* [PATCH 1/8] openssh: upgrade 7.6p1 -> 7.7p1
@ 2018-05-19 2:13 Armin Kuster
2018-05-19 2:13 ` [PATCH 2/8] kexec-tools: upgrade 2.0.16 -> 2.0.17 Armin Kuster
` (6 more replies)
0 siblings, 7 replies; 18+ messages in thread
From: Armin Kuster @ 2018-05-19 2:13 UTC (permalink / raw)
To: akuster, openembedded-core
From: Armin Kuster <akuster808@gmail.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
---
.../openssh/{openssh_7.6p1.bb => openssh_7.7p1.bb} | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
rename meta/recipes-connectivity/openssh/{openssh_7.6p1.bb => openssh_7.7p1.bb} (98%)
diff --git a/meta/recipes-connectivity/openssh/openssh_7.6p1.bb b/meta/recipes-connectivity/openssh/openssh_7.7p1.bb
similarity index 98%
rename from meta/recipes-connectivity/openssh/openssh_7.6p1.bb
rename to meta/recipes-connectivity/openssh/openssh_7.7p1.bb
index e11e8d7..691dec6 100644
--- a/meta/recipes-connectivity/openssh/openssh_7.6p1.bb
+++ b/meta/recipes-connectivity/openssh/openssh_7.7p1.bb
@@ -30,8 +30,8 @@ SRC_URI = "http://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-${PV}.tar
PAM_SRC_URI = "file://sshd"
-SRC_URI[md5sum] = "06a88699018e5fef13d4655abfed1f63"
-SRC_URI[sha256sum] = "a323caeeddfe145baaa0db16e98d784b1fbc7dd436a6bf1f479dfd5cd1d21723"
+SRC_URI[md5sum] = "68ba883aff6958297432e5877e9a0fe2"
+SRC_URI[sha256sum] = "d73be7e684e99efcd024be15a30bffcbe41b012b2f7b3c9084aed621775e6b8f"
inherit useradd update-rc.d update-alternatives systemd
--
2.7.4
^ permalink raw reply related [flat|nested] 18+ messages in thread* [PATCH 2/8] kexec-tools: upgrade 2.0.16 -> 2.0.17 2018-05-19 2:13 [PATCH 1/8] openssh: upgrade 7.6p1 -> 7.7p1 Armin Kuster @ 2018-05-19 2:13 ` Armin Kuster 2018-05-19 2:13 ` [PATCH 3/8] libdmx: upgrade 1.1.3 -> 1.1.4 Armin Kuster ` (5 subsequent siblings) 6 siblings, 0 replies; 18+ messages in thread From: Armin Kuster @ 2018-05-19 2:13 UTC (permalink / raw) To: akuster, openembedded-core From: Armin Kuster <akuster808@gmail.com> Signed-off-by: Armin Kuster <akuster808@gmail.com> --- ...rm64-Set-fno-PIC-along-with-mcmodel-large.patch | 33 ---------------------- ...kexec-tools_2.0.16.bb => kexec-tools_2.0.17.bb} | 9 ++---- 2 files changed, 3 insertions(+), 39 deletions(-) delete mode 100644 meta/recipes-kernel/kexec/kexec-tools/0001-arm64-Set-fno-PIC-along-with-mcmodel-large.patch rename meta/recipes-kernel/kexec/{kexec-tools_2.0.16.bb => kexec-tools_2.0.17.bb} (92%) diff --git a/meta/recipes-kernel/kexec/kexec-tools/0001-arm64-Set-fno-PIC-along-with-mcmodel-large.patch b/meta/recipes-kernel/kexec/kexec-tools/0001-arm64-Set-fno-PIC-along-with-mcmodel-large.patch deleted file mode 100644 index 786fc0c..0000000 --- a/meta/recipes-kernel/kexec/kexec-tools/0001-arm64-Set-fno-PIC-along-with-mcmodel-large.patch +++ /dev/null @@ -1,33 +0,0 @@ -From a12dfe9be05f9dee96c7637a20c01e05711c563c Mon Sep 17 00:00:00 2001 -From: David Michael <david.michael@coreos.com> -Date: Sun, 7 Jan 11:26:57 2018 -0500 -Subject: [PATCH] arm64: Set -fno-PIC along with -mcmodel=large - -As seen in GCC's gcc/config/aarch64/aarch64.c, -fPIC with large -code model is unsupported. This fixes the "sorry, unimplemented" -errors when building with compilers defaulting to -fPIC. - -Upstream-Status: Backport - -Signed-off-by: Simon Horman <horms@verge.net.au> -Signed-off-by: David Michael <david.michael@coreos.com> -Signed-off-by: Mingli Yu <Mingli.Yu@windriver.com> ---- - purgatory/arch/arm64/Makefile | 1 + - 1 file changed, 1 insertion(+) - -diff --git a/purgatory/arch/arm64/Makefile b/purgatory/arch/arm64/Makefile -index 636abea..80068ca 100644 ---- a/purgatory/arch/arm64/Makefile -+++ b/purgatory/arch/arm64/Makefile -@@ -1,6 +1,7 @@ - - arm64_PURGATORY_EXTRA_CFLAGS = \ - -mcmodel=large \ -+ -fno-PIC \ - -fno-stack-protector \ - -fno-asynchronous-unwind-tables \ - -Wundef \ --- -2.7.4 - diff --git a/meta/recipes-kernel/kexec/kexec-tools_2.0.16.bb b/meta/recipes-kernel/kexec/kexec-tools_2.0.17.bb similarity index 92% rename from meta/recipes-kernel/kexec/kexec-tools_2.0.16.bb rename to meta/recipes-kernel/kexec/kexec-tools_2.0.17.bb index bd87b37..f4ec586 100644 --- a/meta/recipes-kernel/kexec/kexec-tools_2.0.16.bb +++ b/meta/recipes-kernel/kexec/kexec-tools_2.0.17.bb @@ -9,8 +9,6 @@ LIC_FILES_CHKSUM = "file://COPYING;md5=ea5bed2f60d357618ca161ad539f7c0a \ file://kexec/kexec.c;beginline=1;endline=20;md5=af10f6ae4a8715965e648aa687ad3e09" DEPENDS = "zlib xz" -PR = "r1" - SRC_URI = "${KERNELORG_MIRROR}/linux/utils/kernel/kexec/kexec-tools-${PV}.tar.gz \ file://kdump \ file://kdump.conf \ @@ -20,11 +18,10 @@ SRC_URI = "${KERNELORG_MIRROR}/linux/utils/kernel/kexec/kexec-tools-${PV}.tar.gz file://0010-kexec-ARM-Fix-add_buffer_phys_virt-align-issue.patch \ file://kexec-x32.patch \ file://0001-Disable-PIE-during-link.patch \ - file://0001-arm64-Set-fno-PIC-along-with-mcmodel-large.patch \ - " + " -SRC_URI[md5sum] = "5198968de79b5ded96f97f3c2ea9637b" -SRC_URI[sha256sum] = "cf17fc99bf77c9b39f06ee88ac0e86d0349c4a0c3f8214a3cc78eece872f6f3a" +SRC_URI[md5sum] = "8e071ca473694a71e4ae60ed7ef6f377" +SRC_URI[sha256sum] = "450c87ba048641eb05f9717f5567aca57f063c266149ae663b58a34e5852deaf" inherit autotools update-rc.d systemd -- 2.7.4 ^ permalink raw reply related [flat|nested] 18+ messages in thread
* [PATCH 3/8] libdmx: upgrade 1.1.3 -> 1.1.4 2018-05-19 2:13 [PATCH 1/8] openssh: upgrade 7.6p1 -> 7.7p1 Armin Kuster 2018-05-19 2:13 ` [PATCH 2/8] kexec-tools: upgrade 2.0.16 -> 2.0.17 Armin Kuster @ 2018-05-19 2:13 ` Armin Kuster 2018-05-19 2:13 ` [PATCH 4/8] xf86-input-libinput: upgrade 0.26.0 -> 0.27.1 Armin Kuster ` (4 subsequent siblings) 6 siblings, 0 replies; 18+ messages in thread From: Armin Kuster @ 2018-05-19 2:13 UTC (permalink / raw) To: akuster, openembedded-core From: Armin Kuster <akuster808@gmail.com> Signed-off-by: Armin Kuster <akuster808@gmail.com> --- meta/recipes-graphics/xorg-lib/{libdmx_1.1.3.bb => libdmx_1.1.4.bb} | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) rename meta/recipes-graphics/xorg-lib/{libdmx_1.1.3.bb => libdmx_1.1.4.bb} (79%) diff --git a/meta/recipes-graphics/xorg-lib/libdmx_1.1.3.bb b/meta/recipes-graphics/xorg-lib/libdmx_1.1.4.bb similarity index 79% rename from meta/recipes-graphics/xorg-lib/libdmx_1.1.3.bb rename to meta/recipes-graphics/xorg-lib/libdmx_1.1.4.bb index c74b706..66172cb 100644 --- a/meta/recipes-graphics/xorg-lib/libdmx_1.1.3.bb +++ b/meta/recipes-graphics/xorg-lib/libdmx_1.1.4.bb @@ -15,6 +15,6 @@ DEPENDS += "libxext xorgproto" PE = "1" -SRC_URI[md5sum] = "ba983eba5a9f05d152a0725b8e863151" -SRC_URI[sha256sum] = "c97da36d2e56a2d7b6e4f896241785acc95e97eb9557465fd66ba2a155a7b201" +SRC_URI[md5sum] = "d2f1f0ec68ac3932dd7f1d9aa0a7a11c" +SRC_URI[sha256sum] = "253f90005d134fa7a209fbcbc5a3024335367c930adf0f3203e754cf32747243" -- 2.7.4 ^ permalink raw reply related [flat|nested] 18+ messages in thread
* [PATCH 4/8] xf86-input-libinput: upgrade 0.26.0 -> 0.27.1 2018-05-19 2:13 [PATCH 1/8] openssh: upgrade 7.6p1 -> 7.7p1 Armin Kuster 2018-05-19 2:13 ` [PATCH 2/8] kexec-tools: upgrade 2.0.16 -> 2.0.17 Armin Kuster 2018-05-19 2:13 ` [PATCH 3/8] libdmx: upgrade 1.1.3 -> 1.1.4 Armin Kuster @ 2018-05-19 2:13 ` Armin Kuster 2018-05-19 2:13 ` [PATCH 5/8] nss: update to 3.36.1 Armin Kuster ` (3 subsequent siblings) 6 siblings, 0 replies; 18+ messages in thread From: Armin Kuster @ 2018-05-19 2:13 UTC (permalink / raw) To: akuster, openembedded-core From: Armin Kuster <akuster808@gmail.com> Signed-off-by: Armin Kuster <akuster808@gmail.com> --- .../{xf86-input-libinput_0.26.0.bb => xf86-input-libinput_0.27.1.bb} | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) rename meta/recipes-graphics/xorg-driver/{xf86-input-libinput_0.26.0.bb => xf86-input-libinput_0.27.1.bb} (63%) diff --git a/meta/recipes-graphics/xorg-driver/xf86-input-libinput_0.26.0.bb b/meta/recipes-graphics/xorg-driver/xf86-input-libinput_0.27.1.bb similarity index 63% rename from meta/recipes-graphics/xorg-driver/xf86-input-libinput_0.26.0.bb rename to meta/recipes-graphics/xorg-driver/xf86-input-libinput_0.27.1.bb index 54c33d7..d31a911 100644 --- a/meta/recipes-graphics/xorg-driver/xf86-input-libinput_0.26.0.bb +++ b/meta/recipes-graphics/xorg-driver/xf86-input-libinput_0.27.1.bb @@ -5,7 +5,7 @@ LIC_FILES_CHKSUM = "file://COPYING;md5=5e6b20ea2ef94a998145f0ea3f788ee0" DEPENDS += "libinput" -SRC_URI[md5sum] = "da47ef62eab1d0e922a8fa929ff81758" -SRC_URI[sha256sum] = "abca558fc2226f295691f1cf3412d4c0edeaa439f677ca25b5c9fab310d2387b" +SRC_URI[md5sum] = "bdad198a7a9f2ce2c1f90d5e6760462b" +SRC_URI[sha256sum] = "d4ad8dc5ad6f962a3f15f61ba9e9f8e37fa0b57eee9f484e2bd721d60ca72ee6" FILES_${PN} += "${datadir}/X11/xorg.conf.d" -- 2.7.4 ^ permalink raw reply related [flat|nested] 18+ messages in thread
* [PATCH 5/8] nss: update to 3.36.1 2018-05-19 2:13 [PATCH 1/8] openssh: upgrade 7.6p1 -> 7.7p1 Armin Kuster ` (2 preceding siblings ...) 2018-05-19 2:13 ` [PATCH 4/8] xf86-input-libinput: upgrade 0.26.0 -> 0.27.1 Armin Kuster @ 2018-05-19 2:13 ` Armin Kuster 2018-05-19 2:13 ` [PATCH 6/8] xserver-xorg: upgrade 1.19.6 -> 1.20.0 Armin Kuster ` (2 subsequent siblings) 6 siblings, 0 replies; 18+ messages in thread From: Armin Kuster @ 2018-05-19 2:13 UTC (permalink / raw) To: akuster, openembedded-core From: Armin Kuster <akuster808@gmail.com> removed patches included in update: 0001-Bug-1437734-Use-snprintf-in-sign.c-r-ttaubert.patch nss-build-hacl-poly1305-aarch64.patch Signed-off-by: Armin Kuster <akuster808@gmail.com> --- ...1437734-Use-snprintf-in-sign.c-r-ttaubert.patch | 119 --------------------- .../nss/nss/nss-build-hacl-poly1305-aarch64.patch | 30 ------ .../nss/{nss_3.35.bb => nss_3.36.1.bb} | 6 +- 3 files changed, 2 insertions(+), 153 deletions(-) delete mode 100644 meta/recipes-support/nss/nss/0001-Bug-1437734-Use-snprintf-in-sign.c-r-ttaubert.patch delete mode 100644 meta/recipes-support/nss/nss/nss-build-hacl-poly1305-aarch64.patch rename meta/recipes-support/nss/{nss_3.35.bb => nss_3.36.1.bb} (96%) diff --git a/meta/recipes-support/nss/nss/0001-Bug-1437734-Use-snprintf-in-sign.c-r-ttaubert.patch b/meta/recipes-support/nss/nss/0001-Bug-1437734-Use-snprintf-in-sign.c-r-ttaubert.patch deleted file mode 100644 index bc10f33..0000000 --- a/meta/recipes-support/nss/nss/0001-Bug-1437734-Use-snprintf-in-sign.c-r-ttaubert.patch +++ /dev/null @@ -1,119 +0,0 @@ -From 6f7d7be9997ba6727a5ad7c3800df9051160dc12 Mon Sep 17 00:00:00 2001 -From: Martin Thomson <martin.thomson@gmail.com> -Date: Tue, 13 Feb 2018 12:30:58 +1100 -Subject: [PATCH] Bug 1437734 - Use snprintf in sign.c, r=ttaubert - ---HG-- -extra : rebase_source : 97921ece71ff86b18d32b891591608290eed4d83 ---- -Signed-off-by: Khem Raj <raj.khem@gmail.com> -Upstream-Status: Backport [https://github.com/nss-dev/nss/commit/0a9078b3cde97add7c825c9d13467a8401ad0c88#diff-b42512151dc137537091f823f7701804.patch] - - nss/cmd/signtool/sign.c | 58 ++++++++++++++++++++++++++++++++++++++++--------- - 1 file changed, 48 insertions(+), 10 deletions(-) - -diff --git a/nss/cmd/signtool/sign.c b/nss/cmd/signtool/sign.c -index 6e776069a..6f8e43946 100644 ---- a/nss/cmd/signtool/sign.c -+++ b/nss/cmd/signtool/sign.c -@@ -43,6 +43,7 @@ SignArchive(char *tree, char *keyName, char *zip_file, int javascript, - int status; - char tempfn[FNSIZE], fullfn[FNSIZE]; - int keyType = rsaKey; -+ int count; - - metafile = meta_file; - optimize = _optimize; -@@ -81,9 +82,18 @@ SignArchive(char *tree, char *keyName, char *zip_file, int javascript, - } - - /* rsa/dsa to zip */ -- sprintf(tempfn, "META-INF/%s.%s", base, (keyType == dsaKey ? "dsa" -- : "rsa")); -- sprintf(fullfn, "%s/%s", tree, tempfn); -+ count = snprintf(tempfn, sizeof(tempfn), "META-INF/%s.%s", base, (keyType == dsaKey ? "dsa" : "rsa")); -+ if (count >= sizeof(tempfn)) { -+ PR_fprintf(errorFD, "unable to write key metadata\n"); -+ errorCount++; -+ exit(ERRX); -+ } -+ count = snprintf(fullfn, sizeof(fullfn), "%s/%s", tree, tempfn); -+ if (count >= sizeof(fullfn)) { -+ PR_fprintf(errorFD, "unable to write key metadata\n"); -+ errorCount++; -+ exit(ERRX); -+ } - JzipAdd(fullfn, tempfn, zipfile, compression_level); - - /* Loop through all files & subdirectories, add to archive */ -@@ -93,20 +103,44 @@ SignArchive(char *tree, char *keyName, char *zip_file, int javascript, - } - /* mf to zip */ - strcpy(tempfn, "META-INF/manifest.mf"); -- sprintf(fullfn, "%s/%s", tree, tempfn); -+ count = snprintf(fullfn, sizeof(fullfn), "%s/%s", tree, tempfn); -+ if (count >= sizeof(fullfn)) { -+ PR_fprintf(errorFD, "unable to write manifest\n"); -+ errorCount++; -+ exit(ERRX); -+ } - JzipAdd(fullfn, tempfn, zipfile, compression_level); - - /* sf to zip */ -- sprintf(tempfn, "META-INF/%s.sf", base); -- sprintf(fullfn, "%s/%s", tree, tempfn); -+ count = snprintf(tempfn, sizeof(tempfn), "META-INF/%s.sf", base); -+ if (count >= sizeof(tempfn)) { -+ PR_fprintf(errorFD, "unable to write sf metadata\n"); -+ errorCount++; -+ exit(ERRX); -+ } -+ count = snprintf(fullfn, sizeof(fullfn), "%s/%s", tree, tempfn); -+ if (count >= sizeof(fullfn)) { -+ PR_fprintf(errorFD, "unable to write sf metadata\n"); -+ errorCount++; -+ exit(ERRX); -+ } - JzipAdd(fullfn, tempfn, zipfile, compression_level); - - /* Add the rsa/dsa file to the zip archive normally */ - if (!xpi_arc) { - /* rsa/dsa to zip */ -- sprintf(tempfn, "META-INF/%s.%s", base, (keyType == dsaKey ? "dsa" -- : "rsa")); -- sprintf(fullfn, "%s/%s", tree, tempfn); -+ count = snprintf(tempfn, sizeof(tempfn), "META-INF/%s.%s", base, (keyType == dsaKey ? "dsa" : "rsa")); -+ if (count >= sizeof(tempfn)) { -+ PR_fprintf(errorFD, "unable to write key metadata\n"); -+ errorCount++; -+ exit(ERRX); -+ } -+ count = snprintf(fullfn, sizeof(fullfn), "%s/%s", tree, tempfn); -+ if (count >= sizeof(fullfn)) { -+ PR_fprintf(errorFD, "unable to write key metadata\n"); -+ errorCount++; -+ exit(ERRX); -+ } - JzipAdd(fullfn, tempfn, zipfile, compression_level); - } - -@@ -408,6 +442,7 @@ static int - manifesto_xpi_fn(char *relpath, char *basedir, char *reldir, char *filename, void *arg) - { - char fullname[FNSIZE]; -+ int count; - - if (verbosity >= 0) { - PR_fprintf(outputFD, "--> %s\n", relpath); -@@ -421,7 +456,10 @@ manifesto_xpi_fn(char *relpath, char *basedir, char *reldir, char *filename, voi - if (!PL_HashTableLookup(extensions, ext)) - return 0; - } -- sprintf(fullname, "%s/%s", basedir, relpath); -+ count = snprintf(fullname, sizeof(fullname), "%s/%s", basedir, relpath); -+ if (count >= sizeof(fullname)) { -+ return 1; -+ } - JzipAdd(fullname, relpath, zipfile, compression_level); - - return 0; diff --git a/meta/recipes-support/nss/nss/nss-build-hacl-poly1305-aarch64.patch b/meta/recipes-support/nss/nss/nss-build-hacl-poly1305-aarch64.patch deleted file mode 100644 index 8276f89..0000000 --- a/meta/recipes-support/nss/nss/nss-build-hacl-poly1305-aarch64.patch +++ /dev/null @@ -1,30 +0,0 @@ -# HG changeset patch -# User Daiki Ueno <dueno@redhat.com> -# Date 1516710574 -3600 -# Tue Jan 23 13:29:34 2018 +0100 -# Node ID 27f27ce21c2c6ff5a47fa9e17c438b000366c9c9 -# Parent be1dca5ac80541d3b81a8da9d42854d8b1cceefb -Build Hacl_Poly1305_64.o on aarch64 even with make - -Upstream-Status: Backport -https://bug1432455.bmoattachments.org/attachment.cgi?id=8944691 -Signed-off-by: Armin Kuster <akuster@mvista.com> - -Index: nss-3.35/nss/lib/freebl/Makefile -=================================================================== ---- nss-3.35.orig/nss/lib/freebl/Makefile -+++ nss-3.35/nss/lib/freebl/Makefile -@@ -533,7 +533,12 @@ ifndef NSS_DISABLE_CHACHAPOLY - EXTRA_SRCS += chacha20_vec.c - endif - else -- EXTRA_SRCS += poly1305.c -+ ifeq ($(CPU_ARCH),aarch64) -+ EXTRA_SRCS += Hacl_Poly1305_64.c -+ else -+ EXTRA_SRCS += poly1305.c -+ endif -+ - EXTRA_SRCS += chacha20.c - VERIFIED_SRCS += Hacl_Chacha20.c - endif # x86_64 diff --git a/meta/recipes-support/nss/nss_3.35.bb b/meta/recipes-support/nss/nss_3.36.1.bb similarity index 96% rename from meta/recipes-support/nss/nss_3.35.bb rename to meta/recipes-support/nss/nss_3.36.1.bb index 84f1916..f855538 100644 --- a/meta/recipes-support/nss/nss_3.35.bb +++ b/meta/recipes-support/nss/nss_3.36.1.bb @@ -26,12 +26,10 @@ SRC_URI = "http://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/${VERSIO file://disable-Wvarargs-with-clang.patch \ file://pqg.c-ULL_addend.patch \ file://Fix-compilation-for-X32.patch \ - file://nss-build-hacl-poly1305-aarch64.patch \ - file://0001-Bug-1437734-Use-snprintf-in-sign.c-r-ttaubert.patch \ " -SRC_URI[md5sum] = "9467ec9e65c5aeb3254a50250490f5f7" -SRC_URI[sha256sum] = "f4127de09bede39f5fd0f789d33c3504c5d261e69ea03022d46b319b3e32f6fa" +SRC_URI[md5sum] = "814d8fe3ec89006cf62078e2a56cf2f9" +SRC_URI[sha256sum] = "6025441d528ff6a7f1a4b673b6ee7d3540731ada3f78d5acd5c3b3736b222bff" UPSTREAM_CHECK_URI = "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_Releases" UPSTREAM_CHECK_REGEX = "NSS_(?P<pver>.+)_release_notes" -- 2.7.4 ^ permalink raw reply related [flat|nested] 18+ messages in thread
* [PATCH 6/8] xserver-xorg: upgrade 1.19.6 -> 1.20.0 2018-05-19 2:13 [PATCH 1/8] openssh: upgrade 7.6p1 -> 7.7p1 Armin Kuster ` (3 preceding siblings ...) 2018-05-19 2:13 ` [PATCH 5/8] nss: update to 3.36.1 Armin Kuster @ 2018-05-19 2:13 ` Armin Kuster 2018-05-23 11:01 ` Burton, Ross 2018-05-19 2:13 ` [PATCH 7/8] busybox: update to 1.28.3 Armin Kuster 2018-05-19 2:13 ` [PATCH 8/8] openssh: fix some ptest exec issues Armin Kuster 6 siblings, 1 reply; 18+ messages in thread From: Armin Kuster @ 2018-05-19 2:13 UTC (permalink / raw) To: akuster, openembedded-core From: Armin Kuster <akuster808@gmail.com> Signed-off-by: Armin Kuster <akuster808@gmail.com> --- ...1-configure.ac-Fix-check-for-CLOCK_MONOTONIC.patch | 19 +++++++++---------- ...{xserver-xorg_1.19.6.bb => xserver-xorg_1.20.0.bb} | 4 ++-- 2 files changed, 11 insertions(+), 12 deletions(-) rename meta/recipes-graphics/xorg-xserver/{xserver-xorg_1.19.6.bb => xserver-xorg_1.20.0.bb} (89%) diff --git a/meta/recipes-graphics/xorg-xserver/xserver-xorg/0001-configure.ac-Fix-check-for-CLOCK_MONOTONIC.patch b/meta/recipes-graphics/xorg-xserver/xserver-xorg/0001-configure.ac-Fix-check-for-CLOCK_MONOTONIC.patch index 16ec3ed..020a1cf 100644 --- a/meta/recipes-graphics/xorg-xserver/xserver-xorg/0001-configure.ac-Fix-check-for-CLOCK_MONOTONIC.patch +++ b/meta/recipes-graphics/xorg-xserver/xserver-xorg/0001-configure.ac-Fix-check-for-CLOCK_MONOTONIC.patch @@ -1,12 +1,13 @@ -Discover monotonic clock using compile-time check +From 8a91316c4a38f20e7866289f3d779a037d27a129 Mon Sep 17 00:00:00 2001 +From: Jussi Kukkonen <jussi.kukkonen@intel.com> +Date: Mon, 12 Dec 2016 12:11:39 +0200 +Subject: [PATCH] Discover monotonic clock using compile-time check monotonic clock check does not work when cross-compiling. Upstream-Status: Denied [Does not work on OpenBSD] Signed-off-by: Jussi Kukkonen <jussi.kukkonen@intel.com> - - Original patch follows: When xorg-xserver is being cross-compiled, there is currently no way @@ -21,15 +22,16 @@ monotonic clock is available. This check can run just fine when we are cross-compiling. Signed-off-by: David James <davidjames at google.com> + --- configure.ac | 17 +++++++---------- 1 file changed, 7 insertions(+), 10 deletions(-) diff --git a/configure.ac b/configure.ac -index f7ab48c..26e85cd 100644 +index 2b21667..786e002 100644 --- a/configure.ac +++ b/configure.ac -@@ -1048,19 +1048,16 @@ if ! test "x$have_clock_gettime" = xno; then +@@ -984,19 +984,16 @@ if ! test "x$have_clock_gettime" = xno; then CPPFLAGS="$CPPFLAGS -D_POSIX_C_SOURCE=200112L" fi @@ -54,8 +56,5 @@ index f7ab48c..26e85cd 100644 - [MONOTONIC_CLOCK="cross compiling"]) +]])],[MONOTONIC_CLOCK=yes], [MONOTONIC_CLOCK=no]) - LIBS="$LIBS_SAVE" - CPPFLAGS="$CPPFLAGS_SAVE" --- -2.1.4 - + if test "$MONOTONIC_CLOCK" = "cross compiling"; then + AC_CHECK_DECL([CLOCK_MONOTONIC],[MONOTONIC_CLOCK="guessing yes"],[MONOTONIC_CLOCK=no],[#include <time.h>]) diff --git a/meta/recipes-graphics/xorg-xserver/xserver-xorg_1.19.6.bb b/meta/recipes-graphics/xorg-xserver/xserver-xorg_1.20.0.bb similarity index 89% rename from meta/recipes-graphics/xorg-xserver/xserver-xorg_1.19.6.bb rename to meta/recipes-graphics/xorg-xserver/xserver-xorg_1.20.0.bb index c680cf9..620eb7b 100644 --- a/meta/recipes-graphics/xorg-xserver/xserver-xorg_1.19.6.bb +++ b/meta/recipes-graphics/xorg-xserver/xserver-xorg_1.20.0.bb @@ -6,8 +6,8 @@ SRC_URI += "file://musl-arm-inb-outb.patch \ file://0003-Remove-check-for-useSIGIO-option.patch \ file://0001-xf86pciBus.c-use-Intel-ddx-only-for-pre-gen4-hardwar.patch \ " -SRC_URI[md5sum] = "3e47777ff034a331aed2322b078694a8" -SRC_URI[sha256sum] = "a732502f1db000cf36a376cd0c010ffdbf32ecdd7f1fa08ba7f5bdf9601cc197" +SRC_URI[md5sum] = "c1ca1ea0a905ea788da03c77cc38b06e" +SRC_URI[sha256sum] = "9d967d185f05709274ee0c4f861a4672463986e550ca05725ce27974f550d3e6" # These extensions are now integrated into the server, so declare the migration # path for in-place upgrades. -- 2.7.4 ^ permalink raw reply related [flat|nested] 18+ messages in thread
* Re: [PATCH 6/8] xserver-xorg: upgrade 1.19.6 -> 1.20.0 2018-05-19 2:13 ` [PATCH 6/8] xserver-xorg: upgrade 1.19.6 -> 1.20.0 Armin Kuster @ 2018-05-23 11:01 ` Burton, Ross 2018-05-28 14:25 ` akuster808 0 siblings, 1 reply; 18+ messages in thread From: Burton, Ross @ 2018-05-23 11:01 UTC (permalink / raw) To: Armin Kuster; +Cc: Armin Kuster, OE-core This is breaking a number of other bits of X: - xf86-video-intel (was DRI1 removed or disabled in 1.20?) - xf86-input-mouse - xf86-video-omapfb Ross On 19 May 2018 at 03:13, Armin Kuster <akuster808@gmail.com> wrote: > From: Armin Kuster <akuster808@gmail.com> > > Signed-off-by: Armin Kuster <akuster808@gmail.com> > --- > ...1-configure.ac-Fix-check-for-CLOCK_MONOTONIC.patch | 19 +++++++++---------- > ...{xserver-xorg_1.19.6.bb => xserver-xorg_1.20.0.bb} | 4 ++-- > 2 files changed, 11 insertions(+), 12 deletions(-) > rename meta/recipes-graphics/xorg-xserver/{xserver-xorg_1.19.6.bb => xserver-xorg_1.20.0.bb} (89%) > > diff --git a/meta/recipes-graphics/xorg-xserver/xserver-xorg/0001-configure.ac-Fix-check-for-CLOCK_MONOTONIC.patch b/meta/recipes-graphics/xorg-xserver/xserver-xorg/0001-configure.ac-Fix-check-for-CLOCK_MONOTONIC.patch > index 16ec3ed..020a1cf 100644 > --- a/meta/recipes-graphics/xorg-xserver/xserver-xorg/0001-configure.ac-Fix-check-for-CLOCK_MONOTONIC.patch > +++ b/meta/recipes-graphics/xorg-xserver/xserver-xorg/0001-configure.ac-Fix-check-for-CLOCK_MONOTONIC.patch > @@ -1,12 +1,13 @@ > -Discover monotonic clock using compile-time check > +From 8a91316c4a38f20e7866289f3d779a037d27a129 Mon Sep 17 00:00:00 2001 > +From: Jussi Kukkonen <jussi.kukkonen@intel.com> > +Date: Mon, 12 Dec 2016 12:11:39 +0200 > +Subject: [PATCH] Discover monotonic clock using compile-time check > > monotonic clock check does not work when cross-compiling. > > Upstream-Status: Denied [Does not work on OpenBSD] > Signed-off-by: Jussi Kukkonen <jussi.kukkonen@intel.com> > > - > - > Original patch follows: > > When xorg-xserver is being cross-compiled, there is currently no way > @@ -21,15 +22,16 @@ monotonic clock is available. This check can run just fine when we are > cross-compiling. > > Signed-off-by: David James <davidjames at google.com> > + > --- > configure.ac | 17 +++++++---------- > 1 file changed, 7 insertions(+), 10 deletions(-) > > diff --git a/configure.ac b/configure.ac > -index f7ab48c..26e85cd 100644 > +index 2b21667..786e002 100644 > --- a/configure.ac > +++ b/configure.ac > -@@ -1048,19 +1048,16 @@ if ! test "x$have_clock_gettime" = xno; then > +@@ -984,19 +984,16 @@ if ! test "x$have_clock_gettime" = xno; then > CPPFLAGS="$CPPFLAGS -D_POSIX_C_SOURCE=200112L" > fi > > @@ -54,8 +56,5 @@ index f7ab48c..26e85cd 100644 > - [MONOTONIC_CLOCK="cross compiling"]) > +]])],[MONOTONIC_CLOCK=yes], [MONOTONIC_CLOCK=no]) > > - LIBS="$LIBS_SAVE" > - CPPFLAGS="$CPPFLAGS_SAVE" > --- > -2.1.4 > - > + if test "$MONOTONIC_CLOCK" = "cross compiling"; then > + AC_CHECK_DECL([CLOCK_MONOTONIC],[MONOTONIC_CLOCK="guessing yes"],[MONOTONIC_CLOCK=no],[#include <time.h>]) > diff --git a/meta/recipes-graphics/xorg-xserver/xserver-xorg_1.19.6.bb b/meta/recipes-graphics/xorg-xserver/xserver-xorg_1.20.0.bb > similarity index 89% > rename from meta/recipes-graphics/xorg-xserver/xserver-xorg_1.19.6.bb > rename to meta/recipes-graphics/xorg-xserver/xserver-xorg_1.20.0.bb > index c680cf9..620eb7b 100644 > --- a/meta/recipes-graphics/xorg-xserver/xserver-xorg_1.19.6.bb > +++ b/meta/recipes-graphics/xorg-xserver/xserver-xorg_1.20.0.bb > @@ -6,8 +6,8 @@ SRC_URI += "file://musl-arm-inb-outb.patch \ > file://0003-Remove-check-for-useSIGIO-option.patch \ > file://0001-xf86pciBus.c-use-Intel-ddx-only-for-pre-gen4-hardwar.patch \ > " > -SRC_URI[md5sum] = "3e47777ff034a331aed2322b078694a8" > -SRC_URI[sha256sum] = "a732502f1db000cf36a376cd0c010ffdbf32ecdd7f1fa08ba7f5bdf9601cc197" > +SRC_URI[md5sum] = "c1ca1ea0a905ea788da03c77cc38b06e" > +SRC_URI[sha256sum] = "9d967d185f05709274ee0c4f861a4672463986e550ca05725ce27974f550d3e6" > > # These extensions are now integrated into the server, so declare the migration > # path for in-place upgrades. > -- > 2.7.4 > > -- > _______________________________________________ > Openembedded-core mailing list > Openembedded-core@lists.openembedded.org > http://lists.openembedded.org/mailman/listinfo/openembedded-core ^ permalink raw reply [flat|nested] 18+ messages in thread
* Re: [PATCH 6/8] xserver-xorg: upgrade 1.19.6 -> 1.20.0 2018-05-23 11:01 ` Burton, Ross @ 2018-05-28 14:25 ` akuster808 2018-06-01 15:15 ` akuster808 0 siblings, 1 reply; 18+ messages in thread From: akuster808 @ 2018-05-28 14:25 UTC (permalink / raw) To: Burton, Ross; +Cc: Armin Kuster, OE-core On 05/23/2018 04:01 AM, Burton, Ross wrote: > This is breaking a number of other bits of X: > > - xf86-video-intel (was DRI1 removed or disabled in 1.20?) > - xf86-input-mouse > - xf86-video-omapfb hmm, will double check - armin > Ross > > On 19 May 2018 at 03:13, Armin Kuster <akuster808@gmail.com> wrote: >> From: Armin Kuster <akuster808@gmail.com> >> >> Signed-off-by: Armin Kuster <akuster808@gmail.com> >> --- >> ...1-configure.ac-Fix-check-for-CLOCK_MONOTONIC.patch | 19 +++++++++---------- >> ...{xserver-xorg_1.19.6.bb => xserver-xorg_1.20.0.bb} | 4 ++-- >> 2 files changed, 11 insertions(+), 12 deletions(-) >> rename meta/recipes-graphics/xorg-xserver/{xserver-xorg_1.19.6.bb => xserver-xorg_1.20.0.bb} (89%) >> >> diff --git a/meta/recipes-graphics/xorg-xserver/xserver-xorg/0001-configure.ac-Fix-check-for-CLOCK_MONOTONIC.patch b/meta/recipes-graphics/xorg-xserver/xserver-xorg/0001-configure.ac-Fix-check-for-CLOCK_MONOTONIC.patch >> index 16ec3ed..020a1cf 100644 >> --- a/meta/recipes-graphics/xorg-xserver/xserver-xorg/0001-configure.ac-Fix-check-for-CLOCK_MONOTONIC.patch >> +++ b/meta/recipes-graphics/xorg-xserver/xserver-xorg/0001-configure.ac-Fix-check-for-CLOCK_MONOTONIC.patch >> @@ -1,12 +1,13 @@ >> -Discover monotonic clock using compile-time check >> +From 8a91316c4a38f20e7866289f3d779a037d27a129 Mon Sep 17 00:00:00 2001 >> +From: Jussi Kukkonen <jussi.kukkonen@intel.com> >> +Date: Mon, 12 Dec 2016 12:11:39 +0200 >> +Subject: [PATCH] Discover monotonic clock using compile-time check >> >> monotonic clock check does not work when cross-compiling. >> >> Upstream-Status: Denied [Does not work on OpenBSD] >> Signed-off-by: Jussi Kukkonen <jussi.kukkonen@intel.com> >> >> - >> - >> Original patch follows: >> >> When xorg-xserver is being cross-compiled, there is currently no way >> @@ -21,15 +22,16 @@ monotonic clock is available. This check can run just fine when we are >> cross-compiling. >> >> Signed-off-by: David James <davidjames at google.com> >> + >> --- >> configure.ac | 17 +++++++---------- >> 1 file changed, 7 insertions(+), 10 deletions(-) >> >> diff --git a/configure.ac b/configure.ac >> -index f7ab48c..26e85cd 100644 >> +index 2b21667..786e002 100644 >> --- a/configure.ac >> +++ b/configure.ac >> -@@ -1048,19 +1048,16 @@ if ! test "x$have_clock_gettime" = xno; then >> +@@ -984,19 +984,16 @@ if ! test "x$have_clock_gettime" = xno; then >> CPPFLAGS="$CPPFLAGS -D_POSIX_C_SOURCE=200112L" >> fi >> >> @@ -54,8 +56,5 @@ index f7ab48c..26e85cd 100644 >> - [MONOTONIC_CLOCK="cross compiling"]) >> +]])],[MONOTONIC_CLOCK=yes], [MONOTONIC_CLOCK=no]) >> >> - LIBS="$LIBS_SAVE" >> - CPPFLAGS="$CPPFLAGS_SAVE" >> --- >> -2.1.4 >> - >> + if test "$MONOTONIC_CLOCK" = "cross compiling"; then >> + AC_CHECK_DECL([CLOCK_MONOTONIC],[MONOTONIC_CLOCK="guessing yes"],[MONOTONIC_CLOCK=no],[#include <time.h>]) >> diff --git a/meta/recipes-graphics/xorg-xserver/xserver-xorg_1.19.6.bb b/meta/recipes-graphics/xorg-xserver/xserver-xorg_1.20.0.bb >> similarity index 89% >> rename from meta/recipes-graphics/xorg-xserver/xserver-xorg_1.19.6.bb >> rename to meta/recipes-graphics/xorg-xserver/xserver-xorg_1.20.0.bb >> index c680cf9..620eb7b 100644 >> --- a/meta/recipes-graphics/xorg-xserver/xserver-xorg_1.19.6.bb >> +++ b/meta/recipes-graphics/xorg-xserver/xserver-xorg_1.20.0.bb >> @@ -6,8 +6,8 @@ SRC_URI += "file://musl-arm-inb-outb.patch \ >> file://0003-Remove-check-for-useSIGIO-option.patch \ >> file://0001-xf86pciBus.c-use-Intel-ddx-only-for-pre-gen4-hardwar.patch \ >> " >> -SRC_URI[md5sum] = "3e47777ff034a331aed2322b078694a8" >> -SRC_URI[sha256sum] = "a732502f1db000cf36a376cd0c010ffdbf32ecdd7f1fa08ba7f5bdf9601cc197" >> +SRC_URI[md5sum] = "c1ca1ea0a905ea788da03c77cc38b06e" >> +SRC_URI[sha256sum] = "9d967d185f05709274ee0c4f861a4672463986e550ca05725ce27974f550d3e6" >> >> # These extensions are now integrated into the server, so declare the migration >> # path for in-place upgrades. >> -- >> 2.7.4 >> >> -- >> _______________________________________________ >> Openembedded-core mailing list >> Openembedded-core@lists.openembedded.org >> http://lists.openembedded.org/mailman/listinfo/openembedded-core ^ permalink raw reply [flat|nested] 18+ messages in thread
* Re: [PATCH 6/8] xserver-xorg: upgrade 1.19.6 -> 1.20.0 2018-05-28 14:25 ` akuster808 @ 2018-06-01 15:15 ` akuster808 2018-06-13 10:17 ` Burton, Ross 2018-06-13 16:34 ` Burton, Ross 0 siblings, 2 replies; 18+ messages in thread From: akuster808 @ 2018-06-01 15:15 UTC (permalink / raw) To: Burton, Ross; +Cc: OE-core On 05/28/2018 07:25 AM, akuster808 wrote: > > On 05/23/2018 04:01 AM, Burton, Ross wrote: >> This is breaking a number of other bits of X: >> >> - xf86-video-intel (was DRI1 removed or disabled in 1.20?) DRI 1 is still there. >> - xf86-input-mouse sent fixed for xf86-inout-mount >> - xf86-video-omapfb > hmm, will double check > > - armin >> Ross >> >> On 19 May 2018 at 03:13, Armin Kuster <akuster808@gmail.com> wrote: >>> From: Armin Kuster <akuster808@gmail.com> >>> >>> Signed-off-by: Armin Kuster <akuster808@gmail.com> >>> --- >>> ...1-configure.ac-Fix-check-for-CLOCK_MONOTONIC.patch | 19 +++++++++---------- >>> ...{xserver-xorg_1.19.6.bb => xserver-xorg_1.20.0.bb} | 4 ++-- >>> 2 files changed, 11 insertions(+), 12 deletions(-) >>> rename meta/recipes-graphics/xorg-xserver/{xserver-xorg_1.19.6.bb => xserver-xorg_1.20.0.bb} (89%) >>> >>> diff --git a/meta/recipes-graphics/xorg-xserver/xserver-xorg/0001-configure.ac-Fix-check-for-CLOCK_MONOTONIC.patch b/meta/recipes-graphics/xorg-xserver/xserver-xorg/0001-configure.ac-Fix-check-for-CLOCK_MONOTONIC.patch >>> index 16ec3ed..020a1cf 100644 >>> --- a/meta/recipes-graphics/xorg-xserver/xserver-xorg/0001-configure.ac-Fix-check-for-CLOCK_MONOTONIC.patch >>> +++ b/meta/recipes-graphics/xorg-xserver/xserver-xorg/0001-configure.ac-Fix-check-for-CLOCK_MONOTONIC.patch >>> @@ -1,12 +1,13 @@ >>> -Discover monotonic clock using compile-time check >>> +From 8a91316c4a38f20e7866289f3d779a037d27a129 Mon Sep 17 00:00:00 2001 >>> +From: Jussi Kukkonen <jussi.kukkonen@intel.com> >>> +Date: Mon, 12 Dec 2016 12:11:39 +0200 >>> +Subject: [PATCH] Discover monotonic clock using compile-time check >>> >>> monotonic clock check does not work when cross-compiling. >>> >>> Upstream-Status: Denied [Does not work on OpenBSD] >>> Signed-off-by: Jussi Kukkonen <jussi.kukkonen@intel.com> >>> >>> - >>> - >>> Original patch follows: >>> >>> When xorg-xserver is being cross-compiled, there is currently no way >>> @@ -21,15 +22,16 @@ monotonic clock is available. This check can run just fine when we are >>> cross-compiling. >>> >>> Signed-off-by: David James <davidjames at google.com> >>> + >>> --- >>> configure.ac | 17 +++++++---------- >>> 1 file changed, 7 insertions(+), 10 deletions(-) >>> >>> diff --git a/configure.ac b/configure.ac >>> -index f7ab48c..26e85cd 100644 >>> +index 2b21667..786e002 100644 >>> --- a/configure.ac >>> +++ b/configure.ac >>> -@@ -1048,19 +1048,16 @@ if ! test "x$have_clock_gettime" = xno; then >>> +@@ -984,19 +984,16 @@ if ! test "x$have_clock_gettime" = xno; then >>> CPPFLAGS="$CPPFLAGS -D_POSIX_C_SOURCE=200112L" >>> fi >>> >>> @@ -54,8 +56,5 @@ index f7ab48c..26e85cd 100644 >>> - [MONOTONIC_CLOCK="cross compiling"]) >>> +]])],[MONOTONIC_CLOCK=yes], [MONOTONIC_CLOCK=no]) >>> >>> - LIBS="$LIBS_SAVE" >>> - CPPFLAGS="$CPPFLAGS_SAVE" >>> --- >>> -2.1.4 >>> - >>> + if test "$MONOTONIC_CLOCK" = "cross compiling"; then >>> + AC_CHECK_DECL([CLOCK_MONOTONIC],[MONOTONIC_CLOCK="guessing yes"],[MONOTONIC_CLOCK=no],[#include <time.h>]) >>> diff --git a/meta/recipes-graphics/xorg-xserver/xserver-xorg_1.19.6.bb b/meta/recipes-graphics/xorg-xserver/xserver-xorg_1.20.0.bb >>> similarity index 89% >>> rename from meta/recipes-graphics/xorg-xserver/xserver-xorg_1.19.6.bb >>> rename to meta/recipes-graphics/xorg-xserver/xserver-xorg_1.20.0.bb >>> index c680cf9..620eb7b 100644 >>> --- a/meta/recipes-graphics/xorg-xserver/xserver-xorg_1.19.6.bb >>> +++ b/meta/recipes-graphics/xorg-xserver/xserver-xorg_1.20.0.bb >>> @@ -6,8 +6,8 @@ SRC_URI += "file://musl-arm-inb-outb.patch \ >>> file://0003-Remove-check-for-useSIGIO-option.patch \ >>> file://0001-xf86pciBus.c-use-Intel-ddx-only-for-pre-gen4-hardwar.patch \ >>> " >>> -SRC_URI[md5sum] = "3e47777ff034a331aed2322b078694a8" >>> -SRC_URI[sha256sum] = "a732502f1db000cf36a376cd0c010ffdbf32ecdd7f1fa08ba7f5bdf9601cc197" >>> +SRC_URI[md5sum] = "c1ca1ea0a905ea788da03c77cc38b06e" >>> +SRC_URI[sha256sum] = "9d967d185f05709274ee0c4f861a4672463986e550ca05725ce27974f550d3e6" >>> >>> # These extensions are now integrated into the server, so declare the migration >>> # path for in-place upgrades. >>> -- >>> 2.7.4 >>> >>> -- >>> _______________________________________________ >>> Openembedded-core mailing list >>> Openembedded-core@lists.openembedded.org >>> http://lists.openembedded.org/mailman/listinfo/openembedded-core ^ permalink raw reply [flat|nested] 18+ messages in thread
* Re: [PATCH 6/8] xserver-xorg: upgrade 1.19.6 -> 1.20.0 2018-06-01 15:15 ` akuster808 @ 2018-06-13 10:17 ` Burton, Ross 2018-06-13 14:51 ` akuster808 2018-06-13 16:34 ` Burton, Ross 1 sibling, 1 reply; 18+ messages in thread From: Burton, Ross @ 2018-06-13 10:17 UTC (permalink / raw) To: akuster808; +Cc: OE-core On 1 June 2018 at 16:15, akuster808 <akuster808@gmail.com> wrote: >>> - xf86-video-intel (was DRI1 removed or disabled in 1.20?) > DRI 1 is still there. > >>> - xf86-input-mouse > sent fixed for xf86-inout-mount > >>> - xf86-video-omapfb >> hmm, will double check Tried it again last night: omapfb: http://errors.yoctoproject.org/Errors/Details/179606/ intel: http://errors.yoctoproject.org/Errors/Details/179607/ Ross ^ permalink raw reply [flat|nested] 18+ messages in thread
* Re: [PATCH 6/8] xserver-xorg: upgrade 1.19.6 -> 1.20.0 2018-06-13 10:17 ` Burton, Ross @ 2018-06-13 14:51 ` akuster808 0 siblings, 0 replies; 18+ messages in thread From: akuster808 @ 2018-06-13 14:51 UTC (permalink / raw) To: Burton, Ross; +Cc: OE-core On 06/13/2018 03:17 AM, Burton, Ross wrote: > On 1 June 2018 at 16:15, akuster808 <akuster808@gmail.com> wrote: >>>> - xf86-video-intel (was DRI1 removed or disabled in 1.20?) >> DRI 1 is still there. >> >>>> - xf86-input-mouse >> sent fixed for xf86-inout-mount >> >>>> - xf86-video-omapfb >>> hmm, will double check > Tried it again last night: > > omapfb: http://errors.yoctoproject.org/Errors/Details/179606/ > intel: http://errors.yoctoproject.org/Errors/Details/179607/ thanks. please pull the update. fixing those two very old packages may take a while. - armin > > Ross ^ permalink raw reply [flat|nested] 18+ messages in thread
* Re: [PATCH 6/8] xserver-xorg: upgrade 1.19.6 -> 1.20.0 2018-06-01 15:15 ` akuster808 2018-06-13 10:17 ` Burton, Ross @ 2018-06-13 16:34 ` Burton, Ross 2018-06-17 19:14 ` akuster808 1 sibling, 1 reply; 18+ messages in thread From: Burton, Ross @ 2018-06-13 16:34 UTC (permalink / raw) To: akuster808; +Cc: OE-core On 1 June 2018 at 16:15, akuster808 <akuster808@gmail.com> wrote: > > > On 05/28/2018 07:25 AM, akuster808 wrote: >> >> On 05/23/2018 04:01 AM, Burton, Ross wrote: >>> This is breaking a number of other bits of X: >>> >>> - xf86-video-intel (was DRI1 removed or disabled in 1.20?) > DRI 1 is still there. https://cgit.freedesktop.org/xorg/driver/xf86-video-intel/commit/?id=359477215092ac1b602ad1e2f17a28963d9224c2 claims otherwise. Trivial enough to disable in our recipe, I'll send a patch shortly. Ross ^ permalink raw reply [flat|nested] 18+ messages in thread
* Re: [PATCH 6/8] xserver-xorg: upgrade 1.19.6 -> 1.20.0 2018-06-13 16:34 ` Burton, Ross @ 2018-06-17 19:14 ` akuster808 2018-06-17 19:23 ` Burton, Ross 0 siblings, 1 reply; 18+ messages in thread From: akuster808 @ 2018-06-17 19:14 UTC (permalink / raw) To: Burton, Ross; +Cc: OE-core On 06/13/2018 09:34 AM, Burton, Ross wrote: > On 1 June 2018 at 16:15, akuster808 <akuster808@gmail.com> wrote: >> >> On 05/28/2018 07:25 AM, akuster808 wrote: >>> On 05/23/2018 04:01 AM, Burton, Ross wrote: >>>> This is breaking a number of other bits of X: >>>> >>>> - xf86-video-intel (was DRI1 removed or disabled in 1.20?) >> DRI 1 is still there. > https://cgit.freedesktop.org/xorg/driver/xf86-video-intel/commit/?id=359477215092ac1b602ad1e2f17a28963d9224c2 > claims otherwise. Trivial enough to disable in our recipe, I'll send > a patch shortly. xf86-video-intel fails without the update so this is a preexisting condition. I used the latest git hash with includes that fix and it still fails. I poke at it some more. Armin > Ross ^ permalink raw reply [flat|nested] 18+ messages in thread
* Re: [PATCH 6/8] xserver-xorg: upgrade 1.19.6 -> 1.20.0 2018-06-17 19:14 ` akuster808 @ 2018-06-17 19:23 ` Burton, Ross 0 siblings, 0 replies; 18+ messages in thread From: Burton, Ross @ 2018-06-17 19:23 UTC (permalink / raw) To: akuster808; +Cc: OE-core I've already got patches for -intel in mut (pretty sure I sent them to the list, if I didn't then I shall tomorrow). Personally I think for omap and omapfb, we just remove them. I've got patches for that too, I'll sent them aswell. Ross On 17 June 2018 at 20:14, akuster808 <akuster808@gmail.com> wrote: > > > On 06/13/2018 09:34 AM, Burton, Ross wrote: >> On 1 June 2018 at 16:15, akuster808 <akuster808@gmail.com> wrote: >>> >>> On 05/28/2018 07:25 AM, akuster808 wrote: >>>> On 05/23/2018 04:01 AM, Burton, Ross wrote: >>>>> This is breaking a number of other bits of X: >>>>> >>>>> - xf86-video-intel (was DRI1 removed or disabled in 1.20?) >>> DRI 1 is still there. >> https://cgit.freedesktop.org/xorg/driver/xf86-video-intel/commit/?id=359477215092ac1b602ad1e2f17a28963d9224c2 >> claims otherwise. Trivial enough to disable in our recipe, I'll send >> a patch shortly. > > xf86-video-intel fails without the update so this is a preexisting condition. I used the latest git hash with includes that fix and it still fails. > > I poke at it some more. > Armin > >> Ross > ^ permalink raw reply [flat|nested] 18+ messages in thread
* [PATCH 7/8] busybox: update to 1.28.3 2018-05-19 2:13 [PATCH 1/8] openssh: upgrade 7.6p1 -> 7.7p1 Armin Kuster ` (4 preceding siblings ...) 2018-05-19 2:13 ` [PATCH 6/8] xserver-xorg: upgrade 1.19.6 -> 1.20.0 Armin Kuster @ 2018-05-19 2:13 ` Armin Kuster 2018-05-19 2:30 ` Anuj Mittal 2018-05-19 2:13 ` [PATCH 8/8] openssh: fix some ptest exec issues Armin Kuster 6 siblings, 1 reply; 18+ messages in thread From: Armin Kuster @ 2018-05-19 2:13 UTC (permalink / raw) To: akuster, openembedded-core From: Armin Kuster <akuster808@gmail.com> removed patches included in update: busybox/CVE-2011-5325.patch busybox/CVE-2017-15873.patch busybox/busybox-CVE-2017-16544.patch refactored busybox-udhcpc-no_deconfig.patch for this update Signed-off-by: Armin Kuster <akuster808@gmail.com> --- .../busybox/busybox/CVE-2011-5325.patch | 481 --------------------- .../busybox/busybox/CVE-2017-15873.patch | 95 ---- .../busybox/busybox/busybox-CVE-2017-16544.patch | 43 -- .../busybox/busybox-udhcpc-no_deconfig.patch | 36 +- .../{busybox_1.27.2.bb => busybox_1.28.3.bb} | 9 +- 5 files changed, 21 insertions(+), 643 deletions(-) delete mode 100755 meta/recipes-core/busybox/busybox/CVE-2011-5325.patch delete mode 100644 meta/recipes-core/busybox/busybox/CVE-2017-15873.patch delete mode 100644 meta/recipes-core/busybox/busybox/busybox-CVE-2017-16544.patch rename meta/recipes-core/busybox/{busybox_1.27.2.bb => busybox_1.28.3.bb} (83%) diff --git a/meta/recipes-core/busybox/busybox/CVE-2011-5325.patch b/meta/recipes-core/busybox/busybox/CVE-2011-5325.patch deleted file mode 100755 index 0926107..0000000 --- a/meta/recipes-core/busybox/busybox/CVE-2011-5325.patch +++ /dev/null @@ -1,481 +0,0 @@ -busybox-1.27.2: Fix CVE-2011-5325 - -[No upstream tracking] -- https://bugs.busybox.net/show_bug.cgi?id=8411 - -libarchive: do not extract unsafe symlinks - -Prevent unsafe links extracting unless env variable $EXTRACT_UNSAFE_SYMLINKS=1 -is not set. Untarring file with -C DESTDIR parameter could be extracted with -unwanted symlinks. This doesn't feel right, and IIRC GNU tar doesn't do that. -Include necessary changes from previous commits. - -Upstream-Status: Backport [https://git.busybox.net/busybox/commit/?id=bc9bbeb2b81001e8731cd2ae501c8fccc8d87cc7] -CVE: CVE-2011-5325 -bug: 8411 -Signed-off-by: Radovan Scasny <radovan.scasny@siemens.com> -Signed-off-by: Andrej Valek <andrej.valek@siemens.com> - -diff --git a/archival/libarchive/Kbuild.src b/archival/libarchive/Kbuild.src -index 942e755..e1a8a75 100644 ---- a/archival/libarchive/Kbuild.src -+++ b/archival/libarchive/Kbuild.src -@@ -12,6 +12,8 @@ COMMON_FILES:= \ - data_extract_all.o \ - data_extract_to_stdout.o \ - \ -+ unsafe_symlink_target.o \ -+\ - filter_accept_all.o \ - filter_accept_list.o \ - filter_accept_reject_list.o \ -diff --git a/archival/libarchive/data_extract_all.c b/archival/libarchive/data_extract_all.c -index 1830ffb..b828b65 100644 ---- a/archival/libarchive/data_extract_all.c -+++ b/archival/libarchive/data_extract_all.c -@@ -128,10 +128,9 @@ void FAST_FUNC data_extract_all(archive_handle_t *archive_handle) - res = link(hard_link, dst_name); - if (res != 0 && !(archive_handle->ah_flags & ARCHIVE_EXTRACT_QUIET)) { - /* shared message */ -- bb_perror_msg("can't create %slink " -- "%s to %s", "hard", -- dst_name, -- hard_link); -+ bb_perror_msg("can't create %slink '%s' to '%s'", -+ "hard", dst_name, hard_link -+ ); - } - /* Hardlinks have no separate mode/ownership, skip chown/chmod */ - goto ret; -@@ -178,15 +177,17 @@ void FAST_FUNC data_extract_all(archive_handle_t *archive_handle) - case S_IFLNK: - /* Symlink */ - //TODO: what if file_header->link_target == NULL (say, corrupted tarball?) -- res = symlink(file_header->link_target, dst_name); -- if (res != 0 -- && !(archive_handle->ah_flags & ARCHIVE_EXTRACT_QUIET) -- ) { -- /* shared message */ -- bb_perror_msg("can't create %slink " -- "%s to %s", "sym", -- dst_name, -- file_header->link_target); -+ if (!unsafe_symlink_target(file_header->link_target)) { -+ res = symlink(file_header->link_target, dst_name); -+ if (res != 0 -+ && !(archive_handle->ah_flags & ARCHIVE_EXTRACT_QUIET) -+ ) { -+ /* shared message */ -+ bb_perror_msg("can't create %slink '%s' to '%s'", -+ "sym", -+ dst_name, file_header->link_target -+ ); -+ } - } - break; - case S_IFSOCK: -diff --git a/archival/libarchive/unsafe_symlink_target.c b/archival/libarchive/unsafe_symlink_target.c -new file mode 100644 -index 0000000..ee46e28 ---- /dev/null -+++ b/archival/libarchive/unsafe_symlink_target.c -@@ -0,0 +1,48 @@ -+/* vi: set sw=4 ts=4: */ -+/* -+ * Licensed under GPLv2 or later, see file LICENSE in this source tree. -+ */ -+#include "libbb.h" -+#include "bb_archive.h" -+ -+int FAST_FUNC unsafe_symlink_target(const char *target) -+{ -+ const char *dot; -+ -+ if (target[0] == '/') { -+ const char *var; -+unsafe: -+ var = getenv("EXTRACT_UNSAFE_SYMLINKS"); -+ if (var) { -+ if (LONE_CHAR(var, '1')) -+ return 0; /* pretend it's safe */ -+ return 1; /* "UNSAFE!" */ -+ } -+ bb_error_msg("skipping unsafe symlink to '%s' in archive," -+ " set %s=1 to extract", -+ target, -+ "EXTRACT_UNSAFE_SYMLINKS" -+ ); -+ /* Prevent further messages */ -+ setenv("EXTRACT_UNSAFE_SYMLINKS", "0", 0); -+ return 1; /* "UNSAFE!" */ -+ } -+ -+ dot = target; -+ for (;;) { -+ dot = strchr(dot, '.'); -+ if (!dot) -+ return 0; /* safe target */ -+ -+ /* Is it a path component starting with ".."? */ -+ if ((dot[1] == '.') -+ && (dot == target || dot[-1] == '/') -+ /* Is it exactly ".."? */ -+ && (dot[2] == '/' || dot[2] == '\0') -+ ) { -+ goto unsafe; -+ } -+ /* NB: it can even be trailing ".", should only add 1 */ -+ dot += 1; -+ } -+} -\ No newline at end of file -diff --git a/archival/unzip.c b/archival/unzip.c -index 9037262..270e261 100644 ---- a/archival/unzip.c -+++ b/archival/unzip.c -@@ -335,6 +335,44 @@ static void unzip_create_leading_dirs(const char *fn) - free(name); - } - -+static void unzip_extract_symlink(zip_header_t *zip, const char *dst_fn) -+{ -+ char *target; -+ -+ if (zip->fmt.ucmpsize > 0xfff) /* no funny business please */ -+ bb_error_msg_and_die("bad archive"); -+ -+ if (zip->fmt.method == 0) { -+ /* Method 0 - stored (not compressed) */ -+ target = xzalloc(zip->fmt.ucmpsize + 1); -+ xread(zip_fd, target, zip->fmt.ucmpsize); -+ } else { -+#if 1 -+ bb_error_msg_and_die("compressed symlink is not supported"); -+#else -+ transformer_state_t xstate; -+ init_transformer_state(&xstate); -+ xstate.mem_output_size_max = zip->fmt.ucmpsize; -+ /* ...unpack... */ -+ if (!xstate.mem_output_buf) -+ WTF(); -+ target = xstate.mem_output_buf; -+ target = xrealloc(target, xstate.mem_output_size + 1); -+ target[xstate.mem_output_size] = '\0'; -+#endif -+ } -+ if (!unsafe_symlink_target(target)) { -+//TODO: libbb candidate -+ if (symlink(target, dst_fn)) { -+ /* shared message */ -+ bb_perror_msg_and_die("can't create %slink '%s' to '%s'", -+ "sym", dst_fn, target -+ ); -+ } -+ } -+ free(target); -+} -+ - static void unzip_extract(zip_header_t *zip, int dst_fd) - { - transformer_state_t xstate; -@@ -813,7 +851,7 @@ int unzip_main(int argc, char **argv) - } - check_file: - /* Extract file */ -- if (stat(dst_fn, &stat_buf) == -1) { -+ if (lstat(dst_fn, &stat_buf) == -1) { - /* File does not exist */ - if (errno != ENOENT) { - bb_perror_msg_and_die("can't stat '%s'", dst_fn); -@@ -834,6 +872,7 @@ int unzip_main(int argc, char **argv) - goto do_open_and_extract; - printf("replace %s? [y]es, [n]o, [A]ll, [N]one, [r]ename: ", dst_fn); - my_fgets80(key_buf); -+//TODO: redo lstat + ISREG check! user input could have taken a long time! - - switch (key_buf[0]) { - case 'A': -@@ -842,7 +881,8 @@ int unzip_main(int argc, char **argv) - do_open_and_extract: - unzip_create_leading_dirs(dst_fn); - #if ENABLE_FEATURE_UNZIP_CDF -- dst_fd = xopen3(dst_fn, O_WRONLY | O_CREAT | O_TRUNC, file_mode); -+ if (!S_ISLNK(file_mode)) -+ dst_fd = xopen3(dst_fn, O_WRONLY | O_CREAT | O_TRUNC, file_mode); - #else - dst_fd = xopen(dst_fn, O_WRONLY | O_CREAT | O_TRUNC); - #endif -@@ -852,10 +892,18 @@ int unzip_main(int argc, char **argv) - ? " extracting: %s\n" - : */ " inflating: %s\n", dst_fn); - } -- unzip_extract(&zip, dst_fd); -- if (dst_fd != STDOUT_FILENO) { -- /* closing STDOUT is potentially bad for future business */ -- close(dst_fd); -+#if ENABLE_FEATURE_UNZIP_CDF -+ if (S_ISLNK(file_mode)) { -+ if (dst_fd != STDOUT_FILENO) /* no -p */ -+ unzip_extract_symlink(&zip, dst_fn); -+ } else -+#endif -+ { -+ unzip_extract(&zip, dst_fd); -+ if (dst_fd != STDOUT_FILENO) { -+ /* closing STDOUT is potentially bad for future business */ -+ close(dst_fd); -+ }; - } - break; - -diff --git a/coreutils/link.c b/coreutils/link.c -index ac3ef85..aab249d 100644 ---- a/coreutils/link.c -+++ b/coreutils/link.c -@@ -32,9 +32,8 @@ int link_main(int argc UNUSED_PARAM, char **argv) - argv += optind; - if (link(argv[0], argv[1]) != 0) { - /* shared message */ -- bb_perror_msg_and_die("can't create %slink " -- "%s to %s", "hard", -- argv[1], argv[0] -+ bb_perror_msg_and_die("can't create %slink '%s' to '%s'", -+ "hard", argv[1], argv[0] - ); - } - return EXIT_SUCCESS; -diff --git a/include/bb_archive.h b/include/bb_archive.h -index 2b9c5f0..1e4da3c 100644 ---- a/include/bb_archive.h -+++ b/include/bb_archive.h -@@ -196,6 +196,7 @@ void seek_by_jump(int fd, off_t amount) FAST_FUNC; - void seek_by_read(int fd, off_t amount) FAST_FUNC; - - const char *strip_unsafe_prefix(const char *str) FAST_FUNC; -+int unsafe_symlink_target(const char *target) FAST_FUNC; - - void data_align(archive_handle_t *archive_handle, unsigned boundary) FAST_FUNC; - const llist_t *find_list_entry(const llist_t *list, const char *filename) FAST_FUNC; -diff --git a/libbb/copy_file.c b/libbb/copy_file.c -index 23c0f83..be90066 100644 ---- a/libbb/copy_file.c -+++ b/libbb/copy_file.c -@@ -371,7 +371,10 @@ int FAST_FUNC copy_file(const char *source, const char *dest, int flags) - int r = symlink(lpath, dest); - free(lpath); - if (r < 0) { -- bb_perror_msg("can't create symlink '%s'", dest); -+ /* shared message */ -+ bb_perror_msg("can't create %slink '%s' to '%s'", -+ "sym", dest, lpath -+ ); - return -1; - } - if (flags & FILEUTILS_PRESERVE_STATUS) -diff --git a/testsuite/tar.tests b/testsuite/tar.tests -index 9f7ce15..b7cd74c 100755 ---- a/testsuite/tar.tests -+++ b/testsuite/tar.tests -@@ -10,9 +10,6 @@ unset LC_COLLATE - unset LC_ALL - umask 022 - --rm -rf tar.tempdir 2>/dev/null --mkdir tar.tempdir && cd tar.tempdir || exit 1 -- - # testing "test name" "script" "expected result" "file input" "stdin" - - testing "Empty file is not a tarball" '\ -@@ -53,6 +50,7 @@ dd if=/dev/zero bs=512 count=20 2>/dev/null | tar xvf - 2>&1; echo $? - "" "" - SKIP= - -+mkdir tar.tempdir && cd tar.tempdir || exit 1 - # "tar cf test.tar input input_dir/ input_hard1 input_hard2 input_hard1 input_dir/ input": - # GNU tar 1.26 records as hardlinks: - # input_hard2 -> input_hard1 -@@ -64,7 +62,6 @@ SKIP= - # We also don't use "hrw-r--r--" notation for hardlinks in "tar tv" listing. - optional FEATURE_TAR_CREATE FEATURE_LS_SORTFILES - testing "tar hardlinks and repeated files" '\ --rm -rf input_* test.tar 2>/dev/null - >input_hard1 - ln input_hard1 input_hard2 - mkdir input_dir -@@ -95,10 +92,11 @@ drwxr-xr-x input_dir - " \ - "" "" - SKIP= -+cd .. || exit 1; rm -rf tar.tempdir 2>/dev/null - -+mkdir tar.tempdir && cd tar.tempdir || exit 1 - optional FEATURE_TAR_CREATE FEATURE_LS_SORTFILES - testing "tar hardlinks mode" '\ --rm -rf input_* test.tar 2>/dev/null - >input_hard1 - chmod 741 input_hard1 - ln input_hard1 input_hard2 -@@ -128,10 +126,11 @@ Ok: 0 - " \ - "" "" - SKIP= -+cd .. || exit 1; rm -rf tar.tempdir 2>/dev/null - -+mkdir tar.tempdir && cd tar.tempdir || exit 1 - optional FEATURE_TAR_CREATE FEATURE_LS_SORTFILES - testing "tar symlinks mode" '\ --rm -rf input_* test.tar 2>/dev/null - >input_file - chmod 741 input_file - ln -s input_file input_soft -@@ -159,10 +158,11 @@ lrwxrwxrwx input_file - " \ - "" "" - SKIP= -+cd .. || exit 1; rm -rf tar.tempdir 2>/dev/null - -+mkdir tar.tempdir && cd tar.tempdir || exit 1 - optional FEATURE_TAR_CREATE FEATURE_TAR_LONG_OPTIONS - testing "tar --overwrite" "\ --rm -rf input_* test.tar 2>/dev/null - ln input input_hard - tar cf test.tar input_hard - echo WRONG >input -@@ -174,12 +174,13 @@ Ok - " \ - "Ok\n" "" - SKIP= -+cd .. || exit 1; rm -rf tar.tempdir 2>/dev/null - -+mkdir tar.tempdir && cd tar.tempdir || exit 1 - test x"$SKIP_KNOWN_BUGS" = x"" && { - # Needs to be run under non-root for meaningful test - optional FEATURE_TAR_CREATE - testing "tar writing into read-only dir" '\ --rm -rf input_* test.tar 2>/dev/null - mkdir input_dir - >input_dir/input_file - chmod 550 input_dir -@@ -201,7 +202,9 @@ dr-xr-x--- input_dir - "" "" - SKIP= - } -+cd .. || exit 1; rm -rf tar.tempdir 2>/dev/null - -+mkdir tar.tempdir && cd tar.tempdir || exit 1 - # Had a bug where on extract autodetect first "switched off" -z - # and then failed to recognize .tgz extension - optional FEATURE_TAR_CREATE FEATURE_SEAMLESS_GZ GUNZIP -@@ -217,7 +220,9 @@ Ok - " \ - "" "" - SKIP= -+cd .. || exit 1; rm -rf tar.tempdir 2>/dev/null - -+mkdir tar.tempdir && cd tar.tempdir || exit 1 - # Do we detect XZ-compressed data (even w/o .tar.xz or txz extension)? - # (the uuencoded hello_world.txz contains one empty file named "hello_world") - optional UUDECODE FEATURE_TAR_AUTODETECT FEATURE_SEAMLESS_XZ -@@ -236,7 +241,9 @@ AAAEWVo= - ==== - " - SKIP= -+cd .. || exit 1; rm -rf tar.tempdir 2>/dev/null - -+mkdir tar.tempdir && cd tar.tempdir || exit 1 - # On extract, everything up to and including last ".." component is stripped - optional FEATURE_TAR_CREATE - testing "tar strips /../ on extract" "\ -@@ -255,7 +262,9 @@ Ok - " \ - "" "" - SKIP= -+cd .. || exit 1; rm -rf tar.tempdir 2>/dev/null - -+mkdir tar.tempdir && cd tar.tempdir || exit 1 - # attack.tar.bz2 has symlink pointing to a system file - # followed by a regular file with the same name - # containing "root::0:0::/root:/bin/sh": -@@ -270,6 +279,7 @@ optional UUDECODE FEATURE_TAR_AUTODETECT FEATURE_SEAMLESS_BZ2 - testing "tar does not extract into symlinks" "\ - >>/tmp/passwd && uudecode -o input && tar xf input 2>&1 && rm passwd; cat /tmp/passwd; echo \$? - " "\ -+tar: skipping unsafe symlink to '/tmp/passwd' in archive, set EXTRACT_UNSAFE_SYMLINKS=1 to extract - 0 - " \ - "" "\ -@@ -281,12 +291,15 @@ l4/V8LDoe90yiWJhOJvIypgEfxdyRThQkBVn/bI= - ==== - " - SKIP= -+cd .. || exit 1; rm -rf tar.tempdir 2>/dev/null -+ -+mkdir tar.tempdir && cd tar.tempdir || exit 1 - # And same with -k - optional UUDECODE FEATURE_TAR_AUTODETECT FEATURE_SEAMLESS_BZ2 - testing "tar -k does not extract into symlinks" "\ - >>/tmp/passwd && uudecode -o input && tar xf input -k 2>&1 && rm passwd; cat /tmp/passwd; echo \$? - " "\ --tar: can't open 'passwd': File exists -+tar: skipping unsafe symlink to '/tmp/passwd' in archive, set EXTRACT_UNSAFE_SYMLINKS=1 to extract - 0 - " \ - "" "\ -@@ -298,7 +311,9 @@ l4/V8LDoe90yiWJhOJvIypgEfxdyRThQkBVn/bI= - ==== - " - SKIP= -+cd .. || exit 1; rm -rf tar.tempdir 2>/dev/null - -+mkdir tar.tempdir && cd tar.tempdir || exit 1 - optional UNICODE_SUPPORT FEATURE_TAR_GNU_EXTENSIONS FEATURE_SEAMLESS_BZ2 FEATURE_TAR_AUTODETECT - testing "Pax-encoded UTF8 names and symlinks" '\ - tar xvf ../tar.utf8.tar.bz2 2>&1; echo $? -@@ -309,17 +324,45 @@ rm -rf etc usr - ' "\ - etc/ssl/certs/3b2716e5.0 - etc/ssl/certs/EBG_Elektronik_Sertifika_Hizmet_Sağlayıcısı.pem -+tar: skipping unsafe symlink to '/usr/share/ca-certificates/mozilla/EBG_Elektronik_Sertifika_Hizmet_Sağlayıcısı.crt' in archive, set EXTRACT_UNSAFE_SYMLINKS=1 to extract - etc/ssl/certs/f80cc7f6.0 - usr/share/ca-certificates/mozilla/EBG_Elektronik_Sertifika_Hizmet_Sağlayıcısı.crt - 0 - etc/ssl/certs/3b2716e5.0 -> EBG_Elektronik_Sertifika_Hizmet_Sağlayıcısı.pem --etc/ssl/certs/EBG_Elektronik_Sertifika_Hizmet_Sağlayıcısı.pem -> /usr/share/ca-certificates/mozilla/EBG_Elektronik_Sertifika_Hizmet_Sağlayıcısı.crt - etc/ssl/certs/f80cc7f6.0 -> EBG_Elektronik_Sertifika_Hizmet_Sağlayıcısı.pem - " \ - "" "" - SKIP= -+cd .. || exit 1; rm -rf tar.tempdir 2>/dev/null - -- --cd .. && rm -rf tar.tempdir || exit 1 -+mkdir tar.tempdir && cd tar.tempdir || exit 1 -+optional UUDECODE FEATURE_SEAMLESS_BZ2 FEATURE_TAR_AUTODETECT -+testing "Symlink attack: create symlink and then write through it" '\ -+exec 2>&1 -+uudecode -o input && tar xvf input; echo $? -+ls /tmp/bb_test_evilfile -+ls bb_test_evilfile -+ls symlink/bb_test_evilfile -+' "\ -+anything.txt -+symlink -+tar: skipping unsafe symlink to '/tmp' in archive, set EXTRACT_UNSAFE_SYMLINKS=1 to extract -+symlink/bb_test_evilfile -+0 -+ls: /tmp/bb_test_evilfile: No such file or directory -+ls: bb_test_evilfile: No such file or directory -+symlink/bb_test_evilfile -+" \ -+"" "\ -+begin-base64 644 tar_symlink_attack.tar.bz2 -+QlpoOTFBWSZTWZgs7bQAALT/hMmQAFBAAf+AEMAGJPPv32AAAIAIMAC5thlR -+omAjAmCMADQT1BqNE0AEwAAjAEwElTKeo9NTR6h6gaeoA0DQNLVdwZZ5iNTk -+AQwCAV6S00QFJYhrlfFkVCEDEGtgNVqYrI0uK3ggnt30gqk4e1TTQm5QIAKa -+SJqzRGSFLMmOloHSAcvLiFxxRiQtQZF+qPxbo173ZDISOAoNoPN4PQPhBhKS -+n8fYaKlioCTzL2oXYczyUUIP4u5IpwoSEwWdtoA= -+==== -+" -+SKIP= -+cd .. || exit 1; rm -rf tar.tempdir 2>/dev/null - - exit $FAILCOUNT diff --git a/meta/recipes-core/busybox/busybox/CVE-2017-15873.patch b/meta/recipes-core/busybox/busybox/CVE-2017-15873.patch deleted file mode 100644 index 5a027c9..0000000 --- a/meta/recipes-core/busybox/busybox/CVE-2017-15873.patch +++ /dev/null @@ -1,95 +0,0 @@ -busybox-1.27.2: Fix CVE-2017-15873 - -[No upstream tracking] -- https://bugs.busybox.net/show_bug.cgi?id=10431 - -bunzip2: fix runCnt overflow - -The get_next_block function in archival/libarchive/decompress_bunzip2.c -in BusyBox 1.27.2 has an Integer Overflow that may lead to a write -access violation. - -Upstream-Status: Backport [https://git.busybox.net/busybox/commit/?id=0402cb32df015d9372578e3db27db47b33d5c7b0] -CVE: CVE-2017-15873 -bug: 10431 -Signed-off-by: Radovan Scasny <radovan.scasny@siemens.com> - -diff --git a/archival/libarchive/decompress_bunzip2.c b/archival/libarchive/decompress_bunzip2.c -index 7cd18f5..bec89ed 100644 ---- a/archival/libarchive/decompress_bunzip2.c -+++ b/archival/libarchive/decompress_bunzip2.c -@@ -156,15 +156,15 @@ static unsigned get_bits(bunzip_data *bd, int bits_wanted) - static int get_next_block(bunzip_data *bd) - { - struct group_data *hufGroup; -- int dbufCount, dbufSize, groupCount, *base, *limit, selector, -- i, j, runPos, symCount, symTotal, nSelectors, byteCount[256]; -- int runCnt = runCnt; /* for compiler */ -+ int groupCount, *base, *limit, selector, -+ i, j, symCount, symTotal, nSelectors, byteCount[256]; - uint8_t uc, symToByte[256], mtfSymbol[256], *selectors; - uint32_t *dbuf; - unsigned origPtr, t; -+ unsigned dbufCount, runPos; -+ unsigned runCnt = runCnt; /* for compiler */ - - dbuf = bd->dbuf; -- dbufSize = bd->dbufSize; - selectors = bd->selectors; - - /* In bbox, we are ok with aborting through setjmp which is set up in start_bunzip */ -@@ -187,7 +187,7 @@ static int get_next_block(bunzip_data *bd) - it didn't actually work. */ - if (get_bits(bd, 1)) return RETVAL_OBSOLETE_INPUT; - origPtr = get_bits(bd, 24); -- if ((int)origPtr > dbufSize) return RETVAL_DATA_ERROR; -+ if (origPtr > bd->dbufSize) return RETVAL_DATA_ERROR; - - /* mapping table: if some byte values are never used (encoding things - like ascii text), the compression code removes the gaps to have fewer -@@ -435,7 +435,14 @@ static int get_next_block(bunzip_data *bd) - symbols, but a run of length 0 doesn't mean anything in this - context). Thus space is saved. */ - runCnt += (runPos << nextSym); /* +runPos if RUNA; +2*runPos if RUNB */ -- if (runPos < dbufSize) runPos <<= 1; -+//The 32-bit overflow of runCnt wasn't yet seen, but probably can happen. -+//This would be the fix (catches too large count way before it can overflow): -+// if (runCnt > bd->dbufSize) { -+// dbg("runCnt:%u > dbufSize:%u RETVAL_DATA_ERROR", -+// runCnt, bd->dbufSize); -+// return RETVAL_DATA_ERROR; -+// } -+ if (runPos < bd->dbufSize) runPos <<= 1; - goto end_of_huffman_loop; - } - -@@ -445,14 +452,15 @@ static int get_next_block(bunzip_data *bd) - literal used is the one at the head of the mtfSymbol array.) */ - if (runPos != 0) { - uint8_t tmp_byte; -- if (dbufCount + runCnt > dbufSize) { -- dbg("dbufCount:%d+runCnt:%d %d > dbufSize:%d RETVAL_DATA_ERROR", -- dbufCount, runCnt, dbufCount + runCnt, dbufSize); -+ if (dbufCount + runCnt > bd->dbufSize) { -+ dbg("dbufCount:%u+runCnt:%u %u > dbufSize:%u RETVAL_DATA_ERROR", -+ dbufCount, runCnt, dbufCount + runCnt, bd->dbufSize); - return RETVAL_DATA_ERROR; - } - tmp_byte = symToByte[mtfSymbol[0]]; - byteCount[tmp_byte] += runCnt; -- while (--runCnt >= 0) dbuf[dbufCount++] = (uint32_t)tmp_byte; -+ while ((int)--runCnt >= 0) -+ dbuf[dbufCount++] = (uint32_t)tmp_byte; - runPos = 0; - } - -@@ -466,7 +474,7 @@ static int get_next_block(bunzip_data *bd) - first symbol in the mtf array, position 0, would have been handled - as part of a run above. Therefore 1 unused mtf position minus - 2 non-literal nextSym values equals -1.) */ -- if (dbufCount >= dbufSize) return RETVAL_DATA_ERROR; -+ if (dbufCount >= bd->dbufSize) return RETVAL_DATA_ERROR; - i = nextSym - 1; - uc = mtfSymbol[i]; - --- -cgit v0.12 diff --git a/meta/recipes-core/busybox/busybox/busybox-CVE-2017-16544.patch b/meta/recipes-core/busybox/busybox/busybox-CVE-2017-16544.patch deleted file mode 100644 index fc19ee3..0000000 --- a/meta/recipes-core/busybox/busybox/busybox-CVE-2017-16544.patch +++ /dev/null @@ -1,43 +0,0 @@ -From c3797d40a1c57352192c6106cc0f435e7d9c11e8 Mon Sep 17 00:00:00 2001 -From: Denys Vlasenko <vda.linux@googlemail.com> -Date: Tue, 7 Nov 2017 18:09:29 +0100 -Subject: lineedit: do not tab-complete any strings which have control - characters - -function old new delta -add_match 41 68 +27 - -CVE: CVE-2017-16544 -Upstream-Status: Backport - -Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com> -Signed-off-by: Zhixiong Chi <zhixiong.chi@windriver.com> ---- - libbb/lineedit.c | 12 ++++++++++++ - 1 file changed, 12 insertions(+) - -diff --git a/libbb/lineedit.c b/libbb/lineedit.c -index c0e35bb..56e8140 100644 ---- a/libbb/lineedit.c -+++ b/libbb/lineedit.c -@@ -645,6 +645,18 @@ static void free_tab_completion_data(void) - - static void add_match(char *matched) - { -+ unsigned char *p = (unsigned char*)matched; -+ while (*p) { -+ /* ESC attack fix: drop any string with control chars */ -+ if (*p < ' ' -+ || (!ENABLE_UNICODE_SUPPORT && *p >= 0x7f) -+ || (ENABLE_UNICODE_SUPPORT && *p == 0x7f) -+ ) { -+ free(matched); -+ return; -+ } -+ p++; -+ } - matches = xrealloc_vector(matches, 4, num_matches); - matches[num_matches] = matched; - num_matches++; --- -cgit v0.12 diff --git a/meta/recipes-core/busybox/busybox/busybox-udhcpc-no_deconfig.patch b/meta/recipes-core/busybox/busybox/busybox-udhcpc-no_deconfig.patch index 582a258..9e74653 100644 --- a/meta/recipes-core/busybox/busybox/busybox-udhcpc-no_deconfig.patch +++ b/meta/recipes-core/busybox/busybox/busybox-udhcpc-no_deconfig.patch @@ -31,11 +31,11 @@ Signed-off-by: Andreas Oberritter <obi@opendreambox.org> networking/udhcp/dhcpc.c | 29 ++++++++++++++++------ 1 file changed, 21 insertions(+), 8 deletions(-) -Index: busybox-1.27.2/networking/udhcp/dhcpc.c +Index: busybox-1.28.3/networking/udhcp/dhcpc.c =================================================================== ---- busybox-1.27.2.orig/networking/udhcp/dhcpc.c -+++ busybox-1.27.2/networking/udhcp/dhcpc.c -@@ -49,6 +49,8 @@ struct tpacket_auxdata { +--- busybox-1.28.3.orig/networking/udhcp/dhcpc.c ++++ busybox-1.28.3/networking/udhcp/dhcpc.c +@@ -48,6 +48,8 @@ struct tpacket_auxdata { }; #endif @@ -44,7 +44,7 @@ Index: busybox-1.27.2/networking/udhcp/dhcpc.c /* "struct client_config_t client_config" is in bb_common_bufsiz1 */ -@@ -104,8 +106,9 @@ enum { +@@ -103,8 +105,9 @@ enum { OPT_x = 1 << 18, OPT_f = 1 << 19, OPT_B = 1 << 20, @@ -55,7 +55,7 @@ Index: busybox-1.27.2/networking/udhcp/dhcpc.c USE_FOR_MMU( OPTBIT_b,) IF_FEATURE_UDHCPC_ARPING(OPTBIT_a,) IF_FEATURE_UDHCP_PORT( OPTBIT_P,) -@@ -1110,7 +1113,8 @@ static void perform_renew(void) +@@ -1122,7 +1125,8 @@ static void perform_renew(void) state = RENEW_REQUESTED; break; case RENEW_REQUESTED: /* impatient are we? fine, square 1 */ @@ -65,7 +65,7 @@ Index: busybox-1.27.2/networking/udhcp/dhcpc.c case REQUESTING: case RELEASED: change_listen_mode(LISTEN_RAW); -@@ -1146,7 +1150,8 @@ static void perform_release(uint32_t server_addr, uint32_t requested_ip) +@@ -1158,7 +1162,8 @@ static void perform_release(uint32_t ser * Users requested to be notified in all cases, even if not in one * of the states above. */ @@ -75,16 +75,16 @@ Index: busybox-1.27.2/networking/udhcp/dhcpc.c change_listen_mode(LISTEN_NONE); state = RELEASED; -@@ -1298,7 +1303,7 @@ int udhcpc_main(int argc UNUSED_PARAM, char **argv) - /* O,x: list; -T,-t,-A take numeric param */ - IF_UDHCP_VERBOSE(opt_complementary = "vv";) - IF_LONG_OPTS(applet_long_options = udhcpc_longopts;) -- opt = getopt32(argv, "CV:H:h:F:i:np:qRr:s:T:+t:+SA:+O:*ox:*fB" -+ opt = getopt32(argv, "CV:H:h:F:i:np:qRr:s:T:+t:+SA:+O:*ox:*fBD" +@@ -1270,7 +1275,7 @@ int udhcpc_main(int argc UNUSED_PARAM, c + /* Parse command line */ + opt = getopt32long(argv, "^" + /* O,x: list; -T,-t,-A take numeric param */ +- "CV:H:h:F:i:np:qRr:s:T:+t:+SA:+O:*ox:*fB" ++ "CV:H:h:F:i:np:qRr:s:T:+t:+SA:+O:*ox:*fBD" USE_FOR_MMU("b") IF_FEATURE_UDHCPC_ARPING("a::") IF_FEATURE_UDHCP_PORT("P:") -@@ -1409,6 +1414,10 @@ int udhcpc_main(int argc UNUSED_PARAM, char **argv) +@@ -1384,6 +1389,10 @@ int udhcpc_main(int argc UNUSED_PARAM, c logmode |= LOGMODE_SYSLOG; } @@ -95,7 +95,7 @@ Index: busybox-1.27.2/networking/udhcp/dhcpc.c /* Make sure fd 0,1,2 are open */ bb_sanitize_stdio(); /* Equivalent of doing a fflush after every \n */ -@@ -1423,7 +1432,8 @@ int udhcpc_main(int argc UNUSED_PARAM, char **argv) +@@ -1398,7 +1407,8 @@ int udhcpc_main(int argc UNUSED_PARAM, c srand(monotonic_us()); state = INIT_SELECTING; @@ -105,7 +105,7 @@ Index: busybox-1.27.2/networking/udhcp/dhcpc.c change_listen_mode(LISTEN_RAW); packet_num = 0; timeout = 0; -@@ -1577,7 +1587,8 @@ int udhcpc_main(int argc UNUSED_PARAM, char **argv) +@@ -1565,7 +1575,8 @@ int udhcpc_main(int argc UNUSED_PARAM, c } /* Timed out, enter init state */ bb_error_msg("lease lost, entering init state"); @@ -115,7 +115,7 @@ Index: busybox-1.27.2/networking/udhcp/dhcpc.c state = INIT_SELECTING; client_config.first_secs = 0; /* make secs field count from 0 */ /*timeout = 0; - already is */ -@@ -1770,7 +1781,8 @@ int udhcpc_main(int argc UNUSED_PARAM, char **argv) +@@ -1757,7 +1768,8 @@ int udhcpc_main(int argc UNUSED_PARAM, c send_decline(/*xid,*/ server_addr, packet.yiaddr); if (state != REQUESTING) @@ -125,7 +125,7 @@ Index: busybox-1.27.2/networking/udhcp/dhcpc.c change_listen_mode(LISTEN_RAW); state = INIT_SELECTING; client_config.first_secs = 0; /* make secs field count from 0 */ -@@ -1840,7 +1852,8 @@ int udhcpc_main(int argc UNUSED_PARAM, char **argv) +@@ -1827,7 +1839,8 @@ int udhcpc_main(int argc UNUSED_PARAM, c bb_error_msg("received %s", "DHCP NAK"); udhcp_run_script(&packet, "nak"); if (state != REQUESTING) diff --git a/meta/recipes-core/busybox/busybox_1.27.2.bb b/meta/recipes-core/busybox/busybox_1.28.3.bb similarity index 83% rename from meta/recipes-core/busybox/busybox_1.27.2.bb rename to meta/recipes-core/busybox/busybox_1.28.3.bb index 36a6342..6afd9f2 100644 --- a/meta/recipes-core/busybox/busybox_1.27.2.bb +++ b/meta/recipes-core/busybox/busybox_1.28.3.bb @@ -1,7 +1,6 @@ require busybox.inc SRC_URI = "http://www.busybox.net/downloads/busybox-${PV}.tar.bz2;name=tarball \ - file://busybox-udhcpc-no_deconfig.patch \ file://find-touchscreen.sh \ file://busybox-cron \ file://busybox-httpd \ @@ -42,11 +41,9 @@ SRC_URI = "http://www.busybox.net/downloads/busybox-${PV}.tar.bz2;name=tarball \ file://rcK \ file://runlevel \ file://makefile-libbb-race.patch \ - file://CVE-2011-5325.patch \ - file://CVE-2017-15873.patch \ - file://busybox-CVE-2017-16544.patch \ " SRC_URI_append_libc-musl = " file://musl.cfg " -SRC_URI[tarball.md5sum] = "476186f4bab81781dab2369bfd42734e" -SRC_URI[tarball.sha256sum] = "9d4be516b61e6480f156b11eb42577a13529f75d3383850bb75c50c285de63df" +#file://busybox-udhcpc-no_deconfig.patch +SRC_URI[tarball.md5sum] = "82e5ad09ae4a07c266fc179492b51757" +SRC_URI[tarball.sha256sum] = "ad0d22033f23e696f9a71a4c2f9210194dda39b024a79151f4ac278995332a6e" -- 2.7.4 ^ permalink raw reply related [flat|nested] 18+ messages in thread
* Re: [PATCH 7/8] busybox: update to 1.28.3 2018-05-19 2:13 ` [PATCH 7/8] busybox: update to 1.28.3 Armin Kuster @ 2018-05-19 2:30 ` Anuj Mittal 2018-05-19 14:19 ` akuster808 0 siblings, 1 reply; 18+ messages in thread From: Anuj Mittal @ 2018-05-19 2:30 UTC (permalink / raw) To: Armin Kuster, akuster, openembedded-core On 05/19/2018 10:13 AM, Armin Kuster wrote: > SRC_URI = "http://www.busybox.net/downloads/busybox-${PV}.tar.bz2;name=tarball \ > - file://busybox-udhcpc-no_deconfig.patch \ > file://find-touchscreen.sh \ > file://busybox-cron \ > file://busybox-httpd \ > @@ -42,11 +41,9 @@ SRC_URI = "http://www.busybox.net/downloads/busybox-${PV}.tar.bz2;name=tarball \ > file://rcK \ > file://runlevel \ > file://makefile-libbb-race.patch \ > - file://CVE-2011-5325.patch \ > - file://CVE-2017-15873.patch \ > - file://busybox-CVE-2017-16544.patch \ > " > SRC_URI_append_libc-musl = " file://musl.cfg " > > -SRC_URI[tarball.md5sum] = "476186f4bab81781dab2369bfd42734e" > -SRC_URI[tarball.sha256sum] = "9d4be516b61e6480f156b11eb42577a13529f75d3383850bb75c50c285de63df" > +#file://busybox-udhcpc-no_deconfig.patch Why has this been removed and commented out? Is this intentional? Thanks. ^ permalink raw reply [flat|nested] 18+ messages in thread
* Re: [PATCH 7/8] busybox: update to 1.28.3 2018-05-19 2:30 ` Anuj Mittal @ 2018-05-19 14:19 ` akuster808 0 siblings, 0 replies; 18+ messages in thread From: akuster808 @ 2018-05-19 14:19 UTC (permalink / raw) To: Anuj Mittal, Armin Kuster, openembedded-core On 05/18/2018 07:30 PM, Anuj Mittal wrote: > On 05/19/2018 10:13 AM, Armin Kuster wrote: >> SRC_URI = "http://www.busybox.net/downloads/busybox-${PV}.tar.bz2;name=tarball \ >> - file://busybox-udhcpc-no_deconfig.patch \ >> file://find-touchscreen.sh \ >> file://busybox-cron \ >> file://busybox-httpd \ >> @@ -42,11 +41,9 @@ SRC_URI = "http://www.busybox.net/downloads/busybox-${PV}.tar.bz2;name=tarball \ >> file://rcK \ >> file://runlevel \ >> file://makefile-libbb-race.patch \ >> - file://CVE-2011-5325.patch \ >> - file://CVE-2017-15873.patch \ >> - file://busybox-CVE-2017-16544.patch \ >> " >> SRC_URI_append_libc-musl = " file://musl.cfg " >> >> -SRC_URI[tarball.md5sum] = "476186f4bab81781dab2369bfd42734e" >> -SRC_URI[tarball.sha256sum] = "9d4be516b61e6480f156b11eb42577a13529f75d3383850bb75c50c285de63df" >> +#file://busybox-udhcpc-no_deconfig.patch > Why has this been removed and commented out? Is this intentional? No, just being a goof. sad thing is I believe I re factored that patch. thanks for catching this. armin > > Thanks. ^ permalink raw reply [flat|nested] 18+ messages in thread
* [PATCH 8/8] openssh: fix some ptest exec issues 2018-05-19 2:13 [PATCH 1/8] openssh: upgrade 7.6p1 -> 7.7p1 Armin Kuster ` (5 preceding siblings ...) 2018-05-19 2:13 ` [PATCH 7/8] busybox: update to 1.28.3 Armin Kuster @ 2018-05-19 2:13 ` Armin Kuster 6 siblings, 0 replies; 18+ messages in thread From: Armin Kuster @ 2018-05-19 2:13 UTC (permalink / raw) To: akuster, openembedded-core From: Armin Kuster <akuster808@gmail.com> SUDO needs to be empty to run some of the tests on the target. compile check-perm which is needed for some tests. skip "unit" tests in regress/Makefile Signed-off-by: Armin Kuster <akuster808@gmail.com> --- meta/recipes-connectivity/openssh/openssh/run-ptest | 2 +- meta/recipes-connectivity/openssh/openssh_7.7p1.bb | 3 ++- 2 files changed, 3 insertions(+), 2 deletions(-) diff --git a/meta/recipes-connectivity/openssh/openssh/run-ptest b/meta/recipes-connectivity/openssh/openssh/run-ptest index 36a3d2a..39fb521 100755 --- a/meta/recipes-connectivity/openssh/openssh/run-ptest +++ b/meta/recipes-connectivity/openssh/openssh/run-ptest @@ -4,7 +4,7 @@ export TEST_SHELL=sh cd regress sed -i "/\t\tagent-ptrace /d" Makefile -make -k .OBJDIR=`pwd` .CURDIR=`pwd` SUDO="sudo" tests \ +make -k .OBJDIR=`pwd` .CURDIR=`pwd` SUDO="" tests \ | sed -e 's/^skipped/SKIP: /g' -e 's/^ok /PASS: /g' -e 's/^failed/FAIL: /g' SSHAGENT=`which ssh-agent` diff --git a/meta/recipes-connectivity/openssh/openssh_7.7p1.bb b/meta/recipes-connectivity/openssh/openssh_7.7p1.bb index 691dec6..40e0fb0 100644 --- a/meta/recipes-connectivity/openssh/openssh_7.7p1.bb +++ b/meta/recipes-connectivity/openssh/openssh_7.7p1.bb @@ -84,7 +84,7 @@ do_configure_prepend () { do_compile_ptest() { # skip regress/unittests/ binaries: this will silently skip # unittests in run-ptests which is good because they are so slow. - oe_runmake regress/modpipe regress/setuid-allowed regress/netcat + oe_runmake regress/modpipe regress/setuid-allowed regress/netcat regress/check-perm } do_install_append () { @@ -132,6 +132,7 @@ do_install_append () { do_install_ptest () { sed -i -e "s|^SFTPSERVER=.*|SFTPSERVER=${libexecdir}/sftp-server|" regress/test-exec.sh + sed -i -e "s|EGRESS_TARGETS=./*unit|EGRESS_TARGETS=|" regress/Makefile cp -r regress ${D}${PTEST_PATH} } -- 2.7.4 ^ permalink raw reply related [flat|nested] 18+ messages in thread
end of thread, other threads:[~2018-06-17 19:23 UTC | newest] Thread overview: 18+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2018-05-19 2:13 [PATCH 1/8] openssh: upgrade 7.6p1 -> 7.7p1 Armin Kuster 2018-05-19 2:13 ` [PATCH 2/8] kexec-tools: upgrade 2.0.16 -> 2.0.17 Armin Kuster 2018-05-19 2:13 ` [PATCH 3/8] libdmx: upgrade 1.1.3 -> 1.1.4 Armin Kuster 2018-05-19 2:13 ` [PATCH 4/8] xf86-input-libinput: upgrade 0.26.0 -> 0.27.1 Armin Kuster 2018-05-19 2:13 ` [PATCH 5/8] nss: update to 3.36.1 Armin Kuster 2018-05-19 2:13 ` [PATCH 6/8] xserver-xorg: upgrade 1.19.6 -> 1.20.0 Armin Kuster 2018-05-23 11:01 ` Burton, Ross 2018-05-28 14:25 ` akuster808 2018-06-01 15:15 ` akuster808 2018-06-13 10:17 ` Burton, Ross 2018-06-13 14:51 ` akuster808 2018-06-13 16:34 ` Burton, Ross 2018-06-17 19:14 ` akuster808 2018-06-17 19:23 ` Burton, Ross 2018-05-19 2:13 ` [PATCH 7/8] busybox: update to 1.28.3 Armin Kuster 2018-05-19 2:30 ` Anuj Mittal 2018-05-19 14:19 ` akuster808 2018-05-19 2:13 ` [PATCH 8/8] openssh: fix some ptest exec issues Armin Kuster
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox