From patchwork Wed Jan 24 14:01:04 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 38273 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D9E7BC48260 for ; Wed, 24 Jan 2024 14:01:28 +0000 (UTC) Received: from mail-pg1-f177.google.com (mail-pg1-f177.google.com [209.85.215.177]) by mx.groups.io with SMTP id smtpd.web10.23015.1706104886196457062 for ; Wed, 24 Jan 2024 06:01:26 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=wfttIdDS; spf=softfail (domain: sakoman.com, ip: 209.85.215.177, mailfrom: steve@sakoman.com) Received: by mail-pg1-f177.google.com with SMTP id 41be03b00d2f7-5cddfe0cb64so2811539a12.0 for ; Wed, 24 Jan 2024 06:01:26 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1706104885; x=1706709685; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=2Ma2g4PPhuM1ZHlg4AawBMVsj7gcTEAae55Kwp6YVXE=; b=wfttIdDSj0Yh5XtLP2KaKJzodIKzHUhDeD63McTuk8caDvswq0vgQqfCuAv1Lrhy5f n02yPOSfzfAnYdFm7y2JoqYq6CRK3nLhjR0hsEz1xz2Lul9xKwSPRS6QYDAAE1+J8LMV 9fcNDCMluEhdFNx8d1a6mrvFKIA3n63fXgYKej5GkyNk5yBOyMSvVYoBl0/q3L5SkmAm QwlZueG2RdBuduFt5mpHNY/pMDzS8I5ReeNwpkRntG8XejjJHfZI58fQGRgJM0kYZ9m5 QYtr7lKRCdQxS8J7zdT3cDZWGClfYT91CXsDKEw1S7M+17eJjh/WuhovBK9ue72hl7zO 4twA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1706104885; x=1706709685; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=2Ma2g4PPhuM1ZHlg4AawBMVsj7gcTEAae55Kwp6YVXE=; b=SsNTTztCucPT5WzekikL7nXC4vzg0ocqsMopZkCLOoHoFxXpHEerdNRi5iBKHlMyfE uJxoBztGeOJH27kmSfu/hGhY1IgZrtYbOEbMn7nbRSHOFQJa+Iemb/U0ln4MZpUuvIYE VPIFIhqJ+DFSPG7VmwrBHE+uWbzYlwKH6dEEuh9dHEab7Vk8IWbNyq22QKY6ybmNJzjF KUeUQzmc6zN7t1VrGrQkSOrYUvkjTckPopCfNo03tPVM1r9JnD+R8Zflv5Fk4WP4JRkk EvHAN3GRA7vFRanIuy8m0+M0gxzuWgqXHGrbpxs/ZH4pGurXSm7oGPSg6gNUdbBfvWH3 mvqg== X-Gm-Message-State: AOJu0YzvOWmenDpqD9qJ5umCOcCbyPEze91ksnSOSqPkXi0y7LNmrrK9 gC0BfxGmq2FeSRDf9afVtY8XhHP5gH50rvxS5v82visHeaE9xkODhwPvKu0MWco8QcdjA6eJIKT g/jw= X-Google-Smtp-Source: AGHT+IEdmnE2SYQ+2a+yKUwixkBjuSRhQoYRLbnG+F/vsLrLL7+yDvocIEUZSU23UJL9mrRuCFW0DQ== X-Received: by 2002:a05:6a20:9f4f:b0:19a:602d:49ed with SMTP id ml15-20020a056a209f4f00b0019a602d49edmr826117pzb.23.1706104885055; Wed, 24 Jan 2024 06:01:25 -0800 (PST) Received: from hexa.router0800d9.com (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id 8-20020a631648000000b005ccf10e73b8sm11535739pgw.91.2024.01.24.06.01.24 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 24 Jan 2024 06:01:24 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][nanbield 01/12] curl: Fix CVE-2023-46219 Date: Wed, 24 Jan 2024 04:01:04 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 24 Jan 2024 14:01:28 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/194277 From: Lee Chee Yang Upstream docs for CVE-2023-46219: https://curl.se/docs/CVE-2023-46219.html Signed-off-by: Lee Chee Yang Signed-off-by: Steve Sakoman --- .../curl/curl/CVE-2023-46219.patch | 131 ++++++++++++++++++ meta/recipes-support/curl/curl_8.4.0.bb | 1 + 2 files changed, 132 insertions(+) create mode 100644 meta/recipes-support/curl/curl/CVE-2023-46219.patch diff --git a/meta/recipes-support/curl/curl/CVE-2023-46219.patch b/meta/recipes-support/curl/curl/CVE-2023-46219.patch new file mode 100644 index 0000000000..d6c8925218 --- /dev/null +++ b/meta/recipes-support/curl/curl/CVE-2023-46219.patch @@ -0,0 +1,131 @@ +CVE: CVE-2023-46219 +Upstream-Status: Backport [ https://github.com/curl/curl/commit/73b65e94f3531179de45 ] +Signed-off-by: Lee Chee Yang + +From 73b65e94f3531179de45c6f3c836a610e3d0a846 Mon Sep 17 00:00:00 2001 +From: Daniel Stenberg +Date: Thu, 23 Nov 2023 08:23:17 +0100 +Subject: [PATCH] fopen: create short(er) temporary file name + +Only using random letters in the name plus a ".tmp" extension. Not by +appending characters to the final file name. + +Reported-by: Maksymilian Arciemowicz + +Closes #12388 +--- + lib/fopen.c | 65 ++++++++++++++++++++++++++++++++++++++++++++++++----- + 1 file changed, 60 insertions(+), 5 deletions(-) + +diff --git a/lib/fopen.c b/lib/fopen.c +index 75b8a7aa534085..a73ac068ea3016 100644 +--- a/lib/fopen.c ++++ b/lib/fopen.c +@@ -39,6 +39,51 @@ + #include "curl_memory.h" + #include "memdebug.h" + ++/* ++ The dirslash() function breaks a null-terminated pathname string into ++ directory and filename components then returns the directory component up ++ to, *AND INCLUDING*, a final '/'. If there is no directory in the path, ++ this instead returns a "" string. ++ ++ This function returns a pointer to malloc'ed memory. ++ ++ The input path to this function is expected to have a file name part. ++*/ ++ ++#ifdef _WIN32 ++#define PATHSEP "\\" ++#define IS_SEP(x) (((x) == '/') || ((x) == '\\')) ++#elif defined(MSDOS) || defined(__EMX__) || defined(OS2) ++#define PATHSEP "\\" ++#define IS_SEP(x) ((x) == '\\') ++#else ++#define PATHSEP "/" ++#define IS_SEP(x) ((x) == '/') ++#endif ++ ++static char *dirslash(const char *path) ++{ ++ size_t n; ++ struct dynbuf out; ++ DEBUGASSERT(path); ++ Curl_dyn_init(&out, CURL_MAX_INPUT_LENGTH); ++ n = strlen(path); ++ if(n) { ++ /* find the rightmost path separator, if any */ ++ while(n && !IS_SEP(path[n-1])) ++ --n; ++ /* skip over all the path separators, if any */ ++ while(n && IS_SEP(path[n-1])) ++ --n; ++ } ++ if(Curl_dyn_addn(&out, path, n)) ++ return NULL; ++ /* if there was a directory, append a single trailing slash */ ++ if(n && Curl_dyn_addn(&out, PATHSEP, 1)) ++ return NULL; ++ return Curl_dyn_ptr(&out); ++} ++ + /* + * Curl_fopen() opens a file for writing with a temp name, to be renamed + * to the final name when completed. If there is an existing file using this +@@ -50,25 +95,34 @@ CURLcode Curl_fopen(struct Curl_easy *data, const char *filename, + FILE **fh, char **tempname) + { + CURLcode result = CURLE_WRITE_ERROR; +- unsigned char randsuffix[9]; ++ unsigned char randbuf[41]; + char *tempstore = NULL; + struct_stat sb; + int fd = -1; ++ char *dir; + *tempname = NULL; + ++ dir = dirslash(filename); ++ if(!dir) ++ goto fail; ++ + *fh = fopen(filename, FOPEN_WRITETEXT); + if(!*fh) + goto fail; +- if(fstat(fileno(*fh), &sb) == -1 || !S_ISREG(sb.st_mode)) ++ if(fstat(fileno(*fh), &sb) == -1 || !S_ISREG(sb.st_mode)) { ++ free(dir); + return CURLE_OK; ++ } + fclose(*fh); + *fh = NULL; + +- result = Curl_rand_alnum(data, randsuffix, sizeof(randsuffix)); ++ result = Curl_rand_alnum(data, randbuf, sizeof(randbuf)); + if(result) + goto fail; + +- tempstore = aprintf("%s.%s.tmp", filename, randsuffix); ++ /* The temp file name should not end up too long for the target file ++ system */ ++ tempstore = aprintf("%s%s.tmp", dir, randbuf); + if(!tempstore) { + result = CURLE_OUT_OF_MEMORY; + goto fail; +@@ -95,6 +149,7 @@ CURLcode Curl_fopen(struct Curl_easy *data, const char *filename, + if(!*fh) + goto fail; + ++ free(dir); + *tempname = tempstore; + return CURLE_OK; + +@@ -105,7 +160,7 @@ CURLcode Curl_fopen(struct Curl_easy *data, const char *filename, + } + + free(tempstore); +- ++ free(dir); + return result; + } + diff --git a/meta/recipes-support/curl/curl_8.4.0.bb b/meta/recipes-support/curl/curl_8.4.0.bb index 8f1ba52692..977404c963 100644 --- a/meta/recipes-support/curl/curl_8.4.0.bb +++ b/meta/recipes-support/curl/curl_8.4.0.bb @@ -14,6 +14,7 @@ SRC_URI = " \ file://run-ptest \ file://disable-tests \ file://CVE-2023-46218.patch \ + file://CVE-2023-46219.patch \ " SRC_URI[sha256sum] = "16c62a9c4af0f703d28bda6d7bbf37ba47055ad3414d70dec63e2e6336f2a82d" From patchwork Wed Jan 24 14:01:05 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 38272 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id CDC97C46CD2 for ; Wed, 24 Jan 2024 14:01:28 +0000 (UTC) Received: from mail-pl1-f173.google.com (mail-pl1-f173.google.com [209.85.214.173]) by mx.groups.io with SMTP id smtpd.web11.23130.1706104888342497267 for ; Wed, 24 Jan 2024 06:01:28 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=RtEghuyy; spf=softfail (domain: sakoman.com, ip: 209.85.214.173, mailfrom: steve@sakoman.com) Received: by mail-pl1-f173.google.com with SMTP id d9443c01a7336-1d72f71f222so21875135ad.1 for ; Wed, 24 Jan 2024 06:01:28 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1706104887; x=1706709687; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=9fvs0m2jiFAiWKq16paLPtlduAYBEa/U3xCCgDmFZvU=; b=RtEghuyy+JBUc+NkauZoBSBx8IBbXBGTVx75sGI0AuNQNsySBWRzz1ocArK4YBO18H 0Gt6GSzshM8H2Qcu4De3D8ZjER/oiqIlFD1jWcPNxxEHP6g4JpbDGxOdXqp+XKffAA+7 uAmTZlRSecRr90hgxomLTbaY8LzNT6V9EEOqD66gggmRd0xpwfA/9yRYYZ6mA35kOwF3 UvXJEQ/kgNY0ZsdksXA4nSlBx3WnDNTxYYbQsM8vadjOtGDniPIZAhq8M2PJNjtcMaiJ nmn1HBt7y7ivn/zjsiIjCPaKOomG9nvOSHzsz9DZdUZmaquS5OWGL44vxvr3jUoB6IbS 2Rlg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1706104887; x=1706709687; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=9fvs0m2jiFAiWKq16paLPtlduAYBEa/U3xCCgDmFZvU=; b=N9c5e5crZL7Fu9WOZgKIK19jn5ooN0XdzCoTPAJFhMDxGPE+JI8pn3tfFKM1iYAHDO G2DE5KODDbq/cQncWel4nLGTKe3iEpOT5sw+kPV/V+MjqpMy72MQOcNOK9Y3ybFC7T3w UixUC+2F9Vvf4RD43+VkzewoxPieddnp3OEV4lGDGLK5cfMcqDMIQs1SziB6E7U1FiIU egeePUoqWmc4f2sQiI7AYUFjQ0cyvXLUgtiyv/s8BmWcnaYCj+eOdFrG6AS1VKleW9ZH 1ZJd4kXmwOHSpdrFlHYjRbVzmKHJY4YAD6lgwDib7kWvxxQoBp4SsMl+i0KjNK6QZuur Jjeg== X-Gm-Message-State: AOJu0Ywocq050VCdKqzW1NWrdpk4k7Yxfw0IXP8qO642P9zm4PKO6b41 vF09nqV4qr1E7c+7Q2mYX13e5fRZk7N6JF7FUl1KcrRarJXaqrCemoP8WQf030IRofG5dNZaQoJ F3RM= X-Google-Smtp-Source: AGHT+IGhY7kPyIXhuzvjXRZneLgdk6rX/+a7PsngVrIo491oVvxRrPLceJq+MeoL8pE7o/JHlGo9vw== X-Received: by 2002:a17:90b:1e02:b0:28e:7e95:b8f2 with SMTP id pg2-20020a17090b1e0200b0028e7e95b8f2mr4031104pjb.93.1706104886968; Wed, 24 Jan 2024 06:01:26 -0800 (PST) Received: from hexa.router0800d9.com (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id 8-20020a631648000000b005ccf10e73b8sm11535739pgw.91.2024.01.24.06.01.25 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 24 Jan 2024 06:01:26 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][nanbield 02/12] nfs-utils: Upgrade 2.6.3 -> 2.6.4 Date: Wed, 24 Jan 2024 04:01:05 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 24 Jan 2024 14:01:28 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/194278 From: Robert Yang * Remove backported patch 0001-configure.ac-libevent-and-libsqlite3-checked-when-nf.patch. * Add 0001-reexport.h-Include-unistd.h-to-compile-with-musl.patch to fix build with musl Signed-off-by: Robert Yang Signed-off-by: Alexandre Belloni (cherry picked from commit ff416e9fd6a1a65cf59ecd662613581b6190e05e) Signed-off-by: Steve Sakoman --- ...event-and-libsqlite3-checked-when-nf.patch | 80 ------------------- ...nclude-unistd.h-to-compile-with-musl.patch | 34 ++++++++ ...{nfs-utils_2.6.3.bb => nfs-utils_2.6.4.bb} | 8 +- 3 files changed, 38 insertions(+), 84 deletions(-) delete mode 100644 meta/recipes-connectivity/nfs-utils/nfs-utils/0001-configure.ac-libevent-and-libsqlite3-checked-when-nf.patch create mode 100644 meta/recipes-connectivity/nfs-utils/nfs-utils/0001-reexport.h-Include-unistd.h-to-compile-with-musl.patch rename meta/recipes-connectivity/nfs-utils/{nfs-utils_2.6.3.bb => nfs-utils_2.6.4.bb} (94%) diff --git a/meta/recipes-connectivity/nfs-utils/nfs-utils/0001-configure.ac-libevent-and-libsqlite3-checked-when-nf.patch b/meta/recipes-connectivity/nfs-utils/nfs-utils/0001-configure.ac-libevent-and-libsqlite3-checked-when-nf.patch deleted file mode 100644 index 5afc714f19..0000000000 --- a/meta/recipes-connectivity/nfs-utils/nfs-utils/0001-configure.ac-libevent-and-libsqlite3-checked-when-nf.patch +++ /dev/null @@ -1,80 +0,0 @@ -From b62a3fe424026b73ec6b1934483b16863c7dff23 Mon Sep 17 00:00:00 2001 -From: Wiktor Jaskulski -Date: Thu, 11 May 2023 15:28:23 -0400 -Subject: [PATCH] configure.ac: libevent and libsqlite3 checked when nfsv4 is - disabled - -Upstream-Status: Backport -(http://git.linux-nfs.org/?p=steved/nfs-utils.git;a=commit;h=bc4a5deef9f820c55fdac3c0070364c17cd91cca) - -Signed-off-by: Steve Dickson -Signed-off-by: Trevor Gamblin ---- - configure.ac | 38 +++++++++++++++----------------------- - 1 file changed, 15 insertions(+), 23 deletions(-) - -diff --git a/configure.ac b/configure.ac -index 4ade528d..519cacbf 100644 ---- a/configure.ac -+++ b/configure.ac -@@ -335,42 +335,34 @@ AC_CHECK_HEADER(rpc/rpc.h, , - AC_MSG_ERROR([Header file rpc/rpc.h not found - maybe try building with --enable-tirpc])) - CPPFLAGS="${nfsutils_save_CPPFLAGS}" - -+dnl check for libevent libraries and headers -+AC_LIBEVENT -+ -+dnl Check for sqlite3 -+AC_SQLITE3_VERS -+ -+case $libsqlite3_cv_is_recent in -+yes) ;; -+unknown) -+ dnl do not fail when cross-compiling -+ AC_MSG_WARN([assuming sqlite is at least v3.3]) ;; -+*) -+ AC_MSG_ERROR([nfsdcld requires sqlite-devel]) ;; -+esac -+ - if test "$enable_nfsv4" = yes; then -- dnl check for libevent libraries and headers -- AC_LIBEVENT - - dnl check for the keyutils libraries and headers - AC_KEYUTILS - -- dnl Check for sqlite3 -- AC_SQLITE3_VERS -- - if test "$enable_nfsdcld" = "yes"; then - AC_CHECK_HEADERS([libgen.h sys/inotify.h], , - AC_MSG_ERROR([Cannot find header needed for nfsdcld])) -- -- case $libsqlite3_cv_is_recent in -- yes) ;; -- unknown) -- dnl do not fail when cross-compiling -- AC_MSG_WARN([assuming sqlite is at least v3.3]) ;; -- *) -- AC_MSG_ERROR([nfsdcld requires sqlite-devel]) ;; -- esac - fi - - if test "$enable_nfsdcltrack" = "yes"; then - AC_CHECK_HEADERS([libgen.h sys/inotify.h], , - AC_MSG_ERROR([Cannot find header needed for nfsdcltrack])) -- -- case $libsqlite3_cv_is_recent in -- yes) ;; -- unknown) -- dnl do not fail when cross-compiling -- AC_MSG_WARN([assuming sqlite is at least v3.3]) ;; -- *) -- AC_MSG_ERROR([nfsdcltrack requires sqlite-devel]) ;; -- esac - fi - - else --- -2.41.0 - diff --git a/meta/recipes-connectivity/nfs-utils/nfs-utils/0001-reexport.h-Include-unistd.h-to-compile-with-musl.patch b/meta/recipes-connectivity/nfs-utils/nfs-utils/0001-reexport.h-Include-unistd.h-to-compile-with-musl.patch new file mode 100644 index 0000000000..8607b64cb1 --- /dev/null +++ b/meta/recipes-connectivity/nfs-utils/nfs-utils/0001-reexport.h-Include-unistd.h-to-compile-with-musl.patch @@ -0,0 +1,34 @@ +From 45597a58e98f351b18db8444292b1cf6dd0cd810 Mon Sep 17 00:00:00 2001 +From: Robert Yang +Date: Sat, 9 Dec 2023 23:34:08 -0800 +Subject: [PATCH] reexport.h: Include unistd.h to compile with musl + +Fixed error when compile with musl +reexport.c: In function 'reexpdb_init': +reexport.c:62:17: error: implicit declaration of function 'sleep' [-Werror=implicit-function-declaration] + 62 | sleep(1); + + +Upstream-Status: Pending + +Signed-off-by: Robert Yang +--- + support/reexport/reexport.h | 1 + + 1 files changed, 1 insertions(+) + +diff --git a/support/reexport/reexport.h b/support/reexport/reexport.h +index 85fd59c..02f8684 100644 +--- a/support/reexport/reexport.h ++++ b/support/reexport/reexport.h +@@ -1,6 +1,8 @@ + #ifndef REEXPORT_H + #define REEXPORT_H + ++#include ++ + #include "nfslib.h" + + enum { +-- +2.42.0 + diff --git a/meta/recipes-connectivity/nfs-utils/nfs-utils_2.6.3.bb b/meta/recipes-connectivity/nfs-utils/nfs-utils_2.6.4.bb similarity index 94% rename from meta/recipes-connectivity/nfs-utils/nfs-utils_2.6.3.bb rename to meta/recipes-connectivity/nfs-utils/nfs-utils_2.6.4.bb index 35cf6af6d4..2f2644f9a8 100644 --- a/meta/recipes-connectivity/nfs-utils/nfs-utils_2.6.3.bb +++ b/meta/recipes-connectivity/nfs-utils/nfs-utils_2.6.4.bb @@ -30,11 +30,11 @@ SRC_URI = "${KERNELORG_MIRROR}/linux/utils/nfs-utils/${PV}/nfs-utils-${PV}.tar.x file://bugfix-adjust-statd-service-name.patch \ file://0001-Makefile.am-fix-undefined-function-for-libnsm.a.patch \ file://clang-warnings.patch \ - file://0001-configure.ac-libevent-and-libsqlite3-checked-when-nf.patch \ - file://0001-locktest-Makefile.am-Do-not-use-build-flags.patch \ - file://0001-tools-locktest-Use-intmax_t-to-print-off_t.patch \ + file://0001-locktest-Makefile.am-Do-not-use-build-flags.patch \ + file://0001-tools-locktest-Use-intmax_t-to-print-off_t.patch \ + file://0001-reexport.h-Include-unistd.h-to-compile-with-musl.patch \ " -SRC_URI[sha256sum] = "38d89e853a71d3c560ff026af3d969d75e24f782ff68324e76261fe0344459e1" +SRC_URI[sha256sum] = "01b3b0fb9c7d0bbabf5114c736542030748c788ec2fd9734744201e9b0a1119d" # Only kernel-module-nfsd is required here (but can be built-in) - the nfsd module will # pull in the remainder of the dependencies. From patchwork Wed Jan 24 14:01:06 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 38277 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id B8B02C46CD2 for ; Wed, 24 Jan 2024 14:01:38 +0000 (UTC) Received: from mail-pg1-f174.google.com (mail-pg1-f174.google.com [209.85.215.174]) by mx.groups.io with SMTP id smtpd.web11.23131.1706104890342909051 for ; Wed, 24 Jan 2024 06:01:30 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=1ztWAPLi; spf=softfail (domain: sakoman.com, ip: 209.85.215.174, mailfrom: steve@sakoman.com) Received: by mail-pg1-f174.google.com with SMTP id 41be03b00d2f7-5ca1b4809b5so2560252a12.3 for ; Wed, 24 Jan 2024 06:01:30 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1706104889; x=1706709689; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=pOw6sH02rSnx9hDS5MZatQfaRQXVtle0zvLJp4El+zI=; b=1ztWAPLiA0+gh+QhCvvGOfCnuDBPrN7PoVf0BTPUI5b4Cz69ZUpq7h9K5JT5a7MyKB TCWL99g/bmy4K6CfwBZS4YAZsZk1FQM6ULrsUtD4SOCa36TfW6BF4EyeIerISMDbaEi2 nflcgo158h+cWScANF4nJ1ZLZzZRO4Y/qNrmUdtrcxoIUZs6SPItNxD67shaHfjWxKPM DggWICpwbPuzibpHTvprC3IEyuUVM+qJAKKcF4lX5couEtsSW7Qh+MDrRAK8YWdeht17 HIvmMXuHgwuyamYPVP8kmDvA6kkiHaBRybwNT4JWLcUkXX2ArAswFqUfr6KfXz68PWTv anZA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1706104889; x=1706709689; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=pOw6sH02rSnx9hDS5MZatQfaRQXVtle0zvLJp4El+zI=; b=bl5pqbribr8DjFr84vIAR/m/wEOdPnW0qMtKUoqRlARgP+dEq19wD3w3ago26pwXQv HakjIdT4eiRWJdmtZbywKIDNZ1lF8WEMxBF6v7bs/r/625Z3dnMnYkKLQJzxKUEBY9Vk Z1PN4dz5Zf75B1GbZt98Yo5Ml1pK6lk3FEZcXWKr/2stGJHt07Kmv6Z9qkyFq2n+0sDD dgq9eU6sumOrQwF2KIS3C6ig+sCWHq+q+5TN7sZ5f12VqYdYUN+BdGbgy727u/a4hrqr xBH6Qc32KyQaERd7lQtAYP0Rnaz4571ncdQTlf0rjQ2w/ICyntk0DOHUX/yXnpn859iy WybA== X-Gm-Message-State: AOJu0YxJnl6Smw5+oozh7YLvr3/awRp9xgZ8wDob9dLs12m8ih/BtJnH 9SXbQHGkqL70u9jXGSFggL573itknpVdP7ffYi6ZZb6TYAwfoEXJqx49Kzdfa2rpqYOmGxHwk12 yJqk= X-Google-Smtp-Source: AGHT+IEYt5+q/y8Jt4UUhbNJgKom+caVdBjE1nzkNo+fdSMkXcaAJJmohfOfY25zMoTs181VKkMu3Q== X-Received: by 2002:a05:6a20:6a22:b0:19c:6ddf:cd90 with SMTP id p34-20020a056a206a2200b0019c6ddfcd90mr363204pzk.86.1706104888868; Wed, 24 Jan 2024 06:01:28 -0800 (PST) Received: from hexa.router0800d9.com (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id 8-20020a631648000000b005ccf10e73b8sm11535739pgw.91.2024.01.24.06.01.27 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 24 Jan 2024 06:01:28 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][nanbield 03/12] xwayland: upgrade 23.2.2 -> 23.2.3 Date: Wed, 24 Jan 2024 04:01:06 -1000 Message-Id: <3882f403a756563a90c9e517211adebabfb0499d.1706104658.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 24 Jan 2024 14:01:38 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/194279 From: Wang Mingyu upgrade include fix for CVE-2023-6377 CVE-2023-6478 (Cherry-pick from OE-Core rev: bf0bb7b94ed4930145af5f1fb3836157daceb6bb) Signed-off-by: Wang Mingyu Signed-off-by: Alexandre Belloni Signed-off-by: Richard Purdie Signed-off-by: Lee Chee Yang Signed-off-by: Steve Sakoman --- .../xwayland/{xwayland_23.2.2.bb => xwayland_23.2.3.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta/recipes-graphics/xwayland/{xwayland_23.2.2.bb => xwayland_23.2.3.bb} (95%) diff --git a/meta/recipes-graphics/xwayland/xwayland_23.2.2.bb b/meta/recipes-graphics/xwayland/xwayland_23.2.3.bb similarity index 95% rename from meta/recipes-graphics/xwayland/xwayland_23.2.2.bb rename to meta/recipes-graphics/xwayland/xwayland_23.2.3.bb index 9feac147db..9aa7b4dfcd 100644 --- a/meta/recipes-graphics/xwayland/xwayland_23.2.2.bb +++ b/meta/recipes-graphics/xwayland/xwayland_23.2.3.bb @@ -10,7 +10,7 @@ LICENSE = "MIT" LIC_FILES_CHKSUM = "file://COPYING;md5=5df87950af51ac2c5822094553ea1880" SRC_URI = "https://www.x.org/archive/individual/xserver/xwayland-${PV}.tar.xz" -SRC_URI[sha256sum] = "9f7c0938d2a41e941ffa04f99c35e5db2bcd3eec034afe8d35d5c810a22eb0a8" +SRC_URI[sha256sum] = "eb9d9aa7232c47412c8835ec15a97c575f03563726c787754ff0c019bd07e302" UPSTREAM_CHECK_REGEX = "xwayland-(?P\d+(\.(?!90\d)\d+)+)\.tar" From patchwork Wed Jan 24 14:01:07 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 38275 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D4899C47422 for ; Wed, 24 Jan 2024 14:01:38 +0000 (UTC) Received: from mail-ot1-f52.google.com (mail-ot1-f52.google.com [209.85.210.52]) by mx.groups.io with SMTP id smtpd.web11.23133.1706104892667853939 for ; Wed, 24 Jan 2024 06:01:32 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=2FBSkoQ2; spf=softfail (domain: sakoman.com, ip: 209.85.210.52, mailfrom: steve@sakoman.com) Received: by mail-ot1-f52.google.com with SMTP id 46e09a7af769-6e0af93fdaaso4853192a34.3 for ; Wed, 24 Jan 2024 06:01:32 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1706104891; x=1706709691; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=JlXf7MFZws3PcqtCgVNNCQ+er2Wt2IIqbXrmHft/5JM=; b=2FBSkoQ2roJ5pn67Zhbfi2QgJbJ6+U2OXysaJcM5KA49UbfnaTqphI3tKwX5t+cekW 96g1a6l+Q40mGQy8Yu8P2lYDQDNtjHAc8Ar3EaQVXrMxq7xjKrTeGKdlQKbStai+xao6 e1jWuDfvmPH8Eiwu9nl6Ib1CDpcJN+NySn2zT75ED0F/jBOrOvMkSyNmohhXa9uesp3H /f1kNNqcvuO0Q4ClXGu/WXH5YW2edUgF7oV86dGwBwkVvUxGQneNqVCyoSrKcUc3QPHg Tn0Z8cx+nssWK6SzA201fZiaBsmMW+/GrtCeH3jqvc7WYgeIV/1GhOgxLCDydx0+B2xr JOOw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1706104891; x=1706709691; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=JlXf7MFZws3PcqtCgVNNCQ+er2Wt2IIqbXrmHft/5JM=; b=ndrrXZ9lRsdM/RO6k8RLVE0xe+fpVtQ+9Jt/zxPptbP+QxLQbbZayULOZ4UuTiCO5d nrBBT3c2BY2ZAiokpVWhonKN4aiOrMaEZ8Ntih0c7XES6cShNo5Y8ENjHMjowI8a+4/V nlxpif5VAlp+8Nvb0wgGkZqF2/+40uq728CI4Ne2lkDEu1ITKh9QSjIo1HA5XV+SJB3L EWRx1hwSa8qk04w2NiQwCbrxH7JRF9K0fNR/GoqaFKHb37yIA/h/gVnohbb7/gprpRgJ +FOG7sdUvlR3uu0N320ksmWtqTgxIPn7weCGMBv41XZ2KmLdmijo8bfdiPYJ+4KAz0e+ B2JQ== X-Gm-Message-State: AOJu0Ywo47mL9R/UhUksNtFWhNwjVzaDOogJecrNHCvQ5clAqap51qG/ CdT2nXyKiLYJVclGnljzFCRk2U1xtP2udgdvZ4DKiQcitimJzINJdz52C8IYaH41Bw+2NcJeAp9 QiMc= X-Google-Smtp-Source: AGHT+IEOP/W1NfT5Gmyi4uN22x7WmMm79hgEBnUg54N3tz1f9cMP/l0tzlptdBXNiLRHhaEPr4Dm7A== X-Received: by 2002:a05:6358:6384:b0:176:7c1e:c7ab with SMTP id k4-20020a056358638400b001767c1ec7abmr2559152rwh.50.1706104890739; Wed, 24 Jan 2024 06:01:30 -0800 (PST) Received: from hexa.router0800d9.com (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id 8-20020a631648000000b005ccf10e73b8sm11535739pgw.91.2024.01.24.06.01.29 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 24 Jan 2024 06:01:30 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][nanbield 04/12] base-passwd: upgrade 3.6.2 -> 3.6.3 Date: Wed, 24 Jan 2024 04:01:07 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 24 Jan 2024 14:01:38 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/194280 From: Anuj Mittal Signed-off-by: Anuj Mittal Signed-off-by: Richard Purdie (cherry picked from commit 74d165f5baacd0cd94eb90396b0a3119281df91d) Signed-off-by: Steve Sakoman --- .../base-passwd/{base-passwd_3.6.2.bb => base-passwd_3.6.3.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta/recipes-core/base-passwd/{base-passwd_3.6.2.bb => base-passwd_3.6.3.bb} (98%) diff --git a/meta/recipes-core/base-passwd/base-passwd_3.6.2.bb b/meta/recipes-core/base-passwd/base-passwd_3.6.3.bb similarity index 98% rename from meta/recipes-core/base-passwd/base-passwd_3.6.2.bb rename to meta/recipes-core/base-passwd/base-passwd_3.6.3.bb index bb4b49e6ab..9d7703b1c0 100644 --- a/meta/recipes-core/base-passwd/base-passwd_3.6.2.bb +++ b/meta/recipes-core/base-passwd/base-passwd_3.6.3.bb @@ -15,7 +15,7 @@ SRC_URI = "https://launchpad.net/debian/+archive/primary/+files/${BPN}_${PV}.tar file://0001-base-passwd-Add-the-sgx-group.patch \ " -SRC_URI[sha256sum] = "06dc78352bf38a8df76ff295e15ab5654cdefe41e62368b15bfcbbab8e4ec2a0" +SRC_URI[sha256sum] = "83575327d8318a419caf2d543341215c046044073d1afec2acc0ac4d8095ff39" # the package is taken from launchpad; that source is static and goes stale # so we check the latest upstream from a directory that does get updated From patchwork Wed Jan 24 14:01:08 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 38274 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id BEA3BC47E49 for ; Wed, 24 Jan 2024 14:01:38 +0000 (UTC) Received: from mail-pf1-f180.google.com (mail-pf1-f180.google.com [209.85.210.180]) by mx.groups.io with SMTP id smtpd.web10.23023.1706104895519994309 for ; Wed, 24 Jan 2024 06:01:35 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=p/zQ5VaP; spf=softfail (domain: sakoman.com, ip: 209.85.210.180, mailfrom: steve@sakoman.com) Received: by mail-pf1-f180.google.com with SMTP id d2e1a72fcca58-6ddb129350cso245424b3a.3 for ; Wed, 24 Jan 2024 06:01:35 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1706104894; x=1706709694; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=mSCjFHLLVJxroVznQUgO4AtMCcFBxm4X2OaLgiLgPOk=; b=p/zQ5VaPswZo1/QuuBcVzFCXLdsXO3IOkAqLrBcnE3G4zfKkrcTfd8s3/Zfin5GTnN UDN0BCdXYxnEOgq+lnXV1K+moZ0SJa4Iq5GKw2YIPpPHjdbIpHMmWT2WS+iy1LMm6a8h cQsqMzNM6e8OACazejMajzXPHx48oipYXbzjWvCEy+4Yv0psBWTFtXHRW371H0Q0Ydf8 I1JpfsMIwfhgePUgJBVuMTHSu+fpKcYjTwOU3h6P72p4d5gEz3LcRcAWNd3/l1RYJ3OM JmU5KCMHktWaIstvpasZka2EIjB7Psh/yG1UGNSJ8aVaPpqEWKvFuGxmBzski+3VTNEc BEaA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1706104894; x=1706709694; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=mSCjFHLLVJxroVznQUgO4AtMCcFBxm4X2OaLgiLgPOk=; b=OLcq16Z/GAMWNQZlCzdD8SGlykybtVSR0idkoP1NAIKS5qg3R8ERGpxuB4yDhhXtQW 2o8AqjVQ8uQScZvSUIwiSJ1b/PsCZj3mIyJx3xRucqk/LnT3nKjKZTIE2RJC3BkAV8iy SIKOgfaUMd6bFg8m4D1c5PG2mDGytFiybQAaJuXA61K/Geh9bKdmJ29rDgqbe+l1IRH+ Mfml2lLrMSRHwzBVYJQO020rE7A+xxxEbfu3sgCUl8WQRM9yEWTLSvUkuJnB/wcwUgTl rxDFeL0uJcWacIcJJ9W/gRSkVSGI7bWki2rIir6FEXBuO4FBh9O7yl3pTfH45xZqdm7D ujxA== X-Gm-Message-State: AOJu0Yx3O3X5qHOVayh8u9B7U5+nXpZJB71zg13aaFqqhcxMcqTevdc6 yOIbbZl6R3fl1KBRI8AP5ZbVhMmXUoFtUfwxEScLEi5i1Rvi5wVPvBEm+n3kMsX7T2KlKlJ8jZx X7pE= X-Google-Smtp-Source: AGHT+IFu08dXRCweEHuKDdrwjNPm19/tG9r4mE5wypM5UMIq/zvQ3Jy84ZyBBaBES4IospFv1XnwNQ== X-Received: by 2002:a05:6a20:8423:b0:19c:66fa:3f00 with SMTP id c35-20020a056a20842300b0019c66fa3f00mr768232pzd.13.1706104893577; Wed, 24 Jan 2024 06:01:33 -0800 (PST) Received: from hexa.router0800d9.com (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id 8-20020a631648000000b005ccf10e73b8sm11535739pgw.91.2024.01.24.06.01.31 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 24 Jan 2024 06:01:33 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][nanbield 05/12] glib-2.0: upgrade 2.78.1 -> 2.78.3 Date: Wed, 24 Jan 2024 04:01:08 -1000 Message-Id: <71696c0b89751c1a975025086da0c6f52de00cd8.1706104658.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 24 Jan 2024 14:01:38 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/194281 From: Anuj Mittal Signed-off-by: Anuj Mittal Signed-off-by: Richard Purdie (cherry picked from commit 419503d3d3402b683979696f248cd42f05c282b7) Signed-off-by: Steve Sakoman --- ...ot-write-bindir-into-pkg-config-files.patch | 4 ++-- .../0001-Fix-DATADIRNAME-on-uclibc-Linux.patch | 3 +-- ...l-gio-querymodules-as-libexec_PROGRAM.patch | 6 +++--- ...ing-about-deprecated-paths-in-schemas.patch | 4 ++-- ...e-correctly-when-building-with-mingw3.patch | 18 +++++++++--------- ...rces.c-comment-out-a-build-host-only-.patch | 6 +++--- ...son-Run-atomics-test-on-clang-as-well.patch | 6 +++--- ...not-enable-pidfd-features-on-native-g.patch | 8 +++----- ...rdcode-python-path-into-various-tools.patch | 6 +++--- .../glib-2.0/glib-2.0/relocate-modules.patch | 2 +- .../{glib-2.0_2.78.1.bb => glib-2.0_2.78.3.bb} | 2 +- 11 files changed, 31 insertions(+), 34 deletions(-) rename meta/recipes-core/glib-2.0/{glib-2.0_2.78.1.bb => glib-2.0_2.78.3.bb} (96%) diff --git a/meta/recipes-core/glib-2.0/glib-2.0/0001-Do-not-write-bindir-into-pkg-config-files.patch b/meta/recipes-core/glib-2.0/glib-2.0/0001-Do-not-write-bindir-into-pkg-config-files.patch index 0d44ddf299..0e5f371cb5 100644 --- a/meta/recipes-core/glib-2.0/glib-2.0/0001-Do-not-write-bindir-into-pkg-config-files.patch +++ b/meta/recipes-core/glib-2.0/glib-2.0/0001-Do-not-write-bindir-into-pkg-config-files.patch @@ -1,4 +1,4 @@ -From 9ec4eedeb3f67db0bff09f5d859318d05ff47964 Mon Sep 17 00:00:00 2001 +From cf7df91cc8c3b4811235ef8aec144c5f0cf90bdb Mon Sep 17 00:00:00 2001 From: Alexander Kanavin Date: Fri, 15 Feb 2019 11:17:27 +0100 Subject: [PATCH] Do not write $bindir into pkg-config files @@ -16,7 +16,7 @@ Signed-off-by: Alexander Kanavin 2 files changed, 11 insertions(+), 11 deletions(-) diff --git a/gio/meson.build b/gio/meson.build -index a320c0f..86ce7c4 100644 +index 5f91586..1a95f4f 100644 --- a/gio/meson.build +++ b/gio/meson.build @@ -884,14 +884,14 @@ pkg.generate(libgio, diff --git a/meta/recipes-core/glib-2.0/glib-2.0/0001-Fix-DATADIRNAME-on-uclibc-Linux.patch b/meta/recipes-core/glib-2.0/glib-2.0/0001-Fix-DATADIRNAME-on-uclibc-Linux.patch index 16f2d31496..1254466063 100644 --- a/meta/recipes-core/glib-2.0/glib-2.0/0001-Fix-DATADIRNAME-on-uclibc-Linux.patch +++ b/meta/recipes-core/glib-2.0/glib-2.0/0001-Fix-DATADIRNAME-on-uclibc-Linux.patch @@ -1,4 +1,4 @@ -From c94e669de98a3892c699bd8d0d2b5164b2de747e Mon Sep 17 00:00:00 2001 +From b907a6681c4c24e5d3745538d9fcd471cf1c4c4a Mon Sep 17 00:00:00 2001 From: Khem Raj Date: Sat, 15 Mar 2014 22:42:29 -0700 Subject: [PATCH] Fix DATADIRNAME on uclibc/Linux @@ -9,7 +9,6 @@ based systems therefore lets set DATADIRNAME to "share". Signed-off-by: Khem Raj Upstream-Status: Pending - --- m4macros/glib-gettext.m4 | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/meta/recipes-core/glib-2.0/glib-2.0/0001-Install-gio-querymodules-as-libexec_PROGRAM.patch b/meta/recipes-core/glib-2.0/glib-2.0/0001-Install-gio-querymodules-as-libexec_PROGRAM.patch index 597864d9ac..50d369c24e 100644 --- a/meta/recipes-core/glib-2.0/glib-2.0/0001-Install-gio-querymodules-as-libexec_PROGRAM.patch +++ b/meta/recipes-core/glib-2.0/glib-2.0/0001-Install-gio-querymodules-as-libexec_PROGRAM.patch @@ -1,4 +1,4 @@ -From 0015db45cd1bfefc04959dffab5dabeead93136f Mon Sep 17 00:00:00 2001 +From 6e2ddcb5465d10618345b12e0b4471ead0f14304 Mon Sep 17 00:00:00 2001 From: Jussi Kukkonen Date: Tue, 22 Mar 2016 15:14:58 +0200 Subject: [PATCH] Install gio-querymodules as libexec_PROGRAM @@ -14,10 +14,10 @@ Upstream-Status: Inappropriate [OE specific] 1 file changed, 1 insertion(+) diff --git a/gio/meson.build b/gio/meson.build -index 2ef60ed..532b086 100644 +index f9fdf6e..5f91586 100644 --- a/gio/meson.build +++ b/gio/meson.build -@@ -936,6 +936,7 @@ gio_querymodules = executable('gio-querymodules', 'gio-querymodules.c', 'giomodu +@@ -1005,6 +1005,7 @@ gio_querymodules = executable('gio-querymodules', 'gio-querymodules.c', 'giomodu c_args : gio_c_args, # intl.lib is not compatible with SAFESEH link_args : noseh_link_args, diff --git a/meta/recipes-core/glib-2.0/glib-2.0/0001-Remove-the-warning-about-deprecated-paths-in-schemas.patch b/meta/recipes-core/glib-2.0/glib-2.0/0001-Remove-the-warning-about-deprecated-paths-in-schemas.patch index 6fd93526ce..f810574d97 100644 --- a/meta/recipes-core/glib-2.0/glib-2.0/0001-Remove-the-warning-about-deprecated-paths-in-schemas.patch +++ b/meta/recipes-core/glib-2.0/glib-2.0/0001-Remove-the-warning-about-deprecated-paths-in-schemas.patch @@ -1,4 +1,4 @@ -From 4f47b8a8d650d185aa61aec2f56a283522a723c4 Mon Sep 17 00:00:00 2001 +From c8c223045821cac97f798cfa63f19853621a8a2a Mon Sep 17 00:00:00 2001 From: Alexander Kanavin Date: Fri, 12 Jun 2015 17:08:46 +0300 Subject: [PATCH] Remove the warning about deprecated paths in schemas @@ -15,7 +15,7 @@ Signed-off-by: Alexander Kanavin 1 file changed, 13 deletions(-) diff --git a/gio/glib-compile-schemas.c b/gio/glib-compile-schemas.c -index 7888120..7acbd5b 100644 +index 04ef404..e791ce2 100644 --- a/gio/glib-compile-schemas.c +++ b/gio/glib-compile-schemas.c @@ -1232,19 +1232,6 @@ parse_state_start_schema (ParseState *state, diff --git a/meta/recipes-core/glib-2.0/glib-2.0/0001-Set-host_machine-correctly-when-building-with-mingw3.patch b/meta/recipes-core/glib-2.0/glib-2.0/0001-Set-host_machine-correctly-when-building-with-mingw3.patch index 2e1e2313e8..e1d2fb0e54 100644 --- a/meta/recipes-core/glib-2.0/glib-2.0/0001-Set-host_machine-correctly-when-building-with-mingw3.patch +++ b/meta/recipes-core/glib-2.0/glib-2.0/0001-Set-host_machine-correctly-when-building-with-mingw3.patch @@ -1,4 +1,4 @@ -From ba1728bc27c88597164957d000b70ec4be6edf28 Mon Sep 17 00:00:00 2001 +From bafde4eedc0a22b45e73ee6183b9a11393a1e400 Mon Sep 17 00:00:00 2001 From: Alexander Kanavin Date: Wed, 13 Feb 2019 15:32:05 +0100 Subject: [PATCH] Set host_machine correctly when building with mingw32 @@ -13,7 +13,7 @@ Signed-off-by: Alexander Kanavin 3 files changed, 8 insertions(+), 5 deletions(-) diff --git a/gio/tests/meson.build b/gio/tests/meson.build -index f644aa2..64a8684 100644 +index 4ef3343..e498e7e 100644 --- a/gio/tests/meson.build +++ b/gio/tests/meson.build @@ -29,7 +29,7 @@ endif @@ -25,7 +25,7 @@ index f644aa2..64a8684 100644 common_gio_tests_deps += [iphlpapi_dep, winsock2, cc.find_library ('secur32')] endif -@@ -210,7 +210,7 @@ if have_dbus_daemon +@@ -230,7 +230,7 @@ if have_dbus_daemon endif # Test programs buildable on UNIX only @@ -34,7 +34,7 @@ index f644aa2..64a8684 100644 gio_tests += { 'file' : {}, 'gdbus-peer-object-manager' : {}, -@@ -462,7 +462,7 @@ if host_machine.system() != 'windows' +@@ -562,7 +562,7 @@ if host_machine.system() != 'windows' endif # unix # Test programs buildable on Windows only @@ -43,7 +43,7 @@ index f644aa2..64a8684 100644 gio_tests += {'win32-streams' : {}} endif -@@ -532,7 +532,7 @@ if cc.get_id() != 'msvc' and cc.get_id() != 'clang-cl' +@@ -632,7 +632,7 @@ if cc.get_id() != 'msvc' and cc.get_id() != 'clang-cl' } endif @@ -53,10 +53,10 @@ index f644aa2..64a8684 100644 'gdbus-example-unix-fd-client' : { 'install' : false, diff --git a/glib/tests/meson.build b/glib/tests/meson.build -index db01b54..6950817 100644 +index d80c86e..5329cda 100644 --- a/glib/tests/meson.build +++ b/glib/tests/meson.build -@@ -188,7 +188,7 @@ if glib_conf.has('HAVE_EVENTFD') +@@ -216,7 +216,7 @@ if glib_conf.has('HAVE_EVENTFD') } endif @@ -66,10 +66,10 @@ index db01b54..6950817 100644 glib_tests += { 'gpoll' : { diff --git a/meson.build b/meson.build -index 43bb468..5f9b59c 100644 +index f7e936e..122f8b5 100644 --- a/meson.build +++ b/meson.build -@@ -43,6 +43,9 @@ else +@@ -54,6 +54,9 @@ else endif host_system = host_machine.system() diff --git a/meta/recipes-core/glib-2.0/glib-2.0/0001-gio-tests-resources.c-comment-out-a-build-host-only-.patch b/meta/recipes-core/glib-2.0/glib-2.0/0001-gio-tests-resources.c-comment-out-a-build-host-only-.patch index d33fdd4d8b..e4c2f77459 100644 --- a/meta/recipes-core/glib-2.0/glib-2.0/0001-gio-tests-resources.c-comment-out-a-build-host-only-.patch +++ b/meta/recipes-core/glib-2.0/glib-2.0/0001-gio-tests-resources.c-comment-out-a-build-host-only-.patch @@ -1,4 +1,4 @@ -From 92de6c7eb30b961b24a2dce812d5276487b7d23d Mon Sep 17 00:00:00 2001 +From 3f05b9418c88bbb83c08b57cc5529b006f26fff4 Mon Sep 17 00:00:00 2001 From: Alexander Kanavin Date: Wed, 8 Jan 2020 18:22:46 +0100 Subject: [PATCH] gio/tests/resources.c: comment out a build host-only test @@ -14,10 +14,10 @@ Signed-off-by: Alexander Kanavin 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/gio/tests/resources.c b/gio/tests/resources.c -index c44d214..e289a01 100644 +index f567914..b21b616 100644 --- a/gio/tests/resources.c +++ b/gio/tests/resources.c -@@ -993,7 +993,7 @@ main (int argc, +@@ -1068,7 +1068,7 @@ main (int argc, g_test_add_func ("/resource/automatic", test_resource_automatic); /* This only uses automatic resources too, so it tests the constructors and destructors */ g_test_add_func ("/resource/module", test_resource_module); diff --git a/meta/recipes-core/glib-2.0/glib-2.0/0001-meson-Run-atomics-test-on-clang-as-well.patch b/meta/recipes-core/glib-2.0/glib-2.0/0001-meson-Run-atomics-test-on-clang-as-well.patch index 44482dd2b7..071e4a7c4d 100644 --- a/meta/recipes-core/glib-2.0/glib-2.0/0001-meson-Run-atomics-test-on-clang-as-well.patch +++ b/meta/recipes-core/glib-2.0/glib-2.0/0001-meson-Run-atomics-test-on-clang-as-well.patch @@ -1,4 +1,4 @@ -From 4b97f457b7b44117e27d2a218c4b68e7fe3fe4ce Mon Sep 17 00:00:00 2001 +From 17d718640ae6f953e5eea714c1bd64eeb6e4799f Mon Sep 17 00:00:00 2001 From: Khem Raj Date: Sat, 12 Oct 2019 17:46:26 -0700 Subject: [PATCH] meson: Run atomics test on clang as well @@ -15,10 +15,10 @@ Signed-off-by: Khem Raj 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/meson.build b/meson.build -index afb6eaa..6aa70f5 100644 +index 122f8b5..f055079 100644 --- a/meson.build +++ b/meson.build -@@ -1692,7 +1692,7 @@ atomicdefine = ''' +@@ -1938,7 +1938,7 @@ atomicdefine = ''' # We know that we can always use real ("lock free") atomic operations with MSVC if cc.get_id() == 'msvc' or cc.get_id() == 'clang-cl' or cc.links(atomictest, name : 'atomic ops') have_atomic_lock_free = true diff --git a/meta/recipes-core/glib-2.0/glib-2.0/0001-meson.build-do-not-enable-pidfd-features-on-native-g.patch b/meta/recipes-core/glib-2.0/glib-2.0/0001-meson.build-do-not-enable-pidfd-features-on-native-g.patch index 788f420d11..e03f9a3c84 100644 --- a/meta/recipes-core/glib-2.0/glib-2.0/0001-meson.build-do-not-enable-pidfd-features-on-native-g.patch +++ b/meta/recipes-core/glib-2.0/glib-2.0/0001-meson.build-do-not-enable-pidfd-features-on-native-g.patch @@ -1,4 +1,4 @@ -From 9aa9574861fad39d0679025e35fe1e188345f685 Mon Sep 17 00:00:00 2001 +From 7865d698b5d392aac3a3d32e9ebd5fea45017d15 Mon Sep 17 00:00:00 2001 From: Alexander Kanavin Date: Sat, 16 Sep 2023 22:28:27 +0200 Subject: [PATCH] meson.build: do not enable pidfd features on native glib @@ -9,12 +9,13 @@ where these features are not implemented. Upstream-Status: Inappropriate [oe-core specific] Signed-off-by: Alexander Kanavin + --- meson.build | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/meson.build b/meson.build -index 1c36993..bbf97fc 100644 +index f055079..77d78aa 100644 --- a/meson.build +++ b/meson.build @@ -981,7 +981,8 @@ if cc.links('''#include @@ -27,6 +28,3 @@ index 1c36993..bbf97fc 100644 endif # Check for __uint128_t (gcc) by checking for 128-bit division --- -2.30.2 - diff --git a/meta/recipes-core/glib-2.0/glib-2.0/0010-Do-not-hardcode-python-path-into-various-tools.patch b/meta/recipes-core/glib-2.0/glib-2.0/0010-Do-not-hardcode-python-path-into-various-tools.patch index 1c645f3a9a..4b75167da6 100644 --- a/meta/recipes-core/glib-2.0/glib-2.0/0010-Do-not-hardcode-python-path-into-various-tools.patch +++ b/meta/recipes-core/glib-2.0/glib-2.0/0010-Do-not-hardcode-python-path-into-various-tools.patch @@ -1,4 +1,4 @@ -From 79ce7e545dd3a93f77d2146d50b6fa061fbceed9 Mon Sep 17 00:00:00 2001 +From 53bcd4b6cd3fe3fe4246914462e6724761eecf51 Mon Sep 17 00:00:00 2001 From: Alexander Kanavin Date: Tue, 3 Oct 2017 10:45:55 +0300 Subject: [PATCH] Do not hardcode python path into various tools @@ -23,7 +23,7 @@ index 67d3675..4e92a7a 100755 # GDBus - GLib D-Bus Library # diff --git a/gobject/glib-genmarshal.in b/gobject/glib-genmarshal.in -index 7380f24..c8abeaa 100755 +index aa5af43..56e8e2e 100755 --- a/gobject/glib-genmarshal.in +++ b/gobject/glib-genmarshal.in @@ -1,4 +1,4 @@ @@ -33,7 +33,7 @@ index 7380f24..c8abeaa 100755 # pylint: disable=too-many-lines, missing-docstring, invalid-name diff --git a/gobject/glib-mkenums.in b/gobject/glib-mkenums.in -index 91ad779..3ebef62 100755 +index 353e53a..8ed6c39 100755 --- a/gobject/glib-mkenums.in +++ b/gobject/glib-mkenums.in @@ -1,4 +1,4 @@ diff --git a/meta/recipes-core/glib-2.0/glib-2.0/relocate-modules.patch b/meta/recipes-core/glib-2.0/glib-2.0/relocate-modules.patch index 841fedef8a..95a73298d8 100644 --- a/meta/recipes-core/glib-2.0/glib-2.0/relocate-modules.patch +++ b/meta/recipes-core/glib-2.0/glib-2.0/relocate-modules.patch @@ -1,4 +1,4 @@ -From b90d13900dd2777c2ab90c5b0be1a872c10a17da Mon Sep 17 00:00:00 2001 +From 03a069cb8066d3e8ef72a43f7b1db5c9625e9cc2 Mon Sep 17 00:00:00 2001 From: Ross Burton Date: Fri, 11 Mar 2016 15:35:55 +0000 Subject: [PATCH] glib-2.0: relocate the GIO module directory for native builds diff --git a/meta/recipes-core/glib-2.0/glib-2.0_2.78.1.bb b/meta/recipes-core/glib-2.0/glib-2.0_2.78.3.bb similarity index 96% rename from meta/recipes-core/glib-2.0/glib-2.0_2.78.1.bb rename to meta/recipes-core/glib-2.0/glib-2.0_2.78.3.bb index a490262112..13d4b38e22 100644 --- a/meta/recipes-core/glib-2.0/glib-2.0_2.78.1.bb +++ b/meta/recipes-core/glib-2.0/glib-2.0_2.78.3.bb @@ -19,7 +19,7 @@ SRC_URI:append:class-native = " file://relocate-modules.patch \ file://0001-meson.build-do-not-enable-pidfd-features-on-native-g.patch \ " -SRC_URI[sha256sum] = "915bc3d0f8507d650ead3832e2f8fb670fce59aac4d7754a7dab6f1e6fed78b2" +SRC_URI[sha256sum] = "609801dd373796e515972bf95fc0b2daa44545481ee2f465c4f204d224b2bc21" # Find any meson cross files in FILESPATH that are relevant for the current # build (using siteinfo) and add them to EXTRA_OEMESON. From patchwork Wed Jan 24 14:01:09 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 38276 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id C9DD4C48260 for ; Wed, 24 Jan 2024 14:01:38 +0000 (UTC) Received: from mail-pl1-f178.google.com (mail-pl1-f178.google.com [209.85.214.178]) by mx.groups.io with SMTP id smtpd.web11.23138.1706104897779067782 for ; Wed, 24 Jan 2024 06:01:37 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=EtSAAHqi; spf=softfail (domain: sakoman.com, ip: 209.85.214.178, mailfrom: steve@sakoman.com) Received: by mail-pl1-f178.google.com with SMTP id d9443c01a7336-1d70b0e521eso39998345ad.1 for ; Wed, 24 Jan 2024 06:01:37 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1706104896; x=1706709696; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=yGTauSoo165RBrn84U2tRbvzoY3jD2LV6a503tl+1nw=; b=EtSAAHqis6A1n7vbX2i8VUQ8EETMyng6rtyYIVVO0qvyD3BhtOHSC4bvw+qES+rOuE 2+2vyv1tKfOU0Pzogwk1cWT94e1cRrv/WAxxzwHkeFkLyaKr1KGA/WpLONmXX6PZ8HYI ycHkI4wGC/snlzlqJEPNdTrasiYMz2X9uWv2oO1Av5TqZPmaUmNajxFc6Xec6SAN6tCi HqgfHKskTm0B7KGMcvN6sQ2g8Y2PWdsfqk2Cc311mAKDSIiLh8pC/hIwLV4YcMlX69Oq sq9bTP/Sww1FnN2e6+m/hGCCv7MPJKJOvTrFeDc+N9ZXLWRNffjbg939V7WKTAJmMecD Aa+A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1706104896; x=1706709696; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=yGTauSoo165RBrn84U2tRbvzoY3jD2LV6a503tl+1nw=; b=hVjcBQyuALN0HSSOxoNByY/P8a6944s0T42biya9goeMHoOWfKzWV+U9KGFwFhcHog J8H6EMpHRYS+YBZVFD3dr7nJg5WYtmvpU/sFX0ukxieEAVMDd5PkrEGgGclsdV38t7v3 BNh9PaJPIAljzEVu3OHL2D9MIomodfcB34pUHwzSw9SxZXWdiJvCObt4rn9IH8N0B8RN gPGioNNp3ojvlPePzd3YGklJBKEGmQ65Cjrbb7YQIkQyanPxC5TxsYfSp/pAZUrHn8Jl OV8fzFGG7jCMqT6mgp7zwSIoYgLeUo8Nf7ouEcH1ELA3Lm2cekmS1yC8qevoQSdi5jJi ywLQ== X-Gm-Message-State: AOJu0YwJrjBcgGKL19UWsavB+NzdVsyvpqiVp7y9KsFus/MYs3Z/MA76 qtvxaOKdk3bHYHE3kiGSyfBgxB41vNojHBSWsL1rDSSfHaB8ZIE/ntefw+stu/QE+wilG1LpbaF OG9U= X-Google-Smtp-Source: AGHT+IFIT7eEl0/iS8wtYcHF+n7QiISkB6zmZ5K3QSXykVatBArxBa9I04+4tEqKd+PV2840bZ8UNw== X-Received: by 2002:a17:902:f682:b0:1d7:48e1:e219 with SMTP id l2-20020a170902f68200b001d748e1e219mr865619plg.90.1706104896125; Wed, 24 Jan 2024 06:01:36 -0800 (PST) Received: from hexa.router0800d9.com (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id 8-20020a631648000000b005ccf10e73b8sm11535739pgw.91.2024.01.24.06.01.34 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 24 Jan 2024 06:01:35 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][nanbield 06/12] qemu: 8.1.2 -> 8.1.4 Date: Wed, 24 Jan 2024 04:01:09 -1000 Message-Id: <2a2f2b5be2070544f0ab98144e4c31c749b7d504.1706104658.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 24 Jan 2024 14:01:38 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/194282 From: Lee Chee Yang update include fix for CVE-2023-3019. CVE-2023-3019 : https://github.com/qemu/qemu/commit/88e79a2dfda319f9ebec2cc8a5c3c9733716d13f Signed-off-by: Lee Chee Yang Signed-off-by: Steve Sakoman --- .../qemu/{qemu-native_8.1.2.bb => qemu-native_8.1.4.bb} | 0 ...{qemu-system-native_8.1.2.bb => qemu-system-native_8.1.4.bb} | 0 meta/recipes-devtools/qemu/qemu.inc | 2 +- meta/recipes-devtools/qemu/{qemu_8.1.2.bb => qemu_8.1.4.bb} | 0 4 files changed, 1 insertion(+), 1 deletion(-) rename meta/recipes-devtools/qemu/{qemu-native_8.1.2.bb => qemu-native_8.1.4.bb} (100%) rename meta/recipes-devtools/qemu/{qemu-system-native_8.1.2.bb => qemu-system-native_8.1.4.bb} (100%) rename meta/recipes-devtools/qemu/{qemu_8.1.2.bb => qemu_8.1.4.bb} (100%) diff --git a/meta/recipes-devtools/qemu/qemu-native_8.1.2.bb b/meta/recipes-devtools/qemu/qemu-native_8.1.4.bb similarity index 100% rename from meta/recipes-devtools/qemu/qemu-native_8.1.2.bb rename to meta/recipes-devtools/qemu/qemu-native_8.1.4.bb diff --git a/meta/recipes-devtools/qemu/qemu-system-native_8.1.2.bb b/meta/recipes-devtools/qemu/qemu-system-native_8.1.4.bb similarity index 100% rename from meta/recipes-devtools/qemu/qemu-system-native_8.1.2.bb rename to meta/recipes-devtools/qemu/qemu-system-native_8.1.4.bb diff --git a/meta/recipes-devtools/qemu/qemu.inc b/meta/recipes-devtools/qemu/qemu.inc index 5ab2cb83b4..0ea23ecdc3 100644 --- a/meta/recipes-devtools/qemu/qemu.inc +++ b/meta/recipes-devtools/qemu/qemu.inc @@ -37,7 +37,7 @@ SRC_URI = "https://download.qemu.org/${BPN}-${PV}.tar.xz \ UPSTREAM_CHECK_REGEX = "qemu-(?P\d+(\.\d+)+)\.tar" -SRC_URI[sha256sum] = "541526a764576eb494d2ff5ec46aeb253e62ea29035d1c23c0a8af4e6cd4f087" +SRC_URI[sha256sum] = "176dd6d0bdcc4c71a94172d12ddb7a3b2e8e20d638e5db26138165a382be2dbd" SRC_URI:append:class-target = " file://cross.patch" SRC_URI:append:class-nativesdk = " file://cross.patch" diff --git a/meta/recipes-devtools/qemu/qemu_8.1.2.bb b/meta/recipes-devtools/qemu/qemu_8.1.4.bb similarity index 100% rename from meta/recipes-devtools/qemu/qemu_8.1.2.bb rename to meta/recipes-devtools/qemu/qemu_8.1.4.bb From patchwork Wed Jan 24 14:01:10 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 38279 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id CED0BC47422 for ; Wed, 24 Jan 2024 14:01:48 +0000 (UTC) Received: from mail-pf1-f177.google.com (mail-pf1-f177.google.com [209.85.210.177]) by mx.groups.io with SMTP id smtpd.web10.23025.1706104899856326331 for ; Wed, 24 Jan 2024 06:01:39 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=VILVIiuk; spf=softfail (domain: sakoman.com, ip: 209.85.210.177, mailfrom: steve@sakoman.com) Received: by mail-pf1-f177.google.com with SMTP id d2e1a72fcca58-6db9e52bbccso3442358b3a.3 for ; Wed, 24 Jan 2024 06:01:39 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1706104898; x=1706709698; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=lcf+BE0eO1mfPDau8gkLiylMTxQTTcsXj97aD0TioaE=; b=VILVIiukKHS1wZZRmv+z/dmj2O6zGTyV6AcnmPfiNUoPoKyDpkKp7HRmewU0/gk1sq RI2v86HLQuW0LZsFANy8ZTn2sZGUh7QVANvnbOS6fsFttPR7/Njuq2pfQ51pQpccSHgc Ev5+iJKg+fACKzZ7z8DCXjLi4LykZBbi+FL7MZ9zeTETVTvm76N8G398B7V3ghAZdo7L mOjMwPmbqjjt/93XaA9WfFKJRjUBfdcrUrp9OtGFgqFQgSY2B1FnqJ2na7xo8WdmZTcK 9W53Uv0FWJmYEl0sPPj7xWTsV1/Bk90zliNPw2U+fdeKdwKq0WzfSFWx1+WAocptPPeU UiVA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1706104898; x=1706709698; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=lcf+BE0eO1mfPDau8gkLiylMTxQTTcsXj97aD0TioaE=; b=LVoekKA/hsBPx4HirE1nTkOeyZkk2ckp/rFUyh4DlOvQi9im7DCQGj4xr/ifAVjFQl 4EkNGc1GWvkciHlR4iZ15ahFLamgq9cA/eGKqgCyVlSUAjSUqwH1Z6qo2Ngc6siM2CDf yz2z2vih1RseBaIjADu/Eq9Tz0Ztlrt4wVpXZ/o7tPw6qDsKl32uZIIQC6IsuLfiwfde LHTC1+1v5C/R8uRjnG7lln0Gl9xbSvZ2xjKpTyx+hQ4Ga9d+S8nJj3hANOiBBLFisnsU 1ysT/xXrIujfgKSegMUd/PVc5oXTeJ3YofPnmzfq4JSuDgC5R2bHzu11HPrbbNXi8ncI cRKg== X-Gm-Message-State: AOJu0YzR7glDnsoRUiL5IvsbBOpjeu+kJtZqnl+GpZLtyVS0TqyL4LjL NLUkRIbkm7NusQ5MCMFvkwiX+hWk2ANwkNn0LpG3X6J4mnj0XCngCNSB5vRrNcLrho15KMnYJG2 BJik= X-Google-Smtp-Source: AGHT+IF6s6Snz73NM3EN+PJucCCtGMVelegrNEloUZYBtf4EfPsldDDij40HqRQGbqw13sxOX4PUNA== X-Received: by 2002:a05:6a00:1a90:b0:6db:cff7:bc4b with SMTP id e16-20020a056a001a9000b006dbcff7bc4bmr5091562pfv.48.1706104898220; Wed, 24 Jan 2024 06:01:38 -0800 (PST) Received: from hexa.router0800d9.com (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id 8-20020a631648000000b005ccf10e73b8sm11535739pgw.91.2024.01.24.06.01.37 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 24 Jan 2024 06:01:37 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][nanbield 07/12] sudo: upgrade 1.9.14p3 -> 1.9.15p2 Date: Wed, 24 Jan 2024 04:01:10 -1000 Message-Id: <105ecb87e78b9133e4188a8b5c604ea0e9a47910.1706104658.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 24 Jan 2024 14:01:48 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/194283 From: Xiangyu Chen Changelog: =========== 1.9.15p2: - Fixed a bug on BSD systems where sudo would not restore the terminal settings on exit if the terminal had parity enabled. 1.9.15p1: - Fixed a bug introduced in sudo 1.9.15 that prevented LDAP-based sudoers from being able to read the ldap.conf file. 1.9.15: - Fixed an undefined symbol problem on older versions of macOS when "intercept" or "log_subcmds" are enabled in sudoers. - Fixed "make check" failure related to getpwent(3) wrapping on NetBSD. - Fixed the warning message for "sudo -l command" when the command is not permitted. There was a missing space between "list" and the actual command due to changes in sudo 1.9.14. - Fixed a bug where output could go to the wrong terminal if "use_pty" is enabled (the default) and the standard input, output or error is redirected to a different terminal. Bug #1056. - The visudo utility will no longer create an empty file when the specified sudoers file does not exist and the user exits the editor without making any changes. GitHub issue #294. - The AIX and Solaris sudo packages on www.sudo.ws now support "log_subcmds" and "intercept" with both 32-bit and 64-bit binaries. Previously, they only worked when running binaries with the same word size as the sudo binary. GitHub issue #289. - The sudoers source is now logged in the JSON event log. This makes it possible to tell which rule resulted in a match. Running "sudo -ll command" now produces verbose output that includes matching rule as well as the path to the sudoers file the matching rule came from. For LDAP sudoers, the name of the matching sudoRole is printed instead. - The embedded copy of zlib has been updated to version 1.3. - The sudoers plugin has been modified to make it more resilient to ROWHAMMER attacks on authentication and policy matching. This addresses CVE-2023-42465. - The sudoers plugin now constructs the user time stamp file path name using the user-ID instead of the user name. This avoids a potential problem with user names that contain a path separator ('/') being interpreted as part of the path name. A similar issue in sudo-rs has been assigned CVE-2023-42456. - A path separator ('/') in a user, group or host name is now replaced with an underbar character ('_') when expanding escapes in @include and @includedir directives as well as the "iolog_file" and "iolog_dir" sudoers Default settings. - The "intercept_verify" sudoers option is now only applied when the "intercept" option is set in sudoers. Previously, it was also applied when "log_subcmds" was enabled. Sudo 1.9.14 contained an incorrect fix for this. Bug #1058. - Changes to terminal settings are now performed atomically, where possible. If the command is being run in a pseudo-terminal and the user's terminal is already in raw mode, sudo will not change the user's terminal settings. This prevents concurrent sudo processes from restoring the terminal settings to the wrong values. GitHub issue #312. - Reverted a change from sudo 1.9.4 that resulted in PAM session modules being called with the environment of the command to be run instead of the environment of the invoking user. GitHub issue #318. - New Indonesian translation from translationproject.org. - The sudo_logsrvd server will now raise its open file descriptor limit to the maximum allowed value when it starts up. Each connection can require up to nine open file descriptors so the default soft limit may be too low. - Better log message when rejecting a command if the "intercept" option is enabled and the "intercept_allow_setid" option is disabled. Previously, "command not allowed" would be logged and the user had no way of knowing what the actual problem was. - Sudo will now log the invoking user's environment as "submitenv" in the JSON logs. The command's environment ("runenv") is no longer logged for commands rejected by the sudoers file or an approval plugin. (cherry picked from OE-Core rev 5ea298680a8f17d3b808a2c43b0182e9c391f663) Signed-off-by: Xiangyu Chen Signed-off-by: Alexandre Belloni Signed-off-by: Lee Chee Yang Signed-off-by: Steve Sakoman --- .../sudo/{sudo_1.9.14p3.bb => sudo_1.9.15p2.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta/recipes-extended/sudo/{sudo_1.9.14p3.bb => sudo_1.9.15p2.bb} (96%) diff --git a/meta/recipes-extended/sudo/sudo_1.9.14p3.bb b/meta/recipes-extended/sudo/sudo_1.9.15p2.bb similarity index 96% rename from meta/recipes-extended/sudo/sudo_1.9.14p3.bb rename to meta/recipes-extended/sudo/sudo_1.9.15p2.bb index d5c5718ea5..431dfba3c2 100644 --- a/meta/recipes-extended/sudo/sudo_1.9.14p3.bb +++ b/meta/recipes-extended/sudo/sudo_1.9.15p2.bb @@ -7,7 +7,7 @@ SRC_URI = "https://www.sudo.ws/dist/sudo-${PV}.tar.gz \ PAM_SRC_URI = "file://sudo.pam" -SRC_URI[sha256sum] = "a08318b1c4bc8582c004d4cd9ae2903abc549e7e46ba815e41fe81d1c0782b62" +SRC_URI[sha256sum] = "199c0cdbfa7efcfffa9c88684a8e2fb206a62b70a316507e4a91c89c873bbcc8" DEPENDS += " virtual/crypt ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'libpam', '', d)}" RDEPENDS:${PN} += " ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'pam-plugin-limits pam-plugin-keyinit', '', d)}" From patchwork Wed Jan 24 14:01:11 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 38280 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id E4C13C47E49 for ; Wed, 24 Jan 2024 14:01:48 +0000 (UTC) Received: from mail-pf1-f180.google.com (mail-pf1-f180.google.com [209.85.210.180]) by mx.groups.io with SMTP id smtpd.web10.23026.1706104901401304934 for ; Wed, 24 Jan 2024 06:01:41 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=iJ4Iuvdz; spf=softfail (domain: sakoman.com, ip: 209.85.210.180, mailfrom: steve@sakoman.com) Received: by mail-pf1-f180.google.com with SMTP id d2e1a72fcca58-6daa89a6452so3821612b3a.2 for ; Wed, 24 Jan 2024 06:01:41 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1706104900; x=1706709700; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=hoP3m6ziCWKgFaRYsu7BNQVvJW5hArMPv+iWO1zlrJ8=; b=iJ4IuvdzXhXjW9qWhq/tPIPfBy48Jdl/f+unigokEizUeGkOQAL86g2U+B/8PUbTx/ RDenB4C8gfRT6CX7Iauk8o51CV8KLz3YTxtzbrH7kRXTA28lQ0Fm/ShfU2GDnW7Fx71c AF+3O+yqcrJXB36OyzWx8DhPZF7WlfVvMrKT2NnV0zxbXyKYr0AkHOE/SHyc5LPl171y JeLIzL5Epq1huwbl75Wl0HR1eo1i7cwX4bet3vshqxDhfvpewUewniV5Yg5+9xbCzUqT FxAtkALh3OvvMPqG/n8ViftCLybIMNQM3t4uQoPmyqGlqalz8uuVF30RuGqGubr8+0h+ XadQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1706104900; x=1706709700; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=hoP3m6ziCWKgFaRYsu7BNQVvJW5hArMPv+iWO1zlrJ8=; b=CV6midKQXFm5NiriANJ4Ryr6fe+X4TPMdCJdI7UijmIDXBRxmxdMkpIkfrON9WML6H i9YgZgw9XbsBsxU7icy5cDasOjC7a2vwjTUE9GObl3Ey1CJR9okAS3ax6HKc0PbitGxG g872BAqFmBJpIhSGGudGfoTAlCr/CpRNwu/x2zK1lVPisacJNWa4RK1W0oItkfohEmIP HBoLXi0xUTfKk3+Sm8KJQG0TcnJZQ43RJIHGKWIvFbwUF7uKCOyANZ1pJUuPxeMn4Xhc ZU2cE2VVEP4Zn9yY9Ccc/2fTm9V2IiYUnkjl6Xk4ze9rw3/VDHeKhnPRQ2rb80sY9loR LRnQ== X-Gm-Message-State: AOJu0YxPo/29cByHSwrR7qy6nx/zlpdGey1IonNLmV7BMATGdxcrozAG 2yz2GetQTEzEJEJkwhmPomoGI4cjIjpsviPWjGihowibVhanCBc1QxDRBJ1vUNwfjuZuhi0fB5Q zEj0= X-Google-Smtp-Source: AGHT+IGPeDP7QcxnhgTMOqLhmlphqaAnNrLSHHVvScr4pSYWtOP0VC9Zu33KQCT8f2/9IfWLuJ+Utw== X-Received: by 2002:a05:6a00:1146:b0:6db:605c:b9e4 with SMTP id b6-20020a056a00114600b006db605cb9e4mr5146695pfm.31.1706104900279; Wed, 24 Jan 2024 06:01:40 -0800 (PST) Received: from hexa.router0800d9.com (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id 8-20020a631648000000b005ccf10e73b8sm11535739pgw.91.2024.01.24.06.01.39 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 24 Jan 2024 06:01:39 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][nanbield 08/12] sudo: upgrade from 1.9.15p2 to 1.9.15p5 Date: Wed, 24 Jan 2024 04:01:11 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 24 Jan 2024 14:01:48 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/194284 From: Chen Qi (cherry picked from OE-Core rev 4b2eccc0ee3f2906f9b04de194b9df6e24c2cdf4) Signed-off-by: Chen Qi Signed-off-by: Alexandre Belloni Signed-off-by: Richard Purdie Signed-off-by: Lee Chee Yang Signed-off-by: Steve Sakoman --- .../sudo/{sudo_1.9.15p2.bb => sudo_1.9.15p5.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta/recipes-extended/sudo/{sudo_1.9.15p2.bb => sudo_1.9.15p5.bb} (96%) diff --git a/meta/recipes-extended/sudo/sudo_1.9.15p2.bb b/meta/recipes-extended/sudo/sudo_1.9.15p5.bb similarity index 96% rename from meta/recipes-extended/sudo/sudo_1.9.15p2.bb rename to meta/recipes-extended/sudo/sudo_1.9.15p5.bb index 431dfba3c2..8e542015ad 100644 --- a/meta/recipes-extended/sudo/sudo_1.9.15p2.bb +++ b/meta/recipes-extended/sudo/sudo_1.9.15p5.bb @@ -7,7 +7,7 @@ SRC_URI = "https://www.sudo.ws/dist/sudo-${PV}.tar.gz \ PAM_SRC_URI = "file://sudo.pam" -SRC_URI[sha256sum] = "199c0cdbfa7efcfffa9c88684a8e2fb206a62b70a316507e4a91c89c873bbcc8" +SRC_URI[sha256sum] = "558d10b9a1991fb3b9fa7fa7b07ec4405b7aefb5b3cb0b0871dbc81e3a88e558" DEPENDS += " virtual/crypt ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'libpam', '', d)}" RDEPENDS:${PN} += " ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'pam-plugin-limits pam-plugin-keyinit', '', d)}" From patchwork Wed Jan 24 14:01:12 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 38278 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id CECDEC46CD2 for ; Wed, 24 Jan 2024 14:01:48 +0000 (UTC) Received: from mail-pg1-f169.google.com (mail-pg1-f169.google.com [209.85.215.169]) by mx.groups.io with SMTP id smtpd.web10.23030.1706104903671606748 for ; Wed, 24 Jan 2024 06:01:43 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=kkhk/E1c; spf=softfail (domain: sakoman.com, ip: 209.85.215.169, mailfrom: steve@sakoman.com) Received: by mail-pg1-f169.google.com with SMTP id 41be03b00d2f7-5ca1b4809b5so2560500a12.3 for ; Wed, 24 Jan 2024 06:01:43 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1706104902; x=1706709702; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=R/1RMvb5QkneZXH3NMFXE0AA2Gc3ghEWW3uZXOL99Nc=; b=kkhk/E1cRqhwyuxjP+8eZQyGeR6bcUSxsQHN25mfahRkBl4Una4Gsg+sPvxBzeOU74 8hV849z+OJ4vI0Q83tiTl1m16Z3keDQVVBp2Op0gSjBLqCVx9mEIyFo1isImlZAuR0e5 jwknXthOW1ZHNkrQeJqCawY3b/o1dxcp999mpvM5nIsvgtXcQCaUTlzQhPjHXFRAtsvx BsNymxs+x2uX2uvhfc3JtEQ+n+dj2bVpTCBtabSOc9Xn10Stf+f1CMHI3/imvttp8pyP ezUAAVzPEHm/MRCzGNZgJrsOfYPzjJoyiTr7LUWZLxaTkPEGaiyuP5mdqwyeBzx3WNtN qp5w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1706104902; x=1706709702; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=R/1RMvb5QkneZXH3NMFXE0AA2Gc3ghEWW3uZXOL99Nc=; b=YB5ClAiYUO6d8b8dxwYFZdsTZOoNpg0OufZwt76Ofe5rU3nNyrs81iv5VAZFsHh5sw zH+RH2pZNkcWiZvyNhZC3YbeYXXNUUSvu+kvi0uyQ4yzqk68VMVRrFsyFI46/QJA4dD4 YXHKx8Ly0WqYb4uK/gNfvlXzDE0GCBQH09RAOC5Zz2W2l32ZIRrtWhjmZWS/Dgd/WoN5 Glf8QQHxTCDpHndUwbytijWh6+wxGzrhjOjpvnlLgdOrs/5Ee4O6MKDPrnbfMlgjZkp0 3q7Y3KM0bUHm5nAixzOuJ/bUinjzbj4YfFFTfjVd10Qwz2f41DYIHpHghMApkIwavWBJ N/Yw== X-Gm-Message-State: AOJu0YympGZ06oyekE/cOofEzaKppdtfe9SAg8K/nnSHOOkrrI1US+so SelD2ESKCOGVdRoKj5X8SqXDrPYidMGuM0JGdjdSCuTrnhMaFJNnzCIsijs/iQNhdpbXs0FbXta B040= X-Google-Smtp-Source: AGHT+IFCU3WcMaEKu0AW0W4nImUVuvIEeIvo3eZWYM4qm9dVHWXwXaRgo0yuJRa+wA6cySBS9Un6Qw== X-Received: by 2002:a05:6a20:841c:b0:19a:b80b:59a0 with SMTP id c28-20020a056a20841c00b0019ab80b59a0mr653502pzd.58.1706104902258; Wed, 24 Jan 2024 06:01:42 -0800 (PST) Received: from hexa.router0800d9.com (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id 8-20020a631648000000b005ccf10e73b8sm11535739pgw.91.2024.01.24.06.01.41 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 24 Jan 2024 06:01:41 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][nanbield 09/12] sstate: Fix dir ownership issues in SSTATE_DIR Date: Wed, 24 Jan 2024 04:01:12 -1000 Message-Id: <90d1e97b7c8bce0fb49714923989c63d243eb2da.1706104658.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 24 Jan 2024 14:01:48 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/194285 From: Richard Purdie We currently use mkdir -p to create missing parent directories within SSTATE_DIR. Reading the man page for mkdir mentions that parent directories are created with the current umask, *not* the mode passed upon the commandline. We could fix this by setting and resetting the umask but since we already have decent python code able to do this, move to using that injecting a python function into the chain of functions already present. This should help fix the occasional sstate directory creation with the wrong permissions. [YOCTO #14385] Signed-off-by: Richard Purdie (cherry picked from commit ae642a4b038c6946e6c8aa9778bf09099d938a31) Signed-off-by: Steve Sakoman --- meta/classes-global/sstate.bbclass | 9 +++++++-- 1 file changed, 7 insertions(+), 2 deletions(-) diff --git a/meta/classes-global/sstate.bbclass b/meta/classes-global/sstate.bbclass index 5b27a1f0f9..0f11a528b5 100644 --- a/meta/classes-global/sstate.bbclass +++ b/meta/classes-global/sstate.bbclass @@ -703,7 +703,7 @@ def sstate_package(ss, d): if d.getVar('SSTATE_SKIP_CREATION') == '1': return - sstate_create_package = ['sstate_report_unihash', 'sstate_create_package'] + sstate_create_package = ['sstate_report_unihash', 'sstate_create_pkgdirs', 'sstate_create_package'] if d.getVar('SSTATE_SIG_KEY'): sstate_create_package.append('sstate_sign_package') @@ -810,6 +810,12 @@ python sstate_task_postfunc () { } sstate_task_postfunc[dirs] = "${WORKDIR}" +python sstate_create_pkgdirs () { + # report_unihash can change SSTATE_PKG and mkdir -p in shell doesn't own intermediate directories + # correctly so do this in an intermediate python task + with bb.utils.umask(0o002): + bb.utils.mkdirhier(os.path.dirname(d.getVar('SSTATE_PKG'))) +} # # Shell function to generate a sstate package from a directory @@ -822,7 +828,6 @@ sstate_create_package () { return fi - mkdir --mode=0775 -p `dirname ${SSTATE_PKG}` TFILE=`mktemp ${SSTATE_PKG}.XXXXXXXX` OPT="-cS" From patchwork Wed Jan 24 14:01:13 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 38281 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D8E9DC48260 for ; Wed, 24 Jan 2024 14:01:48 +0000 (UTC) Received: from mail-pf1-f173.google.com (mail-pf1-f173.google.com [209.85.210.173]) by mx.groups.io with SMTP id smtpd.web10.23032.1706104906085955032 for ; Wed, 24 Jan 2024 06:01:46 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=aFpkJq/Q; spf=softfail (domain: sakoman.com, ip: 209.85.210.173, mailfrom: steve@sakoman.com) Received: by mail-pf1-f173.google.com with SMTP id d2e1a72fcca58-6dbb003be79so4714608b3a.0 for ; Wed, 24 Jan 2024 06:01:46 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1706104905; x=1706709705; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=49JsrqzRkgKEsDGeY6XJXdAHleU0+KGttIJmkGr/9aM=; b=aFpkJq/QrEU+5sE5MstrWbDZeYBEJvUENj7/NoZi6rfcc+4gZVceFVkQdu7QeMYZBR ZyRTdBPFFiH/StpkepWhQwEN5QIBI6Fcbzc0uEU39olbQVgHVq9Lb+H41w7dg+C/g8cn DnQFmNXcrNcJFDU7heKZmshCKAOni11Q3NCIxVsr4MHDp4QLfT/KgGxxt04xt5A9kkXL xsdPu/qtW4hhICy29KgsLfR7tFzHmmmN2mfkBxcOluj5n7ZXMsyCx72wc158StsuPDYI vE/b1eISrckoVCVzktgE/9GLvl+TUnrbhSA/iQ4e8j2I/U+lrbRRkIiTQdDUgMteApTg CCsw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1706104905; x=1706709705; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=49JsrqzRkgKEsDGeY6XJXdAHleU0+KGttIJmkGr/9aM=; b=Kib9njIHP9Mtoo+yzD8temLNN6+LBwttplbrbZdcFUp8dYMutHvKDMcBGaJAX3hi+W LNWLrSJdxzDI1md58HIJQ19L/qFS9oUZhDjb/Zg8Hejdc43Gc/VOOzrOax2jR10hLut3 fldvV4HRk3q9mS24gxd9ZvP/ie79ZvL2Oz787bI2W0a6ZoKC76lGG8aNC6VzuJEZH8MQ lnn53LLDV//9dpnH8u4RUNwc4XQ3i7brZn8MWuK8flpYY5RWMZquOvz0NyOG0V3/Yujc CnBC6omcKvy4dv6e2yAlObDk69DOJnv9QyrqzGvdfFVEam7iWVkRBSUU4cRwzBRpPjQH Bdqg== X-Gm-Message-State: AOJu0YxYpyMdTi7U9+f1iF8pkcS+b/jfssOlJLSyvTnxfI2Z9uPs6nd7 1U6QBZvLE3Ne8K1eZbTPhCReT/a6tHGJu/ijO6qTDZ/YV1a8JhEdhto8EndmfGuSikOnx4yT+DY MfQ0= X-Google-Smtp-Source: AGHT+IF2BdP4I3ZQ5EhYdikplnkEBuxywCJFkO6zTMjuAGOzXU4Ph0RQ3u9dmiVoGwWYxPAirsEmeg== X-Received: by 2002:a05:6a20:3d0b:b0:19a:37be:1af9 with SMTP id y11-20020a056a203d0b00b0019a37be1af9mr1219539pzi.43.1706104904590; Wed, 24 Jan 2024 06:01:44 -0800 (PST) Received: from hexa.router0800d9.com (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id 8-20020a631648000000b005ccf10e73b8sm11535739pgw.91.2024.01.24.06.01.43 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 24 Jan 2024 06:01:44 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][nanbield 10/12] devtool: modify: Handle recipes with a menuconfig task correctly Date: Wed, 24 Jan 2024 04:01:13 -1000 Message-Id: <91192e861f0f764799f0ae9943cf387b18c70820.1706104658.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 24 Jan 2024 14:01:48 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/194286 From: Peter Kjellerstedt This avoids the following error when running `devtool modify` on a recipe that has a menuconfig task, but does not have KCONFIG_CONFIG_ENABLE_MENUCONFIG set. .../temp/run.do_configure.4163366: line 152: ${@ oe.types.boolean('${KCONFIG_CONFIG_ENABLE_MENUCONFIG}') }: bad substitution WARNING: .../temp/run.do_configure.4163366:152 exit 1 from '[ ${@ oe.types.boolean('${KCONFIG_CONFIG_ENABLE_MENUCONFIG}') } = True ]' Signed-off-by: Peter Kjellerstedt Signed-off-by: Richard Purdie (cherry picked from commit e87e6fa84a0c4b5ac8e736dc62f6e08390ba2436) Signed-off-by: Steve Sakoman --- scripts/lib/devtool/standard.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/scripts/lib/devtool/standard.py b/scripts/lib/devtool/standard.py index 55fa38ccfb..0126f75022 100644 --- a/scripts/lib/devtool/standard.py +++ b/scripts/lib/devtool/standard.py @@ -971,7 +971,7 @@ def modify(args, config, basepath, workspace): '}\n') if rd.getVarFlag('do_menuconfig','task'): f.write('\ndo_configure:append() {\n' - ' if [ ${@ oe.types.boolean(\'${KCONFIG_CONFIG_ENABLE_MENUCONFIG}\') } = True ]; then\n' + ' if [ ${@oe.types.boolean(d.getVar("KCONFIG_CONFIG_ENABLE_MENUCONFIG"))} = True ]; then\n' ' cp ${KCONFIG_CONFIG_ROOTDIR}/.config ${S}/.config.baseline\n' ' ln -sfT ${KCONFIG_CONFIG_ROOTDIR}/.config ${S}/.config.new\n' ' fi\n' From patchwork Wed Jan 24 14:01:14 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 38282 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id E2703C46CD2 for ; Wed, 24 Jan 2024 14:01:58 +0000 (UTC) Received: from mail-pf1-f182.google.com (mail-pf1-f182.google.com [209.85.210.182]) by mx.groups.io with SMTP id smtpd.web11.23145.1706104912402084020 for ; Wed, 24 Jan 2024 06:01:52 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=yI+pxpBL; spf=softfail (domain: sakoman.com, ip: 209.85.210.182, mailfrom: steve@sakoman.com) Received: by mail-pf1-f182.google.com with SMTP id d2e1a72fcca58-6dd6c9cb6a8so1506201b3a.1 for ; Wed, 24 Jan 2024 06:01:52 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1706104911; x=1706709711; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=RYuCiA9yB4bS9/W8soKb9WvQPk/euuG2A7GY1f5mVqw=; b=yI+pxpBLDWpppQmQ0fNeOF1K5TihRI/TJRFEK0q5NJR7e5n3vYu8bDg+QtJB/FiLi6 uwz4gyyqW/o3eMWWJdK8lpmuEwiMenKKHi3kAI26/Arg8ni87YZ8mS4pwo4SGzl7OD5o 9qwNEyb3ARr6VN6U9p9vlZrG+a5rGcjVg66ODvH+p1BAtj9R0eLTNwD3SkNQVFRA/Hkx OwqmbJxhKDJyYWpR751hj6i/LBMhXUVzBdW7KZxhm/1fRuKwKm5uHLxKrlqLHWVhooDA LYbkG5q4pGEN9adhoVXf/bnUhFHh6HB23vCS6XwoQLyAAIx5qwFvvjyGp6Yl208TDzcG XDgQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1706104911; x=1706709711; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=RYuCiA9yB4bS9/W8soKb9WvQPk/euuG2A7GY1f5mVqw=; b=s5RrCFSZmYusjawCuFO419x9a7FH+oRH3CC/v3iUo4c4UR8xahZmxsZKNaOFO+Xide nGp/UpUMISZRtn10H/VwbAUc1J/JrpZ5aFtZ+dnMRf6v0SeLcwSgQH93IyQ3vr5cClMY +QY/C5GierwZ5Vkqef4kRmnxGBYNXNUEVT6+tzuYknOBh4oWlwT9Gvt0N97lVk2aSllF Hcp6N1rU4xUJsx/Uf+ziKwTqcOTNzij2CeCRDkIpKYwpP6lQruZEnzPQxuRr7NEL6slB LzdKq1JdT5ByGCrvg7kZ/4eQ7IIjfh9AvI6Rdm+1gpII5HCdeXAwjKg59eh73tvWSM35 7mXg== X-Gm-Message-State: AOJu0YwgE6nY1T0caK7aEoVbPTn33WOHziGhGE7/WOPBxKchfdIleLD/ L/ogjJILgn1E0+Kp3iAde9DATBp4gKG1Z4AKTrJeqx3CsNW+dGHfR85wPhAcKS/yjG5hdyqM3BW /UpU= X-Google-Smtp-Source: AGHT+IEzQRYqbxofH+gAfL07zlWr5OJ2nG10ymIZqeMaxxTEwiTtRenAyrqthSyqt67pinFCY7qakQ== X-Received: by 2002:a05:6a00:a1e:b0:6d9:b9af:41cb with SMTP id p30-20020a056a000a1e00b006d9b9af41cbmr6117804pfh.14.1706104909604; Wed, 24 Jan 2024 06:01:49 -0800 (PST) Received: from hexa.router0800d9.com (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id 8-20020a631648000000b005ccf10e73b8sm11535739pgw.91.2024.01.24.06.01.48 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 24 Jan 2024 06:01:49 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][nanbield 11/12] create-spdx-2.2: combine spdx can try to write before dir creation Date: Wed, 24 Jan 2024 04:01:14 -1000 Message-Id: <1b90a9c9c8180c080f780c8dd428fad3f55e879d.1706104658.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 24 Jan 2024 14:01:58 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/194287 From: "Jeremy A. Puhlman" On occasion a file is attmpeded to be opened prior to the creation of the spdx_workdir. Create the directory before the open, just in case. File: '/build/layers/poky/meta/classes/create-spdx-2.2.bbclass', lineno: 1081, function: combine_spdx 1077: ) 1078: 1079: image_spdx_path = spdx_workdir / (rootfs_name + ".spdx.json") 1080: *** 1081: with image_spdx_path.open("wb") as f: 1082: doc.to_json(f, sort_keys=True, indent=get_json_indent(d)) Signed-off-by: Jeremy A. Puhlman Signed-off-by: Richard Purdie (cherry picked from commit bb9f2a9c0ff5dcdeaf1a0beb6a614d0d022a2481) Signed-off-by: Steve Sakoman --- meta/classes/create-spdx-2.2.bbclass | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/meta/classes/create-spdx-2.2.bbclass b/meta/classes/create-spdx-2.2.bbclass index b0aef80db1..486efadba9 100644 --- a/meta/classes/create-spdx-2.2.bbclass +++ b/meta/classes/create-spdx-2.2.bbclass @@ -1075,7 +1075,7 @@ def combine_spdx(d, rootfs_name, rootfs_deploydir, rootfs_spdxid, packages, spdx "%s:%s" % (runtime_ref.externalDocumentId, runtime_doc.SPDXID), comment="Runtime dependencies for %s" % name ) - + bb.utils.mkdirhier(spdx_workdir) image_spdx_path = spdx_workdir / (rootfs_name + ".spdx.json") with image_spdx_path.open("wb") as f: From patchwork Wed Jan 24 14:01:15 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 38283 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id EAF70C47E49 for ; Wed, 24 Jan 2024 14:01:58 +0000 (UTC) Received: from mail-pl1-f176.google.com (mail-pl1-f176.google.com [209.85.214.176]) by mx.groups.io with SMTP id smtpd.web11.23146.1706104914182177288 for ; Wed, 24 Jan 2024 06:01:54 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=KFuZ6z3W; spf=softfail (domain: sakoman.com, ip: 209.85.214.176, mailfrom: steve@sakoman.com) Received: by mail-pl1-f176.google.com with SMTP id d9443c01a7336-1d427518d52so39677195ad.0 for ; Wed, 24 Jan 2024 06:01:54 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1706104913; x=1706709713; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=TCVUseB03gHVXrEEDgpyFv8FK3Zk8MeTNKfmERlSW0w=; b=KFuZ6z3WQXea/g1fGcLJhLwv3y8Chyu+QupfpLZxqpUf0dVYw/WF3SeRDHDfBt0yBP O+aH810LH84x61L9NyikelFpbkeXgi497CQEDjJxCx9nuFqJbQOJW5dV19KcUGdlewEf WrquccaQeNPImaroZrTpevF6bO8oBCofP7JzUNKb/nflbg9zAtqwppteDcXk737Ho1pI o7Qoy0gcDt48iPUpgBpagJp2BbD7NH5lu1YeAvTfqd51gJziI4HmZna9gpbe76zwHrOf /qORJh+3PK7CDes/ylAKXFUdr16uyGycBB8Ox8cl3zZfKqmnHQbEHM4gMaZ/kEQXJ0fK UHJg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1706104913; x=1706709713; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=TCVUseB03gHVXrEEDgpyFv8FK3Zk8MeTNKfmERlSW0w=; b=bXaJ99QyWGUJsVzb6pczqmkwizVh5eNQXezqnFeNQi1nRoWwZ8x514Ncm25b3u1/ke hY4YycswK4QiEY6fLGXky+DINSaD9IFwNLGt9c2Zp81D5Oas5PchAqqJRqzmI7BPctj1 /ojqrXc4MMa1rfO7UyrIAEfdtA7vWqKGwrEOc7Pyci8jQ2xSX8XgCZNjlvVI8pQnvsTe o2cw8iPGOCmnbuyOSF6qTATKaT4bpPBPnjUSE4i77ej3KrJvkpABH5GgjJCFlA68lbjo J2jkpqQbTRF6S9V18pSVqO+wSBdzgMVOEwx9YMTUZYMalB5ED72VxnhbOcy3DXbWqa0z aNEQ== X-Gm-Message-State: AOJu0YzhgkH/4mgS06Zq1325jlpzrxKpbLKu7dgFgVlLCHKu7eKfzirC mJQG2/YcLzju3naLA5N2q0IsD3WttHxAvkeoRqK4ndVk74k423BWjnglBnXb91Cb4U28/m2Y8lP JFKs= X-Google-Smtp-Source: AGHT+IFknspu1NAWAspc7YlGYt7IGJtu2tu88mCzY4GF6yeP0sHSdwGH2PebRYSIi2JgqKRLxQnf0g== X-Received: by 2002:a17:902:9a4a:b0:1d7:8531:6978 with SMTP id x10-20020a1709029a4a00b001d785316978mr1049298plv.68.1706104912657; Wed, 24 Jan 2024 06:01:52 -0800 (PST) Received: from hexa.router0800d9.com (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id 8-20020a631648000000b005ccf10e73b8sm11535739pgw.91.2024.01.24.06.01.51 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 24 Jan 2024 06:01:51 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][nanbield 12/12] rpcbind: Specify state directory under /run Date: Wed, 24 Jan 2024 04:01:15 -1000 Message-Id: <3d5a85f173dffa14a6829edb9e6adbd5a3946d9c.1706104658.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 24 Jan 2024 14:01:58 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/194288 From: Joshua Watt The state directory must be correctly specified as under /run because RequiresMountsFor doesn't follow symbolic links which means the unit may run before /run is mounted if the default of /var/run/rpcbind is kept Signed-off-by: Joshua Watt Signed-off-by: Richard Purdie (cherry picked from commit 561e853e97e2cfa325ed310233577a5e124d9049) Signed-off-by: Steve Sakoman --- meta/recipes-extended/rpcbind/rpcbind_1.2.6.bb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/meta/recipes-extended/rpcbind/rpcbind_1.2.6.bb b/meta/recipes-extended/rpcbind/rpcbind_1.2.6.bb index dd89726afc..dbd4d32e0a 100644 --- a/meta/recipes-extended/rpcbind/rpcbind_1.2.6.bb +++ b/meta/recipes-extended/rpcbind/rpcbind_1.2.6.bb @@ -40,7 +40,7 @@ PACKAGECONFIG[systemd] = "--with-systemdsystemunitdir=${systemd_system_unitdir}/ systemd \ " -EXTRA_OECONF += " --enable-warmstarts --with-rpcuser=rpc" +EXTRA_OECONF += " --enable-warmstarts --with-rpcuser=rpc --with-statedir=${runtimedir}/rpcbind" do_install:append () { install -d ${D}${sysconfdir}/init.d