: Fixed from version 5.13" | ||
147 | |||
148 | CVE_STATUS[CVE-2021-46944] = "fixed-version: Fixed from version 5.13" | ||
149 | |||
150 | CVE_STATUS[CVE-2021-46945] = "fixed-version: Fixed from version 5.13" | ||
151 | |||
152 | CVE_STATUS[CVE-2021-46947] = "fixed-version: Fixed from version 5.13" | ||
153 | |||
154 | CVE_STATUS[CVE-2021-46948] = "fixed-version: Fixed from version 5.13" | ||
155 | |||
156 | CVE_STATUS[CVE-2021-46949] = "fixed-version: Fixed from version 5.13" | ||
157 | |||
158 | CVE_STATUS[CVE-2021-46950] = "fixed-version: Fixed from version 5.13" | ||
159 | |||
160 | CVE_STATUS[CVE-2021-46951] = "fixed-version: Fixed from version 5.13" | ||
161 | |||
162 | CVE_STATUS[CVE-2021-46952] = "fixed-version: Fixed from version 5.13" | ||
163 | |||
164 | CVE_STATUS[CVE-2021-46953] = "fixed-version: Fixed from version 5.13" | ||
165 | |||
166 | CVE_STATUS[CVE-2021-46954] = "fixed-version: Fixed from version 5.13" | ||
167 | |||
168 | CVE_STATUS[CVE-2021-46955] = "fixed-version: Fixed from version 5.13" | ||
169 | |||
170 | CVE_STATUS[CVE-2021-46956] = "fixed-version: Fixed from version 5.13" | ||
171 | |||
172 | CVE_STATUS[CVE-2021-46957] = "fixed-version: Fixed from version 5.13" | ||
173 | |||
174 | CVE_STATUS[CVE-2021-46958] = "fixed-version: Fixed from version 5.13" | ||
175 | |||
176 | CVE_STATUS[CVE-2021-46959] = "fixed-version: Fixed from version 5.13" | ||
177 | |||
178 | CVE_STATUS[CVE-2021-46960] = "fixed-version: Fixed from version 5.13" | ||
179 | |||
180 | CVE_STATUS[CVE-2021-46961] = "fixed-version: Fixed from version 5.13" | ||
181 | |||
182 | CVE_STATUS[CVE-2021-46962] = "fixed-version: Fixed from version 5.13" | ||
183 | |||
184 | CVE_STATUS[CVE-2021-46963] = "fixed-version: Fixed from version 5.13" | ||
185 | |||
186 | CVE_STATUS[CVE-2021-46964] = "fixed-version: Fixed from version 5.13" | ||
187 | |||
188 | CVE_STATUS[CVE-2021-46965] = "fixed-version: Fixed from version 5.13" | ||
189 | |||
190 | CVE_STATUS[CVE-2021-46966] = "fixed-version: Fixed from version 5.13" | ||
191 | |||
192 | CVE_STATUS[CVE-2021-46967] = "fixed-version: Fixed from version 5.13" | ||
193 | |||
194 | CVE_STATUS[CVE-2021-46968] = "fixed-version: Fixed from version 5.13" | ||
195 | |||
196 | CVE_STATUS[CVE-2021-46969] = "fixed-version: Fixed from version 5.13" | ||
197 | |||
198 | CVE_STATUS[CVE-2021-46970] = "fixed-version: Fixed from version 5.13" | ||
199 | |||
200 | CVE_STATUS[CVE-2021-46971] = "fixed-version: Fixed from version 5.13" | ||
201 | |||
202 | CVE_STATUS[CVE-2021-46972] = "fixed-version: Fixed from version 5.13" | ||
203 | |||
204 | CVE_STATUS[CVE-2021-46973] = "fixed-version: Fixed from version 5.13" | ||
205 | |||
206 | CVE_STATUS[CVE-2021-46974] = "fixed-version: Fixed from version 5.13" | ||
207 | |||
208 | CVE_STATUS[CVE-2021-46976] = "fixed-version: Fixed from version 5.13" | ||
209 | |||
210 | CVE_STATUS[CVE-2021-46977] = "fixed-version: Fixed from version 5.13" | ||
211 | |||
212 | CVE_STATUS[CVE-2021-46978] = "fixed-version: Fixed from version 5.13" | ||
213 | |||
214 | CVE_STATUS[CVE-2021-46979] = "fixed-version: Fixed from version 5.13" | ||
215 | |||
216 | CVE_STATUS[CVE-2021-46980] = "fixed-version: Fixed from version 5.13" | ||
217 | |||
218 | CVE_STATUS[CVE-2021-46981] = "fixed-version: Fixed from version 5.13" | ||
219 | |||
220 | CVE_STATUS[CVE-2021-46982] = "fixed-version: Fixed from version 5.13" | ||
221 | |||
222 | CVE_STATUS[CVE-2021-46983] = "fixed-version: Fixed from version 5.13" | ||
223 | |||
224 | CVE_STATUS[CVE-2021-46984] = "fixed-version: Fixed from version 5.13" | ||
225 | |||
226 | CVE_STATUS[CVE-2021-46985] = "fixed-version: Fixed from version 5.13" | ||
227 | |||
228 | CVE_STATUS[CVE-2021-46986] = "fixed-version: Fixed from version 5.13" | ||
229 | |||
230 | CVE_STATUS[CVE-2021-46987] = "fixed-version: Fixed from version 5.13" | ||
231 | |||
232 | CVE_STATUS[CVE-2021-46988] = "fixed-version: Fixed from version 5.13" | ||
233 | |||
234 | CVE_STATUS[CVE-2021-46989] = "fixed-version: Fixed from version 5.13" | ||
235 | |||
236 | CVE_STATUS[CVE-2021-46990] = "fixed-version: Fixed from version 5.13" | ||
237 | |||
238 | CVE_STATUS[CVE-2021-46991] = "fixed-version: Fixed from version 5.13" | ||
239 | |||
240 | CVE_STATUS[CVE-2021-46992] = "fixed-version: Fixed from version 5.13" | ||
241 | |||
242 | CVE_STATUS[CVE-2021-46993] = "fixed-version: Fixed from version 5.13" | ||
243 | |||
244 | CVE_STATUS[CVE-2021-46994] = "fixed-version: Fixed from version 5.13" | ||
245 | |||
246 | CVE_STATUS[CVE-2021-46995] = "fixed-version: Fixed from version 5.13" | ||
247 | |||
248 | CVE_STATUS[CVE-2021-46996] = "fixed-version: Fixed from version 5.13" | ||
249 | |||
250 | CVE_STATUS[CVE-2021-46997] = "fixed-version: Fixed from version 5.13" | ||
251 | |||
252 | CVE_STATUS[CVE-2021-46998] = "fixed-version: Fixed from version 5.13" | ||
253 | |||
254 | CVE_STATUS[CVE-2021-46999] = "fixed-version: Fixed from version 5.13" | ||
255 | |||
256 | CVE_STATUS[CVE-2021-47000] = "fixed-version: Fixed from version 5.13" | ||
257 | |||
258 | CVE_STATUS[CVE-2021-47001] = "fixed-version: Fixed from version 5.13" | ||
259 | |||
260 | CVE_STATUS[CVE-2021-47002] = "fixed-version: Fixed from version 5.13" | ||
261 | |||
262 | CVE_STATUS[CVE-2021-47003] = "fixed-version: Fixed from version 5.13" | ||
263 | |||
264 | CVE_STATUS[CVE-2021-47004] = "fixed-version: Fixed from version 5.13" | ||
265 | |||
266 | CVE_STATUS[CVE-2021-47005] = "fixed-version: Fixed from version 5.13" | ||
267 | |||
268 | CVE_STATUS[CVE-2021-47006] = "fixed-version: Fixed from version 5.13" | ||
269 | |||
270 | CVE_STATUS[CVE-2021-47007] = "fixed-version: Fixed from version 5.13" | ||
271 | |||
272 | CVE_STATUS[CVE-2021-47008] = "fixed-version: Fixed from version 5.13" | ||
273 | |||
274 | CVE_STATUS[CVE-2021-47009] = "fixed-version: Fixed from version 5.13" | ||
275 | |||
276 | CVE_STATUS[CVE-2021-47010] = "fixed-version: Fixed from version 5.13" | ||
277 | |||
278 | CVE_STATUS[CVE-2021-47011] = "fixed-version: Fixed from version 5.13" | ||
279 | |||
280 | CVE_STATUS[CVE-2021-47012] = "fixed-version: Fixed from version 5.13" | ||
281 | |||
282 | CVE_STATUS[CVE-2021-47013] = "fixed-version: Fixed from version 5.13" | ||
283 | |||
284 | CVE_STATUS[CVE-2021-47014] = "fixed-version: Fixed from version 5.13" | ||
285 | |||
286 | CVE_STATUS[CVE-2021-47015] = "fixed-version: Fixed from version 5.13" | ||
287 | |||
288 | CVE_STATUS[CVE-2021-47016] = "fixed-version: Fixed from version 5.13" | ||
289 | |||
290 | CVE_STATUS[CVE-2021-47017] = "fixed-version: Fixed from version 5.13" | ||
291 | |||
292 | CVE_STATUS[CVE-2021-47018] = "fixed-version: Fixed from version 5.13" | ||
293 | |||
294 | CVE_STATUS[CVE-2021-47019] = "fixed-version: Fixed from version 5.13" | ||
295 | |||
296 | CVE_STATUS[CVE-2021-47020] = "fixed-version: Fixed from version 5.13" | ||
297 | |||
298 | CVE_STATUS[CVE-2021-47021] = "fixed-version: Fixed from version 5.13" | ||
299 | |||
300 | CVE_STATUS[CVE-2021-47022] = "fixed-version: Fixed from version 5.13" | ||
301 | |||
302 | CVE_STATUS[CVE-2021-47023] = "fixed-version: Fixed from version 5.13" | ||
303 | |||
304 | CVE_STATUS[CVE-2021-47024] = "fixed-version: Fixed from version 5.13" | ||
305 | |||
306 | CVE_STATUS[CVE-2021-47025] = "fixed-version: Fixed from version 5.13" | ||
307 | |||
308 | CVE_STATUS[CVE-2021-47026] = "fixed-version: Fixed from version 5.13" | ||
309 | |||
310 | CVE_STATUS[CVE-2021-47027] = "fixed-version: Fixed from version 5.13" | ||
311 | |||
312 | CVE_STATUS[CVE-2021-47028] = "fixed-version: Fixed from version 5.13" | ||
313 | |||
314 | CVE_STATUS[CVE-2021-47029] = "fixed-version: Fixed from version 5.13" | ||
315 | |||
316 | CVE_STATUS[CVE-2021-47030] = "fixed-version: Fixed from version 5.13" | ||
317 | |||
318 | CVE_STATUS[CVE-2021-47031] = "fixed-version: Fixed from version 5.13" | ||
319 | |||
320 | CVE_STATUS[CVE-2021-47032] = "fixed-version: Fixed from version 5.13" | ||
321 | |||
322 | CVE_STATUS[CVE-2021-47033] = "fixed-version: Fixed from version 5.13" | ||
323 | |||
324 | CVE_STATUS[CVE-2021-47034] = "fixed-version: Fixed from version 5.13" | ||
325 | |||
326 | CVE_STATUS[CVE-2021-47035] = "fixed-version: Fixed from version 5.13" | ||
327 | |||
328 | CVE_STATUS[CVE-2021-47036] = "fixed-version: Fixed from version 5.13" | ||
329 | |||
330 | CVE_STATUS[CVE-2021-47037] = "fixed-version: Fixed from version 5.13" | ||
331 | |||
332 | CVE_STATUS[CVE-2021-47038] = "fixed-version: Fixed from version 5.13" | ||
333 | |||
334 | CVE_STATUS[CVE-2021-47039] = "fixed-version: Fixed from version 5.13" | ||
335 | |||
336 | CVE_STATUS[CVE-2021-47040] = "fixed-version: Fixed from version 5.13" | ||
337 | |||
338 | CVE_STATUS[CVE-2021-47041] = "fixed-version: Fixed from version 5.13" | ||
339 | |||
340 | CVE_STATUS[CVE-2021-47042] = "fixed-version: Fixed from version 5.13" | ||
341 | |||
342 | CVE_STATUS[CVE-2021-47043] = "fixed-version: Fixed from version 5.13" | ||
343 | |||
344 | CVE_STATUS[CVE-2021-47044] = "fixed-version: Fixed from version 5.13" | ||
345 | |||
346 | CVE_STATUS[CVE-2021-47045] = "fixed-version: Fixed from version 5.13" | ||
347 | |||
348 | CVE_STATUS[CVE-2021-47046] = "fixed-version: Fixed from version 5.13" | ||
349 | |||
350 | CVE_STATUS[CVE-2021-47047] = "fixed-version: Fixed from version 5.13" | ||
351 | |||
352 | CVE_STATUS[CVE-2021-47048] = "fixed-version: Fixed from version 5.13" | ||
353 | |||
354 | CVE_STATUS[CVE-2021-47049] = "fixed-version: Fixed from version 5.13" | ||
355 | |||
356 | CVE_STATUS[CVE-2021-47050] = "fixed-version: Fixed from version 5.13" | ||
357 | |||
358 | CVE_STATUS[CVE-2021-47051] = "fixed-version: Fixed from version 5.13" | ||
359 | |||
360 | CVE_STATUS[CVE-2021-47052] = "fixed-version: Fixed from version 5.13" | ||
361 | |||
362 | CVE_STATUS[CVE-2021-47053] = "fixed-version: Fixed from version 5.13" | ||
363 | |||
364 | CVE_STATUS[CVE-2021-47054] = "fixed-version: Fixed from version 5.13" | ||
365 | |||
366 | CVE_STATUS[CVE-2021-47055] = "fixed-version: Fixed from version 5.13" | ||
367 | |||
368 | CVE_STATUS[CVE-2021-47056] = "fixed-version: Fixed from version 5.13" | ||
369 | |||
370 | CVE_STATUS[CVE-2021-47057] = "fixed-version: Fixed from version 5.13" | ||
371 | |||
372 | CVE_STATUS[CVE-2021-47058] = "fixed-version: Fixed from version 5.13" | ||
373 | |||
374 | CVE_STATUS[CVE-2021-47059] = "fixed-version: Fixed from version 5.13" | ||
375 | |||
376 | CVE_STATUS[CVE-2021-47060] = "fixed-version: Fixed from version 5.13" | ||
377 | |||
378 | CVE_STATUS[CVE-2021-47061] = "fixed-version: Fixed from version 5.13" | ||
379 | |||
380 | CVE_STATUS[CVE-2021-47062] = "fixed-version: Fixed from version 5.13" | ||
381 | |||
382 | CVE_STATUS[CVE-2021-47063] = "fixed-version: Fixed from version 5.13" | ||
383 | |||
384 | CVE_STATUS[CVE-2021-47064] = "fixed-version: Fixed from version 5.13" | ||
385 | |||
386 | CVE_STATUS[CVE-2021-47065] = "fixed-version: Fixed from version 5.13" | ||
387 | |||
388 | CVE_STATUS[CVE-2021-47066] = "fixed-version: Fixed from version 5.13" | ||
389 | |||
390 | CVE_STATUS[CVE-2021-47067] = "fixed-version: Fixed from version 5.13" | ||
391 | |||
392 | CVE_STATUS[CVE-2021-47068] = "fixed-version: Fixed from version 5.13" | ||
393 | |||
394 | CVE_STATUS[CVE-2021-47069] = "fixed-version: Fixed from version 5.13" | ||
395 | |||
396 | CVE_STATUS[CVE-2021-47070] = "fixed-version: Fixed from version 5.13" | ||
397 | |||
398 | CVE_STATUS[CVE-2021-47071] = "fixed-version: Fixed from version 5.13" | ||
399 | |||
400 | CVE_STATUS[CVE-2021-47072] = "fixed-version: Fixed from version 5.13" | ||
401 | |||
402 | CVE_STATUS[CVE-2021-47073] = "fixed-version: Fixed from version 5.13" | ||
403 | |||
404 | CVE_STATUS[CVE-2021-47074] = "fixed-version: Fixed from version 5.13" | ||
405 | |||
406 | CVE_STATUS[CVE-2021-47075] = "fixed-version: Fixed from version 5.13" | ||
407 | |||
408 | CVE_STATUS[CVE-2021-47076] = "fixed-version: Fixed from version 5.13" | ||
409 | |||
410 | CVE_STATUS[CVE-2021-47077] = "fixed-version: Fixed from version 5.13" | ||
411 | |||
412 | CVE_STATUS[CVE-2021-47078] = "fixed-version: Fixed from version 5.13" | ||
413 | |||
414 | CVE_STATUS[CVE-2021-47079] = "fixed-version: Fixed from version 5.13" | ||
415 | |||
416 | CVE_STATUS[CVE-2021-47080] = "fixed-version: Fixed from version 5.13" | ||
417 | |||
418 | CVE_STATUS[CVE-2021-47081] = "fixed-version: Fixed from version 5.13" | ||
419 | |||
420 | CVE_STATUS[CVE-2021-47082] = "fixed-version: Fixed from version 5.16" | ||
421 | |||
422 | CVE_STATUS[CVE-2021-47083] = "fixed-version: Fixed from version 5.16" | ||
423 | |||
424 | CVE_STATUS[CVE-2021-47086] = "fixed-version: Fixed from version 5.16" | ||
425 | |||
426 | CVE_STATUS[CVE-2021-47087] = "fixed-version: Fixed from version 5.16" | ||
427 | |||
428 | CVE_STATUS[CVE-2021-47088] = "fixed-version: Fixed from version 5.16" | ||
429 | |||
430 | CVE_STATUS[CVE-2021-47089] = "fixed-version: Fixed from version 5.16" | ||
431 | |||
432 | CVE_STATUS[CVE-2021-47090] = "fixed-version: Fixed from version 5.16" | ||
433 | |||
434 | CVE_STATUS[CVE-2021-47091] = "fixed-version: Fixed from version 5.16" | ||
435 | |||
436 | CVE_STATUS[CVE-2021-47092] = "fixed-version: Fixed from version 5.16" | ||
437 | |||
438 | CVE_STATUS[CVE-2021-47093] = "fixed-version: Fixed from version 5.16" | ||
439 | |||
440 | CVE_STATUS[CVE-2021-47094] = "fixed-version: Fixed from version 5.16" | ||
441 | |||
442 | CVE_STATUS[CVE-2021-47095] = "fixed-version: Fixed from version 5.16" | ||
443 | |||
444 | CVE_STATUS[CVE-2021-47096] = "fixed-version: Fixed from version 5.16" | ||
445 | |||
446 | CVE_STATUS[CVE-2021-47097] = "fixed-version: Fixed from version 5.16" | ||
447 | |||
448 | CVE_STATUS[CVE-2021-47098] = "fixed-version: Fixed from version 5.16" | ||
449 | |||
450 | CVE_STATUS[CVE-2021-47099] = "fixed-version: Fixed from version 5.16" | ||
451 | |||
452 | CVE_STATUS[CVE-2021-47100] = "fixed-version: Fixed from version 5.16" | ||
453 | |||
454 | CVE_STATUS[CVE-2021-47101] = "fixed-version: Fixed from version 5.16" | ||
455 | |||
456 | CVE_STATUS[CVE-2021-47102] = "fixed-version: Fixed from version 5.16" | ||
457 | |||
458 | CVE_STATUS[CVE-2021-47103] = "fixed-version: Fixed from version 5.16" | ||
459 | |||
460 | CVE_STATUS[CVE-2021-47104] = "fixed-version: Fixed from version 5.16" | ||
461 | |||
462 | CVE_STATUS[CVE-2021-47105] = "fixed-version: Fixed from version 5.16" | ||
463 | |||
464 | CVE_STATUS[CVE-2021-47106] = "fixed-version: Fixed from version 5.16" | ||
465 | |||
466 | CVE_STATUS[CVE-2021-47107] = "fixed-version: Fixed from version 5.16" | ||
467 | |||
468 | CVE_STATUS[CVE-2021-47108] = "fixed-version: Fixed from version 5.16" | ||
469 | |||
470 | CVE_STATUS[CVE-2021-47109] = "fixed-version: Fixed from version 5.13" | ||
471 | |||
472 | CVE_STATUS[CVE-2021-47110] = "fixed-version: Fixed from version 5.13" | ||
473 | |||
474 | CVE_STATUS[CVE-2021-47111] = "fixed-version: Fixed from version 5.13" | ||
475 | |||
476 | CVE_STATUS[CVE-2021-47112] = "fixed-version: Fixed from version 5.13" | ||
477 | |||
478 | CVE_STATUS[CVE-2021-47113] = "fixed-version: Fixed from version 5.13" | ||
479 | |||
480 | CVE_STATUS[CVE-2021-47114] = "fixed-version: Fixed from version 5.13" | ||
481 | |||
482 | CVE_STATUS[CVE-2021-47116] = "fixed-version: Fixed from version 5.13" | ||
483 | |||
484 | CVE_STATUS[CVE-2021-47117] = "fixed-version: Fixed from version 5.13" | ||
485 | |||
486 | CVE_STATUS[CVE-2021-47118] = "fixed-version: Fixed from version 5.13" | ||
487 | |||
488 | CVE_STATUS[CVE-2021-47119] = "fixed-version: Fixed from version 5.13" | ||
489 | |||
490 | CVE_STATUS[CVE-2021-47120] = "fixed-version: Fixed from version 5.13" | ||
491 | |||
492 | CVE_STATUS[CVE-2021-47121] = "fixed-version: Fixed from version 5.13" | ||
493 | |||
494 | CVE_STATUS[CVE-2021-47122] = "fixed-version: Fixed from version 5.13" | ||
495 | |||
496 | CVE_STATUS[CVE-2021-47123] = "fixed-version: Fixed from version 5.13" | ||
497 | |||
498 | CVE_STATUS[CVE-2021-47124] = "fixed-version: Fixed from version 5.13" | ||
499 | |||
500 | CVE_STATUS[CVE-2021-47125] = "fixed-version: Fixed from version 5.13" | ||
501 | |||
502 | CVE_STATUS[CVE-2021-47126] = "fixed-version: Fixed from version 5.13" | ||
503 | |||
504 | CVE_STATUS[CVE-2021-47127] = "fixed-version: Fixed from version 5.13" | ||
505 | |||
506 | CVE_STATUS[CVE-2021-47128] = "fixed-version: Fixed from version 5.13" | ||
507 | |||
508 | CVE_STATUS[CVE-2021-47129] = "fixed-version: Fixed from version 5.13" | ||
509 | |||
510 | CVE_STATUS[CVE-2021-47130] = "fixed-version: Fixed from version 5.13" | ||
511 | |||
512 | CVE_STATUS[CVE-2021-47131] = "fixed-version: Fixed from version 5.13" | ||
513 | |||
514 | CVE_STATUS[CVE-2021-47132] = "fixed-version: Fixed from version 5.13" | ||
515 | |||
516 | CVE_STATUS[CVE-2021-47133] = "fixed-version: Fixed from version 5.13" | ||
517 | |||
518 | CVE_STATUS[CVE-2021-47134] = "fixed-version: Fixed from version 5.13" | ||
519 | |||
520 | CVE_STATUS[CVE-2021-47135] = "fixed-version: Fixed from version 5.13" | ||
521 | |||
522 | CVE_STATUS[CVE-2021-47136] = "fixed-version: Fixed from version 5.13" | ||
523 | |||
524 | CVE_STATUS[CVE-2021-47137] = "fixed-version: Fixed from version 5.13" | ||
525 | |||
526 | CVE_STATUS[CVE-2021-47138] = "fixed-version: Fixed from version 5.13" | ||
527 | |||
528 | CVE_STATUS[CVE-2021-47139] = "fixed-version: Fixed from version 5.13" | ||
529 | |||
530 | CVE_STATUS[CVE-2021-47140] = "fixed-version: Fixed from version 5.13" | ||
531 | |||
532 | CVE_STATUS[CVE-2021-47141] = "fixed-version: Fixed from version 5.13" | ||
533 | |||
534 | CVE_STATUS[CVE-2021-47142] = "fixed-version: Fixed from version 5.13" | ||
535 | |||
536 | CVE_STATUS[CVE-2021-47143] = "fixed-version: Fixed from version 5.13" | ||
537 | |||
538 | CVE_STATUS[CVE-2021-47144] = "fixed-version: Fixed from version 5.13" | ||
539 | |||
540 | CVE_STATUS[CVE-2021-47145] = "fixed-version: Fixed from version 5.13" | ||
541 | |||
542 | CVE_STATUS[CVE-2021-47146] = "fixed-version: Fixed from version 5.13" | ||
543 | |||
544 | CVE_STATUS[CVE-2021-47147] = "fixed-version: Fixed from version 5.13" | ||
545 | |||
546 | CVE_STATUS[CVE-2021-47148] = "fixed-version: Fixed from version 5.13" | ||
547 | |||
548 | CVE_STATUS[CVE-2021-47149] = "fixed-version: Fixed from version 5.13" | ||
549 | |||
550 | CVE_STATUS[CVE-2021-47150] = "fixed-version: Fixed from version 5.13" | ||
551 | |||
552 | CVE_STATUS[CVE-2021-47151] = "fixed-version: Fixed from version 5.13" | ||
553 | |||
554 | CVE_STATUS[CVE-2021-47152] = "fixed-version: Fixed from version 5.13" | ||
555 | |||
556 | CVE_STATUS[CVE-2021-47153] = "fixed-version: Fixed from version 5.13" | ||
557 | |||
558 | CVE_STATUS[CVE-2021-47158] = "fixed-version: Fixed from version 5.13" | ||
559 | |||
560 | CVE_STATUS[CVE-2021-47159] = "fixed-version: Fixed from version 5.13" | ||
561 | |||
562 | CVE_STATUS[CVE-2021-47160] = "fixed-version: Fixed from version 5.13" | ||
563 | |||
564 | CVE_STATUS[CVE-2021-47161] = "fixed-version: Fixed from version 5.13" | ||
565 | |||
566 | CVE_STATUS[CVE-2021-47162] = "fixed-version: Fixed from version 5.13" | ||
567 | |||
568 | CVE_STATUS[CVE-2021-47163] = "fixed-version: Fixed from version 5.13" | ||
569 | |||
570 | CVE_STATUS[CVE-2021-47164] = "fixed-version: Fixed from version 5.13" | ||
571 | |||
572 | CVE_STATUS[CVE-2021-47165] = "fixed-version: Fixed from version 5.13" | ||
573 | |||
574 | CVE_STATUS[CVE-2021-47166] = "fixed-version: Fixed from version 5.13" | ||
575 | |||
576 | CVE_STATUS[CVE-2021-47167] = "fixed-version: Fixed from version 5.13" | ||
577 | |||
578 | CVE_STATUS[CVE-2021-47168] = "fixed-version: Fixed from version 5.13" | ||
579 | |||
580 | CVE_STATUS[CVE-2021-47169] = "fixed-version: Fixed from version 5.13" | ||
581 | |||
582 | CVE_STATUS[CVE-2021-47170] = "fixed-version: Fixed from version 5.13" | ||
583 | |||
584 | CVE_STATUS[CVE-2021-47171] = "fixed-version: Fixed from version 5.13" | ||
585 | |||
586 | CVE_STATUS[CVE-2021-47172] = "fixed-version: Fixed from version 5.13" | ||
587 | |||
588 | CVE_STATUS[CVE-2021-47173] = "fixed-version: Fixed from version 5.13" | ||
589 | |||
590 | CVE_STATUS[CVE-2021-47174] = "fixed-version: Fixed from version 5.13" | ||
591 | |||
592 | CVE_STATUS[CVE-2021-47175] = "fixed-version: Fixed from version 5.13" | ||
593 | |||
594 | CVE_STATUS[CVE-2021-47176] = "fixed-version: Fixed from version 5.13" | ||
595 | |||
596 | CVE_STATUS[CVE-2021-47177] = "fixed-version: Fixed from version 5.13" | ||
597 | |||
598 | CVE_STATUS[CVE-2021-47178] = "fixed-version: Fixed from version 5.13" | ||
599 | |||
600 | CVE_STATUS[CVE-2021-47179] = "fixed-version: Fixed from version 5.12.9" | ||
601 | |||
602 | CVE_STATUS[CVE-2021-47180] = "fixed-version: Fixed from version 5.13" | ||
603 | |||
604 | CVE_STATUS[CVE-2021-47181] = "fixed-version: Fixed from version 5.16" | ||
605 | |||
606 | CVE_STATUS[CVE-2021-47182] = "fixed-version: Fixed from version 5.16" | ||
607 | |||
608 | CVE_STATUS[CVE-2021-47183] = "fixed-version: Fixed from version 5.16" | ||
609 | |||
610 | CVE_STATUS[CVE-2021-47184] = "fixed-version: Fixed from version 5.16" | ||
611 | |||
612 | CVE_STATUS[CVE-2021-47185] = "fixed-version: Fixed from version 5.16" | ||
613 | |||
614 | CVE_STATUS[CVE-2021-47186] = "fixed-version: Fixed from version 5.16" | ||
615 | |||
616 | CVE_STATUS[CVE-2021-47187] = "fixed-version: Fixed from version 5.16" | ||
617 | |||
618 | CVE_STATUS[CVE-2021-47188] = "fixed-version: Fixed from version 5.16" | ||
619 | |||
620 | CVE_STATUS[CVE-2021-47189] = "fixed-version: Fixed from version 5.16" | ||
621 | |||
622 | CVE_STATUS[CVE-2021-47190] = "fixed-version: Fixed from version 5.16" | ||
623 | |||
624 | CVE_STATUS[CVE-2021-47191] = "fixed-version: Fixed from version 5.16" | ||
625 | |||
626 | CVE_STATUS[CVE-2021-47192] = "fixed-version: Fixed from version 5.16" | ||
627 | |||
628 | CVE_STATUS[CVE-2021-47193] = "fixed-version: Fixed from version 5.16" | ||
629 | |||
630 | CVE_STATUS[CVE-2021-47194] = "fixed-version: Fixed from version 5.16" | ||
631 | |||
632 | CVE_STATUS[CVE-2021-47195] = "fixed-version: Fixed from version 5.16" | ||
633 | |||
634 | CVE_STATUS[CVE-2021-47196] = "fixed-version: Fixed from version 5.16" | ||
635 | |||
636 | CVE_STATUS[CVE-2021-47197] = "fixed-version: Fixed from version 5.16" | ||
637 | |||
638 | CVE_STATUS[CVE-2021-47198] = "fixed-version: Fixed from version 5.16" | ||
639 | |||
640 | CVE_STATUS[CVE-2021-47199] = "fixed-version: Fixed from version 5.16" | ||
641 | |||
642 | CVE_STATUS[CVE-2021-47200] = "fixed-version: Fixed from version 5.16" | ||
643 | |||
644 | CVE_STATUS[CVE-2021-47201] = "fixed-version: Fixed from version 5.16" | ||
645 | |||
646 | CVE_STATUS[CVE-2021-47202] = "fixed-version: Fixed from version 5.16" | ||
647 | |||
648 | CVE_STATUS[CVE-2021-47203] = "fixed-version: Fixed from version 5.16" | ||
649 | |||
650 | CVE_STATUS[CVE-2021-47204] = "fixed-version: Fixed from version 5.16" | ||
651 | |||
652 | CVE_STATUS[CVE-2021-47205] = "fixed-version: Fixed from version 5.16" | ||
653 | |||
654 | CVE_STATUS[CVE-2021-47206] = "fixed-version: Fixed from version 5.16" | ||
655 | |||
656 | CVE_STATUS[CVE-2021-47207] = "fixed-version: Fixed from version 5.16" | ||
657 | |||
658 | CVE_STATUS[CVE-2021-47209] = "fixed-version: Fixed from version 5.16" | ||
659 | |||
660 | CVE_STATUS[CVE-2021-47210] = "fixed-version: Fixed from version 5.16" | ||
661 | |||
662 | CVE_STATUS[CVE-2021-47211] = "fixed-version: Fixed from version 5.16" | ||
663 | |||
664 | CVE_STATUS[CVE-2021-47212] = "fixed-version: Fixed from version 5.16" | ||
665 | |||
666 | CVE_STATUS[CVE-2021-47214] = "fixed-version: Fixed from version 5.16" | ||
667 | |||
668 | CVE_STATUS[CVE-2021-47215] = "fixed-version: Fixed from version 5.16" | ||
669 | |||
670 | CVE_STATUS[CVE-2021-47216] = "fixed-version: Fixed from version 5.16" | ||
671 | |||
672 | CVE_STATUS[CVE-2021-47217] = "fixed-version: Fixed from version 5.16" | ||
673 | |||
674 | CVE_STATUS[CVE-2021-47218] = "fixed-version: Fixed from version 5.16" | ||
675 | |||
676 | CVE_STATUS[CVE-2021-47219] = "fixed-version: Fixed from version 5.16" | ||
677 | |||
678 | CVE_STATUS[CVE-2021-47221] = "fixed-version: Fixed from version 5.13" | ||
679 | |||
680 | CVE_STATUS[CVE-2021-47222] = "fixed-version: Fixed from version 5.13" | ||
681 | |||
682 | CVE_STATUS[CVE-2021-47223] = "fixed-version: Fixed from version 5.13" | ||
683 | |||
684 | CVE_STATUS[CVE-2021-47224] = "fixed-version: Fixed from version 5.13" | ||
685 | |||
686 | CVE_STATUS[CVE-2021-47225] = "fixed-version: Fixed from version 5.13" | ||
687 | |||
688 | CVE_STATUS[CVE-2021-47226] = "fixed-version: Fixed from version 5.13" | ||
689 | |||
690 | CVE_STATUS[CVE-2021-47227] = "fixed-version: Fixed from version 5.13" | ||
691 | |||
692 | CVE_STATUS[CVE-2021-47228] = "fixed-version: Fixed from version 5.13" | ||
693 | |||
694 | CVE_STATUS[CVE-2021-47229] = "fixed-version: Fixed from version 5.13" | ||
695 | |||
696 | CVE_STATUS[CVE-2021-47230] = "fixed-version: Fixed from version 5.13" | ||
697 | |||
698 | CVE_STATUS[CVE-2021-47231] = "fixed-version: Fixed from version 5.13" | ||
699 | |||
700 | CVE_STATUS[CVE-2021-47232] = "fixed-version: Fixed from version 5.13" | ||
701 | |||
702 | CVE_STATUS[CVE-2021-47233] = "fixed-version: Fixed from version 5.13" | ||
703 | |||
704 | CVE_STATUS[CVE-2021-47234] = "fixed-version: Fixed from version 5.13" | ||
705 | |||
706 | CVE_STATUS[CVE-2021-47235] = "fixed-version: Fixed from version 5.13" | ||
707 | |||
708 | CVE_STATUS[CVE-2021-47236] = "fixed-version: Fixed from version 5.13" | ||
709 | |||
710 | CVE_STATUS[CVE-2021-47237] = "fixed-version: Fixed from version 5.13" | ||
711 | |||
712 | CVE_STATUS[CVE-2021-47238] = "fixed-version: Fixed from version 5.13" | ||
713 | |||
714 | CVE_STATUS[CVE-2021-47239] = "fixed-version: Fixed from version 5.12.13" | ||
715 | |||
716 | CVE_STATUS[CVE-2021-47240] = "fixed-version: Fixed from version 5.13" | ||
717 | |||
718 | CVE_STATUS[CVE-2021-47241] = "fixed-version: Fixed from version 5.13" | ||
719 | |||
720 | CVE_STATUS[CVE-2021-47242] = "fixed-version: Fixed from version 5.13" | ||
721 | |||
722 | CVE_STATUS[CVE-2021-47243] = "fixed-version: Fixed from version 5.13" | ||
723 | |||
724 | CVE_STATUS[CVE-2021-47244] = "fixed-version: Fixed from version 5.13" | ||
725 | |||
726 | CVE_STATUS[CVE-2021-47245] = "fixed-version: Fixed from version 5.13" | ||
727 | |||
728 | CVE_STATUS[CVE-2021-47246] = "fixed-version: Fixed from version 5.13" | ||
729 | |||
730 | CVE_STATUS[CVE-2021-47247] = "fixed-version: Fixed from version 5.13" | ||
731 | |||
732 | CVE_STATUS[CVE-2021-47248] = "fixed-version: Fixed from version 5.13" | ||
733 | |||
734 | CVE_STATUS[CVE-2021-47249] = "fixed-version: Fixed from version 5.13" | ||
735 | |||
736 | CVE_STATUS[CVE-2021-47250] = "fixed-version: Fixed from version 5.13" | ||
737 | |||
738 | CVE_STATUS[CVE-2021-47251] = "fixed-version: Fixed from version 5.13" | ||
739 | |||
740 | CVE_STATUS[CVE-2021-47252] = "fixed-version: Fixed from version 5.13" | ||
741 | |||
742 | CVE_STATUS[CVE-2021-47253] = "fixed-version: Fixed from version 5.13" | ||
743 | |||
744 | CVE_STATUS[CVE-2021-47254] = "fixed-version: Fixed from version 5.13" | ||
745 | |||
746 | CVE_STATUS[CVE-2021-47255] = "fixed-version: Fixed from version 5.13" | ||
747 | |||
748 | CVE_STATUS[CVE-2021-47256] = "fixed-version: Fixed from version 5.13" | ||
749 | |||
750 | CVE_STATUS[CVE-2021-47257] = "fixed-version: Fixed from version 5.13" | ||
751 | |||
752 | CVE_STATUS[CVE-2021-47258] = "fixed-version: Fixed from version 5.13" | ||
753 | |||
754 | CVE_STATUS[CVE-2021-47259] = "fixed-version: Fixed from version 5.13" | ||
755 | |||
756 | CVE_STATUS[CVE-2021-47260] = "fixed-version: Fixed from version 5.13" | ||
757 | |||
758 | CVE_STATUS[CVE-2021-47261] = "fixed-version: Fixed from version 5.13" | ||
759 | |||
760 | CVE_STATUS[CVE-2021-47262] = "fixed-version: Fixed from version 5.13" | ||
761 | |||
762 | CVE_STATUS[CVE-2021-47263] = "fixed-version: Fixed from version 5.13" | ||
763 | |||
764 | CVE_STATUS[CVE-2021-47264] = "fixed-version: Fixed from version 5.13" | ||
765 | |||
766 | CVE_STATUS[CVE-2021-47265] = "fixed-version: Fixed from version 5.13" | ||
767 | |||
768 | CVE_STATUS[CVE-2021-47266] = "fixed-version: Fixed from version 5.13" | ||
769 | |||
770 | CVE_STATUS[CVE-2021-47267] = "fixed-version: Fixed from version 5.13" | ||
771 | |||
772 | CVE_STATUS[CVE-2021-47268] = "fixed-version: Fixed from version 5.13" | ||
773 | |||
774 | CVE_STATUS[CVE-2021-47269] = "fixed-version: Fixed from version 5.13" | ||
775 | |||
776 | CVE_STATUS[CVE-2021-47270] = "fixed-version: Fixed from version 5.13" | ||
777 | |||
778 | CVE_STATUS[CVE-2021-47271] = "fixed-version: Fixed from version 5.13" | ||
779 | |||
780 | CVE_STATUS[CVE-2021-47272] = "fixed-version: Fixed from version 5.13" | ||
781 | |||
782 | CVE_STATUS[CVE-2021-47273] = "fixed-version: Fixed from version 5.13" | ||
783 | |||
784 | CVE_STATUS[CVE-2021-47274] = "fixed-version: Fixed from version 5.13" | ||
785 | |||
786 | CVE_STATUS[CVE-2021-47275] = "fixed-version: Fixed from version 5.13" | ||
787 | |||
788 | CVE_STATUS[CVE-2021-47276] = "fixed-version: Fixed from version 5.13" | ||
789 | |||
790 | CVE_STATUS[CVE-2021-47277] = "fixed-version: Fixed from version 5.13" | ||
791 | |||
792 | CVE_STATUS[CVE-2021-47278] = "fixed-version: Fixed from version 5.13" | ||
793 | |||
794 | CVE_STATUS[CVE-2021-47279] = "fixed-version: Fixed from version 5.13" | ||
795 | |||
796 | CVE_STATUS[CVE-2021-47280] = "fixed-version: Fixed from version 5.13" | ||
797 | |||
798 | CVE_STATUS[CVE-2021-47281] = "fixed-version: Fixed from version 5.13" | ||
799 | |||
800 | CVE_STATUS[CVE-2021-47282] = "fixed-version: Fixed from version 5.13" | ||
801 | |||
802 | CVE_STATUS[CVE-2021-47283] = "fixed-version: Fixed from version 5.13" | ||
803 | |||
804 | CVE_STATUS[CVE-2021-47284] = "fixed-version: Fixed from version 5.13" | ||
805 | |||
806 | CVE_STATUS[CVE-2021-47286] = "fixed-version: Fixed from version 5.14" | ||
807 | |||
808 | CVE_STATUS[CVE-2021-47287] = "fixed-version: Fixed from version 5.14" | ||
809 | |||
810 | CVE_STATUS[CVE-2021-47288] = "fixed-version: Fixed from version 5.14" | ||
811 | |||
812 | CVE_STATUS[CVE-2021-47289] = "fixed-version: Fixed from version 5.14" | ||
813 | |||
814 | CVE_STATUS[CVE-2021-47290] = "fixed-version: Fixed from version 5.14" | ||
815 | |||
816 | CVE_STATUS[CVE-2021-47291] = "fixed-version: Fixed from version 5.14" | ||
817 | |||
818 | CVE_STATUS[CVE-2021-47292] = "fixed-version: Fixed from version 5.14" | ||
819 | |||
820 | CVE_STATUS[CVE-2021-47293] = "fixed-version: Fixed from version 5.14" | ||
821 | |||
822 | CVE_STATUS[CVE-2021-47294] = "fixed-version: Fixed from version 5.14" | ||
823 | |||
824 | CVE_STATUS[CVE-2021-47295] = "fixed-version: Fixed from version 5.14" | ||
825 | |||
826 | CVE_STATUS[CVE-2021-47296] = "fixed-version: Fixed from version 5.14" | ||
827 | |||
828 | CVE_STATUS[CVE-2021-47297] = "fixed-version: Fixed from version 5.14" | ||
829 | |||
830 | CVE_STATUS[CVE-2021-47298] = "fixed-version: Fixed from version 5.14" | ||
831 | |||
832 | CVE_STATUS[CVE-2021-47299] = "fixed-version: Fixed from version 5.14" | ||
833 | |||
834 | CVE_STATUS[CVE-2021-47300] = "fixed-version: Fixed from version 5.14" | ||
835 | |||
836 | CVE_STATUS[CVE-2021-47301] = "fixed-version: Fixed from version 5.14" | ||
837 | |||
838 | CVE_STATUS[CVE-2021-47302] = "fixed-version: Fixed from version 5.14" | ||
839 | |||
840 | CVE_STATUS[CVE-2021-47303] = "fixed-version: Fixed from version 5.14" | ||
841 | |||
842 | CVE_STATUS[CVE-2021-47304] = "fixed-version: Fixed from version 5.14" | ||
843 | |||
844 | CVE_STATUS[CVE-2021-47305] = "fixed-version: Fixed from version 5.14" | ||
845 | |||
846 | CVE_STATUS[CVE-2021-47306] = "fixed-version: Fixed from version 5.14" | ||
847 | |||
848 | CVE_STATUS[CVE-2021-47307] = "fixed-version: Fixed from version 5.14" | ||
849 | |||
850 | CVE_STATUS[CVE-2021-47308] = "fixed-version: Fixed from version 5.14" | ||
851 | |||
852 | CVE_STATUS[CVE-2021-47309] = "fixed-version: Fixed from version 5.14" | ||
853 | |||
854 | CVE_STATUS[CVE-2021-47310] = "fixed-version: Fixed from version 5.14" | ||
855 | |||
856 | CVE_STATUS[CVE-2021-47311] = "fixed-version: Fixed from version 5.14" | ||
857 | |||
858 | CVE_STATUS[CVE-2021-47312] = "fixed-version: Fixed from version 5.13.5" | ||
859 | |||
860 | CVE_STATUS[CVE-2021-47313] = "fixed-version: Fixed from version 5.14" | ||
861 | |||
862 | CVE_STATUS[CVE-2021-47314] = "fixed-version: Fixed from version 5.14" | ||
863 | |||
864 | CVE_STATUS[CVE-2021-47315] = "fixed-version: Fixed from version 5.14" | ||
865 | |||
866 | CVE_STATUS[CVE-2021-47316] = "fixed-version: Fixed from version 5.14" | ||
867 | |||
868 | CVE_STATUS[CVE-2021-47317] = "fixed-version: Fixed from version 5.14" | ||
869 | |||
870 | CVE_STATUS[CVE-2021-47318] = "fixed-version: Fixed from version 5.14" | ||
871 | |||
872 | CVE_STATUS[CVE-2021-47319] = "fixed-version: Fixed from version 5.14" | ||
873 | |||
874 | CVE_STATUS[CVE-2021-47320] = "fixed-version: Fixed from version 5.14" | ||
875 | |||
876 | CVE_STATUS[CVE-2021-47321] = "fixed-version: Fixed from version 5.14" | ||
877 | |||
878 | CVE_STATUS[CVE-2021-47322] = "fixed-version: Fixed from version 5.14" | ||
879 | |||
880 | CVE_STATUS[CVE-2021-47323] = "fixed-version: Fixed from version 5.14" | ||
881 | |||
882 | CVE_STATUS[CVE-2021-47324] = "fixed-version: Fixed from version 5.14" | ||
883 | |||
884 | CVE_STATUS[CVE-2021-47325] = "fixed-version: Fixed from version 5.14" | ||
885 | |||
886 | CVE_STATUS[CVE-2021-47327] = "fixed-version: Fixed from version 5.14" | ||
887 | |||
888 | CVE_STATUS[CVE-2021-47328] = "fixed-version: Fixed from version 5.14" | ||
889 | |||
890 | CVE_STATUS[CVE-2021-47329] = "fixed-version: Fixed from version 5.14" | ||
891 | |||
892 | CVE_STATUS[CVE-2021-47330] = "fixed-version: Fixed from version 5.14" | ||
893 | |||
894 | CVE_STATUS[CVE-2021-47331] = "fixed-version: Fixed from version 5.14" | ||
895 | |||
896 | CVE_STATUS[CVE-2021-47332] = "fixed-version: Fixed from version 5.14" | ||
897 | |||
898 | CVE_STATUS[CVE-2021-47333] = "fixed-version: Fixed from version 5.14" | ||
899 | |||
900 | CVE_STATUS[CVE-2021-47334] = "fixed-version: Fixed from version 5.14" | ||
901 | |||
902 | CVE_STATUS[CVE-2021-47335] = "fixed-version: Fixed from version 5.14" | ||
903 | |||
904 | CVE_STATUS[CVE-2021-47336] = "fixed-version: Fixed from version 5.14" | ||
905 | |||
906 | CVE_STATUS[CVE-2021-47337] = "fixed-version: Fixed from version 5.14" | ||
907 | |||
908 | CVE_STATUS[CVE-2021-47338] = "fixed-version: Fixed from version 5.14" | ||
909 | |||
910 | CVE_STATUS[CVE-2021-47339] = "fixed-version: Fixed from version 5.14" | ||
911 | |||
912 | CVE_STATUS[CVE-2021-47340] = "fixed-version: Fixed from version 5.14" | ||
913 | |||
914 | CVE_STATUS[CVE-2021-47341] = "fixed-version: Fixed from version 5.14" | ||
915 | |||
916 | CVE_STATUS[CVE-2021-47342] = "fixed-version: Fixed from version 5.14" | ||
917 | |||
918 | CVE_STATUS[CVE-2021-47343] = "fixed-version: Fixed from version 5.14" | ||
919 | |||
920 | CVE_STATUS[CVE-2021-47344] = "fixed-version: Fixed from version 5.14" | ||
921 | |||
922 | CVE_STATUS[CVE-2021-47345] = "fixed-version: Fixed from version 5.14" | ||
923 | |||
924 | CVE_STATUS[CVE-2021-47346] = "fixed-version: Fixed from version 5.14" | ||
925 | |||
926 | CVE_STATUS[CVE-2021-47347] = "fixed-version: Fixed from version 5.14" | ||
927 | |||
928 | CVE_STATUS[CVE-2021-47348] = "fixed-version: Fixed from version 5.14" | ||
929 | |||
930 | CVE_STATUS[CVE-2021-47349] = "fixed-version: Fixed from version 5.14" | ||
931 | |||
932 | CVE_STATUS[CVE-2021-47350] = "fixed-version: Fixed from version 5.14" | ||
933 | |||
934 | CVE_STATUS[CVE-2021-47351] = "fixed-version: Fixed from version 5.14" | ||
935 | |||
936 | CVE_STATUS[CVE-2021-47352] = "fixed-version: Fixed from version 5.14" | ||
937 | |||
938 | CVE_STATUS[CVE-2021-47353] = "fixed-version: Fixed from version 5.14" | ||
939 | |||
940 | CVE_STATUS[CVE-2021-47354] = "fixed-version: Fixed from version 5.14" | ||
941 | |||
942 | CVE_STATUS[CVE-2021-47355] = "fixed-version: Fixed from version 5.14" | ||
943 | |||
944 | CVE_STATUS[CVE-2021-47356] = "fixed-version: Fixed from version 5.14" | ||
945 | |||
946 | CVE_STATUS[CVE-2021-47357] = "fixed-version: Fixed from version 5.14" | ||
947 | |||
948 | CVE_STATUS[CVE-2021-47358] = "fixed-version: Fixed from version 5.15" | ||
949 | |||
950 | CVE_STATUS[CVE-2021-47359] = "fixed-version: Fixed from version 5.15" | ||
951 | |||
952 | CVE_STATUS[CVE-2021-47360] = "fixed-version: Fixed from version 5.15" | ||
953 | |||
954 | CVE_STATUS[CVE-2021-47361] = "fixed-version: Fixed from version 5.15" | ||
955 | |||
956 | CVE_STATUS[CVE-2021-47362] = "fixed-version: Fixed from version 5.15" | ||
957 | |||
958 | CVE_STATUS[CVE-2021-47363] = "fixed-version: Fixed from version 5.15" | ||
959 | |||
960 | CVE_STATUS[CVE-2021-47364] = "fixed-version: Fixed from version 5.15" | ||
961 | |||
962 | CVE_STATUS[CVE-2021-47365] = "fixed-version: Fixed from version 5.15" | ||
963 | |||
964 | CVE_STATUS[CVE-2021-47366] = "fixed-version: Fixed from version 5.15" | ||
965 | |||
966 | CVE_STATUS[CVE-2021-47367] = "fixed-version: Fixed from version 5.15" | ||
967 | |||
968 | CVE_STATUS[CVE-2021-47368] = "fixed-version: Fixed from version 5.15" | ||
969 | |||
970 | CVE_STATUS[CVE-2021-47369] = "fixed-version: Fixed from version 5.15" | ||
971 | |||
972 | CVE_STATUS[CVE-2021-47370] = "fixed-version: Fixed from version 5.14.9" | ||
973 | |||
974 | CVE_STATUS[CVE-2021-47371] = "fixed-version: Fixed from version 5.15" | ||
975 | |||
976 | CVE_STATUS[CVE-2021-47372] = "fixed-version: Fixed from version 5.15" | ||
977 | |||
978 | CVE_STATUS[CVE-2021-47373] = "fixed-version: Fixed from version 5.15" | ||
979 | |||
980 | CVE_STATUS[CVE-2021-47374] = "fixed-version: Fixed from version 5.15" | ||
981 | |||
982 | CVE_STATUS[CVE-2021-47375] = "fixed-version: Fixed from version 5.15" | ||
983 | |||
984 | CVE_STATUS[CVE-2021-47376] = "fixed-version: Fixed from version 5.15" | ||
985 | |||
986 | CVE_STATUS[CVE-2021-47378] = "fixed-version: Fixed from version 5.15" | ||
987 | |||
988 | CVE_STATUS[CVE-2021-47379] = "fixed-version: Fixed from version 5.15" | ||
989 | |||
990 | CVE_STATUS[CVE-2021-47380] = "fixed-version: Fixed from version 5.15" | ||
991 | |||
992 | CVE_STATUS[CVE-2021-47381] = "fixed-version: Fixed from version 5.15" | ||
993 | |||
994 | CVE_STATUS[CVE-2021-47382] = "fixed-version: Fixed from version 5.15" | ||
995 | |||
996 | CVE_STATUS[CVE-2021-47383] = "fixed-version: Fixed from version 5.15" | ||
997 | |||
998 | CVE_STATUS[CVE-2021-47384] = "fixed-version: Fixed from version 5.15" | ||
999 | |||
1000 | CVE_STATUS[CVE-2021-47385] = "fixed-version: Fixed from version 5.15" | ||
1001 | |||
1002 | CVE_STATUS[CVE-2021-47386] = "fixed-version: Fixed from version 5.15" | ||
1003 | |||
1004 | CVE_STATUS[CVE-2021-47387] = "fixed-version: Fixed from version 5.15" | ||
1005 | |||
1006 | CVE_STATUS[CVE-2021-47388] = "fixed-version: Fixed from version 5.15" | ||
1007 | |||
1008 | CVE_STATUS[CVE-2021-47389] = "fixed-version: Fixed from version 5.15" | ||
1009 | |||
1010 | CVE_STATUS[CVE-2021-47390] = "fixed-version: Fixed from version 5.15" | ||
1011 | |||
1012 | CVE_STATUS[CVE-2021-47391] = "fixed-version: Fixed from version 5.15" | ||
1013 | |||
1014 | CVE_STATUS[CVE-2021-47392] = "fixed-version: Fixed from version 5.15" | ||
1015 | |||
1016 | CVE_STATUS[CVE-2021-47393] = "fixed-version: Fixed from version 5.15" | ||
1017 | |||
1018 | CVE_STATUS[CVE-2021-47394] = "fixed-version: Fixed from version 5.15" | ||
1019 | |||
1020 | CVE_STATUS[CVE-2021-47395] = "fixed-version: Fixed from version 5.15" | ||
1021 | |||
1022 | CVE_STATUS[CVE-2021-47396] = "fixed-version: Fixed from version 5.15" | ||
1023 | |||
1024 | CVE_STATUS[CVE-2021-47397] = "fixed-version: Fixed from version 5.15" | ||
1025 | |||
1026 | CVE_STATUS[CVE-2021-47398] = "fixed-version: Fixed from version 5.15" | ||
1027 | |||
1028 | CVE_STATUS[CVE-2021-47399] = "fixed-version: Fixed from version 5.15" | ||
1029 | |||
1030 | CVE_STATUS[CVE-2021-47400] = "fixed-version: Fixed from version 5.15" | ||
1031 | |||
1032 | CVE_STATUS[CVE-2021-47401] = "fixed-version: Fixed from version 5.15" | ||
1033 | |||
1034 | CVE_STATUS[CVE-2021-47402] = "fixed-version: Fixed from version 5.15" | ||
1035 | |||
1036 | CVE_STATUS[CVE-2021-47403] = "fixed-version: Fixed from version 5.15" | ||
1037 | |||
1038 | CVE_STATUS[CVE-2021-47404] = "fixed-version: Fixed from version 5.15" | ||
1039 | |||
1040 | CVE_STATUS[CVE-2021-47405] = "fixed-version: Fixed from version 5.15" | ||
1041 | |||
1042 | CVE_STATUS[CVE-2021-47406] = "fixed-version: Fixed from version 5.15" | ||
1043 | |||
1044 | CVE_STATUS[CVE-2021-47407] = "fixed-version: Fixed from version 5.15" | ||
1045 | |||
1046 | CVE_STATUS[CVE-2021-47408] = "fixed-version: Fixed from version 5.15" | ||
1047 | |||
1048 | CVE_STATUS[CVE-2021-47409] = "fixed-version: Fixed from version 5.15" | ||
1049 | |||
1050 | CVE_STATUS[CVE-2021-47410] = "fixed-version: Fixed from version 5.15" | ||
1051 | |||
1052 | CVE_STATUS[CVE-2021-47412] = "fixed-version: Fixed from version 5.15" | ||
1053 | |||
1054 | CVE_STATUS[CVE-2021-47413] = "fixed-version: Fixed from version 5.15" | ||
1055 | |||
1056 | CVE_STATUS[CVE-2021-47414] = "fixed-version: Fixed from version 5.15" | ||
1057 | |||
1058 | CVE_STATUS[CVE-2021-47415] = "fixed-version: Fixed from version 5.15" | ||
1059 | |||
1060 | CVE_STATUS[CVE-2021-47416] = "fixed-version: Fixed from version 5.15" | ||
1061 | |||
1062 | CVE_STATUS[CVE-2021-47417] = "fixed-version: Fixed from version 5.15" | ||
1063 | |||
1064 | CVE_STATUS[CVE-2021-47418] = "fixed-version: Fixed from version 5.15" | ||
1065 | |||
1066 | CVE_STATUS[CVE-2021-47419] = "fixed-version: Fixed from version 5.15" | ||
1067 | |||
1068 | CVE_STATUS[CVE-2021-47420] = "fixed-version: Fixed from version 5.15" | ||
1069 | |||
1070 | CVE_STATUS[CVE-2021-47421] = "fixed-version: Fixed from version 5.15" | ||
1071 | |||
1072 | CVE_STATUS[CVE-2021-47422] = "fixed-version: Fixed from version 5.15" | ||
1073 | |||
1074 | CVE_STATUS[CVE-2021-47423] = "fixed-version: Fixed from version 5.15" | ||
1075 | |||
1076 | CVE_STATUS[CVE-2021-47424] = "fixed-version: Fixed from version 5.15" | ||
1077 | |||
1078 | CVE_STATUS[CVE-2021-47425] = "fixed-version: Fixed from version 5.15" | ||
1079 | |||
1080 | CVE_STATUS[CVE-2021-47426] = "fixed-version: Fixed from version 5.15" | ||
1081 | |||
1082 | CVE_STATUS[CVE-2021-47427] = "fixed-version: Fixed from version 5.15" | ||
1083 | |||
1084 | CVE_STATUS[CVE-2021-47428] = "fixed-version: Fixed from version 5.15" | ||
1085 | |||
1086 | CVE_STATUS[CVE-2021-47429] = "fixed-version: Fixed from version 5.15" | ||
1087 | |||
1088 | CVE_STATUS[CVE-2021-47430] = "fixed-version: Fixed from version 5.15" | ||
1089 | |||
1090 | CVE_STATUS[CVE-2021-47431] = "fixed-version: Fixed from version 5.15" | ||
1091 | |||
1092 | CVE_STATUS[CVE-2021-47432] = "fixed-version: Fixed from version 6.7" | ||
1093 | |||
1094 | CVE_STATUS[CVE-2021-47433] = "fixed-version: Fixed from version 5.15" | ||
1095 | |||
1096 | CVE_STATUS[CVE-2021-47434] = "fixed-version: Fixed from version 5.15" | ||
1097 | |||
1098 | CVE_STATUS[CVE-2021-47435] = "fixed-version: Fixed from version 5.15" | ||
1099 | |||
1100 | CVE_STATUS[CVE-2021-47436] = "fixed-version: Fixed from version 5.14.14" | ||
1101 | |||
1102 | CVE_STATUS[CVE-2021-47437] = "fixed-version: Fixed from version 5.15" | ||
1103 | |||
1104 | CVE_STATUS[CVE-2021-47438] = "fixed-version: Fixed from version 5.15" | ||
1105 | |||
1106 | CVE_STATUS[CVE-2021-47439] = "fixed-version: Fixed from version 5.15" | ||
1107 | |||
1108 | CVE_STATUS[CVE-2021-47440] = "fixed-version: Fixed from version 5.15" | ||
1109 | |||
1110 | CVE_STATUS[CVE-2021-47441] = "fixed-version: Fixed from version 5.15" | ||
1111 | |||
1112 | CVE_STATUS[CVE-2021-47442] = "fixed-version: Fixed from version 5.15" | ||
1113 | |||
1114 | CVE_STATUS[CVE-2021-47443] = "fixed-version: Fixed from version 5.15" | ||
1115 | |||
1116 | CVE_STATUS[CVE-2021-47444] = "fixed-version: Fixed from version 5.15" | ||
1117 | |||
1118 | CVE_STATUS[CVE-2021-47445] = "fixed-version: Fixed from version 5.15" | ||
1119 | |||
1120 | CVE_STATUS[CVE-2021-47446] = "fixed-version: Fixed from version 5.15" | ||
1121 | |||
1122 | CVE_STATUS[CVE-2021-47447] = "fixed-version: Fixed from version 5.15" | ||
1123 | |||
1124 | CVE_STATUS[CVE-2021-47448] = "fixed-version: Fixed from version 5.15" | ||
1125 | |||
1126 | CVE_STATUS[CVE-2021-47449] = "fixed-version: Fixed from version 5.14.14" | ||
1127 | |||
1128 | CVE_STATUS[CVE-2021-47450] = "fixed-version: Fixed from version 5.15" | ||
1129 | |||
1130 | CVE_STATUS[CVE-2021-47451] = "fixed-version: Fixed from version 5.15" | ||
1131 | |||
1132 | CVE_STATUS[CVE-2021-47452] = "fixed-version: Fixed from version 5.15" | ||
1133 | |||
1134 | CVE_STATUS[CVE-2021-47453] = "fixed-version: Fixed from version 5.15" | ||
1135 | |||
1136 | CVE_STATUS[CVE-2021-47454] = "fixed-version: Fixed from version 5.15" | ||
1137 | |||
1138 | CVE_STATUS[CVE-2021-47455] = "fixed-version: Fixed from version 5.15" | ||
1139 | |||
1140 | CVE_STATUS[CVE-2021-47456] = "fixed-version: Fixed from version 5.15" | ||
1141 | |||
1142 | CVE_STATUS[CVE-2021-47457] = "fixed-version: Fixed from version 5.15" | ||
1143 | |||
1144 | CVE_STATUS[CVE-2021-47458] = "fixed-version: Fixed from version 5.15" | ||
1145 | |||
1146 | CVE_STATUS[CVE-2021-47459] = "fixed-version: Fixed from version 5.15" | ||
1147 | |||
1148 | CVE_STATUS[CVE-2021-47460] = "fixed-version: Fixed from version 5.15" | ||
1149 | |||
1150 | CVE_STATUS[CVE-2021-47461] = "fixed-version: Fixed from version 5.15" | ||
1151 | |||
1152 | CVE_STATUS[CVE-2021-47462] = "fixed-version: Fixed from version 5.15" | ||
1153 | |||
1154 | CVE_STATUS[CVE-2021-47463] = "fixed-version: Fixed from version 5.15" | ||
1155 | |||
1156 | CVE_STATUS[CVE-2021-47464] = "fixed-version: Fixed from version 5.15" | ||
1157 | |||
1158 | CVE_STATUS[CVE-2021-47465] = "fixed-version: Fixed from version 5.15" | ||
1159 | |||
1160 | CVE_STATUS[CVE-2021-47466] = "fixed-version: Fixed from version 5.15" | ||
1161 | |||
1162 | CVE_STATUS[CVE-2021-47467] = "fixed-version: Fixed from version 5.15" | ||
1163 | |||
1164 | CVE_STATUS[CVE-2021-47468] = "fixed-version: Fixed from version 5.15" | ||
1165 | |||
1166 | CVE_STATUS[CVE-2021-47470] = "fixed-version: Fixed from version 5.15" | ||
1167 | |||
1168 | CVE_STATUS[CVE-2021-47471] = "fixed-version: Fixed from version 5.15" | ||
1169 | |||
1170 | CVE_STATUS[CVE-2021-47473] = "fixed-version: Fixed from version 5.15" | ||
1171 | |||
1172 | CVE_STATUS[CVE-2021-47474] = "fixed-version: Fixed from version 5.16" | ||
1173 | |||
1174 | CVE_STATUS[CVE-2021-47475] = "fixed-version: Fixed from version 5.16" | ||
1175 | |||
1176 | CVE_STATUS[CVE-2021-47476] = "fixed-version: Fixed from version 5.16" | ||
1177 | |||
1178 | CVE_STATUS[CVE-2021-47477] = "fixed-version: Fixed from version 5.16" | ||
1179 | |||
1180 | CVE_STATUS[CVE-2021-47478] = "fixed-version: Fixed from version 5.16" | ||
1181 | |||
1182 | CVE_STATUS[CVE-2021-47479] = "fixed-version: Fixed from version 5.16" | ||
1183 | |||
1184 | CVE_STATUS[CVE-2021-47480] = "fixed-version: Fixed from version 5.15" | ||
1185 | |||
1186 | CVE_STATUS[CVE-2021-47481] = "fixed-version: Fixed from version 5.15" | ||
1187 | |||
1188 | CVE_STATUS[CVE-2021-47482] = "fixed-version: Fixed from version 5.15" | ||
1189 | |||
1190 | CVE_STATUS[CVE-2021-47483] = "fixed-version: Fixed from version 5.15" | ||
1191 | |||
1192 | CVE_STATUS[CVE-2021-47484] = "fixed-version: Fixed from version 5.15" | ||
1193 | |||
1194 | CVE_STATUS[CVE-2021-47485] = "fixed-version: Fixed from version 5.15" | ||
1195 | |||
1196 | CVE_STATUS[CVE-2021-47486] = "fixed-version: Fixed from version 5.15" | ||
1197 | |||
1198 | CVE_STATUS[CVE-2021-47489] = "fixed-version: Fixed from version 5.15" | ||
1199 | |||
1200 | CVE_STATUS[CVE-2021-47490] = "fixed-version: Fixed from version 5.15" | ||
1201 | |||
1202 | CVE_STATUS[CVE-2021-47491] = "fixed-version: Fixed from version 5.15" | ||
1203 | |||
1204 | CVE_STATUS[CVE-2021-47492] = "fixed-version: Fixed from version 5.15" | ||
1205 | |||
1206 | CVE_STATUS[CVE-2021-47493] = "fixed-version: Fixed from version 5.15" | ||
1207 | |||
1208 | CVE_STATUS[CVE-2021-47494] = "fixed-version: Fixed from version 5.15" | ||
1209 | |||
1210 | CVE_STATUS[CVE-2021-47495] = "fixed-version: Fixed from version 5.15" | ||
1211 | |||
1212 | CVE_STATUS[CVE-2021-47496] = "fixed-version: Fixed from version 5.15" | ||
1213 | |||
1214 | CVE_STATUS[CVE-2021-47497] = "fixed-version: Fixed from version 5.15" | ||
1215 | |||
1216 | CVE_STATUS[CVE-2021-47498] = "fixed-version: Fixed from version 5.15" | ||
1217 | |||
1218 | CVE_STATUS[CVE-2021-47499] = "fixed-version: Fixed from version 5.16" | ||
1219 | |||
1220 | CVE_STATUS[CVE-2021-47500] = "fixed-version: Fixed from version 5.16" | ||
1221 | |||
1222 | CVE_STATUS[CVE-2021-47501] = "fixed-version: Fixed from version 5.16" | ||
1223 | |||
1224 | CVE_STATUS[CVE-2021-47502] = "fixed-version: Fixed from version 5.16" | ||
1225 | |||
1226 | CVE_STATUS[CVE-2021-47503] = "fixed-version: Fixed from version 5.16" | ||
1227 | |||
1228 | CVE_STATUS[CVE-2021-47504] = "fixed-version: Fixed from version 5.16" | ||
1229 | |||
1230 | CVE_STATUS[CVE-2021-47505] = "fixed-version: Fixed from version 5.16" | ||
1231 | |||
1232 | CVE_STATUS[CVE-2021-47506] = "fixed-version: Fixed from version 5.16" | ||
1233 | |||
1234 | CVE_STATUS[CVE-2021-47507] = "fixed-version: Fixed from version 5.16" | ||
1235 | |||
1236 | CVE_STATUS[CVE-2021-47508] = "fixed-version: Fixed from version 5.16" | ||
1237 | |||
1238 | CVE_STATUS[CVE-2021-47509] = "fixed-version: Fixed from version 5.16" | ||
1239 | |||
1240 | CVE_STATUS[CVE-2021-47510] = "fixed-version: Fixed from version 5.16" | ||
1241 | |||
1242 | CVE_STATUS[CVE-2021-47511] = "fixed-version: Fixed from version 5.16" | ||
1243 | |||
1244 | CVE_STATUS[CVE-2021-47512] = "fixed-version: Fixed from version 5.16" | ||
1245 | |||
1246 | CVE_STATUS[CVE-2021-47513] = "fixed-version: Fixed from version 5.16" | ||
1247 | |||
1248 | CVE_STATUS[CVE-2021-47514] = "fixed-version: Fixed from version 5.16" | ||
1249 | |||
1250 | CVE_STATUS[CVE-2021-47515] = "fixed-version: Fixed from version 5.16" | ||
1251 | |||
1252 | CVE_STATUS[CVE-2021-47516] = "fixed-version: Fixed from version 5.16" | ||
1253 | |||
1254 | CVE_STATUS[CVE-2021-47517] = "fixed-version: Fixed from version 5.16" | ||
1255 | |||
1256 | CVE_STATUS[CVE-2021-47518] = "fixed-version: Fixed from version 5.16" | ||
1257 | |||
1258 | CVE_STATUS[CVE-2021-47519] = "fixed-version: Fixed from version 5.16" | ||
1259 | |||
1260 | CVE_STATUS[CVE-2021-47520] = "fixed-version: Fixed from version 5.16" | ||
1261 | |||
1262 | CVE_STATUS[CVE-2021-47521] = "fixed-version: Fixed from version 5.16" | ||
1263 | |||
1264 | CVE_STATUS[CVE-2021-47522] = "fixed-version: Fixed from version 5.16" | ||
1265 | |||
1266 | CVE_STATUS[CVE-2021-47523] = "fixed-version: Fixed from version 5.16" | ||
1267 | |||
1268 | CVE_STATUS[CVE-2021-47524] = "fixed-version: Fixed from version 5.16" | ||
1269 | |||
1270 | CVE_STATUS[CVE-2021-47525] = "fixed-version: Fixed from version 5.16" | ||
1271 | |||
1272 | CVE_STATUS[CVE-2021-47526] = "fixed-version: Fixed from version 5.16" | ||
1273 | |||
1274 | CVE_STATUS[CVE-2021-47527] = "fixed-version: Fixed from version 5.16" | ||
1275 | |||
1276 | CVE_STATUS[CVE-2021-47528] = "fixed-version: Fixed from version 5.16" | ||
1277 | |||
1278 | CVE_STATUS[CVE-2021-47529] = "fixed-version: Fixed from version 5.16" | ||
1279 | |||
1280 | CVE_STATUS[CVE-2021-47530] = "fixed-version: Fixed from version 5.16" | ||
1281 | |||
1282 | CVE_STATUS[CVE-2021-47531] = "fixed-version: Fixed from version 5.16" | ||
1283 | |||
1284 | CVE_STATUS[CVE-2021-47532] = "fixed-version: Fixed from version 5.16" | ||
1285 | |||
1286 | CVE_STATUS[CVE-2021-47533] = "fixed-version: Fixed from version 5.16" | ||
1287 | |||
1288 | CVE_STATUS[CVE-2021-47534] = "fixed-version: Fixed from version 5.16" | ||
1289 | |||
1290 | CVE_STATUS[CVE-2021-47535] = "fixed-version: Fixed from version 5.16" | ||
1291 | |||
1292 | CVE_STATUS[CVE-2021-47536] = "fixed-version: Fixed from version 5.16" | ||
1293 | |||
1294 | CVE_STATUS[CVE-2021-47537] = "fixed-version: Fixed from version 5.16" | ||
1295 | |||
1296 | CVE_STATUS[CVE-2021-47538] = "fixed-version: Fixed from version 5.16" | ||
1297 | |||
1298 | CVE_STATUS[CVE-2021-47539] = "fixed-version: Fixed from version 5.16" | ||
1299 | |||
1300 | CVE_STATUS[CVE-2021-47540] = "fixed-version: Fixed from version 5.16" | ||
1301 | |||
1302 | CVE_STATUS[CVE-2021-47541] = "fixed-version: Fixed from version 5.16" | ||
1303 | |||
1304 | CVE_STATUS[CVE-2021-47542] = "fixed-version: Fixed from version 5.16" | ||
1305 | |||
1306 | CVE_STATUS[CVE-2021-47544] = "fixed-version: Fixed from version 5.16" | ||
1307 | |||
1308 | CVE_STATUS[CVE-2021-47546] = "fixed-version: Fixed from version 5.16" | ||
1309 | |||
1310 | CVE_STATUS[CVE-2021-47547] = "fixed-version: Fixed from version 5.16" | ||
1311 | |||
1312 | CVE_STATUS[CVE-2021-47548] = "fixed-version: Fixed from version 5.16" | ||
1313 | |||
1314 | CVE_STATUS[CVE-2021-47549] = "fixed-version: Fixed from version 5.16" | ||
1315 | |||
1316 | CVE_STATUS[CVE-2021-47550] = "fixed-version: Fixed from version 5.16" | ||
1317 | |||
1318 | CVE_STATUS[CVE-2021-47551] = "fixed-version: Fixed from version 5.16" | ||
1319 | |||
1320 | CVE_STATUS[CVE-2021-47552] = "fixed-version: Fixed from version 5.16" | ||
1321 | |||
1322 | CVE_STATUS[CVE-2021-47553] = "fixed-version: Fixed from version 5.16" | ||
1323 | |||
1324 | CVE_STATUS[CVE-2021-47554] = "fixed-version: Fixed from version 5.16" | ||
1325 | |||
1326 | CVE_STATUS[CVE-2021-47555] = "fixed-version: Fixed from version 5.15.6" | ||
1327 | |||
1328 | CVE_STATUS[CVE-2021-47556] = "fixed-version: Fixed from version 5.16" | ||
1329 | |||
1330 | CVE_STATUS[CVE-2021-47557] = "fixed-version: Fixed from version 5.16" | ||
1331 | |||
1332 | CVE_STATUS[CVE-2021-47558] = "fixed-version: Fixed from version 5.16" | ||
1333 | |||
1334 | CVE_STATUS[CVE-2021-47559] = "fixed-version: Fixed from version 5.16" | ||
1335 | |||
1336 | CVE_STATUS[CVE-2021-47560] = "fixed-version: Fixed from version 5.16" | ||
1337 | |||
1338 | CVE_STATUS[CVE-2021-47561] = "fixed-version: Fixed from version 5.16" | ||
1339 | |||
1340 | CVE_STATUS[CVE-2021-47562] = "fixed-version: Fixed from version 5.16" | ||
1341 | |||
1342 | CVE_STATUS[CVE-2021-47563] = "fixed-version: Fixed from version 5.16" | ||
1343 | |||
1344 | CVE_STATUS[CVE-2021-47564] = "fixed-version: Fixed from version 5.16" | ||
1345 | |||
1346 | CVE_STATUS[CVE-2021-47565] = "fixed-version: Fixed from version 5.16" | ||
1347 | |||
1348 | CVE_STATUS[CVE-2021-47566] = "fixed-version: Fixed from version 5.16" | ||
1349 | |||
1350 | CVE_STATUS[CVE-2021-47567] = "fixed-version: Fixed from version 5.16" | ||
1351 | |||
1352 | CVE_STATUS[CVE-2021-47568] = "fixed-version: Fixed from version 5.16" | ||
1353 | |||
1354 | CVE_STATUS[CVE-2021-47569] = "fixed-version: Fixed from version 5.16" | ||
1355 | |||
1356 | CVE_STATUS[CVE-2021-47570] = "fixed-version: Fixed from version 5.16" | ||
1357 | |||
1358 | CVE_STATUS[CVE-2021-47571] = "fixed-version: Fixed from version 5.16" | ||
1359 | |||
1360 | CVE_STATUS[CVE-2021-47572] = "fixed-version: Fixed from version 5.16" | ||
1361 | |||
1362 | CVE_STATUS[CVE-2021-47576] = "fixed-version: Fixed from version 5.16" | ||
1363 | |||
1364 | CVE_STATUS[CVE-2021-47577] = "fixed-version: Fixed from version 5.16" | ||
1365 | |||
1366 | CVE_STATUS[CVE-2021-47578] = "fixed-version: Fixed from version 5.16" | ||
1367 | |||
1368 | CVE_STATUS[CVE-2021-47579] = "fixed-version: Fixed from version 5.16" | ||
1369 | |||
1370 | CVE_STATUS[CVE-2021-47580] = "fixed-version: Fixed from version 5.16" | ||
1371 | |||
1372 | CVE_STATUS[CVE-2021-47582] = "fixed-version: Fixed from version 5.16" | ||
1373 | |||
1374 | CVE_STATUS[CVE-2021-47583] = "fixed-version: Fixed from version 5.16" | ||
1375 | |||
1376 | CVE_STATUS[CVE-2021-47584] = "fixed-version: Fixed from version 5.16" | ||
1377 | |||
1378 | CVE_STATUS[CVE-2021-47585] = "fixed-version: Fixed from version 5.16" | ||
1379 | |||
1380 | CVE_STATUS[CVE-2021-47586] = "fixed-version: Fixed from version 5.16" | ||
1381 | |||
1382 | CVE_STATUS[CVE-2021-47587] = "fixed-version: Fixed from version 5.16" | ||
1383 | |||
1384 | CVE_STATUS[CVE-2021-47588] = "fixed-version: Fixed from version 5.16" | ||
1385 | |||
1386 | CVE_STATUS[CVE-2021-47589] = "fixed-version: Fixed from version 5.16" | ||
1387 | |||
1388 | CVE_STATUS[CVE-2021-47590] = "fixed-version: Fixed from version 5.16" | ||
1389 | |||
1390 | CVE_STATUS[CVE-2021-47591] = "fixed-version: Fixed from version 5.16" | ||
1391 | |||
1392 | CVE_STATUS[CVE-2021-47592] = "fixed-version: Fixed from version 5.16" | ||
1393 | |||
1394 | CVE_STATUS[CVE-2021-47593] = "fixed-version: Fixed from version 5.16" | ||
1395 | |||
1396 | CVE_STATUS[CVE-2021-47594] = "fixed-version: Fixed from version 5.16" | ||
1397 | |||
1398 | CVE_STATUS[CVE-2021-47595] = "fixed-version: Fixed from version 5.15.11" | ||
1399 | |||
1400 | CVE_STATUS[CVE-2021-47596] = "fixed-version: Fixed from version 5.16" | ||
1401 | |||
1402 | CVE_STATUS[CVE-2021-47597] = "fixed-version: Fixed from version 5.16" | ||
1403 | |||
1404 | CVE_STATUS[CVE-2021-47598] = "fixed-version: Fixed from version 5.16" | ||
1405 | |||
1406 | CVE_STATUS[CVE-2021-47599] = "fixed-version: Fixed from version 5.16" | ||
1407 | |||
1408 | CVE_STATUS[CVE-2021-47600] = "fixed-version: Fixed from version 5.16" | ||
1409 | |||
1410 | CVE_STATUS[CVE-2021-47601] = "fixed-version: Fixed from version 5.16" | ||
1411 | |||
1412 | CVE_STATUS[CVE-2021-47602] = "fixed-version: Fixed from version 5.16" | ||
1413 | |||
1414 | CVE_STATUS[CVE-2021-47603] = "fixed-version: Fixed from version 5.16" | ||
1415 | |||
1416 | CVE_STATUS[CVE-2021-47604] = "fixed-version: Fixed from version 5.16" | ||
1417 | |||
1418 | CVE_STATUS[CVE-2021-47605] = "fixed-version: Fixed from version 5.16" | ||
1419 | |||
1420 | CVE_STATUS[CVE-2021-47606] = "fixed-version: Fixed from version 5.16" | ||
1421 | |||
1422 | CVE_STATUS[CVE-2021-47607] = "fixed-version: Fixed from version 5.16" | ||
1423 | |||
1424 | CVE_STATUS[CVE-2021-47608] = "fixed-version: Fixed from version 5.16" | ||
1425 | |||
1426 | CVE_STATUS[CVE-2021-47609] = "fixed-version: Fixed from version 5.16" | ||
1427 | |||
1428 | CVE_STATUS[CVE-2021-47610] = "fixed-version: Fixed from version 5.16" | ||
1429 | |||
1430 | CVE_STATUS[CVE-2021-47611] = "fixed-version: Fixed from version 5.16" | ||
1431 | |||
1432 | CVE_STATUS[CVE-2021-47612] = "fixed-version: Fixed from version 5.16" | ||
1433 | |||
1434 | CVE_STATUS[CVE-2021-47613] = "fixed-version: Fixed from version 5.16" | ||
1435 | |||
1436 | CVE_STATUS[CVE-2021-47614] = "fixed-version: Fixed from version 5.16" | ||
1437 | |||
1438 | CVE_STATUS[CVE-2021-47616] = "fixed-version: Fixed from version 5.16" | ||
1439 | |||
1440 | CVE_STATUS[CVE-2021-47617] = "fixed-version: Fixed from version 5.17" | ||
1441 | |||
1442 | CVE_STATUS[CVE-2021-47618] = "fixed-version: Fixed from version 5.17" | ||
1443 | |||
1444 | CVE_STATUS[CVE-2021-47619] = "fixed-version: Fixed from version 5.17" | ||
1445 | |||
1446 | CVE_STATUS[CVE-2021-47620] = "fixed-version: Fixed from version 5.17" | ||
1447 | |||
1448 | CVE_STATUS[CVE-2021-47622] = "fixed-version: Fixed from version 5.17" | ||
1449 | |||
1450 | CVE_STATUS[CVE-2021-47623] = "fixed-version: Fixed from version 5.17" | ||
1451 | |||
1452 | CVE_STATUS[CVE-2021-47624] = "fixed-version: Fixed from version 5.17" | ||
1453 | |||
1454 | CVE_STATUS[CVE-2021-47631] = "fixed-version: Fixed from version 5.18" | ||
1455 | |||
1456 | CVE_STATUS[CVE-2021-47632] = "fixed-version: Fixed from version 5.18" | ||
1457 | |||
1458 | CVE_STATUS[CVE-2021-47633] = "fixed-version: Fixed from version 5.18" | ||
1459 | |||
1460 | CVE_STATUS[CVE-2021-47634] = "fixed-version: Fixed from version 5.18" | ||
1461 | |||
1462 | CVE_STATUS[CVE-2021-47635] = "fixed-version: Fixed from version 5.18" | ||
1463 | |||
1464 | CVE_STATUS[CVE-2021-47636] = "fixed-version: Fixed from version 5.18" | ||
1465 | |||
1466 | CVE_STATUS[CVE-2021-47637] = "fixed-version: Fixed from version 5.18" | ||
1467 | |||
1468 | CVE_STATUS[CVE-2021-47638] = "fixed-version: Fixed from version 5.18" | ||
1469 | |||
1470 | CVE_STATUS[CVE-2021-47639] = "fixed-version: Fixed from version 5.18" | ||
1471 | |||
1472 | CVE_STATUS[CVE-2021-47640] = "fixed-version: Fixed from version 5.18" | ||
1473 | |||
1474 | CVE_STATUS[CVE-2021-47641] = "fixed-version: Fixed from version 5.18" | ||
1475 | |||
1476 | CVE_STATUS[CVE-2021-47642] = "fixed-version: Fixed from version 5.18" | ||
1477 | |||
1478 | CVE_STATUS[CVE-2021-47643] = "fixed-version: Fixed from version 5.18" | ||
1479 | |||
1480 | CVE_STATUS[CVE-2021-47644] = "fixed-version: Fixed from version 5.18" | ||
1481 | |||
1482 | CVE_STATUS[CVE-2021-47645] = "fixed-version: Fixed from version 5.18" | ||
1483 | |||
1484 | CVE_STATUS[CVE-2021-47646] = "fixed-version: Fixed from version 5.18" | ||
1485 | |||
1486 | CVE_STATUS[CVE-2021-47647] = "fixed-version: Fixed from version 5.18" | ||
1487 | |||
1488 | CVE_STATUS[CVE-2021-47648] = "fixed-version: Fixed from version 5.18" | ||
1489 | |||
1490 | CVE_STATUS[CVE-2021-47649] = "fixed-version: Fixed from version 5.18" | ||
1491 | |||
1492 | CVE_STATUS[CVE-2021-47650] = "fixed-version: Fixed from version 5.18" | ||
1493 | |||
1494 | CVE_STATUS[CVE-2021-47651] = "fixed-version: Fixed from version 5.18" | ||
1495 | |||
1496 | CVE_STATUS[CVE-2021-47652] = "fixed-version: Fixed from version 5.18" | ||
1497 | |||
1498 | CVE_STATUS[CVE-2021-47653] = "fixed-version: Fixed from version 5.18" | ||
1499 | |||
1500 | CVE_STATUS[CVE-2021-47654] = "fixed-version: Fixed from version 5.18" | ||
1501 | |||
1502 | CVE_STATUS[CVE-2021-47655] = "fixed-version: Fixed from version 5.18" | ||
1503 | |||
1504 | CVE_STATUS[CVE-2021-47656] = "fixed-version: Fixed from version 5.18" | ||
1505 | |||
1506 | CVE_STATUS[CVE-2021-47657] = "fixed-version: Fixed from version 5.18" | ||
1507 | |||
1508 | CVE_STATUS[CVE-2021-47658] = "fixed-version: Fixed from version 5.17" | ||
1509 | |||
1510 | CVE_STATUS[CVE-2021-47659] = "fixed-version: Fixed from version 5.19" | ||
1511 | |||
1512 | CVE_STATUS[CVE-2021-47660] = "fixed-version: Fixed from version 5.19" | ||
1513 | |||
1514 | CVE_STATUS[CVE-2021-47668] = "fixed-version: Fixed from version 5.11" | ||
1515 | |||
1516 | CVE_STATUS[CVE-2021-47669] = "fixed-version: Fixed from version 5.11" | ||
1517 | |||
1518 | CVE_STATUS[CVE-2021-47670] = "fixed-version: Fixed from version 5.11" | ||
1519 | |||
1520 | CVE_STATUS[CVE-2021-47671] = "fixed-version: Fixed from version 5.16" | ||
1521 | |||
1522 | CVE_STATUS[CVE-2021-4439] = "fixed-version: Fixed from version 5.15" | ||
1523 | |||
1524 | CVE_STATUS[CVE-2021-4440] = "fixed-version: Fixed from version 5.10.218" | ||
1525 | |||
1526 | CVE_STATUS[CVE-2021-4441] = "fixed-version: Fixed from version 5.17" | ||
1527 | |||
1528 | CVE_STATUS[CVE-2021-4442] = "fixed-version: Fixed from version 5.12" | ||
1529 | |||
1530 | CVE_STATUS[CVE-2021-4453] = "fixed-version: Fixed from version 5.16" | ||
1531 | |||
1532 | CVE_STATUS[CVE-2021-4454] = "fixed-version: Fixed from version 6.2" | ||
1533 | |||
1534 | CVE_STATUS[CVE-2022-21546] = "fixed-version: Fixed from version 5.19" | ||
1535 | |||
1536 | # CVE-2022-26365 has no known resolution | ||
1537 | |||
1538 | # CVE-2022-33740 has no known resolution | ||
1539 | |||
1540 | # CVE-2022-33741 has no known resolution | ||
1541 | |||
1542 | # CVE-2022-33742 has no known resolution | ||
1543 | |||
1544 | # CVE-2022-33743 has no known resolution | ||
1545 | |||
1546 | # CVE-2022-33744 has no known resolution | ||
1547 | |||
1548 | # CVE-2022-3643 has no known resolution | ||
1549 | |||
1550 | # CVE-2022-42328 has no known resolution | ||
1551 | |||
1552 | # CVE-2022-42329 has no known resolution | ||
1553 | |||
1554 | CVE_STATUS[CVE-2022-48626] = "fixed-version: Fixed from version 5.17" | ||
1555 | |||
1556 | CVE_STATUS[CVE-2022-48627] = "fixed-version: Fixed from version 5.19" | ||
1557 | |||
1558 | CVE_STATUS[CVE-2022-48628] = "fixed-version: Fixed from version 6.6" | ||
1559 | |||
1560 | CVE_STATUS[CVE-2022-48629] = "fixed-version: Fixed from version 5.17" | ||
1561 | |||
1562 | CVE_STATUS[CVE-2022-48630] = "fixed-version: Fixed from version 5.18" | ||
1563 | |||
1564 | CVE_STATUS[CVE-2022-48631] = "fixed-version: Fixed from version 6.0" | ||
1565 | |||
1566 | CVE_STATUS[CVE-2022-48632] = "fixed-version: Fixed from version 6.0" | ||
1567 | |||
1568 | CVE_STATUS[CVE-2022-48633] = "fixed-version: Fixed from version 6.0" | ||
1569 | |||
1570 | CVE_STATUS[CVE-2022-48634] = "fixed-version: Fixed from version 6.0" | ||
1571 | |||
1572 | CVE_STATUS[CVE-2022-48635] = "fixed-version: Fixed from version 6.0" | ||
1573 | |||
1574 | CVE_STATUS[CVE-2022-48636] = "fixed-version: Fixed from version 6.0" | ||
1575 | |||
1576 | CVE_STATUS[CVE-2022-48637] = "fixed-version: Fixed from version 6.0" | ||
1577 | |||
1578 | CVE_STATUS[CVE-2022-48638] = "fixed-version: Fixed from version 6.0" | ||
1579 | |||
1580 | CVE_STATUS[CVE-2022-48639] = "fixed-version: Fixed from version 6.0" | ||
1581 | |||
1582 | CVE_STATUS[CVE-2022-48640] = "fixed-version: Fixed from version 6.0" | ||
1583 | |||
1584 | CVE_STATUS[CVE-2022-48641] = "fixed-version: Fixed from version 5.19.12" | ||
1585 | |||
1586 | CVE_STATUS[CVE-2022-48642] = "fixed-version: Fixed from version 6.0" | ||
1587 | |||
1588 | CVE_STATUS[CVE-2022-48643] = "fixed-version: Fixed from version 5.19.12" | ||
1589 | |||
1590 | CVE_STATUS[CVE-2022-48644] = "fixed-version: Fixed from version 6.0" | ||
1591 | |||
1592 | CVE_STATUS[CVE-2022-48645] = "fixed-version: Fixed from version 6.0" | ||
1593 | |||
1594 | CVE_STATUS[CVE-2022-48646] = "fixed-version: Fixed from version 6.0" | ||
1595 | |||
1596 | CVE_STATUS[CVE-2022-48647] = "fixed-version: Fixed from version 6.0" | ||
1597 | |||
1598 | CVE_STATUS[CVE-2022-48648] = "fixed-version: Fixed from version 6.0" | ||
1599 | |||
1600 | CVE_STATUS[CVE-2022-48649] = "fixed-version: Fixed from version 5.19.12" | ||
1601 | |||
1602 | CVE_STATUS[CVE-2022-48650] = "fixed-version: Fixed from version 6.0" | ||
1603 | |||
1604 | CVE_STATUS[CVE-2022-48651] = "fixed-version: Fixed from version 6.0" | ||
1605 | |||
1606 | CVE_STATUS[CVE-2022-48652] = "fixed-version: Fixed from version 6.0" | ||
1607 | |||
1608 | CVE_STATUS[CVE-2022-48653] = "fixed-version: Fixed from version 6.0" | ||
1609 | |||
1610 | CVE_STATUS[CVE-2022-48654] = "fixed-version: Fixed from version 6.0" | ||
1611 | |||
1612 | CVE_STATUS[CVE-2022-48655] = "fixed-version: Fixed from version 6.0" | ||
1613 | |||
1614 | CVE_STATUS[CVE-2022-48656] = "fixed-version: Fixed from version 6.0" | ||
1615 | |||
1616 | CVE_STATUS[CVE-2022-48657] = "fixed-version: Fixed from version 6.0" | ||
1617 | |||
1618 | CVE_STATUS[CVE-2022-48658] = "fixed-version: Fixed from version 6.0" | ||
1619 | |||
1620 | CVE_STATUS[CVE-2022-48659] = "fixed-version: Fixed from version 6.0" | ||
1621 | |||
1622 | CVE_STATUS[CVE-2022-48660] = "fixed-version: Fixed from version 6.0" | ||
1623 | |||
1624 | CVE_STATUS[CVE-2022-48661] = "fixed-version: Fixed from version 6.0" | ||
1625 | |||
1626 | CVE_STATUS[CVE-2022-48662] = "fixed-version: Fixed from version 6.0" | ||
1627 | |||
1628 | CVE_STATUS[CVE-2022-48663] = "fixed-version: Fixed from version 5.19.12" | ||
1629 | |||
1630 | CVE_STATUS[CVE-2022-48664] = "fixed-version: Fixed from version 6.0" | ||
1631 | |||
1632 | CVE_STATUS[CVE-2022-48665] = "fixed-version: Fixed from version 6.0" | ||
1633 | |||
1634 | CVE_STATUS[CVE-2022-48666] = "fixed-version: Fixed from version 6.0" | ||
1635 | |||
1636 | CVE_STATUS[CVE-2022-48667] = "fixed-version: Fixed from version 6.0" | ||
1637 | |||
1638 | CVE_STATUS[CVE-2022-48668] = "fixed-version: Fixed from version 6.0" | ||
1639 | |||
1640 | CVE_STATUS[CVE-2022-48669] = "fixed-version: Fixed from version 6.9" | ||
1641 | |||
1642 | CVE_STATUS[CVE-2022-48670] = "fixed-version: Fixed from version 6.0" | ||
1643 | |||
1644 | CVE_STATUS[CVE-2022-48671] = "fixed-version: Fixed from version 5.19.11" | ||
1645 | |||
1646 | CVE_STATUS[CVE-2022-48672] = "fixed-version: Fixed from version 6.0" | ||
1647 | |||
1648 | CVE_STATUS[CVE-2022-48673] = "fixed-version: Fixed from version 6.0" | ||
1649 | |||
1650 | CVE_STATUS[CVE-2022-48674] = "fixed-version: Fixed from version 6.0" | ||
1651 | |||
1652 | CVE_STATUS[CVE-2022-48675] = "fixed-version: Fixed from version 6.0" | ||
1653 | |||
1654 | CVE_STATUS[CVE-2022-48686] = "fixed-version: Fixed from version 6.0" | ||
1655 | |||
1656 | CVE_STATUS[CVE-2022-48687] = "fixed-version: Fixed from version 6.0" | ||
1657 | |||
1658 | CVE_STATUS[CVE-2022-48688] = "fixed-version: Fixed from version 6.0" | ||
1659 | |||
1660 | CVE_STATUS[CVE-2022-48689] = "fixed-version: Fixed from version 6.0" | ||
1661 | |||
1662 | CVE_STATUS[CVE-2022-48690] = "fixed-version: Fixed from version 6.0" | ||
1663 | |||
1664 | CVE_STATUS[CVE-2022-48691] = "fixed-version: Fixed from version 6.0" | ||
1665 | |||
1666 | CVE_STATUS[CVE-2022-48692] = "fixed-version: Fixed from version 6.0" | ||
1667 | |||
1668 | CVE_STATUS[CVE-2022-48693] = "fixed-version: Fixed from version 6.0" | ||
1669 | |||
1670 | CVE_STATUS[CVE-2022-48694] = "fixed-version: Fixed from version 6.0" | ||
1671 | |||
1672 | CVE_STATUS[CVE-2022-48695] = "fixed-version: Fixed from version 6.0" | ||
1673 | |||
1674 | CVE_STATUS[CVE-2022-48696] = "fixed-version: Fixed from version 6.0" | ||
1675 | |||
1676 | CVE_STATUS[CVE-2022-48697] = "fixed-version: Fixed from version 6.0" | ||
1677 | |||
1678 | CVE_STATUS[CVE-2022-48698] = "fixed-version: Fixed from version 6.0" | ||
1679 | |||
1680 | CVE_STATUS[CVE-2022-48699] = "fixed-version: Fixed from version 6.0" | ||
1681 | |||
1682 | CVE_STATUS[CVE-2022-48701] = "fixed-version: Fixed from version 6.0" | ||
1683 | |||
1684 | CVE_STATUS[CVE-2022-48702] = "fixed-version: Fixed from version 6.0" | ||
1685 | |||
1686 | CVE_STATUS[CVE-2022-48703] = "fixed-version: Fixed from version 6.0" | ||
1687 | |||
1688 | CVE_STATUS[CVE-2022-48704] = "fixed-version: Fixed from version 6.0" | ||
1689 | |||
1690 | CVE_STATUS[CVE-2022-48705] = "fixed-version: Fixed from version 6.0" | ||
1691 | |||
1692 | CVE_STATUS[CVE-2022-48706] = "fixed-version: Fixed from version 6.2" | ||
1693 | |||
1694 | CVE_STATUS[CVE-2022-48707] = "fixed-version: Fixed from version 6.2" | ||
1695 | |||
1696 | CVE_STATUS[CVE-2022-48708] = "fixed-version: Fixed from version 6.2" | ||
1697 | |||
1698 | CVE_STATUS[CVE-2022-48709] = "fixed-version: Fixed from version 6.2" | ||
1699 | |||
1700 | CVE_STATUS[CVE-2022-48710] = "fixed-version: Fixed from version 5.19" | ||
1701 | |||
1702 | CVE_STATUS[CVE-2022-48711] = "fixed-version: Fixed from version 5.17" | ||
1703 | |||
1704 | CVE_STATUS[CVE-2022-48712] = "fixed-version: Fixed from version 5.17" | ||
1705 | |||
1706 | CVE_STATUS[CVE-2022-48713] = "fixed-version: Fixed from version 5.17" | ||
1707 | |||
1708 | CVE_STATUS[CVE-2022-48714] = "fixed-version: Fixed from version 5.17" | ||
1709 | |||
1710 | CVE_STATUS[CVE-2022-48715] = "fixed-version: Fixed from version 5.17" | ||
1711 | |||
1712 | CVE_STATUS[CVE-2022-48716] = "fixed-version: Fixed from version 5.17" | ||
1713 | |||
1714 | CVE_STATUS[CVE-2022-48717] = "fixed-version: Fixed from version 5.17" | ||
1715 | |||
1716 | CVE_STATUS[CVE-2022-48718] = "fixed-version: Fixed from version 5.17" | ||
1717 | |||
1718 | CVE_STATUS[CVE-2022-48719] = "fixed-version: Fixed from version 5.17" | ||
1719 | |||
1720 | CVE_STATUS[CVE-2022-48720] = "fixed-version: Fixed from version 5.17" | ||
1721 | |||
1722 | CVE_STATUS[CVE-2022-48721] = "fixed-version: Fixed from version 5.17" | ||
1723 | |||
1724 | CVE_STATUS[CVE-2022-48722] = "fixed-version: Fixed from version 5.17" | ||
1725 | |||
1726 | CVE_STATUS[CVE-2022-48723] = "fixed-version: Fixed from version 5.17" | ||
1727 | |||
1728 | CVE_STATUS[CVE-2022-48724] = "fixed-version: Fixed from version 5.17" | ||
1729 | |||
1730 | CVE_STATUS[CVE-2022-48725] = "fixed-version: Fixed from version 5.17" | ||
1731 | |||
1732 | CVE_STATUS[CVE-2022-48726] = "fixed-version: Fixed from version 5.17" | ||
1733 | |||
1734 | CVE_STATUS[CVE-2022-48727] = "fixed-version: Fixed from version 5.17" | ||
1735 | |||
1736 | CVE_STATUS[CVE-2022-48728] = "fixed-version: Fixed from version 5.17" | ||
1737 | |||
1738 | CVE_STATUS[CVE-2022-48729] = "fixed-version: Fixed from version 5.17" | ||
1739 | |||
1740 | CVE_STATUS[CVE-2022-48730] = "fixed-version: Fixed from version 5.17" | ||
1741 | |||
1742 | CVE_STATUS[CVE-2022-48731] = "fixed-version: Fixed from version 5.17" | ||
1743 | |||
1744 | CVE_STATUS[CVE-2022-48732] = "fixed-version: Fixed from version 5.17" | ||
1745 | |||
1746 | CVE_STATUS[CVE-2022-48733] = "fixed-version: Fixed from version 5.17" | ||
1747 | |||
1748 | CVE_STATUS[CVE-2022-48734] = "fixed-version: Fixed from version 5.17" | ||
1749 | |||
1750 | CVE_STATUS[CVE-2022-48735] = "fixed-version: Fixed from version 5.17" | ||
1751 | |||
1752 | CVE_STATUS[CVE-2022-48738] = "fixed-version: Fixed from version 5.17" | ||
1753 | |||
1754 | CVE_STATUS[CVE-2022-48739] = "fixed-version: Fixed from version 5.17" | ||
1755 | |||
1756 | CVE_STATUS[CVE-2022-48740] = "fixed-version: Fixed from version 5.17" | ||
1757 | |||
1758 | CVE_STATUS[CVE-2022-48741] = "fixed-version: Fixed from version 5.17" | ||
1759 | |||
1760 | CVE_STATUS[CVE-2022-48742] = "fixed-version: Fixed from version 5.17" | ||
1761 | |||
1762 | CVE_STATUS[CVE-2022-48743] = "fixed-version: Fixed from version 5.17" | ||
1763 | |||
1764 | CVE_STATUS[CVE-2022-48744] = "fixed-version: Fixed from version 5.17" | ||
1765 | |||
1766 | CVE_STATUS[CVE-2022-48745] = "fixed-version: Fixed from version 5.17" | ||
1767 | |||
1768 | CVE_STATUS[CVE-2022-48746] = "fixed-version: Fixed from version 5.17" | ||
1769 | |||
1770 | CVE_STATUS[CVE-2022-48747] = "fixed-version: Fixed from version 5.17" | ||
1771 | |||
1772 | CVE_STATUS[CVE-2022-48748] = "fixed-version: Fixed from version 5.17" | ||
1773 | |||
1774 | CVE_STATUS[CVE-2022-48749] = "fixed-version: Fixed from version 5.17" | ||
1775 | |||
1776 | CVE_STATUS[CVE-2022-48750] = "fixed-version: Fixed from version 5.17" | ||
1777 | |||
1778 | CVE_STATUS[CVE-2022-48751] = "fixed-version: Fixed from version 5.17" | ||
1779 | |||
1780 | CVE_STATUS[CVE-2022-48752] = "fixed-version: Fixed from version 5.16.5" | ||
1781 | |||
1782 | CVE_STATUS[CVE-2022-48753] = "fixed-version: Fixed from version 5.17" | ||
1783 | |||
1784 | CVE_STATUS[CVE-2022-48754] = "fixed-version: Fixed from version 5.17" | ||
1785 | |||
1786 | CVE_STATUS[CVE-2022-48755] = "fixed-version: Fixed from version 5.17" | ||
1787 | |||
1788 | CVE_STATUS[CVE-2022-48756] = "fixed-version: Fixed from version 5.17" | ||
1789 | |||
1790 | CVE_STATUS[CVE-2022-48757] = "fixed-version: Fixed from version 5.17" | ||
1791 | |||
1792 | CVE_STATUS[CVE-2022-48758] = "fixed-version: Fixed from version 5.17" | ||
1793 | |||
1794 | CVE_STATUS[CVE-2022-48759] = "fixed-version: Fixed from version 5.17" | ||
1795 | |||
1796 | CVE_STATUS[CVE-2022-48760] = "fixed-version: Fixed from version 5.17" | ||
1797 | |||
1798 | CVE_STATUS[CVE-2022-48761] = "fixed-version: Fixed from version 5.17" | ||
1799 | |||
1800 | CVE_STATUS[CVE-2022-48762] = "fixed-version: Fixed from version 5.17" | ||
1801 | |||
1802 | CVE_STATUS[CVE-2022-48763] = "fixed-version: Fixed from version 5.17" | ||
1803 | |||
1804 | CVE_STATUS[CVE-2022-48764] = "fixed-version: Fixed from version 5.16.5" | ||
1805 | |||
1806 | CVE_STATUS[CVE-2022-48765] = "fixed-version: Fixed from version 5.17" | ||
1807 | |||
1808 | CVE_STATUS[CVE-2022-48766] = "fixed-version: Fixed from version 5.17" | ||
1809 | |||
1810 | CVE_STATUS[CVE-2022-48767] = "fixed-version: Fixed from version 5.17" | ||
1811 | |||
1812 | CVE_STATUS[CVE-2022-48768] = "fixed-version: Fixed from version 5.17" | ||
1813 | |||
1814 | CVE_STATUS[CVE-2022-48769] = "fixed-version: Fixed from version 5.17" | ||
1815 | |||
1816 | CVE_STATUS[CVE-2022-48770] = "fixed-version: Fixed from version 5.17" | ||
1817 | |||
1818 | CVE_STATUS[CVE-2022-48771] = "fixed-version: Fixed from version 5.17" | ||
1819 | |||
1820 | CVE_STATUS[CVE-2022-48772] = "fixed-version: Fixed from version 6.10" | ||
1821 | |||
1822 | CVE_STATUS[CVE-2022-48773] = "fixed-version: Fixed from version 5.17" | ||
1823 | |||
1824 | CVE_STATUS[CVE-2022-48774] = "fixed-version: Fixed from version 5.17" | ||
1825 | |||
1826 | CVE_STATUS[CVE-2022-48775] = "fixed-version: Fixed from version 5.17" | ||
1827 | |||
1828 | CVE_STATUS[CVE-2022-48776] = "fixed-version: Fixed from version 5.17" | ||
1829 | |||
1830 | CVE_STATUS[CVE-2022-48777] = "fixed-version: Fixed from version 5.17" | ||
1831 | |||
1832 | CVE_STATUS[CVE-2022-48778] = "fixed-version: Fixed from version 5.16.11" | ||
1833 | |||
1834 | CVE_STATUS[CVE-2022-48779] = "fixed-version: Fixed from version 5.17" | ||
1835 | |||
1836 | CVE_STATUS[CVE-2022-48780] = "fixed-version: Fixed from version 5.16.11" | ||
1837 | |||
1838 | CVE_STATUS[CVE-2022-48781] = "fixed-version: Fixed from version 5.17" | ||
1839 | |||
1840 | CVE_STATUS[CVE-2022-48782] = "fixed-version: Fixed from version 5.17" | ||
1841 | |||
1842 | CVE_STATUS[CVE-2022-48783] = "fixed-version: Fixed from version 5.16.11" | ||
1843 | |||
1844 | CVE_STATUS[CVE-2022-48784] = "fixed-version: Fixed from version 5.17" | ||
1845 | |||
1846 | CVE_STATUS[CVE-2022-48785] = "fixed-version: Fixed from version 5.17" | ||
1847 | |||
1848 | CVE_STATUS[CVE-2022-48786] = "fixed-version: Fixed from version 5.17" | ||
1849 | |||
1850 | CVE_STATUS[CVE-2022-48787] = "fixed-version: Fixed from version 5.16.11" | ||
1851 | |||
1852 | CVE_STATUS[CVE-2022-48788] = "fixed-version: Fixed from version 5.17" | ||
1853 | |||
1854 | CVE_STATUS[CVE-2022-48789] = "fixed-version: Fixed from version 5.17" | ||
1855 | |||
1856 | CVE_STATUS[CVE-2022-48790] = "fixed-version: Fixed from version 5.17" | ||
1857 | |||
1858 | CVE_STATUS[CVE-2022-48791] = "fixed-version: Fixed from version 5.17" | ||
1859 | |||
1860 | CVE_STATUS[CVE-2022-48792] = "fixed-version: Fixed from version 5.17" | ||
1861 | |||
1862 | CVE_STATUS[CVE-2022-48793] = "fixed-version: Fixed from version 5.17" | ||
1863 | |||
1864 | CVE_STATUS[CVE-2022-48794] = "fixed-version: Fixed from version 5.17" | ||
1865 | |||
1866 | CVE_STATUS[CVE-2022-48795] = "fixed-version: Fixed from version 5.17" | ||
1867 | |||
1868 | CVE_STATUS[CVE-2022-48796] = "fixed-version: Fixed from version 5.17" | ||
1869 | |||
1870 | CVE_STATUS[CVE-2022-48797] = "fixed-version: Fixed from version 5.17" | ||
1871 | |||
1872 | CVE_STATUS[CVE-2022-48798] = "fixed-version: Fixed from version 5.17" | ||
1873 | |||
1874 | CVE_STATUS[CVE-2022-48799] = "fixed-version: Fixed from version 5.17" | ||
1875 | |||
1876 | CVE_STATUS[CVE-2022-48800] = "fixed-version: Fixed from version 5.17" | ||
1877 | |||
1878 | CVE_STATUS[CVE-2022-48801] = "fixed-version: Fixed from version 5.17" | ||
1879 | |||
1880 | CVE_STATUS[CVE-2022-48802] = "fixed-version: Fixed from version 5.17" | ||
1881 | |||
1882 | CVE_STATUS[CVE-2022-48803] = "fixed-version: Fixed from version 5.17" | ||
1883 | |||
1884 | CVE_STATUS[CVE-2022-48804] = "fixed-version: Fixed from version 5.17" | ||
1885 | |||
1886 | CVE_STATUS[CVE-2022-48805] = "fixed-version: Fixed from version 5.17" | ||
1887 | |||
1888 | CVE_STATUS[CVE-2022-48806] = "fixed-version: Fixed from version 5.16.10" | ||
1889 | |||
1890 | CVE_STATUS[CVE-2022-48807] = "fixed-version: Fixed from version 5.17" | ||
1891 | |||
1892 | CVE_STATUS[CVE-2022-48808] = "fixed-version: Fixed from version 5.17" | ||
1893 | |||
1894 | CVE_STATUS[CVE-2022-48809] = "fixed-version: Fixed from version 5.17" | ||
1895 | |||
1896 | CVE_STATUS[CVE-2022-48810] = "fixed-version: Fixed from version 5.17" | ||
1897 | |||
1898 | CVE_STATUS[CVE-2022-48811] = "fixed-version: Fixed from version 5.17" | ||
1899 | |||
1900 | CVE_STATUS[CVE-2022-48812] = "fixed-version: Fixed from version 5.17" | ||
1901 | |||
1902 | CVE_STATUS[CVE-2022-48813] = "fixed-version: Fixed from version 5.17" | ||
1903 | |||
1904 | CVE_STATUS[CVE-2022-48814] = "fixed-version: Fixed from version 5.17" | ||
1905 | |||
1906 | CVE_STATUS[CVE-2022-48815] = "fixed-version: Fixed from version 5.17" | ||
1907 | |||
1908 | CVE_STATUS[CVE-2022-48816] = "fixed-version: Fixed from version 5.17" | ||
1909 | |||
1910 | CVE_STATUS[CVE-2022-48817] = "fixed-version: Fixed from version 5.17" | ||
1911 | |||
1912 | CVE_STATUS[CVE-2022-48818] = "fixed-version: Fixed from version 5.17" | ||
1913 | |||
1914 | CVE_STATUS[CVE-2022-48819] = "fixed-version: Fixed from version 5.17" | ||
1915 | |||
1916 | CVE_STATUS[CVE-2022-48820] = "fixed-version: Fixed from version 5.17" | ||
1917 | |||
1918 | CVE_STATUS[CVE-2022-48821] = "fixed-version: Fixed from version 5.17" | ||
1919 | |||
1920 | CVE_STATUS[CVE-2022-48822] = "fixed-version: Fixed from version 5.17" | ||
1921 | |||
1922 | CVE_STATUS[CVE-2022-48823] = "fixed-version: Fixed from version 5.17" | ||
1923 | |||
1924 | CVE_STATUS[CVE-2022-48824] = "fixed-version: Fixed from version 5.17" | ||
1925 | |||
1926 | CVE_STATUS[CVE-2022-48825] = "fixed-version: Fixed from version 5.17" | ||
1927 | |||
1928 | CVE_STATUS[CVE-2022-48826] = "fixed-version: Fixed from version 5.17" | ||
1929 | |||
1930 | CVE_STATUS[CVE-2022-48827] = "fixed-version: Fixed from version 5.17" | ||
1931 | |||
1932 | CVE_STATUS[CVE-2022-48828] = "fixed-version: Fixed from version 5.17" | ||
1933 | |||
1934 | CVE_STATUS[CVE-2022-48829] = "fixed-version: Fixed from version 5.17" | ||
1935 | |||
1936 | CVE_STATUS[CVE-2022-48830] = "fixed-version: Fixed from version 5.17" | ||
1937 | |||
1938 | CVE_STATUS[CVE-2022-48831] = "fixed-version: Fixed from version 5.17" | ||
1939 | |||
1940 | CVE_STATUS[CVE-2022-48832] = "fixed-version: Fixed from version 5.17" | ||
1941 | |||
1942 | CVE_STATUS[CVE-2022-48833] = "fixed-version: Fixed from version 5.17" | ||
1943 | |||
1944 | CVE_STATUS[CVE-2022-48834] = "fixed-version: Fixed from version 5.17" | ||
1945 | |||
1946 | CVE_STATUS[CVE-2022-48835] = "fixed-version: Fixed from version 5.17" | ||
1947 | |||
1948 | CVE_STATUS[CVE-2022-48836] = "fixed-version: Fixed from version 5.17" | ||
1949 | |||
1950 | CVE_STATUS[CVE-2022-48837] = "fixed-version: Fixed from version 5.16.17" | ||
1951 | |||
1952 | CVE_STATUS[CVE-2022-48838] = "fixed-version: Fixed from version 5.17" | ||
1953 | |||
1954 | CVE_STATUS[CVE-2022-48839] = "fixed-version: Fixed from version 5.17" | ||
1955 | |||
1956 | CVE_STATUS[CVE-2022-48840] = "fixed-version: Fixed from version 5.16.17" | ||
1957 | |||
1958 | CVE_STATUS[CVE-2022-48841] = "fixed-version: Fixed from version 5.17" | ||
1959 | |||
1960 | CVE_STATUS[CVE-2022-48842] = "fixed-version: Fixed from version 5.16.16" | ||
1961 | |||
1962 | CVE_STATUS[CVE-2022-48843] = "fixed-version: Fixed from version 5.17" | ||
1963 | |||
1964 | CVE_STATUS[CVE-2022-48844] = "fixed-version: Fixed from version 5.17" | ||
1965 | |||
1966 | CVE_STATUS[CVE-2022-48845] = "fixed-version: Fixed from version 5.17" | ||
1967 | |||
1968 | CVE_STATUS[CVE-2022-48846] = "fixed-version: Fixed from version 5.17" | ||
1969 | |||
1970 | CVE_STATUS[CVE-2022-48847] = "fixed-version: Fixed from version 5.17" | ||
1971 | |||
1972 | CVE_STATUS[CVE-2022-48848] = "fixed-version: Fixed from version 5.17" | ||
1973 | |||
1974 | CVE_STATUS[CVE-2022-48849] = "fixed-version: Fixed from version 5.17" | ||
1975 | |||
1976 | CVE_STATUS[CVE-2022-48850] = "fixed-version: Fixed from version 5.17" | ||
1977 | |||
1978 | CVE_STATUS[CVE-2022-48851] = "fixed-version: Fixed from version 5.17" | ||
1979 | |||
1980 | CVE_STATUS[CVE-2022-48852] = "fixed-version: Fixed from version 5.17" | ||
1981 | |||
1982 | CVE_STATUS[CVE-2022-48853] = "fixed-version: Fixed from version 5.17" | ||
1983 | |||
1984 | CVE_STATUS[CVE-2022-48854] = "fixed-version: Fixed from version 5.17" | ||
1985 | |||
1986 | CVE_STATUS[CVE-2022-48855] = "fixed-version: Fixed from version 5.17" | ||
1987 | |||
1988 | CVE_STATUS[CVE-2022-48856] = "fixed-version: Fixed from version 5.17" | ||
1989 | |||
1990 | CVE_STATUS[CVE-2022-48857] = "fixed-version: Fixed from version 5.17" | ||
1991 | |||
1992 | CVE_STATUS[CVE-2022-48858] = "fixed-version: Fixed from version 5.17" | ||
1993 | |||
1994 | CVE_STATUS[CVE-2022-48859] = "fixed-version: Fixed from version 5.17" | ||
1995 | |||
1996 | CVE_STATUS[CVE-2022-48860] = "fixed-version: Fixed from version 5.17" | ||
1997 | |||
1998 | CVE_STATUS[CVE-2022-48861] = "fixed-version: Fixed from version 5.17" | ||
1999 | |||
2000 | CVE_STATUS[CVE-2022-48862] = "fixed-version: Fixed from version 5.17" | ||
2001 | |||
2002 | CVE_STATUS[CVE-2022-48863] = "fixed-version: Fixed from version 5.17" | ||
2003 | |||
2004 | CVE_STATUS[CVE-2022-48864] = "fixed-version: Fixed from version 5.17" | ||
2005 | |||
2006 | CVE_STATUS[CVE-2022-48865] = "fixed-version: Fixed from version 5.17" | ||
2007 | |||
2008 | CVE_STATUS[CVE-2022-48866] = "fixed-version: Fixed from version 5.17" | ||
2009 | |||
2010 | CVE_STATUS[CVE-2022-48867] = "fixed-version: Fixed from version 6.2" | ||
2011 | |||
2012 | CVE_STATUS[CVE-2022-48868] = "fixed-version: Fixed from version 6.2" | ||
2013 | |||
2014 | CVE_STATUS[CVE-2022-48869] = "fixed-version: Fixed from version 6.2" | ||
2015 | |||
2016 | CVE_STATUS[CVE-2022-48870] = "fixed-version: Fixed from version 6.2" | ||
2017 | |||
2018 | CVE_STATUS[CVE-2022-48871] = "fixed-version: Fixed from version 6.2" | ||
2019 | |||
2020 | CVE_STATUS[CVE-2022-48872] = "fixed-version: Fixed from version 6.2" | ||
2021 | |||
2022 | CVE_STATUS[CVE-2022-48873] = "fixed-version: Fixed from version 6.2" | ||
2023 | |||
2024 | CVE_STATUS[CVE-2022-48874] = "fixed-version: Fixed from version 6.2" | ||
2025 | |||
2026 | CVE_STATUS[CVE-2022-48875] = "fixed-version: Fixed from version 6.2" | ||
2027 | |||
2028 | CVE_STATUS[CVE-2022-48876] = "fixed-version: Fixed from version 6.2" | ||
2029 | |||
2030 | CVE_STATUS[CVE-2022-48877] = "fixed-version: Fixed from version 6.2" | ||
2031 | |||
2032 | CVE_STATUS[CVE-2022-48878] = "fixed-version: Fixed from version 6.2" | ||
2033 | |||
2034 | CVE_STATUS[CVE-2022-48879] = "fixed-version: Fixed from version 6.2" | ||
2035 | |||
2036 | CVE_STATUS[CVE-2022-48880] = "fixed-version: Fixed from version 6.2" | ||
2037 | |||
2038 | CVE_STATUS[CVE-2022-48881] = "fixed-version: Fixed from version 6.2" | ||
2039 | |||
2040 | CVE_STATUS[CVE-2022-48882] = "fixed-version: Fixed from version 6.2" | ||
2041 | |||
2042 | CVE_STATUS[CVE-2022-48883] = "fixed-version: Fixed from version 6.2" | ||
2043 | |||
2044 | CVE_STATUS[CVE-2022-48884] = "fixed-version: Fixed from version 6.2" | ||
2045 | |||
2046 | CVE_STATUS[CVE-2022-48885] = "fixed-version: Fixed from version 6.2" | ||
2047 | |||
2048 | CVE_STATUS[CVE-2022-48886] = "fixed-version: Fixed from version 6.2" | ||
2049 | |||
2050 | CVE_STATUS[CVE-2022-48887] = "fixed-version: Fixed from version 6.2" | ||
2051 | |||
2052 | CVE_STATUS[CVE-2022-48888] = "fixed-version: Fixed from version 6.2" | ||
2053 | |||
2054 | CVE_STATUS[CVE-2022-48889] = "fixed-version: Fixed from version 6.2" | ||
2055 | |||
2056 | CVE_STATUS[CVE-2022-48890] = "fixed-version: Fixed from version 6.2" | ||
2057 | |||
2058 | CVE_STATUS[CVE-2022-48891] = "fixed-version: Fixed from version 6.2" | ||
2059 | |||
2060 | CVE_STATUS[CVE-2022-48892] = "fixed-version: Fixed from version 6.2" | ||
2061 | |||
2062 | CVE_STATUS[CVE-2022-48893] = "fixed-version: Fixed from version 6.2" | ||
2063 | |||
2064 | CVE_STATUS[CVE-2022-48894] = "fixed-version: Fixed from version 6.2" | ||
2065 | |||
2066 | CVE_STATUS[CVE-2022-48895] = "fixed-version: Fixed from version 6.2" | ||
2067 | |||
2068 | CVE_STATUS[CVE-2022-48896] = "fixed-version: Fixed from version 6.2" | ||
2069 | |||
2070 | CVE_STATUS[CVE-2022-48897] = "fixed-version: Fixed from version 6.2" | ||
2071 | |||
2072 | CVE_STATUS[CVE-2022-48898] = "fixed-version: Fixed from version 6.2" | ||
2073 | |||
2074 | CVE_STATUS[CVE-2022-48899] = "fixed-version: Fixed from version 6.2" | ||
2075 | |||
2076 | CVE_STATUS[CVE-2022-48901] = "fixed-version: Fixed from version 5.17" | ||
2077 | |||
2078 | CVE_STATUS[CVE-2022-48902] = "fixed-version: Fixed from version 5.17" | ||
2079 | |||
2080 | CVE_STATUS[CVE-2022-48903] = "fixed-version: Fixed from version 5.17" | ||
2081 | |||
2082 | CVE_STATUS[CVE-2022-48904] = "fixed-version: Fixed from version 5.17" | ||
2083 | |||
2084 | CVE_STATUS[CVE-2022-48905] = "fixed-version: Fixed from version 5.17" | ||
2085 | |||
2086 | CVE_STATUS[CVE-2022-48906] = "fixed-version: Fixed from version 5.17" | ||
2087 | |||
2088 | CVE_STATUS[CVE-2022-48907] = "fixed-version: Fixed from version 5.17" | ||
2089 | |||
2090 | CVE_STATUS[CVE-2022-48908] = "fixed-version: Fixed from version 5.17" | ||
2091 | |||
2092 | CVE_STATUS[CVE-2022-48909] = "fixed-version: Fixed from version 5.17" | ||
2093 | |||
2094 | CVE_STATUS[CVE-2022-48910] = "fixed-version: Fixed from version 5.17" | ||
2095 | |||
2096 | CVE_STATUS[CVE-2022-48911] = "fixed-version: Fixed from version 5.17" | ||
2097 | |||
2098 | CVE_STATUS[CVE-2022-48912] = "fixed-version: Fixed from version 5.17" | ||
2099 | |||
2100 | CVE_STATUS[CVE-2022-48913] = "fixed-version: Fixed from version 5.17" | ||
2101 | |||
2102 | CVE_STATUS[CVE-2022-48914] = "fixed-version: Fixed from version 5.16.13" | ||
2103 | |||
2104 | CVE_STATUS[CVE-2022-48915] = "fixed-version: Fixed from version 5.17" | ||
2105 | |||
2106 | CVE_STATUS[CVE-2022-48916] = "fixed-version: Fixed from version 5.17" | ||
2107 | |||
2108 | CVE_STATUS[CVE-2022-48918] = "fixed-version: Fixed from version 5.17" | ||
2109 | |||
2110 | CVE_STATUS[CVE-2022-48919] = "fixed-version: Fixed from version 5.17" | ||
2111 | |||
2112 | CVE_STATUS[CVE-2022-48920] = "fixed-version: Fixed from version 5.17" | ||
2113 | |||
2114 | CVE_STATUS[CVE-2022-48921] = "fixed-version: Fixed from version 5.17" | ||
2115 | |||
2116 | CVE_STATUS[CVE-2022-48922] = "fixed-version: Fixed from version 5.17" | ||
2117 | |||
2118 | CVE_STATUS[CVE-2022-48923] = "fixed-version: Fixed from version 5.17" | ||
2119 | |||
2120 | CVE_STATUS[CVE-2022-48924] = "fixed-version: Fixed from version 5.17" | ||
2121 | |||
2122 | CVE_STATUS[CVE-2022-48925] = "fixed-version: Fixed from version 5.17" | ||
2123 | |||
2124 | CVE_STATUS[CVE-2022-48926] = "fixed-version: Fixed from version 5.17" | ||
2125 | |||
2126 | CVE_STATUS[CVE-2022-48927] = "fixed-version: Fixed from version 5.17" | ||
2127 | |||
2128 | CVE_STATUS[CVE-2022-48928] = "fixed-version: Fixed from version 5.17" | ||
2129 | |||
2130 | CVE_STATUS[CVE-2022-48929] = "fixed-version: Fixed from version 5.16.12" | ||
2131 | |||
2132 | CVE_STATUS[CVE-2022-48930] = "fixed-version: Fixed from version 5.17" | ||
2133 | |||
2134 | CVE_STATUS[CVE-2022-48931] = "fixed-version: Fixed from version 5.17" | ||
2135 | |||
2136 | CVE_STATUS[CVE-2022-48932] = "fixed-version: Fixed from version 5.17" | ||
2137 | |||
2138 | CVE_STATUS[CVE-2022-48933] = "fixed-version: Fixed from version 5.17" | ||
2139 | |||
2140 | CVE_STATUS[CVE-2022-48934] = "fixed-version: Fixed from version 5.17" | ||
2141 | |||
2142 | CVE_STATUS[CVE-2022-48935] = "fixed-version: Fixed from version 5.17" | ||
2143 | |||
2144 | CVE_STATUS[CVE-2022-48937] = "fixed-version: Fixed from version 5.17" | ||
2145 | |||
2146 | CVE_STATUS[CVE-2022-48938] = "fixed-version: Fixed from version 5.17" | ||
2147 | |||
2148 | CVE_STATUS[CVE-2022-48939] = "fixed-version: Fixed from version 5.17" | ||
2149 | |||
2150 | CVE_STATUS[CVE-2022-48940] = "fixed-version: Fixed from version 5.17" | ||
2151 | |||
2152 | CVE_STATUS[CVE-2022-48941] = "fixed-version: Fixed from version 5.17" | ||
2153 | |||
2154 | CVE_STATUS[CVE-2022-48942] = "fixed-version: Fixed from version 5.17" | ||
2155 | |||
2156 | CVE_STATUS[CVE-2022-48943] = "fixed-version: Fixed from version 5.17" | ||
2157 | |||
2158 | CVE_STATUS[CVE-2022-48944] = "fixed-version: Fixed from version 5.17" | ||
2159 | |||
2160 | CVE_STATUS[CVE-2022-48945] = "fixed-version: Fixed from version 6.2" | ||
2161 | |||
2162 | CVE_STATUS[CVE-2022-48946] = "fixed-version: Fixed from version 6.2" | ||
2163 | |||
2164 | CVE_STATUS[CVE-2022-48947] = "fixed-version: Fixed from version 6.1" | ||
2165 | |||
2166 | CVE_STATUS[CVE-2022-48948] = "fixed-version: Fixed from version 6.2" | ||
2167 | |||
2168 | CVE_STATUS[CVE-2022-48949] = "fixed-version: Fixed from version 6.2" | ||
2169 | |||
2170 | CVE_STATUS[CVE-2022-48950] = "fixed-version: Fixed from version 6.1" | ||
2171 | |||
2172 | CVE_STATUS[CVE-2022-48951] = "fixed-version: Fixed from version 6.1" | ||
2173 | |||
2174 | CVE_STATUS[CVE-2022-48952] = "fixed-version: Fixed from version 6.2" | ||
2175 | |||
2176 | CVE_STATUS[CVE-2022-48953] = "fixed-version: Fixed from version 6.1" | ||
2177 | |||
2178 | CVE_STATUS[CVE-2022-48954] = "fixed-version: Fixed from version 6.1" | ||
2179 | |||
2180 | CVE_STATUS[CVE-2022-48955] = "fixed-version: Fixed from version 6.1" | ||
2181 | |||
2182 | CVE_STATUS[CVE-2022-48956] = "fixed-version: Fixed from version 6.1" | ||
2183 | |||
2184 | CVE_STATUS[CVE-2022-48957] = "fixed-version: Fixed from version 6.1" | ||
2185 | |||
2186 | CVE_STATUS[CVE-2022-48958] = "fixed-version: Fixed from version 6.1" | ||
2187 | |||
2188 | CVE_STATUS[CVE-2022-48959] = "fixed-version: Fixed from version 6.1" | ||
2189 | |||
2190 | CVE_STATUS[CVE-2022-48960] = "fixed-version: Fixed from version 6.1" | ||
2191 | |||
2192 | CVE_STATUS[CVE-2022-48961] = "fixed-version: Fixed from version 6.1" | ||
2193 | |||
2194 | CVE_STATUS[CVE-2022-48962] = "fixed-version: Fixed from version 6.1" | ||
2195 | |||
2196 | CVE_STATUS[CVE-2022-48963] = "fixed-version: Fixed from version 6.1" | ||
2197 | |||
2198 | CVE_STATUS[CVE-2022-48964] = "fixed-version: Fixed from version 6.1" | ||
2199 | |||
2200 | CVE_STATUS[CVE-2022-48965] = "fixed-version: Fixed from version 6.1" | ||
2201 | |||
2202 | CVE_STATUS[CVE-2022-48966] = "fixed-version: Fixed from version 6.1" | ||
2203 | |||
2204 | CVE_STATUS[CVE-2022-48967] = "fixed-version: Fixed from version 6.1" | ||
2205 | |||
2206 | CVE_STATUS[CVE-2022-48968] = "fixed-version: Fixed from version 6.1" | ||
2207 | |||
2208 | CVE_STATUS[CVE-2022-48969] = "fixed-version: Fixed from version 6.1" | ||
2209 | |||
2210 | CVE_STATUS[CVE-2022-48970] = "fixed-version: Fixed from version 6.1" | ||
2211 | |||
2212 | CVE_STATUS[CVE-2022-48971] = "fixed-version: Fixed from version 6.1" | ||
2213 | |||
2214 | CVE_STATUS[CVE-2022-48972] = "fixed-version: Fixed from version 6.1" | ||
2215 | |||
2216 | CVE_STATUS[CVE-2022-48973] = "fixed-version: Fixed from version 6.1" | ||
2217 | |||
2218 | CVE_STATUS[CVE-2022-48974] = "fixed-version: Fixed from version 6.1" | ||
2219 | |||
2220 | CVE_STATUS[CVE-2022-48975] = "fixed-version: Fixed from version 6.1" | ||
2221 | |||
2222 | CVE_STATUS[CVE-2022-48976] = "fixed-version: Fixed from version 6.1" | ||
2223 | |||
2224 | CVE_STATUS[CVE-2022-48977] = "fixed-version: Fixed from version 6.1" | ||
2225 | |||
2226 | CVE_STATUS[CVE-2022-48978] = "fixed-version: Fixed from version 6.1" | ||
2227 | |||
2228 | CVE_STATUS[CVE-2022-48979] = "fixed-version: Fixed from version 6.1" | ||
2229 | |||
2230 | CVE_STATUS[CVE-2022-48980] = "fixed-version: Fixed from version 6.1" | ||
2231 | |||
2232 | CVE_STATUS[CVE-2022-48981] = "fixed-version: Fixed from version 6.1" | ||
2233 | |||
2234 | CVE_STATUS[CVE-2022-48982] = "fixed-version: Fixed from version 6.1" | ||
2235 | |||
2236 | CVE_STATUS[CVE-2022-48983] = "fixed-version: Fixed from version 6.1" | ||
2237 | |||
2238 | CVE_STATUS[CVE-2022-48984] = "fixed-version: Fixed from version 6.1" | ||
2239 | |||
2240 | CVE_STATUS[CVE-2022-48985] = "fixed-version: Fixed from version 6.1" | ||
2241 | |||
2242 | CVE_STATUS[CVE-2022-48986] = "fixed-version: Fixed from version 6.1" | ||
2243 | |||
2244 | CVE_STATUS[CVE-2022-48987] = "fixed-version: Fixed from version 6.0.13" | ||
2245 | |||
2246 | CVE_STATUS[CVE-2022-48988] = "fixed-version: Fixed from version 6.1" | ||
2247 | |||
2248 | CVE_STATUS[CVE-2022-48989] = "fixed-version: Fixed from version 6.1" | ||
2249 | |||
2250 | CVE_STATUS[CVE-2022-48990] = "fixed-version: Fixed from version 6.1" | ||
2251 | |||
2252 | CVE_STATUS[CVE-2022-48991] = "fixed-version: Fixed from version 6.1" | ||
2253 | |||
2254 | CVE_STATUS[CVE-2022-48992] = "fixed-version: Fixed from version 6.1" | ||
2255 | |||
2256 | CVE_STATUS[CVE-2022-48994] = "fixed-version: Fixed from version 6.1" | ||
2257 | |||
2258 | CVE_STATUS[CVE-2022-48995] = "fixed-version: Fixed from version 6.1" | ||
2259 | |||
2260 | CVE_STATUS[CVE-2022-48996] = "fixed-version: Fixed from version 6.1" | ||
2261 | |||
2262 | CVE_STATUS[CVE-2022-48997] = "fixed-version: Fixed from version 6.1" | ||
2263 | |||
2264 | CVE_STATUS[CVE-2022-48998] = "fixed-version: Fixed from version 6.1" | ||
2265 | |||
2266 | CVE_STATUS[CVE-2022-48999] = "fixed-version: Fixed from version 6.1" | ||
2267 | |||
2268 | CVE_STATUS[CVE-2022-49000] = "fixed-version: Fixed from version 6.1" | ||
2269 | |||
2270 | CVE_STATUS[CVE-2022-49001] = "fixed-version: Fixed from version 6.1" | ||
2271 | |||
2272 | CVE_STATUS[CVE-2022-49002] = "fixed-version: Fixed from version 6.1" | ||
2273 | |||
2274 | CVE_STATUS[CVE-2022-49003] = "fixed-version: Fixed from version 6.1" | ||
2275 | |||
2276 | CVE_STATUS[CVE-2022-49004] = "fixed-version: Fixed from version 6.1" | ||
2277 | |||
2278 | CVE_STATUS[CVE-2022-49005] = "fixed-version: Fixed from version 6.1" | ||
2279 | |||
2280 | CVE_STATUS[CVE-2022-49006] = "fixed-version: Fixed from version 6.1" | ||
2281 | |||
2282 | CVE_STATUS[CVE-2022-49007] = "fixed-version: Fixed from version 6.1" | ||
2283 | |||
2284 | CVE_STATUS[CVE-2022-49008] = "fixed-version: Fixed from version 6.1" | ||
2285 | |||
2286 | CVE_STATUS[CVE-2022-49009] = "fixed-version: Fixed from version 6.1" | ||
2287 | |||
2288 | CVE_STATUS[CVE-2022-49010] = "fixed-version: Fixed from version 6.1" | ||
2289 | |||
2290 | CVE_STATUS[CVE-2022-49011] = "fixed-version: Fixed from version 6.1" | ||
2291 | |||
2292 | CVE_STATUS[CVE-2022-49012] = "fixed-version: Fixed from version 6.1" | ||
2293 | |||
2294 | CVE_STATUS[CVE-2022-49013] = "fixed-version: Fixed from version 6.1" | ||
2295 | |||
2296 | CVE_STATUS[CVE-2022-49014] = "fixed-version: Fixed from version 6.1" | ||
2297 | |||
2298 | CVE_STATUS[CVE-2022-49015] = "fixed-version: Fixed from version 6.1" | ||
2299 | |||
2300 | CVE_STATUS[CVE-2022-49016] = "fixed-version: Fixed from version 6.1" | ||
2301 | |||
2302 | CVE_STATUS[CVE-2022-49017] = "fixed-version: Fixed from version 6.1" | ||
2303 | |||
2304 | CVE_STATUS[CVE-2022-49018] = "fixed-version: Fixed from version 6.1" | ||
2305 | |||
2306 | CVE_STATUS[CVE-2022-49019] = "fixed-version: Fixed from version 6.1" | ||
2307 | |||
2308 | CVE_STATUS[CVE-2022-49020] = "fixed-version: Fixed from version 6.1" | ||
2309 | |||
2310 | CVE_STATUS[CVE-2022-49021] = "fixed-version: Fixed from version 6.1" | ||
2311 | |||
2312 | CVE_STATUS[CVE-2022-49022] = "fixed-version: Fixed from version 6.1" | ||
2313 | |||
2314 | CVE_STATUS[CVE-2022-49023] = "fixed-version: Fixed from version 6.1" | ||
2315 | |||
2316 | CVE_STATUS[CVE-2022-49024] = "fixed-version: Fixed from version 6.1" | ||
2317 | |||
2318 | CVE_STATUS[CVE-2022-49025] = "fixed-version: Fixed from version 6.1" | ||
2319 | |||
2320 | CVE_STATUS[CVE-2022-49026] = "fixed-version: Fixed from version 6.1" | ||
2321 | |||
2322 | CVE_STATUS[CVE-2022-49027] = "fixed-version: Fixed from version 6.1" | ||
2323 | |||
2324 | CVE_STATUS[CVE-2022-49028] = "fixed-version: Fixed from version 6.1" | ||
2325 | |||
2326 | CVE_STATUS[CVE-2022-49029] = "fixed-version: Fixed from version 6.1" | ||
2327 | |||
2328 | CVE_STATUS[CVE-2022-49030] = "fixed-version: Fixed from version 6.1" | ||
2329 | |||
2330 | CVE_STATUS[CVE-2022-49031] = "fixed-version: Fixed from version 6.1" | ||
2331 | |||
2332 | CVE_STATUS[CVE-2022-49032] = "fixed-version: Fixed from version 6.1" | ||
2333 | |||
2334 | CVE_STATUS[CVE-2022-49033] = "fixed-version: Fixed from version 6.1" | ||
2335 | |||
2336 | CVE_STATUS[CVE-2022-49034] = "cpe-stable-backport: Backported in 6.12.2" | ||
2337 | |||
2338 | CVE_STATUS[CVE-2022-49035] = "fixed-version: Fixed from version 6.1" | ||
2339 | |||
2340 | CVE_STATUS[CVE-2022-49044] = "fixed-version: Fixed from version 5.18" | ||
2341 | |||
2342 | CVE_STATUS[CVE-2022-49046] = "fixed-version: Fixed from version 5.18" | ||
2343 | |||
2344 | CVE_STATUS[CVE-2022-49047] = "fixed-version: Fixed from version 5.18" | ||
2345 | |||
2346 | CVE_STATUS[CVE-2022-49048] = "fixed-version: Fixed from version 5.18" | ||
2347 | |||
2348 | CVE_STATUS[CVE-2022-49049] = "fixed-version: Fixed from version 5.18" | ||
2349 | |||
2350 | CVE_STATUS[CVE-2022-49050] = "fixed-version: Fixed from version 5.18" | ||
2351 | |||
2352 | CVE_STATUS[CVE-2022-49051] = "fixed-version: Fixed from version 5.18" | ||
2353 | |||
2354 | CVE_STATUS[CVE-2022-49052] = "fixed-version: Fixed from version 5.18" | ||
2355 | |||
2356 | CVE_STATUS[CVE-2022-49053] = "fixed-version: Fixed from version 5.18" | ||
2357 | |||
2358 | CVE_STATUS[CVE-2022-49054] = "fixed-version: Fixed from version 5.18" | ||
2359 | |||
2360 | CVE_STATUS[CVE-2022-49055] = "fixed-version: Fixed from version 5.18" | ||
2361 | |||
2362 | CVE_STATUS[CVE-2022-49057] = "fixed-version: Fixed from version 5.18" | ||
2363 | |||
2364 | CVE_STATUS[CVE-2022-49058] = "fixed-version: Fixed from version 5.18" | ||
2365 | |||
2366 | CVE_STATUS[CVE-2022-49059] = "fixed-version: Fixed from version 5.18" | ||
2367 | |||
2368 | CVE_STATUS[CVE-2022-49060] = "fixed-version: Fixed from version 5.18" | ||
2369 | |||
2370 | CVE_STATUS[CVE-2022-49061] = "fixed-version: Fixed from version 5.18" | ||
2371 | |||
2372 | CVE_STATUS[CVE-2022-49062] = "fixed-version: Fixed from version 5.18" | ||
2373 | |||
2374 | CVE_STATUS[CVE-2022-49063] = "fixed-version: Fixed from version 5.18" | ||
2375 | |||
2376 | CVE_STATUS[CVE-2022-49064] = "fixed-version: Fixed from version 5.18" | ||
2377 | |||
2378 | CVE_STATUS[CVE-2022-49065] = "fixed-version: Fixed from version 5.18" | ||
2379 | |||
2380 | CVE_STATUS[CVE-2022-49066] = "fixed-version: Fixed from version 5.18" | ||
2381 | |||
2382 | CVE_STATUS[CVE-2022-49067] = "fixed-version: Fixed from version 5.18" | ||
2383 | |||
2384 | CVE_STATUS[CVE-2022-49068] = "fixed-version: Fixed from version 5.18" | ||
2385 | |||
2386 | CVE_STATUS[CVE-2022-49069] = "fixed-version: Fixed from version 5.18" | ||
2387 | |||
2388 | CVE_STATUS[CVE-2022-49070] = "fixed-version: Fixed from version 5.17.3" | ||
2389 | |||
2390 | CVE_STATUS[CVE-2022-49071] = "fixed-version: Fixed from version 5.18" | ||
2391 | |||
2392 | CVE_STATUS[CVE-2022-49072] = "fixed-version: Fixed from version 5.18" | ||
2393 | |||
2394 | CVE_STATUS[CVE-2022-49073] = "fixed-version: Fixed from version 5.18" | ||
2395 | |||
2396 | CVE_STATUS[CVE-2022-49074] = "fixed-version: Fixed from version 5.18" | ||
2397 | |||
2398 | CVE_STATUS[CVE-2022-49075] = "fixed-version: Fixed from version 5.18" | ||
2399 | |||
2400 | CVE_STATUS[CVE-2022-49076] = "fixed-version: Fixed from version 5.18" | ||
2401 | |||
2402 | CVE_STATUS[CVE-2022-49077] = "fixed-version: Fixed from version 5.18" | ||
2403 | |||
2404 | CVE_STATUS[CVE-2022-49078] = "fixed-version: Fixed from version 5.18" | ||
2405 | |||
2406 | CVE_STATUS[CVE-2022-49079] = "fixed-version: Fixed from version 5.18" | ||
2407 | |||
2408 | CVE_STATUS[CVE-2022-49080] = "fixed-version: Fixed from version 5.18" | ||
2409 | |||
2410 | CVE_STATUS[CVE-2022-49081] = "fixed-version: Fixed from version 5.18" | ||
2411 | |||
2412 | CVE_STATUS[CVE-2022-49082] = "fixed-version: Fixed from version 5.18" | ||
2413 | |||
2414 | CVE_STATUS[CVE-2022-49083] = "fixed-version: Fixed from version 5.18" | ||
2415 | |||
2416 | CVE_STATUS[CVE-2022-49084] = "fixed-version: Fixed from version 5.18" | ||
2417 | |||
2418 | CVE_STATUS[CVE-2022-49085] = "fixed-version: Fixed from version 5.18" | ||
2419 | |||
2420 | CVE_STATUS[CVE-2022-49086] = "fixed-version: Fixed from version 5.18" | ||
2421 | |||
2422 | CVE_STATUS[CVE-2022-49087] = "fixed-version: Fixed from version 5.18" | ||
2423 | |||
2424 | CVE_STATUS[CVE-2022-49088] = "fixed-version: Fixed from version 5.18" | ||
2425 | |||
2426 | CVE_STATUS[CVE-2022-49089] = "fixed-version: Fixed from version 5.18" | ||
2427 | |||
2428 | CVE_STATUS[CVE-2022-49090] = "fixed-version: Fixed from version 5.18" | ||
2429 | |||
2430 | CVE_STATUS[CVE-2022-49091] = "fixed-version: Fixed from version 5.18" | ||
2431 | |||
2432 | CVE_STATUS[CVE-2022-49092] = "fixed-version: Fixed from version 5.18" | ||
2433 | |||
2434 | CVE_STATUS[CVE-2022-49093] = "fixed-version: Fixed from version 5.18" | ||
2435 | |||
2436 | CVE_STATUS[CVE-2022-49094] = "fixed-version: Fixed from version 5.18" | ||
2437 | |||
2438 | CVE_STATUS[CVE-2022-49095] = "fixed-version: Fixed from version 5.18" | ||
2439 | |||
2440 | CVE_STATUS[CVE-2022-49096] = "fixed-version: Fixed from version 5.18" | ||
2441 | |||
2442 | CVE_STATUS[CVE-2022-49097] = "fixed-version: Fixed from version 5.18" | ||
2443 | |||
2444 | CVE_STATUS[CVE-2022-49098] = "fixed-version: Fixed from version 5.18" | ||
2445 | |||
2446 | CVE_STATUS[CVE-2022-49099] = "fixed-version: Fixed from version 5.18" | ||
2447 | |||
2448 | CVE_STATUS[CVE-2022-49100] = "fixed-version: Fixed from version 5.18" | ||
2449 | |||
2450 | CVE_STATUS[CVE-2022-49102] = "fixed-version: Fixed from version 5.18" | ||
2451 | |||
2452 | CVE_STATUS[CVE-2022-49103] = "fixed-version: Fixed from version 5.18" | ||
2453 | |||
2454 | CVE_STATUS[CVE-2022-49104] = "fixed-version: Fixed from version 5.18" | ||
2455 | |||
2456 | CVE_STATUS[CVE-2022-49105] = "fixed-version: Fixed from version 5.18" | ||
2457 | |||
2458 | CVE_STATUS[CVE-2022-49106] = "fixed-version: Fixed from version 5.18" | ||
2459 | |||
2460 | CVE_STATUS[CVE-2022-49107] = "fixed-version: Fixed from version 5.18" | ||
2461 | |||
2462 | CVE_STATUS[CVE-2022-49108] = "fixed-version: Fixed from version 5.18" | ||
2463 | |||
2464 | CVE_STATUS[CVE-2022-49109] = "fixed-version: Fixed from version 5.18" | ||
2465 | |||
2466 | CVE_STATUS[CVE-2022-49110] = "fixed-version: Fixed from version 5.18" | ||
2467 | |||
2468 | CVE_STATUS[CVE-2022-49111] = "fixed-version: Fixed from version 5.18" | ||
2469 | |||
2470 | CVE_STATUS[CVE-2022-49112] = "fixed-version: Fixed from version 5.18" | ||
2471 | |||
2472 | CVE_STATUS[CVE-2022-49113] = "fixed-version: Fixed from version 5.18" | ||
2473 | |||
2474 | CVE_STATUS[CVE-2022-49114] = "fixed-version: Fixed from version 5.18" | ||
2475 | |||
2476 | CVE_STATUS[CVE-2022-49115] = "fixed-version: Fixed from version 5.18" | ||
2477 | |||
2478 | CVE_STATUS[CVE-2022-49116] = "fixed-version: Fixed from version 5.18" | ||
2479 | |||
2480 | CVE_STATUS[CVE-2022-49117] = "fixed-version: Fixed from version 5.18" | ||
2481 | |||
2482 | CVE_STATUS[CVE-2022-49118] = "fixed-version: Fixed from version 5.18" | ||
2483 | |||
2484 | CVE_STATUS[CVE-2022-49119] = "fixed-version: Fixed from version 5.18" | ||
2485 | |||
2486 | CVE_STATUS[CVE-2022-49120] = "fixed-version: Fixed from version 5.18" | ||
2487 | |||
2488 | CVE_STATUS[CVE-2022-49121] = "fixed-version: Fixed from version 5.18" | ||
2489 | |||
2490 | CVE_STATUS[CVE-2022-49122] = "fixed-version: Fixed from version 5.18" | ||
2491 | |||
2492 | CVE_STATUS[CVE-2022-49123] = "fixed-version: Fixed from version 5.18" | ||
2493 | |||
2494 | CVE_STATUS[CVE-2022-49124] = "fixed-version: Fixed from version 5.18" | ||
2495 | |||
2496 | CVE_STATUS[CVE-2022-49125] = "fixed-version: Fixed from version 5.18" | ||
2497 | |||
2498 | CVE_STATUS[CVE-2022-49126] = "fixed-version: Fixed from version 5.18" | ||
2499 | |||
2500 | CVE_STATUS[CVE-2022-49127] = "fixed-version: Fixed from version 5.18" | ||
2501 | |||
2502 | CVE_STATUS[CVE-2022-49128] = "fixed-version: Fixed from version 5.18" | ||
2503 | |||
2504 | CVE_STATUS[CVE-2022-49129] = "fixed-version: Fixed from version 5.18" | ||
2505 | |||
2506 | CVE_STATUS[CVE-2022-49130] = "fixed-version: Fixed from version 5.18" | ||
2507 | |||
2508 | CVE_STATUS[CVE-2022-49131] = "fixed-version: Fixed from version 5.18" | ||
2509 | |||
2510 | CVE_STATUS[CVE-2022-49132] = "fixed-version: Fixed from version 5.18" | ||
2511 | |||
2512 | CVE_STATUS[CVE-2022-49133] = "fixed-version: Fixed from version 5.18" | ||
2513 | |||
2514 | CVE_STATUS[CVE-2022-49134] = "fixed-version: Fixed from version 5.18" | ||
2515 | |||
2516 | CVE_STATUS[CVE-2022-49135] = "fixed-version: Fixed from version 5.18" | ||
2517 | |||
2518 | CVE_STATUS[CVE-2022-49136] = "fixed-version: Fixed from version 5.18" | ||
2519 | |||
2520 | CVE_STATUS[CVE-2022-49137] = "fixed-version: Fixed from version 5.18" | ||
2521 | |||
2522 | CVE_STATUS[CVE-2022-49138] = "fixed-version: Fixed from version 5.18" | ||
2523 | |||
2524 | CVE_STATUS[CVE-2022-49139] = "fixed-version: Fixed from version 5.18" | ||
2525 | |||
2526 | CVE_STATUS[CVE-2022-49141] = "fixed-version: Fixed from version 5.18" | ||
2527 | |||
2528 | CVE_STATUS[CVE-2022-49142] = "fixed-version: Fixed from version 5.18" | ||
2529 | |||
2530 | CVE_STATUS[CVE-2022-49144] = "fixed-version: Fixed from version 5.18" | ||
2531 | |||
2532 | CVE_STATUS[CVE-2022-49145] = "fixed-version: Fixed from version 5.18" | ||
2533 | |||
2534 | CVE_STATUS[CVE-2022-49146] = "fixed-version: Fixed from version 5.18" | ||
2535 | |||
2536 | CVE_STATUS[CVE-2022-49147] = "fixed-version: Fixed from version 5.18" | ||
2537 | |||
2538 | CVE_STATUS[CVE-2022-49148] = "fixed-version: Fixed from version 5.18" | ||
2539 | |||
2540 | CVE_STATUS[CVE-2022-49149] = "fixed-version: Fixed from version 5.18" | ||
2541 | |||
2542 | CVE_STATUS[CVE-2022-49150] = "fixed-version: Fixed from version 5.18" | ||
2543 | |||
2544 | CVE_STATUS[CVE-2022-49151] = "fixed-version: Fixed from version 5.18" | ||
2545 | |||
2546 | CVE_STATUS[CVE-2022-49152] = "fixed-version: Fixed from version 5.18" | ||
2547 | |||
2548 | CVE_STATUS[CVE-2022-49153] = "fixed-version: Fixed from version 5.18" | ||
2549 | |||
2550 | CVE_STATUS[CVE-2022-49154] = "fixed-version: Fixed from version 5.18" | ||
2551 | |||
2552 | CVE_STATUS[CVE-2022-49155] = "fixed-version: Fixed from version 5.18" | ||
2553 | |||
2554 | CVE_STATUS[CVE-2022-49156] = "fixed-version: Fixed from version 5.18" | ||
2555 | |||
2556 | CVE_STATUS[CVE-2022-49157] = "fixed-version: Fixed from version 5.18" | ||
2557 | |||
2558 | CVE_STATUS[CVE-2022-49158] = "fixed-version: Fixed from version 5.18" | ||
2559 | |||
2560 | CVE_STATUS[CVE-2022-49159] = "fixed-version: Fixed from version 5.18" | ||
2561 | |||
2562 | CVE_STATUS[CVE-2022-49160] = "fixed-version: Fixed from version 5.18" | ||
2563 | |||
2564 | CVE_STATUS[CVE-2022-49161] = "fixed-version: Fixed from version 5.18" | ||
2565 | |||
2566 | CVE_STATUS[CVE-2022-49162] = "fixed-version: Fixed from version 5.18" | ||
2567 | |||
2568 | CVE_STATUS[CVE-2022-49163] = "fixed-version: Fixed from version 5.18" | ||
2569 | |||
2570 | CVE_STATUS[CVE-2022-49164] = "fixed-version: Fixed from version 5.18" | ||
2571 | |||
2572 | CVE_STATUS[CVE-2022-49165] = "fixed-version: Fixed from version 5.18" | ||
2573 | |||
2574 | CVE_STATUS[CVE-2022-49166] = "fixed-version: Fixed from version 5.18" | ||
2575 | |||
2576 | CVE_STATUS[CVE-2022-49167] = "fixed-version: Fixed from version 5.18" | ||
2577 | |||
2578 | CVE_STATUS[CVE-2022-49168] = "fixed-version: Fixed from version 5.18" | ||
2579 | |||
2580 | CVE_STATUS[CVE-2022-49169] = "fixed-version: Fixed from version 5.18" | ||
2581 | |||
2582 | CVE_STATUS[CVE-2022-49170] = "fixed-version: Fixed from version 5.18" | ||
2583 | |||
2584 | CVE_STATUS[CVE-2022-49171] = "fixed-version: Fixed from version 5.18" | ||
2585 | |||
2586 | CVE_STATUS[CVE-2022-49172] = "fixed-version: Fixed from version 5.18" | ||
2587 | |||
2588 | CVE_STATUS[CVE-2022-49173] = "fixed-version: Fixed from version 5.18" | ||
2589 | |||
2590 | CVE_STATUS[CVE-2022-49174] = "fixed-version: Fixed from version 5.18" | ||
2591 | |||
2592 | CVE_STATUS[CVE-2022-49175] = "fixed-version: Fixed from version 5.18" | ||
2593 | |||
2594 | CVE_STATUS[CVE-2022-49176] = "fixed-version: Fixed from version 5.18" | ||
2595 | |||
2596 | CVE_STATUS[CVE-2022-49177] = "fixed-version: Fixed from version 5.18" | ||
2597 | |||
2598 | CVE_STATUS[CVE-2022-49178] = "fixed-version: Fixed from version 5.18" | ||
2599 | |||
2600 | CVE_STATUS[CVE-2022-49179] = "fixed-version: Fixed from version 5.18" | ||
2601 | |||
2602 | CVE_STATUS[CVE-2022-49180] = "fixed-version: Fixed from version 5.18" | ||
2603 | |||
2604 | CVE_STATUS[CVE-2022-49182] = "fixed-version: Fixed from version 5.18" | ||
2605 | |||
2606 | CVE_STATUS[CVE-2022-49183] = "fixed-version: Fixed from version 5.18" | ||
2607 | |||
2608 | CVE_STATUS[CVE-2022-49184] = "fixed-version: Fixed from version 5.18" | ||
2609 | |||
2610 | CVE_STATUS[CVE-2022-49185] = "fixed-version: Fixed from version 5.18" | ||
2611 | |||
2612 | CVE_STATUS[CVE-2022-49186] = "fixed-version: Fixed from version 5.18" | ||
2613 | |||
2614 | CVE_STATUS[CVE-2022-49187] = "fixed-version: Fixed from version 5.18" | ||
2615 | |||
2616 | CVE_STATUS[CVE-2022-49188] = "fixed-version: Fixed from version 5.18" | ||
2617 | |||
2618 | CVE_STATUS[CVE-2022-49189] = "fixed-version: Fixed from version 5.18" | ||
2619 | |||
2620 | CVE_STATUS[CVE-2022-49190] = "fixed-version: Fixed from version 5.18" | ||
2621 | |||
2622 | CVE_STATUS[CVE-2022-49191] = "fixed-version: Fixed from version 5.18" | ||
2623 | |||
2624 | CVE_STATUS[CVE-2022-49192] = "fixed-version: Fixed from version 5.18" | ||
2625 | |||
2626 | CVE_STATUS[CVE-2022-49193] = "fixed-version: Fixed from version 5.18" | ||
2627 | |||
2628 | CVE_STATUS[CVE-2022-49194] = "fixed-version: Fixed from version 5.18" | ||
2629 | |||
2630 | CVE_STATUS[CVE-2022-49195] = "fixed-version: Fixed from version 5.18" | ||
2631 | |||
2632 | CVE_STATUS[CVE-2022-49196] = "fixed-version: Fixed from version 5.18" | ||
2633 | |||
2634 | CVE_STATUS[CVE-2022-49197] = "fixed-version: Fixed from version 5.18" | ||
2635 | |||
2636 | CVE_STATUS[CVE-2022-49198] = "fixed-version: Fixed from version 5.18" | ||
2637 | |||
2638 | CVE_STATUS[CVE-2022-49199] = "fixed-version: Fixed from version 5.18" | ||
2639 | |||
2640 | CVE_STATUS[CVE-2022-49200] = "fixed-version: Fixed from version 5.18" | ||
2641 | |||
2642 | CVE_STATUS[CVE-2022-49201] = "fixed-version: Fixed from version 5.18" | ||
2643 | |||
2644 | CVE_STATUS[CVE-2022-49202] = "fixed-version: Fixed from version 5.18" | ||
2645 | |||
2646 | CVE_STATUS[CVE-2022-49203] = "fixed-version: Fixed from version 5.18" | ||
2647 | |||
2648 | CVE_STATUS[CVE-2022-49204] = "fixed-version: Fixed from version 5.18" | ||
2649 | |||
2650 | CVE_STATUS[CVE-2022-49205] = "fixed-version: Fixed from version 5.18" | ||
2651 | |||
2652 | CVE_STATUS[CVE-2022-49206] = "fixed-version: Fixed from version 5.18" | ||
2653 | |||
2654 | CVE_STATUS[CVE-2022-49207] = "fixed-version: Fixed from version 5.18" | ||
2655 | |||
2656 | CVE_STATUS[CVE-2022-49208] = "fixed-version: Fixed from version 5.18" | ||
2657 | |||
2658 | CVE_STATUS[CVE-2022-49209] = "fixed-version: Fixed from version 5.18" | ||
2659 | |||
2660 | CVE_STATUS[CVE-2022-49210] = "fixed-version: Fixed from version 5.18" | ||
2661 | |||
2662 | CVE_STATUS[CVE-2022-49211] = "fixed-version: Fixed from version 5.18" | ||
2663 | |||
2664 | CVE_STATUS[CVE-2022-49212] = "fixed-version: Fixed from version 5.18" | ||
2665 | |||
2666 | CVE_STATUS[CVE-2022-49213] = "fixed-version: Fixed from version 5.18" | ||
2667 | |||
2668 | CVE_STATUS[CVE-2022-49214] = "fixed-version: Fixed from version 5.18" | ||
2669 | |||
2670 | CVE_STATUS[CVE-2022-49215] = "fixed-version: Fixed from version 5.18" | ||
2671 | |||
2672 | CVE_STATUS[CVE-2022-49216] = "fixed-version: Fixed from version 5.18" | ||
2673 | |||
2674 | CVE_STATUS[CVE-2022-49217] = "fixed-version: Fixed from version 5.18" | ||
2675 | |||
2676 | CVE_STATUS[CVE-2022-49218] = "fixed-version: Fixed from version 5.18" | ||
2677 | |||
2678 | CVE_STATUS[CVE-2022-49219] = "fixed-version: Fixed from version 5.18" | ||
2679 | |||
2680 | CVE_STATUS[CVE-2022-49220] = "fixed-version: Fixed from version 5.18" | ||
2681 | |||
2682 | CVE_STATUS[CVE-2022-49221] = "fixed-version: Fixed from version 5.18" | ||
2683 | |||
2684 | CVE_STATUS[CVE-2022-49222] = "fixed-version: Fixed from version 5.18" | ||
2685 | |||
2686 | CVE_STATUS[CVE-2022-49223] = "fixed-version: Fixed from version 5.18" | ||
2687 | |||
2688 | CVE_STATUS[CVE-2022-49224] = "fixed-version: Fixed from version 5.18" | ||
2689 | |||
2690 | CVE_STATUS[CVE-2022-49225] = "fixed-version: Fixed from version 5.18" | ||
2691 | |||
2692 | CVE_STATUS[CVE-2022-49226] = "fixed-version: Fixed from version 5.18" | ||
2693 | |||
2694 | CVE_STATUS[CVE-2022-49227] = "fixed-version: Fixed from version 5.18" | ||
2695 | |||
2696 | CVE_STATUS[CVE-2022-49228] = "fixed-version: Fixed from version 5.18" | ||
2697 | |||
2698 | CVE_STATUS[CVE-2022-49229] = "fixed-version: Fixed from version 5.18" | ||
2699 | |||
2700 | CVE_STATUS[CVE-2022-49230] = "fixed-version: Fixed from version 5.18" | ||
2701 | |||
2702 | CVE_STATUS[CVE-2022-49231] = "fixed-version: Fixed from version 5.18" | ||
2703 | |||
2704 | CVE_STATUS[CVE-2022-49232] = "fixed-version: Fixed from version 5.18" | ||
2705 | |||
2706 | CVE_STATUS[CVE-2022-49233] = "fixed-version: Fixed from version 5.18" | ||
2707 | |||
2708 | CVE_STATUS[CVE-2022-49234] = "fixed-version: Fixed from version 5.18" | ||
2709 | |||
2710 | CVE_STATUS[CVE-2022-49235] = "fixed-version: Fixed from version 5.18" | ||
2711 | |||
2712 | CVE_STATUS[CVE-2022-49236] = "fixed-version: Fixed from version 5.18" | ||
2713 | |||
2714 | CVE_STATUS[CVE-2022-49237] = "fixed-version: Fixed from version 5.18" | ||
2715 | |||
2716 | CVE_STATUS[CVE-2022-49238] = "fixed-version: Fixed from version 5.18" | ||
2717 | |||
2718 | CVE_STATUS[CVE-2022-49239] = "fixed-version: Fixed from version 5.18" | ||
2719 | |||
2720 | CVE_STATUS[CVE-2022-49240] = "fixed-version: Fixed from version 5.18" | ||
2721 | |||
2722 | CVE_STATUS[CVE-2022-49241] = "fixed-version: Fixed from version 5.18" | ||
2723 | |||
2724 | CVE_STATUS[CVE-2022-49242] = "fixed-version: Fixed from version 5.18" | ||
2725 | |||
2726 | CVE_STATUS[CVE-2022-49243] = "fixed-version: Fixed from version 5.18" | ||
2727 | |||
2728 | CVE_STATUS[CVE-2022-49244] = "fixed-version: Fixed from version 5.18" | ||
2729 | |||
2730 | CVE_STATUS[CVE-2022-49245] = "fixed-version: Fixed from version 5.18" | ||
2731 | |||
2732 | CVE_STATUS[CVE-2022-49246] = "fixed-version: Fixed from version 5.18" | ||
2733 | |||
2734 | CVE_STATUS[CVE-2022-49247] = "fixed-version: Fixed from version 5.18" | ||
2735 | |||
2736 | CVE_STATUS[CVE-2022-49248] = "fixed-version: Fixed from version 5.18" | ||
2737 | |||
2738 | CVE_STATUS[CVE-2022-49249] = "fixed-version: Fixed from version 5.18" | ||
2739 | |||
2740 | CVE_STATUS[CVE-2022-49250] = "fixed-version: Fixed from version 5.18" | ||
2741 | |||
2742 | CVE_STATUS[CVE-2022-49251] = "fixed-version: Fixed from version 5.18" | ||
2743 | |||
2744 | CVE_STATUS[CVE-2022-49252] = "fixed-version: Fixed from version 5.18" | ||
2745 | |||
2746 | CVE_STATUS[CVE-2022-49253] = "fixed-version: Fixed from version 5.18" | ||
2747 | |||
2748 | CVE_STATUS[CVE-2022-49254] = "fixed-version: Fixed from version 5.18" | ||
2749 | |||
2750 | CVE_STATUS[CVE-2022-49255] = "fixed-version: Fixed from version 5.18" | ||
2751 | |||
2752 | CVE_STATUS[CVE-2022-49256] = "fixed-version: Fixed from version 5.18" | ||
2753 | |||
2754 | CVE_STATUS[CVE-2022-49257] = "fixed-version: Fixed from version 5.18" | ||
2755 | |||
2756 | CVE_STATUS[CVE-2022-49258] = "fixed-version: Fixed from version 5.18" | ||
2757 | |||
2758 | CVE_STATUS[CVE-2022-49259] = "fixed-version: Fixed from version 5.18" | ||
2759 | |||
2760 | CVE_STATUS[CVE-2022-49260] = "fixed-version: Fixed from version 5.18" | ||
2761 | |||
2762 | CVE_STATUS[CVE-2022-49261] = "fixed-version: Fixed from version 5.18" | ||
2763 | |||
2764 | CVE_STATUS[CVE-2022-49262] = "fixed-version: Fixed from version 5.18" | ||
2765 | |||
2766 | CVE_STATUS[CVE-2022-49263] = "fixed-version: Fixed from version 5.18" | ||
2767 | |||
2768 | CVE_STATUS[CVE-2022-49264] = "fixed-version: Fixed from version 5.18" | ||
2769 | |||
2770 | CVE_STATUS[CVE-2022-49265] = "fixed-version: Fixed from version 5.18" | ||
2771 | |||
2772 | CVE_STATUS[CVE-2022-49266] = "fixed-version: Fixed from version 5.18" | ||
2773 | |||
2774 | CVE_STATUS[CVE-2022-49267] = "fixed-version: Fixed from version 5.18" | ||
2775 | |||
2776 | CVE_STATUS[CVE-2022-49268] = "fixed-version: Fixed from version 5.18" | ||
2777 | |||
2778 | CVE_STATUS[CVE-2022-49269] = "fixed-version: Fixed from version 5.18" | ||
2779 | |||
2780 | CVE_STATUS[CVE-2022-49270] = "fixed-version: Fixed from version 5.18" | ||
2781 | |||
2782 | CVE_STATUS[CVE-2022-49271] = "fixed-version: Fixed from version 5.18" | ||
2783 | |||
2784 | CVE_STATUS[CVE-2022-49272] = "fixed-version: Fixed from version 5.17.2" | ||
2785 | |||
2786 | CVE_STATUS[CVE-2022-49273] = "fixed-version: Fixed from version 5.18" | ||
2787 | |||
2788 | CVE_STATUS[CVE-2022-49274] = "fixed-version: Fixed from version 5.18" | ||
2789 | |||
2790 | CVE_STATUS[CVE-2022-49275] = "fixed-version: Fixed from version 5.18" | ||
2791 | |||
2792 | CVE_STATUS[CVE-2022-49276] = "fixed-version: Fixed from version 5.18" | ||
2793 | |||
2794 | CVE_STATUS[CVE-2022-49277] = "fixed-version: Fixed from version 5.18" | ||
2795 | |||
2796 | CVE_STATUS[CVE-2022-49278] = "fixed-version: Fixed from version 5.18" | ||
2797 | |||
2798 | CVE_STATUS[CVE-2022-49279] = "fixed-version: Fixed from version 5.18" | ||
2799 | |||
2800 | CVE_STATUS[CVE-2022-49280] = "fixed-version: Fixed from version 5.18" | ||
2801 | |||
2802 | CVE_STATUS[CVE-2022-49281] = "fixed-version: Fixed from version 5.18" | ||
2803 | |||
2804 | CVE_STATUS[CVE-2022-49282] = "fixed-version: Fixed from version 5.18" | ||
2805 | |||
2806 | CVE_STATUS[CVE-2022-49283] = "fixed-version: Fixed from version 5.18" | ||
2807 | |||
2808 | CVE_STATUS[CVE-2022-49284] = "fixed-version: Fixed from version 5.18" | ||
2809 | |||
2810 | CVE_STATUS[CVE-2022-49285] = "fixed-version: Fixed from version 5.18" | ||
2811 | |||
2812 | CVE_STATUS[CVE-2022-49286] = "fixed-version: Fixed from version 5.18" | ||
2813 | |||
2814 | CVE_STATUS[CVE-2022-49287] = "fixed-version: Fixed from version 5.18" | ||
2815 | |||
2816 | CVE_STATUS[CVE-2022-49288] = "fixed-version: Fixed from version 5.18" | ||
2817 | |||
2818 | CVE_STATUS[CVE-2022-49289] = "fixed-version: Fixed from version 5.18" | ||
2819 | |||
2820 | CVE_STATUS[CVE-2022-49290] = "fixed-version: Fixed from version 5.18" | ||
2821 | |||
2822 | CVE_STATUS[CVE-2022-49291] = "fixed-version: Fixed from version 5.18" | ||
2823 | |||
2824 | CVE_STATUS[CVE-2022-49292] = "fixed-version: Fixed from version 5.18" | ||
2825 | |||
2826 | CVE_STATUS[CVE-2022-49293] = "fixed-version: Fixed from version 5.18" | ||
2827 | |||
2828 | CVE_STATUS[CVE-2022-49294] = "fixed-version: Fixed from version 5.19" | ||
2829 | |||
2830 | CVE_STATUS[CVE-2022-49295] = "fixed-version: Fixed from version 5.19" | ||
2831 | |||
2832 | CVE_STATUS[CVE-2022-49296] = "fixed-version: Fixed from version 5.19" | ||
2833 | |||
2834 | CVE_STATUS[CVE-2022-49297] = "fixed-version: Fixed from version 5.19" | ||
2835 | |||
2836 | CVE_STATUS[CVE-2022-49298] = "fixed-version: Fixed from version 5.19" | ||
2837 | |||
2838 | CVE_STATUS[CVE-2022-49299] = "fixed-version: Fixed from version 5.19" | ||
2839 | |||
2840 | CVE_STATUS[CVE-2022-49300] = "fixed-version: Fixed from version 5.19" | ||
2841 | |||
2842 | CVE_STATUS[CVE-2022-49301] = "fixed-version: Fixed from version 5.19" | ||
2843 | |||
2844 | CVE_STATUS[CVE-2022-49302] = "fixed-version: Fixed from version 5.19" | ||
2845 | |||
2846 | CVE_STATUS[CVE-2022-49303] = "fixed-version: Fixed from version 5.19" | ||
2847 | |||
2848 | CVE_STATUS[CVE-2022-49304] = "fixed-version: Fixed from version 5.19" | ||
2849 | |||
2850 | CVE_STATUS[CVE-2022-49305] = "fixed-version: Fixed from version 5.19" | ||
2851 | |||
2852 | CVE_STATUS[CVE-2022-49306] = "fixed-version: Fixed from version 5.19" | ||
2853 | |||
2854 | CVE_STATUS[CVE-2022-49307] = "fixed-version: Fixed from version 5.19" | ||
2855 | |||
2856 | CVE_STATUS[CVE-2022-49308] = "fixed-version: Fixed from version 5.19" | ||
2857 | |||
2858 | CVE_STATUS[CVE-2022-49309] = "fixed-version: Fixed from version 5.19" | ||
2859 | |||
2860 | CVE_STATUS[CVE-2022-49310] = "fixed-version: Fixed from version 5.19" | ||
2861 | |||
2862 | CVE_STATUS[CVE-2022-49311] = "fixed-version: Fixed from version 5.19" | ||
2863 | |||
2864 | CVE_STATUS[CVE-2022-49312] = "fixed-version: Fixed from version 5.19" | ||
2865 | |||
2866 | CVE_STATUS[CVE-2022-49313] = "fixed-version: Fixed from version 5.19" | ||
2867 | |||
2868 | CVE_STATUS[CVE-2022-49314] = "fixed-version: Fixed from version 5.19" | ||
2869 | |||
2870 | CVE_STATUS[CVE-2022-49315] = "fixed-version: Fixed from version 5.19" | ||
2871 | |||
2872 | CVE_STATUS[CVE-2022-49316] = "fixed-version: Fixed from version 5.19" | ||
2873 | |||
2874 | CVE_STATUS[CVE-2022-49317] = "fixed-version: Fixed from version 5.19" | ||
2875 | |||
2876 | CVE_STATUS[CVE-2022-49318] = "fixed-version: Fixed from version 5.19" | ||
2877 | |||
2878 | CVE_STATUS[CVE-2022-49319] = "fixed-version: Fixed from version 5.19" | ||
2879 | |||
2880 | CVE_STATUS[CVE-2022-49320] = "fixed-version: Fixed from version 5.19" | ||
2881 | |||
2882 | CVE_STATUS[CVE-2022-49321] = "fixed-version: Fixed from version 5.19" | ||
2883 | |||
2884 | CVE_STATUS[CVE-2022-49322] = "fixed-version: Fixed from version 5.19" | ||
2885 | |||
2886 | CVE_STATUS[CVE-2022-49323] = "fixed-version: Fixed from version 5.19" | ||
2887 | |||
2888 | CVE_STATUS[CVE-2022-49324] = "fixed-version: Fixed from version 5.19" | ||
2889 | |||
2890 | CVE_STATUS[CVE-2022-49325] = "fixed-version: Fixed from version 5.19" | ||
2891 | |||
2892 | CVE_STATUS[CVE-2022-49326] = "fixed-version: Fixed from version 5.19" | ||
2893 | |||
2894 | CVE_STATUS[CVE-2022-49327] = "fixed-version: Fixed from version 5.19" | ||
2895 | |||
2896 | CVE_STATUS[CVE-2022-49328] = "fixed-version: Fixed from version 5.19" | ||
2897 | |||
2898 | CVE_STATUS[CVE-2022-49329] = "fixed-version: Fixed from version 5.19" | ||
2899 | |||
2900 | CVE_STATUS[CVE-2022-49330] = "fixed-version: Fixed from version 5.19" | ||
2901 | |||
2902 | CVE_STATUS[CVE-2022-49331] = "fixed-version: Fixed from version 5.19" | ||
2903 | |||
2904 | CVE_STATUS[CVE-2022-49332] = "fixed-version: Fixed from version 5.19" | ||
2905 | |||
2906 | CVE_STATUS[CVE-2022-49333] = "fixed-version: Fixed from version 5.19" | ||
2907 | |||
2908 | CVE_STATUS[CVE-2022-49334] = "fixed-version: Fixed from version 5.19" | ||
2909 | |||
2910 | CVE_STATUS[CVE-2022-49335] = "fixed-version: Fixed from version 5.19" | ||
2911 | |||
2912 | CVE_STATUS[CVE-2022-49336] = "fixed-version: Fixed from version 5.19" | ||
2913 | |||
2914 | CVE_STATUS[CVE-2022-49337] = "fixed-version: Fixed from version 5.19" | ||
2915 | |||
2916 | CVE_STATUS[CVE-2022-49338] = "fixed-version: Fixed from version 5.19" | ||
2917 | |||
2918 | CVE_STATUS[CVE-2022-49339] = "fixed-version: Fixed from version 5.19" | ||
2919 | |||
2920 | CVE_STATUS[CVE-2022-49340] = "fixed-version: Fixed from version 5.19" | ||
2921 | |||
2922 | CVE_STATUS[CVE-2022-49341] = "fixed-version: Fixed from version 5.19" | ||
2923 | |||
2924 | CVE_STATUS[CVE-2022-49342] = "fixed-version: Fixed from version 5.19" | ||
2925 | |||
2926 | CVE_STATUS[CVE-2022-49343] = "fixed-version: Fixed from version 5.19" | ||
2927 | |||
2928 | CVE_STATUS[CVE-2022-49344] = "fixed-version: Fixed from version 5.19" | ||
2929 | |||
2930 | CVE_STATUS[CVE-2022-49345] = "fixed-version: Fixed from version 5.19" | ||
2931 | |||
2932 | CVE_STATUS[CVE-2022-49346] = "fixed-version: Fixed from version 5.19" | ||
2933 | |||
2934 | CVE_STATUS[CVE-2022-49347] = "fixed-version: Fixed from version 5.19" | ||
2935 | |||
2936 | CVE_STATUS[CVE-2022-49348] = "fixed-version: Fixed from version 5.19" | ||
2937 | |||
2938 | CVE_STATUS[CVE-2022-49349] = "fixed-version: Fixed from version 5.19" | ||
2939 | |||
2940 | CVE_STATUS[CVE-2022-49350] = "fixed-version: Fixed from version 5.19" | ||
2941 | |||
2942 | CVE_STATUS[CVE-2022-49351] = "fixed-version: Fixed from version 5.19" | ||
2943 | |||
2944 | CVE_STATUS[CVE-2022-49352] = "fixed-version: Fixed from version 5.19" | ||
2945 | |||
2946 | CVE_STATUS[CVE-2022-49353] = "fixed-version: Fixed from version 5.18.4" | ||
2947 | |||
2948 | CVE_STATUS[CVE-2022-49354] = "fixed-version: Fixed from version 5.19" | ||
2949 | |||
2950 | CVE_STATUS[CVE-2022-49356] = "fixed-version: Fixed from version 5.19" | ||
2951 | |||
2952 | CVE_STATUS[CVE-2022-49357] = "fixed-version: Fixed from version 5.19" | ||
2953 | |||
2954 | CVE_STATUS[CVE-2022-49358] = "fixed-version: Fixed from version 5.19" | ||
2955 | |||
2956 | CVE_STATUS[CVE-2022-49359] = "fixed-version: Fixed from version 5.19" | ||
2957 | |||
2958 | CVE_STATUS[CVE-2022-49360] = "fixed-version: Fixed from version 5.19" | ||
2959 | |||
2960 | CVE_STATUS[CVE-2022-49361] = "fixed-version: Fixed from version 5.19" | ||
2961 | |||
2962 | CVE_STATUS[CVE-2022-49362] = "fixed-version: Fixed from version 5.19" | ||
2963 | |||
2964 | CVE_STATUS[CVE-2022-49363] = "fixed-version: Fixed from version 5.19" | ||
2965 | |||
2966 | CVE_STATUS[CVE-2022-49364] = "fixed-version: Fixed from version 5.19" | ||
2967 | |||
2968 | CVE_STATUS[CVE-2022-49365] = "fixed-version: Fixed from version 5.19" | ||
2969 | |||
2970 | CVE_STATUS[CVE-2022-49366] = "fixed-version: Fixed from version 5.19" | ||
2971 | |||
2972 | CVE_STATUS[CVE-2022-49367] = "fixed-version: Fixed from version 5.19" | ||
2973 | |||
2974 | CVE_STATUS[CVE-2022-49368] = "fixed-version: Fixed from version 5.19" | ||
2975 | |||
2976 | CVE_STATUS[CVE-2022-49369] = "fixed-version: Fixed from version 5.19" | ||
2977 | |||
2978 | CVE_STATUS[CVE-2022-49370] = "fixed-version: Fixed from version 5.19" | ||
2979 | |||
2980 | CVE_STATUS[CVE-2022-49371] = "fixed-version: Fixed from version 5.19" | ||
2981 | |||
2982 | CVE_STATUS[CVE-2022-49372] = "fixed-version: Fixed from version 5.19" | ||
2983 | |||
2984 | CVE_STATUS[CVE-2022-49373] = "fixed-version: Fixed from version 5.19" | ||
2985 | |||
2986 | CVE_STATUS[CVE-2022-49374] = "fixed-version: Fixed from version 5.19" | ||
2987 | |||
2988 | CVE_STATUS[CVE-2022-49375] = "fixed-version: Fixed from version 5.19" | ||
2989 | |||
2990 | CVE_STATUS[CVE-2022-49376] = "fixed-version: Fixed from version 5.19" | ||
2991 | |||
2992 | CVE_STATUS[CVE-2022-49377] = "fixed-version: Fixed from version 5.19" | ||
2993 | |||
2994 | CVE_STATUS[CVE-2022-49378] = "fixed-version: Fixed from version 5.19" | ||
2995 | |||
2996 | CVE_STATUS[CVE-2022-49379] = "fixed-version: Fixed from version 5.19" | ||
2997 | |||
2998 | CVE_STATUS[CVE-2022-49380] = "fixed-version: Fixed from version 5.19" | ||
2999 | |||
3000 | CVE_STATUS[CVE-2022-49381] = "fixed-version: Fixed from version 5.19" | ||
3001 | |||
3002 | CVE_STATUS[CVE-2022-49382] = "fixed-version: Fixed from version 5.19" | ||
3003 | |||
3004 | CVE_STATUS[CVE-2022-49383] = "fixed-version: Fixed from version 5.19" | ||
3005 | |||
3006 | CVE_STATUS[CVE-2022-49384] = "fixed-version: Fixed from version 5.19" | ||
3007 | |||
3008 | CVE_STATUS[CVE-2022-49385] = "fixed-version: Fixed from version 5.19" | ||
3009 | |||
3010 | CVE_STATUS[CVE-2022-49386] = "fixed-version: Fixed from version 5.19" | ||
3011 | |||
3012 | CVE_STATUS[CVE-2022-49387] = "fixed-version: Fixed from version 5.19" | ||
3013 | |||
3014 | CVE_STATUS[CVE-2022-49388] = "fixed-version: Fixed from version 5.19" | ||
3015 | |||
3016 | CVE_STATUS[CVE-2022-49389] = "fixed-version: Fixed from version 5.19" | ||
3017 | |||
3018 | CVE_STATUS[CVE-2022-49390] = "fixed-version: Fixed from version 5.19" | ||
3019 | |||
3020 | CVE_STATUS[CVE-2022-49391] = "fixed-version: Fixed from version 5.19" | ||
3021 | |||
3022 | CVE_STATUS[CVE-2022-49392] = "fixed-version: Fixed from version 5.19" | ||
3023 | |||
3024 | CVE_STATUS[CVE-2022-49393] = "fixed-version: Fixed from version 5.19" | ||
3025 | |||
3026 | CVE_STATUS[CVE-2022-49394] = "fixed-version: Fixed from version 5.19" | ||
3027 | |||
3028 | CVE_STATUS[CVE-2022-49395] = "fixed-version: Fixed from version 5.19" | ||
3029 | |||
3030 | CVE_STATUS[CVE-2022-49396] = "fixed-version: Fixed from version 5.19" | ||
3031 | |||
3032 | CVE_STATUS[CVE-2022-49397] = "fixed-version: Fixed from version 5.19" | ||
3033 | |||
3034 | CVE_STATUS[CVE-2022-49398] = "fixed-version: Fixed from version 5.19" | ||
3035 | |||
3036 | CVE_STATUS[CVE-2022-49399] = "fixed-version: Fixed from version 5.19" | ||
3037 | |||
3038 | CVE_STATUS[CVE-2022-49400] = "fixed-version: Fixed from version 5.19" | ||
3039 | |||
3040 | CVE_STATUS[CVE-2022-49401] = "fixed-version: Fixed from version 5.19" | ||
3041 | |||
3042 | CVE_STATUS[CVE-2022-49402] = "fixed-version: Fixed from version 5.19" | ||
3043 | |||
3044 | CVE_STATUS[CVE-2022-49403] = "fixed-version: Fixed from version 5.19" | ||
3045 | |||
3046 | CVE_STATUS[CVE-2022-49404] = "fixed-version: Fixed from version 5.19" | ||
3047 | |||
3048 | CVE_STATUS[CVE-2022-49405] = "fixed-version: Fixed from version 5.19" | ||
3049 | |||
3050 | CVE_STATUS[CVE-2022-49406] = "fixed-version: Fixed from version 5.19" | ||
3051 | |||
3052 | CVE_STATUS[CVE-2022-49407] = "fixed-version: Fixed from version 5.19" | ||
3053 | |||
3054 | CVE_STATUS[CVE-2022-49408] = "fixed-version: Fixed from version 5.19" | ||
3055 | |||
3056 | CVE_STATUS[CVE-2022-49409] = "fixed-version: Fixed from version 5.19" | ||
3057 | |||
3058 | CVE_STATUS[CVE-2022-49410] = "fixed-version: Fixed from version 5.19" | ||
3059 | |||
3060 | CVE_STATUS[CVE-2022-49411] = "fixed-version: Fixed from version 5.19" | ||
3061 | |||
3062 | CVE_STATUS[CVE-2022-49412] = "fixed-version: Fixed from version 5.19" | ||
3063 | |||
3064 | CVE_STATUS[CVE-2022-49413] = "fixed-version: Fixed from version 5.19" | ||
3065 | |||
3066 | CVE_STATUS[CVE-2022-49414] = "fixed-version: Fixed from version 5.19" | ||
3067 | |||
3068 | CVE_STATUS[CVE-2022-49415] = "fixed-version: Fixed from version 5.19" | ||
3069 | |||
3070 | CVE_STATUS[CVE-2022-49416] = "fixed-version: Fixed from version 5.19" | ||
3071 | |||
3072 | CVE_STATUS[CVE-2022-49417] = "fixed-version: Fixed from version 5.19" | ||
3073 | |||
3074 | CVE_STATUS[CVE-2022-49418] = "fixed-version: Fixed from version 5.19" | ||
3075 | |||
3076 | CVE_STATUS[CVE-2022-49419] = "fixed-version: Fixed from version 5.19" | ||
3077 | |||
3078 | CVE_STATUS[CVE-2022-49420] = "fixed-version: Fixed from version 5.19" | ||
3079 | |||
3080 | CVE_STATUS[CVE-2022-49421] = "fixed-version: Fixed from version 5.19" | ||
3081 | |||
3082 | CVE_STATUS[CVE-2022-49422] = "fixed-version: Fixed from version 5.19" | ||
3083 | |||
3084 | CVE_STATUS[CVE-2022-49423] = "fixed-version: Fixed from version 5.19" | ||
3085 | |||
3086 | CVE_STATUS[CVE-2022-49424] = "fixed-version: Fixed from version 5.19" | ||
3087 | |||
3088 | CVE_STATUS[CVE-2022-49425] = "fixed-version: Fixed from version 5.19" | ||
3089 | |||
3090 | CVE_STATUS[CVE-2022-49426] = "fixed-version: Fixed from version 5.19" | ||
3091 | |||
3092 | CVE_STATUS[CVE-2022-49427] = "fixed-version: Fixed from version 5.19" | ||
3093 | |||
3094 | CVE_STATUS[CVE-2022-49428] = "fixed-version: Fixed from version 5.19" | ||
3095 | |||
3096 | CVE_STATUS[CVE-2022-49429] = "fixed-version: Fixed from version 5.19" | ||
3097 | |||
3098 | CVE_STATUS[CVE-2022-49430] = "fixed-version: Fixed from version 5.19" | ||
3099 | |||
3100 | CVE_STATUS[CVE-2022-49431] = "fixed-version: Fixed from version 5.19" | ||
3101 | |||
3102 | CVE_STATUS[CVE-2022-49432] = "fixed-version: Fixed from version 5.19" | ||
3103 | |||
3104 | CVE_STATUS[CVE-2022-49433] = "fixed-version: Fixed from version 5.19" | ||
3105 | |||
3106 | CVE_STATUS[CVE-2022-49434] = "fixed-version: Fixed from version 5.19" | ||
3107 | |||
3108 | CVE_STATUS[CVE-2022-49435] = "fixed-version: Fixed from version 5.19" | ||
3109 | |||
3110 | CVE_STATUS[CVE-2022-49436] = "fixed-version: Fixed from version 5.19" | ||
3111 | |||
3112 | CVE_STATUS[CVE-2022-49437] = "fixed-version: Fixed from version 5.19" | ||
3113 | |||
3114 | CVE_STATUS[CVE-2022-49438] = "fixed-version: Fixed from version 5.19" | ||
3115 | |||
3116 | CVE_STATUS[CVE-2022-49439] = "fixed-version: Fixed from version 5.19" | ||
3117 | |||
3118 | CVE_STATUS[CVE-2022-49440] = "fixed-version: Fixed from version 5.19" | ||
3119 | |||
3120 | CVE_STATUS[CVE-2022-49441] = "fixed-version: Fixed from version 5.19" | ||
3121 | |||
3122 | CVE_STATUS[CVE-2022-49442] = "fixed-version: Fixed from version 5.19" | ||
3123 | |||
3124 | CVE_STATUS[CVE-2022-49443] = "fixed-version: Fixed from version 5.19" | ||
3125 | |||
3126 | CVE_STATUS[CVE-2022-49444] = "fixed-version: Fixed from version 5.19" | ||
3127 | |||
3128 | CVE_STATUS[CVE-2022-49445] = "fixed-version: Fixed from version 5.19" | ||
3129 | |||
3130 | CVE_STATUS[CVE-2022-49446] = "fixed-version: Fixed from version 5.19" | ||
3131 | |||
3132 | CVE_STATUS[CVE-2022-49447] = "fixed-version: Fixed from version 5.19" | ||
3133 | |||
3134 | CVE_STATUS[CVE-2022-49448] = "fixed-version: Fixed from version 5.19" | ||
3135 | |||
3136 | CVE_STATUS[CVE-2022-49449] = "fixed-version: Fixed from version 5.19" | ||
3137 | |||
3138 | CVE_STATUS[CVE-2022-49450] = "fixed-version: Fixed from version 5.19" | ||
3139 | |||
3140 | CVE_STATUS[CVE-2022-49451] = "fixed-version: Fixed from version 5.19" | ||
3141 | |||
3142 | CVE_STATUS[CVE-2022-49452] = "fixed-version: Fixed from version 5.19" | ||
3143 | |||
3144 | CVE_STATUS[CVE-2022-49453] = "fixed-version: Fixed from version 5.19" | ||
3145 | |||
3146 | CVE_STATUS[CVE-2022-49454] = "fixed-version: Fixed from version 5.19" | ||
3147 | |||
3148 | CVE_STATUS[CVE-2022-49455] = "fixed-version: Fixed from version 5.19" | ||
3149 | |||
3150 | CVE_STATUS[CVE-2022-49456] = "fixed-version: Fixed from version 5.19" | ||
3151 | |||
3152 | CVE_STATUS[CVE-2022-49457] = "fixed-version: Fixed from version 5.19" | ||
3153 | |||
3154 | CVE_STATUS[CVE-2022-49458] = "fixed-version: Fixed from version 5.19" | ||
3155 | |||
3156 | CVE_STATUS[CVE-2022-49459] = "fixed-version: Fixed from version 5.19" | ||
3157 | |||
3158 | CVE_STATUS[CVE-2022-49460] = "fixed-version: Fixed from version 5.19" | ||
3159 | |||
3160 | CVE_STATUS[CVE-2022-49461] = "fixed-version: Fixed from version 5.19" | ||
3161 | |||
3162 | CVE_STATUS[CVE-2022-49462] = "fixed-version: Fixed from version 5.19" | ||
3163 | |||
3164 | CVE_STATUS[CVE-2022-49463] = "fixed-version: Fixed from version 5.19" | ||
3165 | |||
3166 | CVE_STATUS[CVE-2022-49464] = "fixed-version: Fixed from version 5.19" | ||
3167 | |||
3168 | CVE_STATUS[CVE-2022-49465] = "fixed-version: Fixed from version 5.19" | ||
3169 | |||
3170 | CVE_STATUS[CVE-2022-49466] = "fixed-version: Fixed from version 5.19" | ||
3171 | |||
3172 | CVE_STATUS[CVE-2022-49467] = "fixed-version: Fixed from version 5.19" | ||
3173 | |||
3174 | CVE_STATUS[CVE-2022-49468] = "fixed-version: Fixed from version 5.19" | ||
3175 | |||
3176 | CVE_STATUS[CVE-2022-49469] = "fixed-version: Fixed from version 5.19" | ||
3177 | |||
3178 | CVE_STATUS[CVE-2022-49470] = "fixed-version: Fixed from version 5.19" | ||
3179 | |||
3180 | CVE_STATUS[CVE-2022-49471] = "fixed-version: Fixed from version 5.19" | ||
3181 | |||
3182 | CVE_STATUS[CVE-2022-49472] = "fixed-version: Fixed from version 5.19" | ||
3183 | |||
3184 | CVE_STATUS[CVE-2022-49473] = "fixed-version: Fixed from version 5.19" | ||
3185 | |||
3186 | CVE_STATUS[CVE-2022-49474] = "fixed-version: Fixed from version 5.19" | ||
3187 | |||
3188 | CVE_STATUS[CVE-2022-49475] = "fixed-version: Fixed from version 5.19" | ||
3189 | |||
3190 | CVE_STATUS[CVE-2022-49476] = "fixed-version: Fixed from version 5.19" | ||
3191 | |||
3192 | CVE_STATUS[CVE-2022-49477] = "fixed-version: Fixed from version 5.19" | ||
3193 | |||
3194 | CVE_STATUS[CVE-2022-49478] = "fixed-version: Fixed from version 5.19" | ||
3195 | |||
3196 | CVE_STATUS[CVE-2022-49479] = "fixed-version: Fixed from version 5.19" | ||
3197 | |||
3198 | CVE_STATUS[CVE-2022-49480] = "fixed-version: Fixed from version 5.19" | ||
3199 | |||
3200 | CVE_STATUS[CVE-2022-49481] = "fixed-version: Fixed from version 5.19" | ||
3201 | |||
3202 | CVE_STATUS[CVE-2022-49482] = "fixed-version: Fixed from version 5.19" | ||
3203 | |||
3204 | CVE_STATUS[CVE-2022-49483] = "fixed-version: Fixed from version 5.19" | ||
3205 | |||
3206 | CVE_STATUS[CVE-2022-49484] = "fixed-version: Fixed from version 5.19" | ||
3207 | |||
3208 | CVE_STATUS[CVE-2022-49485] = "fixed-version: Fixed from version 5.19" | ||
3209 | |||
3210 | CVE_STATUS[CVE-2022-49486] = "fixed-version: Fixed from version 5.19" | ||
3211 | |||
3212 | CVE_STATUS[CVE-2022-49487] = "fixed-version: Fixed from version 5.19" | ||
3213 | |||
3214 | CVE_STATUS[CVE-2022-49488] = "fixed-version: Fixed from version 5.19" | ||
3215 | |||
3216 | CVE_STATUS[CVE-2022-49489] = "fixed-version: Fixed from version 5.19" | ||
3217 | |||
3218 | CVE_STATUS[CVE-2022-49490] = "fixed-version: Fixed from version 5.19" | ||
3219 | |||
3220 | CVE_STATUS[CVE-2022-49491] = "fixed-version: Fixed from version 5.19" | ||
3221 | |||
3222 | CVE_STATUS[CVE-2022-49492] = "fixed-version: Fixed from version 5.19" | ||
3223 | |||
3224 | CVE_STATUS[CVE-2022-49493] = "fixed-version: Fixed from version 5.19" | ||
3225 | |||
3226 | CVE_STATUS[CVE-2022-49494] = "fixed-version: Fixed from version 5.19" | ||
3227 | |||
3228 | CVE_STATUS[CVE-2022-49495] = "fixed-version: Fixed from version 5.19" | ||
3229 | |||
3230 | CVE_STATUS[CVE-2022-49496] = "fixed-version: Fixed from version 5.19" | ||
3231 | |||
3232 | CVE_STATUS[CVE-2022-49497] = "fixed-version: Fixed from version 5.19" | ||
3233 | |||
3234 | CVE_STATUS[CVE-2022-49498] = "fixed-version: Fixed from version 5.19" | ||
3235 | |||
3236 | CVE_STATUS[CVE-2022-49499] = "fixed-version: Fixed from version 5.19" | ||
3237 | |||
3238 | CVE_STATUS[CVE-2022-49500] = "fixed-version: Fixed from version 5.19" | ||
3239 | |||
3240 | CVE_STATUS[CVE-2022-49501] = "fixed-version: Fixed from version 5.19" | ||
3241 | |||
3242 | CVE_STATUS[CVE-2022-49502] = "fixed-version: Fixed from version 5.19" | ||
3243 | |||
3244 | CVE_STATUS[CVE-2022-49503] = "fixed-version: Fixed from version 5.19" | ||
3245 | |||
3246 | CVE_STATUS[CVE-2022-49504] = "fixed-version: Fixed from version 5.19" | ||
3247 | |||
3248 | CVE_STATUS[CVE-2022-49505] = "fixed-version: Fixed from version 5.19" | ||
3249 | |||
3250 | CVE_STATUS[CVE-2022-49506] = "fixed-version: Fixed from version 5.19" | ||
3251 | |||
3252 | CVE_STATUS[CVE-2022-49507] = "fixed-version: Fixed from version 5.19" | ||
3253 | |||
3254 | CVE_STATUS[CVE-2022-49508] = "fixed-version: Fixed from version 5.19" | ||
3255 | |||
3256 | CVE_STATUS[CVE-2022-49509] = "fixed-version: Fixed from version 5.19" | ||
3257 | |||
3258 | CVE_STATUS[CVE-2022-49510] = "fixed-version: Fixed from version 5.19" | ||
3259 | |||
3260 | CVE_STATUS[CVE-2022-49511] = "fixed-version: Fixed from version 5.19" | ||
3261 | |||
3262 | CVE_STATUS[CVE-2022-49512] = "fixed-version: Fixed from version 5.19" | ||
3263 | |||
3264 | CVE_STATUS[CVE-2022-49513] = "fixed-version: Fixed from version 5.19" | ||
3265 | |||
3266 | CVE_STATUS[CVE-2022-49514] = "fixed-version: Fixed from version 5.19" | ||
3267 | |||
3268 | CVE_STATUS[CVE-2022-49515] = "fixed-version: Fixed from version 5.19" | ||
3269 | |||
3270 | CVE_STATUS[CVE-2022-49516] = "fixed-version: Fixed from version 5.19" | ||
3271 | |||
3272 | CVE_STATUS[CVE-2022-49517] = "fixed-version: Fixed from version 5.19" | ||
3273 | |||
3274 | CVE_STATUS[CVE-2022-49518] = "fixed-version: Fixed from version 5.19" | ||
3275 | |||
3276 | CVE_STATUS[CVE-2022-49519] = "fixed-version: Fixed from version 5.19" | ||
3277 | |||
3278 | CVE_STATUS[CVE-2022-49520] = "fixed-version: Fixed from version 5.19" | ||
3279 | |||
3280 | CVE_STATUS[CVE-2022-49521] = "fixed-version: Fixed from version 5.19" | ||
3281 | |||
3282 | CVE_STATUS[CVE-2022-49522] = "fixed-version: Fixed from version 5.19" | ||
3283 | |||
3284 | CVE_STATUS[CVE-2022-49523] = "fixed-version: Fixed from version 5.19" | ||
3285 | |||
3286 | CVE_STATUS[CVE-2022-49524] = "fixed-version: Fixed from version 5.19" | ||
3287 | |||
3288 | CVE_STATUS[CVE-2022-49525] = "fixed-version: Fixed from version 5.19" | ||
3289 | |||
3290 | CVE_STATUS[CVE-2022-49526] = "fixed-version: Fixed from version 5.19" | ||
3291 | |||
3292 | CVE_STATUS[CVE-2022-49527] = "fixed-version: Fixed from version 5.19" | ||
3293 | |||
3294 | CVE_STATUS[CVE-2022-49528] = "fixed-version: Fixed from version 5.19" | ||
3295 | |||
3296 | CVE_STATUS[CVE-2022-49529] = "fixed-version: Fixed from version 5.19" | ||
3297 | |||
3298 | CVE_STATUS[CVE-2022-49530] = "fixed-version: Fixed from version 5.19" | ||
3299 | |||
3300 | CVE_STATUS[CVE-2022-49531] = "fixed-version: Fixed from version 5.19" | ||
3301 | |||
3302 | CVE_STATUS[CVE-2022-49532] = "fixed-version: Fixed from version 5.19" | ||
3303 | |||
3304 | CVE_STATUS[CVE-2022-49533] = "fixed-version: Fixed from version 5.19" | ||
3305 | |||
3306 | CVE_STATUS[CVE-2022-49534] = "fixed-version: Fixed from version 5.19" | ||
3307 | |||
3308 | CVE_STATUS[CVE-2022-49535] = "fixed-version: Fixed from version 5.19" | ||
3309 | |||
3310 | CVE_STATUS[CVE-2022-49536] = "fixed-version: Fixed from version 5.19" | ||
3311 | |||
3312 | CVE_STATUS[CVE-2022-49537] = "fixed-version: Fixed from version 5.19" | ||
3313 | |||
3314 | CVE_STATUS[CVE-2022-49538] = "fixed-version: Fixed from version 5.19" | ||
3315 | |||
3316 | CVE_STATUS[CVE-2022-49539] = "fixed-version: Fixed from version 5.19" | ||
3317 | |||
3318 | CVE_STATUS[CVE-2022-49540] = "fixed-version: Fixed from version 5.19" | ||
3319 | |||
3320 | CVE_STATUS[CVE-2022-49541] = "fixed-version: Fixed from version 5.19" | ||
3321 | |||
3322 | CVE_STATUS[CVE-2022-49542] = "fixed-version: Fixed from version 5.19" | ||
3323 | |||
3324 | CVE_STATUS[CVE-2022-49543] = "fixed-version: Fixed from version 5.19" | ||
3325 | |||
3326 | CVE_STATUS[CVE-2022-49544] = "fixed-version: Fixed from version 5.19" | ||
3327 | |||
3328 | CVE_STATUS[CVE-2022-49545] = "fixed-version: Fixed from version 5.19" | ||
3329 | |||
3330 | CVE_STATUS[CVE-2022-49546] = "fixed-version: Fixed from version 5.19" | ||
3331 | |||
3332 | CVE_STATUS[CVE-2022-49547] = "fixed-version: Fixed from version 5.19" | ||
3333 | |||
3334 | CVE_STATUS[CVE-2022-49548] = "fixed-version: Fixed from version 5.19" | ||
3335 | |||
3336 | CVE_STATUS[CVE-2022-49549] = "fixed-version: Fixed from version 5.19" | ||
3337 | |||
3338 | CVE_STATUS[CVE-2022-49550] = "fixed-version: Fixed from version 5.19" | ||
3339 | |||
3340 | CVE_STATUS[CVE-2022-49551] = "fixed-version: Fixed from version 5.19" | ||
3341 | |||
3342 | CVE_STATUS[CVE-2022-49552] = "fixed-version: Fixed from version 5.19" | ||
3343 | |||
3344 | CVE_STATUS[CVE-2022-49553] = "fixed-version: Fixed from version 5.19" | ||
3345 | |||
3346 | CVE_STATUS[CVE-2022-49554] = "fixed-version: Fixed from version 5.19" | ||
3347 | |||
3348 | CVE_STATUS[CVE-2022-49555] = "fixed-version: Fixed from version 5.19" | ||
3349 | |||
3350 | CVE_STATUS[CVE-2022-49556] = "fixed-version: Fixed from version 5.19" | ||
3351 | |||
3352 | CVE_STATUS[CVE-2022-49557] = "fixed-version: Fixed from version 5.19" | ||
3353 | |||
3354 | CVE_STATUS[CVE-2022-49558] = "fixed-version: Fixed from version 5.19" | ||
3355 | |||
3356 | CVE_STATUS[CVE-2022-49559] = "fixed-version: Fixed from version 5.19" | ||
3357 | |||
3358 | CVE_STATUS[CVE-2022-49560] = "fixed-version: Fixed from version 5.19" | ||
3359 | |||
3360 | CVE_STATUS[CVE-2022-49561] = "fixed-version: Fixed from version 5.19" | ||
3361 | |||
3362 | CVE_STATUS[CVE-2022-49562] = "fixed-version: Fixed from version 5.19" | ||
3363 | |||
3364 | CVE_STATUS[CVE-2022-49563] = "fixed-version: Fixed from version 5.19" | ||
3365 | |||
3366 | CVE_STATUS[CVE-2022-49564] = "fixed-version: Fixed from version 5.19" | ||
3367 | |||
3368 | CVE_STATUS[CVE-2022-49565] = "fixed-version: Fixed from version 5.19" | ||
3369 | |||
3370 | CVE_STATUS[CVE-2022-49566] = "fixed-version: Fixed from version 5.19" | ||
3371 | |||
3372 | CVE_STATUS[CVE-2022-49567] = "fixed-version: Fixed from version 5.19" | ||
3373 | |||
3374 | CVE_STATUS[CVE-2022-49568] = "fixed-version: Fixed from version 5.19" | ||
3375 | |||
3376 | CVE_STATUS[CVE-2022-49569] = "fixed-version: Fixed from version 5.19" | ||
3377 | |||
3378 | CVE_STATUS[CVE-2022-49570] = "fixed-version: Fixed from version 5.19" | ||
3379 | |||
3380 | CVE_STATUS[CVE-2022-49571] = "fixed-version: Fixed from version 5.19" | ||
3381 | |||
3382 | CVE_STATUS[CVE-2022-49572] = "fixed-version: Fixed from version 5.19" | ||
3383 | |||
3384 | CVE_STATUS[CVE-2022-49573] = "fixed-version: Fixed from version 5.19" | ||
3385 | |||
3386 | CVE_STATUS[CVE-2022-49574] = "fixed-version: Fixed from version 5.19" | ||
3387 | |||
3388 | CVE_STATUS[CVE-2022-49575] = "fixed-version: Fixed from version 5.19" | ||
3389 | |||
3390 | CVE_STATUS[CVE-2022-49576] = "fixed-version: Fixed from version 5.19" | ||
3391 | |||
3392 | CVE_STATUS[CVE-2022-49577] = "fixed-version: Fixed from version 5.19" | ||
3393 | |||
3394 | CVE_STATUS[CVE-2022-49578] = "fixed-version: Fixed from version 5.19" | ||
3395 | |||
3396 | CVE_STATUS[CVE-2022-49579] = "fixed-version: Fixed from version 5.19" | ||
3397 | |||
3398 | CVE_STATUS[CVE-2022-49580] = "fixed-version: Fixed from version 5.19" | ||
3399 | |||
3400 | CVE_STATUS[CVE-2022-49581] = "fixed-version: Fixed from version 5.19" | ||
3401 | |||
3402 | CVE_STATUS[CVE-2022-49582] = "fixed-version: Fixed from version 5.19" | ||
3403 | |||
3404 | CVE_STATUS[CVE-2022-49583] = "fixed-version: Fixed from version 5.19" | ||
3405 | |||
3406 | CVE_STATUS[CVE-2022-49584] = "fixed-version: Fixed from version 5.19" | ||
3407 | |||
3408 | CVE_STATUS[CVE-2022-49585] = "fixed-version: Fixed from version 5.19" | ||
3409 | |||
3410 | CVE_STATUS[CVE-2022-49586] = "fixed-version: Fixed from version 5.19" | ||
3411 | |||
3412 | CVE_STATUS[CVE-2022-49587] = "fixed-version: Fixed from version 5.19" | ||
3413 | |||
3414 | CVE_STATUS[CVE-2022-49588] = "fixed-version: Fixed from version 5.19" | ||
3415 | |||
3416 | CVE_STATUS[CVE-2022-49589] = "fixed-version: Fixed from version 5.19" | ||
3417 | |||
3418 | CVE_STATUS[CVE-2022-49590] = "fixed-version: Fixed from version 5.19" | ||
3419 | |||
3420 | CVE_STATUS[CVE-2022-49591] = "fixed-version: Fixed from version 5.19" | ||
3421 | |||
3422 | CVE_STATUS[CVE-2022-49592] = "fixed-version: Fixed from version 5.19" | ||
3423 | |||
3424 | CVE_STATUS[CVE-2022-49593] = "fixed-version: Fixed from version 5.19" | ||
3425 | |||
3426 | CVE_STATUS[CVE-2022-49594] = "fixed-version: Fixed from version 5.19" | ||
3427 | |||
3428 | CVE_STATUS[CVE-2022-49595] = "fixed-version: Fixed from version 5.19" | ||
3429 | |||
3430 | CVE_STATUS[CVE-2022-49596] = "fixed-version: Fixed from version 5.19" | ||
3431 | |||
3432 | CVE_STATUS[CVE-2022-49597] = "fixed-version: Fixed from version 5.19" | ||
3433 | |||
3434 | CVE_STATUS[CVE-2022-49598] = "fixed-version: Fixed from version 5.19" | ||
3435 | |||
3436 | CVE_STATUS[CVE-2022-49599] = "fixed-version: Fixed from version 5.19" | ||
3437 | |||
3438 | CVE_STATUS[CVE-2022-49600] = "fixed-version: Fixed from version 5.19" | ||
3439 | |||
3440 | CVE_STATUS[CVE-2022-49601] = "fixed-version: Fixed from version 5.19" | ||
3441 | |||
3442 | CVE_STATUS[CVE-2022-49602] = "fixed-version: Fixed from version 5.19" | ||
3443 | |||
3444 | CVE_STATUS[CVE-2022-49603] = "fixed-version: Fixed from version 5.19" | ||
3445 | |||
3446 | CVE_STATUS[CVE-2022-49604] = "fixed-version: Fixed from version 5.19" | ||
3447 | |||
3448 | CVE_STATUS[CVE-2022-49605] = "fixed-version: Fixed from version 5.19" | ||
3449 | |||
3450 | CVE_STATUS[CVE-2022-49606] = "fixed-version: Fixed from version 5.19" | ||
3451 | |||
3452 | CVE_STATUS[CVE-2022-49607] = "fixed-version: Fixed from version 5.19" | ||
3453 | |||
3454 | CVE_STATUS[CVE-2022-49608] = "fixed-version: Fixed from version 5.19" | ||
3455 | |||
3456 | CVE_STATUS[CVE-2022-49609] = "fixed-version: Fixed from version 5.19" | ||
3457 | |||
3458 | CVE_STATUS[CVE-2022-49610] = "fixed-version: Fixed from version 5.19" | ||
3459 | |||
3460 | CVE_STATUS[CVE-2022-49611] = "fixed-version: Fixed from version 5.19" | ||
3461 | |||
3462 | CVE_STATUS[CVE-2022-49612] = "fixed-version: Fixed from version 5.19" | ||
3463 | |||
3464 | CVE_STATUS[CVE-2022-49613] = "fixed-version: Fixed from version 5.19" | ||
3465 | |||
3466 | CVE_STATUS[CVE-2022-49615] = "fixed-version: Fixed from version 5.19" | ||
3467 | |||
3468 | CVE_STATUS[CVE-2022-49616] = "fixed-version: Fixed from version 5.19" | ||
3469 | |||
3470 | CVE_STATUS[CVE-2022-49617] = "fixed-version: Fixed from version 5.19" | ||
3471 | |||
3472 | CVE_STATUS[CVE-2022-49618] = "fixed-version: Fixed from version 5.19" | ||
3473 | |||
3474 | CVE_STATUS[CVE-2022-49619] = "fixed-version: Fixed from version 5.19" | ||
3475 | |||
3476 | CVE_STATUS[CVE-2022-49620] = "fixed-version: Fixed from version 5.19" | ||
3477 | |||
3478 | CVE_STATUS[CVE-2022-49621] = "fixed-version: Fixed from version 5.19" | ||
3479 | |||
3480 | CVE_STATUS[CVE-2022-49622] = "fixed-version: Fixed from version 5.19" | ||
3481 | |||
3482 | CVE_STATUS[CVE-2022-49623] = "fixed-version: Fixed from version 5.19" | ||
3483 | |||
3484 | CVE_STATUS[CVE-2022-49624] = "fixed-version: Fixed from version 5.19" | ||
3485 | |||
3486 | CVE_STATUS[CVE-2022-49625] = "fixed-version: Fixed from version 5.19" | ||
3487 | |||
3488 | CVE_STATUS[CVE-2022-49626] = "fixed-version: Fixed from version 5.19" | ||
3489 | |||
3490 | CVE_STATUS[CVE-2022-49627] = "fixed-version: Fixed from version 5.19" | ||
3491 | |||
3492 | CVE_STATUS[CVE-2022-49628] = "fixed-version: Fixed from version 5.19" | ||
3493 | |||
3494 | CVE_STATUS[CVE-2022-49629] = "fixed-version: Fixed from version 5.19" | ||
3495 | |||
3496 | CVE_STATUS[CVE-2022-49630] = "fixed-version: Fixed from version 5.19" | ||
3497 | |||
3498 | CVE_STATUS[CVE-2022-49631] = "fixed-version: Fixed from version 5.19" | ||
3499 | |||
3500 | CVE_STATUS[CVE-2022-49632] = "fixed-version: Fixed from version 5.19" | ||
3501 | |||
3502 | CVE_STATUS[CVE-2022-49633] = "fixed-version: Fixed from version 5.19" | ||
3503 | |||
3504 | CVE_STATUS[CVE-2022-49634] = "fixed-version: Fixed from version 5.19" | ||
3505 | |||
3506 | CVE_STATUS[CVE-2022-49635] = "fixed-version: Fixed from version 5.19" | ||
3507 | |||
3508 | CVE_STATUS[CVE-2022-49636] = "fixed-version: Fixed from version 5.19" | ||
3509 | |||
3510 | CVE_STATUS[CVE-2022-49637] = "fixed-version: Fixed from version 5.19" | ||
3511 | |||
3512 | CVE_STATUS[CVE-2022-49638] = "fixed-version: Fixed from version 5.19" | ||
3513 | |||
3514 | CVE_STATUS[CVE-2022-49639] = "fixed-version: Fixed from version 5.19" | ||
3515 | |||
3516 | CVE_STATUS[CVE-2022-49640] = "fixed-version: Fixed from version 5.19" | ||
3517 | |||
3518 | CVE_STATUS[CVE-2022-49641] = "fixed-version: Fixed from version 5.19" | ||
3519 | |||
3520 | CVE_STATUS[CVE-2022-49642] = "fixed-version: Fixed from version 5.19" | ||
3521 | |||
3522 | CVE_STATUS[CVE-2022-49643] = "fixed-version: Fixed from version 5.19" | ||
3523 | |||
3524 | CVE_STATUS[CVE-2022-49644] = "fixed-version: Fixed from version 5.19" | ||
3525 | |||
3526 | CVE_STATUS[CVE-2022-49645] = "fixed-version: Fixed from version 5.19" | ||
3527 | |||
3528 | CVE_STATUS[CVE-2022-49646] = "fixed-version: Fixed from version 5.19" | ||
3529 | |||
3530 | CVE_STATUS[CVE-2022-49647] = "fixed-version: Fixed from version 5.19" | ||
3531 | |||
3532 | CVE_STATUS[CVE-2022-49648] = "fixed-version: Fixed from version 5.19" | ||
3533 | |||
3534 | CVE_STATUS[CVE-2022-49649] = "fixed-version: Fixed from version 5.19" | ||
3535 | |||
3536 | CVE_STATUS[CVE-2022-49650] = "fixed-version: Fixed from version 5.19" | ||
3537 | |||
3538 | CVE_STATUS[CVE-2022-49651] = "fixed-version: Fixed from version 5.19" | ||
3539 | |||
3540 | CVE_STATUS[CVE-2022-49652] = "fixed-version: Fixed from version 5.19" | ||
3541 | |||
3542 | CVE_STATUS[CVE-2022-49653] = "fixed-version: Fixed from version 5.19" | ||
3543 | |||
3544 | CVE_STATUS[CVE-2022-49654] = "fixed-version: Fixed from version 5.19" | ||
3545 | |||
3546 | CVE_STATUS[CVE-2022-49655] = "fixed-version: Fixed from version 5.19" | ||
3547 | |||
3548 | CVE_STATUS[CVE-2022-49656] = "fixed-version: Fixed from version 5.19" | ||
3549 | |||
3550 | CVE_STATUS[CVE-2022-49657] = "fixed-version: Fixed from version 5.19" | ||
3551 | |||
3552 | CVE_STATUS[CVE-2022-49658] = "fixed-version: Fixed from version 5.19" | ||
3553 | |||
3554 | CVE_STATUS[CVE-2022-49659] = "fixed-version: Fixed from version 5.19" | ||
3555 | |||
3556 | CVE_STATUS[CVE-2022-49661] = "fixed-version: Fixed from version 5.19" | ||
3557 | |||
3558 | CVE_STATUS[CVE-2022-49662] = "fixed-version: Fixed from version 5.19" | ||
3559 | |||
3560 | CVE_STATUS[CVE-2022-49663] = "fixed-version: Fixed from version 5.19" | ||
3561 | |||
3562 | CVE_STATUS[CVE-2022-49664] = "fixed-version: Fixed from version 5.19" | ||
3563 | |||
3564 | CVE_STATUS[CVE-2022-49665] = "fixed-version: Fixed from version 5.19" | ||
3565 | |||
3566 | CVE_STATUS[CVE-2022-49666] = "fixed-version: Fixed from version 5.19" | ||
3567 | |||
3568 | CVE_STATUS[CVE-2022-49667] = "fixed-version: Fixed from version 5.19" | ||
3569 | |||
3570 | CVE_STATUS[CVE-2022-49668] = "fixed-version: Fixed from version 5.19" | ||
3571 | |||
3572 | CVE_STATUS[CVE-2022-49669] = "fixed-version: Fixed from version 5.19" | ||
3573 | |||
3574 | CVE_STATUS[CVE-2022-49670] = "fixed-version: Fixed from version 5.19" | ||
3575 | |||
3576 | CVE_STATUS[CVE-2022-49671] = "fixed-version: Fixed from version 5.19" | ||
3577 | |||
3578 | CVE_STATUS[CVE-2022-49672] = "fixed-version: Fixed from version 5.19" | ||
3579 | |||
3580 | CVE_STATUS[CVE-2022-49673] = "fixed-version: Fixed from version 5.19" | ||
3581 | |||
3582 | CVE_STATUS[CVE-2022-49674] = "fixed-version: Fixed from version 5.19" | ||
3583 | |||
3584 | CVE_STATUS[CVE-2022-49675] = "fixed-version: Fixed from version 5.19" | ||
3585 | |||
3586 | CVE_STATUS[CVE-2022-49676] = "fixed-version: Fixed from version 5.19" | ||
3587 | |||
3588 | CVE_STATUS[CVE-2022-49677] = "fixed-version: Fixed from version 5.19" | ||
3589 | |||
3590 | CVE_STATUS[CVE-2022-49678] = "fixed-version: Fixed from version 5.19" | ||
3591 | |||
3592 | CVE_STATUS[CVE-2022-49679] = "fixed-version: Fixed from version 5.19" | ||
3593 | |||
3594 | CVE_STATUS[CVE-2022-49680] = "fixed-version: Fixed from version 5.19" | ||
3595 | |||
3596 | CVE_STATUS[CVE-2022-49681] = "fixed-version: Fixed from version 5.19" | ||
3597 | |||
3598 | CVE_STATUS[CVE-2022-49682] = "fixed-version: Fixed from version 5.19" | ||
3599 | |||
3600 | CVE_STATUS[CVE-2022-49683] = "fixed-version: Fixed from version 5.19" | ||
3601 | |||
3602 | CVE_STATUS[CVE-2022-49684] = "fixed-version: Fixed from version 5.19" | ||
3603 | |||
3604 | CVE_STATUS[CVE-2022-49685] = "fixed-version: Fixed from version 5.19" | ||
3605 | |||
3606 | CVE_STATUS[CVE-2022-49686] = "fixed-version: Fixed from version 5.19" | ||
3607 | |||
3608 | CVE_STATUS[CVE-2022-49687] = "fixed-version: Fixed from version 5.19" | ||
3609 | |||
3610 | CVE_STATUS[CVE-2022-49688] = "fixed-version: Fixed from version 5.19" | ||
3611 | |||
3612 | CVE_STATUS[CVE-2022-49691] = "fixed-version: Fixed from version 5.19" | ||
3613 | |||
3614 | CVE_STATUS[CVE-2022-49692] = "fixed-version: Fixed from version 5.19" | ||
3615 | |||
3616 | CVE_STATUS[CVE-2022-49693] = "fixed-version: Fixed from version 5.19" | ||
3617 | |||
3618 | CVE_STATUS[CVE-2022-49694] = "fixed-version: Fixed from version 5.19" | ||
3619 | |||
3620 | CVE_STATUS[CVE-2022-49695] = "fixed-version: Fixed from version 5.19" | ||
3621 | |||
3622 | CVE_STATUS[CVE-2022-49696] = "fixed-version: Fixed from version 5.19" | ||
3623 | |||
3624 | CVE_STATUS[CVE-2022-49697] = "fixed-version: Fixed from version 5.19" | ||
3625 | |||
3626 | CVE_STATUS[CVE-2022-49698] = "fixed-version: Fixed from version 5.19" | ||
3627 | |||
3628 | CVE_STATUS[CVE-2022-49699] = "fixed-version: Fixed from version 5.19" | ||
3629 | |||
3630 | CVE_STATUS[CVE-2022-49700] = "fixed-version: Fixed from version 5.19" | ||
3631 | |||
3632 | CVE_STATUS[CVE-2022-49701] = "fixed-version: Fixed from version 5.19" | ||
3633 | |||
3634 | CVE_STATUS[CVE-2022-49702] = "fixed-version: Fixed from version 5.19" | ||
3635 | |||
3636 | CVE_STATUS[CVE-2022-49703] = "fixed-version: Fixed from version 5.19" | ||
3637 | |||
3638 | CVE_STATUS[CVE-2022-49704] = "fixed-version: Fixed from version 5.19" | ||
3639 | |||
3640 | CVE_STATUS[CVE-2022-49705] = "fixed-version: Fixed from version 5.19" | ||
3641 | |||
3642 | CVE_STATUS[CVE-2022-49706] = "fixed-version: Fixed from version 5.19" | ||
3643 | |||
3644 | CVE_STATUS[CVE-2022-49707] = "fixed-version: Fixed from version 5.19" | ||
3645 | |||
3646 | CVE_STATUS[CVE-2022-49708] = "fixed-version: Fixed from version 5.19" | ||
3647 | |||
3648 | CVE_STATUS[CVE-2022-49709] = "fixed-version: Fixed from version 5.19" | ||
3649 | |||
3650 | CVE_STATUS[CVE-2022-49710] = "fixed-version: Fixed from version 5.19" | ||
3651 | |||
3652 | CVE_STATUS[CVE-2022-49711] = "fixed-version: Fixed from version 5.19" | ||
3653 | |||
3654 | CVE_STATUS[CVE-2022-49712] = "fixed-version: Fixed from version 5.19" | ||
3655 | |||
3656 | CVE_STATUS[CVE-2022-49713] = "fixed-version: Fixed from version 5.19" | ||
3657 | |||
3658 | CVE_STATUS[CVE-2022-49714] = "fixed-version: Fixed from version 5.19" | ||
3659 | |||
3660 | CVE_STATUS[CVE-2022-49715] = "fixed-version: Fixed from version 5.19" | ||
3661 | |||
3662 | CVE_STATUS[CVE-2022-49716] = "fixed-version: Fixed from version 5.19" | ||
3663 | |||
3664 | CVE_STATUS[CVE-2022-49717] = "fixed-version: Fixed from version 5.19" | ||
3665 | |||
3666 | CVE_STATUS[CVE-2022-49718] = "fixed-version: Fixed from version 5.19" | ||
3667 | |||
3668 | CVE_STATUS[CVE-2022-49719] = "fixed-version: Fixed from version 5.19" | ||
3669 | |||
3670 | CVE_STATUS[CVE-2022-49720] = "fixed-version: Fixed from version 5.19" | ||
3671 | |||
3672 | CVE_STATUS[CVE-2022-49721] = "fixed-version: Fixed from version 5.19" | ||
3673 | |||
3674 | CVE_STATUS[CVE-2022-49722] = "fixed-version: Fixed from version 5.19" | ||
3675 | |||
3676 | CVE_STATUS[CVE-2022-49723] = "fixed-version: Fixed from version 5.19" | ||
3677 | |||
3678 | CVE_STATUS[CVE-2022-49724] = "fixed-version: Fixed from version 5.19" | ||
3679 | |||
3680 | CVE_STATUS[CVE-2022-49725] = "fixed-version: Fixed from version 5.19" | ||
3681 | |||
3682 | CVE_STATUS[CVE-2022-49726] = "fixed-version: Fixed from version 5.19" | ||
3683 | |||
3684 | CVE_STATUS[CVE-2022-49727] = "fixed-version: Fixed from version 5.19" | ||
3685 | |||
3686 | CVE_STATUS[CVE-2022-49728] = "fixed-version: Fixed from version 5.19" | ||
3687 | |||
3688 | CVE_STATUS[CVE-2022-49729] = "fixed-version: Fixed from version 5.19" | ||
3689 | |||
3690 | CVE_STATUS[CVE-2022-49730] = "fixed-version: Fixed from version 5.19" | ||
3691 | |||
3692 | CVE_STATUS[CVE-2022-49731] = "fixed-version: Fixed from version 5.19" | ||
3693 | |||
3694 | CVE_STATUS[CVE-2022-49732] = "fixed-version: Fixed from version 5.19" | ||
3695 | |||
3696 | CVE_STATUS[CVE-2022-49733] = "fixed-version: Fixed from version 6.0" | ||
3697 | |||
3698 | CVE_STATUS[CVE-2022-49738] = "fixed-version: Fixed from version 6.2" | ||
3699 | |||
3700 | CVE_STATUS[CVE-2022-49739] = "fixed-version: Fixed from version 6.2" | ||
3701 | |||
3702 | CVE_STATUS[CVE-2022-49740] = "fixed-version: Fixed from version 6.2" | ||
3703 | |||
3704 | CVE_STATUS[CVE-2022-49741] = "fixed-version: Fixed from version 6.2" | ||
3705 | |||
3706 | CVE_STATUS[CVE-2022-49742] = "fixed-version: Fixed from version 6.2" | ||
3707 | |||
3708 | CVE_STATUS[CVE-2022-49743] = "fixed-version: Fixed from version 6.2" | ||
3709 | |||
3710 | CVE_STATUS[CVE-2022-49744] = "fixed-version: Fixed from version 6.2" | ||
3711 | |||
3712 | CVE_STATUS[CVE-2022-49745] = "fixed-version: Fixed from version 6.2" | ||
3713 | |||
3714 | CVE_STATUS[CVE-2022-49746] = "fixed-version: Fixed from version 6.2" | ||
3715 | |||
3716 | CVE_STATUS[CVE-2022-49747] = "fixed-version: Fixed from version 6.2" | ||
3717 | |||
3718 | CVE_STATUS[CVE-2022-49748] = "fixed-version: Fixed from version 6.2" | ||
3719 | |||
3720 | CVE_STATUS[CVE-2022-49749] = "fixed-version: Fixed from version 6.2" | ||
3721 | |||
3722 | CVE_STATUS[CVE-2022-49750] = "fixed-version: Fixed from version 6.2" | ||
3723 | |||
3724 | CVE_STATUS[CVE-2022-49751] = "fixed-version: Fixed from version 6.2" | ||
3725 | |||
3726 | CVE_STATUS[CVE-2022-49752] = "fixed-version: Fixed from version 6.2" | ||
3727 | |||
3728 | CVE_STATUS[CVE-2022-49753] = "fixed-version: Fixed from version 6.2" | ||
3729 | |||
3730 | CVE_STATUS[CVE-2022-49754] = "fixed-version: Fixed from version 6.2" | ||
3731 | |||
3732 | CVE_STATUS[CVE-2022-49755] = "fixed-version: Fixed from version 6.2" | ||
3733 | |||
3734 | CVE_STATUS[CVE-2022-49756] = "fixed-version: Fixed from version 6.2" | ||
3735 | |||
3736 | CVE_STATUS[CVE-2022-49757] = "fixed-version: Fixed from version 6.2" | ||
3737 | |||
3738 | CVE_STATUS[CVE-2022-49758] = "fixed-version: Fixed from version 6.2" | ||
3739 | |||
3740 | CVE_STATUS[CVE-2022-49759] = "fixed-version: Fixed from version 6.2" | ||
3741 | |||
3742 | CVE_STATUS[CVE-2022-49760] = "fixed-version: Fixed from version 6.2" | ||
3743 | |||
3744 | CVE_STATUS[CVE-2022-49761] = "fixed-version: Fixed from version 6.2" | ||
3745 | |||
3746 | CVE_STATUS[CVE-2022-49762] = "fixed-version: Fixed from version 6.1" | ||
3747 | |||
3748 | CVE_STATUS[CVE-2022-49763] = "fixed-version: Fixed from version 6.1" | ||
3749 | |||
3750 | CVE_STATUS[CVE-2022-49764] = "fixed-version: Fixed from version 6.1" | ||
3751 | |||
3752 | CVE_STATUS[CVE-2022-49765] = "fixed-version: Fixed from version 6.1" | ||
3753 | |||
3754 | CVE_STATUS[CVE-2022-49766] = "fixed-version: Fixed from version 6.1" | ||
3755 | |||
3756 | CVE_STATUS[CVE-2022-49767] = "fixed-version: Fixed from version 6.1" | ||
3757 | |||
3758 | CVE_STATUS[CVE-2022-49768] = "fixed-version: Fixed from version 6.1" | ||
3759 | |||
3760 | CVE_STATUS[CVE-2022-49769] = "fixed-version: Fixed from version 6.1" | ||
3761 | |||
3762 | CVE_STATUS[CVE-2022-49770] = "fixed-version: Fixed from version 6.1" | ||
3763 | |||
3764 | CVE_STATUS[CVE-2022-49771] = "fixed-version: Fixed from version 6.1" | ||
3765 | |||
3766 | CVE_STATUS[CVE-2022-49772] = "fixed-version: Fixed from version 6.1" | ||
3767 | |||
3768 | CVE_STATUS[CVE-2022-49773] = "fixed-version: Fixed from version 6.1" | ||
3769 | |||
3770 | CVE_STATUS[CVE-2022-49774] = "fixed-version: Fixed from version 6.1" | ||
3771 | |||
3772 | CVE_STATUS[CVE-2022-49775] = "fixed-version: Fixed from version 6.1" | ||
3773 | |||
3774 | CVE_STATUS[CVE-2022-49776] = "fixed-version: Fixed from version 6.1" | ||
3775 | |||
3776 | CVE_STATUS[CVE-2022-49777] = "fixed-version: Fixed from version 6.1" | ||
3777 | |||
3778 | CVE_STATUS[CVE-2022-49778] = "fixed-version: Fixed from version 6.1" | ||
3779 | |||
3780 | CVE_STATUS[CVE-2022-49779] = "fixed-version: Fixed from version 6.1" | ||
3781 | |||
3782 | CVE_STATUS[CVE-2022-49780] = "fixed-version: Fixed from version 6.1" | ||
3783 | |||
3784 | CVE_STATUS[CVE-2022-49781] = "fixed-version: Fixed from version 6.1" | ||
3785 | |||
3786 | CVE_STATUS[CVE-2022-49782] = "fixed-version: Fixed from version 6.0.10" | ||
3787 | |||
3788 | CVE_STATUS[CVE-2022-49783] = "fixed-version: Fixed from version 6.1" | ||
3789 | |||
3790 | CVE_STATUS[CVE-2022-49784] = "fixed-version: Fixed from version 6.1" | ||
3791 | |||
3792 | CVE_STATUS[CVE-2022-49785] = "fixed-version: Fixed from version 6.1" | ||
3793 | |||
3794 | CVE_STATUS[CVE-2022-49786] = "fixed-version: Fixed from version 6.1" | ||
3795 | |||
3796 | CVE_STATUS[CVE-2022-49787] = "fixed-version: Fixed from version 6.1" | ||
3797 | |||
3798 | CVE_STATUS[CVE-2022-49788] = "fixed-version: Fixed from version 6.1" | ||
3799 | |||
3800 | CVE_STATUS[CVE-2022-49789] = "fixed-version: Fixed from version 6.1" | ||
3801 | |||
3802 | CVE_STATUS[CVE-2022-49790] = "fixed-version: Fixed from version 6.1" | ||
3803 | |||
3804 | CVE_STATUS[CVE-2022-49791] = "fixed-version: Fixed from version 6.1" | ||
3805 | |||
3806 | CVE_STATUS[CVE-2022-49792] = "fixed-version: Fixed from version 6.1" | ||
3807 | |||
3808 | CVE_STATUS[CVE-2022-49793] = "fixed-version: Fixed from version 6.1" | ||
3809 | |||
3810 | CVE_STATUS[CVE-2022-49794] = "fixed-version: Fixed from version 6.1" | ||
3811 | |||
3812 | CVE_STATUS[CVE-2022-49795] = "fixed-version: Fixed from version 6.1" | ||
3813 | |||
3814 | CVE_STATUS[CVE-2022-49796] = "fixed-version: Fixed from version 6.1" | ||
3815 | |||
3816 | CVE_STATUS[CVE-2022-49797] = "fixed-version: Fixed from version 6.1" | ||
3817 | |||
3818 | CVE_STATUS[CVE-2022-49798] = "fixed-version: Fixed from version 6.1" | ||
3819 | |||
3820 | CVE_STATUS[CVE-2022-49799] = "fixed-version: Fixed from version 6.1" | ||
3821 | |||
3822 | CVE_STATUS[CVE-2022-49800] = "fixed-version: Fixed from version 6.1" | ||
3823 | |||
3824 | CVE_STATUS[CVE-2022-49801] = "fixed-version: Fixed from version 6.1" | ||
3825 | |||
3826 | CVE_STATUS[CVE-2022-49802] = "fixed-version: Fixed from version 6.1" | ||
3827 | |||
3828 | CVE_STATUS[CVE-2022-49803] = "fixed-version: Fixed from version 6.1" | ||
3829 | |||
3830 | CVE_STATUS[CVE-2022-49804] = "fixed-version: Fixed from version 6.1" | ||
3831 | |||
3832 | CVE_STATUS[CVE-2022-49805] = "fixed-version: Fixed from version 6.1" | ||
3833 | |||
3834 | CVE_STATUS[CVE-2022-49806] = "fixed-version: Fixed from version 6.1" | ||
3835 | |||
3836 | CVE_STATUS[CVE-2022-49807] = "fixed-version: Fixed from version 6.1" | ||
3837 | |||
3838 | CVE_STATUS[CVE-2022-49808] = "fixed-version: Fixed from version 6.1" | ||
3839 | |||
3840 | CVE_STATUS[CVE-2022-49809] = "fixed-version: Fixed from version 6.1" | ||
3841 | |||
3842 | CVE_STATUS[CVE-2022-49810] = "fixed-version: Fixed from version 6.1" | ||
3843 | |||
3844 | CVE_STATUS[CVE-2022-49811] = "fixed-version: Fixed from version 6.1" | ||
3845 | |||
3846 | CVE_STATUS[CVE-2022-49812] = "fixed-version: Fixed from version 6.1" | ||
3847 | |||
3848 | CVE_STATUS[CVE-2022-49813] = "fixed-version: Fixed from version 6.1" | ||
3849 | |||
3850 | CVE_STATUS[CVE-2022-49814] = "fixed-version: Fixed from version 6.1" | ||
3851 | |||
3852 | CVE_STATUS[CVE-2022-49815] = "fixed-version: Fixed from version 6.1" | ||
3853 | |||
3854 | CVE_STATUS[CVE-2022-49817] = "fixed-version: Fixed from version 6.1" | ||
3855 | |||
3856 | CVE_STATUS[CVE-2022-49818] = "fixed-version: Fixed from version 6.0.10" | ||
3857 | |||
3858 | CVE_STATUS[CVE-2022-49819] = "fixed-version: Fixed from version 6.1" | ||
3859 | |||
3860 | CVE_STATUS[CVE-2022-49820] = "fixed-version: Fixed from version 6.1" | ||
3861 | |||
3862 | CVE_STATUS[CVE-2022-49821] = "fixed-version: Fixed from version 6.1" | ||
3863 | |||
3864 | CVE_STATUS[CVE-2022-49822] = "fixed-version: Fixed from version 6.1" | ||
3865 | |||
3866 | CVE_STATUS[CVE-2022-49823] = "fixed-version: Fixed from version 6.1" | ||
3867 | |||
3868 | CVE_STATUS[CVE-2022-49824] = "fixed-version: Fixed from version 6.1" | ||
3869 | |||
3870 | CVE_STATUS[CVE-2022-49825] = "fixed-version: Fixed from version 6.1" | ||
3871 | |||
3872 | CVE_STATUS[CVE-2022-49826] = "fixed-version: Fixed from version 6.1" | ||
3873 | |||
3874 | CVE_STATUS[CVE-2022-49827] = "fixed-version: Fixed from version 6.1" | ||
3875 | |||
3876 | CVE_STATUS[CVE-2022-49828] = "fixed-version: Fixed from version 6.1" | ||
3877 | |||
3878 | CVE_STATUS[CVE-2022-49829] = "fixed-version: Fixed from version 6.1" | ||
3879 | |||
3880 | CVE_STATUS[CVE-2022-49830] = "fixed-version: Fixed from version 6.1" | ||
3881 | |||
3882 | CVE_STATUS[CVE-2022-49831] = "fixed-version: Fixed from version 6.1" | ||
3883 | |||
3884 | CVE_STATUS[CVE-2022-49832] = "fixed-version: Fixed from version 6.1" | ||
3885 | |||
3886 | CVE_STATUS[CVE-2022-49833] = "fixed-version: Fixed from version 6.1" | ||
3887 | |||
3888 | CVE_STATUS[CVE-2022-49834] = "fixed-version: Fixed from version 6.1" | ||
3889 | |||
3890 | CVE_STATUS[CVE-2022-49835] = "fixed-version: Fixed from version 6.1" | ||
3891 | |||
3892 | CVE_STATUS[CVE-2022-49836] = "fixed-version: Fixed from version 6.1" | ||
3893 | |||
3894 | CVE_STATUS[CVE-2022-49837] = "fixed-version: Fixed from version 6.1" | ||
3895 | |||
3896 | CVE_STATUS[CVE-2022-49838] = "fixed-version: Fixed from version 6.1" | ||
3897 | |||
3898 | CVE_STATUS[CVE-2022-49839] = "fixed-version: Fixed from version 6.1" | ||
3899 | |||
3900 | CVE_STATUS[CVE-2022-49840] = "fixed-version: Fixed from version 6.1" | ||
3901 | |||
3902 | CVE_STATUS[CVE-2022-49841] = "fixed-version: Fixed from version 6.1" | ||
3903 | |||
3904 | CVE_STATUS[CVE-2022-49842] = "fixed-version: Fixed from version 6.1" | ||
3905 | |||
3906 | CVE_STATUS[CVE-2022-49844] = "fixed-version: Fixed from version 6.1" | ||
3907 | |||
3908 | CVE_STATUS[CVE-2022-49845] = "fixed-version: Fixed from version 6.1" | ||
3909 | |||
3910 | CVE_STATUS[CVE-2022-49846] = "fixed-version: Fixed from version 6.1" | ||
3911 | |||
3912 | CVE_STATUS[CVE-2022-49847] = "fixed-version: Fixed from version 6.1" | ||
3913 | |||
3914 | CVE_STATUS[CVE-2022-49848] = "fixed-version: Fixed from version 6.1" | ||
3915 | |||
3916 | CVE_STATUS[CVE-2022-49849] = "fixed-version: Fixed from version 6.1" | ||
3917 | |||
3918 | CVE_STATUS[CVE-2022-49850] = "fixed-version: Fixed from version 6.1" | ||
3919 | |||
3920 | CVE_STATUS[CVE-2022-49851] = "fixed-version: Fixed from version 6.1" | ||
3921 | |||
3922 | CVE_STATUS[CVE-2022-49852] = "fixed-version: Fixed from version 6.1" | ||
3923 | |||
3924 | CVE_STATUS[CVE-2022-49853] = "fixed-version: Fixed from version 6.1" | ||
3925 | |||
3926 | CVE_STATUS[CVE-2022-49854] = "fixed-version: Fixed from version 6.1" | ||
3927 | |||
3928 | CVE_STATUS[CVE-2022-49855] = "fixed-version: Fixed from version 6.1" | ||
3929 | |||
3930 | CVE_STATUS[CVE-2022-49857] = "fixed-version: Fixed from version 6.1" | ||
3931 | |||
3932 | CVE_STATUS[CVE-2022-49858] = "fixed-version: Fixed from version 6.1" | ||
3933 | |||
3934 | CVE_STATUS[CVE-2022-49859] = "fixed-version: Fixed from version 6.1" | ||
3935 | |||
3936 | CVE_STATUS[CVE-2022-49860] = "fixed-version: Fixed from version 6.1" | ||
3937 | |||
3938 | CVE_STATUS[CVE-2022-49861] = "fixed-version: Fixed from version 6.1" | ||
3939 | |||
3940 | CVE_STATUS[CVE-2022-49862] = "fixed-version: Fixed from version 6.1" | ||
3941 | |||
3942 | CVE_STATUS[CVE-2022-49863] = "fixed-version: Fixed from version 6.1" | ||
3943 | |||
3944 | CVE_STATUS[CVE-2022-49864] = "fixed-version: Fixed from version 6.1" | ||
3945 | |||
3946 | CVE_STATUS[CVE-2022-49865] = "fixed-version: Fixed from version 6.1" | ||
3947 | |||
3948 | CVE_STATUS[CVE-2022-49866] = "fixed-version: Fixed from version 6.1" | ||
3949 | |||
3950 | CVE_STATUS[CVE-2022-49867] = "fixed-version: Fixed from version 6.1" | ||
3951 | |||
3952 | CVE_STATUS[CVE-2022-49868] = "fixed-version: Fixed from version 6.1" | ||
3953 | |||
3954 | CVE_STATUS[CVE-2022-49869] = "fixed-version: Fixed from version 6.1" | ||
3955 | |||
3956 | CVE_STATUS[CVE-2022-49870] = "fixed-version: Fixed from version 6.1" | ||
3957 | |||
3958 | CVE_STATUS[CVE-2022-49871] = "fixed-version: Fixed from version 6.1" | ||
3959 | |||
3960 | CVE_STATUS[CVE-2022-49872] = "fixed-version: Fixed from version 6.1" | ||
3961 | |||
3962 | CVE_STATUS[CVE-2022-49873] = "fixed-version: Fixed from version 6.1" | ||
3963 | |||
3964 | CVE_STATUS[CVE-2022-49874] = "fixed-version: Fixed from version 6.1" | ||
3965 | |||
3966 | CVE_STATUS[CVE-2022-49875] = "fixed-version: Fixed from version 6.1" | ||
3967 | |||
3968 | CVE_STATUS[CVE-2022-49876] = "fixed-version: Fixed from version 6.1" | ||
3969 | |||
3970 | CVE_STATUS[CVE-2022-49877] = "fixed-version: Fixed from version 6.1" | ||
3971 | |||
3972 | CVE_STATUS[CVE-2022-49878] = "fixed-version: Fixed from version 6.1" | ||
3973 | |||
3974 | CVE_STATUS[CVE-2022-49879] = "fixed-version: Fixed from version 6.1" | ||
3975 | |||
3976 | CVE_STATUS[CVE-2022-49880] = "fixed-version: Fixed from version 6.1" | ||
3977 | |||
3978 | CVE_STATUS[CVE-2022-49881] = "fixed-version: Fixed from version 6.1" | ||
3979 | |||
3980 | CVE_STATUS[CVE-2022-49882] = "fixed-version: Fixed from version 6.1" | ||
3981 | |||
3982 | CVE_STATUS[CVE-2022-49883] = "fixed-version: Fixed from version 6.1" | ||
3983 | |||
3984 | CVE_STATUS[CVE-2022-49884] = "fixed-version: Fixed from version 6.1" | ||
3985 | |||
3986 | CVE_STATUS[CVE-2022-49885] = "fixed-version: Fixed from version 6.1" | ||
3987 | |||
3988 | CVE_STATUS[CVE-2022-49886] = "fixed-version: Fixed from version 6.1" | ||
3989 | |||
3990 | CVE_STATUS[CVE-2022-49887] = "fixed-version: Fixed from version 6.1" | ||
3991 | |||
3992 | CVE_STATUS[CVE-2022-49888] = "fixed-version: Fixed from version 6.1" | ||
3993 | |||
3994 | CVE_STATUS[CVE-2022-49889] = "fixed-version: Fixed from version 6.0.8" | ||
3995 | |||
3996 | CVE_STATUS[CVE-2022-49890] = "fixed-version: Fixed from version 6.1" | ||
3997 | |||
3998 | CVE_STATUS[CVE-2022-49891] = "fixed-version: Fixed from version 6.1" | ||
3999 | |||
4000 | CVE_STATUS[CVE-2022-49892] = "fixed-version: Fixed from version 6.1" | ||
4001 | |||
4002 | CVE_STATUS[CVE-2022-49893] = "fixed-version: Fixed from version 6.1" | ||
4003 | |||
4004 | CVE_STATUS[CVE-2022-49894] = "fixed-version: Fixed from version 6.1" | ||
4005 | |||
4006 | CVE_STATUS[CVE-2022-49895] = "fixed-version: Fixed from version 6.1" | ||
4007 | |||
4008 | CVE_STATUS[CVE-2022-49896] = "fixed-version: Fixed from version 6.1" | ||
4009 | |||
4010 | CVE_STATUS[CVE-2022-49898] = "fixed-version: Fixed from version 6.1" | ||
4011 | |||
4012 | CVE_STATUS[CVE-2022-49899] = "fixed-version: Fixed from version 6.1" | ||
4013 | |||
4014 | CVE_STATUS[CVE-2022-49900] = "fixed-version: Fixed from version 6.1" | ||
4015 | |||
4016 | CVE_STATUS[CVE-2022-49901] = "fixed-version: Fixed from version 6.1" | ||
4017 | |||
4018 | CVE_STATUS[CVE-2022-49902] = "fixed-version: Fixed from version 6.1" | ||
4019 | |||
4020 | CVE_STATUS[CVE-2022-49903] = "fixed-version: Fixed from version 6.1" | ||
4021 | |||
4022 | CVE_STATUS[CVE-2022-49904] = "fixed-version: Fixed from version 6.1" | ||
4023 | |||
4024 | CVE_STATUS[CVE-2022-49905] = "fixed-version: Fixed from version 6.1" | ||
4025 | |||
4026 | CVE_STATUS[CVE-2022-49906] = "fixed-version: Fixed from version 6.1" | ||
4027 | |||
4028 | CVE_STATUS[CVE-2022-49907] = "fixed-version: Fixed from version 6.1" | ||
4029 | |||
4030 | CVE_STATUS[CVE-2022-49908] = "fixed-version: Fixed from version 6.1" | ||
4031 | |||
4032 | CVE_STATUS[CVE-2022-49909] = "fixed-version: Fixed from version 6.1" | ||
4033 | |||
4034 | CVE_STATUS[CVE-2022-49910] = "fixed-version: Fixed from version 6.1" | ||
4035 | |||
4036 | CVE_STATUS[CVE-2022-49911] = "fixed-version: Fixed from version 6.1" | ||
4037 | |||
4038 | CVE_STATUS[CVE-2022-49912] = "fixed-version: Fixed from version 6.1" | ||
4039 | |||
4040 | CVE_STATUS[CVE-2022-49913] = "fixed-version: Fixed from version 6.1" | ||
4041 | |||
4042 | CVE_STATUS[CVE-2022-49914] = "fixed-version: Fixed from version 6.1" | ||
4043 | |||
4044 | CVE_STATUS[CVE-2022-49915] = "fixed-version: Fixed from version 6.1" | ||
4045 | |||
4046 | CVE_STATUS[CVE-2022-49916] = "fixed-version: Fixed from version 6.1" | ||
4047 | |||
4048 | CVE_STATUS[CVE-2022-49917] = "fixed-version: Fixed from version 6.1" | ||
4049 | |||
4050 | CVE_STATUS[CVE-2022-49918] = "fixed-version: Fixed from version 6.1" | ||
4051 | |||
4052 | CVE_STATUS[CVE-2022-49919] = "fixed-version: Fixed from version 6.1" | ||
4053 | |||
4054 | CVE_STATUS[CVE-2022-49920] = "fixed-version: Fixed from version 6.1" | ||
4055 | |||
4056 | CVE_STATUS[CVE-2022-49921] = "fixed-version: Fixed from version 6.1" | ||
4057 | |||
4058 | CVE_STATUS[CVE-2022-49922] = "fixed-version: Fixed from version 6.1" | ||
4059 | |||
4060 | CVE_STATUS[CVE-2022-49923] = "fixed-version: Fixed from version 6.1" | ||
4061 | |||
4062 | CVE_STATUS[CVE-2022-49924] = "fixed-version: Fixed from version 6.1" | ||
4063 | |||
4064 | CVE_STATUS[CVE-2022-49925] = "fixed-version: Fixed from version 6.1" | ||
4065 | |||
4066 | CVE_STATUS[CVE-2022-49926] = "fixed-version: Fixed from version 6.1" | ||
4067 | |||
4068 | CVE_STATUS[CVE-2022-49927] = "fixed-version: Fixed from version 6.1" | ||
4069 | |||
4070 | CVE_STATUS[CVE-2022-49928] = "fixed-version: Fixed from version 6.1" | ||
4071 | |||
4072 | CVE_STATUS[CVE-2022-49929] = "fixed-version: Fixed from version 6.1" | ||
4073 | |||
4074 | CVE_STATUS[CVE-2022-49930] = "fixed-version: Fixed from version 6.1" | ||
4075 | |||
4076 | CVE_STATUS[CVE-2022-49931] = "fixed-version: Fixed from version 6.1" | ||
4077 | |||
4078 | CVE_STATUS[CVE-2022-49932] = "fixed-version: Fixed from version 6.3" | ||
4079 | |||
4080 | # CVE-2023-34319 has no known resolution | ||
4081 | |||
4082 | # CVE-2023-34324 has no known resolution | ||
4083 | |||
4084 | # CVE-2023-46838 has no known resolution | ||
4085 | |||
4086 | CVE_STATUS[CVE-2023-52433] = "fixed-version: Fixed from version 6.6" | ||
4087 | |||
4088 | CVE_STATUS[CVE-2023-52434] = "fixed-version: Fixed from version 6.7" | ||
4089 | |||
4090 | CVE_STATUS[CVE-2023-52435] = "fixed-version: Fixed from version 6.7" | ||
4091 | |||
4092 | CVE_STATUS[CVE-2023-52436] = "fixed-version: Fixed from version 6.8" | ||
4093 | |||
4094 | CVE_STATUS[CVE-2023-52438] = "fixed-version: Fixed from version 6.8" | ||
4095 | |||
4096 | CVE_STATUS[CVE-2023-52439] = "fixed-version: Fixed from version 6.8" | ||
4097 | |||
4098 | CVE_STATUS[CVE-2023-52440] = "fixed-version: Fixed from version 6.6" | ||
4099 | |||
4100 | CVE_STATUS[CVE-2023-52441] = "fixed-version: Fixed from version 6.5" | ||
4101 | |||
4102 | CVE_STATUS[CVE-2023-52442] = "fixed-version: Fixed from version 6.5" | ||
4103 | |||
4104 | CVE_STATUS[CVE-2023-52443] = "fixed-version: Fixed from version 6.8" | ||
4105 | |||
4106 | CVE_STATUS[CVE-2023-52444] = "fixed-version: Fixed from version 6.8" | ||
4107 | |||
4108 | CVE_STATUS[CVE-2023-52445] = "fixed-version: Fixed from version 6.8" | ||
4109 | |||
4110 | CVE_STATUS[CVE-2023-52446] = "fixed-version: Fixed from version 6.8" | ||
4111 | |||
4112 | CVE_STATUS[CVE-2023-52447] = "fixed-version: Fixed from version 6.8" | ||
4113 | |||
4114 | CVE_STATUS[CVE-2023-52448] = "fixed-version: Fixed from version 6.8" | ||
4115 | |||
4116 | CVE_STATUS[CVE-2023-52449] = "fixed-version: Fixed from version 6.8" | ||
4117 | |||
4118 | CVE_STATUS[CVE-2023-52450] = "fixed-version: Fixed from version 6.8" | ||
4119 | |||
4120 | CVE_STATUS[CVE-2023-52451] = "fixed-version: Fixed from version 6.8" | ||
4121 | |||
4122 | CVE_STATUS[CVE-2023-52452] = "fixed-version: Fixed from version 6.8" | ||
4123 | |||
4124 | CVE_STATUS[CVE-2023-52453] = "fixed-version: Fixed from version 6.8" | ||
4125 | |||
4126 | CVE_STATUS[CVE-2023-52454] = "fixed-version: Fixed from version 6.8" | ||
4127 | |||
4128 | CVE_STATUS[CVE-2023-52455] = "fixed-version: Fixed from version 6.8" | ||
4129 | |||
4130 | CVE_STATUS[CVE-2023-52456] = "fixed-version: Fixed from version 6.8" | ||
4131 | |||
4132 | CVE_STATUS[CVE-2023-52457] = "fixed-version: Fixed from version 6.8" | ||
4133 | |||
4134 | CVE_STATUS[CVE-2023-52458] = "fixed-version: Fixed from version 6.8" | ||
4135 | |||
4136 | CVE_STATUS[CVE-2023-52459] = "fixed-version: Fixed from version 6.8" | ||
4137 | |||
4138 | CVE_STATUS[CVE-2023-52460] = "fixed-version: Fixed from version 6.8" | ||
4139 | |||
4140 | CVE_STATUS[CVE-2023-52461] = "fixed-version: Fixed from version 6.8" | ||
4141 | |||
4142 | CVE_STATUS[CVE-2023-52462] = "fixed-version: Fixed from version 6.8" | ||
4143 | |||
4144 | CVE_STATUS[CVE-2023-52463] = "fixed-version: Fixed from version 6.8" | ||
4145 | |||
4146 | CVE_STATUS[CVE-2023-52464] = "fixed-version: Fixed from version 6.8" | ||
4147 | |||
4148 | CVE_STATUS[CVE-2023-52465] = "fixed-version: Fixed from version 6.8" | ||
4149 | |||
4150 | CVE_STATUS[CVE-2023-52467] = "fixed-version: Fixed from version 6.8" | ||
4151 | |||
4152 | CVE_STATUS[CVE-2023-52468] = "fixed-version: Fixed from version 6.8" | ||
4153 | |||
4154 | CVE_STATUS[CVE-2023-52469] = "fixed-version: Fixed from version 6.8" | ||
4155 | |||
4156 | CVE_STATUS[CVE-2023-52470] = "fixed-version: Fixed from version 6.8" | ||
4157 | |||
4158 | CVE_STATUS[CVE-2023-52471] = "fixed-version: Fixed from version 6.8" | ||
4159 | |||
4160 | CVE_STATUS[CVE-2023-52472] = "fixed-version: Fixed from version 6.8" | ||
4161 | |||
4162 | CVE_STATUS[CVE-2023-52473] = "fixed-version: Fixed from version 6.8" | ||
4163 | |||
4164 | CVE_STATUS[CVE-2023-52474] = "fixed-version: Fixed from version 6.4" | ||
4165 | |||
4166 | CVE_STATUS[CVE-2023-52475] = "fixed-version: Fixed from version 6.6" | ||
4167 | |||
4168 | CVE_STATUS[CVE-2023-52476] = "fixed-version: Fixed from version 6.6" | ||
4169 | |||
4170 | CVE_STATUS[CVE-2023-52477] = "fixed-version: Fixed from version 6.6" | ||
4171 | |||
4172 | CVE_STATUS[CVE-2023-52478] = "fixed-version: Fixed from version 6.6" | ||
4173 | |||
4174 | CVE_STATUS[CVE-2023-52479] = "fixed-version: Fixed from version 6.6" | ||
4175 | |||
4176 | CVE_STATUS[CVE-2023-52480] = "fixed-version: Fixed from version 6.6" | ||
4177 | |||
4178 | CVE_STATUS[CVE-2023-52481] = "fixed-version: Fixed from version 6.6" | ||
4179 | |||
4180 | CVE_STATUS[CVE-2023-52482] = "fixed-version: Fixed from version 6.6" | ||
4181 | |||
4182 | CVE_STATUS[CVE-2023-52483] = "fixed-version: Fixed from version 6.6" | ||
4183 | |||
4184 | CVE_STATUS[CVE-2023-52484] = "fixed-version: Fixed from version 6.6" | ||
4185 | |||
4186 | CVE_STATUS[CVE-2023-52485] = "fixed-version: Fixed from version 6.8" | ||
4187 | |||
4188 | CVE_STATUS[CVE-2023-52486] = "fixed-version: Fixed from version 6.8" | ||
4189 | |||
4190 | CVE_STATUS[CVE-2023-52487] = "fixed-version: Fixed from version 6.8" | ||
4191 | |||
4192 | CVE_STATUS[CVE-2023-52488] = "fixed-version: Fixed from version 6.8" | ||
4193 | |||
4194 | CVE_STATUS[CVE-2023-52489] = "fixed-version: Fixed from version 6.8" | ||
4195 | |||
4196 | CVE_STATUS[CVE-2023-52490] = "fixed-version: Fixed from version 6.8" | ||
4197 | |||
4198 | CVE_STATUS[CVE-2023-52491] = "fixed-version: Fixed from version 6.8" | ||
4199 | |||
4200 | CVE_STATUS[CVE-2023-52492] = "fixed-version: Fixed from version 6.8" | ||
4201 | |||
4202 | CVE_STATUS[CVE-2023-52493] = "fixed-version: Fixed from version 6.8" | ||
4203 | |||
4204 | CVE_STATUS[CVE-2023-52494] = "fixed-version: Fixed from version 6.8" | ||
4205 | |||
4206 | CVE_STATUS[CVE-2023-52495] = "fixed-version: Fixed from version 6.8" | ||
4207 | |||
4208 | CVE_STATUS[CVE-2023-52497] = "fixed-version: Fixed from version 6.8" | ||
4209 | |||
4210 | CVE_STATUS[CVE-2023-52498] = "fixed-version: Fixed from version 6.8" | ||
4211 | |||
4212 | CVE_STATUS[CVE-2023-52499] = "fixed-version: Fixed from version 6.6" | ||
4213 | |||
4214 | CVE_STATUS[CVE-2023-52500] = "fixed-version: Fixed from version 6.6" | ||
4215 | |||
4216 | CVE_STATUS[CVE-2023-52501] = "fixed-version: Fixed from version 6.6" | ||
4217 | |||
4218 | CVE_STATUS[CVE-2023-52502] = "fixed-version: Fixed from version 6.6" | ||
4219 | |||
4220 | CVE_STATUS[CVE-2023-52503] = "fixed-version: Fixed from version 6.6" | ||
4221 | |||
4222 | CVE_STATUS[CVE-2023-52504] = "fixed-version: Fixed from version 6.6" | ||
4223 | |||
4224 | CVE_STATUS[CVE-2023-52505] = "fixed-version: Fixed from version 6.6" | ||
4225 | |||
4226 | CVE_STATUS[CVE-2023-52506] = "fixed-version: Fixed from version 6.6" | ||
4227 | |||
4228 | CVE_STATUS[CVE-2023-52507] = "fixed-version: Fixed from version 6.6" | ||
4229 | |||
4230 | CVE_STATUS[CVE-2023-52508] = "fixed-version: Fixed from version 6.6" | ||
4231 | |||
4232 | CVE_STATUS[CVE-2023-52509] = "fixed-version: Fixed from version 6.6" | ||
4233 | |||
4234 | CVE_STATUS[CVE-2023-52510] = "fixed-version: Fixed from version 6.6" | ||
4235 | |||
4236 | CVE_STATUS[CVE-2023-52511] = "fixed-version: Fixed from version 6.6" | ||
4237 | |||
4238 | CVE_STATUS[CVE-2023-52512] = "fixed-version: Fixed from version 6.6" | ||
4239 | |||
4240 | CVE_STATUS[CVE-2023-52513] = "fixed-version: Fixed from version 6.6" | ||
4241 | |||
4242 | CVE_STATUS[CVE-2023-52515] = "fixed-version: Fixed from version 6.6" | ||
4243 | |||
4244 | CVE_STATUS[CVE-2023-52516] = "fixed-version: Fixed from version 6.6" | ||
4245 | |||
4246 | CVE_STATUS[CVE-2023-52517] = "fixed-version: Fixed from version 6.6" | ||
4247 | |||
4248 | CVE_STATUS[CVE-2023-52518] = "fixed-version: Fixed from version 6.6" | ||
4249 | |||
4250 | CVE_STATUS[CVE-2023-52519] = "fixed-version: Fixed from version 6.6" | ||
4251 | |||
4252 | CVE_STATUS[CVE-2023-52520] = "fixed-version: Fixed from version 6.6" | ||
4253 | |||
4254 | CVE_STATUS[CVE-2023-52522] = "fixed-version: Fixed from version 6.6" | ||
4255 | |||
4256 | CVE_STATUS[CVE-2023-52523] = "fixed-version: Fixed from version 6.6" | ||
4257 | |||
4258 | CVE_STATUS[CVE-2023-52524] = "fixed-version: Fixed from version 6.6" | ||
4259 | |||
4260 | CVE_STATUS[CVE-2023-52525] = "fixed-version: Fixed from version 6.5.7" | ||
4261 | |||
4262 | CVE_STATUS[CVE-2023-52526] = "fixed-version: Fixed from version 6.6" | ||
4263 | |||
4264 | CVE_STATUS[CVE-2023-52527] = "fixed-version: Fixed from version 6.6" | ||
4265 | |||
4266 | CVE_STATUS[CVE-2023-52528] = "fixed-version: Fixed from version 6.6" | ||
4267 | |||
4268 | CVE_STATUS[CVE-2023-52529] = "fixed-version: Fixed from version 6.6" | ||
4269 | |||
4270 | CVE_STATUS[CVE-2023-52530] = "fixed-version: Fixed from version 6.6" | ||
4271 | |||
4272 | CVE_STATUS[CVE-2023-52531] = "fixed-version: Fixed from version 6.6" | ||
4273 | |||
4274 | CVE_STATUS[CVE-2023-52532] = "fixed-version: Fixed from version 6.6" | ||
4275 | |||
4276 | CVE_STATUS[CVE-2023-52559] = "fixed-version: Fixed from version 6.6" | ||
4277 | |||
4278 | CVE_STATUS[CVE-2023-52560] = "fixed-version: Fixed from version 6.6" | ||
4279 | |||
4280 | CVE_STATUS[CVE-2023-52561] = "fixed-version: Fixed from version 6.6" | ||
4281 | |||
4282 | CVE_STATUS[CVE-2023-52562] = "fixed-version: Fixed from version 6.6" | ||
4283 | |||
4284 | CVE_STATUS[CVE-2023-52563] = "fixed-version: Fixed from version 6.6" | ||
4285 | |||
4286 | CVE_STATUS[CVE-2023-52564] = "fixed-version: Fixed from version 6.6" | ||
4287 | |||
4288 | CVE_STATUS[CVE-2023-52565] = "fixed-version: Fixed from version 6.6" | ||
4289 | |||
4290 | CVE_STATUS[CVE-2023-52566] = "fixed-version: Fixed from version 6.6" | ||
4291 | |||
4292 | CVE_STATUS[CVE-2023-52567] = "fixed-version: Fixed from version 6.6" | ||
4293 | |||
4294 | CVE_STATUS[CVE-2023-52568] = "fixed-version: Fixed from version 6.6" | ||
4295 | |||
4296 | CVE_STATUS[CVE-2023-52569] = "fixed-version: Fixed from version 6.6" | ||
4297 | |||
4298 | CVE_STATUS[CVE-2023-52570] = "fixed-version: Fixed from version 6.6" | ||
4299 | |||
4300 | CVE_STATUS[CVE-2023-52571] = "fixed-version: Fixed from version 6.6" | ||
4301 | |||
4302 | CVE_STATUS[CVE-2023-52572] = "fixed-version: Fixed from version 6.6" | ||
4303 | |||
4304 | CVE_STATUS[CVE-2023-52573] = "fixed-version: Fixed from version 6.6" | ||
4305 | |||
4306 | CVE_STATUS[CVE-2023-52574] = "fixed-version: Fixed from version 6.6" | ||
4307 | |||
4308 | CVE_STATUS[CVE-2023-52576] = "fixed-version: Fixed from version 6.6" | ||
4309 | |||
4310 | CVE_STATUS[CVE-2023-52577] = "fixed-version: Fixed from version 6.5.6" | ||
4311 | |||
4312 | CVE_STATUS[CVE-2023-52578] = "fixed-version: Fixed from version 6.6" | ||
4313 | |||
4314 | CVE_STATUS[CVE-2023-52580] = "fixed-version: Fixed from version 6.6" | ||
4315 | |||
4316 | CVE_STATUS[CVE-2023-52581] = "fixed-version: Fixed from version 6.6" | ||
4317 | |||
4318 | CVE_STATUS[CVE-2023-52582] = "fixed-version: Fixed from version 6.6" | ||
4319 | |||
4320 | CVE_STATUS[CVE-2023-52583] = "fixed-version: Fixed from version 6.8" | ||
4321 | |||
4322 | CVE_STATUS[CVE-2023-52584] = "fixed-version: Fixed from version 6.8" | ||
4323 | |||
4324 | CVE_STATUS[CVE-2023-52585] = "fixed-version: Fixed from version 6.8" | ||
4325 | |||
4326 | CVE_STATUS[CVE-2023-52586] = "fixed-version: Fixed from version 6.8" | ||
4327 | |||
4328 | CVE_STATUS[CVE-2023-52587] = "fixed-version: Fixed from version 6.8" | ||
4329 | |||
4330 | CVE_STATUS[CVE-2023-52588] = "fixed-version: Fixed from version 6.8" | ||
4331 | |||
4332 | CVE_STATUS[CVE-2023-52589] = "fixed-version: Fixed from version 6.8" | ||
4333 | |||
4334 | CVE_STATUS[CVE-2023-52590] = "fixed-version: Fixed from version 6.8" | ||
4335 | |||
4336 | CVE_STATUS[CVE-2023-52591] = "fixed-version: Fixed from version 6.8" | ||
4337 | |||
4338 | CVE_STATUS[CVE-2023-52593] = "fixed-version: Fixed from version 6.8" | ||
4339 | |||
4340 | CVE_STATUS[CVE-2023-52594] = "fixed-version: Fixed from version 6.8" | ||
4341 | |||
4342 | CVE_STATUS[CVE-2023-52595] = "fixed-version: Fixed from version 6.8" | ||
4343 | |||
4344 | CVE_STATUS[CVE-2023-52596] = "fixed-version: Fixed from version 6.8" | ||
4345 | |||
4346 | CVE_STATUS[CVE-2023-52597] = "fixed-version: Fixed from version 6.8" | ||
4347 | |||
4348 | CVE_STATUS[CVE-2023-52598] = "fixed-version: Fixed from version 6.8" | ||
4349 | |||
4350 | CVE_STATUS[CVE-2023-52599] = "fixed-version: Fixed from version 6.8" | ||
4351 | |||
4352 | CVE_STATUS[CVE-2023-52600] = "fixed-version: Fixed from version 6.8" | ||
4353 | |||
4354 | CVE_STATUS[CVE-2023-52601] = "fixed-version: Fixed from version 6.8" | ||
4355 | |||
4356 | CVE_STATUS[CVE-2023-52602] = "fixed-version: Fixed from version 6.8" | ||
4357 | |||
4358 | CVE_STATUS[CVE-2023-52603] = "fixed-version: Fixed from version 6.8" | ||
4359 | |||
4360 | CVE_STATUS[CVE-2023-52604] = "fixed-version: Fixed from version 6.8" | ||
4361 | |||
4362 | CVE_STATUS[CVE-2023-52606] = "fixed-version: Fixed from version 6.8" | ||
4363 | |||
4364 | CVE_STATUS[CVE-2023-52607] = "fixed-version: Fixed from version 6.8" | ||
4365 | |||
4366 | CVE_STATUS[CVE-2023-52608] = "fixed-version: Fixed from version 6.8" | ||
4367 | |||
4368 | CVE_STATUS[CVE-2023-52609] = "fixed-version: Fixed from version 6.8" | ||
4369 | |||
4370 | CVE_STATUS[CVE-2023-52610] = "fixed-version: Fixed from version 6.8" | ||
4371 | |||
4372 | CVE_STATUS[CVE-2023-52611] = "fixed-version: Fixed from version 6.8" | ||
4373 | |||
4374 | CVE_STATUS[CVE-2023-52612] = "fixed-version: Fixed from version 6.8" | ||
4375 | |||
4376 | CVE_STATUS[CVE-2023-52613] = "fixed-version: Fixed from version 6.8" | ||
4377 | |||
4378 | CVE_STATUS[CVE-2023-52614] = "fixed-version: Fixed from version 6.8" | ||
4379 | |||
4380 | CVE_STATUS[CVE-2023-52615] = "fixed-version: Fixed from version 6.8" | ||
4381 | |||
4382 | CVE_STATUS[CVE-2023-52616] = "fixed-version: Fixed from version 6.8" | ||
4383 | |||
4384 | CVE_STATUS[CVE-2023-52617] = "fixed-version: Fixed from version 6.8" | ||
4385 | |||
4386 | CVE_STATUS[CVE-2023-52618] = "fixed-version: Fixed from version 6.8" | ||
4387 | |||
4388 | CVE_STATUS[CVE-2023-52619] = "fixed-version: Fixed from version 6.8" | ||
4389 | |||
4390 | CVE_STATUS[CVE-2023-52620] = "fixed-version: Fixed from version 6.4" | ||
4391 | |||
4392 | CVE_STATUS[CVE-2023-52621] = "fixed-version: Fixed from version 6.8" | ||
4393 | |||
4394 | CVE_STATUS[CVE-2023-52622] = "fixed-version: Fixed from version 6.8" | ||
4395 | |||
4396 | CVE_STATUS[CVE-2023-52623] = "fixed-version: Fixed from version 6.8" | ||
4397 | |||
4398 | CVE_STATUS[CVE-2023-52624] = "fixed-version: Fixed from version 6.8" | ||
4399 | |||
4400 | CVE_STATUS[CVE-2023-52625] = "fixed-version: Fixed from version 6.8" | ||
4401 | |||
4402 | CVE_STATUS[CVE-2023-52626] = "fixed-version: Fixed from version 6.8" | ||
4403 | |||
4404 | CVE_STATUS[CVE-2023-52627] = "fixed-version: Fixed from version 6.8" | ||
4405 | |||
4406 | CVE_STATUS[CVE-2023-52628] = "fixed-version: Fixed from version 6.6" | ||
4407 | |||
4408 | CVE_STATUS[CVE-2023-52629] = "fixed-version: Fixed from version 6.6" | ||
4409 | |||
4410 | CVE_STATUS[CVE-2023-52631] = "fixed-version: Fixed from version 6.8" | ||
4411 | |||
4412 | CVE_STATUS[CVE-2023-52632] = "fixed-version: Fixed from version 6.8" | ||
4413 | |||
4414 | CVE_STATUS[CVE-2023-52633] = "fixed-version: Fixed from version 6.8" | ||
4415 | |||
4416 | CVE_STATUS[CVE-2023-52634] = "fixed-version: Fixed from version 6.8" | ||
4417 | |||
4418 | CVE_STATUS[CVE-2023-52635] = "fixed-version: Fixed from version 6.8" | ||
4419 | |||
4420 | CVE_STATUS[CVE-2023-52636] = "fixed-version: Fixed from version 6.8" | ||
4421 | |||
4422 | CVE_STATUS[CVE-2023-52637] = "fixed-version: Fixed from version 6.8" | ||
4423 | |||
4424 | CVE_STATUS[CVE-2023-52638] = "fixed-version: Fixed from version 6.8" | ||
4425 | |||
4426 | CVE_STATUS[CVE-2023-52639] = "fixed-version: Fixed from version 6.8" | ||
4427 | |||
4428 | CVE_STATUS[CVE-2023-52640] = "fixed-version: Fixed from version 6.8" | ||
4429 | |||
4430 | CVE_STATUS[CVE-2023-52641] = "fixed-version: Fixed from version 6.8" | ||
4431 | |||
4432 | CVE_STATUS[CVE-2023-52642] = "fixed-version: Fixed from version 6.8" | ||
4433 | |||
4434 | CVE_STATUS[CVE-2023-52643] = "fixed-version: Fixed from version 6.8" | ||
4435 | |||
4436 | CVE_STATUS[CVE-2023-52644] = "fixed-version: Fixed from version 6.9" | ||
4437 | |||
4438 | CVE_STATUS[CVE-2023-52645] = "fixed-version: Fixed from version 6.8" | ||
4439 | |||
4440 | CVE_STATUS[CVE-2023-52646] = "fixed-version: Fixed from version 6.2" | ||
4441 | |||
4442 | CVE_STATUS[CVE-2023-52647] = "fixed-version: Fixed from version 6.9" | ||
4443 | |||
4444 | CVE_STATUS[CVE-2023-52648] = "fixed-version: Fixed from version 6.9" | ||
4445 | |||
4446 | CVE_STATUS[CVE-2023-52649] = "fixed-version: Fixed from version 6.9" | ||
4447 | |||
4448 | CVE_STATUS[CVE-2023-52650] = "fixed-version: Fixed from version 6.9" | ||
4449 | |||
4450 | CVE_STATUS[CVE-2023-52652] = "fixed-version: Fixed from version 6.9" | ||
4451 | |||
4452 | CVE_STATUS[CVE-2023-52653] = "fixed-version: Fixed from version 6.9" | ||
4453 | |||
4454 | CVE_STATUS[CVE-2023-52654] = "fixed-version: Fixed from version 6.7" | ||
4455 | |||
4456 | CVE_STATUS[CVE-2023-52655] = "fixed-version: Fixed from version 6.7" | ||
4457 | |||
4458 | CVE_STATUS[CVE-2023-52656] = "fixed-version: Fixed from version 6.8" | ||
4459 | |||
4460 | CVE_STATUS[CVE-2023-52657] = "fixed-version: Fixed from version 6.8" | ||
4461 | |||
4462 | CVE_STATUS[CVE-2023-52658] = "fixed-version: Fixed from version 6.8" | ||
4463 | |||
4464 | CVE_STATUS[CVE-2023-52659] = "fixed-version: Fixed from version 6.9" | ||
4465 | |||
4466 | CVE_STATUS[CVE-2023-52660] = "fixed-version: Fixed from version 6.8" | ||
4467 | |||
4468 | CVE_STATUS[CVE-2023-52661] = "fixed-version: Fixed from version 6.9" | ||
4469 | |||
4470 | CVE_STATUS[CVE-2023-52662] = "fixed-version: Fixed from version 6.9" | ||
4471 | |||
4472 | CVE_STATUS[CVE-2023-52663] = "fixed-version: Fixed from version 6.9" | ||
4473 | |||
4474 | CVE_STATUS[CVE-2023-52664] = "fixed-version: Fixed from version 6.8" | ||
4475 | |||
4476 | CVE_STATUS[CVE-2023-52667] = "fixed-version: Fixed from version 6.8" | ||
4477 | |||
4478 | CVE_STATUS[CVE-2023-52668] = "fixed-version: Fixed from version 6.8" | ||
4479 | |||
4480 | CVE_STATUS[CVE-2023-52669] = "fixed-version: Fixed from version 6.8" | ||
4481 | |||
4482 | CVE_STATUS[CVE-2023-52670] = "fixed-version: Fixed from version 6.8" | ||
4483 | |||
4484 | CVE_STATUS[CVE-2023-52671] = "fixed-version: Fixed from version 6.8" | ||
4485 | |||
4486 | CVE_STATUS[CVE-2023-52672] = "fixed-version: Fixed from version 6.8" | ||
4487 | |||
4488 | CVE_STATUS[CVE-2023-52673] = "fixed-version: Fixed from version 6.8" | ||
4489 | |||
4490 | CVE_STATUS[CVE-2023-52674] = "fixed-version: Fixed from version 6.8" | ||
4491 | |||
4492 | CVE_STATUS[CVE-2023-52675] = "fixed-version: Fixed from version 6.8" | ||
4493 | |||
4494 | CVE_STATUS[CVE-2023-52676] = "fixed-version: Fixed from version 6.8" | ||
4495 | |||
4496 | CVE_STATUS[CVE-2023-52677] = "fixed-version: Fixed from version 6.8" | ||
4497 | |||
4498 | CVE_STATUS[CVE-2023-52678] = "fixed-version: Fixed from version 6.8" | ||
4499 | |||
4500 | CVE_STATUS[CVE-2023-52679] = "fixed-version: Fixed from version 6.8" | ||
4501 | |||
4502 | CVE_STATUS[CVE-2023-52680] = "fixed-version: Fixed from version 6.8" | ||
4503 | |||
4504 | CVE_STATUS[CVE-2023-52681] = "fixed-version: Fixed from version 6.8" | ||
4505 | |||
4506 | CVE_STATUS[CVE-2023-52682] = "fixed-version: Fixed from version 6.8" | ||
4507 | |||
4508 | CVE_STATUS[CVE-2023-52683] = "fixed-version: Fixed from version 6.8" | ||
4509 | |||
4510 | CVE_STATUS[CVE-2023-52684] = "fixed-version: Fixed from version 6.8" | ||
4511 | |||
4512 | CVE_STATUS[CVE-2023-52686] = "fixed-version: Fixed from version 6.8" | ||
4513 | |||
4514 | CVE_STATUS[CVE-2023-52687] = "fixed-version: Fixed from version 6.8" | ||
4515 | |||
4516 | CVE_STATUS[CVE-2023-52688] = "fixed-version: Fixed from version 6.8" | ||
4517 | |||
4518 | CVE_STATUS[CVE-2023-52689] = "fixed-version: Fixed from version 6.8" | ||
4519 | |||
4520 | CVE_STATUS[CVE-2023-52690] = "fixed-version: Fixed from version 6.8" | ||
4521 | |||
4522 | CVE_STATUS[CVE-2023-52691] = "fixed-version: Fixed from version 6.8" | ||
4523 | |||
4524 | CVE_STATUS[CVE-2023-52692] = "fixed-version: Fixed from version 6.8" | ||
4525 | |||
4526 | CVE_STATUS[CVE-2023-52693] = "fixed-version: Fixed from version 6.8" | ||
4527 | |||
4528 | CVE_STATUS[CVE-2023-52694] = "fixed-version: Fixed from version 6.8" | ||
4529 | |||
4530 | CVE_STATUS[CVE-2023-52695] = "fixed-version: Fixed from version 6.8" | ||
4531 | |||
4532 | CVE_STATUS[CVE-2023-52696] = "fixed-version: Fixed from version 6.8" | ||
4533 | |||
4534 | CVE_STATUS[CVE-2023-52697] = "fixed-version: Fixed from version 6.8" | ||
4535 | |||
4536 | CVE_STATUS[CVE-2023-52698] = "fixed-version: Fixed from version 6.8" | ||
4537 | |||
4538 | CVE_STATUS[CVE-2023-52699] = "fixed-version: Fixed from version 6.9" | ||
4539 | |||
4540 | CVE_STATUS[CVE-2023-52700] = "fixed-version: Fixed from version 6.2" | ||
4541 | |||
4542 | CVE_STATUS[CVE-2023-52701] = "fixed-version: Fixed from version 6.2" | ||
4543 | |||
4544 | CVE_STATUS[CVE-2023-52702] = "fixed-version: Fixed from version 6.2" | ||
4545 | |||
4546 | CVE_STATUS[CVE-2023-52703] = "fixed-version: Fixed from version 6.2" | ||
4547 | |||
4548 | CVE_STATUS[CVE-2023-52704] = "fixed-version: Fixed from version 6.2" | ||
4549 | |||
4550 | CVE_STATUS[CVE-2023-52705] = "fixed-version: Fixed from version 6.2" | ||
4551 | |||
4552 | CVE_STATUS[CVE-2023-52706] = "fixed-version: Fixed from version 6.2" | ||
4553 | |||
4554 | CVE_STATUS[CVE-2023-52707] = "fixed-version: Fixed from version 6.2" | ||
4555 | |||
4556 | CVE_STATUS[CVE-2023-52708] = "fixed-version: Fixed from version 6.2" | ||
4557 | |||
4558 | CVE_STATUS[CVE-2023-52730] = "fixed-version: Fixed from version 6.2" | ||
4559 | |||
4560 | CVE_STATUS[CVE-2023-52731] = "fixed-version: Fixed from version 6.2" | ||
4561 | |||
4562 | CVE_STATUS[CVE-2023-52732] = "fixed-version: Fixed from version 6.2" | ||
4563 | |||
4564 | # CVE-2023-52733 has no known resolution | ||
4565 | |||
4566 | CVE_STATUS[CVE-2023-52735] = "fixed-version: Fixed from version 6.2" | ||
4567 | |||
4568 | CVE_STATUS[CVE-2023-52736] = "fixed-version: Fixed from version 6.2" | ||
4569 | |||
4570 | CVE_STATUS[CVE-2023-52737] = "fixed-version: Fixed from version 6.2" | ||
4571 | |||
4572 | CVE_STATUS[CVE-2023-52738] = "fixed-version: Fixed from version 6.2" | ||
4573 | |||
4574 | CVE_STATUS[CVE-2023-52739] = "fixed-version: Fixed from version 6.2" | ||
4575 | |||
4576 | CVE_STATUS[CVE-2023-52740] = "fixed-version: Fixed from version 6.2" | ||
4577 | |||
4578 | CVE_STATUS[CVE-2023-52741] = "fixed-version: Fixed from version 6.2" | ||
4579 | |||
4580 | CVE_STATUS[CVE-2023-52742] = "fixed-version: Fixed from version 6.2" | ||
4581 | |||
4582 | CVE_STATUS[CVE-2023-52743] = "fixed-version: Fixed from version 6.2" | ||
4583 | |||
4584 | CVE_STATUS[CVE-2023-52744] = "fixed-version: Fixed from version 6.2" | ||
4585 | |||
4586 | CVE_STATUS[CVE-2023-52745] = "fixed-version: Fixed from version 6.1.12" | ||
4587 | |||
4588 | CVE_STATUS[CVE-2023-52746] = "fixed-version: Fixed from version 6.2" | ||
4589 | |||
4590 | CVE_STATUS[CVE-2023-52747] = "fixed-version: Fixed from version 6.2" | ||
4591 | |||
4592 | CVE_STATUS[CVE-2023-52748] = "fixed-version: Fixed from version 6.7" | ||
4593 | |||
4594 | CVE_STATUS[CVE-2023-52749] = "fixed-version: Fixed from version 6.7" | ||
4595 | |||
4596 | CVE_STATUS[CVE-2023-52750] = "fixed-version: Fixed from version 6.7" | ||
4597 | |||
4598 | CVE_STATUS[CVE-2023-52751] = "fixed-version: Fixed from version 6.7" | ||
4599 | |||
4600 | CVE_STATUS[CVE-2023-52752] = "fixed-version: Fixed from version 6.7" | ||
4601 | |||
4602 | CVE_STATUS[CVE-2023-52753] = "fixed-version: Fixed from version 6.7" | ||
4603 | |||
4604 | CVE_STATUS[CVE-2023-52754] = "fixed-version: Fixed from version 6.7" | ||
4605 | |||
4606 | CVE_STATUS[CVE-2023-52755] = "fixed-version: Fixed from version 6.7" | ||
4607 | |||
4608 | CVE_STATUS[CVE-2023-52757] = "fixed-version: Fixed from version 6.7" | ||
4609 | |||
4610 | CVE_STATUS[CVE-2023-52760] = "fixed-version: Fixed from version 6.7" | ||
4611 | |||
4612 | CVE_STATUS[CVE-2023-52761] = "fixed-version: Fixed from version 6.7" | ||
4613 | |||
4614 | CVE_STATUS[CVE-2023-52762] = "fixed-version: Fixed from version 6.7" | ||
4615 | |||
4616 | CVE_STATUS[CVE-2023-52763] = "fixed-version: Fixed from version 6.7" | ||
4617 | |||
4618 | CVE_STATUS[CVE-2023-52764] = "fixed-version: Fixed from version 6.7" | ||
4619 | |||
4620 | CVE_STATUS[CVE-2023-52765] = "fixed-version: Fixed from version 6.7" | ||
4621 | |||
4622 | CVE_STATUS[CVE-2023-52766] = "fixed-version: Fixed from version 6.7" | ||
4623 | |||
4624 | CVE_STATUS[CVE-2023-52767] = "fixed-version: Fixed from version 6.7" | ||
4625 | |||
4626 | CVE_STATUS[CVE-2023-52768] = "fixed-version: Fixed from version 6.7" | ||
4627 | |||
4628 | CVE_STATUS[CVE-2023-52769] = "fixed-version: Fixed from version 6.7" | ||
4629 | |||
4630 | CVE_STATUS[CVE-2023-52770] = "fixed-version: Fixed from version 6.7" | ||
4631 | |||
4632 | CVE_STATUS[CVE-2023-52771] = "fixed-version: Fixed from version 6.7" | ||
4633 | |||
4634 | CVE_STATUS[CVE-2023-52772] = "fixed-version: Fixed from version 6.7" | ||
4635 | |||
4636 | CVE_STATUS[CVE-2023-52773] = "fixed-version: Fixed from version 6.7" | ||
4637 | |||
4638 | CVE_STATUS[CVE-2023-52774] = "fixed-version: Fixed from version 6.7" | ||
4639 | |||
4640 | CVE_STATUS[CVE-2023-52775] = "fixed-version: Fixed from version 6.7" | ||
4641 | |||
4642 | CVE_STATUS[CVE-2023-52776] = "fixed-version: Fixed from version 6.7" | ||
4643 | |||
4644 | CVE_STATUS[CVE-2023-52777] = "fixed-version: Fixed from version 6.7" | ||
4645 | |||
4646 | CVE_STATUS[CVE-2023-52778] = "fixed-version: Fixed from version 6.7" | ||
4647 | |||
4648 | CVE_STATUS[CVE-2023-52779] = "fixed-version: Fixed from version 6.7" | ||
4649 | |||
4650 | CVE_STATUS[CVE-2023-52780] = "fixed-version: Fixed from version 6.7" | ||
4651 | |||
4652 | CVE_STATUS[CVE-2023-52781] = "fixed-version: Fixed from version 6.7" | ||
4653 | |||
4654 | CVE_STATUS[CVE-2023-52782] = "fixed-version: Fixed from version 6.7" | ||
4655 | |||
4656 | CVE_STATUS[CVE-2023-52783] = "fixed-version: Fixed from version 6.7" | ||
4657 | |||
4658 | CVE_STATUS[CVE-2023-52784] = "fixed-version: Fixed from version 6.7" | ||
4659 | |||
4660 | CVE_STATUS[CVE-2023-52785] = "fixed-version: Fixed from version 6.7" | ||
4661 | |||
4662 | CVE_STATUS[CVE-2023-52786] = "fixed-version: Fixed from version 6.7" | ||
4663 | |||
4664 | CVE_STATUS[CVE-2023-52787] = "fixed-version: Fixed from version 6.7" | ||
4665 | |||
4666 | CVE_STATUS[CVE-2023-52788] = "fixed-version: Fixed from version 6.7" | ||
4667 | |||
4668 | CVE_STATUS[CVE-2023-52789] = "fixed-version: Fixed from version 6.7" | ||
4669 | |||
4670 | CVE_STATUS[CVE-2023-52790] = "fixed-version: Fixed from version 6.7" | ||
4671 | |||
4672 | CVE_STATUS[CVE-2023-52791] = "fixed-version: Fixed from version 6.7" | ||
4673 | |||
4674 | CVE_STATUS[CVE-2023-52792] = "fixed-version: Fixed from version 6.7" | ||
4675 | |||
4676 | CVE_STATUS[CVE-2023-52794] = "fixed-version: Fixed from version 6.7" | ||
4677 | |||
4678 | CVE_STATUS[CVE-2023-52795] = "fixed-version: Fixed from version 6.7" | ||
4679 | |||
4680 | CVE_STATUS[CVE-2023-52796] = "fixed-version: Fixed from version 6.7" | ||
4681 | |||
4682 | CVE_STATUS[CVE-2023-52797] = "fixed-version: Fixed from version 6.7" | ||
4683 | |||
4684 | CVE_STATUS[CVE-2023-52798] = "fixed-version: Fixed from version 6.7" | ||
4685 | |||
4686 | CVE_STATUS[CVE-2023-52799] = "fixed-version: Fixed from version 6.7" | ||
4687 | |||
4688 | CVE_STATUS[CVE-2023-52800] = "fixed-version: Fixed from version 6.7" | ||
4689 | |||
4690 | CVE_STATUS[CVE-2023-52801] = "fixed-version: Fixed from version 6.7" | ||
4691 | |||
4692 | CVE_STATUS[CVE-2023-52803] = "fixed-version: Fixed from version 6.7" | ||
4693 | |||
4694 | CVE_STATUS[CVE-2023-52804] = "fixed-version: Fixed from version 6.7" | ||
4695 | |||
4696 | CVE_STATUS[CVE-2023-52805] = "fixed-version: Fixed from version 6.7" | ||
4697 | |||
4698 | CVE_STATUS[CVE-2023-52806] = "fixed-version: Fixed from version 6.7" | ||
4699 | |||
4700 | CVE_STATUS[CVE-2023-52807] = "fixed-version: Fixed from version 6.7" | ||
4701 | |||
4702 | CVE_STATUS[CVE-2023-52808] = "fixed-version: Fixed from version 6.7" | ||
4703 | |||
4704 | CVE_STATUS[CVE-2023-52809] = "fixed-version: Fixed from version 6.7" | ||
4705 | |||
4706 | CVE_STATUS[CVE-2023-52810] = "fixed-version: Fixed from version 6.7" | ||
4707 | |||
4708 | CVE_STATUS[CVE-2023-52811] = "fixed-version: Fixed from version 6.7" | ||
4709 | |||
4710 | CVE_STATUS[CVE-2023-52812] = "fixed-version: Fixed from version 6.7" | ||
4711 | |||
4712 | CVE_STATUS[CVE-2023-52813] = "fixed-version: Fixed from version 6.7" | ||
4713 | |||
4714 | CVE_STATUS[CVE-2023-52814] = "fixed-version: Fixed from version 6.7" | ||
4715 | |||
4716 | CVE_STATUS[CVE-2023-52815] = "fixed-version: Fixed from version 6.7" | ||
4717 | |||
4718 | CVE_STATUS[CVE-2023-52816] = "fixed-version: Fixed from version 6.7" | ||
4719 | |||
4720 | CVE_STATUS[CVE-2023-52817] = "fixed-version: Fixed from version 6.7" | ||
4721 | |||
4722 | CVE_STATUS[CVE-2023-52818] = "fixed-version: Fixed from version 6.7" | ||
4723 | |||
4724 | CVE_STATUS[CVE-2023-52819] = "fixed-version: Fixed from version 6.7" | ||
4725 | |||
4726 | CVE_STATUS[CVE-2023-52821] = "fixed-version: Fixed from version 6.7" | ||
4727 | |||
4728 | CVE_STATUS[CVE-2023-52825] = "fixed-version: Fixed from version 6.7" | ||
4729 | |||
4730 | CVE_STATUS[CVE-2023-52826] = "fixed-version: Fixed from version 6.7" | ||
4731 | |||
4732 | CVE_STATUS[CVE-2023-52827] = "fixed-version: Fixed from version 6.7" | ||
4733 | |||
4734 | CVE_STATUS[CVE-2023-52828] = "fixed-version: Fixed from version 6.7" | ||
4735 | |||
4736 | CVE_STATUS[CVE-2023-52829] = "fixed-version: Fixed from version 6.7" | ||
4737 | |||
4738 | CVE_STATUS[CVE-2023-52831] = "fixed-version: Fixed from version 6.7" | ||
4739 | |||
4740 | CVE_STATUS[CVE-2023-52832] = "fixed-version: Fixed from version 6.7" | ||
4741 | |||
4742 | CVE_STATUS[CVE-2023-52833] = "fixed-version: Fixed from version 6.7" | ||
4743 | |||
4744 | CVE_STATUS[CVE-2023-52834] = "fixed-version: Fixed from version 6.7" | ||
4745 | |||
4746 | CVE_STATUS[CVE-2023-52835] = "fixed-version: Fixed from version 6.7" | ||
4747 | |||
4748 | CVE_STATUS[CVE-2023-52836] = "fixed-version: Fixed from version 6.7" | ||
4749 | |||
4750 | CVE_STATUS[CVE-2023-52837] = "fixed-version: Fixed from version 6.7" | ||
4751 | |||
4752 | CVE_STATUS[CVE-2023-52838] = "fixed-version: Fixed from version 6.7" | ||
4753 | |||
4754 | CVE_STATUS[CVE-2023-52839] = "fixed-version: Fixed from version 6.7" | ||
4755 | |||
4756 | CVE_STATUS[CVE-2023-52840] = "fixed-version: Fixed from version 6.7" | ||
4757 | |||
4758 | CVE_STATUS[CVE-2023-52841] = "fixed-version: Fixed from version 6.7" | ||
4759 | |||
4760 | CVE_STATUS[CVE-2023-52842] = "fixed-version: Fixed from version 6.7" | ||
4761 | |||
4762 | CVE_STATUS[CVE-2023-52843] = "fixed-version: Fixed from version 6.7" | ||
4763 | |||
4764 | CVE_STATUS[CVE-2023-52844] = "fixed-version: Fixed from version 6.7" | ||
4765 | |||
4766 | CVE_STATUS[CVE-2023-52845] = "fixed-version: Fixed from version 6.7" | ||
4767 | |||
4768 | CVE_STATUS[CVE-2023-52846] = "fixed-version: Fixed from version 6.7" | ||
4769 | |||
4770 | CVE_STATUS[CVE-2023-52847] = "fixed-version: Fixed from version 6.7" | ||
4771 | |||
4772 | CVE_STATUS[CVE-2023-52848] = "fixed-version: Fixed from version 6.7" | ||
4773 | |||
4774 | CVE_STATUS[CVE-2023-52849] = "fixed-version: Fixed from version 6.7" | ||
4775 | |||
4776 | CVE_STATUS[CVE-2023-52850] = "fixed-version: Fixed from version 6.7" | ||
4777 | |||
4778 | CVE_STATUS[CVE-2023-52851] = "fixed-version: Fixed from version 6.7" | ||
4779 | |||
4780 | CVE_STATUS[CVE-2023-52852] = "fixed-version: Fixed from version 6.7" | ||
4781 | |||
4782 | CVE_STATUS[CVE-2023-52853] = "fixed-version: Fixed from version 6.7" | ||
4783 | |||
4784 | CVE_STATUS[CVE-2023-52854] = "fixed-version: Fixed from version 6.7" | ||
4785 | |||
4786 | CVE_STATUS[CVE-2023-52855] = "fixed-version: Fixed from version 6.7" | ||
4787 | |||
4788 | CVE_STATUS[CVE-2023-52856] = "fixed-version: Fixed from version 6.7" | ||
4789 | |||
4790 | CVE_STATUS[CVE-2023-52857] = "fixed-version: Fixed from version 6.7" | ||
4791 | |||
4792 | CVE_STATUS[CVE-2023-52858] = "fixed-version: Fixed from version 6.7" | ||
4793 | |||
4794 | CVE_STATUS[CVE-2023-52859] = "fixed-version: Fixed from version 6.7" | ||
4795 | |||
4796 | CVE_STATUS[CVE-2023-52860] = "fixed-version: Fixed from version 6.7" | ||
4797 | |||
4798 | CVE_STATUS[CVE-2023-52861] = "fixed-version: Fixed from version 6.7" | ||
4799 | |||
4800 | CVE_STATUS[CVE-2023-52862] = "fixed-version: Fixed from version 6.7" | ||
4801 | |||
4802 | CVE_STATUS[CVE-2023-52863] = "fixed-version: Fixed from version 6.7" | ||
4803 | |||
4804 | CVE_STATUS[CVE-2023-52864] = "fixed-version: Fixed from version 6.7" | ||
4805 | |||
4806 | CVE_STATUS[CVE-2023-52865] = "fixed-version: Fixed from version 6.7" | ||
4807 | |||
4808 | CVE_STATUS[CVE-2023-52866] = "fixed-version: Fixed from version 6.7" | ||
4809 | |||
4810 | CVE_STATUS[CVE-2023-52867] = "fixed-version: Fixed from version 6.7" | ||
4811 | |||
4812 | CVE_STATUS[CVE-2023-52868] = "fixed-version: Fixed from version 6.7" | ||
4813 | |||
4814 | CVE_STATUS[CVE-2023-52869] = "fixed-version: Fixed from version 6.7" | ||
4815 | |||
4816 | CVE_STATUS[CVE-2023-52870] = "fixed-version: Fixed from version 6.7" | ||
4817 | |||
4818 | CVE_STATUS[CVE-2023-52871] = "fixed-version: Fixed from version 6.7" | ||
4819 | |||
4820 | CVE_STATUS[CVE-2023-52872] = "fixed-version: Fixed from version 6.7" | ||
4821 | |||
4822 | CVE_STATUS[CVE-2023-52873] = "fixed-version: Fixed from version 6.7" | ||
4823 | |||
4824 | CVE_STATUS[CVE-2023-52874] = "fixed-version: Fixed from version 6.7" | ||
4825 | |||
4826 | CVE_STATUS[CVE-2023-52875] = "fixed-version: Fixed from version 6.7" | ||
4827 | |||
4828 | CVE_STATUS[CVE-2023-52876] = "fixed-version: Fixed from version 6.7" | ||
4829 | |||
4830 | CVE_STATUS[CVE-2023-52877] = "fixed-version: Fixed from version 6.7" | ||
4831 | |||
4832 | CVE_STATUS[CVE-2023-52878] = "fixed-version: Fixed from version 6.7" | ||
4833 | |||
4834 | CVE_STATUS[CVE-2023-52879] = "fixed-version: Fixed from version 6.7" | ||
4835 | |||
4836 | CVE_STATUS[CVE-2023-52880] = "fixed-version: Fixed from version 6.6" | ||
4837 | |||
4838 | CVE_STATUS[CVE-2023-52881] = "fixed-version: Fixed from version 6.7" | ||
4839 | |||
4840 | CVE_STATUS[CVE-2023-52882] = "fixed-version: Fixed from version 6.9" | ||
4841 | |||
4842 | CVE_STATUS[CVE-2023-52883] = "fixed-version: Fixed from version 6.6" | ||
4843 | |||
4844 | CVE_STATUS[CVE-2023-52884] = "fixed-version: Fixed from version 6.10" | ||
4845 | |||
4846 | CVE_STATUS[CVE-2023-52885] = "fixed-version: Fixed from version 6.5" | ||
4847 | |||
4848 | CVE_STATUS[CVE-2023-52886] = "fixed-version: Fixed from version 6.6" | ||
4849 | |||
4850 | CVE_STATUS[CVE-2023-52887] = "fixed-version: Fixed from version 6.10" | ||
4851 | |||
4852 | CVE_STATUS[CVE-2023-52888] = "fixed-version: Fixed from version 6.10" | ||
4853 | |||
4854 | CVE_STATUS[CVE-2023-52889] = "fixed-version: Fixed from version 6.11" | ||
4855 | |||
4856 | CVE_STATUS[CVE-2023-52893] = "fixed-version: Fixed from version 6.2" | ||
4857 | |||
4858 | CVE_STATUS[CVE-2023-52894] = "fixed-version: Fixed from version 6.2" | ||
4859 | |||
4860 | CVE_STATUS[CVE-2023-52895] = "fixed-version: Fixed from version 6.1.8" | ||
4861 | |||
4862 | CVE_STATUS[CVE-2023-52896] = "fixed-version: Fixed from version 6.2" | ||
4863 | |||
4864 | CVE_STATUS[CVE-2023-52897] = "fixed-version: Fixed from version 6.2" | ||
4865 | |||
4866 | CVE_STATUS[CVE-2023-52898] = "fixed-version: Fixed from version 6.2" | ||
4867 | |||
4868 | CVE_STATUS[CVE-2023-52899] = "fixed-version: Fixed from version 6.2" | ||
4869 | |||
4870 | CVE_STATUS[CVE-2023-52900] = "fixed-version: Fixed from version 6.2" | ||
4871 | |||
4872 | CVE_STATUS[CVE-2023-52901] = "fixed-version: Fixed from version 6.2" | ||
4873 | |||
4874 | CVE_STATUS[CVE-2023-52902] = "fixed-version: Fixed from version 6.2" | ||
4875 | |||
4876 | CVE_STATUS[CVE-2023-52903] = "fixed-version: Fixed from version 6.2" | ||
4877 | |||
4878 | CVE_STATUS[CVE-2023-52904] = "fixed-version: Fixed from version 5.15.168" | ||
4879 | |||
4880 | CVE_STATUS[CVE-2023-52905] = "fixed-version: Fixed from version 6.2" | ||
4881 | |||
4882 | CVE_STATUS[CVE-2023-52906] = "fixed-version: Fixed from version 6.2" | ||
4883 | |||
4884 | CVE_STATUS[CVE-2023-52907] = "fixed-version: Fixed from version 6.2" | ||
4885 | |||
4886 | CVE_STATUS[CVE-2023-52908] = "fixed-version: Fixed from version 6.1.7" | ||
4887 | |||
4888 | CVE_STATUS[CVE-2023-52909] = "fixed-version: Fixed from version 6.2" | ||
4889 | |||
4890 | CVE_STATUS[CVE-2023-52910] = "fixed-version: Fixed from version 6.2" | ||
4891 | |||
4892 | CVE_STATUS[CVE-2023-52911] = "fixed-version: Fixed from version 6.2" | ||
4893 | |||
4894 | CVE_STATUS[CVE-2023-52912] = "fixed-version: Fixed from version 6.2" | ||
4895 | |||
4896 | CVE_STATUS[CVE-2023-52913] = "fixed-version: Fixed from version 6.2" | ||
4897 | |||
4898 | CVE_STATUS[CVE-2023-52914] = "fixed-version: Fixed from version 6.2" | ||
4899 | |||
4900 | CVE_STATUS[CVE-2023-52915] = "fixed-version: Fixed from version 6.6" | ||
4901 | |||
4902 | CVE_STATUS[CVE-2023-52916] = "fixed-version: Fixed from version 6.6" | ||
4903 | |||
4904 | CVE_STATUS[CVE-2023-52918] = "fixed-version: Fixed from version 6.9" | ||
4905 | |||
4906 | CVE_STATUS[CVE-2023-52919] = "fixed-version: Fixed from version 6.6" | ||
4907 | |||
4908 | CVE_STATUS[CVE-2023-52920] = "fixed-version: Fixed from version 6.8" | ||
4909 | |||
4910 | CVE_STATUS[CVE-2023-52921] = "fixed-version: Fixed from version 6.5" | ||
4911 | |||
4912 | CVE_STATUS[CVE-2023-52922] = "fixed-version: Fixed from version 6.5" | ||
4913 | |||
4914 | CVE_STATUS[CVE-2023-52923] = "fixed-version: Fixed from version 6.5" | ||
4915 | |||
4916 | CVE_STATUS[CVE-2023-52924] = "fixed-version: Fixed from version 6.5" | ||
4917 | |||
4918 | CVE_STATUS[CVE-2023-52925] = "fixed-version: Fixed from version 6.4.12" | ||
4919 | |||
4920 | CVE_STATUS[CVE-2023-52926] = "fixed-version: Fixed from version 6.7" | ||
4921 | |||
4922 | CVE_STATUS[CVE-2023-52927] = "fixed-version: Fixed from version 6.6" | ||
4923 | |||
4924 | CVE_STATUS[CVE-2023-52928] = "fixed-version: Fixed from version 6.2" | ||
4925 | |||
4926 | CVE_STATUS[CVE-2023-52929] = "fixed-version: Fixed from version 6.2" | ||
4927 | |||
4928 | CVE_STATUS[CVE-2023-52930] = "fixed-version: Fixed from version 6.2" | ||
4929 | |||
4930 | CVE_STATUS[CVE-2023-52931] = "fixed-version: Fixed from version 6.2" | ||
4931 | |||
4932 | CVE_STATUS[CVE-2023-52932] = "fixed-version: Fixed from version 6.2" | ||
4933 | |||
4934 | CVE_STATUS[CVE-2023-52933] = "fixed-version: Fixed from version 6.2" | ||
4935 | |||
4936 | CVE_STATUS[CVE-2023-52934] = "fixed-version: Fixed from version 6.2" | ||
4937 | |||
4938 | CVE_STATUS[CVE-2023-52935] = "fixed-version: Fixed from version 6.2" | ||
4939 | |||
4940 | CVE_STATUS[CVE-2023-52936] = "fixed-version: Fixed from version 6.2" | ||
4941 | |||
4942 | CVE_STATUS[CVE-2023-52937] = "fixed-version: Fixed from version 6.2" | ||
4943 | |||
4944 | CVE_STATUS[CVE-2023-52938] = "fixed-version: Fixed from version 6.1.11" | ||
4945 | |||
4946 | CVE_STATUS[CVE-2023-52939] = "fixed-version: Fixed from version 6.2" | ||
4947 | |||
4948 | CVE_STATUS[CVE-2023-52940] = "fixed-version: Fixed from version 6.2" | ||
4949 | |||
4950 | CVE_STATUS[CVE-2023-52941] = "fixed-version: Fixed from version 6.2" | ||
4951 | |||
4952 | CVE_STATUS[CVE-2023-52942] = "fixed-version: Fixed from version 6.2" | ||
4953 | |||
4954 | CVE_STATUS[CVE-2023-52973] = "fixed-version: Fixed from version 6.2" | ||
4955 | |||
4956 | CVE_STATUS[CVE-2023-52974] = "fixed-version: Fixed from version 6.2" | ||
4957 | |||
4958 | CVE_STATUS[CVE-2023-52975] = "fixed-version: Fixed from version 6.2" | ||
4959 | |||
4960 | CVE_STATUS[CVE-2023-52976] = "fixed-version: Fixed from version 6.2" | ||
4961 | |||
4962 | CVE_STATUS[CVE-2023-52977] = "fixed-version: Fixed from version 6.1.11" | ||
4963 | |||
4964 | CVE_STATUS[CVE-2023-52978] = "fixed-version: Fixed from version 6.2" | ||
4965 | |||
4966 | CVE_STATUS[CVE-2023-52979] = "fixed-version: Fixed from version 6.2" | ||
4967 | |||
4968 | CVE_STATUS[CVE-2023-52980] = "fixed-version: Fixed from version 6.2" | ||
4969 | |||
4970 | CVE_STATUS[CVE-2023-52981] = "fixed-version: Fixed from version 6.2" | ||
4971 | |||
4972 | CVE_STATUS[CVE-2023-52982] = "fixed-version: Fixed from version 6.2" | ||
4973 | |||
4974 | CVE_STATUS[CVE-2023-52983] = "fixed-version: Fixed from version 6.1.11" | ||
4975 | |||
4976 | CVE_STATUS[CVE-2023-52984] = "fixed-version: Fixed from version 6.2" | ||
4977 | |||
4978 | CVE_STATUS[CVE-2023-52985] = "fixed-version: Fixed from version 6.2" | ||
4979 | |||
4980 | CVE_STATUS[CVE-2023-52986] = "fixed-version: Fixed from version 6.2" | ||
4981 | |||
4982 | CVE_STATUS[CVE-2023-52987] = "fixed-version: Fixed from version 6.2" | ||
4983 | |||
4984 | CVE_STATUS[CVE-2023-52988] = "fixed-version: Fixed from version 6.2" | ||
4985 | |||
4986 | CVE_STATUS[CVE-2023-52989] = "fixed-version: Fixed from version 6.2" | ||
4987 | |||
4988 | CVE_STATUS[CVE-2023-52991] = "fixed-version: Fixed from version 6.2" | ||
4989 | |||
4990 | CVE_STATUS[CVE-2023-52992] = "fixed-version: Fixed from version 6.2" | ||
4991 | |||
4992 | CVE_STATUS[CVE-2023-52993] = "fixed-version: Fixed from version 6.2" | ||
4993 | |||
4994 | CVE_STATUS[CVE-2023-52994] = "fixed-version: Fixed from version 6.1.9" | ||
4995 | |||
4996 | CVE_STATUS[CVE-2023-52995] = "fixed-version: Fixed from version 6.2" | ||
4997 | |||
4998 | CVE_STATUS[CVE-2023-52996] = "fixed-version: Fixed from version 6.2" | ||
4999 | |||
5000 | CVE_STATUS[CVE-2023-52997] = "fixed-version: Fixed from version 6.2" | ||
5001 | |||
5002 | CVE_STATUS[CVE-2023-52998] = "fixed-version: Fixed from version 6.2" | ||
5003 | |||
5004 | CVE_STATUS[CVE-2023-52999] = "fixed-version: Fixed from version 6.2" | ||
5005 | |||
5006 | CVE_STATUS[CVE-2023-53000] = "fixed-version: Fixed from version 6.2" | ||
5007 | |||
5008 | CVE_STATUS[CVE-2023-53001] = "fixed-version: Fixed from version 6.2" | ||
5009 | |||
5010 | CVE_STATUS[CVE-2023-53002] = "fixed-version: Fixed from version 6.2" | ||
5011 | |||
5012 | CVE_STATUS[CVE-2023-53003] = "fixed-version: Fixed from version 6.2" | ||
5013 | |||
5014 | CVE_STATUS[CVE-2023-53004] = "fixed-version: Fixed from version 6.2" | ||
5015 | |||
5016 | CVE_STATUS[CVE-2023-53005] = "fixed-version: Fixed from version 6.2" | ||
5017 | |||
5018 | CVE_STATUS[CVE-2023-53006] = "fixed-version: Fixed from version 6.2" | ||
5019 | |||
5020 | CVE_STATUS[CVE-2023-53007] = "fixed-version: Fixed from version 6.2" | ||
5021 | |||
5022 | CVE_STATUS[CVE-2023-53008] = "fixed-version: Fixed from version 6.2" | ||
5023 | |||
5024 | CVE_STATUS[CVE-2023-53009] = "fixed-version: Fixed from version 6.2" | ||
5025 | |||
5026 | CVE_STATUS[CVE-2023-53010] = "fixed-version: Fixed from version 6.2" | ||
5027 | |||
5028 | CVE_STATUS[CVE-2023-53011] = "fixed-version: Fixed from version 6.2" | ||
5029 | |||
5030 | # CVE-2023-53012 has no known resolution | ||
5031 | |||
5032 | CVE_STATUS[CVE-2023-53013] = "fixed-version: Fixed from version 6.2" | ||
5033 | |||
5034 | CVE_STATUS[CVE-2023-53014] = "fixed-version: Fixed from version 6.2" | ||
5035 | |||
5036 | CVE_STATUS[CVE-2023-53015] = "fixed-version: Fixed from version 6.2" | ||
5037 | |||
5038 | CVE_STATUS[CVE-2023-53016] = "fixed-version: Fixed from version 6.2" | ||
5039 | |||
5040 | CVE_STATUS[CVE-2023-53017] = "fixed-version: Fixed from version 6.2" | ||
5041 | |||
5042 | CVE_STATUS[CVE-2023-53018] = "fixed-version: Fixed from version 6.2" | ||
5043 | |||
5044 | CVE_STATUS[CVE-2023-53019] = "fixed-version: Fixed from version 6.2" | ||
5045 | |||
5046 | CVE_STATUS[CVE-2023-53020] = "fixed-version: Fixed from version 6.2" | ||
5047 | |||
5048 | CVE_STATUS[CVE-2023-53021] = "fixed-version: Fixed from version 6.2" | ||
5049 | |||
5050 | CVE_STATUS[CVE-2023-53022] = "fixed-version: Fixed from version 6.2" | ||
5051 | |||
5052 | CVE_STATUS[CVE-2023-53023] = "fixed-version: Fixed from version 6.2" | ||
5053 | |||
5054 | CVE_STATUS[CVE-2023-53024] = "fixed-version: Fixed from version 6.2" | ||
5055 | |||
5056 | CVE_STATUS[CVE-2023-53026] = "fixed-version: Fixed from version 6.2" | ||
5057 | |||
5058 | CVE_STATUS[CVE-2023-53028] = "fixed-version: Fixed from version 6.1.8" | ||
5059 | |||
5060 | CVE_STATUS[CVE-2023-53029] = "fixed-version: Fixed from version 6.1.8" | ||
5061 | |||
5062 | CVE_STATUS[CVE-2023-53030] = "fixed-version: Fixed from version 6.1.8" | ||
5063 | |||
5064 | CVE_STATUS[CVE-2023-53031] = "fixed-version: Fixed from version 6.2" | ||
5065 | |||
5066 | CVE_STATUS[CVE-2023-53032] = "fixed-version: Fixed from version 6.2" | ||
5067 | |||
5068 | CVE_STATUS[CVE-2023-53033] = "fixed-version: Fixed from version 6.2" | ||
5069 | |||
5070 | CVE_STATUS[CVE-2023-53034] = "cpe-stable-backport: Backported in 6.12.23" | ||
5071 | |||
5072 | CVE_STATUS[CVE-2023-53035] = "fixed-version: Fixed from version 6.3" | ||
5073 | |||
5074 | CVE_STATUS[CVE-2023-53036] = "fixed-version: Fixed from version 6.3" | ||
5075 | |||
5076 | CVE_STATUS[CVE-2023-53037] = "fixed-version: Fixed from version 6.3" | ||
5077 | |||
5078 | CVE_STATUS[CVE-2023-53038] = "fixed-version: Fixed from version 6.3" | ||
5079 | |||
5080 | CVE_STATUS[CVE-2023-53039] = "fixed-version: Fixed from version 6.3" | ||
5081 | |||
5082 | CVE_STATUS[CVE-2023-53040] = "fixed-version: Fixed from version 6.3" | ||
5083 | |||
5084 | CVE_STATUS[CVE-2023-53041] = "fixed-version: Fixed from version 6.3" | ||
5085 | |||
5086 | CVE_STATUS[CVE-2023-53042] = "fixed-version: Fixed from version 6.3" | ||
5087 | |||
5088 | CVE_STATUS[CVE-2023-53043] = "fixed-version: Fixed from version 6.3" | ||
5089 | |||
5090 | CVE_STATUS[CVE-2023-53044] = "fixed-version: Fixed from version 6.3" | ||
5091 | |||
5092 | CVE_STATUS[CVE-2023-53045] = "fixed-version: Fixed from version 6.3" | ||
5093 | |||
5094 | CVE_STATUS[CVE-2023-53046] = "fixed-version: Fixed from version 6.3" | ||
5095 | |||
5096 | CVE_STATUS[CVE-2023-53047] = "fixed-version: Fixed from version 6.3" | ||
5097 | |||
5098 | CVE_STATUS[CVE-2023-53048] = "fixed-version: Fixed from version 6.3" | ||
5099 | |||
5100 | CVE_STATUS[CVE-2023-53049] = "fixed-version: Fixed from version 6.3" | ||
5101 | |||
5102 | CVE_STATUS[CVE-2023-53050] = "fixed-version: Fixed from version 6.3" | ||
5103 | |||
5104 | CVE_STATUS[CVE-2023-53051] = "fixed-version: Fixed from version 6.3" | ||
5105 | |||
5106 | CVE_STATUS[CVE-2023-53052] = "fixed-version: Fixed from version 6.3" | ||
5107 | |||
5108 | CVE_STATUS[CVE-2023-53053] = "fixed-version: Fixed from version 6.3" | ||
5109 | |||
5110 | CVE_STATUS[CVE-2023-53054] = "fixed-version: Fixed from version 6.3" | ||
5111 | |||
5112 | CVE_STATUS[CVE-2023-53055] = "fixed-version: Fixed from version 6.3" | ||
5113 | |||
5114 | CVE_STATUS[CVE-2023-53056] = "fixed-version: Fixed from version 6.2.9" | ||
5115 | |||
5116 | CVE_STATUS[CVE-2023-53057] = "fixed-version: Fixed from version 6.3" | ||
5117 | |||
5118 | CVE_STATUS[CVE-2023-53058] = "fixed-version: Fixed from version 6.3" | ||
5119 | |||
5120 | CVE_STATUS[CVE-2023-53059] = "fixed-version: Fixed from version 6.3" | ||
5121 | |||
5122 | CVE_STATUS[CVE-2023-53060] = "fixed-version: Fixed from version 6.3" | ||
5123 | |||
5124 | CVE_STATUS[CVE-2023-53061] = "fixed-version: Fixed from version 6.3" | ||
5125 | |||
5126 | CVE_STATUS[CVE-2023-53062] = "fixed-version: Fixed from version 6.3" | ||
5127 | |||
5128 | CVE_STATUS[CVE-2023-53064] = "fixed-version: Fixed from version 6.3" | ||
5129 | |||
5130 | CVE_STATUS[CVE-2023-53065] = "fixed-version: Fixed from version 6.3" | ||
5131 | |||
5132 | CVE_STATUS[CVE-2023-53066] = "fixed-version: Fixed from version 6.3" | ||
5133 | |||
5134 | CVE_STATUS[CVE-2023-53067] = "fixed-version: Fixed from version 6.3" | ||
5135 | |||
5136 | CVE_STATUS[CVE-2023-53068] = "fixed-version: Fixed from version 6.3" | ||
5137 | |||
5138 | CVE_STATUS[CVE-2023-53069] = "fixed-version: Fixed from version 6.3" | ||
5139 | |||
5140 | CVE_STATUS[CVE-2023-53070] = "fixed-version: Fixed from version 6.3" | ||
5141 | |||
5142 | CVE_STATUS[CVE-2023-53071] = "fixed-version: Fixed from version 6.3" | ||
5143 | |||
5144 | CVE_STATUS[CVE-2023-53072] = "fixed-version: Fixed from version 6.3" | ||
5145 | |||
5146 | CVE_STATUS[CVE-2023-53073] = "fixed-version: Fixed from version 6.3" | ||
5147 | |||
5148 | CVE_STATUS[CVE-2023-53074] = "fixed-version: Fixed from version 6.3" | ||
5149 | |||
5150 | CVE_STATUS[CVE-2023-53075] = "fixed-version: Fixed from version 6.3" | ||
5151 | |||
5152 | CVE_STATUS[CVE-2023-53077] = "fixed-version: Fixed from version 6.3" | ||
5153 | |||
5154 | CVE_STATUS[CVE-2023-53078] = "fixed-version: Fixed from version 6.3" | ||
5155 | |||
5156 | CVE_STATUS[CVE-2023-53079] = "fixed-version: Fixed from version 6.3" | ||
5157 | |||
5158 | CVE_STATUS[CVE-2023-53080] = "fixed-version: Fixed from version 6.3" | ||
5159 | |||
5160 | CVE_STATUS[CVE-2023-53081] = "fixed-version: Fixed from version 6.3" | ||
5161 | |||
5162 | CVE_STATUS[CVE-2023-53082] = "fixed-version: Fixed from version 6.3" | ||
5163 | |||
5164 | CVE_STATUS[CVE-2023-53083] = "fixed-version: Fixed from version 6.3" | ||
5165 | |||
5166 | CVE_STATUS[CVE-2023-53084] = "fixed-version: Fixed from version 6.3" | ||
5167 | |||
5168 | CVE_STATUS[CVE-2023-53085] = "fixed-version: Fixed from version 6.3" | ||
5169 | |||
5170 | CVE_STATUS[CVE-2023-53086] = "fixed-version: Fixed from version 6.3" | ||
5171 | |||
5172 | CVE_STATUS[CVE-2023-53087] = "fixed-version: Fixed from version 6.3" | ||
5173 | |||
5174 | CVE_STATUS[CVE-2023-53088] = "fixed-version: Fixed from version 6.3" | ||
5175 | |||
5176 | CVE_STATUS[CVE-2023-53089] = "fixed-version: Fixed from version 6.3" | ||
5177 | |||
5178 | CVE_STATUS[CVE-2023-53090] = "fixed-version: Fixed from version 6.3" | ||
5179 | |||
5180 | CVE_STATUS[CVE-2023-53091] = "fixed-version: Fixed from version 6.3" | ||
5181 | |||
5182 | CVE_STATUS[CVE-2023-53092] = "fixed-version: Fixed from version 6.3" | ||
5183 | |||
5184 | CVE_STATUS[CVE-2023-53093] = "fixed-version: Fixed from version 6.3" | ||
5185 | |||
5186 | CVE_STATUS[CVE-2023-53094] = "fixed-version: Fixed from version 6.3" | ||
5187 | |||
5188 | CVE_STATUS[CVE-2023-53095] = "fixed-version: Fixed from version 6.3" | ||
5189 | |||
5190 | CVE_STATUS[CVE-2023-53096] = "fixed-version: Fixed from version 6.3" | ||
5191 | |||
5192 | CVE_STATUS[CVE-2023-53097] = "fixed-version: Fixed from version 6.3" | ||
5193 | |||
5194 | CVE_STATUS[CVE-2023-53098] = "fixed-version: Fixed from version 6.3" | ||
5195 | |||
5196 | CVE_STATUS[CVE-2023-53099] = "fixed-version: Fixed from version 6.3" | ||
5197 | |||
5198 | CVE_STATUS[CVE-2023-53100] = "fixed-version: Fixed from version 6.3" | ||
5199 | |||
5200 | CVE_STATUS[CVE-2023-53101] = "fixed-version: Fixed from version 6.3" | ||
5201 | |||
5202 | CVE_STATUS[CVE-2023-53102] = "fixed-version: Fixed from version 6.3" | ||
5203 | |||
5204 | CVE_STATUS[CVE-2023-53103] = "fixed-version: Fixed from version 6.3" | ||
5205 | |||
5206 | CVE_STATUS[CVE-2023-53105] = "fixed-version: Fixed from version 6.3" | ||
5207 | |||
5208 | CVE_STATUS[CVE-2023-53106] = "fixed-version: Fixed from version 6.3" | ||
5209 | |||
5210 | CVE_STATUS[CVE-2023-53107] = "fixed-version: Fixed from version 6.3" | ||
5211 | |||
5212 | CVE_STATUS[CVE-2023-53108] = "fixed-version: Fixed from version 6.3" | ||
5213 | |||
5214 | CVE_STATUS[CVE-2023-53109] = "fixed-version: Fixed from version 6.3" | ||
5215 | |||
5216 | CVE_STATUS[CVE-2023-53110] = "fixed-version: Fixed from version 6.3" | ||
5217 | |||
5218 | CVE_STATUS[CVE-2023-53111] = "fixed-version: Fixed from version 6.3" | ||
5219 | |||
5220 | CVE_STATUS[CVE-2023-53112] = "fixed-version: Fixed from version 6.3" | ||
5221 | |||
5222 | CVE_STATUS[CVE-2023-53113] = "fixed-version: Fixed from version 6.3" | ||
5223 | |||
5224 | CVE_STATUS[CVE-2023-53114] = "fixed-version: Fixed from version 6.3" | ||
5225 | |||
5226 | CVE_STATUS[CVE-2023-53115] = "fixed-version: Fixed from version 6.3" | ||
5227 | |||
5228 | CVE_STATUS[CVE-2023-53116] = "fixed-version: Fixed from version 6.3" | ||
5229 | |||
5230 | CVE_STATUS[CVE-2023-53117] = "fixed-version: Fixed from version 6.3" | ||
5231 | |||
5232 | CVE_STATUS[CVE-2023-53118] = "fixed-version: Fixed from version 6.2.8" | ||
5233 | |||
5234 | CVE_STATUS[CVE-2023-53119] = "fixed-version: Fixed from version 6.3" | ||
5235 | |||
5236 | CVE_STATUS[CVE-2023-53120] = "fixed-version: Fixed from version 6.3" | ||
5237 | |||
5238 | CVE_STATUS[CVE-2023-53121] = "fixed-version: Fixed from version 6.3" | ||
5239 | |||
5240 | CVE_STATUS[CVE-2023-53123] = "fixed-version: Fixed from version 6.3" | ||
5241 | |||
5242 | CVE_STATUS[CVE-2023-53124] = "fixed-version: Fixed from version 6.3" | ||
5243 | |||
5244 | CVE_STATUS[CVE-2023-53125] = "fixed-version: Fixed from version 6.3" | ||
5245 | |||
5246 | CVE_STATUS[CVE-2023-53126] = "fixed-version: Fixed from version 6.3" | ||
5247 | |||
5248 | CVE_STATUS[CVE-2023-53127] = "fixed-version: Fixed from version 6.3" | ||
5249 | |||
5250 | CVE_STATUS[CVE-2023-53128] = "fixed-version: Fixed from version 6.3" | ||
5251 | |||
5252 | CVE_STATUS[CVE-2023-53131] = "fixed-version: Fixed from version 6.3" | ||
5253 | |||
5254 | CVE_STATUS[CVE-2023-53132] = "fixed-version: Fixed from version 6.3" | ||
5255 | |||
5256 | CVE_STATUS[CVE-2023-53133] = "fixed-version: Fixed from version 6.3" | ||
5257 | |||
5258 | CVE_STATUS[CVE-2023-53134] = "fixed-version: Fixed from version 6.3" | ||
5259 | |||
5260 | CVE_STATUS[CVE-2023-53135] = "fixed-version: Fixed from version 6.3" | ||
5261 | |||
5262 | CVE_STATUS[CVE-2023-53136] = "fixed-version: Fixed from version 6.3" | ||
5263 | |||
5264 | CVE_STATUS[CVE-2023-53137] = "fixed-version: Fixed from version 6.3" | ||
5265 | |||
5266 | CVE_STATUS[CVE-2023-53138] = "fixed-version: Fixed from version 6.3" | ||
5267 | |||
5268 | CVE_STATUS[CVE-2023-53139] = "fixed-version: Fixed from version 6.3" | ||
5269 | |||
5270 | CVE_STATUS[CVE-2023-53140] = "fixed-version: Fixed from version 6.3" | ||
5271 | |||
5272 | CVE_STATUS[CVE-2023-53141] = "fixed-version: Fixed from version 6.3" | ||
5273 | |||
5274 | CVE_STATUS[CVE-2023-53142] = "fixed-version: Fixed from version 6.3" | ||
5275 | |||
5276 | CVE_STATUS[CVE-2023-53143] = "fixed-version: Fixed from version 6.3" | ||
5277 | |||
5278 | CVE_STATUS[CVE-2023-53144] = "fixed-version: Fixed from version 6.3" | ||
5279 | |||
5280 | CVE_STATUS[CVE-2023-53145] = "fixed-version: Fixed from version 6.3" | ||
5281 | |||
5282 | CVE_STATUS[CVE-2023-53146] = "fixed-version: Fixed from version 6.6" | ||
5283 | |||
5284 | CVE_STATUS[CVE-2024-26581] = "fixed-version: Fixed from version 6.8" | ||
5285 | |||
5286 | CVE_STATUS[CVE-2024-26582] = "fixed-version: Fixed from version 6.8" | ||
5287 | |||
5288 | CVE_STATUS[CVE-2024-26583] = "fixed-version: Fixed from version 6.8" | ||
5289 | |||
5290 | CVE_STATUS[CVE-2024-26584] = "fixed-version: Fixed from version 6.8" | ||
5291 | |||
5292 | CVE_STATUS[CVE-2024-26585] = "fixed-version: Fixed from version 6.8" | ||
5293 | |||
5294 | CVE_STATUS[CVE-2024-26586] = "fixed-version: Fixed from version 6.8" | ||
5295 | |||
5296 | CVE_STATUS[CVE-2024-26587] = "fixed-version: Fixed from version 6.8" | ||
5297 | |||
5298 | CVE_STATUS[CVE-2024-26588] = "fixed-version: Fixed from version 6.8" | ||
5299 | |||
5300 | CVE_STATUS[CVE-2024-26589] = "fixed-version: Fixed from version 6.8" | ||
5301 | |||
5302 | CVE_STATUS[CVE-2024-26590] = "fixed-version: Fixed from version 6.8" | ||
5303 | |||
5304 | CVE_STATUS[CVE-2024-26591] = "fixed-version: Fixed from version 6.8" | ||
5305 | |||
5306 | CVE_STATUS[CVE-2024-26592] = "fixed-version: Fixed from version 6.8" | ||
5307 | |||
5308 | CVE_STATUS[CVE-2024-26593] = "fixed-version: Fixed from version 6.8" | ||
5309 | |||
5310 | CVE_STATUS[CVE-2024-26594] = "fixed-version: Fixed from version 6.8" | ||
5311 | |||
5312 | CVE_STATUS[CVE-2024-26595] = "fixed-version: Fixed from version 6.8" | ||
5313 | |||
5314 | CVE_STATUS[CVE-2024-26596] = "fixed-version: Fixed from version 6.8" | ||
5315 | |||
5316 | CVE_STATUS[CVE-2024-26597] = "fixed-version: Fixed from version 6.8" | ||
5317 | |||
5318 | CVE_STATUS[CVE-2024-26598] = "fixed-version: Fixed from version 6.8" | ||
5319 | |||
5320 | CVE_STATUS[CVE-2024-26599] = "fixed-version: Fixed from version 6.8" | ||
5321 | |||
5322 | CVE_STATUS[CVE-2024-26600] = "fixed-version: Fixed from version 6.8" | ||
5323 | |||
5324 | CVE_STATUS[CVE-2024-26601] = "fixed-version: Fixed from version 6.8" | ||
5325 | |||
5326 | CVE_STATUS[CVE-2024-26602] = "fixed-version: Fixed from version 6.8" | ||
5327 | |||
5328 | CVE_STATUS[CVE-2024-26603] = "fixed-version: Fixed from version 6.8" | ||
5329 | |||
5330 | CVE_STATUS[CVE-2024-26604] = "fixed-version: Fixed from version 6.8" | ||
5331 | |||
5332 | CVE_STATUS[CVE-2024-26605] = "fixed-version: Fixed from version 6.8" | ||
5333 | |||
5334 | CVE_STATUS[CVE-2024-26606] = "fixed-version: Fixed from version 6.8" | ||
5335 | |||
5336 | CVE_STATUS[CVE-2024-26607] = "fixed-version: Fixed from version 6.8" | ||
5337 | |||
5338 | CVE_STATUS[CVE-2024-26608] = "fixed-version: Fixed from version 6.8" | ||
5339 | |||
5340 | CVE_STATUS[CVE-2024-26610] = "fixed-version: Fixed from version 6.8" | ||
5341 | |||
5342 | CVE_STATUS[CVE-2024-26611] = "fixed-version: Fixed from version 6.8" | ||
5343 | |||
5344 | CVE_STATUS[CVE-2024-26612] = "fixed-version: Fixed from version 6.8" | ||
5345 | |||
5346 | CVE_STATUS[CVE-2024-26614] = "fixed-version: Fixed from version 6.8" | ||
5347 | |||
5348 | CVE_STATUS[CVE-2024-26615] = "fixed-version: Fixed from version 6.8" | ||
5349 | |||
5350 | CVE_STATUS[CVE-2024-26616] = "fixed-version: Fixed from version 6.8" | ||
5351 | |||
5352 | CVE_STATUS[CVE-2024-26617] = "fixed-version: Fixed from version 6.8" | ||
5353 | |||
5354 | CVE_STATUS[CVE-2024-26618] = "fixed-version: Fixed from version 6.8" | ||
5355 | |||
5356 | CVE_STATUS[CVE-2024-26619] = "fixed-version: Fixed from version 6.8" | ||
5357 | |||
5358 | CVE_STATUS[CVE-2024-26620] = "fixed-version: Fixed from version 6.8" | ||
5359 | |||
5360 | CVE_STATUS[CVE-2024-26621] = "fixed-version: Fixed from version 6.8" | ||
5361 | |||
5362 | CVE_STATUS[CVE-2024-26622] = "fixed-version: Fixed from version 6.8" | ||
5363 | |||
5364 | CVE_STATUS[CVE-2024-26623] = "fixed-version: Fixed from version 6.8" | ||
5365 | |||
5366 | CVE_STATUS[CVE-2024-26625] = "fixed-version: Fixed from version 6.8" | ||
5367 | |||
5368 | CVE_STATUS[CVE-2024-26626] = "fixed-version: Fixed from version 6.7.4" | ||
5369 | |||
5370 | CVE_STATUS[CVE-2024-26627] = "fixed-version: Fixed from version 6.8" | ||
5371 | |||
5372 | CVE_STATUS[CVE-2024-26629] = "fixed-version: Fixed from version 6.8" | ||
5373 | |||
5374 | CVE_STATUS[CVE-2024-26630] = "fixed-version: Fixed from version 6.8" | ||
5375 | |||
5376 | CVE_STATUS[CVE-2024-26631] = "fixed-version: Fixed from version 6.8" | ||
5377 | |||
5378 | CVE_STATUS[CVE-2024-26632] = "fixed-version: Fixed from version 6.8" | ||
5379 | |||
5380 | CVE_STATUS[CVE-2024-26633] = "fixed-version: Fixed from version 6.8" | ||
5381 | |||
5382 | CVE_STATUS[CVE-2024-26634] = "fixed-version: Fixed from version 6.8" | ||
5383 | |||
5384 | CVE_STATUS[CVE-2024-26635] = "fixed-version: Fixed from version 6.8" | ||
5385 | |||
5386 | CVE_STATUS[CVE-2024-26636] = "fixed-version: Fixed from version 6.8" | ||
5387 | |||
5388 | CVE_STATUS[CVE-2024-26637] = "fixed-version: Fixed from version 6.8" | ||
5389 | |||
5390 | CVE_STATUS[CVE-2024-26638] = "fixed-version: Fixed from version 6.8" | ||
5391 | |||
5392 | CVE_STATUS[CVE-2024-26640] = "fixed-version: Fixed from version 6.8" | ||
5393 | |||
5394 | CVE_STATUS[CVE-2024-26641] = "fixed-version: Fixed from version 6.8" | ||
5395 | |||
5396 | CVE_STATUS[CVE-2024-26642] = "fixed-version: Fixed from version 6.8" | ||
5397 | |||
5398 | CVE_STATUS[CVE-2024-26643] = "fixed-version: Fixed from version 6.8" | ||
5399 | |||
5400 | CVE_STATUS[CVE-2024-26644] = "fixed-version: Fixed from version 6.8" | ||
5401 | |||
5402 | CVE_STATUS[CVE-2024-26645] = "fixed-version: Fixed from version 6.8" | ||
5403 | |||
5404 | CVE_STATUS[CVE-2024-26646] = "fixed-version: Fixed from version 6.8" | ||
5405 | |||
5406 | CVE_STATUS[CVE-2024-26647] = "fixed-version: Fixed from version 6.8" | ||
5407 | |||
5408 | CVE_STATUS[CVE-2024-26648] = "fixed-version: Fixed from version 6.8" | ||
5409 | |||
5410 | CVE_STATUS[CVE-2024-26649] = "fixed-version: Fixed from version 6.8" | ||
5411 | |||
5412 | CVE_STATUS[CVE-2024-26651] = "fixed-version: Fixed from version 6.9" | ||
5413 | |||
5414 | CVE_STATUS[CVE-2024-26652] = "fixed-version: Fixed from version 6.8" | ||
5415 | |||
5416 | CVE_STATUS[CVE-2024-26653] = "fixed-version: Fixed from version 6.9" | ||
5417 | |||
5418 | CVE_STATUS[CVE-2024-26654] = "fixed-version: Fixed from version 6.9" | ||
5419 | |||
5420 | CVE_STATUS[CVE-2024-26655] = "fixed-version: Fixed from version 6.9" | ||
5421 | |||
5422 | CVE_STATUS[CVE-2024-26656] = "fixed-version: Fixed from version 6.9" | ||
5423 | |||
5424 | CVE_STATUS[CVE-2024-26657] = "fixed-version: Fixed from version 6.9" | ||
5425 | |||
5426 | CVE_STATUS[CVE-2024-26658] = "fixed-version: Fixed from version 6.8" | ||
5427 | |||
5428 | CVE_STATUS[CVE-2024-26659] = "fixed-version: Fixed from version 6.8" | ||
5429 | |||
5430 | CVE_STATUS[CVE-2024-26660] = "fixed-version: Fixed from version 6.8" | ||
5431 | |||
5432 | CVE_STATUS[CVE-2024-26661] = "fixed-version: Fixed from version 6.8" | ||
5433 | |||
5434 | CVE_STATUS[CVE-2024-26662] = "fixed-version: Fixed from version 6.8" | ||
5435 | |||
5436 | CVE_STATUS[CVE-2024-26663] = "fixed-version: Fixed from version 6.8" | ||
5437 | |||
5438 | CVE_STATUS[CVE-2024-26664] = "fixed-version: Fixed from version 6.8" | ||
5439 | |||
5440 | CVE_STATUS[CVE-2024-26665] = "fixed-version: Fixed from version 6.8" | ||
5441 | |||
5442 | CVE_STATUS[CVE-2024-26666] = "fixed-version: Fixed from version 6.8" | ||
5443 | |||
5444 | CVE_STATUS[CVE-2024-26667] = "fixed-version: Fixed from version 6.8" | ||
5445 | |||
5446 | CVE_STATUS[CVE-2024-26668] = "fixed-version: Fixed from version 6.8" | ||
5447 | |||
5448 | CVE_STATUS[CVE-2024-26669] = "fixed-version: Fixed from version 6.8" | ||
5449 | |||
5450 | CVE_STATUS[CVE-2024-26670] = "fixed-version: Fixed from version 6.8" | ||
5451 | |||
5452 | CVE_STATUS[CVE-2024-26671] = "fixed-version: Fixed from version 6.8" | ||
5453 | |||
5454 | CVE_STATUS[CVE-2024-26672] = "fixed-version: Fixed from version 6.8" | ||
5455 | |||
5456 | CVE_STATUS[CVE-2024-26673] = "fixed-version: Fixed from version 6.8" | ||
5457 | |||
5458 | CVE_STATUS[CVE-2024-26674] = "fixed-version: Fixed from version 6.8" | ||
5459 | |||
5460 | CVE_STATUS[CVE-2024-26675] = "fixed-version: Fixed from version 6.8" | ||
5461 | |||
5462 | CVE_STATUS[CVE-2024-26676] = "fixed-version: Fixed from version 6.8" | ||
5463 | |||
5464 | CVE_STATUS[CVE-2024-26677] = "fixed-version: Fixed from version 6.8" | ||
5465 | |||
5466 | CVE_STATUS[CVE-2024-26678] = "fixed-version: Fixed from version 6.8" | ||
5467 | |||
5468 | CVE_STATUS[CVE-2024-26679] = "fixed-version: Fixed from version 6.8" | ||
5469 | |||
5470 | CVE_STATUS[CVE-2024-26680] = "fixed-version: Fixed from version 6.8" | ||
5471 | |||
5472 | CVE_STATUS[CVE-2024-26681] = "fixed-version: Fixed from version 6.8" | ||
5473 | |||
5474 | CVE_STATUS[CVE-2024-26682] = "fixed-version: Fixed from version 6.8" | ||
5475 | |||
5476 | CVE_STATUS[CVE-2024-26683] = "fixed-version: Fixed from version 6.8" | ||
5477 | |||
5478 | CVE_STATUS[CVE-2024-26684] = "fixed-version: Fixed from version 6.8" | ||
5479 | |||
5480 | CVE_STATUS[CVE-2024-26685] = "fixed-version: Fixed from version 6.8" | ||
5481 | |||
5482 | CVE_STATUS[CVE-2024-26686] = "fixed-version: Fixed from version 6.8" | ||
5483 | |||
5484 | CVE_STATUS[CVE-2024-26687] = "fixed-version: Fixed from version 6.8" | ||
5485 | |||
5486 | CVE_STATUS[CVE-2024-26688] = "fixed-version: Fixed from version 6.8" | ||
5487 | |||
5488 | CVE_STATUS[CVE-2024-26689] = "fixed-version: Fixed from version 6.8" | ||
5489 | |||
5490 | CVE_STATUS[CVE-2024-26690] = "fixed-version: Fixed from version 6.8" | ||
5491 | |||
5492 | CVE_STATUS[CVE-2024-26691] = "fixed-version: Fixed from version 6.8" | ||
5493 | |||
5494 | CVE_STATUS[CVE-2024-26692] = "fixed-version: Fixed from version 6.8" | ||
5495 | |||
5496 | CVE_STATUS[CVE-2024-26693] = "fixed-version: Fixed from version 6.8" | ||
5497 | |||
5498 | CVE_STATUS[CVE-2024-26694] = "fixed-version: Fixed from version 6.8" | ||
5499 | |||
5500 | CVE_STATUS[CVE-2024-26695] = "fixed-version: Fixed from version 6.8" | ||
5501 | |||
5502 | CVE_STATUS[CVE-2024-26696] = "fixed-version: Fixed from version 6.8" | ||
5503 | |||
5504 | CVE_STATUS[CVE-2024-26697] = "fixed-version: Fixed from version 6.8" | ||
5505 | |||
5506 | CVE_STATUS[CVE-2024-26698] = "fixed-version: Fixed from version 6.8" | ||
5507 | |||
5508 | CVE_STATUS[CVE-2024-26699] = "fixed-version: Fixed from version 6.8" | ||
5509 | |||
5510 | CVE_STATUS[CVE-2024-26700] = "fixed-version: Fixed from version 6.8" | ||
5511 | |||
5512 | CVE_STATUS[CVE-2024-26702] = "fixed-version: Fixed from version 6.8" | ||
5513 | |||
5514 | CVE_STATUS[CVE-2024-26703] = "fixed-version: Fixed from version 6.8" | ||
5515 | |||
5516 | CVE_STATUS[CVE-2024-26704] = "fixed-version: Fixed from version 6.8" | ||
5517 | |||
5518 | CVE_STATUS[CVE-2024-26705] = "fixed-version: Fixed from version 6.8" | ||
5519 | |||
5520 | CVE_STATUS[CVE-2024-26706] = "fixed-version: Fixed from version 6.8" | ||
5521 | |||
5522 | CVE_STATUS[CVE-2024-26707] = "fixed-version: Fixed from version 6.8" | ||
5523 | |||
5524 | CVE_STATUS[CVE-2024-26708] = "fixed-version: Fixed from version 6.8" | ||
5525 | |||
5526 | CVE_STATUS[CVE-2024-26709] = "fixed-version: Fixed from version 6.8" | ||
5527 | |||
5528 | # CVE-2024-26710 has no known resolution | ||
5529 | |||
5530 | CVE_STATUS[CVE-2024-26711] = "fixed-version: Fixed from version 6.8" | ||
5531 | |||
5532 | CVE_STATUS[CVE-2024-26712] = "fixed-version: Fixed from version 6.8" | ||
5533 | |||
5534 | CVE_STATUS[CVE-2024-26714] = "fixed-version: Fixed from version 6.8" | ||
5535 | |||
5536 | CVE_STATUS[CVE-2024-26715] = "fixed-version: Fixed from version 6.8" | ||
5537 | |||
5538 | CVE_STATUS[CVE-2024-26716] = "fixed-version: Fixed from version 6.8" | ||
5539 | |||
5540 | CVE_STATUS[CVE-2024-26717] = "fixed-version: Fixed from version 6.8" | ||
5541 | |||
5542 | CVE_STATUS[CVE-2024-26718] = "fixed-version: Fixed from version 6.8" | ||
5543 | |||
5544 | CVE_STATUS[CVE-2024-26719] = "fixed-version: Fixed from version 6.8" | ||
5545 | |||
5546 | CVE_STATUS[CVE-2024-26721] = "fixed-version: Fixed from version 6.8" | ||
5547 | |||
5548 | CVE_STATUS[CVE-2024-26722] = "fixed-version: Fixed from version 6.8" | ||
5549 | |||
5550 | CVE_STATUS[CVE-2024-26723] = "fixed-version: Fixed from version 6.8" | ||
5551 | |||
5552 | CVE_STATUS[CVE-2024-26724] = "fixed-version: Fixed from version 6.8" | ||
5553 | |||
5554 | CVE_STATUS[CVE-2024-26725] = "fixed-version: Fixed from version 6.8" | ||
5555 | |||
5556 | CVE_STATUS[CVE-2024-26726] = "fixed-version: Fixed from version 6.8" | ||
5557 | |||
5558 | CVE_STATUS[CVE-2024-26727] = "fixed-version: Fixed from version 6.8" | ||
5559 | |||
5560 | CVE_STATUS[CVE-2024-26728] = "fixed-version: Fixed from version 6.8" | ||
5561 | |||
5562 | CVE_STATUS[CVE-2024-26729] = "fixed-version: Fixed from version 6.8" | ||
5563 | |||
5564 | CVE_STATUS[CVE-2024-26730] = "fixed-version: Fixed from version 6.8" | ||
5565 | |||
5566 | CVE_STATUS[CVE-2024-26731] = "fixed-version: Fixed from version 6.8" | ||
5567 | |||
5568 | CVE_STATUS[CVE-2024-26732] = "fixed-version: Fixed from version 6.8" | ||
5569 | |||
5570 | CVE_STATUS[CVE-2024-26733] = "fixed-version: Fixed from version 6.8" | ||
5571 | |||
5572 | CVE_STATUS[CVE-2024-26734] = "fixed-version: Fixed from version 6.8" | ||
5573 | |||
5574 | CVE_STATUS[CVE-2024-26735] = "fixed-version: Fixed from version 6.8" | ||
5575 | |||
5576 | CVE_STATUS[CVE-2024-26736] = "fixed-version: Fixed from version 6.8" | ||
5577 | |||
5578 | CVE_STATUS[CVE-2024-26737] = "fixed-version: Fixed from version 6.8" | ||
5579 | |||
5580 | CVE_STATUS[CVE-2024-26738] = "fixed-version: Fixed from version 6.8" | ||
5581 | |||
5582 | CVE_STATUS[CVE-2024-26739] = "fixed-version: Fixed from version 6.8" | ||
5583 | |||
5584 | CVE_STATUS[CVE-2024-26740] = "fixed-version: Fixed from version 6.8" | ||
5585 | |||
5586 | CVE_STATUS[CVE-2024-26741] = "fixed-version: Fixed from version 6.8" | ||
5587 | |||
5588 | CVE_STATUS[CVE-2024-26742] = "fixed-version: Fixed from version 6.8" | ||
5589 | |||
5590 | CVE_STATUS[CVE-2024-26743] = "fixed-version: Fixed from version 6.8" | ||
5591 | |||
5592 | CVE_STATUS[CVE-2024-26744] = "fixed-version: Fixed from version 6.8" | ||
5593 | |||
5594 | CVE_STATUS[CVE-2024-26745] = "fixed-version: Fixed from version 6.8" | ||
5595 | |||
5596 | CVE_STATUS[CVE-2024-26746] = "fixed-version: Fixed from version 6.8" | ||
5597 | |||
5598 | CVE_STATUS[CVE-2024-26747] = "fixed-version: Fixed from version 6.8" | ||
5599 | |||
5600 | CVE_STATUS[CVE-2024-26748] = "fixed-version: Fixed from version 6.8" | ||
5601 | |||
5602 | CVE_STATUS[CVE-2024-26749] = "fixed-version: Fixed from version 6.8" | ||
5603 | |||
5604 | CVE_STATUS[CVE-2024-26750] = "fixed-version: Fixed from version 5.15.151" | ||
5605 | |||
5606 | CVE_STATUS[CVE-2024-26751] = "fixed-version: Fixed from version 6.8" | ||
5607 | |||
5608 | CVE_STATUS[CVE-2024-26752] = "fixed-version: Fixed from version 6.8" | ||
5609 | |||
5610 | CVE_STATUS[CVE-2024-26753] = "fixed-version: Fixed from version 6.8" | ||
5611 | |||
5612 | CVE_STATUS[CVE-2024-26754] = "fixed-version: Fixed from version 6.8" | ||
5613 | |||
5614 | CVE_STATUS[CVE-2024-26755] = "fixed-version: Fixed from version 6.8" | ||
5615 | |||
5616 | CVE_STATUS[CVE-2024-26756] = "fixed-version: Fixed from version 6.8" | ||
5617 | |||
5618 | CVE_STATUS[CVE-2024-26757] = "fixed-version: Fixed from version 6.8" | ||
5619 | |||
5620 | CVE_STATUS[CVE-2024-26758] = "fixed-version: Fixed from version 6.8" | ||
5621 | |||
5622 | CVE_STATUS[CVE-2024-26759] = "fixed-version: Fixed from version 6.8" | ||
5623 | |||
5624 | CVE_STATUS[CVE-2024-26760] = "fixed-version: Fixed from version 6.8" | ||
5625 | |||
5626 | CVE_STATUS[CVE-2024-26761] = "fixed-version: Fixed from version 6.8" | ||
5627 | |||
5628 | CVE_STATUS[CVE-2024-26762] = "fixed-version: Fixed from version 6.8" | ||
5629 | |||
5630 | CVE_STATUS[CVE-2024-26763] = "fixed-version: Fixed from version 6.8" | ||
5631 | |||
5632 | CVE_STATUS[CVE-2024-26764] = "fixed-version: Fixed from version 6.8" | ||
5633 | |||
5634 | CVE_STATUS[CVE-2024-26765] = "fixed-version: Fixed from version 6.8" | ||
5635 | |||
5636 | CVE_STATUS[CVE-2024-26766] = "fixed-version: Fixed from version 6.8" | ||
5637 | |||
5638 | CVE_STATUS[CVE-2024-26767] = "fixed-version: Fixed from version 6.8" | ||
5639 | |||
5640 | CVE_STATUS[CVE-2024-26768] = "fixed-version: Fixed from version 6.8" | ||
5641 | |||
5642 | CVE_STATUS[CVE-2024-26769] = "fixed-version: Fixed from version 6.8" | ||
5643 | |||
5644 | CVE_STATUS[CVE-2024-26770] = "fixed-version: Fixed from version 6.8" | ||
5645 | |||
5646 | CVE_STATUS[CVE-2024-26771] = "fixed-version: Fixed from version 6.8" | ||
5647 | |||
5648 | CVE_STATUS[CVE-2024-26772] = "fixed-version: Fixed from version 6.8" | ||
5649 | |||
5650 | CVE_STATUS[CVE-2024-26773] = "fixed-version: Fixed from version 6.8" | ||
5651 | |||
5652 | CVE_STATUS[CVE-2024-26774] = "fixed-version: Fixed from version 6.8" | ||
5653 | |||
5654 | CVE_STATUS[CVE-2024-26775] = "fixed-version: Fixed from version 6.8" | ||
5655 | |||
5656 | CVE_STATUS[CVE-2024-26776] = "fixed-version: Fixed from version 6.8" | ||
5657 | |||
5658 | CVE_STATUS[CVE-2024-26777] = "fixed-version: Fixed from version 6.8" | ||
5659 | |||
5660 | CVE_STATUS[CVE-2024-26778] = "fixed-version: Fixed from version 6.8" | ||
5661 | |||
5662 | CVE_STATUS[CVE-2024-26779] = "fixed-version: Fixed from version 6.8" | ||
5663 | |||
5664 | CVE_STATUS[CVE-2024-26780] = "fixed-version: Fixed from version 6.7.9" | ||
5665 | |||
5666 | CVE_STATUS[CVE-2024-26781] = "fixed-version: Fixed from version 6.7.9" | ||
5667 | |||
5668 | CVE_STATUS[CVE-2024-26782] = "fixed-version: Fixed from version 6.8" | ||
5669 | |||
5670 | CVE_STATUS[CVE-2024-26783] = "fixed-version: Fixed from version 6.8" | ||
5671 | |||
5672 | CVE_STATUS[CVE-2024-26784] = "fixed-version: Fixed from version 6.8" | ||
5673 | |||
5674 | CVE_STATUS[CVE-2024-26785] = "fixed-version: Fixed from version 6.8" | ||
5675 | |||
5676 | CVE_STATUS[CVE-2024-26786] = "fixed-version: Fixed from version 6.8" | ||
5677 | |||
5678 | CVE_STATUS[CVE-2024-26787] = "fixed-version: Fixed from version 6.8" | ||
5679 | |||
5680 | CVE_STATUS[CVE-2024-26788] = "fixed-version: Fixed from version 6.8" | ||
5681 | |||
5682 | CVE_STATUS[CVE-2024-26789] = "fixed-version: Fixed from version 6.8" | ||
5683 | |||
5684 | CVE_STATUS[CVE-2024-26790] = "fixed-version: Fixed from version 6.8" | ||
5685 | |||
5686 | CVE_STATUS[CVE-2024-26791] = "fixed-version: Fixed from version 6.8" | ||
5687 | |||
5688 | CVE_STATUS[CVE-2024-26792] = "fixed-version: Fixed from version 6.7.9" | ||
5689 | |||
5690 | CVE_STATUS[CVE-2024-26793] = "fixed-version: Fixed from version 6.8" | ||
5691 | |||
5692 | CVE_STATUS[CVE-2024-26794] = "fixed-version: Fixed from version 6.7.9" | ||
5693 | |||
5694 | CVE_STATUS[CVE-2024-26795] = "fixed-version: Fixed from version 6.8" | ||
5695 | |||
5696 | CVE_STATUS[CVE-2024-26796] = "fixed-version: Fixed from version 6.8" | ||
5697 | |||
5698 | CVE_STATUS[CVE-2024-26797] = "fixed-version: Fixed from version 6.8" | ||
5699 | |||
5700 | CVE_STATUS[CVE-2024-26798] = "fixed-version: Fixed from version 6.8" | ||
5701 | |||
5702 | CVE_STATUS[CVE-2024-26799] = "fixed-version: Fixed from version 6.8" | ||
5703 | |||
5704 | CVE_STATUS[CVE-2024-26800] = "fixed-version: Fixed from version 6.7.9" | ||
5705 | |||
5706 | CVE_STATUS[CVE-2024-26801] = "fixed-version: Fixed from version 6.8" | ||
5707 | |||
5708 | CVE_STATUS[CVE-2024-26802] = "fixed-version: Fixed from version 6.8" | ||
5709 | |||
5710 | CVE_STATUS[CVE-2024-26803] = "fixed-version: Fixed from version 6.8" | ||
5711 | |||
5712 | CVE_STATUS[CVE-2024-26804] = "fixed-version: Fixed from version 6.8" | ||
5713 | |||
5714 | CVE_STATUS[CVE-2024-26805] = "fixed-version: Fixed from version 6.8" | ||
5715 | |||
5716 | CVE_STATUS[CVE-2024-26806] = "fixed-version: Fixed from version 6.8" | ||
5717 | |||
5718 | CVE_STATUS[CVE-2024-26807] = "fixed-version: Fixed from version 6.8" | ||
5719 | |||
5720 | CVE_STATUS[CVE-2024-26808] = "fixed-version: Fixed from version 6.8" | ||
5721 | |||
5722 | CVE_STATUS[CVE-2024-26809] = "fixed-version: Fixed from version 6.9" | ||
5723 | |||
5724 | CVE_STATUS[CVE-2024-26810] = "fixed-version: Fixed from version 6.9" | ||
5725 | |||
5726 | CVE_STATUS[CVE-2024-26811] = "fixed-version: Fixed from version 6.9" | ||
5727 | |||
5728 | CVE_STATUS[CVE-2024-26812] = "fixed-version: Fixed from version 6.9" | ||
5729 | |||
5730 | CVE_STATUS[CVE-2024-26813] = "fixed-version: Fixed from version 6.9" | ||
5731 | |||
5732 | CVE_STATUS[CVE-2024-26814] = "fixed-version: Fixed from version 6.9" | ||
5733 | |||
5734 | CVE_STATUS[CVE-2024-26815] = "fixed-version: Fixed from version 6.9" | ||
5735 | |||
5736 | CVE_STATUS[CVE-2024-26816] = "fixed-version: Fixed from version 6.9" | ||
5737 | |||
5738 | CVE_STATUS[CVE-2024-26817] = "fixed-version: Fixed from version 6.9" | ||
5739 | |||
5740 | CVE_STATUS[CVE-2024-26818] = "fixed-version: Fixed from version 6.8" | ||
5741 | |||
5742 | CVE_STATUS[CVE-2024-26820] = "fixed-version: Fixed from version 6.8" | ||
5743 | |||
5744 | CVE_STATUS[CVE-2024-26822] = "fixed-version: Fixed from version 6.8" | ||
5745 | |||
5746 | CVE_STATUS[CVE-2024-26823] = "fixed-version: Fixed from version 6.8" | ||
5747 | |||
5748 | CVE_STATUS[CVE-2024-26824] = "fixed-version: Fixed from version 6.8" | ||
5749 | |||
5750 | CVE_STATUS[CVE-2024-26825] = "fixed-version: Fixed from version 6.8" | ||
5751 | |||
5752 | CVE_STATUS[CVE-2024-26826] = "fixed-version: Fixed from version 6.8" | ||
5753 | |||
5754 | CVE_STATUS[CVE-2024-26828] = "fixed-version: Fixed from version 6.8" | ||
5755 | |||
5756 | CVE_STATUS[CVE-2024-26829] = "fixed-version: Fixed from version 6.8" | ||
5757 | |||
5758 | CVE_STATUS[CVE-2024-26830] = "fixed-version: Fixed from version 6.8" | ||
5759 | |||
5760 | CVE_STATUS[CVE-2024-26831] = "fixed-version: Fixed from version 6.8" | ||
5761 | |||
5762 | CVE_STATUS[CVE-2024-26832] = "fixed-version: Fixed from version 6.8" | ||
5763 | |||
5764 | CVE_STATUS[CVE-2024-26833] = "fixed-version: Fixed from version 6.8" | ||
5765 | |||
5766 | CVE_STATUS[CVE-2024-26834] = "fixed-version: Fixed from version 6.8" | ||
5767 | |||
5768 | CVE_STATUS[CVE-2024-26835] = "fixed-version: Fixed from version 6.8" | ||
5769 | |||
5770 | CVE_STATUS[CVE-2024-26836] = "fixed-version: Fixed from version 6.8" | ||
5771 | |||
5772 | CVE_STATUS[CVE-2024-26837] = "fixed-version: Fixed from version 6.8" | ||
5773 | |||
5774 | CVE_STATUS[CVE-2024-26838] = "fixed-version: Fixed from version 6.8" | ||
5775 | |||
5776 | CVE_STATUS[CVE-2024-26839] = "fixed-version: Fixed from version 6.8" | ||
5777 | |||
5778 | CVE_STATUS[CVE-2024-26840] = "fixed-version: Fixed from version 6.8" | ||
5779 | |||
5780 | CVE_STATUS[CVE-2024-26841] = "fixed-version: Fixed from version 6.8" | ||
5781 | |||
5782 | CVE_STATUS[CVE-2024-26842] = "fixed-version: Fixed from version 6.8" | ||
5783 | |||
5784 | CVE_STATUS[CVE-2024-26843] = "fixed-version: Fixed from version 6.8" | ||
5785 | |||
5786 | CVE_STATUS[CVE-2024-26844] = "fixed-version: Fixed from version 6.8" | ||
5787 | |||
5788 | CVE_STATUS[CVE-2024-26845] = "fixed-version: Fixed from version 6.8" | ||
5789 | |||
5790 | CVE_STATUS[CVE-2024-26846] = "fixed-version: Fixed from version 6.8" | ||
5791 | |||
5792 | CVE_STATUS[CVE-2024-26847] = "fixed-version: Fixed from version 6.8" | ||
5793 | |||
5794 | CVE_STATUS[CVE-2024-26849] = "fixed-version: Fixed from version 6.8" | ||
5795 | |||
5796 | CVE_STATUS[CVE-2024-26850] = "fixed-version: Fixed from version 6.8" | ||
5797 | |||
5798 | CVE_STATUS[CVE-2024-26851] = "fixed-version: Fixed from version 6.8" | ||
5799 | |||
5800 | CVE_STATUS[CVE-2024-26852] = "fixed-version: Fixed from version 6.8" | ||
5801 | |||
5802 | CVE_STATUS[CVE-2024-26853] = "fixed-version: Fixed from version 6.8" | ||
5803 | |||
5804 | CVE_STATUS[CVE-2024-26854] = "fixed-version: Fixed from version 6.8" | ||
5805 | |||
5806 | CVE_STATUS[CVE-2024-26855] = "fixed-version: Fixed from version 6.8" | ||
5807 | |||
5808 | CVE_STATUS[CVE-2024-26856] = "fixed-version: Fixed from version 6.8" | ||
5809 | |||
5810 | CVE_STATUS[CVE-2024-26857] = "fixed-version: Fixed from version 6.8" | ||
5811 | |||
5812 | CVE_STATUS[CVE-2024-26858] = "fixed-version: Fixed from version 6.8" | ||
5813 | |||
5814 | CVE_STATUS[CVE-2024-26859] = "fixed-version: Fixed from version 6.9" | ||
5815 | |||
5816 | CVE_STATUS[CVE-2024-26860] = "fixed-version: Fixed from version 6.9" | ||
5817 | |||
5818 | CVE_STATUS[CVE-2024-26861] = "fixed-version: Fixed from version 6.9" | ||
5819 | |||
5820 | CVE_STATUS[CVE-2024-26862] = "fixed-version: Fixed from version 6.9" | ||
5821 | |||
5822 | CVE_STATUS[CVE-2024-26863] = "fixed-version: Fixed from version 6.9" | ||
5823 | |||
5824 | CVE_STATUS[CVE-2024-26864] = "fixed-version: Fixed from version 6.9" | ||
5825 | |||
5826 | CVE_STATUS[CVE-2024-26865] = "fixed-version: Fixed from version 6.9" | ||
5827 | |||
5828 | CVE_STATUS[CVE-2024-26866] = "fixed-version: Fixed from version 6.9" | ||
5829 | |||
5830 | CVE_STATUS[CVE-2024-26867] = "fixed-version: Fixed from version 6.8" | ||
5831 | |||
5832 | CVE_STATUS[CVE-2024-26868] = "fixed-version: Fixed from version 6.9" | ||
5833 | |||
5834 | CVE_STATUS[CVE-2024-26869] = "fixed-version: Fixed from version 6.9" | ||
5835 | |||
5836 | CVE_STATUS[CVE-2024-26870] = "fixed-version: Fixed from version 6.9" | ||
5837 | |||
5838 | CVE_STATUS[CVE-2024-26871] = "fixed-version: Fixed from version 6.9" | ||
5839 | |||
5840 | CVE_STATUS[CVE-2024-26872] = "fixed-version: Fixed from version 6.9" | ||
5841 | |||
5842 | CVE_STATUS[CVE-2024-26873] = "fixed-version: Fixed from version 6.9" | ||
5843 | |||
5844 | CVE_STATUS[CVE-2024-26874] = "fixed-version: Fixed from version 6.9" | ||
5845 | |||
5846 | CVE_STATUS[CVE-2024-26875] = "fixed-version: Fixed from version 6.9" | ||
5847 | |||
5848 | CVE_STATUS[CVE-2024-26876] = "fixed-version: Fixed from version 6.9" | ||
5849 | |||
5850 | CVE_STATUS[CVE-2024-26877] = "fixed-version: Fixed from version 6.9" | ||
5851 | |||
5852 | CVE_STATUS[CVE-2024-26878] = "fixed-version: Fixed from version 6.9" | ||
5853 | |||
5854 | CVE_STATUS[CVE-2024-26879] = "fixed-version: Fixed from version 6.9" | ||
5855 | |||
5856 | CVE_STATUS[CVE-2024-26880] = "fixed-version: Fixed from version 6.9" | ||
5857 | |||
5858 | CVE_STATUS[CVE-2024-26881] = "fixed-version: Fixed from version 6.9" | ||
5859 | |||
5860 | CVE_STATUS[CVE-2024-26882] = "fixed-version: Fixed from version 6.9" | ||
5861 | |||
5862 | CVE_STATUS[CVE-2024-26883] = "fixed-version: Fixed from version 6.9" | ||
5863 | |||
5864 | CVE_STATUS[CVE-2024-26884] = "fixed-version: Fixed from version 6.9" | ||
5865 | |||
5866 | CVE_STATUS[CVE-2024-26885] = "fixed-version: Fixed from version 6.9" | ||
5867 | |||
5868 | CVE_STATUS[CVE-2024-26886] = "fixed-version: Fixed from version 6.9" | ||
5869 | |||
5870 | CVE_STATUS[CVE-2024-26887] = "fixed-version: Fixed from version 6.9" | ||
5871 | |||
5872 | CVE_STATUS[CVE-2024-26888] = "fixed-version: Fixed from version 6.9" | ||
5873 | |||
5874 | CVE_STATUS[CVE-2024-26889] = "fixed-version: Fixed from version 6.9" | ||
5875 | |||
5876 | CVE_STATUS[CVE-2024-26890] = "fixed-version: Fixed from version 6.9" | ||
5877 | |||
5878 | CVE_STATUS[CVE-2024-26891] = "fixed-version: Fixed from version 6.9" | ||
5879 | |||
5880 | CVE_STATUS[CVE-2024-26892] = "fixed-version: Fixed from version 6.9" | ||
5881 | |||
5882 | CVE_STATUS[CVE-2024-26893] = "fixed-version: Fixed from version 6.9" | ||
5883 | |||
5884 | CVE_STATUS[CVE-2024-26894] = "fixed-version: Fixed from version 6.9" | ||
5885 | |||
5886 | CVE_STATUS[CVE-2024-26895] = "fixed-version: Fixed from version 6.9" | ||
5887 | |||
5888 | CVE_STATUS[CVE-2024-26896] = "fixed-version: Fixed from version 6.9" | ||
5889 | |||
5890 | CVE_STATUS[CVE-2024-26897] = "fixed-version: Fixed from version 6.9" | ||
5891 | |||
5892 | CVE_STATUS[CVE-2024-26898] = "fixed-version: Fixed from version 6.9" | ||
5893 | |||
5894 | CVE_STATUS[CVE-2024-26899] = "fixed-version: Fixed from version 6.9" | ||
5895 | |||
5896 | CVE_STATUS[CVE-2024-26900] = "fixed-version: Fixed from version 6.9" | ||
5897 | |||
5898 | CVE_STATUS[CVE-2024-26901] = "fixed-version: Fixed from version 6.9" | ||
5899 | |||
5900 | CVE_STATUS[CVE-2024-26902] = "fixed-version: Fixed from version 6.8" | ||
5901 | |||
5902 | CVE_STATUS[CVE-2024-26903] = "fixed-version: Fixed from version 6.8" | ||
5903 | |||
5904 | CVE_STATUS[CVE-2024-26906] = "fixed-version: Fixed from version 6.8" | ||
5905 | |||
5906 | CVE_STATUS[CVE-2024-26907] = "fixed-version: Fixed from version 6.8" | ||
5907 | |||
5908 | CVE_STATUS[CVE-2024-26909] = "fixed-version: Fixed from version 6.8" | ||
5909 | |||
5910 | CVE_STATUS[CVE-2024-26910] = "fixed-version: Fixed from version 6.8" | ||
5911 | |||
5912 | CVE_STATUS[CVE-2024-26911] = "fixed-version: Fixed from version 6.8" | ||
5913 | |||
5914 | CVE_STATUS[CVE-2024-26912] = "fixed-version: Fixed from version 6.8" | ||
5915 | |||
5916 | CVE_STATUS[CVE-2024-26913] = "fixed-version: Fixed from version 6.8" | ||
5917 | |||
5918 | CVE_STATUS[CVE-2024-26914] = "fixed-version: Fixed from version 6.8" | ||
5919 | |||
5920 | CVE_STATUS[CVE-2024-26915] = "fixed-version: Fixed from version 6.8" | ||
5921 | |||
5922 | CVE_STATUS[CVE-2024-26916] = "fixed-version: Fixed from version 6.8" | ||
5923 | |||
5924 | CVE_STATUS[CVE-2024-26917] = "fixed-version: Fixed from version 6.8" | ||
5925 | |||
5926 | CVE_STATUS[CVE-2024-26918] = "fixed-version: Fixed from version 6.8" | ||
5927 | |||
5928 | CVE_STATUS[CVE-2024-26919] = "fixed-version: Fixed from version 6.8" | ||
5929 | |||
5930 | CVE_STATUS[CVE-2024-26920] = "fixed-version: Fixed from version 6.8" | ||
5931 | |||
5932 | CVE_STATUS[CVE-2024-26921] = "fixed-version: Fixed from version 6.9" | ||
5933 | |||
5934 | CVE_STATUS[CVE-2024-26922] = "fixed-version: Fixed from version 6.9" | ||
5935 | |||
5936 | CVE_STATUS[CVE-2024-26923] = "fixed-version: Fixed from version 6.9" | ||
5937 | |||
5938 | CVE_STATUS[CVE-2024-26924] = "fixed-version: Fixed from version 6.9" | ||
5939 | |||
5940 | CVE_STATUS[CVE-2024-26925] = "fixed-version: Fixed from version 6.9" | ||
5941 | |||
5942 | CVE_STATUS[CVE-2024-26926] = "fixed-version: Fixed from version 6.9" | ||
5943 | |||
5944 | CVE_STATUS[CVE-2024-26927] = "fixed-version: Fixed from version 6.9" | ||
5945 | |||
5946 | CVE_STATUS[CVE-2024-26928] = "fixed-version: Fixed from version 6.9" | ||
5947 | |||
5948 | CVE_STATUS[CVE-2024-26930] = "fixed-version: Fixed from version 6.9" | ||
5949 | |||
5950 | CVE_STATUS[CVE-2024-26931] = "fixed-version: Fixed from version 6.9" | ||
5951 | |||
5952 | CVE_STATUS[CVE-2024-26932] = "fixed-version: Fixed from version 6.9" | ||
5953 | |||
5954 | CVE_STATUS[CVE-2024-26933] = "fixed-version: Fixed from version 6.9" | ||
5955 | |||
5956 | CVE_STATUS[CVE-2024-26934] = "fixed-version: Fixed from version 6.9" | ||
5957 | |||
5958 | CVE_STATUS[CVE-2024-26935] = "fixed-version: Fixed from version 6.9" | ||
5959 | |||
5960 | CVE_STATUS[CVE-2024-26936] = "fixed-version: Fixed from version 6.9" | ||
5961 | |||
5962 | CVE_STATUS[CVE-2024-26937] = "fixed-version: Fixed from version 6.9" | ||
5963 | |||
5964 | CVE_STATUS[CVE-2024-26938] = "fixed-version: Fixed from version 6.9" | ||
5965 | |||
5966 | CVE_STATUS[CVE-2024-26939] = "fixed-version: Fixed from version 6.9" | ||
5967 | |||
5968 | CVE_STATUS[CVE-2024-26940] = "fixed-version: Fixed from version 6.9" | ||
5969 | |||
5970 | CVE_STATUS[CVE-2024-26941] = "fixed-version: Fixed from version 6.9" | ||
5971 | |||
5972 | CVE_STATUS[CVE-2024-26942] = "fixed-version: Fixed from version 6.9" | ||
5973 | |||
5974 | CVE_STATUS[CVE-2024-26943] = "fixed-version: Fixed from version 6.9" | ||
5975 | |||
5976 | CVE_STATUS[CVE-2024-26944] = "fixed-version: Fixed from version 6.9" | ||
5977 | |||
5978 | CVE_STATUS[CVE-2024-26945] = "fixed-version: Fixed from version 6.9" | ||
5979 | |||
5980 | CVE_STATUS[CVE-2024-26946] = "fixed-version: Fixed from version 6.9" | ||
5981 | |||
5982 | CVE_STATUS[CVE-2024-26947] = "fixed-version: Fixed from version 6.9" | ||
5983 | |||
5984 | CVE_STATUS[CVE-2024-26948] = "fixed-version: Fixed from version 6.9" | ||
5985 | |||
5986 | CVE_STATUS[CVE-2024-26949] = "fixed-version: Fixed from version 6.9" | ||
5987 | |||
5988 | CVE_STATUS[CVE-2024-26950] = "fixed-version: Fixed from version 6.9" | ||
5989 | |||
5990 | CVE_STATUS[CVE-2024-26951] = "fixed-version: Fixed from version 6.9" | ||
5991 | |||
5992 | CVE_STATUS[CVE-2024-26952] = "fixed-version: Fixed from version 6.9" | ||
5993 | |||
5994 | CVE_STATUS[CVE-2024-26953] = "fixed-version: Fixed from version 6.9" | ||
5995 | |||
5996 | CVE_STATUS[CVE-2024-26954] = "fixed-version: Fixed from version 6.9" | ||
5997 | |||
5998 | CVE_STATUS[CVE-2024-26955] = "fixed-version: Fixed from version 6.9" | ||
5999 | |||
6000 | CVE_STATUS[CVE-2024-26956] = "fixed-version: Fixed from version 6.9" | ||
6001 | |||
6002 | CVE_STATUS[CVE-2024-26957] = "fixed-version: Fixed from version 6.9" | ||
6003 | |||
6004 | CVE_STATUS[CVE-2024-26958] = "fixed-version: Fixed from version 6.9" | ||
6005 | |||
6006 | CVE_STATUS[CVE-2024-26959] = "fixed-version: Fixed from version 6.9" | ||
6007 | |||
6008 | CVE_STATUS[CVE-2024-26960] = "fixed-version: Fixed from version 6.9" | ||
6009 | |||
6010 | CVE_STATUS[CVE-2024-26961] = "fixed-version: Fixed from version 6.9" | ||
6011 | |||
6012 | CVE_STATUS[CVE-2024-26962] = "fixed-version: Fixed from version 6.9" | ||
6013 | |||
6014 | CVE_STATUS[CVE-2024-26963] = "fixed-version: Fixed from version 6.9" | ||
6015 | |||
6016 | CVE_STATUS[CVE-2024-26964] = "fixed-version: Fixed from version 6.9" | ||
6017 | |||
6018 | CVE_STATUS[CVE-2024-26965] = "fixed-version: Fixed from version 6.9" | ||
6019 | |||
6020 | CVE_STATUS[CVE-2024-26966] = "fixed-version: Fixed from version 6.9" | ||
6021 | |||
6022 | CVE_STATUS[CVE-2024-26967] = "fixed-version: Fixed from version 6.9" | ||
6023 | |||
6024 | CVE_STATUS[CVE-2024-26968] = "fixed-version: Fixed from version 6.9" | ||
6025 | |||
6026 | CVE_STATUS[CVE-2024-26969] = "fixed-version: Fixed from version 6.9" | ||
6027 | |||
6028 | CVE_STATUS[CVE-2024-26970] = "fixed-version: Fixed from version 6.9" | ||
6029 | |||
6030 | CVE_STATUS[CVE-2024-26971] = "fixed-version: Fixed from version 6.9" | ||
6031 | |||
6032 | CVE_STATUS[CVE-2024-26973] = "fixed-version: Fixed from version 6.9" | ||
6033 | |||
6034 | CVE_STATUS[CVE-2024-26974] = "fixed-version: Fixed from version 6.9" | ||
6035 | |||
6036 | CVE_STATUS[CVE-2024-26975] = "fixed-version: Fixed from version 6.9" | ||
6037 | |||
6038 | CVE_STATUS[CVE-2024-26976] = "fixed-version: Fixed from version 6.9" | ||
6039 | |||
6040 | CVE_STATUS[CVE-2024-26977] = "fixed-version: Fixed from version 6.9" | ||
6041 | |||
6042 | CVE_STATUS[CVE-2024-26978] = "fixed-version: Fixed from version 6.9" | ||
6043 | |||
6044 | CVE_STATUS[CVE-2024-26980] = "fixed-version: Fixed from version 6.9" | ||
6045 | |||
6046 | CVE_STATUS[CVE-2024-26981] = "fixed-version: Fixed from version 6.9" | ||
6047 | |||
6048 | CVE_STATUS[CVE-2024-26982] = "fixed-version: Fixed from version 6.9" | ||
6049 | |||
6050 | CVE_STATUS[CVE-2024-26983] = "fixed-version: Fixed from version 6.9" | ||
6051 | |||
6052 | CVE_STATUS[CVE-2024-26984] = "fixed-version: Fixed from version 6.9" | ||
6053 | |||
6054 | CVE_STATUS[CVE-2024-26985] = "fixed-version: Fixed from version 6.9" | ||
6055 | |||
6056 | CVE_STATUS[CVE-2024-26986] = "fixed-version: Fixed from version 6.9" | ||
6057 | |||
6058 | CVE_STATUS[CVE-2024-26987] = "fixed-version: Fixed from version 6.9" | ||
6059 | |||
6060 | CVE_STATUS[CVE-2024-26988] = "fixed-version: Fixed from version 6.9" | ||
6061 | |||
6062 | CVE_STATUS[CVE-2024-26989] = "fixed-version: Fixed from version 6.9" | ||
6063 | |||
6064 | CVE_STATUS[CVE-2024-26990] = "fixed-version: Fixed from version 6.9" | ||
6065 | |||
6066 | CVE_STATUS[CVE-2024-26991] = "fixed-version: Fixed from version 6.9" | ||
6067 | |||
6068 | CVE_STATUS[CVE-2024-26992] = "fixed-version: Fixed from version 6.9" | ||
6069 | |||
6070 | CVE_STATUS[CVE-2024-26993] = "fixed-version: Fixed from version 6.9" | ||
6071 | |||
6072 | CVE_STATUS[CVE-2024-26994] = "fixed-version: Fixed from version 6.9" | ||
6073 | |||
6074 | CVE_STATUS[CVE-2024-26995] = "fixed-version: Fixed from version 6.9" | ||
6075 | |||
6076 | CVE_STATUS[CVE-2024-26996] = "fixed-version: Fixed from version 6.9" | ||
6077 | |||
6078 | CVE_STATUS[CVE-2024-26997] = "fixed-version: Fixed from version 6.8.8" | ||
6079 | |||
6080 | CVE_STATUS[CVE-2024-26998] = "fixed-version: Fixed from version 6.9" | ||
6081 | |||
6082 | CVE_STATUS[CVE-2024-26999] = "fixed-version: Fixed from version 6.9" | ||
6083 | |||
6084 | CVE_STATUS[CVE-2024-27000] = "fixed-version: Fixed from version 6.9" | ||
6085 | |||
6086 | CVE_STATUS[CVE-2024-27001] = "fixed-version: Fixed from version 6.9" | ||
6087 | |||
6088 | CVE_STATUS[CVE-2024-27002] = "fixed-version: Fixed from version 6.9" | ||
6089 | |||
6090 | CVE_STATUS[CVE-2024-27003] = "fixed-version: Fixed from version 6.9" | ||
6091 | |||
6092 | CVE_STATUS[CVE-2024-27004] = "fixed-version: Fixed from version 6.9" | ||
6093 | |||
6094 | CVE_STATUS[CVE-2024-27005] = "fixed-version: Fixed from version 6.9" | ||
6095 | |||
6096 | CVE_STATUS[CVE-2024-27006] = "fixed-version: Fixed from version 6.9" | ||
6097 | |||
6098 | CVE_STATUS[CVE-2024-27007] = "fixed-version: Fixed from version 6.9" | ||
6099 | |||
6100 | CVE_STATUS[CVE-2024-27008] = "fixed-version: Fixed from version 6.9" | ||
6101 | |||
6102 | CVE_STATUS[CVE-2024-27009] = "fixed-version: Fixed from version 6.9" | ||
6103 | |||
6104 | CVE_STATUS[CVE-2024-27010] = "fixed-version: Fixed from version 6.9" | ||
6105 | |||
6106 | CVE_STATUS[CVE-2024-27011] = "fixed-version: Fixed from version 6.9" | ||
6107 | |||
6108 | CVE_STATUS[CVE-2024-27012] = "fixed-version: Fixed from version 6.9" | ||
6109 | |||
6110 | CVE_STATUS[CVE-2024-27013] = "fixed-version: Fixed from version 6.9" | ||
6111 | |||
6112 | CVE_STATUS[CVE-2024-27014] = "fixed-version: Fixed from version 6.9" | ||
6113 | |||
6114 | CVE_STATUS[CVE-2024-27015] = "fixed-version: Fixed from version 6.9" | ||
6115 | |||
6116 | CVE_STATUS[CVE-2024-27016] = "fixed-version: Fixed from version 6.9" | ||
6117 | |||
6118 | CVE_STATUS[CVE-2024-27017] = "fixed-version: Fixed from version 6.9" | ||
6119 | |||
6120 | CVE_STATUS[CVE-2024-27018] = "fixed-version: Fixed from version 6.9" | ||
6121 | |||
6122 | CVE_STATUS[CVE-2024-27019] = "fixed-version: Fixed from version 6.9" | ||
6123 | |||
6124 | CVE_STATUS[CVE-2024-27020] = "fixed-version: Fixed from version 6.9" | ||
6125 | |||
6126 | CVE_STATUS[CVE-2024-27021] = "fixed-version: Fixed from version 6.9" | ||
6127 | |||
6128 | CVE_STATUS[CVE-2024-27022] = "fixed-version: Fixed from version 6.9" | ||
6129 | |||
6130 | CVE_STATUS[CVE-2024-27023] = "fixed-version: Fixed from version 6.7.7" | ||
6131 | |||
6132 | CVE_STATUS[CVE-2024-27024] = "fixed-version: Fixed from version 6.8" | ||
6133 | |||
6134 | CVE_STATUS[CVE-2024-27025] = "fixed-version: Fixed from version 6.9" | ||
6135 | |||
6136 | CVE_STATUS[CVE-2024-27026] = "fixed-version: Fixed from version 6.9" | ||
6137 | |||
6138 | CVE_STATUS[CVE-2024-27027] = "fixed-version: Fixed from version 6.9" | ||
6139 | |||
6140 | CVE_STATUS[CVE-2024-27028] = "fixed-version: Fixed from version 6.9" | ||
6141 | |||
6142 | CVE_STATUS[CVE-2024-27029] = "fixed-version: Fixed from version 6.9" | ||
6143 | |||
6144 | CVE_STATUS[CVE-2024-27030] = "fixed-version: Fixed from version 6.9" | ||
6145 | |||
6146 | CVE_STATUS[CVE-2024-27031] = "fixed-version: Fixed from version 6.9" | ||
6147 | |||
6148 | CVE_STATUS[CVE-2024-27032] = "fixed-version: Fixed from version 6.9" | ||
6149 | |||
6150 | CVE_STATUS[CVE-2024-27033] = "fixed-version: Fixed from version 6.9" | ||
6151 | |||
6152 | CVE_STATUS[CVE-2024-27034] = "fixed-version: Fixed from version 6.9" | ||
6153 | |||
6154 | CVE_STATUS[CVE-2024-27035] = "fixed-version: Fixed from version 6.9" | ||
6155 | |||
6156 | CVE_STATUS[CVE-2024-27036] = "fixed-version: Fixed from version 6.9" | ||
6157 | |||
6158 | CVE_STATUS[CVE-2024-27037] = "fixed-version: Fixed from version 6.9" | ||
6159 | |||
6160 | CVE_STATUS[CVE-2024-27038] = "fixed-version: Fixed from version 6.9" | ||
6161 | |||
6162 | CVE_STATUS[CVE-2024-27039] = "fixed-version: Fixed from version 6.9" | ||
6163 | |||
6164 | CVE_STATUS[CVE-2024-27040] = "fixed-version: Fixed from version 6.9" | ||
6165 | |||
6166 | CVE_STATUS[CVE-2024-27041] = "fixed-version: Fixed from version 6.9" | ||
6167 | |||
6168 | CVE_STATUS[CVE-2024-27042] = "fixed-version: Fixed from version 6.9" | ||
6169 | |||
6170 | CVE_STATUS[CVE-2024-27043] = "fixed-version: Fixed from version 6.9" | ||
6171 | |||
6172 | CVE_STATUS[CVE-2024-27044] = "fixed-version: Fixed from version 6.9" | ||
6173 | |||
6174 | CVE_STATUS[CVE-2024-27045] = "fixed-version: Fixed from version 6.9" | ||
6175 | |||
6176 | CVE_STATUS[CVE-2024-27046] = "fixed-version: Fixed from version 6.9" | ||
6177 | |||
6178 | CVE_STATUS[CVE-2024-27047] = "fixed-version: Fixed from version 6.9" | ||
6179 | |||
6180 | CVE_STATUS[CVE-2024-27048] = "fixed-version: Fixed from version 6.9" | ||
6181 | |||
6182 | CVE_STATUS[CVE-2024-27049] = "fixed-version: Fixed from version 6.9" | ||
6183 | |||
6184 | CVE_STATUS[CVE-2024-27050] = "fixed-version: Fixed from version 6.9" | ||
6185 | |||
6186 | CVE_STATUS[CVE-2024-27051] = "fixed-version: Fixed from version 6.9" | ||
6187 | |||
6188 | CVE_STATUS[CVE-2024-27052] = "fixed-version: Fixed from version 6.9" | ||
6189 | |||
6190 | CVE_STATUS[CVE-2024-27053] = "fixed-version: Fixed from version 6.9" | ||
6191 | |||
6192 | CVE_STATUS[CVE-2024-27054] = "fixed-version: Fixed from version 6.9" | ||
6193 | |||
6194 | CVE_STATUS[CVE-2024-27056] = "fixed-version: Fixed from version 6.8" | ||
6195 | |||
6196 | CVE_STATUS[CVE-2024-27057] = "fixed-version: Fixed from version 6.8" | ||
6197 | |||
6198 | CVE_STATUS[CVE-2024-27058] = "fixed-version: Fixed from version 6.9" | ||
6199 | |||
6200 | CVE_STATUS[CVE-2024-27059] = "fixed-version: Fixed from version 6.8" | ||
6201 | |||
6202 | CVE_STATUS[CVE-2024-27060] = "fixed-version: Fixed from version 6.8" | ||
6203 | |||
6204 | CVE_STATUS[CVE-2024-27061] = "fixed-version: Fixed from version 6.8" | ||
6205 | |||
6206 | CVE_STATUS[CVE-2024-27062] = "fixed-version: Fixed from version 6.8" | ||
6207 | |||
6208 | CVE_STATUS[CVE-2024-27063] = "fixed-version: Fixed from version 6.9" | ||
6209 | |||
6210 | CVE_STATUS[CVE-2024-27064] = "fixed-version: Fixed from version 6.9" | ||
6211 | |||
6212 | CVE_STATUS[CVE-2024-27065] = "fixed-version: Fixed from version 6.9" | ||
6213 | |||
6214 | CVE_STATUS[CVE-2024-27066] = "fixed-version: Fixed from version 6.9" | ||
6215 | |||
6216 | CVE_STATUS[CVE-2024-27067] = "fixed-version: Fixed from version 6.9" | ||
6217 | |||
6218 | CVE_STATUS[CVE-2024-27068] = "fixed-version: Fixed from version 6.9" | ||
6219 | |||
6220 | CVE_STATUS[CVE-2024-27069] = "fixed-version: Fixed from version 6.9" | ||
6221 | |||
6222 | CVE_STATUS[CVE-2024-27070] = "fixed-version: Fixed from version 6.9" | ||
6223 | |||
6224 | CVE_STATUS[CVE-2024-27071] = "fixed-version: Fixed from version 6.9" | ||
6225 | |||
6226 | CVE_STATUS[CVE-2024-27072] = "fixed-version: Fixed from version 6.9" | ||
6227 | |||
6228 | CVE_STATUS[CVE-2024-27073] = "fixed-version: Fixed from version 6.9" | ||
6229 | |||
6230 | CVE_STATUS[CVE-2024-27074] = "fixed-version: Fixed from version 6.9" | ||
6231 | |||
6232 | CVE_STATUS[CVE-2024-27075] = "fixed-version: Fixed from version 6.9" | ||
6233 | |||
6234 | CVE_STATUS[CVE-2024-27076] = "fixed-version: Fixed from version 6.9" | ||
6235 | |||
6236 | CVE_STATUS[CVE-2024-27077] = "fixed-version: Fixed from version 6.9" | ||
6237 | |||
6238 | CVE_STATUS[CVE-2024-27078] = "fixed-version: Fixed from version 6.9" | ||
6239 | |||
6240 | CVE_STATUS[CVE-2024-27079] = "fixed-version: Fixed from version 6.9" | ||
6241 | |||
6242 | CVE_STATUS[CVE-2024-27080] = "fixed-version: Fixed from version 6.9" | ||
6243 | |||
6244 | CVE_STATUS[CVE-2024-27388] = "fixed-version: Fixed from version 6.9" | ||
6245 | |||
6246 | CVE_STATUS[CVE-2024-27389] = "fixed-version: Fixed from version 6.9" | ||
6247 | |||
6248 | CVE_STATUS[CVE-2024-27390] = "fixed-version: Fixed from version 6.9" | ||
6249 | |||
6250 | CVE_STATUS[CVE-2024-27391] = "fixed-version: Fixed from version 6.9" | ||
6251 | |||
6252 | CVE_STATUS[CVE-2024-27392] = "fixed-version: Fixed from version 6.9" | ||
6253 | |||
6254 | CVE_STATUS[CVE-2024-27393] = "fixed-version: Fixed from version 6.9" | ||
6255 | |||
6256 | CVE_STATUS[CVE-2024-27394] = "fixed-version: Fixed from version 6.9" | ||
6257 | |||
6258 | CVE_STATUS[CVE-2024-27395] = "fixed-version: Fixed from version 6.9" | ||
6259 | |||
6260 | CVE_STATUS[CVE-2024-27396] = "fixed-version: Fixed from version 6.9" | ||
6261 | |||
6262 | CVE_STATUS[CVE-2024-27397] = "fixed-version: Fixed from version 6.8" | ||
6263 | |||
6264 | CVE_STATUS[CVE-2024-27398] = "fixed-version: Fixed from version 6.9" | ||
6265 | |||
6266 | CVE_STATUS[CVE-2024-27399] = "fixed-version: Fixed from version 6.9" | ||
6267 | |||
6268 | CVE_STATUS[CVE-2024-27400] = "fixed-version: Fixed from version 6.9" | ||
6269 | |||
6270 | CVE_STATUS[CVE-2024-27401] = "fixed-version: Fixed from version 6.9" | ||
6271 | |||
6272 | CVE_STATUS[CVE-2024-27402] = "fixed-version: Fixed from version 6.8" | ||
6273 | |||
6274 | CVE_STATUS[CVE-2024-27403] = "fixed-version: Fixed from version 6.8" | ||
6275 | |||
6276 | CVE_STATUS[CVE-2024-27404] = "fixed-version: Fixed from version 6.8" | ||
6277 | |||
6278 | CVE_STATUS[CVE-2024-27405] = "fixed-version: Fixed from version 6.8" | ||
6279 | |||
6280 | CVE_STATUS[CVE-2024-27406] = "fixed-version: Fixed from version 6.8" | ||
6281 | |||
6282 | CVE_STATUS[CVE-2024-27407] = "fixed-version: Fixed from version 6.8" | ||
6283 | |||
6284 | CVE_STATUS[CVE-2024-27408] = "fixed-version: Fixed from version 6.8" | ||
6285 | |||
6286 | CVE_STATUS[CVE-2024-27409] = "fixed-version: Fixed from version 6.8" | ||
6287 | |||
6288 | CVE_STATUS[CVE-2024-27410] = "fixed-version: Fixed from version 6.8" | ||
6289 | |||
6290 | CVE_STATUS[CVE-2024-27411] = "fixed-version: Fixed from version 6.7.9" | ||
6291 | |||
6292 | CVE_STATUS[CVE-2024-27412] = "fixed-version: Fixed from version 6.8" | ||
6293 | |||
6294 | CVE_STATUS[CVE-2024-27413] = "fixed-version: Fixed from version 6.8" | ||
6295 | |||
6296 | CVE_STATUS[CVE-2024-27414] = "fixed-version: Fixed from version 6.8" | ||
6297 | |||
6298 | CVE_STATUS[CVE-2024-27415] = "fixed-version: Fixed from version 6.8" | ||
6299 | |||
6300 | CVE_STATUS[CVE-2024-27416] = "fixed-version: Fixed from version 6.8" | ||
6301 | |||
6302 | CVE_STATUS[CVE-2024-27417] = "fixed-version: Fixed from version 6.8" | ||
6303 | |||
6304 | CVE_STATUS[CVE-2024-27418] = "fixed-version: Fixed from version 6.8" | ||
6305 | |||
6306 | CVE_STATUS[CVE-2024-27419] = "fixed-version: Fixed from version 6.8" | ||
6307 | |||
6308 | CVE_STATUS[CVE-2024-27431] = "fixed-version: Fixed from version 6.8" | ||
6309 | |||
6310 | CVE_STATUS[CVE-2024-27432] = "fixed-version: Fixed from version 6.9" | ||
6311 | |||
6312 | CVE_STATUS[CVE-2024-27433] = "fixed-version: Fixed from version 6.9" | ||
6313 | |||
6314 | CVE_STATUS[CVE-2024-27434] = "fixed-version: Fixed from version 6.9" | ||
6315 | |||
6316 | CVE_STATUS[CVE-2024-27435] = "fixed-version: Fixed from version 6.9" | ||
6317 | |||
6318 | CVE_STATUS[CVE-2024-27436] = "fixed-version: Fixed from version 6.9" | ||
6319 | |||
6320 | CVE_STATUS[CVE-2024-27437] = "fixed-version: Fixed from version 6.9" | ||
6321 | |||
6322 | CVE_STATUS[CVE-2024-31076] = "fixed-version: Fixed from version 6.10" | ||
6323 | |||
6324 | CVE_STATUS[CVE-2024-32936] = "fixed-version: Fixed from version 6.10" | ||
6325 | |||
6326 | CVE_STATUS[CVE-2024-33619] = "fixed-version: Fixed from version 6.10" | ||
6327 | |||
6328 | CVE_STATUS[CVE-2024-33621] = "fixed-version: Fixed from version 6.10" | ||
6329 | |||
6330 | CVE_STATUS[CVE-2024-33847] = "fixed-version: Fixed from version 6.10" | ||
6331 | |||
6332 | CVE_STATUS[CVE-2024-34027] = "fixed-version: Fixed from version 6.10" | ||
6333 | |||
6334 | CVE_STATUS[CVE-2024-34030] = "fixed-version: Fixed from version 6.10" | ||
6335 | |||
6336 | CVE_STATUS[CVE-2024-34777] = "fixed-version: Fixed from version 6.10" | ||
6337 | |||
6338 | CVE_STATUS[CVE-2024-35247] = "fixed-version: Fixed from version 6.10" | ||
6339 | |||
6340 | CVE_STATUS[CVE-2024-35784] = "fixed-version: Fixed from version 6.8" | ||
6341 | |||
6342 | CVE_STATUS[CVE-2024-35785] = "fixed-version: Fixed from version 6.8" | ||
6343 | |||
6344 | CVE_STATUS[CVE-2024-35786] = "fixed-version: Fixed from version 6.8" | ||
6345 | |||
6346 | CVE_STATUS[CVE-2024-35787] = "fixed-version: Fixed from version 6.9" | ||
6347 | |||
6348 | # CVE-2024-35788 has no known resolution | ||
6349 | |||
6350 | CVE_STATUS[CVE-2024-35789] = "fixed-version: Fixed from version 6.9" | ||
6351 | |||
6352 | CVE_STATUS[CVE-2024-35790] = "fixed-version: Fixed from version 6.8" | ||
6353 | |||
6354 | CVE_STATUS[CVE-2024-35791] = "fixed-version: Fixed from version 6.8" | ||
6355 | |||
6356 | CVE_STATUS[CVE-2024-35792] = "fixed-version: Fixed from version 6.8" | ||
6357 | |||
6358 | CVE_STATUS[CVE-2024-35793] = "fixed-version: Fixed from version 6.9" | ||
6359 | |||
6360 | CVE_STATUS[CVE-2024-35794] = "fixed-version: Fixed from version 6.9" | ||
6361 | |||
6362 | CVE_STATUS[CVE-2024-35795] = "fixed-version: Fixed from version 6.9" | ||
6363 | |||
6364 | CVE_STATUS[CVE-2024-35796] = "fixed-version: Fixed from version 6.9" | ||
6365 | |||
6366 | CVE_STATUS[CVE-2024-35797] = "fixed-version: Fixed from version 6.9" | ||
6367 | |||
6368 | CVE_STATUS[CVE-2024-35798] = "fixed-version: Fixed from version 6.9" | ||
6369 | |||
6370 | CVE_STATUS[CVE-2024-35799] = "fixed-version: Fixed from version 6.9" | ||
6371 | |||
6372 | CVE_STATUS[CVE-2024-35800] = "fixed-version: Fixed from version 6.9" | ||
6373 | |||
6374 | CVE_STATUS[CVE-2024-35801] = "fixed-version: Fixed from version 6.9" | ||
6375 | |||
6376 | CVE_STATUS[CVE-2024-35803] = "fixed-version: Fixed from version 6.9" | ||
6377 | |||
6378 | CVE_STATUS[CVE-2024-35804] = "fixed-version: Fixed from version 6.8" | ||
6379 | |||
6380 | CVE_STATUS[CVE-2024-35805] = "fixed-version: Fixed from version 6.9" | ||
6381 | |||
6382 | CVE_STATUS[CVE-2024-35806] = "fixed-version: Fixed from version 6.9" | ||
6383 | |||
6384 | CVE_STATUS[CVE-2024-35807] = "fixed-version: Fixed from version 6.9" | ||
6385 | |||
6386 | CVE_STATUS[CVE-2024-35808] = "fixed-version: Fixed from version 6.9" | ||
6387 | |||
6388 | CVE_STATUS[CVE-2024-35809] = "fixed-version: Fixed from version 6.9" | ||
6389 | |||
6390 | CVE_STATUS[CVE-2024-35810] = "fixed-version: Fixed from version 6.9" | ||
6391 | |||
6392 | CVE_STATUS[CVE-2024-35811] = "fixed-version: Fixed from version 6.9" | ||
6393 | |||
6394 | CVE_STATUS[CVE-2024-35813] = "fixed-version: Fixed from version 6.9" | ||
6395 | |||
6396 | CVE_STATUS[CVE-2024-35814] = "fixed-version: Fixed from version 6.9" | ||
6397 | |||
6398 | CVE_STATUS[CVE-2024-35815] = "fixed-version: Fixed from version 6.7.12" | ||
6399 | |||
6400 | CVE_STATUS[CVE-2024-35816] = "fixed-version: Fixed from version 6.8" | ||
6401 | |||
6402 | CVE_STATUS[CVE-2024-35817] = "fixed-version: Fixed from version 6.9" | ||
6403 | |||
6404 | CVE_STATUS[CVE-2024-35818] = "fixed-version: Fixed from version 6.9" | ||
6405 | |||
6406 | CVE_STATUS[CVE-2024-35819] = "fixed-version: Fixed from version 6.9" | ||
6407 | |||
6408 | CVE_STATUS[CVE-2024-35821] = "fixed-version: Fixed from version 6.9" | ||
6409 | |||
6410 | CVE_STATUS[CVE-2024-35822] = "fixed-version: Fixed from version 6.9" | ||
6411 | |||
6412 | CVE_STATUS[CVE-2024-35823] = "fixed-version: Fixed from version 6.8" | ||
6413 | |||
6414 | CVE_STATUS[CVE-2024-35824] = "fixed-version: Fixed from version 6.7.12" | ||
6415 | |||
6416 | CVE_STATUS[CVE-2024-35825] = "fixed-version: Fixed from version 6.8" | ||
6417 | |||
6418 | CVE_STATUS[CVE-2024-35826] = "fixed-version: Fixed from version 6.9" | ||
6419 | |||
6420 | CVE_STATUS[CVE-2024-35827] = "fixed-version: Fixed from version 6.9" | ||
6421 | |||
6422 | CVE_STATUS[CVE-2024-35828] = "fixed-version: Fixed from version 6.9" | ||
6423 | |||
6424 | CVE_STATUS[CVE-2024-35829] = "fixed-version: Fixed from version 6.9" | ||
6425 | |||
6426 | CVE_STATUS[CVE-2024-35830] = "fixed-version: Fixed from version 6.9" | ||
6427 | |||
6428 | CVE_STATUS[CVE-2024-35831] = "fixed-version: Fixed from version 6.9" | ||
6429 | |||
6430 | CVE_STATUS[CVE-2024-35832] = "fixed-version: Fixed from version 6.8" | ||
6431 | |||
6432 | CVE_STATUS[CVE-2024-35833] = "fixed-version: Fixed from version 6.8" | ||
6433 | |||
6434 | CVE_STATUS[CVE-2024-35834] = "fixed-version: Fixed from version 6.8" | ||
6435 | |||
6436 | CVE_STATUS[CVE-2024-35835] = "fixed-version: Fixed from version 6.8" | ||
6437 | |||
6438 | CVE_STATUS[CVE-2024-35836] = "fixed-version: Fixed from version 6.8" | ||
6439 | |||
6440 | CVE_STATUS[CVE-2024-35837] = "fixed-version: Fixed from version 6.8" | ||
6441 | |||
6442 | CVE_STATUS[CVE-2024-35838] = "fixed-version: Fixed from version 6.8" | ||
6443 | |||
6444 | CVE_STATUS[CVE-2024-35839] = "fixed-version: Fixed from version 6.8" | ||
6445 | |||
6446 | CVE_STATUS[CVE-2024-35840] = "fixed-version: Fixed from version 6.8" | ||
6447 | |||
6448 | CVE_STATUS[CVE-2024-35841] = "fixed-version: Fixed from version 6.8" | ||
6449 | |||
6450 | CVE_STATUS[CVE-2024-35842] = "fixed-version: Fixed from version 6.8" | ||
6451 | |||
6452 | CVE_STATUS[CVE-2024-35843] = "fixed-version: Fixed from version 6.9" | ||
6453 | |||
6454 | CVE_STATUS[CVE-2024-35844] = "fixed-version: Fixed from version 6.9" | ||
6455 | |||
6456 | CVE_STATUS[CVE-2024-35845] = "fixed-version: Fixed from version 6.9" | ||
6457 | |||
6458 | CVE_STATUS[CVE-2024-35846] = "fixed-version: Fixed from version 6.9" | ||
6459 | |||
6460 | CVE_STATUS[CVE-2024-35847] = "fixed-version: Fixed from version 6.9" | ||
6461 | |||
6462 | CVE_STATUS[CVE-2024-35848] = "fixed-version: Fixed from version 6.9" | ||
6463 | |||
6464 | CVE_STATUS[CVE-2024-35849] = "fixed-version: Fixed from version 6.9" | ||
6465 | |||
6466 | CVE_STATUS[CVE-2024-35850] = "fixed-version: Fixed from version 6.9" | ||
6467 | |||
6468 | CVE_STATUS[CVE-2024-35851] = "fixed-version: Fixed from version 6.9" | ||
6469 | |||
6470 | CVE_STATUS[CVE-2024-35852] = "fixed-version: Fixed from version 6.9" | ||
6471 | |||
6472 | CVE_STATUS[CVE-2024-35853] = "fixed-version: Fixed from version 6.9" | ||
6473 | |||
6474 | CVE_STATUS[CVE-2024-35854] = "fixed-version: Fixed from version 6.9" | ||
6475 | |||
6476 | CVE_STATUS[CVE-2024-35855] = "fixed-version: Fixed from version 6.9" | ||
6477 | |||
6478 | CVE_STATUS[CVE-2024-35856] = "fixed-version: Fixed from version 6.9" | ||
6479 | |||
6480 | CVE_STATUS[CVE-2024-35857] = "fixed-version: Fixed from version 6.9" | ||
6481 | |||
6482 | CVE_STATUS[CVE-2024-35858] = "fixed-version: Fixed from version 6.9" | ||
6483 | |||
6484 | CVE_STATUS[CVE-2024-35859] = "fixed-version: Fixed from version 6.9" | ||
6485 | |||
6486 | CVE_STATUS[CVE-2024-35860] = "fixed-version: Fixed from version 6.9" | ||
6487 | |||
6488 | CVE_STATUS[CVE-2024-35861] = "fixed-version: Fixed from version 6.9" | ||
6489 | |||
6490 | CVE_STATUS[CVE-2024-35862] = "fixed-version: Fixed from version 6.9" | ||
6491 | |||
6492 | CVE_STATUS[CVE-2024-35863] = "fixed-version: Fixed from version 6.9" | ||
6493 | |||
6494 | CVE_STATUS[CVE-2024-35864] = "fixed-version: Fixed from version 6.9" | ||
6495 | |||
6496 | CVE_STATUS[CVE-2024-35865] = "fixed-version: Fixed from version 6.9" | ||
6497 | |||
6498 | CVE_STATUS[CVE-2024-35866] = "fixed-version: Fixed from version 6.9" | ||
6499 | |||
6500 | CVE_STATUS[CVE-2024-35867] = "fixed-version: Fixed from version 6.9" | ||
6501 | |||
6502 | CVE_STATUS[CVE-2024-35868] = "fixed-version: Fixed from version 6.9" | ||
6503 | |||
6504 | CVE_STATUS[CVE-2024-35869] = "fixed-version: Fixed from version 6.9" | ||
6505 | |||
6506 | CVE_STATUS[CVE-2024-35870] = "fixed-version: Fixed from version 6.9" | ||
6507 | |||
6508 | CVE_STATUS[CVE-2024-35871] = "fixed-version: Fixed from version 6.9" | ||
6509 | |||
6510 | CVE_STATUS[CVE-2024-35872] = "fixed-version: Fixed from version 6.9" | ||
6511 | |||
6512 | CVE_STATUS[CVE-2024-35873] = "fixed-version: Fixed from version 6.9" | ||
6513 | |||
6514 | CVE_STATUS[CVE-2024-35874] = "fixed-version: Fixed from version 6.9" | ||
6515 | |||
6516 | CVE_STATUS[CVE-2024-35875] = "fixed-version: Fixed from version 6.9" | ||
6517 | |||
6518 | CVE_STATUS[CVE-2024-35877] = "fixed-version: Fixed from version 6.9" | ||
6519 | |||
6520 | CVE_STATUS[CVE-2024-35878] = "fixed-version: Fixed from version 6.9" | ||
6521 | |||
6522 | CVE_STATUS[CVE-2024-35879] = "fixed-version: Fixed from version 6.9" | ||
6523 | |||
6524 | CVE_STATUS[CVE-2024-35880] = "fixed-version: Fixed from version 6.9" | ||
6525 | |||
6526 | CVE_STATUS[CVE-2024-35882] = "fixed-version: Fixed from version 6.9" | ||
6527 | |||
6528 | CVE_STATUS[CVE-2024-35883] = "fixed-version: Fixed from version 6.9" | ||
6529 | |||
6530 | CVE_STATUS[CVE-2024-35884] = "fixed-version: Fixed from version 6.9" | ||
6531 | |||
6532 | CVE_STATUS[CVE-2024-35885] = "fixed-version: Fixed from version 6.9" | ||
6533 | |||
6534 | CVE_STATUS[CVE-2024-35886] = "fixed-version: Fixed from version 6.9" | ||
6535 | |||
6536 | CVE_STATUS[CVE-2024-35887] = "fixed-version: Fixed from version 6.9" | ||
6537 | |||
6538 | CVE_STATUS[CVE-2024-35888] = "fixed-version: Fixed from version 6.9" | ||
6539 | |||
6540 | CVE_STATUS[CVE-2024-35889] = "fixed-version: Fixed from version 6.9" | ||
6541 | |||
6542 | CVE_STATUS[CVE-2024-35890] = "fixed-version: Fixed from version 6.9" | ||
6543 | |||
6544 | CVE_STATUS[CVE-2024-35891] = "fixed-version: Fixed from version 6.9" | ||
6545 | |||
6546 | CVE_STATUS[CVE-2024-35892] = "fixed-version: Fixed from version 6.9" | ||
6547 | |||
6548 | CVE_STATUS[CVE-2024-35893] = "fixed-version: Fixed from version 6.9" | ||
6549 | |||
6550 | CVE_STATUS[CVE-2024-35894] = "fixed-version: Fixed from version 6.9" | ||
6551 | |||
6552 | CVE_STATUS[CVE-2024-35895] = "fixed-version: Fixed from version 6.9" | ||
6553 | |||
6554 | CVE_STATUS[CVE-2024-35896] = "fixed-version: Fixed from version 6.9" | ||
6555 | |||
6556 | CVE_STATUS[CVE-2024-35897] = "fixed-version: Fixed from version 6.9" | ||
6557 | |||
6558 | CVE_STATUS[CVE-2024-35898] = "fixed-version: Fixed from version 6.9" | ||
6559 | |||
6560 | CVE_STATUS[CVE-2024-35899] = "fixed-version: Fixed from version 6.9" | ||
6561 | |||
6562 | CVE_STATUS[CVE-2024-35900] = "fixed-version: Fixed from version 6.9" | ||
6563 | |||
6564 | CVE_STATUS[CVE-2024-35901] = "fixed-version: Fixed from version 6.9" | ||
6565 | |||
6566 | CVE_STATUS[CVE-2024-35902] = "fixed-version: Fixed from version 6.9" | ||
6567 | |||
6568 | CVE_STATUS[CVE-2024-35903] = "fixed-version: Fixed from version 6.9" | ||
6569 | |||
6570 | CVE_STATUS[CVE-2024-35904] = "fixed-version: Fixed from version 6.9" | ||
6571 | |||
6572 | CVE_STATUS[CVE-2024-35905] = "fixed-version: Fixed from version 6.9" | ||
6573 | |||
6574 | CVE_STATUS[CVE-2024-35907] = "fixed-version: Fixed from version 6.9" | ||
6575 | |||
6576 | CVE_STATUS[CVE-2024-35908] = "fixed-version: Fixed from version 6.9" | ||
6577 | |||
6578 | CVE_STATUS[CVE-2024-35909] = "fixed-version: Fixed from version 6.9" | ||
6579 | |||
6580 | CVE_STATUS[CVE-2024-35910] = "fixed-version: Fixed from version 6.9" | ||
6581 | |||
6582 | CVE_STATUS[CVE-2024-35911] = "fixed-version: Fixed from version 6.9" | ||
6583 | |||
6584 | CVE_STATUS[CVE-2024-35912] = "fixed-version: Fixed from version 6.9" | ||
6585 | |||
6586 | CVE_STATUS[CVE-2024-35913] = "fixed-version: Fixed from version 6.9" | ||
6587 | |||
6588 | CVE_STATUS[CVE-2024-35914] = "fixed-version: Fixed from version 6.9" | ||
6589 | |||
6590 | CVE_STATUS[CVE-2024-35915] = "fixed-version: Fixed from version 6.9" | ||
6591 | |||
6592 | CVE_STATUS[CVE-2024-35916] = "fixed-version: Fixed from version 6.9" | ||
6593 | |||
6594 | CVE_STATUS[CVE-2024-35917] = "fixed-version: Fixed from version 6.9" | ||
6595 | |||
6596 | CVE_STATUS[CVE-2024-35919] = "fixed-version: Fixed from version 6.9" | ||
6597 | |||
6598 | CVE_STATUS[CVE-2024-35920] = "fixed-version: Fixed from version 6.9" | ||
6599 | |||
6600 | CVE_STATUS[CVE-2024-35921] = "fixed-version: Fixed from version 6.9" | ||
6601 | |||
6602 | CVE_STATUS[CVE-2024-35922] = "fixed-version: Fixed from version 6.9" | ||
6603 | |||
6604 | CVE_STATUS[CVE-2024-35924] = "fixed-version: Fixed from version 6.9" | ||
6605 | |||
6606 | CVE_STATUS[CVE-2024-35925] = "fixed-version: Fixed from version 6.9" | ||
6607 | |||
6608 | CVE_STATUS[CVE-2024-35926] = "fixed-version: Fixed from version 6.9" | ||
6609 | |||
6610 | CVE_STATUS[CVE-2024-35927] = "fixed-version: Fixed from version 6.9" | ||
6611 | |||
6612 | CVE_STATUS[CVE-2024-35929] = "fixed-version: Fixed from version 6.9" | ||
6613 | |||
6614 | CVE_STATUS[CVE-2024-35930] = "fixed-version: Fixed from version 6.9" | ||
6615 | |||
6616 | CVE_STATUS[CVE-2024-35931] = "fixed-version: Fixed from version 6.9" | ||
6617 | |||
6618 | CVE_STATUS[CVE-2024-35932] = "fixed-version: Fixed from version 6.9" | ||
6619 | |||
6620 | CVE_STATUS[CVE-2024-35933] = "fixed-version: Fixed from version 6.9" | ||
6621 | |||
6622 | CVE_STATUS[CVE-2024-35934] = "fixed-version: Fixed from version 6.9" | ||
6623 | |||
6624 | CVE_STATUS[CVE-2024-35935] = "fixed-version: Fixed from version 6.9" | ||
6625 | |||
6626 | CVE_STATUS[CVE-2024-35936] = "fixed-version: Fixed from version 6.9" | ||
6627 | |||
6628 | CVE_STATUS[CVE-2024-35937] = "fixed-version: Fixed from version 6.9" | ||
6629 | |||
6630 | CVE_STATUS[CVE-2024-35938] = "fixed-version: Fixed from version 6.9" | ||
6631 | |||
6632 | CVE_STATUS[CVE-2024-35939] = "fixed-version: Fixed from version 6.9" | ||
6633 | |||
6634 | CVE_STATUS[CVE-2024-35940] = "fixed-version: Fixed from version 6.9" | ||
6635 | |||
6636 | CVE_STATUS[CVE-2024-35942] = "fixed-version: Fixed from version 6.9" | ||
6637 | |||
6638 | CVE_STATUS[CVE-2024-35943] = "fixed-version: Fixed from version 6.9" | ||
6639 | |||
6640 | CVE_STATUS[CVE-2024-35944] = "fixed-version: Fixed from version 6.9" | ||
6641 | |||
6642 | CVE_STATUS[CVE-2024-35945] = "fixed-version: Fixed from version 6.9" | ||
6643 | |||
6644 | CVE_STATUS[CVE-2024-35946] = "fixed-version: Fixed from version 6.9" | ||
6645 | |||
6646 | CVE_STATUS[CVE-2024-35947] = "fixed-version: Fixed from version 6.9" | ||
6647 | |||
6648 | CVE_STATUS[CVE-2024-35948] = "fixed-version: Fixed from version 6.9" | ||
6649 | |||
6650 | CVE_STATUS[CVE-2024-35949] = "fixed-version: Fixed from version 6.9" | ||
6651 | |||
6652 | CVE_STATUS[CVE-2024-35950] = "fixed-version: Fixed from version 6.9" | ||
6653 | |||
6654 | CVE_STATUS[CVE-2024-35951] = "fixed-version: Fixed from version 6.9" | ||
6655 | |||
6656 | CVE_STATUS[CVE-2024-35952] = "fixed-version: Fixed from version 6.9" | ||
6657 | |||
6658 | CVE_STATUS[CVE-2024-35953] = "fixed-version: Fixed from version 6.9" | ||
6659 | |||
6660 | CVE_STATUS[CVE-2024-35954] = "fixed-version: Fixed from version 6.9" | ||
6661 | |||
6662 | CVE_STATUS[CVE-2024-35955] = "fixed-version: Fixed from version 6.9" | ||
6663 | |||
6664 | CVE_STATUS[CVE-2024-35956] = "fixed-version: Fixed from version 6.9" | ||
6665 | |||
6666 | CVE_STATUS[CVE-2024-35957] = "fixed-version: Fixed from version 6.8.7" | ||
6667 | |||
6668 | CVE_STATUS[CVE-2024-35958] = "fixed-version: Fixed from version 6.9" | ||
6669 | |||
6670 | CVE_STATUS[CVE-2024-35959] = "fixed-version: Fixed from version 6.9" | ||
6671 | |||
6672 | CVE_STATUS[CVE-2024-35960] = "fixed-version: Fixed from version 6.9" | ||
6673 | |||
6674 | CVE_STATUS[CVE-2024-35961] = "fixed-version: Fixed from version 6.9" | ||
6675 | |||
6676 | CVE_STATUS[CVE-2024-35962] = "fixed-version: Fixed from version 6.8.7" | ||
6677 | |||
6678 | CVE_STATUS[CVE-2024-35963] = "fixed-version: Fixed from version 6.9" | ||
6679 | |||
6680 | CVE_STATUS[CVE-2024-35964] = "fixed-version: Fixed from version 6.9" | ||
6681 | |||
6682 | CVE_STATUS[CVE-2024-35965] = "fixed-version: Fixed from version 6.9" | ||
6683 | |||
6684 | CVE_STATUS[CVE-2024-35966] = "fixed-version: Fixed from version 6.9" | ||
6685 | |||
6686 | CVE_STATUS[CVE-2024-35967] = "fixed-version: Fixed from version 6.9" | ||
6687 | |||
6688 | CVE_STATUS[CVE-2024-35968] = "fixed-version: Fixed from version 6.9" | ||
6689 | |||
6690 | CVE_STATUS[CVE-2024-35969] = "fixed-version: Fixed from version 6.9" | ||
6691 | |||
6692 | CVE_STATUS[CVE-2024-35970] = "fixed-version: Fixed from version 6.9" | ||
6693 | |||
6694 | CVE_STATUS[CVE-2024-35971] = "fixed-version: Fixed from version 6.9" | ||
6695 | |||
6696 | CVE_STATUS[CVE-2024-35972] = "fixed-version: Fixed from version 6.9" | ||
6697 | |||
6698 | CVE_STATUS[CVE-2024-35973] = "fixed-version: Fixed from version 6.9" | ||
6699 | |||
6700 | CVE_STATUS[CVE-2024-35974] = "fixed-version: Fixed from version 6.9" | ||
6701 | |||
6702 | CVE_STATUS[CVE-2024-35975] = "fixed-version: Fixed from version 6.9" | ||
6703 | |||
6704 | CVE_STATUS[CVE-2024-35976] = "fixed-version: Fixed from version 6.9" | ||
6705 | |||
6706 | CVE_STATUS[CVE-2024-35977] = "fixed-version: Fixed from version 6.9" | ||
6707 | |||
6708 | CVE_STATUS[CVE-2024-35978] = "fixed-version: Fixed from version 6.9" | ||
6709 | |||
6710 | CVE_STATUS[CVE-2024-35979] = "fixed-version: Fixed from version 6.9" | ||
6711 | |||
6712 | CVE_STATUS[CVE-2024-35980] = "fixed-version: Fixed from version 6.9" | ||
6713 | |||
6714 | CVE_STATUS[CVE-2024-35981] = "fixed-version: Fixed from version 6.9" | ||
6715 | |||
6716 | CVE_STATUS[CVE-2024-35982] = "fixed-version: Fixed from version 6.9" | ||
6717 | |||
6718 | CVE_STATUS[CVE-2024-35983] = "fixed-version: Fixed from version 6.8.9" | ||
6719 | |||
6720 | CVE_STATUS[CVE-2024-35984] = "fixed-version: Fixed from version 6.9" | ||
6721 | |||
6722 | CVE_STATUS[CVE-2024-35985] = "fixed-version: Fixed from version 6.9" | ||
6723 | |||
6724 | CVE_STATUS[CVE-2024-35986] = "fixed-version: Fixed from version 6.9" | ||
6725 | |||
6726 | CVE_STATUS[CVE-2024-35987] = "fixed-version: Fixed from version 6.9" | ||
6727 | |||
6728 | CVE_STATUS[CVE-2024-35988] = "fixed-version: Fixed from version 6.9" | ||
6729 | |||
6730 | CVE_STATUS[CVE-2024-35989] = "fixed-version: Fixed from version 6.9" | ||
6731 | |||
6732 | CVE_STATUS[CVE-2024-35990] = "fixed-version: Fixed from version 6.9" | ||
6733 | |||
6734 | CVE_STATUS[CVE-2024-35991] = "fixed-version: Fixed from version 6.9" | ||
6735 | |||
6736 | CVE_STATUS[CVE-2024-35992] = "fixed-version: Fixed from version 6.9" | ||
6737 | |||
6738 | CVE_STATUS[CVE-2024-35993] = "fixed-version: Fixed from version 6.9" | ||
6739 | |||
6740 | CVE_STATUS[CVE-2024-35994] = "fixed-version: Fixed from version 6.9" | ||
6741 | |||
6742 | CVE_STATUS[CVE-2024-35995] = "fixed-version: Fixed from version 6.9" | ||
6743 | |||
6744 | CVE_STATUS[CVE-2024-35996] = "fixed-version: Fixed from version 6.8.9" | ||
6745 | |||
6746 | CVE_STATUS[CVE-2024-35997] = "fixed-version: Fixed from version 6.9" | ||
6747 | |||
6748 | CVE_STATUS[CVE-2024-35998] = "fixed-version: Fixed from version 6.9" | ||
6749 | |||
6750 | CVE_STATUS[CVE-2024-35999] = "fixed-version: Fixed from version 6.9" | ||
6751 | |||
6752 | CVE_STATUS[CVE-2024-36000] = "fixed-version: Fixed from version 6.9" | ||
6753 | |||
6754 | CVE_STATUS[CVE-2024-36001] = "fixed-version: Fixed from version 6.9" | ||
6755 | |||
6756 | CVE_STATUS[CVE-2024-36002] = "fixed-version: Fixed from version 6.8.9" | ||
6757 | |||
6758 | CVE_STATUS[CVE-2024-36003] = "fixed-version: Fixed from version 6.9" | ||
6759 | |||
6760 | CVE_STATUS[CVE-2024-36004] = "fixed-version: Fixed from version 6.9" | ||
6761 | |||
6762 | CVE_STATUS[CVE-2024-36005] = "fixed-version: Fixed from version 6.9" | ||
6763 | |||
6764 | CVE_STATUS[CVE-2024-36006] = "fixed-version: Fixed from version 6.9" | ||
6765 | |||
6766 | CVE_STATUS[CVE-2024-36007] = "fixed-version: Fixed from version 6.9" | ||
6767 | |||
6768 | CVE_STATUS[CVE-2024-36008] = "fixed-version: Fixed from version 6.9" | ||
6769 | |||
6770 | CVE_STATUS[CVE-2024-36009] = "fixed-version: Fixed from version 6.9" | ||
6771 | |||
6772 | CVE_STATUS[CVE-2024-36010] = "fixed-version: Fixed from version 6.8" | ||
6773 | |||
6774 | CVE_STATUS[CVE-2024-36011] = "fixed-version: Fixed from version 6.9" | ||
6775 | |||
6776 | CVE_STATUS[CVE-2024-36012] = "fixed-version: Fixed from version 6.9" | ||
6777 | |||
6778 | CVE_STATUS[CVE-2024-36013] = "fixed-version: Fixed from version 6.9" | ||
6779 | |||
6780 | CVE_STATUS[CVE-2024-36014] = "fixed-version: Fixed from version 6.10" | ||
6781 | |||
6782 | CVE_STATUS[CVE-2024-36015] = "fixed-version: Fixed from version 6.10" | ||
6783 | |||
6784 | CVE_STATUS[CVE-2024-36016] = "fixed-version: Fixed from version 6.10" | ||
6785 | |||
6786 | CVE_STATUS[CVE-2024-36017] = "fixed-version: Fixed from version 6.9" | ||
6787 | |||
6788 | CVE_STATUS[CVE-2024-36018] = "fixed-version: Fixed from version 6.9" | ||
6789 | |||
6790 | CVE_STATUS[CVE-2024-36019] = "fixed-version: Fixed from version 6.9" | ||
6791 | |||
6792 | CVE_STATUS[CVE-2024-36020] = "fixed-version: Fixed from version 6.9" | ||
6793 | |||
6794 | CVE_STATUS[CVE-2024-36021] = "fixed-version: Fixed from version 6.9" | ||
6795 | |||
6796 | CVE_STATUS[CVE-2024-36022] = "fixed-version: Fixed from version 6.9" | ||
6797 | |||
6798 | CVE_STATUS[CVE-2024-36023] = "fixed-version: Fixed from version 6.9" | ||
6799 | |||
6800 | CVE_STATUS[CVE-2024-36024] = "fixed-version: Fixed from version 6.9" | ||
6801 | |||
6802 | CVE_STATUS[CVE-2024-36025] = "fixed-version: Fixed from version 6.9" | ||
6803 | |||
6804 | CVE_STATUS[CVE-2024-36026] = "fixed-version: Fixed from version 6.9" | ||
6805 | |||
6806 | CVE_STATUS[CVE-2024-36027] = "fixed-version: Fixed from version 6.9" | ||
6807 | |||
6808 | CVE_STATUS[CVE-2024-36028] = "fixed-version: Fixed from version 6.9" | ||
6809 | |||
6810 | CVE_STATUS[CVE-2024-36029] = "fixed-version: Fixed from version 6.9" | ||
6811 | |||
6812 | CVE_STATUS[CVE-2024-36030] = "fixed-version: Fixed from version 6.9" | ||
6813 | |||
6814 | CVE_STATUS[CVE-2024-36031] = "fixed-version: Fixed from version 6.10" | ||
6815 | |||
6816 | CVE_STATUS[CVE-2024-36032] = "fixed-version: Fixed from version 6.9" | ||
6817 | |||
6818 | CVE_STATUS[CVE-2024-36033] = "fixed-version: Fixed from version 6.9" | ||
6819 | |||
6820 | CVE_STATUS[CVE-2024-36244] = "fixed-version: Fixed from version 6.10" | ||
6821 | |||
6822 | CVE_STATUS[CVE-2024-36270] = "fixed-version: Fixed from version 6.10" | ||
6823 | |||
6824 | CVE_STATUS[CVE-2024-36281] = "fixed-version: Fixed from version 6.10" | ||
6825 | |||
6826 | CVE_STATUS[CVE-2024-36286] = "fixed-version: Fixed from version 6.10" | ||
6827 | |||
6828 | CVE_STATUS[CVE-2024-36288] = "fixed-version: Fixed from version 6.9.4" | ||
6829 | |||
6830 | CVE_STATUS[CVE-2024-36476] = "cpe-stable-backport: Backported in 6.12.9" | ||
6831 | |||
6832 | CVE_STATUS[CVE-2024-36477] = "fixed-version: Fixed from version 6.10" | ||
6833 | |||
6834 | CVE_STATUS[CVE-2024-36478] = "fixed-version: Fixed from version 6.10" | ||
6835 | |||
6836 | CVE_STATUS[CVE-2024-36479] = "fixed-version: Fixed from version 6.10" | ||
6837 | |||
6838 | CVE_STATUS[CVE-2024-36481] = "fixed-version: Fixed from version 6.10" | ||
6839 | |||
6840 | CVE_STATUS[CVE-2024-36484] = "fixed-version: Fixed from version 6.10" | ||
6841 | |||
6842 | CVE_STATUS[CVE-2024-36489] = "fixed-version: Fixed from version 6.10" | ||
6843 | |||
6844 | CVE_STATUS[CVE-2024-36880] = "fixed-version: Fixed from version 6.9" | ||
6845 | |||
6846 | CVE_STATUS[CVE-2024-36881] = "fixed-version: Fixed from version 6.9" | ||
6847 | |||
6848 | CVE_STATUS[CVE-2024-36882] = "fixed-version: Fixed from version 6.9" | ||
6849 | |||
6850 | CVE_STATUS[CVE-2024-36883] = "fixed-version: Fixed from version 6.9" | ||
6851 | |||
6852 | CVE_STATUS[CVE-2024-36884] = "fixed-version: Fixed from version 6.9" | ||
6853 | |||
6854 | CVE_STATUS[CVE-2024-36886] = "fixed-version: Fixed from version 6.9" | ||
6855 | |||
6856 | CVE_STATUS[CVE-2024-36887] = "fixed-version: Fixed from version 6.8.10" | ||
6857 | |||
6858 | CVE_STATUS[CVE-2024-36888] = "fixed-version: Fixed from version 6.9" | ||
6859 | |||
6860 | CVE_STATUS[CVE-2024-36889] = "fixed-version: Fixed from version 6.9" | ||
6861 | |||
6862 | CVE_STATUS[CVE-2024-36890] = "fixed-version: Fixed from version 6.9" | ||
6863 | |||
6864 | CVE_STATUS[CVE-2024-36891] = "fixed-version: Fixed from version 6.9" | ||
6865 | |||
6866 | CVE_STATUS[CVE-2024-36892] = "fixed-version: Fixed from version 6.9" | ||
6867 | |||
6868 | CVE_STATUS[CVE-2024-36893] = "fixed-version: Fixed from version 6.9" | ||
6869 | |||
6870 | CVE_STATUS[CVE-2024-36894] = "fixed-version: Fixed from version 6.9" | ||
6871 | |||
6872 | CVE_STATUS[CVE-2024-36895] = "fixed-version: Fixed from version 6.9" | ||
6873 | |||
6874 | CVE_STATUS[CVE-2024-36896] = "fixed-version: Fixed from version 6.9" | ||
6875 | |||
6876 | CVE_STATUS[CVE-2024-36897] = "fixed-version: Fixed from version 6.9" | ||
6877 | |||
6878 | CVE_STATUS[CVE-2024-36898] = "fixed-version: Fixed from version 6.9" | ||
6879 | |||
6880 | CVE_STATUS[CVE-2024-36899] = "fixed-version: Fixed from version 6.9" | ||
6881 | |||
6882 | CVE_STATUS[CVE-2024-36900] = "fixed-version: Fixed from version 6.9" | ||
6883 | |||
6884 | CVE_STATUS[CVE-2024-36901] = "fixed-version: Fixed from version 6.9" | ||
6885 | |||
6886 | CVE_STATUS[CVE-2024-36902] = "fixed-version: Fixed from version 6.9" | ||
6887 | |||
6888 | CVE_STATUS[CVE-2024-36903] = "fixed-version: Fixed from version 6.9" | ||
6889 | |||
6890 | CVE_STATUS[CVE-2024-36904] = "fixed-version: Fixed from version 6.9" | ||
6891 | |||
6892 | CVE_STATUS[CVE-2024-36905] = "fixed-version: Fixed from version 6.9" | ||
6893 | |||
6894 | CVE_STATUS[CVE-2024-36906] = "fixed-version: Fixed from version 6.9" | ||
6895 | |||
6896 | CVE_STATUS[CVE-2024-36908] = "fixed-version: Fixed from version 6.9" | ||
6897 | |||
6898 | CVE_STATUS[CVE-2024-36909] = "fixed-version: Fixed from version 6.9" | ||
6899 | |||
6900 | CVE_STATUS[CVE-2024-36910] = "fixed-version: Fixed from version 6.9" | ||
6901 | |||
6902 | CVE_STATUS[CVE-2024-36911] = "fixed-version: Fixed from version 6.9" | ||
6903 | |||
6904 | CVE_STATUS[CVE-2024-36912] = "fixed-version: Fixed from version 6.9" | ||
6905 | |||
6906 | CVE_STATUS[CVE-2024-36913] = "fixed-version: Fixed from version 6.9" | ||
6907 | |||
6908 | CVE_STATUS[CVE-2024-36914] = "fixed-version: Fixed from version 6.9" | ||
6909 | |||
6910 | CVE_STATUS[CVE-2024-36915] = "fixed-version: Fixed from version 6.9" | ||
6911 | |||
6912 | CVE_STATUS[CVE-2024-36916] = "fixed-version: Fixed from version 6.9" | ||
6913 | |||
6914 | CVE_STATUS[CVE-2024-36917] = "fixed-version: Fixed from version 6.9" | ||
6915 | |||
6916 | CVE_STATUS[CVE-2024-36918] = "fixed-version: Fixed from version 6.9" | ||
6917 | |||
6918 | CVE_STATUS[CVE-2024-36919] = "fixed-version: Fixed from version 6.9" | ||
6919 | |||
6920 | CVE_STATUS[CVE-2024-36920] = "fixed-version: Fixed from version 6.9" | ||
6921 | |||
6922 | CVE_STATUS[CVE-2024-36921] = "fixed-version: Fixed from version 6.9" | ||
6923 | |||
6924 | CVE_STATUS[CVE-2024-36922] = "fixed-version: Fixed from version 6.9" | ||
6925 | |||
6926 | CVE_STATUS[CVE-2024-36923] = "fixed-version: Fixed from version 6.9" | ||
6927 | |||
6928 | CVE_STATUS[CVE-2024-36924] = "fixed-version: Fixed from version 6.9" | ||
6929 | |||
6930 | CVE_STATUS[CVE-2024-36925] = "fixed-version: Fixed from version 6.9" | ||
6931 | |||
6932 | CVE_STATUS[CVE-2024-36926] = "fixed-version: Fixed from version 6.9" | ||
6933 | |||
6934 | CVE_STATUS[CVE-2024-36927] = "fixed-version: Fixed from version 6.9" | ||
6935 | |||
6936 | CVE_STATUS[CVE-2024-36928] = "fixed-version: Fixed from version 6.9" | ||
6937 | |||
6938 | CVE_STATUS[CVE-2024-36929] = "fixed-version: Fixed from version 6.9" | ||
6939 | |||
6940 | CVE_STATUS[CVE-2024-36930] = "fixed-version: Fixed from version 6.9" | ||
6941 | |||
6942 | CVE_STATUS[CVE-2024-36931] = "fixed-version: Fixed from version 6.9" | ||
6943 | |||
6944 | CVE_STATUS[CVE-2024-36932] = "fixed-version: Fixed from version 6.9" | ||
6945 | |||
6946 | CVE_STATUS[CVE-2024-36933] = "fixed-version: Fixed from version 6.9" | ||
6947 | |||
6948 | CVE_STATUS[CVE-2024-36934] = "fixed-version: Fixed from version 6.9" | ||
6949 | |||
6950 | CVE_STATUS[CVE-2024-36935] = "fixed-version: Fixed from version 6.9" | ||
6951 | |||
6952 | CVE_STATUS[CVE-2024-36936] = "fixed-version: Fixed from version 6.9" | ||
6953 | |||
6954 | CVE_STATUS[CVE-2024-36937] = "fixed-version: Fixed from version 6.9" | ||
6955 | |||
6956 | CVE_STATUS[CVE-2024-36938] = "fixed-version: Fixed from version 6.9" | ||
6957 | |||
6958 | CVE_STATUS[CVE-2024-36939] = "fixed-version: Fixed from version 6.9" | ||
6959 | |||
6960 | CVE_STATUS[CVE-2024-36940] = "fixed-version: Fixed from version 6.9" | ||
6961 | |||
6962 | CVE_STATUS[CVE-2024-36941] = "fixed-version: Fixed from version 6.9" | ||
6963 | |||
6964 | CVE_STATUS[CVE-2024-36943] = "fixed-version: Fixed from version 6.9" | ||
6965 | |||
6966 | CVE_STATUS[CVE-2024-36944] = "fixed-version: Fixed from version 6.8.10" | ||
6967 | |||
6968 | CVE_STATUS[CVE-2024-36945] = "fixed-version: Fixed from version 6.9" | ||
6969 | |||
6970 | CVE_STATUS[CVE-2024-36946] = "fixed-version: Fixed from version 6.9" | ||
6971 | |||
6972 | CVE_STATUS[CVE-2024-36947] = "fixed-version: Fixed from version 6.9" | ||
6973 | |||
6974 | CVE_STATUS[CVE-2024-36948] = "fixed-version: Fixed from version 6.9" | ||
6975 | |||
6976 | CVE_STATUS[CVE-2024-36949] = "fixed-version: Fixed from version 6.9" | ||
6977 | |||
6978 | CVE_STATUS[CVE-2024-36950] = "fixed-version: Fixed from version 6.9" | ||
6979 | |||
6980 | CVE_STATUS[CVE-2024-36951] = "fixed-version: Fixed from version 6.9" | ||
6981 | |||
6982 | CVE_STATUS[CVE-2024-36952] = "fixed-version: Fixed from version 6.9" | ||
6983 | |||
6984 | CVE_STATUS[CVE-2024-36953] = "fixed-version: Fixed from version 6.9" | ||
6985 | |||
6986 | CVE_STATUS[CVE-2024-36954] = "fixed-version: Fixed from version 6.9" | ||
6987 | |||
6988 | CVE_STATUS[CVE-2024-36955] = "fixed-version: Fixed from version 6.9" | ||
6989 | |||
6990 | CVE_STATUS[CVE-2024-36956] = "fixed-version: Fixed from version 6.9" | ||
6991 | |||
6992 | CVE_STATUS[CVE-2024-36957] = "fixed-version: Fixed from version 6.9" | ||
6993 | |||
6994 | CVE_STATUS[CVE-2024-36958] = "fixed-version: Fixed from version 6.9" | ||
6995 | |||
6996 | CVE_STATUS[CVE-2024-36959] = "fixed-version: Fixed from version 6.9" | ||
6997 | |||
6998 | CVE_STATUS[CVE-2024-36960] = "fixed-version: Fixed from version 6.9" | ||
6999 | |||
7000 | CVE_STATUS[CVE-2024-36961] = "fixed-version: Fixed from version 6.9" | ||
7001 | |||
7002 | CVE_STATUS[CVE-2024-36962] = "fixed-version: Fixed from version 6.8.10" | ||
7003 | |||
7004 | CVE_STATUS[CVE-2024-36963] = "fixed-version: Fixed from version 6.9" | ||
7005 | |||
7006 | CVE_STATUS[CVE-2024-36964] = "fixed-version: Fixed from version 6.9" | ||
7007 | |||
7008 | CVE_STATUS[CVE-2024-36965] = "fixed-version: Fixed from version 6.10" | ||
7009 | |||
7010 | CVE_STATUS[CVE-2024-36966] = "fixed-version: Fixed from version 6.9" | ||
7011 | |||
7012 | CVE_STATUS[CVE-2024-36967] = "fixed-version: Fixed from version 6.10" | ||
7013 | |||
7014 | CVE_STATUS[CVE-2024-36968] = "fixed-version: Fixed from version 6.10" | ||
7015 | |||
7016 | CVE_STATUS[CVE-2024-36969] = "fixed-version: Fixed from version 6.10" | ||
7017 | |||
7018 | CVE_STATUS[CVE-2024-36970] = "fixed-version: Fixed from version 6.10" | ||
7019 | |||
7020 | CVE_STATUS[CVE-2024-36971] = "fixed-version: Fixed from version 6.10" | ||
7021 | |||
7022 | CVE_STATUS[CVE-2024-36972] = "fixed-version: Fixed from version 6.10" | ||
7023 | |||
7024 | CVE_STATUS[CVE-2024-36973] = "fixed-version: Fixed from version 6.10" | ||
7025 | |||
7026 | CVE_STATUS[CVE-2024-36974] = "fixed-version: Fixed from version 6.10" | ||
7027 | |||
7028 | CVE_STATUS[CVE-2024-36975] = "fixed-version: Fixed from version 6.10" | ||
7029 | |||
7030 | CVE_STATUS[CVE-2024-36976] = "fixed-version: Fixed from version 6.10" | ||
7031 | |||
7032 | CVE_STATUS[CVE-2024-36977] = "fixed-version: Fixed from version 6.10" | ||
7033 | |||
7034 | CVE_STATUS[CVE-2024-36978] = "fixed-version: Fixed from version 6.10" | ||
7035 | |||
7036 | CVE_STATUS[CVE-2024-36979] = "fixed-version: Fixed from version 6.10" | ||
7037 | |||
7038 | CVE_STATUS[CVE-2024-37021] = "fixed-version: Fixed from version 6.10" | ||
7039 | |||
7040 | CVE_STATUS[CVE-2024-37026] = "fixed-version: Fixed from version 6.10" | ||
7041 | |||
7042 | CVE_STATUS[CVE-2024-37078] = "fixed-version: Fixed from version 6.10" | ||
7043 | |||
7044 | CVE_STATUS[CVE-2024-37354] = "fixed-version: Fixed from version 6.10" | ||
7045 | |||
7046 | CVE_STATUS[CVE-2024-37356] = "fixed-version: Fixed from version 6.10" | ||
7047 | |||
7048 | CVE_STATUS[CVE-2024-38306] = "fixed-version: Fixed from version 6.10" | ||
7049 | |||
7050 | CVE_STATUS[CVE-2024-38381] = "fixed-version: Fixed from version 6.10" | ||
7051 | |||
7052 | CVE_STATUS[CVE-2024-38384] = "fixed-version: Fixed from version 6.10" | ||
7053 | |||
7054 | CVE_STATUS[CVE-2024-38385] = "fixed-version: Fixed from version 6.10" | ||
7055 | |||
7056 | CVE_STATUS[CVE-2024-38388] = "fixed-version: Fixed from version 6.10" | ||
7057 | |||
7058 | CVE_STATUS[CVE-2024-38390] = "fixed-version: Fixed from version 6.10" | ||
7059 | |||
7060 | CVE_STATUS[CVE-2024-38538] = "fixed-version: Fixed from version 6.10" | ||
7061 | |||
7062 | CVE_STATUS[CVE-2024-38539] = "fixed-version: Fixed from version 6.10" | ||
7063 | |||
7064 | CVE_STATUS[CVE-2024-38540] = "fixed-version: Fixed from version 6.10" | ||
7065 | |||
7066 | CVE_STATUS[CVE-2024-38541] = "fixed-version: Fixed from version 6.10" | ||
7067 | |||
7068 | CVE_STATUS[CVE-2024-38542] = "fixed-version: Fixed from version 6.10" | ||
7069 | |||
7070 | CVE_STATUS[CVE-2024-38543] = "fixed-version: Fixed from version 6.10" | ||
7071 | |||
7072 | CVE_STATUS[CVE-2024-38544] = "fixed-version: Fixed from version 6.10" | ||
7073 | |||
7074 | CVE_STATUS[CVE-2024-38545] = "fixed-version: Fixed from version 6.10" | ||
7075 | |||
7076 | CVE_STATUS[CVE-2024-38546] = "fixed-version: Fixed from version 6.10" | ||
7077 | |||
7078 | CVE_STATUS[CVE-2024-38547] = "fixed-version: Fixed from version 6.10" | ||
7079 | |||
7080 | CVE_STATUS[CVE-2024-38548] = "fixed-version: Fixed from version 6.10" | ||
7081 | |||
7082 | CVE_STATUS[CVE-2024-38549] = "fixed-version: Fixed from version 6.10" | ||
7083 | |||
7084 | CVE_STATUS[CVE-2024-38550] = "fixed-version: Fixed from version 6.10" | ||
7085 | |||
7086 | CVE_STATUS[CVE-2024-38551] = "fixed-version: Fixed from version 6.10" | ||
7087 | |||
7088 | CVE_STATUS[CVE-2024-38552] = "fixed-version: Fixed from version 6.10" | ||
7089 | |||
7090 | CVE_STATUS[CVE-2024-38553] = "fixed-version: Fixed from version 6.10" | ||
7091 | |||
7092 | CVE_STATUS[CVE-2024-38554] = "fixed-version: Fixed from version 6.10" | ||
7093 | |||
7094 | CVE_STATUS[CVE-2024-38555] = "fixed-version: Fixed from version 6.10" | ||
7095 | |||
7096 | CVE_STATUS[CVE-2024-38556] = "fixed-version: Fixed from version 6.10" | ||
7097 | |||
7098 | CVE_STATUS[CVE-2024-38557] = "fixed-version: Fixed from version 6.10" | ||
7099 | |||
7100 | CVE_STATUS[CVE-2024-38558] = "fixed-version: Fixed from version 6.10" | ||
7101 | |||
7102 | CVE_STATUS[CVE-2024-38559] = "fixed-version: Fixed from version 6.10" | ||
7103 | |||
7104 | CVE_STATUS[CVE-2024-38560] = "fixed-version: Fixed from version 6.10" | ||
7105 | |||
7106 | CVE_STATUS[CVE-2024-38561] = "fixed-version: Fixed from version 6.10" | ||
7107 | |||
7108 | CVE_STATUS[CVE-2024-38562] = "fixed-version: Fixed from version 6.10" | ||
7109 | |||
7110 | CVE_STATUS[CVE-2024-38563] = "fixed-version: Fixed from version 6.10" | ||
7111 | |||
7112 | CVE_STATUS[CVE-2024-38564] = "fixed-version: Fixed from version 6.10" | ||
7113 | |||
7114 | CVE_STATUS[CVE-2024-38565] = "fixed-version: Fixed from version 6.10" | ||
7115 | |||
7116 | CVE_STATUS[CVE-2024-38566] = "fixed-version: Fixed from version 6.10" | ||
7117 | |||
7118 | CVE_STATUS[CVE-2024-38567] = "fixed-version: Fixed from version 6.10" | ||
7119 | |||
7120 | CVE_STATUS[CVE-2024-38568] = "fixed-version: Fixed from version 6.10" | ||
7121 | |||
7122 | CVE_STATUS[CVE-2024-38569] = "fixed-version: Fixed from version 6.10" | ||
7123 | |||
7124 | CVE_STATUS[CVE-2024-38570] = "fixed-version: Fixed from version 6.10" | ||
7125 | |||
7126 | CVE_STATUS[CVE-2024-38571] = "fixed-version: Fixed from version 6.10" | ||
7127 | |||
7128 | CVE_STATUS[CVE-2024-38572] = "fixed-version: Fixed from version 6.10" | ||
7129 | |||
7130 | CVE_STATUS[CVE-2024-38573] = "fixed-version: Fixed from version 6.10" | ||
7131 | |||
7132 | CVE_STATUS[CVE-2024-38574] = "fixed-version: Fixed from version 6.10" | ||
7133 | |||
7134 | CVE_STATUS[CVE-2024-38575] = "fixed-version: Fixed from version 6.10" | ||
7135 | |||
7136 | CVE_STATUS[CVE-2024-38576] = "fixed-version: Fixed from version 6.10" | ||
7137 | |||
7138 | CVE_STATUS[CVE-2024-38577] = "fixed-version: Fixed from version 6.10" | ||
7139 | |||
7140 | CVE_STATUS[CVE-2024-38578] = "fixed-version: Fixed from version 6.10" | ||
7141 | |||
7142 | CVE_STATUS[CVE-2024-38579] = "fixed-version: Fixed from version 6.10" | ||
7143 | |||
7144 | CVE_STATUS[CVE-2024-38580] = "fixed-version: Fixed from version 6.9" | ||
7145 | |||
7146 | CVE_STATUS[CVE-2024-38581] = "fixed-version: Fixed from version 6.9" | ||
7147 | |||
7148 | CVE_STATUS[CVE-2024-38582] = "fixed-version: Fixed from version 6.10" | ||
7149 | |||
7150 | CVE_STATUS[CVE-2024-38583] = "fixed-version: Fixed from version 6.10" | ||
7151 | |||
7152 | CVE_STATUS[CVE-2024-38584] = "fixed-version: Fixed from version 6.10" | ||
7153 | |||
7154 | CVE_STATUS[CVE-2024-38585] = "fixed-version: Fixed from version 6.10" | ||
7155 | |||
7156 | CVE_STATUS[CVE-2024-38586] = "fixed-version: Fixed from version 6.10" | ||
7157 | |||
7158 | CVE_STATUS[CVE-2024-38587] = "fixed-version: Fixed from version 6.10" | ||
7159 | |||
7160 | CVE_STATUS[CVE-2024-38588] = "fixed-version: Fixed from version 6.10" | ||
7161 | |||
7162 | CVE_STATUS[CVE-2024-38589] = "fixed-version: Fixed from version 6.10" | ||
7163 | |||
7164 | CVE_STATUS[CVE-2024-38590] = "fixed-version: Fixed from version 6.10" | ||
7165 | |||
7166 | CVE_STATUS[CVE-2024-38591] = "fixed-version: Fixed from version 6.10" | ||
7167 | |||
7168 | CVE_STATUS[CVE-2024-38592] = "fixed-version: Fixed from version 6.10" | ||
7169 | |||
7170 | CVE_STATUS[CVE-2024-38593] = "fixed-version: Fixed from version 6.10" | ||
7171 | |||
7172 | CVE_STATUS[CVE-2024-38594] = "fixed-version: Fixed from version 6.10" | ||
7173 | |||
7174 | CVE_STATUS[CVE-2024-38595] = "fixed-version: Fixed from version 6.10" | ||
7175 | |||
7176 | CVE_STATUS[CVE-2024-38596] = "fixed-version: Fixed from version 6.10" | ||
7177 | |||
7178 | CVE_STATUS[CVE-2024-38597] = "fixed-version: Fixed from version 6.10" | ||
7179 | |||
7180 | CVE_STATUS[CVE-2024-38598] = "fixed-version: Fixed from version 6.10" | ||
7181 | |||
7182 | CVE_STATUS[CVE-2024-38599] = "fixed-version: Fixed from version 6.10" | ||
7183 | |||
7184 | CVE_STATUS[CVE-2024-38600] = "fixed-version: Fixed from version 6.10" | ||
7185 | |||
7186 | CVE_STATUS[CVE-2024-38601] = "fixed-version: Fixed from version 6.10" | ||
7187 | |||
7188 | CVE_STATUS[CVE-2024-38602] = "fixed-version: Fixed from version 6.10" | ||
7189 | |||
7190 | CVE_STATUS[CVE-2024-38603] = "fixed-version: Fixed from version 6.10" | ||
7191 | |||
7192 | CVE_STATUS[CVE-2024-38604] = "fixed-version: Fixed from version 6.10" | ||
7193 | |||
7194 | CVE_STATUS[CVE-2024-38605] = "fixed-version: Fixed from version 6.10" | ||
7195 | |||
7196 | CVE_STATUS[CVE-2024-38606] = "fixed-version: Fixed from version 6.10" | ||
7197 | |||
7198 | CVE_STATUS[CVE-2024-38607] = "fixed-version: Fixed from version 6.10" | ||
7199 | |||
7200 | CVE_STATUS[CVE-2024-38608] = "fixed-version: Fixed from version 6.10" | ||
7201 | |||
7202 | CVE_STATUS[CVE-2024-38609] = "fixed-version: Fixed from version 6.10" | ||
7203 | |||
7204 | CVE_STATUS[CVE-2024-38610] = "fixed-version: Fixed from version 6.10" | ||
7205 | |||
7206 | CVE_STATUS[CVE-2024-38611] = "fixed-version: Fixed from version 6.10" | ||
7207 | |||
7208 | CVE_STATUS[CVE-2024-38612] = "fixed-version: Fixed from version 6.10" | ||
7209 | |||
7210 | CVE_STATUS[CVE-2024-38613] = "fixed-version: Fixed from version 6.10" | ||
7211 | |||
7212 | CVE_STATUS[CVE-2024-38614] = "fixed-version: Fixed from version 6.10" | ||
7213 | |||
7214 | CVE_STATUS[CVE-2024-38615] = "fixed-version: Fixed from version 6.10" | ||
7215 | |||
7216 | CVE_STATUS[CVE-2024-38616] = "fixed-version: Fixed from version 6.10" | ||
7217 | |||
7218 | CVE_STATUS[CVE-2024-38617] = "fixed-version: Fixed from version 6.10" | ||
7219 | |||
7220 | CVE_STATUS[CVE-2024-38618] = "fixed-version: Fixed from version 6.10" | ||
7221 | |||
7222 | CVE_STATUS[CVE-2024-38619] = "fixed-version: Fixed from version 6.10" | ||
7223 | |||
7224 | CVE_STATUS[CVE-2024-38620] = "fixed-version: Fixed from version 6.10" | ||
7225 | |||
7226 | CVE_STATUS[CVE-2024-38621] = "fixed-version: Fixed from version 6.10" | ||
7227 | |||
7228 | CVE_STATUS[CVE-2024-38622] = "fixed-version: Fixed from version 6.10" | ||
7229 | |||
7230 | CVE_STATUS[CVE-2024-38623] = "fixed-version: Fixed from version 6.10" | ||
7231 | |||
7232 | CVE_STATUS[CVE-2024-38624] = "fixed-version: Fixed from version 6.10" | ||
7233 | |||
7234 | CVE_STATUS[CVE-2024-38625] = "fixed-version: Fixed from version 6.10" | ||
7235 | |||
7236 | CVE_STATUS[CVE-2024-38626] = "fixed-version: Fixed from version 6.10" | ||
7237 | |||
7238 | CVE_STATUS[CVE-2024-38627] = "fixed-version: Fixed from version 6.10" | ||
7239 | |||
7240 | CVE_STATUS[CVE-2024-38628] = "fixed-version: Fixed from version 6.10" | ||
7241 | |||
7242 | CVE_STATUS[CVE-2024-38629] = "fixed-version: Fixed from version 6.10" | ||
7243 | |||
7244 | CVE_STATUS[CVE-2024-38630] = "fixed-version: Fixed from version 6.10" | ||
7245 | |||
7246 | CVE_STATUS[CVE-2024-38631] = "fixed-version: Fixed from version 6.10" | ||
7247 | |||
7248 | CVE_STATUS[CVE-2024-38632] = "fixed-version: Fixed from version 6.10" | ||
7249 | |||
7250 | CVE_STATUS[CVE-2024-38633] = "fixed-version: Fixed from version 6.10" | ||
7251 | |||
7252 | CVE_STATUS[CVE-2024-38634] = "fixed-version: Fixed from version 6.10" | ||
7253 | |||
7254 | CVE_STATUS[CVE-2024-38635] = "fixed-version: Fixed from version 6.10" | ||
7255 | |||
7256 | CVE_STATUS[CVE-2024-38636] = "fixed-version: Fixed from version 6.10" | ||
7257 | |||
7258 | CVE_STATUS[CVE-2024-38637] = "fixed-version: Fixed from version 6.10" | ||
7259 | |||
7260 | CVE_STATUS[CVE-2024-38659] = "fixed-version: Fixed from version 6.10" | ||
7261 | |||
7262 | CVE_STATUS[CVE-2024-38661] = "fixed-version: Fixed from version 6.10" | ||
7263 | |||
7264 | CVE_STATUS[CVE-2024-38662] = "fixed-version: Fixed from version 6.10" | ||
7265 | |||
7266 | CVE_STATUS[CVE-2024-38663] = "fixed-version: Fixed from version 6.10" | ||
7267 | |||
7268 | CVE_STATUS[CVE-2024-38664] = "fixed-version: Fixed from version 6.10" | ||
7269 | |||
7270 | CVE_STATUS[CVE-2024-38667] = "fixed-version: Fixed from version 6.10" | ||
7271 | |||
7272 | CVE_STATUS[CVE-2024-38780] = "fixed-version: Fixed from version 6.10" | ||
7273 | |||
7274 | CVE_STATUS[CVE-2024-39276] = "fixed-version: Fixed from version 6.10" | ||
7275 | |||
7276 | CVE_STATUS[CVE-2024-39277] = "fixed-version: Fixed from version 6.10" | ||
7277 | |||
7278 | CVE_STATUS[CVE-2024-39282] = "cpe-stable-backport: Backported in 6.12.9" | ||
7279 | |||
7280 | CVE_STATUS[CVE-2024-39291] = "fixed-version: Fixed from version 6.10" | ||
7281 | |||
7282 | CVE_STATUS[CVE-2024-39292] = "fixed-version: Fixed from version 6.10" | ||
7283 | |||
7284 | CVE_STATUS[CVE-2024-39293] = "fixed-version: Fixed from version 6.10" | ||
7285 | |||
7286 | CVE_STATUS[CVE-2024-39296] = "fixed-version: Fixed from version 6.10" | ||
7287 | |||
7288 | CVE_STATUS[CVE-2024-39298] = "fixed-version: Fixed from version 6.10" | ||
7289 | |||
7290 | CVE_STATUS[CVE-2024-39301] = "fixed-version: Fixed from version 6.10" | ||
7291 | |||
7292 | CVE_STATUS[CVE-2024-39371] = "fixed-version: Fixed from version 6.10" | ||
7293 | |||
7294 | CVE_STATUS[CVE-2024-39461] = "fixed-version: Fixed from version 6.10" | ||
7295 | |||
7296 | CVE_STATUS[CVE-2024-39462] = "fixed-version: Fixed from version 6.10" | ||
7297 | |||
7298 | CVE_STATUS[CVE-2024-39463] = "fixed-version: Fixed from version 6.10" | ||
7299 | |||
7300 | CVE_STATUS[CVE-2024-39464] = "fixed-version: Fixed from version 6.10" | ||
7301 | |||
7302 | CVE_STATUS[CVE-2024-39465] = "fixed-version: Fixed from version 6.10" | ||
7303 | |||
7304 | CVE_STATUS[CVE-2024-39466] = "fixed-version: Fixed from version 6.10" | ||
7305 | |||
7306 | CVE_STATUS[CVE-2024-39467] = "fixed-version: Fixed from version 6.10" | ||
7307 | |||
7308 | CVE_STATUS[CVE-2024-39468] = "fixed-version: Fixed from version 6.10" | ||
7309 | |||
7310 | CVE_STATUS[CVE-2024-39469] = "fixed-version: Fixed from version 6.10" | ||
7311 | |||
7312 | CVE_STATUS[CVE-2024-39470] = "fixed-version: Fixed from version 6.10" | ||
7313 | |||
7314 | CVE_STATUS[CVE-2024-39471] = "fixed-version: Fixed from version 6.10" | ||
7315 | |||
7316 | CVE_STATUS[CVE-2024-39472] = "fixed-version: Fixed from version 6.10" | ||
7317 | |||
7318 | CVE_STATUS[CVE-2024-39473] = "fixed-version: Fixed from version 6.10" | ||
7319 | |||
7320 | CVE_STATUS[CVE-2024-39474] = "fixed-version: Fixed from version 6.10" | ||
7321 | |||
7322 | CVE_STATUS[CVE-2024-39475] = "fixed-version: Fixed from version 6.10" | ||
7323 | |||
7324 | CVE_STATUS[CVE-2024-39476] = "fixed-version: Fixed from version 6.10" | ||
7325 | |||
7326 | CVE_STATUS[CVE-2024-39477] = "fixed-version: Fixed from version 6.10" | ||
7327 | |||
7328 | CVE_STATUS[CVE-2024-39478] = "fixed-version: Fixed from version 6.10" | ||
7329 | |||
7330 | CVE_STATUS[CVE-2024-39479] = "fixed-version: Fixed from version 6.10" | ||
7331 | |||
7332 | CVE_STATUS[CVE-2024-39480] = "fixed-version: Fixed from version 6.10" | ||
7333 | |||
7334 | CVE_STATUS[CVE-2024-39481] = "fixed-version: Fixed from version 6.10" | ||
7335 | |||
7336 | CVE_STATUS[CVE-2024-39482] = "fixed-version: Fixed from version 6.10" | ||
7337 | |||
7338 | CVE_STATUS[CVE-2024-39483] = "fixed-version: Fixed from version 6.10" | ||
7339 | |||
7340 | CVE_STATUS[CVE-2024-39484] = "fixed-version: Fixed from version 6.10" | ||
7341 | |||
7342 | CVE_STATUS[CVE-2024-39485] = "fixed-version: Fixed from version 6.10" | ||
7343 | |||
7344 | CVE_STATUS[CVE-2024-39486] = "fixed-version: Fixed from version 6.10" | ||
7345 | |||
7346 | CVE_STATUS[CVE-2024-39487] = "fixed-version: Fixed from version 6.10" | ||
7347 | |||
7348 | CVE_STATUS[CVE-2024-39488] = "fixed-version: Fixed from version 6.10" | ||
7349 | |||
7350 | CVE_STATUS[CVE-2024-39489] = "fixed-version: Fixed from version 6.10" | ||
7351 | |||
7352 | CVE_STATUS[CVE-2024-39490] = "fixed-version: Fixed from version 6.10" | ||
7353 | |||
7354 | CVE_STATUS[CVE-2024-39491] = "fixed-version: Fixed from version 6.10" | ||
7355 | |||
7356 | CVE_STATUS[CVE-2024-39492] = "fixed-version: Fixed from version 6.10" | ||
7357 | |||
7358 | CVE_STATUS[CVE-2024-39493] = "fixed-version: Fixed from version 6.10" | ||
7359 | |||
7360 | CVE_STATUS[CVE-2024-39494] = "fixed-version: Fixed from version 6.10" | ||
7361 | |||
7362 | CVE_STATUS[CVE-2024-39495] = "fixed-version: Fixed from version 6.10" | ||
7363 | |||
7364 | CVE_STATUS[CVE-2024-39496] = "fixed-version: Fixed from version 6.10" | ||
7365 | |||
7366 | CVE_STATUS[CVE-2024-39497] = "fixed-version: Fixed from version 6.10" | ||
7367 | |||
7368 | CVE_STATUS[CVE-2024-39498] = "fixed-version: Fixed from version 6.10" | ||
7369 | |||
7370 | CVE_STATUS[CVE-2024-39499] = "fixed-version: Fixed from version 6.10" | ||
7371 | |||
7372 | CVE_STATUS[CVE-2024-39500] = "fixed-version: Fixed from version 6.10" | ||
7373 | |||
7374 | CVE_STATUS[CVE-2024-39502] = "fixed-version: Fixed from version 6.10" | ||
7375 | |||
7376 | CVE_STATUS[CVE-2024-39503] = "fixed-version: Fixed from version 6.10" | ||
7377 | |||
7378 | CVE_STATUS[CVE-2024-39504] = "fixed-version: Fixed from version 6.10" | ||
7379 | |||
7380 | CVE_STATUS[CVE-2024-39505] = "fixed-version: Fixed from version 6.10" | ||
7381 | |||
7382 | CVE_STATUS[CVE-2024-39506] = "fixed-version: Fixed from version 6.10" | ||
7383 | |||
7384 | CVE_STATUS[CVE-2024-39507] = "fixed-version: Fixed from version 6.10" | ||
7385 | |||
7386 | CVE_STATUS[CVE-2024-39508] = "fixed-version: Fixed from version 6.10" | ||
7387 | |||
7388 | CVE_STATUS[CVE-2024-39509] = "fixed-version: Fixed from version 6.10" | ||
7389 | |||
7390 | CVE_STATUS[CVE-2024-39510] = "fixed-version: Fixed from version 6.10" | ||
7391 | |||
7392 | CVE_STATUS[CVE-2024-40899] = "fixed-version: Fixed from version 6.10" | ||
7393 | |||
7394 | CVE_STATUS[CVE-2024-40900] = "fixed-version: Fixed from version 6.10" | ||
7395 | |||
7396 | CVE_STATUS[CVE-2024-40901] = "fixed-version: Fixed from version 6.10" | ||
7397 | |||
7398 | CVE_STATUS[CVE-2024-40902] = "fixed-version: Fixed from version 6.10" | ||
7399 | |||
7400 | CVE_STATUS[CVE-2024-40903] = "fixed-version: Fixed from version 6.10" | ||
7401 | |||
7402 | CVE_STATUS[CVE-2024-40904] = "fixed-version: Fixed from version 6.10" | ||
7403 | |||
7404 | CVE_STATUS[CVE-2024-40905] = "fixed-version: Fixed from version 6.10" | ||
7405 | |||
7406 | CVE_STATUS[CVE-2024-40906] = "fixed-version: Fixed from version 6.10" | ||
7407 | |||
7408 | CVE_STATUS[CVE-2024-40907] = "fixed-version: Fixed from version 6.10" | ||
7409 | |||
7410 | CVE_STATUS[CVE-2024-40908] = "fixed-version: Fixed from version 6.10" | ||
7411 | |||
7412 | CVE_STATUS[CVE-2024-40909] = "fixed-version: Fixed from version 6.10" | ||
7413 | |||
7414 | CVE_STATUS[CVE-2024-40910] = "fixed-version: Fixed from version 6.10" | ||
7415 | |||
7416 | CVE_STATUS[CVE-2024-40911] = "fixed-version: Fixed from version 6.10" | ||
7417 | |||
7418 | CVE_STATUS[CVE-2024-40912] = "fixed-version: Fixed from version 6.10" | ||
7419 | |||
7420 | CVE_STATUS[CVE-2024-40913] = "fixed-version: Fixed from version 6.10" | ||
7421 | |||
7422 | CVE_STATUS[CVE-2024-40914] = "fixed-version: Fixed from version 6.10" | ||
7423 | |||
7424 | CVE_STATUS[CVE-2024-40915] = "fixed-version: Fixed from version 6.10" | ||
7425 | |||
7426 | CVE_STATUS[CVE-2024-40916] = "fixed-version: Fixed from version 6.10" | ||
7427 | |||
7428 | CVE_STATUS[CVE-2024-40917] = "fixed-version: Fixed from version 6.10" | ||
7429 | |||
7430 | CVE_STATUS[CVE-2024-40918] = "fixed-version: Fixed from version 6.10" | ||
7431 | |||
7432 | CVE_STATUS[CVE-2024-40919] = "fixed-version: Fixed from version 6.10" | ||
7433 | |||
7434 | CVE_STATUS[CVE-2024-40920] = "fixed-version: Fixed from version 6.9.6" | ||
7435 | |||
7436 | CVE_STATUS[CVE-2024-40921] = "fixed-version: Fixed from version 6.9.6" | ||
7437 | |||
7438 | CVE_STATUS[CVE-2024-40922] = "fixed-version: Fixed from version 6.10" | ||
7439 | |||
7440 | CVE_STATUS[CVE-2024-40923] = "fixed-version: Fixed from version 6.10" | ||
7441 | |||
7442 | CVE_STATUS[CVE-2024-40924] = "fixed-version: Fixed from version 6.10" | ||
7443 | |||
7444 | CVE_STATUS[CVE-2024-40925] = "fixed-version: Fixed from version 6.10" | ||
7445 | |||
7446 | CVE_STATUS[CVE-2024-40926] = "fixed-version: Fixed from version 6.10" | ||
7447 | |||
7448 | CVE_STATUS[CVE-2024-40927] = "fixed-version: Fixed from version 6.10" | ||
7449 | |||
7450 | CVE_STATUS[CVE-2024-40928] = "fixed-version: Fixed from version 6.10" | ||
7451 | |||
7452 | CVE_STATUS[CVE-2024-40929] = "fixed-version: Fixed from version 6.10" | ||
7453 | |||
7454 | CVE_STATUS[CVE-2024-40930] = "fixed-version: Fixed from version 6.10" | ||
7455 | |||
7456 | CVE_STATUS[CVE-2024-40931] = "fixed-version: Fixed from version 6.10" | ||
7457 | |||
7458 | CVE_STATUS[CVE-2024-40932] = "fixed-version: Fixed from version 6.10" | ||
7459 | |||
7460 | CVE_STATUS[CVE-2024-40933] = "fixed-version: Fixed from version 6.10" | ||
7461 | |||
7462 | CVE_STATUS[CVE-2024-40934] = "fixed-version: Fixed from version 6.10" | ||
7463 | |||
7464 | CVE_STATUS[CVE-2024-40935] = "fixed-version: Fixed from version 6.10" | ||
7465 | |||
7466 | CVE_STATUS[CVE-2024-40936] = "fixed-version: Fixed from version 6.10" | ||
7467 | |||
7468 | CVE_STATUS[CVE-2024-40937] = "fixed-version: Fixed from version 6.10" | ||
7469 | |||
7470 | CVE_STATUS[CVE-2024-40938] = "fixed-version: Fixed from version 6.10" | ||
7471 | |||
7472 | CVE_STATUS[CVE-2024-40939] = "fixed-version: Fixed from version 6.10" | ||
7473 | |||
7474 | CVE_STATUS[CVE-2024-40940] = "fixed-version: Fixed from version 6.10" | ||
7475 | |||
7476 | CVE_STATUS[CVE-2024-40941] = "fixed-version: Fixed from version 6.10" | ||
7477 | |||
7478 | CVE_STATUS[CVE-2024-40942] = "fixed-version: Fixed from version 6.10" | ||
7479 | |||
7480 | CVE_STATUS[CVE-2024-40943] = "fixed-version: Fixed from version 6.10" | ||
7481 | |||
7482 | CVE_STATUS[CVE-2024-40944] = "fixed-version: Fixed from version 6.10" | ||
7483 | |||
7484 | CVE_STATUS[CVE-2024-40945] = "fixed-version: Fixed from version 6.10" | ||
7485 | |||
7486 | CVE_STATUS[CVE-2024-40947] = "fixed-version: Fixed from version 6.10" | ||
7487 | |||
7488 | CVE_STATUS[CVE-2024-40948] = "fixed-version: Fixed from version 6.10" | ||
7489 | |||
7490 | CVE_STATUS[CVE-2024-40949] = "fixed-version: Fixed from version 6.10" | ||
7491 | |||
7492 | CVE_STATUS[CVE-2024-40950] = "fixed-version: Fixed from version 6.10" | ||
7493 | |||
7494 | CVE_STATUS[CVE-2024-40951] = "fixed-version: Fixed from version 6.10" | ||
7495 | |||
7496 | CVE_STATUS[CVE-2024-40952] = "fixed-version: Fixed from version 6.10" | ||
7497 | |||
7498 | CVE_STATUS[CVE-2024-40953] = "fixed-version: Fixed from version 6.10" | ||
7499 | |||
7500 | CVE_STATUS[CVE-2024-40954] = "fixed-version: Fixed from version 6.10" | ||
7501 | |||
7502 | CVE_STATUS[CVE-2024-40955] = "fixed-version: Fixed from version 6.10" | ||
7503 | |||
7504 | CVE_STATUS[CVE-2024-40956] = "fixed-version: Fixed from version 6.10" | ||
7505 | |||
7506 | CVE_STATUS[CVE-2024-40957] = "fixed-version: Fixed from version 6.10" | ||
7507 | |||
7508 | CVE_STATUS[CVE-2024-40958] = "fixed-version: Fixed from version 6.10" | ||
7509 | |||
7510 | CVE_STATUS[CVE-2024-40959] = "fixed-version: Fixed from version 6.10" | ||
7511 | |||
7512 | CVE_STATUS[CVE-2024-40960] = "fixed-version: Fixed from version 6.10" | ||
7513 | |||
7514 | CVE_STATUS[CVE-2024-40961] = "fixed-version: Fixed from version 6.10" | ||
7515 | |||
7516 | CVE_STATUS[CVE-2024-40962] = "fixed-version: Fixed from version 6.10" | ||
7517 | |||
7518 | CVE_STATUS[CVE-2024-40963] = "fixed-version: Fixed from version 6.10" | ||
7519 | |||
7520 | CVE_STATUS[CVE-2024-40964] = "fixed-version: Fixed from version 6.10" | ||
7521 | |||
7522 | CVE_STATUS[CVE-2024-40965] = "fixed-version: Fixed from version 6.10" | ||
7523 | |||
7524 | CVE_STATUS[CVE-2024-40966] = "fixed-version: Fixed from version 6.10" | ||
7525 | |||
7526 | CVE_STATUS[CVE-2024-40967] = "fixed-version: Fixed from version 6.10" | ||
7527 | |||
7528 | CVE_STATUS[CVE-2024-40968] = "fixed-version: Fixed from version 6.10" | ||
7529 | |||
7530 | CVE_STATUS[CVE-2024-40969] = "fixed-version: Fixed from version 6.10" | ||
7531 | |||
7532 | CVE_STATUS[CVE-2024-40970] = "fixed-version: Fixed from version 6.10" | ||
7533 | |||
7534 | CVE_STATUS[CVE-2024-40971] = "fixed-version: Fixed from version 6.10" | ||
7535 | |||
7536 | CVE_STATUS[CVE-2024-40972] = "fixed-version: Fixed from version 6.10" | ||
7537 | |||
7538 | CVE_STATUS[CVE-2024-40973] = "fixed-version: Fixed from version 6.10" | ||
7539 | |||
7540 | CVE_STATUS[CVE-2024-40974] = "fixed-version: Fixed from version 6.10" | ||
7541 | |||
7542 | CVE_STATUS[CVE-2024-40975] = "fixed-version: Fixed from version 6.10" | ||
7543 | |||
7544 | CVE_STATUS[CVE-2024-40976] = "fixed-version: Fixed from version 6.10" | ||
7545 | |||
7546 | CVE_STATUS[CVE-2024-40977] = "fixed-version: Fixed from version 6.10" | ||
7547 | |||
7548 | CVE_STATUS[CVE-2024-40978] = "fixed-version: Fixed from version 6.10" | ||
7549 | |||
7550 | CVE_STATUS[CVE-2024-40979] = "fixed-version: Fixed from version 6.10" | ||
7551 | |||
7552 | CVE_STATUS[CVE-2024-40980] = "fixed-version: Fixed from version 6.10" | ||
7553 | |||
7554 | CVE_STATUS[CVE-2024-40981] = "fixed-version: Fixed from version 6.10" | ||
7555 | |||
7556 | CVE_STATUS[CVE-2024-40983] = "fixed-version: Fixed from version 6.10" | ||
7557 | |||
7558 | CVE_STATUS[CVE-2024-40984] = "fixed-version: Fixed from version 6.10" | ||
7559 | |||
7560 | CVE_STATUS[CVE-2024-40985] = "fixed-version: Fixed from version 6.10" | ||
7561 | |||
7562 | CVE_STATUS[CVE-2024-40986] = "fixed-version: Fixed from version 6.10" | ||
7563 | |||
7564 | CVE_STATUS[CVE-2024-40987] = "fixed-version: Fixed from version 6.10" | ||
7565 | |||
7566 | CVE_STATUS[CVE-2024-40988] = "fixed-version: Fixed from version 6.10" | ||
7567 | |||
7568 | CVE_STATUS[CVE-2024-40989] = "fixed-version: Fixed from version 6.10" | ||
7569 | |||
7570 | CVE_STATUS[CVE-2024-40990] = "fixed-version: Fixed from version 6.10" | ||
7571 | |||
7572 | CVE_STATUS[CVE-2024-40991] = "fixed-version: Fixed from version 6.10" | ||
7573 | |||
7574 | CVE_STATUS[CVE-2024-40992] = "fixed-version: Fixed from version 6.10" | ||
7575 | |||
7576 | CVE_STATUS[CVE-2024-40993] = "fixed-version: Fixed from version 6.9.7" | ||
7577 | |||
7578 | CVE_STATUS[CVE-2024-40994] = "fixed-version: Fixed from version 6.10" | ||
7579 | |||
7580 | CVE_STATUS[CVE-2024-40995] = "fixed-version: Fixed from version 6.10" | ||
7581 | |||
7582 | CVE_STATUS[CVE-2024-40996] = "fixed-version: Fixed from version 6.10" | ||
7583 | |||
7584 | CVE_STATUS[CVE-2024-40997] = "fixed-version: Fixed from version 6.10" | ||
7585 | |||
7586 | CVE_STATUS[CVE-2024-40998] = "fixed-version: Fixed from version 6.10" | ||
7587 | |||
7588 | CVE_STATUS[CVE-2024-40999] = "fixed-version: Fixed from version 6.10" | ||
7589 | |||
7590 | CVE_STATUS[CVE-2024-41000] = "fixed-version: Fixed from version 6.10" | ||
7591 | |||
7592 | CVE_STATUS[CVE-2024-41001] = "fixed-version: Fixed from version 6.10" | ||
7593 | |||
7594 | CVE_STATUS[CVE-2024-41002] = "fixed-version: Fixed from version 6.10" | ||
7595 | |||
7596 | CVE_STATUS[CVE-2024-41003] = "fixed-version: Fixed from version 6.10" | ||
7597 | |||
7598 | CVE_STATUS[CVE-2024-41004] = "fixed-version: Fixed from version 6.10" | ||
7599 | |||
7600 | CVE_STATUS[CVE-2024-41005] = "fixed-version: Fixed from version 6.10" | ||
7601 | |||
7602 | CVE_STATUS[CVE-2024-41006] = "fixed-version: Fixed from version 6.10" | ||
7603 | |||
7604 | CVE_STATUS[CVE-2024-41007] = "fixed-version: Fixed from version 6.10" | ||
7605 | |||
7606 | CVE_STATUS[CVE-2024-41008] = "fixed-version: Fixed from version 6.9" | ||
7607 | |||
7608 | CVE_STATUS[CVE-2024-41009] = "fixed-version: Fixed from version 6.10" | ||
7609 | |||
7610 | CVE_STATUS[CVE-2024-41010] = "fixed-version: Fixed from version 6.10" | ||
7611 | |||
7612 | CVE_STATUS[CVE-2024-41011] = "fixed-version: Fixed from version 6.9" | ||
7613 | |||
7614 | CVE_STATUS[CVE-2024-41012] = "fixed-version: Fixed from version 6.10" | ||
7615 | |||
7616 | CVE_STATUS[CVE-2024-41013] = "fixed-version: Fixed from version 6.11" | ||
7617 | |||
7618 | CVE_STATUS[CVE-2024-41014] = "fixed-version: Fixed from version 6.11" | ||
7619 | |||
7620 | CVE_STATUS[CVE-2024-41015] = "fixed-version: Fixed from version 6.11" | ||
7621 | |||
7622 | CVE_STATUS[CVE-2024-41016] = "fixed-version: Fixed from version 6.11" | ||
7623 | |||
7624 | CVE_STATUS[CVE-2024-41017] = "fixed-version: Fixed from version 6.11" | ||
7625 | |||
7626 | CVE_STATUS[CVE-2024-41018] = "fixed-version: Fixed from version 6.11" | ||
7627 | |||
7628 | CVE_STATUS[CVE-2024-41019] = "fixed-version: Fixed from version 6.11" | ||
7629 | |||
7630 | CVE_STATUS[CVE-2024-41020] = "fixed-version: Fixed from version 6.11" | ||
7631 | |||
7632 | CVE_STATUS[CVE-2024-41021] = "fixed-version: Fixed from version 6.11" | ||
7633 | |||
7634 | CVE_STATUS[CVE-2024-41022] = "fixed-version: Fixed from version 6.11" | ||
7635 | |||
7636 | CVE_STATUS[CVE-2024-41023] = "fixed-version: Fixed from version 6.10" | ||
7637 | |||
7638 | CVE_STATUS[CVE-2024-41025] = "fixed-version: Fixed from version 6.10" | ||
7639 | |||
7640 | CVE_STATUS[CVE-2024-41026] = "fixed-version: Fixed from version 6.10" | ||
7641 | |||
7642 | CVE_STATUS[CVE-2024-41027] = "fixed-version: Fixed from version 6.10" | ||
7643 | |||
7644 | CVE_STATUS[CVE-2024-41028] = "fixed-version: Fixed from version 6.10" | ||
7645 | |||
7646 | CVE_STATUS[CVE-2024-41029] = "fixed-version: Fixed from version 6.10" | ||
7647 | |||
7648 | CVE_STATUS[CVE-2024-41030] = "fixed-version: Fixed from version 6.10" | ||
7649 | |||
7650 | CVE_STATUS[CVE-2024-41031] = "fixed-version: Fixed from version 6.10" | ||
7651 | |||
7652 | CVE_STATUS[CVE-2024-41032] = "fixed-version: Fixed from version 6.10" | ||
7653 | |||
7654 | CVE_STATUS[CVE-2024-41033] = "fixed-version: Fixed from version 6.10" | ||
7655 | |||
7656 | CVE_STATUS[CVE-2024-41034] = "fixed-version: Fixed from version 6.10" | ||
7657 | |||
7658 | CVE_STATUS[CVE-2024-41035] = "fixed-version: Fixed from version 6.10" | ||
7659 | |||
7660 | CVE_STATUS[CVE-2024-41036] = "fixed-version: Fixed from version 6.10" | ||
7661 | |||
7662 | CVE_STATUS[CVE-2024-41037] = "fixed-version: Fixed from version 6.10" | ||
7663 | |||
7664 | CVE_STATUS[CVE-2024-41038] = "fixed-version: Fixed from version 6.10" | ||
7665 | |||
7666 | CVE_STATUS[CVE-2024-41039] = "fixed-version: Fixed from version 6.10" | ||
7667 | |||
7668 | CVE_STATUS[CVE-2024-41040] = "fixed-version: Fixed from version 6.10" | ||
7669 | |||
7670 | CVE_STATUS[CVE-2024-41041] = "fixed-version: Fixed from version 6.10" | ||
7671 | |||
7672 | CVE_STATUS[CVE-2024-41042] = "fixed-version: Fixed from version 6.10" | ||
7673 | |||
7674 | CVE_STATUS[CVE-2024-41043] = "fixed-version: Fixed from version 6.10" | ||
7675 | |||
7676 | CVE_STATUS[CVE-2024-41044] = "fixed-version: Fixed from version 6.10" | ||
7677 | |||
7678 | CVE_STATUS[CVE-2024-41045] = "fixed-version: Fixed from version 6.10" | ||
7679 | |||
7680 | CVE_STATUS[CVE-2024-41046] = "fixed-version: Fixed from version 6.10" | ||
7681 | |||
7682 | CVE_STATUS[CVE-2024-41047] = "fixed-version: Fixed from version 6.10" | ||
7683 | |||
7684 | CVE_STATUS[CVE-2024-41048] = "fixed-version: Fixed from version 6.10" | ||
7685 | |||
7686 | CVE_STATUS[CVE-2024-41049] = "fixed-version: Fixed from version 6.10" | ||
7687 | |||
7688 | CVE_STATUS[CVE-2024-41050] = "fixed-version: Fixed from version 6.10" | ||
7689 | |||
7690 | CVE_STATUS[CVE-2024-41051] = "fixed-version: Fixed from version 6.10" | ||
7691 | |||
7692 | CVE_STATUS[CVE-2024-41052] = "fixed-version: Fixed from version 6.9.10" | ||
7693 | |||
7694 | CVE_STATUS[CVE-2024-41053] = "fixed-version: Fixed from version 6.10" | ||
7695 | |||
7696 | CVE_STATUS[CVE-2024-41054] = "fixed-version: Fixed from version 6.10" | ||
7697 | |||
7698 | CVE_STATUS[CVE-2024-41055] = "fixed-version: Fixed from version 6.10" | ||
7699 | |||
7700 | CVE_STATUS[CVE-2024-41056] = "fixed-version: Fixed from version 6.10" | ||
7701 | |||
7702 | CVE_STATUS[CVE-2024-41057] = "fixed-version: Fixed from version 6.10" | ||
7703 | |||
7704 | CVE_STATUS[CVE-2024-41058] = "fixed-version: Fixed from version 6.10" | ||
7705 | |||
7706 | CVE_STATUS[CVE-2024-41059] = "fixed-version: Fixed from version 6.10" | ||
7707 | |||
7708 | CVE_STATUS[CVE-2024-41060] = "fixed-version: Fixed from version 6.10" | ||
7709 | |||
7710 | CVE_STATUS[CVE-2024-41061] = "fixed-version: Fixed from version 6.10" | ||
7711 | |||
7712 | CVE_STATUS[CVE-2024-41062] = "fixed-version: Fixed from version 6.10" | ||
7713 | |||
7714 | CVE_STATUS[CVE-2024-41063] = "fixed-version: Fixed from version 6.10" | ||
7715 | |||
7716 | CVE_STATUS[CVE-2024-41064] = "fixed-version: Fixed from version 6.10" | ||
7717 | |||
7718 | CVE_STATUS[CVE-2024-41065] = "fixed-version: Fixed from version 6.10" | ||
7719 | |||
7720 | CVE_STATUS[CVE-2024-41066] = "fixed-version: Fixed from version 6.10" | ||
7721 | |||
7722 | CVE_STATUS[CVE-2024-41067] = "fixed-version: Fixed from version 6.10" | ||
7723 | |||
7724 | CVE_STATUS[CVE-2024-41068] = "fixed-version: Fixed from version 6.10" | ||
7725 | |||
7726 | CVE_STATUS[CVE-2024-41069] = "fixed-version: Fixed from version 6.10" | ||
7727 | |||
7728 | CVE_STATUS[CVE-2024-41070] = "fixed-version: Fixed from version 6.10" | ||
7729 | |||
7730 | CVE_STATUS[CVE-2024-41072] = "fixed-version: Fixed from version 6.10" | ||
7731 | |||
7732 | CVE_STATUS[CVE-2024-41073] = "fixed-version: Fixed from version 6.10" | ||
7733 | |||
7734 | CVE_STATUS[CVE-2024-41074] = "fixed-version: Fixed from version 6.10" | ||
7735 | |||
7736 | CVE_STATUS[CVE-2024-41075] = "fixed-version: Fixed from version 6.10" | ||
7737 | |||
7738 | CVE_STATUS[CVE-2024-41076] = "fixed-version: Fixed from version 6.10" | ||
7739 | |||
7740 | CVE_STATUS[CVE-2024-41077] = "fixed-version: Fixed from version 6.10" | ||
7741 | |||
7742 | CVE_STATUS[CVE-2024-41078] = "fixed-version: Fixed from version 6.10" | ||
7743 | |||
7744 | CVE_STATUS[CVE-2024-41079] = "fixed-version: Fixed from version 6.10" | ||
7745 | |||
7746 | CVE_STATUS[CVE-2024-41080] = "fixed-version: Fixed from version 6.10" | ||
7747 | |||
7748 | CVE_STATUS[CVE-2024-41081] = "fixed-version: Fixed from version 6.10" | ||
7749 | |||
7750 | CVE_STATUS[CVE-2024-41082] = "fixed-version: Fixed from version 6.10" | ||
7751 | |||
7752 | CVE_STATUS[CVE-2024-41083] = "fixed-version: Fixed from version 6.10" | ||
7753 | |||
7754 | CVE_STATUS[CVE-2024-41084] = "fixed-version: Fixed from version 6.10" | ||
7755 | |||
7756 | CVE_STATUS[CVE-2024-41085] = "fixed-version: Fixed from version 6.10" | ||
7757 | |||
7758 | CVE_STATUS[CVE-2024-41086] = "fixed-version: Fixed from version 6.10" | ||
7759 | |||
7760 | CVE_STATUS[CVE-2024-41087] = "fixed-version: Fixed from version 6.10" | ||
7761 | |||
7762 | CVE_STATUS[CVE-2024-41088] = "fixed-version: Fixed from version 6.10" | ||
7763 | |||
7764 | CVE_STATUS[CVE-2024-41089] = "fixed-version: Fixed from version 6.10" | ||
7765 | |||
7766 | CVE_STATUS[CVE-2024-41090] = "fixed-version: Fixed from version 6.11" | ||
7767 | |||
7768 | CVE_STATUS[CVE-2024-41091] = "fixed-version: Fixed from version 6.11" | ||
7769 | |||
7770 | CVE_STATUS[CVE-2024-41092] = "fixed-version: Fixed from version 6.10" | ||
7771 | |||
7772 | CVE_STATUS[CVE-2024-41093] = "fixed-version: Fixed from version 6.10" | ||
7773 | |||
7774 | CVE_STATUS[CVE-2024-41094] = "fixed-version: Fixed from version 6.10" | ||
7775 | |||
7776 | CVE_STATUS[CVE-2024-41095] = "fixed-version: Fixed from version 6.10" | ||
7777 | |||
7778 | CVE_STATUS[CVE-2024-41096] = "fixed-version: Fixed from version 6.10" | ||
7779 | |||
7780 | CVE_STATUS[CVE-2024-41097] = "fixed-version: Fixed from version 6.10" | ||
7781 | |||
7782 | CVE_STATUS[CVE-2024-41098] = "fixed-version: Fixed from version 6.10" | ||
7783 | |||
7784 | CVE_STATUS[CVE-2024-41149] = "fixed-version: Fixed from version 6.12.7" | ||
7785 | |||
7786 | CVE_STATUS[CVE-2024-41932] = "cpe-stable-backport: Backported in 6.12.5" | ||
7787 | |||
7788 | CVE_STATUS[CVE-2024-41935] = "cpe-stable-backport: Backported in 6.12.5" | ||
7789 | |||
7790 | CVE_STATUS[CVE-2024-42063] = "fixed-version: Fixed from version 6.10" | ||
7791 | |||
7792 | CVE_STATUS[CVE-2024-42064] = "fixed-version: Fixed from version 6.10" | ||
7793 | |||
7794 | CVE_STATUS[CVE-2024-42065] = "fixed-version: Fixed from version 6.10" | ||
7795 | |||
7796 | CVE_STATUS[CVE-2024-42066] = "fixed-version: Fixed from version 6.10" | ||
7797 | |||
7798 | CVE_STATUS[CVE-2024-42067] = "fixed-version: Fixed from version 6.10" | ||
7799 | |||
7800 | CVE_STATUS[CVE-2024-42068] = "fixed-version: Fixed from version 6.10" | ||
7801 | |||
7802 | CVE_STATUS[CVE-2024-42069] = "fixed-version: Fixed from version 6.10" | ||
7803 | |||
7804 | CVE_STATUS[CVE-2024-42070] = "fixed-version: Fixed from version 6.10" | ||
7805 | |||
7806 | CVE_STATUS[CVE-2024-42071] = "fixed-version: Fixed from version 6.10" | ||
7807 | |||
7808 | CVE_STATUS[CVE-2024-42072] = "fixed-version: Fixed from version 6.10" | ||
7809 | |||
7810 | CVE_STATUS[CVE-2024-42073] = "fixed-version: Fixed from version 6.10" | ||
7811 | |||
7812 | CVE_STATUS[CVE-2024-42074] = "fixed-version: Fixed from version 6.10" | ||
7813 | |||
7814 | CVE_STATUS[CVE-2024-42075] = "fixed-version: Fixed from version 6.10" | ||
7815 | |||
7816 | CVE_STATUS[CVE-2024-42076] = "fixed-version: Fixed from version 6.10" | ||
7817 | |||
7818 | CVE_STATUS[CVE-2024-42077] = "fixed-version: Fixed from version 6.10" | ||
7819 | |||
7820 | CVE_STATUS[CVE-2024-42078] = "fixed-version: Fixed from version 6.10" | ||
7821 | |||
7822 | CVE_STATUS[CVE-2024-42079] = "fixed-version: Fixed from version 6.10" | ||
7823 | |||
7824 | CVE_STATUS[CVE-2024-42080] = "fixed-version: Fixed from version 6.10" | ||
7825 | |||
7826 | CVE_STATUS[CVE-2024-42081] = "fixed-version: Fixed from version 6.10" | ||
7827 | |||
7828 | CVE_STATUS[CVE-2024-42082] = "fixed-version: Fixed from version 6.10" | ||
7829 | |||
7830 | CVE_STATUS[CVE-2024-42083] = "fixed-version: Fixed from version 6.10" | ||
7831 | |||
7832 | CVE_STATUS[CVE-2024-42084] = "fixed-version: Fixed from version 6.10" | ||
7833 | |||
7834 | CVE_STATUS[CVE-2024-42085] = "fixed-version: Fixed from version 6.10" | ||
7835 | |||
7836 | CVE_STATUS[CVE-2024-42086] = "fixed-version: Fixed from version 6.10" | ||
7837 | |||
7838 | CVE_STATUS[CVE-2024-42087] = "fixed-version: Fixed from version 6.10" | ||
7839 | |||
7840 | CVE_STATUS[CVE-2024-42088] = "fixed-version: Fixed from version 6.10" | ||
7841 | |||
7842 | CVE_STATUS[CVE-2024-42089] = "fixed-version: Fixed from version 6.10" | ||
7843 | |||
7844 | CVE_STATUS[CVE-2024-42090] = "fixed-version: Fixed from version 6.10" | ||
7845 | |||
7846 | CVE_STATUS[CVE-2024-42091] = "fixed-version: Fixed from version 6.10" | ||
7847 | |||
7848 | CVE_STATUS[CVE-2024-42092] = "fixed-version: Fixed from version 6.10" | ||
7849 | |||
7850 | CVE_STATUS[CVE-2024-42093] = "fixed-version: Fixed from version 6.10" | ||
7851 | |||
7852 | CVE_STATUS[CVE-2024-42094] = "fixed-version: Fixed from version 6.10" | ||
7853 | |||
7854 | CVE_STATUS[CVE-2024-42095] = "fixed-version: Fixed from version 6.10" | ||
7855 | |||
7856 | CVE_STATUS[CVE-2024-42096] = "fixed-version: Fixed from version 6.10" | ||
7857 | |||
7858 | CVE_STATUS[CVE-2024-42097] = "fixed-version: Fixed from version 6.10" | ||
7859 | |||
7860 | CVE_STATUS[CVE-2024-42098] = "fixed-version: Fixed from version 6.10" | ||
7861 | |||
7862 | CVE_STATUS[CVE-2024-42099] = "fixed-version: Fixed from version 6.10" | ||
7863 | |||
7864 | CVE_STATUS[CVE-2024-42100] = "fixed-version: Fixed from version 6.10" | ||
7865 | |||
7866 | CVE_STATUS[CVE-2024-42101] = "fixed-version: Fixed from version 6.10" | ||
7867 | |||
7868 | CVE_STATUS[CVE-2024-42102] = "fixed-version: Fixed from version 6.10" | ||
7869 | |||
7870 | CVE_STATUS[CVE-2024-42103] = "fixed-version: Fixed from version 6.9.9" | ||
7871 | |||
7872 | CVE_STATUS[CVE-2024-42104] = "fixed-version: Fixed from version 6.10" | ||
7873 | |||
7874 | CVE_STATUS[CVE-2024-42105] = "fixed-version: Fixed from version 6.10" | ||
7875 | |||
7876 | CVE_STATUS[CVE-2024-42106] = "fixed-version: Fixed from version 6.10" | ||
7877 | |||
7878 | CVE_STATUS[CVE-2024-42107] = "fixed-version: Fixed from version 6.10" | ||
7879 | |||
7880 | CVE_STATUS[CVE-2024-42108] = "fixed-version: Fixed from version 6.10" | ||
7881 | |||
7882 | CVE_STATUS[CVE-2024-42109] = "fixed-version: Fixed from version 6.10" | ||
7883 | |||
7884 | CVE_STATUS[CVE-2024-42110] = "fixed-version: Fixed from version 6.10" | ||
7885 | |||
7886 | CVE_STATUS[CVE-2024-42111] = "fixed-version: Fixed from version 6.10" | ||
7887 | |||
7888 | CVE_STATUS[CVE-2024-42112] = "fixed-version: Fixed from version 6.10" | ||
7889 | |||
7890 | CVE_STATUS[CVE-2024-42113] = "fixed-version: Fixed from version 6.10" | ||
7891 | |||
7892 | CVE_STATUS[CVE-2024-42114] = "fixed-version: Fixed from version 6.10" | ||
7893 | |||
7894 | CVE_STATUS[CVE-2024-42115] = "fixed-version: Fixed from version 6.10" | ||
7895 | |||
7896 | CVE_STATUS[CVE-2024-42117] = "fixed-version: Fixed from version 6.10" | ||
7897 | |||
7898 | CVE_STATUS[CVE-2024-42118] = "fixed-version: Fixed from version 6.10" | ||
7899 | |||
7900 | CVE_STATUS[CVE-2024-42119] = "fixed-version: Fixed from version 6.10" | ||
7901 | |||
7902 | CVE_STATUS[CVE-2024-42120] = "fixed-version: Fixed from version 6.10" | ||
7903 | |||
7904 | CVE_STATUS[CVE-2024-42121] = "fixed-version: Fixed from version 6.10" | ||
7905 | |||
7906 | CVE_STATUS[CVE-2024-42122] = "fixed-version: Fixed from version 6.10" | ||
7907 | |||
7908 | CVE_STATUS[CVE-2024-42123] = "fixed-version: Fixed from version 6.10" | ||
7909 | |||
7910 | CVE_STATUS[CVE-2024-42124] = "fixed-version: Fixed from version 6.10" | ||
7911 | |||
7912 | CVE_STATUS[CVE-2024-42125] = "fixed-version: Fixed from version 6.10" | ||
7913 | |||
7914 | CVE_STATUS[CVE-2024-42126] = "fixed-version: Fixed from version 6.10" | ||
7915 | |||
7916 | CVE_STATUS[CVE-2024-42127] = "fixed-version: Fixed from version 6.10" | ||
7917 | |||
7918 | CVE_STATUS[CVE-2024-42128] = "fixed-version: Fixed from version 6.10" | ||
7919 | |||
7920 | CVE_STATUS[CVE-2024-42129] = "fixed-version: Fixed from version 6.10" | ||
7921 | |||
7922 | CVE_STATUS[CVE-2024-42130] = "fixed-version: Fixed from version 6.10" | ||
7923 | |||
7924 | CVE_STATUS[CVE-2024-42131] = "fixed-version: Fixed from version 6.10" | ||
7925 | |||
7926 | CVE_STATUS[CVE-2024-42132] = "fixed-version: Fixed from version 6.10" | ||
7927 | |||
7928 | CVE_STATUS[CVE-2024-42133] = "fixed-version: Fixed from version 6.10" | ||
7929 | |||
7930 | CVE_STATUS[CVE-2024-42134] = "fixed-version: Fixed from version 6.10" | ||
7931 | |||
7932 | CVE_STATUS[CVE-2024-42135] = "fixed-version: Fixed from version 6.10" | ||
7933 | |||
7934 | CVE_STATUS[CVE-2024-42136] = "fixed-version: Fixed from version 6.10" | ||
7935 | |||
7936 | CVE_STATUS[CVE-2024-42137] = "fixed-version: Fixed from version 6.10" | ||
7937 | |||
7938 | CVE_STATUS[CVE-2024-42138] = "fixed-version: Fixed from version 6.10" | ||
7939 | |||
7940 | CVE_STATUS[CVE-2024-42139] = "fixed-version: Fixed from version 6.10" | ||
7941 | |||
7942 | CVE_STATUS[CVE-2024-42140] = "fixed-version: Fixed from version 6.10" | ||
7943 | |||
7944 | CVE_STATUS[CVE-2024-42141] = "fixed-version: Fixed from version 6.10" | ||
7945 | |||
7946 | CVE_STATUS[CVE-2024-42142] = "fixed-version: Fixed from version 6.10" | ||
7947 | |||
7948 | CVE_STATUS[CVE-2024-42144] = "fixed-version: Fixed from version 6.10" | ||
7949 | |||
7950 | CVE_STATUS[CVE-2024-42145] = "fixed-version: Fixed from version 6.10" | ||
7951 | |||
7952 | CVE_STATUS[CVE-2024-42146] = "fixed-version: Fixed from version 6.10" | ||
7953 | |||
7954 | CVE_STATUS[CVE-2024-42147] = "fixed-version: Fixed from version 6.10" | ||
7955 | |||
7956 | CVE_STATUS[CVE-2024-42148] = "fixed-version: Fixed from version 6.10" | ||
7957 | |||
7958 | CVE_STATUS[CVE-2024-42149] = "fixed-version: Fixed from version 6.10" | ||
7959 | |||
7960 | CVE_STATUS[CVE-2024-42150] = "fixed-version: Fixed from version 6.10" | ||
7961 | |||
7962 | CVE_STATUS[CVE-2024-42151] = "fixed-version: Fixed from version 6.10" | ||
7963 | |||
7964 | CVE_STATUS[CVE-2024-42152] = "fixed-version: Fixed from version 6.10" | ||
7965 | |||
7966 | CVE_STATUS[CVE-2024-42153] = "fixed-version: Fixed from version 6.10" | ||
7967 | |||
7968 | CVE_STATUS[CVE-2024-42154] = "fixed-version: Fixed from version 6.10" | ||
7969 | |||
7970 | CVE_STATUS[CVE-2024-42155] = "fixed-version: Fixed from version 6.10" | ||
7971 | |||
7972 | CVE_STATUS[CVE-2024-42156] = "fixed-version: Fixed from version 6.10" | ||
7973 | |||
7974 | CVE_STATUS[CVE-2024-42157] = "fixed-version: Fixed from version 6.10" | ||
7975 | |||
7976 | CVE_STATUS[CVE-2024-42158] = "fixed-version: Fixed from version 6.10" | ||
7977 | |||
7978 | CVE_STATUS[CVE-2024-42159] = "fixed-version: Fixed from version 6.10" | ||
7979 | |||
7980 | CVE_STATUS[CVE-2024-42160] = "fixed-version: Fixed from version 6.10" | ||
7981 | |||
7982 | CVE_STATUS[CVE-2024-42161] = "fixed-version: Fixed from version 6.10" | ||
7983 | |||
7984 | CVE_STATUS[CVE-2024-42162] = "fixed-version: Fixed from version 6.10" | ||
7985 | |||
7986 | CVE_STATUS[CVE-2024-42223] = "fixed-version: Fixed from version 6.10" | ||
7987 | |||
7988 | CVE_STATUS[CVE-2024-42224] = "fixed-version: Fixed from version 6.10" | ||
7989 | |||
7990 | CVE_STATUS[CVE-2024-42225] = "fixed-version: Fixed from version 6.10" | ||
7991 | |||
7992 | CVE_STATUS[CVE-2024-42227] = "fixed-version: Fixed from version 6.10" | ||
7993 | |||
7994 | CVE_STATUS[CVE-2024-42228] = "fixed-version: Fixed from version 6.10" | ||
7995 | |||
7996 | CVE_STATUS[CVE-2024-42229] = "fixed-version: Fixed from version 6.10" | ||
7997 | |||
7998 | CVE_STATUS[CVE-2024-42230] = "fixed-version: Fixed from version 6.10" | ||
7999 | |||
8000 | CVE_STATUS[CVE-2024-42231] = "fixed-version: Fixed from version 6.10" | ||
8001 | |||
8002 | CVE_STATUS[CVE-2024-42232] = "fixed-version: Fixed from version 6.10" | ||
8003 | |||
8004 | CVE_STATUS[CVE-2024-42233] = "fixed-version: Fixed from version 6.10" | ||
8005 | |||
8006 | CVE_STATUS[CVE-2024-42234] = "fixed-version: Fixed from version 6.10" | ||
8007 | |||
8008 | CVE_STATUS[CVE-2024-42235] = "fixed-version: Fixed from version 6.10" | ||
8009 | |||
8010 | CVE_STATUS[CVE-2024-42236] = "fixed-version: Fixed from version 6.10" | ||
8011 | |||
8012 | CVE_STATUS[CVE-2024-42237] = "fixed-version: Fixed from version 6.10" | ||
8013 | |||
8014 | CVE_STATUS[CVE-2024-42238] = "fixed-version: Fixed from version 6.10" | ||
8015 | |||
8016 | CVE_STATUS[CVE-2024-42239] = "fixed-version: Fixed from version 6.10" | ||
8017 | |||
8018 | CVE_STATUS[CVE-2024-42240] = "fixed-version: Fixed from version 6.10" | ||
8019 | |||
8020 | CVE_STATUS[CVE-2024-42241] = "fixed-version: Fixed from version 6.10" | ||
8021 | |||
8022 | CVE_STATUS[CVE-2024-42242] = "fixed-version: Fixed from version 6.10" | ||
8023 | |||
8024 | CVE_STATUS[CVE-2024-42243] = "fixed-version: Fixed from version 6.10" | ||
8025 | |||
8026 | CVE_STATUS[CVE-2024-42244] = "fixed-version: Fixed from version 6.10" | ||
8027 | |||
8028 | CVE_STATUS[CVE-2024-42245] = "fixed-version: Fixed from version 6.10" | ||
8029 | |||
8030 | CVE_STATUS[CVE-2024-42246] = "fixed-version: Fixed from version 6.10" | ||
8031 | |||
8032 | CVE_STATUS[CVE-2024-42247] = "fixed-version: Fixed from version 6.10" | ||
8033 | |||
8034 | CVE_STATUS[CVE-2024-42248] = "fixed-version: Fixed from version 6.10" | ||
8035 | |||
8036 | CVE_STATUS[CVE-2024-42249] = "fixed-version: Fixed from version 6.10" | ||
8037 | |||
8038 | CVE_STATUS[CVE-2024-42250] = "fixed-version: Fixed from version 6.10" | ||
8039 | |||
8040 | CVE_STATUS[CVE-2024-42251] = "fixed-version: Fixed from version 6.10" | ||
8041 | |||
8042 | CVE_STATUS[CVE-2024-42252] = "fixed-version: Fixed from version 6.10" | ||
8043 | |||
8044 | CVE_STATUS[CVE-2024-42253] = "fixed-version: Fixed from version 6.10" | ||
8045 | |||
8046 | CVE_STATUS[CVE-2024-42254] = "fixed-version: Fixed from version 6.11" | ||
8047 | |||
8048 | CVE_STATUS[CVE-2024-42255] = "fixed-version: Fixed from version 6.11" | ||
8049 | |||
8050 | CVE_STATUS[CVE-2024-42256] = "fixed-version: Fixed from version 6.11" | ||
8051 | |||
8052 | CVE_STATUS[CVE-2024-42257] = "fixed-version: Fixed from version 6.11" | ||
8053 | |||
8054 | CVE_STATUS[CVE-2024-42258] = "fixed-version: Fixed from version 6.11" | ||
8055 | |||
8056 | CVE_STATUS[CVE-2024-42259] = "fixed-version: Fixed from version 6.11" | ||
8057 | |||
8058 | CVE_STATUS[CVE-2024-42260] = "fixed-version: Fixed from version 6.11" | ||
8059 | |||
8060 | CVE_STATUS[CVE-2024-42261] = "fixed-version: Fixed from version 6.11" | ||
8061 | |||
8062 | CVE_STATUS[CVE-2024-42262] = "fixed-version: Fixed from version 6.11" | ||
8063 | |||
8064 | CVE_STATUS[CVE-2024-42263] = "fixed-version: Fixed from version 6.11" | ||
8065 | |||
8066 | CVE_STATUS[CVE-2024-42264] = "fixed-version: Fixed from version 6.11" | ||
8067 | |||
8068 | CVE_STATUS[CVE-2024-42265] = "fixed-version: Fixed from version 6.11" | ||
8069 | |||
8070 | CVE_STATUS[CVE-2024-42266] = "fixed-version: Fixed from version 6.11" | ||
8071 | |||
8072 | CVE_STATUS[CVE-2024-42267] = "fixed-version: Fixed from version 6.11" | ||
8073 | |||
8074 | CVE_STATUS[CVE-2024-42268] = "fixed-version: Fixed from version 6.11" | ||
8075 | |||
8076 | CVE_STATUS[CVE-2024-42269] = "fixed-version: Fixed from version 6.11" | ||
8077 | |||
8078 | CVE_STATUS[CVE-2024-42270] = "fixed-version: Fixed from version 6.11" | ||
8079 | |||
8080 | CVE_STATUS[CVE-2024-42271] = "fixed-version: Fixed from version 6.11" | ||
8081 | |||
8082 | CVE_STATUS[CVE-2024-42272] = "fixed-version: Fixed from version 6.11" | ||
8083 | |||
8084 | CVE_STATUS[CVE-2024-42273] = "fixed-version: Fixed from version 6.11" | ||
8085 | |||
8086 | CVE_STATUS[CVE-2024-42274] = "fixed-version: Fixed from version 6.11" | ||
8087 | |||
8088 | CVE_STATUS[CVE-2024-42275] = "fixed-version: Fixed from version 6.11" | ||
8089 | |||
8090 | CVE_STATUS[CVE-2024-42276] = "fixed-version: Fixed from version 6.11" | ||
8091 | |||
8092 | CVE_STATUS[CVE-2024-42277] = "fixed-version: Fixed from version 6.11" | ||
8093 | |||
8094 | CVE_STATUS[CVE-2024-42278] = "fixed-version: Fixed from version 6.11" | ||
8095 | |||
8096 | CVE_STATUS[CVE-2024-42279] = "fixed-version: Fixed from version 6.11" | ||
8097 | |||
8098 | CVE_STATUS[CVE-2024-42280] = "fixed-version: Fixed from version 6.11" | ||
8099 | |||
8100 | CVE_STATUS[CVE-2024-42281] = "fixed-version: Fixed from version 6.11" | ||
8101 | |||
8102 | CVE_STATUS[CVE-2024-42282] = "fixed-version: Fixed from version 6.11" | ||
8103 | |||
8104 | CVE_STATUS[CVE-2024-42283] = "fixed-version: Fixed from version 6.11" | ||
8105 | |||
8106 | CVE_STATUS[CVE-2024-42284] = "fixed-version: Fixed from version 6.11" | ||
8107 | |||
8108 | CVE_STATUS[CVE-2024-42285] = "fixed-version: Fixed from version 6.11" | ||
8109 | |||
8110 | CVE_STATUS[CVE-2024-42286] = "fixed-version: Fixed from version 6.11" | ||
8111 | |||
8112 | CVE_STATUS[CVE-2024-42287] = "fixed-version: Fixed from version 6.11" | ||
8113 | |||
8114 | CVE_STATUS[CVE-2024-42288] = "fixed-version: Fixed from version 6.11" | ||
8115 | |||
8116 | CVE_STATUS[CVE-2024-42289] = "fixed-version: Fixed from version 6.11" | ||
8117 | |||
8118 | CVE_STATUS[CVE-2024-42290] = "fixed-version: Fixed from version 6.11" | ||
8119 | |||
8120 | CVE_STATUS[CVE-2024-42291] = "fixed-version: Fixed from version 6.11" | ||
8121 | |||
8122 | CVE_STATUS[CVE-2024-42292] = "fixed-version: Fixed from version 6.11" | ||
8123 | |||
8124 | CVE_STATUS[CVE-2024-42293] = "fixed-version: Fixed from version 6.11" | ||
8125 | |||
8126 | CVE_STATUS[CVE-2024-42294] = "fixed-version: Fixed from version 6.11" | ||
8127 | |||
8128 | CVE_STATUS[CVE-2024-42295] = "fixed-version: Fixed from version 6.11" | ||
8129 | |||
8130 | CVE_STATUS[CVE-2024-42296] = "fixed-version: Fixed from version 6.11" | ||
8131 | |||
8132 | CVE_STATUS[CVE-2024-42297] = "fixed-version: Fixed from version 6.11" | ||
8133 | |||
8134 | CVE_STATUS[CVE-2024-42298] = "fixed-version: Fixed from version 6.11" | ||
8135 | |||
8136 | CVE_STATUS[CVE-2024-42299] = "fixed-version: Fixed from version 6.11" | ||
8137 | |||
8138 | CVE_STATUS[CVE-2024-42300] = "fixed-version: Fixed from version 6.11" | ||
8139 | |||
8140 | CVE_STATUS[CVE-2024-42301] = "fixed-version: Fixed from version 6.11" | ||
8141 | |||
8142 | CVE_STATUS[CVE-2024-42302] = "fixed-version: Fixed from version 6.11" | ||
8143 | |||
8144 | CVE_STATUS[CVE-2024-42303] = "fixed-version: Fixed from version 6.11" | ||
8145 | |||
8146 | CVE_STATUS[CVE-2024-42304] = "fixed-version: Fixed from version 6.11" | ||
8147 | |||
8148 | CVE_STATUS[CVE-2024-42305] = "fixed-version: Fixed from version 6.11" | ||
8149 | |||
8150 | CVE_STATUS[CVE-2024-42306] = "fixed-version: Fixed from version 6.11" | ||
8151 | |||
8152 | CVE_STATUS[CVE-2024-42307] = "fixed-version: Fixed from version 6.11" | ||
8153 | |||
8154 | CVE_STATUS[CVE-2024-42309] = "fixed-version: Fixed from version 6.11" | ||
8155 | |||
8156 | CVE_STATUS[CVE-2024-42310] = "fixed-version: Fixed from version 6.11" | ||
8157 | |||
8158 | CVE_STATUS[CVE-2024-42311] = "fixed-version: Fixed from version 6.11" | ||
8159 | |||
8160 | CVE_STATUS[CVE-2024-42312] = "fixed-version: Fixed from version 6.11" | ||
8161 | |||
8162 | CVE_STATUS[CVE-2024-42313] = "fixed-version: Fixed from version 6.11" | ||
8163 | |||
8164 | CVE_STATUS[CVE-2024-42314] = "fixed-version: Fixed from version 6.11" | ||
8165 | |||
8166 | CVE_STATUS[CVE-2024-42315] = "fixed-version: Fixed from version 6.11" | ||
8167 | |||
8168 | CVE_STATUS[CVE-2024-42316] = "fixed-version: Fixed from version 6.11" | ||
8169 | |||
8170 | CVE_STATUS[CVE-2024-42317] = "fixed-version: Fixed from version 6.11" | ||
8171 | |||
8172 | CVE_STATUS[CVE-2024-42318] = "fixed-version: Fixed from version 6.11" | ||
8173 | |||
8174 | CVE_STATUS[CVE-2024-42319] = "fixed-version: Fixed from version 6.11" | ||
8175 | |||
8176 | CVE_STATUS[CVE-2024-42320] = "fixed-version: Fixed from version 6.11" | ||
8177 | |||
8178 | CVE_STATUS[CVE-2024-42321] = "fixed-version: Fixed from version 6.11" | ||
8179 | |||
8180 | CVE_STATUS[CVE-2024-42322] = "fixed-version: Fixed from version 6.11" | ||
8181 | |||
8182 | CVE_STATUS[CVE-2024-43098] = "cpe-stable-backport: Backported in 6.12.5" | ||
8183 | |||
8184 | CVE_STATUS[CVE-2024-43815] = "fixed-version: Fixed from version 6.11" | ||
8185 | |||
8186 | CVE_STATUS[CVE-2024-43816] = "fixed-version: Fixed from version 6.11" | ||
8187 | |||
8188 | CVE_STATUS[CVE-2024-43817] = "fixed-version: Fixed from version 6.11" | ||
8189 | |||
8190 | CVE_STATUS[CVE-2024-43818] = "fixed-version: Fixed from version 6.11" | ||
8191 | |||
8192 | CVE_STATUS[CVE-2024-43819] = "fixed-version: Fixed from version 6.11" | ||
8193 | |||
8194 | CVE_STATUS[CVE-2024-43820] = "fixed-version: Fixed from version 6.11" | ||
8195 | |||
8196 | CVE_STATUS[CVE-2024-43821] = "fixed-version: Fixed from version 6.11" | ||
8197 | |||
8198 | CVE_STATUS[CVE-2024-43822] = "fixed-version: Fixed from version 6.11" | ||
8199 | |||
8200 | CVE_STATUS[CVE-2024-43823] = "fixed-version: Fixed from version 6.11" | ||
8201 | |||
8202 | CVE_STATUS[CVE-2024-43824] = "fixed-version: Fixed from version 6.11" | ||
8203 | |||
8204 | CVE_STATUS[CVE-2024-43825] = "fixed-version: Fixed from version 6.11" | ||
8205 | |||
8206 | CVE_STATUS[CVE-2024-43826] = "fixed-version: Fixed from version 6.11" | ||
8207 | |||
8208 | CVE_STATUS[CVE-2024-43827] = "fixed-version: Fixed from version 6.11" | ||
8209 | |||
8210 | CVE_STATUS[CVE-2024-43828] = "fixed-version: Fixed from version 6.11" | ||
8211 | |||
8212 | CVE_STATUS[CVE-2024-43829] = "fixed-version: Fixed from version 6.11" | ||
8213 | |||
8214 | CVE_STATUS[CVE-2024-43830] = "fixed-version: Fixed from version 6.11" | ||
8215 | |||
8216 | CVE_STATUS[CVE-2024-43831] = "fixed-version: Fixed from version 6.11" | ||
8217 | |||
8218 | CVE_STATUS[CVE-2024-43832] = "fixed-version: Fixed from version 6.11" | ||
8219 | |||
8220 | CVE_STATUS[CVE-2024-43833] = "fixed-version: Fixed from version 6.11" | ||
8221 | |||
8222 | CVE_STATUS[CVE-2024-43834] = "fixed-version: Fixed from version 6.11" | ||
8223 | |||
8224 | CVE_STATUS[CVE-2024-43835] = "fixed-version: Fixed from version 6.11" | ||
8225 | |||
8226 | CVE_STATUS[CVE-2024-43836] = "fixed-version: Fixed from version 6.11" | ||
8227 | |||
8228 | CVE_STATUS[CVE-2024-43837] = "fixed-version: Fixed from version 6.11" | ||
8229 | |||
8230 | CVE_STATUS[CVE-2024-43838] = "fixed-version: Fixed from version 6.11" | ||
8231 | |||
8232 | CVE_STATUS[CVE-2024-43839] = "fixed-version: Fixed from version 6.11" | ||
8233 | |||
8234 | CVE_STATUS[CVE-2024-43840] = "fixed-version: Fixed from version 6.11" | ||
8235 | |||
8236 | CVE_STATUS[CVE-2024-43841] = "fixed-version: Fixed from version 6.11" | ||
8237 | |||
8238 | CVE_STATUS[CVE-2024-43842] = "fixed-version: Fixed from version 6.11" | ||
8239 | |||
8240 | CVE_STATUS[CVE-2024-43843] = "fixed-version: Fixed from version 6.11" | ||
8241 | |||
8242 | CVE_STATUS[CVE-2024-43844] = "fixed-version: Fixed from version 6.11" | ||
8243 | |||
8244 | CVE_STATUS[CVE-2024-43845] = "fixed-version: Fixed from version 6.11" | ||
8245 | |||
8246 | CVE_STATUS[CVE-2024-43846] = "fixed-version: Fixed from version 6.11" | ||
8247 | |||
8248 | CVE_STATUS[CVE-2024-43847] = "fixed-version: Fixed from version 6.11" | ||
8249 | |||
8250 | CVE_STATUS[CVE-2024-43848] = "fixed-version: Fixed from version 6.11" | ||
8251 | |||
8252 | CVE_STATUS[CVE-2024-43849] = "fixed-version: Fixed from version 6.11" | ||
8253 | |||
8254 | CVE_STATUS[CVE-2024-43850] = "fixed-version: Fixed from version 6.11" | ||
8255 | |||
8256 | CVE_STATUS[CVE-2024-43851] = "fixed-version: Fixed from version 6.11" | ||
8257 | |||
8258 | CVE_STATUS[CVE-2024-43852] = "fixed-version: Fixed from version 6.11" | ||
8259 | |||
8260 | CVE_STATUS[CVE-2024-43853] = "fixed-version: Fixed from version 6.11" | ||
8261 | |||
8262 | CVE_STATUS[CVE-2024-43854] = "fixed-version: Fixed from version 6.11" | ||
8263 | |||
8264 | CVE_STATUS[CVE-2024-43855] = "fixed-version: Fixed from version 6.11" | ||
8265 | |||
8266 | CVE_STATUS[CVE-2024-43856] = "fixed-version: Fixed from version 6.11" | ||
8267 | |||
8268 | CVE_STATUS[CVE-2024-43857] = "fixed-version: Fixed from version 6.11" | ||
8269 | |||
8270 | CVE_STATUS[CVE-2024-43858] = "fixed-version: Fixed from version 6.11" | ||
8271 | |||
8272 | CVE_STATUS[CVE-2024-43859] = "fixed-version: Fixed from version 6.11" | ||
8273 | |||
8274 | CVE_STATUS[CVE-2024-43860] = "fixed-version: Fixed from version 6.11" | ||
8275 | |||
8276 | CVE_STATUS[CVE-2024-43861] = "fixed-version: Fixed from version 6.11" | ||
8277 | |||
8278 | CVE_STATUS[CVE-2024-43862] = "fixed-version: Fixed from version 6.11" | ||
8279 | |||
8280 | CVE_STATUS[CVE-2024-43863] = "fixed-version: Fixed from version 6.11" | ||
8281 | |||
8282 | CVE_STATUS[CVE-2024-43864] = "fixed-version: Fixed from version 6.11" | ||
8283 | |||
8284 | CVE_STATUS[CVE-2024-43865] = "fixed-version: Fixed from version 6.11" | ||
8285 | |||
8286 | CVE_STATUS[CVE-2024-43866] = "fixed-version: Fixed from version 6.11" | ||
8287 | |||
8288 | CVE_STATUS[CVE-2024-43867] = "fixed-version: Fixed from version 6.11" | ||
8289 | |||
8290 | CVE_STATUS[CVE-2024-43868] = "fixed-version: Fixed from version 6.11" | ||
8291 | |||
8292 | CVE_STATUS[CVE-2024-43869] = "fixed-version: Fixed from version 6.11" | ||
8293 | |||
8294 | CVE_STATUS[CVE-2024-43870] = "fixed-version: Fixed from version 6.11" | ||
8295 | |||
8296 | CVE_STATUS[CVE-2024-43871] = "fixed-version: Fixed from version 6.11" | ||
8297 | |||
8298 | CVE_STATUS[CVE-2024-43872] = "fixed-version: Fixed from version 6.11" | ||
8299 | |||
8300 | CVE_STATUS[CVE-2024-43873] = "fixed-version: Fixed from version 6.11" | ||
8301 | |||
8302 | CVE_STATUS[CVE-2024-43874] = "fixed-version: Fixed from version 6.11" | ||
8303 | |||
8304 | CVE_STATUS[CVE-2024-43875] = "fixed-version: Fixed from version 6.11" | ||
8305 | |||
8306 | CVE_STATUS[CVE-2024-43876] = "fixed-version: Fixed from version 6.11" | ||
8307 | |||
8308 | CVE_STATUS[CVE-2024-43877] = "fixed-version: Fixed from version 6.11" | ||
8309 | |||
8310 | CVE_STATUS[CVE-2024-43878] = "fixed-version: Fixed from version 6.11" | ||
8311 | |||
8312 | CVE_STATUS[CVE-2024-43879] = "fixed-version: Fixed from version 6.11" | ||
8313 | |||
8314 | CVE_STATUS[CVE-2024-43880] = "fixed-version: Fixed from version 6.11" | ||
8315 | |||
8316 | CVE_STATUS[CVE-2024-43881] = "fixed-version: Fixed from version 6.11" | ||
8317 | |||
8318 | CVE_STATUS[CVE-2024-43882] = "fixed-version: Fixed from version 6.11" | ||
8319 | |||
8320 | CVE_STATUS[CVE-2024-43883] = "fixed-version: Fixed from version 6.11" | ||
8321 | |||
8322 | CVE_STATUS[CVE-2024-43884] = "fixed-version: Fixed from version 6.11" | ||
8323 | |||
8324 | CVE_STATUS[CVE-2024-43886] = "fixed-version: Fixed from version 6.11" | ||
8325 | |||
8326 | CVE_STATUS[CVE-2024-43887] = "fixed-version: Fixed from version 6.11" | ||
8327 | |||
8328 | CVE_STATUS[CVE-2024-43888] = "fixed-version: Fixed from version 6.11" | ||
8329 | |||
8330 | CVE_STATUS[CVE-2024-43889] = "fixed-version: Fixed from version 6.11" | ||
8331 | |||
8332 | CVE_STATUS[CVE-2024-43890] = "fixed-version: Fixed from version 6.11" | ||
8333 | |||
8334 | CVE_STATUS[CVE-2024-43891] = "fixed-version: Fixed from version 6.11" | ||
8335 | |||
8336 | CVE_STATUS[CVE-2024-43892] = "fixed-version: Fixed from version 6.11" | ||
8337 | |||
8338 | CVE_STATUS[CVE-2024-43893] = "fixed-version: Fixed from version 6.11" | ||
8339 | |||
8340 | CVE_STATUS[CVE-2024-43894] = "fixed-version: Fixed from version 6.11" | ||
8341 | |||
8342 | CVE_STATUS[CVE-2024-43895] = "fixed-version: Fixed from version 6.11" | ||
8343 | |||
8344 | CVE_STATUS[CVE-2024-43896] = "fixed-version: Fixed from version 6.11" | ||
8345 | |||
8346 | CVE_STATUS[CVE-2024-43897] = "fixed-version: Fixed from version 6.10.5" | ||
8347 | |||
8348 | CVE_STATUS[CVE-2024-43899] = "fixed-version: Fixed from version 6.11" | ||
8349 | |||
8350 | CVE_STATUS[CVE-2024-43900] = "fixed-version: Fixed from version 6.11" | ||
8351 | |||
8352 | CVE_STATUS[CVE-2024-43901] = "fixed-version: Fixed from version 6.11" | ||
8353 | |||
8354 | CVE_STATUS[CVE-2024-43902] = "fixed-version: Fixed from version 6.11" | ||
8355 | |||
8356 | CVE_STATUS[CVE-2024-43904] = "fixed-version: Fixed from version 6.11" | ||
8357 | |||
8358 | CVE_STATUS[CVE-2024-43905] = "fixed-version: Fixed from version 6.11" | ||
8359 | |||
8360 | CVE_STATUS[CVE-2024-43906] = "fixed-version: Fixed from version 6.11" | ||
8361 | |||
8362 | CVE_STATUS[CVE-2024-43907] = "fixed-version: Fixed from version 6.11" | ||
8363 | |||
8364 | CVE_STATUS[CVE-2024-43908] = "fixed-version: Fixed from version 6.11" | ||
8365 | |||
8366 | CVE_STATUS[CVE-2024-43909] = "fixed-version: Fixed from version 6.11" | ||
8367 | |||
8368 | CVE_STATUS[CVE-2024-43910] = "fixed-version: Fixed from version 6.11" | ||
8369 | |||
8370 | CVE_STATUS[CVE-2024-43911] = "fixed-version: Fixed from version 6.11" | ||
8371 | |||
8372 | CVE_STATUS[CVE-2024-43912] = "fixed-version: Fixed from version 6.11" | ||
8373 | |||
8374 | CVE_STATUS[CVE-2024-43913] = "fixed-version: Fixed from version 6.11" | ||
8375 | |||
8376 | CVE_STATUS[CVE-2024-43914] = "fixed-version: Fixed from version 6.11" | ||
8377 | |||
8378 | CVE_STATUS[CVE-2024-44931] = "fixed-version: Fixed from version 6.11" | ||
8379 | |||
8380 | CVE_STATUS[CVE-2024-44932] = "fixed-version: Fixed from version 6.11" | ||
8381 | |||
8382 | CVE_STATUS[CVE-2024-44933] = "fixed-version: Fixed from version 6.10.5" | ||
8383 | |||
8384 | CVE_STATUS[CVE-2024-44934] = "fixed-version: Fixed from version 6.11" | ||
8385 | |||
8386 | CVE_STATUS[CVE-2024-44935] = "fixed-version: Fixed from version 6.11" | ||
8387 | |||
8388 | CVE_STATUS[CVE-2024-44936] = "fixed-version: Fixed from version 6.11" | ||
8389 | |||
8390 | CVE_STATUS[CVE-2024-44937] = "fixed-version: Fixed from version 6.11" | ||
8391 | |||
8392 | CVE_STATUS[CVE-2024-44938] = "fixed-version: Fixed from version 6.11" | ||
8393 | |||
8394 | CVE_STATUS[CVE-2024-44939] = "fixed-version: Fixed from version 6.11" | ||
8395 | |||
8396 | CVE_STATUS[CVE-2024-44940] = "fixed-version: Fixed from version 6.11" | ||
8397 | |||
8398 | CVE_STATUS[CVE-2024-44941] = "fixed-version: Fixed from version 6.11" | ||
8399 | |||
8400 | CVE_STATUS[CVE-2024-44942] = "fixed-version: Fixed from version 6.11" | ||
8401 | |||
8402 | CVE_STATUS[CVE-2024-44943] = "fixed-version: Fixed from version 6.10" | ||
8403 | |||
8404 | CVE_STATUS[CVE-2024-44944] = "fixed-version: Fixed from version 6.11" | ||
8405 | |||
8406 | CVE_STATUS[CVE-2024-44945] = "fixed-version: Fixed from version 6.11" | ||
8407 | |||
8408 | CVE_STATUS[CVE-2024-44946] = "fixed-version: Fixed from version 6.11" | ||
8409 | |||
8410 | CVE_STATUS[CVE-2024-44947] = "fixed-version: Fixed from version 6.11" | ||
8411 | |||
8412 | CVE_STATUS[CVE-2024-44948] = "fixed-version: Fixed from version 6.11" | ||
8413 | |||
8414 | CVE_STATUS[CVE-2024-44949] = "fixed-version: Fixed from version 6.11" | ||
8415 | |||
8416 | CVE_STATUS[CVE-2024-44950] = "fixed-version: Fixed from version 6.11" | ||
8417 | |||
8418 | CVE_STATUS[CVE-2024-44951] = "fixed-version: Fixed from version 6.11" | ||
8419 | |||
8420 | CVE_STATUS[CVE-2024-44953] = "fixed-version: Fixed from version 6.11" | ||
8421 | |||
8422 | CVE_STATUS[CVE-2024-44954] = "fixed-version: Fixed from version 6.11" | ||
8423 | |||
8424 | CVE_STATUS[CVE-2024-44955] = "fixed-version: Fixed from version 6.11" | ||
8425 | |||
8426 | CVE_STATUS[CVE-2024-44956] = "fixed-version: Fixed from version 6.11" | ||
8427 | |||
8428 | CVE_STATUS[CVE-2024-44957] = "fixed-version: Fixed from version 6.11" | ||
8429 | |||
8430 | CVE_STATUS[CVE-2024-44958] = "fixed-version: Fixed from version 6.11" | ||
8431 | |||
8432 | CVE_STATUS[CVE-2024-44959] = "fixed-version: Fixed from version 6.11" | ||
8433 | |||
8434 | CVE_STATUS[CVE-2024-44960] = "fixed-version: Fixed from version 6.11" | ||
8435 | |||
8436 | CVE_STATUS[CVE-2024-44961] = "fixed-version: Fixed from version 6.11" | ||
8437 | |||
8438 | CVE_STATUS[CVE-2024-44962] = "fixed-version: Fixed from version 6.11" | ||
8439 | |||
8440 | CVE_STATUS[CVE-2024-44963] = "fixed-version: Fixed from version 6.11" | ||
8441 | |||
8442 | CVE_STATUS[CVE-2024-44964] = "fixed-version: Fixed from version 6.11" | ||
8443 | |||
8444 | CVE_STATUS[CVE-2024-44965] = "fixed-version: Fixed from version 6.11" | ||
8445 | |||
8446 | CVE_STATUS[CVE-2024-44966] = "fixed-version: Fixed from version 6.11" | ||
8447 | |||
8448 | CVE_STATUS[CVE-2024-44967] = "fixed-version: Fixed from version 6.11" | ||
8449 | |||
8450 | CVE_STATUS[CVE-2024-44968] = "fixed-version: Fixed from version 6.10.5" | ||
8451 | |||
8452 | CVE_STATUS[CVE-2024-44969] = "fixed-version: Fixed from version 6.11" | ||
8453 | |||
8454 | CVE_STATUS[CVE-2024-44970] = "fixed-version: Fixed from version 6.11" | ||
8455 | |||
8456 | CVE_STATUS[CVE-2024-44971] = "fixed-version: Fixed from version 6.11" | ||
8457 | |||
8458 | CVE_STATUS[CVE-2024-44972] = "fixed-version: Fixed from version 6.11" | ||
8459 | |||
8460 | CVE_STATUS[CVE-2024-44973] = "fixed-version: Fixed from version 6.11" | ||
8461 | |||
8462 | CVE_STATUS[CVE-2024-44974] = "fixed-version: Fixed from version 6.11" | ||
8463 | |||
8464 | CVE_STATUS[CVE-2024-44975] = "fixed-version: Fixed from version 6.11" | ||
8465 | |||
8466 | CVE_STATUS[CVE-2024-44976] = "fixed-version: Fixed from version 6.11" | ||
8467 | |||
8468 | CVE_STATUS[CVE-2024-44977] = "fixed-version: Fixed from version 6.11" | ||
8469 | |||
8470 | CVE_STATUS[CVE-2024-44978] = "fixed-version: Fixed from version 6.11" | ||
8471 | |||
8472 | CVE_STATUS[CVE-2024-44979] = "fixed-version: Fixed from version 6.11" | ||
8473 | |||
8474 | CVE_STATUS[CVE-2024-44980] = "fixed-version: Fixed from version 6.11" | ||
8475 | |||
8476 | CVE_STATUS[CVE-2024-44981] = "fixed-version: Fixed from version 6.11" | ||
8477 | |||
8478 | CVE_STATUS[CVE-2024-44982] = "fixed-version: Fixed from version 6.11" | ||
8479 | |||
8480 | CVE_STATUS[CVE-2024-44983] = "fixed-version: Fixed from version 6.11" | ||
8481 | |||
8482 | CVE_STATUS[CVE-2024-44984] = "fixed-version: Fixed from version 6.11" | ||
8483 | |||
8484 | CVE_STATUS[CVE-2024-44985] = "fixed-version: Fixed from version 6.11" | ||
8485 | |||
8486 | CVE_STATUS[CVE-2024-44986] = "fixed-version: Fixed from version 6.11" | ||
8487 | |||
8488 | CVE_STATUS[CVE-2024-44987] = "fixed-version: Fixed from version 6.11" | ||
8489 | |||
8490 | CVE_STATUS[CVE-2024-44988] = "fixed-version: Fixed from version 6.11" | ||
8491 | |||
8492 | CVE_STATUS[CVE-2024-44989] = "fixed-version: Fixed from version 6.11" | ||
8493 | |||
8494 | CVE_STATUS[CVE-2024-44990] = "fixed-version: Fixed from version 6.11" | ||
8495 | |||
8496 | CVE_STATUS[CVE-2024-44991] = "fixed-version: Fixed from version 6.11" | ||
8497 | |||
8498 | CVE_STATUS[CVE-2024-44992] = "fixed-version: Fixed from version 6.11" | ||
8499 | |||
8500 | CVE_STATUS[CVE-2024-44993] = "fixed-version: Fixed from version 6.11" | ||
8501 | |||
8502 | CVE_STATUS[CVE-2024-44994] = "fixed-version: Fixed from version 6.11" | ||
8503 | |||
8504 | CVE_STATUS[CVE-2024-44995] = "fixed-version: Fixed from version 6.11" | ||
8505 | |||
8506 | CVE_STATUS[CVE-2024-44996] = "fixed-version: Fixed from version 6.11" | ||
8507 | |||
8508 | CVE_STATUS[CVE-2024-44997] = "fixed-version: Fixed from version 6.11" | ||
8509 | |||
8510 | CVE_STATUS[CVE-2024-44998] = "fixed-version: Fixed from version 6.11" | ||
8511 | |||
8512 | CVE_STATUS[CVE-2024-44999] = "fixed-version: Fixed from version 6.11" | ||
8513 | |||
8514 | CVE_STATUS[CVE-2024-45000] = "fixed-version: Fixed from version 6.11" | ||
8515 | |||
8516 | CVE_STATUS[CVE-2024-45001] = "fixed-version: Fixed from version 6.11" | ||
8517 | |||
8518 | CVE_STATUS[CVE-2024-45002] = "fixed-version: Fixed from version 6.11" | ||
8519 | |||
8520 | CVE_STATUS[CVE-2024-45003] = "fixed-version: Fixed from version 6.11" | ||
8521 | |||
8522 | CVE_STATUS[CVE-2024-45004] = "fixed-version: Fixed from version 6.11" | ||
8523 | |||
8524 | CVE_STATUS[CVE-2024-45005] = "fixed-version: Fixed from version 6.11" | ||
8525 | |||
8526 | CVE_STATUS[CVE-2024-45006] = "fixed-version: Fixed from version 6.11" | ||
8527 | |||
8528 | CVE_STATUS[CVE-2024-45007] = "fixed-version: Fixed from version 6.11" | ||
8529 | |||
8530 | CVE_STATUS[CVE-2024-45008] = "fixed-version: Fixed from version 6.11" | ||
8531 | |||
8532 | CVE_STATUS[CVE-2024-45009] = "fixed-version: Fixed from version 6.11" | ||
8533 | |||
8534 | CVE_STATUS[CVE-2024-45010] = "fixed-version: Fixed from version 6.11" | ||
8535 | |||
8536 | CVE_STATUS[CVE-2024-45011] = "fixed-version: Fixed from version 6.11" | ||
8537 | |||
8538 | CVE_STATUS[CVE-2024-45012] = "fixed-version: Fixed from version 6.11" | ||
8539 | |||
8540 | CVE_STATUS[CVE-2024-45013] = "fixed-version: Fixed from version 6.11" | ||
8541 | |||
8542 | CVE_STATUS[CVE-2024-45014] = "fixed-version: Fixed from version 6.11" | ||
8543 | |||
8544 | CVE_STATUS[CVE-2024-45015] = "fixed-version: Fixed from version 6.11" | ||
8545 | |||
8546 | CVE_STATUS[CVE-2024-45016] = "fixed-version: Fixed from version 6.11" | ||
8547 | |||
8548 | CVE_STATUS[CVE-2024-45017] = "fixed-version: Fixed from version 6.11" | ||
8549 | |||
8550 | CVE_STATUS[CVE-2024-45018] = "fixed-version: Fixed from version 6.11" | ||
8551 | |||
8552 | CVE_STATUS[CVE-2024-45019] = "fixed-version: Fixed from version 6.11" | ||
8553 | |||
8554 | CVE_STATUS[CVE-2024-45020] = "fixed-version: Fixed from version 6.11" | ||
8555 | |||
8556 | CVE_STATUS[CVE-2024-45021] = "fixed-version: Fixed from version 6.11" | ||
8557 | |||
8558 | CVE_STATUS[CVE-2024-45022] = "fixed-version: Fixed from version 6.11" | ||
8559 | |||
8560 | CVE_STATUS[CVE-2024-45023] = "fixed-version: Fixed from version 6.11" | ||
8561 | |||
8562 | CVE_STATUS[CVE-2024-45024] = "fixed-version: Fixed from version 6.11" | ||
8563 | |||
8564 | CVE_STATUS[CVE-2024-45025] = "fixed-version: Fixed from version 6.11" | ||
8565 | |||
8566 | CVE_STATUS[CVE-2024-45026] = "fixed-version: Fixed from version 6.11" | ||
8567 | |||
8568 | CVE_STATUS[CVE-2024-45027] = "fixed-version: Fixed from version 6.11" | ||
8569 | |||
8570 | CVE_STATUS[CVE-2024-45028] = "fixed-version: Fixed from version 6.11" | ||
8571 | |||
8572 | CVE_STATUS[CVE-2024-45029] = "fixed-version: Fixed from version 6.11" | ||
8573 | |||
8574 | CVE_STATUS[CVE-2024-45030] = "fixed-version: Fixed from version 6.11" | ||
8575 | |||
8576 | CVE_STATUS[CVE-2024-45828] = "cpe-stable-backport: Backported in 6.12.5" | ||
8577 | |||
8578 | CVE_STATUS[CVE-2024-46672] = "fixed-version: Fixed from version 6.11" | ||
8579 | |||
8580 | CVE_STATUS[CVE-2024-46673] = "fixed-version: Fixed from version 6.11" | ||
8581 | |||
8582 | CVE_STATUS[CVE-2024-46674] = "fixed-version: Fixed from version 6.11" | ||
8583 | |||
8584 | CVE_STATUS[CVE-2024-46675] = "fixed-version: Fixed from version 6.11" | ||
8585 | |||
8586 | CVE_STATUS[CVE-2024-46676] = "fixed-version: Fixed from version 6.11" | ||
8587 | |||
8588 | CVE_STATUS[CVE-2024-46677] = "fixed-version: Fixed from version 6.11" | ||
8589 | |||
8590 | CVE_STATUS[CVE-2024-46678] = "fixed-version: Fixed from version 6.11" | ||
8591 | |||
8592 | CVE_STATUS[CVE-2024-46679] = "fixed-version: Fixed from version 6.11" | ||
8593 | |||
8594 | CVE_STATUS[CVE-2024-46680] = "fixed-version: Fixed from version 6.11" | ||
8595 | |||
8596 | CVE_STATUS[CVE-2024-46681] = "fixed-version: Fixed from version 6.11" | ||
8597 | |||
8598 | CVE_STATUS[CVE-2024-46682] = "fixed-version: Fixed from version 6.11" | ||
8599 | |||
8600 | CVE_STATUS[CVE-2024-46683] = "fixed-version: Fixed from version 6.11" | ||
8601 | |||
8602 | CVE_STATUS[CVE-2024-46684] = "fixed-version: Fixed from version 6.11" | ||
8603 | |||
8604 | CVE_STATUS[CVE-2024-46685] = "fixed-version: Fixed from version 6.11" | ||
8605 | |||
8606 | CVE_STATUS[CVE-2024-46686] = "fixed-version: Fixed from version 6.11" | ||
8607 | |||
8608 | CVE_STATUS[CVE-2024-46687] = "fixed-version: Fixed from version 6.11" | ||
8609 | |||
8610 | CVE_STATUS[CVE-2024-46688] = "fixed-version: Fixed from version 6.11" | ||
8611 | |||
8612 | CVE_STATUS[CVE-2024-46689] = "fixed-version: Fixed from version 6.11" | ||
8613 | |||
8614 | CVE_STATUS[CVE-2024-46690] = "fixed-version: Fixed from version 6.11" | ||
8615 | |||
8616 | CVE_STATUS[CVE-2024-46691] = "fixed-version: Fixed from version 6.11" | ||
8617 | |||
8618 | CVE_STATUS[CVE-2024-46692] = "fixed-version: Fixed from version 6.11" | ||
8619 | |||
8620 | CVE_STATUS[CVE-2024-46693] = "fixed-version: Fixed from version 6.11" | ||
8621 | |||
8622 | CVE_STATUS[CVE-2024-46694] = "fixed-version: Fixed from version 6.11" | ||
8623 | |||
8624 | CVE_STATUS[CVE-2024-46695] = "fixed-version: Fixed from version 6.11" | ||
8625 | |||
8626 | CVE_STATUS[CVE-2024-46696] = "fixed-version: Fixed from version 6.11" | ||
8627 | |||
8628 | CVE_STATUS[CVE-2024-46697] = "fixed-version: Fixed from version 6.11" | ||
8629 | |||
8630 | CVE_STATUS[CVE-2024-46698] = "fixed-version: Fixed from version 6.11" | ||
8631 | |||
8632 | CVE_STATUS[CVE-2024-46699] = "fixed-version: Fixed from version 6.11" | ||
8633 | |||
8634 | # CVE-2024-46700 has no known resolution | ||
8635 | |||
8636 | CVE_STATUS[CVE-2024-46701] = "fixed-version: Fixed from version 6.11" | ||
8637 | |||
8638 | CVE_STATUS[CVE-2024-46702] = "fixed-version: Fixed from version 6.11" | ||
8639 | |||
8640 | CVE_STATUS[CVE-2024-46703] = "fixed-version: Fixed from version 6.11" | ||
8641 | |||
8642 | CVE_STATUS[CVE-2024-46704] = "fixed-version: Fixed from version 6.11" | ||
8643 | |||
8644 | CVE_STATUS[CVE-2024-46705] = "fixed-version: Fixed from version 6.11" | ||
8645 | |||
8646 | CVE_STATUS[CVE-2024-46706] = "fixed-version: Fixed from version 6.11" | ||
8647 | |||
8648 | CVE_STATUS[CVE-2024-46707] = "fixed-version: Fixed from version 6.11" | ||
8649 | |||
8650 | CVE_STATUS[CVE-2024-46708] = "fixed-version: Fixed from version 6.11" | ||
8651 | |||
8652 | CVE_STATUS[CVE-2024-46709] = "fixed-version: Fixed from version 6.11" | ||
8653 | |||
8654 | CVE_STATUS[CVE-2024-46710] = "fixed-version: Fixed from version 6.11" | ||
8655 | |||
8656 | CVE_STATUS[CVE-2024-46711] = "fixed-version: Fixed from version 6.11" | ||
8657 | |||
8658 | CVE_STATUS[CVE-2024-46712] = "fixed-version: Fixed from version 6.10.8" | ||
8659 | |||
8660 | CVE_STATUS[CVE-2024-46713] = "fixed-version: Fixed from version 6.11" | ||
8661 | |||
8662 | CVE_STATUS[CVE-2024-46714] = "fixed-version: Fixed from version 6.11" | ||
8663 | |||
8664 | CVE_STATUS[CVE-2024-46715] = "fixed-version: Fixed from version 6.11" | ||
8665 | |||
8666 | CVE_STATUS[CVE-2024-46716] = "fixed-version: Fixed from version 6.11" | ||
8667 | |||
8668 | CVE_STATUS[CVE-2024-46717] = "fixed-version: Fixed from version 6.11" | ||
8669 | |||
8670 | CVE_STATUS[CVE-2024-46718] = "fixed-version: Fixed from version 6.11" | ||
8671 | |||
8672 | CVE_STATUS[CVE-2024-46719] = "fixed-version: Fixed from version 6.11" | ||
8673 | |||
8674 | CVE_STATUS[CVE-2024-46720] = "fixed-version: Fixed from version 6.11" | ||
8675 | |||
8676 | CVE_STATUS[CVE-2024-46721] = "fixed-version: Fixed from version 6.11" | ||
8677 | |||
8678 | CVE_STATUS[CVE-2024-46722] = "fixed-version: Fixed from version 6.11" | ||
8679 | |||
8680 | CVE_STATUS[CVE-2024-46723] = "fixed-version: Fixed from version 6.11" | ||
8681 | |||
8682 | CVE_STATUS[CVE-2024-46724] = "fixed-version: Fixed from version 6.11" | ||
8683 | |||
8684 | CVE_STATUS[CVE-2024-46725] = "fixed-version: Fixed from version 6.11" | ||
8685 | |||
8686 | CVE_STATUS[CVE-2024-46726] = "fixed-version: Fixed from version 6.11" | ||
8687 | |||
8688 | CVE_STATUS[CVE-2024-46727] = "fixed-version: Fixed from version 6.11" | ||
8689 | |||
8690 | CVE_STATUS[CVE-2024-46728] = "fixed-version: Fixed from version 6.11" | ||
8691 | |||
8692 | CVE_STATUS[CVE-2024-46729] = "fixed-version: Fixed from version 6.11" | ||
8693 | |||
8694 | CVE_STATUS[CVE-2024-46730] = "fixed-version: Fixed from version 6.11" | ||
8695 | |||
8696 | CVE_STATUS[CVE-2024-46731] = "fixed-version: Fixed from version 6.11" | ||
8697 | |||
8698 | CVE_STATUS[CVE-2024-46732] = "fixed-version: Fixed from version 6.11" | ||
8699 | |||
8700 | CVE_STATUS[CVE-2024-46733] = "fixed-version: Fixed from version 6.11" | ||
8701 | |||
8702 | CVE_STATUS[CVE-2024-46734] = "fixed-version: Fixed from version 6.10.10" | ||
8703 | |||
8704 | CVE_STATUS[CVE-2024-46735] = "fixed-version: Fixed from version 6.11" | ||
8705 | |||
8706 | CVE_STATUS[CVE-2024-46736] = "fixed-version: Fixed from version 6.11" | ||
8707 | |||
8708 | CVE_STATUS[CVE-2024-46737] = "fixed-version: Fixed from version 6.11" | ||
8709 | |||
8710 | CVE_STATUS[CVE-2024-46738] = "fixed-version: Fixed from version 6.11" | ||
8711 | |||
8712 | CVE_STATUS[CVE-2024-46739] = "fixed-version: Fixed from version 6.11" | ||
8713 | |||
8714 | CVE_STATUS[CVE-2024-46740] = "fixed-version: Fixed from version 6.11" | ||
8715 | |||
8716 | CVE_STATUS[CVE-2024-46741] = "fixed-version: Fixed from version 6.11" | ||
8717 | |||
8718 | CVE_STATUS[CVE-2024-46742] = "fixed-version: Fixed from version 6.11" | ||
8719 | |||
8720 | CVE_STATUS[CVE-2024-46743] = "fixed-version: Fixed from version 6.11" | ||
8721 | |||
8722 | CVE_STATUS[CVE-2024-46744] = "fixed-version: Fixed from version 6.11" | ||
8723 | |||
8724 | CVE_STATUS[CVE-2024-46745] = "fixed-version: Fixed from version 6.11" | ||
8725 | |||
8726 | CVE_STATUS[CVE-2024-46746] = "fixed-version: Fixed from version 6.11" | ||
8727 | |||
8728 | CVE_STATUS[CVE-2024-46747] = "fixed-version: Fixed from version 6.11" | ||
8729 | |||
8730 | CVE_STATUS[CVE-2024-46748] = "fixed-version: Fixed from version 6.11" | ||
8731 | |||
8732 | CVE_STATUS[CVE-2024-46749] = "fixed-version: Fixed from version 6.11" | ||
8733 | |||
8734 | CVE_STATUS[CVE-2024-46750] = "fixed-version: Fixed from version 6.11" | ||
8735 | |||
8736 | CVE_STATUS[CVE-2024-46751] = "fixed-version: Fixed from version 6.11" | ||
8737 | |||
8738 | CVE_STATUS[CVE-2024-46752] = "fixed-version: Fixed from version 6.11" | ||
8739 | |||
8740 | CVE_STATUS[CVE-2024-46753] = "fixed-version: Fixed from version 6.11" | ||
8741 | |||
8742 | CVE_STATUS[CVE-2024-46754] = "fixed-version: Fixed from version 6.11" | ||
8743 | |||
8744 | CVE_STATUS[CVE-2024-46755] = "fixed-version: Fixed from version 6.11" | ||
8745 | |||
8746 | CVE_STATUS[CVE-2024-46759] = "fixed-version: Fixed from version 6.11" | ||
8747 | |||
8748 | CVE_STATUS[CVE-2024-46760] = "fixed-version: Fixed from version 6.11" | ||
8749 | |||
8750 | CVE_STATUS[CVE-2024-46761] = "fixed-version: Fixed from version 6.11" | ||
8751 | |||
8752 | CVE_STATUS[CVE-2024-46762] = "fixed-version: Fixed from version 6.11" | ||
8753 | |||
8754 | CVE_STATUS[CVE-2024-46763] = "fixed-version: Fixed from version 6.11" | ||
8755 | |||
8756 | CVE_STATUS[CVE-2024-46764] = "fixed-version: Fixed from version 6.11" | ||
8757 | |||
8758 | CVE_STATUS[CVE-2024-46765] = "fixed-version: Fixed from version 6.11" | ||
8759 | |||
8760 | CVE_STATUS[CVE-2024-46766] = "fixed-version: Fixed from version 6.11" | ||
8761 | |||
8762 | CVE_STATUS[CVE-2024-46767] = "fixed-version: Fixed from version 6.11" | ||
8763 | |||
8764 | CVE_STATUS[CVE-2024-46768] = "fixed-version: Fixed from version 6.11" | ||
8765 | |||
8766 | CVE_STATUS[CVE-2024-46769] = "fixed-version: Fixed from version 6.11" | ||
8767 | |||
8768 | CVE_STATUS[CVE-2024-46770] = "fixed-version: Fixed from version 6.11" | ||
8769 | |||
8770 | CVE_STATUS[CVE-2024-46771] = "fixed-version: Fixed from version 6.11" | ||
8771 | |||
8772 | CVE_STATUS[CVE-2024-46772] = "fixed-version: Fixed from version 6.11" | ||
8773 | |||
8774 | CVE_STATUS[CVE-2024-46773] = "fixed-version: Fixed from version 6.11" | ||
8775 | |||
8776 | CVE_STATUS[CVE-2024-46774] = "fixed-version: Fixed from version 6.11" | ||
8777 | |||
8778 | CVE_STATUS[CVE-2024-46775] = "fixed-version: Fixed from version 6.11" | ||
8779 | |||
8780 | CVE_STATUS[CVE-2024-46776] = "fixed-version: Fixed from version 6.11" | ||
8781 | |||
8782 | CVE_STATUS[CVE-2024-46777] = "fixed-version: Fixed from version 6.11" | ||
8783 | |||
8784 | CVE_STATUS[CVE-2024-46778] = "fixed-version: Fixed from version 6.11" | ||
8785 | |||
8786 | CVE_STATUS[CVE-2024-46779] = "fixed-version: Fixed from version 6.11" | ||
8787 | |||
8788 | CVE_STATUS[CVE-2024-46780] = "fixed-version: Fixed from version 6.11" | ||
8789 | |||
8790 | CVE_STATUS[CVE-2024-46781] = "fixed-version: Fixed from version 6.11" | ||
8791 | |||
8792 | CVE_STATUS[CVE-2024-46782] = "fixed-version: Fixed from version 6.11" | ||
8793 | |||
8794 | CVE_STATUS[CVE-2024-46783] = "fixed-version: Fixed from version 6.11" | ||
8795 | |||
8796 | CVE_STATUS[CVE-2024-46784] = "fixed-version: Fixed from version 6.11" | ||
8797 | |||
8798 | CVE_STATUS[CVE-2024-46785] = "fixed-version: Fixed from version 6.11" | ||
8799 | |||
8800 | CVE_STATUS[CVE-2024-46786] = "fixed-version: Fixed from version 6.11" | ||
8801 | |||
8802 | CVE_STATUS[CVE-2024-46787] = "fixed-version: Fixed from version 6.11" | ||
8803 | |||
8804 | CVE_STATUS[CVE-2024-46788] = "fixed-version: Fixed from version 6.11" | ||
8805 | |||
8806 | CVE_STATUS[CVE-2024-46789] = "fixed-version: Fixed from version 6.11" | ||
8807 | |||
8808 | CVE_STATUS[CVE-2024-46790] = "fixed-version: Fixed from version 6.11" | ||
8809 | |||
8810 | CVE_STATUS[CVE-2024-46791] = "fixed-version: Fixed from version 6.11" | ||
8811 | |||
8812 | CVE_STATUS[CVE-2024-46792] = "fixed-version: Fixed from version 6.11" | ||
8813 | |||
8814 | CVE_STATUS[CVE-2024-46793] = "fixed-version: Fixed from version 6.11" | ||
8815 | |||
8816 | CVE_STATUS[CVE-2024-46794] = "fixed-version: Fixed from version 6.11" | ||
8817 | |||
8818 | CVE_STATUS[CVE-2024-46795] = "fixed-version: Fixed from version 6.11" | ||
8819 | |||
8820 | CVE_STATUS[CVE-2024-46796] = "fixed-version: Fixed from version 6.11" | ||
8821 | |||
8822 | CVE_STATUS[CVE-2024-46797] = "fixed-version: Fixed from version 6.11" | ||
8823 | |||
8824 | CVE_STATUS[CVE-2024-46798] = "fixed-version: Fixed from version 6.11" | ||
8825 | |||
8826 | CVE_STATUS[CVE-2024-46799] = "fixed-version: Fixed from version 6.11" | ||
8827 | |||
8828 | CVE_STATUS[CVE-2024-46800] = "fixed-version: Fixed from version 6.11" | ||
8829 | |||
8830 | CVE_STATUS[CVE-2024-46801] = "fixed-version: Fixed from version 6.11" | ||
8831 | |||
8832 | CVE_STATUS[CVE-2024-46802] = "fixed-version: Fixed from version 6.11" | ||
8833 | |||
8834 | CVE_STATUS[CVE-2024-46803] = "fixed-version: Fixed from version 6.11" | ||
8835 | |||
8836 | CVE_STATUS[CVE-2024-46804] = "fixed-version: Fixed from version 6.11" | ||
8837 | |||
8838 | CVE_STATUS[CVE-2024-46805] = "fixed-version: Fixed from version 6.11" | ||
8839 | |||
8840 | CVE_STATUS[CVE-2024-46806] = "fixed-version: Fixed from version 6.11" | ||
8841 | |||
8842 | CVE_STATUS[CVE-2024-46807] = "fixed-version: Fixed from version 6.11" | ||
8843 | |||
8844 | CVE_STATUS[CVE-2024-46808] = "fixed-version: Fixed from version 6.11" | ||
8845 | |||
8846 | CVE_STATUS[CVE-2024-46809] = "fixed-version: Fixed from version 6.11" | ||
8847 | |||
8848 | CVE_STATUS[CVE-2024-46810] = "fixed-version: Fixed from version 6.11" | ||
8849 | |||
8850 | CVE_STATUS[CVE-2024-46811] = "fixed-version: Fixed from version 6.11" | ||
8851 | |||
8852 | CVE_STATUS[CVE-2024-46812] = "fixed-version: Fixed from version 6.11" | ||
8853 | |||
8854 | CVE_STATUS[CVE-2024-46813] = "fixed-version: Fixed from version 6.11" | ||
8855 | |||
8856 | CVE_STATUS[CVE-2024-46814] = "fixed-version: Fixed from version 6.11" | ||
8857 | |||
8858 | CVE_STATUS[CVE-2024-46815] = "fixed-version: Fixed from version 6.11" | ||
8859 | |||
8860 | CVE_STATUS[CVE-2024-46816] = "fixed-version: Fixed from version 6.11" | ||
8861 | |||
8862 | CVE_STATUS[CVE-2024-46817] = "fixed-version: Fixed from version 6.11" | ||
8863 | |||
8864 | CVE_STATUS[CVE-2024-46818] = "fixed-version: Fixed from version 6.11" | ||
8865 | |||
8866 | CVE_STATUS[CVE-2024-46819] = "fixed-version: Fixed from version 6.11" | ||
8867 | |||
8868 | CVE_STATUS[CVE-2024-46820] = "fixed-version: Fixed from version 6.11" | ||
8869 | |||
8870 | CVE_STATUS[CVE-2024-46821] = "fixed-version: Fixed from version 6.11" | ||
8871 | |||
8872 | CVE_STATUS[CVE-2024-46822] = "fixed-version: Fixed from version 6.11" | ||
8873 | |||
8874 | CVE_STATUS[CVE-2024-46823] = "fixed-version: Fixed from version 6.11" | ||
8875 | |||
8876 | CVE_STATUS[CVE-2024-46824] = "fixed-version: Fixed from version 6.11" | ||
8877 | |||
8878 | CVE_STATUS[CVE-2024-46825] = "fixed-version: Fixed from version 6.11" | ||
8879 | |||
8880 | CVE_STATUS[CVE-2024-46826] = "fixed-version: Fixed from version 6.11" | ||
8881 | |||
8882 | CVE_STATUS[CVE-2024-46827] = "fixed-version: Fixed from version 6.11" | ||
8883 | |||
8884 | CVE_STATUS[CVE-2024-46828] = "fixed-version: Fixed from version 6.11" | ||
8885 | |||
8886 | CVE_STATUS[CVE-2024-46829] = "fixed-version: Fixed from version 6.11" | ||
8887 | |||
8888 | CVE_STATUS[CVE-2024-46830] = "fixed-version: Fixed from version 6.11" | ||
8889 | |||
8890 | CVE_STATUS[CVE-2024-46831] = "fixed-version: Fixed from version 6.11" | ||
8891 | |||
8892 | CVE_STATUS[CVE-2024-46832] = "fixed-version: Fixed from version 6.11" | ||
8893 | |||
8894 | CVE_STATUS[CVE-2024-46833] = "fixed-version: Fixed from version 6.11" | ||
8895 | |||
8896 | CVE_STATUS[CVE-2024-46834] = "fixed-version: Fixed from version 6.11" | ||
8897 | |||
8898 | CVE_STATUS[CVE-2024-46835] = "fixed-version: Fixed from version 6.11" | ||
8899 | |||
8900 | CVE_STATUS[CVE-2024-46836] = "fixed-version: Fixed from version 6.11" | ||
8901 | |||
8902 | CVE_STATUS[CVE-2024-46837] = "fixed-version: Fixed from version 6.11" | ||
8903 | |||
8904 | CVE_STATUS[CVE-2024-46838] = "fixed-version: Fixed from version 6.11" | ||
8905 | |||
8906 | CVE_STATUS[CVE-2024-46840] = "fixed-version: Fixed from version 6.11" | ||
8907 | |||
8908 | CVE_STATUS[CVE-2024-46841] = "fixed-version: Fixed from version 6.11" | ||
8909 | |||
8910 | CVE_STATUS[CVE-2024-46842] = "fixed-version: Fixed from version 6.11" | ||
8911 | |||
8912 | CVE_STATUS[CVE-2024-46843] = "fixed-version: Fixed from version 6.11" | ||
8913 | |||
8914 | CVE_STATUS[CVE-2024-46844] = "fixed-version: Fixed from version 6.11" | ||
8915 | |||
8916 | CVE_STATUS[CVE-2024-46845] = "fixed-version: Fixed from version 6.11" | ||
8917 | |||
8918 | CVE_STATUS[CVE-2024-46846] = "fixed-version: Fixed from version 6.11" | ||
8919 | |||
8920 | CVE_STATUS[CVE-2024-46847] = "fixed-version: Fixed from version 6.11" | ||
8921 | |||
8922 | CVE_STATUS[CVE-2024-46848] = "fixed-version: Fixed from version 6.11" | ||
8923 | |||
8924 | CVE_STATUS[CVE-2024-46849] = "fixed-version: Fixed from version 6.11" | ||
8925 | |||
8926 | CVE_STATUS[CVE-2024-46850] = "fixed-version: Fixed from version 6.11" | ||
8927 | |||
8928 | CVE_STATUS[CVE-2024-46851] = "fixed-version: Fixed from version 6.11" | ||
8929 | |||
8930 | CVE_STATUS[CVE-2024-46852] = "fixed-version: Fixed from version 6.11" | ||
8931 | |||
8932 | CVE_STATUS[CVE-2024-46853] = "fixed-version: Fixed from version 6.11" | ||
8933 | |||
8934 | CVE_STATUS[CVE-2024-46854] = "fixed-version: Fixed from version 6.11" | ||
8935 | |||
8936 | CVE_STATUS[CVE-2024-46855] = "fixed-version: Fixed from version 6.11" | ||
8937 | |||
8938 | CVE_STATUS[CVE-2024-46856] = "fixed-version: Fixed from version 6.11" | ||
8939 | |||
8940 | CVE_STATUS[CVE-2024-46857] = "fixed-version: Fixed from version 6.11" | ||
8941 | |||
8942 | CVE_STATUS[CVE-2024-46858] = "fixed-version: Fixed from version 6.11" | ||
8943 | |||
8944 | CVE_STATUS[CVE-2024-46859] = "fixed-version: Fixed from version 6.11" | ||
8945 | |||
8946 | CVE_STATUS[CVE-2024-46860] = "fixed-version: Fixed from version 6.11" | ||
8947 | |||
8948 | CVE_STATUS[CVE-2024-46861] = "fixed-version: Fixed from version 6.11" | ||
8949 | |||
8950 | CVE_STATUS[CVE-2024-46862] = "fixed-version: Fixed from version 6.11" | ||
8951 | |||
8952 | CVE_STATUS[CVE-2024-46863] = "fixed-version: Fixed from version 6.11" | ||
8953 | |||
8954 | CVE_STATUS[CVE-2024-46864] = "fixed-version: Fixed from version 6.11" | ||
8955 | |||
8956 | CVE_STATUS[CVE-2024-46865] = "fixed-version: Fixed from version 6.10.11" | ||
8957 | |||
8958 | CVE_STATUS[CVE-2024-46866] = "fixed-version: Fixed from version 6.11" | ||
8959 | |||
8960 | CVE_STATUS[CVE-2024-46867] = "fixed-version: Fixed from version 6.11" | ||
8961 | |||
8962 | CVE_STATUS[CVE-2024-46868] = "fixed-version: Fixed from version 6.11" | ||
8963 | |||
8964 | CVE_STATUS[CVE-2024-46869] = "fixed-version: Fixed from version 6.12" | ||
8965 | |||
8966 | CVE_STATUS[CVE-2024-46870] = "fixed-version: Fixed from version 6.11" | ||
8967 | |||
8968 | CVE_STATUS[CVE-2024-46871] = "fixed-version: Fixed from version 6.11" | ||
8969 | |||
8970 | CVE_STATUS[CVE-2024-46896] = "fixed-version: Fixed from version 6.12.7" | ||
8971 | |||
8972 | CVE_STATUS[CVE-2024-47141] = "cpe-stable-backport: Backported in 6.12.5" | ||
8973 | |||
8974 | CVE_STATUS[CVE-2024-47143] = "cpe-stable-backport: Backported in 6.12.5" | ||
8975 | |||
8976 | CVE_STATUS[CVE-2024-47408] = "cpe-stable-backport: Backported in 6.12.7" | ||
8977 | |||
8978 | CVE_STATUS[CVE-2024-47658] = "fixed-version: Fixed from version 6.11" | ||
8979 | |||
8980 | CVE_STATUS[CVE-2024-47659] = "fixed-version: Fixed from version 6.11" | ||
8981 | |||
8982 | CVE_STATUS[CVE-2024-47660] = "fixed-version: Fixed from version 6.11" | ||
8983 | |||
8984 | CVE_STATUS[CVE-2024-47661] = "fixed-version: Fixed from version 6.11" | ||
8985 | |||
8986 | CVE_STATUS[CVE-2024-47662] = "fixed-version: Fixed from version 6.11" | ||
8987 | |||
8988 | CVE_STATUS[CVE-2024-47663] = "fixed-version: Fixed from version 6.11" | ||
8989 | |||
8990 | CVE_STATUS[CVE-2024-47664] = "fixed-version: Fixed from version 6.11" | ||
8991 | |||
8992 | CVE_STATUS[CVE-2024-47665] = "fixed-version: Fixed from version 6.11" | ||
8993 | |||
8994 | CVE_STATUS[CVE-2024-47666] = "fixed-version: Fixed from version 6.11" | ||
8995 | |||
8996 | CVE_STATUS[CVE-2024-47667] = "fixed-version: Fixed from version 6.11" | ||
8997 | |||
8998 | CVE_STATUS[CVE-2024-47668] = "fixed-version: Fixed from version 6.11" | ||
8999 | |||
9000 | CVE_STATUS[CVE-2024-47669] = "fixed-version: Fixed from version 6.11" | ||
9001 | |||
9002 | CVE_STATUS[CVE-2024-47670] = "fixed-version: Fixed from version 6.11" | ||
9003 | |||
9004 | CVE_STATUS[CVE-2024-47671] = "fixed-version: Fixed from version 6.12" | ||
9005 | |||
9006 | CVE_STATUS[CVE-2024-47672] = "fixed-version: Fixed from version 6.11" | ||
9007 | |||
9008 | CVE_STATUS[CVE-2024-47673] = "fixed-version: Fixed from version 6.11" | ||
9009 | |||
9010 | CVE_STATUS[CVE-2024-47674] = "fixed-version: Fixed from version 6.11" | ||
9011 | |||
9012 | CVE_STATUS[CVE-2024-47675] = "fixed-version: Fixed from version 6.12" | ||
9013 | |||
9014 | CVE_STATUS[CVE-2024-47676] = "fixed-version: Fixed from version 6.12" | ||
9015 | |||
9016 | CVE_STATUS[CVE-2024-47677] = "fixed-version: Fixed from version 6.12" | ||
9017 | |||
9018 | CVE_STATUS[CVE-2024-47678] = "fixed-version: Fixed from version 6.12" | ||
9019 | |||
9020 | CVE_STATUS[CVE-2024-47679] = "fixed-version: Fixed from version 6.12" | ||
9021 | |||
9022 | CVE_STATUS[CVE-2024-47680] = "fixed-version: Fixed from version 6.12" | ||
9023 | |||
9024 | CVE_STATUS[CVE-2024-47681] = "fixed-version: Fixed from version 6.12" | ||
9025 | |||
9026 | CVE_STATUS[CVE-2024-47682] = "fixed-version: Fixed from version 6.12" | ||
9027 | |||
9028 | CVE_STATUS[CVE-2024-47683] = "fixed-version: Fixed from version 6.12" | ||
9029 | |||
9030 | CVE_STATUS[CVE-2024-47684] = "fixed-version: Fixed from version 6.12" | ||
9031 | |||
9032 | CVE_STATUS[CVE-2024-47685] = "fixed-version: Fixed from version 6.12" | ||
9033 | |||
9034 | CVE_STATUS[CVE-2024-47686] = "fixed-version: Fixed from version 6.12" | ||
9035 | |||
9036 | CVE_STATUS[CVE-2024-47687] = "fixed-version: Fixed from version 6.12" | ||
9037 | |||
9038 | CVE_STATUS[CVE-2024-47688] = "fixed-version: Fixed from version 6.12" | ||
9039 | |||
9040 | CVE_STATUS[CVE-2024-47689] = "fixed-version: Fixed from version 6.12" | ||
9041 | |||
9042 | CVE_STATUS[CVE-2024-47690] = "fixed-version: Fixed from version 6.12" | ||
9043 | |||
9044 | CVE_STATUS[CVE-2024-47691] = "fixed-version: Fixed from version 6.12" | ||
9045 | |||
9046 | CVE_STATUS[CVE-2024-47692] = "fixed-version: Fixed from version 6.12" | ||
9047 | |||
9048 | CVE_STATUS[CVE-2024-47693] = "fixed-version: Fixed from version 6.12" | ||
9049 | |||
9050 | CVE_STATUS[CVE-2024-47694] = "fixed-version: Fixed from version 6.12" | ||
9051 | |||
9052 | CVE_STATUS[CVE-2024-47695] = "fixed-version: Fixed from version 6.12" | ||
9053 | |||
9054 | CVE_STATUS[CVE-2024-47696] = "fixed-version: Fixed from version 6.12" | ||
9055 | |||
9056 | CVE_STATUS[CVE-2024-47697] = "fixed-version: Fixed from version 6.12" | ||
9057 | |||
9058 | CVE_STATUS[CVE-2024-47698] = "fixed-version: Fixed from version 6.12" | ||
9059 | |||
9060 | CVE_STATUS[CVE-2024-47699] = "fixed-version: Fixed from version 6.12" | ||
9061 | |||
9062 | CVE_STATUS[CVE-2024-47700] = "fixed-version: Fixed from version 6.12" | ||
9063 | |||
9064 | CVE_STATUS[CVE-2024-47701] = "fixed-version: Fixed from version 6.12" | ||
9065 | |||
9066 | CVE_STATUS[CVE-2024-47702] = "fixed-version: Fixed from version 6.12" | ||
9067 | |||
9068 | CVE_STATUS[CVE-2024-47703] = "fixed-version: Fixed from version 6.12" | ||
9069 | |||
9070 | CVE_STATUS[CVE-2024-47704] = "fixed-version: Fixed from version 6.12" | ||
9071 | |||
9072 | CVE_STATUS[CVE-2024-47705] = "fixed-version: Fixed from version 6.12" | ||
9073 | |||
9074 | CVE_STATUS[CVE-2024-47706] = "fixed-version: Fixed from version 6.12" | ||
9075 | |||
9076 | CVE_STATUS[CVE-2024-47707] = "fixed-version: Fixed from version 6.12" | ||
9077 | |||
9078 | CVE_STATUS[CVE-2024-47708] = "fixed-version: Fixed from version 6.12" | ||
9079 | |||
9080 | CVE_STATUS[CVE-2024-47709] = "fixed-version: Fixed from version 6.12" | ||
9081 | |||
9082 | CVE_STATUS[CVE-2024-47710] = "fixed-version: Fixed from version 6.12" | ||
9083 | |||
9084 | CVE_STATUS[CVE-2024-47711] = "fixed-version: Fixed from version 6.12" | ||
9085 | |||
9086 | CVE_STATUS[CVE-2024-47712] = "fixed-version: Fixed from version 6.12" | ||
9087 | |||
9088 | CVE_STATUS[CVE-2024-47713] = "fixed-version: Fixed from version 6.12" | ||
9089 | |||
9090 | CVE_STATUS[CVE-2024-47714] = "fixed-version: Fixed from version 6.12" | ||
9091 | |||
9092 | CVE_STATUS[CVE-2024-47715] = "fixed-version: Fixed from version 6.12" | ||
9093 | |||
9094 | CVE_STATUS[CVE-2024-47716] = "fixed-version: Fixed from version 6.12" | ||
9095 | |||
9096 | CVE_STATUS[CVE-2024-47717] = "fixed-version: Fixed from version 6.12" | ||
9097 | |||
9098 | CVE_STATUS[CVE-2024-47718] = "fixed-version: Fixed from version 6.12" | ||
9099 | |||
9100 | CVE_STATUS[CVE-2024-47719] = "fixed-version: Fixed from version 6.12" | ||
9101 | |||
9102 | CVE_STATUS[CVE-2024-47720] = "fixed-version: Fixed from version 6.12" | ||
9103 | |||
9104 | CVE_STATUS[CVE-2024-47721] = "fixed-version: Fixed from version 6.12" | ||
9105 | |||
9106 | CVE_STATUS[CVE-2024-47723] = "fixed-version: Fixed from version 6.12" | ||
9107 | |||
9108 | CVE_STATUS[CVE-2024-47724] = "fixed-version: Fixed from version 6.12" | ||
9109 | |||
9110 | CVE_STATUS[CVE-2024-47726] = "fixed-version: Fixed from version 6.12" | ||
9111 | |||
9112 | CVE_STATUS[CVE-2024-47727] = "fixed-version: Fixed from version 6.12" | ||
9113 | |||
9114 | CVE_STATUS[CVE-2024-47728] = "fixed-version: Fixed from version 6.12" | ||
9115 | |||
9116 | CVE_STATUS[CVE-2024-47729] = "fixed-version: Fixed from version 6.12" | ||
9117 | |||
9118 | CVE_STATUS[CVE-2024-47730] = "fixed-version: Fixed from version 6.12" | ||
9119 | |||
9120 | CVE_STATUS[CVE-2024-47731] = "fixed-version: Fixed from version 6.12" | ||
9121 | |||
9122 | CVE_STATUS[CVE-2024-47732] = "fixed-version: Fixed from version 6.12" | ||
9123 | |||
9124 | CVE_STATUS[CVE-2024-47733] = "fixed-version: Fixed from version 6.12" | ||
9125 | |||
9126 | CVE_STATUS[CVE-2024-47734] = "fixed-version: Fixed from version 6.12" | ||
9127 | |||
9128 | CVE_STATUS[CVE-2024-47735] = "fixed-version: Fixed from version 6.12" | ||
9129 | |||
9130 | CVE_STATUS[CVE-2024-47736] = "fixed-version: Fixed from version 6.12" | ||
9131 | |||
9132 | CVE_STATUS[CVE-2024-47737] = "fixed-version: Fixed from version 6.12" | ||
9133 | |||
9134 | CVE_STATUS[CVE-2024-47738] = "fixed-version: Fixed from version 6.12" | ||
9135 | |||
9136 | CVE_STATUS[CVE-2024-47739] = "fixed-version: Fixed from version 6.12" | ||
9137 | |||
9138 | CVE_STATUS[CVE-2024-47740] = "fixed-version: Fixed from version 6.12" | ||
9139 | |||
9140 | CVE_STATUS[CVE-2024-47741] = "fixed-version: Fixed from version 6.12" | ||
9141 | |||
9142 | CVE_STATUS[CVE-2024-47742] = "fixed-version: Fixed from version 6.12" | ||
9143 | |||
9144 | CVE_STATUS[CVE-2024-47743] = "fixed-version: Fixed from version 6.12" | ||
9145 | |||
9146 | CVE_STATUS[CVE-2024-47744] = "fixed-version: Fixed from version 6.12" | ||
9147 | |||
9148 | CVE_STATUS[CVE-2024-47745] = "fixed-version: Fixed from version 6.12" | ||
9149 | |||
9150 | CVE_STATUS[CVE-2024-47746] = "fixed-version: Fixed from version 6.12" | ||
9151 | |||
9152 | CVE_STATUS[CVE-2024-47747] = "fixed-version: Fixed from version 6.12" | ||
9153 | |||
9154 | CVE_STATUS[CVE-2024-47748] = "fixed-version: Fixed from version 6.12" | ||
9155 | |||
9156 | CVE_STATUS[CVE-2024-47749] = "fixed-version: Fixed from version 6.12" | ||
9157 | |||
9158 | CVE_STATUS[CVE-2024-47750] = "fixed-version: Fixed from version 6.12" | ||
9159 | |||
9160 | CVE_STATUS[CVE-2024-47751] = "fixed-version: Fixed from version 6.12" | ||
9161 | |||
9162 | CVE_STATUS[CVE-2024-47752] = "fixed-version: Fixed from version 6.12" | ||
9163 | |||
9164 | CVE_STATUS[CVE-2024-47753] = "fixed-version: Fixed from version 6.12" | ||
9165 | |||
9166 | CVE_STATUS[CVE-2024-47754] = "fixed-version: Fixed from version 6.12" | ||
9167 | |||
9168 | CVE_STATUS[CVE-2024-47756] = "fixed-version: Fixed from version 6.12" | ||
9169 | |||
9170 | CVE_STATUS[CVE-2024-47757] = "fixed-version: Fixed from version 6.12" | ||
9171 | |||
9172 | CVE_STATUS[CVE-2024-47794] = "cpe-stable-backport: Backported in 6.12.5" | ||
9173 | |||
9174 | CVE_STATUS[CVE-2024-47809] = "cpe-stable-backport: Backported in 6.12.5" | ||
9175 | |||
9176 | CVE_STATUS[CVE-2024-48873] = "cpe-stable-backport: Backported in 6.12.5" | ||
9177 | |||
9178 | CVE_STATUS[CVE-2024-48875] = "cpe-stable-backport: Backported in 6.12.5" | ||
9179 | |||
9180 | CVE_STATUS[CVE-2024-48876] = "cpe-stable-backport: Backported in 6.12.5" | ||
9181 | |||
9182 | CVE_STATUS[CVE-2024-48881] = "cpe-stable-backport: Backported in 6.12.5" | ||
9183 | |||
9184 | CVE_STATUS[CVE-2024-49568] = "cpe-stable-backport: Backported in 6.12.7" | ||
9185 | |||
9186 | CVE_STATUS[CVE-2024-49569] = "cpe-stable-backport: Backported in 6.12.5" | ||
9187 | |||
9188 | CVE_STATUS[CVE-2024-49570] = "cpe-stable-backport: Backported in 6.12.16" | ||
9189 | |||
9190 | CVE_STATUS[CVE-2024-49571] = "cpe-stable-backport: Backported in 6.12.7" | ||
9191 | |||
9192 | CVE_STATUS[CVE-2024-49573] = "cpe-stable-backport: Backported in 6.12.7" | ||
9193 | |||
9194 | CVE_STATUS[CVE-2024-49850] = "fixed-version: Fixed from version 6.12" | ||
9195 | |||
9196 | CVE_STATUS[CVE-2024-49851] = "fixed-version: Fixed from version 6.12" | ||
9197 | |||
9198 | CVE_STATUS[CVE-2024-49852] = "fixed-version: Fixed from version 6.12" | ||
9199 | |||
9200 | CVE_STATUS[CVE-2024-49853] = "fixed-version: Fixed from version 6.12" | ||
9201 | |||
9202 | # CVE-2024-49854 has no known resolution | ||
9203 | |||
9204 | CVE_STATUS[CVE-2024-49855] = "fixed-version: Fixed from version 6.12" | ||
9205 | |||
9206 | CVE_STATUS[CVE-2024-49856] = "fixed-version: Fixed from version 6.12" | ||
9207 | |||
9208 | CVE_STATUS[CVE-2024-49857] = "fixed-version: Fixed from version 6.12" | ||
9209 | |||
9210 | CVE_STATUS[CVE-2024-49858] = "fixed-version: Fixed from version 6.12" | ||
9211 | |||
9212 | CVE_STATUS[CVE-2024-49859] = "fixed-version: Fixed from version 6.12" | ||
9213 | |||
9214 | CVE_STATUS[CVE-2024-49860] = "fixed-version: Fixed from version 6.12" | ||
9215 | |||
9216 | CVE_STATUS[CVE-2024-49861] = "fixed-version: Fixed from version 6.12" | ||
9217 | |||
9218 | CVE_STATUS[CVE-2024-49862] = "fixed-version: Fixed from version 6.12" | ||
9219 | |||
9220 | CVE_STATUS[CVE-2024-49863] = "fixed-version: Fixed from version 6.12" | ||
9221 | |||
9222 | CVE_STATUS[CVE-2024-49864] = "fixed-version: Fixed from version 6.12" | ||
9223 | |||
9224 | CVE_STATUS[CVE-2024-49865] = "fixed-version: Fixed from version 6.12" | ||
9225 | |||
9226 | CVE_STATUS[CVE-2024-49866] = "fixed-version: Fixed from version 6.12" | ||
9227 | |||
9228 | CVE_STATUS[CVE-2024-49867] = "fixed-version: Fixed from version 6.12" | ||
9229 | |||
9230 | CVE_STATUS[CVE-2024-49868] = "fixed-version: Fixed from version 6.12" | ||
9231 | |||
9232 | CVE_STATUS[CVE-2024-49869] = "fixed-version: Fixed from version 6.12" | ||
9233 | |||
9234 | CVE_STATUS[CVE-2024-49870] = "fixed-version: Fixed from version 6.12" | ||
9235 | |||
9236 | CVE_STATUS[CVE-2024-49871] = "fixed-version: Fixed from version 6.12" | ||
9237 | |||
9238 | CVE_STATUS[CVE-2024-49872] = "fixed-version: Fixed from version 6.12" | ||
9239 | |||
9240 | CVE_STATUS[CVE-2024-49873] = "fixed-version: Fixed from version 6.12" | ||
9241 | |||
9242 | CVE_STATUS[CVE-2024-49874] = "fixed-version: Fixed from version 6.12" | ||
9243 | |||
9244 | CVE_STATUS[CVE-2024-49875] = "fixed-version: Fixed from version 6.12" | ||
9245 | |||
9246 | CVE_STATUS[CVE-2024-49876] = "fixed-version: Fixed from version 6.12" | ||
9247 | |||
9248 | CVE_STATUS[CVE-2024-49877] = "fixed-version: Fixed from version 6.12" | ||
9249 | |||
9250 | CVE_STATUS[CVE-2024-49878] = "fixed-version: Fixed from version 6.12" | ||
9251 | |||
9252 | CVE_STATUS[CVE-2024-49879] = "fixed-version: Fixed from version 6.12" | ||
9253 | |||
9254 | CVE_STATUS[CVE-2024-49880] = "fixed-version: Fixed from version 6.12" | ||
9255 | |||
9256 | CVE_STATUS[CVE-2024-49881] = "fixed-version: Fixed from version 6.12" | ||
9257 | |||
9258 | CVE_STATUS[CVE-2024-49882] = "fixed-version: Fixed from version 6.12" | ||
9259 | |||
9260 | CVE_STATUS[CVE-2024-49883] = "fixed-version: Fixed from version 6.12" | ||
9261 | |||
9262 | CVE_STATUS[CVE-2024-49884] = "fixed-version: Fixed from version 6.12" | ||
9263 | |||
9264 | CVE_STATUS[CVE-2024-49885] = "fixed-version: Fixed from version 6.12" | ||
9265 | |||
9266 | CVE_STATUS[CVE-2024-49886] = "fixed-version: Fixed from version 6.12" | ||
9267 | |||
9268 | CVE_STATUS[CVE-2024-49887] = "fixed-version: Fixed from version 6.12" | ||
9269 | |||
9270 | CVE_STATUS[CVE-2024-49888] = "fixed-version: Fixed from version 6.12" | ||
9271 | |||
9272 | CVE_STATUS[CVE-2024-49889] = "fixed-version: Fixed from version 6.12" | ||
9273 | |||
9274 | CVE_STATUS[CVE-2024-49890] = "fixed-version: Fixed from version 6.12" | ||
9275 | |||
9276 | CVE_STATUS[CVE-2024-49891] = "fixed-version: Fixed from version 6.12" | ||
9277 | |||
9278 | CVE_STATUS[CVE-2024-49892] = "fixed-version: Fixed from version 6.12" | ||
9279 | |||
9280 | CVE_STATUS[CVE-2024-49893] = "fixed-version: Fixed from version 6.12" | ||
9281 | |||
9282 | CVE_STATUS[CVE-2024-49894] = "fixed-version: Fixed from version 6.12" | ||
9283 | |||
9284 | CVE_STATUS[CVE-2024-49895] = "fixed-version: Fixed from version 6.12" | ||
9285 | |||
9286 | CVE_STATUS[CVE-2024-49896] = "fixed-version: Fixed from version 6.12" | ||
9287 | |||
9288 | CVE_STATUS[CVE-2024-49897] = "fixed-version: Fixed from version 6.12" | ||
9289 | |||
9290 | CVE_STATUS[CVE-2024-49898] = "fixed-version: Fixed from version 6.12" | ||
9291 | |||
9292 | CVE_STATUS[CVE-2024-49899] = "fixed-version: Fixed from version 6.12" | ||
9293 | |||
9294 | CVE_STATUS[CVE-2024-49900] = "fixed-version: Fixed from version 6.12" | ||
9295 | |||
9296 | CVE_STATUS[CVE-2024-49901] = "fixed-version: Fixed from version 6.12" | ||
9297 | |||
9298 | CVE_STATUS[CVE-2024-49902] = "fixed-version: Fixed from version 6.12" | ||
9299 | |||
9300 | CVE_STATUS[CVE-2024-49903] = "fixed-version: Fixed from version 6.12" | ||
9301 | |||
9302 | CVE_STATUS[CVE-2024-49904] = "fixed-version: Fixed from version 6.12" | ||
9303 | |||
9304 | CVE_STATUS[CVE-2024-49905] = "fixed-version: Fixed from version 6.12" | ||
9305 | |||
9306 | CVE_STATUS[CVE-2024-49906] = "fixed-version: Fixed from version 6.12" | ||
9307 | |||
9308 | CVE_STATUS[CVE-2024-49907] = "fixed-version: Fixed from version 6.12" | ||
9309 | |||
9310 | CVE_STATUS[CVE-2024-49908] = "fixed-version: Fixed from version 6.12" | ||
9311 | |||
9312 | CVE_STATUS[CVE-2024-49909] = "fixed-version: Fixed from version 6.12" | ||
9313 | |||
9314 | CVE_STATUS[CVE-2024-49910] = "fixed-version: Fixed from version 6.12" | ||
9315 | |||
9316 | CVE_STATUS[CVE-2024-49911] = "fixed-version: Fixed from version 6.12" | ||
9317 | |||
9318 | CVE_STATUS[CVE-2024-49912] = "fixed-version: Fixed from version 6.12" | ||
9319 | |||
9320 | CVE_STATUS[CVE-2024-49913] = "fixed-version: Fixed from version 6.12" | ||
9321 | |||
9322 | CVE_STATUS[CVE-2024-49914] = "fixed-version: Fixed from version 6.12" | ||
9323 | |||
9324 | CVE_STATUS[CVE-2024-49915] = "fixed-version: Fixed from version 6.12" | ||
9325 | |||
9326 | CVE_STATUS[CVE-2024-49916] = "fixed-version: Fixed from version 6.12" | ||
9327 | |||
9328 | CVE_STATUS[CVE-2024-49917] = "fixed-version: Fixed from version 6.12" | ||
9329 | |||
9330 | CVE_STATUS[CVE-2024-49918] = "fixed-version: Fixed from version 6.12" | ||
9331 | |||
9332 | CVE_STATUS[CVE-2024-49919] = "fixed-version: Fixed from version 6.12" | ||
9333 | |||
9334 | CVE_STATUS[CVE-2024-49920] = "fixed-version: Fixed from version 6.12" | ||
9335 | |||
9336 | CVE_STATUS[CVE-2024-49921] = "fixed-version: Fixed from version 6.12" | ||
9337 | |||
9338 | CVE_STATUS[CVE-2024-49922] = "fixed-version: Fixed from version 6.12" | ||
9339 | |||
9340 | CVE_STATUS[CVE-2024-49923] = "fixed-version: Fixed from version 6.12" | ||
9341 | |||
9342 | CVE_STATUS[CVE-2024-49924] = "fixed-version: Fixed from version 6.12" | ||
9343 | |||
9344 | CVE_STATUS[CVE-2024-49925] = "fixed-version: Fixed from version 6.12" | ||
9345 | |||
9346 | CVE_STATUS[CVE-2024-49926] = "fixed-version: Fixed from version 6.12" | ||
9347 | |||
9348 | CVE_STATUS[CVE-2024-49927] = "fixed-version: Fixed from version 6.12" | ||
9349 | |||
9350 | CVE_STATUS[CVE-2024-49928] = "fixed-version: Fixed from version 6.12" | ||
9351 | |||
9352 | CVE_STATUS[CVE-2024-49929] = "fixed-version: Fixed from version 6.12" | ||
9353 | |||
9354 | CVE_STATUS[CVE-2024-49930] = "fixed-version: Fixed from version 6.12" | ||
9355 | |||
9356 | CVE_STATUS[CVE-2024-49931] = "fixed-version: Fixed from version 6.12" | ||
9357 | |||
9358 | CVE_STATUS[CVE-2024-49932] = "fixed-version: Fixed from version 6.12" | ||
9359 | |||
9360 | CVE_STATUS[CVE-2024-49933] = "fixed-version: Fixed from version 6.12" | ||
9361 | |||
9362 | CVE_STATUS[CVE-2024-49934] = "fixed-version: Fixed from version 6.12" | ||
9363 | |||
9364 | CVE_STATUS[CVE-2024-49935] = "fixed-version: Fixed from version 6.12" | ||
9365 | |||
9366 | CVE_STATUS[CVE-2024-49936] = "fixed-version: Fixed from version 6.12" | ||
9367 | |||
9368 | CVE_STATUS[CVE-2024-49937] = "fixed-version: Fixed from version 6.12" | ||
9369 | |||
9370 | CVE_STATUS[CVE-2024-49938] = "fixed-version: Fixed from version 6.12" | ||
9371 | |||
9372 | CVE_STATUS[CVE-2024-49939] = "fixed-version: Fixed from version 6.12" | ||
9373 | |||
9374 | CVE_STATUS[CVE-2024-49940] = "fixed-version: Fixed from version 6.12" | ||
9375 | |||
9376 | CVE_STATUS[CVE-2024-49941] = "fixed-version: Fixed from version 6.12" | ||
9377 | |||
9378 | CVE_STATUS[CVE-2024-49942] = "fixed-version: Fixed from version 6.12" | ||
9379 | |||
9380 | CVE_STATUS[CVE-2024-49943] = "fixed-version: Fixed from version 6.12" | ||
9381 | |||
9382 | CVE_STATUS[CVE-2024-49944] = "fixed-version: Fixed from version 6.12" | ||
9383 | |||
9384 | CVE_STATUS[CVE-2024-49945] = "fixed-version: Fixed from version 6.12" | ||
9385 | |||
9386 | CVE_STATUS[CVE-2024-49946] = "fixed-version: Fixed from version 6.12" | ||
9387 | |||
9388 | CVE_STATUS[CVE-2024-49947] = "fixed-version: Fixed from version 6.12" | ||
9389 | |||
9390 | CVE_STATUS[CVE-2024-49948] = "fixed-version: Fixed from version 6.12" | ||
9391 | |||
9392 | CVE_STATUS[CVE-2024-49949] = "fixed-version: Fixed from version 6.12" | ||
9393 | |||
9394 | CVE_STATUS[CVE-2024-49950] = "fixed-version: Fixed from version 6.12" | ||
9395 | |||
9396 | CVE_STATUS[CVE-2024-49951] = "fixed-version: Fixed from version 6.12" | ||
9397 | |||
9398 | CVE_STATUS[CVE-2024-49952] = "fixed-version: Fixed from version 6.12" | ||
9399 | |||
9400 | CVE_STATUS[CVE-2024-49953] = "fixed-version: Fixed from version 6.12" | ||
9401 | |||
9402 | CVE_STATUS[CVE-2024-49954] = "fixed-version: Fixed from version 6.12" | ||
9403 | |||
9404 | CVE_STATUS[CVE-2024-49955] = "fixed-version: Fixed from version 6.12" | ||
9405 | |||
9406 | CVE_STATUS[CVE-2024-49956] = "fixed-version: Fixed from version 6.12" | ||
9407 | |||
9408 | CVE_STATUS[CVE-2024-49957] = "fixed-version: Fixed from version 6.12" | ||
9409 | |||
9410 | CVE_STATUS[CVE-2024-49958] = "fixed-version: Fixed from version 6.12" | ||
9411 | |||
9412 | CVE_STATUS[CVE-2024-49959] = "fixed-version: Fixed from version 6.12" | ||
9413 | |||
9414 | CVE_STATUS[CVE-2024-49960] = "fixed-version: Fixed from version 6.12" | ||
9415 | |||
9416 | CVE_STATUS[CVE-2024-49961] = "fixed-version: Fixed from version 6.12" | ||
9417 | |||
9418 | CVE_STATUS[CVE-2024-49962] = "fixed-version: Fixed from version 6.12" | ||
9419 | |||
9420 | CVE_STATUS[CVE-2024-49963] = "fixed-version: Fixed from version 6.12" | ||
9421 | |||
9422 | CVE_STATUS[CVE-2024-49964] = "fixed-version: Fixed from version 6.12" | ||
9423 | |||
9424 | CVE_STATUS[CVE-2024-49965] = "fixed-version: Fixed from version 6.12" | ||
9425 | |||
9426 | CVE_STATUS[CVE-2024-49966] = "fixed-version: Fixed from version 6.12" | ||
9427 | |||
9428 | CVE_STATUS[CVE-2024-49968] = "fixed-version: Fixed from version 6.12" | ||
9429 | |||
9430 | CVE_STATUS[CVE-2024-49969] = "fixed-version: Fixed from version 6.12" | ||
9431 | |||
9432 | CVE_STATUS[CVE-2024-49970] = "fixed-version: Fixed from version 6.12" | ||
9433 | |||
9434 | CVE_STATUS[CVE-2024-49971] = "fixed-version: Fixed from version 6.12" | ||
9435 | |||
9436 | CVE_STATUS[CVE-2024-49972] = "fixed-version: Fixed from version 6.12" | ||
9437 | |||
9438 | CVE_STATUS[CVE-2024-49973] = "fixed-version: Fixed from version 6.12" | ||
9439 | |||
9440 | CVE_STATUS[CVE-2024-49974] = "fixed-version: Fixed from version 6.12" | ||
9441 | |||
9442 | CVE_STATUS[CVE-2024-49975] = "fixed-version: Fixed from version 6.12" | ||
9443 | |||
9444 | CVE_STATUS[CVE-2024-49976] = "fixed-version: Fixed from version 6.12" | ||
9445 | |||
9446 | CVE_STATUS[CVE-2024-49977] = "fixed-version: Fixed from version 6.12" | ||
9447 | |||
9448 | CVE_STATUS[CVE-2024-49978] = "fixed-version: Fixed from version 6.12" | ||
9449 | |||
9450 | CVE_STATUS[CVE-2024-49979] = "fixed-version: Fixed from version 6.12" | ||
9451 | |||
9452 | CVE_STATUS[CVE-2024-49980] = "fixed-version: Fixed from version 6.12" | ||
9453 | |||
9454 | CVE_STATUS[CVE-2024-49981] = "fixed-version: Fixed from version 6.12" | ||
9455 | |||
9456 | CVE_STATUS[CVE-2024-49982] = "fixed-version: Fixed from version 6.12" | ||
9457 | |||
9458 | CVE_STATUS[CVE-2024-49983] = "fixed-version: Fixed from version 6.12" | ||
9459 | |||
9460 | CVE_STATUS[CVE-2024-49984] = "fixed-version: Fixed from version 6.12" | ||
9461 | |||
9462 | CVE_STATUS[CVE-2024-49985] = "fixed-version: Fixed from version 6.12" | ||
9463 | |||
9464 | CVE_STATUS[CVE-2024-49986] = "fixed-version: Fixed from version 6.12" | ||
9465 | |||
9466 | CVE_STATUS[CVE-2024-49987] = "fixed-version: Fixed from version 6.12" | ||
9467 | |||
9468 | CVE_STATUS[CVE-2024-49988] = "fixed-version: Fixed from version 6.12" | ||
9469 | |||
9470 | CVE_STATUS[CVE-2024-49989] = "fixed-version: Fixed from version 6.12" | ||
9471 | |||
9472 | CVE_STATUS[CVE-2024-49990] = "fixed-version: Fixed from version 6.12" | ||
9473 | |||
9474 | CVE_STATUS[CVE-2024-49991] = "fixed-version: Fixed from version 6.12" | ||
9475 | |||
9476 | CVE_STATUS[CVE-2024-49992] = "fixed-version: Fixed from version 6.12" | ||
9477 | |||
9478 | CVE_STATUS[CVE-2024-49994] = "fixed-version: Fixed from version 6.12" | ||
9479 | |||
9480 | CVE_STATUS[CVE-2024-49996] = "fixed-version: Fixed from version 6.12" | ||
9481 | |||
9482 | CVE_STATUS[CVE-2024-49997] = "fixed-version: Fixed from version 6.12" | ||
9483 | |||
9484 | CVE_STATUS[CVE-2024-49998] = "fixed-version: Fixed from version 6.12" | ||
9485 | |||
9486 | CVE_STATUS[CVE-2024-49999] = "fixed-version: Fixed from version 6.12" | ||
9487 | |||
9488 | CVE_STATUS[CVE-2024-50000] = "fixed-version: Fixed from version 6.12" | ||
9489 | |||
9490 | CVE_STATUS[CVE-2024-50001] = "fixed-version: Fixed from version 6.12" | ||
9491 | |||
9492 | CVE_STATUS[CVE-2024-50002] = "fixed-version: Fixed from version 6.12" | ||
9493 | |||
9494 | CVE_STATUS[CVE-2024-50003] = "fixed-version: Fixed from version 6.12" | ||
9495 | |||
9496 | CVE_STATUS[CVE-2024-50004] = "fixed-version: Fixed from version 6.12" | ||
9497 | |||
9498 | CVE_STATUS[CVE-2024-50005] = "fixed-version: Fixed from version 6.12" | ||
9499 | |||
9500 | CVE_STATUS[CVE-2024-50006] = "fixed-version: Fixed from version 6.12" | ||
9501 | |||
9502 | CVE_STATUS[CVE-2024-50007] = "fixed-version: Fixed from version 6.12" | ||
9503 | |||
9504 | CVE_STATUS[CVE-2024-50008] = "fixed-version: Fixed from version 6.12" | ||
9505 | |||
9506 | CVE_STATUS[CVE-2024-50009] = "fixed-version: Fixed from version 6.12" | ||
9507 | |||
9508 | CVE_STATUS[CVE-2024-50010] = "fixed-version: Fixed from version 6.12" | ||
9509 | |||
9510 | CVE_STATUS[CVE-2024-50011] = "fixed-version: Fixed from version 6.12" | ||
9511 | |||
9512 | CVE_STATUS[CVE-2024-50012] = "fixed-version: Fixed from version 6.12" | ||
9513 | |||
9514 | CVE_STATUS[CVE-2024-50013] = "fixed-version: Fixed from version 6.12" | ||
9515 | |||
9516 | CVE_STATUS[CVE-2024-50014] = "fixed-version: Fixed from version 6.12" | ||
9517 | |||
9518 | CVE_STATUS[CVE-2024-50015] = "fixed-version: Fixed from version 6.12" | ||
9519 | |||
9520 | CVE_STATUS[CVE-2024-50017] = "fixed-version: Fixed from version 6.12" | ||
9521 | |||
9522 | CVE_STATUS[CVE-2024-50019] = "fixed-version: Fixed from version 6.12" | ||
9523 | |||
9524 | CVE_STATUS[CVE-2024-50020] = "fixed-version: Fixed from version 6.12" | ||
9525 | |||
9526 | CVE_STATUS[CVE-2024-50021] = "fixed-version: Fixed from version 6.12" | ||
9527 | |||
9528 | CVE_STATUS[CVE-2024-50022] = "fixed-version: Fixed from version 6.12" | ||
9529 | |||
9530 | CVE_STATUS[CVE-2024-50023] = "fixed-version: Fixed from version 6.12" | ||
9531 | |||
9532 | CVE_STATUS[CVE-2024-50024] = "fixed-version: Fixed from version 6.12" | ||
9533 | |||
9534 | CVE_STATUS[CVE-2024-50025] = "fixed-version: Fixed from version 6.12" | ||
9535 | |||
9536 | CVE_STATUS[CVE-2024-50026] = "fixed-version: Fixed from version 6.12" | ||
9537 | |||
9538 | CVE_STATUS[CVE-2024-50027] = "fixed-version: Fixed from version 6.12" | ||
9539 | |||
9540 | CVE_STATUS[CVE-2024-50028] = "fixed-version: Fixed from version 6.12" | ||
9541 | |||
9542 | CVE_STATUS[CVE-2024-50029] = "fixed-version: Fixed from version 6.12" | ||
9543 | |||
9544 | CVE_STATUS[CVE-2024-50030] = "fixed-version: Fixed from version 6.12" | ||
9545 | |||
9546 | CVE_STATUS[CVE-2024-50031] = "fixed-version: Fixed from version 6.12" | ||
9547 | |||
9548 | CVE_STATUS[CVE-2024-50032] = "fixed-version: Fixed from version 6.11.4" | ||
9549 | |||
9550 | CVE_STATUS[CVE-2024-50033] = "fixed-version: Fixed from version 6.12" | ||
9551 | |||
9552 | CVE_STATUS[CVE-2024-50034] = "fixed-version: Fixed from version 6.12" | ||
9553 | |||
9554 | CVE_STATUS[CVE-2024-50035] = "fixed-version: Fixed from version 6.12" | ||
9555 | |||
9556 | CVE_STATUS[CVE-2024-50036] = "fixed-version: Fixed from version 6.12" | ||
9557 | |||
9558 | CVE_STATUS[CVE-2024-50037] = "fixed-version: Fixed from version 6.12" | ||
9559 | |||
9560 | CVE_STATUS[CVE-2024-50038] = "fixed-version: Fixed from version 6.12" | ||
9561 | |||
9562 | CVE_STATUS[CVE-2024-50039] = "fixed-version: Fixed from version 6.12" | ||
9563 | |||
9564 | CVE_STATUS[CVE-2024-50040] = "fixed-version: Fixed from version 6.12" | ||
9565 | |||
9566 | CVE_STATUS[CVE-2024-50041] = "fixed-version: Fixed from version 6.12" | ||
9567 | |||
9568 | CVE_STATUS[CVE-2024-50042] = "fixed-version: Fixed from version 6.12" | ||
9569 | |||
9570 | CVE_STATUS[CVE-2024-50043] = "fixed-version: Fixed from version 6.12" | ||
9571 | |||
9572 | CVE_STATUS[CVE-2024-50044] = "fixed-version: Fixed from version 6.12" | ||
9573 | |||
9574 | CVE_STATUS[CVE-2024-50045] = "fixed-version: Fixed from version 6.12" | ||
9575 | |||
9576 | CVE_STATUS[CVE-2024-50046] = "fixed-version: Fixed from version 6.12" | ||
9577 | |||
9578 | CVE_STATUS[CVE-2024-50047] = "fixed-version: Fixed from version 6.12" | ||
9579 | |||
9580 | CVE_STATUS[CVE-2024-50048] = "fixed-version: Fixed from version 6.12" | ||
9581 | |||
9582 | CVE_STATUS[CVE-2024-50049] = "fixed-version: Fixed from version 6.12" | ||
9583 | |||
9584 | CVE_STATUS[CVE-2024-50051] = "cpe-stable-backport: Backported in 6.12.5" | ||
9585 | |||
9586 | CVE_STATUS[CVE-2024-50055] = "fixed-version: Fixed from version 6.12" | ||
9587 | |||
9588 | CVE_STATUS[CVE-2024-50056] = "fixed-version: Fixed from version 6.12" | ||
9589 | |||
9590 | CVE_STATUS[CVE-2024-50057] = "fixed-version: Fixed from version 6.12" | ||
9591 | |||
9592 | CVE_STATUS[CVE-2024-50058] = "fixed-version: Fixed from version 6.12" | ||
9593 | |||
9594 | CVE_STATUS[CVE-2024-50059] = "fixed-version: Fixed from version 6.12" | ||
9595 | |||
9596 | CVE_STATUS[CVE-2024-50060] = "fixed-version: Fixed from version 6.12" | ||
9597 | |||
9598 | CVE_STATUS[CVE-2024-50061] = "fixed-version: Fixed from version 6.12" | ||
9599 | |||
9600 | CVE_STATUS[CVE-2024-50062] = "fixed-version: Fixed from version 6.12" | ||
9601 | |||
9602 | CVE_STATUS[CVE-2024-50063] = "fixed-version: Fixed from version 6.12" | ||
9603 | |||
9604 | CVE_STATUS[CVE-2024-50064] = "fixed-version: Fixed from version 6.12" | ||
9605 | |||
9606 | CVE_STATUS[CVE-2024-50065] = "fixed-version: Fixed from version 6.12" | ||
9607 | |||
9608 | CVE_STATUS[CVE-2024-50066] = "fixed-version: Fixed from version 6.12" | ||
9609 | |||
9610 | CVE_STATUS[CVE-2024-50067] = "fixed-version: Fixed from version 6.12" | ||
9611 | |||
9612 | CVE_STATUS[CVE-2024-50068] = "fixed-version: Fixed from version 6.12" | ||
9613 | |||
9614 | CVE_STATUS[CVE-2024-50069] = "fixed-version: Fixed from version 6.12" | ||
9615 | |||
9616 | CVE_STATUS[CVE-2024-50070] = "fixed-version: Fixed from version 6.12" | ||
9617 | |||
9618 | CVE_STATUS[CVE-2024-50071] = "fixed-version: Fixed from version 6.12" | ||
9619 | |||
9620 | CVE_STATUS[CVE-2024-50072] = "fixed-version: Fixed from version 6.12" | ||
9621 | |||
9622 | CVE_STATUS[CVE-2024-50073] = "fixed-version: Fixed from version 6.12" | ||
9623 | |||
9624 | CVE_STATUS[CVE-2024-50074] = "fixed-version: Fixed from version 6.12" | ||
9625 | |||
9626 | CVE_STATUS[CVE-2024-50075] = "fixed-version: Fixed from version 6.12" | ||
9627 | |||
9628 | CVE_STATUS[CVE-2024-50076] = "fixed-version: Fixed from version 6.12" | ||
9629 | |||
9630 | CVE_STATUS[CVE-2024-50077] = "fixed-version: Fixed from version 6.12" | ||
9631 | |||
9632 | CVE_STATUS[CVE-2024-50078] = "fixed-version: Fixed from version 6.12" | ||
9633 | |||
9634 | CVE_STATUS[CVE-2024-50079] = "fixed-version: Fixed from version 6.12" | ||
9635 | |||
9636 | CVE_STATUS[CVE-2024-50080] = "fixed-version: Fixed from version 6.12" | ||
9637 | |||
9638 | CVE_STATUS[CVE-2024-50081] = "fixed-version: Fixed from version 6.12" | ||
9639 | |||
9640 | CVE_STATUS[CVE-2024-50082] = "fixed-version: Fixed from version 6.12" | ||
9641 | |||
9642 | CVE_STATUS[CVE-2024-50083] = "fixed-version: Fixed from version 6.12" | ||
9643 | |||
9644 | CVE_STATUS[CVE-2024-50084] = "fixed-version: Fixed from version 6.12" | ||
9645 | |||
9646 | CVE_STATUS[CVE-2024-50085] = "fixed-version: Fixed from version 6.12" | ||
9647 | |||
9648 | CVE_STATUS[CVE-2024-50086] = "fixed-version: Fixed from version 6.12" | ||
9649 | |||
9650 | CVE_STATUS[CVE-2024-50087] = "fixed-version: Fixed from version 6.12" | ||
9651 | |||
9652 | CVE_STATUS[CVE-2024-50088] = "fixed-version: Fixed from version 6.12" | ||
9653 | |||
9654 | CVE_STATUS[CVE-2024-50090] = "fixed-version: Fixed from version 6.12" | ||
9655 | |||
9656 | CVE_STATUS[CVE-2024-50091] = "fixed-version: Fixed from version 6.12" | ||
9657 | |||
9658 | CVE_STATUS[CVE-2024-50092] = "fixed-version: Fixed from version 6.12" | ||
9659 | |||
9660 | CVE_STATUS[CVE-2024-50093] = "fixed-version: Fixed from version 6.12" | ||
9661 | |||
9662 | CVE_STATUS[CVE-2024-50094] = "fixed-version: Fixed from version 6.12" | ||
9663 | |||
9664 | CVE_STATUS[CVE-2024-50095] = "fixed-version: Fixed from version 6.12" | ||
9665 | |||
9666 | CVE_STATUS[CVE-2024-50096] = "fixed-version: Fixed from version 6.12" | ||
9667 | |||
9668 | CVE_STATUS[CVE-2024-50097] = "fixed-version: Fixed from version 6.11.4" | ||
9669 | |||
9670 | CVE_STATUS[CVE-2024-50098] = "fixed-version: Fixed from version 6.12" | ||
9671 | |||
9672 | CVE_STATUS[CVE-2024-50099] = "fixed-version: Fixed from version 6.12" | ||
9673 | |||
9674 | CVE_STATUS[CVE-2024-50100] = "fixed-version: Fixed from version 6.12" | ||
9675 | |||
9676 | CVE_STATUS[CVE-2024-50101] = "fixed-version: Fixed from version 6.12" | ||
9677 | |||
9678 | CVE_STATUS[CVE-2024-50102] = "fixed-version: Fixed from version 6.12" | ||
9679 | |||
9680 | CVE_STATUS[CVE-2024-50103] = "fixed-version: Fixed from version 6.12" | ||
9681 | |||
9682 | CVE_STATUS[CVE-2024-50104] = "fixed-version: Fixed from version 6.12" | ||
9683 | |||
9684 | CVE_STATUS[CVE-2024-50105] = "fixed-version: Fixed from version 6.12" | ||
9685 | |||
9686 | CVE_STATUS[CVE-2024-50106] = "fixed-version: Fixed from version 6.12" | ||
9687 | |||
9688 | CVE_STATUS[CVE-2024-50107] = "fixed-version: Fixed from version 6.12" | ||
9689 | |||
9690 | CVE_STATUS[CVE-2024-50108] = "fixed-version: Fixed from version 6.12" | ||
9691 | |||
9692 | CVE_STATUS[CVE-2024-50109] = "fixed-version: Fixed from version 6.12" | ||
9693 | |||
9694 | CVE_STATUS[CVE-2024-50110] = "fixed-version: Fixed from version 6.12" | ||
9695 | |||
9696 | CVE_STATUS[CVE-2024-50111] = "fixed-version: Fixed from version 6.12" | ||
9697 | |||
9698 | CVE_STATUS[CVE-2024-50112] = "fixed-version: Fixed from version 6.12" | ||
9699 | |||
9700 | CVE_STATUS[CVE-2024-50113] = "fixed-version: Fixed from version 6.12" | ||
9701 | |||
9702 | CVE_STATUS[CVE-2024-50114] = "fixed-version: Fixed from version 6.12" | ||
9703 | |||
9704 | CVE_STATUS[CVE-2024-50115] = "fixed-version: Fixed from version 6.12" | ||
9705 | |||
9706 | CVE_STATUS[CVE-2024-50116] = "fixed-version: Fixed from version 6.12" | ||
9707 | |||
9708 | CVE_STATUS[CVE-2024-50117] = "fixed-version: Fixed from version 6.12" | ||
9709 | |||
9710 | CVE_STATUS[CVE-2024-50118] = "fixed-version: Fixed from version 6.12" | ||
9711 | |||
9712 | CVE_STATUS[CVE-2024-50119] = "fixed-version: Fixed from version 6.12" | ||
9713 | |||
9714 | CVE_STATUS[CVE-2024-50120] = "fixed-version: Fixed from version 6.12" | ||
9715 | |||
9716 | CVE_STATUS[CVE-2024-50121] = "fixed-version: Fixed from version 6.12" | ||
9717 | |||
9718 | CVE_STATUS[CVE-2024-50122] = "fixed-version: Fixed from version 6.12" | ||
9719 | |||
9720 | CVE_STATUS[CVE-2024-50123] = "fixed-version: Fixed from version 6.12" | ||
9721 | |||
9722 | CVE_STATUS[CVE-2024-50124] = "fixed-version: Fixed from version 6.12" | ||
9723 | |||
9724 | CVE_STATUS[CVE-2024-50125] = "fixed-version: Fixed from version 6.12" | ||
9725 | |||
9726 | CVE_STATUS[CVE-2024-50126] = "fixed-version: Fixed from version 6.12" | ||
9727 | |||
9728 | CVE_STATUS[CVE-2024-50127] = "fixed-version: Fixed from version 6.12" | ||
9729 | |||
9730 | CVE_STATUS[CVE-2024-50128] = "fixed-version: Fixed from version 6.12" | ||
9731 | |||
9732 | CVE_STATUS[CVE-2024-50129] = "fixed-version: Fixed from version 6.12" | ||
9733 | |||
9734 | CVE_STATUS[CVE-2024-50130] = "fixed-version: Fixed from version 6.12" | ||
9735 | |||
9736 | CVE_STATUS[CVE-2024-50131] = "fixed-version: Fixed from version 6.12" | ||
9737 | |||
9738 | CVE_STATUS[CVE-2024-50132] = "fixed-version: Fixed from version 6.12" | ||
9739 | |||
9740 | CVE_STATUS[CVE-2024-50133] = "fixed-version: Fixed from version 6.12" | ||
9741 | |||
9742 | CVE_STATUS[CVE-2024-50134] = "fixed-version: Fixed from version 6.12" | ||
9743 | |||
9744 | CVE_STATUS[CVE-2024-50135] = "fixed-version: Fixed from version 6.12" | ||
9745 | |||
9746 | CVE_STATUS[CVE-2024-50136] = "fixed-version: Fixed from version 6.12" | ||
9747 | |||
9748 | CVE_STATUS[CVE-2024-50137] = "fixed-version: Fixed from version 6.12" | ||
9749 | |||
9750 | CVE_STATUS[CVE-2024-50138] = "fixed-version: Fixed from version 6.12" | ||
9751 | |||
9752 | CVE_STATUS[CVE-2024-50139] = "fixed-version: Fixed from version 6.12" | ||
9753 | |||
9754 | CVE_STATUS[CVE-2024-50140] = "fixed-version: Fixed from version 6.12" | ||
9755 | |||
9756 | CVE_STATUS[CVE-2024-50141] = "fixed-version: Fixed from version 6.12" | ||
9757 | |||
9758 | CVE_STATUS[CVE-2024-50142] = "fixed-version: Fixed from version 6.12" | ||
9759 | |||
9760 | CVE_STATUS[CVE-2024-50143] = "fixed-version: Fixed from version 6.12" | ||
9761 | |||
9762 | CVE_STATUS[CVE-2024-50144] = "fixed-version: Fixed from version 6.12" | ||
9763 | |||
9764 | CVE_STATUS[CVE-2024-50145] = "fixed-version: Fixed from version 6.12" | ||
9765 | |||
9766 | CVE_STATUS[CVE-2024-50146] = "fixed-version: Fixed from version 6.12" | ||
9767 | |||
9768 | CVE_STATUS[CVE-2024-50147] = "fixed-version: Fixed from version 6.12" | ||
9769 | |||
9770 | CVE_STATUS[CVE-2024-50148] = "fixed-version: Fixed from version 6.12" | ||
9771 | |||
9772 | CVE_STATUS[CVE-2024-50149] = "fixed-version: Fixed from version 6.12" | ||
9773 | |||
9774 | CVE_STATUS[CVE-2024-50150] = "fixed-version: Fixed from version 6.12" | ||
9775 | |||
9776 | CVE_STATUS[CVE-2024-50151] = "fixed-version: Fixed from version 6.12" | ||
9777 | |||
9778 | CVE_STATUS[CVE-2024-50152] = "fixed-version: Fixed from version 6.12" | ||
9779 | |||
9780 | CVE_STATUS[CVE-2024-50153] = "fixed-version: Fixed from version 6.12" | ||
9781 | |||
9782 | CVE_STATUS[CVE-2024-50154] = "fixed-version: Fixed from version 6.12" | ||
9783 | |||
9784 | CVE_STATUS[CVE-2024-50155] = "fixed-version: Fixed from version 6.12" | ||
9785 | |||
9786 | CVE_STATUS[CVE-2024-50156] = "fixed-version: Fixed from version 6.12" | ||
9787 | |||
9788 | CVE_STATUS[CVE-2024-50157] = "fixed-version: Fixed from version 6.12" | ||
9789 | |||
9790 | CVE_STATUS[CVE-2024-50158] = "fixed-version: Fixed from version 6.12" | ||
9791 | |||
9792 | CVE_STATUS[CVE-2024-50159] = "fixed-version: Fixed from version 6.12" | ||
9793 | |||
9794 | CVE_STATUS[CVE-2024-50160] = "fixed-version: Fixed from version 6.12" | ||
9795 | |||
9796 | CVE_STATUS[CVE-2024-50161] = "fixed-version: Fixed from version 6.12" | ||
9797 | |||
9798 | CVE_STATUS[CVE-2024-50162] = "fixed-version: Fixed from version 6.12" | ||
9799 | |||
9800 | CVE_STATUS[CVE-2024-50163] = "fixed-version: Fixed from version 6.12" | ||
9801 | |||
9802 | CVE_STATUS[CVE-2024-50164] = "fixed-version: Fixed from version 6.12" | ||
9803 | |||
9804 | CVE_STATUS[CVE-2024-50165] = "fixed-version: Fixed from version 6.12" | ||
9805 | |||
9806 | CVE_STATUS[CVE-2024-50166] = "fixed-version: Fixed from version 6.12" | ||
9807 | |||
9808 | CVE_STATUS[CVE-2024-50167] = "fixed-version: Fixed from version 6.12" | ||
9809 | |||
9810 | CVE_STATUS[CVE-2024-50168] = "fixed-version: Fixed from version 6.12" | ||
9811 | |||
9812 | CVE_STATUS[CVE-2024-50169] = "fixed-version: Fixed from version 6.12" | ||
9813 | |||
9814 | CVE_STATUS[CVE-2024-50170] = "fixed-version: Fixed from version 6.12" | ||
9815 | |||
9816 | CVE_STATUS[CVE-2024-50171] = "fixed-version: Fixed from version 6.12" | ||
9817 | |||
9818 | CVE_STATUS[CVE-2024-50172] = "fixed-version: Fixed from version 6.12" | ||
9819 | |||
9820 | CVE_STATUS[CVE-2024-50173] = "fixed-version: Fixed from version 6.12" | ||
9821 | |||
9822 | CVE_STATUS[CVE-2024-50174] = "fixed-version: Fixed from version 6.12" | ||
9823 | |||
9824 | CVE_STATUS[CVE-2024-50175] = "fixed-version: Fixed from version 6.12" | ||
9825 | |||
9826 | CVE_STATUS[CVE-2024-50176] = "fixed-version: Fixed from version 6.12" | ||
9827 | |||
9828 | CVE_STATUS[CVE-2024-50177] = "fixed-version: Fixed from version 6.12" | ||
9829 | |||
9830 | CVE_STATUS[CVE-2024-50178] = "fixed-version: Fixed from version 6.12" | ||
9831 | |||
9832 | CVE_STATUS[CVE-2024-50179] = "fixed-version: Fixed from version 6.12" | ||
9833 | |||
9834 | CVE_STATUS[CVE-2024-50180] = "fixed-version: Fixed from version 6.12" | ||
9835 | |||
9836 | CVE_STATUS[CVE-2024-50182] = "fixed-version: Fixed from version 6.12" | ||
9837 | |||
9838 | CVE_STATUS[CVE-2024-50183] = "fixed-version: Fixed from version 6.12" | ||
9839 | |||
9840 | CVE_STATUS[CVE-2024-50184] = "fixed-version: Fixed from version 6.12" | ||
9841 | |||
9842 | CVE_STATUS[CVE-2024-50185] = "fixed-version: Fixed from version 6.12" | ||
9843 | |||
9844 | CVE_STATUS[CVE-2024-50186] = "fixed-version: Fixed from version 6.12" | ||
9845 | |||
9846 | CVE_STATUS[CVE-2024-50187] = "fixed-version: Fixed from version 6.12" | ||
9847 | |||
9848 | CVE_STATUS[CVE-2024-50188] = "fixed-version: Fixed from version 6.12" | ||
9849 | |||
9850 | CVE_STATUS[CVE-2024-50189] = "fixed-version: Fixed from version 6.12" | ||
9851 | |||
9852 | CVE_STATUS[CVE-2024-50190] = "fixed-version: Fixed from version 6.12" | ||
9853 | |||
9854 | CVE_STATUS[CVE-2024-50191] = "fixed-version: Fixed from version 6.12" | ||
9855 | |||
9856 | CVE_STATUS[CVE-2024-50192] = "fixed-version: Fixed from version 6.12" | ||
9857 | |||
9858 | CVE_STATUS[CVE-2024-50193] = "fixed-version: Fixed from version 6.12" | ||
9859 | |||
9860 | CVE_STATUS[CVE-2024-50194] = "fixed-version: Fixed from version 6.12" | ||
9861 | |||
9862 | CVE_STATUS[CVE-2024-50195] = "fixed-version: Fixed from version 6.12" | ||
9863 | |||
9864 | CVE_STATUS[CVE-2024-50196] = "fixed-version: Fixed from version 6.12" | ||
9865 | |||
9866 | CVE_STATUS[CVE-2024-50197] = "fixed-version: Fixed from version 6.12" | ||
9867 | |||
9868 | CVE_STATUS[CVE-2024-50198] = "fixed-version: Fixed from version 6.12" | ||
9869 | |||
9870 | CVE_STATUS[CVE-2024-50199] = "fixed-version: Fixed from version 6.12" | ||
9871 | |||
9872 | CVE_STATUS[CVE-2024-50200] = "fixed-version: Fixed from version 6.12" | ||
9873 | |||
9874 | CVE_STATUS[CVE-2024-50201] = "fixed-version: Fixed from version 6.12" | ||
9875 | |||
9876 | CVE_STATUS[CVE-2024-50202] = "fixed-version: Fixed from version 6.12" | ||
9877 | |||
9878 | CVE_STATUS[CVE-2024-50203] = "fixed-version: Fixed from version 6.12" | ||
9879 | |||
9880 | CVE_STATUS[CVE-2024-50204] = "fixed-version: Fixed from version 6.12" | ||
9881 | |||
9882 | CVE_STATUS[CVE-2024-50205] = "fixed-version: Fixed from version 6.12" | ||
9883 | |||
9884 | CVE_STATUS[CVE-2024-50206] = "fixed-version: Fixed from version 6.12" | ||
9885 | |||
9886 | CVE_STATUS[CVE-2024-50207] = "fixed-version: Fixed from version 6.12" | ||
9887 | |||
9888 | CVE_STATUS[CVE-2024-50208] = "fixed-version: Fixed from version 6.12" | ||
9889 | |||
9890 | CVE_STATUS[CVE-2024-50209] = "fixed-version: Fixed from version 6.12" | ||
9891 | |||
9892 | CVE_STATUS[CVE-2024-50210] = "fixed-version: Fixed from version 6.11.6" | ||
9893 | |||
9894 | CVE_STATUS[CVE-2024-50211] = "fixed-version: Fixed from version 6.12" | ||
9895 | |||
9896 | CVE_STATUS[CVE-2024-50212] = "fixed-version: Fixed from version 6.12" | ||
9897 | |||
9898 | CVE_STATUS[CVE-2024-50213] = "fixed-version: Fixed from version 6.12" | ||
9899 | |||
9900 | CVE_STATUS[CVE-2024-50214] = "fixed-version: Fixed from version 6.12" | ||
9901 | |||
9902 | CVE_STATUS[CVE-2024-50215] = "fixed-version: Fixed from version 6.12" | ||
9903 | |||
9904 | CVE_STATUS[CVE-2024-50216] = "fixed-version: Fixed from version 6.12" | ||
9905 | |||
9906 | CVE_STATUS[CVE-2024-50217] = "fixed-version: Fixed from version 6.12" | ||
9907 | |||
9908 | CVE_STATUS[CVE-2024-50218] = "fixed-version: Fixed from version 6.12" | ||
9909 | |||
9910 | CVE_STATUS[CVE-2024-50220] = "fixed-version: Fixed from version 6.12" | ||
9911 | |||
9912 | CVE_STATUS[CVE-2024-50221] = "fixed-version: Fixed from version 6.12" | ||
9913 | |||
9914 | CVE_STATUS[CVE-2024-50222] = "fixed-version: Fixed from version 6.12" | ||
9915 | |||
9916 | CVE_STATUS[CVE-2024-50223] = "fixed-version: Fixed from version 6.12" | ||
9917 | |||
9918 | CVE_STATUS[CVE-2024-50224] = "fixed-version: Fixed from version 6.12" | ||
9919 | |||
9920 | CVE_STATUS[CVE-2024-50225] = "fixed-version: Fixed from version 6.12" | ||
9921 | |||
9922 | CVE_STATUS[CVE-2024-50226] = "fixed-version: Fixed from version 6.12" | ||
9923 | |||
9924 | CVE_STATUS[CVE-2024-50227] = "fixed-version: Fixed from version 6.12" | ||
9925 | |||
9926 | CVE_STATUS[CVE-2024-50229] = "fixed-version: Fixed from version 6.12" | ||
9927 | |||
9928 | CVE_STATUS[CVE-2024-50230] = "fixed-version: Fixed from version 6.12" | ||
9929 | |||
9930 | CVE_STATUS[CVE-2024-50231] = "fixed-version: Fixed from version 6.12" | ||
9931 | |||
9932 | CVE_STATUS[CVE-2024-50232] = "fixed-version: Fixed from version 6.12" | ||
9933 | |||
9934 | CVE_STATUS[CVE-2024-50233] = "fixed-version: Fixed from version 6.12" | ||
9935 | |||
9936 | CVE_STATUS[CVE-2024-50234] = "fixed-version: Fixed from version 6.12" | ||
9937 | |||
9938 | CVE_STATUS[CVE-2024-50235] = "fixed-version: Fixed from version 6.12" | ||
9939 | |||
9940 | CVE_STATUS[CVE-2024-50236] = "fixed-version: Fixed from version 6.12" | ||
9941 | |||
9942 | CVE_STATUS[CVE-2024-50237] = "fixed-version: Fixed from version 6.12" | ||
9943 | |||
9944 | CVE_STATUS[CVE-2024-50238] = "fixed-version: Fixed from version 6.12" | ||
9945 | |||
9946 | CVE_STATUS[CVE-2024-50239] = "fixed-version: Fixed from version 6.12" | ||
9947 | |||
9948 | CVE_STATUS[CVE-2024-50240] = "fixed-version: Fixed from version 6.12" | ||
9949 | |||
9950 | CVE_STATUS[CVE-2024-50241] = "fixed-version: Fixed from version 6.11.7" | ||
9951 | |||
9952 | CVE_STATUS[CVE-2024-50242] = "fixed-version: Fixed from version 6.12" | ||
9953 | |||
9954 | CVE_STATUS[CVE-2024-50243] = "fixed-version: Fixed from version 6.12" | ||
9955 | |||
9956 | CVE_STATUS[CVE-2024-50244] = "fixed-version: Fixed from version 6.12" | ||
9957 | |||
9958 | CVE_STATUS[CVE-2024-50245] = "fixed-version: Fixed from version 6.12" | ||
9959 | |||
9960 | CVE_STATUS[CVE-2024-50246] = "fixed-version: Fixed from version 6.12" | ||
9961 | |||
9962 | CVE_STATUS[CVE-2024-50247] = "fixed-version: Fixed from version 6.12" | ||
9963 | |||
9964 | CVE_STATUS[CVE-2024-50248] = "fixed-version: Fixed from version 6.12" | ||
9965 | |||
9966 | CVE_STATUS[CVE-2024-50249] = "fixed-version: Fixed from version 6.11.7" | ||
9967 | |||
9968 | CVE_STATUS[CVE-2024-50250] = "fixed-version: Fixed from version 6.12" | ||
9969 | |||
9970 | CVE_STATUS[CVE-2024-50251] = "fixed-version: Fixed from version 6.12" | ||
9971 | |||
9972 | CVE_STATUS[CVE-2024-50252] = "fixed-version: Fixed from version 6.12" | ||
9973 | |||
9974 | CVE_STATUS[CVE-2024-50253] = "fixed-version: Fixed from version 6.12" | ||
9975 | |||
9976 | CVE_STATUS[CVE-2024-50254] = "fixed-version: Fixed from version 6.12" | ||
9977 | |||
9978 | CVE_STATUS[CVE-2024-50255] = "fixed-version: Fixed from version 6.12" | ||
9979 | |||
9980 | CVE_STATUS[CVE-2024-50256] = "fixed-version: Fixed from version 6.12" | ||
9981 | |||
9982 | CVE_STATUS[CVE-2024-50257] = "fixed-version: Fixed from version 6.12" | ||
9983 | |||
9984 | CVE_STATUS[CVE-2024-50258] = "fixed-version: Fixed from version 6.12" | ||
9985 | |||
9986 | CVE_STATUS[CVE-2024-50259] = "fixed-version: Fixed from version 6.12" | ||
9987 | |||
9988 | CVE_STATUS[CVE-2024-50260] = "fixed-version: Fixed from version 6.12" | ||
9989 | |||
9990 | CVE_STATUS[CVE-2024-50261] = "fixed-version: Fixed from version 6.12" | ||
9991 | |||
9992 | CVE_STATUS[CVE-2024-50262] = "fixed-version: Fixed from version 6.12" | ||
9993 | |||
9994 | CVE_STATUS[CVE-2024-50263] = "fixed-version: Fixed from version 6.12" | ||
9995 | |||
9996 | CVE_STATUS[CVE-2024-50264] = "fixed-version: Fixed from version 6.12" | ||
9997 | |||
9998 | CVE_STATUS[CVE-2024-50265] = "fixed-version: Fixed from version 6.12" | ||
9999 | |||
10000 | CVE_STATUS[CVE-2024-50266] = "fixed-version: Fixed from version 6.12" | ||
10001 | |||
10002 | CVE_STATUS[CVE-2024-50267] = "fixed-version: Fixed from version 6.12" | ||
10003 | |||
10004 | CVE_STATUS[CVE-2024-50268] = "fixed-version: Fixed from version 6.12" | ||
10005 | |||
10006 | CVE_STATUS[CVE-2024-50269] = "fixed-version: Fixed from version 6.12" | ||
10007 | |||
10008 | CVE_STATUS[CVE-2024-50270] = "fixed-version: Fixed from version 6.12" | ||
10009 | |||
10010 | CVE_STATUS[CVE-2024-50271] = "fixed-version: Fixed from version 6.12" | ||
10011 | |||
10012 | CVE_STATUS[CVE-2024-50272] = "fixed-version: Fixed from version 6.12" | ||
10013 | |||
10014 | CVE_STATUS[CVE-2024-50273] = "fixed-version: Fixed from version 6.12" | ||
10015 | |||
10016 | CVE_STATUS[CVE-2024-50274] = "fixed-version: Fixed from version 6.12" | ||
10017 | |||
10018 | CVE_STATUS[CVE-2024-50275] = "fixed-version: Fixed from version 6.12" | ||
10019 | |||
10020 | CVE_STATUS[CVE-2024-50276] = "fixed-version: Fixed from version 6.12" | ||
10021 | |||
10022 | CVE_STATUS[CVE-2024-50277] = "fixed-version: Fixed from version 6.12" | ||
10023 | |||
10024 | CVE_STATUS[CVE-2024-50278] = "fixed-version: Fixed from version 6.12" | ||
10025 | |||
10026 | CVE_STATUS[CVE-2024-50279] = "fixed-version: Fixed from version 6.12" | ||
10027 | |||
10028 | CVE_STATUS[CVE-2024-50280] = "fixed-version: Fixed from version 6.12" | ||
10029 | |||
10030 | CVE_STATUS[CVE-2024-50281] = "fixed-version: Fixed from version 6.12" | ||
10031 | |||
10032 | CVE_STATUS[CVE-2024-50282] = "fixed-version: Fixed from version 6.12" | ||
10033 | |||
10034 | CVE_STATUS[CVE-2024-50283] = "fixed-version: Fixed from version 6.12" | ||
10035 | |||
10036 | CVE_STATUS[CVE-2024-50284] = "fixed-version: Fixed from version 6.12" | ||
10037 | |||
10038 | CVE_STATUS[CVE-2024-50285] = "fixed-version: Fixed from version 6.12" | ||
10039 | |||
10040 | CVE_STATUS[CVE-2024-50286] = "fixed-version: Fixed from version 6.12" | ||
10041 | |||
10042 | CVE_STATUS[CVE-2024-50287] = "fixed-version: Fixed from version 6.12" | ||
10043 | |||
10044 | CVE_STATUS[CVE-2024-50288] = "fixed-version: Fixed from version 6.12" | ||
10045 | |||
10046 | CVE_STATUS[CVE-2024-50289] = "fixed-version: Fixed from version 6.12" | ||
10047 | |||
10048 | CVE_STATUS[CVE-2024-50290] = "fixed-version: Fixed from version 6.12" | ||
10049 | |||
10050 | CVE_STATUS[CVE-2024-50291] = "fixed-version: Fixed from version 6.12" | ||
10051 | |||
10052 | CVE_STATUS[CVE-2024-50292] = "fixed-version: Fixed from version 6.12" | ||
10053 | |||
10054 | CVE_STATUS[CVE-2024-50293] = "fixed-version: Fixed from version 6.12" | ||
10055 | |||
10056 | CVE_STATUS[CVE-2024-50294] = "fixed-version: Fixed from version 6.12" | ||
10057 | |||
10058 | CVE_STATUS[CVE-2024-50295] = "fixed-version: Fixed from version 6.12" | ||
10059 | |||
10060 | CVE_STATUS[CVE-2024-50296] = "fixed-version: Fixed from version 6.12" | ||
10061 | |||
10062 | CVE_STATUS[CVE-2024-50297] = "fixed-version: Fixed from version 6.12" | ||
10063 | |||
10064 | CVE_STATUS[CVE-2024-50298] = "fixed-version: Fixed from version 6.12" | ||
10065 | |||
10066 | CVE_STATUS[CVE-2024-50299] = "fixed-version: Fixed from version 6.12" | ||
10067 | |||
10068 | CVE_STATUS[CVE-2024-50300] = "fixed-version: Fixed from version 6.12" | ||
10069 | |||
10070 | CVE_STATUS[CVE-2024-50301] = "fixed-version: Fixed from version 6.12" | ||
10071 | |||
10072 | CVE_STATUS[CVE-2024-50302] = "fixed-version: Fixed from version 6.12" | ||
10073 | |||
10074 | CVE_STATUS[CVE-2024-50303] = "fixed-version: Fixed from version 6.12" | ||
10075 | |||
10076 | CVE_STATUS[CVE-2024-50304] = "fixed-version: Fixed from version 6.12" | ||
10077 | |||
10078 | CVE_STATUS[CVE-2024-51729] = "cpe-stable-backport: Backported in 6.12.7" | ||
10079 | |||
10080 | CVE_STATUS[CVE-2024-52319] = "cpe-stable-backport: Backported in 6.12.7" | ||
10081 | |||
10082 | CVE_STATUS[CVE-2024-52332] = "cpe-stable-backport: Backported in 6.12.5" | ||
10083 | |||
10084 | CVE_STATUS[CVE-2024-52557] = "fixed-version: only affects 6.13 onwards" | ||
10085 | |||
10086 | CVE_STATUS[CVE-2024-52559] = "cpe-stable-backport: Backported in 6.12.16" | ||
10087 | |||
10088 | # CVE-2024-52560 needs backporting (fixed from 6.14) | ||
10089 | |||
10090 | CVE_STATUS[CVE-2024-53042] = "fixed-version: Fixed from version 6.12" | ||
10091 | |||
10092 | CVE_STATUS[CVE-2024-53043] = "fixed-version: Fixed from version 6.12" | ||
10093 | |||
10094 | CVE_STATUS[CVE-2024-53044] = "fixed-version: Fixed from version 6.12" | ||
10095 | |||
10096 | CVE_STATUS[CVE-2024-53045] = "fixed-version: Fixed from version 6.12" | ||
10097 | |||
10098 | CVE_STATUS[CVE-2024-53046] = "fixed-version: Fixed from version 6.12" | ||
10099 | |||
10100 | CVE_STATUS[CVE-2024-53047] = "fixed-version: Fixed from version 6.12" | ||
10101 | |||
10102 | CVE_STATUS[CVE-2024-53048] = "fixed-version: Fixed from version 6.12" | ||
10103 | |||
10104 | CVE_STATUS[CVE-2024-53049] = "fixed-version: Fixed from version 6.12" | ||
10105 | |||
10106 | CVE_STATUS[CVE-2024-53050] = "fixed-version: Fixed from version 6.12" | ||
10107 | |||
10108 | CVE_STATUS[CVE-2024-53051] = "fixed-version: Fixed from version 6.12" | ||
10109 | |||
10110 | CVE_STATUS[CVE-2024-53052] = "fixed-version: Fixed from version 6.12" | ||
10111 | |||
10112 | CVE_STATUS[CVE-2024-53053] = "fixed-version: Fixed from version 6.12" | ||
10113 | |||
10114 | CVE_STATUS[CVE-2024-53055] = "fixed-version: Fixed from version 6.12" | ||
10115 | |||
10116 | CVE_STATUS[CVE-2024-53056] = "fixed-version: Fixed from version 6.12" | ||
10117 | |||
10118 | CVE_STATUS[CVE-2024-53057] = "fixed-version: Fixed from version 6.12" | ||
10119 | |||
10120 | CVE_STATUS[CVE-2024-53058] = "fixed-version: Fixed from version 6.12" | ||
10121 | |||
10122 | CVE_STATUS[CVE-2024-53059] = "fixed-version: Fixed from version 6.12" | ||
10123 | |||
10124 | CVE_STATUS[CVE-2024-53060] = "fixed-version: Fixed from version 6.11.8" | ||
10125 | |||
10126 | CVE_STATUS[CVE-2024-53061] = "fixed-version: Fixed from version 6.12" | ||
10127 | |||
10128 | CVE_STATUS[CVE-2024-53062] = "fixed-version: Fixed from version 6.12" | ||
10129 | |||
10130 | CVE_STATUS[CVE-2024-53063] = "fixed-version: Fixed from version 6.12" | ||
10131 | |||
10132 | CVE_STATUS[CVE-2024-53064] = "fixed-version: Fixed from version 6.12" | ||
10133 | |||
10134 | CVE_STATUS[CVE-2024-53065] = "fixed-version: Fixed from version 6.12" | ||
10135 | |||
10136 | CVE_STATUS[CVE-2024-53066] = "fixed-version: Fixed from version 6.12" | ||
10137 | |||
10138 | CVE_STATUS[CVE-2024-53067] = "fixed-version: Fixed from version 6.12" | ||
10139 | |||
10140 | CVE_STATUS[CVE-2024-53068] = "fixed-version: Fixed from version 6.12" | ||
10141 | |||
10142 | CVE_STATUS[CVE-2024-53069] = "fixed-version: Fixed from version 6.12" | ||
10143 | |||
10144 | CVE_STATUS[CVE-2024-53070] = "fixed-version: Fixed from version 6.11.8" | ||
10145 | |||
10146 | CVE_STATUS[CVE-2024-53071] = "fixed-version: Fixed from version 6.12" | ||
10147 | |||
10148 | CVE_STATUS[CVE-2024-53072] = "fixed-version: Fixed from version 6.12" | ||
10149 | |||
10150 | CVE_STATUS[CVE-2024-53073] = "fixed-version: Fixed from version 6.11.7" | ||
10151 | |||
10152 | CVE_STATUS[CVE-2024-53074] = "fixed-version: Fixed from version 6.12" | ||
10153 | |||
10154 | CVE_STATUS[CVE-2024-53075] = "fixed-version: Fixed from version 6.12" | ||
10155 | |||
10156 | CVE_STATUS[CVE-2024-53076] = "fixed-version: Fixed from version 6.12" | ||
10157 | |||
10158 | CVE_STATUS[CVE-2024-53077] = "fixed-version: Fixed from version 6.12" | ||
10159 | |||
10160 | CVE_STATUS[CVE-2024-53078] = "fixed-version: Fixed from version 6.12" | ||
10161 | |||
10162 | CVE_STATUS[CVE-2024-53079] = "fixed-version: Fixed from version 6.12" | ||
10163 | |||
10164 | CVE_STATUS[CVE-2024-53080] = "fixed-version: Fixed from version 6.12" | ||
10165 | |||
10166 | CVE_STATUS[CVE-2024-53081] = "fixed-version: Fixed from version 6.12" | ||
10167 | |||
10168 | CVE_STATUS[CVE-2024-53082] = "fixed-version: Fixed from version 6.12" | ||
10169 | |||
10170 | CVE_STATUS[CVE-2024-53083] = "fixed-version: Fixed from version 6.12" | ||
10171 | |||
10172 | CVE_STATUS[CVE-2024-53084] = "fixed-version: Fixed from version 6.12" | ||
10173 | |||
10174 | CVE_STATUS[CVE-2024-53085] = "fixed-version: Fixed from version 6.12" | ||
10175 | |||
10176 | CVE_STATUS[CVE-2024-53086] = "fixed-version: Fixed from version 6.12" | ||
10177 | |||
10178 | CVE_STATUS[CVE-2024-53087] = "fixed-version: Fixed from version 6.12" | ||
10179 | |||
10180 | CVE_STATUS[CVE-2024-53088] = "fixed-version: Fixed from version 6.12" | ||
10181 | |||
10182 | CVE_STATUS[CVE-2024-53089] = "fixed-version: Fixed from version 6.12" | ||
10183 | |||
10184 | CVE_STATUS[CVE-2024-53090] = "fixed-version: Fixed from version 6.12" | ||
10185 | |||
10186 | CVE_STATUS[CVE-2024-53091] = "fixed-version: Fixed from version 6.12" | ||
10187 | |||
10188 | CVE_STATUS[CVE-2024-53092] = "fixed-version: Fixed from version 6.12" | ||
10189 | |||
10190 | CVE_STATUS[CVE-2024-53093] = "fixed-version: Fixed from version 6.12" | ||
10191 | |||
10192 | CVE_STATUS[CVE-2024-53094] = "fixed-version: Fixed from version 6.12" | ||
10193 | |||
10194 | CVE_STATUS[CVE-2024-53095] = "fixed-version: Fixed from version 6.12" | ||
10195 | |||
10196 | CVE_STATUS[CVE-2024-53096] = "fixed-version: Fixed from version 6.12" | ||
10197 | |||
10198 | CVE_STATUS[CVE-2024-53097] = "fixed-version: Fixed from version 6.11.9" | ||
10199 | |||
10200 | CVE_STATUS[CVE-2024-53098] = "fixed-version: Fixed from version 6.12" | ||
10201 | |||
10202 | CVE_STATUS[CVE-2024-53099] = "fixed-version: Fixed from version 6.12" | ||
10203 | |||
10204 | CVE_STATUS[CVE-2024-53100] = "fixed-version: Fixed from version 6.12" | ||
10205 | |||
10206 | CVE_STATUS[CVE-2024-53101] = "fixed-version: Fixed from version 6.12" | ||
10207 | |||
10208 | CVE_STATUS[CVE-2024-53103] = "cpe-stable-backport: Backported in 6.12.1" | ||
10209 | |||
10210 | CVE_STATUS[CVE-2024-53104] = "cpe-stable-backport: Backported in 6.12.1" | ||
10211 | |||
10212 | CVE_STATUS[CVE-2024-53105] = "fixed-version: Fixed from version 6.12" | ||
10213 | |||
10214 | CVE_STATUS[CVE-2024-53106] = "fixed-version: Fixed from version 6.12" | ||
10215 | |||
10216 | CVE_STATUS[CVE-2024-53107] = "fixed-version: Fixed from version 6.12" | ||
10217 | |||
10218 | CVE_STATUS[CVE-2024-53108] = "fixed-version: Fixed from version 6.12" | ||
10219 | |||
10220 | CVE_STATUS[CVE-2024-53109] = "fixed-version: Fixed from version 6.12" | ||
10221 | |||
10222 | CVE_STATUS[CVE-2024-53110] = "fixed-version: Fixed from version 6.12" | ||
10223 | |||
10224 | CVE_STATUS[CVE-2024-53111] = "fixed-version: Fixed from version 6.12" | ||
10225 | |||
10226 | CVE_STATUS[CVE-2024-53112] = "fixed-version: Fixed from version 6.12" | ||
10227 | |||
10228 | CVE_STATUS[CVE-2024-53113] = "fixed-version: Fixed from version 6.12" | ||
10229 | |||
10230 | CVE_STATUS[CVE-2024-53114] = "fixed-version: Fixed from version 6.12" | ||
10231 | |||
10232 | CVE_STATUS[CVE-2024-53115] = "fixed-version: Fixed from version 6.12" | ||
10233 | |||
10234 | CVE_STATUS[CVE-2024-53116] = "fixed-version: Fixed from version 6.12" | ||
10235 | |||
10236 | CVE_STATUS[CVE-2024-53117] = "fixed-version: Fixed from version 6.12" | ||
10237 | |||
10238 | CVE_STATUS[CVE-2024-53118] = "fixed-version: Fixed from version 6.12" | ||
10239 | |||
10240 | CVE_STATUS[CVE-2024-53119] = "fixed-version: Fixed from version 6.12" | ||
10241 | |||
10242 | CVE_STATUS[CVE-2024-53120] = "fixed-version: Fixed from version 6.12" | ||
10243 | |||
10244 | CVE_STATUS[CVE-2024-53121] = "fixed-version: Fixed from version 6.12" | ||
10245 | |||
10246 | CVE_STATUS[CVE-2024-53122] = "fixed-version: Fixed from version 6.12" | ||
10247 | |||
10248 | CVE_STATUS[CVE-2024-53123] = "fixed-version: Fixed from version 6.12" | ||
10249 | |||
10250 | CVE_STATUS[CVE-2024-53124] = "fixed-version: Fixed from version 6.12" | ||
10251 | |||
10252 | CVE_STATUS[CVE-2024-53125] = "fixed-version: Fixed from version 6.12" | ||
10253 | |||
10254 | CVE_STATUS[CVE-2024-53126] = "fixed-version: Fixed from version 6.12" | ||
10255 | |||
10256 | CVE_STATUS[CVE-2024-53127] = "fixed-version: Fixed from version 6.12" | ||
10257 | |||
10258 | CVE_STATUS[CVE-2024-53128] = "fixed-version: Fixed from version 6.12" | ||
10259 | |||
10260 | CVE_STATUS[CVE-2024-53129] = "fixed-version: Fixed from version 6.12" | ||
10261 | |||
10262 | CVE_STATUS[CVE-2024-53130] = "fixed-version: Fixed from version 6.12" | ||
10263 | |||
10264 | CVE_STATUS[CVE-2024-53131] = "fixed-version: Fixed from version 6.12" | ||
10265 | |||
10266 | CVE_STATUS[CVE-2024-53132] = "fixed-version: Fixed from version 6.12" | ||
10267 | |||
10268 | CVE_STATUS[CVE-2024-53133] = "fixed-version: Fixed from version 6.12" | ||
10269 | |||
10270 | CVE_STATUS[CVE-2024-53134] = "fixed-version: Fixed from version 6.12" | ||
10271 | |||
10272 | CVE_STATUS[CVE-2024-53135] = "fixed-version: Fixed from version 6.12" | ||
10273 | |||
10274 | CVE_STATUS[CVE-2024-53136] = "fixed-version: Fixed from version 6.11.10" | ||
10275 | |||
10276 | CVE_STATUS[CVE-2024-53137] = "fixed-version: Fixed from version 6.12" | ||
10277 | |||
10278 | CVE_STATUS[CVE-2024-53138] = "fixed-version: Fixed from version 6.12" | ||
10279 | |||
10280 | CVE_STATUS[CVE-2024-53139] = "fixed-version: Fixed from version 6.12" | ||
10281 | |||
10282 | CVE_STATUS[CVE-2024-53140] = "fixed-version: Fixed from version 6.12" | ||
10283 | |||
10284 | CVE_STATUS[CVE-2024-53141] = "cpe-stable-backport: Backported in 6.12.2" | ||
10285 | |||
10286 | CVE_STATUS[CVE-2024-53142] = "cpe-stable-backport: Backported in 6.12.2" | ||
10287 | |||
10288 | CVE_STATUS[CVE-2024-53143] = "cpe-stable-backport: Backported in 6.12.2" | ||
10289 | |||
10290 | CVE_STATUS[CVE-2024-53144] = "fixed-version: Fixed from version 6.12" | ||
10291 | |||
10292 | CVE_STATUS[CVE-2024-53145] = "cpe-stable-backport: Backported in 6.12.2" | ||
10293 | |||
10294 | CVE_STATUS[CVE-2024-53146] = "cpe-stable-backport: Backported in 6.12.2" | ||
10295 | |||
10296 | CVE_STATUS[CVE-2024-53147] = "cpe-stable-backport: Backported in 6.12.2" | ||
10297 | |||
10298 | CVE_STATUS[CVE-2024-53148] = "cpe-stable-backport: Backported in 6.12.2" | ||
10299 | |||
10300 | CVE_STATUS[CVE-2024-53149] = "cpe-stable-backport: Backported in 6.12.2" | ||
10301 | |||
10302 | CVE_STATUS[CVE-2024-53150] = "cpe-stable-backport: Backported in 6.12.2" | ||
10303 | |||
10304 | CVE_STATUS[CVE-2024-53151] = "cpe-stable-backport: Backported in 6.12.2" | ||
10305 | |||
10306 | CVE_STATUS[CVE-2024-53152] = "cpe-stable-backport: Backported in 6.12.2" | ||
10307 | |||
10308 | CVE_STATUS[CVE-2024-53153] = "cpe-stable-backport: Backported in 6.12.2" | ||
10309 | |||
10310 | CVE_STATUS[CVE-2024-53154] = "cpe-stable-backport: Backported in 6.12.2" | ||
10311 | |||
10312 | CVE_STATUS[CVE-2024-53155] = "cpe-stable-backport: Backported in 6.12.2" | ||
10313 | |||
10314 | CVE_STATUS[CVE-2024-53156] = "cpe-stable-backport: Backported in 6.12.2" | ||
10315 | |||
10316 | CVE_STATUS[CVE-2024-53157] = "cpe-stable-backport: Backported in 6.12.2" | ||
10317 | |||
10318 | CVE_STATUS[CVE-2024-53158] = "cpe-stable-backport: Backported in 6.12.2" | ||
10319 | |||
10320 | CVE_STATUS[CVE-2024-53160] = "cpe-stable-backport: Backported in 6.12.2" | ||
10321 | |||
10322 | CVE_STATUS[CVE-2024-53161] = "cpe-stable-backport: Backported in 6.12.2" | ||
10323 | |||
10324 | CVE_STATUS[CVE-2024-53162] = "cpe-stable-backport: Backported in 6.12.2" | ||
10325 | |||
10326 | CVE_STATUS[CVE-2024-53163] = "cpe-stable-backport: Backported in 6.12.2" | ||
10327 | |||
10328 | CVE_STATUS[CVE-2024-53164] = "cpe-stable-backport: Backported in 6.12.7" | ||
10329 | |||
10330 | CVE_STATUS[CVE-2024-53165] = "cpe-stable-backport: Backported in 6.12.2" | ||
10331 | |||
10332 | CVE_STATUS[CVE-2024-53166] = "cpe-stable-backport: Backported in 6.12.2" | ||
10333 | |||
10334 | CVE_STATUS[CVE-2024-53167] = "cpe-stable-backport: Backported in 6.12.2" | ||
10335 | |||
10336 | CVE_STATUS[CVE-2024-53168] = "cpe-stable-backport: Backported in 6.12.2" | ||
10337 | |||
10338 | CVE_STATUS[CVE-2024-53169] = "cpe-stable-backport: Backported in 6.12.2" | ||
10339 | |||
10340 | CVE_STATUS[CVE-2024-53170] = "cpe-stable-backport: Backported in 6.12.2" | ||
10341 | |||
10342 | CVE_STATUS[CVE-2024-53171] = "cpe-stable-backport: Backported in 6.12.2" | ||
10343 | |||
10344 | CVE_STATUS[CVE-2024-53172] = "cpe-stable-backport: Backported in 6.12.2" | ||
10345 | |||
10346 | CVE_STATUS[CVE-2024-53173] = "cpe-stable-backport: Backported in 6.12.2" | ||
10347 | |||
10348 | CVE_STATUS[CVE-2024-53174] = "cpe-stable-backport: Backported in 6.12.2" | ||
10349 | |||
10350 | CVE_STATUS[CVE-2024-53175] = "cpe-stable-backport: Backported in 6.12.2" | ||
10351 | |||
10352 | CVE_STATUS[CVE-2024-53176] = "cpe-stable-backport: Backported in 6.12.2" | ||
10353 | |||
10354 | CVE_STATUS[CVE-2024-53177] = "cpe-stable-backport: Backported in 6.12.2" | ||
10355 | |||
10356 | CVE_STATUS[CVE-2024-53178] = "cpe-stable-backport: Backported in 6.12.2" | ||
10357 | |||
10358 | CVE_STATUS[CVE-2024-53179] = "cpe-stable-backport: Backported in 6.12.2" | ||
10359 | |||
10360 | CVE_STATUS[CVE-2024-53180] = "cpe-stable-backport: Backported in 6.12.2" | ||
10361 | |||
10362 | CVE_STATUS[CVE-2024-53181] = "cpe-stable-backport: Backported in 6.12.2" | ||
10363 | |||
10364 | CVE_STATUS[CVE-2024-53182] = "cpe-stable-backport: Backported in 6.12.2" | ||
10365 | |||
10366 | CVE_STATUS[CVE-2024-53183] = "cpe-stable-backport: Backported in 6.12.2" | ||
10367 | |||
10368 | CVE_STATUS[CVE-2024-53184] = "cpe-stable-backport: Backported in 6.12.2" | ||
10369 | |||
10370 | CVE_STATUS[CVE-2024-53185] = "cpe-stable-backport: Backported in 6.12.2" | ||
10371 | |||
10372 | CVE_STATUS[CVE-2024-53186] = "cpe-stable-backport: Backported in 6.12.2" | ||
10373 | |||
10374 | CVE_STATUS[CVE-2024-53187] = "cpe-stable-backport: Backported in 6.12.2" | ||
10375 | |||
10376 | CVE_STATUS[CVE-2024-53188] = "cpe-stable-backport: Backported in 6.12.2" | ||
10377 | |||
10378 | CVE_STATUS[CVE-2024-53189] = "cpe-stable-backport: Backported in 6.12.2" | ||
10379 | |||
10380 | CVE_STATUS[CVE-2024-53190] = "cpe-stable-backport: Backported in 6.12.2" | ||
10381 | |||
10382 | CVE_STATUS[CVE-2024-53191] = "cpe-stable-backport: Backported in 6.12.2" | ||
10383 | |||
10384 | CVE_STATUS[CVE-2024-53192] = "cpe-stable-backport: Backported in 6.12.2" | ||
10385 | |||
10386 | CVE_STATUS[CVE-2024-53193] = "cpe-stable-backport: Backported in 6.12.2" | ||
10387 | |||
10388 | CVE_STATUS[CVE-2024-53194] = "cpe-stable-backport: Backported in 6.12.2" | ||
10389 | |||
10390 | CVE_STATUS[CVE-2024-53195] = "cpe-stable-backport: Backported in 6.12.2" | ||
10391 | |||
10392 | CVE_STATUS[CVE-2024-53196] = "cpe-stable-backport: Backported in 6.12.2" | ||
10393 | |||
10394 | CVE_STATUS[CVE-2024-53197] = "cpe-stable-backport: Backported in 6.12.2" | ||
10395 | |||
10396 | CVE_STATUS[CVE-2024-53198] = "cpe-stable-backport: Backported in 6.12.2" | ||
10397 | |||
10398 | CVE_STATUS[CVE-2024-53199] = "cpe-stable-backport: Backported in 6.12.2" | ||
10399 | |||
10400 | CVE_STATUS[CVE-2024-53200] = "cpe-stable-backport: Backported in 6.12.2" | ||
10401 | |||
10402 | CVE_STATUS[CVE-2024-53201] = "cpe-stable-backport: Backported in 6.12.2" | ||
10403 | |||
10404 | CVE_STATUS[CVE-2024-53202] = "cpe-stable-backport: Backported in 6.12.2" | ||
10405 | |||
10406 | CVE_STATUS[CVE-2024-53203] = "cpe-stable-backport: Backported in 6.12.2" | ||
10407 | |||
10408 | CVE_STATUS[CVE-2024-53204] = "cpe-stable-backport: Backported in 6.12.2" | ||
10409 | |||
10410 | CVE_STATUS[CVE-2024-53205] = "cpe-stable-backport: Backported in 6.12.2" | ||
10411 | |||
10412 | CVE_STATUS[CVE-2024-53206] = "cpe-stable-backport: Backported in 6.12.2" | ||
10413 | |||
10414 | CVE_STATUS[CVE-2024-53207] = "cpe-stable-backport: Backported in 6.12.2" | ||
10415 | |||
10416 | CVE_STATUS[CVE-2024-53208] = "cpe-stable-backport: Backported in 6.12.2" | ||
10417 | |||
10418 | CVE_STATUS[CVE-2024-53209] = "cpe-stable-backport: Backported in 6.12.2" | ||
10419 | |||
10420 | CVE_STATUS[CVE-2024-53210] = "cpe-stable-backport: Backported in 6.12.2" | ||
10421 | |||
10422 | CVE_STATUS[CVE-2024-53211] = "cpe-stable-backport: Backported in 6.12.2" | ||
10423 | |||
10424 | CVE_STATUS[CVE-2024-53212] = "cpe-stable-backport: Backported in 6.12.2" | ||
10425 | |||
10426 | CVE_STATUS[CVE-2024-53213] = "cpe-stable-backport: Backported in 6.12.2" | ||
10427 | |||
10428 | CVE_STATUS[CVE-2024-53214] = "cpe-stable-backport: Backported in 6.12.2" | ||
10429 | |||
10430 | CVE_STATUS[CVE-2024-53215] = "cpe-stable-backport: Backported in 6.12.2" | ||
10431 | |||
10432 | CVE_STATUS[CVE-2024-53216] = "cpe-stable-backport: Backported in 6.12.2" | ||
10433 | |||
10434 | CVE_STATUS[CVE-2024-53217] = "cpe-stable-backport: Backported in 6.12.2" | ||
10435 | |||
10436 | CVE_STATUS[CVE-2024-53218] = "cpe-stable-backport: Backported in 6.12.2" | ||
10437 | |||
10438 | CVE_STATUS[CVE-2024-53219] = "cpe-stable-backport: Backported in 6.12.2" | ||
10439 | |||
10440 | CVE_STATUS[CVE-2024-53220] = "cpe-stable-backport: Backported in 6.12.2" | ||
10441 | |||
10442 | CVE_STATUS[CVE-2024-53221] = "cpe-stable-backport: Backported in 6.12.2" | ||
10443 | |||
10444 | CVE_STATUS[CVE-2024-53222] = "cpe-stable-backport: Backported in 6.12.2" | ||
10445 | |||
10446 | CVE_STATUS[CVE-2024-53223] = "cpe-stable-backport: Backported in 6.12.2" | ||
10447 | |||
10448 | CVE_STATUS[CVE-2024-53224] = "cpe-stable-backport: Backported in 6.12.2" | ||
10449 | |||
10450 | CVE_STATUS[CVE-2024-53225] = "cpe-stable-backport: Backported in 6.12.2" | ||
10451 | |||
10452 | CVE_STATUS[CVE-2024-53226] = "cpe-stable-backport: Backported in 6.12.2" | ||
10453 | |||
10454 | CVE_STATUS[CVE-2024-53227] = "cpe-stable-backport: Backported in 6.12.2" | ||
10455 | |||
10456 | CVE_STATUS[CVE-2024-53228] = "cpe-stable-backport: Backported in 6.12.2" | ||
10457 | |||
10458 | CVE_STATUS[CVE-2024-53229] = "cpe-stable-backport: Backported in 6.12.2" | ||
10459 | |||
10460 | CVE_STATUS[CVE-2024-53230] = "cpe-stable-backport: Backported in 6.12.2" | ||
10461 | |||
10462 | CVE_STATUS[CVE-2024-53231] = "cpe-stable-backport: Backported in 6.12.2" | ||
10463 | |||
10464 | CVE_STATUS[CVE-2024-53232] = "cpe-stable-backport: Backported in 6.12.2" | ||
10465 | |||
10466 | CVE_STATUS[CVE-2024-53233] = "cpe-stable-backport: Backported in 6.12.2" | ||
10467 | |||
10468 | CVE_STATUS[CVE-2024-53234] = "cpe-stable-backport: Backported in 6.12.2" | ||
10469 | |||
10470 | CVE_STATUS[CVE-2024-53235] = "cpe-stable-backport: Backported in 6.12.2" | ||
10471 | |||
10472 | CVE_STATUS[CVE-2024-53236] = "cpe-stable-backport: Backported in 6.12.2" | ||
10473 | |||
10474 | CVE_STATUS[CVE-2024-53237] = "cpe-stable-backport: Backported in 6.12.2" | ||
10475 | |||
10476 | CVE_STATUS[CVE-2024-53238] = "cpe-stable-backport: Backported in 6.12.2" | ||
10477 | |||
10478 | CVE_STATUS[CVE-2024-53239] = "cpe-stable-backport: Backported in 6.12.2" | ||
10479 | |||
10480 | CVE_STATUS[CVE-2024-53240] = "cpe-stable-backport: Backported in 6.12.6" | ||
10481 | |||
10482 | CVE_STATUS[CVE-2024-53241] = "cpe-stable-backport: Backported in 6.12.6" | ||
10483 | |||
10484 | CVE_STATUS[CVE-2024-53680] = "cpe-stable-backport: Backported in 6.12.5" | ||
10485 | |||
10486 | CVE_STATUS[CVE-2024-53681] = "cpe-stable-backport: Backported in 6.12.9" | ||
10487 | |||
10488 | CVE_STATUS[CVE-2024-53682] = "cpe-stable-backport: Backported in 6.12.6" | ||
10489 | |||
10490 | CVE_STATUS[CVE-2024-53685] = "cpe-stable-backport: Backported in 6.12.7" | ||
10491 | |||
10492 | CVE_STATUS[CVE-2024-53687] = "cpe-stable-backport: Backported in 6.12.6" | ||
10493 | |||
10494 | CVE_STATUS[CVE-2024-53690] = "cpe-stable-backport: Backported in 6.12.7" | ||
10495 | |||
10496 | CVE_STATUS[CVE-2024-54031] = "fixed-version: Fixed from version 6.12.9" | ||
10497 | |||
10498 | CVE_STATUS[CVE-2024-54191] = "fixed-version: Fixed from version 6.12.6" | ||
10499 | |||
10500 | CVE_STATUS[CVE-2024-54193] = "cpe-stable-backport: Backported in 6.12.7" | ||
10501 | |||
10502 | CVE_STATUS[CVE-2024-54455] = "cpe-stable-backport: Backported in 6.12.7" | ||
10503 | |||
10504 | CVE_STATUS[CVE-2024-54456] = "cpe-stable-backport: Backported in 6.12.16" | ||
10505 | |||
10506 | CVE_STATUS[CVE-2024-54458] = "cpe-stable-backport: Backported in 6.12.16" | ||
10507 | |||
10508 | CVE_STATUS[CVE-2024-54460] = "cpe-stable-backport: Backported in 6.12.6" | ||
10509 | |||
10510 | CVE_STATUS[CVE-2024-54683] = "cpe-stable-backport: Backported in 6.12.6" | ||
10511 | |||
10512 | CVE_STATUS[CVE-2024-55639] = "cpe-stable-backport: Backported in 6.12.6" | ||
10513 | |||
10514 | CVE_STATUS[CVE-2024-55641] = "cpe-stable-backport: Backported in 6.12.6" | ||
10515 | |||
10516 | CVE_STATUS[CVE-2024-55642] = "cpe-stable-backport: Backported in 6.12.6" | ||
10517 | |||
10518 | CVE_STATUS[CVE-2024-55881] = "cpe-stable-backport: Backported in 6.12.7" | ||
10519 | |||
10520 | CVE_STATUS[CVE-2024-55916] = "cpe-stable-backport: Backported in 6.12.7" | ||
10521 | |||
10522 | CVE_STATUS[CVE-2024-56368] = "cpe-stable-backport: Backported in 6.12.7" | ||
10523 | |||
10524 | CVE_STATUS[CVE-2024-56369] = "cpe-stable-backport: Backported in 6.12.7" | ||
10525 | |||
10526 | CVE_STATUS[CVE-2024-56372] = "cpe-stable-backport: Backported in 6.12.7" | ||
10527 | |||
10528 | CVE_STATUS[CVE-2024-56531] = "cpe-stable-backport: Backported in 6.12.2" | ||
10529 | |||
10530 | CVE_STATUS[CVE-2024-56532] = "cpe-stable-backport: Backported in 6.12.2" | ||
10531 | |||
10532 | CVE_STATUS[CVE-2024-56533] = "cpe-stable-backport: Backported in 6.12.2" | ||
10533 | |||
10534 | CVE_STATUS[CVE-2024-56534] = "cpe-stable-backport: Backported in 6.12.2" | ||
10535 | |||
10536 | CVE_STATUS[CVE-2024-56535] = "cpe-stable-backport: Backported in 6.12.2" | ||
10537 | |||
10538 | CVE_STATUS[CVE-2024-56536] = "cpe-stable-backport: Backported in 6.12.2" | ||
10539 | |||
10540 | CVE_STATUS[CVE-2024-56537] = "cpe-stable-backport: Backported in 6.12.2" | ||
10541 | |||
10542 | CVE_STATUS[CVE-2024-56538] = "cpe-stable-backport: Backported in 6.12.2" | ||
10543 | |||
10544 | CVE_STATUS[CVE-2024-56539] = "cpe-stable-backport: Backported in 6.12.2" | ||
10545 | |||
10546 | CVE_STATUS[CVE-2024-56540] = "cpe-stable-backport: Backported in 6.12.2" | ||
10547 | |||
10548 | CVE_STATUS[CVE-2024-56541] = "cpe-stable-backport: Backported in 6.12.2" | ||
10549 | |||
10550 | CVE_STATUS[CVE-2024-56542] = "cpe-stable-backport: Backported in 6.12.2" | ||
10551 | |||
10552 | CVE_STATUS[CVE-2024-56543] = "cpe-stable-backport: Backported in 6.12.2" | ||
10553 | |||
10554 | CVE_STATUS[CVE-2024-56544] = "cpe-stable-backport: Backported in 6.12.2" | ||
10555 | |||
10556 | CVE_STATUS[CVE-2024-56545] = "cpe-stable-backport: Backported in 6.12.2" | ||
10557 | |||
10558 | CVE_STATUS[CVE-2024-56546] = "cpe-stable-backport: Backported in 6.12.2" | ||
10559 | |||
10560 | CVE_STATUS[CVE-2024-56547] = "cpe-stable-backport: Backported in 6.12.2" | ||
10561 | |||
10562 | CVE_STATUS[CVE-2024-56548] = "cpe-stable-backport: Backported in 6.12.2" | ||
10563 | |||
10564 | CVE_STATUS[CVE-2024-56549] = "cpe-stable-backport: Backported in 6.12.2" | ||
10565 | |||
10566 | CVE_STATUS[CVE-2024-56550] = "cpe-stable-backport: Backported in 6.12.4" | ||
10567 | |||
10568 | CVE_STATUS[CVE-2024-56551] = "cpe-stable-backport: Backported in 6.12.4" | ||
10569 | |||
10570 | CVE_STATUS[CVE-2024-56552] = "cpe-stable-backport: Backported in 6.12.4" | ||
10571 | |||
10572 | CVE_STATUS[CVE-2024-56553] = "cpe-stable-backport: Backported in 6.12.4" | ||
10573 | |||
10574 | CVE_STATUS[CVE-2024-56554] = "cpe-stable-backport: Backported in 6.12.4" | ||
10575 | |||
10576 | CVE_STATUS[CVE-2024-56555] = "cpe-stable-backport: Backported in 6.12.4" | ||
10577 | |||
10578 | CVE_STATUS[CVE-2024-56556] = "cpe-stable-backport: Backported in 6.12.4" | ||
10579 | |||
10580 | CVE_STATUS[CVE-2024-56557] = "cpe-stable-backport: Backported in 6.12.4" | ||
10581 | |||
10582 | CVE_STATUS[CVE-2024-56558] = "cpe-stable-backport: Backported in 6.12.4" | ||
10583 | |||
10584 | CVE_STATUS[CVE-2024-56559] = "cpe-stable-backport: Backported in 6.12.4" | ||
10585 | |||
10586 | CVE_STATUS[CVE-2024-56560] = "cpe-stable-backport: Backported in 6.12.4" | ||
10587 | |||
10588 | CVE_STATUS[CVE-2024-56561] = "cpe-stable-backport: Backported in 6.12.4" | ||
10589 | |||
10590 | CVE_STATUS[CVE-2024-56562] = "cpe-stable-backport: Backported in 6.12.4" | ||
10591 | |||
10592 | CVE_STATUS[CVE-2024-56563] = "cpe-stable-backport: Backported in 6.12.4" | ||
10593 | |||
10594 | CVE_STATUS[CVE-2024-56564] = "cpe-stable-backport: Backported in 6.12.4" | ||
10595 | |||
10596 | CVE_STATUS[CVE-2024-56565] = "cpe-stable-backport: Backported in 6.12.4" | ||
10597 | |||
10598 | CVE_STATUS[CVE-2024-56566] = "cpe-stable-backport: Backported in 6.12.4" | ||
10599 | |||
10600 | CVE_STATUS[CVE-2024-56567] = "cpe-stable-backport: Backported in 6.12.4" | ||
10601 | |||
10602 | CVE_STATUS[CVE-2024-56568] = "cpe-stable-backport: Backported in 6.12.4" | ||
10603 | |||
10604 | CVE_STATUS[CVE-2024-56569] = "cpe-stable-backport: Backported in 6.12.4" | ||
10605 | |||
10606 | CVE_STATUS[CVE-2024-56570] = "cpe-stable-backport: Backported in 6.12.4" | ||
10607 | |||
10608 | CVE_STATUS[CVE-2024-56572] = "cpe-stable-backport: Backported in 6.12.4" | ||
10609 | |||
10610 | CVE_STATUS[CVE-2024-56573] = "cpe-stable-backport: Backported in 6.12.4" | ||
10611 | |||
10612 | CVE_STATUS[CVE-2024-56574] = "cpe-stable-backport: Backported in 6.12.4" | ||
10613 | |||
10614 | CVE_STATUS[CVE-2024-56575] = "cpe-stable-backport: Backported in 6.12.4" | ||
10615 | |||
10616 | CVE_STATUS[CVE-2024-56576] = "cpe-stable-backport: Backported in 6.12.4" | ||
10617 | |||
10618 | CVE_STATUS[CVE-2024-56577] = "cpe-stable-backport: Backported in 6.12.4" | ||
10619 | |||
10620 | CVE_STATUS[CVE-2024-56578] = "cpe-stable-backport: Backported in 6.12.4" | ||
10621 | |||
10622 | CVE_STATUS[CVE-2024-56579] = "cpe-stable-backport: Backported in 6.12.4" | ||
10623 | |||
10624 | CVE_STATUS[CVE-2024-56580] = "cpe-stable-backport: Backported in 6.12.4" | ||
10625 | |||
10626 | CVE_STATUS[CVE-2024-56581] = "cpe-stable-backport: Backported in 6.12.4" | ||
10627 | |||
10628 | CVE_STATUS[CVE-2024-56582] = "cpe-stable-backport: Backported in 6.12.4" | ||
10629 | |||
10630 | CVE_STATUS[CVE-2024-56583] = "cpe-stable-backport: Backported in 6.12.5" | ||
10631 | |||
10632 | CVE_STATUS[CVE-2024-56584] = "cpe-stable-backport: Backported in 6.12.5" | ||
10633 | |||
10634 | CVE_STATUS[CVE-2024-56585] = "cpe-stable-backport: Backported in 6.12.5" | ||
10635 | |||
10636 | CVE_STATUS[CVE-2024-56586] = "cpe-stable-backport: Backported in 6.12.5" | ||
10637 | |||
10638 | CVE_STATUS[CVE-2024-56587] = "cpe-stable-backport: Backported in 6.12.5" | ||
10639 | |||
10640 | CVE_STATUS[CVE-2024-56588] = "cpe-stable-backport: Backported in 6.12.5" | ||
10641 | |||
10642 | CVE_STATUS[CVE-2024-56589] = "cpe-stable-backport: Backported in 6.12.5" | ||
10643 | |||
10644 | CVE_STATUS[CVE-2024-56590] = "cpe-stable-backport: Backported in 6.12.5" | ||
10645 | |||
10646 | CVE_STATUS[CVE-2024-56591] = "cpe-stable-backport: Backported in 6.12.5" | ||
10647 | |||
10648 | CVE_STATUS[CVE-2024-56592] = "cpe-stable-backport: Backported in 6.12.5" | ||
10649 | |||
10650 | CVE_STATUS[CVE-2024-56593] = "cpe-stable-backport: Backported in 6.12.5" | ||
10651 | |||
10652 | CVE_STATUS[CVE-2024-56594] = "cpe-stable-backport: Backported in 6.12.5" | ||
10653 | |||
10654 | CVE_STATUS[CVE-2024-56595] = "cpe-stable-backport: Backported in 6.12.5" | ||
10655 | |||
10656 | CVE_STATUS[CVE-2024-56596] = "cpe-stable-backport: Backported in 6.12.5" | ||
10657 | |||
10658 | CVE_STATUS[CVE-2024-56597] = "cpe-stable-backport: Backported in 6.12.5" | ||
10659 | |||
10660 | CVE_STATUS[CVE-2024-56598] = "cpe-stable-backport: Backported in 6.12.5" | ||
10661 | |||
10662 | CVE_STATUS[CVE-2024-56599] = "cpe-stable-backport: Backported in 6.12.5" | ||
10663 | |||
10664 | CVE_STATUS[CVE-2024-56600] = "cpe-stable-backport: Backported in 6.12.5" | ||
10665 | |||
10666 | CVE_STATUS[CVE-2024-56601] = "cpe-stable-backport: Backported in 6.12.5" | ||
10667 | |||
10668 | CVE_STATUS[CVE-2024-56602] = "cpe-stable-backport: Backported in 6.12.5" | ||
10669 | |||
10670 | CVE_STATUS[CVE-2024-56603] = "cpe-stable-backport: Backported in 6.12.5" | ||
10671 | |||
10672 | CVE_STATUS[CVE-2024-56604] = "cpe-stable-backport: Backported in 6.12.5" | ||
10673 | |||
10674 | CVE_STATUS[CVE-2024-56605] = "cpe-stable-backport: Backported in 6.12.5" | ||
10675 | |||
10676 | CVE_STATUS[CVE-2024-56606] = "cpe-stable-backport: Backported in 6.12.5" | ||
10677 | |||
10678 | CVE_STATUS[CVE-2024-56607] = "cpe-stable-backport: Backported in 6.12.5" | ||
10679 | |||
10680 | CVE_STATUS[CVE-2024-56608] = "cpe-stable-backport: Backported in 6.12.5" | ||
10681 | |||
10682 | CVE_STATUS[CVE-2024-56609] = "cpe-stable-backport: Backported in 6.12.5" | ||
10683 | |||
10684 | CVE_STATUS[CVE-2024-56610] = "cpe-stable-backport: Backported in 6.12.5" | ||
10685 | |||
10686 | CVE_STATUS[CVE-2024-56611] = "cpe-stable-backport: Backported in 6.12.5" | ||
10687 | |||
10688 | CVE_STATUS[CVE-2024-56612] = "cpe-stable-backport: Backported in 6.12.5" | ||
10689 | |||
10690 | CVE_STATUS[CVE-2024-56613] = "cpe-stable-backport: Backported in 6.12.5" | ||
10691 | |||
10692 | CVE_STATUS[CVE-2024-56614] = "cpe-stable-backport: Backported in 6.12.5" | ||
10693 | |||
10694 | CVE_STATUS[CVE-2024-56615] = "cpe-stable-backport: Backported in 6.12.5" | ||
10695 | |||
10696 | CVE_STATUS[CVE-2024-56616] = "cpe-stable-backport: Backported in 6.12.5" | ||
10697 | |||
10698 | CVE_STATUS[CVE-2024-56617] = "cpe-stable-backport: Backported in 6.12.5" | ||
10699 | |||
10700 | CVE_STATUS[CVE-2024-56618] = "cpe-stable-backport: Backported in 6.12.5" | ||
10701 | |||
10702 | CVE_STATUS[CVE-2024-56619] = "cpe-stable-backport: Backported in 6.12.5" | ||
10703 | |||
10704 | CVE_STATUS[CVE-2024-56620] = "cpe-stable-backport: Backported in 6.12.5" | ||
10705 | |||
10706 | CVE_STATUS[CVE-2024-56621] = "cpe-stable-backport: Backported in 6.12.5" | ||
10707 | |||
10708 | CVE_STATUS[CVE-2024-56622] = "cpe-stable-backport: Backported in 6.12.5" | ||
10709 | |||
10710 | CVE_STATUS[CVE-2024-56623] = "cpe-stable-backport: Backported in 6.12.5" | ||
10711 | |||
10712 | CVE_STATUS[CVE-2024-56624] = "cpe-stable-backport: Backported in 6.12.5" | ||
10713 | |||
10714 | CVE_STATUS[CVE-2024-56625] = "cpe-stable-backport: Backported in 6.12.5" | ||
10715 | |||
10716 | CVE_STATUS[CVE-2024-56626] = "cpe-stable-backport: Backported in 6.12.5" | ||
10717 | |||
10718 | CVE_STATUS[CVE-2024-56627] = "cpe-stable-backport: Backported in 6.12.5" | ||
10719 | |||
10720 | CVE_STATUS[CVE-2024-56628] = "cpe-stable-backport: Backported in 6.12.5" | ||
10721 | |||
10722 | CVE_STATUS[CVE-2024-56629] = "cpe-stable-backport: Backported in 6.12.5" | ||
10723 | |||
10724 | CVE_STATUS[CVE-2024-56630] = "cpe-stable-backport: Backported in 6.12.5" | ||
10725 | |||
10726 | CVE_STATUS[CVE-2024-56631] = "cpe-stable-backport: Backported in 6.12.5" | ||
10727 | |||
10728 | CVE_STATUS[CVE-2024-56632] = "cpe-stable-backport: Backported in 6.12.5" | ||
10729 | |||
10730 | CVE_STATUS[CVE-2024-56633] = "cpe-stable-backport: Backported in 6.12.5" | ||
10731 | |||
10732 | CVE_STATUS[CVE-2024-56634] = "cpe-stable-backport: Backported in 6.12.5" | ||
10733 | |||
10734 | CVE_STATUS[CVE-2024-56635] = "cpe-stable-backport: Backported in 6.12.5" | ||
10735 | |||
10736 | CVE_STATUS[CVE-2024-56636] = "cpe-stable-backport: Backported in 6.12.5" | ||
10737 | |||
10738 | CVE_STATUS[CVE-2024-56637] = "cpe-stable-backport: Backported in 6.12.5" | ||
10739 | |||
10740 | CVE_STATUS[CVE-2024-56638] = "cpe-stable-backport: Backported in 6.12.5" | ||
10741 | |||
10742 | CVE_STATUS[CVE-2024-56639] = "cpe-stable-backport: Backported in 6.12.5" | ||
10743 | |||
10744 | CVE_STATUS[CVE-2024-56640] = "cpe-stable-backport: Backported in 6.12.5" | ||
10745 | |||
10746 | CVE_STATUS[CVE-2024-56641] = "cpe-stable-backport: Backported in 6.12.5" | ||
10747 | |||
10748 | CVE_STATUS[CVE-2024-56642] = "cpe-stable-backport: Backported in 6.12.5" | ||
10749 | |||
10750 | CVE_STATUS[CVE-2024-56643] = "cpe-stable-backport: Backported in 6.12.5" | ||
10751 | |||
10752 | CVE_STATUS[CVE-2024-56644] = "cpe-stable-backport: Backported in 6.12.5" | ||
10753 | |||
10754 | CVE_STATUS[CVE-2024-56645] = "cpe-stable-backport: Backported in 6.12.5" | ||
10755 | |||
10756 | CVE_STATUS[CVE-2024-56646] = "cpe-stable-backport: Backported in 6.12.5" | ||
10757 | |||
10758 | CVE_STATUS[CVE-2024-56647] = "cpe-stable-backport: Backported in 6.12.5" | ||
10759 | |||
10760 | CVE_STATUS[CVE-2024-56648] = "cpe-stable-backport: Backported in 6.12.5" | ||
10761 | |||
10762 | CVE_STATUS[CVE-2024-56649] = "cpe-stable-backport: Backported in 6.12.5" | ||
10763 | |||
10764 | CVE_STATUS[CVE-2024-56650] = "cpe-stable-backport: Backported in 6.12.5" | ||
10765 | |||
10766 | CVE_STATUS[CVE-2024-56651] = "cpe-stable-backport: Backported in 6.12.5" | ||
10767 | |||
10768 | CVE_STATUS[CVE-2024-56652] = "cpe-stable-backport: Backported in 6.12.6" | ||
10769 | |||
10770 | CVE_STATUS[CVE-2024-56653] = "cpe-stable-backport: Backported in 6.12.6" | ||
10771 | |||
10772 | CVE_STATUS[CVE-2024-56654] = "cpe-stable-backport: Backported in 6.12.6" | ||
10773 | |||
10774 | CVE_STATUS[CVE-2024-56655] = "cpe-stable-backport: Backported in 6.12.6" | ||
10775 | |||
10776 | CVE_STATUS[CVE-2024-56656] = "cpe-stable-backport: Backported in 6.12.6" | ||
10777 | |||
10778 | CVE_STATUS[CVE-2024-56657] = "cpe-stable-backport: Backported in 6.12.6" | ||
10779 | |||
10780 | CVE_STATUS[CVE-2024-56658] = "cpe-stable-backport: Backported in 6.12.6" | ||
10781 | |||
10782 | CVE_STATUS[CVE-2024-56659] = "cpe-stable-backport: Backported in 6.12.6" | ||
10783 | |||
10784 | CVE_STATUS[CVE-2024-56660] = "cpe-stable-backport: Backported in 6.12.6" | ||
10785 | |||
10786 | CVE_STATUS[CVE-2024-56661] = "fixed-version: Fixed from version 6.12.6" | ||
10787 | |||
10788 | CVE_STATUS[CVE-2024-56662] = "cpe-stable-backport: Backported in 6.12.6" | ||
10789 | |||
10790 | CVE_STATUS[CVE-2024-56663] = "cpe-stable-backport: Backported in 6.12.6" | ||
10791 | |||
10792 | CVE_STATUS[CVE-2024-56664] = "cpe-stable-backport: Backported in 6.12.6" | ||
10793 | |||
10794 | CVE_STATUS[CVE-2024-56665] = "cpe-stable-backport: Backported in 6.12.6" | ||
10795 | |||
10796 | CVE_STATUS[CVE-2024-56666] = "cpe-stable-backport: Backported in 6.12.6" | ||
10797 | |||
10798 | CVE_STATUS[CVE-2024-56667] = "cpe-stable-backport: Backported in 6.12.6" | ||
10799 | |||
10800 | CVE_STATUS[CVE-2024-56668] = "cpe-stable-backport: Backported in 6.12.6" | ||
10801 | |||
10802 | CVE_STATUS[CVE-2024-56669] = "cpe-stable-backport: Backported in 6.12.6" | ||
10803 | |||
10804 | CVE_STATUS[CVE-2024-56670] = "cpe-stable-backport: Backported in 6.12.6" | ||
10805 | |||
10806 | CVE_STATUS[CVE-2024-56671] = "cpe-stable-backport: Backported in 6.12.6" | ||
10807 | |||
10808 | CVE_STATUS[CVE-2024-56672] = "cpe-stable-backport: Backported in 6.12.6" | ||
10809 | |||
10810 | CVE_STATUS[CVE-2024-56673] = "cpe-stable-backport: Backported in 6.12.6" | ||
10811 | |||
10812 | CVE_STATUS[CVE-2024-56674] = "cpe-stable-backport: Backported in 6.12.6" | ||
10813 | |||
10814 | CVE_STATUS[CVE-2024-56675] = "cpe-stable-backport: Backported in 6.12.6" | ||
10815 | |||
10816 | CVE_STATUS[CVE-2024-56676] = "cpe-stable-backport: Backported in 6.12.2" | ||
10817 | |||
10818 | CVE_STATUS[CVE-2024-56677] = "cpe-stable-backport: Backported in 6.12.2" | ||
10819 | |||
10820 | CVE_STATUS[CVE-2024-56678] = "cpe-stable-backport: Backported in 6.12.2" | ||
10821 | |||
10822 | CVE_STATUS[CVE-2024-56679] = "cpe-stable-backport: Backported in 6.12.2" | ||
10823 | |||
10824 | CVE_STATUS[CVE-2024-56680] = "cpe-stable-backport: Backported in 6.12.2" | ||
10825 | |||
10826 | CVE_STATUS[CVE-2024-56681] = "cpe-stable-backport: Backported in 6.12.2" | ||
10827 | |||
10828 | CVE_STATUS[CVE-2024-56682] = "cpe-stable-backport: Backported in 6.12.2" | ||
10829 | |||
10830 | CVE_STATUS[CVE-2024-56683] = "cpe-stable-backport: Backported in 6.12.2" | ||
10831 | |||
10832 | CVE_STATUS[CVE-2024-56684] = "cpe-stable-backport: Backported in 6.12.2" | ||
10833 | |||
10834 | CVE_STATUS[CVE-2024-56685] = "cpe-stable-backport: Backported in 6.12.2" | ||
10835 | |||
10836 | CVE_STATUS[CVE-2024-56687] = "cpe-stable-backport: Backported in 6.12.2" | ||
10837 | |||
10838 | CVE_STATUS[CVE-2024-56688] = "cpe-stable-backport: Backported in 6.12.2" | ||
10839 | |||
10840 | CVE_STATUS[CVE-2024-56689] = "cpe-stable-backport: Backported in 6.12.2" | ||
10841 | |||
10842 | CVE_STATUS[CVE-2024-56690] = "cpe-stable-backport: Backported in 6.12.2" | ||
10843 | |||
10844 | CVE_STATUS[CVE-2024-56691] = "cpe-stable-backport: Backported in 6.12.2" | ||
10845 | |||
10846 | CVE_STATUS[CVE-2024-56692] = "cpe-stable-backport: Backported in 6.12.2" | ||
10847 | |||
10848 | CVE_STATUS[CVE-2024-56693] = "cpe-stable-backport: Backported in 6.12.2" | ||
10849 | |||
10850 | CVE_STATUS[CVE-2024-56694] = "cpe-stable-backport: Backported in 6.12.2" | ||
10851 | |||
10852 | CVE_STATUS[CVE-2024-56695] = "cpe-stable-backport: Backported in 6.12.2" | ||
10853 | |||
10854 | CVE_STATUS[CVE-2024-56696] = "cpe-stable-backport: Backported in 6.12.2" | ||
10855 | |||
10856 | CVE_STATUS[CVE-2024-56697] = "cpe-stable-backport: Backported in 6.12.2" | ||
10857 | |||
10858 | CVE_STATUS[CVE-2024-56698] = "cpe-stable-backport: Backported in 6.12.2" | ||
10859 | |||
10860 | CVE_STATUS[CVE-2024-56699] = "cpe-stable-backport: Backported in 6.12.2" | ||
10861 | |||
10862 | CVE_STATUS[CVE-2024-56700] = "cpe-stable-backport: Backported in 6.12.2" | ||
10863 | |||
10864 | CVE_STATUS[CVE-2024-56701] = "cpe-stable-backport: Backported in 6.12.2" | ||
10865 | |||
10866 | CVE_STATUS[CVE-2024-56702] = "cpe-stable-backport: Backported in 6.12.2" | ||
10867 | |||
10868 | CVE_STATUS[CVE-2024-56703] = "cpe-stable-backport: Backported in 6.12.2" | ||
10869 | |||
10870 | CVE_STATUS[CVE-2024-56704] = "cpe-stable-backport: Backported in 6.12.2" | ||
10871 | |||
10872 | CVE_STATUS[CVE-2024-56705] = "cpe-stable-backport: Backported in 6.12.2" | ||
10873 | |||
10874 | CVE_STATUS[CVE-2024-56706] = "cpe-stable-backport: Backported in 6.12.2" | ||
10875 | |||
10876 | CVE_STATUS[CVE-2024-56707] = "cpe-stable-backport: Backported in 6.12.2" | ||
10877 | |||
10878 | CVE_STATUS[CVE-2024-56708] = "cpe-stable-backport: Backported in 6.12.2" | ||
10879 | |||
10880 | CVE_STATUS[CVE-2024-56709] = "cpe-stable-backport: Backported in 6.12.7" | ||
10881 | |||
10882 | CVE_STATUS[CVE-2024-56710] = "cpe-stable-backport: Backported in 6.12.7" | ||
10883 | |||
10884 | CVE_STATUS[CVE-2024-56711] = "cpe-stable-backport: Backported in 6.12.7" | ||
10885 | |||
10886 | CVE_STATUS[CVE-2024-56712] = "cpe-stable-backport: Backported in 6.12.7" | ||
10887 | |||
10888 | CVE_STATUS[CVE-2024-56713] = "cpe-stable-backport: Backported in 6.12.7" | ||
10889 | |||
10890 | CVE_STATUS[CVE-2024-56714] = "cpe-stable-backport: Backported in 6.12.7" | ||
10891 | |||
10892 | CVE_STATUS[CVE-2024-56715] = "cpe-stable-backport: Backported in 6.12.7" | ||
10893 | |||
10894 | CVE_STATUS[CVE-2024-56716] = "cpe-stable-backport: Backported in 6.12.7" | ||
10895 | |||
10896 | CVE_STATUS[CVE-2024-56717] = "cpe-stable-backport: Backported in 6.12.7" | ||
10897 | |||
10898 | CVE_STATUS[CVE-2024-56718] = "cpe-stable-backport: Backported in 6.12.7" | ||
10899 | |||
10900 | CVE_STATUS[CVE-2024-56719] = "cpe-stable-backport: Backported in 6.12.7" | ||
10901 | |||
10902 | CVE_STATUS[CVE-2024-56720] = "cpe-stable-backport: Backported in 6.12.2" | ||
10903 | |||
10904 | CVE_STATUS[CVE-2024-56721] = "cpe-stable-backport: Backported in 6.12.2" | ||
10905 | |||
10906 | CVE_STATUS[CVE-2024-56722] = "cpe-stable-backport: Backported in 6.12.2" | ||
10907 | |||
10908 | CVE_STATUS[CVE-2024-56723] = "cpe-stable-backport: Backported in 6.12.2" | ||
10909 | |||
10910 | CVE_STATUS[CVE-2024-56724] = "cpe-stable-backport: Backported in 6.12.2" | ||
10911 | |||
10912 | CVE_STATUS[CVE-2024-56725] = "cpe-stable-backport: Backported in 6.12.2" | ||
10913 | |||
10914 | CVE_STATUS[CVE-2024-56726] = "cpe-stable-backport: Backported in 6.12.2" | ||
10915 | |||
10916 | CVE_STATUS[CVE-2024-56727] = "cpe-stable-backport: Backported in 6.12.2" | ||
10917 | |||
10918 | CVE_STATUS[CVE-2024-56728] = "cpe-stable-backport: Backported in 6.12.2" | ||
10919 | |||
10920 | CVE_STATUS[CVE-2024-56729] = "cpe-stable-backport: Backported in 6.12.2" | ||
10921 | |||
10922 | CVE_STATUS[CVE-2024-56730] = "cpe-stable-backport: Backported in 6.12.2" | ||
10923 | |||
10924 | CVE_STATUS[CVE-2024-56739] = "cpe-stable-backport: Backported in 6.12.2" | ||
10925 | |||
10926 | CVE_STATUS[CVE-2024-56740] = "cpe-stable-backport: Backported in 6.12.2" | ||
10927 | |||
10928 | CVE_STATUS[CVE-2024-56742] = "cpe-stable-backport: Backported in 6.12.2" | ||
10929 | |||
10930 | CVE_STATUS[CVE-2024-56743] = "cpe-stable-backport: Backported in 6.12.2" | ||
10931 | |||
10932 | CVE_STATUS[CVE-2024-56744] = "cpe-stable-backport: Backported in 6.12.2" | ||
10933 | |||
10934 | CVE_STATUS[CVE-2024-56745] = "cpe-stable-backport: Backported in 6.12.2" | ||
10935 | |||
10936 | CVE_STATUS[CVE-2024-56746] = "cpe-stable-backport: Backported in 6.12.2" | ||
10937 | |||
10938 | CVE_STATUS[CVE-2024-56747] = "cpe-stable-backport: Backported in 6.12.2" | ||
10939 | |||
10940 | CVE_STATUS[CVE-2024-56748] = "cpe-stable-backport: Backported in 6.12.2" | ||
10941 | |||
10942 | CVE_STATUS[CVE-2024-56749] = "cpe-stable-backport: Backported in 6.12.2" | ||
10943 | |||
10944 | CVE_STATUS[CVE-2024-56750] = "cpe-stable-backport: Backported in 6.12.2" | ||
10945 | |||
10946 | CVE_STATUS[CVE-2024-56751] = "cpe-stable-backport: Backported in 6.12.2" | ||
10947 | |||
10948 | CVE_STATUS[CVE-2024-56752] = "cpe-stable-backport: Backported in 6.12.2" | ||
10949 | |||
10950 | CVE_STATUS[CVE-2024-56753] = "cpe-stable-backport: Backported in 6.12.2" | ||
10951 | |||
10952 | CVE_STATUS[CVE-2024-56754] = "cpe-stable-backport: Backported in 6.12.2" | ||
10953 | |||
10954 | CVE_STATUS[CVE-2024-56755] = "cpe-stable-backport: Backported in 6.12.2" | ||
10955 | |||
10956 | CVE_STATUS[CVE-2024-56756] = "cpe-stable-backport: Backported in 6.12.2" | ||
10957 | |||
10958 | CVE_STATUS[CVE-2024-56757] = "cpe-stable-backport: Backported in 6.12.8" | ||
10959 | |||
10960 | CVE_STATUS[CVE-2024-56758] = "cpe-stable-backport: Backported in 6.12.8" | ||
10961 | |||
10962 | CVE_STATUS[CVE-2024-56759] = "cpe-stable-backport: Backported in 6.12.8" | ||
10963 | |||
10964 | CVE_STATUS[CVE-2024-56760] = "cpe-stable-backport: Backported in 6.12.8" | ||
10965 | |||
10966 | CVE_STATUS[CVE-2024-56761] = "cpe-stable-backport: Backported in 6.12.8" | ||
10967 | |||
10968 | CVE_STATUS[CVE-2024-56763] = "cpe-stable-backport: Backported in 6.12.8" | ||
10969 | |||
10970 | CVE_STATUS[CVE-2024-56764] = "cpe-stable-backport: Backported in 6.12.8" | ||
10971 | |||
10972 | CVE_STATUS[CVE-2024-56765] = "cpe-stable-backport: Backported in 6.12.8" | ||
10973 | |||
10974 | CVE_STATUS[CVE-2024-56766] = "fixed-version: Fixed from version 6.12.8" | ||
10975 | |||
10976 | CVE_STATUS[CVE-2024-56767] = "cpe-stable-backport: Backported in 6.12.8" | ||
10977 | |||
10978 | CVE_STATUS[CVE-2024-56768] = "cpe-stable-backport: Backported in 6.12.8" | ||
10979 | |||
10980 | CVE_STATUS[CVE-2024-56769] = "cpe-stable-backport: Backported in 6.12.8" | ||
10981 | |||
10982 | CVE_STATUS[CVE-2024-56770] = "cpe-stable-backport: Backported in 6.12.6" | ||
10983 | |||
10984 | CVE_STATUS[CVE-2024-56771] = "cpe-stable-backport: Backported in 6.12.4" | ||
10985 | |||
10986 | CVE_STATUS[CVE-2024-56772] = "cpe-stable-backport: Backported in 6.12.4" | ||
10987 | |||
10988 | CVE_STATUS[CVE-2024-56773] = "cpe-stable-backport: Backported in 6.12.4" | ||
10989 | |||
10990 | CVE_STATUS[CVE-2024-56774] = "cpe-stable-backport: Backported in 6.12.4" | ||
10991 | |||
10992 | CVE_STATUS[CVE-2024-56775] = "cpe-stable-backport: Backported in 6.12.4" | ||
10993 | |||
10994 | CVE_STATUS[CVE-2024-56776] = "cpe-stable-backport: Backported in 6.12.4" | ||
10995 | |||
10996 | CVE_STATUS[CVE-2024-56777] = "cpe-stable-backport: Backported in 6.12.4" | ||
10997 | |||
10998 | CVE_STATUS[CVE-2024-56778] = "cpe-stable-backport: Backported in 6.12.4" | ||
10999 | |||
11000 | CVE_STATUS[CVE-2024-56779] = "cpe-stable-backport: Backported in 6.12.4" | ||
11001 | |||
11002 | CVE_STATUS[CVE-2024-56780] = "cpe-stable-backport: Backported in 6.12.4" | ||
11003 | |||
11004 | CVE_STATUS[CVE-2024-56781] = "cpe-stable-backport: Backported in 6.12.5" | ||
11005 | |||
11006 | CVE_STATUS[CVE-2024-56782] = "cpe-stable-backport: Backported in 6.12.5" | ||
11007 | |||
11008 | CVE_STATUS[CVE-2024-56783] = "cpe-stable-backport: Backported in 6.12.5" | ||
11009 | |||
11010 | CVE_STATUS[CVE-2024-56784] = "cpe-stable-backport: Backported in 6.12.5" | ||
11011 | |||
11012 | CVE_STATUS[CVE-2024-56785] = "cpe-stable-backport: Backported in 6.12.5" | ||
11013 | |||
11014 | CVE_STATUS[CVE-2024-56786] = "cpe-stable-backport: Backported in 6.12.5" | ||
11015 | |||
11016 | CVE_STATUS[CVE-2024-56787] = "cpe-stable-backport: Backported in 6.12.5" | ||
11017 | |||
11018 | CVE_STATUS[CVE-2024-56788] = "cpe-stable-backport: Backported in 6.12.7" | ||
11019 | |||
11020 | CVE_STATUS[CVE-2024-57791] = "cpe-stable-backport: Backported in 6.12.7" | ||
11021 | |||
11022 | CVE_STATUS[CVE-2024-57792] = "cpe-stable-backport: Backported in 6.12.8" | ||
11023 | |||
11024 | CVE_STATUS[CVE-2024-57793] = "cpe-stable-backport: Backported in 6.12.8" | ||
11025 | |||
11026 | CVE_STATUS[CVE-2024-57795] = "cpe-stable-backport: Backported in 6.12.9" | ||
11027 | |||
11028 | CVE_STATUS[CVE-2024-57798] = "cpe-stable-backport: Backported in 6.12.8" | ||
11029 | |||
11030 | CVE_STATUS[CVE-2024-57799] = "cpe-stable-backport: Backported in 6.12.8" | ||
11031 | |||
11032 | CVE_STATUS[CVE-2024-57800] = "cpe-stable-backport: Backported in 6.12.8" | ||
11033 | |||
11034 | CVE_STATUS[CVE-2024-57801] = "cpe-stable-backport: Backported in 6.12.9" | ||
11035 | |||
11036 | CVE_STATUS[CVE-2024-57802] = "cpe-stable-backport: Backported in 6.12.9" | ||
11037 | |||
11038 | CVE_STATUS[CVE-2024-57804] = "cpe-stable-backport: Backported in 6.12.8" | ||
11039 | |||
11040 | CVE_STATUS[CVE-2024-57805] = "cpe-stable-backport: Backported in 6.12.8" | ||
11041 | |||
11042 | CVE_STATUS[CVE-2024-57806] = "cpe-stable-backport: Backported in 6.12.8" | ||
11043 | |||
11044 | CVE_STATUS[CVE-2024-57807] = "cpe-stable-backport: Backported in 6.12.8" | ||
11045 | |||
11046 | CVE_STATUS[CVE-2024-57809] = "cpe-stable-backport: Backported in 6.12.4" | ||
11047 | |||
11048 | CVE_STATUS[CVE-2024-57834] = "cpe-stable-backport: Backported in 6.12.16" | ||
11049 | |||
11050 | CVE_STATUS[CVE-2024-57838] = "cpe-stable-backport: Backported in 6.12.4" | ||
11051 | |||
11052 | CVE_STATUS[CVE-2024-57839] = "cpe-stable-backport: Backported in 6.12.5" | ||
11053 | |||
11054 | CVE_STATUS[CVE-2024-57841] = "cpe-stable-backport: Backported in 6.12.9" | ||
11055 | |||
11056 | CVE_STATUS[CVE-2024-57843] = "cpe-stable-backport: Backported in 6.12.5" | ||
11057 | |||
11058 | CVE_STATUS[CVE-2024-57844] = "cpe-stable-backport: Backported in 6.12.9" | ||
11059 | |||
11060 | CVE_STATUS[CVE-2024-57849] = "cpe-stable-backport: Backported in 6.12.5" | ||
11061 | |||
11062 | CVE_STATUS[CVE-2024-57850] = "cpe-stable-backport: Backported in 6.12.5" | ||
11063 | |||
11064 | CVE_STATUS[CVE-2024-57852] = "cpe-stable-backport: Backported in 6.12.16" | ||
11065 | |||
11066 | CVE_STATUS[CVE-2024-57857] = "cpe-stable-backport: Backported in 6.12.9" | ||
11067 | |||
11068 | CVE_STATUS[CVE-2024-57872] = "cpe-stable-backport: Backported in 6.12.5" | ||
11069 | |||
11070 | CVE_STATUS[CVE-2024-57874] = "cpe-stable-backport: Backported in 6.12.5" | ||
11071 | |||
11072 | CVE_STATUS[CVE-2024-57875] = "cpe-stable-backport: Backported in 6.12.5" | ||
11073 | |||
11074 | CVE_STATUS[CVE-2024-57876] = "cpe-stable-backport: Backported in 6.12.5" | ||
11075 | |||
11076 | CVE_STATUS[CVE-2024-57877] = "cpe-stable-backport: Backported in 6.12.5" | ||
11077 | |||
11078 | CVE_STATUS[CVE-2024-57878] = "cpe-stable-backport: Backported in 6.12.5" | ||
11079 | |||
11080 | CVE_STATUS[CVE-2024-57879] = "cpe-stable-backport: Backported in 6.12.6" | ||
11081 | |||
11082 | CVE_STATUS[CVE-2024-57880] = "cpe-stable-backport: Backported in 6.12.6" | ||
11083 | |||
11084 | CVE_STATUS[CVE-2024-57881] = "cpe-stable-backport: Backported in 6.12.7" | ||
11085 | |||
11086 | CVE_STATUS[CVE-2024-57882] = "cpe-stable-backport: Backported in 6.12.9" | ||
11087 | |||
11088 | CVE_STATUS[CVE-2024-57883] = "cpe-stable-backport: Backported in 6.12.9" | ||
11089 | |||
11090 | CVE_STATUS[CVE-2024-57884] = "cpe-stable-backport: Backported in 6.12.9" | ||
11091 | |||
11092 | CVE_STATUS[CVE-2024-57885] = "cpe-stable-backport: Backported in 6.12.9" | ||
11093 | |||
11094 | CVE_STATUS[CVE-2024-57886] = "cpe-stable-backport: Backported in 6.12.9" | ||
11095 | |||
11096 | CVE_STATUS[CVE-2024-57887] = "cpe-stable-backport: Backported in 6.12.9" | ||
11097 | |||
11098 | CVE_STATUS[CVE-2024-57888] = "cpe-stable-backport: Backported in 6.12.9" | ||
11099 | |||
11100 | CVE_STATUS[CVE-2024-57889] = "cpe-stable-backport: Backported in 6.12.9" | ||
11101 | |||
11102 | CVE_STATUS[CVE-2024-57890] = "cpe-stable-backport: Backported in 6.12.9" | ||
11103 | |||
11104 | CVE_STATUS[CVE-2024-57891] = "cpe-stable-backport: Backported in 6.12.9" | ||
11105 | |||
11106 | CVE_STATUS[CVE-2024-57892] = "cpe-stable-backport: Backported in 6.12.9" | ||
11107 | |||
11108 | CVE_STATUS[CVE-2024-57893] = "cpe-stable-backport: Backported in 6.12.9" | ||
11109 | |||
11110 | CVE_STATUS[CVE-2024-57895] = "cpe-stable-backport: Backported in 6.12.9" | ||
11111 | |||
11112 | CVE_STATUS[CVE-2024-57896] = "cpe-stable-backport: Backported in 6.12.9" | ||
11113 | |||
11114 | CVE_STATUS[CVE-2024-57897] = "cpe-stable-backport: Backported in 6.12.9" | ||
11115 | |||
11116 | CVE_STATUS[CVE-2024-57898] = "cpe-stable-backport: Backported in 6.12.9" | ||
11117 | |||
11118 | CVE_STATUS[CVE-2024-57899] = "cpe-stable-backport: Backported in 6.12.9" | ||
11119 | |||
11120 | CVE_STATUS[CVE-2024-57900] = "cpe-stable-backport: Backported in 6.12.9" | ||
11121 | |||
11122 | CVE_STATUS[CVE-2024-57901] = "cpe-stable-backport: Backported in 6.12.9" | ||
11123 | |||
11124 | CVE_STATUS[CVE-2024-57902] = "cpe-stable-backport: Backported in 6.12.9" | ||
11125 | |||
11126 | CVE_STATUS[CVE-2024-57903] = "cpe-stable-backport: Backported in 6.12.9" | ||
11127 | |||
11128 | CVE_STATUS[CVE-2024-57904] = "cpe-stable-backport: Backported in 6.12.10" | ||
11129 | |||
11130 | CVE_STATUS[CVE-2024-57905] = "cpe-stable-backport: Backported in 6.12.10" | ||
11131 | |||
11132 | CVE_STATUS[CVE-2024-57906] = "cpe-stable-backport: Backported in 6.12.10" | ||
11133 | |||
11134 | CVE_STATUS[CVE-2024-57907] = "cpe-stable-backport: Backported in 6.12.10" | ||
11135 | |||
11136 | CVE_STATUS[CVE-2024-57908] = "cpe-stable-backport: Backported in 6.12.10" | ||
11137 | |||
11138 | CVE_STATUS[CVE-2024-57909] = "cpe-stable-backport: Backported in 6.12.10" | ||
11139 | |||
11140 | CVE_STATUS[CVE-2024-57910] = "cpe-stable-backport: Backported in 6.12.10" | ||
11141 | |||
11142 | CVE_STATUS[CVE-2024-57911] = "cpe-stable-backport: Backported in 6.12.10" | ||
11143 | |||
11144 | CVE_STATUS[CVE-2024-57912] = "cpe-stable-backport: Backported in 6.12.10" | ||
11145 | |||
11146 | CVE_STATUS[CVE-2024-57913] = "cpe-stable-backport: Backported in 6.12.10" | ||
11147 | |||
11148 | CVE_STATUS[CVE-2024-57914] = "cpe-stable-backport: Backported in 6.12.10" | ||
11149 | |||
11150 | CVE_STATUS[CVE-2024-57916] = "cpe-stable-backport: Backported in 6.12.10" | ||
11151 | |||
11152 | CVE_STATUS[CVE-2024-57917] = "cpe-stable-backport: Backported in 6.12.10" | ||
11153 | |||
11154 | CVE_STATUS[CVE-2024-57918] = "cpe-stable-backport: Backported in 6.12.10" | ||
11155 | |||
11156 | CVE_STATUS[CVE-2024-57919] = "cpe-stable-backport: Backported in 6.12.10" | ||
11157 | |||
11158 | # CVE-2024-57920 has no known resolution | ||
11159 | |||
11160 | CVE_STATUS[CVE-2024-57921] = "cpe-stable-backport: Backported in 6.12.10" | ||
11161 | |||
11162 | CVE_STATUS[CVE-2024-57922] = "cpe-stable-backport: Backported in 6.12.10" | ||
11163 | |||
11164 | CVE_STATUS[CVE-2024-57923] = "cpe-stable-backport: Backported in 6.12.10" | ||
11165 | |||
11166 | CVE_STATUS[CVE-2024-57924] = "cpe-stable-backport: Backported in 6.12.10" | ||
11167 | |||
11168 | CVE_STATUS[CVE-2024-57925] = "cpe-stable-backport: Backported in 6.12.10" | ||
11169 | |||
11170 | CVE_STATUS[CVE-2024-57926] = "cpe-stable-backport: Backported in 6.12.10" | ||
11171 | |||
11172 | CVE_STATUS[CVE-2024-57927] = "cpe-stable-backport: Backported in 6.12.10" | ||
11173 | |||
11174 | CVE_STATUS[CVE-2024-57928] = "cpe-stable-backport: Backported in 6.12.10" | ||
11175 | |||
11176 | CVE_STATUS[CVE-2024-57929] = "cpe-stable-backport: Backported in 6.12.10" | ||
11177 | |||
11178 | CVE_STATUS[CVE-2024-57930] = "fixed-version: Fixed from version 6.12.9" | ||
11179 | |||
11180 | CVE_STATUS[CVE-2024-57931] = "cpe-stable-backport: Backported in 6.12.9" | ||
11181 | |||
11182 | CVE_STATUS[CVE-2024-57932] = "cpe-stable-backport: Backported in 6.12.9" | ||
11183 | |||
11184 | CVE_STATUS[CVE-2024-57933] = "cpe-stable-backport: Backported in 6.12.9" | ||
11185 | |||
11186 | CVE_STATUS[CVE-2024-57934] = "cpe-stable-backport: Backported in 6.12.9" | ||
11187 | |||
11188 | CVE_STATUS[CVE-2024-57935] = "fixed-version: Fixed from version 6.12.9" | ||
11189 | |||
11190 | CVE_STATUS[CVE-2024-57936] = "cpe-stable-backport: Backported in 6.12.9" | ||
11191 | |||
11192 | CVE_STATUS[CVE-2024-57938] = "cpe-stable-backport: Backported in 6.12.9" | ||
11193 | |||
11194 | CVE_STATUS[CVE-2024-57939] = "cpe-stable-backport: Backported in 6.12.10" | ||
11195 | |||
11196 | CVE_STATUS[CVE-2024-57940] = "cpe-stable-backport: Backported in 6.12.10" | ||
11197 | |||
11198 | CVE_STATUS[CVE-2024-57941] = "cpe-stable-backport: Backported in 6.12.10" | ||
11199 | |||
11200 | CVE_STATUS[CVE-2024-57942] = "cpe-stable-backport: Backported in 6.12.10" | ||
11201 | |||
11202 | CVE_STATUS[CVE-2024-57943] = "cpe-stable-backport: Backported in 6.12.10" | ||
11203 | |||
11204 | CVE_STATUS[CVE-2024-57944] = "cpe-stable-backport: Backported in 6.12.10" | ||
11205 | |||
11206 | CVE_STATUS[CVE-2024-57945] = "cpe-stable-backport: Backported in 6.12.10" | ||
11207 | |||
11208 | CVE_STATUS[CVE-2024-57946] = "cpe-stable-backport: Backported in 6.12.8" | ||
11209 | |||
11210 | CVE_STATUS[CVE-2024-57947] = "fixed-version: Fixed from version 6.11" | ||
11211 | |||
11212 | CVE_STATUS[CVE-2024-57948] = "cpe-stable-backport: Backported in 6.12.11" | ||
11213 | |||
11214 | CVE_STATUS[CVE-2024-57949] = "cpe-stable-backport: Backported in 6.12.11" | ||
11215 | |||
11216 | CVE_STATUS[CVE-2024-57950] = "cpe-stable-backport: Backported in 6.12.12" | ||
11217 | |||
11218 | CVE_STATUS[CVE-2024-57951] = "cpe-stable-backport: Backported in 6.12.11" | ||
11219 | |||
11220 | CVE_STATUS[CVE-2024-57952] = "cpe-stable-backport: Backported in 6.12.12" | ||
11221 | |||
11222 | CVE_STATUS[CVE-2024-57953] = "cpe-stable-backport: Backported in 6.12.13" | ||
11223 | |||
11224 | CVE_STATUS[CVE-2024-57973] = "cpe-stable-backport: Backported in 6.12.13" | ||
11225 | |||
11226 | CVE_STATUS[CVE-2024-57974] = "cpe-stable-backport: Backported in 6.12.13" | ||
11227 | |||
11228 | CVE_STATUS[CVE-2024-57975] = "cpe-stable-backport: Backported in 6.12.13" | ||
11229 | |||
11230 | # CVE-2024-57976 needs backporting (fixed from 6.14) | ||
11231 | |||
11232 | CVE_STATUS[CVE-2024-57977] = "cpe-stable-backport: Backported in 6.12.13" | ||
11233 | |||
11234 | CVE_STATUS[CVE-2024-57978] = "cpe-stable-backport: Backported in 6.12.13" | ||
11235 | |||
11236 | CVE_STATUS[CVE-2024-57979] = "cpe-stable-backport: Backported in 6.12.13" | ||
11237 | |||
11238 | CVE_STATUS[CVE-2024-57980] = "cpe-stable-backport: Backported in 6.12.13" | ||
11239 | |||
11240 | CVE_STATUS[CVE-2024-57981] = "cpe-stable-backport: Backported in 6.12.13" | ||
11241 | |||
11242 | CVE_STATUS[CVE-2024-57982] = "cpe-stable-backport: Backported in 6.12.13" | ||
11243 | |||
11244 | CVE_STATUS[CVE-2024-57983] = "fixed-version: only affects 6.13 onwards" | ||
11245 | |||
11246 | CVE_STATUS[CVE-2024-57984] = "cpe-stable-backport: Backported in 6.12.13" | ||
11247 | |||
11248 | CVE_STATUS[CVE-2024-57985] = "cpe-stable-backport: Backported in 6.12.13" | ||
11249 | |||
11250 | CVE_STATUS[CVE-2024-57986] = "cpe-stable-backport: Backported in 6.12.13" | ||
11251 | |||
11252 | CVE_STATUS[CVE-2024-57987] = "cpe-stable-backport: Backported in 6.12.13" | ||
11253 | |||
11254 | CVE_STATUS[CVE-2024-57988] = "cpe-stable-backport: Backported in 6.12.13" | ||
11255 | |||
11256 | CVE_STATUS[CVE-2024-57989] = "cpe-stable-backport: Backported in 6.12.13" | ||
11257 | |||
11258 | CVE_STATUS[CVE-2024-57990] = "cpe-stable-backport: Backported in 6.12.13" | ||
11259 | |||
11260 | CVE_STATUS[CVE-2024-57991] = "fixed-version: only affects 6.13 onwards" | ||
11261 | |||
11262 | CVE_STATUS[CVE-2024-57992] = "fixed-version: only affects 6.13 onwards" | ||
11263 | |||
11264 | CVE_STATUS[CVE-2024-57993] = "cpe-stable-backport: Backported in 6.12.13" | ||
11265 | |||
11266 | CVE_STATUS[CVE-2024-57994] = "cpe-stable-backport: Backported in 6.12.13" | ||
11267 | |||
11268 | # CVE-2024-57995 needs backporting (fixed from 6.14) | ||
11269 | |||
11270 | CVE_STATUS[CVE-2024-57996] = "cpe-stable-backport: Backported in 6.12.13" | ||
11271 | |||
11272 | CVE_STATUS[CVE-2024-57997] = "cpe-stable-backport: Backported in 6.12.13" | ||
11273 | |||
11274 | CVE_STATUS[CVE-2024-57998] = "cpe-stable-backport: Backported in 6.12.13" | ||
11275 | |||
11276 | CVE_STATUS[CVE-2024-57999] = "cpe-stable-backport: Backported in 6.12.13" | ||
11277 | |||
11278 | CVE_STATUS[CVE-2024-58000] = "fixed-version: only affects 6.13 onwards" | ||
11279 | |||
11280 | CVE_STATUS[CVE-2024-58001] = "cpe-stable-backport: Backported in 6.12.14" | ||
11281 | |||
11282 | CVE_STATUS[CVE-2024-58002] = "cpe-stable-backport: Backported in 6.12.14" | ||
11283 | |||
11284 | CVE_STATUS[CVE-2024-58003] = "cpe-stable-backport: Backported in 6.12.14" | ||
11285 | |||
11286 | CVE_STATUS[CVE-2024-58004] = "cpe-stable-backport: Backported in 6.12.14" | ||
11287 | |||
11288 | CVE_STATUS[CVE-2024-58005] = "cpe-stable-backport: Backported in 6.12.14" | ||
11289 | |||
11290 | CVE_STATUS[CVE-2024-58006] = "cpe-stable-backport: Backported in 6.12.14" | ||
11291 | |||
11292 | CVE_STATUS[CVE-2024-58007] = "cpe-stable-backport: Backported in 6.12.14" | ||
11293 | |||
11294 | CVE_STATUS[CVE-2024-58008] = "cpe-stable-backport: Backported in 6.12.14" | ||
11295 | |||
11296 | CVE_STATUS[CVE-2024-58009] = "cpe-stable-backport: Backported in 6.12.14" | ||
11297 | |||
11298 | CVE_STATUS[CVE-2024-58010] = "cpe-stable-backport: Backported in 6.12.14" | ||
11299 | |||
11300 | CVE_STATUS[CVE-2024-58011] = "cpe-stable-backport: Backported in 6.12.14" | ||
11301 | |||
11302 | CVE_STATUS[CVE-2024-58012] = "cpe-stable-backport: Backported in 6.12.14" | ||
11303 | |||
11304 | CVE_STATUS[CVE-2024-58013] = "cpe-stable-backport: Backported in 6.12.14" | ||
11305 | |||
11306 | CVE_STATUS[CVE-2024-58014] = "cpe-stable-backport: Backported in 6.12.14" | ||
11307 | |||
11308 | # CVE-2024-58015 needs backporting (fixed from 6.14) | ||
11309 | |||
11310 | CVE_STATUS[CVE-2024-58016] = "cpe-stable-backport: Backported in 6.12.14" | ||
11311 | |||
11312 | CVE_STATUS[CVE-2024-58017] = "cpe-stable-backport: Backported in 6.12.14" | ||
11313 | |||
11314 | CVE_STATUS[CVE-2024-58018] = "cpe-stable-backport: Backported in 6.12.14" | ||
11315 | |||
11316 | CVE_STATUS[CVE-2024-58019] = "cpe-stable-backport: Backported in 6.12.14" | ||
11317 | |||
11318 | CVE_STATUS[CVE-2024-58020] = "cpe-stable-backport: Backported in 6.12.16" | ||
11319 | |||
11320 | CVE_STATUS[CVE-2024-58021] = "cpe-stable-backport: Backported in 6.12.16" | ||
11321 | |||
11322 | CVE_STATUS[CVE-2024-58022] = "fixed-version: only affects 6.13 onwards" | ||
11323 | |||
11324 | CVE_STATUS[CVE-2024-58034] = "cpe-stable-backport: Backported in 6.12.13" | ||
11325 | |||
11326 | CVE_STATUS[CVE-2024-58042] = "cpe-stable-backport: Backported in 6.12.13" | ||
11327 | |||
11328 | CVE_STATUS[CVE-2024-58051] = "cpe-stable-backport: Backported in 6.12.13" | ||
11329 | |||
11330 | CVE_STATUS[CVE-2024-58052] = "cpe-stable-backport: Backported in 6.12.13" | ||
11331 | |||
11332 | CVE_STATUS[CVE-2024-58053] = "cpe-stable-backport: Backported in 6.12.13" | ||
11333 | |||
11334 | CVE_STATUS[CVE-2024-58054] = "cpe-stable-backport: Backported in 6.12.13" | ||
11335 | |||
11336 | CVE_STATUS[CVE-2024-58055] = "cpe-stable-backport: Backported in 6.12.13" | ||
11337 | |||
11338 | CVE_STATUS[CVE-2024-58056] = "cpe-stable-backport: Backported in 6.12.13" | ||
11339 | |||
11340 | CVE_STATUS[CVE-2024-58057] = "cpe-stable-backport: Backported in 6.12.13" | ||
11341 | |||
11342 | CVE_STATUS[CVE-2024-58058] = "cpe-stable-backport: Backported in 6.12.13" | ||
11343 | |||
11344 | CVE_STATUS[CVE-2024-58059] = "fixed-version: only affects 6.13 onwards" | ||
11345 | |||
11346 | CVE_STATUS[CVE-2024-58060] = "cpe-stable-backport: Backported in 6.12.13" | ||
11347 | |||
11348 | CVE_STATUS[CVE-2024-58061] = "cpe-stable-backport: Backported in 6.12.13" | ||
11349 | |||
11350 | CVE_STATUS[CVE-2024-58062] = "cpe-stable-backport: Backported in 6.12.13" | ||
11351 | |||
11352 | CVE_STATUS[CVE-2024-58063] = "cpe-stable-backport: Backported in 6.12.13" | ||
11353 | |||
11354 | CVE_STATUS[CVE-2024-58064] = "cpe-stable-backport: Backported in 6.12.13" | ||
11355 | |||
11356 | CVE_STATUS[CVE-2024-58065] = "fixed-version: only affects 6.13 onwards" | ||
11357 | |||
11358 | CVE_STATUS[CVE-2024-58066] = "fixed-version: only affects 6.13 onwards" | ||
11359 | |||
11360 | CVE_STATUS[CVE-2024-58067] = "fixed-version: only affects 6.13 onwards" | ||
11361 | |||
11362 | CVE_STATUS[CVE-2024-58068] = "cpe-stable-backport: Backported in 6.12.13" | ||
11363 | |||
11364 | CVE_STATUS[CVE-2024-58069] = "cpe-stable-backport: Backported in 6.12.13" | ||
11365 | |||
11366 | CVE_STATUS[CVE-2024-58070] = "cpe-stable-backport: Backported in 6.12.13" | ||
11367 | |||
11368 | CVE_STATUS[CVE-2024-58071] = "cpe-stable-backport: Backported in 6.12.13" | ||
11369 | |||
11370 | CVE_STATUS[CVE-2024-58072] = "cpe-stable-backport: Backported in 6.12.13" | ||
11371 | |||
11372 | CVE_STATUS[CVE-2024-58073] = "fixed-version: only affects 6.13 onwards" | ||
11373 | |||
11374 | # CVE-2024-58074 needs backporting (fixed from 6.14) | ||
11375 | |||
11376 | CVE_STATUS[CVE-2024-58075] = "cpe-stable-backport: Backported in 6.12.13" | ||
11377 | |||
11378 | CVE_STATUS[CVE-2024-58076] = "cpe-stable-backport: Backported in 6.12.14" | ||
11379 | |||
11380 | CVE_STATUS[CVE-2024-58077] = "cpe-stable-backport: Backported in 6.12.14" | ||
11381 | |||
11382 | CVE_STATUS[CVE-2024-58078] = "cpe-stable-backport: Backported in 6.12.14" | ||
11383 | |||
11384 | CVE_STATUS[CVE-2024-58079] = "cpe-stable-backport: Backported in 6.12.14" | ||
11385 | |||
11386 | CVE_STATUS[CVE-2024-58080] = "cpe-stable-backport: Backported in 6.12.14" | ||
11387 | |||
11388 | CVE_STATUS[CVE-2024-58081] = "cpe-stable-backport: Backported in 6.12.14" | ||
11389 | |||
11390 | CVE_STATUS[CVE-2024-58082] = "cpe-stable-backport: Backported in 6.12.14" | ||
11391 | |||
11392 | CVE_STATUS[CVE-2024-58083] = "cpe-stable-backport: Backported in 6.12.14" | ||
11393 | |||
11394 | CVE_STATUS[CVE-2024-58084] = "cpe-stable-backport: Backported in 6.12.14" | ||
11395 | |||
11396 | CVE_STATUS[CVE-2024-58085] = "cpe-stable-backport: Backported in 6.12.14" | ||
11397 | |||
11398 | CVE_STATUS[CVE-2024-58086] = "cpe-stable-backport: Backported in 6.12.16" | ||
11399 | |||
11400 | CVE_STATUS[CVE-2024-58087] = "cpe-stable-backport: Backported in 6.12.6" | ||
11401 | |||
11402 | CVE_STATUS[CVE-2024-58088] = "cpe-stable-backport: Backported in 6.12.17" | ||
11403 | |||
11404 | CVE_STATUS[CVE-2024-58089] = "cpe-stable-backport: Backported in 6.12.17" | ||
11405 | |||
11406 | CVE_STATUS[CVE-2024-58090] = "cpe-stable-backport: Backported in 6.12.18" | ||
11407 | |||
11408 | # CVE-2024-58091 needs backporting (fixed from 6.14) | ||
11409 | |||
11410 | CVE_STATUS[CVE-2024-58092] = "cpe-stable-backport: Backported in 6.12.22" | ||
11411 | |||
11412 | # CVE-2024-58093 needs backporting (fixed from 6.15) | ||
11413 | |||
11414 | # CVE-2024-58094 needs backporting (fixed from 6.15) | ||
11415 | |||
11416 | # CVE-2024-58095 needs backporting (fixed from 6.15) | ||
11417 | |||
11418 | # CVE-2024-58096 needs backporting (fixed from 6.15) | ||
11419 | |||
11420 | # CVE-2024-58097 needs backporting (fixed from 6.15) | ||
11421 | |||
11422 | CVE_STATUS[CVE-2024-58098] = "cpe-stable-backport: Backported in 6.12.25" | ||
11423 | |||
11424 | CVE_STATUS[CVE-2024-58099] = "fixed-version: Fixed from version 6.12" | ||
11425 | |||
11426 | CVE_STATUS[CVE-2024-58100] = "cpe-stable-backport: Backported in 6.12.25" | ||
11427 | |||
11428 | CVE_STATUS[CVE-2024-58237] = "cpe-stable-backport: Backported in 6.12.9" | ||
11429 | |||
11430 | CVE_STATUS[CVE-2025-21629] = "cpe-stable-backport: Backported in 6.12.9" | ||
11431 | |||
11432 | CVE_STATUS[CVE-2025-21631] = "cpe-stable-backport: Backported in 6.12.10" | ||
11433 | |||
11434 | CVE_STATUS[CVE-2025-21632] = "cpe-stable-backport: Backported in 6.12.10" | ||
11435 | |||
11436 | CVE_STATUS[CVE-2025-21634] = "cpe-stable-backport: Backported in 6.12.10" | ||
11437 | |||
11438 | CVE_STATUS[CVE-2025-21635] = "cpe-stable-backport: Backported in 6.12.10" | ||
11439 | |||
11440 | CVE_STATUS[CVE-2025-21636] = "cpe-stable-backport: Backported in 6.12.10" | ||
11441 | |||
11442 | CVE_STATUS[CVE-2025-21637] = "cpe-stable-backport: Backported in 6.12.10" | ||
11443 | |||
11444 | CVE_STATUS[CVE-2025-21638] = "cpe-stable-backport: Backported in 6.12.10" | ||
11445 | |||
11446 | CVE_STATUS[CVE-2025-21639] = "cpe-stable-backport: Backported in 6.12.10" | ||
11447 | |||
11448 | CVE_STATUS[CVE-2025-21640] = "cpe-stable-backport: Backported in 6.12.10" | ||
11449 | |||
11450 | CVE_STATUS[CVE-2025-21641] = "cpe-stable-backport: Backported in 6.12.10" | ||
11451 | |||
11452 | CVE_STATUS[CVE-2025-21642] = "cpe-stable-backport: Backported in 6.12.10" | ||
11453 | |||
11454 | CVE_STATUS[CVE-2025-21643] = "cpe-stable-backport: Backported in 6.12.10" | ||
11455 | |||
11456 | CVE_STATUS[CVE-2025-21644] = "cpe-stable-backport: Backported in 6.12.10" | ||
11457 | |||
11458 | CVE_STATUS[CVE-2025-21645] = "cpe-stable-backport: Backported in 6.12.10" | ||
11459 | |||
11460 | CVE_STATUS[CVE-2025-21646] = "cpe-stable-backport: Backported in 6.12.10" | ||
11461 | |||
11462 | CVE_STATUS[CVE-2025-21647] = "cpe-stable-backport: Backported in 6.12.10" | ||
11463 | |||
11464 | CVE_STATUS[CVE-2025-21648] = "cpe-stable-backport: Backported in 6.12.10" | ||
11465 | |||
11466 | CVE_STATUS[CVE-2025-21649] = "cpe-stable-backport: Backported in 6.12.10" | ||
11467 | |||
11468 | CVE_STATUS[CVE-2025-21650] = "cpe-stable-backport: Backported in 6.12.10" | ||
11469 | |||
11470 | CVE_STATUS[CVE-2025-21651] = "cpe-stable-backport: Backported in 6.12.10" | ||
11471 | |||
11472 | CVE_STATUS[CVE-2025-21652] = "cpe-stable-backport: Backported in 6.12.10" | ||
11473 | |||
11474 | CVE_STATUS[CVE-2025-21653] = "cpe-stable-backport: Backported in 6.12.10" | ||
11475 | |||
11476 | CVE_STATUS[CVE-2025-21654] = "cpe-stable-backport: Backported in 6.12.10" | ||
11477 | |||
11478 | CVE_STATUS[CVE-2025-21655] = "cpe-stable-backport: Backported in 6.12.10" | ||
11479 | |||
11480 | CVE_STATUS[CVE-2025-21656] = "cpe-stable-backport: Backported in 6.12.10" | ||
11481 | |||
11482 | CVE_STATUS[CVE-2025-21657] = "cpe-stable-backport: Backported in 6.12.10" | ||
11483 | |||
11484 | CVE_STATUS[CVE-2025-21658] = "cpe-stable-backport: Backported in 6.12.10" | ||
11485 | |||
11486 | CVE_STATUS[CVE-2025-21659] = "cpe-stable-backport: Backported in 6.12.10" | ||
11487 | |||
11488 | CVE_STATUS[CVE-2025-21660] = "cpe-stable-backport: Backported in 6.12.10" | ||
11489 | |||
11490 | CVE_STATUS[CVE-2025-21661] = "cpe-stable-backport: Backported in 6.12.10" | ||
11491 | |||
11492 | CVE_STATUS[CVE-2025-21662] = "cpe-stable-backport: Backported in 6.12.10" | ||
11493 | |||
11494 | CVE_STATUS[CVE-2025-21663] = "cpe-stable-backport: Backported in 6.12.10" | ||
11495 | |||
11496 | CVE_STATUS[CVE-2025-21664] = "cpe-stable-backport: Backported in 6.12.10" | ||
11497 | |||
11498 | CVE_STATUS[CVE-2025-21665] = "cpe-stable-backport: Backported in 6.12.11" | ||
11499 | |||
11500 | CVE_STATUS[CVE-2025-21666] = "cpe-stable-backport: Backported in 6.12.11" | ||
11501 | |||
11502 | CVE_STATUS[CVE-2025-21667] = "cpe-stable-backport: Backported in 6.12.11" | ||
11503 | |||
11504 | CVE_STATUS[CVE-2025-21668] = "cpe-stable-backport: Backported in 6.12.11" | ||
11505 | |||
11506 | CVE_STATUS[CVE-2025-21669] = "cpe-stable-backport: Backported in 6.12.11" | ||
11507 | |||
11508 | CVE_STATUS[CVE-2025-21670] = "cpe-stable-backport: Backported in 6.12.11" | ||
11509 | |||
11510 | CVE_STATUS[CVE-2025-21671] = "fixed-version: Fixed from version 6.12.11" | ||
11511 | |||
11512 | CVE_STATUS[CVE-2025-21672] = "cpe-stable-backport: Backported in 6.12.11" | ||
11513 | |||
11514 | CVE_STATUS[CVE-2025-21673] = "cpe-stable-backport: Backported in 6.12.11" | ||
11515 | |||
11516 | CVE_STATUS[CVE-2025-21674] = "cpe-stable-backport: Backported in 6.12.11" | ||
11517 | |||
11518 | CVE_STATUS[CVE-2025-21675] = "cpe-stable-backport: Backported in 6.12.11" | ||
11519 | |||
11520 | CVE_STATUS[CVE-2025-21676] = "cpe-stable-backport: Backported in 6.12.11" | ||
11521 | |||
11522 | CVE_STATUS[CVE-2025-21677] = "cpe-stable-backport: Backported in 6.12.11" | ||
11523 | |||
11524 | CVE_STATUS[CVE-2025-21678] = "cpe-stable-backport: Backported in 6.12.11" | ||
11525 | |||
11526 | CVE_STATUS[CVE-2025-21679] = "fixed-version: Fixed from version 6.12.11" | ||
11527 | |||
11528 | CVE_STATUS[CVE-2025-21680] = "cpe-stable-backport: Backported in 6.12.11" | ||
11529 | |||
11530 | CVE_STATUS[CVE-2025-21681] = "cpe-stable-backport: Backported in 6.12.11" | ||
11531 | |||
11532 | CVE_STATUS[CVE-2025-21682] = "cpe-stable-backport: Backported in 6.12.11" | ||
11533 | |||
11534 | CVE_STATUS[CVE-2025-21683] = "cpe-stable-backport: Backported in 6.12.11" | ||
11535 | |||
11536 | CVE_STATUS[CVE-2025-21684] = "cpe-stable-backport: Backported in 6.12.11" | ||
11537 | |||
11538 | CVE_STATUS[CVE-2025-21685] = "cpe-stable-backport: Backported in 6.12.11" | ||
11539 | |||
11540 | CVE_STATUS[CVE-2025-21687] = "cpe-stable-backport: Backported in 6.12.12" | ||
11541 | |||
11542 | CVE_STATUS[CVE-2025-21688] = "cpe-stable-backport: Backported in 6.12.12" | ||
11543 | |||
11544 | CVE_STATUS[CVE-2025-21689] = "cpe-stable-backport: Backported in 6.12.12" | ||
11545 | |||
11546 | CVE_STATUS[CVE-2025-21690] = "cpe-stable-backport: Backported in 6.12.12" | ||
11547 | |||
11548 | CVE_STATUS[CVE-2025-21691] = "cpe-stable-backport: Backported in 6.12.12" | ||
11549 | |||
11550 | CVE_STATUS[CVE-2025-21692] = "cpe-stable-backport: Backported in 6.12.12" | ||
11551 | |||
11552 | CVE_STATUS[CVE-2025-21693] = "cpe-stable-backport: Backported in 6.12.12" | ||
11553 | |||
11554 | CVE_STATUS[CVE-2025-21694] = "cpe-stable-backport: Backported in 6.12.11" | ||
11555 | |||
11556 | CVE_STATUS[CVE-2025-21695] = "cpe-stable-backport: Backported in 6.12.11" | ||
11557 | |||
11558 | CVE_STATUS[CVE-2025-21696] = "cpe-stable-backport: Backported in 6.12.11" | ||
11559 | |||
11560 | CVE_STATUS[CVE-2025-21697] = "cpe-stable-backport: Backported in 6.12.11" | ||
11561 | |||
11562 | CVE_STATUS[CVE-2025-21699] = "cpe-stable-backport: Backported in 6.12.12" | ||
11563 | |||
11564 | CVE_STATUS[CVE-2025-21700] = "cpe-stable-backport: Backported in 6.12.13" | ||
11565 | |||
11566 | CVE_STATUS[CVE-2025-21701] = "cpe-stable-backport: Backported in 6.12.13" | ||
11567 | |||
11568 | CVE_STATUS[CVE-2025-21702] = "cpe-stable-backport: Backported in 6.12.14" | ||
11569 | |||
11570 | CVE_STATUS[CVE-2025-21703] = "cpe-stable-backport: Backported in 6.12.14" | ||
11571 | |||
11572 | CVE_STATUS[CVE-2025-21704] = "cpe-stable-backport: Backported in 6.12.16" | ||
11573 | |||
11574 | CVE_STATUS[CVE-2025-21705] = "cpe-stable-backport: Backported in 6.12.13" | ||
11575 | |||
11576 | CVE_STATUS[CVE-2025-21706] = "cpe-stable-backport: Backported in 6.12.13" | ||
11577 | |||
11578 | CVE_STATUS[CVE-2025-21707] = "cpe-stable-backport: Backported in 6.12.13" | ||
11579 | |||
11580 | CVE_STATUS[CVE-2025-21708] = "cpe-stable-backport: Backported in 6.12.13" | ||
11581 | |||
11582 | # CVE-2025-21709 needs backporting (fixed from 6.14) | ||
11583 | |||
11584 | CVE_STATUS[CVE-2025-21710] = "cpe-stable-backport: Backported in 6.12.13" | ||
11585 | |||
11586 | CVE_STATUS[CVE-2025-21711] = "cpe-stable-backport: Backported in 6.12.13" | ||
11587 | |||
11588 | CVE_STATUS[CVE-2025-21712] = "cpe-stable-backport: Backported in 6.12.13" | ||
11589 | |||
11590 | CVE_STATUS[CVE-2025-21713] = "cpe-stable-backport: Backported in 6.12.13" | ||
11591 | |||
11592 | CVE_STATUS[CVE-2025-21714] = "cpe-stable-backport: Backported in 6.12.13" | ||
11593 | |||
11594 | CVE_STATUS[CVE-2025-21715] = "cpe-stable-backport: Backported in 6.12.13" | ||
11595 | |||
11596 | CVE_STATUS[CVE-2025-21716] = "cpe-stable-backport: Backported in 6.12.13" | ||
11597 | |||
11598 | CVE_STATUS[CVE-2025-21717] = "fixed-version: only affects 6.13 onwards" | ||
11599 | |||
11600 | CVE_STATUS[CVE-2025-21718] = "cpe-stable-backport: Backported in 6.12.13" | ||
11601 | |||
11602 | CVE_STATUS[CVE-2025-21719] = "cpe-stable-backport: Backported in 6.12.13" | ||
11603 | |||
11604 | CVE_STATUS[CVE-2025-21720] = "cpe-stable-backport: Backported in 6.12.13" | ||
11605 | |||
11606 | CVE_STATUS[CVE-2025-21721] = "cpe-stable-backport: Backported in 6.12.13" | ||
11607 | |||
11608 | CVE_STATUS[CVE-2025-21722] = "cpe-stable-backport: Backported in 6.12.13" | ||
11609 | |||
11610 | CVE_STATUS[CVE-2025-21723] = "cpe-stable-backport: Backported in 6.12.13" | ||
11611 | |||
11612 | CVE_STATUS[CVE-2025-21724] = "cpe-stable-backport: Backported in 6.12.13" | ||
11613 | |||
11614 | CVE_STATUS[CVE-2025-21725] = "cpe-stable-backport: Backported in 6.12.13" | ||
11615 | |||
11616 | CVE_STATUS[CVE-2025-21726] = "cpe-stable-backport: Backported in 6.12.13" | ||
11617 | |||
11618 | CVE_STATUS[CVE-2025-21727] = "cpe-stable-backport: Backported in 6.12.13" | ||
11619 | |||
11620 | CVE_STATUS[CVE-2025-21728] = "cpe-stable-backport: Backported in 6.12.13" | ||
11621 | |||
11622 | CVE_STATUS[CVE-2025-21729] = "cpe-stable-backport: Backported in 6.12.13" | ||
11623 | |||
11624 | CVE_STATUS[CVE-2025-21730] = "fixed-version: only affects 6.13 onwards" | ||
11625 | |||
11626 | CVE_STATUS[CVE-2025-21731] = "cpe-stable-backport: Backported in 6.12.13" | ||
11627 | |||
11628 | CVE_STATUS[CVE-2025-21732] = "cpe-stable-backport: Backported in 6.12.14" | ||
11629 | |||
11630 | CVE_STATUS[CVE-2025-21733] = "cpe-stable-backport: Backported in 6.12.14" | ||
11631 | |||
11632 | CVE_STATUS[CVE-2025-21734] = "cpe-stable-backport: Backported in 6.12.14" | ||
11633 | |||
11634 | CVE_STATUS[CVE-2025-21735] = "cpe-stable-backport: Backported in 6.12.14" | ||
11635 | |||
11636 | CVE_STATUS[CVE-2025-21736] = "cpe-stable-backport: Backported in 6.12.14" | ||
11637 | |||
11638 | CVE_STATUS[CVE-2025-21737] = "cpe-stable-backport: Backported in 6.12.14" | ||
11639 | |||
11640 | CVE_STATUS[CVE-2025-21738] = "cpe-stable-backport: Backported in 6.12.14" | ||
11641 | |||
11642 | CVE_STATUS[CVE-2025-21739] = "cpe-stable-backport: Backported in 6.12.14" | ||
11643 | |||
11644 | CVE_STATUS[CVE-2025-21741] = "cpe-stable-backport: Backported in 6.12.14" | ||
11645 | |||
11646 | CVE_STATUS[CVE-2025-21742] = "cpe-stable-backport: Backported in 6.12.14" | ||
11647 | |||
11648 | CVE_STATUS[CVE-2025-21743] = "cpe-stable-backport: Backported in 6.12.14" | ||
11649 | |||
11650 | CVE_STATUS[CVE-2025-21744] = "cpe-stable-backport: Backported in 6.12.14" | ||
11651 | |||
11652 | CVE_STATUS[CVE-2025-21745] = "cpe-stable-backport: Backported in 6.12.14" | ||
11653 | |||
11654 | CVE_STATUS[CVE-2025-21746] = "cpe-stable-backport: Backported in 6.12.17" | ||
11655 | |||
11656 | CVE_STATUS[CVE-2025-21747] = "fixed-version: only affects 6.13 onwards" | ||
11657 | |||
11658 | CVE_STATUS[CVE-2025-21748] = "cpe-stable-backport: Backported in 6.12.14" | ||
11659 | |||
11660 | CVE_STATUS[CVE-2025-21749] = "cpe-stable-backport: Backported in 6.12.14" | ||
11661 | |||
11662 | CVE_STATUS[CVE-2025-21750] = "cpe-stable-backport: Backported in 6.12.14" | ||
11663 | |||
11664 | # CVE-2025-21751 needs backporting (fixed from 6.14) | ||
11665 | |||
11666 | # CVE-2025-21752 needs backporting (fixed from 6.14) | ||
11667 | |||
11668 | CVE_STATUS[CVE-2025-21753] = "cpe-stable-backport: Backported in 6.12.14" | ||
11669 | |||
11670 | CVE_STATUS[CVE-2025-21754] = "cpe-stable-backport: Backported in 6.12.14" | ||
11671 | |||
11672 | CVE_STATUS[CVE-2025-21756] = "cpe-stable-backport: Backported in 6.12.16" | ||
11673 | |||
11674 | CVE_STATUS[CVE-2025-21758] = "cpe-stable-backport: Backported in 6.12.16" | ||
11675 | |||
11676 | CVE_STATUS[CVE-2025-21759] = "cpe-stable-backport: Backported in 6.12.16" | ||
11677 | |||
11678 | CVE_STATUS[CVE-2025-21760] = "cpe-stable-backport: Backported in 6.12.16" | ||
11679 | |||
11680 | CVE_STATUS[CVE-2025-21761] = "cpe-stable-backport: Backported in 6.12.16" | ||
11681 | |||
11682 | CVE_STATUS[CVE-2025-21762] = "cpe-stable-backport: Backported in 6.12.16" | ||
11683 | |||
11684 | CVE_STATUS[CVE-2025-21763] = "cpe-stable-backport: Backported in 6.12.16" | ||
11685 | |||
11686 | CVE_STATUS[CVE-2025-21764] = "cpe-stable-backport: Backported in 6.12.16" | ||
11687 | |||
11688 | CVE_STATUS[CVE-2025-21765] = "cpe-stable-backport: Backported in 6.12.16" | ||
11689 | |||
11690 | CVE_STATUS[CVE-2025-21766] = "cpe-stable-backport: Backported in 6.12.16" | ||
11691 | |||
11692 | CVE_STATUS[CVE-2025-21767] = "cpe-stable-backport: Backported in 6.12.16" | ||
11693 | |||
11694 | CVE_STATUS[CVE-2025-21768] = "cpe-stable-backport: Backported in 6.12.16" | ||
11695 | |||
11696 | CVE_STATUS[CVE-2025-21769] = "fixed-version: only affects 6.13 onwards" | ||
11697 | |||
11698 | CVE_STATUS[CVE-2025-21770] = "cpe-stable-backport: Backported in 6.12.16" | ||
11699 | |||
11700 | CVE_STATUS[CVE-2025-21771] = "cpe-stable-backport: Backported in 6.12.16" | ||
11701 | |||
11702 | CVE_STATUS[CVE-2025-21772] = "cpe-stable-backport: Backported in 6.12.16" | ||
11703 | |||
11704 | CVE_STATUS[CVE-2025-21773] = "cpe-stable-backport: Backported in 6.12.16" | ||
11705 | |||
11706 | CVE_STATUS[CVE-2025-21774] = "cpe-stable-backport: Backported in 6.12.16" | ||
11707 | |||
11708 | CVE_STATUS[CVE-2025-21775] = "cpe-stable-backport: Backported in 6.12.16" | ||
11709 | |||
11710 | CVE_STATUS[CVE-2025-21776] = "cpe-stable-backport: Backported in 6.12.16" | ||
11711 | |||
11712 | CVE_STATUS[CVE-2025-21777] = "cpe-stable-backport: Backported in 6.12.16" | ||
11713 | |||
11714 | CVE_STATUS[CVE-2025-21778] = "cpe-stable-backport: Backported in 6.12.16" | ||
11715 | |||
11716 | CVE_STATUS[CVE-2025-21779] = "cpe-stable-backport: Backported in 6.12.16" | ||
11717 | |||
11718 | CVE_STATUS[CVE-2025-21780] = "cpe-stable-backport: Backported in 6.12.16" | ||
11719 | |||
11720 | CVE_STATUS[CVE-2025-21781] = "cpe-stable-backport: Backported in 6.12.16" | ||
11721 | |||
11722 | CVE_STATUS[CVE-2025-21782] = "cpe-stable-backport: Backported in 6.12.16" | ||
11723 | |||
11724 | CVE_STATUS[CVE-2025-21783] = "cpe-stable-backport: Backported in 6.12.16" | ||
11725 | |||
11726 | CVE_STATUS[CVE-2025-21784] = "cpe-stable-backport: Backported in 6.12.16" | ||
11727 | |||
11728 | CVE_STATUS[CVE-2025-21785] = "cpe-stable-backport: Backported in 6.12.16" | ||
11729 | |||
11730 | CVE_STATUS[CVE-2025-21786] = "cpe-stable-backport: Backported in 6.12.16" | ||
11731 | |||
11732 | CVE_STATUS[CVE-2025-21787] = "cpe-stable-backport: Backported in 6.12.16" | ||
11733 | |||
11734 | CVE_STATUS[CVE-2025-21788] = "cpe-stable-backport: Backported in 6.12.16" | ||
11735 | |||
11736 | CVE_STATUS[CVE-2025-21789] = "cpe-stable-backport: Backported in 6.12.16" | ||
11737 | |||
11738 | CVE_STATUS[CVE-2025-21790] = "cpe-stable-backport: Backported in 6.12.16" | ||
11739 | |||
11740 | CVE_STATUS[CVE-2025-21791] = "cpe-stable-backport: Backported in 6.12.16" | ||
11741 | |||
11742 | CVE_STATUS[CVE-2025-21792] = "cpe-stable-backport: Backported in 6.12.16" | ||
11743 | |||
11744 | CVE_STATUS[CVE-2025-21793] = "cpe-stable-backport: Backported in 6.12.16" | ||
11745 | |||
11746 | CVE_STATUS[CVE-2025-21794] = "cpe-stable-backport: Backported in 6.12.16" | ||
11747 | |||
11748 | CVE_STATUS[CVE-2025-21795] = "cpe-stable-backport: Backported in 6.12.16" | ||
11749 | |||
11750 | CVE_STATUS[CVE-2025-21796] = "cpe-stable-backport: Backported in 6.12.16" | ||
11751 | |||
11752 | CVE_STATUS[CVE-2025-21797] = "fixed-version: only affects 6.13 onwards" | ||
11753 | |||
11754 | CVE_STATUS[CVE-2025-21798] = "cpe-stable-backport: Backported in 6.12.13" | ||
11755 | |||
11756 | CVE_STATUS[CVE-2025-21799] = "cpe-stable-backport: Backported in 6.12.13" | ||
11757 | |||
11758 | CVE_STATUS[CVE-2025-21800] = "cpe-stable-backport: Backported in 6.12.13" | ||
11759 | |||
11760 | CVE_STATUS[CVE-2025-21801] = "cpe-stable-backport: Backported in 6.12.13" | ||
11761 | |||
11762 | CVE_STATUS[CVE-2025-21802] = "cpe-stable-backport: Backported in 6.12.13" | ||
11763 | |||
11764 | CVE_STATUS[CVE-2025-21803] = "cpe-stable-backport: Backported in 6.12.13" | ||
11765 | |||
11766 | CVE_STATUS[CVE-2025-21804] = "cpe-stable-backport: Backported in 6.12.13" | ||
11767 | |||
11768 | CVE_STATUS[CVE-2025-21805] = "cpe-stable-backport: Backported in 6.12.13" | ||
11769 | |||
11770 | CVE_STATUS[CVE-2025-21806] = "cpe-stable-backport: Backported in 6.12.13" | ||
11771 | |||
11772 | # CVE-2025-21807 needs backporting (fixed from 6.14) | ||
11773 | |||
11774 | CVE_STATUS[CVE-2025-21808] = "cpe-stable-backport: Backported in 6.12.13" | ||
11775 | |||
11776 | CVE_STATUS[CVE-2025-21809] = "cpe-stable-backport: Backported in 6.12.13" | ||
11777 | |||
11778 | CVE_STATUS[CVE-2025-21810] = "cpe-stable-backport: Backported in 6.12.13" | ||
11779 | |||
11780 | CVE_STATUS[CVE-2025-21811] = "cpe-stable-backport: Backported in 6.12.13" | ||
11781 | |||
11782 | CVE_STATUS[CVE-2025-21812] = "cpe-stable-backport: Backported in 6.12.13" | ||
11783 | |||
11784 | CVE_STATUS[CVE-2025-21813] = "cpe-stable-backport: Backported in 6.12.14" | ||
11785 | |||
11786 | CVE_STATUS[CVE-2025-21814] = "cpe-stable-backport: Backported in 6.12.14" | ||
11787 | |||
11788 | CVE_STATUS[CVE-2025-21815] = "cpe-stable-backport: Backported in 6.12.14" | ||
11789 | |||
11790 | CVE_STATUS[CVE-2025-21816] = "cpe-stable-backport: Backported in 6.12.14" | ||
11791 | |||
11792 | # CVE-2025-21817 needs backporting (fixed from 6.14) | ||
11793 | |||
11794 | CVE_STATUS[CVE-2025-21819] = "cpe-stable-backport: Backported in 6.12.14" | ||
11795 | |||
11796 | CVE_STATUS[CVE-2025-21820] = "cpe-stable-backport: Backported in 6.12.14" | ||
11797 | |||
11798 | CVE_STATUS[CVE-2025-21821] = "cpe-stable-backport: Backported in 6.12.16" | ||
11799 | |||
11800 | CVE_STATUS[CVE-2025-21822] = "fixed-version: only affects 6.13 onwards" | ||
11801 | |||
11802 | CVE_STATUS[CVE-2025-21823] = "cpe-stable-backport: Backported in 6.12.16" | ||
11803 | |||
11804 | CVE_STATUS[CVE-2025-21824] = "cpe-stable-backport: Backported in 6.12.16" | ||
11805 | |||
11806 | CVE_STATUS[CVE-2025-21825] = "cpe-stable-backport: Backported in 6.12.13" | ||
11807 | |||
11808 | CVE_STATUS[CVE-2025-21826] = "cpe-stable-backport: Backported in 6.12.13" | ||
11809 | |||
11810 | CVE_STATUS[CVE-2025-21827] = "cpe-stable-backport: Backported in 6.12.13" | ||
11811 | |||
11812 | CVE_STATUS[CVE-2025-21828] = "cpe-stable-backport: Backported in 6.12.13" | ||
11813 | |||
11814 | CVE_STATUS[CVE-2025-21829] = "cpe-stable-backport: Backported in 6.12.13" | ||
11815 | |||
11816 | CVE_STATUS[CVE-2025-21830] = "cpe-stable-backport: Backported in 6.12.13" | ||
11817 | |||
11818 | CVE_STATUS[CVE-2025-21831] = "cpe-stable-backport: Backported in 6.12.14" | ||
11819 | |||
11820 | CVE_STATUS[CVE-2025-21832] = "cpe-stable-backport: Backported in 6.12.14" | ||
11821 | |||
11822 | # CVE-2025-21833 needs backporting (fixed from 6.14) | ||
11823 | |||
11824 | CVE_STATUS[CVE-2025-21834] = "cpe-stable-backport: Backported in 6.12.14" | ||
11825 | |||
11826 | CVE_STATUS[CVE-2025-21835] = "cpe-stable-backport: Backported in 6.12.16" | ||
11827 | |||
11828 | CVE_STATUS[CVE-2025-21836] = "cpe-stable-backport: Backported in 6.12.16" | ||
11829 | |||
11830 | CVE_STATUS[CVE-2025-21838] = "cpe-stable-backport: Backported in 6.12.16" | ||
11831 | |||
11832 | CVE_STATUS[CVE-2025-21839] = "cpe-stable-backport: Backported in 6.12.16" | ||
11833 | |||
11834 | CVE_STATUS[CVE-2025-21840] = "fixed-version: only affects 6.13 onwards" | ||
11835 | |||
11836 | CVE_STATUS[CVE-2025-21841] = "cpe-stable-backport: Backported in 6.12.16" | ||
11837 | |||
11838 | CVE_STATUS[CVE-2025-21842] = "cpe-stable-backport: Backported in 6.12.16" | ||
11839 | |||
11840 | CVE_STATUS[CVE-2025-21843] = "fixed-version: only affects 6.13 onwards" | ||
11841 | |||
11842 | CVE_STATUS[CVE-2025-21844] = "cpe-stable-backport: Backported in 6.12.17" | ||
11843 | |||
11844 | CVE_STATUS[CVE-2025-21845] = "cpe-stable-backport: Backported in 6.12.17" | ||
11845 | |||
11846 | CVE_STATUS[CVE-2025-21846] = "cpe-stable-backport: Backported in 6.12.17" | ||
11847 | |||
11848 | CVE_STATUS[CVE-2025-21847] = "cpe-stable-backport: Backported in 6.12.17" | ||
11849 | |||
11850 | CVE_STATUS[CVE-2025-21848] = "cpe-stable-backport: Backported in 6.12.17" | ||
11851 | |||
11852 | CVE_STATUS[CVE-2025-21849] = "cpe-stable-backport: Backported in 6.12.17" | ||
11853 | |||
11854 | CVE_STATUS[CVE-2025-21850] = "fixed-version: only affects 6.13 onwards" | ||
11855 | |||
11856 | CVE_STATUS[CVE-2025-21851] = "cpe-stable-backport: Backported in 6.12.17" | ||
11857 | |||
11858 | CVE_STATUS[CVE-2025-21852] = "cpe-stable-backport: Backported in 6.12.17" | ||
11859 | |||
11860 | CVE_STATUS[CVE-2025-21853] = "cpe-stable-backport: Backported in 6.12.17" | ||
11861 | |||
11862 | CVE_STATUS[CVE-2025-21854] = "cpe-stable-backport: Backported in 6.12.17" | ||
11863 | |||
11864 | CVE_STATUS[CVE-2025-21855] = "cpe-stable-backport: Backported in 6.12.17" | ||
11865 | |||
11866 | CVE_STATUS[CVE-2025-21856] = "cpe-stable-backport: Backported in 6.12.17" | ||
11867 | |||
11868 | CVE_STATUS[CVE-2025-21857] = "cpe-stable-backport: Backported in 6.12.17" | ||
11869 | |||
11870 | CVE_STATUS[CVE-2025-21858] = "cpe-stable-backport: Backported in 6.12.17" | ||
11871 | |||
11872 | CVE_STATUS[CVE-2025-21859] = "cpe-stable-backport: Backported in 6.12.17" | ||
11873 | |||
11874 | CVE_STATUS[CVE-2025-21860] = "fixed-version: only affects 6.13 onwards" | ||
11875 | |||
11876 | CVE_STATUS[CVE-2025-21861] = "cpe-stable-backport: Backported in 6.12.17" | ||
11877 | |||
11878 | CVE_STATUS[CVE-2025-21862] = "cpe-stable-backport: Backported in 6.12.17" | ||
11879 | |||
11880 | CVE_STATUS[CVE-2025-21863] = "cpe-stable-backport: Backported in 6.12.17" | ||
11881 | |||
11882 | CVE_STATUS[CVE-2025-21864] = "cpe-stable-backport: Backported in 6.12.17" | ||
11883 | |||
11884 | CVE_STATUS[CVE-2025-21865] = "cpe-stable-backport: Backported in 6.12.17" | ||
11885 | |||
11886 | CVE_STATUS[CVE-2025-21866] = "cpe-stable-backport: Backported in 6.12.17" | ||
11887 | |||
11888 | CVE_STATUS[CVE-2025-21867] = "cpe-stable-backport: Backported in 6.12.17" | ||
11889 | |||
11890 | CVE_STATUS[CVE-2025-21868] = "cpe-stable-backport: Backported in 6.12.17" | ||
11891 | |||
11892 | CVE_STATUS[CVE-2025-21869] = "cpe-stable-backport: Backported in 6.12.17" | ||
11893 | |||
11894 | CVE_STATUS[CVE-2025-21870] = "cpe-stable-backport: Backported in 6.12.17" | ||
11895 | |||
11896 | CVE_STATUS[CVE-2025-21871] = "cpe-stable-backport: Backported in 6.12.17" | ||
11897 | |||
11898 | CVE_STATUS[CVE-2025-21872] = "cpe-stable-backport: Backported in 6.12.18" | ||
11899 | |||
11900 | CVE_STATUS[CVE-2025-21873] = "cpe-stable-backport: Backported in 6.12.18" | ||
11901 | |||
11902 | CVE_STATUS[CVE-2025-21874] = "cpe-stable-backport: Backported in 6.12.18" | ||
11903 | |||
11904 | CVE_STATUS[CVE-2025-21875] = "cpe-stable-backport: Backported in 6.12.18" | ||
11905 | |||
11906 | CVE_STATUS[CVE-2025-21876] = "cpe-stable-backport: Backported in 6.12.18" | ||
11907 | |||
11908 | CVE_STATUS[CVE-2025-21877] = "cpe-stable-backport: Backported in 6.12.18" | ||
11909 | |||
11910 | CVE_STATUS[CVE-2025-21878] = "cpe-stable-backport: Backported in 6.12.18" | ||
11911 | |||
11912 | CVE_STATUS[CVE-2025-21879] = "fixed-version: only affects 6.13 onwards" | ||
11913 | |||
11914 | CVE_STATUS[CVE-2025-21880] = "cpe-stable-backport: Backported in 6.12.18" | ||
11915 | |||
11916 | CVE_STATUS[CVE-2025-21881] = "cpe-stable-backport: Backported in 6.12.18" | ||
11917 | |||
11918 | CVE_STATUS[CVE-2025-21882] = "fixed-version: only affects 6.13 onwards" | ||
11919 | |||
11920 | CVE_STATUS[CVE-2025-21883] = "cpe-stable-backport: Backported in 6.12.18" | ||
11921 | |||
11922 | # CVE-2025-21884 needs backporting (fixed from 6.14) | ||
11923 | |||
11924 | CVE_STATUS[CVE-2025-21885] = "cpe-stable-backport: Backported in 6.12.18" | ||
11925 | |||
11926 | CVE_STATUS[CVE-2025-21886] = "cpe-stable-backport: Backported in 6.12.18" | ||
11927 | |||
11928 | CVE_STATUS[CVE-2025-21887] = "cpe-stable-backport: Backported in 6.12.18" | ||
11929 | |||
11930 | CVE_STATUS[CVE-2025-21888] = "cpe-stable-backport: Backported in 6.12.18" | ||
11931 | |||
11932 | CVE_STATUS[CVE-2025-21889] = "cpe-stable-backport: Backported in 6.12.18" | ||
11933 | |||
11934 | CVE_STATUS[CVE-2025-21890] = "cpe-stable-backport: Backported in 6.12.18" | ||
11935 | |||
11936 | CVE_STATUS[CVE-2025-21891] = "cpe-stable-backport: Backported in 6.12.18" | ||
11937 | |||
11938 | CVE_STATUS[CVE-2025-21892] = "cpe-stable-backport: Backported in 6.12.18" | ||
11939 | |||
11940 | CVE_STATUS[CVE-2025-21893] = "cpe-stable-backport: Backported in 6.12.21" | ||
11941 | |||
11942 | CVE_STATUS[CVE-2025-21894] = "cpe-stable-backport: Backported in 6.12.18" | ||
11943 | |||
11944 | CVE_STATUS[CVE-2025-21895] = "cpe-stable-backport: Backported in 6.12.18" | ||
11945 | |||
11946 | CVE_STATUS[CVE-2025-21896] = "fixed-version: only affects 6.13 onwards" | ||
11947 | |||
11948 | CVE_STATUS[CVE-2025-21897] = "cpe-stable-backport: Backported in 6.12.18" | ||
11949 | |||
11950 | CVE_STATUS[CVE-2025-21898] = "cpe-stable-backport: Backported in 6.12.18" | ||
11951 | |||
11952 | CVE_STATUS[CVE-2025-21899] = "cpe-stable-backport: Backported in 6.12.18" | ||
11953 | |||
11954 | CVE_STATUS[CVE-2025-21900] = "cpe-stable-backport: Backported in 6.12.18" | ||
11955 | |||
11956 | CVE_STATUS[CVE-2025-21901] = "cpe-stable-backport: Backported in 6.12.18" | ||
11957 | |||
11958 | CVE_STATUS[CVE-2025-21902] = "cpe-stable-backport: Backported in 6.12.19" | ||
11959 | |||
11960 | CVE_STATUS[CVE-2025-21903] = "cpe-stable-backport: Backported in 6.12.19" | ||
11961 | |||
11962 | CVE_STATUS[CVE-2025-21904] = "cpe-stable-backport: Backported in 6.12.19" | ||
11963 | |||
11964 | CVE_STATUS[CVE-2025-21905] = "cpe-stable-backport: Backported in 6.12.19" | ||
11965 | |||
11966 | CVE_STATUS[CVE-2025-21906] = "cpe-stable-backport: Backported in 6.12.19" | ||
11967 | |||
11968 | CVE_STATUS[CVE-2025-21907] = "cpe-stable-backport: Backported in 6.12.19" | ||
11969 | |||
11970 | CVE_STATUS[CVE-2025-21908] = "cpe-stable-backport: Backported in 6.12.19" | ||
11971 | |||
11972 | CVE_STATUS[CVE-2025-21909] = "cpe-stable-backport: Backported in 6.12.19" | ||
11973 | |||
11974 | CVE_STATUS[CVE-2025-21910] = "cpe-stable-backport: Backported in 6.12.19" | ||
11975 | |||
11976 | CVE_STATUS[CVE-2025-21911] = "cpe-stable-backport: Backported in 6.12.19" | ||
11977 | |||
11978 | CVE_STATUS[CVE-2025-21912] = "cpe-stable-backport: Backported in 6.12.19" | ||
11979 | |||
11980 | CVE_STATUS[CVE-2025-21913] = "cpe-stable-backport: Backported in 6.12.19" | ||
11981 | |||
11982 | CVE_STATUS[CVE-2025-21914] = "cpe-stable-backport: Backported in 6.12.19" | ||
11983 | |||
11984 | CVE_STATUS[CVE-2025-21915] = "cpe-stable-backport: Backported in 6.12.19" | ||
11985 | |||
11986 | CVE_STATUS[CVE-2025-21916] = "cpe-stable-backport: Backported in 6.12.19" | ||
11987 | |||
11988 | CVE_STATUS[CVE-2025-21917] = "cpe-stable-backport: Backported in 6.12.19" | ||
11989 | |||
11990 | CVE_STATUS[CVE-2025-21918] = "cpe-stable-backport: Backported in 6.12.19" | ||
11991 | |||
11992 | CVE_STATUS[CVE-2025-21919] = "cpe-stable-backport: Backported in 6.12.19" | ||
11993 | |||
11994 | CVE_STATUS[CVE-2025-21920] = "cpe-stable-backport: Backported in 6.12.19" | ||
11995 | |||
11996 | CVE_STATUS[CVE-2025-21921] = "cpe-stable-backport: Backported in 6.12.19" | ||
11997 | |||
11998 | CVE_STATUS[CVE-2025-21922] = "cpe-stable-backport: Backported in 6.12.19" | ||
11999 | |||
12000 | CVE_STATUS[CVE-2025-21923] = "cpe-stable-backport: Backported in 6.12.19" | ||
12001 | |||
12002 | CVE_STATUS[CVE-2025-21924] = "cpe-stable-backport: Backported in 6.12.19" | ||
12003 | |||
12004 | CVE_STATUS[CVE-2025-21925] = "cpe-stable-backport: Backported in 6.12.19" | ||
12005 | |||
12006 | CVE_STATUS[CVE-2025-21926] = "cpe-stable-backport: Backported in 6.12.19" | ||
12007 | |||
12008 | CVE_STATUS[CVE-2025-21927] = "cpe-stable-backport: Backported in 6.12.19" | ||
12009 | |||
12010 | CVE_STATUS[CVE-2025-21928] = "cpe-stable-backport: Backported in 6.12.19" | ||
12011 | |||
12012 | CVE_STATUS[CVE-2025-21929] = "cpe-stable-backport: Backported in 6.12.19" | ||
12013 | |||
12014 | CVE_STATUS[CVE-2025-21930] = "cpe-stable-backport: Backported in 6.12.19" | ||
12015 | |||
12016 | CVE_STATUS[CVE-2025-21931] = "cpe-stable-backport: Backported in 6.12.19" | ||
12017 | |||
12018 | CVE_STATUS[CVE-2025-21932] = "cpe-stable-backport: Backported in 6.12.19" | ||
12019 | |||
12020 | CVE_STATUS[CVE-2025-21933] = "fixed-version: only affects 6.13 onwards" | ||
12021 | |||
12022 | CVE_STATUS[CVE-2025-21934] = "cpe-stable-backport: Backported in 6.12.19" | ||
12023 | |||
12024 | CVE_STATUS[CVE-2025-21935] = "cpe-stable-backport: Backported in 6.12.19" | ||
12025 | |||
12026 | CVE_STATUS[CVE-2025-21936] = "cpe-stable-backport: Backported in 6.12.19" | ||
12027 | |||
12028 | CVE_STATUS[CVE-2025-21937] = "cpe-stable-backport: Backported in 6.12.19" | ||
12029 | |||
12030 | CVE_STATUS[CVE-2025-21938] = "cpe-stable-backport: Backported in 6.12.19" | ||
12031 | |||
12032 | CVE_STATUS[CVE-2025-21939] = "cpe-stable-backport: Backported in 6.12.19" | ||
12033 | |||
12034 | CVE_STATUS[CVE-2025-21940] = "cpe-stable-backport: Backported in 6.12.19" | ||
12035 | |||
12036 | CVE_STATUS[CVE-2025-21941] = "cpe-stable-backport: Backported in 6.12.19" | ||
12037 | |||
12038 | CVE_STATUS[CVE-2025-21942] = "fixed-version: only affects 6.13.2 onwards" | ||
12039 | |||
12040 | CVE_STATUS[CVE-2025-21943] = "cpe-stable-backport: Backported in 6.12.19" | ||
12041 | |||
12042 | CVE_STATUS[CVE-2025-21944] = "cpe-stable-backport: Backported in 6.12.19" | ||
12043 | |||
12044 | CVE_STATUS[CVE-2025-21945] = "cpe-stable-backport: Backported in 6.12.19" | ||
12045 | |||
12046 | CVE_STATUS[CVE-2025-21946] = "cpe-stable-backport: Backported in 6.12.19" | ||
12047 | |||
12048 | CVE_STATUS[CVE-2025-21947] = "cpe-stable-backport: Backported in 6.12.19" | ||
12049 | |||
12050 | CVE_STATUS[CVE-2025-21948] = "cpe-stable-backport: Backported in 6.12.19" | ||
12051 | |||
12052 | # CVE-2025-21949 needs backporting (fixed from 6.14) | ||
12053 | |||
12054 | CVE_STATUS[CVE-2025-21950] = "cpe-stable-backport: Backported in 6.12.19" | ||
12055 | |||
12056 | CVE_STATUS[CVE-2025-21951] = "cpe-stable-backport: Backported in 6.12.19" | ||
12057 | |||
12058 | CVE_STATUS[CVE-2025-21952] = "fixed-version: only affects 6.13 onwards" | ||
12059 | |||
12060 | CVE_STATUS[CVE-2025-21953] = "fixed-version: only affects 6.13 onwards" | ||
12061 | |||
12062 | CVE_STATUS[CVE-2025-21954] = "cpe-stable-backport: Backported in 6.12.20" | ||
12063 | |||
12064 | CVE_STATUS[CVE-2025-21955] = "cpe-stable-backport: Backported in 6.12.20" | ||
12065 | |||
12066 | CVE_STATUS[CVE-2025-21956] = "cpe-stable-backport: Backported in 6.12.20" | ||
12067 | |||
12068 | CVE_STATUS[CVE-2025-21957] = "cpe-stable-backport: Backported in 6.12.20" | ||
12069 | |||
12070 | CVE_STATUS[CVE-2025-21958] = "cpe-stable-backport: Backported in 6.12.20" | ||
12071 | |||
12072 | CVE_STATUS[CVE-2025-21959] = "cpe-stable-backport: Backported in 6.12.20" | ||
12073 | |||
12074 | CVE_STATUS[CVE-2025-21960] = "cpe-stable-backport: Backported in 6.12.20" | ||
12075 | |||
12076 | CVE_STATUS[CVE-2025-21961] = "cpe-stable-backport: Backported in 6.12.20" | ||
12077 | |||
12078 | CVE_STATUS[CVE-2025-21962] = "cpe-stable-backport: Backported in 6.12.20" | ||
12079 | |||
12080 | CVE_STATUS[CVE-2025-21963] = "cpe-stable-backport: Backported in 6.12.20" | ||
12081 | |||
12082 | CVE_STATUS[CVE-2025-21964] = "cpe-stable-backport: Backported in 6.12.20" | ||
12083 | |||
12084 | CVE_STATUS[CVE-2025-21965] = "cpe-stable-backport: Backported in 6.12.20" | ||
12085 | |||
12086 | CVE_STATUS[CVE-2025-21966] = "cpe-stable-backport: Backported in 6.12.20" | ||
12087 | |||
12088 | CVE_STATUS[CVE-2025-21967] = "cpe-stable-backport: Backported in 6.12.20" | ||
12089 | |||
12090 | CVE_STATUS[CVE-2025-21968] = "cpe-stable-backport: Backported in 6.12.20" | ||
12091 | |||
12092 | CVE_STATUS[CVE-2025-21969] = "cpe-stable-backport: Backported in 6.12.20" | ||
12093 | |||
12094 | CVE_STATUS[CVE-2025-21970] = "cpe-stable-backport: Backported in 6.12.20" | ||
12095 | |||
12096 | CVE_STATUS[CVE-2025-21971] = "cpe-stable-backport: Backported in 6.12.20" | ||
12097 | |||
12098 | CVE_STATUS[CVE-2025-21972] = "cpe-stable-backport: Backported in 6.12.20" | ||
12099 | |||
12100 | CVE_STATUS[CVE-2025-21973] = "cpe-stable-backport: Backported in 6.12.20" | ||
12101 | |||
12102 | CVE_STATUS[CVE-2025-21974] = "cpe-stable-backport: Backported in 6.12.20" | ||
12103 | |||
12104 | CVE_STATUS[CVE-2025-21975] = "cpe-stable-backport: Backported in 6.12.20" | ||
12105 | |||
12106 | CVE_STATUS[CVE-2025-21976] = "cpe-stable-backport: Backported in 6.12.20" | ||
12107 | |||
12108 | CVE_STATUS[CVE-2025-21977] = "cpe-stable-backport: Backported in 6.12.20" | ||
12109 | |||
12110 | CVE_STATUS[CVE-2025-21978] = "cpe-stable-backport: Backported in 6.12.20" | ||
12111 | |||
12112 | CVE_STATUS[CVE-2025-21979] = "cpe-stable-backport: Backported in 6.12.20" | ||
12113 | |||
12114 | CVE_STATUS[CVE-2025-21980] = "cpe-stable-backport: Backported in 6.12.20" | ||
12115 | |||
12116 | CVE_STATUS[CVE-2025-21981] = "cpe-stable-backport: Backported in 6.12.20" | ||
12117 | |||
12118 | CVE_STATUS[CVE-2025-21982] = "cpe-stable-backport: Backported in 6.12.20" | ||
12119 | |||
12120 | CVE_STATUS[CVE-2025-21983] = "cpe-stable-backport: Backported in 6.12.20" | ||
12121 | |||
12122 | CVE_STATUS[CVE-2025-21984] = "cpe-stable-backport: Backported in 6.12.20" | ||
12123 | |||
12124 | CVE_STATUS[CVE-2025-21985] = "cpe-stable-backport: Backported in 6.12.20" | ||
12125 | |||
12126 | CVE_STATUS[CVE-2025-21986] = "cpe-stable-backport: Backported in 6.12.20" | ||
12127 | |||
12128 | CVE_STATUS[CVE-2025-21987] = "cpe-stable-backport: Backported in 6.12.18" | ||
12129 | |||
12130 | # CVE-2025-21988 has no known resolution | ||
12131 | |||
12132 | CVE_STATUS[CVE-2025-21989] = "cpe-stable-backport: Backported in 6.12.20" | ||
12133 | |||
12134 | CVE_STATUS[CVE-2025-21990] = "cpe-stable-backport: Backported in 6.12.20" | ||
12135 | |||
12136 | CVE_STATUS[CVE-2025-21991] = "cpe-stable-backport: Backported in 6.12.20" | ||
12137 | |||
12138 | CVE_STATUS[CVE-2025-21992] = "cpe-stable-backport: Backported in 6.12.20" | ||
12139 | |||
12140 | CVE_STATUS[CVE-2025-21993] = "cpe-stable-backport: Backported in 6.12.20" | ||
12141 | |||
12142 | CVE_STATUS[CVE-2025-21994] = "cpe-stable-backport: Backported in 6.12.21" | ||
12143 | |||
12144 | CVE_STATUS[CVE-2025-21995] = "cpe-stable-backport: Backported in 6.12.21" | ||
12145 | |||
12146 | CVE_STATUS[CVE-2025-21996] = "cpe-stable-backport: Backported in 6.12.21" | ||
12147 | |||
12148 | CVE_STATUS[CVE-2025-21997] = "cpe-stable-backport: Backported in 6.12.21" | ||
12149 | |||
12150 | CVE_STATUS[CVE-2025-21998] = "cpe-stable-backport: Backported in 6.12.21" | ||
12151 | |||
12152 | CVE_STATUS[CVE-2025-21999] = "cpe-stable-backport: Backported in 6.12.21" | ||
12153 | |||
12154 | CVE_STATUS[CVE-2025-22000] = "cpe-stable-backport: Backported in 6.12.21" | ||
12155 | |||
12156 | CVE_STATUS[CVE-2025-22001] = "cpe-stable-backport: Backported in 6.12.21" | ||
12157 | |||
12158 | CVE_STATUS[CVE-2025-22002] = "cpe-stable-backport: Backported in 6.12.21" | ||
12159 | |||
12160 | CVE_STATUS[CVE-2025-22003] = "cpe-stable-backport: Backported in 6.12.21" | ||
12161 | |||
12162 | CVE_STATUS[CVE-2025-22004] = "cpe-stable-backport: Backported in 6.12.21" | ||
12163 | |||
12164 | CVE_STATUS[CVE-2025-22005] = "cpe-stable-backport: Backported in 6.12.21" | ||
12165 | |||
12166 | CVE_STATUS[CVE-2025-22006] = "cpe-stable-backport: Backported in 6.12.21" | ||
12167 | |||
12168 | CVE_STATUS[CVE-2025-22007] = "cpe-stable-backport: Backported in 6.12.21" | ||
12169 | |||
12170 | CVE_STATUS[CVE-2025-22008] = "cpe-stable-backport: Backported in 6.12.21" | ||
12171 | |||
12172 | CVE_STATUS[CVE-2025-22009] = "cpe-stable-backport: Backported in 6.12.21" | ||
12173 | |||
12174 | CVE_STATUS[CVE-2025-22010] = "cpe-stable-backport: Backported in 6.12.21" | ||
12175 | |||
12176 | CVE_STATUS[CVE-2025-22011] = "cpe-stable-backport: Backported in 6.12.21" | ||
12177 | |||
12178 | CVE_STATUS[CVE-2025-22012] = "fixed-version: only affects 6.13 onwards" | ||
12179 | |||
12180 | CVE_STATUS[CVE-2025-22013] = "cpe-stable-backport: Backported in 6.12.21" | ||
12181 | |||
12182 | CVE_STATUS[CVE-2025-22014] = "cpe-stable-backport: Backported in 6.12.21" | ||
12183 | |||
12184 | CVE_STATUS[CVE-2025-22015] = "cpe-stable-backport: Backported in 6.12.21" | ||
12185 | |||
12186 | CVE_STATUS[CVE-2025-22016] = "cpe-stable-backport: Backported in 6.12.21" | ||
12187 | |||
12188 | CVE_STATUS[CVE-2025-22017] = "cpe-stable-backport: Backported in 6.12.21" | ||
12189 | |||
12190 | CVE_STATUS[CVE-2025-22018] = "cpe-stable-backport: Backported in 6.12.22" | ||
12191 | |||
12192 | CVE_STATUS[CVE-2025-22019] = "cpe-stable-backport: Backported in 6.12.22" | ||
12193 | |||
12194 | CVE_STATUS[CVE-2025-22020] = "cpe-stable-backport: Backported in 6.12.22" | ||
12195 | |||
12196 | CVE_STATUS[CVE-2025-22021] = "cpe-stable-backport: Backported in 6.12.22" | ||
12197 | |||
12198 | CVE_STATUS[CVE-2025-22022] = "cpe-stable-backport: Backported in 6.12.22" | ||
12199 | |||
12200 | CVE_STATUS[CVE-2025-22023] = "cpe-stable-backport: Backported in 6.12.22" | ||
12201 | |||
12202 | CVE_STATUS[CVE-2025-22024] = "cpe-stable-backport: Backported in 6.12.23" | ||
12203 | |||
12204 | CVE_STATUS[CVE-2025-22025] = "cpe-stable-backport: Backported in 6.12.23" | ||
12205 | |||
12206 | CVE_STATUS[CVE-2025-22026] = "cpe-stable-backport: Backported in 6.12.24" | ||
12207 | |||
12208 | CVE_STATUS[CVE-2025-22027] = "cpe-stable-backport: Backported in 6.12.23" | ||
12209 | |||
12210 | CVE_STATUS[CVE-2025-22028] = "cpe-stable-backport: Backported in 6.12.23" | ||
12211 | |||
12212 | CVE_STATUS[CVE-2025-22030] = "cpe-stable-backport: Backported in 6.12.23" | ||
12213 | |||
12214 | CVE_STATUS[CVE-2025-22031] = "fixed-version: only affects 6.13 onwards" | ||
12215 | |||
12216 | CVE_STATUS[CVE-2025-22032] = "cpe-stable-backport: Backported in 6.12.23" | ||
12217 | |||
12218 | CVE_STATUS[CVE-2025-22033] = "cpe-stable-backport: Backported in 6.12.23" | ||
12219 | |||
12220 | CVE_STATUS[CVE-2025-22034] = "cpe-stable-backport: Backported in 6.12.23" | ||
12221 | |||
12222 | CVE_STATUS[CVE-2025-22035] = "cpe-stable-backport: Backported in 6.12.23" | ||
12223 | |||
12224 | CVE_STATUS[CVE-2025-22036] = "cpe-stable-backport: Backported in 6.12.23" | ||
12225 | |||
12226 | CVE_STATUS[CVE-2025-22037] = "cpe-stable-backport: Backported in 6.12.23" | ||
12227 | |||
12228 | CVE_STATUS[CVE-2025-22038] = "cpe-stable-backport: Backported in 6.12.23" | ||
12229 | |||
12230 | CVE_STATUS[CVE-2025-22039] = "cpe-stable-backport: Backported in 6.12.23" | ||
12231 | |||
12232 | CVE_STATUS[CVE-2025-22040] = "cpe-stable-backport: Backported in 6.12.23" | ||
12233 | |||
12234 | CVE_STATUS[CVE-2025-22041] = "cpe-stable-backport: Backported in 6.12.23" | ||
12235 | |||
12236 | CVE_STATUS[CVE-2025-22042] = "cpe-stable-backport: Backported in 6.12.23" | ||
12237 | |||
12238 | CVE_STATUS[CVE-2025-22043] = "cpe-stable-backport: Backported in 6.12.23" | ||
12239 | |||
12240 | CVE_STATUS[CVE-2025-22044] = "cpe-stable-backport: Backported in 6.12.23" | ||
12241 | |||
12242 | CVE_STATUS[CVE-2025-22045] = "cpe-stable-backport: Backported in 6.12.23" | ||
12243 | |||
12244 | CVE_STATUS[CVE-2025-22046] = "cpe-stable-backport: Backported in 6.12.23" | ||
12245 | |||
12246 | CVE_STATUS[CVE-2025-22047] = "cpe-stable-backport: Backported in 6.12.23" | ||
12247 | |||
12248 | CVE_STATUS[CVE-2025-22048] = "cpe-stable-backport: Backported in 6.12.23" | ||
12249 | |||
12250 | CVE_STATUS[CVE-2025-22049] = "cpe-stable-backport: Backported in 6.12.23" | ||
12251 | |||
12252 | CVE_STATUS[CVE-2025-22050] = "cpe-stable-backport: Backported in 6.12.23" | ||
12253 | |||
12254 | CVE_STATUS[CVE-2025-22051] = "fixed-version: only affects 6.13 onwards" | ||
12255 | |||
12256 | CVE_STATUS[CVE-2025-22052] = "fixed-version: only affects 6.13 onwards" | ||
12257 | |||
12258 | CVE_STATUS[CVE-2025-22053] = "cpe-stable-backport: Backported in 6.12.23" | ||
12259 | |||
12260 | CVE_STATUS[CVE-2025-22054] = "cpe-stable-backport: Backported in 6.12.23" | ||
12261 | |||
12262 | CVE_STATUS[CVE-2025-22055] = "cpe-stable-backport: Backported in 6.12.23" | ||
12263 | |||
12264 | CVE_STATUS[CVE-2025-22056] = "cpe-stable-backport: Backported in 6.12.23" | ||
12265 | |||
12266 | CVE_STATUS[CVE-2025-22057] = "cpe-stable-backport: Backported in 6.12.23" | ||
12267 | |||
12268 | CVE_STATUS[CVE-2025-22058] = "cpe-stable-backport: Backported in 6.12.23" | ||
12269 | |||
12270 | CVE_STATUS[CVE-2025-22059] = "cpe-stable-backport: Backported in 6.12.23" | ||
12271 | |||
12272 | CVE_STATUS[CVE-2025-22060] = "cpe-stable-backport: Backported in 6.12.23" | ||
12273 | |||
12274 | CVE_STATUS[CVE-2025-22061] = "fixed-version: only affects 6.14 onwards" | ||
12275 | |||
12276 | CVE_STATUS[CVE-2025-22062] = "cpe-stable-backport: Backported in 6.12.23" | ||
12277 | |||
12278 | CVE_STATUS[CVE-2025-22063] = "cpe-stable-backport: Backported in 6.12.23" | ||
12279 | |||
12280 | CVE_STATUS[CVE-2025-22064] = "cpe-stable-backport: Backported in 6.12.23" | ||
12281 | |||
12282 | CVE_STATUS[CVE-2025-22065] = "cpe-stable-backport: Backported in 6.12.23" | ||
12283 | |||
12284 | CVE_STATUS[CVE-2025-22066] = "cpe-stable-backport: Backported in 6.12.23" | ||
12285 | |||
12286 | CVE_STATUS[CVE-2025-22067] = "cpe-stable-backport: Backported in 6.12.23" | ||
12287 | |||
12288 | CVE_STATUS[CVE-2025-22068] = "cpe-stable-backport: Backported in 6.12.23" | ||
12289 | |||
12290 | CVE_STATUS[CVE-2025-22069] = "fixed-version: only affects 6.14 onwards" | ||
12291 | |||
12292 | CVE_STATUS[CVE-2025-22070] = "cpe-stable-backport: Backported in 6.12.23" | ||
12293 | |||
12294 | CVE_STATUS[CVE-2025-22071] = "cpe-stable-backport: Backported in 6.12.23" | ||
12295 | |||
12296 | CVE_STATUS[CVE-2025-22072] = "cpe-stable-backport: Backported in 6.12.23" | ||
12297 | |||
12298 | CVE_STATUS[CVE-2025-22073] = "cpe-stable-backport: Backported in 6.12.23" | ||
12299 | |||
12300 | CVE_STATUS[CVE-2025-22074] = "cpe-stable-backport: Backported in 6.12.23" | ||
12301 | |||
12302 | CVE_STATUS[CVE-2025-22075] = "cpe-stable-backport: Backported in 6.12.23" | ||
12303 | |||
12304 | CVE_STATUS[CVE-2025-22076] = "cpe-stable-backport: Backported in 6.12.23" | ||
12305 | |||
12306 | CVE_STATUS[CVE-2025-22077] = "cpe-stable-backport: Backported in 6.12.25" | ||
12307 | |||
12308 | CVE_STATUS[CVE-2025-22078] = "cpe-stable-backport: Backported in 6.12.23" | ||
12309 | |||
12310 | CVE_STATUS[CVE-2025-22079] = "cpe-stable-backport: Backported in 6.12.23" | ||
12311 | |||
12312 | CVE_STATUS[CVE-2025-22080] = "cpe-stable-backport: Backported in 6.12.23" | ||
12313 | |||
12314 | CVE_STATUS[CVE-2025-22081] = "cpe-stable-backport: Backported in 6.12.23" | ||
12315 | |||
12316 | CVE_STATUS[CVE-2025-22082] = "cpe-stable-backport: Backported in 6.12.23" | ||
12317 | |||
12318 | CVE_STATUS[CVE-2025-22083] = "cpe-stable-backport: Backported in 6.12.23" | ||
12319 | |||
12320 | CVE_STATUS[CVE-2025-22084] = "cpe-stable-backport: Backported in 6.12.23" | ||
12321 | |||
12322 | CVE_STATUS[CVE-2025-22085] = "cpe-stable-backport: Backported in 6.12.23" | ||
12323 | |||
12324 | CVE_STATUS[CVE-2025-22086] = "cpe-stable-backport: Backported in 6.12.23" | ||
12325 | |||
12326 | CVE_STATUS[CVE-2025-22087] = "cpe-stable-backport: Backported in 6.12.23" | ||
12327 | |||
12328 | CVE_STATUS[CVE-2025-22088] = "cpe-stable-backport: Backported in 6.12.23" | ||
12329 | |||
12330 | CVE_STATUS[CVE-2025-22089] = "cpe-stable-backport: Backported in 6.12.23" | ||
12331 | |||
12332 | CVE_STATUS[CVE-2025-22090] = "cpe-stable-backport: Backported in 6.12.23" | ||
12333 | |||
12334 | CVE_STATUS[CVE-2025-22091] = "cpe-stable-backport: Backported in 6.12.23" | ||
12335 | |||
12336 | CVE_STATUS[CVE-2025-22092] = "fixed-version: only affects 6.13 onwards" | ||
12337 | |||
12338 | CVE_STATUS[CVE-2025-22093] = "cpe-stable-backport: Backported in 6.12.23" | ||
12339 | |||
12340 | CVE_STATUS[CVE-2025-22094] = "fixed-version: only affects 6.13 onwards" | ||
12341 | |||
12342 | CVE_STATUS[CVE-2025-22095] = "cpe-stable-backport: Backported in 6.12.23" | ||
12343 | |||
12344 | CVE_STATUS[CVE-2025-22096] = "fixed-version: only affects 6.14 onwards" | ||
12345 | |||
12346 | CVE_STATUS[CVE-2025-22097] = "cpe-stable-backport: Backported in 6.12.23" | ||
12347 | |||
12348 | CVE_STATUS[CVE-2025-22098] = "fixed-version: only affects 6.13 onwards" | ||
12349 | |||
12350 | CVE_STATUS[CVE-2025-22099] = "fixed-version: only affects 6.14 onwards" | ||
12351 | |||
12352 | CVE_STATUS[CVE-2025-22100] = "fixed-version: only affects 6.13 onwards" | ||
12353 | |||
12354 | # CVE-2025-22101 needs backporting (fixed from 6.15) | ||
12355 | |||
12356 | CVE_STATUS[CVE-2025-22102] = "cpe-stable-backport: Backported in 6.12.30" | ||
12357 | |||
12358 | # CVE-2025-22103 needs backporting (fixed from 6.15) | ||
12359 | |||
12360 | # CVE-2025-22104 needs backporting (fixed from 6.15) | ||
12361 | |||
12362 | # CVE-2025-22105 needs backporting (fixed from 6.15) | ||
12363 | |||
12364 | # CVE-2025-22106 needs backporting (fixed from 6.15) | ||
12365 | |||
12366 | # CVE-2025-22107 needs backporting (fixed from 6.15) | ||
12367 | |||
12368 | # CVE-2025-22108 needs backporting (fixed from 6.15) | ||
12369 | |||
12370 | # CVE-2025-22109 needs backporting (fixed from 6.15) | ||
12371 | |||
12372 | CVE_STATUS[CVE-2025-22110] = "fixed-version: only affects 6.14 onwards" | ||
12373 | |||
12374 | # CVE-2025-22111 needs backporting (fixed from 6.15) | ||
12375 | |||
12376 | CVE_STATUS[CVE-2025-22112] = "fixed-version: only affects 6.14 onwards" | ||
12377 | |||
12378 | # CVE-2025-22113 needs backporting (fixed from 6.15) | ||
12379 | |||
12380 | CVE_STATUS[CVE-2025-22114] = "fixed-version: only affects 6.14 onwards" | ||
12381 | |||
12382 | # CVE-2025-22115 needs backporting (fixed from 6.15) | ||
12383 | |||
12384 | # CVE-2025-22116 needs backporting (fixed from 6.15) | ||
12385 | |||
12386 | # CVE-2025-22117 needs backporting (fixed from 6.15) | ||
12387 | |||
12388 | CVE_STATUS[CVE-2025-22118] = "fixed-version: only affects 6.13 onwards" | ||
12389 | |||
12390 | CVE_STATUS[CVE-2025-22119] = "fixed-version: only affects 6.14 onwards" | ||
12391 | |||
12392 | CVE_STATUS[CVE-2025-22120] = "cpe-stable-backport: Backported in 6.12.26" | ||
12393 | |||
12394 | # CVE-2025-22121 needs backporting (fixed from 6.15) | ||
12395 | |||
12396 | # CVE-2025-22122 needs backporting (fixed from 6.15) | ||
12397 | |||
12398 | # CVE-2025-22123 needs backporting (fixed from 6.15) | ||
12399 | |||
12400 | # CVE-2025-22124 needs backporting (fixed from 6.15) | ||
12401 | |||
12402 | # CVE-2025-22125 needs backporting (fixed from 6.15) | ||
12403 | |||
12404 | CVE_STATUS[CVE-2025-22126] = "cpe-stable-backport: Backported in 6.12.25" | ||
12405 | |||
12406 | # CVE-2025-22127 needs backporting (fixed from 6.15) | ||
12407 | |||
12408 | # CVE-2025-22128 needs backporting (fixed from 6.15) | ||
12409 | |||
12410 | # CVE-2025-23129 needs backporting (fixed from 6.15) | ||
12411 | |||
12412 | # CVE-2025-23130 needs backporting (fixed from 6.15) | ||
12413 | |||
12414 | # CVE-2025-23131 needs backporting (fixed from 6.15) | ||
12415 | |||
12416 | # CVE-2025-23132 needs backporting (fixed from 6.15) | ||
12417 | |||
12418 | # CVE-2025-23133 needs backporting (fixed from 6.15) | ||
12419 | |||
12420 | CVE_STATUS[CVE-2025-23134] = "cpe-stable-backport: Backported in 6.12.23" | ||
12421 | |||
12422 | # CVE-2025-23135 needs backporting (fixed from 6.15) | ||
12423 | |||
12424 | CVE_STATUS[CVE-2025-23136] = "cpe-stable-backport: Backported in 6.12.23" | ||
12425 | |||
12426 | # CVE-2025-23137 needs backporting (fixed from 6.15) | ||
12427 | |||
12428 | CVE_STATUS[CVE-2025-23138] = "cpe-stable-backport: Backported in 6.12.23" | ||
12429 | |||
12430 | CVE_STATUS[CVE-2025-23140] = "cpe-stable-backport: Backported in 6.12.25" | ||
12431 | |||
12432 | CVE_STATUS[CVE-2025-23141] = "cpe-stable-backport: Backported in 6.12.24" | ||
12433 | |||
12434 | CVE_STATUS[CVE-2025-23142] = "cpe-stable-backport: Backported in 6.12.24" | ||
12435 | |||
12436 | CVE_STATUS[CVE-2025-23143] = "cpe-stable-backport: Backported in 6.12.24" | ||
12437 | |||
12438 | CVE_STATUS[CVE-2025-23144] = "cpe-stable-backport: Backported in 6.12.24" | ||
12439 | |||
12440 | CVE_STATUS[CVE-2025-23145] = "cpe-stable-backport: Backported in 6.12.24" | ||
12441 | |||
12442 | CVE_STATUS[CVE-2025-23146] = "cpe-stable-backport: Backported in 6.12.24" | ||
12443 | |||
12444 | CVE_STATUS[CVE-2025-23147] = "cpe-stable-backport: Backported in 6.12.24" | ||
12445 | |||
12446 | CVE_STATUS[CVE-2025-23148] = "cpe-stable-backport: Backported in 6.12.24" | ||
12447 | |||
12448 | CVE_STATUS[CVE-2025-23149] = "cpe-stable-backport: Backported in 6.12.24" | ||
12449 | |||
12450 | CVE_STATUS[CVE-2025-23150] = "cpe-stable-backport: Backported in 6.12.24" | ||
12451 | |||
12452 | CVE_STATUS[CVE-2025-23151] = "cpe-stable-backport: Backported in 6.12.24" | ||
12453 | |||
12454 | CVE_STATUS[CVE-2025-23152] = "fixed-version: only affects 6.14 onwards" | ||
12455 | |||
12456 | CVE_STATUS[CVE-2025-23153] = "fixed-version: only affects 6.14 onwards" | ||
12457 | |||
12458 | CVE_STATUS[CVE-2025-23154] = "cpe-stable-backport: Backported in 6.12.24" | ||
12459 | |||
12460 | # CVE-2025-23155 needs backporting (fixed from 6.15) | ||
12461 | |||
12462 | CVE_STATUS[CVE-2025-23156] = "cpe-stable-backport: Backported in 6.12.24" | ||
12463 | |||
12464 | CVE_STATUS[CVE-2025-23157] = "cpe-stable-backport: Backported in 6.12.24" | ||
12465 | |||
12466 | CVE_STATUS[CVE-2025-23158] = "cpe-stable-backport: Backported in 6.12.24" | ||
12467 | |||
12468 | CVE_STATUS[CVE-2025-23159] = "cpe-stable-backport: Backported in 6.12.24" | ||
12469 | |||
12470 | CVE_STATUS[CVE-2025-23160] = "cpe-stable-backport: Backported in 6.12.24" | ||
12471 | |||
12472 | CVE_STATUS[CVE-2025-23161] = "cpe-stable-backport: Backported in 6.12.24" | ||
12473 | |||
12474 | CVE_STATUS[CVE-2025-23162] = "cpe-stable-backport: Backported in 6.12.24" | ||
12475 | |||
12476 | CVE_STATUS[CVE-2025-23163] = "cpe-stable-backport: Backported in 6.12.24" | ||
12477 | |||
12478 | CVE_STATUS[CVE-2025-37738] = "cpe-stable-backport: Backported in 6.12.24" | ||
12479 | |||
12480 | CVE_STATUS[CVE-2025-37739] = "cpe-stable-backport: Backported in 6.12.24" | ||
12481 | |||
12482 | CVE_STATUS[CVE-2025-37740] = "cpe-stable-backport: Backported in 6.12.24" | ||
12483 | |||
12484 | CVE_STATUS[CVE-2025-37741] = "cpe-stable-backport: Backported in 6.12.24" | ||
12485 | |||
12486 | CVE_STATUS[CVE-2025-37742] = "cpe-stable-backport: Backported in 6.12.24" | ||
12487 | |||
12488 | # CVE-2025-37743 needs backporting (fixed from 6.15) | ||
12489 | |||
12490 | CVE_STATUS[CVE-2025-37744] = "cpe-stable-backport: Backported in 6.12.24" | ||
12491 | |||
12492 | CVE_STATUS[CVE-2025-37745] = "cpe-stable-backport: Backported in 6.12.24" | ||
12493 | |||
12494 | # CVE-2025-37746 needs backporting (fixed from 6.15) | ||
12495 | |||
12496 | CVE_STATUS[CVE-2025-37747] = "cpe-stable-backport: Backported in 6.12.24" | ||
12497 | |||
12498 | CVE_STATUS[CVE-2025-37748] = "cpe-stable-backport: Backported in 6.12.24" | ||
12499 | |||
12500 | CVE_STATUS[CVE-2025-37749] = "cpe-stable-backport: Backported in 6.12.24" | ||
12501 | |||
12502 | CVE_STATUS[CVE-2025-37750] = "cpe-stable-backport: Backported in 6.12.24" | ||
12503 | |||
12504 | CVE_STATUS[CVE-2025-37751] = "fixed-version: only affects 6.14 onwards" | ||
12505 | |||
12506 | CVE_STATUS[CVE-2025-37752] = "cpe-stable-backport: Backported in 6.12.24" | ||
12507 | |||
12508 | CVE_STATUS[CVE-2025-37754] = "cpe-stable-backport: Backported in 6.12.24" | ||
12509 | |||
12510 | CVE_STATUS[CVE-2025-37755] = "cpe-stable-backport: Backported in 6.12.24" | ||
12511 | |||
12512 | CVE_STATUS[CVE-2025-37756] = "cpe-stable-backport: Backported in 6.12.24" | ||
12513 | |||
12514 | CVE_STATUS[CVE-2025-37757] = "cpe-stable-backport: Backported in 6.12.24" | ||
12515 | |||
12516 | CVE_STATUS[CVE-2025-37758] = "cpe-stable-backport: Backported in 6.12.24" | ||
12517 | |||
12518 | CVE_STATUS[CVE-2025-37759] = "cpe-stable-backport: Backported in 6.12.24" | ||
12519 | |||
12520 | CVE_STATUS[CVE-2025-37760] = "cpe-stable-backport: Backported in 6.12.25" | ||
12521 | |||
12522 | CVE_STATUS[CVE-2025-37761] = "cpe-stable-backport: Backported in 6.12.25" | ||
12523 | |||
12524 | CVE_STATUS[CVE-2025-37762] = "fixed-version: only affects 6.14 onwards" | ||
12525 | |||
12526 | CVE_STATUS[CVE-2025-37763] = "cpe-stable-backport: Backported in 6.12.25" | ||
12527 | |||
12528 | CVE_STATUS[CVE-2025-37764] = "cpe-stable-backport: Backported in 6.12.25" | ||
12529 | |||
12530 | CVE_STATUS[CVE-2025-37765] = "cpe-stable-backport: Backported in 6.12.25" | ||
12531 | |||
12532 | CVE_STATUS[CVE-2025-37766] = "cpe-stable-backport: Backported in 6.12.25" | ||
12533 | |||
12534 | CVE_STATUS[CVE-2025-37767] = "cpe-stable-backport: Backported in 6.12.25" | ||
12535 | |||
12536 | CVE_STATUS[CVE-2025-37768] = "cpe-stable-backport: Backported in 6.12.25" | ||
12537 | |||
12538 | CVE_STATUS[CVE-2025-37769] = "cpe-stable-backport: Backported in 6.12.25" | ||
12539 | |||
12540 | CVE_STATUS[CVE-2025-37770] = "cpe-stable-backport: Backported in 6.12.25" | ||
12541 | |||
12542 | CVE_STATUS[CVE-2025-37771] = "cpe-stable-backport: Backported in 6.12.25" | ||
12543 | |||
12544 | CVE_STATUS[CVE-2025-37772] = "cpe-stable-backport: Backported in 6.12.25" | ||
12545 | |||
12546 | CVE_STATUS[CVE-2025-37773] = "cpe-stable-backport: Backported in 6.12.25" | ||
12547 | |||
12548 | CVE_STATUS[CVE-2025-37774] = "cpe-stable-backport: Backported in 6.12.25" | ||
12549 | |||
12550 | CVE_STATUS[CVE-2025-37775] = "cpe-stable-backport: Backported in 6.12.25" | ||
12551 | |||
12552 | CVE_STATUS[CVE-2025-37776] = "cpe-stable-backport: Backported in 6.12.25" | ||
12553 | |||
12554 | CVE_STATUS[CVE-2025-37777] = "cpe-stable-backport: Backported in 6.12.26" | ||
12555 | |||
12556 | CVE_STATUS[CVE-2025-37778] = "cpe-stable-backport: Backported in 6.12.25" | ||
12557 | |||
12558 | CVE_STATUS[CVE-2025-37779] = "fixed-version: only affects 6.14 onwards" | ||
12559 | |||
12560 | CVE_STATUS[CVE-2025-37780] = "cpe-stable-backport: Backported in 6.12.25" | ||
12561 | |||
12562 | CVE_STATUS[CVE-2025-37781] = "cpe-stable-backport: Backported in 6.12.25" | ||
12563 | |||
12564 | CVE_STATUS[CVE-2025-37783] = "fixed-version: only affects 6.14 onwards" | ||
12565 | |||
12566 | CVE_STATUS[CVE-2025-37784] = "cpe-stable-backport: Backported in 6.12.25" | ||
12567 | |||
12568 | CVE_STATUS[CVE-2025-37785] = "cpe-stable-backport: Backported in 6.12.23" | ||
12569 | |||
12570 | CVE_STATUS[CVE-2025-37786] = "cpe-stable-backport: Backported in 6.12.25" | ||
12571 | |||
12572 | CVE_STATUS[CVE-2025-37787] = "cpe-stable-backport: Backported in 6.12.25" | ||
12573 | |||
12574 | CVE_STATUS[CVE-2025-37788] = "cpe-stable-backport: Backported in 6.12.25" | ||
12575 | |||
12576 | CVE_STATUS[CVE-2025-37789] = "cpe-stable-backport: Backported in 6.12.25" | ||
12577 | |||
12578 | CVE_STATUS[CVE-2025-37790] = "cpe-stable-backport: Backported in 6.12.25" | ||
12579 | |||
12580 | CVE_STATUS[CVE-2025-37791] = "cpe-stable-backport: Backported in 6.12.25" | ||
12581 | |||
12582 | CVE_STATUS[CVE-2025-37792] = "cpe-stable-backport: Backported in 6.12.25" | ||
12583 | |||
12584 | CVE_STATUS[CVE-2025-37793] = "cpe-stable-backport: Backported in 6.12.25" | ||
12585 | |||
12586 | CVE_STATUS[CVE-2025-37794] = "cpe-stable-backport: Backported in 6.12.25" | ||
12587 | |||
12588 | CVE_STATUS[CVE-2025-37796] = "cpe-stable-backport: Backported in 6.12.25" | ||
12589 | |||
12590 | CVE_STATUS[CVE-2025-37797] = "cpe-stable-backport: Backported in 6.12.26" | ||
12591 | |||
12592 | CVE_STATUS[CVE-2025-37798] = "cpe-stable-backport: Backported in 6.12.24" | ||
12593 | |||
12594 | CVE_STATUS[CVE-2025-37799] = "cpe-stable-backport: Backported in 6.12.26" | ||
12595 | |||
12596 | CVE_STATUS[CVE-2025-37800] = "cpe-stable-backport: Backported in 6.12.26" | ||
12597 | |||
12598 | CVE_STATUS[CVE-2025-37801] = "cpe-stable-backport: Backported in 6.12.26" | ||
12599 | |||
12600 | CVE_STATUS[CVE-2025-37802] = "cpe-stable-backport: Backported in 6.12.26" | ||
12601 | |||
12602 | # CVE-2025-37803 needs backporting (fixed from 6.15) | ||
12603 | |||
12604 | CVE_STATUS[CVE-2025-37805] = "cpe-stable-backport: Backported in 6.12.26" | ||
12605 | |||
12606 | CVE_STATUS[CVE-2025-37806] = "cpe-stable-backport: Backported in 6.12.26" | ||
12607 | |||
12608 | CVE_STATUS[CVE-2025-37807] = "cpe-stable-backport: Backported in 6.12.26" | ||
12609 | |||
12610 | CVE_STATUS[CVE-2025-37808] = "cpe-stable-backport: Backported in 6.12.26" | ||
12611 | |||
12612 | CVE_STATUS[CVE-2025-37809] = "cpe-stable-backport: Backported in 6.12.26" | ||
12613 | |||
12614 | CVE_STATUS[CVE-2025-37810] = "cpe-stable-backport: Backported in 6.12.26" | ||
12615 | |||
12616 | CVE_STATUS[CVE-2025-37811] = "cpe-stable-backport: Backported in 6.12.26" | ||
12617 | |||
12618 | CVE_STATUS[CVE-2025-37812] = "cpe-stable-backport: Backported in 6.12.26" | ||
12619 | |||
12620 | CVE_STATUS[CVE-2025-37813] = "cpe-stable-backport: Backported in 6.12.26" | ||
12621 | |||
12622 | CVE_STATUS[CVE-2025-37814] = "cpe-stable-backport: Backported in 6.12.26" | ||
12623 | |||
12624 | CVE_STATUS[CVE-2025-37815] = "cpe-stable-backport: Backported in 6.12.26" | ||
12625 | |||
12626 | CVE_STATUS[CVE-2025-37816] = "cpe-stable-backport: Backported in 6.12.26" | ||
12627 | |||
12628 | CVE_STATUS[CVE-2025-37817] = "cpe-stable-backport: Backported in 6.12.26" | ||
12629 | |||
12630 | CVE_STATUS[CVE-2025-37818] = "cpe-stable-backport: Backported in 6.12.26" | ||
12631 | |||
12632 | CVE_STATUS[CVE-2025-37819] = "cpe-stable-backport: Backported in 6.12.26" | ||
12633 | |||
12634 | CVE_STATUS[CVE-2025-37820] = "cpe-stable-backport: Backported in 6.12.26" | ||
12635 | |||
12636 | CVE_STATUS[CVE-2025-37821] = "cpe-stable-backport: Backported in 6.12.29" | ||
12637 | |||
12638 | CVE_STATUS[CVE-2025-37822] = "cpe-stable-backport: Backported in 6.12.26" | ||
12639 | |||
12640 | CVE_STATUS[CVE-2025-37823] = "cpe-stable-backport: Backported in 6.12.26" | ||
12641 | |||
12642 | CVE_STATUS[CVE-2025-37824] = "cpe-stable-backport: Backported in 6.12.26" | ||
12643 | |||
12644 | CVE_STATUS[CVE-2025-37825] = "fixed-version: only affects 6.14 onwards" | ||
12645 | |||
12646 | CVE_STATUS[CVE-2025-37826] = "cpe-stable-backport: Backported in 6.12.26" | ||
12647 | |||
12648 | CVE_STATUS[CVE-2025-37827] = "cpe-stable-backport: Backported in 6.12.26" | ||
12649 | |||
12650 | CVE_STATUS[CVE-2025-37828] = "cpe-stable-backport: Backported in 6.12.26" | ||
12651 | |||
12652 | CVE_STATUS[CVE-2025-37829] = "cpe-stable-backport: Backported in 6.12.26" | ||
12653 | |||
12654 | CVE_STATUS[CVE-2025-37830] = "cpe-stable-backport: Backported in 6.12.26" | ||
12655 | |||
12656 | CVE_STATUS[CVE-2025-37831] = "cpe-stable-backport: Backported in 6.12.26" | ||
12657 | |||
12658 | CVE_STATUS[CVE-2025-37833] = "cpe-stable-backport: Backported in 6.12.26" | ||
12659 | |||
12660 | CVE_STATUS[CVE-2025-37834] = "cpe-stable-backport: Backported in 6.12.26" | ||
12661 | |||
12662 | CVE_STATUS[CVE-2025-37836] = "cpe-stable-backport: Backported in 6.12.24" | ||
12663 | |||
12664 | CVE_STATUS[CVE-2025-37837] = "cpe-stable-backport: Backported in 6.12.24" | ||
12665 | |||
12666 | CVE_STATUS[CVE-2025-37838] = "cpe-stable-backport: Backported in 6.12.24" | ||
12667 | |||
12668 | CVE_STATUS[CVE-2025-37839] = "cpe-stable-backport: Backported in 6.12.24" | ||
12669 | |||
12670 | CVE_STATUS[CVE-2025-37840] = "cpe-stable-backport: Backported in 6.12.24" | ||
12671 | |||
12672 | CVE_STATUS[CVE-2025-37841] = "cpe-stable-backport: Backported in 6.12.24" | ||
12673 | |||
12674 | # CVE-2025-37842 needs backporting (fixed from 6.15) | ||
12675 | |||
12676 | CVE_STATUS[CVE-2025-37843] = "cpe-stable-backport: Backported in 6.12.24" | ||
12677 | |||
12678 | CVE_STATUS[CVE-2025-37844] = "cpe-stable-backport: Backported in 6.12.24" | ||
12679 | |||
12680 | CVE_STATUS[CVE-2025-37845] = "cpe-stable-backport: Backported in 6.12.24" | ||
12681 | |||
12682 | CVE_STATUS[CVE-2025-37846] = "cpe-stable-backport: Backported in 6.12.24" | ||
12683 | |||
12684 | CVE_STATUS[CVE-2025-37847] = "cpe-stable-backport: Backported in 6.12.24" | ||
12685 | |||
12686 | CVE_STATUS[CVE-2025-37848] = "cpe-stable-backport: Backported in 6.12.24" | ||
12687 | |||
12688 | CVE_STATUS[CVE-2025-37849] = "cpe-stable-backport: Backported in 6.12.24" | ||
12689 | |||
12690 | CVE_STATUS[CVE-2025-37850] = "cpe-stable-backport: Backported in 6.12.24" | ||
12691 | |||
12692 | CVE_STATUS[CVE-2025-37851] = "cpe-stable-backport: Backported in 6.12.24" | ||
12693 | |||
12694 | CVE_STATUS[CVE-2025-37852] = "cpe-stable-backport: Backported in 6.12.24" | ||
12695 | |||
12696 | CVE_STATUS[CVE-2025-37853] = "cpe-stable-backport: Backported in 6.12.24" | ||
12697 | |||
12698 | CVE_STATUS[CVE-2025-37854] = "cpe-stable-backport: Backported in 6.12.24" | ||
12699 | |||
12700 | # CVE-2025-37855 needs backporting (fixed from 6.15) | ||
12701 | |||
12702 | CVE_STATUS[CVE-2025-37856] = "cpe-stable-backport: Backported in 6.12.24" | ||
12703 | |||
12704 | CVE_STATUS[CVE-2025-37857] = "cpe-stable-backport: Backported in 6.12.24" | ||
12705 | |||
12706 | CVE_STATUS[CVE-2025-37858] = "cpe-stable-backport: Backported in 6.12.24" | ||
12707 | |||
12708 | CVE_STATUS[CVE-2025-37859] = "cpe-stable-backport: Backported in 6.12.24" | ||
12709 | |||
12710 | # CVE-2025-37860 needs backporting (fixed from 6.15) | ||
12711 | |||
12712 | CVE_STATUS[CVE-2025-37861] = "cpe-stable-backport: Backported in 6.12.24" | ||
12713 | |||
12714 | CVE_STATUS[CVE-2025-37862] = "cpe-stable-backport: Backported in 6.12.24" | ||
12715 | |||
12716 | CVE_STATUS[CVE-2025-37863] = "cpe-stable-backport: Backported in 6.12.25" | ||
12717 | |||
12718 | CVE_STATUS[CVE-2025-37864] = "cpe-stable-backport: Backported in 6.12.25" | ||
12719 | |||
12720 | CVE_STATUS[CVE-2025-37865] = "cpe-stable-backport: Backported in 6.12.25" | ||
12721 | |||
12722 | CVE_STATUS[CVE-2025-37866] = "fixed-version: only affects 6.14 onwards" | ||
12723 | |||
12724 | CVE_STATUS[CVE-2025-37867] = "cpe-stable-backport: Backported in 6.12.25" | ||
12725 | |||
12726 | CVE_STATUS[CVE-2025-37868] = "cpe-stable-backport: Backported in 6.12.25" | ||
12727 | |||
12728 | CVE_STATUS[CVE-2025-37869] = "cpe-stable-backport: Backported in 6.12.25" | ||
12729 | |||
12730 | CVE_STATUS[CVE-2025-37870] = "cpe-stable-backport: Backported in 6.12.25" | ||
12731 | |||
12732 | CVE_STATUS[CVE-2025-37871] = "cpe-stable-backport: Backported in 6.12.25" | ||
12733 | |||
12734 | CVE_STATUS[CVE-2025-37872] = "cpe-stable-backport: Backported in 6.12.25" | ||
12735 | |||
12736 | CVE_STATUS[CVE-2025-37873] = "cpe-stable-backport: Backported in 6.12.25" | ||
12737 | |||
12738 | CVE_STATUS[CVE-2025-37874] = "cpe-stable-backport: Backported in 6.12.25" | ||
12739 | |||
12740 | CVE_STATUS[CVE-2025-37875] = "cpe-stable-backport: Backported in 6.12.25" | ||
12741 | |||
12742 | CVE_STATUS[CVE-2025-37876] = "cpe-stable-backport: Backported in 6.12.26" | ||
12743 | |||
12744 | CVE_STATUS[CVE-2025-37877] = "cpe-stable-backport: Backported in 6.12.26" | ||
12745 | |||
12746 | CVE_STATUS[CVE-2025-37878] = "cpe-stable-backport: Backported in 6.12.26" | ||
12747 | |||
12748 | CVE_STATUS[CVE-2025-37879] = "cpe-stable-backport: Backported in 6.12.26" | ||
12749 | |||
12750 | # CVE-2025-37880 needs backporting (fixed from 6.15) | ||
12751 | |||
12752 | CVE_STATUS[CVE-2025-37881] = "cpe-stable-backport: Backported in 6.12.26" | ||
12753 | |||
12754 | CVE_STATUS[CVE-2025-37882] = "cpe-stable-backport: Backported in 6.12.26" | ||
12755 | |||
12756 | CVE_STATUS[CVE-2025-37883] = "cpe-stable-backport: Backported in 6.12.26" | ||
12757 | |||
12758 | CVE_STATUS[CVE-2025-37884] = "cpe-stable-backport: Backported in 6.12.26" | ||
12759 | |||
12760 | CVE_STATUS[CVE-2025-37885] = "cpe-stable-backport: Backported in 6.12.26" | ||
12761 | |||
12762 | CVE_STATUS[CVE-2025-37886] = "cpe-stable-backport: Backported in 6.12.26" | ||
12763 | |||
12764 | CVE_STATUS[CVE-2025-37887] = "cpe-stable-backport: Backported in 6.12.26" | ||
12765 | |||
12766 | CVE_STATUS[CVE-2025-37888] = "cpe-stable-backport: Backported in 6.12.26" | ||
12767 | |||
12768 | CVE_STATUS[CVE-2025-37889] = "cpe-stable-backport: Backported in 6.12.20" | ||
12769 | |||
12770 | CVE_STATUS[CVE-2025-37890] = "cpe-stable-backport: Backported in 6.12.28" | ||
12771 | |||
12772 | CVE_STATUS[CVE-2025-37891] = "cpe-stable-backport: Backported in 6.12.28" | ||
12773 | |||
12774 | CVE_STATUS[CVE-2025-37892] = "cpe-stable-backport: Backported in 6.12.24" | ||
12775 | |||
12776 | CVE_STATUS[CVE-2025-37893] = "cpe-stable-backport: Backported in 6.12.23" | ||
12777 | |||
12778 | CVE_STATUS[CVE-2025-37894] = "cpe-stable-backport: Backported in 6.12.28" | ||
12779 | |||
12780 | CVE_STATUS[CVE-2025-37895] = "cpe-stable-backport: Backported in 6.12.28" | ||
12781 | |||
12782 | CVE_STATUS[CVE-2025-37896] = "fixed-version: only affects 6.14 onwards" | ||
12783 | |||
12784 | CVE_STATUS[CVE-2025-37897] = "cpe-stable-backport: Backported in 6.12.28" | ||
12785 | |||
12786 | CVE_STATUS[CVE-2025-37898] = "fixed-version: only affects 6.13 onwards" | ||
12787 | |||
12788 | CVE_STATUS[CVE-2025-37899] = "cpe-stable-backport: Backported in 6.12.28" | ||
12789 | |||
12790 | CVE_STATUS[CVE-2025-37900] = "cpe-stable-backport: Backported in 6.12.28" | ||
12791 | |||
12792 | CVE_STATUS[CVE-2025-37901] = "cpe-stable-backport: Backported in 6.12.28" | ||
12793 | |||
12794 | CVE_STATUS[CVE-2025-37903] = "cpe-stable-backport: Backported in 6.12.28" | ||
12795 | |||
12796 | CVE_STATUS[CVE-2025-37904] = "fixed-version: only affects 6.13 onwards" | ||
12797 | |||
12798 | CVE_STATUS[CVE-2025-37905] = "cpe-stable-backport: Backported in 6.12.28" | ||
12799 | |||
12800 | # CVE-2025-37906 needs backporting (fixed from 6.15) | ||
12801 | |||
12802 | CVE_STATUS[CVE-2025-37907] = "cpe-stable-backport: Backported in 6.12.28" | ||
12803 | |||
12804 | CVE_STATUS[CVE-2025-37908] = "cpe-stable-backport: Backported in 6.12.28" | ||
12805 | |||
12806 | CVE_STATUS[CVE-2025-37909] = "cpe-stable-backport: Backported in 6.12.28" | ||
12807 | |||
12808 | CVE_STATUS[CVE-2025-37910] = "cpe-stable-backport: Backported in 6.12.28" | ||
12809 | |||
12810 | CVE_STATUS[CVE-2025-37911] = "cpe-stable-backport: Backported in 6.12.28" | ||
12811 | |||
12812 | CVE_STATUS[CVE-2025-37912] = "cpe-stable-backport: Backported in 6.12.28" | ||
12813 | |||
12814 | CVE_STATUS[CVE-2025-37913] = "cpe-stable-backport: Backported in 6.12.28" | ||
12815 | |||
12816 | CVE_STATUS[CVE-2025-37914] = "cpe-stable-backport: Backported in 6.12.28" | ||
12817 | |||
12818 | CVE_STATUS[CVE-2025-37915] = "cpe-stable-backport: Backported in 6.12.28" | ||
12819 | |||
12820 | CVE_STATUS[CVE-2025-37916] = "cpe-stable-backport: Backported in 6.12.28" | ||
12821 | |||
12822 | CVE_STATUS[CVE-2025-37917] = "cpe-stable-backport: Backported in 6.12.28" | ||
12823 | |||
12824 | CVE_STATUS[CVE-2025-37918] = "cpe-stable-backport: Backported in 6.12.28" | ||
12825 | |||
12826 | CVE_STATUS[CVE-2025-37919] = "cpe-stable-backport: Backported in 6.12.28" | ||
12827 | |||
12828 | CVE_STATUS[CVE-2025-37920] = "cpe-stable-backport: Backported in 6.12.28" | ||
12829 | |||
12830 | CVE_STATUS[CVE-2025-37921] = "cpe-stable-backport: Backported in 6.12.28" | ||
12831 | |||
12832 | CVE_STATUS[CVE-2025-37922] = "cpe-stable-backport: Backported in 6.12.28" | ||
12833 | |||
12834 | CVE_STATUS[CVE-2025-37923] = "cpe-stable-backport: Backported in 6.12.28" | ||
12835 | |||
12836 | CVE_STATUS[CVE-2025-37924] = "cpe-stable-backport: Backported in 6.12.28" | ||
12837 | |||
12838 | # CVE-2025-37925 needs backporting (fixed from 6.15) | ||
12839 | |||
12840 | CVE_STATUS[CVE-2025-37926] = "cpe-stable-backport: Backported in 6.12.28" | ||
12841 | |||
12842 | CVE_STATUS[CVE-2025-37927] = "cpe-stable-backport: Backported in 6.12.28" | ||
12843 | |||
12844 | CVE_STATUS[CVE-2025-37928] = "cpe-stable-backport: Backported in 6.12.28" | ||
12845 | |||
12846 | CVE_STATUS[CVE-2025-37929] = "cpe-stable-backport: Backported in 6.12.28" | ||
12847 | |||
12848 | CVE_STATUS[CVE-2025-37930] = "cpe-stable-backport: Backported in 6.12.28" | ||
12849 | |||
12850 | CVE_STATUS[CVE-2025-37931] = "cpe-stable-backport: Backported in 6.12.28" | ||
12851 | |||
12852 | CVE_STATUS[CVE-2025-37932] = "cpe-stable-backport: Backported in 6.12.28" | ||
12853 | |||
12854 | CVE_STATUS[CVE-2025-37933] = "cpe-stable-backport: Backported in 6.12.28" | ||
12855 | |||
12856 | CVE_STATUS[CVE-2025-37934] = "cpe-stable-backport: Backported in 6.12.28" | ||
12857 | |||
12858 | CVE_STATUS[CVE-2025-37935] = "cpe-stable-backport: Backported in 6.12.28" | ||
12859 | |||
12860 | CVE_STATUS[CVE-2025-37936] = "cpe-stable-backport: Backported in 6.12.28" | ||
12861 | |||
12862 | CVE_STATUS[CVE-2025-37937] = "cpe-stable-backport: Backported in 6.12.23" | ||
12863 | |||
12864 | CVE_STATUS[CVE-2025-37938] = "cpe-stable-backport: Backported in 6.12.26" | ||
12865 | |||
12866 | CVE_STATUS[CVE-2025-37939] = "fixed-version: only affects 6.13 onwards" | ||
12867 | |||
12868 | CVE_STATUS[CVE-2025-37940] = "cpe-stable-backport: Backported in 6.12.24" | ||
12869 | |||
12870 | CVE_STATUS[CVE-2025-37941] = "cpe-stable-backport: Backported in 6.12.24" | ||
12871 | |||
12872 | CVE_STATUS[CVE-2025-37942] = "cpe-stable-backport: Backported in 6.12.24" | ||
12873 | |||
12874 | CVE_STATUS[CVE-2025-37943] = "cpe-stable-backport: Backported in 6.12.24" | ||
12875 | |||
12876 | CVE_STATUS[CVE-2025-37944] = "cpe-stable-backport: Backported in 6.12.25" | ||
12877 | |||
12878 | CVE_STATUS[CVE-2025-37945] = "cpe-stable-backport: Backported in 6.12.24" | ||
12879 | |||
12880 | CVE_STATUS[CVE-2025-37946] = "cpe-stable-backport: Backported in 6.12.29" | ||
12881 | |||
12882 | CVE_STATUS[CVE-2025-37947] = "cpe-stable-backport: Backported in 6.12.29" | ||
12883 | |||
12884 | CVE_STATUS[CVE-2025-37948] = "cpe-stable-backport: Backported in 6.12.29" | ||
12885 | |||
12886 | CVE_STATUS[CVE-2025-37949] = "cpe-stable-backport: Backported in 6.12.29" | ||
12887 | |||
12888 | CVE_STATUS[CVE-2025-37950] = "fixed-version: only affects 6.14 onwards" | ||
12889 | |||
12890 | CVE_STATUS[CVE-2025-37951] = "cpe-stable-backport: Backported in 6.12.29" | ||
12891 | |||
12892 | CVE_STATUS[CVE-2025-37952] = "cpe-stable-backport: Backported in 6.12.29" | ||
12893 | |||
12894 | CVE_STATUS[CVE-2025-37953] = "cpe-stable-backport: Backported in 6.12.29" | ||
12895 | |||
12896 | CVE_STATUS[CVE-2025-37954] = "cpe-stable-backport: Backported in 6.12.29" | ||
12897 | |||
12898 | CVE_STATUS[CVE-2025-37955] = "cpe-stable-backport: Backported in 6.12.29" | ||
12899 | |||
12900 | CVE_STATUS[CVE-2025-37956] = "cpe-stable-backport: Backported in 6.12.29" | ||
12901 | |||
12902 | CVE_STATUS[CVE-2025-37957] = "cpe-stable-backport: Backported in 6.12.29" | ||
12903 | |||
12904 | CVE_STATUS[CVE-2025-37958] = "cpe-stable-backport: Backported in 6.12.29" | ||
12905 | |||
12906 | CVE_STATUS[CVE-2025-37959] = "cpe-stable-backport: Backported in 6.12.29" | ||
12907 | |||
12908 | CVE_STATUS[CVE-2025-37960] = "cpe-stable-backport: Backported in 6.12.29" | ||
12909 | |||
12910 | CVE_STATUS[CVE-2025-37961] = "cpe-stable-backport: Backported in 6.12.29" | ||
12911 | |||
12912 | CVE_STATUS[CVE-2025-37962] = "cpe-stable-backport: Backported in 6.12.29" | ||
12913 | |||
12914 | CVE_STATUS[CVE-2025-37963] = "cpe-stable-backport: Backported in 6.12.29" | ||
12915 | |||
12916 | CVE_STATUS[CVE-2025-37964] = "cpe-stable-backport: Backported in 6.12.29" | ||
12917 | |||
12918 | CVE_STATUS[CVE-2025-37965] = "cpe-stable-backport: Backported in 6.12.29" | ||
12919 | |||
12920 | CVE_STATUS[CVE-2025-37966] = "fixed-version: only affects 6.13 onwards" | ||
12921 | |||
12922 | CVE_STATUS[CVE-2025-37967] = "cpe-stable-backport: Backported in 6.12.30" | ||
12923 | |||
12924 | CVE_STATUS[CVE-2025-37968] = "cpe-stable-backport: Backported in 6.12.30" | ||
12925 | |||
12926 | CVE_STATUS[CVE-2025-37969] = "cpe-stable-backport: Backported in 6.12.29" | ||
12927 | |||
12928 | CVE_STATUS[CVE-2025-37970] = "cpe-stable-backport: Backported in 6.12.29" | ||
12929 | |||
12930 | CVE_STATUS[CVE-2025-37971] = "cpe-stable-backport: Backported in 6.12.29" | ||
12931 | |||
12932 | CVE_STATUS[CVE-2025-37972] = "cpe-stable-backport: Backported in 6.12.29" | ||
12933 | |||
12934 | CVE_STATUS[CVE-2025-37973] = "cpe-stable-backport: Backported in 6.12.29" | ||
12935 | |||
12936 | CVE_STATUS[CVE-2025-37974] = "cpe-stable-backport: Backported in 6.12.29" | ||
12937 | |||
12938 | CVE_STATUS[CVE-2025-37975] = "cpe-stable-backport: Backported in 6.12.25" | ||
12939 | |||
12940 | # CVE-2025-37976 has no known resolution | ||
12941 | |||
12942 | CVE_STATUS[CVE-2025-37977] = "cpe-stable-backport: Backported in 6.12.26" | ||
12943 | |||
12944 | CVE_STATUS[CVE-2025-37978] = "cpe-stable-backport: Backported in 6.12.25" | ||
12945 | |||
12946 | CVE_STATUS[CVE-2025-37979] = "cpe-stable-backport: Backported in 6.12.25" | ||
12947 | |||
12948 | CVE_STATUS[CVE-2025-37980] = "cpe-stable-backport: Backported in 6.12.25" | ||
12949 | |||
12950 | CVE_STATUS[CVE-2025-37981] = "cpe-stable-backport: Backported in 6.12.25" | ||
12951 | |||
12952 | CVE_STATUS[CVE-2025-37982] = "cpe-stable-backport: Backported in 6.12.25" | ||
12953 | |||
12954 | CVE_STATUS[CVE-2025-37983] = "cpe-stable-backport: Backported in 6.12.26" | ||
12955 | |||
12956 | # CVE-2025-37984 needs backporting (fixed from 6.15) | ||
12957 | |||
12958 | CVE_STATUS[CVE-2025-37985] = "cpe-stable-backport: Backported in 6.12.26" | ||
12959 | |||
12960 | CVE_STATUS[CVE-2025-37986] = "cpe-stable-backport: Backported in 6.12.26" | ||
12961 | |||
12962 | CVE_STATUS[CVE-2025-37987] = "cpe-stable-backport: Backported in 6.12.26" | ||
12963 | |||
12964 | CVE_STATUS[CVE-2025-37988] = "cpe-stable-backport: Backported in 6.12.26" | ||
12965 | |||
12966 | CVE_STATUS[CVE-2025-37989] = "cpe-stable-backport: Backported in 6.12.26" | ||
12967 | |||
12968 | CVE_STATUS[CVE-2025-37990] = "cpe-stable-backport: Backported in 6.12.28" | ||
12969 | |||
12970 | CVE_STATUS[CVE-2025-37991] = "cpe-stable-backport: Backported in 6.12.28" | ||
12971 | |||
12972 | CVE_STATUS[CVE-2025-37992] = "cpe-stable-backport: Backported in 6.12.30" | ||
12973 | |||
12974 | CVE_STATUS[CVE-2025-37993] = "cpe-stable-backport: Backported in 6.12.29" | ||
12975 | |||
12976 | CVE_STATUS[CVE-2025-37994] = "cpe-stable-backport: Backported in 6.12.29" | ||
12977 | |||
12978 | CVE_STATUS[CVE-2025-37995] = "cpe-stable-backport: Backported in 6.12.29" | ||
12979 | |||
12980 | CVE_STATUS[CVE-2025-37996] = "fixed-version: only affects 6.14 onwards" | ||
12981 | |||
12982 | CVE_STATUS[CVE-2025-37997] = "cpe-stable-backport: Backported in 6.12.29" | ||
12983 | |||
12984 | CVE_STATUS[CVE-2025-37998] = "cpe-stable-backport: Backported in 6.12.29" | ||
12985 | |||
12986 | CVE_STATUS[CVE-2025-37999] = "cpe-stable-backport: Backported in 6.12.29" | ||
12987 | |||
12988 | CVE_STATUS[CVE-2025-38049] = "cpe-stable-backport: Backported in 6.12.23" | ||
12989 | |||
12990 | # CVE-2025-38104 needs backporting (fixed from 6.15) | ||
12991 | |||
12992 | CVE_STATUS[CVE-2025-38152] = "cpe-stable-backport: Backported in 6.12.23" | ||
12993 | |||
12994 | CVE_STATUS[CVE-2025-38240] = "cpe-stable-backport: Backported in 6.12.23" | ||
12995 | |||
12996 | CVE_STATUS[CVE-2025-38479] = "cpe-stable-backport: Backported in 6.12.23" | ||
12997 | |||
12998 | CVE_STATUS[CVE-2025-38575] = "cpe-stable-backport: Backported in 6.12.23" | ||
12999 | |||
13000 | CVE_STATUS[CVE-2025-38637] = "cpe-stable-backport: Backported in 6.12.23" | ||
13001 | |||
13002 | CVE_STATUS[CVE-2025-39688] = "cpe-stable-backport: Backported in 6.12.23" | ||
13003 | |||
13004 | CVE_STATUS[CVE-2025-39728] = "cpe-stable-backport: Backported in 6.12.23" | ||
13005 | |||
13006 | CVE_STATUS[CVE-2025-39735] = "cpe-stable-backport: Backported in 6.12.23" | ||
13007 | |||
13008 | CVE_STATUS[CVE-2025-39755] = "fixed-version: only affects 6.13 onwards" | ||
13009 | |||
13010 | CVE_STATUS[CVE-2025-39778] = "cpe-stable-backport: Backported in 6.12.23" | ||
13011 | |||
13012 | CVE_STATUS[CVE-2025-39930] = "fixed-version: only affects 6.14 onwards" | ||
13013 | |||
13014 | CVE_STATUS[CVE-2025-39989] = "cpe-stable-backport: Backported in 6.12.23" | ||
13015 | |||
13016 | # CVE-2025-40014 needs backporting (fixed from 6.15) | ||
13017 | |||
13018 | CVE_STATUS[CVE-2025-40114] = "cpe-stable-backport: Backported in 6.12.23" | ||
13019 | |||
13020 | # CVE-2025-40325 needs backporting (fixed from 6.15) | ||
13021 | |||
13022 | # CVE-2025-40364 has no known resolution | ||
13023 | |||
diff --git a/meta/recipes-kernel/linux/generate-cve-exclusions.py b/meta/recipes-kernel/linux/generate-cve-exclusions.py new file mode 100755 index 0000000000..dfc16663a5 --- /dev/null +++ b/meta/recipes-kernel/linux/generate-cve-exclusions.py | |||
@@ -0,0 +1,156 @@ | |||
1 | #! /usr/bin/env python3 | ||
2 | |||
3 | # Generate granular CVE status metadata for a specific version of the kernel | ||
4 | # using json data from cvelistV5 or vulns repository | ||
5 | # | ||
6 | # SPDX-License-Identifier: GPL-2.0-only | ||
7 | |||
8 | import argparse | ||
9 | import datetime | ||
10 | import json | ||
11 | import pathlib | ||
12 | import os | ||
13 | import glob | ||
14 | import subprocess | ||
15 | |||
16 | from packaging.version import Version | ||
17 | |||
18 | |||
19 | def parse_version(s): | ||
20 | """ | ||
21 | Parse the version string and either return a packaging.version.Version, or | ||
22 | None if the string was unset or "unk". | ||
23 | """ | ||
24 | if s and s != "unk": | ||
25 | # packaging.version.Version doesn't approve of versions like v5.12-rc1-dontuse | ||
26 | s = s.replace("-dontuse", "") | ||
27 | return Version(s) | ||
28 | return None | ||
29 | |||
30 | def get_fixed_versions(cve_info, base_version): | ||
31 | ''' | ||
32 | Get fixed versionss | ||
33 | ''' | ||
34 | first_affected = None | ||
35 | fixed = None | ||
36 | fixed_backport = None | ||
37 | next_version = Version(str(base_version) + ".5000") | ||
38 | for affected in cve_info["containers"]["cna"]["affected"]: | ||
39 | # In case the CVE info is not complete, it might not have default status and therefore | ||
40 | # we don't know the status of this CVE. | ||
41 | if not "defaultStatus" in affected: | ||
42 | return first_affected, fixed, fixed_backport | ||
43 | if affected["defaultStatus"] == "affected": | ||
44 | for version in affected["versions"]: | ||
45 | v = Version(version["version"]) | ||
46 | if v == Version('0'): | ||
47 | #Skiping non-affected | ||
48 | continue | ||
49 | if version["status"] == "unaffected" and first_affected and v < first_affected: | ||
50 | first_affected = Version(f"{v.major}.{v.minor}") | ||
51 | if version["status"] == "affected" and not first_affected: | ||
52 | first_affected = v | ||
53 | elif (version["status"] == "unaffected" and | ||
54 | version['versionType'] == "original_commit_for_fix"): | ||
55 | fixed = v | ||
56 | elif base_version < v and v < next_version: | ||
57 | fixed_backport = v | ||
58 | elif affected["defaultStatus"] == "unaffected": | ||
59 | # Only specific versions are affected. We care only about our base version | ||
60 | if "versions" not in affected: | ||
61 | continue | ||
62 | for version in affected["versions"]: | ||
63 | if "versionType" not in version: | ||
64 | continue | ||
65 | if version["versionType"] == "git": | ||
66 | continue | ||
67 | v = Version(version["version"]) | ||
68 | # in case it is not in our base version | ||
69 | less_than = Version(version["lessThan"]) | ||
70 | |||
71 | if not first_affected: | ||
72 | first_affected = v | ||
73 | fixed = less_than | ||
74 | if base_version < v and v < next_version: | ||
75 | fixed_backport = less_than | ||
76 | |||
77 | return first_affected, fixed, fixed_backport | ||
78 | |||
79 | def is_linux_cve(cve_info): | ||
80 | '''Return true is the CVE belongs to Linux''' | ||
81 | if not "affected" in cve_info["containers"]["cna"]: | ||
82 | return False | ||
83 | for affected in cve_info["containers"]["cna"]["affected"]: | ||
84 | if not "product" in affected: | ||
85 | return False | ||
86 | if affected["product"] == "Linux" and affected["vendor"] == "Linux": | ||
87 | return True | ||
88 | return False | ||
89 | |||
90 | def main(argp=None): | ||
91 | parser = argparse.ArgumentParser() | ||
92 | parser.add_argument("datadir", type=pathlib.Path, help="Path to a clone of https://github.com/CVEProject/cvelistV5 or https://git.kernel.org/pub/scm/linux/security/vulns.git") | ||
93 | parser.add_argument("version", type=Version, help="Kernel version number to generate data for, such as 6.1.38") | ||
94 | |||
95 | args = parser.parse_args(argp) | ||
96 | datadir = args.datadir.resolve() | ||
97 | version = args.version | ||
98 | base_version = Version(f"{version.major}.{version.minor}") | ||
99 | |||
100 | data_version = subprocess.check_output(("git", "describe", "--tags", "HEAD"), cwd=datadir, text=True) | ||
101 | |||
102 | print(f""" | ||
103 | # Auto-generated CVE metadata, DO NOT EDIT BY HAND. | ||
104 | # Generated at {datetime.datetime.now(datetime.timezone.utc)} for kernel version {version} | ||
105 | # From {datadir.name} {data_version} | ||
106 | |||
107 | python check_kernel_cve_status_version() {{ | ||
108 | this_version = "{version}" | ||
109 | kernel_version = d.getVar("LINUX_VERSION") | ||
110 | if kernel_version != this_version: | ||
111 | bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) | ||
112 | }} | ||
113 | do_cve_check[prefuncs] += "check_kernel_cve_status_version" | ||
114 | """) | ||
115 | |||
116 | # Loop though all CVES and check if they are kernel related, newer than 2015 | ||
117 | pattern = os.path.join(datadir, '**', "CVE-20*.json") | ||
118 | |||
119 | files = glob.glob(pattern, recursive=True) | ||
120 | for cve_file in sorted(files): | ||
121 | # Get CVE Id | ||
122 | cve = cve_file[cve_file.rfind("/")+1:cve_file.rfind(".json")] | ||
123 | # We process from 2015 data, old request are not properly formated | ||
124 | year = cve.split("-")[1] | ||
125 | if int(year) < 2015: | ||
126 | continue | ||
127 | with open(cve_file, 'r', encoding='utf-8') as json_file: | ||
128 | cve_info = json.load(json_file) | ||
129 | |||
130 | if not is_linux_cve(cve_info): | ||
131 | continue | ||
132 | first_affected, fixed, backport_ver = get_fixed_versions(cve_info, base_version) | ||
133 | if not fixed: | ||
134 | print(f"# {cve} has no known resolution") | ||
135 | elif first_affected and version < first_affected: | ||
136 | print(f'CVE_STATUS[{cve}] = "fixed-version: only affects {first_affected} onwards"') | ||
137 | elif fixed <= version: | ||
138 | print( | ||
139 | f'CVE_STATUS[{cve}] = "fixed-version: Fixed from version {fixed}"' | ||
140 | ) | ||
141 | else: | ||
142 | if backport_ver: | ||
143 | if backport_ver <= version: | ||
144 | print( | ||
145 | f'CVE_STATUS[{cve}] = "cpe-stable-backport: Backported in {backport_ver}"' | ||
146 | ) | ||
147 | else: | ||
148 | print(f"# {cve} may need backporting (fixed from {backport_ver})") | ||
149 | else: | ||
150 | print(f"# {cve} needs backporting (fixed from {fixed})") | ||
151 | |||
152 | print() | ||
153 | |||
154 | |||
155 | if __name__ == "__main__": | ||
156 | main() | ||
diff --git a/meta/recipes-kernel/linux/kernel-devsrc.bb b/meta/recipes-kernel/linux/kernel-devsrc.bb index 4ceb35f0d2..3d2eb3929e 100644 --- a/meta/recipes-kernel/linux/kernel-devsrc.bb +++ b/meta/recipes-kernel/linux/kernel-devsrc.bb | |||
@@ -5,9 +5,9 @@ development or external module builds" | |||
5 | 5 | ||
6 | SECTION = "kernel" | 6 | SECTION = "kernel" |
7 | 7 | ||
8 | LICENSE = "GPLv2" | 8 | LICENSE = "GPL-2.0-only" |
9 | 9 | ||
10 | inherit linux-kernel-base | 10 | inherit kernelsrc |
11 | 11 | ||
12 | # Whilst not a module, this ensures we don't get multilib extended (which would make no sense) | 12 | # Whilst not a module, this ensures we don't get multilib extended (which would make no sense) |
13 | inherit module-base | 13 | inherit module-base |
@@ -20,19 +20,15 @@ do_install[depends] += "virtual/kernel:do_shared_workdir" | |||
20 | do_install[depends] += "virtual/kernel:do_install" | 20 | do_install[depends] += "virtual/kernel:do_install" |
21 | 21 | ||
22 | # There's nothing to do here, except install the source where we can package it | 22 | # There's nothing to do here, except install the source where we can package it |
23 | do_fetch[noexec] = "1" | ||
24 | do_unpack[noexec] = "1" | ||
25 | do_patch[noexec] = "1" | ||
26 | do_configure[noexec] = "1" | 23 | do_configure[noexec] = "1" |
27 | do_compile[noexec] = "1" | 24 | do_compile[noexec] = "1" |
28 | deltask do_populate_sysroot | 25 | deltask do_populate_sysroot |
29 | 26 | ||
30 | S = "${STAGING_KERNEL_DIR}" | ||
31 | B = "${STAGING_KERNEL_BUILDDIR}" | 27 | B = "${STAGING_KERNEL_BUILDDIR}" |
32 | 28 | ||
33 | PACKAGE_ARCH = "${MACHINE_ARCH}" | 29 | PACKAGE_ARCH = "${MACHINE_ARCH}" |
34 | 30 | ||
35 | KERNEL_BUILD_ROOT="${nonarch_base_libdir}/modules/" | 31 | KERNEL_BUILD_ROOT = "${nonarch_base_libdir}/modules/" |
36 | 32 | ||
37 | do_install() { | 33 | do_install() { |
38 | kerneldir=${D}${KERNEL_BUILD_ROOT}${KERNEL_VERSION} | 34 | kerneldir=${D}${KERNEL_BUILD_ROOT}${KERNEL_VERSION} |
@@ -47,21 +43,21 @@ do_install() { | |||
47 | # create a /usr/src/kernel symlink to /lib/modules/<version>/source | 43 | # create a /usr/src/kernel symlink to /lib/modules/<version>/source |
48 | mkdir -p ${D}/usr/src | 44 | mkdir -p ${D}/usr/src |
49 | ( | 45 | ( |
50 | cd ${D}/usr/src | 46 | cd ${D}/usr/src |
51 | ln -rs ${D}${KERNEL_BUILD_ROOT}${KERNEL_VERSION}/source kernel | 47 | ln -rs ${D}${KERNEL_BUILD_ROOT}${KERNEL_VERSION}/source kernel |
52 | ) | 48 | ) |
53 | 49 | ||
54 | # for on target purposes, we unify build and source | 50 | # for on target purposes, we unify build and source |
55 | ( | 51 | ( |
56 | cd $kerneldir | 52 | cd $kerneldir |
57 | ln -s build source | 53 | ln -s build source |
58 | ) | 54 | ) |
59 | 55 | ||
60 | # first copy everything | 56 | # first copy everything |
61 | ( | 57 | ( |
62 | cd ${S} | 58 | cd ${S} |
63 | cp --parents $(find -type f -name "Makefile*" -o -name "Kconfig*") $kerneldir/build | 59 | cp --parents $(find -type f -name "Makefile*" -o -name "Kconfig*") $kerneldir/build |
64 | cp --parents $(find -type f -name "Build" -o -name "Build.include") $kerneldir/build | 60 | cp --parents $(find -type f -name "Build" -o -name "Build.include") $kerneldir/build |
65 | ) | 61 | ) |
66 | 62 | ||
67 | # then drop all but the needed Makefiles/Kconfig files | 63 | # then drop all but the needed Makefiles/Kconfig files |
@@ -70,219 +66,303 @@ do_install() { | |||
70 | 66 | ||
71 | # now copy in parts from the build that we'll need later | 67 | # now copy in parts from the build that we'll need later |
72 | ( | 68 | ( |
73 | cd ${B} | 69 | cd ${B} |
74 | 70 | ||
75 | cp Module.symvers $kerneldir/build | 71 | if [ -s Module.symvers ]; then |
76 | cp System.map* $kerneldir/build | 72 | cp Module.symvers $kerneldir/build |
77 | if [ -s Module.markers ]; then | 73 | fi |
78 | cp Module.markers $kerneldir/build | 74 | cp System.map-* $kerneldir/build |
79 | fi | 75 | ln -s System.map-* $kerneldir/build/System.map |
76 | if [ -s Module.markers ]; then | ||
77 | cp Module.markers $kerneldir/build | ||
78 | fi | ||
80 | 79 | ||
81 | cp -a .config $kerneldir/build | 80 | cp -a .config $kerneldir/build |
82 | 81 | ||
83 | # This scripts copy blow up QA, so for now, we require a more | 82 | # This scripts copy blow up QA, so for now, we require a more |
84 | # complex 'make scripts' to restore these, versus copying them | 83 | # complex 'make scripts' to restore these, versus copying them |
85 | # here. Left as a reference to indicate that we know the scripts must | 84 | # here. Left as a reference to indicate that we know the scripts must |
86 | # be dealt with. | 85 | # be dealt with. |
87 | # cp -a scripts $kerneldir/build | 86 | # cp -a scripts $kerneldir/build |
88 | 87 | ||
89 | # although module.lds can be regenerated on target via 'make modules_prepare' | 88 | # although module.lds can be regenerated on target via 'make modules_prepare' |
90 | # there are several places where 'makes scripts prepare' is done, and that won't | 89 | # there are several places where 'makes scripts prepare' is done, and that won't |
91 | # regenerate the file. So we copy it onto the target as a migration to using | 90 | # regenerate the file. So we copy it onto the target as a migration to using |
92 | # modules_prepare | 91 | # modules_prepare |
93 | cp -a --parents scripts/module.lds $kerneldir/build/ 2>/dev/null || : | 92 | cp -a --parents scripts/module.lds $kerneldir/build/ 2>/dev/null || : |
94 | 93 | ||
95 | if [ -d arch/${ARCH}/scripts ]; then | 94 | if [ -d arch/${ARCH}/scripts ]; then |
96 | cp -a arch/${ARCH}/scripts $kerneldir/build/arch/${ARCH} | 95 | cp -a arch/${ARCH}/scripts $kerneldir/build/arch/${ARCH} |
97 | fi | 96 | fi |
98 | if [ -f arch/${ARCH}/*lds ]; then | 97 | if [ -f arch/${ARCH}/*lds ]; then |
99 | cp -a arch/${ARCH}/*lds $kerneldir/build/arch/${ARCH} | 98 | cp -a arch/${ARCH}/*lds $kerneldir/build/arch/${ARCH} |
100 | fi | 99 | fi |
101 | 100 | ||
102 | rm -f $kerneldir/build/scripts/*.o | 101 | rm -f $kerneldir/build/scripts/*.o |
103 | rm -f $kerneldir/build/scripts/*/*.o | 102 | rm -f $kerneldir/build/scripts/*/*.o |
104 | 103 | ||
105 | if [ "${ARCH}" = "powerpc" ]; then | 104 | if [ "${ARCH}" = "powerpc" ]; then |
106 | if [ -e arch/powerpc/lib/crtsavres.S ] || | 105 | if [ -e arch/powerpc/lib/crtsavres.S ] || |
107 | [ -e arch/powerpc/lib/crtsavres.o ]; then | 106 | [ -e arch/powerpc/lib/crtsavres.o ]; then |
108 | cp -a --parents arch/powerpc/lib/crtsavres.[So] $kerneldir/build/ | 107 | cp -a --parents arch/powerpc/lib/crtsavres.[So] $kerneldir/build/ |
109 | fi | 108 | fi |
110 | fi | 109 | fi |
111 | 110 | ||
112 | if [ "${ARCH}" = "arm64" -o "${ARCH}" = "riscv" ]; then | 111 | if [ "${ARCH}" = "arm64" -o "${ARCH}" = "riscv" ]; then |
113 | cp -a --parents arch/${ARCH}/kernel/vdso/vdso.lds $kerneldir/build/ | 112 | if [ -e arch/${ARCH}/kernel/vdso/vdso.lds ]; then |
114 | fi | 113 | cp -a --parents arch/${ARCH}/kernel/vdso/vdso.lds $kerneldir/build/ |
115 | if [ "${ARCH}" = "powerpc" ]; then | 114 | fi |
116 | cp -a --parents arch/powerpc/kernel/vdso32/vdso32.lds $kerneldir/build 2>/dev/null || : | 115 | fi |
117 | cp -a --parents arch/powerpc/kernel/vdso64/vdso64.lds $kerneldir/build 2>/dev/null || : | 116 | if [ "${ARCH}" = "powerpc" ]; then |
118 | fi | 117 | cp -a --parents arch/powerpc/kernel/vdso32/vdso32.lds $kerneldir/build 2>/dev/null || : |
119 | 118 | cp -a --parents arch/powerpc/kernel/vdso64/vdso64.lds $kerneldir/build 2>/dev/null || : | |
120 | cp -a include $kerneldir/build/include | 119 | # v5.19+ |
121 | 120 | cp -a --parents arch/powerpc/kernel/vdso/vdso*.lds $kerneldir/build 2>/dev/null || : | |
122 | # we don't usually copy generated files, since they can be rebuilt on the target, | 121 | fi |
123 | # but without this file, we get a forced syncconfig run in v5.8+, which prompts and | 122 | |
124 | # breaks workflows. | 123 | cp -a include $kerneldir/build/include |
125 | cp -a --parents include/generated/autoconf.h $kerneldir/build 2>/dev/null || : | 124 | |
126 | 125 | # we don't usually copy generated files, since they can be rebuilt on the target, | |
127 | if [ -e $kerneldir/include/generated/.vdso-offsets.h.cmd ]; then | 126 | # but without this file, we get a forced syncconfig run in v5.8+, which prompts and |
128 | rm $kerneldir/include/generated/.vdso-offsets.h.cmd | 127 | # breaks workflows. |
129 | fi | 128 | cp -a --parents include/generated/autoconf.h $kerneldir/build 2>/dev/null || : |
129 | |||
130 | rm -f $kerneldir/include/generated/.vdso-offsets.h.cmd | ||
131 | rm -f $kerneldir/build/include/generated/.vdso-offsets.h.cmd | ||
132 | rm -f $kerneldir/build/include/generated/.compat_vdso-offsets.h.cmd | ||
133 | rm -f $kerneldir/build/include/generated/.vdso32-offsets.h.cmd | ||
134 | rm -f $kerneldir/build/include/generated/.vdso64-offsets.h.cmd | ||
130 | ) | 135 | ) |
131 | 136 | ||
132 | # now grab the chunks from the source tree that we need | 137 | # now grab the chunks from the source tree that we need |
133 | ( | 138 | ( |
134 | cd ${S} | 139 | cd ${S} |
140 | |||
141 | cp -a scripts $kerneldir/build | ||
142 | |||
143 | # for v6.1+ (otherwise we are missing multiple default targets) | ||
144 | cp -a --parents Kbuild $kerneldir/build 2>/dev/null || : | ||
135 | 145 | ||
136 | cp -a scripts $kerneldir/build | 146 | # For v6.6+ the debian packing is moved out to seperate rules file |
147 | # Remove as we else would ned to RDEPEND on make | ||
148 | rm $kerneldir/build/scripts/package/debian/rules 2>/dev/null || : | ||
137 | 149 | ||
138 | # if our build dir had objtool, it will also be rebuilt on target, so | 150 | # if our build dir had objtool, it will also be rebuilt on target, so |
139 | # we copy what is required for that build | 151 | # we copy what is required for that build |
140 | if [ -f ${B}/tools/objtool/objtool ]; then | 152 | if [ -f ${B}/tools/objtool/objtool ]; then |
141 | # these are a few files associated with objtool, since we'll need to | 153 | # these are a few files associated with objtool, since we'll need to |
142 | # rebuild it | 154 | # rebuild it |
143 | cp -a --parents tools/build/Build.include $kerneldir/build/ | 155 | cp -a --parents tools/build/Build.include $kerneldir/build/ |
144 | cp -a --parents tools/build/Build $kerneldir/build/ | 156 | cp -a --parents tools/build/Build $kerneldir/build/ 2>/dev/null || : |
145 | cp -a --parents tools/build/fixdep.c $kerneldir/build/ | 157 | cp -a --parents tools/build/fixdep.c $kerneldir/build/ |
146 | cp -a --parents tools/scripts/utilities.mak $kerneldir/build/ | 158 | cp -a --parents tools/scripts/utilities.mak $kerneldir/build/ |
147 | 159 | ||
148 | # extra files, just in case | 160 | # extra files, just in case |
149 | cp -a --parents tools/objtool/* $kerneldir/build/ | 161 | cp -a --parents tools/objtool/* $kerneldir/build/ |
150 | cp -a --parents tools/lib/* $kerneldir/build/ | 162 | cp -a --parents tools/lib/* $kerneldir/build/ |
151 | cp -a --parents tools/lib/subcmd/* $kerneldir/build/ | 163 | cp -a --parents tools/lib/subcmd/* $kerneldir/build/ |
152 | 164 | ||
153 | cp -a --parents tools/include/* $kerneldir/build/ | 165 | cp -a --parents tools/include/* $kerneldir/build/ |
166 | |||
167 | cp -a --parents $(find tools/arch/${ARCH}/ -type f) $kerneldir/build/ | ||
168 | fi | ||
154 | 169 | ||
155 | cp -a --parents $(find tools/arch/${ARCH}/ -type f) $kerneldir/build/ | 170 | if [ "${ARCH}" = "arm64" ]; then |
156 | fi | 171 | # arch/arm64/include/asm/xen references arch/arm |
172 | cp -a --parents arch/arm/include/asm/xen $kerneldir/build/ | ||
173 | # arch/arm64/include/asm/opcodes.h references arch/arm | ||
174 | cp -a --parents arch/arm/include/asm/opcodes.h $kerneldir/build/ | ||
157 | 175 | ||
158 | if [ "${ARCH}" = "arm64" ]; then | 176 | # v6.1+ |
159 | # arch/arm64/include/asm/xen references arch/arm | 177 | cp -a --parents arch/arm64/kernel/asm-offsets.c $kerneldir/build/ |
160 | cp -a --parents arch/arm/include/asm/xen $kerneldir/build/ | ||
161 | # arch/arm64/include/asm/opcodes.h references arch/arm | ||
162 | cp -a --parents arch/arm/include/asm/opcodes.h $kerneldir/build/ | ||
163 | 178 | ||
164 | cp -a --parents arch/arm64/kernel/vdso/*gettimeofday.* $kerneldir/build/ | 179 | cp -a --parents arch/arm64/kernel/vdso/*gettimeofday.* $kerneldir/build/ |
165 | cp -a --parents arch/arm64/kernel/vdso/sigreturn.S $kerneldir/build/ | 180 | cp -a --parents arch/arm64/kernel/vdso/sigreturn.S $kerneldir/build/ |
166 | cp -a --parents arch/arm64/kernel/vdso/note.S $kerneldir/build/ | 181 | cp -a --parents arch/arm64/kernel/vdso/note.S $kerneldir/build/ |
167 | cp -a --parents arch/arm64/kernel/vdso/gen_vdso_offsets.sh $kerneldir/build/ | 182 | cp -a --parents arch/arm64/kernel/vdso/gen_vdso_offsets.sh $kerneldir/build/ |
168 | 183 | ||
184 | # 6.12+ | ||
185 | cp -a --parents arch/arm64/kernel/vdso/vgetrandom.c $kerneldir/build/ 2>/dev/null || : | ||
186 | cp -a --parents arch/arm64/kernel/vdso/vgetrandom-chacha.S $kerneldir/build/ 2>/dev/null || : | ||
187 | |||
169 | cp -a --parents arch/arm64/kernel/module.lds $kerneldir/build/ 2>/dev/null || : | 188 | cp -a --parents arch/arm64/kernel/module.lds $kerneldir/build/ 2>/dev/null || : |
170 | 189 | ||
171 | # 5.13+ needs these tools | 190 | # 5.13+ needs these tools |
172 | cp -a --parents arch/arm64/tools/gen-cpucaps.awk $kerneldir/build/ 2>/dev/null || : | 191 | cp -a --parents arch/arm64/tools/gen-cpucaps.awk $kerneldir/build/ 2>/dev/null || : |
173 | cp -a --parents arch/arm64/tools/cpucaps $kerneldir/build/ 2>/dev/null || : | 192 | cp -a --parents arch/arm64/tools/cpucaps $kerneldir/build/ 2>/dev/null || : |
174 | 193 | ||
194 | # 5.19+ | ||
195 | cp -a --parents arch/arm64/tools/gen-sysreg.awk $kerneldir/build/ 2>/dev/null || : | ||
196 | cp -a --parents arch/arm64/tools/sysreg $kerneldir/build/ 2>/dev/null || : | ||
197 | |||
198 | # 6.12+ | ||
199 | cp -a --parents arch/arm64/tools/syscall_64.tbl $kerneldir/build/ 2>/dev/null || : | ||
200 | cp -a --parents arch/arm64/tools/syscall_32.tbl $kerneldir/build/ 2>/dev/null || : | ||
201 | |||
175 | if [ -e $kerneldir/build/arch/arm64/tools/gen-cpucaps.awk ]; then | 202 | if [ -e $kerneldir/build/arch/arm64/tools/gen-cpucaps.awk ]; then |
176 | sed -i -e "s,#!.*awk.*,#!${USRBINPATH}/env awk," $kerneldir/build/arch/arm64/tools/gen-cpucaps.awk | 203 | sed -i -e "s,#!.*awk.*,#!${USRBINPATH}/env awk," $kerneldir/build/arch/arm64/tools/gen-cpucaps.awk |
177 | fi | 204 | fi |
178 | fi | 205 | if [ -e $kerneldir/build/arch/arm64/tools/gen-sysreg.awk ]; then |
179 | 206 | sed -i -e "s,#!.*awk.*,#!${USRBINPATH}/env awk," $kerneldir/build/arch/arm64/tools/gen-sysreg.awk | |
180 | if [ "${ARCH}" = "powerpc" ]; then | 207 | fi |
181 | # 5.0 needs these files, but don't error if they aren't present in the source | 208 | fi |
182 | cp -a --parents arch/${ARCH}/kernel/syscalls/syscall.tbl $kerneldir/build/ 2>/dev/null || : | 209 | |
183 | cp -a --parents arch/${ARCH}/kernel/syscalls/syscalltbl.sh $kerneldir/build/ 2>/dev/null || : | 210 | if [ "${ARCH}" = "powerpc" ]; then |
184 | cp -a --parents arch/${ARCH}/kernel/syscalls/syscallhdr.sh $kerneldir/build/ 2>/dev/null || : | 211 | # 5.0 needs these files, but don't error if they aren't present in the source |
185 | cp -a --parents arch/${ARCH}/kernel/vdso32/* $kerneldir/build/ 2>/dev/null || : | 212 | cp -a --parents arch/${ARCH}/kernel/syscalls/syscall.tbl $kerneldir/build/ 2>/dev/null || : |
186 | cp -a --parents arch/${ARCH}/kernel/vdso64/* $kerneldir/build/ 2>/dev/null || : | 213 | cp -a --parents arch/${ARCH}/kernel/syscalls/syscalltbl.sh $kerneldir/build/ 2>/dev/null || : |
187 | fi | 214 | cp -a --parents arch/${ARCH}/kernel/syscalls/syscallhdr.sh $kerneldir/build/ 2>/dev/null || : |
188 | if [ "${ARCH}" = "riscv" ]; then | 215 | cp -a --parents arch/${ARCH}/kernel/vdso32/* $kerneldir/build/ 2>/dev/null || : |
216 | cp -a --parents arch/${ARCH}/kernel/vdso64/* $kerneldir/build/ 2>/dev/null || : | ||
217 | |||
218 | # v5.19+ | ||
219 | cp -a --parents arch/powerpc/kernel/vdso/*.S $kerneldir/build 2>/dev/null || : | ||
220 | cp -a --parents arch/powerpc/kernel/vdso/*gettimeofday.* $kerneldir/build 2>/dev/null || : | ||
221 | cp -a --parents arch/powerpc/kernel/vdso/gen_vdso*_offsets.sh $kerneldir/build/ 2>/dev/null || : | ||
222 | |||
223 | # v6,1+ | ||
224 | cp -a --parents arch/powerpc/kernel/asm-offsets.c $kerneldir/build/ 2>/dev/null || : | ||
225 | cp -a --parents arch/powerpc/kernel/head_booke.h $kerneldir/build/ 2>/dev/null || : | ||
226 | |||
227 | # 6.12+ | ||
228 | cp -a --parents arch/powerpc/kernel/vdso/vgetrandom.c $kerneldir/build/ 2>/dev/null || : | ||
229 | cp -a --parents arch/powerpc/kernel/vdso/vgetrandom-chacha.S $kerneldir/build/ 2>/dev/null || : | ||
230 | cp -a --parents arch/powerpc/lib/crtsavres.S $kerneldir/build/ 2>/dev/null || : | ||
231 | fi | ||
232 | if [ "${ARCH}" = "riscv" ]; then | ||
189 | cp -a --parents arch/riscv/kernel/vdso/*gettimeofday.* $kerneldir/build/ | 233 | cp -a --parents arch/riscv/kernel/vdso/*gettimeofday.* $kerneldir/build/ |
190 | cp -a --parents arch/riscv/kernel/vdso/note.S $kerneldir/build/ | 234 | cp -a --parents arch/riscv/kernel/vdso/note.S $kerneldir/build/ |
191 | cp -a --parents arch/riscv/kernel/vdso/gen_vdso_offsets.sh $kerneldir/build/ | 235 | # v6.1+ |
192 | cp -a --parents arch/riscv/kernel/vdso/* $kerneldir/build/ 2>/dev/null || : | 236 | cp -a --parents arch/riscv/kernel/asm-offsets.c $kerneldir/build/ |
193 | fi | 237 | if [ -e arch/riscv/kernel/vdso/gen_vdso_offsets.sh ]; then |
238 | cp -a --parents arch/riscv/kernel/vdso/gen_vdso_offsets.sh $kerneldir/build/ | ||
239 | fi | ||
240 | cp -a --parents arch/riscv/kernel/vdso/* $kerneldir/build/ 2>/dev/null || : | ||
241 | if [ -e arch/riscv/kernel/compat_vdso/gen_compat_vdso_offsets.sh ]; then | ||
242 | cp -a --parents arch/riscv/kernel/compat_vdso/gen_compat_vdso_offsets.sh $kerneldir/build/ | ||
243 | fi | ||
244 | cp -a --parents arch/riscv/kernel/compat_vdso/* $kerneldir/build/ 2>/dev/null || : | ||
245 | fi | ||
194 | 246 | ||
195 | # include the machine specific headers for ARM variants, if available. | 247 | # include the machine specific headers for ARM variants, if available. |
196 | if [ "${ARCH}" = "arm" ]; then | 248 | if [ "${ARCH}" = "arm" ]; then |
197 | cp -a --parents arch/${ARCH}/mach-*/include $kerneldir/build/ | 249 | cp -a --parents arch/${ARCH}/mach-*/include $kerneldir/build/ |
198 | 250 | ||
199 | # include a few files for 'make prepare' | 251 | # include a few files for 'make prepare' |
200 | cp -a --parents arch/arm/tools/gen-mach-types $kerneldir/build/ | 252 | cp -a --parents arch/arm/tools/gen-mach-types $kerneldir/build/ |
201 | cp -a --parents arch/arm/tools/mach-types $kerneldir/build/ | 253 | cp -a --parents arch/arm/tools/mach-types $kerneldir/build/ |
202 | 254 | ||
203 | # ARM syscall table tools only exist for kernels v4.10 or later | 255 | # 5.19+ |
256 | cp -a --parents arch/arm/tools/gen-sysreg.awk $kerneldir/build/ 2>/dev/null || : | ||
257 | |||
258 | # ARM syscall table tools only exist for kernels v4.10 or later | ||
204 | SYSCALL_TOOLS=$(find arch/arm/tools -name "syscall*") | 259 | SYSCALL_TOOLS=$(find arch/arm/tools -name "syscall*") |
205 | if [ -n "$SYSCALL_TOOLS" ] ; then | 260 | if [ -n "$SYSCALL_TOOLS" ] ; then |
206 | cp -a --parents $SYSCALL_TOOLS $kerneldir/build/ | 261 | cp -a --parents $SYSCALL_TOOLS $kerneldir/build/ |
207 | fi | 262 | fi |
208 | 263 | ||
209 | cp -a --parents arch/arm/kernel/module.lds $kerneldir/build/ 2>/dev/null || : | 264 | cp -a --parents arch/arm/kernel/module.lds $kerneldir/build/ 2>/dev/null || : |
210 | fi | 265 | # v6.1+ |
211 | 266 | cp -a --parents arch/arm/kernel/asm-offsets.c $kerneldir/build/ 2>/dev/null || : | |
212 | if [ -d arch/${ARCH}/include ]; then | 267 | cp -a --parents arch/arm/kernel/signal.h $kerneldir/build/ 2>/dev/null || : |
213 | cp -a --parents arch/${ARCH}/include $kerneldir/build/ | 268 | fi |
214 | fi | 269 | |
215 | 270 | if [ -d arch/${ARCH}/include ]; then | |
216 | cp -a include $kerneldir/build | 271 | cp -a --parents arch/${ARCH}/include $kerneldir/build/ |
217 | 272 | fi | |
218 | cp -a --parents lib/vdso/* $kerneldir/build/ 2>/dev/null || : | 273 | |
219 | 274 | cp -a include $kerneldir/build | |
220 | cp -a --parents tools/include/tools/le_byteshift.h $kerneldir/build/ | 275 | |
221 | cp -a --parents tools/include/tools/be_byteshift.h $kerneldir/build/ | 276 | cp -a --parents lib/vdso/* $kerneldir/build/ 2>/dev/null || : |
222 | 277 | ||
223 | # required for generate missing syscalls prepare phase | 278 | cp -a --parents tools/include/tools/le_byteshift.h $kerneldir/build/ |
224 | cp -a --parents $(find arch/x86 -type f -name "syscall_32.tbl") $kerneldir/build | 279 | cp -a --parents tools/include/tools/be_byteshift.h $kerneldir/build/ |
225 | cp -a --parents $(find arch/arm -type f -name "*.tbl") $kerneldir/build 2>/dev/null || : | 280 | |
226 | 281 | # required for generate missing syscalls prepare phase | |
227 | if [ "${ARCH}" = "x86" ]; then | 282 | cp -a --parents $(find arch/x86 -type f -name "syscall_32.tbl") $kerneldir/build |
228 | # files for 'make prepare' to succeed with kernel-devel | 283 | cp -a --parents $(find arch/arm -type f -name "*.tbl") $kerneldir/build 2>/dev/null || : |
229 | cp -a --parents $(find arch/x86 -type f -name "syscall_32.tbl") $kerneldir/build/ 2>/dev/null || : | 284 | |
230 | cp -a --parents $(find arch/x86 -type f -name "syscalltbl.sh") $kerneldir/build/ 2>/dev/null || : | 285 | if [ "${ARCH}" = "x86" ]; then |
231 | cp -a --parents $(find arch/x86 -type f -name "syscallhdr.sh") $kerneldir/build/ 2>/dev/null || : | 286 | # files for 'make prepare' to succeed with kernel-devel |
232 | cp -a --parents $(find arch/x86 -type f -name "syscall_64.tbl") $kerneldir/build/ 2>/dev/null || : | 287 | cp -a --parents $(find arch/x86 -type f -name "syscall_32.tbl") $kerneldir/build/ 2>/dev/null || : |
233 | cp -a --parents arch/x86/tools/relocs_32.c $kerneldir/build/ | 288 | cp -a --parents $(find arch/x86 -type f -name "syscalltbl.sh") $kerneldir/build/ 2>/dev/null || : |
234 | cp -a --parents arch/x86/tools/relocs_64.c $kerneldir/build/ | 289 | cp -a --parents $(find arch/x86 -type f -name "syscallhdr.sh") $kerneldir/build/ 2>/dev/null || : |
235 | cp -a --parents arch/x86/tools/relocs.c $kerneldir/build/ | 290 | cp -a --parents $(find arch/x86 -type f -name "syscall_64.tbl") $kerneldir/build/ 2>/dev/null || : |
236 | cp -a --parents arch/x86/tools/relocs_common.c $kerneldir/build/ | 291 | cp -a --parents arch/x86/tools/relocs_32.c $kerneldir/build/ |
237 | cp -a --parents arch/x86/tools/relocs.h $kerneldir/build/ | 292 | cp -a --parents arch/x86/tools/relocs_64.c $kerneldir/build/ |
238 | cp -a --parents arch/x86/tools/gen-insn-attr-x86.awk $kerneldir/build/ 2>/dev/null || : | 293 | cp -a --parents arch/x86/tools/relocs.c $kerneldir/build/ |
239 | cp -a --parents arch/x86/purgatory/purgatory.c $kerneldir/build/ | 294 | cp -a --parents arch/x86/tools/relocs_common.c $kerneldir/build/ |
240 | 295 | cp -a --parents arch/x86/tools/relocs.h $kerneldir/build/ | |
241 | # 4.18 + have unified the purgatory files, so we ignore any errors if | 296 | cp -a --parents arch/x86/tools/gen-insn-attr-x86.awk $kerneldir/build/ 2>/dev/null || : |
242 | # these files are not present | 297 | cp -a --parents arch/x86/purgatory/purgatory.c $kerneldir/build/ |
243 | cp -a --parents arch/x86/purgatory/sha256.h $kerneldir/build/ 2>/dev/null || : | 298 | |
244 | cp -a --parents arch/x86/purgatory/sha256.c $kerneldir/build/ 2>/dev/null || : | 299 | # 4.18 + have unified the purgatory files, so we ignore any errors if |
245 | 300 | # these files are not present | |
246 | cp -a --parents arch/x86/purgatory/stack.S $kerneldir/build/ | 301 | cp -a --parents arch/x86/purgatory/sha256.h $kerneldir/build/ 2>/dev/null || : |
247 | cp -a --parents arch/x86/purgatory/string.c $kerneldir/build/ 2>/dev/null || : | 302 | cp -a --parents arch/x86/purgatory/sha256.c $kerneldir/build/ 2>/dev/null || : |
248 | cp -a --parents arch/x86/purgatory/setup-x86_64.S $kerneldir/build/ | 303 | |
249 | cp -a --parents arch/x86/purgatory/entry64.S $kerneldir/build/ | 304 | cp -a --parents arch/x86/purgatory/stack.S $kerneldir/build/ |
250 | cp -a --parents arch/x86/boot/string.h $kerneldir/build/ | 305 | cp -a --parents arch/x86/purgatory/string.c $kerneldir/build/ 2>/dev/null || : |
251 | cp -a --parents arch/x86/boot/string.c $kerneldir/build/ | 306 | cp -a --parents arch/x86/purgatory/setup-x86_64.S $kerneldir/build/ |
252 | cp -a --parents arch/x86/boot/compressed/string.c $kerneldir/build/ 2>/dev/null || : | 307 | cp -a --parents arch/x86/purgatory/entry64.S $kerneldir/build/ |
253 | cp -a --parents arch/x86/boot/ctype.h $kerneldir/build/ | 308 | cp -a --parents arch/x86/boot/string.h $kerneldir/build/ |
254 | 309 | cp -a --parents arch/x86/boot/string.c $kerneldir/build/ | |
255 | # objtool requires these files | 310 | cp -a --parents arch/x86/boot/compressed/string.c $kerneldir/build/ 2>/dev/null || : |
256 | cp -a --parents arch/x86/lib/inat.c $kerneldir/build/ 2>/dev/null || : | 311 | cp -a --parents arch/x86/boot/ctype.h $kerneldir/build/ |
257 | cp -a --parents arch/x86/lib/insn.c $kerneldir/build/ 2>/dev/null || : | 312 | |
258 | fi | 313 | # objtool requires these files |
259 | 314 | cp -a --parents arch/x86/lib/inat.c $kerneldir/build/ 2>/dev/null || : | |
260 | if [ "${ARCH}" = "mips" ]; then | 315 | cp -a --parents arch/x86/lib/insn.c $kerneldir/build/ 2>/dev/null || : |
261 | cp -a --parents arch/mips/Kbuild.platforms $kerneldir/build/ | 316 | |
262 | cp --parents $(find -type f -name "Platform") $kerneldir/build | 317 | # v6.1+ |
263 | cp --parents arch/mips/boot/tools/relocs* $kerneldir/build | 318 | cp -a --parents arch/x86/kernel/asm-offsets* $kerneldir/build || : |
264 | cp -a --parents arch/mips/kernel/asm-offsets.c $kerneldir/build | 319 | # for capabilities.h, vmx.h |
265 | cp -a --parents kernel/time/timeconst.bc $kerneldir/build | 320 | cp -a --parents arch/x86/kvm/vmx/*.h $kerneldir/build || : |
266 | cp -a --parents kernel/bounds.c $kerneldir/build | 321 | # for lapic.h, hyperv.h .... |
267 | cp -a --parents Kbuild $kerneldir/build | 322 | cp -a --parents arch/x86/kvm/*.h $kerneldir/build || : |
268 | cp -a --parents arch/mips/kernel/syscalls/*.sh $kerneldir/build 2>/dev/null || : | 323 | fi |
269 | cp -a --parents arch/mips/kernel/syscalls/*.tbl $kerneldir/build 2>/dev/null || : | 324 | |
270 | cp -a --parents arch/mips/tools/elf-entry.c $kerneldir/build 2>/dev/null || : | 325 | # moved from arch/mips to all arches for v6.1+ |
271 | fi | 326 | cp -a --parents kernel/time/timeconst.bc $kerneldir/build 2>/dev/null || : |
327 | cp -a --parents kernel/bounds.c $kerneldir/build 2>/dev/null || : | ||
328 | |||
329 | if [ "${ARCH}" = "mips" ]; then | ||
330 | cp -a --parents arch/mips/Kbuild.platforms $kerneldir/build/ | ||
331 | cp --parents $(find -type f -name "Platform") $kerneldir/build | ||
332 | cp --parents arch/mips/boot/tools/relocs* $kerneldir/build | ||
333 | cp -a --parents arch/mips/kernel/asm-offsets.c $kerneldir/build | ||
334 | cp -a --parents Kbuild $kerneldir/build | ||
335 | cp -a --parents arch/mips/kernel/syscalls/*.sh $kerneldir/build 2>/dev/null || : | ||
336 | cp -a --parents arch/mips/kernel/syscalls/*.tbl $kerneldir/build 2>/dev/null || : | ||
337 | cp -a --parents arch/mips/tools/elf-entry.c $kerneldir/build 2>/dev/null || : | ||
338 | fi | ||
339 | |||
340 | if [ "${ARCH}" = "loongarch" ]; then | ||
341 | cp -a --parents arch/loongarch/kernel/asm-offsets.c $kerneldir/build | ||
342 | cp -a --parents Kbuild $kerneldir/build | ||
343 | cp -a --parents arch/loongarch/vdso/*.S $kerneldir/build 2>/dev/null || : | ||
344 | cp -a --parents arch/loongarch/vdso/*gettimeofday.* $kerneldir/build 2>/dev/null || : | ||
345 | cp -a --parents arch/loongarch/vdso/*getcpu.* $kerneldir/build 2>/dev/null || : | ||
346 | cp -a --parents arch/loongarch/vdso/gen_vdso*_offsets.sh $kerneldir/build/ 2>/dev/null || : | ||
347 | fi | ||
272 | 348 | ||
273 | # required to build scripts/selinux/genheaders/genheaders | 349 | # required to build scripts/selinux/genheaders/genheaders |
274 | cp -a --parents security/selinux/include/* $kerneldir/build/ | 350 | cp -a --parents security/selinux/include/* $kerneldir/build/ |
275 | 351 | ||
276 | # copy any localversion files | 352 | # copy any localversion files |
277 | cp -a localversion* $kerneldir/build/ 2>/dev/null || : | 353 | cp -a localversion* $kerneldir/build/ 2>/dev/null || : |
278 | ) | 354 | ) |
279 | 355 | ||
280 | # Make sure the Makefile and version.h have a matching timestamp so that | 356 | # Make sure the Makefile and version.h have a matching timestamp so that |
281 | # external modules can be built | 357 | # external modules can be built |
282 | touch -r $kerneldir/build/Makefile $kerneldir/build/include/generated/uapi/linux/version.h | 358 | touch -r $kerneldir/build/Makefile $kerneldir/build/include/generated/uapi/linux/version.h |
283 | 359 | ||
284 | # Copy .config to include/config/auto.conf so "make prepare" is unnecessary. | 360 | # This fixes a warning that the compilers don't match when building a module |
285 | cp $kerneldir/build/.config $kerneldir/build/include/config/auto.conf | 361 | # Change: CONFIG_CC_VERSION_TEXT="x86_64-poky-linux-gcc (GCC) 12.2.0" to "gcc (GCC) 12.2.0" |
362 | # #define CONFIG_CC_VERSION_TEXT "x86_64-poky-linux-gcc (GCC) 12.2.0" to "gcc (GCC) 12.2.0" | ||
363 | sed -i 's/CONFIG_CC_VERSION_TEXT=".*\(gcc.*\)"/CONFIG_CC_VERSION_TEXT="\1"/' "$kerneldir/build/.config" | ||
364 | sed -i 's/#define CONFIG_CC_VERSION_TEXT ".*\(gcc.*\)"/#define CONFIG_CC_VERSION_TEXT "\1"/' $kerneldir/build/include/generated/autoconf.h | ||
365 | sed -i 's/CONFIG_CC_VERSION_TEXT=".*\(gcc.*\)"/CONFIG_CC_VERSION_TEXT="\1"/' $kerneldir/build/include/config/auto.conf | ||
286 | 366 | ||
287 | # make sure these are at least as old as the .config, or rebuilds will trigger | 367 | # make sure these are at least as old as the .config, or rebuilds will trigger |
288 | touch -r $kerneldir/build/.config $kerneldir/build/include/generated/autoconf.h 2>/dev/null || : | 368 | touch -r $kerneldir/build/.config $kerneldir/build/include/generated/autoconf.h 2>/dev/null || : |
@@ -310,9 +390,9 @@ do_install() { | |||
310 | # left as /usr/bin/python rootfs assembly will fail, since we only have python3 | 390 | # left as /usr/bin/python rootfs assembly will fail, since we only have python3 |
311 | # in the RDEPENDS (and the python3 package does not include /usr/bin/python) | 391 | # in the RDEPENDS (and the python3 package does not include /usr/bin/python) |
312 | for ss in $(find $kerneldir/build/scripts -type f -name '*'); do | 392 | for ss in $(find $kerneldir/build/scripts -type f -name '*'); do |
313 | sed -i 's,/usr/bin/python2,/usr/bin/env python3,' "$ss" | 393 | sed -i 's,/usr/bin/python2,/usr/bin/env python3,' "$ss" |
314 | sed -i 's,/usr/bin/env python2,/usr/bin/env python3,' "$ss" | 394 | sed -i 's,/usr/bin/env python2,/usr/bin/env python3,' "$ss" |
315 | sed -i 's,/usr/bin/python,/usr/bin/env python3,' "$ss" | 395 | sed -i 's,/usr/bin/python,/usr/bin/env python3,' "$ss" |
316 | done | 396 | done |
317 | 397 | ||
318 | chown -R root:root ${D} | 398 | chown -R root:root ${D} |
@@ -324,14 +404,14 @@ do_install[lockfiles] = "${TMPDIR}/kernel-scripts.lock" | |||
324 | FILES:${PN} = "${KERNEL_BUILD_ROOT} ${KERNEL_SRC_PATH}" | 404 | FILES:${PN} = "${KERNEL_BUILD_ROOT} ${KERNEL_SRC_PATH}" |
325 | FILES:${PN}-dbg += "${KERNEL_BUILD_ROOT}*/build/scripts/*/.debug/*" | 405 | FILES:${PN}-dbg += "${KERNEL_BUILD_ROOT}*/build/scripts/*/.debug/*" |
326 | 406 | ||
327 | RDEPENDS:${PN} = "bc python3 flex bison ${TCLIBC}-utils" | 407 | RDEPENDS:${PN} = "bc python3-core flex bison ${TCLIBC}-utils gawk" |
328 | # 4.15+ needs these next two RDEPENDS | 408 | # 4.15+ needs these next two RDEPENDS |
329 | RDEPENDS:${PN} += "openssl-dev util-linux" | 409 | RDEPENDS:${PN} += "openssl-dev util-linux" |
330 | # and x86 needs a bit more for 4.15+ | 410 | # and x86 needs a bit more for 4.15+ |
331 | RDEPENDS:${PN} += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-dev', '', d)}" | 411 | RDEPENDS:${PN} += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-dev', '', d)}" |
412 | # powerpc needs elfutils on 6.3+ | ||
413 | RDEPENDS:${PN} += "${@bb.utils.contains('ARCH', 'powerpc', 'elfutils-dev', '', d)}" | ||
332 | # 5.8+ needs gcc-plugins libmpc-dev | 414 | # 5.8+ needs gcc-plugins libmpc-dev |
333 | RDEPENDS:${PN} += "gcc-plugins libmpc-dev" | 415 | RDEPENDS:${PN} += "gcc-plugins libmpc-dev" |
334 | # 5.13+ needs awk for arm64 | ||
335 | RDEPENDS:${PN}:append:aarch64 = " gawk" | ||
336 | # 5.13+ needs grep for powerpc | 416 | # 5.13+ needs grep for powerpc |
337 | RDEPENDS:${PN}:append:powerpc = " grep" | 417 | RDEPENDS:${PN}:append:powerpc = " grep" |
diff --git a/meta/recipes-kernel/linux/linux-dummy.bb b/meta/recipes-kernel/linux/linux-dummy.bb index 175e660687..d7f39a452d 100644 --- a/meta/recipes-kernel/linux/linux-dummy.bb +++ b/meta/recipes-kernel/linux/linux-dummy.bb | |||
@@ -4,7 +4,7 @@ provider for virtual/kernel to satisfy dependencies for situations \ | |||
4 | where you wish to build the kernel externally from the build system." | 4 | where you wish to build the kernel externally from the build system." |
5 | SECTION = "kernel" | 5 | SECTION = "kernel" |
6 | 6 | ||
7 | LICENSE = "GPLv2" | 7 | LICENSE = "GPL-2.0-only" |
8 | LIC_FILES_CHKSUM = "file://COPYING.GPL;md5=751419260aa954499f7abaabaa882bbe" | 8 | LIC_FILES_CHKSUM = "file://COPYING.GPL;md5=751419260aa954499f7abaabaa882bbe" |
9 | 9 | ||
10 | PROVIDES += "virtual/kernel" | 10 | PROVIDES += "virtual/kernel" |
@@ -23,15 +23,13 @@ FILES:kernel-vmlinux = "" | |||
23 | ALLOW_EMPTY:kernel-vmlinux = "1" | 23 | ALLOW_EMPTY:kernel-vmlinux = "1" |
24 | DESCRIPTION:kernel-vmlinux = "Kernel vmlinux meta package" | 24 | DESCRIPTION:kernel-vmlinux = "Kernel vmlinux meta package" |
25 | 25 | ||
26 | |||
27 | INHIBIT_DEFAULT_DEPS = "1" | 26 | INHIBIT_DEFAULT_DEPS = "1" |
28 | 27 | ||
29 | COMPATIBLE_HOST = ".*-linux" | 28 | COMPATIBLE_HOST = ".*-linux" |
30 | 29 | ||
31 | PR = "r1" | ||
32 | |||
33 | SRC_URI = "file://COPYING.GPL" | 30 | SRC_URI = "file://COPYING.GPL" |
34 | S = "${WORKDIR}" | 31 | |
32 | S = "${UNPACKDIR}" | ||
35 | 33 | ||
36 | do_configure() { | 34 | do_configure() { |
37 | : | 35 | : |
diff --git a/meta/recipes-kernel/linux/linux-yocto-dev.bb b/meta/recipes-kernel/linux/linux-yocto-dev.bb index 6b6ea9a7e8..4b1f93a692 100644 --- a/meta/recipes-kernel/linux/linux-yocto-dev.bb +++ b/meta/recipes-kernel/linux/linux-yocto-dev.bb | |||
@@ -10,17 +10,15 @@ | |||
10 | 10 | ||
11 | inherit kernel | 11 | inherit kernel |
12 | require recipes-kernel/linux/linux-yocto.inc | 12 | require recipes-kernel/linux/linux-yocto.inc |
13 | # for ncurses tests | ||
14 | inherit pkgconfig | ||
15 | 13 | ||
16 | # provide this .inc to set specific revisions | 14 | # provide this .inc to set specific revisions |
17 | include recipes-kernel/linux/linux-yocto-dev-revisions.inc | 15 | include recipes-kernel/linux/linux-yocto-dev-revisions.inc |
18 | 16 | ||
19 | KBRANCH = "standard/base" | 17 | KBRANCH = "v6.15/standard/base" |
20 | KMETA = "kernel-meta" | 18 | KMETA = "kernel-meta" |
21 | 19 | ||
22 | SRC_URI = "git://git.yoctoproject.org/linux-yocto-dev.git;branch=${KBRANCH};name=machine \ | 20 | SRC_URI = "git://git.yoctoproject.org/linux-yocto-dev.git;branch=${KBRANCH};name=machine;protocol=https \ |
23 | git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=master;destsuffix=${KMETA}" | 21 | git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=master;destsuffix=${KMETA};protocol=https" |
24 | 22 | ||
25 | # Set default SRCREVs. Both the machine and meta SRCREVs are statically set | 23 | # Set default SRCREVs. Both the machine and meta SRCREVs are statically set |
26 | # to the korg v3.7 tag, and hence prevent network access during parsing. If | 24 | # to the korg v3.7 tag, and hence prevent network access during parsing. If |
@@ -30,16 +28,12 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto-dev.git;branch=${KBRANCH};name | |||
30 | SRCREV_machine ?= '${@oe.utils.conditional("PREFERRED_PROVIDER_virtual/kernel", "linux-yocto-dev", "${AUTOREV}", "29594404d7fe73cd80eaa4ee8c43dcc53970c60e", d)}' | 28 | SRCREV_machine ?= '${@oe.utils.conditional("PREFERRED_PROVIDER_virtual/kernel", "linux-yocto-dev", "${AUTOREV}", "29594404d7fe73cd80eaa4ee8c43dcc53970c60e", d)}' |
31 | SRCREV_meta ?= '${@oe.utils.conditional("PREFERRED_PROVIDER_virtual/kernel", "linux-yocto-dev", "${AUTOREV}", "29594404d7fe73cd80eaa4ee8c43dcc53970c60e", d)}' | 29 | SRCREV_meta ?= '${@oe.utils.conditional("PREFERRED_PROVIDER_virtual/kernel", "linux-yocto-dev", "${AUTOREV}", "29594404d7fe73cd80eaa4ee8c43dcc53970c60e", d)}' |
32 | 30 | ||
33 | LINUX_VERSION ?= "5.16+" | 31 | LINUX_VERSION ?= "6.15" |
34 | LINUX_VERSION_EXTENSION ?= "-yoctodev-${LINUX_KERNEL_TYPE}" | 32 | LINUX_VERSION_EXTENSION ?= "-yoctodev-${LINUX_KERNEL_TYPE}" |
35 | PV = "${LINUX_VERSION}+git${SRCPV}" | 33 | PV = "${LINUX_VERSION}+git" |
36 | 34 | ||
37 | LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" | 35 | LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" |
38 | 36 | ||
39 | DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" | ||
40 | DEPENDS += "openssl-native util-linux-native" | ||
41 | DEPENDS += "gmp-native libmpc-native" | ||
42 | |||
43 | # yaml and dtschema are required for 5.16+ device tree validation, libyaml is checked | 37 | # yaml and dtschema are required for 5.16+ device tree validation, libyaml is checked |
44 | # via pkgconfig, so must always be present, but we can wrap the others to make them | 38 | # via pkgconfig, so must always be present, but we can wrap the others to make them |
45 | # conditional | 39 | # conditional |
@@ -50,18 +44,18 @@ PACKAGECONFIG[dt-validation] = ",,python3-dtschema-native" | |||
50 | # we need the wrappers if validation isn't in the packageconfig | 44 | # we need the wrappers if validation isn't in the packageconfig |
51 | DEPENDS += "${@bb.utils.contains('PACKAGECONFIG', 'dt-validation', '', 'python3-dtschema-wrapper-native', d)}" | 45 | DEPENDS += "${@bb.utils.contains('PACKAGECONFIG', 'dt-validation', '', 'python3-dtschema-wrapper-native', d)}" |
52 | 46 | ||
53 | COMPATIBLE_MACHINE = "(qemuarm|qemux86|qemuppc|qemumips|qemumips64|qemux86-64|qemuriscv64)" | 47 | COMPATIBLE_MACHINE = "^(qemuarmv5|qemuarm|qemuarm64|qemux86|qemuppc|qemumips|qemumips64|qemux86-64|qemuriscv32|qemuriscv64|qemuloongarch64)$" |
54 | 48 | ||
55 | KERNEL_DEVICETREE:qemuarmv5 = "versatile-pb.dtb" | 49 | KERNEL_DEVICETREE:qemuarmv5 = "arm/versatile-pb.dtb" |
56 | 50 | ||
57 | # Functionality flags | 51 | # Functionality flags |
58 | KERNEL_EXTRA_FEATURES ?= "features/netfilter/netfilter.scc features/taskstats/taskstats.scc" | 52 | KERNEL_EXTRA_FEATURES ?= "features/netfilter/netfilter.scc features/taskstats/taskstats.scc" |
59 | KERNEL_FEATURES:append = " ${KERNEL_EXTRA_FEATURES}" | 53 | KERNEL_FEATURES:append = " ${KERNEL_EXTRA_FEATURES}" |
60 | KERNEL_FEATURES:append:qemuall=" cfg/virtio.scc features/drm-bochs/drm-bochs.scc" | 54 | KERNEL_FEATURES:append:qemuall = " cfg/virtio.scc features/drm-bochs/drm-bochs.scc" |
61 | KERNEL_FEATURES:append:qemux86=" cfg/sound.scc cfg/paravirt_kvm.scc" | 55 | KERNEL_FEATURES:append:qemux86 = " cfg/sound.scc cfg/paravirt_kvm.scc" |
62 | KERNEL_FEATURES:append:qemux86-64=" cfg/sound.scc cfg/paravirt_kvm.scc" | 56 | KERNEL_FEATURES:append:qemux86-64 = " cfg/sound.scc cfg/paravirt_kvm.scc" |
63 | KERNEL_FEATURES:append = " ${@bb.utils.contains("TUNE_FEATURES", "mx32", " cfg/x32.scc", "", d)}" | 57 | KERNEL_FEATURES:append = " ${@bb.utils.contains("TUNE_FEATURES", "mx32", " cfg/x32.scc", "", d)}" |
64 | KERNEL_FEATURES:append = " ${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/scsi/scsi-debug.scc", "", d)}" | 58 | KERNEL_FEATURES:append = " ${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/scsi/scsi-debug.scc", "", d)}" |
65 | KERNEL_FEATURES:append = " ${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/gpio/mockup.scc", "", d)}" | 59 | KERNEL_FEATURES:append = " ${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/gpio/mockup.scc features/gpio/sim.scc", "", d)}" |
66 | 60 | ||
67 | KERNEL_VERSION_SANITY_SKIP = "1" | 61 | KERNEL_VERSION_SANITY_SKIP = "1" |
diff --git a/meta/recipes-kernel/linux/linux-yocto-fitimage.bb b/meta/recipes-kernel/linux/linux-yocto-fitimage.bb new file mode 100644 index 0000000000..6ce1960a87 --- /dev/null +++ b/meta/recipes-kernel/linux/linux-yocto-fitimage.bb | |||
@@ -0,0 +1,13 @@ | |||
1 | SUMMARY = "The Linux kernel as a FIT image (optionally with initramfs)" | ||
2 | SECTION = "kernel" | ||
3 | |||
4 | # If an initramfs is included in the FIT image more licenses apply. | ||
5 | # But also the kernel uses more than one license (see Documentation/process/license-rules.rst) | ||
6 | LICENSE = "GPL-2.0-with-Linux-syscall-note" | ||
7 | LIC_FILES_CHKSUM = "file://${COREBASE}/meta/files/common-licenses/GPL-2.0-with-Linux-syscall-note;md5=0bad96c422c41c3a94009dcfe1bff992" | ||
8 | |||
9 | inherit linux-kernel-base kernel-fit-image | ||
10 | |||
11 | # Set the version of this recipe to the version of the included kernel | ||
12 | # (without taking the long way around via PV) | ||
13 | PKGV = "${@get_kernelversion_file("${STAGING_KERNEL_BUILDDIR}")}" | ||
diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb b/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb deleted file mode 100644 index 89ef0097fa..0000000000 --- a/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb +++ /dev/null | |||
@@ -1,45 +0,0 @@ | |||
1 | KBRANCH ?= "v5.10/standard/preempt-rt/base" | ||
2 | |||
3 | require recipes-kernel/linux/linux-yocto.inc | ||
4 | |||
5 | # Skip processing of this recipe if it is not explicitly specified as the | ||
6 | # PREFERRED_PROVIDER for virtual/kernel. This avoids errors when trying | ||
7 | # to build multiple virtual/kernel providers, e.g. as dependency of | ||
8 | # core-image-rt-sdk, core-image-rt. | ||
9 | python () { | ||
10 | if d.getVar("KERNEL_PACKAGE_NAME") == "kernel" and d.getVar("PREFERRED_PROVIDER_virtual/kernel") != "linux-yocto-rt": | ||
11 | raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") | ||
12 | } | ||
13 | |||
14 | SRCREV_machine ?= "31ba5af055c8ec4f10e7d830f6303ca2384e345a" | ||
15 | SRCREV_meta ?= "1a4cd99824c919ba17dc62935532f3748ef18469" | ||
16 | |||
17 | SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine \ | ||
18 | git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.10;destsuffix=${KMETA}" | ||
19 | |||
20 | LINUX_VERSION ?= "5.10.79" | ||
21 | |||
22 | LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" | ||
23 | |||
24 | DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" | ||
25 | DEPENDS += "openssl-native util-linux-native" | ||
26 | |||
27 | PV = "${LINUX_VERSION}+git${SRCPV}" | ||
28 | |||
29 | KMETA = "kernel-meta" | ||
30 | KCONF_BSP_AUDIT_LEVEL = "1" | ||
31 | |||
32 | LINUX_KERNEL_TYPE = "preempt-rt" | ||
33 | |||
34 | COMPATIBLE_MACHINE = "(qemux86|qemux86-64|qemuarm|qemuarmv5|qemuarm64|qemuppc|qemumips)" | ||
35 | |||
36 | KERNEL_DEVICETREE:qemuarmv5 = "versatile-pb.dtb" | ||
37 | |||
38 | # Functionality flags | ||
39 | KERNEL_EXTRA_FEATURES ?= "features/netfilter/netfilter.scc features/taskstats/taskstats.scc" | ||
40 | KERNEL_FEATURES:append = " ${KERNEL_EXTRA_FEATURES}" | ||
41 | KERNEL_FEATURES:append:qemuall=" cfg/virtio.scc features/drm-bochs/drm-bochs.scc" | ||
42 | KERNEL_FEATURES:append:qemux86=" cfg/sound.scc cfg/paravirt_kvm.scc" | ||
43 | KERNEL_FEATURES:append:qemux86-64=" cfg/sound.scc cfg/paravirt_kvm.scc" | ||
44 | KERNEL_FEATURES:append = "${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/scsi/scsi-debug.scc", "", d)}" | ||
45 | KERNEL_FEATURES:append = "${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/gpio/mockup.scc", "", d)}" | ||
diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb b/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb deleted file mode 100644 index d5c11b8d33..0000000000 --- a/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb +++ /dev/null | |||
@@ -1,45 +0,0 @@ | |||
1 | KBRANCH ?= "v5.15/standard/preempt-rt/base" | ||
2 | |||
3 | require recipes-kernel/linux/linux-yocto.inc | ||
4 | |||
5 | # Skip processing of this recipe if it is not explicitly specified as the | ||
6 | # PREFERRED_PROVIDER for virtual/kernel. This avoids errors when trying | ||
7 | # to build multiple virtual/kernel providers, e.g. as dependency of | ||
8 | # core-image-rt-sdk, core-image-rt. | ||
9 | python () { | ||
10 | if d.getVar("KERNEL_PACKAGE_NAME") == "kernel" and d.getVar("PREFERRED_PROVIDER_virtual/kernel") != "linux-yocto-rt": | ||
11 | raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") | ||
12 | } | ||
13 | |||
14 | SRCREV_machine ?= "ada3579e989bfe75d8598ab993347157dc4611c2" | ||
15 | SRCREV_meta ?= "e3682eb8fe7512597c75b009f51027534ab2f58d" | ||
16 | |||
17 | SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine \ | ||
18 | git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.15;destsuffix=${KMETA}" | ||
19 | |||
20 | LINUX_VERSION ?= "5.15.2" | ||
21 | |||
22 | LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" | ||
23 | |||
24 | DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" | ||
25 | DEPENDS += "openssl-native util-linux-native" | ||
26 | |||
27 | PV = "${LINUX_VERSION}+git${SRCPV}" | ||
28 | |||
29 | KMETA = "kernel-meta" | ||
30 | KCONF_BSP_AUDIT_LEVEL = "1" | ||
31 | |||
32 | LINUX_KERNEL_TYPE = "preempt-rt" | ||
33 | |||
34 | COMPATIBLE_MACHINE = "(qemux86|qemux86-64|qemuarm|qemuarmv5|qemuarm64|qemuppc|qemumips)" | ||
35 | |||
36 | KERNEL_DEVICETREE:qemuarmv5 = "versatile-pb.dtb" | ||
37 | |||
38 | # Functionality flags | ||
39 | KERNEL_EXTRA_FEATURES ?= "features/netfilter/netfilter.scc features/taskstats/taskstats.scc" | ||
40 | KERNEL_FEATURES:append = " ${KERNEL_EXTRA_FEATURES}" | ||
41 | KERNEL_FEATURES:append:qemuall=" cfg/virtio.scc features/drm-bochs/drm-bochs.scc" | ||
42 | KERNEL_FEATURES:append:qemux86=" cfg/sound.scc cfg/paravirt_kvm.scc" | ||
43 | KERNEL_FEATURES:append:qemux86-64=" cfg/sound.scc cfg/paravirt_kvm.scc" | ||
44 | KERNEL_FEATURES:append = "${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/scsi/scsi-debug.scc", "", d)}" | ||
45 | KERNEL_FEATURES:append = "${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/gpio/mockup.scc", "", d)}" | ||
diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_5.14.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb index a328c6211f..5a7bad9017 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_5.14.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb | |||
@@ -1,7 +1,10 @@ | |||
1 | KBRANCH ?= "v5.14/standard/preempt-rt/base" | 1 | KBRANCH ?= "v6.12/standard/preempt-rt/base" |
2 | 2 | ||
3 | require recipes-kernel/linux/linux-yocto.inc | 3 | require recipes-kernel/linux/linux-yocto.inc |
4 | 4 | ||
5 | # CVE exclusions | ||
6 | include recipes-kernel/linux/cve-exclusion_6.12.inc | ||
7 | |||
5 | # Skip processing of this recipe if it is not explicitly specified as the | 8 | # Skip processing of this recipe if it is not explicitly specified as the |
6 | # PREFERRED_PROVIDER for virtual/kernel. This avoids errors when trying | 9 | # PREFERRED_PROVIDER for virtual/kernel. This avoids errors when trying |
7 | # to build multiple virtual/kernel providers, e.g. as dependency of | 10 | # to build multiple virtual/kernel providers, e.g. as dependency of |
@@ -11,35 +14,35 @@ python () { | |||
11 | raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") | 14 | raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") |
12 | } | 15 | } |
13 | 16 | ||
14 | SRCREV_machine ?= "b9d37d8650cd3787d60516496f60178c51564a59" | 17 | SRCREV_machine ?= "7cb6d42c40de351ecab0a083aef260f84407de0d" |
15 | SRCREV_meta ?= "4e79d0b09290482ffb891e6b4acb3c7447b9c94d" | 18 | SRCREV_meta ?= "60b8562e9989f268ad5d241989f56b71cfa1f648" |
16 | 19 | ||
17 | SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine \ | 20 | SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ |
18 | git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.14;destsuffix=${KMETA}" | 21 | git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" |
19 | 22 | ||
20 | LINUX_VERSION ?= "5.14.18" | 23 | LINUX_VERSION ?= "6.12.31" |
21 | 24 | ||
22 | LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" | 25 | LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" |
23 | 26 | ||
24 | DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" | 27 | DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" |
25 | DEPENDS += "openssl-native util-linux-native" | 28 | DEPENDS += "openssl-native util-linux-native" |
26 | 29 | ||
27 | PV = "${LINUX_VERSION}+git${SRCPV}" | 30 | PV = "${LINUX_VERSION}+git" |
28 | 31 | ||
29 | KMETA = "kernel-meta" | 32 | KMETA = "kernel-meta" |
30 | KCONF_BSP_AUDIT_LEVEL = "1" | 33 | KCONF_BSP_AUDIT_LEVEL = "1" |
31 | 34 | ||
32 | LINUX_KERNEL_TYPE = "preempt-rt" | 35 | LINUX_KERNEL_TYPE = "preempt-rt" |
33 | 36 | ||
34 | COMPATIBLE_MACHINE = "(qemux86|qemux86-64|qemuarm|qemuarmv5|qemuarm64|qemuppc|qemumips)" | 37 | COMPATIBLE_MACHINE = "^(qemux86|qemux86-64|qemuarm|qemuarmv5|qemuarm64|qemuppc|qemumips)$" |
35 | 38 | ||
36 | KERNEL_DEVICETREE:qemuarmv5 = "versatile-pb.dtb" | 39 | KERNEL_DEVICETREE:qemuarmv5 = "arm/versatile-pb.dtb" |
37 | 40 | ||
38 | # Functionality flags | 41 | # Functionality flags |
39 | KERNEL_EXTRA_FEATURES ?= "features/netfilter/netfilter.scc features/taskstats/taskstats.scc" | 42 | KERNEL_EXTRA_FEATURES ?= "features/netfilter/netfilter.scc features/taskstats/taskstats.scc" |
40 | KERNEL_FEATURES:append = " ${KERNEL_EXTRA_FEATURES}" | 43 | KERNEL_FEATURES:append = " ${KERNEL_EXTRA_FEATURES}" |
41 | KERNEL_FEATURES:append:qemuall=" cfg/virtio.scc features/drm-bochs/drm-bochs.scc" | 44 | KERNEL_FEATURES:append:qemuall = " cfg/virtio.scc features/drm-bochs/drm-bochs.scc" |
42 | KERNEL_FEATURES:append:qemux86=" cfg/sound.scc cfg/paravirt_kvm.scc" | 45 | KERNEL_FEATURES:append:qemux86 = " cfg/sound.scc cfg/paravirt_kvm.scc" |
43 | KERNEL_FEATURES:append:qemux86-64=" cfg/sound.scc cfg/paravirt_kvm.scc" | 46 | KERNEL_FEATURES:append:qemux86-64 = " cfg/sound.scc cfg/paravirt_kvm.scc" |
44 | KERNEL_FEATURES:append = "${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/scsi/scsi-debug.scc", "", d)}" | 47 | KERNEL_FEATURES:append = "${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/scsi/scsi-debug.scc", "", d)}" |
45 | KERNEL_FEATURES:append = "${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/gpio/mockup.scc", "", d)}" | 48 | KERNEL_FEATURES:append = "${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/gpio/mockup.scc features/gpio/sim.scc", "", d)}" |
diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb deleted file mode 100644 index ef562f42f1..0000000000 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb +++ /dev/null | |||
@@ -1,32 +0,0 @@ | |||
1 | KBRANCH ?= "v5.10/standard/tiny/base" | ||
2 | KBRANCH:qemuarm ?= "v5.10/standard/tiny/arm-versatile-926ejs" | ||
3 | |||
4 | LINUX_KERNEL_TYPE = "tiny" | ||
5 | KCONFIG_MODE = "--allnoconfig" | ||
6 | |||
7 | require recipes-kernel/linux/linux-yocto.inc | ||
8 | |||
9 | LINUX_VERSION ?= "5.10.79" | ||
10 | LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" | ||
11 | |||
12 | DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" | ||
13 | DEPENDS += "openssl-native util-linux-native" | ||
14 | |||
15 | KMETA = "kernel-meta" | ||
16 | KCONF_BSP_AUDIT_LEVEL = "2" | ||
17 | |||
18 | SRCREV_machine:qemuarm ?= "d8f6c9be051a886d4956a7d6195d0e8f10761a33" | ||
19 | SRCREV_machine ?= "f7838de907e651c3d279e6b5209b7e5d7e12ad21" | ||
20 | SRCREV_meta ?= "1a4cd99824c919ba17dc62935532f3748ef18469" | ||
21 | |||
22 | PV = "${LINUX_VERSION}+git${SRCPV}" | ||
23 | |||
24 | SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine \ | ||
25 | git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.10;destsuffix=${KMETA}" | ||
26 | |||
27 | COMPATIBLE_MACHINE = "qemux86|qemux86-64|qemuarm|qemuarmv5" | ||
28 | |||
29 | # Functionality flags | ||
30 | KERNEL_FEATURES = "" | ||
31 | |||
32 | KERNEL_DEVICETREE:qemuarmv5 = "versatile-pb.dtb" | ||
diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_5.14.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_5.14.bb deleted file mode 100644 index 98947900a4..0000000000 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_5.14.bb +++ /dev/null | |||
@@ -1,32 +0,0 @@ | |||
1 | KBRANCH ?= "v5.14/standard/tiny/base" | ||
2 | KBRANCH:qemuarm ?= "v5.14/standard/tiny/arm-versatile-926ejs" | ||
3 | |||
4 | LINUX_KERNEL_TYPE = "tiny" | ||
5 | KCONFIG_MODE = "--allnoconfig" | ||
6 | |||
7 | require recipes-kernel/linux/linux-yocto.inc | ||
8 | |||
9 | LINUX_VERSION ?= "5.14.18" | ||
10 | LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" | ||
11 | |||
12 | DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" | ||
13 | DEPENDS += "openssl-native util-linux-native" | ||
14 | |||
15 | KMETA = "kernel-meta" | ||
16 | KCONF_BSP_AUDIT_LEVEL = "2" | ||
17 | |||
18 | SRCREV_machine:qemuarm ?= "83004545c9bb5e3ad666b3ffa9ad723eb795881a" | ||
19 | SRCREV_machine ?= "8411a30747a2750c9d4dbe24631958bd00d3157e" | ||
20 | SRCREV_meta ?= "4e79d0b09290482ffb891e6b4acb3c7447b9c94d" | ||
21 | |||
22 | PV = "${LINUX_VERSION}+git${SRCPV}" | ||
23 | |||
24 | SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine \ | ||
25 | git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.14;destsuffix=${KMETA}" | ||
26 | |||
27 | COMPATIBLE_MACHINE = "qemux86|qemux86-64|qemuarm|qemuarmv5" | ||
28 | |||
29 | # Functionality flags | ||
30 | KERNEL_FEATURES = "" | ||
31 | |||
32 | KERNEL_DEVICETREE:qemuarmv5 = "versatile-pb.dtb" | ||
diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb deleted file mode 100644 index 49e74252e9..0000000000 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb +++ /dev/null | |||
@@ -1,32 +0,0 @@ | |||
1 | KBRANCH ?= "v5.15/standard/tiny/base" | ||
2 | KBRANCH:qemuarm ?= "v5.15/standard/tiny/arm-versatile-926ejs" | ||
3 | |||
4 | LINUX_KERNEL_TYPE = "tiny" | ||
5 | KCONFIG_MODE = "--allnoconfig" | ||
6 | |||
7 | require recipes-kernel/linux/linux-yocto.inc | ||
8 | |||
9 | LINUX_VERSION ?= "5.15.2" | ||
10 | LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" | ||
11 | |||
12 | DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" | ||
13 | DEPENDS += "openssl-native util-linux-native" | ||
14 | |||
15 | KMETA = "kernel-meta" | ||
16 | KCONF_BSP_AUDIT_LEVEL = "2" | ||
17 | |||
18 | SRCREV_machine:qemuarm ?= "0daad4eb78782be97ce4d91f2d455ccc2d238991" | ||
19 | SRCREV_machine ?= "a81c52f3e09edca72d2b3da6cbab5d17769fa8cb" | ||
20 | SRCREV_meta ?= "e3682eb8fe7512597c75b009f51027534ab2f58d" | ||
21 | |||
22 | PV = "${LINUX_VERSION}+git${SRCPV}" | ||
23 | |||
24 | SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine \ | ||
25 | git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.15;destsuffix=${KMETA}" | ||
26 | |||
27 | COMPATIBLE_MACHINE = "qemux86|qemux86-64|qemuarm|qemuarmv5" | ||
28 | |||
29 | # Functionality flags | ||
30 | KERNEL_FEATURES = "" | ||
31 | |||
32 | KERNEL_DEVICETREE:qemuarmv5 = "versatile-pb.dtb" | ||
diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb new file mode 100644 index 0000000000..0fad73dddd --- /dev/null +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb | |||
@@ -0,0 +1,33 @@ | |||
1 | KBRANCH ?= "v6.12/standard/tiny/base" | ||
2 | |||
3 | LINUX_KERNEL_TYPE = "tiny" | ||
4 | KCONFIG_MODE = "--allnoconfig" | ||
5 | |||
6 | require recipes-kernel/linux/linux-yocto.inc | ||
7 | |||
8 | # CVE exclusions | ||
9 | include recipes-kernel/linux/cve-exclusion_6.12.inc | ||
10 | |||
11 | LINUX_VERSION ?= "6.12.31" | ||
12 | LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" | ||
13 | |||
14 | DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" | ||
15 | DEPENDS += "openssl-native util-linux-native" | ||
16 | |||
17 | KMETA = "kernel-meta" | ||
18 | KCONF_BSP_AUDIT_LEVEL = "2" | ||
19 | |||
20 | SRCREV_machine ?= "298aefdf4112e7c0a84522e4acf2c722e433c8a0" | ||
21 | SRCREV_meta ?= "60b8562e9989f268ad5d241989f56b71cfa1f648" | ||
22 | |||
23 | PV = "${LINUX_VERSION}+git" | ||
24 | |||
25 | SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ | ||
26 | git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" | ||
27 | |||
28 | COMPATIBLE_MACHINE = "^(qemux86|qemux86-64|qemuarm64|qemuarm|qemuarmv5)$" | ||
29 | |||
30 | # Functionality flags | ||
31 | KERNEL_FEATURES:append:qemuall = " cfg/virtio.scc cfg/fs/ext4.scc" | ||
32 | |||
33 | KERNEL_DEVICETREE:qemuarmv5 = "arm/versatile-pb.dtb" | ||
diff --git a/meta/recipes-kernel/linux/linux-yocto.inc b/meta/recipes-kernel/linux/linux-yocto.inc index a3b2416367..389329030d 100644 --- a/meta/recipes-kernel/linux/linux-yocto.inc +++ b/meta/recipes-kernel/linux/linux-yocto.inc | |||
@@ -1,6 +1,6 @@ | |||
1 | SUMMARY = "Linux kernel" | 1 | SUMMARY = "Linux kernel" |
2 | SECTION = "kernel" | 2 | SECTION = "kernel" |
3 | LICENSE = "GPLv2" | 3 | LICENSE = "GPL-2.0-with-Linux-syscall-note" |
4 | HOMEPAGE = "https://www.yoctoproject.org/" | 4 | HOMEPAGE = "https://www.yoctoproject.org/" |
5 | 5 | ||
6 | LIC_FILES_CHKSUM ?= "file://COPYING;md5=d7810fab7487fb0aad327b76f1be7cd7" | 6 | LIC_FILES_CHKSUM ?= "file://COPYING;md5=d7810fab7487fb0aad327b76f1be7cd7" |
@@ -31,8 +31,9 @@ DEPENDS:append:arc = " libgcc" | |||
31 | KERNEL_CC:append:arc = " ${TOOLCHAIN_OPTIONS}" | 31 | KERNEL_CC:append:arc = " ${TOOLCHAIN_OPTIONS}" |
32 | KERNEL_LD:append:arc = " ${TOOLCHAIN_OPTIONS}" | 32 | KERNEL_LD:append:arc = " ${TOOLCHAIN_OPTIONS}" |
33 | 33 | ||
34 | KERNEL_FEATURES:append:qemuall=" features/debug/printk.scc" | 34 | KERNEL_FEATURES:append:qemuall = " features/debug/printk.scc features/taskstats/taskstats.scc" |
35 | 35 | ||
36 | KERNEL_FEATURES:append = " ${@bb.utils.contains('MACHINE_FEATURES', 'efi', 'cfg/efi.scc', '', d)}" | ||
36 | KERNEL_FEATURES:append = " ${@bb.utils.contains('MACHINE_FEATURES', 'numa', 'features/numa/numa.scc', '', d)}" | 37 | KERNEL_FEATURES:append = " ${@bb.utils.contains('MACHINE_FEATURES', 'numa', 'features/numa/numa.scc', '', d)}" |
37 | KERNEL_FEATURES:append = " ${@bb.utils.contains('MACHINE_FEATURES', 'vfat', 'cfg/fs/vfat.scc', '', d)}" | 38 | KERNEL_FEATURES:append = " ${@bb.utils.contains('MACHINE_FEATURES', 'vfat', 'cfg/fs/vfat.scc', '', d)}" |
38 | 39 | ||
@@ -46,7 +47,6 @@ LINUX_VERSION_EXTENSION ??= "-yocto-${LINUX_KERNEL_TYPE}" | |||
46 | # Pick up shared functions | 47 | # Pick up shared functions |
47 | inherit kernel | 48 | inherit kernel |
48 | inherit kernel-yocto | 49 | inherit kernel-yocto |
49 | inherit pkgconfig | ||
50 | 50 | ||
51 | B = "${WORKDIR}/linux-${PACKAGE_ARCH}-${LINUX_KERNEL_TYPE}-build" | 51 | B = "${WORKDIR}/linux-${PACKAGE_ARCH}-${LINUX_KERNEL_TYPE}-build" |
52 | 52 | ||
@@ -57,10 +57,19 @@ do_install:append(){ | |||
57 | } | 57 | } |
58 | 58 | ||
59 | # enable kernel-sample for oeqa/runtime/cases's ksample.py test | 59 | # enable kernel-sample for oeqa/runtime/cases's ksample.py test |
60 | KERNEL_FEATURES:append:qemuall=" features/kernel-sample/kernel-sample.scc" | 60 | KERNEL_FEATURES:append:qemuall = " features/kernel-sample/kernel-sample.scc" |
61 | 61 | ||
62 | KERNEL_DEBUG_OPTIONS ?= "stack" | 62 | KERNEL_DEBUG ?= "" |
63 | KERNEL_EXTRA_ARGS:append:x86-64 = "${@bb.utils.contains('KERNEL_DEBUG_OPTIONS', 'stack', 'HOST_LIBELF_LIBS="-L${RECIPE_SYSROOT_NATIVE}/usr/lib/pkgconfig/../../../usr/lib/ -lelf"', '', d)}" | 63 | # These used to be version specific, but are now common dependencies. New |
64 | # tools / dependencies will continue to be added in version specific recipes. | ||
65 | DEPENDS += '${@bb.utils.contains_any("ARCH", [ "x86", "arm64", "powerpc" ], "elfutils-native", "", d)}' | ||
66 | DEPENDS += "openssl-native util-linux-native" | ||
67 | DEPENDS += "gmp-native libmpc-native" | ||
68 | |||
69 | # Some options depend on CONFIG_PAHOLE_VERSION, so need to make pahole-native available before do_kernel_configme | ||
70 | do_kernel_configme[depends] += '${@bb.utils.contains("KERNEL_DEBUG", "True", "pahole-native:do_populate_sysroot", "", d)}' | ||
71 | |||
72 | EXTRA_OEMAKE += '${@bb.utils.contains("KERNEL_DEBUG", "True", "", "PAHOLE=false", d)}' | ||
64 | 73 | ||
65 | do_devshell:prepend() { | 74 | do_devshell:prepend() { |
66 | # setup native pkg-config variables (kconfig scripts call pkg-config directly, cannot generically be overriden to pkg-config-native) | 75 | # setup native pkg-config variables (kconfig scripts call pkg-config directly, cannot generically be overriden to pkg-config-native) |
diff --git a/meta/recipes-kernel/linux/linux-yocto_5.10.bb b/meta/recipes-kernel/linux/linux-yocto_5.10.bb deleted file mode 100644 index a68744d129..0000000000 --- a/meta/recipes-kernel/linux/linux-yocto_5.10.bb +++ /dev/null | |||
@@ -1,58 +0,0 @@ | |||
1 | KBRANCH ?= "v5.10/standard/base" | ||
2 | |||
3 | require recipes-kernel/linux/linux-yocto.inc | ||
4 | |||
5 | # board specific branches | ||
6 | KBRANCH:qemuarm ?= "v5.10/standard/arm-versatile-926ejs" | ||
7 | KBRANCH:qemuarm64 ?= "v5.10/standard/qemuarm64" | ||
8 | KBRANCH:qemumips ?= "v5.10/standard/mti-malta32" | ||
9 | KBRANCH:qemuppc ?= "v5.10/standard/qemuppc" | ||
10 | KBRANCH:qemuriscv64 ?= "v5.10/standard/base" | ||
11 | KBRANCH:qemuriscv32 ?= "v5.10/standard/base" | ||
12 | KBRANCH:qemux86 ?= "v5.10/standard/base" | ||
13 | KBRANCH:qemux86-64 ?= "v5.10/standard/base" | ||
14 | KBRANCH:qemumips64 ?= "v5.10/standard/mti-malta64" | ||
15 | |||
16 | SRCREV_machine:qemuarm ?= "400d6ae8c64508b812dd58ee90106be2aa395bd9" | ||
17 | SRCREV_machine:qemuarm64 ?= "efc398a5bce6938c24413608381d86e7bf225c91" | ||
18 | SRCREV_machine:qemumips ?= "358d9326c084f4162b71ed857b16419b4fb3295f" | ||
19 | SRCREV_machine:qemuppc ?= "0fb273427794cb084265a18b03878a482e438aa9" | ||
20 | SRCREV_machine:qemuriscv64 ?= "fba683668510aeb475a5fd3fb4b7da5aed402495" | ||
21 | SRCREV_machine:qemuriscv32 ?= "fba683668510aeb475a5fd3fb4b7da5aed402495" | ||
22 | SRCREV_machine:qemux86 ?= "fba683668510aeb475a5fd3fb4b7da5aed402495" | ||
23 | SRCREV_machine:qemux86-64 ?= "fba683668510aeb475a5fd3fb4b7da5aed402495" | ||
24 | SRCREV_machine:qemumips64 ?= "e1dabeb4b0ea9695dea605a0c91f17c482f49f75" | ||
25 | SRCREV_machine ?= "fba683668510aeb475a5fd3fb4b7da5aed402495" | ||
26 | SRCREV_meta ?= "1a4cd99824c919ba17dc62935532f3748ef18469" | ||
27 | |||
28 | # remap qemuarm to qemuarma15 for the 5.8 kernel | ||
29 | # KMACHINE:qemuarm ?= "qemuarma15" | ||
30 | |||
31 | SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRANCH}; \ | ||
32 | git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.10;destsuffix=${KMETA}" | ||
33 | |||
34 | LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" | ||
35 | LINUX_VERSION ?= "5.10.79" | ||
36 | |||
37 | DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" | ||
38 | DEPENDS += "openssl-native util-linux-native" | ||
39 | DEPENDS += "gmp-native" | ||
40 | |||
41 | PV = "${LINUX_VERSION}+git${SRCPV}" | ||
42 | |||
43 | KMETA = "kernel-meta" | ||
44 | KCONF_BSP_AUDIT_LEVEL = "1" | ||
45 | |||
46 | KERNEL_DEVICETREE:qemuarmv5 = "versatile-pb.dtb" | ||
47 | |||
48 | COMPATIBLE_MACHINE = "qemuarm|qemuarmv5|qemuarm64|qemux86|qemuppc|qemuppc64|qemumips|qemumips64|qemux86-64|qemuriscv64|qemuriscv32" | ||
49 | |||
50 | # Functionality flags | ||
51 | KERNEL_EXTRA_FEATURES ?= "features/netfilter/netfilter.scc" | ||
52 | KERNEL_FEATURES:append = " ${KERNEL_EXTRA_FEATURES}" | ||
53 | KERNEL_FEATURES:append:qemuall=" cfg/virtio.scc features/drm-bochs/drm-bochs.scc" | ||
54 | KERNEL_FEATURES:append:qemux86=" cfg/sound.scc cfg/paravirt_kvm.scc" | ||
55 | KERNEL_FEATURES:append:qemux86-64=" cfg/sound.scc cfg/paravirt_kvm.scc" | ||
56 | KERNEL_FEATURES:append = " ${@bb.utils.contains("TUNE_FEATURES", "mx32", " cfg/x32.scc", "", d)}" | ||
57 | KERNEL_FEATURES:append = " ${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/scsi/scsi-debug.scc", "", d)}" | ||
58 | KERNEL_FEATURES:append = " ${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/gpio/mockup.scc", "", d)}" | ||
diff --git a/meta/recipes-kernel/linux/linux-yocto_5.14.bb b/meta/recipes-kernel/linux/linux-yocto_5.14.bb deleted file mode 100644 index 673c03d82e..0000000000 --- a/meta/recipes-kernel/linux/linux-yocto_5.14.bb +++ /dev/null | |||
@@ -1,68 +0,0 @@ | |||
1 | KBRANCH ?= "v5.14/standard/base" | ||
2 | |||
3 | require recipes-kernel/linux/linux-yocto.inc | ||
4 | |||
5 | # board specific branches | ||
6 | KBRANCH:qemuarm ?= "v5.14/standard/arm-versatile-926ejs" | ||
7 | KBRANCH:qemuarm64 ?= "v5.14/standard/qemuarm64" | ||
8 | KBRANCH:qemumips ?= "v5.14/standard/mti-malta32" | ||
9 | KBRANCH:qemuppc ?= "v5.14/standard/qemuppc" | ||
10 | KBRANCH:qemuriscv64 ?= "v5.14/standard/base" | ||
11 | KBRANCH:qemuriscv32 ?= "v5.14/standard/base" | ||
12 | KBRANCH:qemux86 ?= "v5.14/standard/base" | ||
13 | KBRANCH:qemux86-64 ?= "v5.14/standard/base" | ||
14 | KBRANCH:qemumips64 ?= "v5.14/standard/mti-malta64" | ||
15 | |||
16 | SRCREV_machine:qemuarm ?= "992053c4ec826932d9256ea4e1ad8686e4ea5375" | ||
17 | SRCREV_machine:qemuarm64 ?= "8411a30747a2750c9d4dbe24631958bd00d3157e" | ||
18 | SRCREV_machine:qemumips ?= "e362a5e68da1cca6ad77a27cbda02116edc9864d" | ||
19 | SRCREV_machine:qemuppc ?= "8411a30747a2750c9d4dbe24631958bd00d3157e" | ||
20 | SRCREV_machine:qemuriscv64 ?= "8411a30747a2750c9d4dbe24631958bd00d3157e" | ||
21 | SRCREV_machine:qemuriscv32 ?= "8411a30747a2750c9d4dbe24631958bd00d3157e" | ||
22 | SRCREV_machine:qemux86 ?= "8411a30747a2750c9d4dbe24631958bd00d3157e" | ||
23 | SRCREV_machine:qemux86-64 ?= "8411a30747a2750c9d4dbe24631958bd00d3157e" | ||
24 | SRCREV_machine:qemumips64 ?= "90b773a3236f213b62d2d4ab23cca9c695bc8383" | ||
25 | SRCREV_machine ?= "8411a30747a2750c9d4dbe24631958bd00d3157e" | ||
26 | SRCREV_meta ?= "4e79d0b09290482ffb891e6b4acb3c7447b9c94d" | ||
27 | |||
28 | # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll | ||
29 | # get the <version>/base branch, which is pure upstream -stable, and the same | ||
30 | # meta SRCREV as the linux-yocto-standard builds. Select your version using the | ||
31 | # normal PREFERRED_VERSION settings. | ||
32 | BBCLASSEXTEND = "devupstream:target" | ||
33 | DEFAULT_PREFERENCE:class-devupstream = "-1" | ||
34 | SRCREV_machine:class-devupstream ?= "a0265dd8262de73457aaa3ce1c5938dc152b8085" | ||
35 | PN:class-devupstream = "linux-yocto-upstream" | ||
36 | KBRANCH:class-devupstream = "v5.14/base" | ||
37 | |||
38 | # remap qemuarm to qemuarma15 for the 5.8 kernel | ||
39 | # KMACHINE:qemuarm ?= "qemuarma15" | ||
40 | |||
41 | SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRANCH}; \ | ||
42 | git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.14;destsuffix=${KMETA}" | ||
43 | |||
44 | LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" | ||
45 | LINUX_VERSION ?= "5.14.18" | ||
46 | |||
47 | DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" | ||
48 | DEPENDS += "openssl-native util-linux-native" | ||
49 | DEPENDS += "gmp-native libmpc-native" | ||
50 | |||
51 | PV = "${LINUX_VERSION}+git${SRCPV}" | ||
52 | |||
53 | KMETA = "kernel-meta" | ||
54 | KCONF_BSP_AUDIT_LEVEL = "1" | ||
55 | |||
56 | KERNEL_DEVICETREE:qemuarmv5 = "versatile-pb.dtb" | ||
57 | |||
58 | COMPATIBLE_MACHINE = "qemuarm|qemuarmv5|qemuarm64|qemux86|qemuppc|qemuppc64|qemumips|qemumips64|qemux86-64|qemuriscv64|qemuriscv32" | ||
59 | |||
60 | # Functionality flags | ||
61 | KERNEL_EXTRA_FEATURES ?= "features/netfilter/netfilter.scc" | ||
62 | KERNEL_FEATURES:append = " ${KERNEL_EXTRA_FEATURES}" | ||
63 | KERNEL_FEATURES:append:qemuall=" cfg/virtio.scc features/drm-bochs/drm-bochs.scc" | ||
64 | KERNEL_FEATURES:append:qemux86=" cfg/sound.scc cfg/paravirt_kvm.scc" | ||
65 | KERNEL_FEATURES:append:qemux86-64=" cfg/sound.scc cfg/paravirt_kvm.scc" | ||
66 | KERNEL_FEATURES:append = " ${@bb.utils.contains("TUNE_FEATURES", "mx32", " cfg/x32.scc", "", d)}" | ||
67 | KERNEL_FEATURES:append = " ${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/scsi/scsi-debug.scc", "", d)}" | ||
68 | KERNEL_FEATURES:append = " ${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/gpio/mockup.scc", "", d)}" | ||
diff --git a/meta/recipes-kernel/linux/linux-yocto_5.15.bb b/meta/recipes-kernel/linux/linux-yocto_5.15.bb deleted file mode 100644 index 51259617a7..0000000000 --- a/meta/recipes-kernel/linux/linux-yocto_5.15.bb +++ /dev/null | |||
@@ -1,68 +0,0 @@ | |||
1 | KBRANCH ?= "v5.15/standard/base" | ||
2 | |||
3 | require recipes-kernel/linux/linux-yocto.inc | ||
4 | |||
5 | # board specific branches | ||
6 | KBRANCH:qemuarm ?= "v5.15/standard/arm-versatile-926ejs" | ||
7 | KBRANCH:qemuarm64 ?= "v5.15/standard/qemuarm64" | ||
8 | KBRANCH:qemumips ?= "v5.15/standard/mti-malta32" | ||
9 | KBRANCH:qemuppc ?= "v5.15/standard/qemuppc" | ||
10 | KBRANCH:qemuriscv64 ?= "v5.15/standard/base" | ||
11 | KBRANCH:qemuriscv32 ?= "v5.15/standard/base" | ||
12 | KBRANCH:qemux86 ?= "v5.15/standard/base" | ||
13 | KBRANCH:qemux86-64 ?= "v5.15/standard/base" | ||
14 | KBRANCH:qemumips64 ?= "v5.15/standard/mti-malta64" | ||
15 | |||
16 | SRCREV_machine:qemuarm ?= "e185d8ca70e102b1f99736b15f5e8ee1ab62d081" | ||
17 | SRCREV_machine:qemuarm64 ?= "a81c52f3e09edca72d2b3da6cbab5d17769fa8cb" | ||
18 | SRCREV_machine:qemumips ?= "51982f22cf688d426ae919380cb19fcde3cd0d1a" | ||
19 | SRCREV_machine:qemuppc ?= "a81c52f3e09edca72d2b3da6cbab5d17769fa8cb" | ||
20 | SRCREV_machine:qemuriscv64 ?= "a81c52f3e09edca72d2b3da6cbab5d17769fa8cb" | ||
21 | SRCREV_machine:qemuriscv32 ?= "a81c52f3e09edca72d2b3da6cbab5d17769fa8cb" | ||
22 | SRCREV_machine:qemux86 ?= "a81c52f3e09edca72d2b3da6cbab5d17769fa8cb" | ||
23 | SRCREV_machine:qemux86-64 ?= "a81c52f3e09edca72d2b3da6cbab5d17769fa8cb" | ||
24 | SRCREV_machine:qemumips64 ?= "95b7f92bb1eec8532be3a5e50726a0643ab2fae9" | ||
25 | SRCREV_machine ?= "a81c52f3e09edca72d2b3da6cbab5d17769fa8cb" | ||
26 | SRCREV_meta ?= "e3682eb8fe7512597c75b009f51027534ab2f58d" | ||
27 | |||
28 | # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll | ||
29 | # get the <version>/base branch, which is pure upstream -stable, and the same | ||
30 | # meta SRCREV as the linux-yocto-standard builds. Select your version using the | ||
31 | # normal PREFERRED_VERSION settings. | ||
32 | BBCLASSEXTEND = "devupstream:target" | ||
33 | DEFAULT_PREFERENCE:class-devupstream = "-1" | ||
34 | SRCREV_machine:class-devupstream ?= "7cc36c3e14ae0af800a3a5d20cb17d0c168fc956" | ||
35 | PN:class-devupstream = "linux-yocto-upstream" | ||
36 | KBRANCH:class-devupstream = "v5.15/base" | ||
37 | |||
38 | # remap qemuarm to qemuarma15 for the 5.8 kernel | ||
39 | # KMACHINE:qemuarm ?= "qemuarma15" | ||
40 | |||
41 | SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRANCH}; \ | ||
42 | git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.15;destsuffix=${KMETA}" | ||
43 | |||
44 | LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" | ||
45 | LINUX_VERSION ?= "5.15.2" | ||
46 | |||
47 | DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" | ||
48 | DEPENDS += "openssl-native util-linux-native" | ||
49 | DEPENDS += "gmp-native libmpc-native" | ||
50 | |||
51 | PV = "${LINUX_VERSION}+git${SRCPV}" | ||
52 | |||
53 | KMETA = "kernel-meta" | ||
54 | KCONF_BSP_AUDIT_LEVEL = "1" | ||
55 | |||
56 | KERNEL_DEVICETREE:qemuarmv5 = "versatile-pb.dtb" | ||
57 | |||
58 | COMPATIBLE_MACHINE = "qemuarm|qemuarmv5|qemuarm64|qemux86|qemuppc|qemuppc64|qemumips|qemumips64|qemux86-64|qemuriscv64|qemuriscv32" | ||
59 | |||
60 | # Functionality flags | ||
61 | KERNEL_EXTRA_FEATURES ?= "features/netfilter/netfilter.scc" | ||
62 | KERNEL_FEATURES:append = " ${KERNEL_EXTRA_FEATURES}" | ||
63 | KERNEL_FEATURES:append:qemuall=" cfg/virtio.scc features/drm-bochs/drm-bochs.scc" | ||
64 | KERNEL_FEATURES:append:qemux86=" cfg/sound.scc cfg/paravirt_kvm.scc" | ||
65 | KERNEL_FEATURES:append:qemux86-64=" cfg/sound.scc cfg/paravirt_kvm.scc" | ||
66 | KERNEL_FEATURES:append = " ${@bb.utils.contains("TUNE_FEATURES", "mx32", " cfg/x32.scc", "", d)}" | ||
67 | KERNEL_FEATURES:append = " ${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/scsi/scsi-debug.scc", "", d)}" | ||
68 | KERNEL_FEATURES:append = " ${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/gpio/mockup.scc", "", d)}" | ||
diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb new file mode 100644 index 0000000000..262ae35704 --- /dev/null +++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb | |||
@@ -0,0 +1,79 @@ | |||
1 | KBRANCH ?= "v6.12/standard/base" | ||
2 | |||
3 | require recipes-kernel/linux/linux-yocto.inc | ||
4 | |||
5 | # CVE exclusions | ||
6 | include recipes-kernel/linux/cve-exclusion.inc | ||
7 | include recipes-kernel/linux/cve-exclusion_6.12.inc | ||
8 | |||
9 | # board specific branches | ||
10 | KBRANCH:qemuarm ?= "v6.12/standard/arm-versatile-926ejs" | ||
11 | KBRANCH:qemuarm64 ?= "v6.12/standard/base" | ||
12 | KBRANCH:qemumips ?= "v6.12/standard/mti-malta32" | ||
13 | KBRANCH:qemuppc ?= "v6.12/standard/qemuppc" | ||
14 | KBRANCH:qemuriscv64 ?= "v6.12/standard/base" | ||
15 | KBRANCH:qemuriscv32 ?= "v6.12/standard/base" | ||
16 | KBRANCH:qemux86 ?= "v6.12/standard/base" | ||
17 | KBRANCH:qemux86.104 ?= "v6.12/standard/base" | ||
18 | KBRANCH:qemuloongarch64 ?= "v6.12/standard/base" | ||
19 | KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64" | ||
20 | |||
21 | SRCREV_machine:qemuarm ?= "37a1fd13ca538e7785daf01434495a614bc55ead" | ||
22 | SRCREV_machine:qemuarm64 ?= "298aefdf4112e7c0a84522e4acf2c722e433c8a0" | ||
23 | SRCREV_machine:qemuloongarch64 ?= "298aefdf4112e7c0a84522e4acf2c722e433c8a0" | ||
24 | SRCREV_machine:qemumips ?= "2bcf58ea5aa19d54c436e63c59ab09b307e9ee8e" | ||
25 | SRCREV_machine:qemuppc ?= "298aefdf4112e7c0a84522e4acf2c722e433c8a0" | ||
26 | SRCREV_machine:qemuriscv64 ?= "298aefdf4112e7c0a84522e4acf2c722e433c8a0" | ||
27 | SRCREV_machine:qemuriscv32 ?= "298aefdf4112e7c0a84522e4acf2c722e433c8a0" | ||
28 | SRCREV_machine:qemux86 ?= "298aefdf4112e7c0a84522e4acf2c722e433c8a0" | ||
29 | SRCREV_machine:qemux86-64 ?= "298aefdf4112e7c0a84522e4acf2c722e433c8a0" | ||
30 | SRCREV_machine:qemumips64 ?= "6470f58a8f04951f202cf85afb4421d2e7ec9995" | ||
31 | SRCREV_machine ?= "298aefdf4112e7c0a84522e4acf2c722e433c8a0" | ||
32 | SRCREV_meta ?= "60b8562e9989f268ad5d241989f56b71cfa1f648" | ||
33 | |||
34 | # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll | ||
35 | # get the <version>/base branch, which is pure upstream -stable, and the same | ||
36 | # meta SRCREV as the linux-yocto-standard builds. Select your version using the | ||
37 | # normal PREFERRED_VERSION settings. | ||
38 | BBCLASSEXTEND = "devupstream:target" | ||
39 | SRCREV_machine:class-devupstream ?= "df3f6d10f353de274cc7c87f52dba5d26f185393" | ||
40 | PN:class-devupstream = "linux-yocto-upstream" | ||
41 | KBRANCH:class-devupstream = "v6.12/base" | ||
42 | |||
43 | SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRANCH};protocol=https \ | ||
44 | git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" | ||
45 | |||
46 | LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" | ||
47 | LINUX_VERSION ?= "6.12.31" | ||
48 | |||
49 | PV = "${LINUX_VERSION}+git" | ||
50 | |||
51 | KMETA = "kernel-meta" | ||
52 | KCONF_BSP_AUDIT_LEVEL = "1" | ||
53 | |||
54 | KERNEL_DEVICETREE:qemuarmv5 = "arm/versatile-pb.dtb" | ||
55 | |||
56 | COMPATIBLE_MACHINE = "^(qemuarm|qemuarmv5|qemuarm64|qemux86|qemuppc|qemuppc64|qemumips|qemumips64|qemux86-64|qemuriscv64|qemuriscv32|qemuloongarch64)$" | ||
57 | |||
58 | # Functionality flags | ||
59 | KERNEL_EXTRA_FEATURES ?= "features/netfilter/netfilter.scc" | ||
60 | KERNEL_FEATURES:append = " ${KERNEL_EXTRA_FEATURES}" | ||
61 | KERNEL_FEATURES:append:qemuall = " cfg/virtio.scc features/drm-bochs/drm-bochs.scc cfg/net/mdio.scc" | ||
62 | KERNEL_FEATURES:append:qemux86 = " cfg/sound.scc cfg/paravirt_kvm.scc" | ||
63 | KERNEL_FEATURES:append:qemux86-64 = " cfg/sound.scc cfg/paravirt_kvm.scc" | ||
64 | KERNEL_FEATURES:append = " ${@bb.utils.contains("TUNE_FEATURES", "mx32", " cfg/x32.scc", "", d)}" | ||
65 | KERNEL_FEATURES:append = " ${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/scsi/scsi-debug.scc features/nf_tables/nft_test.scc", "", d)}" | ||
66 | KERNEL_FEATURES:append = " ${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/gpio/mockup.scc features/gpio/sim.scc", "", d)}" | ||
67 | KERNEL_FEATURES:append = " ${@bb.utils.contains("KERNEL_DEBUG", "True", " features/reproducibility/reproducibility.scc features/debug/debug-btf.scc", "", d)}" | ||
68 | # libteam ptests from meta-oe needs it | ||
69 | KERNEL_FEATURES:append = " ${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/net/team/team.scc", "", d)}" | ||
70 | # openl2tp tests from meta-networking needs it | ||
71 | KERNEL_FEATURES:append = " ${@bb.utils.contains("DISTRO_FEATURES", "ptest", " cgl/cfg/net/l2tp.scc", "", d)}" | ||
72 | KERNEL_FEATURES:append:powerpc = " arch/powerpc/powerpc-debug.scc" | ||
73 | KERNEL_FEATURES:append:powerpc64 = " arch/powerpc/powerpc-debug.scc" | ||
74 | KERNEL_FEATURES:append:powerpc64le = " arch/powerpc/powerpc-debug.scc" | ||
75 | # Do not add debug info for riscv32, it fails during depmod | ||
76 | # ERROR: modpost: __ex_table+0x17a4 references non-executable section '.debug_loclists' | ||
77 | # Check again during next major version upgrade | ||
78 | KERNEL_FEATURES:remove:riscv32 = "features/debug/debug-kernel.scc" | ||
79 | INSANE_SKIP:kernel-vmlinux:qemuppc64 = "textrel" | ||
diff --git a/meta/recipes-kernel/lttng/babeltrace2/0001-Make-bt_field_blob_get_length-return-size_t-instead-.patch b/meta/recipes-kernel/lttng/babeltrace2/0001-Make-bt_field_blob_get_length-return-size_t-instead-.patch new file mode 100644 index 0000000000..4dffa7bfa5 --- /dev/null +++ b/meta/recipes-kernel/lttng/babeltrace2/0001-Make-bt_field_blob_get_length-return-size_t-instead-.patch | |||
@@ -0,0 +1,38 @@ | |||
1 | From a73cef80a0d4129f74ab2e160a15693235aad4d1 Mon Sep 17 00:00:00 2001 | ||
2 | From: Khem Raj <raj.khem@gmail.com> | ||
3 | Date: Thu, 20 Mar 2025 18:10:08 -0700 | ||
4 | Subject: [PATCH] Cast result of bt_field_blob_get_length to size_t in | ||
5 | constructor of bt2s::span | ||
6 | |||
7 | Fixes errors e.g. | ||
8 | | ../../git/src/cpp-common/bt2/field.hpp:1139:82: error: non-constant-expression cannot be narrowed from type 'std::uint64_t' (aka 'unsigned long long') to 'size_type' (aka 'unsigned int') in initializer list [-Wc++11-narrowing] | ||
9 | | 1139 | return {internal::CommonBlobFieldSpec<LibObjT>::data(this->libObjPtr()), this->length()}; | ||
10 | | | ^~~~~~~~~~~~~~ | ||
11 | | ../../git/src/plugins/ctf/common/src/msg-iter.cpp:744:56: note: in instantiation of member function 'bt2::CommonBlobField<bt_field>::data' requested here | ||
12 | | 744 | std::memcpy(&this->_stackTopCurSubField().asBlob().data()[_mCurBlobFieldDataOffset], | ||
13 | | | ^ | ||
14 | | ../../git/src/cpp-common/bt2/field.hpp:1139:82: note: insert an explicit cast to silence this issue | ||
15 | | 1139 | return {internal::CommonBlobFieldSpec<LibObjT>::data(this->libObjPtr()), this->length()}; | ||
16 | | | ^~~~~~~~~~~~~~ | ||
17 | | | static_cast<size_type>( ) | ||
18 | |||
19 | Upstream-Status: Backport [https://github.com/efficios/babeltrace/commit/1e6b34e411c61135ad256047a985a9bad927eae0] | ||
20 | |||
21 | Signed-off-by: Khem Raj <raj.khem@gmail.com> | ||
22 | --- | ||
23 | src/cpp-common/bt2/field.hpp | 2 +- | ||
24 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
25 | |||
26 | diff --git a/src/cpp-common/bt2/field.hpp b/src/cpp-common/bt2/field.hpp | ||
27 | index 8b291f7a..3a7d30a4 100644 | ||
28 | --- a/src/cpp-common/bt2/field.hpp | ||
29 | +++ b/src/cpp-common/bt2/field.hpp | ||
30 | @@ -1136,7 +1136,7 @@ public: | ||
31 | |||
32 | bt2s::span<typename internal::CommonBlobFieldSpec<LibObjT>::Data> data() const noexcept | ||
33 | { | ||
34 | - return {internal::CommonBlobFieldSpec<LibObjT>::data(this->libObjPtr()), this->length()}; | ||
35 | + return {internal::CommonBlobFieldSpec<LibObjT>::data(this->libObjPtr()), static_cast<std::size_t>(this->length())}; | ||
36 | } | ||
37 | |||
38 | std::uint64_t length() const noexcept | ||
diff --git a/meta/recipes-kernel/lttng/babeltrace2/0001-Make-manpages-multilib-identical.patch b/meta/recipes-kernel/lttng/babeltrace2/0001-Make-manpages-multilib-identical.patch index 2401b176e6..c2b76b1ed5 100644 --- a/meta/recipes-kernel/lttng/babeltrace2/0001-Make-manpages-multilib-identical.patch +++ b/meta/recipes-kernel/lttng/babeltrace2/0001-Make-manpages-multilib-identical.patch | |||
@@ -3,17 +3,20 @@ From: Jeremy Puhlman <jpuhlman@mvista.com> | |||
3 | Date: Mon, 9 Mar 2020 21:10:35 +0000 | 3 | Date: Mon, 9 Mar 2020 21:10:35 +0000 |
4 | Subject: [PATCH] Make manpages multilib identical | 4 | Subject: [PATCH] Make manpages multilib identical |
5 | 5 | ||
6 | Upstream-Status: Pending | 6 | Upstream-Status: Submitted [https://review.lttng.org/c/babeltrace/+/14222] |
7 | |||
7 | Signed-off-by: Jeremy Puhlman <jpuhlman@mvista.com> | 8 | Signed-off-by: Jeremy Puhlman <jpuhlman@mvista.com> |
9 | Signed-off-by: Bin Lan <bin.lan.cn@windriver.com> | ||
8 | --- | 10 | --- |
9 | doc/man/asciidoc-attrs.conf.in | 4 ++-- | 11 | doc/man/asciidoc-attrs.conf.in | 4 ++-- |
10 | 1 file changed, 2 insertions(+), 2 deletions(-) | 12 | 1 file changed, 2 insertions(+), 2 deletions(-) |
11 | 13 | ||
12 | diff --git a/doc/man/asciidoc-attrs.conf.in b/doc/man/asciidoc-attrs.conf.in | 14 | diff --git a/doc/man/asciidoc-attrs.conf.in b/doc/man/asciidoc-attrs.conf.in |
13 | index ad1183f1..e11c7031 100644 | 15 | index 88fb13ce2..27858b720 100644 |
14 | --- a/doc/man/asciidoc-attrs.conf.in | 16 | --- a/doc/man/asciidoc-attrs.conf.in |
15 | +++ b/doc/man/asciidoc-attrs.conf.in | 17 | +++ b/doc/man/asciidoc-attrs.conf.in |
16 | @@ -1,7 +1,7 @@ | 18 | @@ -4,8 +4,8 @@ |
19 | |||
17 | [attributes] | 20 | [attributes] |
18 | # default values | 21 | # default values |
19 | -system_plugin_path="@LIBDIR@/babeltrace2/plugins" | 22 | -system_plugin_path="@LIBDIR@/babeltrace2/plugins" |
@@ -24,5 +27,4 @@ index ad1183f1..e11c7031 100644 | |||
24 | enable_debug_info="@ENABLE_DEBUG_INFO_VAL@" | 27 | enable_debug_info="@ENABLE_DEBUG_INFO_VAL@" |
25 | defrdport=5344 | 28 | defrdport=5344 |
26 | -- | 29 | -- |
27 | 2.24.1 | 30 | 2.34.1 |
28 | |||
diff --git a/meta/recipes-kernel/lttng/babeltrace2/0001-tests-do-not-run-test-applications-from-.libs.patch b/meta/recipes-kernel/lttng/babeltrace2/0001-tests-do-not-run-test-applications-from-.libs.patch deleted file mode 100644 index 805dde8064..0000000000 --- a/meta/recipes-kernel/lttng/babeltrace2/0001-tests-do-not-run-test-applications-from-.libs.patch +++ /dev/null | |||
@@ -1,28 +0,0 @@ | |||
1 | From 582713cc9a013481eeef253195d644020f637ec4 Mon Sep 17 00:00:00 2001 | ||
2 | Message-Id: <582713cc9a013481eeef253195d644020f637ec4.1583403622.git.wallinux@gmail.com> | ||
3 | From: Anders Wallin <wallinux@gmail.com> | ||
4 | Date: Thu, 5 Mar 2020 11:20:04 +0100 | ||
5 | Subject: [PATCH] tests: do not run test applications from .libs | ||
6 | |||
7 | Cross compile specific change | ||
8 | |||
9 | Upstream-Status: Inappropriate [oe-core specific] | ||
10 | |||
11 | Signed-off-by: Anders Wallin <wallinux@gmail.com> | ||
12 | --- | ||
13 | tests/lib/test_plugin | 2 +- | ||
14 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
15 | |||
16 | diff --git a/tests/lib/test_plugin b/tests/lib/test_plugin | ||
17 | index 652c90cc..1f817c50 100755 | ||
18 | --- a/tests/lib/test_plugin | ||
19 | +++ b/tests/lib/test_plugin | ||
20 | @@ -26,4 +26,4 @@ fi | ||
21 | # shellcheck source=../utils/utils.sh | ||
22 | source "$UTILSSH" | ||
23 | |||
24 | -"${BT_TESTS_BUILDDIR}/lib/plugin" "${BT_TESTS_BUILDDIR}/lib/test-plugin-plugins/.libs" | ||
25 | +"${BT_TESTS_BUILDDIR}/lib/plugin" "${BT_TESTS_BUILDDIR}/lib/test-plugin-plugins" | ||
26 | -- | ||
27 | 2.25.1 | ||
28 | |||
diff --git a/meta/recipes-kernel/lttng/babeltrace2/0001-tests-fix-test-applications-in-cpp-common.patch b/meta/recipes-kernel/lttng/babeltrace2/0001-tests-fix-test-applications-in-cpp-common.patch new file mode 100644 index 0000000000..87f94fb087 --- /dev/null +++ b/meta/recipes-kernel/lttng/babeltrace2/0001-tests-fix-test-applications-in-cpp-common.patch | |||
@@ -0,0 +1,129 @@ | |||
1 | From 1dc81f272855d94e6a78f7d10ea952745d991aa9 Mon Sep 17 00:00:00 2001 | ||
2 | From: Bin Lan <bin.lan.cn@windriver.com> | ||
3 | Date: Tue, 11 Mar 2025 17:19:11 +0800 | ||
4 | Subject: [PATCH] Tests: fix test applications in cpp-common are needed to | ||
5 | re-build | ||
6 | |||
7 | Test applications in cpp-common directory are needed to re-build when | ||
8 | calling make check in embedded system. The following error is shown | ||
9 | when running test applications: | ||
10 | make[3]: *** No rule to make target 'cpp-common/test-c-string-view.cpp', | ||
11 | needed by 'cpp-common/test-c-string-view.o'. | ||
12 | make[3]: *** No rule to make target '../tests/utils/tap/libtap.la', | ||
13 | needed by 'cpp-common/test-c-string-view'. | ||
14 | make[3]: *** No rule to make target '../src/common/libcommon.la', | ||
15 | needed by 'cpp-common/test-c-string-view'. | ||
16 | make[3]: *** No rule to make target '../src/logging/liblogging.la', | ||
17 | needed by 'cpp-common/test-c-string-view'. | ||
18 | ... | ||
19 | make[2]: *** [Makefile:1274: check-TESTS] Error 2 | ||
20 | make[1]: *** [Makefile:1805: check-am] Error 2 | ||
21 | make: *** [Makefile:1033: check-recursive] Error 1 | ||
22 | make: Target 'check' not remade because of errors. | ||
23 | |||
24 | Create some new shell scripts which are used to call test applications | ||
25 | in cpp-common directory. Then these test applications can run without | ||
26 | actually examining the source code. | ||
27 | |||
28 | Upstream-Status: Submitted [https://review.lttng.org/c/babeltrace/+/14213] | ||
29 | |||
30 | Signed-off-by: Bin Lan <bin.lan.cn@windriver.com> | ||
31 | --- | ||
32 | tests/Makefile.am | 6 +++--- | ||
33 | tests/cpp-common/test-c-string-view.sh | 17 +++++++++++++++++ | ||
34 | tests/cpp-common/test-unicode-conv.sh | 17 +++++++++++++++++ | ||
35 | tests/cpp-common/test-uuid.sh | 17 +++++++++++++++++ | ||
36 | 4 files changed, 54 insertions(+), 3 deletions(-) | ||
37 | create mode 100755 tests/cpp-common/test-c-string-view.sh | ||
38 | create mode 100755 tests/cpp-common/test-unicode-conv.sh | ||
39 | create mode 100755 tests/cpp-common/test-uuid.sh | ||
40 | |||
41 | diff --git a/tests/Makefile.am b/tests/Makefile.am | ||
42 | index 2a4022bc4..c79b77b32 100644 | ||
43 | --- a/tests/Makefile.am | ||
44 | +++ b/tests/Makefile.am | ||
45 | @@ -129,9 +129,9 @@ cpp_common_test_unicode_conv_LDADD = \ | ||
46 | $(COMMON_TEST_LDADD) | ||
47 | |||
48 | TESTS_CPP_COMMON = \ | ||
49 | - cpp-common/test-c-string-view \ | ||
50 | - cpp-common/test-uuid \ | ||
51 | - cpp-common/test-unicode-conv | ||
52 | + cpp-common/test-c-string-view.sh \ | ||
53 | + cpp-common/test-uuid.sh \ | ||
54 | + cpp-common/test-unicode-conv.sh | ||
55 | |||
56 | TESTS_LIB = \ | ||
57 | lib/test-bt-uuid \ | ||
58 | diff --git a/tests/cpp-common/test-c-string-view.sh b/tests/cpp-common/test-c-string-view.sh | ||
59 | new file mode 100755 | ||
60 | index 000000000..9c2ca5818 | ||
61 | --- /dev/null | ||
62 | +++ b/tests/cpp-common/test-c-string-view.sh | ||
63 | @@ -0,0 +1,17 @@ | ||
64 | +#!/bin/bash | ||
65 | +# | ||
66 | +# SPDX-License-Identifier: GPL-2.0-only | ||
67 | +# | ||
68 | +# Copyright (C) 2025 Bin Lan <bin.lan.cn@windriver.com> | ||
69 | +# | ||
70 | + | ||
71 | +if [ -n "${BT_TESTS_SRCDIR:-}" ]; then | ||
72 | + UTILSSH="$BT_TESTS_SRCDIR/utils/utils.sh" | ||
73 | +else | ||
74 | + UTILSSH="$(dirname "$0")/../utils/utils.sh" | ||
75 | +fi | ||
76 | + | ||
77 | +# shellcheck source=../utils/utils.sh | ||
78 | +source "$UTILSSH" | ||
79 | + | ||
80 | +"${BT_TESTS_BUILDDIR}/cpp-common/test-c-string-view" "$BT_TESTS_BT2_BIN" | ||
81 | diff --git a/tests/cpp-common/test-unicode-conv.sh b/tests/cpp-common/test-unicode-conv.sh | ||
82 | new file mode 100755 | ||
83 | index 000000000..df490b2eb | ||
84 | --- /dev/null | ||
85 | +++ b/tests/cpp-common/test-unicode-conv.sh | ||
86 | @@ -0,0 +1,17 @@ | ||
87 | +#!/bin/bash | ||
88 | +# | ||
89 | +# SPDX-License-Identifier: GPL-2.0-only | ||
90 | +# | ||
91 | +# Copyright (C) 2025 Bin Lan <bin.lan.cn@windriver.com> | ||
92 | +# | ||
93 | + | ||
94 | +if [ -n "${BT_TESTS_SRCDIR:-}" ]; then | ||
95 | + UTILSSH="$BT_TESTS_SRCDIR/utils/utils.sh" | ||
96 | +else | ||
97 | + UTILSSH="$(dirname "$0")/../utils/utils.sh" | ||
98 | +fi | ||
99 | + | ||
100 | +# shellcheck source=../utils/utils.sh | ||
101 | +source "$UTILSSH" | ||
102 | + | ||
103 | +"${BT_TESTS_BUILDDIR}/cpp-common/test-unicode-conv" "$BT_TESTS_BT2_BIN" | ||
104 | diff --git a/tests/cpp-common/test-uuid.sh b/tests/cpp-common/test-uuid.sh | ||
105 | new file mode 100755 | ||
106 | index 000000000..8c65daa94 | ||
107 | --- /dev/null | ||
108 | +++ b/tests/cpp-common/test-uuid.sh | ||
109 | @@ -0,0 +1,17 @@ | ||
110 | +#!/bin/bash | ||
111 | +# | ||
112 | +# SPDX-License-Identifier: GPL-2.0-only | ||
113 | +# | ||
114 | +# Copyright (C) 2025 Bin Lan <bin.lan.cn@windriver.com> | ||
115 | +# | ||
116 | + | ||
117 | +if [ -n "${BT_TESTS_SRCDIR:-}" ]; then | ||
118 | + UTILSSH="$BT_TESTS_SRCDIR/utils/utils.sh" | ||
119 | +else | ||
120 | + UTILSSH="$(dirname "$0")/../utils/utils.sh" | ||
121 | +fi | ||
122 | + | ||
123 | +# shellcheck source=../utils/utils.sh | ||
124 | +source "$UTILSSH" | ||
125 | + | ||
126 | +"${BT_TESTS_BUILDDIR}/cpp-common/test-uuid" "$BT_TESTS_BT2_BIN" | ||
127 | -- | ||
128 | 2.34.1 | ||
129 | |||
diff --git a/meta/recipes-kernel/lttng/babeltrace2/0001-tests-set-the-correct-plugin-directory.patch b/meta/recipes-kernel/lttng/babeltrace2/0001-tests-set-the-correct-plugin-directory.patch new file mode 100644 index 0000000000..7ac7582ad7 --- /dev/null +++ b/meta/recipes-kernel/lttng/babeltrace2/0001-tests-set-the-correct-plugin-directory.patch | |||
@@ -0,0 +1,30 @@ | |||
1 | From 32494b1726a881883cb6d317ab76d1ec3f1fa740 Mon Sep 17 00:00:00 2001 | ||
2 | From: Bin Lan <bin.lan.cn@windriver.com> | ||
3 | Date: Wed, 5 Mar 2025 10:51:11 +0800 | ||
4 | Subject: [PATCH] tests: set the correct directory of plugin shared library | ||
5 | |||
6 | The plugin shared libraries are put in test-plugins-plugins/.libs when | ||
7 | building in a host. test-plugins-plugins/.libs is not exist when cross | ||
8 | build. The plugin shared libraries are put in test-plugins-plugins | ||
9 | directory when cross build. | ||
10 | |||
11 | Upstream-Status: Inappropriate [oe specific] | ||
12 | |||
13 | Signed-off-by: Bin Lan <bin.lan.cn@windriver.com> | ||
14 | --- | ||
15 | tests/lib/test-plugins.sh | 2 +- | ||
16 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
17 | |||
18 | diff --git a/tests/lib/test-plugins.sh b/tests/lib/test-plugins.sh | ||
19 | index f83e42baa..939236393 100755 | ||
20 | --- a/tests/lib/test-plugins.sh | ||
21 | +++ b/tests/lib/test-plugins.sh | ||
22 | @@ -14,4 +14,4 @@ fi | ||
23 | # shellcheck source=../utils/utils.sh | ||
24 | source "$UTILSSH" | ||
25 | |||
26 | -"${BT_TESTS_BUILDDIR}/lib/test-plugins" "${BT_TESTS_BUILDDIR}/lib/test-plugins-plugins/.libs" | ||
27 | +"${BT_TESTS_BUILDDIR}/lib/test-plugins" "${BT_TESTS_BUILDDIR}/lib/test-plugins-plugins" | ||
28 | -- | ||
29 | 2.34.1 | ||
30 | |||
diff --git a/meta/recipes-kernel/lttng/babeltrace2/run-ptest b/meta/recipes-kernel/lttng/babeltrace2/run-ptest index 72fe223436..a0bf33b75d 100755 --- a/meta/recipes-kernel/lttng/babeltrace2/run-ptest +++ b/meta/recipes-kernel/lttng/babeltrace2/run-ptest | |||
@@ -4,6 +4,16 @@ | |||
4 | 4 | ||
5 | # Without --ignore-exit, the tap harness causes any FAILs within a | 5 | # Without --ignore-exit, the tap harness causes any FAILs within a |
6 | # test plan to raise ERRORs; this is just noise. | 6 | # test plan to raise ERRORs; this is just noise. |
7 | makeargs="LOG_DRIVER_FLAGS=--ignore-exit abs_top_srcdir=$PWD abs_top_builddir=$PWD GREP=grep SED=sed PYTHON=python3" | 7 | makeargs="LOG_DRIVER_FLAGS=--ignore-exit abs_top_srcdir=$PWD abs_top_builddir=$PWD" |
8 | 8 | ||
9 | exec make -C tests -k -s $makeargs $target 2>/dev/null | 9 | exec 2> error.log |
10 | make -C tests -k -s $makeargs $target | ||
11 | exitcode=$? | ||
12 | if [ -e error.log ]; then | ||
13 | cat error.log | ||
14 | fi | ||
15 | if [ -e tests/test-suite.log ]; then | ||
16 | cat tests/test-suite.log | ||
17 | fi | ||
18 | |||
19 | exit $exitcode | ||
diff --git a/meta/recipes-kernel/lttng/babeltrace2_2.0.4.bb b/meta/recipes-kernel/lttng/babeltrace2_2.1.1.bb index 2aafe81734..8bab7f677a 100644 --- a/meta/recipes-kernel/lttng/babeltrace2_2.0.4.bb +++ b/meta/recipes-kernel/lttng/babeltrace2_2.1.1.bb | |||
@@ -2,24 +2,24 @@ SUMMARY = "Babeltrace2 - Trace Format Babel Tower" | |||
2 | DESCRIPTION = "Babeltrace provides trace read and write libraries in host side, as well as a trace converter, which used to convert LTTng 2.0 traces into human-readable log." | 2 | DESCRIPTION = "Babeltrace provides trace read and write libraries in host side, as well as a trace converter, which used to convert LTTng 2.0 traces into human-readable log." |
3 | HOMEPAGE = "http://babeltrace.org/" | 3 | HOMEPAGE = "http://babeltrace.org/" |
4 | BUGTRACKER = "https://bugs.lttng.org/projects/babeltrace" | 4 | BUGTRACKER = "https://bugs.lttng.org/projects/babeltrace" |
5 | LICENSE = "MIT & GPLv2 & LGPLv2.1 & BSD-2-Clause" | 5 | LICENSE = "MIT & GPL-2.0-only & LGPL-2.1-only & BSD-2-Clause & BSD-4-Clause & GPL-3.0-or-later & CC-BY-SA-4.0 & PSF-2.0" |
6 | LIC_FILES_CHKSUM = "file://LICENSE;md5=a6a458c13f18385b7bc5069a6d7b176e" | 6 | LIC_FILES_CHKSUM = "file://LICENSE;md5=f6b015e4f388d6e78adb1b1f9a887d06" |
7 | 7 | ||
8 | DEPENDS = "glib-2.0 util-linux popt bison-native flex-native" | 8 | DEPENDS = "glib-2.0 util-linux popt bison-native flex-native virtual/libiconv" |
9 | 9 | ||
10 | SRC_URI = "git://git.efficios.com/babeltrace.git;branch=stable-2.0 \ | 10 | SRC_URI = "git://git.efficios.com/babeltrace.git;branch=stable-2.1;protocol=https;tag=v${PV} \ |
11 | file://run-ptest \ | 11 | file://run-ptest \ |
12 | file://0001-tests-do-not-run-test-applications-from-.libs.patch \ | ||
13 | file://0001-Make-manpages-multilib-identical.patch \ | 12 | file://0001-Make-manpages-multilib-identical.patch \ |
13 | file://0001-tests-fix-test-applications-in-cpp-common.patch \ | ||
14 | file://0001-tests-set-the-correct-plugin-directory.patch \ | ||
15 | file://0001-Make-bt_field_blob_get_length-return-size_t-instead-.patch \ | ||
14 | " | 16 | " |
15 | SRCREV = "23e8cf4e6fdc1d0b230e964dafac08a57e6228e6" | 17 | SRCREV = "7f2f8cd6dac497cbb466efb31219b531c62013f5" |
16 | UPSTREAM_CHECK_GITTAGREGEX = "v(?P<pver>2(\.\d+)+)$" | 18 | UPSTREAM_CHECK_GITTAGREGEX = "v(?P<pver>2(\.\d+)+)$" |
17 | 19 | ||
18 | S = "${WORKDIR}/git" | ||
19 | |||
20 | inherit autotools pkgconfig ptest python3targetconfig | 20 | inherit autotools pkgconfig ptest python3targetconfig |
21 | 21 | ||
22 | EXTRA_OECONF = "--disable-debug-info" | 22 | EXTRA_OECONF = "--disable-debug-info --disable-Werror" |
23 | 23 | ||
24 | PACKAGECONFIG ??= "manpages" | 24 | PACKAGECONFIG ??= "manpages" |
25 | PACKAGECONFIG[manpages] = ", --disable-man-pages, asciidoc-native xmlto-native" | 25 | PACKAGECONFIG[manpages] = ", --disable-man-pages, asciidoc-native xmlto-native" |
@@ -28,8 +28,19 @@ FILES:${PN}-staticdev += "${libdir}/babeltrace2/plugins/*.a" | |||
28 | FILES:${PN} += "${libdir}/babeltrace2/plugins/*.so" | 28 | FILES:${PN} += "${libdir}/babeltrace2/plugins/*.so" |
29 | 29 | ||
30 | ASNEEDED = "" | 30 | ASNEEDED = "" |
31 | 31 | LDFLAGS += "${@bb.utils.contains('DISTRO_FEATURES', 'ld-is-lld ptest', '-fuse-ld=bfd ', '', d)}" | |
32 | RDEPENDS:${PN}-ptest += "bash gawk python3" | 32 | |
33 | # coreutils since we need full mktemp | ||
34 | RDEPENDS:${PN}-ptest += "bash gawk python3 make grep coreutils findutils" | ||
35 | RDEPENDS:${PN}-ptest:append:libc-glibc = " glibc-gconv-utf-16 glibc-gconv-utf-32" | ||
36 | |||
37 | do_configure:append() { | ||
38 | # when doing cross compile, the path ${B}/src/plugins/ctf/common/src/metadata/tsdl | ||
39 | # is not created by the babeltrace2 build system. It is need when generating | ||
40 | # parser.cpp by executing /bin/bash ../../git/config/ylwrap. | ||
41 | # So make this directory after configuration. | ||
42 | mkdir -p ${B}/src/plugins/ctf/common/src/metadata/tsdl | ||
43 | } | ||
33 | 44 | ||
34 | do_compile_ptest () { | 45 | do_compile_ptest () { |
35 | make -C tests all | 46 | make -C tests all |
@@ -49,6 +60,12 @@ do_install_ptest () { | |||
49 | -exec install -t "${D}${PTEST_PATH}/tests/$d" {} \; | 60 | -exec install -t "${D}${PTEST_PATH}/tests/$d" {} \; |
50 | find "${S}/tests/$d" -maxdepth 1 -name *.expect \ | 61 | find "${S}/tests/$d" -maxdepth 1 -name *.expect \ |
51 | -exec install -t "${D}${PTEST_PATH}/tests/$d" {} \; | 62 | -exec install -t "${D}${PTEST_PATH}/tests/$d" {} \; |
63 | find "${S}/tests/$d" -maxdepth 1 -name *.ref \ | ||
64 | -exec install -t "${D}${PTEST_PATH}/tests/$d" {} \; | ||
65 | find "${S}/tests/$d" -maxdepth 1 -name *.mctf \ | ||
66 | -exec install -t "${D}${PTEST_PATH}/tests/$d" {} \; | ||
67 | find "${S}/tests/$d" -maxdepth 1 -name *.json \ | ||
68 | -exec install -t "${D}${PTEST_PATH}/tests/$d" {} \; | ||
52 | done | 69 | done |
53 | install -d "${D}${PTEST_PATH}/tests/data/ctf-traces/" | 70 | install -d "${D}${PTEST_PATH}/tests/data/ctf-traces/" |
54 | cp -a ${S}/tests/data/ctf-traces/* ${D}${PTEST_PATH}/tests/data/ctf-traces/ | 71 | cp -a ${S}/tests/data/ctf-traces/* ${D}${PTEST_PATH}/tests/data/ctf-traces/ |
@@ -90,4 +107,26 @@ do_install_ptest () { | |||
90 | 107 | ||
91 | # Remove architechture specific testfiles | 108 | # Remove architechture specific testfiles |
92 | rm -rf ${D}${PTEST_PATH}/tests/data/plugins/flt.lttng-utils.debug-info/* | 109 | rm -rf ${D}${PTEST_PATH}/tests/data/plugins/flt.lttng-utils.debug-info/* |
110 | |||
111 | # Set the correct environment variables when running embedded environment | ||
112 | envsh=${D}${PTEST_PATH}/tests/utils/env.sh | ||
113 | sed -i "/BT_TESTS_SRCDIR/c\_set_var_def BT_TESTS_SRCDIR '${PTEST_PATH}/tests'" $envsh | ||
114 | sed -i "/BT_TESTS_BUILDDIR/c\_set_var_def BT_TESTS_BUILDDIR '${PTEST_PATH}/tests'" $envsh | ||
115 | sed -i "/BT_TESTS_AWK_BIN/c\_set_var_def BT_TESTS_AWK_BIN 'gawk'" $envsh | ||
116 | sed -i "/BT_TESTS_GREP_BIN/c\_set_var_def BT_TESTS_GREP_BIN 'grep'" $envsh | ||
117 | sed -i "/BT_TESTS_PYTHON_BIN/c\_set_var_def BT_TESTS_PYTHON_BIN 'python3'" $envsh | ||
118 | sed -i "/BT_TESTS_SED_BIN/c\_set_var_def BT_TESTS_SED_BIN 'sed'" $envsh | ||
119 | sed -i "/BT_TESTS_CC_BIN/c\_set_var_def BT_TESTS_CC_BIN ''" $envsh | ||
120 | } | ||
121 | |||
122 | do_install:append:class-nativesdk() { | ||
123 | mkdir -p ${D}${SDKPATHNATIVE}/environment-setup.d | ||
124 | cat <<- EOF > ${D}${SDKPATHNATIVE}/environment-setup.d/babeltrace2.sh | ||
125 | export BABELTRACE_PLUGIN_PATH="${libdir}/babeltrace2/plugins" | ||
126 | export LIBBABELTRACE2_PLUGIN_PROVIDER_DIR="${libdir}/babeltrace2/plugin-providers" | ||
127 | EOF | ||
93 | } | 128 | } |
129 | |||
130 | FILES:${PN}:append:class-nativesdk = " ${SDKPATHNATIVE}/environment-setup.d/babeltrace2.sh" | ||
131 | |||
132 | BBCLASSEXTEND = "nativesdk" | ||
diff --git a/meta/recipes-kernel/lttng/babeltrace_1.5.8.bb b/meta/recipes-kernel/lttng/babeltrace_1.5.11.bb index 9f8b035128..8ec80167a0 100644 --- a/meta/recipes-kernel/lttng/babeltrace_1.5.8.bb +++ b/meta/recipes-kernel/lttng/babeltrace_1.5.11.bb | |||
@@ -2,26 +2,24 @@ SUMMARY = "Babeltrace - Trace Format Babel Tower" | |||
2 | DESCRIPTION = "Babeltrace provides trace read and write libraries in host side, as well as a trace converter, which used to convert LTTng 2.0 traces into human-readable log." | 2 | DESCRIPTION = "Babeltrace provides trace read and write libraries in host side, as well as a trace converter, which used to convert LTTng 2.0 traces into human-readable log." |
3 | HOMEPAGE = "http://babeltrace.org/" | 3 | HOMEPAGE = "http://babeltrace.org/" |
4 | BUGTRACKER = "https://bugs.lttng.org/projects/babeltrace" | 4 | BUGTRACKER = "https://bugs.lttng.org/projects/babeltrace" |
5 | LICENSE = "MIT & GPLv2 & LGPLv2.1" | 5 | LICENSE = "MIT & GPL-2.0-only & LGPL-2.1-only" |
6 | LIC_FILES_CHKSUM = "file://LICENSE;md5=76ba15dd76a248e1dd526bca0e2125fa" | 6 | LIC_FILES_CHKSUM = "file://LICENSE;md5=76ba15dd76a248e1dd526bca0e2125fa" |
7 | 7 | ||
8 | DEPENDS = "glib-2.0 util-linux popt bison-native flex-native" | 8 | DEPENDS = "glib-2.0 util-linux popt bison-native flex-native" |
9 | 9 | ||
10 | SRC_URI = "git://git.efficios.com/babeltrace.git;branch=stable-1.5 \ | 10 | SRC_URI = "git://git.efficios.com/babeltrace.git;branch=stable-1.5;protocol=https \ |
11 | file://run-ptest \ | 11 | file://run-ptest \ |
12 | " | 12 | " |
13 | SRCREV = "054a54ae10b01a271afc4f19496c041b10fb414c" | 13 | SRCREV = "91c00f70884887ff5c4849a8e3d47e311a22ba9d" |
14 | UPSTREAM_CHECK_GITTAGREGEX = "v(?P<pver>1(\.\d+)+)$" | 14 | UPSTREAM_CHECK_GITTAGREGEX = "v(?P<pver>1(\.\d+)+)$" |
15 | 15 | ||
16 | S = "${WORKDIR}/git" | ||
17 | |||
18 | inherit autotools pkgconfig ptest | 16 | inherit autotools pkgconfig ptest |
19 | 17 | ||
20 | EXTRA_OECONF = "--disable-debug-info" | 18 | EXTRA_OECONF = "--disable-debug-info" |
21 | 19 | ||
22 | ASNEEDED = "" | 20 | ASNEEDED = "" |
23 | 21 | ||
24 | RDEPENDS:${PN}-ptest += "bash gawk" | 22 | RDEPENDS:${PN}-ptest += "bash gawk make" |
25 | 23 | ||
26 | addtask do_patch_ptest_path after do_patch before do_configure | 24 | addtask do_patch_ptest_path after do_patch before do_configure |
27 | do_patch_ptest_path () { | 25 | do_patch_ptest_path () { |
@@ -96,3 +94,5 @@ do_install_ptest () { | |||
96 | sed -i 's:^BTBIN.*:BTBIN=/usr/bin/babeltrace:' ${f} | 94 | sed -i 's:^BTBIN.*:BTBIN=/usr/bin/babeltrace:' ${f} |
97 | done | 95 | done |
98 | } | 96 | } |
97 | |||
98 | BBCLASSEXTEND = "nativesdk" | ||
diff --git a/meta/recipes-kernel/lttng/lttng-modules/0001-fix-cpu-hotplug-Remove-deprecated-CPU-hotplug-functi.patch b/meta/recipes-kernel/lttng/lttng-modules/0001-fix-cpu-hotplug-Remove-deprecated-CPU-hotplug-functi.patch deleted file mode 100644 index 08ad2ddaa8..0000000000 --- a/meta/recipes-kernel/lttng/lttng-modules/0001-fix-cpu-hotplug-Remove-deprecated-CPU-hotplug-functi.patch +++ /dev/null | |||
@@ -1,394 +0,0 @@ | |||
1 | From 8be4c8a38ee1e297578e094a6e4c143ec5259aba Mon Sep 17 00:00:00 2001 | ||
2 | From: Michael Jeanson <mjeanson@efficios.com> | ||
3 | Date: Mon, 13 Sep 2021 12:00:38 -0400 | ||
4 | Subject: [PATCH 1/2] fix: cpu/hotplug: Remove deprecated CPU-hotplug | ||
5 | functions. (v5.15) | ||
6 | |||
7 | The CPU-hotplug functions get|put_online_cpus() were deprecated in v4.13 | ||
8 | and removed in v5.15. | ||
9 | |||
10 | See upstream commits : | ||
11 | |||
12 | commit 8c854303ce0e38e5bbedd725ff39da7e235865d8 | ||
13 | Author: Sebastian Andrzej Siewior <bigeasy@linutronix.de> | ||
14 | Date: Tue Aug 3 16:16:21 2021 +0200 | ||
15 | |||
16 | cpu/hotplug: Remove deprecated CPU-hotplug functions. | ||
17 | |||
18 | No users in tree use the deprecated CPU-hotplug functions anymore. | ||
19 | |||
20 | Remove them. | ||
21 | |||
22 | Introduced in v4.13 : | ||
23 | |||
24 | commit 8f553c498e1772cccb39a114da4a498d22992758 | ||
25 | Author: Thomas Gleixner <tglx@linutronix.de> | ||
26 | Date: Wed May 24 10:15:12 2017 +0200 | ||
27 | |||
28 | cpu/hotplug: Provide cpus_read|write_[un]lock() | ||
29 | |||
30 | The counting 'rwsem' hackery of get|put_online_cpus() is going to be | ||
31 | replaced by percpu rwsem. | ||
32 | |||
33 | Rename the functions to make it clear that it's locking and not some | ||
34 | refcount style interface. These new functions will be used for the | ||
35 | preparatory patches which make the code ready for the percpu rwsem | ||
36 | conversion. | ||
37 | |||
38 | Rename all instances in the cpu hotplug code while at it. | ||
39 | |||
40 | Upstream-Status: Backport [https://git.lttng.org/?p=lttng-modules.git;a=commit;h=ffcc873470121ef1ebb110df3d9038a38d9cb7cb] | ||
41 | |||
42 | Change-Id: I5a37cf5afc075a402b7347989fac637dfa60a1ed | ||
43 | Signed-off-by: Michael Jeanson <mjeanson@efficios.com> | ||
44 | Signed-off-by: Mathieu Desnoyers <mathieu.desnoyers@efficios.com> | ||
45 | --- | ||
46 | include/wrapper/cpu.h | 44 +++++++++++++++++++++++ | ||
47 | src/lib/ringbuffer/ring_buffer_backend.c | 8 ++--- | ||
48 | src/lib/ringbuffer/ring_buffer_frontend.c | 17 ++++----- | ||
49 | src/lib/ringbuffer/ring_buffer_iterator.c | 15 ++++---- | ||
50 | src/lttng-context-perf-counters.c | 11 +++--- | ||
51 | src/lttng-statedump-impl.c | 6 ++-- | ||
52 | 6 files changed, 74 insertions(+), 27 deletions(-) | ||
53 | create mode 100644 include/wrapper/cpu.h | ||
54 | |||
55 | diff --git a/include/wrapper/cpu.h b/include/wrapper/cpu.h | ||
56 | new file mode 100644 | ||
57 | index 00000000..cbee1962 | ||
58 | --- /dev/null | ||
59 | +++ b/include/wrapper/cpu.h | ||
60 | @@ -0,0 +1,44 @@ | ||
61 | +/* SPDX-License-Identifier: (GPL-2.0-only or LGPL-2.1-only) | ||
62 | + * | ||
63 | + * wrapper/cpu.h | ||
64 | + * | ||
65 | + * Copyright (C) 2021 Michael Jeanson <mjeanson@efficios.com> | ||
66 | + */ | ||
67 | + | ||
68 | +#ifndef _LTTNG_WRAPPER_CPU_H | ||
69 | +#define _LTTNG_WRAPPER_CPU_H | ||
70 | + | ||
71 | +#include <linux/cpu.h> | ||
72 | +#include <lttng/kernel-version.h> | ||
73 | + | ||
74 | +#if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(4,13,0)) | ||
75 | + | ||
76 | +static inline | ||
77 | +void lttng_cpus_read_lock(void) | ||
78 | +{ | ||
79 | + cpus_read_lock(); | ||
80 | +} | ||
81 | + | ||
82 | +static inline | ||
83 | +void lttng_cpus_read_unlock(void) | ||
84 | +{ | ||
85 | + cpus_read_unlock(); | ||
86 | +} | ||
87 | + | ||
88 | +#else /* LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(4,13,0) */ | ||
89 | + | ||
90 | +static inline | ||
91 | +void lttng_cpus_read_lock(void) | ||
92 | +{ | ||
93 | + get_online_cpus(); | ||
94 | +} | ||
95 | + | ||
96 | +static inline | ||
97 | +void lttng_cpus_read_unlock(void) | ||
98 | +{ | ||
99 | + put_online_cpus(); | ||
100 | +} | ||
101 | + | ||
102 | +#endif /* LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(4,13,0) */ | ||
103 | + | ||
104 | +#endif /* _LTTNG_WRAPPER_CPU_H */ | ||
105 | diff --git a/src/lib/ringbuffer/ring_buffer_backend.c b/src/lib/ringbuffer/ring_buffer_backend.c | ||
106 | index 26efb2bc..9a339be0 100644 | ||
107 | --- a/src/lib/ringbuffer/ring_buffer_backend.c | ||
108 | +++ b/src/lib/ringbuffer/ring_buffer_backend.c | ||
109 | @@ -12,10 +12,10 @@ | ||
110 | #include <linux/delay.h> | ||
111 | #include <linux/errno.h> | ||
112 | #include <linux/slab.h> | ||
113 | -#include <linux/cpu.h> | ||
114 | #include <linux/mm.h> | ||
115 | #include <linux/vmalloc.h> | ||
116 | |||
117 | +#include <wrapper/cpu.h> | ||
118 | #include <wrapper/mm.h> | ||
119 | #include <wrapper/vmalloc.h> /* for wrapper_vmalloc_sync_mappings() */ | ||
120 | #include <ringbuffer/config.h> | ||
121 | @@ -445,14 +445,14 @@ int channel_backend_init(struct channel_backend *chanb, | ||
122 | chanb->cpu_hp_notifier.priority = 5; | ||
123 | register_hotcpu_notifier(&chanb->cpu_hp_notifier); | ||
124 | |||
125 | - get_online_cpus(); | ||
126 | + lttng_cpus_read_lock(); | ||
127 | for_each_online_cpu(i) { | ||
128 | ret = lib_ring_buffer_create(per_cpu_ptr(chanb->buf, i), | ||
129 | chanb, i); | ||
130 | if (ret) | ||
131 | goto free_bufs; /* cpu hotplug locked */ | ||
132 | } | ||
133 | - put_online_cpus(); | ||
134 | + lttng_cpus_read_unlock(); | ||
135 | #else | ||
136 | for_each_possible_cpu(i) { | ||
137 | ret = lib_ring_buffer_create(per_cpu_ptr(chanb->buf, i), | ||
138 | @@ -485,7 +485,7 @@ free_bufs: | ||
139 | */ | ||
140 | #else /* #if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(4,10,0)) */ | ||
141 | #ifdef CONFIG_HOTPLUG_CPU | ||
142 | - put_online_cpus(); | ||
143 | + lttng_cpus_read_unlock(); | ||
144 | unregister_hotcpu_notifier(&chanb->cpu_hp_notifier); | ||
145 | #endif | ||
146 | #endif /* #else #if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(4,10,0)) */ | ||
147 | diff --git a/src/lib/ringbuffer/ring_buffer_frontend.c b/src/lib/ringbuffer/ring_buffer_frontend.c | ||
148 | index e9056118..87a575d0 100644 | ||
149 | --- a/src/lib/ringbuffer/ring_buffer_frontend.c | ||
150 | +++ b/src/lib/ringbuffer/ring_buffer_frontend.c | ||
151 | @@ -48,6 +48,7 @@ | ||
152 | #include <ringbuffer/iterator.h> | ||
153 | #include <ringbuffer/nohz.h> | ||
154 | #include <wrapper/atomic.h> | ||
155 | +#include <wrapper/cpu.h> | ||
156 | #include <wrapper/kref.h> | ||
157 | #include <wrapper/percpu-defs.h> | ||
158 | #include <wrapper/timer.h> | ||
159 | @@ -724,7 +725,7 @@ static void channel_unregister_notifiers(struct lttng_kernel_ring_buffer_channel | ||
160 | int cpu; | ||
161 | |||
162 | #ifdef CONFIG_HOTPLUG_CPU | ||
163 | - get_online_cpus(); | ||
164 | + lttng_cpus_read_lock(); | ||
165 | chan->cpu_hp_enable = 0; | ||
166 | for_each_online_cpu(cpu) { | ||
167 | struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.buf, | ||
168 | @@ -732,7 +733,7 @@ static void channel_unregister_notifiers(struct lttng_kernel_ring_buffer_channel | ||
169 | lib_ring_buffer_stop_switch_timer(buf); | ||
170 | lib_ring_buffer_stop_read_timer(buf); | ||
171 | } | ||
172 | - put_online_cpus(); | ||
173 | + lttng_cpus_read_unlock(); | ||
174 | unregister_cpu_notifier(&chan->cpu_hp_notifier); | ||
175 | #else | ||
176 | for_each_possible_cpu(cpu) { | ||
177 | @@ -772,14 +773,14 @@ void lib_ring_buffer_set_quiescent_channel(struct lttng_kernel_ring_buffer_chann | ||
178 | const struct lttng_kernel_ring_buffer_config *config = &chan->backend.config; | ||
179 | |||
180 | if (config->alloc == RING_BUFFER_ALLOC_PER_CPU) { | ||
181 | - get_online_cpus(); | ||
182 | + lttng_cpus_read_lock(); | ||
183 | for_each_channel_cpu(cpu, chan) { | ||
184 | struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.buf, | ||
185 | cpu); | ||
186 | |||
187 | lib_ring_buffer_set_quiescent(buf); | ||
188 | } | ||
189 | - put_online_cpus(); | ||
190 | + lttng_cpus_read_unlock(); | ||
191 | } else { | ||
192 | struct lttng_kernel_ring_buffer *buf = chan->backend.buf; | ||
193 | |||
194 | @@ -794,14 +795,14 @@ void lib_ring_buffer_clear_quiescent_channel(struct lttng_kernel_ring_buffer_cha | ||
195 | const struct lttng_kernel_ring_buffer_config *config = &chan->backend.config; | ||
196 | |||
197 | if (config->alloc == RING_BUFFER_ALLOC_PER_CPU) { | ||
198 | - get_online_cpus(); | ||
199 | + lttng_cpus_read_lock(); | ||
200 | for_each_channel_cpu(cpu, chan) { | ||
201 | struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.buf, | ||
202 | cpu); | ||
203 | |||
204 | lib_ring_buffer_clear_quiescent(buf); | ||
205 | } | ||
206 | - put_online_cpus(); | ||
207 | + lttng_cpus_read_unlock(); | ||
208 | } else { | ||
209 | struct lttng_kernel_ring_buffer *buf = chan->backend.buf; | ||
210 | |||
211 | @@ -899,7 +900,7 @@ struct lttng_kernel_ring_buffer_channel *channel_create(const struct lttng_kerne | ||
212 | chan->cpu_hp_notifier.priority = 6; | ||
213 | register_cpu_notifier(&chan->cpu_hp_notifier); | ||
214 | |||
215 | - get_online_cpus(); | ||
216 | + lttng_cpus_read_lock(); | ||
217 | for_each_online_cpu(cpu) { | ||
218 | struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.buf, | ||
219 | cpu); | ||
220 | @@ -909,7 +910,7 @@ struct lttng_kernel_ring_buffer_channel *channel_create(const struct lttng_kerne | ||
221 | spin_unlock(&per_cpu(ring_buffer_nohz_lock, cpu)); | ||
222 | } | ||
223 | chan->cpu_hp_enable = 1; | ||
224 | - put_online_cpus(); | ||
225 | + lttng_cpus_read_unlock(); | ||
226 | #else | ||
227 | for_each_possible_cpu(cpu) { | ||
228 | struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.buf, | ||
229 | diff --git a/src/lib/ringbuffer/ring_buffer_iterator.c b/src/lib/ringbuffer/ring_buffer_iterator.c | ||
230 | index 25839af6..60c95ca6 100644 | ||
231 | --- a/src/lib/ringbuffer/ring_buffer_iterator.c | ||
232 | +++ b/src/lib/ringbuffer/ring_buffer_iterator.c | ||
233 | @@ -10,6 +10,7 @@ | ||
234 | */ | ||
235 | |||
236 | #include <ringbuffer/iterator.h> | ||
237 | +#include <wrapper/cpu.h> | ||
238 | #include <wrapper/file.h> | ||
239 | #include <wrapper/uaccess.h> | ||
240 | #include <linux/jiffies.h> | ||
241 | @@ -440,13 +441,13 @@ int channel_iterator_init(struct lttng_kernel_ring_buffer_channel *chan) | ||
242 | chan->hp_iter_notifier.priority = 10; | ||
243 | register_cpu_notifier(&chan->hp_iter_notifier); | ||
244 | |||
245 | - get_online_cpus(); | ||
246 | + lttng_cpus_read_lock(); | ||
247 | for_each_online_cpu(cpu) { | ||
248 | buf = per_cpu_ptr(chan->backend.buf, cpu); | ||
249 | lib_ring_buffer_iterator_init(chan, buf); | ||
250 | } | ||
251 | chan->hp_iter_enable = 1; | ||
252 | - put_online_cpus(); | ||
253 | + lttng_cpus_read_unlock(); | ||
254 | #else | ||
255 | for_each_possible_cpu(cpu) { | ||
256 | buf = per_cpu_ptr(chan->backend.buf, cpu); | ||
257 | @@ -519,7 +520,7 @@ int channel_iterator_open(struct lttng_kernel_ring_buffer_channel *chan) | ||
258 | CHAN_WARN_ON(chan, config->output != RING_BUFFER_ITERATOR); | ||
259 | |||
260 | if (config->alloc == RING_BUFFER_ALLOC_PER_CPU) { | ||
261 | - get_online_cpus(); | ||
262 | + lttng_cpus_read_lock(); | ||
263 | /* Allow CPU hotplug to keep track of opened reader */ | ||
264 | chan->iter.read_open = 1; | ||
265 | for_each_channel_cpu(cpu, chan) { | ||
266 | @@ -529,7 +530,7 @@ int channel_iterator_open(struct lttng_kernel_ring_buffer_channel *chan) | ||
267 | goto error; | ||
268 | buf->iter.read_open = 1; | ||
269 | } | ||
270 | - put_online_cpus(); | ||
271 | + lttng_cpus_read_unlock(); | ||
272 | } else { | ||
273 | buf = channel_get_ring_buffer(config, chan, 0); | ||
274 | ret = lib_ring_buffer_iterator_open(buf); | ||
275 | @@ -538,7 +539,7 @@ int channel_iterator_open(struct lttng_kernel_ring_buffer_channel *chan) | ||
276 | error: | ||
277 | /* Error should always happen on CPU 0, hence no close is required. */ | ||
278 | CHAN_WARN_ON(chan, cpu != 0); | ||
279 | - put_online_cpus(); | ||
280 | + lttng_cpus_read_unlock(); | ||
281 | return ret; | ||
282 | } | ||
283 | EXPORT_SYMBOL_GPL(channel_iterator_open); | ||
284 | @@ -550,7 +551,7 @@ void channel_iterator_release(struct lttng_kernel_ring_buffer_channel *chan) | ||
285 | int cpu; | ||
286 | |||
287 | if (config->alloc == RING_BUFFER_ALLOC_PER_CPU) { | ||
288 | - get_online_cpus(); | ||
289 | + lttng_cpus_read_lock(); | ||
290 | for_each_channel_cpu(cpu, chan) { | ||
291 | buf = channel_get_ring_buffer(config, chan, cpu); | ||
292 | if (buf->iter.read_open) { | ||
293 | @@ -559,7 +560,7 @@ void channel_iterator_release(struct lttng_kernel_ring_buffer_channel *chan) | ||
294 | } | ||
295 | } | ||
296 | chan->iter.read_open = 0; | ||
297 | - put_online_cpus(); | ||
298 | + lttng_cpus_read_unlock(); | ||
299 | } else { | ||
300 | buf = channel_get_ring_buffer(config, chan, 0); | ||
301 | lib_ring_buffer_iterator_release(buf); | ||
302 | diff --git a/src/lttng-context-perf-counters.c b/src/lttng-context-perf-counters.c | ||
303 | index b0227d47..372f05e0 100644 | ||
304 | --- a/src/lttng-context-perf-counters.c | ||
305 | +++ b/src/lttng-context-perf-counters.c | ||
306 | @@ -16,6 +16,7 @@ | ||
307 | #include <lttng/events.h> | ||
308 | #include <lttng/events-internal.h> | ||
309 | #include <ringbuffer/frontend_types.h> | ||
310 | +#include <wrapper/cpu.h> | ||
311 | #include <wrapper/vmalloc.h> | ||
312 | #include <wrapper/perf.h> | ||
313 | #include <lttng/tracer.h> | ||
314 | @@ -97,10 +98,10 @@ void lttng_destroy_perf_counter_ctx_field(void *priv) | ||
315 | { | ||
316 | int cpu; | ||
317 | |||
318 | - get_online_cpus(); | ||
319 | + lttng_cpus_read_lock(); | ||
320 | for_each_online_cpu(cpu) | ||
321 | perf_event_release_kernel(events[cpu]); | ||
322 | - put_online_cpus(); | ||
323 | + lttng_cpus_read_unlock(); | ||
324 | #ifdef CONFIG_HOTPLUG_CPU | ||
325 | unregister_cpu_notifier(&perf_field->nb); | ||
326 | #endif | ||
327 | @@ -304,7 +305,7 @@ int lttng_add_perf_counter_to_ctx(uint32_t type, | ||
328 | perf_field->nb.priority = 0; | ||
329 | register_cpu_notifier(&perf_field->nb); | ||
330 | #endif | ||
331 | - get_online_cpus(); | ||
332 | + lttng_cpus_read_lock(); | ||
333 | for_each_online_cpu(cpu) { | ||
334 | events[cpu] = wrapper_perf_event_create_kernel_counter(attr, | ||
335 | cpu, NULL, overflow_callback); | ||
336 | @@ -317,7 +318,7 @@ int lttng_add_perf_counter_to_ctx(uint32_t type, | ||
337 | goto counter_busy; | ||
338 | } | ||
339 | } | ||
340 | - put_online_cpus(); | ||
341 | + lttng_cpus_read_unlock(); | ||
342 | perf_field->hp_enable = 1; | ||
343 | } | ||
344 | #endif /* #else #if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(4,10,0)) */ | ||
345 | @@ -351,7 +352,7 @@ counter_error: | ||
346 | if (events[cpu] && !IS_ERR(events[cpu])) | ||
347 | perf_event_release_kernel(events[cpu]); | ||
348 | } | ||
349 | - put_online_cpus(); | ||
350 | + lttng_cpus_read_unlock(); | ||
351 | #ifdef CONFIG_HOTPLUG_CPU | ||
352 | unregister_cpu_notifier(&perf_field->nb); | ||
353 | #endif | ||
354 | diff --git a/src/lttng-statedump-impl.c b/src/lttng-statedump-impl.c | ||
355 | index 4dfbca0b..2b42783a 100644 | ||
356 | --- a/src/lttng-statedump-impl.c | ||
357 | +++ b/src/lttng-statedump-impl.c | ||
358 | @@ -23,7 +23,6 @@ | ||
359 | #include <linux/file.h> | ||
360 | #include <linux/interrupt.h> | ||
361 | #include <linux/irqnr.h> | ||
362 | -#include <linux/cpu.h> | ||
363 | #include <linux/netdevice.h> | ||
364 | #include <linux/inetdevice.h> | ||
365 | #include <linux/mm.h> | ||
366 | @@ -34,6 +33,7 @@ | ||
367 | |||
368 | #include <lttng/events.h> | ||
369 | #include <lttng/tracer.h> | ||
370 | +#include <wrapper/cpu.h> | ||
371 | #include <wrapper/irqdesc.h> | ||
372 | #include <wrapper/fdtable.h> | ||
373 | #include <wrapper/namespace.h> | ||
374 | @@ -770,7 +770,7 @@ int do_lttng_statedump(struct lttng_kernel_session *session) | ||
375 | * is to guarantee that each CPU has been in a state where is was in | ||
376 | * syscall mode (i.e. not in a trap, an IRQ or a soft IRQ). | ||
377 | */ | ||
378 | - get_online_cpus(); | ||
379 | + lttng_cpus_read_lock(); | ||
380 | atomic_set(&kernel_threads_to_run, num_online_cpus()); | ||
381 | for_each_online_cpu(cpu) { | ||
382 | INIT_DELAYED_WORK(&cpu_work[cpu], lttng_statedump_work_func); | ||
383 | @@ -778,7 +778,7 @@ int do_lttng_statedump(struct lttng_kernel_session *session) | ||
384 | } | ||
385 | /* Wait for all threads to run */ | ||
386 | __wait_event(statedump_wq, (atomic_read(&kernel_threads_to_run) == 0)); | ||
387 | - put_online_cpus(); | ||
388 | + lttng_cpus_read_unlock(); | ||
389 | /* Our work is done */ | ||
390 | trace_lttng_statedump_end(session); | ||
391 | return 0; | ||
392 | -- | ||
393 | 2.19.1 | ||
394 | |||
diff --git a/meta/recipes-kernel/lttng/lttng-modules/0001-lttng-modules-fix-sigaction-build-without-CONFIG_COM.patch b/meta/recipes-kernel/lttng/lttng-modules/0001-lttng-modules-fix-sigaction-build-without-CONFIG_COM.patch new file mode 100644 index 0000000000..eb43abbae2 --- /dev/null +++ b/meta/recipes-kernel/lttng/lttng-modules/0001-lttng-modules-fix-sigaction-build-without-CONFIG_COM.patch | |||
@@ -0,0 +1,35 @@ | |||
1 | From 0e2095bcc50e7a07d3478f8d3c0ae5ad46575594 Mon Sep 17 00:00:00 2001 | ||
2 | From: Mikko Rapeli <mikko.rapeli@linaro.org> | ||
3 | Date: Mon, 28 Apr 2025 12:07:24 +0000 | ||
4 | Subject: [PATCH] lttng-modules: fix sigaction build without | ||
5 | CONFIG_COMPAT_OLD_SIGACTION | ||
6 | |||
7 | Workaround build failure when CONFIG_COMPAT_OLD_SIGACTION is not enabled | ||
8 | in kernel config. | ||
9 | |||
10 | Upstream-Status: Submitted [https://bugs.lttng.org/issues/1426] | ||
11 | |||
12 | Signed-off-by: Mikko Rapeli <mikko.rapeli@linaro.org> | ||
13 | --- | ||
14 | .../instrumentation/syscalls/headers/arm-32-syscalls_pointers.h | 2 ++ | ||
15 | 1 file changed, 2 insertions(+) | ||
16 | |||
17 | diff --git a/include/instrumentation/syscalls/headers/arm-32-syscalls_pointers.h b/include/instrumentation/syscalls/headers/arm-32-syscalls_pointers.h | ||
18 | index 5f4ca5b..1514cae 100644 | ||
19 | --- a/include/instrumentation/syscalls/headers/arm-32-syscalls_pointers.h | ||
20 | +++ b/include/instrumentation/syscalls/headers/arm-32-syscalls_pointers.h | ||
21 | @@ -1890,9 +1890,11 @@ TRACE_SYSCALL_TABLE(chroot, chroot, 61, 1) | ||
22 | #ifndef OVERRIDE_TABLE_32_ustat | ||
23 | TRACE_SYSCALL_TABLE(ustat, ustat, 62, 2) | ||
24 | #endif | ||
25 | +#ifdef CONFIG_COMPAT_OLD_SIGACTION | ||
26 | #ifndef OVERRIDE_TABLE_32_sigaction | ||
27 | TRACE_SYSCALL_TABLE(sigaction, sigaction, 67, 3) | ||
28 | #endif | ||
29 | +#endif /* CONFIG_COMPAT_OLD_SIGACTION */ | ||
30 | #ifndef OVERRIDE_TABLE_32_sigpending | ||
31 | TRACE_SYSCALL_TABLE(sigpending, sigpending, 73, 1) | ||
32 | #endif | ||
33 | -- | ||
34 | 2.49.0 | ||
35 | |||
diff --git a/meta/recipes-kernel/lttng/lttng-modules/0001-src-Kbuild-change-missing-CONFIG_TRACEPOINTS-to-warn.patch b/meta/recipes-kernel/lttng/lttng-modules/0001-src-Kbuild-change-missing-CONFIG_TRACEPOINTS-to-warn.patch index 76a5787c37..4911982461 100644 --- a/meta/recipes-kernel/lttng/lttng-modules/0001-src-Kbuild-change-missing-CONFIG_TRACEPOINTS-to-warn.patch +++ b/meta/recipes-kernel/lttng/lttng-modules/0001-src-Kbuild-change-missing-CONFIG_TRACEPOINTS-to-warn.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 878f89b6136ff7b870a19e04901cc6f316bbe10a Mon Sep 17 00:00:00 2001 | 1 | From 60d423945bd4f4c4b7bfc6f29da9231152d05690 Mon Sep 17 00:00:00 2001 |
2 | From: Bruce Ashfield <bruce.ashfield@gmail.com> | 2 | From: Bruce Ashfield <bruce.ashfield@gmail.com> |
3 | Date: Sat, 15 May 2021 10:26:38 -0400 | 3 | Date: Sat, 15 May 2021 10:26:38 -0400 |
4 | Subject: [PATCH] src/Kbuild: change missing CONFIG_TRACEPOINTS to warning | 4 | Subject: [PATCH] src/Kbuild: change missing CONFIG_TRACEPOINTS to warning |
diff --git a/meta/recipes-kernel/lttng/lttng-modules/0002-fix-Revert-Makefile-Enable-Wimplicit-fallthrough-for.patch b/meta/recipes-kernel/lttng/lttng-modules/0002-fix-Revert-Makefile-Enable-Wimplicit-fallthrough-for.patch deleted file mode 100644 index 14185efa40..0000000000 --- a/meta/recipes-kernel/lttng/lttng-modules/0002-fix-Revert-Makefile-Enable-Wimplicit-fallthrough-for.patch +++ /dev/null | |||
@@ -1,829 +0,0 @@ | |||
1 | From c570be0da77e963d77bac099d468bc0cd5f1bd63 Mon Sep 17 00:00:00 2001 | ||
2 | From: Michael Jeanson <mjeanson@efficios.com> | ||
3 | Date: Mon, 13 Sep 2021 14:16:22 -0400 | ||
4 | Subject: [PATCH 2/2] fix: Revert "Makefile: Enable -Wimplicit-fallthrough for | ||
5 | Clang" (v5.15) | ||
6 | MIME-Version: 1.0 | ||
7 | Content-Type: text/plain; charset=UTF-8 | ||
8 | Content-Transfer-Encoding: 8bit | ||
9 | |||
10 | Starting with v5.15, "-Wimplicit-fallthrough=5" was added to the build | ||
11 | flags which requires the use of "__attribute__((__fallthrough__))" to | ||
12 | annotate fallthrough case statements. | ||
13 | |||
14 | See upstream commit by the man himself: | ||
15 | |||
16 | commit d936eb23874433caa3e3d841cfa16f5434b85dcf | ||
17 | Author: Linus Torvalds <torvalds@linux-foundation.org> | ||
18 | Date: Thu Jul 15 18:05:31 2021 -0700 | ||
19 | |||
20 | Revert "Makefile: Enable -Wimplicit-fallthrough for Clang" | ||
21 | |||
22 | This reverts commit b7eb335e26a9c7f258c96b3962c283c379d3ede0. | ||
23 | |||
24 | It turns out that the problem with the clang -Wimplicit-fallthrough | ||
25 | warning is not about the kernel source code, but about clang itself, and | ||
26 | that the warning is unusable until clang fixes its broken ways. | ||
27 | |||
28 | In particular, when you enable this warning for clang, you not only get | ||
29 | warnings about implicit fallthroughs. You also get this: | ||
30 | |||
31 | warning: fallthrough annotation in unreachable code [-Wimplicit-fallthrough] | ||
32 | |||
33 | which is completely broken becasue it | ||
34 | |||
35 | (a) doesn't even tell you where the problem is (seriously: no line | ||
36 | numbers, no filename, no nothing). | ||
37 | |||
38 | (b) is fundamentally broken anyway, because there are perfectly valid | ||
39 | reasons to have a fallthrough statement even if it turns out that | ||
40 | it can perhaps not be reached. | ||
41 | |||
42 | In the kernel, an example of that second case is code in the scheduler: | ||
43 | |||
44 | switch (state) { | ||
45 | case cpuset: | ||
46 | if (IS_ENABLED(CONFIG_CPUSETS)) { | ||
47 | cpuset_cpus_allowed_fallback(p); | ||
48 | state = possible; | ||
49 | break; | ||
50 | } | ||
51 | fallthrough; | ||
52 | case possible: | ||
53 | |||
54 | where if CONFIG_CPUSETS is enabled you actually never hit the | ||
55 | fallthrough case at all. But that in no way makes the fallthrough | ||
56 | wrong. | ||
57 | |||
58 | So the warning is completely broken, and enabling it for clang is a very | ||
59 | bad idea. | ||
60 | |||
61 | In the meantime, we can keep the gcc option enabled, and make the gcc | ||
62 | build use | ||
63 | |||
64 | -Wimplicit-fallthrough=5 | ||
65 | |||
66 | which means that we will at least continue to require a proper | ||
67 | fallthrough statement, and that gcc won't silently accept the magic | ||
68 | comment versions. Because gcc does this all correctly, and while the odd | ||
69 | "=5" part is kind of obscure, it's documented in [1]: | ||
70 | |||
71 | "-Wimplicit-fallthrough=5 doesn’t recognize any comments as | ||
72 | fallthrough comments, only attributes disable the warning" | ||
73 | |||
74 | so if clang ever fixes its bad behavior we can try enabling it there again. | ||
75 | |||
76 | Upstream-Status: Backport [https://git.lttng.org/?p=lttng-modules.git;a=commit;h=c190d76e8c7b44d62b3651ab845b765c1b1f8104] | ||
77 | |||
78 | Change-Id: Iea69849592fb69ac04fb9bb28efcd6b8dce8ba88 | ||
79 | Signed-off-by: Michael Jeanson <mjeanson@efficios.com> | ||
80 | Signed-off-by: Mathieu Desnoyers <mathieu.desnoyers@efficios.com> | ||
81 | --- | ||
82 | include/counter/counter-api.h | 4 +- | ||
83 | include/lttng/events-internal.h | 11 ++- | ||
84 | include/wrapper/compiler_attributes.h | 34 +++++++ | ||
85 | src/lib/counter/counter.c | 13 ++- | ||
86 | src/lttng-abi.c | 91 ++++++++++++------ | ||
87 | src/lttng-bytecode-interpreter.c | 4 +- | ||
88 | src/lttng-bytecode-specialize.c | 5 +- | ||
89 | src/lttng-events.c | 129 +++++++++++++++++--------- | ||
90 | src/lttng-string-utils.c | 3 +- | ||
91 | src/probes/lttng-kretprobes.c | 7 +- | ||
92 | 10 files changed, 215 insertions(+), 86 deletions(-) | ||
93 | create mode 100644 include/wrapper/compiler_attributes.h | ||
94 | |||
95 | diff --git a/include/counter/counter-api.h b/include/counter/counter-api.h | ||
96 | index fbc65818..c9f2b141 100644 | ||
97 | --- a/include/counter/counter-api.h | ||
98 | +++ b/include/counter/counter-api.h | ||
99 | @@ -15,6 +15,7 @@ | ||
100 | #include <linux/bitops.h> | ||
101 | #include <counter/counter.h> | ||
102 | #include <counter/counter-internal.h> | ||
103 | +#include <wrapper/compiler_attributes.h> | ||
104 | #include <wrapper/limits.h> | ||
105 | |||
106 | /* | ||
107 | @@ -256,7 +257,8 @@ static __always_inline int lttng_counter_add(const struct lib_counter_config *co | ||
108 | const size_t *dimension_indexes, int64_t v) | ||
109 | { | ||
110 | switch (config->alloc) { | ||
111 | - case COUNTER_ALLOC_PER_CPU: /* Fallthrough */ | ||
112 | + case COUNTER_ALLOC_PER_CPU: | ||
113 | + lttng_fallthrough; | ||
114 | case COUNTER_ALLOC_PER_CPU | COUNTER_ALLOC_GLOBAL: | ||
115 | return __lttng_counter_add_percpu(config, counter, dimension_indexes, v); | ||
116 | case COUNTER_ALLOC_GLOBAL: | ||
117 | diff --git a/include/lttng/events-internal.h b/include/lttng/events-internal.h | ||
118 | index cd560de8..ca2190c4 100644 | ||
119 | --- a/include/lttng/events-internal.h | ||
120 | +++ b/include/lttng/events-internal.h | ||
121 | @@ -8,6 +8,8 @@ | ||
122 | #ifndef _LTTNG_EVENTS_INTERNAL_H | ||
123 | #define _LTTNG_EVENTS_INTERNAL_H | ||
124 | |||
125 | +#include <wrapper/compiler_attributes.h> | ||
126 | + | ||
127 | #include <lttng/events.h> | ||
128 | |||
129 | struct lttng_syscall_filter; | ||
130 | @@ -561,9 +563,12 @@ static inline bool lttng_kernel_type_is_bytewise_integer(const struct lttng_kern | ||
131 | if (!type_integer) | ||
132 | return false; | ||
133 | switch (type_integer->size) { | ||
134 | - case 8: /* Fall-through. */ | ||
135 | - case 16: /* Fall-through. */ | ||
136 | - case 32: /* Fall-through. */ | ||
137 | + case 8: | ||
138 | + lttng_fallthrough; | ||
139 | + case 16: | ||
140 | + lttng_fallthrough; | ||
141 | + case 32: | ||
142 | + lttng_fallthrough; | ||
143 | case 64: | ||
144 | break; | ||
145 | default: | ||
146 | diff --git a/include/wrapper/compiler_attributes.h b/include/wrapper/compiler_attributes.h | ||
147 | new file mode 100644 | ||
148 | index 00000000..c2c96e76 | ||
149 | --- /dev/null | ||
150 | +++ b/include/wrapper/compiler_attributes.h | ||
151 | @@ -0,0 +1,34 @@ | ||
152 | +/* SPDX-License-Identifier: (GPL-2.0-only or LGPL-2.1-only) | ||
153 | + * | ||
154 | + * wrapper/compiler_attributes.h | ||
155 | + * | ||
156 | + * Copyright (C) 2021 Michael Jeanson <mjeanson@efficios.com> | ||
157 | + */ | ||
158 | + | ||
159 | +#ifndef _LTTNG_WRAPPER_COMPILER_ATTRIBUTES_H | ||
160 | +#define _LTTNG_WRAPPER_COMPILER_ATTRIBUTES_H | ||
161 | + | ||
162 | +#include <lttng/kernel-version.h> | ||
163 | + | ||
164 | +#if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(4,20,0)) | ||
165 | +#include <linux/compiler_attributes.h> | ||
166 | +#endif | ||
167 | + | ||
168 | +#if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(5,4,0)) | ||
169 | + | ||
170 | +/* | ||
171 | + * Use the kernel provided fallthrough attribute macro. | ||
172 | + */ | ||
173 | +#define lttng_fallthrough fallthrough | ||
174 | + | ||
175 | +#else /* LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(5,4,0) */ | ||
176 | + | ||
177 | +/* | ||
178 | + * Fallback to the comment for kernels pre 5.15 that don't build with | ||
179 | + * '-Wimplicit-fallthrough=5'. | ||
180 | + */ | ||
181 | +#define lttng_fallthrough do {} while (0) /* fallthrough */ | ||
182 | + | ||
183 | +#endif /* LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(5,4,0) */ | ||
184 | + | ||
185 | +#endif /* _LTTNG_WRAPPER_COMPILER_ATTRIBUTES_H */ | ||
186 | diff --git a/src/lib/counter/counter.c b/src/lib/counter/counter.c | ||
187 | index a4500a0e..bf038aac 100644 | ||
188 | --- a/src/lib/counter/counter.c | ||
189 | +++ b/src/lib/counter/counter.c | ||
190 | @@ -11,6 +11,7 @@ | ||
191 | #include <linux/cpumask.h> | ||
192 | #include <counter/counter.h> | ||
193 | #include <counter/counter-internal.h> | ||
194 | +#include <wrapper/compiler_attributes.h> | ||
195 | #include <wrapper/vmalloc.h> | ||
196 | #include <wrapper/limits.h> | ||
197 | |||
198 | @@ -324,7 +325,8 @@ int lttng_counter_aggregate(const struct lib_counter_config *config, | ||
199 | *underflow = false; | ||
200 | |||
201 | switch (config->alloc) { | ||
202 | - case COUNTER_ALLOC_GLOBAL: /* Fallthrough */ | ||
203 | + case COUNTER_ALLOC_GLOBAL: | ||
204 | + lttng_fallthrough; | ||
205 | case COUNTER_ALLOC_PER_CPU | COUNTER_ALLOC_GLOBAL: | ||
206 | /* Read global counter. */ | ||
207 | ret = lttng_counter_read(config, counter, dimension_indexes, | ||
208 | @@ -342,7 +344,8 @@ int lttng_counter_aggregate(const struct lib_counter_config *config, | ||
209 | switch (config->alloc) { | ||
210 | case COUNTER_ALLOC_GLOBAL: | ||
211 | break; | ||
212 | - case COUNTER_ALLOC_PER_CPU | COUNTER_ALLOC_GLOBAL: /* Fallthrough */ | ||
213 | + case COUNTER_ALLOC_PER_CPU | COUNTER_ALLOC_GLOBAL: | ||
214 | + lttng_fallthrough; | ||
215 | case COUNTER_ALLOC_PER_CPU: | ||
216 | //TODO: integrate with CPU hotplug and online cpus | ||
217 | for (cpu = 0; cpu < num_possible_cpus(); cpu++) { | ||
218 | @@ -448,7 +451,8 @@ int lttng_counter_clear(const struct lib_counter_config *config, | ||
219 | int cpu, ret; | ||
220 | |||
221 | switch (config->alloc) { | ||
222 | - case COUNTER_ALLOC_GLOBAL: /* Fallthrough */ | ||
223 | + case COUNTER_ALLOC_GLOBAL: | ||
224 | + lttng_fallthrough; | ||
225 | case COUNTER_ALLOC_PER_CPU | COUNTER_ALLOC_GLOBAL: | ||
226 | /* Clear global counter. */ | ||
227 | ret = lttng_counter_clear_cpu(config, counter, dimension_indexes, -1); | ||
228 | @@ -462,7 +466,8 @@ int lttng_counter_clear(const struct lib_counter_config *config, | ||
229 | switch (config->alloc) { | ||
230 | case COUNTER_ALLOC_GLOBAL: | ||
231 | break; | ||
232 | - case COUNTER_ALLOC_PER_CPU | COUNTER_ALLOC_GLOBAL: /* Fallthrough */ | ||
233 | + case COUNTER_ALLOC_PER_CPU | COUNTER_ALLOC_GLOBAL: | ||
234 | + lttng_fallthrough; | ||
235 | case COUNTER_ALLOC_PER_CPU: | ||
236 | //TODO: integrate with CPU hotplug and online cpus | ||
237 | for (cpu = 0; cpu < num_possible_cpus(); cpu++) { | ||
238 | diff --git a/src/lttng-abi.c b/src/lttng-abi.c | ||
239 | index cc453894..eac1afd1 100644 | ||
240 | --- a/src/lttng-abi.c | ||
241 | +++ b/src/lttng-abi.c | ||
242 | @@ -34,6 +34,7 @@ | ||
243 | #include <ringbuffer/vfs.h> | ||
244 | #include <ringbuffer/backend.h> | ||
245 | #include <ringbuffer/frontend.h> | ||
246 | +#include <wrapper/compiler_attributes.h> | ||
247 | #include <wrapper/poll.h> | ||
248 | #include <wrapper/file.h> | ||
249 | #include <wrapper/kref.h> | ||
250 | @@ -1332,7 +1333,8 @@ long lttng_metadata_ring_buffer_ioctl(struct file *filp, | ||
251 | */ | ||
252 | return -ENOSYS; | ||
253 | } | ||
254 | - case LTTNG_KERNEL_ABI_RING_BUFFER_FLUSH_EMPTY: /* Fall-through. */ | ||
255 | + case LTTNG_KERNEL_ABI_RING_BUFFER_FLUSH_EMPTY: | ||
256 | + lttng_fallthrough; | ||
257 | case LTTNG_KERNEL_ABI_RING_BUFFER_FLUSH: | ||
258 | { | ||
259 | struct lttng_metadata_stream *stream = filp->private_data; | ||
260 | @@ -1441,7 +1443,8 @@ long lttng_metadata_ring_buffer_compat_ioctl(struct file *filp, | ||
261 | */ | ||
262 | return -ENOSYS; | ||
263 | } | ||
264 | - case LTTNG_KERNEL_ABI_RING_BUFFER_FLUSH_EMPTY: /* Fall-through. */ | ||
265 | + case LTTNG_KERNEL_ABI_RING_BUFFER_FLUSH_EMPTY: | ||
266 | + lttng_fallthrough; | ||
267 | case LTTNG_KERNEL_ABI_RING_BUFFER_FLUSH: | ||
268 | { | ||
269 | struct lttng_metadata_stream *stream = filp->private_data; | ||
270 | @@ -1758,8 +1761,10 @@ int lttng_abi_validate_event_param(struct lttng_kernel_abi_event *event_param) | ||
271 | switch (event_param->instrumentation) { | ||
272 | case LTTNG_KERNEL_ABI_SYSCALL: | ||
273 | switch (event_param->u.syscall.entryexit) { | ||
274 | - case LTTNG_KERNEL_ABI_SYSCALL_ENTRY: /* Fall-through */ | ||
275 | - case LTTNG_KERNEL_ABI_SYSCALL_EXIT: /* Fall-through */ | ||
276 | + case LTTNG_KERNEL_ABI_SYSCALL_ENTRY: | ||
277 | + lttng_fallthrough; | ||
278 | + case LTTNG_KERNEL_ABI_SYSCALL_EXIT: | ||
279 | + lttng_fallthrough; | ||
280 | case LTTNG_KERNEL_ABI_SYSCALL_ENTRYEXIT: | ||
281 | break; | ||
282 | default: | ||
283 | @@ -1783,20 +1788,26 @@ int lttng_abi_validate_event_param(struct lttng_kernel_abi_event *event_param) | ||
284 | switch (event_param->u.kretprobe.entryexit) { | ||
285 | case LTTNG_KERNEL_ABI_SYSCALL_ENTRYEXIT: | ||
286 | break; | ||
287 | - case LTTNG_KERNEL_ABI_SYSCALL_ENTRY: /* Fall-through */ | ||
288 | - case LTTNG_KERNEL_ABI_SYSCALL_EXIT: /* Fall-through */ | ||
289 | + case LTTNG_KERNEL_ABI_SYSCALL_ENTRY: | ||
290 | + lttng_fallthrough; | ||
291 | + case LTTNG_KERNEL_ABI_SYSCALL_EXIT: | ||
292 | + lttng_fallthrough; | ||
293 | default: | ||
294 | return -EINVAL; | ||
295 | } | ||
296 | break; | ||
297 | |||
298 | - case LTTNG_KERNEL_ABI_TRACEPOINT: /* Fall-through */ | ||
299 | - case LTTNG_KERNEL_ABI_KPROBE: /* Fall-through */ | ||
300 | + case LTTNG_KERNEL_ABI_TRACEPOINT: | ||
301 | + lttng_fallthrough; | ||
302 | + case LTTNG_KERNEL_ABI_KPROBE: | ||
303 | + lttng_fallthrough; | ||
304 | case LTTNG_KERNEL_ABI_UPROBE: | ||
305 | break; | ||
306 | |||
307 | - case LTTNG_KERNEL_ABI_FUNCTION: /* Fall-through */ | ||
308 | - case LTTNG_KERNEL_ABI_NOOP: /* Fall-through */ | ||
309 | + case LTTNG_KERNEL_ABI_FUNCTION: | ||
310 | + lttng_fallthrough; | ||
311 | + case LTTNG_KERNEL_ABI_NOOP: | ||
312 | + lttng_fallthrough; | ||
313 | default: | ||
314 | return -EINVAL; | ||
315 | } | ||
316 | @@ -1830,18 +1841,23 @@ int lttng_abi_create_event(struct file *channel_file, | ||
317 | } | ||
318 | |||
319 | switch (event_param->instrumentation) { | ||
320 | - case LTTNG_KERNEL_ABI_TRACEPOINT: /* Fall-through */ | ||
321 | + case LTTNG_KERNEL_ABI_TRACEPOINT: | ||
322 | + lttng_fallthrough; | ||
323 | case LTTNG_KERNEL_ABI_SYSCALL: | ||
324 | fops = <tng_event_recorder_enabler_fops; | ||
325 | break; | ||
326 | - case LTTNG_KERNEL_ABI_KPROBE: /* Fall-through */ | ||
327 | - case LTTNG_KERNEL_ABI_KRETPROBE: /* Fall-through */ | ||
328 | + case LTTNG_KERNEL_ABI_KPROBE: | ||
329 | + lttng_fallthrough; | ||
330 | + case LTTNG_KERNEL_ABI_KRETPROBE: | ||
331 | + lttng_fallthrough; | ||
332 | case LTTNG_KERNEL_ABI_UPROBE: | ||
333 | fops = <tng_event_recorder_event_fops; | ||
334 | break; | ||
335 | |||
336 | - case LTTNG_KERNEL_ABI_FUNCTION: /* Fall-through */ | ||
337 | - case LTTNG_KERNEL_ABI_NOOP: /* Fall-through */ | ||
338 | + case LTTNG_KERNEL_ABI_FUNCTION: | ||
339 | + lttng_fallthrough; | ||
340 | + case LTTNG_KERNEL_ABI_NOOP: | ||
341 | + lttng_fallthrough; | ||
342 | default: | ||
343 | return -EINVAL; | ||
344 | } | ||
345 | @@ -1867,7 +1883,8 @@ int lttng_abi_create_event(struct file *channel_file, | ||
346 | goto event_error; | ||
347 | |||
348 | switch (event_param->instrumentation) { | ||
349 | - case LTTNG_KERNEL_ABI_TRACEPOINT: /* Fall-through */ | ||
350 | + case LTTNG_KERNEL_ABI_TRACEPOINT: | ||
351 | + lttng_fallthrough; | ||
352 | case LTTNG_KERNEL_ABI_SYSCALL: | ||
353 | { | ||
354 | struct lttng_event_enabler *event_enabler; | ||
355 | @@ -1887,8 +1904,10 @@ int lttng_abi_create_event(struct file *channel_file, | ||
356 | break; | ||
357 | } | ||
358 | |||
359 | - case LTTNG_KERNEL_ABI_KPROBE: /* Fall-through */ | ||
360 | - case LTTNG_KERNEL_ABI_KRETPROBE: /* Fall-through */ | ||
361 | + case LTTNG_KERNEL_ABI_KPROBE: | ||
362 | + lttng_fallthrough; | ||
363 | + case LTTNG_KERNEL_ABI_KRETPROBE: | ||
364 | + lttng_fallthrough; | ||
365 | case LTTNG_KERNEL_ABI_UPROBE: | ||
366 | { | ||
367 | struct lttng_kernel_event_recorder *event; | ||
368 | @@ -1908,8 +1927,10 @@ int lttng_abi_create_event(struct file *channel_file, | ||
369 | break; | ||
370 | } | ||
371 | |||
372 | - case LTTNG_KERNEL_ABI_FUNCTION: /* Fall-through */ | ||
373 | - case LTTNG_KERNEL_ABI_NOOP: /* Fall-through */ | ||
374 | + case LTTNG_KERNEL_ABI_FUNCTION: | ||
375 | + lttng_fallthrough; | ||
376 | + case LTTNG_KERNEL_ABI_NOOP: | ||
377 | + lttng_fallthrough; | ||
378 | default: | ||
379 | ret = -EINVAL; | ||
380 | goto event_error; | ||
381 | @@ -2043,18 +2064,23 @@ int lttng_abi_create_event_notifier(struct file *event_notifier_group_file, | ||
382 | } | ||
383 | |||
384 | switch (event_notifier_param->event.instrumentation) { | ||
385 | - case LTTNG_KERNEL_ABI_TRACEPOINT: /* Fall-through */ | ||
386 | + case LTTNG_KERNEL_ABI_TRACEPOINT: | ||
387 | + lttng_fallthrough; | ||
388 | case LTTNG_KERNEL_ABI_SYSCALL: | ||
389 | fops = <tng_event_notifier_enabler_fops; | ||
390 | break; | ||
391 | - case LTTNG_KERNEL_ABI_KPROBE: /* Fall-through */ | ||
392 | - case LTTNG_KERNEL_ABI_KRETPROBE: /* Fall-through */ | ||
393 | + case LTTNG_KERNEL_ABI_KPROBE: | ||
394 | + lttng_fallthrough; | ||
395 | + case LTTNG_KERNEL_ABI_KRETPROBE: | ||
396 | + lttng_fallthrough; | ||
397 | case LTTNG_KERNEL_ABI_UPROBE: | ||
398 | fops = <tng_event_notifier_event_fops; | ||
399 | break; | ||
400 | |||
401 | - case LTTNG_KERNEL_ABI_FUNCTION: /* Fall-through */ | ||
402 | - case LTTNG_KERNEL_ABI_NOOP: /* Fall-through */ | ||
403 | + case LTTNG_KERNEL_ABI_FUNCTION: | ||
404 | + lttng_fallthrough; | ||
405 | + case LTTNG_KERNEL_ABI_NOOP: | ||
406 | + lttng_fallthrough; | ||
407 | default: | ||
408 | ret = -EINVAL; | ||
409 | goto inval_instr; | ||
410 | @@ -2086,7 +2112,8 @@ int lttng_abi_create_event_notifier(struct file *event_notifier_group_file, | ||
411 | goto event_notifier_error; | ||
412 | |||
413 | switch (event_notifier_param->event.instrumentation) { | ||
414 | - case LTTNG_KERNEL_ABI_TRACEPOINT: /* Fall-through */ | ||
415 | + case LTTNG_KERNEL_ABI_TRACEPOINT: | ||
416 | + lttng_fallthrough; | ||
417 | case LTTNG_KERNEL_ABI_SYSCALL: | ||
418 | { | ||
419 | struct lttng_event_notifier_enabler *enabler; | ||
420 | @@ -2110,8 +2137,10 @@ int lttng_abi_create_event_notifier(struct file *event_notifier_group_file, | ||
421 | break; | ||
422 | } | ||
423 | |||
424 | - case LTTNG_KERNEL_ABI_KPROBE: /* Fall-through */ | ||
425 | - case LTTNG_KERNEL_ABI_KRETPROBE: /* Fall-through */ | ||
426 | + case LTTNG_KERNEL_ABI_KPROBE: | ||
427 | + lttng_fallthrough; | ||
428 | + case LTTNG_KERNEL_ABI_KRETPROBE: | ||
429 | + lttng_fallthrough; | ||
430 | case LTTNG_KERNEL_ABI_UPROBE: | ||
431 | { | ||
432 | struct lttng_kernel_event_notifier *event_notifier; | ||
433 | @@ -2135,8 +2164,10 @@ int lttng_abi_create_event_notifier(struct file *event_notifier_group_file, | ||
434 | break; | ||
435 | } | ||
436 | |||
437 | - case LTTNG_KERNEL_ABI_FUNCTION: /* Fall-through */ | ||
438 | - case LTTNG_KERNEL_ABI_NOOP: /* Fall-through */ | ||
439 | + case LTTNG_KERNEL_ABI_FUNCTION: | ||
440 | + lttng_fallthrough; | ||
441 | + case LTTNG_KERNEL_ABI_NOOP: | ||
442 | + lttng_fallthrough; | ||
443 | default: | ||
444 | ret = -EINVAL; | ||
445 | goto event_notifier_error; | ||
446 | diff --git a/src/lttng-bytecode-interpreter.c b/src/lttng-bytecode-interpreter.c | ||
447 | index b46a23b7..a2a932c6 100644 | ||
448 | --- a/src/lttng-bytecode-interpreter.c | ||
449 | +++ b/src/lttng-bytecode-interpreter.c | ||
450 | @@ -7,6 +7,7 @@ | ||
451 | * Copyright (C) 2010-2016 Mathieu Desnoyers <mathieu.desnoyers@efficios.com> | ||
452 | */ | ||
453 | |||
454 | +#include <wrapper/compiler_attributes.h> | ||
455 | #include <wrapper/uaccess.h> | ||
456 | #include <wrapper/objtool.h> | ||
457 | #include <wrapper/types.h> | ||
458 | @@ -421,7 +422,8 @@ static int dynamic_get_index(struct lttng_kernel_probe_ctx *lttng_probe_ctx, | ||
459 | } | ||
460 | break; | ||
461 | case LOAD_ROOT_CONTEXT: | ||
462 | - case LOAD_ROOT_APP_CONTEXT: /* Fall-through */ | ||
463 | + lttng_fallthrough; | ||
464 | + case LOAD_ROOT_APP_CONTEXT: | ||
465 | { | ||
466 | ret = context_get_index(lttng_probe_ctx, | ||
467 | &stack_top->u.ptr, | ||
468 | diff --git a/src/lttng-bytecode-specialize.c b/src/lttng-bytecode-specialize.c | ||
469 | index c4b9d04b..f8b5f19d 100644 | ||
470 | --- a/src/lttng-bytecode-specialize.c | ||
471 | +++ b/src/lttng-bytecode-specialize.c | ||
472 | @@ -8,6 +8,8 @@ | ||
473 | */ | ||
474 | |||
475 | #include <linux/slab.h> | ||
476 | +#include <wrapper/compiler_attributes.h> | ||
477 | + | ||
478 | #include <lttng/lttng-bytecode.h> | ||
479 | #include <lttng/align.h> | ||
480 | #include <lttng/events-internal.h> | ||
481 | @@ -271,7 +273,8 @@ static int specialize_get_index(struct bytecode_runtime *runtime, | ||
482 | } | ||
483 | case OBJECT_TYPE_STRUCT: | ||
484 | /* Only generated by the specialize phase. */ | ||
485 | - case OBJECT_TYPE_VARIANT: /* Fall-through */ | ||
486 | + case OBJECT_TYPE_VARIANT: | ||
487 | + lttng_fallthrough; | ||
488 | default: | ||
489 | printk(KERN_WARNING "LTTng: bytecode: Unexpected get index type %d", | ||
490 | (int) stack_top->load.object_type); | ||
491 | diff --git a/src/lttng-events.c b/src/lttng-events.c | ||
492 | index e785fe4d..230e3934 100644 | ||
493 | --- a/src/lttng-events.c | ||
494 | +++ b/src/lttng-events.c | ||
495 | @@ -28,6 +28,7 @@ | ||
496 | #include <linux/vmalloc.h> | ||
497 | #include <linux/dmi.h> | ||
498 | |||
499 | +#include <wrapper/compiler_attributes.h> | ||
500 | #include <wrapper/uuid.h> | ||
501 | #include <wrapper/vmalloc.h> /* for wrapper_vmalloc_sync_mappings() */ | ||
502 | #include <wrapper/random.h> | ||
503 | @@ -659,12 +660,14 @@ int lttng_event_enable(struct lttng_kernel_event_common *event) | ||
504 | goto end; | ||
505 | } | ||
506 | switch (event->priv->instrumentation) { | ||
507 | - case LTTNG_KERNEL_ABI_TRACEPOINT: /* Fall-through */ | ||
508 | + case LTTNG_KERNEL_ABI_TRACEPOINT: | ||
509 | + lttng_fallthrough; | ||
510 | case LTTNG_KERNEL_ABI_SYSCALL: | ||
511 | ret = -EINVAL; | ||
512 | break; | ||
513 | |||
514 | - case LTTNG_KERNEL_ABI_KPROBE: /* Fall-through */ | ||
515 | + case LTTNG_KERNEL_ABI_KPROBE: | ||
516 | + lttng_fallthrough; | ||
517 | case LTTNG_KERNEL_ABI_UPROBE: | ||
518 | WRITE_ONCE(event->enabled, 1); | ||
519 | break; | ||
520 | @@ -673,8 +676,10 @@ int lttng_event_enable(struct lttng_kernel_event_common *event) | ||
521 | ret = lttng_kretprobes_event_enable_state(event, 1); | ||
522 | break; | ||
523 | |||
524 | - case LTTNG_KERNEL_ABI_FUNCTION: /* Fall-through */ | ||
525 | - case LTTNG_KERNEL_ABI_NOOP: /* Fall-through */ | ||
526 | + case LTTNG_KERNEL_ABI_FUNCTION: | ||
527 | + lttng_fallthrough; | ||
528 | + case LTTNG_KERNEL_ABI_NOOP: | ||
529 | + lttng_fallthrough; | ||
530 | default: | ||
531 | WARN_ON_ONCE(1); | ||
532 | ret = -EINVAL; | ||
533 | @@ -719,12 +724,14 @@ int lttng_event_disable(struct lttng_kernel_event_common *event) | ||
534 | goto end; | ||
535 | } | ||
536 | switch (event->priv->instrumentation) { | ||
537 | - case LTTNG_KERNEL_ABI_TRACEPOINT: /* Fall-through */ | ||
538 | + case LTTNG_KERNEL_ABI_TRACEPOINT: | ||
539 | + lttng_fallthrough; | ||
540 | case LTTNG_KERNEL_ABI_SYSCALL: | ||
541 | ret = -EINVAL; | ||
542 | break; | ||
543 | |||
544 | - case LTTNG_KERNEL_ABI_KPROBE: /* Fall-through */ | ||
545 | + case LTTNG_KERNEL_ABI_KPROBE: | ||
546 | + lttng_fallthrough; | ||
547 | case LTTNG_KERNEL_ABI_UPROBE: | ||
548 | WRITE_ONCE(event->enabled, 0); | ||
549 | break; | ||
550 | @@ -733,8 +740,10 @@ int lttng_event_disable(struct lttng_kernel_event_common *event) | ||
551 | ret = lttng_kretprobes_event_enable_state(event, 0); | ||
552 | break; | ||
553 | |||
554 | - case LTTNG_KERNEL_ABI_FUNCTION: /* Fall-through */ | ||
555 | - case LTTNG_KERNEL_ABI_NOOP: /* Fall-through */ | ||
556 | + case LTTNG_KERNEL_ABI_FUNCTION: | ||
557 | + lttng_fallthrough; | ||
558 | + case LTTNG_KERNEL_ABI_NOOP: | ||
559 | + lttng_fallthrough; | ||
560 | default: | ||
561 | WARN_ON_ONCE(1); | ||
562 | ret = -EINVAL; | ||
563 | @@ -873,15 +882,20 @@ struct lttng_kernel_event_recorder *_lttng_kernel_event_recorder_create(struct l | ||
564 | event_name = event_desc->event_name; | ||
565 | break; | ||
566 | |||
567 | - case LTTNG_KERNEL_ABI_KPROBE: /* Fall-through */ | ||
568 | - case LTTNG_KERNEL_ABI_UPROBE: /* Fall-through */ | ||
569 | - case LTTNG_KERNEL_ABI_KRETPROBE: /* Fall-through */ | ||
570 | + case LTTNG_KERNEL_ABI_KPROBE: | ||
571 | + lttng_fallthrough; | ||
572 | + case LTTNG_KERNEL_ABI_UPROBE: | ||
573 | + lttng_fallthrough; | ||
574 | + case LTTNG_KERNEL_ABI_KRETPROBE: | ||
575 | + lttng_fallthrough; | ||
576 | case LTTNG_KERNEL_ABI_SYSCALL: | ||
577 | event_name = event_param->name; | ||
578 | break; | ||
579 | |||
580 | - case LTTNG_KERNEL_ABI_FUNCTION: /* Fall-through */ | ||
581 | - case LTTNG_KERNEL_ABI_NOOP: /* Fall-through */ | ||
582 | + case LTTNG_KERNEL_ABI_FUNCTION: | ||
583 | + lttng_fallthrough; | ||
584 | + case LTTNG_KERNEL_ABI_NOOP: | ||
585 | + lttng_fallthrough; | ||
586 | default: | ||
587 | WARN_ON_ONCE(1); | ||
588 | ret = -EINVAL; | ||
589 | @@ -1093,8 +1107,10 @@ struct lttng_kernel_event_recorder *_lttng_kernel_event_recorder_create(struct l | ||
590 | WARN_ON_ONCE(!ret); | ||
591 | break; | ||
592 | |||
593 | - case LTTNG_KERNEL_ABI_FUNCTION: /* Fall-through */ | ||
594 | - case LTTNG_KERNEL_ABI_NOOP: /* Fall-through */ | ||
595 | + case LTTNG_KERNEL_ABI_FUNCTION: | ||
596 | + lttng_fallthrough; | ||
597 | + case LTTNG_KERNEL_ABI_NOOP: | ||
598 | + lttng_fallthrough; | ||
599 | default: | ||
600 | WARN_ON_ONCE(1); | ||
601 | ret = -EINVAL; | ||
602 | @@ -1141,15 +1157,20 @@ struct lttng_kernel_event_notifier *_lttng_event_notifier_create( | ||
603 | event_name = event_desc->event_name; | ||
604 | break; | ||
605 | |||
606 | - case LTTNG_KERNEL_ABI_KPROBE: /* Fall-through */ | ||
607 | - case LTTNG_KERNEL_ABI_UPROBE: /* Fall-through */ | ||
608 | + case LTTNG_KERNEL_ABI_KPROBE: | ||
609 | + lttng_fallthrough; | ||
610 | + case LTTNG_KERNEL_ABI_UPROBE: | ||
611 | + lttng_fallthrough; | ||
612 | case LTTNG_KERNEL_ABI_SYSCALL: | ||
613 | event_name = event_notifier_param->event.name; | ||
614 | break; | ||
615 | |||
616 | - case LTTNG_KERNEL_ABI_KRETPROBE: /* Fall-through */ | ||
617 | - case LTTNG_KERNEL_ABI_FUNCTION: /* Fall-through */ | ||
618 | - case LTTNG_KERNEL_ABI_NOOP: /* Fall-through */ | ||
619 | + case LTTNG_KERNEL_ABI_KRETPROBE: | ||
620 | + lttng_fallthrough; | ||
621 | + case LTTNG_KERNEL_ABI_FUNCTION: | ||
622 | + lttng_fallthrough; | ||
623 | + case LTTNG_KERNEL_ABI_NOOP: | ||
624 | + lttng_fallthrough; | ||
625 | default: | ||
626 | WARN_ON_ONCE(1); | ||
627 | ret = -EINVAL; | ||
628 | @@ -1296,9 +1317,12 @@ struct lttng_kernel_event_notifier *_lttng_event_notifier_create( | ||
629 | WARN_ON_ONCE(!ret); | ||
630 | break; | ||
631 | |||
632 | - case LTTNG_KERNEL_ABI_KRETPROBE: /* Fall-through */ | ||
633 | - case LTTNG_KERNEL_ABI_FUNCTION: /* Fall-through */ | ||
634 | - case LTTNG_KERNEL_ABI_NOOP: /* Fall-through */ | ||
635 | + case LTTNG_KERNEL_ABI_KRETPROBE: | ||
636 | + lttng_fallthrough; | ||
637 | + case LTTNG_KERNEL_ABI_FUNCTION: | ||
638 | + lttng_fallthrough; | ||
639 | + case LTTNG_KERNEL_ABI_NOOP: | ||
640 | + lttng_fallthrough; | ||
641 | default: | ||
642 | WARN_ON_ONCE(1); | ||
643 | ret = -EINVAL; | ||
644 | @@ -1423,14 +1447,18 @@ void register_event(struct lttng_kernel_event_recorder *event_recorder) | ||
645 | ret = lttng_syscall_filter_enable_event(event_recorder->chan, event_recorder); | ||
646 | break; | ||
647 | |||
648 | - case LTTNG_KERNEL_ABI_KPROBE: /* Fall-through */ | ||
649 | - case LTTNG_KERNEL_ABI_UPROBE: /* Fall-through */ | ||
650 | + case LTTNG_KERNEL_ABI_KPROBE: | ||
651 | + lttng_fallthrough; | ||
652 | + case LTTNG_KERNEL_ABI_UPROBE: | ||
653 | + lttng_fallthrough; | ||
654 | case LTTNG_KERNEL_ABI_KRETPROBE: | ||
655 | ret = 0; | ||
656 | break; | ||
657 | |||
658 | - case LTTNG_KERNEL_ABI_FUNCTION: /* Fall-through */ | ||
659 | - case LTTNG_KERNEL_ABI_NOOP: /* Fall-through */ | ||
660 | + case LTTNG_KERNEL_ABI_FUNCTION: | ||
661 | + lttng_fallthrough; | ||
662 | + case LTTNG_KERNEL_ABI_NOOP: | ||
663 | + lttng_fallthrough; | ||
664 | default: | ||
665 | WARN_ON_ONCE(1); | ||
666 | } | ||
667 | @@ -1481,7 +1509,8 @@ int _lttng_event_unregister(struct lttng_kernel_event_recorder *event_recorder) | ||
668 | ret = 0; | ||
669 | break; | ||
670 | |||
671 | - case LTTNG_KERNEL_ABI_FUNCTION: /* Fall-through */ | ||
672 | + case LTTNG_KERNEL_ABI_FUNCTION: | ||
673 | + lttng_fallthrough; | ||
674 | default: | ||
675 | WARN_ON_ONCE(1); | ||
676 | } | ||
677 | @@ -1512,14 +1541,18 @@ void register_event_notifier(struct lttng_kernel_event_notifier *event_notifier) | ||
678 | ret = lttng_syscall_filter_enable_event_notifier(event_notifier); | ||
679 | break; | ||
680 | |||
681 | - case LTTNG_KERNEL_ABI_KPROBE: /* Fall-through */ | ||
682 | + case LTTNG_KERNEL_ABI_KPROBE: | ||
683 | + lttng_fallthrough; | ||
684 | case LTTNG_KERNEL_ABI_UPROBE: | ||
685 | ret = 0; | ||
686 | break; | ||
687 | |||
688 | - case LTTNG_KERNEL_ABI_KRETPROBE: /* Fall-through */ | ||
689 | - case LTTNG_KERNEL_ABI_FUNCTION: /* Fall-through */ | ||
690 | - case LTTNG_KERNEL_ABI_NOOP: /* Fall-through */ | ||
691 | + case LTTNG_KERNEL_ABI_KRETPROBE: | ||
692 | + lttng_fallthrough; | ||
693 | + case LTTNG_KERNEL_ABI_FUNCTION: | ||
694 | + lttng_fallthrough; | ||
695 | + case LTTNG_KERNEL_ABI_NOOP: | ||
696 | + lttng_fallthrough; | ||
697 | default: | ||
698 | WARN_ON_ONCE(1); | ||
699 | } | ||
700 | @@ -1559,9 +1592,12 @@ int _lttng_event_notifier_unregister( | ||
701 | ret = lttng_syscall_filter_disable_event_notifier(event_notifier); | ||
702 | break; | ||
703 | |||
704 | - case LTTNG_KERNEL_ABI_KRETPROBE: /* Fall-through */ | ||
705 | - case LTTNG_KERNEL_ABI_FUNCTION: /* Fall-through */ | ||
706 | - case LTTNG_KERNEL_ABI_NOOP: /* Fall-through */ | ||
707 | + case LTTNG_KERNEL_ABI_KRETPROBE: | ||
708 | + lttng_fallthrough; | ||
709 | + case LTTNG_KERNEL_ABI_FUNCTION: | ||
710 | + lttng_fallthrough; | ||
711 | + case LTTNG_KERNEL_ABI_NOOP: | ||
712 | + lttng_fallthrough; | ||
713 | default: | ||
714 | WARN_ON_ONCE(1); | ||
715 | } | ||
716 | @@ -1614,8 +1650,10 @@ void _lttng_event_destroy(struct lttng_kernel_event_common *event) | ||
717 | lttng_uprobes_destroy_event_private(event_recorder); | ||
718 | break; | ||
719 | |||
720 | - case LTTNG_KERNEL_ABI_FUNCTION: /* Fall-through */ | ||
721 | - case LTTNG_KERNEL_ABI_NOOP: /* Fall-through */ | ||
722 | + case LTTNG_KERNEL_ABI_FUNCTION: | ||
723 | + lttng_fallthrough; | ||
724 | + case LTTNG_KERNEL_ABI_NOOP: | ||
725 | + lttng_fallthrough; | ||
726 | default: | ||
727 | WARN_ON_ONCE(1); | ||
728 | } | ||
729 | @@ -1647,9 +1685,12 @@ void _lttng_event_destroy(struct lttng_kernel_event_common *event) | ||
730 | lttng_uprobes_destroy_event_notifier_private(event_notifier); | ||
731 | break; | ||
732 | |||
733 | - case LTTNG_KERNEL_ABI_KRETPROBE: /* Fall-through */ | ||
734 | - case LTTNG_KERNEL_ABI_FUNCTION: /* Fall-through */ | ||
735 | - case LTTNG_KERNEL_ABI_NOOP: /* Fall-through */ | ||
736 | + case LTTNG_KERNEL_ABI_KRETPROBE: | ||
737 | + lttng_fallthrough; | ||
738 | + case LTTNG_KERNEL_ABI_FUNCTION: | ||
739 | + lttng_fallthrough; | ||
740 | + case LTTNG_KERNEL_ABI_NOOP: | ||
741 | + lttng_fallthrough; | ||
742 | default: | ||
743 | WARN_ON_ONCE(1); | ||
744 | } | ||
745 | @@ -2713,7 +2754,8 @@ void lttng_session_sync_event_enablers(struct lttng_kernel_session *session) | ||
746 | int nr_filters = 0; | ||
747 | |||
748 | switch (event_recorder_priv->parent.instrumentation) { | ||
749 | - case LTTNG_KERNEL_ABI_TRACEPOINT: /* Fall-through */ | ||
750 | + case LTTNG_KERNEL_ABI_TRACEPOINT: | ||
751 | + lttng_fallthrough; | ||
752 | case LTTNG_KERNEL_ABI_SYSCALL: | ||
753 | /* Enable events */ | ||
754 | list_for_each_entry(enabler_ref, | ||
755 | @@ -2807,7 +2849,8 @@ void lttng_event_notifier_group_sync_enablers(struct lttng_event_notifier_group | ||
756 | int nr_filters = 0, nr_captures = 0; | ||
757 | |||
758 | switch (event_notifier_priv->parent.instrumentation) { | ||
759 | - case LTTNG_KERNEL_ABI_TRACEPOINT: /* Fall-through */ | ||
760 | + case LTTNG_KERNEL_ABI_TRACEPOINT: | ||
761 | + lttng_fallthrough; | ||
762 | case LTTNG_KERNEL_ABI_SYSCALL: | ||
763 | /* Enable event_notifiers */ | ||
764 | list_for_each_entry(enabler_ref, | ||
765 | @@ -3877,7 +3920,7 @@ int print_escaped_ctf_string(struct lttng_kernel_session *session, const char *s | ||
766 | if (ret) | ||
767 | goto error; | ||
768 | /* We still print the current char */ | ||
769 | - /* Fallthrough */ | ||
770 | + lttng_fallthrough; | ||
771 | default: | ||
772 | ret = lttng_metadata_printf(session, "%c", cur); | ||
773 | break; | ||
774 | diff --git a/src/lttng-string-utils.c b/src/lttng-string-utils.c | ||
775 | index d9447903..65946193 100644 | ||
776 | --- a/src/lttng-string-utils.c | ||
777 | +++ b/src/lttng-string-utils.c | ||
778 | @@ -4,6 +4,7 @@ | ||
779 | */ | ||
780 | |||
781 | #include <linux/types.h> | ||
782 | +#include <wrapper/compiler_attributes.h> | ||
783 | |||
784 | #include <lttng/string-utils.h> | ||
785 | |||
786 | @@ -302,7 +303,7 @@ retry: | ||
787 | p = pattern_get_char_at_cb(p_at, | ||
788 | pattern_get_char_at_cb_data); | ||
789 | |||
790 | - /* Fall-through. */ | ||
791 | + lttng_fallthrough; | ||
792 | default: | ||
793 | /* | ||
794 | * Default case which will compare the escaped | ||
795 | diff --git a/src/probes/lttng-kretprobes.c b/src/probes/lttng-kretprobes.c | ||
796 | index 0fa6a1bf..1d0a5ecb 100644 | ||
797 | --- a/src/probes/lttng-kretprobes.c | ||
798 | +++ b/src/probes/lttng-kretprobes.c | ||
799 | @@ -14,6 +14,7 @@ | ||
800 | #include <lttng/events.h> | ||
801 | #include <lttng/events-internal.h> | ||
802 | #include <ringbuffer/frontend_types.h> | ||
803 | +#include <wrapper/compiler_attributes.h> | ||
804 | #include <wrapper/vmalloc.h> | ||
805 | #include <wrapper/irqflags.h> | ||
806 | #include <lttng/tracer.h> | ||
807 | @@ -61,7 +62,8 @@ int _lttng_kretprobes_handler(struct kretprobe_instance *krpi, | ||
808 | return 0; | ||
809 | break; | ||
810 | } | ||
811 | - case LTTNG_KERNEL_EVENT_TYPE_NOTIFIER: /* Fall-through. */ | ||
812 | + case LTTNG_KERNEL_EVENT_TYPE_NOTIFIER: | ||
813 | + lttng_fallthrough; | ||
814 | default: | ||
815 | WARN_ON_ONCE(1); | ||
816 | } | ||
817 | @@ -90,7 +92,8 @@ int _lttng_kretprobes_handler(struct kretprobe_instance *krpi, | ||
818 | chan->ops->event_commit(&ctx); | ||
819 | break; | ||
820 | } | ||
821 | - case LTTNG_KERNEL_EVENT_TYPE_NOTIFIER: /* Fall-through. */ | ||
822 | + case LTTNG_KERNEL_EVENT_TYPE_NOTIFIER: | ||
823 | + lttng_fallthrough; | ||
824 | default: | ||
825 | WARN_ON_ONCE(1); | ||
826 | } | ||
827 | -- | ||
828 | 2.19.1 | ||
829 | |||
diff --git a/meta/recipes-kernel/lttng/lttng-modules_2.13.0.bb b/meta/recipes-kernel/lttng/lttng-modules_2.13.19.bb index 6dfde8dcad..63ba488515 100644 --- a/meta/recipes-kernel/lttng/lttng-modules_2.13.0.bb +++ b/meta/recipes-kernel/lttng/lttng-modules_2.13.19.bb | |||
@@ -2,23 +2,24 @@ SECTION = "devel" | |||
2 | SUMMARY = "Linux Trace Toolkit KERNEL MODULE" | 2 | SUMMARY = "Linux Trace Toolkit KERNEL MODULE" |
3 | DESCRIPTION = "The lttng-modules 2.0 package contains the kernel tracer modules" | 3 | DESCRIPTION = "The lttng-modules 2.0 package contains the kernel tracer modules" |
4 | HOMEPAGE = "https://lttng.org/" | 4 | HOMEPAGE = "https://lttng.org/" |
5 | LICENSE = "LGPLv2.1 & GPLv2 & MIT" | 5 | LICENSE = "LGPL-2.1-only & GPL-2.0-only & MIT" |
6 | LIC_FILES_CHKSUM = "file://LICENSE;md5=0464cff101a009c403cd2ed65d01d4c4" | 6 | LIC_FILES_CHKSUM = "file://LICENSE;md5=8d0d9f08888046474772a5d745d89d6a" |
7 | 7 | ||
8 | inherit module | 8 | inherit module |
9 | 9 | ||
10 | include lttng-platforms.inc | 10 | include lttng-platforms.inc |
11 | 11 | ||
12 | SRC_URI = "https://lttng.org/files/${BPN}/${BPN}-${PV}.tar.bz2 \ | 12 | SRC_URI = "https://lttng.org/files/${BPN}/${BPN}-${PV}.tar.bz2 \ |
13 | file://0001-fix-cpu-hotplug-Remove-deprecated-CPU-hotplug-functi.patch \ | 13 | file://0001-lttng-modules-fix-sigaction-build-without-CONFIG_COM.patch \ |
14 | file://0002-fix-Revert-Makefile-Enable-Wimplicit-fallthrough-for.patch \ | 14 | " |
15 | " | 15 | |
16 | # Use :append here so that the patch is applied also when using devupstream | 16 | # Use :append here so that the patch is applied also when using devupstream |
17 | SRC_URI:append = " file://0001-src-Kbuild-change-missing-CONFIG_TRACEPOINTS-to-warn.patch" | 17 | SRC_URI:append = " file://0001-src-Kbuild-change-missing-CONFIG_TRACEPOINTS-to-warn.patch \ |
18 | " | ||
18 | 19 | ||
19 | SRC_URI[sha256sum] = "5ebf2b3cd128b3a1c8afaea1e98d5a6f7f0676fd524fcf72361c34d9dc603356" | 20 | SRC_URI[sha256sum] = "06d704633749039f8fa72a954bec6486058386e2a0c3557b22c484698f9b34d5" |
20 | 21 | ||
21 | export INSTALL_MOD_DIR="kernel/lttng-modules" | 22 | export INSTALL_MOD_DIR = "kernel/lttng-modules" |
22 | 23 | ||
23 | EXTRA_OEMAKE += "KERNELDIR='${STAGING_KERNEL_DIR}'" | 24 | EXTRA_OEMAKE += "KERNELDIR='${STAGING_KERNEL_DIR}'" |
24 | 25 | ||
@@ -37,11 +38,6 @@ python do_package:prepend() { | |||
37 | } | 38 | } |
38 | 39 | ||
39 | BBCLASSEXTEND = "devupstream:target" | 40 | BBCLASSEXTEND = "devupstream:target" |
40 | LIC_FILES_CHKSUM:class-devupstream = "file://LICENSE;md5=0464cff101a009c403cd2ed65d01d4c4" | 41 | SRC_URI:class-devupstream = "git://git.lttng.org/lttng-modules;branch=stable-2.13;protocol=https" |
41 | DEFAULT_PREFERENCE:class-devupstream = "-1" | 42 | SRCREV:class-devupstream = "7584cfc04914cb0842a986e9808686858b9c8630" |
42 | SRC_URI:class-devupstream = "git://git.lttng.org/lttng-modules;branch=stable-2.13" | ||
43 | |||
44 | SRCREV:class-devupstream = "c570be0da77e963d77bac099d468bc0cd5f1bd63" | ||
45 | PV:class-devupstream = "2.13.0+git${SRCPV}" | ||
46 | S:class-devupstream = "${WORKDIR}/git" | ||
47 | SRCREV_FORMAT ?= "lttng_git" | 43 | SRCREV_FORMAT ?= "lttng_git" |
diff --git a/meta/recipes-kernel/lttng/lttng-platforms.inc b/meta/recipes-kernel/lttng/lttng-platforms.inc index 933c65d85d..900e36df82 100644 --- a/meta/recipes-kernel/lttng/lttng-platforms.inc +++ b/meta/recipes-kernel/lttng/lttng-platforms.inc | |||
@@ -15,3 +15,7 @@ LTTNGUST:arc = "" | |||
15 | 15 | ||
16 | COMPATIBLE_HOST:arc:pn-lttng-ust = "null" | 16 | COMPATIBLE_HOST:arc:pn-lttng-ust = "null" |
17 | 17 | ||
18 | # Whether the platform supports lttng-tools | ||
19 | # lttng-tools requires SYS_ppoll and SYS_pselect6 which are not supported on riscv32. | ||
20 | # It's also turned off for riscv32 in meta-riscv. See https://github.com/riscv/meta-riscv/blob/master/conf/layer.conf | ||
21 | COMPATIBLE_HOST:riscv32:pn-lttng-tools = "null" | ||
diff --git a/meta/recipes-kernel/lttng/lttng-tools/0001-Fix-rotation-destroy-flush-fix-session-daemon-abort-.patch b/meta/recipes-kernel/lttng/lttng-tools/0001-Fix-rotation-destroy-flush-fix-session-daemon-abort-.patch new file mode 100644 index 0000000000..e5c9677073 --- /dev/null +++ b/meta/recipes-kernel/lttng/lttng-tools/0001-Fix-rotation-destroy-flush-fix-session-daemon-abort-.patch | |||
@@ -0,0 +1,53 @@ | |||
1 | From ea47622987d0947af3e8f75d16d52e27ebd60166 Mon Sep 17 00:00:00 2001 | ||
2 | From: Xiangyu Chen <xiangyu.chen@windriver.com> | ||
3 | Date: Mon, 25 Mar 2024 18:20:14 +0800 | ||
4 | Subject: [PATCH] Fix: rotation-destroy-flush: fix session daemon abort if no | ||
5 | kernel module present | ||
6 | |||
7 | Testing rotation-destroy-flush when no lttng kernel modules present, it would | ||
8 | be failed with error message: | ||
9 | |||
10 | Error: Unable to load required module lttng-ring-buffer-client-discard | ||
11 | not ok 1 - Start session daemon | ||
12 | Failed test 'Start session daemon' | ||
13 | not ok 2 - Create session rotation_destroy_flush in -o /tmp/tmp.test_rot ... | ||
14 | ... | ||
15 | |||
16 | This because test script that sets the LTTNG_ABORT_ON_ERROR environment | ||
17 | variable. It's this environment variable that causes the sessiond to handle the | ||
18 | kernel module loading failure as an abort rather than a warning. | ||
19 | |||
20 | Using "check_skip_kernel_test" to detect whether the kernel module fails to | ||
21 | load is expected or not. If the failure is expected, the script won't set that | ||
22 | environment variable any more. | ||
23 | |||
24 | Fixes: 3a174400 | ||
25 | ("tests:add check_skip_kernel_test to check root user and lttng kernel modules") | ||
26 | |||
27 | Submitted [https://review.lttng.org/c/lttng-tools/+/12155] | ||
28 | Upstream-Status: Backport [https://github.com/lttng/lttng-tools/commit/78f5b22de60c114c5c83410015a08bdd212edc0b] | ||
29 | Change-Id: I371e9ba717613e2940186f710cf3cccd35baed6c | ||
30 | Signed-off-by: Xiangyu Chen <xiangyu.chen@windriver.com> | ||
31 | --- | ||
32 | .../ust/rotation-destroy-flush/test_rotation_destroy_flush | 6 +++--- | ||
33 | 1 file changed, 3 insertions(+), 3 deletions(-) | ||
34 | |||
35 | diff --git a/tests/regression/ust/rotation-destroy-flush/test_rotation_destroy_flush b/tests/regression/ust/rotation-destroy-flush/test_rotation_destroy_flush | ||
36 | index 8ef4f0d..e506b53 100755 | ||
37 | --- a/tests/regression/ust/rotation-destroy-flush/test_rotation_destroy_flush | ||
38 | +++ b/tests/regression/ust/rotation-destroy-flush/test_rotation_destroy_flush | ||
39 | @@ -23,11 +23,11 @@ SIZE_LIMIT=$PAGE_SIZE | ||
40 | NR_ITER=10 | ||
41 | NUM_TESTS=$((15*$NR_ITER)) | ||
42 | |||
43 | -# Ensure the daemons invoke abort on error. | ||
44 | -export LTTNG_ABORT_ON_ERROR=1 | ||
45 | - | ||
46 | source $TESTDIR/utils/utils.sh | ||
47 | |||
48 | +# Ensure the daemons invoke abort on error. | ||
49 | +check_skip_kernel_test || export LTTNG_ABORT_ON_ERROR=1 | ||
50 | + | ||
51 | # MUST set TESTDIR before calling those functions | ||
52 | function run_app() | ||
53 | { | ||
diff --git a/meta/recipes-kernel/lttng/lttng-tools/0001-compat-Define-off64_t-as-off_t-on-linux.patch b/meta/recipes-kernel/lttng/lttng-tools/0001-compat-Define-off64_t-as-off_t-on-linux.patch new file mode 100644 index 0000000000..e68feb2753 --- /dev/null +++ b/meta/recipes-kernel/lttng/lttng-tools/0001-compat-Define-off64_t-as-off_t-on-linux.patch | |||
@@ -0,0 +1,86 @@ | |||
1 | From e5b2615aaad44a1c0d52da1469b28f99cfb12b5f Mon Sep 17 00:00:00 2001 | ||
2 | From: =?UTF-8?q?J=C3=A9r=C3=A9mie=20Galarneau?= | ||
3 | <jeremie.galarneau@efficios.com> | ||
4 | Date: Tue, 17 Jan 2023 16:57:35 -0500 | ||
5 | Subject: [PATCH] compat: off64_t is not defined by musl | ||
6 | MIME-Version: 1.0 | ||
7 | Content-Type: text/plain; charset=UTF-8 | ||
8 | Content-Transfer-Encoding: 8bit | ||
9 | |||
10 | This helps compile with latest musl, where off64_t is not defined unless | ||
11 | _LARGEFILE64_SOURCE is defined. On glibc, _LARGEFILE64_SOURCE is defined | ||
12 | if _GNU_SOURCE is defined, so the problem is only seen with musl. | ||
13 | |||
14 | Since the project uses AC_SYS_LARGEFILE, which from the autoconf doc: | ||
15 | "arrange for 64-bit file offsets, known as large-file support." | ||
16 | |||
17 | As such, it is safe to assume off_t is 64-bit wide. This is checked by a | ||
18 | static_assert to catch any platform where autoconf would let a 32-bit | ||
19 | off_t slip. | ||
20 | |||
21 | Submitted [https://review.lttng.org/c/lttng-tools/+/9268] | ||
22 | Upstream-Status: Backport [https://github.com/lttng/lttng-tools/commit/57fd993799a2b081c826f6fc8def32d28d526bfb] | ||
23 | Reported-by: Khem Raj <raj.khem@gmail.com> | ||
24 | Signed-off-by: Jérémie Galarneau <jeremie.galarneau@efficios.com> | ||
25 | Change-Id: If2c6007a8c85bc3f3065002af8a7538b882fb4a8 | ||
26 | --- | ||
27 | src/common/compat/compat-fcntl.c | 5 ++++- | ||
28 | src/common/compat/fcntl.h | 10 +++------- | ||
29 | 2 files changed, 7 insertions(+), 8 deletions(-) | ||
30 | |||
31 | diff --git a/src/common/compat/compat-fcntl.c b/src/common/compat/compat-fcntl.c | ||
32 | index 5c0bdc9..18bab0a 100644 | ||
33 | --- a/src/common/compat/compat-fcntl.c | ||
34 | +++ b/src/common/compat/compat-fcntl.c | ||
35 | @@ -8,14 +8,17 @@ | ||
36 | #define _LGPL_SOURCE | ||
37 | #include <common/compat/fcntl.h> | ||
38 | #include <common/macros.h> | ||
39 | +#include <common/bug.h> | ||
40 | +#include <stdint.h> | ||
41 | #include <unistd.h> | ||
42 | |||
43 | #ifdef __linux__ | ||
44 | |||
45 | LTTNG_HIDDEN | ||
46 | -int compat_sync_file_range(int fd, off64_t offset, off64_t nbytes, | ||
47 | +int compat_sync_file_range(int fd, off_t offset, off_t nbytes, | ||
48 | unsigned int flags) | ||
49 | { | ||
50 | + LTTNG_BUILD_BUG_ON(sizeof(off_t) != sizeof(int64_t)); | ||
51 | #ifdef HAVE_SYNC_FILE_RANGE | ||
52 | return sync_file_range(fd, offset, nbytes, flags); | ||
53 | #else | ||
54 | diff --git a/src/common/compat/fcntl.h b/src/common/compat/fcntl.h | ||
55 | index 5e566e5..93b22b7 100644 | ||
56 | --- a/src/common/compat/fcntl.h | ||
57 | +++ b/src/common/compat/fcntl.h | ||
58 | @@ -13,16 +13,12 @@ | ||
59 | |||
60 | #include <common/compat/errno.h> | ||
61 | |||
62 | -#if (defined(__CYGWIN__)) | ||
63 | -typedef long long off64_t; | ||
64 | -#endif | ||
65 | - | ||
66 | #if (defined(__FreeBSD__) || defined(__sun__)) | ||
67 | typedef off64_t loff_t; | ||
68 | #endif | ||
69 | |||
70 | #ifdef __linux__ | ||
71 | -extern int compat_sync_file_range(int fd, off64_t offset, off64_t nbytes, | ||
72 | +extern int compat_sync_file_range(int fd, off_t offset, off_t nbytes, | ||
73 | unsigned int flags); | ||
74 | #define lttng_sync_file_range(fd, offset, nbytes, flags) \ | ||
75 | compat_sync_file_range(fd, offset, nbytes, flags) | ||
76 | @@ -37,8 +33,8 @@ extern int compat_sync_file_range(int fd, off64_t offset, off64_t nbytes, | ||
77 | #define SYNC_FILE_RANGE_WAIT_BEFORE 0 | ||
78 | #define SYNC_FILE_RANGE_WRITE 0 | ||
79 | |||
80 | -static inline int lttng_sync_file_range(int fd, off64_t offset, | ||
81 | - off64_t nbytes, unsigned int flags) | ||
82 | +static inline int lttng_sync_file_range(int fd, off_t offset, | ||
83 | + off_t nbytes, unsigned int flags) | ||
84 | { | ||
85 | return -ENOSYS; | ||
86 | } | ||
diff --git a/meta/recipes-kernel/lttng/lttng-tools/0001-fix-lttng-tools-fails-to-compile-with-libxml2-2.14.0.patch b/meta/recipes-kernel/lttng/lttng-tools/0001-fix-lttng-tools-fails-to-compile-with-libxml2-2.14.0.patch new file mode 100644 index 0000000000..7c2b893731 --- /dev/null +++ b/meta/recipes-kernel/lttng/lttng-tools/0001-fix-lttng-tools-fails-to-compile-with-libxml2-2.14.0.patch | |||
@@ -0,0 +1,55 @@ | |||
1 | From 0b19e10a8a52fab0bfadbac5ce70f1b2d185a1d1 Mon Sep 17 00:00:00 2001 | ||
2 | From: Hongxu Jia <hongxu.jia@windriver.com> | ||
3 | Date: Wed, 21 May 2025 13:09:25 +0800 | ||
4 | Subject: [PATCH] fix lttng-tools fails to compile with libxml2 2.14.0+ | ||
5 | |||
6 | Description: | ||
7 | | In file included from /srv/pokybuild/yocto-worker/qemux86-alt/build/build/tmp/work/core2-32-poky-linux/lttng-tools/2.13.15/recipe-sysroot/usr/include/libxml2/libxml/parser.h:25, | ||
8 | | from ../../../../lttng-tools-2.13.15/src/common/config/session-config.c:29: | ||
9 | | /srv/pokybuild/yocto-worker/qemux86-alt/build/build/tmp/work/core2-32-poky-linux/lttng-tools/2.13.15/recipe-sysroot/usr/include/libxml2/libxml/encoding.h:173:7: note: declared here | ||
10 | | 173 | } input XML_DEPRECATED_MEMBER; | ||
11 | | | ^~~~~ | ||
12 | | ../../../../lttng-tools-2.13.15/src/common/config/session-config.c:432:15: error: called object is not a function or function pointer | ||
13 | | 432 | ret = handler->input(out_str, &out_len, (const xmlChar *) in_str, &in_len); | ||
14 | | | ^~~~~~~ | ||
15 | | At top level: | ||
16 | | cc1: note: unrecognized command-line option '-Wno-incomplete-setjmp-declaration' may have been intended to silence earlier diagnostics | ||
17 | |||
18 | |||
19 | According to [1][2], the UTF-8 handler is | ||
20 | ``` | ||
21 | static xmlCharEncError | ||
22 | UTF8ToUTF8(void *vctxt ATTRIBUTE_UNUSED, | ||
23 | unsigned char* out, int *outlen, | ||
24 | const unsigned char* in, int *inlen, | ||
25 | int flush ATTRIBUTE_UNUSED) | ||
26 | ``` | ||
27 | |||
28 | Update input.func with setting ATTRIBUTE_UNUSED params with NULL and 0 | ||
29 | |||
30 | [1] https://gitlab.gnome.org/GNOME/libxml2/-/commit/38f475072aefe032fff1dc058df3e56c1e7062fa | ||
31 | [2] https://gitlab.gnome.org/GNOME/libxml2/-/commit/69b83bb68e2a8ed0013f80c51b9a358714b00c9a#478024cc18a2cc8dbaed34076e9775f6827f413d_2188_2201 | ||
32 | |||
33 | Upstream-Status: Submitted [https://github.com/lttng/lttng-tools/pull/170] | ||
34 | Signed-off-by: Marko, Peter <Peter.Marko@siemens.com> | ||
35 | Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com> | ||
36 | --- | ||
37 | src/common/config/session-config.c | 2 +- | ||
38 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
39 | |||
40 | diff --git a/src/common/config/session-config.c b/src/common/config/session-config.c | ||
41 | index bb4e9fe..4042d34 100644 | ||
42 | --- a/src/common/config/session-config.c | ||
43 | +++ b/src/common/config/session-config.c | ||
44 | @@ -429,7 +429,7 @@ static xmlChar *encode_string(const char *in_str) | ||
45 | goto end; | ||
46 | } | ||
47 | |||
48 | - ret = handler->input(out_str, &out_len, (const xmlChar *) in_str, &in_len); | ||
49 | + ret = handler->input.func(NULL, out_str, &out_len, (const xmlChar *) in_str, &in_len, 0); | ||
50 | if (ret < 0) { | ||
51 | xmlFree(out_str); | ||
52 | out_str = NULL; | ||
53 | -- | ||
54 | 2.34.1 | ||
55 | |||
diff --git a/meta/recipes-kernel/lttng/lttng-tools/0001-src-common-correct-header-location.patch b/meta/recipes-kernel/lttng/lttng-tools/0001-src-common-correct-header-location.patch deleted file mode 100644 index 24fcce41cb..0000000000 --- a/meta/recipes-kernel/lttng/lttng-tools/0001-src-common-correct-header-location.patch +++ /dev/null | |||
@@ -1,41 +0,0 @@ | |||
1 | From 790ef313364d1f1efb6f283705bb324eea2979ba Mon Sep 17 00:00:00 2001 | ||
2 | From: Alexander Kanavin <alex@linutronix.de> | ||
3 | Date: Sun, 5 Sep 2021 10:13:08 +0200 | ||
4 | Subject: [PATCH] src/common: correct header location | ||
5 | |||
6 | sys/unistd.h is not guaranteed to exist, and does not with | ||
7 | e.g. musl C library. | ||
8 | |||
9 | Upstream-Status: Backport [http://git.lttng.org/?p=lttng-tools.git;a=commitdiff;h=8f14767d33f786d895e50633fb46b880249b6c54] | ||
10 | Signed-off-by: Alexander Kanavin <alex@linutronix.de> | ||
11 | --- | ||
12 | src/common/kernel-probe.c | 2 +- | ||
13 | src/common/userspace-probe.c | 2 +- | ||
14 | 2 files changed, 2 insertions(+), 2 deletions(-) | ||
15 | |||
16 | diff --git a/src/common/kernel-probe.c b/src/common/kernel-probe.c | ||
17 | index 2beb53f..44100bc 100644 | ||
18 | --- a/src/common/kernel-probe.c | ||
19 | +++ b/src/common/kernel-probe.c | ||
20 | @@ -20,7 +20,7 @@ | ||
21 | #include <lttng/kernel-probe.h> | ||
22 | #include <sys/stat.h> | ||
23 | #include <sys/types.h> | ||
24 | -#include <sys/unistd.h> | ||
25 | +#include <unistd.h> | ||
26 | |||
27 | static | ||
28 | int lttng_kernel_probe_location_address_serialize( | ||
29 | diff --git a/src/common/userspace-probe.c b/src/common/userspace-probe.c | ||
30 | index 67b0ee6..66afc6f 100644 | ||
31 | --- a/src/common/userspace-probe.c | ||
32 | +++ b/src/common/userspace-probe.c | ||
33 | @@ -20,7 +20,7 @@ | ||
34 | #include <lttng/userspace-probe-internal.h> | ||
35 | #include <sys/stat.h> | ||
36 | #include <sys/types.h> | ||
37 | -#include <sys/unistd.h> | ||
38 | +#include <unistd.h> | ||
39 | |||
40 | static | ||
41 | int lttng_userspace_probe_location_function_set_binary_fd_handle( | ||
diff --git a/meta/recipes-kernel/lttng/lttng-tools/0001-tests-add-check_skip_kernel_test-to-check-root-user-.patch b/meta/recipes-kernel/lttng/lttng-tools/0001-tests-add-check_skip_kernel_test-to-check-root-user-.patch new file mode 100644 index 0000000000..cb2c763b51 --- /dev/null +++ b/meta/recipes-kernel/lttng/lttng-tools/0001-tests-add-check_skip_kernel_test-to-check-root-user-.patch | |||
@@ -0,0 +1,1243 @@ | |||
1 | From 76976da4e01ce90923f61ba734e066faefb76beb Mon Sep 17 00:00:00 2001 | ||
2 | From: Xiangyu Chen <xiangyu.chen@windriver.com> | ||
3 | Date: Mon, 12 Feb 2024 09:23:54 -0500 | ||
4 | Subject: [PATCH] tests: add check_skip_kernel_test to check root user and | ||
5 | lttng kernel modules | ||
6 | MIME-Version: 1.0 | ||
7 | Content-Type: text/plain; charset=UTF-8 | ||
8 | Content-Transfer-Encoding: 8bit | ||
9 | |||
10 | The current tests will run both userspace and kernel testing. Some of | ||
11 | use cases only use lttng for one kind of tracing on an embedded | ||
12 | device (e.g. userspace), so in this scenario, the kernel modules might | ||
13 | not install to target rootfs, the test cases would be fail and exit. | ||
14 | |||
15 | Add LTTNG_TOOLS_DISABLE_KERNEL_TESTS to skip the lttng kernel features | ||
16 | test, this flag can be set via "make": | ||
17 | |||
18 | make check LTTNG_TOOLS_DISABLE_KERNEL_TESTS=1 | ||
19 | |||
20 | When this flag was set, all kernel related testcases would be marked as | ||
21 | SKIP in result. | ||
22 | |||
23 | Since the the LTTNG_TOOLS_DISABLE_KERNEL_TESTS was checked in function | ||
24 | check_skip_kernel_test, lots of testcases also need to check root | ||
25 | permission, so merging the root permission checking into | ||
26 | check_skip_kernel_test. | ||
27 | |||
28 | Upstream-Status: Backport from | ||
29 | [https://git.lttng.org/?p=lttng-tools.git;a=commit;h=3a1744008331a0604479d3d7461f77056fad3a64] | ||
30 | |||
31 | Change-Id: I49a1f642a9869c21a69e0186c296fd917bd7b525 | ||
32 | Signed-off-by: Xiangyu Chen <xiangyu.chen@windriver.com> | ||
33 | Signed-off-by: Michael Jeanson <mjeanson@efficios.com> | ||
34 | Signed-off-by: Jérémie Galarneau <jeremie.galarneau@efficios.com> | ||
35 | --- | ||
36 | tests/destructive/metadata-regeneration | 8 +---- | ||
37 | tests/perf/test_perf_raw.in | 8 +---- | ||
38 | tests/regression/kernel/test_all_events | 8 +---- | ||
39 | tests/regression/kernel/test_callstack | 8 +---- | ||
40 | tests/regression/kernel/test_channel | 8 +---- | ||
41 | tests/regression/kernel/test_clock_override | 8 +---- | ||
42 | tests/regression/kernel/test_event_basic | 8 +---- | ||
43 | tests/regression/kernel/test_kernel_function | 8 +---- | ||
44 | tests/regression/kernel/test_lttng_logger | 8 +---- | ||
45 | tests/regression/kernel/test_ns_contexts | 8 +---- | ||
46 | .../regression/kernel/test_ns_contexts_change | 9 +---- | ||
47 | .../kernel/test_rotation_destroy_flush | 8 +---- | ||
48 | .../regression/kernel/test_select_poll_epoll | 8 +---- | ||
49 | tests/regression/kernel/test_syscall | 8 +---- | ||
50 | tests/regression/kernel/test_userspace_probe | 8 +---- | ||
51 | tests/regression/tools/clear/test_kernel | 8 +---- | ||
52 | .../tools/filtering/test_invalid_filter | 8 +---- | ||
53 | .../tools/filtering/test_unsupported_op | 8 +---- | ||
54 | .../tools/filtering/test_valid_filter | 8 +---- | ||
55 | tests/regression/tools/health/test_health.sh | 10 ++---- | ||
56 | tests/regression/tools/health/test_thread_ok | 9 +---- | ||
57 | tests/regression/tools/live/test_kernel | 10 +++--- | ||
58 | tests/regression/tools/live/test_lttng_kernel | 8 +---- | ||
59 | tests/regression/tools/metadata/test_kernel | 8 +---- | ||
60 | .../test_notification_kernel_buffer_usage | 36 +++++++++---------- | ||
61 | .../test_notification_kernel_capture | 23 ++++++------ | ||
62 | .../test_notification_kernel_error | 23 ++++++------ | ||
63 | .../test_notification_kernel_instrumentation | 23 ++++++------ | ||
64 | .../test_notification_kernel_syscall | 19 +++++----- | ||
65 | .../test_notification_kernel_userspace_probe | 20 +++++------ | ||
66 | .../notification/test_notification_multi_app | 14 +++----- | ||
67 | ...test_notification_notifier_discarded_count | 9 +++-- | ||
68 | .../tools/regen-metadata/test_kernel | 8 +---- | ||
69 | .../tools/regen-statedump/test_kernel | 8 +---- | ||
70 | tests/regression/tools/rotation/test_kernel | 8 +---- | ||
71 | tests/regression/tools/snapshots/test_kernel | 8 +---- | ||
72 | .../tools/snapshots/test_kernel_streaming | 8 +---- | ||
73 | .../streaming/test_high_throughput_limits | 8 +---- | ||
74 | tests/regression/tools/streaming/test_kernel | 8 +---- | ||
75 | .../tools/tracker/test_event_tracker | 8 +---- | ||
76 | .../tools/trigger/test_add_trigger_cli | 12 ++----- | ||
77 | .../tools/trigger/test_list_triggers_cli | 26 +++++--------- | ||
78 | .../tools/wildcard/test_event_wildcard | 8 +---- | ||
79 | .../test_relayd_working_directory | 4 +-- | ||
80 | .../ust/namespaces/test_ns_contexts_change | 7 +--- | ||
81 | tests/regression/ust/test_event_perf | 8 +---- | ||
82 | tests/utils/utils.sh | 35 ++++++++++++++++++ | ||
83 | 47 files changed, 166 insertions(+), 363 deletions(-) | ||
84 | |||
85 | diff --git a/tests/destructive/metadata-regeneration b/tests/destructive/metadata-regeneration | ||
86 | index b81e7af..36b130d 100755 | ||
87 | --- a/tests/destructive/metadata-regeneration | ||
88 | +++ b/tests/destructive/metadata-regeneration | ||
89 | @@ -185,19 +185,13 @@ function test_ust_streaming () | ||
90 | rm -f ${file_sync_before_last} | ||
91 | } | ||
92 | |||
93 | -if [ "$(id -u)" == "0" ]; then | ||
94 | - isroot=1 | ||
95 | -else | ||
96 | - isroot=0 | ||
97 | -fi | ||
98 | - | ||
99 | if ! destructive_tests_enabled ; then | ||
100 | echo 'You need to set the LTTNG_ENABLE_DESTRUCTIVE_TESTS to "will-break-my-system" as argument to run this test' | ||
101 | echo 'Moreover, please make sure that ntp is not running while executing this test' | ||
102 | exit 0 | ||
103 | fi | ||
104 | |||
105 | -skip $isroot "Root access is needed. Skipping all tests." $NUM_TESTS || | ||
106 | +check_skip_kernel_test $NUM_TESTS "Skipping all tests." || | ||
107 | { | ||
108 | start_lttng_relayd "-o $TRACE_PATH" | ||
109 | start_lttng_sessiond | ||
110 | diff --git a/tests/perf/test_perf_raw.in b/tests/perf/test_perf_raw.in | ||
111 | index f293ccd..d35529a 100644 | ||
112 | --- a/tests/perf/test_perf_raw.in | ||
113 | +++ b/tests/perf/test_perf_raw.in | ||
114 | @@ -137,12 +137,6 @@ function test_kernel_raw() | ||
115 | rm -rf $TRACE_PATH | ||
116 | } | ||
117 | |||
118 | -if [ "$(id -u)" == "0" ]; then | ||
119 | - isroot=1 | ||
120 | -else | ||
121 | - isroot=0 | ||
122 | -fi | ||
123 | - | ||
124 | # MUST set TESTDIR before calling those functions | ||
125 | plan_tests $NUM_TESTS | ||
126 | |||
127 | @@ -154,7 +148,7 @@ have_libpfm | ||
128 | |||
129 | test_ust_raw | ||
130 | |||
131 | -skip $isroot "Root access is needed for kernel testing, skipping." 9 || | ||
132 | +check_skip_kernel_test 9 || | ||
133 | { | ||
134 | modprobe lttng-test | ||
135 | test_kernel_raw | ||
136 | diff --git a/tests/regression/kernel/test_all_events b/tests/regression/kernel/test_all_events | ||
137 | index 2e20888..044f9b6 100755 | ||
138 | --- a/tests/regression/kernel/test_all_events | ||
139 | +++ b/tests/regression/kernel/test_all_events | ||
140 | @@ -43,13 +43,7 @@ plan_tests $NUM_TESTS | ||
141 | |||
142 | print_test_banner "$TEST_DESC" | ||
143 | |||
144 | -if [ "$(id -u)" == "0" ]; then | ||
145 | - isroot=1 | ||
146 | -else | ||
147 | - isroot=0 | ||
148 | -fi | ||
149 | - | ||
150 | -skip $isroot "Root access is needed. Skipping all tests." $NUM_TESTS || | ||
151 | +check_skip_kernel_test "$NUM_TESTS" "Skipping all tests." || | ||
152 | { | ||
153 | validate_lttng_modules_present | ||
154 | start_lttng_sessiond | ||
155 | diff --git a/tests/regression/kernel/test_callstack b/tests/regression/kernel/test_callstack | ||
156 | index a4477fd..d8d6b5e 100755 | ||
157 | --- a/tests/regression/kernel/test_callstack | ||
158 | +++ b/tests/regression/kernel/test_callstack | ||
159 | @@ -134,13 +134,7 @@ plan_tests $NUM_TESTS | ||
160 | |||
161 | print_test_banner "$TEST_DESC" | ||
162 | |||
163 | -if [ "$(id -u)" == "0" ]; then | ||
164 | - isroot=1 | ||
165 | -else | ||
166 | - isroot=0 | ||
167 | -fi | ||
168 | - | ||
169 | -skip $isroot "Root access is needed. Skipping all tests." "$NUM_TESTS" || | ||
170 | +check_skip_kernel_test "$NUM_TESTS" "Skipping all tests." || | ||
171 | { | ||
172 | validate_lttng_modules_present | ||
173 | start_lttng_sessiond | ||
174 | diff --git a/tests/regression/kernel/test_channel b/tests/regression/kernel/test_channel | ||
175 | index 9cc74c4..4c377bd 100755 | ||
176 | --- a/tests/regression/kernel/test_channel | ||
177 | +++ b/tests/regression/kernel/test_channel | ||
178 | @@ -47,13 +47,7 @@ function test_channel_buffer_too_large() | ||
179 | plan_tests $NUM_TESTS | ||
180 | print_test_banner "$TEST_DESC" | ||
181 | |||
182 | -if [ "$(id -u)" == "0" ]; then | ||
183 | - isroot=1 | ||
184 | -else | ||
185 | - isroot=0 | ||
186 | -fi | ||
187 | - | ||
188 | -skip $isroot "Root access is needed. Skipping all tests." $NUM_TESTS || | ||
189 | +check_skip_kernel_test "$NUM_TESTS" "Skipping all tests." || | ||
190 | { | ||
191 | start_lttng_sessiond | ||
192 | |||
193 | diff --git a/tests/regression/kernel/test_clock_override b/tests/regression/kernel/test_clock_override | ||
194 | index 7289289..48a3f92 100755 | ||
195 | --- a/tests/regression/kernel/test_clock_override | ||
196 | +++ b/tests/regression/kernel/test_clock_override | ||
197 | @@ -172,13 +172,7 @@ TESTS=( | ||
198 | TEST_COUNT=${#TESTS[@]} | ||
199 | i=0 | ||
200 | |||
201 | -if [ "$(id -u)" == "0" ]; then | ||
202 | - isroot=1 | ||
203 | -else | ||
204 | - isroot=0 | ||
205 | -fi | ||
206 | - | ||
207 | -skip $isroot "Root access is needed. Skipping all tests." $NUM_TESTS || | ||
208 | +check_skip_kernel_test "$NUM_TESTS" "Skipping all tests." || | ||
209 | { | ||
210 | validate_lttng_modules_present | ||
211 | trap signal_cleanup SIGTERM SIGINT | ||
212 | diff --git a/tests/regression/kernel/test_event_basic b/tests/regression/kernel/test_event_basic | ||
213 | index ac9ec05..387e2f7 100755 | ||
214 | --- a/tests/regression/kernel/test_event_basic | ||
215 | +++ b/tests/regression/kernel/test_event_basic | ||
216 | @@ -73,13 +73,7 @@ plan_tests $NUM_TESTS | ||
217 | |||
218 | print_test_banner "$TEST_DESC" | ||
219 | |||
220 | -if [ "$(id -u)" == "0" ]; then | ||
221 | - isroot=1 | ||
222 | -else | ||
223 | - isroot=0 | ||
224 | -fi | ||
225 | - | ||
226 | -skip $isroot "Root access is needed. Skipping all tests." $NUM_TESTS || | ||
227 | +check_skip_kernel_test $NUM_TESTS "Skipping all tests." || | ||
228 | { | ||
229 | validate_lttng_modules_present | ||
230 | start_lttng_sessiond | ||
231 | diff --git a/tests/regression/kernel/test_kernel_function b/tests/regression/kernel/test_kernel_function | ||
232 | index b1d5491..ea16cde 100755 | ||
233 | --- a/tests/regression/kernel/test_kernel_function | ||
234 | +++ b/tests/regression/kernel/test_kernel_function | ||
235 | @@ -43,13 +43,7 @@ plan_tests $NUM_TESTS | ||
236 | |||
237 | print_test_banner "$TEST_DESC" | ||
238 | |||
239 | -if [ "$(id -u)" == "0" ]; then | ||
240 | - isroot=1 | ||
241 | -else | ||
242 | - isroot=0 | ||
243 | -fi | ||
244 | - | ||
245 | -skip $isroot "Root access is needed. Skipping all tests." $NUM_TESTS || | ||
246 | +check_skip_kernel_test "$NUM_TESTS" "Skipping all tests." || | ||
247 | { | ||
248 | start_lttng_sessiond_notap | ||
249 | validate_lttng_modules_present | ||
250 | diff --git a/tests/regression/kernel/test_lttng_logger b/tests/regression/kernel/test_lttng_logger | ||
251 | index b8f7ded..00eaae8 100755 | ||
252 | --- a/tests/regression/kernel/test_lttng_logger | ||
253 | +++ b/tests/regression/kernel/test_lttng_logger | ||
254 | @@ -110,13 +110,7 @@ plan_tests $NUM_TESTS | ||
255 | |||
256 | print_test_banner "$TEST_DESC" | ||
257 | |||
258 | -if [ "$(id -u)" == "0" ]; then | ||
259 | - isroot=1 | ||
260 | -else | ||
261 | - isroot=0 | ||
262 | -fi | ||
263 | - | ||
264 | -skip $isroot "Root access is needed. Skipping all tests." $NUM_TESTS || | ||
265 | +check_skip_kernel_test "$NUM_TESTS" "Skipping all tests." || | ||
266 | { | ||
267 | validate_lttng_modules_present | ||
268 | start_lttng_sessiond | ||
269 | diff --git a/tests/regression/kernel/test_ns_contexts b/tests/regression/kernel/test_ns_contexts | ||
270 | index 7d447bc..1c71ea5 100755 | ||
271 | --- a/tests/regression/kernel/test_ns_contexts | ||
272 | +++ b/tests/regression/kernel/test_ns_contexts | ||
273 | @@ -108,13 +108,7 @@ plan_tests $NUM_TESTS | ||
274 | print_test_banner "$TEST_DESC" | ||
275 | |||
276 | |||
277 | -isroot=0 | ||
278 | -if [ "$(id -u)" == "0" ]; then | ||
279 | - isroot=1 | ||
280 | -fi | ||
281 | - | ||
282 | -skip $isroot "Root access is needed. Skipping all tests." "$NUM_TESTS" && exit 0 | ||
283 | - | ||
284 | +check_skip_kernel_test "$NUM_TESTS" "Skipping all tests." && exit 0 | ||
285 | |||
286 | system_has_ns=0 | ||
287 | if [ -d "/proc/$$/ns" ]; then | ||
288 | diff --git a/tests/regression/kernel/test_ns_contexts_change b/tests/regression/kernel/test_ns_contexts_change | ||
289 | index 42a6127..3f5e4ee 100755 | ||
290 | --- a/tests/regression/kernel/test_ns_contexts_change | ||
291 | +++ b/tests/regression/kernel/test_ns_contexts_change | ||
292 | @@ -162,14 +162,7 @@ plan_tests $NUM_TESTS | ||
293 | |||
294 | print_test_banner "$TEST_DESC" | ||
295 | |||
296 | - | ||
297 | -isroot=0 | ||
298 | -if [ "$(id -u)" == "0" ]; then | ||
299 | - isroot=1 | ||
300 | -fi | ||
301 | - | ||
302 | -skip $isroot "Root access is needed. Skipping all tests." "$NUM_TESTS" && exit 0 | ||
303 | - | ||
304 | +check_skip_kernel_test "$NUM_TESTS" "Skipping all tests." && exit 0 | ||
305 | |||
306 | system_has_ns=0 | ||
307 | if [ -d "/proc/$$/ns" ]; then | ||
308 | diff --git a/tests/regression/kernel/test_rotation_destroy_flush b/tests/regression/kernel/test_rotation_destroy_flush | ||
309 | index cb773d7..0af514b 100755 | ||
310 | --- a/tests/regression/kernel/test_rotation_destroy_flush | ||
311 | +++ b/tests/regression/kernel/test_rotation_destroy_flush | ||
312 | @@ -120,13 +120,7 @@ TESTS=( | ||
313 | TEST_COUNT=${#TESTS[@]} | ||
314 | i=0 | ||
315 | |||
316 | -if [ "$(id -u)" == "0" ]; then | ||
317 | - isroot=1 | ||
318 | -else | ||
319 | - isroot=0 | ||
320 | -fi | ||
321 | - | ||
322 | -skip $isroot "Root access is needed. Skipping all tests." $NUM_TESTS || | ||
323 | +check_skip_kernel_test "$NUM_TESTS" "Skipping all tests." || | ||
324 | { | ||
325 | validate_lttng_modules_present | ||
326 | trap signal_cleanup SIGTERM SIGINT | ||
327 | diff --git a/tests/regression/kernel/test_select_poll_epoll b/tests/regression/kernel/test_select_poll_epoll | ||
328 | index d8245a0..20f0ef0 100755 | ||
329 | --- a/tests/regression/kernel/test_select_poll_epoll | ||
330 | +++ b/tests/regression/kernel/test_select_poll_epoll | ||
331 | @@ -374,13 +374,7 @@ if test $? != 0; then | ||
332 | exit 0 | ||
333 | fi | ||
334 | |||
335 | -if [ "$(id -u)" == "0" ]; then | ||
336 | - isroot=1 | ||
337 | -else | ||
338 | - isroot=0 | ||
339 | -fi | ||
340 | - | ||
341 | -skip $isroot "Root access is needed. Skipping all tests." $NUM_TESTS || | ||
342 | +check_skip_kernel_test "$NUM_TESTS" "Skipping all tests." || | ||
343 | { | ||
344 | validate_lttng_modules_present | ||
345 | |||
346 | diff --git a/tests/regression/kernel/test_syscall b/tests/regression/kernel/test_syscall | ||
347 | index 401a18a..219d947 100755 | ||
348 | --- a/tests/regression/kernel/test_syscall | ||
349 | +++ b/tests/regression/kernel/test_syscall | ||
350 | @@ -664,13 +664,7 @@ plan_tests $NUM_TESTS | ||
351 | |||
352 | print_test_banner "$TEST_DESC" | ||
353 | |||
354 | -if [ "$(id -u)" == "0" ]; then | ||
355 | - isroot=1 | ||
356 | -else | ||
357 | - isroot=0 | ||
358 | -fi | ||
359 | - | ||
360 | -skip $isroot "Root access is needed. Skipping all tests." $NUM_TESTS || | ||
361 | +check_skip_kernel_test "$NUM_TESTS" "Skipping all tests." || | ||
362 | { | ||
363 | validate_lttng_modules_present | ||
364 | start_lttng_sessiond | ||
365 | diff --git a/tests/regression/kernel/test_userspace_probe b/tests/regression/kernel/test_userspace_probe | ||
366 | index 1091ee6..5d984d6 100755 | ||
367 | --- a/tests/regression/kernel/test_userspace_probe | ||
368 | +++ b/tests/regression/kernel/test_userspace_probe | ||
369 | @@ -815,13 +815,7 @@ fi | ||
370 | plan_tests $NUM_TESTS | ||
371 | print_test_banner "$TEST_DESC" | ||
372 | |||
373 | -if [ "$(id -u)" == "0" ]; then | ||
374 | - isroot=1 | ||
375 | -else | ||
376 | - isroot=0 | ||
377 | -fi | ||
378 | - | ||
379 | -skip $isroot "Root access is needed. Skipping all tests." $NUM_TESTS || | ||
380 | +check_skip_kernel_test "$NUM_TESTS" "Skipping all tests." || | ||
381 | { | ||
382 | validate_lttng_modules_present | ||
383 | start_lttng_sessiond | ||
384 | diff --git a/tests/regression/tools/clear/test_kernel b/tests/regression/tools/clear/test_kernel | ||
385 | index 06fb1c3..48250a7 100755 | ||
386 | --- a/tests/regression/tools/clear/test_kernel | ||
387 | +++ b/tests/regression/tools/clear/test_kernel | ||
388 | @@ -536,12 +536,6 @@ plan_tests $NUM_TESTS | ||
389 | |||
390 | print_test_banner "$TEST_DESC" | ||
391 | |||
392 | -if [ "$(id -u)" == "0" ]; then | ||
393 | - isroot=1 | ||
394 | -else | ||
395 | - isroot=0 | ||
396 | -fi | ||
397 | - | ||
398 | streaming_tests=(test_kernel_streaming | ||
399 | test_kernel_streaming_rotate_clear | ||
400 | test_kernel_streaming_clear_rotate | ||
401 | @@ -563,7 +557,7 @@ snapshot_tests=(test_kernel_streaming_snapshot | ||
402 | test_kernel_local_snapshot | ||
403 | ) | ||
404 | |||
405 | -skip $isroot "Root access is needed. Skipping all kernel streaming tests." $NUM_TESTS || | ||
406 | +check_skip_kernel_test "$NUM_TESTS" "Skipping kernel streaming tests." || | ||
407 | { | ||
408 | trap signal_cleanup SIGTERM SIGINT | ||
409 | |||
410 | diff --git a/tests/regression/tools/filtering/test_invalid_filter b/tests/regression/tools/filtering/test_invalid_filter | ||
411 | index 7d9e524..8435e55 100755 | ||
412 | --- a/tests/regression/tools/filtering/test_invalid_filter | ||
413 | +++ b/tests/regression/tools/filtering/test_invalid_filter | ||
414 | @@ -168,13 +168,7 @@ done | ||
415 | |||
416 | test_bytecode_limit -u | ||
417 | |||
418 | -if [ "$(id -u)" == "0" ]; then | ||
419 | - isroot=1 | ||
420 | -else | ||
421 | - isroot=0 | ||
422 | -fi | ||
423 | - | ||
424 | -skip $isroot "Root access is needed. Skipping all kernel invalid filter tests." $NUM_KERNEL_TESTS || | ||
425 | +check_skip_kernel_test "$NUM_KERNEL_TESTS" "Skipping kernel invalid filter tests." || | ||
426 | { | ||
427 | diag "Test kernel filters" | ||
428 | i=0 | ||
429 | diff --git a/tests/regression/tools/filtering/test_unsupported_op b/tests/regression/tools/filtering/test_unsupported_op | ||
430 | index 299247a..91eb86d 100755 | ||
431 | --- a/tests/regression/tools/filtering/test_unsupported_op | ||
432 | +++ b/tests/regression/tools/filtering/test_unsupported_op | ||
433 | @@ -103,13 +103,7 @@ while [ "$i" -lt "$OP_COUNT" ]; do | ||
434 | let "i++" | ||
435 | done | ||
436 | |||
437 | -if [ "$(id -u)" == "0" ]; then | ||
438 | - isroot=1 | ||
439 | -else | ||
440 | - isroot=0 | ||
441 | -fi | ||
442 | - | ||
443 | -skip $isroot "Root access is needed. Skipping all kernel unsupported filter operations tests." $NUM_KERNEL_TESTS || | ||
444 | +check_skip_kernel_test $NUM_KERNEL_TESTS "Skipping kernel unsupported filter operations tests." || | ||
445 | { | ||
446 | diag "Test kernel unsupported filter operations" | ||
447 | |||
448 | diff --git a/tests/regression/tools/filtering/test_valid_filter b/tests/regression/tools/filtering/test_valid_filter | ||
449 | index e76ffa2..1ba7c79 100755 | ||
450 | --- a/tests/regression/tools/filtering/test_valid_filter | ||
451 | +++ b/tests/regression/tools/filtering/test_valid_filter | ||
452 | @@ -1452,13 +1452,7 @@ KERNEL_FILTERS=( | ||
453 | |||
454 | IFS=$OLDIFS | ||
455 | |||
456 | -if [ "$(id -u)" == "0" ]; then | ||
457 | - isroot=1 | ||
458 | -else | ||
459 | - isroot=0 | ||
460 | -fi | ||
461 | - | ||
462 | -skip $isroot "Root access is needed. Skipping all kernel valid filter tests." $NUM_KERNEL_TESTS || | ||
463 | +check_skip_kernel_test "$NUM_KERNEL_TESTS" "Skipping kernel valid filter tests." || | ||
464 | { | ||
465 | diag "Test kernel valid filters" | ||
466 | |||
467 | diff --git a/tests/regression/tools/health/test_health.sh b/tests/regression/tools/health/test_health.sh | ||
468 | index b3d6419..68716e6 100644 | ||
469 | --- a/tests/regression/tools/health/test_health.sh | ||
470 | +++ b/tests/regression/tools/health/test_health.sh | ||
471 | @@ -82,7 +82,7 @@ function test_health | ||
472 | diag "With UST consumer daemons" | ||
473 | enable_ust_lttng_event_ok $SESSION_NAME $UST_EVENT_NAME $CHANNEL_NAME | ||
474 | |||
475 | - skip $isroot "Root access is needed. Skipping kernel consumer health check test." "1" || | ||
476 | + check_skip_kernel_test "1" "Skipping kernel consumer health check test." || | ||
477 | { | ||
478 | diag "With kernel consumer daemon" | ||
479 | lttng_enable_kernel_event $SESSION_NAME $KERNEL_EVENT_NAME $CHANNEL_NAME | ||
480 | @@ -113,7 +113,7 @@ function test_health | ||
481 | |||
482 | |||
483 | if [ ${test_needs_root} -eq 1 ]; then | ||
484 | - skip ${isroot} "Root access needed for test \"${test_thread_name}\"." "1" || | ||
485 | + check_skip_kernel_test "1" "Skipping \"${test_thread_name}\"." || | ||
486 | { | ||
487 | report_errors "${test_thread_error_string}" "${test_relayd}" | ||
488 | } | ||
489 | @@ -276,12 +276,6 @@ STDERR_PATH=$(mktemp --tmpdir tmp.test_health_stderr_path.XXXXXX) | ||
490 | TRACE_PATH=$(mktemp --tmpdir -d tmp.test_health_trace_path.XXXXXX) | ||
491 | HEALTH_PATH=$(mktemp --tmpdir -d tmp.test_health_trace_path.XXXXXX) | ||
492 | |||
493 | -if [ "$(id -u)" == "0" ]; then | ||
494 | - isroot=1 | ||
495 | -else | ||
496 | - isroot=0 | ||
497 | -fi | ||
498 | - | ||
499 | THREAD_COUNT=${#THREAD[@]} | ||
500 | i=0 | ||
501 | while [ "$i" -lt "$THREAD_COUNT" ]; do | ||
502 | diff --git a/tests/regression/tools/health/test_thread_ok b/tests/regression/tools/health/test_thread_ok | ||
503 | index e84adb6..e5e2354 100755 | ||
504 | --- a/tests/regression/tools/health/test_thread_ok | ||
505 | +++ b/tests/regression/tools/health/test_thread_ok | ||
506 | @@ -67,7 +67,7 @@ function test_thread_ok | ||
507 | $CURDIR/$HEALTH_CHECK_BIN > ${STDOUT_PATH} 2> ${STDERR_PATH} | ||
508 | report_errors | ||
509 | |||
510 | - skip $isroot "Root access is needed. Skipping kernel consumer health check test." "5" || | ||
511 | + check_skip_kernel_test "5" "Skipping kernel consumer health check test." || | ||
512 | { | ||
513 | diag "With kernel consumer daemon" | ||
514 | create_lttng_session_no_output $SESSION_NAME | ||
515 | @@ -115,13 +115,6 @@ STDERR_PATH=$(mktemp --tmpdir tmp.test_thread_ok_stderr_path.XXXXXX) | ||
516 | TRACE_PATH=$(mktemp --tmpdir -d tmp.test_thread_ok_trace_path.XXXXXX) | ||
517 | HEALTH_PATH=$(mktemp --tmpdir -d tmp.test_thread_ok_trace_path.XXXXXX) | ||
518 | |||
519 | -# The manage kernel thread is only spawned if we are root | ||
520 | -if [ "$(id -u)" == "0" ]; then | ||
521 | - isroot=1 | ||
522 | -else | ||
523 | - isroot=0 | ||
524 | -fi | ||
525 | - | ||
526 | test_thread_ok | ||
527 | |||
528 | rm -rf ${HEALTH_PATH} | ||
529 | diff --git a/tests/regression/tools/live/test_kernel b/tests/regression/tools/live/test_kernel | ||
530 | index b622b52..fdaa09f 100755 | ||
531 | --- a/tests/regression/tools/live/test_kernel | ||
532 | +++ b/tests/regression/tools/live/test_kernel | ||
533 | @@ -39,13 +39,11 @@ function clean_live_tracing() | ||
534 | rm -rf $TRACE_PATH | ||
535 | } | ||
536 | |||
537 | -# Need root access for kernel tracing. | ||
538 | -if [ "$(id -u)" == "0" ]; then | ||
539 | - isroot=1 | ||
540 | -else | ||
541 | - plan_skip_all "Root access is needed. Skipping all tests." | ||
542 | +check_skip_kernel_test && | ||
543 | +{ | ||
544 | + plan_skip_all "Skipping all tests." | ||
545 | exit 0 | ||
546 | -fi | ||
547 | +} | ||
548 | |||
549 | modprobe lttng-test | ||
550 | |||
551 | diff --git a/tests/regression/tools/live/test_lttng_kernel b/tests/regression/tools/live/test_lttng_kernel | ||
552 | index a23d937..1b93364 100755 | ||
553 | --- a/tests/regression/tools/live/test_lttng_kernel | ||
554 | +++ b/tests/regression/tools/live/test_lttng_kernel | ||
555 | @@ -45,13 +45,7 @@ function clean_live_tracing() | ||
556 | } | ||
557 | |||
558 | # Need root access for kernel tracing. | ||
559 | -if [ "$(id -u)" == "0" ]; then | ||
560 | - isroot=1 | ||
561 | -else | ||
562 | - isroot=0 | ||
563 | -fi | ||
564 | - | ||
565 | -skip $isroot "Root access is needed. Skipping all tests." $NUM_TESTS || | ||
566 | +check_skip_kernel_test "$NUM_TESTS" "Skipping all tests." || | ||
567 | { | ||
568 | modprobe lttng-test | ||
569 | |||
570 | diff --git a/tests/regression/tools/metadata/test_kernel b/tests/regression/tools/metadata/test_kernel | ||
571 | index 57cace6..26e95d9 100755 | ||
572 | --- a/tests/regression/tools/metadata/test_kernel | ||
573 | +++ b/tests/regression/tools/metadata/test_kernel | ||
574 | @@ -91,13 +91,7 @@ plan_tests $NUM_TESTS | ||
575 | print_test_banner "$TEST_DESC" | ||
576 | |||
577 | |||
578 | -if [ "$(id -u)" == "0" ]; then | ||
579 | - isroot=1 | ||
580 | -else | ||
581 | - isroot=0 | ||
582 | -fi | ||
583 | - | ||
584 | -skip $isroot "Root access is needed. Skipping all kernel metadata tests." $NUM_TESTS || | ||
585 | +check_skip_kernel_test "$NUM_TESTS" "Skipping kernel metadata tests." || | ||
586 | { | ||
587 | validate_lttng_modules_present | ||
588 | modprobe lttng-test | ||
589 | diff --git a/tests/regression/tools/notification/test_notification_kernel_buffer_usage b/tests/regression/tools/notification/test_notification_kernel_buffer_usage | ||
590 | index 76e69a7..8fdaabb 100755 | ||
591 | --- a/tests/regression/tools/notification/test_notification_kernel_buffer_usage | ||
592 | +++ b/tests/regression/tools/notification/test_notification_kernel_buffer_usage | ||
593 | @@ -60,29 +60,27 @@ function test_buffer_usage_notification | ||
594 | wait $APP_PID 2> /dev/null | ||
595 | } | ||
596 | |||
597 | -if [ "$(id -u)" == "0" ]; then | ||
598 | - | ||
599 | - validate_lttng_modules_present | ||
600 | - | ||
601 | +check_skip_kernel_test && | ||
602 | +{ | ||
603 | + plan_skip_all "Skipping all tests." | ||
604 | + rm -rf "$TEST_TMPDIR" | ||
605 | + exit 0 | ||
606 | +} | ||
607 | |||
608 | - modprobe lttng-test | ||
609 | +validate_lttng_modules_present | ||
610 | |||
611 | - # Used on sessiond launch. | ||
612 | - LTTNG_SESSIOND_ENV_VARS="LTTNG_TESTPOINT_ENABLE=1 \ | ||
613 | - CONSUMER_PAUSE_PIPE_PATH=${TESTPOINT_PIPE_PATH} \ | ||
614 | - LD_PRELOAD=${TESTPOINT}" | ||
615 | - start_lttng_sessiond_notap | ||
616 | +modprobe lttng-test | ||
617 | |||
618 | - test_buffer_usage_notification | ||
619 | +# Used on sessiond launch. | ||
620 | +LTTNG_SESSIOND_ENV_VARS="LTTNG_TESTPOINT_ENABLE=1 \ | ||
621 | + CONSUMER_PAUSE_PIPE_PATH=${TESTPOINT_PIPE_PATH} \ | ||
622 | + LD_PRELOAD=${TESTPOINT}" | ||
623 | +start_lttng_sessiond_notap | ||
624 | |||
625 | - stop_lttng_sessiond_notap | ||
626 | - rmmod lttng-test | ||
627 | +test_buffer_usage_notification | ||
628 | |||
629 | - rm -rf "${consumerd_pipe[@]}" 2> /dev/null | ||
630 | -else | ||
631 | - # Kernel tests are skipped. | ||
632 | - plan_tests $NUM_TESTS | ||
633 | - skip 0 "Root access is needed. Skipping all kernel notification tests." $NUM_TESTS | ||
634 | -fi | ||
635 | +stop_lttng_sessiond_notap | ||
636 | +rmmod lttng-test | ||
637 | |||
638 | +rm -rf "${consumerd_pipe[@]}" 2> /dev/null | ||
639 | rm -rf "$TEST_TMPDIR" | ||
640 | diff --git a/tests/regression/tools/notification/test_notification_kernel_capture b/tests/regression/tools/notification/test_notification_kernel_capture | ||
641 | index 88f123d..0f8a2bc 100755 | ||
642 | --- a/tests/regression/tools/notification/test_notification_kernel_capture | ||
643 | +++ b/tests/regression/tools/notification/test_notification_kernel_capture | ||
644 | @@ -31,22 +31,21 @@ function test_basic_error_path | ||
645 | } | ||
646 | |||
647 | |||
648 | -if [ "$(id -u)" == "0" ]; then | ||
649 | - validate_lttng_modules_present | ||
650 | +check_skip_kernel_test && | ||
651 | +{ | ||
652 | + plan_skip_all "Skipping all tests." | ||
653 | + exit 0 | ||
654 | +} | ||
655 | |||
656 | - modprobe lttng-test | ||
657 | +validate_lttng_modules_present | ||
658 | |||
659 | - start_lttng_sessiond_notap | ||
660 | +modprobe lttng-test | ||
661 | |||
662 | - test_basic_error_path | ||
663 | +start_lttng_sessiond_notap | ||
664 | |||
665 | - stop_lttng_sessiond_notap | ||
666 | - rmmod lttng-test | ||
667 | +test_basic_error_path | ||
668 | |||
669 | -else | ||
670 | - # Kernel tests are skipped. | ||
671 | - plan_tests $NUM_TESTS | ||
672 | - skip 0 "Root access is needed. Skipping all kernel notification tests." $NUM_TESTS | ||
673 | -fi | ||
674 | +stop_lttng_sessiond_notap | ||
675 | +rmmod lttng-test | ||
676 | |||
677 | rm -f "$TESTAPP_STATE_PATH" | ||
678 | diff --git a/tests/regression/tools/notification/test_notification_kernel_error b/tests/regression/tools/notification/test_notification_kernel_error | ||
679 | index 80fe6e5..b757ec2 100755 | ||
680 | --- a/tests/regression/tools/notification/test_notification_kernel_error | ||
681 | +++ b/tests/regression/tools/notification/test_notification_kernel_error | ||
682 | @@ -30,23 +30,22 @@ function test_basic_error_path | ||
683 | wait $APP_PID 2> /dev/null | ||
684 | } | ||
685 | |||
686 | +check_skip_kernel_test && | ||
687 | +{ | ||
688 | + plan_skip_all "Skipping all tests." | ||
689 | + exit 0 | ||
690 | +} | ||
691 | |||
692 | -if [ "$(id -u)" == "0" ]; then | ||
693 | - validate_lttng_modules_present | ||
694 | +validate_lttng_modules_present | ||
695 | |||
696 | - modprobe lttng-test | ||
697 | +modprobe lttng-test | ||
698 | |||
699 | - start_lttng_sessiond_notap | ||
700 | +start_lttng_sessiond_notap | ||
701 | |||
702 | - test_basic_error_path | ||
703 | +test_basic_error_path | ||
704 | |||
705 | - stop_lttng_sessiond_notap | ||
706 | - rmmod lttng-test | ||
707 | +stop_lttng_sessiond_notap | ||
708 | +rmmod lttng-test | ||
709 | |||
710 | -else | ||
711 | - # Kernel tests are skipped. | ||
712 | - plan_tests $NUM_TESTS | ||
713 | - skip 0 "Root access is needed. Skipping all kernel notification tests." $NUM_TESTS | ||
714 | -fi | ||
715 | |||
716 | rm -f "$TESTAPP_STATE_PATH" | ||
717 | diff --git a/tests/regression/tools/notification/test_notification_kernel_instrumentation b/tests/regression/tools/notification/test_notification_kernel_instrumentation | ||
718 | index 90545a5..705f770 100755 | ||
719 | --- a/tests/regression/tools/notification/test_notification_kernel_instrumentation | ||
720 | +++ b/tests/regression/tools/notification/test_notification_kernel_instrumentation | ||
721 | @@ -28,22 +28,21 @@ function test_kernel_instrumentation_notification | ||
722 | wait $APP_PID 2> /dev/null | ||
723 | } | ||
724 | |||
725 | -if [ "$(id -u)" == "0" ]; then | ||
726 | - validate_lttng_modules_present | ||
727 | +check_skip_kernel_test && | ||
728 | +{ | ||
729 | + plan_skip_all "Skipping all tests." | ||
730 | + exit 0 | ||
731 | +} | ||
732 | |||
733 | - modprobe lttng-test | ||
734 | +validate_lttng_modules_present | ||
735 | |||
736 | - start_lttng_sessiond_notap | ||
737 | +modprobe lttng-test | ||
738 | |||
739 | - test_kernel_instrumentation_notification | ||
740 | +start_lttng_sessiond_notap | ||
741 | |||
742 | - stop_lttng_sessiond_notap | ||
743 | - rmmod lttng-test | ||
744 | +test_kernel_instrumentation_notification | ||
745 | |||
746 | -else | ||
747 | - # Kernel tests are skipped. | ||
748 | - plan_tests $NUM_TESTS | ||
749 | - skip 0 "Root access is needed. Skipping all kernel notification tests." $NUM_TESTS | ||
750 | -fi | ||
751 | +stop_lttng_sessiond_notap | ||
752 | +rmmod lttng-test | ||
753 | |||
754 | rm -f "$TESTAPP_STATE_PATH" | ||
755 | diff --git a/tests/regression/tools/notification/test_notification_kernel_syscall b/tests/regression/tools/notification/test_notification_kernel_syscall | ||
756 | index d273cb5..7fa2353 100755 | ||
757 | --- a/tests/regression/tools/notification/test_notification_kernel_syscall | ||
758 | +++ b/tests/regression/tools/notification/test_notification_kernel_syscall | ||
759 | @@ -31,19 +31,18 @@ function test_kernel_syscall_notification | ||
760 | wait $APP_PID 2> /dev/null | ||
761 | } | ||
762 | |||
763 | -if [ "$(id -u)" == "0" ]; then | ||
764 | - validate_lttng_modules_present | ||
765 | +check_skip_kernel_test && | ||
766 | +{ | ||
767 | + plan_skip_all "Skipping all tests." | ||
768 | + exit 0 | ||
769 | +} | ||
770 | |||
771 | - start_lttng_sessiond_notap | ||
772 | +validate_lttng_modules_present | ||
773 | |||
774 | - test_kernel_syscall_notification | ||
775 | +start_lttng_sessiond_notap | ||
776 | |||
777 | - stop_lttng_sessiond_notap | ||
778 | +test_kernel_syscall_notification | ||
779 | |||
780 | -else | ||
781 | - # Kernel tests are skipped. | ||
782 | - plan_tests $NUM_TESTS | ||
783 | - skip 0 "Root access is needed. Skipping all kernel notification tests." $NUM_TESTS | ||
784 | -fi | ||
785 | +stop_lttng_sessiond_notap | ||
786 | |||
787 | rm -f "$TESTAPP_STATE_PATH" | ||
788 | diff --git a/tests/regression/tools/notification/test_notification_kernel_userspace_probe b/tests/regression/tools/notification/test_notification_kernel_userspace_probe | ||
789 | index 8ef8d70..abddd9b 100755 | ||
790 | --- a/tests/regression/tools/notification/test_notification_kernel_userspace_probe | ||
791 | +++ b/tests/regression/tools/notification/test_notification_kernel_userspace_probe | ||
792 | @@ -29,18 +29,18 @@ function test_kernel_userspace_probe_notification | ||
793 | wait $APP_PID 2> /dev/null | ||
794 | } | ||
795 | |||
796 | -if [ "$(id -u)" == "0" ]; then | ||
797 | - validate_lttng_modules_present | ||
798 | +check_skip_kernel_test && | ||
799 | +{ | ||
800 | + plan_skip_all "Skipping all tests." | ||
801 | + exit 0 | ||
802 | +} | ||
803 | + | ||
804 | +validate_lttng_modules_present | ||
805 | |||
806 | - start_lttng_sessiond_notap | ||
807 | +start_lttng_sessiond_notap | ||
808 | |||
809 | - test_kernel_userspace_probe_notification | ||
810 | +test_kernel_userspace_probe_notification | ||
811 | |||
812 | - stop_lttng_sessiond_notap | ||
813 | -else | ||
814 | - # Kernel tests are skipped. | ||
815 | - plan_tests $NUM_TESTS | ||
816 | - skip 0 "Root access is needed. Skipping all kernel notification tests." $NUM_TESTS | ||
817 | -fi | ||
818 | +stop_lttng_sessiond_notap | ||
819 | |||
820 | rm -f "$TESTAPP_STATE_PATH" | ||
821 | diff --git a/tests/regression/tools/notification/test_notification_multi_app b/tests/regression/tools/notification/test_notification_multi_app | ||
822 | index d8b6392..61891b5 100755 | ||
823 | --- a/tests/regression/tools/notification/test_notification_multi_app | ||
824 | +++ b/tests/regression/tools/notification/test_notification_multi_app | ||
825 | @@ -411,22 +411,18 @@ function test_on_register_evaluation () | ||
826 | rm -rf "$output_dir" | ||
827 | } | ||
828 | |||
829 | - | ||
830 | TESTS=( | ||
831 | test_multi_app_ust | ||
832 | test_on_register_evaluation_ust | ||
833 | ) | ||
834 | |||
835 | -if [ "$(id -u)" == "0" ]; then | ||
836 | +check_skip_kernel_test "$NUM_TEST_KERNEL" "Skipping kernel multi-app notification tests." || { | ||
837 | validate_lttng_modules_present | ||
838 | TESTS+=( | ||
839 | - test_multi_app_kernel | ||
840 | - test_on_register_evaluation_kernel | ||
841 | -) | ||
842 | -else | ||
843 | - skip 0 "Root access is needed. Skipping all kernel multi-app notification tests." $NUM_TEST_KERNEL | ||
844 | -fi | ||
845 | - | ||
846 | + test_multi_app_kernel | ||
847 | + test_on_register_evaluation_kernel | ||
848 | + ) | ||
849 | +} | ||
850 | |||
851 | for fct_test in ${TESTS[@]}; | ||
852 | do | ||
853 | diff --git a/tests/regression/tools/notification/test_notification_notifier_discarded_count b/tests/regression/tools/notification/test_notification_notifier_discarded_count | ||
854 | index 9850b49..778d37d 100755 | ||
855 | --- a/tests/regression/tools/notification/test_notification_notifier_discarded_count | ||
856 | +++ b/tests/regression/tools/notification/test_notification_notifier_discarded_count | ||
857 | @@ -376,7 +376,8 @@ function test_ust_notifier_discarded_regardless_trigger_owner | ||
858 | test_ust_notifier_discarded_count | ||
859 | test_ust_notifier_discarded_count_max_bucket | ||
860 | |||
861 | -if [ "$(id -u)" == "0" ]; then | ||
862 | +check_skip_kernel_test "$KERNEL_NUM_TESTS" "Skipping kernel notification tests." || | ||
863 | +{ | ||
864 | |||
865 | validate_lttng_modules_present | ||
866 | |||
867 | @@ -398,9 +399,7 @@ if [ "$(id -u)" == "0" ]; then | ||
868 | modprobe --remove lttng-test | ||
869 | |||
870 | rm -rf "${sessiond_pipe[@]}" 2> /dev/null | ||
871 | -else | ||
872 | - # Kernel tests are skipped. | ||
873 | - skip 0 "Root access is needed. Skipping all kernel notification tests." $KERNEL_NUM_TESTS | ||
874 | -fi | ||
875 | + | ||
876 | +} | ||
877 | |||
878 | rm -rf "$TEST_TMPDIR" | ||
879 | diff --git a/tests/regression/tools/regen-metadata/test_kernel b/tests/regression/tools/regen-metadata/test_kernel | ||
880 | index 49eea32..555a4e2 100755 | ||
881 | --- a/tests/regression/tools/regen-metadata/test_kernel | ||
882 | +++ b/tests/regression/tools/regen-metadata/test_kernel | ||
883 | @@ -99,13 +99,7 @@ plan_tests $NUM_TESTS | ||
884 | |||
885 | print_test_banner "$TEST_DESC" | ||
886 | |||
887 | -if [ "$(id -u)" == "0" ]; then | ||
888 | - isroot=1 | ||
889 | -else | ||
890 | - isroot=0 | ||
891 | -fi | ||
892 | - | ||
893 | -skip $isroot "Root access is needed. Skipping all kernel streaming tests." $NUM_TESTS || | ||
894 | +check_skip_kernel_test "$NUM_TESTS" "Skipping all tests." || | ||
895 | { | ||
896 | validate_lttng_modules_present | ||
897 | |||
898 | diff --git a/tests/regression/tools/regen-statedump/test_kernel b/tests/regression/tools/regen-statedump/test_kernel | ||
899 | index 8a26135..bbbac39 100755 | ||
900 | --- a/tests/regression/tools/regen-statedump/test_kernel | ||
901 | +++ b/tests/regression/tools/regen-statedump/test_kernel | ||
902 | @@ -39,13 +39,7 @@ plan_tests $NUM_TESTS | ||
903 | |||
904 | print_test_banner "$TEST_DESC" | ||
905 | |||
906 | -if [ "$(id -u)" == "0" ]; then | ||
907 | - isroot=1 | ||
908 | -else | ||
909 | - isroot=0 | ||
910 | -fi | ||
911 | - | ||
912 | -skip $isroot "Root access is needed. Skipping all kernel streaming tests." $NUM_TESTS || | ||
913 | +check_skip_kernel_test "$NUM_TESTS" "Skipping all tests." || | ||
914 | { | ||
915 | validate_lttng_modules_present | ||
916 | start_lttng_sessiond | ||
917 | diff --git a/tests/regression/tools/rotation/test_kernel b/tests/regression/tools/rotation/test_kernel | ||
918 | index f5f1f55..efe3fd3 100755 | ||
919 | --- a/tests/regression/tools/rotation/test_kernel | ||
920 | +++ b/tests/regression/tools/rotation/test_kernel | ||
921 | @@ -82,13 +82,7 @@ plan_tests $NUM_TESTS | ||
922 | |||
923 | print_test_banner "$TEST_DESC" | ||
924 | |||
925 | -if [ "$(id -u)" == "0" ]; then | ||
926 | - isroot=1 | ||
927 | -else | ||
928 | - isroot=0 | ||
929 | -fi | ||
930 | - | ||
931 | -skip $isroot "Root access is needed. Skipping all kernel streaming tests." $NUM_TESTS || | ||
932 | +check_skip_kernel_test "$NUM_TESTS" "Skipping all tests." || | ||
933 | { | ||
934 | validate_lttng_modules_present | ||
935 | |||
936 | diff --git a/tests/regression/tools/snapshots/test_kernel b/tests/regression/tools/snapshots/test_kernel | ||
937 | index abb2435..d918768 100755 | ||
938 | --- a/tests/regression/tools/snapshots/test_kernel | ||
939 | +++ b/tests/regression/tools/snapshots/test_kernel | ||
940 | @@ -217,13 +217,7 @@ plan_tests $NUM_TESTS | ||
941 | |||
942 | print_test_banner "$TEST_DESC" | ||
943 | |||
944 | -if [ "$(id -u)" == "0" ]; then | ||
945 | - isroot=1 | ||
946 | -else | ||
947 | - isroot=0 | ||
948 | -fi | ||
949 | - | ||
950 | -skip $isroot "Root access is needed. Skipping all kernel snapshot tests" $NUM_TESTS || | ||
951 | +check_skip_kernel_test "$NUM_TESTS" "Skipping all tests." || | ||
952 | { | ||
953 | |||
954 | validate_lttng_modules_present | ||
955 | diff --git a/tests/regression/tools/snapshots/test_kernel_streaming b/tests/regression/tools/snapshots/test_kernel_streaming | ||
956 | index 0c92dc7..dd965af 100755 | ||
957 | --- a/tests/regression/tools/snapshots/test_kernel_streaming | ||
958 | +++ b/tests/regression/tools/snapshots/test_kernel_streaming | ||
959 | @@ -145,13 +145,7 @@ plan_tests $NUM_TESTS | ||
960 | |||
961 | print_test_banner "$TEST_DESC" | ||
962 | |||
963 | -if [ "$(id -u)" == "0" ]; then | ||
964 | - isroot=1 | ||
965 | -else | ||
966 | - isroot=0 | ||
967 | -fi | ||
968 | - | ||
969 | -skip $isroot "Root access is needed. Skipping all kernel streaming tests" $NUM_TESTS || | ||
970 | +check_skip_kernel_test $NUM_TESTS "Skipping all tests." || | ||
971 | { | ||
972 | validate_lttng_modules_present | ||
973 | |||
974 | diff --git a/tests/regression/tools/streaming/test_high_throughput_limits b/tests/regression/tools/streaming/test_high_throughput_limits | ||
975 | index 2b9e3ad..c55d510 100755 | ||
976 | --- a/tests/regression/tools/streaming/test_high_throughput_limits | ||
977 | +++ b/tests/regression/tools/streaming/test_high_throughput_limits | ||
978 | @@ -170,13 +170,7 @@ plan_tests $NUM_TESTS | ||
979 | |||
980 | print_test_banner "$TEST_DESC" | ||
981 | |||
982 | -if [ "$(id -u)" == "0" ]; then | ||
983 | - isroot=1 | ||
984 | -else | ||
985 | - isroot=0 | ||
986 | -fi | ||
987 | - | ||
988 | -skip $isroot "Root access is needed to set bandwith limits. Skipping all tests." $NUM_TESTS || | ||
989 | +check_skip_kernel_test "$NUM_TESTS" "Skipping all tests." || | ||
990 | { | ||
991 | |||
992 | # Catch sigint and try to cleanup limits | ||
993 | diff --git a/tests/regression/tools/streaming/test_kernel b/tests/regression/tools/streaming/test_kernel | ||
994 | index 3333422..113eea7 100755 | ||
995 | --- a/tests/regression/tools/streaming/test_kernel | ||
996 | +++ b/tests/regression/tools/streaming/test_kernel | ||
997 | @@ -47,13 +47,7 @@ plan_tests $NUM_TESTS | ||
998 | |||
999 | print_test_banner "$TEST_DESC" | ||
1000 | |||
1001 | -if [ "$(id -u)" == "0" ]; then | ||
1002 | - isroot=1 | ||
1003 | -else | ||
1004 | - isroot=0 | ||
1005 | -fi | ||
1006 | - | ||
1007 | -skip $isroot "Root access is needed. Skipping all kernel streaming tests." $NUM_TESTS || | ||
1008 | +check_skip_kernel_test "$NUM_TESTS" "Skipping all tests." || | ||
1009 | { | ||
1010 | validate_lttng_modules_present | ||
1011 | |||
1012 | diff --git a/tests/regression/tools/tracker/test_event_tracker b/tests/regression/tools/tracker/test_event_tracker | ||
1013 | index cc0f698..de0c79d 100755 | ||
1014 | --- a/tests/regression/tools/tracker/test_event_tracker | ||
1015 | +++ b/tests/regression/tools/tracker/test_event_tracker | ||
1016 | @@ -466,13 +466,7 @@ test_event_track_untrack ust 0 "${EVENT_NAME}" "--pid --all" # backward compat | ||
1017 | test_event_tracker ust 1 "${EVENT_NAME}" "--pid --all" # backward compat | ||
1018 | test_event_pid_tracker ust 1 "${EVENT_NAME}" | ||
1019 | |||
1020 | -if [ "$(id -u)" == "0" ]; then | ||
1021 | - isroot=1 | ||
1022 | -else | ||
1023 | - isroot=0 | ||
1024 | -fi | ||
1025 | - | ||
1026 | -skip $isroot "Root access is needed. Skipping all kernel tracker tests." $NUM_KERNEL_TESTS || | ||
1027 | +check_skip_kernel_test "$NUM_KERNEL_TESTS" "Skipping kernel tracker tests." || | ||
1028 | { | ||
1029 | diag "Test kernel tracker" | ||
1030 | |||
1031 | diff --git a/tests/regression/tools/trigger/test_add_trigger_cli b/tests/regression/tools/trigger/test_add_trigger_cli | ||
1032 | index 98ecf62..d1763aa 100755 | ||
1033 | --- a/tests/regression/tools/trigger/test_add_trigger_cli | ||
1034 | +++ b/tests/regression/tools/trigger/test_add_trigger_cli | ||
1035 | @@ -34,12 +34,6 @@ tmp_stdout=$(mktemp --tmpdir -t test_parse_cli_trigger_stdout.XXXXXX) | ||
1036 | tmp_stderr=$(mktemp --tmpdir -t test_parse_cli_trigger_stderr.XXXXXX) | ||
1037 | uprobe_elf_binary="${TESTDIR}/utils/testapp/userspace-probe-elf-binary/.libs/userspace-probe-elf-binary" | ||
1038 | |||
1039 | -if [ "$(id -u)" == "0" ]; then | ||
1040 | - ist_root=1 | ||
1041 | -else | ||
1042 | - ist_root=0 | ||
1043 | -fi | ||
1044 | - | ||
1045 | function test_success () | ||
1046 | { | ||
1047 | local test_name="$1" | ||
1048 | @@ -223,7 +217,7 @@ test_success "--exclude-name two" "trigger5" \ | ||
1049 | --condition event-rule-matches --type=user --name='jean-*' --exclude-name jean-chretien -x jean-charest \ | ||
1050 | --action notify | ||
1051 | |||
1052 | -skip $ist_root "non-root user: skipping kprobe tests" 18 || { | ||
1053 | +check_skip_kernel_test 18 "Skipping kprobe tests." || { | ||
1054 | i=0 | ||
1055 | |||
1056 | for type in kprobe kernel:kprobe; do | ||
1057 | @@ -262,7 +256,7 @@ skip $ist_root "non-root user: skipping kprobe tests" 18 || { | ||
1058 | done | ||
1059 | } | ||
1060 | |||
1061 | -skip $ist_root "non-root user: skipping uprobe tests" 6 || { | ||
1062 | +check_skip_kernel_test 6 "Skipping uprobe tests." || { | ||
1063 | test_success "--condition event-rule-matches uprobe" "uprobe-trigger-0" \ | ||
1064 | --name="uprobe-trigger-0" \ | ||
1065 | --condition event-rule-matches --type=kernel:uprobe --location=${uprobe_elf_binary}:test_function --event-name=ma-probe \ | ||
1066 | @@ -274,7 +268,7 @@ skip $ist_root "non-root user: skipping uprobe tests" 6 || { | ||
1067 | --action notify | ||
1068 | } | ||
1069 | |||
1070 | -skip $ist_root "non-root user: skipping syscall tests" 30 || { | ||
1071 | +check_skip_kernel_test 30 "Skipping syscall tests." || { | ||
1072 | test_success "--condition event-rule-matches one syscall" "syscall-trigger-0" \ | ||
1073 | --name="syscall-trigger-0" \ | ||
1074 | --condition event-rule-matches --type=syscall --name=open \ | ||
1075 | diff --git a/tests/regression/tools/trigger/test_list_triggers_cli b/tests/regression/tools/trigger/test_list_triggers_cli | ||
1076 | index 2574e15..652a08c 100755 | ||
1077 | --- a/tests/regression/tools/trigger/test_list_triggers_cli | ||
1078 | +++ b/tests/regression/tools/trigger/test_list_triggers_cli | ||
1079 | @@ -36,22 +36,12 @@ uprobe_sdt_binary=$(realpath "${TESTDIR}/utils/testapp/userspace-probe-sdt-binar | ||
1080 | register_some_triggers_bin=$(realpath "${CURDIR}/utils/register-some-triggers") | ||
1081 | |||
1082 | uid=$(id --user) | ||
1083 | -gid=$(id --group) | ||
1084 | |||
1085 | -if [ "$uid" == "0" ]; then | ||
1086 | - ist_root=1 | ||
1087 | - ls "$uprobe_sdt_binary" >/dev/null 2>&1 | ||
1088 | - if test $? == 0; then | ||
1089 | - hast_sdt_binary=1 | ||
1090 | - else | ||
1091 | - hast_sdt_binary=0 | ||
1092 | - fi | ||
1093 | -else | ||
1094 | - ist_root=0 | ||
1095 | - hast_sdt_binary=0 | ||
1096 | +sdt_binary_present=0 | ||
1097 | +if [ -f "$uprobe_sdt_binary" ]; then | ||
1098 | + sdt_binary_present=1 | ||
1099 | fi | ||
1100 | |||
1101 | - | ||
1102 | test_top_level_options () | ||
1103 | { | ||
1104 | diag "Listing top level options" | ||
1105 | @@ -2695,10 +2685,12 @@ start_lttng_sessiond_notap | ||
1106 | |||
1107 | test_top_level_options | ||
1108 | test_event_rule_matches_tracepoint | ||
1109 | -skip $ist_root "non-root user: skipping kprobe tests" 13 || test_event_rule_matches_probe | ||
1110 | -skip $ist_root "non-root user: skipping uprobe tests" 9 || test_event_rule_matches_userspace_probe_elf | ||
1111 | -skip $(($ist_root && $hast_sdt_binary)) "skipping userspace probe SDT tests" 9 || test_event_rule_matches_userspace_probe_sdt | ||
1112 | -skip $ist_root "non-root user: skipping syscall tests" 17 || test_event_rule_matches_syscall | ||
1113 | +check_skip_kernel_test 48 "Skipping kprobe, uprobe, SDT and syscall tests." || { | ||
1114 | + test_event_rule_matches_probe | ||
1115 | + test_event_rule_matches_userspace_probe_elf | ||
1116 | + skip $sdt_binary_present "No SDT binary. Skipping userspace probe SDT tests" 9 || test_event_rule_matches_userspace_probe_sdt | ||
1117 | + test_event_rule_matches_syscall | ||
1118 | +} | ||
1119 | test_session_consumed_size_condition | ||
1120 | test_buffer_usage_conditions | ||
1121 | test_session_rotation_conditions | ||
1122 | diff --git a/tests/regression/tools/wildcard/test_event_wildcard b/tests/regression/tools/wildcard/test_event_wildcard | ||
1123 | index f69baff..14d9bb8 100755 | ||
1124 | --- a/tests/regression/tools/wildcard/test_event_wildcard | ||
1125 | +++ b/tests/regression/tools/wildcard/test_event_wildcard | ||
1126 | @@ -124,13 +124,7 @@ test_event_wildcard ust 1 'tp*tptest' | ||
1127 | test_event_wildcard ust 1 'tp**tptest' | ||
1128 | test_event_wildcard ust 1 'tp*test' | ||
1129 | |||
1130 | -if [ "$(id -u)" == "0" ]; then | ||
1131 | - isroot=1 | ||
1132 | -else | ||
1133 | - isroot=0 | ||
1134 | -fi | ||
1135 | - | ||
1136 | -skip $isroot "Root access is needed. Skipping all kernel wildcard tests." $NUM_KERNEL_TESTS || | ||
1137 | +check_skip_kernel_test "$NUM_KERNEL_TESTS" "Skipping kernel wildcard tests." || | ||
1138 | { | ||
1139 | diag "Test kernel wildcards" | ||
1140 | |||
1141 | diff --git a/tests/regression/tools/working-directory/test_relayd_working_directory b/tests/regression/tools/working-directory/test_relayd_working_directory | ||
1142 | index c7e784c..6bd1e50 100755 | ||
1143 | --- a/tests/regression/tools/working-directory/test_relayd_working_directory | ||
1144 | +++ b/tests/regression/tools/working-directory/test_relayd_working_directory | ||
1145 | @@ -145,9 +145,9 @@ function test_relayd_debug_permission() | ||
1146 | diag "Test lttng-relayd change working directory on non writable directory" | ||
1147 | |||
1148 | if [ "$(id -u)" == "0" ]; then | ||
1149 | - is_user=0 | ||
1150 | + is_user=0 | ||
1151 | else | ||
1152 | - is_user=1 | ||
1153 | + is_user=1 | ||
1154 | fi | ||
1155 | |||
1156 | skip $is_user "Skipping permission debug output test; operation can't fail as root" 6 || | ||
1157 | diff --git a/tests/regression/ust/namespaces/test_ns_contexts_change b/tests/regression/ust/namespaces/test_ns_contexts_change | ||
1158 | index 8a4b62c..622241f 100755 | ||
1159 | --- a/tests/regression/ust/namespaces/test_ns_contexts_change | ||
1160 | +++ b/tests/regression/ust/namespaces/test_ns_contexts_change | ||
1161 | @@ -101,12 +101,7 @@ plan_tests $NUM_TESTS | ||
1162 | |||
1163 | print_test_banner "$TEST_DESC" | ||
1164 | |||
1165 | -isroot=0 | ||
1166 | -if [ "$(id -u)" == "0" ]; then | ||
1167 | - isroot=1 | ||
1168 | -fi | ||
1169 | - | ||
1170 | -skip $isroot "Root access is needed. Skipping all tests." "$NUM_TESTS" && exit 0 | ||
1171 | +check_skip_kernel_test "$NUM_TESTS" "Skipping all tests." && exit 0 | ||
1172 | |||
1173 | system_has_ns=0 | ||
1174 | if [ -d "/proc/$$/ns" ]; then | ||
1175 | diff --git a/tests/regression/ust/test_event_perf b/tests/regression/ust/test_event_perf | ||
1176 | index 33aab29..178959a 100755 | ||
1177 | --- a/tests/regression/ust/test_event_perf | ||
1178 | +++ b/tests/regression/ust/test_event_perf | ||
1179 | @@ -119,17 +119,11 @@ plan_tests $NUM_TESTS | ||
1180 | |||
1181 | print_test_banner "$TEST_DESC" | ||
1182 | |||
1183 | -if [ "$(id -u)" == "0" ]; then | ||
1184 | - isroot=1 | ||
1185 | -else | ||
1186 | - isroot=0 | ||
1187 | -fi | ||
1188 | - | ||
1189 | start_lttng_sessiond | ||
1190 | |||
1191 | test_parsing_raw | ||
1192 | |||
1193 | -skip $isroot "Root access is needed. Skipping UST perf tests." 8 || | ||
1194 | +check_skip_kernel_test 8 "Skipping UST perf tests." || | ||
1195 | { | ||
1196 | test_event_basic | ||
1197 | } | ||
1198 | diff --git a/tests/utils/utils.sh b/tests/utils/utils.sh | ||
1199 | index 35633fa..b6783ef 100644 | ||
1200 | --- a/tests/utils/utils.sh | ||
1201 | +++ b/tests/utils/utils.sh | ||
1202 | @@ -329,6 +329,41 @@ function conf_proc_count() | ||
1203 | echo | ||
1204 | } | ||
1205 | |||
1206 | +# Usage: | ||
1207 | +# check_skip_kernel_test [NB_TESTS] [SKIP_MESSAGE] | ||
1208 | +# Return 0 if LTTNG_TOOLS_DISABLE_KERNEL_TESTS was set or the current user is not a root user | ||
1209 | +# If NB_TESTS is set, call skip() to skip number of tests. | ||
1210 | +# If NB_TESTS is empty, just output a reason with diag. | ||
1211 | +# An optional message can be added. | ||
1212 | + | ||
1213 | +function check_skip_kernel_test () | ||
1214 | +{ | ||
1215 | + local num_tests="$1" | ||
1216 | + local skip_message="$2" | ||
1217 | + | ||
1218 | + # Check for skip test kernel flag | ||
1219 | + if [ "$LTTNG_TOOLS_DISABLE_KERNEL_TESTS" == "1" ]; then | ||
1220 | + if ! test -z "$num_tests"; then | ||
1221 | + skip 0 "LTTNG_TOOLS_DISABLE_KERNEL_TESTS was set.${skip_message+ }${skip_message}" "$num_tests" | ||
1222 | + else | ||
1223 | + diag "LTTNG_TOOLS_DISABLE_KERNEL_TESTS was set.${skip_message+ }${skip_message}" | ||
1224 | + fi | ||
1225 | + return 0 | ||
1226 | + fi | ||
1227 | + | ||
1228 | + # Check if we are running as root | ||
1229 | + if [ "$(id -u)" != "0" ]; then | ||
1230 | + if ! test -z "$num_tests"; then | ||
1231 | + skip 0 "Root access is needed for kernel testing.${skip_message+ }${skip_message}" "$num_tests" | ||
1232 | + else | ||
1233 | + diag "Root access is needed for kernel testing.${skip_message+ }${skip_message}" | ||
1234 | + fi | ||
1235 | + return 0 | ||
1236 | + fi | ||
1237 | + | ||
1238 | + return 1 | ||
1239 | +} | ||
1240 | + | ||
1241 | # Check if base lttng-modules are present. | ||
1242 | # Bail out on failure | ||
1243 | function validate_lttng_modules_present () | ||
diff --git a/meta/recipes-kernel/lttng/lttng-tools/0001-tests-do-not-strip-a-helper-library.patch b/meta/recipes-kernel/lttng/lttng-tools/0001-tests-do-not-strip-a-helper-library.patch index 2d08b08879..84c02a02cf 100644 --- a/meta/recipes-kernel/lttng/lttng-tools/0001-tests-do-not-strip-a-helper-library.patch +++ b/meta/recipes-kernel/lttng/lttng-tools/0001-tests-do-not-strip-a-helper-library.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From ab238c213fac190972f55e73cf3e0bb1c7846eb8 Mon Sep 17 00:00:00 2001 | 1 | From 3f1f1dc868accca37d2f276ed741884698b38538 Mon Sep 17 00:00:00 2001 |
2 | From: Alexander Kanavin <alex.kanavin@gmail.com> | 2 | From: Alexander Kanavin <alex.kanavin@gmail.com> |
3 | Date: Thu, 12 Dec 2019 16:52:07 +0100 | 3 | Date: Thu, 12 Dec 2019 16:52:07 +0100 |
4 | Subject: [PATCH] tests: do not strip a helper library | 4 | Subject: [PATCH] tests: do not strip a helper library |
@@ -10,10 +10,10 @@ Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com> | |||
10 | 1 file changed, 1 insertion(+), 1 deletion(-) | 10 | 1 file changed, 1 insertion(+), 1 deletion(-) |
11 | 11 | ||
12 | diff --git a/tests/utils/testapp/userspace-probe-elf-binary/Makefile.am b/tests/utils/testapp/userspace-probe-elf-binary/Makefile.am | 12 | diff --git a/tests/utils/testapp/userspace-probe-elf-binary/Makefile.am b/tests/utils/testapp/userspace-probe-elf-binary/Makefile.am |
13 | index 03f5d5a..d12c343 100644 | 13 | index 836f13e..e19a554 100644 |
14 | --- a/tests/utils/testapp/userspace-probe-elf-binary/Makefile.am | 14 | --- a/tests/utils/testapp/userspace-probe-elf-binary/Makefile.am |
15 | +++ b/tests/utils/testapp/userspace-probe-elf-binary/Makefile.am | 15 | +++ b/tests/utils/testapp/userspace-probe-elf-binary/Makefile.am |
16 | @@ -12,7 +12,7 @@ userspace_probe_elf_binary_LDADD = libfoo.la | 16 | @@ -14,7 +14,7 @@ userspace_probe_elf_binary_LDADD = libfoo.la |
17 | libfoo.strip: libfoo.la | 17 | libfoo.strip: libfoo.la |
18 | $(OBJCOPY) --strip-all .libs/libfoo.so | 18 | $(OBJCOPY) --strip-all .libs/libfoo.so |
19 | 19 | ||
@@ -22,6 +22,3 @@ index 03f5d5a..d12c343 100644 | |||
22 | @if [ x"$(srcdir)" != x"$(builddir)" ]; then \ | 22 | @if [ x"$(srcdir)" != x"$(builddir)" ]; then \ |
23 | for script in $(EXTRA_DIST); do \ | 23 | for script in $(EXTRA_DIST); do \ |
24 | cp -f $(srcdir)/$$script $(builddir); \ | 24 | cp -f $(srcdir)/$$script $(builddir); \ |
25 | -- | ||
26 | 2.17.1 | ||
27 | |||
diff --git a/meta/recipes-kernel/lttng/lttng-tools/determinism.patch b/meta/recipes-kernel/lttng/lttng-tools/determinism.patch deleted file mode 100644 index b2ab880bd6..0000000000 --- a/meta/recipes-kernel/lttng/lttng-tools/determinism.patch +++ /dev/null | |||
@@ -1,64 +0,0 @@ | |||
1 | This is a bit ugly. Specifing abs_builddir as an RPATH is plain wrong when | ||
2 | cross compiling. Sadly, removing the rpath makes libtool/automake do | ||
3 | weird things and breaks the build as shared libs are no longer generated. | ||
4 | |||
5 | We already try and delete the RPATH at do_install with chrpath however | ||
6 | that does leave the path in the string table so it doesn't help us | ||
7 | with reproducibility. | ||
8 | |||
9 | Instead, hack in a bogus but harmless path, then delete it later in | ||
10 | our do_install. Ultimately we may want to pass a specific path to use | ||
11 | to configure if we really do need to set an RPATH at all. It is unclear | ||
12 | to me whether the tests need that or not. | ||
13 | |||
14 | Fixes reproducibility issues for lttng-tools. | ||
15 | |||
16 | Upstream-Status: Pending [needs discussion with upstream about the correct solution] | ||
17 | RP 2021/3/1 | ||
18 | |||
19 | Index: lttng-tools-2.12.2/tests/regression/ust/ust-dl/Makefile.am | ||
20 | =================================================================== | ||
21 | --- lttng-tools-2.12.2.orig/tests/regression/ust/ust-dl/Makefile.am | ||
22 | +++ lttng-tools-2.12.2/tests/regression/ust/ust-dl/Makefile.am | ||
23 | @@ -27,16 +27,16 @@ noinst_LTLIBRARIES = libzzz.la libbar.la | ||
24 | |||
25 | libzzz_la_SOURCES = libzzz.c libzzz.h | ||
26 | libzzz_la_LDFLAGS = -module -shared -avoid-version \ | ||
27 | - -rpath $(abs_builddir) | ||
28 | + -rpath /usr/lib | ||
29 | |||
30 | libbar_la_SOURCES = libbar.c libbar.h | ||
31 | libbar_la_LDFLAGS = -module -shared -avoid-version \ | ||
32 | - -rpath $(abs_builddir) | ||
33 | + -rpath /usr/lib | ||
34 | libbar_la_LIBADD = libzzz.la | ||
35 | |||
36 | libfoo_la_SOURCES = libfoo.c libfoo.h | ||
37 | libfoo_la_LDFLAGS = -module -shared -avoid-version \ | ||
38 | - -rpath $(abs_builddir) | ||
39 | + -rpath /usr/lib | ||
40 | libfoo_la_LIBADD = libbar.la | ||
41 | |||
42 | CLEANFILES = libfoo.so libfoo.so.debug libbar.so libbar.so.debug \ | ||
43 | @@ -44,7 +44,7 @@ CLEANFILES = libfoo.so libfoo.so.debug l | ||
44 | |||
45 | libtp_la_SOURCES = libbar-tp.h libbar-tp.c libfoo-tp.h libfoo-tp.c \ | ||
46 | libzzz-tp.h libzzz-tp.c | ||
47 | -libtp_la_LDFLAGS = -module -shared -rpath $(abs_builddir) | ||
48 | +libtp_la_LDFLAGS = -module -shared -rpath /usr/lib | ||
49 | |||
50 | # Extract debug symbols | ||
51 | libfoo.so.debug: libfoo.la | ||
52 | Index: lttng-tools-2.12.2/tests/utils/testapp/userspace-probe-elf-binary/Makefile.am | ||
53 | =================================================================== | ||
54 | --- lttng-tools-2.12.2.orig/tests/utils/testapp/userspace-probe-elf-binary/Makefile.am | ||
55 | +++ lttng-tools-2.12.2/tests/utils/testapp/userspace-probe-elf-binary/Makefile.am | ||
56 | @@ -5,7 +5,7 @@ AM_CFLAGS += -O0 | ||
57 | noinst_LTLIBRARIES = libfoo.la | ||
58 | |||
59 | libfoo_la_SOURCES = foo.c foo.h | ||
60 | -libfoo_la_LDFLAGS = -shared -module -avoid-version -rpath $(abs_builddir)/.libs/ | ||
61 | +libfoo_la_LDFLAGS = -shared -module -avoid-version -rpath /usr/lib | ||
62 | |||
63 | noinst_PROGRAMS = userspace-probe-elf-binary | ||
64 | userspace_probe_elf_binary_SOURCES = userspace-probe-elf-binary.c | ||
diff --git a/meta/recipes-kernel/lttng/lttng-tools/disable-tests.patch b/meta/recipes-kernel/lttng/lttng-tools/disable-tests.patch new file mode 100644 index 0000000000..b8971a69de --- /dev/null +++ b/meta/recipes-kernel/lttng/lttng-tools/disable-tests.patch | |||
@@ -0,0 +1,42 @@ | |||
1 | From 1fbd24512e8fce64b92efa846c301e45a7371ed2 Mon Sep 17 00:00:00 2001 | ||
2 | From: Richard Purdie <richard.purdie@linuxfoundation.org> | ||
3 | Date: Tue, 14 Dec 2021 12:34:04 +0000 | ||
4 | Subject: [PATCH] lttng-tools: Disable problem tests | ||
5 | |||
6 | Upstream-Status: Inappropriate [need to root cause the test hangs] | ||
7 | |||
8 | We keep seeing hangs in the tools/notifications tests on x86 and arm for | ||
9 | a variety of distros. Exclude them for now to work out if this is the | ||
10 | only place we see them and give SWAT/triage a break from the stream | ||
11 | of them. | ||
12 | |||
13 | https://bugzilla.yoctoproject.org/show_bug.cgi?id=14263 | ||
14 | |||
15 | Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> | ||
16 | --- | ||
17 | tests/regression/Makefile.am | 12 ------------ | ||
18 | 1 file changed, 12 deletions(-) | ||
19 | |||
20 | diff --git a/tests/regression/Makefile.am b/tests/regression/Makefile.am | ||
21 | index e556223..756fb98 100644 | ||
22 | --- a/tests/regression/Makefile.am | ||
23 | +++ b/tests/regression/Makefile.am | ||
24 | @@ -29,18 +29,6 @@ TESTS = tools/base-path/test_ust \ | ||
25 | tools/crash/test_crash \ | ||
26 | tools/regen-metadata/test_ust \ | ||
27 | tools/regen-statedump/test_ust \ | ||
28 | - tools/notification/test_notification_ust_error \ | ||
29 | - tools/notification/test_notification_ust_buffer_usage \ | ||
30 | - tools/notification/test_notification_ust_capture \ | ||
31 | - tools/notification/test_notification_ust_event_rule_condition_exclusion \ | ||
32 | - tools/notification/test_notification_kernel_error \ | ||
33 | - tools/notification/test_notification_kernel_buffer_usage \ | ||
34 | - tools/notification/test_notification_kernel_capture \ | ||
35 | - tools/notification/test_notification_kernel_instrumentation \ | ||
36 | - tools/notification/test_notification_kernel_syscall \ | ||
37 | - tools/notification/test_notification_notifier_discarded_count \ | ||
38 | - tools/notification/test_notification_kernel_userspace_probe \ | ||
39 | - tools/notification/test_notification_multi_app \ | ||
40 | tools/rotation/test_ust \ | ||
41 | tools/rotation/test_kernel \ | ||
42 | tools/rotation/test_save_load_mi \ | ||
diff --git a/meta/recipes-kernel/lttng/lttng-tools/run-ptest b/meta/recipes-kernel/lttng/lttng-tools/run-ptest index c4dbe50f21..39d93e2bbf 100755 --- a/meta/recipes-kernel/lttng/lttng-tools/run-ptest +++ b/meta/recipes-kernel/lttng/lttng-tools/run-ptest | |||
@@ -1,7 +1,45 @@ | |||
1 | #!/bin/sh | 1 | #!/bin/sh |
2 | # Without --ignore-exit, the tap harness causes any FAILs within a | 2 | # Without --ignore-exit, the tap harness causes any FAILs within a |
3 | # test plan to raise ERRORs; this is just noise. | 3 | # test plan to raise ERRORs; this is just noise. |
4 | |||
5 | #Detecting whether current system has lttng kernel modules | ||
6 | LTTNG_KMOD_PATH=/lib/modules/$(uname -r)/kernel/lttng-modules/lttng-tracer.ko | ||
7 | function validate_lttng_modules_present() | ||
8 | { | ||
9 | # Check for loadable modules. | ||
10 | if [ -f "$LTTNG_KMOD_PATH" ]; then | ||
11 | return 0 | ||
12 | fi | ||
13 | |||
14 | # Check for builtin modules. | ||
15 | ls /proc/lttng > /dev/null 2>&1 | ||
16 | if [ $? -eq 0 ]; then | ||
17 | return 0 | ||
18 | fi | ||
19 | |||
20 | return 1 | ||
21 | } | ||
22 | |||
4 | export LD_LIBRARY_PATH=FIXMEPTESTPATH/tests/utils/testapp/userspace-probe-elf-binary/.libs | 23 | export LD_LIBRARY_PATH=FIXMEPTESTPATH/tests/utils/testapp/userspace-probe-elf-binary/.libs |
5 | makeargs="LOG_DRIVER_FLAGS=--ignore-exit top_srcdir=$PWD top_builddir=$PWD" | 24 | makeargs="LOG_DRIVER_FLAGS=--ignore-exit top_srcdir=FIXMEPTESTPATH top_builddir=FIXMEPTESTPATH" |
6 | make -k -t all >/dev/null 2>&1 | 25 | |
7 | exec make -k -s $makeargs check 2>/dev/null | sed -e 's#/tmp/tmp\...........#/tmp/tmp.XXXXXXXXXX#g' | 26 | #If current system doesn't have lttng kernel modules, disable lttng kernel related tests. |
27 | validate_lttng_modules_present || { | ||
28 | makeargs="$makeargs LTTNG_TOOLS_DISABLE_KERNEL_TESTS=1" | ||
29 | } | ||
30 | |||
31 | make -k -t all >error.log 2>&1 | ||
32 | # Can specify a test e.g.: | ||
33 | # -C tests/regression/ check TESTS='kernel/test_callstack' | ||
34 | make -k -s $makeargs check 2>error.log | sed -e 's#/tmp/tmp\...........#/tmp/tmp.XXXXXXXXXX#g' | ||
35 | exitcode=$? | ||
36 | if [ -e error.log ]; then | ||
37 | cat error.log | ||
38 | fi | ||
39 | if [ -e tests/unit/test-suite.log ]; then | ||
40 | cat tests/unit/test-suite.log | ||
41 | fi | ||
42 | if [ -e tests/regression/test-suite.log ]; then | ||
43 | cat tests/regression/test-suite.log | ||
44 | fi | ||
45 | exit $exitcode | ||
diff --git a/meta/recipes-kernel/lttng/lttng-tools_2.13.1.bb b/meta/recipes-kernel/lttng/lttng-tools_2.13.15.bb index 063d8e8c2d..f39404afa0 100644 --- a/meta/recipes-kernel/lttng/lttng-tools_2.13.1.bb +++ b/meta/recipes-kernel/lttng/lttng-tools_2.13.15.bb | |||
@@ -5,7 +5,7 @@ to extract program execution details from the Linux operating system \ | |||
5 | and interpret them." | 5 | and interpret them." |
6 | HOMEPAGE = "https://github.com/lttng/lttng-tools" | 6 | HOMEPAGE = "https://github.com/lttng/lttng-tools" |
7 | 7 | ||
8 | LICENSE = "GPLv2 & LGPLv2.1" | 8 | LICENSE = "GPL-2.0-only & LGPL-2.1-only" |
9 | LIC_FILES_CHKSUM = "file://LICENSE;md5=40ef17463fbd6f377db3c47b1cbaded8 \ | 9 | LIC_FILES_CHKSUM = "file://LICENSE;md5=40ef17463fbd6f377db3c47b1cbaded8 \ |
10 | file://LICENSES/GPL-2.0;md5=e68f69a54b44ba526ad7cb963e18fbce \ | 10 | file://LICENSES/GPL-2.0;md5=e68f69a54b44ba526ad7cb963e18fbce \ |
11 | file://LICENSES/LGPL-2.1;md5=9920968d0f2ff585ce61fae30344dd95" | 11 | file://LICENSES/LGPL-2.1;md5=9920968d0f2ff585ce61fae30344dd95" |
@@ -15,7 +15,7 @@ include lttng-platforms.inc | |||
15 | DEPENDS = "liburcu popt libxml2 util-linux bison-native" | 15 | DEPENDS = "liburcu popt libxml2 util-linux bison-native" |
16 | RDEPENDS:${PN} = "libgcc" | 16 | RDEPENDS:${PN} = "libgcc" |
17 | RRECOMMENDS:${PN} += "${LTTNGMODULES}" | 17 | RRECOMMENDS:${PN} += "${LTTNGMODULES}" |
18 | RDEPENDS:${PN}-ptest += "make perl bash gawk babeltrace procps perl-module-overloading coreutils util-linux kmod ${LTTNGMODULES} sed python3-core grep" | 18 | RDEPENDS:${PN}-ptest += "make perl bash gawk babeltrace procps perl-module-overloading coreutils util-linux kmod ${LTTNGMODULES} sed python3-core grep binutils" |
19 | RDEPENDS:${PN}-ptest:append:libc-glibc = " glibc-utils" | 19 | RDEPENDS:${PN}-ptest:append:libc-glibc = " glibc-utils" |
20 | RDEPENDS:${PN}-ptest:append:libc-musl = " musl-utils" | 20 | RDEPENDS:${PN}-ptest:append:libc-musl = " musl-utils" |
21 | # babelstats.pl wants getopt-long | 21 | # babelstats.pl wants getopt-long |
@@ -35,16 +35,21 @@ SRC_URI = "https://lttng.org/files/lttng-tools/lttng-tools-${PV}.tar.bz2 \ | |||
35 | file://0001-tests-do-not-strip-a-helper-library.patch \ | 35 | file://0001-tests-do-not-strip-a-helper-library.patch \ |
36 | file://run-ptest \ | 36 | file://run-ptest \ |
37 | file://lttng-sessiond.service \ | 37 | file://lttng-sessiond.service \ |
38 | file://determinism.patch \ | 38 | file://disable-tests.patch \ |
39 | file://0001-src-common-correct-header-location.patch \ | 39 | file://0001-compat-Define-off64_t-as-off_t-on-linux.patch \ |
40 | file://0001-tests-add-check_skip_kernel_test-to-check-root-user-.patch \ | ||
41 | file://0001-Fix-rotation-destroy-flush-fix-session-daemon-abort-.patch \ | ||
42 | file://0001-fix-lttng-tools-fails-to-compile-with-libxml2-2.14.0.patch \ | ||
40 | " | 43 | " |
41 | 44 | ||
42 | SRC_URI[sha256sum] = "cfe6df7da831fc07fd07ce46b442c2ec1074c167af73f3a1b1d2fba0c453c8b5" | 45 | SRC_URI[sha256sum] = "96ea42351ee112c19dad9fdc7aae93b583d9f1722b2175664a381d2d337703c4" |
43 | 46 | ||
44 | inherit autotools ptest pkgconfig useradd python3-dir manpages systemd | 47 | inherit autotools ptest pkgconfig useradd python3-dir manpages systemd |
45 | 48 | ||
46 | CACHED_CONFIGUREVARS = "PGREP=/usr/bin/pgrep" | 49 | CACHED_CONFIGUREVARS = "PGREP=/usr/bin/pgrep" |
47 | 50 | ||
51 | EXTRA_OECONF += "--disable-libtool-linkdep-fixup" | ||
52 | |||
48 | SYSTEMD_SERVICE:${PN} = "lttng-sessiond.service" | 53 | SYSTEMD_SERVICE:${PN} = "lttng-sessiond.service" |
49 | SYSTEMD_AUTO_ENABLE = "disable" | 54 | SYSTEMD_AUTO_ENABLE = "disable" |
50 | 55 | ||
@@ -67,7 +72,7 @@ PRIVATE_LIBS:${PN}-ptest = "libfoo.so" | |||
67 | do_install:append () { | 72 | do_install:append () { |
68 | # install systemd unit file | 73 | # install systemd unit file |
69 | install -d ${D}${systemd_system_unitdir} | 74 | install -d ${D}${systemd_system_unitdir} |
70 | install -m 0644 ${WORKDIR}/lttng-sessiond.service ${D}${systemd_system_unitdir} | 75 | install -m 0644 ${UNPACKDIR}/lttng-sessiond.service ${D}${systemd_system_unitdir} |
71 | } | 76 | } |
72 | 77 | ||
73 | do_install_ptest () { | 78 | do_install_ptest () { |
@@ -84,7 +89,7 @@ do_install_ptest () { | |||
84 | done | 89 | done |
85 | 90 | ||
86 | # Patch in the correct path for the custom libraries a helper executable needs | 91 | # Patch in the correct path for the custom libraries a helper executable needs |
87 | sed -i -e 's!FIXMEPTESTPATH!${PTEST_PATH}!' "${D}${PTEST_PATH}/run-ptest" | 92 | sed -i -e 's!FIXMEPTESTPATH!${PTEST_PATH}!g' "${D}${PTEST_PATH}/run-ptest" |
88 | 93 | ||
89 | # Prevent 'make check' from recursing into non-test subdirectories. | 94 | # Prevent 'make check' from recursing into non-test subdirectories. |
90 | sed -i -e 's!^SUBDIRS = .*!SUBDIRS = tests!' "${D}${PTEST_PATH}/Makefile" | 95 | sed -i -e 's!^SUBDIRS = .*!SUBDIRS = tests!' "${D}${PTEST_PATH}/Makefile" |
@@ -113,7 +118,7 @@ do_install_ptest () { | |||
113 | for f in $(find "${B}/tests/$d" -maxdepth 1 -executable -type f -printf '%P ') ; do | 118 | for f in $(find "${B}/tests/$d" -maxdepth 1 -executable -type f -printf '%P ') ; do |
114 | cp ${B}/tests/$d/$f ${D}${PTEST_PATH}/tests/`dirname $d`/$f | 119 | cp ${B}/tests/$d/$f ${D}${PTEST_PATH}/tests/`dirname $d`/$f |
115 | case $f in | 120 | case $f in |
116 | *.so|userspace-probe-elf-binary) | 121 | *.so|userspace-probe-elf-*) |
117 | install -d ${D}${PTEST_PATH}/tests/$d/ | 122 | install -d ${D}${PTEST_PATH}/tests/$d/ |
118 | ln -s ../$f ${D}${PTEST_PATH}/tests/$d/$f | 123 | ln -s ../$f ${D}${PTEST_PATH}/tests/$d/$f |
119 | # Remove any rpath/runpath to pass QA check. | 124 | # Remove any rpath/runpath to pass QA check. |
@@ -124,6 +129,7 @@ do_install_ptest () { | |||
124 | done | 129 | done |
125 | 130 | ||
126 | chrpath --delete ${D}${PTEST_PATH}/tests/utils/testapp/userspace-probe-elf-binary/userspace-probe-elf-binary | 131 | chrpath --delete ${D}${PTEST_PATH}/tests/utils/testapp/userspace-probe-elf-binary/userspace-probe-elf-binary |
132 | chrpath --delete ${D}${PTEST_PATH}/tests/utils/testapp/userspace-probe-elf-cxx-binary/userspace-probe-elf-cxx-binary | ||
127 | chrpath --delete ${D}${PTEST_PATH}/tests/regression/ust/ust-dl/libbar.so | 133 | chrpath --delete ${D}${PTEST_PATH}/tests/regression/ust/ust-dl/libbar.so |
128 | chrpath --delete ${D}${PTEST_PATH}/tests/regression/ust/ust-dl/libfoo.so | 134 | chrpath --delete ${D}${PTEST_PATH}/tests/regression/ust/ust-dl/libfoo.so |
129 | 135 | ||
@@ -185,4 +191,10 @@ do_install_ptest () { | |||
185 | INHIBIT_PACKAGE_STRIP_FILES = "\ | 191 | INHIBIT_PACKAGE_STRIP_FILES = "\ |
186 | ${PKGD}${PTEST_PATH}/tests/utils/testapp/userspace-probe-elf-binary/userspace-probe-elf-binary \ | 192 | ${PKGD}${PTEST_PATH}/tests/utils/testapp/userspace-probe-elf-binary/userspace-probe-elf-binary \ |
187 | ${PKGD}${PTEST_PATH}/tests/utils/testapp/userspace-probe-elf-binary/.libs/userspace-probe-elf-binary \ | 193 | ${PKGD}${PTEST_PATH}/tests/utils/testapp/userspace-probe-elf-binary/.libs/userspace-probe-elf-binary \ |
194 | ${PKGD}${PTEST_PATH}/tests/utils/testapp/userspace-probe-elf-cxx-binary/userspace-probe-elf-cxx-binary \ | ||
195 | ${PKGD}${PTEST_PATH}/tests/utils/testapp/userspace-probe-elf-cxx-binary/.libs/userspace-probe-elf-cxx-binary \ | ||
196 | ${PKGD}${PTEST_PATH}/tests/utils/testapp/gen-syscall-events/gen-syscall-events \ | ||
197 | ${PKGD}${PTEST_PATH}/tests/utils/testapp/gen-syscall-events/.libs/gen-syscall-events \ | ||
198 | ${PKGD}${PTEST_PATH}/tests/utils/testapp/gen-syscall-events-callstack/gen-syscall-events-callstack \ | ||
199 | ${PKGD}${PTEST_PATH}/tests/utils/testapp/gen-syscall-events-callstack/.libs/gen-syscall-events-callstack \ | ||
188 | " | 200 | " |
diff --git a/meta/recipes-kernel/lttng/lttng-ust/0001-Makefile.am-update-rpath-link.patch b/meta/recipes-kernel/lttng/lttng-ust/0001-Makefile.am-update-rpath-link.patch deleted file mode 100644 index cbbf1df812..0000000000 --- a/meta/recipes-kernel/lttng/lttng-ust/0001-Makefile.am-update-rpath-link.patch +++ /dev/null | |||
@@ -1,35 +0,0 @@ | |||
1 | From 06279f50e924d1d55b43eb3b299f6633ecb1f7a4 Mon Sep 17 00:00:00 2001 | ||
2 | From: Changqing Li <changqing.li@windriver.com> | ||
3 | Date: Wed, 22 Sep 2021 16:33:10 +0800 | ||
4 | Subject: [PATCH] Makefile.am: update rpath link | ||
5 | |||
6 | since commit 6339062 Move liblttng-ust to 'src/lib/', | ||
7 | liblttng-ust.so/liblttng-ust-common.so/liblttng-ust-tracepoint.so | ||
8 | 's location changed from one dir to multiple dirs. which make below | ||
9 | error: | ||
10 | ld: warning: liblttng-ust-common.so.1, needed by ../../../src/lib/lttng-ust/.libs/liblttng-ust.so, not found (try using -rpath or -rpath-link) | ||
11 | ld: warning: liblttng-ust-tracepoint.so.1, needed by ../../../src/lib/lttng-ust/.libs/liblttng-ust.so, not found (try using -rpath or -rpath-link) | ||
12 | |||
13 | Upstream-Status: Submitted [https://github.com/lttng/lttng-ust/pull/61] | ||
14 | |||
15 | Signed-off-by: Changqing Li <changqing.li@windriver.com> | ||
16 | --- | ||
17 | doc/examples/Makefile.am | 2 +- | ||
18 | 1 file changed, 1 insertions(+), 1 deletions(-) | ||
19 | |||
20 | diff --git a/doc/examples/Makefile.am b/doc/examples/Makefile.am | ||
21 | index 8ee0564..20d246c 100644 | ||
22 | --- a/doc/examples/Makefile.am | ||
23 | +++ b/doc/examples/Makefile.am | ||
24 | @@ -142,7 +142,7 @@ all-local: | ||
25 | CFLAGS='$(CFLAGS)' \ | ||
26 | AM_CFLAGS='$(AM_CFLAGS)' \ | ||
27 | LDFLAGS="$(LDFLAGS)" \ | ||
28 | - AM_LDFLAGS='$(AM_LDFLAGS) -L../../../src/lib/lttng-ust/.libs -Wl,-rpath="$(PWD)/../../src/lib/lttng-ust/.libs/" -Wl,-rpath-link="$(PWD)/../../src/lib/lttng-ust/.libs/"' \ | ||
29 | + AM_LDFLAGS='$(AM_LDFLAGS) -L../../../src/lib/lttng-ust/.libs -Wl,-rpath="$(PWD)/../../src/lib/lttng-ust/.libs/" -Wl,-rpath-link="$(PWD)/../../src/lib/lttng-ust/.libs/:$(PWD)/../../src/lib/lttng-ust-tracepoint/.libs:$(PWD)/../../src/lib/lttng-ust-common/.libs/"' \ | ||
30 | LTTNG_GEN_TP_PATH="$$rel_src_subdir$(top_srcdir)/tools/" \ | ||
31 | AM_V_P="$(AM_V_P)" \ | ||
32 | AM_V_at="$(AM_V_at)" \ | ||
33 | -- | ||
34 | 2.17.1 | ||
35 | |||
diff --git a/meta/recipes-kernel/lttng/lttng-ust/0001-lttng-ust-common-link-with-liburcu-explicitly.patch b/meta/recipes-kernel/lttng/lttng-ust/0001-lttng-ust-common-link-with-liburcu-explicitly.patch index d3c451fd2b..ceb240680b 100644 --- a/meta/recipes-kernel/lttng/lttng-ust/0001-lttng-ust-common-link-with-liburcu-explicitly.patch +++ b/meta/recipes-kernel/lttng/lttng-ust/0001-lttng-ust-common-link-with-liburcu-explicitly.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 2058584b7e87d6bd9d1765577766e0df7752232c Mon Sep 17 00:00:00 2001 | 1 | From 1b6bbf14de8fdfe60e446c93969e29bc2cf5f2dc Mon Sep 17 00:00:00 2001 |
2 | From: Alexander Kanavin <alex@linutronix.de> | 2 | From: Alexander Kanavin <alex@linutronix.de> |
3 | Date: Sun, 5 Sep 2021 10:44:19 +0200 | 3 | Date: Sun, 5 Sep 2021 10:44:19 +0200 |
4 | Subject: [PATCH] lttng-ust-common: link with liburcu explicitly | 4 | Subject: [PATCH] lttng-ust-common: link with liburcu explicitly |
@@ -12,10 +12,10 @@ Signed-off-by: Alexander Kanavin <alex@linutronix.de> | |||
12 | 1 file changed, 1 insertion(+) | 12 | 1 file changed, 1 insertion(+) |
13 | 13 | ||
14 | diff --git a/src/lib/lttng-ust-common/Makefile.am b/src/lib/lttng-ust-common/Makefile.am | 14 | diff --git a/src/lib/lttng-ust-common/Makefile.am b/src/lib/lttng-ust-common/Makefile.am |
15 | index caeea2b..30febf0 100644 | 15 | index 1ccc290..6531fa0 100644 |
16 | --- a/src/lib/lttng-ust-common/Makefile.am | 16 | --- a/src/lib/lttng-ust-common/Makefile.am |
17 | +++ b/src/lib/lttng-ust-common/Makefile.am | 17 | +++ b/src/lib/lttng-ust-common/Makefile.am |
18 | @@ -15,6 +15,7 @@ liblttng_ust_common_la_SOURCES = \ | 18 | @@ -16,6 +16,7 @@ liblttng_ust_common_la_SOURCES = \ |
19 | 19 | ||
20 | liblttng_ust_common_la_LIBADD = \ | 20 | liblttng_ust_common_la_LIBADD = \ |
21 | $(top_builddir)/src/common/libcommon.la \ | 21 | $(top_builddir)/src/common/libcommon.la \ |
diff --git a/meta/recipes-kernel/lttng/lttng-ust/0001-python-lttngust-Makefile.am-Add-install-lib-to-setup.patch b/meta/recipes-kernel/lttng/lttng-ust/0001-python-lttngust-Makefile.am-Add-install-lib-to-setup.patch index fd9b6ea7ff..7bbe5c216e 100644 --- a/meta/recipes-kernel/lttng/lttng-ust/0001-python-lttngust-Makefile.am-Add-install-lib-to-setup.patch +++ b/meta/recipes-kernel/lttng/lttng-ust/0001-python-lttngust-Makefile.am-Add-install-lib-to-setup.patch | |||
@@ -1,6 +1,6 @@ | |||
1 | From dd1fdc841d069dbd4e284f430a88af79de951124 Mon Sep 17 00:00:00 2001 | 1 | From 30660997d220602202d8dc7264e49095a1581947 Mon Sep 17 00:00:00 2001 |
2 | From: Robert Yang <liezhi.yang@windriver.com> | 2 | From: Richard Purdie <richard.purdie@linuxfoundation.org> |
3 | Date: Thu, 26 Sep 2019 17:54:00 +0800 | 3 | Date: Tue, 20 Feb 2024 12:19:06 +0000 |
4 | Subject: [PATCH] python-lttngust/Makefile.am: Add --install-lib to setup.py | 4 | Subject: [PATCH] python-lttngust/Makefile.am: Add --install-lib to setup.py |
5 | 5 | ||
6 | Otherwise it may install to /usr/lib, but should be /usr/lib64 when cross | 6 | Otherwise it may install to /usr/lib, but should be /usr/lib64 when cross |
@@ -9,21 +9,20 @@ building. | |||
9 | Upstream-Status: Submitted [https://github.com/lttng/lttng-ust/pull/59] | 9 | Upstream-Status: Submitted [https://github.com/lttng/lttng-ust/pull/59] |
10 | 10 | ||
11 | Signed-off-by: Robert Yang <liezhi.yang@windriver.com> | 11 | Signed-off-by: Robert Yang <liezhi.yang@windriver.com> |
12 | |||
13 | --- | 12 | --- |
14 | src/python-lttngust/Makefile.am | 2 +- | 13 | src/python-lttngust/Makefile.am | 2 +- |
15 | 1 file changed, 1 insertion(+), 1 deletion(-) | 14 | 1 file changed, 1 insertion(+), 1 deletion(-) |
16 | 15 | ||
17 | diff --git a/src/python-lttngust/Makefile.am b/src/python-lttngust/Makefile.am | 16 | diff --git a/src/python-lttngust/Makefile.am b/src/python-lttngust/Makefile.am |
18 | index f95482d..f76d95b 100644 | 17 | index d53e21d..283901e 100644 |
19 | --- a/src/python-lttngust/Makefile.am | 18 | --- a/src/python-lttngust/Makefile.am |
20 | +++ b/src/python-lttngust/Makefile.am | 19 | +++ b/src/python-lttngust/Makefile.am |
21 | @@ -32,7 +32,7 @@ install-exec-local: build-python-bindings.stamp | 20 | @@ -45,7 +45,7 @@ install-exec-local: build-python-bindings.stamp |
22 | if [ "$(DESTDIR)" != "" ]; then \ | 21 | if [ "$(DESTDIR)" != "" ]; then \ |
23 | opts="$$opts --root=$(DESTDIR)"; \ | 22 | opts="$$opts --root=$(DESTDIR)"; \ |
24 | fi; \ | 23 | fi; \ |
25 | - $(PYTHON) $(builddir)/setup.py install $$opts; | 24 | - $(PYTHON) $(builddir)/setup.py install $(PY_INSTALL_OPTS) $$opts; |
26 | + $(PYTHON) $(builddir)/setup.py install $$opts --install-lib=$(pythondir); | 25 | + $(PYTHON) $(builddir)/setup.py install $(PY_INSTALL_OPTS) $$opts --install-lib=$(pythondir); |
27 | 26 | ||
28 | clean-local: | 27 | clean-local: |
29 | rm -rf $(builddir)/build | 28 | rm -rf $(builddir)/build |
diff --git a/meta/recipes-kernel/lttng/lttng-ust_2.13.0.bb b/meta/recipes-kernel/lttng/lttng-ust_2.13.9.bb index 7c6a0743e1..dd7657e0cc 100644 --- a/meta/recipes-kernel/lttng/lttng-ust_2.13.0.bb +++ b/meta/recipes-kernel/lttng/lttng-ust_2.13.9.bb | |||
@@ -3,7 +3,7 @@ DESCRIPTION = "The LTTng UST 2.x package contains the userspace tracer library t | |||
3 | HOMEPAGE = "http://lttng.org/ust" | 3 | HOMEPAGE = "http://lttng.org/ust" |
4 | BUGTRACKER = "https://bugs.lttng.org/projects/lttng-ust" | 4 | BUGTRACKER = "https://bugs.lttng.org/projects/lttng-ust" |
5 | 5 | ||
6 | LICENSE = "LGPLv2.1+ & MIT & GPLv2" | 6 | LICENSE = "LGPL-2.1-or-later & MIT & GPL-2.0-only" |
7 | LIC_FILES_CHKSUM = "file://LICENSE;md5=a46577a38ad0c36ff6ff43ccf40c480f" | 7 | LIC_FILES_CHKSUM = "file://LICENSE;md5=a46577a38ad0c36ff6ff43ccf40c480f" |
8 | 8 | ||
9 | PYTHON_OPTION = "am_cv_python_pyexecdir='${PYTHON_SITEPACKAGES_DIR}' \ | 9 | PYTHON_OPTION = "am_cv_python_pyexecdir='${PYTHON_SITEPACKAGES_DIR}' \ |
@@ -31,10 +31,9 @@ PE = "2" | |||
31 | SRC_URI = "https://lttng.org/files/lttng-ust/lttng-ust-${PV}.tar.bz2 \ | 31 | SRC_URI = "https://lttng.org/files/lttng-ust/lttng-ust-${PV}.tar.bz2 \ |
32 | file://0001-python-lttngust-Makefile.am-Add-install-lib-to-setup.patch \ | 32 | file://0001-python-lttngust-Makefile.am-Add-install-lib-to-setup.patch \ |
33 | file://0001-lttng-ust-common-link-with-liburcu-explicitly.patch \ | 33 | file://0001-lttng-ust-common-link-with-liburcu-explicitly.patch \ |
34 | file://0001-Makefile.am-update-rpath-link.patch \ | ||
35 | " | 34 | " |
36 | 35 | ||
37 | SRC_URI[sha256sum] = "54e4c933679cf6a07971dc5861ce57fc4876ab740ab612407b30b5fc85371750" | 36 | SRC_URI[sha256sum] = "2ad6d69a54a1d924c18a4aa7a233db104e3cc332bcdd240e196bf7adbed3f712" |
38 | 37 | ||
39 | CVE_PRODUCT = "ust" | 38 | CVE_PRODUCT = "ust" |
40 | 39 | ||
diff --git a/meta/recipes-kernel/make-mod-scripts/make-mod-scripts_1.0.bb b/meta/recipes-kernel/make-mod-scripts/make-mod-scripts_1.0.bb index e5a1628898..8fcb5e6eb3 100644 --- a/meta/recipes-kernel/make-mod-scripts/make-mod-scripts_1.0.bb +++ b/meta/recipes-kernel/make-mod-scripts/make-mod-scripts_1.0.bb | |||
@@ -1,19 +1,19 @@ | |||
1 | SUMMARY = "Build tools needed by external modules" | 1 | SUMMARY = "Build tools needed by external modules" |
2 | HOMEPAGE = "https://www.yoctoproject.org/" | 2 | HOMEPAGE = "https://www.yoctoproject.org/" |
3 | LICENSE = "GPLv2" | 3 | LICENSE = "GPL-2.0-only" |
4 | LIC_FILES_CHKSUM = "file://${COREBASE}/meta/files/common-licenses/GPL-2.0-only;md5=801f80980d171dd6425610833a22dbe6" | 4 | LIC_FILES_CHKSUM = "file://${COREBASE}/meta/files/common-licenses/GPL-2.0-only;md5=801f80980d171dd6425610833a22dbe6" |
5 | 5 | ||
6 | inherit kernel-arch | 6 | inherit kernel-arch linux-kernel-base |
7 | inherit pkgconfig | 7 | inherit pkgconfig |
8 | 8 | ||
9 | PACKAGE_ARCH = "${MACHINE_ARCH}" | 9 | PACKAGE_ARCH = "${MACHINE_ARCH}" |
10 | 10 | ||
11 | S = "${WORKDIR}" | 11 | S = "${UNPACKDIR}" |
12 | 12 | ||
13 | do_configure[depends] += "virtual/kernel:do_shared_workdir openssl-native:do_populate_sysroot" | 13 | do_configure[depends] += "virtual/kernel:do_shared_workdir openssl-native:do_populate_sysroot" |
14 | do_compile[depends] += "virtual/kernel:do_compile_kernelmodules" | 14 | do_compile[depends] += "virtual/kernel:do_compile_kernelmodules" |
15 | 15 | ||
16 | RDEPENDS:${PN}-dev = "" | 16 | DEV_PKG_DEPENDENCY = "" |
17 | 17 | ||
18 | DEPENDS += "bc-native bison-native" | 18 | DEPENDS += "bc-native bison-native" |
19 | DEPENDS += "gmp-native" | 19 | DEPENDS += "gmp-native" |
@@ -21,13 +21,18 @@ DEPENDS += "gmp-native" | |||
21 | EXTRA_OEMAKE = " HOSTCC="${BUILD_CC} ${BUILD_CFLAGS} ${BUILD_LDFLAGS}" HOSTCPP="${BUILD_CPP}"" | 21 | EXTRA_OEMAKE = " HOSTCC="${BUILD_CC} ${BUILD_CFLAGS} ${BUILD_LDFLAGS}" HOSTCPP="${BUILD_CPP}"" |
22 | EXTRA_OEMAKE += " HOSTCXX="${BUILD_CXX} ${BUILD_CXXFLAGS} ${BUILD_LDFLAGS}" CROSS_COMPILE=${TARGET_PREFIX}" | 22 | EXTRA_OEMAKE += " HOSTCXX="${BUILD_CXX} ${BUILD_CXXFLAGS} ${BUILD_LDFLAGS}" CROSS_COMPILE=${TARGET_PREFIX}" |
23 | 23 | ||
24 | KERNEL_LOCALVERSION = "${@get_kernellocalversion_file("${STAGING_KERNEL_BUILDDIR}")}" | ||
25 | export LOCALVERSION = "${KERNEL_LOCALVERSION}" | ||
26 | |||
24 | # Build some host tools under work-shared. CC, LD, and AR are probably | 27 | # Build some host tools under work-shared. CC, LD, and AR are probably |
25 | # not used, but this is the historical way of invoking "make scripts". | 28 | # not used, but this is the historical way of invoking "make scripts". |
26 | # | 29 | # |
27 | do_configure() { | 30 | do_configure() { |
28 | unset CFLAGS CPPFLAGS CXXFLAGS LDFLAGS | 31 | unset CFLAGS CPPFLAGS CXXFLAGS LDFLAGS |
29 | for t in prepare scripts_basic scripts; do | 32 | for t in prepare scripts_basic scripts; do |
30 | oe_runmake CC="${KERNEL_CC}" LD="${KERNEL_LD}" AR="${KERNEL_AR}" \ | 33 | oe_runmake CC="${KERNEL_CC}" LD="${KERNEL_LD}" \ |
34 | AR="${KERNEL_AR}" OBJCOPY="${KERNEL_OBJCOPY}" \ | ||
35 | STRIP="${KERNEL_STRIP}" \ | ||
31 | -C ${STAGING_KERNEL_DIR} O=${STAGING_KERNEL_BUILDDIR} $t | 36 | -C ${STAGING_KERNEL_DIR} O=${STAGING_KERNEL_BUILDDIR} $t |
32 | done | 37 | done |
33 | } | 38 | } |
diff --git a/meta/recipes-kernel/makedumpfile/makedumpfile/0001-makedumpfile-replace-hardcode-CFLAGS.patch b/meta/recipes-kernel/makedumpfile/makedumpfile/0001-makedumpfile-replace-hardcode-CFLAGS.patch new file mode 100644 index 0000000000..796e036ab8 --- /dev/null +++ b/meta/recipes-kernel/makedumpfile/makedumpfile/0001-makedumpfile-replace-hardcode-CFLAGS.patch | |||
@@ -0,0 +1,139 @@ | |||
1 | From 59b8d59504c1bafff52a8794e67c6025fcd418a4 Mon Sep 17 00:00:00 2001 | ||
2 | From: Mingli Yu <mingli.yu@windriver.com> | ||
3 | Date: Sun, 24 Apr 2022 17:25:33 +0800 | ||
4 | Subject: [PATCH] makedumpfile: replace hardcode CFLAGS | ||
5 | |||
6 | * Create alias for target such as powerpc as powerpc32 | ||
7 | * Remove hardcode CFLAGS | ||
8 | * Add CFLAGS_COMMON to instead of CFLAGS so can flexibly | ||
9 | customize CFLAGS and not hardcode the CFLAGS as previously | ||
10 | * Forcibly to link dynamic library as the poky build | ||
11 | system doesn't build static library by default | ||
12 | |||
13 | Upstream-Status: Inappropriate [oe specific] | ||
14 | |||
15 | Signed-off-by: Mingli Yu <mingli.yu@windriver.com> | ||
16 | |||
17 | [2021-11-18] Patch updated to use CFLAGS_COMMON for zstd | ||
18 | Signed-off-by: Fathi Boudra <fathi.boudra@linaro.org> | ||
19 | |||
20 | Rebase to 1.7.1 | ||
21 | Signed-off-by: Mingli Yu <mingli.yu@windriver.com> | ||
22 | --- | ||
23 | Makefile | 40 +++++++++++++++++++++------------------- | ||
24 | 1 file changed, 21 insertions(+), 19 deletions(-) | ||
25 | |||
26 | diff --git a/Makefile b/Makefile | ||
27 | index aa73252..76fcafd 100644 | ||
28 | --- a/Makefile | ||
29 | +++ b/Makefile | ||
30 | @@ -8,12 +8,6 @@ ifeq ($(strip $CC),) | ||
31 | CC = gcc | ||
32 | endif | ||
33 | |||
34 | -CFLAGS_BASE := $(CFLAGS) -g -O2 -Wall -D_FILE_OFFSET_BITS=64 \ | ||
35 | - -D_LARGEFILE_SOURCE -D_LARGEFILE64_SOURCE | ||
36 | -CFLAGS := $(CFLAGS_BASE) -DVERSION='"$(VERSION)"' -DRELEASE_DATE='"$(DATE)"' | ||
37 | -CFLAGS_ARCH := $(CFLAGS_BASE) | ||
38 | -# LDFLAGS = -L/usr/local/lib -I/usr/local/include | ||
39 | - | ||
40 | HOST_ARCH := $(shell uname -m) | ||
41 | # Use TARGET as the target architecture if specified. | ||
42 | # Defaults to uname -m | ||
43 | @@ -24,26 +18,34 @@ endif | ||
44 | ARCH := $(shell echo ${TARGET} | sed -e s/i.86/x86/ -e s/sun4u/sparc64/ \ | ||
45 | -e s/arm.*/arm/ -e s/sa110/arm/ \ | ||
46 | -e s/s390x/s390/ -e s/parisc64/parisc/ \ | ||
47 | - -e s/ppc64/powerpc64/ -e s/ppc/powerpc32/) | ||
48 | + -e s/ppc64/powerpc64/ -e s/ppc/powerpc32/ \ | ||
49 | + -e s/_powerpc_/_powerpc32_/) | ||
50 | |||
51 | CROSS := | ||
52 | ifneq ($(TARGET), $(HOST_ARCH)) | ||
53 | CROSS := -U__$(HOST_ARCH)__ | ||
54 | endif | ||
55 | |||
56 | -CFLAGS += -D__$(ARCH)__ $(CROSS) | ||
57 | CFLAGS_ARCH += -D__$(ARCH)__ $(CROSS) | ||
58 | |||
59 | -ifeq ($(ARCH), powerpc64) | ||
60 | -CFLAGS += -m64 | ||
61 | +ifeq ($(ARCH), __powerpc64__) | ||
62 | CFLAGS_ARCH += -m64 | ||
63 | endif | ||
64 | |||
65 | -ifeq ($(ARCH), powerpc32) | ||
66 | -CFLAGS += -m32 | ||
67 | +ifeq ($(ARCH), __powerpc32__) | ||
68 | CFLAGS_ARCH += -m32 | ||
69 | endif | ||
70 | |||
71 | +CFLAGS_ARCH += $(CFLAGS) \ | ||
72 | + -D_FILE_OFFSET_BITS=64 \ | ||
73 | + -D_LARGEFILE_SOURCE \ | ||
74 | + -D_LARGEFILE64_SOURCE | ||
75 | + | ||
76 | +CFLAGS_COMMON = $(CFLAGS_ARCH) \ | ||
77 | + -DVERSION='"$(VERSION)"' \ | ||
78 | + -DRELEASE_DATE='"$(DATE)"' | ||
79 | + | ||
80 | + | ||
81 | SRC_BASE = makedumpfile.c makedumpfile.h diskdump_mod.h sadump_mod.h sadump_info.h | ||
82 | SRC_PART = print_info.c dwarf_info.c elf_info.c erase_info.c sadump_info.c cache.c tools.c printk.c detect_cycle.c | ||
83 | OBJ_PART=$(patsubst %.c,%.o,$(SRC_PART)) | ||
84 | @@ -52,12 +54,12 @@ OBJ_ARCH=$(patsubst %.c,%.o,$(SRC_ARCH)) | ||
85 | |||
86 | LIBS = -ldw -lbz2 -ldl -lelf -lz | ||
87 | ifneq ($(LINKTYPE), dynamic) | ||
88 | -LIBS := -static $(LIBS) -llzma | ||
89 | +LIBS := $(LIBS) -llzma | ||
90 | endif | ||
91 | |||
92 | ifeq ($(USELZO), on) | ||
93 | LIBS := -llzo2 $(LIBS) | ||
94 | -CFLAGS += -DUSELZO | ||
95 | +CFLAGS_COMMON += -DUSELZO | ||
96 | endif | ||
97 | |||
98 | ifeq ($(USESNAPPY), on) | ||
99 | @@ -65,12 +67,12 @@ LIBS := -lsnappy $(LIBS) | ||
100 | ifneq ($(LINKTYPE), dynamic) | ||
101 | LIBS := $(LIBS) -lstdc++ | ||
102 | endif | ||
103 | -CFLAGS += -DUSESNAPPY | ||
104 | +CFLAGS_COMMON += -DUSESNAPPY | ||
105 | endif | ||
106 | |||
107 | ifeq ($(USEZSTD), on) | ||
108 | LIBS := -lzstd $(LIBS) | ||
109 | -CFLAGS += -DUSEZSTD | ||
110 | +CFLAGS_COMMON += -DUSEZSTD | ||
111 | endif | ||
112 | |||
113 | ifeq ($(DEBUG), on) | ||
114 | @@ -106,14 +108,14 @@ SBINDIR ?= /usr/sbin | ||
115 | all: makedumpfile | ||
116 | |||
117 | $(OBJ_PART): $(SRC_PART) | ||
118 | - $(CC) $(CFLAGS) -c -o ./$@ $(VPATH)$(@:.o=.c) | ||
119 | + $(CC) $(CFLAGS_COMMON) -c -o ./$@ $(VPATH)$(@:.o=.c) | ||
120 | |||
121 | $(OBJ_ARCH): $(SRC_ARCH) | ||
122 | @mkdir -p $(@D) | ||
123 | $(CC) $(CFLAGS_ARCH) -c -o ./$@ $(VPATH)$(@:.o=.c) | ||
124 | |||
125 | makedumpfile: $(SRC_BASE) $(OBJ_PART) $(OBJ_ARCH) | ||
126 | - $(CC) $(CFLAGS) $(LDFLAGS) $(OBJ_PART) $(OBJ_ARCH) -rdynamic -o $@ $< $(LIBS) | ||
127 | + $(CC) $(CFLAGS_COMMON) $(LDFLAGS) $(OBJ_PART) $(OBJ_ARCH) -rdynamic -o $@ $< $(LIBS) | ||
128 | @sed -e "s/@DATE@/$(DATE)/" \ | ||
129 | -e "s/@VERSION@/$(VERSION)/" \ | ||
130 | $(VPATH)makedumpfile.8.in > $(VPATH)makedumpfile.8 | ||
131 | @@ -122,7 +124,7 @@ makedumpfile: $(SRC_BASE) $(OBJ_PART) $(OBJ_ARCH) | ||
132 | $(VPATH)makedumpfile.conf.5.in > $(VPATH)makedumpfile.conf.5 | ||
133 | |||
134 | eppic_makedumpfile.so: extension_eppic.c | ||
135 | - $(CC) $(CFLAGS) $(LDFLAGS) -shared -rdynamic -o $@ extension_eppic.c -fPIC -leppic -ltinfo | ||
136 | + $(CC) $(CFLAGS_COMMON) $(LDFLAGS) -shared -rdynamic -o $@ extension_eppic.c -fPIC -leppic -ltinfo | ||
137 | |||
138 | clean: | ||
139 | rm -f $(OBJ) $(OBJ_PART) $(OBJ_ARCH) makedumpfile makedumpfile.8 makedumpfile.conf.5 | ||
diff --git a/meta/recipes-kernel/makedumpfile/makedumpfile_1.7.7.bb b/meta/recipes-kernel/makedumpfile/makedumpfile_1.7.7.bb new file mode 100644 index 0000000000..99393e0984 --- /dev/null +++ b/meta/recipes-kernel/makedumpfile/makedumpfile_1.7.7.bb | |||
@@ -0,0 +1,60 @@ | |||
1 | SUMMARY = "VMcore extraction tool" | ||
2 | DESCRIPTION = "\ | ||
3 | This program is used to extract a subset of the memory available either \ | ||
4 | via /dev/mem or /proc/vmcore (for crashdumps). It is used to get memory \ | ||
5 | images without extra uneeded information (zero pages, userspace programs, \ | ||
6 | etc). \ | ||
7 | " | ||
8 | HOMEPAGE = "https://github.com/makedumpfile/makedumpfile" | ||
9 | |||
10 | LIC_FILES_CHKSUM = "file://COPYING;md5=751419260aa954499f7abaabaa882bbe" | ||
11 | LICENSE = "GPL-2.0-only" | ||
12 | |||
13 | SRCBRANCH ?= "master" | ||
14 | SRCREV = "e4ae6b5ee04edeeb03db89bee372904157e3378d" | ||
15 | |||
16 | DEPENDS = "bzip2 zlib elfutils xz" | ||
17 | RDEPENDS:${PN}-tools = "perl ${PN}" | ||
18 | |||
19 | # mips/rv32 would not compile. | ||
20 | COMPATIBLE_HOST:mipsarcho32 = "null" | ||
21 | COMPATIBLE_HOST:riscv32 = "null" | ||
22 | |||
23 | PACKAGES =+ "${PN}-tools" | ||
24 | FILES:${PN}-tools = "${bindir}/*.pl" | ||
25 | |||
26 | SRC_URI = "\ | ||
27 | git://github.com/makedumpfile/makedumpfile;branch=${SRCBRANCH};protocol=https \ | ||
28 | file://0001-makedumpfile-replace-hardcode-CFLAGS.patch \ | ||
29 | " | ||
30 | |||
31 | UPSTREAM_CHECK_GITTAGREGEX = "(?P<pver>\d+(\.\d+)+)" | ||
32 | |||
33 | SECTION = "base" | ||
34 | |||
35 | # If we do not specify TARGET, makedumpfile will build for the host but use the | ||
36 | # target gcc. | ||
37 | # | ||
38 | |||
39 | MAKEDUMPFILE_TARGET ?= "${TARGET_ARCH}" | ||
40 | MAKEDUMPFILE_TARGET:powerpc = "ppc" | ||
41 | |||
42 | EXTRA_OEMAKE = "\ | ||
43 | LINKTYPE=static \ | ||
44 | TARGET=${MAKEDUMPFILE_TARGET} \ | ||
45 | ${PACKAGECONFIG_CONFARGS} \ | ||
46 | " | ||
47 | |||
48 | PACKAGECONFIG ??= "" | ||
49 | PACKAGECONFIG[lzo] = "USELZO=on,USELZO=off,lzo" | ||
50 | PACKAGECONFIG[snappy] = "USESNAPPY=on,USESNAPPY=off,snappy" | ||
51 | PACKAGECONFIG[zstd] = "USEZSTD=on,USEZSTD=off,zstd" | ||
52 | |||
53 | do_install () { | ||
54 | mkdir -p ${D}/usr/bin | ||
55 | install -m 755 ${S}/makedumpfile ${D}/usr/bin | ||
56 | install -m 755 ${S}/makedumpfile-R.pl ${D}/usr/bin | ||
57 | |||
58 | mkdir -p ${D}/etc/ | ||
59 | install -m 644 ${S}/makedumpfile.conf ${D}/etc/makedumpfile.conf.sample | ||
60 | } | ||
diff --git a/meta/recipes-kernel/modutils-initscripts/files/PD.patch b/meta/recipes-kernel/modutils-initscripts/files/PD.patch deleted file mode 100644 index 21ac49cbd8..0000000000 --- a/meta/recipes-kernel/modutils-initscripts/files/PD.patch +++ /dev/null | |||
@@ -1,8 +0,0 @@ | |||
1 | Upstream-Status: Inappropriate [licensing] | ||
2 | |||
3 | Index: modutils-initscripts-1.0/LICENSE | ||
4 | =================================================================== | ||
5 | --- /dev/null 1970-01-01 00:00:00.000000000 +0000 | ||
6 | +++ modutils-initscripts-1.0/LICENSE 2010-12-06 14:26:03.570339002 -0800 | ||
7 | @@ -0,0 +1 @@ | ||
8 | +Public Domain | ||
diff --git a/meta/recipes-kernel/modutils-initscripts/files/modutils.sh b/meta/recipes-kernel/modutils-initscripts/files/modutils.sh index 67e1dcd990..e9aaa66cb7 100755 --- a/meta/recipes-kernel/modutils-initscripts/files/modutils.sh +++ b/meta/recipes-kernel/modutils-initscripts/files/modutils.sh | |||
@@ -1,4 +1,8 @@ | |||
1 | #!/bin/sh | 1 | #!/bin/sh |
2 | # | ||
3 | # SPDX-License-Identifier: MIT | ||
4 | # | ||
5 | |||
2 | ### BEGIN INIT INFO | 6 | ### BEGIN INIT INFO |
3 | # Provides: module-init-tools | 7 | # Provides: module-init-tools |
4 | # Required-Start: | 8 | # Required-Start: |
diff --git a/meta/recipes-kernel/modutils-initscripts/modutils-initscripts.bb b/meta/recipes-kernel/modutils-initscripts/modutils-initscripts.bb index aa71309126..fb7b09393a 100644 --- a/meta/recipes-kernel/modutils-initscripts/modutils-initscripts.bb +++ b/meta/recipes-kernel/modutils-initscripts/modutils-initscripts.bb | |||
@@ -1,13 +1,10 @@ | |||
1 | SUMMARY = "Initscript for auto-loading kernel modules on boot" | 1 | SUMMARY = "Initscript for auto-loading kernel modules on boot" |
2 | SECTION = "base" | 2 | SECTION = "base" |
3 | LICENSE = "PD" | 3 | LICENSE = "MIT" |
4 | LIC_FILES_CHKSUM = "file://LICENSE;md5=7bf87fc37976e93ec66ad84fac58c098" | 4 | LIC_FILES_CHKSUM = "file://modutils.sh;beginline=3;endline=3;md5=b2dccaa94b3629a08bfb4f983cad6f89" |
5 | SRC_URI = "file://modutils.sh \ | 5 | SRC_URI = "file://modutils.sh" |
6 | file://PD.patch" | ||
7 | 6 | ||
8 | PR = "r7" | 7 | S = "${UNPACKDIR}" |
9 | |||
10 | S = "${WORKDIR}" | ||
11 | 8 | ||
12 | INITSCRIPT_NAME = "modutils.sh" | 9 | INITSCRIPT_NAME = "modutils.sh" |
13 | INITSCRIPT_PARAMS = "start 06 S ." | 10 | INITSCRIPT_PARAMS = "start 06 S ." |
@@ -19,7 +16,7 @@ do_compile () { | |||
19 | 16 | ||
20 | do_install () { | 17 | do_install () { |
21 | install -d ${D}${sysconfdir}/init.d/ | 18 | install -d ${D}${sysconfdir}/init.d/ |
22 | install -m 0755 ${WORKDIR}/modutils.sh ${D}${sysconfdir}/init.d/ | 19 | install -m 0755 ${S}/modutils.sh ${D}${sysconfdir}/init.d/ |
23 | } | 20 | } |
24 | 21 | ||
25 | PACKAGE_WRITE_DEPS:append = " ${@bb.utils.contains('DISTRO_FEATURES','systemd','systemd-systemctl-native','',d)}" | 22 | PACKAGE_WRITE_DEPS:append = " ${@bb.utils.contains('DISTRO_FEATURES','systemd','systemd-systemctl-native','',d)}" |
diff --git a/meta/recipes-kernel/perf/perf-perl.inc b/meta/recipes-kernel/perf/perf-perl.inc index ae77319b20..f3eef75a90 100644 --- a/meta/recipes-kernel/perf/perf-perl.inc +++ b/meta/recipes-kernel/perf/perf-perl.inc | |||
@@ -2,6 +2,6 @@ inherit perlnative cpan-base | |||
2 | 2 | ||
3 | # Env var which tells perl if it should use host (no) or target (yes) settings | 3 | # Env var which tells perl if it should use host (no) or target (yes) settings |
4 | export PERLCONFIGTARGET = "${@is_target(d)}" | 4 | export PERLCONFIGTARGET = "${@is_target(d)}" |
5 | export PERL_INC = "${STAGING_LIBDIR}${PERL_OWN_DIR}/perl/${@get_perl_version(d)}/CORE" | 5 | export PERL_INC = "${STAGING_LIBDIR}${PERL_OWN_DIR}/perl5/${@get_perl_version(d)}/${@get_perl_arch(d)}/CORE" |
6 | export PERL_LIB = "${STAGING_LIBDIR}${PERL_OWN_DIR}/perl/${@get_perl_version(d)}" | 6 | export PERL_LIB = "${STAGING_LIBDIR}${PERL_OWN_DIR}/perl5/${@get_perl_version(d)}" |
7 | export PERL_ARCHLIB = "${STAGING_LIBDIR}${PERL_OWN_DIR}/perl/${@get_perl_version(d)}" | 7 | export PERL_ARCHLIB = "${STAGING_LIBDIR}${PERL_OWN_DIR}/perl5/${@get_perl_version(d)}/${@get_perl_arch(d)}" |
diff --git a/meta/recipes-kernel/perf/perf.bb b/meta/recipes-kernel/perf/perf.bb index 7bbc1ad70c..4f29bd5bbc 100644 --- a/meta/recipes-kernel/perf/perf.bb +++ b/meta/recipes-kernel/perf/perf.bb | |||
@@ -7,27 +7,32 @@ and software features (software counters, tracepoints) \ | |||
7 | as well." | 7 | as well." |
8 | HOMEPAGE = "https://perf.wiki.kernel.org/index.php/Main_Page" | 8 | HOMEPAGE = "https://perf.wiki.kernel.org/index.php/Main_Page" |
9 | 9 | ||
10 | LICENSE = "GPLv2" | 10 | LICENSE = "GPL-2.0-only" |
11 | 11 | ||
12 | PR = "r9" | 12 | # zstd is required for kernels 6.14+ when libelf-zstd is detected |
13 | 13 | PACKAGECONFIG ??= "python tui libunwind libtraceevent zstd" | |
14 | PACKAGECONFIG ??= "scripting tui libunwind" | ||
15 | PACKAGECONFIG[dwarf] = ",NO_DWARF=1" | 14 | PACKAGECONFIG[dwarf] = ",NO_DWARF=1" |
16 | PACKAGECONFIG[scripting] = ",NO_LIBPERL=1 NO_LIBPYTHON=1,perl python3" | 15 | PACKAGECONFIG[perl] = ",NO_LIBPERL=1,perl" |
17 | # gui support was added with kernel 3.6.35 | 16 | PACKAGECONFIG[python] = ",NO_LIBPYTHON=1,python3 python3-setuptools-native" |
18 | # since 3.10 libnewt was replaced by slang | 17 | PACKAGECONFIG[tui] = ",NO_SLANG=1,slang" |
19 | # to cover a wide range of kernel we add both dependencies | ||
20 | PACKAGECONFIG[tui] = ",NO_NEWT=1,libnewt slang" | ||
21 | PACKAGECONFIG[libunwind] = ",NO_LIBUNWIND=1 NO_LIBDW_DWARF_UNWIND=1,libunwind" | 18 | PACKAGECONFIG[libunwind] = ",NO_LIBUNWIND=1 NO_LIBDW_DWARF_UNWIND=1,libunwind" |
22 | PACKAGECONFIG[libnuma] = ",NO_LIBNUMA=1" | 19 | PACKAGECONFIG[libnuma] = ",NO_LIBNUMA=1" |
20 | PACKAGECONFIG[bfd] = ",NO_LIBBFD=1" | ||
23 | PACKAGECONFIG[systemtap] = ",NO_SDT=1,systemtap" | 21 | PACKAGECONFIG[systemtap] = ",NO_SDT=1,systemtap" |
24 | PACKAGECONFIG[jvmti] = ",NO_JVMTI=1" | 22 | PACKAGECONFIG[jvmti] = ",NO_JVMTI=1" |
25 | # libaudit support would need scripting to be enabled | 23 | # libaudit support would need scripting to be enabled |
26 | PACKAGECONFIG[audit] = ",NO_LIBAUDIT=1,audit" | 24 | PACKAGECONFIG[audit] = ",NO_LIBAUDIT=1,audit" |
27 | PACKAGECONFIG[manpages] = ",,xmlto-native asciidoc-native" | 25 | PACKAGECONFIG[manpages] = ",,xmlto-native asciidoc-native" |
28 | PACKAGECONFIG[cap] = ",,libcap" | 26 | PACKAGECONFIG[cap] = ",,libcap" |
27 | PACKAGECONFIG[libtraceevent] = ",NO_LIBTRACEEVENT=1,libtraceevent" | ||
28 | # jevents requires host python for generating a .c file, but is | ||
29 | # unrelated to the python item. | ||
30 | PACKAGECONFIG[jevents] = ",NO_JEVENTS=1,python3-native" | ||
29 | # Arm CoreSight | 31 | # Arm CoreSight |
30 | PACKAGECONFIG[coresight] = "CORESIGHT=1,,opencsd" | 32 | PACKAGECONFIG[coresight] = "CORESIGHT=1,,opencsd" |
33 | PACKAGECONFIG[pfm4] = ",NO_LIBPFM4=1,libpfm4" | ||
34 | PACKAGECONFIG[babeltrace] = ",NO_LIBBABELTRACE=1,babeltrace" | ||
35 | PACKAGECONFIG[zstd] = ",NO_LIBZSTD=1,zstd" | ||
31 | 36 | ||
32 | # libunwind is not yet ported for some architectures | 37 | # libunwind is not yet ported for some architectures |
33 | PACKAGECONFIG:remove:arc = "libunwind" | 38 | PACKAGECONFIG:remove:arc = "libunwind" |
@@ -47,7 +52,7 @@ PROVIDES = "virtual/perf" | |||
47 | inherit linux-kernel-base kernel-arch manpages | 52 | inherit linux-kernel-base kernel-arch manpages |
48 | 53 | ||
49 | # needed for building the tools/perf Python bindings | 54 | # needed for building the tools/perf Python bindings |
50 | inherit ${@bb.utils.contains('PACKAGECONFIG', 'scripting', 'python3targetconfig', '', d)} | 55 | inherit_defer ${@bb.utils.contains('PACKAGECONFIG', 'python', 'python3targetconfig', '', d)} |
51 | inherit python3-dir | 56 | inherit python3-dir |
52 | export PYTHON_SITEPACKAGES_DIR | 57 | export PYTHON_SITEPACKAGES_DIR |
53 | 58 | ||
@@ -57,20 +62,38 @@ export WERROR = "0" | |||
57 | do_populate_lic[depends] += "virtual/kernel:do_shared_workdir" | 62 | do_populate_lic[depends] += "virtual/kernel:do_shared_workdir" |
58 | 63 | ||
59 | # needed for building the tools/perf Perl binding | 64 | # needed for building the tools/perf Perl binding |
60 | include ${@bb.utils.contains('PACKAGECONFIG', 'scripting', 'perf-perl.inc', '', d)} | 65 | include ${@bb.utils.contains('PACKAGECONFIG', 'perl', 'perf-perl.inc', '', d)} |
61 | 66 | ||
62 | inherit kernelsrc | 67 | inherit kernelsrc |
63 | 68 | ||
64 | S = "${WORKDIR}/${BP}" | 69 | S = "${UNPACKDIR}/${BP}" |
65 | SPDX_S = "${S}/tools/perf" | ||
66 | 70 | ||
67 | # The LDFLAGS is required or some old kernels fails due missing | 71 | # The LDFLAGS is required or some old kernels fails due missing |
68 | # symbols and this is preferred than requiring patches to every old | 72 | # symbols and this is preferred than requiring patches to every old |
69 | # supported kernel. | 73 | # supported kernel. |
70 | LDFLAGS="-ldl -lutil" | 74 | LDFLAGS = "-ldl -lutil" |
75 | |||
76 | # Perf's build system adds its own optimization flags for most TUs, | ||
77 | # overriding the flags included here. But for some, perf does not add | ||
78 | # any -O option, so ensure the distro's chosen optimization gets used | ||
79 | # for those. Also include ${DEBUG_PREFIX_MAP} which ensures perf is | ||
80 | # built with appropriate -f*-prefix-map options, | ||
81 | # avoiding the 'buildpaths' QA warning. | ||
82 | TARGET_CC_ARCH += "${SELECTED_OPTIMIZATION} ${DEBUG_PREFIX_MAP}" | ||
83 | |||
84 | #| libbpf.c: In function 'find_kernel_btf_id.constprop': | ||
85 | #| libbpf.c:10009:33: error: 'mod_len' may be used uninitialized [-Werror=maybe-uninitialized] | ||
86 | #| 10009 | if (mod_name && strncmp(mod->name, mod_name, mod_len) != 0) | ||
87 | #| | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
88 | #| libbpf.c:9979:21: note: 'mod_len' was declared here | ||
89 | #| 9979 | int ret, i, mod_len; | ||
90 | #| | ^~~~~~~ | ||
91 | #| cc1: all warnings being treated as errors | ||
92 | TARGET_CC_ARCH:append:toolchain-clang:arm = " -fno-error=maybe-uninitialized" | ||
71 | 93 | ||
72 | EXTRA_OEMAKE = '\ | 94 | EXTRA_OEMAKE = '\ |
73 | V=1 \ | 95 | V=1 \ |
96 | VF=1 \ | ||
74 | -C ${S}/tools/perf \ | 97 | -C ${S}/tools/perf \ |
75 | O=${B} \ | 98 | O=${B} \ |
76 | CROSS_COMPILE=${TARGET_PREFIX} \ | 99 | CROSS_COMPILE=${TARGET_PREFIX} \ |
@@ -80,12 +103,13 @@ EXTRA_OEMAKE = '\ | |||
80 | LDSHARED="${CC} -shared" \ | 103 | LDSHARED="${CC} -shared" \ |
81 | AR="${AR}" \ | 104 | AR="${AR}" \ |
82 | LD="${LD}" \ | 105 | LD="${LD}" \ |
83 | EXTRA_CFLAGS="-ldw" \ | 106 | EXTRA_CFLAGS="-ldw -I${S}" \ |
84 | YFLAGS='-y --file-prefix-map=${WORKDIR}=/usr/src/debug/${PN}/${EXTENDPE}${PV}-${PR}' \ | 107 | YFLAGS='-y --file-prefix-map=${WORKDIR}=${TARGET_DBGSRC_DIR}' \ |
85 | EXTRA_LDFLAGS="${PERF_EXTRA_LDFLAGS}" \ | 108 | EXTRA_LDFLAGS="${PERF_EXTRA_LDFLAGS}" \ |
86 | perfexecdir=${libexecdir} \ | 109 | perfexecdir=${libexecdir} \ |
87 | NO_GTK2=1 \ | 110 | NO_GTK2=1 \ |
88 | ${PACKAGECONFIG_CONFARGS} \ | 111 | ${PACKAGECONFIG_CONFARGS} \ |
112 | PKG_CONFIG=pkg-config \ | ||
89 | TMPDIR="${B}" \ | 113 | TMPDIR="${B}" \ |
90 | LIBUNWIND_DIR=${STAGING_EXECPREFIXDIR} \ | 114 | LIBUNWIND_DIR=${STAGING_EXECPREFIXDIR} \ |
91 | ' | 115 | ' |
@@ -101,7 +125,7 @@ EXTRA_OEMAKE += "\ | |||
101 | 'sharedir=${@os.path.relpath(datadir, prefix)}' \ | 125 | 'sharedir=${@os.path.relpath(datadir, prefix)}' \ |
102 | 'mandir=${@os.path.relpath(mandir, prefix)}' \ | 126 | 'mandir=${@os.path.relpath(mandir, prefix)}' \ |
103 | 'infodir=${@os.path.relpath(infodir, prefix)}' \ | 127 | 'infodir=${@os.path.relpath(infodir, prefix)}' \ |
104 | ${@bb.utils.contains('PACKAGECONFIG', 'scripting', 'PYTHON=python3 PYTHON_CONFIG=python3-config', '', d)} \ | 128 | ${@bb.utils.contains('PACKAGECONFIG', 'python', 'PYTHON=python3 PYTHON_CONFIG=python3-config', '', d)} \ |
105 | " | 129 | " |
106 | 130 | ||
107 | # During do_configure, we might run a 'make clean'. That often breaks | 131 | # During do_configure, we might run a 'make clean'. That often breaks |
@@ -111,6 +135,10 @@ EXTRA_OEMAKE += "\ | |||
111 | # honour a JOBS variable. | 135 | # honour a JOBS variable. |
112 | EXTRA_OEMAKE:append:task-configure = " JOBS=1" | 136 | EXTRA_OEMAKE:append:task-configure = " JOBS=1" |
113 | 137 | ||
138 | # the architectures that need this file can be found in | ||
139 | # tools/include/uapi/asm/bpf_perf_event.h | ||
140 | # We are only listing supported arches at the moment | ||
141 | PERF_BPF_EVENT_SRC ?= '${@bb.utils.contains_any("ARCH", [ "riscv", "arm64" ], "arch/${ARCH}/include/uapi/asm/bpf_perf_event.h", "", d)}' | ||
114 | PERF_SRC ?= "Makefile \ | 142 | PERF_SRC ?= "Makefile \ |
115 | tools/arch \ | 143 | tools/arch \ |
116 | tools/build \ | 144 | tools/build \ |
@@ -120,18 +148,27 @@ PERF_SRC ?= "Makefile \ | |||
120 | tools/perf \ | 148 | tools/perf \ |
121 | tools/scripts \ | 149 | tools/scripts \ |
122 | scripts/ \ | 150 | scripts/ \ |
151 | arch/arm64/tools \ | ||
152 | ${PERF_BPF_EVENT_SRC} \ | ||
123 | arch/${ARCH}/Makefile \ | 153 | arch/${ARCH}/Makefile \ |
154 | include/uapi/asm-generic/Kbuild \ | ||
124 | " | 155 | " |
125 | 156 | ||
126 | PERF_EXTRA_LDFLAGS = "" | 157 | PERF_EXTRA_LDFLAGS = "" |
127 | 158 | ||
128 | # MIPS N32 | 159 | # MIPS N32/N64 |
129 | PERF_EXTRA_LDFLAGS:mipsarchn32eb = "-m elf32btsmipn32" | 160 | PERF_EXTRA_LDFLAGS:mipsarchn32eb = "-m elf32btsmipn32" |
130 | PERF_EXTRA_LDFLAGS:mipsarchn32el = "-m elf32ltsmipn32" | 161 | PERF_EXTRA_LDFLAGS:mipsarchn32el = "-m elf32ltsmipn32" |
162 | PERF_EXTRA_LDFLAGS:mipsarchn64eb = "-m elf64btsmip" | ||
163 | PERF_EXTRA_LDFLAGS:mipsarchn64el = "-m elf64ltsmip" | ||
131 | 164 | ||
132 | do_compile() { | 165 | do_compile() { |
133 | # Linux kernel build system is expected to do the right thing | 166 | # Linux kernel build system is expected to do the right thing |
134 | unset CFLAGS | 167 | unset CFLAGS |
168 | test -e ${S}/tools/lib/traceevent/plugins/Makefile && \ | ||
169 | sed -i -e 's|\$(libdir)/traceevent/plugins|\$(libdir)/traceevent_${KERNEL_VERSION}/plugins|g' ${S}/tools/lib/traceevent/plugins/Makefile | ||
170 | test -e ${S}/tools/perf/Makefile.config && \ | ||
171 | sed -i -e 's|\$(libdir)/traceevent/plugins|\$(libdir)/traceevent_${KERNEL_VERSION}/plugins|g' ${S}/tools/perf/Makefile.config | ||
135 | oe_runmake all | 172 | oe_runmake all |
136 | } | 173 | } |
137 | 174 | ||
@@ -140,8 +177,11 @@ do_install() { | |||
140 | unset CFLAGS | 177 | unset CFLAGS |
141 | oe_runmake install | 178 | oe_runmake install |
142 | # we are checking for this make target to be compatible with older perf versions | 179 | # we are checking for this make target to be compatible with older perf versions |
143 | if ${@bb.utils.contains('PACKAGECONFIG', 'scripting', 'true', 'false', d)} && grep -q install-python_ext ${S}/tools/perf/Makefile*; then | 180 | if ${@bb.utils.contains('PACKAGECONFIG', 'python', 'true', 'false', d)} && grep -q install-python_ext ${S}/tools/perf/Makefile*; then |
144 | oe_runmake DESTDIR=${D} install-python_ext | 181 | oe_runmake DESTDIR=${D} install-python_ext |
182 | if [ -e ${D}${libdir}/python*/site-packages/perf-*/SOURCES.txt ]; then | ||
183 | sed -i -e 's#${WORKDIR}##g' ${D}${libdir}/python*/site-packages/perf-*/SOURCES.txt | ||
184 | fi | ||
145 | fi | 185 | fi |
146 | } | 186 | } |
147 | 187 | ||
@@ -156,7 +196,8 @@ python copy_perf_source_from_kernel() { | |||
156 | src = oe.path.join(src_dir, s) | 196 | src = oe.path.join(src_dir, s) |
157 | dest = oe.path.join(dest_dir, s) | 197 | dest = oe.path.join(dest_dir, s) |
158 | if not os.path.exists(src): | 198 | if not os.path.exists(src): |
159 | bb.fatal("Path does not exist: %s. Maybe PERF_SRC does not match the kernel version." % src) | 199 | bb.warn("Path does not exist: %s. Maybe PERF_SRC lists more files than what your kernel version provides and needs." % src) |
200 | continue | ||
160 | if os.path.isdir(src): | 201 | if os.path.isdir(src): |
161 | oe.path.copyhardlinktree(src, dest) | 202 | oe.path.copyhardlinktree(src, dest) |
162 | else: | 203 | else: |
@@ -168,7 +209,7 @@ python copy_perf_source_from_kernel() { | |||
168 | do_configure:prepend () { | 209 | do_configure:prepend () { |
169 | # If building a multlib based perf, the incorrect library path will be | 210 | # If building a multlib based perf, the incorrect library path will be |
170 | # detected by perf, since it triggers via: ifeq ($(ARCH),x86_64). In a 32 bit | 211 | # detected by perf, since it triggers via: ifeq ($(ARCH),x86_64). In a 32 bit |
171 | # build, with a 64 bit multilib, the arch won't match and the detection of a | 212 | # build, with a 64 bit multilib, the arch won't match and the detection of a |
172 | # 64 bit build (and library) are not exected. To ensure that libraries are | 213 | # 64 bit build (and library) are not exected. To ensure that libraries are |
173 | # installed to the correct location, we can use the weak assignment in the | 214 | # installed to the correct location, we can use the weak assignment in the |
174 | # config/Makefile. | 215 | # config/Makefile. |
@@ -201,14 +242,18 @@ do_configure:prepend () { | |||
201 | if [ -e "${S}/tools/perf/Makefile.perf" ]; then | 242 | if [ -e "${S}/tools/perf/Makefile.perf" ]; then |
202 | sed -i -e 's,\ .config-detected, $(OUTPUT)/config-detected,g' \ | 243 | sed -i -e 's,\ .config-detected, $(OUTPUT)/config-detected,g' \ |
203 | ${S}/tools/perf/Makefile.perf | 244 | ${S}/tools/perf/Makefile.perf |
204 | sed -i -e "s,prefix='\$(DESTDIR_SQ)/usr'$,prefix='\$(DESTDIR_SQ)/usr' --install-lib='\$(DESTDIR)\$(PYTHON_SITEPACKAGES_DIR)',g" \ | 245 | # Variant with linux-yocto-specific patch |
246 | sed -i -e "s,prefix='\$(DESTDIR_SQ)/usr'$,prefix='\$(DESTDIR_SQ)/usr' --install-lib='\$(PYTHON_SITEPACKAGES_DIR)' --root='\$(DESTDIR)',g" \ | ||
247 | ${S}/tools/perf/Makefile.perf | ||
248 | # Variant for mainline Linux | ||
249 | sed -i -e "s,root='/\$(DESTDIR_SQ)',prefix='\$(DESTDIR_SQ)/usr' --install-lib='\$(PYTHON_SITEPACKAGES_DIR)' --root='/\$(DESTDIR_SQ)',g" \ | ||
205 | ${S}/tools/perf/Makefile.perf | 250 | ${S}/tools/perf/Makefile.perf |
206 | # backport https://github.com/torvalds/linux/commit/e4ffd066ff440a57097e9140fa9e16ceef905de8 | 251 | # backport https://github.com/torvalds/linux/commit/e4ffd066ff440a57097e9140fa9e16ceef905de8 |
207 | sed -i -e 's,\($(Q)$(SHELL) .$(arch_errno_tbl).\) $(CC) $(arch_errno_hdr_dir),\1 $(firstword $(CC)) $(arch_errno_hdr_dir),g' \ | 252 | sed -i -e 's,\($(Q)$(SHELL) .$(arch_errno_tbl).\) $(CC) $(arch_errno_hdr_dir),\1 $(firstword $(CC)) $(arch_errno_hdr_dir),g' \ |
208 | ${S}/tools/perf/Makefile.perf | 253 | ${S}/tools/perf/Makefile.perf |
209 | fi | 254 | fi |
210 | sed -i -e "s,--root='/\$(DESTDIR_SQ)',--prefix='\$(DESTDIR_SQ)/usr' --install-lib='\$(DESTDIR)\$(PYTHON_SITEPACKAGES_DIR)',g" \ | 255 | sed -i -e "s,--root='/\$(DESTDIR_SQ)',--prefix='\$(DESTDIR_SQ)/usr' --install-lib='\$(DESTDIR)\$(PYTHON_SITEPACKAGES_DIR)',g" \ |
211 | ${S}/tools/perf/Makefile* | 256 | ${S}/tools/perf/Makefile |
212 | 257 | ||
213 | if [ -e "${S}/tools/build/Makefile.build" ]; then | 258 | if [ -e "${S}/tools/build/Makefile.build" ]; then |
214 | sed -i -e 's,\ .config-detected, $(OUTPUT)/config-detected,g' \ | 259 | sed -i -e 's,\ .config-detected, $(OUTPUT)/config-detected,g' \ |
@@ -225,6 +270,15 @@ do_configure:prepend () { | |||
225 | # reproducible. | 270 | # reproducible. |
226 | sed -i -e 's,$(call get-executable-or-default\,PYTHON\,$(PYTHON_AUTO)),$(notdir $(call get-executable-or-default\,PYTHON\,$(PYTHON_AUTO))),g' \ | 271 | sed -i -e 's,$(call get-executable-or-default\,PYTHON\,$(PYTHON_AUTO)),$(notdir $(call get-executable-or-default\,PYTHON\,$(PYTHON_AUTO))),g' \ |
227 | ${S}/tools/perf/Makefile.config | 272 | ${S}/tools/perf/Makefile.config |
273 | # The same line is in older releases, but looking explicitly for Python 2 | ||
274 | sed -i -e 's,$(call get-executable-or-default\,PYTHON\,$(PYTHON2)),$(notdir $(call get-executable-or-default\,PYTHON\,$(PYTHON2))),g' \ | ||
275 | ${S}/tools/perf/Makefile.config | ||
276 | |||
277 | # likewise with this substitution. Kernels with commit 18f2967418d031a39 | ||
278 | # [perf tools: Use Python devtools for version autodetection rather than runtime] | ||
279 | # need this substitution for reproducibility. | ||
280 | sed -i -e 's,$(call get-executable-or-default\,PYTHON\,$(subst -config\,\,$(PYTHON_AUTO))),$(notdir $(call get-executable-or-default\,PYTHON\,$(subst -config\,\,$(PYTHON_AUTO)))),g' \ | ||
281 | ${S}/tools/perf/Makefile.config | ||
228 | 282 | ||
229 | # The following line: | 283 | # The following line: |
230 | # srcdir_SQ = $(patsubst %tools/perf,tools/perf,$(subst ','\'',$(srcdir))), | 284 | # srcdir_SQ = $(patsubst %tools/perf,tools/perf,$(subst ','\'',$(srcdir))), |
@@ -233,6 +287,9 @@ do_configure:prepend () { | |||
233 | # change the Makefile line to remove everything before 'tools/perf' | 287 | # change the Makefile line to remove everything before 'tools/perf' |
234 | sed -i -e "s%srcdir_SQ = \$(subst ','\\\'',\$(srcdir))%srcdir_SQ = \$(patsubst \%tools/perf,tools/perf,\$(subst ','\\\'',\$(srcdir)))%g" \ | 288 | sed -i -e "s%srcdir_SQ = \$(subst ','\\\'',\$(srcdir))%srcdir_SQ = \$(patsubst \%tools/perf,tools/perf,\$(subst ','\\\'',\$(srcdir)))%g" \ |
235 | ${S}/tools/perf/Makefile.config | 289 | ${S}/tools/perf/Makefile.config |
290 | # Avoid hardcoded path to python-native | ||
291 | sed -i -e 's#\(PYTHON_WORD := \)$(call shell-wordify,$(PYTHON))#\1 python3#g' \ | ||
292 | ${S}/tools/perf/Makefile.config | ||
236 | fi | 293 | fi |
237 | if [ -e "${S}/tools/perf/tests/Build" ]; then | 294 | if [ -e "${S}/tools/perf/tests/Build" ]; then |
238 | # OUTPUT is the full path, we have python on the path so we remove it from the | 295 | # OUTPUT is the full path, we have python on the path so we remove it from the |
@@ -258,6 +315,20 @@ do_configure:prepend () { | |||
258 | sed -i -e "s,$target,$replacement1$replacement2$replacement3,g" \ | 315 | sed -i -e "s,$target,$replacement1$replacement2$replacement3,g" \ |
259 | "${S}/tools/perf/pmu-events/Build" | 316 | "${S}/tools/perf/pmu-events/Build" |
260 | fi | 317 | fi |
318 | if [ -e "${S}/tools/perf/pmu-events/jevents.py" ]; then | ||
319 | sed -i -e "s#os.scandir(path)#sorted(os.scandir(path), key=lambda e: e.name)#g" \ | ||
320 | "${S}/tools/perf/pmu-events/jevents.py" | ||
321 | fi | ||
322 | if [ -e "${S}/tools/perf/arch/arm64/Makefile" ]; then | ||
323 | sed -i 's,sysdef := $(srctree)/,sysdef := ,' ${S}/tools/perf/arch/arm64/Makefile | ||
324 | sed -i 's,$(incpath) $(sysdef),$(incpath) $(srctree)/$(sysdef) $(sysdef),' ${S}/tools/perf/arch/arm64/Makefile | ||
325 | fi | ||
326 | if [ -e "${S}/tools/perf/arch/arm64/entry/syscalls/mksyscalltbl" ]; then | ||
327 | if ! grep -q input_rel ${S}/tools/perf/arch/arm64/entry/syscalls/mksyscalltbl; then | ||
328 | sed -i 's,input=$4,input=$4\ninput_rel=$5,' ${S}/tools/perf/arch/arm64/entry/syscalls/mksyscalltbl | ||
329 | fi | ||
330 | sed -i 's,#include \\"\$input\\",#include \\"\$input_rel\\",' ${S}/tools/perf/arch/arm64/entry/syscalls/mksyscalltbl | ||
331 | fi | ||
261 | # end reproducibility substitutions | 332 | # end reproducibility substitutions |
262 | 333 | ||
263 | # We need to ensure the --sysroot option in CC is preserved | 334 | # We need to ensure the --sysroot option in CC is preserved |
@@ -265,6 +336,7 @@ do_configure:prepend () { | |||
265 | sed -i 's,CC = $(CROSS_COMPILE)gcc,#CC,' ${S}/tools/perf/Makefile.perf | 336 | sed -i 's,CC = $(CROSS_COMPILE)gcc,#CC,' ${S}/tools/perf/Makefile.perf |
266 | sed -i 's,AR = $(CROSS_COMPILE)ar,#AR,' ${S}/tools/perf/Makefile.perf | 337 | sed -i 's,AR = $(CROSS_COMPILE)ar,#AR,' ${S}/tools/perf/Makefile.perf |
267 | sed -i 's,LD = $(CROSS_COMPILE)ld,#LD,' ${S}/tools/perf/Makefile.perf | 338 | sed -i 's,LD = $(CROSS_COMPILE)ld,#LD,' ${S}/tools/perf/Makefile.perf |
339 | sed -i 's,PKG_CONFIG = $(CROSS_COMPILE)pkg-config,#PKG_CONFIG,' ${S}/tools/perf/Makefile.perf | ||
268 | fi | 340 | fi |
269 | if [ -e "${S}/tools/lib/api/Makefile" ]; then | 341 | if [ -e "${S}/tools/lib/api/Makefile" ]; then |
270 | sed -i 's,CC = $(CROSS_COMPILE)gcc,#CC,' ${S}/tools/lib/api/Makefile | 342 | sed -i 's,CC = $(CROSS_COMPILE)gcc,#CC,' ${S}/tools/lib/api/Makefile |
@@ -281,6 +353,9 @@ do_configure:prepend () { | |||
281 | if [ -e "${S}/tools/build/Makefile.feature" ]; then | 353 | if [ -e "${S}/tools/build/Makefile.feature" ]; then |
282 | sed -i 's,CFLAGS=,CC="\$(CC)" CFLAGS=,' ${S}/tools/build/Makefile.feature | 354 | sed -i 's,CFLAGS=,CC="\$(CC)" CFLAGS=,' ${S}/tools/build/Makefile.feature |
283 | fi | 355 | fi |
356 | # The libperl feature check produces fatal warnings due to -Werror being | ||
357 | # used, silence enough errors that the check passes. | ||
358 | sed -i 's/\(FLAGS_PERL_EMBED=.*\)/\1 -Wno-error=unused-function -Wno-error=attributes/' ${S}/tools/build/feature/Makefile | ||
284 | 359 | ||
285 | # 3.17-rc1+ has a include issue for arm/powerpc. Temporarily sed in the appropriate include | 360 | # 3.17-rc1+ has a include issue for arm/powerpc. Temporarily sed in the appropriate include |
286 | if [ -e "${S}/tools/perf/arch/$ARCH/util/skip-callchain-idx.c" ]; then | 361 | if [ -e "${S}/tools/perf/arch/$ARCH/util/skip-callchain-idx.c" ]; then |
@@ -310,26 +385,22 @@ do_configure:prepend () { | |||
310 | done | 385 | done |
311 | } | 386 | } |
312 | 387 | ||
313 | python do_package:prepend() { | ||
314 | d.setVar('PKGV', d.getVar("KERNEL_VERSION").split("-")[0]) | ||
315 | } | ||
316 | |||
317 | PACKAGE_ARCH = "${MACHINE_ARCH}" | 388 | PACKAGE_ARCH = "${MACHINE_ARCH}" |
318 | 389 | ||
319 | |||
320 | PACKAGES =+ "${PN}-archive ${PN}-tests ${PN}-perl ${PN}-python" | 390 | PACKAGES =+ "${PN}-archive ${PN}-tests ${PN}-perl ${PN}-python" |
321 | 391 | ||
322 | RDEPENDS:${PN} += "elfutils bash" | 392 | RDEPENDS:${PN} += "elfutils bash" |
323 | RDEPENDS:${PN}-archive =+ "bash" | 393 | RDEPENDS:${PN}-archive =+ "bash" |
324 | RDEPENDS:${PN}-python =+ "bash python3 python3-modules ${@bb.utils.contains('PACKAGECONFIG', 'audit', 'audit-python', '', d)}" | 394 | RDEPENDS:${PN}-python =+ "bash python3 python3-modules ${@bb.utils.contains('PACKAGECONFIG', 'audit', 'audit-python', '', d)}" |
325 | RDEPENDS:${PN}-perl =+ "bash perl perl-modules" | 395 | RDEPENDS:${PN}-perl =+ "bash perl perl-modules" |
326 | RDEPENDS:${PN}-tests =+ "python3 bash" | 396 | RDEPENDS:${PN}-tests =+ "python3 bash perl" |
327 | |||
328 | RSUGGESTS_SCRIPTING = "${@bb.utils.contains('PACKAGECONFIG', 'scripting', '${PN}-perl ${PN}-python', '',d)}" | ||
329 | RSUGGESTS:${PN} += "${PN}-archive ${PN}-tests ${RSUGGESTS_SCRIPTING}" | ||
330 | 397 | ||
398 | RSUGGESTS:${PN} += "${PN}-archive ${PN}-tests \ | ||
399 | ${@bb.utils.contains('PACKAGECONFIG', 'perl', '${PN}-perl', '', d)} \ | ||
400 | ${@bb.utils.contains('PACKAGECONFIG', 'python', '${PN}-python', '', d)} \ | ||
401 | " | ||
331 | FILES_SOLIBSDEV = "" | 402 | FILES_SOLIBSDEV = "" |
332 | FILES:${PN} += "${libexecdir}/perf-core ${exec_prefix}/libexec/perf-core ${libdir}/traceevent ${libdir}/libperf-jvmti.so" | 403 | FILES:${PN} += "${libexecdir}/perf-core ${exec_prefix}/libexec/perf-core ${libdir}/traceevent* ${libdir}/libperf-jvmti.so" |
333 | FILES:${PN}-archive = "${libdir}/perf/perf-core/perf-archive" | 404 | FILES:${PN}-archive = "${libdir}/perf/perf-core/perf-archive" |
334 | FILES:${PN}-tests = "${libdir}/perf/perf-core/tests ${libexecdir}/perf-core/tests" | 405 | FILES:${PN}-tests = "${libdir}/perf/perf-core/tests ${libexecdir}/perf-core/tests" |
335 | FILES:${PN}-python = " \ | 406 | FILES:${PN}-python = " \ |
@@ -338,6 +409,16 @@ FILES:${PN}-python = " \ | |||
338 | " | 409 | " |
339 | FILES:${PN}-perl = "${libexecdir}/perf-core/scripts/perl" | 410 | FILES:${PN}-perl = "${libexecdir}/perf-core/scripts/perl" |
340 | 411 | ||
341 | |||
342 | INHIBIT_PACKAGE_DEBUG_SPLIT="1" | ||
343 | DEBUG_OPTIMIZATION:append = " -Wno-error=maybe-uninitialized" | 412 | DEBUG_OPTIMIZATION:append = " -Wno-error=maybe-uninitialized" |
413 | |||
414 | PACKAGESPLITFUNCS =+ "perf_fix_sources" | ||
415 | |||
416 | perf_fix_sources () { | ||
417 | for f in util/parse-events-flex.h util/parse-events-flex.c util/pmu-flex.c \ | ||
418 | util/pmu-flex.h util/expr-flex.h util/expr-flex.c; do | ||
419 | f=${PKGD}${TARGET_DBGSRC_DIR}/$f | ||
420 | if [ -e $f ]; then | ||
421 | sed -i -e 's#${S}/##g' $f | ||
422 | fi | ||
423 | done | ||
424 | } | ||
diff --git a/meta/recipes-kernel/perf/perf/sort-pmuevents.py b/meta/recipes-kernel/perf/perf/sort-pmuevents.py index 09ba3328a7..0a87e553ab 100755 --- a/meta/recipes-kernel/perf/perf/sort-pmuevents.py +++ b/meta/recipes-kernel/perf/perf/sort-pmuevents.py | |||
@@ -36,10 +36,10 @@ with open(infile, 'r') as file: | |||
36 | preamble_regex = re.compile( '^(.*?)^(struct|const struct|static struct|static const struct)', re.MULTILINE | re.DOTALL ) | 36 | preamble_regex = re.compile( '^(.*?)^(struct|const struct|static struct|static const struct)', re.MULTILINE | re.DOTALL ) |
37 | 37 | ||
38 | preamble = re.search( preamble_regex, data ) | 38 | preamble = re.search( preamble_regex, data ) |
39 | struct_block_regex = re.compile( '^(struct|const struct|static struct|static const struct).*?(\w+) (.*?)\[\] = {(.*?)^};', re.MULTILINE | re.DOTALL ) | 39 | struct_block_regex = re.compile(r'^(struct|const struct|static struct|static const struct).*?(\w+) (.*?)\[\] = {(.*?)^};', re.MULTILINE | re.DOTALL ) |
40 | field_regex = re.compile( '{.*?},', re.MULTILINE | re.DOTALL ) | 40 | field_regex = re.compile(r'{.*?},', re.MULTILINE | re.DOTALL ) |
41 | cpuid_regex = re.compile( '\.cpuid = (.*?),', re.MULTILINE | re.DOTALL ) | 41 | cpuid_regex = re.compile(r'\.cpuid = (.*?),', re.MULTILINE | re.DOTALL ) |
42 | name_regex = re.compile( '\.name = (.*?),', re.MULTILINE | re.DOTALL ) | 42 | name_regex = re.compile(r'\.name = (.*?),', re.MULTILINE | re.DOTALL ) |
43 | 43 | ||
44 | # create a dictionary structure to store all the structs, their | 44 | # create a dictionary structure to store all the structs, their |
45 | # types and then their fields. | 45 | # types and then their fields. |
@@ -62,7 +62,10 @@ for struct in re.findall( struct_block_regex, data ): | |||
62 | #print( " name found: %s" % name.group(1) ) | 62 | #print( " name found: %s" % name.group(1) ) |
63 | entry_dict[struct[2]]['fields'][name.group(1)] = entry | 63 | entry_dict[struct[2]]['fields'][name.group(1)] = entry |
64 | 64 | ||
65 | if not entry_dict[struct[2]]['fields']: | 65 | # unmatched entries are most likely array terminators and |
66 | # should end up as the last element in the sorted list, which | ||
67 | # is achieved by using '0' as the key | ||
68 | if not cpuid and not name: | ||
66 | entry_dict[struct[2]]['fields']['0'] = entry | 69 | entry_dict[struct[2]]['fields']['0'] = entry |
67 | 70 | ||
68 | # created ordered dictionaries from the captured values. These are ordered by | 71 | # created ordered dictionaries from the captured values. These are ordered by |
diff --git a/meta/recipes-kernel/powertop/powertop/0001-src-fix-compatibility-with-ncurses-6.3.patch b/meta/recipes-kernel/powertop/powertop/0001-src-fix-compatibility-with-ncurses-6.3.patch deleted file mode 100644 index 84b05ac971..0000000000 --- a/meta/recipes-kernel/powertop/powertop/0001-src-fix-compatibility-with-ncurses-6.3.patch +++ /dev/null | |||
@@ -1,52 +0,0 @@ | |||
1 | From 76d3f0851520bc8488e432f423941f1e72cc7405 Mon Sep 17 00:00:00 2001 | ||
2 | From: Alexander Kanavin <alex@linutronix.de> | ||
3 | Date: Mon, 25 Oct 2021 17:47:23 +0200 | ||
4 | Subject: [PATCH] src: fix compatibility with ncurses 6.3 | ||
5 | |||
6 | Upstream-Status: Submitted [https://github.com/fenrus75/powertop/pull/92] | ||
7 | Signed-off-by: Alexander Kanavin <alex@linutronix.de> | ||
8 | --- | ||
9 | src/devices/devfreq.cpp | 2 +- | ||
10 | src/display.cpp | 2 +- | ||
11 | src/lib.cpp | 2 +- | ||
12 | 3 files changed, 3 insertions(+), 3 deletions(-) | ||
13 | |||
14 | diff --git a/src/devices/devfreq.cpp b/src/devices/devfreq.cpp | ||
15 | index 0509d0f..b194ac4 100644 | ||
16 | --- a/src/devices/devfreq.cpp | ||
17 | +++ b/src/devices/devfreq.cpp | ||
18 | @@ -297,7 +297,7 @@ void display_devfreq_devices(void) | ||
19 | df->fill_freq_utilization(j, buf); | ||
20 | strcat(fline, buf); | ||
21 | strcat(fline, "\n"); | ||
22 | - wprintw(win, fline); | ||
23 | + wprintw(win, "%s", fline); | ||
24 | } | ||
25 | wprintw(win, "\n"); | ||
26 | } | ||
27 | diff --git a/src/display.cpp b/src/display.cpp | ||
28 | index 7131144..cc03919 100644 | ||
29 | --- a/src/display.cpp | ||
30 | +++ b/src/display.cpp | ||
31 | @@ -125,7 +125,7 @@ void show_tab(unsigned int tab) | ||
32 | |||
33 | c = bottom_lines[tab_names[tab]].c_str(); | ||
34 | if (c && strlen(c) > 0) | ||
35 | - mvwprintw(bottom_line, 0,0, c); | ||
36 | + mvwprintw(bottom_line, 0,0, "%s", c); | ||
37 | else | ||
38 | mvwprintw(bottom_line, 0, 0, | ||
39 | "<ESC> %s | <TAB> / <Shift + TAB> %s | ", _("Exit"), | ||
40 | diff --git a/src/lib.cpp b/src/lib.cpp | ||
41 | index 5e48f37..5cd1c4a 100644 | ||
42 | --- a/src/lib.cpp | ||
43 | +++ b/src/lib.cpp | ||
44 | @@ -583,7 +583,7 @@ void ui_notify_user_ncurses(const char *frmt, ...) | ||
45 | * buffer */ | ||
46 | vsnprintf(notify, UI_NOTIFY_BUFF_SZ - 1, frmt, list); | ||
47 | va_end(list); | ||
48 | - mvprintw(1, 0, notify); | ||
49 | + mvprintw(1, 0, "%s", notify); | ||
50 | attroff(COLOR_PAIR(1)); | ||
51 | } | ||
52 | |||
diff --git a/meta/recipes-kernel/powertop/powertop_2.14.bb b/meta/recipes-kernel/powertop/powertop_2.15.bb index b46e5e8041..a9008b4074 100644 --- a/meta/recipes-kernel/powertop/powertop_2.14.bb +++ b/meta/recipes-kernel/powertop/powertop_2.15.bb | |||
@@ -2,19 +2,16 @@ SUMMARY = "Power usage tool" | |||
2 | DESCRIPTION = "Linux tool to diagnose issues with power consumption and power management." | 2 | DESCRIPTION = "Linux tool to diagnose issues with power consumption and power management." |
3 | HOMEPAGE = "https://01.org/powertop/" | 3 | HOMEPAGE = "https://01.org/powertop/" |
4 | BUGTRACKER = "https://app.devzing.com/powertopbugs/bugzilla" | 4 | BUGTRACKER = "https://app.devzing.com/powertopbugs/bugzilla" |
5 | DEPENDS = "ncurses libnl pciutils autoconf-archive" | 5 | DEPENDS = "ncurses libnl pciutils autoconf-archive-native" |
6 | LICENSE = "GPLv2" | 6 | LICENSE = "GPL-2.0-only" |
7 | LIC_FILES_CHKSUM = "file://COPYING;md5=12f884d2ae1ff87c09e5b7ccc2c4ca7e" | 7 | LIC_FILES_CHKSUM = "file://COPYING;md5=12f884d2ae1ff87c09e5b7ccc2c4ca7e" |
8 | 8 | ||
9 | SRC_URI = "git://github.com/fenrus75/powertop;protocol=https;branch=master \ | 9 | SRC_URI = "git://github.com/fenrus75/powertop;protocol=https;branch=master \ |
10 | file://0001-wakeup_xxx.h-include-limits.h.patch \ | 10 | file://0001-wakeup_xxx.h-include-limits.h.patch \ |
11 | file://0001-src-fix-compatibility-with-ncurses-6.3.patch \ | ||
12 | " | 11 | " |
13 | SRCREV = "52f022f9bbe6e060fba11701d657a8d9762702ba" | 12 | SRCREV = "d51ad395436d4d1dcc3ca46e1519ffeb475bf651" |
14 | 13 | ||
15 | S = "${WORKDIR}/git" | 14 | LDFLAGS += "-pthread" |
16 | |||
17 | LDFLAGS:append = " -pthread" | ||
18 | 15 | ||
19 | inherit autotools gettext pkgconfig bash-completion | 16 | inherit autotools gettext pkgconfig bash-completion |
20 | 17 | ||
diff --git a/meta/recipes-kernel/systemtap/systemtap-native_git.bb b/meta/recipes-kernel/systemtap/systemtap-native_5.3.bb index 19cc1cf0f0..8befa7a7ea 100644 --- a/meta/recipes-kernel/systemtap/systemtap-native_git.bb +++ b/meta/recipes-kernel/systemtap/systemtap-native_5.3.bb | |||
@@ -1,6 +1,5 @@ | |||
1 | require systemtap_${PV}.bb | ||
1 | 2 | ||
2 | require systemtap_git.bb | 3 | inherit_defer native |
3 | |||
4 | inherit native | ||
5 | 4 | ||
6 | addtask addto_recipe_sysroot after do_populate_sysroot before do_build | 5 | addtask addto_recipe_sysroot after do_populate_sysroot before do_build |
diff --git a/meta/recipes-kernel/systemtap/systemtap-uprobes_git.bb b/meta/recipes-kernel/systemtap/systemtap-uprobes_git.bb deleted file mode 100644 index 2181e45a8d..0000000000 --- a/meta/recipes-kernel/systemtap/systemtap-uprobes_git.bb +++ /dev/null | |||
@@ -1,40 +0,0 @@ | |||
1 | SUMMARY = "UProbes kernel module for SystemTap" | ||
2 | HOMEPAGE = "https://sourceware.org/systemtap/" | ||
3 | require systemtap_git.inc | ||
4 | |||
5 | DEPENDS = "systemtap virtual/kernel" | ||
6 | |||
7 | # On systems without CONFIG_UTRACE, this package is empty. | ||
8 | ALLOW_EMPTY:${PN} = "1" | ||
9 | |||
10 | inherit module-base gettext | ||
11 | |||
12 | FILESEXTRAPATHS =. "${FILE_DIRNAME}/systemtap:" | ||
13 | |||
14 | FILES:${PN} += "${datadir}/systemtap/runtime/uprobes" | ||
15 | |||
16 | # Compile and install the uprobes kernel module on machines with utrace | ||
17 | # support. Note that staprun expects it in the systemtap/runtime directory, | ||
18 | # not in /lib/modules. | ||
19 | do_compile() { | ||
20 | if grep -q "CONFIG_UTRACE=y" ${STAGING_KERNEL_BUILDDIR}/.config | ||
21 | then | ||
22 | unset CFLAGS CPPFLAGS CXXFLAGS LDFLAGS CC LD CPP | ||
23 | oe_runmake CC="${KERNEL_CC}" LD="${KERNEL_LD}" \ | ||
24 | AR="${KERNEL_AR}" \ | ||
25 | -C ${STAGING_KERNEL_DIR} scripts | ||
26 | oe_runmake KDIR=${STAGING_KERNEL_DIR} \ | ||
27 | M="${S}/runtime/uprobes/" \ | ||
28 | CC="${KERNEL_CC}" LD="${KERNEL_LD}" \ | ||
29 | AR="${KERNEL_AR}" \ | ||
30 | -C "${S}/runtime/uprobes/" | ||
31 | fi | ||
32 | } | ||
33 | |||
34 | do_install() { | ||
35 | if [ -e "${S}/runtime/uprobes/uprobes.ko" ] | ||
36 | then | ||
37 | install -d ${D}${datadir}/systemtap/runtime/uprobes/ | ||
38 | install -m 0644 ${S}/runtime/uprobes/uprobes.ko ${D}${datadir}/systemtap/runtime/uprobes/ | ||
39 | fi | ||
40 | } | ||
diff --git a/meta/recipes-kernel/systemtap/systemtap/0001-Install-python-modules-to-correct-library-dir.patch b/meta/recipes-kernel/systemtap/systemtap/0001-Install-python-modules-to-correct-library-dir.patch index 48cf4aee85..ee9baedcda 100644 --- a/meta/recipes-kernel/systemtap/systemtap/0001-Install-python-modules-to-correct-library-dir.patch +++ b/meta/recipes-kernel/systemtap/systemtap/0001-Install-python-modules-to-correct-library-dir.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 2ada22f05460223924efe54080cb4419e2b4c276 Mon Sep 17 00:00:00 2001 | 1 | From 18d088d10c1a0885fa25ac40591e38c8aa545c81 Mon Sep 17 00:00:00 2001 |
2 | From: Alexander Kanavin <alex.kanavin@gmail.com> | 2 | From: Alexander Kanavin <alex.kanavin@gmail.com> |
3 | Date: Fri, 24 Feb 2017 17:53:02 +0200 | 3 | Date: Fri, 24 Feb 2017 17:53:02 +0200 |
4 | Subject: [PATCH] Install python modules to correct library dir. | 4 | Subject: [PATCH] Install python modules to correct library dir. |
@@ -19,7 +19,7 @@ Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com> | |||
19 | 1 file changed, 6 insertions(+), 2 deletions(-) | 19 | 1 file changed, 6 insertions(+), 2 deletions(-) |
20 | 20 | ||
21 | diff --git a/python/Makefile.am b/python/Makefile.am | 21 | diff --git a/python/Makefile.am b/python/Makefile.am |
22 | index a254480..578602f 100644 | 22 | index 13618dc2f..9d5cb7bcb 100644 |
23 | --- a/python/Makefile.am | 23 | --- a/python/Makefile.am |
24 | +++ b/python/Makefile.am | 24 | +++ b/python/Makefile.am |
25 | @@ -8,6 +8,10 @@ AUTOMAKE_OPTIONS = subdir-objects | 25 | @@ -8,6 +8,10 @@ AUTOMAKE_OPTIONS = subdir-objects |
@@ -35,7 +35,7 @@ index a254480..578602f 100644 | |||
35 | pkglibexecpython_PYTHON = | 35 | pkglibexecpython_PYTHON = |
36 | @@ -47,7 +51,7 @@ install-exec-local: | 36 | @@ -47,7 +51,7 @@ install-exec-local: |
37 | if HAVE_PYTHON2_PROBES | 37 | if HAVE_PYTHON2_PROBES |
38 | (cd $(srcdir); CFLAGS="$(AM_CPPFLAGS)" $(PYTHON) setup.py build \ | 38 | (cd $(srcdir); CFLAGS="$(CFLAGS) $(AM_CPPFLAGS)" $(PYTHON) setup.py build \ |
39 | --build-base $(shell readlink -f $(builddir))/py2build \ | 39 | --build-base $(shell readlink -f $(builddir))/py2build \ |
40 | - install --prefix $(DESTDIR)$(prefix) \ | 40 | - install --prefix $(DESTDIR)$(prefix) \ |
41 | + install --root $(DESTDIR) --prefix $(prefix) --prefix $(prefix) --install-lib=${pythondir} \ | 41 | + install --root $(DESTDIR) --prefix $(prefix) --prefix $(prefix) --install-lib=${pythondir} \ |
@@ -44,13 +44,10 @@ index a254480..578602f 100644 | |||
44 | --verbose) | 44 | --verbose) |
45 | @@ -55,7 +59,7 @@ endif | 45 | @@ -55,7 +59,7 @@ endif |
46 | if HAVE_PYTHON3_PROBES | 46 | if HAVE_PYTHON3_PROBES |
47 | (cd $(srcdir); CFLAGS="$(AM_CPPFLAGS)" $(PYTHON3) setup.py build \ | 47 | (cd $(srcdir); CFLAGS="$(CFLAGS) $(AM_CPPFLAGS)" $(PYTHON3) setup.py build \ |
48 | --build-base $(shell readlink -f $(builddir))/py3build \ | 48 | --build-base $(shell readlink -f $(builddir))/py3build \ |
49 | - install --prefix $(DESTDIR)$(prefix) \ | 49 | - install --prefix $(DESTDIR)$(prefix) \ |
50 | + install --root $(DESTDIR) --prefix $(prefix) --install-lib=${python3dir} \ | 50 | + install --root $(DESTDIR) --prefix $(prefix) --install-lib=${python3dir} \ |
51 | --single-version-externally-managed \ | 51 | --single-version-externally-managed \ |
52 | --record $(shell readlink -f $(builddir))/py3build/install_files.txt \ | 52 | --record $(shell readlink -f $(builddir))/py3build/install_files.txt \ |
53 | --verbose) | 53 | --verbose) |
54 | -- | ||
55 | 2.7.4 | ||
56 | |||
diff --git a/meta/recipes-kernel/systemtap/systemtap/0001-improve-reproducibility-for-c-compiling.patch b/meta/recipes-kernel/systemtap/systemtap/0001-improve-reproducibility-for-c-compiling.patch index 15a6f2a9a5..7d35f76b29 100644 --- a/meta/recipes-kernel/systemtap/systemtap/0001-improve-reproducibility-for-c-compiling.patch +++ b/meta/recipes-kernel/systemtap/systemtap/0001-improve-reproducibility-for-c-compiling.patch | |||
@@ -13,19 +13,16 @@ Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com> | |||
13 | stringtable.h | 2 +- | 13 | stringtable.h | 2 +- |
14 | 1 file changed, 1 insertion(+), 1 deletion(-) | 14 | 1 file changed, 1 insertion(+), 1 deletion(-) |
15 | 15 | ||
16 | diff --git a/stringtable.h b/stringtable.h | 16 | Index: git/stringtable.h |
17 | index 5fc42e7..6fd8a1e 100644 | 17 | =================================================================== |
18 | --- a/stringtable.h | 18 | --- git.orig/stringtable.h |
19 | +++ b/stringtable.h | 19 | +++ git/stringtable.h |
20 | @@ -19,7 +19,7 @@ | 20 | @@ -23,7 +23,7 @@ |
21 | 21 | ||
22 | #if defined(HAVE_BOOST_UTILITY_STRING_REF_HPP) | 22 | #if 0 && defined(HAVE_BOOST_UTILITY_STRING_REF_HPP) |
23 | #include <boost/version.hpp> | 23 | #include <boost/version.hpp> |
24 | -#include <boost/utility/string_ref.hpp> //header with string_ref | 24 | -#include <boost/utility/string_ref.hpp> //header with string_ref |
25 | +#include "@RELATIVE_STAGING_INCDIR@/boost/utility/string_ref.hpp" //header with string_ref | 25 | +#include "@RELATIVE_STAGING_INCDIR@/boost/utility/string_ref.hpp" //header with string_ref |
26 | 26 | ||
27 | // XXX: experimental tunables | 27 | // XXX: experimental tunables |
28 | #define INTERNED_STRING_FIND_MEMMEM 1 /* perf stat indicates a very slight benefit */ | 28 | #define INTERNED_STRING_FIND_MEMMEM 1 /* perf stat indicates a very slight benefit */ |
29 | -- | ||
30 | 2.7.4 | ||
31 | |||
diff --git a/meta/recipes-kernel/systemtap/systemtap/0001-python-Makefile.am-use-absolute-path-for-source-dire.patch b/meta/recipes-kernel/systemtap/systemtap/0001-python-Makefile.am-use-absolute-path-for-source-dire.patch new file mode 100644 index 0000000000..dacd19edd1 --- /dev/null +++ b/meta/recipes-kernel/systemtap/systemtap/0001-python-Makefile.am-use-absolute-path-for-source-dire.patch | |||
@@ -0,0 +1,36 @@ | |||
1 | From 71e4ffd46dbbb7de1d06edb66f3e1fe0de423586 Mon Sep 17 00:00:00 2001 | ||
2 | From: Alexander Kanavin <alex@linutronix.de> | ||
3 | Date: Wed, 21 May 2025 13:25:46 +0200 | ||
4 | Subject: [PATCH] python/Makefile.am: use absolute path for source directory | ||
5 | includes as well | ||
6 | |||
7 | Otherwise it would be relative to the build directory, | ||
8 | which works only if the build and source directory are in the | ||
9 | same parent directory, and breaks if they're on different levels. | ||
10 | |||
11 | Upstream-Status: Submitted [by email to fche@redhat.com,wcohen@redhat.com,systemtap@sourceware.org] | ||
12 | Signed-off-by: Alexander Kanavin <alex@linutronix.de> | ||
13 | --- | ||
14 | python/Makefile.am | 4 ++-- | ||
15 | 1 file changed, 2 insertions(+), 2 deletions(-) | ||
16 | |||
17 | diff --git a/python/Makefile.am b/python/Makefile.am | ||
18 | index 9d5cb7bcb..130e90b24 100644 | ||
19 | --- a/python/Makefile.am | ||
20 | +++ b/python/Makefile.am | ||
21 | @@ -2,10 +2,10 @@ | ||
22 | |||
23 | AUTOMAKE_OPTIONS = subdir-objects | ||
24 | |||
25 | -# Note that we have to use 'abs_builddir' here since we change | ||
26 | +# Note that we have to use absolute directores here since we change | ||
27 | # directories back to the source directory when building the python | ||
28 | # extension. | ||
29 | -AM_CPPFLAGS = -I$(srcdir)/../includes | ||
30 | +AM_CPPFLAGS = -I$(abs_srcdir)/../includes | ||
31 | AM_CPPFLAGS += -I$(abs_builddir)/../includes/sys | ||
32 | |||
33 | # Add OE's CFLAGS which contains `-fdebug-prefix-map' options to | ||
34 | -- | ||
35 | 2.39.5 | ||
36 | |||
diff --git a/meta/recipes-kernel/systemtap/systemtap_git.bb b/meta/recipes-kernel/systemtap/systemtap_5.3.bb index d11d9b93a2..588b3b8d36 100644 --- a/meta/recipes-kernel/systemtap/systemtap_git.bb +++ b/meta/recipes-kernel/systemtap/systemtap_5.3.bb | |||
@@ -6,8 +6,10 @@ HOMEPAGE = "https://sourceware.org/systemtap/" | |||
6 | 6 | ||
7 | require systemtap_git.inc | 7 | require systemtap_git.inc |
8 | 8 | ||
9 | SRC_URI += "file://0001-improve-reproducibility-for-c-compiling.patch \ | 9 | SRC_URI += " \ |
10 | file://0001-improve-reproducibility-for-c-compiling.patch \ | ||
10 | file://0001-staprun-address-ncurses-6.3-failures.patch \ | 11 | file://0001-staprun-address-ncurses-6.3-failures.patch \ |
12 | file://0001-python-Makefile.am-use-absolute-path-for-source-dire.patch \ | ||
11 | " | 13 | " |
12 | 14 | ||
13 | DEPENDS = "elfutils" | 15 | DEPENDS = "elfutils" |
@@ -16,6 +18,7 @@ EXTRA_OECONF += "--with-libelf=${STAGING_DIR_TARGET} --without-rpm \ | |||
16 | --without-nss --without-avahi --without-dyninst \ | 18 | --without-nss --without-avahi --without-dyninst \ |
17 | --disable-server --disable-grapher --enable-prologues \ | 19 | --disable-server --disable-grapher --enable-prologues \ |
18 | --with-python3 --without-python2-probes \ | 20 | --with-python3 --without-python2-probes \ |
21 | --with-extra-version="oe" \ | ||
19 | ac_cv_prog_have_javac=no \ | 22 | ac_cv_prog_have_javac=no \ |
20 | ac_cv_prog_have_jar=no " | 23 | ac_cv_prog_have_jar=no " |
21 | 24 | ||
@@ -23,15 +26,16 @@ STAP_DOCS ?= "--disable-docs --disable-publican --disable-refdocs" | |||
23 | 26 | ||
24 | EXTRA_OECONF += "${STAP_DOCS} " | 27 | EXTRA_OECONF += "${STAP_DOCS} " |
25 | 28 | ||
26 | PACKAGECONFIG ??= "translator sqlite monitor python3-probes" | 29 | PACKAGECONFIG ??= "translator sqlite monitor python3-probes ${@bb.utils.filter('DISTRO_FEATURES', 'debuginfod', d)}" |
27 | PACKAGECONFIG[translator] = "--enable-translator,--disable-translator,boost,bash" | 30 | PACKAGECONFIG[translator] = "--enable-translator,--disable-translator,boost,bash" |
28 | PACKAGECONFIG[libvirt] = "--enable-libvirt,--disable-libvirt,libvirt" | 31 | PACKAGECONFIG[libvirt] = "--enable-libvirt,--disable-libvirt,libvirt" |
29 | PACKAGECONFIG[sqlite] = "--enable-sqlite,--disable-sqlite,sqlite3" | 32 | PACKAGECONFIG[sqlite] = "--enable-sqlite,--disable-sqlite,sqlite3" |
30 | PACKAGECONFIG[monitor] = "--enable-monitor,--disable-monitor,ncurses json-c" | 33 | PACKAGECONFIG[monitor] = "--enable-monitor,--disable-monitor,ncurses json-c" |
31 | PACKAGECONFIG[python3-probes] = "--with-python3-probes,--without-python3-probes,python3-setuptools-native" | 34 | PACKAGECONFIG[python3-probes] = "--with-python3-probes,--without-python3-probes,python3-setuptools-native" |
35 | PACKAGECONFIG[debuginfod] = "--with-debuginfod, --without-debuginfod" | ||
32 | 36 | ||
33 | inherit autotools gettext pkgconfig systemd | 37 | inherit autotools gettext pkgconfig systemd |
34 | inherit ${@bb.utils.contains('PACKAGECONFIG', 'python3-probes', 'distutils3-base', '', d)} | 38 | inherit_defer ${@bb.utils.contains('PACKAGECONFIG', 'python3-probes', 'setuptools3-base', '', d)} |
35 | 39 | ||
36 | # exporter comes with python3-probes | 40 | # exporter comes with python3-probes |
37 | PACKAGES =+ "${PN}-exporter" | 41 | PACKAGES =+ "${PN}-exporter" |
@@ -96,3 +100,7 @@ do_install:append () { | |||
96 | } | 100 | } |
97 | 101 | ||
98 | BBCLASSEXTEND = "nativesdk" | 102 | BBCLASSEXTEND = "nativesdk" |
103 | |||
104 | # Emits lot of warning which are treated as errors | ||
105 | # They must be looked into before disabling | ||
106 | TOOLCHAIN = "gcc" | ||
diff --git a/meta/recipes-kernel/systemtap/systemtap_git.inc b/meta/recipes-kernel/systemtap/systemtap_git.inc index 22b07f1516..86336b0779 100644 --- a/meta/recipes-kernel/systemtap/systemtap_git.inc +++ b/meta/recipes-kernel/systemtap/systemtap_git.inc | |||
@@ -1,18 +1,16 @@ | |||
1 | LICENSE = "GPLv2" | 1 | LICENSE = "GPL-2.0-only" |
2 | LIC_FILES_CHKSUM = "file://COPYING;md5=b234ee4d69f5fce4486a80fdaf4a4263" | 2 | LIC_FILES_CHKSUM = "file://COPYING;md5=b234ee4d69f5fce4486a80fdaf4a4263" |
3 | SRCREV = "2e9f2f6967e44ce2bf8f34932b5bdd738ece2161" | ||
4 | PV = "4.6" | ||
5 | 3 | ||
6 | SRC_URI = "git://sourceware.org/git/systemtap.git;branch=master \ | 4 | SRC_URI = "git://sourceware.org/git/systemtap.git;protocol=https;branch=master;tag=release-${PV} \ |
7 | file://0001-Do-not-let-configure-write-a-python-location-into-th.patch \ | 5 | file://0001-Do-not-let-configure-write-a-python-location-into-th.patch \ |
8 | file://0001-Install-python-modules-to-correct-library-dir.patch \ | 6 | file://0001-Install-python-modules-to-correct-library-dir.patch \ |
9 | file://0001-staprun-stapbpf-don-t-support-installing-a-non-root.patch \ | 7 | file://0001-staprun-stapbpf-don-t-support-installing-a-non-root.patch \ |
10 | " | 8 | " |
11 | 9 | ||
12 | COMPATIBLE_HOST = '(x86_64|i.86|powerpc|arm|aarch64|microblazeel|mips).*-linux' | 10 | SRCREV = "c4fc655170b534478a6b131292b987630c7c0865" |
13 | COMPATIBLE_HOST:libc-musl = 'null' | ||
14 | 11 | ||
15 | S = "${WORKDIR}/git" | 12 | COMPATIBLE_HOST = '(x86_64|i.86|powerpc|arm|aarch64|microblazeel|mips|riscv64).*-linux' |
13 | COMPATIBLE_HOST:libc-musl = 'null' | ||
16 | 14 | ||
17 | # systemtap can't be built without optimization, if someone tries to compile an | 15 | # systemtap can't be built without optimization, if someone tries to compile an |
18 | # entire image as -O0, break with fatal. | 16 | # entire image as -O0, break with fatal. |
diff --git a/meta/recipes-kernel/wireless-regdb/wireless-regdb_2021.08.28.bb b/meta/recipes-kernel/wireless-regdb/wireless-regdb_2025.02.20.bb index c673f8044c..09fff768c4 100644 --- a/meta/recipes-kernel/wireless-regdb/wireless-regdb_2021.08.28.bb +++ b/meta/recipes-kernel/wireless-regdb/wireless-regdb_2025.02.20.bb | |||
@@ -5,7 +5,7 @@ LICENSE = "ISC" | |||
5 | LIC_FILES_CHKSUM = "file://LICENSE;md5=07c4f6dea3845b02a18dc00c8c87699c" | 5 | LIC_FILES_CHKSUM = "file://LICENSE;md5=07c4f6dea3845b02a18dc00c8c87699c" |
6 | 6 | ||
7 | SRC_URI = "https://www.kernel.org/pub/software/network/${BPN}/${BP}.tar.xz" | 7 | SRC_URI = "https://www.kernel.org/pub/software/network/${BPN}/${BP}.tar.xz" |
8 | SRC_URI[sha256sum] = "cff370c410d1e6d316ae0a7fa8ac6278fdf1efca5d3d664aca7cfd2aafa54446" | 8 | SRC_URI[sha256sum] = "57f8e7721cf5a880c13ae0c202edbb21092a060d45f9e9c59bcd2a8272bfa456" |
9 | 9 | ||
10 | inherit bin_package allarch | 10 | inherit bin_package allarch |
11 | 11 | ||
@@ -13,7 +13,7 @@ do_install() { | |||
13 | install -d -m0755 ${D}${nonarch_libdir}/crda | 13 | install -d -m0755 ${D}${nonarch_libdir}/crda |
14 | install -d -m0755 ${D}${sysconfdir}/wireless-regdb/pubkeys | 14 | install -d -m0755 ${D}${sysconfdir}/wireless-regdb/pubkeys |
15 | install -m 0644 regulatory.bin ${D}${nonarch_libdir}/crda/regulatory.bin | 15 | install -m 0644 regulatory.bin ${D}${nonarch_libdir}/crda/regulatory.bin |
16 | install -m 0644 sforshee.key.pub.pem ${D}${sysconfdir}/wireless-regdb/pubkeys/sforshee.key.pub.pem | 16 | install -m 0644 wens.key.pub.pem ${D}${sysconfdir}/wireless-regdb/pubkeys/wens.key.pub.pem |
17 | 17 | ||
18 | install -m 0644 -D regulatory.db ${D}${nonarch_base_libdir}/firmware/regulatory.db | 18 | install -m 0644 -D regulatory.db ${D}${nonarch_base_libdir}/firmware/regulatory.db |
19 | install -m 0644 regulatory.db.p7s ${D}${nonarch_base_libdir}/firmware/regulatory.db.p7s | 19 | install -m 0644 regulatory.db.p7s ${D}${nonarch_base_libdir}/firmware/regulatory.db.p7s |