All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH 01/16] gobject-introspection: update to 1.58.1
@ 2018-11-22 15:41 Alexander Kanavin
  2018-11-22 15:41 ` [PATCH 02/16] openssl10: update to 1.0.2q Alexander Kanavin
                   ` (16 more replies)
  0 siblings, 17 replies; 32+ messages in thread
From: Alexander Kanavin @ 2018-11-22 15:41 UTC (permalink / raw)
  To: openembedded-core

Also, change default meson option to building introspection files
(previously they were not built by default).

Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com>
---
 ...0001-Port-cross-compilation-support-to-meson.patch | 11 ++++++-----
 ...e-the-repository-directory-for-native-builds.patch |  2 +-
 ...tion_1.58.0.bb => gobject-introspection_1.58.1.bb} |  4 ++--
 3 files changed, 9 insertions(+), 8 deletions(-)
 rename meta/recipes-gnome/gobject-introspection/{gobject-introspection_1.58.0.bb => gobject-introspection_1.58.1.bb} (98%)

diff --git a/meta/recipes-gnome/gobject-introspection/gobject-introspection/0001-Port-cross-compilation-support-to-meson.patch b/meta/recipes-gnome/gobject-introspection/gobject-introspection/0001-Port-cross-compilation-support-to-meson.patch
index b0eee1ebe5b..63b02fe0f3d 100644
--- a/meta/recipes-gnome/gobject-introspection/gobject-introspection/0001-Port-cross-compilation-support-to-meson.patch
+++ b/meta/recipes-gnome/gobject-introspection/gobject-introspection/0001-Port-cross-compilation-support-to-meson.patch
@@ -1,10 +1,11 @@
-From e8ce42c5cb54847517fe8fbe50bbaea452618218 Mon Sep 17 00:00:00 2001
+From fabf8c505181636182a357e0c6e764b752ccf468 Mon Sep 17 00:00:00 2001
 From: Alexander Kanavin <alex.kanavin@gmail.com>
 Date: Thu, 15 Nov 2018 15:10:05 +0100
 Subject: [PATCH] Port cross-compilation support to meson
 
 Upstream-Status: Pending
 Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com>
+
 ---
  gir/meson.build   | 59 ++++++++++++++++++++++++++++++++++-------------
  meson.build       |  4 +++-
@@ -12,7 +13,7 @@ Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com>
  3 files changed, 66 insertions(+), 17 deletions(-)
 
 diff --git a/gir/meson.build b/gir/meson.build
-index 607bbc4..c0e221b 100644
+index 607bbc45..c0e221b3 100644
 --- a/gir/meson.build
 +++ b/gir/meson.build
 @@ -37,15 +37,27 @@ typelibdir = join_paths(get_option('libdir'), 'girepository-1.0')
@@ -115,7 +116,7 @@ index 607bbc4..c0e221b 100644
      install_dir: typelibdir,
    )
 diff --git a/meson.build b/meson.build
-index 7ec9532..9e20da5 100644
+index 7ec95328..9e20da57 100644
 --- a/meson.build
 +++ b/meson.build
 @@ -76,7 +76,9 @@ libffi_dep = dependency('libffi',
@@ -130,7 +131,7 @@ index 7ec9532..9e20da5 100644
  subdir('docs')
  subdir('tests')
 diff --git a/meson_options.txt b/meson_options.txt
-index 49726be..3e17c78 100644
+index 49726be6..d557a3b6 100644
 --- a/meson_options.txt
 +++ b/meson_options.txt
 @@ -21,3 +21,23 @@ option('cairo-libname', type: 'string',
@@ -150,7 +151,7 @@ index 49726be..3e17c78 100644
 +  description: 'Use a ldd wrapper instead of system ldd command in giscanner (useful when cross-compiling)'
 +)
 +
-+option('enable-introspection-data', type: 'boolean', value : false,
++option('enable-introspection-data', type: 'boolean', value : true,
 +  description: 'Build introspection data (.gir and .typelib files) in addition to library and tools'
 +)
 +
diff --git a/meta/recipes-gnome/gobject-introspection/gobject-introspection/0001-Relocate-the-repository-directory-for-native-builds.patch b/meta/recipes-gnome/gobject-introspection/gobject-introspection/0001-Relocate-the-repository-directory-for-native-builds.patch
index b9754a96c22..17b9eac057c 100644
--- a/meta/recipes-gnome/gobject-introspection/gobject-introspection/0001-Relocate-the-repository-directory-for-native-builds.patch
+++ b/meta/recipes-gnome/gobject-introspection/gobject-introspection/0001-Relocate-the-repository-directory-for-native-builds.patch
@@ -1,4 +1,4 @@
-From 2e2bf063ab79ddff1c284834aef8e22710db9350 Mon Sep 17 00:00:00 2001
+From a20b4d70f44449875b7c54750ab0f02eefb0870d Mon Sep 17 00:00:00 2001
 From: Sascha Silbe <x-yo17@se-silbe.de>
 Date: Fri, 8 Jun 2018 13:55:10 +0200
 Subject: [PATCH] Relocate the repository directory for native builds
diff --git a/meta/recipes-gnome/gobject-introspection/gobject-introspection_1.58.0.bb b/meta/recipes-gnome/gobject-introspection/gobject-introspection_1.58.1.bb
similarity index 98%
rename from meta/recipes-gnome/gobject-introspection/gobject-introspection_1.58.0.bb
rename to meta/recipes-gnome/gobject-introspection/gobject-introspection_1.58.1.bb
index c9a0d816f5e..66f99185389 100644
--- a/meta/recipes-gnome/gobject-introspection/gobject-introspection_1.58.0.bb
+++ b/meta/recipes-gnome/gobject-introspection/gobject-introspection_1.58.1.bb
@@ -22,8 +22,8 @@ SRC_URI = "${GNOME_MIRROR}/${BPN}/${@oe.utils.trim_version("${PV}", 2)}/${BPN}-$
            file://0001-Port-cross-compilation-support-to-meson.patch \
            "
 
-SRC_URI[md5sum] = "94fec875276262037bfcd51226db12fe"
-SRC_URI[sha256sum] = "27c1590a32749de0a5481ce897772547043e94bccba4bc0a7edb3d8513e401ec"
+SRC_URI[md5sum] = "101b04fb0184f9a0c718d450c056d68c"
+SRC_URI[sha256sum] = "4954681fa5c5ed95451d914de89de1263a5b35158b1ded1a8b870042c0d0df89"
 
 SRC_URI_append_class-native = " file://0001-Relocate-the-repository-directory-for-native-builds.patch"
 
-- 
2.17.1



^ permalink raw reply related	[flat|nested] 32+ messages in thread

* [PATCH 02/16] openssl10: update to 1.0.2q
  2018-11-22 15:41 [PATCH 01/16] gobject-introspection: update to 1.58.1 Alexander Kanavin
@ 2018-11-22 15:41 ` Alexander Kanavin
  2018-11-22 15:41 ` [PATCH 03/16] openssl: update to 1.1.1a Alexander Kanavin
                   ` (15 subsequent siblings)
  16 siblings, 0 replies; 32+ messages in thread
From: Alexander Kanavin @ 2018-11-22 15:41 UTC (permalink / raw)
  To: openembedded-core

Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com>
---
 .../openssl10/0001-fix-CVE-2018-0734.patch    | 33 -------------------
 ...penssl10_1.0.2p.bb => openssl10_1.0.2q.bb} |  5 ++-
 2 files changed, 2 insertions(+), 36 deletions(-)
 delete mode 100644 meta/recipes-connectivity/openssl/openssl10/0001-fix-CVE-2018-0734.patch
 rename meta/recipes-connectivity/openssl/{openssl10_1.0.2p.bb => openssl10_1.0.2q.bb} (98%)

diff --git a/meta/recipes-connectivity/openssl/openssl10/0001-fix-CVE-2018-0734.patch b/meta/recipes-connectivity/openssl/openssl10/0001-fix-CVE-2018-0734.patch
deleted file mode 100644
index b9865a69b5f..00000000000
--- a/meta/recipes-connectivity/openssl/openssl10/0001-fix-CVE-2018-0734.patch
+++ /dev/null
@@ -1,33 +0,0 @@
-CVE: CVE-2018-0734
-
-Upstream-Status: Backport
-
-Signed-off-by: Kai Kang <kai.kang@windriver.com>
-
-From 43e6a58d4991a451daf4891ff05a48735df871ac Mon Sep 17 00:00:00 2001
-From: Pauli <paul.dale@oracle.com>
-Date: Mon, 29 Oct 2018 08:24:22 +1000
-Subject: [PATCH] Merge DSA reallocation timing fix CVE-2018-0734.
-
-Reviewed-by: Richard Levitte <levitte@openssl.org>
-(Merged from https://github.com/openssl/openssl/pull/7513)
----
- crypto/dsa/dsa_ossl.c | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
-diff --git a/crypto/dsa/dsa_ossl.c b/crypto/dsa/dsa_ossl.c
-index 2dcfedeeee..100e269268 100644
---- a/crypto/dsa/dsa_ossl.c
-+++ b/crypto/dsa/dsa_ossl.c
-@@ -279,7 +279,7 @@ static int dsa_sign_setup(DSA *dsa, BN_CTX *ctx_in, BIGNUM **kinvp,
-         goto err;
- 
-     /* Preallocate space */
--    q_bits = BN_num_bits(dsa->q);
-+    q_bits = BN_num_bits(dsa->q) + sizeof(dsa->q->d[0]) * 16;
-     if (!BN_set_bit(&k, q_bits)
-         || !BN_set_bit(&l, q_bits)
-         || !BN_set_bit(&m, q_bits))
--- 
-2.17.0
-
diff --git a/meta/recipes-connectivity/openssl/openssl10_1.0.2p.bb b/meta/recipes-connectivity/openssl/openssl10_1.0.2q.bb
similarity index 98%
rename from meta/recipes-connectivity/openssl/openssl10_1.0.2p.bb
rename to meta/recipes-connectivity/openssl/openssl10_1.0.2q.bb
index 43259407010..8058b98677a 100644
--- a/meta/recipes-connectivity/openssl/openssl10_1.0.2p.bb
+++ b/meta/recipes-connectivity/openssl/openssl10_1.0.2q.bb
@@ -40,7 +40,6 @@ SRC_URI = "http://www.openssl.org/source/openssl-${PV}.tar.gz \
            file://0001-Fix-build-with-clang-using-external-assembler.patch \
            file://0001-openssl-force-soft-link-to-avoid-rare-race.patch \
            file://0001-allow-manpages-to-be-disabled.patch \
-           file://0001-fix-CVE-2018-0734.patch \
            "
 
 SRC_URI_append_class-target = " \
@@ -52,8 +51,8 @@ SRC_URI_append_class-nativesdk = " \
            file://environment.d-openssl.sh \
            "
 
-SRC_URI[md5sum] = "ac5eb30bf5798aa14b1ae6d0e7da58df"
-SRC_URI[sha256sum] = "50a98e07b1a89eb8f6a99477f262df71c6fa7bef77df4dc83025a2845c827d00"
+SRC_URI[md5sum] = "7563e1ce046cb21948eeb6ba1a0eb71c"
+SRC_URI[sha256sum] = "5744cfcbcec2b1b48629f7354203bc1e5e9b5466998bbccc5b5fcde3b18eb684"
 
 S = "${WORKDIR}/openssl-${PV}"
 
-- 
2.17.1



^ permalink raw reply related	[flat|nested] 32+ messages in thread

* [PATCH 03/16] openssl: update to 1.1.1a
  2018-11-22 15:41 [PATCH 01/16] gobject-introspection: update to 1.58.1 Alexander Kanavin
  2018-11-22 15:41 ` [PATCH 02/16] openssl10: update to 1.0.2q Alexander Kanavin
@ 2018-11-22 15:41 ` Alexander Kanavin
  2018-11-23 23:36   ` Richard Purdie
  2018-11-22 15:41 ` [PATCH 04/16] dmidecode: update to 3.2 Alexander Kanavin
                   ` (14 subsequent siblings)
  16 siblings, 1 reply; 32+ messages in thread
From: Alexander Kanavin @ 2018-11-22 15:41 UTC (permalink / raw)
  To: openembedded-core

Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com>
---
 .../openssl/0002-fix-CVE-2018-0734.patch      | 108 ------------------
 .../openssl/0003-fix-CVE-2018-0735.patch      |  50 --------
 .../{openssl_1.1.1.bb => openssl_1.1.1a.bb}   |   6 +-
 3 files changed, 2 insertions(+), 162 deletions(-)
 delete mode 100644 meta/recipes-connectivity/openssl/openssl/0002-fix-CVE-2018-0734.patch
 delete mode 100644 meta/recipes-connectivity/openssl/openssl/0003-fix-CVE-2018-0735.patch
 rename meta/recipes-connectivity/openssl/{openssl_1.1.1.bb => openssl_1.1.1a.bb} (96%)

diff --git a/meta/recipes-connectivity/openssl/openssl/0002-fix-CVE-2018-0734.patch b/meta/recipes-connectivity/openssl/openssl/0002-fix-CVE-2018-0734.patch
deleted file mode 100644
index 2a3e03fe2af..00000000000
--- a/meta/recipes-connectivity/openssl/openssl/0002-fix-CVE-2018-0734.patch
+++ /dev/null
@@ -1,108 +0,0 @@
-Backport patch to fix CVE-2018-0734. Remove a section which only remove a
-space. It can't be applied because the context is different.
-
-CVE: CVE-2018-0734
-Upstream-Status: Backport
-
-Signed-off-by: Kai Kang <kai.kang@windriver.com>
-
-From 8abfe72e8c1de1b95f50aa0d9134803b4d00070f Mon Sep 17 00:00:00 2001
-From: Pauli <paul.dale@oracle.com>
-Date: Wed, 24 Oct 2018 07:42:46 +1000
-Subject: [PATCH] Timing vulnerability in DSA signature generation
- (CVE-2018-0734).
-
-Avoid a timing attack that leaks information via a side channel that
-triggers when a BN is resized.  Increasing the size of the BNs
-prior to doing anything with them suppresses the attack.
-
-Thanks due to Samuel Weiser for finding and locating this.
-
-Reviewed-by: Bernd Edlinger <bernd.edlinger@hotmail.de>
-(Merged from https://github.com/openssl/openssl/pull/7486)
-
-(cherry picked from commit a9cfb8c2aa7254a4aa6a1716909e3f8cb78049b6)
----
- crypto/dsa/dsa_ossl.c | 28 +++++++++++++++-------------
- 1 file changed, 15 insertions(+), 13 deletions(-)
-
-diff --git a/crypto/dsa/dsa_ossl.c b/crypto/dsa/dsa_ossl.c
-index ca20811200..2dd2d7489a 100644
---- a/crypto/dsa/dsa_ossl.c
-+++ b/crypto/dsa/dsa_ossl.c
-@@ -9,6 +9,7 @@
- 
- #include <stdio.h>
- #include "internal/cryptlib.h"
-+#include "internal/bn_int.h"
- #include <openssl/bn.h>
- #include <openssl/sha.h>
- #include "dsa_locl.h"
-@@ -180,9 +181,9 @@ static int dsa_sign_setup(DSA *dsa, BN_CTX *ctx_in,
- {
-     BN_CTX *ctx = NULL;
-     BIGNUM *k, *kinv = NULL, *r = *rp;
--    BIGNUM *l, *m;
-+    BIGNUM *l;
-     int ret = 0;
--    int q_bits;
-+    int q_bits, q_words;
- 
-     if (!dsa->p || !dsa->q || !dsa->g) {
-         DSAerr(DSA_F_DSA_SIGN_SETUP, DSA_R_MISSING_PARAMETERS);
-@@ -191,8 +192,7 @@ static int dsa_sign_setup(DSA *dsa, BN_CTX *ctx_in,
- 
-     k = BN_new();
-     l = BN_new();
--    m = BN_new();
--    if (k == NULL || l == NULL || m == NULL)
-+    if (k == NULL || l == NULL)
-         goto err;
- 
-     if (ctx_in == NULL) {
-@@ -203,9 +203,9 @@ static int dsa_sign_setup(DSA *dsa, BN_CTX *ctx_in,
- 
-     /* Preallocate space */
-     q_bits = BN_num_bits(dsa->q);
--    if (!BN_set_bit(k, q_bits)
--        || !BN_set_bit(l, q_bits)
--        || !BN_set_bit(m, q_bits))
-+    q_words = bn_get_top(dsa->q);
-+    if (!bn_wexpand(k, q_words + 2)
-+        || !bn_wexpand(l, q_words + 2))
-         goto err;
- 
-     /* Get random k */
-@@ -240,14 +240,17 @@ static int dsa_sign_setup(DSA *dsa, BN_CTX *ctx_in,
-      * small timing information leakage.  We then choose the sum that is
-      * one bit longer than the modulus.
-      *
--     * TODO: revisit the BN_copy aiming for a memory access agnostic
--     * conditional copy.
-+     * There are some concerns about the efficacy of doing this.  More
-+     * specificly refer to the discussion starting with:
-+     *     https://github.com/openssl/openssl/pull/7486#discussion_r228323705
-+     * The fix is to rework BN so these gymnastics aren't required.
-      */
-     if (!BN_add(l, k, dsa->q)
--        || !BN_add(m, l, dsa->q)
--        || !BN_copy(k, BN_num_bits(l) > q_bits ? l : m))
-+        || !BN_add(k, l, dsa->q))
-         goto err;
- 
-+    BN_consttime_swap(BN_is_bit_set(l, q_bits), k, l, q_words + 2);
-+
-     if ((dsa)->meth->bn_mod_exp != NULL) {
-             if (!dsa->meth->bn_mod_exp(dsa, r, dsa->g, k, dsa->p, ctx,
-                                        dsa->method_mont_p))
-@@ -275,7 +278,6 @@ static int dsa_sign_setup(DSA *dsa, BN_CTX *ctx_in,
-         BN_CTX_free(ctx);
-     BN_clear_free(k);
-     BN_clear_free(l);
--    BN_clear_free(m);
-     return ret;
- }
- 
--- 
-2.17.0
-
diff --git a/meta/recipes-connectivity/openssl/openssl/0003-fix-CVE-2018-0735.patch b/meta/recipes-connectivity/openssl/openssl/0003-fix-CVE-2018-0735.patch
deleted file mode 100644
index 736323f0ce6..00000000000
--- a/meta/recipes-connectivity/openssl/openssl/0003-fix-CVE-2018-0735.patch
+++ /dev/null
@@ -1,50 +0,0 @@
-CVE: CVE-2018-0735
-
-Upstream-Status: Backport
-
-Signed-off-by: Kai Kang <kai.kang@windriver.com>
-
-From b1d6d55ece1c26fa2829e2b819b038d7b6d692b4 Mon Sep 17 00:00:00 2001
-From: Pauli <paul.dale@oracle.com>
-Date: Fri, 26 Oct 2018 10:54:58 +1000
-Subject: [PATCH] Timing vulnerability in ECDSA signature generation
- (CVE-2018-0735)
-
-Preallocate an extra limb for some of the big numbers to avoid a reallocation
-that can potentially provide a side channel.
-
-Reviewed-by: Bernd Edlinger <bernd.edlinger@hotmail.de>
-(Merged from https://github.com/openssl/openssl/pull/7486)
-
-(cherry picked from commit 99540ec79491f59ed8b46b4edf130e17dc907f52)
----
- crypto/ec/ec_mult.c | 6 +++---
- 1 file changed, 3 insertions(+), 3 deletions(-)
-
-diff --git a/crypto/ec/ec_mult.c b/crypto/ec/ec_mult.c
-index 7e1b3650e7..0e0a5e1394 100644
---- a/crypto/ec/ec_mult.c
-+++ b/crypto/ec/ec_mult.c
-@@ -206,8 +206,8 @@ int ec_scalar_mul_ladder(const EC_GROUP *group, EC_POINT *r,
-      */
-     cardinality_bits = BN_num_bits(cardinality);
-     group_top = bn_get_top(cardinality);
--    if ((bn_wexpand(k, group_top + 1) == NULL)
--        || (bn_wexpand(lambda, group_top + 1) == NULL)) {
-+    if ((bn_wexpand(k, group_top + 2) == NULL)
-+        || (bn_wexpand(lambda, group_top + 2) == NULL)) {
-         ECerr(EC_F_EC_SCALAR_MUL_LADDER, ERR_R_BN_LIB);
-         goto err;
-     }
-@@ -244,7 +244,7 @@ int ec_scalar_mul_ladder(const EC_GROUP *group, EC_POINT *r,
-      * k := scalar + 2*cardinality
-      */
-     kbit = BN_is_bit_set(lambda, cardinality_bits);
--    BN_consttime_swap(kbit, k, lambda, group_top + 1);
-+    BN_consttime_swap(kbit, k, lambda, group_top + 2);
- 
-     group_top = bn_get_top(group->field);
-     if ((bn_wexpand(s->X, group_top) == NULL)
--- 
-2.17.0
-
diff --git a/meta/recipes-connectivity/openssl/openssl_1.1.1.bb b/meta/recipes-connectivity/openssl/openssl_1.1.1a.bb
similarity index 96%
rename from meta/recipes-connectivity/openssl/openssl_1.1.1.bb
rename to meta/recipes-connectivity/openssl/openssl_1.1.1a.bb
index 1234b64b864..be31e9f76ac 100644
--- a/meta/recipes-connectivity/openssl/openssl_1.1.1.bb
+++ b/meta/recipes-connectivity/openssl/openssl_1.1.1a.bb
@@ -15,8 +15,6 @@ SRC_URI = "http://www.openssl.org/source/openssl-${PV}.tar.gz \
            file://run-ptest \
            file://openssl-c_rehash.sh \
            file://0001-skip-test_symbol_presence.patch \
-           file://0002-fix-CVE-2018-0734.patch \
-           file://0003-fix-CVE-2018-0735.patch \
            file://0001-buildinfo-strip-sysroot-and-debug-prefix-map-from-co.patch \
            "
 
@@ -24,8 +22,8 @@ SRC_URI_append_class-nativesdk = " \
            file://environment.d-openssl.sh \
            "
 
-SRC_URI[md5sum] = "7079eb017429e0ffb9efb42bf80ccb21"
-SRC_URI[sha256sum] = "2836875a0f89c03d0fdf483941512613a50cfb421d6fd94b9f41d7279d586a3d"
+SRC_URI[md5sum] = "963deb2272d6be7d4c2458afd2517b73"
+SRC_URI[sha256sum] = "fc20130f8b7cbd2fb918b2f14e2f429e109c31ddd0fb38fc5d71d9ffed3f9f41"
 
 inherit lib_package multilib_header ptest
 
-- 
2.17.1



^ permalink raw reply related	[flat|nested] 32+ messages in thread

* [PATCH 04/16] dmidecode: update to 3.2
  2018-11-22 15:41 [PATCH 01/16] gobject-introspection: update to 1.58.1 Alexander Kanavin
  2018-11-22 15:41 ` [PATCH 02/16] openssl10: update to 1.0.2q Alexander Kanavin
  2018-11-22 15:41 ` [PATCH 03/16] openssl: update to 1.1.1a Alexander Kanavin
@ 2018-11-22 15:41 ` Alexander Kanavin
  2018-11-22 15:41 ` [PATCH 05/16] tiff: update to 4.0.10 Alexander Kanavin
                   ` (13 subsequent siblings)
  16 siblings, 0 replies; 32+ messages in thread
From: Alexander Kanavin @ 2018-11-22 15:41 UTC (permalink / raw)
  To: openembedded-core

Also, replace a sed hack with a proper patch.

Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com>
---
 ...mitting-changes-from-do_unpack_extra.patch | 24 +++++++++++++++++++
 .../{dmidecode_3.1.bb => dmidecode_3.2.bb}    | 13 ++++------
 2 files changed, 29 insertions(+), 8 deletions(-)
 create mode 100644 meta/recipes-devtools/dmidecode/dmidecode/0001-Committing-changes-from-do_unpack_extra.patch
 rename meta/recipes-devtools/dmidecode/{dmidecode_3.1.bb => dmidecode_3.2.bb} (60%)

diff --git a/meta/recipes-devtools/dmidecode/dmidecode/0001-Committing-changes-from-do_unpack_extra.patch b/meta/recipes-devtools/dmidecode/dmidecode/0001-Committing-changes-from-do_unpack_extra.patch
new file mode 100644
index 00000000000..c9b19182ddf
--- /dev/null
+++ b/meta/recipes-devtools/dmidecode/dmidecode/0001-Committing-changes-from-do_unpack_extra.patch
@@ -0,0 +1,24 @@
+From 00a3ace35d66e7ae60046e254a4d00f0f9c1abe2 Mon Sep 17 00:00:00 2001
+From: OpenEmbedded <oe.patch@oe>
+Date: Thu, 22 Nov 2018 12:05:04 +0000
+Subject: [PATCH] Do not install to /usr/local
+
+Upstream-Status: Inappropriate
+Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com>
+---
+ Makefile | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/Makefile b/Makefile
+index 77c9310..fc378fd 100644
+--- a/Makefile
++++ b/Makefile
+@@ -30,7 +30,7 @@ CFLAGS += -O2
+ LDFLAGS =
+ 
+ DESTDIR =
+-prefix  = /usr/local
++prefix  = /usr
+ sbindir = $(prefix)/sbin
+ mandir  = $(prefix)/share/man
+ man8dir = $(mandir)/man8
diff --git a/meta/recipes-devtools/dmidecode/dmidecode_3.1.bb b/meta/recipes-devtools/dmidecode/dmidecode_3.2.bb
similarity index 60%
rename from meta/recipes-devtools/dmidecode/dmidecode_3.1.bb
rename to meta/recipes-devtools/dmidecode/dmidecode_3.2.bb
index b423fda6d24..63f4061cb7e 100644
--- a/meta/recipes-devtools/dmidecode/dmidecode_3.1.bb
+++ b/meta/recipes-devtools/dmidecode/dmidecode_3.2.bb
@@ -3,7 +3,9 @@ HOMEPAGE = "http://www.nongnu.org/dmidecode/"
 LICENSE = "GPLv2"
 LIC_FILES_CHKSUM = "file://LICENSE;md5=b234ee4d69f5fce4486a80fdaf4a4263"
 
-SRC_URI = "${SAVANNAH_NONGNU_MIRROR}/dmidecode/${BP}.tar.xz"
+SRC_URI = "${SAVANNAH_NONGNU_MIRROR}/dmidecode/${BP}.tar.xz \
+           file://0001-Committing-changes-from-do_unpack_extra.patch \
+           "
 
 COMPATIBLE_HOST = "(i.86|x86_64|aarch64|arm|powerpc|powerpc64).*-linux"
 
@@ -17,11 +19,6 @@ do_install() {
 	oe_runmake DESTDIR="${D}" install
 }
 
-do_unpack_extra() {
-	sed -i -e '/^prefix/s:/usr/local:${exec_prefix}:' ${S}/Makefile
-}
-addtask unpack_extra after do_unpack before do_patch
-
-SRC_URI[md5sum] = "679c2c015c515aa6ca5f229aee49c102"
-SRC_URI[sha256sum] = "d766ce9b25548c59b1e7e930505b4cad9a7bb0b904a1a391fbb604d529781ac0"
+SRC_URI[md5sum] = "9cc2e27e74ade740a25b1aaf0412461b"
+SRC_URI[sha256sum] = "077006fa2da0d06d6383728112f2edef9684e9c8da56752e97cd45a11f838edd"
 
-- 
2.17.1



^ permalink raw reply related	[flat|nested] 32+ messages in thread

* [PATCH 05/16] tiff: update to 4.0.10
  2018-11-22 15:41 [PATCH 01/16] gobject-introspection: update to 1.58.1 Alexander Kanavin
                   ` (2 preceding siblings ...)
  2018-11-22 15:41 ` [PATCH 04/16] dmidecode: update to 3.2 Alexander Kanavin
@ 2018-11-22 15:41 ` Alexander Kanavin
  2018-11-22 15:41 ` [PATCH 06/16] gdbm: update to 1.18.1 Alexander Kanavin
                   ` (12 subsequent siblings)
  16 siblings, 0 replies; 32+ messages in thread
From: Alexander Kanavin @ 2018-11-22 15:41 UTC (permalink / raw)
  To: openembedded-core

Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com>
---
 .../libtiff/files/CVE-2017-17095.patch        |  46 -----
 .../libtiff/files/CVE-2017-18013.patch        |  42 -----
 .../libtiff/files/CVE-2017-9935.patch         | 160 ----------------
 .../libtiff/files/CVE-2018-10963.patch        |  39 ----
 .../libtiff/files/CVE-2018-5784.patch         | 135 -------------
 .../libtiff/files/CVE-2018-7456.patch         | 178 ------------------
 .../libtiff/files/CVE-2018-8905.patch         |  61 ------
 .../libtiff/files/libtool2.patch              |  19 +-
 .../libtiff/{tiff_4.0.9.bb => tiff_4.0.10.bb} |  15 +-
 9 files changed, 16 insertions(+), 679 deletions(-)
 delete mode 100644 meta/recipes-multimedia/libtiff/files/CVE-2017-17095.patch
 delete mode 100644 meta/recipes-multimedia/libtiff/files/CVE-2017-18013.patch
 delete mode 100644 meta/recipes-multimedia/libtiff/files/CVE-2017-9935.patch
 delete mode 100644 meta/recipes-multimedia/libtiff/files/CVE-2018-10963.patch
 delete mode 100644 meta/recipes-multimedia/libtiff/files/CVE-2018-5784.patch
 delete mode 100644 meta/recipes-multimedia/libtiff/files/CVE-2018-7456.patch
 delete mode 100644 meta/recipes-multimedia/libtiff/files/CVE-2018-8905.patch
 rename meta/recipes-multimedia/libtiff/{tiff_4.0.9.bb => tiff_4.0.10.bb} (80%)

diff --git a/meta/recipes-multimedia/libtiff/files/CVE-2017-17095.patch b/meta/recipes-multimedia/libtiff/files/CVE-2017-17095.patch
deleted file mode 100644
index 9b9962ed352..00000000000
--- a/meta/recipes-multimedia/libtiff/files/CVE-2017-17095.patch
+++ /dev/null
@@ -1,46 +0,0 @@
-From 9171da596c88e6a2dadcab4a3a89dddd6e1b4655 Mon Sep 17 00:00:00 2001
-From: Nathan Baker <elitebadger@gmail.com>
-Date: Thu, 25 Jan 2018 21:28:15 +0000
-Subject: [PATCH] Add workaround to pal2rgb buffer overflow.
-
-CVE: CVE-2017-17095
-
-Upstream-Status: Backport (unchanged) [gitlab.com/libtiff/libtiff/commit/9171da5...]
-
-Signed-off-by: Joe Slater <joe.slater@windriver.com.
-
----
- tools/pal2rgb.c |   17 +++++++++++++++--
- 1 file changed, 15 insertions(+), 2 deletions(-)
-
-diff --git a/tools/pal2rgb.c b/tools/pal2rgb.c
-index 0423598..01fcf94 100644
---- a/tools/pal2rgb.c
-+++ b/tools/pal2rgb.c
-@@ -182,8 +182,21 @@ main(int argc, char* argv[])
- 	{ unsigned char *ibuf, *obuf;
- 	  register unsigned char* pp;
- 	  register uint32 x;
--	  ibuf = (unsigned char*)_TIFFmalloc(TIFFScanlineSize(in));
--	  obuf = (unsigned char*)_TIFFmalloc(TIFFScanlineSize(out));
-+	  tmsize_t tss_in = TIFFScanlineSize(in);
-+	  tmsize_t tss_out = TIFFScanlineSize(out);
-+	  if (tss_out / tss_in < 3) {
-+		/*
-+		 * BUG 2750: The following code does not know about chroma
-+		 * subsampling of JPEG data. It assumes that the output buffer is 3x
-+		 * the length of the input buffer due to exploding the palette into
-+		 * RGB tuples. If this assumption is incorrect, it could lead to a
-+		 * buffer overflow. Go ahead and fail now to prevent that.
-+		 */
-+		fprintf(stderr, "Could not determine correct image size for output. Exiting.\n");
-+		return -1;
-+      }
-+	  ibuf = (unsigned char*)_TIFFmalloc(tss_in);
-+	  obuf = (unsigned char*)_TIFFmalloc(tss_out);
- 	  switch (config) {
- 	  case PLANARCONFIG_CONTIG:
- 		for (row = 0; row < imagelength; row++) {
--- 
-1.7.9.5
-
diff --git a/meta/recipes-multimedia/libtiff/files/CVE-2017-18013.patch b/meta/recipes-multimedia/libtiff/files/CVE-2017-18013.patch
deleted file mode 100644
index 878e0de9597..00000000000
--- a/meta/recipes-multimedia/libtiff/files/CVE-2017-18013.patch
+++ /dev/null
@@ -1,42 +0,0 @@
-From 293c8b0298e91d20ba51291e2351ab7d110671d0 Mon Sep 17 00:00:00 2001
-From: Even Rouault <even.rouault@spatialys.com>
-Date: Sun, 31 Dec 2017 15:09:41 +0100
-Subject: [PATCH] libtiff/tif_print.c: TIFFPrintDirectory(): fix null pointer
- dereference on corrupted file. Fixes
- http://bugzilla.maptools.org/show_bug.cgi?id=2770
-
-Upstream-Status: Backport
-[https://gitlab.com/libtiff/libtiff/commit/c6f41df7b581402dfba3c19a1e3df4454c551a01]
-
-CVE: CVE-2017-18013
-
-Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
----
- libtiff/tif_print.c | 8 ++++----
- 1 file changed, 4 insertions(+), 4 deletions(-)
-
-diff --git a/libtiff/tif_print.c b/libtiff/tif_print.c
-index 24d4b98..f494cfb 100644
---- a/libtiff/tif_print.c
-+++ b/libtiff/tif_print.c
-@@ -667,13 +667,13 @@ TIFFPrintDirectory(TIFF* tif, FILE* fd, long flags)
- #if defined(__WIN32__) && (defined(_MSC_VER) || defined(__MINGW32__))
- 			fprintf(fd, "    %3lu: [%8I64u, %8I64u]\n",
- 			    (unsigned long) s,
--			    (unsigned __int64) td->td_stripoffset[s],
--			    (unsigned __int64) td->td_stripbytecount[s]);
-+			    td->td_stripoffset ? (unsigned __int64) td->td_stripoffset[s] : 0,
-+			    td->td_stripbytecount ? (unsigned __int64) td->td_stripbytecount[s] : 0);
- #else
- 			fprintf(fd, "    %3lu: [%8llu, %8llu]\n",
- 			    (unsigned long) s,
--			    (unsigned long long) td->td_stripoffset[s],
--			    (unsigned long long) td->td_stripbytecount[s]);
-+			    td->td_stripoffset ? (unsigned long long) td->td_stripoffset[s] : 0,
-+			    td->td_stripbytecount ? (unsigned long long) td->td_stripbytecount[s] : 0);
- #endif
- 	}
- }
--- 
-2.7.4
-
diff --git a/meta/recipes-multimedia/libtiff/files/CVE-2017-9935.patch b/meta/recipes-multimedia/libtiff/files/CVE-2017-9935.patch
deleted file mode 100644
index 60684dd2a68..00000000000
--- a/meta/recipes-multimedia/libtiff/files/CVE-2017-9935.patch
+++ /dev/null
@@ -1,160 +0,0 @@
-From abb0055d21c52a9925314d5b0628fb2b6307619c Mon Sep 17 00:00:00 2001
-From: Brian May <brian@linuxpenguins.xyz>
-Date: Thu, 7 Dec 2017 07:46:47 +1100
-Subject: [PATCH] tiff2pdf: Fix CVE-2017-9935
-
-Fix for http://bugzilla.maptools.org/show_bug.cgi?id=2704
-
-This vulnerability - at least for the supplied test case - is because we
-assume that a tiff will only have one transfer function that is the same
-for all pages. This is not required by the TIFF standards.
-
-We than read the transfer function for every page.  Depending on the
-transfer function, we allocate either 2 or 4 bytes to the XREF buffer.
-We allocate this memory after we read in the transfer function for the
-page.
-
-For the first exploit - POC1, this file has 3 pages. For the first page
-we allocate 2 extra extra XREF entries. Then for the next page 2 more
-entries. Then for the last page the transfer function changes and we
-allocate 4 more entries.
-
-When we read the file into memory, we assume we have 4 bytes extra for
-each and every page (as per the last transfer function we read). Which
-is not correct, we only have 2 bytes extra for the first 2 pages. As a
-result, we end up writing past the end of the buffer.
-
-There are also some related issues that this also fixes. For example,
-TIFFGetField can return uninitalized pointer values, and the logic to
-detect a N=3 vs N=1 transfer function seemed rather strange.
-
-It is also strange that we declare the transfer functions to be of type
-float, when the standard says they are unsigned 16 bit values. This is
-fixed in another patch.
-
-This patch will check to ensure that the N value for every transfer
-function is the same for every page. If this changes, we abort with an
-error. In theory, we should perhaps check that the transfer function
-itself is identical for every page, however we don't do that due to the
-confusion of the type of the data in the transfer function.
-
-Upstream-Status: Backport
-[https://gitlab.com/libtiff/libtiff/commit/3dd8f6a357981a4090f126ab9025056c938b6940]
-
-CVE: CVE-2017-9935
-
-Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
----
- libtiff/tif_dir.c |  3 +++
- tools/tiff2pdf.c  | 65 +++++++++++++++++++++++++++++++++++++------------------
- 2 files changed, 47 insertions(+), 21 deletions(-)
-
-diff --git a/libtiff/tif_dir.c b/libtiff/tif_dir.c
-index f00f808..c36a5f3 100644
---- a/libtiff/tif_dir.c
-+++ b/libtiff/tif_dir.c
-@@ -1067,6 +1067,9 @@ _TIFFVGetField(TIFF* tif, uint32 tag, va_list ap)
- 			if (td->td_samplesperpixel - td->td_extrasamples > 1) {
- 				*va_arg(ap, uint16**) = td->td_transferfunction[1];
- 				*va_arg(ap, uint16**) = td->td_transferfunction[2];
-+			} else {
-+				*va_arg(ap, uint16**) = NULL;
-+				*va_arg(ap, uint16**) = NULL;
- 			}
- 			break;
- 		case TIFFTAG_REFERENCEBLACKWHITE:
-diff --git a/tools/tiff2pdf.c b/tools/tiff2pdf.c
-index 454befb..0b5973e 100644
---- a/tools/tiff2pdf.c
-+++ b/tools/tiff2pdf.c
-@@ -1047,6 +1047,8 @@ void t2p_read_tiff_init(T2P* t2p, TIFF* input){
- 	uint16 pagen=0;
- 	uint16 paged=0;
- 	uint16 xuint16=0;
-+	uint16 tiff_transferfunctioncount=0;
-+	float* tiff_transferfunction[3];
- 
- 	directorycount=TIFFNumberOfDirectories(input);
- 	t2p->tiff_pages = (T2P_PAGE*) _TIFFmalloc(TIFFSafeMultiply(tmsize_t,directorycount,sizeof(T2P_PAGE)));
-@@ -1147,26 +1149,48 @@ void t2p_read_tiff_init(T2P* t2p, TIFF* input){
-                 }
- #endif
- 		if (TIFFGetField(input, TIFFTAG_TRANSFERFUNCTION,
--                                 &(t2p->tiff_transferfunction[0]),
--                                 &(t2p->tiff_transferfunction[1]),
--                                 &(t2p->tiff_transferfunction[2]))) {
--			if((t2p->tiff_transferfunction[1] != (float*) NULL) &&
--                           (t2p->tiff_transferfunction[2] != (float*) NULL) &&
--                           (t2p->tiff_transferfunction[1] !=
--                            t2p->tiff_transferfunction[0])) {
--				t2p->tiff_transferfunctioncount = 3;
--				t2p->tiff_pages[i].page_extra += 4;
--				t2p->pdf_xrefcount += 4;
--			} else {
--				t2p->tiff_transferfunctioncount = 1;
--				t2p->tiff_pages[i].page_extra += 2;
--				t2p->pdf_xrefcount += 2;
--			}
--			if(t2p->pdf_minorversion < 2)
--				t2p->pdf_minorversion = 2;
-+                                 &(tiff_transferfunction[0]),
-+                                 &(tiff_transferfunction[1]),
-+                                 &(tiff_transferfunction[2]))) {
-+
-+                        if((tiff_transferfunction[1] != (float*) NULL) &&
-+                           (tiff_transferfunction[2] != (float*) NULL)
-+                          ) {
-+                            tiff_transferfunctioncount=3;
-+                        } else {
-+                            tiff_transferfunctioncount=1;
-+                        }
-                 } else {
--			t2p->tiff_transferfunctioncount=0;
-+			tiff_transferfunctioncount=0;
- 		}
-+
-+                if (i > 0){
-+                    if (tiff_transferfunctioncount != t2p->tiff_transferfunctioncount){
-+                        TIFFError(
-+                            TIFF2PDF_MODULE,
-+                            "Different transfer function on page %d",
-+                            i);
-+                        t2p->t2p_error = T2P_ERR_ERROR;
-+                        return;
-+                    }
-+                }
-+
-+                t2p->tiff_transferfunctioncount = tiff_transferfunctioncount;
-+                t2p->tiff_transferfunction[0] = tiff_transferfunction[0];
-+                t2p->tiff_transferfunction[1] = tiff_transferfunction[1];
-+                t2p->tiff_transferfunction[2] = tiff_transferfunction[2];
-+                if(tiff_transferfunctioncount == 3){
-+                        t2p->tiff_pages[i].page_extra += 4;
-+                        t2p->pdf_xrefcount += 4;
-+                        if(t2p->pdf_minorversion < 2)
-+                                t2p->pdf_minorversion = 2;
-+                } else if (tiff_transferfunctioncount == 1){
-+                        t2p->tiff_pages[i].page_extra += 2;
-+                        t2p->pdf_xrefcount += 2;
-+                        if(t2p->pdf_minorversion < 2)
-+                                t2p->pdf_minorversion = 2;
-+                }
-+
- 		if( TIFFGetField(
- 			input, 
- 			TIFFTAG_ICCPROFILE, 
-@@ -1828,9 +1852,8 @@ void t2p_read_tiff_data(T2P* t2p, TIFF* input){
- 			 &(t2p->tiff_transferfunction[1]),
- 			 &(t2p->tiff_transferfunction[2]))) {
- 		if((t2p->tiff_transferfunction[1] != (float*) NULL) &&
--                   (t2p->tiff_transferfunction[2] != (float*) NULL) &&
--                   (t2p->tiff_transferfunction[1] !=
--                    t2p->tiff_transferfunction[0])) {
-+                   (t2p->tiff_transferfunction[2] != (float*) NULL)
-+                  ) {
- 			t2p->tiff_transferfunctioncount=3;
- 		} else {
- 			t2p->tiff_transferfunctioncount=1;
--- 
-2.7.4
-
diff --git a/meta/recipes-multimedia/libtiff/files/CVE-2018-10963.patch b/meta/recipes-multimedia/libtiff/files/CVE-2018-10963.patch
deleted file mode 100644
index 7252298b520..00000000000
--- a/meta/recipes-multimedia/libtiff/files/CVE-2018-10963.patch
+++ /dev/null
@@ -1,39 +0,0 @@
-From de144fd228e4be8aa484c3caf3d814b6fa88c6d9 Mon Sep 17 00:00:00 2001
-From: Even Rouault <even.rouault@spatialys.com>
-Date: Sat, 12 May 2018 14:24:15 +0200
-Subject: [PATCH] TIFFWriteDirectorySec: avoid assertion. Fixes
- http://bugzilla.maptools.org/show_bug.cgi?id=2795.
- CVE-2018-10963
-
----
-CVE: CVE-2018-10963
-
-Upstream-Status: Backport [gitlab.com/libtiff/libtiff/commit/de144f...]
-
-Signed-off-by: Joe Slater <joe.slater@windriver.com>
-
----
- libtiff/tif_dirwrite.c |    7 +++++--
- 1 file changed, 5 insertions(+), 2 deletions(-)
-
-diff --git a/libtiff/tif_dirwrite.c b/libtiff/tif_dirwrite.c
-index 2430de6..c15a28d 100644
---- a/libtiff/tif_dirwrite.c
-+++ b/libtiff/tif_dirwrite.c
-@@ -695,8 +695,11 @@ TIFFWriteDirectorySec(TIFF* tif, int isimage, int imagedone, uint64* pdiroff)
- 								}
- 								break;
- 							default:
--								assert(0);   /* we should never get here */
--								break;
-+								TIFFErrorExt(tif->tif_clientdata,module,
-+								            "Cannot write tag %d (%s)",
-+								            TIFFFieldTag(o),
-+                                                                            o->field_name ? o->field_name : "unknown");
-+								goto bad;
- 						}
- 					}
- 				}
--- 
-1.7.9.5
-
diff --git a/meta/recipes-multimedia/libtiff/files/CVE-2018-5784.patch b/meta/recipes-multimedia/libtiff/files/CVE-2018-5784.patch
deleted file mode 100644
index 406001d579a..00000000000
--- a/meta/recipes-multimedia/libtiff/files/CVE-2018-5784.patch
+++ /dev/null
@@ -1,135 +0,0 @@
-From 6cdea15213be6b67d9f8380c7bb40e325d3adace Mon Sep 17 00:00:00 2001
-From: Nathan Baker <nathanb@lenovo-chrome.com>
-Date: Tue, 6 Feb 2018 10:13:57 -0500
-Subject: [PATCH] Fix for bug 2772
-
-It is possible to craft a TIFF document where the IFD list is circular,
-leading to an infinite loop while traversing the chain. The libtiff
-directory reader has a failsafe that will break out of this loop after
-reading 65535 directory entries, but it will continue processing,
-consuming time and resources to process what is essentially a bogus TIFF
-document.
-
-This change fixes the above behavior by breaking out of processing when
-a TIFF document has >= 65535 directories and terminating with an error.
-
-Upstream-Status: Backport
-[https://gitlab.com/libtiff/libtiff/commit/473851d211cf8805a161820337ca74cc9615d6ef]
-
-CVE: CVE-2018-5784
-
-Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
----
- contrib/addtiffo/tif_overview.c | 14 +++++++++++++-
- tools/tiff2pdf.c                | 10 ++++++++++
- tools/tiffcrop.c                | 13 +++++++++++--
- 3 files changed, 34 insertions(+), 3 deletions(-)
-
-diff --git a/contrib/addtiffo/tif_overview.c b/contrib/addtiffo/tif_overview.c
-index c61ffbb..03b3573 100644
---- a/contrib/addtiffo/tif_overview.c
-+++ b/contrib/addtiffo/tif_overview.c
-@@ -65,6 +65,8 @@
- #  define MAX(a,b)      ((a>b) ? a : b)
- #endif
- 
-+#define TIFF_DIR_MAX  65534
-+
- void TIFFBuildOverviews( TIFF *, int, int *, int, const char *,
-                          int (*)(double,void*), void * );
- 
-@@ -91,6 +93,7 @@ uint32 TIFF_WriteOverview( TIFF *hTIFF, uint32 nXSize, uint32 nYSize,
- {
-     toff_t	nBaseDirOffset;
-     toff_t	nOffset;
-+    tdir_t	iNumDir;
- 
-     (void) bUseSubIFDs;
- 
-@@ -147,7 +150,16 @@ uint32 TIFF_WriteOverview( TIFF *hTIFF, uint32 nXSize, uint32 nYSize,
-         return 0;
- 
-     TIFFWriteDirectory( hTIFF );
--    TIFFSetDirectory( hTIFF, (tdir_t) (TIFFNumberOfDirectories(hTIFF)-1) );
-+    iNumDir = TIFFNumberOfDirectories(hTIFF);
-+    if( iNumDir > TIFF_DIR_MAX )
-+    {
-+        TIFFErrorExt( TIFFClientdata(hTIFF),
-+                      "TIFF_WriteOverview",
-+                      "File `%s' has too many directories.\n",
-+                      TIFFFileName(hTIFF) );
-+        exit(-1);
-+    }
-+    TIFFSetDirectory( hTIFF, (tdir_t) (iNumDir - 1) );
- 
-     nOffset = TIFFCurrentDirOffset( hTIFF );
- 
-diff --git a/tools/tiff2pdf.c b/tools/tiff2pdf.c
-index 0b5973e..ef5d6a0 100644
---- a/tools/tiff2pdf.c
-+++ b/tools/tiff2pdf.c
-@@ -68,6 +68,8 @@ extern int getopt(int, char**, char*);
- 
- #define PS_UNIT_SIZE	72.0F
- 
-+#define TIFF_DIR_MAX    65534
-+
- /* This type is of PDF color spaces. */
- typedef enum {
- 	T2P_CS_BILEVEL = 0x01,	/* Bilevel, black and white */
-@@ -1051,6 +1053,14 @@ void t2p_read_tiff_init(T2P* t2p, TIFF* input){
- 	float* tiff_transferfunction[3];
- 
- 	directorycount=TIFFNumberOfDirectories(input);
-+	if(directorycount > TIFF_DIR_MAX) {
-+		TIFFError(
-+			TIFF2PDF_MODULE,
-+			"TIFF contains too many directories, %s",
-+			TIFFFileName(input));
-+		t2p->t2p_error = T2P_ERR_ERROR;
-+		return;
-+	}
- 	t2p->tiff_pages = (T2P_PAGE*) _TIFFmalloc(TIFFSafeMultiply(tmsize_t,directorycount,sizeof(T2P_PAGE)));
- 	if(t2p->tiff_pages==NULL){
- 		TIFFError(
-diff --git a/tools/tiffcrop.c b/tools/tiffcrop.c
-index c69177e..c60cb38 100644
---- a/tools/tiffcrop.c
-+++ b/tools/tiffcrop.c
-@@ -217,6 +217,8 @@ extern int getopt(int argc, char * const argv[], const char *optstring);
- #define DUMP_TEXT   1
- #define DUMP_RAW    2
- 
-+#define TIFF_DIR_MAX  65534
-+
- /* Offsets into buffer for margins and fixed width and length segments */
- struct offset {
-   uint32  tmargin;
-@@ -2233,7 +2235,7 @@ main(int argc, char* argv[])
-     pageNum = -1;
-   else
-     total_images = 0;
--  /* read multiple input files and write to output file(s) */
-+  /* Read multiple input files and write to output file(s) */
-   while (optind < argc - 1)
-     {
-     in = TIFFOpen (argv[optind], "r");
-@@ -2241,7 +2243,14 @@ main(int argc, char* argv[])
-       return (-3);
- 
-     /* If only one input file is specified, we can use directory count */
--    total_images = TIFFNumberOfDirectories(in); 
-+    total_images = TIFFNumberOfDirectories(in);
-+    if (total_images > TIFF_DIR_MAX)
-+      {
-+      TIFFError (TIFFFileName(in), "File contains too many directories");
-+      if (out != NULL)
-+        (void) TIFFClose(out);
-+      return (1);
-+      }
-     if (image_count == 0)
-       {
-       dirnum = 0;
--- 
-2.7.4
-
diff --git a/meta/recipes-multimedia/libtiff/files/CVE-2018-7456.patch b/meta/recipes-multimedia/libtiff/files/CVE-2018-7456.patch
deleted file mode 100644
index 2c11f93d138..00000000000
--- a/meta/recipes-multimedia/libtiff/files/CVE-2018-7456.patch
+++ /dev/null
@@ -1,178 +0,0 @@
-From be4c85b16e8801a16eec25e80eb9f3dd6a96731b Mon Sep 17 00:00:00 2001
-From: Hugo Lefeuvre <hle@debian.org>
-Date: Sun, 8 Apr 2018 14:07:08 -0400
-Subject: [PATCH] Fix NULL pointer dereference in TIFFPrintDirectory
-
-The TIFFPrintDirectory function relies on the following assumptions,
-supposed to be guaranteed by the specification:
-
-(a) A Transfer Function field is only present if the TIFF file has
-    photometric type < 3.
-
-(b) If SamplesPerPixel > Color Channels, then the ExtraSamples field
-    has count SamplesPerPixel - (Color Channels) and contains
-    information about supplementary channels.
-
-While respect of (a) and (b) are essential for the well functioning of
-TIFFPrintDirectory, no checks are realized neither by the callee nor
-by TIFFPrintDirectory itself. Hence, following scenarios might happen
-and trigger the NULL pointer dereference:
-
-(1) TIFF File of photometric type 4 or more has illegal Transfer
-    Function field.
-
-(2) TIFF File has photometric type 3 or less and defines a
-    SamplesPerPixel field such that SamplesPerPixel > Color Channels
-    without defining all extra samples in the ExtraSamples fields.
-
-In this patch, we address both issues with respect of the following
-principles:
-
-(A) In the case of (1), the defined transfer table should be printed
-    safely even if it isn't 'legal'. This allows us to avoid expensive
-    checks in TIFFPrintDirectory. Also, it is quite possible that
-    an alternative photometric type would be developed (not part of the
-    standard) and would allow definition of Transfer Table. We want
-    libtiff to be able to handle this scenario out of the box.
-
-(B) In the case of (2), the transfer table should be printed at its
-    right size, that is if TIFF file has photometric type Palette
-    then the transfer table should have one row and not three, even
-    if two extra samples are declared.
-
-In order to fulfill (A) we simply add a new 'i < 3' end condition to
-the broken TIFFPrintDirectory loop. This makes sure that in any case
-where (b) would be respected but not (a), everything stays fine.
-
-(B) is fulfilled by the loop condition
-'i < td->td_samplesperpixel - td->td_extrasamples'. This is enough as
-long as (b) is respected.
-
-Naturally, we also make sure (b) is respected. This is done in the
-TIFFReadDirectory function by making sure any non-color channel is
-counted in ExtraSamples.
-
-This commit addresses CVE-2018-7456.
-
----
-CVE: CVE-2018-7456
-
-Upstream-Status: Backport [gitlab.com/libtiff/libtiff/commit/be4c85b...]
-
-Signed-off-by: Joe Slater <joe.slater@windriver.com>
-
----
- libtiff/tif_dirread.c |   62 +++++++++++++++++++++++++++++++++++++++++++++++++
- libtiff/tif_print.c   |    2 +-
- 2 files changed, 63 insertions(+), 1 deletion(-)
-
-diff --git a/libtiff/tif_dirread.c b/libtiff/tif_dirread.c
-index 6baa7b3..af5b84a 100644
---- a/libtiff/tif_dirread.c
-+++ b/libtiff/tif_dirread.c
-@@ -165,6 +165,7 @@ static int TIFFFetchStripThing(TIFF* tif, TIFFDirEntry* dir, uint32 nstrips, uin
- static int TIFFFetchSubjectDistance(TIFF*, TIFFDirEntry*);
- static void ChopUpSingleUncompressedStrip(TIFF*);
- static uint64 TIFFReadUInt64(const uint8 *value);
-+static int _TIFFGetMaxColorChannels(uint16 photometric);
- 
- static int _TIFFFillStrilesInternal( TIFF *tif, int loadStripByteCount );
- 
-@@ -3505,6 +3506,35 @@ static void TIFFReadDirEntryOutputErr(TIFF* tif, enum TIFFReadDirEntryErr err, c
- }
- 
- /*
-+ * Return the maximum number of color channels specified for a given photometric
-+ * type. 0 is returned if photometric type isn't supported or no default value
-+ * is defined by the specification.
-+ */
-+static int _TIFFGetMaxColorChannels( uint16 photometric )
-+{
-+    switch (photometric) {
-+	case PHOTOMETRIC_PALETTE:
-+	case PHOTOMETRIC_MINISWHITE:
-+	case PHOTOMETRIC_MINISBLACK:
-+            return 1;
-+	case PHOTOMETRIC_YCBCR:
-+	case PHOTOMETRIC_RGB:
-+	case PHOTOMETRIC_CIELAB:
-+            return 3;
-+	case PHOTOMETRIC_SEPARATED:
-+	case PHOTOMETRIC_MASK:
-+            return 4;
-+	case PHOTOMETRIC_LOGL:
-+	case PHOTOMETRIC_LOGLUV:
-+	case PHOTOMETRIC_CFA:
-+	case PHOTOMETRIC_ITULAB:
-+	case PHOTOMETRIC_ICCLAB:
-+	default:
-+            return 0;
-+    }
-+}
-+
-+/*
-  * Read the next TIFF directory from a file and convert it to the internal
-  * format. We read directories sequentially.
-  */
-@@ -3520,6 +3550,7 @@ TIFFReadDirectory(TIFF* tif)
- 	uint32 fii=FAILED_FII;
-         toff_t nextdiroff;
-     int bitspersample_read = FALSE;
-+        int color_channels;
- 
- 	tif->tif_diroff=tif->tif_nextdiroff;
- 	if (!TIFFCheckDirOffset(tif,tif->tif_nextdiroff))
-@@ -4024,6 +4055,37 @@ TIFFReadDirectory(TIFF* tif)
- 			}
- 		}
- 	}
-+
-+	/*
-+	 * Make sure all non-color channels are extrasamples.
-+	 * If it's not the case, define them as such.
-+	 */
-+        color_channels = _TIFFGetMaxColorChannels(tif->tif_dir.td_photometric);
-+        if (color_channels && tif->tif_dir.td_samplesperpixel - tif->tif_dir.td_extrasamples > color_channels) {
-+                uint16 old_extrasamples;
-+                uint16 *new_sampleinfo;
-+
-+                TIFFWarningExt(tif->tif_clientdata,module, "Sum of Photometric type-related "
-+                    "color channels and ExtraSamples doesn't match SamplesPerPixel. "
-+                    "Defining non-color channels as ExtraSamples.");
-+
-+                old_extrasamples = tif->tif_dir.td_extrasamples;
-+                tif->tif_dir.td_extrasamples = (tif->tif_dir.td_samplesperpixel - color_channels);
-+
-+                // sampleinfo should contain information relative to these new extra samples
-+                new_sampleinfo = (uint16*) _TIFFcalloc(tif->tif_dir.td_extrasamples, sizeof(uint16));
-+                if (!new_sampleinfo) {
-+                    TIFFErrorExt(tif->tif_clientdata, module, "Failed to allocate memory for "
-+                                "temporary new sampleinfo array (%d 16 bit elements)",
-+                                tif->tif_dir.td_extrasamples);
-+                    goto bad;
-+                }
-+
-+                memcpy(new_sampleinfo, tif->tif_dir.td_sampleinfo, old_extrasamples * sizeof(uint16));
-+                _TIFFsetShortArray(&tif->tif_dir.td_sampleinfo, new_sampleinfo, tif->tif_dir.td_extrasamples);
-+                _TIFFfree(new_sampleinfo);
-+        }
-+
- 	/*
- 	 * Verify Palette image has a Colormap.
- 	 */
-diff --git a/libtiff/tif_print.c b/libtiff/tif_print.c
-index 8deceb2..1d86adb 100644
---- a/libtiff/tif_print.c
-+++ b/libtiff/tif_print.c
-@@ -544,7 +544,7 @@ TIFFPrintDirectory(TIFF* tif, FILE* fd, long flags)
- 				uint16 i;
- 				fprintf(fd, "    %2ld: %5u",
- 				    l, td->td_transferfunction[0][l]);
--				for (i = 1; i < td->td_samplesperpixel; i++)
-+				for (i = 1; i < td->td_samplesperpixel - td->td_extrasamples && i < 3; i++)
- 					fprintf(fd, " %5u",
- 					    td->td_transferfunction[i][l]);
- 				fputc('\n', fd);
--- 
-1.7.9.5
-
diff --git a/meta/recipes-multimedia/libtiff/files/CVE-2018-8905.patch b/meta/recipes-multimedia/libtiff/files/CVE-2018-8905.patch
deleted file mode 100644
index 962646dbe09..00000000000
--- a/meta/recipes-multimedia/libtiff/files/CVE-2018-8905.patch
+++ /dev/null
@@ -1,61 +0,0 @@
-From 58a898cb4459055bb488ca815c23b880c242a27d Mon Sep 17 00:00:00 2001
-From: Even Rouault <even.rouault@spatialys.com>
-Date: Sat, 12 May 2018 15:32:31 +0200
-Subject: [PATCH] LZWDecodeCompat(): fix potential index-out-of-bounds write.
- Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2780 /
- CVE-2018-8905
-
-The fix consists in using the similar code LZWDecode() to validate we
-don't write outside of the output buffer.
-
----
-CVE: CVE-2018-8905
-
-Upstream-Status: Backport [gitlab.com/libtiff/libtiff/commit/58a898...]
-
-Signed-off-by: Joe Slater <joe.slater@windriver.com>
-
----
- libtiff/tif_lzw.c |   18 ++++++++++++------
- 1 file changed, 12 insertions(+), 6 deletions(-)
-
-diff --git a/libtiff/tif_lzw.c b/libtiff/tif_lzw.c
-index 4ccb443..94d85e3 100644
---- a/libtiff/tif_lzw.c
-+++ b/libtiff/tif_lzw.c
-@@ -602,6 +602,7 @@ LZWDecodeCompat(TIFF* tif, uint8* op0, tmsize_t occ0, uint16 s)
- 	char *tp;
- 	unsigned char *bp;
- 	int code, nbits;
-+	int len;
- 	long nextbits, nextdata, nbitsmask;
- 	code_t *codep, *free_entp, *maxcodep, *oldcodep;
- 
-@@ -753,13 +754,18 @@ LZWDecodeCompat(TIFF* tif, uint8* op0, tmsize_t occ0, uint16 s)
- 				}  while (--occ);
- 				break;
- 			}
--			assert(occ >= codep->length);
--			op += codep->length;
--			occ -= codep->length;
--			tp = op;
-+			len = codep->length;
-+			tp = op + len;
- 			do {
--				*--tp = codep->value;
--			} while( (codep = codep->next) != NULL );
-+				int t;
-+				--tp;
-+				t = codep->value;
-+				codep = codep->next;
-+				*tp = (char)t;
-+			} while (codep && tp > op);
-+			assert(occ >= len);
-+			op += len;
-+			occ -= len;
- 		} else {
- 			*op++ = (char)code;
- 			occ--;
--- 
-1.7.9.5
-
diff --git a/meta/recipes-multimedia/libtiff/files/libtool2.patch b/meta/recipes-multimedia/libtiff/files/libtool2.patch
index a84c6889627..96233b46c94 100644
--- a/meta/recipes-multimedia/libtiff/files/libtool2.patch
+++ b/meta/recipes-multimedia/libtiff/files/libtool2.patch
@@ -1,16 +1,21 @@
+From 5b893206e0a0d529ba2d0caf58cfffc03bccb598 Mon Sep 17 00:00:00 2001
+From: Marcin Juszkiewicz <hrw@openedhand.com>
+Date: Sat, 14 Jun 2008 13:42:22 +0000
+Subject: [PATCH] tiff: make it work after libtool upgrade
+
 Upstream-Status: Inappropriate [configuration]
 
 ---
- configure.ac |    2 +-
+ configure.ac | 2 +-
  1 file changed, 1 insertion(+), 1 deletion(-)
 
-Index: tiff-4.0.9/configure.ac
-===================================================================
---- tiff-4.0.9.orig/configure.ac
-+++ tiff-4.0.9/configure.ac
-@@ -27,7 +27,7 @@ dnl Process this file with autoconf to p
+diff --git a/configure.ac b/configure.ac
+index c7b02e2..ae1c964 100644
+--- a/configure.ac
++++ b/configure.ac
+@@ -27,7 +27,7 @@ dnl Process this file with autoconf to produce a configure script.
  AC_PREREQ(2.64)
- AC_INIT([LibTIFF Software],[4.0.9],[tiff@lists.maptools.org],[tiff])
+ AC_INIT([LibTIFF Software],[4.0.10],[tiff@lists.maptools.org],[tiff])
  AC_CONFIG_AUX_DIR(config)
 -AC_CONFIG_MACRO_DIR(m4)
 +dnl AC_CONFIG_MACRO_DIR(m4)
diff --git a/meta/recipes-multimedia/libtiff/tiff_4.0.9.bb b/meta/recipes-multimedia/libtiff/tiff_4.0.10.bb
similarity index 80%
rename from meta/recipes-multimedia/libtiff/tiff_4.0.9.bb
rename to meta/recipes-multimedia/libtiff/tiff_4.0.10.bb
index 93beddb4dab..152fa819a5b 100644
--- a/meta/recipes-multimedia/libtiff/tiff_4.0.9.bb
+++ b/meta/recipes-multimedia/libtiff/tiff_4.0.10.bb
@@ -6,17 +6,10 @@ CVE_PRODUCT = "libtiff"
 
 SRC_URI = "http://download.osgeo.org/libtiff/tiff-${PV}.tar.gz \
            file://libtool2.patch \
-           file://CVE-2017-9935.patch \
-           file://CVE-2017-18013.patch \
-           file://CVE-2018-5784.patch \
-           file://CVE-2018-10963.patch \
-           file://CVE-2018-8905.patch \
-           file://CVE-2018-7456.patch \
-           file://CVE-2017-17095.patch \
-          "
-
-SRC_URI[md5sum] = "54bad211279cc93eb4fca31ba9bfdc79"
-SRC_URI[sha256sum] = "6e7bdeec2c310734e734d19aae3a71ebe37a4d842e0e23dbb1b8921c0026cfcd"
+           "
+
+SRC_URI[md5sum] = "114192d7ebe537912a2b97408832e7fd"
+SRC_URI[sha256sum] = "2c52d11ccaf767457db0c46795d9c7d1a8d8f76f68b0b800a3dfe45786b996e4"
 
 # exclude betas
 UPSTREAM_CHECK_REGEX = "tiff-(?P<pver>\d+(\.\d+)+).tar"
-- 
2.17.1



^ permalink raw reply related	[flat|nested] 32+ messages in thread

* [PATCH 06/16] gdbm: update to 1.18.1
  2018-11-22 15:41 [PATCH 01/16] gobject-introspection: update to 1.58.1 Alexander Kanavin
                   ` (3 preceding siblings ...)
  2018-11-22 15:41 ` [PATCH 05/16] tiff: update to 4.0.10 Alexander Kanavin
@ 2018-11-22 15:41 ` Alexander Kanavin
  2018-11-22 15:41 ` [PATCH 07/16] icu: update to 63.1 Alexander Kanavin
                   ` (11 subsequent siblings)
  16 siblings, 0 replies; 32+ messages in thread
From: Alexander Kanavin @ 2018-11-22 15:41 UTC (permalink / raw)
  To: openembedded-core

Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com>
---
 meta/recipes-support/gdbm/{gdbm_1.18.bb => gdbm_1.18.1.bb} | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)
 rename meta/recipes-support/gdbm/{gdbm_1.18.bb => gdbm_1.18.1.bb} (89%)

diff --git a/meta/recipes-support/gdbm/gdbm_1.18.bb b/meta/recipes-support/gdbm/gdbm_1.18.1.bb
similarity index 89%
rename from meta/recipes-support/gdbm/gdbm_1.18.bb
rename to meta/recipes-support/gdbm/gdbm_1.18.1.bb
index aad4300952c..16ecc506cea 100644
--- a/meta/recipes-support/gdbm/gdbm_1.18.bb
+++ b/meta/recipes-support/gdbm/gdbm_1.18.1.bb
@@ -10,8 +10,8 @@ SRC_URI = "${GNU_MIRROR}/gdbm/gdbm-${PV}.tar.gz \
            file://ptest.patch \
           "
 
-SRC_URI[md5sum] = "e316f8e4a3e7e4f23955be65d54fec48"
-SRC_URI[sha256sum] = "b8822cb4769e2d759c828c06f196614936c88c141c3132b18252fe25c2b635ce"
+SRC_URI[md5sum] = "988dc82182121c7570e0cb8b4fcd5415"
+SRC_URI[sha256sum] = "86e613527e5dba544e73208f42b78b7c022d4fa5a6d5498bf18c8d6f745b91dc"
 
 inherit autotools gettext texinfo lib_package ptest
 
-- 
2.17.1



^ permalink raw reply related	[flat|nested] 32+ messages in thread

* [PATCH 07/16] icu: update to 63.1
  2018-11-22 15:41 [PATCH 01/16] gobject-introspection: update to 1.58.1 Alexander Kanavin
                   ` (4 preceding siblings ...)
  2018-11-22 15:41 ` [PATCH 06/16] gdbm: update to 1.18.1 Alexander Kanavin
@ 2018-11-22 15:41 ` Alexander Kanavin
  2018-11-22 15:41 ` [PATCH 08/16] btrfs-tools: update to 4.19 Alexander Kanavin
                   ` (10 subsequent siblings)
  16 siblings, 0 replies; 32+ messages in thread
From: Alexander Kanavin @ 2018-11-22 15:41 UTC (permalink / raw)
  To: openembedded-core

Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com>
---
 .../icu/icu/fix-install-manx.patch            | 21 ++++++++-----------
 .../icu/{icu_62.1.bb => icu_63.1.bb}          |  4 ++--
 2 files changed, 11 insertions(+), 14 deletions(-)
 rename meta/recipes-support/icu/{icu_62.1.bb => icu_63.1.bb} (85%)

diff --git a/meta/recipes-support/icu/icu/fix-install-manx.patch b/meta/recipes-support/icu/icu/fix-install-manx.patch
index 8186fb41227..925b064ebd5 100644
--- a/meta/recipes-support/icu/icu/fix-install-manx.patch
+++ b/meta/recipes-support/icu/icu/fix-install-manx.patch
@@ -1,7 +1,7 @@
-From 3063a9211669bee673840ee81f81d30699b9b702 Mon Sep 17 00:00:00 2001
+From a6ddabc8cadb76bfe2d2e374a6702442cfe51cce Mon Sep 17 00:00:00 2001
 From: Ross Burton <ross.burton@intel.com>
 Date: Fri, 9 Oct 2015 17:50:41 +0100
-Subject: [PATCH 2/4] icu: fix install race
+Subject: [PATCH] icu: fix install race
 
 The generic recursive target calls target-local so also adding it to the
 dependency list results in races due to install-local being executed twice in
@@ -18,11 +18,11 @@ Signed-off-by: Ross Burton <ross.burton@intel.com>
  source/Makefile.in | 8 ++++----
  1 file changed, 4 insertions(+), 4 deletions(-)
 
-diff --git a/source/Makefile.in b/source/Makefile.in
-index c1db15b..4948deb 100644
+diff --git a/Makefile.in b/Makefile.in
+index be9435b..ada20d7 100644
 --- a/Makefile.in
 +++ b/Makefile.in
-@@ -73,7 +73,7 @@ EXTRA_DATA =
+@@ -77,7 +77,7 @@ EXTRA_DATA =
  
  ## List of phony targets
  .PHONY : all all-local all-recursive install install-local install-udata install-udata-files install-udata-dlls		\
@@ -31,7 +31,7 @@ index c1db15b..4948deb 100644
  distclean-local distclean-recursive doc dist dist-local dist-recursive	\
  check check-local check-recursive clean-recursive-with-twist install-icu \
  doc install-doc tests icu4j-data icu4j-data-install update-windows-makefiles xcheck-local xcheck-recursive xperf xcheck xperf-recursive \
-@@ -84,9 +84,9 @@ check-exhaustive check-exhaustive-local check-exhaustive-recursive releaseDist
+@@ -88,9 +88,9 @@ check-exhaustive check-exhaustive-local check-exhaustive-recursive releaseDist
  
  ## List of standard targets
  all: all-local all-recursive
@@ -43,15 +43,12 @@ index c1db15b..4948deb 100644
  dist: dist-recursive
  check: all check-recursive
  check-recursive: all
-@@ -350,7 +350,7 @@ config.status: $(srcdir)/configure $(srcdir)/common/unicode/uvernum.h
- 
+@@ -357,7 +357,7 @@ config.status: $(srcdir)/configure $(srcdir)/common/unicode/uvernum.h
  install-manx: $(MANX_FILES)
  	$(MKINSTALLDIRS) $(DESTDIR)$(mandir)/man$(SECTION)
+ ifneq ($(MANX_FILES),)
 -	$(INSTALL_DATA) $? $(DESTDIR)$(mandir)/man$(SECTION)
 +	$(INSTALL_DATA) $^ $(DESTDIR)$(mandir)/man$(SECTION)
+ endif
  
  config/%.$(SECTION): $(srcdir)/config/%.$(SECTION).in
- 	cd $(top_builddir) \
--- 
-2.14.2
-
diff --git a/meta/recipes-support/icu/icu_62.1.bb b/meta/recipes-support/icu/icu_63.1.bb
similarity index 85%
rename from meta/recipes-support/icu/icu_62.1.bb
rename to meta/recipes-support/icu/icu_63.1.bb
index 4e3750b997a..e593dc1bdbd 100644
--- a/meta/recipes-support/icu/icu_62.1.bb
+++ b/meta/recipes-support/icu/icu_63.1.bb
@@ -22,8 +22,8 @@ SRC_URI = "${BASE_SRC_URI} \
 SRC_URI_append_class-target = "\
            file://0001-Disable-LDFLAGSICUDT-for-Linux.patch \
           "
-SRC_URI[md5sum] = "490ad9d920158e0314e10ba74ae9a150"
-SRC_URI[sha256sum] = "3dd9868d666350dda66a6e305eecde9d479fb70b30d5b55d78a1deffb97d5aa3"
+SRC_URI[md5sum] = "9e40f6055294284df958200e308bce50"
+SRC_URI[sha256sum] = "05c490b69454fce5860b7e8e2821231674af0a11d7ef2febea9a32512998cb9d"
 
 UPSTREAM_CHECK_REGEX = "(?P<pver>\d+(\.\d+)+)/"
 UPSTREAM_CHECK_URI = "http://download.icu-project.org/files/icu4c/"
-- 
2.17.1



^ permalink raw reply related	[flat|nested] 32+ messages in thread

* [PATCH 08/16] btrfs-tools: update to 4.19
  2018-11-22 15:41 [PATCH 01/16] gobject-introspection: update to 1.58.1 Alexander Kanavin
                   ` (5 preceding siblings ...)
  2018-11-22 15:41 ` [PATCH 07/16] icu: update to 63.1 Alexander Kanavin
@ 2018-11-22 15:41 ` Alexander Kanavin
  2018-11-22 23:40   ` Richard Purdie
  2018-11-22 15:41 ` [PATCH 09/16] vala: update to 0.42.3 Alexander Kanavin
                   ` (9 subsequent siblings)
  16 siblings, 1 reply; 32+ messages in thread
From: Alexander Kanavin @ 2018-11-22 15:41 UTC (permalink / raw)
  To: openembedded-core

Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com>
---
 .../btrfs-tools/{btrfs-tools_4.17.1.bb => btrfs-tools_4.19.bb}  | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)
 rename meta/recipes-devtools/btrfs-tools/{btrfs-tools_4.17.1.bb => btrfs-tools_4.19.bb} (96%)

diff --git a/meta/recipes-devtools/btrfs-tools/btrfs-tools_4.17.1.bb b/meta/recipes-devtools/btrfs-tools/btrfs-tools_4.19.bb
similarity index 96%
rename from meta/recipes-devtools/btrfs-tools/btrfs-tools_4.17.1.bb
rename to meta/recipes-devtools/btrfs-tools/btrfs-tools_4.19.bb
index 6b53fbcd7fe..9590a723d50 100644
--- a/meta/recipes-devtools/btrfs-tools/btrfs-tools_4.17.1.bb
+++ b/meta/recipes-devtools/btrfs-tools/btrfs-tools_4.19.bb
@@ -14,7 +14,7 @@ DEPENDS = "util-linux attr e2fsprogs lzo acl python3-setuptools-native"
 DEPENDS_append_class-target = " udev"
 RDEPENDS_${PN} = "libgcc"
 
-SRCREV = "7faaca0d9f78f7162ae603231f693dd8e1af2a41"
+SRCREV = "d72d913291683188ddf5d758db02f1bc3b05d2f7"
 SRC_URI = "git://git.kernel.org/pub/scm/linux/kernel/git/kdave/btrfs-progs.git \
            file://0001-Makefile-build-mktables-using-native-gcc.patch \
            file://0001-Add-LDFLAGS-when-building-libbtrfsutil.so.patch \
-- 
2.17.1



^ permalink raw reply related	[flat|nested] 32+ messages in thread

* [PATCH 09/16] vala: update to 0.42.3
  2018-11-22 15:41 [PATCH 01/16] gobject-introspection: update to 1.58.1 Alexander Kanavin
                   ` (6 preceding siblings ...)
  2018-11-22 15:41 ` [PATCH 08/16] btrfs-tools: update to 4.19 Alexander Kanavin
@ 2018-11-22 15:41 ` Alexander Kanavin
  2018-11-22 15:41 ` [PATCH 10/16] webkitgtk: update to 2.22.4 Alexander Kanavin
                   ` (8 subsequent siblings)
  16 siblings, 0 replies; 32+ messages in thread
From: Alexander Kanavin @ 2018-11-22 15:41 UTC (permalink / raw)
  To: openembedded-core

Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com>
---
 meta/recipes-devtools/vala/{vala_0.42.0.bb => vala_0.42.3.bb} | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)
 rename meta/recipes-devtools/vala/{vala_0.42.0.bb => vala_0.42.3.bb} (64%)

diff --git a/meta/recipes-devtools/vala/vala_0.42.0.bb b/meta/recipes-devtools/vala/vala_0.42.3.bb
similarity index 64%
rename from meta/recipes-devtools/vala/vala_0.42.0.bb
rename to meta/recipes-devtools/vala/vala_0.42.3.bb
index 2b02e0c8404..0d11ff6ba76 100644
--- a/meta/recipes-devtools/vala/vala_0.42.0.bb
+++ b/meta/recipes-devtools/vala/vala_0.42.3.bb
@@ -6,5 +6,5 @@ SRC_URI += " file://0001-git-version-gen-don-t-append-dirty-if-we-re-not-in-g.pa
 	     file://0001-Disable-valadoc.patch \
 "
 
-SRC_URI[md5sum] = "aa6eb8097d25b5847ad3fab34c0ff865"
-SRC_URI[sha256sum] = "62a55986da23cf3aaafd7624c32db2a1af11c8419e0bb0751727d10f1f7ab7be"
+SRC_URI[md5sum] = "6fdd6fadbef27e3dd05086d6a3220556"
+SRC_URI[sha256sum] = "5fc73dd1e683dc7391bb96d02b2f671aa8289411a48611a05265629e0048587d"
-- 
2.17.1



^ permalink raw reply related	[flat|nested] 32+ messages in thread

* [PATCH 10/16] webkitgtk: update to 2.22.4
  2018-11-22 15:41 [PATCH 01/16] gobject-introspection: update to 1.58.1 Alexander Kanavin
                   ` (7 preceding siblings ...)
  2018-11-22 15:41 ` [PATCH 09/16] vala: update to 0.42.3 Alexander Kanavin
@ 2018-11-22 15:41 ` Alexander Kanavin
  2018-11-22 15:41 ` [PATCH 11/16] psmisc: update to 23.2 Alexander Kanavin
                   ` (7 subsequent siblings)
  16 siblings, 0 replies; 32+ messages in thread
From: Alexander Kanavin @ 2018-11-22 15:41 UTC (permalink / raw)
  To: openembedded-core

Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com>
---
 .../webkit/{webkitgtk_2.22.3.bb => webkitgtk_2.22.4.bb}       | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)
 rename meta/recipes-sato/webkit/{webkitgtk_2.22.3.bb => webkitgtk_2.22.4.bb} (97%)

diff --git a/meta/recipes-sato/webkit/webkitgtk_2.22.3.bb b/meta/recipes-sato/webkit/webkitgtk_2.22.4.bb
similarity index 97%
rename from meta/recipes-sato/webkit/webkitgtk_2.22.3.bb
rename to meta/recipes-sato/webkit/webkitgtk_2.22.4.bb
index d06d2a1a69a..60f1b3ea5d6 100644
--- a/meta/recipes-sato/webkit/webkitgtk_2.22.3.bb
+++ b/meta/recipes-sato/webkit/webkitgtk_2.22.4.bb
@@ -22,8 +22,8 @@ SRC_URI = "http://www.webkitgtk.org/releases/${BPN}-${PV}.tar.xz \
            file://detect-gstreamer-gl.patch \
            "
 
-SRC_URI[md5sum] = "6dae6837c884a25413fb1d4527c9894a"
-SRC_URI[sha256sum] = "9dfd542902953be9af8ff32bd37fe662ca3d75f7348514ebac15c6252a6ccd72"
+SRC_URI[md5sum] = "9f08d09cfc21c761a431a545549f301a"
+SRC_URI[sha256sum] = "fab5be2883802352ae0e735dd1eff4bc18abaff7ac78689cec72eb2f611943b8"
 
 inherit cmake pkgconfig gobject-introspection perlnative distro_features_check upstream-version-is-even gtk-doc
 
-- 
2.17.1



^ permalink raw reply related	[flat|nested] 32+ messages in thread

* [PATCH 11/16] psmisc: update to 23.2
  2018-11-22 15:41 [PATCH 01/16] gobject-introspection: update to 1.58.1 Alexander Kanavin
                   ` (8 preceding siblings ...)
  2018-11-22 15:41 ` [PATCH 10/16] webkitgtk: update to 2.22.4 Alexander Kanavin
@ 2018-11-22 15:41 ` Alexander Kanavin
  2018-11-23 23:35   ` Richard Purdie
  2018-11-22 15:41 ` [PATCH 12/16] sysprof: update to 3.30.2 Alexander Kanavin
                   ` (6 subsequent siblings)
  16 siblings, 1 reply; 32+ messages in thread
From: Alexander Kanavin @ 2018-11-22 15:41 UTC (permalink / raw)
  To: openembedded-core

Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com>
---
 ...001-Use-UINTPTR_MAX-instead-of-__WORDSIZE.patch | 14 +++++---------
 .../psmisc/{psmisc_23.1.bb => psmisc_23.2.bb}      |  2 +-
 2 files changed, 6 insertions(+), 10 deletions(-)
 rename meta/recipes-extended/psmisc/{psmisc_23.1.bb => psmisc_23.2.bb} (87%)

diff --git a/meta/recipes-extended/psmisc/psmisc/0001-Use-UINTPTR_MAX-instead-of-__WORDSIZE.patch b/meta/recipes-extended/psmisc/psmisc/0001-Use-UINTPTR_MAX-instead-of-__WORDSIZE.patch
index b57a006bc67..3609594b67a 100644
--- a/meta/recipes-extended/psmisc/psmisc/0001-Use-UINTPTR_MAX-instead-of-__WORDSIZE.patch
+++ b/meta/recipes-extended/psmisc/psmisc/0001-Use-UINTPTR_MAX-instead-of-__WORDSIZE.patch
@@ -1,4 +1,4 @@
-From 5dc872bb2fba6421cb8e1ee578f7bd4aaed55f61 Mon Sep 17 00:00:00 2001
+From 115fcf1daff18aa2f2e130d63704f04031878db0 Mon Sep 17 00:00:00 2001
 From: Khem Raj <raj.khem@gmail.com>
 Date: Thu, 24 Mar 2016 15:46:14 +0000
 Subject: [PATCH] Use UINTPTR_MAX instead of __WORDSIZE
@@ -7,14 +7,13 @@ Do not include sys/user.h since it conflicts with
 pt_regs struct from kernel APIs in asm/ptrace.h
 
 Signed-off-by: Khem Raj <raj.khem@gmail.com>
----
-Upstream-Status: Pending
 
+---
  src/peekfd.c | 13 ++++++++-----
  1 file changed, 8 insertions(+), 5 deletions(-)
 
 diff --git a/src/peekfd.c b/src/peekfd.c
-index cba2130..0d39878 100644
+index 5aa990a..7e8e3fc 100644
 --- a/src/peekfd.c
 +++ b/src/peekfd.c
 @@ -30,8 +30,11 @@
@@ -28,8 +27,8 @@ index cba2130..0d39878 100644
 +#include <stdint.h>
  #include <getopt.h>
  #include <ctype.h>
- 
-@@ -228,11 +231,11 @@ int main(int argc, char **argv)
+ #include <dirent.h>
+@@ -266,11 +269,11 @@ int main(int argc, char **argv)
  		if (WIFSTOPPED(status)) {
  #ifdef PPC
  			struct pt_regs regs;
@@ -46,6 +45,3 @@ index cba2130..0d39878 100644
  #elif defined(ARM)
  			struct pt_regs regs;
  			ptrace(PTRACE_GETREGS, pid, 0, &regs);
--- 
-1.9.1
-
diff --git a/meta/recipes-extended/psmisc/psmisc_23.1.bb b/meta/recipes-extended/psmisc/psmisc_23.2.bb
similarity index 87%
rename from meta/recipes-extended/psmisc/psmisc_23.1.bb
rename to meta/recipes-extended/psmisc/psmisc_23.2.bb
index f07c9db1e7e..38e0a440587 100644
--- a/meta/recipes-extended/psmisc/psmisc_23.1.bb
+++ b/meta/recipes-extended/psmisc/psmisc_23.2.bb
@@ -6,5 +6,5 @@ SRC_URI = "git://gitlab.com/psmisc/psmisc.git;protocol=https \
            file://0001-Use-UINTPTR_MAX-instead-of-__WORDSIZE.patch \
 	   file://0001-Makefile.am-create-src-directory-before-attempting-t.patch \
            "
-SRCREV = "bd952b3063f2466ecab4ec093026cf0c4ce373c7"
+SRCREV = "44eab9a3a63394eae6b79a7ef0a042f57e0c8a8f"
 S = "${WORKDIR}/git"
-- 
2.17.1



^ permalink raw reply related	[flat|nested] 32+ messages in thread

* [PATCH 12/16] sysprof: update to 3.30.2
  2018-11-22 15:41 [PATCH 01/16] gobject-introspection: update to 1.58.1 Alexander Kanavin
                   ` (9 preceding siblings ...)
  2018-11-22 15:41 ` [PATCH 11/16] psmisc: update to 23.2 Alexander Kanavin
@ 2018-11-22 15:41 ` Alexander Kanavin
  2018-11-22 15:41 ` [PATCH 13/16] libwebp: update to 1.0.1 Alexander Kanavin
                   ` (5 subsequent siblings)
  16 siblings, 0 replies; 32+ messages in thread
From: Alexander Kanavin @ 2018-11-22 15:41 UTC (permalink / raw)
  To: openembedded-core

Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com>
---
 ...fix-non-literal-format-string-issues.patch | 34 -----------------
 .../sysprof/files/wordsize.patch              | 38 -------------------
 .../{sysprof_3.30.0.bb => sysprof_3.30.2.bb}  |  6 +--
 3 files changed, 2 insertions(+), 76 deletions(-)
 delete mode 100644 meta/recipes-kernel/sysprof/files/0001-fix-non-literal-format-string-issues.patch
 delete mode 100644 meta/recipes-kernel/sysprof/files/wordsize.patch
 rename meta/recipes-kernel/sysprof/{sysprof_3.30.0.bb => sysprof_3.30.2.bb} (82%)

diff --git a/meta/recipes-kernel/sysprof/files/0001-fix-non-literal-format-string-issues.patch b/meta/recipes-kernel/sysprof/files/0001-fix-non-literal-format-string-issues.patch
deleted file mode 100644
index 38f9f5f66a8..00000000000
--- a/meta/recipes-kernel/sysprof/files/0001-fix-non-literal-format-string-issues.patch
+++ /dev/null
@@ -1,34 +0,0 @@
-From de13d1f908335cc882c447e4d7c4360b9e5da190 Mon Sep 17 00:00:00 2001
-From: Khem Raj <raj.khem@gmail.com>
-Date: Thu, 6 Sep 2018 17:49:44 -0700
-Subject: [PATCH] fix non-literal format string issues
-
-clang errors out when using -Werror=format-nonliteral
-since the definition of g_strdup_vprintf() from glib-2.0
-is using va_list and clangs still warns where as
-gcc doesn't do that for va_list arguments
-
-Fixes
-src/sp-window.c:96:27: error: format string is not a string literal [-Werror,-Wformat-nonliteral]
-|   str = g_strdup_vprintf (format, args);
-|                           ^~~~~~
-
-Upstream-Status: Submitted [https://gitlab.gnome.org/GNOME/sysprof/merge_requests/6]
-Signed-off-by: Khem Raj <raj.khem@gmail.com>
----
- src/sp-window.c | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
-diff --git a/src/sp-window.c b/src/sp-window.c
-index 4dfac2d..aff4779 100644
---- a/src/sp-window.c
-+++ b/src/sp-window.c
-@@ -80,7 +80,7 @@ static guint signals [N_SIGNALS];
- static void sp_window_set_profiler (SpWindow   *self,
-                                     SpProfiler *profiler);
- 
--static void
-+static G_GNUC_PRINTF(3, 4) void
- sp_window_notify_user (SpWindow       *self,
-                        GtkMessageType  message_type,
-                        const gchar    *format,
diff --git a/meta/recipes-kernel/sysprof/files/wordsize.patch b/meta/recipes-kernel/sysprof/files/wordsize.patch
deleted file mode 100644
index d65b13a682f..00000000000
--- a/meta/recipes-kernel/sysprof/files/wordsize.patch
+++ /dev/null
@@ -1,38 +0,0 @@
-Upstream-Status: Submitted [https://gitlab.gnome.org/GNOME/sysprof/merge_requests/5]
-Signed-off-by: Ross Burton <ross.burton@intel.com>
-
-From bc7e3e27c28d0bab8bea72f2314191532b2e7840 Mon Sep 17 00:00:00 2001
-From: Ross Burton <ross.burton@intel.com>
-Date: Fri, 7 Sep 2018 01:30:09 +0100
-Subject: [PATCH] capture: use size of void* instead of glibc-specific
- __WORDSIZE
-
-__WORDSIZE is glibc-specific so sp-capture-types.h doesn't work with musl.
----
- lib/capture/sp-capture-types.h | 6 ++++--
- 1 file changed, 4 insertions(+), 2 deletions(-)
-
-diff --git a/lib/capture/sp-capture-types.h b/lib/capture/sp-capture-types.h
-index 48fcfb8..1d6cd1d 100644
---- a/lib/capture/sp-capture-types.h
-+++ b/lib/capture/sp-capture-types.h
-@@ -32,12 +32,14 @@ G_BEGIN_DECLS
- #define SP_CAPTURE_MAGIC (GUINT32_TO_LE(0xFDCA975E))
- #define SP_CAPTURE_ALIGN (sizeof(SpCaptureAddress))
- 
--#if __WORDSIZE == 64
-+#if GLIB_SIZEOF_VOID_P == 8
- # define SP_CAPTURE_JITMAP_MARK    G_GUINT64_CONSTANT(0xE000000000000000)
- # define SP_CAPTURE_ADDRESS_FORMAT "0x%016lx"
--#else
-+#elif GLIB_SIZEOF_VOID_P == 4
- # define SP_CAPTURE_JITMAP_MARK    G_GUINT64_CONSTANT(0xE0000000)
- # define SP_CAPTURE_ADDRESS_FORMAT "0x%016llx"
-+#else
-+#error Unknown GLIB_SIZEOF_VOID_P
- #endif
- 
- #define SP_CAPTURE_CURRENT_TIME   (sp_clock_get_current_time())
--- 
-2.11.0
-
diff --git a/meta/recipes-kernel/sysprof/sysprof_3.30.0.bb b/meta/recipes-kernel/sysprof/sysprof_3.30.2.bb
similarity index 82%
rename from meta/recipes-kernel/sysprof/sysprof_3.30.0.bb
rename to meta/recipes-kernel/sysprof/sysprof_3.30.2.bb
index 19dcf25a51d..866642cd1ea 100644
--- a/meta/recipes-kernel/sysprof/sysprof_3.30.0.bb
+++ b/meta/recipes-kernel/sysprof/sysprof_3.30.2.bb
@@ -9,13 +9,11 @@ inherit gnomebase gettext systemd upstream-version-is-even
 
 DEPENDS = "glib-2.0 libxml2-native glib-2.0-native"
 
-SRC_URI[archive.md5sum] = "ae896a8a2364e18c07fafa9573202f59"
-SRC_URI[archive.sha256sum] = "29cd2c4be277f00698dce48259219557c4fddc2c01254b8fac95900a8c663f63"
+SRC_URI[archive.md5sum] = "80cb47906eced2e7b9976bf00deec323"
+SRC_URI[archive.sha256sum] = "e90878e5a509bd79d170a7a51d47cc5508ab1363afaf0d97654373dfd9c8ba0b"
 SRC_URI += " \
            file://define-NT_GNU_BUILD_ID.patch \
            file://0001-Do-not-build-anything-in-help-as-it-requires-itstool.patch \
-           file://wordsize.patch \
-           file://0001-fix-non-literal-format-string-issues.patch \
            "
 RECIPE_NO_UPDATE_REASON = "Waiting for resolution of https://bugzilla.gnome.org/show_bug.cgi?id=794625"
 
-- 
2.17.1



^ permalink raw reply related	[flat|nested] 32+ messages in thread

* [PATCH 13/16] libwebp: update to 1.0.1
  2018-11-22 15:41 [PATCH 01/16] gobject-introspection: update to 1.58.1 Alexander Kanavin
                   ` (10 preceding siblings ...)
  2018-11-22 15:41 ` [PATCH 12/16] sysprof: update to 3.30.2 Alexander Kanavin
@ 2018-11-22 15:41 ` Alexander Kanavin
  2018-11-22 15:41 ` [PATCH 14/16] lighttpd: update to 1.4.51 Alexander Kanavin
                   ` (4 subsequent siblings)
  16 siblings, 0 replies; 32+ messages in thread
From: Alexander Kanavin @ 2018-11-22 15:41 UTC (permalink / raw)
  To: openembedded-core

Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com>
---
 .../webp/{libwebp_1.0.0.bb => libwebp_1.0.1.bb}               | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)
 rename meta/recipes-multimedia/webp/{libwebp_1.0.0.bb => libwebp_1.0.1.bb} (93%)

diff --git a/meta/recipes-multimedia/webp/libwebp_1.0.0.bb b/meta/recipes-multimedia/webp/libwebp_1.0.1.bb
similarity index 93%
rename from meta/recipes-multimedia/webp/libwebp_1.0.0.bb
rename to meta/recipes-multimedia/webp/libwebp_1.0.1.bb
index 1a9679f9dc8..451b0659b0c 100644
--- a/meta/recipes-multimedia/webp/libwebp_1.0.0.bb
+++ b/meta/recipes-multimedia/webp/libwebp_1.0.1.bb
@@ -14,8 +14,8 @@ LIC_FILES_CHKSUM = "file://COPYING;md5=6e8dee932c26f2dab503abf70c96d8bb \
                     file://PATENTS;md5=c6926d0cb07d296f886ab6e0cc5a85b7"
 
 SRC_URI = "http://downloads.webmproject.org/releases/webp/${BP}.tar.gz"
-SRC_URI[md5sum] = "967b8f087cb392e6cc94d5e116a120c0"
-SRC_URI[sha256sum] = "84259c4388f18637af3c5a6361536d754a5394492f91be1abc2e981d4983225b"
+SRC_URI[md5sum] = "ba72dfa7588c751a3a9b735a6746a23e"
+SRC_URI[sha256sum] = "8c744a5422dbffa0d1f92e90b34186fb8ed44db93fbacb55abd751ac8808d922"
 
 UPSTREAM_CHECK_URI = "http://downloads.webmproject.org/releases/webp/index.html"
 
-- 
2.17.1



^ permalink raw reply related	[flat|nested] 32+ messages in thread

* [PATCH 14/16] lighttpd: update to 1.4.51
  2018-11-22 15:41 [PATCH 01/16] gobject-introspection: update to 1.58.1 Alexander Kanavin
                   ` (11 preceding siblings ...)
  2018-11-22 15:41 ` [PATCH 13/16] libwebp: update to 1.0.1 Alexander Kanavin
@ 2018-11-22 15:41 ` Alexander Kanavin
  2018-11-22 15:41 ` [PATCH 15/16] libdnf: update to 0.22.3 Alexander Kanavin
                   ` (3 subsequent siblings)
  16 siblings, 0 replies; 32+ messages in thread
From: Alexander Kanavin @ 2018-11-22 15:41 UTC (permalink / raw)
  To: openembedded-core

Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com>
---
 .../lighttpd/{lighttpd_1.4.50.bb => lighttpd_1.4.51.bb}       | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)
 rename meta/recipes-extended/lighttpd/{lighttpd_1.4.50.bb => lighttpd_1.4.51.bb} (96%)

diff --git a/meta/recipes-extended/lighttpd/lighttpd_1.4.50.bb b/meta/recipes-extended/lighttpd/lighttpd_1.4.51.bb
similarity index 96%
rename from meta/recipes-extended/lighttpd/lighttpd_1.4.50.bb
rename to meta/recipes-extended/lighttpd/lighttpd_1.4.51.bb
index 5373a61d703..f28fd2f6905 100644
--- a/meta/recipes-extended/lighttpd/lighttpd_1.4.50.bb
+++ b/meta/recipes-extended/lighttpd/lighttpd_1.4.51.bb
@@ -20,8 +20,8 @@ SRC_URI = "http://download.lighttpd.net/lighttpd/releases-1.4.x/lighttpd-${PV}.t
         file://0001-Use-pkg-config-for-pcre-dependency-instead-of-config.patch \
         "
 
-SRC_URI[md5sum] = "0547831efda8492648b7f0c652865dfd"
-SRC_URI[sha256sum] = "29378312d8887cbc14ffe8a7fadef2d5a08c7e7e1be942795142346ad95629eb"
+SRC_URI[md5sum] = "6e68c19601af332fa3c5f174245f59bf"
+SRC_URI[sha256sum] = "2af9fdb265d1f025bfa634e13770239712ecbd585e4975b8226edf1df74e9c82"
 
 PACKAGECONFIG ??= "openssl pcre zlib \
     ${@bb.utils.filter('DISTRO_FEATURES', 'ipv6', d)} \
-- 
2.17.1



^ permalink raw reply related	[flat|nested] 32+ messages in thread

* [PATCH 15/16] libdnf: update to 0.22.3
  2018-11-22 15:41 [PATCH 01/16] gobject-introspection: update to 1.58.1 Alexander Kanavin
                   ` (12 preceding siblings ...)
  2018-11-22 15:41 ` [PATCH 14/16] lighttpd: update to 1.4.51 Alexander Kanavin
@ 2018-11-22 15:41 ` Alexander Kanavin
  2018-11-22 15:41 ` [PATCH 16/16] dnf: update to 4.0.9 Alexander Kanavin
                   ` (2 subsequent siblings)
  16 siblings, 0 replies; 32+ messages in thread
From: Alexander Kanavin @ 2018-11-22 15:41 UTC (permalink / raw)
  To: openembedded-core

Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com>
---
 .../libdnf/{libdnf_0.22.0.bb => libdnf_0.22.3.bb}               | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)
 rename meta/recipes-devtools/libdnf/{libdnf_0.22.0.bb => libdnf_0.22.3.bb} (95%)

diff --git a/meta/recipes-devtools/libdnf/libdnf_0.22.0.bb b/meta/recipes-devtools/libdnf/libdnf_0.22.3.bb
similarity index 95%
rename from meta/recipes-devtools/libdnf/libdnf_0.22.0.bb
rename to meta/recipes-devtools/libdnf/libdnf_0.22.3.bb
index 61ebcd821cc..d0cb01f0ea8 100644
--- a/meta/recipes-devtools/libdnf/libdnf_0.22.0.bb
+++ b/meta/recipes-devtools/libdnf/libdnf_0.22.3.bb
@@ -9,7 +9,7 @@ SRC_URI = "git://github.com/rpm-software-management/libdnf \
            file://0001-Add-WITH_TESTS-option.patch \
            "
 
-SRCREV = "fe14ad928f60890fa28b412639c88cd47889635e"
+SRCREV = "5c198ea2357c5779cf83050e5291646c3b186446"
 
 S = "${WORKDIR}/git"
 
-- 
2.17.1



^ permalink raw reply related	[flat|nested] 32+ messages in thread

* [PATCH 16/16] dnf: update to 4.0.9
  2018-11-22 15:41 [PATCH 01/16] gobject-introspection: update to 1.58.1 Alexander Kanavin
                   ` (13 preceding siblings ...)
  2018-11-22 15:41 ` [PATCH 15/16] libdnf: update to 0.22.3 Alexander Kanavin
@ 2018-11-22 15:41 ` Alexander Kanavin
  2018-11-22 23:38   ` Richard Purdie
  2018-11-22 16:07 ` ✗ patchtest: failure for "gobject-introspection: update ..." and 15 more Patchwork
  2018-11-26 22:29 ` [PATCH 01/16] gobject-introspection: update to 1.58.1 Khem Raj
  16 siblings, 1 reply; 32+ messages in thread
From: Alexander Kanavin @ 2018-11-22 15:41 UTC (permalink / raw)
  To: openembedded-core

Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com>
---
 meta/recipes-devtools/dnf/{dnf_4.0.4.bb => dnf_4.0.9.bb} | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)
 rename meta/recipes-devtools/dnf/{dnf_4.0.4.bb => dnf_4.0.9.bb} (98%)

diff --git a/meta/recipes-devtools/dnf/dnf_4.0.4.bb b/meta/recipes-devtools/dnf/dnf_4.0.9.bb
similarity index 98%
rename from meta/recipes-devtools/dnf/dnf_4.0.4.bb
rename to meta/recipes-devtools/dnf/dnf_4.0.9.bb
index 931e9eff07f..24412fd4860 100644
--- a/meta/recipes-devtools/dnf/dnf_4.0.4.bb
+++ b/meta/recipes-devtools/dnf/dnf_4.0.9.bb
@@ -12,7 +12,7 @@ SRC_URI = "git://github.com/rpm-software-management/dnf.git \
            file://0030-Run-python-scripts-using-env.patch \
            "
 
-SRCREV = "6fdf0e8cc714c92ee08bd4db9412d4c587ffafe9"
+SRCREV = "689a4c515738226f3dc85edb2035d23233ff41d8"
 UPSTREAM_CHECK_GITTAGREGEX = "(?P<pver>\d+(\.\d+)+)"
 
 S = "${WORKDIR}/git"
-- 
2.17.1



^ permalink raw reply related	[flat|nested] 32+ messages in thread

* ✗ patchtest: failure for "gobject-introspection: update ..." and 15 more
  2018-11-22 15:41 [PATCH 01/16] gobject-introspection: update to 1.58.1 Alexander Kanavin
                   ` (14 preceding siblings ...)
  2018-11-22 15:41 ` [PATCH 16/16] dnf: update to 4.0.9 Alexander Kanavin
@ 2018-11-22 16:07 ` Patchwork
  2018-11-26 22:29 ` [PATCH 01/16] gobject-introspection: update to 1.58.1 Khem Raj
  16 siblings, 0 replies; 32+ messages in thread
From: Patchwork @ 2018-11-22 16:07 UTC (permalink / raw)
  To: Alexander Kanavin; +Cc: openembedded-core

== Series Details ==

Series: "gobject-introspection: update ..." and 15 more
Revision: 1
URL   : https://patchwork.openembedded.org/series/15041/
State : failure

== Summary ==


Thank you for submitting this patch series to OpenEmbedded Core. This is
an automated response. Several tests have been executed on the proposed
series by patchtest resulting in the following failures:



* Issue             Upstream-Status is Inappropriate, but no reason was provided [test_upstream_status_presence_format] 
  Suggested fix    Include a brief reason why 0001-Committing-changes-from-do_unpack_extra.patch is inappropriate
  Current          Upstream-Status: Inappropriate
  Standard format  Upstream-Status: Inappropriate [reason]



If you believe any of these test results are incorrect, please reply to the
mailing list (openembedded-core@lists.openembedded.org) raising your concerns.
Otherwise we would appreciate you correcting the issues and submitting a new
version of the patchset if applicable. Please ensure you add/increment the
version number when sending the new version (i.e. [PATCH] -> [PATCH v2] ->
[PATCH v3] -> ...).

---
Guidelines:     https://www.openembedded.org/wiki/Commit_Patch_Message_Guidelines
Test framework: http://git.yoctoproject.org/cgit/cgit.cgi/patchtest
Test suite:     http://git.yoctoproject.org/cgit/cgit.cgi/patchtest-oe



^ permalink raw reply	[flat|nested] 32+ messages in thread

* Re: [PATCH 16/16] dnf: update to 4.0.9
  2018-11-22 15:41 ` [PATCH 16/16] dnf: update to 4.0.9 Alexander Kanavin
@ 2018-11-22 23:38   ` Richard Purdie
  2018-11-23 15:33     ` Richard Purdie
  0 siblings, 1 reply; 32+ messages in thread
From: Richard Purdie @ 2018-11-22 23:38 UTC (permalink / raw)
  To: Alexander Kanavin, openembedded-core

On Thu, 2018-11-22 at 16:41 +0100, Alexander Kanavin wrote:
> Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com>
> ---
>  meta/recipes-devtools/dnf/{dnf_4.0.4.bb => dnf_4.0.9.bb} | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
>  rename meta/recipes-devtools/dnf/{dnf_4.0.4.bb => dnf_4.0.9.bb}
> (98%)
> 
> diff --git a/meta/recipes-devtools/dnf/dnf_4.0.4.bb b/meta/recipes-
> devtools/dnf/dnf_4.0.9.bb
> similarity index 98%
> rename from meta/recipes-devtools/dnf/dnf_4.0.4.bb
> rename to meta/recipes-devtools/dnf/dnf_4.0.9.bb
> index 931e9eff07f..24412fd4860 100644
> --- a/meta/recipes-devtools/dnf/dnf_4.0.4.bb
> +++ b/meta/recipes-devtools/dnf/dnf_4.0.9.bb
> @@ -12,7 +12,7 @@ SRC_URI = "git://github.com/rpm-software-
> management/dnf.git \
>             file://0030-Run-python-scripts-using-env.patch \
>             "
>  
> -SRCREV = "6fdf0e8cc714c92ee08bd4db9412d4c587ffafe9"
> +SRCREV = "689a4c515738226f3dc85edb2035d23233ff41d8"
>  UPSTREAM_CHECK_GITTAGREGEX = "(?P<pver>\d+(\.\d+)+)"
>  
>  S = "${WORKDIR}/git"

Something still isn't quite right somewhere:

https://autobuilder.yoctoproject.org/typhoon/#/builders/69/builds/5/steps/7/logs/step7b
https://autobuilder.yoctoproject.org/typhoon/#/builders/58/builds/5/steps/7/logs/step2b
(the above wic build has many similar errors)

Cheers,

Richard



^ permalink raw reply	[flat|nested] 32+ messages in thread

* Re: [PATCH 08/16] btrfs-tools: update to 4.19
  2018-11-22 15:41 ` [PATCH 08/16] btrfs-tools: update to 4.19 Alexander Kanavin
@ 2018-11-22 23:40   ` Richard Purdie
  0 siblings, 0 replies; 32+ messages in thread
From: Richard Purdie @ 2018-11-22 23:40 UTC (permalink / raw)
  To: Alexander Kanavin, openembedded-core

On Thu, 2018-11-22 at 16:41 +0100, Alexander Kanavin wrote:
> Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com>
> ---
>  .../btrfs-tools/{btrfs-tools_4.17.1.bb => btrfs-tools_4.19.bb}  | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
>  rename meta/recipes-devtools/btrfs-tools/{btrfs-tools_4.17.1.bb => btrfs-tools_4.19.bb} (96%)
> 
> diff --git a/meta/recipes-devtools/btrfs-tools/btrfs-tools_4.17.1.bb b/meta/recipes-devtools/btrfs-tools/btrfs-tools_4.19.bb
> similarity index 96%
> rename from meta/recipes-devtools/btrfs-tools/btrfs-tools_4.17.1.bb
> rename to meta/recipes-devtools/btrfs-tools/btrfs-tools_4.19.bb
> index 6b53fbcd7fe..9590a723d50 100644
> --- a/meta/recipes-devtools/btrfs-tools/btrfs-tools_4.17.1.bb
> +++ b/meta/recipes-devtools/btrfs-tools/btrfs-tools_4.19.bb
> @@ -14,7 +14,7 @@ DEPENDS = "util-linux attr e2fsprogs lzo acl python3-setuptools-native"
>  DEPENDS_append_class-target = " udev"
>  RDEPENDS_${PN} = "libgcc"
>  
> -SRCREV = "7faaca0d9f78f7162ae603231f693dd8e1af2a41"
> +SRCREV = "d72d913291683188ddf5d758db02f1bc3b05d2f7"
>  SRC_URI = "git://git.kernel.org/pub/scm/linux/kernel/git/kdave/btrfs-progs.git \
>             file://0001-Makefile-build-mktables-using-native-gcc.patch \
>             file://0001-Add-LDFLAGS-when-building-libbtrfsutil.so.patch \

Sadly this upgrade is showing problems:

https://autobuilder.yoctoproject.org/typhoon/#/builders/44/builds/5/steps/7/logs/step6b
https://autobuilder.yoctoproject.org/typhoon/#/builders/70/builds/5/steps/7/logs/step1b
https://autobuilder.yoctoproject.org/typhoon/#/builders/62/builds/5/steps/7/logs/step1b
https://autobuilder.yoctoproject.org/typhoon/#/builders/63/builds/5/steps/7/logs/step1b

possibly a problem on mips/ppc?

Cheers,

Richard




^ permalink raw reply	[flat|nested] 32+ messages in thread

* Re: [PATCH 16/16] dnf: update to 4.0.9
  2018-11-22 23:38   ` Richard Purdie
@ 2018-11-23 15:33     ` Richard Purdie
  0 siblings, 0 replies; 32+ messages in thread
From: Richard Purdie @ 2018-11-23 15:33 UTC (permalink / raw)
  To: Alexander Kanavin, openembedded-core

On Thu, 2018-11-22 at 23:38 +0000, Richard Purdie wrote:
> On Thu, 2018-11-22 at 16:41 +0100, Alexander Kanavin wrote:
> > Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com>
> > ---
> >  meta/recipes-devtools/dnf/{dnf_4.0.4.bb => dnf_4.0.9.bb} | 2 +-
> >  1 file changed, 1 insertion(+), 1 deletion(-)
> >  rename meta/recipes-devtools/dnf/{dnf_4.0.4.bb => dnf_4.0.9.bb}
> > (98%)
> > 
> > diff --git a/meta/recipes-devtools/dnf/dnf_4.0.4.bb b/meta/recipes-
> > devtools/dnf/dnf_4.0.9.bb
> > similarity index 98%
> > rename from meta/recipes-devtools/dnf/dnf_4.0.4.bb
> > rename to meta/recipes-devtools/dnf/dnf_4.0.9.bb
> > index 931e9eff07f..24412fd4860 100644
> > --- a/meta/recipes-devtools/dnf/dnf_4.0.4.bb
> > +++ b/meta/recipes-devtools/dnf/dnf_4.0.9.bb
> > @@ -12,7 +12,7 @@ SRC_URI = "git://github.com/rpm-software-
> > management/dnf.git \
> >             file://0030-Run-python-scripts-using-env.patch \
> >             "
> >  
> > -SRCREV = "6fdf0e8cc714c92ee08bd4db9412d4c587ffafe9"
> > +SRCREV = "689a4c515738226f3dc85edb2035d23233ff41d8"
> >  UPSTREAM_CHECK_GITTAGREGEX = "(?P<pver>\d+(\.\d+)+)"
> >  
> >  S = "${WORKDIR}/git"
> 
> Something still isn't quite right somewhere:
> 
> 
https://autobuilder.yoctoproject.org/typhoon/#/builders/69/builds/5/steps/7/logs/step7b
> 
https://autobuilder.yoctoproject.org/typhoon/#/builders/58/builds/5/steps/7/logs/step2b
> (the above wic build has many similar errors)

The problem is missing rpath entries in libmodulemd which is an issue
meson is causing. I've sent out a patch to meson to work around this
for now. Upstream are already aware there is a problem here.

Cheers,

Richard



^ permalink raw reply	[flat|nested] 32+ messages in thread

* Re: [PATCH 11/16] psmisc: update to 23.2
  2018-11-22 15:41 ` [PATCH 11/16] psmisc: update to 23.2 Alexander Kanavin
@ 2018-11-23 23:35   ` Richard Purdie
  0 siblings, 0 replies; 32+ messages in thread
From: Richard Purdie @ 2018-11-23 23:35 UTC (permalink / raw)
  To: Alexander Kanavin, openembedded-core

On Thu, 2018-11-22 at 16:41 +0100, Alexander Kanavin wrote:
> Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com>
> ---
>  ...001-Use-UINTPTR_MAX-instead-of-__WORDSIZE.patch | 14 +++++-------
> --
>  .../psmisc/{psmisc_23.1.bb => psmisc_23.2.bb}      |  2 +-
>  2 files changed, 6 insertions(+), 10 deletions(-)
>  rename meta/recipes-extended/psmisc/{psmisc_23.1.bb =>
> psmisc_23.2.bb} (87%)
> 
> diff --git a/meta/recipes-extended/psmisc/psmisc/0001-Use-
> UINTPTR_MAX-instead-of-__WORDSIZE.patch b/meta/recipes-
> extended/psmisc/psmisc/0001-Use-UINTPTR_MAX-instead-of-
> __WORDSIZE.patch
> index b57a006bc67..3609594b67a 100644
> --- a/meta/recipes-extended/psmisc/psmisc/0001-Use-UINTPTR_MAX-
> instead-of-__WORDSIZE.patch
> +++ b/meta/recipes-extended/psmisc/psmisc/0001-Use-UINTPTR_MAX-
> instead-of-__WORDSIZE.patch
> @@ -1,4 +1,4 @@
> -From 5dc872bb2fba6421cb8e1ee578f7bd4aaed55f61 Mon Sep 17 00:00:00
> 2001
> +From 115fcf1daff18aa2f2e130d63704f04031878db0 Mon Sep 17 00:00:00
> 2001
>  From: Khem Raj <raj.khem@gmail.com>
>  Date: Thu, 24 Mar 2016 15:46:14 +0000
>  Subject: [PATCH] Use UINTPTR_MAX instead of __WORDSIZE
> @@ -7,14 +7,13 @@ Do not include sys/user.h since it conflicts with
>  pt_regs struct from kernel APIs in asm/ptrace.h
>  
>  Signed-off-by: Khem Raj <raj.khem@gmail.com>
> ----
> -Upstream-Status: Pending
>  
> +---

I tweaked this not to remove the badly placed Upstream-Status line!

Cheers,

Richard



^ permalink raw reply	[flat|nested] 32+ messages in thread

* Re: [PATCH 03/16] openssl: update to 1.1.1a
  2018-11-22 15:41 ` [PATCH 03/16] openssl: update to 1.1.1a Alexander Kanavin
@ 2018-11-23 23:36   ` Richard Purdie
  0 siblings, 0 replies; 32+ messages in thread
From: Richard Purdie @ 2018-11-23 23:36 UTC (permalink / raw)
  To: Alexander Kanavin, openembedded-core

On Thu, 2018-11-22 at 16:41 +0100, Alexander Kanavin wrote:
> Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com>
> ---
>  .../openssl/0002-fix-CVE-2018-0734.patch      | 108 ----------------
> --
>  .../openssl/0003-fix-CVE-2018-0735.patch      |  50 --------
>  .../{openssl_1.1.1.bb => openssl_1.1.1a.bb}   |   6 +-
>  3 files changed, 2 insertions(+), 162 deletions(-)
>  delete mode 100644 meta/recipes-connectivity/openssl/openssl/0002-
> fix-CVE-2018-0734.patch
>  delete mode 100644 meta/recipes-connectivity/openssl/openssl/0003-
> fix-CVE-2018-0735.patch
>  rename meta/recipes-connectivity/openssl/{openssl_1.1.1.bb =>
> openssl_1.1.1a.bb} (96%)

This one will need to be rebased against master now other openssl
patches merged.

Cheers,

Richard



^ permalink raw reply	[flat|nested] 32+ messages in thread

* Re: [PATCH 01/16] gobject-introspection: update to 1.58.1
  2018-11-22 15:41 [PATCH 01/16] gobject-introspection: update to 1.58.1 Alexander Kanavin
                   ` (15 preceding siblings ...)
  2018-11-22 16:07 ` ✗ patchtest: failure for "gobject-introspection: update ..." and 15 more Patchwork
@ 2018-11-26 22:29 ` Khem Raj
  2018-11-27  8:48   ` Alexander Kanavin
  16 siblings, 1 reply; 32+ messages in thread
From: Khem Raj @ 2018-11-26 22:29 UTC (permalink / raw)
  To: Alexander Kanavin; +Cc: Patches and discussions about the oe-core layer

On Thu, Nov 22, 2018 at 7:42 AM Alexander Kanavin
<alex.kanavin@gmail.com> wrote:
>
> Also, change default meson option to building introspection files
> (previously they were not built by default).
>

I wonder if this is causing

http://errors.yoctoproject.org/Errors/Details/202291/
http://errors.yoctoproject.org/Errors/Details/202280/

> Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com>
> ---
>  ...0001-Port-cross-compilation-support-to-meson.patch | 11 ++++++-----
>  ...e-the-repository-directory-for-native-builds.patch |  2 +-
>  ...tion_1.58.0.bb => gobject-introspection_1.58.1.bb} |  4 ++--
>  3 files changed, 9 insertions(+), 8 deletions(-)
>  rename meta/recipes-gnome/gobject-introspection/{gobject-introspection_1.58.0.bb => gobject-introspection_1.58.1.bb} (98%)
>
> diff --git a/meta/recipes-gnome/gobject-introspection/gobject-introspection/0001-Port-cross-compilation-support-to-meson.patch b/meta/recipes-gnome/gobject-introspection/gobject-introspection/0001-Port-cross-compilation-support-to-meson.patch
> index b0eee1ebe5b..63b02fe0f3d 100644
> --- a/meta/recipes-gnome/gobject-introspection/gobject-introspection/0001-Port-cross-compilation-support-to-meson.patch
> +++ b/meta/recipes-gnome/gobject-introspection/gobject-introspection/0001-Port-cross-compilation-support-to-meson.patch
> @@ -1,10 +1,11 @@
> -From e8ce42c5cb54847517fe8fbe50bbaea452618218 Mon Sep 17 00:00:00 2001
> +From fabf8c505181636182a357e0c6e764b752ccf468 Mon Sep 17 00:00:00 2001
>  From: Alexander Kanavin <alex.kanavin@gmail.com>
>  Date: Thu, 15 Nov 2018 15:10:05 +0100
>  Subject: [PATCH] Port cross-compilation support to meson
>
>  Upstream-Status: Pending
>  Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com>
> +
>  ---
>   gir/meson.build   | 59 ++++++++++++++++++++++++++++++++++-------------
>   meson.build       |  4 +++-
> @@ -12,7 +13,7 @@ Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com>
>   3 files changed, 66 insertions(+), 17 deletions(-)
>
>  diff --git a/gir/meson.build b/gir/meson.build
> -index 607bbc4..c0e221b 100644
> +index 607bbc45..c0e221b3 100644
>  --- a/gir/meson.build
>  +++ b/gir/meson.build
>  @@ -37,15 +37,27 @@ typelibdir = join_paths(get_option('libdir'), 'girepository-1.0')
> @@ -115,7 +116,7 @@ index 607bbc4..c0e221b 100644
>       install_dir: typelibdir,
>     )
>  diff --git a/meson.build b/meson.build
> -index 7ec9532..9e20da5 100644
> +index 7ec95328..9e20da57 100644
>  --- a/meson.build
>  +++ b/meson.build
>  @@ -76,7 +76,9 @@ libffi_dep = dependency('libffi',
> @@ -130,7 +131,7 @@ index 7ec9532..9e20da5 100644
>   subdir('docs')
>   subdir('tests')
>  diff --git a/meson_options.txt b/meson_options.txt
> -index 49726be..3e17c78 100644
> +index 49726be6..d557a3b6 100644
>  --- a/meson_options.txt
>  +++ b/meson_options.txt
>  @@ -21,3 +21,23 @@ option('cairo-libname', type: 'string',
> @@ -150,7 +151,7 @@ index 49726be..3e17c78 100644
>  +  description: 'Use a ldd wrapper instead of system ldd command in giscanner (useful when cross-compiling)'
>  +)
>  +
> -+option('enable-introspection-data', type: 'boolean', value : false,
> ++option('enable-introspection-data', type: 'boolean', value : true,
>  +  description: 'Build introspection data (.gir and .typelib files) in addition to library and tools'
>  +)
>  +
> diff --git a/meta/recipes-gnome/gobject-introspection/gobject-introspection/0001-Relocate-the-repository-directory-for-native-builds.patch b/meta/recipes-gnome/gobject-introspection/gobject-introspection/0001-Relocate-the-repository-directory-for-native-builds.patch
> index b9754a96c22..17b9eac057c 100644
> --- a/meta/recipes-gnome/gobject-introspection/gobject-introspection/0001-Relocate-the-repository-directory-for-native-builds.patch
> +++ b/meta/recipes-gnome/gobject-introspection/gobject-introspection/0001-Relocate-the-repository-directory-for-native-builds.patch
> @@ -1,4 +1,4 @@
> -From 2e2bf063ab79ddff1c284834aef8e22710db9350 Mon Sep 17 00:00:00 2001
> +From a20b4d70f44449875b7c54750ab0f02eefb0870d Mon Sep 17 00:00:00 2001
>  From: Sascha Silbe <x-yo17@se-silbe.de>
>  Date: Fri, 8 Jun 2018 13:55:10 +0200
>  Subject: [PATCH] Relocate the repository directory for native builds
> diff --git a/meta/recipes-gnome/gobject-introspection/gobject-introspection_1.58.0.bb b/meta/recipes-gnome/gobject-introspection/gobject-introspection_1.58.1.bb
> similarity index 98%
> rename from meta/recipes-gnome/gobject-introspection/gobject-introspection_1.58.0.bb
> rename to meta/recipes-gnome/gobject-introspection/gobject-introspection_1.58.1.bb
> index c9a0d816f5e..66f99185389 100644
> --- a/meta/recipes-gnome/gobject-introspection/gobject-introspection_1.58.0.bb
> +++ b/meta/recipes-gnome/gobject-introspection/gobject-introspection_1.58.1.bb
> @@ -22,8 +22,8 @@ SRC_URI = "${GNOME_MIRROR}/${BPN}/${@oe.utils.trim_version("${PV}", 2)}/${BPN}-$
>             file://0001-Port-cross-compilation-support-to-meson.patch \
>             "
>
> -SRC_URI[md5sum] = "94fec875276262037bfcd51226db12fe"
> -SRC_URI[sha256sum] = "27c1590a32749de0a5481ce897772547043e94bccba4bc0a7edb3d8513e401ec"
> +SRC_URI[md5sum] = "101b04fb0184f9a0c718d450c056d68c"
> +SRC_URI[sha256sum] = "4954681fa5c5ed95451d914de89de1263a5b35158b1ded1a8b870042c0d0df89"
>
>  SRC_URI_append_class-native = " file://0001-Relocate-the-repository-directory-for-native-builds.patch"
>
> --
> 2.17.1
>
> --
> _______________________________________________
> Openembedded-core mailing list
> Openembedded-core@lists.openembedded.org
> http://lists.openembedded.org/mailman/listinfo/openembedded-core


^ permalink raw reply	[flat|nested] 32+ messages in thread

* Re: [PATCH 01/16] gobject-introspection: update to 1.58.1
  2018-11-26 22:29 ` [PATCH 01/16] gobject-introspection: update to 1.58.1 Khem Raj
@ 2018-11-27  8:48   ` Alexander Kanavin
  2018-11-27 17:58     ` Khem Raj
  0 siblings, 1 reply; 32+ messages in thread
From: Alexander Kanavin @ 2018-11-27  8:48 UTC (permalink / raw)
  To: Khem Raj; +Cc: OE-core

On Mon, 26 Nov 2018 at 23:29, Khem Raj <raj.khem@gmail.com> wrote:
>
> On Thu, Nov 22, 2018 at 7:42 AM Alexander Kanavin
> <alex.kanavin@gmail.com> wrote:
> >
> > Also, change default meson option to building introspection files
> > (previously they were not built by default).
> >
>
> I wonder if this is causing
>
> http://errors.yoctoproject.org/Errors/Details/202291/
> http://errors.yoctoproject.org/Errors/Details/202280/

"Could not find GIR file 'Gee-0.8.gir'; check XDG_DATA_DIRS or use --includedir"

This file is coming from libgee - it has the necessary file, but does
not install it for some reason.

Alex


^ permalink raw reply	[flat|nested] 32+ messages in thread

* Re: [PATCH 01/16] gobject-introspection: update to 1.58.1
  2018-11-27  8:48   ` Alexander Kanavin
@ 2018-11-27 17:58     ` Khem Raj
  2018-11-27 18:59       ` Khem Raj
  2018-12-01 22:28       ` Alexander Kanavin
  0 siblings, 2 replies; 32+ messages in thread
From: Khem Raj @ 2018-11-27 17:58 UTC (permalink / raw)
  To: Alexander Kanavin; +Cc: Patches and discussions about the oe-core layer

On Tue, Nov 27, 2018 at 12:48 AM Alexander Kanavin
<alex.kanavin@gmail.com> wrote:
>
> On Mon, 26 Nov 2018 at 23:29, Khem Raj <raj.khem@gmail.com> wrote:
> >
> > On Thu, Nov 22, 2018 at 7:42 AM Alexander Kanavin
> > <alex.kanavin@gmail.com> wrote:
> > >
> > > Also, change default meson option to building introspection files
> > > (previously they were not built by default).
> > >
> >
> > I wonder if this is causing
> >
> > http://errors.yoctoproject.org/Errors/Details/202291/
> > http://errors.yoctoproject.org/Errors/Details/202280/
>
> "Could not find GIR file 'Gee-0.8.gir'; check XDG_DATA_DIRS or use --includedir"
>
> This file is coming from libgee - it has the necessary file, but does
> not install it for some reason.

I repeated this qemumips build on a different host ( running archlinux
) and it worked there. The host
where it fails are centos7 and ubuntu 14.04

>
> Alex


^ permalink raw reply	[flat|nested] 32+ messages in thread

* Re: [PATCH 01/16] gobject-introspection: update to 1.58.1
  2018-11-27 17:58     ` Khem Raj
@ 2018-11-27 18:59       ` Khem Raj
  2018-12-02 11:23         ` Alexander Kanavin
  2018-12-01 22:28       ` Alexander Kanavin
  1 sibling, 1 reply; 32+ messages in thread
From: Khem Raj @ 2018-11-27 18:59 UTC (permalink / raw)
  To: Alexander Kanavin; +Cc: Patches and discussions about the oe-core layer

and here is another qemu crash on qemumips seen lately after these updates.

http://errors.yoctoproject.org/Errors/Details/202380/

look for "Segmentation fault"

These two are relatively new regressions. which started to happen in
last two weeks.
On Tue, Nov 27, 2018 at 9:58 AM Khem Raj <raj.khem@gmail.com> wrote:
>
> On Tue, Nov 27, 2018 at 12:48 AM Alexander Kanavin
> <alex.kanavin@gmail.com> wrote:
> >
> > On Mon, 26 Nov 2018 at 23:29, Khem Raj <raj.khem@gmail.com> wrote:
> > >
> > > On Thu, Nov 22, 2018 at 7:42 AM Alexander Kanavin
> > > <alex.kanavin@gmail.com> wrote:
> > > >
> > > > Also, change default meson option to building introspection files
> > > > (previously they were not built by default).
> > > >
> > >
> > > I wonder if this is causing
> > >
> > > http://errors.yoctoproject.org/Errors/Details/202291/
> > > http://errors.yoctoproject.org/Errors/Details/202280/
> >
> > "Could not find GIR file 'Gee-0.8.gir'; check XDG_DATA_DIRS or use --includedir"
> >
> > This file is coming from libgee - it has the necessary file, but does
> > not install it for some reason.
>
> I repeated this qemumips build on a different host ( running archlinux
> ) and it worked there. The host
> where it fails are centos7 and ubuntu 14.04
>
> >
> > Alex


^ permalink raw reply	[flat|nested] 32+ messages in thread

* Re: [PATCH 01/16] gobject-introspection: update to 1.58.1
  2018-11-27 17:58     ` Khem Raj
  2018-11-27 18:59       ` Khem Raj
@ 2018-12-01 22:28       ` Alexander Kanavin
  2018-12-02 18:50         ` Khem Raj
  1 sibling, 1 reply; 32+ messages in thread
From: Alexander Kanavin @ 2018-12-01 22:28 UTC (permalink / raw)
  To: Khem Raj; +Cc: OE-core

On Tue, 27 Nov 2018 at 18:59, Khem Raj <raj.khem@gmail.com> wrote:
> > > On Thu, Nov 22, 2018 at 7:42 AM Alexander Kanavin
> > > <alex.kanavin@gmail.com> wrote:
> > > >
> > > > Also, change default meson option to building introspection files
> > > > (previously they were not built by default).
> > > >
> > >
> > > I wonder if this is causing
> > >
> > > http://errors.yoctoproject.org/Errors/Details/202291/
> > > http://errors.yoctoproject.org/Errors/Details/202280/
> >
> > "Could not find GIR file 'Gee-0.8.gir'; check XDG_DATA_DIRS or use --includedir"
> >
> > This file is coming from libgee - it has the necessary file, but does
> > not install it for some reason.
>
> I repeated this qemumips build on a different host ( running archlinux
> ) and it worked there. The host
> where it fails are centos7 and ubuntu 14.04

I just sent a patch for this to oe-core list - thanks for reporting.

libdazzle crash is a separate issue, I will look into it.

Alex


^ permalink raw reply	[flat|nested] 32+ messages in thread

* Re: [PATCH 01/16] gobject-introspection: update to 1.58.1
  2018-11-27 18:59       ` Khem Raj
@ 2018-12-02 11:23         ` Alexander Kanavin
  2018-12-02 18:58           ` Khem Raj
  0 siblings, 1 reply; 32+ messages in thread
From: Alexander Kanavin @ 2018-12-02 11:23 UTC (permalink / raw)
  To: Khem Raj; +Cc: OE-core

On Tue, 27 Nov 2018 at 20:00, Khem Raj <raj.khem@gmail.com> wrote:
>
> and here is another qemu crash on qemumips seen lately after these updates.
>
> http://errors.yoctoproject.org/Errors/Details/202380/
>
> look for "Segmentation fault"
>

I just tried this on qemumips with poky master, and couldn't
reproduce. Qemu works without crashing.

Alex


^ permalink raw reply	[flat|nested] 32+ messages in thread

* Re: [PATCH 01/16] gobject-introspection: update to 1.58.1
  2018-12-01 22:28       ` Alexander Kanavin
@ 2018-12-02 18:50         ` Khem Raj
  2018-12-02 22:22           ` Richard Purdie
  0 siblings, 1 reply; 32+ messages in thread
From: Khem Raj @ 2018-12-02 18:50 UTC (permalink / raw)
  To: Alexander Kanavin; +Cc: Patches and discussions about the oe-core layer

On Sat, Dec 1, 2018 at 2:28 PM Alexander Kanavin <alex.kanavin@gmail.com> wrote:
>
> On Tue, 27 Nov 2018 at 18:59, Khem Raj <raj.khem@gmail.com> wrote:
> > > > On Thu, Nov 22, 2018 at 7:42 AM Alexander Kanavin
> > > > <alex.kanavin@gmail.com> wrote:
> > > > >
> > > > > Also, change default meson option to building introspection files
> > > > > (previously they were not built by default).
> > > > >
> > > >
> > > > I wonder if this is causing
> > > >
> > > > http://errors.yoctoproject.org/Errors/Details/202291/
> > > > http://errors.yoctoproject.org/Errors/Details/202280/
> > >
> > > "Could not find GIR file 'Gee-0.8.gir'; check XDG_DATA_DIRS or use --includedir"
> > >
> > > This file is coming from libgee - it has the necessary file, but does
> > > not install it for some reason.
> >
> > I repeated this qemumips build on a different host ( running archlinux
> > ) and it worked there. The host
> > where it fails are centos7 and ubuntu 14.04
>
> I just sent a patch for this to oe-core list - thanks for reporting.
>

thanks I can confirm this is fixed with this patch which is in master-next

> libdazzle crash is a separate issue, I will look into it.
>
> Alex


^ permalink raw reply	[flat|nested] 32+ messages in thread

* Re: [PATCH 01/16] gobject-introspection: update to 1.58.1
  2018-12-02 11:23         ` Alexander Kanavin
@ 2018-12-02 18:58           ` Khem Raj
  0 siblings, 0 replies; 32+ messages in thread
From: Khem Raj @ 2018-12-02 18:58 UTC (permalink / raw)
  To: Alexander Kanavin; +Cc: Patches and discussions about the oe-core layer

On Sun, Dec 2, 2018 at 3:23 AM Alexander Kanavin <alex.kanavin@gmail.com> wrote:
>
> On Tue, 27 Nov 2018 at 20:00, Khem Raj <raj.khem@gmail.com> wrote:
> >
> > and here is another qemu crash on qemumips seen lately after these updates.
> >
> > http://errors.yoctoproject.org/Errors/Details/202380/
> >
> > look for "Segmentation fault"
> >
>
> I just tried this on qemumips with poky master, and couldn't
> reproduce. Qemu works without crashing.

I think this regression happens on certain host distros. E.g. ubuntu 16.06
ubuntu 14.04, centos7 I could not reproduce it on ubuntu 18.04 or archlinux

>
> Alex


^ permalink raw reply	[flat|nested] 32+ messages in thread

* Re: [PATCH 01/16] gobject-introspection: update to 1.58.1
  2018-12-02 18:50         ` Khem Raj
@ 2018-12-02 22:22           ` Richard Purdie
  2018-12-03 11:49             ` Alexander Kanavin
  0 siblings, 1 reply; 32+ messages in thread
From: Richard Purdie @ 2018-12-02 22:22 UTC (permalink / raw)
  To: Khem Raj, Alexander Kanavin
  Cc: Patches and discussions about the oe-core layer

On Sun, 2018-12-02 at 10:50 -0800, Khem Raj wrote:
> On Sat, Dec 1, 2018 at 2:28 PM Alexander Kanavin <
> alex.kanavin@gmail.com> wrote:
> > On Tue, 27 Nov 2018 at 18:59, Khem Raj <raj.khem@gmail.com> wrote:
> > > > > On Thu, Nov 22, 2018 at 7:42 AM Alexander Kanavin
> > > > > <alex.kanavin@gmail.com> wrote:
> > > > > > Also, change default meson option to building introspection
> > > > > > files
> > > > > > (previously they were not built by default).
> > > > > > 
> > > > > 
> > > > > I wonder if this is causing
> > > > > 
> > > > > http://errors.yoctoproject.org/Errors/Details/202291/
> > > > > http://errors.yoctoproject.org/Errors/Details/202280/
> > > > 
> > > > "Could not find GIR file 'Gee-0.8.gir'; check XDG_DATA_DIRS or
> > > > use --includedir"
> > > > 
> > > > This file is coming from libgee - it has the necessary file,
> > > > but does
> > > > not install it for some reason.
> > > 
> > > I repeated this qemumips build on a different host ( running
> > > archlinux
> > > ) and it worked there. The host
> > > where it fails are centos7 and ubuntu 14.04
> > 
> > I just sent a patch for this to oe-core list - thanks for
> > reporting.
> > 
> 
> thanks I can confirm this is fixed with this patch which is in
> master-next
> 
> > libdazzle crash is a separate issue, I will look into it.

Oddly enough, master-next resulted in:

https://autobuilder.yoctoproject.org/typhoon/#/builders/52/builds/48/steps/7/logs/step1b
https://autobuilder.yoctoproject.org/typhoon/#/builders/68/builds/33/steps/7/logs/step1b

so I've removed the gobject-introspection patch which I'd included to
try and isolate the cause...

Cheers,

Richard




^ permalink raw reply	[flat|nested] 32+ messages in thread

* Re: [PATCH 01/16] gobject-introspection: update to 1.58.1
  2018-12-02 22:22           ` Richard Purdie
@ 2018-12-03 11:49             ` Alexander Kanavin
  0 siblings, 0 replies; 32+ messages in thread
From: Alexander Kanavin @ 2018-12-03 11:49 UTC (permalink / raw)
  To: Richard Purdie; +Cc: OE-core

On Sun, 2 Dec 2018 at 23:22, Richard Purdie
<richard.purdie@linuxfoundation.org> wrote:

> > > I just sent a patch for this to oe-core list - thanks for
> > > reporting.
> > >
> >
> > thanks I can confirm this is fixed with this patch which is in
> > master-next
> >
> > > libdazzle crash is a separate issue, I will look into it.
>
> Oddly enough, master-next resulted in:
>
> https://autobuilder.yoctoproject.org/typhoon/#/builders/52/builds/48/steps/7/logs/step1b
> https://autobuilder.yoctoproject.org/typhoon/#/builders/68/builds/33/steps/7/logs/step1b
>
> so I've removed the gobject-introspection patch which I'd included to
> try and isolate the cause...

This was a multilib issue where gir files are installed in libdir (and
not datadir like in non-multilib).  I'll send an updated patch in a
moment.

Alex


^ permalink raw reply	[flat|nested] 32+ messages in thread

end of thread, other threads:[~2018-12-03 11:49 UTC | newest]

Thread overview: 32+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2018-11-22 15:41 [PATCH 01/16] gobject-introspection: update to 1.58.1 Alexander Kanavin
2018-11-22 15:41 ` [PATCH 02/16] openssl10: update to 1.0.2q Alexander Kanavin
2018-11-22 15:41 ` [PATCH 03/16] openssl: update to 1.1.1a Alexander Kanavin
2018-11-23 23:36   ` Richard Purdie
2018-11-22 15:41 ` [PATCH 04/16] dmidecode: update to 3.2 Alexander Kanavin
2018-11-22 15:41 ` [PATCH 05/16] tiff: update to 4.0.10 Alexander Kanavin
2018-11-22 15:41 ` [PATCH 06/16] gdbm: update to 1.18.1 Alexander Kanavin
2018-11-22 15:41 ` [PATCH 07/16] icu: update to 63.1 Alexander Kanavin
2018-11-22 15:41 ` [PATCH 08/16] btrfs-tools: update to 4.19 Alexander Kanavin
2018-11-22 23:40   ` Richard Purdie
2018-11-22 15:41 ` [PATCH 09/16] vala: update to 0.42.3 Alexander Kanavin
2018-11-22 15:41 ` [PATCH 10/16] webkitgtk: update to 2.22.4 Alexander Kanavin
2018-11-22 15:41 ` [PATCH 11/16] psmisc: update to 23.2 Alexander Kanavin
2018-11-23 23:35   ` Richard Purdie
2018-11-22 15:41 ` [PATCH 12/16] sysprof: update to 3.30.2 Alexander Kanavin
2018-11-22 15:41 ` [PATCH 13/16] libwebp: update to 1.0.1 Alexander Kanavin
2018-11-22 15:41 ` [PATCH 14/16] lighttpd: update to 1.4.51 Alexander Kanavin
2018-11-22 15:41 ` [PATCH 15/16] libdnf: update to 0.22.3 Alexander Kanavin
2018-11-22 15:41 ` [PATCH 16/16] dnf: update to 4.0.9 Alexander Kanavin
2018-11-22 23:38   ` Richard Purdie
2018-11-23 15:33     ` Richard Purdie
2018-11-22 16:07 ` ✗ patchtest: failure for "gobject-introspection: update ..." and 15 more Patchwork
2018-11-26 22:29 ` [PATCH 01/16] gobject-introspection: update to 1.58.1 Khem Raj
2018-11-27  8:48   ` Alexander Kanavin
2018-11-27 17:58     ` Khem Raj
2018-11-27 18:59       ` Khem Raj
2018-12-02 11:23         ` Alexander Kanavin
2018-12-02 18:58           ` Khem Raj
2018-12-01 22:28       ` Alexander Kanavin
2018-12-02 18:50         ` Khem Raj
2018-12-02 22:22           ` Richard Purdie
2018-12-03 11:49             ` Alexander Kanavin

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.