Re: [OE-core] [morty][PATCH v2] gcc6.4 upgrade

2018-03-09 Thread Martin Jansa
On Fri, Mar 09, 2018 at 11:56:58PM +, Bystricky, Juro wrote:
> I forgot to mention that if there are no objections against this patchset, I 
> intend to do the same/equivalent upgrades for other releases with gcc 6x 
> (rocko, pyro, ...)  and also upgrade gcc5.x and 4.9x where present.

Thanks for this work.

It might be a bit easier to do and review this by starting with rocko
(with just small change on top with newly backported changes) and just
cherry-picking the necessary changes down to pyro and then few more down
to morty (similar to Andre's backports in his branch).

With single big patch it's difficult to make sure that all the branches
got all the changes and to review what's "new" compared to 6.4.0 which
used to be in master.

Regards,

> 
> From: Bystricky, Juro
> Sent: Friday, March 09, 2018 3:49 PM
> To: openembedded-core@lists.openembedded.org
> Cc: richard.pur...@linuxfoundation.org; jurobystri...@hotmail.com; 
> martin.ja...@gmail.com; armccu...@gmail.com; raj.k...@gmail.com; Bystricky, 
> Juro
> Subject: [morty][PATCH v2] gcc6.4 upgrade
> 
> Second attempt. Added some more patches, mostly ARM specific.
> AFAIK this patchset passed all x86-64 tests.
> 
> I also did some limited testing with meta-raspberrypi and musl library.
> 
> (raspberrypi did not build with v1 of the patchset)
> 
> 
> Juro Bystricky (1):
>   gcc6: Upgrade to 6.4.0 (latest stable series release)
> 
>  meta/conf/distro/include/tcmode-default.inc|2 +-
>  ...et-71056-Don-t-use-vectorized-builtins-wh.patch |   92 -
>  .../gcc/gcc-6.2/CVE-2016-4490.patch|  290 ---
>  .../gcc/gcc-6.2/ubsan-fix-check-empty-string.patch |   28 -
>  .../gcc/{gcc-6.2.inc => gcc-6.4.inc}   |   31 +-
>  .../0001-gcc-4.3.1-ARCH_FLAGS_FOR_TARGET.patch |0
>  .../{gcc-6.2 => gcc-6.4}/0002-uclibc-conf.patch|0
>  .../0003-gcc-uclibc-locale-ctype_touplow_t.patch   |0
>  .../{gcc-6.2 => gcc-6.4}/0004-uclibc-locale.patch  |0
>  .../0005-uclibc-locale-no__x.patch |0
>  .../0006-uclibc-locale-wchar_fix.patch |0
>  .../0007-uclibc-locale-update.patch|0
>  .../0008-missing-execinfo_h.patch  |0
>  .../{gcc-6.2 => gcc-6.4}/0009-c99-snprintf.patch   |0
>  .../0010-gcc-poison-system-directories.patch   |0
>  .../0011-gcc-poison-dir-extend.patch   |0
>  .../0012-gcc-4.3.3-SYSROOT_CFLAGS_FOR_TARGET.patch |0
>  .../0013-64-bit-multilib-hack.patch|0
>  .../0014-optional-libstdc.patch|0
>  ...0015-gcc-disable-MASK_RELAX_PIC_CALLS-bit.patch |0
>  .../0016-COLLECT_GCC_OPTIONS.patch |0
>  ...efaults.h-in-B-instead-of-S-and-t-oe-in-B.patch |0
>  .../0018-fortran-cross-compile-hack.patch  |0
>  .../0019-cpp-honor-sysroot.patch   |0
>  .../0020-MIPS64-Default-to-N64-ABI.patch   |0
>  ...C_DYNAMIC_LINKER-and-UCLIBC_DYNAMIC_LINKE.patch |0
>  ...0022-gcc-Fix-argument-list-too-long-error.patch |0
>  .../{gcc-6.2 => gcc-6.4}/0023-Disable-sdt.patch|0
>  .../gcc/{gcc-6.2 => gcc-6.4}/0024-libtool.patch|0
>  ...4-pass-fix-v4bx-to-linker-to-support-EABI.patch |0
>  ...tilib-config-files-from-B-instead-of-usin.patch |0
>  ...-libdir-from-.la-which-usually-points-to-.patch |0
>  .../gcc/{gcc-6.2 => gcc-6.4}/0028-export-CPP.patch |0
>  ...AltiVec-generation-on-powepc-linux-target.patch |0
>  ...-MULTILIB_OSDIRNAMES-and-other-multilib-o.patch |0
>  ...Ensure-target-gcc-headers-can-be-included.patch |0
>  ...-t-build-with-disable-dependency-tracking.patch |0
>  ...h-host-directory-during-relink-if-inst_pr.patch |0
>  ...IBS_DIR-replacement-instead-of-hardcoding.patch |0
>  .../0035-aarch64-Add-support-for-musl-ldso.patch   |0
>  ...ibcc1-fix-libcc1-s-install-path-and-rpath.patch |0
>  ...-handle-sysroot-support-for-nativesdk-gcc.patch |0
>  ...et-sysroot-gcc-version-specific-dirs-with.patch |0
>  ...-various-_FOR_BUILD-and-related-variables.patch |0
>  .../0040-nios2-Define-MUSL_DYNAMIC_LINKER.patch|0
>  .../{gcc-6.2 => gcc-6.4}/0041-ssp_nonshared.patch  |0
>  ...c-libcpp-support-ffile-prefix-map-old-new.patch |0
>  ...ug-prefix-map-to-replace-ffile-prefix-map.patch |0
>  ...-fdebug-prefix-map-support-to-remap-sourc.patch |0
>  ...45-libgcc-Add-knob-to-use-ldbl-128-on-ppc.patch |0
>  ...bgcc-using-LDFLAGS-not-just-SHLIB_LDFLAGS.patch |0
>  ...e-alias-for-__cpu_indicator_init-instead-.patch |0
>  .../gcc-6.4/0048-sync-gcc-stddef.h-with-musl.patch |   91 +
>  .../gcc/gcc-6.4/0054_all_nopie-all-flags.patch |   22 +
>  .../gcc/gcc-6.4/0055-unwind_h-glibc26.patch|  139 ++
>  ...5-suppress-32-bit-aligned-ldrd-strd-peeph.patch |  194 ++
>  ...001-enable-FL_LPAE-flag-for-armv7ve-cores.patch |   67 +
>  

Re: [OE-core] [morty][PATCH v2] gcc6.4 upgrade

2018-03-09 Thread Khem Raj
On Fri, Mar 9, 2018 at 6:55 PM Andre McCurdy  wrote:

> On Fri, Mar 9, 2018 at 6:25 PM, Bystricky, Juro
>  wrote:
> > This was morty upgrade, which did not have those patches to begin with,
> I did not remove them.  The patches were not in rocko either, in the end I
> got them from master  (gcc6.4 was eventually removed completely),
> > Backporting of ARM specific patches was not the objective. ( I was not
> aware that 6.4 had an ARM specific regression which broke the pi3 builds).
> > Long story short, all patches should be there now, please review them,
> see the commit message for more details.
> > I'll make sure all other gcc6 upgrades contain the ARM patches as well.
>
> Comparing my morty branch (with update to gcc 6.4 by backporting
> incremental gcc updates from master) and today's morty-next (which
> updates gcc 6.2 -> 6.4 with a single commit) the only differences are:
>
>  - My branch lacks all the new x86 specific patches (OK, since they
> are appearing here first)
>
>  - Today's morty-next is lacking one patch, which was added to oe-core
> master as a backport (from gcc master) to gcc 6.3:
>
>
> http://git.openembedded.org/openembedded-core/commit/?id=d2631f45a057c53797b7ba657662f35f66a2b04e
>
> I don't have any strong opinions on the patch, but presumably it fixed
> some issue Khem was seeing, it still applies cleanly to gcc 6.4 and we
> have it in rocko so on balance I'd say it should probably be in morty
> too.
>

Yes this patch fixes an arm regression

>
> Overall this looks great though and I'm very happy to see gcc updates
> landing in the release branches. Thanks Juro!
>
-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


Re: [OE-core] [morty][PATCH] lib/oe/terminal.py: use an absolute path to execute oe-gnome-terminal-phonehome

2018-03-09 Thread Andre McCurdy
On Wed, Feb 21, 2018 at 1:40 PM, Andre McCurdy  wrote:
> On Tue, Jan 23, 2018 at 12:16 PM, Andre McCurdy  wrote:
>> On Tue, Dec 5, 2017 at 5:35 PM, Andre McCurdy  wrote:
>>> From: Ming Liu 
>>>
>>> A flaw was found on my Ubuntu 14.04.5 LTS, on which that gnome-terminal is
>>> the default terminal, when I run any of the tasks:
>>> bitbake busybox -c menuconfig/devshell/devpyshell
>>> bitbake virtual/kernel -c menuconfig/devshell/devpyshell
>>>
>>> I got a error as follows:
>>> "Failed to execute child process "oe-gnome-terminal-phonehome" (No such 
>>> file or directory)"
>>>
>>> Seems the environment of the process calling Popen is not passed to the
>>> child process, this behaviour is a known issue in Python bug tracker:
>>> http://bugs.python.org/issue8557
>>>
>>> It could be fixed by using an absolute path instead per test.
>>
>> Ping.
>
> Ping again.

And again...

It looks like this (and a couple of other patches) made it as far as:

  http://git.openembedded.org/openembedded-core-contrib/log/?h=stable/morty-next

but then got stuck or forgotten?

>>> Signed-off-by: Ming Liu 
>>> Signed-off-by: Richard Purdie 
>>> (cherry picked from commit 2117c148ef07d84bc605768e3b3671b0126b9337)
>>> Signed-off-by: Andre McCurdy 
>>> ---
>>>  meta/lib/oe/terminal.py | 2 +-
>>>  1 file changed, 1 insertion(+), 1 deletion(-)
>>>
>>> diff --git a/meta/lib/oe/terminal.py b/meta/lib/oe/terminal.py
>>> index 3c8ef59..df4c75b 100644
>>> --- a/meta/lib/oe/terminal.py
>>> +++ b/meta/lib/oe/terminal.py
>>> @@ -67,7 +67,7 @@ class Gnome(XTerminal):
>>>  import tempfile
>>>  pidfile = tempfile.NamedTemporaryFile(delete = False).name
>>>  try:
>>> -sh_cmd = "oe-gnome-terminal-phonehome " + pidfile + " " + 
>>> sh_cmd
>>> +sh_cmd = bb.utils.which(os.getenv('PATH'), 
>>> "oe-gnome-terminal-phonehome") + " " + pidfile + " " + sh_cmd
>>>  XTerminal.__init__(self, sh_cmd, title, env, d)
>>>  while os.stat(pidfile).st_size <= 0:
>>>  continue
>>> --
>>> 1.9.1
>>>
-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


Re: [OE-core] ✗ patchtest: failure for gcc6: Upgrade to 6.4.0 (latest stable series release) (rev3)

2018-03-09 Thread Andre McCurdy
On Fri, Mar 9, 2018 at 4:00 PM, Patchwork
 wrote:
> == Series Details ==
>
> Series: gcc6: Upgrade to 6.4.0 (latest stable series release) (rev3)
> Revision: 3
> URL   : https://patchwork.openembedded.org/series/11226/
> State : failure
>
> == Summary ==
>
> Thank you for submitting this patch series to OpenEmbedded Core. This is
> an automated response. Several tests have been executed on the proposed
> series by patchtest resulting in the following failures:
>
> * Issue Upstream-Status is in incorrect format 
> [test_upstream_status_presence_format]
>   Suggested fixFix Upstream-Status format in 
> 0001-enable-FL_LPAE-flag-for-armv7ve-cores.patch
>   Current  UpStream-Status: Backport
>   Standard format  Upstream-Status: 
>   Valid status Pending, Accepted, Backport, Denied, Inappropriate 
> [reason], Submitted [where]

The v2 patch was sent to the list here:

  
http://lists.openembedded.org/pipermail/openembedded-core/2017-November/144159.html

but it seems my morty branch still has the v1 patch with the typo...
-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


Re: [OE-core] [morty][PATCH v2] gcc6.4 upgrade

2018-03-09 Thread Andre McCurdy
On Fri, Mar 9, 2018 at 6:25 PM, Bystricky, Juro
 wrote:
> This was morty upgrade, which did not have those patches to begin with, I did 
> not remove them.  The patches were not in rocko either, in the end I got them 
> from master  (gcc6.4 was eventually removed completely),
> Backporting of ARM specific patches was not the objective. ( I was not aware 
> that 6.4 had an ARM specific regression which broke the pi3 builds).
> Long story short, all patches should be there now, please review them, see 
> the commit message for more details.
> I'll make sure all other gcc6 upgrades contain the ARM patches as well.

Comparing my morty branch (with update to gcc 6.4 by backporting
incremental gcc updates from master) and today's morty-next (which
updates gcc 6.2 -> 6.4 with a single commit) the only differences are:

 - My branch lacks all the new x86 specific patches (OK, since they
are appearing here first)

 - Today's morty-next is lacking one patch, which was added to oe-core
master as a backport (from gcc master) to gcc 6.3:

  
http://git.openembedded.org/openembedded-core/commit/?id=d2631f45a057c53797b7ba657662f35f66a2b04e

I don't have any strong opinions on the patch, but presumably it fixed
some issue Khem was seeing, it still applies cleanly to gcc 6.4 and we
have it in rocko so on balance I'd say it should probably be in morty
too.

Overall this looks great though and I'm very happy to see gcc updates
landing in the release branches. Thanks Juro!
-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


Re: [OE-core] [morty][PATCH v2] gcc6.4 upgrade

2018-03-09 Thread Bystricky, Juro
This was morty upgrade, which did not have those patches to begin with, I did 
not remove them.  The patches were not in rocko either, in the end I got them 
from master  (gcc6.4 was eventually removed completely),
Backporting of ARM specific patches was not the objective. ( I was not aware 
that 6.4 had an ARM specific regression which broke the pi3 builds).
Long story short, all patches should be there now, please review them, see the 
commit message for more details. 
I'll make sure all other gcc6 upgrades contain the ARM patches as well.



-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


Re: [OE-core] [morty][PATCH v2] gcc6.4 upgrade

2018-03-09 Thread Khem Raj
On Fri, Mar 9, 2018 at 3:49 PM, Juro Bystricky  wrote:
> Second attempt. Added some more patches, mostly ARM specific.
> AFAIK this patchset passed all x86-64 tests.
>
> I also did some limited testing with meta-raspberrypi and musl library.
>
> (raspberrypi did not build with v1 of the patchset)

There were patches to fix the pi issue. So we upgraded to 6.4 to ensure that
we can backport exact set as needed. I am bit lost what went missing.

> Juro Bystricky (1):
>   gcc6: Upgrade to 6.4.0 (latest stable series release)
>
>  meta/conf/distro/include/tcmode-default.inc|2 +-
>  ...et-71056-Don-t-use-vectorized-builtins-wh.patch |   92 -
>  .../gcc/gcc-6.2/CVE-2016-4490.patch|  290 ---
>  .../gcc/gcc-6.2/ubsan-fix-check-empty-string.patch |   28 -
>  .../gcc/{gcc-6.2.inc => gcc-6.4.inc}   |   31 +-
>  .../0001-gcc-4.3.1-ARCH_FLAGS_FOR_TARGET.patch |0
>  .../{gcc-6.2 => gcc-6.4}/0002-uclibc-conf.patch|0
>  .../0003-gcc-uclibc-locale-ctype_touplow_t.patch   |0
>  .../{gcc-6.2 => gcc-6.4}/0004-uclibc-locale.patch  |0
>  .../0005-uclibc-locale-no__x.patch |0
>  .../0006-uclibc-locale-wchar_fix.patch |0
>  .../0007-uclibc-locale-update.patch|0
>  .../0008-missing-execinfo_h.patch  |0
>  .../{gcc-6.2 => gcc-6.4}/0009-c99-snprintf.patch   |0
>  .../0010-gcc-poison-system-directories.patch   |0
>  .../0011-gcc-poison-dir-extend.patch   |0
>  .../0012-gcc-4.3.3-SYSROOT_CFLAGS_FOR_TARGET.patch |0
>  .../0013-64-bit-multilib-hack.patch|0
>  .../0014-optional-libstdc.patch|0
>  ...0015-gcc-disable-MASK_RELAX_PIC_CALLS-bit.patch |0
>  .../0016-COLLECT_GCC_OPTIONS.patch |0
>  ...efaults.h-in-B-instead-of-S-and-t-oe-in-B.patch |0
>  .../0018-fortran-cross-compile-hack.patch  |0
>  .../0019-cpp-honor-sysroot.patch   |0
>  .../0020-MIPS64-Default-to-N64-ABI.patch   |0
>  ...C_DYNAMIC_LINKER-and-UCLIBC_DYNAMIC_LINKE.patch |0
>  ...0022-gcc-Fix-argument-list-too-long-error.patch |0
>  .../{gcc-6.2 => gcc-6.4}/0023-Disable-sdt.patch|0
>  .../gcc/{gcc-6.2 => gcc-6.4}/0024-libtool.patch|0
>  ...4-pass-fix-v4bx-to-linker-to-support-EABI.patch |0
>  ...tilib-config-files-from-B-instead-of-usin.patch |0
>  ...-libdir-from-.la-which-usually-points-to-.patch |0
>  .../gcc/{gcc-6.2 => gcc-6.4}/0028-export-CPP.patch |0
>  ...AltiVec-generation-on-powepc-linux-target.patch |0
>  ...-MULTILIB_OSDIRNAMES-and-other-multilib-o.patch |0
>  ...Ensure-target-gcc-headers-can-be-included.patch |0
>  ...-t-build-with-disable-dependency-tracking.patch |0
>  ...h-host-directory-during-relink-if-inst_pr.patch |0
>  ...IBS_DIR-replacement-instead-of-hardcoding.patch |0
>  .../0035-aarch64-Add-support-for-musl-ldso.patch   |0
>  ...ibcc1-fix-libcc1-s-install-path-and-rpath.patch |0
>  ...-handle-sysroot-support-for-nativesdk-gcc.patch |0
>  ...et-sysroot-gcc-version-specific-dirs-with.patch |0
>  ...-various-_FOR_BUILD-and-related-variables.patch |0
>  .../0040-nios2-Define-MUSL_DYNAMIC_LINKER.patch|0
>  .../{gcc-6.2 => gcc-6.4}/0041-ssp_nonshared.patch  |0
>  ...c-libcpp-support-ffile-prefix-map-old-new.patch |0
>  ...ug-prefix-map-to-replace-ffile-prefix-map.patch |0
>  ...-fdebug-prefix-map-support-to-remap-sourc.patch |0
>  ...45-libgcc-Add-knob-to-use-ldbl-128-on-ppc.patch |0
>  ...bgcc-using-LDFLAGS-not-just-SHLIB_LDFLAGS.patch |0
>  ...e-alias-for-__cpu_indicator_init-instead-.patch |0
>  .../gcc-6.4/0048-sync-gcc-stddef.h-with-musl.patch |   91 +
>  .../gcc/gcc-6.4/0054_all_nopie-all-flags.patch |   22 +
>  .../gcc/gcc-6.4/0055-unwind_h-glibc26.patch|  139 ++
>  ...5-suppress-32-bit-aligned-ldrd-strd-peeph.patch |  194 ++
>  ...001-enable-FL_LPAE-flag-for-armv7ve-cores.patch |   67 +
>  ...ove-struct-ix86_frame-to-machine_function.patch |  247 +++
>  ...ference-of-struct-ix86_frame-to-avoid-cop.patch |   74 +
>  ...nst-reference-of-struct-ix86_frame-to-avo.patch |  131 ++
>  .../backport/0004-x86-Add-mindirect-branch.patch   | 2154 
> 
>  .../backport/0005-x86-Add-mfunction-return.patch   | 1570 ++
>  .../0006-x86-Add-mindirect-branch-register.patch   |  946 +
>  .../0007-x86-Add-V-register-operand-modifier.patch |  139 ++
>  ...w-mindirect-branch-mfunction-return-with-.patch |  304 +++
>  ...VALID_REGNUM-in-indirect-thunk-processing.patch |  126 ++
>  ...INVALID_REGNUM-as-invalid-register-number.patch |   46 +
>  ...date-mfunction-return-for-return-with-pop.patch |  453 
>  ...-i386-Add-TARGET_INDIRECT_BRANCH_REGISTER.patch | 1004 +
>  ...5-suppress-32-bit-aligned-ldrd-strd-peeph.patch |  194 ++
>  .../gcc/gcc-6.4/backport/CVE-2016-6131.patch   |  

Re: [OE-core] [morty][PATCH v2] gcc6.4 upgrade

2018-03-09 Thread akuster808
Juro,



On 03/09/2018 03:56 PM, Bystricky, Juro wrote:
> I forgot to mention that if there are no objections against this patchset, I 
> intend to do the same/equivalent upgrades for other releases with gcc 6x 
> (rocko, pyro, ...)  and also upgrade gcc5.x and 4.9x where present.
Thanks for this work.
kind regards,

>
> 
> From: Bystricky, Juro
> Sent: Friday, March 09, 2018 3:49 PM
> To: openembedded-core@lists.openembedded.org
> Cc: richard.pur...@linuxfoundation.org; jurobystri...@hotmail.com; 
> martin.ja...@gmail.com; armccu...@gmail.com; raj.k...@gmail.com; Bystricky, 
> Juro
> Subject: [morty][PATCH v2] gcc6.4 upgrade
>
> Second attempt. Added some more patches, mostly ARM specific.
> AFAIK this patchset passed all x86-64 tests.
>
> I also did some limited testing with meta-raspberrypi and musl library.
>
> (raspberrypi did not build with v1 of the patchset)
>
>
> Juro Bystricky (1):
>   gcc6: Upgrade to 6.4.0 (latest stable series release)
>
>  meta/conf/distro/include/tcmode-default.inc|2 +-
>  ...et-71056-Don-t-use-vectorized-builtins-wh.patch |   92 -
>  .../gcc/gcc-6.2/CVE-2016-4490.patch|  290 ---
>  .../gcc/gcc-6.2/ubsan-fix-check-empty-string.patch |   28 -
>  .../gcc/{gcc-6.2.inc => gcc-6.4.inc}   |   31 +-
>  .../0001-gcc-4.3.1-ARCH_FLAGS_FOR_TARGET.patch |0
>  .../{gcc-6.2 => gcc-6.4}/0002-uclibc-conf.patch|0
>  .../0003-gcc-uclibc-locale-ctype_touplow_t.patch   |0
>  .../{gcc-6.2 => gcc-6.4}/0004-uclibc-locale.patch  |0
>  .../0005-uclibc-locale-no__x.patch |0
>  .../0006-uclibc-locale-wchar_fix.patch |0
>  .../0007-uclibc-locale-update.patch|0
>  .../0008-missing-execinfo_h.patch  |0
>  .../{gcc-6.2 => gcc-6.4}/0009-c99-snprintf.patch   |0
>  .../0010-gcc-poison-system-directories.patch   |0
>  .../0011-gcc-poison-dir-extend.patch   |0
>  .../0012-gcc-4.3.3-SYSROOT_CFLAGS_FOR_TARGET.patch |0
>  .../0013-64-bit-multilib-hack.patch|0
>  .../0014-optional-libstdc.patch|0
>  ...0015-gcc-disable-MASK_RELAX_PIC_CALLS-bit.patch |0
>  .../0016-COLLECT_GCC_OPTIONS.patch |0
>  ...efaults.h-in-B-instead-of-S-and-t-oe-in-B.patch |0
>  .../0018-fortran-cross-compile-hack.patch  |0
>  .../0019-cpp-honor-sysroot.patch   |0
>  .../0020-MIPS64-Default-to-N64-ABI.patch   |0
>  ...C_DYNAMIC_LINKER-and-UCLIBC_DYNAMIC_LINKE.patch |0
>  ...0022-gcc-Fix-argument-list-too-long-error.patch |0
>  .../{gcc-6.2 => gcc-6.4}/0023-Disable-sdt.patch|0
>  .../gcc/{gcc-6.2 => gcc-6.4}/0024-libtool.patch|0
>  ...4-pass-fix-v4bx-to-linker-to-support-EABI.patch |0
>  ...tilib-config-files-from-B-instead-of-usin.patch |0
>  ...-libdir-from-.la-which-usually-points-to-.patch |0
>  .../gcc/{gcc-6.2 => gcc-6.4}/0028-export-CPP.patch |0
>  ...AltiVec-generation-on-powepc-linux-target.patch |0
>  ...-MULTILIB_OSDIRNAMES-and-other-multilib-o.patch |0
>  ...Ensure-target-gcc-headers-can-be-included.patch |0
>  ...-t-build-with-disable-dependency-tracking.patch |0
>  ...h-host-directory-during-relink-if-inst_pr.patch |0
>  ...IBS_DIR-replacement-instead-of-hardcoding.patch |0
>  .../0035-aarch64-Add-support-for-musl-ldso.patch   |0
>  ...ibcc1-fix-libcc1-s-install-path-and-rpath.patch |0
>  ...-handle-sysroot-support-for-nativesdk-gcc.patch |0
>  ...et-sysroot-gcc-version-specific-dirs-with.patch |0
>  ...-various-_FOR_BUILD-and-related-variables.patch |0
>  .../0040-nios2-Define-MUSL_DYNAMIC_LINKER.patch|0
>  .../{gcc-6.2 => gcc-6.4}/0041-ssp_nonshared.patch  |0
>  ...c-libcpp-support-ffile-prefix-map-old-new.patch |0
>  ...ug-prefix-map-to-replace-ffile-prefix-map.patch |0
>  ...-fdebug-prefix-map-support-to-remap-sourc.patch |0
>  ...45-libgcc-Add-knob-to-use-ldbl-128-on-ppc.patch |0
>  ...bgcc-using-LDFLAGS-not-just-SHLIB_LDFLAGS.patch |0
>  ...e-alias-for-__cpu_indicator_init-instead-.patch |0
>  .../gcc-6.4/0048-sync-gcc-stddef.h-with-musl.patch |   91 +
>  .../gcc/gcc-6.4/0054_all_nopie-all-flags.patch |   22 +
>  .../gcc/gcc-6.4/0055-unwind_h-glibc26.patch|  139 ++
>  ...5-suppress-32-bit-aligned-ldrd-strd-peeph.patch |  194 ++
>  ...001-enable-FL_LPAE-flag-for-armv7ve-cores.patch |   67 +
>  ...ove-struct-ix86_frame-to-machine_function.patch |  247 +++
>  ...ference-of-struct-ix86_frame-to-avoid-cop.patch |   74 +
>  ...nst-reference-of-struct-ix86_frame-to-avo.patch |  131 ++
>  .../backport/0004-x86-Add-mindirect-branch.patch   | 2154 
> 
>  .../backport/0005-x86-Add-mfunction-return.patch   | 1570 ++
>  .../0006-x86-Add-mindirect-branch-register.patch   |  946 +
>  .../0007-x86-Add-V-register-operand-modifier.patch |  139 ++
>  

[OE-core] [PATCH] x86-base.inc: use xf86-video-modesettings as default xserver

2018-03-09 Thread California Sullivan
Most distros have switched to this, and we're seeing better results in
some areas as well. E.g., on a NUC6CAYS the x11perf -aa10text and
-rgb10text results see a 20x increase.

[YOCTO #12019].
[YOCTO #12590].

Signed-off-by: California Sullivan 
---
 meta/conf/machine/include/x86-base.inc | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/meta/conf/machine/include/x86-base.inc 
b/meta/conf/machine/include/x86-base.inc
index f8aacea64cc..e6bfdc6f770 100644
--- a/meta/conf/machine/include/x86-base.inc
+++ b/meta/conf/machine/include/x86-base.inc
@@ -34,11 +34,11 @@ XSERVER_X86_EXT = " \
xserver-xorg-module-libint10 \
"
 
-XSERVER_X86_I915 = "xf86-video-intel \
+XSERVER_X86_I915 = "xf86-video-modesetting \
${@bb.utils.contains('DISTRO_FEATURES', 'opengl', 
'mesa-driver-i915', '', d)} \
"
 
-XSERVER_X86_I965 = "xf86-video-intel \
+XSERVER_X86_I965 = "xf86-video-modesetting \
${@bb.utils.contains('DISTRO_FEATURES', 'opengl', 
'mesa-driver-i965', '', d)} \
"
 
-- 
2.14.3

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] ✗ patchtest: failure for gcc6: Upgrade to 6.4.0 (latest stable series release) (rev3)

2018-03-09 Thread Patchwork
== Series Details ==

Series: gcc6: Upgrade to 6.4.0 (latest stable series release) (rev3)
Revision: 3
URL   : https://patchwork.openembedded.org/series/11226/
State : failure

== Summary ==


Thank you for submitting this patch series to OpenEmbedded Core. This is
an automated response. Several tests have been executed on the proposed
series by patchtest resulting in the following failures:



* Issue Upstream-Status is in incorrect format 
[test_upstream_status_presence_format] 
  Suggested fixFix Upstream-Status format in 
0001-enable-FL_LPAE-flag-for-armv7ve-cores.patch
  Current  UpStream-Status: Backport
  Standard format  Upstream-Status: 
  Valid status Pending, Accepted, Backport, Denied, Inappropriate [reason], 
Submitted [where]



If you believe any of these test results are incorrect, please reply to the
mailing list (openembedded-core@lists.openembedded.org) raising your concerns.
Otherwise we would appreciate you correcting the issues and submitting a new
version of the patchset if applicable. Please ensure you add/increment the
version number when sending the new version (i.e. [PATCH] -> [PATCH v2] ->
[PATCH v3] -> ...).

---
Guidelines: 
https://www.openembedded.org/wiki/Commit_Patch_Message_Guidelines
Test framework: http://git.yoctoproject.org/cgit/cgit.cgi/patchtest
Test suite: http://git.yoctoproject.org/cgit/cgit.cgi/patchtest-oe

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


Re: [OE-core] [morty][PATCH v2] gcc6.4 upgrade

2018-03-09 Thread Bystricky, Juro
I forgot to mention that if there are no objections against this patchset, I 
intend to do the same/equivalent upgrades for other releases with gcc 6x 
(rocko, pyro, ...)  and also upgrade gcc5.x and 4.9x where present.


From: Bystricky, Juro
Sent: Friday, March 09, 2018 3:49 PM
To: openembedded-core@lists.openembedded.org
Cc: richard.pur...@linuxfoundation.org; jurobystri...@hotmail.com; 
martin.ja...@gmail.com; armccu...@gmail.com; raj.k...@gmail.com; Bystricky, Juro
Subject: [morty][PATCH v2] gcc6.4 upgrade

Second attempt. Added some more patches, mostly ARM specific.
AFAIK this patchset passed all x86-64 tests.

I also did some limited testing with meta-raspberrypi and musl library.

(raspberrypi did not build with v1 of the patchset)


Juro Bystricky (1):
  gcc6: Upgrade to 6.4.0 (latest stable series release)

 meta/conf/distro/include/tcmode-default.inc|2 +-
 ...et-71056-Don-t-use-vectorized-builtins-wh.patch |   92 -
 .../gcc/gcc-6.2/CVE-2016-4490.patch|  290 ---
 .../gcc/gcc-6.2/ubsan-fix-check-empty-string.patch |   28 -
 .../gcc/{gcc-6.2.inc => gcc-6.4.inc}   |   31 +-
 .../0001-gcc-4.3.1-ARCH_FLAGS_FOR_TARGET.patch |0
 .../{gcc-6.2 => gcc-6.4}/0002-uclibc-conf.patch|0
 .../0003-gcc-uclibc-locale-ctype_touplow_t.patch   |0
 .../{gcc-6.2 => gcc-6.4}/0004-uclibc-locale.patch  |0
 .../0005-uclibc-locale-no__x.patch |0
 .../0006-uclibc-locale-wchar_fix.patch |0
 .../0007-uclibc-locale-update.patch|0
 .../0008-missing-execinfo_h.patch  |0
 .../{gcc-6.2 => gcc-6.4}/0009-c99-snprintf.patch   |0
 .../0010-gcc-poison-system-directories.patch   |0
 .../0011-gcc-poison-dir-extend.patch   |0
 .../0012-gcc-4.3.3-SYSROOT_CFLAGS_FOR_TARGET.patch |0
 .../0013-64-bit-multilib-hack.patch|0
 .../0014-optional-libstdc.patch|0
 ...0015-gcc-disable-MASK_RELAX_PIC_CALLS-bit.patch |0
 .../0016-COLLECT_GCC_OPTIONS.patch |0
 ...efaults.h-in-B-instead-of-S-and-t-oe-in-B.patch |0
 .../0018-fortran-cross-compile-hack.patch  |0
 .../0019-cpp-honor-sysroot.patch   |0
 .../0020-MIPS64-Default-to-N64-ABI.patch   |0
 ...C_DYNAMIC_LINKER-and-UCLIBC_DYNAMIC_LINKE.patch |0
 ...0022-gcc-Fix-argument-list-too-long-error.patch |0
 .../{gcc-6.2 => gcc-6.4}/0023-Disable-sdt.patch|0
 .../gcc/{gcc-6.2 => gcc-6.4}/0024-libtool.patch|0
 ...4-pass-fix-v4bx-to-linker-to-support-EABI.patch |0
 ...tilib-config-files-from-B-instead-of-usin.patch |0
 ...-libdir-from-.la-which-usually-points-to-.patch |0
 .../gcc/{gcc-6.2 => gcc-6.4}/0028-export-CPP.patch |0
 ...AltiVec-generation-on-powepc-linux-target.patch |0
 ...-MULTILIB_OSDIRNAMES-and-other-multilib-o.patch |0
 ...Ensure-target-gcc-headers-can-be-included.patch |0
 ...-t-build-with-disable-dependency-tracking.patch |0
 ...h-host-directory-during-relink-if-inst_pr.patch |0
 ...IBS_DIR-replacement-instead-of-hardcoding.patch |0
 .../0035-aarch64-Add-support-for-musl-ldso.patch   |0
 ...ibcc1-fix-libcc1-s-install-path-and-rpath.patch |0
 ...-handle-sysroot-support-for-nativesdk-gcc.patch |0
 ...et-sysroot-gcc-version-specific-dirs-with.patch |0
 ...-various-_FOR_BUILD-and-related-variables.patch |0
 .../0040-nios2-Define-MUSL_DYNAMIC_LINKER.patch|0
 .../{gcc-6.2 => gcc-6.4}/0041-ssp_nonshared.patch  |0
 ...c-libcpp-support-ffile-prefix-map-old-new.patch |0
 ...ug-prefix-map-to-replace-ffile-prefix-map.patch |0
 ...-fdebug-prefix-map-support-to-remap-sourc.patch |0
 ...45-libgcc-Add-knob-to-use-ldbl-128-on-ppc.patch |0
 ...bgcc-using-LDFLAGS-not-just-SHLIB_LDFLAGS.patch |0
 ...e-alias-for-__cpu_indicator_init-instead-.patch |0
 .../gcc-6.4/0048-sync-gcc-stddef.h-with-musl.patch |   91 +
 .../gcc/gcc-6.4/0054_all_nopie-all-flags.patch |   22 +
 .../gcc/gcc-6.4/0055-unwind_h-glibc26.patch|  139 ++
 ...5-suppress-32-bit-aligned-ldrd-strd-peeph.patch |  194 ++
 ...001-enable-FL_LPAE-flag-for-armv7ve-cores.patch |   67 +
 ...ove-struct-ix86_frame-to-machine_function.patch |  247 +++
 ...ference-of-struct-ix86_frame-to-avoid-cop.patch |   74 +
 ...nst-reference-of-struct-ix86_frame-to-avo.patch |  131 ++
 .../backport/0004-x86-Add-mindirect-branch.patch   | 2154 
 .../backport/0005-x86-Add-mfunction-return.patch   | 1570 ++
 .../0006-x86-Add-mindirect-branch-register.patch   |  946 +
 .../0007-x86-Add-V-register-operand-modifier.patch |  139 ++
 ...w-mindirect-branch-mfunction-return-with-.patch |  304 +++
 ...VALID_REGNUM-in-indirect-thunk-processing.patch |  126 ++
 ...INVALID_REGNUM-as-invalid-register-number.patch |   46 +
 ...date-mfunction-return-for-return-with-pop.patch |  453 
 

[OE-core] [morty][PATCH v2] gcc6.4 upgrade

2018-03-09 Thread Juro Bystricky
Second attempt. Added some more patches, mostly ARM specific.
AFAIK this patchset passed all x86-64 tests.

I also did some limited testing with meta-raspberrypi and musl library.

(raspberrypi did not build with v1 of the patchset)


Juro Bystricky (1):
  gcc6: Upgrade to 6.4.0 (latest stable series release)

 meta/conf/distro/include/tcmode-default.inc|2 +-
 ...et-71056-Don-t-use-vectorized-builtins-wh.patch |   92 -
 .../gcc/gcc-6.2/CVE-2016-4490.patch|  290 ---
 .../gcc/gcc-6.2/ubsan-fix-check-empty-string.patch |   28 -
 .../gcc/{gcc-6.2.inc => gcc-6.4.inc}   |   31 +-
 .../0001-gcc-4.3.1-ARCH_FLAGS_FOR_TARGET.patch |0
 .../{gcc-6.2 => gcc-6.4}/0002-uclibc-conf.patch|0
 .../0003-gcc-uclibc-locale-ctype_touplow_t.patch   |0
 .../{gcc-6.2 => gcc-6.4}/0004-uclibc-locale.patch  |0
 .../0005-uclibc-locale-no__x.patch |0
 .../0006-uclibc-locale-wchar_fix.patch |0
 .../0007-uclibc-locale-update.patch|0
 .../0008-missing-execinfo_h.patch  |0
 .../{gcc-6.2 => gcc-6.4}/0009-c99-snprintf.patch   |0
 .../0010-gcc-poison-system-directories.patch   |0
 .../0011-gcc-poison-dir-extend.patch   |0
 .../0012-gcc-4.3.3-SYSROOT_CFLAGS_FOR_TARGET.patch |0
 .../0013-64-bit-multilib-hack.patch|0
 .../0014-optional-libstdc.patch|0
 ...0015-gcc-disable-MASK_RELAX_PIC_CALLS-bit.patch |0
 .../0016-COLLECT_GCC_OPTIONS.patch |0
 ...efaults.h-in-B-instead-of-S-and-t-oe-in-B.patch |0
 .../0018-fortran-cross-compile-hack.patch  |0
 .../0019-cpp-honor-sysroot.patch   |0
 .../0020-MIPS64-Default-to-N64-ABI.patch   |0
 ...C_DYNAMIC_LINKER-and-UCLIBC_DYNAMIC_LINKE.patch |0
 ...0022-gcc-Fix-argument-list-too-long-error.patch |0
 .../{gcc-6.2 => gcc-6.4}/0023-Disable-sdt.patch|0
 .../gcc/{gcc-6.2 => gcc-6.4}/0024-libtool.patch|0
 ...4-pass-fix-v4bx-to-linker-to-support-EABI.patch |0
 ...tilib-config-files-from-B-instead-of-usin.patch |0
 ...-libdir-from-.la-which-usually-points-to-.patch |0
 .../gcc/{gcc-6.2 => gcc-6.4}/0028-export-CPP.patch |0
 ...AltiVec-generation-on-powepc-linux-target.patch |0
 ...-MULTILIB_OSDIRNAMES-and-other-multilib-o.patch |0
 ...Ensure-target-gcc-headers-can-be-included.patch |0
 ...-t-build-with-disable-dependency-tracking.patch |0
 ...h-host-directory-during-relink-if-inst_pr.patch |0
 ...IBS_DIR-replacement-instead-of-hardcoding.patch |0
 .../0035-aarch64-Add-support-for-musl-ldso.patch   |0
 ...ibcc1-fix-libcc1-s-install-path-and-rpath.patch |0
 ...-handle-sysroot-support-for-nativesdk-gcc.patch |0
 ...et-sysroot-gcc-version-specific-dirs-with.patch |0
 ...-various-_FOR_BUILD-and-related-variables.patch |0
 .../0040-nios2-Define-MUSL_DYNAMIC_LINKER.patch|0
 .../{gcc-6.2 => gcc-6.4}/0041-ssp_nonshared.patch  |0
 ...c-libcpp-support-ffile-prefix-map-old-new.patch |0
 ...ug-prefix-map-to-replace-ffile-prefix-map.patch |0
 ...-fdebug-prefix-map-support-to-remap-sourc.patch |0
 ...45-libgcc-Add-knob-to-use-ldbl-128-on-ppc.patch |0
 ...bgcc-using-LDFLAGS-not-just-SHLIB_LDFLAGS.patch |0
 ...e-alias-for-__cpu_indicator_init-instead-.patch |0
 .../gcc-6.4/0048-sync-gcc-stddef.h-with-musl.patch |   91 +
 .../gcc/gcc-6.4/0054_all_nopie-all-flags.patch |   22 +
 .../gcc/gcc-6.4/0055-unwind_h-glibc26.patch|  139 ++
 ...5-suppress-32-bit-aligned-ldrd-strd-peeph.patch |  194 ++
 ...001-enable-FL_LPAE-flag-for-armv7ve-cores.patch |   67 +
 ...ove-struct-ix86_frame-to-machine_function.patch |  247 +++
 ...ference-of-struct-ix86_frame-to-avoid-cop.patch |   74 +
 ...nst-reference-of-struct-ix86_frame-to-avo.patch |  131 ++
 .../backport/0004-x86-Add-mindirect-branch.patch   | 2154 
 .../backport/0005-x86-Add-mfunction-return.patch   | 1570 ++
 .../0006-x86-Add-mindirect-branch-register.patch   |  946 +
 .../0007-x86-Add-V-register-operand-modifier.patch |  139 ++
 ...w-mindirect-branch-mfunction-return-with-.patch |  304 +++
 ...VALID_REGNUM-in-indirect-thunk-processing.patch |  126 ++
 ...INVALID_REGNUM-as-invalid-register-number.patch |   46 +
 ...date-mfunction-return-for-return-with-pop.patch |  453 
 ...-i386-Add-TARGET_INDIRECT_BRANCH_REGISTER.patch | 1004 +
 ...5-suppress-32-bit-aligned-ldrd-strd-peeph.patch |  194 ++
 .../gcc/gcc-6.4/backport/CVE-2016-6131.patch   |  223 ++
 ...s-canadian_6.2.bb => gcc-cross-canadian_6.4.bb} |0
 ...oss-initial_6.2.bb => gcc-cross-initial_6.4.bb} |0
 .../gcc/{gcc-cross_6.2.bb => gcc-cross_6.4.bb} |0
 ...-initial_6.2.bb => gcc-crosssdk-initial_6.4.bb} |0
 .../{gcc-crosssdk_6.2.bb => gcc-crosssdk_6.4.bb}   |0
 .../gcc/{gcc-runtime_6.2.bb => gcc-runtime_6.4.bb} |0
 ...gcc-sanitizers_6.2.bb => 

Re: [OE-core] [RFC PATCH 0/5] systemtap adding sysroot, cross compiling of user land related scripts

2018-03-09 Thread Alexander Kanavin

On 03/09/2018 10:55 PM, Victor Kamensky wrote:

I've set to write response why systemtap-utils is really
needed and ended up doing below :). Does it look acceptable
direction to you?


Yes.


The only controvercial item left from my original ask is
IMAGE_GEN_COMBINED_DEBUGFS build option that is supposed to
build rootfs-dbg containing combined target and debug symbols. 


You can probably repost that as a regular patch.

Alex
--
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH] lib/oe/patch.py: add a warning if patch context was ignored

2018-03-09 Thread Alexander Kanavin
Ignoring patch context increases the chances of patches being
applied incorrectly. Depending on what code is being patched, this can go
completely unnoticed and create subtle bugs, sometimes with security 
implications.

Please see here for a specific example:
https://bugzilla.yoctoproject.org/show_bug.cgi?id=10450

On the other hand, we cannot simply force all patch context to match exactly:
doing this would break a lot of recipes suddenly, across all layers.

So let's try a softer approach: issue a warning, and gently update
patches over a longer span of time. When most of the warnings are eliminated,
we can start enforcing a strict patch application policy.

I do understand that this patch creates a lot of warnings all of a sudden, 
however
I believe the problem does need to be addressed. All of oe-core recipes have 
their
context already fixed.

Sample warning:

WARNING: vulkan-1.0.61.1-r0 do_patch:
Some of the context lines in patches were ignored. This can lead to incorrectly 
applied patches.
The context lines in the patches can be updated with devtool:

devtool modify 
devtool finish --force-patch-refresh  

Then the updated patches and the source tree (in devtool's workspace)
should be reviewed to make sure the patches apply in the correct place
and don't introduce duplicate lines (which can, and does happen
when some of the context is ignored).
Details:
Applying patch demos-Don-t-build-tri-or-cube.patch
patching file demos/CMakeLists.txt
Hunk #1 succeeded at 63 (offset 2 lines).
Hunk #2 succeeded at 76 with fuzz 1 (offset 2 lines).

[YOCTO #10450]

Signed-off-by: Alexander Kanavin 
---
 meta/lib/oe/patch.py | 14 ++
 1 file changed, 14 insertions(+)

diff --git a/meta/lib/oe/patch.py b/meta/lib/oe/patch.py
index f02dee8d27d..41cef2a272d 100644
--- a/meta/lib/oe/patch.py
+++ b/meta/lib/oe/patch.py
@@ -36,6 +36,20 @@ def runcmd(args, dir = None):
 (exitstatus, output) = oe.utils.getstatusoutput(cmd)
 if exitstatus != 0:
 raise CmdError(cmd, exitstatus >> 8, output)
+if " fuzz " in output:
+bb.warn("""
+Some of the context lines in patches were ignored. This can lead to 
incorrectly applied patches.
+The context lines in the patches can be updated with devtool:
+
+devtool modify 
+devtool finish --force-patch-refresh  
+
+Then the updated patches and the source tree (in devtool's workspace)
+should be reviewed to make sure the patches apply in the correct place
+and don't introduce duplicate lines (which can, and does happen
+when some of the context is ignored).
+Details:
+{}""".format(output))
 return output
 
 finally:
-- 
2.16.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


Re: [OE-core] [RFC PATCH 0/5] systemtap adding sysroot, cross compiling of user land related scripts

2018-03-09 Thread Victor Kamensky

Hi Alex,

On Tue, 6 Mar 2018, Alexander Kanavin wrote:


On 03/06/2018 07:50 PM, Victor Kamensky wrote:

I am a fan of SystemTap and big fan of OE. Systemtap and OE use case I have
on my mind is the following:


Hello Victor,

even though I'm listed as the maintainer of systemtap, I do not actually use 
it or know anything about it - my responsibility ends with keeping it up to 
date and fixing build errors.


Fair enough. It is understood.

So I can't comment on the essence of these 
patches. I do suggest however that you first get as many patches as possible 
into the upstream, as carrying them in oe-core adds a significant maintenance 
burden.


Yes, it is understood. I am actively working, as we speak,
with SystemTap folks on putting sysroot related patches into SystemTap.

Also, if it's possible to merge systemtap-utils into the main systemtap 
recipe (as a binary package),


I've set to write response why systemtap-utils is really
needed and ended up doing below :). Does it look acceptable
direction to you?


From 808fbe3c4b64c734258da08e92fb367a8a20939b Mon Sep 17 00:00:00 2001

From: Victor Kamensky 
Date: Wed, 7 Mar 2018 18:33:33 -0800
Subject: [PATCH 08/11] systemtap: create translator packageconfig

For cases when systemap module compilation happens on host in
cross-compilation mode, and it is desirable to minimize systemtap
presense on target we need to have just smallest possible set of
utilties that are required to run compiled modules.

Introduce new "translator" PACKAGECONFIG, if it is not set
it would mean that just minimal set of run-time utilities will
be included in the package.

For run-time only systemtap build variant use
PACKAGECONFIG_pn-systemtap = "" or
PACKAGECONFIG_pn-systemtap = "monitor"

Suggested-by: Taras Kondratiuk 
Signed-off-by: Victor Kamensky 
---
 meta/recipes-kernel/systemtap/systemtap_git.bb | 15 +++
 1 file changed, 11 insertions(+), 4 deletions(-)

diff --git a/meta/recipes-kernel/systemtap/systemtap_git.bb 
b/meta/recipes-kernel/systemtap/systemtap_git.bb
index 475b207..b280f58 100644
--- a/meta/recipes-kernel/systemtap/systemtap_git.bb
+++ b/meta/recipes-kernel/systemtap/systemtap_git.bb
@@ -3,9 +3,7 @@ HOMEPAGE = "https://sourceware.org/systemtap/;

 require systemtap_git.inc

-DEPENDS = "boost elfutils"
-
-RDEPENDS_${PN} += "python3-core bash perl"
+DEPENDS = "elfutils"

 EXTRA_OECONF += "--with-libelf=${STAGING_DIR_TARGET} --without-rpm \
 --without-nss --without-avahi --without-dyninst \
@@ -18,7 +16,8 @@ STAP_DOCS ?= "--disable-docs --disable-publican 
--disable-refdocs"

 EXTRA_OECONF += "${STAP_DOCS} "

-PACKAGECONFIG ??= "sqlite monitor python3-probes"
+PACKAGECONFIG ??= "translator sqlite monitor python3-probes"
+PACKAGECONFIG[translator] = 
"--enable-translator,--disable-translator,boost,python3-core bash perl"
 PACKAGECONFIG[libvirt] = "--enable-libvirt,--disable-libvirt,libvirt"
 PACKAGECONFIG[sqlite] = "--enable-sqlite,--disable-sqlite,sqlite3"
 PACKAGECONFIG[monitor] = "--enable-monitor,--disable-monitor,ncurses json-c"
@@ -26,4 +25,12 @@ PACKAGECONFIG[python3-probes] = 
"--with-python3-probes,--without-python3-probes,

 inherit autotools gettext pkgconfig distutils3-base

+do_install_append () {
+   if [ ! -f ${D}${bindir}/stap ]; then
+  # translator disabled case, need to leave only minimal runtime
+  rm -rf ${D}${datadir}/${PN}
+  rm ${D}${libexecdir}/${PN}/stap-env
+   fi
+}
+
 BBCLASSEXTEND = "nativesdk"
--
2.7.4


and merge together crosstap and crosstap2,  please do that.


I added code into crosstap2 to provide backward compatible
crosstap legecy invocation interface. I plan to post new crosstap2 code
as total backward compatible replacement of crosstap with superseding 
functionality.


The only controvercial item left from my original ask is
IMAGE_GEN_COMBINED_DEBUGFS build option that is supposed to
build rootfs-dbg containing combined target and debug symbols.

Thanks,
Victor


Alex


--
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 2/3] liburcu: Explicitly add pthread options to cflags

2018-03-09 Thread Khem Raj
Some architectures e.g. riscv gcc does not add -D_REENTRANT
when enabling pthreads. Help it here by adding these options
while gcc gets fixed

Signed-off-by: Khem Raj 
---
 meta/recipes-support/liburcu/liburcu_0.10.1.bb | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/meta/recipes-support/liburcu/liburcu_0.10.1.bb 
b/meta/recipes-support/liburcu/liburcu_0.10.1.bb
index 0c8cd3571a..459c04a7a1 100644
--- a/meta/recipes-support/liburcu/liburcu_0.10.1.bb
+++ b/meta/recipes-support/liburcu/liburcu_0.10.1.bb
@@ -15,3 +15,5 @@ SRC_URI[sha256sum] = 
"9c09220be4435dc27fcd22d291707b94b97f159e0c442fbcd60c168f8f
 
 S = "${WORKDIR}/userspace-rcu-${PV}"
 inherit autotools
+
+CPPFLAGS_append_riscv64  = " -pthread -D_REENTRANT"
-- 
2.16.2

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 3/3] recipes: Disable lttng for riscv

2018-03-09 Thread Khem Raj
Signed-off-by: Khem Raj 
---
 meta/recipes-core/packagegroups/packagegroup-core-tools-profile.bb | 2 ++
 meta/recipes-devtools/gdb/gdb-common.inc   | 1 +
 meta/recipes-kernel/lttng/lttng-tools_2.10.2.bb| 1 +
 3 files changed, 4 insertions(+)

diff --git a/meta/recipes-core/packagegroups/packagegroup-core-tools-profile.bb 
b/meta/recipes-core/packagegroups/packagegroup-core-tools-profile.bb
index e3814a44bc..554f529889 100644
--- a/meta/recipes-core/packagegroups/packagegroup-core-tools-profile.bb
+++ b/meta/recipes-core/packagegroups/packagegroup-core-tools-profile.bb
@@ -40,9 +40,11 @@ SYSTEMTAP_aarch64 = ""
 # lttng-ust uses sched_getcpu() which is not there on for some platforms.
 LTTNGUST = "lttng-ust"
 LTTNGUST_libc-musl = ""
+LTTNGUST_riscv64 = ""
 
 LTTNGTOOLS = "lttng-tools"
 LTTNGTOOLS_libc-musl = ""
+LTTNGTOOLS_riscv64 = ""
 
 LTTNGMODULES = "lttng-modules"
 
diff --git a/meta/recipes-devtools/gdb/gdb-common.inc 
b/meta/recipes-devtools/gdb/gdb-common.inc
index 9164a2bba4..039577b8e2 100644
--- a/meta/recipes-devtools/gdb/gdb-common.inc
+++ b/meta/recipes-devtools/gdb/gdb-common.inc
@@ -5,6 +5,7 @@ DEPENDS = "expat zlib ncurses virtual/libiconv ${LTTNGUST}"
 
 LTTNGUST = "lttng-ust"
 LTTNGUST_aarch64 = ""
+LTTNGUST_riscv64 = ""
 LTTNGUST_mipsarch = ""
 LTTNGUST_sh4 = ""
 LTTNGUST_libc-musl = ""
diff --git a/meta/recipes-kernel/lttng/lttng-tools_2.10.2.bb 
b/meta/recipes-kernel/lttng/lttng-tools_2.10.2.bb
index e8d041d1c6..fd5abbb113 100644
--- a/meta/recipes-kernel/lttng/lttng-tools_2.10.2.bb
+++ b/meta/recipes-kernel/lttng/lttng-tools_2.10.2.bb
@@ -25,6 +25,7 @@ PACKAGECONFIG[lttng-ust] = "--with-lttng-ust, 
--without-lttng-ust, lttng-ust"
 PACKAGECONFIG[kmod] = "--with-kmod, --without-kmod, kmod"
 PACKAGECONFIG[manpages] = "--enable-man-pages, --disable-man-pages, 
asciidoc-native xmlto-native libxslt-native"
 PACKAGECONFIG_remove_libc-musl = "lttng-ust"
+PACKAGECONFIG_remove_riscv64 = "lttng-ust"
 
 SRC_URI = "https://lttng.org/files/lttng-tools/lttng-tools-${PV}.tar.bz2 \
file://x32.patch \
-- 
2.16.2

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 1/3] packagegroup-core-sdk: Disable SANITIZERS for riscv64

2018-03-09 Thread Khem Raj
Dont build yet

Signed-off-by: Khem Raj 
---
 meta/recipes-core/packagegroups/packagegroup-core-sdk.bb | 1 +
 1 file changed, 1 insertion(+)

diff --git a/meta/recipes-core/packagegroups/packagegroup-core-sdk.bb 
b/meta/recipes-core/packagegroups/packagegroup-core-sdk.bb
index 393f0d3d13..a137e7748f 100644
--- a/meta/recipes-core/packagegroups/packagegroup-core-sdk.bb
+++ b/meta/recipes-core/packagegroups/packagegroup-core-sdk.bb
@@ -33,6 +33,7 @@ SANITIZERS_mipsarch = ""
 SANITIZERS_nios2 = ""
 SANITIZERS_powerpc64 = ""
 SANITIZERS_sparc = ""
+SANITIZERS_riscv64 = ""
 SANITIZERS_libc-musl = ""
 
 RRECOMMENDS_packagegroup-core-sdk = "\
-- 
2.16.2

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 0/3] Build fixed for riscv64

2018-03-09 Thread Khem Raj
These packages found failing on building extended images on riscv64

The following changes since commit e4da78229f0bd67fd34928eafe48dbdc9e8da050:

  e2fsprogs: Add comment on why touch is needed (2018-03-09 11:09:39 -0800)

are available in the Git repository at:

  git://git.openembedded.org/openembedded-core-contrib kraj/riscv64-fixes
  
http://cgit.openembedded.org/openembedded-core-contrib/log/?h=kraj/riscv64-fixes

Khem Raj (3):
  packagegroup-core-sdk: Disable SANITIZERS for riscv64
  liburcu: Explicitly add pthread options to cflags
  recipes: Disable lttng for riscv

 meta/recipes-core/packagegroups/packagegroup-core-sdk.bb   | 1 +
 meta/recipes-core/packagegroups/packagegroup-core-tools-profile.bb | 2 ++
 meta/recipes-devtools/gdb/gdb-common.inc   | 1 +
 meta/recipes-kernel/lttng/lttng-tools_2.10.2.bb| 1 +
 meta/recipes-support/liburcu/liburcu_0.10.1.bb | 2 ++
 5 files changed, 7 insertions(+)

-- 
2.16.2

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 36/36] mklibs-native: refresh patches

2018-03-09 Thread Alexander Kanavin
The patch tool will apply patches by default with "fuzz", which is where if the
hunk context isn't present but what is there is close enough, it will force the
patch in.

Whilst this is useful when there's just whitespace changes, when applied to
source it is possible for a patch applied with fuzz to produce broken code which
still compiles (see #10450).  This is obviously bad.

We'd like to eventually have do_patch() rejecting any fuzz on these grounds. For
that to be realistic the existing patches with fuzz need to be rebased and
reviewed.

Signed-off-by: Alexander Kanavin 
---
 ...failure-on-symbol-provided-by-application.patch | 25 +++---
 1 file changed, 13 insertions(+), 12 deletions(-)

diff --git 
a/meta/recipes-devtools/mklibs/files/avoid-failure-on-symbol-provided-by-application.patch
 
b/meta/recipes-devtools/mklibs/files/avoid-failure-on-symbol-provided-by-application.patch
index 7d6d62e773b..17d9af4de42 100644
--- 
a/meta/recipes-devtools/mklibs/files/avoid-failure-on-symbol-provided-by-application.patch
+++ 
b/meta/recipes-devtools/mklibs/files/avoid-failure-on-symbol-provided-by-application.patch
@@ -1,7 +1,7 @@
-From f172101130604e4a9efa5746f4d8d30de99a0fdc Mon Sep 17 00:00:00 2001
+From dcb45256970b15b672d0004533826c94083356e5 Mon Sep 17 00:00:00 2001
 From: Yuanjie Huang 
 Date: Fri, 17 Apr 2015 14:48:20 +0800
-Subject: [PATCH] avoid failure on symbol provided by application
+Subject: [PATCH 4/6] avoid failure on symbol provided by application
 
 Upstream-Status: Pending
 
@@ -13,12 +13,13 @@ cannot be provided by libraries. It prevents false alarm on 
absence
 of symbols.
 
 Signed-off-by: Yuanjie Huang 
+
 ---
  src/mklibs | 28 
  1 file changed, 24 insertions(+), 4 deletions(-)
 
 diff --git a/src/mklibs b/src/mklibs
-index c5614ea..b0d9034 100755
+index a3533c0..66b7a09 100755
 --- a/src/mklibs
 +++ b/src/mklibs
 @@ -133,9 +133,9 @@ class Symbol(object):
@@ -31,9 +32,9 @@ index c5614ea..b0d9034 100755
 -self.weak, self.library = weak, library
 +self.weak, self.library, self.object = weak, library, object
  
- # Return undefined symbols in an object as a set of tuples (name, weakness)
- def undefined_symbols(obj):
-@@ -144,6 +144,11 @@ def undefined_symbols(obj):
+ def symbol_is_blacklisted(name):
+ # The ARM Embedded ABI spec states symbols under this namespace as
+@@ -152,6 +152,11 @@ def undefined_symbols(obj):
  
  output = command("mklibs-readelf", "--print-symbols-undefined", obj)
  
@@ -45,7 +46,7 @@ index c5614ea..b0d9034 100755
  result = []
  for line in output:
  name, weak_string, version_string, library_string = line.split()[:4]
-@@ -160,7 +165,7 @@ def undefined_symbols(obj):
+@@ -171,7 +176,7 @@ def undefined_symbols(obj):
  if library_string.lower() != 'none':
  library = library_string
  
@@ -54,7 +55,7 @@ index c5614ea..b0d9034 100755
  
  return result
  
-@@ -495,12 +500,13 @@ while 1:
+@@ -498,12 +503,13 @@ while 1:
   and re.search("^ps_", str(symbol)))
  and not (re.search("ld-linux.so.3$", str(symbol)))
  and not (re.search("^__gnu_local_gp", str(symbol:
@@ -68,8 +69,8 @@ index c5614ea..b0d9034 100755
 +present_symbol_progs = {}
  checked_libs = small_libs
  checked_libs.extend(available_libs)
- checked_libs.append(ldlib)
-@@ -510,6 +516,12 @@ while 1:
+ checked_libs.append(sysroot + ldlib)
+@@ -513,6 +519,12 @@ while 1:
  names = symbol.base_names()
  for name in names:
  present_symbols[name] = symbol
@@ -82,7 +83,7 @@ index c5614ea..b0d9034 100755
  
  # are we finished?
  num_unresolved = 0
-@@ -565,6 +577,14 @@ while 1:
+@@ -568,6 +580,14 @@ while 1:
  for name in needed_symbols:
  if not name in symbol_provider:
  if not needed_symbols[name].weak:
@@ -98,5 +99,5 @@ index c5614ea..b0d9034 100755
  else:
  lib = symbol_provider[name]
 -- 
-1.8.5.2.233.g932f7e4
+2.16.1
 
-- 
2.16.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 34/36] libunwind: refresh patches

2018-03-09 Thread Alexander Kanavin
From: Ross Burton 

The patch tool will apply patches by default with "fuzz", which is where if the
hunk context isn't present but what is there is close enough, it will force the
patch in.

Whilst this is useful when there's just whitespace changes, when applied to
source it is possible for a patch applied with fuzz to produce broken code which
still compiles (see #10450).  This is obviously bad.

We'd like to eventually have do_patch() rejecting any fuzz on these grounds. For
that to be realistic the existing patches with fuzz need to be rebased and
reviewed.

Signed-off-by: Ross Burton 
Signed-off-by: Alexander Kanavin 
---
 ...Add-AO_REQUIRE_CAS-to-fix-build-on-ARM-v6.patch | 23 ++
 1 file changed, 10 insertions(+), 13 deletions(-)

diff --git 
a/meta/recipes-support/libunwind/libunwind/Add-AO_REQUIRE_CAS-to-fix-build-on-ARM-v6.patch
 
b/meta/recipes-support/libunwind/libunwind/Add-AO_REQUIRE_CAS-to-fix-build-on-ARM-v6.patch
index 0dff2c86dcd..c8faca47244 100644
--- 
a/meta/recipes-support/libunwind/libunwind/Add-AO_REQUIRE_CAS-to-fix-build-on-ARM-v6.patch
+++ 
b/meta/recipes-support/libunwind/libunwind/Add-AO_REQUIRE_CAS-to-fix-build-on-ARM-v6.patch
@@ -28,10 +28,10 @@ 
https://raw.githubusercontent.com/rdnetto/teapot-buildroot/master/package/libunw
  include/libunwind_i.h | 1 +
  2 files changed, 2 insertions(+), 7 deletions(-)
 
-diff --git a/acinclude.m4 b/acinclude.m4
-index 497f7c2..9c15af1 100644
 a/acinclude.m4
-+++ b/acinclude.m4
+Index: libunwind-1.2.1/acinclude.m4
+===
+--- libunwind-1.2.1.orig/acinclude.m4
 libunwind-1.2.1/acinclude.m4
 @@ -22,11 +22,5 @@ fi])
  AC_DEFUN([CHECK_ATOMIC_OPS],
  [dnl Check whether the system has the atomic_ops package installed.
@@ -45,18 +45,15 @@ index 497f7c2..9c15af1 100644
 -#  AC_CHECK_LIB(atomic_ops, main)
 +  AC_CHECK_LIB(atomic_ops, main)
  ])
-diff --git a/include/libunwind_i.h b/include/libunwind_i.h
-index 23f615e..deabdfd 100644
 a/include/libunwind_i.h
-+++ b/include/libunwind_i.h
-@@ -95,6 +95,7 @@ WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 
SOFTWARE.  */
-   (pthread_mutex_unlock != NULL ? pthread_mutex_unlock (l) : 0)
+Index: libunwind-1.2.1/include/libunwind_i.h
+===
+--- libunwind-1.2.1.orig/include/libunwind_i.h
 libunwind-1.2.1/include/libunwind_i.h
+@@ -116,6 +116,7 @@ WITH THE SOFTWARE OR THE USE OR OTHER DE
+ (pthread_mutex_unlock != NULL ? pthread_mutex_unlock (l) : 0)
  
  #ifdef HAVE_ATOMIC_OPS_H
 +# define AO_REQUIRE_CAS
  # include 
  static inline int
  cmpxchg_ptr (void *addr, void *old, void *new)
--- 
-1.9.2
-
-- 
2.16.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


Re: [OE-core] [PATCH] own-mirrors.bbclass: Change prepend to append

2018-03-09 Thread Richard Purdie
On Fri, 2018-03-09 at 17:56 +, Manjukumar Harthikote Matha wrote:
> 
> > 
> > -Original Message-
> > From: Richard Purdie [mailto:richard.pur...@linuxfoundation.org]
> > Sent: Friday, March 09, 2018 5:27 AM
> > To: Bhargava Sreekantappa Gayathri ;
> > openembedded-
> > c...@lists.openembedded.org; Manjukumar Harthikote Matha
> > 
> > Subject: Re: [OE-core] [PATCH] own-mirrors.bbclass: Change prepend
> > to append
> > 
> > On Thu, 2018-03-08 at 17:49 -0800, Bhargava Sreekantappa Gayathri
> > wrote:
> > > 
> > > If BB_NO_NETWORK is set to 1, and local download directory is
> > > added as
> > > PREMIRRORS_prepend in conf file, PREMIRRORS variable will have
> > > SOURCE_MIRROR_URL as the first url. This causes build to fail as
> > > network access is diabled. PREMIRRORS should be appended here so
> > > that
> > > a prepend in other layers/conf files takes precedence.
> > > 
> > > Signed-off-by: Bhargava Sreekantappa Gayathri
> > >  > > gayat...@xilinx.com>
> > > Signed-off-by: Manjukumar Matha  > > nx.c
> > > om>
> > > ---
> > >  meta/classes/own-mirrors.bbclass | 2 +-
> > >  1 file changed, 1 insertion(+), 1 deletion(-)
> > I think this patch just moves the problem, you could easily have a
> > file:/// url
> > as SOURCE_MIRROR_URL and a network address in your other layer in
> > which case
> > your patch would break things...
> > 
> 
> Agreed.
> I think the better fix would be to go through the entire available
> list in PREMIRRORS skipping http or https  (since BB_NO_NETWORK is
> set) and then fail if we cannot get the required file.

Agreed, we just need to ensure users see a mention that BB_NO_NETWORK
is set in those failure modes.

Cheers,

Richard
-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 35/36] attr: refresh patches

2018-03-09 Thread Alexander Kanavin
From: Ross Burton 

The patch tool will apply patches by default with "fuzz", which is where if the
hunk context isn't present but what is there is close enough, it will force the
patch in.

Whilst this is useful when there's just whitespace changes, when applied to
source it is possible for a patch applied with fuzz to produce broken code which
still compiles (see #10450).  This is obviously bad.

We'd like to eventually have do_patch() rejecting any fuzz on these grounds. For
that to be realistic the existing patches with fuzz need to be rebased and
reviewed.

Signed-off-by: Ross Burton 
Signed-off-by: Alexander Kanavin 
---
 .../acl/test-fix-insufficient-quoting-of.patch | 52 +-
 1 file changed, 22 insertions(+), 30 deletions(-)

diff --git 
a/meta/recipes-support/attr/acl/test-fix-insufficient-quoting-of.patch 
b/meta/recipes-support/attr/acl/test-fix-insufficient-quoting-of.patch
index 0b350be5634..f392465b58e 100644
--- a/meta/recipes-support/attr/acl/test-fix-insufficient-quoting-of.patch
+++ b/meta/recipes-support/attr/acl/test-fix-insufficient-quoting-of.patch
@@ -35,61 +35,56 @@ 
http://git.savannah.gnu.org/cgit/acl.git/commit/?id=e98ce8acf84d12ea67a3ac76bf63
 
 Signed-off-by: Kamil Dudka 
 Signed-off-by: He Zhe 

- test/cp.test| 2 +-
- test/misc.test  | 6 +++---
- test/sbits-restore.test | 6 +++---
- 3 files changed, 7 insertions(+), 7 deletions(-)
 
-diff --git a/test/cp.test b/test/cp.test
-index 0867f63..a927195 100644
 a/test/cp.test
-+++ b/test/cp.test
-@@ -9,7 +9,7 @@ The cp utility should only copy ACLs if `-p' is given.
+Index: acl-2.2.52/test/cp.test
+===
+--- acl-2.2.52.orig/test/cp.test
 acl-2.2.52/test/cp.test
+@@ -9,7 +9,7 @@ The cp utility should only copy ACLs if
> -rw-rw-r--+
-
+   
$ cp f g
 -  $ ls -l g | awk -- '{ print $1 }' | sed 's/\.$//g'
 +  $ ls -l g | awk -- '{ print $1 }' | sed 's/\\.$//g'
> -rw-r--r--
-
+   
$ rm g
-diff --git a/test/misc.test b/test/misc.test
-index 6e98053..29372b7 100644
 a/test/misc.test
-+++ b/test/misc.test
+Index: acl-2.2.52/test/misc.test
+===
+--- acl-2.2.52.orig/test/misc.test
 acl-2.2.52/test/misc.test
 @@ -254,7 +254,7 @@ Add some users and groups
  Symlink in directory with default ACL?
-
+
$ ln -s d d/l
 -  $ ls -dl d/l | awk '{print $1}' | sed 's/\.$//g'
 +  $ ls -dl d/l | awk '{print $1}' | sed 's/\\.$//g'
> lrwxrwxrwx
-
+ 
$ ls -dl -L d/l | awk '{print $1}'
 @@ -343,7 +343,7 @@ Remove the default ACL
  Reset to base entries
-
+
$ setfacl -b d
 -  $ ls -dl d | awk '{print $1}' | sed 's/\.$//g'
 +  $ ls -dl d | awk '{print $1}' | sed 's/\\.$//g'
> drwxr-x---
-
+ 
$ getfacl --omit-header d
 @@ -355,7 +355,7 @@ Reset to base entries
  Now, chmod should change the group_obj entry
-
+
$ chmod 775 d
 -  $ ls -dl d | awk '{print $1}' | sed 's/\.$//g'
 +  $ ls -dl d | awk '{print $1}' | sed 's/\\.$//g'
> drwxrwxr-x
-
+   
$ getfacl --omit-header d
-diff --git a/test/sbits-restore.test b/test/sbits-restore.test
-index de21340..5899b0a 100644
 a/test/sbits-restore.test
-+++ b/test/sbits-restore.test
-@@ -13,10 +13,10 @@ Ensure setting of SUID/SGID/sticky via --restore works
+Index: acl-2.2.52/test/sbits-restore.test
+===
+--- acl-2.2.52.orig/test/sbits-restore.test
 acl-2.2.52/test/sbits-restore.test
+@@ -13,10 +13,10 @@ Ensure setting of SUID/SGID/sticky via -
$ touch d/g
$ touch d/u
$ setfacl --restore d.acl
@@ -103,6 +98,3 @@ index de21340..5899b0a 100644
 +  $ ls -dl d/g | awk '{print $1}' | sed 's/\\.$//g'
> -rw-r-Sr--
$ rm -Rf d
---
-1.9.1
-
-- 
2.16.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 32/36] cryptodev: refresh patches

2018-03-09 Thread Alexander Kanavin
From: Ross Burton 

The patch tool will apply patches by default with "fuzz", which is where if the
hunk context isn't present but what is there is close enough, it will force the
patch in.

Whilst this is useful when there's just whitespace changes, when applied to
source it is possible for a patch applied with fuzz to produce broken code which
still compiles (see #10450).  This is obviously bad.

We'd like to eventually have do_patch() rejecting any fuzz on these grounds. For
that to be realistic the existing patches with fuzz need to be rebased and
reviewed.

Signed-off-by: Ross Burton 
Signed-off-by: Alexander Kanavin 
---
 ...pile-and-install-rules-for-cryptodev-test.patch | 42 +++---
 1 file changed, 21 insertions(+), 21 deletions(-)

diff --git 
a/meta/recipes-kernel/cryptodev/files/0001-Add-the-compile-and-install-rules-for-cryptodev-test.patch
 
b/meta/recipes-kernel/cryptodev/files/0001-Add-the-compile-and-install-rules-for-cryptodev-test.patch
index 3f0298b0b0a..84fd27e681c 100644
--- 
a/meta/recipes-kernel/cryptodev/files/0001-Add-the-compile-and-install-rules-for-cryptodev-test.patch
+++ 
b/meta/recipes-kernel/cryptodev/files/0001-Add-the-compile-and-install-rules-for-cryptodev-test.patch
@@ -14,37 +14,37 @@ Upstream-Status: Pending
  tests/Makefile |8 
  2 files changed, 14 insertions(+), 0 deletions(-)
 
-diff --git a/Makefile b/Makefile
-index 31c4b3f..2ecf2a9 100644
 a/Makefile
-+++ b/Makefile
-@@ -34,6 +34,9 @@ modules_install:
-   @echo "Installing cryptodev.h in $(PREFIX)/usr/include/crypto ..."
-   @install -D crypto/cryptodev.h $(PREFIX)/usr/include/crypto/cryptodev.h
+Index: git/Makefile
+===
+--- git.orig/Makefile
 git/Makefile
+@@ -35,6 +35,9 @@ modules_install:
+   $(MAKE) $(KERNEL_MAKE_OPTS) modules_install
+   install -m 644 -D crypto/cryptodev.h 
$(DESTDIR)/$(includedir)/crypto/cryptodev.h
  
 +install_tests:
 +  make -C tests install DESTDIR=$(PREFIX)
 +
  clean:
-   make -C $(KERNEL_DIR) SUBDIRS=`pwd` clean
+   $(MAKE) $(KERNEL_MAKE_OPTS) clean
rm -f $(hostprogs) *~
-@@ -42,6 +45,9 @@ clean:
+@@ -43,6 +46,9 @@ clean:
  check:
-   CFLAGS=$(CRYPTODEV_CFLAGS) KERNEL_DIR=$(KERNEL_DIR) make -C tests check
+   CFLAGS=$(CRYPTODEV_CFLAGS) KERNEL_DIR=$(KERNEL_DIR) $(MAKE) -C tests 
check
  
 +testprogs:
 +  KERNEL_DIR=$(KERNEL_DIR) make -C tests testprogs
 +
  CPOPTS =
- ifneq (${SHOW_TYPES},)
+ ifneq ($(SHOW_TYPES),)
  CPOPTS += --show-types
-diff --git a/tests/Makefile b/tests/Makefile
-index c9f04e8..cd202af 100644
 a/tests/Makefile
-+++ b/tests/Makefile
-@@ -19,6 +19,12 @@ example-async-hmac-objs := async_hmac.o
- example-async-speed-objs := async_speed.o
- example-hashcrypt-speed-objs := hashcrypt_speed.c
+Index: git/tests/Makefile
+===
+--- git.orig/tests/Makefile
 git/tests/Makefile
+@@ -23,6 +23,12 @@ bindir = $(execprefix)/bin
+ 
+ all: $(hostprogs)
  
 +install:
 +  install -d  $(DESTDIR)/usr/bin/tests_cryptodev
@@ -55,9 +55,9 @@ index c9f04e8..cd202af 100644
  check: $(hostprogs)
./cipher
./hmac
-@@ -28,6 +34,8 @@ check: $(hostprogs)
-   ./cipher-gcm
-   ./cipher-aead
+@@ -38,6 +44,8 @@ install:
+   install -m 755 $$prog $(DESTDIR)/$(bindir); \
+   done
  
 +testprogs: $(hostprogs)
 +
-- 
2.16.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 31/36] blktrace: refresh patches

2018-03-09 Thread Alexander Kanavin
From: Ross Burton 

The patch tool will apply patches by default with "fuzz", which is where if the
hunk context isn't present but what is there is close enough, it will force the
patch in.

Whilst this is useful when there's just whitespace changes, when applied to
source it is possible for a patch applied with fuzz to produce broken code which
still compiles (see #10450).  This is obviously bad.

We'd like to eventually have do_patch() rejecting any fuzz on these grounds. For
that to be realistic the existing patches with fuzz need to be rebased and
reviewed.

Signed-off-by: Ross Burton 
Signed-off-by: Alexander Kanavin 
---
 meta/recipes-kernel/blktrace/blktrace/ldflags.patch | 16 
 1 file changed, 12 insertions(+), 4 deletions(-)

diff --git a/meta/recipes-kernel/blktrace/blktrace/ldflags.patch 
b/meta/recipes-kernel/blktrace/blktrace/ldflags.patch
index 29eb0f2728a..ab905cf0da3 100644
--- a/meta/recipes-kernel/blktrace/blktrace/ldflags.patch
+++ b/meta/recipes-kernel/blktrace/blktrace/ldflags.patch
@@ -10,6 +10,8 @@ aed463414e2e2bf8ca44ba54ee5973e7ed599e57
 
 Signed-off-by: Fahad Usman 
 
+Index: git/Makefile
+===
 --- git.orig/Makefile
 +++ git/Makefile
 @@ -1,5 +1,6 @@
@@ -19,7 +21,7 @@ Signed-off-by: Fahad Usman 
  ALL_CFLAGS = $(CFLAGS) -D_GNU_SOURCE -D_LARGEFILE_SOURCE 
-D_FILE_OFFSET_BITS=64
  PROGS = blkparse blktrace verify_blkparse blkrawverify blkiomon
  LIBS  = -lpthread
-@@ -23,19 +24,19 @@ btreplay/btreplay:
+@@ -26,19 +27,19 @@ btreplay/btreplay:
$(CC) -o $*.o -c $(ALL_CFLAGS) $<
  
  blkparse: blkparse.o blkparse_fmt.o rbtree.o act_mask.o
@@ -44,6 +46,8 @@ Signed-off-by: Fahad Usman 
  
  $(PROGS): | depend
  
+Index: git/btreplay/Makefile
+===
 --- git.orig/btreplay/Makefile
 +++ git/btreplay/Makefile
 @@ -7,6 +7,7 @@
@@ -55,8 +59,8 @@ Signed-off-by: Fahad Usman 
  OCFLAGS   = -UCOUNT_IOS -UDEBUG -DNDEBUG
  XCFLAGS   = -D_GNU_SOURCE -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64
 @@ -32,10 +33,10 @@ clean: docsclean
-   $(CC) $(CFLAGS) -c -o $*.o $<
-
+   $(CC) $(CFLAGS) -c -o $*.o $<
+ 
  btrecord: btrecord.o
 -  $(CC) $(CFLAGS) -o $@ $(filter %.o,$^)
 +  $(CC) $(CFLAGS) -o $@ $(filter %.o,$^) $(LDFLAGS)
@@ -67,6 +71,8 @@ Signed-off-by: Fahad Usman 
  
  depend:
@$(CC) -MM $(CFLAGS) *.c 1> .depend
+Index: git/btt/Makefile
+===
 --- git.orig/btt/Makefile
 +++ git/btt/Makefile
 @@ -7,6 +7,7 @@
@@ -86,10 +92,12 @@ Signed-off-by: Fahad Usman 
  
  ifneq ($(wildcard .depend),)
  include .depend
+Index: git/iowatcher/Makefile
+===
 --- git.orig/iowatcher/Makefile
 +++ git/iowatcher/Makefile
 @@ -1,5 +1,6 @@
- C  = gcc
+ CC  = gcc
  CFLAGS  = -Wall -O2 -g -W -Wunused-result
 +LDFLAGS =
  ALL_CFLAGS = $(CFLAGS) -D_GNU_SOURCE -D_LARGEFILE_SOURCE 
-D_FILE_OFFSET_BITS=64
-- 
2.16.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 30/36] xorg-xserver: refresh patches

2018-03-09 Thread Alexander Kanavin
From: Ross Burton 

The patch tool will apply patches by default with "fuzz", which is where if the
hunk context isn't present but what is there is close enough, it will force the
patch in.

Whilst this is useful when there's just whitespace changes, when applied to
source it is possible for a patch applied with fuzz to produce broken code which
still compiles (see #10450).  This is obviously bad.

We'd like to eventually have do_patch() rejecting any fuzz on these grounds. For
that to be realistic the existing patches with fuzz need to be rebased and
reviewed.

Signed-off-by: Ross Burton 
Signed-off-by: Alexander Kanavin 
---
 .../xorg-xserver/xserver-xorg/macro_tweak.patch  | 12 ++--
 1 file changed, 6 insertions(+), 6 deletions(-)

diff --git a/meta/recipes-graphics/xorg-xserver/xserver-xorg/macro_tweak.patch 
b/meta/recipes-graphics/xorg-xserver/xserver-xorg/macro_tweak.patch
index ec0eea6ca2d..c36e4e73012 100644
--- a/meta/recipes-graphics/xorg-xserver/xserver-xorg/macro_tweak.patch
+++ b/meta/recipes-graphics/xorg-xserver/xserver-xorg/macro_tweak.patch
@@ -5,13 +5,13 @@ Upstream-Status: Pending
 
 Signed-off-by: Yu Ke 
 
-diff --git a/xorg-server.m4 b/xorg-server.m4
-index bdecf62..040fdb8 100644
 a/xorg-server.m4
-+++ b/xorg-server.m4
+Index: xorg-server-1.19.6/xorg-server.m4
+===
+--- xorg-server-1.19.6.orig/xorg-server.m4
 xorg-server-1.19.6/xorg-server.m4
 @@ -28,10 +28,12 @@ dnl
- # Checks for the $1 define in xorg-server.h (from the sdk).  If it
- # is defined, then add $1 to $REQUIRED_MODULES.
+ # Checks for the MACRO define in xorg-server.h (from the sdk).  If it
+ # is defined, then add the given PROTO to $REQUIRED_MODULES.
  
 +m4_pattern_allow(PKG_CONFIG_SYSROOT_DIR)
 +
-- 
2.16.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 33/36] libtiff: refresh patches

2018-03-09 Thread Alexander Kanavin
From: Ross Burton 

The patch tool will apply patches by default with "fuzz", which is where if the
hunk context isn't present but what is there is close enough, it will force the
patch in.

Whilst this is useful when there's just whitespace changes, when applied to
source it is possible for a patch applied with fuzz to produce broken code which
still compiles (see #10450).  This is obviously bad.

We'd like to eventually have do_patch() rejecting any fuzz on these grounds. For
that to be realistic the existing patches with fuzz need to be rebased and
reviewed.

Signed-off-by: Ross Burton 
Signed-off-by: Alexander Kanavin 
---
 meta/recipes-multimedia/libtiff/files/libtool2.patch | 8 
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/meta/recipes-multimedia/libtiff/files/libtool2.patch 
b/meta/recipes-multimedia/libtiff/files/libtool2.patch
index 4798e470719..a84c6889627 100644
--- a/meta/recipes-multimedia/libtiff/files/libtool2.patch
+++ b/meta/recipes-multimedia/libtiff/files/libtool2.patch
@@ -4,13 +4,13 @@ Upstream-Status: Inappropriate [configuration]
  configure.ac |2 +-
  1 file changed, 1 insertion(+), 1 deletion(-)
 
-Index: tiff-4.0.8/configure.ac
+Index: tiff-4.0.9/configure.ac
 ===
 tiff-4.0.8.orig/configure.ac
-+++ tiff-4.0.8/configure.ac
+--- tiff-4.0.9.orig/configure.ac
 tiff-4.0.9/configure.ac
 @@ -27,7 +27,7 @@ dnl Process this file with autoconf to p
  AC_PREREQ(2.64)
- AC_INIT([LibTIFF Software],[4.0.8],[t...@lists.maptools.org],[tiff])
+ AC_INIT([LibTIFF Software],[4.0.9],[t...@lists.maptools.org],[tiff])
  AC_CONFIG_AUX_DIR(config)
 -AC_CONFIG_MACRO_DIR(m4)
 +dnl AC_CONFIG_MACRO_DIR(m4)
-- 
2.16.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 28/36] mesa: refresh patches

2018-03-09 Thread Alexander Kanavin
From: Ross Burton 

The patch tool will apply patches by default with "fuzz", which is where if the
hunk context isn't present but what is there is close enough, it will force the
patch in.

Whilst this is useful when there's just whitespace changes, when applied to
source it is possible for a patch applied with fuzz to produce broken code which
still compiles (see #10450).  This is obviously bad.

We'd like to eventually have do_patch() rejecting any fuzz on these grounds. For
that to be realistic the existing patches with fuzz need to be rebased and
reviewed.

Signed-off-by: Ross Burton 
Signed-off-by: Alexander Kanavin 
---
 vulkan.am-explictly-add-lib-expat-to-intel-.patch | 13 +
 .../files/0001-Use-wayland-scanner-in-the-path.patch  | 19 ---
 2 files changed, 13 insertions(+), 19 deletions(-)

diff --git 
a/meta/recipes-graphics/mesa/files/0001-Makefile.vulkan.am-explictly-add-lib-expat-to-intel-.patch
 
b/meta/recipes-graphics/mesa/files/0001-Makefile.vulkan.am-explictly-add-lib-expat-to-intel-.patch
index ff8eda458c2..f908d46550e 100644
--- 
a/meta/recipes-graphics/mesa/files/0001-Makefile.vulkan.am-explictly-add-lib-expat-to-intel-.patch
+++ 
b/meta/recipes-graphics/mesa/files/0001-Makefile.vulkan.am-explictly-add-lib-expat-to-intel-.patch
@@ -28,10 +28,10 @@ Signed-off-by: Hongxu Jia 
  src/intel/Makefile.vulkan.am | 1 +
  1 file changed, 1 insertion(+)
 
-diff --git a/src/intel/Makefile.vulkan.am b/src/intel/Makefile.vulkan.am
-index 271b0a5..8fbe2c8 100644
 a/src/intel/Makefile.vulkan.am
-+++ b/src/intel/Makefile.vulkan.am
+Index: mesa-17.3.6/src/intel/Makefile.vulkan.am
+===
+--- mesa-17.3.6.orig/src/intel/Makefile.vulkan.am
 mesa-17.3.6/src/intel/Makefile.vulkan.am
 @@ -144,6 +144,7 @@ VULKAN_LIB_DEPS = \
$(LIBDRM_LIBS) \
$(PTHREAD_LIBS) \
@@ -39,7 +39,4 @@ index 271b0a5..8fbe2c8 100644
 +  $(EXPAT_LIBS) \
-lm
  
- if HAVE_PLATFORM_X11
--- 
-2.7.4
-
+ if HAVE_PLATFORM_ANDROID
diff --git 
a/meta/recipes-graphics/mesa/files/0001-Use-wayland-scanner-in-the-path.patch 
b/meta/recipes-graphics/mesa/files/0001-Use-wayland-scanner-in-the-path.patch
index eb6ff4ff044..2444b2846b0 100644
--- 
a/meta/recipes-graphics/mesa/files/0001-Use-wayland-scanner-in-the-path.patch
+++ 
b/meta/recipes-graphics/mesa/files/0001-Use-wayland-scanner-in-the-path.patch
@@ -14,12 +14,12 @@ Signed-off-by: Jussi Kukkonen 
  configure.ac | 7 +--
  1 file changed, 1 insertion(+), 6 deletions(-)
 
-diff --git a/configure.ac b/configure.ac
-index 2c7e636fac..d2b2350739 100644
 a/configure.ac
-+++ b/configure.ac
-@@ -2174,12 +2174,7 @@ if test "x$with_platforms" != xauto; then
- with_egl_platforms=$with_platforms
+Index: mesa-17.3.6/configure.ac
+===
+--- mesa-17.3.6.orig/configure.ac
 mesa-17.3.6/configure.ac
+@@ -1694,12 +1694,7 @@ if test "x$with_platforms" = xauto; then
+ with_platforms=$with_egl_platforms
  fi
  
 -PKG_CHECK_MODULES([WAYLAND_SCANNER], [wayland-scanner],
@@ -30,8 +30,5 @@ index 2c7e636fac..d2b2350739 100644
 -fi
 +AC_PATH_PROG([WAYLAND_SCANNER], [wayland-scanner])
  
- # Do per-EGL platform setups and checks
- egl_platforms=`IFS=', '; echo $with_egl_platforms`
--- 
-2.13.0
-
+ PKG_CHECK_EXISTS([wayland-protocols >= $WAYLAND_PROTOCOLS_REQUIRED], 
[have_wayland_protocols=yes], [have_wayland_protocols=no])
+ if test "x$have_wayland_protocols" = xyes; then
-- 
2.16.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 25/36] gnome: refresh patches

2018-03-09 Thread Alexander Kanavin
From: Ross Burton 

The patch tool will apply patches by default with "fuzz", which is where if the
hunk context isn't present but what is there is close enough, it will force the
patch in.

Whilst this is useful when there's just whitespace changes, when applied to
source it is possible for a patch applied with fuzz to produce broken code which
still compiles (see #10450).  This is obviously bad.

We'd like to eventually have do_patch() rejecting any fuzz on these grounds. For
that to be realistic the existing patches with fuzz need to be rebased and
reviewed.

Signed-off-by: Ross Burton 
Signed-off-by: Alexander Kanavin 
---
 .../0001-Don-t-use-AC_CANONICAL_HOST.patch  | 13 +
 1 file changed, 5 insertions(+), 8 deletions(-)

diff --git 
a/meta/recipes-gnome/gnome/adwaita-icon-theme/0001-Don-t-use-AC_CANONICAL_HOST.patch
 
b/meta/recipes-gnome/gnome/adwaita-icon-theme/0001-Don-t-use-AC_CANONICAL_HOST.patch
index c0f2758da03..96ec96bdb2b 100644
--- 
a/meta/recipes-gnome/gnome/adwaita-icon-theme/0001-Don-t-use-AC_CANONICAL_HOST.patch
+++ 
b/meta/recipes-gnome/gnome/adwaita-icon-theme/0001-Don-t-use-AC_CANONICAL_HOST.patch
@@ -13,18 +13,15 @@ Signed-off-by: Jussi Kukkonen 
  configure.ac | 1 -
  1 file changed, 1 deletion(-)
 
-diff --git a/configure.ac b/configure.ac
-index b20eb1a..50c5fd6 100644
 a/configure.ac
-+++ b/configure.ac
+Index: adwaita-icon-theme-3.26.1/configure.ac
+===
+--- adwaita-icon-theme-3.26.1.orig/configure.ac
 adwaita-icon-theme-3.26.1/configure.ac
 @@ -3,7 +3,6 @@ AC_PREREQ(2.53)
  
- AC_INIT([adwaita-icon-theme], [3.26.0],
+ AC_INIT([adwaita-icon-theme], [3.26.1],
  [http://bugzilla.gnome.org/enter_bug.cgi?product=adwaita-icon-theme])
 -AC_CANONICAL_HOST
  AC_CONFIG_MACRO_DIR([m4])
  AC_CONFIG_SRCDIR([index.theme.in])
  
--- 
-2.14.1
-
-- 
2.16.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 26/36] gtk-doc: refresh patches

2018-03-09 Thread Alexander Kanavin
From: Ross Burton 

The patch tool will apply patches by default with "fuzz", which is where if the
hunk context isn't present but what is there is close enough, it will force the
patch in.

Whilst this is useful when there's just whitespace changes, when applied to
source it is possible for a patch applied with fuzz to produce broken code which
still compiles (see #10450).  This is obviously bad.

We'd like to eventually have do_patch() rejecting any fuzz on these grounds. For
that to be realistic the existing patches with fuzz need to be rebased and
reviewed.

Signed-off-by: Ross Burton 
Signed-off-by: Alexander Kanavin 
---
 .../gtk-doc/files/pkg-config-native.patch  | 18 --
 1 file changed, 8 insertions(+), 10 deletions(-)

diff --git a/meta/recipes-gnome/gtk-doc/files/pkg-config-native.patch 
b/meta/recipes-gnome/gtk-doc/files/pkg-config-native.patch
index bf03c8f6134..bfbc777ff87 100644
--- a/meta/recipes-gnome/gtk-doc/files/pkg-config-native.patch
+++ b/meta/recipes-gnome/gtk-doc/files/pkg-config-native.patch
@@ -10,19 +10,20 @@ Signed-off-by: Ross Burton 
  gtk-doc.m4 | 7 ++-
  1 file changed, 6 insertions(+), 1 deletion(-)
 
-diff --git a/gtk-doc.m4 b/gtk-doc.m4
-index 3675543..2590e2a 100644
 a/gtk-doc.m4
-+++ b/gtk-doc.m4
-@@ -1,6 +1,6 @@
- dnl -*- mode: autoconf -*-
+Index: gtk-doc-1.27/gtk-doc.m4
+===
+--- gtk-doc-1.27.orig/gtk-doc.m4
 gtk-doc-1.27/gtk-doc.m4
+@@ -25,7 +25,7 @@
+ # Macro appear in them. The GNU General Public License (GPL) does govern
+ # all other use of the material that constitutes the Autoconf Macro.
  
 -# serial 2
 +# serial 2.1
  
  dnl Usage:
  dnl   GTK_DOC_CHECK([minimum-gtk-doc-version])
-@@ -10,11 +10,16 @@ AC_DEFUN([GTK_DOC_CHECK],
+@@ -35,11 +35,16 @@ AC_DEFUN([GTK_DOC_CHECK],
AC_BEFORE([AC_PROG_LIBTOOL],[$0])dnl setup libtool first
AC_BEFORE([AM_PROG_LIBTOOL],[$0])dnl setup libtool first
  
@@ -39,6 +40,3 @@ index 3675543..2590e2a 100644
if test "$have_gtk_doc" = "no"; then
AC_MSG_WARN([
You will not be able to create source packages with 'make dist'
--- 
-2.15.1
-
-- 
2.16.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 27/36] drm: refresh patches

2018-03-09 Thread Alexander Kanavin
From: Ross Burton 

The patch tool will apply patches by default with "fuzz", which is where if the
hunk context isn't present but what is there is close enough, it will force the
patch in.

Whilst this is useful when there's just whitespace changes, when applied to
source it is possible for a patch applied with fuzz to produce broken code which
still compiles (see #10450).  This is obviously bad.

We'd like to eventually have do_patch() rejecting any fuzz on these grounds. For
that to be realistic the existing patches with fuzz need to be rebased and
reviewed.

Signed-off-by: Ross Burton 
Signed-off-by: Alexander Kanavin 
---
 ...ac-Allow-explicit-enabling-of-cunit-tests.patch | 25 ++
 1 file changed, 11 insertions(+), 14 deletions(-)

diff --git 
a/meta/recipes-graphics/drm/libdrm/0001-configure.ac-Allow-explicit-enabling-of-cunit-tests.patch
 
b/meta/recipes-graphics/drm/libdrm/0001-configure.ac-Allow-explicit-enabling-of-cunit-tests.patch
index bf526370b0c..40bebc0f50c 100644
--- 
a/meta/recipes-graphics/drm/libdrm/0001-configure.ac-Allow-explicit-enabling-of-cunit-tests.patch
+++ 
b/meta/recipes-graphics/drm/libdrm/0001-configure.ac-Allow-explicit-enabling-of-cunit-tests.patch
@@ -12,11 +12,11 @@ Upstream-Status: Submitted [mailing list]
  configure.ac | 14 --
  1 file changed, 12 insertions(+), 2 deletions(-)
 
-diff --git a/configure.ac b/configure.ac
-index e3048c7..918d21d 100644
 a/configure.ac
-+++ b/configure.ac
-@@ -137,6 +137,12 @@ AC_ARG_ENABLE(install-test-programs,
+Index: libdrm-2.4.91/configure.ac
+===
+--- libdrm-2.4.91.orig/configure.ac
 libdrm-2.4.91/configure.ac
+@@ -163,6 +163,12 @@ AC_ARG_ENABLE(install-test-programs,
  [Install test programs (default: no)]),
  [INSTALL_TESTS=$enableval], [INSTALL_TESTS=no])
  
@@ -29,8 +29,8 @@ index e3048c7..918d21d 100644
  dnl 
===
  dnl check compiler flags
  AC_DEFUN([LIBDRM_CC_TRY_FLAG], [
-@@ -372,7 +378,7 @@ if test "x$RADEON" = xyes; then
-   AC_DEFINE(HAVE_RADEON, 1, [Have radeon support])
+@@ -411,7 +417,7 @@ else
+   AC_DEFINE(HAVE_RADEON, 0)
  fi
  
 -if test "x$AMDGPU" != xno; then
@@ -38,8 +38,8 @@ index e3048c7..918d21d 100644
# Detect cunit library
PKG_CHECK_MODULES([CUNIT], [cunit >= 2.1], [have_cunit=yes], 
[have_cunit=no])
# If pkg-config does not find cunit, check it using AC_CHECK_LIB.  We
-@@ -399,7 +406,11 @@ if test "x$AMDGPU" = xyes; then
-   AC_DEFINE(HAVE_CUNIT, [test "x$have_cunit" != "xno"], [Enable CUNIT 
Have amdgpu support])
+@@ -436,7 +442,11 @@ if test "x$AMDGPU" = xyes; then
+   AC_DEFINE(HAVE_AMDGPU, 1, [Have amdgpu support])
  
if test "x$have_cunit" = "xno"; then
 -  AC_MSG_WARN([Could not find cunit library. Disabling amdgpu 
tests])
@@ -49,8 +49,5 @@ index e3048c7..918d21d 100644
 +  AC_MSG_WARN([Could not find cunit library. Disabling 
amdgpu tests])
 +  fi
fi
- fi
- 
--- 
-2.1.4
-
+ else
+   AC_DEFINE(HAVE_AMDGPU, 0)
-- 
2.16.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 29/36] acpica: remove unnecesary no-werror.patch

2018-03-09 Thread Alexander Kanavin
It became out of date (missing newly added files), and seems no longer 
necessary for builds.

Signed-off-by: Alexander Kanavin 
---
 meta/recipes-extended/acpica/acpica_20170303.bb|  1 -
 meta/recipes-extended/acpica/files/no-werror.patch | 32 --
 2 files changed, 33 deletions(-)
 delete mode 100644 meta/recipes-extended/acpica/files/no-werror.patch

diff --git a/meta/recipes-extended/acpica/acpica_20170303.bb 
b/meta/recipes-extended/acpica/acpica_20170303.bb
index 4c0f366abfc..51ae77b7840 100644
--- a/meta/recipes-extended/acpica/acpica_20170303.bb
+++ b/meta/recipes-extended/acpica/acpica_20170303.bb
@@ -17,7 +17,6 @@ COMPATIBLE_HOST = "(i.86|x86_64|arm|aarch64).*-linux"
 DEPENDS = "bison flex"
 
 SRC_URI = "https://acpica.org/sites/acpica/files/acpica-unix2-${PV}.tar.gz \
-file://no-werror.patch \
 file://rename-yy_scan_string-manually.patch \
 file://manipulate-fds-instead-of-FILE.patch;striplevel=2 \
 file://0001-Linux-add-support-for-X32-ABI-compilation.patch \
diff --git a/meta/recipes-extended/acpica/files/no-werror.patch 
b/meta/recipes-extended/acpica/files/no-werror.patch
deleted file mode 100644
index a6e7b540a18..000
--- a/meta/recipes-extended/acpica/files/no-werror.patch
+++ /dev/null
@@ -1,32 +0,0 @@
-Description: remove -Werror flag
-Forwarded: not-needed
-Author: Fathi Boudra 
-Upstream-Status: Pending

- generate/unix/iasl/Makefile |   12 ++--
- 1 file changed, 6 insertions(+), 6 deletions(-)
-
 a/generate/unix/iasl/Makefile
-+++ b/generate/unix/iasl/Makefile
-@@ -266,19 +266,19 @@ $(OBJDIR)/prparser.y.h: $(OBJDIR)/prpars
- # by the utilities above and they are not necessarily ANSI C, etc.
- #
- $(OBJDIR)/aslcompilerlex.o :   $(OBJDIR)/aslcompilerlex.c
--  $(CC) -c $(CFLAGS) -Wall -Werror -o$@ $<
-+  $(CC) -c $(CFLAGS) -Wall -o$@ $<
- 
- $(OBJDIR)/aslcompilerparse.o : $(OBJDIR)/aslcompilerparse.c
--  $(CC) -c $(CFLAGS) -Wall -Werror -o$@ $<
-+  $(CC) -c $(CFLAGS) -Wall -o$@ $<
- 
- $(OBJDIR)/dtparserlex.o :  $(OBJDIR)/dtparserlex.c
--  $(CC) -c $(CFLAGS) -Wall -Werror -o$@ $<
-+  $(CC) -c $(CFLAGS) -Wall -o$@ $<
- 
- $(OBJDIR)/dtparserparse.o :$(OBJDIR)/dtparserparse.c
--  $(CC) -c $(CFLAGS) -Wall -Werror -o$@ $<
-+  $(CC) -c $(CFLAGS) -Wall -o$@ $<
- 
- $(OBJDIR)/prparserlex.o :  $(OBJDIR)/prparserlex.c
--  $(CC) -c $(CFLAGS) -Wall -Werror -o$@ $<
-+  $(CC) -c $(CFLAGS) -Wall -o$@ $<
-- 
2.16.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 24/36] sysstat: refresh patches

2018-03-09 Thread Alexander Kanavin
From: Ross Burton 

The patch tool will apply patches by default with "fuzz", which is where if the
hunk context isn't present but what is there is close enough, it will force the
patch in.

Whilst this is useful when there's just whitespace changes, when applied to
source it is possible for a patch applied with fuzz to produce broken code which
still compiles (see #10450).  This is obviously bad.

We'd like to eventually have do_patch() rejecting any fuzz on these grounds. For
that to be realistic the existing patches with fuzz need to be rebased and
reviewed.

Signed-off-by: Ross Burton 
Signed-off-by: Alexander Kanavin 
---
 .../0001-Include-needed-headers-explicitly.patch | 20 ++--
 1 file changed, 10 insertions(+), 10 deletions(-)

diff --git 
a/meta/recipes-extended/sysstat/sysstat/0001-Include-needed-headers-explicitly.patch
 
b/meta/recipes-extended/sysstat/sysstat/0001-Include-needed-headers-explicitly.patch
index 5fc26fbc270..1b63299aaea 100644
--- 
a/meta/recipes-extended/sysstat/sysstat/0001-Include-needed-headers-explicitly.patch
+++ 
b/meta/recipes-extended/sysstat/sysstat/0001-Include-needed-headers-explicitly.patch
@@ -21,10 +21,10 @@ Upstream-Status: Pending
  sa_common.c | 1 +
  3 files changed, 3 insertions(+)
 
-Index: sysstat-11.5.7/common.c
+Index: sysstat-11.7.1/common.c
 ===
 sysstat-11.5.7.orig/common.c
-+++ sysstat-11.5.7/common.c
+--- sysstat-11.7.1.orig/common.c
 sysstat-11.7.1/common.c
 @@ -20,6 +20,7 @@
   */
  
@@ -33,10 +33,10 @@ Index: sysstat-11.5.7/common.c
  #include 
  #include 
  #include 
-Index: sysstat-11.5.7/ioconf.c
+Index: sysstat-11.7.1/ioconf.c
 ===
 sysstat-11.5.7.orig/ioconf.c
-+++ sysstat-11.5.7/ioconf.c
+--- sysstat-11.7.1.orig/ioconf.c
 sysstat-11.7.1/ioconf.c
 @@ -27,6 +27,7 @@
  #include 
  #include 
@@ -45,10 +45,10 @@ Index: sysstat-11.5.7/ioconf.c
  
  #include "ioconf.h"
  #include "common.h"
-Index: sysstat-11.5.7/sa_common.c
+Index: sysstat-11.7.1/sa_common.c
 ===
 sysstat-11.5.7.orig/sa_common.c
-+++ sysstat-11.5.7/sa_common.c
+--- sysstat-11.7.1.orig/sa_common.c
 sysstat-11.7.1/sa_common.c
 @@ -20,6 +20,7 @@
   */
  
@@ -56,4 +56,4 @@ Index: sysstat-11.5.7/sa_common.c
 +#include 
  #include 
  #include 
- #include 
+ #include 
-- 
2.16.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 21/36] net-tools: refresh patches

2018-03-09 Thread Alexander Kanavin
From: Ross Burton 

The patch tool will apply patches by default with "fuzz", which is where if the
hunk context isn't present but what is there is close enough, it will force the
patch in.

Whilst this is useful when there's just whitespace changes, when applied to
source it is possible for a patch applied with fuzz to produce broken code which
still compiles (see #10450).  This is obviously bad.

We'd like to eventually have do_patch() rejecting any fuzz on these grounds. For
that to be realistic the existing patches with fuzz need to be rebased and
reviewed.

Signed-off-by: Ross Burton 
Signed-off-by: Alexander Kanavin 
---
 .../net-tools/net-tools/net-tools-1.60-sctp1.patch | 47 ++
 1 file changed, 22 insertions(+), 25 deletions(-)

diff --git 
a/meta/recipes-extended/net-tools/net-tools/net-tools-1.60-sctp1.patch 
b/meta/recipes-extended/net-tools/net-tools/net-tools-1.60-sctp1.patch
index 12eed17af4f..78daf6c3edf 100644
--- a/meta/recipes-extended/net-tools/net-tools/net-tools-1.60-sctp1.patch
+++ b/meta/recipes-extended/net-tools/net-tools/net-tools-1.60-sctp1.patch
@@ -11,10 +11,10 @@ Signed-off-by: Li Zhou 
  statistics.c |  68 +-
  2 files changed, 465 insertions(+), 14 deletions(-)
 
-diff --git a/netstat.c b/netstat.c
-index 1fb9e0c..5d1a4a1 100644
 a/netstat.c
-+++ b/netstat.c
+Index: net-tools-1.60/netstat.c
+===
+--- net-tools-1.60.orig/netstat.c
 net-tools-1.60/netstat.c
 @@ -58,6 +58,7 @@
   *
   *990420 {1.38} Tuan Hoang  removed a useless assignment from 
igmp_do_one()
@@ -23,7 +23,7 @@ index 1fb9e0c..5d1a4a1 100644
   *
   *  This program is free software; you can redistribute it
   *  and/or  modify it under  the terms of  the GNU General
-@@ -105,7 +106,7 @@
+@@ -106,7 +107,7 @@
  #endif
  
  /* prototypes for statistics.c */
@@ -32,7 +32,7 @@ index 1fb9e0c..5d1a4a1 100644
  void inittab(void);
  void parsesnmp6(int, int, int);
  void inittab6(void);
-@@ -118,6 +119,28 @@ typedef enum {
+@@ -119,6 +120,28 @@ typedef enum {
  SS_DISCONNECTING  /* in process of disconnecting  */
  } socket_state;
  
@@ -61,7 +61,7 @@ index 1fb9e0c..5d1a4a1 100644
  #define SO_ACCEPTCON(1<<16)   /* performed a listen   */
  #define SO_WAITDATA (1<<17)   /* wait data to read*/
  #define SO_NOSPACE  (1<<18)   /* no space to write*/
-@@ -148,6 +171,7 @@ int flag_opt = 0;
+@@ -149,6 +172,7 @@ int flag_opt = 0;
  int flag_raw = 0;
  int flag_tcp = 0;
  int flag_udp = 0;
@@ -69,7 +69,7 @@ index 1fb9e0c..5d1a4a1 100644
  int flag_igmp= 0;
  int flag_rom = 0;
  int flag_exp = 1;
-@@ -990,6 +1014,365 @@ static int udp_info(void)
+@@ -995,6 +1019,365 @@ static int udp_info(void)
   udp_do_one);
  }
  
@@ -435,7 +435,7 @@ index 1fb9e0c..5d1a4a1 100644
  static void raw_do_one(int lnr, const char *line)
  {
  char buffer[8192], local_addr[64], rem_addr[64];
-@@ -1549,7 +1932,7 @@ static void usage(void)
+@@ -1558,7 +1941,7 @@ static void usage(void)
  fprintf(stderr, _("-F, --fibdisplay Forwarding 
Information Base (default)\n"));
  fprintf(stderr, _("-C, --cache  display routing cache 
instead of FIB\n\n"));
  
@@ -444,7 +444,7 @@ index 1fb9e0c..5d1a4a1 100644
  fprintf(stderr, _("  =Use '-6|-4' or '-A ' or '--'; default: 
%s\n"), DFLT_AF);
  fprintf(stderr, _("  List of possible address families (which support 
routing):\n"));
  print_aflist(1); /* 1 = routeable */
-@@ -1574,6 +1957,7 @@ int main
+@@ -1583,6 +1966,7 @@ int main
{"protocol", 1, 0, 'A'},
{"tcp", 0, 0, 't'},
{"udp", 0, 0, 'u'},
@@ -452,7 +452,7 @@ index 1fb9e0c..5d1a4a1 100644
{"raw", 0, 0, 'w'},
{"unix", 0, 0, 'x'},
{"listening", 0, 0, 'l'},
-@@ -1604,7 +1988,7 @@ int main
+@@ -1613,7 +1997,7 @@ int main
  getroute_init();  /* Set up AF routing support */
  
  afname[0] = '\0';
@@ -461,7 +461,7 @@ index 1fb9e0c..5d1a4a1 100644
switch (i) {
case -1:
break;
-@@ -1696,10 +2080,12 @@ int main
+@@ -1705,10 +2089,12 @@ int main
case 't':
flag_tcp++;
break;
@@ -475,7 +475,7 @@ index 1fb9e0c..5d1a4a1 100644
case 'w':
flag_raw++;
break;
-@@ -1717,13 +2103,13 @@ int main
+@@ -1726,13 +2112,13 @@ int main
  if (flag_int + flag_rou + flag_mas + flag_sta > 1)
usage();
  
@@ -493,7 +493,7 @@ index 1fb9e0c..5d1a4a1 100644
+ flag_ax25 + flag_netrom + flag_igmp + flag_x25;
  
  if (flag_mas) {
-@@ -1751,7 +2137,7 @@ int main
+@@ -1760,7 +2146,7 @@ int main
  char buf[256];
  if (!afname[0]) {
  inittab();
@@ -502,7 +502,7 @@ index 1fb9e0c..5d1a4a1 100644
  } else {

[OE-core] [PATCH 22/36] newt: refresh patches

2018-03-09 Thread Alexander Kanavin
From: Ross Burton 

The patch tool will apply patches by default with "fuzz", which is where if the
hunk context isn't present but what is there is close enough, it will force the
patch in.

Whilst this is useful when there's just whitespace changes, when applied to
source it is possible for a patch applied with fuzz to produce broken code which
still compiles (see #10450).  This is obviously bad.

We'd like to eventually have do_patch() rejecting any fuzz on these grounds. For
that to be realistic the existing patches with fuzz need to be rebased and
reviewed.

Signed-off-by: Ross Burton 
Signed-off-by: Alexander Kanavin 
---
 meta/recipes-extended/newt/files/cross_ar.patch | 26 -
 1 file changed, 12 insertions(+), 14 deletions(-)

diff --git a/meta/recipes-extended/newt/files/cross_ar.patch 
b/meta/recipes-extended/newt/files/cross_ar.patch
index 03007aa4f4e..86cc0be1d38 100644
--- a/meta/recipes-extended/newt/files/cross_ar.patch
+++ b/meta/recipes-extended/newt/files/cross_ar.patch
@@ -18,18 +18,19 @@ Signed-off-by: Hongxu Jia 
  configure.ac | 4 
  2 files changed, 6 insertions(+), 1 deletion(-)
 
-diff --git a/Makefile.in b/Makefile.in
 a/Makefile.in
-+++ b/Makefile.in
+Index: newt-0.52.20/Makefile.in
+===
+--- newt-0.52.20.orig/Makefile.in
 newt-0.52.20/Makefile.in
 @@ -7,6 +7,7 @@ CFLAGS = @CFLAGS@
  LDFLAGS = @LDFLAGS@
- CPPFLAGS = -D_GNU_SOURCE @CPPFLAGS@ 
+ CPPFLAGS = -D_GNU_SOURCE @CPPFLAGS@
  GNU_LD = @GNU_LD@
 +AR = @AR@
  
  VERSION = @VERSION@
  TAG = r$(subst .,-,$(VERSION))
-@@ -109,7 +110,7 @@ whiptcl.$(SOEXT): $(WHIPTCLOBJS) $(LIBNEWTSH)
+@@ -109,7 +110,7 @@ whiptcl.$(SOEXT): $(WHIPTCLOBJS) $(LIBNE
$(CC) -shared $(SHCFLAGS) $(LDFLAGS) -o whiptcl.$(SOEXT) $(WHIPTCLOBJS) 
-L. -lnewt  $(LIBTCL) -lpopt $(LIBS)
  
  $(LIBNEWT): $(LIBOBJS)
@@ -38,10 +39,10 @@ diff --git a/Makefile.in b/Makefile.in
  
  newt.o $(SHAREDDIR)/newt.o: newt.c Makefile
  
-diff --git a/configure.ac b/configure.ac
-index 92e6da8..cd83d57 100644
 a/configure.ac
-+++ b/configure.ac
+Index: newt-0.52.20/configure.ac
+===
+--- newt-0.52.20.orig/configure.ac
 newt-0.52.20/configure.ac
 @@ -15,6 +15,10 @@ AC_PROG_INSTALL
  AC_PROG_LN_S
  AC_PROG_GREP
@@ -51,8 +52,5 @@ index 92e6da8..cd83d57 100644
 +AC_DEFUN([AC_PROG_AR], [AC_CHECK_TOOL(AR, ar, :)])
 +AC_PROG_AR
  
- # Are we using GNU ld?
- AC_MSG_CHECKING([for GNU ld])
--- 
-1.8.1.2
-
+ AC_CHECK_SIZEOF([long])
+ AC_CHECK_SIZEOF([long long])
-- 
2.16.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 23/36] rpcbind: refresh patches

2018-03-09 Thread Alexander Kanavin
From: Ross Burton 

The patch tool will apply patches by default with "fuzz", which is where if the
hunk context isn't present but what is there is close enough, it will force the
patch in.

Whilst this is useful when there's just whitespace changes, when applied to
source it is possible for a patch applied with fuzz to produce broken code which
still compiles (see #10450).  This is obviously bad.

We'd like to eventually have do_patch() rejecting any fuzz on these grounds. For
that to be realistic the existing patches with fuzz need to be rebased and
reviewed.

Signed-off-by: Ross Burton 
Signed-off-by: Alexander Kanavin 
---
 .../pmapproc_dump-Fixed-typo-in-memory-leak-patch.patch   | 15 ++-
 1 file changed, 6 insertions(+), 9 deletions(-)

diff --git 
a/meta/recipes-extended/rpcbind/rpcbind/pmapproc_dump-Fixed-typo-in-memory-leak-patch.patch
 
b/meta/recipes-extended/rpcbind/rpcbind/pmapproc_dump-Fixed-typo-in-memory-leak-patch.patch
index 859e67bbe05..4c23ee01ca2 100644
--- 
a/meta/recipes-extended/rpcbind/rpcbind/pmapproc_dump-Fixed-typo-in-memory-leak-patch.patch
+++ 
b/meta/recipes-extended/rpcbind/rpcbind/pmapproc_dump-Fixed-typo-in-memory-leak-patch.patch
@@ -15,19 +15,16 @@ Signed-off-by: Jackie Huang 
  src/pmap_svc.c | 2 +-
  1 file changed, 1 insertion(+), 1 deletion(-)
 
-diff --git a/src/pmap_svc.c b/src/pmap_svc.c
-index e926cdc..26c31d0 100644
 a/src/pmap_svc.c
-+++ b/src/pmap_svc.c
-@@ -384,7 +384,7 @@ pmapproc_dump(struct svc_req *rqstp /*__unused*/, SVCXPRT 
*xprt)
+Index: rpcbind-0.2.4/src/pmap_svc.c
+===
+--- rpcbind-0.2.4.orig/src/pmap_svc.c
 rpcbind-0.2.4/src/pmap_svc.c
+@@ -384,7 +384,7 @@ pmapproc_dump(struct svc_req *rqstp /*__
}
  
  done:
 -  if (!svc_freeargs(xprt, (xdrproc_t) xdr_pmap, (char *)NULL)) {
 +  if (!svc_freeargs(xprt, (xdrproc_t) xdr_void, (char *)NULL)) {
if (debugging) {
-   (void) xlog(LOG_DEBUG, "unable to free arguments\n");
+   /*(void) xlog(LOG_DEBUG, "unable to free 
arguments\n");*/
if (doabort) {
--- 
-2.7.4
-
-- 
2.16.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 20/36] ltp: refresh patches

2018-03-09 Thread Alexander Kanavin
From: Ross Burton 

The patch tool will apply patches by default with "fuzz", which is where if the
hunk context isn't present but what is there is close enough, it will force the
patch in.

Whilst this is useful when there's just whitespace changes, when applied to
source it is possible for a patch applied with fuzz to produce broken code which
still compiles (see #10450).  This is obviously bad.

We'd like to eventually have do_patch() rejecting any fuzz on these grounds. For
that to be realistic the existing patches with fuzz need to be rebased and
reviewed.

Signed-off-by: Ross Burton 
Signed-off-by: Alexander Kanavin 
---
 ...-Add-option-to-select-libc-implementation.patch | 78 +++---
 ..._GNU_SOURCE-for-MREMAP_MAYMOVE-definition.patch | 29 
 2 files changed, 51 insertions(+), 56 deletions(-)

diff --git 
a/meta/recipes-extended/ltp/ltp/0004-build-Add-option-to-select-libc-implementation.patch
 
b/meta/recipes-extended/ltp/ltp/0004-build-Add-option-to-select-libc-implementation.patch
index cf744639c21..84ab37ea395 100644
--- 
a/meta/recipes-extended/ltp/ltp/0004-build-Add-option-to-select-libc-implementation.patch
+++ 
b/meta/recipes-extended/ltp/ltp/0004-build-Add-option-to-select-libc-implementation.patch
@@ -22,10 +22,10 @@ Upstream-Status: Pending
  testcases/realtime/stress/pi-tests/Makefile | 5 +
  8 files changed, 35 insertions(+), 2 deletions(-)
 
-diff --git a/Makefile b/Makefile
-index 297f8e7..906b280 100644
 a/Makefile
-+++ b/Makefile
+Index: git/Makefile
+===
+--- git.orig/Makefile
 git/Makefile
 @@ -49,6 +49,11 @@ SKIP_IDCHECK?= 0
  UCLINUX   ?= 0
  export UCLINUX
@@ -38,11 +38,11 @@ index 297f8e7..906b280 100644
  # CLEAN_TARGETS:  Targets which exist solely in clean.
  # COMMON_TARGETS: Targets which exist in all, clean, and install.
  # INSTALL_TARGETS:Targets which exist in clean and install (contains
-diff --git a/testcases/kernel/Makefile b/testcases/kernel/Makefile
-index 50a12fa..4f1987f 100644
 a/testcases/kernel/Makefile
-+++ b/testcases/kernel/Makefile
-@@ -47,13 +47,16 @@ SUBDIRS+= connectors \
+Index: git/testcases/kernel/Makefile
+===
+--- git.orig/testcases/kernel/Makefile
 git/testcases/kernel/Makefile
+@@ -48,13 +48,16 @@ SUBDIRS+= connectors \
   logging \
   mem \
   numa \
@@ -60,10 +60,10 @@ index 50a12fa..4f1987f 100644
  ifeq ($(WITH_POWER_MANAGEMENT_TESTSUITE),yes)
  SUBDIRS   += power_management
  endif
-diff --git a/testcases/kernel/sched/Makefile b/testcases/kernel/sched/Makefile
-index 6245ed0..aa4eb7f 100644
 a/testcases/kernel/sched/Makefile
-+++ b/testcases/kernel/sched/Makefile
+Index: git/testcases/kernel/sched/Makefile
+===
+--- git.orig/testcases/kernel/sched/Makefile
 git/testcases/kernel/sched/Makefile
 @@ -23,5 +23,7 @@
  top_srcdir?= ../../..
  
@@ -73,11 +73,11 @@ index 6245ed0..aa4eb7f 100644
 +  FILTER_OUT_DIRS += process_stress
 +endif
  include $(top_srcdir)/include/mk/generic_trunk_target.mk
-diff --git a/testcases/kernel/syscalls/Makefile 
b/testcases/kernel/syscalls/Makefile
-index 8acb395..b749126 100644
 a/testcases/kernel/syscalls/Makefile
-+++ b/testcases/kernel/syscalls/Makefile
-@@ -28,5 +28,10 @@ ifeq ($(UCLINUX),1)
+Index: git/testcases/kernel/syscalls/Makefile
+===
+--- git.orig/testcases/kernel/syscalls/Makefile
 git/testcases/kernel/syscalls/Makefile
+@@ -28,6 +28,11 @@ ifeq ($(UCLINUX),1)
  FILTER_OUT_DIRS   += capget capset chmod chown clone fork getcontext 
llseek \
   mincore mprotect nftw profil remap_file_pages sbrk
  endif
@@ -87,12 +87,13 @@ index 8acb395..b749126 100644
 + ustat
 +endif
  
- include $(top_srcdir)/include/mk/generic_trunk_target.mk
-diff --git a/testcases/network/nfsv4/acl/Makefile 
b/testcases/network/nfsv4/acl/Makefile
-index 8bc78c2..c36cf50 100644
 a/testcases/network/nfsv4/acl/Makefile
-+++ b/testcases/network/nfsv4/acl/Makefile
-@@ -26,4 +26,8 @@ include $(top_srcdir)/include/mk/env_pre.mk
+ ifeq ($(UCLIBC),1)
+ FILTER_OUT_DIRS   += profil
+Index: git/testcases/network/nfsv4/acl/Makefile
+===
+--- git.orig/testcases/network/nfsv4/acl/Makefile
 git/testcases/network/nfsv4/acl/Makefile
+@@ -26,4 +26,8 @@ include $(top_srcdir)/include/mk/env_pre
  
  LDLIBS+= $(ACL_LIBS)
  
@@ -101,10 +102,10 @@ index 8bc78c2..c36cf50 100644
 +endif
 +
  include 

[OE-core] [PATCH 17/36] tcf-agent: refresh patches

2018-03-09 Thread Alexander Kanavin
From: Ross Burton 

The patch tool will apply patches by default with "fuzz", which is where if the
hunk context isn't present but what is there is close enough, it will force the
patch in.

Whilst this is useful when there's just whitespace changes, when applied to
source it is possible for a patch applied with fuzz to produce broken code which
still compiles (see #10450).  This is obviously bad.

We'd like to eventually have do_patch() rejecting any fuzz on these grounds. For
that to be realistic the existing patches with fuzz need to be rebased and
reviewed.

Signed-off-by: Ross Burton 
Signed-off-by: Alexander Kanavin 
---
 meta/recipes-devtools/tcf-agent/tcf-agent/fix_ranlib.patch | 14 --
 1 file changed, 8 insertions(+), 6 deletions(-)

diff --git a/meta/recipes-devtools/tcf-agent/tcf-agent/fix_ranlib.patch 
b/meta/recipes-devtools/tcf-agent/tcf-agent/fix_ranlib.patch
index 5d704567c8f..b66f41ad280 100644
--- a/meta/recipes-devtools/tcf-agent/tcf-agent/fix_ranlib.patch
+++ b/meta/recipes-devtools/tcf-agent/tcf-agent/fix_ranlib.patch
@@ -1,14 +1,16 @@
 Upstream-Status: Inappropriate [poky-specific fix]
 
 a/Makefile.inc
-+++ b/Makefile.inc
-@@ -57,6 +57,9 @@
-   ifeq ($(NO_UUID),)
- LIBS += -luuid
+Index: agent/Makefile.inc
+===
+--- agent.orig/Makefile.inc
 agent/Makefile.inc
+@@ -88,6 +88,9 @@ ifneq ($(OPSYS),Windows)
+   ifneq ($(CC),g++)
+ OPTS += -Wmissing-prototypes
endif
 +  ifneq ($(RANLIB),)
 +RANLIB += $@
 +  endif
  endif
  
- ifneq ($(OPSYS),Windows)
+ # Compiler flags definition
-- 
2.16.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 18/36] cups: refresh patches

2018-03-09 Thread Alexander Kanavin
From: Ross Burton 

The patch tool will apply patches by default with "fuzz", which is where if the
hunk context isn't present but what is there is close enough, it will force the
patch in.

Whilst this is useful when there's just whitespace changes, when applied to
source it is possible for a patch applied with fuzz to produce broken code which
still compiles (see #10450).  This is obviously bad.

We'd like to eventually have do_patch() rejecting any fuzz on these grounds. For
that to be realistic the existing patches with fuzz need to be rebased and
reviewed.

Signed-off-by: Ross Burton 
Signed-off-by: Alexander Kanavin 
---
 .../0001-don-t-try-to-run-generated-binaries.patch | 18 +-
 1 file changed, 9 insertions(+), 9 deletions(-)

diff --git 
a/meta/recipes-extended/cups/cups/0001-don-t-try-to-run-generated-binaries.patch
 
b/meta/recipes-extended/cups/cups/0001-don-t-try-to-run-generated-binaries.patch
index 5379eb6aa2b..db013cf08c4 100644
--- 
a/meta/recipes-extended/cups/cups/0001-don-t-try-to-run-generated-binaries.patch
+++ 
b/meta/recipes-extended/cups/cups/0001-don-t-try-to-run-generated-binaries.patch
@@ -10,12 +10,12 @@ Signed-off-by: Koen Kooi 
  ppdc/Makefile |   30 +++---
  1 files changed, 15 insertions(+), 15 deletions(-)
 
-Index: cups-2.0.0/ppdc/Makefile
+Index: cups-2.2.6/ppdc/Makefile
 ===
 cups-2.0.0.orig/ppdc/Makefile
-+++ cups-2.0.0/ppdc/Makefile
-@@ -242,8 +242,8 @@ genstrings:genstrings.o libcupsppdc.a
-   $(CXX) $(ARCHFLAGS) $(LDFLAGS) -o genstrings genstrings.o \
+--- cups-2.2.6.orig/ppdc/Makefile
 cups-2.2.6/ppdc/Makefile
+@@ -228,8 +228,8 @@ genstrings:genstrings.o libcupsppdc.a
+   $(LD_CXX) $(ARCHFLAGS) $(LDFLAGS) -o genstrings genstrings.o \
libcupsppdc.a ../cups/$(LIBCUPSSTATIC) $(LIBGSSAPI) $(SSLLIBS) \
$(DNSSDLIBS) $(COMMONLIBS) $(LIBZ)
 -  echo Generating localization strings...
@@ -25,8 +25,8 @@ Index: cups-2.0.0/ppdc/Makefile
  
  
  #
-@@ -260,9 +260,9 @@ ppdc-static:   ppdc.o libcupsppdc.a ../cu
-   $(CXX) $(ARCHFLAGS) $(LDFLAGS) -o ppdc-static ppdc.o libcupsppdc.a \
+@@ -246,9 +246,9 @@ ppdc-static:   ppdc.o libcupsppdc.a ../cu
+   $(LD_CXX) $(ARCHFLAGS) $(LDFLAGS) -o ppdc-static ppdc.o libcupsppdc.a \
../cups/$(LIBCUPSSTATIC) $(LIBGSSAPI) $(SSLLIBS) $(DNSSDLIBS) \
$(COMMONLIBS) $(LIBZ)
 -  echo Testing PPD compiler...
@@ -38,8 +38,8 @@ Index: cups-2.0.0/ppdc/Makefile
  
  
  #
-@@ -288,17 +288,17 @@ ppdi-static: ppdc-static ppdi.o libcups
-   $(CXX) $(ARCHFLAGS) $(LDFLAGS) -o ppdi-static ppdi.o libcupsppdc.a \
+@@ -274,17 +274,17 @@ ppdi-static: ppdc-static ppdi.o libcups
+   $(LD_CXX) $(ARCHFLAGS) $(LDFLAGS) -o ppdi-static ppdi.o libcupsppdc.a \
../cups/$(LIBCUPSSTATIC) $(LIBGSSAPI) $(SSLLIBS) $(DNSSDLIBS) \
$(COMMONLIBS) $(LIBZ)
 -  echo Testing PPD importer...
-- 
2.16.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 19/36] ethtool: refresh patches

2018-03-09 Thread Alexander Kanavin
From: Ross Burton 

The patch tool will apply patches by default with "fuzz", which is where if the
hunk context isn't present but what is there is close enough, it will force the
patch in.

Whilst this is useful when there's just whitespace changes, when applied to
source it is possible for a patch applied with fuzz to produce broken code which
still compiles (see #10450).  This is obviously bad.

We'd like to eventually have do_patch() rejecting any fuzz on these grounds. For
that to be realistic the existing patches with fuzz need to be rebased and
reviewed.

Signed-off-by: Ross Burton 
Signed-off-by: Alexander Kanavin 
---
 meta/recipes-extended/ethtool/ethtool/avoid_parallel_tests.patch | 8 
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/meta/recipes-extended/ethtool/ethtool/avoid_parallel_tests.patch 
b/meta/recipes-extended/ethtool/ethtool/avoid_parallel_tests.patch
index dbf7142f18a..de38104044c 100644
--- a/meta/recipes-extended/ethtool/ethtool/avoid_parallel_tests.patch
+++ b/meta/recipes-extended/ethtool/ethtool/avoid_parallel_tests.patch
@@ -5,12 +5,12 @@ Signed-off-by: Tudor Florea 
 Upstream-Status: Inappropriate
 (default automake behavior incompatible with ptest)
 
-Index: ethtool-4.11/configure.ac
+Index: ethtool-4.13/configure.ac
 ===
 ethtool-4.11.orig/configure.ac
-+++ ethtool-4.11/configure.ac
+--- ethtool-4.13.orig/configure.ac
 ethtool-4.13/configure.ac
 @@ -2,7 +2,7 @@ dnl Process this file with autoconf to p
- AC_INIT(ethtool, 4.11, net...@vger.kernel.org)
+ AC_INIT(ethtool, 4.13, net...@vger.kernel.org)
  AC_PREREQ(2.52)
  AC_CONFIG_SRCDIR([ethtool.c])
 -AM_INIT_AUTOMAKE([gnu])
-- 
2.16.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 15/36] qemu: drop already applied glibc-2.25.patch

2018-03-09 Thread Alexander Kanavin
Due to patch fuzz it was applied again in a different place.

Signed-off-by: Alexander Kanavin 
---
 meta/recipes-devtools/qemu/qemu/glibc-2.25.patch | 74 
 meta/recipes-devtools/qemu/qemu_2.11.1.bb|  1 -
 2 files changed, 75 deletions(-)
 delete mode 100644 meta/recipes-devtools/qemu/qemu/glibc-2.25.patch

diff --git a/meta/recipes-devtools/qemu/qemu/glibc-2.25.patch 
b/meta/recipes-devtools/qemu/qemu/glibc-2.25.patch
deleted file mode 100644
index 25569449e42..000
--- a/meta/recipes-devtools/qemu/qemu/glibc-2.25.patch
+++ /dev/null
@@ -1,74 +0,0 @@
-From: Christopher Covington
-Date: Wed, 28 Dec 2016 15:04:33 -0500
-Subject: [Qemu-devel] [PATCH v3] build: include sys/sysmacros.h for major() 
and minor()a
-
-The definition of the major() and minor() macros are moving within glibc to
-. Include this header when it is available to avoid the
-following sorts of build-stopping messages:
-
-qga/commands-posix.c: In function ‘dev_major_minor’:
-qga/commands-posix.c:656:13: error: In the GNU C Library, "major" is defined
- by . For historical compatibility, it is
- currently defined by  as well, but we plan to
- remove this soon. To use "major", include 
- directly. If you did not intend to use a system-defined macro
- "major", you should undefine it after including . [-Werror]
- *devmajor = major(st.st_rdev);
- ^~
-
-qga/commands-posix.c:657:13: error: In the GNU C Library, "minor" is defined
- by . For historical compatibility, it is
- currently defined by  as well, but we plan to
- remove this soon. To use "minor", include 
- directly. If you did not intend to use a system-defined macro
- "minor", you should undefine it after including . [-Werror]
- *devminor = minor(st.st_rdev);
- ^~
-
-The additional include allows the build to complete on Fedora 26 (Rawhide)
-with glibc version 2.24.90.
-
-Signed-off-by: Christopher Covington 
-Signed-off-by: Martin Jansa 
-
-Upstream-Status: Submitted 
https://lists.gnu.org/archive/html/qemu-devel/2016-12/msg03548.html
-
-diff -uNr qemu-2.8.0.orig/configure qemu-2.8.0/configure
 qemu-2.8.0.orig/configure  2017-02-21 19:05:13.180094708 +0100
-+++ qemu-2.8.0/configure   2017-02-21 19:08:53.114087084 +0100
-@@ -4727,6 +4727,20 @@
- then
- fi
- 
- ##
-+# check for sysmacros.h
-+
-+have_sysmacros=no
-+cat > $TMPC << EOF
-+#include 
-+int main(void) {
-+return makedev(0, 0);
-+}
-+EOF
-+if compile_prog "" "" ; then
-+have_sysmacros=yes
-+fi
-+
-+##
- # End of CC checks
- # After here, no more $cc or $ld runs
- 
-diff -uNr qemu-2.8.0.orig/configure qemu-2.8.0/configure
 qemu-2.8.0.orig/configure  2017-02-21 19:05:13.180094708 +0100
-+++ qemu-2.8.0/configure   2017-02-21 19:08:53.114087084 +0100
-@@ -5695,6 +5709,10 @@
-   echo "CONFIG_AF_VSOCK=y" >> $config_host_mak
- fi
- 
-+if test "$have_sysmacros" = "yes" ; then
-+  echo "CONFIG_SYSMACROS=y" >> $config_host_mak
-+fi
-+
- # Hold two types of flag:
- #   CONFIG_THREAD_SETNAME_BYTHREAD  - we've got a way of setting the name on
- # a thread we have a handle to
diff --git a/meta/recipes-devtools/qemu/qemu_2.11.1.bb 
b/meta/recipes-devtools/qemu/qemu_2.11.1.bb
index f0e20cc1253..9095c5f 100644
--- a/meta/recipes-devtools/qemu/qemu_2.11.1.bb
+++ b/meta/recipes-devtools/qemu/qemu_2.11.1.bb
@@ -17,7 +17,6 @@ SRC_URI = 
"http://wiki.qemu-project.org/download/${BP}.tar.bz2 \
file://no-valgrind.patch \
file://pathlimit.patch \
file://qemu-2.5.0-cflags.patch \
-   file://glibc-2.25.patch \
file://chardev-connect-socket-to-a-spawned-command.patch \
file://apic-fixup-fallthrough-to-PIC.patch \
file://linux-user-Fix-webkitgtk-hangs-on-32-bit-x86-target.patch \
-- 
2.16.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 16/36] ruby: refresh patches

2018-03-09 Thread Alexander Kanavin
From: Ross Burton 

The patch tool will apply patches by default with "fuzz", which is where if the
hunk context isn't present but what is there is close enough, it will force the
patch in.

Whilst this is useful when there's just whitespace changes, when applied to
source it is possible for a patch applied with fuzz to produce broken code which
still compiles (see #10450).  This is obviously bad.

We'd like to eventually have do_patch() rejecting any fuzz on these grounds. For
that to be realistic the existing patches with fuzz need to be rebased and
reviewed.

Signed-off-by: Ross Burton 
Signed-off-by: Alexander Kanavin 
---
 .../0002-Obey-LDFLAGS-for-the-link-of-libruby.patch | 17 +++--
 1 file changed, 7 insertions(+), 10 deletions(-)

diff --git 
a/meta/recipes-devtools/ruby/ruby/0002-Obey-LDFLAGS-for-the-link-of-libruby.patch
 
b/meta/recipes-devtools/ruby/ruby/0002-Obey-LDFLAGS-for-the-link-of-libruby.patch
index b0114ba28b2..4cf579f4270 100644
--- 
a/meta/recipes-devtools/ruby/ruby/0002-Obey-LDFLAGS-for-the-link-of-libruby.patch
+++ 
b/meta/recipes-devtools/ruby/ruby/0002-Obey-LDFLAGS-for-the-link-of-libruby.patch
@@ -10,19 +10,16 @@ Signed-off-by: Christopher Larson 
  Makefile.in | 2 +-
  1 file changed, 1 insertion(+), 1 deletion(-)
 
-diff --git a/Makefile.in b/Makefile.in
-index 7da2488..5b4aea1 100644
 a/Makefile.in
-+++ b/Makefile.in
-@@ -75,7 +75,7 @@ EXTLIBS =
- LIBS = @LIBS@ $(EXTLIBS)
+Index: ruby-2.5.0/Makefile.in
+===
+--- ruby-2.5.0.orig/Makefile.in
 ruby-2.5.0/Makefile.in
+@@ -77,7 +77,7 @@ LIBS = @LIBS@ $(EXTLIBS)
  MISSING = @LIBOBJS@ @ALLOCA@
+ ENABLE_SHARED = @ENABLE_SHARED@
  LDSHARED = @LIBRUBY_LDSHARED@
 -DLDFLAGS = @LIBRUBY_DLDFLAGS@ $(XLDFLAGS) $(ARCH_FLAG)
 +DLDFLAGS = @LIBRUBY_DLDFLAGS@ @LDFLAGS@ $(XLDFLAGS) $(ARCH_FLAG)
  SOLIBS = @SOLIBS@
+ ENABLE_DEBUG_ENV = @ENABLE_DEBUG_ENV@
  MAINLIBS = @MAINLIBS@
- ARCHMINIOBJS = @MINIOBJS@
--- 
-2.8.0
-
-- 
2.16.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 13/36] python: refresh patches

2018-03-09 Thread Alexander Kanavin
From: Ross Burton 

The patch tool will apply patches by default with "fuzz", which is where if the
hunk context isn't present but what is there is close enough, it will force the
patch in.

Whilst this is useful when there's just whitespace changes, when applied to
source it is possible for a patch applied with fuzz to produce broken code which
still compiles (see #10450).  This is obviously bad.

We'd like to eventually have do_patch() rejecting any fuzz on these grounds. For
that to be realistic the existing patches with fuzz need to be rebased and
reviewed.

Signed-off-by: Ross Burton 
Signed-off-by: Alexander Kanavin 
---
 .../python/python-native/multilib.patch|  78 ++---
 .../add-CROSSPYTHONPATH-for-PYTHON_FOR_BUILD.patch |  12 +-
 .../python/python/fix-makefile-for-ptest.patch |  13 ++-
 meta/recipes-devtools/python/python/multilib.patch |  98 -
 .../python/python3/python-3.3-multilib.patch   | 121 ++---
 ...-use-CROSSPYTHONPATH-for-PYTHON_FOR_BUILD.patch |  12 +-
 6 files changed, 166 insertions(+), 168 deletions(-)

diff --git a/meta/recipes-devtools/python/python-native/multilib.patch 
b/meta/recipes-devtools/python/python-native/multilib.patch
index ad460850945..af0f173c6d1 100644
--- a/meta/recipes-devtools/python/python-native/multilib.patch
+++ b/meta/recipes-devtools/python/python-native/multilib.patch
@@ -12,10 +12,10 @@ Upstream-Status: Inappropriate [oe-specific]
 
 Signed-off-by: Nitin A Kamble 
 
-Index: Python-2.7.13/Include/pythonrun.h
+Index: Python-2.7.14/Include/pythonrun.h
 ===
 Python-2.7.13.orig/Include/pythonrun.h
-+++ Python-2.7.13/Include/pythonrun.h
+--- Python-2.7.14.orig/Include/pythonrun.h
 Python-2.7.14/Include/pythonrun.h
 @@ -108,6 +108,7 @@ PyAPI_FUNC(char *) Py_GetPath(void);
  /* In their own files */
  PyAPI_FUNC(const char *) Py_GetVersion(void);
@@ -24,10 +24,10 @@ Index: Python-2.7.13/Include/pythonrun.h
  PyAPI_FUNC(const char *) Py_GetCopyright(void);
  PyAPI_FUNC(const char *) Py_GetCompiler(void);
  PyAPI_FUNC(const char *) Py_GetBuildInfo(void);
-Index: Python-2.7.13/Lib/distutils/command/install.py
+Index: Python-2.7.14/Lib/distutils/command/install.py
 ===
 Python-2.7.13.orig/Lib/distutils/command/install.py
-+++ Python-2.7.13/Lib/distutils/command/install.py
+--- Python-2.7.14.orig/Lib/distutils/command/install.py
 Python-2.7.14/Lib/distutils/command/install.py
 @@ -22,6 +22,8 @@ from site import USER_BASE
  from site import USER_SITE
  
@@ -46,10 +46,10 @@ Index: Python-2.7.13/Lib/distutils/command/install.py
  'headers': '$base/include/python$py_version_short/$dist_name',
  'scripts': '$base/bin',
  'data'   : '$base',
-Index: Python-2.7.13/Lib/pydoc.py
+Index: Python-2.7.14/Lib/pydoc.py
 ===
 Python-2.7.13.orig/Lib/pydoc.py
-+++ Python-2.7.13/Lib/pydoc.py
+--- Python-2.7.14.orig/Lib/pydoc.py
 Python-2.7.14/Lib/pydoc.py
 @@ -375,7 +375,7 @@ class Doc:
  docmodule = docclass = docroutine = docother = docproperty = docdata = 
fail
  
@@ -59,10 +59,10 @@ Index: Python-2.7.13/Lib/pydoc.py
 "python"+sys.version[0:3])):
  """Return the location of module docs or None"""
  
-Index: Python-2.7.13/Lib/site.py
+Index: Python-2.7.14/Lib/site.py
 ===
 Python-2.7.13.orig/Lib/site.py
-+++ Python-2.7.13/Lib/site.py
+--- Python-2.7.14.orig/Lib/site.py
 Python-2.7.14/Lib/site.py
 @@ -288,13 +288,19 @@ def getsitepackages():
  if sys.platform in ('os2emx', 'riscos'):
  sitepackages.append(os.path.join(prefix, "Lib", "site-packages"))
@@ -86,10 +86,10 @@ Index: Python-2.7.13/Lib/site.py
  return sitepackages
  
  def addsitepackages(known_paths):
-Index: Python-2.7.13/Lib/test/test_dl.py
+Index: Python-2.7.14/Lib/test/test_dl.py
 ===
 Python-2.7.13.orig/Lib/test/test_dl.py
-+++ Python-2.7.13/Lib/test/test_dl.py
+--- Python-2.7.14.orig/Lib/test/test_dl.py
 Python-2.7.14/Lib/test/test_dl.py
 @@ -4,10 +4,11 @@
  import unittest
  from test.test_support import verbose, import_module
@@ -104,10 +104,10 @@ Index: Python-2.7.13/Lib/test/test_dl.py
  ('/usr/bin/cygwin1.dll', 'getpid'),
  ('/usr/lib/libc.dylib', 'getpid'),
  ]
-Index: Python-2.7.13/Lib/trace.py
+Index: Python-2.7.14/Lib/trace.py
 ===
 Python-2.7.13.orig/Lib/trace.py
-+++ Python-2.7.13/Lib/trace.py
+--- Python-2.7.14.orig/Lib/trace.py
 Python-2.7.14/Lib/trace.py
 @@ -754,10 +754,10 @@ def main(argv=None):
  

[OE-core] [PATCH 14/36] qemu: refresh patches

2018-03-09 Thread Alexander Kanavin
From: Ross Burton 

The patch tool will apply patches by default with "fuzz", which is where if the
hunk context isn't present but what is there is close enough, it will force the
patch in.

Whilst this is useful when there's just whitespace changes, when applied to
source it is possible for a patch applied with fuzz to produce broken code which
still compiles (see #10450).  This is obviously bad.

We'd like to eventually have do_patch() rejecting any fuzz on these grounds. For
that to be realistic the existing patches with fuzz need to be rebased and
reviewed.

Signed-off-by: Ross Burton 
Signed-off-by: Alexander Kanavin 
---
 .../qemu/qemu/apic-fixup-fallthrough-to-PIC.patch  | 15 ++
 .../recipes-devtools/qemu/qemu/disable-grabs.patch | 23 ++
 2 files changed, 16 insertions(+), 22 deletions(-)

diff --git 
a/meta/recipes-devtools/qemu/qemu/apic-fixup-fallthrough-to-PIC.patch 
b/meta/recipes-devtools/qemu/qemu/apic-fixup-fallthrough-to-PIC.patch
index 9bbbc6f76da..d6a3522edaa 100644
--- a/meta/recipes-devtools/qemu/qemu/apic-fixup-fallthrough-to-PIC.patch
+++ b/meta/recipes-devtools/qemu/qemu/apic-fixup-fallthrough-to-PIC.patch
@@ -28,12 +28,12 @@ Signed-off-by: He Zhe 
  hw/intc/apic.c | 2 +-
  1 file changed, 1 insertion(+), 1 deletion(-)
 
-diff --git a/hw/intc/apic.c b/hw/intc/apic.c
-index 45887d99..c5ae4087 100644
 a/hw/intc/apic.c
-+++ b/hw/intc/apic.c
-@@ -587,7 +587,7 @@ int apic_accept_pic_intr(DeviceState *dev)
- APICCommonState *s = APIC_COMMON(dev);
+Index: qemu-2.11.1/hw/intc/apic.c
+===
+--- qemu-2.11.1.orig/hw/intc/apic.c
 qemu-2.11.1/hw/intc/apic.c
+@@ -591,7 +591,7 @@ int apic_accept_pic_intr(DeviceState *de
+ APICCommonState *s = APIC(dev);
  uint32_t lvt0;
  
 -if (!s)
@@ -41,6 +41,3 @@ index 45887d99..c5ae4087 100644
  return -1;
  
  lvt0 = s->lvt[APIC_LVT_LINT0];
--- 
-2.11.0
-
diff --git a/meta/recipes-devtools/qemu/qemu/disable-grabs.patch 
b/meta/recipes-devtools/qemu/qemu/disable-grabs.patch
index 123833f8248..77117890f48 100644
--- a/meta/recipes-devtools/qemu/qemu/disable-grabs.patch
+++ b/meta/recipes-devtools/qemu/qemu/disable-grabs.patch
@@ -24,11 +24,11 @@ Signed-off-by: Eric Bénard 
  ui/sdl.c | 12 ++--
  1 file changed, 10 insertions(+), 2 deletions(-)
 
-diff --git a/ui/sdl.c b/ui/sdl.c
-index 39a42d6..9b8abe5 100644
 a/ui/sdl.c
-+++ b/ui/sdl.c
-@@ -59,6 +59,10 @@ static SDL_Cursor *guest_sprite = NULL;
+Index: qemu-2.11.1/ui/sdl.c
+===
+--- qemu-2.11.1.orig/ui/sdl.c
 qemu-2.11.1/ui/sdl.c
+@@ -63,6 +63,10 @@ static SDL_PixelFormat host_format;
  static int scaling_active = 0;
  static Notifier mouse_mode_notifier;
  static int idle_counter;
@@ -37,10 +37,10 @@ index 39a42d6..9b8abe5 100644
 +#endif
 +static doing_grabs = True;
  
- static void sdl_update(DisplayChangeListener *dcl,
-int x, int y, int w, int h)
-@@ -384,14 +388,16 @@ static void sdl_grab_start(void)
- }
+ #define SDL_REFRESH_INTERVAL_BUSY 10
+ #define SDL_MAX_IDLE_COUNT (2 * GUI_REFRESH_INTERVAL_DEFAULT \
+@@ -431,14 +435,16 @@ static void sdl_grab_start(void)
+ }
  } else
  sdl_hide_cursor();
 -SDL_WM_GrabInput(SDL_GRAB_ON);
@@ -58,7 +58,7 @@ index 39a42d6..9b8abe5 100644
  gui_grab = 0;
  sdl_show_cursor();
  sdl_update_caption();
-@@ -909,6 +915,8 @@ void sdl_display_init(DisplayState *ds, int full_screen, 
int no_frame)
+@@ -986,6 +992,8 @@ void sdl_display_init(DisplayState *ds,
   * This requires SDL >= 1.2.14. */
  setenv("SDL_DISABLE_LOCK_KEYS", "1", 1);
  
@@ -67,6 +67,3 @@ index 39a42d6..9b8abe5 100644
  flags = SDL_INIT_VIDEO | SDL_INIT_NOPARACHUTE;
  if (SDL_Init (flags)) {
  fprintf(stderr, "Could not initialize SDL(%s) - exiting\n",
--- 
-1.8.3.1
-
-- 
2.16.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 12/36] opkg-utils: refresh patches

2018-03-09 Thread Alexander Kanavin
From: Ross Burton 

The patch tool will apply patches by default with "fuzz", which is where if the
hunk context isn't present but what is there is close enough, it will force the
patch in.

Whilst this is useful when there's just whitespace changes, when applied to
source it is possible for a patch applied with fuzz to produce broken code which
still compiles (see #10450).  This is obviously bad.

We'd like to eventually have do_patch() rejecting any fuzz on these grounds. For
that to be realistic the existing patches with fuzz need to be rebased and
reviewed.

Signed-off-by: Ross Burton 
Signed-off-by: Alexander Kanavin 
---
 ...ly-use-sort-name-on-versions-of-tar-which-support-.patch | 13 +
 ...kg-build-Use-local-time-for-build_date-since-opkg-.patch | 13 +
 2 files changed, 10 insertions(+), 16 deletions(-)

diff --git 
a/meta/recipes-devtools/opkg-utils/opkg-utils/0001-Only-use-sort-name-on-versions-of-tar-which-support-.patch
 
b/meta/recipes-devtools/opkg-utils/opkg-utils/0001-Only-use-sort-name-on-versions-of-tar-which-support-.patch
index 7de4b7f723c..203c5850533 100644
--- 
a/meta/recipes-devtools/opkg-utils/opkg-utils/0001-Only-use-sort-name-on-versions-of-tar-which-support-.patch
+++ 
b/meta/recipes-devtools/opkg-utils/opkg-utils/0001-Only-use-sort-name-on-versions-of-tar-which-support-.patch
@@ -11,10 +11,10 @@ Signed-off-by: Alejandro del Castillo 

  opkg-build | 11 ---
  1 file changed, 8 insertions(+), 3 deletions(-)
 
-diff --git a/opkg-build b/opkg-build
-index 265906f..094d69f 100755
 a/opkg-build
-+++ b/opkg-build
+Index: opkg-utils-0.3.6/opkg-build
+===
+--- opkg-utils-0.3.6.orig/opkg-build
 opkg-utils-0.3.6/opkg-build
 @@ -232,6 +232,11 @@ if [ $compressor = "gzip" ] ; then
compressorargs=$zipargs
  fi
@@ -40,13 +40,10 @@ index 265906f..094d69f 100755
  echo "2.0" > $tmp_dir/debian-binary
 @@ -296,7 +301,7 @@ rm -f $pkg_file
  if [ "$outer" = "ar" ] ; then
-   ( cd $tmp_dir && ar -crfD $pkg_file ./debian-binary ./control.tar.gz 
./data.tar.$cext )
+   ( cd $tmp_dir && ar -crf $pkg_file ./debian-binary ./control.tar.gz 
./data.tar.$cext )
  else
 -  ( cd $tmp_dir && tar -c --sort=name --mtime=$build_date $tarformat 
./debian-binary ./control.tar.gz ./data.tar.$cext | gzip $zipargs > $pkg_file )
 +  ( cd $tmp_dir && tar -c $tsortargs --mtime=$build_date $tarformat 
./debian-binary ./control.tar.gz ./data.tar.$cext | gzip $zipargs > $pkg_file )
  fi
  
  rm $tmp_dir/debian-binary $tmp_dir/data.tar.$cext $tmp_dir/control.tar.gz
--- 
-2.16.1
-
diff --git 
a/meta/recipes-devtools/opkg-utils/opkg-utils/0002-opkg-build-Use-local-time-for-build_date-since-opkg-.patch
 
b/meta/recipes-devtools/opkg-utils/opkg-utils/0002-opkg-build-Use-local-time-for-build_date-since-opkg-.patch
index b42d7878c9b..0a7403d6747 100644
--- 
a/meta/recipes-devtools/opkg-utils/opkg-utils/0002-opkg-build-Use-local-time-for-build_date-since-opkg-.patch
+++ 
b/meta/recipes-devtools/opkg-utils/opkg-utils/0002-opkg-build-Use-local-time-for-build_date-since-opkg-.patch
@@ -12,10 +12,10 @@ Signed-off-by: Alejandro del Castillo 

  opkg-build | 8 
  1 file changed, 4 insertions(+), 4 deletions(-)
 
-diff --git a/opkg-build b/opkg-build
-index 094d69f..0050c2b 100755
 a/opkg-build
-+++ b/opkg-build
+Index: opkg-utils-0.3.6/opkg-build
+===
+--- opkg-utils-0.3.6.orig/opkg-build
 opkg-utils-0.3.6/opkg-build
 @@ -282,11 +282,11 @@ fi
  tmp_dir=$dest_dir/IPKG_BUILD.$$
  mkdir $tmp_dir
@@ -33,13 +33,10 @@ index 094d69f..0050c2b 100755
  echo "2.0" > $tmp_dir/debian-binary
 @@ -301,7 +301,7 @@ rm -f $pkg_file
  if [ "$outer" = "ar" ] ; then
-   ( cd $tmp_dir && ar -crfD $pkg_file ./debian-binary ./control.tar.gz 
./data.tar.$cext )
+   ( cd $tmp_dir && ar -crf $pkg_file ./debian-binary ./control.tar.gz 
./data.tar.$cext )
  else
 -  ( cd $tmp_dir && tar -c $tsortargs --mtime=$build_date $tarformat 
./debian-binary ./control.tar.gz ./data.tar.$cext | gzip $zipargs > $pkg_file )
 +  ( cd $tmp_dir && tar -c $tsortargs --mtime="$build_date" $tarformat 
./debian-binary ./control.tar.gz ./data.tar.$cext | gzip $zipargs > $pkg_file )
  fi
  
  rm $tmp_dir/debian-binary $tmp_dir/data.tar.$cext $tmp_dir/control.tar.gz
--- 
-2.16.1
-
-- 
2.16.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 11/36] m4: refresh patches

2018-03-09 Thread Alexander Kanavin
From: Ross Burton 

The patch tool will apply patches by default with "fuzz", which is where if the
hunk context isn't present but what is there is close enough, it will force the
patch in.

Whilst this is useful when there's just whitespace changes, when applied to
source it is possible for a patch applied with fuzz to produce broken code which
still compiles (see #10450).  This is obviously bad.

We'd like to eventually have do_patch() rejecting any fuzz on these grounds. For
that to be realistic the existing patches with fuzz need to be rebased and
reviewed.

Signed-off-by: Ross Burton 
Signed-off-by: Alexander Kanavin 
---
 meta/recipes-devtools/m4/m4/ac_config_links.patch | 11 ++-
 1 file changed, 6 insertions(+), 5 deletions(-)

diff --git a/meta/recipes-devtools/m4/m4/ac_config_links.patch 
b/meta/recipes-devtools/m4/m4/ac_config_links.patch
index 275c0b2e7d8..71edf595122 100644
--- a/meta/recipes-devtools/m4/m4/ac_config_links.patch
+++ b/meta/recipes-devtools/m4/m4/ac_config_links.patch
@@ -14,10 +14,11 @@ Tested on x86_64_linux (Ubuntu 8.04 and 9.10).
 
 2009-11-10 Esben Haabendal 
 
-diff -urN m4-1.4.13.orig/configure m4-1.4.13/configure
 m4-1.4.13.orig/configure   2009-11-10 10:54:00.301707097 +0100
-+++ m4-1.4.13/configure2009-11-10 10:54:17.314206379 +0100
-@@ -14860,8 +14860,8 @@
+Index: m4-1.4.18/configure
+===
+--- m4-1.4.18.orig/configure
 m4-1.4.18/configure
+@@ -24415,8 +24415,8 @@ $as_echo "#define GNULIB_TEST_GETTIMEOFD
# only, it does not matter if we skip the link with older autoconf.
# Automake 1.10.1 and earlier try to remove GNUmakefile in non-VPATH
# builds, so use a shell variable to bypass this.
@@ -27,4 +28,4 @@ diff -urN m4-1.4.13.orig/configure m4-1.4.13/configure
 + # ac_config_links="$ac_config_links $GNUmakefile:$GNUmakefile"
  
  
- 
+   :
-- 
2.16.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 10/36] i2c-tools: refresh patches

2018-03-09 Thread Alexander Kanavin
From: Ross Burton 

The patch tool will apply patches by default with "fuzz", which is where if the
hunk context isn't present but what is there is close enough, it will force the
patch in.

Whilst this is useful when there's just whitespace changes, when applied to
source it is possible for a patch applied with fuzz to produce broken code which
still compiles (see #10450).  This is obviously bad.

We'd like to eventually have do_patch() rejecting any fuzz on these grounds. For
that to be realistic the existing patches with fuzz need to be rebased and
reviewed.

Signed-off-by: Ross Burton 
Signed-off-by: Alexander Kanavin 
---
 ...-tools-Module.mk-Add-missing-dependencies.patch | 25 ++
 1 file changed, 11 insertions(+), 14 deletions(-)

diff --git 
a/meta/recipes-devtools/i2c-tools/files/0001-tools-Module.mk-Add-missing-dependencies.patch
 
b/meta/recipes-devtools/i2c-tools/files/0001-tools-Module.mk-Add-missing-dependencies.patch
index e47c02ab7f5..33cf2d42a87 100644
--- 
a/meta/recipes-devtools/i2c-tools/files/0001-tools-Module.mk-Add-missing-dependencies.patch
+++ 
b/meta/recipes-devtools/i2c-tools/files/0001-tools-Module.mk-Add-missing-dependencies.patch
@@ -17,12 +17,12 @@ Signed-off-by: Maxin B. John 
  tools/Module.mk | 10 +-
  2 files changed, 12 insertions(+), 5 deletions(-)
 
-diff --git a/lib/Module.mk b/lib/Module.mk
-index 8a58f5b..67afe91 100644
 a/lib/Module.mk
-+++ b/lib/Module.mk
-@@ -37,6 +37,13 @@ ifeq ($(BUILD_STATIC_LIB),1)
- LIB_TARGETS   += $(LIB_STLIBNAME)
+Index: i2c-tools-4.0/lib/Module.mk
+===
+--- i2c-tools-4.0.orig/lib/Module.mk
 i2c-tools-4.0/lib/Module.mk
+@@ -35,6 +35,13 @@ LIB_TARGETS += $(LIB_STLIBNAME)
+ LIB_OBJECTS   += smbus.ao
  endif
  
 +# Library file to link against (static or dynamic)
@@ -35,11 +35,11 @@ index 8a58f5b..67afe91 100644
  #
  # Libraries
  #
-diff --git a/tools/Module.mk b/tools/Module.mk
-index 6421a23..609de7a 100644
 a/tools/Module.mk
-+++ b/tools/Module.mk
-@@ -24,19 +24,19 @@ TOOLS_TARGETS  := i2cdetect i2cdump i2cset i2cget 
i2ctransfer
+Index: i2c-tools-4.0/tools/Module.mk
+===
+--- i2c-tools-4.0.orig/tools/Module.mk
 i2c-tools-4.0/tools/Module.mk
+@@ -24,19 +24,19 @@ TOOLS_TARGETS  := i2cdetect i2cdump i2cse
  # Programs
  #
  
@@ -64,6 +64,3 @@ index 6421a23..609de7a 100644
$(CC) $(LDFLAGS) -o $@ $^ $(TOOLS_LDFLAGS)
  
  #
--- 
-2.4.0
-
-- 
2.16.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 08/36] e2fsprogs: refresh patches

2018-03-09 Thread Alexander Kanavin
From: Ross Burton 

The patch tool will apply patches by default with "fuzz", which is where if the
hunk context isn't present but what is there is close enough, it will force the
patch in.

Whilst this is useful when there's just whitespace changes, when applied to
source it is possible for a patch applied with fuzz to produce broken code which
still compiles (see #10450).  This is obviously bad.

We'd like to eventually have do_patch() rejecting any fuzz on these grounds. For
that to be realistic the existing patches with fuzz need to be rebased and
reviewed.

Signed-off-by: Ross Burton 
Signed-off-by: Alexander Kanavin 
---
 ...fs-enable-the-metadata_csum-and-64bit-fea.patch | 12 -
 .../e2fsprogs/e2fsprogs/ptest.patch| 30 +++---
 2 files changed, 21 insertions(+), 21 deletions(-)

diff --git 
a/meta/recipes-devtools/e2fsprogs/e2fsprogs/Revert-mke2fs-enable-the-metadata_csum-and-64bit-fea.patch
 
b/meta/recipes-devtools/e2fsprogs/e2fsprogs/Revert-mke2fs-enable-the-metadata_csum-and-64bit-fea.patch
index 38fb07e6e6e..38e1bdb3d86 100644
--- 
a/meta/recipes-devtools/e2fsprogs/e2fsprogs/Revert-mke2fs-enable-the-metadata_csum-and-64bit-fea.patch
+++ 
b/meta/recipes-devtools/e2fsprogs/e2fsprogs/Revert-mke2fs-enable-the-metadata_csum-and-64bit-fea.patch
@@ -19,10 +19,10 @@ Signed-off-by: Hongxu Jia 
  misc/mke2fs.conf.in | 3 ++-
  1 file changed, 2 insertions(+), 1 deletion(-)
 
-diff --git a/misc/mke2fs.conf.in b/misc/mke2fs.conf.in
-index 812f7c7..0280398 100644
 a/misc/mke2fs.conf.in
-+++ b/misc/mke2fs.conf.in
+Index: git/misc/mke2fs.conf.in
+===
+--- git.orig/misc/mke2fs.conf.in
 git/misc/mke2fs.conf.in
 @@ -11,8 +11,9 @@
features = has_journal
}
@@ -32,5 +32,5 @@ index 812f7c7..0280398 100644
inode_size = 256
 +  auto_64-bit_support = 1
}
-   ext4dev = {
-   features = 
has_journal,extent,huge_file,flex_bg,uninit_bg,inline_data,64bit,dir_nlink,extra_isize
+   small = {
+   blocksize = 1024
diff --git a/meta/recipes-devtools/e2fsprogs/e2fsprogs/ptest.patch 
b/meta/recipes-devtools/e2fsprogs/e2fsprogs/ptest.patch
index 7df09676373..7c4bb39fd71 100644
--- a/meta/recipes-devtools/e2fsprogs/e2fsprogs/ptest.patch
+++ b/meta/recipes-devtools/e2fsprogs/e2fsprogs/ptest.patch
@@ -1,10 +1,10 @@
 Upstream-Status: Inappropriate
 
-diff --git a/tests/Makefile.in b/tests/Makefile.in
-index c130f4a..d2ade03 100644
 a/tests/Makefile.in
-+++ b/tests/Makefile.in
-@@ -18,7 +18,7 @@ test_one: $(srcdir)/test_one.in Makefile mke2fs.conf
+Index: git/tests/Makefile.in
+===
+--- git.orig/tests/Makefile.in
 git/tests/Makefile.in
+@@ -18,7 +18,7 @@ test_one: $(srcdir)/test_one.in Makefile
@echo "#!/bin/sh" > test_one
@echo "HTREE=y" >> test_one
@echo "QUOTA=y" >> test_one
@@ -12,8 +12,8 @@ index c130f4a..d2ade03 100644
 +  @echo "SRCDIR=${prefix}${libdir}/e2fsprogs/ptest/test" >> test_one
@echo "DIFF_OPTS=@UNI_DIFF_OPTS@" >> test_one
@echo "SIZEOF_TIME_T=@SIZEOF_TIME_T@" >> test_one
-   @cat $(srcdir)/test_one.in >> test_one
-@@ -27,7 +27,7 @@ test_one: $(srcdir)/test_one.in Makefile mke2fs.conf
+   @echo "DD=@DD@" >>test_one
+@@ -28,7 +28,7 @@ test_one: $(srcdir)/test_one.in Makefile
  test_script: test_one test_script.in Makefile mke2fs.conf
@echo "Creating test_script..."
@echo "#!/bin/sh" > test_script
@@ -22,10 +22,10 @@ index c130f4a..d2ade03 100644
@cat $(srcdir)/test_script.in >> test_script
@chmod +x test_script
  
-diff --git a/tests/test_config b/tests/test_config
-index 547ef4c..e11e6f4 100644
 a/tests/test_config
-+++ b/tests/test_config
+Index: git/tests/test_config
+===
+--- git.orig/tests/test_config
 git/tests/test_config
 @@ -3,24 +3,24 @@
  #
  
@@ -67,10 +67,10 @@ index 547ef4c..e11e6f4 100644
  CLEAN_OUTPUT="sed -f $cmd_dir/filter.sed"
  
LD_LIBRARY_PATH=../lib:../lib/ext2fs:../lib/e2p:../lib/et:../lib/ss:${LD_LIBRARY_PATH}
  
DYLD_LIBRARY_PATH=../lib:../lib/ext2fs:../lib/e2p:../lib/et:../lib/ss:${DYLD_LIBRARY_PATH}
-diff --git a/tests/test_script.in b/tests/test_script.in
-index 9959e30..442999d 100644
 a/tests/test_script.in
-+++ b/tests/test_script.in
+Index: git/tests/test_script.in
+===
+--- git.orig/tests/test_script.in
 git/tests/test_script.in
 @@ -39,7 +39,7 @@ for i; do
  done
  
-- 
2.16.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 07/36] openssl: drop openssl-1.0.2a-x32-asm.patch

2018-03-09 Thread Alexander Kanavin
The patch was applied in a completely incorrect spot (due to fuzz),
no one noticed or complained. Meanwhile upstream says the issue
has been resolved differently:
https://rt.openssl.org/Ticket/Display.html?id=3759=guest=guest

Signed-off-by: Alexander Kanavin 
---
 .../openssl-1.0.2n/openssl-1.0.2a-x32-asm.patch| 46 --
 .../recipes-connectivity/openssl/openssl_1.0.2n.bb |  1 -
 2 files changed, 47 deletions(-)
 delete mode 100644 
meta/recipes-connectivity/openssl/openssl-1.0.2n/openssl-1.0.2a-x32-asm.patch

diff --git 
a/meta/recipes-connectivity/openssl/openssl-1.0.2n/openssl-1.0.2a-x32-asm.patch 
b/meta/recipes-connectivity/openssl/openssl-1.0.2n/openssl-1.0.2a-x32-asm.patch
deleted file mode 100644
index 1e5bfa17d67..000
--- 
a/meta/recipes-connectivity/openssl/openssl-1.0.2n/openssl-1.0.2a-x32-asm.patch
+++ /dev/null
@@ -1,46 +0,0 @@
-https://rt.openssl.org/Ticket/Display.html?id=3759=guest=guest
-
-From 6257d59b3a68d2feb9d64317a1c556dc3813ee61 Mon Sep 17 00:00:00 2001
-From: Mike Frysinger 
-Date: Sat, 21 Mar 2015 06:01:25 -0400
-Subject: [PATCH] crypto: use bigint in x86-64 perl
-
-Upstream-Status: Pending
-Signed-off-by: Cristian Iorga 
-
-When building on x32 systems where the default type is 32bit, make sure
-we can transparently represent 64bit integers.  Otherwise we end up with
-build errors like:
-/usr/bin/perl asm/ghash-x86_64.pl elf > ghash-x86_64.s
-Integer overflow in hexadecimal number at asm/../../perlasm/x86_64-xlate.pl 
line 201, <> line 890.
-...
-ghash-x86_64.s: Assembler messages:
-ghash-x86_64.s:890: Error: junk '.15473355479995e+19' after expression
-
-We don't enable this globally as there are some cases where we'd get
-32bit values interpreted as unsigned when we need them as signed.
-
-Reported-by: Bertrand Jacquin 
-URL: https://bugs.gentoo.org/542618

- crypto/perlasm/x86_64-xlate.pl | 4 
- 1 file changed, 4 insertions(+)
-
-diff --git a/crypto/perlasm/x86_64-xlate.pl b/crypto/perlasm/x86_64-xlate.pl
-index aae8288..0bf9774 100755
 a/crypto/perlasm/x86_64-xlate.pl
-+++ b/crypto/perlasm/x86_64-xlate.pl
-@@ -195,6 +195,10 @@ my %globals;
- sub out {
-   my $self = shift;
- 
-+  # When building on x32 ABIs, the expanded hex value might be too
-+  # big to fit into 32bits.  Enable transparent 64bit support here
-+  # so we can safely print it out.
-+  use bigint;
-   if ($gas) {
-   # Solaris /usr/ccs/bin/as can't handle multiplications
-   # in $self->{value}
--- 
-2.3.3
-
diff --git a/meta/recipes-connectivity/openssl/openssl_1.0.2n.bb 
b/meta/recipes-connectivity/openssl/openssl_1.0.2n.bb
index 32444c60925..75e44bae9ff 100644
--- a/meta/recipes-connectivity/openssl/openssl_1.0.2n.bb
+++ b/meta/recipes-connectivity/openssl/openssl_1.0.2n.bb
@@ -34,7 +34,6 @@ SRC_URI += "file://find.pl;subdir=openssl-${PV}/util/ \
file://openssl-fix-des.pod-error.patch \
file://Makefiles-ptest.patch \
file://ptest-deps.patch \
-   file://openssl-1.0.2a-x32-asm.patch \
file://ptest_makefile_deps.patch \
file://configure-musl-target.patch \
file://parallel.patch \
-- 
2.16.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 09/36] gcc: drop patch that is already upstream

2018-03-09 Thread Alexander Kanavin
Due to patch fuzz, it was applied again, so the same code sequence was
repeated twice. Not sure if that caused any bugs, but certainly wasn't
the right thing to do.

Signed-off-by: Alexander Kanavin 
---
 meta/recipes-devtools/gcc/gcc-7.3.inc  |  1 -
 ...le-non-legitimate-address-in-riscv_legiti.patch | 51 --
 2 files changed, 52 deletions(-)
 delete mode 100644 
meta/recipes-devtools/gcc/gcc-7.3/0050-RISC-V-Handle-non-legitimate-address-in-riscv_legiti.patch

diff --git a/meta/recipes-devtools/gcc/gcc-7.3.inc 
b/meta/recipes-devtools/gcc/gcc-7.3.inc
index 5d3b8d7ec31..d56d2c5e06c 100644
--- a/meta/recipes-devtools/gcc/gcc-7.3.inc
+++ b/meta/recipes-devtools/gcc/gcc-7.3.inc
@@ -73,7 +73,6 @@ SRC_URI = "\
file://0047-sync-gcc-stddef.h-with-musl.patch \
file://0048-gcc-Enable-static-PIE.patch \
file://fix-segmentation-fault-precompiled-hdr.patch \
-   
file://0050-RISC-V-Handle-non-legitimate-address-in-riscv_legiti.patch \
file://no-sse-fix-test-case-failures.patch \
${BACKPORTS} \
 "
diff --git 
a/meta/recipes-devtools/gcc/gcc-7.3/0050-RISC-V-Handle-non-legitimate-address-in-riscv_legiti.patch
 
b/meta/recipes-devtools/gcc/gcc-7.3/0050-RISC-V-Handle-non-legitimate-address-in-riscv_legiti.patch
deleted file mode 100644
index 5a14d04b6f8..000
--- 
a/meta/recipes-devtools/gcc/gcc-7.3/0050-RISC-V-Handle-non-legitimate-address-in-riscv_legiti.patch
+++ /dev/null
@@ -1,51 +0,0 @@
-From 16210e6270e200cd4892a90ecef608906be3a130 Mon Sep 17 00:00:00 2001
-From: Kito Cheng 
-Date: Thu, 4 May 2017 02:11:13 +0800
-Subject: [PATCH] RISC-V: Handle non-legitimate address in
- riscv_legitimize_move
-
-GCC may generate non-legitimate address due to we allow some
-load/store with non-legitimate address in pic.md.
-
-  2017-05-12  Kito Cheng  
-
-  * config/riscv/riscv.c (riscv_legitimize_move): Handle
-  non-legitimate address.

-Upstream-Status: Backport
-Signed-off-by: Khem Raj 
-
- gcc/ChangeLog|  5 +
- gcc/config/riscv/riscv.c | 16 
- 2 files changed, 21 insertions(+)
-
-diff --git a/gcc/config/riscv/riscv.c b/gcc/config/riscv/riscv.c
-index f7fec4bfcf8..d519be1659a 100644
 a/gcc/config/riscv/riscv.c
-+++ b/gcc/config/riscv/riscv.c
-@@ -1385,6 +1385,22 @@ riscv_legitimize_move (enum machine_mode mode, rtx 
dest, rtx src)
-   return true;
- }
- 
-+  /* RISC-V GCC may generate non-legitimate address due to we provide some
-+ pattern for optimize access PIC local symbol and it's make GCC generate
-+ unrecognizable instruction during optmizing.  */
-+
-+  if (MEM_P (dest) && !riscv_legitimate_address_p (mode, XEXP (dest, 0),
-+ reload_completed))
-+{
-+  XEXP (dest, 0) = riscv_force_address (XEXP (dest, 0), mode);
-+}
-+
-+  if (MEM_P (src) && !riscv_legitimate_address_p (mode, XEXP (src, 0),
-+reload_completed))
-+{
-+  XEXP (src, 0) = riscv_force_address (XEXP (src, 0), mode);
-+}
-+
-   return false;
- }
- 
--- 
-2.14.2
-
-- 
2.16.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 01/36] pciutils: refresh patches

2018-03-09 Thread Alexander Kanavin
From: Ross Burton 

The patch tool will apply patches by default with "fuzz", which is where if the
hunk context isn't present but what is there is close enough, it will force the
patch in.

Whilst this is useful when there's just whitespace changes, when applied to
source it is possible for a patch applied with fuzz to produce broken code which
still compiles (see #10450).  This is obviously bad.

We'd like to eventually have do_patch() rejecting any fuzz on these grounds. For
that to be realistic the existing patches with fuzz need to be rebased and
reviewed.

Signed-off-by: Ross Burton 
Signed-off-by: Alexander Kanavin 
---
 meta/recipes-bsp/pciutils/pciutils/configure.patch | 26 +++---
 1 file changed, 13 insertions(+), 13 deletions(-)

diff --git a/meta/recipes-bsp/pciutils/pciutils/configure.patch 
b/meta/recipes-bsp/pciutils/pciutils/configure.patch
index 55edfea3f61..a7e445733a8 100644
--- a/meta/recipes-bsp/pciutils/pciutils/configure.patch
+++ b/meta/recipes-bsp/pciutils/pciutils/configure.patch
@@ -13,11 +13,11 @@ Ionut Radu 
 
 Upstream-Status: Inappropriate [embedded specific]
 
-Index: pciutils-3.5.4/Makefile
+Index: pciutils-3.5.6/Makefile
 ===
 pciutils-3.5.4.orig/Makefile
-+++ pciutils-3.5.4/Makefile
-@@ -96,7 +95,7 @@ example: example.o lib/$(PCILIB)
+--- pciutils-3.5.6.orig/Makefile
 pciutils-3.5.6/Makefile
+@@ -96,7 +96,7 @@ example: example.o lib/$(PCILIB)
  example.o: example.c $(PCIINC)
  
  %: %.o
@@ -26,12 +26,12 @@ Index: pciutils-3.5.4/Makefile
  
  %.8 %.7: %.man
M=`echo $(DATE) | sed 
's/-01-/-January-/;s/-02-/-February-/;s/-03-/-March-/;s/-04-/-April-/;s/-05-/-May-/;s/-06-/-June-/;s/-07-/-July-/;s/-08-/-August-/;s/-09-/-September-/;s/-10-/-October-/;s/-11-/-November-/;s/-12-/-December-/;s/\(.*\)-\(.*\)-\(.*\)/\3
 \2 \1/'` ; sed <$< >$@ 
"s/@TODAY@/$$M/;s/@VERSION@/pciutils-$(VERSION)/;s#@IDSDIR@#$(IDSDIR)#"
-Index: pciutils-3.5.4/lib/configure
+Index: pciutils-3.5.6/lib/configure
 ===
 pciutils-3.5.4.orig/lib/configure
-+++ pciutils-3.5.4/lib/configure
-@@ -14,6 +14,10 @@ echo_n() {
-   fi
+--- pciutils-3.5.6.orig/lib/configure
 pciutils-3.5.6/lib/configure
+@@ -9,6 +9,10 @@ echo_n() {
+   printf '%s' "$*"
  }
  
 +VERSION=$1
@@ -41,7 +41,7 @@ Index: pciutils-3.5.4/lib/configure
  if [ -z "$VERSION" -o -z "$IDSDIR" ] ; then
echo >&2 "Please run the configure script from the top-level Makefile"
exit 1
-@@ -21,8 +25,8 @@ fi
+@@ -16,8 +20,8 @@ fi
  
  echo_n "Configuring libpci for your system..."
  if [ -z "$HOST" ] ; then
@@ -52,7 +52,7 @@ Index: pciutils-3.5.4/lib/configure
realsys="$sys"
if [ "$sys" = "AIX" -a -x /usr/bin/oslevel -a -x /usr/sbin/lsattr ]
then
-@@ -30,7 +34,7 @@ if [ -z "$HOST" ] ; then
+@@ -25,7 +29,7 @@ if [ -z "$HOST" ] ; then
proc=`/usr/sbin/lsdev -C -c processor -S available -F name | 
head -1`
cpu=`/usr/sbin/lsattr -F value -l $proc -a type | sed 's/_.*//'`
else
@@ -61,7 +61,7 @@ Index: pciutils-3.5.4/lib/configure
fi
if [ "$sys" = "GNU/kFreeBSD" -o "$sys" = "DragonFly" ]
then
-@@ -40,7 +44,7 @@ if [ -z "$HOST" ] ; then
+@@ -35,7 +39,7 @@ if [ -z "$HOST" ] ; then
then
sys=cygwin
fi
@@ -70,7 +70,7 @@ Index: pciutils-3.5.4/lib/configure
  fi
  [ -n "$RELEASE" ] && rel="${RELEASE}"
  # CAVEAT: tr on Solaris is a bit weird and the extra [] is otherwise harmless.
-@@ -49,6 +53,8 @@ cpu=`echo $host | sed 's/^\([^-]*\)-\([^
+@@ -44,6 +48,8 @@ cpu=`echo $host | sed 's/^\([^-]*\)-\([^
  sys=`echo $host | sed 's/^\([^-]*\)-\([^-]*\)-\(.*\)$/\3/'`
  echo " $host $rel $cpu $sys"
  
-- 
2.16.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 05/36] iproute2: refresh patches

2018-03-09 Thread Alexander Kanavin
From: Ross Burton 

The patch tool will apply patches by default with "fuzz", which is where if the
hunk context isn't present but what is there is close enough, it will force the
patch in.

Whilst this is useful when there's just whitespace changes, when applied to
source it is possible for a patch applied with fuzz to produce broken code which
still compiles (see #10450).  This is obviously bad.

We'd like to eventually have do_patch() rejecting any fuzz on these grounds. For
that to be realistic the existing patches with fuzz need to be rebased and
reviewed.

Signed-off-by: Ross Burton 
Signed-off-by: Alexander Kanavin 
---
 .../iproute2/iproute2/configure-cross.patch  | 12 ++--
 1 file changed, 6 insertions(+), 6 deletions(-)

diff --git a/meta/recipes-connectivity/iproute2/iproute2/configure-cross.patch 
b/meta/recipes-connectivity/iproute2/iproute2/configure-cross.patch
index 5536fb57656..8b75a2ada4e 100644
--- a/meta/recipes-connectivity/iproute2/iproute2/configure-cross.patch
+++ b/meta/recipes-connectivity/iproute2/iproute2/configure-cross.patch
@@ -9,19 +9,19 @@ Upstream-Status: Pending
 Signed-off-by: Koen Kooi 
 Signed-off-by: Shane Wang 
 
-Index: iproute2-4.11.0/configure
+Index: iproute2-4.14.1/configure
 ===
 iproute2-4.11.0.orig/configure
-+++ iproute2-4.11.0/configure
+--- iproute2-4.14.1.orig/configure
 iproute2-4.14.1/configure
 @@ -2,6 +2,7 @@
  # This is not an autoconf generated configure
  #
  INCLUDE=${1:-"$PWD/include"}
 +SYSROOT=$1
  
- # Make a temp directory in build tree.
- TMPDIR=$(mktemp -d config.XX)
-@@ -192,7 +193,7 @@ check_ipt_lib_dir()
+ # Output file which is input to Makefile
+ CONFIG=config.mk
+@@ -195,7 +196,7 @@ check_ipt_lib_dir()
return
fi
  
-- 
2.16.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 06/36] openssl: refresh patches

2018-03-09 Thread Alexander Kanavin
From: Ross Burton 

The patch tool will apply patches by default with "fuzz", which is where if the
hunk context isn't present but what is there is close enough, it will force the
patch in.

Whilst this is useful when there's just whitespace changes, when applied to
source it is possible for a patch applied with fuzz to produce broken code which
still compiles (see #10450).  This is obviously bad.

We'd like to eventually have do_patch() rejecting any fuzz on these grounds. For
that to be realistic the existing patches with fuzz need to be rebased and
reviewed.

Signed-off-by: Ross Burton 
Signed-off-by: Alexander Kanavin 
---
 .../openssl/openssl-1.0.2n/debian/c_rehash-compat.patch| 10 +-
 .../openssl/openssl-1.0.2n/debian/debian-targets.patch | 14 +++---
 2 files changed, 12 insertions(+), 12 deletions(-)

diff --git 
a/meta/recipes-connectivity/openssl/openssl-1.0.2n/debian/c_rehash-compat.patch 
b/meta/recipes-connectivity/openssl/openssl-1.0.2n/debian/c_rehash-compat.patch
index 68e54d561e5..3820e3e306b 100644
--- 
a/meta/recipes-connectivity/openssl/openssl-1.0.2n/debian/c_rehash-compat.patch
+++ 
b/meta/recipes-connectivity/openssl/openssl-1.0.2n/debian/c_rehash-compat.patch
@@ -5,10 +5,10 @@ Subject: [PATCH] also create old hash for compatibility
 
 Upstream-Status: Backport [debian]
 
-diff --git a/tools/c_rehash.in b/tools/c_rehash.in
-index b086ff9..b777d79 100644
 a/tools/c_rehash.in
-+++ b/tools/c_rehash.in
+Index: openssl-1.0.2n/tools/c_rehash.in
+===
+--- openssl-1.0.2n.orig/tools/c_rehash.in
 openssl-1.0.2n/tools/c_rehash.in
 @@ -8,8 +8,6 @@ my $prefix;
  
  my $openssl = $ENV{OPENSSL} || "openssl";
@@ -48,7 +48,7 @@ index b086ff9..b777d79 100644
$fname =~ s/'/'\\''/g;
my ($hash, $fprint) = `"$openssl" x509 $x509hash -fingerprint 
-noout -in "$fname"`;
chomp $hash;
-@@ -176,11 +174,21 @@ sub link_hash_cert {
+@@ -177,10 +175,20 @@ sub link_hash_cert {
$hashlist{$hash} = $fprint;
  }
  
diff --git 
a/meta/recipes-connectivity/openssl/openssl-1.0.2n/debian/debian-targets.patch 
b/meta/recipes-connectivity/openssl/openssl-1.0.2n/debian/debian-targets.patch
index 39d4328184b..35d92bedb74 100644
--- 
a/meta/recipes-connectivity/openssl/openssl-1.0.2n/debian/debian-targets.patch
+++ 
b/meta/recipes-connectivity/openssl/openssl-1.0.2n/debian/debian-targets.patch
@@ -1,12 +1,12 @@
 Upstream-Status: Backport [debian]
 
-Index: openssl-1.0.2/Configure
+Index: openssl-1.0.2n/Configure
 ===
 openssl-1.0.2.orig/Configure
-+++ openssl-1.0.2/Configure
-@@ -107,6 +107,10 @@ my $gcc_devteam_warn = "-Wall -pedantic
- 
- my $clang_disabled_warnings = "-Wno-language-extension-token 
-Wno-extended-offsetof -Wno-padded -Wno-shorten-64-to-32 -Wno-format-nonliteral 
-Wno-missing-noreturn -Wno-unused-parameter -Wno-sign-conversion 
-Wno-unreachable-code -Wno-conversion -Wno-documentation 
-Wno-missing-variable-declarations -Wno-cast-align 
-Wno-incompatible-pointer-types-discards-qualifiers 
-Wno-missing-variable-declarations -Wno-missing-field-initializers 
-Wno-unused-macros -Wno-disabled-macro-expansion -Wno-conditional-uninitialized 
-Wno-switch-enum";
+--- openssl-1.0.2n.orig/Configure
 openssl-1.0.2n/Configure
+@@ -133,6 +133,10 @@ my $clang_devteam_warn = "-Wno-unused-pa
+ # Warn that "make depend" should be run?
+ my $warn_make_depend = 0;
  
 +# There are no separate CFLAGS/CPPFLAGS/LDFLAGS, set everything in CFLAGS
 +my $debian_cflags = `dpkg-buildflags --get CFLAGS` . `dpkg-buildflags --get 
CPPFLAGS` . `dpkg-buildflags --get LDFLAGS` . "-Wa,--noexecstack -Wall";
@@ -15,7 +15,7 @@ Index: openssl-1.0.2/Configure
  my $strict_warnings = 0;
  
  my $x86_gcc_des="DES_PTR DES_RISC1 DES_UNROLL";
-@@ -343,6 +347,55 @@ my %table=(
+@@ -369,6 +373,55 @@ my %table=(
  "osf1-alpha-cc",  "cc:-std1 -tune host -O4 
-readonly_strings::(unknown):::SIXTY_FOUR_BIT_LONG 
RC4_CHUNK:${alpha_asm}:dlfcn:alpha-osf1-shared:::.so",
  "tru64-alpha-cc", "cc:-std1 -tune host -fast 
-readonly_strings::-pthread:::SIXTY_FOUR_BIT_LONG 
RC4_CHUNK:${alpha_asm}:dlfcn:alpha-osf1-shared::-msym:.so",
  
-- 
2.16.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 04/36] avahi: refresh patches

2018-03-09 Thread Alexander Kanavin
From: Ross Burton 

The patch tool will apply patches by default with "fuzz", which is where if the
hunk context isn't present but what is there is close enough, it will force the
patch in.

Whilst this is useful when there's just whitespace changes, when applied to
source it is possible for a patch applied with fuzz to produce broken code which
still compiles (see #10450).  This is obviously bad.

We'd like to eventually have do_patch() rejecting any fuzz on these grounds. For
that to be realistic the existing patches with fuzz need to be rebased and
reviewed.

Signed-off-by: Ross Burton 
Signed-off-by: Alexander Kanavin 
---
 .../avahi/files/initscript.patch   | 26 +-
 1 file changed, 16 insertions(+), 10 deletions(-)

diff --git a/meta/recipes-connectivity/avahi/files/initscript.patch 
b/meta/recipes-connectivity/avahi/files/initscript.patch
index 193889eb5c2..c856c3df046 100644
--- a/meta/recipes-connectivity/avahi/files/initscript.patch
+++ b/meta/recipes-connectivity/avahi/files/initscript.patch
@@ -1,10 +1,10 @@
 Upstream-Status: Pending
 
-diff --git a/initscript/debian/avahi-daemon.in 
b/initscript/debian/avahi-daemon.in
-index 30a2c2f..b5848a8 100755
 a/initscript/debian/avahi-daemon.in
-+++ b/initscript/debian/avahi-daemon.in
-@@ -1,2 +1,14 @@
+Index: avahi-0.7/initscript/debian/avahi-daemon.in
+===
+--- avahi-0.7.orig/initscript/debian/avahi-daemon.in
 avahi-0.7/initscript/debian/avahi-daemon.in
+@@ -1,5 +1,17 @@
  #!/bin/sh
 -
 +### BEGIN INIT INFO
@@ -20,11 +20,14 @@ index 30a2c2f..b5848a8 100755
 +#automatically
 +### END INIT INFO
 +#
-diff --git a/initscript/debian/avahi-dnsconfd.in 
b/initscript/debian/avahi-dnsconfd.in
-index ac34804..f95c340 100755
 a/initscript/debian/avahi-dnsconfd.in
-+++ b/initscript/debian/avahi-dnsconfd.in
-@@ -1,1 +1,14 @@
+ # This file is part of avahi.
+ #
+ # avahi is free software; you can redistribute it and/or modify it
+Index: avahi-0.7/initscript/debian/avahi-dnsconfd.in
+===
+--- avahi-0.7.orig/initscript/debian/avahi-dnsconfd.in
 avahi-0.7/initscript/debian/avahi-dnsconfd.in
+@@ -1,4 +1,17 @@
  #!/bin/sh
 +### BEGIN INIT INFO
 +# Provides:  avahi-dnsconfd
@@ -39,3 +42,6 @@ index ac34804..f95c340 100755
 +#automatically
 +### END INIT INFO
 +#
+ 
+ # This file is part of avahi.
+ #
-- 
2.16.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 02/36] pcmciautils: drop duplicate chunk from pcmciautils-018/makefile_race.patch

2018-03-09 Thread Alexander Kanavin
The new rule was patched into the makefile twice.

Signed-off-by: Alexander Kanavin 
---
 .../pcmciautils/pcmciautils-018/makefile_race.patch| 14 --
 1 file changed, 14 deletions(-)

diff --git a/meta/recipes-bsp/pcmciautils/pcmciautils-018/makefile_race.patch 
b/meta/recipes-bsp/pcmciautils/pcmciautils-018/makefile_race.patch
index f5a518ff73c..4c5eba7951e 100644
--- a/meta/recipes-bsp/pcmciautils/pcmciautils-018/makefile_race.patch
+++ b/meta/recipes-bsp/pcmciautils/pcmciautils-018/makefile_race.patch
@@ -12,20 +12,6 @@ RP
 
 Upstream-Status: Pending
 
-Index: pcmciautils-018/Makefile
-===
 pcmciautils-018.orig/Makefile
-+++ pcmciautils-018/Makefile
-@@ -249,6 +249,9 @@ $(PCMCIA_SOCKET_STARTUP): $(LIBC) src/st
- yacc_config.o lex_config.o: %.o: %.c src/yacc_config.h
-   $(CC) -c -MD -O -pipe $(CPPFLAGS) $<
- 
-+src/lex_config.o : src/lex_config.c src/yacc_config.h
-+  $(QUIET) $(CC) $(CFLAGS) $(CPPFLAGS) -c -o $@ $<
-+
- debugtools: ccdv $(CBDUMP) $(CISDUMP)
- 
- $(CBDUMP): $(LIBC) debug/cbdump.o
 Index: pcmciautils-018/Makefile
 ===
 --- pcmciautils-018.orig/Makefile
-- 
2.16.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 03/36] u-boot: refresh patches

2018-03-09 Thread Alexander Kanavin
From: Ross Burton 

The patch tool will apply patches by default with "fuzz", which is where if the
hunk context isn't present but what is there is close enough, it will force the
patch in.

Whilst this is useful when there's just whitespace changes, when applied to
source it is possible for a patch applied with fuzz to produce broken code which
still compiles (see #10450).  This is obviously bad.

We'd like to eventually have do_patch() rejecting any fuzz on these grounds. For
that to be realistic the existing patches with fuzz need to be rebased and
reviewed.

Signed-off-by: Ross Burton 
Signed-off-by: Alexander Kanavin 
---
 .../recipes-bsp/u-boot/files/MPC8315ERDB-enable-DHCP.patch | 14 +++---
 1 file changed, 7 insertions(+), 7 deletions(-)

diff --git a/meta/recipes-bsp/u-boot/files/MPC8315ERDB-enable-DHCP.patch 
b/meta/recipes-bsp/u-boot/files/MPC8315ERDB-enable-DHCP.patch
index cea52b79e6a..ecaa1796a49 100644
--- a/meta/recipes-bsp/u-boot/files/MPC8315ERDB-enable-DHCP.patch
+++ b/meta/recipes-bsp/u-boot/files/MPC8315ERDB-enable-DHCP.patch
@@ -5,15 +5,15 @@ Upstream-Status: Pending
 
 Signed-off-by: Ed Bartosh 
 
-diff --git a/configs/MPC8315ERDB_defconfig b/configs/MPC8315ERDB_defconfig
-index 4e2b705..b02ab1f 100644
 a/configs/MPC8315ERDB_defconfig
-+++ b/configs/MPC8315ERDB_defconfig
-@@ -9,6 +9,7 @@ CONFIG_HUSH_PARSER=y
- CONFIG_CMD_I2C=y
+Index: git/configs/MPC8315ERDB_defconfig
+===
+--- git.orig/configs/MPC8315ERDB_defconfig
 git/configs/MPC8315ERDB_defconfig
+@@ -12,6 +12,7 @@ CONFIG_CMD_PCI=y
+ CONFIG_CMD_SATA=y
  CONFIG_CMD_USB=y
  # CONFIG_CMD_SETEXPR is not set
 +CONFIG_CMD_DHCP=y
  CONFIG_CMD_MII=y
  CONFIG_CMD_PING=y
- CONFIG_CMD_EXT2=y
+ CONFIG_CMD_DATE=y
-- 
2.16.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


Re: [OE-core] [PATCH] own-mirrors.bbclass: Change prepend to append

2018-03-09 Thread Manjukumar Harthikote Matha


> -Original Message-
> From: Richard Purdie [mailto:richard.pur...@linuxfoundation.org]
> Sent: Friday, March 09, 2018 5:27 AM
> To: Bhargava Sreekantappa Gayathri ; openembedded-
> c...@lists.openembedded.org; Manjukumar Harthikote Matha
> 
> Subject: Re: [OE-core] [PATCH] own-mirrors.bbclass: Change prepend to append
> 
> On Thu, 2018-03-08 at 17:49 -0800, Bhargava Sreekantappa Gayathri
> wrote:
> > If BB_NO_NETWORK is set to 1, and local download directory is added as
> > PREMIRRORS_prepend in conf file, PREMIRRORS variable will have
> > SOURCE_MIRROR_URL as the first url. This causes build to fail as
> > network access is diabled. PREMIRRORS should be appended here so that
> > a prepend in other layers/conf files takes precedence.
> >
> > Signed-off-by: Bhargava Sreekantappa Gayathri  > gayat...@xilinx.com>
> > Signed-off-by: Manjukumar Matha  > om>
> > ---
> >  meta/classes/own-mirrors.bbclass | 2 +-
> >  1 file changed, 1 insertion(+), 1 deletion(-)
> 
> I think this patch just moves the problem, you could easily have a file:/// 
> url
> as SOURCE_MIRROR_URL and a network address in your other layer in which case
> your patch would break things...
> 


Agreed.
I think the better fix would be to go through the entire available list in 
PREMIRRORS skipping http or https  (since BB_NO_NETWORK is set) and then fail 
if we cannot get the required file.

Thanks,
Manju
-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


Re: [OE-core] [PATCH 2/3] liburcu: Explicitly add pthread options to cflags

2018-03-09 Thread Khem Raj
On Fri, Mar 9, 2018 at 7:56 AM, Richard Purdie
 wrote:
> On Fri, 2018-03-09 at 03:00 -0800, Khem Raj wrote:
>> Some architectures e.g. riscv gcc does not add -D_REENTRANT
>> when enabling pthreads. Help it here by adding these options
>> while gcc gets fixed
>>
>> Signed-off-by: Khem Raj 
>> ---
>>  meta/recipes-support/liburcu/liburcu_0.10.1.bb | 2 ++
>>  1 file changed, 2 insertions(+)
>>
>> diff --git a/meta/recipes-support/liburcu/liburcu_0.10.1.bb
>> b/meta/recipes-support/liburcu/liburcu_0.10.1.bb
>> index 0c8cd3571a..a73890af90 100644
>> --- a/meta/recipes-support/liburcu/liburcu_0.10.1.bb
>> +++ b/meta/recipes-support/liburcu/liburcu_0.10.1.bb
>> @@ -15,3 +15,5 @@ SRC_URI[sha256sum] =
>> "9c09220be4435dc27fcd22d291707b94b97f159e0c442fbcd60c168f8f
>>
>>  S = "${WORKDIR}/userspace-rcu-${PV}"
>>  inherit autotools
>> +
>> +CPPFLAGS  += "-pthread -D_REENTRANT"
>
> Should we use a riscv override here so that we have some idea why we're
> doing this and show its not needed for other arches?

we could, its a difference in gcc specs for riscv, it seems a bug to me in gcc.
this change actually provides the options that configure tries to
otherwise guess.
-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


Re: [OE-core] [PATCH 2/3] liburcu: Explicitly add pthread options to cflags

2018-03-09 Thread Richard Purdie
On Fri, 2018-03-09 at 03:00 -0800, Khem Raj wrote:
> Some architectures e.g. riscv gcc does not add -D_REENTRANT
> when enabling pthreads. Help it here by adding these options
> while gcc gets fixed
> 
> Signed-off-by: Khem Raj 
> ---
>  meta/recipes-support/liburcu/liburcu_0.10.1.bb | 2 ++
>  1 file changed, 2 insertions(+)
> 
> diff --git a/meta/recipes-support/liburcu/liburcu_0.10.1.bb
> b/meta/recipes-support/liburcu/liburcu_0.10.1.bb
> index 0c8cd3571a..a73890af90 100644
> --- a/meta/recipes-support/liburcu/liburcu_0.10.1.bb
> +++ b/meta/recipes-support/liburcu/liburcu_0.10.1.bb
> @@ -15,3 +15,5 @@ SRC_URI[sha256sum] =
> "9c09220be4435dc27fcd22d291707b94b97f159e0c442fbcd60c168f8f
>  
>  S = "${WORKDIR}/userspace-rcu-${PV}"
>  inherit autotools
> +
> +CPPFLAGS  += "-pthread -D_REENTRANT"

Should we use a riscv override here so that we have some idea why we're
doing this and show its not needed for other arches?

Cheers,

Richard
-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


Re: [OE-core] [PATCH] own-mirrors.bbclass: Change prepend to append

2018-03-09 Thread Richard Purdie
On Thu, 2018-03-08 at 17:49 -0800, Bhargava Sreekantappa Gayathri
wrote:
> If BB_NO_NETWORK is set to 1, and local download directory is added
> as
> PREMIRRORS_prepend in conf file, PREMIRRORS variable will have
> SOURCE_MIRROR_URL as the first url. This causes build to fail as
> network
> access is diabled. PREMIRRORS should be appended here so that a
> prepend
> in other layers/conf files takes precedence.
> 
> Signed-off-by: Bhargava Sreekantappa Gayathri  gayat...@xilinx.com>
> Signed-off-by: Manjukumar Matha  om>
> ---
>  meta/classes/own-mirrors.bbclass | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)

I think this patch just moves the problem, you could easily have a
file:/// url as SOURCE_MIRROR_URL and a network address in your other
layer in which case your patch would break things...

Cheers,

Richard
-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH] rootfs-postcommaneds: put image testdata under sstate control

2018-03-09 Thread André Draszik
From: André Draszik 

The testdata.json is being written to DEPLOY_DIR_IMAGE directly,
thus bypassing sstate, which results in an ever growing list
of files.

Write them to IMGDEPLOYDIR instead, so as to benefit from the
automatic management via sstate.

Signed-off-by: André Draszik 
---
 meta/classes/rootfs-postcommands.bbclass | 15 ---
 1 file changed, 8 insertions(+), 7 deletions(-)

diff --git a/meta/classes/rootfs-postcommands.bbclass 
b/meta/classes/rootfs-postcommands.bbclass
index a4e627fef8..01eee350b8 100644
--- a/meta/classes/rootfs-postcommands.bbclass
+++ b/meta/classes/rootfs-postcommands.bbclass
@@ -303,17 +303,18 @@ rootfs_sysroot_relativelinks () {
 python write_image_test_data() {
 from oe.data import export2json
 
-testdata = "%s/%s.testdata.json" % (d.getVar('DEPLOY_DIR_IMAGE'), 
d.getVar('IMAGE_NAME'))
-testdata_link = "%s/%s.testdata.json" % (d.getVar('DEPLOY_DIR_IMAGE'), 
d.getVar('IMAGE_LINK_NAME'))
+deploy_dir = d.getVar('IMGDEPLOYDIR')
+link_name = d.getVar('IMAGE_LINK_NAME')
+testdata_name = os.path.join(deploy_dir, "%s.testdata.json" % 
d.getVar('IMAGE_NAME'))
 
-bb.utils.mkdirhier(os.path.dirname(testdata))
 searchString = "%s/"%(d.getVar("TOPDIR")).replace("//","/")
-export2json(d, testdata,searchString=searchString,replaceString="")
+export2json(d, testdata_name, searchString=searchString, replaceString="")
 
-if testdata_link != testdata:
+if os.path.exists(testdata_name):
+testdata_link = os.path.join(deploy_dir, "%s.testdata.json" % 
link_name)
 if os.path.lexists(testdata_link):
-   os.remove(testdata_link)
-os.symlink(os.path.basename(testdata), testdata_link)
+os.remove(testdata_link)
+os.symlink(os.path.basename(testdata_name), testdata_link)
 }
 write_image_test_data[vardepsexclude] += "TOPDIR"
 
-- 
2.16.2

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH] ncurses: fix deletion of /usr/lib/terminfo

2018-03-09 Thread Koen Kooi
Ncurses doesn't honour ${libdir} for terminfo, so try more options to remove it.

Signed-off-by: Koen Kooi 
---
 meta/recipes-core/ncurses/ncurses.inc | 5 -
 1 file changed, 4 insertions(+), 1 deletion(-)

diff --git a/meta/recipes-core/ncurses/ncurses.inc 
b/meta/recipes-core/ncurses/ncurses.inc
index 106dcb0..0bfd644 100644
--- a/meta/recipes-core/ncurses/ncurses.inc
+++ b/meta/recipes-core/ncurses/ncurses.inc
@@ -201,7 +201,10 @@ do_install() {
 ln -sf xterm-color ${D}${sysconfdir}/terminfo/x/xterm
 fi
 
-rm -f ${D}${libdir}/terminfo
+# When changing ${libdir} to e.g. /usr/lib/myawesomelib/ ncurses 
+# still installs '/usr/lib/terminfo', so try to rm both 
+# the proper path and a slightly hardcoded one
+rm -f ${D}${libdir}/terminfo ${D}${prefix}/lib/terminfo
 
 # create linker scripts for libcurses.so and libncurses to
 # link against -ltinfo when needed. Some builds might break
-- 
2.9.5

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 1/2] meta/lib/oe/patch.py: do not leave .orig files if a patch isn't perfectly matching

2018-03-09 Thread Alexander Kanavin
Particularly, this was causing 'devtool modify' to erroneously add those
.orig files into commits. This was getting in the way, if the goal
was to amend/update those existing patches.

Signed-off-by: Alexander Kanavin 
---
 meta/lib/oe/patch.py | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/meta/lib/oe/patch.py b/meta/lib/oe/patch.py
index d905159dd3f..925c03b706b 100644
--- a/meta/lib/oe/patch.py
+++ b/meta/lib/oe/patch.py
@@ -221,7 +221,7 @@ class PatchTree(PatchSet):
 self.patches.insert(i, patch)
 
 def _applypatch(self, patch, force = False, reverse = False, run = True):
-shellcmd = ["cat", patch['file'], "|", "patch", "-p", 
patch['strippath']]
+shellcmd = ["cat", patch['file'], "|", "patch", 
"--no-backup-if-mismatch", "-p", patch['strippath']]
 if reverse:
 shellcmd.append('-R')
 
-- 
2.16.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 2/2] devtool: add --force-patch-refresh to 'modify' and 'finish' commands

2018-03-09 Thread Alexander Kanavin
This is very useful for updating patch context so that any fuzz is eliminated.
Simply issue:

devtool modify 
devtool finish --force-patch-refresh  

Without this flag, devtool will not deem the commits in the workspace
different to patches in the layer, even if the commits have different,
up-to-date context line in them.

Signed-off-by: Alexander Kanavin 
---
 scripts/lib/devtool/standard.py | 20 +++-
 1 file changed, 11 insertions(+), 9 deletions(-)

diff --git a/scripts/lib/devtool/standard.py b/scripts/lib/devtool/standard.py
index a962ebe09b4..a1e8e1d3227 100644
--- a/scripts/lib/devtool/standard.py
+++ b/scripts/lib/devtool/standard.py
@@ -1061,7 +1061,7 @@ def rename(args, config, basepath, workspace):
 return 0
 
 
-def _get_patchset_revs(srctree, recipe_path, initial_rev=None):
+def _get_patchset_revs(srctree, recipe_path, initial_rev=None, 
force_patch_refresh=False):
 """Get initial and update rev of a recipe. These are the start point of the
 whole patchset and start point for the patches to be re-generated/updated.
 """
@@ -1080,7 +1080,7 @@ def _get_patchset_revs(srctree, recipe_path, 
initial_rev=None):
 if line.startswith('# initial_rev:'):
 if not initial_rev:
 initial_rev = line.split(':')[-1].strip()
-elif line.startswith('# commit:'):
+elif line.startswith('# commit:') and not force_patch_refresh:
 commits.append(line.split(':')[-1].strip())
 elif line.startswith('# patches_%s:' % branchname):
 patches = line.split(':')[-1].strip().split(',')
@@ -1102,7 +1102,7 @@ def _get_patchset_revs(srctree, recipe_path, 
initial_rev=None):
 except bb.process.ExecutionError as err:
 stdout = None
 
-if stdout is not None:
+if stdout is not None and not force_patch_refresh:
 changed_revs = []
 for line in stdout.splitlines():
 if line.startswith('+ '):
@@ -1459,7 +1459,7 @@ def _update_recipe_srcrev(recipename, workspace, srctree, 
rd, appendlayerdir, wi
 _remove_source_files(appendlayerdir, remove_files, destpath, 
no_report_remove, dry_run=dry_run_outdir)
 return True, appendfile, remove_files
 
-def _update_recipe_patch(recipename, workspace, srctree, rd, appendlayerdir, 
wildcard_version, no_remove, no_report_remove, initial_rev, 
dry_run_outdir=None):
+def _update_recipe_patch(recipename, workspace, srctree, rd, appendlayerdir, 
wildcard_version, no_remove, no_report_remove, initial_rev, 
dry_run_outdir=None, force_patch_refresh=False):
 """Implement the 'patch' mode of update-recipe"""
 import bb
 import oe.recipeutils
@@ -1471,7 +1471,7 @@ def _update_recipe_patch(recipename, workspace, srctree, 
rd, appendlayerdir, wil
 raise DevtoolError('unable to find workspace bbappend for recipe %s' %
recipename)
 
-initial_rev, update_rev, changed_revs, filter_patches = 
_get_patchset_revs(srctree, append, initial_rev)
+initial_rev, update_rev, changed_revs, filter_patches = 
_get_patchset_revs(srctree, append, initial_rev, force_patch_refresh)
 if not initial_rev:
 raise DevtoolError('Unable to find initial revision - please specify '
'it with --initial-rev')
@@ -1623,7 +1623,7 @@ def _guess_recipe_update_mode(srctree, rdata):
 
 return 'patch'
 
-def _update_recipe(recipename, workspace, rd, mode, appendlayerdir, 
wildcard_version, no_remove, initial_rev, no_report_remove=False, 
dry_run_outdir=None, no_overrides=False):
+def _update_recipe(recipename, workspace, rd, mode, appendlayerdir, 
wildcard_version, no_remove, initial_rev, no_report_remove=False, 
dry_run_outdir=None, no_overrides=False, force_patch_refresh=False):
 srctree = workspace[recipename]['srctree']
 if mode == 'auto':
 mode = _guess_recipe_update_mode(srctree, rd)
@@ -1677,7 +1677,7 @@ def _update_recipe(recipename, workspace, rd, mode, 
appendlayerdir, wildcard_ver
 if mode == 'srcrev':
 updated, appendf, removed = _update_recipe_srcrev(recipename, 
workspace, srctree, crd, appendlayerdir, wildcard_version, no_remove, 
no_report_remove, dry_run_outdir)
 elif mode == 'patch':
-updated, appendf, removed = _update_recipe_patch(recipename, 
workspace, srctree, crd, appendlayerdir, wildcard_version, no_remove, 
no_report_remove, initial_rev, dry_run_outdir)
+updated, appendf, removed = _update_recipe_patch(recipename, 
workspace, srctree, crd, appendlayerdir, wildcard_version, no_remove, 
no_report_remove, initial_rev, dry_run_outdir, force_patch_refresh)
 else:
 raise DevtoolError('update_recipe: invalid mode %s' % mode)
 if updated:
@@ -1715,7 +1715,7 @@ def update_recipe(args, config, basepath, workspace):
 if args.dry_run:
 

[OE-core] [PATCH 3/3] recipes: Disable lttng for riscv

2018-03-09 Thread Khem Raj
Signed-off-by: Khem Raj 
---
 meta/recipes-core/packagegroups/packagegroup-core-tools-profile.bb | 2 ++
 meta/recipes-devtools/gdb/gdb-common.inc   | 1 +
 meta/recipes-kernel/lttng/lttng-tools_2.10.2.bb| 1 +
 3 files changed, 4 insertions(+)

diff --git a/meta/recipes-core/packagegroups/packagegroup-core-tools-profile.bb 
b/meta/recipes-core/packagegroups/packagegroup-core-tools-profile.bb
index e3814a44bc..554f529889 100644
--- a/meta/recipes-core/packagegroups/packagegroup-core-tools-profile.bb
+++ b/meta/recipes-core/packagegroups/packagegroup-core-tools-profile.bb
@@ -40,9 +40,11 @@ SYSTEMTAP_aarch64 = ""
 # lttng-ust uses sched_getcpu() which is not there on for some platforms.
 LTTNGUST = "lttng-ust"
 LTTNGUST_libc-musl = ""
+LTTNGUST_riscv64 = ""
 
 LTTNGTOOLS = "lttng-tools"
 LTTNGTOOLS_libc-musl = ""
+LTTNGTOOLS_riscv64 = ""
 
 LTTNGMODULES = "lttng-modules"
 
diff --git a/meta/recipes-devtools/gdb/gdb-common.inc 
b/meta/recipes-devtools/gdb/gdb-common.inc
index 9164a2bba4..039577b8e2 100644
--- a/meta/recipes-devtools/gdb/gdb-common.inc
+++ b/meta/recipes-devtools/gdb/gdb-common.inc
@@ -5,6 +5,7 @@ DEPENDS = "expat zlib ncurses virtual/libiconv ${LTTNGUST}"
 
 LTTNGUST = "lttng-ust"
 LTTNGUST_aarch64 = ""
+LTTNGUST_riscv64 = ""
 LTTNGUST_mipsarch = ""
 LTTNGUST_sh4 = ""
 LTTNGUST_libc-musl = ""
diff --git a/meta/recipes-kernel/lttng/lttng-tools_2.10.2.bb 
b/meta/recipes-kernel/lttng/lttng-tools_2.10.2.bb
index e8d041d1c6..fd5abbb113 100644
--- a/meta/recipes-kernel/lttng/lttng-tools_2.10.2.bb
+++ b/meta/recipes-kernel/lttng/lttng-tools_2.10.2.bb
@@ -25,6 +25,7 @@ PACKAGECONFIG[lttng-ust] = "--with-lttng-ust, 
--without-lttng-ust, lttng-ust"
 PACKAGECONFIG[kmod] = "--with-kmod, --without-kmod, kmod"
 PACKAGECONFIG[manpages] = "--enable-man-pages, --disable-man-pages, 
asciidoc-native xmlto-native libxslt-native"
 PACKAGECONFIG_remove_libc-musl = "lttng-ust"
+PACKAGECONFIG_remove_riscv64 = "lttng-ust"
 
 SRC_URI = "https://lttng.org/files/lttng-tools/lttng-tools-${PV}.tar.bz2 \
file://x32.patch \
-- 
2.16.2

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 2/3] liburcu: Explicitly add pthread options to cflags

2018-03-09 Thread Khem Raj
Some architectures e.g. riscv gcc does not add -D_REENTRANT
when enabling pthreads. Help it here by adding these options
while gcc gets fixed

Signed-off-by: Khem Raj 
---
 meta/recipes-support/liburcu/liburcu_0.10.1.bb | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/meta/recipes-support/liburcu/liburcu_0.10.1.bb 
b/meta/recipes-support/liburcu/liburcu_0.10.1.bb
index 0c8cd3571a..a73890af90 100644
--- a/meta/recipes-support/liburcu/liburcu_0.10.1.bb
+++ b/meta/recipes-support/liburcu/liburcu_0.10.1.bb
@@ -15,3 +15,5 @@ SRC_URI[sha256sum] = 
"9c09220be4435dc27fcd22d291707b94b97f159e0c442fbcd60c168f8f
 
 S = "${WORKDIR}/userspace-rcu-${PV}"
 inherit autotools
+
+CPPFLAGS  += "-pthread -D_REENTRANT"
-- 
2.16.2

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 1/3] packagegroup-core-sdk: Disable SANITIZERS for riscv64

2018-03-09 Thread Khem Raj
Dont build yet

Signed-off-by: Khem Raj 
---
 meta/recipes-core/packagegroups/packagegroup-core-sdk.bb | 1 +
 1 file changed, 1 insertion(+)

diff --git a/meta/recipes-core/packagegroups/packagegroup-core-sdk.bb 
b/meta/recipes-core/packagegroups/packagegroup-core-sdk.bb
index 393f0d3d13..a137e7748f 100644
--- a/meta/recipes-core/packagegroups/packagegroup-core-sdk.bb
+++ b/meta/recipes-core/packagegroups/packagegroup-core-sdk.bb
@@ -33,6 +33,7 @@ SANITIZERS_mipsarch = ""
 SANITIZERS_nios2 = ""
 SANITIZERS_powerpc64 = ""
 SANITIZERS_sparc = ""
+SANITIZERS_riscv64 = ""
 SANITIZERS_libc-musl = ""
 
 RRECOMMENDS_packagegroup-core-sdk = "\
-- 
2.16.2

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH] openssl: fix libdir logic to allow multiarch style paths

2018-03-09 Thread Koen Kooi
The recipes were using 'basename' to turn '/usr/lib' into 'lib', which breaks 
when libdir is '/usr/lib/tuple', leading to libraries ending up in 
'/usr/tuple', which isn't in FILES_*. Change the logic to use sed to strip the 
prefix instead.

Signed-off-by: Koen Kooi 
---
 meta/recipes-connectivity/openssl/openssl10.inc | 3 ++-
 meta/recipes-connectivity/openssl/openssl_1.1.0g.bb | 3 ++-
 2 files changed, 4 insertions(+), 2 deletions(-)

diff --git a/meta/recipes-connectivity/openssl/openssl10.inc 
b/meta/recipes-connectivity/openssl/openssl10.inc
index 02a0e16..a65f80c 100644
--- a/meta/recipes-connectivity/openssl/openssl10.inc
+++ b/meta/recipes-connectivity/openssl/openssl10.inc
@@ -157,7 +157,8 @@ do_configure () {
 if [ "x$useprefix" = "x" ]; then
 useprefix=/
 fi
-   perl ./Configure ${EXTRA_OECONF} shared --prefix=$useprefix 
--openssldir=${libdir}/ssl --libdir=`basename ${libdir}` $target
+   libdirleaf="$(echo ${libdir} | sed s:$useprefix::)"
+   perl ./Configure ${EXTRA_OECONF} shared --prefix=$useprefix 
--openssldir=${libdir}/ssl --libdir=${libdirleaf} $target
 }
 
 do_compile_prepend_class-target () {
diff --git a/meta/recipes-connectivity/openssl/openssl_1.1.0g.bb 
b/meta/recipes-connectivity/openssl/openssl_1.1.0g.bb
index 53f397a..0fd6819 100644
--- a/meta/recipes-connectivity/openssl/openssl_1.1.0g.bb
+++ b/meta/recipes-connectivity/openssl/openssl_1.1.0g.bb
@@ -116,7 +116,8 @@ do_configure () {
 if [ "x$useprefix" = "x" ]; then
 useprefix=/
 fi
-   perl ./Configure ${EXTRA_OECONF} --prefix=$useprefix 
--openssldir=${libdir}/ssl-1.1 --libdir=`basename ${libdir}` $target
+   libdirleaf="$(echo ${libdir} | sed s:$useprefix::)"
+   perl ./Configure ${EXTRA_OECONF} --prefix=$useprefix 
--openssldir=${libdir}/ssl-1.1 --libdir=${libdirleaf} $target
 }
 
 #| engines/afalg/e_afalg.c: In function 'eventfd':
-- 
2.9.5

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH] ncurses: fix do_install failure when base_libdir has more than one level

2018-03-09 Thread Koen Kooi
Other sections of the .inc already use mkdir -p, so use it here as well.

Signed-off-by: Koen Kooi 
---
 meta/recipes-core/ncurses/ncurses.inc | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/meta/recipes-core/ncurses/ncurses.inc 
b/meta/recipes-core/ncurses/ncurses.inc
index 1f21cd4..106dcb0 100644
--- a/meta/recipes-core/ncurses/ncurses.inc
+++ b/meta/recipes-core/ncurses/ncurses.inc
@@ -227,7 +227,7 @@ do_install() {
 if [ ! -d "${D}${base_libdir}" ]; then
 # Setting base_libdir to libdir as is done in the -native
 # case will skip this code
-mkdir ${D}${base_libdir}
+mkdir -p ${D}${base_libdir}
 mv ${D}${libdir}/libncurses.so.* ${D}${base_libdir}
 ! ${ENABLE_WIDEC} || \
 mv ${D}${libdir}/libncursesw.so.* ${D}${base_libdir}
-- 
2.9.5

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


Re: [OE-core] [PATCH] systemd: Explicitly add hidden attribute to __start_BUS_ERROR_MAP and __stop_BUS_ERROR_MAP

2018-03-09 Thread André Draszik
I see this, too.

BTW, some more info:


This looks similar to
https://github.com/systemd/systemd/issues/234
and was worked-around in systemd commit aac7c5ed8bc6
("build-sys: hide magic section variables from exported symbols")
until reverted in commit 780950a2ba58 ("Revert "build-sys: hide
magic section variables from exported symbols"") because binutils
was fixed since.
This error should only ever happen with old versions of ld.gold.
In addition, gold should be fixed by now:
https://sourceware.org/bugzilla/show_bug.cgi?id=18548

https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5417c94d1a944d1a27f99240e5d62a6d7cd324f1
but something is amiss here.

ld -v gives
GNU ld (GNU Binutils) 2.30.0.20180208

so this is a bit strange...


Cheers,
Andre'

On Fri, 2018-03-02 at 18:47 -0800, Khem Raj wrote:
> These symbols appear in dynsyms of libsystemd.so and musl loader
> doesnt like it
> 
> Error relocating /mnt/a/oe/build/tmp/work/i586-bec-linux-musl/avahi/0.7-
> r0/recipe-sysroot//lib/libsystemd.so.0: __start_BUS_ERROR_MAP: symbol not
> found
> Error relocating /mnt/a/oe/build/tmp/work/i586-bec-linux-musl/avahi/0.7-
> r0/recipe-sysroot//lib/libsystemd.so.0: __stop_BUS_ERROR_MAP: symbol not
> found
> 
> [YOCTO #12577]
> 
> Signed-off-by: Khem Raj 
> ---
>  ...rt_BUS_ERROR_MAP-and-__stop_BUS_ERROR_MAP.patch | 34
> ++
>  meta/recipes-core/systemd/systemd_234.bb   |  1 +
>  2 files changed, 35 insertions(+)
>  create mode 100644 meta/recipes-core/systemd/systemd/0001-Hide-
> __start_BUS_ERROR_MAP-and-__stop_BUS_ERROR_MAP.patch
> 
> diff --git a/meta/recipes-core/systemd/systemd/0001-Hide-
> __start_BUS_ERROR_MAP-and-__stop_BUS_ERROR_MAP.patch b/meta/recipes-
> core/systemd/systemd/0001-Hide-__start_BUS_ERROR_MAP-and-
> __stop_BUS_ERROR_MAP.patch
> new file mode 100644
> index 00..2cffc426ed
> --- /dev/null
> +++ b/meta/recipes-core/systemd/systemd/0001-Hide-__start_BUS_ERROR_MAP-
> and-__stop_BUS_ERROR_MAP.patch
> @@ -0,0 +1,34 @@
> +From 687a5af8dc5d38f918a6ce08fed5297234bf8346 Mon Sep 17 00:00:00 2001
> +From: Khem Raj 
> +Date: Fri, 2 Mar 2018 18:00:17 -0800
> +Subject: [PATCH] Hide __start_BUS_ERROR_MAP and __stop_BUS_ERROR_MAP
> +
> +for currently unknown reasons they get exported to the shared libries
> +even without being listed in the sym file
> +
> +Signed-off-by: Khem Raj 
> +---
> +
> +Upstream-Status: Pending [ Conditional on master needing this, 234 does
> need it ]
> +
> + src/libsystemd/sd-bus/bus-error.c | 4 ++--
> + 1 file changed, 2 insertions(+), 2 deletions(-)
> +
> +diff --git a/src/libsystemd/sd-bus/bus-error.c b/src/libsystemd/sd-
> bus/bus-error.c
> +index 378f7a377..49d797abd 100644
> +--- a/src/libsystemd/sd-bus/bus-error.c
>  b/src/libsystemd/sd-bus/bus-error.c
> +@@ -71,8 +71,8 @@ BUS_ERROR_MAP_ELF_REGISTER const sd_bus_error_map
> bus_standard_errors[] = {
> + };
> + 
> + /* GCC maps this magically to the beginning and end of the BUS_ERROR_MAP
> section */
> +-extern const sd_bus_error_map __start_BUS_ERROR_MAP[];
> +-extern const sd_bus_error_map __stop_BUS_ERROR_MAP[];
> ++extern const sd_bus_error_map __start_BUS_ERROR_MAP[] _hidden_;
> ++extern const sd_bus_error_map __stop_BUS_ERROR_MAP[] _hidden_;
> + 
> + /* Additional maps registered with sd_bus_error_add_map() are in this
> +  * NULL terminated array */
> +-- 
> +2.16.2
> +
> diff --git a/meta/recipes-core/systemd/systemd_234.bb b/meta/recipes-
> core/systemd/systemd_234.bb
> index d12e94f463..b15e5a41db 100644
> --- a/meta/recipes-core/systemd/systemd_234.bb
> +++ b/meta/recipes-core/systemd/systemd_234.bb
> @@ -51,6 +51,7 @@ SRC_URI =
> "git://github.com/systemd/systemd.git;protocol=git \
> file://0001-meson-update-header-file-to-detect-
> memfd_create.patch \
> file://0002-configure.ac-Check-if-memfd_create-is-already-
> define.patch \
> file://0003-fileio-include-sys-mman.h.patch \
> +   file://0001-Hide-__start_BUS_ERROR_MAP-and-
> __stop_BUS_ERROR_MAP.patch \
> "
>  SRC_URI_append_qemuall = " file://0001-core-device.c-Change-the-default-
> device-timeout-to-2.patch"
>  
> -- 
> 2.16.2
> 
-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core