Re: [OE-core] [PATCH 49/55] vala: upgrade 0.56.6 -> 0.56.8

2023-06-16 Thread Khem Raj
This is in master now but it breaks geary

https://snips.sh/f/32iLt9_dQn

On Wed, Jun 14, 2023 at 2:30 AM Alexander Kanavin
 wrote:
>
> Signed-off-by: Alexander Kanavin 
> ---
>  meta/recipes-devtools/vala/vala_0.56.6.bb | 3 ---
>  meta/recipes-devtools/vala/vala_0.56.8.bb | 3 +++
>  2 files changed, 3 insertions(+), 3 deletions(-)
>  delete mode 100644 meta/recipes-devtools/vala/vala_0.56.6.bb
>  create mode 100644 meta/recipes-devtools/vala/vala_0.56.8.bb
>
> diff --git a/meta/recipes-devtools/vala/vala_0.56.6.bb 
> b/meta/recipes-devtools/vala/vala_0.56.6.bb
> deleted file mode 100644
> index bc5f5477d73..000
> --- a/meta/recipes-devtools/vala/vala_0.56.6.bb
> +++ /dev/null
> @@ -1,3 +0,0 @@
> -require ${BPN}.inc
> -
> -SRC_URI[sha256sum] = 
> "050e841cbfe2b8e7d0fb350c9506bd7557be1cd86a90c896765f1a09a1870013"
> diff --git a/meta/recipes-devtools/vala/vala_0.56.8.bb 
> b/meta/recipes-devtools/vala/vala_0.56.8.bb
> new file mode 100644
> index 000..f55fb41ad39
> --- /dev/null
> +++ b/meta/recipes-devtools/vala/vala_0.56.8.bb
> @@ -0,0 +1,3 @@
> +require ${BPN}.inc
> +
> +SRC_URI[sha256sum] = 
> "93f81dcfc6a93b77baa271d65e6be981ee3238ad451ef380af118e295d904bde"
> --
> 2.30.2
>
>
> 
>

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#183051): 
https://lists.openembedded.org/g/openembedded-core/message/183051
Mute This Topic: https://lists.openembedded.org/mt/99524186/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



Re: [OE-core] [PATCH 2/3] systemd: replace the sysusers.d basic configuration

2023-06-16 Thread Peter Kjellerstedt
> -Original Message-
> From: openembedded-core@lists.openembedded.org 
>  On Behalf Of Louis Rannou
> Sent: den 15 juni 2023 13:44
> To: openembedded-core@lists.openembedded.org
> Cc: Louis Rannou ; anuj.mit...@intel.com
> Subject: [OE-core] [PATCH 2/3] systemd: replace the sysusers.d basic 
> configuration
> 
> The default sysusers basic.conf.in file sets the root home directory to 
> `/root`
> and does not permit its configuration. Replace the file delivered by systemd 
> so
> the root home directory matches the `ROOT_HOME` variable.
> 
> Signed-off-by: Louis Rannou 
> ---
>  meta/recipes-core/systemd/systemd/basic.conf.in | 40 
> +
>  meta/recipes-core/systemd/systemd_253.3.bb  |  5 
>  2 files changed, 45 insertions(+)
> 
> diff --git a/meta/recipes-core/systemd/systemd/basic.conf.in 
> b/meta/recipes-core/systemd/systemd/basic.conf.in
> new file mode 100644
> index 00..fac288f7fa
> --- /dev/null
> +++ b/meta/recipes-core/systemd/systemd/basic.conf.in
> @@ -0,0 +1,40 @@
> +#  This file is part of systemd.
> +#
> +#  systemd is free software; you can redistribute it and/or modify it
> +#  under the terms of the GNU Lesser General Public License as published by
> +#  the Free Software Foundation; either version 2.1 of the License, or
> +#  (at your option) any later version.
> +
> +# The superuser
> +u root0 "root" :ROOT_HOME:
> +
> +# The nobody user/group for NFS file systems
> +g {{NOBODY_GROUP_NAME}} 65534   --
> +u {{NOBODY_USER_NAME }} 65534:65534 "Nobody" -
> +
> +# Administrator group: can *see* more than normal users
> +g adm {{ADM_GID}} --
> +
> +# Administrator group: can *do* more than normal users
> +g wheel   {{WHEEL_GID  }} --
> +
> +# Access to shared database of users on the system
> +g utmp{{UTMP_GID   }} --
> +
> +# Physical and virtual hardware access groups
> +g audio   {{AUDIO_GID  }} --
> +g cdrom   {{CDROM_GID  }} --
> +g dialout {{DIALOUT_GID}} --
> +g disk{{DISK_GID   }} --
> +g input   {{INPUT_GID  }} --
> +g kmem{{KMEM_GID   }} --
> +g kvm {{KVM_GID}} --
> +g lp  {{LP_GID }} --
> +g render  {{RENDER_GID }} --
> +g sgx {{SGX_GID}} --
> +g tape{{TAPE_GID   }} --
> +g tty {{TTY_GID}} --
> +g video   {{VIDEO_GID  }} --
> +
> +# Default group for normal users
> +g users   {{USERS_GID  }} --
> diff --git a/meta/recipes-core/systemd/systemd_253.3.bb 
> b/meta/recipes-core/systemd/systemd_253.3.bb
> index 45dc6ab5bb..87fbf6f785 100644
> --- a/meta/recipes-core/systemd/systemd_253.3.bb
> +++ b/meta/recipes-core/systemd/systemd_253.3.bb
> @@ -17,6 +17,7 @@ REQUIRED_DISTRO_FEATURES = "systemd"
>  SRC_URI += " \
> file://touchscreen.rules \
> file://00-create-volatile.conf \
> +   file://basic.conf.in \

Instead of including a modified copy of the basic.conf.in file 
from systemd, include a patch that modifies the file that systemd 
provides. Otherwise this becomes a maintenance problem where it 
is easy to miss changes that upstream does to the file, and also 
hard to know what you have changed.

> ${@bb.utils.contains('PACKAGECONFIG', 
> 'polkit_hostnamed_fallback', 
> 'file://org.freedesktop.hostname1_no_polkit.conf', '', d)} \
> ${@bb.utils.contains('PACKAGECONFIG', 
> 'polkit_hostnamed_fallback', 'file://00-hostnamed-network-user.conf', '', d)} 
> \
> file://init \
> @@ -252,6 +253,10 @@ EXTRA_OEMESON += "-Dkexec-path=${sbindir}/kexec \
>  # The 60 seconds is watchdog's default vaule.
>  WATCHDOG_TIMEOUT ??= "60"
> 
> +do_configure:prepend() {
> +  sed s@:ROOT_HOME:@${ROOT_HOME}@g ${WORKDIR}/basic.conf.in > 
> ${S}/sysusers.d/basic.conf.in

Please indent shell code using tabs, and change the command to:

sed -i s@:ROOT_HOME:@${ROOT_HOME}@g ${S}/sysusers.d/basic.conf.in

once you have added the patch as per above. 

However, I am wondering if this has to be done during do_configure()? 
It might become confusing if you ever `devtool modify systemd` (which 
we do). Wouldn't it be better to do it on the installed file in the 
do_install() below instead?

> +}
> +
>  do_install() {
>   meson_do_install
>   install -d ${D}/${base_sbindir}
> 
> --
> 2.41.0

//Peter


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#183050): 
https://lists.openembedded.org/g/openembedded-core/message/183050
Mute This Topic: https://lists.openembedded.org/mt/99546757/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core] [PATCH 1/2] strace: Disable failing test

2023-06-16 Thread Richard Purdie
Signed-off-by: Richard Purdie 
---
 .../strace/strace/skip-sockopt-test.patch | 35 +++
 meta/recipes-devtools/strace/strace_6.3.bb|  1 +
 2 files changed, 36 insertions(+)
 create mode 100644 meta/recipes-devtools/strace/strace/skip-sockopt-test.patch

diff --git a/meta/recipes-devtools/strace/strace/skip-sockopt-test.patch 
b/meta/recipes-devtools/strace/strace/skip-sockopt-test.patch
new file mode 100644
index 000..a4001a821ae
--- /dev/null
+++ b/meta/recipes-devtools/strace/strace/skip-sockopt-test.patch
@@ -0,0 +1,35 @@
+Upstream-Status: Inappropriate [avoid this test until fixed by upstream]
+
+root@qemux86-64:/usr/lib/strace/ptest/tests# make sockopt-sol_netlink.gen.log
+FAIL: sockopt-sol_netlink.gen.test
+
+#root@qemux86-64:/usr/lib/strace/ptest/tests# diff sockopt-sol_netlink.dir/exp 
sockopt-sol_netlink.dir/out
+#--- sockopt-sol_netlink.dir/exp
+#+++ sockopt-sol_netlink.dir/out
+#@@ -86,11 +86,11 @@
+ setsockopt(3, SOL_NETLINK, NETLINK_LISTEN_ALL_NSID, 0x7fa18a802ffc, -1) = -1 
EINVAL (Invalid argument)
+ setsockopt(3, SOL_NETLINK, NETLINK_LISTEN_ALL_NSID, 0x7fa18a802ffc, 3) = 0
+ setsockopt(3, SOL_NETLINK, NETLINK_LISTEN_ALL_NSID, 0x7fa18a803000, 4) = -1 
EFAULT (Bad address)
+-getsockopt(3, SOL_NETLINK, NETLINK_LIST_MEMBERSHIPS, [0], [8]) = 0
++getsockopt(3, SOL_NETLINK, NETLINK_LIST_MEMBERSHIPS, [0], [4 => 8]) = 0
+ getsockopt(3, SOL_NETLINK, NETLINK_LIST_MEMBERSHIPS, [0], [5 => 8]) = 0
+ getsockopt(3, SOL_NETLINK, NETLINK_LIST_MEMBERSHIPS, NULL, [0 => 8]) = 0
+ getsockopt(3, SOL_NETLINK, NETLINK_LIST_MEMBERSHIPS, [], [3 => 8]) = 0
+-getsockopt(3, SOL_NETLINK, NETLINK_LIST_MEMBERSHIPS, 0x7fa18a803000, [8]) = 
-1 EFAULT (Bad address)
++getsockopt(3, SOL_NETLINK, NETLINK_LIST_MEMBERSHIPS, 0x7fa18a803000, [4]) = 
-1 EFAULT (Bad address)
+ getsockopt(3, SOL_NETLINK, NETLINK_LIST_MEMBERSHIPS, 0x7fa18a802ffc, 
0x7fa18a7fd000) = -1 EFAULT (Bad address)
+ setsockopt(3, SOL_NETLINK, NETLINK_LIST_MEMBERSHIPS, [233811181], 4) = -1 
ENOPROTOOPT (Protocol not available)
+ setsockopt(3, SOL_NETLINK, NETLINK_LIST_MEMBERSHIPS, [233811181], 5) = -1 
ENOPROTOOPT (Protocol not available)
+
+
+
+Index: strace-6.3/tests/sockopt-sol_netlink.gen.test
+===
+--- strace-6.3.orig/tests/sockopt-sol_netlink.gen.test
 strace-6.3/tests/sockopt-sol_netlink.gen.test
+@@ -1,4 +1,5 @@
+ #!/bin/sh -efu
+ # Generated by ./tests/gen_tests.sh from ./tests/gen_tests.in 
(sockopt-sol_netlink -e trace=getsockopt,setsockopt); do not edit.
+ . "${srcdir=.}/init.sh"
++skip_ "Test failing after system upgrades, wait for upstream fixes"
+ run_strace_match_diff -e trace=getsockopt,setsockopt
diff --git a/meta/recipes-devtools/strace/strace_6.3.bb 
b/meta/recipes-devtools/strace/strace_6.3.bb
index ae614716720..a85294d3c24 100644
--- a/meta/recipes-devtools/strace/strace_6.3.bb
+++ b/meta/recipes-devtools/strace/strace_6.3.bb
@@ -15,6 +15,7 @@ SRC_URI = "https://strace.io/files/${PV}/strace-${PV}.tar.xz \
file://skip-load.patch \

file://0001-configure-Use-autoconf-macro-to-detect-largefile-sup.patch \
file://0002-tests-Replace-off64_t-with-off_t.patch \
+   file://skip-sockopt-test.patch \
"
 SRC_URI[sha256sum] = 
"e17878e301506c1cc30168ad14efee7f8bcef63b27ace5d290acce7bb731"
 
-- 
2.39.2


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#183048): 
https://lists.openembedded.org/g/openembedded-core/message/183048
Mute This Topic: https://lists.openembedded.org/mt/99574060/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core] [PATCH 2/2] strace: Merge two similar patches

2023-06-16 Thread Richard Purdie
Both patches change the same paths to gawk, merge them together
as we only need one patch for this.

Signed-off-by: Richard Purdie 
---
 ...0001-caps-abbrev.awk-fix-gawk-s-path.patch | 47 ---
 .../strace/strace/update-gawk-paths.patch | 30 
 meta/recipes-devtools/strace/strace_6.3.bb|  1 -
 3 files changed, 30 insertions(+), 48 deletions(-)
 delete mode 100644 
meta/recipes-devtools/strace/strace/0001-caps-abbrev.awk-fix-gawk-s-path.patch

diff --git 
a/meta/recipes-devtools/strace/strace/0001-caps-abbrev.awk-fix-gawk-s-path.patch
 
b/meta/recipes-devtools/strace/strace/0001-caps-abbrev.awk-fix-gawk-s-path.patch
deleted file mode 100644
index 235e8036419..000
--- 
a/meta/recipes-devtools/strace/strace/0001-caps-abbrev.awk-fix-gawk-s-path.patch
+++ /dev/null
@@ -1,47 +0,0 @@
-From 597cc206d982e7237eb93fdc33e8c4bb6bb2d796 Mon Sep 17 00:00:00 2001
-From: Robert Yang 
-Date: Thu, 9 Feb 2017 01:27:49 -0800
-Subject: [PATCH] caps-abbrev.awk: fix gawk's path
-
-It should be /usr/bin/gawk as other scripts use in this package.
-
-Upstream-Status: Pending
-
-Signed-off-by: Robert Yang 
-

- tests-m32/caps-abbrev.awk  | 2 +-
- tests-mx32/caps-abbrev.awk | 2 +-
- tests/caps-abbrev.awk  | 2 +-
- 3 files changed, 3 insertions(+), 3 deletions(-)
-
-diff --git a/tests-m32/caps-abbrev.awk b/tests-m32/caps-abbrev.awk
-index c00023b..a56cd56 100644
 a/tests-m32/caps-abbrev.awk
-+++ b/tests-m32/caps-abbrev.awk
-@@ -1,4 +1,4 @@
--#!/bin/gawk
-+#!/usr/bin/gawk
- #
- # This file is part of caps strace test.
- #
-diff --git a/tests-mx32/caps-abbrev.awk b/tests-mx32/caps-abbrev.awk
-index c00023b..a56cd56 100644
 a/tests-mx32/caps-abbrev.awk
-+++ b/tests-mx32/caps-abbrev.awk
-@@ -1,4 +1,4 @@
--#!/bin/gawk
-+#!/usr/bin/gawk
- #
- # This file is part of caps strace test.
- #
-diff --git a/tests/caps-abbrev.awk b/tests/caps-abbrev.awk
-index c00023b..a56cd56 100644
 a/tests/caps-abbrev.awk
-+++ b/tests/caps-abbrev.awk
-@@ -1,4 +1,4 @@
--#!/bin/gawk
-+#!/usr/bin/gawk
- #
- # This file is part of caps strace test.
- #
diff --git a/meta/recipes-devtools/strace/strace/update-gawk-paths.patch 
b/meta/recipes-devtools/strace/strace/update-gawk-paths.patch
index 0c683496ae9..a16ede95c26 100644
--- a/meta/recipes-devtools/strace/strace/update-gawk-paths.patch
+++ b/meta/recipes-devtools/strace/strace/update-gawk-paths.patch
@@ -125,3 +125,33 @@ index dce78f5..573d9ea 100644
  #
  # Copyright (c) 2014-2015 Dmitry V. Levin 
  # Copyright (c) 2016 Elvira Khabirova 
+diff --git a/tests-m32/caps-abbrev.awk b/tests-m32/caps-abbrev.awk
+index c00023b..a56cd56 100644
+--- a/tests-m32/caps-abbrev.awk
 b/tests-m32/caps-abbrev.awk
+@@ -1,4 +1,4 @@
+-#!/bin/gawk
++#!/usr/bin/gawk
+ #
+ # This file is part of caps strace test.
+ #
+diff --git a/tests-mx32/caps-abbrev.awk b/tests-mx32/caps-abbrev.awk
+index c00023b..a56cd56 100644
+--- a/tests-mx32/caps-abbrev.awk
 b/tests-mx32/caps-abbrev.awk
+@@ -1,4 +1,4 @@
+-#!/bin/gawk
++#!/usr/bin/gawk
+ #
+ # This file is part of caps strace test.
+ #
+diff --git a/tests/caps-abbrev.awk b/tests/caps-abbrev.awk
+index c00023b..a56cd56 100644
+--- a/tests/caps-abbrev.awk
 b/tests/caps-abbrev.awk
+@@ -1,4 +1,4 @@
+-#!/bin/gawk
++#!/usr/bin/gawk
+ #
+ # This file is part of caps strace test.
+ #
diff --git a/meta/recipes-devtools/strace/strace_6.3.bb 
b/meta/recipes-devtools/strace/strace_6.3.bb
index a85294d3c24..7ba9fcc4681 100644
--- a/meta/recipes-devtools/strace/strace_6.3.bb
+++ b/meta/recipes-devtools/strace/strace_6.3.bb
@@ -9,7 +9,6 @@ SRC_URI = "https://strace.io/files/${PV}/strace-${PV}.tar.xz \
file://update-gawk-paths.patch \
file://Makefile-ptest.patch \
file://run-ptest \
-   file://0001-caps-abbrev.awk-fix-gawk-s-path.patch \
file://ptest-spacesave.patch \
file://0001-strace-fix-reproducibilty-issues.patch \
file://skip-load.patch \
-- 
2.39.2


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#183049): 
https://lists.openembedded.org/g/openembedded-core/message/183049
Mute This Topic: https://lists.openembedded.org/mt/99574061/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



Re: [OE-core][PATCH 1/2] kernel-module-split: make autoload and probeconf distribution specific

2023-06-16 Thread Peter Kjellerstedt
Did anything ever become of this? This is a change that at least we would 
appreciate.

//Peter

From: Jose Quaresma 
Sent: den 17 februari 2023 17:53
To: Peter Kjellerstedt 
Cc: Ola x Nilsson ; Otavio Salvador 
; Jose Quaresma ; 
openembedded-core@lists.openembedded.org
Subject: Re: [OE-core][PATCH 1/2] kernel-module-split: make autoload and 
probeconf distribution specific

Hi Peter,

Peter Kjellerstedt 
mailto:peter.kjellerst...@axis.com>> escreveu no 
dia sexta, 17/02/2023 à(s) 10:52:
Wouldn’t the easiest solution be to define two variables:
modulesloaddir ??= "${sysconfdir}/modules-load.d "
modprobedir ??= "${sysconfdir}/modprobe.d "
then in init-manager-systemd.inc you could change them to:
modulesloaddir ?= "${nonarch_libdir}/modules-load.d"
modprobedir ?= "${nonarch_base_libdir}/modprobe.d"
Using a single prefix variable doesn’t really work since they need different 
paths in the latter case.

I was thinking of something similar to what you suggest but only on the class:

modulesloaddir ??= "${@bb.utils.contains('DISTRO_FEATURES', 'systemd', 
'${nonarch_libdir}', '${sysconfdir}', 
d)}"
modprobedir ??= "${@bb.utils.contains('DISTRO_FEATURES', 'systemd', 
'${nonarch_base_libdir}', '${sysconfdir}', 
d)}"

Anyway your approach looks good to me too so i'll use yours, hope I can test it 
next week.

Jose


//Peter

From: 
openembedded-core@lists.openembedded.org
 
mailto:openembedded-core@lists.openembedded.org>>
 On Behalf Of Jose Quaresma
Sent: den 16 februari 2023 12:08
To: Ola x Nilsson mailto:ola.x.nils...@axis.com>>
Cc: Otavio Salvador 
mailto:otavio.salva...@ossystems.com.br>>; 
Jose Quaresma mailto:jose.quare...@foundries.io>>; 
openembedded-core@lists.openembedded.org
Subject: Re: [OE-core][PATCH 1/2] kernel-module-split: make autoload and 
probeconf distribution specific


Ola x Nilsson mailto:ola.x.nils...@axis.com>> escreveu 
no dia quinta, 16/02/2023 à(s) 08:22:

On Wed, Feb 15 2023, Jose Quaresma wrote:

> Hi Octavio,
>
> Otavio Salvador 
> mailto:otavio.salva...@ossystems.com.br>>>
>  escreveu no dia quarta, 15/02/2023 à(s) 13:25:
> Em qua., 15 de fev. de 2023 às 10:01, Jose Quaresma
> mailto:quaresma.j...@gmail.com>>>
>  escreveu:
>>
>> The modules-load.d [1] - Configure kernel modules to load at boot
>> should install their configuration files in /usr/lib/modules-load.d.
>>
>> The modprobe.d [2] - Configuration directory for modprobe
>> should install their configuration files in /lib/modprobe.d
>>
>> [1] https://www.freedesktop.org/software/systemd/man/modules-load.d.html
>> [2] 
>> https://www.man7.org/linux/man-pages//man5/modprobe.d.5.html
>>
>> Signed-off-by: Jose Quaresma 
>> mailto:jose.quare...@foundries.io>>>
>
>
> Did you validate this using busybox only? Using sysv and busybox need
> to be validated as well.
>
> Please drop this patch series because it doesn work with busybox.
>
> Looks like busybox don't support other path than /etc:
> https://git.busybox.net/busybox/tree/modutils/modprobe.c?id=669c40ed8ebf480c95ce36135104e474e361a7e6#n658
>
> So I need to implement this in another way, maybe relocating the files from 
> /etc only when systemd is enabled.
>
> Thanks for raising the issue.
>
> Jose
>

Hi,

Please consider https://bugzilla.yoctoproject.org/show_bug.cgi?id=12212
as well.

--
Ola x Nilsson

Hi Ola,

We use usermerge too but I think the weird issue here is we need to have this 
distribution specified only for systemd
excluding busybox and sysint as pointed out by Octavio.
The other solution is adding support on busybox and sysint if needed.

My idea is add a prefix variable with path "/etc" by default but conditioned by 
systemd DISTRO_FEATURES

Thanks for the bug hint.
--
Best regards,

José Quaresma


--
Best regards,

José Quaresma

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#183047): 
https://lists.openembedded.org/g/openembedded-core/message/183047
Mute This Topic: https://lists.openembedded.org/mt/96981851/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core] [PATCH] oeqa/logparser: Fix ptest No-section exception

2023-06-16 Thread Richard Purdie
Occasionally we see:

  File "/media/build/poky/meta/lib/oeqa/runtime/cases/ptest.py", line 27, in 
test_ptestrunner_expectfail
self.do_ptestrunner()
  File "/media/build/poky/meta/lib/oeqa/runtime/cases/ptest.py", line 77, in 
do_ptestrunner
results, sections = parser.parse(ptest_runner_log)
  File "/media/build/poky/meta/lib/oeqa/utils/logparser.py", line 80, in parse
self.results[current_section['name']][result.group(1).strip()] = t
KeyError: 'No-section'

which occurs when there are "results" outside the main log section. The strace
tests do then upon failure as they dump logs there.

Add code to avoid the tracebacks and just make them warnings.

Signed-off-by: Richard Purdie 
---
 meta/lib/oeqa/utils/logparser.py | 5 -
 1 file changed, 4 insertions(+), 1 deletion(-)

diff --git a/meta/lib/oeqa/utils/logparser.py b/meta/lib/oeqa/utils/logparser.py
index 60df754b36f..8054acc853b 100644
--- a/meta/lib/oeqa/utils/logparser.py
+++ b/meta/lib/oeqa/utils/logparser.py
@@ -77,7 +77,10 @@ class PtestParser(object):
 for t in test_regex:
 result = test_regex[t].search(line)
 if result:
-
self.results[current_section['name']][result.group(1).strip()] = t
+try:
+
self.results[current_section['name']][result.group(1).strip()] = t
+except KeyError:
+bb.warn("Result with no section: %s - %s" % (t, 
result.group(1).strip()))
 
 # Python performance for repeatedly joining long strings is poor, do 
it all at once at the end.
 # For 2.1 million lines in a log this reduces 18 hours to 12s.
-- 
2.39.2


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#183046): 
https://lists.openembedded.org/g/openembedded-core/message/183046
Mute This Topic: https://lists.openembedded.org/mt/99573457/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core][mickledore 24/24] systemd-systemctl: support instance expansion in WantedBy

2023-06-16 Thread Steve Sakoman
From: Ian Ray 

Refactor _process_deps to expand systemd instance specifier "%i" to the
template instance.

This change expands on prior commit e510222b57 ("systemd-systemctl: fix
instance template WantedBy symlink construction") by substituting every
"%i" pattern-match with the instance name.

The regexp handles the following cases:

* svc-wants@%i.service

* sys-subsystem-net-devices-%i.device

Signed-off-by: Ian Ray 
Signed-off-by: Alexandre Belloni 
(cherry picked from commit 9356276137267a29ae2289d796a2940918375308)
Signed-off-by: Steve Sakoman 
---
 meta/recipes-core/systemd/systemd-systemctl/systemctl | 9 ++---
 1 file changed, 2 insertions(+), 7 deletions(-)

diff --git a/meta/recipes-core/systemd/systemd-systemctl/systemctl 
b/meta/recipes-core/systemd/systemd-systemctl/systemctl
index b45a2dc2f7..514f747fe6 100755
--- a/meta/recipes-core/systemd/systemd-systemctl/systemctl
+++ b/meta/recipes-core/systemd/systemd-systemctl/systemctl
@@ -201,13 +201,8 @@ class SystemdUnit():
 target = ROOT / location.relative_to(self.root)
 try:
 for dependent in config.get('Install', prop):
-# determine whether or not dependent is a template with an 
actual
-# instance (i.e. a '@%i')
-dependent_is_template = 
re.match(r"[^@]+@(?P[^\.]*)\.", dependent)
-if dependent_is_template:
-# if so, replace with the actual instance to achieve
-# svc-wants@a.service.wants/svc-wanted-by@a.service
-dependent = 
re.sub(dependent_is_template.group('instance'), instance, dependent, 1)
+# expand any %i to instance (ignoring escape sequence %%)
+dependent = re.sub("([^%](%%)*)%i", "\\1{}".format(instance), 
dependent)
 wants = systemdir / "{}.{}".format(dependent, dirstem) / 
service
 add_link(wants, target)
 
-- 
2.34.1


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#183045): 
https://lists.openembedded.org/g/openembedded-core/message/183045
Mute This Topic: https://lists.openembedded.org/mt/99571637/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core][mickledore 23/24] cmake.bbclass: do not search host paths for find_program()

2023-06-16 Thread Steve Sakoman
From: Chen Qi 

OECMAKE_FIND_ROOT_PATH_MODE_PROGRAM[1] controls the search
behavior of find_program(). When this variable's value was
first used in OE, it was deliberately set to BOTH to allow
searching of host tools. This is to ensure the necessary tools
from host could be used. The downside is that the configure
behavior may differ on different host environments.

Later, this cmake.bbclass was added the ability to search tools
under the HOSTTOOLS_DIR. This means we no longer needs cmake to
search the host paths. So we remove the class-native setting of
BOTH.

[1] 
https://cmake.org/cmake/help/latest/variable/CMAKE_FIND_ROOT_PATH_MODE_PROGRAM.html

Signed-off-by: Chen Qi 
Signed-off-by: Richard Purdie 
(cherry picked from commit f4ea12f6635125ee793f4dd801c538c0186f9dc3)
Signed-off-by: Steve Sakoman 
---
 meta/classes-recipe/cmake.bbclass | 1 -
 1 file changed, 1 deletion(-)

diff --git a/meta/classes-recipe/cmake.bbclass 
b/meta/classes-recipe/cmake.bbclass
index 554b948c32..2f5114b6b5 100644
--- a/meta/classes-recipe/cmake.bbclass
+++ b/meta/classes-recipe/cmake.bbclass
@@ -61,7 +61,6 @@ OECMAKE_PERLNATIVE_DIR ??= ""
 OECMAKE_EXTRA_ROOT_PATH ?= ""
 
 OECMAKE_FIND_ROOT_PATH_MODE_PROGRAM = "ONLY"
-OECMAKE_FIND_ROOT_PATH_MODE_PROGRAM:class-native = "BOTH"
 
 EXTRA_OECMAKE:append = " ${PACKAGECONFIG_CONFARGS}"
 
-- 
2.34.1


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#183044): 
https://lists.openembedded.org/g/openembedded-core/message/183044
Mute This Topic: https://lists.openembedded.org/mt/99571636/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core][mickledore 22/24] selftest/license: Exclude from world

2023-06-16 Thread Steve Sakoman
From: Richard Purdie 

These test recipes shouldn't be built as part of world builds. Some recent
changes are exposing issues from this so exclude them.

Signed-off-by: Richard Purdie 
(cherry picked from commit 80d3f5586cd060ae69fbc6dec2e8978d87da10ba)
Signed-off-by: Steve Sakoman 
---
 .../recipes-test/license/incompatible-license-alias.bb  | 2 ++
 meta-selftest/recipes-test/license/incompatible-license.bb  | 2 ++
 meta-selftest/recipes-test/license/incompatible-licenses.bb | 2 ++
 .../recipes-test/license/incompatible-nonspdx-license.bb| 2 ++
 4 files changed, 8 insertions(+)

diff --git a/meta-selftest/recipes-test/license/incompatible-license-alias.bb 
b/meta-selftest/recipes-test/license/incompatible-license-alias.bb
index e0b4e13c26..1af99e7809 100644
--- a/meta-selftest/recipes-test/license/incompatible-license-alias.bb
+++ b/meta-selftest/recipes-test/license/incompatible-license-alias.bb
@@ -1,3 +1,5 @@
 SUMMARY = "Recipe with an alias of an SPDX license"
 DESCRIPTION = "Is licensed with an alias of an SPDX license to be used for 
testing"
 LICENSE = "GPLv3"
+
+EXCLUDE_FROM_WORLD = "1"
diff --git a/meta-selftest/recipes-test/license/incompatible-license.bb 
b/meta-selftest/recipes-test/license/incompatible-license.bb
index 282f5c2875..6fdc58fd30 100644
--- a/meta-selftest/recipes-test/license/incompatible-license.bb
+++ b/meta-selftest/recipes-test/license/incompatible-license.bb
@@ -1,3 +1,5 @@
 SUMMARY = "Recipe with an SPDX license"
 DESCRIPTION = "Is licensed with an SPDX license to be used for testing"
 LICENSE = "GPL-3.0-only"
+
+EXCLUDE_FROM_WORLD = "1"
diff --git a/meta-selftest/recipes-test/license/incompatible-licenses.bb 
b/meta-selftest/recipes-test/license/incompatible-licenses.bb
index 9709892644..47bd8d7c00 100644
--- a/meta-selftest/recipes-test/license/incompatible-licenses.bb
+++ b/meta-selftest/recipes-test/license/incompatible-licenses.bb
@@ -1,3 +1,5 @@
 SUMMARY = "Recipe with multiple SPDX licenses"
 DESCRIPTION = "Is licensed with multiple SPDX licenses to be used for testing"
 LICENSE = "GPL-2.0-only & GPL-3.0-only & LGPL-3.0-only"
+
+EXCLUDE_FROM_WORLD = "1"
diff --git a/meta-selftest/recipes-test/license/incompatible-nonspdx-license.bb 
b/meta-selftest/recipes-test/license/incompatible-nonspdx-license.bb
index 35af0966ef..142d73158e 100644
--- a/meta-selftest/recipes-test/license/incompatible-nonspdx-license.bb
+++ b/meta-selftest/recipes-test/license/incompatible-nonspdx-license.bb
@@ -1,3 +1,5 @@
 SUMMARY = "Recipe with a non-SPDX license"
 DESCRIPTION = "Is licensed with a non-SPDX license to be used for testing"
 LICENSE = "FooLicense"
+
+EXCLUDE_FROM_WORLD = "1"
-- 
2.34.1


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#183043): 
https://lists.openembedded.org/g/openembedded-core/message/183043
Mute This Topic: https://lists.openembedded.org/mt/99571635/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core][mickledore 20/24] maintainers.inc: correct unassigned entries

2023-06-16 Thread Steve Sakoman
From: Alexander Kanavin 

Modify packages to unassigned where appropriate

Signed-off-by: Alexander Kanavin 
Signed-off-by: Richard Purdie 
(cherry picked from commit ab37ddf53607111bf5c49c4f2388224999c4a5a9)
Signed-off-by: Steve Sakoman 
---
 meta/conf/distro/include/maintainers.inc | 8 
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/meta/conf/distro/include/maintainers.inc 
b/meta/conf/distro/include/maintainers.inc
index 098bd96c28..d9e00bcdac 100644
--- a/meta/conf/distro/include/maintainers.inc
+++ b/meta/conf/distro/include/maintainers.inc
@@ -41,7 +41,7 @@ RECIPE_MAINTAINER:pn-alsa-utils = "Michael Opdenacker 

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#183041): 
https://lists.openembedded.org/g/openembedded-core/message/183041
Mute This Topic: https://lists.openembedded.org/mt/99571632/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core][mickledore 21/24] connman: fix warning by specifying runstatedir at configure time

2023-06-16 Thread Steve Sakoman
From: Marc Ferland 

Without this patch, systemd complains on startup with messages similar
to:

systemd-tmpfiles[128]: /etc/tmpfiles.d/connman_resolvconf.conf:1: Line 
references path below legacy directory /var/run/, updating /var/run/connman → 
/run/connman; please update the tmpfiles.d/ drop-in file accordingly.
systemd-tmpfiles[172]: /etc/tmpfiles.d/connman_resolvconf.conf:1: Line 
references path below legacy directory /var/run/, updating /var/run/connman → 
/run/connman; please update the tmpfiles.d/ drop-in file accordingly.

By default, connman will use "/var/run/connman" for runstatedir
instead of the now recommended "/run/connman".

Signed-off-by: Marc Ferland 
Signed-off-by: Alexandre Belloni 
Signed-off-by: Richard Purdie 
(cherry picked from commit 8d17776765a99a4ae327797206ef2a8a735ce87b)
Signed-off-by: Steve Sakoman 
---
 meta/recipes-connectivity/connman/connman.inc | 1 +
 1 file changed, 1 insertion(+)

diff --git a/meta/recipes-connectivity/connman/connman.inc 
b/meta/recipes-connectivity/connman/connman.inc
index d7af94f792..7487ca0d0c 100644
--- a/meta/recipes-connectivity/connman/connman.inc
+++ b/meta/recipes-connectivity/connman/connman.inc
@@ -27,6 +27,7 @@ EXTRA_OECONF += "\
 --enable-ethernet \
 --enable-tools \
 --disable-polkit \
+--runstatedir=/run \
 "
 # For smooth operation it would be best to start only one wireless daemon at a 
time.
 # If wpa-supplicant is running, connman will use it preferentially.
-- 
2.34.1


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#183042): 
https://lists.openembedded.org/g/openembedded-core/message/183042
Mute This Topic: https://lists.openembedded.org/mt/99571634/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core][mickledore 19/24] maintainers.inc: unassign Pascal Bach from cmake entry

2023-06-16 Thread Steve Sakoman
From: Alexander Kanavin 

This was confirmed via private email.

Signed-off-by: Alexander Kanavin 
Signed-off-by: Richard Purdie 
(cherry picked from commit c30e9f1972a3e1d4099f39fd6d0dfb37acb73ce1)
Signed-off-by: Steve Sakoman 
---
 meta/conf/distro/include/maintainers.inc | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/meta/conf/distro/include/maintainers.inc 
b/meta/conf/distro/include/maintainers.inc
index 733d40ce58..098bd96c28 100644
--- a/meta/conf/distro/include/maintainers.inc
+++ b/meta/conf/distro/include/maintainers.inc
@@ -93,8 +93,8 @@ RECIPE_MAINTAINER:pn-cantarell-fonts = "Alexander Kanavin 

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#183040): 
https://lists.openembedded.org/g/openembedded-core/message/183040
Mute This Topic: https://lists.openembedded.org/mt/99571631/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core][mickledore 16/24] perf: Make built-in libtraceevent plugins cohabit with external libtraceevent

2023-06-16 Thread Steve Sakoman
From: Khem Raj 

This will package the plugins built by perf into kernel specific dir
under libdir, so it does not conflict with plugins from newly added
libtraceevent recipe

Fixes
do_sdk_depends: The file /usr/lib/traceevent/plugins/plugin_cfg80211.so is 
installed by both perf and libtraceevent, aborting

Signed-off-by: Khem Raj 
Cc: Max Krummenacher 
Signed-off-by: Alexandre Belloni 
Signed-off-by: Richard Purdie 
(cherry picked from commit 28f39769c27d257a60ff0152acc0c76f0276fa6a)
Signed-off-by: Steve Sakoman 
---
 meta/recipes-kernel/perf/perf.bb | 6 +-
 1 file changed, 5 insertions(+), 1 deletion(-)

diff --git a/meta/recipes-kernel/perf/perf.bb b/meta/recipes-kernel/perf/perf.bb
index e41fcc4798..420286e1ab 100644
--- a/meta/recipes-kernel/perf/perf.bb
+++ b/meta/recipes-kernel/perf/perf.bb
@@ -135,6 +135,10 @@ PERF_EXTRA_LDFLAGS:mipsarchn64el = "-m elf64ltsmip"
 do_compile() {
# Linux kernel build system is expected to do the right thing
unset CFLAGS
+test -e ${S}/tools/lib/traceevent/plugins/Makefile && \
+sed -i -e 
's|\$(libdir)/traceevent/plugins|\$(libdir)/traceevent_${KERNEL_VERSION}/plugins|g'
 ${S}/tools/lib/traceevent/plugins/Makefile
+   test -e ${S}/tools/perf/Makefile.config && \
+sed -i -e 
's|\$(libdir)/traceevent/plugins|\$(libdir)/traceevent_${KERNEL_VERSION}/plugins|g'
 ${S}/tools/perf/Makefile.config
oe_runmake all
 }
 
@@ -361,7 +365,7 @@ RSUGGESTS_SCRIPTING = 
"${@bb.utils.contains('PACKAGECONFIG', 'scripting', '${PN}
 RSUGGESTS:${PN} += "${PN}-archive ${PN}-tests ${RSUGGESTS_SCRIPTING}"
 
 FILES_SOLIBSDEV = ""
-FILES:${PN} += "${libexecdir}/perf-core ${exec_prefix}/libexec/perf-core 
${libdir}/traceevent ${libdir}/libperf-jvmti.so"
+FILES:${PN} += "${libexecdir}/perf-core ${exec_prefix}/libexec/perf-core 
${libdir}/traceevent* ${libdir}/libperf-jvmti.so"
 FILES:${PN}-archive = "${libdir}/perf/perf-core/perf-archive"
 FILES:${PN}-tests = "${libdir}/perf/perf-core/tests 
${libexecdir}/perf-core/tests"
 FILES:${PN}-python = " \
-- 
2.34.1


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#183037): 
https://lists.openembedded.org/g/openembedded-core/message/183037
Mute This Topic: https://lists.openembedded.org/mt/99571625/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core][mickledore 18/24] maintainers.inc: unassign Andreas Müller from itstool entry

2023-06-16 Thread Steve Sakoman
From: Alexander Kanavin 

This was confirmed via private email.

Signed-off-by: Alexander Kanavin 
Signed-off-by: Richard Purdie 
(cherry picked from commit cc8bb0da24419424989548ced27b2e76030340d9)
Signed-off-by: Steve Sakoman 
---
 meta/conf/distro/include/maintainers.inc | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/meta/conf/distro/include/maintainers.inc 
b/meta/conf/distro/include/maintainers.inc
index db0563810d..733d40ce58 100644
--- a/meta/conf/distro/include/maintainers.inc
+++ b/meta/conf/distro/include/maintainers.inc
@@ -288,7 +288,7 @@ RECIPE_MAINTAINER:pn-iproute2 = "Changhyeok Bae 
"
 RECIPE_MAINTAINER:pn-iptables = "Changhyeok Bae "
 RECIPE_MAINTAINER:pn-iputils = "Changhyeok Bae "
 RECIPE_MAINTAINER:pn-iso-codes = "Wang Mingyu "
-RECIPE_MAINTAINER:pn-itstool = "Andreas Müller "
+RECIPE_MAINTAINER:pn-itstool = "Unassigned "
 RECIPE_MAINTAINER:pn-iw = "Changhyeok Bae "
 RECIPE_MAINTAINER:pn-libjpeg-turbo = "Anuj Mittal "
 RECIPE_MAINTAINER:pn-json-c = "Yi Zhao "
-- 
2.34.1


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#183039): 
https://lists.openembedded.org/g/openembedded-core/message/183039
Mute This Topic: https://lists.openembedded.org/mt/99571628/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core][mickledore 17/24] maintaines.inc: unassign Richard Weinberger from erofs-utils entry

2023-06-16 Thread Steve Sakoman
From: Alexander Kanavin 

This was confirmed via private email.

Signed-off-by: Alexander Kanavin 
Signed-off-by: Richard Purdie 
(cherry picked from commit 834519933fcd6e4ff54f24d0cf671ea9ce24398a)
Signed-off-by: Steve Sakoman 
---
 meta/conf/distro/include/maintainers.inc | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/meta/conf/distro/include/maintainers.inc 
b/meta/conf/distro/include/maintainers.inc
index b4ce618ca0..db0563810d 100644
--- a/meta/conf/distro/include/maintainers.inc
+++ b/meta/conf/distro/include/maintainers.inc
@@ -165,7 +165,7 @@ RECIPE_MAINTAINER:pn-ell = "Zang Ruochen 
"
 RECIPE_MAINTAINER:pn-enchant2 = "Anuj Mittal "
 RECIPE_MAINTAINER:pn-encodings = "Unassigned "
 RECIPE_MAINTAINER:pn-epiphany = "Alexander Kanavin "
-RECIPE_MAINTAINER:pn-erofs-utils = "Richard Weinberger "
+RECIPE_MAINTAINER:pn-erofs-utils = "Unassigned "
 RECIPE_MAINTAINER:pn-ethtool = "Changhyeok Bae "
 RECIPE_MAINTAINER:pn-eudev = "Anuj Mittal "
 RECIPE_MAINTAINER:pn-expat = "Yi Zhao "
-- 
2.34.1


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#183038): 
https://lists.openembedded.org/g/openembedded-core/message/183038
Mute This Topic: https://lists.openembedded.org/mt/99571627/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core][mickledore 15/24] pm-utils: fix multilib conflictions

2023-06-16 Thread Steve Sakoman
From: Kai Kang 

It fails to instal pm-utils and lib32-pm-utils at same time:

Error: Transaction test error:
  file /usr/bin/pm-is-supported conflicts between attempted installs of 
lib32-pm-utils-1.4.1-r1.corei7_32 and pm-utils-1.4.1-r1.corei7_64
  file /usr/sbin/pm-hibernate conflicts between attempted installs of 
lib32-pm-utils-1.4.1-r1.corei7_32 and pm-utils-1.4.1-r1.corei7_64
  file /usr/sbin/pm-powersave conflicts between attempted installs of 
lib32-pm-utils-1.4.1-r1.corei7_32 and pm-utils-1.4.1-r1.corei7_64
  file /usr/sbin/pm-suspend conflicts between attempted installs of 
lib32-pm-utils-1.4.1-r1.corei7_32 and pm-utils-1.4.1-r1.corei7_64
  file /usr/sbin/pm-suspend-hybrid conflicts between attempted installs of 
lib32-pm-utils-1.4.1-r1.corei7_32 and pm-utils-1.4.1-r1.corei7_64

All of the conflicted files either is script which source a file in
${libdir}, or a link file to some file in ${libdir}. Compare the content
of installed files in ${libdir} exclude binaries, only the paths of
${libdir} diff. So re-define libdir with ${nonarch_libdir} to fix the
conflicts.

Signed-off-by: Kai Kang 
Signed-off-by: Richard Purdie 
(cherry picked from commit f836541bcfdbf033a37537530b4e3b87b0a7f003)
Signed-off-by: Steve Sakoman 
---
 meta/recipes-bsp/pm-utils/pm-utils_1.4.1.bb | 5 -
 1 file changed, 4 insertions(+), 1 deletion(-)

diff --git a/meta/recipes-bsp/pm-utils/pm-utils_1.4.1.bb 
b/meta/recipes-bsp/pm-utils/pm-utils_1.4.1.bb
index c6a4bc4932..dcc09f279e 100644
--- a/meta/recipes-bsp/pm-utils/pm-utils_1.4.1.bb
+++ b/meta/recipes-bsp/pm-utils/pm-utils_1.4.1.bb
@@ -19,9 +19,12 @@ PACKAGECONFIG[manpages] = "--enable-doc, --disable-doc, 
libxslt-native xmlto-nat
 
 RDEPENDS:${PN} = "grep bash"
 
+EXTRA_OECONF = "--libdir=${nonarch_libdir}"
+
 do_configure:prepend () {
( cd ${S}; autoreconf -f -i -s )
 }
 
-FILES:${PN} += "${libdir}/${BPN}/*"
+FILES:${PN} += "${nonarch_libdir}/${BPN}/*"
 FILES:${PN}-dbg += "${datadir}/doc/pm-utils/README.debugging"
+FILES:${PN}-dev += "${nonarch_libdir}/pkgconfig/pm-utils.pc"
-- 
2.34.1


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#183036): 
https://lists.openembedded.org/g/openembedded-core/message/183036
Mute This Topic: https://lists.openembedded.org/mt/99571624/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core][mickledore 13/24] libgloss: remove unused patch file

2023-06-16 Thread Steve Sakoman
From: Martin Jansa 

* it was removed from SRC_URI in:
  
https://git.openembedded.org/openembedded-core/commit/?id=1c9cbb27dfe37ca4574c4285fb03ce394dee5ed1

Signed-off-by: Martin Jansa 
Signed-off-by: Richard Purdie 
(cherry picked from commit c78439a8048c30ef96e11ae698c32f4e088787d3)
Signed-off-by: Steve Sakoman 
---
 .../libgloss/fix_makefile_include_arm_h.patch | 30 ---
 1 file changed, 30 deletions(-)
 delete mode 100644 
meta/recipes-core/newlib/libgloss/fix_makefile_include_arm_h.patch

diff --git a/meta/recipes-core/newlib/libgloss/fix_makefile_include_arm_h.patch 
b/meta/recipes-core/newlib/libgloss/fix_makefile_include_arm_h.patch
deleted file mode 100644
index 7645be7314..00
--- a/meta/recipes-core/newlib/libgloss/fix_makefile_include_arm_h.patch
+++ /dev/null
@@ -1,30 +0,0 @@
-Upstream-Status: Inappropriate  [OE-Specific]
-
-When trying to build libgloss for an arm target, the build system
-complains about missing some include files:
-
-| fatal error: acle-compiat.h: No such file or directory
-|  #include "acle-compat.h"
-|   ^~~
-| compilation terminated.
-
-These include files come from the newlib source, but since we
-are building libgloss separately from newlib, libgloss is unaware
-of where they are, this patch fixes the INCLUDES so the build system
-can find such files.
-
-Signed-off-by: Alejandro Enedino Hernandez Samaniego 
-
-Index: newlib-3.0.0/libgloss/config/default.mh
-===
 newlib-3.0.0.orig/libgloss/config/default.mh
-+++ newlib-3.0.0/libgloss/config/default.mh
-@@ -1,7 +1,7 @@
- NEWLIB_CFLAGS = `if [ -d ${objroot}/newlib ]; then echo 
-I${objroot}/newlib/targ-include -I${srcroot}/newlib/libc/include; fi`
- NEWLIB_LDFLAGS = `if [ -d ${objroot}/newlib ]; then echo -B${objroot}/newlib/ 
-L${objroot}/newlib/; fi`
- 
--INCLUDES = -I. -I$(srcdir)/..
-+INCLUDES = -I. -I$(srcdir)/.. -I$(srcdir)/../newlib/libc/machine/arm
- # Note that when building the library, ${MULTILIB} is not the way multilib
- # options are passed; they're passed in $(CFLAGS).
- CFLAGS_FOR_TARGET = -O2 -g ${MULTILIB} ${INCLUDES} ${NEWLIB_CFLAGS}
-- 
2.34.1


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#183034): 
https://lists.openembedded.org/g/openembedded-core/message/183034
Mute This Topic: https://lists.openembedded.org/mt/99571622/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core][mickledore 14/24] kmod: remove unused ptest.patch

2023-06-16 Thread Steve Sakoman
From: Martin Jansa 

* it was removed from SRC_URI in 2015:
  
https://git.openembedded.org/openembedded-core/commit/?id=f80d136bdd578468035a88125fa1b84973fd912b

Signed-off-by: Martin Jansa 
Signed-off-by: Richard Purdie 
(cherry picked from commit cfc4586b4bf080a3a4aa419dffc76c5da2a95b74)
Signed-off-by: Steve Sakoman 
---
 meta/recipes-kernel/kmod/kmod/ptest.patch | 25 ---
 1 file changed, 25 deletions(-)
 delete mode 100644 meta/recipes-kernel/kmod/kmod/ptest.patch

diff --git a/meta/recipes-kernel/kmod/kmod/ptest.patch 
b/meta/recipes-kernel/kmod/kmod/ptest.patch
deleted file mode 100644
index 831dbcb909..00
--- a/meta/recipes-kernel/kmod/kmod/ptest.patch
+++ /dev/null
@@ -1,25 +0,0 @@
-Add 'install-ptest' rule.
-
-Signed-off-by: Tudor Florea 
-Upstream-Status: Pending
-
-diff -ruN a/Makefile.am b/Makefile.am
 a/Makefile.am  2013-07-12 17:11:05.278331557 +0200
-+++ b/Makefile.am  2013-07-12 17:14:27.033788016 +0200
-@@ -204,6 +204,16 @@
- 
- distclean-local: $(DISTCLEAN_LOCAL_HOOKS)
- 
-+install-ptest:
-+  @$(MKDIR_P) $(DESTDIR)/testsuite
-+  @for file in $(TESTSUITE); do \
-+  install $$file $(DESTDIR)/testsuite; \
-+  done;
-+  @sed -e 's/^Makefile/_Makefile/' < Makefile > $(DESTDIR)/Makefile
-+  @$(MKDIR_P) $(DESTDIR)/tools
-+  @cp $(noinst_SCRIPTS) $(noinst_PROGRAMS) $(DESTDIR)/tools
-+  @cp -r testsuite/rootfs testsuite/.libs $(DESTDIR)/testsuite
-+
- # 
--
- # custom release helpers
- # 
--
-- 
2.34.1


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#183035): 
https://lists.openembedded.org/g/openembedded-core/message/183035
Mute This Topic: https://lists.openembedded.org/mt/99571623/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core][mickledore 12/24] inetutils: remove unused patch files

2023-06-16 Thread Steve Sakoman
From: Martin Jansa 

* they were removed from SRC_URI in:
  
https://git.openembedded.org/openembedded-core/commit/?id=a21e8fdf1b66961ddae5929d393daa08800bb748

Signed-off-by: Martin Jansa 
Signed-off-by: Richard Purdie 
(cherry picked from commit e2030f2a651920435787b4a580dd18894c1bc02c)
Signed-off-by: Steve Sakoman 
---
 ...-multiple-definitions-of-errcatch-an.patch | 58 ---
 .../inetutils/fix-buffer-fortify-tfpt.patch   | 25 
 2 files changed, 83 deletions(-)
 delete mode 100644 
meta/recipes-connectivity/inetutils/inetutils/0001-ftpd-telnetd-Fix-multiple-definitions-of-errcatch-an.patch
 delete mode 100644 
meta/recipes-connectivity/inetutils/inetutils/fix-buffer-fortify-tfpt.patch

diff --git 
a/meta/recipes-connectivity/inetutils/inetutils/0001-ftpd-telnetd-Fix-multiple-definitions-of-errcatch-an.patch
 
b/meta/recipes-connectivity/inetutils/inetutils/0001-ftpd-telnetd-Fix-multiple-definitions-of-errcatch-an.patch
deleted file mode 100644
index 49d319f59d..00
--- 
a/meta/recipes-connectivity/inetutils/inetutils/0001-ftpd-telnetd-Fix-multiple-definitions-of-errcatch-an.patch
+++ /dev/null
@@ -1,58 +0,0 @@
-From 7d39930468e272c740b0eed3c7e5b7fb3abf29e8 Mon Sep 17 00:00:00 2001
-From: Khem Raj 
-Date: Wed, 5 Aug 2020 10:36:22 -0700
-Subject: [PATCH] ftpd,telnetd: Fix multiple definitions of errcatch and not42
-
-This helps fix build failures when -fno-common option is used
-
-Upstream-Status: Pending
-Signed-off-by: Khem Raj 
-
-Signed-off-by: Khem Raj 

- ftpd/extern.h | 2 +-
- ftpd/ftpcmd.c | 1 +
- telnetd/utility.c | 2 +-
- 3 files changed, 3 insertions(+), 2 deletions(-)
-
-diff --git a/ftpd/extern.h b/ftpd/extern.h
-index ab33cf3..91dbbee 100644
 a/ftpd/extern.h
-+++ b/ftpd/extern.h
-@@ -90,7 +90,7 @@ extern void user (const char *);
- extern char *sgetsave (const char *);
- 
- /* Exported from ftpd.c.  */
--jmp_buf errcatch;
-+extern jmp_buf errcatch;
- extern struct sockaddr_storage data_dest;
- extern socklen_t data_dest_len;
- extern struct sockaddr_storage his_addr;
-diff --git a/ftpd/ftpcmd.c b/ftpd/ftpcmd.c
-index beb1f06..d272e9d 100644
 a/ftpd/ftpcmd.c
-+++ b/ftpd/ftpcmd.c
-@@ -106,6 +106,7 @@
- #endif
- 
- off_t restart_point;
-+jmp_buf errcatch;
- 
- static char cbuf[512];   /* Command Buffer.  */
- static char *fromname;
-diff --git a/telnetd/utility.c b/telnetd/utility.c
-index e7ffb8e..46bf91e 100644
 a/telnetd/utility.c
-+++ b/telnetd/utility.c
-@@ -63,7 +63,7 @@ static int ncc;
- static char ptyibuf[BUFSIZ], *ptyip;
- static int pcc;
- 
--int not42;
-+extern int not42;
- 
- static int
- readstream (int p, char *ibuf, int bufsize)
--- 
-2.28.0
-
diff --git 
a/meta/recipes-connectivity/inetutils/inetutils/fix-buffer-fortify-tfpt.patch 
b/meta/recipes-connectivity/inetutils/inetutils/fix-buffer-fortify-tfpt.patch
deleted file mode 100644
index a91913cb51..00
--- 
a/meta/recipes-connectivity/inetutils/inetutils/fix-buffer-fortify-tfpt.patch
+++ /dev/null
@@ -1,25 +0,0 @@
-tftpd: Fix abort on error path
-
-When trying to fetch a non existent file, the app crashes with:
-
-*** buffer overflow detected ***: 
-Aborted
-
-
-Upstream-Status: Submitted 
[https://www.mail-archive.com/bug-inetutils@gnu.org/msg03036.html 
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91205]
-Signed-off-by: Ricardo Ribalda Delgado 
-diff --git a/src/tftpd.c b/src/tftpd.c
-index 56002a0..144012f 100644
 a/src/tftpd.c
-+++ b/src/tftpd.c
-@@ -864,9 +864,8 @@ nak (int error)
-   pe->e_msg = strerror (error - 100);
-   tp->th_code = EUNDEF;   /* set 'undef' errorcode */
- }
--  strcpy (tp->th_msg, pe->e_msg);
-   length = strlen (pe->e_msg);
--  tp->th_msg[length] = '\0';
-+  memcpy(tp->th_msg, pe->e_msg, length + 1);
-   length += 5;
-   if (sendto (peer, buf, length, 0, (struct sockaddr *) , fromlen) != 
length)
- syslog (LOG_ERR, "nak: %m\n");
-- 
2.34.1


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#183033): 
https://lists.openembedded.org/g/openembedded-core/message/183033
Mute This Topic: https://lists.openembedded.org/mt/99571621/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core][mickledore 11/24] minicom: remove unused patch files

2023-06-16 Thread Steve Sakoman
From: Martin Jansa 

* they were removed from SRC_URI in:
  
https://git.openembedded.org/openembedded-core/commit/?id=41f8760dd8a8ac388389bc17dbc5e0ae0f64bf57

Signed-off-by: Martin Jansa 
Signed-off-by: Richard Purdie 
(cherry picked from commit a0f28cd8d01f4faeedc1089e5d1e2dacc5b046f9)
Signed-off-by: Steve Sakoman 
---
 ...erfluous-global-variable-definitions.patch | 35 
 ...erfluous-global-variable-definitions.patch | 37 
 ...erfluous-global-variable-definitions.patch | 42 ---
 3 files changed, 114 deletions(-)
 delete mode 100644 
meta/recipes-extended/minicom/minicom/0001-Drop-superfluous-global-variable-definitions.patch
 delete mode 100644 
meta/recipes-extended/minicom/minicom/0002-Drop-superfluous-global-variable-definitions.patch
 delete mode 100644 
meta/recipes-extended/minicom/minicom/0003-Drop-superfluous-global-variable-definitions.patch

diff --git 
a/meta/recipes-extended/minicom/minicom/0001-Drop-superfluous-global-variable-definitions.patch
 
b/meta/recipes-extended/minicom/minicom/0001-Drop-superfluous-global-variable-definitions.patch
deleted file mode 100644
index 01b23898e7..00
--- 
a/meta/recipes-extended/minicom/minicom/0001-Drop-superfluous-global-variable-definitions.patch
+++ /dev/null
@@ -1,35 +0,0 @@
-From b65152ebc03832972115e6d98e50cb6190d01793 Mon Sep 17 00:00:00 2001
-From: =?UTF-8?q?Ond=C5=99ej=20Lyson=C4=9Bk?= 
-Date: Mon, 3 Feb 2020 13:18:13 +0100
-Subject: [PATCH 1/3] Drop superfluous global variable definitions
-
-The file minicom.c, by including the minicom.h header, already defines
-the global variables 'dial_user' and 'dial_pass'. The object file
-minicom.o is always linked to dial.o. Thus the definitions in dial.c
-can be dropped.
-
-This fixes linking with gcc 10 which uses -fno-common by default,
-disallowing multiple global variable definitions.
-
-Upstream-Status: Backport 
[https://salsa.debian.org/minicom-team/minicom/-/commit/db269bba2a68fde03f5df45ac8372a8f1248ca96]
-Signed-off-by: Khem Raj 

- src/dial.c | 2 --
- 1 file changed, 2 deletions(-)
-
-diff --git a/src/dial.c b/src/dial.c
-index eada5ee..d9d481f 100644
 a/src/dial.c
-+++ b/src/dial.c
-@@ -146,8 +146,6 @@ static int newtype;
- /* Access to ".dialdir" denied? */
- static int dendd = 0;
- static char *tagged;
--char *dial_user;
--char *dial_pass;
- 
- /* Change the baud rate.  Treat all characters in the given array as if
-  * they were key presses within the comm parameters dialog (C-A P) and
--- 
-2.24.1
-
diff --git 
a/meta/recipes-extended/minicom/minicom/0002-Drop-superfluous-global-variable-definitions.patch
 
b/meta/recipes-extended/minicom/minicom/0002-Drop-superfluous-global-variable-definitions.patch
deleted file mode 100644
index e86b470b7e..00
--- 
a/meta/recipes-extended/minicom/minicom/0002-Drop-superfluous-global-variable-definitions.patch
+++ /dev/null
@@ -1,37 +0,0 @@
-From 924bd2da3a00e030e29d82b74ef82900bd50b475 Mon Sep 17 00:00:00 2001
-From: =?UTF-8?q?Ond=C5=99ej=20Lyson=C4=9Bk?= 
-Date: Mon, 3 Feb 2020 13:18:33 +0100
-Subject: [PATCH 2/3] Drop superfluous global variable definitions
-
-The only place where the EXTERN macro mechanism is used to define the
-global variables 'vt_outmap' and 'vt_inmap' is minicom.c (by defining
-an empty EXTERN macro and including the minicom.h header). The file
-vt100.c already defines these variables. The vt100.o object file is
-always linked to minicom.o. Thus it is safe not to define the
-variables in minicom.c and only declare them in the minicom.h header.
-
-This fixes linking with gcc 10 which uses -fno-common by default,
-disallowing multiple global variable definitions.
-
-Upstream-Status: Backport 
[https://salsa.debian.org/minicom-team/minicom/-/commit/c69cad5b5dda85d361a3a0c1fddc65e933f26d11]
-Signed-off-by: Khem Raj 

- src/minicom.h | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
-diff --git a/src/minicom.h b/src/minicom.h
-index 061c013..0f9693b 100644
 a/src/minicom.h
-+++ b/src/minicom.h
-@@ -141,7 +141,7 @@ EXTERN int sbcolor; /* Status Bar Background Color */
- EXTERN int st_attr;   /* Status Bar attributes. */
- 
- /* jl 04.09.97 conversion tables */
--EXTERN unsigned char vt_outmap[256], vt_inmap[256];
-+extern unsigned char vt_outmap[256], vt_inmap[256];
- 
- /* MARK updated 02/17/95 - history buffer */
- EXTERN int num_hist_lines;  /* History buffer size */
--- 
-2.24.1
-
diff --git 
a/meta/recipes-extended/minicom/minicom/0003-Drop-superfluous-global-variable-definitions.patch
 
b/meta/recipes-extended/minicom/minicom/0003-Drop-superfluous-global-variable-definitions.patch
deleted file mode 100644
index 3225a0c32a..00
--- 
a/meta/recipes-extended/minicom/minicom/0003-Drop-superfluous-global-variable-definitions.patch
+++ /dev/null
@@ -1,42 +0,0 @@
-From a4fc603b3641d2efe31479116eb7ba66932901c7 Mon Sep 17 00:00:00 2001
-From: =?UTF-8?q?Ond=C5=99ej=20Lyson=C4=9Bk?= 
-Date: Mon, 3 Feb 2020 13:21:41 +0100
-Subject: [PATCH 

[OE-core][mickledore 10/24] qemu: remove unused qemu-7.0.0-glibc-2.36.patch

2023-06-16 Thread Steve Sakoman
From: Martin Jansa 

* it was removed from SRC_URI in:
  
https://git.openembedded.org/openembedded-core/commit/?id=e94d182889ca3c02df913c59f0b66b228ffe588c

Signed-off-by: Martin Jansa 
Signed-off-by: Richard Purdie 
(cherry picked from commit 351c461859df02118e9fadb57320120dfbcd97eb)
Signed-off-by: Steve Sakoman 
---
 .../qemu/qemu/qemu-7.0.0-glibc-2.36.patch | 46 ---
 1 file changed, 46 deletions(-)
 delete mode 100644 meta/recipes-devtools/qemu/qemu/qemu-7.0.0-glibc-2.36.patch

diff --git a/meta/recipes-devtools/qemu/qemu/qemu-7.0.0-glibc-2.36.patch 
b/meta/recipes-devtools/qemu/qemu/qemu-7.0.0-glibc-2.36.patch
deleted file mode 100644
index abad1cfeeb..00
--- a/meta/recipes-devtools/qemu/qemu/qemu-7.0.0-glibc-2.36.patch
+++ /dev/null
@@ -1,46 +0,0 @@
-Avoid conflicts between sys/mount.h and linux/mount.h that are seen
-with glibc 2.36
-
-Source: 
https://github.com/archlinux/svntogit-packages/blob/packages/qemu/trunk/qemu-7.0.0-glibc-2.36.patch
-
-Upstream-Status: Pending
-Signed-off-by: Khem Raj 
 a/linux-user/syscall.c
-+++ b/linux-user/syscall.c
-@@ -95,7 +95,25 @@
- #include 
- #include 
- #include 
-+
-+#ifdef HAVE_SYS_MOUNT_FSCONFIG
-+/*
-+ * glibc >= 2.36 linux/mount.h conflicts with sys/mount.h,
-+ * which in turn prevents use of linux/fs.h. So we have to
-+ * define the constants ourselves for now.
-+ */
-+#define FS_IOC_GETFLAGS_IOR('f', 1, long)
-+#define FS_IOC_SETFLAGS_IOW('f', 2, long)
-+#define FS_IOC_GETVERSION  _IOR('v', 1, long)
-+#define FS_IOC_SETVERSION  _IOW('v', 2, long)
-+#define FS_IOC_FIEMAP  _IOWR('f', 11, struct fiemap)
-+#define FS_IOC32_GETFLAGS  _IOR('f', 1, int)
-+#define FS_IOC32_SETFLAGS  _IOW('f', 2, int)
-+#define FS_IOC32_GETVERSION_IOR('v', 1, int)
-+#define FS_IOC32_SETVERSION_IOW('v', 2, int)
-+#else
- #include 
-+#endif
- #include 
- #if defined(CONFIG_FIEMAP)
- #include 
 a/meson.build
-+++ b/meson.build
-@@ -1686,6 +1686,8 @@ config_host_data.set('HAVE_OPTRESET',
-  cc.has_header_symbol('getopt.h', 'optreset'))
- config_host_data.set('HAVE_IPPROTO_MPTCP',
-  cc.has_header_symbol('netinet/in.h', 'IPPROTO_MPTCP'))
-+config_host_data.set('HAVE_SYS_MOUNT_FSCONFIG',
-+ cc.has_header_symbol('sys/mount.h', 'FSCONFIG_SET_FLAG'))
- 
- # has_member
- config_host_data.set('HAVE_SIGEV_NOTIFY_THREAD_ID',
-- 
2.34.1


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#183031): 
https://lists.openembedded.org/g/openembedded-core/message/183031
Mute This Topic: https://lists.openembedded.org/mt/99571614/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core][mickledore 07/24] psmisc: Set ALTERNATIVE for pstree to resolve conflict with busybox

2023-06-16 Thread Steve Sakoman
From: Frieder Schrempf 

If pstree in busybox is enabled there is a conflict with pstree from
psmisc resulting in:

  do_rootfs: Postinstall scriptlets of ['busybox'] have failed. If
  the intention is to defer them to first boot, then please place
  them into pkg_postinst_ontarget:${PN} ().
  Deferring to first boot via 'exit 1' is no longer supported.

And more detailed in do_rootfs.log:

  update-alternatives: Error: not linking [...]/rootfs/usr/bin/pstree to 
/bin/busybox.nosuid since [...]/rootfs/usr/bin/pstree exists and is not a link

On order to fix this set ALTERNATIVE:pstree accordingly.

Signed-off-by: Frieder Schrempf 
Signed-off-by: Alexandre Belloni 
Signed-off-by: Richard Purdie 
(cherry picked from commit deb2176df76dcb16c0d90072ad63d308a0ab1158)
Signed-off-by: Steve Sakoman 
---
 meta/recipes-extended/psmisc/psmisc.inc | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/meta/recipes-extended/psmisc/psmisc.inc 
b/meta/recipes-extended/psmisc/psmisc.inc
index a429c2ee96..23e98d21be 100644
--- a/meta/recipes-extended/psmisc/psmisc.inc
+++ b/meta/recipes-extended/psmisc/psmisc.inc
@@ -55,3 +55,5 @@ ALTERNATIVE_PRIORITY = "90"
 ALTERNATIVE:killall = "killall"
 
 ALTERNATIVE:fuser = "fuser"
+
+ALTERNATIVE:pstree = "pstree"
-- 
2.34.1


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#183028): 
https://lists.openembedded.org/g/openembedded-core/message/183028
Mute This Topic: https://lists.openembedded.org/mt/99571611/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core][mickledore 09/24] libx11: remove unused patch and FILESEXTRAPATHS

2023-06-16 Thread Steve Sakoman
From: Martin Jansa 

* 0001-fix-a-memory-leak-in-XRegisterIMInstantiateCallback.patch was removed
  from SRC_URI in:
  
https://git.openembedded.org/openembedded-core/commit/?id=e13f651f73db0f26f4645447ab5fa17e36d1903b

Signed-off-by: Martin Jansa 
Signed-off-by: Richard Purdie 
(cherry picked from commit ee37d9f05c047e1dd68e0cb47b809240d2f33835)
Signed-off-by: Steve Sakoman 
---
 ...ak-in-XRegisterIMInstantiateCallback.patch | 57 ---
 .../recipes-graphics/xorg-lib/libx11_1.8.4.bb |  6 +-
 2 files changed, 2 insertions(+), 61 deletions(-)
 delete mode 100644 
meta/recipes-graphics/xorg-lib/libx11/0001-fix-a-memory-leak-in-XRegisterIMInstantiateCallback.patch

diff --git 
a/meta/recipes-graphics/xorg-lib/libx11/0001-fix-a-memory-leak-in-XRegisterIMInstantiateCallback.patch
 
b/meta/recipes-graphics/xorg-lib/libx11/0001-fix-a-memory-leak-in-XRegisterIMInstantiateCallback.patch
deleted file mode 100644
index 722116c07e..00
--- 
a/meta/recipes-graphics/xorg-lib/libx11/0001-fix-a-memory-leak-in-XRegisterIMInstantiateCallback.patch
+++ /dev/null
@@ -1,57 +0,0 @@
-CVE: CVE-2022-3554
-Upstream-Status: Backport
-Signed-off-by: Ross Burton 
-
-From 1d11822601fd24a396b354fa616b04ed3df8b4ef Mon Sep 17 00:00:00 2001
-From: "Thomas E. Dickey" 
-Date: Tue, 4 Oct 2022 18:26:17 -0400
-Subject: [PATCH] fix a memory leak in XRegisterIMInstantiateCallback
-
-Analysis:
-
-_XimRegisterIMInstantiateCallback() opens an XIM and closes it using
-the internal function pointers, but the internal close function does
-not free the pointer to the XIM (this would be done in XCloseIM()).
-
-Report/patch:
-
-Date: Mon, 03 Oct 2022 18:47:32 +0800
-From: Po Lu 
-To: xorg-de...@lists.x.org
-Subject: Re: Yet another leak in Xlib
-
-For reference, here's how I'm calling XRegisterIMInstantiateCallback:
-
-XSetLocaleModifiers ("");
-XRegisterIMInstantiateCallback (compositor.display,
-XrmGetDatabase (compositor.display),
-(char *) compositor.resource_name,
-(char *) compositor.app_name,
-IMInstantiateCallback, NULL);
-
-and XMODIFIERS is:
-
-@im=ibus
-
-Signed-off-by: Thomas E. Dickey 

- modules/im/ximcp/imInsClbk.c | 3 +++
- 1 file changed, 3 insertions(+)
-
-diff --git a/modules/im/ximcp/imInsClbk.c b/modules/im/ximcp/imInsClbk.c
-index 95b379cb..c10e347f 100644
 a/modules/im/ximcp/imInsClbk.c
-+++ b/modules/im/ximcp/imInsClbk.c
-@@ -212,6 +212,9 @@ _XimRegisterIMInstantiateCallback(
- if( xim ) {
-   lock = True;
-   xim->methods->close( (XIM)xim );
-+  /* XIMs must be freed manually after being opened; close just
-+ does the protocol to deinitialize the IM.  */
-+  XFree( xim );
-   lock = False;
-   icb->call = True;
-   callback( display, client_data, NULL );
--- 
-2.34.1
-
diff --git a/meta/recipes-graphics/xorg-lib/libx11_1.8.4.bb 
b/meta/recipes-graphics/xorg-lib/libx11_1.8.4.bb
index 7831b4986a..9058c1844e 100644
--- a/meta/recipes-graphics/xorg-lib/libx11_1.8.4.bb
+++ b/meta/recipes-graphics/xorg-lib/libx11_1.8.4.bb
@@ -18,14 +18,12 @@ DEPENDS += "xorgproto \
 
 PROVIDES = "virtual/libx11"
 
-FILESEXTRAPATHS =. "${FILE_DIRNAME}/libx11:"
-
 PE = "1"
 
 XORG_PN = "libX11"
 
-SRC_URI += "file://disable_tests.patch \
-"
+SRC_URI += "file://disable_tests.patch"
+
 SRC_URI[sha256sum] = 
"c9a287a5aefa9804ce3cfafcf516fe96ed3f7e8e45c0e2ee59e84c86757df518"
 
 inherit gettext
-- 
2.34.1


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#183030): 
https://lists.openembedded.org/g/openembedded-core/message/183030
Mute This Topic: https://lists.openembedded.org/mt/99571613/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core][mickledore 08/24] systemd: Drop a backport

2023-06-16 Thread Steve Sakoman
From: Khem Raj 

This patch should have been dropped when upgrading to 253
since its already available upstream since then

Signed-off-by: Khem Raj 
Signed-off-by: Richard Purdie 
(cherry picked from commit 5b677b766280b39e8bf507d5aec4f08e49fd72a9)
Signed-off-by: Steve Sakoman 
---
 .../0007-Add-sys-stat.h-for-S_IFDIR.patch | 29 ---
 meta/recipes-core/systemd/systemd_253.1.bb|  1 -
 2 files changed, 30 deletions(-)
 delete mode 100644 
meta/recipes-core/systemd/systemd/0007-Add-sys-stat.h-for-S_IFDIR.patch

diff --git 
a/meta/recipes-core/systemd/systemd/0007-Add-sys-stat.h-for-S_IFDIR.patch 
b/meta/recipes-core/systemd/systemd/0007-Add-sys-stat.h-for-S_IFDIR.patch
deleted file mode 100644
index 479b9a1ca1..00
--- a/meta/recipes-core/systemd/systemd/0007-Add-sys-stat.h-for-S_IFDIR.patch
+++ /dev/null
@@ -1,29 +0,0 @@
-From 1480ef4ea9f71befbc22272c219b62ee5cd71d43 Mon Sep 17 00:00:00 2001
-From: Khem Raj 
-Date: Fri, 21 Jan 2022 15:17:37 -0800
-Subject: [PATCH] Add sys/stat.h for S_IFDIR
-
-../git/src/shared/mkdir-label.c:13:61: error: use of undeclared identifier 
'S_IFDIR'
-r = mac_selinux_create_file_prepare_at(dirfd, path, S_IFDIR);
-
-Upstream-Status: Backport [29b7114c5d9624002aa7c17748d960cd1e45362d]
-Signed-off-by: Khem Raj 

- src/shared/mkdir-label.c | 1 +
- 1 file changed, 1 insertion(+)
-
-diff --git a/src/shared/mkdir-label.c b/src/shared/mkdir-label.c
-index e3afc2b666..f1df778966 100644
 a/src/shared/mkdir-label.c
-+++ b/src/shared/mkdir-label.c
-@@ -7,6 +7,7 @@
- #include "selinux-util.h"
- #include "smack-util.h"
- #include "user-util.h"
-+#include 
- 
- int mkdirat_label(int dirfd, const char *path, mode_t mode) {
- int r;
--- 
-2.39.2
-
diff --git a/meta/recipes-core/systemd/systemd_253.1.bb 
b/meta/recipes-core/systemd/systemd_253.1.bb
index 9c2b96d3c1..f306765168 100644
--- a/meta/recipes-core/systemd/systemd_253.1.bb
+++ b/meta/recipes-core/systemd/systemd_253.1.bb
@@ -47,7 +47,6 @@ SRC_URI_MUSL = "\
file://0023-Handle-missing-gshadow.patch \

file://0024-missing_syscall.h-Define-MIPS-ABI-defines-for-musl.patch \
file://0005-pass-correct-parameters-to-getdents64.patch \
-   file://0007-Add-sys-stat.h-for-S_IFDIR.patch \
file://0001-Adjust-for-musl-headers.patch \

file://0006-test-bus-error-strerror-is-assumed-to-be-GNU-specifi.patch \
file://0003-errno-util-Make-STRERROR-portable-for-musl.patch \
-- 
2.34.1


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#183029): 
https://lists.openembedded.org/g/openembedded-core/message/183029
Mute This Topic: https://lists.openembedded.org/mt/99571612/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core][mickledore 05/24] bind: upgrade 9.18.13 -> 9.18.14

2023-06-16 Thread Steve Sakoman
From: Trevor Gamblin 

Stable branch update

Signed-off-by: Trevor Gamblin 
Signed-off-by: Alexandre Belloni 
Signed-off-by: Richard Purdie 
(cherry picked from commit 43c97c6e64c554f41a3a45241a7547bce21533e7)
Signed-off-by: Steve Sakoman 
---
 .../0001-avoid-start-failure-with-bind-user.patch   | 0
 .../0001-named-lwresd-V-and-start-log-hide-build-options.patch  | 0
 .../bind-ensure-searching-for-json-headers-searches-sysr.patch  | 0
 .../bind/{bind-9.18.13 => bind-9.18.14}/bind9   | 0
 .../bind/{bind-9.18.13 => bind-9.18.14}/conf.patch  | 0
 .../bind/{bind-9.18.13 => bind-9.18.14}/generate-rndc-key.sh| 0
 .../init.d-add-support-for-read-only-rootfs.patch   | 0
 .../make-etc-initd-bind-stop-work.patch | 0
 .../bind/{bind-9.18.13 => bind-9.18.14}/named.service   | 0
 .../bind/{bind_9.18.13.bb => bind_9.18.14.bb}   | 2 +-
 10 files changed, 1 insertion(+), 1 deletion(-)
 rename meta/recipes-connectivity/bind/{bind-9.18.13 => 
bind-9.18.14}/0001-avoid-start-failure-with-bind-user.patch (100%)
 rename meta/recipes-connectivity/bind/{bind-9.18.13 => 
bind-9.18.14}/0001-named-lwresd-V-and-start-log-hide-build-options.patch (100%)
 rename meta/recipes-connectivity/bind/{bind-9.18.13 => 
bind-9.18.14}/bind-ensure-searching-for-json-headers-searches-sysr.patch (100%)
 rename meta/recipes-connectivity/bind/{bind-9.18.13 => bind-9.18.14}/bind9 
(100%)
 rename meta/recipes-connectivity/bind/{bind-9.18.13 => 
bind-9.18.14}/conf.patch (100%)
 rename meta/recipes-connectivity/bind/{bind-9.18.13 => 
bind-9.18.14}/generate-rndc-key.sh (100%)
 rename meta/recipes-connectivity/bind/{bind-9.18.13 => 
bind-9.18.14}/init.d-add-support-for-read-only-rootfs.patch (100%)
 rename meta/recipes-connectivity/bind/{bind-9.18.13 => 
bind-9.18.14}/make-etc-initd-bind-stop-work.patch (100%)
 rename meta/recipes-connectivity/bind/{bind-9.18.13 => 
bind-9.18.14}/named.service (100%)
 rename meta/recipes-connectivity/bind/{bind_9.18.13.bb => bind_9.18.14.bb} 
(97%)

diff --git 
a/meta/recipes-connectivity/bind/bind-9.18.13/0001-avoid-start-failure-with-bind-user.patch
 
b/meta/recipes-connectivity/bind/bind-9.18.14/0001-avoid-start-failure-with-bind-user.patch
similarity index 100%
rename from 
meta/recipes-connectivity/bind/bind-9.18.13/0001-avoid-start-failure-with-bind-user.patch
rename to 
meta/recipes-connectivity/bind/bind-9.18.14/0001-avoid-start-failure-with-bind-user.patch
diff --git 
a/meta/recipes-connectivity/bind/bind-9.18.13/0001-named-lwresd-V-and-start-log-hide-build-options.patch
 
b/meta/recipes-connectivity/bind/bind-9.18.14/0001-named-lwresd-V-and-start-log-hide-build-options.patch
similarity index 100%
rename from 
meta/recipes-connectivity/bind/bind-9.18.13/0001-named-lwresd-V-and-start-log-hide-build-options.patch
rename to 
meta/recipes-connectivity/bind/bind-9.18.14/0001-named-lwresd-V-and-start-log-hide-build-options.patch
diff --git 
a/meta/recipes-connectivity/bind/bind-9.18.13/bind-ensure-searching-for-json-headers-searches-sysr.patch
 
b/meta/recipes-connectivity/bind/bind-9.18.14/bind-ensure-searching-for-json-headers-searches-sysr.patch
similarity index 100%
rename from 
meta/recipes-connectivity/bind/bind-9.18.13/bind-ensure-searching-for-json-headers-searches-sysr.patch
rename to 
meta/recipes-connectivity/bind/bind-9.18.14/bind-ensure-searching-for-json-headers-searches-sysr.patch
diff --git a/meta/recipes-connectivity/bind/bind-9.18.13/bind9 
b/meta/recipes-connectivity/bind/bind-9.18.14/bind9
similarity index 100%
rename from meta/recipes-connectivity/bind/bind-9.18.13/bind9
rename to meta/recipes-connectivity/bind/bind-9.18.14/bind9
diff --git a/meta/recipes-connectivity/bind/bind-9.18.13/conf.patch 
b/meta/recipes-connectivity/bind/bind-9.18.14/conf.patch
similarity index 100%
rename from meta/recipes-connectivity/bind/bind-9.18.13/conf.patch
rename to meta/recipes-connectivity/bind/bind-9.18.14/conf.patch
diff --git a/meta/recipes-connectivity/bind/bind-9.18.13/generate-rndc-key.sh 
b/meta/recipes-connectivity/bind/bind-9.18.14/generate-rndc-key.sh
similarity index 100%
rename from meta/recipes-connectivity/bind/bind-9.18.13/generate-rndc-key.sh
rename to meta/recipes-connectivity/bind/bind-9.18.14/generate-rndc-key.sh
diff --git 
a/meta/recipes-connectivity/bind/bind-9.18.13/init.d-add-support-for-read-only-rootfs.patch
 
b/meta/recipes-connectivity/bind/bind-9.18.14/init.d-add-support-for-read-only-rootfs.patch
similarity index 100%
rename from 
meta/recipes-connectivity/bind/bind-9.18.13/init.d-add-support-for-read-only-rootfs.patch
rename to 
meta/recipes-connectivity/bind/bind-9.18.14/init.d-add-support-for-read-only-rootfs.patch
diff --git 
a/meta/recipes-connectivity/bind/bind-9.18.13/make-etc-initd-bind-stop-work.patch
 
b/meta/recipes-connectivity/bind/bind-9.18.14/make-etc-initd-bind-stop-work.patch
similarity index 100%
rename from 

[OE-core][mickledore 06/24] openssl: upgrade 3.1.0 -> 3.1.1

2023-06-16 Thread Steve Sakoman
From: Tim Orling 

* Drop CVE-2023-0464.patch (merged upstream).
* Refresh 0001-Configure-do-not-tweak-mips-cflags.patch

https://github.com/openssl/openssl/blob/openssl-3.1.1/NEWS.md

Major changes between OpenSSL 3.1.0 and OpenSSL 3.1.1 [30 May 2023]

* Mitigate for very slow OBJ_obj2txt() performance with gigantic OBJECT 
IDENTIFIER sub-identities. (CVE-2023-2650)
* Fixed buffer overread in AES-XTS decryption on ARM 64 bit platforms 
(CVE-2023-1255)
* Fixed documentation of X509_VERIFY_PARAM_add0_policy() (CVE-2023-0466)
* Fixed handling of invalid certificate policies in leaf certificates 
(CVE-2023-0465)
* Limited the number of nodes created in a policy tree (CVE-2023-0464)

Security Advisory:
https://www.openssl.org/news/secadv/20230530.txt

CVE: CVE-2023-2650
CVE: CVE-2023-1255
CVE: CVE-2023-0466
CVE: CVE-2023-0465
CVE: CVE-2023-0464

Signed-off-by: Tim Orling 
Signed-off-by: Alexandre Belloni 
Signed-off-by: Richard Purdie 
(cherry picked from commit 26ce9a5fd31c27812ce8784a398b600cc0e9aa80)
Signed-off-by: Steve Sakoman 
---
 ...1-Configure-do-not-tweak-mips-cflags.patch |  19 +-
 .../openssl/openssl/CVE-2023-0464.patch   | 226 --
 .../{openssl_3.1.0.bb => openssl_3.1.1.bb}|   3 +-
 3 files changed, 12 insertions(+), 236 deletions(-)
 delete mode 100644 
meta/recipes-connectivity/openssl/openssl/CVE-2023-0464.patch
 rename meta/recipes-connectivity/openssl/{openssl_3.1.0.bb => 
openssl_3.1.1.bb} (98%)

diff --git 
a/meta/recipes-connectivity/openssl/openssl/0001-Configure-do-not-tweak-mips-cflags.patch
 
b/meta/recipes-connectivity/openssl/openssl/0001-Configure-do-not-tweak-mips-cflags.patch
index 0b7abc3a11..502a7aaf32 100644
--- 
a/meta/recipes-connectivity/openssl/openssl/0001-Configure-do-not-tweak-mips-cflags.patch
+++ 
b/meta/recipes-connectivity/openssl/openssl/0001-Configure-do-not-tweak-mips-cflags.patch
@@ -1,6 +1,6 @@
-From 326909baf81a638d51fa8be1d8227518784f5cc4 Mon Sep 17 00:00:00 2001
+From 0377f0d5b5c1079e3b9a80881f4dcc891cbe9f9a Mon Sep 17 00:00:00 2001
 From: Alexander Kanavin 
-Date: Tue, 14 Sep 2021 12:18:25 +0200
+Date: Tue, 30 May 2023 09:11:27 -0700
 Subject: [PATCH] Configure: do not tweak mips cflags
 
 This conflicts with mips machine definitons from yocto,
@@ -9,20 +9,23 @@ e.g.
 
 Upstream-Status: Inappropriate [oe-core specific]
 Signed-off-by: Alexander Kanavin 
+
+Refreshed for openssl-3.1.1
+Signed-off-by: Tim Orling 
 ---
  Configure | 10 --
  1 file changed, 10 deletions(-)
 
-Index: openssl-3.0.4/Configure
-===
 openssl-3.0.4.orig/Configure
-+++ openssl-3.0.4/Configure
-@@ -1423,16 +1423,6 @@ if ($target =~ /^mingw/ && `$config{CC}
+diff --git a/Configure b/Configure
+index 4569952..adf019b 100755
+--- a/Configure
 b/Configure
+@@ -1422,16 +1422,6 @@ if ($target =~ /^mingw/ && `$config{CC} --target-help 
2>&1` =~ m/-mno-cygwin/m)
  push @{$config{shared_ldflag}}, "-mno-cygwin";
  }
  
 -if ($target =~ /linux.*-mips/ && !$disabled{asm}
--&& !grep { $_ !~ /-m(ips|arch=)/ } (@{$config{CFLAGS}})) {
+-&& !grep { $_ =~ /-m(ips|arch=)/ } (@{$config{CFLAGS}})) {
 -# minimally required architecture flags for assembly modules
 -my $value;
 -$value = '-mips2' if ($target =~ /mips32/);
diff --git a/meta/recipes-connectivity/openssl/openssl/CVE-2023-0464.patch 
b/meta/recipes-connectivity/openssl/openssl/CVE-2023-0464.patch
deleted file mode 100644
index 33b0bb6c79..00
--- a/meta/recipes-connectivity/openssl/openssl/CVE-2023-0464.patch
+++ /dev/null
@@ -1,226 +0,0 @@
-From 2017771e2db3e2b96f89bbe8766c3209f6a99545 Mon Sep 17 00:00:00 2001
-From: Pauli 
-Date: Wed, 8 Mar 2023 15:28:20 +1100
-Subject: [PATCH] x509: excessive resource use verifying policy constraints
-
-A security vulnerability has been identified in all supported versions
-of OpenSSL related to the verification of X.509 certificate chains
-that include policy constraints.  Attackers may be able to exploit this
-vulnerability by creating a malicious certificate chain that triggers
-exponential use of computational resources, leading to a denial-of-service
-(DoS) attack on affected systems.
-
-Fixes CVE-2023-0464
-
-Reviewed-by: Tomas Mraz 
-Reviewed-by: Shane Lontis 
-(Merged from https://github.com/openssl/openssl/pull/20570)
-
-Upstream-Status: Backport from 
[https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2017771e2db3e2b96f89bbe8766c3209f6a99545]
-CVE: CVE-2023-0464
-Signed-off-by: Siddharth Doshi 
-

- crypto/x509/pcy_local.h |  8 +++-
- crypto/x509/pcy_node.c  | 12 +---
- crypto/x509/pcy_tree.c  | 36 ++--
- 3 files changed, 42 insertions(+), 14 deletions(-)
-
-diff --git a/crypto/x509/pcy_local.h b/crypto/x509/pcy_local.h
-index 18b53cc..cba107c 100644
 a/crypto/x509/pcy_local.h
-+++ b/crypto/x509/pcy_local.h
-@@ -111,6 +111,11 @@ struct X509_POLICY_LEVEL_st {
- };
- 
- struct 

[OE-core][mickledore 03/24] ell: upgrade 0.56 -> 0.57

2023-06-16 Thread Steve Sakoman
From: Markus Volk 

ver 0.57:
Fix issue with handling Generic Netlink cancel requests.

ell 0.57 is required for iwd 2.5

Signed-off-by: Markus Volk 
Signed-off-by: Richard Purdie 
(cherry picked from commit f13fe33403f077802640e70a84596546d555c3b9)
Signed-off-by: Steve Sakoman 
---
 meta/recipes-core/ell/{ell_0.56.bb => ell_0.57.bb} | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)
 rename meta/recipes-core/ell/{ell_0.56.bb => ell_0.57.bb} (89%)

diff --git a/meta/recipes-core/ell/ell_0.56.bb 
b/meta/recipes-core/ell/ell_0.57.bb
similarity index 89%
rename from meta/recipes-core/ell/ell_0.56.bb
rename to meta/recipes-core/ell/ell_0.57.bb
index 0ace622835..09a0831fbe 100644
--- a/meta/recipes-core/ell/ell_0.56.bb
+++ b/meta/recipes-core/ell/ell_0.57.bb
@@ -15,7 +15,7 @@ DEPENDS = "dbus"
 inherit autotools pkgconfig
 
 SRC_URI = 
"https://mirrors.edge.kernel.org/pub/linux/libs/${BPN}/${BPN}-${PV}.tar.xz;
-SRC_URI[sha256sum] = 
"58eb8b2b64087f7479d5db6a830a0656c536d93e5f11d4c9a4443ce8760a1b63"
+SRC_URI[sha256sum] = 
"7603928ee584b758ca27c67e4dc513049a09b038d7d28459a9440f8443c91018"
 
 do_configure:prepend () {
 mkdir -p ${S}/build-aux
-- 
2.34.1


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#183024): 
https://lists.openembedded.org/g/openembedded-core/message/183024
Mute This Topic: https://lists.openembedded.org/mt/99571601/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core][mickledore 04/24] busybox: 1.36.0 -> 1.36.1

2023-06-16 Thread Steve Sakoman
From: Andrej Valek 

Bug fix release. 1.36.1 has fixes for line editing, detection of hardware
sha1/sha256 support, unzip (do not create suid/sgid files unless -K),
shell (printf and sleep with no args, handing of SIGINT in sleep), ed.

- regression on x86 is still in place

Signed-off-by: Andrej Valek 
Signed-off-by: Richard Purdie 
(cherry picked from commit 09c5499f5885662a55a8810078e7208a1696b29f)
Signed-off-by: Steve Sakoman 
---
 .../{busybox-inittab_1.36.0.bb => busybox-inittab_1.36.1.bb}| 0
 .../busybox/{busybox_1.36.0.bb => busybox_1.36.1.bb}| 2 +-
 2 files changed, 1 insertion(+), 1 deletion(-)
 rename meta/recipes-core/busybox/{busybox-inittab_1.36.0.bb => 
busybox-inittab_1.36.1.bb} (100%)
 rename meta/recipes-core/busybox/{busybox_1.36.0.bb => busybox_1.36.1.bb} (96%)

diff --git a/meta/recipes-core/busybox/busybox-inittab_1.36.0.bb 
b/meta/recipes-core/busybox/busybox-inittab_1.36.1.bb
similarity index 100%
rename from meta/recipes-core/busybox/busybox-inittab_1.36.0.bb
rename to meta/recipes-core/busybox/busybox-inittab_1.36.1.bb
diff --git a/meta/recipes-core/busybox/busybox_1.36.0.bb 
b/meta/recipes-core/busybox/busybox_1.36.1.bb
similarity index 96%
rename from meta/recipes-core/busybox/busybox_1.36.0.bb
rename to meta/recipes-core/busybox/busybox_1.36.1.bb
index 8014a5c7bf..968dce65e4 100644
--- a/meta/recipes-core/busybox/busybox_1.36.0.bb
+++ b/meta/recipes-core/busybox/busybox_1.36.1.bb
@@ -53,4 +53,4 @@ SRC_URI = 
"https://busybox.net/downloads/busybox-${PV}.tar.bz2;name=tarball \
 SRC_URI:append:libc-musl = " file://musl.cfg "
 # TODO http://lists.busybox.net/pipermail/busybox/2023-January/090078.html
 SRC_URI:append:x86 = " file://sha_accel.cfg"
-SRC_URI[tarball.sha256sum] = 
"542750c8af7cb2630e201780b4f99f3dcceeb06f505b479ec68241c1e6af61a5"
+SRC_URI[tarball.sha256sum] = 
"b8cc24c9574d809e7279c3be349795c5d5ceb6fdf19ca709f80cde50e47de314"
-- 
2.34.1


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#183025): 
https://lists.openembedded.org/g/openembedded-core/message/183025
Mute This Topic: https://lists.openembedded.org/mt/99571603/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core][mickledore 02/24] tiff: backport a fix for CVE-2023-2731

2023-06-16 Thread Steve Sakoman
From: Natasha Bailey 

This patch fixes an issue in libtiff's LZWDecode function which could cause a 
null pointer dereference.

Signed-off-by: Natasha Bailey 
Signed-off-by: Randy MacLeod 
Signed-off-by: Alexandre Belloni 
Signed-off-by: Richard Purdie 
(cherry picked from commit 7da5abf23232f61bf8009b4b8e97632768867e07)
Signed-off-by: Steve Sakoman 
---
 .../libtiff/files/CVE-2023-2731.patch | 39 +++
 meta/recipes-multimedia/libtiff/tiff_4.5.0.bb |  4 +-
 2 files changed, 42 insertions(+), 1 deletion(-)
 create mode 100644 meta/recipes-multimedia/libtiff/files/CVE-2023-2731.patch

diff --git a/meta/recipes-multimedia/libtiff/files/CVE-2023-2731.patch 
b/meta/recipes-multimedia/libtiff/files/CVE-2023-2731.patch
new file mode 100644
index 00..7db0a35f72
--- /dev/null
+++ b/meta/recipes-multimedia/libtiff/files/CVE-2023-2731.patch
@@ -0,0 +1,39 @@
+From 9be22b639ea69e102d3847dca4c53ef025e9527b Mon Sep 17 00:00:00 2001
+From: Even Rouault 
+Date: Sat, 29 Apr 2023 12:20:46 +0200
+Subject: [PATCH] LZWDecode(): avoid crash when trying to read again from a
+ strip whith a missing end-of-information marker (fixes #548)
+
+CVE: CVE-2023-2731
+Upstream-Status: Backport 
[https://gitlab.com/libtiff/libtiff/-/commit/9be22b639ea69e102d3847dca4c53ef025e9527b]
+
+---
+ libtiff/tif_lzw.c | 5 +
+ 1 file changed, 5 insertions(+)
+
+diff --git a/libtiff/tif_lzw.c b/libtiff/tif_lzw.c
+index ba75a07e..d631fa10 100644
+--- a/libtiff/tif_lzw.c
 b/libtiff/tif_lzw.c
+@@ -423,6 +423,10 @@ static int LZWDecode(TIFF *tif, uint8_t *op0, tmsize_t 
occ0, uint16_t s)
+ 
+ if (sp->read_error)
+ {
++TIFFErrorExtR(tif, module,
++  "LZWDecode: Scanline %" PRIu32 " cannot be read due to "
++  "previous error",
++  tif->tif_row);
+ return 0;
+ }
+ 
+@@ -742,6 +746,7 @@ after_loop:
+ return (1);
+ 
+ no_eoi:
++sp->read_error = 1;
+ TIFFErrorExtR(tif, module,
+   "LZWDecode: Strip %" PRIu32 " not terminated with EOI code",
+   tif->tif_curstrip);
+-- 
+2.34.1
+
diff --git a/meta/recipes-multimedia/libtiff/tiff_4.5.0.bb 
b/meta/recipes-multimedia/libtiff/tiff_4.5.0.bb
index f8a2482a84..ca4a3eff91 100644
--- a/meta/recipes-multimedia/libtiff/tiff_4.5.0.bb
+++ b/meta/recipes-multimedia/libtiff/tiff_4.5.0.bb
@@ -9,7 +9,9 @@ LIC_FILES_CHKSUM = 
"file://LICENSE.md;md5=a3e32d664d6db1386b4689c8121531c3"
 CVE_PRODUCT = "libtiff"
 
 SRC_URI = "http://download.osgeo.org/libtiff/tiff-${PV}.tar.gz \
-   file://CVE-2022-48281.patch"
+   file://CVE-2022-48281.patch \
+   file://CVE-2023-2731.patch \
+"
 
 SRC_URI[sha256sum] = 
"c7a1d9296649233979fa3eacffef3fa024d73d05d589cb622727b5b08c423464"
 
-- 
2.34.1


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#183023): 
https://lists.openembedded.org/g/openembedded-core/message/183023
Mute This Topic: https://lists.openembedded.org/mt/99571598/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core][mickledore 01/24] curl: fix CVE-2023-28319 through CVE-2023-28322

2023-06-16 Thread Steve Sakoman
From: Mingli Yu 

Backport patches to fix the below CVEs:
  CVE-2023-28319
  CVE-2023-28320
  CVE-2023-28321
  CVE-2023-28322

Signed-off-by: Mingli Yu 
Signed-off-by: Steve Sakoman 
---
 .../curl/curl/CVE-2023-28319.patch|  38 ++
 .../curl/curl/CVE-2023-28320.patch|  88 
 .../curl/curl/CVE-2023-28321.patch| 111 +
 .../curl/curl/CVE-2023-28322.patch| 441 ++
 meta/recipes-support/curl/curl_8.0.1.bb   |   4 +
 5 files changed, 682 insertions(+)
 create mode 100644 meta/recipes-support/curl/curl/CVE-2023-28319.patch
 create mode 100644 meta/recipes-support/curl/curl/CVE-2023-28320.patch
 create mode 100644 meta/recipes-support/curl/curl/CVE-2023-28321.patch
 create mode 100644 meta/recipes-support/curl/curl/CVE-2023-28322.patch

diff --git a/meta/recipes-support/curl/curl/CVE-2023-28319.patch 
b/meta/recipes-support/curl/curl/CVE-2023-28319.patch
new file mode 100644
index 00..c843a18174
--- /dev/null
+++ b/meta/recipes-support/curl/curl/CVE-2023-28319.patch
@@ -0,0 +1,38 @@
+From 8e21b1a05f3c0ee098dbcb6c3d84cb61f102a122 Mon Sep 17 00:00:00 2001
+From: Daniel Stenberg 
+Date: Mon, 8 May 2023 14:33:54 +0200
+Subject: [PATCH] libssh2: free fingerprint better
+
+Reported-by: Wei Chong Tan
+Closes #11088
+
+CVE: CVE-2023-28319
+
+Upstream-Status: Backport 
[https://github.com/curl/curl/commit/8e21b1a05f3c0ee098dbcb6c]
+
+Signed-off-by: Mingli Yu 
+
+---
+ lib/vssh/libssh2.c | 3 +--
+ 1 file changed, 1 insertion(+), 2 deletions(-)
+
+diff --git a/lib/vssh/libssh2.c b/lib/vssh/libssh2.c
+index bfcc94e16..dd39a844c 100644
+--- a/lib/vssh/libssh2.c
 b/lib/vssh/libssh2.c
+@@ -728,11 +728,10 @@ static CURLcode ssh_check_fingerprint(struct Curl_easy 
*data)
+  */
+ if((pub_pos != b64_pos) ||
+strncmp(fingerprint_b64, pubkey_sha256, pub_pos)) {
+-  free(fingerprint_b64);
+-
+   failf(data,
+ "Denied establishing ssh session: mismatch sha256 fingerprint. "
+ "Remote %s is not equal to %s", fingerprint_b64, pubkey_sha256);
++  free(fingerprint_b64);
+   state(data, SSH_SESSION_FREE);
+   sshc->actualcode = CURLE_PEER_FAILED_VERIFICATION;
+   return sshc->actualcode;
+-- 
+2.25.1
+
diff --git a/meta/recipes-support/curl/curl/CVE-2023-28320.patch 
b/meta/recipes-support/curl/curl/CVE-2023-28320.patch
new file mode 100644
index 00..c7cfd6a42f
--- /dev/null
+++ b/meta/recipes-support/curl/curl/CVE-2023-28320.patch
@@ -0,0 +1,88 @@
+From 13718030ad4b3209a7583b4f27f683cd3a6fa5f2 Mon Sep 17 00:00:00 2001
+From: Harry Sintonen 
+Date: Tue, 25 Apr 2023 09:22:26 +0200
+Subject: [PATCH] hostip: add locks around use of global buffer for alarm()
+
+When building with the sync name resolver and timeout ability we now
+require thread-safety to be present to enable it.
+
+Closes #11030
+
+CVE: CVE-2023-28320
+
+Upstream-Status: Backport 
[https://github.com/curl/curl/commit/13718030ad4b3209a7583b]
+
+Signed-off-by: Mingli Yu 
+---
+ lib/hostip.c | 19 +++
+ 1 file changed, 15 insertions(+), 4 deletions(-)
+
+diff --git a/lib/hostip.c b/lib/hostip.c
+index 2381290fd..e410cda69 100644
+--- a/lib/hostip.c
 b/lib/hostip.c
+@@ -70,12 +70,19 @@
+ #include 
+ #endif
+ 
+-#if defined(CURLRES_SYNCH) && \
+-defined(HAVE_ALARM) && defined(SIGALRM) && defined(HAVE_SIGSETJMP)
++#if defined(CURLRES_SYNCH) &&   \
++  defined(HAVE_ALARM) &&\
++  defined(SIGALRM) &&   \
++  defined(HAVE_SIGSETJMP) &&\
++  defined(GLOBAL_INIT_IS_THREADSAFE)
+ /* alarm-based timeouts can only be used with all the dependencies satisfied 
*/
+ #define USE_ALARM_TIMEOUT
+ #endif
+ 
++#ifdef USE_ALARM_TIMEOUT
++#include "easy_lock.h"
++#endif
++
+ #define MAX_HOSTCACHE_LEN (255 + 7) /* max FQDN + colon + port number + zero 
*/
+ 
+ /*
+@@ -254,11 +261,12 @@ void Curl_hostcache_prune(struct Curl_easy *data)
+ Curl_share_unlock(data, CURL_LOCK_DATA_DNS);
+ }
+ 
+-#ifdef HAVE_SIGSETJMP
++#ifdef USE_ALARM_TIMEOUT
+ /* Beware this is a global and unique instance. This is used to store the
+return address that we can jump back to from inside a signal handler. This
+is not thread-safe stuff. */
+ sigjmp_buf curl_jmpenv;
++curl_simple_lock curl_jmpenv_lock;
+ #endif
+ 
+ /* lookup address, returns entry if found and not stale */
+@@ -832,7 +840,6 @@ enum resolve_t Curl_resolv(struct Curl_easy *data,
+ static
+ void alarmfunc(int sig)
+ {
+-  /* this is for "-ansi -Wall -pedantic" to stop complaining!   (rabe) */
+   (void)sig;
+   siglongjmp(curl_jmpenv, 1);
+ }
+@@ -912,6 +919,8 @@ enum resolve_t Curl_resolv_timeout(struct Curl_easy *data,
+  This should be the last thing we do before calling Curl_resolv(),
+  as otherwise we'd have to worry about variables that get modified
+  before we invoke Curl_resolv() (and thus use "volatile"). */
++  curl_simple_lock_lock(_jmpenv_lock);
++
+   

[OE-core][mickledore 00/24] Patch review

2023-06-16 Thread Steve Sakoman
Please review this set of changes for mickledore and have comments back by
end of day Tuesday.

Passed a-full on autobuilder:

https://autobuilder.yoctoproject.org/typhoon/#/builders/83/builds/5474

except for the meta-virtualization test, which failed due to the busybox
bug fix version update in this patch series.  A version update to a bbappend
recipe will be required and the maintainer has been notified.

The following changes since commit a24b257189e83ce4cd073acb3e31591d31dfa5b1:

  uninative: Upgrade to 4.0 to include latest gcc 13.1.1 (2023-06-08 16:22:12 
-1000)

are available in the Git repository at:

  https://git.openembedded.org/openembedded-core-contrib stable/mickledore-nut
  
http://cgit.openembedded.org/openembedded-core-contrib/log/?h=stable/mickledore-nut

Alexander Kanavin (4):
  maintaines.inc: unassign Richard Weinberger from erofs-utils entry
  maintainers.inc: unassign Andreas Müller from itstool entry
  maintainers.inc: unassign Pascal Bach from cmake entry
  maintainers.inc: correct unassigned entries

Andrej Valek (1):
  busybox: 1.36.0 -> 1.36.1

Chen Qi (1):
  cmake.bbclass: do not search host paths for find_program()

Frieder Schrempf (1):
  psmisc: Set ALTERNATIVE for pstree to resolve conflict with busybox

Ian Ray (1):
  systemd-systemctl: support instance expansion in WantedBy

Kai Kang (1):
  pm-utils: fix multilib conflictions

Khem Raj (2):
  systemd: Drop a backport
  perf: Make built-in libtraceevent plugins cohabit with external
libtraceevent

Marc Ferland (1):
  connman: fix warning by specifying runstatedir at configure time

Markus Volk (1):
  ell: upgrade 0.56 -> 0.57

Martin Jansa (6):
  libx11: remove unused patch and FILESEXTRAPATHS
  qemu: remove unused qemu-7.0.0-glibc-2.36.patch
  minicom: remove unused patch files
  inetutils: remove unused patch files
  libgloss: remove unused patch file
  kmod: remove unused ptest.patch

Mingli Yu (1):
  curl: fix CVE-2023-28319 through CVE-2023-28322

Natasha Bailey (1):
  tiff: backport a fix for CVE-2023-2731

Richard Purdie (1):
  selftest/license: Exclude from world

Tim Orling (1):
  openssl: upgrade 3.1.0 -> 3.1.1

Trevor Gamblin (1):
  bind: upgrade 9.18.13 -> 9.18.14

 .../license/incompatible-license-alias.bb |   2 +
 .../license/incompatible-license.bb   |   2 +
 .../license/incompatible-licenses.bb  |   2 +
 .../license/incompatible-nonspdx-license.bb   |   2 +
 meta/classes-recipe/cmake.bbclass |   1 -
 meta/conf/distro/include/maintainers.inc  |  16 +-
 meta/recipes-bsp/pm-utils/pm-utils_1.4.1.bb   |   5 +-
 ...1-avoid-start-failure-with-bind-user.patch |   0
 ...d-V-and-start-log-hide-build-options.patch |   0
 ...ching-for-json-headers-searches-sysr.patch |   0
 .../bind/{bind-9.18.13 => bind-9.18.14}/bind9 |   0
 .../{bind-9.18.13 => bind-9.18.14}/conf.patch |   0
 .../generate-rndc-key.sh  |   0
 ...t.d-add-support-for-read-only-rootfs.patch |   0
 .../make-etc-initd-bind-stop-work.patch   |   0
 .../named.service |   0
 .../bind/{bind_9.18.13.bb => bind_9.18.14.bb} |   2 +-
 meta/recipes-connectivity/connman/connman.inc |   1 +
 ...-multiple-definitions-of-errcatch-an.patch |  58 ---
 .../inetutils/fix-buffer-fortify-tfpt.patch   |  25 -
 ...1-Configure-do-not-tweak-mips-cflags.patch |  19 +-
 .../openssl/openssl/CVE-2023-0464.patch   | 226 -
 .../{openssl_3.1.0.bb => openssl_3.1.1.bb}|   3 +-
 ...ab_1.36.0.bb => busybox-inittab_1.36.1.bb} |   0
 .../{busybox_1.36.0.bb => busybox_1.36.1.bb}  |   2 +-
 .../ell/{ell_0.56.bb => ell_0.57.bb}  |   2 +-
 .../libgloss/fix_makefile_include_arm_h.patch |  30 --
 .../systemd/systemd-systemctl/systemctl   |   9 +-
 .../0007-Add-sys-stat.h-for-S_IFDIR.patch |  29 --
 meta/recipes-core/systemd/systemd_253.1.bb|   1 -
 .../qemu/qemu/qemu-7.0.0-glibc-2.36.patch |  46 --
 ...erfluous-global-variable-definitions.patch |  35 --
 ...erfluous-global-variable-definitions.patch |  37 --
 ...erfluous-global-variable-definitions.patch |  42 --
 meta/recipes-extended/psmisc/psmisc.inc   |   2 +
 ...ak-in-XRegisterIMInstantiateCallback.patch |  57 ---
 .../recipes-graphics/xorg-lib/libx11_1.8.4.bb |   6 +-
 meta/recipes-kernel/kmod/kmod/ptest.patch |  25 -
 meta/recipes-kernel/perf/perf.bb  |   6 +-
 .../libtiff/files/CVE-2023-2731.patch |  39 ++
 meta/recipes-multimedia/libtiff/tiff_4.5.0.bb |   4 +-
 .../curl/curl/CVE-2023-28319.patch|  38 ++
 .../curl/curl/CVE-2023-28320.patch|  88 
 .../curl/curl/CVE-2023-28321.patch| 111 +
 .../curl/curl/CVE-2023-28322.patch| 441 ++
 meta/recipes-support/curl/curl_8.0.1.bb   |   4 +
 46 files changed, 771 insertions(+), 647 deletions(-)
 rename meta/recipes-connectivity/bind/{bind-9.18.13 => 
bind-9.18.14}/0001-avoid-start-failure-with-bind-user.patch (100%)
 rename 

Re: [OE-core] [PATCH 1/5] kernel: Add kernel specific STRIP variable

2023-06-16 Thread Bruce Ashfield
On Fri, Jun 16, 2023 at 4:31 AM Khem Raj  wrote:
>
> strip can be coming from binutils or from llvm
> in some cases llvm-strip can fail on kernel
>
> Subprocess output:aarch64-yoe-linux-llvm-strip: error: Link field value 28 in 
> section .rela.dyn is not a symbol table
>
> This helps in selecting which strip is used when building kernel
>

It is annoying that we've ended up with so many places that we call
into the kernel build.

And of course, the variables we set aren't consistent.

I've had a TODO to see if it can be cleaned up, maybe that's my summer
stretch goal.

But of course, not anything to do with this change .. the actual
commit looks fine to me.

Bruce

> Signed-off-by: Khem Raj 
> Cc: Bruce Ashfield 
> ---
>  meta/classes-recipe/kernel-arch.bbclass| 3 +++
>  meta/classes-recipe/kernel-devicetree.bbclass  | 2 +-
>  meta/classes-recipe/kernel-yocto.bbclass   | 4 +++-
>  meta/classes-recipe/kernel.bbclass | 6 +-
>  meta/classes-recipe/module.bbclass | 7 +++
>  .../make-mod-scripts/make-mod-scripts_1.0.bb   | 1 +
>  meta/recipes-kernel/systemtap/systemtap-uprobes_git.bb | 2 ++
>  7 files changed, 22 insertions(+), 3 deletions(-)
>
> diff --git a/meta/classes-recipe/kernel-arch.bbclass 
> b/meta/classes-recipe/kernel-arch.bbclass
> index 58770489167..6e19dbbba89 100644
> --- a/meta/classes-recipe/kernel-arch.bbclass
> +++ b/meta/classes-recipe/kernel-arch.bbclass
> @@ -70,10 +70,13 @@ TARGET_AR_KERNEL_ARCH ?= ""
>  HOST_AR_KERNEL_ARCH ?= "${TARGET_AR_KERNEL_ARCH}"
>  TARGET_OBJCOPY_KERNEL_ARCH ?= ""
>  HOST_OBJCOPY_KERNEL_ARCH ?= "${TARGET_OBJCOPY_KERNEL_ARCH}"
> +TARGET_STRIP_KERNEL_ARCH ?= ""
> +HOST_STRIP_KERNEL_ARCH ?= "${TARGET_STRIP_KERNEL_ARCH}"
>
>  KERNEL_CC = "${CCACHE}${HOST_PREFIX}gcc ${HOST_CC_KERNEL_ARCH} -fuse-ld=bfd 
> ${DEBUG_PREFIX_MAP} 
> -fdebug-prefix-map=${STAGING_KERNEL_DIR}=${KERNEL_SRC_PATH} 
> -fdebug-prefix-map=${STAGING_KERNEL_BUILDDIR}=${KERNEL_SRC_PATH}"
>  KERNEL_LD = "${CCACHE}${HOST_PREFIX}ld.bfd ${HOST_LD_KERNEL_ARCH}"
>  KERNEL_AR = "${CCACHE}${HOST_PREFIX}ar ${HOST_AR_KERNEL_ARCH}"
>  KERNEL_OBJCOPY = "${CCACHE}${HOST_PREFIX}objcopy ${HOST_OBJCOPY_KERNEL_ARCH}"
> +KERNEL_STRIP = "${CCACHE}${HOST_PREFIX}strip ${HOST_STRIP_KERNEL_ARCH}"
>  TOOLCHAIN ?= "gcc"
>
> diff --git a/meta/classes-recipe/kernel-devicetree.bbclass 
> b/meta/classes-recipe/kernel-devicetree.bbclass
> index 7ccf4b76c82..eff052b4029 100644
> --- a/meta/classes-recipe/kernel-devicetree.bbclass
> +++ b/meta/classes-recipe/kernel-devicetree.bbclass
> @@ -73,7 +73,7 @@ do_compile:append() {
>
> for dtbf in ${KERNEL_DEVICETREE}; do
> dtb=`normalize_dtb "$dtbf"`
> -   oe_runmake $dtb CC="${KERNEL_CC} $cc_extra " 
> LD="${KERNEL_LD}" OBJCOPY="${KERNEL_OBJCOPY}" ${KERNEL_EXTRA_ARGS}
> +   oe_runmake $dtb CC="${KERNEL_CC} $cc_extra " 
> LD="${KERNEL_LD}" OBJCOPY="${KERNEL_OBJCOPY}" STRIP="${KERNEL_STRIP}" 
> ${KERNEL_EXTRA_ARGS}
> done
>  }
>
> diff --git a/meta/classes-recipe/kernel-yocto.bbclass 
> b/meta/classes-recipe/kernel-yocto.bbclass
> index ceb451b6996..3f2ce17aeb8 100644
> --- a/meta/classes-recipe/kernel-yocto.bbclass
> +++ b/meta/classes-recipe/kernel-yocto.bbclass
> @@ -447,7 +447,7 @@ do_kernel_configme() {
> bbfatal_log "Could not find configuration queue 
> (${meta_dir}/config.queue)"
> fi
>
> -   CFLAGS="${CFLAGS} ${TOOLCHAIN_OPTIONS}" HOSTCC="${BUILD_CC} 
> ${BUILD_CFLAGS} ${BUILD_LDFLAGS}" HOSTCPP="${BUILD_CPP}" CC="${KERNEL_CC}" 
> LD="${KERNEL_LD}" OBJCOPY="${KERNEL_OBJCOPY}" ARCH=${ARCH} merge_config.sh -O 
> ${B} ${config_flags} ${configs} > ${meta_dir}/cfg/merge_config_build.log 2>&1
> +   CFLAGS="${CFLAGS} ${TOOLCHAIN_OPTIONS}" HOSTCC="${BUILD_CC} 
> ${BUILD_CFLAGS} ${BUILD_LDFLAGS}" HOSTCPP="${BUILD_CPP}" CC="${KERNEL_CC}" 
> LD="${KERNEL_LD}" OBJCOPY="${KERNEL_OBJCOPY}" STRIP="${KERNEL_STRIP}" 
> ARCH=${ARCH} merge_config.sh -O ${B} ${config_flags} ${configs} > 
> ${meta_dir}/cfg/merge_config_build.log 2>&1
> if [ $? -ne 0 -o ! -f ${B}/.config ]; then
> bberror "Could not generate a .config for 
> ${KMACHINE}-${LINUX_KERNEL_TYPE}"
> if [ ${KCONF_AUDIT_LEVEL} -gt 1 ]; then
> @@ -482,6 +482,7 @@ python do_config_analysis() {
>  env['LD'] = d.getVar('KERNEL_LD')
>  env['CC'] = d.getVar('KERNEL_CC')
>  env['OBJCOPY'] = d.getVar('KERNEL_OBJCOPY')
> +env['STRIP'] = d.getVar('KERNEL_STRIP')
>  env['ARCH'] = d.getVar('ARCH')
>  env['srctree'] = s
>
> @@ -544,6 +545,7 @@ python do_kernel_configcheck() {
>  env['LD'] = d.getVar('KERNEL_LD')
>  env['CC'] = d.getVar('KERNEL_CC')
>  env['OBJCOPY'] = d.getVar('KERNEL_OBJCOPY')
> +env['STRIP'] = d.getVar('KERNEL_STRIP')
>  env['ARCH'] = d.getVar('ARCH')
>  env['srctree'] = s
>
> diff --git a/meta/classes-recipe/kernel.bbclass 
> 

Re: [OE-core] [PATCH 0/3] wayland/weston upgrades

2023-06-16 Thread Eilís 'pidge' Ní Fhlannagáin

On 16/06/2023 08:31, Richard Purdie wrote:

On Thu, 2023-06-15 at 20:20 +0100, Eilís 'pidge' Ní Fhlannagáin wrote:

Nothing really surprising here, except we should note that launcher-logind is
being depreciated so some thought on how that is dealt with will need to occur.

Eilís 'pidge' Ní Fhlannagáin (3):
   wayland-utils: upgrade 1.1.0 -> 1.2.0
   weston: Upgrade 11.0.1 -> 12.0.1
   xwayland: Upgrade 23.1.1 -> 23.1.2

  ...ayland-info-Fix-build-without-libdrm.patch | 42 ---
  ...-utils_1.1.0.bb => wayland-utils_1.2.0.bb} |  3 +-
  .../{weston_11.0.1.bb => weston_12.0.1.bb}| 10 +++--
  ...{xwayland_23.1.1.bb => xwayland_23.1.2.bb} |  2 +-
  4 files changed, 9 insertions(+), 48 deletions(-)
  delete mode 100644 
meta/recipes-graphics/wayland/files/0001-wayland-info-Fix-build-without-libdrm.patch
  rename meta/recipes-graphics/wayland/{wayland-utils_1.1.0.bb => 
wayland-utils_1.2.0.bb} (82%)
  rename meta/recipes-graphics/wayland/{weston_11.0.1.bb => weston_12.0.1.bb} 
(92%)
  rename meta/recipes-graphics/xwayland/{xwayland_23.1.1.bb => 
xwayland_23.1.2.bb} (95%)


Thanks for these. Unfortunately there is a bit more work needed as I
think you didn't have ptests enabled:

https://autobuilder.yoctoproject.org/typhoon/#/builders/52/builds/7200/steps/11/logs/stdio

| Dependency xcb found: YES 1.15 (cached)
| Run-time dependency xcb-cursor found: NO (tried pkgconfig and cmake)
|
| ../weston-12.0.1/tests/meson.build:317:2: ERROR: Problem encountered:
xcb and xcb-cursor required for running xwayland tests

which happened on musl and a load of other places in the parent build.


Thanks RP, I'll look today.



Cheers,

Richard


--
Eilís 'pidge' Ní Fhlannagáin
BayLibre - At the Heart of Embedded Linux
www.baylibre.com


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#183019): 
https://lists.openembedded.org/g/openembedded-core/message/183019
Mute This Topic: https://lists.openembedded.org/mt/99556211/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



Re: [OE-core] [PATCH] samba: fix CVE-2022-45142

2023-06-16 Thread Polampalli, Archana via lists.openembedded.org
Please ignore this patch

Regards,
Archana

From: openembedded-core@lists.openembedded.org 
 on behalf of Polampalli, Archana via 
lists.openembedded.org 
Sent: Friday, June 16, 2023 5:34 PM
To: openembedded-core@lists.openembedded.org 

Cc: G Pillai, Hari 
Subject: [OE-core] [PATCH] samba: fix CVE-2022-45142

The fix for CVE-2022-3437 included changing memcmp to be constant
time and a workaround for a compiler bug by adding "!= 0"
comparisons to the result of memcmp. When these patches were
backported to the heimdal-7.7.1 and heimdal-7.8.0 branches (and
possibly other branches) a logic inversion sneaked in causing the
validation of message integrity codes in gssapi/arcfour to be inverted.

References:
https://nvd.nist.gov/vuln/detail/CVE-2022-45142

Upstream patches:
https://www.openwall.com/lists/oss-security/2023/02/08/1
https://github.com/heimdal/heimdal/commit/5f63215d0d82678233fdfb1c07f4b421f57c528b

Signed-off-by: Archana Polampalli 
---
 .../samba/samba/CVE-2022-45142.patch  | 51 +++
 .../samba/samba_4.14.14.bb|  1 +
 2 files changed, 52 insertions(+)
 create mode 100644 
meta-networking/recipes-connectivity/samba/samba/CVE-2022-45142.patch

diff --git 
a/meta-networking/recipes-connectivity/samba/samba/CVE-2022-45142.patch 
b/meta-networking/recipes-connectivity/samba/samba/CVE-2022-45142.patch
new file mode 100644
index 0..d6b9826e4
--- /dev/null
+++ b/meta-networking/recipes-connectivity/samba/samba/CVE-2022-45142.patch
@@ -0,0 +1,51 @@
+From: Helmut Grohne 
+Subject: [PATCH v3] CVE-2022-45142: gsskrb5: fix accidental logic inversions
+
+The referenced commit attempted to fix miscompilations with gcc-9 and
+gcc-10 by changing `memcmp(...)` to `memcmp(...) != 0`. Unfortunately,
+it also inverted the result of the comparison in two occasions. This
+inversion happened during backporting the patch to 7.7.1 and 7.8.0.
+
+Fixes: f6edaafcfefd ("gsskrb5: CVE-2022-3437 Use constant-time memcmp()
+ for arcfour unwrap")
+Signed-off-by: Helmut Grohne 
+
+Upstream-Status: Backport 
[https://www.openwall.com/lists/oss-security/2023/02/08/1]
+CVE: CVE-2022-45142
+
+Signed-off-by: Archana Polampalli 
+---
+ lib/gssapi/krb5/arcfour.c | 4 ++--
+ 1 file changed, 2 insertions(+), 2 deletions(-)
+
+Changes since v1:
+ * Fix typo in commit message.
+ * Mention 7.8.0 in commit message. Thanks to Jeffrey Altman.
+
+Changes since v2:
+ * Add CVE identifier.
+
+diff --git a/lib/gssapi/krb5/arcfour.c b/lib/gssapi/krb5/arcfour.c
+index e838d007a..eee6ad72f 100644
+--- a/lib/gssapi/krb5/arcfour.c
 b/lib/gssapi/krb5/arcfour.c
+@@ -365,7 +365,7 @@ _gssapi_verify_mic_arcfour(OM_uint32 * minor_status,
+   return GSS_S_FAILURE;
+ }
+
+-cmp = (ct_memcmp(cksum_data, p + 8, 8) == 0);
++cmp = (ct_memcmp(cksum_data, p + 8, 8) != 0);
+ if (cmp) {
+   *minor_status = 0;
+   return GSS_S_BAD_MIC;
+@@ -730,7 +730,7 @@ OM_uint32 _gssapi_unwrap_arcfour(OM_uint32 *minor_status,
+   return GSS_S_FAILURE;
+ }
+
+-cmp = (ct_memcmp(cksum_data, p0 + 16, 8) == 0); /* SGN_CKSUM */
++cmp = (ct_memcmp(cksum_data, p0 + 16, 8) != 0); /* SGN_CKSUM */
+ if (cmp) {
+   _gsskrb5_release_buffer(minor_status, output_message_buffer);
+   *minor_status = 0;
+--
+2.38.1
diff --git a/meta-networking/recipes-connectivity/samba/samba_4.14.14.bb 
b/meta-networking/recipes-connectivity/samba/samba_4.14.14.bb
index 39ba85194..cc07d51dc 100644
--- a/meta-networking/recipes-connectivity/samba/samba_4.14.14.bb
+++ b/meta-networking/recipes-connectivity/samba/samba_4.14.14.bb
@@ -30,6 +30,7 @@ SRC_URI = "${SAMBA_MIRROR}/stable/samba-${PV}.tar.gz \
file://CVE-2022-3437-0006.patch;patchdir=source4/heimdal \
file://CVE-2022-3437-0007.patch;patchdir=source4/heimdal \
file://CVE-2022-3437-0008.patch;patchdir=source4/heimdal \
+   file://CVE-2022-45142.patch;patchdir=source4/heimdal \
"

 SRC_URI:append:libc-musl = " \
--
2.40.0


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#183018): 
https://lists.openembedded.org/g/openembedded-core/message/183018
Mute This Topic: https://lists.openembedded.org/mt/99568906/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



Re: [OE-core] [PATCH] samba: fix CVE-2022-3437

2023-06-16 Thread Polampalli, Archana via lists.openembedded.org
Please Ignore this patch

Regards,
Archana

From: openembedded-core@lists.openembedded.org 
 on behalf of Polampalli, Archana via 
lists.openembedded.org 
Sent: Friday, June 16, 2023 5:34 PM
To: openembedded-core@lists.openembedded.org 

Cc: G Pillai, Hari 
Subject: [OE-core] [PATCH] samba: fix CVE-2022-3437

A heap-based buffer overflow vulnerability was found in Samba within
the GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal. The
DES and Triple-DES decryption routines in the Heimdal GSSAPI library
allow a length-limited write buffer overflow on malloc() allocated
memory when presented with a maliciously small packet. This flaw
allows a remote user to send specially crafted malicious data to the
application, possibly resulting in a denial of service (DoS) attack.

References:
https://nvd.nist.gov/vuln/detail/CVE-2022-3437

Upstream patches:
https://github.com/heimdal/heimdal/commit/f6edaafcfefd843ca1b1a041f942a853d85ee7c3
https://github.com/heimdal/heimdal/commit/c9cc34334bd64b08fe91a2f720262462e9f6bb49
https://github.com/heimdal/heimdal/commit/a587a4bcb28d5b9047f332573b1e7c8f89ca3edd
https://github.com/heimdal/heimdal/commit/c758910eaad3c0de2cfb68830a661c4739675a7d
https://github.com/heimdal/heimdal/commit/414b2a77fd61c26d64562e3800dc5578d9d0f15d
https://github.com/heimdal/heimdal/commit/be9bbd93ed8f204b4bc1b92d1bc3c16aac194696
https://github.com/heimdal/heimdal/commit/c8407ca079294d76a5ed140ba5b546f870d23ed2
https://github.com/heimdal/heimdal/commit/8fb508a25a6a47289c73e3f4339352a73a396eef

Signed-off-by: Archana Polampalli 
---
 .../samba/samba/CVE-2022-3437-0001.patch  | 77 +++
 .../samba/samba/CVE-2022-3437-0002.patch  | 35 +
 .../samba/samba/CVE-2022-3437-0003.patch  | 50 
 .../samba/samba/CVE-2022-3437-0004.patch  | 57 ++
 .../samba/samba/CVE-2022-3437-0005.patch  | 37 +
 .../samba/samba/CVE-2022-3437-0006.patch  | 65 
 .../samba/samba/CVE-2022-3437-0007.patch  | 39 ++
 .../samba/samba/CVE-2022-3437-0008.patch  | 48 
 .../samba/samba_4.14.14.bb|  8 ++
 9 files changed, 416 insertions(+)
 create mode 100644 
meta-networking/recipes-connectivity/samba/samba/CVE-2022-3437-0001.patch
 create mode 100644 
meta-networking/recipes-connectivity/samba/samba/CVE-2022-3437-0002.patch
 create mode 100644 
meta-networking/recipes-connectivity/samba/samba/CVE-2022-3437-0003.patch
 create mode 100644 
meta-networking/recipes-connectivity/samba/samba/CVE-2022-3437-0004.patch
 create mode 100644 
meta-networking/recipes-connectivity/samba/samba/CVE-2022-3437-0005.patch
 create mode 100644 
meta-networking/recipes-connectivity/samba/samba/CVE-2022-3437-0006.patch
 create mode 100644 
meta-networking/recipes-connectivity/samba/samba/CVE-2022-3437-0007.patch
 create mode 100644 
meta-networking/recipes-connectivity/samba/samba/CVE-2022-3437-0008.patch

diff --git 
a/meta-networking/recipes-connectivity/samba/samba/CVE-2022-3437-0001.patch 
b/meta-networking/recipes-connectivity/samba/samba/CVE-2022-3437-0001.patch
new file mode 100644
index 0..abc778b73
--- /dev/null
+++ b/meta-networking/recipes-connectivity/samba/samba/CVE-2022-3437-0001.patch
@@ -0,0 +1,77 @@
+From f6edaafcfefd843ca1b1a041f942a853d85ee7c3 Mon Sep 17 00:00:00 2001
+From: Joseph Sutton 
+Date: Wed, 12 Oct 2022 13:57:13 +1300
+Subject: [PATCH] gsskrb5: CVE-2022-3437 Use constant-time memcmp() for arcfour
+ unwrap
+
+Samba BUG: https://bugzilla.samba.org/show_bug.cgi?id=15134
+
+Signed-off-by: Joseph Sutton 
+Reviewed-by: Andrew Bartlett 
+
+Upstream-Status: Backport 
[https://github.com/heimdal/heimdal/commit/f6edaafcfefd843ca1b1a041f942a853d85ee7c3]
+CVE: CVE-2022-3437
+
+Signed-off-by: Archana Polampalli 
+---
+ lib/gssapi/krb5/arcfour.c | 16 
+ 1 file changed, 8 insertions(+), 8 deletions(-)
+
+diff --git a/lib/gssapi/krb5/arcfour.c b/lib/gssapi/krb5/arcfour.c
+index a61f768..4fc46ce 100644
+--- a/lib/gssapi/krb5/arcfour.c
 b/lib/gssapi/krb5/arcfour.c
+@@ -365,7 +365,7 @@ _gssapi_verify_mic_arcfour(OM_uint32 * minor_status,
+   return GSS_S_FAILURE;
+ }
+
+-cmp = ct_memcmp(cksum_data, p + 8, 8);
++cmp = (ct_memcmp(cksum_data, p + 8, 8) == 0);
+ if (cmp) {
+   *minor_status = 0;
+   return GSS_S_BAD_MIC;
+@@ -385,9 +385,9 @@ _gssapi_verify_mic_arcfour(OM_uint32 * minor_status,
+ _gsskrb5_decode_be_om_uint32(SND_SEQ, _number);
+
+ if (context_handle->more_flags & LOCAL)
+-  cmp = memcmp(_SEQ[4], "\xff\xff\xff\xff", 4);
++  cmp = (ct_memcmp(_SEQ[4], "\xff\xff\xff\xff", 4) != 0);
+ else
+-  cmp = memcmp(_SEQ[4], "\x00\x00\x00\x00", 4);
++  cmp = (ct_memcmp(_SEQ[4], "\x00\x00\x00\x00", 4) != 0);
+
+ memset(SND_SEQ, 0, sizeof(SND_SEQ));
+ if (cmp != 0) {
+@@ -656,9 +656,9 @@ OM_uint32 _gssapi_unwrap_arcfour(OM_uint32 *minor_status,
+ _gsskrb5_decode_be_om_uint32(SND_SEQ, 

Re: [OE-core] [PATCH] samba: fix CVE-2022-41916

2023-06-16 Thread Polampalli, Archana via lists.openembedded.org
Please ignore this patch

Regards,
Archana

From: openembedded-core@lists.openembedded.org 
 on behalf of Polampalli, Archana via 
lists.openembedded.org 
Sent: Friday, June 16, 2023 5:35 PM
To: openembedded-core@lists.openembedded.org 

Cc: G Pillai, Hari 
Subject: [OE-core] [PATCH] samba: fix CVE-2022-41916

Heimdal is an implementation of ASN.1/DER, PKIX, and Kerberos.
Versions prior to 7.7.1 are vulnerable to a denial of service
vulnerability in Heimdal's PKI certificate validation library,
affecting the KDC (via PKINIT) and kinit (via PKINIT), as well as
any third-party applications using Heimdal's libhx509. Users
should upgrade to Heimdal 7.7.1 or 7.8. There are no known
workarounds for this issue.

References:
https://nvd.nist.gov/vuln/detail/CVE-2022-41916

Upstream patches:
https://github.com/heimdal/heimdal/commit/eb87af0c2d189c25294c7daf483a47b03af80c2c

Signed-off-by: Archana Polampalli 
---
 .../samba/samba/CVE-2022-41916.patch  | 38 +++
 .../samba/samba_4.14.14.bb|  1 +
 2 files changed, 39 insertions(+)
 create mode 100644 
meta-networking/recipes-connectivity/samba/samba/CVE-2022-41916.patch

diff --git 
a/meta-networking/recipes-connectivity/samba/samba/CVE-2022-41916.patch 
b/meta-networking/recipes-connectivity/samba/samba/CVE-2022-41916.patch
new file mode 100644
index 0..07f4a18a2
--- /dev/null
+++ b/meta-networking/recipes-connectivity/samba/samba/CVE-2022-41916.patch
@@ -0,0 +1,38 @@
+From eb87af0c2d189c25294c7daf483a47b03af80c2c Mon Sep 17 00:00:00 2001
+From: Jeffrey Altman 
+Date: Wed, 17 Nov 2021 20:00:29 -0500
+Subject: [PATCH] lib/wind: find_normalize read past end of array
+
+find_normalize() can under some circumstances read one element
+beyond the input array.  The contents are discarded immediately
+without further use.
+
+This change prevents the unintended read.
+
+(cherry picked from commit 357a38fc7fb582ae73f4b7f4a90a4b0b871b149e)
+
+Change-Id: Ia2759a5632d64f7fa6553f879b5bbbf43ba3513e
+
+Upstream-Status: Backport 
[https://github.com/heimdal/heimdal/commit/eb87af0c2d189c25294c7daf483a47b03af80c2c]
+CVE: CVE-2022-41916
+
+Signed-off-by: Archana Polampalli 
+---
+ lib/wind/normalize.c | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/lib/wind/normalize.c b/lib/wind/normalize.c
+index 20e8a4a04b..8f3991d10e 100644
+--- a/lib/wind/normalize.c
 b/lib/wind/normalize.c
+@@ -227,9 +227,9 @@ find_composition(const uint32_t *in, unsigned in_len)
+   unsigned i;
+
+   if (n % 5 == 0) {
+-  cur = *in++;
+   if (in_len-- == 0)
+   return c->val;
++  cur = *in++;
+   }
+
+   i = cur >> 16;
diff --git a/meta-networking/recipes-connectivity/samba/samba_4.14.14.bb 
b/meta-networking/recipes-connectivity/samba/samba_4.14.14.bb
index cc07d51dc..fcec63752 100644
--- a/meta-networking/recipes-connectivity/samba/samba_4.14.14.bb
+++ b/meta-networking/recipes-connectivity/samba/samba_4.14.14.bb
@@ -31,6 +31,7 @@ SRC_URI = "${SAMBA_MIRROR}/stable/samba-${PV}.tar.gz \
file://CVE-2022-3437-0007.patch;patchdir=source4/heimdal \
file://CVE-2022-3437-0008.patch;patchdir=source4/heimdal \
file://CVE-2022-45142.patch;patchdir=source4/heimdal \
+   file://CVE-2022-41916.patch;patchdir=source4/heimdal \
"

 SRC_URI:append:libc-musl = " \
--
2.40.0


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#183016): 
https://lists.openembedded.org/g/openembedded-core/message/183016
Mute This Topic: https://lists.openembedded.org/mt/99568915/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



Re: [OE-core] [oe][meta-networking][kirkstone][PATCH V2 1/1] samba: fix CVE-2022-3437

2023-06-16 Thread Polampalli, Archana via lists.openembedded.org
Please ignore this patch

Regards,
Archana

From: openembedded-core@lists.openembedded.org 
 on behalf of Polampalli, Archana via 
lists.openembedded.org 
Sent: Friday, June 16, 2023 5:40 PM
To: openembedded-core@lists.openembedded.org 

Cc: G Pillai, Hari 
Subject: [OE-core] [oe][meta-networking][kirkstone][PATCH V2 1/1] samba: fix 
CVE-2022-3437

A heap-based buffer overflow vulnerability was found in Samba within
the GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal. The
DES and Triple-DES decryption routines in the Heimdal GSSAPI library
allow a length-limited write buffer overflow on malloc() allocated
memory when presented with a maliciously small packet. This flaw
allows a remote user to send specially crafted malicious data to the
application, possibly resulting in a denial of service (DoS) attack.

References:
https://nvd.nist.gov/vuln/detail/CVE-2022-3437

Upstream patches:
https://github.com/heimdal/heimdal/commit/f6edaafcfefd843ca1b1a041f942a853d85ee7c3
https://github.com/heimdal/heimdal/commit/c9cc34334bd64b08fe91a2f720262462e9f6bb49
https://github.com/heimdal/heimdal/commit/a587a4bcb28d5b9047f332573b1e7c8f89ca3edd
https://github.com/heimdal/heimdal/commit/c758910eaad3c0de2cfb68830a661c4739675a7d
https://github.com/heimdal/heimdal/commit/414b2a77fd61c26d64562e3800dc5578d9d0f15d
https://github.com/heimdal/heimdal/commit/be9bbd93ed8f204b4bc1b92d1bc3c16aac194696
https://github.com/heimdal/heimdal/commit/c8407ca079294d76a5ed140ba5b546f870d23ed2
https://github.com/heimdal/heimdal/commit/8fb508a25a6a47289c73e3f4339352a73a396eef

Signed-off-by: Archana Polampalli 
---
 .../samba/samba/CVE-2022-3437-0001.patch  | 77 +++
 .../samba/samba/CVE-2022-3437-0002.patch  | 35 +
 .../samba/samba/CVE-2022-3437-0003.patch  | 50 
 .../samba/samba/CVE-2022-3437-0004.patch  | 57 ++
 .../samba/samba/CVE-2022-3437-0005.patch  | 37 +
 .../samba/samba/CVE-2022-3437-0006.patch  | 65 
 .../samba/samba/CVE-2022-3437-0007.patch  | 39 ++
 .../samba/samba/CVE-2022-3437-0008.patch  | 48 
 .../samba/samba_4.14.14.bb|  8 ++
 9 files changed, 416 insertions(+)
 create mode 100644 
meta-networking/recipes-connectivity/samba/samba/CVE-2022-3437-0001.patch
 create mode 100644 
meta-networking/recipes-connectivity/samba/samba/CVE-2022-3437-0002.patch
 create mode 100644 
meta-networking/recipes-connectivity/samba/samba/CVE-2022-3437-0003.patch
 create mode 100644 
meta-networking/recipes-connectivity/samba/samba/CVE-2022-3437-0004.patch
 create mode 100644 
meta-networking/recipes-connectivity/samba/samba/CVE-2022-3437-0005.patch
 create mode 100644 
meta-networking/recipes-connectivity/samba/samba/CVE-2022-3437-0006.patch
 create mode 100644 
meta-networking/recipes-connectivity/samba/samba/CVE-2022-3437-0007.patch
 create mode 100644 
meta-networking/recipes-connectivity/samba/samba/CVE-2022-3437-0008.patch

diff --git 
a/meta-networking/recipes-connectivity/samba/samba/CVE-2022-3437-0001.patch 
b/meta-networking/recipes-connectivity/samba/samba/CVE-2022-3437-0001.patch
new file mode 100644
index 0..abc778b73
--- /dev/null
+++ b/meta-networking/recipes-connectivity/samba/samba/CVE-2022-3437-0001.patch
@@ -0,0 +1,77 @@
+From f6edaafcfefd843ca1b1a041f942a853d85ee7c3 Mon Sep 17 00:00:00 2001
+From: Joseph Sutton 
+Date: Wed, 12 Oct 2022 13:57:13 +1300
+Subject: [PATCH] gsskrb5: CVE-2022-3437 Use constant-time memcmp() for arcfour
+ unwrap
+
+Samba BUG: https://bugzilla.samba.org/show_bug.cgi?id=15134
+
+Signed-off-by: Joseph Sutton 
+Reviewed-by: Andrew Bartlett 
+
+Upstream-Status: Backport 
[https://github.com/heimdal/heimdal/commit/f6edaafcfefd843ca1b1a041f942a853d85ee7c3]
+CVE: CVE-2022-3437
+
+Signed-off-by: Archana Polampalli 
+---
+ lib/gssapi/krb5/arcfour.c | 16 
+ 1 file changed, 8 insertions(+), 8 deletions(-)
+
+diff --git a/lib/gssapi/krb5/arcfour.c b/lib/gssapi/krb5/arcfour.c
+index a61f768..4fc46ce 100644
+--- a/lib/gssapi/krb5/arcfour.c
 b/lib/gssapi/krb5/arcfour.c
+@@ -365,7 +365,7 @@ _gssapi_verify_mic_arcfour(OM_uint32 * minor_status,
+   return GSS_S_FAILURE;
+ }
+
+-cmp = ct_memcmp(cksum_data, p + 8, 8);
++cmp = (ct_memcmp(cksum_data, p + 8, 8) == 0);
+ if (cmp) {
+   *minor_status = 0;
+   return GSS_S_BAD_MIC;
+@@ -385,9 +385,9 @@ _gssapi_verify_mic_arcfour(OM_uint32 * minor_status,
+ _gsskrb5_decode_be_om_uint32(SND_SEQ, _number);
+
+ if (context_handle->more_flags & LOCAL)
+-  cmp = memcmp(_SEQ[4], "\xff\xff\xff\xff", 4);
++  cmp = (ct_memcmp(_SEQ[4], "\xff\xff\xff\xff", 4) != 0);
+ else
+-  cmp = memcmp(_SEQ[4], "\x00\x00\x00\x00", 4);
++  cmp = (ct_memcmp(_SEQ[4], "\x00\x00\x00\x00", 4) != 0);
+
+ memset(SND_SEQ, 0, sizeof(SND_SEQ));
+ if (cmp != 0) {
+@@ -656,9 +656,9 @@ OM_uint32 _gssapi_unwrap_arcfour(OM_uint32 *minor_status,
+ 

Re: [OE-core] [oe][meta-networking][kirkstone][PATCH V2 1/1] samba: fix CVE-2022-45142

2023-06-16 Thread Polampalli, Archana via lists.openembedded.org
Please ignore this patch

Regards,
Archana

From: openembedded-core@lists.openembedded.org 
 on behalf of Polampalli, Archana via 
lists.openembedded.org 
Sent: Friday, June 16, 2023 5:42 PM
To: openembedded-core@lists.openembedded.org 

Cc: G Pillai, Hari 
Subject: [OE-core] [oe][meta-networking][kirkstone][PATCH V2 1/1] samba: fix 
CVE-2022-45142

The fix for CVE-2022-3437 included changing memcmp to be constant
time and a workaround for a compiler bug by adding "!= 0"
comparisons to the result of memcmp. When these patches were
backported to the heimdal-7.7.1 and heimdal-7.8.0 branches (and
possibly other branches) a logic inversion sneaked in causing the
validation of message integrity codes in gssapi/arcfour to be inverted.

References:
https://nvd.nist.gov/vuln/detail/CVE-2022-45142

Upstream patches:
https://www.openwall.com/lists/oss-security/2023/02/08/1
https://github.com/heimdal/heimdal/commit/5f63215d0d82678233fdfb1c07f4b421f57c528b

Signed-off-by: Archana Polampalli 
---
 .../samba/samba/CVE-2022-45142.patch  | 51 +++
 .../samba/samba_4.14.14.bb|  1 +
 2 files changed, 52 insertions(+)
 create mode 100644 
meta-networking/recipes-connectivity/samba/samba/CVE-2022-45142.patch

diff --git 
a/meta-networking/recipes-connectivity/samba/samba/CVE-2022-45142.patch 
b/meta-networking/recipes-connectivity/samba/samba/CVE-2022-45142.patch
new file mode 100644
index 0..d6b9826e4
--- /dev/null
+++ b/meta-networking/recipes-connectivity/samba/samba/CVE-2022-45142.patch
@@ -0,0 +1,51 @@
+From: Helmut Grohne 
+Subject: [PATCH v3] CVE-2022-45142: gsskrb5: fix accidental logic inversions
+
+The referenced commit attempted to fix miscompilations with gcc-9 and
+gcc-10 by changing `memcmp(...)` to `memcmp(...) != 0`. Unfortunately,
+it also inverted the result of the comparison in two occasions. This
+inversion happened during backporting the patch to 7.7.1 and 7.8.0.
+
+Fixes: f6edaafcfefd ("gsskrb5: CVE-2022-3437 Use constant-time memcmp()
+ for arcfour unwrap")
+Signed-off-by: Helmut Grohne 
+
+Upstream-Status: Backport 
[https://www.openwall.com/lists/oss-security/2023/02/08/1]
+CVE: CVE-2022-45142
+
+Signed-off-by: Archana Polampalli 
+---
+ lib/gssapi/krb5/arcfour.c | 4 ++--
+ 1 file changed, 2 insertions(+), 2 deletions(-)
+
+Changes since v1:
+ * Fix typo in commit message.
+ * Mention 7.8.0 in commit message. Thanks to Jeffrey Altman.
+
+Changes since v2:
+ * Add CVE identifier.
+
+diff --git a/lib/gssapi/krb5/arcfour.c b/lib/gssapi/krb5/arcfour.c
+index e838d007a..eee6ad72f 100644
+--- a/lib/gssapi/krb5/arcfour.c
 b/lib/gssapi/krb5/arcfour.c
+@@ -365,7 +365,7 @@ _gssapi_verify_mic_arcfour(OM_uint32 * minor_status,
+   return GSS_S_FAILURE;
+ }
+
+-cmp = (ct_memcmp(cksum_data, p + 8, 8) == 0);
++cmp = (ct_memcmp(cksum_data, p + 8, 8) != 0);
+ if (cmp) {
+   *minor_status = 0;
+   return GSS_S_BAD_MIC;
+@@ -730,7 +730,7 @@ OM_uint32 _gssapi_unwrap_arcfour(OM_uint32 *minor_status,
+   return GSS_S_FAILURE;
+ }
+
+-cmp = (ct_memcmp(cksum_data, p0 + 16, 8) == 0); /* SGN_CKSUM */
++cmp = (ct_memcmp(cksum_data, p0 + 16, 8) != 0); /* SGN_CKSUM */
+ if (cmp) {
+   _gsskrb5_release_buffer(minor_status, output_message_buffer);
+   *minor_status = 0;
+--
+2.38.1
diff --git a/meta-networking/recipes-connectivity/samba/samba_4.14.14.bb 
b/meta-networking/recipes-connectivity/samba/samba_4.14.14.bb
index 39ba85194..cc07d51dc 100644
--- a/meta-networking/recipes-connectivity/samba/samba_4.14.14.bb
+++ b/meta-networking/recipes-connectivity/samba/samba_4.14.14.bb
@@ -30,6 +30,7 @@ SRC_URI = "${SAMBA_MIRROR}/stable/samba-${PV}.tar.gz \
file://CVE-2022-3437-0006.patch;patchdir=source4/heimdal \
file://CVE-2022-3437-0007.patch;patchdir=source4/heimdal \
file://CVE-2022-3437-0008.patch;patchdir=source4/heimdal \
+   file://CVE-2022-45142.patch;patchdir=source4/heimdal \
"

 SRC_URI:append:libc-musl = " \
--
2.40.0


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#183014): 
https://lists.openembedded.org/g/openembedded-core/message/183014
Mute This Topic: https://lists.openembedded.org/mt/99569013/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core] [oe][meta-networking][kirkstone][PATCH V2 1/1] samba: fix CVE-2022-45142

2023-06-16 Thread Polampalli, Archana via lists.openembedded.org
The fix for CVE-2022-3437 included changing memcmp to be constant
time and a workaround for a compiler bug by adding "!= 0"
comparisons to the result of memcmp. When these patches were
backported to the heimdal-7.7.1 and heimdal-7.8.0 branches (and
possibly other branches) a logic inversion sneaked in causing the
validation of message integrity codes in gssapi/arcfour to be inverted.

References:
https://nvd.nist.gov/vuln/detail/CVE-2022-45142

Upstream patches:
https://www.openwall.com/lists/oss-security/2023/02/08/1
https://github.com/heimdal/heimdal/commit/5f63215d0d82678233fdfb1c07f4b421f57c528b

Signed-off-by: Archana Polampalli 
---
 .../samba/samba/CVE-2022-45142.patch  | 51 +++
 .../samba/samba_4.14.14.bb|  1 +
 2 files changed, 52 insertions(+)
 create mode 100644 
meta-networking/recipes-connectivity/samba/samba/CVE-2022-45142.patch

diff --git 
a/meta-networking/recipes-connectivity/samba/samba/CVE-2022-45142.patch 
b/meta-networking/recipes-connectivity/samba/samba/CVE-2022-45142.patch
new file mode 100644
index 0..d6b9826e4
--- /dev/null
+++ b/meta-networking/recipes-connectivity/samba/samba/CVE-2022-45142.patch
@@ -0,0 +1,51 @@
+From: Helmut Grohne 
+Subject: [PATCH v3] CVE-2022-45142: gsskrb5: fix accidental logic inversions
+
+The referenced commit attempted to fix miscompilations with gcc-9 and
+gcc-10 by changing `memcmp(...)` to `memcmp(...) != 0`. Unfortunately,
+it also inverted the result of the comparison in two occasions. This
+inversion happened during backporting the patch to 7.7.1 and 7.8.0.
+
+Fixes: f6edaafcfefd ("gsskrb5: CVE-2022-3437 Use constant-time memcmp()
+ for arcfour unwrap")
+Signed-off-by: Helmut Grohne 
+
+Upstream-Status: Backport 
[https://www.openwall.com/lists/oss-security/2023/02/08/1]
+CVE: CVE-2022-45142
+
+Signed-off-by: Archana Polampalli 
+---
+ lib/gssapi/krb5/arcfour.c | 4 ++--
+ 1 file changed, 2 insertions(+), 2 deletions(-)
+
+Changes since v1:
+ * Fix typo in commit message.
+ * Mention 7.8.0 in commit message. Thanks to Jeffrey Altman.
+
+Changes since v2:
+ * Add CVE identifier.
+
+diff --git a/lib/gssapi/krb5/arcfour.c b/lib/gssapi/krb5/arcfour.c
+index e838d007a..eee6ad72f 100644
+--- a/lib/gssapi/krb5/arcfour.c
 b/lib/gssapi/krb5/arcfour.c
+@@ -365,7 +365,7 @@ _gssapi_verify_mic_arcfour(OM_uint32 * minor_status,
+   return GSS_S_FAILURE;
+ }
+
+-cmp = (ct_memcmp(cksum_data, p + 8, 8) == 0);
++cmp = (ct_memcmp(cksum_data, p + 8, 8) != 0);
+ if (cmp) {
+   *minor_status = 0;
+   return GSS_S_BAD_MIC;
+@@ -730,7 +730,7 @@ OM_uint32 _gssapi_unwrap_arcfour(OM_uint32 *minor_status,
+   return GSS_S_FAILURE;
+ }
+
+-cmp = (ct_memcmp(cksum_data, p0 + 16, 8) == 0); /* SGN_CKSUM */
++cmp = (ct_memcmp(cksum_data, p0 + 16, 8) != 0); /* SGN_CKSUM */
+ if (cmp) {
+   _gsskrb5_release_buffer(minor_status, output_message_buffer);
+   *minor_status = 0;
+--
+2.38.1
diff --git a/meta-networking/recipes-connectivity/samba/samba_4.14.14.bb 
b/meta-networking/recipes-connectivity/samba/samba_4.14.14.bb
index 39ba85194..cc07d51dc 100644
--- a/meta-networking/recipes-connectivity/samba/samba_4.14.14.bb
+++ b/meta-networking/recipes-connectivity/samba/samba_4.14.14.bb
@@ -30,6 +30,7 @@ SRC_URI = "${SAMBA_MIRROR}/stable/samba-${PV}.tar.gz \
file://CVE-2022-3437-0006.patch;patchdir=source4/heimdal \
file://CVE-2022-3437-0007.patch;patchdir=source4/heimdal \
file://CVE-2022-3437-0008.patch;patchdir=source4/heimdal \
+   file://CVE-2022-45142.patch;patchdir=source4/heimdal \
"
 
 SRC_URI:append:libc-musl = " \
-- 
2.40.0


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#183013): 
https://lists.openembedded.org/g/openembedded-core/message/183013
Mute This Topic: https://lists.openembedded.org/mt/99569013/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core] [oe][meta-networking][kirkstone][PATCH V2 1/1] samba: fix CVE-2022-3437

2023-06-16 Thread Polampalli, Archana via lists.openembedded.org
A heap-based buffer overflow vulnerability was found in Samba within
the GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal. The
DES and Triple-DES decryption routines in the Heimdal GSSAPI library
allow a length-limited write buffer overflow on malloc() allocated
memory when presented with a maliciously small packet. This flaw
allows a remote user to send specially crafted malicious data to the
application, possibly resulting in a denial of service (DoS) attack.

References:
https://nvd.nist.gov/vuln/detail/CVE-2022-3437

Upstream patches:
https://github.com/heimdal/heimdal/commit/f6edaafcfefd843ca1b1a041f942a853d85ee7c3
https://github.com/heimdal/heimdal/commit/c9cc34334bd64b08fe91a2f720262462e9f6bb49
https://github.com/heimdal/heimdal/commit/a587a4bcb28d5b9047f332573b1e7c8f89ca3edd
https://github.com/heimdal/heimdal/commit/c758910eaad3c0de2cfb68830a661c4739675a7d
https://github.com/heimdal/heimdal/commit/414b2a77fd61c26d64562e3800dc5578d9d0f15d
https://github.com/heimdal/heimdal/commit/be9bbd93ed8f204b4bc1b92d1bc3c16aac194696
https://github.com/heimdal/heimdal/commit/c8407ca079294d76a5ed140ba5b546f870d23ed2
https://github.com/heimdal/heimdal/commit/8fb508a25a6a47289c73e3f4339352a73a396eef

Signed-off-by: Archana Polampalli 
---
 .../samba/samba/CVE-2022-3437-0001.patch  | 77 +++
 .../samba/samba/CVE-2022-3437-0002.patch  | 35 +
 .../samba/samba/CVE-2022-3437-0003.patch  | 50 
 .../samba/samba/CVE-2022-3437-0004.patch  | 57 ++
 .../samba/samba/CVE-2022-3437-0005.patch  | 37 +
 .../samba/samba/CVE-2022-3437-0006.patch  | 65 
 .../samba/samba/CVE-2022-3437-0007.patch  | 39 ++
 .../samba/samba/CVE-2022-3437-0008.patch  | 48 
 .../samba/samba_4.14.14.bb|  8 ++
 9 files changed, 416 insertions(+)
 create mode 100644 
meta-networking/recipes-connectivity/samba/samba/CVE-2022-3437-0001.patch
 create mode 100644 
meta-networking/recipes-connectivity/samba/samba/CVE-2022-3437-0002.patch
 create mode 100644 
meta-networking/recipes-connectivity/samba/samba/CVE-2022-3437-0003.patch
 create mode 100644 
meta-networking/recipes-connectivity/samba/samba/CVE-2022-3437-0004.patch
 create mode 100644 
meta-networking/recipes-connectivity/samba/samba/CVE-2022-3437-0005.patch
 create mode 100644 
meta-networking/recipes-connectivity/samba/samba/CVE-2022-3437-0006.patch
 create mode 100644 
meta-networking/recipes-connectivity/samba/samba/CVE-2022-3437-0007.patch
 create mode 100644 
meta-networking/recipes-connectivity/samba/samba/CVE-2022-3437-0008.patch

diff --git 
a/meta-networking/recipes-connectivity/samba/samba/CVE-2022-3437-0001.patch 
b/meta-networking/recipes-connectivity/samba/samba/CVE-2022-3437-0001.patch
new file mode 100644
index 0..abc778b73
--- /dev/null
+++ b/meta-networking/recipes-connectivity/samba/samba/CVE-2022-3437-0001.patch
@@ -0,0 +1,77 @@
+From f6edaafcfefd843ca1b1a041f942a853d85ee7c3 Mon Sep 17 00:00:00 2001
+From: Joseph Sutton 
+Date: Wed, 12 Oct 2022 13:57:13 +1300
+Subject: [PATCH] gsskrb5: CVE-2022-3437 Use constant-time memcmp() for arcfour
+ unwrap
+
+Samba BUG: https://bugzilla.samba.org/show_bug.cgi?id=15134
+
+Signed-off-by: Joseph Sutton 
+Reviewed-by: Andrew Bartlett 
+
+Upstream-Status: Backport 
[https://github.com/heimdal/heimdal/commit/f6edaafcfefd843ca1b1a041f942a853d85ee7c3]
+CVE: CVE-2022-3437
+
+Signed-off-by: Archana Polampalli 
+---
+ lib/gssapi/krb5/arcfour.c | 16 
+ 1 file changed, 8 insertions(+), 8 deletions(-)
+
+diff --git a/lib/gssapi/krb5/arcfour.c b/lib/gssapi/krb5/arcfour.c
+index a61f768..4fc46ce 100644
+--- a/lib/gssapi/krb5/arcfour.c
 b/lib/gssapi/krb5/arcfour.c
+@@ -365,7 +365,7 @@ _gssapi_verify_mic_arcfour(OM_uint32 * minor_status,
+   return GSS_S_FAILURE;
+ }
+
+-cmp = ct_memcmp(cksum_data, p + 8, 8);
++cmp = (ct_memcmp(cksum_data, p + 8, 8) == 0);
+ if (cmp) {
+   *minor_status = 0;
+   return GSS_S_BAD_MIC;
+@@ -385,9 +385,9 @@ _gssapi_verify_mic_arcfour(OM_uint32 * minor_status,
+ _gsskrb5_decode_be_om_uint32(SND_SEQ, _number);
+
+ if (context_handle->more_flags & LOCAL)
+-  cmp = memcmp(_SEQ[4], "\xff\xff\xff\xff", 4);
++  cmp = (ct_memcmp(_SEQ[4], "\xff\xff\xff\xff", 4) != 0);
+ else
+-  cmp = memcmp(_SEQ[4], "\x00\x00\x00\x00", 4);
++  cmp = (ct_memcmp(_SEQ[4], "\x00\x00\x00\x00", 4) != 0);
+
+ memset(SND_SEQ, 0, sizeof(SND_SEQ));
+ if (cmp != 0) {
+@@ -656,9 +656,9 @@ OM_uint32 _gssapi_unwrap_arcfour(OM_uint32 *minor_status,
+ _gsskrb5_decode_be_om_uint32(SND_SEQ, _number);
+
+ if (context_handle->more_flags & LOCAL)
+-  cmp = memcmp(_SEQ[4], "\xff\xff\xff\xff", 4);
++  cmp = (ct_memcmp(_SEQ[4], "\xff\xff\xff\xff", 4) != 0);
+ else
+-  cmp = memcmp(_SEQ[4], "\x00\x00\x00\x00", 4);
++  cmp = (ct_memcmp(_SEQ[4], "\x00\x00\x00\x00", 4) != 0);
+
+ if (cmp != 0) {
+   

[OE-core] [PATCH] samba: fix CVE-2022-41916

2023-06-16 Thread Polampalli, Archana via lists.openembedded.org
Heimdal is an implementation of ASN.1/DER, PKIX, and Kerberos.
Versions prior to 7.7.1 are vulnerable to a denial of service
vulnerability in Heimdal's PKI certificate validation library,
affecting the KDC (via PKINIT) and kinit (via PKINIT), as well as
any third-party applications using Heimdal's libhx509. Users
should upgrade to Heimdal 7.7.1 or 7.8. There are no known
workarounds for this issue.

References:
https://nvd.nist.gov/vuln/detail/CVE-2022-41916

Upstream patches:
https://github.com/heimdal/heimdal/commit/eb87af0c2d189c25294c7daf483a47b03af80c2c

Signed-off-by: Archana Polampalli 
---
 .../samba/samba/CVE-2022-41916.patch  | 38 +++
 .../samba/samba_4.14.14.bb|  1 +
 2 files changed, 39 insertions(+)
 create mode 100644 
meta-networking/recipes-connectivity/samba/samba/CVE-2022-41916.patch

diff --git 
a/meta-networking/recipes-connectivity/samba/samba/CVE-2022-41916.patch 
b/meta-networking/recipes-connectivity/samba/samba/CVE-2022-41916.patch
new file mode 100644
index 0..07f4a18a2
--- /dev/null
+++ b/meta-networking/recipes-connectivity/samba/samba/CVE-2022-41916.patch
@@ -0,0 +1,38 @@
+From eb87af0c2d189c25294c7daf483a47b03af80c2c Mon Sep 17 00:00:00 2001
+From: Jeffrey Altman 
+Date: Wed, 17 Nov 2021 20:00:29 -0500
+Subject: [PATCH] lib/wind: find_normalize read past end of array
+
+find_normalize() can under some circumstances read one element
+beyond the input array.  The contents are discarded immediately
+without further use.
+
+This change prevents the unintended read.
+
+(cherry picked from commit 357a38fc7fb582ae73f4b7f4a90a4b0b871b149e)
+
+Change-Id: Ia2759a5632d64f7fa6553f879b5bbbf43ba3513e
+
+Upstream-Status: Backport 
[https://github.com/heimdal/heimdal/commit/eb87af0c2d189c25294c7daf483a47b03af80c2c]
+CVE: CVE-2022-41916
+
+Signed-off-by: Archana Polampalli 
+---
+ lib/wind/normalize.c | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/lib/wind/normalize.c b/lib/wind/normalize.c
+index 20e8a4a04b..8f3991d10e 100644
+--- a/lib/wind/normalize.c
 b/lib/wind/normalize.c
+@@ -227,9 +227,9 @@ find_composition(const uint32_t *in, unsigned in_len)
+   unsigned i;
+
+   if (n % 5 == 0) {
+-  cur = *in++;
+   if (in_len-- == 0)
+   return c->val;
++  cur = *in++;
+   }
+
+   i = cur >> 16;
diff --git a/meta-networking/recipes-connectivity/samba/samba_4.14.14.bb 
b/meta-networking/recipes-connectivity/samba/samba_4.14.14.bb
index cc07d51dc..fcec63752 100644
--- a/meta-networking/recipes-connectivity/samba/samba_4.14.14.bb
+++ b/meta-networking/recipes-connectivity/samba/samba_4.14.14.bb
@@ -31,6 +31,7 @@ SRC_URI = "${SAMBA_MIRROR}/stable/samba-${PV}.tar.gz \
file://CVE-2022-3437-0007.patch;patchdir=source4/heimdal \
file://CVE-2022-3437-0008.patch;patchdir=source4/heimdal \
file://CVE-2022-45142.patch;patchdir=source4/heimdal \
+   file://CVE-2022-41916.patch;patchdir=source4/heimdal \
"
 
 SRC_URI:append:libc-musl = " \
-- 
2.40.0


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#183011): 
https://lists.openembedded.org/g/openembedded-core/message/183011
Mute This Topic: https://lists.openembedded.org/mt/99568915/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core] [PATCH] samba: fix CVE-2022-45142

2023-06-16 Thread Polampalli, Archana via lists.openembedded.org
The fix for CVE-2022-3437 included changing memcmp to be constant
time and a workaround for a compiler bug by adding "!= 0"
comparisons to the result of memcmp. When these patches were
backported to the heimdal-7.7.1 and heimdal-7.8.0 branches (and
possibly other branches) a logic inversion sneaked in causing the
validation of message integrity codes in gssapi/arcfour to be inverted.

References:
https://nvd.nist.gov/vuln/detail/CVE-2022-45142

Upstream patches:
https://www.openwall.com/lists/oss-security/2023/02/08/1
https://github.com/heimdal/heimdal/commit/5f63215d0d82678233fdfb1c07f4b421f57c528b

Signed-off-by: Archana Polampalli 
---
 .../samba/samba/CVE-2022-45142.patch  | 51 +++
 .../samba/samba_4.14.14.bb|  1 +
 2 files changed, 52 insertions(+)
 create mode 100644 
meta-networking/recipes-connectivity/samba/samba/CVE-2022-45142.patch

diff --git 
a/meta-networking/recipes-connectivity/samba/samba/CVE-2022-45142.patch 
b/meta-networking/recipes-connectivity/samba/samba/CVE-2022-45142.patch
new file mode 100644
index 0..d6b9826e4
--- /dev/null
+++ b/meta-networking/recipes-connectivity/samba/samba/CVE-2022-45142.patch
@@ -0,0 +1,51 @@
+From: Helmut Grohne 
+Subject: [PATCH v3] CVE-2022-45142: gsskrb5: fix accidental logic inversions
+
+The referenced commit attempted to fix miscompilations with gcc-9 and
+gcc-10 by changing `memcmp(...)` to `memcmp(...) != 0`. Unfortunately,
+it also inverted the result of the comparison in two occasions. This
+inversion happened during backporting the patch to 7.7.1 and 7.8.0.
+
+Fixes: f6edaafcfefd ("gsskrb5: CVE-2022-3437 Use constant-time memcmp()
+ for arcfour unwrap")
+Signed-off-by: Helmut Grohne 
+
+Upstream-Status: Backport 
[https://www.openwall.com/lists/oss-security/2023/02/08/1]
+CVE: CVE-2022-45142
+
+Signed-off-by: Archana Polampalli 
+---
+ lib/gssapi/krb5/arcfour.c | 4 ++--
+ 1 file changed, 2 insertions(+), 2 deletions(-)
+
+Changes since v1:
+ * Fix typo in commit message.
+ * Mention 7.8.0 in commit message. Thanks to Jeffrey Altman.
+
+Changes since v2:
+ * Add CVE identifier.
+
+diff --git a/lib/gssapi/krb5/arcfour.c b/lib/gssapi/krb5/arcfour.c
+index e838d007a..eee6ad72f 100644
+--- a/lib/gssapi/krb5/arcfour.c
 b/lib/gssapi/krb5/arcfour.c
+@@ -365,7 +365,7 @@ _gssapi_verify_mic_arcfour(OM_uint32 * minor_status,
+   return GSS_S_FAILURE;
+ }
+
+-cmp = (ct_memcmp(cksum_data, p + 8, 8) == 0);
++cmp = (ct_memcmp(cksum_data, p + 8, 8) != 0);
+ if (cmp) {
+   *minor_status = 0;
+   return GSS_S_BAD_MIC;
+@@ -730,7 +730,7 @@ OM_uint32 _gssapi_unwrap_arcfour(OM_uint32 *minor_status,
+   return GSS_S_FAILURE;
+ }
+
+-cmp = (ct_memcmp(cksum_data, p0 + 16, 8) == 0); /* SGN_CKSUM */
++cmp = (ct_memcmp(cksum_data, p0 + 16, 8) != 0); /* SGN_CKSUM */
+ if (cmp) {
+   _gsskrb5_release_buffer(minor_status, output_message_buffer);
+   *minor_status = 0;
+--
+2.38.1
diff --git a/meta-networking/recipes-connectivity/samba/samba_4.14.14.bb 
b/meta-networking/recipes-connectivity/samba/samba_4.14.14.bb
index 39ba85194..cc07d51dc 100644
--- a/meta-networking/recipes-connectivity/samba/samba_4.14.14.bb
+++ b/meta-networking/recipes-connectivity/samba/samba_4.14.14.bb
@@ -30,6 +30,7 @@ SRC_URI = "${SAMBA_MIRROR}/stable/samba-${PV}.tar.gz \
file://CVE-2022-3437-0006.patch;patchdir=source4/heimdal \
file://CVE-2022-3437-0007.patch;patchdir=source4/heimdal \
file://CVE-2022-3437-0008.patch;patchdir=source4/heimdal \
+   file://CVE-2022-45142.patch;patchdir=source4/heimdal \
"
 
 SRC_URI:append:libc-musl = " \
-- 
2.40.0


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#183010): 
https://lists.openembedded.org/g/openembedded-core/message/183010
Mute This Topic: https://lists.openembedded.org/mt/99568906/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core] [PATCH] samba: fix CVE-2022-3437

2023-06-16 Thread Polampalli, Archana via lists.openembedded.org
A heap-based buffer overflow vulnerability was found in Samba within
the GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal. The
DES and Triple-DES decryption routines in the Heimdal GSSAPI library
allow a length-limited write buffer overflow on malloc() allocated
memory when presented with a maliciously small packet. This flaw
allows a remote user to send specially crafted malicious data to the
application, possibly resulting in a denial of service (DoS) attack.

References:
https://nvd.nist.gov/vuln/detail/CVE-2022-3437

Upstream patches:
https://github.com/heimdal/heimdal/commit/f6edaafcfefd843ca1b1a041f942a853d85ee7c3
https://github.com/heimdal/heimdal/commit/c9cc34334bd64b08fe91a2f720262462e9f6bb49
https://github.com/heimdal/heimdal/commit/a587a4bcb28d5b9047f332573b1e7c8f89ca3edd
https://github.com/heimdal/heimdal/commit/c758910eaad3c0de2cfb68830a661c4739675a7d
https://github.com/heimdal/heimdal/commit/414b2a77fd61c26d64562e3800dc5578d9d0f15d
https://github.com/heimdal/heimdal/commit/be9bbd93ed8f204b4bc1b92d1bc3c16aac194696
https://github.com/heimdal/heimdal/commit/c8407ca079294d76a5ed140ba5b546f870d23ed2
https://github.com/heimdal/heimdal/commit/8fb508a25a6a47289c73e3f4339352a73a396eef

Signed-off-by: Archana Polampalli 
---
 .../samba/samba/CVE-2022-3437-0001.patch  | 77 +++
 .../samba/samba/CVE-2022-3437-0002.patch  | 35 +
 .../samba/samba/CVE-2022-3437-0003.patch  | 50 
 .../samba/samba/CVE-2022-3437-0004.patch  | 57 ++
 .../samba/samba/CVE-2022-3437-0005.patch  | 37 +
 .../samba/samba/CVE-2022-3437-0006.patch  | 65 
 .../samba/samba/CVE-2022-3437-0007.patch  | 39 ++
 .../samba/samba/CVE-2022-3437-0008.patch  | 48 
 .../samba/samba_4.14.14.bb|  8 ++
 9 files changed, 416 insertions(+)
 create mode 100644 
meta-networking/recipes-connectivity/samba/samba/CVE-2022-3437-0001.patch
 create mode 100644 
meta-networking/recipes-connectivity/samba/samba/CVE-2022-3437-0002.patch
 create mode 100644 
meta-networking/recipes-connectivity/samba/samba/CVE-2022-3437-0003.patch
 create mode 100644 
meta-networking/recipes-connectivity/samba/samba/CVE-2022-3437-0004.patch
 create mode 100644 
meta-networking/recipes-connectivity/samba/samba/CVE-2022-3437-0005.patch
 create mode 100644 
meta-networking/recipes-connectivity/samba/samba/CVE-2022-3437-0006.patch
 create mode 100644 
meta-networking/recipes-connectivity/samba/samba/CVE-2022-3437-0007.patch
 create mode 100644 
meta-networking/recipes-connectivity/samba/samba/CVE-2022-3437-0008.patch

diff --git 
a/meta-networking/recipes-connectivity/samba/samba/CVE-2022-3437-0001.patch 
b/meta-networking/recipes-connectivity/samba/samba/CVE-2022-3437-0001.patch
new file mode 100644
index 0..abc778b73
--- /dev/null
+++ b/meta-networking/recipes-connectivity/samba/samba/CVE-2022-3437-0001.patch
@@ -0,0 +1,77 @@
+From f6edaafcfefd843ca1b1a041f942a853d85ee7c3 Mon Sep 17 00:00:00 2001
+From: Joseph Sutton 
+Date: Wed, 12 Oct 2022 13:57:13 +1300
+Subject: [PATCH] gsskrb5: CVE-2022-3437 Use constant-time memcmp() for arcfour
+ unwrap
+
+Samba BUG: https://bugzilla.samba.org/show_bug.cgi?id=15134
+
+Signed-off-by: Joseph Sutton 
+Reviewed-by: Andrew Bartlett 
+
+Upstream-Status: Backport 
[https://github.com/heimdal/heimdal/commit/f6edaafcfefd843ca1b1a041f942a853d85ee7c3]
+CVE: CVE-2022-3437
+
+Signed-off-by: Archana Polampalli 
+---
+ lib/gssapi/krb5/arcfour.c | 16 
+ 1 file changed, 8 insertions(+), 8 deletions(-)
+
+diff --git a/lib/gssapi/krb5/arcfour.c b/lib/gssapi/krb5/arcfour.c
+index a61f768..4fc46ce 100644
+--- a/lib/gssapi/krb5/arcfour.c
 b/lib/gssapi/krb5/arcfour.c
+@@ -365,7 +365,7 @@ _gssapi_verify_mic_arcfour(OM_uint32 * minor_status,
+   return GSS_S_FAILURE;
+ }
+
+-cmp = ct_memcmp(cksum_data, p + 8, 8);
++cmp = (ct_memcmp(cksum_data, p + 8, 8) == 0);
+ if (cmp) {
+   *minor_status = 0;
+   return GSS_S_BAD_MIC;
+@@ -385,9 +385,9 @@ _gssapi_verify_mic_arcfour(OM_uint32 * minor_status,
+ _gsskrb5_decode_be_om_uint32(SND_SEQ, _number);
+
+ if (context_handle->more_flags & LOCAL)
+-  cmp = memcmp(_SEQ[4], "\xff\xff\xff\xff", 4);
++  cmp = (ct_memcmp(_SEQ[4], "\xff\xff\xff\xff", 4) != 0);
+ else
+-  cmp = memcmp(_SEQ[4], "\x00\x00\x00\x00", 4);
++  cmp = (ct_memcmp(_SEQ[4], "\x00\x00\x00\x00", 4) != 0);
+
+ memset(SND_SEQ, 0, sizeof(SND_SEQ));
+ if (cmp != 0) {
+@@ -656,9 +656,9 @@ OM_uint32 _gssapi_unwrap_arcfour(OM_uint32 *minor_status,
+ _gsskrb5_decode_be_om_uint32(SND_SEQ, _number);
+
+ if (context_handle->more_flags & LOCAL)
+-  cmp = memcmp(_SEQ[4], "\xff\xff\xff\xff", 4);
++  cmp = (ct_memcmp(_SEQ[4], "\xff\xff\xff\xff", 4) != 0);
+ else
+-  cmp = memcmp(_SEQ[4], "\x00\x00\x00\x00", 4);
++  cmp = (ct_memcmp(_SEQ[4], "\x00\x00\x00\x00", 4) != 0);
+
+ if (cmp != 0) {
+   

Re: [OE-core] [PATCH 08/55] ghostscript: remove mkdir-p.patch

2023-06-16 Thread Ross Burton
On 14 Jun 2023, at 10:28, Alexander Kanavin via lists.openembedded.org 
 wrote:
> 
> The scenario where things break down without this patch is not clear:
> it's a make rule, and so make itself will ensure it's not run several times
> in parallel.
> 
> Signed-off-by: Alexander Kanavin 

Drop this, I’ve incorporated it into my ghostscript rewrite patch that I just 
sent.

Ross
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#183008): 
https://lists.openembedded.org/g/openembedded-core/message/183008
Mute This Topic: https://lists.openembedded.org/mt/99524144/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core] [PATCH] ghostscript: mostly rewrite recipe

2023-06-16 Thread Ross Burton
From: Ross Burton 

This started as a patch cleanup but escalated rapidly.

Remove unneeded patches:
- mkdir-p.patch isn't needed now the Makefiles appear to have the correct
  dependencies.
- ghostscript-9.15-parallel-make.patch appears to be unneeded for the same
  reason
- base-genht.c-add-a-preprocessor-define-to-allow-fope.patch isn't needed
- cups-no-gcrypt.patch isn't needed
- do-not-check-local-libpng-source.patch can be replaced by deleting
  the libpng/ directory, as is already done for jpeg/
- ghostscript-9.21-native-fix-disable-system-libtiff.patch is not needed
  when we stop doing native builds (see below)

Remove the need for ghostscript-native to build and install tools that
are needed at target build-time: ghostscript can do this itself.  Remove
the BBCLASSEXTEND and all of the native overrides.

Inherit pkgconfig and explicitly tell configure to use the pkgconfig
binary: unless told otherwise this configure will refuse to use an
unprefixed pkgconfig in cross builds.

Review DEPENDS and add missing freetype and zlib dependencies.

Ghostcript will use the embedded copies of libraries over system
libraries, so extend the deletion of jpeg and libpng to include expat,
freetype, zlib, and cups as we want to link to our build of those.

Add PACKAGECONFIGs for optional libidn and libpaper dependencies.

Remove HAVE_SYS_TIME_H assignments, the upstream bug was fixed in 2011.

Clean up comments: there's no need to explain how to use PACKAGECONFIG,
and justify the use of autotools-brokensep.

Signed-off-by: Ross Burton 
---
 .../avoid-host-contamination.patch|  3 +-
 ...-a-preprocessor-define-to-allow-fope.patch | 42 
 .../ghostscript/cups-no-gcrypt.patch  | 37 ---
 .../do-not-check-local-libpng-source.patch| 31 --
 .../ghostscript-9.15-parallel-make.patch  | 28 --
 ...21-native-fix-disable-system-libtiff.patch | 47 -
 .../ghostscript/ghostscript/mkdir-p.patch | 50 --
 .../ghostscript/ghostscript_10.01.1.bb| 96 ---
 8 files changed, 20 insertions(+), 314 deletions(-)
 delete mode 100644 
meta/recipes-extended/ghostscript/ghostscript/base-genht.c-add-a-preprocessor-define-to-allow-fope.patch
 delete mode 100644 
meta/recipes-extended/ghostscript/ghostscript/cups-no-gcrypt.patch
 delete mode 100644 
meta/recipes-extended/ghostscript/ghostscript/do-not-check-local-libpng-source.patch
 delete mode 100644 
meta/recipes-extended/ghostscript/ghostscript/ghostscript-9.15-parallel-make.patch
 delete mode 100644 
meta/recipes-extended/ghostscript/ghostscript/ghostscript-9.21-native-fix-disable-system-libtiff.patch
 delete mode 100644 meta/recipes-extended/ghostscript/ghostscript/mkdir-p.patch

diff --git 
a/meta/recipes-extended/ghostscript/ghostscript/avoid-host-contamination.patch 
b/meta/recipes-extended/ghostscript/ghostscript/avoid-host-contamination.patch
index e8cb16c36b4..15c7eb5a774 100644
--- 
a/meta/recipes-extended/ghostscript/ghostscript/avoid-host-contamination.patch
+++ 
b/meta/recipes-extended/ghostscript/ghostscript/avoid-host-contamination.patch
@@ -5,8 +5,7 @@ Subject: [PATCH 04/10] avoid host contamination
 
 Remove hardcode path refer to host to avoid host contamination.
 
-Upstream-Status: Inappropriate [embedded specific]
-
+Upstream-Status: Pending
 Signed-off-by: Kai Kang 
 
 Rebase to 9.23
diff --git 
a/meta/recipes-extended/ghostscript/ghostscript/base-genht.c-add-a-preprocessor-define-to-allow-fope.patch
 
b/meta/recipes-extended/ghostscript/ghostscript/base-genht.c-add-a-preprocessor-define-to-allow-fope.patch
deleted file mode 100644
index 7d80066a80e..000
--- 
a/meta/recipes-extended/ghostscript/ghostscript/base-genht.c-add-a-preprocessor-define-to-allow-fope.patch
+++ /dev/null
@@ -1,42 +0,0 @@
-From 9ca6f795409b988d38dd98bc2a6ecb68a9392312 Mon Sep 17 00:00:00 2001
-From: Hongxu Jia 
-Date: Thu, 29 Mar 2018 16:37:40 +0800
-Subject: [PATCH 10/10] base/genht.c: add a preprocessor define to allow fopen
- calling
-
-The commit in upstream:
-http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=773c69e46e70bdd5482676437dafd2ca83397643
-
-Replace all fopen calls with gp_fopen and add a preprocessor define so
-that any unintential calls directly to fopen will cause an error.
-
-Only exceptions are those in the platform specific code, and mkromfs.c.
-This patch add a preprocessor define to allow fopen calling in
-base/genht.c.
-
-Upstream-Status: Pending
-
-Rebase to 9.23
-Signed-off-by: Hongxu Jia 

- base/genht.c | 4 
- 1 file changed, 4 insertions(+)
-
-diff --git a/base/genht.c b/base/genht.c
-index e597e72..e96bfb5 100644
 a/base/genht.c
-+++ b/base/genht.c
-@@ -16,6 +16,10 @@
- 
- /* Generate C code for compiling halftones into ROM. */
- #include "malloc_.h"
-+
-+/* prevent gp.h from defining fopen */
-+#define fopen fopen
-+
- #include "stdio_.h"
- #include "string_.h"
- #include "gscdefs.h"
--- 
-1.8.3.1
-
diff --git 

Re: [OE-core] [PATCH] baremetal-helloworld: Update SRCREV to fix entry addresses for ARM architectures

2023-06-16 Thread Richard Purdie
On Fri, 2023-06-09 at 16:12 -0600, Alejandro Hernandez Samaniego wrote:
> Update to the latest SRCREV to bring fixes using the proper entry
> addresses for ARM architectures [1], as well as fixing a race condition
> in the Makefile during assembly [2].
> 
> Fix url in case automatic redirects stop working.
> 
> [1] 
> https://github.com/ahcbb6/baremetal-helloqemu/commit/602e82aee7ae95ee50eedb7f40c4a225ec5a3fb9
> [2] 
> https://github.com/ahcbb6/baremetal-helloqemu/commit/ea7f59b02467ed1fb36c3b4c6d5cabe702df26ec
> 
> Signed-off-by: Alejandro Enedino Hernandez Samaniego 
> ---
>  .../baremetal-example/baremetal-helloworld_git.bb | 4 ++--
>  1 file changed, 2 insertions(+), 2 deletions(-)
> 
> diff --git 
> a/meta/recipes-extended/baremetal-example/baremetal-helloworld_git.bb 
> b/meta/recipes-extended/baremetal-example/baremetal-helloworld_git.bb
> index 82b2901d51..4182372057 100644
> --- a/meta/recipes-extended/baremetal-example/baremetal-helloworld_git.bb
> +++ b/meta/recipes-extended/baremetal-example/baremetal-helloworld_git.bb
> @@ -4,10 +4,10 @@ DESCRIPTION = "These are introductory examples to showcase 
> the use of QEMU to ru
>  LICENSE = "MIT"
>  LIC_FILES_CHKSUM = "file://LICENSE;md5=39346640a23c701e4f459e05f56f4449"
>  
> -SRCREV = "22016ecbb9fb6c5f3a7a06698aea7ff8a701c166"
> +SRCREV = "ea7f59b02467ed1fb36c3b4c6d5cabe702df26ec"
>  PV = "0.1+git${SRCPV}"
>  
> -SRC_URI = 
> "git://github.com/aehs29/baremetal-helloqemu.git;protocol=https;branch=master"
> +SRC_URI = 
> "git://github.com/ahcbb6/baremetal-helloqemu.git;protocol=https;branch=master"
>  UPSTREAM_VERSION_UNKNOWN="1"
>  
>  S = "${WORKDIR}/git"

I think there is a build race in here:

https://autobuilder.yoctoproject.org/typhoon/#/builders/127/builds/1609/steps/14/logs/stdio

Fatal error: can't create build/hello_baremetal_aarch64.o: No such file
or directory

so perhaps racing on the creation of build/ ?

Cheers,

Richard


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#183006): 
https://lists.openembedded.org/g/openembedded-core/message/183006
Mute This Topic: https://lists.openembedded.org/mt/99438806/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core] [PATCH 5/5] rpcsvc-proto: Upgrade to 1.4.4

2023-06-16 Thread Khem Raj
Drop already upstreamed patch in 1.4.4

Signed-off-by: Khem Raj 
---
 .../rpcsvc-proto/rpcsvc-proto.bb  |  5 +-
 ...FILE-macro-to-control-largefile-supp.patch | 80 ---
 .../0001-Use-cross-compiled-rpcgen.patch  | 11 +--
 3 files changed, 6 insertions(+), 90 deletions(-)
 delete mode 100644 
meta/recipes-extended/rpcsvc-proto/rpcsvc-proto/0001-Use-AC_SYS_LARGEFILE-macro-to-control-largefile-supp.patch

diff --git a/meta/recipes-extended/rpcsvc-proto/rpcsvc-proto.bb 
b/meta/recipes-extended/rpcsvc-proto/rpcsvc-proto.bb
index 00919a3d70e..20933153a32 100644
--- a/meta/recipes-extended/rpcsvc-proto/rpcsvc-proto.bb
+++ b/meta/recipes-extended/rpcsvc-proto/rpcsvc-proto.bb
@@ -15,13 +15,12 @@ LIC_FILES_CHKSUM = 
"file://COPYING;md5=0daaf958d5531ab86169ec6e275e1517"
 SECTION = "libs"
 DEPENDS += "rpcsvc-proto-native"
 
-PV = "1.4.3"
+PV = "1.4.4"
 
-SRCREV = "71e0a12c04d130a78674ac6309eefffa6ecee612"
+SRCREV = "c65926005e50da02a4da3e26abc42eded36cd19d"
 
 SRC_URI = "git://github.com/thkukuk/${BPN};branch=master;protocol=https \
file://0001-Use-cross-compiled-rpcgen.patch \
-   
file://0001-Use-AC_SYS_LARGEFILE-macro-to-control-largefile-supp.patch \
"
 
 S = "${WORKDIR}/git"
diff --git 
a/meta/recipes-extended/rpcsvc-proto/rpcsvc-proto/0001-Use-AC_SYS_LARGEFILE-macro-to-control-largefile-supp.patch
 
b/meta/recipes-extended/rpcsvc-proto/rpcsvc-proto/0001-Use-AC_SYS_LARGEFILE-macro-to-control-largefile-supp.patch
deleted file mode 100644
index f07866d55ae..000
--- 
a/meta/recipes-extended/rpcsvc-proto/rpcsvc-proto/0001-Use-AC_SYS_LARGEFILE-macro-to-control-largefile-supp.patch
+++ /dev/null
@@ -1,80 +0,0 @@
-From 6820c53c3952f78185beb59f767c372fc745dcf3 Mon Sep 17 00:00:00 2001
-From: Khem Raj 
-Date: Sun, 11 Dec 2022 21:42:59 -0800
-Subject: [PATCH] Use AC_SYS_LARGEFILE macro to control largefile support
-
-The autoconf macro AC_SYS_LARGEFILE defines _FILE_OFFSET_BITS=64
-where necessary to ensure that off_t and all interfaces using off_t
-are 64bit, even on 32bit systems.
-
-replace stat64 by equivalent stat struct/func
-
-Upstream-Status: Accepted [https://github.com/thkukuk/rpcsvc-proto/pull/15]
-Signed-off-by: Khem Raj 

- configure.ac  |  1 +
- rpcgen/rpc_main.c | 16 +---
- 2 files changed, 6 insertions(+), 11 deletions(-)
-
-diff --git a/configure.ac b/configure.ac
-index bacc2fb..a9fc730 100644
 a/configure.ac
-+++ b/configure.ac
-@@ -8,6 +8,7 @@ AC_PREFIX_DEFAULT(/usr)
- AC_SUBST(PACKAGE)
- AC_SUBST(VERSION)
- 
-+AC_SYS_LARGEFILE
- AC_PROG_CC
- AC_GNU_SOURCE
- AM_PROG_CC_C_O
-diff --git a/rpcgen/rpc_main.c b/rpcgen/rpc_main.c
-index 277adc6..fd7dea9 100644
 a/rpcgen/rpc_main.c
-+++ b/rpcgen/rpc_main.c
-@@ -62,12 +62,6 @@
- #define EXTEND1   /* alias for TRUE */
- #define DONT_EXTEND   0   /* alias for FALSE */
- 
--#ifdef __APPLE__
--# if __DARWIN_ONLY_64_BIT_INO_T
--#  define stat64 stat
--# endif
--#endif
--
- struct commandline
-   {
- int cflag;/* xdr C routines */
-@@ -337,9 +331,9 @@ clear_args (void)
- static void
- find_cpp (void)
- {
--  struct stat64 buf;
-+  struct stat buf;
- 
--  if (stat64 (CPP, ) == 0)
-+  if (stat (CPP, ) == 0)
- return;
- 
-   if (cppDefined) /* user specified cpp but it does not exist */
-@@ -1125,17 +1119,17 @@ putarg (int whereto, const char *cp)
- static void
- checkfiles (const char *infile, const char *outfile)
- {
--  struct stat64 buf;
-+  struct stat buf;
- 
-   if (infile) /* infile ! = NULL */
--if (stat64 (infile, ) < 0)
-+if (stat (infile, ) < 0)
-   {
-   perror (infile);
-   crash ();
-   }
-   if (outfile)
- {
--  if (stat64 (outfile, ) < 0)
-+  if (stat (outfile, ) < 0)
-   return; /* file does not exist */
-   else
-   {
diff --git 
a/meta/recipes-extended/rpcsvc-proto/rpcsvc-proto/0001-Use-cross-compiled-rpcgen.patch
 
b/meta/recipes-extended/rpcsvc-proto/rpcsvc-proto/0001-Use-cross-compiled-rpcgen.patch
index 208974004b4..8e459b5634f 100644
--- 
a/meta/recipes-extended/rpcsvc-proto/rpcsvc-proto/0001-Use-cross-compiled-rpcgen.patch
+++ 
b/meta/recipes-extended/rpcsvc-proto/rpcsvc-proto/0001-Use-cross-compiled-rpcgen.patch
@@ -10,14 +10,11 @@ Signed-off-by: Khem Raj 
  rpcsvc/Makefile.am | 2 +-
  1 file changed, 1 insertion(+), 1 deletion(-)
 
-Index: git/rpcsvc/Makefile.am
-===
 git.orig/rpcsvc/Makefile.am
-+++ git/rpcsvc/Makefile.am
-@@ -12,5 +12,5 @@ nodist_rpcsvc_HEADERS = klm_prot.h nlm_p
+--- a/rpcsvc/Makefile.am
 b/rpcsvc/Makefile.am
+@@ -12,4 +12,4 @@ nodist_rpcsvc_HEADERS = klm_prot.h nlm_p
nfs_prot.h rquota.h sm_inter.h
  
- %.h: %.x
+ .x.h:
 -  $(top_builddir)/rpcgen/rpcgen -h -o $@ $<
 +  rpcgen -h -o $@ $<
- 
-- 
2.41.0


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online 

[OE-core] [PATCH 3/5] llvm: Bump to 16.0.6

2023-06-16 Thread Khem Raj
Brings a single change
[lld][WebAssembly] Fix stub library parsing with windows line endings

Signed-off-by: Khem Raj 
---
 meta/recipes-devtools/llvm/llvm_git.bb | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/meta/recipes-devtools/llvm/llvm_git.bb 
b/meta/recipes-devtools/llvm/llvm_git.bb
index 8b0ab11b612..f3d6f24bd2d 100644
--- a/meta/recipes-devtools/llvm/llvm_git.bb
+++ b/meta/recipes-devtools/llvm/llvm_git.bb
@@ -14,14 +14,14 @@ RDEPENDS:${PN}:append:class-target = " ncurses-terminfo"
 
 inherit cmake pkgconfig
 
-PV = "16.0.5"
+PV = "16.0.6"
 
 MAJOR_VERSION = "${@oe.utils.trim_version("${PV}", 1)}"
 
 LLVM_RELEASE = "${PV}"
 
 BRANCH = "release/${MAJOR_VERSION}.x"
-SRCREV = "185b81e034ba60081023b6e59504dfffb560f3e3"
+SRCREV = "7cbf1a2591520c2491aa35339f227775f4d3adf6"
 SRC_URI = 
"git://github.com/llvm/llvm-project.git;branch=${BRANCH};protocol=https \
file://0007-llvm-allow-env-override-of-exe-path.patch;striplevel=2 \

file://0001-AsmMatcherEmitter-sort-ClassInfo-lists-by-name-as-we.patch;striplevel=2
 \
-- 
2.41.0


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#183003): 
https://lists.openembedded.org/g/openembedded-core/message/183003
Mute This Topic: https://lists.openembedded.org/mt/99566496/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core] [PATCH 4/5] go-helloworld: Upgrade to tip of trunk

2023-06-16 Thread Khem Raj
Signed-off-by: Khem Raj 
---
 meta/recipes-extended/go-examples/go-helloworld_0.1.bb | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/meta/recipes-extended/go-examples/go-helloworld_0.1.bb 
b/meta/recipes-extended/go-examples/go-helloworld_0.1.bb
index 5483ecc307b..ce6ec08c59b 100644
--- a/meta/recipes-extended/go-examples/go-helloworld_0.1.bb
+++ b/meta/recipes-extended/go-examples/go-helloworld_0.1.bb
@@ -6,7 +6,7 @@ LICENSE = "MIT"
 LIC_FILES_CHKSUM = 
"file://${COMMON_LICENSE_DIR}/MIT;md5=0835ade698e0bcf8506ecda2f7b4f302"
 
 SRC_URI = "git://go.googlesource.com/example;branch=master;protocol=https"
-SRCREV = "2e68773dfca072cb81f219fc3b97ad34fe9d9f94"
+SRCREV = "5bec756976671f30903223ec46ff8a70dced4954"
 UPSTREAM_CHECK_COMMITS = "1"
 
 GO_IMPORT = "golang.org/x/example"
-- 
2.41.0


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#183004): 
https://lists.openembedded.org/g/openembedded-core/message/183004
Mute This Topic: https://lists.openembedded.org/mt/99566497/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core] [PATCH 1/5] kernel: Add kernel specific STRIP variable

2023-06-16 Thread Khem Raj
strip can be coming from binutils or from llvm
in some cases llvm-strip can fail on kernel

Subprocess output:aarch64-yoe-linux-llvm-strip: error: Link field value 28 in 
section .rela.dyn is not a symbol table

This helps in selecting which strip is used when building kernel

Signed-off-by: Khem Raj 
Cc: Bruce Ashfield 
---
 meta/classes-recipe/kernel-arch.bbclass| 3 +++
 meta/classes-recipe/kernel-devicetree.bbclass  | 2 +-
 meta/classes-recipe/kernel-yocto.bbclass   | 4 +++-
 meta/classes-recipe/kernel.bbclass | 6 +-
 meta/classes-recipe/module.bbclass | 7 +++
 .../make-mod-scripts/make-mod-scripts_1.0.bb   | 1 +
 meta/recipes-kernel/systemtap/systemtap-uprobes_git.bb | 2 ++
 7 files changed, 22 insertions(+), 3 deletions(-)

diff --git a/meta/classes-recipe/kernel-arch.bbclass 
b/meta/classes-recipe/kernel-arch.bbclass
index 58770489167..6e19dbbba89 100644
--- a/meta/classes-recipe/kernel-arch.bbclass
+++ b/meta/classes-recipe/kernel-arch.bbclass
@@ -70,10 +70,13 @@ TARGET_AR_KERNEL_ARCH ?= ""
 HOST_AR_KERNEL_ARCH ?= "${TARGET_AR_KERNEL_ARCH}"
 TARGET_OBJCOPY_KERNEL_ARCH ?= ""
 HOST_OBJCOPY_KERNEL_ARCH ?= "${TARGET_OBJCOPY_KERNEL_ARCH}"
+TARGET_STRIP_KERNEL_ARCH ?= ""
+HOST_STRIP_KERNEL_ARCH ?= "${TARGET_STRIP_KERNEL_ARCH}"
 
 KERNEL_CC = "${CCACHE}${HOST_PREFIX}gcc ${HOST_CC_KERNEL_ARCH} -fuse-ld=bfd 
${DEBUG_PREFIX_MAP} -fdebug-prefix-map=${STAGING_KERNEL_DIR}=${KERNEL_SRC_PATH} 
-fdebug-prefix-map=${STAGING_KERNEL_BUILDDIR}=${KERNEL_SRC_PATH}"
 KERNEL_LD = "${CCACHE}${HOST_PREFIX}ld.bfd ${HOST_LD_KERNEL_ARCH}"
 KERNEL_AR = "${CCACHE}${HOST_PREFIX}ar ${HOST_AR_KERNEL_ARCH}"
 KERNEL_OBJCOPY = "${CCACHE}${HOST_PREFIX}objcopy ${HOST_OBJCOPY_KERNEL_ARCH}"
+KERNEL_STRIP = "${CCACHE}${HOST_PREFIX}strip ${HOST_STRIP_KERNEL_ARCH}"
 TOOLCHAIN ?= "gcc"
 
diff --git a/meta/classes-recipe/kernel-devicetree.bbclass 
b/meta/classes-recipe/kernel-devicetree.bbclass
index 7ccf4b76c82..eff052b4029 100644
--- a/meta/classes-recipe/kernel-devicetree.bbclass
+++ b/meta/classes-recipe/kernel-devicetree.bbclass
@@ -73,7 +73,7 @@ do_compile:append() {
 
for dtbf in ${KERNEL_DEVICETREE}; do
dtb=`normalize_dtb "$dtbf"`
-   oe_runmake $dtb CC="${KERNEL_CC} $cc_extra " LD="${KERNEL_LD}" 
OBJCOPY="${KERNEL_OBJCOPY}" ${KERNEL_EXTRA_ARGS}
+   oe_runmake $dtb CC="${KERNEL_CC} $cc_extra " LD="${KERNEL_LD}" 
OBJCOPY="${KERNEL_OBJCOPY}" STRIP="${KERNEL_STRIP}" ${KERNEL_EXTRA_ARGS}
done
 }
 
diff --git a/meta/classes-recipe/kernel-yocto.bbclass 
b/meta/classes-recipe/kernel-yocto.bbclass
index ceb451b6996..3f2ce17aeb8 100644
--- a/meta/classes-recipe/kernel-yocto.bbclass
+++ b/meta/classes-recipe/kernel-yocto.bbclass
@@ -447,7 +447,7 @@ do_kernel_configme() {
bbfatal_log "Could not find configuration queue 
(${meta_dir}/config.queue)"
fi
 
-   CFLAGS="${CFLAGS} ${TOOLCHAIN_OPTIONS}" HOSTCC="${BUILD_CC} 
${BUILD_CFLAGS} ${BUILD_LDFLAGS}" HOSTCPP="${BUILD_CPP}" CC="${KERNEL_CC}" 
LD="${KERNEL_LD}" OBJCOPY="${KERNEL_OBJCOPY}" ARCH=${ARCH} merge_config.sh -O 
${B} ${config_flags} ${configs} > ${meta_dir}/cfg/merge_config_build.log 2>&1
+   CFLAGS="${CFLAGS} ${TOOLCHAIN_OPTIONS}" HOSTCC="${BUILD_CC} 
${BUILD_CFLAGS} ${BUILD_LDFLAGS}" HOSTCPP="${BUILD_CPP}" CC="${KERNEL_CC}" 
LD="${KERNEL_LD}" OBJCOPY="${KERNEL_OBJCOPY}" STRIP="${KERNEL_STRIP}" 
ARCH=${ARCH} merge_config.sh -O ${B} ${config_flags} ${configs} > 
${meta_dir}/cfg/merge_config_build.log 2>&1
if [ $? -ne 0 -o ! -f ${B}/.config ]; then
bberror "Could not generate a .config for 
${KMACHINE}-${LINUX_KERNEL_TYPE}"
if [ ${KCONF_AUDIT_LEVEL} -gt 1 ]; then
@@ -482,6 +482,7 @@ python do_config_analysis() {
 env['LD'] = d.getVar('KERNEL_LD')
 env['CC'] = d.getVar('KERNEL_CC')
 env['OBJCOPY'] = d.getVar('KERNEL_OBJCOPY')
+env['STRIP'] = d.getVar('KERNEL_STRIP')
 env['ARCH'] = d.getVar('ARCH')
 env['srctree'] = s
 
@@ -544,6 +545,7 @@ python do_kernel_configcheck() {
 env['LD'] = d.getVar('KERNEL_LD')
 env['CC'] = d.getVar('KERNEL_CC')
 env['OBJCOPY'] = d.getVar('KERNEL_OBJCOPY')
+env['STRIP'] = d.getVar('KERNEL_STRIP')
 env['ARCH'] = d.getVar('ARCH')
 env['srctree'] = s
 
diff --git a/meta/classes-recipe/kernel.bbclass 
b/meta/classes-recipe/kernel.bbclass
index 5ed4a2e03c7..c1d74bf54ad 100644
--- a/meta/classes-recipe/kernel.bbclass
+++ b/meta/classes-recipe/kernel.bbclass
@@ -241,7 +241,7 @@ UBOOT_LOADADDRESS ?= "${UBOOT_ENTRYPOINT}"
 # Some Linux kernel configurations need additional parameters on the command 
line
 KERNEL_EXTRA_ARGS ?= ""
 
-EXTRA_OEMAKE += ' CC="${KERNEL_CC}" LD="${KERNEL_LD}" 
OBJCOPY="${KERNEL_OBJCOPY}"'
+EXTRA_OEMAKE += ' CC="${KERNEL_CC}" LD="${KERNEL_LD}" 
OBJCOPY="${KERNEL_OBJCOPY}" STRIP="${KERNEL_STRIP}"'
 EXTRA_OEMAKE += ' HOSTCC="${BUILD_CC}" 

[OE-core] [PATCH 2/5] libxml2: Do not use lld linker when building with tests on rv64

2023-06-16 Thread Khem Raj
lld ends up with errors on some tests
| riscv64-yoe-linux-ld.lld: error: section size decrease is too large

Therefore do not use lld when building ptests

Signed-off-by: Khem Raj 
---
 meta/recipes-core/libxml/libxml2_2.10.4.bb | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/meta/recipes-core/libxml/libxml2_2.10.4.bb 
b/meta/recipes-core/libxml/libxml2_2.10.4.bb
index 288631504ce..4f3b17093e4 100644
--- a/meta/recipes-core/libxml/libxml2_2.10.4.bb
+++ b/meta/recipes-core/libxml/libxml2_2.10.4.bb
@@ -40,6 +40,8 @@ inherit autotools pkgconfig binconfig-disabled ptest
 
 inherit ${@bb.utils.contains('PACKAGECONFIG', 'python', 'python3targetconfig', 
'', d)}
 
+LDFLAGS:append:riscv64 = "${@bb.utils.contains('DISTRO_FEATURES', 'ld-is-lld 
ptest', ' -fuse-ld=bfd', '', d)}"
+
 RDEPENDS:${PN}-ptest += "bash make locale-base-en-us 
${@bb.utils.contains('PACKAGECONFIG', 'python', 'libgcc python3-core 
python3-logging python3-shell python3-stringold python3-threading 
python3-unittest ${PN}-python', '', d)}"
 
 RDEPENDS:${PN}-python += "${@bb.utils.contains('PACKAGECONFIG', 'python', 
'python3-core', '', d)}"
-- 
2.41.0


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#183002): 
https://lists.openembedded.org/g/openembedded-core/message/183002
Mute This Topic: https://lists.openembedded.org/mt/99566495/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



Re: [OE-core] [PATCH 13/55] glib-2.0: backport a patch to address ptest fails caused by coreutils 9.2+

2023-06-16 Thread Alexander Kanavin
On Fri, 16 Jun 2023 at 00:34, Alexandre Belloni
 wrote:
>
> On 16/06/2023 00:27:00+0200, Alexandre Belloni wrote:
> > Hello,
> >
> > Which ptest are you trying to fix?
> >
> > I got:
> > https://autobuilder.yoctoproject.org/typhoon/#/builders/82/builds/5023/steps/13/logs/stdio
> > https://autobuilder.yoctoproject.org/typhoon/#/builders/81/builds/5207/steps/12/logs/stdio
> > {'glib-2.0': ['glib/file.test']}
> >
>
> This is probably because I didn't take the coreutils patch following
> Ross' comment.

That's right. This fix is tightly coupled with the coreutils update.
glib upstream did further fixing to make it backwards compatible with
older coreutils, but we don't need to take that as our versions are
deterministic.

Ross sent a patch for the coreutils issue he saw.

Alex

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#183000): 
https://lists.openembedded.org/g/openembedded-core/message/183000
Mute This Topic: https://lists.openembedded.org/mt/99524149/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



Re: [OE-core] [PATCH 0/3] wayland/weston upgrades

2023-06-16 Thread Richard Purdie
On Thu, 2023-06-15 at 20:20 +0100, Eilís 'pidge' Ní Fhlannagáin wrote:
> Nothing really surprising here, except we should note that launcher-logind is 
> being depreciated so some thought on how that is dealt with will need to 
> occur.
> 
> Eilís 'pidge' Ní Fhlannagáin (3):
>   wayland-utils: upgrade 1.1.0 -> 1.2.0
>   weston: Upgrade 11.0.1 -> 12.0.1
>   xwayland: Upgrade 23.1.1 -> 23.1.2
> 
>  ...ayland-info-Fix-build-without-libdrm.patch | 42 ---
>  ...-utils_1.1.0.bb => wayland-utils_1.2.0.bb} |  3 +-
>  .../{weston_11.0.1.bb => weston_12.0.1.bb}| 10 +++--
>  ...{xwayland_23.1.1.bb => xwayland_23.1.2.bb} |  2 +-
>  4 files changed, 9 insertions(+), 48 deletions(-)
>  delete mode 100644 
> meta/recipes-graphics/wayland/files/0001-wayland-info-Fix-build-without-libdrm.patch
>  rename meta/recipes-graphics/wayland/{wayland-utils_1.1.0.bb => 
> wayland-utils_1.2.0.bb} (82%)
>  rename meta/recipes-graphics/wayland/{weston_11.0.1.bb => weston_12.0.1.bb} 
> (92%)
>  rename meta/recipes-graphics/xwayland/{xwayland_23.1.1.bb => 
> xwayland_23.1.2.bb} (95%)

Thanks for these. Unfortunately there is a bit more work needed as I
think you didn't have ptests enabled:

https://autobuilder.yoctoproject.org/typhoon/#/builders/52/builds/7200/steps/11/logs/stdio

| Dependency xcb found: YES 1.15 (cached)
| Run-time dependency xcb-cursor found: NO (tried pkgconfig and cmake)
| 
| ../weston-12.0.1/tests/meson.build:317:2: ERROR: Problem encountered:
xcb and xcb-cursor required for running xwayland tests

which happened on musl and a load of other places in the parent build.

Cheers,

Richard

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#182999): 
https://lists.openembedded.org/g/openembedded-core/message/182999
Mute This Topic: https://lists.openembedded.org/mt/99556211/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-