From patchwork Thu Jan 11 16:27:14 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 37635 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 61865C47DA2 for ; Thu, 11 Jan 2024 16:27:42 +0000 (UTC) Received: from mail-pl1-f174.google.com (mail-pl1-f174.google.com [209.85.214.174]) by mx.groups.io with SMTP id smtpd.web11.15552.1704990454456802584 for ; Thu, 11 Jan 2024 08:27:34 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=AfwyPFMv; spf=softfail (domain: sakoman.com, ip: 209.85.214.174, mailfrom: steve@sakoman.com) Received: by mail-pl1-f174.google.com with SMTP id d9443c01a7336-1d41bb4da91so31055445ad.0 for ; Thu, 11 Jan 2024 08:27:34 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1704990453; x=1705595253; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=2pkdPHV+I/ZCBq5tW54d6I6gY7sfYIdg5WNA6f+AmLA=; b=AfwyPFMv9f79AZU98skoacy4emPcLc+Dw+L/4f18O8xZYxvN4YCXr0vCtAXjlQP4+h f8LkTw0Nry1aXPJLR60gBocfbpzW7t3l0ZL8KdiY8MJOwclBAFC1fuTEmx1sU3tLzlOj cHoM7SWe3YSY/nznRCEh41GLDCiu0UXzvX6WY/aiMBhi/2ERc5f4y1a4LNK+gNsznID8 S3utMx7d7BfmQG4p+vnOXyunasMmYItv+eLjzC1Y6lz8jibKOdUDu7ADP6QyrPDNRwHA 7rbPGL2B/4LKiY0E4C+JB++HlO0/0g9GMoRxi2DRDYViJXuM/ZLsJw3LlQ8UdWPHKH0q kcIA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1704990453; x=1705595253; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=2pkdPHV+I/ZCBq5tW54d6I6gY7sfYIdg5WNA6f+AmLA=; b=Vv0T0RgOjT+x6imPNshMYIiumaM5Yikq+jIjPimoC6KJ+CLMmqd9A5NnFAGVvCkoMW EP+TS41ikOzqmlgbAUQeBcu/IhXSv/1g79sIckc7yrLSSKQksvxDo5rM8hErBqoks3iW NTPq7zgmXEYz+RAgvb/y2lRxfXAJkA7BZVokQa1v7YT16aj1CaATKVhLlgRbFCkGbbu0 ScaoKa28nFafuBegtQ1cCStJKQSj6NgJmcXPNScwKVIZx3JtlJPNJww2CzCfRTRTcodq qhVkDoNQlBcX2B0L4n3dTOMEmoULLdqcomtuWhPCsSeum1M3v/0btFEk7hyhHGX7bqop l+cw== X-Gm-Message-State: AOJu0YyPdY2PovhWtAEbmpRbhSOwiPj2kvv7kqkAagTMV968cd+xoMPz bEz67j6dtmjbOilVAtQ52UXlNMTq8zbogy+WQvZ+gsQGoFPzPQ== X-Google-Smtp-Source: AGHT+IHyk5mC94ezMuDKc4wRX4z2jf5Z3lZOpW7NoolBZqxVzMeCcUPnDtK/PQCKLopH0tfQ0Hm5Lg== X-Received: by 2002:a17:902:f542:b0:1d4:6d08:9061 with SMTP id h2-20020a170902f54200b001d46d089061mr1535529plf.58.1704990452974; Thu, 11 Jan 2024 08:27:32 -0800 (PST) Received: from hexa.router0800d9.com (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id a6-20020a170902ee8600b001d04d730687sm1347577pld.103.2024.01.11.08.27.32 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 11 Jan 2024 08:27:32 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][nanbield 01/12] shadow: Fix for CVE-2023-4641 Date: Thu, 11 Jan 2024 06:27:14 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 11 Jan 2024 16:27:42 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/193549 From: Xiangyu Chen shadow-utils: possible password leak during passwd(1) change CVE: CVE-2023-4641 Upstream-Status: Backport [https://github.com/shadow-maint/shadow/commit/65c88a43a23c2391dcc90c0abda3e839e9c57904] Signed-off-by: Xiangyu Chen Signed-off-by: Alexandre Belloni Signed-off-by: Richard Purdie (cherry picked from commit 7942df17d9dfcf690106b8b86506d496e6251327) Signed-off-by: Steve Sakoman --- .../shadow/files/CVE-2023-4641.patch | 147 ++++++++++++++++++ meta/recipes-extended/shadow/shadow.inc | 1 + 2 files changed, 148 insertions(+) create mode 100644 meta/recipes-extended/shadow/files/CVE-2023-4641.patch diff --git a/meta/recipes-extended/shadow/files/CVE-2023-4641.patch b/meta/recipes-extended/shadow/files/CVE-2023-4641.patch new file mode 100644 index 0000000000..1fabfe928e --- /dev/null +++ b/meta/recipes-extended/shadow/files/CVE-2023-4641.patch @@ -0,0 +1,147 @@ +From 25dbe2ce166a13322b7536ff2f738786ea2e61e7 Mon Sep 17 00:00:00 2001 +From: Alejandro Colomar +Date: Sat, 10 Jun 2023 16:20:05 +0200 +Subject: [PATCH] gpasswd(1): Fix password leak + +How to trigger this password leak? +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +When gpasswd(1) asks for the new password, it asks twice (as is usual +for confirming the new password). Each of those 2 password prompts +uses agetpass() to get the password. If the second agetpass() fails, +the first password, which has been copied into the 'static' buffer +'pass' via STRFCPY(), wasn't being zeroed. + +agetpass() is defined in <./libmisc/agetpass.c> (around line 91), and +can fail for any of the following reasons: + +- malloc(3) or readpassphrase(3) failure. + + These are going to be difficult to trigger. Maybe getting the system + to the limits of memory utilization at that exact point, so that the + next malloc(3) gets ENOMEM, and possibly even the OOM is triggered. + About readpassphrase(3), ENFILE and EINTR seem the only plausible + ones, and EINTR probably requires privilege or being the same user; + but I wouldn't discard ENFILE so easily, if a process starts opening + files. + +- The password is longer than PASS_MAX. + + The is plausible with physical access. However, at that point, a + keylogger will be a much simpler attack. + +And, the attacker must be able to know when the second password is being +introduced, which is not going to be easy. + +How to read the password after the leak? +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +Provoking the leak yourself at the right point by entering a very long +password is easy, and inspecting the process stack at that point should +be doable. Try to find some consistent patterns. + +Then, search for those patterns in free memory, right after the victim +leaks their password. + +Once you get the leak, a program should read all the free memory +searching for patterns that gpasswd(1) leaves nearby the leaked +password. + +On 6/10/23 03:14, Seth Arnold wrote: +> An attacker process wouldn't be able to use malloc(3) for this task. +> There's a handful of tools available for userspace to allocate memory: +> +> - brk / sbrk +> - mmap MAP_ANONYMOUS +> - mmap /dev/zero +> - mmap some other file +> - shm_open +> - shmget +> +> Most of these return only pages of zeros to a process. Using mmap of an +> existing file, you can get some of the contents of the file demand-loaded +> into the memory space on the first use. +> +> The MAP_UNINITIALIZED flag only works if the kernel was compiled with +> CONFIG_MMAP_ALLOW_UNINITIALIZED. This is rare. +> +> malloc(3) doesn't zero memory, to our collective frustration, but all the +> garbage in the allocations is from previous allocations in the current +> process. It isn't leftover from other processes. +> +> The avenues available for reading the memory: +> - /dev/mem and /dev/kmem (requires root, not available with Secure Boot) +> - /proc/pid/mem (requires ptrace privileges, mediated by YAMA) +> - ptrace (requires ptrace privileges, mediated by YAMA) +> - causing memory to be swapped to disk, and then inspecting the swap +> +> These all require a certain amount of privileges. + +How to fix it? +~~~~~~~~~~~~~~ + +memzero(), which internally calls explicit_bzero(3), or whatever +alternative the system provides with a slightly different name, will +make sure that the buffer is zeroed in memory, and optimizations are not +allowed to impede this zeroing. + +This is not really 100% effective, since compilers may place copies of +the string somewhere hidden in the stack. Those copies won't get zeroed +by explicit_bzero(3). However, that's arguably a compiler bug, since +compilers should make everything possible to avoid optimizing strings +that are later passed to explicit_bzero(3). But we all know that +sometimes it's impossible to have perfect knowledge in the compiler, so +this is plausible. Nevertheless, there's nothing we can do against such +issues, except minimizing the time such passwords are stored in plain +text. + +Security concerns +~~~~~~~~~~~~~~~~~ + +We believe this isn't easy to exploit. Nevertheless, and since the fix +is trivial, this fix should probably be applied soon, and backported to +all supported distributions, to prevent someone else having more +imagination than us to find a way. + +Affected versions +~~~~~~~~~~~~~~~~~ + +All. Bug introduced in shadow 19990709. That's the second commit in +the git history. + +Fixes: 45c6603cc86c ("[svn-upgrade] Integrating new upstream version, shadow (19990709)") + +CVE: CVE-2023-4641 +Upstream-Status: Backport [https://github.com/shadow-maint/shadow/commit/65c88a43a23c2391dcc90c0abda3e839e9c57904] + +Reported-by: Alejandro Colomar +Cc: Serge Hallyn +Cc: Iker Pedrosa +Cc: Seth Arnold +Cc: Christian Brauner +Cc: Balint Reczey +Cc: Sam James +Cc: David Runge +Cc: Andreas Jaeger +Cc: <~hallyn/shadow@lists.sr.ht> +Signed-off-by: Alejandro Colomar +Signed-off-by: Xiangyu Chen +--- + src/gpasswd.c | 1 + + 1 file changed, 1 insertion(+) + +diff --git a/src/gpasswd.c b/src/gpasswd.c +index 5983f787..2d8869ef 100644 +--- a/src/gpasswd.c ++++ b/src/gpasswd.c +@@ -896,6 +896,7 @@ static void change_passwd (struct group *gr) + strzero (cp); + cp = getpass (_("Re-enter new password: ")); + if (NULL == cp) { ++ memzero (pass, sizeof pass); + exit (1); + } + +-- +2.34.1 + diff --git a/meta/recipes-extended/shadow/shadow.inc b/meta/recipes-extended/shadow/shadow.inc index 83e1a84769..ce3ce62715 100644 --- a/meta/recipes-extended/shadow/shadow.inc +++ b/meta/recipes-extended/shadow/shadow.inc @@ -17,6 +17,7 @@ SRC_URI = "${GITHUB_BASE_URI}/download/${PV}/${BP}.tar.gz \ file://0001-Fix-can-not-print-full-login.patch \ file://CVE-2023-29383.patch \ file://0001-Overhaul-valid_field.patch \ + file://CVE-2023-4641.patch \ " SRC_URI:append:class-target = " \ From patchwork Thu Jan 11 16:27:15 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 37636 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 62AF5C47DA6 for ; Thu, 11 Jan 2024 16:27:42 +0000 (UTC) Received: from mail-pl1-f169.google.com (mail-pl1-f169.google.com [209.85.214.169]) by mx.groups.io with SMTP id smtpd.web11.15553.1704990456204515170 for ; Thu, 11 Jan 2024 08:27:36 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=lTaQQE0D; spf=softfail (domain: sakoman.com, ip: 209.85.214.169, mailfrom: steve@sakoman.com) Received: by mail-pl1-f169.google.com with SMTP id d9443c01a7336-1d3ea5cc137so46323795ad.0 for ; Thu, 11 Jan 2024 08:27:36 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1704990455; x=1705595255; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=Ig48DaP0oc4CAgvSBuMOYTTmvUaqwimaA+xyOkmlxsc=; b=lTaQQE0D4BvnHA5f8q+JlAhsGMMeeUu+tGE4u4aYq66seAh1zRmKrwDk4NWsKvZcxZ mHeme2ZIaupiV15aBIQBwg20rWta6dZrG8aEgGrYLtMnFVMuZNlJ3xxKQ1eLswvnDkZu BAqqBSygexsSl+D57ENGRSf+sy6Qc+WBCXoRbsIvMKUiufXg58jMPuE3XFQHr+YMjylE h7eD+pZfP5eRdQH3UlMttxGGcv/imxb6O/9jwY/Ma/vnfs4bhJrT7dF8W72CgeDPKP2T dMaTi7sYxrJEFOQwPcdkznPZxiaIrdiRoQrBL6QVvId0lLTnMwl3CE5z5AIsJQGfxia6 ZS3A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1704990455; x=1705595255; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=Ig48DaP0oc4CAgvSBuMOYTTmvUaqwimaA+xyOkmlxsc=; b=AX3nl/umG2G4uDkzAxMvTf0lv9AD8GGNMPg/56vPjLkwbqHsAkg0rQ0NYT6ec6htvn yd3ApQJDd6uqIDlJcKNkhfFZaCWqQkdC9ZMOpzlFLYm+gS/dKVTcOFMdVD4JoGId3sIt EaxNScx6tQ5s9DH6TBZsK+aUdYZCK3wG2XIHzxnkzw67P+LzRziaFUlbZtqrVg7wYEi/ gKLp+KC6aux87yKRkkr+f0UuFnJKegO7OYEUXG1QtKlibs93fry4gh1eLLF6TUxMDA0V A0FBn+nen7jJ9T9ETgIVYF7SjAXucgn6AhLvYu382GloDpSccl2lBFTrnsNnvgxKaZWj 56tQ== X-Gm-Message-State: AOJu0YwpoDrprAiJc8GOOt6ikA9GVTMZ4OJod1RzgkJan53AiKSuqWrD WuK+7jf2Kn39/0SG/TlYR1NLsoyxQ6bJ8F97cPOKrNeUMudC3A== X-Google-Smtp-Source: AGHT+IEd0DsS2D83qscic8TajQNFlfYrm6iyyeoem0bCSZxFDozg6j+Hn72Xke6NFYWIbrFisUWYSA== X-Received: by 2002:a17:902:eb8e:b0:1d5:d00:c197 with SMTP id q14-20020a170902eb8e00b001d50d00c197mr1940560plg.19.1704990454815; Thu, 11 Jan 2024 08:27:34 -0800 (PST) Received: from hexa.router0800d9.com (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id a6-20020a170902ee8600b001d04d730687sm1347577pld.103.2024.01.11.08.27.33 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 11 Jan 2024 08:27:34 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][nanbield 02/12] tiff: Backport fixes for CVE-2023-6277 Date: Thu, 11 Jan 2024 06:27:15 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 11 Jan 2024 16:27:42 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/193550 From: Khem Raj Signed-off-by: Khem Raj Signed-off-by: Alexandre Belloni Signed-off-by: Richard Purdie (cherry picked from commit d115e17ad7775cf5bbfd402e98e61f362ac96efa) Signed-off-by: Steve Sakoman --- ...277-Apply-1-suggestion-s-to-1-file-s.patch | 27 +++ ...ompare-data-size-of-some-tags-data-2.patch | 36 ++++ ...-compare-data-size-of-some-tags-data.patch | 162 ++++++++++++++++++ meta/recipes-multimedia/libtiff/tiff_4.6.0.bb | 3 + 4 files changed, 228 insertions(+) create mode 100644 meta/recipes-multimedia/libtiff/tiff/CVE-2023-6277-Apply-1-suggestion-s-to-1-file-s.patch create mode 100644 meta/recipes-multimedia/libtiff/tiff/CVE-2023-6277-At-image-reading-compare-data-size-of-some-tags-data-2.patch create mode 100644 meta/recipes-multimedia/libtiff/tiff/CVE-2023-6277-At-image-reading-compare-data-size-of-some-tags-data.patch diff --git a/meta/recipes-multimedia/libtiff/tiff/CVE-2023-6277-Apply-1-suggestion-s-to-1-file-s.patch b/meta/recipes-multimedia/libtiff/tiff/CVE-2023-6277-Apply-1-suggestion-s-to-1-file-s.patch new file mode 100644 index 0000000000..5d15dff1d9 --- /dev/null +++ b/meta/recipes-multimedia/libtiff/tiff/CVE-2023-6277-Apply-1-suggestion-s-to-1-file-s.patch @@ -0,0 +1,27 @@ +From e1640519208121f916da1772a5efb6ca28971b86 Mon Sep 17 00:00:00 2001 +From: Even Rouault +Date: Tue, 31 Oct 2023 15:04:37 +0000 +Subject: [PATCH 3/3] Apply 1 suggestion(s) to 1 file(s) + +CVE: CVE-2023-6277 +Upstream-Status: Backport [https://gitlab.com/libtiff/libtiff/-/merge_requests/545] +Signed-off-by: Khem Raj +--- + libtiff/tif_dirread.c | 1 - + 1 file changed, 1 deletion(-) + +diff --git a/libtiff/tif_dirread.c b/libtiff/tif_dirread.c +index fe8d6f8..58a4276 100644 +--- a/libtiff/tif_dirread.c ++++ b/libtiff/tif_dirread.c +@@ -5306,7 +5306,6 @@ static int EstimateStripByteCounts(TIFF *tif, TIFFDirEntry *dir, + { + uint64_t space; + uint16_t n; +- filesize = TIFFGetFileSize(tif); + if (!(tif->tif_flags & TIFF_BIGTIFF)) + space = sizeof(TIFFHeaderClassic) + 2 + dircount * 12 + 4; + else +-- +2.43.0 + diff --git a/meta/recipes-multimedia/libtiff/tiff/CVE-2023-6277-At-image-reading-compare-data-size-of-some-tags-data-2.patch b/meta/recipes-multimedia/libtiff/tiff/CVE-2023-6277-At-image-reading-compare-data-size-of-some-tags-data-2.patch new file mode 100644 index 0000000000..9fc8182fef --- /dev/null +++ b/meta/recipes-multimedia/libtiff/tiff/CVE-2023-6277-At-image-reading-compare-data-size-of-some-tags-data-2.patch @@ -0,0 +1,36 @@ +From f500facf7723f1cae725dd288b2daad15e45131c Mon Sep 17 00:00:00 2001 +From: Su_Laus +Date: Mon, 30 Oct 2023 21:21:57 +0100 +Subject: [PATCH 2/3] At image reading, compare data size of some tags / data + structures (StripByteCounts, StripOffsets, StripArray, TIFF directory) with + file size to prevent provoked out-of-memory attacks. +MIME-Version: 1.0 +Content-Type: text/plain; charset=UTF-8 +Content-Transfer-Encoding: 8bit + +See issue #614. + +Correct declaration of ‘filesize’ shadows a previous local. + +CVE: CVE-2023-6277 +Upstream-Status: Backport [https://gitlab.com/libtiff/libtiff/-/merge_requests/545] +Signed-off-by: Khem Raj +--- + libtiff/tif_dirread.c | 1 - + 1 file changed, 1 deletion(-) + +diff --git a/libtiff/tif_dirread.c b/libtiff/tif_dirread.c +index c52d41f..fe8d6f8 100644 +--- a/libtiff/tif_dirread.c ++++ b/libtiff/tif_dirread.c +@@ -5305,7 +5305,6 @@ static int EstimateStripByteCounts(TIFF *tif, TIFFDirEntry *dir, + if (td->td_compression != COMPRESSION_NONE) + { + uint64_t space; +- uint64_t filesize; + uint16_t n; + filesize = TIFFGetFileSize(tif); + if (!(tif->tif_flags & TIFF_BIGTIFF)) +-- +2.43.0 + diff --git a/meta/recipes-multimedia/libtiff/tiff/CVE-2023-6277-At-image-reading-compare-data-size-of-some-tags-data.patch b/meta/recipes-multimedia/libtiff/tiff/CVE-2023-6277-At-image-reading-compare-data-size-of-some-tags-data.patch new file mode 100644 index 0000000000..d5854a9059 --- /dev/null +++ b/meta/recipes-multimedia/libtiff/tiff/CVE-2023-6277-At-image-reading-compare-data-size-of-some-tags-data.patch @@ -0,0 +1,162 @@ +From b33baa5d9c6aac8ce49b5180dd48e39697ab7a11 Mon Sep 17 00:00:00 2001 +From: Su_Laus +Date: Fri, 27 Oct 2023 22:11:10 +0200 +Subject: [PATCH 1/3] At image reading, compare data size of some tags / data + structures (StripByteCounts, StripOffsets, StripArray, TIFF directory) with + file size to prevent provoked out-of-memory attacks. + +See issue #614. + +CVE: CVE-2023-6277 +Upstream-Status: Backport [https://gitlab.com/libtiff/libtiff/-/merge_requests/545] +Signed-off-by: Khem Raj +--- + libtiff/tif_dirread.c | 90 +++++++++++++++++++++++++++++++++++++++++++ + 1 file changed, 90 insertions(+) + +diff --git a/libtiff/tif_dirread.c b/libtiff/tif_dirread.c +index 2c49dc6..c52d41f 100644 +--- a/libtiff/tif_dirread.c ++++ b/libtiff/tif_dirread.c +@@ -1308,6 +1308,21 @@ TIFFReadDirEntryArrayWithLimit(TIFF *tif, TIFFDirEntry *direntry, + datasize = (*count) * typesize; + assert((tmsize_t)datasize > 0); + ++ /* Before allocating a huge amount of memory for corrupted files, check if ++ * size of requested memory is not greater than file size. ++ */ ++ uint64_t filesize = TIFFGetFileSize(tif); ++ if (datasize > filesize) ++ { ++ TIFFWarningExtR(tif, "ReadDirEntryArray", ++ "Requested memory size for tag %d (0x%x) %" PRIu32 ++ " is greather than filesize %" PRIu64 ++ ". Memory not allocated, tag not read", ++ direntry->tdir_tag, direntry->tdir_tag, datasize, ++ filesize); ++ return (TIFFReadDirEntryErrAlloc); ++ } ++ + if (isMapped(tif) && datasize > (uint64_t)tif->tif_size) + return TIFFReadDirEntryErrIo; + +@@ -5266,6 +5281,20 @@ static int EstimateStripByteCounts(TIFF *tif, TIFFDirEntry *dir, + if (!_TIFFFillStrilesInternal(tif, 0)) + return -1; + ++ /* Before allocating a huge amount of memory for corrupted files, check if ++ * size of requested memory is not greater than file size. */ ++ uint64_t filesize = TIFFGetFileSize(tif); ++ uint64_t allocsize = (uint64_t)td->td_nstrips * sizeof(uint64_t); ++ if (allocsize > filesize) ++ { ++ TIFFWarningExtR(tif, module, ++ "Requested memory size for StripByteCounts of %" PRIu64 ++ " is greather than filesize %" PRIu64 ++ ". Memory not allocated", ++ allocsize, filesize); ++ return -1; ++ } ++ + if (td->td_stripbytecount_p) + _TIFFfreeExt(tif, td->td_stripbytecount_p); + td->td_stripbytecount_p = (uint64_t *)_TIFFCheckMalloc( +@@ -5807,6 +5836,20 @@ static uint16_t TIFFFetchDirectory(TIFF *tif, uint64_t diroff, + dircount16 = (uint16_t)dircount64; + dirsize = 20; + } ++ /* Before allocating a huge amount of memory for corrupted files, check ++ * if size of requested memory is not greater than file size. */ ++ uint64_t filesize = TIFFGetFileSize(tif); ++ uint64_t allocsize = (uint64_t)dircount16 * dirsize; ++ if (allocsize > filesize) ++ { ++ TIFFWarningExtR( ++ tif, module, ++ "Requested memory size for TIFF directory of %" PRIu64 ++ " is greather than filesize %" PRIu64 ++ ". Memory not allocated, TIFF directory not read", ++ allocsize, filesize); ++ return 0; ++ } + origdir = _TIFFCheckMalloc(tif, dircount16, dirsize, + "to read TIFF directory"); + if (origdir == NULL) +@@ -5921,6 +5964,20 @@ static uint16_t TIFFFetchDirectory(TIFF *tif, uint64_t diroff, + "directories not supported"); + return 0; + } ++ /* Before allocating a huge amount of memory for corrupted files, check ++ * if size of requested memory is not greater than file size. */ ++ uint64_t filesize = TIFFGetFileSize(tif); ++ uint64_t allocsize = (uint64_t)dircount16 * dirsize; ++ if (allocsize > filesize) ++ { ++ TIFFWarningExtR( ++ tif, module, ++ "Requested memory size for TIFF directory of %" PRIu64 ++ " is greather than filesize %" PRIu64 ++ ". Memory not allocated, TIFF directory not read", ++ allocsize, filesize); ++ return 0; ++ } + origdir = _TIFFCheckMalloc(tif, dircount16, dirsize, + "to read TIFF directory"); + if (origdir == NULL) +@@ -5968,6 +6025,8 @@ static uint16_t TIFFFetchDirectory(TIFF *tif, uint64_t diroff, + } + } + } ++ /* No check against filesize needed here because "dir" should have same size ++ * than "origdir" checked above. */ + dir = (TIFFDirEntry *)_TIFFCheckMalloc( + tif, dircount16, sizeof(TIFFDirEntry), "to read TIFF directory"); + if (dir == 0) +@@ -7164,6 +7223,20 @@ static int TIFFFetchStripThing(TIFF *tif, TIFFDirEntry *dir, uint32_t nstrips, + return (0); + } + ++ /* Before allocating a huge amount of memory for corrupted files, check ++ * if size of requested memory is not greater than file size. */ ++ uint64_t filesize = TIFFGetFileSize(tif); ++ uint64_t allocsize = (uint64_t)nstrips * sizeof(uint64_t); ++ if (allocsize > filesize) ++ { ++ TIFFWarningExtR(tif, module, ++ "Requested memory size for StripArray of %" PRIu64 ++ " is greather than filesize %" PRIu64 ++ ". Memory not allocated", ++ allocsize, filesize); ++ _TIFFfreeExt(tif, data); ++ return (0); ++ } + resizeddata = (uint64_t *)_TIFFCheckMalloc( + tif, nstrips, sizeof(uint64_t), "for strip array"); + if (resizeddata == 0) +@@ -7263,6 +7336,23 @@ static void allocChoppedUpStripArrays(TIFF *tif, uint32_t nstrips, + } + bytecount = last_offset + last_bytecount - offset; + ++ /* Before allocating a huge amount of memory for corrupted files, check if ++ * size of StripByteCount and StripOffset tags is not greater than ++ * file size. ++ */ ++ uint64_t allocsize = (uint64_t)nstrips * sizeof(uint64_t) * 2; ++ uint64_t filesize = TIFFGetFileSize(tif); ++ if (allocsize > filesize) ++ { ++ TIFFWarningExtR(tif, "allocChoppedUpStripArrays", ++ "Requested memory size for StripByteCount and " ++ "StripOffsets %" PRIu64 ++ " is greather than filesize %" PRIu64 ++ ". Memory not allocated", ++ allocsize, filesize); ++ return; ++ } ++ + newcounts = + (uint64_t *)_TIFFCheckMalloc(tif, nstrips, sizeof(uint64_t), + "for chopped \"StripByteCounts\" array"); +-- +2.43.0 + diff --git a/meta/recipes-multimedia/libtiff/tiff_4.6.0.bb b/meta/recipes-multimedia/libtiff/tiff_4.6.0.bb index 49984f1125..4c472f8ef6 100644 --- a/meta/recipes-multimedia/libtiff/tiff_4.6.0.bb +++ b/meta/recipes-multimedia/libtiff/tiff_4.6.0.bb @@ -9,6 +9,9 @@ LIC_FILES_CHKSUM = "file://LICENSE.md;md5=a3e32d664d6db1386b4689c8121531c3" CVE_PRODUCT = "libtiff" SRC_URI = "http://download.osgeo.org/libtiff/tiff-${PV}.tar.gz \ + file://CVE-2023-6277-At-image-reading-compare-data-size-of-some-tags-data.patch \ + file://CVE-2023-6277-At-image-reading-compare-data-size-of-some-tags-data-2.patch \ + file://CVE-2023-6277-Apply-1-suggestion-s-to-1-file-s.patch \ " SRC_URI[sha256sum] = "88b3979e6d5c7e32b50d7ec72fb15af724f6ab2cbf7e10880c360a77e4b5d99a" From patchwork Thu Jan 11 16:27:16 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 37634 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 685AFC47422 for ; Thu, 11 Jan 2024 16:27:42 +0000 (UTC) Received: from mail-pl1-f178.google.com (mail-pl1-f178.google.com [209.85.214.178]) by mx.groups.io with SMTP id smtpd.web10.15718.1704990457775866100 for ; Thu, 11 Jan 2024 08:27:37 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=2GD2fDAX; spf=softfail (domain: sakoman.com, ip: 209.85.214.178, mailfrom: steve@sakoman.com) Received: by mail-pl1-f178.google.com with SMTP id d9443c01a7336-1d3ed1ca402so49896245ad.2 for ; Thu, 11 Jan 2024 08:27:37 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1704990457; x=1705595257; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=ZjGnurVt4vB+Q8xyJWGjTb9AleOBNPpRkGhdg4RGSGo=; b=2GD2fDAXYAex+CPfcVDLbDtLozVJ+0sP/Suly2iEzvtBekC5GMmJUX5jDQOt6pyVve 86gHqW4VEYPYDh+BIKKs1d5K/pPy+3n1a+zXE1julSoU6Cxmp2qJdWKfifF/GUdvleqW BYdl0hiA1v0a5b+A0QvVOZyeA6hiyIZjhiR0O62XFTsjbXx9dM+vkUW05eLXi4rY5Qp9 qC6jp1GV3sQqCMDZ996E+KmIYuvbnGpbEgTx0cDkHe1yTUrH1XGiepfgmknyJRuMLP5D iG8gIq2W777cN6Q5MvsNGyWEMBJve+6bKqlk7Ii4GJRWRWCz61M3PbS7+vuiz2212hCo gprQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1704990457; x=1705595257; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=ZjGnurVt4vB+Q8xyJWGjTb9AleOBNPpRkGhdg4RGSGo=; b=sxzqZZhVPFHxGVGJNYkacgMiR0geau0EQlf+OUIYp0rr1YL12Uxqb+jFMcEFTVGKou qtO1YC4rk9UlbZNFMXma2vV9E5RzuWmw3reEACI7J1n6g8PhKdHsNNEDIiMd88X1Blgm VMomtPU2iVZroUadSQWWXw7k3U87tFGXhH3oHdOd30q8WE5Vzeigolth/0hoNjE9I8PE ztZ4e3z5C6P4wMPcFq9ryLLkcpz5YgpVbcGqcddfx2rPinx44uCimgIiKIsT7vwqop7k jTA3g4087TlniflXIlut5Sir63zWaVnqCSlGPpryFZf6ssX3L3V7WCiqPenBGJFCreoZ sTFg== X-Gm-Message-State: AOJu0YwPGdmvgW85EwU/TghXImvKJKjFdALz6doFWW/tCodBY101jAO6 PYkUUDdr+0vbVIovxhvhod/fxkCX9acp1suCQvn3UU3zKFUoPg== X-Google-Smtp-Source: AGHT+IE7rSK5fYbHAaTKNWx+Lu0RrLFKwygxXb2/K/jPkoObQrR4NVgrxurVfltmQZzGup4YCzoSZw== X-Received: by 2002:a17:902:bb10:b0:1d3:a0b8:c4dd with SMTP id im16-20020a170902bb1000b001d3a0b8c4ddmr1492336plb.118.1704990456637; Thu, 11 Jan 2024 08:27:36 -0800 (PST) Received: from hexa.router0800d9.com (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id a6-20020a170902ee8600b001d04d730687sm1347577pld.103.2024.01.11.08.27.35 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 11 Jan 2024 08:27:36 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][nanbield 03/12] go: update 1.20.10 -> 1.20.11 Date: Thu, 11 Jan 2024 06:27:16 -1000 Message-Id: <0ff60c9bf0332a9b6305e082a6ecae7c963d367e.1704990330.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 11 Jan 2024 16:27:42 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/193551 From: Jose Quaresma Upgrade to latest 1.20.x release [1]: $ git log --oneline go1.20.10..go1.20.11 1d0d4b149c (tag: go1.20.11) [release-branch.go1.20] go1.20.11 46fb781685 [release-branch.go1.20] path/filepath: fix various issues in parsing Windows paths 998fdce3ae [release-branch.go1.20] net/http: pull http2 underflow fix from x/net/http2 d48639094b [release-branch.go1.20] cmd/link: split text sections for arm 32-bit c8fdffb790 [release-branch.go1.20] all: tidy dependency versioning after release [1] https://github.com/golang/go/compare/go1.20.10...go1.20.11 Signed-off-by: Jose Quaresma Signed-off-by: Alexandre Belloni Signed-off-by: Richard Purdie (cherry picked from commit 09fb378fb9c60c383f0ac068bbe3692f047aa617) Signed-off-by: Steve Sakoman --- meta/recipes-devtools/go/{go-1.20.10.inc => go-1.20.11.inc} | 2 +- ...binary-native_1.20.10.bb => go-binary-native_1.20.11.bb} | 6 +++--- ...oss-canadian_1.20.10.bb => go-cross-canadian_1.20.11.bb} | 0 .../go/{go-cross_1.20.10.bb => go-cross_1.20.11.bb} | 0 .../go/{go-crosssdk_1.20.10.bb => go-crosssdk_1.20.11.bb} | 0 .../go/{go-native_1.20.10.bb => go-native_1.20.11.bb} | 0 .../go/{go-runtime_1.20.10.bb => go-runtime_1.20.11.bb} | 0 meta/recipes-devtools/go/{go_1.20.10.bb => go_1.20.11.bb} | 0 8 files changed, 4 insertions(+), 4 deletions(-) rename meta/recipes-devtools/go/{go-1.20.10.inc => go-1.20.11.inc} (89%) rename meta/recipes-devtools/go/{go-binary-native_1.20.10.bb => go-binary-native_1.20.11.bb} (78%) rename meta/recipes-devtools/go/{go-cross-canadian_1.20.10.bb => go-cross-canadian_1.20.11.bb} (100%) rename meta/recipes-devtools/go/{go-cross_1.20.10.bb => go-cross_1.20.11.bb} (100%) rename meta/recipes-devtools/go/{go-crosssdk_1.20.10.bb => go-crosssdk_1.20.11.bb} (100%) rename meta/recipes-devtools/go/{go-native_1.20.10.bb => go-native_1.20.11.bb} (100%) rename meta/recipes-devtools/go/{go-runtime_1.20.10.bb => go-runtime_1.20.11.bb} (100%) rename meta/recipes-devtools/go/{go_1.20.10.bb => go_1.20.11.bb} (100%) diff --git a/meta/recipes-devtools/go/go-1.20.10.inc b/meta/recipes-devtools/go/go-1.20.11.inc similarity index 89% rename from meta/recipes-devtools/go/go-1.20.10.inc rename to meta/recipes-devtools/go/go-1.20.11.inc index 39509ed986..2f510b1791 100644 --- a/meta/recipes-devtools/go/go-1.20.10.inc +++ b/meta/recipes-devtools/go/go-1.20.11.inc @@ -15,4 +15,4 @@ SRC_URI += "\ file://0008-src-cmd-dist-buildgo.go-do-not-hardcode-host-compile.patch \ file://0009-go-Filter-build-paths-on-staticly-linked-arches.patch \ " -SRC_URI[main.sha256sum] = "72d2f51805c47150066c103754c75fddb2c19d48c9219fa33d1e46696c841dbb" +SRC_URI[main.sha256sum] = "d355c5ae3a8f7763c9ec9dc25153aae373958cbcb60dd09e91a8b56c7621b2fc" diff --git a/meta/recipes-devtools/go/go-binary-native_1.20.10.bb b/meta/recipes-devtools/go/go-binary-native_1.20.11.bb similarity index 78% rename from meta/recipes-devtools/go/go-binary-native_1.20.10.bb rename to meta/recipes-devtools/go/go-binary-native_1.20.11.bb index 691670c31e..bf91067971 100644 --- a/meta/recipes-devtools/go/go-binary-native_1.20.10.bb +++ b/meta/recipes-devtools/go/go-binary-native_1.20.11.bb @@ -9,9 +9,9 @@ PROVIDES = "go-native" # Checksums available at https://go.dev/dl/ SRC_URI = "https://dl.google.com/go/go${PV}.${BUILD_GOOS}-${BUILD_GOARCH}.tar.gz;name=go_${BUILD_GOTUPLE}" -SRC_URI[go_linux_amd64.sha256sum] = "80d34f1fd74e382d86c2d6102e0e60d4318461a7c2f457ec1efc4042752d4248" -SRC_URI[go_linux_arm64.sha256sum] = "fb3c7e15fc4413c5b81eb9f26dbd7cd4faedd5c720b30fa8e2ff77457f74cab6" -SRC_URI[go_linux_ppc64le.sha256sum] = "ebac6e713810174f9ffd7f48c17c373fbf359d50d8e6233b1dfbbdebd524fd1c" +SRC_URI[go_linux_amd64.sha256sum] = "ef79a11aa095a08772d2a69e4f152f897c4e96ee297b0dc20264b7dec2961abe" +SRC_URI[go_linux_arm64.sha256sum] = "7908a49c6ce9d48af9b5ba76ccaa0769da45d8b635259a01065b3739acef4ada" +SRC_URI[go_linux_ppc64le.sha256sum] = "e04676e1aeafe7c415176f330322d43a4be5ea6deb14aca49905bd1449dc7072" UPSTREAM_CHECK_URI = "https://golang.org/dl/" UPSTREAM_CHECK_REGEX = "go(?P\d+(\.\d+)+)\.linux" diff --git a/meta/recipes-devtools/go/go-cross-canadian_1.20.10.bb b/meta/recipes-devtools/go/go-cross-canadian_1.20.11.bb similarity index 100% rename from meta/recipes-devtools/go/go-cross-canadian_1.20.10.bb rename to meta/recipes-devtools/go/go-cross-canadian_1.20.11.bb diff --git a/meta/recipes-devtools/go/go-cross_1.20.10.bb b/meta/recipes-devtools/go/go-cross_1.20.11.bb similarity index 100% rename from meta/recipes-devtools/go/go-cross_1.20.10.bb rename to meta/recipes-devtools/go/go-cross_1.20.11.bb diff --git a/meta/recipes-devtools/go/go-crosssdk_1.20.10.bb b/meta/recipes-devtools/go/go-crosssdk_1.20.11.bb similarity index 100% rename from meta/recipes-devtools/go/go-crosssdk_1.20.10.bb rename to meta/recipes-devtools/go/go-crosssdk_1.20.11.bb diff --git a/meta/recipes-devtools/go/go-native_1.20.10.bb b/meta/recipes-devtools/go/go-native_1.20.11.bb similarity index 100% rename from meta/recipes-devtools/go/go-native_1.20.10.bb rename to meta/recipes-devtools/go/go-native_1.20.11.bb diff --git a/meta/recipes-devtools/go/go-runtime_1.20.10.bb b/meta/recipes-devtools/go/go-runtime_1.20.11.bb similarity index 100% rename from meta/recipes-devtools/go/go-runtime_1.20.10.bb rename to meta/recipes-devtools/go/go-runtime_1.20.11.bb diff --git a/meta/recipes-devtools/go/go_1.20.10.bb b/meta/recipes-devtools/go/go_1.20.11.bb similarity index 100% rename from meta/recipes-devtools/go/go_1.20.10.bb rename to meta/recipes-devtools/go/go_1.20.11.bb From patchwork Thu Jan 11 16:27:17 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 37637 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 710DCC47DA7 for ; Thu, 11 Jan 2024 16:27:42 +0000 (UTC) Received: from mail-pl1-f179.google.com (mail-pl1-f179.google.com [209.85.214.179]) by mx.groups.io with SMTP id smtpd.web10.15719.1704990459679715481 for ; Thu, 11 Jan 2024 08:27:39 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=T83HhNrF; spf=softfail (domain: sakoman.com, ip: 209.85.214.179, mailfrom: steve@sakoman.com) Received: by mail-pl1-f179.google.com with SMTP id d9443c01a7336-1d595de968bso3594195ad.1 for ; Thu, 11 Jan 2024 08:27:39 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1704990458; x=1705595258; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=sjF4uazWuwGsOs254pKoVPTcR+CUUqqGMFU07AV2Um8=; b=T83HhNrFOIIvKIwG1Dtee25azQioGFAPoswC1qKjb3S26XNvPSfqD8ZfonjkH0AGFr c8wun/CUdrfKgIIgLlBUs5mpIHutsj/aKV+OVFFZl78U2e7KQ2xAIkg5aTUwPzflz21l AM52ofXiSfoinZwlGpMINqJc8KTf/06DtxmVjeetlQkeZQ6aUcXusAsYxG6gJDmqe42k jDbgaZQ6ou+PuS6JSduQs+wmIiRY2S9FchZ7Cvms2h/wUc0uTVSbtdvQ1ZrLj9ydbomB 9t1cvE3AyjVzTIVFuOwLs3lt/fH2nK5MDtsoudUBtaB1ZLcl9ND4xWxM+Te+qQDCHT0d ngcg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1704990458; x=1705595258; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=sjF4uazWuwGsOs254pKoVPTcR+CUUqqGMFU07AV2Um8=; b=c0VFEpsOvD7nOmoEJMjMBAYatwpB3s3eEqHXPLcSSaIgPyoEeKm4ZFWWDYfswSWTQ1 LkmttBxp9Y8kZ4a6Uc3qKaewaAJmJa9TsBNQROTWUUbaBq3Y2zR2F6COIqLVVrQDphN3 x6BoFosdyA6fzuSIKsvt6QinT4+ZSBiy+X0C2QobO6gl9rZVoc/HN+gvZp1TDJQJxLLM sVcjTfqymmogFUVDcdWRK3Vy3B9wmCRk7ZWBjxodk21Dh8GoO2sg5Yy2fRtFiNjInUp8 hMP1T5suj+D2LxKatruY/LkBFrodVlvrXDzV2BG4BSY2DKfRkUxMDx9PPstfvKO4cnXS yLtw== X-Gm-Message-State: AOJu0YwcHGOuCWUcVFHjOIbkEQ4xEaqprbL8Y2fOaKtVf7T4IWgN9XXI kj0Q7HSA0efiJgVGbHHqrSMDiSn6Qmw0PItg/L0wKw5TX6MWnQ== X-Google-Smtp-Source: AGHT+IF5Q1q54DfaVKfP/R4uP+0p2ae2elnnf9bPEmPm5ilsfo1nuCxcLu2IVcCwx1JZfzjodHj0zA== X-Received: by 2002:a17:903:41cb:b0:1d4:9225:a88f with SMTP id u11-20020a17090341cb00b001d49225a88fmr1487340ple.13.1704990458329; Thu, 11 Jan 2024 08:27:38 -0800 (PST) Received: from hexa.router0800d9.com (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id a6-20020a170902ee8600b001d04d730687sm1347577pld.103.2024.01.11.08.27.37 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 11 Jan 2024 08:27:38 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][nanbield 04/12] go: update 1.20.11 -> 1.20.12 Date: Thu, 11 Jan 2024 06:27:17 -1000 Message-Id: <3e7981c7e575b0e16a7b7aba47993e9c58a719c5.1704990330.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 11 Jan 2024 16:27:42 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/193552 From: Jose Quaresma Upgrade to latest 1.20.x release [1]: $ git log --oneline go1.20.11..go1.20.12 97c8ff8d53 (tag: go1.20.12, origin/release-branch.go1.20) [release-branch.go1.20] go1.20.12 6446af942e [release-branch.go1.20] net/http: limit chunked data overhead 77397ffcb2 [release-branch.go1.20] crypto/rand,runtime: revert "switch RtlGenRandom for ProcessPrng" d77307f855 [release-branch.go1.20] cmd/compile: fix findIndVar so it does not match disjointed loop headers 1bd76576fe [release-branch.go1.20] crypto/rand,runtime: switch RtlGenRandom for ProcessPrng 1b59b017db [release-branch.go1.20] path/filepath: consider \\?\c: as a volume on Windows 46bc33819a [release-branch.go1.20] cmd/go/internal/vcs: error out if the requested repo does not support a secure protocol e1dc209be8 [release-branch.go1.20] cmd/go/internal/modfetch/codehost: set core.longpaths in Git repos on Windows [1] https://github.com/golang/go/compare/go1.20.11...go1.20.12 Signed-off-by: Jose Quaresma Signed-off-by: Alexandre Belloni Signed-off-by: Richard Purdie (cherry picked from commit 8515842b5c503b9a8840675d9cbcfe147d25c1d4) Signed-off-by: Steve Sakoman --- meta/recipes-devtools/go/{go-1.20.11.inc => go-1.20.12.inc} | 2 +- ...binary-native_1.20.11.bb => go-binary-native_1.20.12.bb} | 6 +++--- ...oss-canadian_1.20.11.bb => go-cross-canadian_1.20.12.bb} | 0 .../go/{go-cross_1.20.11.bb => go-cross_1.20.12.bb} | 0 .../go/{go-crosssdk_1.20.11.bb => go-crosssdk_1.20.12.bb} | 0 .../go/{go-native_1.20.11.bb => go-native_1.20.12.bb} | 0 .../go/{go-runtime_1.20.11.bb => go-runtime_1.20.12.bb} | 0 meta/recipes-devtools/go/{go_1.20.11.bb => go_1.20.12.bb} | 0 8 files changed, 4 insertions(+), 4 deletions(-) rename meta/recipes-devtools/go/{go-1.20.11.inc => go-1.20.12.inc} (89%) rename meta/recipes-devtools/go/{go-binary-native_1.20.11.bb => go-binary-native_1.20.12.bb} (78%) rename meta/recipes-devtools/go/{go-cross-canadian_1.20.11.bb => go-cross-canadian_1.20.12.bb} (100%) rename meta/recipes-devtools/go/{go-cross_1.20.11.bb => go-cross_1.20.12.bb} (100%) rename meta/recipes-devtools/go/{go-crosssdk_1.20.11.bb => go-crosssdk_1.20.12.bb} (100%) rename meta/recipes-devtools/go/{go-native_1.20.11.bb => go-native_1.20.12.bb} (100%) rename meta/recipes-devtools/go/{go-runtime_1.20.11.bb => go-runtime_1.20.12.bb} (100%) rename meta/recipes-devtools/go/{go_1.20.11.bb => go_1.20.12.bb} (100%) diff --git a/meta/recipes-devtools/go/go-1.20.11.inc b/meta/recipes-devtools/go/go-1.20.12.inc similarity index 89% rename from meta/recipes-devtools/go/go-1.20.11.inc rename to meta/recipes-devtools/go/go-1.20.12.inc index 2f510b1791..9be56c6707 100644 --- a/meta/recipes-devtools/go/go-1.20.11.inc +++ b/meta/recipes-devtools/go/go-1.20.12.inc @@ -15,4 +15,4 @@ SRC_URI += "\ file://0008-src-cmd-dist-buildgo.go-do-not-hardcode-host-compile.patch \ file://0009-go-Filter-build-paths-on-staticly-linked-arches.patch \ " -SRC_URI[main.sha256sum] = "d355c5ae3a8f7763c9ec9dc25153aae373958cbcb60dd09e91a8b56c7621b2fc" +SRC_URI[main.sha256sum] = "c5bf934751d31c315c1d0bb5fb02296545fa6d08923566f7a5afec81f2ed27d6" diff --git a/meta/recipes-devtools/go/go-binary-native_1.20.11.bb b/meta/recipes-devtools/go/go-binary-native_1.20.12.bb similarity index 78% rename from meta/recipes-devtools/go/go-binary-native_1.20.11.bb rename to meta/recipes-devtools/go/go-binary-native_1.20.12.bb index bf91067971..e555412a19 100644 --- a/meta/recipes-devtools/go/go-binary-native_1.20.11.bb +++ b/meta/recipes-devtools/go/go-binary-native_1.20.12.bb @@ -9,9 +9,9 @@ PROVIDES = "go-native" # Checksums available at https://go.dev/dl/ SRC_URI = "https://dl.google.com/go/go${PV}.${BUILD_GOOS}-${BUILD_GOARCH}.tar.gz;name=go_${BUILD_GOTUPLE}" -SRC_URI[go_linux_amd64.sha256sum] = "ef79a11aa095a08772d2a69e4f152f897c4e96ee297b0dc20264b7dec2961abe" -SRC_URI[go_linux_arm64.sha256sum] = "7908a49c6ce9d48af9b5ba76ccaa0769da45d8b635259a01065b3739acef4ada" -SRC_URI[go_linux_ppc64le.sha256sum] = "e04676e1aeafe7c415176f330322d43a4be5ea6deb14aca49905bd1449dc7072" +SRC_URI[go_linux_amd64.sha256sum] = "9c5d48c54dd8b0a3b2ef91b0f92a1190aa01f11d26e98033efa64c46a30bba7b" +SRC_URI[go_linux_arm64.sha256sum] = "8afe8e3fb6972eaa2179ef0a71678c67f26509fab4f0f67c4b00f4cdfa92dc87" +SRC_URI[go_linux_ppc64le.sha256sum] = "2ae0ec3736216dfbd7b01ff679842dc1bed365e53a024d522645bcffd01c7328" UPSTREAM_CHECK_URI = "https://golang.org/dl/" UPSTREAM_CHECK_REGEX = "go(?P\d+(\.\d+)+)\.linux" diff --git a/meta/recipes-devtools/go/go-cross-canadian_1.20.11.bb b/meta/recipes-devtools/go/go-cross-canadian_1.20.12.bb similarity index 100% rename from meta/recipes-devtools/go/go-cross-canadian_1.20.11.bb rename to meta/recipes-devtools/go/go-cross-canadian_1.20.12.bb diff --git a/meta/recipes-devtools/go/go-cross_1.20.11.bb b/meta/recipes-devtools/go/go-cross_1.20.12.bb similarity index 100% rename from meta/recipes-devtools/go/go-cross_1.20.11.bb rename to meta/recipes-devtools/go/go-cross_1.20.12.bb diff --git a/meta/recipes-devtools/go/go-crosssdk_1.20.11.bb b/meta/recipes-devtools/go/go-crosssdk_1.20.12.bb similarity index 100% rename from meta/recipes-devtools/go/go-crosssdk_1.20.11.bb rename to meta/recipes-devtools/go/go-crosssdk_1.20.12.bb diff --git a/meta/recipes-devtools/go/go-native_1.20.11.bb b/meta/recipes-devtools/go/go-native_1.20.12.bb similarity index 100% rename from meta/recipes-devtools/go/go-native_1.20.11.bb rename to meta/recipes-devtools/go/go-native_1.20.12.bb diff --git a/meta/recipes-devtools/go/go-runtime_1.20.11.bb b/meta/recipes-devtools/go/go-runtime_1.20.12.bb similarity index 100% rename from meta/recipes-devtools/go/go-runtime_1.20.11.bb rename to meta/recipes-devtools/go/go-runtime_1.20.12.bb diff --git a/meta/recipes-devtools/go/go_1.20.11.bb b/meta/recipes-devtools/go/go_1.20.12.bb similarity index 100% rename from meta/recipes-devtools/go/go_1.20.11.bb rename to meta/recipes-devtools/go/go_1.20.12.bb From patchwork Thu Jan 11 16:27:18 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 37632 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 03A11C47077 for ; Thu, 11 Jan 2024 16:27:42 +0000 (UTC) Received: from mail-pl1-f178.google.com (mail-pl1-f178.google.com [209.85.214.178]) by mx.groups.io with SMTP id smtpd.web10.15720.1704990461095952306 for ; Thu, 11 Jan 2024 08:27:41 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=c4tdQk8Q; spf=softfail (domain: sakoman.com, ip: 209.85.214.178, mailfrom: steve@sakoman.com) Received: by mail-pl1-f178.google.com with SMTP id d9443c01a7336-1d4414ec9c7so28618865ad.0 for ; Thu, 11 Jan 2024 08:27:41 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1704990460; x=1705595260; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=k2QAvDM/oiC6y/CVgDOshdLdrZvd0rR2pXcTGpI2Rf4=; b=c4tdQk8QHX0D2iJ/mbMrb+onXRAOEUHHuhUvE17YbWxmNVcimAd9BXMFeSB+jCkaZA MUjxF7TgOEBGITGgGKbusYZZk6Hi8sY1X4YVzb5hHs23RxVzp1nATFqdgc2IyhJnYaam j8fzFJOrLhx6uKSNW8xRSmUXuCOe+SY4QMI4X9pJG74oCkXNSL+orv0wtDDTB8sHwLaV Lh0UnSzkTSQvUPrGMSg0/C3c1naFULMbKxsdw/X19o5JDx5Xim21wua8XFR2eml9IjD8 MSZ9Q/R5jyc1jCJThWv6mzl03AHiXEwcHqMOf9nJDl7tc6TUP+ELqtFFnmkvhjOB2Z/q T0Qg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1704990460; x=1705595260; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=k2QAvDM/oiC6y/CVgDOshdLdrZvd0rR2pXcTGpI2Rf4=; b=axNSu/K1QIR4v11GUyQIZ/grH1qVWZwJqtx08wE+kcALx/StzHsnt4yqfvYchQuZGu fds/TI+QfBpZs1+hzUOUvs7chIaDXFx7QuQC669sxTdixHidvnNLmKd5zMfvi2r5zbsz Z/eAQ3g+pyxBgRw36ElFuQeKtG0W3GYxboBjF5BpJ90yiIIRkhCU1vWNo7WzctFVdllw llm7wALIs8GTDt0Vu/GTKjeuklnMAkm7yzXi+FAp93g5zVj8hTh9wc64TKlfkuJ+f0bX BnSMkEOgplFFUoaWu+76p5xlRZd2MmnovCfxR9m7tWjQwMOzjuIh0ofaeqn0IZn7f9MR gg7Q== X-Gm-Message-State: AOJu0YxjglI1mqS6dnd3lO14mSggKsmnHFQIZ2iXCxbOn1yN/N79/VTG MI/6EVudPBxfqLfH2xGx/NWUqMONEq5hA982MJzIXVJYh1tYnw== X-Google-Smtp-Source: AGHT+IF1vdVP5+Y9kEnvpb5+k856M45bfGYvw4l4Z+CxsfIGTaGEXfWFlT8zufzfH/Bd0Y3/pCKQ2A== X-Received: by 2002:a17:903:32c3:b0:1d3:9287:a1a9 with SMTP id i3-20020a17090332c300b001d39287a1a9mr1518497plr.57.1704990460155; Thu, 11 Jan 2024 08:27:40 -0800 (PST) Received: from hexa.router0800d9.com (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id a6-20020a170902ee8600b001d04d730687sm1347577pld.103.2024.01.11.08.27.39 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 11 Jan 2024 08:27:39 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][nanbield 05/12] linux-firmware: Package iwlwifi .pnvm files Date: Thu, 11 Jan 2024 06:27:18 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 11 Jan 2024 16:27:42 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/193553 From: Jason Andryuk The iwlwifi uses the .pnvm files for newer AX210+ cards, so package them into the iwlwifi-misc subpackage. Signed-off-by: Jason Andryuk Signed-off-by: Alexandre Belloni Signed-off-by: Richard Purdie (cherry picked from commit 056c4de1422ff06745c5669f871a1bb6f5390d01) Signed-off-by: Steve Sakoman --- .../recipes-kernel/linux-firmware/linux-firmware_20231030.bb | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/meta/recipes-kernel/linux-firmware/linux-firmware_20231030.bb b/meta/recipes-kernel/linux-firmware/linux-firmware_20231030.bb index c0394b9b3b..b849c086b6 100644 --- a/meta/recipes-kernel/linux-firmware/linux-firmware_20231030.bb +++ b/meta/recipes-kernel/linux-firmware/linux-firmware_20231030.bb @@ -1187,7 +1187,10 @@ FILES:${PN}-iwlwifi-7265d = "${nonarch_base_libdir}/firmware/iwlwifi-7265D-*.u FILES:${PN}-iwlwifi-8000c = "${nonarch_base_libdir}/firmware/iwlwifi-8000C-*.ucode" FILES:${PN}-iwlwifi-8265 = "${nonarch_base_libdir}/firmware/iwlwifi-8265-*.ucode" FILES:${PN}-iwlwifi-9000 = "${nonarch_base_libdir}/firmware/iwlwifi-9000-*.ucode" -FILES:${PN}-iwlwifi-misc = "${nonarch_base_libdir}/firmware/iwlwifi-*.ucode" +FILES:${PN}-iwlwifi-misc = " \ + ${nonarch_base_libdir}/firmware/iwlwifi-*.ucode \ + ${nonarch_base_libdir}/firmware/iwlwifi-*.pnvm \ +" RDEPENDS:${PN}-iwlwifi-135-6 = "${PN}-iwlwifi-license" RDEPENDS:${PN}-iwlwifi-3160-7 = "${PN}-iwlwifi-license" From patchwork Thu Jan 11 16:27:19 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 37638 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 69610C47077 for ; Thu, 11 Jan 2024 16:27:52 +0000 (UTC) Received: from mail-pg1-f176.google.com (mail-pg1-f176.google.com [209.85.215.176]) by mx.groups.io with SMTP id smtpd.web11.15557.1704990463129329245 for ; Thu, 11 Jan 2024 08:27:43 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=S9FVwvo8; spf=softfail (domain: sakoman.com, ip: 209.85.215.176, mailfrom: steve@sakoman.com) Received: by mail-pg1-f176.google.com with SMTP id 41be03b00d2f7-5cdfed46372so4291309a12.3 for ; Thu, 11 Jan 2024 08:27:43 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1704990462; x=1705595262; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=Lv8emVTqxjsH+0BDzsgJzMe8yZQlEkISakx1mBjTa4Y=; b=S9FVwvo8Yp2AxyaS3IAuew3I4oYPZkAzEtZC0jMCimRDkZDbATejgaBKfd03xbTgYI IC/kHi4i/uJfZK2tOI4E633v2LBkbZw5oLYrLiEswCwFemp7zyINJ5ZA8HH/0YSRrfdS /ox8OtTkwYLfFnmdVaD2WhJnkAKy+CmjHtaI5S0q0QgC+6ysmDC9DT43oYsTXc7nzFLr Me/9kTEIjTDHgUd2rp3brwRFy/nVCd5wi0RpaTwi3lm71cQQswAgBDEiI8FJeSazsYI0 3omliRgEChnexKeuwTgGXIu8hlp+QBL6Hp0fS9YRyfO/uOMRw0nl4ineXgn45wn+qnPq qreg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1704990462; x=1705595262; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=Lv8emVTqxjsH+0BDzsgJzMe8yZQlEkISakx1mBjTa4Y=; b=Cm0rKJ3xXmK3yeeGflZbSTvukwxqB8MJPK9A09HUAuze75II9Iz5x0Ns+2SFClFKiQ mu4ibDt0Z8RDhYZ20LXnPfwbe8JPfamqsRgvwEb8/SFzNra4n+JneieelPALx0NuNhhS huGd96/7rFjKngUOJeeMrscRorApvUy+CTa5jA5le696R4GCmGsQPv/hLPITKKMj+IZI Ia3xz1hixNHd0POeZ3nFoZvmkHVAQv/8/zpk4ZqeG0enGCXRq0JfFyY57e4dE0vDFjID +u4f9P9ozUy2X6LszmBKDal6oXKUyzX2c3ln6f/ya0BMiKysb5QeP9MoUCRpMNtPKjMP OImg== X-Gm-Message-State: AOJu0YzSCbjXk4waeyPu0SckOdN0q5QLROlHKP+dGSJrefn58IsAKT0x VXhMA2y1IdtqHArU5xR3/oDWSgXp634UeFRgMWT9LvoXOaw24Q== X-Google-Smtp-Source: AGHT+IGMTN17DiR3W5RX0rEAdrxTZC+oU0wbpepqG1UiiuytbEtQmQzREjSx11wi+EkM11oFbxlR7A== X-Received: by 2002:a05:6a20:4d8f:b0:19a:5106:788a with SMTP id gj15-20020a056a204d8f00b0019a5106788amr73008pzb.54.1704990461873; Thu, 11 Jan 2024 08:27:41 -0800 (PST) Received: from hexa.router0800d9.com (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id a6-20020a170902ee8600b001d04d730687sm1347577pld.103.2024.01.11.08.27.41 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 11 Jan 2024 08:27:41 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][nanbield 06/12] linux-firmware: Change bnx2 packaging Date: Thu, 11 Jan 2024 06:27:19 -1000 Message-Id: <49ca6eb5ef93bf90c682ea06c83db147aed250fa.1704990330.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 11 Jan 2024 16:27:52 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/193554 From: Jason Andryuk The bnx2 module uses both the mips and rv2p files, so package them all together. Remove -mips from the package name, but add an RPROVIDES for compatibility. Signed-off-by: Jason Andryuk Signed-off-by: Alexandre Belloni Signed-off-by: Richard Purdie (cherry picked from commit 46f2b7b3bebc7efdb4199cdfe386dc16c049d8d7) Signed-off-by: Steve Sakoman --- .../linux-firmware/linux-firmware_20231030.bb | 14 +++++++++----- 1 file changed, 9 insertions(+), 5 deletions(-) diff --git a/meta/recipes-kernel/linux-firmware/linux-firmware_20231030.bb b/meta/recipes-kernel/linux-firmware/linux-firmware_20231030.bb index b849c086b6..a1229e4827 100644 --- a/meta/recipes-kernel/linux-firmware/linux-firmware_20231030.bb +++ b/meta/recipes-kernel/linux-firmware/linux-firmware_20231030.bb @@ -340,7 +340,7 @@ PACKAGES =+ "${PN}-amphion-vpu-license ${PN}-amphion-vpu \ ${PN}-ice-license ${PN}-ice \ ${PN}-ice-enhanced-license ${PN}-ice-enhanced \ ${PN}-adsp-sst-license ${PN}-adsp-sst \ - ${PN}-bnx2-mips \ + ${PN}-bnx2 \ ${PN}-liquidio \ ${PN}-nvidia-license \ ${PN}-nvidia-tegra-k1 ${PN}-nvidia-tegra \ @@ -1087,18 +1087,22 @@ RDEPENDS:${PN}-bcm4356-pcie += "${PN}-cypress-license" LICENSE:${PN}-bcm4373 = "Firmware-cypress" RDEPENDS:${PN}-bcm4373 += "${PN}-cypress-license" -# For Broadcom bnx2-mips +# For Broadcom bnx2 # # which is a separate case to the other Broadcom firmwares since its # license is contained in the shared WHENCE file. -LICENSE:${PN}-bnx2-mips = "WHENCE" +LICENSE:${PN}-bnx2 = "WHENCE" LICENSE:${PN}-whence-license = "WHENCE" -FILES:${PN}-bnx2-mips = "${nonarch_base_libdir}/firmware/bnx2/bnx2-mips-09-6.2.1b.fw" +FILES:${PN}-bnx2 = " \ + ${nonarch_base_libdir}/firmware/bnx2/bnx2-mips*.fw \ + ${nonarch_base_libdir}/firmware/bnx2/bnx2-rv2p*.fw \ +" FILES:${PN}-whence-license = "${nonarch_base_libdir}/firmware/WHENCE" -RDEPENDS:${PN}-bnx2-mips += "${PN}-whence-license" +RDEPENDS:${PN}-bnx2 += "${PN}-whence-license" +RPROVIDES:${PN}-bnx2 = "${PN}-bnx2-mips" # For cirrus LICENSE:${PN}-cirrus = "Firmware-cirrus" From patchwork Thu Jan 11 16:27:20 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 37640 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 825C6C47422 for ; Thu, 11 Jan 2024 16:27:52 +0000 (UTC) Received: from mail-pl1-f173.google.com (mail-pl1-f173.google.com [209.85.214.173]) by mx.groups.io with SMTP id smtpd.web10.15727.1704990464517735232 for ; Thu, 11 Jan 2024 08:27:44 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=YDXJ8KgW; spf=softfail (domain: sakoman.com, ip: 209.85.214.173, mailfrom: steve@sakoman.com) Received: by mail-pl1-f173.google.com with SMTP id d9443c01a7336-1d3e84fded7so31235105ad.1 for ; Thu, 11 Jan 2024 08:27:44 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1704990463; x=1705595263; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=GRY9s2fX7OkMWU9xOlt/nkMoqWBpCtw6hvPWk4LPlIE=; b=YDXJ8KgWtPAomT6F5DtN6eaWTEKHAiIp+GxlhsVYKPBJcVM5KWxWzkqT9x1ePJ3mCx forbNzo9GI8yO9f25dmu1d8WYQDqC33ZY1IjX8VFEsvlTBxN1XXxhtLiKwDRroJFjAfd DOscdD+Dxe3QZzfO0ykPIkHfFEIBwFGZXYNnUEI2Vlba07AWGncWJbowaQYKD5DNLGAg WMkneWlrbptwIVLTWxA/yVwLdA+oBaZRJcdK4a8H/dsZjw8v5a7Zn/ZSnmf9X9rtLbbm OQG53qUuKA0o6NC79Z7TN+PNpH7kH8Ne32ALng/yxppv4tWGWropJ+0+O0wQ9+06HIbG JqHw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1704990463; x=1705595263; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=GRY9s2fX7OkMWU9xOlt/nkMoqWBpCtw6hvPWk4LPlIE=; b=J4jrebYNgZdpQ4iDZmI4N8C7V/eLNMnjPb/Jzv7dqugTiaUqCu6A750PnVjlCRZAYA kP/bFKVpG35l4fgxe2TwQotgTclidPpu9STFrIdR7cHTUfczpaNF9yt8ey637hRka5tq CEYWuzsJ9cd8zRKtzIcjCJsJtCdZ2sFIpk1orpg84PMJNS9O0/Wl0nrbfrWhNOVSK6ma EL4I8bfkpo9iGCkzGJOCGLFKosaWuruAZcVRzizOGnydPkPJfyivOff9wOTo7Nq6ymte pninWkiFawmxzkZyLI9936RomnVX2xBAUjg/UCBZzpQViM8EJGIgE2Ki3GQjMm+Z+pJS ADxw== X-Gm-Message-State: AOJu0Ywf2O+cVwYyMMUCZfJDkARWs+FlKdHux7c/P4PLs102EhIAk7za aq2b9EBYcpQdC09NdQSe2NUgzB+ZxMS2utiHI6t6G5ZjhIbKDw== X-Google-Smtp-Source: AGHT+IEK9o8BWcJg7yn115KSOity0/ceGhPQ1QC8tQe0Jxv2SxJjFg5JnESKiD+8repQk5AkdysQ0Q== X-Received: by 2002:a17:902:c642:b0:1d4:3872:30a2 with SMTP id s2-20020a170902c64200b001d4387230a2mr1123345pls.57.1704990463706; Thu, 11 Jan 2024 08:27:43 -0800 (PST) Received: from hexa.router0800d9.com (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id a6-20020a170902ee8600b001d04d730687sm1347577pld.103.2024.01.11.08.27.42 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 11 Jan 2024 08:27:43 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][nanbield 07/12] linux-firmware: Create bnx2x subpackage Date: Thu, 11 Jan 2024 06:27:20 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 11 Jan 2024 16:27:52 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/193555 From: Jason Andryuk bnx2x is another broadcom ethernet adapter with its own firmware. Place it into its own subpackage. Signed-off-by: Jason Andryuk Signed-off-by: Alexandre Belloni Signed-off-by: Richard Purdie (cherry picked from commit 414f71bb692da7ca1899b07ebb689edeb53f8e0d) Signed-off-by: Steve Sakoman --- .../linux-firmware/linux-firmware_20231030.bb | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/meta/recipes-kernel/linux-firmware/linux-firmware_20231030.bb b/meta/recipes-kernel/linux-firmware/linux-firmware_20231030.bb index a1229e4827..6667f00612 100644 --- a/meta/recipes-kernel/linux-firmware/linux-firmware_20231030.bb +++ b/meta/recipes-kernel/linux-firmware/linux-firmware_20231030.bb @@ -341,6 +341,7 @@ PACKAGES =+ "${PN}-amphion-vpu-license ${PN}-amphion-vpu \ ${PN}-ice-enhanced-license ${PN}-ice-enhanced \ ${PN}-adsp-sst-license ${PN}-adsp-sst \ ${PN}-bnx2 \ + ${PN}-bnx2x \ ${PN}-liquidio \ ${PN}-nvidia-license \ ${PN}-nvidia-tegra-k1 ${PN}-nvidia-tegra \ @@ -1104,6 +1105,12 @@ FILES:${PN}-whence-license = "${nonarch_base_libdir}/firmware/WHENCE" RDEPENDS:${PN}-bnx2 += "${PN}-whence-license" RPROVIDES:${PN}-bnx2 = "${PN}-bnx2-mips" +LICENSE:${PN}-bnx2x = "WHENCE" + +FILES:${PN}-bnx2x = "${nonarch_base_libdir}/firmware/bnx2x/bnx2x*.fw" + +RDEPENDS:${PN}-bnx2x += "${PN}-whence-license" + # For cirrus LICENSE:${PN}-cirrus = "Firmware-cirrus" LICENSE:${PN}-cirrus-license = "Firmware-cirrus" From patchwork Thu Jan 11 16:27:21 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 37642 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 86C5CC47DA7 for ; Thu, 11 Jan 2024 16:27:52 +0000 (UTC) Received: from mail-pl1-f169.google.com (mail-pl1-f169.google.com [209.85.214.169]) by mx.groups.io with SMTP id smtpd.web10.15728.1704990466240857930 for ; Thu, 11 Jan 2024 08:27:46 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=dGKJnpyw; spf=softfail (domain: sakoman.com, ip: 209.85.214.169, mailfrom: steve@sakoman.com) Received: by mail-pl1-f169.google.com with SMTP id d9443c01a7336-1d3ec3db764so23189175ad.2 for ; Thu, 11 Jan 2024 08:27:46 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1704990465; x=1705595265; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=8v55FYADvsIB3A0CbHO+gKIMlzcIdU0z9USy7SQaLiw=; b=dGKJnpywhyn/mHwOn8YIceemDNOoNxG4g9hQ0Gga+K63w7EU30rC8fd97TB23a23A0 j4cQbUtAD4dwjorherdC8sGyHQDiO4KkmPvbDFehUGQjRG/noAp392WMneYvbZOOkeGt kqsuHQq5opZD/fxKO9X16kopupmoOpKr0+g+i9hKuQvTbb9VophHG8hzXKUno+bMzKBt JRGm46mBa4XP+w18WEyKjw+8dzeT8io1/p1n0uH1ZPagK81lV8WctuT8xI5Rd683tzZ/ ob2M0/eRrqLQntZ3vOQTfHsN5pCinweEiz78BEqvw8q5B25hKhwWmLkYrsnebkxzn4JM k2gQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1704990465; x=1705595265; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=8v55FYADvsIB3A0CbHO+gKIMlzcIdU0z9USy7SQaLiw=; b=RLG7vcYOEWvwTpGX+jtBSjaBvgXIMNHFUR9l5wmdfX13Bo/YGJIFHGMs8L+vPa+fGJ /KWhxOTG7zfaHPNMmaHBw6keVsrOsKCw6J4btIGTbv9bi62atsBigruGZMiZ7HvIZn1Z IgFgm9vSAZTpDe5SKzbjmF/yZoOQMWCr2EOIsFD5JgUqERWKJNjE47YjJm/0z4IpQ0of 5xHqO1FdunrQYpwTb+IFPyiRPqcNxoQbv1w+vvTM/Gi8DcXg8540qwv7S4ApQbXnnEOx 73nWgEAFZ7AVTcGykLjDZRtEGc/2ncI7YzEISi9lqUKlUaEtMYDqnFNRmj3zNKP+z9a7 ClXw== X-Gm-Message-State: AOJu0Ywpo2V4LNd9hP/VZ4ml20i15IaNUMool5PBCAn3A5U84ERuQrWp BuNBCCGbnCysEKKnpIjSQt/kqu3XiPQi6ef1cWLNPJbDbPZwAw== X-Google-Smtp-Source: AGHT+IEOW5jHltwJimywuPt8FEPAzXaG3bHrOZR8YhXlWsrwHGTwj2150sz/x0cI0jHUWo+LDCmPZw== X-Received: by 2002:a17:902:eb90:b0:1d4:19c6:dfff with SMTP id q16-20020a170902eb9000b001d419c6dfffmr1790766plg.20.1704990465380; Thu, 11 Jan 2024 08:27:45 -0800 (PST) Received: from hexa.router0800d9.com (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id a6-20020a170902ee8600b001d04d730687sm1347577pld.103.2024.01.11.08.27.44 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 11 Jan 2024 08:27:45 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][nanbield 08/12] documentation.conf: fix do_menuconfig description Date: Thu, 11 Jan 2024 06:27:21 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 11 Jan 2024 16:27:52 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/193556 From: Joao Marcos Costa The current description is only pertinent to the kernel, even though do_menuconfig task is used by other projects, such as Busybox and U-Boot. Replace "for the kernel" by an agnostic alternative (i.e., "in the compilation directory"). Signed-off-by: Joao Marcos Costa Signed-off-by: Alexandre Belloni Signed-off-by: Richard Purdie (cherry picked from commit 52e053bce5e359995ebdaa21d6899f04ad2306a0) Signed-off-by: Steve Sakoman --- meta/conf/documentation.conf | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/meta/conf/documentation.conf b/meta/conf/documentation.conf index d03c497c0e..486c62b6e8 100644 --- a/meta/conf/documentation.conf +++ b/meta/conf/documentation.conf @@ -28,7 +28,7 @@ do_kernel_configcheck[doc] = "Validates the kernel configuration for a linux-yoc do_kernel_configme[doc] = "Assembles the kernel configuration for a linux-yocto style kernel" do_kernel_link_images[doc] = "Creates a symbolic link in arch/$arch/boot for vmlinux and vmlinuz kernel images" do_listtasks[doc] = "Lists all defined tasks for a target" -do_menuconfig[doc] = "Runs 'make menuconfig' for the kernel" +do_menuconfig[doc] = "Runs 'make menuconfig' in the compilation directory" do_package[doc] = "Analyzes the content of the holding area and splits it into subsets based on available packages and files" do_package_index[doc] = "Creates or updates the index in the Package Feed area" do_package_qa[doc] = "Runs QA checks on packaged files" From patchwork Thu Jan 11 16:27:22 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 37643 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 9400DC47DA6 for ; Thu, 11 Jan 2024 16:27:52 +0000 (UTC) Received: from mail-pl1-f179.google.com (mail-pl1-f179.google.com [209.85.214.179]) by mx.groups.io with SMTP id smtpd.web11.15561.1704990468021541349 for ; Thu, 11 Jan 2024 08:27:48 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=I5Kn4lc5; spf=softfail (domain: sakoman.com, ip: 209.85.214.179, mailfrom: steve@sakoman.com) Received: by mail-pl1-f179.google.com with SMTP id d9443c01a7336-1d3f2985425so29135135ad.3 for ; Thu, 11 Jan 2024 08:27:47 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1704990467; x=1705595267; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=oHnrZLvWj2rLETIzCeMIY/sbtOrx0qxE9R9jN00/uTc=; b=I5Kn4lc5jKa/T95Evp/nNtCNee3qW6pNeiJIJhSrM+tgjnks0UhIiqCysO9Yc26bhW uqD7QoEd77eKcQgJ9Ze1sGLenVDL785Rgma54UQuf36E5oB7HNp/c/klS5YlpQdJa/gK /wfFHyBGJ1etxf6DKAMgov3LWq2xuDwA5VF1rtLBs5zwZHuZEbMPYhvuH+70sKDG3ZBZ 7ubwdX48p4CSmWI3WMRT1hLHIUYs9JrS5AYsgq/Z5PZcfllA/3sJyLwKO+ClFzToezF6 fTrZQHfUoLxdv0Xzh6tPliwVU9mmatIQbsRzjXHETljagJVjucYoYsz1+Y35q5Tjp8AH /fdA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1704990467; x=1705595267; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=oHnrZLvWj2rLETIzCeMIY/sbtOrx0qxE9R9jN00/uTc=; b=haZlqp+dGqUhS47SW/K3VaXW9Bgl0eBh4/5/s/g7E/QbQyojF1tKLOcm/VN/jBi/nc 0BCoBppll7dO022/Q0o9wZFtw6J+26oxp/kKptJf8rHW/aS+JffzjB4NnpC+8NGLoMlt RYxZpjknUE1G5bzRIx+Hn1c2qrZWrLyFnSQoLi7vamcp/zNpCpW8WYGGENlCFvedADPs CXjjS0YPMr04YMok7xypOBcDrsYZB63N13J9b5qwWA5/yKpzulMigpHYU3DMnnE3Ikwy bjmKRLqsBRKOWZksysrfNZjZWk/n0HJ9eQmc49qlM1ggbw2PuaoLaXKPOgJjzXGPfCzc 2URQ== X-Gm-Message-State: AOJu0YyCYNa3acNyQmH7sGAQQ/l9hiNjok6tpPvpO889XBt09afr53ne dtslXDC9MZQcfCnmP1spFhF6iiFth7lwMFHVtjMeKqudjgAkag== X-Google-Smtp-Source: AGHT+IGs6L7esoQBxsQ1QyZSqKqaetF7UYjVbrO0kMbwUkH7uc8VuzNQ/7Z2PINRcKms+WSipjMG9w== X-Received: by 2002:a17:903:446:b0:1d4:1c0a:160c with SMTP id iw6-20020a170903044600b001d41c0a160cmr1167149plb.86.1704990467080; Thu, 11 Jan 2024 08:27:47 -0800 (PST) Received: from hexa.router0800d9.com (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id a6-20020a170902ee8600b001d04d730687sm1347577pld.103.2024.01.11.08.27.46 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 11 Jan 2024 08:27:46 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][nanbield 09/12] cmake: Unset CMAKE_CXX_IMPLICIT_INCLUDE_DIRECTORIES Date: Thu, 11 Jan 2024 06:27:22 -1000 Message-Id: <5599eaefee3818c865d71f5b7c3cc04fc01de848.1704990330.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 11 Jan 2024 16:27:52 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/193557 From: Zahir Hussain As discussion in [YOCTO #14717] cmake contains a OEToolchainConfig.cmake file to configure the toolchain correctly in cross-compile build for recipes using cmake. The variable CMAKE_CXX_IMPLICIT_INCLUDE_DIRECTORIES value updates incorrectly during do_compile the code. Due to this getting sporadic error like below, fatal error: stdlib.h: No such file or directory | 75 | #include_next | | ^~~~~~~~~~ | compilation terminated. | ninja: build stopped: subcommand failed. | WARNING: exit code 1 from a shell command. As cmake already correctly initializes the variable from environment, So we have to unset it in the toolchain file to avoid overwriting the variable definition again. Signed-off-by: aszh07 Signed-off-by: Zahir Hussain Signed-off-by: Alexandre Belloni Signed-off-by: Richard Purdie (cherry picked from commit 5aeada5793af53e8c93940952d4f314474dca4c2) Signed-off-by: Steve Sakoman --- meta/recipes-devtools/cmake/cmake/OEToolchainConfig.cmake | 3 +++ 1 file changed, 3 insertions(+) diff --git a/meta/recipes-devtools/cmake/cmake/OEToolchainConfig.cmake b/meta/recipes-devtools/cmake/cmake/OEToolchainConfig.cmake index d6a1e0464c..6434b27371 100644 --- a/meta/recipes-devtools/cmake/cmake/OEToolchainConfig.cmake +++ b/meta/recipes-devtools/cmake/cmake/OEToolchainConfig.cmake @@ -18,3 +18,6 @@ file( GLOB toolchain_config_files "${CMAKE_CURRENT_LIST_FILE}.d/*.cmake" ) foreach(config ${toolchain_config_files}) include(${config}) endforeach() + +unset(CMAKE_C_IMPLICIT_INCLUDE_DIRECTORIES) +unset(CMAKE_CXX_IMPLICIT_INCLUDE_DIRECTORIES) From patchwork Thu Jan 11 16:27:23 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 37639 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 73866C47258 for ; Thu, 11 Jan 2024 16:27:52 +0000 (UTC) Received: from mail-pl1-f178.google.com (mail-pl1-f178.google.com [209.85.214.178]) by mx.groups.io with SMTP id smtpd.web10.15732.1704990469597251703 for ; Thu, 11 Jan 2024 08:27:49 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=FccOjnMo; spf=softfail (domain: sakoman.com, ip: 209.85.214.178, mailfrom: steve@sakoman.com) Received: by mail-pl1-f178.google.com with SMTP id d9443c01a7336-1d54b86538aso27861405ad.0 for ; Thu, 11 Jan 2024 08:27:49 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1704990469; x=1705595269; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=u9d6HAjkHw0R8xfd0QdgRfBJe9Z7gpGg8oUlXpp1oMA=; b=FccOjnMoPfTt7PCfnh4fVq7RfGEPo1dt6uTcGlJSjvUaY31kF6fBeKjnSRDRbomexz pDgtBD7ky1Vq5zmdaPnM5l5yVdYBM2oUQRizIhmPIuz1V8iAq+25Kv55DK2MP+YT487A 6gIRws8Sx/JKu+BVpzS5OoLwibFbtTAmYvko3NqhD+d6PwGKgO0Ld9l0JQzfWzzB5ay/ TdtdLKySJssQOHALXrgfaRUzr6sxXE93gLJb1FmpNQOT9lgOrP0Q137lAs2Y33MFTWcs yUSJFBMtSKC/+eGYfH1D7cOWok6MzJTKoqv19YnHJF4L6F9aI5bcv1c1YVDRyuNm/Wec U3JA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1704990469; x=1705595269; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=u9d6HAjkHw0R8xfd0QdgRfBJe9Z7gpGg8oUlXpp1oMA=; b=Ys7bsTl2JaPL5wjGIk+GLDhcA80fEhGztB3cMzlF0nKySOK5AXYB4mBm8/EkMT8nAE bkCMWY9ep6gli2bDdA9LdbU4BJqY0ROgVbWG+7Jy3N6J72vloTKRxHr8ZgLMx0FHg0XG Ohg+1rJpTy5Q4YyR8LfdDXMYdfblmDTrE88YQvsjhOFo56S5KiTa4B9+z4xJmU9vr6s6 hCxyAFv0oa6L6nDMgWpuAj8Asx3ZM+GeN8vl0e4NlgHXHMrBhfdK4bh76QZWFFy9prIy bAtI71YlYhKp4mhsRZy5+r31e/qQWtl3O+jO7GUTqyx51HkpdHgnFhVagpwvD4KPYzWf vZ6w== X-Gm-Message-State: AOJu0YzlSiSIq+SvMwtDiQxLvshkGTlbJDk3kyG+MMYIvSxY1YnKxinK XGQY6n1oOj6C2HwbBVxZuhF0uzvJGurrRxEhL30w1/emKj7U6A== X-Google-Smtp-Source: AGHT+IG5OXSXlFHBUtI6KL4hXTX82P19VGHWmfxkww/AFFFL/pu9Ofm89NgKGKHbCI2Jl9eYKb4dXw== X-Received: by 2002:a17:902:f814:b0:1d3:f9ac:c9d3 with SMTP id ix20-20020a170902f81400b001d3f9acc9d3mr1217995plb.76.1704990468766; Thu, 11 Jan 2024 08:27:48 -0800 (PST) Received: from hexa.router0800d9.com (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id a6-20020a170902ee8600b001d04d730687sm1347577pld.103.2024.01.11.08.27.47 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 11 Jan 2024 08:27:48 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][nanbield 10/12] avahi: update URL for new project location Date: Thu, 11 Jan 2024 06:27:23 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 11 Jan 2024 16:27:52 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/193558 From: Ross Burton Avahi has moved to a new parent organisation on GitHub, so update the URLs to match. Signed-off-by: Ross Burton Signed-off-by: Alexandre Belloni Signed-off-by: Richard Purdie (cherry picked from commit 02caef1567186f250e64ae3ef84fcff33d7323e4) Signed-off-by: Steve Sakoman --- meta/recipes-connectivity/avahi/avahi_0.8.bb | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/meta/recipes-connectivity/avahi/avahi_0.8.bb b/meta/recipes-connectivity/avahi/avahi_0.8.bb index bfd945c7ae..1f18d4491d 100644 --- a/meta/recipes-connectivity/avahi/avahi_0.8.bb +++ b/meta/recipes-connectivity/avahi/avahi_0.8.bb @@ -6,7 +6,7 @@ IPv4 Link-Local Addresses" (IETF RFC3927), a protocol for automatic IP address \ configuration from the link-local 169.254.0.0/16 range without the need for a central \ server.' HOMEPAGE = "http://avahi.org" -BUGTRACKER = "https://github.com/lathiat/avahi/issues" +BUGTRACKER = "https://github.com/avahi/avahi/issues" SECTION = "network" # major part is under LGPL-2.1-or-later, but several .dtd, .xsl, initscripts and @@ -37,8 +37,7 @@ SRC_URI = "${GITHUB_BASE_URI}/download/v${PV}/avahi-${PV}.tar.gz \ file://CVE-2023-38473.patch \ " -GITHUB_BASE_URI = "https://github.com/lathiat/avahi/releases/" -SRC_URI[md5sum] = "229c6aa30674fc43c202b22c5f8c2be7" +GITHUB_BASE_URI = "https://github.com/avahi/avahi/releases/" SRC_URI[sha256sum] = "060309d7a333d38d951bc27598c677af1796934dbd98e1024e7ad8de798fedda" CVE_STATUS[CVE-2021-26720] = "not-applicable-platform: Issue only affects Debian/SUSE" From patchwork Thu Jan 11 16:27:24 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 37641 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 77CFCC47DA2 for ; Thu, 11 Jan 2024 16:27:52 +0000 (UTC) Received: from mail-pj1-f45.google.com (mail-pj1-f45.google.com [209.85.216.45]) by mx.groups.io with SMTP id smtpd.web10.15736.1704990471934125528 for ; Thu, 11 Jan 2024 08:27:51 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=L6thd2gH; spf=softfail (domain: sakoman.com, ip: 209.85.216.45, mailfrom: steve@sakoman.com) Received: by mail-pj1-f45.google.com with SMTP id 98e67ed59e1d1-28c7e30c83fso3675187a91.1 for ; Thu, 11 Jan 2024 08:27:51 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1704990471; x=1705595271; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=+ZWQ8mnsD11dkLSeSDcx+X9mwyryfFW9LAaI914Cs1M=; b=L6thd2gHKrwCD0Nf/dVEvqQVt0nvuctBX9KZpNRiHPbS/cQMGNyOcRIkKBGNEKcMLx q6E/JWwh47eXct5/5p/K+4rz17eZciA0L4FmE2dtFi70/BM4lky+z+7GlOTGmTefBUP8 kpMfIPZEG3siDejY/0pqds5sEBwQ/imOrHue9ozLxjq/QoDvaeJQESzx7NnJmI9D00J9 vYNBVqhiShZcfGOxnvow4/KDLaCpkeTME+Y88rDqoldravdlk3oHLQJqSb+wNMaeozLP kAKaNDbdOQ1aOdhDxdbL6/KXxNi6y18xxKJ1O5/MAgLpTjIlnbUCF70LIbp0mi/qhSHk +ydQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1704990471; x=1705595271; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=+ZWQ8mnsD11dkLSeSDcx+X9mwyryfFW9LAaI914Cs1M=; b=PSPR/fG5BgGKxU7uheT1+wYxTT53mJFoM6jVNBWFYHuQk856BBa/WJXQT3NsZe2TfO 9CoLJw84lIyMYsAEshrhnQ56aKgNpQPeudff+Qa+K2+tnZU3nV01zkdSkyvSShcFcl7m YqgN3vE8Rwcb84Q8ySv4Q0V2ZupDEHI7VFTbKSttSzLooWIg5aHMxR8dxN0fMmw7NwSn An5hI7bhG7gfpQj4LJOR0xnh68R9dj59QED4nUVzT9ojVtnBISxvxjkN7DApjV79Xm8Z VSJ920PFxRSKQBebpHUiIhfgfXlA8EHgmpJhbF+QwZPIDylpjqMHuHXDHCB2MjxV6y3X 3mVg== X-Gm-Message-State: AOJu0YxJfsZLswj5N3EFUf1q3oFhEbM0HlN0OzPsXoCHOr7lO4OYkSDl rVLHYTk3q+o9Y5soBBzjaIe61eduuf6tHfsn7d1xzz4P1olwyw== X-Google-Smtp-Source: AGHT+IFE8yY8daQcl4VPkobUkzu1NkEENkIbja0pgHn8bSCJh99DUM5rRzPU/ucvjaKI3xO/464FAg== X-Received: by 2002:a17:90a:fd0a:b0:28c:891a:48f8 with SMTP id cv10-20020a17090afd0a00b0028c891a48f8mr31908pjb.17.1704990471079; Thu, 11 Jan 2024 08:27:51 -0800 (PST) Received: from hexa.router0800d9.com (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id a6-20020a170902ee8600b001d04d730687sm1347577pld.103.2024.01.11.08.27.50 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 11 Jan 2024 08:27:50 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][nanbield 11/12] zstd: fix LICENSE statement Date: Thu, 11 Jan 2024 06:27:24 -1000 Message-Id: <6c9a5fefeaa9225c193a0445bae869e6844bf34d.1704990330.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 11 Jan 2024 16:27:52 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/193559 From: Massimiliano Minella zstd is dual-licensed under BSD _OR_ GPLv2. License wording in the README for v1.5.5 is misleading, but license headers in the code clearly state that there is a choice between the two licenses. Signed-off-by: Massimiliano Minella Signed-off-by: Alexandre Belloni Signed-off-by: Richard Purdie (cherry picked from commit 40f85de590c188c9c3985e64a83efaf06b0b4fbc) Signed-off-by: Steve Sakoman --- meta/recipes-extended/zstd/zstd_1.5.5.bb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/meta/recipes-extended/zstd/zstd_1.5.5.bb b/meta/recipes-extended/zstd/zstd_1.5.5.bb index 5c5fb5e734..2d72af50a4 100644 --- a/meta/recipes-extended/zstd/zstd_1.5.5.bb +++ b/meta/recipes-extended/zstd/zstd_1.5.5.bb @@ -5,7 +5,7 @@ It's backed by a very fast entropy stage, provided by Huff0 and FSE library." HOMEPAGE = "http://www.zstd.net/" SECTION = "console/utils" -LICENSE = "BSD-3-Clause & GPL-2.0-only" +LICENSE = "BSD-3-Clause | GPL-2.0-only" LIC_FILES_CHKSUM = "file://LICENSE;md5=0822a32f7acdbe013606746641746ee8 \ file://COPYING;md5=39bba7d2cf0ba1036f2a6e2be52fe3f0 \ " From patchwork Thu Jan 11 16:27:25 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 37644 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 93742C47077 for ; Thu, 11 Jan 2024 16:28:02 +0000 (UTC) Received: from mail-pl1-f181.google.com (mail-pl1-f181.google.com [209.85.214.181]) by mx.groups.io with SMTP id smtpd.web11.15566.1704990473686829158 for ; Thu, 11 Jan 2024 08:27:53 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=TEiDMwNq; spf=softfail (domain: sakoman.com, ip: 209.85.214.181, mailfrom: steve@sakoman.com) Received: by mail-pl1-f181.google.com with SMTP id d9443c01a7336-1d409bcb0e7so30427145ad.1 for ; Thu, 11 Jan 2024 08:27:53 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1704990473; x=1705595273; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=Dvbx0o1mXPdzKO50S+iVRWUre/xKXPvlq8fgK9Egfeo=; b=TEiDMwNqQxmssjdUA3FKm7fBxP1dSA9bgPTbEHHLmZcZXonq0A30a/xOGsyB4+H41V epcRaRAgsHTOW+Du9jFqt5rfX8M6oNghIrYrlUcp0oZpwdVJj2t8K0R83LU/1I4tpgad H26sh15nswfywXfNGsY+SNeVZne4f85ZMAusvbewJNu0n7Ko3N450vB9ONWn8V5cXXse KuX2CVXW2togu/bBESn60vU/3HgVM1tYVY3U+ns/Oq5iLPvLmVYOoOfpJRh74gLXmg/W HS7GkSONUYMiLS7l1P+V1qZFJlCmwUq5Z3xLnBf21w/Wu2+vi2UklaNlU/BIrk9zY2CP Afiw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1704990473; x=1705595273; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=Dvbx0o1mXPdzKO50S+iVRWUre/xKXPvlq8fgK9Egfeo=; b=D3Js36Q0X1DZrr2Q3Ff2KnWEizlDlPvtH7LGQ3pUIWD5xlafBE53nvk7hM46AhTTBF VcPX7vpQyo/+0paVEH1i3qTG9LU4A/VU2b64L2zuOWm9J9yqs+J2mvEn6WKBeM+QlMVj ZIrdgqdlO0jHoI8Kqp9r9RyNOyF67LzSrkcipRHKZ2lkPFbKshBU/tJHp8hQJIkFALwD ASWh6JMfUWcUePWxyEmhkBactGio90heoi2DSgkRbx6KWi5K8v0gyCLyGc2wuG7yvw4A YRBoKFbRbcE+hjDspmMUvcgdpQEz/XnjBnRIPjjn8jLAyEZQtwZ9qyuiv7pM3goBaq4/ w4GA== X-Gm-Message-State: AOJu0YzSLwpegUQ1qdwV/xBY3DymC3Pc8XRdIG6v6VtXT2apd2Dphpqn jey6ECCmRY6+uYDoETBNIgooA/aMZDuFYRY1oatoKKCKz84ntQ== X-Google-Smtp-Source: AGHT+IFDF+ck9MzZxBe9NMXfQJNSkofIE3rbW1qNSmqY5uiN8Iyon56th4TVCNFzn1VDe+PaT2oeIQ== X-Received: by 2002:a17:903:41ce:b0:1d4:a179:e68b with SMTP id u14-20020a17090341ce00b001d4a179e68bmr1574253ple.19.1704990472855; Thu, 11 Jan 2024 08:27:52 -0800 (PST) Received: from hexa.router0800d9.com (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id a6-20020a170902ee8600b001d04d730687sm1347577pld.103.2024.01.11.08.27.52 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 11 Jan 2024 08:27:52 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][nanbield 12/12] pseudo: Update to pull in syncfs probe fix Date: Thu, 11 Jan 2024 06:27:25 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 11 Jan 2024 16:28:02 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/193560 From: Richard Purdie Pulls in the changes: Eilís 'pidge' Ní Fhlannagáin (1): subports: Add _GNU_SOURCE for syncfs probe Richard Purdie (1): SECURITY.md: Add file Wu Zhenyu (1): pseudo.1: Fix a typo Signed-off-by: Richard Purdie (cherry picked from commit 9aab5be508c0dd88a4d9767f65ba5b6fcd5fb9dd) Signed-off-by: Steve Sakoman --- meta/recipes-devtools/pseudo/pseudo_git.bb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/meta/recipes-devtools/pseudo/pseudo_git.bb b/meta/recipes-devtools/pseudo/pseudo_git.bb index 4a894ebdd0..699cab11c6 100644 --- a/meta/recipes-devtools/pseudo/pseudo_git.bb +++ b/meta/recipes-devtools/pseudo/pseudo_git.bb @@ -14,7 +14,7 @@ SRC_URI:append:class-nativesdk = " \ file://older-glibc-symbols.patch" SRC_URI[prebuilt.sha256sum] = "ed9f456856e9d86359f169f46a70ad7be4190d6040282b84c8d97b99072485aa" -SRCREV = "ec6151a2b057109b3f798f151a36690af582e166" +SRCREV = "a8453eea4d902bbb0e01c786f1cb4a178c3bbee3" S = "${WORKDIR}/git" PV = "1.9.0+git"