From patchwork Sat Jan 31 07:56:12 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 80111 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 04D18D79742 for ; Sat, 31 Jan 2026 07:57:06 +0000 (UTC) Received: from mail-wm1-f48.google.com (mail-wm1-f48.google.com [209.85.128.48]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.5098.1769846216976006786 for ; Fri, 30 Jan 2026 23:56:57 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=R2NjR9d/; spf=pass (domain: smile.fr, ip: 209.85.128.48, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f48.google.com with SMTP id 5b1f17b1804b1-47f5c2283b6so22723505e9.1 for ; Fri, 30 Jan 2026 23:56:56 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1769846215; x=1770451015; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=abGix7wqEF/44PiODwmOhMpUoWajaKppLHWRZpZavOU=; b=R2NjR9d/k2wlXzXWX2kZs/YmXqtr/LWR99hogsAvTIn+AKI9xq7WwC4t8O6ti0ksQC EgELj3mCTO1GzYNP0aTSWwDOt8299JVQl1Q9IBDMUejxY/tx6vt4cXeO3FA1lODQG8Z2 S5upnJocJKBOA1IQMHSiS8JRuQiBRqNgOaBys= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1769846215; x=1770451015; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=abGix7wqEF/44PiODwmOhMpUoWajaKppLHWRZpZavOU=; b=kwrvRMKIkrPT2+i7LdqHgMjtvdbmhiZdeG+4j2+/9NqevgzkyNmozG2zMOb/rCdxzp CsqoyVrlYF1PpLwiNORb2W5Iz+Jf2danZSGDLbsOFhVgOc0Dkq6ZiI5PcHlgICkzQ+EP JbI+E4jGPfKP4kgmuPMgTLrgyhymOpg81pKftqD07ezlYr0qruE35STc6CxGuPFzfeZA 34T4NvqxeJkif0qdQaLQiCLKkGc9jVfd1vyaazmgnG62sCDIMu8+UTbgIH+m0Q94Ex/L Oc+c2HpKW3sCmfZUhdPqdoBs6r/br0rlngwNPIl7fZC4L+HOJFbj1TeP39dVDSlfdt6o uuHw== X-Gm-Message-State: AOJu0YxoOzXN+CyTfEBN2yEYqyYOSNPLYKbWY11mofgwYWxiLjLHa+Zh yRnL/D0qI/FA8r83MxAqewmjHNmUnrg1cgxvhQ2HS3Yy/J9dVXnxOZurWyLGzVI9wcSRvKPcpRz FjHkjBhg= X-Gm-Gg: AZuq6aIYwB9scjuabsczs1mETaqUrLYna/dkyPKo3inDbaOn01PO697TdeuVqCOGnO/ tCq0Z8VuEhuAn+IEUTDJXfuOVXsdijH9+cEwKkQeshVNE5lHS31mx7Iop5lX5PkXFztgTAXJGw+ sqnT/b0dYrbLwD3PFQm6yUs9GXwPqWwmdzwrLlYK7CFwgXS2UMmpQLlH2yPKC2FAtMD6nDmkweQ mfd7lRswvZC5Xh76LxyYSuwum7LDvFKGC9MmFDrpKeSQt5GhfO0vIMOEEcXVM88r7ZDTACWySSx eS5GjEL4//1VOiZaECHZYRilkxr83tBSZhE75vVgNbwdR4PGcao4jlX/tjdO3ga4b66RkQv5UTq koGGFQJgMzbg3HQJGgi62RQDOdMdKkJEM+rXE3a55KsgbcCVZlb5Hr8yTuXAdlHBONzDbO5BbsL kVbGdjgglSyTwLJ9NcUiQbclg8A/4Gi9Zc94+MOR5eepec63jBfX1HwIorDp9OGPDgoZYf+L029 i98At5daTnY6SKvV4Z4czVD7hc= X-Received: by 2002:a05:600c:8b27:b0:479:1348:c614 with SMTP id 5b1f17b1804b1-482db4997c7mr60045875e9.26.1769846215132; Fri, 30 Jan 2026 23:56:55 -0800 (PST) Received: from FRSMI25-LASER.home (2a01cb001331aa00fa8b238ae1dd6dd8.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:fa8b:238a:e1dd:6dd8]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4806ce564f9sm258621475e9.14.2026.01.30.23.56.54 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 30 Jan 2026 23:56:54 -0800 (PST) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 01/22] oeqa/gitarchive: Fix git push URL parameter Date: Sat, 31 Jan 2026 08:56:12 +0100 Message-ID: <6358b08df27aa2f8f109fc2ab9ad5026d59c7051.1769845858.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 31 Jan 2026 07:57:05 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/230206 From: Mathieu Dubois-Briand The gitarchive() function takes a `push` parameter than can be either a boolean or a string. But this parameter is then passed to expand_tag_strings(), which clearly expect it to be a string if it is defined. Split this in two arguments: a `push` boolean value and a `push_remote` optional string. Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit 024f08629feeec8198d1e489633e475959754cfe) Signed-off-by: Yoann Congal --- meta/lib/oeqa/selftest/cases/gitarchivetests.py | 4 ++-- meta/lib/oeqa/utils/gitarchive.py | 8 ++++---- scripts/lib/resulttool/store.py | 2 +- 3 files changed, 7 insertions(+), 7 deletions(-) diff --git a/meta/lib/oeqa/selftest/cases/gitarchivetests.py b/meta/lib/oeqa/selftest/cases/gitarchivetests.py index 71382089c12..dcf0eb3be56 100644 --- a/meta/lib/oeqa/selftest/cases/gitarchivetests.py +++ b/meta/lib/oeqa/selftest/cases/gitarchivetests.py @@ -74,7 +74,7 @@ class GitArchiveTests(OESelftestTestCase): "Results of {branch}:{commit}", "branch: {branch}\ncommit: {commit}", "{branch}", False, "{branch}/{commit_count}-g{commit}/{tag_number}", 'Test run #{tag_number} of {branch}:{commit}', '', - [], [], False, keywords, logger) + [], [], False, None, keywords, logger) self.assertTrue(tag_exists(git_obj, target_tag), msg=f"Tag {target_tag} has not been created") delete_fake_repository(path) @@ -88,7 +88,7 @@ class GitArchiveTests(OESelftestTestCase): "Results of {branch}:{commit}", "branch: {branch}\ncommit: {commit}", "{branch}", False, "{branch}/{commit_count}-g{commit}/{tag_number}", 'Test run #{tag_number} of {branch}:{commit}', '', - [], [], False, keywords, logger) + [], [], False, None, keywords, logger) self.assertTrue(tag_exists(git_obj, second_tag), msg=f"Second tag {second_tag} has not been created") delete_fake_repository(path) diff --git a/meta/lib/oeqa/utils/gitarchive.py b/meta/lib/oeqa/utils/gitarchive.py index 7e1d5057482..6ec17d36958 100644 --- a/meta/lib/oeqa/utils/gitarchive.py +++ b/meta/lib/oeqa/utils/gitarchive.py @@ -162,7 +162,7 @@ def expand_tag_strings(repo, name_pattern, msg_subj_pattern, msg_body_pattern, msg_body = format_str(msg_body_pattern, keyws) return tag_name, msg_subj + '\n\n' + msg_body -def gitarchive(data_dir, git_dir, no_create, bare, commit_msg_subject, commit_msg_body, branch_name, no_tag, tagname, tag_msg_subject, tag_msg_body, exclude, notes, push, keywords, log): +def gitarchive(data_dir, git_dir, no_create, bare, commit_msg_subject, commit_msg_body, branch_name, no_tag, tagname, tag_msg_subject, tag_msg_body, exclude, notes, push, push_remote, keywords, log): if not os.path.isdir(data_dir): raise ArchiveError("Not a directory: {}".format(data_dir)) @@ -179,7 +179,7 @@ def gitarchive(data_dir, git_dir, no_create, bare, commit_msg_subject, commit_ms tag_name, tag_msg = expand_tag_strings(data_repo, tagname, tag_msg_subject, tag_msg_body, - push, log, keywords) + push_remote, log, keywords) # Commit data commit = git_commit_data(data_repo, data_dir, branch_name, @@ -195,10 +195,10 @@ def gitarchive(data_dir, git_dir, no_create, bare, commit_msg_subject, commit_ms cmd = ['push', '--tags'] # If no remote is given we push with the default settings from # gitconfig - if push is not True: + if push_remote is not None: notes_refs = ['refs/notes/' + ref.format(branch_name=branch_name) for ref, _ in notes] - cmd.extend([push, branch_name] + notes_refs) + cmd.extend([push_remote, branch_name] + notes_refs) log.info("Pushing data to remote") data_repo.run_cmd(cmd) diff --git a/scripts/lib/resulttool/store.py b/scripts/lib/resulttool/store.py index b143334e699..f3caafaff82 100644 --- a/scripts/lib/resulttool/store.py +++ b/scripts/lib/resulttool/store.py @@ -82,7 +82,7 @@ def store(args, logger): "Results of {branch}:{commit}", "branch: {branch}\ncommit: {commit}", "{branch}", False, "{branch}/{commit_count}-g{commit}/{tag_number}", 'Test run #{tag_number} of {branch}:{commit}', '', - excludes, [], False, keywords, logger) + excludes, [], False, None, keywords, logger) if args.logfile_archive: logdir = args.logfile_archive + "/" + tagname From patchwork Sat Jan 31 07:56:13 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 80117 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 34250D79751 for ; Sat, 31 Jan 2026 07:57:06 +0000 (UTC) Received: from mail-wm1-f52.google.com (mail-wm1-f52.google.com [209.85.128.52]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.5003.1769846217773259409 for ; Fri, 30 Jan 2026 23:56:58 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=g0yejJM0; spf=pass (domain: smile.fr, ip: 209.85.128.52, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f52.google.com with SMTP id 5b1f17b1804b1-47ff94b46afso25100295e9.1 for ; Fri, 30 Jan 2026 23:56:57 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1769846216; x=1770451016; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=vH6BK87+e/mwaObVUH+CZXj4Q/sC6OfiwDoCePdFOkc=; b=g0yejJM0Q6zZtcQe2Ho4WjQaV4cV4rVKuw6CNIqiEAR/HP1hhRHY8+cNe94pmTIsdz hB3Mn9Y6ZMI+MVrDOWkhUITyyVkaxqBYba054HGvaoIliuEmPza6JiB4xXkr+MfQuwOh BryX16b6lNOb6V1a9b4a2hVqKp9fr9+8CsgLE= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1769846216; x=1770451016; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=vH6BK87+e/mwaObVUH+CZXj4Q/sC6OfiwDoCePdFOkc=; b=f+Ih3AHS0RQDhoXIQnWm/E8NyG1UkQexA5wArnFa8dITV/dYCMj0DZz2+cy5zj2vHV KTik4hitJf4CGDtPEj6kkzy8dlYpVqdWENIJoLfE9duy9rF8FZ4M/e3vXnqSx+HUaYpM +bgyBd59q1Joni2XqR5pbfbGwTbu4H2+Qlq7ZcXB3beU0vq9+5Dhu7J9ZIP73SiP0i5N p8MvXkzJIQdFKOsgTcVkMz+2uB7meihJwzkp5/Z7TB34glrQEygaZaaAMji/fcUxq3Qe 0gwrb0isylWM5YrsfaXrfEGNErwnNYToS8bdFiJPfAUzsqtrNdj7BY6pf0qBYQQQR7Yy u20Q== X-Gm-Message-State: AOJu0YyhHsWpm/LiP8IJZtqx7AbOlI8Vx54Z8iVaCPhaiVmbLJZbTEe/ r9+yLJLbnYSV0VoGsjoeBDcUSI4n5H6NbrRpdd2ZcvtA6LQYNwqc2mX+lRKdiGD+qRYKf5xkvRb f1HvFUqc= X-Gm-Gg: AZuq6aItzqebxnR0rLYZ5l13QRcXZe9M1x92jBhDcBLOqoraQd6n0Ge+nEibuMzXoJ6 b7p3DSOgzsC76UR5N3z25ULnyf6F6gAtOjm5fPqoKvQkVVpya5WATuCZ7Pevee7RX2BsR8/HHWm /NNOPQKMYZwZE474lBlr5im4Dqg8TwDwTsQFKo2fmbog40Mn72T9lWD72yhmMI9kqJM5Bc4Fs++ d8O+fhvJoTv63YK6qDPiyj4zrnjEbPGcA/mIbCJ1NlAYorWeXGeh6k55h14zRVzNh4Ps9d7efZ1 EyWvuj3SqJQL2Q7y2uCF+pM92WVkN+ozTly8+236Iv3SyfSn+xQsxRQcgP/O2Xzgbq1n4p3Wed7 M3G6v8NZYdu9S8OG90E79UGYiBgJ6p6VzjLVaQWu6r75AOCAS4BEQsfTYMbzQH+asVJRCH2e4g4 xmg0HRcj4IWUfH0iFoLfstfIDsyqyc8/A0+TVAc9z07FOntJcvUgYOIHXV9ps/CM8TsJOG/ak8C 2D35iQ5vRoLMRvWb5hq1BXz1h4= X-Received: by 2002:a05:600c:19c7:b0:47e:e981:78b4 with SMTP id 5b1f17b1804b1-482db477009mr71928225e9.12.1769846215761; Fri, 30 Jan 2026 23:56:55 -0800 (PST) Received: from FRSMI25-LASER.home (2a01cb001331aa00fa8b238ae1dd6dd8.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:fa8b:238a:e1dd:6dd8]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4806ce564f9sm258621475e9.14.2026.01.30.23.56.55 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 30 Jan 2026 23:56:55 -0800 (PST) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 02/22] oeqa/gitarchive: Push tag before copying log files Date: Sat, 31 Jan 2026 08:56:13 +0100 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 31 Jan 2026 07:57:06 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/230207 From: Mathieu Dubois-Briand Resulttool creates a git tag in the yocto-testresults git and then copies log files to a newly created folder on the NFS share, whose name is controlled by the name of this git tag. As tags are unique, the folder name is also unique, preventing any clash between different builds. Today, the tag is pushed from the calling script, so after the folder is copied. This can lead to some issues if for any reason the tag is not pushed. This might also lead to some race condition. Allow to push the tag before coying data, in order to prevent these issues, and add a warning if the calling script choose to not push the tag but still copy the log files on the NFS share. Fixes [YOCTO #15696] Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit 7d869c9c5aaeeda9fa476bfe6b05ded6e225379d) Signed-off-by: Yoann Congal --- scripts/lib/resulttool/store.py | 9 ++++++++- 1 file changed, 8 insertions(+), 1 deletion(-) diff --git a/scripts/lib/resulttool/store.py b/scripts/lib/resulttool/store.py index f3caafaff82..dc2c259331b 100644 --- a/scripts/lib/resulttool/store.py +++ b/scripts/lib/resulttool/store.py @@ -82,9 +82,14 @@ def store(args, logger): "Results of {branch}:{commit}", "branch: {branch}\ncommit: {commit}", "{branch}", False, "{branch}/{commit_count}-g{commit}/{tag_number}", 'Test run #{tag_number} of {branch}:{commit}', '', - excludes, [], False, None, keywords, logger) + excludes, [], args.push_tags, None, keywords, logger) if args.logfile_archive: + if not args.push_tags: + # As no tag was pushed, we can't guarantee there "tagname" + # is uniq and so we might have several builds trying to use + # the same "logdir" target. + logger.warning("Archiving log files but the %s tag was not pushed: this may result in target folder conflicts") logdir = args.logfile_archive + "/" + tagname shutil.copytree(tempdir, logdir) os.chmod(logdir, 0o755) @@ -123,3 +128,5 @@ def register_commands(subparsers): help='only store data for the specified revision') parser_build.add_argument('-l', '--logfile-archive', default='', help='directory to separately archive log files along with a copy of the results') + parser_build.add_argument('-p', '--push-tags', action='store_true', + help='push created tags to remote git') From patchwork Sat Jan 31 07:56:14 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 80115 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 44063D79756 for ; Sat, 31 Jan 2026 07:57:06 +0000 (UTC) Received: from mail-wm1-f50.google.com (mail-wm1-f50.google.com [209.85.128.50]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.5100.1769846218364480780 for ; Fri, 30 Jan 2026 23:56:58 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=c8sWv+EM; spf=pass (domain: smile.fr, ip: 209.85.128.50, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f50.google.com with SMTP id 5b1f17b1804b1-48068ed1eccso25660595e9.2 for ; Fri, 30 Jan 2026 23:56:58 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1769846216; x=1770451016; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=d+BzhpS/sSwy4fvSNjCvJN3XhrgXofjWG4LRJNMT3B8=; b=c8sWv+EMmHAXnZYUtDgV9yGOb+O13ugVd8h3vC00S4p+dSAtwjReQJziqf5khoE6Kc 6MrOpz4L0wJlfPV75Da+S6sv/hLFMJNVPBrVoVH8NALHPJwzvMs2KP3soLdzAwH4iD0Y xGMFBuhWzJnd3c/XlIufpnGwmkuol5UDUFqBM= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1769846216; x=1770451016; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=d+BzhpS/sSwy4fvSNjCvJN3XhrgXofjWG4LRJNMT3B8=; b=eg2v1IZ82v76Fo/T4muoufzBkvNadZxlxZhGCKTdhTRlr7AMR4TQmx0rB2Smt0vYvk P+5798ZSjPw+9grvdwemdz6qtG9VFjggeVT67XGXhcWXzQs3ZlKyYz+mxdN3OlZ51Yi0 ijBZzgCtZRN49BiItzus0peIR4+bTZvQXUm5qNhUiNi0Efq51UDiKXzw7T/hJsmbUG55 OpoNX5b2W1bjzUqC0Cjx16glcJDRgmV1Xth46b77Wql18TmW/ILslCjvPT+xQKYs4Iyp 0xswI8UIDwD9MGm4X9ldzD/ZQKWAIhsuEgzml7oAwVwbO9JJ+8qyKx4Q6MjMKWi66PHJ /3FA== X-Gm-Message-State: AOJu0YzyCq793WTxFEgwR+UBP6BIHNFf0kfdjdp7W2kJVJMWasAhhpo0 eNCC32WO1/KEFTtFjd+kFc3JzsjpLmT9gfiAicJM4P1X+Qtj1xrRfHWM9+hIDfyK82Xv5FBfGFt EIXbiSiI= X-Gm-Gg: AZuq6aKK3seE0ivn+Ri3Q02euoDwAeHrRyBP/x0nkSm2LMJOQHci83RK6/eibHZCzbu DQsorm0p1rL27c03XTwzGc32TqL77Qkw7i6lDZ8BkKDwBNAXLthRmP3AIph4b897f+C9XqCAfbS uaJMYtAdyA15NwStK25hVXOGb3zGA6x0QNXPU47uEmdvn2baOB1poesW4G8zHwv+xU3cmUIJ6ma QGg2dJOr2WXKUoHYdhW0n/hD8ZcxBITcHcVj9VDZ2ZrX0N6iIFpC6rwekypNjtk7pFyPPMRThdz JjAU2hKXz8amkVmhZA6C05Jh0Elp8PRoGaeyOmKgfo+gSWFxVPoO4CRyDdXYofM8xrOZp1WfCa1 EbzTONlJLwNT5uPFbHEDnn20CkTSYgWQuxWyq3UMR12h9253Tq87/EYcv1z3+It+6bsQcQ9UXvk SAOeH1hNSEANUm1yoqEOKK6VLri3ipnys0MOa8D38eHm1okOpFea/PV/tvoVdoItBJTCEsKK5xb ykpaPcbhoQ1aLa3 X-Received: by 2002:a05:600c:6206:b0:477:b0b9:3129 with SMTP id 5b1f17b1804b1-482db44d215mr65769265e9.3.1769846216466; Fri, 30 Jan 2026 23:56:56 -0800 (PST) Received: from FRSMI25-LASER.home (2a01cb001331aa00fa8b238ae1dd6dd8.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:fa8b:238a:e1dd:6dd8]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4806ce564f9sm258621475e9.14.2026.01.30.23.56.55 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 30 Jan 2026 23:56:55 -0800 (PST) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 03/22] scripts/oe-git-archive: Ensure new push parameter is specified Date: Sat, 31 Jan 2026 08:56:14 +0100 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 31 Jan 2026 07:57:06 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/230208 From: Richard Purdie Fixes a regresion in "oeqa/gitarchive: Fix git push URL parameter" due to a missing parameter. Signed-off-by: Richard Purdie (cherry picked from commit 983cb2171e53564bc9dd188136439f3e2ad9e188) Signed-off-by: Yoann Congal --- scripts/oe-git-archive | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/scripts/oe-git-archive b/scripts/oe-git-archive index 9305ed0b0f9..9484fc53c7d 100755 --- a/scripts/oe-git-archive +++ b/scripts/oe-git-archive @@ -106,7 +106,7 @@ def main(argv=None): gitarchive.gitarchive(args.data_dir, args.git_dir, args.no_create, args.bare, args.commit_msg_subject.strip(), args.commit_msg_body, args.branch_name, args.no_tag, args.tag_name, args.tag_msg_subject, args.tag_msg_body, - args.exclude, args.notes, args.push, keywords, log) + args.exclude, args.notes, bool(args.push), args.push, keywords, log) except gitarchive.ArchiveError as err: log.error(str(err)) From patchwork Sat Jan 31 07:56:15 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 80120 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 540C9D79759 for ; Sat, 31 Jan 2026 07:57:06 +0000 (UTC) Received: from mail-wr1-f46.google.com (mail-wr1-f46.google.com [209.85.221.46]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.5004.1769846218967127190 for ; Fri, 30 Jan 2026 23:56:59 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=T08Ul2t9; spf=pass (domain: smile.fr, ip: 209.85.221.46, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f46.google.com with SMTP id ffacd0b85a97d-432d256c2e6so2453416f8f.3 for ; Fri, 30 Jan 2026 23:56:58 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1769846217; x=1770451017; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=CvHKZCyij9Tx1SXn/Qq8GRIIyR5t6ek3Ea/2+8Aljvo=; b=T08Ul2t9kv/+2L4Kn6QO1vEsn8PA+UX96dN/Z3ilMGQ549e4tz+85LPhCbQVcap8zT Gqpaj6xbEqa8xXpTUjuKbCDtXxqgpcVxioU1DyHMAOpoh1ihd1+cKRNu/GY/EmTC8SNM GTbHqHzma4UTak98t6ofvConxsCYxRYT+TAsE= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1769846217; x=1770451017; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=CvHKZCyij9Tx1SXn/Qq8GRIIyR5t6ek3Ea/2+8Aljvo=; b=UceWaqm4N1d1KFnu1ty+FuhhzFfTX+hN8VzeulLKmW4g7VqI4aymd/6zm61YsBLnnS idCt698zIsbwe0Qxq1bMhq4jH36P1NW8N+yn5BzIiv8xQ8JID35poh+dBC+JufaxuW8W hQLAOSTpkzbXXV/8vVtL08EsMO2v88FPi4d7gk1Kv/syBGeXPDignU/N44rxdl5gzLp1 zylLss9O9lJIG3rCFcjoxIodotRlXK1fDYy+YB6xyXlVSigbetOt8lrkdG3dD7Ua0tge bmjtBTIh4zzXp1DDiBbYJho+VuDxukzLnNWqicM+mKx1hgE5JRaV72PwLP4c0AE35v+c K2Gw== X-Gm-Message-State: AOJu0Yz++thmTSIaBdu6JQSzVFfIMJiuILWCn93fNxpQ6x64qtYizt4B RHHIGCMlvLcc+ZU/yyBDRi6zOKWaRWSExYALpzV45Euyn23SMPCoaVlum00Tf9Ge6doqyps2pe7 mdd9K1Ik= X-Gm-Gg: AZuq6aJfrOx59tGrvYIiNsF2rR4/y7MiuAeGvvVsrrYbgM7bN+FNHqpCQRIL5O96Lqg sf2OhjAwdV9SzmVL3sQclSeGj4si8uq42r1mypLnrKKDlRYo2ewveqkzuwmjt9qsOh/yyOQhXb2 d0GzPqp2PYaWPF8KGDJ4fCHgkCkMM0RX8iokgZlHCmMIxAljEsZztQmghclgyH5JQMYNe2Oq2X9 +tSO3a2Bku+ze9VrnRs6SjxCFzXK0XhsnnvgbxhwfYv+VSZ6qrEuObHY+rhsy7PgNVYWl+pKzTN 0cs1B34+BPmsxb5OH6A6wODn3cDiExwEZf4QZQDMvHld6VdAip0ovuXHlp/PHbPQzeS9Nz57APp IeqEyXqpCcCMWxCUXlObr3cv8kw4rOTBiS7sPe0lfkYoDD+EwnzyLDu3doZTAp9XMRwMqZdcqLI lrF5oNCqZLhq2XbkjxEHucMplylOS4H2sNauRyLlXDJe6dXtQjLCJzvmci+82ZQTvMW3x9EQOf/ VD3HMbX44P60lNy X-Received: by 2002:a05:600c:1388:b0:47e:e2ec:9960 with SMTP id 5b1f17b1804b1-482db49e83bmr80436405e9.35.1769846216996; Fri, 30 Jan 2026 23:56:56 -0800 (PST) Received: from FRSMI25-LASER.home (2a01cb001331aa00fa8b238ae1dd6dd8.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:fa8b:238a:e1dd:6dd8]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4806ce564f9sm258621475e9.14.2026.01.30.23.56.56 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 30 Jan 2026 23:56:56 -0800 (PST) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 04/22] grub: fix CVE-2025-54770 CVE-2025-61661 CVE-2025-61662 CVE-2025-61663 CVE-2025-61664 Date: Sat, 31 Jan 2026 08:56:15 +0100 Message-ID: <497bc29a9f95ea85e996572c28bcd43cdddd500a.1769845858.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 31 Jan 2026 07:57:06 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/230209 From: Jiaying Song References: https://nvd.nist.gov/vuln/detail/CVE-2025-54770 https://nvd.nist.gov/vuln/detail/CVE-2025-61661 https://nvd.nist.gov/vuln/detail/CVE-2025-61662 https://nvd.nist.gov/vuln/detail/CVE-2025-61663 https://nvd.nist.gov/vuln/detail/CVE-2025-61664 Signed-off-by: Jiaying Song Signed-off-by: Steve Sakoman Signed-off-by: Peter Marko Signed-off-by: Antonin Godard Signed-off-by: Richard Purdie (cherry picked from commit e8ea34a3e891a8c9dac21ae8c5b6d2a97d9074a7) Signed-off-by: Yoann Congal --- .../grub/files/CVE-2025-54770.patch | 41 +++++++++++ .../grub/files/CVE-2025-61661.patch | 40 +++++++++++ .../grub/files/CVE-2025-61662.patch | 72 +++++++++++++++++++ .../grub/files/CVE-2025-61663_61664.patch | 64 +++++++++++++++++ meta/recipes-bsp/grub/grub2.inc | 4 ++ 5 files changed, 221 insertions(+) create mode 100644 meta/recipes-bsp/grub/files/CVE-2025-54770.patch create mode 100644 meta/recipes-bsp/grub/files/CVE-2025-61661.patch create mode 100644 meta/recipes-bsp/grub/files/CVE-2025-61662.patch create mode 100644 meta/recipes-bsp/grub/files/CVE-2025-61663_61664.patch diff --git a/meta/recipes-bsp/grub/files/CVE-2025-54770.patch b/meta/recipes-bsp/grub/files/CVE-2025-54770.patch new file mode 100644 index 00000000000..7df1d8534b4 --- /dev/null +++ b/meta/recipes-bsp/grub/files/CVE-2025-54770.patch @@ -0,0 +1,41 @@ +From 80e0e9b2558c40fb108ae7a869362566eb4c1ead Mon Sep 17 00:00:00 2001 +From: Thomas Frauendorfer | Miray Software +Date: Fri, 9 May 2025 14:20:47 +0200 +Subject: [PATCH] net/net: Unregister net_set_vlan command on unload + +The commit 954c48b9c (net/net: Add net_set_vlan command) added command +net_set_vlan to the net module. Unfortunately the commit only added the +grub_register_command() call on module load but missed the +grub_unregister_command() on unload. Let's fix this. + +Fixes: CVE-2025-54770 +Fixes: 954c48b9c (net/net: Add net_set_vlan command) + +CVE: CVE-2025-54770 + +Upstream-Status: Backport +[https://gitweb.git.savannah.gnu.org/gitweb/?p=grub.git;a=commit;h=10e58a14db20e17d1b6a39abe38df01fef98e29d] + +Reported-by: Thomas Frauendorfer | Miray Software +Signed-off-by: Thomas Frauendorfer | Miray Software +Reviewed-by: Daniel Kiper +Signed-off-by: Jiaying Song +--- + grub-core/net/net.c | 1 + + 1 file changed, 1 insertion(+) + +diff --git a/grub-core/net/net.c b/grub-core/net/net.c +index 2b45c27d1..05f11be08 100644 +--- a/grub-core/net/net.c ++++ b/grub-core/net/net.c +@@ -2080,6 +2080,7 @@ GRUB_MOD_FINI(net) + grub_unregister_command (cmd_deladdr); + grub_unregister_command (cmd_addroute); + grub_unregister_command (cmd_delroute); ++ grub_unregister_command (cmd_setvlan); + grub_unregister_command (cmd_lsroutes); + grub_unregister_command (cmd_lscards); + grub_unregister_command (cmd_lsaddr); +-- +2.34.1 + diff --git a/meta/recipes-bsp/grub/files/CVE-2025-61661.patch b/meta/recipes-bsp/grub/files/CVE-2025-61661.patch new file mode 100644 index 00000000000..9f6cf68e4bf --- /dev/null +++ b/meta/recipes-bsp/grub/files/CVE-2025-61661.patch @@ -0,0 +1,40 @@ +From c24e11d87f8ee8cefd615e0c30eb71ff6149ee50 Mon Sep 17 00:00:00 2001 +From: Jamie +Date: Mon, 14 Jul 2025 09:52:59 +0100 +Subject: [PATCH 2/4] commands/usbtest: Use correct string length field + +An incorrect length field is used for buffer allocation. This leads to +grub_utf16_to_utf8() receiving an incorrect/different length and possibly +causing OOB write. This makes sure to use the correct length. + +Fixes: CVE-2025-61661 + +CVE: CVE-2025-61661 + +Upstream-Status: Backport +[https://gitweb.git.savannah.gnu.org/gitweb/?p=grub.git;a=commit;h=549a9cc372fd0b96a4ccdfad0e12140476cc62a3] + +Reported-by: Jamie +Signed-off-by: Jamie +Reviewed-by: Daniel Kiper +Signed-off-by: Jiaying Song +--- + grub-core/commands/usbtest.c | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/grub-core/commands/usbtest.c b/grub-core/commands/usbtest.c +index 2c6d93fe6..8ef187a9a 100644 +--- a/grub-core/commands/usbtest.c ++++ b/grub-core/commands/usbtest.c +@@ -99,7 +99,7 @@ grub_usb_get_string (grub_usb_device_t dev, grub_uint8_t index, int langid, + return GRUB_USB_ERR_NONE; + } + +- *string = grub_malloc (descstr.length * 2 + 1); ++ *string = grub_malloc (descstrp->length * 2 + 1); + if (! *string) + { + grub_free (descstrp); +-- +2.34.1 + diff --git a/meta/recipes-bsp/grub/files/CVE-2025-61662.patch b/meta/recipes-bsp/grub/files/CVE-2025-61662.patch new file mode 100644 index 00000000000..f04a52fe76a --- /dev/null +++ b/meta/recipes-bsp/grub/files/CVE-2025-61662.patch @@ -0,0 +1,72 @@ +From 498dc73aa661bb1cae4b06572b5cef154dcb1fb7 Mon Sep 17 00:00:00 2001 +From: Alec Brown +Date: Thu, 21 Aug 2025 21:14:06 +0000 +Subject: [PATCH 3/4] gettext/gettext: Unregister gettext command on module + unload + +When the gettext module is loaded, the gettext command is registered but +isn't unregistered when the module is unloaded. We need to add a call to +grub_unregister_command() when unloading the module. + +Fixes: CVE-2025-61662 + +CVE: CVE-2025-61662 + +Upstream-Status: Backport +[https://gitweb.git.savannah.gnu.org/gitweb/?p=grub.git;a=commit;h=8ed78fd9f0852ab218cc1f991c38e5a229e43807] + +Reported-by: Alec Brown +Signed-off-by: Alec Brown +Reviewed-by: Daniel Kiper +Signed-off-by: Jiaying Song +--- + grub-core/gettext/gettext.c | 19 ++++++++++++------- + 1 file changed, 12 insertions(+), 7 deletions(-) + +diff --git a/grub-core/gettext/gettext.c b/grub-core/gettext/gettext.c +index 9ffc73428..edebed998 100644 +--- a/grub-core/gettext/gettext.c ++++ b/grub-core/gettext/gettext.c +@@ -502,6 +502,8 @@ grub_cmd_translate (grub_command_t cmd __attribute__ ((unused)), + return 0; + } + ++static grub_command_t cmd; ++ + GRUB_MOD_INIT (gettext) + { + const char *lang; +@@ -521,13 +523,14 @@ GRUB_MOD_INIT (gettext) + grub_register_variable_hook ("locale_dir", NULL, read_main); + grub_register_variable_hook ("secondary_locale_dir", NULL, read_secondary); + +- grub_register_command_p1 ("gettext", grub_cmd_translate, +- N_("STRING"), +- /* TRANSLATORS: It refers to passing the string through gettext. +- So it's "translate" in the same meaning as in what you're +- doing now. +- */ +- N_("Translates the string with the current settings.")); ++ cmd = grub_register_command_p1 ("gettext", grub_cmd_translate, ++ N_("STRING"), ++ /* ++ * TRANSLATORS: It refers to passing the string through gettext. ++ * So it's "translate" in the same meaning as in what you're ++ * doing now. ++ */ ++ N_("Translates the string with the current settings.")); + + /* Reload .mo file information if lang changes. */ + grub_register_variable_hook ("lang", NULL, grub_gettext_env_write_lang); +@@ -544,6 +547,8 @@ GRUB_MOD_FINI (gettext) + grub_register_variable_hook ("secondary_locale_dir", NULL, NULL); + grub_register_variable_hook ("lang", NULL, NULL); + ++ grub_unregister_command (cmd); ++ + grub_gettext_delete_list (&main_context); + grub_gettext_delete_list (&secondary_context); + +-- +2.34.1 + diff --git a/meta/recipes-bsp/grub/files/CVE-2025-61663_61664.patch b/meta/recipes-bsp/grub/files/CVE-2025-61663_61664.patch new file mode 100644 index 00000000000..bfc05008bfb --- /dev/null +++ b/meta/recipes-bsp/grub/files/CVE-2025-61663_61664.patch @@ -0,0 +1,64 @@ +From 8368c026562a72a005bea320cfde9fd7d62d3850 Mon Sep 17 00:00:00 2001 +From: Alec Brown +Date: Thu, 21 Aug 2025 21:14:07 +0000 +Subject: [PATCH 4/4] normal/main: Unregister commands on module unload + +When the normal module is loaded, the normal and normal_exit commands +are registered but aren't unregistered when the module is unloaded. We +need to add calls to grub_unregister_command() when unloading the module +for these commands. + +Fixes: CVE-2025-61663 +Fixes: CVE-2025-61664 + +CVE: CVE-2025-61663 CVE-2025-61664 + +Upstream-Status: Backport +[https://gitweb.git.savannah.gnu.org/gitweb/?p=grub.git;a=commit;h=05d3698b8b03eccc49e53491bbd75dba15f40917] + +Reported-by: Alec Brown +Signed-off-by: Alec Brown +Reviewed-by: Daniel Kiper +Signed-off-by: Jiaying Song +--- + grub-core/normal/main.c | 12 +++++++----- + 1 file changed, 7 insertions(+), 5 deletions(-) + +diff --git a/grub-core/normal/main.c b/grub-core/normal/main.c +index dad25e7d2..a810858c3 100644 +--- a/grub-core/normal/main.c ++++ b/grub-core/normal/main.c +@@ -500,7 +500,7 @@ grub_mini_cmd_clear (struct grub_command *cmd __attribute__ ((unused)), + return 0; + } + +-static grub_command_t cmd_clear; ++static grub_command_t cmd_clear, cmd_normal, cmd_normal_exit; + + static void (*grub_xputs_saved) (const char *str); + static const char *features[] = { +@@ -542,10 +542,10 @@ GRUB_MOD_INIT(normal) + grub_env_export ("pager"); + + /* Register a command "normal" for the rescue mode. */ +- grub_register_command ("normal", grub_cmd_normal, +- 0, N_("Enter normal mode.")); +- grub_register_command ("normal_exit", grub_cmd_normal_exit, +- 0, N_("Exit from normal mode.")); ++ cmd_normal = grub_register_command ("normal", grub_cmd_normal, ++ 0, N_("Enter normal mode.")); ++ cmd_normal_exit = grub_register_command ("normal_exit", grub_cmd_normal_exit, ++ 0, N_("Exit from normal mode.")); + + /* Reload terminal colors when these variables are written to. */ + grub_register_variable_hook ("color_normal", NULL, grub_env_write_color_normal); +@@ -587,4 +587,6 @@ GRUB_MOD_FINI(normal) + grub_register_variable_hook ("color_highlight", NULL, NULL); + grub_fs_autoload_hook = 0; + grub_unregister_command (cmd_clear); ++ grub_unregister_command (cmd_normal); ++ grub_unregister_command (cmd_normal_exit); + } +-- +2.34.1 + diff --git a/meta/recipes-bsp/grub/grub2.inc b/meta/recipes-bsp/grub/grub2.inc index 5759fa06c25..125490183b9 100644 --- a/meta/recipes-bsp/grub/grub2.inc +++ b/meta/recipes-bsp/grub/grub2.inc @@ -37,6 +37,10 @@ SRC_URI = "${GNU_MIRROR}/grub/grub-${PV}.tar.gz \ file://CVE-2025-0677_CVE-2025-0684_CVE-2025-0685_CVE-2025-0686_CVE-2025-0689.patch \ file://CVE-2025-0678_CVE-2025-1125.patch \ file://CVE-2024-56738.patch \ + file://CVE-2025-54770.patch \ + file://CVE-2025-61661.patch \ + file://CVE-2025-61662.patch \ + file://CVE-2025-61663_61664.patch \ " # remove at next version upgrade or when output changes From patchwork Sat Jan 31 07:56:16 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 80122 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 60CA0D7975A for ; Sat, 31 Jan 2026 07:57:06 +0000 (UTC) Received: from mail-wm1-f48.google.com (mail-wm1-f48.google.com [209.85.128.48]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.5101.1769846219368142794 for ; Fri, 30 Jan 2026 23:56:59 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=kYeykjEa; spf=pass (domain: smile.fr, ip: 209.85.128.48, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f48.google.com with SMTP id 5b1f17b1804b1-47ee76e8656so37243345e9.0 for ; Fri, 30 Jan 2026 23:56:59 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1769846217; x=1770451017; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=rBz8AmmkyEv4VEBCAQD+5lOrHG+lLejeiYnfrTRlDwg=; b=kYeykjEabXmntEWwYvQV8N/maEkDWjlYyx4rg2l81avZlJWWWxbBiWHoBy3KQ2eVGY zHD82PhnEJEim+JxaFZplwVuBwzCuWuiQ1OCJWeHEx+1lxMv0g66TjIar0Canu885pEW 3+untiYXB/Qdiy+SwwMiw7kBWtxDi+nyYJVSw= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1769846217; x=1770451017; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=rBz8AmmkyEv4VEBCAQD+5lOrHG+lLejeiYnfrTRlDwg=; b=f0dcPttizNiPwyazqwaKGZc9SoFMm7B8MAOgIsxAptYudaIuCd1zlLGzODNO6Dyu/U SUX+CiYzDrRvfm5AbipzMocBtMuSg0G6XofGJM+/uD4z73zCzdEnz+Gq+Ax9cZQ9bc1x GxEyxCmOyC0A9/pWhfWPxF+NRBYvqF/EzhJqT//QrqELsHL4x7VWcXvWtRctRqDTGNDU rAhcoxsS1Fi4dE6KolAG016QjCXm4cINRLuYcvwiYMK4J6KClhs4nqCL04NhAF3onuXG GC4qAZwNGewKi/ebdy0vO+YHYg5QSuCAwV/WriGEPVlteq9phkZwP/cfxiAQ2Di1+t+s d5/A== X-Gm-Message-State: AOJu0Yz05zHDkJxz3NmK9Qzmlhf+GQIu0+Yn5UgFfFTf7/kHUWkId1fF 9ggnLDwlW8s27gKgNdlJxxUATvM0XG6goRLSzlJ355DX8wPVNcwceRIW9y2dXaFptjDF4zsbiRW bKM5FRL4= X-Gm-Gg: AZuq6aJzKJqIfz3o/Bjd3syeRhf54EKO05vdO7YNCiza0AWcSgWErmrT2gY7SAL1X/2 3a5x6I/zX3+vJsQNyffylLz8UaWG47ud7kwZ4dEO6wA57/yh7EVskLcr5vvR/eeSUgoI8ujxsNe XVSHYjzJFq1PmDQe/b6yEgXt7dHWVlohrQAJX+p+BVgnwMUj0AOlqmG35H93kXTu4kvBaMWVMji TAW4KzTZHI0/N6kdyFZRzAyh46rsY9Cl+3FWGJYQU2xHmNfiqVh0pDe0ZTvJqJKH0tnAw2P8hgt Sl1zLbWP3qXi2d4Sv0HKPeFqGjRe3DU0UVdNoJAL3DMEP4aidNnUGN8TvcxbVCijil/XCrPwEu8 OYBI8QZf0lKf7JsFMe+08rdqLIGf4AfJBC6u0txPL5ruicXIWWA1WWugilVvtEMB4+YLQ2xznGH C3IwAUPy10W6C5nW3ViiRCpriioLdGb71RwS+i+2Cndpjm/xYFtBxR+B6yY8RAuiGtDPZlP8bhX OXv7UQb29CWYkkf X-Received: by 2002:a05:600c:3f16:b0:477:54cd:200e with SMTP id 5b1f17b1804b1-482db4569c0mr64262665e9.1.1769846217511; Fri, 30 Jan 2026 23:56:57 -0800 (PST) Received: from FRSMI25-LASER.home (2a01cb001331aa00fa8b238ae1dd6dd8.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:fa8b:238a:e1dd:6dd8]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4806ce564f9sm258621475e9.14.2026.01.30.23.56.57 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 30 Jan 2026 23:56:57 -0800 (PST) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 05/22] mesa: fix build error with llvmpipe gallium driver Date: Sat, 31 Jan 2026 08:56:16 +0100 Message-ID: <0b4dabed3345944da878326baed133dab8c8af5b.1769845858.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 31 Jan 2026 07:57:06 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/230210 From: João Marcos Costa For RISC-V, and if the PACKAGECONFIG 'gallium-llvm' is enabled, mesa's do_compile fails due to a change in setObjectLinkingLayerCreator's signature. This change was first included in LLVM v21. This issue is further described below: https://gitlab.freedesktop.org/mesa/mesa/-/issues/13852 Backport the fix - from upstream - to Whinlatter. Signed-off-by: João Marcos Costa Signed-off-by: Yoann Congal --- .../files/0001-gallivm-support-LLVM-21.patch | 56 +++++++++++++++++++ meta/recipes-graphics/mesa/mesa.inc | 1 + 2 files changed, 57 insertions(+) create mode 100644 meta/recipes-graphics/mesa/files/0001-gallivm-support-LLVM-21.patch diff --git a/meta/recipes-graphics/mesa/files/0001-gallivm-support-LLVM-21.patch b/meta/recipes-graphics/mesa/files/0001-gallivm-support-LLVM-21.patch new file mode 100644 index 00000000000..cf3bdd36cf9 --- /dev/null +++ b/meta/recipes-graphics/mesa/files/0001-gallivm-support-LLVM-21.patch @@ -0,0 +1,56 @@ +From cd129dbf8af2d16b1243f2ce287ff69c6a5dc557 Mon Sep 17 00:00:00 2001 +From: no92 +Date: Wed, 27 Aug 2025 16:02:31 +0200 +Subject: gallivm: support LLVM 21 + +LLVM PR#146819 changed the signature of `setObjectLinkingLayerCreator`, +dropping the Triple argument. The PR was first included in the LLVM 21 +series, and the new signature is gated behind a version check for that. + +`LLVMOrcThreadSafeContextGetContext` was removed in LLVM commit b18e5b6, +and the ORC examples in the LLVM tree seem to just create a context +instead, which we replicate here. + +With this commit, mesa successfully builds the llvmpipe gallium driver +on riscv64 with LLVM 21.1.0. + +Closes: https://gitlab.freedesktop.org/mesa/mesa/-/issues/13785 +Closes: https://gitlab.freedesktop.org/mesa/mesa/-/issues/13852 + +Reviewed-by: David Heidelberg +Part-of: + +Upstream-Status: Backport [https://cgit.freedesktop.org/mesa/mesa/commit/?id=cd129dbf8af2d16b1243f2ce287ff69c6a5dc557] +--- + src/gallium/auxiliary/gallivm/lp_bld_init_orc.cpp | 7 ++++++- + 1 file changed, 6 insertions(+), 1 deletion(-) + +diff --git a/src/gallium/auxiliary/gallivm/lp_bld_init_orc.cpp b/src/gallium/auxiliary/gallivm/lp_bld_init_orc.cpp +index 6651ea439da..e5d8e461dd6 100644 +--- a/src/gallium/auxiliary/gallivm/lp_bld_init_orc.cpp ++++ b/src/gallium/auxiliary/gallivm/lp_bld_init_orc.cpp +@@ -339,7 +339,12 @@ LPJit::LPJit() :jit_dylib_count(0) { + .setJITTargetMachineBuilder(std::move(JTMB)) + #ifdef USE_JITLINK + .setObjectLinkingLayerCreator( ++#if LLVM_VERSION_MAJOR >= 21 ++ /* LLVM 21 removed the Triple argument */ ++ [&](ExecutionSession &ES) { ++#else + [&](ExecutionSession &ES, const llvm::Triple &TT) { ++#endif + return std::make_unique( + ES, ExitOnErr(llvm::jitlink::InProcessMemoryManager::Create())); + }) +@@ -551,7 +556,7 @@ init_gallivm_state(struct gallivm_state *gallivm, const char *name, + gallivm->cache = cache; + + gallivm->_ts_context = context->ref; +- gallivm->context = LLVMOrcThreadSafeContextGetContext(context->ref); ++ gallivm->context = LLVMContextCreate(); + + gallivm->module_name = LPJit::get_unique_name(name); + gallivm->module = LLVMModuleCreateWithNameInContext(gallivm->module_name, +-- +cgit v1.2.3 + diff --git a/meta/recipes-graphics/mesa/mesa.inc b/meta/recipes-graphics/mesa/mesa.inc index cf2c2a57a07..d880673f273 100644 --- a/meta/recipes-graphics/mesa/mesa.inc +++ b/meta/recipes-graphics/mesa/mesa.inc @@ -17,6 +17,7 @@ PE = "2" SRC_URI = "https://archive.mesa3d.org/mesa-${PV}.tar.xz \ file://0001-meson-misdetects-64bit-atomics-on-mips-clang.patch \ file://0001-freedreno-don-t-encode-build-path-into-binaries.patch \ + file://0001-gallivm-support-LLVM-21.patch \ " SRC_URI[sha256sum] = "097842f3e49d996868b38688db87b006f7d4541e93ce86d2f341d8b3e7be7c93" From patchwork Sat Jan 31 07:56:17 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 80125 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 60E07D7975E for ; Sat, 31 Jan 2026 07:57:06 +0000 (UTC) Received: from mail-wm1-f53.google.com (mail-wm1-f53.google.com [209.85.128.53]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.5005.1769846219982458519 for ; Fri, 30 Jan 2026 23:57:00 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=pVsY5j9h; spf=pass (domain: smile.fr, ip: 209.85.128.53, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f53.google.com with SMTP id 5b1f17b1804b1-4801eb2c0a5so26677735e9.3 for ; Fri, 30 Jan 2026 23:56:59 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1769846218; x=1770451018; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=AKzSL3pDQUCWAVGN3g6daZ1PqLh0/g0DGVl298jnMGk=; b=pVsY5j9hnCOsAuEaINFuDp8TgOHn+QXgoz9LMEBYMKUttVNldFMJaI1oh5q5NEpEWv QM2fsvbdzuvBEDfXcRlEaVtM9BzVwVBgr6XV8w3NxziLBYLtkIa3JHxLqyXSEcILx8qc S2axi+C9VB8BBJnfUKSF6JN/Qf8yBIvGvbAZM= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1769846218; x=1770451018; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=AKzSL3pDQUCWAVGN3g6daZ1PqLh0/g0DGVl298jnMGk=; b=txjfPAfPT0OrdyAWvkiwb05SNafJp4dFU9nxiBA3k5Iw8z/QyH4nZjsMCq9WK1naf3 7DrdVfnSTNd5HAakFVa7Kzr/srodjjz1fC5KGr/oWvZsc70+mb/5ey6Oksr6rmn15wli Z2C7wsk1vCxHV0KdkjIwDQi/Q5J+jjnz9N6akK20QBq/jvJSQ8NqWhSal0ckfh+s27lO 3lSohpre9u6qS0ob2pEIPi2h9VQ6Pwb9K3MjM7uOYbHq1tO9LhKYw3t15ES2lfu/bntG K1nhY/lBE25YmVRucqsHAQey4j0rzMUgiQCWtvzwuklTF7kUtjZfPJkiyhhoIO0E9QTK Nrqg== X-Gm-Message-State: AOJu0YzChxph8FaplHj1mYN2skJe8eAxmGxdYMc327IYzLbWFHUS5UJs j342np7p6Bpu7MM0WHdT98fDWTlexC46cGsveDq0oKXgo6Z2tjTvnKB96pqIcPdd1VFWF04Kv63 RMIPfZII= X-Gm-Gg: AZuq6aI2LqBnqiqaGTKBP39DU0wjxfTSrpCuiSMiqf21RGTQ6LYIkg/0qnm1KW4gkFQ kPNDSKpJP1qDgrATehLzE8C+O9DKjcdYHxeFlI7/CixRWpQJ/J08dW4vYuaxRfilmnfdBYs512Y LAaXstYNS5ZO89iT3p5uDRkVJEDYIs1m8Gkyn9XAglVKtcdMan42/2E0qrazNGF+XHz3ij17VhM hprBb5h4cx1LDB9jvOWXqr161JVDHdCBLzkwpRECaSDaf8BY5CmFLP+8eX+6jqZt/DhbgWhzjvS t+OTR8vep/nI5idP6+L6nDtDtxkPC2zNGexZF3rNTwzHMz/yadoi9EueUpi5YNtVa9KfKkzXMOP RNy+dqSxUOKl2cNRZQP9mCpyTDFrDn4l8mjoZwlgnIGXe1NtwtgTPOOl8sfzWK9/lrlldCz8bnw iRuZ27yA6RD4Xo9GPghr9t3+mko6jrCLR2Ro4mSN8MtipekPHyfR6chyDpG0qKQtfERMcxzLhSb pIGPtw4LHO729/e X-Received: by 2002:a05:600c:6206:b0:477:b0b9:3129 with SMTP id 5b1f17b1804b1-482db44d215mr65769895e9.3.1769846218003; Fri, 30 Jan 2026 23:56:58 -0800 (PST) Received: from FRSMI25-LASER.home (2a01cb001331aa00fa8b238ae1dd6dd8.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:fa8b:238a:e1dd:6dd8]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4806ce564f9sm258621475e9.14.2026.01.30.23.56.57 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 30 Jan 2026 23:56:57 -0800 (PST) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 06/22] go: upgrade 1.25.5 -> 1.25.6 Date: Sat, 31 Jan 2026 08:56:17 +0100 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 31 Jan 2026 07:57:06 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/230211 From: Peter Marko Upgrade to latest 1.25.x release [1]: $ git --no-pager log --oneline go1.25.5..go1.25.6 69801b25b9 (tag: go1.25.6) [release-branch.go1.25] go1.25.6 9d497df196 [release-branch.go1.25] archive/zip: reduce CPU usage in index construction afa9b66ac0 [release-branch.go1.25] net/url: add urlmaxqueryparams GODEBUG to limit the number of query parameters 2526187481 [release-branch.go1.25] cmd/go/internal/work: sanitize flags before invoking 'pkg-config' 082365aa55 [release-branch.go1.25] cmd/go: update VCS commands to use safer flag/argument syntax 4be38528a6 [release-branch.go1.25] crypto/tls: don't copy auto-rotated session ticket keys in Config.Clone 525dd85363 [release-branch.go1.25] crypto/tls: reject trailing messages after client/server hello ddcf27fc8c [release-branch.go1.25] Revert "errors: optimize errors.Join for single unwrappable errors" 14f50f6e3e [release-branch.go1.25] cmd/compile: handle propagating an out-of-range jump table index 4e531b2f14 [release-branch.go1.25] runtime: mark getfp as nosplit 6f07a57145 [release-branch.go1.25] runtime/race: set missing argument frame for ppc64x atomic And/Or wrappers ea603eea37 [release-branch.go1.25] os: allow direntries to have zero inodes on Linux 93f5d1c27e [release-branch.go1.25] os,internal/poll: don't call IsNonblock for consoles and Stdin d5bfdcbc47 [release-branch.go1.25] crypto/tls: use inner hello for earlyData when using QUIC and ECH Fixes CVE-2025-61728, CVE-2025-61726, CVE-2025-68121, CVE-2025-61731, CVE-2025-68119 and CVE-2025-61730. Release information: [2] [1] https://github.com/golang/go/compare/go1.25.5...go1.25.6 [2] https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc Signed-off-by: Peter Marko Signed-off-by: Antonin Godard Signed-off-by: Richard Purdie (cherry picked from commit d3e4f89552a90897691bdd00ffd0413e65023a2c) Signed-off-by: Yoann Congal --- meta/recipes-devtools/go/{go-1.25.5.inc => go-1.25.6.inc} | 2 +- ...binary-native_1.25.5.bb => go-binary-native_1.25.6.bb} | 6 +++--- ...oss-canadian_1.25.5.bb => go-cross-canadian_1.25.6.bb} | 0 .../go/{go-cross_1.25.5.bb => go-cross_1.25.6.bb} | 0 .../go/{go-crosssdk_1.25.5.bb => go-crosssdk_1.25.6.bb} | 0 .../go/{go-runtime_1.25.5.bb => go-runtime_1.25.6.bb} | 0 ...go-make-content-based-hash-generation-less-pedan.patch | 8 ++++---- ...ime-when-using-cgo-on-386-call-C-sigaction-funct.patch | 4 ++-- .../go/0006-cmd-go-make-GOROOT-precious-by-default.patch | 2 +- meta/recipes-devtools/go/{go_1.25.5.bb => go_1.25.6.bb} | 0 10 files changed, 11 insertions(+), 11 deletions(-) rename meta/recipes-devtools/go/{go-1.25.5.inc => go-1.25.6.inc} (91%) rename meta/recipes-devtools/go/{go-binary-native_1.25.5.bb => go-binary-native_1.25.6.bb} (79%) rename meta/recipes-devtools/go/{go-cross-canadian_1.25.5.bb => go-cross-canadian_1.25.6.bb} (100%) rename meta/recipes-devtools/go/{go-cross_1.25.5.bb => go-cross_1.25.6.bb} (100%) rename meta/recipes-devtools/go/{go-crosssdk_1.25.5.bb => go-crosssdk_1.25.6.bb} (100%) rename meta/recipes-devtools/go/{go-runtime_1.25.5.bb => go-runtime_1.25.6.bb} (100%) rename meta/recipes-devtools/go/{go_1.25.5.bb => go_1.25.6.bb} (100%) diff --git a/meta/recipes-devtools/go/go-1.25.5.inc b/meta/recipes-devtools/go/go-1.25.6.inc similarity index 91% rename from meta/recipes-devtools/go/go-1.25.5.inc rename to meta/recipes-devtools/go/go-1.25.6.inc index 47d5c3912c0..2c31c4a235d 100644 --- a/meta/recipes-devtools/go/go-1.25.5.inc +++ b/meta/recipes-devtools/go/go-1.25.6.inc @@ -18,4 +18,4 @@ SRC_URI += "\ file://0011-cmd-link-stop-forcing-binutils-gold-dependency-on-aa.patch \ file://0001-runtime-when-using-cgo-on-386-call-C-sigaction-funct.patch \ " -SRC_URI[main.sha256sum] = "22a5fd0a91efcd28a1b0537106b9959b2804b61f59c3758b51e8e5429c1a954f" +SRC_URI[main.sha256sum] = "58cbf771e44d76de6f56d19e33b77d745a1e489340922875e46585b975c2b059" diff --git a/meta/recipes-devtools/go/go-binary-native_1.25.5.bb b/meta/recipes-devtools/go/go-binary-native_1.25.6.bb similarity index 79% rename from meta/recipes-devtools/go/go-binary-native_1.25.5.bb rename to meta/recipes-devtools/go/go-binary-native_1.25.6.bb index 5ecbca6d17d..6429bb385b5 100644 --- a/meta/recipes-devtools/go/go-binary-native_1.25.5.bb +++ b/meta/recipes-devtools/go/go-binary-native_1.25.6.bb @@ -9,9 +9,9 @@ PROVIDES = "go-native" # Checksums available at https://go.dev/dl/ SRC_URI = "https://dl.google.com/go/go${PV}.${BUILD_GOOS}-${BUILD_GOARCH}.tar.gz;name=go_${BUILD_GOTUPLE}" -SRC_URI[go_linux_amd64.sha256sum] = "9e9b755d63b36acf30c12a9a3fc379243714c1c6d3dd72861da637f336ebb35b" -SRC_URI[go_linux_arm64.sha256sum] = "b00b694903d126c588c378e72d3545549935d3982635ba3f7a964c9fa23fe3b9" -SRC_URI[go_linux_ppc64le.sha256sum] = "f0904b647b5b8561efc5d48bb59a34f2b7996afab83ccd41c93b1aeb2c0067e4" +SRC_URI[go_linux_amd64.sha256sum] = "f022b6aad78e362bcba9b0b94d09ad58c5a70c6ba3b7582905fababf5fe0181a" +SRC_URI[go_linux_arm64.sha256sum] = "738ef87d79c34272424ccdf83302b7b0300b8b096ed443896089306117943dd5" +SRC_URI[go_linux_ppc64le.sha256sum] = "bee02dbe034b12b839ae7807a85a61c13bee09ee38f2eeba2074bd26c0c0ab73" UPSTREAM_CHECK_URI = "https://golang.org/dl/" UPSTREAM_CHECK_REGEX = "go(?P\d+(\.\d+)+)\.linux" diff --git a/meta/recipes-devtools/go/go-cross-canadian_1.25.5.bb b/meta/recipes-devtools/go/go-cross-canadian_1.25.6.bb similarity index 100% rename from meta/recipes-devtools/go/go-cross-canadian_1.25.5.bb rename to meta/recipes-devtools/go/go-cross-canadian_1.25.6.bb diff --git a/meta/recipes-devtools/go/go-cross_1.25.5.bb b/meta/recipes-devtools/go/go-cross_1.25.6.bb similarity index 100% rename from meta/recipes-devtools/go/go-cross_1.25.5.bb rename to meta/recipes-devtools/go/go-cross_1.25.6.bb diff --git a/meta/recipes-devtools/go/go-crosssdk_1.25.5.bb b/meta/recipes-devtools/go/go-crosssdk_1.25.6.bb similarity index 100% rename from meta/recipes-devtools/go/go-crosssdk_1.25.5.bb rename to meta/recipes-devtools/go/go-crosssdk_1.25.6.bb diff --git a/meta/recipes-devtools/go/go-runtime_1.25.5.bb b/meta/recipes-devtools/go/go-runtime_1.25.6.bb similarity index 100% rename from meta/recipes-devtools/go/go-runtime_1.25.5.bb rename to meta/recipes-devtools/go/go-runtime_1.25.6.bb diff --git a/meta/recipes-devtools/go/go/0001-cmd-go-make-content-based-hash-generation-less-pedan.patch b/meta/recipes-devtools/go/go/0001-cmd-go-make-content-based-hash-generation-less-pedan.patch index b55ad1e7873..6d75266cbe6 100644 --- a/meta/recipes-devtools/go/go/0001-cmd-go-make-content-based-hash-generation-less-pedan.patch +++ b/meta/recipes-devtools/go/go/0001-cmd-go-make-content-based-hash-generation-less-pedan.patch @@ -109,7 +109,7 @@ index 7b073165d5..1f618be0bb 100644 } // Configuration specific to compiler toolchain. -@@ -2631,8 +2633,25 @@ func envList(key, def string) []string { +@@ -2639,8 +2641,25 @@ func envList(key, def string) []string { return args } @@ -136,7 +136,7 @@ index 7b073165d5..1f618be0bb 100644 if cppflags, err = buildFlags("CPPFLAGS", "", p.CgoCPPFLAGS, checkCompilerFlags); err != nil { return } -@@ -2648,6 +2667,13 @@ func (b *Builder) CFlags(p *load.Package) (cppflags, cflags, cxxflags, fflags, l +@@ -2656,6 +2675,13 @@ func (b *Builder) CFlags(p *load.Package) (cppflags, cflags, cxxflags, fflags, l if ldflags, err = buildFlags("LDFLAGS", DefaultCFlags, p.CgoLDFLAGS, checkLinkerFlags); err != nil { return } @@ -150,7 +150,7 @@ index 7b073165d5..1f618be0bb 100644 return } -@@ -2665,7 +2691,7 @@ func (b *Builder) cgo(a *Action, cgoExe, objdir string, pcCFLAGS, pcLDFLAGS, cgo +@@ -2673,7 +2699,7 @@ func (b *Builder) cgo(a *Action, cgoExe, objdir string, pcCFLAGS, pcLDFLAGS, cgo p := a.Package sh := b.Shell(a) @@ -159,7 +159,7 @@ index 7b073165d5..1f618be0bb 100644 if err != nil { return nil, nil, err } -@@ -3229,7 +3255,7 @@ func (b *Builder) swigOne(a *Action, file, objdir string, pcCFLAGS []string, cxx +@@ -3237,7 +3263,7 @@ func (b *Builder) swigOne(a *Action, file, objdir string, pcCFLAGS []string, cxx p := a.Package sh := b.Shell(a) diff --git a/meta/recipes-devtools/go/go/0001-runtime-when-using-cgo-on-386-call-C-sigaction-funct.patch b/meta/recipes-devtools/go/go/0001-runtime-when-using-cgo-on-386-call-C-sigaction-funct.patch index 33e3b033a14..d27809a7f49 100644 --- a/meta/recipes-devtools/go/go/0001-runtime-when-using-cgo-on-386-call-C-sigaction-funct.patch +++ b/meta/recipes-devtools/go/go/0001-runtime-when-using-cgo-on-386-call-C-sigaction-funct.patch @@ -168,7 +168,7 @@ diff --git a/src/runtime/os_linux.go b/src/runtime/os_linux.go index c9d25a5be8..f9fe1b5f33 100644 --- a/src/runtime/os_linux.go +++ b/src/runtime/os_linux.go -@@ -486,7 +486,8 @@ func setsig(i uint32, fn uintptr) { +@@ -487,7 +487,8 @@ func setsig(i uint32, fn uintptr) { sigfillset(&sa.sa_mask) // Although Linux manpage says "sa_restorer element is obsolete and // should not be used". x86_64 kernel requires it. Only use it on @@ -178,7 +178,7 @@ index c9d25a5be8..f9fe1b5f33 100644 if GOARCH == "386" || GOARCH == "amd64" { sa.sa_restorer = abi.FuncPCABI0(sigreturn__sigaction) } -@@ -562,6 +563,21 @@ func sysSigaction(sig uint32, new, old *sigactiont) { +@@ -563,6 +564,21 @@ func sysSigaction(sig uint32, new, old *sigactiont) { //go:noescape func rt_sigaction(sig uintptr, new, old *sigactiont, size uintptr) int32 diff --git a/meta/recipes-devtools/go/go/0006-cmd-go-make-GOROOT-precious-by-default.patch b/meta/recipes-devtools/go/go/0006-cmd-go-make-GOROOT-precious-by-default.patch index 51173794442..15ffdb3cf38 100644 --- a/meta/recipes-devtools/go/go/0006-cmd-go-make-GOROOT-precious-by-default.patch +++ b/meta/recipes-devtools/go/go/0006-cmd-go-make-GOROOT-precious-by-default.patch @@ -94,7 +94,7 @@ index 1f618be0bb..651fa64582 100644 if err := sh.Mkdir(a.Objdir); err != nil { return err } -@@ -1731,6 +1748,14 @@ func (b *Builder) linkShared(ctx context.Context, a *Action) (err error) { +@@ -1739,6 +1756,14 @@ func (b *Builder) linkShared(ctx context.Context, a *Action) (err error) { return err } diff --git a/meta/recipes-devtools/go/go_1.25.5.bb b/meta/recipes-devtools/go/go_1.25.6.bb similarity index 100% rename from meta/recipes-devtools/go/go_1.25.5.bb rename to meta/recipes-devtools/go/go_1.25.6.bb From patchwork Sat Jan 31 07:56:18 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 80123 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6AADBD79762 for ; Sat, 31 Jan 2026 07:57:06 +0000 (UTC) Received: from mail-wm1-f49.google.com (mail-wm1-f49.google.com [209.85.128.49]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.5103.1769846220443303134 for ; Fri, 30 Jan 2026 23:57:00 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=EYe2nbuX; spf=pass (domain: smile.fr, ip: 209.85.128.49, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f49.google.com with SMTP id 5b1f17b1804b1-4801d7c72a5so21673485e9.0 for ; Fri, 30 Jan 2026 23:57:00 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1769846219; x=1770451019; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=SRbpdnfCPzXYtV9l9RU5VAF3MvD/TbwGpKBzzr/lkfs=; b=EYe2nbuXCh2zBW/mYr7UxlcuEJ2bs9gYasn/ZsHUIXIpyjy6E9ZguXR394S/rukghE r9vpsnwwan8gIlSfIx+peKlC2iTtQs/3TXEoCPJa4bJToWzC4ttHQX8Xs4x7oRuo5+Y9 eQk+RkntrY2qf3uILiO2u1IEfxB65e7+MuLyU= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1769846219; x=1770451019; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=SRbpdnfCPzXYtV9l9RU5VAF3MvD/TbwGpKBzzr/lkfs=; b=Beb7fBlJT4aDQKREYTqbRRBTTR6J56t8+A/OoUhfu3Y39Kdi6C3eCegV2XNHbaZXKn y/rwVX++J7x48Ekjw8JWuvwk8Ges9zo9I4VXf2kutUv364hPFoG1o5mxGkayLgPeiczc 4XR01NSvOlEYjR9NA888AR1KEFJVN0AXH8PayxRni8qdxQOYQ5QOwjlulbCM6N1ELrcA lfQWYe4nNGDZQv9yDdHvI4C0tKE8M4G7aUQdOHtTseuDKil74RDf2g4ejbBKD6JTTI7E SjyLX1nMsK/vhvtX3Y48sVeoxcCDwV70LcSxUWiMpdZLW1q6kOhBaywaepj4gO5XFfQ6 dbFA== X-Gm-Message-State: AOJu0YzNothLXkEns0lPu1HtRynjub7a9tVKDT1hyH2BZHdYtUjs4CCb VTgShKXm/WI1kpQsatE+raao5v4DOhQ8/u/DFKdY/u2WJ3LdmvBUSO0FSouT+oNpopekMYMXeag dsyMYM/c= X-Gm-Gg: AZuq6aJWQ6P7ZSBchN6B1SRVW4Bxm/G4v4EtuHt7fHc9xOcoYl4zW0+XHw4fp2WscEc 21S7NB3/SMurmpN1skg3toed+kDlv+C/lkdmWdoX7rC+vgoa0+lT3/YIoXlSuQZr9a3sboY16CE 1kM6q4aedNTw8DD85bMrht8AeqEduQZ/42bY5lQUUd3Se+WTGcTV5cJ/baUzqcOT/AqnrAn2rtt DvKIsTav1n0CN6bf5QlX61tVsmC1S4nwlKfVYaC+Mh/osKI1ylZ2FIM4XXLdvB7mfoIj6Fs2Hat EBLUAymlYLb8c+5Lv8zkn7pbZTgw3RGaTwv2fvp+OTBm6KLjyfXheTgtMFGIa2/Culr2EE7CQZK vIVV9/eYzGGhByr+lM+xlXmN2qs0x/URMcKADxPSXmIf1jDlJAVLJw90QPIfnBJqpKNuM2yJkZw whPVUSXhwrPiyuW3KFGnJdcChrAX5PkHTib5lb/w1p13vlFpe/SHxJV2w9z1BCtI5ksGPLCdiud eN/dvVElN2Un4VN X-Received: by 2002:a05:600c:1da8:b0:477:7b16:5f77 with SMTP id 5b1f17b1804b1-482db493ff1mr68899575e9.3.1769846218579; Fri, 30 Jan 2026 23:56:58 -0800 (PST) Received: from FRSMI25-LASER.home (2a01cb001331aa00fa8b238ae1dd6dd8.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:fa8b:238a:e1dd:6dd8]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4806ce564f9sm258621475e9.14.2026.01.30.23.56.58 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 30 Jan 2026 23:56:58 -0800 (PST) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 07/22] zlib: ignore CVE-2026-22184 Date: Sat, 31 Jan 2026 08:56:18 +0100 Message-ID: <70a80c9ff8662981ff442abf1708f6cd21ce6479.1769845858.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 31 Jan 2026 07:57:06 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/230212 From: Peter Marko This is CVE for example tool contrib/untgz. This is not compiled in Yocto zlib recipe. This CVE has controversial CVSS3 score of 9.8. Signed-off-by: Peter Marko Signed-off-by: Antonin Godard Signed-off-by: Richard Purdie (cherry picked from commit b0592c51b6ad038d737d2f6b30977bd0c5c50058) Signed-off-by: Yoann Congal --- meta/recipes-core/zlib/zlib_1.3.1.bb | 2 ++ 1 file changed, 2 insertions(+) diff --git a/meta/recipes-core/zlib/zlib_1.3.1.bb b/meta/recipes-core/zlib/zlib_1.3.1.bb index 592b7f14229..ef831421216 100644 --- a/meta/recipes-core/zlib/zlib_1.3.1.bb +++ b/meta/recipes-core/zlib/zlib_1.3.1.bb @@ -51,3 +51,5 @@ BBCLASSEXTEND = "native nativesdk" # Adding 'CVE_PRODUCT' to avoid false detection of CVEs CVE_PRODUCT = "zlib:zlib gnu:zlib" + +CVE_STATUS[CVE-2026-22184] = "not-applicable-config: vulnerable file is not compiled" From patchwork Sat Jan 31 07:56:19 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 80114 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 05BE1D7974A for ; Sat, 31 Jan 2026 07:57:06 +0000 (UTC) Received: from mail-wm1-f48.google.com (mail-wm1-f48.google.com [209.85.128.48]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.5104.1769846221471795042 for ; Fri, 30 Jan 2026 23:57:01 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=B+t3z4F/; spf=pass (domain: smile.fr, ip: 209.85.128.48, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f48.google.com with SMTP id 5b1f17b1804b1-47d6a1f08bbso12905755e9.2 for ; Fri, 30 Jan 2026 23:57:01 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1769846219; x=1770451019; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=42ylXkdUGfq8kHAqdH2LLApxmlGycZrLoYuwTTyDTYM=; b=B+t3z4F/Xt/o45eWz2MGNlpFfxWFhwS7CWgjmXNWGmDDvASVXyTaGnsWyNs0u3+yU9 F48xg8R0PXa89vza7NwGKp7RzBFJm4mn+MzM/GcLuLr/u/QQOlsh/IN9avAop0cmRFdn wowQKD0B0EOgcd2w+W2b2OGDb9SOAZdWEQ4tQ= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1769846219; x=1770451019; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=42ylXkdUGfq8kHAqdH2LLApxmlGycZrLoYuwTTyDTYM=; b=PfMtgwuqRn4BjhF1nlT3XcDnPckbe3gdiL8vo8tmZuGtz2j6Y7PsIV1930wzQIyVf3 a1FFm58OJ2e/dVUleeKK8kSByZHsBk7OtY5d4Ob7htWa0bUCdibWwM6RJs76nEyg1aqK 7O82ZYfyGoF8o5YHbuTK0YwTr5f0R9ACmKJOaMfyD5yk6Iu/z46B0/eUMrEOwD4IM4nD Bgn6+ESYGmIY//eIaas2p/7c2yp9lL25mKbZtoHansFBq0WwrkZPV0GuQgr61etYPHqS XlJyvfuEPgGMX5WwiJ26UDTFAOejsVoVKzOaqvsS5Vl8Zpt0yCpL4lJ4zcPjVl4vDm7a Leng== X-Gm-Message-State: AOJu0Yx+mHOR1BrmEC7FhxFjOPZlSwtXDjjvFLkfKImHXmH1rqaXjo6E CkoM/7dAHvq61E7d/IjfC31atXxht+zglWplrnMtJBpKKEcYgQTsdKiUQOy/F86jsDl9QmALDPf ssZmgTqM= X-Gm-Gg: AZuq6aLUbODMgp6Du958RZ9KVxjPBIQYv5UwpxxyH3rU3TRw6NsQLjpOJEfQlB/tHLH T4gtjMD272/iUR+Pc2JD/nw50Z4jW+yNFTzYmuIF1qDs/RTo4ZkGItHHq7tYolT1WlYM7brQVj+ W9onx5qU6RUsAiJ+kEFasRSqfrV04Q5PWMKgmBv1gj2wcuzkzEHP6gcPOdrXCxoP1g8FRck/GH1 Sft61CzcYN58pypBB3F6/e+VdcBa0x476lzkT4rxjHCIifEoax55ckkeueVQB7E272atQ071AQ8 e6PbK2M5EiSmK21W+lXSWW+nUZxGVfDsWpN0veCJFINnKymt+IZhCWUffZli51ZzOTDw8YtCVyu k3ud7otUT+DgOew/q4G94OqfQDPA/csuWqSDlRr+GVOCplR9bB057d2ffcDWhbOs4k8OkWOZVI3 nsYQ2ClKtYUuCcC/ftsvZI2iWVRyi5SYUIMtAeczIAW7lSFgwt0CQcSAO3aO5gFwozaQhSqX9Uw FuSSb1NZHbH2tGJ X-Received: by 2002:a05:600c:1da8:b0:477:7b16:5f77 with SMTP id 5b1f17b1804b1-482db493ff1mr68899885e9.3.1769846219510; Fri, 30 Jan 2026 23:56:59 -0800 (PST) Received: from FRSMI25-LASER.home (2a01cb001331aa00fa8b238ae1dd6dd8.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:fa8b:238a:e1dd:6dd8]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4806ce564f9sm258621475e9.14.2026.01.30.23.56.58 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 30 Jan 2026 23:56:58 -0800 (PST) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 08/22] python3-urllib3: patch CVE-2026-21441 Date: Sat, 31 Jan 2026 08:56:19 +0100 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 31 Jan 2026 07:57:05 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/230213 From: Peter Marko Pick patch mentioned in NVD report. Signed-off-by: Peter Marko Signed-off-by: Yoann Congal --- .../python3-urllib3/CVE-2026-21441.patch | 111 ++++++++++++++++++ .../python/python3-urllib3_2.5.0.bb | 1 + 2 files changed, 112 insertions(+) create mode 100644 meta/recipes-devtools/python/python3-urllib3/CVE-2026-21441.patch diff --git a/meta/recipes-devtools/python/python3-urllib3/CVE-2026-21441.patch b/meta/recipes-devtools/python/python3-urllib3/CVE-2026-21441.patch new file mode 100644 index 00000000000..f3a60138177 --- /dev/null +++ b/meta/recipes-devtools/python/python3-urllib3/CVE-2026-21441.patch @@ -0,0 +1,111 @@ +From 8864ac407bba8607950025e0979c4c69bc7abc7b Mon Sep 17 00:00:00 2001 +From: Illia Volochii +Date: Wed, 7 Jan 2026 18:07:30 +0200 +Subject: [PATCH] Merge commit from fork + +* Stop decoding response content during redirects needlessly + +* Rename the new query parameter + +* Add a changelog entry + +CVE: CVE-2026-21441 +Upstream-Status: Backport [https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b] +Signed-off-by: Peter Marko +--- + CHANGES.rst | 13 +++++++++++++ + dummyserver/app.py | 8 +++++++- + src/urllib3/response.py | 6 +++++- + test/with_dummyserver/test_connectionpool.py | 19 +++++++++++++++++++ + 4 files changed, 44 insertions(+), 2 deletions(-) + +diff --git a/CHANGES.rst b/CHANGES.rst +index 2de9f016..4c0b9cea 100644 +--- a/CHANGES.rst ++++ b/CHANGES.rst +@@ -1,3 +1,16 @@ ++(TBD) ++================== ++ ++Bugfixes ++-------- ++ ++- Fixed a high-severity security issue where decompression-bomb safeguards of ++ the streaming API were bypassed when HTTP redirects were followed. ++ (`GHSA-38jv-5279-wg99 `__) ++ ++TODO: add other entries. ++ ++ + 2.5.0 (2025-06-18) + ================== + +diff --git a/dummyserver/app.py b/dummyserver/app.py +index 0eeb93f7..5b82e932 100644 +--- a/dummyserver/app.py ++++ b/dummyserver/app.py +@@ -233,10 +233,16 @@ async def redirect() -> ResponseReturnValue: + values = await request.values + target = values.get("target", "/") + status = values.get("status", "303 See Other") ++ compressed = values.get("compressed") == "true" + status_code = status.split(" ")[0] + + headers = [("Location", target)] +- return await make_response("", status_code, headers) ++ if compressed: ++ headers.append(("Content-Encoding", "gzip")) ++ data = gzip.compress(b"foo") ++ else: ++ data = b"" ++ return await make_response(data, status_code, headers) + + + @hypercorn_app.route("/redirect_after") +diff --git a/src/urllib3/response.py b/src/urllib3/response.py +index f6266f1a..ff6d1f49 100644 +--- a/src/urllib3/response.py ++++ b/src/urllib3/response.py +@@ -687,7 +687,11 @@ class HTTPResponse(BaseHTTPResponse): + Unread data in the HTTPResponse connection blocks the connection from being released back to the pool. + """ + try: +- self.read() ++ self.read( ++ # Do not spend resources decoding the content unless ++ # decoding has already been initiated. ++ decode_content=self._has_decoded_content, ++ ) + except (HTTPError, OSError, BaseSSLError, HTTPException): + pass + +diff --git a/test/with_dummyserver/test_connectionpool.py b/test/with_dummyserver/test_connectionpool.py +index ce165e24..8d6107ae 100644 +--- a/test/with_dummyserver/test_connectionpool.py ++++ b/test/with_dummyserver/test_connectionpool.py +@@ -508,6 +508,25 @@ class TestConnectionPool(HypercornDummyServerTestCase): + assert r.status == 200 + assert r.data == b"Dummy server!" + ++ @mock.patch("urllib3.response.GzipDecoder.decompress") ++ def test_no_decoding_with_redirect_when_preload_disabled( ++ self, gzip_decompress: mock.MagicMock ++ ) -> None: ++ """ ++ Test that urllib3 does not attempt to decode a gzipped redirect ++ response when `preload_content` is set to `False`. ++ """ ++ with HTTPConnectionPool(self.host, self.port) as pool: ++ # Three requests are expected: two redirects and one final / 200 OK. ++ response = pool.request( ++ "GET", ++ "/redirect", ++ fields={"target": "/redirect?compressed=true", "compressed": "true"}, ++ preload_content=False, ++ ) ++ assert response.status == 200 ++ gzip_decompress.assert_not_called() ++ + def test_303_redirect_makes_request_lose_body(self) -> None: + with HTTPConnectionPool(self.host, self.port) as pool: + response = pool.request( diff --git a/meta/recipes-devtools/python/python3-urllib3_2.5.0.bb b/meta/recipes-devtools/python/python3-urllib3_2.5.0.bb index c39e9676e89..7892fc0874e 100644 --- a/meta/recipes-devtools/python/python3-urllib3_2.5.0.bb +++ b/meta/recipes-devtools/python/python3-urllib3_2.5.0.bb @@ -9,6 +9,7 @@ inherit pypi python_hatchling SRC_URI += "\ file://CVE-2025-66418.patch \ + file://CVE-2026-21441.patch \ " DEPENDS += "python3-hatch-vcs-native" From patchwork Sat Jan 31 07:56:20 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 80119 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 12E61D7974C for ; Sat, 31 Jan 2026 07:57:06 +0000 (UTC) Received: from mail-wm1-f45.google.com (mail-wm1-f45.google.com [209.85.128.45]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.5105.1769846222110590224 for ; Fri, 30 Jan 2026 23:57:02 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=K51/1a91; spf=pass (domain: smile.fr, ip: 209.85.128.45, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f45.google.com with SMTP id 5b1f17b1804b1-47ee07570deso23639645e9.1 for ; Fri, 30 Jan 2026 23:57:01 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1769846220; x=1770451020; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=Cci+XdPd5TXzBJ7WTfZGi6s8ulHOjrzOjlw31HCfIJo=; b=K51/1a91d/rZh3fq9pyR+J/a5M/XoTk/Rxv7ItIgPXOI6nOqh0jUbr771RqoZ9AsoN AdER4KZEk29uUwfXNSaccOukQzdeNO6jgnpKo7KJhRDx952T//qPshbFe58E7JF+67OK nTSEsSQdS2LLB3yCxZxUXTW9ISv/Lke5eK7sc= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1769846220; x=1770451020; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=Cci+XdPd5TXzBJ7WTfZGi6s8ulHOjrzOjlw31HCfIJo=; b=S6XTXjEZuyBhdrPnSQjSewWtS5aqjggx5DDBmL4m5JQ74AgZEc7JIeHaVrbbfuxCM1 KyNi7RNxjULMQaDfoKLeMSHBMNgAuJlvktgUHH+3sx2HYkSmQ35nkpPksno1PccTfh9c UuE3q1OIzZ3jZLrBjo9Wn0BBX/WZvKs2Hi0La4nWEnqU7C9raC4kLTa2edzCF2nMMwyC iSF1+Km0ITKPMKk51VnG0RhRtKUJZ60k1Y4eVyYdnQJHccgeFOSj1NRqO2dbuEjC7UHu qq2nlzOYDn+rZ9vy6ijVLP1sBSRMmv1Ah0v432NnbNDIQsME+n5EpICDCnW6LoZHg5LF lQyw== X-Gm-Message-State: AOJu0YxSjmo28mvDdgndDdnSDAn8DryG1seWmPBnatBw6WMd9EPhWlKZ TQSPi61BI44Twv7Z0dTbqBTweO/t/DWvzT5T9SejQMVX9HTolEeBDuMObmFApSsnA69xDnpiuKY 9x10NbZc= X-Gm-Gg: AZuq6aIhHtOWDwWaxctW3wsBvnr5RApp6/PGdDf5lpjHh/2hP0UBASNtac0S9fVaVdx Ba8Ve35xUl4da8hqlJLJlwhU63pnDg7zf2yPfbv+oyhcD4YLn7dngQCVRLmZpfQhGbQhni2zzJT k06An6QazaRZw1OEu7BZ5mB/cs36e5Gp5ST1eoJ0Uy+DadZNh+mI1rn766x9d/G4ZmE2wdB2DRb LMFDWSQODN81PAW0lGKSXxiHTFFhRhvjohAWendJtLX9BfZv8L8EaWM4cF40otpg0hMxs0dKAS2 MLxgJJh9bIeH6iy1cAs/dDV/2hvW5Q+Ur2CQgelzjfEnD6QA4qfJ/gT7aIcPk9wNZDvnvCnT4hp Z2k8tDX56imXK97WzfSDkyYYGKZinn4Xz6nTBp+YDt3IejrcZ6uXs96CA0BuKtgQcnEO28KVqkZ Iho2ZW7PEiKEE8fp+1ViXz8tu3NheY148s3gD8lKDXYBKLQ0QVyt54U4ZkpY17BuTJdSoa8N6NC HkV2Ryo7wX+aejd X-Received: by 2002:a05:600c:4ec7:b0:47d:586e:2fea with SMTP id 5b1f17b1804b1-482db46b38dmr63115015e9.15.1769846220161; Fri, 30 Jan 2026 23:57:00 -0800 (PST) Received: from FRSMI25-LASER.home (2a01cb001331aa00fa8b238ae1dd6dd8.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:fa8b:238a:e1dd:6dd8]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4806ce564f9sm258621475e9.14.2026.01.30.23.56.59 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 30 Jan 2026 23:56:59 -0800 (PST) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 09/22] libtasn1: Fix CVE-2025-13151 Date: Sat, 31 Jan 2026 08:56:20 +0100 Message-ID: <38882316b7ef6344ec8598c7c73cae229c7b918a.1769845858.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 31 Jan 2026 07:57:06 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/230214 From: Hugo SIMELIERE Upstream-Status: Backport from https://gitlab.com/gnutls/libtasn1/-/commit/d276cc495a2a32b182c3c39851f1ba58f2d9f9b8 Signed-off-by: Bruno VERNAY Signed-off-by: Hugo SIMELIERE Signed-off-by: Yoann Congal --- .../gnutls/libtasn1/CVE-2025-13151.patch | 30 +++++++++++++++++++ .../recipes-support/gnutls/libtasn1_4.20.0.bb | 1 + 2 files changed, 31 insertions(+) create mode 100644 meta/recipes-support/gnutls/libtasn1/CVE-2025-13151.patch diff --git a/meta/recipes-support/gnutls/libtasn1/CVE-2025-13151.patch b/meta/recipes-support/gnutls/libtasn1/CVE-2025-13151.patch new file mode 100644 index 00000000000..5047d679840 --- /dev/null +++ b/meta/recipes-support/gnutls/libtasn1/CVE-2025-13151.patch @@ -0,0 +1,30 @@ +From ff7aa7ef2b9ba41df8f2d1e71b05bf2c2ad868dd Mon Sep 17 00:00:00 2001 +From: Vijay Sarvepalli +Date: Mon, 22 Dec 2025 12:24:27 -0500 +Subject: [PATCH] Fix for CVE-2025-13151 Buffer overflow + +Upstream-Status: Backport [https://gitlab.com/gnutls/libtasn1/-/commit/d276cc495a2a32b182c3c39851f1ba58f2d9f9b8] +CVE: CVE-2025-13151 + +Signed-off-by: Simon Josefsson +Signed-off-by: Hugo SIMELIERE +--- + lib/decoding.c | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/lib/decoding.c b/lib/decoding.c +index 1e0fcb3..abcb49f 100644 +--- a/lib/decoding.c ++++ b/lib/decoding.c +@@ -1983,7 +1983,7 @@ int + asn1_expand_octet_string (asn1_node_const definitions, asn1_node *element, + const char *octetName, const char *objectName) + { +- char name[2 * ASN1_MAX_NAME_SIZE + 1], value[ASN1_MAX_NAME_SIZE]; ++ char name[2 * ASN1_MAX_NAME_SIZE + 2], value[ASN1_MAX_NAME_SIZE]; + int retCode = ASN1_SUCCESS, result; + int len, len2, len3; + asn1_node_const p2; +-- +2.47.1 + diff --git a/meta/recipes-support/gnutls/libtasn1_4.20.0.bb b/meta/recipes-support/gnutls/libtasn1_4.20.0.bb index 8127ba5b1db..bfc011a2f17 100644 --- a/meta/recipes-support/gnutls/libtasn1_4.20.0.bb +++ b/meta/recipes-support/gnutls/libtasn1_4.20.0.bb @@ -11,6 +11,7 @@ LIC_FILES_CHKSUM = "file://COPYING;md5=1ebbd3e34237af26da5dc08a4e440464 \ SRC_URI = "${GNU_MIRROR}/libtasn1/libtasn1-${PV}.tar.gz \ file://dont-depend-on-help2man.patch \ + file://CVE-2025-13151.patch \ " DEPENDS = "bison-native" From patchwork Sat Jan 31 07:56:21 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 80113 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 26912D7974F for ; Sat, 31 Jan 2026 07:57:06 +0000 (UTC) Received: from mail-wm1-f41.google.com (mail-wm1-f41.google.com [209.85.128.41]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.5106.1769846222651565278 for ; Fri, 30 Jan 2026 23:57:02 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=GoBWqTw0; spf=pass (domain: smile.fr, ip: 209.85.128.41, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f41.google.com with SMTP id 5b1f17b1804b1-4806f3fc50bso28476045e9.0 for ; Fri, 30 Jan 2026 23:57:02 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1769846221; x=1770451021; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=y6Spzk7r+/ZPe8BJaSqxqZ+Z5LTsQ7ZNbAfkct6fYBs=; b=GoBWqTw0floMqCPZEQW8iftheB5vGANSQf6nrEwZtI2aJmx9tQ7w73Iguh3yRGWciS WnLPI7YeK2BHAPyTZl4Up8jyMPB7fih3MZFv9nqgN1rgbGQz3eivCjhMiW743Fiq+jTo 9xyu/tzLfVUjLzacQwW+yptKLSTAoXSj7ns+E= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1769846221; x=1770451021; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=y6Spzk7r+/ZPe8BJaSqxqZ+Z5LTsQ7ZNbAfkct6fYBs=; b=v/qrjKFtvNkQq7dbT1LH3mw56SGbCuCBer4MAwiz7wC/Ev2J0GRbaeYtwRyhkiKvOg jp/jm7MB+vOXWJmsgs1G2qAYkRKfkxP5/WCoocv4YC36Yx9MJr7tAAr4SL6ILYgd+smZ h6SQkybYRwa/nBBcPbrdMfEN09IPfQiRa5TNs1AwEtVwdD9a2tsjiZfK64eiAnAOkjYh 2J6MJP8J68+5SwTU5IVWgTl9abetNZoruyfSeSWJ276Cmm5lq+viUXslEbUQsV+eNgWx GMh+XmxmO8ZYv0kkO+pEXCvG40djWzOB4cAuC6Q1955g3NKr2IGnIcL66n7/nUhjWBnC j1sg== X-Gm-Message-State: AOJu0YwXpnSS2uHwljpbhntftqeyVx5hrVm9Qou2qcYto0Ri4bVAZuYG K7vK13vGU5Jabbljxh3tg8THxSGD+H4tSn1+dKfoTvLQJnOoMfa0hAwV8NpYP4+F11firIQqhz2 gGqMmA+0= X-Gm-Gg: AZuq6aLGiS9FP8Y2ds9icLUx8tykqozinHEX3aiANOBINqquokHlp0Oyx9F6KDOVhTZ 5FTmq3Pq1A8TvoUpKAY3mAjYYNR5cWN5h9njAYGjUrOebp7HxKXufoT9ZvhNxpSXc7jO7/VkjTy 9lBMmETvfG4KgXR7yic+ui1NHLs0t9fQhe6y7e2qLu2/4upgEUo3XMcbFxqfyVuPc/u3nEgFxSY r8q4tuBWxMvVCqPT3/gi5/61OQEcKbNzvkzWvBHnvn6minvuOLdPLTmcU6FSZ75ZzWMzzvJz7mR nN55gt31JNUkz158Q3nMsSx8btT+St/31yhggUL3ZpBdZxfEAzYQUJKfljSMDzDtG3g92fjvjrq 8GeqpmPUcZGtU0GyQGlD/zVH6BNqek/n0x+PCU+edJMIm5z2/ifJRESvWI17lwWEA0JZdfpVYIm e9b6E/xlmoh6NP0cgFZ5/Un4/kGUzF7OaK/6hPuPBN/oHTHX1zE4bZ2B5O6xGWmnNb/547rw7Gq 8D3IIAyl5llr7+/ X-Received: by 2002:a05:600c:4591:b0:480:4a4f:c363 with SMTP id 5b1f17b1804b1-482db45fc65mr65322665e9.9.1769846220789; Fri, 30 Jan 2026 23:57:00 -0800 (PST) Received: from FRSMI25-LASER.home (2a01cb001331aa00fa8b238ae1dd6dd8.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:fa8b:238a:e1dd:6dd8]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4806ce564f9sm258621475e9.14.2026.01.30.23.57.00 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 30 Jan 2026 23:57:00 -0800 (PST) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 10/22] glibc: stable 2.42 branch updates Date: Sat, 31 Jan 2026 08:56:21 +0100 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 31 Jan 2026 07:57:06 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/230215 From: Peter Marko git log --oneline e34453cd6a8c592c325756ff3c7ac0afd3975cb4..912d89a766847649a3857985a3b5e6065c51bfd4 912d89a766 (HEAD -> release/2.42/master, origin/release/2.42/master) Switch currency symbol for the bg_BG locale to euro cbf39c26b2 posix: Reset wordexp_t fields with WRDE_REUSE (CVE-2025-15281 / BZ 33814) 453e6b8dba resolv: Fix NSS DNS backend for getnetbyaddr (CVE-2026-0915) b0ec8fb689 memalign: reinstate alignment overflow check (CVE-2026-0861) f122d0b4d1 nptl: Optimize trylock for high cache contention workloads (BZ #33704) a1d3294a5b support: Exit on consistency check failure in resolv_response_add_name 8dfb84ad4e support: Fix FILE * leak in check_for_unshare_hints in test-container 2a0873aa81 sprof: fix -Wformat warnings on 32-bit hosts efdf4c0c87 sprof: check pread size and offset for overflow b11411fe2e posix: Fix invalid flags test for p{write,read}v2 8aaf4b732d ppc64le: Power 10 rawmemchr clobbers v20 (bug #33091) 2dbf973fe0 ppc64le: Restore optimized strncmp for power10 6b2957cfe8 ppc64le: Restore optimized strcmp for power10 828b8d23f3 AArch64: Fix and improve SVE pow(f) special cases 710d7a2e83 AArch64: fix SVE tanpi(f) [BZ #33642] 0c9430ed97 AArch64: Fix instability in AdvSIMD sinh ec041b1f53 AArch64: Fix instability in AdvSIMD tan 97297120ce AArch64: Optimise SVE scalar callbacks 17c3eab387 aarch64: fix includes in SME tests de1fe81f47 aarch64: fix cfi directives around __libc_arm_za_disable bf499c2a49 x86: fix wmemset ifunc stray '!' (bug 33542) 71874f167a aarch64: tests for SME 256030b984 aarch64: clear ZA state of SME before clone and clone3 syscalls 6de12fc9ad aarch64: define macro for calling __libc_arm_za_disable ab8c1b5d62 x86: Detect Intel Nova Lake Processor bf48b17a28 x86: Detect Intel Wildcat Lake Processor 18fd689cdc nptl: Fix MADV_GUARD_INSTALL logic for thread without guard page (BZ 33356) 46b4e37c9e nss: Group merge does not react to ERANGE during merge (bug 33361) 1166170d95 libio: Define AT_RENAME_* with the same tokens as Linux Testing Results: Before After Diff PASS 6809 6815 +6 XPASS 4 4 0 FAIL 180 173 -7 XFAIL 16 16 0 UNSUPPORTED 129 129 0 Changes in failed testcases: testcase-name before after malloc/tst-malloc_info FAIL PASS malloc/tst-malloc-too-large FAIL PASS malloc/tst-malloc-too-large-malloc-check FAIL PASS malloc/tst-malloc-too-large-malloc-hugetlb1 FAIL PASS malloc/tst-malloc-too-large-malloc-largetcache FAIL PASS malloc/tst-malloc-too-large-mcheck FAIL PASS nptl/tst-robustpi7 FAIL PASS posix/tst-wait3 FAIL PASS stdio-common/tst-read-offset PASS FAIL Signed-off-by: Peter Marko Signed-off-by: Yoann Congal --- meta/recipes-core/glibc/glibc-version.inc | 2 +- meta/recipes-core/glibc/glibc_2.42.bb | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/meta/recipes-core/glibc/glibc-version.inc b/meta/recipes-core/glibc/glibc-version.inc index a3ce970c29c..9991c024953 100644 --- a/meta/recipes-core/glibc/glibc-version.inc +++ b/meta/recipes-core/glibc/glibc-version.inc @@ -1,6 +1,6 @@ SRCBRANCH ?= "release/2.42/master" PV = "2.42+git" -SRCREV_glibc ?= "e34453cd6a8c592c325756ff3c7ac0afd3975cb4" +SRCREV_glibc ?= "912d89a766847649a3857985a3b5e6065c51bfd4" SRCREV_localedef ?= "cba02c503d7c853a38ccfb83c57e343ca5ecd7e5" GLIBC_GIT_URI ?= "git://sourceware.org/git/glibc.git;protocol=https" diff --git a/meta/recipes-core/glibc/glibc_2.42.bb b/meta/recipes-core/glibc/glibc_2.42.bb index f9c1cdc2f14..a8717c0eae2 100644 --- a/meta/recipes-core/glibc/glibc_2.42.bb +++ b/meta/recipes-core/glibc/glibc_2.42.bb @@ -17,7 +17,7 @@ Allows for ASLR bypass so can bypass some hardening, not an exploit in itself, m easier access for another. 'ASLR bypass itself is not a vulnerability.'" CVE_STATUS_GROUPS += "CVE_STATUS_STABLE_BACKPORTS" -CVE_STATUS_STABLE_BACKPORTS = "" +CVE_STATUS_STABLE_BACKPORTS = "CVE-2025-15281 CVE-2026-0861 CVE-2026-0915" CVE_STATUS_STABLE_BACKPORTS[status] = "cpe-stable-backport: fix available in used git hash" DEPENDS += "gperf-native bison-native" From patchwork Sat Jan 31 07:56:22 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 80118 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 274BDD79750 for ; Sat, 31 Jan 2026 07:57:06 +0000 (UTC) Received: from mail-wm1-f44.google.com (mail-wm1-f44.google.com [209.85.128.44]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.5107.1769846223191708592 for ; Fri, 30 Jan 2026 23:57:03 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=DvhbyuHP; spf=pass (domain: smile.fr, ip: 209.85.128.44, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f44.google.com with SMTP id 5b1f17b1804b1-480706554beso30111975e9.1 for ; Fri, 30 Jan 2026 23:57:02 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1769846221; x=1770451021; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=Bz44zv+pt6Hea2jqAr65Uw/S1kseLGyTuZXhTPDdp10=; b=DvhbyuHPikJ7EDxmy2e2SctInRd9lRoWHYr2ctnvTeIULciLQI1JeSsSY57mfE8iLu jVl51d3AtfXGNIs3X2twTjULK6k7IcYWJp+H+pAd8dFXBkdHmNBTzLJd+MdB7Fj6bTwc IM++3NQ2e8k7f7numxQXZqeHLmxu/dX0wrUAo= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1769846221; x=1770451021; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=Bz44zv+pt6Hea2jqAr65Uw/S1kseLGyTuZXhTPDdp10=; b=MSpNjejb+WulHUng//UncyofZuxlfIzi2HQ1B8FOwTvkcXgF/ko+A4fLRFdpFhKLBe i+p77M2yLi+AjQPezHCdGXlNbHaoGgVk0BY0EF/sfofVMoXlCNtvcBa0B3vJRaDNNagI 1RRVi99fY9v72dKV2isN4p3vTdav4ZKOnHrs95pdfmliDvpawicUoFZ1ovhb+rPGtLsi y2/4h8M/KIFnAmppgie8tD1rHfF55rexOkNnlBWqE0J+jVWhxQPJS4y+H85cC3Ie2s+9 0ve6MEpwGZhaVPL5rPSJXkXELnlOEUpv3krgVBVX235xTXFloQYU2k2W1KZi1963OtrC 1o0w== X-Gm-Message-State: AOJu0YwlaMrJ2ojL6mL0cQJkQ8uRw8ghXVItqKh1FG9p6QVvF0xZpuKy bFiO37W/2ciqzspZ3U8mPOxkF42R5SX7ou9QlsK06Y/8wH3rL7Wbfq3Y8Tc1f8azcSBXosxm7k+ Yp3AFWaQ= X-Gm-Gg: AZuq6aI+KMzzaEykDHb0EGwAt0vvX15gImgtb49L2l2WObMrItLqGmdZYjzAbAVrqrz TencyDt/cfcHADlVtwg7xBOAUjgVF4/j0QGrKbLMH+Ja8dWweNpjFlP3hVA1q13cFvDth2kzCxu HKwPJaL4+h6PHHMYQOKDjl5YEclQwIwlEsOsZ6IzmFBLO9sKDNQ+ZBg1KZpH7RbPCLl90LBMGow KZWZ7MXiDhPGaTsAIiAcL0hLPAU5QWNQmxBfPLDr31kHmDUe64w0ZsSC1AV5l9OkfWVNlTQdual iBbrCohHBdCttHa6fwWPuPomyxfjRx5xCZEqhfbU1B2ZJXnYCRs9hMPpFGteS1EpRnVX+RMzfvy couMd/dJrMqH8WbbB6D46wV0X/Yo03l6/BznUfAccZCy9lZat0GFNVpkwCoKMDk4b+lTsLn1NfG 5L//BJp+ZGa/HNSiZCTIGagkOKs54L1ReXleynL0ZQqm+fLU/pN24r6CUffr3CFN8V22uehoIIV pSrv8UesbARCM35 X-Received: by 2002:a05:600c:64c6:b0:477:5ad9:6df1 with SMTP id 5b1f17b1804b1-482db4593a1mr66099415e9.3.1769846221294; Fri, 30 Jan 2026 23:57:01 -0800 (PST) Received: from FRSMI25-LASER.home (2a01cb001331aa00fa8b238ae1dd6dd8.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:fa8b:238a:e1dd:6dd8]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4806ce564f9sm258621475e9.14.2026.01.30.23.57.00 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 30 Jan 2026 23:57:00 -0800 (PST) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 11/22] expat: patch CVE-2026-24515 Date: Sat, 31 Jan 2026 08:56:22 +0100 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 31 Jan 2026 07:57:06 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/230216 From: Peter Marko Pick commits from PR linked in NVD report. Signed-off-by: Peter Marko Signed-off-by: Yoann Congal --- .../expat/expat/CVE-2026-24515-01.patch | 43 +++++++ .../expat/expat/CVE-2026-24515-02.patch | 117 ++++++++++++++++++ meta/recipes-core/expat/expat_2.7.3.bb | 2 + 3 files changed, 162 insertions(+) create mode 100644 meta/recipes-core/expat/expat/CVE-2026-24515-01.patch create mode 100644 meta/recipes-core/expat/expat/CVE-2026-24515-02.patch diff --git a/meta/recipes-core/expat/expat/CVE-2026-24515-01.patch b/meta/recipes-core/expat/expat/CVE-2026-24515-01.patch new file mode 100644 index 00000000000..c61e49aefdd --- /dev/null +++ b/meta/recipes-core/expat/expat/CVE-2026-24515-01.patch @@ -0,0 +1,43 @@ +From 86fc914a7acc49246d5fde0ab6ed97eb8a0f15f9 Mon Sep 17 00:00:00 2001 +From: Sebastian Pipping +Date: Sun, 18 Jan 2026 17:53:37 +0100 +Subject: [PATCH] lib: Make XML_ExternalEntityParserCreate copy unknown + encoding handler user data + +Patch suggested by Artiphishell Inc. + +CVE: CVE-2026-24515 +Upstream-Status: Backport [https://github.com/libexpat/libexpat/commit/86fc914a7acc49246d5fde0ab6ed97eb8a0f15f9] +Signed-off-by: Peter Marko +--- + expat/lib/xmlparse.c | 3 +++ + 1 file changed, 3 insertions(+) + +diff --git a/lib/xmlparse.c b/lib/xmlparse.c +index 593cd90d..18577ee3 100644 +--- a/lib/xmlparse.c ++++ b/lib/xmlparse.c +@@ -1754,6 +1754,7 @@ XML_ExternalEntityParserCreate(XML_Parser oldParser, const XML_Char *context, + XML_ExternalEntityRefHandler oldExternalEntityRefHandler; + XML_SkippedEntityHandler oldSkippedEntityHandler; + XML_UnknownEncodingHandler oldUnknownEncodingHandler; ++ void *oldUnknownEncodingHandlerData; + XML_ElementDeclHandler oldElementDeclHandler; + XML_AttlistDeclHandler oldAttlistDeclHandler; + XML_EntityDeclHandler oldEntityDeclHandler; +@@ -1799,6 +1800,7 @@ XML_ExternalEntityParserCreate(XML_Parser oldParser, const XML_Char *context, + oldExternalEntityRefHandler = parser->m_externalEntityRefHandler; + oldSkippedEntityHandler = parser->m_skippedEntityHandler; + oldUnknownEncodingHandler = parser->m_unknownEncodingHandler; ++ oldUnknownEncodingHandlerData = parser->m_unknownEncodingHandlerData; + oldElementDeclHandler = parser->m_elementDeclHandler; + oldAttlistDeclHandler = parser->m_attlistDeclHandler; + oldEntityDeclHandler = parser->m_entityDeclHandler; +@@ -1859,6 +1861,7 @@ XML_ExternalEntityParserCreate(XML_Parser oldParser, const XML_Char *context, + parser->m_externalEntityRefHandler = oldExternalEntityRefHandler; + parser->m_skippedEntityHandler = oldSkippedEntityHandler; + parser->m_unknownEncodingHandler = oldUnknownEncodingHandler; ++ parser->m_unknownEncodingHandlerData = oldUnknownEncodingHandlerData; + parser->m_elementDeclHandler = oldElementDeclHandler; + parser->m_attlistDeclHandler = oldAttlistDeclHandler; + parser->m_entityDeclHandler = oldEntityDeclHandler; diff --git a/meta/recipes-core/expat/expat/CVE-2026-24515-02.patch b/meta/recipes-core/expat/expat/CVE-2026-24515-02.patch new file mode 100644 index 00000000000..b160f4f343e --- /dev/null +++ b/meta/recipes-core/expat/expat/CVE-2026-24515-02.patch @@ -0,0 +1,117 @@ +From 8efea3e255d55c7e0a5b70b226f4652ab00e1a27 Mon Sep 17 00:00:00 2001 +From: Sebastian Pipping +Date: Sun, 18 Jan 2026 17:26:31 +0100 +Subject: [PATCH] tests: Cover effect of XML_SetUnknownEncodingHandler user + data + +CVE: CVE-2026-24515 +Upstream-Status: Backport [https://github.com/libexpat/libexpat/commit/8efea3e255d55c7e0a5b70b226f4652ab00e1a27] +Signed-off-by: Peter Marko +--- + tests/basic_tests.c | 42 +++++++++++++++++++++++++++++++++++++++ + tests/handlers.c | 10 ++++++++++ + tests/handlers.h | 3 +++ + 3 files changed, 55 insertions(+) + +diff --git a/tests/basic_tests.c b/tests/basic_tests.c +index 0231e094..0ed98d86 100644 +--- a/tests/basic_tests.c ++++ b/tests/basic_tests.c +@@ -4570,6 +4570,46 @@ START_TEST(test_unknown_encoding_invalid_attr_value) { + } + END_TEST + ++START_TEST(test_unknown_encoding_user_data_primary) { ++ // This test is based on ideas contributed by Artiphishell Inc. ++ const char *const text = "\n" ++ "\n"; ++ XML_Parser parser = XML_ParserCreate(NULL); ++ XML_SetUnknownEncodingHandler(parser, ++ user_data_checking_unknown_encoding_handler, ++ (void *)(intptr_t)0xC0FFEE); ++ ++ assert_true(_XML_Parse_SINGLE_BYTES(parser, text, (int)strlen(text), XML_TRUE) ++ == XML_STATUS_OK); ++ ++ XML_ParserFree(parser); ++} ++END_TEST ++ ++START_TEST(test_unknown_encoding_user_data_secondary) { ++ // This test is based on ideas contributed by Artiphishell Inc. ++ const char *const text_main = "\n" ++ "]>\n" ++ "&ext;\n"; ++ const char *const text_external = "\n" ++ "data"; ++ ExtTest2 test_data = {text_external, (int)strlen(text_external), NULL, NULL}; ++ XML_Parser parser = XML_ParserCreate(NULL); ++ XML_SetExternalEntityRefHandler(parser, external_entity_loader2); ++ XML_SetUnknownEncodingHandler(parser, ++ user_data_checking_unknown_encoding_handler, ++ (void *)(intptr_t)0xC0FFEE); ++ XML_SetUserData(parser, &test_data); ++ ++ assert_true(_XML_Parse_SINGLE_BYTES(parser, text_main, (int)strlen(text_main), ++ XML_TRUE) ++ == XML_STATUS_OK); ++ ++ XML_ParserFree(parser); ++} ++END_TEST ++ + /* Test an external entity parser set to use latin-1 detects UTF-16 + * BOMs correctly. + */ +@@ -6416,6 +6456,8 @@ make_basic_test_case(Suite *s) { + tcase_add_test(tc_basic, test_unknown_encoding_invalid_surrogate); + tcase_add_test(tc_basic, test_unknown_encoding_invalid_high); + tcase_add_test(tc_basic, test_unknown_encoding_invalid_attr_value); ++ tcase_add_test(tc_basic, test_unknown_encoding_user_data_primary); ++ tcase_add_test(tc_basic, test_unknown_encoding_user_data_secondary); + tcase_add_test__if_xml_ge(tc_basic, test_ext_entity_latin1_utf16le_bom); + tcase_add_test__if_xml_ge(tc_basic, test_ext_entity_latin1_utf16be_bom); + tcase_add_test__if_xml_ge(tc_basic, test_ext_entity_latin1_utf16le_bom2); +diff --git a/tests/handlers.c b/tests/handlers.c +index 5bca2b1f..d077f688 100644 +--- a/tests/handlers.c ++++ b/tests/handlers.c +@@ -45,6 +45,7 @@ + # undef NDEBUG /* because test suite relies on assert(...) at the moment */ + #endif + ++#include + #include + #include + #include +@@ -407,6 +408,15 @@ long_encoding_handler(void *userData, const XML_Char *encoding, + return XML_STATUS_OK; + } + ++int XMLCALL ++user_data_checking_unknown_encoding_handler(void *userData, ++ const XML_Char *encoding, ++ XML_Encoding *info) { ++ const intptr_t number = (intptr_t)userData; ++ assert_true(number == 0xC0FFEE); ++ return long_encoding_handler(userData, encoding, info); ++} ++ + /* External Entity Handlers */ + + int XMLCALL +diff --git a/tests/handlers.h b/tests/handlers.h +index fa6267fb..915040e5 100644 +--- a/tests/handlers.h ++++ b/tests/handlers.h +@@ -159,6 +159,9 @@ extern int XMLCALL long_encoding_handler(void *userData, + const XML_Char *encoding, + XML_Encoding *info); + ++extern int XMLCALL user_data_checking_unknown_encoding_handler( ++ void *userData, const XML_Char *encoding, XML_Encoding *info); ++ + /* External Entity Handlers */ + + typedef struct ExtOption { diff --git a/meta/recipes-core/expat/expat_2.7.3.bb b/meta/recipes-core/expat/expat_2.7.3.bb index 069254e13c3..12ca9b004d2 100644 --- a/meta/recipes-core/expat/expat_2.7.3.bb +++ b/meta/recipes-core/expat/expat_2.7.3.bb @@ -10,6 +10,8 @@ VERSION_TAG = "${@d.getVar('PV').replace('.', '_')}" SRC_URI = "${GITHUB_BASE_URI}/download/R_${VERSION_TAG}/expat-${PV}.tar.bz2 \ file://run-ptest \ + file://CVE-2026-24515-01.patch \ + file://CVE-2026-24515-02.patch \ " GITHUB_BASE_URI = "https://github.com/libexpat/libexpat/releases/" From patchwork Sat Jan 31 07:56:23 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 80116 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 442C7D79757 for ; Sat, 31 Jan 2026 07:57:06 +0000 (UTC) Received: from mail-wm1-f53.google.com (mail-wm1-f53.google.com [209.85.128.53]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.5006.1769846223726120003 for ; Fri, 30 Jan 2026 23:57:04 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=Fin1GMsN; spf=pass (domain: smile.fr, ip: 209.85.128.53, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f53.google.com with SMTP id 5b1f17b1804b1-47ee76e8656so37244115e9.0 for ; Fri, 30 Jan 2026 23:57:03 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1769846222; x=1770451022; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=016UgcrQEnkfxPTSBwfKcMxCE2gb98knx2wPC15YzEg=; b=Fin1GMsN5fGnNYteHfOySDR9Z8MOcHGbFoj1trMQWxly4EBmL477HBAGbYx5oAi3cl /tASJtP0+xD3X8fbDkOJu6LSXDcI8BOsvXDuLHav+USTfCk97c7MNEvestD63CHgkStG UiKWPEUOuxTDuInABVwbsgIX3WddbK/k8jbAM= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1769846222; x=1770451022; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=016UgcrQEnkfxPTSBwfKcMxCE2gb98knx2wPC15YzEg=; b=DOR4s87X4T2sC9bbAI2NqbvgzOlDK4UCKxVM4P4PmKBFDIYEuuxisuPSSA+lzbOcE5 k67dgSQKF5+HeEAn81/5URlNRqlSvjnCgnPgcRu0XqS6fKdjWLTr23TsAu1QTbvOrJ52 rAlpuDa4hDAXOMl9eGmFbk1Pw8HqpaETGqCF7TzIGoDDsPqIG+3aLE7OvazT3pbsqIDp Ddv5bQMoVkB9Gf0S6AklSAypD/2Ic7ypu4niu/towLZOyi6x+B2T8Ujy5tysOaX6rNwI T98cl3T6bCZupCNj/1P0q5VH9C9V11V0G7q26fRwchZWEj8Mh01UFbI3U8DgqA3lYIf/ 9TZg== X-Gm-Message-State: AOJu0YwjuffNxcJYAM0bNIxFRm84sb1GhkzqUCzC7Y38UoGrtOLBrD2M GXOFIYj6hiKF935ANylQ6DH5AZamvajFUJxoXqfd345Mj3LrTl+DkSeVYn/VUjWbbfj/oYz8v0Q cKigz4kw= X-Gm-Gg: AZuq6aIvN2ReQK4F7o3oBWML6aGPiSdGgk4JrDAPU9LjAWbQere50u91bF6PWGYVxzY 0eMYc2BYMwJAzt7pNhF6sOrAd9KCy34q0PUoVlbFuCXD2Y2tGRXIkwScYP5MnOp8QIz4+W4SZOL Lm6teA2pVmp5C8Tv3QkLJQo2i4/Wsz82eWhhVwcJzMCIj2hqLo4GA1479e5ON/hWsYj/W+F3Zs4 O4PPfaxutsf3/f7eQX4ziC6Evf6738SICBv3oyYChotEkqdPF3OLKl2MUoYvSujwD4ggg/KksbF JjAQ0jePwd6yhesjNB3MFQJnAYA2v+wOi7O3akQsgeUVXH8wQ0DGSWukIHKvk7WKcuoKMcZwKa6 JzrZH9VTCY40hIhBd8TuMU+nyL1TBMZs6yY559st2FB4XiXv9wHahiq/R0ReRWbk77HQXB04gqz bRheK+G87AObteRJnoEWTXNYRSipXJgWA2jA6MV+kUyxDiMPrsFw0dUYIa2hT2BIgEiC6skrsWj lVitILTagClF0a6 X-Received: by 2002:a05:600c:1f14:b0:480:4a90:1af2 with SMTP id 5b1f17b1804b1-482db4a5f2amr81438665e9.35.1769846221832; Fri, 30 Jan 2026 23:57:01 -0800 (PST) Received: from FRSMI25-LASER.home (2a01cb001331aa00fa8b238ae1dd6dd8.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:fa8b:238a:e1dd:6dd8]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4806ce564f9sm258621475e9.14.2026.01.30.23.57.01 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 30 Jan 2026 23:57:01 -0800 (PST) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 12/22] pseudo: Update to 1.9.3 release Date: Sat, 31 Jan 2026 08:56:23 +0100 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 31 Jan 2026 07:57:06 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/230217 From: Richard Purdie Pulls in the following changes: Makefile.in: Bump version to 1.9.3 configure: Minor code quality changes pseudo: code quality scan - resolved various potential issues makewrappers: improve error handling and robustness Update COPYRIGHT files ports/linux/pseudo_wrappers.c: Call the wrappers where possible ports/linux/pseudo_wrappers.c: Workaround compile error on Debian 11 ports/linux/pseudo_wrappers.c: Reorder the syscall operations ports/unix/guts/realpath.c: Fix indents pseudo_util.c: Skip realpath like expansion for /proc on Linux test/test-proc-pipe.sh: Add test case for proc pipes ports/unix/guts/realpath.c: realpath fails if the resolved path doesn't exist Signed-off-by: Richard Purdie Signed-off-by: Antonin Godard Signed-off-by: Richard Purdie (cherry picked from commit 524f4bbb11f9c7e0126e8bd46af217b452d48f5e) Signed-off-by: Yoann Congal --- meta/recipes-devtools/pseudo/pseudo_git.bb | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/meta/recipes-devtools/pseudo/pseudo_git.bb b/meta/recipes-devtools/pseudo/pseudo_git.bb index 19b0d29b718..ed1e8fb3e01 100644 --- a/meta/recipes-devtools/pseudo/pseudo_git.bb +++ b/meta/recipes-devtools/pseudo/pseudo_git.bb @@ -12,8 +12,8 @@ SRC_URI:append:class-nativesdk = " \ file://older-glibc-symbols.patch" SRC_URI[prebuilt.sha256sum] = "ed9f456856e9d86359f169f46a70ad7be4190d6040282b84c8d97b99072485aa" -SRCREV = "125b020dd2bc46baa37a80784704e382732357b4" -PV = "1.9.2+git" +SRCREV = "750362cc7b9fa58dffccd95d919b435c6d8ac614" +PV = "1.9.3+git" # largefile and 64bit time_t support adds these macros via compiler flags globally # remove them for pseudo since pseudo intercepts some of the functions which will be From patchwork Sat Jan 31 07:56:24 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 80121 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 46C8DD79752 for ; Sat, 31 Jan 2026 07:57:06 +0000 (UTC) Received: from mail-wm1-f50.google.com (mail-wm1-f50.google.com [209.85.128.50]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.5008.1769846224862344642 for ; Fri, 30 Jan 2026 23:57:05 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=W1VytMiM; spf=pass (domain: smile.fr, ip: 209.85.128.50, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f50.google.com with SMTP id 5b1f17b1804b1-4806dffc64cso20861365e9.1 for ; Fri, 30 Jan 2026 23:57:04 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1769846223; x=1770451023; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=b1570IQrm1P7aI/T6XIpQkLKtHEd8pBTaDCpGRxzrEs=; b=W1VytMiMtDuyjt/N+vVK3dsNRFfCU/F5Ng/MZnY4MGerZAz//ft6IoHJvUY35qhSOn g2+vmXKHErv/KRAUmeTfandrQskORZC6iwtGidYMcF49r4f4tENqhi9OxnOkGj6ZFfWl 4r8e1hqEgBMeTuMjDt3Bfik1oqF191j7b69oY= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1769846223; x=1770451023; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=b1570IQrm1P7aI/T6XIpQkLKtHEd8pBTaDCpGRxzrEs=; b=gFhajlPaioqgCiWYsKEH3SrJg1XGoGuadtxGilwfyM7cLMBPqF2kPfhUXINt6kSGgT J2nxOId7+hSFIL90lrgitXne2oeDrnV7TqgNBOn5dL4yv38DFMq6GJ6KQ9IWE22ZpoBE oqkiuKKz8aVMJt3ZmJAqBmJCFPMbglRid8MaIQ5mED7eO5gMN7ZmRJeXYJoDznCV/wn+ AaT0eyowKSkiB+jEd9hKcf133Eg+ApbGixGnic0FW/+vlZYpip+UGZtx/CK+htnkZ6MQ RJishNKXJX5oX0V4YNok1uPqA0JSaW61w+4ghB1fxFAou2WZ51bu2Cj83dBZ2qvcUO+4 Ts+Q== X-Gm-Message-State: AOJu0YxC33uOfN5vMjUQaJEfSssq192XvyIaBFEJdbApjBnyuhphXBbT 3sgMdGmGDPwWbfBQoKeXdi/lyjoD1Go9xHI54eox7z2YIy02oYv2g9pBvMrnI9NvQlETbQJH3Vk KjxDFb5c= X-Gm-Gg: AZuq6aKlo6xQpbDxcwNv/MR7ffiysJeHAuJk2a9+k4i9QzAt8vBkrP3g4f3nnBg/ErM RSruNqww991tLHywK051f7xnxAGIyS+p4c9nWYiZf2Q4PcGgkxmsS03WmkPLeIEKXywYeM7rb/t hoyCRuWA98crTaDt+EZC4SnoyfSNGYISdoElmadp8MeCiVsDxnKk0pINPX+KZe547qNFsWuWx9G vKVb5vHOD0jJW78sA/gO00znFQzItfKeOagFwPdiZX6PDi4duSpdbqhGii8bjmFJIIJBOtZx/tG UdfydvCBuH6j01x20bcrgu+oEekN+ZVvVz44XM6E35eL0c1s17TOMsKo4aW0i06aJbeQi29j11l 4Rl/HjncNwwXjuboAViu0yo/Mzgot+S0yjOPMk3WnXjyYj+s/BSsi5gw8Q3EtzVV9vJSFIuiNO1 if8JBPVYJOJ6C6VpYCXSdOsdkwpagNy5BlxDwyTO1O3DytwX1KBcsVJGBh813HPqYojJwxDyj84 cwYWl1H86q1ltaC X-Received: by 2002:a05:600c:8b02:b0:47e:e78a:c833 with SMTP id 5b1f17b1804b1-482db4a51d8mr60763055e9.32.1769846222860; Fri, 30 Jan 2026 23:57:02 -0800 (PST) Received: from FRSMI25-LASER.home (2a01cb001331aa00fa8b238ae1dd6dd8.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:fa8b:238a:e1dd:6dd8]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4806ce564f9sm258621475e9.14.2026.01.30.23.57.01 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 30 Jan 2026 23:57:02 -0800 (PST) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 13/22] dpkg: Fix ADMINDIR Date: Sat, 31 Jan 2026 08:56:24 +0100 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 31 Jan 2026 07:57:06 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/230218 From: Mark Hatle dpkg has a hard coded path (from build time) for the ADMINDIR, for some reason the "set_root" function was using this hard coded value instead of the value from apt.conf or the environment. Follow the example of db_dir.c and use the environment if set. Adjust the matching oe package_manager functions to set the ADMINDIR, even though the apt.conf sets --admindir. Note it's unclear if the --admindir value that is set is reasonable or not. Signed-off-by: Mark Hatle [AG: add Upstream-Status - Submitted to patch] Signed-off-by: Antonin Godard Signed-off-by: Richard Purdie (cherry picked from commit 22c3ebacd3c21d1caf9fddb0f7f4ff06c7728d3a) Signed-off-by: Yoann Congal --- meta/lib/oe/package_manager/deb/__init__.py | 4 ++ ...-dirs.c-set_rootfs-was-not-checking-.patch | 46 +++++++++++++++++++ meta/recipes-devtools/dpkg/dpkg_1.22.21.bb | 1 + 3 files changed, 51 insertions(+) create mode 100644 meta/recipes-devtools/dpkg/dpkg/0001-lib-dpkg-options-dirs.c-set_rootfs-was-not-checking-.patch diff --git a/meta/lib/oe/package_manager/deb/__init__.py b/meta/lib/oe/package_manager/deb/__init__.py index eb48f3f9822..cdb58bee101 100644 --- a/meta/lib/oe/package_manager/deb/__init__.py +++ b/meta/lib/oe/package_manager/deb/__init__.py @@ -213,6 +213,7 @@ class DpkgPM(OpkgDpkgPM): def update(self): os.environ['APT_CONFIG'] = self.apt_conf_file + os.environ['DPKG_ADMINDIR'] = '/var/lib/dpkg' self.deploy_dir_lock() @@ -231,6 +232,7 @@ class DpkgPM(OpkgDpkgPM): return os.environ['APT_CONFIG'] = self.apt_conf_file + os.environ['DPKG_ADMINDIR'] = '/var/lib/dpkg' extra_args = "" if hard_depends_only: @@ -282,6 +284,7 @@ class DpkgPM(OpkgDpkgPM): os.environ['IPKG_OFFLINE_ROOT'] = self.target_rootfs os.environ['OPKG_OFFLINE_ROOT'] = self.target_rootfs os.environ['INTERCEPT_DIR'] = self.intercepts_dir + os.environ['DPKG_ADMINDIR'] = '/var/lib/dpkg' if with_dependencies: os.environ['APT_CONFIG'] = self.apt_conf_file @@ -424,6 +427,7 @@ class DpkgPM(OpkgDpkgPM): def fix_broken_dependencies(self): os.environ['APT_CONFIG'] = self.apt_conf_file + os.environ['DPKG_ADMINDIR'] = '/var/lib/dpkg' cmd = "%s %s --allow-unauthenticated -f install" % (self.apt_get_cmd, self.apt_args) diff --git a/meta/recipes-devtools/dpkg/dpkg/0001-lib-dpkg-options-dirs.c-set_rootfs-was-not-checking-.patch b/meta/recipes-devtools/dpkg/dpkg/0001-lib-dpkg-options-dirs.c-set_rootfs-was-not-checking-.patch new file mode 100644 index 00000000000..34060c74634 --- /dev/null +++ b/meta/recipes-devtools/dpkg/dpkg/0001-lib-dpkg-options-dirs.c-set_rootfs-was-not-checking-.patch @@ -0,0 +1,46 @@ +From c036cfa1ee53a900b4ed45bc91e45a0792547eea Mon Sep 17 00:00:00 2001 +From: Mark Hatle +Date: Sat, 17 Jan 2026 20:20:23 +0000 +Subject: [PATCH] lib/dpkg/options-dirs.c: set_rootfs was not checking + environment + +The set_rootfs function was using the hardcoded ADMINDIR (define). It +should be checking the environment, and then falling back to the define +if not set. + +This matches the behavior in db_dir.c. + +Upstream-Status: Submitted [https://lists.debian.org/debian-dpkg/2026/01/maillist.html]] + +Signed-off-by: Mark Hatle +--- + lib/dpkg/options-dirs.c | 7 ++++++- + 1 file changed, 6 insertions(+), 1 deletion(-) + +diff --git a/lib/dpkg/options-dirs.c b/lib/dpkg/options-dirs.c +index 9b7a122fe..34869d792 100644 +--- a/lib/dpkg/options-dirs.c ++++ b/lib/dpkg/options-dirs.c +@@ -49,13 +49,18 @@ set_admindir(const struct cmdinfo *cip, const char *value) + void + set_root(const struct cmdinfo *cip, const char *value) + { ++ const char *env; + char *db_dir; + + /* Initialize the root directory. */ + dpkg_fsys_set_dir(value); + + /* Set the database directory based on the new root directory. */ +- db_dir = dpkg_fsys_get_path(ADMINDIR); ++ env = getenv("DPKG_ADMINDIR"); ++ if (env) ++ db_dir = dpkg_fsys_get_path(env); ++ else ++ db_dir = dpkg_fsys_get_path(ADMINDIR); + dpkg_db_set_dir(db_dir); + free(db_dir); + } +-- +2.30.2 + diff --git a/meta/recipes-devtools/dpkg/dpkg_1.22.21.bb b/meta/recipes-devtools/dpkg/dpkg_1.22.21.bb index d793c26d57a..20f98d5d2d3 100644 --- a/meta/recipes-devtools/dpkg/dpkg_1.22.21.bb +++ b/meta/recipes-devtools/dpkg/dpkg_1.22.21.bb @@ -14,6 +14,7 @@ SRC_URI = "git://salsa.debian.org/dpkg-team/dpkg.git;protocol=https;branch=1.22. file://0007-dpkg-deb-build.c-Remove-usage-of-clamp-mtime-in-tar.patch \ file://0001-dpkg-Support-muslx32-build.patch \ file://0001-Add-support-for-riscv32-CPU.patch \ + file://0001-lib-dpkg-options-dirs.c-set_rootfs-was-not-checking-.patch \ " SRC_URI:append:class-native = " file://0001-build.c-ignore-return-of-1-from-tar-cf.patch" From patchwork Sat Jan 31 07:56:25 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 80124 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6AA22D7975D for ; Sat, 31 Jan 2026 07:57:06 +0000 (UTC) Received: from mail-wr1-f51.google.com (mail-wr1-f51.google.com [209.85.221.51]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.5009.1769846225457944255 for ; Fri, 30 Jan 2026 23:57:05 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=DBZWf/Zo; spf=pass (domain: smile.fr, ip: 209.85.221.51, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f51.google.com with SMTP id ffacd0b85a97d-4327555464cso2070763f8f.1 for ; Fri, 30 Jan 2026 23:57:05 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1769846223; x=1770451023; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=1rvrEdw9rY3VIakIu2LZnyijy7NIiePsjtf6cb1WcQo=; b=DBZWf/ZoXxRg9EMmkq2Clh1tAdytLUJZ1VQkuJMwdxp4dQzZkT+eIR9V62pFj/8r41 6ENwfYrgleVJqpDG5YF2/W1mVmyLyLrBSqgDGhmiGdiyfBypuClSA9P/eIEQylbUx8n8 neOfkPz4GXk8YH9i5HFf0Kzrql7FPDBBqOM9c= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1769846223; x=1770451023; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=1rvrEdw9rY3VIakIu2LZnyijy7NIiePsjtf6cb1WcQo=; b=tABboT7iRGnb8VtlguSkaunWBRWSj9LKDjYexHTiNILxUmbAKHaiTz4hYKxuF/hB+Q 9jLtNyqXlXYKYYCswRvPocRMk3dB3vXB+4td1U2ca205FM+BrVWSV8WJNysBK8Ivf88T Nahy5Uri5xYolv+9B0EvdNON7pTH1kXXS5ExrGa+QYTc/kEbcevA9s20XYAdzJsn367+ STfTqRoar053Wg+sEz/gVemeIdUChGZpIUmltUIuDye70ai+y7B1qNuql6IOIwviY0Cm FDENEI/QUEIi+vw+azsiNtljneyGTiXVBuDuyrTthSBSL8XVCJxVoOJdkA80c5mmTlmg ujww== X-Gm-Message-State: AOJu0Yw24GAzR1TUZuRQVqIdYvK3NHjN6cizoZ5W442X9DHKp3RP42Dc J4fHdn/hlqOzNyrRYFY994RpjQpnVUb+awWbAoyXfR22+8yM6sCjmOeKw1UCYks+yjZdez3UJRx HBkCtJFQ= X-Gm-Gg: AZuq6aK1h8ARjvOHXv89RVO+w+JRqe2xH1OQ/RrHneDnAoB1WmpMkSeGutGl6OVM8fe K1wVFSpHDhZ4NHd8CErrtRG5nshh0luVm/RpPWcm12Y4grlIdejZFbr9kn43iYLVqL/txTSOV76 2wCaSsLVTRwryGYHVyoRjngYvtRndoOBegfQ1IqyzCVRFzNu1mHLp1wXbGyBBrgHHbzV2/eg8fz AASFZQ7xk0FmxAiu1pDWPlnZE/ASwzAlYyTKSPIM+u5565O3G3sqS55sWoJTrUNq9IAFcyQRpUc pXnuVI7qpaw45Cu3Q5joE5VnrZN44Tak/KUjKc11L0KKAW+3b8u+BaUeXcXHK83wU4sNT3S1+vU PYJ3V25NRaJTlLtd1EuGKh+3OyRBCOhdEetvBk2qQtWkclmoo09VnCSwcAzEb8H+DUjBm3HrIXM lSkTToFz5M/KTao5ReQGJ2pUTSKyTaE4am1+jY1q0vp3LZN72b6sdl2KZXveuoLRZg6HHOVE241 aYRcdxVMPQIcp7DXoiaazW5diQ= X-Received: by 2002:a05:600c:6206:b0:47e:e970:b4e4 with SMTP id 5b1f17b1804b1-482db48e90emr54900905e9.29.1769846223561; Fri, 30 Jan 2026 23:57:03 -0800 (PST) Received: from FRSMI25-LASER.home (2a01cb001331aa00fa8b238ae1dd6dd8.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:fa8b:238a:e1dd:6dd8]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4806ce564f9sm258621475e9.14.2026.01.30.23.57.02 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 30 Jan 2026 23:57:03 -0800 (PST) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 14/22] docbook-xml-dtd4: fix the fetching failure Date: Sat, 31 Jan 2026 08:56:25 +0100 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 31 Jan 2026 07:57:06 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/230219 From: Khai Dang Updating SRC_URI, the old archive url is deprecated. Signed-off-by: Khai Dang Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit c137d3637b6171fbd3bfd671a56096e7f2b3c318) Signed-off-by: Yoann Congal --- .../docbook-xml/docbook-xml-dtd4_4.5.bb | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/meta/recipes-devtools/docbook-xml/docbook-xml-dtd4_4.5.bb b/meta/recipes-devtools/docbook-xml/docbook-xml-dtd4_4.5.bb index 1148d536944..ea0861823d3 100644 --- a/meta/recipes-devtools/docbook-xml/docbook-xml-dtd4_4.5.bb +++ b/meta/recipes-devtools/docbook-xml/docbook-xml-dtd4_4.5.bb @@ -10,11 +10,11 @@ LIC_FILES_CHKSUM = "file://docbook-4.5/docbookx.dtd;beginline=15;endline=30;md5= file://LICENSE-OASIS;md5=b9ee6208caa6e66c68dfad6f31d73f92" # Install the latest 4.5 DTDs, and the previous releases for backward compatibility. -SRC_URI = "https://docbook.org/xml/4.1.2/docbkx412.zip;name=payload412;subdir=docbook-4.1.2 \ - https://docbook.org/xml/4.2/docbook-xml-4.2.zip;name=payload42;subdir=docbook-4.2 \ - https://docbook.org/xml/4.3/docbook-xml-4.3.zip;name=payload43;subdir=docbook-4.3 \ - https://docbook.org/xml/4.4/docbook-xml-4.4.zip;name=payload44;subdir=docbook-4.4 \ - https://docbook.org/xml/${PV}/docbook-xml-${PV}.zip;name=payloadPV;subdir=docbook-${PV} \ +SRC_URI = "https://archive.docbook.org/xml/4.1.2/docbkx412.zip;name=payload412;subdir=docbook-4.1.2 \ + https://archive.docbook.org/xml/4.2/docbook-xml-4.2.zip;name=payload42;subdir=docbook-4.2 \ + https://archive.docbook.org/xml/4.3/docbook-xml-4.3.zip;name=payload43;subdir=docbook-4.3 \ + https://archive.docbook.org/xml/4.4/docbook-xml-4.4.zip;name=payload44;subdir=docbook-4.4 \ + https://archive.docbook.org/xml/${PV}/docbook-xml-${PV}.zip;name=payloadPV;subdir=docbook-${PV} \ file://docbook-xml-update-catalog.xml.patch \ file://LICENSE-OASIS" From patchwork Sat Jan 31 07:56:26 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 80127 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6F90BD7974F for ; Sat, 31 Jan 2026 07:57:16 +0000 (UTC) Received: from mail-wm1-f43.google.com (mail-wm1-f43.google.com [209.85.128.43]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.5109.1769846226328579340 for ; Fri, 30 Jan 2026 23:57:06 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=xgCBzixN; spf=pass (domain: smile.fr, ip: 209.85.128.43, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f43.google.com with SMTP id 5b1f17b1804b1-47ee0291921so26018065e9.3 for ; Fri, 30 Jan 2026 23:57:06 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1769846224; x=1770451024; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=U0KODpdHhcP0Yoh9EFgBt15Uo3BuUvnUPqpD05BQusA=; b=xgCBzixNC95Bvxvo+XPqHFPVecq9L4UZxBCMwy8IyxDaVgE8plFDWZuLttwkx5PsNO Qxp/iIp0woWL08ROTLwDzCaq4IBe+yNec+Y45uk8+btjn+32lfenCU66gdAY4Zx0oNB0 vfA/ASYlr3xRB9KawKKUbSAKSl3toGeD5htn8= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1769846224; x=1770451024; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=U0KODpdHhcP0Yoh9EFgBt15Uo3BuUvnUPqpD05BQusA=; b=U1tQJR8g89FWdlFfrcuQkJWiFwxxFrygk1WaEz/g0yHF+W0uceeWwZU1sZUklPhBzI Kv7F4VeDwP0yQe3iGaw/HIsT0uDc6CG49Y7TXmcXTImhZmmBHpkcVspBEJg4KZFvhtIw PDcVDW7tJbfHwsK0n9TqpFjotLuJzUbXgKX+32R7Yeea3pk1pNk5qQrtr/QMWiZfHq8n NF/r6eV0xFksghfNp1AGqM2k3jHJyv/1M27c7+WVZ0noJBBAbq7ILA5B7ekrMBx+KfwG My9ZvMk6CUIlZ62S44JOQ6RHD+aVNWFHzmv4VwUn7VnkG4ZPfuCtnzmJ8ZOEn7Rqnhv6 ZExg== X-Gm-Message-State: AOJu0YxDnLbMsiP0LeEwWIXLiv+OBmotxo9GiSfInVnY4dc71pwgdnMC 7Zu9TUB4DqhsrqyzSBnjJ6V1F8IiSx1D8TzOF5YO+lfbxLFOb14hjPHTfVajnqc7nD/txB8iSoM dN632k7E= X-Gm-Gg: AZuq6aKL4nRdWEE0NwUROpDO3D5MeeTdaOTBzn2wKcwrd27zNEOWLriv/fIdahsvmq4 poFuBFxOgDrfitbz3D8M4arzjFHTg9ULY38uWj9rfgyZC9wrnFsWfJVbF0v/t7x4ew415sF9UPq 7C2KAC0lxiwAH5HIWhYhziyRfv09JNpVm6vawFUiWD8b7wyB8BS/KP9n/OiqPLRjWuzuQef7jOX 7lVuHgP8sqtmfGqbYRGX9GgXdbuavpB2j0gVEPZ7jMgnJAlQxnBejfv34LQwatF9uCNS+L7rM3K 8SYbKgtMeRx394FhjTDiZcT2tVBC8Ljo+VxcqQeJuDyV+xV4eOPktrMcL3nZmh+AfUwfIiEGEG8 RYUp9BgCO7NmX6DCy7ONb4yIMAD66J6BkL/9M4izZaXR2mYKRBaVrLt0PuV6sMBdBrK7GVALT5p +2QUNesJNKSXvka5FeZ/HZIHGgSPTKaeL4xEwEj4QtyZ1/uf+ssSQTACKNX6gIaPM4qBf3i9TTk rsQUK6mEP0aHPnf X-Received: by 2002:a05:600c:8b55:b0:47a:814c:eea1 with SMTP id 5b1f17b1804b1-482db4f2fb2mr66944235e9.35.1769846224100; Fri, 30 Jan 2026 23:57:04 -0800 (PST) Received: from FRSMI25-LASER.home (2a01cb001331aa00fa8b238ae1dd6dd8.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:fa8b:238a:e1dd:6dd8]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4806ce564f9sm258621475e9.14.2026.01.30.23.57.03 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 30 Jan 2026 23:57:03 -0800 (PST) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 15/22] dropbear: patch CVE-2025-14282 Date: Sat, 31 Jan 2026 08:56:26 +0100 Message-ID: <9adb3749e78f1c5602c4f2f22996b0aa29f0f444.1769845858.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 31 Jan 2026 07:57:16 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/230220 From: Peter Marko Pick commits from PRs per [1]. [1] https://security-tracker.debian.org/tracker/CVE-2025-14282 Signed-off-by: Peter Marko Signed-off-by: Yoann Congal --- .../dropbear/dropbear/CVE-2025-14282-01.patch | 280 +++++++++++++++++ .../dropbear/dropbear/CVE-2025-14282-02.patch | 97 ++++++ .../dropbear/dropbear/CVE-2025-14282-03.patch | 282 ++++++++++++++++++ .../dropbear/dropbear/CVE-2025-14282-04.patch | 72 +++++ .../dropbear/dropbear/CVE-2025-14282-05.patch | 46 +++ .../recipes-core/dropbear/dropbear_2025.88.bb | 5 + 6 files changed, 782 insertions(+) create mode 100644 meta/recipes-core/dropbear/dropbear/CVE-2025-14282-01.patch create mode 100644 meta/recipes-core/dropbear/dropbear/CVE-2025-14282-02.patch create mode 100644 meta/recipes-core/dropbear/dropbear/CVE-2025-14282-03.patch create mode 100644 meta/recipes-core/dropbear/dropbear/CVE-2025-14282-04.patch create mode 100644 meta/recipes-core/dropbear/dropbear/CVE-2025-14282-05.patch diff --git a/meta/recipes-core/dropbear/dropbear/CVE-2025-14282-01.patch b/meta/recipes-core/dropbear/dropbear/CVE-2025-14282-01.patch new file mode 100644 index 00000000000..33b871620fe --- /dev/null +++ b/meta/recipes-core/dropbear/dropbear/CVE-2025-14282-01.patch @@ -0,0 +1,280 @@ +From e0251be2354e1a5c6eccfc2cf4b64243625dafcc Mon Sep 17 00:00:00 2001 +From: Matt Johnston +Date: Tue, 9 Dec 2025 15:08:06 +0900 +Subject: [PATCH] Drop privileges after user authentication + +Instead of switching user privileges after forking to a shell, switch +to the user immediately upon successful authentication. + +This will require further commits to fix utmp and hostkey handling. + +The DROPBEAR_SVR_DROP_PRIVS configuration option controls this +behaviour. This should generally be enabled, but can be set to 0 for +incompatible platforms. In future it may become non-optional, those +platforms should be investigated. + +Most uses of DROPBEAR_SVR_MULTIUSER have been replaced by +!DROPBEAR_SVR_DROP_PRIVS. + +CVE: CVE-2025-14282 +Upstream-Status: Backport [https://github.com/mkj/dropbear/commit/e0251be2354e1a5c6eccfc2cf4b64243625dafcc] +Signed-off-by: Peter Marko +--- + .github/workflows/build.yml | 2 ++ + src/auth.h | 1 + + src/default_options.h | 6 +++++ + src/svr-agentfwd.c | 14 ++++++++---- + src/svr-auth.c | 45 +++++++++++++++++++++++++++++++++++++ + src/svr-authpubkey.c | 6 +++-- + src/svr-chansession.c | 26 ++------------------- + src/sysoptions.h | 3 +++ + 8 files changed, 73 insertions(+), 30 deletions(-) + +diff --git a/.github/workflows/build.yml b/.github/workflows/build.yml +index 61e64a1..5c07d28 100644 +--- a/.github/workflows/build.yml ++++ b/.github/workflows/build.yml +@@ -227,6 +227,8 @@ jobs: + echo "#define DROPBEAR_SVR_PASSWORD_AUTH 0" >> localoptions.h + # 1 second timeout is too short + sed -i "s/DEFAULT_IDLE_TIMEOUT 1/DEFAULT_IDLE_TIMEOUT 99/" localoptions.h ++ # DROPBEAR_SVR_DROP_PRIVS is on by default, turn it off ++ echo "#define DROPBEAR_SVR_DROP_PRIVS 0" >> localoptions.h + + - name: make + run: | +diff --git a/src/auth.h b/src/auth.h +index 0e854fb..096d23d 100644 +--- a/src/auth.h ++++ b/src/auth.h +@@ -40,6 +40,7 @@ void send_msg_userauth_banner(const buffer *msg); + void svr_auth_password(int valid_user); + void svr_auth_pubkey(int valid_user); + void svr_auth_pam(int valid_user); ++void svr_switch_user(void); + + #if DROPBEAR_SVR_PUBKEY_OPTIONS_BUILT + int svr_pubkey_allows_agentfwd(void); +diff --git a/src/default_options.h b/src/default_options.h +index 9a0f064..705da74 100644 +--- a/src/default_options.h ++++ b/src/default_options.h +@@ -303,6 +303,12 @@ group1 in Dropbear server too */ + /* -T server option overrides */ + #define MAX_AUTH_TRIES 10 + ++/* Change server process to user privileges after authentication. */ ++#ifndef DROPBEAR_SVR_DROP_PRIVS ++/* Default is enabled. Should only be disabled if platforms are incompatible */ ++#define DROPBEAR_SVR_DROP_PRIVS DROPBEAR_SVR_MULTIUSER ++#endif ++ + /* Delay introduced before closing an unauthenticated session (seconds). + Disabled by default, can be set to say 30 seconds to reduce the speed + of password brute forcing. Note that there is a risk of denial of +diff --git a/src/svr-agentfwd.c b/src/svr-agentfwd.c +index a8941ea..5ee8c25 100644 +--- a/src/svr-agentfwd.c ++++ b/src/svr-agentfwd.c +@@ -151,7 +151,7 @@ void svr_agentcleanup(struct ChanSess * chansess) { + + if (chansess->agentfile != NULL && chansess->agentdir != NULL) { + +-#if DROPBEAR_SVR_MULTIUSER ++#if !DROPBEAR_SVR_DROP_PRIVS + /* Remove the dir as the user. That way they can't cause problems except + * for themselves */ + uid = getuid(); +@@ -160,6 +160,9 @@ void svr_agentcleanup(struct ChanSess * chansess) { + (seteuid(ses.authstate.pw_uid)) < 0) { + dropbear_exit("Failed to set euid"); + } ++#else ++ (void)uid; ++ (void)gid; + #endif + + /* 2 for "/" and "\0" */ +@@ -172,7 +175,7 @@ void svr_agentcleanup(struct ChanSess * chansess) { + + rmdir(chansess->agentdir); + +-#if DROPBEAR_SVR_MULTIUSER ++#if !DROPBEAR_SVR_DROP_PRIVS + if ((seteuid(uid)) < 0 || + (setegid(gid)) < 0) { + dropbear_exit("Failed to revert euid"); +@@ -219,7 +222,7 @@ static int bindagent(int fd, struct ChanSess * chansess) { + gid_t gid; + int ret = DROPBEAR_FAILURE; + +-#if DROPBEAR_SVR_MULTIUSER ++#if !DROPBEAR_SVR_DROP_PRIVS + /* drop to user privs to make the dir/file */ + uid = getuid(); + gid = getgid(); +@@ -227,6 +230,9 @@ static int bindagent(int fd, struct ChanSess * chansess) { + (seteuid(ses.authstate.pw_uid)) < 0) { + dropbear_exit("Failed to set euid"); + } ++#else ++ (void)uid; ++ (void)gid; + #endif + + memset((void*)&addr, 0x0, sizeof(addr)); +@@ -267,7 +273,7 @@ bindsocket: + + + out: +-#if DROPBEAR_SVR_MULTIUSER ++#if !DROPBEAR_SVR_DROP_PRIVS + if ((seteuid(uid)) < 0 || + (setegid(gid)) < 0) { + dropbear_exit("Failed to revert euid"); +diff --git a/src/svr-auth.c b/src/svr-auth.c +index 0a6b33a..46ba012 100644 +--- a/src/svr-auth.c ++++ b/src/svr-auth.c +@@ -457,12 +457,22 @@ void send_msg_userauth_success() { + /* authdone must be set after encrypt_packet() for + * delayed-zlib mode */ + ses.authstate.authdone = 1; ++ ++#if DROPBEAR_DROP_PRIVS ++ svr_switch_user(); ++#endif + ses.connect_time = 0; + + ++#if DROPBEAR_DROP_PRIVS ++ /* If running as the user, we can rely on the OS ++ * to limit allowed ports */ ++ ses.allowprivport = 1; ++#else + if (ses.authstate.pw_uid == 0) { + ses.allowprivport = 1; + } ++#endif + + /* Remove from the list of pre-auth sockets. Should be m_close(), since if + * we fail, we might end up leaking connection slots, and disallow new +@@ -472,3 +482,38 @@ void send_msg_userauth_success() { + TRACE(("leave send_msg_userauth_success")) + + } ++ ++/* Switch to the ses.authstate user. ++ * Fails if not running as root and the user differs. ++ * ++ * This may be called either after authentication, or ++ * after shell/command fork if DROPBEAR_SVR_DROP_PRIVS is unset. ++ */ ++void svr_switch_user(void) { ++ assert(ses.authstate.authdone); ++ ++ /* We can only change uid/gid as root ... */ ++ if (getuid() == 0) { ++ ++ if ((setgid(ses.authstate.pw_gid) < 0) || ++ (initgroups(ses.authstate.pw_name, ++ ses.authstate.pw_gid) < 0)) { ++ dropbear_exit("Error changing user group"); ++ } ++ if (setuid(ses.authstate.pw_uid) < 0) { ++ dropbear_exit("Error changing user"); ++ } ++ } else { ++ /* ... but if the daemon is the same uid as the requested uid, we don't ++ * need to */ ++ ++ /* XXX - there is a minor issue here, in that if there are multiple ++ * usernames with the same uid, but differing groups, then the ++ * differing groups won't be set (as with initgroups()). The solution ++ * is for the sysadmin not to give out the UID twice */ ++ if (getuid() != ses.authstate.pw_uid) { ++ dropbear_exit("Couldn't change user as non-root"); ++ } ++ } ++} ++ +diff --git a/src/svr-authpubkey.c b/src/svr-authpubkey.c +index 94ae728..e26b0ee 100644 +--- a/src/svr-authpubkey.c ++++ b/src/svr-authpubkey.c +@@ -462,12 +462,14 @@ static int checkpubkey(const char* keyalgo, unsigned int keyalgolen, + int ret = DROPBEAR_FAILURE; + buffer * line = NULL; + int line_num; ++#if !DROPBEAR_SVR_DROP_PRIVS + uid_t origuid; + gid_t origgid; ++#endif + + TRACE(("enter checkpubkey")) + +-#if DROPBEAR_SVR_MULTIUSER ++#if !DROPBEAR_SVR_DROP_PRIVS + /* access the file as the authenticating user. */ + origuid = getuid(); + origgid = getgid(); +@@ -488,7 +490,7 @@ static int checkpubkey(const char* keyalgo, unsigned int keyalgolen, + TRACE(("checkpubkey: failed opening %s: %s", filename, strerror(errno))) + } + } +-#if DROPBEAR_SVR_MULTIUSER ++#if !DROPBEAR_SVR_DROP_PRIVS + if ((seteuid(origuid)) < 0 || + (setegid(origgid)) < 0) { + dropbear_exit("Failed to revert euid"); +diff --git a/src/svr-chansession.c b/src/svr-chansession.c +index 2ca6fc1..0a37fbf 100644 +--- a/src/svr-chansession.c ++++ b/src/svr-chansession.c +@@ -980,30 +980,8 @@ static void execchild(const void *user_data) { + #endif /* DEBUG_VALGRIND */ + } + +-#if DROPBEAR_SVR_MULTIUSER +- /* We can only change uid/gid as root ... */ +- if (getuid() == 0) { +- +- if ((setgid(ses.authstate.pw_gid) < 0) || +- (initgroups(ses.authstate.pw_name, +- ses.authstate.pw_gid) < 0)) { +- dropbear_exit("Error changing user group"); +- } +- if (setuid(ses.authstate.pw_uid) < 0) { +- dropbear_exit("Error changing user"); +- } +- } else { +- /* ... but if the daemon is the same uid as the requested uid, we don't +- * need to */ +- +- /* XXX - there is a minor issue here, in that if there are multiple +- * usernames with the same uid, but differing groups, then the +- * differing groups won't be set (as with initgroups()). The solution +- * is for the sysadmin not to give out the UID twice */ +- if (getuid() != ses.authstate.pw_uid) { +- dropbear_exit("Couldn't change user as non-root"); +- } +- } ++#if !DROPBEAR_SVR_DROP_PRIVS ++ svr_switch_user(); + #endif + + /* set env vars */ +diff --git a/src/sysoptions.h b/src/sysoptions.h +index cea9688..32b0a13 100644 +--- a/src/sysoptions.h ++++ b/src/sysoptions.h +@@ -443,6 +443,9 @@ + #define DROPBEAR_MULTI 0 + #endif + ++#if !DROPBEAR_SVR_MULTIUSER && DROPBEAR_SVR_DROP_PRIVS ++#error DROPBEAR_SVR_DROP_PRIVS needs DROPBEAR_SVR_MULTIUSER ++#endif + /* Fuzzing expects all key types to be enabled */ + #if DROPBEAR_FUZZ + #if defined(DROPBEAR_DSS) diff --git a/meta/recipes-core/dropbear/dropbear/CVE-2025-14282-02.patch b/meta/recipes-core/dropbear/dropbear/CVE-2025-14282-02.patch new file mode 100644 index 00000000000..5c5265afef7 --- /dev/null +++ b/meta/recipes-core/dropbear/dropbear/CVE-2025-14282-02.patch @@ -0,0 +1,97 @@ +From b47fe5df58f0b459bb49accdd8cb961d969209fb Mon Sep 17 00:00:00 2001 +From: Matt Johnston +Date: Tue, 9 Dec 2025 09:04:04 +0900 +Subject: [PATCH] Remove return code from login_login + +Previously this was always 0, so not useful. + +CVE: CVE-2025-14282 +Upstream-Status: Backport [https://github.com/mkj/dropbear/commit/b47fe5df58f0b459bb49accdd8cb961d969209fb] +Signed-off-by: Peter Marko +--- + src/loginrec.c | 19 +++++-------------- + src/loginrec.h | 6 +++--- + 2 files changed, 8 insertions(+), 17 deletions(-) + +diff --git a/src/loginrec.c b/src/loginrec.c +index b543bcb..d4fdb62 100644 +--- a/src/loginrec.c ++++ b/src/loginrec.c +@@ -193,32 +193,24 @@ int wtmpx_get_entry(struct logininfo *li); + * + * Call with a pointer to a struct logininfo initialised with + * login_init_entry() or login_alloc_entry() +- * +- * Returns: +- * >0 if successful +- * 0 on failure (will use OpenSSH's logging facilities for diagnostics) + */ +-int ++void + login_login (struct logininfo *li) + { + li->type = LTYPE_LOGIN; +- return login_write(li); ++ login_write(li); + } + + + /* login_logout(struct logininfo *) - Record a logout + * + * Call as with login_login() +- * +- * Returns: +- * >0 if successful +- * 0 on failure (will use OpenSSH's logging facilities for diagnostics) + */ +-int ++void + login_logout(struct logininfo *li) + { + li->type = LTYPE_LOGOUT; +- return login_write(li); ++ login_write(li); + } + + +@@ -309,7 +301,7 @@ login_set_current_time(struct logininfo *li) + ** login_write: Call low-level recording functions based on autoconf + ** results + **/ +-int ++void + login_write (struct logininfo *li) + { + #ifndef HAVE_CYGWIN +@@ -340,7 +332,6 @@ login_write (struct logininfo *li) + #ifdef USE_WTMPX + wtmpx_write_entry(li); + #endif +- return 0; + } + + #ifdef LOGIN_NEEDS_UTMPX +diff --git a/src/loginrec.h b/src/loginrec.h +index 6abde48..f8c98ba 100644 +--- a/src/loginrec.h ++++ b/src/loginrec.h +@@ -161,8 +161,8 @@ int login_init_entry(struct logininfo *li, int pid, const char *username, + void login_set_current_time(struct logininfo *li); + + /* record the entry */ +-int login_login (struct logininfo *li); +-int login_logout(struct logininfo *li); ++void login_login (struct logininfo *li); ++void login_logout(struct logininfo *li); + #ifdef LOGIN_NEEDS_UTMPX + int login_utmp_only(struct logininfo *li); + #endif +@@ -170,7 +170,7 @@ int login_utmp_only(struct logininfo *li); + /** End of public functions */ + + /* record the entry */ +-int login_write (struct logininfo *li); ++void login_write (struct logininfo *li); + int login_log_entry(struct logininfo *li); + + /* produce various forms of the line filename */ diff --git a/meta/recipes-core/dropbear/dropbear/CVE-2025-14282-03.patch b/meta/recipes-core/dropbear/dropbear/CVE-2025-14282-03.patch new file mode 100644 index 00000000000..c8996b977e4 --- /dev/null +++ b/meta/recipes-core/dropbear/dropbear/CVE-2025-14282-03.patch @@ -0,0 +1,282 @@ +From 73e4e70ea8e6b890c3918b52bb2e647313a09faa Mon Sep 17 00:00:00 2001 +From: Matt Johnston +Date: Tue, 9 Dec 2025 09:05:30 +0900 +Subject: [PATCH] Retain utmp saved group when dropping privileges + +utmp is required to record logout. The saved group +is reset by the OS for the executed user shell. + +This requires setresgid() function which is not available on all +platforms. Notable platforms are netbsd and macos. Those platforms will +have to set DROPBEAR_SVR_DROP_PRIVS 0 unless an alternative approach is +found. + +CVE: CVE-2025-14282 +Upstream-Status: Backport [https://github.com/mkj/dropbear/commit/73e4e70ea8e6b890c3918b52bb2e647313a09faa] +Signed-off-by: Peter Marko +--- + .github/workflows/build.yml | 6 ++++ + configure | 7 +++++ + configure.ac | 1 + + src/auth.h | 2 ++ + src/config.h.in | 3 ++ + src/loginrec.c | 6 ---- + src/session.h | 6 ++++ + src/svr-auth.c | 61 +++++++++++++++++++++++++++++++++++-- + src/svr-chansession.c | 8 +++++ + src/sysoptions.h | 4 +++ + 10 files changed, 96 insertions(+), 8 deletions(-) + +diff --git a/.github/workflows/build.yml b/.github/workflows/build.yml +index 5c07d28..4fe41bd 100644 +--- a/.github/workflows/build.yml ++++ b/.github/workflows/build.yml +@@ -78,6 +78,9 @@ jobs: + # fails with: + # .../ranlib: file: libtomcrypt.a(cbc_setiv.o) has no symbols + ranlib: ranlib -no_warning_for_no_symbols ++ # macos doesn't have setresgid ++ localoptions: | ++ #define DROPBEAR_SVR_DROP_PRIVS 0 + + - name: macos 15 + os: macos-15 +@@ -90,6 +93,9 @@ jobs: + # fails with: + # .../ranlib: file: libtomcrypt.a(cbc_setiv.o) has no symbols + ranlib: ranlib -no_warning_for_no_symbols ++ # macos doesn't have setresgid ++ localoptions: | ++ #define DROPBEAR_SVR_DROP_PRIVS 0 + + # Check that debug code doesn't bitrot + - name: DEBUG_TRACE +diff --git a/configure b/configure +index 13c911e..8867f8a 100755 +--- a/configure ++++ b/configure +@@ -7597,6 +7597,13 @@ then : + + fi + ++ac_fn_c_check_func "$LINENO" "setresgid" "ac_cv_func_setresgid" ++if test "x$ac_cv_func_setresgid" = xyes ++then : ++ printf "%s\n" "#define HAVE_SETRESGID 1" >>confdefs.h ++ ++fi ++ + + # Might be a macro. Might be sys/endian.h on BSDs + ac_fn_c_check_header_compile "$LINENO" "endian.h" "ac_cv_header_endian_h" "$ac_includes_default" +diff --git a/configure.ac b/configure.ac +index 674fd4d..0e7e331 100644 +--- a/configure.ac ++++ b/configure.ac +@@ -545,6 +545,7 @@ AC_CHECK_FUNCS(utmpname) + AC_CHECK_FUNCS(endutxent getutxent getutxid getutxline pututxline ) + AC_CHECK_FUNCS(setutxent utmpxname) + AC_CHECK_FUNCS(logout updwtmp logwtmp) ++AC_CHECK_FUNCS(setresgid) + + # Might be a macro. Might be sys/endian.h on BSDs + AC_CHECK_HEADERS([endian.h]) +diff --git a/src/auth.h b/src/auth.h +index 096d23d..1145ad7 100644 +--- a/src/auth.h ++++ b/src/auth.h +@@ -41,6 +41,8 @@ void svr_auth_password(int valid_user); + void svr_auth_pubkey(int valid_user); + void svr_auth_pam(int valid_user); + void svr_switch_user(void); ++void svr_raise_gid_utmp(void); ++void svr_restore_gid(void); + + #if DROPBEAR_SVR_PUBKEY_OPTIONS_BUILT + int svr_pubkey_allows_agentfwd(void); +diff --git a/src/config.h.in b/src/config.h.in +index 0590e0c..589786e 100644 +--- a/src/config.h.in ++++ b/src/config.h.in +@@ -231,6 +231,9 @@ + /* Define to 1 if you have the header file. */ + #undef HAVE_SECURITY_PAM_APPL_H + ++/* Define to 1 if you have the `setresgid' function. */ ++#undef HAVE_SETRESGID ++ + /* Define to 1 if you have the `setutent' function. */ + #undef HAVE_SETUTENT + +diff --git a/src/loginrec.c b/src/loginrec.c +index d4fdb62..3118bf6 100644 +--- a/src/loginrec.c ++++ b/src/loginrec.c +@@ -304,12 +304,6 @@ login_set_current_time(struct logininfo *li) + void + login_write (struct logininfo *li) + { +-#ifndef HAVE_CYGWIN +- if ((int)geteuid() != 0) { +- return 1; +- } +-#endif +- + /* set the timestamp */ + login_set_current_time(li); + #ifdef USE_LOGIN +diff --git a/src/session.h b/src/session.h +index f37e7ff..e1a5cfa 100644 +--- a/src/session.h ++++ b/src/session.h +@@ -276,6 +276,12 @@ struct serversession { + /* The instance created by the plugin_new function */ + struct PluginInstance *plugin_instance; + #endif ++ ++#if DROPBEAR_SVR_DROP_PRIVS ++ /* Set to 1 when utmp_gid is valid */ ++ int have_utmp_gid; ++ gid_t utmp_gid; ++#endif + }; + + typedef enum { +diff --git a/src/svr-auth.c b/src/svr-auth.c +index 46ba012..de01458 100644 +--- a/src/svr-auth.c ++++ b/src/svr-auth.c +@@ -458,13 +458,14 @@ void send_msg_userauth_success() { + * delayed-zlib mode */ + ses.authstate.authdone = 1; + +-#if DROPBEAR_DROP_PRIVS ++#if DROPBEAR_SVR_DROP_PRIVS ++ /* Drop privileges as soon as authentication has happened. */ + svr_switch_user(); + #endif + ses.connect_time = 0; + + +-#if DROPBEAR_DROP_PRIVS ++#if DROPBEAR_SVR_DROP_PRIVS + /* If running as the user, we can rely on the OS + * to limit allowed ports */ + ses.allowprivport = 1; +@@ -483,6 +484,20 @@ void send_msg_userauth_success() { + + } + ++#if DROPBEAR_SVR_DROP_PRIVS ++/* Returns DROPBEAR_SUCCESS or DROPBEAR_FAILURE */ ++static int utmp_gid(gid_t *ret_gid) { ++ struct group *utmp_gr = getgrnam("utmp"); ++ if (!utmp_gr) { ++ TRACE(("No utmp group")); ++ return DROPBEAR_FAILURE; ++ } ++ ++ *ret_gid = utmp_gr->gr_gid; ++ return DROPBEAR_SUCCESS; ++} ++#endif ++ + /* Switch to the ses.authstate user. + * Fails if not running as root and the user differs. + * +@@ -500,6 +515,25 @@ void svr_switch_user(void) { + ses.authstate.pw_gid) < 0)) { + dropbear_exit("Error changing user group"); + } ++ ++#if DROPBEAR_SVR_DROP_PRIVS ++ /* Retain utmp saved group so that wtmp/utmp can be written */ ++ int ret = utmp_gid(&svr_ses.utmp_gid); ++ if (ret == DROPBEAR_SUCCESS) { ++ /* Set saved gid to utmp so that it can be ++ * restored for login_logout() etc. This saved ++ * group is cleared by the OS on execve() */ ++ int rc = setresgid(-1, -1, svr_ses.utmp_gid); ++ if (rc == 0) { ++ svr_ses.have_utmp_gid = 1; ++ } else { ++ /* Will not attempt to switch to utmp gid. ++ * login() etc may fail. */ ++ TRACE(("utmp setresgid failed")); ++ } ++ } ++#endif ++ + if (setuid(ses.authstate.pw_uid) < 0) { + dropbear_exit("Error changing user"); + } +@@ -517,3 +551,26 @@ void svr_switch_user(void) { + } + } + ++void svr_raise_gid_utmp(void) { ++#if DROPBEAR_SVR_DROP_PRIVS ++ if (!svr_ses.have_utmp_gid) { ++ return; ++ } ++ ++ if (setegid(svr_ses.utmp_gid) != 0) { ++ dropbear_log(LOG_WARNING, "failed setegid"); ++ } ++#endif ++} ++ ++void svr_restore_gid(void) { ++#if DROPBEAR_SVR_DROP_PRIVS ++ if (!svr_ses.have_utmp_gid) { ++ return; ++ } ++ ++ if (setegid(getgid()) != 0) { ++ dropbear_log(LOG_WARNING, "failed setegid"); ++ } ++#endif ++} +diff --git a/src/svr-chansession.c b/src/svr-chansession.c +index 0a37fbf..11205f3 100644 +--- a/src/svr-chansession.c ++++ b/src/svr-chansession.c +@@ -326,7 +326,11 @@ static void cleanupchansess(const struct Channel *channel) { + if (chansess->tty) { + /* write the utmp/wtmp login record */ + li = chansess_login_alloc(chansess); ++ ++ svr_raise_gid_utmp(); + login_logout(li); ++ svr_restore_gid(); ++ + login_free_entry(li); + + pty_release(chansess->tty); +@@ -847,7 +851,11 @@ static int ptycommand(struct Channel *channel, struct ChanSess *chansess) { + * terminal used for stdout with the dup2 above, otherwise + * the wtmp login will not be recorded */ + li = chansess_login_alloc(chansess); ++ ++ svr_raise_gid_utmp(); + login_login(li); ++ svr_restore_gid(); ++ + login_free_entry(li); + + /* Can now dup2 stderr. Messages from login_login() have gone +diff --git a/src/sysoptions.h b/src/sysoptions.h +index 32b0a13..9bdcb0c 100644 +--- a/src/sysoptions.h ++++ b/src/sysoptions.h +@@ -358,6 +358,10 @@ + #error "At least one hostkey or public-key algorithm must be enabled; RSA is recommended." + #endif + ++#if DROPBEAR_SVR_DROP_PRIVS && !defined(HAVE_SETRESGID) ++ #error "DROPBEAR_SVR_DROP_PRIVS requires setresgid()." ++#endif ++ + /* Source for randomness. This must be able to provide hundreds of bytes per SSH + * connection without blocking. */ + #ifndef DROPBEAR_URANDOM_DEV diff --git a/meta/recipes-core/dropbear/dropbear/CVE-2025-14282-04.patch b/meta/recipes-core/dropbear/dropbear/CVE-2025-14282-04.patch new file mode 100644 index 00000000000..3a4a767d1bc --- /dev/null +++ b/meta/recipes-core/dropbear/dropbear/CVE-2025-14282-04.patch @@ -0,0 +1,72 @@ +From a4043dac4e0e0237255200603672ddb0122017a4 Mon Sep 17 00:00:00 2001 +From: Matt Johnston +Date: Tue, 9 Dec 2025 09:08:37 +0900 +Subject: [PATCH] Limit rekey to current hostkey type + +During rekey dropbear process may be running with user privileges, that +can't write a new hostkey when auto-generating keys. +Only offer the original hostkey when rekeying, also for non-autogenerate +case. + +CVE: CVE-2025-14282 +Upstream-Status: Backport [https://github.com/mkj/dropbear/commit/a4043dac4e0e0237255200603672ddb0122017a4] +Signed-off-by: Peter Marko +--- + src/runopts.h | 1 + + src/svr-kex.c | 8 ++++++++ + src/svr-runopts.c | 11 +++++++++++ + 3 files changed, 20 insertions(+) + +diff --git a/src/runopts.h b/src/runopts.h +index f255882..c8072b3 100644 +--- a/src/runopts.h ++++ b/src/runopts.h +@@ -61,6 +61,7 @@ extern runopts opts; + int readhostkey(const char * filename, sign_key * hostkey, + enum signkey_type *type); + void load_all_hostkeys(void); ++void disable_sig_except(enum signature_type sig_type); + + typedef struct svr_runopts { + +diff --git a/src/svr-kex.c b/src/svr-kex.c +index 14df08a..c066dd8 100644 +--- a/src/svr-kex.c ++++ b/src/svr-kex.c +@@ -99,6 +99,14 @@ void recv_msg_kexdh_init() { + } + #endif + ++ if (!ses.kexstate.donesecondkex) { ++ /* Disable other signature types. ++ * During future rekeying, privileges may have been dropped ++ * so other keys won't be loadable. ++ * This must occur after send_msg_ext_info() which uses the hostkey list */ ++ disable_sig_except(ses.newkeys->algo_signature); ++ } ++ + ses.requirenext = SSH_MSG_NEWKEYS; + TRACE(("leave recv_msg_kexdh_init")) + } +diff --git a/src/svr-runopts.c b/src/svr-runopts.c +index 709dc57..5d114f8 100644 +--- a/src/svr-runopts.c ++++ b/src/svr-runopts.c +@@ -515,6 +515,17 @@ static void disablekey(enum signature_type type) { + } + } + ++void disable_sig_except(enum signature_type allow_type) { ++ int i; ++ TRACE(("Disabling other sigs except %d", allow_type)); ++ for (i = 0; sigalgs[i].name != NULL; i++) { ++ enum signature_type sig_type = sigalgs[i].val; ++ if (sig_type != allow_type) { ++ sigalgs[i].usable = 0; ++ } ++ } ++} ++ + static void loadhostkey_helper(const char *name, void** src, void** dst, int fatal_duplicate) { + if (*dst) { + if (fatal_duplicate) { diff --git a/meta/recipes-core/dropbear/dropbear/CVE-2025-14282-05.patch b/meta/recipes-core/dropbear/dropbear/CVE-2025-14282-05.patch new file mode 100644 index 00000000000..454c7a42a45 --- /dev/null +++ b/meta/recipes-core/dropbear/dropbear/CVE-2025-14282-05.patch @@ -0,0 +1,46 @@ +From d193731630a62482855b450daa1d5a5e13a90125 Mon Sep 17 00:00:00 2001 +From: Matt Johnston +Date: Fri, 12 Dec 2025 12:31:40 +0900 +Subject: [PATCH] Restore seteuid for authorized_keys + +Authorized_keys reading is pre-authentication so should not be +modified in the post-auth drop-privilege change. + +Fixes: e0251be2354e ("Drop privileges after user authentication") + +CVE: CVE-2025-14282 +Upstream-Status: Backport [https://github.com/mkj/dropbear/commit/d193731630a62482855b450daa1d5a5e13a90125] +Signed-off-by: Peter Marko +--- + src/svr-authpubkey.c | 6 ++---- + 1 file changed, 2 insertions(+), 4 deletions(-) + +diff --git a/src/svr-authpubkey.c b/src/svr-authpubkey.c +index e26b0ee..94ae728 100644 +--- a/src/svr-authpubkey.c ++++ b/src/svr-authpubkey.c +@@ -462,14 +462,12 @@ static int checkpubkey(const char* keyalgo, unsigned int keyalgolen, + int ret = DROPBEAR_FAILURE; + buffer * line = NULL; + int line_num; +-#if !DROPBEAR_SVR_DROP_PRIVS + uid_t origuid; + gid_t origgid; +-#endif + + TRACE(("enter checkpubkey")) + +-#if !DROPBEAR_SVR_DROP_PRIVS ++#if DROPBEAR_SVR_MULTIUSER + /* access the file as the authenticating user. */ + origuid = getuid(); + origgid = getgid(); +@@ -490,7 +488,7 @@ static int checkpubkey(const char* keyalgo, unsigned int keyalgolen, + TRACE(("checkpubkey: failed opening %s: %s", filename, strerror(errno))) + } + } +-#if !DROPBEAR_SVR_DROP_PRIVS ++#if DROPBEAR_SVR_MULTIUSER + if ((seteuid(origuid)) < 0 || + (setegid(origgid)) < 0) { + dropbear_exit("Failed to revert euid"); diff --git a/meta/recipes-core/dropbear/dropbear_2025.88.bb b/meta/recipes-core/dropbear/dropbear_2025.88.bb index 05af557b216..6e6a22e2467 100644 --- a/meta/recipes-core/dropbear/dropbear_2025.88.bb +++ b/meta/recipes-core/dropbear/dropbear_2025.88.bb @@ -22,6 +22,11 @@ SRC_URI = "http://matt.ucc.asn.au/dropbear/releases/dropbear-${PV}.tar.bz2 \ file://0001-Fix-proxycmd-without-netcat.patch \ ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '${PAM_SRC_URI}', '', d)} \ file://CVE-2019-6111.patch \ + file://CVE-2025-14282-01.patch \ + file://CVE-2025-14282-02.patch \ + file://CVE-2025-14282-03.patch \ + file://CVE-2025-14282-04.patch \ + file://CVE-2025-14282-05.patch \ " SRC_URI[sha256sum] = "783f50ea27b17c16da89578fafdb6decfa44bb8f6590e5698a4e4d3672dc53d4" From patchwork Sat Jan 31 07:56:27 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 80126 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6F8DAD7974C for ; Sat, 31 Jan 2026 07:57:16 +0000 (UTC) Received: from mail-wm1-f47.google.com (mail-wm1-f47.google.com [209.85.128.47]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.5010.1769846226542442450 for ; Fri, 30 Jan 2026 23:57:06 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=xa6R+AES; spf=pass (domain: smile.fr, ip: 209.85.128.47, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f47.google.com with SMTP id 5b1f17b1804b1-4805ef35864so23619715e9.0 for ; Fri, 30 Jan 2026 23:57:06 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1769846225; x=1770451025; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=NF8dHALoC2vtaipqQDqq8YaFVlDF4xvBFhA3WZ1D004=; b=xa6R+AES7s1lGCjVeyDPZqV2Ss2x5A7jNSWEeNS0KuWxfgAuQ28DglW3/WnvlwE3DK AWVVwVLOp7HIlhZCsJG84uelK80xgXVCqdNBx+7EJfjX0IawR9SbfeSw5qPa4jVLqcuM St60Ry++NqVEQSTwNUXZBy8aYvIRvltCsk8Bc= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1769846225; x=1770451025; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=NF8dHALoC2vtaipqQDqq8YaFVlDF4xvBFhA3WZ1D004=; b=saPQmoEa19I8+xgz57PNCsk0EFGvynsCkcP+bEp2JBLjt8cpUapOlfD5CnKXRfjwsO Fc/Qsz0lvQhALno8mfpKSnHyy0wGXDOLkVMgWTqcz1Uviz1CDshWj4ky0Un7/DJVQGxo WPd+hHFEOqQv+uzGJ8J3NA5fowGcNvOfhvSpajYBN0HVwGQvI+qnw62ceHPbbxoP5N4/ bcNpYjlmNcnQsrWeqmR3AKnfF6unyf1NIIRXvrJ17VqMjS8HU2OdGqI+Ay/TdxzZXhDp P0YOBrWZghuhEX0HKYCVBs3OuxOGa3tffbeUIysHJ+U6h7YphwKq2k5C9R3i4hKZRz4J Bi7A== X-Gm-Message-State: AOJu0YyZbhg0COgA1i4Dk/XCFEIadik73I9T+vlt+qcSiT4s9nEvDvxn 2aqYac4SgQjmFNrngNYrFH2VQD7AJ4h5ZL90sHipJtVGnBvtxUixNJs4kZoE5O+b9zjys0MVPuS lrhnHSPo= X-Gm-Gg: AZuq6aLUOWwZoEsJD6pB1mntdC7ay7Znksoa2TvKB0e7RGkCg4H3vw+3dBoMnAgVAEF vjYSDDlrTOET83F+R/qlR5MKQmMfPF8Q0tNUQwsF6+e8pnQTdCHA8ByE/4rZUqZO39j1NG3y+DV Nu6ZxcON23DuZdToNFqWwA/I+yqgrg3GMc5l8j0tPakwhpmHZ4keqAnT5WrUzqHIIKdP5oerR3H 2PR7VNoAPbFaX4l7K3lW3uz6fdr5qAjBqkvQfKodZuI6a+lifmuA4Yot+rx2l0KsuyZeLRdZRXi EzVzYx0l+SsKZSMgjGtGlP92kD4/bfLT/m1EABxOP7UKr2IMmRrICSfU6ixKfmlL7teifAyzGA0 /IS0aqQE56xZdpAwk+5GibEkb4kRYHbV6AygnzKNQ1YOsWMV6x3XJq0ABZRd5MZOTvE1qfwZ+WP WTRtEMsp9AbncNp5AjK7JvnRzMpzBKdKAWX+V4uRkPm1f9X4BfOEfGZE6Nd8ku9hZA80abAjGrk vun4UVv7eKlYunp X-Received: by 2002:a05:600c:680a:b0:479:2a09:9262 with SMTP id 5b1f17b1804b1-482db45171cmr69155525e9.9.1769846224680; Fri, 30 Jan 2026 23:57:04 -0800 (PST) Received: from FRSMI25-LASER.home (2a01cb001331aa00fa8b238ae1dd6dd8.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:fa8b:238a:e1dd:6dd8]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4806ce564f9sm258621475e9.14.2026.01.30.23.57.04 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 30 Jan 2026 23:57:04 -0800 (PST) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 16/22] libtheora: set CVE_PRODUCT Date: Sat, 31 Jan 2026 08:56:27 +0100 Message-ID: <62a6e93e4ded807cf451a7c390b86f49e8822c1a.1769845858.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 31 Jan 2026 07:57:16 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/230221 From: Ken Kurematsu In the NVD database, the product name of libtheora is theora. This was set to ensure that cve-check works correctly. Signed-off-by: Ken Kurematsu Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit a8ddda60332e2a3219e905c1545b5da917f855c6) Signed-off-by: Yoann Congal --- meta/recipes-multimedia/libtheora/libtheora_1.2.0.bb | 2 ++ 1 file changed, 2 insertions(+) diff --git a/meta/recipes-multimedia/libtheora/libtheora_1.2.0.bb b/meta/recipes-multimedia/libtheora/libtheora_1.2.0.bb index 04de8507fb1..bacaf3aee66 100644 --- a/meta/recipes-multimedia/libtheora/libtheora_1.2.0.bb +++ b/meta/recipes-multimedia/libtheora/libtheora_1.2.0.bb @@ -14,6 +14,8 @@ SRC_URI[sha256sum] = "ebdf77a8f5c0a8f7a9e42323844fa09502b34eb1d1fece7b5f54da41fe UPSTREAM_CHECK_REGEX = "libtheora-(?P\d+(\.\d)+)\.(tar\.gz|tgz)" +CVE_PRODUCT = "theora" + inherit autotools pkgconfig EXTRA_OECONF = "--disable-examples --disable-doc" From patchwork Sat Jan 31 07:56:28 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 80129 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 7B7AFD79751 for ; Sat, 31 Jan 2026 07:57:16 +0000 (UTC) Received: from mail-wm1-f44.google.com (mail-wm1-f44.google.com [209.85.128.44]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.5011.1769846227498405900 for ; Fri, 30 Jan 2026 23:57:07 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=wCTYiomA; spf=pass (domain: smile.fr, ip: 209.85.128.44, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f44.google.com with SMTP id 5b1f17b1804b1-47f5c2283b6so22724205e9.1 for ; Fri, 30 Jan 2026 23:57:07 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1769846226; x=1770451026; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=XhJ4yY5BJPf0KFv5k+0mGLtSCNE4wpH75EyXvlNaoL8=; b=wCTYiomAsTX22LdAma0xE8HjMC2PsDmR+pPSyqC8aEREK5GVIjJMpP/OOvRySYtLZ/ O6AqTR2qtSR8yUitRDIXCav9WLUdVBgHodcn/70PnnejWTr+avdnSqBpKKqMm1fnYVjO 7swS7r+PgGIrtdMnexCrCC2b/dyk1HSgD0YS4= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1769846226; x=1770451026; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=XhJ4yY5BJPf0KFv5k+0mGLtSCNE4wpH75EyXvlNaoL8=; b=KABZnw5UakZThc9K44Rutg+trU23vq2JBzYKoXU9hz45ClxccBr/zy3vRO+q61KEUl RaVwyvEk/2fhwQdc6snGzay/ktlIaqJ6Rg1W+F8OBZZZAIYTT4Fn9DAkUpAE6UfZJQIG 9oMPuQ0uSupFA/mJ6NvST69PH8okrTbJ+6E+XHpkPf0c3UJymybHQXlAuzbGTilax5lA P9xD5iAceE6WAJaAc9xOkeYntcKxxhmcLQQ0zTMsUlmsNisb8GCOi5CKpZHmzxmoJH8F p6S11kCjQ49OPgS+xxs69EubxXFQB707e3s4k13vxLhcgveDeXcD3/W3ddE+z50Wv88Q Zkxg== X-Gm-Message-State: AOJu0Yz479P/gHlejrmBJ2pOgXuXeAqxZKdsm9xtb84+rOvARPMqG911 phsV+px8uRSusslUKI728CONaP5ZQCL/blwRVW2neyNMakrWAmlhTgfXXoRmsdappSMdA3V8oEx XkpK0SZI= X-Gm-Gg: AZuq6aI8ZOTlwH/DBXFubsquwirNaAAlgjvU4yMRLeM0BO/6smiwjZyJcoGoamH4cm0 h1cQSOIDEWDwoLvCUSCkzL1auS7Wo+otJwpyGYJtWswSrgS5hyk4XQBjGyPgPd0Q3ERwGsuuxK6 xEcjXx4C7u1jUgUp/xvbq9zeVafFhvVxTKWeBKN7XuD7n5Mq32oETFeAKrnu5Wt6XBgjnpUQeAw 9sPT7R8vgPQHvWRrUfSH+PrSXZIajvWEYdoPFLC2IBVPZpt+c8ggGBPwJPXN8HIOyCD0yNsMhvQ qQlb4aSkK89Lp2nsk9mX/FKJHElPTln9dIeFVWQCi6vR7HL/tL1oHZ7QShHVaTmAHJqWq9Bh8Pm +u8s824c+4c+ySxNqNBzxgOW5RtX3Bg78bvyCTHSIeafZjLstSk6dFgDQDpHmm6W1jLmIOHSN9R NgVyHMIsh0R5cOrslPZ7aPQ4TliCJUmCynN+8wUFizV5VDPGn76kLu55rSZjvr2kiHLqRJ33FaS SX4O5ugQuk6B4Ou X-Received: by 2002:a05:600c:4443:b0:477:7c7d:d9b2 with SMTP id 5b1f17b1804b1-482db4a1030mr64423465e9.32.1769846225673; Fri, 30 Jan 2026 23:57:05 -0800 (PST) Received: from FRSMI25-LASER.home (2a01cb001331aa00fa8b238ae1dd6dd8.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:fa8b:238a:e1dd:6dd8]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4806ce564f9sm258621475e9.14.2026.01.30.23.57.04 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 30 Jan 2026 23:57:04 -0800 (PST) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 17/22] libpng: upgrade 1.6.53 -> 1.6.54 Date: Sat, 31 Jan 2026 08:56:28 +0100 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 31 Jan 2026 07:57:16 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/230222 From: Peter Marko Handles CVE-2026-22695 and CVE-2026-22801. License-Update: copyright years refreshed Changelog: Version 1.6.54 [January 12, 2026] Fixed CVE-2026-22695 (medium severity): Heap buffer over-read in `png_image_read_direct_scaled. (Reported and fixed by Petr Simecek.) Fixed CVE-2026-22801 (medium severity): Integer truncation causing heap buffer over-read in `png_image_write_*`. Implemented various improvements in oss-fuzz. (Contributed by Philippe Antoine.) Signed-off-by: Peter Marko Signed-off-by: Antonin Godard Signed-off-by: Richard Purdie (cherry picked from commit 9c18cb1d4dd0edf2e9c638c3c576cb803e1ff4c6) [YC: Added changelog] Signed-off-by: Yoann Congal Signed-off-by: Peter Marko --- .../libpng/{libpng_1.6.53.bb => libpng_1.6.54.bb} | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) rename meta/recipes-multimedia/libpng/{libpng_1.6.53.bb => libpng_1.6.54.bb} (94%) diff --git a/meta/recipes-multimedia/libpng/libpng_1.6.53.bb b/meta/recipes-multimedia/libpng/libpng_1.6.54.bb similarity index 94% rename from meta/recipes-multimedia/libpng/libpng_1.6.53.bb rename to meta/recipes-multimedia/libpng/libpng_1.6.54.bb index 956cd243b19..3f2b80a060f 100644 --- a/meta/recipes-multimedia/libpng/libpng_1.6.53.bb +++ b/meta/recipes-multimedia/libpng/libpng_1.6.54.bb @@ -5,7 +5,7 @@ library for use in applications that read, create, and manipulate PNG \ HOMEPAGE = "http://www.libpng.org/" SECTION = "libs" LICENSE = "Libpng" -LIC_FILES_CHKSUM = "file://LICENSE;md5=5516d77a3cf75f55a0d37254e3e65a20" +LIC_FILES_CHKSUM = "file://LICENSE;md5=9dc350edbbbee660c7d9af79487168f2" DEPENDS = "zlib" LIBV = "16" @@ -14,7 +14,7 @@ SRC_URI = "${SOURCEFORGE_MIRROR}/${BPN}/${BPN}${LIBV}/${BP}.tar.xz \ file://run-ptest \ " -SRC_URI[sha256sum] = "1d3fb8ccc2932d04aa3663e22ef5ef490244370f4e568d7850165068778d98d4" +SRC_URI[sha256sum] = "01c9d8a303c941ec2c511c14312a3b1d36cedb41e2f5168ccdaa85d53b887805" MIRRORS += "${SOURCEFORGE_MIRROR}/project/${BPN}/${BPN}${LIBV}/ ${SOURCEFORGE_MIRROR}/project/${BPN}/${BPN}${LIBV}/older-releases/" From patchwork Sat Jan 31 07:56:29 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 80128 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 831C9D79756 for ; Sat, 31 Jan 2026 07:57:16 +0000 (UTC) Received: from mail-wm1-f53.google.com (mail-wm1-f53.google.com [209.85.128.53]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.5110.1769846228500065441 for ; Fri, 30 Jan 2026 23:57:08 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=OJFOZAFf; spf=pass (domain: smile.fr, ip: 209.85.128.53, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f53.google.com with SMTP id 5b1f17b1804b1-48068127f00so23871675e9.3 for ; Fri, 30 Jan 2026 23:57:08 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1769846227; x=1770451027; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=PneNM+LL4PY1N7lo+BrLmYDP0Iy/01guJ5KbRiE5Zbk=; b=OJFOZAFf3RTee/ry/IdPY/R+qiaiJaSiYZfvn+oP43fHM8WPwVojU9drDwr5ZcfjVR IB5Ue6JS4JCO7WhUNgS0WMEcjoxVNtGUilXdi2Y3TBO69l+GOTCrxLVv9Yru2X5VPlB9 XACvj8FRychFhY0DgcG2W+QL66R9XYSeVz9rQ= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1769846227; x=1770451027; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=PneNM+LL4PY1N7lo+BrLmYDP0Iy/01guJ5KbRiE5Zbk=; b=YeTv68BgZC5Vm0YJPmfnH0b8WKEsVzyaKPWre3mt5ZcPZVuT7ZAQlEiV0pY4hbOl92 vAkceHWX8fLKk9tc6at2GTM9jV5nh3LQVWX+TSNeAawB85KfndZaPSTL0214rCExu56o FGNEKK7tjABj7lGVuYIhac50Qp/VKKvf+JoB56Ib7R5SmoavJIrh58oGMVwYR7JvK+bm 2RvZ7CsKq6O+8lFP/uUYS950cBNGgMNal3aqvQn/v6snFWOG6LnBouWTt9K9LsD2YQrs ARLv80FcGXiyQBqcYofnPyzo6RP5zQdh8vtThqdM7jwpHO6C5WBAubbBg5WSPrNgJASK L+dQ== X-Gm-Message-State: AOJu0YyqYJbIVSARDOyzWBa4Jx1csXAehtd4fzNGhc8PH6Dbia2eb1M7 4WqxM/tymFDnF77pq5xp3UPmFh5RY4QEg0tuoavZvr/jXFvQ2jnblIi6sjDU/mC9ZC2yJ/PINU/ FS3z/IYQ= X-Gm-Gg: AZuq6aL2Pvry58jtOwbX7Nj5OdELvNG7M1uba76i/+JL8/KuUP3EN2sVIBPEF7bUXCP nzgIy1OS98xT0pnM2OKlF+CqoYZS4xz9YHOxMzmFT2rHD2NU+HjmWxGt+JhkQLuTddj8UU1OInn QT1s4gpeoeOe2KUAvLx9PHV2H1wlifP65Euynh5HwdahtBmDOiByP2ge9L6Z7g8AtWqljyjfQcx GScKQbI5kfPDf3KQ3HOKOnlov/Wgf6mWZ0iKvt/8FVsaCYwfwenCnT5VBKH2QEKuseMATobLUfe lSIVjdirOJo19qeyD4ElVnKKfxkpIvkmMCD9IJcbsdLVW9+PM3PItz/i2Ud5yw+q4eLiytUtmmc S1A84m23pTfLE+5qRWFMmZYav3bBv5XSKfcH4jMCzlHFZuVtAQS9HIipI9EioMJeH+PCzyb2pdy GgmEXmITxhs8ZqI5aE7SBOvP/RllnWj6cVzesZU4RDMRvKqPu/Txgf+G8pMwbY904vTnvFierxf 8NI55YalWT5H90y X-Received: by 2002:a05:600c:8b27:b0:479:1348:c614 with SMTP id 5b1f17b1804b1-482db4997c7mr60050155e9.26.1769846226561; Fri, 30 Jan 2026 23:57:06 -0800 (PST) Received: from FRSMI25-LASER.home (2a01cb001331aa00fa8b238ae1dd6dd8.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:fa8b:238a:e1dd:6dd8]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4806ce564f9sm258621475e9.14.2026.01.30.23.57.05 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 30 Jan 2026 23:57:05 -0800 (PST) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 18/22] glib-2.0: patch CVE-2026-0988 Date: Sat, 31 Jan 2026 08:56:29 +0100 Message-ID: <8bd91211061d1fe5e7a8c9f76faa7d12c4f945af.1769845858.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 31 Jan 2026 07:57:16 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/230223 From: Peter Marko Pick relevant commit from [2] linked from [1]. [1] https://gitlab.gnome.org/GNOME/glib/-/issues/3851 [2] https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4944 Signed-off-by: Peter Marko Signed-off-by: Mathieu Dubois-Briand (cherry picked from commit 0316decd300839be34b384381a6de7fa3e68f8e0) Signed-off-by: Yoann Congal --- .../glib-2.0/files/CVE-2026-0988.patch | 58 +++++++++++++++++++ meta/recipes-core/glib-2.0/glib.inc | 1 + 2 files changed, 59 insertions(+) create mode 100644 meta/recipes-core/glib-2.0/files/CVE-2026-0988.patch diff --git a/meta/recipes-core/glib-2.0/files/CVE-2026-0988.patch b/meta/recipes-core/glib-2.0/files/CVE-2026-0988.patch new file mode 100644 index 00000000000..daf86224d5d --- /dev/null +++ b/meta/recipes-core/glib-2.0/files/CVE-2026-0988.patch @@ -0,0 +1,58 @@ +From c5766cff61ffce0b8e787eae09908ac348338e5f Mon Sep 17 00:00:00 2001 +From: Philip Withnall +Date: Thu, 18 Dec 2025 23:12:18 +0000 +Subject: [PATCH] gbufferedinputstream: Fix a potential integer overflow in + peek() + +If the caller provides `offset` and `count` arguments which overflow, +their sum will overflow and could lead to `memcpy()` reading out more +memory than expected. + +Spotted by Codean Labs. + +Signed-off-by: Philip Withnall + +Fixes: #3851 + +CVE: CVE-2026-0988 +Upstream-Status: Backport [https://gitlab.gnome.org/GNOME/glib/-/commit/c5766cff61ffce0b8e787eae09908ac348338e5f] +Signed-off-by: Peter Marko +--- + gio/gbufferedinputstream.c | 2 +- + gio/tests/buffered-input-stream.c | 10 ++++++++++ + 2 files changed, 11 insertions(+), 1 deletion(-) + +diff --git a/gio/gbufferedinputstream.c b/gio/gbufferedinputstream.c +index 9e6bacc62..56d656be0 100644 +--- a/gio/gbufferedinputstream.c ++++ b/gio/gbufferedinputstream.c +@@ -590,7 +590,7 @@ g_buffered_input_stream_peek (GBufferedInputStream *stream, + + available = g_buffered_input_stream_get_available (stream); + +- if (offset > available) ++ if (offset > available || offset > G_MAXSIZE - count) + return 0; + + end = MIN (offset + count, available); +diff --git a/gio/tests/buffered-input-stream.c b/gio/tests/buffered-input-stream.c +index a1af4eeff..2b2a0d9aa 100644 +--- a/gio/tests/buffered-input-stream.c ++++ b/gio/tests/buffered-input-stream.c +@@ -60,6 +60,16 @@ test_peek (void) + g_assert_cmpint (npeek, ==, 0); + g_free (buffer); + ++ buffer = g_new0 (char, 64); ++ npeek = g_buffered_input_stream_peek (G_BUFFERED_INPUT_STREAM (in), buffer, 8, 0); ++ g_assert_cmpint (npeek, ==, 0); ++ g_free (buffer); ++ ++ buffer = g_new0 (char, 64); ++ npeek = g_buffered_input_stream_peek (G_BUFFERED_INPUT_STREAM (in), buffer, 5, G_MAXSIZE); ++ g_assert_cmpint (npeek, ==, 0); ++ g_free (buffer); ++ + g_object_unref (in); + g_object_unref (base); + } diff --git a/meta/recipes-core/glib-2.0/glib.inc b/meta/recipes-core/glib-2.0/glib.inc index bd87d9c601b..2e15cc7675b 100644 --- a/meta/recipes-core/glib-2.0/glib.inc +++ b/meta/recipes-core/glib-2.0/glib.inc @@ -231,6 +231,7 @@ SRC_URI += "\ file://0001-gio-tests-resources.c-comment-out-a-build-host-only-.patch \ file://0010-Do-not-hardcode-python-path-into-various-tools.patch \ file://skip-timeout.patch \ + file://CVE-2026-0988.patch \ " SRC_URI:append:class-native = " file://relocate-modules.patch \ file://0001-meson.build-do-not-enable-pidfd-features-on-native-g.patch \ From patchwork Sat Jan 31 07:56:30 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 80130 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8766AD79752 for ; Sat, 31 Jan 2026 07:57:16 +0000 (UTC) Received: from mail-wm1-f48.google.com (mail-wm1-f48.google.com [209.85.128.48]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.5114.1769846229529528642 for ; Fri, 30 Jan 2026 23:57:09 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=SlzF1vKn; spf=pass (domain: smile.fr, ip: 209.85.128.48, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f48.google.com with SMTP id 5b1f17b1804b1-480706554beso30112815e9.1 for ; Fri, 30 Jan 2026 23:57:09 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1769846228; x=1770451028; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=pTVkd4KTBvQc/6KVUqUEFryBrJnLPCIPb4f9Mf7fC7Y=; b=SlzF1vKn69X+lgE1RmQuEDyK3KpsMbiV5pVzKbRq2F0xKCErmgs6OM3Pi4bz4/pvBG I4y1aZKAy1zVqLJapENJRi9BDOc6tsfWeAC0nI7hTZgotJw5p8zu4YooOr8GVgv+FwqI +AeMWM9cXVIBmtvfkXm+7+U26Z8Pl9e7a97Fc= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1769846228; x=1770451028; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=pTVkd4KTBvQc/6KVUqUEFryBrJnLPCIPb4f9Mf7fC7Y=; b=At8jB3kxtVh+1Mjy8RRyP2J1xjaUWYnZik2Wri4fWnXP6FM0zrMQb6oMZxqZl+b50s NDZovXwNYwvll3Q/yjkHjFjaRzLNPzZf1Ci4IJ+DDFbobnGtZ88NuzpUDGZM7Y2VfmHR nKPrgbrtdY33R5BtaouLpBkbsIFwMZkSE+0h68iwKp0tVEgkXyhTEgNBep44VtRj9EjZ FX1l4jBnJ7+QqNCW8GBVwZUlNwGfBaGOGUGhv5KLjEpA8Ldzjykl48WHNl91bnaaSae3 zOGOL9d5rCCnVmWOWGXR2uQL1GkehRw9zuIClFK3Ls5c6JUNCpwUMTLv2K32wgOxUI26 zb2A== X-Gm-Message-State: AOJu0Yycdn7YYas6x0y7ynyTXvK6vzlYYfhzXBMVW+UKeQ2q2KbM11FW yr+LKDbanyX/kNsKX4htT86Qpmi5u5/XE3Kq8FHkCgWJ6dFl1jGM64WZelbJVVZqBCstDJe4cUx GF9alLXo= X-Gm-Gg: AZuq6aKV0TET/colqPjh2GAaDOZ/nUNBmygwfqTqmA/K6mxCoCDVmjF5d84pzfgcuNj 3Geb0oVbprWx0+o5K4BUmqn3KSIb3GZXmNfw4KrKEs+0CnVHmv2h2x9aGeH6iaOGmLMe/ZFO5ls iFqRZ8nSNSKFlOcsUbtZzf/Qu90evSRf7gHU/1B/rYURwnKhMrBC7Q+y5BZlRMJIkXmVUW3OXx6 hhoNTxnldIBsPj7+OhVWvdUer3FRhlDg2haheu1ib8lOIICUU4oJunrcDkOWAC0IU/l308v3YJH 2mIwRY7gCzbt2IXcn7CywuTiKVuSau6v0G2JQybg17afarwOKVtx1YKnpkyUvbFnSb9kvnDZNlE xIu12lSMhKl39PWEnF/tAbV0exsUBTEIfhyayracJhGyaBBsL4LNwf+bU0RNq4WQY/6UjO7WwOg vOX0522MXUjQcXRBprtIcLUVrnkW1wZqYgPS9FssBoi6i2Nif6MKBtxLkI0Xy1YW+IHWcBKoES/ 4tQFhFf4hPjNh/H X-Received: by 2002:a05:600c:8b31:b0:47e:e78a:c832 with SMTP id 5b1f17b1804b1-482db4b692dmr61480905e9.37.1769846227563; Fri, 30 Jan 2026 23:57:07 -0800 (PST) Received: from FRSMI25-LASER.home (2a01cb001331aa00fa8b238ae1dd6dd8.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:fa8b:238a:e1dd:6dd8]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4806ce564f9sm258621475e9.14.2026.01.30.23.57.06 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 30 Jan 2026 23:57:06 -0800 (PST) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 19/22] libxml2: patch CVE-2026-0989 Date: Sat, 31 Jan 2026 08:56:30 +0100 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 31 Jan 2026 07:57:16 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/230224 From: Peter Marko Pick patch from [1] linked from [2]. [1] https://gitlab.gnome.org/GNOME/libxml2/-/merge_requests/374 [2] https://gitlab.gnome.org/GNOME/libxml2/-/issues/998 Signed-off-by: Peter Marko Signed-off-by: Yoann Congal --- .../libxml/libxml2/CVE-2026-0989.patch | 309 ++++++++++++++++++ meta/recipes-core/libxml/libxml2_2.14.6.bb | 1 + 2 files changed, 310 insertions(+) create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2026-0989.patch diff --git a/meta/recipes-core/libxml/libxml2/CVE-2026-0989.patch b/meta/recipes-core/libxml/libxml2/CVE-2026-0989.patch new file mode 100644 index 00000000000..5fcfd2280ad --- /dev/null +++ b/meta/recipes-core/libxml/libxml2/CVE-2026-0989.patch @@ -0,0 +1,309 @@ +From 19549c61590c1873468c53e0026a2fbffae428ef Mon Sep 17 00:00:00 2001 +From: Daniel Garcia Moreno +Date: Fri, 10 Oct 2025 09:38:31 +0200 +Subject: [PATCH] Add RelaxNG include limit + +This patch adds a default xmlRelaxNGIncludeLimit of 1.000, and that +limit can be modified at runtime with the env variable +RNG_INCLUDE_LIMIT. + +Fix https://gitlab.gnome.org/GNOME/libxml2/-/issues/998 + +CVE: CVE-2026-0989 +Upstream-Status: Backport [https://gitlab.gnome.org/GNOME/libxml2/-/commit/19549c61590c1873468c53e0026a2fbffae428ef] +Signed-off-by: Peter Marko +--- + include/libxml/relaxng.h | 4 ++ + relaxng.c | 63 ++++++++++++++++++++-- + runtest.c | 67 ++++++++++++++++++++++++ + test/relaxng/include/include-limit.rng | 4 ++ + test/relaxng/include/include-limit_1.rng | 4 ++ + test/relaxng/include/include-limit_2.rng | 4 ++ + test/relaxng/include/include-limit_3.rng | 8 +++ + 7 files changed, 150 insertions(+), 4 deletions(-) + create mode 100644 test/relaxng/include/include-limit.rng + create mode 100644 test/relaxng/include/include-limit_1.rng + create mode 100644 test/relaxng/include/include-limit_2.rng + create mode 100644 test/relaxng/include/include-limit_3.rng + +diff --git a/include/libxml/relaxng.h b/include/libxml/relaxng.h +index eafc6604..099dacd8 100644 +--- a/include/libxml/relaxng.h ++++ b/include/libxml/relaxng.h +@@ -139,6 +139,10 @@ XMLPUBFUN int + xmlRelaxParserSetFlag (xmlRelaxNGParserCtxtPtr ctxt, + int flag); + ++XMLPUBFUN int ++ xmlRelaxParserSetIncLImit (xmlRelaxNGParserCtxt *ctxt, ++ int limit); ++ + XMLPUBFUN void + xmlRelaxNGFreeParserCtxt (xmlRelaxNGParserCtxtPtr ctxt); + XMLPUBFUN void +diff --git a/relaxng.c b/relaxng.c +index 1d74ba9f..c0e94a3c 100644 +--- a/relaxng.c ++++ b/relaxng.c +@@ -18,6 +18,8 @@ + + #ifdef LIBXML_RELAXNG_ENABLED + ++#include ++#include + #include + #include + #include +@@ -43,6 +45,12 @@ + static const xmlChar *xmlRelaxNGNs = (const xmlChar *) + "http://relaxng.org/ns/structure/1.0"; + ++/* ++ * Default include limit, this can be override with RNG_INCLUDE_LIMIT ++ * env variable ++ */ ++static const int _xmlRelaxNGIncludeLimit = 1000; ++ + #define IS_RELAXNG(node, typ) \ + ((node != NULL) && (node->ns != NULL) && \ + (node->type == XML_ELEMENT_NODE) && \ +@@ -219,6 +227,7 @@ struct _xmlRelaxNGParserCtxt { + int incNr; /* Depth of the include parsing stack */ + int incMax; /* Max depth of the parsing stack */ + xmlRelaxNGIncludePtr *incTab; /* array of incs */ ++ int incLimit; /* Include limit, to avoid stack-overflow on parse */ + + int idref; /* requires idref checking */ + +@@ -1405,6 +1414,23 @@ xmlRelaxParserSetFlag(xmlRelaxNGParserCtxtPtr ctxt, int flags) + return(0); + } + ++/** ++ * Semi private function used to set the include recursion limit to a ++ * parser context. Set to 0 to use the default value. ++ * ++ * @param ctxt a RelaxNG parser context ++ * @param limit the new include depth limit ++ * @returns 0 if success and -1 in case of error ++ */ ++int ++xmlRelaxParserSetIncLImit(xmlRelaxNGParserCtxt *ctxt, int limit) ++{ ++ if (ctxt == NULL) return(-1); ++ if (limit < 0) return(-1); ++ ctxt->incLimit = limit; ++ return(0); ++} ++ + /************************************************************************ + * * + * Document functions * +@@ -1462,7 +1488,7 @@ xmlRelaxReadMemory(xmlRelaxNGParserCtxtPtr ctxt, const char *buf, int size) { + * + * Pushes a new include on top of the include stack + * +- * Returns 0 in case of error, the index in the stack otherwise ++ * Returns -1 in case of error, the index in the stack otherwise + */ + static int + xmlRelaxNGIncludePush(xmlRelaxNGParserCtxtPtr ctxt, +@@ -1476,9 +1502,15 @@ xmlRelaxNGIncludePush(xmlRelaxNGParserCtxtPtr ctxt, + sizeof(ctxt->incTab[0])); + if (ctxt->incTab == NULL) { + xmlRngPErrMemory(ctxt); +- return (0); ++ return (-1); + } + } ++ if (ctxt->incNr >= ctxt->incLimit) { ++ xmlRngPErr(ctxt, (xmlNodePtr)value->doc, XML_RNGP_PARSE_ERROR, ++ "xmlRelaxNG: inclusion recursion limit reached\n", NULL, NULL); ++ return(-1); ++ } ++ + if (ctxt->incNr >= ctxt->incMax) { + ctxt->incMax *= 2; + ctxt->incTab = +@@ -1487,7 +1519,7 @@ xmlRelaxNGIncludePush(xmlRelaxNGParserCtxtPtr ctxt, + sizeof(ctxt->incTab[0])); + if (ctxt->incTab == NULL) { + xmlRngPErrMemory(ctxt); +- return (0); ++ return (-1); + } + } + ctxt->incTab[ctxt->incNr] = value; +@@ -1657,7 +1689,9 @@ xmlRelaxNGLoadInclude(xmlRelaxNGParserCtxtPtr ctxt, const xmlChar * URL, + /* + * push it on the stack + */ +- xmlRelaxNGIncludePush(ctxt, ret); ++ if (xmlRelaxNGIncludePush(ctxt, ret) < 0) { ++ return (NULL); ++ } + + /* + * Some preprocessing of the document content, this include recursing +@@ -7381,11 +7415,32 @@ xmlRelaxNGParse(xmlRelaxNGParserCtxtPtr ctxt) + xmlDocPtr doc; + xmlNodePtr root; + ++ const char *include_limit_env = getenv("RNG_INCLUDE_LIMIT"); ++ + xmlRelaxNGInitTypes(); + + if (ctxt == NULL) + return (NULL); + ++ if (ctxt->incLimit == 0) { ++ ctxt->incLimit = _xmlRelaxNGIncludeLimit; ++ if (include_limit_env != NULL) { ++ char *strEnd; ++ unsigned long val = 0; ++ errno = 0; ++ val = strtoul(include_limit_env, &strEnd, 10); ++ if (errno != 0 || *strEnd != 0 || val > INT_MAX) { ++ xmlRngPErr(ctxt, NULL, XML_RNGP_PARSE_ERROR, ++ "xmlRelaxNGParse: invalid RNG_INCLUDE_LIMIT %s\n", ++ (const xmlChar*)include_limit_env, ++ NULL); ++ return(NULL); ++ } ++ if (val) ++ ctxt->incLimit = val; ++ } ++ } ++ + /* + * First step is to parse the input document into an DOM/Infoset + */ +diff --git a/runtest.c b/runtest.c +index 49519aef..45109f0a 100644 +--- a/runtest.c ++++ b/runtest.c +@@ -3832,6 +3832,70 @@ rngTest(const char *filename, + return(ret); + } + ++/** ++ * Parse an RNG schemas with a custom RNG_INCLUDE_LIMIT ++ * ++ * @param filename the schemas file ++ * @param result the file with expected result ++ * @param err the file with error messages ++ * @returns 0 in case of success, an error code otherwise ++ */ ++static int ++rngIncludeTest(const char *filename, ++ const char *resul ATTRIBUTE_UNUSED, ++ const char *errr ATTRIBUTE_UNUSED, ++ int options ATTRIBUTE_UNUSED) { ++ xmlRelaxNGParserCtxtPtr ctxt; ++ xmlRelaxNGPtr schemas; ++ int ret = 0; ++ ++ /* first compile the schemas if possible */ ++ ctxt = xmlRelaxNGNewParserCtxt(filename); ++ xmlRelaxNGSetParserStructuredErrors(ctxt, testStructuredErrorHandler, ++ NULL); ++ ++ /* Should work */ ++ schemas = xmlRelaxNGParse(ctxt); ++ if (schemas == NULL) { ++ testErrorHandler(NULL, "Relax-NG schema %s failed to compile\n", ++ filename); ++ ret = -1; ++ goto done; ++ } ++ xmlRelaxNGFree(schemas); ++ xmlRelaxNGFreeParserCtxt(ctxt); ++ ++ ctxt = xmlRelaxNGNewParserCtxt(filename); ++ /* Should fail */ ++ xmlRelaxParserSetIncLImit(ctxt, 2); ++ xmlRelaxNGSetParserStructuredErrors(ctxt, testStructuredErrorHandler, ++ NULL); ++ schemas = xmlRelaxNGParse(ctxt); ++ if (schemas != NULL) { ++ ret = -1; ++ xmlRelaxNGFree(schemas); ++ } ++ xmlRelaxNGFreeParserCtxt(ctxt); ++ ++ ctxt = xmlRelaxNGNewParserCtxt(filename); ++ /* Should work */ ++ xmlRelaxParserSetIncLImit(ctxt, 3); ++ xmlRelaxNGSetParserStructuredErrors(ctxt, testStructuredErrorHandler, ++ NULL); ++ schemas = xmlRelaxNGParse(ctxt); ++ if (schemas == NULL) { ++ testErrorHandler(NULL, "Relax-NG schema %s failed to compile\n", ++ filename); ++ ret = -1; ++ goto done; ++ } ++ xmlRelaxNGFree(schemas); ++ ++done: ++ xmlRelaxNGFreeParserCtxt(ctxt); ++ return(ret); ++} ++ + #ifdef LIBXML_READER_ENABLED + /** + * rngStreamTest: +@@ -5299,6 +5363,9 @@ testDesc testDescriptions[] = { + { "Relax-NG regression tests" , + rngTest, "./test/relaxng/*.rng", NULL, NULL, NULL, + XML_PARSE_DTDATTR | XML_PARSE_NOENT }, ++ { "Relax-NG include limit tests" , ++ rngIncludeTest, "./test/relaxng/include/include-limit.rng", NULL, NULL, NULL, ++ 0 }, + #ifdef LIBXML_READER_ENABLED + { "Relax-NG streaming regression tests" , + rngStreamTest, "./test/relaxng/*.rng", NULL, NULL, NULL, +diff --git a/test/relaxng/include/include-limit.rng b/test/relaxng/include/include-limit.rng +new file mode 100644 +index 00000000..51f03942 +--- /dev/null ++++ b/test/relaxng/include/include-limit.rng +@@ -0,0 +1,4 @@ ++ ++ ++ ++ +diff --git a/test/relaxng/include/include-limit_1.rng b/test/relaxng/include/include-limit_1.rng +new file mode 100644 +index 00000000..4672da38 +--- /dev/null ++++ b/test/relaxng/include/include-limit_1.rng +@@ -0,0 +1,4 @@ ++ ++ ++ ++ +diff --git a/test/relaxng/include/include-limit_2.rng b/test/relaxng/include/include-limit_2.rng +new file mode 100644 +index 00000000..b35ecaa8 +--- /dev/null ++++ b/test/relaxng/include/include-limit_2.rng +@@ -0,0 +1,4 @@ ++ ++ ++ ++ +diff --git a/test/relaxng/include/include-limit_3.rng b/test/relaxng/include/include-limit_3.rng +new file mode 100644 +index 00000000..86213c62 +--- /dev/null ++++ b/test/relaxng/include/include-limit_3.rng +@@ -0,0 +1,8 @@ ++ ++ ++ ++ ++ ++ ++ ++ diff --git a/meta/recipes-core/libxml/libxml2_2.14.6.bb b/meta/recipes-core/libxml/libxml2_2.14.6.bb index 6ed8760f4cd..f214fcd88f6 100644 --- a/meta/recipes-core/libxml/libxml2_2.14.6.bb +++ b/meta/recipes-core/libxml/libxml2_2.14.6.bb @@ -19,6 +19,7 @@ SRC_URI += "http://www.w3.org/XML/Test/xmlts20130923.tar;subdir=${BP};name=testt file://install-tests.patch \ file://0001-Revert-cmake-Fix-installation-directories-in-libxml2.patch \ file://CVE-2025-6021.patch \ + file://CVE-2026-0989.patch \ " SRC_URI[archive.sha256sum] = "7ce458a0affeb83f0b55f1f4f9e0e55735dbfc1a9de124ee86fb4a66b597203a" From patchwork Sat Jan 31 07:56:31 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 80131 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 98FD7D79761 for ; Sat, 31 Jan 2026 07:57:16 +0000 (UTC) Received: from mail-wm1-f41.google.com (mail-wm1-f41.google.com [209.85.128.41]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.5012.1769846230054765577 for ; Fri, 30 Jan 2026 23:57:10 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=bCHpdQza; spf=pass (domain: smile.fr, ip: 209.85.128.41, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f41.google.com with SMTP id 5b1f17b1804b1-4806fbc6bf3so29283505e9.2 for ; Fri, 30 Jan 2026 23:57:09 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1769846228; x=1770451028; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=hVnYBIZkPJEM46n6wdRq2rGL8cCprUD2lhx4NFA8VaQ=; b=bCHpdQzaqIEYKhnKnGFBlT+1pOzanBfMwPgq4bGzpjrOZTmUyAIAzeT5r2cMjrWT7J crH5VnRQ8MFZlSR5TScv9Mum0KLvKV5aKJvWnPMWQGolZCstrgDyKCRnvWeZtSC1/fCl fOcOEdv5lN2tuE5QeRud+nKZFjS9z6IAFFaGk= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1769846228; x=1770451028; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=hVnYBIZkPJEM46n6wdRq2rGL8cCprUD2lhx4NFA8VaQ=; b=irdXJqiwTKWSL3Vqc5J9S+08x6HbUKBzaz84nES/6+dR6dX2wHPiowuXhqzh7nHgfW 5g5GusrI845aEOcnkPTSW1/tDI9wscuJAfgGOiQpzweSJeVFYs0NmBck8n3hB7j7AlCO 2eIOp/MsLErFEbXBSjYbR2aBzTJNauBnf45MzkS/8pYkA2WEca6m9ea7oYUjPOSOEWT+ XnYRd4hPe2FJry2yOJadTT1p/Y9+ysYMsyHQpF65vlH1/4OKSjtJeZXAcX/WbSi0VzRX cW2sG2CCYdloVLndreWAdPq+36x+Z9aHWLwCrC4/OBQosPkMftGvOptW4JzHmEyA6+Mv ld/A== X-Gm-Message-State: AOJu0Yx4ZrqvnmXkswubSc/KloagabXAfyFTC58kc7Wa0MU9Q9hQlcqW qMk3i3Vbco95Bs8FKugQDWbxOjDTGMdnvU4Evj+BTEaJ7/8olDNpagRJDYqe2aJEpUFpBdAvWKF Ltyj64N0= X-Gm-Gg: AZuq6aK5qO05qYniFvFEl4mVCwQ+LO4j4ypijfY9NErSMydW9BYZVq8KkiZ7ZfP6aaG 5gi+CpViVHSmYLYoiDtqFOqWpTZ6vY5scFfNpNf98rVA17Mh+on2jR/2l9tBOkKUhTwCBTpJzq7 OiucyG6/yQ65tc4hSKo7RTrvG5eOiTp6xIK708OfL4LacpjMLsw0GdEhOahzXt9GLOHPS97UKx7 RTxYtP7MbpZVYrYaNC5+mA40aiD4hzOhQhPWaXiySvZw9xhwwVLQ/KU4+kE8uCi5cdCcJptpSpC 5rfB0JXGE5CCsXa/KszORrolTmirqbh7nCM3QDpCPbdPNKu8D7MYbLubLqF+1XBairK5bOzsd6b dLEv0o+ZuWdy1GUXHBlUmcW5A1qsCAC/wGXN/ZKinc4VxgmUtSNlPbKiKDU3ClXZW/8xmsmmE+2 zInkVofb1rS1eRFSeGX7N2+XwUomCZEKHLlmab72laMI5+CBtc2X2ycm+qwjGNfaxXN8k9AyTpL uDqIBwJV+GsvEzw X-Received: by 2002:a05:600c:64c6:b0:477:5ad9:6df1 with SMTP id 5b1f17b1804b1-482db4593a1mr66102475e9.3.1769846228184; Fri, 30 Jan 2026 23:57:08 -0800 (PST) Received: from FRSMI25-LASER.home (2a01cb001331aa00fa8b238ae1dd6dd8.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:fa8b:238a:e1dd:6dd8]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4806ce564f9sm258621475e9.14.2026.01.30.23.57.07 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 30 Jan 2026 23:57:07 -0800 (PST) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 20/22] libxml2: patch CVE-2026-0990 Date: Sat, 31 Jan 2026 08:56:31 +0100 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 31 Jan 2026 07:57:16 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/230225 From: Peter Marko Pick patch which closed [1]. [1] https://gitlab.gnome.org/GNOME/libxml2/-/issues/1018 Signed-off-by: Peter Marko Signed-off-by: Yoann Congal --- .../libxml/libxml2/CVE-2026-0990.patch | 76 +++++++++++++++++++ meta/recipes-core/libxml/libxml2_2.14.6.bb | 1 + 2 files changed, 77 insertions(+) create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2026-0990.patch diff --git a/meta/recipes-core/libxml/libxml2/CVE-2026-0990.patch b/meta/recipes-core/libxml/libxml2/CVE-2026-0990.patch new file mode 100644 index 00000000000..62cb8c27541 --- /dev/null +++ b/meta/recipes-core/libxml/libxml2/CVE-2026-0990.patch @@ -0,0 +1,76 @@ +From 1961208e958ca22f80a0b4e4c9d71cfa050aa982 Mon Sep 17 00:00:00 2001 +From: Daniel Garcia Moreno +Date: Wed, 17 Dec 2025 15:24:08 +0100 +Subject: [PATCH] catalog: prevent inf recursion in xmlCatalogXMLResolveURI + +Fix https://gitlab.gnome.org/GNOME/libxml2/-/issues/1018 + +CVE: CVE-2026-0990 +Upstream-Status: Backport [https://gitlab.gnome.org/GNOME/libxml2/-/commit/1961208e958ca22f80a0b4e4c9d71cfa050aa982] +Signed-off-by: Peter Marko +--- + catalog.c | 31 +++++++++++++++++++++++-------- + 1 file changed, 23 insertions(+), 8 deletions(-) + +diff --git a/catalog.c b/catalog.c +index 76c063a8..46b877e6 100644 +--- a/catalog.c ++++ b/catalog.c +@@ -2047,12 +2047,21 @@ static xmlChar * + xmlCatalogListXMLResolveURI(xmlCatalogEntryPtr catal, const xmlChar *URI) { + xmlChar *ret = NULL; + xmlChar *urnID = NULL; ++ xmlCatalogEntryPtr cur = NULL; + + if (catal == NULL) + return(NULL); + if (URI == NULL) + return(NULL); + ++ if (catal->depth > MAX_CATAL_DEPTH) { ++ xmlCatalogErr(catal, NULL, XML_CATALOG_RECURSION, ++ "Detected recursion in catalog %s\n", ++ catal->name, NULL, NULL); ++ return(NULL); ++ } ++ catal->depth++; ++ + if (!xmlStrncmp(URI, BAD_CAST XML_URN_PUBID, sizeof(XML_URN_PUBID) - 1)) { + urnID = xmlCatalogUnWrapURN(URI); + if (xmlDebugCatalogs) { +@@ -2066,21 +2075,27 @@ xmlCatalogListXMLResolveURI(xmlCatalogEntryPtr catal, const xmlChar *URI) { + ret = xmlCatalogListXMLResolve(catal, urnID, NULL); + if (urnID != NULL) + xmlFree(urnID); ++ catal->depth--; + return(ret); + } +- while (catal != NULL) { +- if (catal->type == XML_CATA_CATALOG) { +- if (catal->children == NULL) { +- xmlFetchXMLCatalogFile(catal); ++ cur = catal; ++ while (cur != NULL) { ++ if (cur->type == XML_CATA_CATALOG) { ++ if (cur->children == NULL) { ++ xmlFetchXMLCatalogFile(cur); + } +- if (catal->children != NULL) { +- ret = xmlCatalogXMLResolveURI(catal->children, URI); +- if (ret != NULL) ++ if (cur->children != NULL) { ++ ret = xmlCatalogXMLResolveURI(cur->children, URI); ++ if (ret != NULL) { ++ catal->depth--; + return(ret); ++ } + } + } +- catal = catal->next; ++ cur = cur->next; + } ++ ++ catal->depth--; + return(ret); + } + diff --git a/meta/recipes-core/libxml/libxml2_2.14.6.bb b/meta/recipes-core/libxml/libxml2_2.14.6.bb index f214fcd88f6..7b47f823f92 100644 --- a/meta/recipes-core/libxml/libxml2_2.14.6.bb +++ b/meta/recipes-core/libxml/libxml2_2.14.6.bb @@ -20,6 +20,7 @@ SRC_URI += "http://www.w3.org/XML/Test/xmlts20130923.tar;subdir=${BP};name=testt file://0001-Revert-cmake-Fix-installation-directories-in-libxml2.patch \ file://CVE-2025-6021.patch \ file://CVE-2026-0989.patch \ + file://CVE-2026-0990.patch \ " SRC_URI[archive.sha256sum] = "7ce458a0affeb83f0b55f1f4f9e0e55735dbfc1a9de124ee86fb4a66b597203a" From patchwork Sat Jan 31 07:56:32 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 80133 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id B9386D79763 for ; Sat, 31 Jan 2026 07:57:16 +0000 (UTC) Received: from mail-wm1-f51.google.com (mail-wm1-f51.google.com [209.85.128.51]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.5013.1769846232585596009 for ; Fri, 30 Jan 2026 23:57:13 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=uwrZR2sH; spf=pass (domain: smile.fr, ip: 209.85.128.51, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f51.google.com with SMTP id 5b1f17b1804b1-47d6a1f08bbso12906135e9.2 for ; Fri, 30 Jan 2026 23:57:12 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1769846231; x=1770451031; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=crVrDbJfw1B7BvO5xnlyeQlmezp8oA4oAgxE0bntKYU=; b=uwrZR2sHADq0u0M90pcCF1ih31ZrjFH1tVZFWeCJeT4MUhZxS4X0AQF7+bTJiX3yVj NlxzzOeEB5jahMyEegqi314pswymiziax9JOrVS9q7Mk6zHj2QundqjTNgtLitFUKE3O pZOyDLobNyLFmWDPspE//ZlWVqJcQ0Wt5K/VM= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1769846231; x=1770451031; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=crVrDbJfw1B7BvO5xnlyeQlmezp8oA4oAgxE0bntKYU=; b=roy/KcyBP7BkeOt2IzZAGnphyXnazKORULAJxYnnOMzMxCj91JL6xsXbDKq2j0D9oK Q52Mf4SNUtNgKSjXyyczQfv5bI8+d+PyClEB02frfr65opfGMAh1PtIHS8JoO0M42aBo 9Wy//hu+/RB18hqw9ZxhvGBe4pEbCDQuYbO2ou3f45h1heeQ7aY6UDT9DJGlPdqW6VQP qQu1PoTKzlS2F7vxPuQPs8ZpV9M44FW3MClb1SXv4AXCQHfMnnP7t3lvVpJmEiNS5BEo +uGYDDh5F0SsWpJr+vvsVnJLgbw2EOdEwOVl5A9FO+aPYsNTDJNgS9FSweU0kw/73J7j hfWg== X-Gm-Message-State: AOJu0YxsE0/rNmRtFBz6wqm9XmQvoIw4Iv6Kn14FurwzlVrURRxJdxg5 F2o1PEBYv0w9AgSYsL0KoYqsR8yRM3ggTylM17jXwuQxwP2NeKwHlaw2fRqsrFSos6iEQJtD2lB F+lBLPAA= X-Gm-Gg: AZuq6aLhS4lg8+OmHb8Ydx2n4V7wEJDPZSRVQo+arJkqlzEH9D7JZimKIpYndMzC1w0 QSpN8xSoiRpXwvvHEGXo/g/DefV6+KlCx0Q+4BfJKfE5cggXSSOXsu5PDWHzD8XfXaYhWnHgw+4 B8ega60jQPo83dM3IMWD4dJqrMdoMcgh3jsqOLFCbD4KtXnPcItE2xqCBKw9z1UBdegSQgfvJ3p JCb32mAOwa93hw9WUvOuQe9e/iYIXRIYnOYUjt3pMSehZxmeZAKs5+8IMLn2bVB7HUzkXtoXEOa aZzFhpySGzrqpTFB/gFWmfitVTtZrgzvaAhk30bxyguHcj7j5xpbS94AP+xJXFUGmfpU8arUB7l cgqY5vKquaTJfymp10Pbd0wqMIEzC7TmBho9d66W50bfOKyqunp7TUsFH7dQY/fOSFdPJHPwtlt 6QRcSVnXeLo0b6kHvkAb6dCAx8oDtFXfLWXaK0tO33BehqoraLaECwY3otGbKtTv16qjD0PnrxK 0WE3Rrs78GWtIiZk/AttrNQolo= X-Received: by 2002:a05:600c:1c20:b0:475:de14:db1e with SMTP id 5b1f17b1804b1-482db4d84d1mr63147245e9.24.1769846229460; Fri, 30 Jan 2026 23:57:09 -0800 (PST) Received: from FRSMI25-LASER.home (2a01cb001331aa00fa8b238ae1dd6dd8.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:fa8b:238a:e1dd:6dd8]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4806ce564f9sm258621475e9.14.2026.01.30.23.57.08 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 30 Jan 2026 23:57:08 -0800 (PST) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 21/22] binutils: Upgrade to 2.45.1 release Date: Sat, 31 Jan 2026 08:56:32 +0100 Message-ID: <584314753aada4e40ef507f6f336091f1bf094bf.1769845858.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 31 Jan 2026 07:57:16 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/230227 From: Hemanth Kumar M D Brings binutils 2.45.1 release and followed by latest commits: 12d0a1dbc1b i386: Add GLIBC_ABI_GNU_TLS dependency only if used e3a18893e1c LoongArch: Use more appropriate assertions for the relocation of TLS LE b136efd10a7 Re: dlltool memory leaks b4bde11f310 ld: Don't use -mdirect-extern-access for LoongArch a813a6a6ea0 Re-enable development on the 2.45 branch 48324fde1e2 (tag: binutils-2_45_1) This is the 2.45.1 release ab776bc8685 lto: Set plugin_format to bfd_plugin_no only if known_used is set cec7ab85f24 aarch64: gas: Allow movprfx with fmmla and bfscale [PR gas/33562] 0b040187894 aarch64, gas: Relax Armv9.6-A mandatory feature set 4df2be75910 i386: Add GLIBC_ABI_GNU_TLS version dependency 71c1de4b0c8 x86-64: Add GLIBC_ABI_DT_X86_64_PLT version dependency b0fe5c23780 x86: Add GLIBC_ABI_GNU2_TLS version dependency d5945a221ff x86: Copy non_got_ref_without_indirect_extern_access Testing Results: +-------------------------------+--------+--------+------+ | Metric | Before | After | Diff | +-------------------------------+--------+--------+------+ | Expected passes | 317 | 317 | 0 | | Unexpected failures | 1 | 1 | 0 | | Untested testcases | 5 | 5 | 0 | | Unsupported tests | 8 | 8 | 0 | +-------------------------------+--------+--------+------+ ld/configure is regenerated. Signed-off-by: Hemanth Kumar M D Signed-off-by: Yoann Congal --- .../binutils/binutils-2.45.inc | 6 +- ...-system-directories-when-cross-linki.patch | 38 +- .../binutils/0008-Use-libtool-2.4.patch | 1827 ++++++++--------- 3 files changed, 836 insertions(+), 1035 deletions(-) diff --git a/meta/recipes-devtools/binutils/binutils-2.45.inc b/meta/recipes-devtools/binutils/binutils-2.45.inc index 16a63cabc5b..fea07ab9163 100644 --- a/meta/recipes-devtools/binutils/binutils-2.45.inc +++ b/meta/recipes-devtools/binutils/binutils-2.45.inc @@ -12,8 +12,8 @@ LIC_FILES_CHKSUM = "\ # When upgrading to next major release, ensure that there is no trailing .0, so # that upstream version check can work correctly. -PV = "2.45" -CVE_VERSION = "2.45" +PV = "2.45.1" +CVE_VERSION = "2.45.1" SRCBRANCH ?= "binutils-2_45-branch" UPSTREAM_CHECK_GITTAGREGEX = "binutils-(?P\d+_(\d_?)*)" @@ -21,7 +21,7 @@ UPSTREAM_CHECK_GITTAGREGEX = "binutils-(?P\d+_(\d_?)*)" CVE_STATUS[CVE-2025-7545] = "cpe-stable-backport: fix available in used git hash" CVE_STATUS[CVE-2025-7546] = "cpe-stable-backport: fix available in used git hash" -SRCREV ?= "2f028c6bb163a045db95439fb92e1dcbc919413c" +SRCREV ?= "b1300fdc25572ab9f523249aea2363f844f47957" BINUTILS_GIT_URI ?= "git://sourceware.org/git/binutils-gdb.git;branch=${SRCBRANCH};protocol=https" SRC_URI = "\ ${BINUTILS_GIT_URI} \ diff --git a/meta/recipes-devtools/binutils/binutils/0006-warn-for-uses-of-system-directories-when-cross-linki.patch b/meta/recipes-devtools/binutils/binutils/0006-warn-for-uses-of-system-directories-when-cross-linki.patch index 86ff7fdaa02..42374cbd313 100644 --- a/meta/recipes-devtools/binutils/binutils/0006-warn-for-uses-of-system-directories-when-cross-linki.patch +++ b/meta/recipes-devtools/binutils/binutils/0006-warn-for-uses-of-system-directories-when-cross-linki.patch @@ -63,10 +63,10 @@ Signed-off-by: Khem Raj 9 files changed, 89 insertions(+), 4 deletions(-) diff --git a/ld/config.in b/ld/config.in -index 37812241bd9..be89571196c 100644 +index 790efd336be..2b237bcda5e 100644 --- a/ld/config.in +++ b/ld/config.in -@@ -78,6 +78,9 @@ +@@ -86,6 +86,9 @@ language is requested. */ #undef ENABLE_NLS @@ -77,7 +77,7 @@ index 37812241bd9..be89571196c 100644 #undef EXTRA_SHLIB_EXTENSION diff --git a/ld/configure b/ld/configure -index 4afc58566fc..ca3d58ff618 100755 +index cd410bd64d1..d3c0762133c 100755 --- a/ld/configure +++ b/ld/configure @@ -841,6 +841,7 @@ enable_checking @@ -88,7 +88,7 @@ index 4afc58566fc..ca3d58ff618 100755 enable_gold enable_got enable_compressed_debug_sections -@@ -1533,6 +1534,8 @@ Optional Features: +@@ -1535,6 +1536,8 @@ Optional Features: --disable-largefile omit support for large files --enable-checking enable run-time checks --enable-targets alternative target configurations @@ -97,25 +97,25 @@ index 4afc58566fc..ca3d58ff618 100755 --enable-gold[=ARG] build gold [ARG={default,yes,no}] --enable-got= GOT handling scheme (target, single, negative, multigot) -@@ -11514,7 +11517,7 @@ else +@@ -11519,7 +11522,7 @@ else lt_dlunknown=0; lt_dlno_uscore=1; lt_dlneed_uscore=2 lt_status=$lt_dlunknown cat > conftest.$ac_ext <<_LT_EOF --#line 11517 "configure" -+#line 11520 "configure" +-#line 11522 "configure" ++#line 11525 "configure" #include "confdefs.h" #if HAVE_DLFCN_H -@@ -11620,7 +11623,7 @@ else +@@ -11625,7 +11628,7 @@ else lt_dlunknown=0; lt_dlno_uscore=1; lt_dlneed_uscore=2 lt_status=$lt_dlunknown cat > conftest.$ac_ext <<_LT_EOF --#line 11623 "configure" -+#line 11626 "configure" +-#line 11628 "configure" ++#line 11631 "configure" #include "confdefs.h" #if HAVE_DLFCN_H -@@ -15367,6 +15370,19 @@ fi +@@ -15372,6 +15375,19 @@ fi @@ -136,7 +136,7 @@ index 4afc58566fc..ca3d58ff618 100755 if test "${enable_gold+set}" = set; then : enableval=$enable_gold; case "${enableval}" in diff --git a/ld/configure.ac b/ld/configure.ac -index 3ee84958b1c..99ea84513da 100644 +index f528ae42ef7..dcf1e17fae6 100644 --- a/ld/configure.ac +++ b/ld/configure.ac @@ -115,6 +115,16 @@ AC_SUBST(use_sysroot) @@ -176,10 +176,10 @@ index c8688153bd4..0b16caf347a 100644 enum endian_enum endian; diff --git a/ld/ld.texi b/ld/ld.texi -index 413335ad765..7bea7fd7e1f 100644 +index cf750d15259..3b3f1c53c37 100644 --- a/ld/ld.texi +++ b/ld/ld.texi -@@ -3350,6 +3350,18 @@ creation of the metadata note, if one had been enabled by an earlier +@@ -3378,6 +3378,18 @@ creation of the metadata note, if one had been enabled by an earlier occurrence of the --package-metadata option. If the linker has been built with libjansson, then the JSON string will be validated. @@ -227,7 +227,7 @@ index 75fd360d5e3..5a825c52bd3 100644 static void diff --git a/ld/ldlex.h b/ld/ldlex.h -index 815da76a4c0..53fabed4ba2 100644 +index c8d61478c60..c54eef8c170 100644 --- a/ld/ldlex.h +++ b/ld/ldlex.h @@ -151,6 +151,8 @@ enum option_values @@ -240,10 +240,10 @@ index 815da76a4c0..53fabed4ba2 100644 OPTION_PRINT_OUTPUT_FORMAT, OPTION_PRINT_SYSROOT, diff --git a/ld/ldmain.c b/ld/ldmain.c -index 7878bd3922f..c9293a3cf41 100644 +index 67c60c3f80d..175321a38cb 100644 --- a/ld/ldmain.c +++ b/ld/ldmain.c -@@ -672,6 +672,8 @@ main (int argc, char **argv) +@@ -671,6 +671,8 @@ main (int argc, char **argv) command_line.warn_mismatch = true; command_line.warn_search_mismatch = true; command_line.check_section_addresses = -1; @@ -252,7 +252,7 @@ index 7878bd3922f..c9293a3cf41 100644 /* We initialize DEMANGLING based on the environment variable COLLECT_NO_DEMANGLE. The gcc collect2 program will demangle the -@@ -1876,7 +1878,7 @@ undefined_symbol (struct bfd_link_info *info, +@@ -1875,7 +1877,7 @@ undefined_symbol (struct bfd_link_info *info, argv[1] = "undefined-symbol"; argv[2] = (char *) name; argv[3] = NULL; @@ -261,7 +261,7 @@ index 7878bd3922f..c9293a3cf41 100644 if (verbose) einfo (_("%P: About to run error handling script '%s' with arguments: '%s' '%s'\n"), argv[0], argv[1], argv[2]); -@@ -1897,7 +1899,7 @@ undefined_symbol (struct bfd_link_info *info, +@@ -1896,7 +1898,7 @@ undefined_symbol (struct bfd_link_info *info, carry on to issue the normal error message. */ } #endif /* SUPPORT_ERROR_HANDLING_SCRIPT */ diff --git a/meta/recipes-devtools/binutils/binutils/0008-Use-libtool-2.4.patch b/meta/recipes-devtools/binutils/binutils/0008-Use-libtool-2.4.patch index dd26bc61076..91569d2d063 100644 --- a/meta/recipes-devtools/binutils/binutils/0008-Use-libtool-2.4.patch +++ b/meta/recipes-devtools/binutils/binutils/0008-Use-libtool-2.4.patch @@ -45,8 +45,6 @@ Signed-off-by: Khem Raj zlib/configure | 1331 ++++++++---- 34 files changed, 15653 insertions(+), 5737 deletions(-) -diff --git a/bfd/Makefile.in b/bfd/Makefile.in -index 8a670ad1d05..ec2850a97c0 100644 --- a/bfd/Makefile.in +++ b/bfd/Makefile.in @@ -339,6 +339,7 @@ DATADIRNAME = @DATADIRNAME@ @@ -73,8 +71,6 @@ index 8a670ad1d05..ec2850a97c0 100644 ac_ct_CC = @ac_ct_CC@ ac_ct_DUMPBIN = @ac_ct_DUMPBIN@ all_backends = @all_backends@ -diff --git a/bfd/configure b/bfd/configure -index 86561b30ac4..c5a7ed1ed36 100755 --- a/bfd/configure +++ b/bfd/configure @@ -710,6 +710,9 @@ OTOOL @@ -124,7 +120,7 @@ index 86561b30ac4..c5a7ed1ed36 100755 test "X`print -r -- $ECHO 2>/dev/null`" = "X$ECHO"; then ECHO='print -r --' elif test "X`printf %s $ECHO 2>/dev/null`" = "X$ECHO"; then -@@ -5793,8 +5799,8 @@ $as_echo_n "checking whether the shell understands some XSI constructs... " >&6; +@@ -5793,8 +5799,8 @@ $as_echo_n "checking whether the shell u # Try some XSI features xsi_shell=no ( _lt_dummy="a/b/c" @@ -260,7 +256,7 @@ index 86561b30ac4..c5a7ed1ed36 100755 file_magic_cmd=$lt_cv_file_magic_cmd deplibs_check_method=$lt_cv_deplibs_check_method test -z "$deplibs_check_method" && deplibs_check_method=unknown -@@ -6201,6 +6302,157 @@ test -z "$deplibs_check_method" && deplibs_check_method=unknown +@@ -6201,6 +6302,157 @@ test -z "$deplibs_check_method" && depli @@ -479,7 +475,7 @@ index 86561b30ac4..c5a7ed1ed36 100755 if test "x$ac_ct_AR" = x; then AR="false" else -@@ -6302,25 +6564,20 @@ ac_tool_warned=yes ;; +@@ -6302,25 +6564,19 @@ ac_tool_warned=yes ;; esac AR=$ac_ct_AR fi @@ -511,11 +507,10 @@ index 86561b30ac4..c5a7ed1ed36 100755 + rm -f conftest.* +: ${AR=ar} +: ${AR_FLAGS=cru} -+ -@@ -6331,6 +6588,63 @@ test -z "$AR_FLAGS" && AR_FLAGS=cru +@@ -6332,6 +6588,64 @@ test -z "$AR_FLAGS" && AR_FLAGS=cru @@ -576,9 +571,10 @@ index 86561b30ac4..c5a7ed1ed36 100755 + + + - ++ if test -n "$ac_tool_prefix"; then # Extract the first word of "${ac_tool_prefix}strip", so it can be a program name with args. + set dummy ${ac_tool_prefix}strip; ac_word=$2 @@ -6671,8 +6985,8 @@ esac lt_cv_sys_global_symbol_to_cdecl="sed -n -e 's/^T .* \(.*\)$/extern int \1();/p' -e 's/^$symcode* .* \(.*\)$/extern char \1;/p'" @@ -626,7 +622,7 @@ index 86561b30ac4..c5a7ed1ed36 100755 const char *name; void *address; } -@@ -6786,8 +7113,8 @@ static const void *lt_preloaded_setup() { +@@ -6786,8 +7113,8 @@ static const void *lt_preloaded_setup() _LT_EOF # Now try linking the two files. mv conftest.$ac_objext conftstm.$ac_objext @@ -648,7 +644,7 @@ index 86561b30ac4..c5a7ed1ed36 100755 else echo "cannot find nm_test_func in $nlist" >&5 fi -@@ -6835,6 +7162,14 @@ else +@@ -6835,6 +7162,18 @@ else $as_echo "ok" >&6; } fi @@ -660,20 +656,17 @@ index 86561b30ac4..c5a7ed1ed36 100755 +fi + + ++ ++ ++ ++ -@@ -6853,6 +7188,47 @@ fi +@@ -6856,6 +7195,43 @@ fi -+ -+ -+ -+ -+ -+ -+ +{ $as_echo "$as_me:${as_lineno-$LINENO}: checking for sysroot" >&5 +$as_echo_n "checking for sysroot... " >&6; } + @@ -708,9 +701,12 @@ index 86561b30ac4..c5a7ed1ed36 100755 +$as_echo "${lt_sysroot:-no}" >&6; } + + - - - ++ ++ ++ + # Check whether --enable-libtool-lock was given. + if test "${enable_libtool_lock+set}" = set; then : + enableval=$enable_libtool_lock; @@ -7062,6 +7438,123 @@ esac need_locks="$enable_libtool_lock" @@ -853,7 +849,7 @@ index 86561b30ac4..c5a7ed1ed36 100755 if test "$GCC" = yes; then lt_prog_compiler_wl='-Wl,' -@@ -8345,6 +8838,12 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -8345,6 +8838,12 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='--shared' lt_prog_compiler_static='--static' ;; @@ -866,7 +862,7 @@ index 86561b30ac4..c5a7ed1ed36 100755 pgcc* | pgf77* | pgf90* | pgf95* | pgfortran*) # Portland Group compilers (*not* the Pentium gcc compiler, # which looks to be a dead project) -@@ -8407,7 +8906,7 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -8407,7 +8906,7 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='-KPIC' lt_prog_compiler_static='-Bstatic' case $cc_basename in @@ -1027,7 +1023,7 @@ index 86561b30ac4..c5a7ed1ed36 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" archive_expsym_cmds='$CC -o $output_objdir/$soname $libobjs $deplibs '"\${wl}$no_entry_flag"' $compiler_flags `if test "x${allow_undefined_flag}" != "x"; then func_echo_all "${wl}${allow_undefined_flag}"; else :; fi` '"\${wl}$exp_sym_flag:\$export_symbols $shared_flag" -@@ -9236,7 +9758,13 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9236,7 +9758,13 @@ if test -z "$aix_libpath"; then aix_libp else # Determine the default libpath from the value encoded in an # empty executable. @@ -1085,7 +1081,7 @@ index 86561b30ac4..c5a7ed1ed36 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" # Warning - without using the other run time loading flags, -@@ -9309,20 +9844,63 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9309,20 +9844,63 @@ if test -z "$aix_libpath"; then aix_libp # Microsoft Visual C++. # hardcode_libdir_flag_spec is actually meaningless, as there is # no search path for DLLs. @@ -1163,7 +1159,7 @@ index 86561b30ac4..c5a7ed1ed36 100755 ;; darwin* | rhapsody*) -@@ -9383,7 +9961,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9383,7 +9961,7 @@ if test -z "$aix_libpath"; then aix_libp # FreeBSD 3 and greater uses gcc -shared to do shared libraries. freebsd* | dragonfly*) @@ -1172,7 +1168,7 @@ index 86561b30ac4..c5a7ed1ed36 100755 hardcode_libdir_flag_spec='-R$libdir' hardcode_direct=yes hardcode_shlibpath_var=no -@@ -9391,7 +9969,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9391,7 +9969,7 @@ if test -z "$aix_libpath"; then aix_libp hpux9*) if test "$GCC" = yes; then @@ -1181,7 +1177,7 @@ index 86561b30ac4..c5a7ed1ed36 100755 else archive_cmds='$RM $output_objdir/$soname~$LD -b +b $install_libdir -o $output_objdir/$soname $libobjs $deplibs $linker_flags~test $output_objdir/$soname = $lib || mv $output_objdir/$soname $lib' fi -@@ -9407,7 +9985,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9407,7 +9985,7 @@ if test -z "$aix_libpath"; then aix_libp hpux10*) if test "$GCC" = yes && test "$with_gnu_ld" = no; then @@ -1190,7 +1186,7 @@ index 86561b30ac4..c5a7ed1ed36 100755 else archive_cmds='$LD -b +h $soname +b $install_libdir -o $lib $libobjs $deplibs $linker_flags' fi -@@ -9431,10 +10009,10 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9431,10 +10009,10 @@ if test -z "$aix_libpath"; then aix_libp archive_cmds='$CC -shared ${wl}+h ${wl}$soname ${wl}+nodefaultrpath -o $lib $libobjs $deplibs $compiler_flags' ;; ia64*) @@ -1248,7 +1244,7 @@ index 86561b30ac4..c5a7ed1ed36 100755 else archive_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -o $lib' archive_expsym_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -exports_file $export_symbols -o $lib' -@@ -9614,7 +10205,7 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -9614,7 +10205,7 @@ rm -f core conftest.err conftest.$ac_obj osf4* | osf5*) # as osf3* with the addition of -msym flag if test "$GCC" = yes; then allow_undefined_flag=' ${wl}-expect_unresolved ${wl}\*' @@ -1257,7 +1253,7 @@ index 86561b30ac4..c5a7ed1ed36 100755 hardcode_libdir_flag_spec='${wl}-rpath ${wl}$libdir' else allow_undefined_flag=' -expect_unresolved \*' -@@ -9633,9 +10224,9 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -9633,9 +10224,9 @@ rm -f core conftest.err conftest.$ac_obj no_undefined_flag=' -z defs' if test "$GCC" = yes; then wlarc='${wl}' @@ -1407,7 +1403,7 @@ index 86561b30ac4..c5a7ed1ed36 100755 fi fi -@@ -17977,13 +18627,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_single_quote_subst"`' +@@ -17977,13 +18627,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_ lt_unset='`$ECHO "$lt_unset" | $SED "$delay_single_quote_subst"`' lt_SP2NL='`$ECHO "$lt_SP2NL" | $SED "$delay_single_quote_subst"`' lt_NL2SP='`$ECHO "$lt_NL2SP" | $SED "$delay_single_quote_subst"`' @@ -1428,7 +1424,7 @@ index 86561b30ac4..c5a7ed1ed36 100755 STRIP='`$ECHO "$STRIP" | $SED "$delay_single_quote_subst"`' RANLIB='`$ECHO "$RANLIB" | $SED "$delay_single_quote_subst"`' old_postinstall_cmds='`$ECHO "$old_postinstall_cmds" | $SED "$delay_single_quote_subst"`' -@@ -17998,14 +18655,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$lt_cv_sys_global_symbol_pipe" | $SED "$de +@@ -17998,14 +18655,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$l lt_cv_sys_global_symbol_to_cdecl='`$ECHO "$lt_cv_sys_global_symbol_to_cdecl" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address_lib_prefix='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address_lib_prefix" | $SED "$delay_single_quote_subst"`' @@ -1447,7 +1443,7 @@ index 86561b30ac4..c5a7ed1ed36 100755 DSYMUTIL='`$ECHO "$DSYMUTIL" | $SED "$delay_single_quote_subst"`' NMEDIT='`$ECHO "$NMEDIT" | $SED "$delay_single_quote_subst"`' LIPO='`$ECHO "$LIPO" | $SED "$delay_single_quote_subst"`' -@@ -18038,12 +18698,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcode_shlibpath_var" | $SED "$delay_single_q +@@ -18038,12 +18698,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcod hardcode_automatic='`$ECHO "$hardcode_automatic" | $SED "$delay_single_quote_subst"`' inherit_rpath='`$ECHO "$inherit_rpath" | $SED "$delay_single_quote_subst"`' link_all_deplibs='`$ECHO "$link_all_deplibs" | $SED "$delay_single_quote_subst"`' @@ -1561,7 +1557,7 @@ index 86561b30ac4..c5a7ed1ed36 100755 # A symbol stripping program. STRIP=$lt_STRIP -@@ -19079,6 +19770,12 @@ global_symbol_to_c_name_address=$lt_lt_cv_sys_global_symbol_to_c_name_address +@@ -19079,6 +19770,12 @@ global_symbol_to_c_name_address=$lt_lt_c # Transform the output of nm in a C name address pair when lib prefix is needed. global_symbol_to_c_name_address_lib_prefix=$lt_lt_cv_sys_global_symbol_to_c_name_address_lib_prefix @@ -1822,15 +1818,9 @@ index 86561b30ac4..c5a7ed1ed36 100755 -_LT_EOF - ;; - esac -- -- -- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ -- || (rm -f "$cfgfile"; exit 1) -- -- mv -f "$cfgfile" "$ofile" || + sed '$q' "$ltmain" >> "$cfgfile" \ + || (rm -f "$cfgfile"; exit 1) -+ + + if test x"$xsi_shell" = xyes; then + sed -e '/^func_dirname ()$/,/^} # func_dirname /c\ +func_dirname ()\ @@ -1988,14 +1978,15 @@ index 86561b30ac4..c5a7ed1ed36 100755 + { $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: Unable to substitute extended shell functions in $ofile" >&5 +$as_echo "$as_me: WARNING: Unable to substitute extended shell functions in $ofile" >&2;} +fi -+ -+ + +- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ +- || (rm -f "$cfgfile"; exit 1) + +- mv -f "$cfgfile" "$ofile" || + mv -f "$cfgfile" "$ofile" || (rm -f "$ofile" && cp "$cfgfile" "$ofile" && rm -f "$cfgfile") chmod +x "$ofile" -diff --git a/bfd/configure.ac b/bfd/configure.ac -index 5879a04785d..5ccc499d8d7 100644 --- a/bfd/configure.ac +++ b/bfd/configure.ac @@ -281,7 +281,7 @@ changequote(,)dnl @@ -2007,8 +1998,6 @@ index 5879a04785d..5ccc499d8d7 100644 fi fi -diff --git a/binutils/Makefile.in b/binutils/Makefile.in -index 549b5a361c8..e1487641218 100644 --- a/binutils/Makefile.in +++ b/binutils/Makefile.in @@ -495,6 +495,7 @@ DEBUGINFOD_LIBS = @DEBUGINFOD_LIBS@ @@ -2035,8 +2024,6 @@ index 549b5a361c8..e1487641218 100644 ac_ct_CC = @ac_ct_CC@ ac_ct_DUMPBIN = @ac_ct_DUMPBIN@ am__include = @am__include@ -diff --git a/binutils/configure b/binutils/configure -index 0ff4539f458..6dca572ea4b 100755 --- a/binutils/configure +++ b/binutils/configure @@ -704,8 +704,11 @@ OTOOL @@ -2088,7 +2075,7 @@ index 0ff4539f458..6dca572ea4b 100755 test "X`print -r -- $ECHO 2>/dev/null`" = "X$ECHO"; then ECHO='print -r --' elif test "X`printf %s $ECHO 2>/dev/null`" = "X$ECHO"; then -@@ -5690,8 +5696,8 @@ $as_echo_n "checking whether the shell understands some XSI constructs... " >&6; +@@ -5690,8 +5696,8 @@ $as_echo_n "checking whether the shell u # Try some XSI features xsi_shell=no ( _lt_dummy="a/b/c" @@ -2224,7 +2211,7 @@ index 0ff4539f458..6dca572ea4b 100755 file_magic_cmd=$lt_cv_file_magic_cmd deplibs_check_method=$lt_cv_deplibs_check_method test -z "$deplibs_check_method" && deplibs_check_method=unknown -@@ -6098,6 +6199,157 @@ test -z "$deplibs_check_method" && deplibs_check_method=unknown +@@ -6098,6 +6199,157 @@ test -z "$deplibs_check_method" && depli @@ -2590,7 +2577,7 @@ index 0ff4539f458..6dca572ea4b 100755 const char *name; void *address; } -@@ -6683,8 +7010,8 @@ static const void *lt_preloaded_setup() { +@@ -6683,8 +7010,8 @@ static const void *lt_preloaded_setup() _LT_EOF # Now try linking the two files. mv conftest.$ac_objext conftstm.$ac_objext @@ -2612,7 +2599,7 @@ index 0ff4539f458..6dca572ea4b 100755 else echo "cannot find nm_test_func in $nlist" >&5 fi -@@ -6732,6 +7059,18 @@ else +@@ -6732,6 +7059,15 @@ else $as_echo "ok" >&6; } fi @@ -2625,18 +2612,13 @@ index 0ff4539f458..6dca572ea4b 100755 + + + -+ -+ -+ -@@ -6748,6 +7087,43 @@ fi +@@ -6753,6 +7089,46 @@ fi -+ -+ + + + @@ -2672,9 +2654,14 @@ index 0ff4539f458..6dca572ea4b 100755 + + { $as_echo "$as_me:${as_lineno-$LINENO}: result: ${lt_sysroot:-no}" >&5 +$as_echo "${lt_sysroot:-no}" >&6; } - - - ++ ++ ++ ++ ++ + # Check whether --enable-libtool-lock was given. + if test "${enable_libtool_lock+set}" = set; then : + enableval=$enable_libtool_lock; @@ -6959,6 +7335,123 @@ esac need_locks="$enable_libtool_lock" @@ -2817,7 +2804,7 @@ index 0ff4539f458..6dca572ea4b 100755 if test "$GCC" = yes; then lt_prog_compiler_wl='-Wl,' -@@ -8273,6 +8766,12 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -8273,6 +8766,12 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='--shared' lt_prog_compiler_static='--static' ;; @@ -2830,7 +2817,7 @@ index 0ff4539f458..6dca572ea4b 100755 pgcc* | pgf77* | pgf90* | pgf95* | pgfortran*) # Portland Group compilers (*not* the Pentium gcc compiler, # which looks to be a dead project) -@@ -8335,7 +8834,7 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -8335,7 +8834,7 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='-KPIC' lt_prog_compiler_static='-Bstatic' case $cc_basename in @@ -2991,7 +2978,7 @@ index 0ff4539f458..6dca572ea4b 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" archive_expsym_cmds='$CC -o $output_objdir/$soname $libobjs $deplibs '"\${wl}$no_entry_flag"' $compiler_flags `if test "x${allow_undefined_flag}" != "x"; then func_echo_all "${wl}${allow_undefined_flag}"; else :; fi` '"\${wl}$exp_sym_flag:\$export_symbols $shared_flag" -@@ -9164,7 +9686,13 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9164,7 +9686,13 @@ if test -z "$aix_libpath"; then aix_libp else # Determine the default libpath from the value encoded in an # empty executable. @@ -3049,7 +3036,7 @@ index 0ff4539f458..6dca572ea4b 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" # Warning - without using the other run time loading flags, -@@ -9237,20 +9772,63 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9237,20 +9772,63 @@ if test -z "$aix_libpath"; then aix_libp # Microsoft Visual C++. # hardcode_libdir_flag_spec is actually meaningless, as there is # no search path for DLLs. @@ -3127,7 +3114,7 @@ index 0ff4539f458..6dca572ea4b 100755 ;; darwin* | rhapsody*) -@@ -9311,7 +9889,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9311,7 +9889,7 @@ if test -z "$aix_libpath"; then aix_libp # FreeBSD 3 and greater uses gcc -shared to do shared libraries. freebsd* | dragonfly*) @@ -3136,7 +3123,7 @@ index 0ff4539f458..6dca572ea4b 100755 hardcode_libdir_flag_spec='-R$libdir' hardcode_direct=yes hardcode_shlibpath_var=no -@@ -9319,7 +9897,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9319,7 +9897,7 @@ if test -z "$aix_libpath"; then aix_libp hpux9*) if test "$GCC" = yes; then @@ -3145,7 +3132,7 @@ index 0ff4539f458..6dca572ea4b 100755 else archive_cmds='$RM $output_objdir/$soname~$LD -b +b $install_libdir -o $output_objdir/$soname $libobjs $deplibs $linker_flags~test $output_objdir/$soname = $lib || mv $output_objdir/$soname $lib' fi -@@ -9335,7 +9913,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9335,7 +9913,7 @@ if test -z "$aix_libpath"; then aix_libp hpux10*) if test "$GCC" = yes && test "$with_gnu_ld" = no; then @@ -3154,7 +3141,7 @@ index 0ff4539f458..6dca572ea4b 100755 else archive_cmds='$LD -b +h $soname +b $install_libdir -o $lib $libobjs $deplibs $linker_flags' fi -@@ -9359,10 +9937,10 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9359,10 +9937,10 @@ if test -z "$aix_libpath"; then aix_libp archive_cmds='$CC -shared ${wl}+h ${wl}$soname ${wl}+nodefaultrpath -o $lib $libobjs $deplibs $compiler_flags' ;; ia64*) @@ -3212,7 +3199,7 @@ index 0ff4539f458..6dca572ea4b 100755 else archive_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -o $lib' archive_expsym_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -exports_file $export_symbols -o $lib' -@@ -9542,7 +10133,7 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -9542,7 +10133,7 @@ rm -f core conftest.err conftest.$ac_obj osf4* | osf5*) # as osf3* with the addition of -msym flag if test "$GCC" = yes; then allow_undefined_flag=' ${wl}-expect_unresolved ${wl}\*' @@ -3221,7 +3208,7 @@ index 0ff4539f458..6dca572ea4b 100755 hardcode_libdir_flag_spec='${wl}-rpath ${wl}$libdir' else allow_undefined_flag=' -expect_unresolved \*' -@@ -9561,9 +10152,9 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -9561,9 +10152,9 @@ rm -f core conftest.err conftest.$ac_obj no_undefined_flag=' -z defs' if test "$GCC" = yes; then wlarc='${wl}' @@ -3362,7 +3349,7 @@ index 0ff4539f458..6dca572ea4b 100755 int main () { void *self = dlopen (0, LT_DLGLOBAL|LT_DLLAZY_OR_NOW); -@@ -17102,13 +17752,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_single_quote_subst"`' +@@ -17102,13 +17752,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_ lt_unset='`$ECHO "$lt_unset" | $SED "$delay_single_quote_subst"`' lt_SP2NL='`$ECHO "$lt_SP2NL" | $SED "$delay_single_quote_subst"`' lt_NL2SP='`$ECHO "$lt_NL2SP" | $SED "$delay_single_quote_subst"`' @@ -3383,7 +3370,7 @@ index 0ff4539f458..6dca572ea4b 100755 STRIP='`$ECHO "$STRIP" | $SED "$delay_single_quote_subst"`' RANLIB='`$ECHO "$RANLIB" | $SED "$delay_single_quote_subst"`' old_postinstall_cmds='`$ECHO "$old_postinstall_cmds" | $SED "$delay_single_quote_subst"`' -@@ -17123,14 +17780,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$lt_cv_sys_global_symbol_pipe" | $SED "$de +@@ -17123,14 +17780,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$l lt_cv_sys_global_symbol_to_cdecl='`$ECHO "$lt_cv_sys_global_symbol_to_cdecl" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address_lib_prefix='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address_lib_prefix" | $SED "$delay_single_quote_subst"`' @@ -3402,7 +3389,7 @@ index 0ff4539f458..6dca572ea4b 100755 DSYMUTIL='`$ECHO "$DSYMUTIL" | $SED "$delay_single_quote_subst"`' NMEDIT='`$ECHO "$NMEDIT" | $SED "$delay_single_quote_subst"`' LIPO='`$ECHO "$LIPO" | $SED "$delay_single_quote_subst"`' -@@ -17163,12 +17823,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcode_shlibpath_var" | $SED "$delay_single_q +@@ -17163,12 +17823,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcod hardcode_automatic='`$ECHO "$hardcode_automatic" | $SED "$delay_single_quote_subst"`' inherit_rpath='`$ECHO "$inherit_rpath" | $SED "$delay_single_quote_subst"`' link_all_deplibs='`$ECHO "$link_all_deplibs" | $SED "$delay_single_quote_subst"`' @@ -3516,7 +3503,7 @@ index 0ff4539f458..6dca572ea4b 100755 # A symbol stripping program. STRIP=$lt_STRIP -@@ -18201,6 +18892,12 @@ global_symbol_to_c_name_address=$lt_lt_cv_sys_global_symbol_to_c_name_address +@@ -18201,6 +18892,12 @@ global_symbol_to_c_name_address=$lt_lt_c # Transform the output of nm in a C name address pair when lib prefix is needed. global_symbol_to_c_name_address_lib_prefix=$lt_lt_cv_sys_global_symbol_to_c_name_address_lib_prefix @@ -3777,15 +3764,9 @@ index 0ff4539f458..6dca572ea4b 100755 -_LT_EOF - ;; - esac -- -- -- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ -- || (rm -f "$cfgfile"; exit 1) -- -- mv -f "$cfgfile" "$ofile" || + sed '$q' "$ltmain" >> "$cfgfile" \ + || (rm -f "$cfgfile"; exit 1) -+ + + if test x"$xsi_shell" = xyes; then + sed -e '/^func_dirname ()$/,/^} # func_dirname /c\ +func_dirname ()\ @@ -3943,14 +3924,15 @@ index 0ff4539f458..6dca572ea4b 100755 + { $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: Unable to substitute extended shell functions in $ofile" >&5 +$as_echo "$as_me: WARNING: Unable to substitute extended shell functions in $ofile" >&2;} +fi -+ -+ + +- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ +- || (rm -f "$cfgfile"; exit 1) + +- mv -f "$cfgfile" "$ofile" || + mv -f "$cfgfile" "$ofile" || (rm -f "$ofile" && cp "$cfgfile" "$ofile" && rm -f "$cfgfile") chmod +x "$ofile" -diff --git a/gas/Makefile.in b/gas/Makefile.in -index 1f24d4a5bbc..0147b491612 100644 --- a/gas/Makefile.in +++ b/gas/Makefile.in @@ -384,6 +384,7 @@ CYGPATH_W = @CYGPATH_W@ @@ -3977,8 +3959,6 @@ index 1f24d4a5bbc..0147b491612 100644 ac_ct_CC = @ac_ct_CC@ ac_ct_DUMPBIN = @ac_ct_DUMPBIN@ am__include = @am__include@ -diff --git a/gas/configure b/gas/configure -index ca149e79195..ad4377e140a 100755 --- a/gas/configure +++ b/gas/configure @@ -692,8 +692,11 @@ OTOOL @@ -4030,7 +4010,7 @@ index ca149e79195..ad4377e140a 100755 test "X`print -r -- $ECHO 2>/dev/null`" = "X$ECHO"; then ECHO='print -r --' elif test "X`printf %s $ECHO 2>/dev/null`" = "X$ECHO"; then -@@ -5386,8 +5392,8 @@ $as_echo_n "checking whether the shell understands some XSI constructs... " >&6; +@@ -5386,8 +5392,8 @@ $as_echo_n "checking whether the shell u # Try some XSI features xsi_shell=no ( _lt_dummy="a/b/c" @@ -4166,7 +4146,7 @@ index ca149e79195..ad4377e140a 100755 file_magic_cmd=$lt_cv_file_magic_cmd deplibs_check_method=$lt_cv_deplibs_check_method test -z "$deplibs_check_method" && deplibs_check_method=unknown -@@ -5794,6 +5895,157 @@ test -z "$deplibs_check_method" && deplibs_check_method=unknown +@@ -5794,6 +5895,157 @@ test -z "$deplibs_check_method" && depli @@ -4436,7 +4416,7 @@ index ca149e79195..ad4377e140a 100755 + lt_cv_ar_at_file=no + cat confdefs.h - <<_ACEOF >conftest.$ac_ext +/* end confdefs.h. */ -+ + +int +main () +{ @@ -4466,7 +4446,7 @@ index ca149e79195..ad4377e140a 100755 + fi + fi + rm -f conftest.* libconftest.a - ++ +fi +rm -f core conftest.err conftest.$ac_objext conftest.$ac_ext @@ -4529,7 +4509,7 @@ index ca149e79195..ad4377e140a 100755 const char *name; void *address; } -@@ -6379,8 +6706,8 @@ static const void *lt_preloaded_setup() { +@@ -6379,8 +6706,8 @@ static const void *lt_preloaded_setup() _LT_EOF # Now try linking the two files. mv conftest.$ac_objext conftstm.$ac_objext @@ -4551,7 +4531,7 @@ index ca149e79195..ad4377e140a 100755 else echo "cannot find nm_test_func in $nlist" >&5 fi -@@ -6428,6 +6755,19 @@ else +@@ -6428,6 +6755,15 @@ else $as_echo "ok" >&6; } fi @@ -4564,21 +4544,16 @@ index ca149e79195..ad4377e140a 100755 + + + -+ -+ -+ -+ -@@ -6444,6 +6784,42 @@ fi +@@ -6449,6 +6785,46 @@ fi + + + -+ +{ $as_echo "$as_me:${as_lineno-$LINENO}: checking for sysroot" >&5 +$as_echo_n "checking for sysroot... " >&6; } + @@ -4611,9 +4586,14 @@ index ca149e79195..ad4377e140a 100755 + + { $as_echo "$as_me:${as_lineno-$LINENO}: result: ${lt_sysroot:-no}" >&5 +$as_echo "${lt_sysroot:-no}" >&6; } - - - ++ ++ ++ ++ ++ + # Check whether --enable-libtool-lock was given. + if test "${enable_libtool_lock+set}" = set; then : + enableval=$enable_libtool_lock; @@ -6655,6 +7031,123 @@ esac need_locks="$enable_libtool_lock" @@ -4756,7 +4736,7 @@ index ca149e79195..ad4377e140a 100755 if test "$GCC" = yes; then lt_prog_compiler_wl='-Wl,' -@@ -7969,6 +8462,12 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -7969,6 +8462,12 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='--shared' lt_prog_compiler_static='--static' ;; @@ -4769,7 +4749,7 @@ index ca149e79195..ad4377e140a 100755 pgcc* | pgf77* | pgf90* | pgf95* | pgfortran*) # Portland Group compilers (*not* the Pentium gcc compiler, # which looks to be a dead project) -@@ -8031,7 +8530,7 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -8031,7 +8530,7 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='-KPIC' lt_prog_compiler_static='-Bstatic' case $cc_basename in @@ -4930,7 +4910,7 @@ index ca149e79195..ad4377e140a 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" archive_expsym_cmds='$CC -o $output_objdir/$soname $libobjs $deplibs '"\${wl}$no_entry_flag"' $compiler_flags `if test "x${allow_undefined_flag}" != "x"; then func_echo_all "${wl}${allow_undefined_flag}"; else :; fi` '"\${wl}$exp_sym_flag:\$export_symbols $shared_flag" -@@ -8860,7 +9382,13 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -8860,7 +9382,13 @@ if test -z "$aix_libpath"; then aix_libp else # Determine the default libpath from the value encoded in an # empty executable. @@ -4988,7 +4968,7 @@ index ca149e79195..ad4377e140a 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" # Warning - without using the other run time loading flags, -@@ -8933,20 +9468,63 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -8933,20 +9468,63 @@ if test -z "$aix_libpath"; then aix_libp # Microsoft Visual C++. # hardcode_libdir_flag_spec is actually meaningless, as there is # no search path for DLLs. @@ -5066,7 +5046,7 @@ index ca149e79195..ad4377e140a 100755 ;; darwin* | rhapsody*) -@@ -9007,7 +9585,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9007,7 +9585,7 @@ if test -z "$aix_libpath"; then aix_libp # FreeBSD 3 and greater uses gcc -shared to do shared libraries. freebsd* | dragonfly*) @@ -5075,7 +5055,7 @@ index ca149e79195..ad4377e140a 100755 hardcode_libdir_flag_spec='-R$libdir' hardcode_direct=yes hardcode_shlibpath_var=no -@@ -9015,7 +9593,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9015,7 +9593,7 @@ if test -z "$aix_libpath"; then aix_libp hpux9*) if test "$GCC" = yes; then @@ -5084,7 +5064,7 @@ index ca149e79195..ad4377e140a 100755 else archive_cmds='$RM $output_objdir/$soname~$LD -b +b $install_libdir -o $output_objdir/$soname $libobjs $deplibs $linker_flags~test $output_objdir/$soname = $lib || mv $output_objdir/$soname $lib' fi -@@ -9031,7 +9609,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9031,7 +9609,7 @@ if test -z "$aix_libpath"; then aix_libp hpux10*) if test "$GCC" = yes && test "$with_gnu_ld" = no; then @@ -5093,7 +5073,7 @@ index ca149e79195..ad4377e140a 100755 else archive_cmds='$LD -b +h $soname +b $install_libdir -o $lib $libobjs $deplibs $linker_flags' fi -@@ -9055,10 +9633,10 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9055,10 +9633,10 @@ if test -z "$aix_libpath"; then aix_libp archive_cmds='$CC -shared ${wl}+h ${wl}$soname ${wl}+nodefaultrpath -o $lib $libobjs $deplibs $compiler_flags' ;; ia64*) @@ -5151,7 +5131,7 @@ index ca149e79195..ad4377e140a 100755 else archive_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -o $lib' archive_expsym_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -exports_file $export_symbols -o $lib' -@@ -9238,7 +9829,7 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -9238,7 +9829,7 @@ rm -f core conftest.err conftest.$ac_obj osf4* | osf5*) # as osf3* with the addition of -msym flag if test "$GCC" = yes; then allow_undefined_flag=' ${wl}-expect_unresolved ${wl}\*' @@ -5160,7 +5140,7 @@ index ca149e79195..ad4377e140a 100755 hardcode_libdir_flag_spec='${wl}-rpath ${wl}$libdir' else allow_undefined_flag=' -expect_unresolved \*' -@@ -9257,9 +9848,9 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -9257,9 +9848,9 @@ rm -f core conftest.err conftest.$ac_obj no_undefined_flag=' -z defs' if test "$GCC" = yes; then wlarc='${wl}' @@ -5301,7 +5281,7 @@ index ca149e79195..ad4377e140a 100755 int main () { void *self = dlopen (0, LT_DLGLOBAL|LT_DLLAZY_OR_NOW); -@@ -16771,13 +17421,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_single_quote_subst"`' +@@ -16771,13 +17421,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_ lt_unset='`$ECHO "$lt_unset" | $SED "$delay_single_quote_subst"`' lt_SP2NL='`$ECHO "$lt_SP2NL" | $SED "$delay_single_quote_subst"`' lt_NL2SP='`$ECHO "$lt_NL2SP" | $SED "$delay_single_quote_subst"`' @@ -5322,7 +5302,7 @@ index ca149e79195..ad4377e140a 100755 STRIP='`$ECHO "$STRIP" | $SED "$delay_single_quote_subst"`' RANLIB='`$ECHO "$RANLIB" | $SED "$delay_single_quote_subst"`' old_postinstall_cmds='`$ECHO "$old_postinstall_cmds" | $SED "$delay_single_quote_subst"`' -@@ -16792,14 +17449,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$lt_cv_sys_global_symbol_pipe" | $SED "$de +@@ -16792,14 +17449,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$l lt_cv_sys_global_symbol_to_cdecl='`$ECHO "$lt_cv_sys_global_symbol_to_cdecl" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address_lib_prefix='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address_lib_prefix" | $SED "$delay_single_quote_subst"`' @@ -5341,7 +5321,7 @@ index ca149e79195..ad4377e140a 100755 DSYMUTIL='`$ECHO "$DSYMUTIL" | $SED "$delay_single_quote_subst"`' NMEDIT='`$ECHO "$NMEDIT" | $SED "$delay_single_quote_subst"`' LIPO='`$ECHO "$LIPO" | $SED "$delay_single_quote_subst"`' -@@ -16832,12 +17492,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcode_shlibpath_var" | $SED "$delay_single_q +@@ -16832,12 +17492,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcod hardcode_automatic='`$ECHO "$hardcode_automatic" | $SED "$delay_single_quote_subst"`' inherit_rpath='`$ECHO "$inherit_rpath" | $SED "$delay_single_quote_subst"`' link_all_deplibs='`$ECHO "$link_all_deplibs" | $SED "$delay_single_quote_subst"`' @@ -5455,7 +5435,7 @@ index ca149e79195..ad4377e140a 100755 # A symbol stripping program. STRIP=$lt_STRIP -@@ -17877,6 +18568,12 @@ global_symbol_to_c_name_address=$lt_lt_cv_sys_global_symbol_to_c_name_address +@@ -17877,6 +18568,12 @@ global_symbol_to_c_name_address=$lt_lt_c # Transform the output of nm in a C name address pair when lib prefix is needed. global_symbol_to_c_name_address_lib_prefix=$lt_lt_cv_sys_global_symbol_to_c_name_address_lib_prefix @@ -5716,15 +5696,9 @@ index ca149e79195..ad4377e140a 100755 -_LT_EOF - ;; - esac -- -- -- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ -- || (rm -f "$cfgfile"; exit 1) -- -- mv -f "$cfgfile" "$ofile" || + sed '$q' "$ltmain" >> "$cfgfile" \ + || (rm -f "$cfgfile"; exit 1) -+ + + if test x"$xsi_shell" = xyes; then + sed -e '/^func_dirname ()$/,/^} # func_dirname /c\ +func_dirname ()\ @@ -5882,14 +5856,15 @@ index ca149e79195..ad4377e140a 100755 + { $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: Unable to substitute extended shell functions in $ofile" >&5 +$as_echo "$as_me: WARNING: Unable to substitute extended shell functions in $ofile" >&2;} +fi -+ -+ + +- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ +- || (rm -f "$cfgfile"; exit 1) + +- mv -f "$cfgfile" "$ofile" || + mv -f "$cfgfile" "$ofile" || (rm -f "$ofile" && cp "$cfgfile" "$ofile" && rm -f "$cfgfile") chmod +x "$ofile" -diff --git a/gprof/Makefile.in b/gprof/Makefile.in -index 719e1810bcd..037f9cd5834 100644 --- a/gprof/Makefile.in +++ b/gprof/Makefile.in @@ -327,6 +327,7 @@ CYGPATH_W = @CYGPATH_W@ @@ -5916,8 +5891,6 @@ index 719e1810bcd..037f9cd5834 100644 ac_ct_CC = @ac_ct_CC@ ac_ct_DUMPBIN = @ac_ct_DUMPBIN@ am__include = @am__include@ -diff --git a/gprof/configure b/gprof/configure -index e40de173a1e..82cd6d600b8 100755 --- a/gprof/configure +++ b/gprof/configure @@ -671,8 +671,11 @@ OTOOL @@ -5969,7 +5942,7 @@ index e40de173a1e..82cd6d600b8 100755 test "X`print -r -- $ECHO 2>/dev/null`" = "X$ECHO"; then ECHO='print -r --' elif test "X`printf %s $ECHO 2>/dev/null`" = "X$ECHO"; then -@@ -5264,8 +5270,8 @@ $as_echo_n "checking whether the shell understands some XSI constructs... " >&6; +@@ -5264,8 +5270,8 @@ $as_echo_n "checking whether the shell u # Try some XSI features xsi_shell=no ( _lt_dummy="a/b/c" @@ -6105,7 +6078,7 @@ index e40de173a1e..82cd6d600b8 100755 file_magic_cmd=$lt_cv_file_magic_cmd deplibs_check_method=$lt_cv_deplibs_check_method test -z "$deplibs_check_method" && deplibs_check_method=unknown -@@ -5672,6 +5773,157 @@ test -z "$deplibs_check_method" && deplibs_check_method=unknown +@@ -5672,6 +5773,157 @@ test -z "$deplibs_check_method" && depli @@ -6324,7 +6297,7 @@ index e40de173a1e..82cd6d600b8 100755 if test "x$ac_ct_AR" = x; then AR="false" else -@@ -5773,25 +6035,19 @@ ac_tool_warned=yes ;; +@@ -5773,29 +6035,81 @@ ac_tool_warned=yes ;; esac AR=$ac_ct_AR fi @@ -6356,13 +6329,17 @@ index e40de173a1e..82cd6d600b8 100755 + rm -f conftest.* +: ${AR=ar} +: ${AR_FLAGS=cru} - - - -@@ -5803,6 +6059,64 @@ test -z "$AR_FLAGS" && AR_FLAGS=cru - - - ++ ++ ++ ++ ++ ++ ++ ++ ++ ++ ++ +{ $as_echo "$as_me:${as_lineno-$LINENO}: checking for archiver @FILE support" >&5 +$as_echo_n "checking for archiver @FILE support... " >&6; } +if ${lt_cv_ar_at_file+:} false; then : @@ -6371,11 +6348,11 @@ index e40de173a1e..82cd6d600b8 100755 + lt_cv_ar_at_file=no + cat confdefs.h - <<_ACEOF >conftest.$ac_ext +/* end confdefs.h. */ -+ + +int +main () +{ -+ + + ; + return 0; +} @@ -6404,26 +6381,19 @@ index e40de173a1e..82cd6d600b8 100755 + +fi +rm -f core conftest.err conftest.$ac_objext conftest.$ac_ext -+ + +fi +{ $as_echo "$as_me:${as_lineno-$LINENO}: result: $lt_cv_ar_at_file" >&5 +$as_echo "$lt_cv_ar_at_file" >&6; } -+ + +if test "x$lt_cv_ar_at_file" = xno; then + archiver_list_spec= +else + archiver_list_spec=$lt_cv_ar_at_file +fi -+ -+ -+ -+ -+ -+ -+ - if test -n "$ac_tool_prefix"; then - # Extract the first word of "${ac_tool_prefix}strip", so it can be a program name with args. - set dummy ${ac_tool_prefix}strip; ac_word=$2 + + + @@ -6142,8 +6456,8 @@ esac lt_cv_sys_global_symbol_to_cdecl="sed -n -e 's/^T .* \(.*\)$/extern int \1();/p' -e 's/^$symcode* .* \(.*\)$/extern char \1;/p'" @@ -6471,7 +6441,7 @@ index e40de173a1e..82cd6d600b8 100755 const char *name; void *address; } -@@ -6257,8 +6584,8 @@ static const void *lt_preloaded_setup() { +@@ -6257,8 +6584,8 @@ static const void *lt_preloaded_setup() _LT_EOF # Now try linking the two files. mv conftest.$ac_objext conftstm.$ac_objext @@ -6493,7 +6463,7 @@ index e40de173a1e..82cd6d600b8 100755 else echo "cannot find nm_test_func in $nlist" >&5 fi -@@ -6306,6 +6633,18 @@ else +@@ -6306,6 +6633,16 @@ else $as_echo "ok" >&6; } fi @@ -6507,18 +6477,13 @@ index e40de173a1e..82cd6d600b8 100755 + + + -+ -+ -@@ -6322,6 +6661,43 @@ fi +@@ -6327,6 +6664,45 @@ fi -+ -+ -+ + + +{ $as_echo "$as_me:${as_lineno-$LINENO}: checking for sysroot" >&5 @@ -6553,9 +6518,14 @@ index e40de173a1e..82cd6d600b8 100755 + + { $as_echo "$as_me:${as_lineno-$LINENO}: result: ${lt_sysroot:-no}" >&5 +$as_echo "${lt_sysroot:-no}" >&6; } - - - ++ ++ ++ ++ ++ + # Check whether --enable-libtool-lock was given. + if test "${enable_libtool_lock+set}" = set; then : + enableval=$enable_libtool_lock; @@ -6533,6 +6909,123 @@ esac need_locks="$enable_libtool_lock" @@ -6698,7 +6668,7 @@ index e40de173a1e..82cd6d600b8 100755 if test "$GCC" = yes; then lt_prog_compiler_wl='-Wl,' -@@ -7847,6 +8340,12 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -7847,6 +8340,12 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='--shared' lt_prog_compiler_static='--static' ;; @@ -6711,7 +6681,7 @@ index e40de173a1e..82cd6d600b8 100755 pgcc* | pgf77* | pgf90* | pgf95* | pgfortran*) # Portland Group compilers (*not* the Pentium gcc compiler, # which looks to be a dead project) -@@ -7909,7 +8408,7 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -7909,7 +8408,7 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='-KPIC' lt_prog_compiler_static='-Bstatic' case $cc_basename in @@ -6872,7 +6842,7 @@ index e40de173a1e..82cd6d600b8 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" archive_expsym_cmds='$CC -o $output_objdir/$soname $libobjs $deplibs '"\${wl}$no_entry_flag"' $compiler_flags `if test "x${allow_undefined_flag}" != "x"; then func_echo_all "${wl}${allow_undefined_flag}"; else :; fi` '"\${wl}$exp_sym_flag:\$export_symbols $shared_flag" -@@ -8738,7 +9260,13 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -8738,7 +9260,13 @@ if test -z "$aix_libpath"; then aix_libp else # Determine the default libpath from the value encoded in an # empty executable. @@ -6930,7 +6900,7 @@ index e40de173a1e..82cd6d600b8 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" # Warning - without using the other run time loading flags, -@@ -8811,20 +9346,63 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -8811,20 +9346,63 @@ if test -z "$aix_libpath"; then aix_libp # Microsoft Visual C++. # hardcode_libdir_flag_spec is actually meaningless, as there is # no search path for DLLs. @@ -7008,7 +6978,7 @@ index e40de173a1e..82cd6d600b8 100755 ;; darwin* | rhapsody*) -@@ -8885,7 +9463,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -8885,7 +9463,7 @@ if test -z "$aix_libpath"; then aix_libp # FreeBSD 3 and greater uses gcc -shared to do shared libraries. freebsd* | dragonfly*) @@ -7017,7 +6987,7 @@ index e40de173a1e..82cd6d600b8 100755 hardcode_libdir_flag_spec='-R$libdir' hardcode_direct=yes hardcode_shlibpath_var=no -@@ -8893,7 +9471,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -8893,7 +9471,7 @@ if test -z "$aix_libpath"; then aix_libp hpux9*) if test "$GCC" = yes; then @@ -7026,7 +6996,7 @@ index e40de173a1e..82cd6d600b8 100755 else archive_cmds='$RM $output_objdir/$soname~$LD -b +b $install_libdir -o $output_objdir/$soname $libobjs $deplibs $linker_flags~test $output_objdir/$soname = $lib || mv $output_objdir/$soname $lib' fi -@@ -8909,7 +9487,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -8909,7 +9487,7 @@ if test -z "$aix_libpath"; then aix_libp hpux10*) if test "$GCC" = yes && test "$with_gnu_ld" = no; then @@ -7035,7 +7005,7 @@ index e40de173a1e..82cd6d600b8 100755 else archive_cmds='$LD -b +h $soname +b $install_libdir -o $lib $libobjs $deplibs $linker_flags' fi -@@ -8933,10 +9511,10 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -8933,10 +9511,10 @@ if test -z "$aix_libpath"; then aix_libp archive_cmds='$CC -shared ${wl}+h ${wl}$soname ${wl}+nodefaultrpath -o $lib $libobjs $deplibs $compiler_flags' ;; ia64*) @@ -7093,7 +7063,7 @@ index e40de173a1e..82cd6d600b8 100755 else archive_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -o $lib' archive_expsym_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -exports_file $export_symbols -o $lib' -@@ -9116,7 +9707,7 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -9116,7 +9707,7 @@ rm -f core conftest.err conftest.$ac_obj osf4* | osf5*) # as osf3* with the addition of -msym flag if test "$GCC" = yes; then allow_undefined_flag=' ${wl}-expect_unresolved ${wl}\*' @@ -7102,7 +7072,7 @@ index e40de173a1e..82cd6d600b8 100755 hardcode_libdir_flag_spec='${wl}-rpath ${wl}$libdir' else allow_undefined_flag=' -expect_unresolved \*' -@@ -9135,9 +9726,9 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -9135,9 +9726,9 @@ rm -f core conftest.err conftest.$ac_obj no_undefined_flag=' -z defs' if test "$GCC" = yes; then wlarc='${wl}' @@ -7243,7 +7213,7 @@ index e40de173a1e..82cd6d600b8 100755 int main () { void *self = dlopen (0, LT_DLGLOBAL|LT_DLLAZY_OR_NOW); -@@ -14478,13 +15128,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_single_quote_subst"`' +@@ -14478,13 +15128,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_ lt_unset='`$ECHO "$lt_unset" | $SED "$delay_single_quote_subst"`' lt_SP2NL='`$ECHO "$lt_SP2NL" | $SED "$delay_single_quote_subst"`' lt_NL2SP='`$ECHO "$lt_NL2SP" | $SED "$delay_single_quote_subst"`' @@ -7264,7 +7234,7 @@ index e40de173a1e..82cd6d600b8 100755 STRIP='`$ECHO "$STRIP" | $SED "$delay_single_quote_subst"`' RANLIB='`$ECHO "$RANLIB" | $SED "$delay_single_quote_subst"`' old_postinstall_cmds='`$ECHO "$old_postinstall_cmds" | $SED "$delay_single_quote_subst"`' -@@ -14499,14 +15156,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$lt_cv_sys_global_symbol_pipe" | $SED "$de +@@ -14499,14 +15156,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$l lt_cv_sys_global_symbol_to_cdecl='`$ECHO "$lt_cv_sys_global_symbol_to_cdecl" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address_lib_prefix='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address_lib_prefix" | $SED "$delay_single_quote_subst"`' @@ -7283,7 +7253,7 @@ index e40de173a1e..82cd6d600b8 100755 DSYMUTIL='`$ECHO "$DSYMUTIL" | $SED "$delay_single_quote_subst"`' NMEDIT='`$ECHO "$NMEDIT" | $SED "$delay_single_quote_subst"`' LIPO='`$ECHO "$LIPO" | $SED "$delay_single_quote_subst"`' -@@ -14539,12 +15199,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcode_shlibpath_var" | $SED "$delay_single_q +@@ -14539,12 +15199,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcod hardcode_automatic='`$ECHO "$hardcode_automatic" | $SED "$delay_single_quote_subst"`' inherit_rpath='`$ECHO "$inherit_rpath" | $SED "$delay_single_quote_subst"`' link_all_deplibs='`$ECHO "$link_all_deplibs" | $SED "$delay_single_quote_subst"`' @@ -7397,7 +7367,7 @@ index e40de173a1e..82cd6d600b8 100755 # A symbol stripping program. STRIP=$lt_STRIP -@@ -15578,6 +16269,12 @@ global_symbol_to_c_name_address=$lt_lt_cv_sys_global_symbol_to_c_name_address +@@ -15578,6 +16269,12 @@ global_symbol_to_c_name_address=$lt_lt_c # Transform the output of nm in a C name address pair when lib prefix is needed. global_symbol_to_c_name_address_lib_prefix=$lt_lt_cv_sys_global_symbol_to_c_name_address_lib_prefix @@ -7658,15 +7628,9 @@ index e40de173a1e..82cd6d600b8 100755 -_LT_EOF - ;; - esac -- -- -- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ -- || (rm -f "$cfgfile"; exit 1) -- -- mv -f "$cfgfile" "$ofile" || + sed '$q' "$ltmain" >> "$cfgfile" \ + || (rm -f "$cfgfile"; exit 1) -+ + + if test x"$xsi_shell" = xyes; then + sed -e '/^func_dirname ()$/,/^} # func_dirname /c\ +func_dirname ()\ @@ -7824,14 +7788,15 @@ index e40de173a1e..82cd6d600b8 100755 + { $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: Unable to substitute extended shell functions in $ofile" >&5 +$as_echo "$as_me: WARNING: Unable to substitute extended shell functions in $ofile" >&2;} +fi -+ -+ + +- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ +- || (rm -f "$cfgfile"; exit 1) + +- mv -f "$cfgfile" "$ofile" || + mv -f "$cfgfile" "$ofile" || (rm -f "$ofile" && cp "$cfgfile" "$ofile" && rm -f "$cfgfile") chmod +x "$ofile" -diff --git a/gprofng/Makefile.in b/gprofng/Makefile.in -index f770dac57c5..dbdfd96c5ff 100644 --- a/gprofng/Makefile.in +++ b/gprofng/Makefile.in @@ -254,6 +254,7 @@ CXXFLAGS = @CXXFLAGS@ @@ -7850,8 +7815,6 @@ index f770dac57c5..dbdfd96c5ff 100644 MKDIR_P = @MKDIR_P@ NM = @NM@ NMEDIT = @NMEDIT@ -diff --git a/gprofng/configure b/gprofng/configure -index 3fd5b61c9a7..c2178fc289f 100755 --- a/gprofng/configure +++ b/gprofng/configure @@ -672,6 +672,8 @@ OTOOL @@ -7900,7 +7863,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 test "X`print -r -- $ECHO 2>/dev/null`" = "X$ECHO"; then ECHO='print -r --' elif test "X`printf %s $ECHO 2>/dev/null`" = "X$ECHO"; then -@@ -6887,8 +6892,8 @@ $as_echo_n "checking whether the shell understands some XSI constructs... " >&6; +@@ -6887,8 +6892,8 @@ $as_echo_n "checking whether the shell u # Try some XSI features xsi_shell=no ( _lt_dummy="a/b/c" @@ -8036,7 +7999,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 file_magic_cmd=$lt_cv_file_magic_cmd deplibs_check_method=$lt_cv_deplibs_check_method test -z "$deplibs_check_method" && deplibs_check_method=unknown -@@ -7295,6 +7395,157 @@ test -z "$deplibs_check_method" && deplibs_check_method=unknown +@@ -7295,6 +7395,157 @@ test -z "$deplibs_check_method" && depli @@ -8255,7 +8218,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 if test "x$ac_ct_AR" = x; then AR="false" else -@@ -7396,25 +7657,19 @@ ac_tool_warned=yes ;; +@@ -7396,29 +7657,81 @@ ac_tool_warned=yes ;; esac AR=$ac_ct_AR fi @@ -8287,13 +8250,17 @@ index 3fd5b61c9a7..c2178fc289f 100755 + rm -f conftest.* +: ${AR=ar} +: ${AR_FLAGS=cru} - - - -@@ -7426,6 +7681,64 @@ test -z "$AR_FLAGS" && AR_FLAGS=cru - - - ++ ++ ++ ++ ++ ++ ++ ++ ++ ++ ++ +{ $as_echo "$as_me:${as_lineno-$LINENO}: checking for archiver @FILE support" >&5 +$as_echo_n "checking for archiver @FILE support... " >&6; } +if ${lt_cv_ar_at_file+:} false; then : @@ -8306,7 +8273,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 +int +main () +{ -+ + + ; + return 0; +} @@ -8332,29 +8299,22 @@ index 3fd5b61c9a7..c2178fc289f 100755 + fi + fi + rm -f conftest.* libconftest.a -+ + +fi +rm -f core conftest.err conftest.$ac_objext conftest.$ac_ext -+ + +fi +{ $as_echo "$as_me:${as_lineno-$LINENO}: result: $lt_cv_ar_at_file" >&5 +$as_echo "$lt_cv_ar_at_file" >&6; } -+ + +if test "x$lt_cv_ar_at_file" = xno; then + archiver_list_spec= +else + archiver_list_spec=$lt_cv_ar_at_file +fi -+ -+ -+ -+ -+ -+ -+ - if test -n "$ac_tool_prefix"; then - # Extract the first word of "${ac_tool_prefix}strip", so it can be a program name with args. - set dummy ${ac_tool_prefix}strip; ac_word=$2 + + + @@ -7765,8 +8078,8 @@ esac lt_cv_sys_global_symbol_to_cdecl="sed -n -e 's/^T .* \(.*\)$/extern int \1();/p' -e 's/^$symcode* .* \(.*\)$/extern char \1;/p'" @@ -8402,7 +8362,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 const char *name; void *address; } -@@ -7880,8 +8206,8 @@ static const void *lt_preloaded_setup() { +@@ -7880,8 +8206,8 @@ static const void *lt_preloaded_setup() _LT_EOF # Now try linking the two files. mv conftest.$ac_objext conftstm.$ac_objext @@ -8424,7 +8384,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 else echo "cannot find nm_test_func in $nlist" >&5 fi -@@ -7929,6 +8255,14 @@ else +@@ -7929,6 +8255,16 @@ else $as_echo "ok" >&6; } fi @@ -8436,18 +8396,15 @@ index 3fd5b61c9a7..c2178fc289f 100755 +fi + + ++ ++ -@@ -7947,6 +8281,47 @@ fi +@@ -7950,6 +8286,45 @@ fi -+ -+ -+ -+ -+ + + +{ $as_echo "$as_me:${as_lineno-$LINENO}: checking for sysroot" >&5 @@ -8484,9 +8441,12 @@ index 3fd5b61c9a7..c2178fc289f 100755 +$as_echo "${lt_sysroot:-no}" >&6; } + + - - - ++ ++ ++ + # Check whether --enable-libtool-lock was given. + if test "${enable_libtool_lock+set}" = set; then : + enableval=$enable_libtool_lock; @@ -8156,6 +8531,123 @@ esac need_locks="$enable_libtool_lock" @@ -8646,7 +8606,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 if test "$GCC" = yes; then lt_prog_compiler_wl='-Wl,' -@@ -9441,6 +9943,12 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -9441,6 +9943,12 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='--shared' lt_prog_compiler_static='--static' ;; @@ -8659,7 +8619,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 pgcc* | pgf77* | pgf90* | pgf95* | pgfortran*) # Portland Group compilers (*not* the Pentium gcc compiler, # which looks to be a dead project) -@@ -9503,7 +10011,7 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -9503,7 +10011,7 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='-KPIC' lt_prog_compiler_static='-Bstatic' case $cc_basename in @@ -8820,7 +8780,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" archive_expsym_cmds='$CC -o $output_objdir/$soname $libobjs $deplibs '"\${wl}$no_entry_flag"' $compiler_flags `if test "x${allow_undefined_flag}" != "x"; then func_echo_all "${wl}${allow_undefined_flag}"; else :; fi` '"\${wl}$exp_sym_flag:\$export_symbols $shared_flag" -@@ -10332,7 +10863,13 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -10332,7 +10863,13 @@ if test -z "$aix_libpath"; then aix_libp else # Determine the default libpath from the value encoded in an # empty executable. @@ -8878,7 +8838,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" # Warning - without using the other run time loading flags, -@@ -10405,20 +10949,63 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -10405,20 +10949,63 @@ if test -z "$aix_libpath"; then aix_libp # Microsoft Visual C++. # hardcode_libdir_flag_spec is actually meaningless, as there is # no search path for DLLs. @@ -8956,7 +8916,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 ;; darwin* | rhapsody*) -@@ -10479,7 +11066,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -10479,7 +11066,7 @@ if test -z "$aix_libpath"; then aix_libp # FreeBSD 3 and greater uses gcc -shared to do shared libraries. freebsd* | dragonfly*) @@ -8965,7 +8925,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 hardcode_libdir_flag_spec='-R$libdir' hardcode_direct=yes hardcode_shlibpath_var=no -@@ -10487,7 +11074,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -10487,7 +11074,7 @@ if test -z "$aix_libpath"; then aix_libp hpux9*) if test "$GCC" = yes; then @@ -8974,7 +8934,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 else archive_cmds='$RM $output_objdir/$soname~$LD -b +b $install_libdir -o $output_objdir/$soname $libobjs $deplibs $linker_flags~test $output_objdir/$soname = $lib || mv $output_objdir/$soname $lib' fi -@@ -10503,7 +11090,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -10503,7 +11090,7 @@ if test -z "$aix_libpath"; then aix_libp hpux10*) if test "$GCC" = yes && test "$with_gnu_ld" = no; then @@ -8983,7 +8943,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 else archive_cmds='$LD -b +h $soname +b $install_libdir -o $lib $libobjs $deplibs $linker_flags' fi -@@ -10527,10 +11114,10 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -10527,10 +11114,10 @@ if test -z "$aix_libpath"; then aix_libp archive_cmds='$CC -shared ${wl}+h ${wl}$soname ${wl}+nodefaultrpath -o $lib $libobjs $deplibs $compiler_flags' ;; ia64*) @@ -9041,7 +9001,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 else archive_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -o $lib' archive_expsym_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -exports_file $export_symbols -o $lib' -@@ -10710,7 +11310,7 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -10710,7 +11310,7 @@ rm -f core conftest.err conftest.$ac_obj osf4* | osf5*) # as osf3* with the addition of -msym flag if test "$GCC" = yes; then allow_undefined_flag=' ${wl}-expect_unresolved ${wl}\*' @@ -9050,7 +9010,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 hardcode_libdir_flag_spec='${wl}-rpath ${wl}$libdir' else allow_undefined_flag=' -expect_unresolved \*' -@@ -10729,9 +11329,9 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -10729,9 +11329,9 @@ rm -f core conftest.err conftest.$ac_obj no_undefined_flag=' -z defs' if test "$GCC" = yes; then wlarc='${wl}' @@ -9207,7 +9167,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 compiler=$CC compiler_CXX=$CC for cc_temp in $compiler""; do -@@ -13093,7 +13754,13 @@ $as_echo_n "checking whether the $compiler linker ($LD) supports shared librarie +@@ -13093,7 +13754,13 @@ $as_echo_n "checking whether the $compil allow_undefined_flag_CXX='-berok' # Determine the default libpath from the value encoded in an empty # executable. @@ -9265,7 +9225,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 hardcode_libdir_flag_spec_CXX='${wl}-blibpath:$libdir:'"$aix_libpath" -@@ -13134,7 +13808,13 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -13134,7 +13808,13 @@ if test -z "$aix_libpath"; then aix_libp else # Determine the default libpath from the value encoded in an # empty executable. @@ -9323,7 +9283,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 hardcode_libdir_flag_spec_CXX='${wl}-blibpath:$libdir:'"$aix_libpath" # Warning - without using the other run time loading flags, -@@ -13205,29 +13892,75 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -13205,29 +13892,75 @@ if test -z "$aix_libpath"; then aix_libp ;; cygwin* | mingw* | pw32* | cegcc*) @@ -9422,7 +9382,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 darwin* | rhapsody*) -@@ -13333,7 +14066,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -13333,7 +14066,7 @@ if test -z "$aix_libpath"; then aix_libp ;; *) if test "$GXX" = yes; then @@ -9431,7 +9391,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 else # FIXME: insert proper C++ library support ld_shlibs_CXX=no -@@ -13404,10 +14137,10 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -13404,10 +14137,10 @@ if test -z "$aix_libpath"; then aix_libp archive_cmds_CXX='$CC -shared -nostdlib -fPIC ${wl}+h ${wl}$soname ${wl}+nodefaultrpath -o $lib $predep_objects $libobjs $deplibs $postdep_objects $compiler_flags' ;; ia64*) @@ -9444,7 +9404,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 ;; esac fi -@@ -13448,9 +14181,9 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -13448,9 +14181,9 @@ if test -z "$aix_libpath"; then aix_libp *) if test "$GXX" = yes; then if test "$with_gnu_ld" = no; then @@ -9456,7 +9416,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 fi fi link_all_deplibs_CXX=yes -@@ -13728,7 +14461,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -13728,7 +14461,7 @@ if test -z "$aix_libpath"; then aix_libp archive_cmds_CXX='$CC -shared -nostdlib ${allow_undefined_flag} $predep_objects $libobjs $deplibs $postdep_objects $compiler_flags ${wl}-soname ${wl}$soname `test -n "$verstring" && func_echo_all "${wl}-set_version ${wl}$verstring"` ${wl}-update_registry ${wl}${output_objdir}/so_locations -o $lib' ;; *) @@ -9465,7 +9425,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 ;; esac -@@ -13774,7 +14507,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -13774,7 +14507,7 @@ if test -z "$aix_libpath"; then aix_libp solaris*) case $cc_basename in @@ -9474,7 +9434,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 # Sun C++ 4.2, 5.x and Centerline C++ archive_cmds_need_lc_CXX=yes no_undefined_flag_CXX=' -zdefs' -@@ -13815,9 +14548,9 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -13815,9 +14548,9 @@ if test -z "$aix_libpath"; then aix_libp if test "$GXX" = yes && test "$with_gnu_ld" = no; then no_undefined_flag_CXX=' ${wl}-z ${wl}defs' if $CC --version | $GREP -v '^2\.7' > /dev/null; then @@ -9500,7 +9460,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 if { { eval echo "\"\$as_me\":${as_lineno-$LINENO}: \"$ac_compile\""; } >&5 (eval $ac_compile) 2>&5 ac_status=$? -@@ -13966,7 +14706,7 @@ if { { eval echo "\"\$as_me\":${as_lineno-$LINENO}: \"$ac_compile\""; } >&5 +@@ -13966,7 +14706,7 @@ if { { eval echo "\"\$as_me\":${as_linen pre_test_object_deps_done=no for p in `eval "$output_verbose_link_cmd"`; do @@ -9509,7 +9469,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 -L* | -R* | -l*) # Some compilers place space between "-{L,R}" and the path. -@@ -13975,13 +14715,22 @@ if { { eval echo "\"\$as_me\":${as_lineno-$LINENO}: \"$ac_compile\""; } >&5 +@@ -13975,13 +14715,22 @@ if { { eval echo "\"\$as_me\":${as_linen test $p = "-R"; then prev=$p continue @@ -9536,7 +9496,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 # Internal compiler library paths should come after those # provided the user. The postdeps already come after the # user supplied libs so there is no need to process them. -@@ -14001,8 +14750,10 @@ if { { eval echo "\"\$as_me\":${as_lineno-$LINENO}: \"$ac_compile\""; } >&5 +@@ -14001,8 +14750,10 @@ if { { eval echo "\"\$as_me\":${as_linen postdeps_CXX="${postdeps_CXX} ${prev}${p}" fi fi @@ -9573,7 +9533,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 # C++ specific cases for pic, static, wl, etc. if test "$GXX" = yes; then -@@ -14244,6 +14994,11 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -14244,6 +14994,11 @@ $as_echo_n "checking for $compiler optio ;; esac ;; @@ -9585,7 +9545,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 dgux*) case $cc_basename in ec++*) -@@ -14396,7 +15151,7 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -14396,7 +15151,7 @@ $as_echo_n "checking for $compiler optio ;; solaris*) case $cc_basename in @@ -9632,7 +9592,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 case $host_os in aix[4-9]*) # If we're using GNU nm, then we don't want the "-C" option. -@@ -14713,15 +15478,20 @@ $as_echo_n "checking whether the $compiler linker ($LD) supports shared librarie +@@ -14713,15 +15478,20 @@ $as_echo_n "checking whether the $compil ;; pw32*) export_symbols_cmds_CXX="$ltdll_cmds" @@ -9751,7 +9711,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 LDCXX=$LD LD=$lt_save_LD GCC=$lt_save_GCC -@@ -18025,13 +18855,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_single_quote_subst"`' +@@ -18025,13 +18855,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_ lt_unset='`$ECHO "$lt_unset" | $SED "$delay_single_quote_subst"`' lt_SP2NL='`$ECHO "$lt_SP2NL" | $SED "$delay_single_quote_subst"`' lt_NL2SP='`$ECHO "$lt_NL2SP" | $SED "$delay_single_quote_subst"`' @@ -9772,7 +9732,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 STRIP='`$ECHO "$STRIP" | $SED "$delay_single_quote_subst"`' RANLIB='`$ECHO "$RANLIB" | $SED "$delay_single_quote_subst"`' old_postinstall_cmds='`$ECHO "$old_postinstall_cmds" | $SED "$delay_single_quote_subst"`' -@@ -18046,14 +18883,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$lt_cv_sys_global_symbol_pipe" | $SED "$de +@@ -18046,14 +18883,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$l lt_cv_sys_global_symbol_to_cdecl='`$ECHO "$lt_cv_sys_global_symbol_to_cdecl" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address_lib_prefix='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address_lib_prefix" | $SED "$delay_single_quote_subst"`' @@ -9791,7 +9751,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 DSYMUTIL='`$ECHO "$DSYMUTIL" | $SED "$delay_single_quote_subst"`' NMEDIT='`$ECHO "$NMEDIT" | $SED "$delay_single_quote_subst"`' LIPO='`$ECHO "$LIPO" | $SED "$delay_single_quote_subst"`' -@@ -18086,12 +18926,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcode_shlibpath_var" | $SED "$delay_single_q +@@ -18086,12 +18926,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcod hardcode_automatic='`$ECHO "$hardcode_automatic" | $SED "$delay_single_quote_subst"`' inherit_rpath='`$ECHO "$inherit_rpath" | $SED "$delay_single_quote_subst"`' link_all_deplibs='`$ECHO "$link_all_deplibs" | $SED "$delay_single_quote_subst"`' @@ -9805,7 +9765,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 file_list_spec='`$ECHO "$file_list_spec" | $SED "$delay_single_quote_subst"`' variables_saved_for_relink='`$ECHO "$variables_saved_for_relink" | $SED "$delay_single_quote_subst"`' need_lib_prefix='`$ECHO "$need_lib_prefix" | $SED "$delay_single_quote_subst"`' -@@ -18130,8 +18970,8 @@ old_archive_cmds_CXX='`$ECHO "$old_archive_cmds_CXX" | $SED "$delay_single_quote +@@ -18130,8 +18970,8 @@ old_archive_cmds_CXX='`$ECHO "$old_archi compiler_CXX='`$ECHO "$compiler_CXX" | $SED "$delay_single_quote_subst"`' GCC_CXX='`$ECHO "$GCC_CXX" | $SED "$delay_single_quote_subst"`' lt_prog_compiler_no_builtin_flag_CXX='`$ECHO "$lt_prog_compiler_no_builtin_flag_CXX" | $SED "$delay_single_quote_subst"`' @@ -9815,7 +9775,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 lt_prog_compiler_static_CXX='`$ECHO "$lt_prog_compiler_static_CXX" | $SED "$delay_single_quote_subst"`' lt_cv_prog_compiler_c_o_CXX='`$ECHO "$lt_cv_prog_compiler_c_o_CXX" | $SED "$delay_single_quote_subst"`' archive_cmds_need_lc_CXX='`$ECHO "$archive_cmds_need_lc_CXX" | $SED "$delay_single_quote_subst"`' -@@ -18158,12 +18998,12 @@ hardcode_shlibpath_var_CXX='`$ECHO "$hardcode_shlibpath_var_CXX" | $SED "$delay_ +@@ -18158,12 +18998,12 @@ hardcode_shlibpath_var_CXX='`$ECHO "$har hardcode_automatic_CXX='`$ECHO "$hardcode_automatic_CXX" | $SED "$delay_single_quote_subst"`' inherit_rpath_CXX='`$ECHO "$inherit_rpath_CXX" | $SED "$delay_single_quote_subst"`' link_all_deplibs_CXX='`$ECHO "$link_all_deplibs_CXX" | $SED "$delay_single_quote_subst"`' @@ -9957,7 +9917,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 # A symbol stripping program. STRIP=$lt_STRIP -@@ -19218,6 +20089,12 @@ global_symbol_to_c_name_address=$lt_lt_cv_sys_global_symbol_to_c_name_address +@@ -19218,6 +20089,12 @@ global_symbol_to_c_name_address=$lt_lt_c # Transform the output of nm in a C name address pair when lib prefix is needed. global_symbol_to_c_name_address_lib_prefix=$lt_lt_cv_sys_global_symbol_to_c_name_address_lib_prefix @@ -10218,15 +10178,9 @@ index 3fd5b61c9a7..c2178fc289f 100755 -_LT_EOF - ;; - esac -- -- -- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ -- || (rm -f "$cfgfile"; exit 1) -- -- mv -f "$cfgfile" "$ofile" || + sed '$q' "$ltmain" >> "$cfgfile" \ + || (rm -f "$cfgfile"; exit 1) -+ + + if test x"$xsi_shell" = xyes; then + sed -e '/^func_dirname ()$/,/^} # func_dirname /c\ +func_dirname ()\ @@ -10384,8 +10338,11 @@ index 3fd5b61c9a7..c2178fc289f 100755 + { $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: Unable to substitute extended shell functions in $ofile" >&5 +$as_echo "$as_me: WARNING: Unable to substitute extended shell functions in $ofile" >&2;} +fi -+ -+ + +- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ +- || (rm -f "$cfgfile"; exit 1) + +- mv -f "$cfgfile" "$ofile" || + mv -f "$cfgfile" "$ofile" || (rm -f "$ofile" && cp "$cfgfile" "$ofile" && rm -f "$cfgfile") chmod +x "$ofile" @@ -10426,8 +10383,6 @@ index 3fd5b61c9a7..c2178fc289f 100755 # Specify filename containing input files. file_list_spec=$lt_file_list_spec_CXX -diff --git a/gprofng/doc/Makefile.in b/gprofng/doc/Makefile.in -index 162ae4b19c1..9e6017aa0ff 100644 --- a/gprofng/doc/Makefile.in +++ b/gprofng/doc/Makefile.in @@ -238,6 +238,7 @@ CXXFLAGS = @CXXFLAGS@ @@ -10446,8 +10401,6 @@ index 162ae4b19c1..9e6017aa0ff 100644 MKDIR_P = @MKDIR_P@ NM = @NM@ NMEDIT = @NMEDIT@ -diff --git a/gprofng/gp-display-html/Makefile.in b/gprofng/gp-display-html/Makefile.in -index 2b8580f40f9..a01e34702d7 100644 --- a/gprofng/gp-display-html/Makefile.in +++ b/gprofng/gp-display-html/Makefile.in @@ -198,6 +198,7 @@ CXXFLAGS = @CXXFLAGS@ @@ -10466,8 +10419,6 @@ index 2b8580f40f9..a01e34702d7 100644 MKDIR_P = @MKDIR_P@ NM = @NM@ NMEDIT = @NMEDIT@ -diff --git a/gprofng/libcollector/Makefile.in b/gprofng/libcollector/Makefile.in -index 4448745f17e..ff20f8f0715 100644 --- a/gprofng/libcollector/Makefile.in +++ b/gprofng/libcollector/Makefile.in @@ -316,6 +316,7 @@ CXXFLAGS = @CXXFLAGS@ @@ -10486,8 +10437,6 @@ index 4448745f17e..ff20f8f0715 100644 MKDIR_P = @MKDIR_P@ NM = @NM@ NMEDIT = @NMEDIT@ -diff --git a/gprofng/libcollector/configure b/gprofng/libcollector/configure -index afdf3966baf..877afeb7c01 100755 --- a/gprofng/libcollector/configure +++ b/gprofng/libcollector/configure @@ -640,6 +640,8 @@ OTOOL @@ -10536,7 +10485,7 @@ index afdf3966baf..877afeb7c01 100755 test "X`print -r -- $ECHO 2>/dev/null`" = "X$ECHO"; then ECHO='print -r --' elif test "X`printf %s $ECHO 2>/dev/null`" = "X$ECHO"; then -@@ -6702,8 +6707,8 @@ $as_echo_n "checking whether the shell understands some XSI constructs... " >&6; +@@ -6702,8 +6707,8 @@ $as_echo_n "checking whether the shell u # Try some XSI features xsi_shell=no ( _lt_dummy="a/b/c" @@ -10672,7 +10621,7 @@ index afdf3966baf..877afeb7c01 100755 file_magic_cmd=$lt_cv_file_magic_cmd deplibs_check_method=$lt_cv_deplibs_check_method test -z "$deplibs_check_method" && deplibs_check_method=unknown -@@ -7110,6 +7210,157 @@ test -z "$deplibs_check_method" && deplibs_check_method=unknown +@@ -7110,6 +7210,157 @@ test -z "$deplibs_check_method" && depli @@ -10891,7 +10840,7 @@ index afdf3966baf..877afeb7c01 100755 if test "x$ac_ct_AR" = x; then AR="false" else -@@ -7211,25 +7472,19 @@ ac_tool_warned=yes ;; +@@ -7211,29 +7472,81 @@ ac_tool_warned=yes ;; esac AR=$ac_ct_AR fi @@ -10923,13 +10872,17 @@ index afdf3966baf..877afeb7c01 100755 + rm -f conftest.* +: ${AR=ar} +: ${AR_FLAGS=cru} - - - -@@ -7241,6 +7496,64 @@ test -z "$AR_FLAGS" && AR_FLAGS=cru - - - ++ ++ ++ ++ ++ ++ ++ ++ ++ ++ ++ +{ $as_echo "$as_me:${as_lineno-$LINENO}: checking for archiver @FILE support" >&5 +$as_echo_n "checking for archiver @FILE support... " >&6; } +if ${lt_cv_ar_at_file+:} false; then : @@ -10942,7 +10895,7 @@ index afdf3966baf..877afeb7c01 100755 +int +main () +{ -+ + + ; + return 0; +} @@ -10968,29 +10921,22 @@ index afdf3966baf..877afeb7c01 100755 + fi + fi + rm -f conftest.* libconftest.a -+ + +fi +rm -f core conftest.err conftest.$ac_objext conftest.$ac_ext -+ + +fi +{ $as_echo "$as_me:${as_lineno-$LINENO}: result: $lt_cv_ar_at_file" >&5 +$as_echo "$lt_cv_ar_at_file" >&6; } -+ + +if test "x$lt_cv_ar_at_file" = xno; then + archiver_list_spec= +else + archiver_list_spec=$lt_cv_ar_at_file +fi -+ -+ -+ -+ -+ -+ -+ - if test -n "$ac_tool_prefix"; then - # Extract the first word of "${ac_tool_prefix}strip", so it can be a program name with args. - set dummy ${ac_tool_prefix}strip; ac_word=$2 + + + @@ -7580,8 +7893,8 @@ esac lt_cv_sys_global_symbol_to_cdecl="sed -n -e 's/^T .* \(.*\)$/extern int \1();/p' -e 's/^$symcode* .* \(.*\)$/extern char \1;/p'" @@ -11038,7 +10984,7 @@ index afdf3966baf..877afeb7c01 100755 const char *name; void *address; } -@@ -7695,8 +8021,8 @@ static const void *lt_preloaded_setup() { +@@ -7695,8 +8021,8 @@ static const void *lt_preloaded_setup() _LT_EOF # Now try linking the two files. mv conftest.$ac_objext conftstm.$ac_objext @@ -11060,7 +11006,7 @@ index afdf3966baf..877afeb7c01 100755 else echo "cannot find nm_test_func in $nlist" >&5 fi -@@ -7744,6 +8070,13 @@ else +@@ -7744,6 +8070,25 @@ else $as_echo "ok" >&6; } fi @@ -11071,13 +11017,6 @@ index afdf3966baf..877afeb7c01 100755 + nm_file_list_spec='@' +fi + - - - -@@ -7763,6 +8096,48 @@ fi - - - + + + @@ -11085,9 +11024,21 @@ index afdf3966baf..877afeb7c01 100755 + + + ++ ++ ++ ++ ++ + + + +@@ -7758,8 +8103,38 @@ fi + + + +{ $as_echo "$as_me:${as_lineno-$LINENO}: checking for sysroot" >&5 +$as_echo_n "checking for sysroot... " >&6; } -+ + +# Check whether --with-libtool-sysroot was given. +if test "${with_libtool_sysroot+set}" = set; then : + withval=$with_libtool_sysroot; @@ -11114,15 +11065,12 @@ index afdf3966baf..877afeb7c01 100755 + as_fn_error $? "The sysroot must be an absolute path." "$LINENO" 5 + ;; +esac -+ + + { $as_echo "$as_me:${as_lineno-$LINENO}: result: ${lt_sysroot:-no}" >&5 +$as_echo "${lt_sysroot:-no}" >&6; } -+ -+ -+ - # Check whether --enable-libtool-lock was given. + @@ -7971,6 +8346,123 @@ esac need_locks="$enable_libtool_lock" @@ -11282,7 +11230,7 @@ index afdf3966baf..877afeb7c01 100755 if test "$GCC" = yes; then lt_prog_compiler_wl='-Wl,' -@@ -9286,6 +9788,12 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -9286,6 +9788,12 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='--shared' lt_prog_compiler_static='--static' ;; @@ -11295,7 +11243,7 @@ index afdf3966baf..877afeb7c01 100755 pgcc* | pgf77* | pgf90* | pgf95* | pgfortran*) # Portland Group compilers (*not* the Pentium gcc compiler, # which looks to be a dead project) -@@ -9348,7 +9856,7 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -9348,7 +9856,7 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='-KPIC' lt_prog_compiler_static='-Bstatic' case $cc_basename in @@ -11456,7 +11404,7 @@ index afdf3966baf..877afeb7c01 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" archive_expsym_cmds='$CC -o $output_objdir/$soname $libobjs $deplibs '"\${wl}$no_entry_flag"' $compiler_flags `if test "x${allow_undefined_flag}" != "x"; then func_echo_all "${wl}${allow_undefined_flag}"; else :; fi` '"\${wl}$exp_sym_flag:\$export_symbols $shared_flag" -@@ -10177,7 +10708,13 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -10177,7 +10708,13 @@ if test -z "$aix_libpath"; then aix_libp else # Determine the default libpath from the value encoded in an # empty executable. @@ -11514,7 +11462,7 @@ index afdf3966baf..877afeb7c01 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" # Warning - without using the other run time loading flags, -@@ -10250,20 +10794,63 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -10250,20 +10794,63 @@ if test -z "$aix_libpath"; then aix_libp # Microsoft Visual C++. # hardcode_libdir_flag_spec is actually meaningless, as there is # no search path for DLLs. @@ -11592,7 +11540,7 @@ index afdf3966baf..877afeb7c01 100755 ;; darwin* | rhapsody*) -@@ -10324,7 +10911,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -10324,7 +10911,7 @@ if test -z "$aix_libpath"; then aix_libp # FreeBSD 3 and greater uses gcc -shared to do shared libraries. freebsd* | dragonfly*) @@ -11601,7 +11549,7 @@ index afdf3966baf..877afeb7c01 100755 hardcode_libdir_flag_spec='-R$libdir' hardcode_direct=yes hardcode_shlibpath_var=no -@@ -10332,7 +10919,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -10332,7 +10919,7 @@ if test -z "$aix_libpath"; then aix_libp hpux9*) if test "$GCC" = yes; then @@ -11610,7 +11558,7 @@ index afdf3966baf..877afeb7c01 100755 else archive_cmds='$RM $output_objdir/$soname~$LD -b +b $install_libdir -o $output_objdir/$soname $libobjs $deplibs $linker_flags~test $output_objdir/$soname = $lib || mv $output_objdir/$soname $lib' fi -@@ -10348,7 +10935,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -10348,7 +10935,7 @@ if test -z "$aix_libpath"; then aix_libp hpux10*) if test "$GCC" = yes && test "$with_gnu_ld" = no; then @@ -11619,7 +11567,7 @@ index afdf3966baf..877afeb7c01 100755 else archive_cmds='$LD -b +h $soname +b $install_libdir -o $lib $libobjs $deplibs $linker_flags' fi -@@ -10372,10 +10959,10 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -10372,10 +10959,10 @@ if test -z "$aix_libpath"; then aix_libp archive_cmds='$CC -shared ${wl}+h ${wl}$soname ${wl}+nodefaultrpath -o $lib $libobjs $deplibs $compiler_flags' ;; ia64*) @@ -11677,7 +11625,7 @@ index afdf3966baf..877afeb7c01 100755 else archive_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -o $lib' archive_expsym_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -exports_file $export_symbols -o $lib' -@@ -10555,7 +11155,7 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -10555,7 +11155,7 @@ rm -f core conftest.err conftest.$ac_obj osf4* | osf5*) # as osf3* with the addition of -msym flag if test "$GCC" = yes; then allow_undefined_flag=' ${wl}-expect_unresolved ${wl}\*' @@ -11686,7 +11634,7 @@ index afdf3966baf..877afeb7c01 100755 hardcode_libdir_flag_spec='${wl}-rpath ${wl}$libdir' else allow_undefined_flag=' -expect_unresolved \*' -@@ -10574,9 +11174,9 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -10574,9 +11174,9 @@ rm -f core conftest.err conftest.$ac_obj no_undefined_flag=' -z defs' if test "$GCC" = yes; then wlarc='${wl}' @@ -11843,7 +11791,7 @@ index afdf3966baf..877afeb7c01 100755 compiler=$CC compiler_CXX=$CC for cc_temp in $compiler""; do -@@ -12938,7 +13599,13 @@ $as_echo_n "checking whether the $compiler linker ($LD) supports shared librarie +@@ -12938,7 +13599,13 @@ $as_echo_n "checking whether the $compil allow_undefined_flag_CXX='-berok' # Determine the default libpath from the value encoded in an empty # executable. @@ -11901,7 +11849,7 @@ index afdf3966baf..877afeb7c01 100755 hardcode_libdir_flag_spec_CXX='${wl}-blibpath:$libdir:'"$aix_libpath" -@@ -12979,7 +13653,13 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -12979,7 +13653,13 @@ if test -z "$aix_libpath"; then aix_libp else # Determine the default libpath from the value encoded in an # empty executable. @@ -11959,7 +11907,7 @@ index afdf3966baf..877afeb7c01 100755 hardcode_libdir_flag_spec_CXX='${wl}-blibpath:$libdir:'"$aix_libpath" # Warning - without using the other run time loading flags, -@@ -13050,29 +13737,75 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -13050,29 +13737,75 @@ if test -z "$aix_libpath"; then aix_libp ;; cygwin* | mingw* | pw32* | cegcc*) @@ -12058,7 +12006,7 @@ index afdf3966baf..877afeb7c01 100755 darwin* | rhapsody*) -@@ -13178,7 +13911,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -13178,7 +13911,7 @@ if test -z "$aix_libpath"; then aix_libp ;; *) if test "$GXX" = yes; then @@ -12067,7 +12015,7 @@ index afdf3966baf..877afeb7c01 100755 else # FIXME: insert proper C++ library support ld_shlibs_CXX=no -@@ -13249,10 +13982,10 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -13249,10 +13982,10 @@ if test -z "$aix_libpath"; then aix_libp archive_cmds_CXX='$CC -shared -nostdlib -fPIC ${wl}+h ${wl}$soname ${wl}+nodefaultrpath -o $lib $predep_objects $libobjs $deplibs $postdep_objects $compiler_flags' ;; ia64*) @@ -12080,7 +12028,7 @@ index afdf3966baf..877afeb7c01 100755 ;; esac fi -@@ -13293,9 +14026,9 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -13293,9 +14026,9 @@ if test -z "$aix_libpath"; then aix_libp *) if test "$GXX" = yes; then if test "$with_gnu_ld" = no; then @@ -12092,7 +12040,7 @@ index afdf3966baf..877afeb7c01 100755 fi fi link_all_deplibs_CXX=yes -@@ -13573,7 +14306,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -13573,7 +14306,7 @@ if test -z "$aix_libpath"; then aix_libp archive_cmds_CXX='$CC -shared -nostdlib ${allow_undefined_flag} $predep_objects $libobjs $deplibs $postdep_objects $compiler_flags ${wl}-soname ${wl}$soname `test -n "$verstring" && func_echo_all "${wl}-set_version ${wl}$verstring"` ${wl}-update_registry ${wl}${output_objdir}/so_locations -o $lib' ;; *) @@ -12101,7 +12049,7 @@ index afdf3966baf..877afeb7c01 100755 ;; esac -@@ -13619,7 +14352,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -13619,7 +14352,7 @@ if test -z "$aix_libpath"; then aix_libp solaris*) case $cc_basename in @@ -12110,7 +12058,7 @@ index afdf3966baf..877afeb7c01 100755 # Sun C++ 4.2, 5.x and Centerline C++ archive_cmds_need_lc_CXX=yes no_undefined_flag_CXX=' -zdefs' -@@ -13660,9 +14393,9 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -13660,9 +14393,9 @@ if test -z "$aix_libpath"; then aix_libp if test "$GXX" = yes && test "$with_gnu_ld" = no; then no_undefined_flag_CXX=' ${wl}-z ${wl}defs' if $CC --version | $GREP -v '^2\.7' > /dev/null; then @@ -12136,7 +12084,7 @@ index afdf3966baf..877afeb7c01 100755 if { { eval echo "\"\$as_me\":${as_lineno-$LINENO}: \"$ac_compile\""; } >&5 (eval $ac_compile) 2>&5 ac_status=$? -@@ -13811,7 +14551,7 @@ if { { eval echo "\"\$as_me\":${as_lineno-$LINENO}: \"$ac_compile\""; } >&5 +@@ -13811,7 +14551,7 @@ if { { eval echo "\"\$as_me\":${as_linen pre_test_object_deps_done=no for p in `eval "$output_verbose_link_cmd"`; do @@ -12145,7 +12093,7 @@ index afdf3966baf..877afeb7c01 100755 -L* | -R* | -l*) # Some compilers place space between "-{L,R}" and the path. -@@ -13820,13 +14560,22 @@ if { { eval echo "\"\$as_me\":${as_lineno-$LINENO}: \"$ac_compile\""; } >&5 +@@ -13820,13 +14560,22 @@ if { { eval echo "\"\$as_me\":${as_linen test $p = "-R"; then prev=$p continue @@ -12172,7 +12120,7 @@ index afdf3966baf..877afeb7c01 100755 # Internal compiler library paths should come after those # provided the user. The postdeps already come after the # user supplied libs so there is no need to process them. -@@ -13846,8 +14595,10 @@ if { { eval echo "\"\$as_me\":${as_lineno-$LINENO}: \"$ac_compile\""; } >&5 +@@ -13846,8 +14595,10 @@ if { { eval echo "\"\$as_me\":${as_linen postdeps_CXX="${postdeps_CXX} ${prev}${p}" fi fi @@ -12209,7 +12157,7 @@ index afdf3966baf..877afeb7c01 100755 # C++ specific cases for pic, static, wl, etc. if test "$GXX" = yes; then -@@ -14089,6 +14839,11 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -14089,6 +14839,11 @@ $as_echo_n "checking for $compiler optio ;; esac ;; @@ -12221,7 +12169,7 @@ index afdf3966baf..877afeb7c01 100755 dgux*) case $cc_basename in ec++*) -@@ -14241,7 +14996,7 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -14241,7 +14996,7 @@ $as_echo_n "checking for $compiler optio ;; solaris*) case $cc_basename in @@ -12268,7 +12216,7 @@ index afdf3966baf..877afeb7c01 100755 case $host_os in aix[4-9]*) # If we're using GNU nm, then we don't want the "-C" option. -@@ -14558,15 +15323,20 @@ $as_echo_n "checking whether the $compiler linker ($LD) supports shared librarie +@@ -14558,15 +15323,20 @@ $as_echo_n "checking whether the $compil ;; pw32*) export_symbols_cmds_CXX="$ltdll_cmds" @@ -12387,7 +12335,7 @@ index afdf3966baf..877afeb7c01 100755 LDCXX=$LD LD=$lt_save_LD GCC=$lt_save_GCC -@@ -16359,13 +17189,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_single_quote_subst"`' +@@ -16359,13 +17189,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_ lt_unset='`$ECHO "$lt_unset" | $SED "$delay_single_quote_subst"`' lt_SP2NL='`$ECHO "$lt_SP2NL" | $SED "$delay_single_quote_subst"`' lt_NL2SP='`$ECHO "$lt_NL2SP" | $SED "$delay_single_quote_subst"`' @@ -12408,7 +12356,7 @@ index afdf3966baf..877afeb7c01 100755 STRIP='`$ECHO "$STRIP" | $SED "$delay_single_quote_subst"`' RANLIB='`$ECHO "$RANLIB" | $SED "$delay_single_quote_subst"`' old_postinstall_cmds='`$ECHO "$old_postinstall_cmds" | $SED "$delay_single_quote_subst"`' -@@ -16380,14 +17217,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$lt_cv_sys_global_symbol_pipe" | $SED "$de +@@ -16380,14 +17217,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$l lt_cv_sys_global_symbol_to_cdecl='`$ECHO "$lt_cv_sys_global_symbol_to_cdecl" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address_lib_prefix='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address_lib_prefix" | $SED "$delay_single_quote_subst"`' @@ -12427,7 +12375,7 @@ index afdf3966baf..877afeb7c01 100755 DSYMUTIL='`$ECHO "$DSYMUTIL" | $SED "$delay_single_quote_subst"`' NMEDIT='`$ECHO "$NMEDIT" | $SED "$delay_single_quote_subst"`' LIPO='`$ECHO "$LIPO" | $SED "$delay_single_quote_subst"`' -@@ -16420,12 +17260,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcode_shlibpath_var" | $SED "$delay_single_q +@@ -16420,12 +17260,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcod hardcode_automatic='`$ECHO "$hardcode_automatic" | $SED "$delay_single_quote_subst"`' inherit_rpath='`$ECHO "$inherit_rpath" | $SED "$delay_single_quote_subst"`' link_all_deplibs='`$ECHO "$link_all_deplibs" | $SED "$delay_single_quote_subst"`' @@ -12441,7 +12389,7 @@ index afdf3966baf..877afeb7c01 100755 file_list_spec='`$ECHO "$file_list_spec" | $SED "$delay_single_quote_subst"`' variables_saved_for_relink='`$ECHO "$variables_saved_for_relink" | $SED "$delay_single_quote_subst"`' need_lib_prefix='`$ECHO "$need_lib_prefix" | $SED "$delay_single_quote_subst"`' -@@ -16464,8 +17304,8 @@ old_archive_cmds_CXX='`$ECHO "$old_archive_cmds_CXX" | $SED "$delay_single_quote +@@ -16464,8 +17304,8 @@ old_archive_cmds_CXX='`$ECHO "$old_archi compiler_CXX='`$ECHO "$compiler_CXX" | $SED "$delay_single_quote_subst"`' GCC_CXX='`$ECHO "$GCC_CXX" | $SED "$delay_single_quote_subst"`' lt_prog_compiler_no_builtin_flag_CXX='`$ECHO "$lt_prog_compiler_no_builtin_flag_CXX" | $SED "$delay_single_quote_subst"`' @@ -12451,7 +12399,7 @@ index afdf3966baf..877afeb7c01 100755 lt_prog_compiler_static_CXX='`$ECHO "$lt_prog_compiler_static_CXX" | $SED "$delay_single_quote_subst"`' lt_cv_prog_compiler_c_o_CXX='`$ECHO "$lt_cv_prog_compiler_c_o_CXX" | $SED "$delay_single_quote_subst"`' archive_cmds_need_lc_CXX='`$ECHO "$archive_cmds_need_lc_CXX" | $SED "$delay_single_quote_subst"`' -@@ -16492,12 +17332,12 @@ hardcode_shlibpath_var_CXX='`$ECHO "$hardcode_shlibpath_var_CXX" | $SED "$delay_ +@@ -16492,12 +17332,12 @@ hardcode_shlibpath_var_CXX='`$ECHO "$har hardcode_automatic_CXX='`$ECHO "$hardcode_automatic_CXX" | $SED "$delay_single_quote_subst"`' inherit_rpath_CXX='`$ECHO "$inherit_rpath_CXX" | $SED "$delay_single_quote_subst"`' link_all_deplibs_CXX='`$ECHO "$link_all_deplibs_CXX" | $SED "$delay_single_quote_subst"`' @@ -12593,7 +12541,7 @@ index afdf3966baf..877afeb7c01 100755 # A symbol stripping program. STRIP=$lt_STRIP -@@ -17549,6 +18420,12 @@ global_symbol_to_c_name_address=$lt_lt_cv_sys_global_symbol_to_c_name_address +@@ -17549,6 +18420,12 @@ global_symbol_to_c_name_address=$lt_lt_c # Transform the output of nm in a C name address pair when lib prefix is needed. global_symbol_to_c_name_address_lib_prefix=$lt_lt_cv_sys_global_symbol_to_c_name_address_lib_prefix @@ -12854,15 +12802,9 @@ index afdf3966baf..877afeb7c01 100755 -_LT_EOF - ;; - esac -- -- -- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ -- || (rm -f "$cfgfile"; exit 1) -- -- mv -f "$cfgfile" "$ofile" || + sed '$q' "$ltmain" >> "$cfgfile" \ + || (rm -f "$cfgfile"; exit 1) -+ + + if test x"$xsi_shell" = xyes; then + sed -e '/^func_dirname ()$/,/^} # func_dirname /c\ +func_dirname ()\ @@ -13020,8 +12962,11 @@ index afdf3966baf..877afeb7c01 100755 + { $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: Unable to substitute extended shell functions in $ofile" >&5 +$as_echo "$as_me: WARNING: Unable to substitute extended shell functions in $ofile" >&2;} +fi -+ -+ + +- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ +- || (rm -f "$cfgfile"; exit 1) + +- mv -f "$cfgfile" "$ofile" || + mv -f "$cfgfile" "$ofile" || (rm -f "$ofile" && cp "$cfgfile" "$ofile" && rm -f "$cfgfile") chmod +x "$ofile" @@ -13062,8 +13007,6 @@ index afdf3966baf..877afeb7c01 100755 # Specify filename containing input files. file_list_spec=$lt_file_list_spec_CXX -diff --git a/gprofng/src/Makefile.in b/gprofng/src/Makefile.in -index 0cdd4443670..07fdb4cfc6f 100644 --- a/gprofng/src/Makefile.in +++ b/gprofng/src/Makefile.in @@ -322,6 +322,7 @@ CXXFLAGS = @CXXFLAGS@ @@ -13082,8 +13025,6 @@ index 0cdd4443670..07fdb4cfc6f 100644 MKDIR_P = @MKDIR_P@ NM = @NM@ NMEDIT = @NMEDIT@ -diff --git a/ld/Makefile.in b/ld/Makefile.in -index c3d08edbef1..7ee6acd3e03 100644 --- a/ld/Makefile.in +++ b/ld/Makefile.in @@ -390,6 +390,7 @@ CYGPATH_W = @CYGPATH_W@ @@ -13110,8 +13051,6 @@ index c3d08edbef1..7ee6acd3e03 100644 ac_ct_CC = @ac_ct_CC@ ac_ct_CXX = @ac_ct_CXX@ ac_ct_DUMPBIN = @ac_ct_DUMPBIN@ -diff --git a/ld/configure b/ld/configure -index ca3d58ff618..3cbf90b055f 100755 --- a/ld/configure +++ b/ld/configure @@ -703,8 +703,11 @@ OTOOL @@ -13134,7 +13073,7 @@ index ca3d58ff618..3cbf90b055f 100755 enable_libtool_lock enable_plugins enable_largefile -@@ -1582,6 +1586,8 @@ Optional Packages: +@@ -1587,6 +1591,8 @@ Optional Packages: --with-pic try to use only PIC/non-PIC objects [default=use both] --with-gnu-ld assume the C compiler uses GNU ld [default=no] @@ -13143,7 +13082,7 @@ index ca3d58ff618..3cbf90b055f 100755 --with-lib-path=dir1:dir2... set default LIB_PATH --with-sysroot=DIR Search for usr/lib et al within DIR. --with-gnu-ld assume the C compiler uses GNU ld default=no -@@ -5391,8 +5397,8 @@ esac +@@ -5396,8 +5402,8 @@ esac @@ -13154,7 +13093,7 @@ index ca3d58ff618..3cbf90b055f 100755 -@@ -5432,7 +5438,7 @@ ECHO=$ECHO$ECHO$ECHO$ECHO$ECHO$ECHO +@@ -5437,7 +5443,7 @@ ECHO=$ECHO$ECHO$ECHO$ECHO$ECHO$ECHO { $as_echo "$as_me:${as_lineno-$LINENO}: checking how to print strings" >&5 $as_echo_n "checking how to print strings... " >&6; } # Test print first, because it will be a builtin if present. @@ -13163,7 +13102,7 @@ index ca3d58ff618..3cbf90b055f 100755 test "X`print -r -- $ECHO 2>/dev/null`" = "X$ECHO"; then ECHO='print -r --' elif test "X`printf %s $ECHO 2>/dev/null`" = "X$ECHO"; then -@@ -6125,8 +6131,8 @@ $as_echo_n "checking whether the shell understands some XSI constructs... " >&6; +@@ -6130,8 +6136,8 @@ $as_echo_n "checking whether the shell u # Try some XSI features xsi_shell=no ( _lt_dummy="a/b/c" @@ -13174,7 +13113,7 @@ index ca3d58ff618..3cbf90b055f 100755 && eval 'test $(( 1 + 1 )) -eq 2 \ && test "${#_lt_dummy}" -eq 5' ) >/dev/null 2>&1 \ && xsi_shell=yes -@@ -6175,6 +6181,80 @@ esac +@@ -6180,6 +6186,80 @@ esac @@ -13255,7 +13194,7 @@ index ca3d58ff618..3cbf90b055f 100755 { $as_echo "$as_me:${as_lineno-$LINENO}: checking for $LD option to reload object files" >&5 $as_echo_n "checking for $LD option to reload object files... " >&6; } if ${lt_cv_ld_reload_flag+:} false; then : -@@ -6191,6 +6271,11 @@ case $reload_flag in +@@ -6196,6 +6276,11 @@ case $reload_flag in esac reload_cmds='$LD$reload_flag -o $output$reload_objs' case $host_os in @@ -13267,7 +13206,7 @@ index ca3d58ff618..3cbf90b055f 100755 darwin*) if test "$GCC" = yes; then reload_cmds='$LTCC $LTCFLAGS -nostdlib ${wl}-r -o $output$reload_objs' -@@ -6359,7 +6444,8 @@ mingw* | pw32*) +@@ -6364,7 +6449,8 @@ mingw* | pw32*) lt_cv_deplibs_check_method='file_magic ^x86 archive import|^x86 DLL' lt_cv_file_magic_cmd='func_win32_libid' else @@ -13277,7 +13216,7 @@ index ca3d58ff618..3cbf90b055f 100755 lt_cv_file_magic_cmd='$OBJDUMP -f' fi ;; -@@ -6518,6 +6604,21 @@ esac +@@ -6523,6 +6609,21 @@ esac fi { $as_echo "$as_me:${as_lineno-$LINENO}: result: $lt_cv_deplibs_check_method" >&5 $as_echo "$lt_cv_deplibs_check_method" >&6; } @@ -13299,7 +13238,7 @@ index ca3d58ff618..3cbf90b055f 100755 file_magic_cmd=$lt_cv_file_magic_cmd deplibs_check_method=$lt_cv_deplibs_check_method test -z "$deplibs_check_method" && deplibs_check_method=unknown -@@ -6533,6 +6634,157 @@ test -z "$deplibs_check_method" && deplibs_check_method=unknown +@@ -6538,6 +6639,157 @@ test -z "$deplibs_check_method" && depli @@ -13457,7 +13396,7 @@ index ca3d58ff618..3cbf90b055f 100755 plugin_option= plugin_names="liblto_plugin.so liblto_plugin-0.dll cyglto_plugin-0.dll" for plugin in $plugin_names; do -@@ -6547,8 +6799,10 @@ for plugin in $plugin_names; do +@@ -6552,8 +6804,10 @@ for plugin in $plugin_names; do done if test -n "$ac_tool_prefix"; then @@ -13470,7 +13409,7 @@ index ca3d58ff618..3cbf90b055f 100755 { $as_echo "$as_me:${as_lineno-$LINENO}: checking for $ac_word" >&5 $as_echo_n "checking for $ac_word... " >&6; } if ${ac_cv_prog_AR+:} false; then : -@@ -6564,7 +6818,7 @@ do +@@ -6569,7 +6823,7 @@ do test -z "$as_dir" && as_dir=. for ac_exec_ext in '' $ac_executable_extensions; do if as_fn_executable_p "$as_dir/$ac_word$ac_exec_ext"; then @@ -13479,7 +13418,7 @@ index ca3d58ff618..3cbf90b055f 100755 $as_echo "$as_me:${as_lineno-$LINENO}: found $as_dir/$ac_word$ac_exec_ext" >&5 break 2 fi -@@ -6584,11 +6838,15 @@ $as_echo "no" >&6; } +@@ -6589,11 +6843,15 @@ $as_echo "no" >&6; } fi @@ -13498,7 +13437,7 @@ index ca3d58ff618..3cbf90b055f 100755 { $as_echo "$as_me:${as_lineno-$LINENO}: checking for $ac_word" >&5 $as_echo_n "checking for $ac_word... " >&6; } if ${ac_cv_prog_ac_ct_AR+:} false; then : -@@ -6604,7 +6862,7 @@ do +@@ -6609,7 +6867,7 @@ do test -z "$as_dir" && as_dir=. for ac_exec_ext in '' $ac_executable_extensions; do if as_fn_executable_p "$as_dir/$ac_word$ac_exec_ext"; then @@ -13507,7 +13446,7 @@ index ca3d58ff618..3cbf90b055f 100755 $as_echo "$as_me:${as_lineno-$LINENO}: found $as_dir/$ac_word$ac_exec_ext" >&5 break 2 fi -@@ -6623,6 +6881,10 @@ else +@@ -6628,6 +6886,10 @@ else $as_echo "no" >&6; } fi @@ -13518,7 +13457,7 @@ index ca3d58ff618..3cbf90b055f 100755 if test "x$ac_ct_AR" = x; then AR="false" else -@@ -6634,29 +6896,81 @@ ac_tool_warned=yes ;; +@@ -6639,25 +6901,19 @@ ac_tool_warned=yes ;; esac AR=$ac_ct_AR fi @@ -13550,16 +13489,12 @@ index ca3d58ff618..3cbf90b055f 100755 + rm -f conftest.* +: ${AR=ar} +: ${AR_FLAGS=cru} -+ -+ -+ -+ -+ -+ -+ -+ -+ -+ + + + +@@ -6669,6 +6925,64 @@ test -z "$AR_FLAGS" && AR_FLAGS=cru + + +{ $as_echo "$as_me:${as_lineno-$LINENO}: checking for archiver @FILE support" >&5 +$as_echo_n "checking for archiver @FILE support... " >&6; } @@ -13573,7 +13508,7 @@ index ca3d58ff618..3cbf90b055f 100755 +int +main () +{ - ++ + ; + return 0; +} @@ -13602,20 +13537,27 @@ index ca3d58ff618..3cbf90b055f 100755 + +fi +rm -f core conftest.err conftest.$ac_objext conftest.$ac_ext - ++ +fi +{ $as_echo "$as_me:${as_lineno-$LINENO}: result: $lt_cv_ar_at_file" >&5 +$as_echo "$lt_cv_ar_at_file" >&6; } - ++ +if test "x$lt_cv_ar_at_file" = xno; then + archiver_list_spec= +else + archiver_list_spec=$lt_cv_ar_at_file +fi - - - -@@ -7003,8 +7317,8 @@ esac ++ ++ ++ ++ ++ ++ ++ + if test -n "$ac_tool_prefix"; then + # Extract the first word of "${ac_tool_prefix}strip", so it can be a program name with args. + set dummy ${ac_tool_prefix}strip; ac_word=$2 +@@ -7008,8 +7322,8 @@ esac lt_cv_sys_global_symbol_to_cdecl="sed -n -e 's/^T .* \(.*\)$/extern int \1();/p' -e 's/^$symcode* .* \(.*\)$/extern char \1;/p'" # Transform an extracted symbol line into symbol name and symbol address @@ -13626,7 +13568,7 @@ index ca3d58ff618..3cbf90b055f 100755 # Handle CRLF in mingw tool chain opt_cr= -@@ -7040,6 +7354,7 @@ for ac_symprfx in "" "_"; do +@@ -7045,6 +7359,7 @@ for ac_symprfx in "" "_"; do else lt_cv_sys_global_symbol_pipe="sed -n -e 's/^.*[ ]\($symcode$symcode*\)[ ][ ]*$ac_symprfx$sympat$opt_cr$/$symxfrm/p'" fi @@ -13634,7 +13576,7 @@ index ca3d58ff618..3cbf90b055f 100755 # Check to see that the pipe works correctly. pipe_works=no -@@ -7081,6 +7396,18 @@ _LT_EOF +@@ -7086,6 +7401,18 @@ _LT_EOF if $GREP ' nm_test_var$' "$nlist" >/dev/null; then if $GREP ' nm_test_func$' "$nlist" >/dev/null; then cat <<_LT_EOF > conftest.$ac_ext @@ -13653,7 +13595,7 @@ index ca3d58ff618..3cbf90b055f 100755 #ifdef __cplusplus extern "C" { #endif -@@ -7092,7 +7419,7 @@ _LT_EOF +@@ -7097,7 +7424,7 @@ _LT_EOF cat <<_LT_EOF >> conftest.$ac_ext /* The mapping between symbol names and symbols. */ @@ -13662,7 +13604,7 @@ index ca3d58ff618..3cbf90b055f 100755 const char *name; void *address; } -@@ -7118,8 +7445,8 @@ static const void *lt_preloaded_setup() { +@@ -7123,8 +7450,8 @@ static const void *lt_preloaded_setup() _LT_EOF # Now try linking the two files. mv conftest.$ac_objext conftstm.$ac_objext @@ -13673,7 +13615,7 @@ index ca3d58ff618..3cbf90b055f 100755 LIBS="conftstm.$ac_objext" CFLAGS="$CFLAGS$lt_prog_compiler_no_builtin_flag" if { { eval echo "\"\$as_me\":${as_lineno-$LINENO}: \"$ac_link\""; } >&5 -@@ -7129,8 +7456,8 @@ _LT_EOF +@@ -7134,8 +7461,8 @@ _LT_EOF test $ac_status = 0; } && test -s conftest${ac_exeext}; then pipe_works=yes fi @@ -13684,7 +13626,7 @@ index ca3d58ff618..3cbf90b055f 100755 else echo "cannot find nm_test_func in $nlist" >&5 fi -@@ -7167,6 +7494,27 @@ else +@@ -7172,6 +7499,20 @@ else $as_echo "ok" >&6; } fi @@ -13702,31 +13644,24 @@ index ca3d58ff618..3cbf90b055f 100755 + + + -+ -+ -+ -+ -+ -+ -+ -@@ -7179,10 +7527,38 @@ fi +@@ -7191,6 +7532,41 @@ fi +{ $as_echo "$as_me:${as_lineno-$LINENO}: checking for sysroot" >&5 +$as_echo_n "checking for sysroot... " >&6; } - ++ +# Check whether --with-libtool-sysroot was given. +if test "${with_libtool_sysroot+set}" = set; then : + withval=$with_libtool_sysroot; +else + with_libtool_sysroot=no +fi - - ++ ++ +lt_sysroot= +case ${with_libtool_sysroot} in #( + yes) @@ -13745,13 +13680,16 @@ index ca3d58ff618..3cbf90b055f 100755 + as_fn_error $? "The sysroot must be an absolute path." "$LINENO" 5 + ;; +esac - ++ + { $as_echo "$as_me:${as_lineno-$LINENO}: result: ${lt_sysroot:-no}" >&5 +$as_echo "${lt_sysroot:-no}" >&6; } ++ ++ ++ - -@@ -7394,6 +7770,123 @@ esac + # Check whether --enable-libtool-lock was given. +@@ -7399,6 +7775,123 @@ esac need_locks="$enable_libtool_lock" @@ -13875,7 +13813,7 @@ index ca3d58ff618..3cbf90b055f 100755 case $host_os in rhapsody* | darwin*) -@@ -7957,6 +8450,8 @@ _LT_EOF +@@ -7962,6 +8455,8 @@ _LT_EOF $LTCC $LTCFLAGS -c -o conftest.o conftest.c 2>&5 echo "$AR cru libconftest.a conftest.o" >&5 $AR cru libconftest.a conftest.o 2>&5 @@ -13884,7 +13822,7 @@ index ca3d58ff618..3cbf90b055f 100755 cat > conftest.c << _LT_EOF int main() { return 0;} _LT_EOF -@@ -8027,6 +8522,16 @@ done +@@ -8032,6 +8527,16 @@ done @@ -13901,7 +13839,7 @@ index ca3d58ff618..3cbf90b055f 100755 # Set options -@@ -8542,8 +9047,6 @@ fi +@@ -8547,8 +9052,6 @@ fi lt_prog_compiler_pic= lt_prog_compiler_static= @@ -13910,7 +13848,7 @@ index ca3d58ff618..3cbf90b055f 100755 if test "$GCC" = yes; then lt_prog_compiler_wl='-Wl,' -@@ -8709,6 +9212,12 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -8714,6 +9217,12 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='--shared' lt_prog_compiler_static='--static' ;; @@ -13923,7 +13861,7 @@ index ca3d58ff618..3cbf90b055f 100755 pgcc* | pgf77* | pgf90* | pgf95* | pgfortran*) # Portland Group compilers (*not* the Pentium gcc compiler, # which looks to be a dead project) -@@ -8771,7 +9280,7 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -8776,7 +9285,7 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='-KPIC' lt_prog_compiler_static='-Bstatic' case $cc_basename in @@ -13932,7 +13870,7 @@ index ca3d58ff618..3cbf90b055f 100755 lt_prog_compiler_wl='-Qoption ld ';; *) lt_prog_compiler_wl='-Wl,';; -@@ -8828,13 +9337,17 @@ case $host_os in +@@ -8833,13 +9342,17 @@ case $host_os in lt_prog_compiler_pic="$lt_prog_compiler_pic -DPIC" ;; esac @@ -13956,7 +13894,7 @@ index ca3d58ff618..3cbf90b055f 100755 # # Check to make sure the PIC flag actually works. -@@ -8895,6 +9408,11 @@ fi +@@ -8900,6 +9413,11 @@ fi @@ -13968,7 +13906,7 @@ index ca3d58ff618..3cbf90b055f 100755 # # Check to make sure the static flag actually works. # -@@ -9245,7 +9763,8 @@ _LT_EOF +@@ -9250,7 +9768,8 @@ _LT_EOF allow_undefined_flag=unsupported always_export_symbols=no enable_shared_with_static_runtimes=yes @@ -13978,7 +13916,7 @@ index ca3d58ff618..3cbf90b055f 100755 if $LD --help 2>&1 | $GREP 'auto-import' > /dev/null; then archive_cmds='$CC -shared $libobjs $deplibs $compiler_flags -o $output_objdir/$soname ${wl}--enable-auto-image-base -Xlinker --out-implib -Xlinker $lib' -@@ -9344,12 +9863,12 @@ _LT_EOF +@@ -9349,12 +9868,12 @@ _LT_EOF whole_archive_flag_spec='--whole-archive$convenience --no-whole-archive' hardcode_libdir_flag_spec= hardcode_libdir_flag_spec_ld='-rpath $libdir' @@ -13993,7 +13931,7 @@ index ca3d58ff618..3cbf90b055f 100755 fi ;; esac -@@ -9363,8 +9882,8 @@ _LT_EOF +@@ -9368,8 +9887,8 @@ _LT_EOF archive_cmds='$LD -Bshareable $libobjs $deplibs $linker_flags -o $lib' wlarc= else @@ -14004,7 +13942,7 @@ index ca3d58ff618..3cbf90b055f 100755 fi ;; -@@ -9382,8 +9901,8 @@ _LT_EOF +@@ -9387,8 +9906,8 @@ _LT_EOF _LT_EOF elif $LD --help 2>&1 | $GREP ': supported targets:.* elf' > /dev/null; then @@ -14015,7 +13953,7 @@ index ca3d58ff618..3cbf90b055f 100755 else ld_shlibs=no fi -@@ -9429,8 +9948,8 @@ _LT_EOF +@@ -9434,8 +9953,8 @@ _LT_EOF *) if $LD --help 2>&1 | $GREP ': supported targets:.* elf' > /dev/null; then @@ -14026,7 +13964,7 @@ index ca3d58ff618..3cbf90b055f 100755 else ld_shlibs=no fi -@@ -9560,7 +10079,13 @@ _LT_EOF +@@ -9565,7 +10084,13 @@ _LT_EOF allow_undefined_flag='-berok' # Determine the default libpath from the value encoded in an # empty executable. @@ -14041,7 +13979,7 @@ index ca3d58ff618..3cbf90b055f 100755 /* end confdefs.h. */ int -@@ -9573,22 +10098,29 @@ main () +@@ -9578,22 +10103,29 @@ main () _ACEOF if ac_fn_c_try_link "$LINENO"; then : @@ -14084,7 +14022,7 @@ index ca3d58ff618..3cbf90b055f 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" archive_expsym_cmds='$CC -o $output_objdir/$soname $libobjs $deplibs '"\${wl}$no_entry_flag"' $compiler_flags `if test "x${allow_undefined_flag}" != "x"; then func_echo_all "${wl}${allow_undefined_flag}"; else :; fi` '"\${wl}$exp_sym_flag:\$export_symbols $shared_flag" -@@ -9600,7 +10132,13 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9605,7 +10137,13 @@ if test -z "$aix_libpath"; then aix_libp else # Determine the default libpath from the value encoded in an # empty executable. @@ -14099,7 +14037,7 @@ index ca3d58ff618..3cbf90b055f 100755 /* end confdefs.h. */ int -@@ -9613,22 +10151,29 @@ main () +@@ -9618,22 +10156,29 @@ main () _ACEOF if ac_fn_c_try_link "$LINENO"; then : @@ -14142,7 +14080,7 @@ index ca3d58ff618..3cbf90b055f 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" # Warning - without using the other run time loading flags, -@@ -9673,20 +10218,63 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9678,20 +10223,63 @@ if test -z "$aix_libpath"; then aix_libp # Microsoft Visual C++. # hardcode_libdir_flag_spec is actually meaningless, as there is # no search path for DLLs. @@ -14220,7 +14158,7 @@ index ca3d58ff618..3cbf90b055f 100755 ;; darwin* | rhapsody*) -@@ -9747,7 +10335,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9752,7 +10340,7 @@ if test -z "$aix_libpath"; then aix_libp # FreeBSD 3 and greater uses gcc -shared to do shared libraries. freebsd* | dragonfly*) @@ -14229,7 +14167,7 @@ index ca3d58ff618..3cbf90b055f 100755 hardcode_libdir_flag_spec='-R$libdir' hardcode_direct=yes hardcode_shlibpath_var=no -@@ -9755,7 +10343,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9760,7 +10348,7 @@ if test -z "$aix_libpath"; then aix_libp hpux9*) if test "$GCC" = yes; then @@ -14238,7 +14176,7 @@ index ca3d58ff618..3cbf90b055f 100755 else archive_cmds='$RM $output_objdir/$soname~$LD -b +b $install_libdir -o $output_objdir/$soname $libobjs $deplibs $linker_flags~test $output_objdir/$soname = $lib || mv $output_objdir/$soname $lib' fi -@@ -9771,7 +10359,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9776,7 +10364,7 @@ if test -z "$aix_libpath"; then aix_libp hpux10*) if test "$GCC" = yes && test "$with_gnu_ld" = no; then @@ -14247,7 +14185,7 @@ index ca3d58ff618..3cbf90b055f 100755 else archive_cmds='$LD -b +h $soname +b $install_libdir -o $lib $libobjs $deplibs $linker_flags' fi -@@ -9795,10 +10383,10 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9800,10 +10388,10 @@ if test -z "$aix_libpath"; then aix_libp archive_cmds='$CC -shared ${wl}+h ${wl}$soname ${wl}+nodefaultrpath -o $lib $libobjs $deplibs $compiler_flags' ;; ia64*) @@ -14260,7 +14198,7 @@ index ca3d58ff618..3cbf90b055f 100755 ;; esac else -@@ -9877,23 +10465,36 @@ fi +@@ -9882,23 +10470,36 @@ fi irix5* | irix6* | nonstopux*) if test "$GCC" = yes; then @@ -14305,7 +14243,7 @@ index ca3d58ff618..3cbf90b055f 100755 else archive_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -o $lib' archive_expsym_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -exports_file $export_symbols -o $lib' -@@ -9978,7 +10579,7 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -9983,7 +10584,7 @@ rm -f core conftest.err conftest.$ac_obj osf4* | osf5*) # as osf3* with the addition of -msym flag if test "$GCC" = yes; then allow_undefined_flag=' ${wl}-expect_unresolved ${wl}\*' @@ -14314,7 +14252,7 @@ index ca3d58ff618..3cbf90b055f 100755 hardcode_libdir_flag_spec='${wl}-rpath ${wl}$libdir' else allow_undefined_flag=' -expect_unresolved \*' -@@ -9997,9 +10598,9 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -10002,9 +10603,9 @@ rm -f core conftest.err conftest.$ac_obj no_undefined_flag=' -z defs' if test "$GCC" = yes; then wlarc='${wl}' @@ -14326,7 +14264,7 @@ index ca3d58ff618..3cbf90b055f 100755 else case `$CC -V 2>&1` in *"Compilers 5.0"*) -@@ -10575,8 +11176,9 @@ cygwin* | mingw* | pw32* | cegcc*) +@@ -10580,8 +11181,9 @@ cygwin* | mingw* | pw32* | cegcc*) need_version=no need_lib_prefix=no @@ -14338,7 +14276,7 @@ index ca3d58ff618..3cbf90b055f 100755 library_names_spec='$libname.dll.a' # DLL is installed to $(libdir)/../bin by postinstall_cmds postinstall_cmds='base_file=`basename \${file}`~ -@@ -10609,13 +11211,71 @@ cygwin* | mingw* | pw32* | cegcc*) +@@ -10614,13 +11216,71 @@ cygwin* | mingw* | pw32* | cegcc*) library_names_spec='`echo ${libname} | sed -e 's/^lib/pw/'``echo ${release} | $SED -e 's/[.]/-/g'`${versuffix}${shared_ext}' ;; esac @@ -14411,16 +14349,16 @@ index ca3d58ff618..3cbf90b055f 100755 # FIXME: first we should search . and the directory the executable is in shlibpath_var=PATH ;; -@@ -11517,7 +12177,7 @@ else +@@ -11522,7 +12182,7 @@ else lt_dlunknown=0; lt_dlno_uscore=1; lt_dlneed_uscore=2 lt_status=$lt_dlunknown cat > conftest.$ac_ext <<_LT_EOF --#line 11520 "configure" +-#line 11525 "configure" +#line $LINENO "configure" #include "confdefs.h" #if HAVE_DLFCN_H -@@ -11561,10 +12221,10 @@ else +@@ -11566,10 +12226,10 @@ else /* When -fvisbility=hidden is used, assume the code has been annotated correspondingly for the symbols needed. */ #if defined(__GNUC__) && (((__GNUC__ == 3) && (__GNUC_MINOR__ >= 3)) || (__GNUC__ > 3)) @@ -14433,16 +14371,16 @@ index ca3d58ff618..3cbf90b055f 100755 int main () { void *self = dlopen (0, LT_DLGLOBAL|LT_DLLAZY_OR_NOW); -@@ -11623,7 +12283,7 @@ else +@@ -11628,7 +12288,7 @@ else lt_dlunknown=0; lt_dlno_uscore=1; lt_dlneed_uscore=2 lt_status=$lt_dlunknown cat > conftest.$ac_ext <<_LT_EOF --#line 11626 "configure" +-#line 11631 "configure" +#line $LINENO "configure" #include "confdefs.h" #if HAVE_DLFCN_H -@@ -11667,10 +12327,10 @@ else +@@ -11672,10 +12332,10 @@ else /* When -fvisbility=hidden is used, assume the code has been annotated correspondingly for the symbols needed. */ #if defined(__GNUC__) && (((__GNUC__ == 3) && (__GNUC_MINOR__ >= 3)) || (__GNUC__ > 3)) @@ -14455,7 +14393,7 @@ index ca3d58ff618..3cbf90b055f 100755 int main () { void *self = dlopen (0, LT_DLGLOBAL|LT_DLLAZY_OR_NOW); -@@ -12062,6 +12722,7 @@ $RM -r conftest* +@@ -12067,6 +12727,7 @@ $RM -r conftest* # Allow CC to be a program name with arguments. lt_save_CC=$CC @@ -14463,7 +14401,7 @@ index ca3d58ff618..3cbf90b055f 100755 lt_save_LD=$LD lt_save_GCC=$GCC GCC=$GXX -@@ -12079,6 +12740,7 @@ $RM -r conftest* +@@ -12084,6 +12745,7 @@ $RM -r conftest* fi test -z "${LDCXX+set}" || LD=$LDCXX CC=${CXX-"c++"} @@ -14471,7 +14409,7 @@ index ca3d58ff618..3cbf90b055f 100755 compiler=$CC compiler_CXX=$CC for cc_temp in $compiler""; do -@@ -12361,7 +13023,13 @@ $as_echo_n "checking whether the $compiler linker ($LD) supports shared librarie +@@ -12366,7 +13028,13 @@ $as_echo_n "checking whether the $compil allow_undefined_flag_CXX='-berok' # Determine the default libpath from the value encoded in an empty # executable. @@ -14486,7 +14424,7 @@ index ca3d58ff618..3cbf90b055f 100755 /* end confdefs.h. */ int -@@ -12374,22 +13042,29 @@ main () +@@ -12379,22 +13047,29 @@ main () _ACEOF if ac_fn_cxx_try_link "$LINENO"; then : @@ -14529,7 +14467,7 @@ index ca3d58ff618..3cbf90b055f 100755 hardcode_libdir_flag_spec_CXX='${wl}-blibpath:$libdir:'"$aix_libpath" -@@ -12402,7 +13077,13 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -12407,7 +13082,13 @@ if test -z "$aix_libpath"; then aix_libp else # Determine the default libpath from the value encoded in an # empty executable. @@ -14544,7 +14482,7 @@ index ca3d58ff618..3cbf90b055f 100755 /* end confdefs.h. */ int -@@ -12415,22 +13096,29 @@ main () +@@ -12420,22 +13101,29 @@ main () _ACEOF if ac_fn_cxx_try_link "$LINENO"; then : @@ -14587,7 +14525,7 @@ index ca3d58ff618..3cbf90b055f 100755 hardcode_libdir_flag_spec_CXX='${wl}-blibpath:$libdir:'"$aix_libpath" # Warning - without using the other run time loading flags, -@@ -12473,29 +13161,75 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -12478,29 +13166,75 @@ if test -z "$aix_libpath"; then aix_libp ;; cygwin* | mingw* | pw32* | cegcc*) @@ -14686,7 +14624,7 @@ index ca3d58ff618..3cbf90b055f 100755 darwin* | rhapsody*) -@@ -12601,7 +13335,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -12606,7 +13340,7 @@ if test -z "$aix_libpath"; then aix_libp ;; *) if test "$GXX" = yes; then @@ -14695,7 +14633,7 @@ index ca3d58ff618..3cbf90b055f 100755 else # FIXME: insert proper C++ library support ld_shlibs_CXX=no -@@ -12672,10 +13406,10 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -12677,10 +13411,10 @@ if test -z "$aix_libpath"; then aix_libp archive_cmds_CXX='$CC -shared -nostdlib -fPIC ${wl}+h ${wl}$soname ${wl}+nodefaultrpath -o $lib $predep_objects $libobjs $deplibs $postdep_objects $compiler_flags' ;; ia64*) @@ -14708,7 +14646,7 @@ index ca3d58ff618..3cbf90b055f 100755 ;; esac fi -@@ -12716,9 +13450,9 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -12721,9 +13455,9 @@ if test -z "$aix_libpath"; then aix_libp *) if test "$GXX" = yes; then if test "$with_gnu_ld" = no; then @@ -14720,7 +14658,7 @@ index ca3d58ff618..3cbf90b055f 100755 fi fi link_all_deplibs_CXX=yes -@@ -12996,7 +13730,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -13001,7 +13735,7 @@ if test -z "$aix_libpath"; then aix_libp archive_cmds_CXX='$CC -shared -nostdlib ${allow_undefined_flag} $predep_objects $libobjs $deplibs $postdep_objects $compiler_flags ${wl}-soname ${wl}$soname `test -n "$verstring" && func_echo_all "${wl}-set_version ${wl}$verstring"` ${wl}-update_registry ${wl}${output_objdir}/so_locations -o $lib' ;; *) @@ -14729,7 +14667,7 @@ index ca3d58ff618..3cbf90b055f 100755 ;; esac -@@ -13042,7 +13776,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -13047,7 +13781,7 @@ if test -z "$aix_libpath"; then aix_libp solaris*) case $cc_basename in @@ -14738,7 +14676,7 @@ index ca3d58ff618..3cbf90b055f 100755 # Sun C++ 4.2, 5.x and Centerline C++ archive_cmds_need_lc_CXX=yes no_undefined_flag_CXX=' -zdefs' -@@ -13083,9 +13817,9 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -13088,9 +13822,9 @@ if test -z "$aix_libpath"; then aix_libp if test "$GXX" = yes && test "$with_gnu_ld" = no; then no_undefined_flag_CXX=' ${wl}-z ${wl}defs' if $CC --version | $GREP -v '^2\.7' > /dev/null; then @@ -14750,7 +14688,7 @@ index ca3d58ff618..3cbf90b055f 100755 # Commands to make compiler produce verbose output that lists # what "hidden" libraries, object files and flags are used when -@@ -13221,6 +13955,13 @@ private: +@@ -13226,6 +13960,13 @@ private: }; _LT_EOF @@ -14764,7 +14702,7 @@ index ca3d58ff618..3cbf90b055f 100755 if { { eval echo "\"\$as_me\":${as_lineno-$LINENO}: \"$ac_compile\""; } >&5 (eval $ac_compile) 2>&5 ac_status=$? -@@ -13234,7 +13975,7 @@ if { { eval echo "\"\$as_me\":${as_lineno-$LINENO}: \"$ac_compile\""; } >&5 +@@ -13239,7 +13980,7 @@ if { { eval echo "\"\$as_me\":${as_linen pre_test_object_deps_done=no for p in `eval "$output_verbose_link_cmd"`; do @@ -14773,7 +14711,7 @@ index ca3d58ff618..3cbf90b055f 100755 -L* | -R* | -l*) # Some compilers place space between "-{L,R}" and the path. -@@ -13243,13 +13984,22 @@ if { { eval echo "\"\$as_me\":${as_lineno-$LINENO}: \"$ac_compile\""; } >&5 +@@ -13248,13 +13989,22 @@ if { { eval echo "\"\$as_me\":${as_linen test $p = "-R"; then prev=$p continue @@ -14800,7 +14738,7 @@ index ca3d58ff618..3cbf90b055f 100755 # Internal compiler library paths should come after those # provided the user. The postdeps already come after the # user supplied libs so there is no need to process them. -@@ -13269,8 +14019,10 @@ if { { eval echo "\"\$as_me\":${as_lineno-$LINENO}: \"$ac_compile\""; } >&5 +@@ -13274,8 +14024,10 @@ if { { eval echo "\"\$as_me\":${as_linen postdeps_CXX="${postdeps_CXX} ${prev}${p}" fi fi @@ -14811,7 +14749,7 @@ index ca3d58ff618..3cbf90b055f 100755 *.$objext) # This assumes that the test object file only shows up # once in the compiler output. -@@ -13306,6 +14058,7 @@ else +@@ -13311,6 +14063,7 @@ else fi $RM -f confest.$objext @@ -14819,7 +14757,7 @@ index ca3d58ff618..3cbf90b055f 100755 # PORTME: override above test on systems where it is broken case $host_os in -@@ -13341,7 +14094,7 @@ linux*) +@@ -13346,7 +14099,7 @@ linux*) solaris*) case $cc_basename in @@ -14828,7 +14766,7 @@ index ca3d58ff618..3cbf90b055f 100755 # The more standards-conforming stlport4 library is # incompatible with the Cstd library. Avoid specifying # it if it's in CXXFLAGS. Ignore libCrun as -@@ -13406,8 +14159,6 @@ fi +@@ -13411,8 +14164,6 @@ fi lt_prog_compiler_pic_CXX= lt_prog_compiler_static_CXX= @@ -14837,7 +14775,7 @@ index ca3d58ff618..3cbf90b055f 100755 # C++ specific cases for pic, static, wl, etc. if test "$GXX" = yes; then -@@ -13512,6 +14263,11 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -13517,6 +14268,11 @@ $as_echo_n "checking for $compiler optio ;; esac ;; @@ -14849,7 +14787,7 @@ index ca3d58ff618..3cbf90b055f 100755 dgux*) case $cc_basename in ec++*) -@@ -13664,7 +14420,7 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -13669,7 +14425,7 @@ $as_echo_n "checking for $compiler optio ;; solaris*) case $cc_basename in @@ -14858,7 +14796,7 @@ index ca3d58ff618..3cbf90b055f 100755 # Sun C++ 4.2, 5.x and Centerline C++ lt_prog_compiler_pic_CXX='-KPIC' lt_prog_compiler_static_CXX='-Bstatic' -@@ -13729,10 +14485,17 @@ case $host_os in +@@ -13734,10 +14490,17 @@ case $host_os in lt_prog_compiler_pic_CXX="$lt_prog_compiler_pic_CXX -DPIC" ;; esac @@ -14879,7 +14817,7 @@ index ca3d58ff618..3cbf90b055f 100755 # # Check to make sure the PIC flag actually works. -@@ -13790,6 +14553,8 @@ fi +@@ -13795,6 +14558,8 @@ fi @@ -14888,7 +14826,7 @@ index ca3d58ff618..3cbf90b055f 100755 # # Check to make sure the static flag actually works. # -@@ -13967,6 +14732,7 @@ fi +@@ -13972,6 +14737,7 @@ fi $as_echo_n "checking whether the $compiler linker ($LD) supports shared libraries... " >&6; } export_symbols_cmds_CXX='$NM $libobjs $convenience | $global_symbol_pipe | $SED '\''s/.* //'\'' | sort | uniq > $export_symbols' @@ -14896,7 +14834,7 @@ index ca3d58ff618..3cbf90b055f 100755 case $host_os in aix[4-9]*) # If we're using GNU nm, then we don't want the "-C" option. -@@ -13981,15 +14747,20 @@ $as_echo_n "checking whether the $compiler linker ($LD) supports shared librarie +@@ -13986,15 +14752,20 @@ $as_echo_n "checking whether the $compil ;; pw32*) export_symbols_cmds_CXX="$ltdll_cmds" @@ -14922,7 +14860,7 @@ index ca3d58ff618..3cbf90b055f 100755 { $as_echo "$as_me:${as_lineno-$LINENO}: result: $ld_shlibs_CXX" >&5 $as_echo "$ld_shlibs_CXX" >&6; } -@@ -14252,8 +15023,9 @@ cygwin* | mingw* | pw32* | cegcc*) +@@ -14257,8 +15028,9 @@ cygwin* | mingw* | pw32* | cegcc*) need_version=no need_lib_prefix=no @@ -14934,7 +14872,7 @@ index ca3d58ff618..3cbf90b055f 100755 library_names_spec='$libname.dll.a' # DLL is installed to $(libdir)/../bin by postinstall_cmds postinstall_cmds='base_file=`basename \${file}`~ -@@ -14285,13 +15057,71 @@ cygwin* | mingw* | pw32* | cegcc*) +@@ -14290,13 +15062,71 @@ cygwin* | mingw* | pw32* | cegcc*) library_names_spec='`echo ${libname} | sed -e 's/^lib/pw/'``echo ${release} | $SED -e 's/[.]/-/g'`${versuffix}${shared_ext}' ;; esac @@ -15007,7 +14945,7 @@ index ca3d58ff618..3cbf90b055f 100755 # FIXME: first we should search . and the directory the executable is in shlibpath_var=PATH ;; -@@ -14855,6 +15685,7 @@ fi +@@ -14860,6 +15690,7 @@ fi fi # test -n "$compiler" CC=$lt_save_CC @@ -15015,7 +14953,7 @@ index ca3d58ff618..3cbf90b055f 100755 LDCXX=$LD LD=$lt_save_LD GCC=$lt_save_GCC -@@ -19900,13 +20731,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_single_quote_subst"`' +@@ -19949,13 +20780,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_ lt_unset='`$ECHO "$lt_unset" | $SED "$delay_single_quote_subst"`' lt_SP2NL='`$ECHO "$lt_SP2NL" | $SED "$delay_single_quote_subst"`' lt_NL2SP='`$ECHO "$lt_NL2SP" | $SED "$delay_single_quote_subst"`' @@ -15036,7 +14974,7 @@ index ca3d58ff618..3cbf90b055f 100755 STRIP='`$ECHO "$STRIP" | $SED "$delay_single_quote_subst"`' RANLIB='`$ECHO "$RANLIB" | $SED "$delay_single_quote_subst"`' old_postinstall_cmds='`$ECHO "$old_postinstall_cmds" | $SED "$delay_single_quote_subst"`' -@@ -19921,14 +20759,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$lt_cv_sys_global_symbol_pipe" | $SED "$de +@@ -19970,14 +20808,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$l lt_cv_sys_global_symbol_to_cdecl='`$ECHO "$lt_cv_sys_global_symbol_to_cdecl" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address_lib_prefix='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address_lib_prefix" | $SED "$delay_single_quote_subst"`' @@ -15055,7 +14993,7 @@ index ca3d58ff618..3cbf90b055f 100755 DSYMUTIL='`$ECHO "$DSYMUTIL" | $SED "$delay_single_quote_subst"`' NMEDIT='`$ECHO "$NMEDIT" | $SED "$delay_single_quote_subst"`' LIPO='`$ECHO "$LIPO" | $SED "$delay_single_quote_subst"`' -@@ -19961,12 +20802,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcode_shlibpath_var" | $SED "$delay_single_q +@@ -20010,12 +20851,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcod hardcode_automatic='`$ECHO "$hardcode_automatic" | $SED "$delay_single_quote_subst"`' inherit_rpath='`$ECHO "$inherit_rpath" | $SED "$delay_single_quote_subst"`' link_all_deplibs='`$ECHO "$link_all_deplibs" | $SED "$delay_single_quote_subst"`' @@ -15069,7 +15007,7 @@ index ca3d58ff618..3cbf90b055f 100755 file_list_spec='`$ECHO "$file_list_spec" | $SED "$delay_single_quote_subst"`' variables_saved_for_relink='`$ECHO "$variables_saved_for_relink" | $SED "$delay_single_quote_subst"`' need_lib_prefix='`$ECHO "$need_lib_prefix" | $SED "$delay_single_quote_subst"`' -@@ -20005,8 +20846,8 @@ old_archive_cmds_CXX='`$ECHO "$old_archive_cmds_CXX" | $SED "$delay_single_quote +@@ -20054,8 +20895,8 @@ old_archive_cmds_CXX='`$ECHO "$old_archi compiler_CXX='`$ECHO "$compiler_CXX" | $SED "$delay_single_quote_subst"`' GCC_CXX='`$ECHO "$GCC_CXX" | $SED "$delay_single_quote_subst"`' lt_prog_compiler_no_builtin_flag_CXX='`$ECHO "$lt_prog_compiler_no_builtin_flag_CXX" | $SED "$delay_single_quote_subst"`' @@ -15079,7 +15017,7 @@ index ca3d58ff618..3cbf90b055f 100755 lt_prog_compiler_static_CXX='`$ECHO "$lt_prog_compiler_static_CXX" | $SED "$delay_single_quote_subst"`' lt_cv_prog_compiler_c_o_CXX='`$ECHO "$lt_cv_prog_compiler_c_o_CXX" | $SED "$delay_single_quote_subst"`' archive_cmds_need_lc_CXX='`$ECHO "$archive_cmds_need_lc_CXX" | $SED "$delay_single_quote_subst"`' -@@ -20033,12 +20874,12 @@ hardcode_shlibpath_var_CXX='`$ECHO "$hardcode_shlibpath_var_CXX" | $SED "$delay_ +@@ -20082,12 +20923,12 @@ hardcode_shlibpath_var_CXX='`$ECHO "$har hardcode_automatic_CXX='`$ECHO "$hardcode_automatic_CXX" | $SED "$delay_single_quote_subst"`' inherit_rpath_CXX='`$ECHO "$inherit_rpath_CXX" | $SED "$delay_single_quote_subst"`' link_all_deplibs_CXX='`$ECHO "$link_all_deplibs_CXX" | $SED "$delay_single_quote_subst"`' @@ -15093,7 +15031,7 @@ index ca3d58ff618..3cbf90b055f 100755 file_list_spec_CXX='`$ECHO "$file_list_spec_CXX" | $SED "$delay_single_quote_subst"`' hardcode_action_CXX='`$ECHO "$hardcode_action_CXX" | $SED "$delay_single_quote_subst"`' compiler_lib_search_dirs_CXX='`$ECHO "$compiler_lib_search_dirs_CXX" | $SED "$delay_single_quote_subst"`' -@@ -20076,8 +20917,13 @@ reload_flag \ +@@ -20125,8 +20966,13 @@ reload_flag \ OBJDUMP \ deplibs_check_method \ file_magic_cmd \ @@ -15107,7 +15045,7 @@ index ca3d58ff618..3cbf90b055f 100755 STRIP \ RANLIB \ CC \ -@@ -20087,12 +20933,14 @@ lt_cv_sys_global_symbol_pipe \ +@@ -20136,12 +20982,14 @@ lt_cv_sys_global_symbol_pipe \ lt_cv_sys_global_symbol_to_cdecl \ lt_cv_sys_global_symbol_to_c_name_address \ lt_cv_sys_global_symbol_to_c_name_address_lib_prefix \ @@ -15123,7 +15061,7 @@ index ca3d58ff618..3cbf90b055f 100755 DSYMUTIL \ NMEDIT \ LIPO \ -@@ -20108,7 +20956,6 @@ no_undefined_flag \ +@@ -20157,7 +21005,6 @@ no_undefined_flag \ hardcode_libdir_flag_spec \ hardcode_libdir_flag_spec_ld \ hardcode_libdir_separator \ @@ -15131,7 +15069,7 @@ index ca3d58ff618..3cbf90b055f 100755 exclude_expsyms \ include_expsyms \ file_list_spec \ -@@ -20130,8 +20977,8 @@ LD_CXX \ +@@ -20179,8 +21026,8 @@ LD_CXX \ reload_flag_CXX \ compiler_CXX \ lt_prog_compiler_no_builtin_flag_CXX \ @@ -15141,7 +15079,7 @@ index ca3d58ff618..3cbf90b055f 100755 lt_prog_compiler_static_CXX \ lt_cv_prog_compiler_c_o_CXX \ export_dynamic_flag_spec_CXX \ -@@ -20143,7 +20990,6 @@ no_undefined_flag_CXX \ +@@ -20192,7 +21039,6 @@ no_undefined_flag_CXX \ hardcode_libdir_flag_spec_CXX \ hardcode_libdir_flag_spec_ld_CXX \ hardcode_libdir_separator_CXX \ @@ -15149,7 +15087,7 @@ index ca3d58ff618..3cbf90b055f 100755 exclude_expsyms_CXX \ include_expsyms_CXX \ file_list_spec_CXX \ -@@ -20177,6 +21023,7 @@ module_cmds \ +@@ -20226,6 +21072,7 @@ module_cmds \ module_expsym_cmds \ export_symbols_cmds \ prelink_cmds \ @@ -15157,7 +15095,7 @@ index ca3d58ff618..3cbf90b055f 100755 postinstall_cmds \ postuninstall_cmds \ finish_cmds \ -@@ -20191,7 +21038,8 @@ archive_expsym_cmds_CXX \ +@@ -20240,7 +21087,8 @@ archive_expsym_cmds_CXX \ module_cmds_CXX \ module_expsym_cmds_CXX \ export_symbols_cmds_CXX \ @@ -15167,7 +15105,7 @@ index ca3d58ff618..3cbf90b055f 100755 case \`eval \\\\\$ECHO \\\\""\\\\\$\$var"\\\\"\` in *[\\\\\\\`\\"\\\$]*) eval "lt_\$var=\\\\\\"\\\`\\\$ECHO \\"\\\$\$var\\" | \\\$SED -e \\"\\\$double_quote_subst\\" -e \\"\\\$sed_quote_subst\\" -e \\"\\\$delay_variable_subst\\"\\\`\\\\\\"" -@@ -20956,7 +21804,8 @@ $as_echo X"$file" | +@@ -21005,7 +21853,8 @@ $as_echo X"$file" | # NOTE: Changes made to this file will be lost: look at ltmain.sh. # # Copyright (C) 1996, 1997, 1998, 1999, 2000, 2001, 2003, 2004, 2005, @@ -15177,7 +15115,7 @@ index ca3d58ff618..3cbf90b055f 100755 # Written by Gordon Matzigkeit, 1996 # # This file is part of GNU Libtool. -@@ -21059,19 +21908,42 @@ SP2NL=$lt_lt_SP2NL +@@ -21108,19 +21957,42 @@ SP2NL=$lt_lt_SP2NL # turn newlines into spaces. NL2SP=$lt_lt_NL2SP @@ -15221,7 +15159,7 @@ index ca3d58ff618..3cbf90b055f 100755 # A symbol stripping program. STRIP=$lt_STRIP -@@ -21101,6 +21973,12 @@ global_symbol_to_c_name_address=$lt_lt_cv_sys_global_symbol_to_c_name_address +@@ -21150,6 +22022,12 @@ global_symbol_to_c_name_address=$lt_lt_c # Transform the output of nm in a C name address pair when lib prefix is needed. global_symbol_to_c_name_address_lib_prefix=$lt_lt_cv_sys_global_symbol_to_c_name_address_lib_prefix @@ -15234,7 +15172,7 @@ index ca3d58ff618..3cbf90b055f 100755 # The name of the directory that contains temporary libtool files. objdir=$objdir -@@ -21110,6 +21988,9 @@ MAGIC_CMD=$MAGIC_CMD +@@ -21159,6 +22037,9 @@ MAGIC_CMD=$MAGIC_CMD # Must we lock files when doing compilation? need_locks=$lt_need_locks @@ -15244,7 +15182,7 @@ index ca3d58ff618..3cbf90b055f 100755 # Tool to manipulate archived DWARF debug symbol files on Mac OS X. DSYMUTIL=$lt_DSYMUTIL -@@ -21224,12 +22105,12 @@ with_gcc=$GCC +@@ -21273,12 +22154,12 @@ with_gcc=$GCC # Compiler flag to turn off builtin functions. no_builtin_flag=$lt_lt_prog_compiler_no_builtin_flag @@ -15260,7 +15198,7 @@ index ca3d58ff618..3cbf90b055f 100755 # Compiler flag to prevent dynamic linking. link_static_flag=$lt_lt_prog_compiler_static -@@ -21316,9 +22197,6 @@ inherit_rpath=$inherit_rpath +@@ -21365,9 +22246,6 @@ inherit_rpath=$inherit_rpath # Whether libtool must link a program against all its dependency libraries. link_all_deplibs=$link_all_deplibs @@ -15270,7 +15208,7 @@ index ca3d58ff618..3cbf90b055f 100755 # Set to "yes" if exported symbols are required. always_export_symbols=$always_export_symbols -@@ -21334,6 +22212,9 @@ include_expsyms=$lt_include_expsyms +@@ -21383,6 +22261,9 @@ include_expsyms=$lt_include_expsyms # Commands necessary for linking programs (against libraries) with templates. prelink_cmds=$lt_prelink_cmds @@ -15280,7 +15218,7 @@ index ca3d58ff618..3cbf90b055f 100755 # Specify filename containing input files. file_list_spec=$lt_file_list_spec -@@ -21380,210 +22261,169 @@ ltmain="$ac_aux_dir/ltmain.sh" +@@ -21429,210 +22310,169 @@ ltmain="$ac_aux_dir/ltmain.sh" # if finds mixed CR/LF and LF-only lines. Since sed operates in # text mode, it properly converts lines to CR/LF. This bash problem # is reportedly fixed, but why not run on old versions too? @@ -15482,15 +15420,9 @@ index ca3d58ff618..3cbf90b055f 100755 -_LT_EOF - ;; - esac -- -- -- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ -- || (rm -f "$cfgfile"; exit 1) -- -- mv -f "$cfgfile" "$ofile" || + sed '$q' "$ltmain" >> "$cfgfile" \ + || (rm -f "$cfgfile"; exit 1) -+ + + if test x"$xsi_shell" = xyes; then + sed -e '/^func_dirname ()$/,/^} # func_dirname /c\ +func_dirname ()\ @@ -15648,13 +15580,16 @@ index ca3d58ff618..3cbf90b055f 100755 + { $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: Unable to substitute extended shell functions in $ofile" >&5 +$as_echo "$as_me: WARNING: Unable to substitute extended shell functions in $ofile" >&2;} +fi -+ -+ + +- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ +- || (rm -f "$cfgfile"; exit 1) + +- mv -f "$cfgfile" "$ofile" || + mv -f "$cfgfile" "$ofile" || (rm -f "$ofile" && cp "$cfgfile" "$ofile" && rm -f "$cfgfile") chmod +x "$ofile" -@@ -21611,12 +22451,12 @@ with_gcc=$GCC_CXX +@@ -21660,12 +22500,12 @@ with_gcc=$GCC_CXX # Compiler flag to turn off builtin functions. no_builtin_flag=$lt_lt_prog_compiler_no_builtin_flag_CXX @@ -15670,7 +15605,7 @@ index ca3d58ff618..3cbf90b055f 100755 # Compiler flag to prevent dynamic linking. link_static_flag=$lt_lt_prog_compiler_static_CXX -@@ -21703,9 +22543,6 @@ inherit_rpath=$inherit_rpath_CXX +@@ -21752,9 +22592,6 @@ inherit_rpath=$inherit_rpath_CXX # Whether libtool must link a program against all its dependency libraries. link_all_deplibs=$link_all_deplibs_CXX @@ -15680,7 +15615,7 @@ index ca3d58ff618..3cbf90b055f 100755 # Set to "yes" if exported symbols are required. always_export_symbols=$always_export_symbols_CXX -@@ -21721,6 +22558,9 @@ include_expsyms=$lt_include_expsyms_CXX +@@ -21770,6 +22607,9 @@ include_expsyms=$lt_include_expsyms_CXX # Commands necessary for linking programs (against libraries) with templates. prelink_cmds=$lt_prelink_cmds_CXX @@ -15690,8 +15625,6 @@ index ca3d58ff618..3cbf90b055f 100755 # Specify filename containing input files. file_list_spec=$lt_file_list_spec_CXX -diff --git a/libbacktrace/Makefile.in b/libbacktrace/Makefile.in -index 49852a21d37..d371dda2d34 100644 --- a/libbacktrace/Makefile.in +++ b/libbacktrace/Makefile.in @@ -1,7 +1,7 @@ @@ -15742,7 +15675,7 @@ index 49852a21d37..d371dda2d34 100644 @NATIVE_TRUE@am__EXEEXT_1 = allocfail$(EXEEXT) @HAVE_BUILDID_TRUE@@HAVE_ELF_TRUE@@HAVE_OBJCOPY_DEBUGLINK_TRUE@@NATIVE_TRUE@am__EXEEXT_2 = b2test$(EXEEXT) @HAVE_BUILDID_TRUE@@HAVE_DWZ_TRUE@@HAVE_ELF_TRUE@@HAVE_OBJCOPY_DEBUGLINK_TRUE@@NATIVE_TRUE@am__EXEEXT_3 = b3test$(EXEEXT) -@@ -253,6 +222,37 @@ am__EXEEXT_16 = $(am__EXEEXT_4) $(am__EXEEXT_5) $(am__EXEEXT_6) \ +@@ -253,6 +222,37 @@ am__EXEEXT_16 = $(am__EXEEXT_4) $(am__EX $(am__EXEEXT_7) $(am__EXEEXT_8) $(am__EXEEXT_9) \ $(am__EXEEXT_10) $(am__EXEEXT_11) $(am__EXEEXT_12) \ $(am__EXEEXT_13) $(am__EXEEXT_14) $(am__EXEEXT_15) @@ -15754,7 +15687,7 @@ index 49852a21d37..d371dda2d34 100644 +AM_V_lt = $(am__v_lt_@AM_V@) +am__v_lt_ = $(am__v_lt_@AM_DEFAULT_V@) +am__v_lt_0 = --silent -+am__v_lt_1 = ++am__v_lt_1 = +am__objects_1 = atomic.lo dwarf.lo fileline.lo posix.lo print.lo \ + sort.lo state.lo +@NATIVE_TRUE@am_libbacktrace_alloc_la_OBJECTS = $(am__objects_1) @@ -15818,7 +15751,7 @@ index 49852a21d37..d371dda2d34 100644 RECHECK_LOGS = $(TEST_LOGS) TEST_SUITE_LOG = test-suite.log TEST_EXTENSIONS = @EXEEXT@ .test -@@ -861,8 +859,11 @@ CLOCK_GETTIME_LINK = @CLOCK_GETTIME_LINK@ +@@ -861,8 +859,11 @@ CLOCK_GETTIME_LINK = @CLOCK_GETTIME_LINK COMM = @COMM@ CPP = @CPP@ CPPFLAGS = @CPPFLAGS@ @@ -15854,7 +15787,7 @@ index 49852a21d37..d371dda2d34 100644 ac_ct_CC = @ac_ct_CC@ ac_ct_DUMPBIN = @ac_ct_DUMPBIN@ am__leading_dot = @am__leading_dot@ -@@ -1267,8 +1271,8 @@ Makefile: $(srcdir)/Makefile.in $(top_builddir)/config.status +@@ -1267,8 +1271,8 @@ Makefile: $(srcdir)/Makefile.in $(top_bu echo ' $(SHELL) ./config.status'; \ $(SHELL) ./config.status;; \ *) \ @@ -15865,7 +15798,7 @@ index 49852a21d37..d371dda2d34 100644 esac; $(top_srcdir)/../multilib.am $(am__empty): -@@ -1300,6 +1304,15 @@ backtrace-supported.h: $(top_builddir)/config.status $(srcdir)/backtrace-support +@@ -1300,6 +1304,15 @@ backtrace-supported.h: $(top_builddir)/c install-debuginfo-for-buildid.sh: $(top_builddir)/config.status $(srcdir)/install-debuginfo-for-buildid.sh.in cd $(top_builddir) && $(SHELL) ./config.status $@ @@ -15881,7 +15814,7 @@ index 49852a21d37..d371dda2d34 100644 clean-checkLTLIBRARIES: -test -z "$(check_LTLIBRARIES)" || rm -f $(check_LTLIBRARIES) @list='$(check_LTLIBRARIES)'; \ -@@ -1337,15 +1350,6 @@ libbacktrace_instrumented_alloc.la: $(libbacktrace_instrumented_alloc_la_OBJECTS +@@ -1337,15 +1350,6 @@ libbacktrace_instrumented_alloc.la: $(li libbacktrace_noformat.la: $(libbacktrace_noformat_la_OBJECTS) $(libbacktrace_noformat_la_DEPENDENCIES) $(EXTRA_libbacktrace_noformat_la_DEPENDENCIES) $(AM_V_CCLD)$(LINK) $(am_libbacktrace_noformat_la_rpath) $(libbacktrace_noformat_la_OBJECTS) $(libbacktrace_noformat_la_LIBADD) $(LIBS) @@ -15933,8 +15866,6 @@ index 49852a21d37..d371dda2d34 100644 $(check_DATA) $(MAKE) $(AM_MAKEFLAGS) check-TESTS check: check-am -diff --git a/libbacktrace/aclocal.m4 b/libbacktrace/aclocal.m4 -index 528e6173930..d88a5ec84f2 100644 --- a/libbacktrace/aclocal.m4 +++ b/libbacktrace/aclocal.m4 @@ -1,6 +1,6 @@ @@ -15946,7 +15877,7 @@ index 528e6173930..d88a5ec84f2 100644 # This file is free software; the Free Software Foundation # gives unlimited permission to copy and/or distribute it, -@@ -20,7 +20,7 @@ You have another version of autoconf. It may work, but is not guaranteed to. +@@ -20,7 +20,7 @@ You have another version of autoconf. I If you have problems, you may need to regenerate the build system entirely. To do so, use the procedure documented by the package, typically 'autoreconf'.])]) @@ -15955,7 +15886,7 @@ index 528e6173930..d88a5ec84f2 100644 # # This file is free software; the Free Software Foundation # gives unlimited permission to copy and/or distribute it, -@@ -32,10 +32,10 @@ To do so, use the procedure documented by the package, typically 'autoreconf'.]) +@@ -32,10 +32,10 @@ To do so, use the procedure documented b # generated from the m4 files accompanying Automake X.Y. # (This private macro should not be called outside this file.) AC_DEFUN([AM_AUTOMAKE_VERSION], @@ -16014,7 +15945,7 @@ index 528e6173930..d88a5ec84f2 100644 dnl Autoconf wants to disallow AM_ names. We explicitly allow dnl the ones we care about. m4_pattern_allow([^AM_[A-Z]+FLAGS$])dnl -@@ -207,7 +211,7 @@ m4_ifval([$3], [_AM_SET_OPTION([no-define])])dnl +@@ -207,7 +211,7 @@ m4_ifval([$3], [_AM_SET_OPTION([no-defin [_AM_SET_OPTIONS([$1])dnl dnl Diagnose old-style AC_INIT with new-style AM_AUTOMAKE_INIT. m4_if( @@ -16082,7 +16013,7 @@ index 528e6173930..d88a5ec84f2 100644 # # This file is free software; the Free Software Foundation # gives unlimited permission to copy and/or distribute it, -@@ -399,7 +417,7 @@ AC_MSG_CHECKING([whether to enable maintainer-specific portions of Makefiles]) +@@ -399,7 +417,7 @@ AC_MSG_CHECKING([whether to enable maint # Fake the existence of programs that GNU maintainers use. -*- Autoconf -*- @@ -16168,7 +16099,7 @@ index 528e6173930..d88a5ec84f2 100644 # # This file is free software; the Free Software Foundation # gives unlimited permission to copy and/or distribute it, -@@ -721,7 +734,7 @@ AC_DEFUN([AM_SUBST_NOTMAKE], [_AM_SUBST_NOTMAKE($@)]) +@@ -721,7 +734,7 @@ AC_DEFUN([AM_SUBST_NOTMAKE], [_AM_SUBST_ # Check how to create a tarball. -*- Autoconf -*- @@ -16177,8 +16108,6 @@ index 528e6173930..d88a5ec84f2 100644 # # This file is free software; the Free Software Foundation # gives unlimited permission to copy and/or distribute it, -diff --git a/libbacktrace/configure b/libbacktrace/configure -index 4ab612dc780..68f6b8566e9 100755 --- a/libbacktrace/configure +++ b/libbacktrace/configure @@ -686,7 +686,10 @@ OTOOL @@ -16242,7 +16171,7 @@ index 4ab612dc780..68f6b8566e9 100755 fi # Use eval to expand $SHELL if eval "$MISSING --is-lightweight"; then -@@ -4558,8 +4562,8 @@ MAKEINFO=${MAKEINFO-"${am_missing_run}makeinfo"} +@@ -4558,8 +4562,8 @@ MAKEINFO=${MAKEINFO-"${am_missing_run}ma # For better backward compatibility. To be removed once Automake 1.9.x # dies out for good. For more background, see: @@ -16253,7 +16182,7 @@ index 4ab612dc780..68f6b8566e9 100755 mkdir_p='$(MKDIR_P)' # We need awk for the "check" target (and possibly the TAP driver). The -@@ -4578,6 +4582,20 @@ am__tar='$${TAR-tar} chof - "$$tardir"' am__untar='$${TAR-tar} xf -' +@@ -4578,6 +4582,20 @@ am__tar='$${TAR-tar} chof - "$$tardir"' @@ -16303,7 +16232,7 @@ index 4ab612dc780..68f6b8566e9 100755 test "X`print -r -- $ECHO 2>/dev/null`" = "X$ECHO"; then ECHO='print -r --' elif test "X`printf %s $ECHO 2>/dev/null`" = "X$ECHO"; then -@@ -6187,8 +6205,8 @@ $as_echo_n "checking whether the shell understands some XSI constructs... " >&6; +@@ -6187,8 +6205,8 @@ $as_echo_n "checking whether the shell u # Try some XSI features xsi_shell=no ( _lt_dummy="a/b/c" @@ -16439,7 +16368,7 @@ index 4ab612dc780..68f6b8566e9 100755 file_magic_cmd=$lt_cv_file_magic_cmd deplibs_check_method=$lt_cv_deplibs_check_method test -z "$deplibs_check_method" && deplibs_check_method=unknown -@@ -6595,6 +6708,157 @@ test -z "$deplibs_check_method" && deplibs_check_method=unknown +@@ -6595,6 +6708,157 @@ test -z "$deplibs_check_method" && depli @@ -16658,7 +16587,7 @@ index 4ab612dc780..68f6b8566e9 100755 if test "x$ac_ct_AR" = x; then AR="false" else -@@ -6696,31 +6970,83 @@ ac_tool_warned=yes ;; +@@ -6696,25 +6970,19 @@ ac_tool_warned=yes ;; esac AR=$ac_ct_AR fi @@ -16690,14 +16619,10 @@ index 4ab612dc780..68f6b8566e9 100755 + rm -f conftest.* +: ${AR=ar} +: ${AR_FLAGS=cru} -+ -+ -+ -+ -+ +@@ -6726,6 +6994,64 @@ test -z "$AR_FLAGS" && AR_FLAGS=cru @@ -16754,9 +16679,14 @@ index 4ab612dc780..68f6b8566e9 100755 +fi + + - - - ++ ++ ++ ++ ++ + if test -n "$ac_tool_prefix"; then + # Extract the first word of "${ac_tool_prefix}strip", so it can be a program name with args. + set dummy ${ac_tool_prefix}strip; ac_word=$2 @@ -7065,8 +7391,8 @@ esac lt_cv_sys_global_symbol_to_cdecl="sed -n -e 's/^T .* \(.*\)$/extern int \1();/p' -e 's/^$symcode* .* \(.*\)$/extern char \1;/p'" @@ -16804,7 +16734,7 @@ index 4ab612dc780..68f6b8566e9 100755 const char *name; void *address; } -@@ -7180,8 +7519,8 @@ static const void *lt_preloaded_setup() { +@@ -7180,8 +7519,8 @@ static const void *lt_preloaded_setup() _LT_EOF # Now try linking the two files. mv conftest.$ac_objext conftstm.$ac_objext @@ -16826,7 +16756,7 @@ index 4ab612dc780..68f6b8566e9 100755 else echo "cannot find nm_test_func in $nlist" >&5 fi -@@ -7229,6 +7568,18 @@ else +@@ -7229,6 +7568,19 @@ else $as_echo "ok" >&6; } fi @@ -16842,18 +16772,14 @@ index 4ab612dc780..68f6b8566e9 100755 + + + ++ -@@ -7245,6 +7596,43 @@ fi +@@ -7249,6 +7601,42 @@ fi -+ -+ -+ -+ -+ +{ $as_echo "$as_me:${as_lineno-$LINENO}: checking for sysroot" >&5 +$as_echo_n "checking for sysroot... " >&6; } + @@ -16886,59 +16812,17 @@ index 4ab612dc780..68f6b8566e9 100755 + + { $as_echo "$as_me:${as_lineno-$LINENO}: result: ${lt_sysroot:-no}" >&5 +$as_echo "${lt_sysroot:-no}" >&6; } ++ ++ ++ ++ + # Check whether --enable-libtool-lock was given. + if test "${enable_libtool_lock+set}" = set; then : +@@ -7456,6 +7844,123 @@ esac + need_locks="$enable_libtool_lock" -@@ -7411,50 +7799,167 @@ _ACEOF - if ac_fn_c_try_link "$LINENO"; then : - lt_cv_cc_needs_belf=yes - else -- lt_cv_cc_needs_belf=no -+ lt_cv_cc_needs_belf=no -+fi -+rm -f core conftest.err conftest.$ac_objext \ -+ conftest$ac_exeext conftest.$ac_ext -+ ac_ext=c -+ac_cpp='$CPP $CPPFLAGS' -+ac_compile='$CC -c $CFLAGS $CPPFLAGS conftest.$ac_ext >&5' -+ac_link='$CC -o conftest$ac_exeext $CFLAGS $CPPFLAGS $LDFLAGS conftest.$ac_ext $LIBS >&5' -+ac_compiler_gnu=$ac_cv_c_compiler_gnu -+ -+fi -+{ $as_echo "$as_me:${as_lineno-$LINENO}: result: $lt_cv_cc_needs_belf" >&5 -+$as_echo "$lt_cv_cc_needs_belf" >&6; } -+ if test x"$lt_cv_cc_needs_belf" != x"yes"; then -+ # this is probably gcc 2.8.0, egcs 1.0 or newer; no need for -belf -+ CFLAGS="$SAVE_CFLAGS" -+ fi -+ ;; -+sparc*-*solaris*) -+ # Find out which ABI we are using. -+ echo 'int i;' > conftest.$ac_ext -+ if { { eval echo "\"\$as_me\":${as_lineno-$LINENO}: \"$ac_compile\""; } >&5 -+ (eval $ac_compile) 2>&5 -+ ac_status=$? -+ $as_echo "$as_me:${as_lineno-$LINENO}: \$? = $ac_status" >&5 -+ test $ac_status = 0; }; then -+ case `/usr/bin/file conftest.o` in -+ *64-bit*) -+ case $lt_cv_prog_gnu_ld in -+ yes*) LD="${LD-ld} -m elf64_sparc" ;; -+ *) -+ if ${LD-ld} -64 -r -o conftest2.o conftest.o >/dev/null 2>&1; then -+ LD="${LD-ld} -64" -+ fi -+ ;; -+ esac -+ ;; -+ esac -+ fi -+ rm -rf conftest* -+ ;; -+esac -+ -+need_locks="$enable_libtool_lock" -+ +if test -n "$ac_tool_prefix"; then + # Extract the first word of "${ac_tool_prefix}mt", so it can be a program name with args. +set dummy ${ac_tool_prefix}mt; ac_word=$2 @@ -17014,21 +16898,8 @@ index 4ab612dc780..68f6b8566e9 100755 +else + { $as_echo "$as_me:${as_lineno-$LINENO}: result: no" >&5 +$as_echo "no" >&6; } - fi --rm -f core conftest.err conftest.$ac_objext \ -- conftest$ac_exeext conftest.$ac_ext -- ac_ext=c --ac_cpp='$CPP $CPPFLAGS' --ac_compile='$CC -c $CFLAGS $CPPFLAGS conftest.$ac_ext >&5' --ac_link='$CC -o conftest$ac_exeext $CFLAGS $CPPFLAGS $LDFLAGS conftest.$ac_ext $LIBS >&5' --ac_compiler_gnu=$ac_cv_c_compiler_gnu - --fi --{ $as_echo "$as_me:${as_lineno-$LINENO}: result: $lt_cv_cc_needs_belf" >&5 --$as_echo "$lt_cv_cc_needs_belf" >&6; } -- if test x"$lt_cv_cc_needs_belf" != x"yes"; then -- # this is probably gcc 2.8.0, egcs 1.0 or newer; no need for -belf -- CFLAGS="$SAVE_CFLAGS" ++fi ++ + if test "x$ac_ct_MANIFEST_TOOL" = x; then + MANIFEST_TOOL=":" + else @@ -17039,28 +16910,7 @@ index 4ab612dc780..68f6b8566e9 100755 +ac_tool_warned=yes ;; +esac + MANIFEST_TOOL=$ac_ct_MANIFEST_TOOL - fi -- ;; --sparc*-*solaris*) -- # Find out which ABI we are using. -- echo 'int i;' > conftest.$ac_ext -- if { { eval echo "\"\$as_me\":${as_lineno-$LINENO}: \"$ac_compile\""; } >&5 -- (eval $ac_compile) 2>&5 -- ac_status=$? -- $as_echo "$as_me:${as_lineno-$LINENO}: \$? = $ac_status" >&5 -- test $ac_status = 0; }; then -- case `/usr/bin/file conftest.o` in -- *64-bit*) -- case $lt_cv_prog_gnu_ld in -- yes*) LD="${LD-ld} -m elf64_sparc" ;; -- *) -- if ${LD-ld} -64 -r -o conftest2.o conftest.o >/dev/null 2>&1; then -- LD="${LD-ld} -64" -- fi -- ;; -- esac -- ;; -- esac ++ fi +else + MANIFEST_TOOL="$ac_cv_prog_MANIFEST_TOOL" +fi @@ -17077,10 +16927,7 @@ index 4ab612dc780..68f6b8566e9 100755 + cat conftest.err >&5 + if $GREP 'Manifest Tool' conftest.out > /dev/null; then + lt_cv_path_mainfest_tool=yes - fi -- rm -rf conftest* -- ;; --esac ++ fi + rm -f conftest* +fi +{ $as_echo "$as_me:${as_lineno-$LINENO}: result: $lt_cv_path_mainfest_tool" >&5 @@ -17091,11 +16938,11 @@ index 4ab612dc780..68f6b8566e9 100755 + + + - --need_locks="$enable_libtool_lock" - ++ ++ case $host_os in + rhapsody* | darwin*) @@ -8019,6 +8524,8 @@ _LT_EOF $LTCC $LTCFLAGS -c -o conftest.o conftest.c 2>&5 echo "$AR cru libconftest.a conftest.o" >&5 @@ -17114,7 +16961,7 @@ index 4ab612dc780..68f6b8566e9 100755 if test "$GCC" = yes; then lt_prog_compiler_wl='-Wl,' -@@ -8770,6 +9275,12 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -8770,6 +9275,12 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='--shared' lt_prog_compiler_static='--static' ;; @@ -17127,7 +16974,7 @@ index 4ab612dc780..68f6b8566e9 100755 pgcc* | pgf77* | pgf90* | pgf95* | pgfortran*) # Portland Group compilers (*not* the Pentium gcc compiler, # which looks to be a dead project) -@@ -8832,7 +9343,7 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -8832,7 +9343,7 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='-KPIC' lt_prog_compiler_static='-Bstatic' case $cc_basename in @@ -17288,7 +17135,7 @@ index 4ab612dc780..68f6b8566e9 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" archive_expsym_cmds='$CC -o $output_objdir/$soname $libobjs $deplibs '"\${wl}$no_entry_flag"' $compiler_flags `if test "x${allow_undefined_flag}" != "x"; then func_echo_all "${wl}${allow_undefined_flag}"; else :; fi` '"\${wl}$exp_sym_flag:\$export_symbols $shared_flag" -@@ -9661,7 +10195,13 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9661,7 +10195,13 @@ if test -z "$aix_libpath"; then aix_libp else # Determine the default libpath from the value encoded in an # empty executable. @@ -17346,7 +17193,7 @@ index 4ab612dc780..68f6b8566e9 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" # Warning - without using the other run time loading flags, -@@ -9734,20 +10281,63 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9734,20 +10281,63 @@ if test -z "$aix_libpath"; then aix_libp # Microsoft Visual C++. # hardcode_libdir_flag_spec is actually meaningless, as there is # no search path for DLLs. @@ -17424,7 +17271,7 @@ index 4ab612dc780..68f6b8566e9 100755 ;; darwin* | rhapsody*) -@@ -9808,7 +10398,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9808,7 +10398,7 @@ if test -z "$aix_libpath"; then aix_libp # FreeBSD 3 and greater uses gcc -shared to do shared libraries. freebsd* | dragonfly*) @@ -17433,7 +17280,7 @@ index 4ab612dc780..68f6b8566e9 100755 hardcode_libdir_flag_spec='-R$libdir' hardcode_direct=yes hardcode_shlibpath_var=no -@@ -9816,7 +10406,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9816,7 +10406,7 @@ if test -z "$aix_libpath"; then aix_libp hpux9*) if test "$GCC" = yes; then @@ -17442,7 +17289,7 @@ index 4ab612dc780..68f6b8566e9 100755 else archive_cmds='$RM $output_objdir/$soname~$LD -b +b $install_libdir -o $output_objdir/$soname $libobjs $deplibs $linker_flags~test $output_objdir/$soname = $lib || mv $output_objdir/$soname $lib' fi -@@ -9832,7 +10422,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9832,7 +10422,7 @@ if test -z "$aix_libpath"; then aix_libp hpux10*) if test "$GCC" = yes && test "$with_gnu_ld" = no; then @@ -17451,7 +17298,7 @@ index 4ab612dc780..68f6b8566e9 100755 else archive_cmds='$LD -b +h $soname +b $install_libdir -o $lib $libobjs $deplibs $linker_flags' fi -@@ -9856,10 +10446,10 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9856,10 +10446,10 @@ if test -z "$aix_libpath"; then aix_libp archive_cmds='$CC -shared ${wl}+h ${wl}$soname ${wl}+nodefaultrpath -o $lib $libobjs $deplibs $compiler_flags' ;; ia64*) @@ -17509,7 +17356,7 @@ index 4ab612dc780..68f6b8566e9 100755 else archive_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -o $lib' archive_expsym_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -exports_file $export_symbols -o $lib' -@@ -10039,7 +10642,7 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -10039,7 +10642,7 @@ rm -f core conftest.err conftest.$ac_obj osf4* | osf5*) # as osf3* with the addition of -msym flag if test "$GCC" = yes; then allow_undefined_flag=' ${wl}-expect_unresolved ${wl}\*' @@ -17518,7 +17365,7 @@ index 4ab612dc780..68f6b8566e9 100755 hardcode_libdir_flag_spec='${wl}-rpath ${wl}$libdir' else allow_undefined_flag=' -expect_unresolved \*' -@@ -10058,9 +10661,9 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -10058,9 +10661,9 @@ rm -f core conftest.err conftest.$ac_obj no_undefined_flag=' -z defs' if test "$GCC" = yes; then wlarc='${wl}' @@ -17659,7 +17506,7 @@ index 4ab612dc780..68f6b8566e9 100755 int main () { void *self = dlopen (0, LT_DLGLOBAL|LT_DLLAZY_OR_NOW); -@@ -15191,13 +15853,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_single_quote_subst"`' +@@ -15191,13 +15853,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_ lt_unset='`$ECHO "$lt_unset" | $SED "$delay_single_quote_subst"`' lt_SP2NL='`$ECHO "$lt_SP2NL" | $SED "$delay_single_quote_subst"`' lt_NL2SP='`$ECHO "$lt_NL2SP" | $SED "$delay_single_quote_subst"`' @@ -17680,7 +17527,7 @@ index 4ab612dc780..68f6b8566e9 100755 STRIP='`$ECHO "$STRIP" | $SED "$delay_single_quote_subst"`' RANLIB='`$ECHO "$RANLIB" | $SED "$delay_single_quote_subst"`' old_postinstall_cmds='`$ECHO "$old_postinstall_cmds" | $SED "$delay_single_quote_subst"`' -@@ -15212,14 +15881,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$lt_cv_sys_global_symbol_pipe" | $SED "$de +@@ -15212,14 +15881,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$l lt_cv_sys_global_symbol_to_cdecl='`$ECHO "$lt_cv_sys_global_symbol_to_cdecl" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address_lib_prefix='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address_lib_prefix" | $SED "$delay_single_quote_subst"`' @@ -17699,7 +17546,7 @@ index 4ab612dc780..68f6b8566e9 100755 DSYMUTIL='`$ECHO "$DSYMUTIL" | $SED "$delay_single_quote_subst"`' NMEDIT='`$ECHO "$NMEDIT" | $SED "$delay_single_quote_subst"`' LIPO='`$ECHO "$LIPO" | $SED "$delay_single_quote_subst"`' -@@ -15252,12 +15924,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcode_shlibpath_var" | $SED "$delay_single_q +@@ -15252,12 +15924,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcod hardcode_automatic='`$ECHO "$hardcode_automatic" | $SED "$delay_single_quote_subst"`' inherit_rpath='`$ECHO "$inherit_rpath" | $SED "$delay_single_quote_subst"`' link_all_deplibs='`$ECHO "$link_all_deplibs" | $SED "$delay_single_quote_subst"`' @@ -17813,7 +17660,7 @@ index 4ab612dc780..68f6b8566e9 100755 # A symbol stripping program. STRIP=$lt_STRIP -@@ -16223,6 +16926,12 @@ global_symbol_to_c_name_address=$lt_lt_cv_sys_global_symbol_to_c_name_address +@@ -16223,6 +16926,12 @@ global_symbol_to_c_name_address=$lt_lt_c # Transform the output of nm in a C name address pair when lib prefix is needed. global_symbol_to_c_name_address_lib_prefix=$lt_lt_cv_sys_global_symbol_to_c_name_address_lib_prefix @@ -18074,15 +17921,9 @@ index 4ab612dc780..68f6b8566e9 100755 -_LT_EOF - ;; - esac -- -- -- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ -- || (rm -f "$cfgfile"; exit 1) -- -- mv -f "$cfgfile" "$ofile" || + sed '$q' "$ltmain" >> "$cfgfile" \ + || (rm -f "$cfgfile"; exit 1) -+ + + if test x"$xsi_shell" = xyes; then + sed -e '/^func_dirname ()$/,/^} # func_dirname /c\ +func_dirname ()\ @@ -18240,14 +18081,15 @@ index 4ab612dc780..68f6b8566e9 100755 + { $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: Unable to substitute extended shell functions in $ofile" >&5 +$as_echo "$as_me: WARNING: Unable to substitute extended shell functions in $ofile" >&2;} +fi -+ -+ + +- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ +- || (rm -f "$cfgfile"; exit 1) + +- mv -f "$cfgfile" "$ofile" || + mv -f "$cfgfile" "$ofile" || (rm -f "$ofile" && cp "$cfgfile" "$ofile" && rm -f "$cfgfile") chmod +x "$ofile" -diff --git a/libctf/Makefile.in b/libctf/Makefile.in -index 5d9587766dc..146b7a71685 100644 --- a/libctf/Makefile.in +++ b/libctf/Makefile.in @@ -442,6 +442,7 @@ CYGPATH_W = @CYGPATH_W@ @@ -18266,8 +18108,6 @@ index 5d9587766dc..146b7a71685 100644 MKDIR_P = @MKDIR_P@ MKINSTALLDIRS = @MKINSTALLDIRS@ MSGFMT = @MSGFMT@ -diff --git a/libctf/configure b/libctf/configure -index 7466d56a18b..0325e438a47 100755 --- a/libctf/configure +++ b/libctf/configure @@ -669,6 +669,8 @@ OTOOL @@ -18316,7 +18156,7 @@ index 7466d56a18b..0325e438a47 100755 test "X`print -r -- $ECHO 2>/dev/null`" = "X$ECHO"; then ECHO='print -r --' elif test "X`printf %s $ECHO 2>/dev/null`" = "X$ECHO"; then -@@ -8235,8 +8240,8 @@ $as_echo_n "checking whether the shell understands some XSI constructs... " >&6; +@@ -8235,8 +8240,8 @@ $as_echo_n "checking whether the shell u # Try some XSI features xsi_shell=no ( _lt_dummy="a/b/c" @@ -18452,7 +18292,7 @@ index 7466d56a18b..0325e438a47 100755 file_magic_cmd=$lt_cv_file_magic_cmd deplibs_check_method=$lt_cv_deplibs_check_method test -z "$deplibs_check_method" && deplibs_check_method=unknown -@@ -8643,6 +8743,157 @@ test -z "$deplibs_check_method" && deplibs_check_method=unknown +@@ -8643,6 +8743,157 @@ test -z "$deplibs_check_method" && depli @@ -18818,7 +18658,7 @@ index 7466d56a18b..0325e438a47 100755 const char *name; void *address; } -@@ -9228,8 +9554,8 @@ static const void *lt_preloaded_setup() { +@@ -9228,8 +9554,8 @@ static const void *lt_preloaded_setup() _LT_EOF # Now try linking the two files. mv conftest.$ac_objext conftstm.$ac_objext @@ -18840,7 +18680,7 @@ index 7466d56a18b..0325e438a47 100755 else echo "cannot find nm_test_func in $nlist" >&5 fi -@@ -9277,6 +9603,17 @@ else +@@ -9277,6 +9603,20 @@ else $as_echo "ok" >&6; } fi @@ -18855,19 +18695,16 @@ index 7466d56a18b..0325e438a47 100755 + + + ++ ++ ++ -@@ -9293,6 +9630,44 @@ fi +@@ -9296,6 +9636,41 @@ fi -+ -+ -+ -+ -+ -+ +{ $as_echo "$as_me:${as_lineno-$LINENO}: checking for sysroot" >&5 +$as_echo_n "checking for sysroot... " >&6; } + @@ -18900,9 +18737,12 @@ index 7466d56a18b..0325e438a47 100755 + + { $as_echo "$as_me:${as_lineno-$LINENO}: result: ${lt_sysroot:-no}" >&5 +$as_echo "${lt_sysroot:-no}" >&6; } ++ ++ ++ - + # Check whether --enable-libtool-lock was given. @@ -9504,6 +9879,123 @@ esac need_locks="$enable_libtool_lock" @@ -19045,7 +18885,7 @@ index 7466d56a18b..0325e438a47 100755 if test "$GCC" = yes; then lt_prog_compiler_wl='-Wl,' -@@ -10788,6 +11280,12 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -10788,6 +11280,12 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='--shared' lt_prog_compiler_static='--static' ;; @@ -19058,7 +18898,7 @@ index 7466d56a18b..0325e438a47 100755 pgcc* | pgf77* | pgf90* | pgf95* | pgfortran*) # Portland Group compilers (*not* the Pentium gcc compiler, # which looks to be a dead project) -@@ -10850,7 +11348,7 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -10850,7 +11348,7 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='-KPIC' lt_prog_compiler_static='-Bstatic' case $cc_basename in @@ -19219,7 +19059,7 @@ index 7466d56a18b..0325e438a47 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" archive_expsym_cmds='$CC -o $output_objdir/$soname $libobjs $deplibs '"\${wl}$no_entry_flag"' $compiler_flags `if test "x${allow_undefined_flag}" != "x"; then func_echo_all "${wl}${allow_undefined_flag}"; else :; fi` '"\${wl}$exp_sym_flag:\$export_symbols $shared_flag" -@@ -11679,7 +12200,13 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -11679,7 +12200,13 @@ if test -z "$aix_libpath"; then aix_libp else # Determine the default libpath from the value encoded in an # empty executable. @@ -19277,7 +19117,7 @@ index 7466d56a18b..0325e438a47 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" # Warning - without using the other run time loading flags, -@@ -11752,20 +12286,63 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -11752,20 +12286,63 @@ if test -z "$aix_libpath"; then aix_libp # Microsoft Visual C++. # hardcode_libdir_flag_spec is actually meaningless, as there is # no search path for DLLs. @@ -19355,7 +19195,7 @@ index 7466d56a18b..0325e438a47 100755 ;; darwin* | rhapsody*) -@@ -11826,7 +12403,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -11826,7 +12403,7 @@ if test -z "$aix_libpath"; then aix_libp # FreeBSD 3 and greater uses gcc -shared to do shared libraries. freebsd* | dragonfly*) @@ -19364,7 +19204,7 @@ index 7466d56a18b..0325e438a47 100755 hardcode_libdir_flag_spec='-R$libdir' hardcode_direct=yes hardcode_shlibpath_var=no -@@ -11834,7 +12411,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -11834,7 +12411,7 @@ if test -z "$aix_libpath"; then aix_libp hpux9*) if test "$GCC" = yes; then @@ -19373,7 +19213,7 @@ index 7466d56a18b..0325e438a47 100755 else archive_cmds='$RM $output_objdir/$soname~$LD -b +b $install_libdir -o $output_objdir/$soname $libobjs $deplibs $linker_flags~test $output_objdir/$soname = $lib || mv $output_objdir/$soname $lib' fi -@@ -11850,7 +12427,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -11850,7 +12427,7 @@ if test -z "$aix_libpath"; then aix_libp hpux10*) if test "$GCC" = yes && test "$with_gnu_ld" = no; then @@ -19382,7 +19222,7 @@ index 7466d56a18b..0325e438a47 100755 else archive_cmds='$LD -b +h $soname +b $install_libdir -o $lib $libobjs $deplibs $linker_flags' fi -@@ -11874,10 +12451,10 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -11874,10 +12451,10 @@ if test -z "$aix_libpath"; then aix_libp archive_cmds='$CC -shared ${wl}+h ${wl}$soname ${wl}+nodefaultrpath -o $lib $libobjs $deplibs $compiler_flags' ;; ia64*) @@ -19440,7 +19280,7 @@ index 7466d56a18b..0325e438a47 100755 else archive_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -o $lib' archive_expsym_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -exports_file $export_symbols -o $lib' -@@ -12057,7 +12647,7 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -12057,7 +12647,7 @@ rm -f core conftest.err conftest.$ac_obj osf4* | osf5*) # as osf3* with the addition of -msym flag if test "$GCC" = yes; then allow_undefined_flag=' ${wl}-expect_unresolved ${wl}\*' @@ -19449,7 +19289,7 @@ index 7466d56a18b..0325e438a47 100755 hardcode_libdir_flag_spec='${wl}-rpath ${wl}$libdir' else allow_undefined_flag=' -expect_unresolved \*' -@@ -12076,9 +12666,9 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -12076,9 +12666,9 @@ rm -f core conftest.err conftest.$ac_obj no_undefined_flag=' -z defs' if test "$GCC" = yes; then wlarc='${wl}' @@ -19590,7 +19430,7 @@ index 7466d56a18b..0325e438a47 100755 int main () { void *self = dlopen (0, LT_DLGLOBAL|LT_DLLAZY_OR_NOW); -@@ -17813,13 +18462,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_single_quote_subst"`' +@@ -17821,13 +18470,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_ lt_unset='`$ECHO "$lt_unset" | $SED "$delay_single_quote_subst"`' lt_SP2NL='`$ECHO "$lt_SP2NL" | $SED "$delay_single_quote_subst"`' lt_NL2SP='`$ECHO "$lt_NL2SP" | $SED "$delay_single_quote_subst"`' @@ -19611,7 +19451,7 @@ index 7466d56a18b..0325e438a47 100755 STRIP='`$ECHO "$STRIP" | $SED "$delay_single_quote_subst"`' RANLIB='`$ECHO "$RANLIB" | $SED "$delay_single_quote_subst"`' old_postinstall_cmds='`$ECHO "$old_postinstall_cmds" | $SED "$delay_single_quote_subst"`' -@@ -17834,14 +18490,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$lt_cv_sys_global_symbol_pipe" | $SED "$de +@@ -17842,14 +18498,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$l lt_cv_sys_global_symbol_to_cdecl='`$ECHO "$lt_cv_sys_global_symbol_to_cdecl" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address_lib_prefix='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address_lib_prefix" | $SED "$delay_single_quote_subst"`' @@ -19630,7 +19470,7 @@ index 7466d56a18b..0325e438a47 100755 DSYMUTIL='`$ECHO "$DSYMUTIL" | $SED "$delay_single_quote_subst"`' NMEDIT='`$ECHO "$NMEDIT" | $SED "$delay_single_quote_subst"`' LIPO='`$ECHO "$LIPO" | $SED "$delay_single_quote_subst"`' -@@ -17874,12 +18533,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcode_shlibpath_var" | $SED "$delay_single_q +@@ -17882,12 +18541,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcod hardcode_automatic='`$ECHO "$hardcode_automatic" | $SED "$delay_single_quote_subst"`' inherit_rpath='`$ECHO "$inherit_rpath" | $SED "$delay_single_quote_subst"`' link_all_deplibs='`$ECHO "$link_all_deplibs" | $SED "$delay_single_quote_subst"`' @@ -19644,7 +19484,7 @@ index 7466d56a18b..0325e438a47 100755 file_list_spec='`$ECHO "$file_list_spec" | $SED "$delay_single_quote_subst"`' variables_saved_for_relink='`$ECHO "$variables_saved_for_relink" | $SED "$delay_single_quote_subst"`' need_lib_prefix='`$ECHO "$need_lib_prefix" | $SED "$delay_single_quote_subst"`' -@@ -17934,8 +18593,13 @@ reload_flag \ +@@ -17942,8 +18601,13 @@ reload_flag \ OBJDUMP \ deplibs_check_method \ file_magic_cmd \ @@ -19658,7 +19498,7 @@ index 7466d56a18b..0325e438a47 100755 STRIP \ RANLIB \ CC \ -@@ -17945,12 +18609,14 @@ lt_cv_sys_global_symbol_pipe \ +@@ -17953,12 +18617,14 @@ lt_cv_sys_global_symbol_pipe \ lt_cv_sys_global_symbol_to_cdecl \ lt_cv_sys_global_symbol_to_c_name_address \ lt_cv_sys_global_symbol_to_c_name_address_lib_prefix \ @@ -19674,7 +19514,7 @@ index 7466d56a18b..0325e438a47 100755 DSYMUTIL \ NMEDIT \ LIPO \ -@@ -17966,7 +18632,6 @@ no_undefined_flag \ +@@ -17974,7 +18640,6 @@ no_undefined_flag \ hardcode_libdir_flag_spec \ hardcode_libdir_flag_spec_ld \ hardcode_libdir_separator \ @@ -19682,7 +19522,7 @@ index 7466d56a18b..0325e438a47 100755 exclude_expsyms \ include_expsyms \ file_list_spec \ -@@ -18002,6 +18667,7 @@ module_cmds \ +@@ -18010,6 +18675,7 @@ module_cmds \ module_expsym_cmds \ export_symbols_cmds \ prelink_cmds \ @@ -19690,7 +19530,7 @@ index 7466d56a18b..0325e438a47 100755 postinstall_cmds \ postuninstall_cmds \ finish_cmds \ -@@ -18861,7 +19527,8 @@ $as_echo X"$file" | +@@ -18869,7 +19535,8 @@ $as_echo X"$file" | # NOTE: Changes made to this file will be lost: look at ltmain.sh. # # Copyright (C) 1996, 1997, 1998, 1999, 2000, 2001, 2003, 2004, 2005, @@ -19700,7 +19540,7 @@ index 7466d56a18b..0325e438a47 100755 # Written by Gordon Matzigkeit, 1996 # # This file is part of GNU Libtool. -@@ -18964,19 +19631,42 @@ SP2NL=$lt_lt_SP2NL +@@ -18972,19 +19639,42 @@ SP2NL=$lt_lt_SP2NL # turn newlines into spaces. NL2SP=$lt_lt_NL2SP @@ -19744,7 +19584,7 @@ index 7466d56a18b..0325e438a47 100755 # A symbol stripping program. STRIP=$lt_STRIP -@@ -19006,6 +19696,12 @@ global_symbol_to_c_name_address=$lt_lt_cv_sys_global_symbol_to_c_name_address +@@ -19014,6 +19704,12 @@ global_symbol_to_c_name_address=$lt_lt_c # Transform the output of nm in a C name address pair when lib prefix is needed. global_symbol_to_c_name_address_lib_prefix=$lt_lt_cv_sys_global_symbol_to_c_name_address_lib_prefix @@ -19757,7 +19597,7 @@ index 7466d56a18b..0325e438a47 100755 # The name of the directory that contains temporary libtool files. objdir=$objdir -@@ -19015,6 +19711,9 @@ MAGIC_CMD=$MAGIC_CMD +@@ -19023,6 +19719,9 @@ MAGIC_CMD=$MAGIC_CMD # Must we lock files when doing compilation? need_locks=$lt_need_locks @@ -19767,7 +19607,7 @@ index 7466d56a18b..0325e438a47 100755 # Tool to manipulate archived DWARF debug symbol files on Mac OS X. DSYMUTIL=$lt_DSYMUTIL -@@ -19129,12 +19828,12 @@ with_gcc=$GCC +@@ -19137,12 +19836,12 @@ with_gcc=$GCC # Compiler flag to turn off builtin functions. no_builtin_flag=$lt_lt_prog_compiler_no_builtin_flag @@ -19783,7 +19623,7 @@ index 7466d56a18b..0325e438a47 100755 # Compiler flag to prevent dynamic linking. link_static_flag=$lt_lt_prog_compiler_static -@@ -19221,9 +19920,6 @@ inherit_rpath=$inherit_rpath +@@ -19229,9 +19928,6 @@ inherit_rpath=$inherit_rpath # Whether libtool must link a program against all its dependency libraries. link_all_deplibs=$link_all_deplibs @@ -19793,7 +19633,7 @@ index 7466d56a18b..0325e438a47 100755 # Set to "yes" if exported symbols are required. always_export_symbols=$always_export_symbols -@@ -19239,6 +19935,9 @@ include_expsyms=$lt_include_expsyms +@@ -19247,6 +19943,9 @@ include_expsyms=$lt_include_expsyms # Commands necessary for linking programs (against libraries) with templates. prelink_cmds=$lt_prelink_cmds @@ -19803,7 +19643,7 @@ index 7466d56a18b..0325e438a47 100755 # Specify filename containing input files. file_list_spec=$lt_file_list_spec -@@ -19271,210 +19970,169 @@ ltmain="$ac_aux_dir/ltmain.sh" +@@ -19279,210 +19978,169 @@ ltmain="$ac_aux_dir/ltmain.sh" # if finds mixed CR/LF and LF-only lines. Since sed operates in # text mode, it properly converts lines to CR/LF. This bash problem # is reportedly fixed, but why not run on old versions too? @@ -20005,15 +19845,9 @@ index 7466d56a18b..0325e438a47 100755 -_LT_EOF - ;; - esac -- -- -- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ -- || (rm -f "$cfgfile"; exit 1) -- -- mv -f "$cfgfile" "$ofile" || + sed '$q' "$ltmain" >> "$cfgfile" \ + || (rm -f "$cfgfile"; exit 1) -+ + + if test x"$xsi_shell" = xyes; then + sed -e '/^func_dirname ()$/,/^} # func_dirname /c\ +func_dirname ()\ @@ -20171,14 +20005,15 @@ index 7466d56a18b..0325e438a47 100755 + { $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: Unable to substitute extended shell functions in $ofile" >&5 +$as_echo "$as_me: WARNING: Unable to substitute extended shell functions in $ofile" >&2;} +fi -+ -+ + +- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ +- || (rm -f "$cfgfile"; exit 1) + +- mv -f "$cfgfile" "$ofile" || + mv -f "$cfgfile" "$ofile" || (rm -f "$ofile" && cp "$cfgfile" "$ofile" && rm -f "$cfgfile") chmod +x "$ofile" -diff --git a/libsframe/Makefile.in b/libsframe/Makefile.in -index fa705dd9f13..d6ab725f71d 100644 --- a/libsframe/Makefile.in +++ b/libsframe/Makefile.in @@ -404,6 +404,7 @@ CPPFLAGS = @CPPFLAGS@ @@ -20197,8 +20032,6 @@ index fa705dd9f13..d6ab725f71d 100644 MKDIR_P = @MKDIR_P@ NM = @NM@ NMEDIT = @NMEDIT@ -diff --git a/libsframe/configure b/libsframe/configure -index 4727eff533a..ff7a4ab5c7a 100755 --- a/libsframe/configure +++ b/libsframe/configure @@ -658,6 +658,8 @@ OTOOL @@ -20247,7 +20080,7 @@ index 4727eff533a..ff7a4ab5c7a 100755 test "X`print -r -- $ECHO 2>/dev/null`" = "X$ECHO"; then ECHO='print -r --' elif test "X`printf %s $ECHO 2>/dev/null`" = "X$ECHO"; then -@@ -6202,8 +6207,8 @@ $as_echo_n "checking whether the shell understands some XSI constructs... " >&6; +@@ -6202,8 +6207,8 @@ $as_echo_n "checking whether the shell u # Try some XSI features xsi_shell=no ( _lt_dummy="a/b/c" @@ -20383,7 +20216,7 @@ index 4727eff533a..ff7a4ab5c7a 100755 file_magic_cmd=$lt_cv_file_magic_cmd deplibs_check_method=$lt_cv_deplibs_check_method test -z "$deplibs_check_method" && deplibs_check_method=unknown -@@ -6610,6 +6710,157 @@ test -z "$deplibs_check_method" && deplibs_check_method=unknown +@@ -6610,6 +6710,157 @@ test -z "$deplibs_check_method" && depli @@ -20602,7 +20435,7 @@ index 4727eff533a..ff7a4ab5c7a 100755 if test "x$ac_ct_AR" = x; then AR="false" else -@@ -6711,25 +6972,19 @@ ac_tool_warned=yes ;; +@@ -6711,29 +6972,81 @@ ac_tool_warned=yes ;; esac AR=$ac_ct_AR fi @@ -20634,13 +20467,17 @@ index 4727eff533a..ff7a4ab5c7a 100755 + rm -f conftest.* +: ${AR=ar} +: ${AR_FLAGS=cru} - - - -@@ -6741,6 +6996,64 @@ test -z "$AR_FLAGS" && AR_FLAGS=cru - - - ++ ++ ++ ++ ++ ++ ++ ++ ++ ++ ++ +{ $as_echo "$as_me:${as_lineno-$LINENO}: checking for archiver @FILE support" >&5 +$as_echo_n "checking for archiver @FILE support... " >&6; } +if ${lt_cv_ar_at_file+:} false; then : @@ -20653,7 +20490,7 @@ index 4727eff533a..ff7a4ab5c7a 100755 +int +main () +{ -+ + + ; + return 0; +} @@ -20679,29 +20516,22 @@ index 4727eff533a..ff7a4ab5c7a 100755 + fi + fi + rm -f conftest.* libconftest.a -+ + +fi +rm -f core conftest.err conftest.$ac_objext conftest.$ac_ext -+ + +fi +{ $as_echo "$as_me:${as_lineno-$LINENO}: result: $lt_cv_ar_at_file" >&5 +$as_echo "$lt_cv_ar_at_file" >&6; } -+ + +if test "x$lt_cv_ar_at_file" = xno; then + archiver_list_spec= +else + archiver_list_spec=$lt_cv_ar_at_file +fi -+ -+ -+ -+ -+ -+ -+ - if test -n "$ac_tool_prefix"; then - # Extract the first word of "${ac_tool_prefix}strip", so it can be a program name with args. - set dummy ${ac_tool_prefix}strip; ac_word=$2 + + + @@ -7080,8 +7393,8 @@ esac lt_cv_sys_global_symbol_to_cdecl="sed -n -e 's/^T .* \(.*\)$/extern int \1();/p' -e 's/^$symcode* .* \(.*\)$/extern char \1;/p'" @@ -20749,7 +20579,7 @@ index 4727eff533a..ff7a4ab5c7a 100755 const char *name; void *address; } -@@ -7195,8 +7521,8 @@ static const void *lt_preloaded_setup() { +@@ -7195,8 +7521,8 @@ static const void *lt_preloaded_setup() _LT_EOF # Now try linking the two files. mv conftest.$ac_objext conftstm.$ac_objext @@ -20771,7 +20601,7 @@ index 4727eff533a..ff7a4ab5c7a 100755 else echo "cannot find nm_test_func in $nlist" >&5 fi -@@ -7244,6 +7570,14 @@ else +@@ -7244,6 +7570,13 @@ else $as_echo "ok" >&6; } fi @@ -20782,11 +20612,10 @@ index 4727eff533a..ff7a4ab5c7a 100755 + nm_file_list_spec='@' +fi + -+ -@@ -7262,6 +7596,47 @@ fi +@@ -7265,6 +7598,48 @@ fi @@ -20795,8 +20624,6 @@ index 4727eff533a..ff7a4ab5c7a 100755 + + + -+ -+ +{ $as_echo "$as_me:${as_lineno-$LINENO}: checking for sysroot" >&5 +$as_echo_n "checking for sysroot... " >&6; } + @@ -20831,9 +20658,12 @@ index 4727eff533a..ff7a4ab5c7a 100755 +$as_echo "${lt_sysroot:-no}" >&6; } + + - - - ++ ++ ++ + # Check whether --enable-libtool-lock was given. + if test "${enable_libtool_lock+set}" = set; then : + enableval=$enable_libtool_lock; @@ -7471,6 +7846,123 @@ esac need_locks="$enable_libtool_lock" @@ -20976,7 +20806,7 @@ index 4727eff533a..ff7a4ab5c7a 100755 if test "$GCC" = yes; then lt_prog_compiler_wl='-Wl,' -@@ -8755,6 +9247,12 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -8755,6 +9247,12 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='--shared' lt_prog_compiler_static='--static' ;; @@ -20989,7 +20819,7 @@ index 4727eff533a..ff7a4ab5c7a 100755 pgcc* | pgf77* | pgf90* | pgf95* | pgfortran*) # Portland Group compilers (*not* the Pentium gcc compiler, # which looks to be a dead project) -@@ -8817,7 +9315,7 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -8817,7 +9315,7 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='-KPIC' lt_prog_compiler_static='-Bstatic' case $cc_basename in @@ -21150,7 +20980,7 @@ index 4727eff533a..ff7a4ab5c7a 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" archive_expsym_cmds='$CC -o $output_objdir/$soname $libobjs $deplibs '"\${wl}$no_entry_flag"' $compiler_flags `if test "x${allow_undefined_flag}" != "x"; then func_echo_all "${wl}${allow_undefined_flag}"; else :; fi` '"\${wl}$exp_sym_flag:\$export_symbols $shared_flag" -@@ -9646,7 +10167,13 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9646,7 +10167,13 @@ if test -z "$aix_libpath"; then aix_libp else # Determine the default libpath from the value encoded in an # empty executable. @@ -21208,7 +21038,7 @@ index 4727eff533a..ff7a4ab5c7a 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" # Warning - without using the other run time loading flags, -@@ -9719,20 +10253,63 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9719,20 +10253,63 @@ if test -z "$aix_libpath"; then aix_libp # Microsoft Visual C++. # hardcode_libdir_flag_spec is actually meaningless, as there is # no search path for DLLs. @@ -21286,7 +21116,7 @@ index 4727eff533a..ff7a4ab5c7a 100755 ;; darwin* | rhapsody*) -@@ -9793,7 +10370,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9793,7 +10370,7 @@ if test -z "$aix_libpath"; then aix_libp # FreeBSD 3 and greater uses gcc -shared to do shared libraries. freebsd* | dragonfly*) @@ -21295,7 +21125,7 @@ index 4727eff533a..ff7a4ab5c7a 100755 hardcode_libdir_flag_spec='-R$libdir' hardcode_direct=yes hardcode_shlibpath_var=no -@@ -9801,7 +10378,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9801,7 +10378,7 @@ if test -z "$aix_libpath"; then aix_libp hpux9*) if test "$GCC" = yes; then @@ -21304,7 +21134,7 @@ index 4727eff533a..ff7a4ab5c7a 100755 else archive_cmds='$RM $output_objdir/$soname~$LD -b +b $install_libdir -o $output_objdir/$soname $libobjs $deplibs $linker_flags~test $output_objdir/$soname = $lib || mv $output_objdir/$soname $lib' fi -@@ -9817,7 +10394,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9817,7 +10394,7 @@ if test -z "$aix_libpath"; then aix_libp hpux10*) if test "$GCC" = yes && test "$with_gnu_ld" = no; then @@ -21313,7 +21143,7 @@ index 4727eff533a..ff7a4ab5c7a 100755 else archive_cmds='$LD -b +h $soname +b $install_libdir -o $lib $libobjs $deplibs $linker_flags' fi -@@ -9841,10 +10418,10 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9841,10 +10418,10 @@ if test -z "$aix_libpath"; then aix_libp archive_cmds='$CC -shared ${wl}+h ${wl}$soname ${wl}+nodefaultrpath -o $lib $libobjs $deplibs $compiler_flags' ;; ia64*) @@ -21371,7 +21201,7 @@ index 4727eff533a..ff7a4ab5c7a 100755 else archive_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -o $lib' archive_expsym_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -exports_file $export_symbols -o $lib' -@@ -10024,7 +10614,7 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -10024,7 +10614,7 @@ rm -f core conftest.err conftest.$ac_obj osf4* | osf5*) # as osf3* with the addition of -msym flag if test "$GCC" = yes; then allow_undefined_flag=' ${wl}-expect_unresolved ${wl}\*' @@ -21380,7 +21210,7 @@ index 4727eff533a..ff7a4ab5c7a 100755 hardcode_libdir_flag_spec='${wl}-rpath ${wl}$libdir' else allow_undefined_flag=' -expect_unresolved \*' -@@ -10043,9 +10633,9 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -10043,9 +10633,9 @@ rm -f core conftest.err conftest.$ac_obj no_undefined_flag=' -z defs' if test "$GCC" = yes; then wlarc='${wl}' @@ -21521,7 +21351,7 @@ index 4727eff533a..ff7a4ab5c7a 100755 int main () { void *self = dlopen (0, LT_DLGLOBAL|LT_DLLAZY_OR_NOW); -@@ -13579,13 +14228,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_single_quote_subst"`' +@@ -13579,13 +14228,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_ lt_unset='`$ECHO "$lt_unset" | $SED "$delay_single_quote_subst"`' lt_SP2NL='`$ECHO "$lt_SP2NL" | $SED "$delay_single_quote_subst"`' lt_NL2SP='`$ECHO "$lt_NL2SP" | $SED "$delay_single_quote_subst"`' @@ -21542,7 +21372,7 @@ index 4727eff533a..ff7a4ab5c7a 100755 STRIP='`$ECHO "$STRIP" | $SED "$delay_single_quote_subst"`' RANLIB='`$ECHO "$RANLIB" | $SED "$delay_single_quote_subst"`' old_postinstall_cmds='`$ECHO "$old_postinstall_cmds" | $SED "$delay_single_quote_subst"`' -@@ -13600,14 +14256,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$lt_cv_sys_global_symbol_pipe" | $SED "$de +@@ -13600,14 +14256,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$l lt_cv_sys_global_symbol_to_cdecl='`$ECHO "$lt_cv_sys_global_symbol_to_cdecl" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address_lib_prefix='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address_lib_prefix" | $SED "$delay_single_quote_subst"`' @@ -21561,7 +21391,7 @@ index 4727eff533a..ff7a4ab5c7a 100755 DSYMUTIL='`$ECHO "$DSYMUTIL" | $SED "$delay_single_quote_subst"`' NMEDIT='`$ECHO "$NMEDIT" | $SED "$delay_single_quote_subst"`' LIPO='`$ECHO "$LIPO" | $SED "$delay_single_quote_subst"`' -@@ -13640,12 +14299,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcode_shlibpath_var" | $SED "$delay_single_q +@@ -13640,12 +14299,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcod hardcode_automatic='`$ECHO "$hardcode_automatic" | $SED "$delay_single_quote_subst"`' inherit_rpath='`$ECHO "$inherit_rpath" | $SED "$delay_single_quote_subst"`' link_all_deplibs='`$ECHO "$link_all_deplibs" | $SED "$delay_single_quote_subst"`' @@ -21675,7 +21505,7 @@ index 4727eff533a..ff7a4ab5c7a 100755 # A symbol stripping program. STRIP=$lt_STRIP -@@ -14669,6 +15359,12 @@ global_symbol_to_c_name_address=$lt_lt_cv_sys_global_symbol_to_c_name_address +@@ -14669,6 +15359,12 @@ global_symbol_to_c_name_address=$lt_lt_c # Transform the output of nm in a C name address pair when lib prefix is needed. global_symbol_to_c_name_address_lib_prefix=$lt_lt_cv_sys_global_symbol_to_c_name_address_lib_prefix @@ -21936,15 +21766,9 @@ index 4727eff533a..ff7a4ab5c7a 100755 -_LT_EOF - ;; - esac -- -- -- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ -- || (rm -f "$cfgfile"; exit 1) -- -- mv -f "$cfgfile" "$ofile" || + sed '$q' "$ltmain" >> "$cfgfile" \ + || (rm -f "$cfgfile"; exit 1) -+ + + if test x"$xsi_shell" = xyes; then + sed -e '/^func_dirname ()$/,/^} # func_dirname /c\ +func_dirname ()\ @@ -22102,14 +21926,15 @@ index 4727eff533a..ff7a4ab5c7a 100755 + { $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: Unable to substitute extended shell functions in $ofile" >&5 +$as_echo "$as_me: WARNING: Unable to substitute extended shell functions in $ofile" >&2;} +fi -+ -+ + +- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ +- || (rm -f "$cfgfile"; exit 1) + +- mv -f "$cfgfile" "$ofile" || + mv -f "$cfgfile" "$ofile" || (rm -f "$ofile" && cp "$cfgfile" "$ofile" && rm -f "$cfgfile") chmod +x "$ofile" -diff --git a/libtool.m4 b/libtool.m4 -index e36fdd3c0e2..4acf9d67956 100644 --- a/libtool.m4 +++ b/libtool.m4 @@ -1,7 +1,8 @@ @@ -22141,7 +21966,7 @@ index e36fdd3c0e2..4acf9d67956 100644 # LT_PREREQ(VERSION) -@@ -166,10 +168,13 @@ _LT_DECL([], [exeext], [0], [Executable file suffix (normally "")])dnl +@@ -166,10 +168,13 @@ _LT_DECL([], [exeext], [0], [Executable dnl m4_require([_LT_FILEUTILS_DEFAULTS])dnl m4_require([_LT_CHECK_SHELL_FEATURES])dnl @@ -22155,7 +21980,7 @@ index e36fdd3c0e2..4acf9d67956 100644 _LT_CONFIG_LIBTOOL_INIT([ # See if we are running on zsh, and set the options which allow our -@@ -632,7 +637,7 @@ m4_ifset([AC_PACKAGE_NAME], [AC_PACKAGE_NAME ])config.lt[]dnl +@@ -632,7 +637,7 @@ m4_ifset([AC_PACKAGE_NAME], [AC_PACKAGE_ m4_ifset([AC_PACKAGE_VERSION], [ AC_PACKAGE_VERSION]) configured by $[0], generated by m4_PACKAGE_STRING. @@ -22260,7 +22085,7 @@ index e36fdd3c0e2..4acf9d67956 100644 test "X`print -r -- $ECHO 2>/dev/null`" = "X$ECHO"; then ECHO='print -r --' elif test "X`printf %s $ECHO 2>/dev/null`" = "X$ECHO"; then -@@ -1163,6 +1178,39 @@ _LT_DECL([], [ECHO], [1], [An echo program that protects backslashes]) +@@ -1163,6 +1178,39 @@ _LT_DECL([], [ECHO], [1], [An echo progr ])# _LT_PROG_ECHO_BACKSLASH @@ -22528,7 +22353,7 @@ index e36fdd3c0e2..4acf9d67956 100644 file_magic_cmd=$lt_cv_file_magic_cmd deplibs_check_method=$lt_cv_deplibs_check_method test -z "$deplibs_check_method" && deplibs_check_method=unknown -@@ -3225,7 +3382,11 @@ test -z "$deplibs_check_method" && deplibs_check_method=unknown +@@ -3225,7 +3382,11 @@ test -z "$deplibs_check_method" && depli _LT_DECL([], [deplibs_check_method], [1], [Method to check whether dependent libraries are shared objects]) _LT_DECL([], [file_magic_cmd], [1], @@ -22656,7 +22481,7 @@ index e36fdd3c0e2..4acf9d67956 100644 const char *name; void *address; } -@@ -3569,15 +3804,15 @@ static const void *lt_preloaded_setup() { +@@ -3569,15 +3804,15 @@ static const void *lt_preloaded_setup() _LT_EOF # Now try linking the two files. mv conftest.$ac_objext conftstm.$ac_objext @@ -22690,7 +22515,7 @@ index e36fdd3c0e2..4acf9d67956 100644 _LT_DECL([global_symbol_pipe], [lt_cv_sys_global_symbol_pipe], [1], [Take the output of nm and produce a listing of raw symbols and C names]) _LT_DECL([global_symbol_to_cdecl], [lt_cv_sys_global_symbol_to_cdecl], [1], -@@ -3620,6 +3862,8 @@ _LT_DECL([global_symbol_to_c_name_address], +@@ -3620,6 +3862,8 @@ _LT_DECL([global_symbol_to_c_name_addres _LT_DECL([global_symbol_to_c_name_address_lib_prefix], [lt_cv_sys_global_symbol_to_c_name_address_lib_prefix], [1], [Transform the output of nm in a C name address pair when lib prefix is needed]) @@ -22775,7 +22600,7 @@ index e36fdd3c0e2..4acf9d67956 100644 # # Check to make sure the static flag actually works. # -@@ -4272,6 +4531,7 @@ _LT_TAGDECL([link_static_flag], [lt_prog_compiler_static], [1], +@@ -4272,6 +4531,7 @@ _LT_TAGDECL([link_static_flag], [lt_prog m4_defun([_LT_LINKER_SHLIBS], [AC_REQUIRE([LT_PATH_LD])dnl AC_REQUIRE([LT_PATH_NM])dnl @@ -23097,7 +22922,7 @@ index e36fdd3c0e2..4acf9d67956 100644 if test -n "$CXX" && ( test "X$CXX" != "Xno" && ( (test "X$CXX" = "Xg++" && `g++ -v >/dev/null 2>&1` ) || (test "X$CXX" != "Xg++"))) ; then -@@ -5546,6 +5872,7 @@ if test "$_lt_caught_CXX_error" != yes; then +@@ -5546,6 +5872,7 @@ if test "$_lt_caught_CXX_error" != yes; # Allow CC to be a program name with arguments. lt_save_CC=$CC @@ -23105,7 +22930,7 @@ index e36fdd3c0e2..4acf9d67956 100644 lt_save_LD=$LD lt_save_GCC=$GCC GCC=$GXX -@@ -5563,6 +5890,7 @@ if test "$_lt_caught_CXX_error" != yes; then +@@ -5563,6 +5890,7 @@ if test "$_lt_caught_CXX_error" != yes; fi test -z "${LDCXX+set}" || LD=$LDCXX CC=${CXX-"c++"} @@ -23113,7 +22938,7 @@ index e36fdd3c0e2..4acf9d67956 100644 compiler=$CC _LT_TAGVAR(compiler, $1)=$CC _LT_CC_BASENAME([$compiler]) -@@ -5726,7 +6054,7 @@ if test "$_lt_caught_CXX_error" != yes; then +@@ -5726,7 +6054,7 @@ if test "$_lt_caught_CXX_error" != yes; _LT_TAGVAR(allow_undefined_flag, $1)='-berok' # Determine the default libpath from the value encoded in an empty # executable. @@ -23122,7 +22947,7 @@ index e36fdd3c0e2..4acf9d67956 100644 _LT_TAGVAR(hardcode_libdir_flag_spec, $1)='${wl}-blibpath:$libdir:'"$aix_libpath" _LT_TAGVAR(archive_expsym_cmds, $1)='$CC -o $output_objdir/$soname $libobjs $deplibs '"\${wl}$no_entry_flag"' $compiler_flags `if test "x${allow_undefined_flag}" != "x"; then func_echo_all "${wl}${allow_undefined_flag}"; else :; fi` '"\${wl}$exp_sym_flag:\$export_symbols $shared_flag" -@@ -5738,7 +6066,7 @@ if test "$_lt_caught_CXX_error" != yes; then +@@ -5738,7 +6066,7 @@ if test "$_lt_caught_CXX_error" != yes; else # Determine the default libpath from the value encoded in an # empty executable. @@ -23131,7 +22956,7 @@ index e36fdd3c0e2..4acf9d67956 100644 _LT_TAGVAR(hardcode_libdir_flag_spec, $1)='${wl}-blibpath:$libdir:'"$aix_libpath" # Warning - without using the other run time loading flags, # -berok will link without error, but may produce a broken library. -@@ -5780,29 +6108,75 @@ if test "$_lt_caught_CXX_error" != yes; then +@@ -5780,29 +6108,75 @@ if test "$_lt_caught_CXX_error" != yes; ;; cygwin* | mingw* | pw32* | cegcc*) @@ -23230,7 +23055,7 @@ index e36fdd3c0e2..4acf9d67956 100644 darwin* | rhapsody*) _LT_DARWIN_LINKER_FEATURES($1) ;; -@@ -5877,7 +6251,7 @@ if test "$_lt_caught_CXX_error" != yes; then +@@ -5877,7 +6251,7 @@ if test "$_lt_caught_CXX_error" != yes; ;; *) if test "$GXX" = yes; then @@ -23239,7 +23064,7 @@ index e36fdd3c0e2..4acf9d67956 100644 else # FIXME: insert proper C++ library support _LT_TAGVAR(ld_shlibs, $1)=no -@@ -5948,10 +6322,10 @@ if test "$_lt_caught_CXX_error" != yes; then +@@ -5948,10 +6322,10 @@ if test "$_lt_caught_CXX_error" != yes; _LT_TAGVAR(archive_cmds, $1)='$CC -shared -nostdlib -fPIC ${wl}+h ${wl}$soname ${wl}+nodefaultrpath -o $lib $predep_objects $libobjs $deplibs $postdep_objects $compiler_flags' ;; ia64*) @@ -23252,7 +23077,7 @@ index e36fdd3c0e2..4acf9d67956 100644 ;; esac fi -@@ -5992,9 +6366,9 @@ if test "$_lt_caught_CXX_error" != yes; then +@@ -5992,9 +6366,9 @@ if test "$_lt_caught_CXX_error" != yes; *) if test "$GXX" = yes; then if test "$with_gnu_ld" = no; then @@ -23264,7 +23089,7 @@ index e36fdd3c0e2..4acf9d67956 100644 fi fi _LT_TAGVAR(link_all_deplibs, $1)=yes -@@ -6272,7 +6646,7 @@ if test "$_lt_caught_CXX_error" != yes; then +@@ -6272,7 +6646,7 @@ if test "$_lt_caught_CXX_error" != yes; _LT_TAGVAR(archive_cmds, $1)='$CC -shared -nostdlib ${allow_undefined_flag} $predep_objects $libobjs $deplibs $postdep_objects $compiler_flags ${wl}-soname ${wl}$soname `test -n "$verstring" && func_echo_all "${wl}-set_version ${wl}$verstring"` ${wl}-update_registry ${wl}${output_objdir}/so_locations -o $lib' ;; *) @@ -23273,7 +23098,7 @@ index e36fdd3c0e2..4acf9d67956 100644 ;; esac -@@ -6318,7 +6692,7 @@ if test "$_lt_caught_CXX_error" != yes; then +@@ -6318,7 +6692,7 @@ if test "$_lt_caught_CXX_error" != yes; solaris*) case $cc_basename in @@ -23282,7 +23107,7 @@ index e36fdd3c0e2..4acf9d67956 100644 # Sun C++ 4.2, 5.x and Centerline C++ _LT_TAGVAR(archive_cmds_need_lc,$1)=yes _LT_TAGVAR(no_undefined_flag, $1)=' -zdefs' -@@ -6359,9 +6733,9 @@ if test "$_lt_caught_CXX_error" != yes; then +@@ -6359,9 +6733,9 @@ if test "$_lt_caught_CXX_error" != yes; if test "$GXX" = yes && test "$with_gnu_ld" = no; then _LT_TAGVAR(no_undefined_flag, $1)=' ${wl}-z ${wl}defs' if $CC --version | $GREP -v '^2\.7' > /dev/null; then @@ -23294,7 +23119,7 @@ index e36fdd3c0e2..4acf9d67956 100644 # Commands to make compiler produce verbose output that lists # what "hidden" libraries, object files and flags are used when -@@ -6491,6 +6865,7 @@ if test "$_lt_caught_CXX_error" != yes; then +@@ -6491,6 +6865,7 @@ if test "$_lt_caught_CXX_error" != yes; fi # test -n "$compiler" CC=$lt_save_CC @@ -23502,7 +23327,7 @@ index e36fdd3c0e2..4acf9d67956 100644 ])# _LT_LANG_RC_CONFIG -@@ -7161,6 +7591,15 @@ _LT_DECL([], [OBJDUMP], [1], [An object symbol dumper]) +@@ -7161,6 +7591,15 @@ _LT_DECL([], [OBJDUMP], [1], [An object AC_SUBST([OBJDUMP]) ]) @@ -23529,7 +23354,7 @@ index e36fdd3c0e2..4acf9d67956 100644 && eval 'test $(( 1 + 1 )) -eq 2 \ && test "${#_lt_dummy}" -eq 5' ) >/dev/null 2>&1 \ && xsi_shell=yes -@@ -7294,206 +7733,162 @@ _LT_DECL([NL2SP], [lt_NL2SP], [1], [turn newlines into spaces])dnl +@@ -7294,206 +7733,162 @@ _LT_DECL([NL2SP], [lt_NL2SP], [1], [turn ])# _LT_CHECK_SHELL_FEATURES @@ -23627,6 +23452,31 @@ index e36fdd3c0e2..4acf9d67956 100644 -{ - func_len_result=${#1} -} +- +-_LT_EOF +- ;; +- *) # Bourne compatible functions. +- cat << \_LT_EOF >> "$cfgfile" +- +-# func_dirname file append nondir_replacement +-# Compute the dirname of FILE. If nonempty, add APPEND to the result, +-# otherwise set result to NONDIR_REPLACEMENT. +-func_dirname () +-{ +- # Extract subdirectory from the argument. +- func_dirname_result=`$ECHO "${1}" | $SED "$dirname"` +- if test "X$func_dirname_result" = "X${1}"; then +- func_dirname_result="${3}" +- else +- func_dirname_result="$func_dirname_result${2}" +- fi +-} +- +-# func_basename file +-func_basename () +-{ +- func_basename_result=`$ECHO "${1}" | $SED "$basename"` +-} +# _LT_PROG_FUNCTION_REPLACE (FUNCNAME, REPLACEMENT-BODY) +# ------------------------------------------------------ +# In `$cfgfile', look for function FUNCNAME delimited by `^FUNCNAME ()$' and @@ -23643,23 +23493,22 @@ index e36fdd3c0e2..4acf9d67956 100644 +test 0 -eq $? || _lt_function_replace_fail=: +]) --_LT_EOF -- ;; -- *) # Bourne compatible functions. -- cat << \_LT_EOF >> "$cfgfile" +-dnl func_dirname_and_basename +-dnl A portable version of this function is already defined in general.m4sh +-dnl so there is no need for it here. --# func_dirname file append nondir_replacement --# Compute the dirname of FILE. If nonempty, add APPEND to the result, --# otherwise set result to NONDIR_REPLACEMENT. --func_dirname () +-# func_stripname prefix suffix name +-# strip PREFIX and SUFFIX off of NAME. +-# PREFIX and SUFFIX must not contain globbing or regex special +-# characters, hashes, percent signs, but SUFFIX may contain a leading +-# dot (in which case that matches only a dot). +-# func_strip_suffix prefix name +-func_stripname () -{ -- # Extract subdirectory from the argument. -- func_dirname_result=`$ECHO "${1}" | $SED "$dirname"` -- if test "X$func_dirname_result" = "X${1}"; then -- func_dirname_result="${3}" -- else -- func_dirname_result="$func_dirname_result${2}" -- fi +- case ${2} in +- .*) func_stripname_result=`$ECHO "${3}" | $SED "s%^${1}%%; s%\\\\${2}\$%%"`;; +- *) func_stripname_result=`$ECHO "${3}" | $SED "s%^${1}%%; s%${2}\$%%"`;; +- esac -} +# _LT_PROG_REPLACE_SHELLFNS +# ------------------------- @@ -23683,45 +23532,24 @@ index e36fdd3c0e2..4acf9d67956 100644 + esac + func_basename_result="${1##*/}"]) --# func_basename file --func_basename () --{ -- func_basename_result=`$ECHO "${1}" | $SED "$basename"` --} +-# sed scripts: +-my_sed_long_opt='1s/^\(-[[^=]]*\)=.*/\1/;q' +-my_sed_long_arg='1s/^-[[^=]]*=//' + _LT_PROG_FUNCTION_REPLACE([func_stripname], [dnl + # pdksh 5.2.14 does not do ${X%$Y} correctly if both X and Y are + # positional parameters, so assign one to ordinary parameter first. + func_stripname_result=${3} + func_stripname_result=${func_stripname_result#"${1}"} + func_stripname_result=${func_stripname_result%"${2}"}]) - --dnl func_dirname_and_basename --dnl A portable version of this function is already defined in general.m4sh --dnl so there is no need for it here. ++ + _LT_PROG_FUNCTION_REPLACE([func_split_long_opt], [dnl + func_split_long_opt_name=${1%%=*} + func_split_long_opt_arg=${1#*=}]) - --# func_stripname prefix suffix name --# strip PREFIX and SUFFIX off of NAME. --# PREFIX and SUFFIX must not contain globbing or regex special --# characters, hashes, percent signs, but SUFFIX may contain a leading --# dot (in which case that matches only a dot). --# func_strip_suffix prefix name --func_stripname () --{ -- case ${2} in -- .*) func_stripname_result=`$ECHO "${3}" | $SED "s%^${1}%%; s%\\\\${2}\$%%"`;; -- *) func_stripname_result=`$ECHO "${3}" | $SED "s%^${1}%%; s%${2}\$%%"`;; -- esac --} ++ + _LT_PROG_FUNCTION_REPLACE([func_split_short_opt], [dnl + func_split_short_opt_arg=${1#??} + func_split_short_opt_name=${1%"$func_split_short_opt_arg"}]) - --# sed scripts: --my_sed_long_opt='1s/^\(-[[^=]]*\)=.*/\1/;q' --my_sed_long_arg='1s/^-[[^=]]*=//' ++ + _LT_PROG_FUNCTION_REPLACE([func_lo2o], [dnl + case ${1} in + *.lo) func_lo2o_result=${1%.lo}.${objext} ;; @@ -23769,9 +23597,7 @@ index e36fdd3c0e2..4acf9d67956 100644 + func_quote_for_eval "${2}" +dnl m4 expansion turns \\\\ into \\, and then the shell eval turns that into \ + eval "${1}+=\\\\ \\$func_quote_for_eval_result"]) - --_LT_EOF --esac ++ + # Save a `func_append' function call where possible by direct use of '+=' + sed -e 's%func_append \([[a-zA-Z_]]\{1,\}\) "%\1+="%g' $cfgfile > $cfgfile.tmp \ + && mv -f "$cfgfile.tmp" "$cfgfile" \ @@ -23785,14 +23611,17 @@ index e36fdd3c0e2..4acf9d67956 100644 + test 0 -eq $? || _lt_function_replace_fail=: +fi --case $lt_shell_append in -- yes) -- cat << \_LT_EOF >> "$cfgfile" +-_LT_EOF +-esac +if test x"$_lt_function_replace_fail" = x":"; then + AC_MSG_WARN([Unable to substitute extended shell functions in $ofile]) +fi +]) +-case $lt_shell_append in +- yes) +- cat << \_LT_EOF >> "$cfgfile" +- -# func_append var value -# Append VALUE to the end of shell variable VAR. -func_append () @@ -23878,8 +23707,6 @@ index e36fdd3c0e2..4acf9d67956 100644 +_LT_DECL([to_tool_file_cmd], [lt_cv_to_tool_file_cmd], + [0], [convert $build files to toolchain format])dnl +])# _LT_PATH_CONVERSION_FUNCTIONS -diff --git a/ltmain.sh b/ltmain.sh -index 1a710177fb2..09693d7b99b 100644 --- a/ltmain.sh +++ b/ltmain.sh @@ -1,10 +1,9 @@ @@ -24311,31 +24138,7 @@ index 1a710177fb2..09693d7b99b 100644 +$progname: of $PACKAGE $VERSION and run autoconf again. +_LT_EOF + fi - -- # Shorthand for --mode=foo, only valid as the first argument -- case $1 in -- clean|clea|cle|cl) -- shift; set dummy --mode clean ${1+"$@"}; shift -- ;; -- compile|compil|compi|comp|com|co|c) -- shift; set dummy --mode compile ${1+"$@"}; shift -- ;; -- execute|execut|execu|exec|exe|ex|e) -- shift; set dummy --mode execute ${1+"$@"}; shift -- ;; -- finish|finis|fini|fin|fi|f) -- shift; set dummy --mode finish ${1+"$@"}; shift -- ;; -- install|instal|insta|inst|ins|in|i) -- shift; set dummy --mode install ${1+"$@"}; shift -- ;; -- link|lin|li|l) -- shift; set dummy --mode link ${1+"$@"}; shift -- ;; -- uninstall|uninstal|uninsta|uninst|unins|unin|uni|un|u) -- shift; set dummy --mode uninstall ${1+"$@"}; shift -- ;; -- esac ++ + exit $EXIT_MISMATCH + fi +} @@ -24365,9 +24168,7 @@ index 1a710177fb2..09693d7b99b 100644 + shift; set dummy --mode uninstall ${1+"$@"}; shift + ;; +esac - -- # Parse non-mode specific arguments: -- while test "$#" -gt 0; do ++ + + +# Option defaults: @@ -24383,8 +24184,34 @@ index 1a710177fb2..09693d7b99b 100644 +opt_verbose=: +opt_silent=false +opt_verbose=false -+ -+ + +- # Shorthand for --mode=foo, only valid as the first argument +- case $1 in +- clean|clea|cle|cl) +- shift; set dummy --mode clean ${1+"$@"}; shift +- ;; +- compile|compil|compi|comp|com|co|c) +- shift; set dummy --mode compile ${1+"$@"}; shift +- ;; +- execute|execut|execu|exec|exe|ex|e) +- shift; set dummy --mode execute ${1+"$@"}; shift +- ;; +- finish|finis|fini|fin|fi|f) +- shift; set dummy --mode finish ${1+"$@"}; shift +- ;; +- install|instal|insta|inst|ins|in|i) +- shift; set dummy --mode install ${1+"$@"}; shift +- ;; +- link|lin|li|l) +- shift; set dummy --mode link ${1+"$@"}; shift +- ;; +- uninstall|uninstal|uninsta|uninst|unins|unin|uni|un|u) +- shift; set dummy --mode uninstall ${1+"$@"}; shift +- ;; +- esac + +- # Parse non-mode specific arguments: +- while test "$#" -gt 0; do +# Parse options once, thoroughly. This comes as soon as possible in the +# script to make things like `--version' happen as quickly as we can. +{ @@ -24628,13 +24455,13 @@ index 1a710177fb2..09693d7b99b 100644 - fi -} - -+ # Darwin sucks -+ eval std_shrext=\"$shrext_cmds\" - +- -## ----------- ## -## Main. ## -## ----------- ## -- ++ # Darwin sucks ++ eval std_shrext=\"$shrext_cmds\" + -$opt_help || { - # Sanity checks first: - func_check_version_match @@ -25355,7 +25182,7 @@ index 1a710177fb2..09693d7b99b 100644 "") # Generic help is extracted from the usage comments # at the start of this file. -@@ -1659,8 +2327,8 @@ This mode accepts the following additional options: +@@ -1659,8 +2327,8 @@ This mode accepts the following addition -o OUTPUT-FILE set the output file name to OUTPUT-FILE -no-suppress do not suppress compiler output for multiple passes @@ -25366,7 +25193,7 @@ index 1a710177fb2..09693d7b99b 100644 -shared do not build a \`.o' file suitable for static linking -static only build a \`.o' file suitable for static linking -Wc,FLAG pass FLAG directly to the compiler -@@ -1804,7 +2472,7 @@ Otherwise, only FILE itself is deleted using RM." +@@ -1804,7 +2472,7 @@ Otherwise, only FILE itself is deleted u ;; *) @@ -25468,7 +25295,7 @@ index 1a710177fb2..09693d7b99b 100644 + do + if test -d "$opt"; then + func_append libdirs " $opt" - ++ + elif test -f "$opt"; then + if func_lalib_unsafe_p "$opt"; then + func_append libs " $opt" @@ -25488,7 +25315,7 @@ index 1a710177fb2..09693d7b99b 100644 + else + sysroot_cmd= + fi -+ + + # Remove sysroot references + if $opt_dry_run; then + for lib in $libs; do @@ -25900,7 +25727,7 @@ index 1a710177fb2..09693d7b99b 100644 lt_${my_prefix}_LTX_preloaded_symbols[] = {\ { \"$my_originator\", (void *) 0 }," -@@ -2736,7 +3493,7 @@ static const void *lt_preloaded_setup() { +@@ -2736,7 +3493,7 @@ static const void *lt_preloaded_setup() for arg in $LTCFLAGS; do case $arg in -pie | -fpie | -fPIE) ;; @@ -26411,7 +26238,7 @@ index 1a710177fb2..09693d7b99b 100644 */ EOF cat <<"EOF" -@@ -3462,22 +4272,13 @@ int setenv (const char *, const char *, int); +@@ -3462,22 +4272,13 @@ int setenv (const char *, const char *, if (stale) { free ((void *) stale); stale = 0; } \ } while (0) @@ -26438,7 +26265,7 @@ index 1a710177fb2..09693d7b99b 100644 void *xmalloc (size_t num); char *xstrdup (const char *string); -@@ -3487,7 +4288,10 @@ char *chase_symlinks (const char *pathspec); +@@ -3487,7 +4288,10 @@ char *chase_symlinks (const char *pathsp int make_executable (const char *path); int check_executable (const char *path); char *strendzap (char *str, const char *pat); @@ -26766,7 +26593,7 @@ index 1a710177fb2..09693d7b99b 100644 vfprintf (stderr, message, ap); fprintf (stderr, ".\n"); -@@ -3988,20 +4832,32 @@ lt_error_core (int exit_status, const char *mode, +@@ -3988,20 +4832,32 @@ lt_error_core (int exit_status, const ch } void @@ -26804,7 +26631,7 @@ index 1a710177fb2..09693d7b99b 100644 { #ifdef HAVE_SETENV /* always make a copy, for consistency with !HAVE_SETENV */ -@@ -4049,9 +4905,9 @@ lt_extend_str (const char *orig_value, const char *add, int to_end) +@@ -4049,9 +4905,9 @@ lt_extend_str (const char *orig_value, c void lt_update_exe_path (const char *name, const char *value) { @@ -26817,7 +26644,7 @@ index 1a710177fb2..09693d7b99b 100644 if (name && *name && value && *value) { -@@ -4070,9 +4926,9 @@ lt_update_exe_path (const char *name, const char *value) +@@ -4070,9 +4926,9 @@ lt_update_exe_path (const char *name, co void lt_update_lib_path (const char *name, const char *value) { @@ -29070,8 +28897,6 @@ index 1a710177fb2..09693d7b99b 100644 if test -n "$exec_cmd"; then eval exec "$exec_cmd" -diff --git a/ltoptions.m4 b/ltoptions.m4 -index 5ef12ced2a8..17cfd51c0b3 100644 --- a/ltoptions.m4 +++ b/ltoptions.m4 @@ -8,7 +8,7 @@ @@ -29083,8 +28908,6 @@ index 5ef12ced2a8..17cfd51c0b3 100644 # This is to help aclocal find these macros, as it can't see m4_define. AC_DEFUN([LTOPTIONS_VERSION], [m4_if([1])]) -diff --git a/ltversion.m4 b/ltversion.m4 -index bf87f77132d..9c7b5d41185 100644 --- a/ltversion.m4 +++ b/ltversion.m4 @@ -7,17 +7,17 @@ @@ -29111,8 +28934,6 @@ index bf87f77132d..9c7b5d41185 100644 _LT_DECL(, macro_version, 0, [Which release of libtool.m4 was used?]) _LT_DECL(, macro_revision, 0) ]) -diff --git a/lt~obsolete.m4 b/lt~obsolete.m4 -index bf92b5e0790..c573da90c5c 100644 --- a/lt~obsolete.m4 +++ b/lt~obsolete.m4 @@ -7,7 +7,7 @@ @@ -29124,8 +28945,6 @@ index bf92b5e0790..c573da90c5c 100644 # These exist entirely to fool aclocal when bootstrapping libtool. # -diff --git a/opcodes/Makefile.in b/opcodes/Makefile.in -index 4399354e5a9..4b1625febf3 100644 --- a/opcodes/Makefile.in +++ b/opcodes/Makefile.in @@ -298,6 +298,7 @@ CYGPATH_W = @CYGPATH_W@ @@ -29152,8 +28971,6 @@ index 4399354e5a9..4b1625febf3 100644 ac_ct_CC = @ac_ct_CC@ ac_ct_DUMPBIN = @ac_ct_DUMPBIN@ am__include = @am__include@ -diff --git a/opcodes/configure b/opcodes/configure -index 3dd6b692f89..64e9ba9b587 100755 --- a/opcodes/configure +++ b/opcodes/configure @@ -686,6 +686,9 @@ OTOOL @@ -29203,7 +29020,7 @@ index 3dd6b692f89..64e9ba9b587 100755 test "X`print -r -- $ECHO 2>/dev/null`" = "X$ECHO"; then ECHO='print -r --' elif test "X`printf %s $ECHO 2>/dev/null`" = "X$ECHO"; then -@@ -5542,8 +5548,8 @@ $as_echo_n "checking whether the shell understands some XSI constructs... " >&6; +@@ -5542,8 +5548,8 @@ $as_echo_n "checking whether the shell u # Try some XSI features xsi_shell=no ( _lt_dummy="a/b/c" @@ -29339,7 +29156,7 @@ index 3dd6b692f89..64e9ba9b587 100755 file_magic_cmd=$lt_cv_file_magic_cmd deplibs_check_method=$lt_cv_deplibs_check_method test -z "$deplibs_check_method" && deplibs_check_method=unknown -@@ -5950,6 +6051,157 @@ test -z "$deplibs_check_method" && deplibs_check_method=unknown +@@ -5950,6 +6051,157 @@ test -z "$deplibs_check_method" && depli @@ -29558,7 +29375,7 @@ index 3dd6b692f89..64e9ba9b587 100755 if test "x$ac_ct_AR" = x; then AR="false" else -@@ -6051,25 +6313,20 @@ ac_tool_warned=yes ;; +@@ -6051,29 +6313,81 @@ ac_tool_warned=yes ;; esac AR=$ac_ct_AR fi @@ -29591,11 +29408,14 @@ index 3dd6b692f89..64e9ba9b587 100755 +: ${AR=ar} +: ${AR_FLAGS=cru} + - - - -@@ -6080,6 +6337,63 @@ test -z "$AR_FLAGS" && AR_FLAGS=cru - ++ ++ ++ ++ ++ ++ ++ ++ +{ $as_echo "$as_me:${as_lineno-$LINENO}: checking for archiver @FILE support" >&5 @@ -29639,25 +29459,19 @@ index 3dd6b692f89..64e9ba9b587 100755 + +fi +rm -f core conftest.err conftest.$ac_objext conftest.$ac_ext -+ + +fi +{ $as_echo "$as_me:${as_lineno-$LINENO}: result: $lt_cv_ar_at_file" >&5 +$as_echo "$lt_cv_ar_at_file" >&6; } -+ + +if test "x$lt_cv_ar_at_file" = xno; then + archiver_list_spec= +else + archiver_list_spec=$lt_cv_ar_at_file +fi -+ -+ -+ -+ -+ -+ - if test -n "$ac_tool_prefix"; then - # Extract the first word of "${ac_tool_prefix}strip", so it can be a program name with args. + + @@ -6420,8 +6734,8 @@ esac lt_cv_sys_global_symbol_to_cdecl="sed -n -e 's/^T .* \(.*\)$/extern int \1();/p' -e 's/^$symcode* .* \(.*\)$/extern char \1;/p'" @@ -29705,7 +29519,7 @@ index 3dd6b692f89..64e9ba9b587 100755 const char *name; void *address; } -@@ -6535,8 +6862,8 @@ static const void *lt_preloaded_setup() { +@@ -6535,8 +6862,8 @@ static const void *lt_preloaded_setup() _LT_EOF # Now try linking the two files. mv conftest.$ac_objext conftstm.$ac_objext @@ -29727,7 +29541,7 @@ index 3dd6b692f89..64e9ba9b587 100755 else echo "cannot find nm_test_func in $nlist" >&5 fi -@@ -6584,6 +6911,14 @@ else +@@ -6584,6 +6911,12 @@ else $as_echo "ok" >&6; } fi @@ -29737,12 +29551,10 @@ index 3dd6b692f89..64e9ba9b587 100755 +elif $NM --help 2>/dev/null | grep '[@]FILE' >/dev/null; then + nm_file_list_spec='@' +fi -+ -+ -@@ -6602,6 +6937,47 @@ fi +@@ -6605,6 +6938,49 @@ fi @@ -29752,7 +29564,6 @@ index 3dd6b692f89..64e9ba9b587 100755 + + + -+ +{ $as_echo "$as_me:${as_lineno-$LINENO}: checking for sysroot" >&5 +$as_echo_n "checking for sysroot... " >&6; } + @@ -29787,9 +29598,12 @@ index 3dd6b692f89..64e9ba9b587 100755 +$as_echo "${lt_sysroot:-no}" >&6; } + + - - - ++ ++ ++ + # Check whether --enable-libtool-lock was given. + if test "${enable_libtool_lock+set}" = set; then : + enableval=$enable_libtool_lock; @@ -6811,6 +7187,123 @@ esac need_locks="$enable_libtool_lock" @@ -29932,7 +29746,7 @@ index 3dd6b692f89..64e9ba9b587 100755 if test "$GCC" = yes; then lt_prog_compiler_wl='-Wl,' -@@ -8095,6 +8588,12 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -8095,6 +8588,12 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='--shared' lt_prog_compiler_static='--static' ;; @@ -29945,7 +29759,7 @@ index 3dd6b692f89..64e9ba9b587 100755 pgcc* | pgf77* | pgf90* | pgf95* | pgfortran*) # Portland Group compilers (*not* the Pentium gcc compiler, # which looks to be a dead project) -@@ -8157,7 +8656,7 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -8157,7 +8656,7 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='-KPIC' lt_prog_compiler_static='-Bstatic' case $cc_basename in @@ -30106,7 +29920,7 @@ index 3dd6b692f89..64e9ba9b587 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" archive_expsym_cmds='$CC -o $output_objdir/$soname $libobjs $deplibs '"\${wl}$no_entry_flag"' $compiler_flags `if test "x${allow_undefined_flag}" != "x"; then func_echo_all "${wl}${allow_undefined_flag}"; else :; fi` '"\${wl}$exp_sym_flag:\$export_symbols $shared_flag" -@@ -8986,7 +9508,13 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -8986,7 +9508,13 @@ if test -z "$aix_libpath"; then aix_libp else # Determine the default libpath from the value encoded in an # empty executable. @@ -30164,7 +29978,7 @@ index 3dd6b692f89..64e9ba9b587 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" # Warning - without using the other run time loading flags, -@@ -9059,20 +9594,63 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9059,20 +9594,63 @@ if test -z "$aix_libpath"; then aix_libp # Microsoft Visual C++. # hardcode_libdir_flag_spec is actually meaningless, as there is # no search path for DLLs. @@ -30242,7 +30056,7 @@ index 3dd6b692f89..64e9ba9b587 100755 ;; darwin* | rhapsody*) -@@ -9133,7 +9711,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9133,7 +9711,7 @@ if test -z "$aix_libpath"; then aix_libp # FreeBSD 3 and greater uses gcc -shared to do shared libraries. freebsd* | dragonfly*) @@ -30251,7 +30065,7 @@ index 3dd6b692f89..64e9ba9b587 100755 hardcode_libdir_flag_spec='-R$libdir' hardcode_direct=yes hardcode_shlibpath_var=no -@@ -9141,7 +9719,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9141,7 +9719,7 @@ if test -z "$aix_libpath"; then aix_libp hpux9*) if test "$GCC" = yes; then @@ -30260,7 +30074,7 @@ index 3dd6b692f89..64e9ba9b587 100755 else archive_cmds='$RM $output_objdir/$soname~$LD -b +b $install_libdir -o $output_objdir/$soname $libobjs $deplibs $linker_flags~test $output_objdir/$soname = $lib || mv $output_objdir/$soname $lib' fi -@@ -9157,7 +9735,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9157,7 +9735,7 @@ if test -z "$aix_libpath"; then aix_libp hpux10*) if test "$GCC" = yes && test "$with_gnu_ld" = no; then @@ -30269,7 +30083,7 @@ index 3dd6b692f89..64e9ba9b587 100755 else archive_cmds='$LD -b +h $soname +b $install_libdir -o $lib $libobjs $deplibs $linker_flags' fi -@@ -9181,10 +9759,10 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9181,10 +9759,10 @@ if test -z "$aix_libpath"; then aix_libp archive_cmds='$CC -shared ${wl}+h ${wl}$soname ${wl}+nodefaultrpath -o $lib $libobjs $deplibs $compiler_flags' ;; ia64*) @@ -30327,7 +30141,7 @@ index 3dd6b692f89..64e9ba9b587 100755 else archive_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -o $lib' archive_expsym_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -exports_file $export_symbols -o $lib' -@@ -9364,7 +9955,7 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -9364,7 +9955,7 @@ rm -f core conftest.err conftest.$ac_obj osf4* | osf5*) # as osf3* with the addition of -msym flag if test "$GCC" = yes; then allow_undefined_flag=' ${wl}-expect_unresolved ${wl}\*' @@ -30336,7 +30150,7 @@ index 3dd6b692f89..64e9ba9b587 100755 hardcode_libdir_flag_spec='${wl}-rpath ${wl}$libdir' else allow_undefined_flag=' -expect_unresolved \*' -@@ -9383,9 +9974,9 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -9383,9 +9974,9 @@ rm -f core conftest.err conftest.$ac_obj no_undefined_flag=' -z defs' if test "$GCC" = yes; then wlarc='${wl}' @@ -30477,7 +30291,7 @@ index 3dd6b692f89..64e9ba9b587 100755 int main () { void *self = dlopen (0, LT_DLGLOBAL|LT_DLLAZY_OR_NOW); -@@ -14846,13 +15496,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_single_quote_subst"`' +@@ -14846,13 +15496,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_ lt_unset='`$ECHO "$lt_unset" | $SED "$delay_single_quote_subst"`' lt_SP2NL='`$ECHO "$lt_SP2NL" | $SED "$delay_single_quote_subst"`' lt_NL2SP='`$ECHO "$lt_NL2SP" | $SED "$delay_single_quote_subst"`' @@ -30498,7 +30312,7 @@ index 3dd6b692f89..64e9ba9b587 100755 STRIP='`$ECHO "$STRIP" | $SED "$delay_single_quote_subst"`' RANLIB='`$ECHO "$RANLIB" | $SED "$delay_single_quote_subst"`' old_postinstall_cmds='`$ECHO "$old_postinstall_cmds" | $SED "$delay_single_quote_subst"`' -@@ -14867,14 +15524,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$lt_cv_sys_global_symbol_pipe" | $SED "$de +@@ -14867,14 +15524,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$l lt_cv_sys_global_symbol_to_cdecl='`$ECHO "$lt_cv_sys_global_symbol_to_cdecl" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address_lib_prefix='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address_lib_prefix" | $SED "$delay_single_quote_subst"`' @@ -30517,7 +30331,7 @@ index 3dd6b692f89..64e9ba9b587 100755 DSYMUTIL='`$ECHO "$DSYMUTIL" | $SED "$delay_single_quote_subst"`' NMEDIT='`$ECHO "$NMEDIT" | $SED "$delay_single_quote_subst"`' LIPO='`$ECHO "$LIPO" | $SED "$delay_single_quote_subst"`' -@@ -14907,12 +15567,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcode_shlibpath_var" | $SED "$delay_single_q +@@ -14907,12 +15567,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcod hardcode_automatic='`$ECHO "$hardcode_automatic" | $SED "$delay_single_quote_subst"`' inherit_rpath='`$ECHO "$inherit_rpath" | $SED "$delay_single_quote_subst"`' link_all_deplibs='`$ECHO "$link_all_deplibs" | $SED "$delay_single_quote_subst"`' @@ -30631,7 +30445,7 @@ index 3dd6b692f89..64e9ba9b587 100755 # A symbol stripping program. STRIP=$lt_STRIP -@@ -15945,6 +16636,12 @@ global_symbol_to_c_name_address=$lt_lt_cv_sys_global_symbol_to_c_name_address +@@ -15945,6 +16636,12 @@ global_symbol_to_c_name_address=$lt_lt_c # Transform the output of nm in a C name address pair when lib prefix is needed. global_symbol_to_c_name_address_lib_prefix=$lt_lt_cv_sys_global_symbol_to_c_name_address_lib_prefix @@ -30892,15 +30706,9 @@ index 3dd6b692f89..64e9ba9b587 100755 -_LT_EOF - ;; - esac -- -- -- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ -- || (rm -f "$cfgfile"; exit 1) -- -- mv -f "$cfgfile" "$ofile" || + sed '$q' "$ltmain" >> "$cfgfile" \ + || (rm -f "$cfgfile"; exit 1) -+ + + if test x"$xsi_shell" = xyes; then + sed -e '/^func_dirname ()$/,/^} # func_dirname /c\ +func_dirname ()\ @@ -31058,14 +30866,15 @@ index 3dd6b692f89..64e9ba9b587 100755 + { $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: Unable to substitute extended shell functions in $ofile" >&5 +$as_echo "$as_me: WARNING: Unable to substitute extended shell functions in $ofile" >&2;} +fi -+ -+ + +- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ +- || (rm -f "$cfgfile"; exit 1) + +- mv -f "$cfgfile" "$ofile" || + mv -f "$cfgfile" "$ofile" || (rm -f "$ofile" && cp "$cfgfile" "$ofile" && rm -f "$cfgfile") chmod +x "$ofile" -diff --git a/zlib/Makefile.in b/zlib/Makefile.in -index 951260ac4c5..9398823cc09 100644 --- a/zlib/Makefile.in +++ b/zlib/Makefile.in @@ -281,6 +281,7 @@ CPPFLAGS = @CPPFLAGS@ @@ -31092,8 +30901,6 @@ index 951260ac4c5..9398823cc09 100644 ac_ct_CC = @ac_ct_CC@ ac_ct_DUMPBIN = @ac_ct_DUMPBIN@ am__include = @am__include@ -diff --git a/zlib/configure b/zlib/configure -index cae55c5ca49..24193ee5db7 100755 --- a/zlib/configure +++ b/zlib/configure @@ -648,8 +648,11 @@ OTOOL @@ -31145,7 +30952,7 @@ index cae55c5ca49..24193ee5db7 100755 test "X`print -r -- $ECHO 2>/dev/null`" = "X$ECHO"; then ECHO='print -r --' elif test "X`printf %s $ECHO 2>/dev/null`" = "X$ECHO"; then -@@ -5053,8 +5059,8 @@ $as_echo_n "checking whether the shell understands some XSI constructs... " >&6; +@@ -5053,8 +5059,8 @@ $as_echo_n "checking whether the shell u # Try some XSI features xsi_shell=no ( _lt_dummy="a/b/c" @@ -31281,7 +31088,7 @@ index cae55c5ca49..24193ee5db7 100755 file_magic_cmd=$lt_cv_file_magic_cmd deplibs_check_method=$lt_cv_deplibs_check_method test -z "$deplibs_check_method" && deplibs_check_method=unknown -@@ -5461,6 +5562,158 @@ test -z "$deplibs_check_method" && deplibs_check_method=unknown +@@ -5461,6 +5562,158 @@ test -z "$deplibs_check_method" && depli @@ -31501,7 +31308,7 @@ index cae55c5ca49..24193ee5db7 100755 if test "x$ac_ct_AR" = x; then AR="false" else -@@ -5562,25 +5825,19 @@ ac_tool_warned=yes ;; +@@ -5562,29 +5825,81 @@ ac_tool_warned=yes ;; esac AR=$ac_ct_AR fi @@ -31533,13 +31340,17 @@ index cae55c5ca49..24193ee5db7 100755 + rm -f conftest.* +: ${AR=ar} +: ${AR_FLAGS=cru} - - - -@@ -5592,6 +5849,64 @@ test -z "$AR_FLAGS" && AR_FLAGS=cru - - - ++ ++ ++ ++ ++ ++ ++ ++ ++ ++ ++ +{ $as_echo "$as_me:${as_lineno-$LINENO}: checking for archiver @FILE support" >&5 +$as_echo_n "checking for archiver @FILE support... " >&6; } +if ${lt_cv_ar_at_file+:} false; then : @@ -31548,11 +31359,11 @@ index cae55c5ca49..24193ee5db7 100755 + lt_cv_ar_at_file=no + cat confdefs.h - <<_ACEOF >conftest.$ac_ext +/* end confdefs.h. */ -+ + +int +main () +{ -+ + + ; + return 0; +} @@ -31581,26 +31392,19 @@ index cae55c5ca49..24193ee5db7 100755 + +fi +rm -f core conftest.err conftest.$ac_objext conftest.$ac_ext -+ + +fi +{ $as_echo "$as_me:${as_lineno-$LINENO}: result: $lt_cv_ar_at_file" >&5 +$as_echo "$lt_cv_ar_at_file" >&6; } -+ + +if test "x$lt_cv_ar_at_file" = xno; then + archiver_list_spec= +else + archiver_list_spec=$lt_cv_ar_at_file +fi -+ -+ -+ -+ -+ -+ -+ - if test -n "$ac_tool_prefix"; then - # Extract the first word of "${ac_tool_prefix}strip", so it can be a program name with args. - set dummy ${ac_tool_prefix}strip; ac_word=$2 + + + @@ -5931,8 +6246,8 @@ esac lt_cv_sys_global_symbol_to_cdecl="sed -n -e 's/^T .* \(.*\)$/extern int \1();/p' -e 's/^$symcode* .* \(.*\)$/extern char \1;/p'" @@ -31648,7 +31452,7 @@ index cae55c5ca49..24193ee5db7 100755 const char *name; void *address; } -@@ -6046,8 +6374,8 @@ static const void *lt_preloaded_setup() { +@@ -6046,8 +6374,8 @@ static const void *lt_preloaded_setup() _LT_EOF # Now try linking the two files. mv conftest.$ac_objext conftstm.$ac_objext @@ -31670,7 +31474,7 @@ index cae55c5ca49..24193ee5db7 100755 else echo "cannot find nm_test_func in $nlist" >&5 fi -@@ -6095,6 +6423,17 @@ else +@@ -6095,6 +6423,15 @@ else $as_echo "ok" >&6; } fi @@ -31683,18 +31487,13 @@ index cae55c5ca49..24193ee5db7 100755 + + + -+ -+ -@@ -6112,6 +6451,43 @@ fi +@@ -6117,6 +6454,45 @@ fi -+ -+ -+ + + +{ $as_echo "$as_me:${as_lineno-$LINENO}: checking for sysroot" >&5 @@ -31729,9 +31528,14 @@ index cae55c5ca49..24193ee5db7 100755 + + { $as_echo "$as_me:${as_lineno-$LINENO}: result: ${lt_sysroot:-no}" >&5 +$as_echo "${lt_sysroot:-no}" >&6; } - - - ++ ++ ++ ++ ++ + # Check whether --enable-libtool-lock was given. + if test "${enable_libtool_lock+set}" = set; then : + enableval=$enable_libtool_lock; @@ -6326,6 +6702,123 @@ esac need_locks="$enable_libtool_lock" @@ -31874,7 +31678,7 @@ index cae55c5ca49..24193ee5db7 100755 if test "$GCC" = yes; then lt_prog_compiler_wl='-Wl,' -@@ -7910,6 +8403,12 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -7910,6 +8403,12 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='--shared' lt_prog_compiler_static='--static' ;; @@ -31887,7 +31691,7 @@ index cae55c5ca49..24193ee5db7 100755 pgcc* | pgf77* | pgf90* | pgf95* | pgfortran*) # Portland Group compilers (*not* the Pentium gcc compiler, # which looks to be a dead project) -@@ -7972,7 +8471,7 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -7972,7 +8471,7 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='-KPIC' lt_prog_compiler_static='-Bstatic' case $cc_basename in @@ -32048,7 +31852,7 @@ index cae55c5ca49..24193ee5db7 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" archive_expsym_cmds='$CC -o $output_objdir/$soname $libobjs $deplibs '"\${wl}$no_entry_flag"' $compiler_flags `if test "x${allow_undefined_flag}" != "x"; then func_echo_all "${wl}${allow_undefined_flag}"; else :; fi` '"\${wl}$exp_sym_flag:\$export_symbols $shared_flag" -@@ -8804,7 +9326,13 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -8804,7 +9326,13 @@ if test -z "$aix_libpath"; then aix_libp else # Determine the default libpath from the value encoded in an # empty executable. @@ -32106,7 +31910,7 @@ index cae55c5ca49..24193ee5db7 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" # Warning - without using the other run time loading flags, -@@ -8880,20 +9415,63 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -8880,20 +9415,63 @@ if test -z "$aix_libpath"; then aix_libp # Microsoft Visual C++. # hardcode_libdir_flag_spec is actually meaningless, as there is # no search path for DLLs. @@ -32184,7 +31988,7 @@ index cae55c5ca49..24193ee5db7 100755 ;; darwin* | rhapsody*) -@@ -8954,7 +9532,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -8954,7 +9532,7 @@ if test -z "$aix_libpath"; then aix_libp # FreeBSD 3 and greater uses gcc -shared to do shared libraries. freebsd* | dragonfly*) @@ -32193,7 +31997,7 @@ index cae55c5ca49..24193ee5db7 100755 hardcode_libdir_flag_spec='-R$libdir' hardcode_direct=yes hardcode_shlibpath_var=no -@@ -8962,7 +9540,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -8962,7 +9540,7 @@ if test -z "$aix_libpath"; then aix_libp hpux9*) if test "$GCC" = yes; then @@ -32202,7 +32006,7 @@ index cae55c5ca49..24193ee5db7 100755 else archive_cmds='$RM $output_objdir/$soname~$LD -b +b $install_libdir -o $output_objdir/$soname $libobjs $deplibs $linker_flags~test $output_objdir/$soname = $lib || mv $output_objdir/$soname $lib' fi -@@ -8978,7 +9556,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -8978,7 +9556,7 @@ if test -z "$aix_libpath"; then aix_libp hpux10*) if test "$GCC" = yes && test "$with_gnu_ld" = no; then @@ -32211,7 +32015,7 @@ index cae55c5ca49..24193ee5db7 100755 else archive_cmds='$LD -b +h $soname +b $install_libdir -o $lib $libobjs $deplibs $linker_flags' fi -@@ -9002,10 +9580,10 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9002,10 +9580,10 @@ if test -z "$aix_libpath"; then aix_libp archive_cmds='$CC -shared ${wl}+h ${wl}$soname ${wl}+nodefaultrpath -o $lib $libobjs $deplibs $compiler_flags' ;; ia64*) @@ -32272,7 +32076,7 @@ index cae55c5ca49..24193ee5db7 100755 else archive_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -o $lib' archive_expsym_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -exports_file $export_symbols -o $lib' -@@ -9188,7 +9779,7 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -9188,7 +9779,7 @@ rm -f core conftest.err conftest.$ac_obj osf4* | osf5*) # as osf3* with the addition of -msym flag if test "$GCC" = yes; then allow_undefined_flag=' ${wl}-expect_unresolved ${wl}\*' @@ -32281,7 +32085,7 @@ index cae55c5ca49..24193ee5db7 100755 hardcode_libdir_flag_spec='${wl}-rpath ${wl}$libdir' else allow_undefined_flag=' -expect_unresolved \*' -@@ -9207,9 +9798,9 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -9207,9 +9798,9 @@ rm -f core conftest.err conftest.$ac_obj no_undefined_flag=' -z defs' if test "$GCC" = yes; then wlarc='${wl}' @@ -32422,7 +32226,7 @@ index cae55c5ca49..24193ee5db7 100755 int main () { void *self = dlopen (0, LT_DLGLOBAL|LT_DLLAZY_OR_NOW); -@@ -12377,13 +13027,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_single_quote_subst"`' +@@ -12377,13 +13027,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_ lt_unset='`$ECHO "$lt_unset" | $SED "$delay_single_quote_subst"`' lt_SP2NL='`$ECHO "$lt_SP2NL" | $SED "$delay_single_quote_subst"`' lt_NL2SP='`$ECHO "$lt_NL2SP" | $SED "$delay_single_quote_subst"`' @@ -32443,7 +32247,7 @@ index cae55c5ca49..24193ee5db7 100755 STRIP='`$ECHO "$STRIP" | $SED "$delay_single_quote_subst"`' RANLIB='`$ECHO "$RANLIB" | $SED "$delay_single_quote_subst"`' old_postinstall_cmds='`$ECHO "$old_postinstall_cmds" | $SED "$delay_single_quote_subst"`' -@@ -12398,14 +13055,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$lt_cv_sys_global_symbol_pipe" | $SED "$de +@@ -12398,14 +13055,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$l lt_cv_sys_global_symbol_to_cdecl='`$ECHO "$lt_cv_sys_global_symbol_to_cdecl" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address_lib_prefix='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address_lib_prefix" | $SED "$delay_single_quote_subst"`' @@ -32462,7 +32266,7 @@ index cae55c5ca49..24193ee5db7 100755 DSYMUTIL='`$ECHO "$DSYMUTIL" | $SED "$delay_single_quote_subst"`' NMEDIT='`$ECHO "$NMEDIT" | $SED "$delay_single_quote_subst"`' LIPO='`$ECHO "$LIPO" | $SED "$delay_single_quote_subst"`' -@@ -12438,12 +13098,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcode_shlibpath_var" | $SED "$delay_single_q +@@ -12438,12 +13098,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcod hardcode_automatic='`$ECHO "$hardcode_automatic" | $SED "$delay_single_quote_subst"`' inherit_rpath='`$ECHO "$inherit_rpath" | $SED "$delay_single_quote_subst"`' link_all_deplibs='`$ECHO "$link_all_deplibs" | $SED "$delay_single_quote_subst"`' @@ -32576,7 +32380,7 @@ index cae55c5ca49..24193ee5db7 100755 # A symbol stripping program. STRIP=$lt_STRIP -@@ -13309,6 +14000,12 @@ global_symbol_to_c_name_address=$lt_lt_cv_sys_global_symbol_to_c_name_address +@@ -13309,6 +14000,12 @@ global_symbol_to_c_name_address=$lt_lt_c # Transform the output of nm in a C name address pair when lib prefix is needed. global_symbol_to_c_name_address_lib_prefix=$lt_lt_cv_sys_global_symbol_to_c_name_address_lib_prefix @@ -32837,15 +32641,9 @@ index cae55c5ca49..24193ee5db7 100755 -_LT_EOF - ;; - esac -- -- -- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ -- || (rm -f "$cfgfile"; exit 1) -- -- mv -f "$cfgfile" "$ofile" || + sed '$q' "$ltmain" >> "$cfgfile" \ + || (rm -f "$cfgfile"; exit 1) -+ + + if test x"$xsi_shell" = xyes; then + sed -e '/^func_dirname ()$/,/^} # func_dirname /c\ +func_dirname ()\ @@ -33003,8 +32801,11 @@ index cae55c5ca49..24193ee5db7 100755 + { $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: Unable to substitute extended shell functions in $ofile" >&5 +$as_echo "$as_me: WARNING: Unable to substitute extended shell functions in $ofile" >&2;} +fi -+ -+ + +- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ +- || (rm -f "$cfgfile"; exit 1) + +- mv -f "$cfgfile" "$ofile" || + mv -f "$cfgfile" "$ofile" || (rm -f "$ofile" && cp "$cfgfile" "$ofile" && rm -f "$cfgfile") chmod +x "$ofile" From patchwork Sat Jan 31 07:56:33 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 80132 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 98F5AD79759 for ; Sat, 31 Jan 2026 07:57:16 +0000 (UTC) Received: from mail-wm1-f52.google.com (mail-wm1-f52.google.com [209.85.128.52]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.5115.1769846232125142428 for ; Fri, 30 Jan 2026 23:57:12 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=3WebLKHV; spf=pass (domain: smile.fr, ip: 209.85.128.52, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f52.google.com with SMTP id 5b1f17b1804b1-48069a48629so29093535e9.0 for ; Fri, 30 Jan 2026 23:57:11 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1769846230; x=1770451030; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=6IJ69mVhfVWjztas+9P69KN4H/Aar0+yT/0I1IVFB2A=; b=3WebLKHV22f8Po284fQ7pEWYtXnLOawROY/kMV/7b09aZXXKuUtPi/TZMA5FKaI4+I Ewe6wZaevBxLnFQydtYbJv8V2AMTBmqTWzGwBuiiogeHSxxOQrkWQJbeVQFRxVwY2QQi Ncpcqi8POiQ8xwsvQ1m0zpUwv09ZY+o2leoPk= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1769846230; x=1770451030; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=6IJ69mVhfVWjztas+9P69KN4H/Aar0+yT/0I1IVFB2A=; b=I+38ecybb22JN3mC7ZmfeuxJ0TMeamlAeiB8abH0W7IxpaktAWa/aIkz6R79HASzou m3QoLzNDvs4SGEebgMdn5LLJH6TNo7V1Caw0uesKrSnFkzOZ1DvPVkCo3QJVPTkqoB52 56wN+0mrxl8dz+YjhrB9VEAzhDkiEBdbPWobAvU7ElnDojYTLAIULmaEpo+rwFa0hj3v UgUmPxT/VUxSBB/90KVj+vyELpXMgxWdB6Q5V0zy7lHQ7ed9pUwthgOPGCVad16Uehyj AKp4lfXANeYoAgJZenDnczZVzmilQTgTfcB+e2OhPulIgEWK6ZgZYyKuUNWd2l24O3Jy eWrw== X-Gm-Message-State: AOJu0YwfWvB5pk+zpIjCziLUTGZgIQyCgdP6GLAZW4etLCxLZX0kMOo6 ahimL4I9XgchRGfwHgBS3Ijnt3KyfSTM665Wog5p0YMLyBvnLbPTtyMKIMtzADc46VSMV4XMCym HN1JZMgs= X-Gm-Gg: AZuq6aIafzVqGSnoK7dtccDPR9u8m0kmrdxyVWj3/Y9Bpp3In6I85Ew4GgiVynT67n/ M2TJn1mR0EPQXWuHqSWB6Sd9DBcwsGMbH6fUPPt5p+tj47buFlIbfhlptLvara1q/tEvJaD9SRs miF7PnWeoVdZ+mdw6J5USuPJEUUA60KuM/RzX4rdlGeDW8vnBjmC2yeFDQc4JO6lYeaIaIvrHTH rQO2toruTVFLvoRdDl1N1bd8dfTHUblO4yt7Wz37UyMMoTqTe9s1uL9DOAIUvqR/wyqJxJHxg1n JfeObw5vSlauu90u8RMjtVPvyjmPuT9auiF033q7nXO3ijFBdIwX50OFtTwEql6PjHv0t0YFi8k 6snqzSzD+7tJHWdOYIhG9CemdvNvyWi06AM2J3Xbqv5K3cj50JsjNyhTYZE0ocrOgkWEWOHm4l6 zt6/Jf6e3qBlEbcQeo+7fMoLbrZO3iYLLs2cX8gOpzapzEffd7eA/zIoNdqISuH+nRUntgrI2yR dMFzhZrpadTQoVF X-Received: by 2002:a05:600c:4e12:b0:477:c478:46d7 with SMTP id 5b1f17b1804b1-482db481c85mr72573765e9.22.1769846230272; Fri, 30 Jan 2026 23:57:10 -0800 (PST) Received: from FRSMI25-LASER.home (2a01cb001331aa00fa8b238ae1dd6dd8.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:fa8b:238a:e1dd:6dd8]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4806ce564f9sm258621475e9.14.2026.01.30.23.57.09 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 30 Jan 2026 23:57:09 -0800 (PST) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 22/22] openssl: upgrade 3.5.4 -> 3.5.5 Date: Sat, 31 Jan 2026 08:56:33 +0100 Message-ID: <030e8e0e4af2349abeea7c1de02e9062fd8aebbe.1769845858.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 31 Jan 2026 07:57:16 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/230226 From: Peter Marko Resolved patch conflicts. Release information [1]: OpenSSL 3.5.5 is a security patch release. The most severe CVE fixed in this release is High. This release incorporates the following bug fixes and mitigations: * Fixed Improper validation of PBMAC1 parameters in PKCS#12 MAC verification. (CVE-2025-11187) * Fixed Stack buffer overflow in CMS AuthEnvelopedData parsing. (CVE-2025-15467) * Fixed NULL dereference in SSL_CIPHER_find() function on unknown cipher ID. (CVE-2025-15468) * Fixed openssl dgst one-shot codepath silently truncates inputs >16 MiB. (CVE-2025-15469) * Fixed TLS 1.3 CompressedCertificate excessive memory allocation. (CVE-2025-66199) * Fixed Heap out-of-bounds write in BIO_f_linebuffer on short writes. (CVE-2025-68160) * Fixed Unauthenticated/unencrypted trailing bytes with low-level OCB function calls. (CVE-2025-69418) * Fixed Out of bounds write in PKCS12_get_friendlyname() UTF-8 conversion. (CVE-2025-69419) * Fixed Missing ASN1_TYPE validation in TS_RESP_verify_response() function. (CVE-2025-69420) * Fixed NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex() function. (CVE-2025-69421) * Fixed Missing ASN1_TYPE validation in PKCS#12 parsing. (CVE-2026-22795) * Fixed ASN1_TYPE Type Confusion in the PKCS7_digest_from_attributes() function. (CVE-2026-22796) [1] https://github.com/openssl/openssl/blob/openssl-3.5/NEWS.md#major-changes-between-openssl-354-and-openssl-355-27-jan-2026 Signed-off-by: Peter Marko Signed-off-by: Yoann Congal --- ...ke-history-reporting-when-test-fails.patch | 23 +++++++++---------- .../0001-extend-check_cwm-test-timeout.patch | 2 +- .../{openssl_3.5.4.bb => openssl_3.5.5.bb} | 2 +- 3 files changed, 13 insertions(+), 14 deletions(-) rename meta/recipes-connectivity/openssl/{openssl_3.5.4.bb => openssl_3.5.5.bb} (99%) diff --git a/meta/recipes-connectivity/openssl/openssl/0001-Added-handshake-history-reporting-when-test-fails.patch b/meta/recipes-connectivity/openssl/openssl/0001-Added-handshake-history-reporting-when-test-fails.patch index 5b7365a3531..a74c79303f6 100644 --- a/meta/recipes-connectivity/openssl/openssl/0001-Added-handshake-history-reporting-when-test-fails.patch +++ b/meta/recipes-connectivity/openssl/openssl/0001-Added-handshake-history-reporting-when-test-fails.patch @@ -7,10 +7,10 @@ Upstream-Status: Submitted [https://github.com/openssl/openssl/pull/22481] Signed-off-by: William Lyu --- - test/helpers/handshake.c | 137 +++++++++++++++++++++++++++++---------- + test/helpers/handshake.c | 136 ++++++++++++++++++++++++++++++--------- test/helpers/handshake.h | 70 +++++++++++++++++++- test/ssl_test.c | 44 +++++++++++++ - 3 files changed, 217 insertions(+), 34 deletions(-) + 3 files changed, 217 insertions(+), 33 deletions(-) diff --git a/test/helpers/handshake.c b/test/helpers/handshake.c index f611b3a..5703b48 100644 @@ -119,7 +119,7 @@ index f611b3a..5703b48 100644 HANDSHAKE_RESULT *HANDSHAKE_RESULT_new(void) { HANDSHAKE_RESULT *ret; -@@ -726,15 +822,6 @@ static void configure_handshake_ssl(SSL *server, SSL *client, +@@ -724,15 +820,6 @@ static void configure_handshake_ssl(SSL *server, SSL *client, SSL_set_post_handshake_auth(client, 1); } @@ -135,7 +135,7 @@ index f611b3a..5703b48 100644 /* An SSL object and associated read-write buffers. */ typedef struct peer_st { SSL *ssl; -@@ -1081,17 +1168,6 @@ static void do_shutdown_step(PEER *peer) +@@ -1077,16 +1164,6 @@ static void do_shutdown_step(PEER *peer) } } @@ -148,12 +148,11 @@ index f611b3a..5703b48 100644 - SHUTDOWN, - CONNECTION_DONE -} connect_phase_t; -- - static int renegotiate_op(const SSL_TEST_CTX *test_ctx) { switch (test_ctx->handshake_mode) { -@@ -1169,19 +1245,6 @@ static void do_connect_step(const SSL_TEST_CTX *test_ctx, PEER *peer, +@@ -1164,19 +1241,6 @@ static void do_connect_step(const SSL_TEST_CTX *test_ctx, PEER *peer, } } @@ -173,7 +172,7 @@ index f611b3a..5703b48 100644 /* * Determine the handshake outcome. * last_status: the status of the peer to have acted last. -@@ -1546,6 +1609,10 @@ static HANDSHAKE_RESULT *do_handshake_internal( +@@ -1541,6 +1605,10 @@ static HANDSHAKE_RESULT *do_handshake_internal( start = time(NULL); @@ -184,8 +183,8 @@ index f611b3a..5703b48 100644 /* * Half-duplex handshake loop. * Client and server speak to each other synchronously in the same process. -@@ -1567,6 +1634,10 @@ static HANDSHAKE_RESULT *do_handshake_internal( - 0 /* server went last */); +@@ -1562,6 +1630,10 @@ static HANDSHAKE_RESULT *do_handshake_internal( + 0 /* server went last */); } + save_loop_history(&(ret->history), @@ -292,14 +291,14 @@ index 78b03f9..b9967c2 100644 HANDSHAKE_RESULT *HANDSHAKE_RESULT_new(void); @@ -95,4 +159,8 @@ int configure_handshake_ctx_for_srp(SSL_CTX *server_ctx, SSL_CTX *server2_ctx, - CTX_DATA *server2_ctx_data, - CTX_DATA *client_ctx_data); + CTX_DATA *server2_ctx_data, + CTX_DATA *client_ctx_data); +const char *handshake_connect_phase_name(connect_phase_t phase); +const char *handshake_status_name(handshake_status_t handshake_status); +const char *handshake_peer_status_name(peer_status_t peer_status); + - #endif /* OSSL_TEST_HANDSHAKE_HELPER_H */ + #endif /* OSSL_TEST_HANDSHAKE_HELPER_H */ diff --git a/test/ssl_test.c b/test/ssl_test.c index ea60851..9d6b093 100644 --- a/test/ssl_test.c diff --git a/meta/recipes-connectivity/openssl/openssl/0001-extend-check_cwm-test-timeout.patch b/meta/recipes-connectivity/openssl/openssl/0001-extend-check_cwm-test-timeout.patch index d02d42f1b51..f6eb28069ac 100644 --- a/meta/recipes-connectivity/openssl/openssl/0001-extend-check_cwm-test-timeout.patch +++ b/meta/recipes-connectivity/openssl/openssl/0001-extend-check_cwm-test-timeout.patch @@ -20,7 +20,7 @@ index 4a1e886a71..39f8c61ef9 100644 +++ b/test/radix/main.c @@ -25,6 +25,11 @@ static int test_script(int idx) int testresult; - TERP_CONFIG cfg = {0}; + TERP_CONFIG cfg = { 0 }; + // check_cwm test sometimes times out, the default 3000ms is + // not enough if the test execution starves for CPU diff --git a/meta/recipes-connectivity/openssl/openssl_3.5.4.bb b/meta/recipes-connectivity/openssl/openssl_3.5.5.bb similarity index 99% rename from meta/recipes-connectivity/openssl/openssl_3.5.4.bb rename to meta/recipes-connectivity/openssl/openssl_3.5.5.bb index e760baf3a02..c0d02b617ba 100644 --- a/meta/recipes-connectivity/openssl/openssl_3.5.4.bb +++ b/meta/recipes-connectivity/openssl/openssl_3.5.5.bb @@ -19,7 +19,7 @@ SRC_URI:append:class-nativesdk = " \ file://environment.d-openssl.sh \ " -SRC_URI[sha256sum] = "967311f84955316969bdb1d8d4b983718ef42338639c621ec4c34fddef355e99" +SRC_URI[sha256sum] = "b28c91532a8b65a1f983b4c28b7488174e4a01008e29ce8e69bd789f28bc2a89" inherit lib_package multilib_header multilib_script ptest perlnative manpages MULTILIB_SCRIPTS = "${PN}-bin:${bindir}/c_rehash"