From patchwork Wed Jun 28 14:12:26 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 26594 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 030F7EB64DD for ; Wed, 28 Jun 2023 14:13:08 +0000 (UTC) Received: from mail-pl1-f181.google.com (mail-pl1-f181.google.com [209.85.214.181]) by mx.groups.io with SMTP id smtpd.web10.17356.1687961583118190326 for ; Wed, 28 Jun 2023 07:13:03 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="signature has expired" header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=KUCAPXcx; spf=softfail (domain: sakoman.com, ip: 209.85.214.181, mailfrom: steve@sakoman.com) Received: by mail-pl1-f181.google.com with SMTP id d9443c01a7336-1b7f223994fso35331285ad.3 for ; Wed, 28 Jun 2023 07:13:03 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1687961582; x=1690553582; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=BZGugfmuMzh9hw3iIRAG1HVB5kWvQxTBfomxRRr9ZAg=; b=KUCAPXcx3w062Xmvx6vQD+T2vE0k8QTYEMMUVCn0fKU2fD/Fud8WS6OX72Fbn2Lr/P 9llVhEvWXdY0TJnRU/wol515LkZsSkfw6nQVuUo1LzBdnBT5K4cGw2os5aYQuyEpFKG6 VZiZWVrUK/1jTj3K1WJJYPSxdGrBATn7fabwbZzOIEgyo2hIzvTKMe1nz6ml3GF13soo rAIjI7abiJJyW9ylneRrnaTiz69j2slqd4TU/ZZ29osWwrLdBnPRxxXlC5IAKiJXZ40O KsBtd9Ke/4CeSB1GF9NjIkvzoEClN9ufhJ5XxQc6Ho6obKpIY5KGbgqJsx9HU2ysJ2vt Vu2g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1687961582; x=1690553582; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=BZGugfmuMzh9hw3iIRAG1HVB5kWvQxTBfomxRRr9ZAg=; b=RugNRQ81ULfA8EKrs1DY2pGnS5VVDMar9chnq2Xbc8O2Ogg75UykZDrcnWL6kX0dcK avb79LxrwRk5XTYmT1sNUVd8KalZkI1DgN/EM40hUL+gaNNPZ1yl74qccfQ6eMCcDRIg SRsx1a65pO0nlUxlGgRCDd1FSdo47q4IXPeeB/pF/uJiITKwktQir+T29zxs7+CDdgyP vO+/uiPRuuNdJQAf9d/kQQm9Xvu6W6N/F4/YhluNSQ9EJhGQrH91yZc80evPDtMS+woI u7IO6+JZJjB5tspjK5sqmULnglbFC4HGxz0K6UQR1LFaXA/GZiASVdJpHv+X+b7jNu4t XPZg== X-Gm-Message-State: AC+VfDz+db5v2CUxC00iSbxb05JO8BxuidrgmDzOTvxjRmtbdmKK3+7h q183DNw/iBnCtxHSKeEKHJ9qa+om7o59UhihQh9v3A== X-Google-Smtp-Source: ACHHUZ49S+sKEvrGAsKv6H+jq/byiLZeAD2gNmPfEOJMSfiN7tDgQQEh5aUhWEFBLU5ZuiufWQZoLg== X-Received: by 2002:a17:902:ce88:b0:1b6:68bb:6ad0 with SMTP id f8-20020a170902ce8800b001b668bb6ad0mr17408301plg.55.1687961582067; Wed, 28 Jun 2023 07:13:02 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id b19-20020a170902d89300b001b3ce619e2esm7792092plz.179.2023.06.28.07.13.01 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 28 Jun 2023 07:13:01 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 01/29] go: fix CVE-2023-29404 Date: Wed, 28 Jun 2023 04:12:26 -1000 Message-Id: <3e51122f8e2b4a7cd2a1c711175e6daf59b8368b.1687961326.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 28 Jun 2023 14:13:07 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/183556 From: Archana Polampalli The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a "#cgo LDFLAGS" directive. The arguments for a number of flags which are non-optional are incorrectly considered optional, allowing disallowed flags to be smuggled through the LDFLAGS sanitization. This affects usage of both the gc and gccgo compilers. References: https://nvd.nist.gov/vuln/detail/CVE-2023-29404 Upstream patches: https://github.com/golang/go/commit/bbeb55f5faf93659e1cfd6ab073ab3c9d126d195 Signed-off-by: Archana Polampalli Signed-off-by: Steve Sakoman --- meta/recipes-devtools/go/go-1.17.13.inc | 1 + .../go/go-1.19/CVE-2023-29404.patch | 78 +++++++++++++++++++ 2 files changed, 79 insertions(+) create mode 100644 meta/recipes-devtools/go/go-1.19/CVE-2023-29404.patch diff --git a/meta/recipes-devtools/go/go-1.17.13.inc b/meta/recipes-devtools/go/go-1.17.13.inc index d430e0669d..2c1febfe9c 100644 --- a/meta/recipes-devtools/go/go-1.17.13.inc +++ b/meta/recipes-devtools/go/go-1.17.13.inc @@ -32,6 +32,7 @@ SRC_URI += "\ file://CVE-2023-24538.patch \ file://CVE-2023-24540.patch \ file://CVE-2023-24539.patch \ + file://CVE-2023-29404.patch \ " SRC_URI[main.sha256sum] = "a1a48b23afb206f95e7bbaa9b898d965f90826f6f1d1fc0c1d784ada0cd300fd" diff --git a/meta/recipes-devtools/go/go-1.19/CVE-2023-29404.patch b/meta/recipes-devtools/go/go-1.19/CVE-2023-29404.patch new file mode 100644 index 0000000000..c6beced884 --- /dev/null +++ b/meta/recipes-devtools/go/go-1.19/CVE-2023-29404.patch @@ -0,0 +1,78 @@ +From bbeb55f5faf93659e1cfd6ab073ab3c9d126d195 Mon Sep 17 00:00:00 2001 +From: Roland Shoemaker +Date: Fri, 5 May 2023 13:10:34 -0700 +Subject: [PATCH] cmd/go: enforce flags with non-optional arguments + +Enforce that linker flags which expect arguments get them, otherwise it +may be possible to smuggle unexpected flags through as the linker can +consume what looks like a flag as an argument to a preceding flag (i.e. +"-Wl,-O -Wl,-R,-bad-flag" is interpreted as "-O=-R -bad-flag"). Also be +somewhat more restrictive in the general format of some flags. + +Thanks to Juho Nurminen of Mattermost for reporting this issue. + +Fixes #60305 +Fixes CVE-2023-29404 + +Change-Id: I913df78a692cee390deefc3cd7d8f5b031524fc9 +Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/1876275 +Reviewed-by: Ian Lance Taylor +Reviewed-by: Damien Neil +Reviewed-on: https://go-review.googlesource.com/c/go/+/501225 +Run-TryBot: David Chase +Reviewed-by: Michael Knyszek +TryBot-Result: Gopher Robot + +Upstream-Status: Backport [https://github.com/golang/go/commit/bbeb55f5faf93659e1cfd6ab073ab3c9d126d195] +CVE: CVE-2023-29404 + +Signed-off-by: Archana Polampalli +--- + src/cmd/go/internal/work/security.go | 6 +++--- + src/cmd/go/internal/work/security_test.go | 5 +++++ + 2 files changed, 8 insertions(+), 3 deletions(-) + +diff --git a/src/cmd/go/internal/work/security.go b/src/cmd/go/internal/work/security.go +index e9b9f6c..91e6e4c 100644 +--- a/src/cmd/go/internal/work/security.go ++++ b/src/cmd/go/internal/work/security.go +@@ -179,10 +179,10 @@ var validLinkerFlags = []*lazyregexp.Regexp{ + re(`-Wl,-berok`), + re(`-Wl,-Bstatic`), + re(`-Wl,-Bsymbolic-functions`), +- re(`-Wl,-O([^@,\-][^,]*)?`), ++ re(`-Wl,-O[0-9]+`), + re(`-Wl,-d[ny]`), + re(`-Wl,--disable-new-dtags`), +- re(`-Wl,-e[=,][a-zA-Z0-9]*`), ++ re(`-Wl,-e[=,][a-zA-Z0-9]+`), + re(`-Wl,--enable-new-dtags`), + re(`-Wl,--end-group`), + re(`-Wl,--(no-)?export-dynamic`), +@@ -191,7 +191,7 @@ var validLinkerFlags = []*lazyregexp.Regexp{ + re(`-Wl,--hash-style=(sysv|gnu|both)`), + re(`-Wl,-headerpad_max_install_names`), + re(`-Wl,--no-undefined`), +- re(`-Wl,-R([^@\-][^,@]*$)`), ++ re(`-Wl,-R,?([^@\-,][^,@]*$)`), + re(`-Wl,--just-symbols[=,]([^,@\-][^,@]+)`), + re(`-Wl,-rpath(-link)?[=,]([^,@\-][^,]+)`), + re(`-Wl,-s`), +diff --git a/src/cmd/go/internal/work/security_test.go b/src/cmd/go/internal/work/security_test.go +index 8d4be0a..3616548 100644 +--- a/src/cmd/go/internal/work/security_test.go ++++ b/src/cmd/go/internal/work/security_test.go +@@ -227,6 +227,11 @@ var badLinkerFlags = [][]string{ + {"-Wl,-R,@foo"}, + {"-Wl,--just-symbols,@foo"}, + {"../x.o"}, ++ {"-Wl,-R,"}, ++ {"-Wl,-O"}, ++ {"-Wl,-e="}, ++ {"-Wl,-e,"}, ++ {"-Wl,-R,-flag"}, + } + + func TestCheckLinkerFlags(t *testing.T) { +-- +2.40.0 From patchwork Wed Jun 28 14:12:27 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 26597 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id F2DECEB64D7 for ; Wed, 28 Jun 2023 14:13:07 +0000 (UTC) Received: from mail-pl1-f169.google.com (mail-pl1-f169.google.com [209.85.214.169]) by mx.groups.io with SMTP id smtpd.web11.17560.1687961585112138182 for ; Wed, 28 Jun 2023 07:13:05 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="signature has expired" header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=aORjMQlW; spf=softfail (domain: sakoman.com, ip: 209.85.214.169, mailfrom: steve@sakoman.com) Received: by mail-pl1-f169.google.com with SMTP id d9443c01a7336-1b8171718a1so18902515ad.2 for ; Wed, 28 Jun 2023 07:13:04 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1687961584; x=1690553584; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=is7Rdi+ks0N1IwBQzff26eadxBGmKiQE56im/aUWyms=; b=aORjMQlW5PsnGMjqijipDHDFNlgVxZmy/XKoopnshYOOF1Hk/agsywt4gAwyKz9+aO Tn4zOnJbMtwkeNj4g3P+GA7qErn011r6PqhmSAje9eIXrZ533PD68qOiZj7sKwDWOZvK jblf8q4ReocnGoVAjqmKzmSgoi3/iWgtrf7l8rn2h1vmN6oZirHxmxiW3XVbLOVe/5Xg dHKQWMZjw3gajoRE9Rbsa4bmmCV01tSmq4kyoYj4FpjRL5smfi44a3ht8168f6CSoxUr ktn1MSMlIdAVpahucYRM7064sQPa+fXvG22hZbrhU37dcTv+wWrx4n/MxrBknVyzOIxz TSyw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1687961584; x=1690553584; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=is7Rdi+ks0N1IwBQzff26eadxBGmKiQE56im/aUWyms=; b=HjsZdq3A59I+PkCOpQTR5TDFX4Q6J5waWyZqq3WrpzP3Ea+PPsI8+0F1n2sVSrGQxt c4V4bd9EJJ+un/p6lsJhDijCvKdsUq88HZ2Nva7lMFR6kckinIcWQM44syqoItSL8Iag peNOElFqGBFD3H7zsV/Dp8k2uoPvqoPiprCAolCp0iK8M9q4bjo0iXx0Rgrr+6M3PsU9 XcwxvslajjQJapUDRZ80Ejv17InKDyzPl4/KFCaACijjN9/tcWSZMvZsoJRWlJuQggvC ffoouO67XzptCG0V0pOuUvqMMnFVdhxZQ8+0pCWihDXP7vxAk3q3hMuah5nV+NKQ+Y8V PRCA== X-Gm-Message-State: AC+VfDzfBBPnJiKSD7vsrBfx4SVBafwE34s9dlI23CFkwA1g0hbsZwHp 0lDxrOIwNjQ5JQ/oviMtrGxCogRXwyZnxeTwkZjStw== X-Google-Smtp-Source: ACHHUZ5WZPg+HywVoUeifqkuq4LVYB9zQexmwtv7FwpTTKWtOT0NtyIkukjciB4V1BQhE+ZklPSbAw== X-Received: by 2002:a17:902:ecc5:b0:1b7:f98d:5567 with SMTP id a5-20020a170902ecc500b001b7f98d5567mr11598402plh.68.1687961583896; Wed, 28 Jun 2023 07:13:03 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id b19-20020a170902d89300b001b3ce619e2esm7792092plz.179.2023.06.28.07.13.03 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 28 Jun 2023 07:13:03 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 02/29] go: fix CVE-2023-29405 Date: Wed, 28 Jun 2023 04:12:27 -1000 Message-Id: <7ce6d0029effc06cff500271a124150f1a7db7b3.1687961326.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 28 Jun 2023 14:13:07 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/183557 From: Archana Polampalli The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a "#cgo LDFLAGS" directive. Flags containing embedded spaces are mishandled, allowing disallowed flags to be smuggled through the LDFLAGS sanitization by including them in the argument of another flag. This only affects usage of the gccgo compiler. References: https://nvd.nist.gov/vuln/detail/CVE-2023-29405 Upstream patches: https://github.com/golang/go/commit/6d8af00a630aa51134e54f0f321658621c6410f0 Signed-off-by: Archana Polampalli Signed-off-by: Steve Sakoman --- meta/recipes-devtools/go/go-1.17.13.inc | 1 + .../go/go-1.19/CVE-2023-29405.patch | 109 ++++++++++++++++++ 2 files changed, 110 insertions(+) create mode 100644 meta/recipes-devtools/go/go-1.19/CVE-2023-29405.patch diff --git a/meta/recipes-devtools/go/go-1.17.13.inc b/meta/recipes-devtools/go/go-1.17.13.inc index 2c1febfe9c..9af9eb2752 100644 --- a/meta/recipes-devtools/go/go-1.17.13.inc +++ b/meta/recipes-devtools/go/go-1.17.13.inc @@ -33,6 +33,7 @@ SRC_URI += "\ file://CVE-2023-24540.patch \ file://CVE-2023-24539.patch \ file://CVE-2023-29404.patch \ + file://CVE-2023-29405.patch \ " SRC_URI[main.sha256sum] = "a1a48b23afb206f95e7bbaa9b898d965f90826f6f1d1fc0c1d784ada0cd300fd" diff --git a/meta/recipes-devtools/go/go-1.19/CVE-2023-29405.patch b/meta/recipes-devtools/go/go-1.19/CVE-2023-29405.patch new file mode 100644 index 0000000000..d806e1e67d --- /dev/null +++ b/meta/recipes-devtools/go/go-1.19/CVE-2023-29405.patch @@ -0,0 +1,109 @@ +From 6d8af00a630aa51134e54f0f321658621c6410f0 Mon Sep 17 00:00:00 2001 +From: Ian Lance Taylor +Date: Thu, 4 May 2023 14:06:39 -0700 +Subject: [PATCH] cmd/go,cmd/cgo: in _cgo_flags use one line per flag + +The flags that we recorded in _cgo_flags did not use any quoting, +so a flag containing embedded spaces was mishandled. +Change the _cgo_flags format to put each flag on a separate line. +That is a simple format that does not require any quoting. + +As far as I can tell only cmd/go uses _cgo_flags, and it is only +used for gccgo. If this patch doesn't cause any trouble, then +in the next release we can change to only using _cgo_flags for gccgo. + +Thanks to Juho Nurminen of Mattermost for reporting this issue. + +Fixes #60306 +Fixes CVE-2023-29405 + +Change-Id: I81fb5337db8a22e1f4daca22ceff4b79b96d0b4f +Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/1875094 +Reviewed-by: Damien Neil +Reviewed-by: Roland Shoemaker +Reviewed-on: https://go-review.googlesource.com/c/go/+/501224 +Reviewed-by: Ian Lance Taylor +Run-TryBot: David Chase +Reviewed-by: Michael Knyszek +Reviewed-by: Roland Shoemaker +TryBot-Result: Gopher Robot + +Upstream-Status: Backport [https://github.com/golang/go/commit/6d8af00a630aa51134e54f0f321658621c6410f0] +CVE: CVE-2023-29405 + +Signed-off-by: Archana Polampalli +--- + src/cmd/cgo/out.go | 4 +++- + src/cmd/go/internal/work/gccgo.go | 14 ++++++------- + .../go/testdata/script/gccgo_link_ldflags.txt | 20 +++++++++++++++++++ + 3 files changed, 29 insertions(+), 9 deletions(-) + create mode 100644 src/cmd/go/testdata/script/gccgo_link_ldflags.txt + +diff --git a/src/cmd/cgo/out.go b/src/cmd/cgo/out.go +index 94152f4..62e6528 100644 +--- a/src/cmd/cgo/out.go ++++ b/src/cmd/cgo/out.go +@@ -47,7 +47,9 @@ func (p *Package) writeDefs() { + + fflg := creat(*objDir + "_cgo_flags") + for k, v := range p.CgoFlags { +- fmt.Fprintf(fflg, "_CGO_%s=%s\n", k, strings.Join(v, " ")) ++ for _, arg := range v { ++ fmt.Fprintf(fflg, "_CGO_%s=%s\n", k, arg) ++ } + if k == "LDFLAGS" && !*gccgo { + for _, arg := range v { + fmt.Fprintf(fgo2, "//go:cgo_ldflag %q\n", arg) +diff --git a/src/cmd/go/internal/work/gccgo.go b/src/cmd/go/internal/work/gccgo.go +index 1499536..bb4be2f 100644 +--- a/src/cmd/go/internal/work/gccgo.go ++++ b/src/cmd/go/internal/work/gccgo.go +@@ -283,14 +283,12 @@ func (tools gccgoToolchain) link(b *Builder, root *Action, out, importcfg string + const ldflagsPrefix = "_CGO_LDFLAGS=" + for _, line := range strings.Split(string(flags), "\n") { + if strings.HasPrefix(line, ldflagsPrefix) { +- newFlags := strings.Fields(line[len(ldflagsPrefix):]) +- for _, flag := range newFlags { +- // Every _cgo_flags file has -g and -O2 in _CGO_LDFLAGS +- // but they don't mean anything to the linker so filter +- // them out. +- if flag != "-g" && !strings.HasPrefix(flag, "-O") { +- cgoldflags = append(cgoldflags, flag) +- } ++ flag := line[len(ldflagsPrefix):] ++ // Every _cgo_flags file has -g and -O2 in _CGO_LDFLAGS ++ // but they don't mean anything to the linker so filter ++ // them out. ++ if flag != "-g" && !strings.HasPrefix(flag, "-O") { ++ cgoldflags = append(cgoldflags, flag) + } + } + } +diff --git a/src/cmd/go/testdata/script/gccgo_link_ldflags.txt b/src/cmd/go/testdata/script/gccgo_link_ldflags.txt +new file mode 100644 +index 0000000..4e91ae5 +--- /dev/null ++++ b/src/cmd/go/testdata/script/gccgo_link_ldflags.txt +@@ -0,0 +1,20 @@ ++# Test that #cgo LDFLAGS are properly quoted. ++# The #cgo LDFLAGS below should pass a string with spaces to -L, ++# as though searching a directory with a space in its name. ++# It should not pass --nosuchoption to the external linker. ++ ++[!cgo] skip ++ ++go build ++ ++[!exec:gccgo] skip ++ ++go build -compiler gccgo ++ ++-- go.mod -- ++module m ++-- cgo.go -- ++package main ++// #cgo LDFLAGS: -L "./ -Wl,--nosuchoption" ++import "C" ++func main() {} +-- +2.40.0 From patchwork Wed Jun 28 14:12:28 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 26596 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 2253AEB64DC for ; Wed, 28 Jun 2023 14:13:08 +0000 (UTC) Received: from mail-pl1-f178.google.com (mail-pl1-f178.google.com [209.85.214.178]) by mx.groups.io with SMTP id smtpd.web10.17359.1687961586694360919 for ; Wed, 28 Jun 2023 07:13:06 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=GD+0WfkX; spf=softfail (domain: sakoman.com, ip: 209.85.214.178, mailfrom: steve@sakoman.com) Received: by mail-pl1-f178.google.com with SMTP id d9443c01a7336-1b7ef3e74edso23651695ad.0 for ; Wed, 28 Jun 2023 07:13:06 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1687961586; x=1690553586; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=loP5wWKD0zyTlNRt8BejD15MO3zSsVlgQKC+p/3HpNI=; b=GD+0WfkXgnrP343NxPkZMux9oG7sbrYP0FJgHYIBRMvV3qOm19U2vqHRd1HyjnH16N HuVVsU3pYGTSNgyW00vjmsvI4Csq9Wwvm1qpOplN4H6NyLPrjl5qfEX7ByRwcPYimysA DOako6cstCrjJ3t80MTbJaySthjjBgo7Z4ZboyZbWj/VTToa2wLRxeD79FHy/JiKHucr SO3+iWrg2DiKoAcGpX9kfubuMDLUFWD3yYf4kzBy8GeGz9yAIUH1m/VIZw5WuJeYwBHX CW21xSCwjxJ/17+TfgVraNba9Qj2Py7Xg3aVVCabQa8WlivH0e9O8I2adaAuY/COc4LA vpHw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1687961586; x=1690553586; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=loP5wWKD0zyTlNRt8BejD15MO3zSsVlgQKC+p/3HpNI=; b=k/aIXgmypFXwLCShMIo4+4AQem7I4P1wq5X6sSHSs2zWhV6+lFtPCwlpLluvnaYMFJ m2VI6JJDQmEQYRk0mBhs4YHht4W9kl2anKIuaib+zY3zHnEDhF2tHz6I7EIwKTdlUCCM dl8Y6UxXOL9Nfy89s/VYqNiOT+pCj8AGT9YdFrKXn1sWcCpczTaxEuaquBs2yz7AaK/r Nts35DG2opLIeV/IbdzRSnliTc1xW6L7cjQaunPdFN9SXlVevaxH+v4wA73v1jvXFryu OsQ4kfTV5SYQ5SA9pHls8P+syudM0SkxLegbJ/djXTOuH184r1ThDGmZmzSQOFrdt89u Zmeg== X-Gm-Message-State: AC+VfDy3EbN5j7FO+8QLLFcjAL8Z1xPbIv9MXMCsmVAskX3AhzEoCBB6 cxgYtG9Sk0hJhgPLIxxPE5ToL53Pm213hB5B4MXDwA== X-Google-Smtp-Source: ACHHUZ6iJFRGA/uVKHf1TSYrh7JVPNyTXE0qoagVdokgOhdyygvYw+bJt+sj0caKH2sNVsSWBsG0qA== X-Received: by 2002:a17:903:1112:b0:1ac:8475:87c5 with SMTP id n18-20020a170903111200b001ac847587c5mr9355501plh.56.1687961585709; Wed, 28 Jun 2023 07:13:05 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id b19-20020a170902d89300b001b3ce619e2esm7792092plz.179.2023.06.28.07.13.04 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 28 Jun 2023 07:13:05 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 03/29] libcap: CVE-2023-2602 Memory Leak on pthread_create() Error Date: Wed, 28 Jun 2023 04:12:28 -1000 Message-Id: <7e4f3c51c0bac772bf56f69a3c065b2b2d095335.1687961326.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 28 Jun 2023 14:13:08 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/183558 From: Hitendra Prajapati Upstream-Status: Backport from https://git.kernel.org/pub/scm/libs/libcap/libcap.git/patch/?id=bc6b36682f188020ee4770fae1d41bde5b2c97bb Signed-off-by: Hitendra Prajapati Signed-off-by: Steve Sakoman --- .../libcap/files/CVE-2023-2602.patch | 45 +++++++++++++++++++ meta/recipes-support/libcap/libcap_2.66.bb | 1 + 2 files changed, 46 insertions(+) create mode 100644 meta/recipes-support/libcap/files/CVE-2023-2602.patch diff --git a/meta/recipes-support/libcap/files/CVE-2023-2602.patch b/meta/recipes-support/libcap/files/CVE-2023-2602.patch new file mode 100644 index 0000000000..1ad5aeb826 --- /dev/null +++ b/meta/recipes-support/libcap/files/CVE-2023-2602.patch @@ -0,0 +1,45 @@ +From bc6b36682f188020ee4770fae1d41bde5b2c97bb Mon Sep 17 00:00:00 2001 +From: "Andrew G. Morgan" +Date: Wed, 3 May 2023 19:18:36 -0700 +Subject: Correct the check of pthread_create()'s return value. + +This function returns a positive number (errno) on error, so the code +wasn't previously freeing some memory in this situation. + +Discussion: + + https://stackoverflow.com/a/3581020/14760867 + +Credit for finding this bug in libpsx goes to David Gstir of +X41 D-Sec GmbH (https://x41-dsec.de/) who performed a security +audit of the libcap source code in April of 2023. The audit +was sponsored by the Open Source Technology Improvement Fund +(https://ostif.org/). + +Audit ref: LCAP-CR-23-01 (CVE-2023-2602) + +Signed-off-by: Andrew G. Morgan + +Upstream-Status: Backport [https://git.kernel.org/pub/scm/libs/libcap/libcap.git/patch/?id=bc6b36682f188020ee4770fae1d41bde5b2c97bb] +CVE: CVE-2023-2602 +Signed-off-by: Hitendra Prajapati +--- + psx/psx.c | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/psx/psx.c b/psx/psx.c +index d9c0485..65eb2aa 100644 +--- a/psx/psx.c ++++ b/psx/psx.c +@@ -516,7 +516,7 @@ int __wrap_pthread_create(pthread_t *thread, const pthread_attr_t *attr, + pthread_sigmask(SIG_BLOCK, &sigbit, NULL); + + int ret = __real_pthread_create(thread, attr, _psx_start_fn, starter); +- if (ret == -1) { ++ if (ret > 0) { + psx_new_state(_PSX_CREATE, _PSX_IDLE); + memset(starter, 0, sizeof(*starter)); + free(starter); +-- +2.25.1 + diff --git a/meta/recipes-support/libcap/libcap_2.66.bb b/meta/recipes-support/libcap/libcap_2.66.bb index c50e9d8cc7..d3189fb105 100644 --- a/meta/recipes-support/libcap/libcap_2.66.bb +++ b/meta/recipes-support/libcap/libcap_2.66.bb @@ -16,6 +16,7 @@ DEPENDS = "hostperl-runtime-native gperf-native" SRC_URI = "${KERNELORG_MIRROR}/linux/libs/security/linux-privs/${BPN}2/${BPN}-${PV}.tar.xz \ file://0001-ensure-the-XATTR_NAME_CAPS-is-defined-when-it-is-use.patch \ file://0002-tests-do-not-run-target-executables.patch \ + file://CVE-2023-2602.patch \ " SRC_URI:append:class-nativesdk = " \ file://0001-nativesdk-libcap-Raise-the-size-of-arrays-containing.patch \ From patchwork Wed Jun 28 14:12:29 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 26598 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id E13E0EB64DD for ; Wed, 28 Jun 2023 14:13:17 +0000 (UTC) Received: from mail-pl1-f180.google.com (mail-pl1-f180.google.com [209.85.214.180]) by mx.groups.io with SMTP id smtpd.web10.17360.1687961588654091062 for ; Wed, 28 Jun 2023 07:13:08 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=pYZDemsO; spf=softfail (domain: sakoman.com, ip: 209.85.214.180, mailfrom: steve@sakoman.com) Received: by mail-pl1-f180.google.com with SMTP id d9443c01a7336-1b7f68f1c9eso34592515ad.2 for ; Wed, 28 Jun 2023 07:13:08 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1687961588; x=1690553588; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=D9O6g2y27KFFx+IxcT+fWf67vv1qlo8LOADAl2gQhV8=; b=pYZDemsOxxKAHvmbfZw6cTY+fjHS4He6yaCRTQrsQHYfLzUEquK+6fI2VBpN+A2svp 3wr7D1sfw6Y/8inUP2Mr7s3s6xrawMcrIszRSy6/hKKoqG/cbxS3jveX9CmFbSgBoQID VUlu/yeMyQejJvZS1ad7UhYGJhgNu6XMtLx07lELx2Soj3DR9buBO94S0jr8oKrFDAVy VK94Is0navXQSfAARH7adRREEjhNXzfEi05R1cHnX3Pdrs1ePIqgIXFQKpoRIMROsEG9 TBkDaJeNIkWKFoij2n/qqbInWq5CKXPrhgs36aJDojfe9fDky7x6X/6vlRn0lqpmaX2x 57tg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1687961588; x=1690553588; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=D9O6g2y27KFFx+IxcT+fWf67vv1qlo8LOADAl2gQhV8=; b=enqBJwZ++DFLRMzEfaTzX9lF3liU8nAAOfhASyexlch66Hhn8TMcOHO8F8jJ7HicTR Y4GbTzdFHCrgOQpiPKMz/0l96vKMJS2a3umVyfdbvQe1+oaQj8J8WK8CoNzOPi/ifYub aS4uw8mV8KNtz02rcQc7tN4WjqMEeJPOcNj0D9UVhfGdyAaYoaepBRPL0W/AmP75a70z xTmts0hQxLQE8nvcpvBW7yK2Bmed4/03x7zS/FV6mZRXMhV5DXKcS22p0iJNzh4r8J4E UYVUzlNdrwVa8PYmfT3MorUXtJF2ujRKBa5a0yzFF+74qUGzFGzlSaH7Ss0jwQb+hc+C g2zQ== X-Gm-Message-State: AC+VfDxoxL07yILKA3kbC2Nh+tb3VWfduiRwLJ31Up40stFX32jZkcPV V0tu+UOa8jLdujWQhTEuOjC8PoBvwYZ73BXR9ls2gg== X-Google-Smtp-Source: ACHHUZ7X/zW2/vtpvnFCAQHcWS4pw9ZHcwn5unZoeaPYQpXQpGu56INMBeDXItl6rhcD8uzbd4OYqg== X-Received: by 2002:a17:902:f541:b0:1b6:7172:62ec with SMTP id h1-20020a170902f54100b001b6717262ecmr16924577plf.66.1687961587763; Wed, 28 Jun 2023 07:13:07 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id b19-20020a170902d89300b001b3ce619e2esm7792092plz.179.2023.06.28.07.13.06 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 28 Jun 2023 07:13:07 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 04/29] ninja: ignore CVE-2021-4336, wrong ninja Date: Wed, 28 Jun 2023 04:12:29 -1000 Message-Id: <804067b760591d33cd49f8c31fa68a92fcbf5445.1687961326.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 28 Jun 2023 14:13:17 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/183559 From: Ross Burton (From OE-Core rev: c2dd2c13ff26c3f046e35a2f6b8afeb099ef422a) Signed-off-by: Ross Burton Signed-off-by: Richard Purdie (cherry picked from commit 9a106486ad7900924a87c5869702903204a35b54) Signed-off-by: virendra thakur Signed-off-by: Steve Sakoman --- meta/recipes-devtools/ninja/ninja_1.10.2.bb | 3 +++ 1 file changed, 3 insertions(+) diff --git a/meta/recipes-devtools/ninja/ninja_1.10.2.bb b/meta/recipes-devtools/ninja/ninja_1.10.2.bb index 7270321d6e..1509a54c9e 100644 --- a/meta/recipes-devtools/ninja/ninja_1.10.2.bb +++ b/meta/recipes-devtools/ninja/ninja_1.10.2.bb @@ -29,3 +29,6 @@ do_install() { } BBCLASSEXTEND = "native nativesdk" + +# This is a different Ninja +CVE_CHECK_IGNORE += "CVE-2021-4336" From patchwork Wed Jun 28 14:12:30 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 26599 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D5853EB64DA for ; Wed, 28 Jun 2023 14:13:17 +0000 (UTC) Received: from mail-pl1-f177.google.com (mail-pl1-f177.google.com [209.85.214.177]) by mx.groups.io with SMTP id smtpd.web10.17361.1687961590567744761 for ; Wed, 28 Jun 2023 07:13:10 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=xtpChx3q; spf=softfail (domain: sakoman.com, ip: 209.85.214.177, mailfrom: steve@sakoman.com) Received: by mail-pl1-f177.google.com with SMTP id d9443c01a7336-1b7fb02edfaso32156595ad.3 for ; Wed, 28 Jun 2023 07:13:10 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1687961590; x=1690553590; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=6MH2evfLCwvavEsXiq3R8MJDBj6V+g3LE8Iu66LJyPs=; b=xtpChx3qDst0Y7+t43ePHcmjClGxoIVx9wY7HHtVTEdya/Sp4W8D9yHKMdEuwULgJ+ GbJz6VFt7x/uk2vSq+Rjbj99wgcJ5LeD6aog6Qif8swjCbDReQ0V8JGdWLuG5q/gGI9f BxVImmaZ5G2QrTx6Ny3C9YjNEjHYGQraVVM06a8FJrNaFockqkkHDjwkh32WK0zeweH1 OfC3njR4OLUOkHhvPTYjDwKt2I00Sh/5ymlQ1MwSV5OFeUzd4I83VktqQmieSYDQhS0x QxXPLQeS9vailMZIXOaTQBCGVWT6jbkkIlXqpj68vfge+rMbYC3khn0IgEHl8ob3Eb1p IfmA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1687961590; x=1690553590; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=6MH2evfLCwvavEsXiq3R8MJDBj6V+g3LE8Iu66LJyPs=; b=ChJu0OQVpwX2LZgp63WyQnsY8YdXpalBlSiws3BK28pdZSpZMuC4T8a73NJ7FQ9xB8 wOpKk84601zyyq0R0RY+u3NkYdqgEMMm6A2/Y3LP/TJ+coktWDjqheACnU7hSuWTRiJX CfRRQlGkqzo5OwXnLh0DEe7l+wNFrg/RFAUZzYhsf6W7yUOieXL9Fisd4XfvGWTb3ZX/ jYeh/aNjOx4zFGr5gEUXBkzIC3vi+Lkcfe/Nh+m9XhavRCC8lwVmRJ63Mey6cXt6QHgQ uWskEtfQXMRF3j5zhwY2hbWa0PIpeq+OuCVNLY9I1p6OSP3PSdxfAagjjGBMFJ2jhirC X0Sg== X-Gm-Message-State: AC+VfDxRsK4ywpC3XlZOfekw+M5K1xxwB1tgmypa8wS7IudF25224O4q lq+ocxSpYdrLaq2ZpQ2kUzTxIraXcGvoXTuvXCA+tw== X-Google-Smtp-Source: ACHHUZ7B3XOg6NU5w+oL0j/mjBXBCEl3w9O9Bo+CRzcRSFixrQRGoG7NquSArcsyhNgUvuXRPc55PQ== X-Received: by 2002:a17:902:ead5:b0:1b8:2a96:6471 with SMTP id p21-20020a170902ead500b001b82a966471mr4080134pld.46.1687961589383; Wed, 28 Jun 2023 07:13:09 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id b19-20020a170902d89300b001b3ce619e2esm7792092plz.179.2023.06.28.07.13.08 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 28 Jun 2023 07:13:09 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 05/29] go: fix CVE-2023-29402 Date: Wed, 28 Jun 2023 04:12:30 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 28 Jun 2023 14:13:17 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/183560 From: Archana Polampalli The go command may generate unexpected code at build time when using cgo. This may result in unexpected behavior when running a go program which uses cgo. This may occur when running an untrusted module which contains directories with newline characters in their names. Modules which are retrieved using the go command, i.e. via "go get", are not affected (modules retrieved using GOPATH-mode, i.e. GO111MODULE=off, may be affected). References: https://nvd.nist.gov/vuln/detail/CVE-2023-29402 Upstream patches: https://github.com/golang/go/commit/4dae3bbe0e6a5700037bb996ae84d6f457c4f58a Signed-off-by: Archana Polampalli Signed-off-by: Steve Sakoman --- meta/recipes-devtools/go/go-1.17.13.inc | 1 + .../go/go-1.19/CVE-2023-29402.patch | 194 ++++++++++++++++++ 2 files changed, 195 insertions(+) create mode 100644 meta/recipes-devtools/go/go-1.19/CVE-2023-29402.patch diff --git a/meta/recipes-devtools/go/go-1.17.13.inc b/meta/recipes-devtools/go/go-1.17.13.inc index 9af9eb2752..3365075fe5 100644 --- a/meta/recipes-devtools/go/go-1.17.13.inc +++ b/meta/recipes-devtools/go/go-1.17.13.inc @@ -34,6 +34,7 @@ SRC_URI += "\ file://CVE-2023-24539.patch \ file://CVE-2023-29404.patch \ file://CVE-2023-29405.patch \ + file://CVE-2023-29402.patch \ " SRC_URI[main.sha256sum] = "a1a48b23afb206f95e7bbaa9b898d965f90826f6f1d1fc0c1d784ada0cd300fd" diff --git a/meta/recipes-devtools/go/go-1.19/CVE-2023-29402.patch b/meta/recipes-devtools/go/go-1.19/CVE-2023-29402.patch new file mode 100644 index 0000000000..bf1fbbe0d6 --- /dev/null +++ b/meta/recipes-devtools/go/go-1.19/CVE-2023-29402.patch @@ -0,0 +1,194 @@ +From 4dae3bbe0e6a5700037bb996ae84d6f457c4f58a Mon Sep 17 00:00:00 2001 +From: Bryan C. Mills +Date: Fri, 12 May 2023 14:15:16 -0400 +Subject: [PATCH] cmd/go: disallow package directories containing newlines + +Directory or file paths containing newlines may cause tools (such as +cmd/cgo) that emit "//line" or "#line" -directives to write part of +the path into non-comment lines in generated source code. If those +lines contain valid Go code, it may be injected into the resulting +binary. + +(Note that Go import paths and file paths within module zip files +already could not contain newlines.) + +Thanks to Juho Nurminen of Mattermost for reporting this issue. + +Fixes #60167. +Fixes CVE-2023-29402. + +Change-Id: I64572e9f454bce7b685d00e2e6a1c96cd33d53df +Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/1882606 +Reviewed-by: Roland Shoemaker +Run-TryBot: Roland Shoemaker +Reviewed-by: Russ Cox +Reviewed-by: Damien Neil +Reviewed-on: https://go-review.googlesource.com/c/go/+/501226 +Run-TryBot: David Chase +TryBot-Result: Gopher Robot +Reviewed-by: Michael Knyszek + +Upstream-Status: Backport [https://github.com/golang/go/commit/4dae3bbe0e6a5700037bb996ae84d6f457c4f58a] +CVE: CVE-2023-29402 + +Signed-off-by: Archana Polampalli +--- + src/cmd/go/internal/load/pkg.go | 4 + + src/cmd/go/internal/work/exec.go | 6 ++ + src/cmd/go/script_test.go | 1 + + .../go/testdata/script/build_cwd_newline.txt | 100 ++++++++++++++++++ + 4 files changed, 111 insertions(+) + create mode 100644 src/cmd/go/testdata/script/build_cwd_newline.txt + +diff --git a/src/cmd/go/internal/load/pkg.go b/src/cmd/go/internal/load/pkg.go +index a83cc9a..d4da86d 100644 +--- a/src/cmd/go/internal/load/pkg.go ++++ b/src/cmd/go/internal/load/pkg.go +@@ -1897,6 +1897,10 @@ func (p *Package) load(ctx context.Context, opts PackageOpts, path string, stk * + setError(fmt.Errorf("invalid input directory name %q", name)) + return + } ++ if strings.ContainsAny(p.Dir, "\r\n") { ++ setError(fmt.Errorf("invalid package directory %q", p.Dir)) ++ return ++ } + + // Build list of imported packages and full dependency list. + imports := make([]*Package, 0, len(p.Imports)) +diff --git a/src/cmd/go/internal/work/exec.go b/src/cmd/go/internal/work/exec.go +index b35caa4..b1bf347 100644 +--- a/src/cmd/go/internal/work/exec.go ++++ b/src/cmd/go/internal/work/exec.go +@@ -505,6 +505,12 @@ func (b *Builder) build(ctx context.Context, a *Action) (err error) { + b.Print(a.Package.ImportPath + "\n") + } + ++ if p.Error != nil { ++ // Don't try to build anything for packages with errors. There may be a ++ // problem with the inputs that makes the package unsafe to build. ++ return p.Error ++ } ++ + if a.Package.BinaryOnly { + p.Stale = true + p.StaleReason = "binary-only packages are no longer supported" +diff --git a/src/cmd/go/script_test.go b/src/cmd/go/script_test.go +index c0156d0..ce4ff37 100644 +--- a/src/cmd/go/script_test.go ++++ b/src/cmd/go/script_test.go +@@ -182,6 +182,7 @@ func (ts *testScript) setup() { + "devnull=" + os.DevNull, + "goversion=" + goVersion(ts), + ":=" + string(os.PathListSeparator), ++ "newline=\n", + } + if !testenv.HasExternalNetwork() { + ts.env = append(ts.env, "TESTGONETWORK=panic", "TESTGOVCS=panic") +diff --git a/src/cmd/go/testdata/script/build_cwd_newline.txt b/src/cmd/go/testdata/script/build_cwd_newline.txt +new file mode 100644 +index 0000000..61c6966 +--- /dev/null ++++ b/src/cmd/go/testdata/script/build_cwd_newline.txt +@@ -0,0 +1,100 @@ ++[windows] skip 'filesystem normalizes / to \' ++[plan9] skip 'filesystem disallows \n in paths' ++ ++# If the directory path containing a package to be built includes a newline, ++# the go command should refuse to even try to build the package. ++ ++env DIR=$WORK${/}${newline}'package main'${newline}'func main() { panic("uh-oh")'${newline}'/*' ++ ++mkdir $DIR ++cd $DIR ++exec pwd ++cp $WORK/go.mod ./go.mod ++cp $WORK/main.go ./main.go ++cp $WORK/main_test.go ./main_test.go ++ ++! go build -o $devnull . ++stderr 'package example: invalid package directory .*uh-oh' ++ ++! go build -o $devnull main.go ++stderr 'package command-line-arguments: invalid package directory .*uh-oh' ++ ++! go run . ++stderr 'package example: invalid package directory .*uh-oh' ++ ++! go run main.go ++stderr 'package command-line-arguments: invalid package directory .*uh-oh' ++ ++! go test . ++stderr 'package example: invalid package directory .*uh-oh' ++ ++! go test -v main.go main_test.go ++stderr 'package command-line-arguments: invalid package directory .*uh-oh' ++ ++ ++# Since we do preserve $PWD (or set it appropriately) for commands, and we do ++# not resolve symlinks unnecessarily, referring to the contents of the unsafe ++# directory via a safe symlink should be ok, and should not inject the data from ++# the symlink target path. ++ ++[!symlink] stop 'remainder of test checks symlink behavior' ++[short] stop 'links and runs binaries' ++ ++symlink $WORK${/}link -> $DIR ++ ++go run $WORK${/}link${/}main.go ++! stdout panic ++! stderr panic ++stderr '^ok$' ++ ++go test -v $WORK${/}link${/}main.go $WORK${/}link${/}main_test.go ++! stdout panic ++! stderr panic ++stdout '^ok$' # 'go test' combines the test's stdout into stderr ++ ++cd $WORK/link ++ ++! go run $DIR${/}main.go ++stderr 'package command-line-arguments: invalid package directory .*uh-oh' ++ ++go run . ++! stdout panic ++! stderr panic ++stderr '^ok$' ++ ++go run main.go ++! stdout panic ++! stderr panic ++stderr '^ok$' ++ ++go test -v ++! stdout panic ++! stderr panic ++stdout '^ok$' # 'go test' combines the test's stdout into stderr ++ ++go test -v . ++! stdout panic ++! stderr panic ++stdout '^ok$' # 'go test' combines the test's stdout into stderr ++ ++ ++-- $WORK/go.mod -- ++module example ++go 1.19 ++-- $WORK/main.go -- ++package main ++ ++import "C" ++ ++func main() { ++ /* nothing here */ ++ println("ok") ++} ++-- $WORK/main_test.go -- ++package main ++ ++import "testing" ++ ++func TestMain(*testing.M) { ++ main() ++} +-- +2.40.0 From patchwork Wed Jun 28 14:12:31 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 26602 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id E3075EB64DC for ; Wed, 28 Jun 2023 14:13:17 +0000 (UTC) Received: from mail-pl1-f179.google.com (mail-pl1-f179.google.com [209.85.214.179]) by mx.groups.io with SMTP id smtpd.web10.17364.1687961591949717053 for ; Wed, 28 Jun 2023 07:13:12 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="signature has expired" header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=VN4B9YqU; spf=softfail (domain: sakoman.com, ip: 209.85.214.179, mailfrom: steve@sakoman.com) Received: by mail-pl1-f179.google.com with SMTP id d9443c01a7336-1b7f2239bfdso36610135ad.1 for ; Wed, 28 Jun 2023 07:13:11 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1687961591; x=1690553591; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=CclzGX0dvdFc9MEpSOU9PmBwTw4mnPhvoHoARqwPQe8=; b=VN4B9YqU8CkcRMLNsoFSHJvSlc/Fr6FKxevDg90o59LF7CPKa85rK5n7cAUHTC3Mis ISzCO6F3SLhGg6gzdTwTg7Z1D64RNSxGtFVln/CzQ4Ny1t8aKW1bxSE9LDUOTy6Ae7ZX /xEy2+qE6KpeY+kCSg2jKUH2AxHYdER1Sr8UP+9xQD/ILNXDQH4K+z9wMgmrcLkJqxUu QiIZRtROmZaFvuINmyQtYo3Phw66ZnNtWlO5cssORLtEcooSfU7V8HpGMkC8X5UJ2e0h CrDhZkz5cIG3M2oTJvY14/svMaSHJnIrOh+TCjTGjh6afB6WglcC0v2ETFgjZmTxrxlJ sXrQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1687961591; x=1690553591; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=CclzGX0dvdFc9MEpSOU9PmBwTw4mnPhvoHoARqwPQe8=; b=Ows4xSseUkdpEoXAOjIeEkLQIGGgG+ol34dJjGpiuRUdGBn0rlJV2T2xnHp3p6QTqt LyYk6ysee4SHwFy5k8R3rGcL65kFbyjB+9/yAI5GZ9HQAVXWLlfsUvnYZ00N9n/O8zGf pyfNqYySyKqUHqxNs+rNIHAPBt9gamWRg8JmhwIGV+VJ0RfWpdFzSbrbvfEYyn1seuCR ZJgFolvRMyjtIcEsmdWaEV1OgUR9TNtGBy/s/E6hB0oWq7jigCDSQyYYD311+mZfA8cl 0wLjAlBaeBLVobLX8yDZJ8YhACKAdGT+bNrfJBjuQegwfC/QIii2VFexkDNWH7CIztvq pSmQ== X-Gm-Message-State: AC+VfDwMqMgnAc0AsES62TQTomT1542gTD827tHP92PXt9MwoHJYO36U maU6WgiTwgB7j2AG5pUWje5dU7GjjQLgC99hS15OAQ== X-Google-Smtp-Source: ACHHUZ5PGVlLRM/ev7aFHAqwjEcmSGW8cbSjDKQ9vrRYTzmdjK0FmqLpmLQlYQ1EKCiOJhDh7S4faQ== X-Received: by 2002:a17:903:32c9:b0:1b0:f8:9b2d with SMTP id i9-20020a17090332c900b001b000f89b2dmr16177730plr.29.1687961591003; Wed, 28 Jun 2023 07:13:11 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id b19-20020a170902d89300b001b3ce619e2esm7792092plz.179.2023.06.28.07.13.10 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 28 Jun 2023 07:13:10 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 06/29] babeltrace2: upgrade 2.0.4 -> 2.0.5 Date: Wed, 28 Jun 2023 04:12:31 -1000 Message-Id: <56121b2378899b928bec3a4eb8abe487789aff17.1687961326.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 28 Jun 2023 14:13:17 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/183561 From: Wang Mingyu Changelog: ========== * bt2: honor build system compiler/linker preferences * Fix: clear_string_field(): set first character to 0 * Fix: src.ctf.fs: Not resolving event common ctx * debug-info: fix -Wenum-int-mismatch problem in copy_field_class_content_internal * fix: pass exec-prefix to python bindings install * fix: document proper Bison version requirement * cli: use return value of g_string_free * babeltrace2-query(1): erroneous parameter used in example * Fix: tests: print real values in a fixed format * Fix: bt2: autodisc: remove thread error while inserting status in map * tests: src.ctf.fs: add test for metadata with invalid syntax * tests: shorten names of session-rotation trace * bt2: ignore -Wredundant-decls warning * ctf: fix -Wformat-overflow error in ctf-meta-resolve.cpp * ctf-writer: fix -Wformat-overflow errors in resolve.c * Fix: src.text.details: use write_uint_prop_value to handle unsigned values in write_int_range * Add `dev-requirements.txt` for pip * Fix: src.ctf.lttng-live: consider empty metadata packet as retry * Fix: ctf: wrongfully requiring CTF metadata signature for every section * Fix: src.ctf.lttng-live: session closed before any metadata is received * fix: obsolete warnings with autoconf >= 2.71 * fix: explicitly disable '-Wsuggest-attribute=format' * fix: set stable branch in gitreview config * Fix: ctf-writer: list of reserved keywords * compiler warning cleanup: is_signed_type: compare -1 to 1 * Update working version to Babeltrace 2.0.5 Signed-off-by: Wang Mingyu Signed-off-by: Alexandre Belloni (cherry picked from commit ae47b6c2a4bdee031d42687582049c15614faa6d) Signed-off-by: Steve Sakoman --- .../lttng/{babeltrace2_2.0.4.bb => babeltrace2_2.0.5.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta/recipes-kernel/lttng/{babeltrace2_2.0.4.bb => babeltrace2_2.0.5.bb} (98%) diff --git a/meta/recipes-kernel/lttng/babeltrace2_2.0.4.bb b/meta/recipes-kernel/lttng/babeltrace2_2.0.5.bb similarity index 98% rename from meta/recipes-kernel/lttng/babeltrace2_2.0.4.bb rename to meta/recipes-kernel/lttng/babeltrace2_2.0.5.bb index b48f07ea0d..146fe0b835 100644 --- a/meta/recipes-kernel/lttng/babeltrace2_2.0.4.bb +++ b/meta/recipes-kernel/lttng/babeltrace2_2.0.5.bb @@ -12,7 +12,7 @@ SRC_URI = "git://git.efficios.com/babeltrace.git;branch=stable-2.0 \ file://0001-tests-do-not-run-test-applications-from-.libs.patch \ file://0001-Make-manpages-multilib-identical.patch \ " -SRCREV = "23e8cf4e6fdc1d0b230e964dafac08a57e6228e6" +SRCREV = "66e76d1ea601705928899138f02730a3a2a3153d" UPSTREAM_CHECK_GITTAGREGEX = "v(?P2(\.\d+)+)$" S = "${WORKDIR}/git" From patchwork Wed Jun 28 14:12:32 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 26603 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id EFC35C001B1 for ; Wed, 28 Jun 2023 14:13:17 +0000 (UTC) Received: from mail-pl1-f182.google.com (mail-pl1-f182.google.com [209.85.214.182]) by mx.groups.io with SMTP id smtpd.web11.17566.1687961593505481702 for ; Wed, 28 Jun 2023 07:13:13 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="signature has expired" header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=EQGM1iKV; spf=softfail (domain: sakoman.com, ip: 209.85.214.182, mailfrom: steve@sakoman.com) Received: by mail-pl1-f182.google.com with SMTP id d9443c01a7336-1b7e94912daso21614735ad.3 for ; Wed, 28 Jun 2023 07:13:13 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1687961592; x=1690553592; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=MTk4gRRa6hUPTnhQXnxmxgW9dEm5jgMWXprHt+KBi8E=; b=EQGM1iKVSRnhFqpCyWI2b2U8oaOmsv0tgzK7TmdGzEFPMOJOIZtP/wzY15GVk0nAF0 XKCMQtAkFs4PXukB6bcVihyA6EGlpaEA93uQ1NyeQY3eIcxZwbjacBRcxWAeV7wMKGYM vfRaigLVYrdYXvqrtuhHFM6GNPwRViFmAnDip6qyFbeLO33xgp8W+MBJ1IiZpcRill4V PML9+ZHXaZJTqc0pk5/61P9QbOP1fxlK5PtJdAL+sQ3PUotrP9e4qBlvI/d8JgVOAOXC Hx0wmvurA8L86Qj5D3U+CCwYyTONjx+vh7GWXMlcFyyov4cbJ7qubO5rszTATaG055XA AD6A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1687961592; x=1690553592; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=MTk4gRRa6hUPTnhQXnxmxgW9dEm5jgMWXprHt+KBi8E=; b=dCRoz8qkG3lYlP1n3hpMNciZUod9Eu57kZA3eBmUyaBqTt2Et39S2alBykXyyOjetq cPq7HuxfC9g/u/zA3qJnGXezK6e4SHkisO5LOh6CC943bAOIRHzrNvwc/K3eakqVaz4B 4HknJUz5ZStk0IT+hqkBi8ReKX2kELoTM9WUkXC4lDcXKlvhYK88KpvR+U+9gpbgcAVH 9/ovdpfhq3IGlwSyTh6+khzEyUvQgDEP3iMg+l9Q3lClyk9tDALyMyt5+Nn6Itd4B9y8 bAbW1LZkDwXptDXoRN8agz0/ldqT+62W3inGD89keL/zHJ4aAqQR/fSRgwPErzkDgEnP Uthw== X-Gm-Message-State: AC+VfDzv200syeujCYSsQGpS7ifENN79pPeEYkQD4YIgHC3IE4fufb/A Nn3huPYFSsVHH4KMRWVAdXIhF2t6QDiG1/GEaLzxdg== X-Google-Smtp-Source: ACHHUZ7izzUzCLY0usMizAGexp+pW9VT7uLKi5wJ56jEEvu46cSFEn0VUwvnoHhIvxrDHGAtV8jQPg== X-Received: by 2002:a17:902:8a90:b0:1b8:4199:edfb with SMTP id p16-20020a1709028a9000b001b84199edfbmr911410plo.25.1687961592633; Wed, 28 Jun 2023 07:13:12 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id b19-20020a170902d89300b001b3ce619e2esm7792092plz.179.2023.06.28.07.13.11 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 28 Jun 2023 07:13:12 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 07/29] fribidi: upgrade 1.0.12 -> 1.0.13 Date: Wed, 28 Jun 2023 04:12:32 -1000 Message-Id: <7e4915c4be7dca35a63a912a55bcfa525a532e22.1687961326.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 28 Jun 2023 14:13:17 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/183562 From: Wang Mingyu Changelog: * Adding missing man pages to the tar release file. Signed-off-by: Wang Mingyu Signed-off-by: Alexandre Belloni (cherry picked from commit 0f6da8601fd4d992550e8afe7b09ba7c491250fd) Signed-off-by: Steve Sakoman --- .../fribidi/{fribidi_1.0.12.bb => fribidi_1.0.13.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta/recipes-support/fribidi/{fribidi_1.0.12.bb => fribidi_1.0.13.bb} (90%) diff --git a/meta/recipes-support/fribidi/fribidi_1.0.12.bb b/meta/recipes-support/fribidi/fribidi_1.0.13.bb similarity index 90% rename from meta/recipes-support/fribidi/fribidi_1.0.12.bb rename to meta/recipes-support/fribidi/fribidi_1.0.13.bb index b29c47822f..cdcac9315b 100644 --- a/meta/recipes-support/fribidi/fribidi_1.0.12.bb +++ b/meta/recipes-support/fribidi/fribidi_1.0.13.bb @@ -11,7 +11,7 @@ LIC_FILES_CHKSUM = "file://COPYING;md5=a916467b91076e631dd8edb7424769c7" SRC_URI = "https://github.com/${BPN}/${BPN}/releases/download/v${PV}/${BP}.tar.xz \ " -SRC_URI[sha256sum] = "0cd233f97fc8c67bb3ac27ce8440def5d3ffacf516765b91c2cc654498293495" +SRC_URI[sha256sum] = "7fa16c80c81bd622f7b198d31356da139cc318a63fc7761217af4130903f54a2" UPSTREAM_CHECK_URI = "https://github.com/${BPN}/${BPN}/releases" From patchwork Wed Jun 28 14:12:33 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 26601 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D5827EB64D7 for ; Wed, 28 Jun 2023 14:13:17 +0000 (UTC) Received: from mail-pl1-f171.google.com (mail-pl1-f171.google.com [209.85.214.171]) by mx.groups.io with SMTP id smtpd.web11.17567.1687961595167255590 for ; Wed, 28 Jun 2023 07:13:15 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="signature has expired" header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=cT68fuAb; spf=softfail (domain: sakoman.com, ip: 209.85.214.171, mailfrom: steve@sakoman.com) Received: by mail-pl1-f171.google.com with SMTP id d9443c01a7336-1b7ef3e74edso23653105ad.0 for ; Wed, 28 Jun 2023 07:13:15 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1687961594; x=1690553594; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=nnfijqIZ9esSVtXNRsoz+VsF6XI0oy3HCkZ1TdhUHCE=; b=cT68fuAbRRu0H+fspn1Eyz8vHJ07xvcMICY5lCzzzQP2wxJRtxoXgroVscI4AMT+S/ AnvEgq9k3DVkYoaQxdgCqkXg9/dwH+1IvYiSzrl672vhYjukYNh8rjmN9+wLFwdMdXny Rn38bfkGV44JPhCjJDsh0mGASzejA2bTbYeh7dtuB6QBSfKLQL23vHIxnZ5Vl69e4MhJ ltEC2SaxgyGDXZ5COGteBa9rQ8RtZrKy7YngepTS/cg01XMQKeVnGn5lvuXT+H3zcw9+ LRG77tQmcJQLfKMsKQZpFVVO0hbiDiPKFZXb61pCYKEq0XyjHSQewqvz65tkeb+YkxTM JrdQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1687961594; x=1690553594; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=nnfijqIZ9esSVtXNRsoz+VsF6XI0oy3HCkZ1TdhUHCE=; b=h801ulgTFHMbUOFp7PE7DLaUtc6mYTkUBfEsA1vNhVcUYERycELw2AtjAWUIvVK/P8 n+ZL3H+im3XBZ7o27oBD+DFaA+EDzohyOnI/IntMI40wOFLRbaTBD9Lfhmru+MC5jo5x La3adp11Bz0LhNxgigqeJxvn829/iJKHuMgSwMrRUqy2EO5u9fyNorwVYO7iuTh8aXhh /8tLm2cYtaxxeg9uqhG2SCjNy1MJOGuUpsGLrY9rF9SNOqZq6Ifak0OtT3alQDWzY5sj wFUDDm1VsOE/bxwEtjDG2mKfDXTBPZlSUHi76ckthpkVJEbCpeYoYkZp7Ea6OqVMAyH3 QFuQ== X-Gm-Message-State: AC+VfDyTpCoCwWd8Zbe9igmFCx3pKexTY6NCLFwVE0MVOpuVCwIGWif7 e8YRd3jMioC0OQR2nuA8v9sd8xQ+0WqR5SMweJZ2wQ== X-Google-Smtp-Source: ACHHUZ4HmgkMaMn0dS2KXToMBXyB2sLF0lXSK2Y+qng7ZlEKDkP3QbK9SC987rrMybZGrSnSvWNzWA== X-Received: by 2002:a17:902:ec8f:b0:1b6:b445:36d4 with SMTP id x15-20020a170902ec8f00b001b6b44536d4mr9347962plg.43.1687961594213; Wed, 28 Jun 2023 07:13:14 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id b19-20020a170902d89300b001b3ce619e2esm7792092plz.179.2023.06.28.07.13.13 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 28 Jun 2023 07:13:13 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 08/29] libxpm: upgrade 3.5.15 -> 3.5.16 Date: Wed, 28 Jun 2023 04:12:33 -1000 Message-Id: <22d9e097538f84a12dd262c1ae936fb8107c2768.1687961326.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 28 Jun 2023 14:13:17 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/183563 From: Wang Mingyu Changelog: =========== test: skip compressed file tests when --disable-open-zfile is used itlab CI: build with each of --enable-open-zfile & --disable-open-zfile configure: correct error message to suggest --disable-open-zfile Fix a memleak in ParsePixels error code path Fix CVE-2022-44617: Runaway loop with width of 0 and enormous height open-zfile: Make compress & uncompress commands optional Require LT_INIT from libtool 2 instead of deprecated AC_PROG_LIBTOOL test: Use PACKAGE_BUGREPORT instead of hard-coded URL's test: Add simple test cases for functions in src/rgb.c xpmReadRgbNames: constify filename argument XpmCreateDataFromXpmImage: Fix misleading indentation parse.c: Wrap FREE_CIDX definition in do { ... } while(0) parse.c: remove unused function xstrlcpy() Signed-off-by: Wang Mingyu Signed-off-by: Alexandre Belloni (cherry picked from commit 4d9f0958eecdf683434d77a4f65611803cffd247) Signed-off-by: Steve Sakoman --- .../xorg-lib/{libxpm_3.5.15.bb => libxpm_3.5.16.bb} | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) rename meta/recipes-graphics/xorg-lib/{libxpm_3.5.15.bb => libxpm_3.5.16.bb} (83%) diff --git a/meta/recipes-graphics/xorg-lib/libxpm_3.5.15.bb b/meta/recipes-graphics/xorg-lib/libxpm_3.5.16.bb similarity index 83% rename from meta/recipes-graphics/xorg-lib/libxpm_3.5.15.bb rename to meta/recipes-graphics/xorg-lib/libxpm_3.5.16.bb index 22e322a9eb..28a775c5f4 100644 --- a/meta/recipes-graphics/xorg-lib/libxpm_3.5.15.bb +++ b/meta/recipes-graphics/xorg-lib/libxpm_3.5.16.bb @@ -23,7 +23,6 @@ PACKAGES =+ "sxpm cxpm" FILES:cxpm = "${bindir}/cxpm" FILES:sxpm = "${bindir}/sxpm" -SRC_URI[md5sum] = "b3c58c94e284fd6940d3615e660a0007" -SRC_URI[sha256sum] = "60bb906c5c317a6db863e39b69c4a83fdbd2ae2154fcf47640f8fefc9fdfd1c1" +SRC_URI[sha256sum] = "e6bc5da7a69dbd9bcc67e87c93d4904fe2f5177a0711c56e71fa2f6eff649f51" BBCLASSEXTEND = "native" From patchwork Wed Jun 28 14:12:34 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 26600 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id E26D9C0015E for ; Wed, 28 Jun 2023 14:13:17 +0000 (UTC) Received: from mail-pl1-f175.google.com (mail-pl1-f175.google.com [209.85.214.175]) by mx.groups.io with SMTP id smtpd.web10.17368.1687961596890561163 for ; Wed, 28 Jun 2023 07:13:16 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=gJ2eRdAs; spf=softfail (domain: sakoman.com, ip: 209.85.214.175, mailfrom: steve@sakoman.com) Received: by mail-pl1-f175.google.com with SMTP id d9443c01a7336-1b7f2239bfdso36611495ad.1 for ; Wed, 28 Jun 2023 07:13:16 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1687961596; x=1690553596; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=uGCBDOA896sHrJlJ8ZR1dGx0s8LXp6rHm6o9eel3Bhs=; b=gJ2eRdAsZYyuLc8+RyXygyE2wc815YfXb8yn+3NPFCfceDpI+wSye+5iTKKf/6wRPX BQNSoQiOtifgS8ASgqoaKbqKfda/g3yAUoARmPZR72Ux/Hizv/FcV4fQTvKulbEoSB8W bxZkfUDD76jgKoz0ySxhnuuXXkC8Mk580REst3S/YOLsOFRv1idwN30KMkG6X76E3O+r 8uDIjqYFFGvxzLtY5IJN3JADl28ABCpTeq/RV5n57BtH8KD/eBrGs7awW1VKA9sHSqte Z7FjbPaeKgAfzkgPuRIvNYGvYh7AT+FCPKXo4JPGMF0NrdtjE2oSE6Y95lE2gNZjommD aZKg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1687961596; x=1690553596; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=uGCBDOA896sHrJlJ8ZR1dGx0s8LXp6rHm6o9eel3Bhs=; b=L3c3G7A5hKQ6Kz86qQl/HMGdbomF2pHirk+3VhH7GbPQcTEue2XZtVcXz57qqT+MO+ ZP7oeZjly6IE8MtL+DcOT8sFYuqjDD90PRBKCHdLyIPuEUXtKLV2vka53vNPNrpN06+S /pezAauPvd6bMUWGT1lvY+GMVQ92L/3uiUk+82tP3STqm9h7GQtmg8+C8kMR88IhjPkM iPgLM9b1ZNVb6oSq2bKMoTxk3IDz4Woi0Efb80+mFq6COvNDg74MD+0uY5/srnpk0G79 tri1PPfmGOeoDUQcR6m9xD49lesqYRPRCZH2CfiWw7sEveOHPqCjZMZFTJfEIsooTHWl Bvbg== X-Gm-Message-State: AC+VfDxmXm/tqfo7B1KEfeFRUUCY62+MnzvZH3w90X45q5QYTDnwNXSh vqGy9guCo2q9ItIEvm3Ljq1xbFHkuscHEFPgpfPjuA== X-Google-Smtp-Source: ACHHUZ55YEA5QWwCfYoC64OfesRyyU/T3wa/uV7v+MYFgpwgbeN4XUpj7H4C2Ctust0cO2wuo/Rqpw== X-Received: by 2002:a17:903:228c:b0:1b6:66f1:35b3 with SMTP id b12-20020a170903228c00b001b666f135b3mr15382805plh.50.1687961595931; Wed, 28 Jun 2023 07:13:15 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id b19-20020a170902d89300b001b3ce619e2esm7792092plz.179.2023.06.28.07.13.15 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 28 Jun 2023 07:13:15 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 09/29] xdpyinfo: upgrade 1.3.3 -> 1.3.4 Date: Wed, 28 Jun 2023 04:12:34 -1000 Message-Id: <74fef3bca108017f8a1ce0e451b4b2172ae28fcf.1687961326.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 28 Jun 2023 14:13:17 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/183564 From: Wang Mingyu Changelog: ========= configure: Make xf86misc support disabled by default Variable scope reduction Remove unnecessary downcast of double to float Call memset() instead of hand-coding our own equivalent Signed-off-by: Wang Mingyu Signed-off-by: Alexandre Belloni (cherry picked from commit d87785189336a69ae998f75394ceaebf63decb16) Signed-off-by: Steve Sakoman --- .../xorg-app/{xdpyinfo_1.3.3.bb => xdpyinfo_1.3.4.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta/recipes-graphics/xorg-app/{xdpyinfo_1.3.3.bb => xdpyinfo_1.3.4.bb} (88%) diff --git a/meta/recipes-graphics/xorg-app/xdpyinfo_1.3.3.bb b/meta/recipes-graphics/xorg-app/xdpyinfo_1.3.4.bb similarity index 88% rename from meta/recipes-graphics/xorg-app/xdpyinfo_1.3.3.bb rename to meta/recipes-graphics/xorg-app/xdpyinfo_1.3.4.bb index e75a840b7d..aaa8aa8903 100644 --- a/meta/recipes-graphics/xorg-app/xdpyinfo_1.3.3.bb +++ b/meta/recipes-graphics/xorg-app/xdpyinfo_1.3.4.bb @@ -15,6 +15,6 @@ PE = "1" SRC_URI += "file://disable-xkb.patch" SRC_URI_EXT = "xz" -SRC_URI[sha256sum] = "356d5fd62f3e98ee36d6becf1b32d4ab6112d618339fb4b592ccffbd9e0fc206" +SRC_URI[sha256sum] = "a8ada581dbd7266440d7c3794fa89edf6b99b8857fc2e8c31042684f3af4822b" EXTRA_OECONF = "--disable-xkb" From patchwork Wed Jun 28 14:12:35 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 26606 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id DBD75C3DA41 for ; Wed, 28 Jun 2023 14:13:27 +0000 (UTC) Received: from mail-pl1-f171.google.com (mail-pl1-f171.google.com [209.85.214.171]) by mx.groups.io with SMTP id smtpd.web11.17572.1687961598517652090 for ; Wed, 28 Jun 2023 07:13:18 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="signature has expired" header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=Leqsmi8V; spf=softfail (domain: sakoman.com, ip: 209.85.214.171, mailfrom: steve@sakoman.com) Received: by mail-pl1-f171.google.com with SMTP id d9443c01a7336-1b7f92b764dso21122445ad.2 for ; Wed, 28 Jun 2023 07:13:18 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1687961597; x=1690553597; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=ZmmogTFLL4oQS0DV6JnOIMSKXocWeCPp3enqdNjH7kc=; b=Leqsmi8VmkDXqFnklFVba2NUEJ47CJlJKtukUjFZo/owf/KMavr0LFWicLV1bIZs2u JMsGSVJaLKN32JPrdfKwwAaAl5p2sixZbmAvPvhu6xJPa2NaYiHzipuMckm2IoD5Cpli xRrB6F4VEzP9fzdsLrk+2vG2IavlzN3CVSc9b6NsiHnOkx56R9pMhrsQ1vqPKhTOTYx3 tPiqIjDBu87f0rrkZsfCyIqH9+i1mAAcP8rGF5G/FXg7/9y5ucUerw4obkDQQ6MH6cEY 8vbUYc8NbH7SU/CgNg3EcrIcz0i0uP5hwHsQuGdjuWs+OU1antE6YVzkfNNHeivYfP9q LtFQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1687961597; x=1690553597; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=ZmmogTFLL4oQS0DV6JnOIMSKXocWeCPp3enqdNjH7kc=; b=Tlei9aMPGF90vZ2UUM43uvRJYDCKS6txnQU3q4zC6w7tAkWxoxWRMBaDigWgMFM473 b93VGz/w+MbWRtlPjX0ym3zKr0gAku2tqV9HX0xbHEeIbxUzzva4wkkYnz1yOge3skKa 80bKn8YWHLYAmAKr3MsiuAjom/exhST6T760nHaeTlAuXOlQOn3MxAgxc9rQWTD4MRBL GsDqcTkOJVyRWmD6+u3dYEaIe+8Npn47X+o8k6gPGLyJwyGx7NYU/4nno15/XhIb1KFd 3F3E1MozymHvlUYSa8iiVfeTf/hJa/kGHYiNumUZSp6pHw45IiK0jWDcyEB0jwMv0IBX fZuQ== X-Gm-Message-State: AC+VfDxV99pKF3t1X8UHrRFfKNZ0Z7cAwEcfk4AARMGCqU1fTAmHFhGL 3lJBJG0KnDV7AnDrbFNkNW2XmuaEFiNZfKkX4CAiaw== X-Google-Smtp-Source: ACHHUZ4gCq/U9dep+F8kCI6ICCEW9SrKs1MHtsL8I8MqoTU5W3fSWzy9UAYXLv2zNDkEciwXlAYk2Q== X-Received: by 2002:a17:903:48c:b0:1b6:b100:1cfe with SMTP id jj12-20020a170903048c00b001b6b1001cfemr7954488plb.1.1687961597596; Wed, 28 Jun 2023 07:13:17 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id b19-20020a170902d89300b001b3ce619e2esm7792092plz.179.2023.06.28.07.13.16 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 28 Jun 2023 07:13:17 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 10/29] mobile-broadband-provider-info: upgrade 20221107 -> 20230416 Date: Wed, 28 Jun 2023 04:12:35 -1000 Message-Id: <82cffbc90caeff76a8ebb7ff1527b69e21b8a967.1687961326.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 28 Jun 2023 14:13:27 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/183565 From: Wang Mingyu Signed-off-by: Wang Mingyu Signed-off-by: Alexandre Belloni (cherry picked from commit 125f72393c9b6fea02757cdc3a22696945e0f490) Signed-off-by: Steve Sakoman --- .../mobile-broadband-provider-info_git.bb | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/meta/recipes-connectivity/mobile-broadband-provider-info/mobile-broadband-provider-info_git.bb b/meta/recipes-connectivity/mobile-broadband-provider-info/mobile-broadband-provider-info_git.bb index e802bcee18..a4030b7b32 100644 --- a/meta/recipes-connectivity/mobile-broadband-provider-info/mobile-broadband-provider-info_git.bb +++ b/meta/recipes-connectivity/mobile-broadband-provider-info/mobile-broadband-provider-info_git.bb @@ -5,8 +5,8 @@ SECTION = "network" LICENSE = "PD" LIC_FILES_CHKSUM = "file://COPYING;md5=87964579b2a8ece4bc6744d2dc9a8b04" -SRCREV = "22a5de3ef637990ce03141f786fbdb327e9c5a3f" -PV = "20221107" +SRCREV = "aae7c68671d225e6d35224613d5b98192b9b2ffe" +PV = "20230416" PE = "1" SRC_URI = "git://gitlab.gnome.org/GNOME/mobile-broadband-provider-info.git;protocol=https;branch=main" From patchwork Wed Jun 28 14:12:36 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 26604 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D5F42EB64D7 for ; Wed, 28 Jun 2023 14:13:27 +0000 (UTC) Received: from mail-pl1-f169.google.com (mail-pl1-f169.google.com [209.85.214.169]) by mx.groups.io with SMTP id smtpd.web11.17575.1687961600196493499 for ; Wed, 28 Jun 2023 07:13:20 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="signature has expired" header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=zEunxw9y; spf=softfail (domain: sakoman.com, ip: 209.85.214.169, mailfrom: steve@sakoman.com) Received: by mail-pl1-f169.google.com with SMTP id d9443c01a7336-1b7db2e162cso25382545ad.1 for ; Wed, 28 Jun 2023 07:13:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1687961599; x=1690553599; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=4XvyFCPLQ5TojzI2yBMnY5hA7GUBcDEqzoNguv/9evM=; b=zEunxw9yleDo8zGAfxfExU2HaD66wAz/e05zpXh/TugnIUFoDETlRb9DloQqxRL49g C09raWrgHfWelOCLcUdSd04h0CMWybbV8TCn8Btt/ML7PeHZhcHJDsZi73kzawlX9C7K Ig3jvzyRxQkY2dJKnRAHjsLGVF3tgAHTr8mR3x/3xVxrAJGlLDX5/UprbuFDvLlxSJIx GwKC+e2z/z6HhaPu4SJ+zGZyO2c2gBjtUq4mWeb1xmkPEzXkb7vd4eMVwgcU1gzZpj9Z IKKuRMWRI+EJ3xsUhxoxR+rjHHqfZLEQWJJ/dvLDZSzx5BRCcX2XhNuGelfxHRfdrpb6 2DeQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1687961599; x=1690553599; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=4XvyFCPLQ5TojzI2yBMnY5hA7GUBcDEqzoNguv/9evM=; b=CLeGYvMTylvCuu5Y7aYO5Ej7ZXGTlYxQUNmAsEbmW9Y2Weg0QncVrt55HQmNlNwRYD Mkq3NOXF45/aWEmCu7+SM5G4z93E7X9Xy/s6HMWLgQRrdwYQrZK9gz0Djim9AHSW3qPU h8dtO8k6a43/7TJhZBm8Z/PkaO6TMKjWzoE5LYxjgJhnUeiMf7Hu6RGKn61tSjjCYVTA sMHu1MLcY9Qrgsb4lGUv9AMpWQObKAIopFKdvlr76FLbEfzQ2M5nZ370wmWhYTz3nCEd Z8f4UCWjZbey7homTUNr6I4usRx545aNFZrF5gbQbGSBDuRYvhiaYbzh1NKchpdteL6e mMyQ== X-Gm-Message-State: AC+VfDxu7LFiEIFgtMo8Qt8gaS8BLo89Vo5DCb9xE91sYYPnnRQSF3bJ N0ukGnzEN+/ELMIf3vX+CCPRfBY/ZXq/gqz1v379Rg== X-Google-Smtp-Source: ACHHUZ4hxDdj6n1k/noGGVR7Jk5PovCKh0ZX+/NAzPyffz/TpeyvVWbycwRhG+OMGGkG+uyRYD00ZA== X-Received: by 2002:a17:902:ea02:b0:1b6:b95d:768e with SMTP id s2-20020a170902ea0200b001b6b95d768emr11638036plg.32.1687961599288; Wed, 28 Jun 2023 07:13:19 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id b19-20020a170902d89300b001b3ce619e2esm7792092plz.179.2023.06.28.07.13.18 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 28 Jun 2023 07:13:18 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 11/29] dbus: upgrade 1.14.6 -> 1.14.8 Date: Wed, 28 Jun 2023 04:12:36 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 28 Jun 2023 14:13:27 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/183566 From: Xiangyu Chen Update dbus to 1.14.8 to fix CVE-2023-34969 and serveral bugs changes: https://gitlab.freedesktop.org/dbus/dbus/-/blob/f90d4f16933ee5153fe02c405eb883c9cb8f0ad5/NEWS commits: 55d11f57 doc/dbus-api-design: fix wrong closing tag a96f417f CI: Run a detached pipeline for merge requests 9e0477fc CI: Only run for pushes to dbus 077f7e43 CI: Remove an obsolete workaround 07fe44f4 CI: Update Windows runners ec708d55 CI: Avoid using a no-op download location that gives a 403 error 45e6e93e dbus_message_iter_get_signature: Fix two memory leaks on OOM 0bb1942e dbus-internals: use `_DBUS_FUNCTION_NAME` in `_dbus_verbose()` 8df1b8be dbus-sysdeps-win: do not log function name twice 5c3a4e81 dbus-spawn-win: use `_DBUS_FUNCTION_NAME` instead of `__FUNCTION__` 8e457296 Update NEWS e1ffce17 Revert "CI: Remove an obsolete workaround" 40c0802f monitor test: Log the messages that we monitored a70c8f2f bus: Assign a serial number for messages from the driver 39b5c617 monitor test: Reproduce #457 f99e5de1 Update NEWS 21414587 AUTHORS: Update f90d4f16 Release v1.14.8 Signed-off-by: Xiangyu Chen Signed-off-by: Steve Sakoman --- meta/recipes-core/dbus/{dbus_1.14.6.bb => dbus_1.14.8.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta/recipes-core/dbus/{dbus_1.14.6.bb => dbus_1.14.8.bb} (98%) diff --git a/meta/recipes-core/dbus/dbus_1.14.6.bb b/meta/recipes-core/dbus/dbus_1.14.8.bb similarity index 98% rename from meta/recipes-core/dbus/dbus_1.14.6.bb rename to meta/recipes-core/dbus/dbus_1.14.8.bb index cc81047cef..2ba56bf782 100644 --- a/meta/recipes-core/dbus/dbus_1.14.6.bb +++ b/meta/recipes-core/dbus/dbus_1.14.8.bb @@ -16,7 +16,7 @@ SRC_URI = "https://dbus.freedesktop.org/releases/dbus/dbus-${PV}.tar.xz \ file://dbus-1.init \ " -SRC_URI[sha256sum] = "fd2bdf1bb89dc365a46531bff631536f22b0d1c6d5ce2c5c5e59b55265b3d66b" +SRC_URI[sha256sum] = "a6bd5bac5cf19f0c3c594bdae2565a095696980a683a0ef37cb6212e093bde35" EXTRA_OECONF = "--disable-xml-docs \ --disable-doxygen-docs \ From patchwork Wed Jun 28 14:12:37 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 26608 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id EA668EB64DC for ; Wed, 28 Jun 2023 14:13:27 +0000 (UTC) Received: from mail-pl1-f170.google.com (mail-pl1-f170.google.com [209.85.214.170]) by mx.groups.io with SMTP id smtpd.web11.17576.1687961602542789555 for ; Wed, 28 Jun 2023 07:13:22 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="signature has expired" header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=0JwCxJUa; spf=softfail (domain: sakoman.com, ip: 209.85.214.170, mailfrom: steve@sakoman.com) Received: by mail-pl1-f170.google.com with SMTP id d9443c01a7336-1b8171718a1so18906155ad.2 for ; Wed, 28 Jun 2023 07:13:22 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1687961601; x=1690553601; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=nIEm99YB5AoITEYOrv+TwGirUYtdo7q6CKNt/hLQTOQ=; b=0JwCxJUa05mZAHZGsA2jfQabmCNuB+yNg3GI4yKKiO4csEmV/HEnF7n7zfUrh6YA30 tgArQS7pV0FbRrjUSMmMnveCakyJ8p/ul9id2xhqG6imifRw0YB8kVGkx8WkPmB2qN6V M+U+/rgsUKdTO7sjFvclKU9Cxb1j4xwarBxYLB9fHOThR+Ux+NpiBnwyF9jB6ogL6AjW L6v/8yc4tEYvsIcgOjUUFXWthx6GRn88nBiw2qUdNCoZftlwsuMauj4kgtrdK3HqSW3o AoZaHddl4/OrdJOx9VOwhj+c0EfyCLkR4pml9EoKEIpIif/X1Vs7Rm+PIkntaDzRARXz WJ7w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1687961601; x=1690553601; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=nIEm99YB5AoITEYOrv+TwGirUYtdo7q6CKNt/hLQTOQ=; b=LNEIySnPr2UjfSD/i0O4kf5mqEzTlDd6I+UpMGQfWGxE2Vsrc6xekXUnVSgcgvvv1k /3FFGB67wDOoFLrHshp206hvoRjC/znSkjczIBbJ8jMR0re+pu4fTm43bKHFbqq1x1ac GkhFVZevChmt3S70Y4Nq1jXMm40Xn/tQsktzBy8+ajmNHNVptaizgRxKg+gyUx//krtC 304UC4qPSckcTHD43epZqedKrla0DpGVTIAVEJQliqK9x9/BXFMhwp2RVdlLOqkppaps Ug7ls6cG9j16tenc1tQ9KGgQ/zc4uucQGElpoBrx2AlaoZDIcPD5m9MqvotpC7oBMaP0 o2ww== X-Gm-Message-State: AC+VfDxv4ET7oGocNaCuQNUP5jmAz0nXLC5EHC8VY6FukDM3RVFFhH6Y sAIcOVdsqk7NKxbOub+f+mPxuZk6kJ9zgwQGnVsFXw== X-Google-Smtp-Source: ACHHUZ69kIiCPNmRazDYVOfsb7BwzY8qZ5+DDcXGAAD6JI5rLk7jnGE6akrNGEDSy7TTl+/WKMDDzw== X-Received: by 2002:a17:902:aa83:b0:1b7:d4a0:639 with SMTP id d3-20020a170902aa8300b001b7d4a00639mr12059092plr.31.1687961601195; Wed, 28 Jun 2023 07:13:21 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id b19-20020a170902d89300b001b3ce619e2esm7792092plz.179.2023.06.28.07.13.20 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 28 Jun 2023 07:13:20 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 12/29] linux-yocto/5.10: update to v5.10.182 Date: Wed, 28 Jun 2023 04:12:37 -1000 Message-Id: <2829482f2924082ad01f356ea281ed308e35d44f.1687961326.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 28 Jun 2023 14:13:27 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/183567 From: Bruce Ashfield Updating to the latest korg -stable release that comprises the following commits: c7992b6c7f0e Linux 5.10.182 468bebc426ba netfilter: ctnetlink: Support offloaded conntrack entry deletion 18c14d3028c0 ipv{4,6}/raw: fix output xfrm lookup wrt protocol 2218752325a9 binder: fix UAF caused by faulty buffer cleanup e4d2e6c3054b bluetooth: Add cmd validity checks at the start of hci_sock_ioctl() 6a0712d9fe46 net: phy: mscc: enable VSC8501/2 RGMII RX clock b556990235c3 net/mlx5: Devcom, serialize devcom registration 57dc3c124e7b net/mlx5: devcom only supports 2 ports 860ad704e450 regulator: pca9450: Fix BUCK2 enable_mask b3a9c4081db9 regulator: pca9450: Convert to use regulator_set_ramp_delay_regmap 12cb97ed85fb regulator: Add regmap helper for ramp-delay setting b557220d3140 power: supply: bq24190: Call power_supply_changed() after updating input current 224f7bbf577b power: supply: core: Refactor power_supply_set_input_current_limit_from_supplier() 277b489ad0b7 power: supply: bq27xxx: After charger plug in/out wait 0.5s for things to stabilize 0949c572d42d power: supply: bq27xxx: Ensure power_supply_changed() is called on current sign changes 6ed541254f4b power: supply: bq27xxx: Move bq27xxx_battery_update() down ed78797a264c power: supply: bq27xxx: expose battery data when CI=1 7ff807d68b5d power: supply: bq27xxx: Add cache parameter to bq27xxx_battery_current_and_status() 432f98c559f2 power: supply: bq27xxx: make status more robust 659094e4057a power: supply: bq27xxx: fix sign of current_now for newer ICs 14e1a958d988 power: supply: bq27xxx: fix polarity of current_now 18c9cf463337 x86/cpu: Drop spurious underscore from RAPTOR_LAKE #define 4a8980cb2a7c x86/cpu: Add Raptor Lake to Intel family 272d4b8a5b96 Linux 5.10.181 cf7ee4b15838 net: phy: mscc: add VSC8502 to MODULE_DEVICE_TABLE 98cedb991094 3c589_cs: Fix an error handling path in tc589_probe() 6f449e409b75 arm64: dts: imx8mn-var-som: fix PHY detection bug by adding deassert delay d4d10a6df152 net/mlx5: Devcom, fix error flow in mlx5_devcom_register_device 8b9c561b9fc1 net/mlx5: Fix error message when failing to allocate device memory c21862232f6c net/mlx5: DR, Fix crc32 calculation to work on big-endian (BE) CPUs 058fd18e7477 net/mlx5e: do as little as possible in napi poll when budget is 0 5afd5fb8a9a7 forcedeth: Fix an error handling path in nv_probe() 80a4b9ad4288 ASoC: Intel: Skylake: Fix declaration of enum skl_ch_cfg c966b58c8515 x86/show_trace_log_lvl: Ensure stack pointer is aligned, again 0de80163dea6 xen/pvcalls-back: fix double frees with pvcalls_new_active_socket() b663696c0652 coresight: Fix signedness bug in tmc_etr_buf_insert_barrier_packet() a52d2019ec7c fs: fix undefined behavior in bit shift for SB_NOUSER 52967bbb93eb power: supply: sbs-charger: Fix INHIBITED bit for Status reg e85757da9091 power: supply: bq27xxx: Fix poll_interval handling and races on remove 1da9a4b55a66 power: supply: bq27xxx: Fix I2C IRQ race on remove ac1ab213946d power: supply: bq27xxx: Fix bq27xxx_battery_update() race condition 2de6eb7c40f9 power: supply: leds: Fix blink to LED on transition e5f82688ae10 ipv6: Fix out-of-bounds access in ipv6_find_tlv() a61d5c13c7d1 bpf: Fix mask generation for 32-bit narrow loads of 64-bit fields 72971f4071b4 octeontx2-pf: Fix TSOv6 offload 1c8a016822bb selftests: fib_tests: mute cleanup error message a594382ec6d0 net: fix skb leak in __skb_tstamp_tx() 8a30dce9d7f7 media: radio-shark: Add endpoint checks ccef03c51135 USB: sisusbvga: Add endpoint checks 4c260bbf356a USB: core: Add routines for endpoint checks in old drivers 5014b64e369b udplite: Fix NULL pointer dereference in __sk_mem_raise_allocated(). 4bb955c4d283 net: fix stack overflow when LRO is disabled for virtual interfaces 58ecc165abda fbdev: udlfb: Fix endpoint check fd673079749b debugobjects: Don't wake up kswapd from fill_pool() a12ce786bef6 x86/topology: Fix erroneous smp_num_siblings on Intel Hybrid platforms 518c39fc1ed6 parisc: Fix flush_dcache_page() for usage from irq context 2d78438c3183 selftests/memfd: Fix unknown type name build failure d4a5e6ae9967 x86/mm: Avoid incomplete Global INVLPG flushes 628d7e494134 dt-binding: cdns,usb3: Fix cdns,on-chip-buff-size type 139f84c80d9f btrfs: use nofs when cleaning up aborted transactions ea50ee0ef904 gpio: mockup: Fix mode of debugfs files c570dbf279a8 parisc: Allow to reboot machine after system halt de0d7dd5efd4 parisc: Handle kgdb breakpoints only in kernel context 89eba5586aa4 m68k: Move signal frame following exception on 68020/030 42b78c8cc774 net: cdc_ncm: Deal with too low values of dwNtbOutMaxSize 798c1c62cfa5 ALSA: hda/realtek: Enable headset onLenovo M70/M90 1f57a1b97949 ALSA: hda: Fix unhandled register update during auto-suspend period b0d7e62fd15e ALSA: hda/ca0132: add quirk for EVGA X299 DARK c41324385aa7 ocfs2: Switch to security_inode_init_security() 60afe299bb54 spi: fsl-cpm: Use 16 bit mode for large transfers with even size e3674788a865 spi: fsl-spi: Re-organise transfer bits_per_word adaptation 532451037863 act_mirred: use the backlog for nested calls to mirred ingress f5bf8e3ca13e net/sched: act_mirred: better wording on protection against excessive stack growth bba7ebe10baf net/sched: act_mirred: refactor the handle of xmit 047f618d198e writeback, cgroup: remove extra percpu_ref_exit() 84fbe6ad0fa3 ARM: dts: stm32: fix AV96 board SAI2 pin muxing on stm32mp15 dbcc95bb510e watchdog: sp5100_tco: Immediately trigger upon starting. 75258f083868 s390/qdio: fix do_sqbs() inline assembly constraint 3681a0287a73 s390/qdio: get rid of register asm 9c9f253fc60b serial: 8250_exar: Add support for USR298x PCI Modems 1ffa0b8ba928 serial: exar: Add support for Sealevel 7xxxC serial cards fb3c5714f5ce serial: 8250_exar: derive nr_ports from PCI ID for Acces I/O cards 18fbf8cfbb9d KVM: arm64: Link position-independent string routines into .hyp.text e266da1656d6 HID: wacom: add three styli to wacom_intuos_get_tool_type dfd419db0391 HID: wacom: Add new Intuos Pro Small (PTH-460) device IDs 05b170379744 HID: wacom: Force pen out of prox if no events have been received in a while 6b4205ea9790 nilfs2: fix use-after-free bug of nilfs_root in nilfs_evict_inode() 710dee57012e powerpc/64s/radix: Fix soft dirty tracking ae149cdaef4e tpm/tpm_tis: Disable interrupts for more Lenovo devices 8c0109d76235 ceph: force updating the msg pointer in non-split case 11dddfbb7a4e vc_screen: reload load of struct vc_data pointer in vcs_write() to avoid UAF ea3d5de90bc0 serial: Add support for Advantech PCI-1611U card ba061afa060e statfs: enforce statfs[64] structure initialization 845f98af6ae8 can: kvaser_pciefd: Disable interrupts in probe error path 7a7ec807fe54 can: kvaser_pciefd: Do not send EFLUSH command on TFD interrupt 65e85232ffa6 can: kvaser_pciefd: Clear listen-only bit if not explicitly requested 0babb3fabf55 can: kvaser_pciefd: Empty SRB buffer in probe 03714e9c04ec can: kvaser_pciefd: Call request_irq() before enabling interrupts 3bbeba3ce14d can: kvaser_pciefd: Set CAN_STATE_STOPPED in kvaser_pciefd_stop() 073a4d750cec can: isotp: recvmsg(): allow MSG_CMSG_COMPAT flag b4b8294a41ca can: j1939: recvmsg(): allow MSG_CMSG_COMPAT flag f7f799a6fe38 ALSA: hda/realtek: Add quirk for 2nd ASUS GU603 b4f770e61230 ALSA: hda/realtek: Add a quirk for HP EliteDesk 805 6cebdffba628 ALSA: hda/realtek: Add quirk for Clevo L140AU 3add6b2a4a69 ALSA: hda: Add NVIDIA codec IDs a3 through a7 to patch table 546b1f5f45a3 ALSA: hda: Fix Oops by 9.1 surround channel names ff466f77d0a5 usb: typec: altmodes/displayport: fix pin_assignment_show 35e31e1e921c usb: gadget: u_ether: Fix host MAC address case e35adb75fda5 usb: dwc3: debugfs: Resume dwc3 before accessing registers 66070f5b9995 USB: UHCI: adjust zhaoxin UHCI controllers OverCurrent bit value 0caed1faf5f6 usb-storage: fix deadlock when a scsi command timeouts more than once 6340e432cf70 USB: usbtmc: Fix direction for 0-length ioctl control messages 3b3c6f2d2f1f ALSA: usb-audio: Add a sample rate workaround for Line6 Pod Go 3bd6d11e7e63 bridge: always declare tunnel functions 3fa13203b6d9 netfilter: nft_set_rbtree: fix null deref on element insertion 6cfe6f51856b vlan: fix a potential uninit-value in vlan_dev_hard_start_xmit() 562ec162b04a igb: fix bit_shift to be in [1..8] range dc61f7582cc9 cassini: Fix a memory leak in the error handling path of cas_init_one() 81139679f4d2 scsi: storvsc: Don't pass unused PFNs to Hyper-V host d0d39bed9e95 wifi: iwlwifi: mvm: don't trust firmware n_channels f9337a41772d wifi: mac80211: fix min center freq offset tracing 43f6575004e0 net: bcmgenet: Restore phy_stop() depending upon suspend/close e92727ed9e8b net: bcmgenet: Remove phy_stop() from bcmgenet_netif_stop() 2937127d24cc tipc: check the bearer min mtu properly when setting it by netlink 2bd4ff4ffb92 tipc: do not update mtu if msg_max is too small in mtu negotiation 097ea78d8cca tipc: add tipc_bearer_min_mtu to calculate min mtu 76ea144a35ba net/tipc: fix tipc header files for kernel-doc 02b20e0bc0c2 net: nsh: Use correct mac_offset to unwind gso skb in nsh_gso_segment() 01cdda0d27d7 drm/exynos: fix g2d_open/close helper function definitions ce97bb60a6e4 SUNRPC: Fix trace_svc_register() call site f9982db735a8 media: netup_unidvb: fix use-after-free at del_timer() 0cefa4215243 net: hns3: fix reset delay time to avoid configuration timeout aba74ad99870 net: hns3: fix sending pfc frames after reset issue e1f800be74c1 erspan: get the proto with the md version for collect_md 153017561d28 serial: arc_uart: fix of_iomap leak in `arc_serial_probe` e7fd68abbba3 tcp: fix possible sk_priority leak in tcp_v4_send_reset() 788791990d74 net: Find dst with sk's xfrm policy not ctl_sk a9ef8b258988 ipv4/tcp: do not use per netns ctl sockets 171669917762 vsock: avoid to close connected socket after the timeout b1cf6bd8833b ALSA: hda/realtek: Apply HP B&O top speaker profile to Pavilion 15 13c5fa1248bf ALSA: firewire-digi00x: prevent potential use after free 6fb537895d29 net: phy: dp83867: add w/a for packet errors seen with short cables 83996d317b1d net: fec: Better handle pm_runtime_get() failing in .remove() 8f57715f8ef6 af_key: Reject optional tunnel/BEET mode templates in outbound policies f5cb28a90c8c cpupower: Make TSC read per CPU for Mperf monitor dc30fed07ddf drm/msm/dpu: Remove duplicate register defines from INTF eaf9394ed79c drm/msm/dp: unregister audio driver during unbind c5449195f86e Revert "Fix XFRM-I support for nested ESP tunnels" 295e07a76bf3 xfrm: don't check the default policy if the policy allows the packet 84fdaaf0d76e btrfs: fix space cache inconsistency after error loading it from disk a842fb6038e5 btrfs: replace calls to btrfs_find_free_ino with btrfs_find_free_objectid 9c69a9d05824 btrfs: move btrfs_find_highest_objectid/btrfs_find_free_objectid to disk-io.c 6a1a72a8cfda mfd: dln2: Fix memory leak in dln2_probe() 7d939e367b64 phy: st: miphy28lp: use _poll_timeout functions for waits 3b37bb0d9290 Input: xpad - add constants for GIP interface numbers 94ec1a44e843 iommu/arm-smmu-v3: Acknowledge pri/event queue overflow if any cae5f8f4f7a8 clk: tegra20: fix gcc-7 constant overflow warning 8c472e68bea0 iommu/arm-smmu-qcom: Limit the SMR groups to 128 214ae2c1a9ce RDMA/core: Fix multiple -Warray-bounds warnings 2d9ca5f62f2b recordmcount: Fix memory leaks in the uwrite function cf3e2916017d sched: Fix KCSAN noinstr violation 158502f79076 mcb-pci: Reallocate memory region to avoid memory overlapping 2c86a1305c14 serial: 8250: Reinit port->pm on port specific driver unbind 7ed30db87994 usb: typec: tcpm: fix multiple times discover svids error 60fabcba7543 HID: wacom: generic: Set battery quirk only when we see battery data d234de1a924e spi: spi-imx: fix MX51_ECSPI_* macros when cs > 3 0898a1df72ac HID: logitech-hidpp: Reconcile USB and Unifying serials 958534d4368b HID: logitech-hidpp: Don't use the USB serial for USB devices bb1313f37e7b staging: rtl8192e: Replace macro RTL_PCI_DEVICE with PCI_DEVICE 55410a9144c7 Bluetooth: L2CAP: fix "bad unlock balance" in l2cap_disconnect_rsp a2d816f55da1 Bluetooth: hci_bcm: Fall back to getting bdaddr from EFI if not set ba66851aba80 ipvs: Update width of source for ip_vs_sync_conn_options 866921dc06b9 wifi: ath11k: Fix SKB corruption in REO destination ring 91ad1ab3cc7e wifi: iwlwifi: dvm: Fix memcpy: detected field-spanning write backtrace e732a266b973 null_blk: Always check queue mode setting from configfs 059e426d666a wifi: iwlwifi: pcie: Fix integer overflow in iwl_write_to_user_buf 0fc0d287c1e7 wifi: iwlwifi: pcie: fix possible NULL pointer dereference 7560ed6592ff samples/bpf: Fix fout leak in hbm's run_bpf_prog ad87bd313f70 f2fs: fix to drop all dirty pages during umount() if cp_error is set fc7237e191b9 ext4: Fix best extent lstart adjustment logic in ext4_mb_new_inode_pa() 3ca3005b502c ext4: set goal start correctly in ext4_mb_normalize_request 4c2c8f959984 gfs2: Fix inode height consistency check 697f92f8317e scsi: message: mptlan: Fix use after free bug in mptlan_remove() due to race condition f748e1525383 lib: cpu_rmap: Avoid use after free on rmap->obj array entries 4621e24c9257 scsi: target: iscsit: Free cmds before session free 2ea171230a39 net: Catch invalid index in XPS mapping 8b61e7ad13f2 net: pasemi: Fix return type of pasemi_mac_start_tx() e0e7faee3a7d scsi: lpfc: Prevent lpfc_debugfs_lockstat_write() buffer overflow 22ab5fed07ad ext2: Check block size validity during mount 4e8dc0e5c763 wifi: brcmfmac: cfg80211: Pass the PMK in binary instead of hex e8d49d1c5968 bpf: Annotate data races in bpf_local_storage 30d041c18dfb wifi: ath: Silence memcpy run-time false positive warning b8e7589f50b7 drm/amd: Fix an out of bounds error in BIOS parser 978e0d05547a ACPICA: ACPICA: check null return of ACPI_ALLOCATE_ZEROED in acpi_db_display_objects 16359bc02c09 ACPICA: Avoid undefined behavior: applying zero offset to null pointer 3f64a0e66469 drm/tegra: Avoid potential 32-bit integer overflow f718f1fd3e4c remoteproc: stm32_rproc: Add mutex protection for workqueue 066b90bca755 ACPI: EC: Fix oops when removing custom query handlers 7d8f5ccc826b firmware: arm_sdei: Fix sleep from invalid context BUG 5c23f6da62f7 memstick: r592: Fix UAF bug in r592_remove due to race condition ae6769fb939c arm64: dts: qcom: msm8996: Add missing DWC3 quirks bb1616e1057d regmap: cache: Return error in cache sync operations for REGCACHE_NONE d5138ad7ca1d drm/amd/display: Use DC_LOG_DC in the trasform pixel function c8daee665858 fs: hfsplus: remove WARN_ON() from hfsplus_cat_{read,write}_inode() a7d21b858589 rcu: Protect rcu_print_task_exp_stall() ->exp_tasks access e4842de4ec13 refscale: Move shutdown from wait_event() to wait_event_idle() 100c0ad6c045 ext4: allow ext4_get_group_info() to fail 371d8b8ea0cb ext4: allow to find by goal if EXT4_MB_HINT_GOAL_ONLY is set 8669fff0d0cd ext4: add mballoc stats proc file 9b6a0c140e27 ext4: drop s_mb_bal_lock and convert protected fields to atomic 0983142c5f17 ext4: remove redundant mb_regenerate_buddy() d48b7eea9469 ext4: fix lockdep warning when enabling MMP 5c87115520d2 ext4: don't clear SB_RDONLY when remounting r/w until quota is re-enabled 8284c7592d90 ext4: reflect error codes from ext4_multi_mount_protect() to its callers efd18a91c9c2 ext4: remove an unused variable warning with CONFIG_QUOTA=n df1be652a45f fbdev: arcfb: Fix error handling in arcfb_probe() bd6b353671fc drm/i915/dp: prevent potential div-by-zero 8307e372e744 af_unix: Fix data races around sk->sk_shutdown. 9b977b0cbb6d af_unix: Fix a data race of sk->sk_receive_queue->qlen. fb6ac4b5bdfe net: datagram: fix data-races in datagram_poll() f4a371d3f5a7 ipvlan:Fix out-of-bounds caused by unclear skb->cb 963fe9ed8626 tcp: add annotations around sk->sk_shutdown accesses f86568eca4c9 tcp: factor out __tcp_close() helper 34a5ee69ec62 net: add vlan_get_protocol_and_depth() helper 9ccf3edbafba net: tap: check vlan with eth_type_vlan() method 449391400960 net: deal with most data-races in sk_wait_event() 1b33bdd76635 net: annotate sk->sk_err write from do_recvmmsg() f92557f79a60 netlink: annotate accesses to nlk->cb_running 26001e75dc5c netfilter: conntrack: fix possible bug_on with enable_hooks=1 d06f67b2b8dc net: Fix load-tearing on sk->sk_stamp in sock_recv_cmsgs(). 8eb35b1aca84 linux/dim: Do nothing if no time delta between samples 4d3ae448e850 net: mdio: mvusb: Fix an error handling path in mvusb_mdio_probe() b882224d7367 ARM: 9296/1: HP Jornada 7XX: fix kernel-doc warnings 139c27648f8d drm/mipi-dsi: Set the fwnode for mipi_dsi_device 423908e89d7d driver core: add a helper to setup both the of_node and fwnode of a device Signed-off-by: Bruce Ashfield Signed-off-by: Steve Sakoman --- .../linux/linux-yocto-rt_5.10.bb | 6 ++--- .../linux/linux-yocto-tiny_5.10.bb | 8 +++---- meta/recipes-kernel/linux/linux-yocto_5.10.bb | 24 +++++++++---------- 3 files changed, 19 insertions(+), 19 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb b/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb index 332a19366a..c23dd96547 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb @@ -11,13 +11,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "8008621f28248a94b5f1154350a4fc9c71b130d5" -SRCREV_meta ?= "4476e17760bea9d68c392368f2396a2e9efa86c3" +SRCREV_machine ?= "f8048496a00def29e831a2dde503f9dc41350858" +SRCREV_meta ?= "af3a4fed664af7cce2aef179812bdb572f690760" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.10;destsuffix=${KMETA}" -LINUX_VERSION ?= "5.10.180" +LINUX_VERSION ?= "5.10.182" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb index e8d4eeea72..60627fa6ef 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb @@ -6,7 +6,7 @@ KCONFIG_MODE = "--allnoconfig" require recipes-kernel/linux/linux-yocto.inc -LINUX_VERSION ?= "5.10.180" +LINUX_VERSION ?= "5.10.182" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -15,9 +15,9 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine:qemuarm ?= "d0dc3a46c784849731fc25990679b676f4306cef" -SRCREV_machine ?= "5ca66907abef1e8a0be5d3109fd3f0d50f77bc5f" -SRCREV_meta ?= "4476e17760bea9d68c392368f2396a2e9efa86c3" +SRCREV_machine:qemuarm ?= "710c1d3d6dc78d596514ccbd2fcc522154d06ce7" +SRCREV_machine ?= "cf5955813dc42c3b912c370225d7b8b06a174e25" +SRCREV_meta ?= "af3a4fed664af7cce2aef179812bdb572f690760" PV = "${LINUX_VERSION}+git${SRCPV}" diff --git a/meta/recipes-kernel/linux/linux-yocto_5.10.bb b/meta/recipes-kernel/linux/linux-yocto_5.10.bb index cb28294a7f..63f30c250b 100644 --- a/meta/recipes-kernel/linux/linux-yocto_5.10.bb +++ b/meta/recipes-kernel/linux/linux-yocto_5.10.bb @@ -13,23 +13,23 @@ KBRANCH:qemux86 ?= "v5.10/standard/base" KBRANCH:qemux86-64 ?= "v5.10/standard/base" KBRANCH:qemumips64 ?= "v5.10/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "1cf6a458134cbbe232467622d8e34d2e9d10e92b" -SRCREV_machine:qemuarm64 ?= "5db230097771631366812f12c9b04c8379f53c24" -SRCREV_machine:qemumips ?= "795276fa64f0874a4ee0dcfa9c78e572314bdfa1" -SRCREV_machine:qemuppc ?= "6ccfcf5138703538662241bf8ed897a1ef2a3def" -SRCREV_machine:qemuriscv64 ?= "c6515d2a698792220bed8fd39ccbcfec64d1130f" -SRCREV_machine:qemuriscv32 ?= "c6515d2a698792220bed8fd39ccbcfec64d1130f" -SRCREV_machine:qemux86 ?= "c6515d2a698792220bed8fd39ccbcfec64d1130f" -SRCREV_machine:qemux86-64 ?= "c6515d2a698792220bed8fd39ccbcfec64d1130f" -SRCREV_machine:qemumips64 ?= "4d6b146f00b8efc99e3d3d1d8a63220c29590c8d" -SRCREV_machine ?= "c6515d2a698792220bed8fd39ccbcfec64d1130f" -SRCREV_meta ?= "4476e17760bea9d68c392368f2396a2e9efa86c3" +SRCREV_machine:qemuarm ?= "c07ca23533f6ea4b0c5d5ab3b3d3b4b5f361e036" +SRCREV_machine:qemuarm64 ?= "32f59b5e5471134346fdee47ad92cf413d0949f5" +SRCREV_machine:qemumips ?= "5f14b5b0a79815387ba790d4512f3a6c8b2adf2a" +SRCREV_machine:qemuppc ?= "b71515906c0b182151512035c0c7475847018d3d" +SRCREV_machine:qemuriscv64 ?= "b7c05c1d1a02709e45e38bee7d9690bd7fd9bbcb" +SRCREV_machine:qemuriscv32 ?= "b7c05c1d1a02709e45e38bee7d9690bd7fd9bbcb" +SRCREV_machine:qemux86 ?= "b7c05c1d1a02709e45e38bee7d9690bd7fd9bbcb" +SRCREV_machine:qemux86-64 ?= "b7c05c1d1a02709e45e38bee7d9690bd7fd9bbcb" +SRCREV_machine:qemumips64 ?= "c4c925d2becffbfb59ebd07f798ae027d3170a71" +SRCREV_machine ?= "b7c05c1d1a02709e45e38bee7d9690bd7fd9bbcb" +SRCREV_meta ?= "af3a4fed664af7cce2aef179812bdb572f690760" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRANCH}; \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.10;destsuffix=${KMETA}" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "5.10.180" +LINUX_VERSION ?= "5.10.182" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" DEPENDS += "openssl-native util-linux-native" From patchwork Wed Jun 28 14:12:38 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 26607 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id EF9F3C0015E for ; Wed, 28 Jun 2023 14:13:27 +0000 (UTC) Received: from mail-pl1-f174.google.com (mail-pl1-f174.google.com [209.85.214.174]) by mx.groups.io with SMTP id smtpd.web11.17578.1687961604068781112 for ; Wed, 28 Jun 2023 07:13:24 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="signature has expired" header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=yr0Pjiyl; spf=softfail (domain: sakoman.com, ip: 209.85.214.174, mailfrom: steve@sakoman.com) Received: by mail-pl1-f174.google.com with SMTP id d9443c01a7336-1b80ddce748so21339925ad.3 for ; Wed, 28 Jun 2023 07:13:24 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1687961603; x=1690553603; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=nHfTK+yCg5qucbqchSPCCTT7OL7783+DGqpWx0hGDDI=; b=yr0Pjiylovu5tejwOBu7jIg5Rb+dSU8PqvS1tzntXQ2kOSJFLRK2+L0zK2DHvZ4Cui oS55He6nAFUvuYPpYqzvNEzc5IOn8q86PEq4aWOh2JB2pQWpVOlYZfKHiZWW1/rjHAGG TCUEtjywVT6mce6JVTHFICLZRWKzxLR7Umpo4XlJsfdasmw9QpDUepvuS/qiUhN1P3wV q+wDwgcjj4USNCy09y8zymy3XLlmcAoWeoV71uBKw8TCe3o/1FoBVMsEQgiuh5LjiQln rQpMYQkkHPmHuHCrWT+Da0PpZ8uoukL3JOW4Oto8Z8JL5vEf2kSb+4CJQ5aqn5El3txE 7Dnw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1687961603; x=1690553603; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=nHfTK+yCg5qucbqchSPCCTT7OL7783+DGqpWx0hGDDI=; b=lkCaRXtM2yQM1dIqKbzOgiis6lN0saH6j9w+1Hs4lWjfgNdMz9oQTbIpbpiv85wmbp OjKGIkJjwNvhunW/76iInSpNn+/LVGJnkFxbK1qYIRHtjNILQe0SWOSqKGhKGFTPICXD BpmsJTPgH+qRVqHycGVa7Mw2i+4ruqI21Zhq3lycY3aS7GUATB5A9hGmscNeUMo2rGXO bJIteHz7m6cC7cY/I2aBgLb0KA+MG+TRCjntv/Hzc9HpYO43OtLwfuRG1Sgt7D2HPXK2 tcWu5XE9uWQu0u+Sg3OlIqP2U28/yYXNZMdUfY1AahdSfJRr7nJiOg1Z0y2arwUere/E gkzw== X-Gm-Message-State: AC+VfDzPrK9EHQkWg/FcVA9QRxCNXlwM3ZV1UJaOVOa1W1BDYsAu4E1p q87Todl530b6WEX2Dui6IJSzKqJhvEa5Wm0TdiwqkA== X-Google-Smtp-Source: ACHHUZ5JdEhl7XTHP5HxjCgMfybPeV1qofa6+VBk9mvRFejWw4dvK8d2mdq1U2dz06MmmhJxFDpmqA== X-Received: by 2002:a17:902:7591:b0:1b1:76c2:296a with SMTP id j17-20020a170902759100b001b176c2296amr7901860pll.60.1687961602910; Wed, 28 Jun 2023 07:13:22 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id b19-20020a170902d89300b001b3ce619e2esm7792092plz.179.2023.06.28.07.13.22 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 28 Jun 2023 07:13:22 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 13/29] linux-yocto/5.10: update to v5.10.183 Date: Wed, 28 Jun 2023 04:12:38 -1000 Message-Id: <3a6f5720936c106e35be41b4b3e14e818baec739.1687961326.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 28 Jun 2023 14:13:27 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/183568 From: Bruce Ashfield Updating to the latest korg -stable release that comprises the following commits: 7356714b95aa Linux 5.10.183 842156dc0aad ARM: defconfig: drop CONFIG_DRM_RCAR_LVDS 2c0ea7a06db5 ext4: enable the lazy init thread when remounting read/write 92450a1eaa9e selftests: mptcp: join: skip if MPTCP is not supported 1a6db1f92724 selftests: mptcp: simult flows: skip if MPTCP is not supported 4f8356ab74dd selftests: mptcp: diag: skip if MPTCP is not supported 81df7153f011 crypto: ccp: Play nice with vmalloc'd memory for SEV command structs 1f988ce6e44f crypto: ccp: Reject SEV commands with mismatching command buffer d21a20f4421d scsi: dpt_i2o: Do not process completions with invalid addresses a2cd7599b558 scsi: dpt_i2o: Remove broken pass-through ioctl (I2OUSERCMD) 6d6612f7f976 drm/rcar: stop using 'imply' for dependencies c759c9e4bf38 media: ti-vpe: cal: avoid FIELD_GET assertion d21e955de918 tpm, tpm_tis: Request threaded interrupt handler 608c1f20830c regmap: Account for register length when chunking cb1cbe430e67 KEYS: asymmetric: Copy sig and digest in public_key_verify_signature() 3295dc04af33 KVM: x86: Account fastpath-only VM-Exits in vCPU stats 21bb3cd2e1bc test_firmware: fix the memory leak of the allocated firmware buffer 510e015b9058 serial: 8250_tegra: Fix an error handling path in tegra_uart_probe() b02ae50c7fd8 fbcon: Fix null-ptr-deref in soft_cursor c94228a5aea4 ext4: add lockdep annotations for i_data_sem for ea_inode's ef70012ab51c ext4: disallow ea_inodes with extended attributes 6f4fa43757bb ext4: set lockdep subclass for the ea_inode in ext4_xattr_inode_cache_find() 6d67d4966c1e ext4: add EA_INODE checking to ext4_iget() 6d0adaa90dbe selftests: mptcp: pm nl: skip if MPTCP is not supported 54dea0aa6bef selftests: mptcp: connect: skip if MPTCP is not supported 57eb824b8cbb tracing/probe: trace_probe_primary_from_call(): checked list_first_entry 122ba1d40bea selinux: don't use make's grouped targets feature yet e0b8664c2fec btrfs: fix csum_tree_block page iteration to avoid tripping on -Werror=array-bounds 6c859764f44d tty: serial: fsl_lpuart: use UARTCTRL_TXINV to send break instead of UARTCTRL_SBK 6127e956c3a7 mmc: vub300: fix invalid response handling 99cb5ed15d3e eth: sun: cassini: remove dead code 1d8693376aaa gcc-12: disable '-Wdangling-pointer' warning for now 7c602f540bfd ath6kl: Use struct_group() to avoid size-mismatched casting c92ea38a779f ACPI: thermal: drop an always true check 93e28b66c104 x86/boot: Wrap literal addresses in absolute_pointer() 3442be8f3095 ata: libata-scsi: Use correct device no in ata_find_dev() ae0d7613e0e3 scsi: stex: Fix gcc 13 warnings 86b2d292c260 misc: fastrpc: reject new invocations during device removal dacb7c103c2f misc: fastrpc: return -EPIPE to invocations on device removal a4f88cb043c5 usb: gadget: f_fs: Add unbind event before functionfs_unbind 90f581eb745c net: usb: qmi_wwan: Set DTR quirk for BroadMobi BM818 e18b0009ddfb iio: dac: build ad5758 driver when AD5758 is selected a869ab6987f4 iio: adc: ad7192: Change "shorted" channels to differential 143dbb313aea iio: dac: mcp4725: Fix i2c_master_send() return value handling 81c70f4beaad iio: light: vcnl4035: fixed chip ID check ff864a92d903 iio: imu: inv_icm42600: fix timestamp reset 954bd5a44b09 HID: wacom: avoid integer overflow in wacom_intuos_inout() adac1c22f54b HID: google: add jewel USB id 55c507a34e7e iio: adc: mxs-lradc: fix the order of two cleanup operations 5a445c2bf651 mailbox: mailbox-test: fix a locking issue in mbox_test_message_write() c05ac53bb0df atm: hide unused procfs functions ab332304583d drm/msm: Be more shouty if per-process pgtables aren't working 93a61212db4b ALSA: oss: avoid missing-prototype warnings 4987bf04465e netfilter: conntrack: define variables exp_nat_nla_policy and any_addr with CONFIG_NF_NAT 1c2537291e9c wifi: b43: fix incorrect __packed annotation ea478186ea29 scsi: core: Decrease scsi_device's iorequest_cnt if dispatch failed 05226a8f2288 arm64/mm: mark private VM_FAULT_X defines as vm_fault_t 32f86763c2a2 ARM: dts: stm32: add pin map for CAN controller on stm32f7 01c76cb5e512 wifi: rtl8xxxu: fix authentication timeout due to incorrect RCR value 046721280664 s390/pkey: zeroize key blobs 76169f749089 media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 ca2d171fd1f3 media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 2ea7d26ed851 media: dvb-core: Fix use-after-free due on race condition at dvb_net 415651c8f468 media: mn88443x: fix !CONFIG_OF error by drop of_match_ptr from ID table eb37fef417a2 media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() 1995e714725f media: dvb_ca_en50221: fix a size write bug b85233ab5335 media: netup_unidvb: fix irq init by register it at the end of probe 74c80d2024d9 media: dvb-usb: dw2102: fix uninit-value in su3000_read_mac_address fcbb72b041d9 media: dvb-usb: digitv: fix null-ptr-deref in digitv_i2c_xfer() 7945c13c9b7f media: dvb-usb-v2: rtl28xxu: fix null-ptr-deref in rtl28xxu_i2c_xfer 2d47867a6b3c media: dvb-usb-v2: ce6230: fix null-ptr-deref in ce6230_i2c_master_xfer() 647da51e4da7 media: dvb-usb-v2: ec168: fix null-ptr-deref in ec168_i2c_xfer() 084e43d9a4c1 media: dvb-usb: az6027: fix three null-ptr-deref in az6027_i2c_xfer() a81280cf3343 media: dvb_demux: fix a bug for the continuity counter 204e9082f6af ASoC: ssm2602: Add workaround for playback distortions beee708ccccc ASoC: dt-bindings: Adjust #sound-dai-cells on TI's single-DAI codecs bd99da647262 xfrm: Check if_id in inbound policy/secpath match 5ee83fef0c24 ASoC: dwc: limit the number of overrun messages 32f6f1bf1bef block/rnbd: replace REQ_OP_FLUSH with REQ_OP_WRITE 01c3d3064975 nbd: Fix debugfs_create_dir error checking 29f6b42a73b3 fbdev: stifb: Fix info entry in sti_struct on error path 742dab42d70e fbdev: modedb: Add 1920x1080 at 60 Hz video mode d03d31d3a206 gfs2: Don't deref jdesc in evict fe4f6e159b9a media: rcar-vin: Select correct interrupt mode for V4L2_FIELD_ALTERNATE 16ee4562c7bb ARM: 9295/1: unwind:fix unwind abort for uleb128 case a3393eb6fb41 btrfs: abort transaction when sibling keys check fails for leaves c12c288f1e67 mailbox: mailbox-test: Fix potential double-free in mbox_test_message_write() 0dcf021af4cb ALSA: hda: Glenfly: add HD Audio PCI IDs and HDMI Codec Vendor IDs. d5fcccfc5010 watchdog: menz069_wdt: fix watchdog initialisation 9823ac6e7ae1 mtd: rawnand: marvell: don't set the NAND frequency select e4666d793a22 mtd: rawnand: marvell: ensure timing values are written a437d3d25a27 net: dsa: mv88e6xxx: Increase wait after reset deactivation 7c5c67aa2944 net/sched: flower: fix possible OOB write in fl_set_geneve_opt() f5c29a9e9146 net/mlx5: Read embedded cpu after init bit cleared f03bc013604c udp6: Fix race condition in udp6_sendmsg & connect 57e6c5403427 net/netlink: fix NETLINK_LIST_MEMBERSHIPS length report ae7e941f4dc3 net: sched: fix NULL pointer dereference in mq_attach a8ad1303b9de net/sched: Prohibit regrafting ingress or clsact Qdiscs 676f203803f9 net/sched: Reserve TC_H_INGRESS (TC_H_CLSACT) for ingress (clsact) Qdiscs 18c76349afda net/sched: sch_clsact: Only create under TC_H_CLSACT 1b0163b2dc3b net/sched: sch_ingress: Only create under TC_H_INGRESS dfb80ebc3bb4 tcp: Return user_mss for TCP_MAXSEG in CLOSE/LISTEN state if user_mss set cccc6209708f tcp: deny tcp_disconnect() when threads are waiting 8f0365a3e286 af_packet: do not use READ_ONCE() in packet_bind() 4de3c2c43c6f mtd: rawnand: ingenic: fix empty stub helper definitions 11a1f2561b53 amd-xgbe: fix the false linkup in xgbe_phy_status fa909b138480 af_packet: Fix data-races of pkt_sk(sk)->num. 616da05ff8a9 netrom: fix info-leak in nr_write_internal() d1b224cb7856 net/mlx5: fw_tracer, Fix event handling a864a8543cd5 dmaengine: pl330: rename _start to prevent build error 33d7035dc224 iommu/amd: Don't block updates to GATag if guest mode is on bd9e61ee3e9d iommu/rockchip: Fix unwind goto issue 75c60dacf0b4 RDMA/bnxt_re: Fix return value of bnxt_re_process_raw_qp_pkt_rx 861868b06304 RDMA/bnxt_re: Fix a possible memory leak ff296fccebcb dmaengine: at_xdmac: fix potential Oops in at_xdmac_prep_interleaved() 6b32ed353f44 dmaengine: at_xdmac: Move the free desc to the tail of the desc list 3041b768cc0f dmaengine: at_xdmac: Fix race for the tx desc callback 127afc87bb02 dmaengine: at_xdmac: Fix concurrency over chan's completed_cookie 958226b3a663 RDMA/efa: Fix unsupported page sizes in device 7d6662e4a4b6 RDMA/bnxt_re: Fix the page_size used during the MR creation b51c8962853e RDMA/bnxt_re: Code refactor while populating user MRs Signed-off-by: Bruce Ashfield Signed-off-by: Steve Sakoman --- .../linux/linux-yocto-rt_5.10.bb | 6 ++--- .../linux/linux-yocto-tiny_5.10.bb | 8 +++---- meta/recipes-kernel/linux/linux-yocto_5.10.bb | 24 +++++++++---------- 3 files changed, 19 insertions(+), 19 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb b/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb index c23dd96547..883aabc9de 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb @@ -11,13 +11,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "f8048496a00def29e831a2dde503f9dc41350858" -SRCREV_meta ?= "af3a4fed664af7cce2aef179812bdb572f690760" +SRCREV_machine ?= "ca3e1d1a096f6f832182cc922164eb80f9c34b42" +SRCREV_meta ?= "bdf41f170f57425ff7ec651a88d787d8554b6f86" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.10;destsuffix=${KMETA}" -LINUX_VERSION ?= "5.10.182" +LINUX_VERSION ?= "5.10.183" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb index 60627fa6ef..39a42ebd52 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb @@ -6,7 +6,7 @@ KCONFIG_MODE = "--allnoconfig" require recipes-kernel/linux/linux-yocto.inc -LINUX_VERSION ?= "5.10.182" +LINUX_VERSION ?= "5.10.183" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -15,9 +15,9 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine:qemuarm ?= "710c1d3d6dc78d596514ccbd2fcc522154d06ce7" -SRCREV_machine ?= "cf5955813dc42c3b912c370225d7b8b06a174e25" -SRCREV_meta ?= "af3a4fed664af7cce2aef179812bdb572f690760" +SRCREV_machine:qemuarm ?= "b8866faacf5938d92449ff29b1a70f3678814787" +SRCREV_machine ?= "a2e1f5ef6d74a4c9f5656032e969d1238020071e" +SRCREV_meta ?= "bdf41f170f57425ff7ec651a88d787d8554b6f86" PV = "${LINUX_VERSION}+git${SRCPV}" diff --git a/meta/recipes-kernel/linux/linux-yocto_5.10.bb b/meta/recipes-kernel/linux/linux-yocto_5.10.bb index 63f30c250b..1e99e24284 100644 --- a/meta/recipes-kernel/linux/linux-yocto_5.10.bb +++ b/meta/recipes-kernel/linux/linux-yocto_5.10.bb @@ -13,23 +13,23 @@ KBRANCH:qemux86 ?= "v5.10/standard/base" KBRANCH:qemux86-64 ?= "v5.10/standard/base" KBRANCH:qemumips64 ?= "v5.10/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "c07ca23533f6ea4b0c5d5ab3b3d3b4b5f361e036" -SRCREV_machine:qemuarm64 ?= "32f59b5e5471134346fdee47ad92cf413d0949f5" -SRCREV_machine:qemumips ?= "5f14b5b0a79815387ba790d4512f3a6c8b2adf2a" -SRCREV_machine:qemuppc ?= "b71515906c0b182151512035c0c7475847018d3d" -SRCREV_machine:qemuriscv64 ?= "b7c05c1d1a02709e45e38bee7d9690bd7fd9bbcb" -SRCREV_machine:qemuriscv32 ?= "b7c05c1d1a02709e45e38bee7d9690bd7fd9bbcb" -SRCREV_machine:qemux86 ?= "b7c05c1d1a02709e45e38bee7d9690bd7fd9bbcb" -SRCREV_machine:qemux86-64 ?= "b7c05c1d1a02709e45e38bee7d9690bd7fd9bbcb" -SRCREV_machine:qemumips64 ?= "c4c925d2becffbfb59ebd07f798ae027d3170a71" -SRCREV_machine ?= "b7c05c1d1a02709e45e38bee7d9690bd7fd9bbcb" -SRCREV_meta ?= "af3a4fed664af7cce2aef179812bdb572f690760" +SRCREV_machine:qemuarm ?= "4b707a62625e8fe23b5b0c0a09edf6e585bbcac5" +SRCREV_machine:qemuarm64 ?= "c397c6206489ac3461c6aba4f8d2e7b86f1e87af" +SRCREV_machine:qemumips ?= "6e80c5bec3588a72fb128353c6ff56585abd869b" +SRCREV_machine:qemuppc ?= "b7064086e1737cec9f9810a2825c0a6e691e3cba" +SRCREV_machine:qemuriscv64 ?= "4fad5e082ddeadeb2a55042d151e3a3b519e2f53" +SRCREV_machine:qemuriscv32 ?= "4fad5e082ddeadeb2a55042d151e3a3b519e2f53" +SRCREV_machine:qemux86 ?= "4fad5e082ddeadeb2a55042d151e3a3b519e2f53" +SRCREV_machine:qemux86-64 ?= "4fad5e082ddeadeb2a55042d151e3a3b519e2f53" +SRCREV_machine:qemumips64 ?= "ef16c1d288827d14ae68defeb1b446aeae8b4141" +SRCREV_machine ?= "4fad5e082ddeadeb2a55042d151e3a3b519e2f53" +SRCREV_meta ?= "bdf41f170f57425ff7ec651a88d787d8554b6f86" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRANCH}; \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.10;destsuffix=${KMETA}" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "5.10.182" +LINUX_VERSION ?= "5.10.183" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" DEPENDS += "openssl-native util-linux-native" From patchwork Wed Jun 28 14:12:39 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 26605 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D5F74EB64DA for ; Wed, 28 Jun 2023 14:13:27 +0000 (UTC) Received: from mail-pl1-f180.google.com (mail-pl1-f180.google.com [209.85.214.180]) by mx.groups.io with SMTP id smtpd.web11.17580.1687961605986229731 for ; Wed, 28 Jun 2023 07:13:26 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="signature has expired" header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=1aBCLGp7; spf=softfail (domain: sakoman.com, ip: 209.85.214.180, mailfrom: steve@sakoman.com) Received: by mail-pl1-f180.google.com with SMTP id d9443c01a7336-1b809354a15so20300495ad.1 for ; Wed, 28 Jun 2023 07:13:25 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1687961605; x=1690553605; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=UEblLt5snV5JLz0TGZUwupmgRxgoFTRU1xFLJPY0d88=; b=1aBCLGp7TktSEVcZkj+4j+DnE/3/EScxQO9ha1cKIoodV9pkE1R2ENaCMq0mw6eYzf hNnN68Aeh4i1mFNsfJYG5+jjAcuM782etQbJ/NXATPTMsRWfHVaICKvMXB0Mt/hhoRgq 2MoXrZvZtWG5lB/ZpVNQiz30I1HSkaWbZUwOGdqC2J73L8QWXHLEG4rRTA19OXEstGRl MlrPLgmbPejmpUUkh7DTsNYwfu1ivO303+y2rT2KXzoFqtrzSjTep/VLWY7KwBTFh8Va slg/Y6xSLmtDfQRzDtBKxKUUSpAMCZuhSPK9Vi9TH1wvdRAuHRNcgw/wHLMKgP5o+xRu 45hw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1687961605; x=1690553605; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=UEblLt5snV5JLz0TGZUwupmgRxgoFTRU1xFLJPY0d88=; b=KwloSmU/Jy1zO4OMdNcGDp6CGknWwBGoXefViC94v9U6ZajGpD/i530ha9RykJnN4v YgO8HFNBLsAlBLXA81tby2MZ3gDL1Pjd4SBVRp3DPppdSwpdhCgAcszDtIcDKe+rgFLU rqDaWmUKyuwqcec5xioygMeWO8k6sCVTY+62sdNYqBJzeMh+k1p8/xdxTwjFl26H/qIH OwzcYdbnbmDrXbWoc30ai1NkIS8B7JxYa/RpjgiLtpsis4yKhEeEGfd2elAM+jjNaeyG a2D2y7l0d55iv08Z03xcm3pUwjgQUvOKaxYY5WKS95jklK3jE+OcEtoVstyNvt4uIcfs zW2g== X-Gm-Message-State: AC+VfDy8fWvoSAz6kp7hSQZNAQMWirbY1wV3QCy8RVCUbsrgUkJ+eqe+ 5t6SfqNb6/QnzYBxPy6/qDKvRHaMpn61+I4ztb3sWw== X-Google-Smtp-Source: ACHHUZ65VHiUaVdXU2/KFqgTrwBe5b/epIK9jKwdFlaFJ9H5QJoveZe68jltgWZm5Xgb3ahLonsnqQ== X-Received: by 2002:a17:902:da87:b0:1b0:75ef:ce3e with SMTP id j7-20020a170902da8700b001b075efce3emr10558659plx.25.1687961604800; Wed, 28 Jun 2023 07:13:24 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id b19-20020a170902d89300b001b3ce619e2esm7792092plz.179.2023.06.28.07.13.23 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 28 Jun 2023 07:13:24 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 14/29] linux-yocto/5.10: update to v5.10.184 Date: Wed, 28 Jun 2023 04:12:39 -1000 Message-Id: <1588c4ebc21543a6a0a0d254339505f2c4ceb8c1.1687961326.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 28 Jun 2023 14:13:27 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/183569 From: Bruce Ashfield Updating to the latest korg -stable release that comprises the following commits: a1f0beb13d9b Linux 5.10.184 7f896130eff7 Revert "staging: rtl8192e: Replace macro RTL_PCI_DEVICE with PCI_DEVICE" b60e862e133f btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() 6f371623f315 btrfs: check return value of btrfs_commit_transaction in relocation ea0d413094e0 drm/atomic: Don't pollute crtc_state->mode_blob with error pointers 1659268d1ab4 MIPS: locking/atomic: Fix atomic{_64,}_sub_if_positive 0e98a97f772f xfs: verify buffer contents when we skip log replay 58e8cf94de12 tcp: fix tcp_min_tso_segs sysctl 1b4b3350969e ext4: only check dquot_initialize_needed() when debugging fd6cb5171903 Revert "ext4: don't clear SB_RDONLY when remounting r/w until quota is re-enabled" cfa91c0573a5 vhost: support PACKED when setting-getting vring_base 461c88caa889 riscv: fix kprobe __user string arg print fault issue c6b905087428 eeprom: at24: also select REGMAP 10e376a7c387 i2c: sprd: Delete i2c adapter in .remove's error path c4aeef56022e ASoC: codecs: wsa881x: do not set can_multi_write flag b6f309e9d24e staging: vc04_services: fix gcc-13 build warning 0d3c75a69344 usb: usbfs: Use consistent mmap functions 143f40572174 usb: usbfs: Enforce page requirements for mmap bcd474d1838e pinctrl: meson-axg: add missing GPIOA_18 gpio group 1981d37b1d76 rbd: get snapshot context after exclusive lock is ensured to be held 76ae4a7bc999 rbd: move RBD_OBJ_FLAG_COPYUP_ENABLED flag setting 841d3b5a8446 tee: amdtee: Add return_origin to 'struct tee_cmd_load_ta' a94024991d82 Bluetooth: hci_qca: fix debugfs registration 2270e32bd199 Bluetooth: Fix use-after-free in hci_remove_ltk/hci_remove_irk 76b40319a1ea s390/dasd: Use correct lock while counting channel queue length e715c86e92fd ceph: fix use-after-free bug for inodes when flushing capsnaps 67148731582d can: j1939: avoid possible use-after-free when j1939_can_rx_register fails cc834f4d9762 can: j1939: change j1939_netdev_lock type to mutex 026800507640 can: j1939: j1939_sk_send_loop_abort(): improved error queue handling in J1939 Socket 00380551353b drm/amdgpu: fix xclk freq on CHIP_STONEY ef95f987bea8 ALSA: hda/realtek: Add Lenovo P3 Tower platform 95520b3fba92 ALSA: hda/realtek: Add a quirk for HP Slim Desktop S01 ca26d00828d3 Input: psmouse - fix OOB access in Elantech protocol 86efc409f29d Input: xpad - delete a Razer DeathAdder mouse VID/PID entry 9ece26ff0815 batman-adv: Broken sync while rescheduling delayed work 3f6dfff5fe41 bnxt_en: Implement .set_port / .unset_port UDP tunnel callbacks deead0d8729f bnxt_en: Query default VLAN before VNIC setup on a VF 84dbd27ad5da bnxt_en: Don't issue AP reset during ethtool's reset operation dedd47977ae5 lib: cpu_rmap: Fix potential use-after-free in irq_cpu_rmap_release() 27b8d6931f3f bpf: Add extra path pointer check to d_path helper 36d07046c2d9 net: sched: fix possible refcount leak in tc_chain_tmplt_add() 54acac57fe39 net: sched: move rtm_tca_policy declaration to include file dad7417db765 rfs: annotate lockless accesses to RFS sock flow table c62ca9d03777 rfs: annotate lockless accesses to sk->sk_rxhash 86e3981ff1bc ipv6: rpl: Fix Route of Death. b4be099c5fb5 netfilter: ipset: Add schedule point in call_ad(). 35c89cfcac05 netfilter: conntrack: fix NULL pointer dereference in nf_confirm_cthelper c4ba90ae3578 qed/qede: Fix scheduling while atomic 0fee54fa330b Bluetooth: L2CAP: Add missing checks for invalid DCID 00665980128c Bluetooth: Fix l2cap_disconnect_req deadlock 83cfac5851c2 net/sched: fq_pie: ensure reasonable TCA_FQ_PIE_QUANTUM values 8ab2bec9e165 net/smc: Avoid to access invalid RMBs' MRs in SMCRv1 ADD LINK CONT 47ef881f1cbe net: dsa: lan9303: allow vid != 0 in port_fdb_{add|del} methods 9fcc3c3d26a0 neighbour: fix unaligned access to pneigh_entry 99883d4a0be2 wifi: mt76: mt7615: fix possible race in mt7615_mac_sta_poll 2d3e4c5b3e05 afs: Fix setting of mtime when creating a file/dir/symlink 1ed651e234fd spi: qup: Request DMA before enabling clocks e7c61c39d6d1 staging: vchiq_core: drop vchiq_status from vchiq_initialise fa303270602d i40e: fix build warning in ice_fltr_add_mac_to_list() 15ca8d584c1a i40e: fix build warnings in i40e_alloc.h f7e208d1c549 i40iw: fix build warning in i40iw_manage_apbvt() 318e2c18da7c block/blk-iocost (gcc13): keep large values in a new enum b6d652f7fbdc blk-iocost: avoid 64-bit division in ioc_timer_fn 9214a5484e33 f2fs: fix iostat lock protection d3b74c288d84 bonding (gcc13): synchronize bond_{a,t}lb_xmit() types f122e5517401 remove the sx8 block driver 9236470a1dd4 sfc (gcc13): synchronize ef100_enqueue_skb()'s return type 02ce3cf22291 gcc-plugins: Reorganize gimple includes for GCC 13 4c3ddc06cedb ata: ahci: fix enum constants for gcc-13 Signed-off-by: Bruce Ashfield Signed-off-by: Steve Sakoman --- .../linux/linux-yocto-rt_5.10.bb | 6 ++--- .../linux/linux-yocto-tiny_5.10.bb | 8 +++---- meta/recipes-kernel/linux/linux-yocto_5.10.bb | 24 +++++++++---------- 3 files changed, 19 insertions(+), 19 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb b/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb index 883aabc9de..af4fede4e9 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb @@ -11,13 +11,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "ca3e1d1a096f6f832182cc922164eb80f9c34b42" -SRCREV_meta ?= "bdf41f170f57425ff7ec651a88d787d8554b6f86" +SRCREV_machine ?= "2b0a7b0262d2a775fad7d9ca87de32dc88015b74" +SRCREV_meta ?= "e269c86d186e2727bdceab40e3a71ec45e0252d1" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.10;destsuffix=${KMETA}" -LINUX_VERSION ?= "5.10.183" +LINUX_VERSION ?= "5.10.184" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb index 39a42ebd52..f85fea070b 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb @@ -6,7 +6,7 @@ KCONFIG_MODE = "--allnoconfig" require recipes-kernel/linux/linux-yocto.inc -LINUX_VERSION ?= "5.10.183" +LINUX_VERSION ?= "5.10.184" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -15,9 +15,9 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine:qemuarm ?= "b8866faacf5938d92449ff29b1a70f3678814787" -SRCREV_machine ?= "a2e1f5ef6d74a4c9f5656032e969d1238020071e" -SRCREV_meta ?= "bdf41f170f57425ff7ec651a88d787d8554b6f86" +SRCREV_machine:qemuarm ?= "8cec679b919f74822063e03f38e5a1b5df6248bc" +SRCREV_machine ?= "962077eea8f30dbc431d66ea7a2cee33659854e2" +SRCREV_meta ?= "e269c86d186e2727bdceab40e3a71ec45e0252d1" PV = "${LINUX_VERSION}+git${SRCPV}" diff --git a/meta/recipes-kernel/linux/linux-yocto_5.10.bb b/meta/recipes-kernel/linux/linux-yocto_5.10.bb index 1e99e24284..91ab6ea9b3 100644 --- a/meta/recipes-kernel/linux/linux-yocto_5.10.bb +++ b/meta/recipes-kernel/linux/linux-yocto_5.10.bb @@ -13,23 +13,23 @@ KBRANCH:qemux86 ?= "v5.10/standard/base" KBRANCH:qemux86-64 ?= "v5.10/standard/base" KBRANCH:qemumips64 ?= "v5.10/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "4b707a62625e8fe23b5b0c0a09edf6e585bbcac5" -SRCREV_machine:qemuarm64 ?= "c397c6206489ac3461c6aba4f8d2e7b86f1e87af" -SRCREV_machine:qemumips ?= "6e80c5bec3588a72fb128353c6ff56585abd869b" -SRCREV_machine:qemuppc ?= "b7064086e1737cec9f9810a2825c0a6e691e3cba" -SRCREV_machine:qemuriscv64 ?= "4fad5e082ddeadeb2a55042d151e3a3b519e2f53" -SRCREV_machine:qemuriscv32 ?= "4fad5e082ddeadeb2a55042d151e3a3b519e2f53" -SRCREV_machine:qemux86 ?= "4fad5e082ddeadeb2a55042d151e3a3b519e2f53" -SRCREV_machine:qemux86-64 ?= "4fad5e082ddeadeb2a55042d151e3a3b519e2f53" -SRCREV_machine:qemumips64 ?= "ef16c1d288827d14ae68defeb1b446aeae8b4141" -SRCREV_machine ?= "4fad5e082ddeadeb2a55042d151e3a3b519e2f53" -SRCREV_meta ?= "bdf41f170f57425ff7ec651a88d787d8554b6f86" +SRCREV_machine:qemuarm ?= "85c2e636ff0c1dc431de60f0113b1f5f89967ca4" +SRCREV_machine:qemuarm64 ?= "4afca6da69d97af944983918087728d5741df052" +SRCREV_machine:qemumips ?= "483a2f5f0bf0048b3e864b2a6a9cc1399d27bd1e" +SRCREV_machine:qemuppc ?= "9f99a56eda87f9de191f14668b488b3b24132c7a" +SRCREV_machine:qemuriscv64 ?= "e715b8acadb88331f3fc8c820e54e4d27b8c67db" +SRCREV_machine:qemuriscv32 ?= "e715b8acadb88331f3fc8c820e54e4d27b8c67db" +SRCREV_machine:qemux86 ?= "e715b8acadb88331f3fc8c820e54e4d27b8c67db" +SRCREV_machine:qemux86-64 ?= "e715b8acadb88331f3fc8c820e54e4d27b8c67db" +SRCREV_machine:qemumips64 ?= "6bddecdb7271f2cbede46ade8701ce9d0c2bd0f2" +SRCREV_machine ?= "e715b8acadb88331f3fc8c820e54e4d27b8c67db" +SRCREV_meta ?= "e269c86d186e2727bdceab40e3a71ec45e0252d1" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRANCH}; \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.10;destsuffix=${KMETA}" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "5.10.183" +LINUX_VERSION ?= "5.10.184" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" DEPENDS += "openssl-native util-linux-native" From patchwork Wed Jun 28 14:12:40 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 26610 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D42B3EB64DA for ; Wed, 28 Jun 2023 14:13:37 +0000 (UTC) Received: from mail-pl1-f169.google.com (mail-pl1-f169.google.com [209.85.214.169]) by mx.groups.io with SMTP id smtpd.web10.17377.1687961607770103058 for ; Wed, 28 Jun 2023 07:13:27 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=AdvOKPr1; spf=softfail (domain: sakoman.com, ip: 209.85.214.169, mailfrom: steve@sakoman.com) Received: by mail-pl1-f169.google.com with SMTP id d9443c01a7336-1b8063aa2e1so22171435ad.1 for ; Wed, 28 Jun 2023 07:13:27 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1687961607; x=1690553607; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=176bPYkmKafsciCYbrofg/O3l79dJpBmzPmq27LpJ78=; b=AdvOKPr1mAcvD00CHy8+0utekZMNEooHljwi7HaBIIdAfaGsqloAx4+M3vFhA2/mM0 BYkQJOlbUOGBGQO1Frpo6VPKvEqPC1j/5rHFMkxyerq0+4Isgfrktab5wYRzOEKNh/ZU xDz/V2Ir/LyBvSvC+diZNnOknN9S6Zu1AH0WtsBq+UhoWx8xPoPMSxhO3T2hDIkkF0Ra OqFX2kPazkuxZIZtHA8o06fPxxbRaeYHxU0lF0cgP0wNKiVMca5/waL11epKHxW8WZ9T zCalLcuG1ahx8GAPyHMabrBM30FKu3c9vdTIBWbKq56WjYoEYK+3YFevln9Y9zvKf88+ A17Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1687961607; x=1690553607; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=176bPYkmKafsciCYbrofg/O3l79dJpBmzPmq27LpJ78=; b=TN81SWy3D2aNlE3ocNr7fmcBLppJy4NsfUgbwwBLEYLblh17hkCD34lwEi8CNFIlGr 1m2lVtTXuth3TbTaVJxIphm6iIbWcgdNWqFkoyF9hFn9WvdoZNIjx4D8vmPPWsEJeAJT SuLL7xIlNKG6ZFd/rZF5GnG1C5vBGxn7YR6hVSP/DnNjQlYmY65FoxLuSHZ4QNpJWmu/ uCNORO3RhrD2sGi58iKIescu1TigD0LI9cgrXX4HW6GJh6TXbKNy3/rmu6zwdaRKtFPz Pk+hNxhMp2KazsRGIfoElTjBpHxAyd6a77Gv4ckVltCVWF+DTaaOYvuDPTK7d1IahcsB rOJQ== X-Gm-Message-State: AC+VfDyxgyAfnqxISVdbH/JaMSLtyDc9yMu7EfHPpywcZSmYbhJKR65y KgYPtWIb8O2L9oeFgTG9n3OjtKM0FwBvVVaM+xRkFA== X-Google-Smtp-Source: ACHHUZ4/SKnCQ3xmyum5Uyq8smblxv/eKVb2TXzeUo10MjjgD+6WutLzE+r3kfEcSWK1dIQ7pJbDxA== X-Received: by 2002:a17:902:db12:b0:1b7:4702:5b64 with SMTP id m18-20020a170902db1200b001b747025b64mr8323686plx.52.1687961606601; Wed, 28 Jun 2023 07:13:26 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id b19-20020a170902d89300b001b3ce619e2esm7792092plz.179.2023.06.28.07.13.25 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 28 Jun 2023 07:13:26 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 15/29] linux-yocto/5.10: update to v5.10.185 Date: Wed, 28 Jun 2023 04:12:40 -1000 Message-Id: <0cacc63b11f85a37e3a91b1097ca516647facb8f.1687961326.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 28 Jun 2023 14:13:37 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/183570 From: Bruce Ashfield Updating to the latest korg -stable release that comprises the following commits: ef0d5feb32ab Linux 5.10.185 ed2bf5cee6c6 um: Fix build w/o CONFIG_PM_SLEEP f73ec12dc718 drm/i915/gen11+: Only load DRAM information from pcode 27458487c8f4 drm/i915/dg1: Wait for pcode/uncore handshake at startup 2d1c19597d1e media: dvb-core: Fix use-after-free due to race at dvb_register_device() 5c61c3945adf media: dvbdev: fix error logic at dvb_register_device() a1b26dac8bc6 media: dvbdev: Fix memleak in dvb_register_device a13dee47fa2a nilfs2: reject devices with insufficient block count c374552b54d6 mm/memory_hotplug: extend offline_and_remove_memory() to handle more than one memory block e6dc6a9d0a76 mmc: block: ensure error propagation for non-blk 7ce0e8b28720 batman-adv: Switch to kstrtox.h for kstrtou64 e6104284c42f neighbour: delete neigh_lookup_nodev as not used bf82668eb950 net: Remove DECnet leftovers from flow.h. 7d07fd03f50c net: Remove unused inline function dst_hold_and_use() 53076071fb92 neighbour: Remove unused inline function neigh_key_eq16() 7230a9e599d3 rcu/kvfree: Avoid freeing new kfree_rcu() memory after old grace period a26158962176 cgroup: always put cset in cgroup_css_set_put_fork 4c1084386332 afs: Fix vlserver probe RTT handling 49b6607dedc2 selftests/ptp: Fix timestamp printf format for PTP_SYS_OFFSET 08899e8d5a99 net: tipc: resize nlattr array to correct size 5fd696b404fb net: lapbether: only support ethernet devices 6ee3728ae87e net/sched: cls_api: Fix lockup on flushing explicitly created chain efed5b50f3b8 ext4: drop the call to ext4_error() from ext4_get_group_info() 6ab91d1adb5a drm/nouveau: add nv_encoder pointer check for NULL 5d43bb9b3e0c drm/nouveau/dp: check for NULL nv_connector->native_mode edb970e03d65 drm/nouveau: don't detect DSM for non-NVIDIA device 8c3446ab5902 igb: fix nvm.ops.read() error handling 221281d60c46 sctp: fix an error code in sctp_sf_eat_auth() 5c47ed7f25d6 ipvlan: fix bound dev checking for IPv6 l3s mode 3c97f2c9ec29 IB/isert: Fix incorrect release of isert connection da6ae4aab5a6 IB/isert: Fix possible list corruption in CMA handler 2b6f8817ca66 IB/isert: Fix dead lock in ib_isert 2f9d26345c6e IB/uverbs: Fix to consider event queue closing also upon non-blocking mode 6cccdbc9f09c RDMA/cma: Always set static rate to 0 for RoCE f49abbb27416 RDMA/mlx5: Initiate dropless RQ for RAW Ethernet functions aa277d5cd4b2 octeontx2-af: fixed resource availability check 0fb48a2a6ad4 iavf: remove mask from iavf_irq_enable_queues() 079a9591ee18 RDMA/rxe: Fix the use-before-initialization error of resp_pkts 089a0e831f68 RDMA/rxe: Removed unused name from rxe_task struct 6205c0d9ff8b RDMA/rxe: Remove the unused variable obj af6eaa57986e net/sched: cls_u32: Fix reference counter leak leading to overflow 5852d17aaa8b ping6: Fix send to link-local addresses with VRF. 9e666a77f008 net: enetc: correct the indexes of highest and 2nd highest TCs 1200af82cf0b netfilter: nfnetlink: skip error delivery on batch in case of ENOMEM af42c4fd827c spi: fsl-dspi: avoid SCK glitches with continuous transfers cb6ec51ddd00 RDMA/rtrs: Fix the last iu->buf leak in err path 26293251ab64 usb: dwc3: gadget: Reset num TRBs before giving back the request f4bc41694289 serial: lantiq: add missing interrupt ack 0b6e65016c3c USB: serial: option: add Quectel EM061KGL series 1c004b379b03 Remove DECnet support from kernel e9d384983fa9 ALSA: hda/realtek: Add a quirk for Compaq N14JP6 1148d4ca3029 net: usb: qmi_wwan: add support for Compal RXM-G1 d7acfd522560 RDMA/uverbs: Restrict usage of privileged QKEYs 96e14c91c530 nouveau: fix client work fence deletion race f1f7117b2236 powerpc/purgatory: remove PGO flags 26c80741ceb6 x86/purgatory: remove PGO flags f368aed4827b kexec: support purgatories with .text.hot sections 7e78b9142fdf nilfs2: fix possible out-of-bounds segment allocation in resize ioctl 902fcec05295 nilfs2: fix incomplete buffer cleanup in nilfs_btnode_abort_change_key() d59293f082dc nios2: dts: Fix tse_mac "max-frame-size" property 2847d9eed48b ocfs2: check new file size on fallocate call e73b135f540c ocfs2: fix use-after-free when unmounting read-only filesystem 370f5d98ffe5 epoll: ep_autoremove_wake_function should use list_del_init_careful 4716c73b1885 io_uring: hold uring mutex around poll removal 93a68acc497b irqchip/gic: Correctly validate OF quirk descriptors 2a2641a842ea drm:amd:amdgpu: Fix missing buffer object unlock in failure path 7c0b17679b43 xen/blkfront: Only check REQ_FUA for writes 8e45fb70f4b5 ASoC: dwc: move DMA init to snd_soc_dai_driver probe() d47b5a6d2331 mips: Move initrd_start check after initrd address sanitisation. 619672bf2d04 MIPS: Alchemy: fix dbdma2 0ca73b45b767 parisc: Flush gatt writes and adjust gatt mask in parisc_agp_mask_memory() 3f7625e08620 parisc: Improve cache flushing for PCXL in arch_sync_dma_for_cpu() 73102fdb5bf3 ASoC: soc-pcm: test if a BE can be prepared 3bc883132d03 btrfs: handle memory allocation failure in btrfs_csum_one_bio 142fbad31405 btrfs: scrub: try harder to mark RAID56 block groups read-only 35d32d841592 power: supply: Fix logic checking if system is running from battery 8b7a2207ee40 irqchip/gic-v3: Disable pseudo NMIs on Mediatek devices w/ firmware issues dbf610997242 regulator: Fix error checking for debugfs_create_dir 37bcc48e7dd1 platform/x86: asus-wmi: Ignore WMI events with codes 0x7B, 0xC0 88d1c1365ff6 power: supply: Ratelimit no data debug output 6be7a4bef9dc tools: gpio: fix debounce_period_us output of lsgpio 39eb9eb9ea43 ARM: dts: vexpress: add missing cache properties b2856c3cd3b2 power: supply: bq27xxx: Use mod_delayed_work() instead of cancel() + schedule() ce2b5f24caad power: supply: sc27xx: Fix external_power_changed race 9e9e150fa8a6 power: supply: ab8500: Fix external_power_changed race 539c387f0bb9 test_firmware: fix a memory leak with reqs buffer af36f35074b1 test_firmware: prevent race conditions by a correct implementation of locking 682ca602515d test_firmware: Use kstrtobool() instead of strtobool() 6e2e551e39fd kernel.h: split out kstrtox() and simple_strtox() to a separate header c2def5578b44 lib: cleanup kstrto*() usage Signed-off-by: Bruce Ashfield Signed-off-by: Steve Sakoman --- .../linux/linux-yocto-rt_5.10.bb | 6 ++--- .../linux/linux-yocto-tiny_5.10.bb | 8 +++---- meta/recipes-kernel/linux/linux-yocto_5.10.bb | 24 +++++++++---------- 3 files changed, 19 insertions(+), 19 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb b/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb index af4fede4e9..8e7b0b32a0 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb @@ -11,13 +11,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "2b0a7b0262d2a775fad7d9ca87de32dc88015b74" -SRCREV_meta ?= "e269c86d186e2727bdceab40e3a71ec45e0252d1" +SRCREV_machine ?= "46fb028ad9413cfa8d47a6dc8bf9a57d9d5edf8b" +SRCREV_meta ?= "697cb5ef3aff49be3fa29bf604598ca36ceb5dfd" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.10;destsuffix=${KMETA}" -LINUX_VERSION ?= "5.10.184" +LINUX_VERSION ?= "5.10.185" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb index f85fea070b..5c4eb9e990 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb @@ -6,7 +6,7 @@ KCONFIG_MODE = "--allnoconfig" require recipes-kernel/linux/linux-yocto.inc -LINUX_VERSION ?= "5.10.184" +LINUX_VERSION ?= "5.10.185" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -15,9 +15,9 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine:qemuarm ?= "8cec679b919f74822063e03f38e5a1b5df6248bc" -SRCREV_machine ?= "962077eea8f30dbc431d66ea7a2cee33659854e2" -SRCREV_meta ?= "e269c86d186e2727bdceab40e3a71ec45e0252d1" +SRCREV_machine:qemuarm ?= "6e0299be775387485e22edcd57ac6099c08f4356" +SRCREV_machine ?= "772cf990473f73ebf34c1a1ef4f06eb3e297c4db" +SRCREV_meta ?= "697cb5ef3aff49be3fa29bf604598ca36ceb5dfd" PV = "${LINUX_VERSION}+git${SRCPV}" diff --git a/meta/recipes-kernel/linux/linux-yocto_5.10.bb b/meta/recipes-kernel/linux/linux-yocto_5.10.bb index 91ab6ea9b3..6e82782a38 100644 --- a/meta/recipes-kernel/linux/linux-yocto_5.10.bb +++ b/meta/recipes-kernel/linux/linux-yocto_5.10.bb @@ -13,23 +13,23 @@ KBRANCH:qemux86 ?= "v5.10/standard/base" KBRANCH:qemux86-64 ?= "v5.10/standard/base" KBRANCH:qemumips64 ?= "v5.10/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "85c2e636ff0c1dc431de60f0113b1f5f89967ca4" -SRCREV_machine:qemuarm64 ?= "4afca6da69d97af944983918087728d5741df052" -SRCREV_machine:qemumips ?= "483a2f5f0bf0048b3e864b2a6a9cc1399d27bd1e" -SRCREV_machine:qemuppc ?= "9f99a56eda87f9de191f14668b488b3b24132c7a" -SRCREV_machine:qemuriscv64 ?= "e715b8acadb88331f3fc8c820e54e4d27b8c67db" -SRCREV_machine:qemuriscv32 ?= "e715b8acadb88331f3fc8c820e54e4d27b8c67db" -SRCREV_machine:qemux86 ?= "e715b8acadb88331f3fc8c820e54e4d27b8c67db" -SRCREV_machine:qemux86-64 ?= "e715b8acadb88331f3fc8c820e54e4d27b8c67db" -SRCREV_machine:qemumips64 ?= "6bddecdb7271f2cbede46ade8701ce9d0c2bd0f2" -SRCREV_machine ?= "e715b8acadb88331f3fc8c820e54e4d27b8c67db" -SRCREV_meta ?= "e269c86d186e2727bdceab40e3a71ec45e0252d1" +SRCREV_machine:qemuarm ?= "08e7e91e009a1d738962de06f48f9704075d3a56" +SRCREV_machine:qemuarm64 ?= "f23a4523287d5199b67a135e5d1cf3680fe58a3a" +SRCREV_machine:qemumips ?= "82bae5b9d4316474df162ca7e5a2dff35c4ede39" +SRCREV_machine:qemuppc ?= "8b5027212160436c9d466b80e0c385f265acfbdb" +SRCREV_machine:qemuriscv64 ?= "dafc025b033585311d1693255c80b60b690b0e54" +SRCREV_machine:qemuriscv32 ?= "dafc025b033585311d1693255c80b60b690b0e54" +SRCREV_machine:qemux86 ?= "dafc025b033585311d1693255c80b60b690b0e54" +SRCREV_machine:qemux86-64 ?= "dafc025b033585311d1693255c80b60b690b0e54" +SRCREV_machine:qemumips64 ?= "ee18c4343db52d5846a0f332cd6df26a6f72dd45" +SRCREV_machine ?= "dafc025b033585311d1693255c80b60b690b0e54" +SRCREV_meta ?= "697cb5ef3aff49be3fa29bf604598ca36ceb5dfd" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRANCH}; \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.10;destsuffix=${KMETA}" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "5.10.184" +LINUX_VERSION ?= "5.10.185" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" DEPENDS += "openssl-native util-linux-native" From patchwork Wed Jun 28 14:12:41 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 26609 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D427EEB64D7 for ; Wed, 28 Jun 2023 14:13:37 +0000 (UTC) Received: from mail-pl1-f179.google.com (mail-pl1-f179.google.com [209.85.214.179]) by mx.groups.io with SMTP id smtpd.web11.17584.1687961609339950624 for ; Wed, 28 Jun 2023 07:13:29 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="signature has expired" header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=kLfrzk+g; spf=softfail (domain: sakoman.com, ip: 209.85.214.179, mailfrom: steve@sakoman.com) Received: by mail-pl1-f179.google.com with SMTP id d9443c01a7336-1b539d2f969so7487565ad.0 for ; Wed, 28 Jun 2023 07:13:29 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1687961608; x=1690553608; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=JuG8mlkvZIWUl66go7aNaY1AHjXwll8INRh41iqa9LI=; b=kLfrzk+ga8SGu7EYGGuQyHoqHCdan0ZHRij3MSPCt96e7/vJjKGbS+vATrDJBhqssF 4wYhGd345gNBvbbKLcH0rFL+WHKbYXGq3YKoh2D90Cdr7LYHhWrHuq2LSf6ZECg8ARx5 yy1K1vd4RdaSl5HgIVuHmI3KV76VrRSI5mT1Giaxc/LxHHsB6HI1mEFVBhURFqcWZzpA InCxA+p3P06fDICy6xAf7KeSg6pXjS+j/L8aadgz2b67XbjlKbTxGHDDC5jzj7y+zjyI w9YngNHV5B30eVfn+toxezOY0Adev8Pk/wHB25lyFjRJrO15AeqXcLLFs7jpuAk7BY1M caqg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1687961608; x=1690553608; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=JuG8mlkvZIWUl66go7aNaY1AHjXwll8INRh41iqa9LI=; b=JY9KyK784CRBFWE33usFU5jP9r0wlOLyFtz9fZ8shpwN9/QRPM25VsMy1LMPOq8DXp Z6MoPw4/VMFDHBPpsAWF1DWBI0kN6garIrZldnPiDnK8aYQnyTjYBV712DxX+8peyqFt pQb4Y9sOShrMAL0CRw2qZs/A/GjjO/8Y7Jwhr74ScbWD7gdU0mmwK7/cXDUbp0b4o6tt LdRfeBLgbwzsx0t4bB5HrNOIQGUeykP7KLpkM46FwAqO5KgozNELmOO95swRWAE5RpGW A8xK8MDwuEwGV4TZJEIpMeBFbiIzMN3WxuumBF5HGTuxsteVVD8NZw4WFdfCXVHfz2ji v0ng== X-Gm-Message-State: AC+VfDyRyh95wwgQl4YYafO3U0d94klgeH9DWxtbKpKUfvIdCzXmgLGh 9BTOY5RotKLGekSUMMkzHxYP8LiS+KwO9F4Wc6ZaYA== X-Google-Smtp-Source: ACHHUZ7UMn1RlXCcOV8wru4izAaPbJx3Ng/pV16h4kvmiB0GkJGRa0rWfXPkouFBxxGGEhXxGw84Pw== X-Received: by 2002:a17:902:f68a:b0:1ae:6947:e63b with SMTP id l10-20020a170902f68a00b001ae6947e63bmr2137998plg.16.1687961608434; Wed, 28 Jun 2023 07:13:28 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id b19-20020a170902d89300b001b3ce619e2esm7792092plz.179.2023.06.28.07.13.27 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 28 Jun 2023 07:13:28 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 16/29] linux-yocto/5.10: cfg: fix DECNET configuration warning Date: Wed, 28 Jun 2023 04:12:41 -1000 Message-Id: <60eb677142dfd0264a99f626b5b9ede1a6d706e1.1687961326.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 28 Jun 2023 14:13:37 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/183571 From: Bruce Ashfield Dropping CONFIG_DECNET as it has been removed from -stable and we now get a configuration warning. Signed-off-by: Bruce Ashfield Signed-off-by: Steve Sakoman --- meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb | 2 +- meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb | 2 +- meta/recipes-kernel/linux/linux-yocto_5.10.bb | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb b/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb index 8e7b0b32a0..7976b96a61 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb @@ -12,7 +12,7 @@ python () { } SRCREV_machine ?= "46fb028ad9413cfa8d47a6dc8bf9a57d9d5edf8b" -SRCREV_meta ?= "697cb5ef3aff49be3fa29bf604598ca36ceb5dfd" +SRCREV_meta ?= "c1168e10ecf30b123a341ca500966eebf3fe2cc2" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.10;destsuffix=${KMETA}" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb index 5c4eb9e990..85dac1d874 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb @@ -17,7 +17,7 @@ KCONF_BSP_AUDIT_LEVEL = "2" SRCREV_machine:qemuarm ?= "6e0299be775387485e22edcd57ac6099c08f4356" SRCREV_machine ?= "772cf990473f73ebf34c1a1ef4f06eb3e297c4db" -SRCREV_meta ?= "697cb5ef3aff49be3fa29bf604598ca36ceb5dfd" +SRCREV_meta ?= "c1168e10ecf30b123a341ca500966eebf3fe2cc2" PV = "${LINUX_VERSION}+git${SRCPV}" diff --git a/meta/recipes-kernel/linux/linux-yocto_5.10.bb b/meta/recipes-kernel/linux/linux-yocto_5.10.bb index 6e82782a38..2c7a3e2597 100644 --- a/meta/recipes-kernel/linux/linux-yocto_5.10.bb +++ b/meta/recipes-kernel/linux/linux-yocto_5.10.bb @@ -23,7 +23,7 @@ SRCREV_machine:qemux86 ?= "dafc025b033585311d1693255c80b60b690b0e54" SRCREV_machine:qemux86-64 ?= "dafc025b033585311d1693255c80b60b690b0e54" SRCREV_machine:qemumips64 ?= "ee18c4343db52d5846a0f332cd6df26a6f72dd45" SRCREV_machine ?= "dafc025b033585311d1693255c80b60b690b0e54" -SRCREV_meta ?= "697cb5ef3aff49be3fa29bf604598ca36ceb5dfd" +SRCREV_meta ?= "c1168e10ecf30b123a341ca500966eebf3fe2cc2" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRANCH}; \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.10;destsuffix=${KMETA}" From patchwork Wed Jun 28 14:12:42 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 26611 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id E2379C3DA40 for ; Wed, 28 Jun 2023 14:13:37 +0000 (UTC) Received: from mail-pl1-f176.google.com (mail-pl1-f176.google.com [209.85.214.176]) by mx.groups.io with SMTP id smtpd.web11.17586.1687961611191376764 for ; Wed, 28 Jun 2023 07:13:31 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="signature has expired" header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=yMEczqDf; spf=softfail (domain: sakoman.com, ip: 209.85.214.176, mailfrom: steve@sakoman.com) Received: by mail-pl1-f176.google.com with SMTP id d9443c01a7336-1b7dd061e9aso27543975ad.2 for ; Wed, 28 Jun 2023 07:13:31 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1687961610; x=1690553610; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=HmPQr2rJl56a2qql32V2OdWc3MEraY1hpYRmMZTd1wA=; b=yMEczqDf8g3jdQI+eQZrCsMfPKLUswNLZMj0WCRoWVqvatljeNHbA/wY5zMKD/4BDE ZR9/RhZfZ3rDH9n/0cOWJnJLV70WFh09ljkBveblluZWCgmd9CceQuZbMdED8tKDXPSq AtNX/ZXUXfRMyCrS/9SW+9+L2tDeGXT51Ap4r0YFpriWVvmjYIxkPElVbVlCe8M2lf3G 5/riZYix42ffkarQ26jnR2ngs2t0BR3XssD/eIJD/WPZ07MnkcsaCYvXfwf3HVceJ63+ ahssoWEqc4vJzher+1anNxasB7XPVhXgz187PPg3mwWcBXHnNJHQ+9dOPgJMExKhNwXT PBDA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1687961610; x=1690553610; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=HmPQr2rJl56a2qql32V2OdWc3MEraY1hpYRmMZTd1wA=; b=DX91NSir+/QQy9p5dsGGatqjHo5MT6ck7vZzkfNsKYaH9JE/RPGgPOWtg6Df/m+8fC 0kLUbPmL7HPx33tcREerS1a/yV2H+pP3p6UdarmOkLAP102XAHQJ4yIhhj2S9rPb3KvM iRqygQvogq0LnTN+7ESW25jv5gRcSSyv2GhYB6QPzEqwLFPX/Exyd57wm9eYi3XnqfxZ RhU+9qkMasIApYutSr4mcPA91UoE9hKO/mVpBKHR3MCytmQipATccE7U0fHH1gVMa9JZ 8ehLdo2FJKHKCgeWDd0Bi79Cv2Wp88B9/pfjIDi0kE6E9F7chmiRmvQBEq6Aywq/cGOj 6HIQ== X-Gm-Message-State: AC+VfDwgKYVQ/sCCuvGvY4l9E+zB5u9ATidkgVc3PWeV14XUZGA5+Fo6 JGRvDDz2yhTfLNFrPB41DhSJMaylJm8v5wlMX23Niw== X-Google-Smtp-Source: ACHHUZ4yJgL94Srg7RHYsi0ujVNrfVWhrXUAQceBzqGBF41fcV/ksWFvEIbriXljWxPw/zMZhRqmXQ== X-Received: by 2002:a17:902:ecce:b0:1b5:561a:5ca9 with SMTP id a14-20020a170902ecce00b001b5561a5ca9mr11881674plh.50.1687961610196; Wed, 28 Jun 2023 07:13:30 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id b19-20020a170902d89300b001b3ce619e2esm7792092plz.179.2023.06.28.07.13.29 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 28 Jun 2023 07:13:29 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 17/29] psmisc: Set ALTERNATIVE for pstree to resolve conflict with busybox Date: Wed, 28 Jun 2023 04:12:42 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 28 Jun 2023 14:13:37 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/183572 From: Frieder Schrempf If pstree in busybox is enabled there is a conflict with pstree from psmisc resulting in: do_rootfs: Postinstall scriptlets of ['busybox'] have failed. If the intention is to defer them to first boot, then please place them into pkg_postinst_ontarget:${PN} (). Deferring to first boot via 'exit 1' is no longer supported. And more detailed in do_rootfs.log: update-alternatives: Error: not linking [...]/rootfs/usr/bin/pstree to /bin/busybox.nosuid since [...]/rootfs/usr/bin/pstree exists and is not a link On order to fix this set ALTERNATIVE:pstree accordingly. Signed-off-by: Frieder Schrempf Signed-off-by: Alexandre Belloni Signed-off-by: Richard Purdie (cherry picked from commit deb2176df76dcb16c0d90072ad63d308a0ab1158) Signed-off-by: Steve Sakoman --- meta/recipes-extended/psmisc/psmisc.inc | 2 ++ 1 file changed, 2 insertions(+) diff --git a/meta/recipes-extended/psmisc/psmisc.inc b/meta/recipes-extended/psmisc/psmisc.inc index 12539dad53..44b82bd325 100644 --- a/meta/recipes-extended/psmisc/psmisc.inc +++ b/meta/recipes-extended/psmisc/psmisc.inc @@ -54,3 +54,5 @@ ALTERNATIVE_PRIORITY = "90" ALTERNATIVE:killall = "killall" ALTERNATIVE:fuser = "fuser" + +ALTERNATIVE:pstree = "pstree" From patchwork Wed Jun 28 14:12:43 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 26614 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id F067DC001B1 for ; Wed, 28 Jun 2023 14:13:37 +0000 (UTC) Received: from mail-pl1-f173.google.com (mail-pl1-f173.google.com [209.85.214.173]) by mx.groups.io with SMTP id smtpd.web11.17589.1687961613060969493 for ; Wed, 28 Jun 2023 07:13:33 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="signature has expired" header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=OQAFsFxD; spf=softfail (domain: sakoman.com, ip: 209.85.214.173, mailfrom: steve@sakoman.com) Received: by mail-pl1-f173.google.com with SMTP id d9443c01a7336-1b7f68f1c9eso34597295ad.2 for ; Wed, 28 Jun 2023 07:13:33 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1687961612; x=1690553612; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=A0X63zrnq7mgMX1ZoT+SDrJGVybAg7G9XMTzwceXOFI=; b=OQAFsFxD7YEY++eCcm/RL6KYiIcUw8bqF4jtX5S5R7DyRtUGKMgoRlj26oEAlH9NrN V0CMXRJ99iT5vkKaw67oLa9d1IxIWMVU/ZTpSd0/Y0QXAslvvojUfSmQVlK1r9OIItq4 H6XELvjz4y4sXyGU6QSTp3Jh0xU2v/ofzw6LeI9Z/utTjCvHxHTqfmKtk2i2bvsDTs64 tZuBJdzTsd9Fc9Vo8hbuOnqNMc7gjRJl79s7/10gWCMX5DZggmDMFFOmBzu5nrAJ023t kFnom+758Z1mAMPGKZZgbxqe3FJVhez9p5jPUoyCzo50rJcIevgDruI/TJuxaSHhbIKm tCnA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1687961612; x=1690553612; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=A0X63zrnq7mgMX1ZoT+SDrJGVybAg7G9XMTzwceXOFI=; b=AeJAV14kZ3WlLa62So0BeCuj42b5phl5X1op2ppwKXyONw0CFXMzD91KPtWHOBf4Qe tPascxCh15bl0ljTtSQ2TRRHMZk8xPmBfmB1nyK6bE6PyoAAIzpVETkAnkauRdF9ijpy SCDuOy097Sswh5mMKseRyV8Bb0btaml97skA800SU9+0TDbsyOCV+eWh71Z94mJSqFnO DoHyWpz46XV9QsKA/fO3gByGJodXKxlX7cSa9C1iTjjSnQvY7LBcuPCSoJM9hRFoJiIf fR/ok826HnQ/tAhwv85/TzMK+UuQRJCNqFWJEtn//SIBRZ3aQ7o1xYUH5dBrL7ME3NjN sY8Q== X-Gm-Message-State: AC+VfDzS28MbZeEmoMTg6bOJy9d2UoUQgsLgHfw2NtfD7HDnkJ6oeZH+ Kbeg6u5zAmjliaWaS2qm2ROdpM3OY4RUrz9wiyAC9w== X-Google-Smtp-Source: ACHHUZ5Qe7xHXdcuW9QAnYwGA+pm6mrBjuSGKsVHCX9vTHePeHWL0zt+++yrXNvRsFOPSS2P+O/TnQ== X-Received: by 2002:a17:902:ce8a:b0:1b8:d4c:725 with SMTP id f10-20020a170902ce8a00b001b80d4c0725mr8561745plg.15.1687961611923; Wed, 28 Jun 2023 07:13:31 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id b19-20020a170902d89300b001b3ce619e2esm7792092plz.179.2023.06.28.07.13.31 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 28 Jun 2023 07:13:31 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 18/29] minicom: remove unused patch files Date: Wed, 28 Jun 2023 04:12:43 -1000 Message-Id: <094d2341240fc09a91fea7bea1b3c51a08ad9817.1687961326.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 28 Jun 2023 14:13:37 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/183573 From: Martin Jansa * they were removed from SRC_URI in: https://git.openembedded.org/openembedded-core/commit/?id=41f8760dd8a8ac388389bc17dbc5e0ae0f64bf57 Signed-off-by: Martin Jansa Signed-off-by: Richard Purdie (cherry picked from commit a0f28cd8d01f4faeedc1089e5d1e2dacc5b046f9) Signed-off-by: Steve Sakoman (cherry picked from commit 4395c783e544de30f650459677055737148ea261) Signed-off-by: Steve Sakoman --- ...erfluous-global-variable-definitions.patch | 35 ---------------- ...erfluous-global-variable-definitions.patch | 37 ---------------- ...erfluous-global-variable-definitions.patch | 42 ------------------- 3 files changed, 114 deletions(-) delete mode 100644 meta/recipes-extended/minicom/minicom/0001-Drop-superfluous-global-variable-definitions.patch delete mode 100644 meta/recipes-extended/minicom/minicom/0002-Drop-superfluous-global-variable-definitions.patch delete mode 100644 meta/recipes-extended/minicom/minicom/0003-Drop-superfluous-global-variable-definitions.patch diff --git a/meta/recipes-extended/minicom/minicom/0001-Drop-superfluous-global-variable-definitions.patch b/meta/recipes-extended/minicom/minicom/0001-Drop-superfluous-global-variable-definitions.patch deleted file mode 100644 index 01b23898e7..0000000000 --- a/meta/recipes-extended/minicom/minicom/0001-Drop-superfluous-global-variable-definitions.patch +++ /dev/null @@ -1,35 +0,0 @@ -From b65152ebc03832972115e6d98e50cb6190d01793 Mon Sep 17 00:00:00 2001 -From: =?UTF-8?q?Ond=C5=99ej=20Lyson=C4=9Bk?= -Date: Mon, 3 Feb 2020 13:18:13 +0100 -Subject: [PATCH 1/3] Drop superfluous global variable definitions - -The file minicom.c, by including the minicom.h header, already defines -the global variables 'dial_user' and 'dial_pass'. The object file -minicom.o is always linked to dial.o. Thus the definitions in dial.c -can be dropped. - -This fixes linking with gcc 10 which uses -fno-common by default, -disallowing multiple global variable definitions. - -Upstream-Status: Backport [https://salsa.debian.org/minicom-team/minicom/-/commit/db269bba2a68fde03f5df45ac8372a8f1248ca96] -Signed-off-by: Khem Raj ---- - src/dial.c | 2 -- - 1 file changed, 2 deletions(-) - -diff --git a/src/dial.c b/src/dial.c -index eada5ee..d9d481f 100644 ---- a/src/dial.c -+++ b/src/dial.c -@@ -146,8 +146,6 @@ static int newtype; - /* Access to ".dialdir" denied? */ - static int dendd = 0; - static char *tagged; --char *dial_user; --char *dial_pass; - - /* Change the baud rate. Treat all characters in the given array as if - * they were key presses within the comm parameters dialog (C-A P) and --- -2.24.1 - diff --git a/meta/recipes-extended/minicom/minicom/0002-Drop-superfluous-global-variable-definitions.patch b/meta/recipes-extended/minicom/minicom/0002-Drop-superfluous-global-variable-definitions.patch deleted file mode 100644 index e86b470b7e..0000000000 --- a/meta/recipes-extended/minicom/minicom/0002-Drop-superfluous-global-variable-definitions.patch +++ /dev/null @@ -1,37 +0,0 @@ -From 924bd2da3a00e030e29d82b74ef82900bd50b475 Mon Sep 17 00:00:00 2001 -From: =?UTF-8?q?Ond=C5=99ej=20Lyson=C4=9Bk?= -Date: Mon, 3 Feb 2020 13:18:33 +0100 -Subject: [PATCH 2/3] Drop superfluous global variable definitions - -The only place where the EXTERN macro mechanism is used to define the -global variables 'vt_outmap' and 'vt_inmap' is minicom.c (by defining -an empty EXTERN macro and including the minicom.h header). The file -vt100.c already defines these variables. The vt100.o object file is -always linked to minicom.o. Thus it is safe not to define the -variables in minicom.c and only declare them in the minicom.h header. - -This fixes linking with gcc 10 which uses -fno-common by default, -disallowing multiple global variable definitions. - -Upstream-Status: Backport [https://salsa.debian.org/minicom-team/minicom/-/commit/c69cad5b5dda85d361a3a0c1fddc65e933f26d11] -Signed-off-by: Khem Raj ---- - src/minicom.h | 2 +- - 1 file changed, 1 insertion(+), 1 deletion(-) - -diff --git a/src/minicom.h b/src/minicom.h -index 061c013..0f9693b 100644 ---- a/src/minicom.h -+++ b/src/minicom.h -@@ -141,7 +141,7 @@ EXTERN int sbcolor; /* Status Bar Background Color */ - EXTERN int st_attr; /* Status Bar attributes. */ - - /* jl 04.09.97 conversion tables */ --EXTERN unsigned char vt_outmap[256], vt_inmap[256]; -+extern unsigned char vt_outmap[256], vt_inmap[256]; - - /* MARK updated 02/17/95 - history buffer */ - EXTERN int num_hist_lines; /* History buffer size */ --- -2.24.1 - diff --git a/meta/recipes-extended/minicom/minicom/0003-Drop-superfluous-global-variable-definitions.patch b/meta/recipes-extended/minicom/minicom/0003-Drop-superfluous-global-variable-definitions.patch deleted file mode 100644 index 3225a0c32a..0000000000 --- a/meta/recipes-extended/minicom/minicom/0003-Drop-superfluous-global-variable-definitions.patch +++ /dev/null @@ -1,42 +0,0 @@ -From a4fc603b3641d2efe31479116eb7ba66932901c7 Mon Sep 17 00:00:00 2001 -From: =?UTF-8?q?Ond=C5=99ej=20Lyson=C4=9Bk?= -Date: Mon, 3 Feb 2020 13:21:41 +0100 -Subject: [PATCH 3/3] Drop superfluous global variable definitions - -The only place where the EXTERN macro mechanism is used to define the -global variables 'portfd_is_socket', 'portfd_is_connected' and -'portfd_sock_addr' is minicom.c (by defining an empty EXTERN macro and -including the minicom.h header). The source file sysdep1_s.c already -defines these variables. The sysdep1_s.o object file is always linked -to minicom.o. Thus it is safe to drop the definitions from minicom.c -and only declare the variables in the minicom.h header. - -This fixes linking with gcc 10 which uses -fno-common by default, -disallowing multiple global variable definitions. - -Upstream-Status: Backport [https://salsa.debian.org/minicom-team/minicom/-/commit/c8382374c5d340aa4115d527aed76e876ee5456b] -Signed-off-by: Khem Raj ---- - src/minicom.h | 6 +++--- - 1 file changed, 3 insertions(+), 3 deletions(-) - -diff --git a/src/minicom.h b/src/minicom.h -index 0f9693b..1e7cb8c 100644 ---- a/src/minicom.h -+++ b/src/minicom.h -@@ -113,9 +113,9 @@ EXTERN char *dial_user; /* Our username there */ - EXTERN char *dial_pass; /* Our password */ - - #ifdef USE_SOCKET --EXTERN int portfd_is_socket; /* File descriptor is a unix socket */ --EXTERN int portfd_is_connected; /* 1 if the socket is connected */ --EXTERN struct sockaddr_un portfd_sock_addr; /* the unix socket address */ -+extern int portfd_is_socket; /* File descriptor is a unix socket */ -+extern int portfd_is_connected; /* 1 if the socket is connected */ -+extern struct sockaddr_un portfd_sock_addr; /* the unix socket address */ - #define portfd_connected ((portfd_is_socket && !portfd_is_connected) \ - ? -1 : portfd) - #else --- -2.24.1 - From patchwork Wed Jun 28 14:12:44 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 26613 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id DDE06EB64DD for ; Wed, 28 Jun 2023 14:13:37 +0000 (UTC) Received: from mail-pl1-f169.google.com (mail-pl1-f169.google.com [209.85.214.169]) by mx.groups.io with SMTP id smtpd.web10.17383.1687961614704152238 for ; Wed, 28 Jun 2023 07:13:34 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=Yu9r/VZt; spf=softfail (domain: sakoman.com, ip: 209.85.214.169, mailfrom: steve@sakoman.com) Received: by mail-pl1-f169.google.com with SMTP id d9443c01a7336-1b7ffab7ff1so23981235ad.2 for ; Wed, 28 Jun 2023 07:13:34 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1687961614; x=1690553614; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=ILUq9Z8iMABFgPQpfMaOvJze3gF95BMvINItie0FjnE=; b=Yu9r/VZt79AUXu0YZvczEwgoFJGv2jj+OJkpX9KSs3tpX3VQC9NVHdwwDnPVpjRWxo sfdo8lgfiI7/g+568QXO7WzOG4RFa0aZm1biV0odtHuoJyWYcfPyY80mnORRGX3J3HZi ontpvlY6LWlcIDoNeTnveafrWZype25vcOX36DQqEJbhijB3NjIAlXM/QdbsPw/qL9D8 HSCP2QNBQ3ogghA+xmQb/Fi6ny5TTTJbbrPP9ZXWBItM38MX1wNINJtaJyUfvDVKz4wV 335p9rMDeK4OU3aoy8+oXlu5aZg9vf+yS1v1sNQuldP0aY1GdFlLkepH0KW2E841EKAX Sg9g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1687961614; x=1690553614; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=ILUq9Z8iMABFgPQpfMaOvJze3gF95BMvINItie0FjnE=; b=gUh1wX/Y/uBmrh9AjjJfbS1PMxjD/TV5xqHmtXrrFt0ylaQ/BrlLp4vPU1SYy6px84 5+dOdQJ4yOucKXPMDrJISljoPHdw+SCBaUk0AWDSnXNkOsYx3Ut01uUMzEPCa4ObMFE4 52evYIO4O2I+dsFKUc1Y+3O/I9eraijeEDBS21uUIjKCvAPv5U79OR/Ergn3G9Dw5X91 Z2hpyrZx+bZgt6EDWdD5zkzSxXj5q0+fbV54BMgm4CPVNfDyzWewW0cfpdX3XTDgy0Gg zyeojqVCP1hn43XkyNQa2Ae/CUKj9nU58fkMLUNM/t8jENLRk+C02LMa8dMYFHMyD89P 1g9A== X-Gm-Message-State: AC+VfDzSioz0o6BEAji4Nz5P7ws64ZvCv7cD80xpgXvNwyMYOQen5YiS glamKp5Iiqix2k40rAVf9aFfrNQTqzSHQ+0gF1+YoQ== X-Google-Smtp-Source: ACHHUZ4PUOPrI1UoU6Aao7dPKqbVxpK0FEq0MIVFP6o0n34MVCUjSwlTlzHMlbn7GlsAxvuMeZpirw== X-Received: by 2002:a17:902:ab17:b0:1b0:e0a:b7ab with SMTP id ik23-20020a170902ab1700b001b00e0ab7abmr8276853plb.31.1687961613675; Wed, 28 Jun 2023 07:13:33 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id b19-20020a170902d89300b001b3ce619e2esm7792092plz.179.2023.06.28.07.13.32 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 28 Jun 2023 07:13:33 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 19/29] kmod: remove unused ptest.patch Date: Wed, 28 Jun 2023 04:12:44 -1000 Message-Id: <960b61a53b6a670b4b3a23faff85850a3485f00e.1687961326.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 28 Jun 2023 14:13:37 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/183574 From: Martin Jansa * it was removed from SRC_URI in 2015: https://git.openembedded.org/openembedded-core/commit/?id=f80d136bdd578468035a88125fa1b84973fd912b Signed-off-by: Martin Jansa Signed-off-by: Richard Purdie (cherry picked from commit cfc4586b4bf080a3a4aa419dffc76c5da2a95b74) Signed-off-by: Steve Sakoman --- meta/recipes-kernel/kmod/kmod/ptest.patch | 25 ----------------------- 1 file changed, 25 deletions(-) delete mode 100644 meta/recipes-kernel/kmod/kmod/ptest.patch diff --git a/meta/recipes-kernel/kmod/kmod/ptest.patch b/meta/recipes-kernel/kmod/kmod/ptest.patch deleted file mode 100644 index 831dbcb909..0000000000 --- a/meta/recipes-kernel/kmod/kmod/ptest.patch +++ /dev/null @@ -1,25 +0,0 @@ -Add 'install-ptest' rule. - -Signed-off-by: Tudor Florea -Upstream-Status: Pending - -diff -ruN a/Makefile.am b/Makefile.am ---- a/Makefile.am 2013-07-12 17:11:05.278331557 +0200 -+++ b/Makefile.am 2013-07-12 17:14:27.033788016 +0200 -@@ -204,6 +204,16 @@ - - distclean-local: $(DISTCLEAN_LOCAL_HOOKS) - -+install-ptest: -+ @$(MKDIR_P) $(DESTDIR)/testsuite -+ @for file in $(TESTSUITE); do \ -+ install $$file $(DESTDIR)/testsuite; \ -+ done; -+ @sed -e 's/^Makefile/_Makefile/' < Makefile > $(DESTDIR)/Makefile -+ @$(MKDIR_P) $(DESTDIR)/tools -+ @cp $(noinst_SCRIPTS) $(noinst_PROGRAMS) $(DESTDIR)/tools -+ @cp -r testsuite/rootfs testsuite/.libs $(DESTDIR)/testsuite -+ - # ------------------------------------------------------------------------------ - # custom release helpers - # ------------------------------------------------------------------------------ From patchwork Wed Jun 28 14:12:45 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 26612 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id E21DDC0015E for ; Wed, 28 Jun 2023 14:13:37 +0000 (UTC) Received: from mail-pl1-f175.google.com (mail-pl1-f175.google.com [209.85.214.175]) by mx.groups.io with SMTP id smtpd.web11.17590.1687961616358919913 for ; Wed, 28 Jun 2023 07:13:36 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="signature has expired" header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=VaNyCoPh; spf=softfail (domain: sakoman.com, ip: 209.85.214.175, mailfrom: steve@sakoman.com) Received: by mail-pl1-f175.google.com with SMTP id d9443c01a7336-1b7e1875cc1so24994285ad.1 for ; Wed, 28 Jun 2023 07:13:36 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1687961615; x=1690553615; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=SDvTlixEiVm1Y2EJ6byPx0ZcJN4IyHsLy5PrZUA9x3o=; b=VaNyCoPheA9YPxmbkN+zuS/sIcHRQ93OavASRWqln9oQr/qchC6bjKucW9DfiS2U54 7hB7ZKdBoI1Cxxj0fIwQLpInhdYe57bhrQbyEiy/3VgqRmN4b0KSWFPjZmgt9wLh4lMj C8eKC2kyyhLu9a3aAfjNa1xQMpDo9e7A3jFfH8Yh3jtDVTqwifgHXW6ipgL0IB7Zq2TC SMU4g020qU8+bWCUHZ4WgajNaz2o02UkqIvY3cprQvoy6RWI0vEBSndFzCVfsXdN/0Wx BvWm00u66Tcvt7KL5vK+5h0zQKFJxwwJWk17NRqXGUGjK2bqO92s0XDtYFKiMgzZ+Ngv /WEA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1687961615; x=1690553615; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=SDvTlixEiVm1Y2EJ6byPx0ZcJN4IyHsLy5PrZUA9x3o=; b=MG1cyYqdyfEfFlLRhD72NzKhe91hSvoprsXfrjGb/Gz+AFinQyixwhWLvBKi4Jy3ha C0TuPu7FFron7+TN/qyoCes4JKuL9oNDag1Zb96RB1dBf/tZUEm1mSyBzbxu91FHPL4V GZA3C5xK4rj87XCAH2tudlwOeBjuLOhiYVu7cbw9EPGbBZsVFOnXCF2bDREegd0a9l0Q tXOri8vQP1+tgtH5v51E2YrW52PmXu9ormAue+4243UXkHPLI0lmgcaIj6v0lnev2XCM eFOm/J0hKTF6aEL2n3kr1JRw5lqxXJYhjpb8VgPxEXNUdQKVGLVTe+clWrZrD90lF0Is 3K3g== X-Gm-Message-State: AC+VfDzPfHG7wBW8Zs/nB7f7Fbm0Sr89qotmG2VeXu2ejXCZYycz/zcw 7E6QACIiboOiR1eJeU198vyK+GAb0XUzL8GxU1DHKg== X-Google-Smtp-Source: ACHHUZ7CsLCFRRtkH2bbyCWFA7VZ94OiddYiuO8DGUrcBikT/uZbGmZEDOy1HHWDZMvBcaaZA6CJRQ== X-Received: by 2002:a17:902:ce01:b0:1b6:9b29:bb1a with SMTP id k1-20020a170902ce0100b001b69b29bb1amr8963856plg.9.1687961615458; Wed, 28 Jun 2023 07:13:35 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id b19-20020a170902d89300b001b3ce619e2esm7792092plz.179.2023.06.28.07.13.34 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 28 Jun 2023 07:13:35 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 20/29] pm-utils: fix multilib conflictions Date: Wed, 28 Jun 2023 04:12:45 -1000 Message-Id: <7d99987f76c58ec1f9ee5efffee0705b2c542ad7.1687961326.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 28 Jun 2023 14:13:37 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/183575 From: Kai Kang It fails to instal pm-utils and lib32-pm-utils at same time: Error: Transaction test error: file /usr/bin/pm-is-supported conflicts between attempted installs of lib32-pm-utils-1.4.1-r1.corei7_32 and pm-utils-1.4.1-r1.corei7_64 file /usr/sbin/pm-hibernate conflicts between attempted installs of lib32-pm-utils-1.4.1-r1.corei7_32 and pm-utils-1.4.1-r1.corei7_64 file /usr/sbin/pm-powersave conflicts between attempted installs of lib32-pm-utils-1.4.1-r1.corei7_32 and pm-utils-1.4.1-r1.corei7_64 file /usr/sbin/pm-suspend conflicts between attempted installs of lib32-pm-utils-1.4.1-r1.corei7_32 and pm-utils-1.4.1-r1.corei7_64 file /usr/sbin/pm-suspend-hybrid conflicts between attempted installs of lib32-pm-utils-1.4.1-r1.corei7_32 and pm-utils-1.4.1-r1.corei7_64 All of the conflicted files either is script which source a file in ${libdir}, or a link file to some file in ${libdir}. Compare the content of installed files in ${libdir} exclude binaries, only the paths of ${libdir} diff. So re-define libdir with ${nonarch_libdir} to fix the conflicts. Signed-off-by: Kai Kang Signed-off-by: Richard Purdie (cherry picked from commit f836541bcfdbf033a37537530b4e3b87b0a7f003) Signed-off-by: Steve Sakoman --- meta/recipes-bsp/pm-utils/pm-utils_1.4.1.bb | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/meta/recipes-bsp/pm-utils/pm-utils_1.4.1.bb b/meta/recipes-bsp/pm-utils/pm-utils_1.4.1.bb index c6a4bc4932..dcc09f279e 100644 --- a/meta/recipes-bsp/pm-utils/pm-utils_1.4.1.bb +++ b/meta/recipes-bsp/pm-utils/pm-utils_1.4.1.bb @@ -19,9 +19,12 @@ PACKAGECONFIG[manpages] = "--enable-doc, --disable-doc, libxslt-native xmlto-nat RDEPENDS:${PN} = "grep bash" +EXTRA_OECONF = "--libdir=${nonarch_libdir}" + do_configure:prepend () { ( cd ${S}; autoreconf -f -i -s ) } -FILES:${PN} += "${libdir}/${BPN}/*" +FILES:${PN} += "${nonarch_libdir}/${BPN}/*" FILES:${PN}-dbg += "${datadir}/doc/pm-utils/README.debugging" +FILES:${PN}-dev += "${nonarch_libdir}/pkgconfig/pm-utils.pc" From patchwork Wed Jun 28 14:12:46 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 26615 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id CE3EFEB64D7 for ; Wed, 28 Jun 2023 14:13:47 +0000 (UTC) Received: from mail-pl1-f173.google.com (mail-pl1-f173.google.com [209.85.214.173]) by mx.groups.io with SMTP id smtpd.web11.17591.1687961618236154102 for ; Wed, 28 Jun 2023 07:13:38 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="signature has expired" header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=rRul9ssf; spf=softfail (domain: sakoman.com, ip: 209.85.214.173, mailfrom: steve@sakoman.com) Received: by mail-pl1-f173.google.com with SMTP id d9443c01a7336-1b7f2239bfdso36616815ad.1 for ; Wed, 28 Jun 2023 07:13:38 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1687961617; x=1690553617; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=/DZqVFwVZaMRalDMVQF9GIj2fP6R0pZt2qBuJutS2oA=; b=rRul9ssf6c6wiFDasHHiWd3n5+ejTpRlGYfj1is5u9rRds5e/jbCrvA1dJ2BoUp1z+ EIhtIHeg4f+nu3YTVY5Nc1l+uHtJUnuPQHoHfg2gmqyz42u+pk1AqZV/Az+p2g49+SXz I1n+OWfsjTtVmqtxwVEcRmTNGxNiNMFPc5B94Ydzf7eBDyoNzay0VnJ59wn4AHyRyP3I PuO2fCdfsNXJ6CAHAxWg1Y/ED2o4Ky0D34Kp+BqaPbSMspxTrEIlG7jB0maQmm9RkON1 rYjJu6qwSZBYSFSXBjQp6IJVJyETOI4s8qDcIDqa3ucIWkp3QNXsU8EwIm4YCQyO6OHj 5mzw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1687961617; x=1690553617; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=/DZqVFwVZaMRalDMVQF9GIj2fP6R0pZt2qBuJutS2oA=; b=EMgOZiKYOlaLievn3popau+QCQ4BQN+MZ6QB34ioDySA4msUmuX1rFck9A4NvfJXR7 ZK9cBJpXHnZRE2aymHgXqTY+THjUDqVHHBJ1VslNp+W+t079F8S9xaNp2Z4DUhSQkNbP kBPoP8NCKl/yf58IywaXaApsRj6CKJTzpP3P8BDPMoCJybF3J05tmKvm4vPhGTvA0cD9 +848j7I4rDb6VFcPeomSX9eKPYS82MKqjB5DfNk9dyEzRovSVgQbwZw3q0EZcFGDeXpk 1gbutkE1vDuQYtIEke3uPO03xqp721aZN4haoNuPt2IvtN37DC94IjTL80iYpbFQnJYV uwkQ== X-Gm-Message-State: AC+VfDx5/BnlppaH9UXGlkH2MJJ9ZsqvmtB7xowPuPPznSU/utyw0pBU d9H8WtlfabSgZpdK1C/6ROcCNsGwyM9TgvXeuKuZvQ== X-Google-Smtp-Source: ACHHUZ5OF7ixnGi5SC6IhETC4tWcFFsRzxj+VXm1N7q/QRcBenCfQa/g/DnIkzBxMozFRJSHGk3vSw== X-Received: by 2002:a17:902:6ac5:b0:1b7:fd27:145f with SMTP id i5-20020a1709026ac500b001b7fd27145fmr8804912plt.28.1687961617331; Wed, 28 Jun 2023 07:13:37 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id b19-20020a170902d89300b001b3ce619e2esm7792092plz.179.2023.06.28.07.13.36 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 28 Jun 2023 07:13:37 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 21/29] maintaines.inc: unassign Richard Weinberger from erofs-utils entry Date: Wed, 28 Jun 2023 04:12:46 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 28 Jun 2023 14:13:47 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/183576 From: Alexander Kanavin This was confirmed via private email. Signed-off-by: Alexander Kanavin Signed-off-by: Richard Purdie (cherry picked from commit 834519933fcd6e4ff54f24d0cf671ea9ce24398a) Signed-off-by: Steve Sakoman --- meta/conf/distro/include/maintainers.inc | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/meta/conf/distro/include/maintainers.inc b/meta/conf/distro/include/maintainers.inc index 19bc29708c..5acc80f059 100644 --- a/meta/conf/distro/include/maintainers.inc +++ b/meta/conf/distro/include/maintainers.inc @@ -165,7 +165,7 @@ RECIPE_MAINTAINER:pn-ell = "Zang Ruochen " RECIPE_MAINTAINER:pn-enchant2 = "Anuj Mittal " RECIPE_MAINTAINER:pn-encodings = "Unassigned " RECIPE_MAINTAINER:pn-epiphany = "Alexander Kanavin " -RECIPE_MAINTAINER:pn-erofs-utils = "Richard Weinberger " +RECIPE_MAINTAINER:pn-erofs-utils = "Unassigned " RECIPE_MAINTAINER:pn-ethtool = "Changhyeok Bae " RECIPE_MAINTAINER:pn-eudev = "Anuj Mittal " RECIPE_MAINTAINER:pn-expat = "Yi Zhao " From patchwork Wed Jun 28 14:12:47 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 26618 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D4460EB64DA for ; Wed, 28 Jun 2023 14:13:47 +0000 (UTC) Received: from mail-pl1-f170.google.com (mail-pl1-f170.google.com [209.85.214.170]) by mx.groups.io with SMTP id smtpd.web10.17386.1687961619904735650 for ; Wed, 28 Jun 2023 07:13:39 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=AC8bqrj0; spf=softfail (domain: sakoman.com, ip: 209.85.214.170, mailfrom: steve@sakoman.com) Received: by mail-pl1-f170.google.com with SMTP id d9443c01a7336-1b8171718a1so18909975ad.2 for ; Wed, 28 Jun 2023 07:13:39 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1687961619; x=1690553619; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=oWl9NxuVNp1oIOKwAvuL/VUt6jinrvLuj/9GJKvw4hg=; b=AC8bqrj0VD3FEAVvBadrfP3jvIf43/MXCrX6jO/YZ1SqV7CFxA1mlR29e3nCSaudre V4SPUoKy7Nel48OKBIdLi8NSivcaZzRvt6zSQvrOeU6sibdCYdcoTY9F3FTffD7x9ouR umk/37TZBlPW+haUDCBfXWM+O9zybNhoGN/EDkEAQ8gMmfigPy4yn+2ETJsTVllLK2t3 d5qFwJW1LZIFvQ2r99kaYdNUyBBDNK/CGyy6XdS/rd/xvzjNxYcw/xy6lDsewPOQIyGT rGT6eGqbHd0ptW2iLDzBamAYHMaFCWHIhwN6Uccwu0HNgEI5sKUxU3q/spVCNjTwEO5b FakQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1687961619; x=1690553619; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=oWl9NxuVNp1oIOKwAvuL/VUt6jinrvLuj/9GJKvw4hg=; b=kZWgBeHy589JB6n4mpobEDaa1UVX1HfQX5JIkTdI6sAf27YZXl/IVS1nV4v7hxFUq5 HIpGM3Vi7zisokLKY8sTG1w50S7x6GTA7ia75GaoPL6Hz2/rs0+Kuxihc4ZoehEOsT6A Kzi1WDitJhwLFdJF9LdvJTnUQ73qW/KaFR/W1t/MpcAgiYC4jS0BTv+YDuz9hgfmNo06 8gX3OLoJyN5oSLlxml8EV056gq/pzgpNKrKr42aDhH+2btJ3sG0StJiZyRc4++I36oun ap9uNsMlfGuQmpwiVVxTN+h3blrzf4+8rnGOfa7oZ9xVbxgf76YJjCxEwdjzE/6qsWA8 X/uQ== X-Gm-Message-State: AC+VfDzG2vNK5krmDQ+wM+U9d8y9b6LacTtQr0HXrXwvyFAfLORwicqu O8us1sGrMsnLHIZLRSLllEZJKDkWQ9gAhrGwRg+dsA== X-Google-Smtp-Source: ACHHUZ4gxnkuucUJcQpTfNpOOvcTwxIfz6IgtbFZJQRlAPAKVIg/fqbeJvvwKEacwwlBhL6lI6wURA== X-Received: by 2002:a17:902:d489:b0:1b7:e49f:d with SMTP id c9-20020a170902d48900b001b7e49f000dmr14123182plg.28.1687961619041; Wed, 28 Jun 2023 07:13:39 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id b19-20020a170902d89300b001b3ce619e2esm7792092plz.179.2023.06.28.07.13.38 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 28 Jun 2023 07:13:38 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 22/29] =?utf-8?q?maintainers=2Einc=3A_unassign_?= =?utf-8?q?Andreas_M=C3=BCller_from_itstool_entry?= Date: Wed, 28 Jun 2023 04:12:47 -1000 Message-Id: <0823449cb03876ad88643df6c41c9450625d435d.1687961326.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 28 Jun 2023 14:13:47 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/183577 From: Alexander Kanavin This was confirmed via private email. Signed-off-by: Alexander Kanavin Signed-off-by: Richard Purdie (cherry picked from commit cc8bb0da24419424989548ced27b2e76030340d9) Signed-off-by: Steve Sakoman --- meta/conf/distro/include/maintainers.inc | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/meta/conf/distro/include/maintainers.inc b/meta/conf/distro/include/maintainers.inc index 5acc80f059..78f85a6c79 100644 --- a/meta/conf/distro/include/maintainers.inc +++ b/meta/conf/distro/include/maintainers.inc @@ -281,7 +281,7 @@ RECIPE_MAINTAINER:pn-iproute2 = "Changhyeok Bae " RECIPE_MAINTAINER:pn-iptables = "Changhyeok Bae " RECIPE_MAINTAINER:pn-iputils = "Changhyeok Bae " RECIPE_MAINTAINER:pn-iso-codes = "Wang Mingyu " -RECIPE_MAINTAINER:pn-itstool = "Andreas Müller " +RECIPE_MAINTAINER:pn-itstool = "Unassigned " RECIPE_MAINTAINER:pn-iw = "Changhyeok Bae " RECIPE_MAINTAINER:pn-libjpeg-turbo = "Anuj Mittal " RECIPE_MAINTAINER:pn-json-c = "Yi Zhao " From patchwork Wed Jun 28 14:12:48 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 26620 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id E1DB4C0015E for ; Wed, 28 Jun 2023 14:13:47 +0000 (UTC) Received: from mail-pf1-f169.google.com (mail-pf1-f169.google.com [209.85.210.169]) by mx.groups.io with SMTP id smtpd.web11.17593.1687961621637223992 for ; Wed, 28 Jun 2023 07:13:41 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=bwdlRfCT; spf=softfail (domain: sakoman.com, ip: 209.85.210.169, mailfrom: steve@sakoman.com) Received: by mail-pf1-f169.google.com with SMTP id d2e1a72fcca58-66767d628e2so3483058b3a.2 for ; Wed, 28 Jun 2023 07:13:41 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1687961621; x=1690553621; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=sFcWXrm1Kj8HUdOaVOTzH1o4MMTOgogtIsdPBBSzwJo=; b=bwdlRfCTXtgSG8FiyyId55bVsWUjJC5CBe7TFgeKTOau7C/bxQX6TmqIEtWPq1aN6v Gwf9KNh/wzcRiHC1wMNknZGStPseDDAwNQymQ0CuogiOXcxzCMRuaZfIggh4QWzNVFFj m6fFCde+S1GvwTbMWXglxxvscZryYCD3oU4hzsA4ubKvLxhaWuVL39YijRbkae2vAZUl Pr/Q4Hwvx5ivpyCFeXtxFY79hUHD1N+4bA+snHGsMIYIBgfQ487TsNivaQT0tGzosOBV AkKjygRtPoL6MD93mL0SBfeOvCIR55uDhUEG0+N3vGZmZzZIz5jldFjapny1TS8HcORo Vkng== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1687961621; x=1690553621; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=sFcWXrm1Kj8HUdOaVOTzH1o4MMTOgogtIsdPBBSzwJo=; b=i2xP1nO231SNfS/nt5mFhXHQGZJhV9yvEg7uu97DfE3x3sQbtCUNOkpsaj/pSUhU42 qI0yWZJA/EWBgsnV4fyzShElMVpdHxv8R1c3+sLNLfPFksmHecVW3ZcAAGJI4EES4NrY aS3kPjMLCWGJXI9hbPAhkHdEzK0G4Y9jccLMXGhw1MA64yNfFVRUp/qgvsC2G4m/4LyZ SdWH3gZuoCXPLQ8jmGTqxNeonP8e21egrjk3Ra/Vxqp0ObM+yRo2YjZj/rvElM3+4ygX DYSzX5qjh9qtZ0PxiUe9FZjotaJ+OmSDLBcw0XLSAR9Rvee3SUAkC//eRNVfIDwH+5tJ v/dA== X-Gm-Message-State: AC+VfDwQI3a+Hv0Q2hnOr8/IAk7p/vytWPMuQbgXXzzfHbhdbtqXXOJ4 3HPDy5nma4vb9Ur7Yvx4fm8LL83TKcIfyVilUE0zTg== X-Google-Smtp-Source: ACHHUZ46zS2SzROplWb7JryJNJ1YDz240ecZfmaEN9OMnpHugjB/0JMQAwonD9TWje1zNMCvvpzAwA== X-Received: by 2002:a17:90a:1a07:b0:262:b229:7e45 with SMTP id 7-20020a17090a1a0700b00262b2297e45mr9084372pjk.11.1687961620712; Wed, 28 Jun 2023 07:13:40 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id b19-20020a170902d89300b001b3ce619e2esm7792092plz.179.2023.06.28.07.13.39 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 28 Jun 2023 07:13:40 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 23/29] maintainers.inc: unassign Pascal Bach from cmake entry Date: Wed, 28 Jun 2023 04:12:48 -1000 Message-Id: <826fb858ebf1f8e9e2741b9046fd5c04638ff056.1687961326.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 28 Jun 2023 14:13:47 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/183578 From: Alexander Kanavin This was confirmed via private email. Signed-off-by: Alexander Kanavin Signed-off-by: Richard Purdie (cherry picked from commit c30e9f1972a3e1d4099f39fd6d0dfb37acb73ce1) Signed-off-by: Steve Sakoman --- meta/conf/distro/include/maintainers.inc | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/meta/conf/distro/include/maintainers.inc b/meta/conf/distro/include/maintainers.inc index 78f85a6c79..36f1fc6073 100644 --- a/meta/conf/distro/include/maintainers.inc +++ b/meta/conf/distro/include/maintainers.inc @@ -95,8 +95,8 @@ RECIPE_MAINTAINER:pn-cantarell-fonts = "Alexander Kanavin X-Patchwork-Id: 26619 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id E16BCEB64DC for ; Wed, 28 Jun 2023 14:13:47 +0000 (UTC) Received: from mail-pl1-f174.google.com (mail-pl1-f174.google.com [209.85.214.174]) by mx.groups.io with SMTP id smtpd.web11.17595.1687961623319470752 for ; Wed, 28 Jun 2023 07:13:43 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="signature has expired" header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=oFmoiwBx; spf=softfail (domain: sakoman.com, ip: 209.85.214.174, mailfrom: steve@sakoman.com) Received: by mail-pl1-f174.google.com with SMTP id d9443c01a7336-1b80512a7f2so23478745ad.3 for ; Wed, 28 Jun 2023 07:13:43 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1687961622; x=1690553622; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=5pd3WxTbbwA/aTmXe13W5rHy8i+ZIOPFC6G6HJ5x+/Q=; b=oFmoiwBxu3anSkbLyaFeFW5XwzDw5HdT8iol7c1SEqEc8sKU9oO923qsHbb7bvED09 wooQ3cFmd9vs6jR94ajWjpw/OIN9ghsCrw2s4NQjgaL1JwWCV9Lm3zSJuA37clyNxLYA E/+scqMYhyx4Jrty+T6ZAqQoZYqFLo+Z/Swuu6r8RlxGY8E3xx0phz8rWLf59QijKhgJ Gr8tBLiD+M1+vPxoZzg6GD4Kgb6TsPA3wmdW37V1rfiuHwBJD47vQF4u54zEP+1YswmS noz2+jDHG36ywviyi8uR19muH3J6tBdMqO2EycQ1270Y66rbNB2PhLJCti2XoLj/MqPv ilJA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1687961622; x=1690553622; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=5pd3WxTbbwA/aTmXe13W5rHy8i+ZIOPFC6G6HJ5x+/Q=; b=AwLfMiABUlbOeU9Q7tNbHVwUiZXPjzkNHCBtO9chd+2z58TttOWWyBEJjP6sKcYJhJ BzHz1MlqJl54qqCNyxsk97SHsLaPeH+v0pdsDUxfxROKyogBRyfSQDKxxlD2j48lZz5v 4cX0qtjXpWJ6iOCxyM+mSVVGQ/72jUSb9SWr2Q5LHhAom/4o4jj5OT9QdQE5YDhWyIJg ZXY2iuebbtXZAT1UOJkQsEp897JbkzGKuC0i6+yk+2nwg2yXwgCjG1jA1tj2HnmKmoPv NPPpxz14LLnxrgStY/bJ+OC4Y7FOvVsGApvq36DsauosxbYk5Wexx9q3mbPC+T+U48Ld TjuA== X-Gm-Message-State: AC+VfDyKfk1hEINSyDO6ghyJJ6/ZiBxCJyD/GYSkdfyL8tGp2kdt3UTQ oQ1HiJqvtuvDYcfdKchr7Pcjilf7MZzbQGaEqDx8qA== X-Google-Smtp-Source: ACHHUZ7S2KSrWLh8GTTXU731RMSbRIJmC4X5qh43XBGCjd4IORpGDAolsw99lFBEoATdcia4P/83bg== X-Received: by 2002:a17:902:ecce:b0:1b5:561a:5ca9 with SMTP id a14-20020a170902ecce00b001b5561a5ca9mr11882302plh.50.1687961622455; Wed, 28 Jun 2023 07:13:42 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id b19-20020a170902d89300b001b3ce619e2esm7792092plz.179.2023.06.28.07.13.41 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 28 Jun 2023 07:13:42 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 24/29] maintainers.inc: correct unassigned entries Date: Wed, 28 Jun 2023 04:12:49 -1000 Message-Id: <36b862f23afe3ed81006c203e875f900249fd040.1687961326.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 28 Jun 2023 14:13:47 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/183579 From: Alexander Kanavin Modify packages to unassigned where appropriate Signed-off-by: Alexander Kanavin Signed-off-by: Richard Purdie (cherry picked from commit ab37ddf53607111bf5c49c4f2388224999c4a5a9) Signed-off-by: Steve Sakoman (cherry picked from commit 27f15bc3166fda5acd07e9e1c34842a641d24e37) Signed-off-by: Steve Sakoman --- meta/conf/distro/include/maintainers.inc | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/meta/conf/distro/include/maintainers.inc b/meta/conf/distro/include/maintainers.inc index 36f1fc6073..50746e2d7d 100644 --- a/meta/conf/distro/include/maintainers.inc +++ b/meta/conf/distro/include/maintainers.inc @@ -42,7 +42,7 @@ RECIPE_MAINTAINER:pn-alsa-utils-scripts = "Michael Opdenacker X-Patchwork-Id: 26617 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D44B9C3DA40 for ; Wed, 28 Jun 2023 14:13:47 +0000 (UTC) Received: from mail-pl1-f171.google.com (mail-pl1-f171.google.com [209.85.214.171]) by mx.groups.io with SMTP id smtpd.web11.17599.1687961624964812080 for ; Wed, 28 Jun 2023 07:13:45 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="signature has expired" header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=Ogd4bhAj; spf=softfail (domain: sakoman.com, ip: 209.85.214.171, mailfrom: steve@sakoman.com) Received: by mail-pl1-f171.google.com with SMTP id d9443c01a7336-1b7dd061e9aso27546285ad.2 for ; Wed, 28 Jun 2023 07:13:44 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1687961624; x=1690553624; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=BIV4/GYcjw1YIuJYOxPHBOSSVg486/u6cqcVxUjJlaU=; b=Ogd4bhAjPqimT0QoSHcGK6m5FCbw22r3OW6IbYgEiCdwhxpKSDNK7HvunjevzrTNX5 +lblTBUSm/zOEBLHFMCVhXEhm4mBSXzZOsCIGLSqLjjnAhimoBrBgBsdWXOMgb0mFEmS Mu3jR7BkOQZPwi4y9n9d8PtRdMRu7yqXIgjKLFlk4AywAvwnBuwassP0FSk+Aml6eyAD mQ8pglu6bmAcG7FTyJk3U4U/+MdLM8EmiCNu4kpBlpWVXo5fminENcj8ZIjxzMQEgZAL Ad0lfeiIzYq1+YG/pCvFhs2yKeP6WNJNeEnI005fGcremuWWb18Pql11HlEKX4oGWQtM 4oKA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1687961624; x=1690553624; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=BIV4/GYcjw1YIuJYOxPHBOSSVg486/u6cqcVxUjJlaU=; b=hn347OmmeJz4ZWwvyqxjhRFjMs9weBYceolmyG0PGKHFx2zAMDz5ewINnNBNjcgrZW KxrZtdXd3tdV9qhlfbDEQtuKLdCcMowFYMfoNT0S00M3cLZoiWpio4fndglX0V6IlXRb rj2rS/JfXedjKAygsWp9zqQ9JP93j7ZRGj/f8ak7hyffohlKjkX+kngPCecY3LJ/xtDU 61ehXqJEEKq9n2LA+hjeuSDphdN6lAecUGpedH9m+v24DE3D8c377+YnbfZ2IxgCrrHA uK7JBvKSL1XLU0+MKuK01/iYtIVlsEOQUB5pj85+6zpPbp289JN3+UGsrgAfDTDR8TJI K/Ng== X-Gm-Message-State: AC+VfDxuObY1WGU2nVXh8ur6fdKinCm4GFlGqFigafWVSwydkFyhFPMm 4ROh11JAQdcz7wxlU4kU+vUziGROPK0gvDjKKNRXpw== X-Google-Smtp-Source: ACHHUZ4JcqR691OwN6/Oz83qU4mBpZUBoQPyIMY8wbQkP7SumRL8+Oo2R2agzTTG/HSR2a29QryZqw== X-Received: by 2002:a17:902:ea03:b0:1b2:1ee9:682 with SMTP id s3-20020a170902ea0300b001b21ee90682mr13285749plg.23.1687961624076; Wed, 28 Jun 2023 07:13:44 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id b19-20020a170902d89300b001b3ce619e2esm7792092plz.179.2023.06.28.07.13.43 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 28 Jun 2023 07:13:43 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 25/29] connman: fix warning by specifying runstatedir at configure time Date: Wed, 28 Jun 2023 04:12:50 -1000 Message-Id: <52268f077af4fd21ac93623017160cb474bbef00.1687961326.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 28 Jun 2023 14:13:47 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/183580 From: Marc Ferland Without this patch, systemd complains on startup with messages similar to: systemd-tmpfiles[128]: /etc/tmpfiles.d/connman_resolvconf.conf:1: Line references path below legacy directory /var/run/, updating /var/run/connman → /run/connman; please update the tmpfiles.d/ drop-in file accordingly. systemd-tmpfiles[172]: /etc/tmpfiles.d/connman_resolvconf.conf:1: Line references path below legacy directory /var/run/, updating /var/run/connman → /run/connman; please update the tmpfiles.d/ drop-in file accordingly. By default, connman will use "/var/run/connman" for runstatedir instead of the now recommended "/run/connman". Signed-off-by: Marc Ferland Signed-off-by: Alexandre Belloni Signed-off-by: Richard Purdie (cherry picked from commit 8d17776765a99a4ae327797206ef2a8a735ce87b) Signed-off-by: Steve Sakoman --- meta/recipes-connectivity/connman/connman.inc | 1 + 1 file changed, 1 insertion(+) diff --git a/meta/recipes-connectivity/connman/connman.inc b/meta/recipes-connectivity/connman/connman.inc index 5880ecd5d4..0c1dc7e5dd 100644 --- a/meta/recipes-connectivity/connman/connman.inc +++ b/meta/recipes-connectivity/connman/connman.inc @@ -27,6 +27,7 @@ EXTRA_OECONF += "\ --enable-ethernet \ --enable-tools \ --disable-polkit \ + --runstatedir=/run \ " PACKAGECONFIG ??= "wispr iptables client\ From patchwork Wed Jun 28 14:12:51 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 26616 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id DBB1EEB64DD for ; Wed, 28 Jun 2023 14:13:47 +0000 (UTC) Received: from mail-pf1-f174.google.com (mail-pf1-f174.google.com [209.85.210.174]) by mx.groups.io with SMTP id smtpd.web10.17389.1687961626693174269 for ; Wed, 28 Jun 2023 07:13:46 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=Df/miHhq; spf=softfail (domain: sakoman.com, ip: 209.85.210.174, mailfrom: steve@sakoman.com) Received: by mail-pf1-f174.google.com with SMTP id d2e1a72fcca58-66872d4a141so3489304b3a.1 for ; Wed, 28 Jun 2023 07:13:46 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1687961626; x=1690553626; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=mFhI5ntYXogRZRfl4dWiyQRljHDYXMxezFl3Htd0pxg=; b=Df/miHhq601+MttiWsCXM9ZiwHcZgDGoEVQPeuaafZRNkDDJcZBAuqfoEsTUIuTqtX DwZdd2K7WtKWGsrJtDhuIn+JVfOZh7FPTDnPz/61eqljldZeeiowQOBN+v8F8dJqc/zi pKhQV+Yb6usiUyBz/rH/D8qmh5KJ4+saAbahLwxmuJE9MEI4Wp57rDj/AwMc8bTEyZu5 MoZ/pyHTIMj0aetaYel5Az+4aAAJKsatmsK0PFhb55jG4LU8uNlEUWrm0/dWCja+quEu YJcVcGPHgXKdQbh97f5IWlMLk6jccF5s44X2rsBtvLVPvErwpX5ic6UlTyvkYR23yIPb mSBA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1687961626; x=1690553626; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=mFhI5ntYXogRZRfl4dWiyQRljHDYXMxezFl3Htd0pxg=; b=ClBGLNpWrNu6gl9fLfJDQDkzFUkbcWJASefe1Wo8oId7n5tEijE3QraHxGhXCdaWWb oPcJvsoP0Fm2yXg78l9mskY/J+uSMCkrXhecpgDv6/zB8wWJLOClRHovUnV/A/kZt6Ft VLVLvZ7WMU2wzXGgwXgGDosrRvjMSqmAvzp4cLdlTWUCcwfRNXvWCNYmcCz/O5Zuu7sf v3nJ3LVY/yXcDO1b3ckNZUN8U48dbGUjBRZLPW7hW4CcmmJgwRvNN+gEeWp620ToS/Kx mstIbnAANAFwM9hyDt25smOCzkTOGEBcKIwogxSB2LWSPRRR8Wf6Oy46IxlGU0Z7FnLQ YmXw== X-Gm-Message-State: AC+VfDxf4fvJY99mt1CMfgQAYV6uxSJpP3x8Yd7nN8nunsLemRj5sROl y2t0TfwV10V/r/naihsLfT2+fS0wvIG5W2W4XWls5Q== X-Google-Smtp-Source: ACHHUZ7L7VaCVfzbjZhm2iIiqJqmZ0EpexgCxQEGSZaECEMH9/i5HjVcnQk/M30LdSniHwGqFZlaZg== X-Received: by 2002:a05:6a21:788a:b0:125:dee8:328f with SMTP id bf10-20020a056a21788a00b00125dee8328fmr12375708pzc.20.1687961625751; Wed, 28 Jun 2023 07:13:45 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id b19-20020a170902d89300b001b3ce619e2esm7792092plz.179.2023.06.28.07.13.45 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 28 Jun 2023 07:13:45 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 26/29] selftest/license: Exclude from world Date: Wed, 28 Jun 2023 04:12:51 -1000 Message-Id: <82ac6a3f22c3aec03d3ba162c67754bbf28fd0ba.1687961326.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 28 Jun 2023 14:13:47 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/183581 From: Richard Purdie These test recipes shouldn't be built as part of world builds. Some recent changes are exposing issues from this so exclude them. Signed-off-by: Richard Purdie (cherry picked from commit 80d3f5586cd060ae69fbc6dec2e8978d87da10ba) Signed-off-by: Steve Sakoman --- .../recipes-test/license/incompatible-license-alias.bb | 2 ++ meta-selftest/recipes-test/license/incompatible-license.bb | 2 ++ meta-selftest/recipes-test/license/incompatible-licenses.bb | 2 ++ .../recipes-test/license/incompatible-nonspdx-license.bb | 2 ++ 4 files changed, 8 insertions(+) diff --git a/meta-selftest/recipes-test/license/incompatible-license-alias.bb b/meta-selftest/recipes-test/license/incompatible-license-alias.bb index e0b4e13c26..1af99e7809 100644 --- a/meta-selftest/recipes-test/license/incompatible-license-alias.bb +++ b/meta-selftest/recipes-test/license/incompatible-license-alias.bb @@ -1,3 +1,5 @@ SUMMARY = "Recipe with an alias of an SPDX license" DESCRIPTION = "Is licensed with an alias of an SPDX license to be used for testing" LICENSE = "GPLv3" + +EXCLUDE_FROM_WORLD = "1" diff --git a/meta-selftest/recipes-test/license/incompatible-license.bb b/meta-selftest/recipes-test/license/incompatible-license.bb index 282f5c2875..6fdc58fd30 100644 --- a/meta-selftest/recipes-test/license/incompatible-license.bb +++ b/meta-selftest/recipes-test/license/incompatible-license.bb @@ -1,3 +1,5 @@ SUMMARY = "Recipe with an SPDX license" DESCRIPTION = "Is licensed with an SPDX license to be used for testing" LICENSE = "GPL-3.0-only" + +EXCLUDE_FROM_WORLD = "1" diff --git a/meta-selftest/recipes-test/license/incompatible-licenses.bb b/meta-selftest/recipes-test/license/incompatible-licenses.bb index 9709892644..47bd8d7c00 100644 --- a/meta-selftest/recipes-test/license/incompatible-licenses.bb +++ b/meta-selftest/recipes-test/license/incompatible-licenses.bb @@ -1,3 +1,5 @@ SUMMARY = "Recipe with multiple SPDX licenses" DESCRIPTION = "Is licensed with multiple SPDX licenses to be used for testing" LICENSE = "GPL-2.0-only & GPL-3.0-only & LGPL-3.0-only" + +EXCLUDE_FROM_WORLD = "1" diff --git a/meta-selftest/recipes-test/license/incompatible-nonspdx-license.bb b/meta-selftest/recipes-test/license/incompatible-nonspdx-license.bb index 35af0966ef..142d73158e 100644 --- a/meta-selftest/recipes-test/license/incompatible-nonspdx-license.bb +++ b/meta-selftest/recipes-test/license/incompatible-nonspdx-license.bb @@ -1,3 +1,5 @@ SUMMARY = "Recipe with a non-SPDX license" DESCRIPTION = "Is licensed with a non-SPDX license to be used for testing" LICENSE = "FooLicense" + +EXCLUDE_FROM_WORLD = "1" From patchwork Wed Jun 28 14:12:52 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 26621 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D0A94EB64D7 for ; Wed, 28 Jun 2023 14:13:57 +0000 (UTC) Received: from mail-pl1-f170.google.com (mail-pl1-f170.google.com [209.85.214.170]) by mx.groups.io with SMTP id smtpd.web10.17390.1687961628325269200 for ; Wed, 28 Jun 2023 07:13:48 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="signature has expired" header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=259IUYuZ; spf=softfail (domain: sakoman.com, ip: 209.85.214.170, mailfrom: steve@sakoman.com) Received: by mail-pl1-f170.google.com with SMTP id d9443c01a7336-1b80ba9326bso25463465ad.1 for ; Wed, 28 Jun 2023 07:13:48 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1687961627; x=1690553627; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=qzhuiJs3Wo3vVOGNA48Tl2JtZWlty6uLdB2LWrj/NbY=; b=259IUYuZoi4IWZpZJosxk272bphCK02B/pzmTLjKJZFLBcT60pobCBmuELHphN/Dp6 eS3HuSiOldaqdUMcR2YcEFCT/bPzMFWDLY3Ot/9ogTKugOkz4TUfvcveKzWdF74UG4oK xO1mP00SqfAwFCcELLH+QoKIL1vQTYZhWCFvRPxwkz09En8DGduhWTRBenEkx3e5/HX5 BjZKWFA4NdH+QeA7QCyn3AlciPK1LEm3k6u/HTbnh5xW0nfikdz2Vvbct9cvtTsa79gs fxiZ+ip6S8tpgsbBsVCfgIqK5HUxlPTk3wiq0FN0svz6ksjN/2jyJmXLnuZfwVy1sHaD YXrA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1687961627; x=1690553627; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=qzhuiJs3Wo3vVOGNA48Tl2JtZWlty6uLdB2LWrj/NbY=; b=ZE9kzXhcTFLGi5yq9KdmCXTLd1UcNztQ17QLJ20inCJaAFJsrnTSmXwc3P/uAWMMnE plMVtjQqY0kdPDnGOcsZpphQ/Ybi26K+4CsrnQJDeajWLL6oWdxWHF/V1wRtvHAwjrn4 ZSe4yCXomkG1suNHAFDkQN+8sJMPqMhwmn3VGlbq6DagqhtkJKQwulK5I70VWBuoMdyT 9Kk0uDYqpUiZY45Oz/rQueqXjpmM3MPmd+2zmVUWAFVVCjP06etVVAbcFlkW9AQK5dKV q3geq6XTYp/JifRgOC0J0SdgyQKQf5Yuico6zeAmELX8UEuJW1Nkg8unyGBXAIr2idvy 5TbA== X-Gm-Message-State: AC+VfDzmXngoS4FgjVINDShuiin/C/aFPo8BGCZJyF0VRpeeJTakACuJ Vh97Mv0WABRN+5U0y2BB58dVopL5omRxkrxvkFKF6A== X-Google-Smtp-Source: ACHHUZ4Xe5MsDjmJ5ZXEacrrkTOvbvFSwV3pxy7PIO3k1hzBIhAppsXCtrzCOmBmUGwz6dWrtd4Z7A== X-Received: by 2002:a17:902:7c06:b0:1b3:a928:18e8 with SMTP id x6-20020a1709027c0600b001b3a92818e8mr11588606pll.52.1687961627486; Wed, 28 Jun 2023 07:13:47 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id b19-20020a170902d89300b001b3ce619e2esm7792092plz.179.2023.06.28.07.13.46 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 28 Jun 2023 07:13:47 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 27/29] maintainers.inc: correct Carlos Rafael Giani's email address Date: Wed, 28 Jun 2023 04:12:52 -1000 Message-Id: <1f664daa33b5fae83990b9b5d5490a896a307b68.1687961326.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 28 Jun 2023 14:13:57 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/183582 From: Alexander Kanavin As confirmed via private email. Signed-off-by: Alexander Kanavin Signed-off-by: Alexandre Belloni (cherry picked from commit c7f934368d3fb3e9cf268f8237eae80b1c1665a5) Signed-off-by: Steve Sakoman --- meta/conf/distro/include/maintainers.inc | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/meta/conf/distro/include/maintainers.inc b/meta/conf/distro/include/maintainers.inc index 50746e2d7d..d7bf806b05 100644 --- a/meta/conf/distro/include/maintainers.inc +++ b/meta/conf/distro/include/maintainers.inc @@ -294,7 +294,7 @@ RECIPE_MAINTAINER:pn-kernel-devsrc = "Bruce Ashfield " RECIPE_MAINTAINER:pn-kexec-tools = "Unassigned " RECIPE_MAINTAINER:pn-keymaps = "Alexander Kanavin " RECIPE_MAINTAINER:pn-kmod = "Chen Qi " -RECIPE_MAINTAINER:pn-kmscube = "Carlos Rafael Giani " +RECIPE_MAINTAINER:pn-kmscube = "Carlos Rafael Giani " RECIPE_MAINTAINER:pn-l3afpad = "Anuj Mittal " RECIPE_MAINTAINER:pn-lame = "Michael Opdenacker " RECIPE_MAINTAINER:pn-ldconfig-native = "Khem Raj " From patchwork Wed Jun 28 14:12:53 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 26622 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D5443EB64DA for ; Wed, 28 Jun 2023 14:13:57 +0000 (UTC) Received: from mail-pl1-f174.google.com (mail-pl1-f174.google.com [209.85.214.174]) by mx.groups.io with SMTP id smtpd.web10.17391.1687961630008543995 for ; Wed, 28 Jun 2023 07:13:50 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="signature has expired" header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=QEPrQlF+; spf=softfail (domain: sakoman.com, ip: 209.85.214.174, mailfrom: steve@sakoman.com) Received: by mail-pl1-f174.google.com with SMTP id d9443c01a7336-1b7fdc66e30so22733565ad.2 for ; Wed, 28 Jun 2023 07:13:49 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1687961629; x=1690553629; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=oF24q6u7ZLngfXgyFII7l/5l8t9qWxDCBBImg2Vc5MM=; b=QEPrQlF+0wHdpZqChgneWd59T8qEiWkuj38vMet1VV4MgC5RojhPFzAbovOUbSQmVS tAlafnvcj+A5/ea/kKmgSITt2PHpHDRp406T5mfEmYJmrxokK3/tLqXcxSMQrJAmNKTo z7jB0Uwr2DG9FoBIrDLnOjUftlBjhGs50fJDLF4R7cvpGoXew2fN4tlsTKhQ2UOO2TYF dj+/gGuyDOocIVATTBYi6cXfbxMMXXGpBtWwpFRjul9SIPa5KU64qzBQXiXjjJlo7+qy w6GXwOWj/Yw/j2LzrMi8LOmo/I3EBl4D18y9S/bvAwnQJ0ys5n1YUgIxya8N8xEFnKFx 1APw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1687961629; x=1690553629; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=oF24q6u7ZLngfXgyFII7l/5l8t9qWxDCBBImg2Vc5MM=; b=JI5b1KvL4wdIi7IqqAPHihRE7k48TyAFIAGkunRli26Gyl89PMvLFWztyCoC7kDJu0 ogz1fn5bC6u24cv7OyiNtitWTCdO/hi/sLy9hljGywPVMqwNBJ9b92VcenCZLM0FaD7b Uf29rbTUTkU+aaHAJNZ1+bWKZd801ASOy87iUfbYCBzS7x29UFQ03JOm/KPoiGplHSqs wz9GLm6Niya6fLCE93N5MsjkRd1W0i/+2bzNO6oBXIkOqvwB4rlMTCVldnz03p53vznl NAs1i8uSutYInAKgHgxOUMRqGqeUPf1iOa/0T2+KxtAOdSvdEyhXYHIUIKFvwCO0Hz4j VRBw== X-Gm-Message-State: AC+VfDxhEWjpApXZCF9MT4uo6DD2nKMvbAGLGKOmZEb8efJzCx01YQ5Q 36YYXODwQsZQ4YTpzFWElTPrrtxgZGxvdBEJ6bqNxQ== X-Google-Smtp-Source: ACHHUZ5VUkePh4Xn9sML37nxuy3qeWxhmfgfZ8lZuXhdlGtyLJoN528xcs24wMxOROAw2PMbYMcRog== X-Received: by 2002:a17:903:2285:b0:1b6:4bbd:c3a7 with SMTP id b5-20020a170903228500b001b64bbdc3a7mr9783899plh.66.1687961629173; Wed, 28 Jun 2023 07:13:49 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id b19-20020a170902d89300b001b3ce619e2esm7792092plz.179.2023.06.28.07.13.48 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 28 Jun 2023 07:13:48 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 28/29] layer.conf: Add missing dependency exclusion Date: Wed, 28 Jun 2023 04:12:53 -1000 Message-Id: <97c84ca1e138fe95ebd67f1fe42be19ab2aeca89.1687961326.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 28 Jun 2023 14:13:57 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/183583 From: Richard Purdie Add a dependency which should have been in this list but wasn't, found when debugging create-spdx hash issues. Signed-off-by: Richard Purdie (cherry picked from commit 1075b9fc5d562dada45b3187cb737511ff8c7376) Signed-off-by: Steve Sakoman --- meta/conf/layer.conf | 1 + 1 file changed, 1 insertion(+) diff --git a/meta/conf/layer.conf b/meta/conf/layer.conf index ea57123601..1f329c3efe 100644 --- a/meta/conf/layer.conf +++ b/meta/conf/layer.conf @@ -69,6 +69,7 @@ SIGGEN_EXCLUDE_SAFE_RECIPE_DEPS += " \ initramfs-module-install->grub \ initramfs-module-install->parted \ initramfs-module-install->util-linux \ + initramfs-module-setup-live->udev-extraconf \ grub-efi->grub-bootconf \ liberation-fonts->fontconfig \ cantarell-fonts->fontconfig \ From patchwork Wed Jun 28 14:12:54 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 26623 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D6605EB64DD for ; Wed, 28 Jun 2023 14:13:57 +0000 (UTC) Received: from mail-pl1-f175.google.com (mail-pl1-f175.google.com [209.85.214.175]) by mx.groups.io with SMTP id smtpd.web11.17606.1687961631943572854 for ; Wed, 28 Jun 2023 07:13:52 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="signature has expired" header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=ttff9lcF; spf=softfail (domain: sakoman.com, ip: 209.85.214.175, mailfrom: steve@sakoman.com) Received: by mail-pl1-f175.google.com with SMTP id d9443c01a7336-1b7fef01fe4so24026595ad.0 for ; Wed, 28 Jun 2023 07:13:51 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1687961631; x=1690553631; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=LWliQolywzeGkyknp3oYMCm0PuDvhLWi7Jw0eBKQuJE=; b=ttff9lcFHs6eiD37OyRSpCs1aKxYoCqi+jqkeKeC9K6Sdqcpzai6MVtQ5xO/eXMzei SuRcgOkjEixXsKjJS92s/8HKgNfl38QbEYAHgS6mn1l1prEO5zXqxMQZemz+P9+E1qJt 6EwxHNqy92WWPLgvyU+hlooweFzgpfFoXwmBk3KQvCNldNTcW9+hDEQh8UaMqA+08LG+ lbe6m2KfWGbTTQMgOYktrEQtUYQoRNbI1PM9lcT2Y40+9xZr9A+vziwcLH5MSJzw1Onu EA2Bx2ndSYqC4TUad3iOa8nOoSiU/xCMX/ICXMIpiXZr3OdeNszEbNaFTPi86pdH7wNz QKEQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1687961631; x=1690553631; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=LWliQolywzeGkyknp3oYMCm0PuDvhLWi7Jw0eBKQuJE=; b=R8icRpJrIIoZTtuMh4uwf5/l86L73Q8bJ8l1XPo7SLlu+8BD5JTkZT1DpkO/Y1jPgu Ij1b2Te3eO728IQycbhxLQHLk4qrTCMzZiBGPps3YxOJm8gp5jA6a3Nl77d4gc0mLS+U ZykpxorRf+Vs6qS4v/qZfhoV1mPJYYgXYN5AfS8npxWEamEhxvzUT0ZWSDex5T0mDAXE ZZCuDRbta2Y0jklqE9No3Yi/YpsAN60aw8n+g8ftqMvdG/mKE/YNUr/iJ/syHCj1bgaw bkGeZqlU61YkfiAF6mL35wellGp1AiehyQT964gbJAzlTOBZocbOOHAb0y5evpmZtufF 4FMA== X-Gm-Message-State: AC+VfDyOZL8oxe5Zdg27g8iVfLnemVOkLqXG5GJcxpcFdYkgO2Beyvlm 36bc08HtQQhPBIGjWQU+s8gpR6u7xA083+b+vWatfA== X-Google-Smtp-Source: ACHHUZ5qibQC0a0CyP39wvQkOkbnesCBie3EBVsxgaKibT1TdgXoN8/0QOcicPcsmAyO/H4UpycpFA== X-Received: by 2002:a17:903:2595:b0:1b8:2630:997d with SMTP id jb21-20020a170903259500b001b82630997dmr3297314plb.37.1687961630967; Wed, 28 Jun 2023 07:13:50 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id b19-20020a170902d89300b001b3ce619e2esm7792092plz.179.2023.06.28.07.13.50 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 28 Jun 2023 07:13:50 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 29/29] blktrace: ask for python3 specifically Date: Wed, 28 Jun 2023 04:12:54 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 28 Jun 2023 14:13:57 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/183584 From: Sakib Sajal python2 has been deprecated, use python3 instead Signed-off-by: Sakib Sajal Signed-off-by: Steve Sakoman --- ...plot.py-Ask-for-python3-specifically.patch | 35 +++++++++++++++++++ meta/recipes-kernel/blktrace/blktrace_git.bb | 4 ++- 2 files changed, 38 insertions(+), 1 deletion(-) create mode 100644 meta/recipes-kernel/blktrace/blktrace/0001-bno_plot.py-btt_plot.py-Ask-for-python3-specifically.patch diff --git a/meta/recipes-kernel/blktrace/blktrace/0001-bno_plot.py-btt_plot.py-Ask-for-python3-specifically.patch b/meta/recipes-kernel/blktrace/blktrace/0001-bno_plot.py-btt_plot.py-Ask-for-python3-specifically.patch new file mode 100644 index 0000000000..e2305a1111 --- /dev/null +++ b/meta/recipes-kernel/blktrace/blktrace/0001-bno_plot.py-btt_plot.py-Ask-for-python3-specifically.patch @@ -0,0 +1,35 @@ +From 6f4769e6e2c5cdc1262891470995e6dead937c7a Mon Sep 17 00:00:00 2001 +From: Sakib Sajal +Date: Mon, 26 Jun 2023 17:57:36 -0400 +Subject: [PATCH] bno_plot.py, btt_plot.py: Ask for python3 specifically + +python2 is deprecated, use python3. + +Upstream-Status: Denied [https://www.spinics.net/lists/linux-btrace/msg01364.html] + +Signed-off-by: Sakib Sajal +--- + btt/bno_plot.py | 2 +- + btt/btt_plot.py | 2 +- + 2 files changed, 2 insertions(+), 2 deletions(-) + +diff --git a/btt/bno_plot.py b/btt/bno_plot.py +index 3aa4e19..d7d7159 100644 +--- a/btt/bno_plot.py ++++ b/btt/bno_plot.py +@@ -1,4 +1,4 @@ +-#! /usr/bin/env python ++#! /usr/bin/env python3 + # + # btt blkno plotting interface + # +diff --git a/btt/btt_plot.py b/btt/btt_plot.py +index 40bc71f..8620d31 100755 +--- a/btt/btt_plot.py ++++ b/btt/btt_plot.py +@@ -1,4 +1,4 @@ +-#! /usr/bin/env python ++#! /usr/bin/env python3 + # + # btt_plot.py: Generate matplotlib plots for BTT generate data files + # diff --git a/meta/recipes-kernel/blktrace/blktrace_git.bb b/meta/recipes-kernel/blktrace/blktrace_git.bb index bba5e04504..1c0856be7b 100644 --- a/meta/recipes-kernel/blktrace/blktrace_git.bb +++ b/meta/recipes-kernel/blktrace/blktrace_git.bb @@ -14,7 +14,9 @@ SRCREV = "366d30b9cdb20345c5d064af850d686da79b89eb" PV = "1.3.0+git${SRCPV}" -SRC_URI = "git://git.kernel.dk/blktrace.git;branch=master" +SRC_URI = "git://git.kernel.dk/blktrace.git;branch=master \ + file://0001-bno_plot.py-btt_plot.py-Ask-for-python3-specifically.patch \ + " S = "${WORKDIR}/git"