From patchwork Fri Dec 26 19:09:57 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gyorgy Sarvari X-Patchwork-Id: 77548 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 52E68E8FDAC for ; Fri, 26 Dec 2025 19:10:09 +0000 (UTC) Received: from mail-wm1-f44.google.com (mail-wm1-f44.google.com [209.85.128.44]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.158345.1766776204208643435 for ; Fri, 26 Dec 2025 11:10:04 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=XB8iHR5q; spf=pass (domain: gmail.com, ip: 209.85.128.44, mailfrom: skandigraun@gmail.com) Received: by mail-wm1-f44.google.com with SMTP id 5b1f17b1804b1-47796a837c7so48493985e9.0 for ; Fri, 26 Dec 2025 11:10:03 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1766776202; x=1767381002; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:message-id:date:subject:to :from:from:to:cc:subject:date:message-id:reply-to; bh=gJ2V13+EsI+CcuzRonIgaBLNwmPPXemePdg47GTrbAM=; b=XB8iHR5qr1bFXGldCexmLssaZZSuEBnncT0Nspvhd22icEU9QlqBu1/B9E+qFYsy0h yPiBvy+/+7IOsD7Tp9gOSgDEQN7U0dfj8+wlplF7nsLWKw8RH0Qj2gDKpjK4WuCW9vQH YkvoNE3PfgbgUQDVpLEGB5GJ5t5iORehzmk6vWaV1lBn7hckgjyXpp3ErVOdI0smZUo6 W+8xT4aQxJWtcX2vmzkrUeO/VeN9aAUIrh3fgQtrq+3xSBpnHpC6kuCK7E+FTUqgpopi WG1XUCyPhKJAbKmq7Yk8i6XNfzduKU8OS80+64jwcGPvlDzWrpovrYuwX+TGvof4/s7s JnDA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1766776202; x=1767381002; h=content-transfer-encoding:mime-version:message-id:date:subject:to :from:x-gm-gg:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=gJ2V13+EsI+CcuzRonIgaBLNwmPPXemePdg47GTrbAM=; b=dLGUVCNYrin7cnF7ZOKjkIx6h81Rm5nHmXvJFp7g4f2zEctno3+H3/nSrbHoE8a13d wohMH8R4TdZ2Q+Z2jpzpYguddJihEBXYkjhx5V6ldPJ9Yj/dJ6vU5s8OmrFH5t8Vp5vy hgSIJMMPEtZWCuTivCKGpdNAyTr6ZW2kIPk0thYiwGPk1VQWEXc2hAc911Dcoyyfrn6Q dixHHNShiREKy8Yh4Q0qHRp8Zha1cp89MGxU08aGgA9NV6Nv0OqPPs0UM8QIK1EKWhCP P5Z2lVH6bgMLcuxBgPM7C2oD323Y5PifgQehmH1z7ZEoNeNui8LPwt3mIgXBYXQ3gK5M Su5A== X-Gm-Message-State: AOJu0YwVEoI1y98iqHQAbyTZ6ZVovMicCkquARakSVaCgNfjO8C/Foam 0Hfn3D5UPc79DebfIt95/dkbeYIsdwaiOq0RGvo8Nlt6BBY0I3PyGXcbx2xtFg== X-Gm-Gg: AY/fxX6ful9HgZ+PDAfWVOY3bLKlvsYX9R80H783nm4VaOINqDdCzUTQQ38vHYEizod 3iIHI1v3nnehtF69qYNWxHdu9g4NgCZnoBUnT5vAnbyVKuT/HCHRQNmGpiJZDcCJ2e10P8nd8ia DvFLl8aBS9WN77sh4a9OGmo89uZZMvhYW7EFPEfhbyaoT4RA/1YF+fAC4Srn20FihosoxtFJ7C7 H1LvSd/cksV6pxCVJ7S8t1OvCMkF+h/YbgOq+t/2fw6Hq1nXZCVP2wyKRzQ6+eOZ5Oho+3YzglQ rAPl2gZTCjc8EFR2RRvOojcc8rYnQMcwV1lBRz1FcC+GAcSQGpwyLmFh7+zuYG24XedpM4Q2QOx Z4q/njSwTaX46By5BFuppzbEFJf+DrmPwidxo8JM/YbpNOSG0WqUYczpHnGORvqmPOuIuQN1iV7 kFYAce7BYv X-Google-Smtp-Source: AGHT+IE0OzOsnSOD+9XRS2n/wVb5FlfAGf95v8YdImgHJ13bCYnXj8tAfTfZZr6vm3gD+vnmtfZkYw== X-Received: by 2002:a05:600c:4e8f:b0:479:3a89:121d with SMTP id 5b1f17b1804b1-47d1959c74fmr259008485e9.36.1766776202366; Fri, 26 Dec 2025 11:10:02 -0800 (PST) Received: from desktop ([51.154.145.205]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-4324ea1afbfsm47583330f8f.9.2025.12.26.11.10.01 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 26 Dec 2025 11:10:01 -0800 (PST) From: Gyorgy Sarvari To: openembedded-devel@lists.openembedded.org Subject: [meta-oe][PATCH 1/5] redis: ignore CVE-2025-46686 Date: Fri, 26 Dec 2025 20:09:57 +0100 Message-ID: <20251226191001.2920748-1-skandigraun@gmail.com> X-Mailer: git-send-email 2.52.0 MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 26 Dec 2025 19:10:09 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/122939 Details: https://nvd.nist.gov/vuln/detail/CVE-2025-46686 Upstream disputes that it is a security violation, and says that implementing a mitigation for this would negatively affect the rest of the application, so they elected to ignore it. See Github advisory about the same vulnerability: https://github.com/redis/redis/security/advisories/GHSA-2r7g-8hpc-rpq9 Signed-off-by: Gyorgy Sarvari --- meta-oe/recipes-extended/redis/redis_6.2.21.bb | 1 + meta-oe/recipes-extended/redis/redis_7.2.12.bb | 1 + 2 files changed, 2 insertions(+) diff --git a/meta-oe/recipes-extended/redis/redis_6.2.21.bb b/meta-oe/recipes-extended/redis/redis_6.2.21.bb index 0466e34000..474aea7dc3 100644 --- a/meta-oe/recipes-extended/redis/redis_6.2.21.bb +++ b/meta-oe/recipes-extended/redis/redis_6.2.21.bb @@ -28,6 +28,7 @@ CVE_STATUS[CVE-2025-21605] = "cpe-incorrect: the used version already contains t # deps/ directory and are therefore not affected by this issue. CVE_STATUS[CVE-2022-0543] = "not-applicable-config: Debian-specific packaging issue caused by loading system-wide Lua libraries; upstream builds use embedded Lua and are not affected" CVE_STATUS[CVE-2022-3734] = "not-applicable-config: only affects Windows" +CVE_STATUS[CVE-2025-46686] = "disputed: upstream rejected because mitigating it would affect other functionality" inherit update-rc.d systemd useradd diff --git a/meta-oe/recipes-extended/redis/redis_7.2.12.bb b/meta-oe/recipes-extended/redis/redis_7.2.12.bb index 0989ed5e8d..8abf758930 100644 --- a/meta-oe/recipes-extended/redis/redis_7.2.12.bb +++ b/meta-oe/recipes-extended/redis/redis_7.2.12.bb @@ -23,6 +23,7 @@ RPROVIDES:${PN} = "virtual-redis" CVE_STATUS[CVE-2025-21605] = "cpe-incorrect: the used version already contains the fix" CVE_STATUS[CVE-2025-27151] = "cpe-incorrect: the used version already contains the fix" +CVE_STATUS[CVE-2025-46686] = "disputed: upstream rejected because mitigating it would affect other functionality" CVE_STATUS[CVE-2025-46817] = "cpe-incorrect: the used version already contains the fix" CVE_STATUS[CVE-2025-46818] = "cpe-incorrect: the used version already contains the fix" CVE_STATUS[CVE-2025-46819] = "cpe-incorrect: the used version already contains the fix" From patchwork Fri Dec 26 19:09:58 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gyorgy Sarvari X-Patchwork-Id: 77546 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6A49EE8FDBA for ; Fri, 26 Dec 2025 19:10:09 +0000 (UTC) Received: from mail-wr1-f44.google.com (mail-wr1-f44.google.com [209.85.221.44]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.157475.1766776204877129181 for ; Fri, 26 Dec 2025 11:10:05 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=AS42AghE; spf=pass (domain: gmail.com, ip: 209.85.221.44, mailfrom: skandigraun@gmail.com) Received: by mail-wr1-f44.google.com with SMTP id ffacd0b85a97d-42fb2314f52so4147284f8f.0 for ; Fri, 26 Dec 2025 11:10:04 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1766776203; x=1767381003; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=qB5Zun0ePNLfWhfk1LZQncvVCiTof/wV7beVx2F9dvo=; b=AS42AghEaWBT3MIFxH2Egc8v8ijyxrN5rGMFuohb1rs3FNRKSM/a6E6P6HeCvjadYi evBPdb78hQ0J9VeaLnCDXfNMvDPDCnTah+QOnL7uwxGXUvSGyRemAEccK3GUHLBnN2yg 2gKVLFl2vrwnnTZyE6heUXwN1aIhFgzCAUCvPGgNI55onawU8BX0VtxBEaiJ2uozzkdZ ohjQrXB4FqeC4jxScmaxd3h8eV5XJvhd9kS8twCPvbaO2iT7tbq9vxF1xRDyfe7HQUaz aFaMeiWVnKmwbXDS0W+b3kWE54295rnYiNVEbWTQtJFc6Y23tU/oDaFqqXidv930uk1H S/mg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1766776203; x=1767381003; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=qB5Zun0ePNLfWhfk1LZQncvVCiTof/wV7beVx2F9dvo=; b=OXjcbGtwb8GC5Vs4vlcP4Ef54igjg1hVQ0Cz0QGUegav+0FPFZz5MIJItY8F0Ihtaj pXtjVh4APJNfXVRI4jVhpIvWh5ScF7Fbiy05ITmcImChJ7tqE+TSn9Jr4xR+olZFxjnp U4opkqsYyJdFI3l1mbQ1w3//9rX7Vb2w9WUXEBZwNGelYNuRGrLnsQYuvCMKJJ+eGLbm sdWPr8uoAm3FUToJ68g2f7mMY52LGFSphRZbxKgXPYxu1t2oeGWBiBft0Z48nH9Kom4k hQJNUgwZQdOoSCgNqkLgRfGL/cn6mwxF+RjFp6T2Erw+7QwBEBA6Ne9C3fN1PaaWAw/O a5Vw== X-Gm-Message-State: AOJu0Yw1YSZv3dnNakvNbmakvmDLlFjdp7ZDVTHTSCFvFK3oxAFg+Qx5 gTrX7rzDucehl/iaIAni5pO5JIIK0uIpHQAEd5+CdNuJbvy+kmifa6EWQ/cWZw== X-Gm-Gg: AY/fxX4ANniLGYDA3VaubUMloZcK3usqZUhtzNC85QmTlEpmysKPVEPu6Iym9eutvWk 7vmiyd2xow6DGPqXHz7qJ+eTGrTP+fPQ/9pg3IGcxt07D6kl931unG/vOc6NIXO0wElJIALnwli HlUCwyJu26U3S4qmStZYt6QSo1dOVTRb8JZ+F/E2APJsatejlwHX2yNnco2yyAVjgfLkRX+L97a gbtteSfpWX16v0m6QAjHQctf4Ra2t7FrsC5mmQsuvFuTvrVUEqo0wPoyH4EFqdRHEatfvZtOxd/ kop7SsZ/gHH4cxrG8NQZqm+0bLRkSU9yCd1kqQU8Vdza9Q7c7UyBmcOxShXRCq1/svwt//xyuJL EDTl6czG6wHcpat2WICOaGa13+t0vY6ZB4bsQ44Tz5zcZJYUjOjYJ7+ad4Tj5E4lXljbdjO2e75 xwaurwR1ObFMZ0bPloeH8= X-Google-Smtp-Source: AGHT+IGikxAvLemEJbXtle9qvRK1vgoBxHJ4XvsT2RQOH4kTlqccqVXWIDFPQbs5UTxZC5b0ww03+Q== X-Received: by 2002:a05:6000:4024:b0:42f:b9c6:c894 with SMTP id ffacd0b85a97d-4324e70957dmr27980367f8f.52.1766776203064; Fri, 26 Dec 2025 11:10:03 -0800 (PST) Received: from desktop ([51.154.145.205]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-4324ea1afbfsm47583330f8f.9.2025.12.26.11.10.02 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 26 Dec 2025 11:10:02 -0800 (PST) From: Gyorgy Sarvari To: openembedded-devel@lists.openembedded.org Subject: [meta-filesystems][PATCH 2/5] simple-mtpfs: update to latest revision Date: Fri, 26 Dec 2025 20:09:58 +0100 Message-ID: <20251226191001.2920748-2-skandigraun@gmail.com> X-Mailer: git-send-email 2.52.0 In-Reply-To: <20251226191001.2920748-1-skandigraun@gmail.com> References: <20251226191001.2920748-1-skandigraun@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 26 Dec 2025 19:10:09 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/122940 The application hasn't received updates lately, but there is a bugfix that is missing from the recipe. Changelog: On partial read/write, keep reading: This avoids rsync errors and avoids data loss with cp, due to failing to copy the last byte of 0.1953125% of files. Signed-off-by: Gyorgy Sarvari --- .../recipes-filesystems/simple-mtpfs/simple-mtpfs_0.4.0.bb | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/meta-filesystems/recipes-filesystems/simple-mtpfs/simple-mtpfs_0.4.0.bb b/meta-filesystems/recipes-filesystems/simple-mtpfs/simple-mtpfs_0.4.0.bb index 05a1004b65..97c5940e15 100644 --- a/meta-filesystems/recipes-filesystems/simple-mtpfs/simple-mtpfs_0.4.0.bb +++ b/meta-filesystems/recipes-filesystems/simple-mtpfs/simple-mtpfs_0.4.0.bb @@ -9,5 +9,6 @@ DEPENDS = "fuse libmtp autoconf-archive" inherit autotools pkgconfig SRC_URI = "git://github.com/phatina/simple-mtpfs.git;protocol=https;branch=master" -SRCREV = "19e7bb9b608b0c0dce2ee6f56fac75901bc69529" +SRCREV = "5dfd25c72caf83bc85fc636804f1456bc0f6c1c6" +PV .= "+git" From patchwork Fri Dec 26 19:09:59 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gyorgy Sarvari X-Patchwork-Id: 77547 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 614E5E8FDB8 for ; Fri, 26 Dec 2025 19:10:09 +0000 (UTC) Received: from mail-wr1-f49.google.com (mail-wr1-f49.google.com [209.85.221.49]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.158346.1766776205416391506 for ; Fri, 26 Dec 2025 11:10:05 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=OBgCodbw; spf=pass (domain: gmail.com, ip: 209.85.221.49, mailfrom: skandigraun@gmail.com) Received: by mail-wr1-f49.google.com with SMTP id ffacd0b85a97d-42e2e77f519so4785514f8f.2 for ; Fri, 26 Dec 2025 11:10:05 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1766776204; x=1767381004; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=g5N0jaxQnY2P6EZF6mXe1ymK34K/dW0R/v1cATtU7xk=; b=OBgCodbwfD/5Jmb67zcPL5d5DiHCn85Rtu/sWolhG3MZY1yYOFa4NdM6AJV3/SGtst 1FjfhpfqQY6N59teLcF4Iw4VZn7cxv5mOOKfwTL+FTCt4euvV5JcL6Nv/dMhQS5HTsc6 uLgz3P8M1TOJRN7IO5ROa8b7fadMA+J+BxQ/GU1y5/Yent9DQ19bYM5u5MTa/4p3CsAf OJzWpoyF2SEnGvkowE3J0zXJ2Qiyyrd4JFSZIMqlrtbdMQ4N/3NBGWFxx1vJLH7Ob6+a p/tCqs/UPRAicTczdpS+Vk0WVF6ycpjzHFDO2Vz5l/tKx8KvA8QVYZfApVFWLPwAAVhB +Nww== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1766776204; x=1767381004; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=g5N0jaxQnY2P6EZF6mXe1ymK34K/dW0R/v1cATtU7xk=; b=ZP04Wv+HeIc612pELXMw38JZ4h4dkYZQ4D+e27ePTCuAvd3zTN8Fl+RN+neXesvoUb GvM2vm3/e5VRAHuFFHVof1oCM6GrbPGbvTY+/5GfPnhGPUwR3VhbdQfG722kRrVA371S tFAlt/0WZPQNp89dqlytzh5mxEIJ9Zcr81z0cMNDQ+l678Gfd1uLtevAx/T6JMF2z7E6 Xi7uX/MwRFXyVYLPeb/xRAehRZ74+D059Yvd3lpn37L6YFC1c2SJzJlKpCqVc737KKQ8 iKyw2R1lUNvSHaBnWU8bDuB0oz0lz8iYqm59NPho2P2AcNN1/sHZbODeveiAl9VgE3MY Quiw== X-Gm-Message-State: AOJu0Ywpe/rfHqwNk2hNDUgENWA/xD/dkdYn/N+PnksFz57Y3yOHE7fR QGVGkJpzflmQy4H/ukEp6s5rSnscdGaPRHtelcHT5Ehx12OOLgyeOC+fabCwQA== X-Gm-Gg: AY/fxX5/ksnIEIQRmKbSqFUqxbU7FnDxfODOc2DYAb+r+U6zLMAREd/127cm2ymM0bo vvnTKF9Q+u4Ys7u0N2yYdCgDV0OM+Dj65co/YikfrAweCqMtfPWGKdam6UGsdZYKqzU1L0tByoJ ov06bSNPv3sZrgEUXSViOkCixbgeOG2gOuG87oTYNn91fgNe7Xe+WJ2WNU/Rsc4z5vmkm3tOEgz YfR1iAnK3ddIwcKsD+wFNIAtgMwfVDasxmx9t0BJN+rU90DRp/1ahgnHyBafmFkNuEAGr1EkyZu 8lB3KNihSRM9SCQ4T7u5YcfNZhsfppWxn4RdDVlpv44rmOOYDYfi7rcYOgklkutS2H+QJ63cM6g S2KrvIrD6LuLROzkPULElcE7MalauUTbsxQmdP88RCrO2kOZeL72ei1ZtLokiPBmlsFpZNxCErP cTjhAaxq9g X-Google-Smtp-Source: AGHT+IG28vBstsOK6S6OrqOITFhp6Af9quwwJg9buRbQFZKPdYPLdc/7WqzdyeLqgHAmUVgEfn+H/A== X-Received: by 2002:a05:6000:2302:b0:42f:bbc6:eda2 with SMTP id ffacd0b85a97d-4324e5060b7mr25481060f8f.40.1766776203699; Fri, 26 Dec 2025 11:10:03 -0800 (PST) Received: from desktop ([51.154.145.205]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-4324ea1afbfsm47583330f8f.9.2025.12.26.11.10.03 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 26 Dec 2025 11:10:03 -0800 (PST) From: Gyorgy Sarvari To: openembedded-devel@lists.openembedded.org Subject: [meta-filesystems][PATCH 3/5] unionfs-fuse: upgarde 3.4 -> 3.7 Date: Fri, 26 Dec 2025 20:09:59 +0100 Message-ID: <20251226191001.2920748-3-skandigraun@gmail.com> X-Mailer: git-send-email 2.52.0 In-Reply-To: <20251226191001.2920748-1-skandigraun@gmail.com> References: <20251226191001.2920748-1-skandigraun@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 26 Dec 2025 19:10:09 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/122941 License-Update: copyright year bump Drop patch which became unneeded (CFLAGS are not overwritten anymore) Selected shortlog (without readme and CI changes): - Use fchmodat with AT_SYMLINK_NOFOLLOW if available - Use utimensat on macOS - tests: properly test for directory existence using os.path.isdir - Enable commented test for rmdir - Add more tests for renaming using cow - Allow directory renaming when cow is disabled but it only exists in one branch - Use existing function for checking if file exists - Fix directory rename hiding files from lower branches - remove deprecated "use_ino" option from examples and documentation - CMake: Support CFLAGS= and -DCMAKE_C_FLAGS= from the outside - set -D_FILE_OFFSET_BITS=64 unconditionally so that compilation does not fail on 32bit systems Signed-off-by: Gyorgy Sarvari --- .../files/0001-support-cross-compiling.patch | 31 ------------------- ...nionfs-fuse_3.4.bb => unionfs-fuse_3.7.bb} | 8 ++--- 2 files changed, 3 insertions(+), 36 deletions(-) delete mode 100644 meta-filesystems/recipes-filesystems/unionfs-fuse/files/0001-support-cross-compiling.patch rename meta-filesystems/recipes-filesystems/unionfs-fuse/{unionfs-fuse_3.4.bb => unionfs-fuse_3.7.bb} (65%) diff --git a/meta-filesystems/recipes-filesystems/unionfs-fuse/files/0001-support-cross-compiling.patch b/meta-filesystems/recipes-filesystems/unionfs-fuse/files/0001-support-cross-compiling.patch deleted file mode 100644 index 9b4d0f6cae..0000000000 --- a/meta-filesystems/recipes-filesystems/unionfs-fuse/files/0001-support-cross-compiling.patch +++ /dev/null @@ -1,31 +0,0 @@ -From 6e794a36564a2639a07d8720260e33d7c9435aa4 Mon Sep 17 00:00:00 2001 -From: Alper Ak -Date: Fri, 10 Nov 2023 20:50:48 +0300 -Subject: [PATCH] support cross compiling - -Do not override OE CMAKE variables - -Signed-off-by: Hongxu Jia -Signed-off-by: Alper Ak - -Upstream-Status: Pending ---- - src/CMakeLists.txt | 4 ++-- - 1 file changed, 2 insertions(+), 2 deletions(-) - -diff --git a/src/CMakeLists.txt b/src/CMakeLists.txt -index f549496..ab71fb2 100644 ---- a/src/CMakeLists.txt -+++ b/src/CMakeLists.txt -@@ -4,9 +4,9 @@ set(UNIONFS_SRCS unionfs.c opts.c debug.c findbranch.c readdir.c - fuse_ops.c) - set(UNIONFSCTL_SRCS unionfsctl.c) - --SET(CMAKE_C_FLAGS "-pipe -W -Wall -D_FORTIFY_SOURCE=2") -+SET(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -pipe -W -Wall -D_FORTIFY_SOURCE=2") - SET(CMAKE_C_FLAGS_RELWITHDEBINFO "-O2 -g") --SET(CMAKE_C_FLAGS_RELEASE "-O2") -+SET(CMAKE_C_FLAGS_RELEASE "${CMAKE_C_FLAGS_RELEASE} -O2") - SET(CMAKE_C_FLAGS_DEBUG "-O0 -g -DDEBUG") - - add_executable(unionfs ${UNIONFS_SRCS} ${HASHTABLE_SRCS}) diff --git a/meta-filesystems/recipes-filesystems/unionfs-fuse/unionfs-fuse_3.4.bb b/meta-filesystems/recipes-filesystems/unionfs-fuse/unionfs-fuse_3.7.bb similarity index 65% rename from meta-filesystems/recipes-filesystems/unionfs-fuse/unionfs-fuse_3.4.bb rename to meta-filesystems/recipes-filesystems/unionfs-fuse/unionfs-fuse_3.7.bb index fc474e3238..5ba202b90c 100644 --- a/meta-filesystems/recipes-filesystems/unionfs-fuse/unionfs-fuse_3.4.bb +++ b/meta-filesystems/recipes-filesystems/unionfs-fuse/unionfs-fuse_3.7.bb @@ -3,13 +3,11 @@ HOMEPAGE = "https://github.com/rpodgorny/unionfs-fuse" SECTION = "console/network" LICENSE = "BSD-3-Clause" LIC_FILES_CHKSUM = "file://src/unionfs.c;beginline=3;endline=8;md5=30fa8de70fd8abab00b483a1b7943a32 \ - file://LICENSE;md5=7e5a37fce17307066eec6b23546da3b3 \ + file://LICENSE;md5=0e75c95b3e0e1c01489b39e7fadd3e2d \ " -SRC_URI = "git://github.com/rpodgorny/${BPN}.git;branch=master;protocol=https \ - file://0001-support-cross-compiling.patch \ - " -SRCREV = "773f1853b043eeb64b7459f903a2c65bd096f9d9" +SRC_URI = "git://github.com/rpodgorny/${BPN}.git;branch=master;protocol=https;tag=v${PV}" +SRCREV = "3fcbd11f78b9a9e02ea0e861d741840fe45dc9c8" DEPENDS = "fuse3" RDEPENDS:${PN} = "bash" From patchwork Fri Dec 26 19:10:00 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gyorgy Sarvari X-Patchwork-Id: 77545 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 50DC7E8FDB4 for ; Fri, 26 Dec 2025 19:10:09 +0000 (UTC) Received: from mail-wr1-f54.google.com (mail-wr1-f54.google.com [209.85.221.54]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.157476.1766776206048380186 for ; Fri, 26 Dec 2025 11:10:06 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=E5vFy6yo; spf=pass (domain: gmail.com, ip: 209.85.221.54, mailfrom: skandigraun@gmail.com) Received: by mail-wr1-f54.google.com with SMTP id ffacd0b85a97d-430f2ee2f00so3520079f8f.3 for ; Fri, 26 Dec 2025 11:10:05 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1766776204; x=1767381004; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=fUTPwEcCesXPNPwTBDR2VBqZ3E3+1Sg0xZX6Rrg5r/g=; b=E5vFy6yoEvtS8vOZLofWdlqqbjZ2ulFK5hULE9drYUwoDHkJevDVA4Y0v1hCfXTXKz Xws9NH8yrXJX4ArTs68qwL7ppgyJeR8TjS1+Q4a/UyYm2/mZ0BI105DPy+2Uop90AfS1 8z/zrUQXQWy6iKILU+hL2u3d3AsYXgPJoCZ44QchbFbtJIFTgz0H6vpnMXwuW9hcsnLA qJYOxrhkMAMn7v8jaFPpmbJR/BY+XwzUiNpJcjQyI2Dt7hx0GEE84EL8aS1SelmqOms7 7w0lFrKrq+8LA/r5sLuks7+/LjnTBnGUwLRws5S1benc/9fZCcAmp7FwohaSM69knpHz AF0w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1766776204; x=1767381004; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=fUTPwEcCesXPNPwTBDR2VBqZ3E3+1Sg0xZX6Rrg5r/g=; b=hf/lZrBAykKJHqmIbG560bJAQ44qOeEMqYjs/rLB8Mc4wvJJBou8BTg/zHvAlySuBV 49D5FFUV0KGq6Gfjmj546xopEiMd8Xv9h6jNQTpXjrCCrcazpZ8dMWUcePsGDnonpfzU yyU+JLmSfvebNk//VDInikXwghK3olwgaiFGu1TSLkMQXX4CAtRS7GklV7ukBdS2R7jk AfyUP5rfhWAUYEMJR3ZEufF7AbiiJGxOFxio0kl7yra3+JRi7WTq/JDCcp2aK92KwPpE mddgDucNdcqmi/U1YXlUyZxXmkGNk7NYyjGkt+6j3Ht7tP8ufFE4q9jOfwGsotNkX2dn ltyA== X-Gm-Message-State: AOJu0YxsgpH30gSGsnDsNAP2PNKJH7yTnKBlCy0nOuLQG9QA+iUXqJu/ AY1avATwwrCQp/sJMdo2cZcPNDRCh3JevmV3ZuWlQM6nqLCe2amvAT18iI5bug== X-Gm-Gg: AY/fxX5sPiNXKrlOkyN3FpNDe5sd4eKAVk0FKVxxaaXUurfrZ4EFnE1criyZF068qes jxyb91ERskLVXUvnVtvy1cEL3laZ1qjYtyWly74wim5AVHBf06Smo7THLmKqI0h/AYAInzNqY/r 14IYKyC8rZTQuH/7BDFn2yTO+zwYGVpwlxtccYs9X8P38hAkVsq2oObqlosiT3Ssi1j7aaPo50C vuMJoxtn7e9TZQHCqYbxWK2bAB1+YquxusmhG1Jm4+2FUaTU3cXH15sR7OP2EXU6kk0u0KiiBx3 aqiWKzzR3JcEFPFiCoqOOXbLRHJzMcwvw5RmnLTDN0m+ek3vhBN3+ex40kJYQZso0zRiWiwY6Qu e6fQButaXzamSI7JZjQNfk3iX+s3e/AcVpFfSEiDi2d3tNnn6I4O2Th8qv395OKNAoX7WwRpU5z hqqqvdn9pZ X-Google-Smtp-Source: AGHT+IETdchacuZjeoeH3Bme9CeXdpu2iZHlksduhIAnH5rGgsjjB77zEwJZkS8rW1C04l/oEsJsgQ== X-Received: by 2002:a5d:64e8:0:b0:431:9f1:e4c8 with SMTP id ffacd0b85a97d-4324e4cc305mr26777858f8f.17.1766776204345; Fri, 26 Dec 2025 11:10:04 -0800 (PST) Received: from desktop ([51.154.145.205]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-4324ea1afbfsm47583330f8f.9.2025.12.26.11.10.03 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 26 Dec 2025 11:10:03 -0800 (PST) From: Gyorgy Sarvari To: openembedded-devel@lists.openembedded.org Subject: [meta-filesystems][PATCH 4/5] unionfs-fuse: add ptest support Date: Fri, 26 Dec 2025 20:10:00 +0100 Message-ID: <20251226191001.2920748-4-skandigraun@gmail.com> X-Mailer: git-send-email 2.52.0 In-Reply-To: <20251226191001.2920748-1-skandigraun@gmail.com> References: <20251226191001.2920748-1-skandigraun@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 26 Dec 2025 19:10:09 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/122942 It takes about a second to execute. Added two patches: - One adapts the testuite to ptest, to test the installed binary instead of testing the one from the build folder. - Another that fixes a bug in unionfsctl, which made the test fail. This patch is submitted upstream. Sample output: root@qemux86-64:~# ptest-runner START: ptest-runner 2025-12-26T19:03 BEGIN: /usr/lib/unionfs-fuse/ptest ptestuser:!:20448:0:99999:7::: PASS: test_all.IOCTL_TestCase.test_debug PASS: test_all.IOCTL_TestCase.test_wrong_args PASS: test_all.UnionFS_Help.test_help [...many lines...] PASS: test_all.UnionFS_RW_RW_PreserveBranch_TestCase.test_permissions_after_creating_directories PASS: test_all.UnionFS_Sync.test_sync PASS: test_all.UnionFS_Version.test_help ============================================================================ Testsuite summary DURATION: 0 END: /usr/lib/unionfs-fuse/ptest 2025-12-26T19:03 STOP: ptest-runner TOTAL: 1 FAIL: 0 Signed-off-by: Gyorgy Sarvari --- .../ptest-packagelists-meta-filesystems.inc | 1 + .../files/0001-adapt-tests-to-ptest.patch | 43 ++++++++++++++ .../files/0001-fix-debug-ioctl-call.patch | 58 +++++++++++++++++++ .../unionfs-fuse/files/run-ptest | 9 +++ .../unionfs-fuse/unionfs-fuse_3.7.bb | 13 ++++- 5 files changed, 122 insertions(+), 2 deletions(-) create mode 100644 meta-filesystems/recipes-filesystems/unionfs-fuse/files/0001-adapt-tests-to-ptest.patch create mode 100644 meta-filesystems/recipes-filesystems/unionfs-fuse/files/0001-fix-debug-ioctl-call.patch create mode 100644 meta-filesystems/recipes-filesystems/unionfs-fuse/files/run-ptest diff --git a/meta-filesystems/conf/include/ptest-packagelists-meta-filesystems.inc b/meta-filesystems/conf/include/ptest-packagelists-meta-filesystems.inc index 875a2f139a..3dc6986d6f 100644 --- a/meta-filesystems/conf/include/ptest-packagelists-meta-filesystems.inc +++ b/meta-filesystems/conf/include/ptest-packagelists-meta-filesystems.inc @@ -8,6 +8,7 @@ PTESTS_FAST_META_FILESYSTEMS = "\ e2tools \ + unionfs-fuse \ " PTESTS_SLOW_META_FILESYSTEMS = "\ diff --git a/meta-filesystems/recipes-filesystems/unionfs-fuse/files/0001-adapt-tests-to-ptest.patch b/meta-filesystems/recipes-filesystems/unionfs-fuse/files/0001-adapt-tests-to-ptest.patch new file mode 100644 index 0000000000..1361501d4e --- /dev/null +++ b/meta-filesystems/recipes-filesystems/unionfs-fuse/files/0001-adapt-tests-to-ptest.patch @@ -0,0 +1,43 @@ +From 8de40703857e63483a5c1b83ee7a5b6323c0b7d3 Mon Sep 17 00:00:00 2001 +From: Gyorgy Sarvari +Date: Fri, 26 Dec 2025 19:50:20 +0100 +Subject: [PATCH] adapt tests to ptest + +The tests are expected to be executed after compilation, and +they look for the tested binaries in the build folder. However +for ptests we want to test the already installed binaries, +so change the tests to use them. + +Also, adapt the fusermount executable name to what's installed +in the ptest images. + +Upstream-Status: Inappropriate [oe-specific] +Signed-off-by: Gyorgy Sarvari +--- + test_all.py | 6 +++--- + 1 file changed, 3 insertions(+), 3 deletions(-) + +diff --git a/test_all.py b/test_all.py +index 6ead5b4..bb167a9 100755 +--- a/test_all.py ++++ b/test_all.py +@@ -41,8 +41,8 @@ def get_osxfuse_unionfs_mounts(): + + class Common: + def setUp(self): +- self.unionfs_path = os.path.abspath('src/unionfs') +- self.unionfsctl_path = os.path.abspath('src/unionfsctl') ++ self.unionfs_path = 'unionfs' ++ self.unionfsctl_path = 'unionfsctl' + + self.tmpdir = tempfile.mkdtemp() + self.original_cwd = os.getcwd() +@@ -81,7 +81,7 @@ class Common: + if platform.system() == 'Darwin': + call('umount %s' % self.mount_device) + else: +- call('fusermount -u union') ++ call('fusermount3 -u union') + + os.chdir(self.original_cwd) + shutil.rmtree(self.tmpdir) diff --git a/meta-filesystems/recipes-filesystems/unionfs-fuse/files/0001-fix-debug-ioctl-call.patch b/meta-filesystems/recipes-filesystems/unionfs-fuse/files/0001-fix-debug-ioctl-call.patch new file mode 100644 index 0000000000..a29128d22a --- /dev/null +++ b/meta-filesystems/recipes-filesystems/unionfs-fuse/files/0001-fix-debug-ioctl-call.patch @@ -0,0 +1,58 @@ +From bf552c479a0c0b0ef2d52d8456030c56b8cc6dbb Mon Sep 17 00:00:00 2001 +From: Gyorgy Sarvari +Date: Fri, 26 Dec 2025 19:33:54 +0100 +Subject: [PATCH] fix debug ioctl call + +When calling the ioctl to set a debug file, the ioctl expects to receive a datatype +that is specified in the ioctl definition: char[PATHLEN_MAX] + +However when passing the pointer from getopts, this is only true if the passed path +has the maximal allowed length. Since usually this path is shorter than the max, +the kernel is trying to read over the end of the argument, and returns "EFAULT/Bad address". + +To solve this, copy the argument to a buffer that has the exact size of what the ioctl +expects, and pass this buffer to the ioctl. + +Upstream-Status: Submitted [https://github.com/rpodgorny/unionfs-fuse/pull/164] +Signed-off-by: Gyorgy Sarvari +--- + src/unionfsctl.c | 11 +++++++---- + 1 file changed, 7 insertions(+), 4 deletions(-) + +diff --git a/src/unionfsctl.c b/src/unionfsctl.c +index 74c4d33..efed505 100644 +--- a/src/unionfsctl.c ++++ b/src/unionfsctl.c +@@ -44,25 +44,28 @@ int main(int argc, char **argv) { + + int opt; + const char* argument_param; ++ char debug_file[PATHLEN_MAX]; + int debug_on_off; + int ioctl_res; + while ((opt = getopt(argc, argv, "d:p:")) != -1) { + switch (opt) { + case 'p': +- argument_param = optarg; +- if (strlen(argument_param) < 1) { ++ if (strlen(optarg) < 1) { + fprintf(stderr, + "Not a valid debug path given!\n"); + print_help(progname); + exit(1); + } + +- if (strlen(argument_param) > PATHLEN_MAX) { ++ if (strlen(optarg) > PATHLEN_MAX) { + fprintf(stderr, "Debug path too long!\n"); + exit(1); + } + +- ioctl_res = ioctl(fd, UNIONFS_SET_DEBUG_FILE, argument_param); ++ memset(debug_file, 0, PATHLEN_MAX); ++ strncpy(debug_file, optarg, PATHLEN_MAX - 1); ++ ++ ioctl_res = ioctl(fd, UNIONFS_SET_DEBUG_FILE, debug_file); + if (ioctl_res == -1) { + fprintf(stderr, "debug-file ioctl failed: %s\n", + strerror(errno) ); diff --git a/meta-filesystems/recipes-filesystems/unionfs-fuse/files/run-ptest b/meta-filesystems/recipes-filesystems/unionfs-fuse/files/run-ptest new file mode 100644 index 0000000000..a92ef0a8f7 --- /dev/null +++ b/meta-filesystems/recipes-filesystems/unionfs-fuse/files/run-ptest @@ -0,0 +1,9 @@ +#!/bin/sh +# not all tests can run with root, so create a test user +# if it doesn't exist yet + +if ! grep ptestuser /etc/shadow; then + useradd ptestuser +fi + +su ptestuser -c "python3 -m putao.unittest" diff --git a/meta-filesystems/recipes-filesystems/unionfs-fuse/unionfs-fuse_3.7.bb b/meta-filesystems/recipes-filesystems/unionfs-fuse/unionfs-fuse_3.7.bb index 5ba202b90c..b5c5bb847c 100644 --- a/meta-filesystems/recipes-filesystems/unionfs-fuse/unionfs-fuse_3.7.bb +++ b/meta-filesystems/recipes-filesystems/unionfs-fuse/unionfs-fuse_3.7.bb @@ -6,11 +6,20 @@ LIC_FILES_CHKSUM = "file://src/unionfs.c;beginline=3;endline=8;md5=30fa8de70fd8a file://LICENSE;md5=0e75c95b3e0e1c01489b39e7fadd3e2d \ " -SRC_URI = "git://github.com/rpodgorny/${BPN}.git;branch=master;protocol=https;tag=v${PV}" +SRC_URI = "git://github.com/rpodgorny/${BPN}.git;branch=master;protocol=https;tag=v${PV} \ + file://run-ptest \ + file://0001-fix-debug-ioctl-call.patch \ + file://0001-adapt-tests-to-ptest.patch \ +" + SRCREV = "3fcbd11f78b9a9e02ea0e861d741840fe45dc9c8" DEPENDS = "fuse3" RDEPENDS:${PN} = "bash" +RDEPENDS:${PN}-ptest += "python3-core python3-unittest python3-unittest-automake-output" +inherit cmake pkgconfig ptest -inherit cmake pkgconfig +do_install_ptest(){ + install ${S}/test_all.py ${D}${PTEST_PATH} +} From patchwork Fri Dec 26 19:10:01 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gyorgy Sarvari X-Patchwork-Id: 77544 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 51D62E8FDB5 for ; Fri, 26 Dec 2025 19:10:09 +0000 (UTC) Received: from mail-wr1-f44.google.com (mail-wr1-f44.google.com [209.85.221.44]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.157477.1766776206654536635 for ; Fri, 26 Dec 2025 11:10:06 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=nTPV/L9O; spf=pass (domain: gmail.com, ip: 209.85.221.44, mailfrom: skandigraun@gmail.com) Received: by mail-wr1-f44.google.com with SMTP id ffacd0b85a97d-43284ed32a0so229691f8f.3 for ; Fri, 26 Dec 2025 11:10:06 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1766776205; x=1767381005; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=9lshMArNjs/ofXUj13NyNNRMc3LH9nep+FB7gt31KcQ=; b=nTPV/L9OnLAZT644hpek6HvOA5qPHjHvlMFm1aga+3WJfi3l8qKX0WO2uIOD4K6Dhj M130K2NDjL8KvASjhha+NvSVrhbY3bqRGcLvxghpN4L5otPt+QmruX/23PflyxVlXh4A i+QNaU+yEQl4JJiCaKQJKBd/cxT/ryjNDh7kpPBWgkS5NJllXYgM7WOtO+ENfvI739en YfJdtLvlzZan6RDr1RxA66mBM5t3hgVUIxuDyjjN2bUiUPIZLIYgJtbMQqbBxzvQRYxP cKfW5/Vk49HnuTxNV8bBZ3r82gApGk+hgfiNeGvMzPkwruGp/sSIwMrQyhmS6irE8+gY nL+g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1766776205; x=1767381005; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=9lshMArNjs/ofXUj13NyNNRMc3LH9nep+FB7gt31KcQ=; b=PhxYZYIpObKK1p+K8YSin9JdGPL6WAGDdugseAu+tsZw/539ngDfcJjic9PUCLAPi4 cSCLH2/Hh/Cw9G7Zxha2VQnr+q22AS4zcYm8xhewNnHI4rNVUD5A+xTezq9chJNG+w2r XTuKdF+84T3AFFsWikcgxFxC59PJcIB4vjaVf+v333rxxwfEePSupw4nR7oHnotXAvp0 f1zAMcW8YJFCpHi+V0C0UiGf+pFeDZ55pqS1alwlwHCOQsMBIgz/UT17fWgFWGjIzOyn 3aTVd37CaZImO4qixxNGfgfOH2ys3PXYhbOydge109qdkqudbiQ+tLWaCBFQtzrhtfY1 +v1Q== X-Gm-Message-State: AOJu0YymbEljkuekI4uEbk3POfpDyf8iuB7adN3X1KuVDVA/Q53zYcK6 mM9kAL+7UEBty0Q+rgvem2qeFyk5/CYtChGFeMcdz1ukmVde6EC6i8sIAqjo7w== X-Gm-Gg: AY/fxX78ayNp7n5aJgJaAOFah1gBKn2WRkws4DJL8Z3M7mtVbzSV5TjJkHnnCuum7id w6P3cDezSeuvTRLk+KSrj7DN0OtgdC97zGkb3E/+k8amwmNVMzJK+pf+PNHNdAQbT8CGcpM5sht Gu0fAjEI5M8htbLaEaeVMXAVyjDkkM+Iz1sAMVSwjplrELr7uKEKx8/1Nk3/VPQuDDeKPrhQfK0 IT4GvQcgxKGAqu0dnt6LOPNj3OnUUplqD4/LKhmTxcVJuw4Y7dDUxm9sGuGjXYOQpCvu+H4BfYA EbDZpa8C2Sjd/gYTxz70l1y4sv5Hf39iivMKBRMq1fbJP/WuzLa/4b/UwB8DLCJhGMfPvmjMt5F 34sLuYTRH0hEhn+3W3uES6aPSz2ZJXAvcL1VseUDm4Fh3oU3ijG0buSpmA/WmTpM1/ifFd1wpiw 8kFWIKZypuifCWPQOUT3I= X-Google-Smtp-Source: AGHT+IGqZu1KFvCgao+Ha+tkb1Lp6Xja+MUUYoeik3yvbBSQBoyqP9XOsbCwB8plPnw/hsr6co2ATQ== X-Received: by 2002:a05:6000:1842:b0:430:fcda:452c with SMTP id ffacd0b85a97d-4324e4bf63dmr34134415f8f.12.1766776204977; Fri, 26 Dec 2025 11:10:04 -0800 (PST) Received: from desktop ([51.154.145.205]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-4324ea1afbfsm47583330f8f.9.2025.12.26.11.10.04 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 26 Dec 2025 11:10:04 -0800 (PST) From: Gyorgy Sarvari To: openembedded-devel@lists.openembedded.org Subject: [meta-filesystems][PATCH 5/5] softhsm: fix SRC_URI branch Date: Fri, 26 Dec 2025 20:10:01 +0100 Message-ID: <20251226191001.2920748-5-skandigraun@gmail.com> X-Mailer: git-send-email 2.52.0 In-Reply-To: <20251226191001.2920748-1-skandigraun@gmail.com> References: <20251226191001.2920748-1-skandigraun@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 26 Dec 2025 19:10:09 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/122943 The "develop" branch doesn't exist anymore, the used revision can be found on the "main" branch. Signed-off-by: Gyorgy Sarvari --- meta-oe/recipes-security/softhsm/softhsm_2.6.1.bb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/meta-oe/recipes-security/softhsm/softhsm_2.6.1.bb b/meta-oe/recipes-security/softhsm/softhsm_2.6.1.bb index 78766e0fe9..30b4fc71d8 100644 --- a/meta-oe/recipes-security/softhsm/softhsm_2.6.1.bb +++ b/meta-oe/recipes-security/softhsm/softhsm_2.6.1.bb @@ -5,7 +5,7 @@ LIC_FILES_CHKSUM = "file://LICENSE;md5=ef3f77a3507c3d91e75b9f2bdaee4210" DEPENDS = "sqlite3" -SRC_URI = "git://github.com/softhsm/SoftHSMv2.git;protocol=https;branch=develop;tag=${PV} \ +SRC_URI = "git://github.com/softhsm/SoftHSMv2.git;protocol=https;branch=main;tag=${PV} \ file://0001-avoid-unnecessary-check-for-sqlite3-binary.patch \ file://0002-Prevent-accessing-of-global-c-objects-once-they-are-.patch \ "