From patchwork Thu Apr 16 22:29:44 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86311 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id EE69CF8DFD4 for ; Thu, 16 Apr 2026 22:33:04 +0000 (UTC) Received: from mail-wm1-f66.google.com (mail-wm1-f66.google.com [209.85.128.66]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.28248.1776378780198097863 for ; Thu, 16 Apr 2026 15:33:00 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=1nN2TRgL; spf=pass (domain: smile.fr, ip: 209.85.128.66, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f66.google.com with SMTP id 5b1f17b1804b1-483487335c2so381595e9.2 for ; Thu, 16 Apr 2026 15:32:59 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378778; x=1776983578; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=jRCl0tVwqYErBK7HJ84GPbGXwrPXvclOxp+FY6afpe0=; b=1nN2TRgLRQQVipJodHt1schsF7hp11JE4rMX0REpB99XQvFj6uiJ5doyxDRiKNnlvB 61CFJ8zfLG0Ws+WoIPmVDCY1/5zoIQL+iBevo2uze6H5Lb5Uc3Nmgoyap9zIwUHgDzii JmmZysLuEVkBHZK3d1eGq33MjbUM13fulIXjQ= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378778; x=1776983578; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=jRCl0tVwqYErBK7HJ84GPbGXwrPXvclOxp+FY6afpe0=; b=TcRRZMTGO3k4/KyFyfT6zTBQQ42ROXyKLTuhfKAwdH2pZnZA+R2WjWyZQfBCoRZz7Y caZJ+JcGAqrP04hmG9CRBKVf/Mv3InFw6B85oMl7/uVpNsZuWLktF2MZkvUkgDISy6vW 0/pwp9kPCHg7WHAPJG39XRdKvJv+ROx6dJT1uZJuRNqzuNHIiZUQivXbTeEqSz7ingKK /F1b1OXCQKemIzI/q2eGiBn7n2hJCNxujI7gpNj3CUtmwfu8MpLq0EdnobM6UfD1tUP8 xMGH5z+9a5osI+PFguiLtlObTchkE8cExsKDJNyNRbf0MtV4utXfvJbHaktLkDp//pj/ HtLg== X-Gm-Message-State: AOJu0YyfI4tizXgGKJBxh8w9yyOQIfEgvgrRtQU7uahFNLUGlFRp4GvS Xs0WiKUUJajBz08HXeHQwGAlYsKF959qyHU+L05iEl7jkO7+GKhhe18AiJ5Fbw3U3CvFcVTyKBz FMgiKIbtRg2Eu X-Gm-Gg: AeBDiet4Za866NRq0tn7rzjT2XLnv2a6Iza60mTQQRS5GYnyYcwpQ/0vQsdUKeEHeYq gV2y9W3+KGbfjjavj0xE9QnWAbZQ51k+VZlRM8fGUrpD1ozSyPFrkKaH0lbvxCwVuZFOIH7VMyO J7ll3TE/359rk6bhsbmQPNDX/R62wePFvV944mga0B+ZlGztXpWoW7/HoFgtS+O+SQwWbAjqk+V 6enuNm1036izuR7CoyjlOloYBOA7YoEOLXa3d+dQKu3rHem9hnx0uqUrLUb1gAAGMI7e07LkidL OsDTM20x1Ma6pr4mt1gJ106jAAys+IKiyzmeaasQehHyEGbRvPm9EAl71daSgddnZ80m9LztG8O 02I/brgP/FoB2L5XMBWHZq7KulkhEormO/F67NHvTPwEJtmLmvXASF+4JJsZ7p5PJs+s4+YGbHD B+JrcPm10FQpw7FySovVGwETpNGTzJuRFeT2r6CXkBnM+6lj3uTN782urJ1Li8yhSFUo7YxoQ/n gtqq/QBWjTVraOkWH8KkKl1l0sToJpyRJNu2Q== X-Received: by 2002:a05:600c:8b38:b0:485:39b2:a47c with SMTP id 5b1f17b1804b1-488fb796fa0mr4702695e9.25.1776378778202; Thu, 16 Apr 2026 15:32:58 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.32.57 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:32:57 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 01/51] binutils: mark CVE-2025-69650 and CVE-2025-69651 as disputed Date: Fri, 17 Apr 2026 00:29:44 +0200 Message-ID: <8c5819cb2464d5dcc5c0812ae1d8c2f1e0db6866.1776377993.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:04 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235430 From: Adarsh Jagadish Kamini Both CVEs are disputed by third parties. The observed behavior (double free / invalid pointer free in readelf) only occurred in pre-release code and did not affect any tagged version [1][2]. CVE_STATUS[CVE-2025-69650] = "disputed: observed behavior only in pre-release code, does not affect any tagged version" CVE_STATUS[CVE-2025-69651] = "disputed: observed behavior only in pre-release code, does not affect any tagged version" [1] https://www.cve.org/CVERecord?id=CVE-2025-69650 [2] https://www.cve.org/CVERecord?id=CVE-2025-69651 Signed-off-by: Adarsh Jagadish Kamini (cherry picked from commit 9c6df56fe18237880c391798c2083dca595566f4) Signed-off-by: Yoann Congal --- meta/recipes-devtools/binutils/binutils-2.45.inc | 2 ++ 1 file changed, 2 insertions(+) diff --git a/meta/recipes-devtools/binutils/binutils-2.45.inc b/meta/recipes-devtools/binutils/binutils-2.45.inc index 16a63cabc5b..5cd4d185ac1 100644 --- a/meta/recipes-devtools/binutils/binutils-2.45.inc +++ b/meta/recipes-devtools/binutils/binutils-2.45.inc @@ -20,6 +20,8 @@ UPSTREAM_CHECK_GITTAGREGEX = "binutils-(?P\d+_(\d_?)*)" CVE_STATUS[CVE-2025-7545] = "cpe-stable-backport: fix available in used git hash" CVE_STATUS[CVE-2025-7546] = "cpe-stable-backport: fix available in used git hash" +CVE_STATUS[CVE-2025-69650] = "disputed: observed behavior only in pre-release code, does not affect any tagged version" +CVE_STATUS[CVE-2025-69651] = "disputed: observed behavior only in pre-release code, does not affect any tagged version" SRCREV ?= "2f028c6bb163a045db95439fb92e1dcbc919413c" BINUTILS_GIT_URI ?= "git://sourceware.org/git/binutils-gdb.git;branch=${SRCBRANCH};protocol=https" From patchwork Thu Apr 16 22:29:45 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86315 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 08BFFF8DFD9 for ; Thu, 16 Apr 2026 22:33:05 +0000 (UTC) Received: from mail-wm1-f65.google.com (mail-wm1-f65.google.com [209.85.128.65]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.28249.1776378781341104032 for ; Thu, 16 Apr 2026 15:33:01 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=CEm9acwH; spf=pass (domain: smile.fr, ip: 209.85.128.65, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f65.google.com with SMTP id 5b1f17b1804b1-488a8ca4aadso523035e9.3 for ; Thu, 16 Apr 2026 15:33:01 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378779; x=1776983579; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=dt1M0hjFPQy+nrXXcZjpbAN1WP3yljs53m7NcGDM1Ek=; b=CEm9acwHXhrw3+cIyGCsi5RrkjRa8ibDmXAW7aMime1fqc7Esfzo0gMbc/JOr0MDTw rezZs3EwCpzUtSy7Qpr64mN01S3MIrojYrJcbew9ffrjaZ91ZU8mBieliFDZEcSroYcT wcdc9VdRxoY85vBWAD7ARyNVWGzUk8bpFANIw= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378779; x=1776983579; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=dt1M0hjFPQy+nrXXcZjpbAN1WP3yljs53m7NcGDM1Ek=; b=Z6DDrDMZC5b+WRL3trVYS2owse6dk9XxYLCTgY0bS7PO3HVA4ybT9+4ljY/asjQ96K 71Jqb54pLCrLMlkoZCHIzaaDUKv/tir6G27nJrtqTACCKs0pHxjLKSwf2IumLGEDMKW7 GKNDfIfPaGitnBuUYfsqv7Mlu+kFNfzbh7g1sCzEPrOb6A+7MFcwOOMhHst6JM5/v9Fm 9waADXxzg7B2ObkkAx6HRbqpqg74OswAeHXQBI5VRNWvSbygfupd3ka+Qtm0zRKxq0A/ eN7tTbhkWbBCLJgSPSQHFp0BEe0Qh6PCXlmnlzB9T6fJScpA/+OXcGxbf29QrvHwI9dy F7JQ== X-Gm-Message-State: AOJu0Yxxnwp2/J58QvOs9jr0Kt+UzhBi5mYJwTRvLGZAPScqrrjHnImN o695gPpu2vkbjTt+Cif/g/t6wmDuooQw/XpdiR9ul3xzDxQyFPfzfbWEj8cNpfWEzBXE5Gu6bHn jD5VQR1KdEIxd X-Gm-Gg: AeBDiesANSJRCjDbKe3vb9vVZpaUVhGMQzwDah3TRThY+b3L0RiLNk/YflblHPSR/HA HS1OkDMEHLncaQ4iPHXkIxP9KUlp2qSpxZH7CJptybzrzLFuAMBcTdf/f3t/lVwB0xIJB4znVdz 9cRPMnpq6E9tX6vVOfwcs3acqorMVpyp1DuPhSNZTkB3UsF0aMGOZobmSXuHFfNwIfDabjUYBn9 d6wFvYQsn79jukClCIHFx2pQtdJdSl51wMeAgl5vmtCDK3k5s8WavMao07lJAn/wCQNZ0G8nK07 COZy6AjGwei897n+JDoV+3n7zFalMS2yuADakaEO54dm8EotBABsWgwg+NHv8i5lkkHf+WQPHBW YkjG/dIDAkofJN6g64AharaXR0dxuT4wZbFakOmqrgraUTvlsz3wObUdvZEYErXKDe43ScKza2r KGp77PplvbgiQ+PdeqiM48VKq0ZTBZ14FVoBSXAhTwJMS/Owazy4VFmEWPhuAzh+u7pdOUtddxt yuSztBiedK7fDf+PXM1XTYqaUEnXgHQGPz+5w== X-Received: by 2002:a05:600c:5252:b0:486:f9d0:aac8 with SMTP id 5b1f17b1804b1-488fb768483mr6002495e9.18.1776378779260; Thu, 16 Apr 2026 15:32:59 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.32.58 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:32:58 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 02/51] binutils: Fix CVE-2025-69648 Date: Fri, 17 Apr 2026 00:29:45 +0200 Message-ID: <4fe1e54ace667e91929ec66bc3e6d7d03db981da.1776377993.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:05 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235431 From: Deepak Rathore Pick the patch [1] as mentioned in [2]. [1] https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=598704a00cbac5e85c2bedd363357b5bf6fcee33 [2] https://nvd.nist.gov/vuln/detail/CVE-2025-69648 Signed-off-by: Deepak Rathore Signed-off-by: Yoann Congal --- .../binutils/binutils-2.45.inc | 1 + .../binutils/binutils/CVE-2025-69648.patch | 189 ++++++++++++++++++ 2 files changed, 190 insertions(+) create mode 100644 meta/recipes-devtools/binutils/binutils/CVE-2025-69648.patch diff --git a/meta/recipes-devtools/binutils/binutils-2.45.inc b/meta/recipes-devtools/binutils/binutils-2.45.inc index 5cd4d185ac1..83907f24afa 100644 --- a/meta/recipes-devtools/binutils/binutils-2.45.inc +++ b/meta/recipes-devtools/binutils/binutils-2.45.inc @@ -48,4 +48,5 @@ SRC_URI = "\ file://0018-CVE-2025-11494.patch \ file://0019-CVE-2025-11839.patch \ file://0020-CVE-2025-11840.patch \ + file://CVE-2025-69648.patch \ " diff --git a/meta/recipes-devtools/binutils/binutils/CVE-2025-69648.patch b/meta/recipes-devtools/binutils/binutils/CVE-2025-69648.patch new file mode 100644 index 00000000000..ce0e764762f --- /dev/null +++ b/meta/recipes-devtools/binutils/binutils/CVE-2025-69648.patch @@ -0,0 +1,189 @@ +From 7df481dd76c05c89782721e9df5468be829c356b Mon Sep 17 00:00:00 2001 +From: Alan Modra +Date: Sat, 22 Nov 2025 09:22:10 +1030 +Subject: [PATCH] PR 33638, debug_rnglists output + +The fuzzed testcase in this PR continuously outputs an error about +the debug_rnglists header. Fixed by taking notice of the error and +stopping output. The patch also limits the length in all cases, not +just when a relocation is present, and limits the offset entry count +read from the header. I removed the warning and the test for relocs +because the code can't work reliably with unresolved relocs in the +length field. + + PR 33638 + * dwarf.c (display_debug_rnglists_list): Return bool. Rename + "inital_length" to plain "length". Verify length is large + enough to read header. Limit length to rest of section. + Similarly limit offset_entry_count. + (display_debug_ranges): Check display_debug_rnglists_unit_header + return status. Stop output on error. + +CVE: CVE-2025-69648 +Upstream-Status: Backport [https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=598704a00cbac5e85c2bedd363357b5bf6fcee33] + +(cherry picked from commit 598704a00cbac5e85c2bedd363357b5bf6fcee33) +Signed-off-by: Deepak Rathore +--- + binutils/dwarf.c | 67 ++++++++++++++++++++++++------------------------ + 1 file changed, 34 insertions(+), 33 deletions(-) + +diff --git a/binutils/dwarf.c b/binutils/dwarf.c +index f4bcb677761..b4fb56351ec 100644 +--- a/binutils/dwarf.c ++++ b/binutils/dwarf.c +@@ -8282,7 +8282,7 @@ display_debug_rnglists_list (unsigned char * start, + return start; + } + +-static int ++static bool + display_debug_rnglists_unit_header (struct dwarf_section * section, + uint64_t * unit_offset, + unsigned char * poffset_size) +@@ -8290,7 +8290,8 @@ display_debug_rnglists_unit_header (struct dwarf_section * section, + uint64_t start_offset = *unit_offset; + unsigned char * p = section->start + start_offset; + unsigned char * finish = section->start + section->size; +- uint64_t initial_length; ++ unsigned char * hdr; ++ uint64_t length; + unsigned char segment_selector_size; + unsigned int offset_entry_count; + unsigned int i; +@@ -8299,66 +8300,59 @@ display_debug_rnglists_unit_header (struct dwarf_section * section, + unsigned char offset_size; + + /* Get and check the length of the block. */ +- SAFE_BYTE_GET_AND_INC (initial_length, p, 4, finish); ++ SAFE_BYTE_GET_AND_INC (length, p, 4, finish); + +- if (initial_length == 0xffffffff) ++ if (length == 0xffffffff) + { + /* This section is 64-bit DWARF 3. */ +- SAFE_BYTE_GET_AND_INC (initial_length, p, 8, finish); ++ SAFE_BYTE_GET_AND_INC (length, p, 8, finish); + *poffset_size = offset_size = 8; + } + else + *poffset_size = offset_size = 4; + +- if (initial_length > (size_t) (finish - p)) +- { +- /* If the length field has a relocation against it, then we should +- not complain if it is inaccurate (and probably negative). +- It is copied from .debug_line handling code. */ +- if (reloc_at (section, (p - section->start) - offset_size)) +- initial_length = finish - p; +- else +- { +- warn (_("The length field (%#" PRIx64 +- ") in the debug_rnglists header is wrong" +- " - the section is too small\n"), +- initial_length); +- return 0; +- } +- } +- +- /* Report the next unit offset to the caller. */ +- *unit_offset = (p - section->start) + initial_length; ++ if (length < 8) ++ return false; + + /* Get the other fields in the header. */ ++ hdr = p; + SAFE_BYTE_GET_AND_INC (version, p, 2, finish); + SAFE_BYTE_GET_AND_INC (address_size, p, 1, finish); + SAFE_BYTE_GET_AND_INC (segment_selector_size, p, 1, finish); + SAFE_BYTE_GET_AND_INC (offset_entry_count, p, 4, finish); + + printf (_(" Table at Offset: %#" PRIx64 ":\n"), start_offset); +- printf (_(" Length: %#" PRIx64 "\n"), initial_length); ++ printf (_(" Length: %#" PRIx64 "\n"), length); + printf (_(" DWARF version: %u\n"), version); + printf (_(" Address size: %u\n"), address_size); + printf (_(" Segment size: %u\n"), segment_selector_size); + printf (_(" Offset entries: %u\n"), offset_entry_count); + ++ if (length > (size_t) (finish - hdr)) ++ length = finish - hdr; ++ ++ /* Report the next unit offset to the caller. */ ++ *unit_offset = (hdr - section->start) + length; ++ + /* Check the fields. */ + if (segment_selector_size != 0) + { + warn (_("The %s section contains " + "unsupported segment selector size: %d.\n"), + section->name, segment_selector_size); +- return 0; ++ return false; + } + + if (version < 5) + { + warn (_("Only DWARF version 5+ debug_rnglists info " + "is currently supported.\n")); +- return 0; ++ return false; + } + ++ uint64_t max_off_count = (length - 8) / offset_size; ++ if (offset_entry_count > max_off_count) ++ offset_entry_count = max_off_count; + if (offset_entry_count != 0) + { + printf (_("\n Offsets starting at %#tx:\n"), p - section->start); +@@ -8372,7 +8366,7 @@ display_debug_rnglists_unit_header (struct dwarf_section * section, + } + } + +- return 1; ++ return true; + } + + static bool +@@ -8404,6 +8398,7 @@ display_debug_ranges (struct dwarf_section *section, + uint64_t last_offset = 0; + uint64_t next_rnglists_cu_offset = 0; + unsigned char offset_size; ++ bool ok_header = true; + + if (bytes == 0) + { +@@ -8493,8 +8488,12 @@ display_debug_ranges (struct dwarf_section *section, + /* If we've moved on to the next compile unit in the rnglists section - dump the unit header(s). */ + if (is_rnglists && next_rnglists_cu_offset < offset) + { +- while (next_rnglists_cu_offset < offset) +- display_debug_rnglists_unit_header (section, &next_rnglists_cu_offset, &offset_size); ++ while (ok_header && next_rnglists_cu_offset < offset) ++ ok_header = display_debug_rnglists_unit_header (section, ++ &next_rnglists_cu_offset, ++ &offset_size); ++ if (!ok_header) ++ break; + printf (_(" Offset Begin End\n")); + } + +@@ -8548,10 +8547,12 @@ display_debug_ranges (struct dwarf_section *section, + } + + /* Display trailing empty (or unreferenced) compile units, if any. */ +- if (is_rnglists) ++ if (is_rnglists && ok_header) + while (next_rnglists_cu_offset < section->size) +- display_debug_rnglists_unit_header (section, &next_rnglists_cu_offset, &offset_size); +- ++ if (!display_debug_rnglists_unit_header (section, ++ &next_rnglists_cu_offset, ++ &offset_size)) ++ break; + putchar ('\n'); + + free (range_entries); +-- +2.35.6 + From patchwork Thu Apr 16 22:29:46 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86313 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1B332F8DFDB for ; Thu, 16 Apr 2026 22:33:05 +0000 (UTC) Received: from mail-wm1-f66.google.com (mail-wm1-f66.google.com [209.85.128.66]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.28251.1776378781887264229 for ; Thu, 16 Apr 2026 15:33:02 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=uerXjt1f; spf=pass (domain: smile.fr, ip: 209.85.128.66, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f66.google.com with SMTP id 5b1f17b1804b1-488af96f6b2so721995e9.0 for ; Thu, 16 Apr 2026 15:33:01 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378780; x=1776983580; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=d6XAEGQClgddjeaNto+n8UoU6NIcYBseFMsbVOFt2VU=; b=uerXjt1ftIsEU4hdnN+JDoQV9y7cjVOSeEwKjRZB8PIPKwBRvTwHAfu75cK707XtcZ LyIzrB7Dw+VqEyrus/hbVGsoBhu1A/pQdqFfID3HHLXMQ7LC96wJtg6W67FAgHwb5PzM mYPDLH0aTdxO0QUSDSjEfOzUE5a1raRsya6vc= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378780; x=1776983580; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=d6XAEGQClgddjeaNto+n8UoU6NIcYBseFMsbVOFt2VU=; b=hZu3s2+S7uteRoCHzYhUbPyWv5gDZAkR9UOTgKFRKbCceLU8eocYbWP7hIWeB+LqL/ LAuFyJIqBsAdcNn0GT4DhXlNBfYO/fPcBZnXxTLFmRGd96U9FbErWAst7zKGsoQgiZBN TjjSrMi5NBdZzPEs6MS39WHv6Q8dp8PyCt+UVKatxbP98usBETjyKck7mbCykRNsa61B XsN4NOM0h23m4VVqi6j93C3G+FL1l0qSv/KWwg0tGV+SqkTHvMt2gKwlnGxqasTQf9ao R3aikeLyYB/fulRX4kohcob9bF2yRdV31VSQiVn+0UhDgHRvGBg1W0Cfww16LJd9C+dY 7tGQ== X-Gm-Message-State: AOJu0YyIPBhUzqQ65KPSEwW+TT0rSSYCoB904fDDDV+yuRHOYVnKsICp 7fvuDhz038YV7AmBXOERFqhML1xpF7mpE+1Hr/mXj9xt8M6/a2cYqmIdoKokMwjmQVUnE/MZ5eh jmOmF6DQZVUxs X-Gm-Gg: AeBDiet4sTxD4It5PPyvnQ8hSniCGQCqnGxZ4qLSLBrD3YEQvklOfX97UYfYm/sy8HF 8ypi5i+eoK1xLpGf+eIPQRSmrbOdMaWy97GbgxQD51v4GoL6umsV8XdknCz1N09l45uGABjWX05 92u2ygBUdo7TPgA71Kgvh6IxywjgNi46J3FkBVsi9LsT8PWcwyZOBNu35G7pdu1X+bFztNBmzrM L87dzcXMbDrEn/dI9kSSdp42W9XZu2MYfsfu7KlH5GLcqAp2tij5ncrbYrIWRT/+pPB17eRqix9 NDQRE0IcPFeY0v5WjDd69uyDtoM5SjoVKLc6nEEeEh+oP6GPcbIpqYjv8N/qD+icVmlhEKHNFJ2 7Qg3k8vmBjq4IZ1nCarhe5MgdrTw7cNe18Vc0+xpOlYxkik5ux4D0ovObufizPANxt2K5mWzRKs oFPwsNJb+rnMPbBd9P7L4jYJ1y3wh2SBVyc2I9ByaKRfdqsPkOfY3Ds/eUx4ICXxRhoE1sPqkqD eqvJbIhe9HdvJm7F6CKACijLaRYL+SzbDYKbw== X-Received: by 2002:a05:600c:4fd2:b0:488:e192:6fbd with SMTP id 5b1f17b1804b1-488fb790869mr5170455e9.30.1776378780002; Thu, 16 Apr 2026 15:33:00 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.32.59 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:32:59 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 03/51] binutils: Fix CVE-2025-69644 CVE-2025-69647 Date: Fri, 17 Apr 2026 00:29:46 +0200 Message-ID: <27bf3c1db29d874bb01cd84c6827010664b8a61e.1776377993.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:05 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235432 From: Deepak Rathore Pick the patch [1] as mentioned in [2] and [3]. [1] https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=455446bbdc8675f34808187de2bbad4682016ff7 [2] https://nvd.nist.gov/vuln/detail/CVE-2025-69644 [3] https://nvd.nist.gov/vuln/detail/CVE-2025-69647 Signed-off-by: Deepak Rathore Signed-off-by: Yoann Congal --- .../binutils/binutils-2.45.inc | 1 + .../CVE-2025-69644_CVE-2025-69647.patch | 85 +++++++++++++++++++ 2 files changed, 86 insertions(+) create mode 100644 meta/recipes-devtools/binutils/binutils/CVE-2025-69644_CVE-2025-69647.patch diff --git a/meta/recipes-devtools/binutils/binutils-2.45.inc b/meta/recipes-devtools/binutils/binutils-2.45.inc index 83907f24afa..a2bb278b438 100644 --- a/meta/recipes-devtools/binutils/binutils-2.45.inc +++ b/meta/recipes-devtools/binutils/binutils-2.45.inc @@ -49,4 +49,5 @@ SRC_URI = "\ file://0019-CVE-2025-11839.patch \ file://0020-CVE-2025-11840.patch \ file://CVE-2025-69648.patch \ + file://CVE-2025-69644_CVE-2025-69647.patch \ " diff --git a/meta/recipes-devtools/binutils/binutils/CVE-2025-69644_CVE-2025-69647.patch b/meta/recipes-devtools/binutils/binutils/CVE-2025-69644_CVE-2025-69647.patch new file mode 100644 index 00000000000..78c3899af91 --- /dev/null +++ b/meta/recipes-devtools/binutils/binutils/CVE-2025-69644_CVE-2025-69647.patch @@ -0,0 +1,85 @@ +From 46efc6c469c85aefd6321150e702081823ca815c Mon Sep 17 00:00:00 2001 +From: Alan Modra +Date: Sat, 22 Nov 2025 09:52:18 +1030 +Subject: [PATCH] PR 33639 .debug_loclists output + +The fuzzed testcase in this PR prints an almost endless table of +offsets, due to a bogus offset count. Limit that count, and the total +length too. + + PR 33639 + * dwarf.c (display_loclists_unit_header): Return error on + length too small to read header. Limit length to section + size. Limit offset count similarly. + +CVE: CVE-2025-69644 CVE-2025-69647 +Upstream-Status: Backport [https://sourceware.org/git/?p=binutils-gdb.git;a=commitdiff;h=455446bbdc8675f34808187de2bbad4682016ff7] + +(cherry picked from commit 455446bbdc8675f34808187de2bbad4682016ff7) +Signed-off-by: Deepak Rathore +--- + binutils/dwarf.c | 20 ++++++++++++++------ + 1 file changed, 14 insertions(+), 6 deletions(-) + +diff --git a/binutils/dwarf.c b/binutils/dwarf.c +index b4fb56351ec..2462e6540a7 100644 +--- a/binutils/dwarf.c ++++ b/binutils/dwarf.c +@@ -7257,8 +7257,6 @@ display_loclists_unit_header (struct dwarf_section * section, + bool is_64bit; + uint32_t i; + +- printf (_("Table at Offset %#" PRIx64 "\n"), header_offset); +- + SAFE_BYTE_GET_AND_INC (length, start, 4, end); + if (length == 0xffffffff) + { +@@ -7267,6 +7265,11 @@ display_loclists_unit_header (struct dwarf_section * section, + } + else + is_64bit = false; ++ if (length < 8) ++ return (uint64_t) -1; ++ ++ printf (_("Table at Offset %#" PRIx64 "\n"), header_offset); ++ header_offset = start - section->start; + + SAFE_BYTE_GET_AND_INC (version, start, 2, end); + SAFE_BYTE_GET_AND_INC (address_size, start, 1, end); +@@ -7279,15 +7282,21 @@ display_loclists_unit_header (struct dwarf_section * section, + printf (_(" Segment size: %u\n"), segment_selector_size); + printf (_(" Offset entries: %u\n"), *offset_count); + ++ if (length > section->size - header_offset) ++ length = section->size - header_offset; ++ + if (segment_selector_size != 0) + { + warn (_("The %s section contains an " + "unsupported segment selector size: %d.\n"), + section->name, segment_selector_size); +- return (uint64_t)-1; ++ return (uint64_t) -1; + } + +- if ( *offset_count) ++ uint64_t max_off_count = length >> (is_64bit ? 3 : 2); ++ if (*offset_count > max_off_count) ++ *offset_count = max_off_count; ++ if (*offset_count) + { + printf (_("\n Offset Entries starting at %#tx:\n"), + start - section->start); +@@ -7304,8 +7313,7 @@ display_loclists_unit_header (struct dwarf_section * section, + putchar ('\n'); + *loclists_start = start; + +- /* The length field doesn't include the length field itself. */ +- return header_offset + length + (is_64bit ? 12 : 4); ++ return header_offset + length; + } + + static int +-- +2.35.6 + From patchwork Thu Apr 16 22:29:47 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86314 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 5044BF8DFDD for ; Thu, 16 Apr 2026 22:33:05 +0000 (UTC) Received: from mail-wm1-f66.google.com (mail-wm1-f66.google.com [209.85.128.66]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.28555.1776378782366933222 for ; Thu, 16 Apr 2026 15:33:02 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=HdZN5I8Q; spf=pass (domain: smile.fr, ip: 209.85.128.66, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f66.google.com with SMTP id 5b1f17b1804b1-488b3f8fa2bso10619015e9.1 for ; Thu, 16 Apr 2026 15:33:02 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378780; x=1776983580; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=LAr4fTMWwU+MyfZAnRmFaZ/19JNM+e3XSkkF7nKjfgE=; b=HdZN5I8QSmlQOWSYalvQLjiXwjmbwXP/sfv4cKrdGzQXgpKGG4e4KWIKsfn7h6XTcv e4GlGC+Atqfs1LzhQqWYG7BNUzZCvYmG0s44CAh0WHo58iS/AnoodXdtNU5a+wXv2EVh gPVdW2LVFm6IuwkjbDZ6qoATEXNKjkcyK0gQ0= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378780; x=1776983580; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=LAr4fTMWwU+MyfZAnRmFaZ/19JNM+e3XSkkF7nKjfgE=; b=Zabd397cHWoOx/zbApUDCyJ7bJBxYAsX936vZg/Ha1C0k0vebIm0Mt2SIjvzSzTXLE dZS05tVE0GnP/EzxjQX7naGphpoQAJEjvavK8o5xSjVH8Ssq9jU3GAZ/wFOSU+HlADBy flYUHH0IL8xppwb8qBGDDXnyaOpDoGyf7fKKlvjfek58zFLYW1M4AUKuez8kS3LfgNGw XwLcn+ybfFGdWUntTRhFFh/P9WjR2d1rDWJJuJtToHrl6EWRmhIFhqu5kwkq9cTRsyFj z5K4/n2hu1rSAGzAG2LSFQLWRMGCXfJSZ4eOUdZlPez1G1PvxtUElzMzr+fxcPI6ARAb YZvw== X-Gm-Message-State: AOJu0Yzi5kgqVDCLQnuLtdwdO6i4DfHajXviWT675rT5gIYaQvjbX7wX WZ0goqaPPcTVYRBcxALCz1IiV5kjn6czRncoHVCD5l6EBxcKVTwCEb1RoPnSsR/GCrQhIazRQaV /9R0I30C9hjbX X-Gm-Gg: AeBDieuusSGgqrv1pN2Qf1z0XgSqaYmaDsIxr1pzZ3DlD042hLwSZG8poAtWSOdpZh/ lDt73zSwybDubX5PCWtB0+nZdSGVhgSM9Mw8tMv3kaA07KMx81m77e5sCkHAv9ds0kIfNgUTc0/ VzRqWOpLHQwM8X9nlBSxfEvLZt8fBUd3L8n+Uz1CxFHnlmzQzwAuK4HV5XAIo/9BBUBHYCq53Wv AKQNRWEYre77mbTbRT+0oSHnye+GfehAOzaFCzDj77vojdF4oMib0vv7DaK4yAlAxFAOPVyvRya k6AAhvDEJSwRVFFNTE8woE28hoH0QWM/32PGFpbKZY7YPQ6WrcJQs/yChFAGEIttdTX41q01Jpc kTTuS9V5L4roJ8Vn3DLzb7znFZKJvKXicu1urZGBxYl485jM73AiFYmsG5Tt5Wgq6wMq3B9qFq7 O9QgQqqukWOfT8TWQkQVgHqddaVzC4sf3nZ/sJJYRpSSpSZlJP5Y7zKfa6kcG/Ax73XR6A3P5/w GAmushdu3iNQIUK8V76NDU9VVOmnaBDY7TZ7A== X-Received: by 2002:a05:600c:4749:b0:488:c6e9:1e0c with SMTP id 5b1f17b1804b1-488fb889385mr2973305e9.5.1776378780504; Thu, 16 Apr 2026 15:33:00 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.00 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:00 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 04/51] binutils: Fix CVE-2025-69649 Date: Fri, 17 Apr 2026 00:29:47 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:05 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235433 From: Deepak Rathore Pick the patch [1] as mentioned in [2] [1] https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=66a3492ce68e1ae45b2489bd9a815c39ea5d7f66 [2] https://nvd.nist.gov/vuln/detail/CVE-2025-69649 Signed-off-by: Deepak Rathore Signed-off-by: Yoann Congal --- .../binutils/binutils-2.45.inc | 1 + .../binutils/binutils/CVE-2025-69649.patch | 41 +++++++++++++++++++ 2 files changed, 42 insertions(+) create mode 100644 meta/recipes-devtools/binutils/binutils/CVE-2025-69649.patch diff --git a/meta/recipes-devtools/binutils/binutils-2.45.inc b/meta/recipes-devtools/binutils/binutils-2.45.inc index a2bb278b438..94b7ca54cb8 100644 --- a/meta/recipes-devtools/binutils/binutils-2.45.inc +++ b/meta/recipes-devtools/binutils/binutils-2.45.inc @@ -50,4 +50,5 @@ SRC_URI = "\ file://0020-CVE-2025-11840.patch \ file://CVE-2025-69648.patch \ file://CVE-2025-69644_CVE-2025-69647.patch \ + file://CVE-2025-69649.patch \ " diff --git a/meta/recipes-devtools/binutils/binutils/CVE-2025-69649.patch b/meta/recipes-devtools/binutils/binutils/CVE-2025-69649.patch new file mode 100644 index 00000000000..05b382ea526 --- /dev/null +++ b/meta/recipes-devtools/binutils/binutils/CVE-2025-69649.patch @@ -0,0 +1,41 @@ +From cc53801dff2ba4bc62eaa666b3b7d9401232089c Mon Sep 17 00:00:00 2001 +From: Alan Modra +Date: Mon, 8 Dec 2025 15:58:33 +1030 +Subject: [PATCH] PR 33697, fuzzer segfault + + PR 33697 + * readelf.c (process_relocs): Don't segfault on no sections. + +CVE: CVE-2025-69649 +Upstream-Status: Backport [https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=66a3492ce68e1ae45b2489bd9a815c39ea5d7f66] + +(cherry picked from commit 66a3492ce68e1ae45b2489bd9a815c39ea5d7f66) +Signed-off-by: Deepak Rathore +--- + binutils/readelf.c | 8 +++----- + 1 file changed, 3 insertions(+), 5 deletions(-) + +diff --git a/binutils/readelf.c b/binutils/readelf.c +index 8f188e8c3e2..8d28b1c30e4 100644 +--- a/binutils/readelf.c ++++ b/binutils/readelf.c +@@ -9621,13 +9621,11 @@ process_relocs (Filedata * filedata) + size_t i; + bool found = false; + +- for (i = 0, section = filedata->section_headers; +- i < filedata->file_header.e_shnum; +- i++, section++) +- { ++ section = filedata->section_headers; ++ if (section != NULL) ++ for (i = 0; i < filedata->file_header.e_shnum; i++, section++) + if (display_relocations (section, filedata)) + found = true; +- } + + if (! found) + { +-- +2.35.6 + From patchwork Thu Apr 16 22:29:48 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86316 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 79449F8DFDF for ; Thu, 16 Apr 2026 22:33:05 +0000 (UTC) Received: from mail-wm1-f68.google.com (mail-wm1-f68.google.com [209.85.128.68]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.28253.1776378783889721232 for ; Thu, 16 Apr 2026 15:33:04 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=zeo9iqf1; spf=pass (domain: smile.fr, ip: 209.85.128.68, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f68.google.com with SMTP id 5b1f17b1804b1-488afb0427eso612885e9.1 for ; Thu, 16 Apr 2026 15:33:03 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378782; x=1776983582; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=zDE2oMd6A8MPLHjKWApZ7+QCv1hTduoyi20a5EWGbnY=; b=zeo9iqf1r4Gw/YUyFrxBuC53iKVIb15YCWxEKAoJ1e67DVTUVvemoAqmYbvfpkygo+ rlVbI0PpB6VVYFXQ8IBD96hVkDSs9gkqLcmi4zlcmOzROuT9Nzo/LoyNkqDN+MdH/KBG /3zR4awb5S4UkyPcC5SmWOqku9Sv7bXX/tdlQ= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378782; x=1776983582; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=zDE2oMd6A8MPLHjKWApZ7+QCv1hTduoyi20a5EWGbnY=; b=N8BjQBlHrDkv4FEjQr5Bl8c5Zo/CXovP9JId9ieY4vmUysaJBKx5rqM8P004snNwtI lFrMrWqi5mkaiiabFRmYp2zt3IVz7bpom/zn+SHvZjU1gvV3uGzWPxHCg4SF5jOCUKMf 5Nm2KxJM9S2ur/QTBp0Dqfm3RJiBulBZzC8jrCWNNRtStsGmq6ryUMIbViK8ZwDa10jv f5ExlLfCAxScL38x1mXOjCGzyIpZ8e9kXqEl/SmsGr7QAjZNhDANjLfVKIV13VwrRO7D X/3qWMiyFVgmv2hLM62nLp5ObngfFYwnqYVFcbivuWw2vnxqLSVGylbEkO3I1NVbLFqd qxyw== X-Gm-Message-State: AOJu0YxCcV0a+2EJBcvvPUJxgWxALZCBuE2aKP8XvcOKpGKXSoowl0F1 jG9zEJ/RtWc+DY3PNU6Qa8QMI3y4pMHKPrAKe3qnbduxQ2kvT0eY0uAvf7H4ZV2xbQ+Vqr7wBpJ LZH2lDSHMEDY9 X-Gm-Gg: AeBDies1PJvogx3Zh2I6QTAGGMrE+lHkcCn7XmillVMv1ElJkY8lf/THnINc9Ejkr6M CpmD/U909u3K2Jj0wmt35yD4e/Z5GVscTJ//i2mbsBsCUi4yb5Q8NeLkTwv8SXy79apspod5NPX 7aZEkyya8iaQis/ybTGn98DzGPU4VV6kbr56d6Py5FH3bUxueSVSOZ58j4fI++REUYDeiDvQGUt Pj+KDGTZNssiWnaKphH/bNlu65w2GJekNaQlaM34rVQW14lNeHuhBID2faj1+vY9XwWDRnuinDV CNDpG9njwhKB9uB4lBcTyVMycc4B5R1/9Efs6E8/bxYAAQ1OhuXl5TWHClOzoRBi46zNk0DS429 IJwNZWnMapJfuhsyjTKnq0dbzvgUgVWy/mxCiLi1Cv/pra6gKjjcN3KujW3JAYcNwn5D/Zoa1j+ J6CKshHDJK1IiZ2BtlxLP1/NjqziXo6pe/pRHX2aYT9OCis0HuQrok9kri1Pi+RYd5jxHPtZJWg 3ywrq3aRg8tXgh6+ekslXoIp8wyVJ/+R6xCTg== X-Received: by 2002:a05:600c:674f:b0:488:be21:54ae with SMTP id 5b1f17b1804b1-488fb6e9cecmr6067775e9.0.1776378781807; Thu, 16 Apr 2026 15:33:01 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.00 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:00 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 05/51] binutils: Fix CVE-2025-69652 Date: Fri, 17 Apr 2026 00:29:48 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:05 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235434 From: Deepak Rathore Pick the patch [1] as mentioned in [2]. [1] https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=44b79abd0fa12e7947252eb4c6e5d16ed6033e01 [2] https://nvd.nist.gov/vuln/detail/CVE-2025-69652 Signed-off-by: Deepak Rathore Signed-off-by: Yoann Congal --- .../binutils/binutils-2.45.inc | 1 + .../binutils/binutils/CVE-2025-69652.patch | 40 +++++++++++++++++++ 2 files changed, 41 insertions(+) create mode 100644 meta/recipes-devtools/binutils/binutils/CVE-2025-69652.patch diff --git a/meta/recipes-devtools/binutils/binutils-2.45.inc b/meta/recipes-devtools/binutils/binutils-2.45.inc index 94b7ca54cb8..f635d76069a 100644 --- a/meta/recipes-devtools/binutils/binutils-2.45.inc +++ b/meta/recipes-devtools/binutils/binutils-2.45.inc @@ -51,4 +51,5 @@ SRC_URI = "\ file://CVE-2025-69648.patch \ file://CVE-2025-69644_CVE-2025-69647.patch \ file://CVE-2025-69649.patch \ + file://CVE-2025-69652.patch \ " diff --git a/meta/recipes-devtools/binutils/binutils/CVE-2025-69652.patch b/meta/recipes-devtools/binutils/binutils/CVE-2025-69652.patch new file mode 100644 index 00000000000..5de94820d1d --- /dev/null +++ b/meta/recipes-devtools/binutils/binutils/CVE-2025-69652.patch @@ -0,0 +1,40 @@ +From 5a2f57ab03067f6622c19983e1e31207bd2293a6 Mon Sep 17 00:00:00 2001 +From: Alan Modra +Date: Mon, 8 Dec 2025 16:04:44 +1030 +Subject: [PATCH] PR 33701, abort in byte_get_little_endian + + PR 33701 + * dwarf.c (process_debug_info): Set debug_info_p NULL when + DEBUG_INFO_UNAVAILABLE. + +CVE: CVE-2025-69652 +Upstream-Status: Backport [https://sourceware.org/git/?p=binutils-gdb.git;a=commitdiff;h=44b79abd0fa12e7947252eb4c6e5d16ed6033e01] + +(cherry picked from commit 44b79abd0fa12e7947252eb4c6e5d16ed6033e01) +Signed-off-by: Deepak Rathore +--- + binutils/dwarf.c | 8 +++++--- + 1 file changed, 5 insertions(+), 3 deletions(-) + +diff --git a/binutils/dwarf.c b/binutils/dwarf.c +index 2462e6540a7..0d88ea94619 100644 +--- a/binutils/dwarf.c ++++ b/binutils/dwarf.c +@@ -4248,9 +4248,11 @@ process_debug_info (struct dwarf_section * section, + break; + } + +- debug_info *debug_info_p = ((debug_information +- && unit < alloc_num_debug_info_entries) +- ? debug_information + unit : NULL); ++ debug_info *debug_info_p = NULL; ++ if (debug_information ++ && num_debug_info_entries != DEBUG_INFO_UNAVAILABLE ++ && unit < alloc_num_debug_info_entries) ++ debug_info_p = debug_information + unit; + + assert (!debug_info_p + || (debug_info_p->num_loc_offsets +-- +2.35.6 + From patchwork Thu Apr 16 22:29:49 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86318 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 5DD6CF8DFDD for ; Thu, 16 Apr 2026 22:33:15 +0000 (UTC) Received: from mail-wm1-f65.google.com (mail-wm1-f65.google.com [209.85.128.65]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.28558.1776378785061791993 for ; Thu, 16 Apr 2026 15:33:05 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=Kw9n8HY0; spf=pass (domain: smile.fr, ip: 209.85.128.65, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f65.google.com with SMTP id 5b1f17b1804b1-4888375f735so426965e9.3 for ; Thu, 16 Apr 2026 15:33:04 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378783; x=1776983583; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=3gxipPuQZqqP6lRhkjh3oxNL0Xk+PKMIt/WBu9r9Cc4=; b=Kw9n8HY0HUjzv+kP2aQ2+1oU4NR2j9BuygrpsdCSJxpnY+XCDrpY065V5/6dB2+gdE azKrNKYFbtmm5tV3rvOqW9FCg6dIdUhkRFMWJCmYVwxRVn+KqTUQxrKjj/uLYBi5ZaeD UlCPypc9zlGCNFNCd87uqOAmTFd4EEB/Uj8pM= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378783; x=1776983583; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=3gxipPuQZqqP6lRhkjh3oxNL0Xk+PKMIt/WBu9r9Cc4=; b=ZwA/GOJiWTrXMbzgWCDtYxOl7leqwVAqnZhGjL9ULJyijsPgaXAWjNfBX92WypIeSP YzhIt5mxEvTQfI6YCaQn7gJuGpGhWZnfCsqrzNaygUCKmXm49ikFaaP1tZp+QopQgJqv Pvgk83YreoJpG+nas+TTfZk27v/GX6pG53WR2qhEhI2SdgasoLZDSTjxuHBQoeKu1Tq3 RAxHTPZDlYZ5+1Px9tNV3oAZAVPo+PoMKwvSF8bi3ovclzf09x+O9ZG3vmxxKkz9T1GM cRHp6rd5DDPdo0VqnSpRFVwx9hD2mgzQBIh6VAV/XXag17MgR7rk9at86WXnSRMFontu Kr/g== X-Gm-Message-State: AOJu0Yyprl0Iyd/8F8L5ZWKNHIfQB8TtzoWAR4T9+/IpsR7cOGddOCxT hl6xHbGR98vhiEUy10iG9Y4YONFN03AsJGIlpxf4M4Y8E6915Bc3HtChM8h9UGDTObYGp88wVpD +egNwgt6iR4hd X-Gm-Gg: AeBDieuspOpvX3Ro/kgz1SGsF1/+e/jmNoJxA40QGRbUVCtKNED9m7HgUjiNBgw15Ut 1BZz0/kYOTzrPRQZQigZC64dx9KPNqkxQ/j//FayHof0edcaFwSIZHub3p8O+9HPKmYHa/TK+sb erqNKr9BLA7NuhHxInEyGk5TMaA9794e6ZbNO5kd5Wn2o2RcY1GRwKZWNRg5p7EOCO/aAFQ+p7Y sO7ev6S7H4vCcIHwYQtyQthN3heE6Oe5xGkaEGoPOJZ+162FS5BsU+C4AgpP4cQ26mdrPNLhXCW 1/fb6q1OOjWEXBqO6ofJTAWFNUoXdn108/ym3m64px/m025cTOBcVCrWzn4vLmHzK3xOq7aauut RcqJKGn7PmVCNNKQtMAd0mdupwVViy/w12EtXY9WF8r303ANW36AQ3MpioSKpsqdDKdqpgM/Agl oH2wuMaT/jnpH54hCTjn44ojoXvJmLi4wzRUYIASkT5hdWsz/8d8ulfIkezggLmVKDcy423Fj0+ Yf6e7nwwx6sGlRMPdWDOvMKCdg1piO+KE00FA== X-Received: by 2002:a05:600c:8706:b0:488:d6eb:e635 with SMTP id 5b1f17b1804b1-488fb753abdmr5452245e9.12.1776378782600; Thu, 16 Apr 2026 15:33:02 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.01 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:02 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 06/51] nfs-utils: Fix CVE-2025-12801 Date: Fri, 17 Apr 2026 00:29:49 +0200 Message-ID: <6d14141cb096391f1c0730cc509704784d194f2f.1776377993.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:15 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235435 From: Deepak Rathore - This patch applies the upstream fix [1] as referenced in [5]. - To successfully apply the fixed commit, apply the dependent commits [2] to [4] which are included in v2.8.6, as referenced in [5]. - Reference: [1] https://git.linux-nfs.org/?p=steved/nfs-utils.git;a=commit;h=f36bd900a899 [2] https://git.linux-nfs.org/?p=steved/nfs-utils.git;a=commit;h=7e8b36522f58 [3] https://git.linux-nfs.org/?p=steved/nfs-utils.git;a=commit;h=42f01e6a78fe [4] https://git.linux-nfs.org/?p=steved/nfs-utils.git;a=commit;h=51738ae56d92 [5] https://security-tracker.debian.org/tracker/CVE-2025-12801 Signed-off-by: Deepak Rathore [YC: fixed tab vs space indent in recipe patch] Signed-off-by: Yoann Congal --- .../CVE-2025-12801-dependent_p1.patch | 81 +++ .../CVE-2025-12801-dependent_p2.patch | 181 +++++++ .../CVE-2025-12801-dependent_p3.patch | 465 ++++++++++++++++++ .../nfs-utils/nfs-utils/CVE-2025-12801.patch | 254 ++++++++++ .../nfs-utils/nfs-utils_2.8.4.bb | 4 + 5 files changed, 985 insertions(+) create mode 100644 meta/recipes-connectivity/nfs-utils/nfs-utils/CVE-2025-12801-dependent_p1.patch create mode 100644 meta/recipes-connectivity/nfs-utils/nfs-utils/CVE-2025-12801-dependent_p2.patch create mode 100644 meta/recipes-connectivity/nfs-utils/nfs-utils/CVE-2025-12801-dependent_p3.patch create mode 100644 meta/recipes-connectivity/nfs-utils/nfs-utils/CVE-2025-12801.patch diff --git a/meta/recipes-connectivity/nfs-utils/nfs-utils/CVE-2025-12801-dependent_p1.patch b/meta/recipes-connectivity/nfs-utils/nfs-utils/CVE-2025-12801-dependent_p1.patch new file mode 100644 index 00000000000..8f2174c5b81 --- /dev/null +++ b/meta/recipes-connectivity/nfs-utils/nfs-utils/CVE-2025-12801-dependent_p1.patch @@ -0,0 +1,81 @@ +From 0ea29d6077dacbf6a754b0e648275eec2a576e87 Mon Sep 17 00:00:00 2001 +From: Trond Myklebust +Date: Mon, 10 Nov 2025 11:26:03 -0500 +Subject: [PATCH 1/4] mountd: Minor refactor of get_rootfh() + +Perform the mountpoint checks before checking the user path. + +CVE: CVE-2025-12801 +Upstream-Status: Backport [https://git.linux-nfs.org/?p=steved/nfs-utils.git;a=commit;h=7e8b36522f58657359c6842119fc516c6dd1baa4] + +Reviewed-by: Jeff Layton +Signed-off-by: Trond Myklebust +Signed-off-by: Steve Dickson +(cherry picked from commit 7e8b36522f58657359c6842119fc516c6dd1baa4) +Signed-off-by: Deepak Rathore +--- + utils/mountd/mountd.c | 34 +++++++++++++++++----------------- + 1 file changed, 17 insertions(+), 17 deletions(-) + +diff --git a/utils/mountd/mountd.c b/utils/mountd/mountd.c +index dbd5546d..39afd4aa 100644 +--- a/utils/mountd/mountd.c ++++ b/utils/mountd/mountd.c +@@ -412,6 +412,23 @@ get_rootfh(struct svc_req *rqstp, dirpath *path, nfs_export **expret, + *error = MNT3ERR_ACCES; + return NULL; + } ++ if (nfsd_path_stat(exp->m_export.e_path, &estb) < 0) { ++ xlog(L_WARNING, "can't stat export point %s: %s", ++ p, strerror(errno)); ++ *error = MNT3ERR_NOENT; ++ return NULL; ++ } ++ if (exp->m_export.e_mountpoint && ++ !check_is_mountpoint(exp->m_export.e_mountpoint[0]? ++ exp->m_export.e_mountpoint: ++ exp->m_export.e_path, ++ nfsd_path_lstat)) { ++ xlog(L_WARNING, "request to export an unmounted filesystem: %s", ++ p); ++ *error = MNT3ERR_NOENT; ++ return NULL; ++ } ++ + if (nfsd_path_stat(p, &stb) < 0) { + xlog(L_WARNING, "can't stat exported dir %s: %s", + p, strerror(errno)); +@@ -426,12 +443,6 @@ get_rootfh(struct svc_req *rqstp, dirpath *path, nfs_export **expret, + *error = MNT3ERR_NOTDIR; + return NULL; + } +- if (nfsd_path_stat(exp->m_export.e_path, &estb) < 0) { +- xlog(L_WARNING, "can't stat export point %s: %s", +- p, strerror(errno)); +- *error = MNT3ERR_NOENT; +- return NULL; +- } + if (estb.st_dev != stb.st_dev + && !(exp->m_export.e_flags & NFSEXP_CROSSMOUNT)) { + xlog(L_WARNING, "request to export directory %s below nearest filesystem %s", +@@ -439,17 +450,6 @@ get_rootfh(struct svc_req *rqstp, dirpath *path, nfs_export **expret, + *error = MNT3ERR_ACCES; + return NULL; + } +- if (exp->m_export.e_mountpoint && +- !check_is_mountpoint(exp->m_export.e_mountpoint[0]? +- exp->m_export.e_mountpoint: +- exp->m_export.e_path, +- nfsd_path_lstat)) { +- xlog(L_WARNING, "request to export an unmounted filesystem: %s", +- p); +- *error = MNT3ERR_NOENT; +- return NULL; +- } +- + /* This will be a static private nfs_export with just one + * address. We feed it to kernel then extract the filehandle, + */ +-- +2.35.6 + diff --git a/meta/recipes-connectivity/nfs-utils/nfs-utils/CVE-2025-12801-dependent_p2.patch b/meta/recipes-connectivity/nfs-utils/nfs-utils/CVE-2025-12801-dependent_p2.patch new file mode 100644 index 00000000000..e078ddd0e86 --- /dev/null +++ b/meta/recipes-connectivity/nfs-utils/nfs-utils/CVE-2025-12801-dependent_p2.patch @@ -0,0 +1,181 @@ +From 8a19b1f0dd1f09d440a6a94748fe403f7ef8da81 Mon Sep 17 00:00:00 2001 +From: Trond Myklebust +Date: Mon, 10 Nov 2025 11:28:39 -0500 +Subject: [PATCH 2/4] mountd: Separate lookup of the exported directory and the + mount path + +When the caller asks to mount a path that does not terminate with an +exported directory, we want to split up the lookups so that we can +look up the exported directory using the mountd privileged credential, +and the remaining subdirectory lookups using the RPC caller's +credential. + +CVE: CVE-2025-12801 +Upstream-Status: Backport [https://git.linux-nfs.org/?p=steved/nfs-utils.git;a=commit;h=42f01e6a78fed98f12437ac8b28cfb12b6bad056] + +Reviewed-by: Jeff Layton +Signed-off-by: Trond Myklebust +Signed-off-by: Steve Dickson +(cherry picked from commit 42f01e6a78fed98f12437ac8b28cfb12b6bad056) +Signed-off-by: Deepak Rathore +--- + support/include/nfsd_path.h | 1 + + support/misc/nfsd_path.c | 31 ++++++++++++++++++ + utils/mountd/mountd.c | 63 +++++++++++++++++++++++++++++++------ + 3 files changed, 86 insertions(+), 9 deletions(-) + +diff --git a/support/include/nfsd_path.h b/support/include/nfsd_path.h +index f600fb5a..3e5a2f5d 100644 +--- a/support/include/nfsd_path.h ++++ b/support/include/nfsd_path.h +@@ -18,6 +18,7 @@ char * nfsd_path_prepend_dir(const char *dir, const char *pathname); + + int nfsd_path_stat(const char *pathname, struct stat *statbuf); + int nfsd_path_lstat(const char *pathname, struct stat *statbuf); ++int nfsd_openat(int dirfd, const char *path, int flags); + + int nfsd_path_statfs(const char *pathname, + struct statfs *statbuf); +diff --git a/support/misc/nfsd_path.c b/support/misc/nfsd_path.c +index caec33ca..dfe88e4f 100644 +--- a/support/misc/nfsd_path.c ++++ b/support/misc/nfsd_path.c +@@ -203,6 +203,37 @@ nfsd_realpath(const char *path, char *resolved_buf) + return realpath_buf.res_ptr; + } + ++struct nfsd_openat_t { ++ const char *path; ++ int dirfd; ++ int flags; ++ int res_fd; ++ int res_error; ++}; ++ ++static void nfsd_openatfunc(void *data) ++{ ++ struct nfsd_openat_t *d = data; ++ ++ d->res_fd = openat(d->dirfd, d->path, d->flags); ++ if (d->res_fd == -1) ++ d->res_error = errno; ++} ++ ++int nfsd_openat(int dirfd, const char *path, int flags) ++{ ++ struct nfsd_openat_t open_buf = { ++ .path = path, ++ .dirfd = dirfd, ++ .flags = flags, ++ }; ++ ++ nfsd_run_task(nfsd_openatfunc, &open_buf); ++ if (open_buf.res_fd == -1) ++ errno = open_buf.res_error; ++ return open_buf.res_fd; ++} ++ + struct nfsd_rw_data { + int fd; + void* buf; +diff --git a/utils/mountd/mountd.c b/utils/mountd/mountd.c +index 39afd4aa..f43ebef5 100644 +--- a/utils/mountd/mountd.c ++++ b/utils/mountd/mountd.c +@@ -392,7 +392,10 @@ get_rootfh(struct svc_req *rqstp, dirpath *path, nfs_export **expret, + struct nfs_fh_len *fh; + char rpath[MAXPATHLEN+1]; + char *p = *path; ++ char *subpath; + char buf[INET6_ADDRSTRLEN]; ++ size_t epathlen; ++ int dirfd; + + if (*p == '\0') + p = "/"; +@@ -412,12 +415,21 @@ get_rootfh(struct svc_req *rqstp, dirpath *path, nfs_export **expret, + *error = MNT3ERR_ACCES; + return NULL; + } +- if (nfsd_path_stat(exp->m_export.e_path, &estb) < 0) { +- xlog(L_WARNING, "can't stat export point %s: %s", ++ ++ dirfd = nfsd_openat(AT_FDCWD, exp->m_export.e_path, O_PATH); ++ if (dirfd == -1) { ++ xlog(L_WARNING, "can't open export point %s: %s", + p, strerror(errno)); + *error = MNT3ERR_NOENT; + return NULL; + } ++ if (fstat(dirfd, &estb) == -1) { ++ xlog(L_WARNING, "can't stat export point %s: %s", ++ p, strerror(errno)); ++ *error = MNT3ERR_ACCES; ++ close(dirfd); ++ return NULL; ++ } + if (exp->m_export.e_mountpoint && + !check_is_mountpoint(exp->m_export.e_mountpoint[0]? + exp->m_export.e_mountpoint: +@@ -426,18 +438,51 @@ get_rootfh(struct svc_req *rqstp, dirpath *path, nfs_export **expret, + xlog(L_WARNING, "request to export an unmounted filesystem: %s", + p); + *error = MNT3ERR_NOENT; ++ close(dirfd); + return NULL; + } + +- if (nfsd_path_stat(p, &stb) < 0) { +- xlog(L_WARNING, "can't stat exported dir %s: %s", +- p, strerror(errno)); +- if (errno == ENOENT) +- *error = MNT3ERR_NOENT; +- else +- *error = MNT3ERR_ACCES; ++ epathlen = strlen(exp->m_export.e_path); ++ if (epathlen > strlen(p)) { ++ xlog(L_WARNING, "raced with change of exported path: %s", p); ++ *error = MNT3ERR_NOENT; ++ close(dirfd); + return NULL; + } ++ subpath = &p[epathlen]; ++ while (*subpath == '/') ++ subpath++; ++ if (*subpath != '\0') { ++ int fd; ++ ++ /* Just perform a lookup of the path */ ++ fd = nfsd_openat(dirfd, subpath, O_PATH); ++ close(dirfd); ++ if (fd == -1) { ++ xlog(L_WARNING, "can't open exported dir %s: %s", p, ++ strerror(errno)); ++ if (errno == ENOENT) ++ *error = MNT3ERR_NOENT; ++ else ++ *error = MNT3ERR_ACCES; ++ return NULL; ++ } ++ if (fstat(fd, &stb) == -1) { ++ xlog(L_WARNING, "can't open exported dir %s: %s", p, ++ strerror(errno)); ++ if (errno == ENOENT) ++ *error = MNT3ERR_NOENT; ++ else ++ *error = MNT3ERR_ACCES; ++ close(fd); ++ return NULL; ++ } ++ close(fd); ++ } else { ++ close(dirfd); ++ stb = estb; ++ } ++ + if (!S_ISDIR(stb.st_mode) && !S_ISREG(stb.st_mode)) { + xlog(L_WARNING, "%s is not a directory or regular file", p); + *error = MNT3ERR_NOTDIR; +-- +2.35.6 + diff --git a/meta/recipes-connectivity/nfs-utils/nfs-utils/CVE-2025-12801-dependent_p3.patch b/meta/recipes-connectivity/nfs-utils/nfs-utils/CVE-2025-12801-dependent_p3.patch new file mode 100644 index 00000000000..7c9a1e6d2bc --- /dev/null +++ b/meta/recipes-connectivity/nfs-utils/nfs-utils/CVE-2025-12801-dependent_p3.patch @@ -0,0 +1,465 @@ +From 0114ef262d61988b8209b7baab7426eac9a49548 Mon Sep 17 00:00:00 2001 +From: Trond Myklebust +Date: Mon, 10 Nov 2025 12:18:38 -0500 +Subject: [PATCH 3/4] support: Add a mini-library to extract and apply RPC + credentials + +Add server functionality to extract the credentials from the client RPC +call, and apply them. This is needed in order to perform access checking +on the requested path in the mountd daemon. + +CVE: CVE-2025-12801 +Upstream-Status: Backport [https://git.linux-nfs.org/?p=steved/nfs-utils.git;a=commit;h=51738ae56d922d4961e60dad73ad1c2d97d8d99b] + +Reviewed-by: Jeff Layton +Signed-off-by: Trond Myklebust +Signed-off-by: Steve Dickson +(cherry picked from commit 51738ae56d922d4961e60dad73ad1c2d97d8d99b) +Signed-off-by: Deepak Rathore +--- + aclocal/libtirpc.m4 | 12 +++ + support/include/Makefile.am | 1 + + support/include/nfs_ucred.h | 44 ++++++++++ + support/misc/Makefile.am | 2 +- + support/misc/ucred.c | 162 ++++++++++++++++++++++++++++++++++++ + support/nfs/Makefile.am | 2 +- + support/nfs/ucred.c | 147 ++++++++++++++++++++++++++++++++ + 7 files changed, 368 insertions(+), 2 deletions(-) + create mode 100644 support/include/nfs_ucred.h + create mode 100644 support/misc/ucred.c + create mode 100644 support/nfs/ucred.c + +diff --git a/aclocal/libtirpc.m4 b/aclocal/libtirpc.m4 +index ef48a2ae..06629db9 100644 +--- a/aclocal/libtirpc.m4 ++++ b/aclocal/libtirpc.m4 +@@ -31,6 +31,18 @@ AC_DEFUN([AC_LIBTIRPC], [ + [AC_DEFINE([HAVE_TIRPC_GSS_SECCREATE], [1], + [Define to 1 if your tirpc library provides rpc_gss_seccreate])],, + [${LIBS}])]) ++ ++ AS_IF([test -n "${LIBTIRPC}"], ++ [AC_CHECK_LIB([tirpc], [rpc_gss_getcred], ++ [AC_DEFINE([HAVE_TIRPC_GSS_GETCRED], [1], ++ [Define to 1 if your tirpc library provides rpc_gss_getcred])],, ++ [${LIBS}])]) ++ ++ AS_IF([test -n "${LIBTIRPC}"], ++ [AC_CHECK_LIB([tirpc], [authdes_getucred], ++ [AC_DEFINE([HAVE_TIRPC_AUTHDES_GETUCRED], [1], ++ [Define to 1 if your tirpc library provides authdes_getucred])],, ++ [${LIBS}])]) + AC_SUBST([AM_CPPFLAGS]) + AC_SUBST(LIBTIRPC) + +diff --git a/support/include/Makefile.am b/support/include/Makefile.am +index 1373891a..631a84f8 100644 +--- a/support/include/Makefile.am ++++ b/support/include/Makefile.am +@@ -10,6 +10,7 @@ noinst_HEADERS = \ + misc.h \ + nfs_mntent.h \ + nfs_paths.h \ ++ nfs_ucred.h \ + nfsd_path.h \ + nfslib.h \ + nfsrpc.h \ +diff --git a/support/include/nfs_ucred.h b/support/include/nfs_ucred.h +new file mode 100644 +index 00000000..d58b61e4 +--- /dev/null ++++ b/support/include/nfs_ucred.h +@@ -0,0 +1,44 @@ ++#ifndef _NFS_UCRED_H ++#define _NFS_UCRED_H ++ ++#include ++ ++struct nfs_ucred { ++ uid_t uid; ++ gid_t gid; ++ int ngroups; ++ gid_t *groups; ++}; ++ ++struct svc_req; ++struct exportent; ++ ++int nfs_ucred_get(struct nfs_ucred **credp, struct svc_req *rqst, ++ const struct exportent *ep); ++ ++void nfs_ucred_squash_groups(struct nfs_ucred *cred, ++ const struct exportent *ep); ++int nfs_ucred_reload_groups(struct nfs_ucred *cred, const struct exportent *ep); ++int nfs_ucred_swap_effective(const struct nfs_ucred *cred, ++ struct nfs_ucred **savedp); ++ ++static inline void nfs_ucred_free(struct nfs_ucred *cred) ++{ ++ free(cred->groups); ++ free(cred); ++} ++ ++static inline void nfs_ucred_init_groups(struct nfs_ucred *cred, gid_t *groups, ++ int ngroups) ++{ ++ cred->groups = groups; ++ cred->ngroups = ngroups; ++} ++ ++static inline void nfs_ucred_free_groups(struct nfs_ucred *cred) ++{ ++ free(cred->groups); ++ nfs_ucred_init_groups(cred, NULL, 0); ++} ++ ++#endif /* _NFS_UCRED_H */ +diff --git a/support/misc/Makefile.am b/support/misc/Makefile.am +index f9993e3a..7ea2d798 100644 +--- a/support/misc/Makefile.am ++++ b/support/misc/Makefile.am +@@ -2,6 +2,6 @@ + + noinst_LIBRARIES = libmisc.a + libmisc_a_SOURCES = tcpwrapper.c from_local.c mountpoint.c file.c \ +- nfsd_path.c workqueue.c xstat.c ++ nfsd_path.c ucred.c workqueue.c xstat.c + + MAINTAINERCLEANFILES = Makefile.in +diff --git a/support/misc/ucred.c b/support/misc/ucred.c +new file mode 100644 +index 00000000..92d97912 +--- /dev/null ++++ b/support/misc/ucred.c +@@ -0,0 +1,162 @@ ++#ifdef HAVE_CONFIG_H ++#include ++#endif ++ ++#include ++#include ++#include ++#include ++#include ++#include ++ ++#include "exportfs.h" ++#include "nfs_ucred.h" ++ ++#include "xlog.h" ++ ++void nfs_ucred_squash_groups(struct nfs_ucred *cred, const struct exportent *ep) ++{ ++ int i; ++ ++ if (!(ep->e_flags & NFSEXP_ROOTSQUASH)) ++ return; ++ if (cred->gid == 0) ++ cred->gid = ep->e_anongid; ++ for (i = 0; i < cred->ngroups; i++) { ++ if (cred->groups[i] == 0) ++ cred->groups[i] = ep->e_anongid; ++ } ++} ++ ++static int nfs_ucred_init_effective(struct nfs_ucred *cred) ++{ ++ int ngroups = getgroups(0, NULL); ++ ++ if (ngroups > 0) { ++ size_t sz = ngroups * sizeof(gid_t); ++ gid_t *groups = malloc(sz); ++ if (groups == NULL) ++ return ENOMEM; ++ if (getgroups(ngroups, groups) == -1) { ++ free(groups); ++ return errno; ++ } ++ nfs_ucred_init_groups(cred, groups, ngroups); ++ } else ++ nfs_ucred_init_groups(cred, NULL, 0); ++ cred->uid = geteuid(); ++ cred->gid = getegid(); ++ return 0; ++} ++ ++static size_t nfs_ucred_getpw_r_size_max(void) ++{ ++ long buflen = sysconf(_SC_GETPW_R_SIZE_MAX); ++ ++ if (buflen == -1) ++ return 16384; ++ return buflen; ++} ++ ++int nfs_ucred_reload_groups(struct nfs_ucred *cred, const struct exportent *ep) ++{ ++ struct passwd pwd, *pw; ++ uid_t uid = cred->uid; ++ gid_t gid = cred->gid; ++ size_t buflen; ++ char *buf; ++ int ngroups = 0; ++ int ret; ++ ++ if (ep->e_flags & (NFSEXP_ALLSQUASH | NFSEXP_ROOTSQUASH) && ++ (int)uid == ep->e_anonuid) ++ return 0; ++ buflen = nfs_ucred_getpw_r_size_max(); ++ buf = alloca(buflen); ++ ret = getpwuid_r(uid, &pwd, buf, buflen, &pw); ++ if (ret != 0) ++ return ret; ++ if (!pw) ++ return ENOENT; ++ if (getgrouplist(pw->pw_name, gid, NULL, &ngroups) == -1 && ++ ngroups > 0) { ++ gid_t *groups = malloc(ngroups * sizeof(groups[0])); ++ if (groups == NULL) ++ return ENOMEM; ++ if (getgrouplist(pw->pw_name, gid, groups, &ngroups) == -1) { ++ free(groups); ++ return ENOMEM; ++ } ++ free(cred->groups); ++ nfs_ucred_init_groups(cred, groups, ngroups); ++ nfs_ucred_squash_groups(cred, ep); ++ } else ++ nfs_ucred_free_groups(cred); ++ return 0; ++} ++ ++static int nfs_ucred_set_effective(const struct nfs_ucred *cred, ++ const struct nfs_ucred *saved) ++{ ++ uid_t suid = saved ? saved->uid : geteuid(); ++ gid_t sgid = saved ? saved->gid : getegid(); ++ int ret; ++ ++ /* Start with a privileged effective user */ ++ if (setresuid(-1, 0, -1) < 0) { ++ xlog(L_WARNING, "can't change privileged user %u-%u. %s", ++ geteuid(), getegid(), strerror(errno)); ++ return errno; ++ } ++ ++ if (setgroups(cred->ngroups, cred->groups) == -1) { ++ xlog(L_WARNING, "can't change groups for user %u-%u. %s", ++ geteuid(), getegid(), strerror(errno)); ++ return errno; ++ } ++ if (setresgid(-1, cred->gid, sgid) == -1) { ++ xlog(L_WARNING, "can't change gid for user %u-%u. %s", ++ geteuid(), getegid(), strerror(errno)); ++ ret = errno; ++ goto restore_groups; ++ } ++ if (setresuid(-1, cred->uid, suid) == -1) { ++ xlog(L_WARNING, "can't change uid for user %u-%u. %s", ++ geteuid(), getegid(), strerror(errno)); ++ ret = errno; ++ goto restore_gid; ++ } ++ return 0; ++restore_gid: ++ if (setresgid(-1, sgid, -1) < 0) { ++ xlog(L_WARNING, "can't restore privileged user %u-%u. %s", ++ geteuid(), getegid(), strerror(errno)); ++ } ++restore_groups: ++ if (saved) ++ setgroups(saved->ngroups, saved->groups); ++ else ++ setgroups(0, NULL); ++ return ret; ++} ++ ++int nfs_ucred_swap_effective(const struct nfs_ucred *cred, ++ struct nfs_ucred **savedp) ++{ ++ struct nfs_ucred *saved = malloc(sizeof(*saved)); ++ int ret; ++ ++ if (saved == NULL) ++ return ENOMEM; ++ ret = nfs_ucred_init_effective(saved); ++ if (ret != 0) { ++ free(saved); ++ return ret; ++ } ++ ret = nfs_ucred_set_effective(cred, saved); ++ if (savedp == NULL || ret != 0) ++ nfs_ucred_free(saved); ++ else ++ *savedp = saved; ++ return ret; ++} +diff --git a/support/nfs/Makefile.am b/support/nfs/Makefile.am +index 2e1577cc..f6921265 100644 +--- a/support/nfs/Makefile.am ++++ b/support/nfs/Makefile.am +@@ -7,7 +7,7 @@ libnfs_la_SOURCES = exports.c rmtab.c xio.c rpcmisc.c rpcdispatch.c \ + xcommon.c wildmat.c mydaemon.c \ + rpc_socket.c getport.c \ + svc_socket.c cacheio.c closeall.c nfs_mntent.c \ +- svc_create.c atomicio.c strlcat.c strlcpy.c ++ svc_create.c atomicio.c strlcat.c strlcpy.c ucred.c + libnfs_la_LIBADD = libnfsconf.la + libnfs_la_CPPFLAGS = $(AM_CPPFLAGS) $(CPPFLAGS) -I$(top_srcdir)/support/reexport + +diff --git a/support/nfs/ucred.c b/support/nfs/ucred.c +new file mode 100644 +index 00000000..6ea8efdf +--- /dev/null ++++ b/support/nfs/ucred.c +@@ -0,0 +1,147 @@ ++#ifdef HAVE_CONFIG_H ++#include ++#endif ++ ++#include ++#include ++#include ++#include ++ ++#include "exportfs.h" ++#include "nfs_ucred.h" ++ ++#ifdef HAVE_TIRPC_GSS_GETCRED ++#include ++#endif /* HAVE_TIRPC_GSS_GETCRED */ ++#ifdef HAVE_TIRPC_AUTHDES_GETUCRED ++#include ++#endif /* HAVE_TIRPC_AUTHDES_GETUCRED */ ++ ++static int nfs_ucred_copy_cred(struct nfs_ucred *cred, uid_t uid, gid_t gid, ++ const gid_t *groups, int ngroups) ++{ ++ if (ngroups > 0) { ++ size_t sz = ngroups * sizeof(groups[0]); ++ cred->groups = malloc(sz); ++ if (cred->groups == NULL) ++ return ENOMEM; ++ cred->ngroups = ngroups; ++ memcpy(cred->groups, groups, sz); ++ } else ++ nfs_ucred_init_groups(cred, NULL, 0); ++ cred->uid = uid; ++ cred->gid = gid; ++ return 0; ++} ++ ++static int nfs_ucred_init_cred_squashed(struct nfs_ucred *cred, ++ const struct exportent *ep) ++{ ++ cred->uid = ep->e_anonuid; ++ cred->gid = ep->e_anongid; ++ nfs_ucred_init_groups(cred, NULL, 0); ++ return 0; ++} ++ ++static int nfs_ucred_init_cred(struct nfs_ucred *cred, uid_t uid, gid_t gid, ++ const gid_t *groups, int ngroups, ++ const struct exportent *ep) ++{ ++ if (ep->e_flags & NFSEXP_ALLSQUASH) { ++ nfs_ucred_init_cred_squashed(cred, ep); ++ } else if (ep->e_flags & NFSEXP_ROOTSQUASH && uid == 0) { ++ nfs_ucred_init_cred_squashed(cred, ep); ++ if (gid != 0) ++ cred->gid = gid; ++ } else { ++ int ret = nfs_ucred_copy_cred(cred, uid, gid, groups, ngroups); ++ if (ret != 0) ++ return ret; ++ nfs_ucred_squash_groups(cred, ep); ++ } ++ return 0; ++} ++ ++static int nfs_ucred_init_null(struct nfs_ucred *cred, ++ const struct exportent *ep) ++{ ++ return nfs_ucred_init_cred_squashed(cred, ep); ++} ++ ++static int nfs_ucred_init_unix(struct nfs_ucred *cred, struct svc_req *rqst, ++ const struct exportent *ep) ++{ ++ struct authunix_parms *aup; ++ ++ aup = (struct authunix_parms *)rqst->rq_clntcred; ++ return nfs_ucred_init_cred(cred, aup->aup_uid, aup->aup_gid, ++ aup->aup_gids, aup->aup_len, ep); ++} ++ ++#ifdef HAVE_TIRPC_GSS_GETCRED ++static int nfs_ucred_init_gss(struct nfs_ucred *cred, struct svc_req *rqst, ++ const struct exportent *ep) ++{ ++ rpc_gss_ucred_t *gss_ucred = NULL; ++ ++ if (!rpc_gss_getcred(rqst, NULL, &gss_ucred, NULL) || gss_ucred == NULL) ++ return EINVAL; ++ return nfs_ucred_init_cred(cred, gss_ucred->uid, gss_ucred->gid, ++ gss_ucred->gidlist, gss_ucred->gidlen, ep); ++} ++#endif /* HAVE_TIRPC_GSS_GETCRED */ ++ ++#ifdef HAVE_TIRPC_AUTHDES_GETUCRED ++int authdes_getucred(struct authdes_cred *adc, uid_t *uid, gid_t *gid, ++ int *grouplen, gid_t *groups); ++ ++static int nfs_ucred_init_des(struct nfs_ucred *cred, struct svc_req *rqst, ++ const struct exportent *ep) ++{ ++ struct authdes_cred *des_cred; ++ uid_t uid; ++ gid_t gid; ++ int grouplen; ++ gid_t groups[NGROUPS]; ++ ++ des_cred = (struct authdes_cred *)rqst->rq_clntcred; ++ if (!authdes_getucred(des_cred, &uid, &gid, &grouplen, &groups[0])) ++ return EINVAL; ++ return nfs_ucred_init_cred(cred, uid, gid, groups, grouplen, ep); ++} ++#endif /* HAVE_TIRPC_AUTHDES_GETUCRED */ ++ ++int nfs_ucred_get(struct nfs_ucred **credp, struct svc_req *rqst, ++ const struct exportent *ep) ++{ ++ struct nfs_ucred *cred = malloc(sizeof(*cred)); ++ int ret; ++ ++ *credp = NULL; ++ if (cred == NULL) ++ return ENOMEM; ++ switch (rqst->rq_cred.oa_flavor) { ++ case AUTH_UNIX: ++ ret = nfs_ucred_init_unix(cred, rqst, ep); ++ break; ++#ifdef HAVE_TIRPC_GSS_GETCRED ++ case RPCSEC_GSS: ++ ret = nfs_ucred_init_gss(cred, rqst, ep); ++ break; ++#endif /* HAVE_TIRPC_GSS_GETCRED */ ++#ifdef HAVE_TIRPC_AUTHDES_GETUCRED ++ case AUTH_DES: ++ ret = nfs_ucred_init_des(cred, rqst, ep); ++ break; ++#endif /* HAVE_TIRPC_AUTHDES_GETUCRED */ ++ default: ++ ret = nfs_ucred_init_null(cred, ep); ++ break; ++ } ++ if (ret == 0) { ++ *credp = cred; ++ return 0; ++ } ++ free(cred); ++ return ret; ++} +-- +2.35.6 + diff --git a/meta/recipes-connectivity/nfs-utils/nfs-utils/CVE-2025-12801.patch b/meta/recipes-connectivity/nfs-utils/nfs-utils/CVE-2025-12801.patch new file mode 100644 index 00000000000..23e18ffdab4 --- /dev/null +++ b/meta/recipes-connectivity/nfs-utils/nfs-utils/CVE-2025-12801.patch @@ -0,0 +1,254 @@ +From 6dc289e68d8432eb4fc4f397fed28435bf600bb1 Mon Sep 17 00:00:00 2001 +From: Trond Myklebust +Date: Thu, 5 Mar 2026 10:41:02 -0500 +Subject: [PATCH 4/4] Fix access checks when mounting subdirectories in NFSv3 + +If a NFSv3 client asks to mount a subdirectory of one of the exported +directories, then apply the RPC credential together with any root +or all squash rules that would apply to the client in question. + +CVE: CVE-2025-12801 +Upstream-Status: Backport [https://git.linux-nfs.org/?p=steved/nfs-utils.git;a=commit;h=f36bd900a899088ca1925de079bd58d6205a1f3c] + +Reviewed-by: Jeff Layton +Signed-off-by: Trond Myklebust +Signed-off-by: Scott Mayhew +Signed-off-by: Steve Dickson +(cherry picked from commit f36bd900a899088ca1925de079bd58d6205a1f3c) +Signed-off-by: Deepak Rathore +--- + nfs.conf | 1 + + support/include/nfsd_path.h | 9 ++++++++- + support/misc/nfsd_path.c | 32 ++++++++++++++++++++++++++++++-- + utils/mountd/mountd.c | 28 ++++++++++++++++++++++++++-- + utils/mountd/mountd.man | 26 ++++++++++++++++++++++++++ + 5 files changed, 91 insertions(+), 5 deletions(-) + +diff --git a/nfs.conf b/nfs.conf +index 3cca68c3..ddf0c143 100644 +--- a/nfs.conf ++++ b/nfs.conf +@@ -46,6 +46,7 @@ + # ttl=1800 + [mountd] + # debug="all|auth|call|general|parse" ++# apply-root-cred=n + # manage-gids=n + # descriptors=0 + # port=0 +diff --git a/support/include/nfsd_path.h b/support/include/nfsd_path.h +index 3e5a2f5d..06c0f2f4 100644 +--- a/support/include/nfsd_path.h ++++ b/support/include/nfsd_path.h +@@ -9,6 +9,7 @@ + struct file_handle; + struct statfs; + struct nfsd_task_t; ++struct nfs_ucred; + + void nfsd_path_init(void); + +@@ -18,7 +19,8 @@ char * nfsd_path_prepend_dir(const char *dir, const char *pathname); + + int nfsd_path_stat(const char *pathname, struct stat *statbuf); + int nfsd_path_lstat(const char *pathname, struct stat *statbuf); +-int nfsd_openat(int dirfd, const char *path, int flags); ++int nfsd_cred_openat(const struct nfs_ucred *cred, int dirfd, ++ const char *path, int flags); + + int nfsd_path_statfs(const char *pathname, + struct statfs *statbuf); +@@ -31,4 +33,9 @@ ssize_t nfsd_path_write(int fd, void* buf, size_t len); + int nfsd_name_to_handle_at(int fd, const char *path, + struct file_handle *fh, + int *mount_id, int flags); ++ ++static inline int nfsd_openat(int dirfd, const char *path, int flags) ++{ ++ return nfsd_cred_openat(NULL, dirfd, path, flags); ++} + #endif +diff --git a/support/misc/nfsd_path.c b/support/misc/nfsd_path.c +index dfe88e4f..6466666d 100644 +--- a/support/misc/nfsd_path.c ++++ b/support/misc/nfsd_path.c +@@ -17,6 +17,7 @@ + #include "xstat.h" + #include "nfslib.h" + #include "nfsd_path.h" ++#include "nfs_ucred.h" + #include "workqueue.h" + + static struct xthread_workqueue *nfsd_wq = NULL; +@@ -204,6 +205,7 @@ nfsd_realpath(const char *path, char *resolved_buf) + } + + struct nfsd_openat_t { ++ const struct nfs_ucred *cred; + const char *path; + int dirfd; + int flags; +@@ -220,15 +222,41 @@ static void nfsd_openatfunc(void *data) + d->res_error = errno; + } + +-int nfsd_openat(int dirfd, const char *path, int flags) ++static void nfsd_cred_openatfunc(void *data) ++{ ++ struct nfsd_openat_t *d = data; ++ struct nfs_ucred *saved = NULL; ++ int ret; ++ ++ ret = nfs_ucred_swap_effective(d->cred, &saved); ++ if (ret != 0) { ++ d->res_fd = -1; ++ d->res_error = ret; ++ return; ++ } ++ ++ nfsd_openatfunc(data); ++ ++ if (saved != NULL) { ++ nfs_ucred_swap_effective(saved, NULL); ++ nfs_ucred_free(saved); ++ } ++} ++ ++int nfsd_cred_openat(const struct nfs_ucred *cred, int dirfd, const char *path, ++ int flags) + { + struct nfsd_openat_t open_buf = { ++ .cred = cred, + .path = path, + .dirfd = dirfd, + .flags = flags, + }; + +- nfsd_run_task(nfsd_openatfunc, &open_buf); ++ if (cred) ++ nfsd_run_task(nfsd_cred_openatfunc, &open_buf); ++ else ++ nfsd_run_task(nfsd_openatfunc, &open_buf); + if (open_buf.res_fd == -1) + errno = open_buf.res_error; + return open_buf.res_fd; +diff --git a/utils/mountd/mountd.c b/utils/mountd/mountd.c +index f43ebef5..6e6777cd 100644 +--- a/utils/mountd/mountd.c ++++ b/utils/mountd/mountd.c +@@ -31,6 +31,7 @@ + #include "nfsd_path.h" + #include "nfslib.h" + #include "export.h" ++#include "nfs_ucred.h" + + extern void my_svc_run(void); + +@@ -40,6 +41,7 @@ static struct nfs_fh_len *get_rootfh(struct svc_req *, dirpath *, nfs_export **, + + int reverse_resolve = 0; + int manage_gids; ++int apply_root_cred; + int use_ipaddr = -1; + + /* PRC: a high-availability callout program can be specified with -H +@@ -74,9 +76,10 @@ static struct option longopts[] = + { "log-auth", 0, 0, 'l'}, + { "cache-use-ipaddr", 0, 0, 'i'}, + { "ttl", 1, 0, 'T'}, ++ { "apply-root-cred", 0, 0, 'c' }, + { NULL, 0, 0, 0 } + }; +-static char shortopts[] = "o:nFd:p:P:hH:N:V:vurs:t:gliT:"; ++static char shortopts[] = "o:nFd:p:P:hH:N:V:vurs:t:gliT:c"; + + #define NFSVERSBIT(vers) (0x1 << (vers - 1)) + #define NFSVERSBIT_ALL (NFSVERSBIT(2) | NFSVERSBIT(3) | NFSVERSBIT(4)) +@@ -453,11 +456,27 @@ get_rootfh(struct svc_req *rqstp, dirpath *path, nfs_export **expret, + while (*subpath == '/') + subpath++; + if (*subpath != '\0') { ++ struct nfs_ucred *cred = NULL; + int fd; + ++ /* Load the user cred */ ++ if (!apply_root_cred) { ++ nfs_ucred_get(&cred, rqstp, &exp->m_export); ++ if (cred == NULL) { ++ xlog(L_WARNING, "can't retrieve credential"); ++ *error = MNT3ERR_ACCES; ++ close(dirfd); ++ return NULL; ++ } ++ if (manage_gids) ++ nfs_ucred_reload_groups(cred, &exp->m_export); ++ } ++ + /* Just perform a lookup of the path */ +- fd = nfsd_openat(dirfd, subpath, O_PATH); ++ fd = nfsd_cred_openat(cred, dirfd, subpath, O_PATH); + close(dirfd); ++ if (cred) ++ nfs_ucred_free(cred); + if (fd == -1) { + xlog(L_WARNING, "can't open exported dir %s: %s", p, + strerror(errno)); +@@ -681,6 +700,8 @@ read_mountd_conf(char **argv) + ttl = conf_get_num("mountd", "ttl", default_ttl); + if (ttl > 0) + default_ttl = ttl; ++ apply_root_cred = conf_get_bool("mountd", "apply-root-cred", ++ apply_root_cred); + } + + int +@@ -794,6 +815,9 @@ main(int argc, char **argv) + } + default_ttl = ttl; + break; ++ case 'c': ++ apply_root_cred = 1; ++ break; + case 0: + break; + case '?': +diff --git a/utils/mountd/mountd.man b/utils/mountd/mountd.man +index a206a3e2..f4f1fc23 100644 +--- a/utils/mountd/mountd.man ++++ b/utils/mountd/mountd.man +@@ -242,6 +242,32 @@ can support both NFS version 2 and the newer version 3. + Print the version of + .B rpc.mountd + and exit. ++.TP ++.B \-c " or " \-\-apply-root-cred ++When mountd is asked to allow a NFSv3 mount to a subdirectory of the ++exported directory, then it will check if the user asking to mount has ++lookup rights to the directories below that exported directory. When ++performing the check, mountd will apply any root squash or all squash ++rules that were specified for that client. ++ ++Performing lookup checks as the user requires that the mountd daemon ++be run as root or that it be given CAP_SETUID and CAP_SETGID privileges ++so that it can change its own effective user and effective group settings. ++When troubleshooting, please also note that LSM frameworks such as SELinux ++can sometimes prevent the daemon from changing the effective user/groups ++despite the capability settings. ++ ++In earlier versions of mountd, the same checks were performed using the ++mountd daemon's root privileges, meaning that it could authorise access ++to directories that are not normally accessible to the user requesting ++to mount them. This option enables that legacy behaviour. ++ ++.BR Note: ++If there is a need to provide access to specific subdirectories that ++are not normally accessible to a client, it is always possible to add ++export entries that explicitly grant such access. That ability does ++not depend on this option being enabled. ++ + .TP + .B \-g " or " \-\-manage-gids + Accept requests from the kernel to map user id numbers into lists of +-- +2.35.6 + diff --git a/meta/recipes-connectivity/nfs-utils/nfs-utils_2.8.4.bb b/meta/recipes-connectivity/nfs-utils/nfs-utils_2.8.4.bb index 08e7dd89003..04f65fdff38 100644 --- a/meta/recipes-connectivity/nfs-utils/nfs-utils_2.8.4.bb +++ b/meta/recipes-connectivity/nfs-utils/nfs-utils_2.8.4.bb @@ -24,6 +24,10 @@ SRC_URI = "${KERNELORG_MIRROR}/linux/utils/nfs-utils/${PV}/nfs-utils-${PV}.tar.x file://0001-locktest-Makefile.am-Do-not-use-build-flags.patch \ file://0004-Use-nogroup-for-nobody-group.patch \ file://0005-find-OE-provided-Kerberos.patch \ + file://CVE-2025-12801-dependent_p1.patch \ + file://CVE-2025-12801-dependent_p2.patch \ + file://CVE-2025-12801-dependent_p3.patch \ + file://CVE-2025-12801.patch \ " SRC_URI[sha256sum] = "11c4cc598a434d7d340bad3e072a373ba1dcc2c49f855d44b202222b78ecdbf5" From patchwork Thu Apr 16 22:29:50 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86321 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 7202AF8DFDF for ; Thu, 16 Apr 2026 22:33:15 +0000 (UTC) Received: from mail-wm1-f68.google.com (mail-wm1-f68.google.com [209.85.128.68]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.28559.1776378785265162412 for ; Thu, 16 Apr 2026 15:33:05 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=EidBdZuy; spf=pass (domain: smile.fr, ip: 209.85.128.68, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f68.google.com with SMTP id 5b1f17b1804b1-4852b81c73aso366165e9.3 for ; Thu, 16 Apr 2026 15:33:05 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378783; x=1776983583; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=WaYkrZqYD3QKvU1M3QQz1qp/jXduDv3dzKI5FWKlIdw=; b=EidBdZuycnQguiBC6vMIJ46yXobEPLIaJXSC7uf3wdF7FjRDQhpFwQiu0tu/ljZPyR 8Z9SqeLS/+dypvyIVaA+iRnK4BMB2HN13/0yKFDB7SoumWvjFEb3MMnSMKjeC1jWkhsw IiSPwu9Q54OGpcyEEUQBPZR9umWHXMP+oKKyA= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378783; x=1776983583; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=WaYkrZqYD3QKvU1M3QQz1qp/jXduDv3dzKI5FWKlIdw=; b=nBpy7YuOnMiPO6nLqqjz7aii/kZs/9XG8sUMR2ueh1qXBBEL587P+63cNXF5+9iMac cWOzjzeieelKoDLDIdF8Mt1St8TYr1YYDOTCmYH4XkEhw8M0MwJ5ow82rVpVgTxQjpET RP0kkoARZFv2PO+xp4DHxsdDYF21U3E9CcSC9tN0R4YdQ8k+c47xK3cQiRXtbH7G1RXU 98fS87hxv4SxDp65mEpgiJvkgivA+rSKlMLG2ntx4UklOCaFlZSWkg46TohEXkeE5N2x xmcwBqpT4syY9eljlXF21xuw9DaOTWHph1F5UPkZmDusscVAfc+vkKBV+j5wxD2urxwI HP5Q== X-Gm-Message-State: AOJu0YxZZ5JgnTK0IIM/VjofNJN5gY5OdA+d9Ky6UxIkovWtYOlVjqRC U1k+vA3pQGy1qU/CPkforKJDnygV8e4z8+X01I911W2OvffB2q8Csdjroyyjc5PqE/p4zVMSVam nUpJvsNxcJ6wb X-Gm-Gg: AeBDieu8XhWOpFM855IdoQZBVGJO/WB0Gws8Vxne3bPZAhkkBWxsxI0/YAzWPazhNGE CvztCTKtATfPsZEJBYZQy1P1NNBL4V28tDag2W7N+BWihPAtbPWGRHibnQeYGlUXjGVEIyn1Iwq P19UKcL0l6A174WFjF4pcEysPhZECKF1mMMxn/G+2cdOtqHEVDlHiNdwzddoSyFtR3tti0d3v1u n9vHUSxifQL5ymwpwaWSsd9gr22PGOt6hmwK2mPOxzoAp5WtajPh7cL8FAksESzY7now3TwjOwp qJVrDxNv6ArM/wJZJpxaF5PttjosUOIr2n1s8GVOFJsmWLj5HCqo9uO0xwcdHin7ToT+szp99SN 0vhS5XOc4/50ds1smSCjSdGCGqydOb0y8h9+C/bHp9ctZsVKJ1b4q/ahiwzXOJ/fzJdrNn0+Ejl XbWicWDt6Dk761v051lMIv1eD/lv9TpeBIcDyoJtRAXTQjgqylKYHk710P8ATqXAFde1qlAbxVo loivMqVqZX3hD/+fRf2rjZzROiWCuidVg7MhA== X-Received: by 2002:a05:600c:c085:b0:486:fbdb:b718 with SMTP id 5b1f17b1804b1-488fb784948mr3468465e9.25.1776378783255; Thu, 16 Apr 2026 15:33:03 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.02 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:02 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 07/51] sqlite3: Fix CVE-2025-70873 Date: Fri, 17 Apr 2026 00:29:50 +0200 Message-ID: <57de3882a93f624caf6d72391f896d6e317da44d.1776377993.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:15 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235436 From: Vijay Anusuri Pick patch as per [1] [1] https://sqlite.org/src/info/3d459f1fb1bd1b5e [2] https://sqlite.org/forum/forumpost/761eac3c82 [3] https://gist.github.com/cnwangjihe/f496393f30f5ecec5b18c8f5ab072054 Signed-off-by: Vijay Anusuri Signed-off-by: Yoann Congal --- .../sqlite/files/CVE-2025-70873.patch | 33 +++++++++++++++++++ meta/recipes-support/sqlite/sqlite3_3.48.0.bb | 1 + 2 files changed, 34 insertions(+) create mode 100644 meta/recipes-support/sqlite/files/CVE-2025-70873.patch diff --git a/meta/recipes-support/sqlite/files/CVE-2025-70873.patch b/meta/recipes-support/sqlite/files/CVE-2025-70873.patch new file mode 100644 index 00000000000..5c8c429a157 --- /dev/null +++ b/meta/recipes-support/sqlite/files/CVE-2025-70873.patch @@ -0,0 +1,33 @@ +From 5a05c59d4d75c03f23d5fb70feac9f789954bf8a Mon Sep 17 00:00:00 2001 +From: drh <> +Date: Sat, 6 Dec 2025 20:41:24 +0000 +Subject: [PATCH] In the zipfile extension, only return as many bytes as + Inflate actually generated. [forum:/forumpost/761eac3c82|Forum post + 761eac3c82]. Adjust ./configure so that it builds zipfile into testfixture if + ZLIB is available, so that tests get run on unix platforms. + +FossilOrigin-Name: 3d459f1fb1bd1b5e723629c463ab392af7b206ece3388bda216c6a4c26160909 + +Upstream-Status: Backport [https://github.com/sqlite/sqlite/commit/5a05c59d4d75c03f23d5fb70feac9f789954bf8a] +CVE: CVE-2025-70873 +Signed-off-by: Vijay Anusuri +--- + shell.c | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/shell.c b/shell.c +index ca26f8a..a3f7898 100644 +--- a/shell.c ++++ b/shell.c +@@ -11141,7 +11141,7 @@ static void zipfileInflate( + if( err!=Z_STREAM_END ){ + zipfileCtxErrorMsg(pCtx, "inflate() failed (%d)", err); + }else{ +- sqlite3_result_blob(pCtx, aRes, nOut, zipfileFree); ++ sqlite3_result_blob(pCtx, aRes, (int)str.total_out, zipfileFree); + aRes = 0; + } + } +-- +2.43.0 + diff --git a/meta/recipes-support/sqlite/sqlite3_3.48.0.bb b/meta/recipes-support/sqlite/sqlite3_3.48.0.bb index c9ff062255f..df261bdbf86 100644 --- a/meta/recipes-support/sqlite/sqlite3_3.48.0.bb +++ b/meta/recipes-support/sqlite/sqlite3_3.48.0.bb @@ -6,6 +6,7 @@ LIC_FILES_CHKSUM = "file://sqlite3.h;endline=11;md5=786d3dc581eff03f4fd9e4a77ed0 SRC_URI = "http://www.sqlite.org/2025/sqlite-autoconf-${SQLITE_PV}.tar.gz \ file://CVE-2025-3277.patch \ file://CVE-2025-6965.patch \ + file://CVE-2025-70873.patch \ " SRC_URI[sha256sum] = "ac992f7fca3989de7ed1fe99c16363f848794c8c32a158dafd4eb927a2e02fd5" From patchwork Thu Apr 16 22:29:51 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86320 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 83C93F8DFE1 for ; Thu, 16 Apr 2026 22:33:15 +0000 (UTC) Received: from mail-wm1-f65.google.com (mail-wm1-f65.google.com [209.85.128.65]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.28254.1776378785478820512 for ; Thu, 16 Apr 2026 15:33:05 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=vzpDGuym; spf=pass (domain: smile.fr, ip: 209.85.128.65, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f65.google.com with SMTP id 5b1f17b1804b1-488aa77a06eso954065e9.0 for ; Thu, 16 Apr 2026 15:33:05 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378784; x=1776983584; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=G4DGxj33M83tdzDTFm/C37grkZ67fTY0gJo5pUhvEHw=; b=vzpDGuymg1pNfBiHE5xFf2tRiWGPRa5LDZLKT7PLZKjXDTKCZa1fJkbFNnKU6GVsW9 Mj00Ui/GA7Z4TfDcI+bw6pc/dfBXvDu3YuR4G+nBGAqJbHPTTw0YEe8pl0/Cim9d2TSs cZF4YRkcsZyG/7ApEUueKOWESVvp5Qt3bqEaA= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378784; x=1776983584; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=G4DGxj33M83tdzDTFm/C37grkZ67fTY0gJo5pUhvEHw=; b=lZSpdNz2sg18OvkI4H8mHqOUstS6Ko0m+C3pCsrk3Da++Nw+QZ9rhoYvCZI+UUqCyy cA1dzhrpn5JecaZ2DrRgBSO9FDghe403rGQzK6RKEXHj3fhDQidN6a8sm8q+kYH7vqgf PkxT2A6/MJHAIcF2obIs5XOi9y5tu73YelCEWEe0rrhT8y1nSkocy9QW4oBXm8/GhcV8 FnZKkOUy9EVkgT8IF7KJc27gFJ3Gf7YaD2aV0FKQVLs/hsWAkQJyAYLmZT4Yj7d9Kbhg Opcmzcc+zT8TcnwPz02OP0QQfQY9nj2gA4gWtaVpZO2sb+vs+3AQFiEvDFbWZitoZiG+ STdQ== X-Gm-Message-State: AOJu0Yx1m5NhFCNDXQE9OSk8+7UtfqwSiqbYtHnSs64FfLIrvdZ9nggk gs3zkMzdxcYn3lzpHVIwhi225IzBbcEpGLK3neQ9E9cPBU3dZc5IcN1xbWc+9oaZegYH0AiSfw1 1qQnlPyj9a0d3 X-Gm-Gg: AeBDietfb4B7cKCHUCnoGUktmX2eCCC8KATq4HR9OwfqbKYNMGWQ4VxhXJD9y70s9WO v9hdn0A2l+Y6Qk96qClrtm7TP5H2sxczzE91S4gmuKMSxRBj3M6KlDXKoMgmcwge3a+5Bh2R333 XmuyyfEyWeImp0zjVI7HrGLd1aOPVGHMMmaM7c9GlHA0EwOTzxBnJ4ww1gU23h7Ht5A5Z5B/CuM qycGVyZ/LxH8jaGHrACz92zsP+dD8R39HNAo0CMogt5lPmf892EDztZITmysQkvV6orhNfhDhoU S+/enN5p7aTTIYYtcyjJI0gqN428VL1q9jyoX8tAgVHmCBhmSoJCcfvIb67LVpUsRr1dUkh+ooF bC+CHAIDpaTl9U3yIk0mcRbjsDLXTJ/uZ+vPTphOa748Qqab4GSv/0BY3ejJfnZFMxL+yRvEA2L Yc1XPr/WKTGeHw2UrlGSO9trpbVPuvyzqdPcrIb0AZYwH31UZZ87cFXSPp+oQlppF3fkSQVMCYF zUv+1aKCk3jgfd1ErbJslKa8gQIdxzIlPFa7Q== X-Received: by 2002:a05:600c:3515:b0:488:8b99:54a1 with SMTP id 5b1f17b1804b1-488fb78e7c5mr4325355e9.28.1776378783656; Thu, 16 Apr 2026 15:33:03 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.03 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:03 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 08/51] python3: upgrade 3.13.11 -> 3.13.12 Date: Fri, 17 Apr 2026 00:29:51 +0200 Message-ID: <976d4764a2d676c2d477563123a9b96fa19a95be.1776377993.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:15 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235437 From: Vijay Anusuri Handles CVE-2025-15282 Release information: * https://www.python.org/downloads/release/python-31312/ * Python 3.13.12 is the twelfth maintenance release of 3.13, containing around 240 bugfixes, build improvements and documentation changes since 3.13.11. Signed-off-by: Vijay Anusuri [YC: Full changelog: https://docs.python.org/release/3.13.12/whatsnew/changelog.html ] Signed-off-by: Yoann Congal --- .../python/{python3_3.13.11.bb => python3_3.13.12.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta/recipes-devtools/python/{python3_3.13.11.bb => python3_3.13.12.bb} (99%) diff --git a/meta/recipes-devtools/python/python3_3.13.11.bb b/meta/recipes-devtools/python/python3_3.13.12.bb similarity index 99% rename from meta/recipes-devtools/python/python3_3.13.11.bb rename to meta/recipes-devtools/python/python3_3.13.12.bb index 2bc2389b7e4..e30acebe20d 100644 --- a/meta/recipes-devtools/python/python3_3.13.11.bb +++ b/meta/recipes-devtools/python/python3_3.13.12.bb @@ -36,7 +36,7 @@ SRC_URI:append:class-native = " \ file://0001-Lib-sysconfig.py-use-prefix-value-from-build-configu.patch \ " -SRC_URI[sha256sum] = "16ede7bb7cdbfa895d11b0642fa0e523f291e6487194d53cf6d3b338c3a17ea2" +SRC_URI[sha256sum] = "2a84cd31dd8d8ea8aaff75de66fc1b4b0127dd5799aa50a64ae9a313885b4593" # exclude pre-releases for both python 2.x and 3.x UPSTREAM_CHECK_REGEX = "[Pp]ython-(?P\d+(\.\d+)+).tar" From patchwork Thu Apr 16 22:29:52 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86319 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 952A9F8DFE3 for ; Thu, 16 Apr 2026 22:33:15 +0000 (UTC) Received: from mail-wm1-f67.google.com (mail-wm1-f67.google.com [209.85.128.67]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.28560.1776378786419210691 for ; Thu, 16 Apr 2026 15:33:06 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=iR3EBK8I; spf=pass (domain: smile.fr, ip: 209.85.128.67, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f67.google.com with SMTP id 5b1f17b1804b1-483487335c2so381975e9.2 for ; Thu, 16 Apr 2026 15:33:06 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378784; x=1776983584; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=zwTVIoATG0nuEQawV94F0xmwLgenCLpp9msphq4MknQ=; b=iR3EBK8ITilxXVy89OiBfJ+fwj9NfPC/pSWCAEBlZedBamfsdWWwa4n1K6OOna37jC JD2g/Y7wrY2+Wx2eZ3j09tlMhDrWrxI22COxZSZlScHpO5L3folMLpO61/BHKwUYmY8v ySxoK2+0cAn8cQ0yraSrocHwzRtP7sE4Dg+So= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378784; x=1776983584; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=zwTVIoATG0nuEQawV94F0xmwLgenCLpp9msphq4MknQ=; b=GOhPM6Q0EdLqw5V0qApfc7PNC5ra0GkwwR45YLy4Xu4AI2hoIM5c6bkWPZP2qcM7Mw 60BfguYKSeEz57Y71i02mNpxyPTyBtltMI1iigW73NcrqtMnTOUUnt210NV9HMAoPKaR AaIDINBYKj2tXC5uJPwzXbZiBXB+92YC5SASdV1U3GOWfIG7oVoIvA9T74dFHhDf8gDi HSJOae5a9rrGROCYwUy+Xaoq7aTxw9AADs5aMGU6XusoIHNF5Bj/B8YGkqBnVrJuYBTl NYG6IremWfz9bwvxkaY4JolJiyy2/cF+ILlVuQD09nT74INodKngHtRkK0M+KIg2uhtZ X8pg== X-Gm-Message-State: AOJu0YwC0IC+j1FK040pV4ZSTCZjkQWHyKeCLN9DNla+BM4TBIrxMf2r DUECBrcnl8vN/Ra3lqTzPjQjfDiRb6CIIi609g3C6aMdPOFAzZ67BPDsismg6FmFqIecnl2QRi6 58JaDQuz+/aM5 X-Gm-Gg: AeBDievqgkQL1tWrFBoNwftLeiaJNdr8y+AQ4mCTjj8ylNCTJAeH2CGzPbMw2NH6njs Y2yxGDUSmBA26BQsOu4xiUJNczZRZh5aTPJ40eBKXbYAXJjAITK7C0M7p6/Gv3YqprQooTdGZzD VHH0dFOULdUn9wli6/RSmJTYZY7Dl+obeG66sLcD5YP8ohAPQ94q/+gwjLcREs7mq4XZEOX76W2 mksE05RzkC8PVbOufCQKCmH5XhMbS9sAWpA+/QedDQG9OEamneyDUerDNAwR28rYf3p6qA+e1IW 8bhbHdv+tqBBcmjHrHCGDcSvnPK+LgHFTTfPl/SGwdAnm8cRS8GM76nlzOns8Y7veOQldsk4dCW oZ11JBAmd9yQ1A4wRnUYOTEKMTV0KHs3OwBAW+TheMtXvqfZ0ENsHcQSje4sO87VFtVlTXG4Wdx wfPwJbvGl/w78KdVh/bWyWYBVleVYiqJoOOE5pz1yo6VHwlAWYPx7ldnYzaJhO0Ikj9FKZf2KrB v7xZ52yGr88oZGeRZ3qC5n4ocGNvy6I74Xkbw== X-Received: by 2002:a05:600d:8402:b0:488:ae26:435e with SMTP id 5b1f17b1804b1-488fb778d74mr3737355e9.16.1776378784525; Thu, 16 Apr 2026 15:33:04 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.03 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:03 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 09/51] libarchive: upgrade 3.8.5 -> 3.8.6 Date: Fri, 17 Apr 2026 00:29:52 +0200 Message-ID: <4f873ad9abb1c10d0dc41f219f4a8ae5b8b1d53c.1776377993.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:15 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235438 From: Peter Marko Release information [1]: Libarchive 3.8.6 is a security and bugfix release. Notable fixes: * libarchive: fix incompatibility with Nettle 4.x (#2858) * libarchive: fix NULL pointer dereference in archive_acl_from_text_w() (#2859) * bsdunzip: fix ISO week year and Gregorian year confusion (#2860) * 7zip: ix SEGV in check_7zip_header_in_sfx via ELF offset validation (#2864) * 7zip: fix out-of-bounds access on ELF 64-bit header (#2875) * RAR5 reader: fix infinite loop in rar5 decompression (#2877) * RAR5 reader: fix potential memory leak (#2892) * RAR5: fix SIGSEGV when archive_read_support_format_rar5 is called twice (#2893) * CAB reader: fix memory leak on repeated calls to archive_read_support_format_cab (#2895) * mtree reader: Fix file descriptor leak in mtree parser cleanup (CWE-775, #2878) * various small bugfixes in code and documentation [1] https://github.com/libarchive/libarchive/releases/tag/v3.8.6 Signed-off-by: Peter Marko Signed-off-by: Robert Yang Signed-off-by: Richard Purdie (cherry picked from commit 9e5d18040b0999dbfaea09b8a8a9f8a4bcac6349) Signed-off-by: Vijay Anusuri Signed-off-by: Yoann Congal --- .../libarchive/{libarchive_3.8.5.bb => libarchive_3.8.6.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta/recipes-extended/libarchive/{libarchive_3.8.5.bb => libarchive_3.8.6.bb} (96%) diff --git a/meta/recipes-extended/libarchive/libarchive_3.8.5.bb b/meta/recipes-extended/libarchive/libarchive_3.8.6.bb similarity index 96% rename from meta/recipes-extended/libarchive/libarchive_3.8.5.bb rename to meta/recipes-extended/libarchive/libarchive_3.8.6.bb index fcfaf5d2313..c984eb78401 100644 --- a/meta/recipes-extended/libarchive/libarchive_3.8.5.bb +++ b/meta/recipes-extended/libarchive/libarchive_3.8.6.bb @@ -32,7 +32,7 @@ EXTRA_OECONF += "--enable-largefile --without-iconv" SRC_URI = "https://libarchive.org/downloads/libarchive-${PV}.tar.gz" UPSTREAM_CHECK_URI = "https://www.libarchive.org/" -SRC_URI[sha256sum] = "8a60f3a7bfd59c54ce82ae805a93dba65defd04148c3333b7eaa2102f03b7ffd" +SRC_URI[sha256sum] = "213269b05aac957c98f6e944774bb438d0bd168a2ec60b9e4f8d92035925821c" inherit autotools update-alternatives pkgconfig From patchwork Thu Apr 16 22:29:53 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86322 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id A9F02F8DFE7 for ; Thu, 16 Apr 2026 22:33:15 +0000 (UTC) Received: from mail-wm1-f67.google.com (mail-wm1-f67.google.com [209.85.128.67]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.28561.1776378786880594008 for ; Thu, 16 Apr 2026 15:33:07 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=aN7rXbUE; spf=pass (domain: smile.fr, ip: 209.85.128.67, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f67.google.com with SMTP id 5b1f17b1804b1-488e1a8ac40so506825e9.2 for ; Thu, 16 Apr 2026 15:33:06 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378785; x=1776983585; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=5H+956W2Om0GF7vXp5yZdzTN9B0+uVvwobbLTIuw/HA=; b=aN7rXbUEBeS6cNeUIp48YaV+lZuyegLyoMihaozXmekoCvZn1cmTusHvYPhl6DIGz6 LsYlYgD13eJaqJTxdmCo2pg26xA0IUmhJU8a3sCBdiZOz6j+SasG7OYDkjJ4etkrpSOa AJ69ZwcD5f9CtCBl8xCAhpAvy0B8rR20FT6TQ= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378785; x=1776983585; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=5H+956W2Om0GF7vXp5yZdzTN9B0+uVvwobbLTIuw/HA=; b=SFQzfItw277IsxsOn8KpcEV6pTQg/doxLHbMMF/T360l4wI35ht2zldB4EzxwKBB+x 0PjY+DUh0jvizruv+Su8ZCQEsUewWeXSplYsTDnBE1Co9uU5XB4fM8vqBkR9pQWfC2oL dB1xksIcUu/NbsKmernCCFKSdm7oojVsGdTnUnW4dVsJ7PSqKx7a2FfoJCqyqMrcJ4rY fLveYjXuFzBLRnWxLtevZCpFwAjAsDQ3gAM0Vk598awQ12qcSUAwdqNJj+9rIOFAyfa1 chjLSdyOOagaCVu5995fb5gO3h9IWi2A+GKO7xDfj0VxcAtCjdvsxKSqpor8zUWl9kPg IbGQ== X-Gm-Message-State: AOJu0YxdLNSWiu3TX5KukkTtW91rV6WwvFy5mmxaroEbkpyL6ZhmV6lK DdY3U8AnHuC3eKF9wWIbyJm70Fkx2JC8Aju09PT1KeovwGTWs3OvNaeQgkAm1pFhGptvOuE8Ph+ 8W75W9oGJLlnm X-Gm-Gg: AeBDieszD8da8qoY05sGUDVW95Z9VDi6yh+4/+EVD6IEzlZroEOisqvGR5t5i5Es1qH dBR/tOZbZhoIcid2FWOHdDd629cJ00kiPVOFbfC/fQwsUGe0X/YYgL70hwE+eMFv45Z3469Weet 0xcs9mG4o8FgpMEI3/1JVrFOrOH3+nhq36kRoEdSTgYqmPem38b0pB5FF4BBlDWJu0pAnZjGbbv GQmpdRyqK53jUMARmq3RQgJf4jB/z2m0NTgmP7Ka3tplOe8goJmfdfD+l4wW9/lEQ73EiazNt4Z 9vBB15q3/F2ZWO4SZhf8AH8hQW9VNjjv/AYdTcD4dUY8reuwQnCvYcU9uqIjFop0f7buEZqaWn0 6fmWpO4dh7Huo2uN2npiAAIPOXsR4dqRSRKltbf1Zewq7GRiXVHXv8apwRLyK5X0mP02cOOTO0E wbZyqaE4S/fyI5BMU1qx2tnToRQutI9opCj5XsGC7JfuP4Fb/hD1QFAts62xBE7hgjbvkDzpMHj iV6aRla1IG6AT1PbYe48LfG0lREnVSfW79tAg== X-Received: by 2002:a05:600c:c4ab:b0:487:1fb4:7e1 with SMTP id 5b1f17b1804b1-488fb7864c3mr5211255e9.22.1776378785004; Thu, 16 Apr 2026 15:33:05 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.04 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:04 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 10/51] vim: Fix CVE-2026-33412 Date: Fri, 17 Apr 2026 00:29:53 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:15 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235439 From: Hitendra Prajapati Pick patch from [1] also mentioned in NVD report with [2] [1] https://github.com/vim/vim/commit/645ed6597d1ea896c712cd7ddbb6edee79577e9a [2] https://nvd.nist.gov/vuln/detail/CVE-2026-33412 Signed-off-by: Hitendra Prajapati Signed-off-by: Yoann Congal --- .../vim/files/CVE-2026-33412.patch | 61 +++++++++++++++++++ meta/recipes-support/vim/vim.inc | 1 + 2 files changed, 62 insertions(+) create mode 100644 meta/recipes-support/vim/files/CVE-2026-33412.patch diff --git a/meta/recipes-support/vim/files/CVE-2026-33412.patch b/meta/recipes-support/vim/files/CVE-2026-33412.patch new file mode 100644 index 00000000000..62daa308b58 --- /dev/null +++ b/meta/recipes-support/vim/files/CVE-2026-33412.patch @@ -0,0 +1,61 @@ +From 645ed6597d1ea896c712cd7ddbb6edee79577e9a Mon Sep 17 00:00:00 2001 +From: pyllyukko +Date: Thu, 19 Mar 2026 19:58:05 +0000 +Subject: [PATCH] patch 9.2.0202: [security]: command injection via newline in + glob() + +Problem: The glob() function on Unix-like systems does not escape + newline characters when expanding wildcards. A maliciously + crafted string containing '\n' can be used as a command + separator to execute arbitrary shell commands via + mch_expand_wildcards(). This depends on the user's 'shell' + setting. +Solution: Add the newline character ('\n') to the SHELL_SPECIAL + definition to ensure it is properly escaped before being + passed to the shell (pyllyukko). + +closes: #19746 + +Github Advisory: +https://github.com/vim/vim/security/advisories/GHSA-w5jw-f54h-x46c + +Signed-off-by: pyllyukko +Signed-off-by: Christian Brabandt + +CVE: CVE-2026-33412 +Upstream-Status: Backport [https://github.com/vim/vim/commit/645ed6597d1ea896c712cd7ddbb6edee79577e9a] +Signed-off-by: Hitendra Prajapati +--- + src/os_unix.c | 2 +- + src/version.c | 2 ++ + 2 files changed, 3 insertions(+), 1 deletion(-) + +diff --git a/src/os_unix.c b/src/os_unix.c +index cf195e62e1..d767956b1a 100644 +--- a/src/os_unix.c ++++ b/src/os_unix.c +@@ -7106,7 +7106,7 @@ mch_expandpath( + # define SEEK_END 2 + #endif + +-#define SHELL_SPECIAL (char_u *)"\t \"&'$;<>()\\|" ++# define SHELL_SPECIAL (char_u *)"\t \"&'$;<>()\\|\n" + + int + mch_expand_wildcards( +diff --git a/src/version.c b/src/version.c +index 4f3912aedd..712a3e637c 100644 +--- a/src/version.c ++++ b/src/version.c +@@ -724,6 +724,8 @@ static char *(features[]) = + + static int included_patches[] = + { /* Add new patch number below this line */ ++/**/ ++ 1684, + /**/ + 1683, + /**/ +-- +2.50.1 + diff --git a/meta/recipes-support/vim/vim.inc b/meta/recipes-support/vim/vim.inc index 792a46faf75..c29361cf3c0 100644 --- a/meta/recipes-support/vim/vim.inc +++ b/meta/recipes-support/vim/vim.inc @@ -18,6 +18,7 @@ SRC_URI = "git://github.com/vim/vim.git;branch=master;protocol=https;tag=v${PV} file://no-path-adjust.patch \ file://CVE-2026-25749.patch \ file://CVE-2026-26269.patch \ + file://CVE-2026-33412.patch \ " PV .= ".1683" From patchwork Thu Apr 16 22:29:54 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86323 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D48E2F8DFE9 for ; Thu, 16 Apr 2026 22:33:15 +0000 (UTC) Received: from mail-wm1-f65.google.com (mail-wm1-f65.google.com [209.85.128.65]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.28562.1776378787478291055 for ; Thu, 16 Apr 2026 15:33:07 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=B5nbz+Vp; spf=pass (domain: smile.fr, ip: 209.85.128.65, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f65.google.com with SMTP id 5b1f17b1804b1-488c2690057so445705e9.0 for ; Thu, 16 Apr 2026 15:33:07 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378785; x=1776983585; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=4D9RfUCZVh+iyh8GhBpyOFsLwX5twyAJhgYJtCgl7aA=; b=B5nbz+VpU346RdAYRTj/dVTGV7WwyNiIwTiERMon/4PN/gGFlvNe4c5AGFA/HtflWe vUlV0f8WO7HW8Tnqyg/HbQQBUcwxKDbfK5CwC55A0KYDBGOnmNxAnqDapvMajtYt7zrB ka8JUGNIW+nMxSfyOYjBu/C8aoeA2B5D7uXp4= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378785; x=1776983585; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=4D9RfUCZVh+iyh8GhBpyOFsLwX5twyAJhgYJtCgl7aA=; b=sZoq+bePMguRrjDiDxn6uWgvlGOelR4KtMPEFsDoG8LHIVh/4Er1hIWTHGcTj/jssI b0vdab6b4jYNga4jaMV+4HjOvz3cMAly9WhhadF9bnOPcyb4JlV8CssqUmR4I7d623Ti a+X7XBAGIbTY1ii/o0XdQyykAlTDUvU4rhJHEBjCPnl2Rylik1oQzRUuHtK6AO8ISaz1 HrGSjJ2oteAjEWebgxRG5w0x1cWEmlLT7luZ2oP4O3jd2EMq2WV04rJqEqkouI/gyor5 iHR+ePJsY3BbxbRNumCRph1zvXDiey8pNQ+gHpLve4MqufrBx7MiW40fzmdB1nO1QIpu 6V0w== X-Gm-Message-State: AOJu0YyIth8ZgNVbIDLqJW5f+lEeFQPWXNGMUeo1UtRdK/3haJC5B5Ce 3xmlHd1743p1fGih56TNRFBKZB4ExRAWvXqbqpbEMhbn3JB9e7szBMm8NC5kdFcMSokvqG3vgXo +hj1Wc08WrQZU X-Gm-Gg: AeBDiesyB4s2GtaprLSeYiQP6dNLMh2Vt6KLCYyrPeRxE3udj9/HAqESqF2j7F3furl 8zLG4wlwsePYklt3EwTYIGMpPtHJSnv0k9Rp+FAP5RfbNmq+0Tk8FNQ5QaqNIXpPkyIOCaKNCHU f32EGJHQd2oTDVO/8xMHwC7+frXuzvmwP/LFlFie9eBc4hhrEZVzsg/Jn7HAnzZiXqTU+pjEEJT r+Oz6IMuuEJ2oW8fA0MKQGmHTkisHPxQojOW4dcoU4SRzmoZQgvLGOTFnHgsOArMeYP1TN7AhS6 jypy3K6ybBCtOpLX8PfW+KlE6nIhH4pveDiF3Db9A0hZqxbOJNZkI9jcxPJTqO2vi5JCBKvysad 9AzJ2UPRx+1U8uIpPyP7HK4FTT+wCHWh38tEsEhWFNAx7t6ynblA94ltxrsocX0PvyC2Kzs6wfA ihPqIjwX6HULU1rgaUEk0mf74cYp01stM4iqXk6j/yH9adXaYWlF4IwsAJE9A3N9rmdmobppcTe i29nh+ZIbFt19PQ2PYnl3O0bGTd/uAmYqwrRQ== X-Received: by 2002:a05:600c:314b:b0:485:3a86:6392 with SMTP id 5b1f17b1804b1-488fb778b66mr4613695e9.20.1776378785483; Thu, 16 Apr 2026 15:33:05 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.05 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:05 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 11/51] vim: Fix CVE-2026-28418 Date: Fri, 17 Apr 2026 00:29:54 +0200 Message-ID: <2c12cdc3442f31038ad64404c6bab4dd64c9a92f.1776377993.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:15 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235440 From: Hitendra Prajapati Pick patch from [1] also mentioned in [2] [1] https://github.com/vim/vim/commit/f6a7f469a9c0d09e84cd6cb46c3a9e76f684da2d [2] https://nvd.nist.gov/vuln/detail/CVE-2026-28418 Signed-off-by: Hitendra Prajapati Signed-off-by: Yoann Congal --- .../vim/files/CVE-2026-28418.patch | 78 +++++++++++++++++++ meta/recipes-support/vim/vim.inc | 1 + 2 files changed, 79 insertions(+) create mode 100644 meta/recipes-support/vim/files/CVE-2026-28418.patch diff --git a/meta/recipes-support/vim/files/CVE-2026-28418.patch b/meta/recipes-support/vim/files/CVE-2026-28418.patch new file mode 100644 index 00000000000..3a80ba77f7d --- /dev/null +++ b/meta/recipes-support/vim/files/CVE-2026-28418.patch @@ -0,0 +1,78 @@ +From f6a7f469a9c0d09e84cd6cb46c3a9e76f684da2d Mon Sep 17 00:00:00 2001 +From: Christian Brabandt +Date: Mon, 23 Feb 2026 18:30:11 +0000 +Subject: [PATCH] patch 9.2.0074: [security]: Crash with overlong emacs tag + file + +Problem: Crash with overlong emacs tag file, because of an OOB buffer + read (ehdgks0627, un3xploitable) +Solution: Check for end of buffer and return early. + +Github Advisory: +https://github.com/vim/vim/security/advisories/GHSA-h4mf-vg97-hj8j + +Signed-off-by: Christian Brabandt + +CVE: CVE-2026-28418 +Upstream-Status: Backport [https://github.com/vim/vim/commit/f6a7f469a9c0d09e84cd6cb46c3a9e76f684da2d] +Signed-off-by: Hitendra Prajapati +--- + src/tag.c | 3 +++ + src/testdir/test_taglist.vim | 15 +++++++++++++++ + src/version.c | 2 ++ + 3 files changed, 20 insertions(+) + +diff --git a/src/tag.c b/src/tag.c +index a32bbb2459..45af67f20d 100644 +--- a/src/tag.c ++++ b/src/tag.c +@@ -1902,6 +1902,9 @@ emacs_tags_new_filename(findtags_state_T *st) + + for (p = st->ebuf; *p && *p != ','; p++) + ; ++ // invalid ++ if (*p == NUL) ++ return; + *p = NUL; + + // check for an included tags file. +diff --git a/src/testdir/test_taglist.vim b/src/testdir/test_taglist.vim +index 5a946042be..506e64f7ae 100644 +--- a/src/testdir/test_taglist.vim ++++ b/src/testdir/test_taglist.vim +@@ -301,4 +301,19 @@ func Test_tag_complete_with_overlong_line() + set tags& + endfunc + ++" This used to crash Vim ++func Test_evil_emacs_tagfile() ++ CheckFeature emacs_tags ++ let longline = repeat('a', 515) ++ call writefile([ ++ \ "\x0c", ++ \ longline ++ \ ], 'Xtags', 'D') ++ set tags=Xtags ++ ++ call assert_fails(':tag a', 'E426:') ++ ++ set tags& ++endfunc ++ + " vim: shiftwidth=2 sts=2 expandtab +diff --git a/src/version.c b/src/version.c +index 712a3e637c..7d265ab641 100644 +--- a/src/version.c ++++ b/src/version.c +@@ -724,6 +724,8 @@ static char *(features[]) = + + static int included_patches[] = + { /* Add new patch number below this line */ ++/**/ ++ 1685, + /**/ + 1684, + /**/ +-- +2.50.1 + diff --git a/meta/recipes-support/vim/vim.inc b/meta/recipes-support/vim/vim.inc index c29361cf3c0..11200a08240 100644 --- a/meta/recipes-support/vim/vim.inc +++ b/meta/recipes-support/vim/vim.inc @@ -19,6 +19,7 @@ SRC_URI = "git://github.com/vim/vim.git;branch=master;protocol=https;tag=v${PV} file://CVE-2026-25749.patch \ file://CVE-2026-26269.patch \ file://CVE-2026-33412.patch \ + file://CVE-2026-28418.patch \ " PV .= ".1683" From patchwork Thu Apr 16 22:29:55 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86325 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 01498F8DFEB for ; Thu, 16 Apr 2026 22:33:16 +0000 (UTC) Received: from mail-wm1-f67.google.com (mail-wm1-f67.google.com [209.85.128.67]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.28563.1776378787992115962 for ; Thu, 16 Apr 2026 15:33:08 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=aIJfdGzh; spf=pass (domain: smile.fr, ip: 209.85.128.67, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f67.google.com with SMTP id 5b1f17b1804b1-488afb0427eso613555e9.1 for ; Thu, 16 Apr 2026 15:33:07 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378786; x=1776983586; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=mXN7aEZFKmUORiNVJiXvWTSjjE98DeEPnv8xkjv6vSc=; b=aIJfdGzhIZ4lVndkkoJI4O1Gt7lsHnDP7DwsorPCNh0gEFWxPFv0p2BYLuwprxeStw bwgOAnUd/iJkeQboxFywzkfrK/iWBKP1Exg9nhhd70/KdzJD4fXd2EdpKiJyZ1Upbb/T i9Ruvp+X7+yH4hDKuoskpwjYvyLLO9o0czIFc= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378786; x=1776983586; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=mXN7aEZFKmUORiNVJiXvWTSjjE98DeEPnv8xkjv6vSc=; b=ZyUhe71kznngH9wwGlcql/irqex2YryRlTNCuQzUSzMRyOLl8J34jxhkz0cQBZ2tPA mm2r8P+AHgcPM9R8q/csteSVtLWym8y8grlV95mKoy3HttTJ7YtaywcGN00kL4EoN0uT AUyJoPrjI62pHiU9Ad+B4mbhpiUkY0fuhAS3Rd+abOMOMZQ98TePJHqkNEoiKjQG0he/ KaZ9OmkpG4aBaRx1sFfP9yhMHpwkJPzZ0Zd7PMr7eFX19QjLtun7Wk3btpUfmcUxljDr FyOtDpDoAQP8Wv/MJ9ADWepNQz6TuAAUj/0ZrRSUrHQSM6NM87O6fm3y/t24myI/Ykkk 9e/g== X-Gm-Message-State: AOJu0Yy4934gbN449PUW97VM1Bpj9i9id8ckXXiBjSVyi+aKp8KC67OJ 9qtwdONKzVlGIx/Aj41OwD9dpLA1ZDqXw86kpN++NTBTdhH9EIT2uj534wQYWqj0tPOZoxjw2Fx fboVFKN0jmJFs X-Gm-Gg: AeBDietuDTcyM0cPXibSRw/DAMwgiR7OX+LlyXd0kN1mnqR521q+Yc7zC5yfCEg0pl/ j/L2ItqRMeNHobaU3sUc4vpowibmNK7MUSPdz6vOfRv+N/Frb/uGvDPdTfiWXd0xVkuU5jCAlDm TRFpt5mCPWoo+lWMFQCdmrw+ZIAbh0oDIO/gpKJkxDqT50cbZUHBzanymvnsELju2VPlnk8pgPj Sz0iXOss2Eq7cwtx1HeDVa45ECb/DlDLxDwKs0o1GrsFQTJBGXT4+M/t3rZZcJ3tbFNNz2iqdBd kHjf8DBRE8TZghin8G0Si260iuUnEhlEbuyigmeXMtHAA822asvs8yhJn17CT/9qjKnWxamimJG dlRhNFrjBcyK0T2Tk67vO7HQ2NkM6QoiHO69SIOm8YAkkzsKI6RBMOQlQkqztjuiT4ruia++lMB 0q9at0HEejheTEhlxmZwTo1GubkayYgyz+0mcHdm2Z8A1m+bmHKkb4H0JGYz1ONaitcpGjk8Vj+ Ci2ot5LNEl3jzhvONtR4tntd0v7YrYXE6RIPQ== X-Received: by 2002:a05:600c:a416:b0:488:90ac:8f71 with SMTP id 5b1f17b1804b1-488fb73a9fcmr4034545e9.5.1776378786115; Thu, 16 Apr 2026 15:33:06 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.05 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:05 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 12/51] vim: Fix CVE-2026-28419 Date: Fri, 17 Apr 2026 00:29:55 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:16 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235441 From: Hitendra Prajapati Pick patch from [1] also mentioned in [2] [1] https://github.com/vim/vim/commit/9b7dfa2948c9e1e5e32a5812812d580c7879f4a0 [2] https://nvd.nist.gov/vuln/detail/CVE-2026-28419 Signed-off-by: Hitendra Prajapati Signed-off-by: Yoann Congal --- .../vim/files/CVE-2026-28419.patch | 86 +++++++++++++++++++ meta/recipes-support/vim/vim.inc | 1 + 2 files changed, 87 insertions(+) create mode 100644 meta/recipes-support/vim/files/CVE-2026-28419.patch diff --git a/meta/recipes-support/vim/files/CVE-2026-28419.patch b/meta/recipes-support/vim/files/CVE-2026-28419.patch new file mode 100644 index 00000000000..91100a7e91e --- /dev/null +++ b/meta/recipes-support/vim/files/CVE-2026-28419.patch @@ -0,0 +1,86 @@ +From 9b7dfa2948c9e1e5e32a5812812d580c7879f4a0 Mon Sep 17 00:00:00 2001 +From: Christian Brabandt +Date: Mon, 23 Feb 2026 19:35:25 +0000 +Subject: [PATCH] patch 9.2.0075: [security]: Buffer underflow with emacs tag + file + +Problem: When parsing a malformed Emacs-style tags file, a 1-byte + heap-buffer-underflow read occurs if the 0x7f delimiter + appears at the very beginning of a line. This happens + because the code attempts to scan backward for a tag + name from the delimiter without checking if space exists. + (ehdgks0627, un3xploitable) +Solution: Add a check to ensure the delimiter (p_7f) is not at the + start of the buffer (lbuf) before attempting to isolate + the tag name. + +GitHub Advisory: +https://github.com/vim/vim/security/advisories/GHSA-xcc8-r6c5-hvwv + +Signed-off-by: Christian Brabandt + + +CVE: CVE-2026-28419 +Upstream-Status: Backport [https://github.com/vim/vim/commit/9b7dfa2948c9e1e5e32a5812812d580c7879f4a0] +Signed-off-by: Hitendra Prajapati +--- + src/tag.c | 3 +++ + src/testdir/test_taglist.vim | 16 ++++++++++++++++ + src/version.c | 2 ++ + 3 files changed, 21 insertions(+) + +diff --git a/src/tag.c b/src/tag.c +index 45af67f20d..d3a73997bb 100644 +--- a/src/tag.c ++++ b/src/tag.c +@@ -2023,6 +2023,9 @@ etag_fail: + } + else // second format: isolate tagname + { ++ if (p_7f == lbuf) ++ goto etag_fail; ++ + // find end of tagname + for (p = p_7f - 1; !vim_iswordc(*p); --p) + if (p == lbuf) +diff --git a/src/testdir/test_taglist.vim b/src/testdir/test_taglist.vim +index 506e64f7ae..42ecc4b76e 100644 +--- a/src/testdir/test_taglist.vim ++++ b/src/testdir/test_taglist.vim +@@ -316,4 +316,20 @@ func Test_evil_emacs_tagfile() + set tags& + endfunc + ++" This used to crash Vim due to a heap-buffer-underflow ++func Test_emacs_tagfile_underflow() ++ CheckFeature emacs_tags ++ " The sequence from the crash artifact: ++ let lines = [ ++ \ "\x0c\xff\xffT\x19\x8a", ++ \ "\x19\x19\x0dtags\x19\x19\x19\x00\xff\xff\xff", ++ \ "\x7f3\x0c" ++ \ ] ++ call writefile(lines, 'Xtags', 'D') ++ set tags=Xtags ++ call assert_fails(':tag a', 'E431:') ++ ++ set tags& ++endfunc ++ + " vim: shiftwidth=2 sts=2 expandtab +diff --git a/src/version.c b/src/version.c +index 7d265ab641..4f47ec2688 100644 +--- a/src/version.c ++++ b/src/version.c +@@ -724,6 +724,8 @@ static char *(features[]) = + + static int included_patches[] = + { /* Add new patch number below this line */ ++/**/ ++ 1686, + /**/ + 1685, + /**/ +-- +2.50.1 + diff --git a/meta/recipes-support/vim/vim.inc b/meta/recipes-support/vim/vim.inc index 11200a08240..70d3dbf7d8c 100644 --- a/meta/recipes-support/vim/vim.inc +++ b/meta/recipes-support/vim/vim.inc @@ -20,6 +20,7 @@ SRC_URI = "git://github.com/vim/vim.git;branch=master;protocol=https;tag=v${PV} file://CVE-2026-26269.patch \ file://CVE-2026-33412.patch \ file://CVE-2026-28418.patch \ + file://CVE-2026-28419.patch \ " PV .= ".1683" From patchwork Thu Apr 16 22:29:56 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86326 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 192F8F8DFEA for ; Thu, 16 Apr 2026 22:33:16 +0000 (UTC) Received: from mail-wm1-f65.google.com (mail-wm1-f65.google.com [209.85.128.65]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.28255.1776378789074481406 for ; Thu, 16 Apr 2026 15:33:09 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=wRJ8NiDB; spf=pass (domain: smile.fr, ip: 209.85.128.65, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f65.google.com with SMTP id 5b1f17b1804b1-488e1a8ac40so507125e9.2 for ; Thu, 16 Apr 2026 15:33:08 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378787; x=1776983587; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=LVxFLZXyxleC1/tWo9DUC3Wm/ch6/RCWSpYsaOU0/Q4=; b=wRJ8NiDBekYKj83kiAi/7XyH7YOl18mtoFI+2oOGbrLlhq2U8FhJSIaEPfmrACYrBu Gd/U5KosRKKJh9VjNzmqgd4kKkWo+rYYni0SQmmWf6DmmM6eJhGbJ6W+FQPY4gyrfpVW Wct6JaZbehfIV4AZsPT+hK81b+uflJ2+EN1UE= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378787; x=1776983587; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=LVxFLZXyxleC1/tWo9DUC3Wm/ch6/RCWSpYsaOU0/Q4=; b=tWWO/jcWM6etg+/y4HDWMPUwPuMnhloDba8nbxuiN7Rs8N26jG5qQ6WSX4Mua3UnB8 IFkvjli2LVzIp8mucWvbMSujgXGVb1ORyaT+Sn68L+Tnt10k1996qWzf8clKYr7Vp378 8xf+xNX02885AJHJUwkudDE9v3lEjpUnU7wzrHQjV9xxyF1uoBVUgrS7atKWhNtQ5uA1 QzYw8yCbYWOgM3iyITKH63PtYtkwO75NHjLu+YjHSXEXzqkaE8crvcBENML3S+l5v9Dh ULnS9/LwEnQJyuQYc+NITQBckfehJirdbZcQkoaTtBKYLASGSZ8E/US8wMIvH6pHOy7k RLXA== X-Gm-Message-State: AOJu0YzrJ+AJZMgWrrIbLeUnGVu+7ICDTgahs7BiYsKzzPJqUHrWfe27 oaHCjuKxJjz8kpGvtkf3dlXB8/lNcgXTzfwUD/7c6oDL9AUA0rZ08zMYo+VFbiy1/s7VmFu5aUe aUj7Zt3GaAPZ7 X-Gm-Gg: AeBDiet0cVTdcIwvHkrvtZC+tg34+6AJSFEJe8vJk7DahOxbSDNR5udd/5n66tHzkKV cDVzifmtuSP7YX0ZAdWXtyQgVogUGIFRQjsvZbtP7GQhh3AYSdY9MJ6IEC5zykCAYNyex7C2mv/ Ss0n7k9+MNp+lOUXAzz8g/DU3/pew1fBe5MslRgOfVSTHjCgAE3eAoha+NWvO6vwZOZn9pVMLHl 6cMGtZUd/DZ8SjZYSPhpKOjfKpjPvaXoaa05RjxrSaZVG7kBy8Qj23RxTR6rK8VHEkHyEigMj5A Md+cJRDH3Nx0NxvifzOLldslrRwChop3p+OT7Ph+8eLB9vGUS4lmDX74NUyVMdKgLqYqYBsb3GZ hwaqf25lQalHiFq/UMF1t7y0zTfIQJdg4ncD7XKo7m9RPsdm4lj01PetPgLj4jjdqqWv5waTzGH YzY6Lybn1EsQshaSKhSEPgjEqSPAxwVdf3GR5wfcLl8Xu2tXo3tWrJgLRkEJKMBpTYpdmxM0Ycp g52oX3FWQ6atJZHFsHXnQPGSIUAXyr2m1T4aopBLqjmCQA/ X-Received: by 2002:a05:600c:8b68:b0:488:7f69:4abf with SMTP id 5b1f17b1804b1-488fb75405fmr5977795e9.12.1776378787121; Thu, 16 Apr 2026 15:33:07 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.06 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:06 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 13/51] binutils: Fix build with GLIBC 2.43 on the host Date: Fri, 17 Apr 2026 00:29:56 +0200 Message-ID: <47c73e8d5c4b60e7a9124010352804507b76d75d.1776377993.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:16 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235442 From: Zoltán Böszörményi Added a patch to fix a build error in the CALL_UTIL() macro when built against GLIBC 2.43 on Fedora 44. This fixes binutils-native. Signed-off-by: Zoltán Böszörményi Signed-off-by: Yoann Congal --- .../binutils/binutils-2.45.inc | 1 + ...tect-against-standard-library-macros.patch | 34 +++++++++++++++++++ 2 files changed, 35 insertions(+) create mode 100644 meta/recipes-devtools/binutils/binutils/0001-gprofng-protect-against-standard-library-macros.patch diff --git a/meta/recipes-devtools/binutils/binutils-2.45.inc b/meta/recipes-devtools/binutils/binutils-2.45.inc index f635d76069a..81d46bfb734 100644 --- a/meta/recipes-devtools/binutils/binutils-2.45.inc +++ b/meta/recipes-devtools/binutils/binutils-2.45.inc @@ -52,4 +52,5 @@ SRC_URI = "\ file://CVE-2025-69644_CVE-2025-69647.patch \ file://CVE-2025-69649.patch \ file://CVE-2025-69652.patch \ + file://0001-gprofng-protect-against-standard-library-macros.patch \ " diff --git a/meta/recipes-devtools/binutils/binutils/0001-gprofng-protect-against-standard-library-macros.patch b/meta/recipes-devtools/binutils/binutils/0001-gprofng-protect-against-standard-library-macros.patch new file mode 100644 index 00000000000..b626c51b6cd --- /dev/null +++ b/meta/recipes-devtools/binutils/binutils/0001-gprofng-protect-against-standard-library-macros.patch @@ -0,0 +1,34 @@ +From 5f66aee7f4bec7a2d8378034116f5e5c3dc50f41 Mon Sep 17 00:00:00 2001 +From: Andreas Schwab +Date: Sat, 22 Nov 2025 11:29:43 +0100 +Subject: [PATCH] gprofng: protect against standard library macros + +The CALL_UTIL macro can expand to an unparsable expression of the argument +is a macro, like with the new const-preserving standard library macros in +C23. + + * gprofng/src/collector_module.h (CALL_UTIL): Add parens to not + expand its argument if it is a function-like macro. + +Signed-off-by: Andreas Schwab +Upstream-Status: Backport [https://sourceware.org/git/?p=binutils-gdb.git;a=commit;h=5f66aee7f4bec7a2d8378034116f5e5c3dc50f41] +--- + gprofng/src/collector_module.h | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/gprofng/src/collector_module.h b/gprofng/src/collector_module.h +index b64d69c45ab..859a6dd1f7d 100644 +--- a/gprofng/src/collector_module.h ++++ b/gprofng/src/collector_module.h +@@ -119,7 +119,7 @@ typedef struct CollectorUtilFuncs + extern CollectorUtilFuncs __collector_util_funcs; + extern int __collector_dlsym_guard; + +-#define CALL_UTIL(x) __collector_util_funcs.x ++#define CALL_UTIL(x) (__collector_util_funcs.x) + + /* The following constants define the meaning of the "void *arg" + * argument of getFrameInfo(). +-- +2.53.0 + From patchwork Thu Apr 16 22:29:57 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86327 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 26633F8DFEF for ; Thu, 16 Apr 2026 22:33:16 +0000 (UTC) Received: from mail-wm1-f66.google.com (mail-wm1-f66.google.com [209.85.128.66]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.28567.1776378789650314185 for ; Thu, 16 Apr 2026 15:33:09 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=Zumzj6zL; spf=pass (domain: smile.fr, ip: 209.85.128.66, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f66.google.com with SMTP id 5b1f17b1804b1-48896199cbaso495195e9.1 for ; Thu, 16 Apr 2026 15:33:09 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378788; x=1776983588; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=ETGuimHbfVbFgfDSPVFns+rP2MD8XnFFc9aSAz2BHI8=; b=Zumzj6zLK5nHTSOPpvyP17GznhWZ8uzuhSQWOkD1J/a0gslHlN0zUPHNz4+1v1Xnwc 3g45LRqtPvPeEgB263iRPSB7oAptHUUdrxwpD7pZ5IScJx+3HS+9alsjsnG0wQO/17JI SYYc+Rp8mRBa5x0yOzTDKQT8PsgRIPIHR5ALM= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378788; x=1776983588; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=ETGuimHbfVbFgfDSPVFns+rP2MD8XnFFc9aSAz2BHI8=; b=f+jK5Y8Es+ANlo3diWLvjicyXsIMHku7wZ3ZGo2oiBJTDF10VOkEti35mh3E31RqSQ p15uvD0Km2XZRf17h3xCShWo1JFwHOAE2y8j1BG1XLI46jM3OWgRax4pSQ88kLdm1U+T 5i3sbP6SMi23S1NC98SkakNXr7sanWBX3XFC5E3N+GNJ18hcW8yfEj6Dxb2tXkJOMC7D H8mlh1QnkP5/yrxO9o8hYH1MQdCbFCaGMar81kL7yNHPaxodYOx2F4ahGmT5zZStOT3x 6dIJCSHC2cWraWq8qBDEkdViLnY5oop2suO4lZmVUInERf5/Noh70Jilq9+5QFEGbxCp 3hig== X-Gm-Message-State: AOJu0YzL/TVfETxnMkwXl7E2ErplF7Lm7ws0mHTlaxiHo1xnNLwNyqhF TCsZK8aMgdfGEKBUWWqUxxzEmwqr7e530PpeWhXPl5HaQE0N1BdxoiGl+Mvt+uZtLl3XYIdbz4D lnN3+J0OI6TR8 X-Gm-Gg: AeBDietx0tsVPqB6Ya9sM8p0bBIip4Hvzq/Rj5kcUm3Gl8CcLcRzPkZFLXf6eRL2fGI GPaU4ge/pgqfTUei0UQ8ZMycCoGFfNxUFt6791LalL5lfQmZsQeCpg74QL9ci0gJAfusd4RaK3i c+nD+Hyo9SWa7L5aZHuVbyb/lD8VCzhdEuvns1EQ0NxN4zfhfaNlyEYlz6VeuMBmi1etx7rgT4B QijqJhGbQ7B9lM1Os9sHHPPYKN0sU471hd7wswyfHqYVUSBf4D4t8gIs/GsM2a67Xi853ZOGeun Ozxq6ObWKaX4SiRW574LAgFGSaKj4eMr1UnNB8Y1HujWK/VWXSK0UB78+zal4wodIUPbYDa9npo dshqrP84bE2YfpxOeFWu1R+BX93sh3Nr8uPgVSBmmulbBDfSwlxUCpB1lgSojKgnL/hPYTpkJGm kFb1Xwq9EghBqRR6HW23xgfhOJYnleWxIvb5WevbYZA25/9JuM8ILJuTE3R7let62VDS5SKJRht lCeNtKIae0/lbsapPeyq2XTq60ez0/d+2RevA== X-Received: by 2002:a05:600d:8449:b0:488:869c:edaa with SMTP id 5b1f17b1804b1-488fb74e103mr4285825e9.7.1776378787719; Thu, 16 Apr 2026 15:33:07 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.07 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:07 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 14/51] gcc: backport a fix for building with gcc-16 Date: Fri, 17 Apr 2026 00:29:57 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:16 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235443 From: Martin Jansa Fixes: https://errors.yoctoproject.org/Errors/Details/905192/ when building on host with gcc-16 Signed-off-by: Martin Jansa Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit 9eabea38f0c17d41d97284d63a25e45da3c9bbcc) Signed-off-by: Yoann Congal --- meta/recipes-devtools/gcc/gcc-15.2.inc | 1 + ...dy-Make-it-buildable-by-C-11-to-C-26.patch | 257 ++++++++++++++++++ 2 files changed, 258 insertions(+) create mode 100644 meta/recipes-devtools/gcc/gcc/0028-libcody-Make-it-buildable-by-C-11-to-C-26.patch diff --git a/meta/recipes-devtools/gcc/gcc-15.2.inc b/meta/recipes-devtools/gcc/gcc-15.2.inc index d178b254878..69eff3621d0 100644 --- a/meta/recipes-devtools/gcc/gcc-15.2.inc +++ b/meta/recipes-devtools/gcc/gcc-15.2.inc @@ -73,6 +73,7 @@ SRC_URI = "${BASEURI} \ file://0024-Avoid-hardcoded-build-paths-into-ppc-libgcc.patch \ file://0025-gcc-testsuite-tweaks-for-mips-OE.patch \ file://0026-fix-pr90579-testcases.patch \ + file://0028-libcody-Make-it-buildable-by-C-11-to-C-26.patch \ " UNPACKDIR = "${TMPDIR}/work-shared/gcc-${PV}-${PR}/sources" diff --git a/meta/recipes-devtools/gcc/gcc/0028-libcody-Make-it-buildable-by-C-11-to-C-26.patch b/meta/recipes-devtools/gcc/gcc/0028-libcody-Make-it-buildable-by-C-11-to-C-26.patch new file mode 100644 index 00000000000..431facb0110 --- /dev/null +++ b/meta/recipes-devtools/gcc/gcc/0028-libcody-Make-it-buildable-by-C-11-to-C-26.patch @@ -0,0 +1,257 @@ +From 0ffe3c9af4e5d5468df742512b6e930fe7039230 Mon Sep 17 00:00:00 2001 +From: Jakub Jelinek +Date: Fri, 21 Nov 2025 16:25:58 +0100 +Subject: [PATCH] libcody: Make it buildable by C++11 to C++26 + +The following builds with -std=c++11 and c++14 and c++17 and c++20 and c++23 +and c++26. + +I see the u8 string literals are mixed e.g. with strerror, so in +-fexec-charset=IBM1047 there will still be garbage, so am not 100% sure if +the u8 literals everywhere are worth it either. + +2025-11-21 Jakub Jelinek + + * cody.hh (S2C): For __cpp_char8_t >= 201811 use char8_t instead of + char in argument type. + (MessageBuffer::Space): Revert 2025-11-15 change. + (MessageBuffer::Append): For __cpp_char8_t >= 201811 add overload + with char8_t const * type of first argument. + (Packet::Packet): Similarly for first argument. + * client.cc (CommunicationError, Client::ProcessResponse, + Client::Connect, ConnectResponse, PathnameResponse, OKResponse, + IncludeTranslateResponse): Cast u8 string literals to (const char *) + where needed. + * server.cc (Server::ProcessRequests, ConnectRequest): Likewise. + +Signed-off-by: Martin Jansa +Upstream-Status: Backport [07a767c7a50d1daae8ef7d4aba73fe53ad40c0b7] +--- + libcody/client.cc | 36 +++++++++++++++++++----------------- + libcody/cody.hh | 22 ++++++++++++++++++++++ + libcody/server.cc | 28 ++++++++++++++-------------- + 3 files changed, 55 insertions(+), 31 deletions(-) + +diff --git a/libcody/client.cc b/libcody/client.cc +index ae69d190cb77..147fecdbe500 100644 +--- a/libcody/client.cc ++++ b/libcody/client.cc +@@ -97,7 +97,7 @@ int Client::CommunicateWithServer () + + static Packet CommunicationError (int err) + { +- std::string e {u8"communication error:"}; ++ std::string e {(const char *) u8"communication error:"}; + e.append (strerror (err)); + + return Packet (Client::PC_ERROR, std::move (e)); +@@ -110,33 +110,34 @@ Packet Client::ProcessResponse (std::vector &words, + { + if (e == EINVAL) + { +- std::string msg (u8"malformed string '"); ++ std::string msg ((const char *) u8"malformed string '"); + msg.append (words[0]); +- msg.append (u8"'"); ++ msg.append ((const char *) u8"'"); + return Packet (Client::PC_ERROR, std::move (msg)); + } + else +- return Packet (Client::PC_ERROR, u8"missing response"); ++ return Packet (Client::PC_ERROR, (const char *) u8"missing response"); + } + + Assert (!words.empty ()); +- if (words[0] == u8"ERROR") ++ if (words[0] == (const char *) u8"ERROR") + return Packet (Client::PC_ERROR, +- words.size () == 2 ? words[1]: u8"malformed error response"); ++ words.size () == 2 ? words[1] ++ : (const char *) u8"malformed error response"); + + if (isLast && !read.IsAtEnd ()) + return Packet (Client::PC_ERROR, +- std::string (u8"unexpected extra response")); ++ std::string ((const char *) u8"unexpected extra response")); + + Assert (code < Detail::RC_HWM); + Packet result (responseTable[code] (words)); + result.SetRequest (code); + if (result.GetCode () == Client::PC_ERROR && result.GetString ().empty ()) + { +- std::string msg {u8"malformed response '"}; ++ std::string msg {(const char *) u8"malformed response '"}; + + read.LexedLine (msg); +- msg.append (u8"'"); ++ msg.append ((const char *) u8"'"); + result.GetString () = std::move (msg); + } + else if (result.GetCode () == Client::PC_CONNECT) +@@ -199,7 +200,7 @@ Packet Client::Connect (char const *agent, char const *ident, + size_t alen, size_t ilen) + { + write.BeginLine (); +- write.AppendWord (u8"HELLO"); ++ write.AppendWord ((const char *) u8"HELLO"); + write.AppendInteger (Version); + write.AppendWord (agent, true, alen); + write.AppendWord (ident, true, ilen); +@@ -211,7 +212,8 @@ Packet Client::Connect (char const *agent, char const *ident, + // HELLO $version $agent [$flags] + Packet ConnectResponse (std::vector &words) + { +- if (words[0] == u8"HELLO" && (words.size () == 3 || words.size () == 4)) ++ if (words[0] == (const char *) u8"HELLO" ++ && (words.size () == 3 || words.size () == 4)) + { + char *eptr; + unsigned long val = strtoul (words[1].c_str (), &eptr, 10); +@@ -247,7 +249,7 @@ Packet Client::ModuleRepo () + // PATHNAME $dir | ERROR + Packet PathnameResponse (std::vector &words) + { +- if (words[0] == u8"PATHNAME" && words.size () == 2) ++ if (words[0] == (const char *) u8"PATHNAME" && words.size () == 2) + return Packet (Client::PC_PATHNAME, std::move (words[1])); + + return Packet (Client::PC_ERROR, u8""); +@@ -256,7 +258,7 @@ Packet PathnameResponse (std::vector &words) + // OK or ERROR + Packet OKResponse (std::vector &words) + { +- if (words[0] == u8"OK") ++ if (words[0] == (const char *) u8"OK") + return Packet (Client::PC_OK); + else + return Packet (Client::PC_ERROR, +@@ -319,11 +321,11 @@ Packet Client::IncludeTranslate (char const *include, Flags flags, size_t ilen) + // PATHNAME $cmifile + Packet IncludeTranslateResponse (std::vector &words) + { +- if (words[0] == u8"BOOL" && words.size () == 2) ++ if (words[0] == (const char *) u8"BOOL" && words.size () == 2) + { +- if (words[1] == u8"FALSE") +- return Packet (Client::PC_BOOL, 0); +- else if (words[1] == u8"TRUE") ++ if (words[1] == (const char *) u8"FALSE") ++ return Packet (Client::PC_BOOL); ++ else if (words[1] == (const char *) u8"TRUE") + return Packet (Client::PC_BOOL, 1); + else + return Packet (Client::PC_ERROR, u8""); +diff --git a/libcody/cody.hh b/libcody/cody.hh +index 789ce9e70b75..93bce93aa94d 100644 +--- a/libcody/cody.hh ++++ b/libcody/cody.hh +@@ -47,12 +47,21 @@ namespace Detail { + + // C++11 doesn't have utf8 character literals :( + ++#if __cpp_char8_t >= 201811 ++template ++constexpr char S2C (char8_t const (&s)[I]) ++{ ++ static_assert (I == 2, "only single octet strings may be converted"); ++ return s[0]; ++} ++#else + template + constexpr char S2C (char const (&s)[I]) + { + static_assert (I == 2, "only single octet strings may be converted"); + return s[0]; + } ++#endif + + /// Internal buffering class. Used to concatenate outgoing messages + /// and Lex incoming ones. +@@ -123,6 +132,13 @@ public: + Space (); + Append (str, maybe_quote, len); + } ++#if __cpp_char8_t >= 201811 ++ void AppendWord (char8_t const *str, bool maybe_quote = false, ++ size_t len = ~size_t (0)) ++ { ++ AppendWord ((const char *) str, maybe_quote, len); ++ } ++#endif + /// Add a word as with AppendWord + /// @param str the string to append + /// @param maybe_quote string might need quoting, as for Append +@@ -264,6 +280,12 @@ public: + : string (s), cat (STRING), code (c) + { + } ++#if __cpp_char8_t >= 201811 ++ Packet (unsigned c, const char8_t *s) ++ : string ((const char *) s), cat (STRING), code (c) ++ { ++ } ++#endif + Packet (unsigned c, std::vector &&v) + : vector (std::move (v)), cat (VECTOR), code (c) + { +diff --git a/libcody/server.cc b/libcody/server.cc +index e2fa069bb933..c18469fae843 100644 +--- a/libcody/server.cc ++++ b/libcody/server.cc +@@ -36,12 +36,12 @@ static RequestPair + const requestTable[Detail::RC_HWM] = + { + // Same order as enum RequestCode +- RequestPair {u8"HELLO", nullptr}, +- RequestPair {u8"MODULE-REPO", ModuleRepoRequest}, +- RequestPair {u8"MODULE-EXPORT", ModuleExportRequest}, +- RequestPair {u8"MODULE-IMPORT", ModuleImportRequest}, +- RequestPair {u8"MODULE-COMPILED", ModuleCompiledRequest}, +- RequestPair {u8"INCLUDE-TRANSLATE", IncludeTranslateRequest}, ++ RequestPair {(const char *) u8"HELLO", nullptr}, ++ RequestPair {(const char *) u8"MODULE-REPO", ModuleRepoRequest}, ++ RequestPair {(const char *) u8"MODULE-EXPORT", ModuleExportRequest}, ++ RequestPair {(const char *) u8"MODULE-IMPORT", ModuleImportRequest}, ++ RequestPair {(const char *) u8"MODULE-COMPILED", ModuleCompiledRequest}, ++ RequestPair {(const char *) u8"INCLUDE-TRANSLATE", IncludeTranslateRequest}, + }; + } + +@@ -135,21 +135,21 @@ void Server::ProcessRequests (void) + std::string msg; + + if (err > 0) +- msg = u8"error processing '"; ++ msg = (const char *) u8"error processing '"; + else if (ix >= Detail::RC_HWM) +- msg = u8"unrecognized '"; ++ msg = (const char *) u8"unrecognized '"; + else if (IsConnected () && ix == Detail::RC_CONNECT) +- msg = u8"already connected '"; ++ msg = (const char *) u8"already connected '"; + else if (!IsConnected () && ix != Detail::RC_CONNECT) +- msg = u8"not connected '"; ++ msg = (const char *) u8"not connected '"; + else +- msg = u8"malformed '"; ++ msg = (const char *) u8"malformed '"; + + read.LexedLine (msg); +- msg.append (u8"'"); ++ msg.append ((const char *) u8"'"); + if (err > 0) + { +- msg.append (u8" "); ++ msg.append ((const char *) u8" "); + msg.append (strerror (err)); + } + resolver->ErrorResponse (this, std::move (msg)); +@@ -176,7 +176,7 @@ Resolver *ConnectRequest (Server *s, Resolver *r, + return nullptr; + + if (words.size () == 3) +- words.emplace_back (u8""); ++ words.emplace_back ((const char *) u8""); + unsigned version = ParseUnsigned (words[1]); + if (version == ~0u) + return nullptr; From patchwork Thu Apr 16 22:29:58 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86328 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 38B85F8DFF1 for ; Thu, 16 Apr 2026 22:33:16 +0000 (UTC) Received: from mail-wm1-f67.google.com (mail-wm1-f67.google.com [209.85.128.67]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.28568.1776378790195326239 for ; Thu, 16 Apr 2026 15:33:10 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=p2yLlfCD; spf=pass (domain: smile.fr, ip: 209.85.128.67, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f67.google.com with SMTP id 5b1f17b1804b1-488ba840146so418655e9.1 for ; Thu, 16 Apr 2026 15:33:09 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378788; x=1776983588; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=9xfxOUvyf5rP0+FcG6K0whv60DNj4BWFYvbItdKejKA=; b=p2yLlfCDfFDihVKtuCMX0baMJfq0Hw3fkv6F/Hn3Z9hpPyVceXxOKtymq/pI+/9Ewt u+4jraEILe2ScAH5OrT95O+PBaSi4gaAzBSpsYlHrFlbelQ6SVsy4P5SWVV4SMCB3rnp 8Qlz15OCXFnF6vomA1floNn8kQVhpOsiW7qOk= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378788; x=1776983588; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=9xfxOUvyf5rP0+FcG6K0whv60DNj4BWFYvbItdKejKA=; b=krTnECLaOvGD+TrFziLa+49Jet5vJ6km215MMjBUEGH+DWt8mvrlPviAg6u8PS7IIP qLBufEYhrlvU4Pv/LvzBQhn6lAcYHRl/57IPMHlIJS3Ll/mqYt5+5p592A1AjyBdG+zY FJdl4yQoBC9ZAjKqWeHARoeeO/V4kKoWtcRURvb9+WixSiYzYTIVuSVODY5jzYspEjJW 1oqNsUtRT4YY2L+s6M/o+5GQzJtAcYhdR+ocliKpaJ+/58dBjeKF14xFFdlf2kLr0wsi dWtpiqwt0odOMp2YnQghbEn94CLyYk7zqM4wVPfr9hpMoQ2Wewy266ETdB8NJqOkF5zu 85ow== X-Gm-Message-State: AOJu0Yx+LvZ5HTYS7yeA+h0Vp+8EpaMk3pL8rDwozhU25hL23jl52aFT IIW8D2ysQ939v/ZhvV93u/JQOyEn7ASwEfJJ/rIl7P3caFZuUurVkMcO4sdJecQythFxV1DfG8l VHydf3vYTDtLR X-Gm-Gg: AeBDiespo0b12gQ1FB3Snoem1mkB1JC+j+aGTky2QBtCZbzbsamzsk5Kum5pj3wxNao JHHx9AFjpOGdMAxP8y0Vc/Hl9ZdoIAEnnQ01GW7u4Dx9gxAo87Ezb2YfMoD6Yef0PjqkO9aDpXH kc953Ow/9ZTk/B98Q3213bhH4+D6o6kobODBmBeNzBnOSWBUaC78psKiLoB43sdT4i13BfcJKh3 bSMfgwoeNVU1ZgvxU7LPfU6/EcBZ/NiTOb/1rjjzxE4Sm+HO1gV7SBZDpw8qzKJoJpDBLKdEDou aTDidVA9Q/Yi3Tmbxgpc9m69+dVUZEJvcCABIHdsElFlZI+gO3NgCzwUwePdwamwZmfdTjJnXov z5knKb8jvUuJkfdSc9sRS4Ew82bDZ7yzgLMPb7JqC595YDSyvl/Kl5EmoimcvwK8Vt3jn6NR9tN kJmv6G7FCVolyl9rlkBH0nZW9122MxEgUXBEX7NDj9/vT3qK2crmBmxd7pWM5/LULlEbBGX82RP 0FuBJytuxWEroHa4sX4OjSZ086p2wfDcCnMEg== X-Received: by 2002:a05:600c:6289:b0:488:f941:aab2 with SMTP id 5b1f17b1804b1-488fb78a561mr5078725e9.30.1776378788315; Thu, 16 Apr 2026 15:33:08 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.07 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:07 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 15/51] barebox/barebox-tools: upgrade 2025.09.0 -> 2025.09.3 Date: Fri, 17 Apr 2026 00:29:58 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:16 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235444 From: Ankur Tyagi 2025.09.3 --------- Fixed FIT image vulnerability https://lore.barebox.org/barebox/abljJRMecNdejSD0@pengutronix.de/ Changelog: https://github.com/barebox/barebox/compare/v2025.09.2...v2025.09.3 2025.09.2 --------- Changelog: https://github.com/barebox/barebox/compare/v2025.09.1...v2025.09.2 2025.09.1 --------- This stable release is specifically targeted at whinlatter which is currently at v2025.09.0 https://lore.barebox.org/barebox/aUkaSKDePHF8__LB@pengutronix.de/ Changelog: https://github.com/barebox/barebox/compare/v2025.09.0...v2025.09.1 Signed-off-by: Ankur Tyagi Signed-off-by: Yoann Congal --- meta/recipes-bsp/barebox/barebox-common.inc | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/meta/recipes-bsp/barebox/barebox-common.inc b/meta/recipes-bsp/barebox/barebox-common.inc index e41d0858fd9..91865b4d44c 100644 --- a/meta/recipes-bsp/barebox/barebox-common.inc +++ b/meta/recipes-bsp/barebox/barebox-common.inc @@ -3,6 +3,6 @@ SECTION = "bootloaders" LIC_FILES_CHKSUM = "file://COPYING;md5=f5125d13e000b9ca1f0d3364286c4192" -PV = "2025.09.0" +PV = "2025.09.3" SRC_URI = "https://barebox.org/download/barebox-${PV}.tar.bz2" -SRC_URI[sha256sum] = "7df1aa47bb7bf1763a729137ac773e69a4052812af094475d739fc63a9295f0d" +SRC_URI[sha256sum] = "e87eb863cbe45e4f5af8930825c8f6e20c02b82451e9e1125ea1c73c1fb49a87" From patchwork Thu Apr 16 22:29:59 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86332 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 45016F8DFF3 for ; Thu, 16 Apr 2026 22:33:16 +0000 (UTC) Received: from mail-wm1-f66.google.com (mail-wm1-f66.google.com [209.85.128.66]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.28569.1776378791108125358 for ; Thu, 16 Apr 2026 15:33:11 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=BUDokd2H; spf=pass (domain: smile.fr, ip: 209.85.128.66, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f66.google.com with SMTP id 5b1f17b1804b1-488b8efed61so688635e9.1 for ; Thu, 16 Apr 2026 15:33:10 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378789; x=1776983589; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=0n9FjqaiKYxFXQPW+GkL0tGMIOvJf7FGucVcrl0XFDk=; b=BUDokd2H+R97eiKDbXiGVjztRxcLJcVyah8t2w+eZ38BibEIUwJa2L/cLyWrx9oq0F FxRiItWmHIX1Y8zzmoBiIcekF0Y7lLSx/o5hLHKk/MEG+hOVXHC+n6BGxG9TT6wIU8OC xj4FflqI9JcDqfBskJEoIdJtnwnTl4VIfQXHM= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378789; x=1776983589; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=0n9FjqaiKYxFXQPW+GkL0tGMIOvJf7FGucVcrl0XFDk=; b=Ie0m+ppWpdRlLlZn1D+UoTuM4zO6CAmQ0/6jSKZ5lwtWxIO0ECsqTNxKjvkcqjhziC 4pjl96gMnp0VhxMx8/HRXxlB/tWjKPZxKWCiGQPSibOhLxWVxEH7SaJAdJd/ZYeFYaxX wGBojpilD1l9ycEYB2oCMtDfc1Tpdtx3O4Njm9778cHBf15/H5x9JURVdHGoTS5NZUZ9 hX1guX8s1cjarmSqzlokQ+zi5KYptDYsdZ0WsqJA4/+m0tjGSJzDGih+kI4/027Y7CJ9 Eu5S9YLymyo3R7gnB3jBeW9PEzYxKpJF7h/qapKsUvj0fvi8elcTrjVpz0XHNZ+yoxKo Y37g== X-Gm-Message-State: AOJu0Yw19Nim1Tfh5fTMLHn3/HrBK0EWT75TyazZAoend4Cs0la7AkRY UbKkYBNI0fZ8qjq5bHfM6d2a7qfgs2QbLAEkIkiJfdBYOnIJQCOc8LhC13Dcs4HjOIn8NuB2tRA 3vetVpFfc2jQD X-Gm-Gg: AeBDies4KCcvYzblh86dewlGvDc6Ikbf5WDG99rF9TvSG7PsBjiRZ9WAd1kgv0FU6jd 23qQ2v/sN+K5vag7VEQ7V31jqNcERKuMpDrg93MDT0Q1EAmuhtIwNTtDfXx5+dsd+gRYMHK0mv8 K1ElXqkPrlt0RCtyaGqALcbzjyPWhM+9TECP4i5dA5qJgUnkRVKPXVSnnJ4bUROC9f/eBJR4oFl s7Aep62pm/oXOp7y2HoRazcxjbOJ/1IZBnOFEAsEV5Q7UheJLPYw1tN56g7G0esCqKX1TEltvCH FECfckWhKJDhmqwzBt6+LqMtKyjEx4c15ZRfxMisu5lB2Zq/kcEqPT3LbzN3t6fxGWbYaC2eHKq 4a1QA9NmVFeFYJrwVhhtHRkZt3dlHrW7MSElaYbmLHIY4TS8od12wRUK4Xc6fZpmGu2uj/R22LL uFeu1efFhXL0WPaCHbaylSf9KrinCBt0F1lehrEfsmYS58lCmItjDqtTutNSzoZ73a/JGp7FXRz VYI9Mqwwmjt6Dm0DJbmYWNy7R1fgFuwwUtWRyT7hOJQvNPU X-Received: by 2002:a05:600c:3150:b0:485:3cef:d6ea with SMTP id 5b1f17b1804b1-488fb8b9deamr2690005e9.13.1776378789225; Thu, 16 Apr 2026 15:33:09 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.08 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:08 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 16/51] openssl: upgrade 3.5.5 -> 3.5.6 Date: Fri, 17 Apr 2026 00:29:59 +0200 Message-ID: <0f6e3b8446558a471e38d4e76b105014512853dc.1776377993.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:16 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235445 From: Peter Marko Release information [1]: OpenSSL 3.5.6 is a security patch release. The most severe CVE fixed in this release is Medium. This release incorporates the following bug fixes and mitigations: * Fixed incorrect failure handling in RSA KEM RSASVE encapsulation. (CVE-2026-31790) * Fixed loss of key agreement group tuple structure when the DEFAULT keyword is used in the server-side configuration of the key-agreement group list. (CVE-2026-2673) * Fixed potential use-after-free in DANE client code. (CVE-2026-28387) * Fixed NULL pointer dereference when processing a delta CRL. (CVE-2026-28388) * Fixed possible NULL dereference when processing CMS KeyAgreeRecipientInfo. (CVE-2026-28389) * Fixed possible NULL dereference when processing CMS KeyTransportRecipientInfo. (CVE-2026-28390) * Fixed heap buffer overflow in hexadecimal conversion. (CVE-2026-31789) [1] https://github.com/openssl/openssl/blob/openssl-3.5/NEWS.md#major-changes-between-openssl-355-and-openssl-356-7-apr-2026 Signed-off-by: Peter Marko Signed-off-by: Richard Purdie (cherry picked from commit fc25ce383ddcb1185c193ff2b10f9116741eb316) Signed-off-by: Yoann Congal --- ...1-buildinfo-strip-sysroot-and-debug-prefix-map-from-co.patch | 2 +- .../openssl/{openssl_3.5.5.bb => openssl_3.5.6.bb} | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) rename meta/recipes-connectivity/openssl/{openssl_3.5.5.bb => openssl_3.5.6.bb} (99%) diff --git a/meta/recipes-connectivity/openssl/openssl/0001-buildinfo-strip-sysroot-and-debug-prefix-map-from-co.patch b/meta/recipes-connectivity/openssl/openssl/0001-buildinfo-strip-sysroot-and-debug-prefix-map-from-co.patch index dadc034c913..bfbfedbd67e 100644 --- a/meta/recipes-connectivity/openssl/openssl/0001-buildinfo-strip-sysroot-and-debug-prefix-map-from-co.patch +++ b/meta/recipes-connectivity/openssl/openssl/0001-buildinfo-strip-sysroot-and-debug-prefix-map-from-co.patch @@ -38,7 +38,7 @@ diff --git a/Configurations/unix-Makefile.tmpl b/Configurations/unix-Makefile.tm index 09303c4..011bda1 100644 --- a/Configurations/unix-Makefile.tmpl +++ b/Configurations/unix-Makefile.tmpl -@@ -513,13 +513,27 @@ BIN_LDFLAGS={- join(' ', $target{bin_lflags} || (), +@@ -514,13 +514,27 @@ BIN_LDFLAGS={- join(' ', $target{bin_lflags} || (), '$(CNF_LDFLAGS)', '$(LDFLAGS)') -} BIN_EX_LIBS=$(CNF_EX_LIBS) $(EX_LIBS) diff --git a/meta/recipes-connectivity/openssl/openssl_3.5.5.bb b/meta/recipes-connectivity/openssl/openssl_3.5.6.bb similarity index 99% rename from meta/recipes-connectivity/openssl/openssl_3.5.5.bb rename to meta/recipes-connectivity/openssl/openssl_3.5.6.bb index c0d02b617ba..cbe7ed144e0 100644 --- a/meta/recipes-connectivity/openssl/openssl_3.5.5.bb +++ b/meta/recipes-connectivity/openssl/openssl_3.5.6.bb @@ -19,7 +19,7 @@ SRC_URI:append:class-nativesdk = " \ file://environment.d-openssl.sh \ " -SRC_URI[sha256sum] = "b28c91532a8b65a1f983b4c28b7488174e4a01008e29ce8e69bd789f28bc2a89" +SRC_URI[sha256sum] = "deae7c80cba99c4b4f940ecadb3c3338b13cb77418409238e57d7f31f2a3b736" inherit lib_package multilib_header multilib_script ptest perlnative manpages MULTILIB_SCRIPTS = "${PN}-bin:${bindir}/c_rehash" From patchwork Thu Apr 16 22:30:00 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86324 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id A1332F8DFE5 for ; Thu, 16 Apr 2026 22:33:15 +0000 (UTC) Received: from mail-wm1-f65.google.com (mail-wm1-f65.google.com [209.85.128.65]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.28256.1776378791700917064 for ; Thu, 16 Apr 2026 15:33:12 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=X1GJObsr; spf=pass (domain: smile.fr, ip: 209.85.128.65, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f65.google.com with SMTP id 5b1f17b1804b1-488a041eae5so266385e9.1 for ; Thu, 16 Apr 2026 15:33:11 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378790; x=1776983590; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=r3uz/IBC8WoEl6OgkTCty9zioKhFMNZuwF2w6RxRGuE=; b=X1GJObsr+KmY2/c+1U+mqAbSv6C+yxHayrlOiI3mE9cuKl9/hUxftKQ+aRN3Uuvz3D DjeTVtXGpcv8njmJ81ybPYxvcGXw/So6yTYTXI7d8fTNPNmSZbK0qEOq+I33LhSVQiLD hnjXX9YQf1hjzSUjMocBnszssAYJihYH7RTBU= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378790; x=1776983590; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=r3uz/IBC8WoEl6OgkTCty9zioKhFMNZuwF2w6RxRGuE=; b=eDrCQjCZ1UwqRTwoMTSAQaWg504Edquqp3i0HhBJTl75odWT81fmhVccGmIMbHI+c8 CpGTLx/wlPtUnj4asn+Ye0jl8EirW1ZrkxfnuSPmSh2+EJFWjnF+tDpP1VipXJ+Z02rR m4+5UKg0IuBfxDe6J6BomGeTGiK3BY69mwmLs3TysBZ6qMNoLCL57nz09qpHcxgifFHv 6QKfB+TMB00i88esAiiWOptxUUULom3IgS6bc4t4Zh10IOKm93Kn2+1vv4CBmSswaof8 all7y4UmNYKVtHTPWLeZZN09nzW3zmu83uAbZbgh419lLh9mdgCJ+IrhzZBbzC6W1St4 ZAdw== X-Gm-Message-State: AOJu0YxNXX4SwD+QDi17ZulIur1DQ3tO5MLUf53iEUkq8q0ySRqkyk9a 1/kkbzvNGxVs1p/+XBjiW1pVGU4NqHaeNHNfAu8JaEuVKJdp7fOhiio5VyDd/T/Mp1AeUhPnsR9 vzcL7DUrKkCg/ X-Gm-Gg: AeBDietSkHWG1nlZ9vD1KQYsdkn0czG4tqqZoJ5VWX/U1prl57oDyFwGqCNJbccvqAW 62xYEHFIU9ywJvx/TKUnw4KNAnemxhZT0XGmnODL0z0tEDRXvsZYv7ASPm7IcDATV6iGTsaANF8 QX/51h45nrjIXk6F0jFo4GnRSAMANn53WBfyH9/LdKpozILcAZ5uVje/RK3DzbUUZXGI+yJyQZ1 eX4bB2c30vkiq5nRw6CGQ1HLmCyzXebrsAGmtDfvc0JWgKrRXFdPWlkmZx54ZsHciLSMCHuHRr0 t5trvtsLJmqib2GMtN3YFJOEbs/HMNk2iKw8ie2MaJ+BjFmb0YDWC3K0sxFbGSX8Sa+DxB8IahB +IfjYyWX9AReVxqZ4ebrfFT6K8MaAMzXICSCMDE5ajJPwuNPq+8i9i9tzF0QhhVJKJ5OYUdJlk5 v8HpIWiDtLtklglsVc6UDIICv46ftBcoRIVaFP6BSixujS9RbPhE9qlWDKBC1lAiIJtWbSBuu1u vXsz189TD6NO0BVrbmwMf9O3/r5pCWw6zjS6g== X-Received: by 2002:a05:600c:c0db:b0:485:3eba:ab96 with SMTP id 5b1f17b1804b1-488fb73b259mr4354755e9.3.1776378789710; Thu, 16 Apr 2026 15:33:09 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.09 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:09 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 17/51] go: upgrade 1.25.8 -> 1.25.9 Date: Fri, 17 Apr 2026 00:30:00 +0200 Message-ID: <3be4eeea60a52b8694ae0688d794bb44991ae634.1776377993.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:15 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235446 From: Peter Marko Upgrade to latest 1.25.x release [1]: $ git --no-pager log --oneline go1.25.8..go1.25.9 7076e01d9d (tag: go1.25.9) [release-branch.go1.25] go1.25.9 abaa0cbb25 [release-branch.go1.25] cmd/go: disallow cgo trust boundary bypass 02f574a830 [release-branch.go1.25] crypto/tls: prevent deadlock when client sends multiple key update messages 82b0cdb741 [release-branch.go1.25] archive/tar: limit the number of old GNU sparse format entries 7d2dd3488c [release-branch.go1.25] cmd/compile: fix loopbce overflow check logic 72cc33629a [release-branch.go1.25] cmd/compile: fix mem access overlap detection 3ed3169244 [release-branch.go1.25] html/template: properly track JS template literal brace depth across contexts 4c79c4223e [release-branch.go1.25] internal/syscall/unix: properly support AT_SYMLINK_NOFOLLOW on Linux edc1e4a5f2 [release-branch.go1.25] crypto/x509: fix signature checking limit 210b8112b1 [release-branch.go1.25] crypto/x509: hoist policy pruning out of loop 93a4f03ed8 [release-branch.go1.25] runtime/race: apply LLVM zero-initialization fix cff64a5cf3 [release-branch.go1.25] cmd/go: tests: rename git-min-vers->git-sha256 7301bd39d1 [release-branch.go1.25] cmd/go: skip git sha256 tests if git < 2.29 f9532f001a [release-branch.go1.25] test/fixedbugs: remove issue46234 test timeout 4f81fbf332 [release-branch.go1.25] doc: remove template use in godebug.md aed39507b1 [release-branch.go1.25] cmd/go/internal/cache: update trim timestamp before trimming 9a6627a5db [release-branch.go1.25] crypto/x509: fix wildcard domain exclusions. 19c660de6b [release-branch.go1.25] cmd/compile/internal/typecheck: simplify tcSliceHeader b02c84a684 [release-branch.go1.25] cmd/internal/testdir: pass -buildid to link command 814b540c17 [release-branch.go1.25] cmd/internal/testdir: unify link command de86eaeb0f [release-branch.go1.25] cmd/cgo/internal/test: use (syntactic) constant for C array bound Fixes CVE-2026-32282, CVE-2026-32289, CVE-2026-27144, CVE-2026-27143, CVE-2026-32288, CVE-2026-32283, CVE-2026-27140, CVE-2026-32280 and CVE-2026-32281. Release information: [2] [1] https://github.com/golang/go/compare/go1.25.8...go1.25.9 [2] https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU Signed-off-by: Peter Marko Signed-off-by: Yoann Congal --- meta/recipes-devtools/go/{go-1.25.8.inc => go-1.25.9.inc} | 2 +- ...binary-native_1.25.8.bb => go-binary-native_1.25.9.bb} | 6 +++--- ...oss-canadian_1.25.8.bb => go-cross-canadian_1.25.9.bb} | 0 .../go/{go-cross_1.25.8.bb => go-cross_1.25.9.bb} | 0 .../go/{go-crosssdk_1.25.8.bb => go-crosssdk_1.25.9.bb} | 0 .../go/{go-runtime_1.25.8.bb => go-runtime_1.25.9.bb} | 0 ...go-make-content-based-hash-generation-less-pedan.patch | 8 ++++---- .../go/0006-cmd-go-make-GOROOT-precious-by-default.patch | 2 +- meta/recipes-devtools/go/{go_1.25.8.bb => go_1.25.9.bb} | 0 9 files changed, 9 insertions(+), 9 deletions(-) rename meta/recipes-devtools/go/{go-1.25.8.inc => go-1.25.9.inc} (91%) rename meta/recipes-devtools/go/{go-binary-native_1.25.8.bb => go-binary-native_1.25.9.bb} (79%) rename meta/recipes-devtools/go/{go-cross-canadian_1.25.8.bb => go-cross-canadian_1.25.9.bb} (100%) rename meta/recipes-devtools/go/{go-cross_1.25.8.bb => go-cross_1.25.9.bb} (100%) rename meta/recipes-devtools/go/{go-crosssdk_1.25.8.bb => go-crosssdk_1.25.9.bb} (100%) rename meta/recipes-devtools/go/{go-runtime_1.25.8.bb => go-runtime_1.25.9.bb} (100%) rename meta/recipes-devtools/go/{go_1.25.8.bb => go_1.25.9.bb} (100%) diff --git a/meta/recipes-devtools/go/go-1.25.8.inc b/meta/recipes-devtools/go/go-1.25.9.inc similarity index 91% rename from meta/recipes-devtools/go/go-1.25.8.inc rename to meta/recipes-devtools/go/go-1.25.9.inc index 5db1b1c04cb..9a96f6f1704 100644 --- a/meta/recipes-devtools/go/go-1.25.8.inc +++ b/meta/recipes-devtools/go/go-1.25.9.inc @@ -18,4 +18,4 @@ SRC_URI += "\ file://0011-cmd-link-stop-forcing-binutils-gold-dependency-on-aa.patch \ file://0001-runtime-when-using-cgo-on-386-call-C-sigaction-funct.patch \ " -SRC_URI[main.sha256sum] = "e988d4a2446ac7fe3f6daa089a58e9936a52a381355adec1c8983230a8d6c59e" +SRC_URI[main.sha256sum] = "0ec9ef8ebcea097aac37decae9f09a7218b451cd96be7d6ed513d8e4bcf909cf" diff --git a/meta/recipes-devtools/go/go-binary-native_1.25.8.bb b/meta/recipes-devtools/go/go-binary-native_1.25.9.bb similarity index 79% rename from meta/recipes-devtools/go/go-binary-native_1.25.8.bb rename to meta/recipes-devtools/go/go-binary-native_1.25.9.bb index df6cb542fb6..b11b822c946 100644 --- a/meta/recipes-devtools/go/go-binary-native_1.25.8.bb +++ b/meta/recipes-devtools/go/go-binary-native_1.25.9.bb @@ -9,9 +9,9 @@ PROVIDES = "go-native" # Checksums available at https://go.dev/dl/ SRC_URI = "https://dl.google.com/go/go${PV}.${BUILD_GOOS}-${BUILD_GOARCH}.tar.gz;name=go_${BUILD_GOTUPLE}" -SRC_URI[go_linux_amd64.sha256sum] = "ceb5e041bbc3893846bd1614d76cb4681c91dadee579426cf21a63f2d7e03be6" -SRC_URI[go_linux_arm64.sha256sum] = "7d137f59f66bb93f40a6b2b11e713adc2a9d0c8d9ae581718e3fad19e5295dc7" -SRC_URI[go_linux_ppc64le.sha256sum] = "28ed144a945e4d7188c93f8d85fb772a98ed18f8f9f8d3a650696b739f8cc57c" +SRC_URI[go_linux_amd64.sha256sum] = "00859d7bd6defe8bf84d9db9e57b9a4467b2887c18cd93ae7460e713db774bc1" +SRC_URI[go_linux_arm64.sha256sum] = "ec342e7389b7f489564ed5463c63b16cf8040023dabc7861256677165a8c0e2b" +SRC_URI[go_linux_ppc64le.sha256sum] = "b0c41c7da1fc8d39020d65296a0dc54167afd9f76d67064e22c31ce3d839a739" UPSTREAM_CHECK_URI = "https://golang.org/dl/" UPSTREAM_CHECK_REGEX = "go(?P\d+(\.\d+)+)\.linux" diff --git a/meta/recipes-devtools/go/go-cross-canadian_1.25.8.bb b/meta/recipes-devtools/go/go-cross-canadian_1.25.9.bb similarity index 100% rename from meta/recipes-devtools/go/go-cross-canadian_1.25.8.bb rename to meta/recipes-devtools/go/go-cross-canadian_1.25.9.bb diff --git a/meta/recipes-devtools/go/go-cross_1.25.8.bb b/meta/recipes-devtools/go/go-cross_1.25.9.bb similarity index 100% rename from meta/recipes-devtools/go/go-cross_1.25.8.bb rename to meta/recipes-devtools/go/go-cross_1.25.9.bb diff --git a/meta/recipes-devtools/go/go-crosssdk_1.25.8.bb b/meta/recipes-devtools/go/go-crosssdk_1.25.9.bb similarity index 100% rename from meta/recipes-devtools/go/go-crosssdk_1.25.8.bb rename to meta/recipes-devtools/go/go-crosssdk_1.25.9.bb diff --git a/meta/recipes-devtools/go/go-runtime_1.25.8.bb b/meta/recipes-devtools/go/go-runtime_1.25.9.bb similarity index 100% rename from meta/recipes-devtools/go/go-runtime_1.25.8.bb rename to meta/recipes-devtools/go/go-runtime_1.25.9.bb diff --git a/meta/recipes-devtools/go/go/0001-cmd-go-make-content-based-hash-generation-less-pedan.patch b/meta/recipes-devtools/go/go/0001-cmd-go-make-content-based-hash-generation-less-pedan.patch index 6d75266cbe6..921e59c4a20 100644 --- a/meta/recipes-devtools/go/go/0001-cmd-go-make-content-based-hash-generation-less-pedan.patch +++ b/meta/recipes-devtools/go/go/0001-cmd-go-make-content-based-hash-generation-less-pedan.patch @@ -109,7 +109,7 @@ index 7b073165d5..1f618be0bb 100644 } // Configuration specific to compiler toolchain. -@@ -2639,8 +2641,25 @@ func envList(key, def string) []string { +@@ -2636,8 +2638,25 @@ func envList(key, def string) []string { return args } @@ -136,7 +136,7 @@ index 7b073165d5..1f618be0bb 100644 if cppflags, err = buildFlags("CPPFLAGS", "", p.CgoCPPFLAGS, checkCompilerFlags); err != nil { return } -@@ -2656,6 +2675,13 @@ func (b *Builder) CFlags(p *load.Package) (cppflags, cflags, cxxflags, fflags, l +@@ -2653,6 +2672,13 @@ func (b *Builder) CFlags(p *load.Package) (cppflags, cflags, cxxflags, fflags, l if ldflags, err = buildFlags("LDFLAGS", DefaultCFlags, p.CgoLDFLAGS, checkLinkerFlags); err != nil { return } @@ -150,7 +150,7 @@ index 7b073165d5..1f618be0bb 100644 return } -@@ -2673,7 +2699,7 @@ func (b *Builder) cgo(a *Action, cgoExe, objdir string, pcCFLAGS, pcLDFLAGS, cgo +@@ -2670,7 +2696,7 @@ func (b *Builder) cgo(a *Action, cgoExe, objdir string, pcCFLAGS, pcLDFLAGS, cgo p := a.Package sh := b.Shell(a) @@ -159,7 +159,7 @@ index 7b073165d5..1f618be0bb 100644 if err != nil { return nil, nil, err } -@@ -3237,7 +3263,7 @@ func (b *Builder) swigOne(a *Action, file, objdir string, pcCFLAGS []string, cxx +@@ -3238,7 +3264,7 @@ func (b *Builder) swigOne(a *Action, file, objdir string, pcCFLAGS []string, cxx p := a.Package sh := b.Shell(a) diff --git a/meta/recipes-devtools/go/go/0006-cmd-go-make-GOROOT-precious-by-default.patch b/meta/recipes-devtools/go/go/0006-cmd-go-make-GOROOT-precious-by-default.patch index 15ffdb3cf38..4ac478be851 100644 --- a/meta/recipes-devtools/go/go/0006-cmd-go-make-GOROOT-precious-by-default.patch +++ b/meta/recipes-devtools/go/go/0006-cmd-go-make-GOROOT-precious-by-default.patch @@ -94,7 +94,7 @@ index 1f618be0bb..651fa64582 100644 if err := sh.Mkdir(a.Objdir); err != nil { return err } -@@ -1739,6 +1756,14 @@ func (b *Builder) linkShared(ctx context.Context, a *Action) (err error) { +@@ -1736,6 +1753,14 @@ func (b *Builder) linkShared(ctx context.Context, a *Action) (err error) { return err } diff --git a/meta/recipes-devtools/go/go_1.25.8.bb b/meta/recipes-devtools/go/go_1.25.9.bb similarity index 100% rename from meta/recipes-devtools/go/go_1.25.8.bb rename to meta/recipes-devtools/go/go_1.25.9.bb From patchwork Thu Apr 16 22:30:01 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86330 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 58DE7F8DFF2 for ; Thu, 16 Apr 2026 22:33:16 +0000 (UTC) Received: from mail-wm1-f65.google.com (mail-wm1-f65.google.com [209.85.128.65]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.28570.1776378792134605084 for ; Thu, 16 Apr 2026 15:33:12 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=e+3AtNsQ; spf=pass (domain: smile.fr, ip: 209.85.128.65, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f65.google.com with SMTP id 5b1f17b1804b1-488ba840146so418735e9.1 for ; Thu, 16 Apr 2026 15:33:11 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378790; x=1776983590; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=szp4dFfHWgjV6v2/N/AVo3ctLJaHSGVnwRidzPVQiO0=; b=e+3AtNsQRza2RqDY4qgB+Nyp8mLHx7a9WfFHBKAJmHIjRgnS8uw5oTlbZWyAd76cmr gchTe2kgoBAIzenAVLlF2P5YT68zuL/HaOdpLGKeLM4EhTZlEfXgJJioiN+p1V880s6e 54e0UGxFYyR3dbxYlK+xfQ7rgy1dw7R3vCdS0= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378790; x=1776983590; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=szp4dFfHWgjV6v2/N/AVo3ctLJaHSGVnwRidzPVQiO0=; b=W/mjN/1P96X0YH7V/GjFCBdxBufUCW3K4YOOkEBkYHf3nAvUsYVGkocjnoA0HayPDq DhoTyJN1li3C8MsxBCF/6Drl88fDAlxt7UrM8K6oSfN49NbOiH/d+gaq7tikqVvfEiTR LibKiy9/Sw3d+RL/4rle6jPYdcWyJVurB1WQytkpUW+7sg1oBQaXJNlnAxH1w2wlBFGw TNGIEw4Cn6Cw8//+YDzOv2P1VrshShGcqD4jRkZdtTd2vq1HI2dt6JNwtbbzfAVMBtoM 6ihKUL2JL3AVN1+e8AqnUn2JFrP69z93AwY3g7S5DQYD5U1br7OtCs9MkQIlVhQZiQ10 OAPA== X-Gm-Message-State: AOJu0YxhTzPQMEIgt9u7tyk8Cl1qZFUM4MQIH5oH97aiWkjbhIOO4OV+ SLUznT1lm+dc+F0msgZFJt+NdATMfm574tsJHQn3PIDxIhL2dUw3I9y4U12bwF+j9Dhl8yll5Sm 81OzTB4RuTk6h X-Gm-Gg: AeBDieugyLQgDKBenMLIBI5+3i2XvIMmrI1sezCVxhP9EN00M0eg3El/4FYD9c2ROK3 fnuOC/9DFPiynXFIwFUlwhE6Ndx1wNM8E+95Hx+7Jvs3EFiFux+9QjswgqB9sEt+LDv48wxk6vj K1GiuChn0KdzsYxVVRi8QaCrLGKiUoaoFo2HCZ3CRNFiJbSBNaHZtJ2CnePINcO29sTI2ghmt5v C0JDgWbRFhKFYmHMKVJ3MMwzpol5VIKthVMCLmPfgICq8MTnijE51aeH9Uh6/gyUZkM6CYUfZc3 8IQCW4GV7r/HO7GEMTqnIhB4e103Kw3+L+XQZty3aFE+KWnaOj43xdD0iXXDBXv5DocGZop0ezB X2Iciv0ycsT6z8l4/2zpoorY3J0r+4NkARVeWoVLw3qrmRdgzs86L6M7ftWg8FSiUfja4PHk4iI 85Eri0pUfY+6SeCOk6m/Gd5qRwYv+y3FWg1L6uigFc1Z0/Se4MeuNHryDmQ4VD7Hx6AJnZq3WtK tpPTFSIAp/pjuMIXfLeRDeh2LbeCV88Tquuog== X-Received: by 2002:a05:600c:46cb:b0:488:a723:ea53 with SMTP id 5b1f17b1804b1-488fb744fbemr5778465e9.7.1776378790239; Thu, 16 Apr 2026 15:33:10 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.09 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:09 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 18/51] dtc: backport fix for build with glibc-2.43 Date: Fri, 17 Apr 2026 00:30:01 +0200 Message-ID: <47668754cd6829c8687d1ceebce35ba4442fd40f.1776377993.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:16 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235447 From: Martin Jansa glibc-2.43 isn't used in OE builds yet, but this fixes dtc-native: https://errors.yoctoproject.org/Errors/Details/903983/ ../sources/dtc-1.7.2/libfdt/fdt_overlay.c: In function ‘overlay_fixup_phandle’: ../sources/dtc-1.7.2/libfdt/fdt_overlay.c:424:21: error: assignment discards ‘const’ qualifier from pointer target type [-Werror=discarded-qualifiers] 424 | sep = memchr(fixup_str, ':', fixup_len); | ^ ../sources/dtc-1.7.2/libfdt/fdt_overlay.c:434:21: error: assignment discards ‘const’ qualifier from pointer target type [-Werror=discarded-qualifiers] 434 | sep = memchr(name, ':', fixup_len); | ^ cc1: all warnings being treated as errors Signed-off-by: Martin Jansa Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit 28552a7b6c94060c7ab3899619ab8afb74124d02) [YC: fixed the Upstream-Status Backport URL] Signed-off-by: Yoann Congal --- .../0001-Fix-discarded-const-qualifiers.patch | 83 +++++++++++++++++++ meta/recipes-kernel/dtc/dtc_1.7.2.bb | 1 + 2 files changed, 84 insertions(+) create mode 100644 meta/recipes-kernel/dtc/dtc/0001-Fix-discarded-const-qualifiers.patch diff --git a/meta/recipes-kernel/dtc/dtc/0001-Fix-discarded-const-qualifiers.patch b/meta/recipes-kernel/dtc/dtc/0001-Fix-discarded-const-qualifiers.patch new file mode 100644 index 00000000000..de06ab37231 --- /dev/null +++ b/meta/recipes-kernel/dtc/dtc/0001-Fix-discarded-const-qualifiers.patch @@ -0,0 +1,83 @@ +From c58beee7bec0774f12202511c97beb741ff2b534 Mon Sep 17 00:00:00 2001 +From: Stephen Gallagher +Date: Tue, 6 Jan 2026 14:19:30 -0500 +Subject: [PATCH] Fix discarded const qualifiers + +It's unsafe to implicitly discard the const qualifier on a pointer. In +overlay_fixup_phandle(), this was probably just an oversight, and making +the "sep" variable a const char * is sufficient to fix it. + +In create_node(), however, the "p" variable is directly modifying the +buffer pointed to by "const char* node_name". To fix this, we need to +actually make a duplicate of the buffer and operate on that instead. + +This introduces a malloc()/free() and an unbounded strdup() into the +operation, but fdtput isn't a long-running service and the node_name +argument comes directly from argv, so this shouldn't introduce a +significant performance impact. + +Signed-off-by: Stephen Gallagher +Signed-off-by: David Gibson +Signed-off-by: Martin Jansa +Upstream-Status: Backport [https://git.kernel.org/pub/scm/utils/dtc/dtc.git/commit/?h=main&id=9a1c801a1a3c102bf95c5339c9e985b26b823a21] +--- + fdtput.c | 8 +++++--- + libfdt/fdt_overlay.c | 3 ++- + meson.build | 1 + + 3 files changed, 8 insertions(+), 4 deletions(-) + +diff --git a/fdtput.c b/fdtput.c +index c2fecf4..8deec7e 100644 +--- a/fdtput.c ++++ b/fdtput.c +@@ -230,19 +230,21 @@ static int create_paths(char **blob, const char *in_path) + static int create_node(char **blob, const char *node_name) + { + int node = 0; +- char *p; ++ const char *p; ++ char *path = NULL; + + p = strrchr(node_name, '/'); + if (!p) { + report_error(node_name, -1, -FDT_ERR_BADPATH); + return -1; + } +- *p = '\0'; + + *blob = realloc_node(*blob, p + 1); + + if (p > node_name) { +- node = fdt_path_offset(*blob, node_name); ++ path = xstrndup(node_name, (size_t)(p - node_name)); ++ node = fdt_path_offset(*blob, path); ++ free(path); + if (node < 0) { + report_error(node_name, -1, node); + return -1; +diff --git a/libfdt/fdt_overlay.c b/libfdt/fdt_overlay.c +index 28b667f..5f8aa62 100644 +--- a/libfdt/fdt_overlay.c ++++ b/libfdt/fdt_overlay.c +@@ -409,7 +409,8 @@ static int overlay_fixup_phandle(void *fdt, void *fdto, int symbols_off, + const char *fixup_str = value; + uint32_t path_len, name_len; + uint32_t fixup_len; +- char *sep, *endptr; ++ const char *sep; ++ char *endptr; + int poffset, ret; + + fixup_end = memchr(value, '\0', len); +diff --git a/meson.build b/meson.build +index 310699f..2966b06 100644 +--- a/meson.build ++++ b/meson.build +@@ -18,6 +18,7 @@ add_project_arguments( + '-Wshadow', + '-Wsuggest-attribute=format', + '-Wwrite-strings', ++ '-Wdiscarded-qualifiers', + ]), + language: 'c' + ) diff --git a/meta/recipes-kernel/dtc/dtc_1.7.2.bb b/meta/recipes-kernel/dtc/dtc_1.7.2.bb index 92e83a94044..b8b79542c5d 100644 --- a/meta/recipes-kernel/dtc/dtc_1.7.2.bb +++ b/meta/recipes-kernel/dtc/dtc_1.7.2.bb @@ -10,6 +10,7 @@ LIC_FILES_CHKSUM = "file://GPL;md5=b234ee4d69f5fce4486a80fdaf4a4263 \ SRC_URI = " \ git://git.kernel.org/pub/scm/utils/dtc/dtc.git;branch=main;protocol=https \ + file://0001-Fix-discarded-const-qualifiers.patch \ " SRCREV = "2d10aa2afe35527728db30b35ec491ecb6959e5c" From patchwork Thu Apr 16 22:30:02 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86329 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6EEEDF8DFF7 for ; Thu, 16 Apr 2026 22:33:16 +0000 (UTC) Received: from mail-wm1-f68.google.com (mail-wm1-f68.google.com [209.85.128.68]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.28257.1776378793095939232 for ; Thu, 16 Apr 2026 15:33:13 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=btaMK7gr; spf=pass (domain: smile.fr, ip: 209.85.128.68, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f68.google.com with SMTP id 5b1f17b1804b1-488a29e6110so253745e9.3 for ; Thu, 16 Apr 2026 15:33:12 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378791; x=1776983591; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=WVhU4dd0fSKGFFw3DxJjyGrc8CGImTlTcAo7+1C/Vwg=; b=btaMK7gryBIo/MQ519Gp8FlYYm4Ny4kF2x/MPgNNL4FMpwG7iGaEgT453HI6lF5pN0 abh15B0+CcCCcwJRQ2L+7IzFCP4bqcNNT9oZaS4GHJySHVukfphXyvayGZVhlAvUCDqZ UXUhB0yPUPIaED8EHiWQIQ9eunCyCgAO8QDAY= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378791; x=1776983591; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=WVhU4dd0fSKGFFw3DxJjyGrc8CGImTlTcAo7+1C/Vwg=; b=DYI9jEE91C2bMoPgMAJ1JWUcBLAlLgMbhF1HdgmC5VD7ocaYc0d6+4v0x/Ad6UkljL 4WYjWQJooYd6gx37HBn64m+gUTZxV5KuQBhEwD3Jojnuhwa8YUpVjYNtslKrB6FkVOZq u2mkOXxLo61pyEJ5CI7zqyngUVcKQTqouaZfraeXEZYkTGZTqaKJNj9EMMGDQpoZTBLJ sli1h2nxAvP2v1pK8FXiny8sYUVb+V9oAjIGraBbwzvrVEEMiHgfwmDBbuVYPE3L6/7d BKEM39RVRWgDXKUiDmvZduDFJ5dBRmx6LgyQjKCY4I/ooeoq2OfxZHCkAZNVaE+dareh Q3Ww== X-Gm-Message-State: AOJu0YzGnA4tpjAjdgfLRhGQhcW1/nfSDwsBNlo5Z0UJXHErxBWBVjhh GYZgoHBoqjImO5XZ+udka88QzpXk2CEgZ+04Sl853SwUdyEXnYPlMcvF+aaHcjxrVwx9mRk8dKN Ux/JmyBV8A4AC X-Gm-Gg: AeBDiesU8umTBLNeCRTzxJKGK6RsnCdBFxHRu3m65Zm2Fal4O8etI03msNvM0/AjBjs ezoadvjXErE6/AsdAxt2BX08cvzEzkjszXM5uUmCYd4sZ1vRQHDjbYja4B6IUbtty13mGsHdcyj 0dwNfUuRs9F/mDlNInyEjEMDeJxUkncTNEnC/FK50CLJ7YIpjCCYpLtZX4UI0PK0H3Mcmprh2F4 xI7jSgWOd9BC6RbQ3+2DysMBNC5CFKARs6KBoElTd6KnKVq3CKYuuFxXfr1m86eMslNQcWTbMKx iTREF2oASuqEWI91EHMCbTCCZv/6SayPlM0Q0M+UtjOLpeSerdWnJqx44VpWuCc/LSRX8IZaPWV 5F1zTzhlP5nRkOZmiMMz36tqoVaNfgT2VsX1u1snvzbnN+CqsJ8LUjZSxg3BRB1wAQLKI2sBiKy S9x38/WVYFVNKR2iarLrM9h6601myyrASIiblL3IX62LucEv6m83FxuB4U87KciQTaLuEG8d78j vm2lObkxtyZWV6++8hXBjTnAx2Y7BLOGYP54A== X-Received: by 2002:a05:600c:c118:b0:488:a82f:bb96 with SMTP id 5b1f17b1804b1-488fb79891cmr3609575e9.29.1776378791201; Thu, 16 Apr 2026 15:33:11 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.10 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:10 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 19/51] pseudo: Add fix for glibc 2.43 Date: Fri, 17 Apr 2026 00:30:02 +0200 Message-ID: <10cf0fc5f2a18ac377186c3013a50d1355b41312.1776377993.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:16 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235448 From: Richard Purdie Update to add a fix for a function definition to work with glibc 2.43. Signed-off-by: Richard Purdie (cherry picked from commit 7d35b0e7929d666af783db835a3a809f8f6ce429) Signed-off-by: Yoann Congal --- meta/recipes-devtools/pseudo/pseudo_git.bb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/meta/recipes-devtools/pseudo/pseudo_git.bb b/meta/recipes-devtools/pseudo/pseudo_git.bb index a26a205a160..4d316299033 100644 --- a/meta/recipes-devtools/pseudo/pseudo_git.bb +++ b/meta/recipes-devtools/pseudo/pseudo_git.bb @@ -12,7 +12,7 @@ SRC_URI:append:class-nativesdk = " \ file://older-glibc-symbols.patch" SRC_URI[prebuilt.sha256sum] = "ed9f456856e9d86359f169f46a70ad7be4190d6040282b84c8d97b99072485aa" -SRCREV = "43cbd8fb4914328094ccdb4bb827d74b1bac2046" +SRCREV = "56e1f8df4761da60e41812fc32b1de797d1765e9" PV = "1.9.3+git" # largefile and 64bit time_t support adds these macros via compiler flags globally From patchwork Thu Apr 16 22:30:03 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86331 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8DF35F8DFF9 for ; Thu, 16 Apr 2026 22:33:16 +0000 (UTC) Received: from mail-wm1-f67.google.com (mail-wm1-f67.google.com [209.85.128.67]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.28258.1776378793698757432 for ; Thu, 16 Apr 2026 15:33:13 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=IoAwkVIS; spf=pass (domain: smile.fr, ip: 209.85.128.67, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f67.google.com with SMTP id 5b1f17b1804b1-488b00ed86fso430375e9.3 for ; Thu, 16 Apr 2026 15:33:13 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378792; x=1776983592; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=SNnr8zCuK9rJCkrulyG7Tv1QtQHZbFJT4AbUSi4SIIA=; b=IoAwkVISWJT+I7ZD4uQdtUz9O4ntOyNNMNF9rHWSsagNlAo5xt2/fyoPKkewKJHjsg 6f2JSYOq8dCs1dCmyr6tDG0EXRNRU7fJyt4Lqa7WqM6KPPEJV8s1hoMwR4aPNZ8YMAfa SgvLizrVWmBMyf58aNtqZRMhlPqt3+5sHMeJ8= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378792; x=1776983592; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=SNnr8zCuK9rJCkrulyG7Tv1QtQHZbFJT4AbUSi4SIIA=; b=lFuGV7pN1aGRuDBq+lm8iXmsTCqakAurU8eLG4oAMGy24YhiHP0YJa5GnDToQXo85I 5v3n9YXGMebrP9eX91oEFvVZeMs57eta//GPJpidM6IR/2J26Rdxdt1W7KEBfffDwjpq kDkjeVw8RCx9NSP6tPdI07vnI7oP/c2A9oVLnXysx2wJ6uQ3EefcpkVjyDYch6hpF22d /RByAMfU8IaDp8SG5SR0KViscLQSGyBjE9HbGLwTZfJX/c/rm6PSJz4k3VEP1O+qvT5N 3Z8iNdxOFhgTqBMKIWQ+D1T47nho/Megc3mnHNjd/0LPCiOgVB9xXjTQ/gFIEQwMKJBE cUEw== X-Gm-Message-State: AOJu0Yx8tlOKyE3+opAl3u8KVgvZWEJ3Qu6Tcq65Gqilb9Wm14V1zMLs U+VvtI4QyZjAey7M4rEY8yrZVMkiWXZqLIq7+LygqKomZDE74mVfmkPfvTyBGEL0zikj1OqL8wZ 3/cbUOXel8S3b X-Gm-Gg: AeBDiesfws7IYDsjleQ1MWyS/thIv4aElQF5LKLY6bjfhAJzQBKQJ8JEUneCKWQF6ZF +63A17CYyndYvXEz4GAnoh/T0MPNKU9ITWEBUWPsdEw/Fcub68L90+wL+ekGUHJnHMBCViqglB7 gaHYj4iFSLxSo7NVpQA1LQv6xaOc/GCIwnuQzbc6qyojLlGWCohjYp0271BHPf9kxSHMQvCV1Mu PWachT+fGK0swJCfuOEnY19GSVhPUYQZOsOT0vfPeJOQFggDDZ6ybxl7h6TytENyTbP3odWGhT5 tLy09cFtWT1s/QQKFXRoyTg4r7P79Ve0PAo6v7JntW1BfnYJkdXPCXBsIFQIQ1ir3VHJriWU4Rj n26ny0TJySEdHYalQZEVjLixC+I/zxbEuiXJY4y38c7Sni5fJ4qRmb+V5ox5JWGp2LKispj1VqF Quj86N/76kSK3WlWRq4Ku3IHL7W98L/tMu7CLWmf3oBpi/CVldLofiQHEVlKDdXmVenFxrmMhl5 NVTFvbJLlDL2dfvtWqGiFBalwFpMxGrhSpA/xdeqWmDUl3D X-Received: by 2002:a05:600c:5295:b0:485:30d4:6b9e with SMTP id 5b1f17b1804b1-488fb77facemr4961605e9.21.1776378791760; Thu, 16 Apr 2026 15:33:11 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.11 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:11 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 20/51] yocto-uninative: Update to 5.1 for glibc 2.43 Date: Fri, 17 Apr 2026 00:30:03 +0200 Message-ID: <11ce247a4e165fde70992a6899d9a55b691a4dcd.1776377993.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:16 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235449 From: Michael Halstead Signed-off-by: Michael Halstead Signed-off-by: Richard Purdie (cherry picked from commit c1fb515f2a88fa0a0e95529afc07a99db001af0e) [YC: fix duplicated line in commit message] Signed-off-by: Yoann Congal --- meta/conf/distro/include/yocto-uninative.inc | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/meta/conf/distro/include/yocto-uninative.inc b/meta/conf/distro/include/yocto-uninative.inc index e9dc6c86408..d97c96f631f 100644 --- a/meta/conf/distro/include/yocto-uninative.inc +++ b/meta/conf/distro/include/yocto-uninative.inc @@ -6,10 +6,10 @@ # to the distro running on the build machine. # -UNINATIVE_MAXGLIBCVERSION = "2.42" -UNINATIVE_VERSION = "5.0" +UNINATIVE_MAXGLIBCVERSION = "2.43" +UNINATIVE_VERSION = "5.1" UNINATIVE_URL ?= "http://downloads.yoctoproject.org/releases/uninative/${UNINATIVE_VERSION}/" -UNINATIVE_CHECKSUM[aarch64] ?= "a25f2174d0cefcb22af005e9bc72ac01ae83b011c5b6d6d5bf00dac979877f76" -UNINATIVE_CHECKSUM[i686] ?= "959cc2539b692f9b9862825c7324a0fe4d061fca742f6c259f67f581c59af956" -UNINATIVE_CHECKSUM[x86_64] ?= "96045e8b1e242c8a849426a8506c7043f354b39f2bc0035192780e8205e23e9d" +UNINATIVE_CHECKSUM[aarch64] ?= "4166237a9dabd222dcb9627a9435dffd756764fabf76ed7ef2e93dc2964567ad" +UNINATIVE_CHECKSUM[i686] ?= "761502cc9aef4d54d0c6fe9418beb9fdd2c6220da6f2b04128c89f47902ab9ae" +UNINATIVE_CHECKSUM[x86_64] ?= "2b63a078c26535e0786e87f81ae69509df30f4dce40693004c527bd5e4ab2b85" From patchwork Thu Apr 16 22:30:04 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86317 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 5DD3FF8DFDB for ; Thu, 16 Apr 2026 22:33:15 +0000 (UTC) Received: from mail-wm1-f67.google.com (mail-wm1-f67.google.com [209.85.128.67]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.28571.1776378794503824233 for ; Thu, 16 Apr 2026 15:33:14 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=xibr9pd+; spf=pass (domain: smile.fr, ip: 209.85.128.67, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f67.google.com with SMTP id 5b1f17b1804b1-488971db0fdso601815e9.0 for ; Thu, 16 Apr 2026 15:33:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378793; x=1776983593; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=xg97HcAxyKl7CWH+m5fikwRL/8UGeav6UcucMGD73Ys=; b=xibr9pd+k4hxfmWSKErg4ZdC/8WxbNwNA9V24uaTMcH3ujINCoaVVPF9YPhJH34z0T E03UPy7mP9xDBu1jQR4Ki7hXVSn9Awb7hmJ7ryf0Ho3XvKG/2l8ps9JKGcU66jij2xcJ vYdGrh6KGwPEZ7XOCD3x3ISiqB1ryfopk5Twc= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378793; x=1776983593; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=xg97HcAxyKl7CWH+m5fikwRL/8UGeav6UcucMGD73Ys=; b=Y9RqrsJGrJDW/3jm2z07Ez3RZVu/ohJuw6l3PYWyswvxiO2PGeHDzart5Y8U6pQzfq ueLTzy4sOKQIPovIEJNR8ncykp7fhTeWT6gQSa+wEljE/7IwPMbJMuZX5sKRvYdnRAzd Nh3K5FwcgCzWg804mD2txNC24qPoF94NlPm7Bd9DgaXy7K3X4ZmmlosT5mU/K0RcLOmx QWm+372b5bxqByzX+4hZiBq9HsrTi/66xFfqC9ukdoMkZYrWmyDQ6rXJP891bI8eC3vS GAvlGcyn/FuG9wab6bTrUua8TX6MXtujMEleV25avbMMevHZzTAXlMf7qNoLrdUP8Ka/ etlQ== X-Gm-Message-State: AOJu0YzxO3UbO7zTaEdD3zAnGTaQQGynoSL1llnKpzCBXWo6UZ0uzHwL RrYr3N08wEfOyLzs7isUH3vK4LC9b3IG7MuHFgM+RZC2bcPh3HZFgi6YAK7/uYeyBADA/ny+FU7 cP+ZwR5yJu+jU X-Gm-Gg: AeBDiet1ZGwRnIFBENPOg6sCdaVPttfsxfqNcM0ZxDq2rdgE4TQihkhwUcdMox+QxqR MjL9VsbzP2Bl21AkvPz7lRuw2NX4rinftYg6snAt2skKyU9dmCD76iLw+cEaLNJRG0jFRG/D57F 1VCjWQK5wAplOcuO9bgPFPXpMWfxeH1gDIQPsnwwTWIaO6zancDOEEJZnBkKB430E812AEhqqJ/ b9UB1i1hEhtL/h0t399SvaAI40Gf4S7AP6T16C7L0Gwm1WIdCKdmAbyMO//N6I8OMdi13W2rWE/ o5otob7rAIx04Y4UWXiA14+xFNMs3j+xGrWsTx+rwzXg3rrhdFMfP4XK2XBbA1T0G0w9TZNbSah CObE+T5QaLrP0gYaFnuUEGhDWAewkHKMyUNoO0ldSVx31duBO59JBQjk256Alv1Wq/VVUs29ZMm XzOuBp8+JOdcSPx8r+9i06bRLYySfdRQXZ1g9XndRonTasJ3d7imORgTJSbrgC0JHAAoDFYeSUz AIH8LZ2tnsggo20MTJmyjzfiLT4K0DDyCpgkUz3mmfk2h+j X-Received: by 2002:a05:600c:5285:b0:485:1878:7b8c with SMTP id 5b1f17b1804b1-488fb77812dmr6006825e9.18.1776378792312; Thu, 16 Apr 2026 15:33:12 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.11 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:11 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 21/51] m4: backport 3 gnulib changes to fix build with glibc-2.43 on host Date: Fri, 17 Apr 2026 00:30:04 +0200 Message-ID: <7daef08b2bd4fb852169939e0eaa0486e204d230.1776377993.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:15 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235450 From: Martin Jansa All 3 are already included in m4-1.4.21 used in master. Signed-off-by: Martin Jansa Signed-off-by: Yoann Congal --- meta/recipes-devtools/m4/m4-1.4.20.inc | 3 + ...-Fix-some-g-Wsystem-headers-warnings.patch | 135 ++++++++++++ ...pilation-error-on-macOS-with-fortify.patch | 126 ++++++++++++ ...23-qualifier-generic-fns-like-strchr.patch | 194 ++++++++++++++++++ 4 files changed, 458 insertions(+) create mode 100644 meta/recipes-devtools/m4/m4/0001-string-h-wchar-h-Fix-some-g-Wsystem-headers-warnings.patch create mode 100644 meta/recipes-devtools/m4/m4/0002-string-h-Fix-compilation-error-on-macOS-with-fortify.patch create mode 100644 meta/recipes-devtools/m4/m4/0003-Port-to-C23-qualifier-generic-fns-like-strchr.patch diff --git a/meta/recipes-devtools/m4/m4-1.4.20.inc b/meta/recipes-devtools/m4/m4-1.4.20.inc index 5c4ba09288c..df47e1e1881 100644 --- a/meta/recipes-devtools/m4/m4-1.4.20.inc +++ b/meta/recipes-devtools/m4/m4-1.4.20.inc @@ -8,6 +8,9 @@ inherit autotools texinfo ptest gettext SRC_URI = "${GNU_MIRROR}/m4/m4-${PV}.tar.gz \ file://0001-gettext-h-Avoid-gcc-Wformat-security-warnings-with-d.patch \ + file://0001-string-h-wchar-h-Fix-some-g-Wsystem-headers-warnings.patch \ + file://0002-string-h-Fix-compilation-error-on-macOS-with-fortify.patch \ + file://0003-Port-to-C23-qualifier-generic-fns-like-strchr.patch \ " SRC_URI:append:class-target = " file://run-ptest \ file://0001-test-c32ispunct-Check-for-musl-along-with-glibc.patch \ diff --git a/meta/recipes-devtools/m4/m4/0001-string-h-wchar-h-Fix-some-g-Wsystem-headers-warnings.patch b/meta/recipes-devtools/m4/m4/0001-string-h-wchar-h-Fix-some-g-Wsystem-headers-warnings.patch new file mode 100644 index 00000000000..63495a8443e --- /dev/null +++ b/meta/recipes-devtools/m4/m4/0001-string-h-wchar-h-Fix-some-g-Wsystem-headers-warnings.patch @@ -0,0 +1,135 @@ +From a9ff1a1ea55bee12751c751460a0102493fa65aa Mon Sep 17 00:00:00 2001 +From: Bruno Haible +Date: Mon, 12 May 2025 03:05:51 +0200 +Subject: [PATCH] string-h, wchar-h: Fix some g++ -Wsystem-headers warnings. + +* lib/string.in.h (memcpy, memccpy, memmove, strncpy, strndup, strncat, +memcmp, strncmp, memset): On glibc systems, declare with +_GL_ATTRIBUTE_NOTHROW. +* lib/wchar.in.h (wmemcpy, wmemmove, wcsncpy, wcsncat, wmemcmp, wcsncmp, +wmemset): Likewise. + +Upstream-Status: Backport [https://cgit.git.savannah.gnu.org/cgit/gnulib.git/commit/?id=0614c2db34f65c595d85be4adc5628778905855a] +Signed-off-by: Martin Jansa +--- + lib/string.in.h | 27 +++++++++++++++++++++++++++ + lib/wchar.in.h | 21 +++++++++++++++++++++ + 2 files changed, 48 insertions(+) + +diff --git a/lib/string.in.h b/lib/string.in.h +index e764221..e3d94b7 100644 +--- a/lib/string.in.h ++++ b/lib/string.in.h +@@ -215,25 +215,49 @@ _GL_EXTERN_C void free (void *); + /* Declarations for ISO C N3322. */ + #if defined __GNUC__ && __GNUC__ >= 15 && !defined __clang__ + _GL_EXTERN_C void *memcpy (void *__dest, const void *__src, size_t __n) ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++ _GL_ATTRIBUTE_NOTHROW ++# endif + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); + _GL_EXTERN_C void *memccpy (void *__dest, const void *__src, int __c, size_t __n) ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++ _GL_ATTRIBUTE_NOTHROW ++# endif + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 4) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 4); + _GL_EXTERN_C void *memmove (void *__dest, const void *__src, size_t __n) ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++ _GL_ATTRIBUTE_NOTHROW ++# endif + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); + _GL_EXTERN_C char *strncpy (char *__dest, const char *__src, size_t __n) ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++ _GL_ATTRIBUTE_NOTHROW ++# endif + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); + _GL_EXTERN_C char *strndup (const char *__s, size_t __n) ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++ _GL_ATTRIBUTE_NOTHROW ++# endif + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 2); + _GL_EXTERN_C char *strncat (char *__dest, const char *__src, size_t __n) ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++ _GL_ATTRIBUTE_NOTHROW ++# endif + _GL_ARG_NONNULL ((1)) _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); + _GL_EXTERN_C int memcmp (const void *__s1, const void *__s2, size_t __n) ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++ _GL_ATTRIBUTE_NOTHROW ++# endif + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); + _GL_EXTERN_C int strncmp (const char *__s1, const char *__s2, size_t __n) ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++ _GL_ATTRIBUTE_NOTHROW ++# endif + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); + # ifndef __cplusplus +@@ -243,6 +267,9 @@ _GL_EXTERN_C void *memrchr (const void *__s, int __c, size_t __n) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3); + # endif + _GL_EXTERN_C void *memset (void *__s, int __c, size_t __n) ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++ _GL_ATTRIBUTE_NOTHROW ++# endif + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3); + _GL_EXTERN_C void *memset_explicit (void *__s, int __c, size_t __n) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3); +diff --git a/lib/wchar.in.h b/lib/wchar.in.h +index 8836ed1..a6c52eb 100644 +--- a/lib/wchar.in.h ++++ b/lib/wchar.in.h +@@ -281,20 +281,38 @@ _GL_EXTERN_C void free (void *); + /* Declarations for ISO C N3322. */ + #if defined __GNUC__ && __GNUC__ >= 15 && !defined __clang__ + _GL_EXTERN_C wchar_t *wmemcpy (wchar_t *__dest, const wchar_t *__src, size_t __n) ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++ _GL_ATTRIBUTE_NOTHROW ++# endif + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); + _GL_EXTERN_C wchar_t *wmemmove (wchar_t *__dest, const wchar_t *__src, size_t __n) ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++ _GL_ATTRIBUTE_NOTHROW ++# endif + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); + _GL_EXTERN_C wchar_t *wcsncpy (wchar_t *__dest, const wchar_t *__src, size_t __n) ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++ _GL_ATTRIBUTE_NOTHROW ++# endif + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); + _GL_EXTERN_C wchar_t *wcsncat (wchar_t *__dest, const wchar_t *__src, size_t __n) ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++ _GL_ATTRIBUTE_NOTHROW ++# endif + _GL_ARG_NONNULL ((1)) _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); + _GL_EXTERN_C int wmemcmp (const wchar_t *__s1, const wchar_t *__s2, size_t __n) ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++ _GL_ATTRIBUTE_NOTHROW ++# endif + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); + _GL_EXTERN_C int wcsncmp (const wchar_t *__s1, const wchar_t *__s2, size_t __n) ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++ _GL_ATTRIBUTE_NOTHROW ++# endif + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); + # ifndef __cplusplus +@@ -302,6 +320,9 @@ _GL_EXTERN_C wchar_t *wmemchr (const wchar_t *__s, wchar_t __wc, size_t __n) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3); + # endif + _GL_EXTERN_C wchar_t *wmemset (wchar_t *__s, wchar_t __wc, size_t __n) ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++ _GL_ATTRIBUTE_NOTHROW ++# endif + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3); + #endif + diff --git a/meta/recipes-devtools/m4/m4/0002-string-h-Fix-compilation-error-on-macOS-with-fortify.patch b/meta/recipes-devtools/m4/m4/0002-string-h-Fix-compilation-error-on-macOS-with-fortify.patch new file mode 100644 index 00000000000..ef7117997b5 --- /dev/null +++ b/meta/recipes-devtools/m4/m4/0002-string-h-Fix-compilation-error-on-macOS-with-fortify.patch @@ -0,0 +1,126 @@ +From 84b6bcb2c691796d87b47bfcf815409ca2b9e461 Mon Sep 17 00:00:00 2001 +From: Bruno Haible +Date: Thu, 10 Jul 2025 11:04:50 +0200 +Subject: [PATCH] string-h: Fix compilation error on macOS with fortify. + +Reported by Pierre Ossman at +. + +* lib/string.in.h (memcpy etc.): Don't redeclare functions that are +declared as macros. + +Upstream-Status: Backport [https://cgit.git.savannah.gnu.org/cgit/gnulib.git/commit/?id=c44fe03b72687c9e913727724c29bdb49c1f86e3] +Signed-off-by: Martin Jansa +--- + lib/string.in.h | 58 +++++++++++++++++++++++++++++++++---------------- + 1 file changed, 39 insertions(+), 19 deletions(-) + +diff --git a/lib/string.in.h b/lib/string.in.h +index e3d94b7..9a039c7 100644 +--- a/lib/string.in.h ++++ b/lib/string.in.h +@@ -214,65 +214,85 @@ _GL_EXTERN_C void free (void *); + + /* Declarations for ISO C N3322. */ + #if defined __GNUC__ && __GNUC__ >= 15 && !defined __clang__ ++# ifndef memcpy + _GL_EXTERN_C void *memcpy (void *__dest, const void *__src, size_t __n) +-# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 + _GL_ATTRIBUTE_NOTHROW +-# endif ++# endif + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); ++# endif ++# ifndef memccpy + _GL_EXTERN_C void *memccpy (void *__dest, const void *__src, int __c, size_t __n) +-# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 + _GL_ATTRIBUTE_NOTHROW +-# endif ++# endif + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 4) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 4); ++# endif ++# ifndef memmove + _GL_EXTERN_C void *memmove (void *__dest, const void *__src, size_t __n) +-# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 + _GL_ATTRIBUTE_NOTHROW +-# endif ++# endif + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); ++# endif ++# ifndef strncpy + _GL_EXTERN_C char *strncpy (char *__dest, const char *__src, size_t __n) +-# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 + _GL_ATTRIBUTE_NOTHROW +-# endif ++# endif + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); ++# endif ++# ifndef strndup + _GL_EXTERN_C char *strndup (const char *__s, size_t __n) +-# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 + _GL_ATTRIBUTE_NOTHROW +-# endif ++# endif + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 2); ++# endif ++# ifndef strncat + _GL_EXTERN_C char *strncat (char *__dest, const char *__src, size_t __n) +-# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 + _GL_ATTRIBUTE_NOTHROW +-# endif ++# endif + _GL_ARG_NONNULL ((1)) _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); ++# endif ++# ifndef memcmp + _GL_EXTERN_C int memcmp (const void *__s1, const void *__s2, size_t __n) +-# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 + _GL_ATTRIBUTE_NOTHROW +-# endif ++# endif + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); ++# endif ++# ifndef strncmp + _GL_EXTERN_C int strncmp (const char *__s1, const char *__s2, size_t __n) +-# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 + _GL_ATTRIBUTE_NOTHROW +-# endif ++# endif + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); +-# ifndef __cplusplus ++# endif ++# if !defined memchr && !defined __cplusplus + _GL_EXTERN_C void *memchr (const void *__s, int __c, size_t __n) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3); + _GL_EXTERN_C void *memrchr (const void *__s, int __c, size_t __n) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3); + # endif ++# ifndef memset + _GL_EXTERN_C void *memset (void *__s, int __c, size_t __n) +-# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 + _GL_ATTRIBUTE_NOTHROW +-# endif ++# endif + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3); ++# endif ++# ifndef memset_explicit + _GL_EXTERN_C void *memset_explicit (void *__s, int __c, size_t __n) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3); ++# endif + #endif + + diff --git a/meta/recipes-devtools/m4/m4/0003-Port-to-C23-qualifier-generic-fns-like-strchr.patch b/meta/recipes-devtools/m4/m4/0003-Port-to-C23-qualifier-generic-fns-like-strchr.patch new file mode 100644 index 00000000000..7d88e45fa58 --- /dev/null +++ b/meta/recipes-devtools/m4/m4/0003-Port-to-C23-qualifier-generic-fns-like-strchr.patch @@ -0,0 +1,194 @@ +From 100cbc40da39dcdf259ebce2bd0f2b4889cf2204 Mon Sep 17 00:00:00 2001 +From: Paul Eggert +Date: Sun, 23 Nov 2025 00:50:40 -0800 +Subject: [PATCH] Port to C23 qualifier-generic fns like strchr +MIME-Version: 1.0 +Content-Type: text/plain; charset=UTF-8 +Content-Transfer-Encoding: 8bit + +This ports Gnulib to strict C23 platforms that reject code +like ‘char *q = strchr (P, 'x');’ when P is a pointer to const, +because in C23 strchr is a qualifier-generic function so +strchr (P, 'x') returns char const *. +This patch does not attempt to do the following two things, +which might be useful in the future: +1. When compiling on non-C23 platforms, check user code for +portability to platforms that define qualifier-generic functions. +2. Port Gnulib to platforms that have qualifier-generic functions +not listed in the C23 standard, e.g., strchrnul. I don’t know +of any such platforms. +* lib/argp-help.c (argp_doc): +* lib/c-strstr.c (c_strstr): +* lib/dfa.c (comsubs): +* lib/mbschr.c (mbschr): +* lib/mbspbrk.c (mbspbrk): +* lib/mbsrchr.c (mbsrchr): +* lib/memchr2.c (memchr2): +* lib/string-desc.c (_sd_index): +* tests/test-bsearch.c (lib_bsearch): +* tests/test-memchr.c (lib_memchr): +* tests/test-wmemchr.c (lib_wmemchr): +Port to C23, where functions like strchr are qualifier-generic. +* lib/c++defs.h (_GL_FUNCDECL_SYS_NAME): New macro. +* lib/c++defs.h (_GL_FUNCDECL_SYS): +* lib/stdlib.in.h (bsearch): +Use it, to prevent C23 names like strchr from acting like macros. +* lib/string.in.h (memchr, strchr, strpbrk, strrchr): +Do not #undef when GNULIB_POSIXCHECK is defined, as this could +cause conforming C23 code to fail to conform. It’s not clear why +_GL_WARN_ON_USE_CXX; perhaps it was needed but isn’t any more? +But for now, limit the removal of #undef to these four functions +where #undeffing is clearly undesirable in C23. +* lib/wchar.in.h (wmemchr): Parenthesize function name in decl, +to prevent it from acting like a macro. + +Upstream-Status: Backport [https://cgit.git.savannah.gnu.org/cgit/gnulib.git/commit/?id=df17f4f37ed3ca373d23ad42eae51122bdb96626] +Signed-off-by: Martin Jansa +--- + lib/c++defs.h | 12 +++++++++++- + lib/memchr2.c | 2 +- + lib/stdlib.in.h | 6 +++--- + lib/string.in.h | 4 ---- + lib/wchar.in.h | 2 +- + tests/c++defs.h | 12 +++++++++++- + 6 files changed, 27 insertions(+), 11 deletions(-) + +diff --git a/lib/c++defs.h b/lib/c++defs.h +index df98a5a..d3dfabd 100644 +--- a/lib/c++defs.h ++++ b/lib/c++defs.h +@@ -127,6 +127,16 @@ + #define _GL_FUNCDECL_RPL_1(rpl_func,rettype,parameters,...) \ + _GL_EXTERN_C_FUNC __VA_ARGS__ rettype rpl_func parameters + ++/* _GL_FUNCDECL_SYS_NAME (func) expands to plain func if C++, and to ++ parenthsized func otherwise. Parenthesization is needed in C23 if ++ the function is like strchr and so is a qualifier-generic macro ++ that expands to something more complicated. */ ++#ifdef __cplusplus ++# define _GL_FUNCDECL_SYS_NAME(func) func ++#else ++# define _GL_FUNCDECL_SYS_NAME(func) (func) ++#endif ++ + /* _GL_FUNCDECL_SYS (func, rettype, parameters, [attributes]); + declares the system function, named func, with the given prototype, + consisting of return type, parameters, and attributes. +@@ -139,7 +149,7 @@ + _GL_FUNCDECL_SYS (posix_openpt, int, (int flags), _GL_ATTRIBUTE_NODISCARD); + */ + #define _GL_FUNCDECL_SYS(func,rettype,parameters,...) \ +- _GL_EXTERN_C_FUNC __VA_ARGS__ rettype func parameters ++ _GL_EXTERN_C_FUNC __VA_ARGS__ rettype _GL_FUNCDECL_SYS_NAME (func) parameters + + /* _GL_CXXALIAS_RPL (func, rettype, parameters); + declares a C++ alias called GNULIB_NAMESPACE::func +diff --git a/lib/memchr2.c b/lib/memchr2.c +index 7493823..d7724ae 100644 +--- a/lib/memchr2.c ++++ b/lib/memchr2.c +@@ -55,7 +55,7 @@ memchr2 (void const *s, int c1_in, int c2_in, size_t n) + c2 = (unsigned char) c2_in; + + if (c1 == c2) +- return memchr (s, c1, n); ++ return (void *) memchr (s, c1, n); + + /* Handle the first few bytes by reading one byte at a time. + Do this until VOID_PTR is aligned on a longword boundary. */ +diff --git a/lib/stdlib.in.h b/lib/stdlib.in.h +index 1342db4..3548d6e 100644 +--- a/lib/stdlib.in.h ++++ b/lib/stdlib.in.h +@@ -237,9 +237,9 @@ _GL_INLINE_HEADER_BEGIN + + /* Declarations for ISO C N3322. */ + #if defined __GNUC__ && __GNUC__ >= 15 && !defined __clang__ +-_GL_EXTERN_C void *bsearch (const void *__key, +- const void *__base, size_t __nmemb, size_t __size, +- int (*__compare) (const void *, const void *)) ++_GL_EXTERN_C void *_GL_FUNCDECL_SYS_NAME (bsearch) ++ (const void *__key, const void *__base, size_t __nmemb, size_t __size, ++ int (*__compare) (const void *, const void *)) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3) _GL_ARG_NONNULL ((5)); + _GL_EXTERN_C void qsort (void *__base, size_t __nmemb, size_t __size, + int (*__compare) (const void *, const void *)) +diff --git a/lib/string.in.h b/lib/string.in.h +index 9a039c7..bc44f81 100644 +--- a/lib/string.in.h ++++ b/lib/string.in.h +@@ -403,7 +403,6 @@ _GL_CXXALIASWARN1 (memchr, void const *, + _GL_CXXALIASWARN (memchr); + # endif + #elif defined GNULIB_POSIXCHECK +-# undef memchr + /* Assume memchr is always declared. */ + _GL_WARN_ON_USE (memchr, "memchr has platform-specific bugs - " + "use gnulib module memchr for portability" ); +@@ -653,7 +652,6 @@ _GL_WARN_ON_USE (stpncpy, "stpncpy is unportable - " + #if defined GNULIB_POSIXCHECK + /* strchr() does not work with multibyte strings if the locale encoding is + GB18030 and the character to be searched is a digit. */ +-# undef strchr + /* Assume strchr is always declared. */ + _GL_WARN_ON_USE_CXX (strchr, + const char *, char *, (const char *, int), +@@ -945,7 +943,6 @@ _GL_CXXALIASWARN (strpbrk); + Even in this simple case, it does not work with multibyte strings if the + locale encoding is GB18030 and one of the characters to be searched is a + digit. */ +-# undef strpbrk + _GL_WARN_ON_USE_CXX (strpbrk, + const char *, char *, (const char *, const char *), + "strpbrk cannot work correctly on character strings " +@@ -975,7 +972,6 @@ _GL_WARN_ON_USE (strspn, "strspn cannot work correctly on character strings " + #if defined GNULIB_POSIXCHECK + /* strrchr() does not work with multibyte strings if the locale encoding is + GB18030 and the character to be searched is a digit. */ +-# undef strrchr + /* Assume strrchr is always declared. */ + _GL_WARN_ON_USE_CXX (strrchr, + const char *, char *, (const char *, int), +diff --git a/lib/wchar.in.h b/lib/wchar.in.h +index a6c52eb..b4de385 100644 +--- a/lib/wchar.in.h ++++ b/lib/wchar.in.h +@@ -316,7 +316,7 @@ _GL_EXTERN_C int wcsncmp (const wchar_t *__s1, const wchar_t *__s2, size_t __n) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); + # ifndef __cplusplus +-_GL_EXTERN_C wchar_t *wmemchr (const wchar_t *__s, wchar_t __wc, size_t __n) ++_GL_EXTERN_C wchar_t *(wmemchr) (const wchar_t *__s, wchar_t __wc, size_t __n) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3); + # endif + _GL_EXTERN_C wchar_t *wmemset (wchar_t *__s, wchar_t __wc, size_t __n) +diff --git a/tests/c++defs.h b/tests/c++defs.h +index df98a5a..d3dfabd 100644 +--- a/tests/c++defs.h ++++ b/tests/c++defs.h +@@ -127,6 +127,16 @@ + #define _GL_FUNCDECL_RPL_1(rpl_func,rettype,parameters,...) \ + _GL_EXTERN_C_FUNC __VA_ARGS__ rettype rpl_func parameters + ++/* _GL_FUNCDECL_SYS_NAME (func) expands to plain func if C++, and to ++ parenthsized func otherwise. Parenthesization is needed in C23 if ++ the function is like strchr and so is a qualifier-generic macro ++ that expands to something more complicated. */ ++#ifdef __cplusplus ++# define _GL_FUNCDECL_SYS_NAME(func) func ++#else ++# define _GL_FUNCDECL_SYS_NAME(func) (func) ++#endif ++ + /* _GL_FUNCDECL_SYS (func, rettype, parameters, [attributes]); + declares the system function, named func, with the given prototype, + consisting of return type, parameters, and attributes. +@@ -139,7 +149,7 @@ + _GL_FUNCDECL_SYS (posix_openpt, int, (int flags), _GL_ATTRIBUTE_NODISCARD); + */ + #define _GL_FUNCDECL_SYS(func,rettype,parameters,...) \ +- _GL_EXTERN_C_FUNC __VA_ARGS__ rettype func parameters ++ _GL_EXTERN_C_FUNC __VA_ARGS__ rettype _GL_FUNCDECL_SYS_NAME (func) parameters + + /* _GL_CXXALIAS_RPL (func, rettype, parameters); + declares a C++ alias called GNULIB_NAMESPACE::func From patchwork Thu Apr 16 22:30:05 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86334 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 9C0B8F8DFDF for ; Thu, 16 Apr 2026 22:33:26 +0000 (UTC) Received: from mail-wm1-f68.google.com (mail-wm1-f68.google.com [209.85.128.68]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.28572.1776378796087994380 for ; Thu, 16 Apr 2026 15:33:16 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=r3FSoa7E; spf=pass (domain: smile.fr, ip: 209.85.128.68, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f68.google.com with SMTP id 5b1f17b1804b1-488b0046078so418885e9.1 for ; Thu, 16 Apr 2026 15:33:15 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378794; x=1776983594; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=0xkN5pXYq4S9tJ6G2jyPolGCL8m5EMu7PU/ueOMMNCk=; b=r3FSoa7ExtifjYdaK4eaisu0/WSz8UZcyxaepeK7KdZoKGKXLld9rf2jTWCYfCwOsh 8CTFubr+QjJ+Y1DAj5kG4/5ESeQb3UEL3wBeG2oF2SslwN7arZUkKsZSciuPSIX6AUT1 8K6VQKnp3KzhfbzBqzOxsWCZNauCOAbmkvOso= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378794; x=1776983594; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=0xkN5pXYq4S9tJ6G2jyPolGCL8m5EMu7PU/ueOMMNCk=; b=VngdwfVlkFEgONTE38JnmbXDtpGSTCv4JPGjncpIiKHUrUii7uSWffvPKFm7d6Evz9 BT2o9cAoqnewrvPdclqoiGNFX5WZCqDnuy2bwRWMeHEonZxuV7eqYhew4eNNNG5hakjq UGPUuGrYqgaziTRjXKu1N/qcZYhB6MqYG4YFoMQ/rs8DCR53yJz6AQqbzVmcKwn5lFFu Aop2kHaKaa9ietTwmZrnK+4Z4rRB3y0eQ8Wm/n382hlzRw5FMTeEy6kCAAjA0keej8Sg 9tkYNsmICMVTxt6WDvQXeFghiWjdGL/S4VSl3jnHBWgH/CtvIqsibYigr5NJAbM8jjt2 g1Kw== X-Gm-Message-State: AOJu0YyQ7DPQSqSK+9nHNaqqldoJi0XXIkycMtMIIMHUp+pQHCpH+T8C QXrkLUeu32DnRACyjQqZBTsPaDtJ+HD4AwtaAvBPJXrkweoirA3Zvyjiab9ORiKbnnVdjScD7j8 XViybnqW0H7hI X-Gm-Gg: AeBDieukXbEMNZKPjoG0JB8Asp1IRuX8RkWXEzspo9OIN8r2PhhhEVhahEtc/5WNY6v E3MkHxWcsYjk5jduOWPsqUgc4I9H7tHoPG79WIUIYZs/aHXS1CTHmqTS2AVvkokJURjUrXmtQsX qcWZp7ietKbbu0dOxk/tSNr9eGuL2LbnLKA5aLcCydLL7FDGznkFZ3eGoJnBltQtc8CBtiilXXV FKQ48KbxAvMw0RCOtEilEFJzMX+qI5wa/Ie3AUbx39W/r31I9YJ2gnctCOD2Ti546YBZ4aD+Vms G+FogM6s9pna5suvYu2YiJ5Cn61Y/fVcrVeI2jktOdQvhsa6LhLrGssW3d3d6SvDGexM+1UYrBG ELningtD0LSusibAtEjIz2oJOR+Om75CzEXUnx289d6aN8T59KN9ihm8Yx9sZz5xQWycL1WHmaG U72I4ja5QYbHnjX2VK8UGCdRS6nbzjozoNH+qm4w0EPMxp5Ywd3GQmSgRpBNWRpJmjLhKAbCeQU u0Kks3ME08NqMdNETtJ1Q+agE8AZICu8R/hdg== X-Received: by 2002:a05:600c:1c11:b0:488:9ed3:148f with SMTP id 5b1f17b1804b1-488fb782a93mr5499685e9.21.1776378793715; Thu, 16 Apr 2026 15:33:13 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.12 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:12 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 22/51] gettext: backport gnulib changes to fix build with glibc-2.43 on host Date: Fri, 17 Apr 2026 00:30:05 +0200 Message-ID: <1d44eef557bbac27a527a4f37eb80badedcb9082.1776377993.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:26 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235451 From: Martin Jansa It's already included in gettext-1.0 used in master. Unfortunately this need to be applied in 6 different copies of gnulib inside gettext repo. Signed-off-by: Martin Jansa Signed-off-by: Yoann Congal --- ...23-qualifier-generic-fns-like-strchr.patch | 626 ++++++++++++++++++ meta/recipes-core/gettext/gettext_0.26.bb | 1 + 2 files changed, 627 insertions(+) create mode 100644 meta/recipes-core/gettext/gettext/0001-Port-to-C23-qualifier-generic-fns-like-strchr.patch diff --git a/meta/recipes-core/gettext/gettext/0001-Port-to-C23-qualifier-generic-fns-like-strchr.patch b/meta/recipes-core/gettext/gettext/0001-Port-to-C23-qualifier-generic-fns-like-strchr.patch new file mode 100644 index 00000000000..634e17ea788 --- /dev/null +++ b/meta/recipes-core/gettext/gettext/0001-Port-to-C23-qualifier-generic-fns-like-strchr.patch @@ -0,0 +1,626 @@ +From 64c9525e8664ec3b89475100cbeda06ed916e707 Mon Sep 17 00:00:00 2001 +From: Paul Eggert +Date: Sun, 23 Nov 2025 00:50:40 -0800 +Subject: [PATCH] Port to C23 qualifier-generic fns like strchr +MIME-Version: 1.0 +Content-Type: text/plain; charset=UTF-8 +Content-Transfer-Encoding: 8bit + +This ports Gnulib to strict C23 platforms that reject code +like ‘char *q = strchr (P, 'x');’ when P is a pointer to const, +because in C23 strchr is a qualifier-generic function so +strchr (P, 'x') returns char const *. +This patch does not attempt to do the following two things, +which might be useful in the future: +1. When compiling on non-C23 platforms, check user code for +portability to platforms that define qualifier-generic functions. +2. Port Gnulib to platforms that have qualifier-generic functions +not listed in the C23 standard, e.g., strchrnul. I don’t know +of any such platforms. +* lib/argp-help.c (argp_doc): +* lib/c-strstr.c (c_strstr): +* lib/dfa.c (comsubs): +* lib/mbschr.c (mbschr): +* lib/mbspbrk.c (mbspbrk): +* lib/mbsrchr.c (mbsrchr): +* lib/memchr2.c (memchr2): +* lib/string-desc.c (_sd_index): +* tests/test-bsearch.c (lib_bsearch): +* tests/test-memchr.c (lib_memchr): +* tests/test-wmemchr.c (lib_wmemchr): +Port to C23, where functions like strchr are qualifier-generic. +* lib/c++defs.h (_GL_FUNCDECL_SYS_NAME): New macro. +* lib/c++defs.h (_GL_FUNCDECL_SYS): +* lib/stdlib.in.h (bsearch): +Use it, to prevent C23 names like strchr from acting like macros. +* lib/string.in.h (memchr, strchr, strpbrk, strrchr): +Do not #undef when GNULIB_POSIXCHECK is defined, as this could +cause conforming C23 code to fail to conform. It’s not clear why +_GL_WARN_ON_USE_CXX; perhaps it was needed but isn’t any more? +But for now, limit the removal of #undef to these four functions +where #undeffing is clearly undesirable in C23. +* lib/wchar.in.h (wmemchr): Parenthesize function name in decl, +to prevent it from acting like a macro. + +Upstream-Status: Backport [https://cgit.git.savannah.gnu.org/cgit/gnulib.git/commit/?id=df17f4f37ed3ca373d23ad42eae51122bdb96626] +Signed-off-by: Martin Jansa +--- + gettext-runtime/gnulib-lib/c++defs.h | 12 +++++++++++- + gettext-runtime/gnulib-lib/stdlib.in.h | 6 +++--- + gettext-runtime/gnulib-lib/string.in.h | 4 ---- + gettext-runtime/gnulib-lib/wchar.in.h | 2 +- + gettext-runtime/intl/gnulib-lib/c++defs.h | 12 +++++++++++- + gettext-runtime/intl/gnulib-lib/stdlib.in.h | 6 +++--- + gettext-runtime/intl/gnulib-lib/string.in.h | 4 ---- + gettext-runtime/intl/gnulib-lib/wchar.in.h | 2 +- + gettext-tools/gnulib-lib/c++defs.h | 12 +++++++++++- + gettext-tools/gnulib-lib/stdlib.in.h | 6 +++--- + gettext-tools/gnulib-lib/string.in.h | 4 ---- + gettext-tools/gnulib-lib/wchar.in.h | 2 +- + gettext-tools/libgettextpo/c++defs.h | 12 +++++++++++- + gettext-tools/libgettextpo/stdlib.in.h | 6 +++--- + gettext-tools/libgettextpo/string.in.h | 4 ---- + gettext-tools/libgettextpo/wchar.in.h | 2 +- + gettext-tools/libgrep/gnulib-lib/c++defs.h | 12 +++++++++++- + gettext-tools/libgrep/gnulib-lib/memchr2.c | 2 +- + gettext-tools/libgrep/gnulib-lib/stdlib.in.h | 6 +++--- + gettext-tools/libgrep/gnulib-lib/wchar.in.h | 2 +- + libtextstyle/lib/c++defs.h | 12 +++++++++++- + libtextstyle/lib/stdlib.in.h | 6 +++--- + libtextstyle/lib/string.in.h | 4 ---- + libtextstyle/lib/wchar.in.h | 2 +- + 24 files changed, 91 insertions(+), 51 deletions(-) + +diff --git a/gettext-runtime/gnulib-lib/c++defs.h b/gettext-runtime/gnulib-lib/c++defs.h +index df98a5a..d3dfabd 100644 +--- a/gettext-runtime/gnulib-lib/c++defs.h ++++ b/gettext-runtime/gnulib-lib/c++defs.h +@@ -127,6 +127,16 @@ + #define _GL_FUNCDECL_RPL_1(rpl_func,rettype,parameters,...) \ + _GL_EXTERN_C_FUNC __VA_ARGS__ rettype rpl_func parameters + ++/* _GL_FUNCDECL_SYS_NAME (func) expands to plain func if C++, and to ++ parenthsized func otherwise. Parenthesization is needed in C23 if ++ the function is like strchr and so is a qualifier-generic macro ++ that expands to something more complicated. */ ++#ifdef __cplusplus ++# define _GL_FUNCDECL_SYS_NAME(func) func ++#else ++# define _GL_FUNCDECL_SYS_NAME(func) (func) ++#endif ++ + /* _GL_FUNCDECL_SYS (func, rettype, parameters, [attributes]); + declares the system function, named func, with the given prototype, + consisting of return type, parameters, and attributes. +@@ -139,7 +149,7 @@ + _GL_FUNCDECL_SYS (posix_openpt, int, (int flags), _GL_ATTRIBUTE_NODISCARD); + */ + #define _GL_FUNCDECL_SYS(func,rettype,parameters,...) \ +- _GL_EXTERN_C_FUNC __VA_ARGS__ rettype func parameters ++ _GL_EXTERN_C_FUNC __VA_ARGS__ rettype _GL_FUNCDECL_SYS_NAME (func) parameters + + /* _GL_CXXALIAS_RPL (func, rettype, parameters); + declares a C++ alias called GNULIB_NAMESPACE::func +diff --git a/gettext-runtime/gnulib-lib/stdlib.in.h b/gettext-runtime/gnulib-lib/stdlib.in.h +index 1342db4..3548d6e 100644 +--- a/gettext-runtime/gnulib-lib/stdlib.in.h ++++ b/gettext-runtime/gnulib-lib/stdlib.in.h +@@ -237,9 +237,9 @@ _GL_INLINE_HEADER_BEGIN + + /* Declarations for ISO C N3322. */ + #if defined __GNUC__ && __GNUC__ >= 15 && !defined __clang__ +-_GL_EXTERN_C void *bsearch (const void *__key, +- const void *__base, size_t __nmemb, size_t __size, +- int (*__compare) (const void *, const void *)) ++_GL_EXTERN_C void *_GL_FUNCDECL_SYS_NAME (bsearch) ++ (const void *__key, const void *__base, size_t __nmemb, size_t __size, ++ int (*__compare) (const void *, const void *)) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3) _GL_ARG_NONNULL ((5)); + _GL_EXTERN_C void qsort (void *__base, size_t __nmemb, size_t __size, + int (*__compare) (const void *, const void *)) +diff --git a/gettext-runtime/gnulib-lib/string.in.h b/gettext-runtime/gnulib-lib/string.in.h +index 9a039c7..bc44f81 100644 +--- a/gettext-runtime/gnulib-lib/string.in.h ++++ b/gettext-runtime/gnulib-lib/string.in.h +@@ -403,7 +403,6 @@ _GL_CXXALIASWARN1 (memchr, void const *, + _GL_CXXALIASWARN (memchr); + # endif + #elif defined GNULIB_POSIXCHECK +-# undef memchr + /* Assume memchr is always declared. */ + _GL_WARN_ON_USE (memchr, "memchr has platform-specific bugs - " + "use gnulib module memchr for portability" ); +@@ -653,7 +652,6 @@ _GL_WARN_ON_USE (stpncpy, "stpncpy is unportable - " + #if defined GNULIB_POSIXCHECK + /* strchr() does not work with multibyte strings if the locale encoding is + GB18030 and the character to be searched is a digit. */ +-# undef strchr + /* Assume strchr is always declared. */ + _GL_WARN_ON_USE_CXX (strchr, + const char *, char *, (const char *, int), +@@ -945,7 +943,6 @@ _GL_CXXALIASWARN (strpbrk); + Even in this simple case, it does not work with multibyte strings if the + locale encoding is GB18030 and one of the characters to be searched is a + digit. */ +-# undef strpbrk + _GL_WARN_ON_USE_CXX (strpbrk, + const char *, char *, (const char *, const char *), + "strpbrk cannot work correctly on character strings " +@@ -975,7 +972,6 @@ _GL_WARN_ON_USE (strspn, "strspn cannot work correctly on character strings " + #if defined GNULIB_POSIXCHECK + /* strrchr() does not work with multibyte strings if the locale encoding is + GB18030 and the character to be searched is a digit. */ +-# undef strrchr + /* Assume strrchr is always declared. */ + _GL_WARN_ON_USE_CXX (strrchr, + const char *, char *, (const char *, int), +diff --git a/gettext-runtime/gnulib-lib/wchar.in.h b/gettext-runtime/gnulib-lib/wchar.in.h +index a6c52eb..b4de385 100644 +--- a/gettext-runtime/gnulib-lib/wchar.in.h ++++ b/gettext-runtime/gnulib-lib/wchar.in.h +@@ -316,7 +316,7 @@ _GL_EXTERN_C int wcsncmp (const wchar_t *__s1, const wchar_t *__s2, size_t __n) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); + # ifndef __cplusplus +-_GL_EXTERN_C wchar_t *wmemchr (const wchar_t *__s, wchar_t __wc, size_t __n) ++_GL_EXTERN_C wchar_t *(wmemchr) (const wchar_t *__s, wchar_t __wc, size_t __n) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3); + # endif + _GL_EXTERN_C wchar_t *wmemset (wchar_t *__s, wchar_t __wc, size_t __n) +diff --git a/gettext-runtime/intl/gnulib-lib/c++defs.h b/gettext-runtime/intl/gnulib-lib/c++defs.h +index df98a5a..d3dfabd 100644 +--- a/gettext-runtime/intl/gnulib-lib/c++defs.h ++++ b/gettext-runtime/intl/gnulib-lib/c++defs.h +@@ -127,6 +127,16 @@ + #define _GL_FUNCDECL_RPL_1(rpl_func,rettype,parameters,...) \ + _GL_EXTERN_C_FUNC __VA_ARGS__ rettype rpl_func parameters + ++/* _GL_FUNCDECL_SYS_NAME (func) expands to plain func if C++, and to ++ parenthsized func otherwise. Parenthesization is needed in C23 if ++ the function is like strchr and so is a qualifier-generic macro ++ that expands to something more complicated. */ ++#ifdef __cplusplus ++# define _GL_FUNCDECL_SYS_NAME(func) func ++#else ++# define _GL_FUNCDECL_SYS_NAME(func) (func) ++#endif ++ + /* _GL_FUNCDECL_SYS (func, rettype, parameters, [attributes]); + declares the system function, named func, with the given prototype, + consisting of return type, parameters, and attributes. +@@ -139,7 +149,7 @@ + _GL_FUNCDECL_SYS (posix_openpt, int, (int flags), _GL_ATTRIBUTE_NODISCARD); + */ + #define _GL_FUNCDECL_SYS(func,rettype,parameters,...) \ +- _GL_EXTERN_C_FUNC __VA_ARGS__ rettype func parameters ++ _GL_EXTERN_C_FUNC __VA_ARGS__ rettype _GL_FUNCDECL_SYS_NAME (func) parameters + + /* _GL_CXXALIAS_RPL (func, rettype, parameters); + declares a C++ alias called GNULIB_NAMESPACE::func +diff --git a/gettext-runtime/intl/gnulib-lib/stdlib.in.h b/gettext-runtime/intl/gnulib-lib/stdlib.in.h +index 1342db4..3548d6e 100644 +--- a/gettext-runtime/intl/gnulib-lib/stdlib.in.h ++++ b/gettext-runtime/intl/gnulib-lib/stdlib.in.h +@@ -237,9 +237,9 @@ _GL_INLINE_HEADER_BEGIN + + /* Declarations for ISO C N3322. */ + #if defined __GNUC__ && __GNUC__ >= 15 && !defined __clang__ +-_GL_EXTERN_C void *bsearch (const void *__key, +- const void *__base, size_t __nmemb, size_t __size, +- int (*__compare) (const void *, const void *)) ++_GL_EXTERN_C void *_GL_FUNCDECL_SYS_NAME (bsearch) ++ (const void *__key, const void *__base, size_t __nmemb, size_t __size, ++ int (*__compare) (const void *, const void *)) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3) _GL_ARG_NONNULL ((5)); + _GL_EXTERN_C void qsort (void *__base, size_t __nmemb, size_t __size, + int (*__compare) (const void *, const void *)) +diff --git a/gettext-runtime/intl/gnulib-lib/string.in.h b/gettext-runtime/intl/gnulib-lib/string.in.h +index 9a039c7..bc44f81 100644 +--- a/gettext-runtime/intl/gnulib-lib/string.in.h ++++ b/gettext-runtime/intl/gnulib-lib/string.in.h +@@ -403,7 +403,6 @@ _GL_CXXALIASWARN1 (memchr, void const *, + _GL_CXXALIASWARN (memchr); + # endif + #elif defined GNULIB_POSIXCHECK +-# undef memchr + /* Assume memchr is always declared. */ + _GL_WARN_ON_USE (memchr, "memchr has platform-specific bugs - " + "use gnulib module memchr for portability" ); +@@ -653,7 +652,6 @@ _GL_WARN_ON_USE (stpncpy, "stpncpy is unportable - " + #if defined GNULIB_POSIXCHECK + /* strchr() does not work with multibyte strings if the locale encoding is + GB18030 and the character to be searched is a digit. */ +-# undef strchr + /* Assume strchr is always declared. */ + _GL_WARN_ON_USE_CXX (strchr, + const char *, char *, (const char *, int), +@@ -945,7 +943,6 @@ _GL_CXXALIASWARN (strpbrk); + Even in this simple case, it does not work with multibyte strings if the + locale encoding is GB18030 and one of the characters to be searched is a + digit. */ +-# undef strpbrk + _GL_WARN_ON_USE_CXX (strpbrk, + const char *, char *, (const char *, const char *), + "strpbrk cannot work correctly on character strings " +@@ -975,7 +972,6 @@ _GL_WARN_ON_USE (strspn, "strspn cannot work correctly on character strings " + #if defined GNULIB_POSIXCHECK + /* strrchr() does not work with multibyte strings if the locale encoding is + GB18030 and the character to be searched is a digit. */ +-# undef strrchr + /* Assume strrchr is always declared. */ + _GL_WARN_ON_USE_CXX (strrchr, + const char *, char *, (const char *, int), +diff --git a/gettext-runtime/intl/gnulib-lib/wchar.in.h b/gettext-runtime/intl/gnulib-lib/wchar.in.h +index a6c52eb..b4de385 100644 +--- a/gettext-runtime/intl/gnulib-lib/wchar.in.h ++++ b/gettext-runtime/intl/gnulib-lib/wchar.in.h +@@ -316,7 +316,7 @@ _GL_EXTERN_C int wcsncmp (const wchar_t *__s1, const wchar_t *__s2, size_t __n) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); + # ifndef __cplusplus +-_GL_EXTERN_C wchar_t *wmemchr (const wchar_t *__s, wchar_t __wc, size_t __n) ++_GL_EXTERN_C wchar_t *(wmemchr) (const wchar_t *__s, wchar_t __wc, size_t __n) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3); + # endif + _GL_EXTERN_C wchar_t *wmemset (wchar_t *__s, wchar_t __wc, size_t __n) +diff --git a/gettext-tools/gnulib-lib/c++defs.h b/gettext-tools/gnulib-lib/c++defs.h +index df98a5a..d3dfabd 100644 +--- a/gettext-tools/gnulib-lib/c++defs.h ++++ b/gettext-tools/gnulib-lib/c++defs.h +@@ -127,6 +127,16 @@ + #define _GL_FUNCDECL_RPL_1(rpl_func,rettype,parameters,...) \ + _GL_EXTERN_C_FUNC __VA_ARGS__ rettype rpl_func parameters + ++/* _GL_FUNCDECL_SYS_NAME (func) expands to plain func if C++, and to ++ parenthsized func otherwise. Parenthesization is needed in C23 if ++ the function is like strchr and so is a qualifier-generic macro ++ that expands to something more complicated. */ ++#ifdef __cplusplus ++# define _GL_FUNCDECL_SYS_NAME(func) func ++#else ++# define _GL_FUNCDECL_SYS_NAME(func) (func) ++#endif ++ + /* _GL_FUNCDECL_SYS (func, rettype, parameters, [attributes]); + declares the system function, named func, with the given prototype, + consisting of return type, parameters, and attributes. +@@ -139,7 +149,7 @@ + _GL_FUNCDECL_SYS (posix_openpt, int, (int flags), _GL_ATTRIBUTE_NODISCARD); + */ + #define _GL_FUNCDECL_SYS(func,rettype,parameters,...) \ +- _GL_EXTERN_C_FUNC __VA_ARGS__ rettype func parameters ++ _GL_EXTERN_C_FUNC __VA_ARGS__ rettype _GL_FUNCDECL_SYS_NAME (func) parameters + + /* _GL_CXXALIAS_RPL (func, rettype, parameters); + declares a C++ alias called GNULIB_NAMESPACE::func +diff --git a/gettext-tools/gnulib-lib/stdlib.in.h b/gettext-tools/gnulib-lib/stdlib.in.h +index 1342db4..3548d6e 100644 +--- a/gettext-tools/gnulib-lib/stdlib.in.h ++++ b/gettext-tools/gnulib-lib/stdlib.in.h +@@ -237,9 +237,9 @@ _GL_INLINE_HEADER_BEGIN + + /* Declarations for ISO C N3322. */ + #if defined __GNUC__ && __GNUC__ >= 15 && !defined __clang__ +-_GL_EXTERN_C void *bsearch (const void *__key, +- const void *__base, size_t __nmemb, size_t __size, +- int (*__compare) (const void *, const void *)) ++_GL_EXTERN_C void *_GL_FUNCDECL_SYS_NAME (bsearch) ++ (const void *__key, const void *__base, size_t __nmemb, size_t __size, ++ int (*__compare) (const void *, const void *)) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3) _GL_ARG_NONNULL ((5)); + _GL_EXTERN_C void qsort (void *__base, size_t __nmemb, size_t __size, + int (*__compare) (const void *, const void *)) +diff --git a/gettext-tools/gnulib-lib/string.in.h b/gettext-tools/gnulib-lib/string.in.h +index 9a039c7..bc44f81 100644 +--- a/gettext-tools/gnulib-lib/string.in.h ++++ b/gettext-tools/gnulib-lib/string.in.h +@@ -403,7 +403,6 @@ _GL_CXXALIASWARN1 (memchr, void const *, + _GL_CXXALIASWARN (memchr); + # endif + #elif defined GNULIB_POSIXCHECK +-# undef memchr + /* Assume memchr is always declared. */ + _GL_WARN_ON_USE (memchr, "memchr has platform-specific bugs - " + "use gnulib module memchr for portability" ); +@@ -653,7 +652,6 @@ _GL_WARN_ON_USE (stpncpy, "stpncpy is unportable - " + #if defined GNULIB_POSIXCHECK + /* strchr() does not work with multibyte strings if the locale encoding is + GB18030 and the character to be searched is a digit. */ +-# undef strchr + /* Assume strchr is always declared. */ + _GL_WARN_ON_USE_CXX (strchr, + const char *, char *, (const char *, int), +@@ -945,7 +943,6 @@ _GL_CXXALIASWARN (strpbrk); + Even in this simple case, it does not work with multibyte strings if the + locale encoding is GB18030 and one of the characters to be searched is a + digit. */ +-# undef strpbrk + _GL_WARN_ON_USE_CXX (strpbrk, + const char *, char *, (const char *, const char *), + "strpbrk cannot work correctly on character strings " +@@ -975,7 +972,6 @@ _GL_WARN_ON_USE (strspn, "strspn cannot work correctly on character strings " + #if defined GNULIB_POSIXCHECK + /* strrchr() does not work with multibyte strings if the locale encoding is + GB18030 and the character to be searched is a digit. */ +-# undef strrchr + /* Assume strrchr is always declared. */ + _GL_WARN_ON_USE_CXX (strrchr, + const char *, char *, (const char *, int), +diff --git a/gettext-tools/gnulib-lib/wchar.in.h b/gettext-tools/gnulib-lib/wchar.in.h +index a6c52eb..b4de385 100644 +--- a/gettext-tools/gnulib-lib/wchar.in.h ++++ b/gettext-tools/gnulib-lib/wchar.in.h +@@ -316,7 +316,7 @@ _GL_EXTERN_C int wcsncmp (const wchar_t *__s1, const wchar_t *__s2, size_t __n) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); + # ifndef __cplusplus +-_GL_EXTERN_C wchar_t *wmemchr (const wchar_t *__s, wchar_t __wc, size_t __n) ++_GL_EXTERN_C wchar_t *(wmemchr) (const wchar_t *__s, wchar_t __wc, size_t __n) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3); + # endif + _GL_EXTERN_C wchar_t *wmemset (wchar_t *__s, wchar_t __wc, size_t __n) +diff --git a/gettext-tools/libgettextpo/c++defs.h b/gettext-tools/libgettextpo/c++defs.h +index df98a5a..d3dfabd 100644 +--- a/gettext-tools/libgettextpo/c++defs.h ++++ b/gettext-tools/libgettextpo/c++defs.h +@@ -127,6 +127,16 @@ + #define _GL_FUNCDECL_RPL_1(rpl_func,rettype,parameters,...) \ + _GL_EXTERN_C_FUNC __VA_ARGS__ rettype rpl_func parameters + ++/* _GL_FUNCDECL_SYS_NAME (func) expands to plain func if C++, and to ++ parenthsized func otherwise. Parenthesization is needed in C23 if ++ the function is like strchr and so is a qualifier-generic macro ++ that expands to something more complicated. */ ++#ifdef __cplusplus ++# define _GL_FUNCDECL_SYS_NAME(func) func ++#else ++# define _GL_FUNCDECL_SYS_NAME(func) (func) ++#endif ++ + /* _GL_FUNCDECL_SYS (func, rettype, parameters, [attributes]); + declares the system function, named func, with the given prototype, + consisting of return type, parameters, and attributes. +@@ -139,7 +149,7 @@ + _GL_FUNCDECL_SYS (posix_openpt, int, (int flags), _GL_ATTRIBUTE_NODISCARD); + */ + #define _GL_FUNCDECL_SYS(func,rettype,parameters,...) \ +- _GL_EXTERN_C_FUNC __VA_ARGS__ rettype func parameters ++ _GL_EXTERN_C_FUNC __VA_ARGS__ rettype _GL_FUNCDECL_SYS_NAME (func) parameters + + /* _GL_CXXALIAS_RPL (func, rettype, parameters); + declares a C++ alias called GNULIB_NAMESPACE::func +diff --git a/gettext-tools/libgettextpo/stdlib.in.h b/gettext-tools/libgettextpo/stdlib.in.h +index 1342db4..3548d6e 100644 +--- a/gettext-tools/libgettextpo/stdlib.in.h ++++ b/gettext-tools/libgettextpo/stdlib.in.h +@@ -237,9 +237,9 @@ _GL_INLINE_HEADER_BEGIN + + /* Declarations for ISO C N3322. */ + #if defined __GNUC__ && __GNUC__ >= 15 && !defined __clang__ +-_GL_EXTERN_C void *bsearch (const void *__key, +- const void *__base, size_t __nmemb, size_t __size, +- int (*__compare) (const void *, const void *)) ++_GL_EXTERN_C void *_GL_FUNCDECL_SYS_NAME (bsearch) ++ (const void *__key, const void *__base, size_t __nmemb, size_t __size, ++ int (*__compare) (const void *, const void *)) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3) _GL_ARG_NONNULL ((5)); + _GL_EXTERN_C void qsort (void *__base, size_t __nmemb, size_t __size, + int (*__compare) (const void *, const void *)) +diff --git a/gettext-tools/libgettextpo/string.in.h b/gettext-tools/libgettextpo/string.in.h +index 9a039c7..bc44f81 100644 +--- a/gettext-tools/libgettextpo/string.in.h ++++ b/gettext-tools/libgettextpo/string.in.h +@@ -403,7 +403,6 @@ _GL_CXXALIASWARN1 (memchr, void const *, + _GL_CXXALIASWARN (memchr); + # endif + #elif defined GNULIB_POSIXCHECK +-# undef memchr + /* Assume memchr is always declared. */ + _GL_WARN_ON_USE (memchr, "memchr has platform-specific bugs - " + "use gnulib module memchr for portability" ); +@@ -653,7 +652,6 @@ _GL_WARN_ON_USE (stpncpy, "stpncpy is unportable - " + #if defined GNULIB_POSIXCHECK + /* strchr() does not work with multibyte strings if the locale encoding is + GB18030 and the character to be searched is a digit. */ +-# undef strchr + /* Assume strchr is always declared. */ + _GL_WARN_ON_USE_CXX (strchr, + const char *, char *, (const char *, int), +@@ -945,7 +943,6 @@ _GL_CXXALIASWARN (strpbrk); + Even in this simple case, it does not work with multibyte strings if the + locale encoding is GB18030 and one of the characters to be searched is a + digit. */ +-# undef strpbrk + _GL_WARN_ON_USE_CXX (strpbrk, + const char *, char *, (const char *, const char *), + "strpbrk cannot work correctly on character strings " +@@ -975,7 +972,6 @@ _GL_WARN_ON_USE (strspn, "strspn cannot work correctly on character strings " + #if defined GNULIB_POSIXCHECK + /* strrchr() does not work with multibyte strings if the locale encoding is + GB18030 and the character to be searched is a digit. */ +-# undef strrchr + /* Assume strrchr is always declared. */ + _GL_WARN_ON_USE_CXX (strrchr, + const char *, char *, (const char *, int), +diff --git a/gettext-tools/libgettextpo/wchar.in.h b/gettext-tools/libgettextpo/wchar.in.h +index a6c52eb..b4de385 100644 +--- a/gettext-tools/libgettextpo/wchar.in.h ++++ b/gettext-tools/libgettextpo/wchar.in.h +@@ -316,7 +316,7 @@ _GL_EXTERN_C int wcsncmp (const wchar_t *__s1, const wchar_t *__s2, size_t __n) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); + # ifndef __cplusplus +-_GL_EXTERN_C wchar_t *wmemchr (const wchar_t *__s, wchar_t __wc, size_t __n) ++_GL_EXTERN_C wchar_t *(wmemchr) (const wchar_t *__s, wchar_t __wc, size_t __n) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3); + # endif + _GL_EXTERN_C wchar_t *wmemset (wchar_t *__s, wchar_t __wc, size_t __n) +diff --git a/gettext-tools/libgrep/gnulib-lib/c++defs.h b/gettext-tools/libgrep/gnulib-lib/c++defs.h +index df98a5a..d3dfabd 100644 +--- a/gettext-tools/libgrep/gnulib-lib/c++defs.h ++++ b/gettext-tools/libgrep/gnulib-lib/c++defs.h +@@ -127,6 +127,16 @@ + #define _GL_FUNCDECL_RPL_1(rpl_func,rettype,parameters,...) \ + _GL_EXTERN_C_FUNC __VA_ARGS__ rettype rpl_func parameters + ++/* _GL_FUNCDECL_SYS_NAME (func) expands to plain func if C++, and to ++ parenthsized func otherwise. Parenthesization is needed in C23 if ++ the function is like strchr and so is a qualifier-generic macro ++ that expands to something more complicated. */ ++#ifdef __cplusplus ++# define _GL_FUNCDECL_SYS_NAME(func) func ++#else ++# define _GL_FUNCDECL_SYS_NAME(func) (func) ++#endif ++ + /* _GL_FUNCDECL_SYS (func, rettype, parameters, [attributes]); + declares the system function, named func, with the given prototype, + consisting of return type, parameters, and attributes. +@@ -139,7 +149,7 @@ + _GL_FUNCDECL_SYS (posix_openpt, int, (int flags), _GL_ATTRIBUTE_NODISCARD); + */ + #define _GL_FUNCDECL_SYS(func,rettype,parameters,...) \ +- _GL_EXTERN_C_FUNC __VA_ARGS__ rettype func parameters ++ _GL_EXTERN_C_FUNC __VA_ARGS__ rettype _GL_FUNCDECL_SYS_NAME (func) parameters + + /* _GL_CXXALIAS_RPL (func, rettype, parameters); + declares a C++ alias called GNULIB_NAMESPACE::func +diff --git a/gettext-tools/libgrep/gnulib-lib/memchr2.c b/gettext-tools/libgrep/gnulib-lib/memchr2.c +index 7493823..d7724ae 100644 +--- a/gettext-tools/libgrep/gnulib-lib/memchr2.c ++++ b/gettext-tools/libgrep/gnulib-lib/memchr2.c +@@ -55,7 +55,7 @@ memchr2 (void const *s, int c1_in, int c2_in, size_t n) + c2 = (unsigned char) c2_in; + + if (c1 == c2) +- return memchr (s, c1, n); ++ return (void *) memchr (s, c1, n); + + /* Handle the first few bytes by reading one byte at a time. + Do this until VOID_PTR is aligned on a longword boundary. */ +diff --git a/gettext-tools/libgrep/gnulib-lib/stdlib.in.h b/gettext-tools/libgrep/gnulib-lib/stdlib.in.h +index 1342db4..3548d6e 100644 +--- a/gettext-tools/libgrep/gnulib-lib/stdlib.in.h ++++ b/gettext-tools/libgrep/gnulib-lib/stdlib.in.h +@@ -237,9 +237,9 @@ _GL_INLINE_HEADER_BEGIN + + /* Declarations for ISO C N3322. */ + #if defined __GNUC__ && __GNUC__ >= 15 && !defined __clang__ +-_GL_EXTERN_C void *bsearch (const void *__key, +- const void *__base, size_t __nmemb, size_t __size, +- int (*__compare) (const void *, const void *)) ++_GL_EXTERN_C void *_GL_FUNCDECL_SYS_NAME (bsearch) ++ (const void *__key, const void *__base, size_t __nmemb, size_t __size, ++ int (*__compare) (const void *, const void *)) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3) _GL_ARG_NONNULL ((5)); + _GL_EXTERN_C void qsort (void *__base, size_t __nmemb, size_t __size, + int (*__compare) (const void *, const void *)) +diff --git a/gettext-tools/libgrep/gnulib-lib/wchar.in.h b/gettext-tools/libgrep/gnulib-lib/wchar.in.h +index a6c52eb..b4de385 100644 +--- a/gettext-tools/libgrep/gnulib-lib/wchar.in.h ++++ b/gettext-tools/libgrep/gnulib-lib/wchar.in.h +@@ -316,7 +316,7 @@ _GL_EXTERN_C int wcsncmp (const wchar_t *__s1, const wchar_t *__s2, size_t __n) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); + # ifndef __cplusplus +-_GL_EXTERN_C wchar_t *wmemchr (const wchar_t *__s, wchar_t __wc, size_t __n) ++_GL_EXTERN_C wchar_t *(wmemchr) (const wchar_t *__s, wchar_t __wc, size_t __n) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3); + # endif + _GL_EXTERN_C wchar_t *wmemset (wchar_t *__s, wchar_t __wc, size_t __n) +diff --git a/libtextstyle/lib/c++defs.h b/libtextstyle/lib/c++defs.h +index df98a5a..d3dfabd 100644 +--- a/libtextstyle/lib/c++defs.h ++++ b/libtextstyle/lib/c++defs.h +@@ -127,6 +127,16 @@ + #define _GL_FUNCDECL_RPL_1(rpl_func,rettype,parameters,...) \ + _GL_EXTERN_C_FUNC __VA_ARGS__ rettype rpl_func parameters + ++/* _GL_FUNCDECL_SYS_NAME (func) expands to plain func if C++, and to ++ parenthsized func otherwise. Parenthesization is needed in C23 if ++ the function is like strchr and so is a qualifier-generic macro ++ that expands to something more complicated. */ ++#ifdef __cplusplus ++# define _GL_FUNCDECL_SYS_NAME(func) func ++#else ++# define _GL_FUNCDECL_SYS_NAME(func) (func) ++#endif ++ + /* _GL_FUNCDECL_SYS (func, rettype, parameters, [attributes]); + declares the system function, named func, with the given prototype, + consisting of return type, parameters, and attributes. +@@ -139,7 +149,7 @@ + _GL_FUNCDECL_SYS (posix_openpt, int, (int flags), _GL_ATTRIBUTE_NODISCARD); + */ + #define _GL_FUNCDECL_SYS(func,rettype,parameters,...) \ +- _GL_EXTERN_C_FUNC __VA_ARGS__ rettype func parameters ++ _GL_EXTERN_C_FUNC __VA_ARGS__ rettype _GL_FUNCDECL_SYS_NAME (func) parameters + + /* _GL_CXXALIAS_RPL (func, rettype, parameters); + declares a C++ alias called GNULIB_NAMESPACE::func +diff --git a/libtextstyle/lib/stdlib.in.h b/libtextstyle/lib/stdlib.in.h +index 1342db4..3548d6e 100644 +--- a/libtextstyle/lib/stdlib.in.h ++++ b/libtextstyle/lib/stdlib.in.h +@@ -237,9 +237,9 @@ _GL_INLINE_HEADER_BEGIN + + /* Declarations for ISO C N3322. */ + #if defined __GNUC__ && __GNUC__ >= 15 && !defined __clang__ +-_GL_EXTERN_C void *bsearch (const void *__key, +- const void *__base, size_t __nmemb, size_t __size, +- int (*__compare) (const void *, const void *)) ++_GL_EXTERN_C void *_GL_FUNCDECL_SYS_NAME (bsearch) ++ (const void *__key, const void *__base, size_t __nmemb, size_t __size, ++ int (*__compare) (const void *, const void *)) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3) _GL_ARG_NONNULL ((5)); + _GL_EXTERN_C void qsort (void *__base, size_t __nmemb, size_t __size, + int (*__compare) (const void *, const void *)) +diff --git a/libtextstyle/lib/string.in.h b/libtextstyle/lib/string.in.h +index 9a039c7..bc44f81 100644 +--- a/libtextstyle/lib/string.in.h ++++ b/libtextstyle/lib/string.in.h +@@ -403,7 +403,6 @@ _GL_CXXALIASWARN1 (memchr, void const *, + _GL_CXXALIASWARN (memchr); + # endif + #elif defined GNULIB_POSIXCHECK +-# undef memchr + /* Assume memchr is always declared. */ + _GL_WARN_ON_USE (memchr, "memchr has platform-specific bugs - " + "use gnulib module memchr for portability" ); +@@ -653,7 +652,6 @@ _GL_WARN_ON_USE (stpncpy, "stpncpy is unportable - " + #if defined GNULIB_POSIXCHECK + /* strchr() does not work with multibyte strings if the locale encoding is + GB18030 and the character to be searched is a digit. */ +-# undef strchr + /* Assume strchr is always declared. */ + _GL_WARN_ON_USE_CXX (strchr, + const char *, char *, (const char *, int), +@@ -945,7 +943,6 @@ _GL_CXXALIASWARN (strpbrk); + Even in this simple case, it does not work with multibyte strings if the + locale encoding is GB18030 and one of the characters to be searched is a + digit. */ +-# undef strpbrk + _GL_WARN_ON_USE_CXX (strpbrk, + const char *, char *, (const char *, const char *), + "strpbrk cannot work correctly on character strings " +@@ -975,7 +972,6 @@ _GL_WARN_ON_USE (strspn, "strspn cannot work correctly on character strings " + #if defined GNULIB_POSIXCHECK + /* strrchr() does not work with multibyte strings if the locale encoding is + GB18030 and the character to be searched is a digit. */ +-# undef strrchr + /* Assume strrchr is always declared. */ + _GL_WARN_ON_USE_CXX (strrchr, + const char *, char *, (const char *, int), +diff --git a/libtextstyle/lib/wchar.in.h b/libtextstyle/lib/wchar.in.h +index a6c52eb..b4de385 100644 +--- a/libtextstyle/lib/wchar.in.h ++++ b/libtextstyle/lib/wchar.in.h +@@ -316,7 +316,7 @@ _GL_EXTERN_C int wcsncmp (const wchar_t *__s1, const wchar_t *__s2, size_t __n) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); + # ifndef __cplusplus +-_GL_EXTERN_C wchar_t *wmemchr (const wchar_t *__s, wchar_t __wc, size_t __n) ++_GL_EXTERN_C wchar_t *(wmemchr) (const wchar_t *__s, wchar_t __wc, size_t __n) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3); + # endif + _GL_EXTERN_C wchar_t *wmemset (wchar_t *__s, wchar_t __wc, size_t __n) diff --git a/meta/recipes-core/gettext/gettext_0.26.bb b/meta/recipes-core/gettext/gettext_0.26.bb index b99b301af48..bb730154497 100644 --- a/meta/recipes-core/gettext/gettext_0.26.bb +++ b/meta/recipes-core/gettext/gettext_0.26.bb @@ -26,6 +26,7 @@ SRC_URI += " \ file://serial-tests-config.patch \ file://0001-tests-autopoint-3-unset-MAKEFLAGS.patch \ file://0001-init-env.in-do-not-add-C-CXX-parameters.patch \ + file://0001-Port-to-C23-qualifier-generic-fns-like-strchr.patch \ " SRC_URI:append:libc-musl = " file://0001-Ignore-failing-tests-needing-BIG5-encoding-on-musl.patch" From patchwork Thu Apr 16 22:30:06 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86338 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id AFD98F8DFE9 for ; Thu, 16 Apr 2026 22:33:26 +0000 (UTC) Received: from mail-wm1-f65.google.com (mail-wm1-f65.google.com [209.85.128.65]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.28259.1776378796323532585 for ; Thu, 16 Apr 2026 15:33:16 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=ozpBiyJK; spf=pass (domain: smile.fr, ip: 209.85.128.65, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f65.google.com with SMTP id 5b1f17b1804b1-488af9fdaa7so312765e9.1 for ; Thu, 16 Apr 2026 15:33:16 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378794; x=1776983594; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=aTSTwpC5bDG19T7VWxJSvKNmzJSczFr0PvMMp4dsYB4=; b=ozpBiyJKRKuBn45ziDUwbjnzxq5EyH7mN5dk2WJZenA+96oza4I9Omuem5uojgOQrE 9r7Pjldiwhn3hoDiNaF1vcTO96ZVa87+eTHNeH98XS5c67Ahea3x3cuxxEBAu8KT8xfn Q6f5iiyC1AiM40p1f/X5gIpTxpsrYcKK6m9Vw= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378794; x=1776983594; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=aTSTwpC5bDG19T7VWxJSvKNmzJSczFr0PvMMp4dsYB4=; b=PySWz//pFhuTlPuJ800UzrvgwACpm2Qo5ouBRzRM5et0bpIaJT1j3Uhrfg3LeWT/k0 vbHnEx+HYyfLU65BhroDwxe6g+ULbk4eGnlzkBTTM20fiDzOFoPhcak2R7Go83cReIrf PbACgZ9ozRsWvbCQDrIC6MlzrwrRlXK1mVHR+DZU9qDofj/EkK4xneJZVyMtZdM4ZxUN yf80wUd9Ga1qXSlCLnC68ae7doks3cTYVdiAqU3D1tZopRmCiLyU4SkGbOHbPXpLA7XA iVHyl1uOXkdWa6DzVaL3WjLGDJZJrKAGbQFPcpxQ4UjLnmGVgVGQPv8xNDLgpRFslFO+ AcqA== X-Gm-Message-State: AOJu0YzBzq1BYuHgAYfhWZH6Ara81Mj617cHL9Z6kZQ9/axShEvGuFfy zJh3pAJTpXRF0Rhsu829wHk44+45FPfEzCASjjRNUurIq117Wxv+LOfo5GHeL57BQs/mLZP4SSo 8NAj/SiH0SFAu X-Gm-Gg: AeBDietLMoSng0yusNG+cApA5QoUmAgSY6aT6X5NXhD+4BRCOUnTQh53EM6c8xfmiQd l53rYomw0q2b63ZDPuCyFbJ4hm8Mc7wysEZJunbes7adU2I2hseJHAwJHFQ62rcE8Kbty35uUcN kjs7oDUVF1+gCeJDSh4ilBm19UVz7UopTstyFB/P+yrsZHWjvItJVut99i4A9Yk2hKAUhA1bmYv saSkjrKYORIw/bB5y4p3mCEUhcNYK8j7xd4a+zWpIVpdDMPkjkOcdZ39XG0uWnzq1YZec44u6uu iwQMZ9gTsyPqH4CybUW2/Pn/dL54bdZKuLqxhbJL/WoAu40gLaswx9zVj5msNWPGidN1qoZvuwH sdtI8SKB7oTxR7oj002o8vhZqAqg5ArWJmEogo21rB8EXTxje8it1Lglbf1yFhFDpt6gzSyLepB GkhSAeci0bZS4QJzwKU/4F0yAaOo8vGpn7i2oBY5MmG6SAFeTELpB1dD7Hr0G3Shi4hFvts/KEk P3ZvsPFIXPImcjjSMtN8HGQAO+nzj5CnSFd4GUGjWU7IYvu X-Received: by 2002:a05:600c:a309:b0:488:a882:b7 with SMTP id 5b1f17b1804b1-488fb788b82mr3004035e9.29.1776378794176; Thu, 16 Apr 2026 15:33:14 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.13 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:13 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 23/51] util-linux: backport fix to build with glibc-2.43 on host Date: Fri, 17 Apr 2026 00:30:06 +0200 Message-ID: <5fda90b79d6b0e4fd948927cb66d3bfad0e34b09.1776377993.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:26 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235452 From: Martin Jansa Signed-off-by: Martin Jansa Signed-off-by: Yoann Congal --- meta/recipes-core/util-linux/util-linux.inc | 1 + ...x-bsearch-macro-usage-with-glibc-C23.patch | 40 +++++++++++++++++++ 2 files changed, 41 insertions(+) create mode 100644 meta/recipes-core/util-linux/util-linux/0001-lsfd-fix-bsearch-macro-usage-with-glibc-C23.patch diff --git a/meta/recipes-core/util-linux/util-linux.inc b/meta/recipes-core/util-linux/util-linux.inc index 3135bbb7c64..3bcf681f243 100644 --- a/meta/recipes-core/util-linux/util-linux.inc +++ b/meta/recipes-core/util-linux/util-linux.inc @@ -21,6 +21,7 @@ SRC_URI = "${KERNELORG_MIRROR}/linux/utils/util-linux/v${MAJOR_VERSION}/util-lin file://0001-ts-kill-decode-use-RTMIN-from-kill-L-instead-of-hard.patch \ file://0001-tests-helpers-test_sigstate.c-explicitly-reset-SIGIN.patch \ file://0001-include-mount-api-utils-avoid-using-sys-mount.h.patch \ + file://0001-lsfd-fix-bsearch-macro-usage-with-glibc-C23.patch \ file://CVE-2025-14104-01.patch \ file://CVE-2025-14104-02.patch \ " diff --git a/meta/recipes-core/util-linux/util-linux/0001-lsfd-fix-bsearch-macro-usage-with-glibc-C23.patch b/meta/recipes-core/util-linux/util-linux/0001-lsfd-fix-bsearch-macro-usage-with-glibc-C23.patch new file mode 100644 index 00000000000..6194594f7fc --- /dev/null +++ b/meta/recipes-core/util-linux/util-linux/0001-lsfd-fix-bsearch-macro-usage-with-glibc-C23.patch @@ -0,0 +1,40 @@ +From 710a6989e0fc6dfc9290e2639022d1dbf429557f Mon Sep 17 00:00:00 2001 +From: =?UTF-8?q?Cristian=20Rodr=C3=ADguez?= +Date: Sat, 22 Nov 2025 10:41:08 -0300 +Subject: [PATCH] lsfd: fix bsearch macro usage with glibc C23 +MIME-Version: 1.0 +Content-Type: text/plain; charset=UTF-8 +Content-Transfer-Encoding: 8bit + +C23 requires bsearch to be a const preserving macro, build now fails +with + +../lsfd-cmd/lsfd.c:1879:75: error: macro ‘bsearch’ passed 6 arguments, but takes just 5 + 1879 | nfds, sizeof(struct pollfd), pollfdcmp)) + | ^ +In file included from ../include/c.h:17, + from ../lsfd-cmd/lsfd.c:48: +/usr/include/stdlib.h:987:10: note: macro ‘bsearch’ defined here + 987 | # define bsearch(KEY, BASE, NMEMB, SIZE, COMPAR) \ + + add parenthesis around expression to fix it. + +Upstream-Status: Backport [2.42 https://github.com/util-linux/util-linux/commit/711bda1441561bfd2eb6d45fe0bc789535c1f1a8] +Signed-off-by: Martin Jansa +--- + lsfd-cmd/lsfd.c | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/lsfd-cmd/lsfd.c b/lsfd-cmd/lsfd.c +index 75cd1de..9aae240 100644 +--- a/lsfd-cmd/lsfd.c ++++ b/lsfd-cmd/lsfd.c +@@ -1836,7 +1836,7 @@ static void mark_poll_fds_as_multiplexed(char *buf, + struct file *file = list_entry(f, struct file, files); + if (is_opened_file(file) && !file->multiplexed) { + int fd = file->association; +- if (bsearch(&(struct pollfd){.fd = fd,}, local.iov_base, ++ if (bsearch((&(struct pollfd){.fd = fd,}), local.iov_base, + nfds, sizeof(struct pollfd), pollfdcmp)) + file->multiplexed = 1; + } From patchwork Thu Apr 16 22:30:07 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86336 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id C0A2BF8DFEA for ; Thu, 16 Apr 2026 22:33:26 +0000 (UTC) Received: from mail-wm1-f65.google.com (mail-wm1-f65.google.com [209.85.128.65]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.28573.1776378796852173212 for ; Thu, 16 Apr 2026 15:33:17 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=NApx+CV6; spf=pass (domain: smile.fr, ip: 209.85.128.65, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f65.google.com with SMTP id 5b1f17b1804b1-488a88aeec9so603315e9.2 for ; Thu, 16 Apr 2026 15:33:16 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378795; x=1776983595; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=xd1Oh51XRJtN4hlM/3Q0YJ5TBwhGd63HGd4UxeJdqMI=; b=NApx+CV6xhRm1F80PFzdF7WDQtOcL0Wijj2DK8psuho1Acly2f9NztDFqHFxZ1dBU7 sEm//Ju9zJWEY0t3+ToHiT5H0f3m9PNLIvpBXtn1CEFWIWO6JdpB9Bh5jNMzpAkBcsM+ F2aRnlFocHKWPhR9w7G7QtQaceThkuFUII8JE= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378795; x=1776983595; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=xd1Oh51XRJtN4hlM/3Q0YJ5TBwhGd63HGd4UxeJdqMI=; b=Xy5g//3PJfwGpZX2Ppov0H3jVwzzu+R6UlvU176L1+hCGyRFny/eFJWXZC4wHNhX2o 0gfnE1OBDc+M9QkxJIxCjLPASZZYw/k4jmbZ2T/l6qw7bLzbjp5e21ENaG3Y583Xo4mA bXPyVcBOfEiCVcNueCw4oIpFzlKKggStFm/oWFNF9ho8EXixRwgKbuw6vbfgMtlNaGJw CrmwUT0aWsNtrRyx6RUitqrR6DNtgl6IfJmqUwN3JKA6DAu0IX7f1mUjwN/9wXkenhLc Yaj+hAshA0sb7xOpxu7DPN1RV/IlT0X4yGllDUHodNXAHT2O8UWJJ8i+MrulbBQXAlzp 8HYQ== X-Gm-Message-State: AOJu0YxDfgAPZnkfNvWHihxMeEgG6VRIgRKXnFSp/vn3tbLjrBtZ229o ggbGL/orvT1xjaBi2/AsQnQ3ZzC4BXwbSBztzBfpOSFzR6KSVGg+on2iy1T3crbBBErf1dZizUg 1cvsaxiF00ruB X-Gm-Gg: AeBDieuBjx9y5OevVn4ir/JuWHUV51OWru84qqZj/lAme6meLfjNievBaXTIC0H1sZv IEMOY6tFYmDbUjHCoN5B8vMaPIklc9oqMzTvfaCs1Z/37n1TuRpU0iaj7RgkgjWdN8BWrZnPmw1 ssd/u4B9oGNFfjR23YWYqBsR7DM8kyVqUrk0j3Is6ioJB/XI/ficGLM4AWT0F+/zyUJeDpeBE+K UwnY6uHcOQQELcWFOLEpxASR6bavA+JrNK8Eq1cvM43c+t+zEOO84cfGOLTvSK27PWg5XRhuAp+ sbRaN3wfswqDfDjOHifWSCanUrKRcHugISERRdQeRBgui+KdrjZKMubdYYPSDbFwbdFecmLb5ch 5pqvSZ8Y+wYeo7wr5Y521tJEt+2V4U8Z8WhbTl3L0EFWK86OEgxhWZ0ZHUoHOlo0VnmZNBRiXWv xdRAFDeEVPM/GsTcXfVbuXNlq3C2URlbBr2DaD8c3T/c5zEUQXoshj1/x71QD6u8tVLjaOR6c+o isTt53DK/xMz6tyEJNWToMiwn9j+cnnaSyzTA== X-Received: by 2002:a05:600c:8582:b0:485:4006:960c with SMTP id 5b1f17b1804b1-488fb7710e1mr3868165e9.16.1776378794702; Thu, 16 Apr 2026 15:33:14 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.14 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:14 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 24/51] systemd: backport fix to build with glibc-2.43 on host Date: Fri, 17 Apr 2026 00:30:07 +0200 Message-ID: <166f2b4685678af745f346c6f73aab6f12e84149.1776377993.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:26 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235453 From: Martin Jansa fixes systemd-systemctl-native on hosts with glibc-2.43: In file included from ../sources/systemd-systemctl-257.9/src/basic/errno-list.c:13: src/basic/errno-to-name.h:71:23: error: initialized field overwritten [-Werror=override-init] 71 | [EFSBADCRC] = "EFSBADCRC", | ^~~~~~~~~~~ src/basic/errno-to-name.h:71:23: note: (near initialization for ?errno_names[74]?) src/basic/errno-to-name.h:114:26: error: initialized field overwritten [-Werror=override-init] 114 | [EFSCORRUPTED] = "EFSCORRUPTED", | ^~~~~~~~~~~~~~ src/basic/errno-to-name.h:114:26: note: (near initialization for ?errno_names[117]?) Signed-off-by: Martin Jansa Signed-off-by: Yoann Congal --- meta/recipes-core/systemd/systemd.inc | 4 ++- ...ilter-out-EFSBADCRC-and-EFSCORRUPTED.patch | 34 +++++++++++++++++++ 2 files changed, 37 insertions(+), 1 deletion(-) create mode 100644 meta/recipes-core/systemd/systemd/0001-errno-list-filter-out-EFSBADCRC-and-EFSCORRUPTED.patch diff --git a/meta/recipes-core/systemd/systemd.inc b/meta/recipes-core/systemd/systemd.inc index 761660f2c84..f41acc029d1 100644 --- a/meta/recipes-core/systemd/systemd.inc +++ b/meta/recipes-core/systemd/systemd.inc @@ -17,6 +17,8 @@ LIC_FILES_CHKSUM = "file://LICENSE.GPL2;md5=751419260aa954499f7abaabaa882bbe \ SRCREV = "5e38d199a623563698ab4a69acbbe3afa9135198" SRCBRANCH = "v257-stable" -SRC_URI = "git://github.com/systemd/systemd.git;protocol=https;branch=${SRCBRANCH};tag=v${PV}" +SRC_URI = "git://github.com/systemd/systemd.git;protocol=https;branch=${SRCBRANCH};tag=v${PV} \ + file://0001-errno-list-filter-out-EFSBADCRC-and-EFSCORRUPTED.patch \ +" CVE_PRODUCT = "systemd" diff --git a/meta/recipes-core/systemd/systemd/0001-errno-list-filter-out-EFSBADCRC-and-EFSCORRUPTED.patch b/meta/recipes-core/systemd/systemd/0001-errno-list-filter-out-EFSBADCRC-and-EFSCORRUPTED.patch new file mode 100644 index 00000000000..5673175cb13 --- /dev/null +++ b/meta/recipes-core/systemd/systemd/0001-errno-list-filter-out-EFSBADCRC-and-EFSCORRUPTED.patch @@ -0,0 +1,34 @@ +From fb146f6d2c5118410fd19907651fd8f7310bf69e Mon Sep 17 00:00:00 2001 +From: Yu Watanabe +Date: Tue, 24 Feb 2026 20:19:45 +0900 +Subject: [PATCH] errno-list: filter out EFSBADCRC and EFSCORRUPTED + +These are introduced in kernel v7.0. + +Upstream-Status: Backport [https://github.com/systemd/systemd/commit/3cfb16998808a6ec8012a6120d0a82f0e1a0c8bb] +Signed-off-by: Martin Jansa +--- + src/basic/generate-errno-list.sh | 10 +++++++--- + 1 file changed, 7 insertions(+), 3 deletions(-) + +diff --git a/src/basic/generate-errno-list.sh b/src/basic/generate-errno-list.sh +index f756b2e020..491fa1b6e3 100755 +--- a/src/basic/generate-errno-list.sh ++++ b/src/basic/generate-errno-list.sh +@@ -3,9 +3,13 @@ + set -eu + set -o pipefail + +-# In kernel's arch/parisc/include/uapi/asm/errno.h, ECANCELLED and EREFUSED are defined as aliases of +-# ECANCELED and ECONNREFUSED, respectively. Let's drop them. ++# In kernel's arch/parisc/include/uapi/asm/errno.h, The following aliases are defined: ++# ECANCELLED → ECANCELED ++# EREFUSED → ECONNREFUSED ++# EFSBADCRC → EBADMSG ++# EFSCORRUPTED → EUCLEAN ++# Let's drop them. + + ${1:?} -dM -include errno.h - X-Patchwork-Id: 86335 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D26B7F8DFEF for ; Thu, 16 Apr 2026 22:33:26 +0000 (UTC) Received: from mail-wm1-f68.google.com (mail-wm1-f68.google.com [209.85.128.68]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.28260.1776378797219993210 for ; Thu, 16 Apr 2026 15:33:17 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=Vh9KlQP+; spf=pass (domain: smile.fr, ip: 209.85.128.68, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f68.google.com with SMTP id 5b1f17b1804b1-488b0e1b870so731135e9.2 for ; Thu, 16 Apr 2026 15:33:17 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378795; x=1776983595; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=KJb1Dlh4BL8yr9dAzwUZYcUbujXbwXURbUU05zFLT60=; b=Vh9KlQP+g72xUz0HXpP4ohxlJqTWzLbcXN04Xnp+kcOO0FoibUUtCPMZT+NeHinFHQ +lS4QindWcuZtKYV7V2pmLL2ZDkg9efgJbLFnmhkZ0mLi+sZBSyW1Kq+/xisLpKdzirK wlCo+oFgd/ZSnbsixjbRomb8Y9QKc3BmENyMQ= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378795; x=1776983595; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=KJb1Dlh4BL8yr9dAzwUZYcUbujXbwXURbUU05zFLT60=; b=FH0dhikPJHmPKGe3rcyqDgxtvGBCp8i/BlSJ1LlA3cf81BLlIQBUgWRkUAaMRay7ZF Z50YWiHWN2aLhy0cI9bxl+BO6FIfrwD5SDhkkqe+s7egIXDmaeEBjYtzGGb25v65uOla 5WVd92uJcPh2pzWTZoH/ExyW+EIxbvT0jq/YT6b9jkdGRV7gfEBP55AFzZvm17bOZu7K mEfYpi86UemaEaurJmgciwUtx7DZP2WG9n1Rbh7a9GXxJcMZ53mVLXkzZbeo6CXSZsfg Aju506fYgKp0938kPkWl3Vxs/7ihqzGH1b9aqFYyXb72qs2kOi7JhcDTAB0F15zd/GvP DBbg== X-Gm-Message-State: AOJu0YwCjUr6qdgoNGSCNjhfxxjRillVDBOq2MRtNRxZTby0eub8cyrK qnvFr/7r+ghagG0xI7OSDV002pJxrjE/XSDRPqb03JOtyee4IrKyTqEu/ZNc6RyrUrIrcLUB4Kp P5p1UGux6QEEG X-Gm-Gg: AeBDiesdkSBzf3p3yFJRwuMA4OCrMZJSKB0qWF0JRLn/nQCwvoRik0DmMuMZS1ltxQI qThP2yPFWoQkdXrE4V3VVAgApdxAIzaC1mUNlFDA/DwAcA2+KERJ992MVrLAXKwwJ+DZNruHHZQ oWG4ZTxEpJ9wl4PYR42gWC/lg9K/KTD1Wxzf2iVfL2WxMYqNppcc7MJi7BQtDpOU6iEmfSPhY40 HeAxQw5HnabXSv9NPgdNBShwJyaCFtqk1H68XIcF4GRKlzRbJD1iqgQvERNjPfgePA/9huXHp3o V7w9pg5/J+95d+d3vE6YIoU7a/fxCLpA0eIYBvC7f6XQRBl+6j8LdfFSuWROlQyXEonWH1j79uv NPXHRMBpZQq1+gZt0yusmkhujd45+HZLmcxBxEArnIk/0lRfQbkfX/HGrKEmTYolWw4loS4ZrhP RAWBjTpmeugBgSi5DVDsEUjfxw+N/C7zFPZG2xhyWMxpO5SKchUwymAyz14lpfAhozIEBpDz5Qh yrHDSqGQ2rkLxH4b9xwMp1Ac/cbn/8fiS2+iw== X-Received: by 2002:a05:600c:8183:b0:488:ab26:8fe0 with SMTP id 5b1f17b1804b1-488fb765b1dmr5027835e9.15.1776378795354; Thu, 16 Apr 2026 15:33:15 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.14 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:15 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 25/51] virglrenderer: Fix build with glibc 2.43+ Date: Fri, 17 Apr 2026 00:30:08 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:26 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235454 From: Khem Raj Signed-off-by: Khem Raj Signed-off-by: Mathieu Dubois-Briand (cherry picked from commit 8e85dc6b7f5f7668a610b5fd3754c716f0af65b0) [YC: Fixed patch format and Submitted->Backport] Signed-off-by: Yoann Congal --- ...once_flag-ONCE_FLAG_INIT-when-presen.patch | 55 +++++++++++++++++++ .../virglrenderer/virglrenderer_1.1.1.bb | 1 + 2 files changed, 56 insertions(+) create mode 100644 meta/recipes-graphics/virglrenderer/virglrenderer/0001-c11-use-glibc-s-once_flag-ONCE_FLAG_INIT-when-presen.patch diff --git a/meta/recipes-graphics/virglrenderer/virglrenderer/0001-c11-use-glibc-s-once_flag-ONCE_FLAG_INIT-when-presen.patch b/meta/recipes-graphics/virglrenderer/virglrenderer/0001-c11-use-glibc-s-once_flag-ONCE_FLAG_INIT-when-presen.patch new file mode 100644 index 00000000000..2fa7245371d --- /dev/null +++ b/meta/recipes-graphics/virglrenderer/virglrenderer/0001-c11-use-glibc-s-once_flag-ONCE_FLAG_INIT-when-presen.patch @@ -0,0 +1,55 @@ +From 179e744f7577d98df7c79d7324c22acfb32a0154 Mon Sep 17 00:00:00 2001 +From: Dave Airlie +Date: Fri, 7 Nov 2025 13:14:56 +1000 +Subject: [PATCH] c11/threads: fix build on c23 + +C23/glibc is now including once_init in stdlib.h + +https://patchwork.sourceware.org/project/glibc/patch/78061085-f04a-0c45-107b-5a8a15521083@redhat.com/#213088 + +Just fix up our use of it. + +Upstream-Status: Backport [https://gitlab.freedesktop.org/virgl/virglrenderer/-/commit/3f0f775edb2df5ea54c37863286ad565ccddb276] +Signed-off-by: Khem Raj +--- + src/mesa/compat/c11/impl/threads_posix.c | 3 ++- + 2 files changed, 4 insertions(+), 1 deletion(-) + +--- a/src/mesa/compat/c11/threads_posix.h ++++ b/src/mesa/compat/c11/threads_posix.h +@@ -51,7 +51,9 @@ Configuration macro: + #include + + /*---------------------------- macros ----------------------------*/ ++#ifndef __once_flag_defined + #define ONCE_FLAG_INIT PTHREAD_ONCE_INIT ++#endif + #ifdef INIT_ONCE_STATIC_INIT + #define TSS_DTOR_ITERATIONS PTHREAD_DESTRUCTOR_ITERATIONS + #else +@@ -66,8 +68,9 @@ typedef pthread_cond_t cnd_t; + typedef pthread_t thrd_t; + typedef pthread_key_t tss_t; + typedef pthread_mutex_t mtx_t; ++#ifndef __once_flag_defined + typedef pthread_once_t once_flag; +- ++#endif + + /* + Implementation limits: +@@ -90,12 +93,13 @@ impl_thrd_routine(void *p) + + /*--------------- 7.25.2 Initialization functions ---------------*/ + // 7.25.2.1 ++#ifndef __once_flag_defined + static inline void + call_once(once_flag *flag, void (*func)(void)) + { + pthread_once(flag, func); + } +- ++#endif + + /*------------- 7.25.3 Condition variable functions -------------*/ + // 7.25.3.1 diff --git a/meta/recipes-graphics/virglrenderer/virglrenderer_1.1.1.bb b/meta/recipes-graphics/virglrenderer/virglrenderer_1.1.1.bb index 89dd25de70e..be4385ada61 100644 --- a/meta/recipes-graphics/virglrenderer/virglrenderer_1.1.1.bb +++ b/meta/recipes-graphics/virglrenderer/virglrenderer_1.1.1.bb @@ -12,6 +12,7 @@ DEPENDS = "libdrm libepoxy python3-pyyaml-native virtual/egl virtual/libgbm" SRCREV = "0f1f43929724a6a414c01a29bc51feccb445c2f0" SRC_URI = "git://gitlab.freedesktop.org/virgl/virglrenderer.git;branch=main;protocol=https;tag=${PV} \ file://0001-meson.build-use-python3-directly-for-python.patch \ + file://0001-c11-use-glibc-s-once_flag-ONCE_FLAG_INIT-when-presen.patch \ " inherit meson pkgconfig features_check From patchwork Thu Apr 16 22:30:09 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86340 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id E2999F8DFF2 for ; Thu, 16 Apr 2026 22:33:26 +0000 (UTC) Received: from mail-wm1-f50.google.com (mail-wm1-f50.google.com [209.85.128.50]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.28575.1776378797816872237 for ; Thu, 16 Apr 2026 15:33:18 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=KY1ZqYen; spf=pass (domain: smile.fr, ip: 209.85.128.50, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f50.google.com with SMTP id 5b1f17b1804b1-488b0e1b870so731155e9.2 for ; Thu, 16 Apr 2026 15:33:17 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378796; x=1776983596; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=bcZ/HfQtRKtWZJsk4vppdO7Mc19rvtmmKW48HwDGObU=; b=KY1ZqYeneYxy77SbdPmlV9FndeMWEaGHLrzpnGT0X/g33CmNx+3pe2hROK1upTeCXR /x7yuEQUQFOu8coUmFx75QQAv1bVeP/v+HNxEE3t0+rxXs3w4nYqsH1s96Bu0Rfu0XO6 ixTS8NcHvpTbh01EMZZKfvRhB9X+k8DvdrDM0= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378796; x=1776983596; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=bcZ/HfQtRKtWZJsk4vppdO7Mc19rvtmmKW48HwDGObU=; b=ZJNiMuE0Kd4zo3Ch7b63I27W2R9yhx9cpKk+7A3nv456dM8Z+FJS822nC0GPgRUPZa bmS5XlKwxNetfIs+jEeaCPg/UpTSrv8OXDbTx1hcV6+W0r1h3vM2s5CvMDuj4G+nQxPM LZS6nlQORyh+9ImYGXGcF3bDuQse/Gf6tW4ugvtpzk8QK/rcaEAyJNH7JCbM2WiXbkyx +/PKN12GjcPU6JfvTkB+DuP2q1k9RXAOmV/7y9W2gYJ1nvThXTDkVDGCfjWOF4b8ZORX /bf6faOnPEjdZy+F1XU1drvq0FWxv06z1FEe765mesP9vLfqTB1z2LCeMYWOyQmGtW62 XC2w== X-Gm-Message-State: AOJu0YxtHq0YThjgOmYJnZm7bpWGNrUGeEYSXSpPl5kPgVxQ9UsordBW UgUWTyd6cDmgnbjicllgeSYc9ZIvjqsywwM8v8CfLJz2WiG2rxdGVptpqkc+SwJDzsvRATC3z3q OjITupjH4wg== X-Gm-Gg: AeBDietkN0FevMuJGOC3v2ShwsmVwWd2nqlGSokHeWpTJ0aYsauhvNff3V26cODMXEE hZhBWM18AScExmo2CdxmI+E+U/uMearQStTo177+MoDaE9aEiXbyDiHL+cVqf17/x33qymiMfI1 bSjeGENDqN1giURC99Q2I37G9u9pMz03GdhLPBEOdvNUkwHJqSuX429sNCqAQv2AXTZZnhWzxL3 DRyPHBOJ4Ka/cjqGpTXtsVnhNdOWSQdrvEcXBx0Knw9xhC8rPHfuOM9cDC9f9ZnpmYO3YePnOb7 fqS9q71PckgRMx2j3b4VmfSn8PaXAPXajWe6hbYz0m93GL2TDVQWs/ZC6DSmOeD33cEieYAe3sM vGLGWRMUd9NTQtqu9w5j7p5faVoh5tJH4KEiJ1HwHnUwS/DP0yLCr7NUKfpolIpVe01BaGVEBv1 5Ivg6JVSIwAdVsjtQdaqWNuKQTK5K0mboTBMT/TZzWb0pk1lz1SSGmNP8h0e2CAfcO5P71Z0qmr vgtV0B5bKhXB5KGkjBbGTRggtISsh+4EpQ9tQ== X-Received: by 2002:a05:600c:4746:b0:488:9439:881a with SMTP id 5b1f17b1804b1-488fb738412mr5007995e9.2.1776378795830; Thu, 16 Apr 2026 15:33:15 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.15 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:15 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 26/51] libxcrypt: avoid discarded-qualifiers build failure with glibc 2.43 Date: Fri, 17 Apr 2026 00:30:09 +0200 Message-ID: <84c2eb57c30101cc5f6acd0bd62b6af5d7e22e0f.1776377993.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:26 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235455 From: Hemanth Kumar M D With the glibc 2.43 upgrade, building nativesdk-libxcrypt triggers a -Wdiscarded-qualifiers warning in crypt-gost-yescrypt.c and crypt-sm3-yescrypt.c which becomes a build failure due to -Werror. Signed-off-by: Hemanth Kumar M D Signed-off-by: Richard Purdie (cherry picked from commit 8340d4be03646f0b4b599f768ddc88f502f93615) Signed-off-by: Yoann Congal --- meta/recipes-core/libxcrypt/libxcrypt.inc | 1 + 1 file changed, 1 insertion(+) diff --git a/meta/recipes-core/libxcrypt/libxcrypt.inc b/meta/recipes-core/libxcrypt/libxcrypt.inc index da515d19270..1292f4288bc 100644 --- a/meta/recipes-core/libxcrypt/libxcrypt.inc +++ b/meta/recipes-core/libxcrypt/libxcrypt.inc @@ -19,6 +19,7 @@ PROVIDES = "virtual/crypt" BUILD_CPPFLAGS = "-I${STAGING_INCDIR_NATIVE}" TARGET_CPPFLAGS = "-I${STAGING_DIR_TARGET}${includedir} -Wno-error" CPPFLAGS:append:class-nativesdk = " -Wno-error" +CFLAGS:append:class-nativesdk = " -Wno-error=discarded-qualifiers" API = "--disable-obsolete-api" EXTRA_OECONF += "${API}" From patchwork Thu Apr 16 22:30:10 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86341 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 0287BF8DFF9 for ; Thu, 16 Apr 2026 22:33:27 +0000 (UTC) Received: from mail-wm1-f67.google.com (mail-wm1-f67.google.com [209.85.128.67]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.28261.1776378798284297072 for ; Thu, 16 Apr 2026 15:33:18 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=h6qflklL; spf=pass (domain: smile.fr, ip: 209.85.128.67, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f67.google.com with SMTP id 5b1f17b1804b1-488ab2db91aso541675e9.3 for ; Thu, 16 Apr 2026 15:33:18 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378796; x=1776983596; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=WXzXM3DbToyzC5TpDNpfUuaOMlAQtMvX2S9gnLe3IMg=; b=h6qflklLwjAGgJQORL7J+QeJcSq8zCHOxFHuq36xVJmKvlgysytZKEhys11EXxCCke /0P/SBeHjM3ToBRKwaK0uu4rUevh4sAHmXinKtJn4MQPvYdlJgr1975PnvcCJie93Hw4 RYMsLkEOoMlkgFbqaY0bbycrpxvcbty/za5BY= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378796; x=1776983596; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=WXzXM3DbToyzC5TpDNpfUuaOMlAQtMvX2S9gnLe3IMg=; b=ndby7b2QV9cn8wKjKOl7oNBe/cWYqGW7Pe44xni60gxGqr7l/Qv47+LkQXPUEdIhu5 y10xKwex4Z/31bYum0Y4gYhJ5eRgz9X3uO9ks9lRHWCdIXpUEEjQeAsA1tGai/NxFQUd X1KbRS3f0Ws8znLz4zBfWvQBsbZSLRSkZcI1oBp8+qlLWmKDqINeO6eACuZkdXDRAQA+ tuwM+BNpoE5qljzJa6OR7glYNzkXnvZUai97sFY8RLW0u65pSX8sYZ7HoHgGVQL8BzB3 vE98pZzZjBmPSRjYkj3F7ljTiIAGAD80+oupeUSWfhjuUdD2gHgLnDbqVJ+TANFL1DUb MS4w== X-Gm-Message-State: AOJu0YzQzJo/UQ75/B2Sspw/bmo/jLlLtHleU1+f+DcbObx71a2W2ihI ITP+uQ0bodQ6/sdIIrWwBsQ8bFis3q15gp/mIHwBAR2jU7XSFof/1YsgIJ8IZipX8Uroec4JIiq BEhAZG280y4RN X-Gm-Gg: AeBDies6pSRnoKFYOhTKQbcX09P4KgoBrErisLFhbo+AKA+sI7n/dvQBqqfkze/dusO KqGVcrM28LYjEn0/cNgeX9MCNBsE/iF5LrqeAYlnOSoxwFdP/mm8mo6Se+RJX1xiynNMOVNwd7s 4Fu5ZdLU8JmFA8fxZnss/+b6aGSJkRorzhibMQg12/jLAo7PIfgsS9DLZqfR8kF4aFTNxB4CkPB EFPe+oM6aCqYYnftz83Jv+KNcyxEJMkXqejdfVdUTcyKRY32XbHwPJ4DMlJ3NDA2v8fxO5CNGId gdBYv+36CYj8eKBLUvpjnJaG7b+oyVIC2ntzg2ywvceYImdOKtMfCnr86R75MZft4aON6oJHxYG CLmEG6msy+N9StzMHWeo84M8fdqnHWCOwyL+qQnjkY5LsLdwAiKsiekF/NZYkGCN0ZIBTf4/eFd pt3spFff2IgHIeE++W7Qs2nwAMjNge4vTyS9+iqqPtZu1jgtAncjUDp0RKQIgSFtNDkM2adLeTM 5Gld6Sg0/w6/hAXA5bG21P0H5O3z7yFgxWM0g== X-Received: by 2002:a05:600d:8402:b0:477:76bf:e1fb with SMTP id 5b1f17b1804b1-488fb778740mr3702295e9.16.1776378796396; Thu, 16 Apr 2026 15:33:16 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.15 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:16 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 27/51] libxcrypt: Fix build wrt C23 support Date: Fri, 17 Apr 2026 00:30:10 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:27 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235456 From: Khem Raj latest glibc has better C23 support and exposes this problem Fixes following errors seen in nativesdk-libxcrypt | ../sources/libxcrypt-4.5.2/lib/crypt-sm3-yescrypt.c:139:9: error: initializing 'char *' with an expression of type 'const char *' discards qualifiers [-Werror,-Wincompatible-pointer-types-discards-qualifiers] | 139 | char *hptr = strchr ((const char *) intbuf->retval + 3, '$'); | | ^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | 6 errors generated. Compared to wrynose remove lib/crypt-sm3-yescrypt.c change, because the file doesn't exist in the version used in whinlatter, it was failing only in lib/crypt-gost-yescrypt.c Signed-off-by: Khem Raj Signed-off-by: Richard Purdie (cherry picked from commit a666b8e71ecda97db58c90d5af137671f9823f38) [YC: fixed patch format] Signed-off-by: Yoann Congal --- ...24d6e87aeae631bc0a7bb1ba983cf8def4de.patch | 29 +++++++++++++++++++ meta/recipes-core/libxcrypt/libxcrypt.inc | 1 + 2 files changed, 30 insertions(+) create mode 100644 meta/recipes-core/libxcrypt/files/174c24d6e87aeae631bc0a7bb1ba983cf8def4de.patch diff --git a/meta/recipes-core/libxcrypt/files/174c24d6e87aeae631bc0a7bb1ba983cf8def4de.patch b/meta/recipes-core/libxcrypt/files/174c24d6e87aeae631bc0a7bb1ba983cf8def4de.patch new file mode 100644 index 00000000000..75749c054a2 --- /dev/null +++ b/meta/recipes-core/libxcrypt/files/174c24d6e87aeae631bc0a7bb1ba983cf8def4de.patch @@ -0,0 +1,29 @@ +From 174c24d6e87aeae631bc0a7bb1ba983cf8def4de Mon Sep 17 00:00:00 2001 +From: Stanislav Zidek +Date: Wed, 10 Dec 2025 14:03:54 +0100 +Subject: [PATCH] fix -Werror=discarded-qualifiers + +On Fedora rawhide (to be Fedora 44), gcc became more strict +wrt. const-ness. + +Upstream-Status: Backport [https://github.com/besser82/libxcrypt/pull/220 without lib/crypt-sm3-yescrypt.c] +Signed-off-by: Khem Raj + +--- + lib/crypt-gost-yescrypt.c | 2 +- + lib/crypt-sm3-yescrypt.c | 2 +- + 2 files changed, 2 insertions(+), 2 deletions(-) + +diff --git a/lib/crypt-gost-yescrypt.c b/lib/crypt-gost-yescrypt.c +index 190ae94b..e9dc7e80 100644 +--- a/lib/crypt-gost-yescrypt.c ++++ b/lib/crypt-gost-yescrypt.c +@@ -131,7 +131,7 @@ crypt_gost_yescrypt_rn (const char *phrase, size_t phr_size, + intbuf->outbuf[1] = 'g'; + + /* extract yescrypt output from "$y$param$salt$output" */ +- char *hptr = strchr ((const char *) intbuf->retval + 3, '$'); ++ char *hptr = strchr ((char *) intbuf->retval + 3, '$'); + if (!hptr) + { + errno = EINVAL; diff --git a/meta/recipes-core/libxcrypt/libxcrypt.inc b/meta/recipes-core/libxcrypt/libxcrypt.inc index 1292f4288bc..d84cbc9db39 100644 --- a/meta/recipes-core/libxcrypt/libxcrypt.inc +++ b/meta/recipes-core/libxcrypt/libxcrypt.inc @@ -10,6 +10,7 @@ LIC_FILES_CHKSUM = "file://LICENSING;md5=c0a30e2b1502c55a7f37e412cd6c6a4b \ inherit autotools pkgconfig SRC_URI = "git://github.com/besser82/libxcrypt.git;branch=${SRCBRANCH};protocol=https \ + file://174c24d6e87aeae631bc0a7bb1ba983cf8def4de.patch \ " SRCREV = "55ea777e8d567e5e86ffac917c28815ac54cc341" SRCBRANCH ?= "master" From patchwork Thu Apr 16 22:30:11 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86339 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1B8E0F8DFFB for ; Thu, 16 Apr 2026 22:33:27 +0000 (UTC) Received: from mail-wm1-f46.google.com (mail-wm1-f46.google.com [209.85.128.46]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.28577.1776378798848277604 for ; Thu, 16 Apr 2026 15:33:19 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=0WBdNToq; spf=pass (domain: smile.fr, ip: 209.85.128.46, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f46.google.com with SMTP id 5b1f17b1804b1-488a88aeec9so603635e9.2 for ; Thu, 16 Apr 2026 15:33:18 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378797; x=1776983597; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=MxhVmaE7zOkp6+PRpkOk7YIy8FhadmSy8TPi6WlO+KI=; b=0WBdNToqsRg3EsY5sk09Wk+uwH95DMNdUWlNhu0JFysQ1qSQ2uAiSSjXaLOs0gPwl6 ojkS9gwq5OPSlp9tATYD26SoNk4GMCvTJsn1QES4aP9tXy5toCzDlfojHgtPZvm5/pcN fPIGXMRAOG+vcDNlDVzHLLvwHsX4zJnfG0JMA= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378797; x=1776983597; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=MxhVmaE7zOkp6+PRpkOk7YIy8FhadmSy8TPi6WlO+KI=; b=mHp/HGz5v9p7Kbxgu5eiBwclbR3WJbEYFNkGj+TopsJ8mHXXLs4k+f/p1pEkqEcRO3 4J2eCTubKSKqBPlUoAVHsWHo/SxH3gDiiGGfK2D2/I/0XpMOhZLqE7NKCpr0AwY36mDY 6HavlhxkHVpc7P5L4QIGjiVx7ohXoghYr0menNjD2oMhHe8WteCHn3quA3fEiLKVyINe 6ReAYgpAZwyE7KgAk1uvaqU2yvjtWs6Tb+z1sVvc1mdbNZwExvzrNXBybK8+Ic88Am8O oN9SdIs+HgtixZ8GHwQEAintsLnt2MEc8mdIxW0VWRHlL72XQnOLyNyR5CIWMchdl6Nd 2akQ== X-Gm-Message-State: AOJu0YxDeT3RAzIyMxYiea37kJax1rTv4CPcxgVpSkCg+HsXPJsaYJmQ C7C/GeeHxIImi+qbvzgDdKpnFq34I00VwqVITNy5UNN31G+nN3Q2TwMm61UaDcMVoVUC6sVnTAq ENSUpAUBnEw== X-Gm-Gg: AeBDieszjmFZk21l4Yz1VmgCQ9ytfBYA7zdBRUQ3yA2xxE0kp3UNNbmQu+RX4lRjCaR 4dHtnTeJl6silzDQE/x+UVFJR7PI0mPVpxG2qXn4H4Vs6uQVPdvhOegFmEsvGd3o7Py3C2bMj36 ONWx06/EMdXR00hEQ7C8npo4+v4X4NNTOF4SNhtKq1k9sj3uIcYb6t/udfOv4mphhBtYQexSs5y +VyUJMhjxbY1YbS0gJ/oHxc+gcBBszh2EJ0VZLp/a9yPizaHamsguunPMmJI8QPTZSzo3Punlbb d0gyebWiUamEu+lxFdD1jmBAVadDOPEblWepIa7vRluSnBcEHxbWj6dnCgq/IFYu7sdotj/IziR vfklh2DN4bx+/A+d53e3UV+NXe9P5FihYZj0Qz+hKnemkpxx8+hDPHSqciKd7dCL4cwwRO1p3pH 0dwkGj6pMMPwTNUBfxVlfX8P6b1dj1losCUDJD2adzlBT9j9P0vdx9n9f0ceDfwmB3/VBi4DBAQ xEOWQ5YL55NOXWFYO/AMqQkNMfhM2dGqR+uJg== X-Received: by 2002:a05:600c:c10a:b0:483:2c98:4368 with SMTP id 5b1f17b1804b1-488fb771613mr3909435e9.18.1776378796903; Thu, 16 Apr 2026 15:33:16 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.16 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:16 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 28/51] libxcrypt: Use configure knob to disable warnings as errors Date: Fri, 17 Apr 2026 00:30:11 +0200 Message-ID: <87b9e62a9e2d984d957ed89c773f349559185c1b.1776377993.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:27 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235457 From: Khem Raj Passing Wno-error via environment flags for target and nativesdk is intended but is not effective due to command line ordering and as a result some patches have been added to disable particular kind of warning as error. Given the scenario, warnings as errors should be disabled for all builds, this makes it portable across hosts and across compilers ( gcc, clang ) and glibc versions. Signed-off-by: Khem Raj Signed-off-by: Richard Purdie (cherry picked from commit 25f26861ddc8d71af5381d1acc883ad948bddace) Signed-off-by: Yoann Congal --- meta/recipes-core/libxcrypt/libxcrypt.inc | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/meta/recipes-core/libxcrypt/libxcrypt.inc b/meta/recipes-core/libxcrypt/libxcrypt.inc index d84cbc9db39..25cb7f6178c 100644 --- a/meta/recipes-core/libxcrypt/libxcrypt.inc +++ b/meta/recipes-core/libxcrypt/libxcrypt.inc @@ -18,9 +18,9 @@ SRCBRANCH ?= "master" PROVIDES = "virtual/crypt" BUILD_CPPFLAGS = "-I${STAGING_INCDIR_NATIVE}" -TARGET_CPPFLAGS = "-I${STAGING_DIR_TARGET}${includedir} -Wno-error" -CPPFLAGS:append:class-nativesdk = " -Wno-error" -CFLAGS:append:class-nativesdk = " -Wno-error=discarded-qualifiers" +TARGET_CPPFLAGS = "-I${STAGING_DIR_TARGET}${includedir}" + +EXTRA_OECONF += "--disable-werror" API = "--disable-obsolete-api" EXTRA_OECONF += "${API}" From patchwork Thu Apr 16 22:30:12 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86342 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 32207F8DFFD for ; Thu, 16 Apr 2026 22:33:27 +0000 (UTC) Received: from mail-wm1-f68.google.com (mail-wm1-f68.google.com [209.85.128.68]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.28578.1776378799391720682 for ; Thu, 16 Apr 2026 15:33:19 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=r4JSrgKj; spf=pass (domain: smile.fr, ip: 209.85.128.68, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f68.google.com with SMTP id 5b1f17b1804b1-488e1a8ac40so508675e9.2 for ; Thu, 16 Apr 2026 15:33:19 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378797; x=1776983597; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=kK7I/Dj6jEptH08CVaYYpmC8ZWnGsKlnT4Wcpctu+Ww=; b=r4JSrgKjeKP5yNsnIvl49bvDARvKvJ2KnQzCZBlaj9q1VnIHmQk2MEoX6UiKQNF58W qw5Ht7pV2zxDm4wWJCmCnAZ8Ou5I5fJzmC4OdVAG8l7atYsDAKkPznoA5iw94fmZMUpU P2elrbig7GAX/tfjFbk8kMY2iH1bgxN07OCcA= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378797; x=1776983597; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=kK7I/Dj6jEptH08CVaYYpmC8ZWnGsKlnT4Wcpctu+Ww=; b=CZUyR2MBbKeVMn67GleQ2iJipDj3+1ZJ5ODMrLgsnTe0LJlbmJoVhju0GW3A+7wvFU MQPwHVllyed0a/TzOFguE4tvEgcWC1h7D0CmHYDGAG7tCyyz8L11w4Z3z/AMN4u75Zak 0vinJ5X4ioXkuZhwQtlXZPDlUu6MiqmkTuNhTEnUsOjRtwe57BD00GDulF3y8faEYRHk i0CvSvpjSVC6PQUQnqPi2K8XpQlbeh0IICBt4TunDg6crxNfMopJmBLsJZ0WBMlmlAUl dYF4WyTAU6O9lZBTC4D+dc5MQkft4QcffKzYpaSImKxM9FIBycO2pbJBe40p587jbbmu A34Q== X-Gm-Message-State: AOJu0YxP3JK4g0t1lHSEupzkMQ+GFwiflEJolk1MnPkMhnsUzV9lqPdv wc1Yh15MG4ASd9FYomwKeazj4TldjQGMQjS2KKzbKWFBDxwdw2LlW8n7YGutl40biJR89AebR9L 13Mpg+oTP4VD3 X-Gm-Gg: AeBDievnzfYmS8Uxuz6Jdse8f00NS5vp3iDH/PhKIR5+zN1b7UIDik6FfjQwTuH0DLz NnS1ff94dmJwKegEtgZJ0dxKFnYcWYSl+M8GXmTX3QZBgdQOTb29lr9DsfoUn7p41R2PPsv55In gjXL2NoZp7tOSJ/OtaZLvNhgwYtSpeQUGWkz7hXBS7ev45NbfT/rldJJ7CjnIhvF3ckLIJCaIDe Pgu7YRuKNJq3E7LUlzzuNYvy+ypzZU7pWdjLRu7u6e8oBOgxwgVMiIXjTWVJYY8id2lhn12Qom/ td40oxT1sZNAhRCxLMWqJDd3FaYfkB0NdlieU0eAyGbmfLuE20DSxQsT+sJ0dBXucMNPkx5uolz wZm88axgyP5IFjLSha++1iQ1UnJJ04/HPb6PamlcMizGH8vn01uZsG0jWa3a9TgjeGIR3Xgyd8X 38f28zse4EXscd7xVCY3xEVHlV7i7UvLXw/EPjhz8aWgxkp4ML9gJPxNH3aH2AD9c3LL31wT8gi iaexbs1O1hgmRzXpHGqbvDUSHJzHb1Amr0/qw== X-Received: by 2002:a05:600c:4750:b0:486:fdba:f5db with SMTP id 5b1f17b1804b1-488fb6e7316mr6577565e9.0.1776378797489; Thu, 16 Apr 2026 15:33:17 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.16 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:17 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 29/51] glibc: stable 2.42 branch updates Date: Fri, 17 Apr 2026 00:30:12 +0200 Message-ID: <6261f1fb32d248ab3b242642674b913039d01758.1776377993.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:27 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235458 From: Hemanth Kumar M D $ git log --oneline 912d89a766847649a3857985a3b5e6065c51bfd4..a56a2943d2ce541102c630142c2eae0fbfc5886b a56a2943d2 tests: fix tst-rseq with Linux 7.0 68099ccc94 elf: parse /proc/self/maps as the last resort to find the gap for tst-link-map-contiguous-ldso 426378547e resolv: Check hostname for validity (CVE-2026-4438) 8e863fb1c9 resolv: Count records correctly (CVE-2026-4437) 1a19d5a507 posix: Run tst-wordexp-reuse-mem test 9cd9c90544 iconvdata: Fix invalid pointer arithmetic in ANSI_X3.110 module ebd45473f5 nss: Missing checks in __nss_configure_lookup, __nss_database_get (bug 28940) 937ef7aaf3 Linux: In getlogin_r, use utmp fallback only for specific errors 3989780591 nss: Introduce dedicated struct nss_database_for_fork type Testing Results: +--------------+--------+--------+------+ | Result | Before | After | Diff | +--------------+--------+--------+------+ | PASS | 6934 | 6938 | +4 | | XPASS | 4 | 4 | 0 | | FAIL | 76 | 75 | -1 | | XFAIL | 16 | 16 | 0 | | UNSUPPORTED | 108 | 109 | +1 | +--------------+--------+--------+------+ Changes in testcases: +------------------------------------------------------+--------+-------------+ | Testcase | Before | After | +------------------------------------------------------+--------+-------------+ | elf/tst-glibc-hwcaps | FAIL | PASS | | elf/tst-ldconfig-soname | FAIL | PASS | | nptl/tst-thread-affinity-pthread2 | PASS | FAIL | | nss/tst-nss-malloc-failure-getlogin_r | N/A | UNSUPPORTED | | posix/tst-wordexp-reuse-mem | N/A | PASS | | resolv/tst-resolv-dns-section | N/A | PASS | | resolv/tst-resolv-invalid-ptr | N/A | PASS | +------------------------------------------------------+--------+-------------+ Signed-off-by: Hemanth Kumar M D Signed-off-by: Yoann Congal --- meta/recipes-core/glibc/glibc-version.inc | 2 +- meta/recipes-core/glibc/glibc_2.42.bb | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/meta/recipes-core/glibc/glibc-version.inc b/meta/recipes-core/glibc/glibc-version.inc index 9991c024953..9f1003570d7 100644 --- a/meta/recipes-core/glibc/glibc-version.inc +++ b/meta/recipes-core/glibc/glibc-version.inc @@ -1,6 +1,6 @@ SRCBRANCH ?= "release/2.42/master" PV = "2.42+git" -SRCREV_glibc ?= "912d89a766847649a3857985a3b5e6065c51bfd4" +SRCREV_glibc ?= "a56a2943d2ce541102c630142c2eae0fbfc5886b" SRCREV_localedef ?= "cba02c503d7c853a38ccfb83c57e343ca5ecd7e5" GLIBC_GIT_URI ?= "git://sourceware.org/git/glibc.git;protocol=https" diff --git a/meta/recipes-core/glibc/glibc_2.42.bb b/meta/recipes-core/glibc/glibc_2.42.bb index a8717c0eae2..7e0aa3d5fc5 100644 --- a/meta/recipes-core/glibc/glibc_2.42.bb +++ b/meta/recipes-core/glibc/glibc_2.42.bb @@ -17,7 +17,7 @@ Allows for ASLR bypass so can bypass some hardening, not an exploit in itself, m easier access for another. 'ASLR bypass itself is not a vulnerability.'" CVE_STATUS_GROUPS += "CVE_STATUS_STABLE_BACKPORTS" -CVE_STATUS_STABLE_BACKPORTS = "CVE-2025-15281 CVE-2026-0861 CVE-2026-0915" +CVE_STATUS_STABLE_BACKPORTS = "CVE-2025-15281 CVE-2026-0861 CVE-2026-0915 CVE-2026-4437 CVE-2026-4438" CVE_STATUS_STABLE_BACKPORTS[status] = "cpe-stable-backport: fix available in used git hash" DEPENDS += "gperf-native bison-native" From patchwork Thu Apr 16 22:30:13 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86343 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3DE92F8DFFF for ; Thu, 16 Apr 2026 22:33:27 +0000 (UTC) Received: from mail-wm1-f68.google.com (mail-wm1-f68.google.com [209.85.128.68]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.28580.1776378799936453208 for ; Thu, 16 Apr 2026 15:33:20 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=NSDLMBbB; spf=pass (domain: smile.fr, ip: 209.85.128.68, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f68.google.com with SMTP id 5b1f17b1804b1-488afb0427eso614705e9.1 for ; Thu, 16 Apr 2026 15:33:19 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378798; x=1776983598; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=x7gLM0M8of39R2sQvm++eXO9/oPJTZEMqnB7bpqOVIs=; b=NSDLMBbB9ZlsRTLKv0SvmTJPHHJC38WSs+L4Hpx5bzBvojF2bIFmb0jYgx9EO9Ujvc e6+BtwGXuu/f3O89cWQMfgbHkv4Ngz/K3NXURI/BQIGyHAU3RSo89vjC0nRZimfFL9/y YrpxidtyE1nGgGitV6siZzW1ZDjQuemcAoobs= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378798; x=1776983598; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=x7gLM0M8of39R2sQvm++eXO9/oPJTZEMqnB7bpqOVIs=; b=Ff6lAauLzq/webQeUX/XhLM/hJ1OFbeF0oLZqiuOpJG0/IWnfEjvgd+52fTagf/Z/q YSo70jrwsupyt7XnhkysiLTvQExsRUBDscvDQOZlWOLQJlJ9FbJ8pljUgjIS9jWvqfAq CqA3CTjbon00fK0egVfKKdq2Ct7fuV6lubpQMad7367FC98HI4cCFSUrA1G1rzZl1It4 3jTbLY0VG6N4nLCytOxIMGBa8PVesx3ukIEE+QqNAhFkb5bvNWLbJR4sC/UIq7bY5YyG Q0x7fqtxEorowk9AuAvymzwDNkYHJL8CXHReyGshFDm+n+772m/ljcxRhyrl4laYhXkX RNOg== X-Gm-Message-State: AOJu0Yzhie61vnmqVafwx7DmD6RXb+XEid5o+H8r1E9ant+tlFCj2GZl LA26IYI730S/6BWRtwrPrsUIC901blE0uQJtfH+luEKTSs9T8pOGkiUU/+iZfmz5efND8k1IM2C bVpvTdBmdSFuy X-Gm-Gg: AeBDies4RwI+Ikz5/PdpwZjDUyKvga32P8Q0jdL9AnqYfWbyQqxHJM4oXQFnDXEWzno GGmfPny88n8nlfRRsCd/6mCn10yZJ5MD6nHImrgJglV/lnhrR7viTfg2XeDCrMPcXakbYfsH+6R /dArKRAqfusz88zU0CiViZ4fePV/s+9I0w3nZG4rx1xM0aFc3OglIidPmmtIYiR5WbzmywKimMz ZdUrsAfoc+5ojhkYiXe7+JafjZN/PmC1VSADJmv54h/BKL/IN0EAB17kTwlBlrITCwbKOBYbY1d NrpcYGCTxxC5Su5mHkqKXWnRI8kF6+yMuoGF4g8stz5QTS5Ta4w6REkKAWY4jWwGV2mMFfAzfus 3HvZ2c1EDiqxG+F/mCg3oBG33tUN8o3kLyea53slOQtlwRf79+Q7xU1UGnh+WsD41xsR9lzNkyM CWYOQa3eXj/LTvlMpI+AYvUm/FYm5kq/w7ofGlny8leVKP6LSkm9n8mLtrYSwfuOPaY/cjqvlw/ arm1r90f3RQWRSU56Qsah8I3ee9CQ4ox1h8JA== X-Received: by 2002:a05:600c:8901:b0:488:f9cb:f6c4 with SMTP id 5b1f17b1804b1-488fb7786cemr4127415e9.18.1776378798029; Thu, 16 Apr 2026 15:33:18 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.17 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:17 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 30/51] spirv-tools: backport a fix for building with gcc-16 Date: Fri, 17 Apr 2026 00:30:13 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:27 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235459 From: Martin Jansa Fixes: https://errors.yoctoproject.org/Errors/Details/905195/ when building on host with gcc-16 Signed-off-by: Martin Jansa Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit b4801e63d1284f3fa5006f0e24f560130c2a0a4c) Signed-off-by: Yoann Congal --- ...sue-with-gcc-16-replaeces-PR-6542-65.patch | 50 +++++++++++++++++++ .../spir/spirv-tools_1.4.328.1.bb | 3 +- 2 files changed, 52 insertions(+), 1 deletion(-) create mode 100644 meta/recipes-graphics/spir/spirv-tools/0001-opt-Fix-build-issue-with-gcc-16-replaeces-PR-6542-65.patch diff --git a/meta/recipes-graphics/spir/spirv-tools/0001-opt-Fix-build-issue-with-gcc-16-replaeces-PR-6542-65.patch b/meta/recipes-graphics/spir/spirv-tools/0001-opt-Fix-build-issue-with-gcc-16-replaeces-PR-6542-65.patch new file mode 100644 index 00000000000..ce58b6b8c0f --- /dev/null +++ b/meta/recipes-graphics/spir/spirv-tools/0001-opt-Fix-build-issue-with-gcc-16-replaeces-PR-6542-65.patch @@ -0,0 +1,50 @@ +From aab5c96b7eb237b8bcd15e28f8aff068842db4b7 Mon Sep 17 00:00:00 2001 +From: David Neto +Date: Tue, 3 Mar 2026 12:11:47 -0500 +Subject: [PATCH] opt: Fix build issue with gcc 16 (replaeces PR #6542) + (#6567) +MIME-Version: 1.0 +Content-Type: text/plain; charset=UTF-8 +Content-Transfer-Encoding: 8bit + +Compiling with gcc 16 throws this error: + +FAILED: [code=1] +source/opt/CMakeFiles/SPIRV-Tools-opt.dir/decoration_manager.cpp.o + source/opt/decoration_manager.cpp: In member function +‘spvtools::opt::analysis::DecorationManager::CloneDecorations(unsigned +int, unsigned int)’: + source/opt/decoration_manager.cpp:546:27: error: +‘MEM[(unsigned int &)&op + 24]’ may be used uninitialized +[-Werror=maybe-uninitialized] + +546 | if (op.words[0] == from) { // add new pair of operands: (to, +literal) + source/opt/decoration_manager.cpp:545:19: note: ‘op’ declared here + 545 | Operand op = inst->GetOperand(i); + | ^~ + cc1plus: all warnings being treated as errors + +Make sure that the vector is not empty before using it. + +Co-authored-by: José Expósito +Signed-off-by: Martin Jansa +Upstream-Status: Backport [c28f5937bce369dde1d645299a8c9873da43dc72] +--- + source/opt/decoration_manager.cpp | 3 ++- + 1 file changed, 2 insertions(+), 1 deletion(-) + +diff --git a/source/opt/decoration_manager.cpp b/source/opt/decoration_manager.cpp +index 3e95dbc35..bee7d9482 100644 +--- a/source/opt/decoration_manager.cpp ++++ b/source/opt/decoration_manager.cpp +@@ -543,7 +543,8 @@ void DecorationManager::CloneDecorations(uint32_t from, uint32_t to) { + const uint32_t num_operands = inst->NumOperands(); + for (uint32_t i = 1; i < num_operands; i += 2) { + Operand op = inst->GetOperand(i); +- if (op.words[0] == from) { // add new pair of operands: (to, literal) ++ if (!op.words.empty() && ++ op.words[0] == from) { // add new pair of operands: (to, literal) + inst->AddOperand( + Operand(spv_operand_type_t::SPV_OPERAND_TYPE_ID, {to})); + op = inst->GetOperand(i + 1); diff --git a/meta/recipes-graphics/spir/spirv-tools_1.4.328.1.bb b/meta/recipes-graphics/spir/spirv-tools_1.4.328.1.bb index e5aedb16208..99d4e34ec5b 100644 --- a/meta/recipes-graphics/spir/spirv-tools_1.4.328.1.bb +++ b/meta/recipes-graphics/spir/spirv-tools_1.4.328.1.bb @@ -9,7 +9,8 @@ LIC_FILES_CHKSUM = "file://LICENSE;md5=3b83ef96387f14655fc854ddc3c6bd57" SRCREV = "7f2d9ee926f98fc77a3ed1e1e0f113b8c9c49458" SRC_URI = "git://github.com/KhronosGroup/SPIRV-Tools.git;branch=vulkan-sdk-1.4.328;protocol=https \ - " + file://0001-opt-Fix-build-issue-with-gcc-16-replaeces-PR-6542-65.patch \ +" PE = "1" # These recipes need to be updated in lockstep with each other: # glslang, vulkan-headers, vulkan-loader, vulkan-tools, spirv-headers, spirv-tools From patchwork Thu Apr 16 22:30:14 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86346 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 4F360F8A153 for ; Thu, 16 Apr 2026 22:33:27 +0000 (UTC) Received: from mail-wm1-f66.google.com (mail-wm1-f66.google.com [209.85.128.66]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.28270.1776378800464849002 for ; Thu, 16 Apr 2026 15:33:20 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=nL9YLdlw; spf=pass (domain: smile.fr, ip: 209.85.128.66, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f66.google.com with SMTP id 5b1f17b1804b1-488ad135063so539685e9.0 for ; Thu, 16 Apr 2026 15:33:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378799; x=1776983599; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=dnyQthd4W5Spmw+L7gS3Gbq370V6fdiXpTS+X67Gxc4=; b=nL9YLdlwP2+K27+/H6W0i/8xHBOdkw7+QXseoR04LruCrSYs8nAElUHbLv3sI6+fse LGHpIYnBAx2Sojuui+jkJWl8FDM9mwpbbKertbHOLLz05kR2FF5Mr+hUzNBkFTwaOF0A 3/BDT8FrSRA8ztoTwSlZV+KEtPb7fi0gtEocU= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378799; x=1776983599; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=dnyQthd4W5Spmw+L7gS3Gbq370V6fdiXpTS+X67Gxc4=; b=bmIQkW5xDc+AHSn8BgyrcDRIvcYPzcH9eXdOFW1gWlTxQYwTl2Dbmu7tbAcqdEp/Cd wGjwXuHcxtlmmx3VpCq5siGye3JwMFj44QTLl2fYVrTssZDYHOxdpngsGO8sEf83bq5j GoO6149+/yDyHewarhnLrJYlVgMNGlrMG4vXeTF61oh/onE1E0/vk+ZiU4UQh4BqqF5i t/SPCu/jLlr12avnnHSXXaCb8qxWD0k5BKJ0NEZmYaYRzI4k5qwRTe5PR5/4DwW6noNk +uBeqzvqROqUYDuTKSQ8PYdRCRkCcZusT8e+xOYqCt2DaUdSAzr0t/1Hc8wfMneUOotH qvDg== X-Gm-Message-State: AOJu0YzTPBoETDFQ6iaLj+QqDOtjkilqnL7EFd3GYV0VG+92ST9Oa9hp wPs75wygqH1PfVE6swfrMMp4DToAlWQWUlu0tov65cMoPSAL8dMuyXzee9gnv9wBXGgTPyRweZn +j5NwAXc7I/lk X-Gm-Gg: AeBDieuivrVQHmtE9uUIDRwcq6DPz+0v7D/cCgtooXA9CB763codRujPmzeWCxokucl YQR+WtdfjjmBKLIlwLGalErpCt2ciYxtlp8bw/oGux4BFtH8gO+w+oJ98JIvOduXzo+h+mWcgW+ Zgl+5j+aQ90qs9kNkW1ZGLjN6cSsA8T+W4qZGacmeovamh0l72esacjawmXG4wQLUVvXZCsMuXF zTaC7xpiZzK7nfu47TSzr37vqOYE0ebRcb+wm/ApK1ywUKR04swn/lmdsrX4uileByE8ocPnmiQ XPKSq49Ho1KG1VZUsrJ/OXfccGdPBOe/epjOCuTi1vCglNqKT9HauuS1Jbk77rDPuw33hvJDwY6 G5jZ9yaCjHlWmKrZhyZDYDTlRSA0HWG3FQEvCamBh9u8tMhhv1GJaNPCYnMfpmiQeql9WxMtxmJ ElbgNbV94qiIjHuCPTa+XDu+Phpgz7pGsfidRpbtfn+kOIc6RIq5QTMF3fawwpBG4EkNpev7gbE 7mYXFTkR6yIxZ6/5dTJ17Tm5YAPXRKz8jxxnQ== X-Received: by 2002:a05:600c:c0c8:b0:471:700:f281 with SMTP id 5b1f17b1804b1-488fb78b8c5mr3796655e9.25.1776378798560; Thu, 16 Apr 2026 15:33:18 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.18 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:18 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 31/51] ovmf: backport a fix for build with gcc-16 Date: Fri, 17 Apr 2026 00:30:14 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:27 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235460 From: Martin Jansa Fixes build on host with gcc-16: StringFuncs.c: In function ‘SplitStringByWhitespace’: StringFuncs.c:113:15: error: variable ‘Item’ set but not used [-Werror=unused-but-set-variable=] 113 | UINTN Item; | ^~~~ and EfiRom.c: In function ‘main’: EfiRom.c:78:17: error: assignment discards ‘const’ qualifier from pointer target type [-Werror=discarded-qualifiers] 78 | if ((Ptr0 = strstr ((CONST CHAR8 *) mOptions.FileList->FileName, DEFAULT_OUTPUT_EXTENSION)) != NULL) { | ^ Signed-off-by: Martin Jansa Signed-off-by: Yoann Congal --- ...Tools-StringFuncs-fix-gcc-16-warning.patch | 42 ++++++++++++++++++ ...aseTools-EfiRom-fix-compiler-warning.patch | 44 +++++++++++++++++++ meta/recipes-core/ovmf/ovmf_git.bb | 2 + 3 files changed, 88 insertions(+) create mode 100644 meta/recipes-core/ovmf/ovmf/0006-BaseTools-StringFuncs-fix-gcc-16-warning.patch create mode 100644 meta/recipes-core/ovmf/ovmf/0007-BaseTools-EfiRom-fix-compiler-warning.patch diff --git a/meta/recipes-core/ovmf/ovmf/0006-BaseTools-StringFuncs-fix-gcc-16-warning.patch b/meta/recipes-core/ovmf/ovmf/0006-BaseTools-StringFuncs-fix-gcc-16-warning.patch new file mode 100644 index 00000000000..a465dede9c3 --- /dev/null +++ b/meta/recipes-core/ovmf/ovmf/0006-BaseTools-StringFuncs-fix-gcc-16-warning.patch @@ -0,0 +1,42 @@ +From 015c26aea52a54e96319887ea542870b4804fb91 Mon Sep 17 00:00:00 2001 +From: Gerd Hoffmann +Date: Thu, 29 Jan 2026 09:23:32 +0100 +Subject: [PATCH] BaseTools/StringFuncs: fix gcc 16 warning +MIME-Version: 1.0 +Content-Type: text/plain; charset=UTF-8 +Content-Transfer-Encoding: 8bit + +StringFuncs.c: In function ‘SplitStringByWhitespace’: +StringFuncs.c:113:15: error: variable ‘Item’ set but not used [-Werror=unused-but-set-variable=] + 113 | UINTN Item; + | ^~~~ + +Signed-off-by: Gerd Hoffmann + +Upstream-Status: Backport [edk2-stable202602 https://github.com/tianocore/edk2/commit/3597306191297b504683b83fe7750e49c6a2e836] +Signed-off-by: Martin Jansa +--- + BaseTools/Source/C/Common/StringFuncs.c | 3 +-- + 1 file changed, 1 insertion(+), 2 deletions(-) + +diff --git a/BaseTools/Source/C/Common/StringFuncs.c b/BaseTools/Source/C/Common/StringFuncs.c +index 53e44365e9..df02d9c808 100644 +--- a/BaseTools/Source/C/Common/StringFuncs.c ++++ b/BaseTools/Source/C/Common/StringFuncs.c +@@ -110,7 +110,6 @@ SplitStringByWhitespace ( + CHAR8 *EndOfSubString; + CHAR8 *EndOfString; + STRING_LIST *Output; +- UINTN Item; + + String = CloneString (String); + if (String == NULL) { +@@ -120,7 +119,7 @@ SplitStringByWhitespace ( + + Output = NewStringList (); + +- for (Pos = String, Item = 0; Pos < EndOfString; Item++) { ++ for (Pos = String; Pos < EndOfString;) { + while (isspace ((int)*Pos)) { + Pos++; + } diff --git a/meta/recipes-core/ovmf/ovmf/0007-BaseTools-EfiRom-fix-compiler-warning.patch b/meta/recipes-core/ovmf/ovmf/0007-BaseTools-EfiRom-fix-compiler-warning.patch new file mode 100644 index 00000000000..7aaafe6efbf --- /dev/null +++ b/meta/recipes-core/ovmf/ovmf/0007-BaseTools-EfiRom-fix-compiler-warning.patch @@ -0,0 +1,44 @@ +From 4d2bdadcd6d45f6708b1b4827b0dc9b6e4b8edd2 Mon Sep 17 00:00:00 2001 +From: Gerd Hoffmann +Date: Mon, 8 Dec 2025 10:28:50 +0100 +Subject: [PATCH] BaseTools/EfiRom: fix compiler warning +MIME-Version: 1.0 +Content-Type: text/plain; charset=UTF-8 +Content-Transfer-Encoding: 8bit + +New warning after updating gcc: + +EfiRom.c: In function ‘main’: +EfiRom.c:78:17: error: assignment discards ‘const’ qualifier from pointer target type [-Werror=discarded-qualifiers] + +The assigned value is not used, so fix the warning by just removing it. + +Signed-off-by: Gerd Hoffmann + +Upstream-Status: Backport [edk2-stable202602 https://github.com/tianocore/edk2/commit/9af06ef3cbb052b142f9660c2c01e7aeb401300c] +Signed-off-by: Martin Jansa +--- + BaseTools/Source/C/EfiRom/EfiRom.c | 3 +-- + 1 file changed, 1 insertion(+), 2 deletions(-) + +diff --git a/BaseTools/Source/C/EfiRom/EfiRom.c b/BaseTools/Source/C/EfiRom/EfiRom.c +index fa7bf0e62e..6e903b3504 100644 +--- a/BaseTools/Source/C/EfiRom/EfiRom.c ++++ b/BaseTools/Source/C/EfiRom/EfiRom.c +@@ -44,7 +44,6 @@ Returns: + FILE_LIST *FList; + UINT32 TotalSize; + UINT32 Size; +- CHAR8 *Ptr0; + + SetUtilityName(UTILITY_NAME); + +@@ -75,7 +74,7 @@ Returns: + // + if (mOptions.DumpOption == 1) { + if (mOptions.FileList != NULL) { +- if ((Ptr0 = strstr ((CONST CHAR8 *) mOptions.FileList->FileName, DEFAULT_OUTPUT_EXTENSION)) != NULL) { ++ if (strstr ((CONST CHAR8 *) mOptions.FileList->FileName, DEFAULT_OUTPUT_EXTENSION) != NULL) { + DumpImage (mOptions.FileList); + goto BailOut; + } else { diff --git a/meta/recipes-core/ovmf/ovmf_git.bb b/meta/recipes-core/ovmf/ovmf_git.bb index 577310a6782..bf41bbbf6e9 100644 --- a/meta/recipes-core/ovmf/ovmf_git.bb +++ b/meta/recipes-core/ovmf/ovmf_git.bb @@ -25,6 +25,8 @@ SRC_URI = "gitsm://github.com/tianocore/edk2.git;branch=master;protocol=https;ta file://0002-BaseTools-makefile-adjust-to-build-in-under-bitbake.patch \ file://0003-debug-prefix-map.patch \ file://0004-reproducible.patch \ + file://0006-BaseTools-StringFuncs-fix-gcc-16-warning.patch \ + file://0007-BaseTools-EfiRom-fix-compiler-warning.patch \ " PV = "edk2-stable202508" From patchwork Thu Apr 16 22:30:15 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86351 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 59B0FF8D75C for ; Thu, 16 Apr 2026 22:33:27 +0000 (UTC) Received: from mail-wm1-f67.google.com (mail-wm1-f67.google.com [209.85.128.67]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.28584.1776378801161593758 for ; Thu, 16 Apr 2026 15:33:21 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=eiA7VnIq; spf=pass (domain: smile.fr, ip: 209.85.128.67, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f67.google.com with SMTP id 5b1f17b1804b1-4887f49ec5aso621285e9.1 for ; Thu, 16 Apr 2026 15:33:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378799; x=1776983599; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=JgzN3vRfpTmOrxp0fhFb05axKtIvQfYM/ubqTptUErs=; b=eiA7VnIqmil7jaFhSxfaLh5XH856X1nkmKqo+LEbdekPkzjAlwKKodiznlabe4nQoq eciiZWsV4amWcR5TDYgOb9kmbF6FoDDUXH05m+GnaKGGOMCkK+yjXto14mOoXRp5c+hv Z8mjLsHSar5QKZmryLkWT3w3HaM/XVNQ9uLp8= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378799; x=1776983599; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=JgzN3vRfpTmOrxp0fhFb05axKtIvQfYM/ubqTptUErs=; b=k4yi8O4HAkWrbGZDbgoIRZRv77FASmJlml1nFR3rguMvE1dd+7lQhhzoVsi1QMnSs3 Q5Web9FEdu+a6RRJySCrJjP3x9I3YNNxlqRcGrhTYZA6BXJJvuw0ufIO2b7T7eBdyiRc K76rGaMrd1Uf+A3c9ud1s6oa6G7kwyBi+n/HJu2whn/Up7+sarlAO66S/pg04ki/BO/6 QVPQa8mBxY+Wox1bX6mflkMv/UwUacuqDnLYumxq/GUapCvsF08bjO6HvOateHHzuUGE nu01oVV8qygzwt56fhdhiZWWvdEtwkVgx2HaWjF/+rzz4C7upPkv7byJzaJ+Pt7cjxm3 h67A== X-Gm-Message-State: AOJu0YytgAZjXjZKjs3Whl0Dps5nW0ad+sL4fm5xKvUUtRPPDLG3Kjif Y6LsY2jyTxGV6792jy41ATu4O0mYWGEl3MV4qqZN6BItVPiZqq8IPIc4urYV2nqKw23diMFA2GY KEcSuSer8nYln X-Gm-Gg: AeBDies21n2UANTWManHzxnmwDaFsWeUn/O/Q1ARPCjLwkC8FkXJg3EACnTLhiuevI5 CQMpDXqI2n2WGSX3WrzIBQOF//WUwDkM5yanL9KOkcRfRGCcGfiE+uBpF0IURGDJhGNBllpWi8a 4KPcQ68t+jr3qZF6sgx7mMMSeGaZXCfG0NPtTKGSI9jb/uZnQjbxVo5Wa7U5seC6/Q8aTmxzaZd hJjLFVYq+Gw3WJFWb36EzQbSsmEupkw/Y0hVTXzz+eUeZGof4SLR59G755taXtLeArPt88XAOv1 n+5qG8VK5oGqHi05bTzKCk4pZoSpyM+NUcs22rchNhUEJRzo3D9J9Je0f+qjBro3GEZbfB14mlI mz4vMR5RaUe6L4//8hvlecoxh3MEzCluwlNiyHGQC2FbEjw/Nxjr/FtVPPEKXoqzMjnD5BYOGVP 4YfHlzDOZRxTVc1t74Tt6iJvwmdW+cbw2S7hHt6anb4OEt9YCgilM3i2IyVi/7qXJo83jPW2oj3 o8ulSOj78zqp0cYzkg9gK28YQUO3Qc8/XrQnQ== X-Received: by 2002:a05:600c:33aa:b0:488:ae6c:42c0 with SMTP id 5b1f17b1804b1-488fb742e7fmr3333935e9.7.1776378799089; Thu, 16 Apr 2026 15:33:19 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.18 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:18 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 32/51] libpng: upgrade 1.6.55 -> 1.6.56 Date: Fri, 17 Apr 2026 00:30:15 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:27 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235461 From: Peter Marko Release notes [1]: * Fixed CVE-2026-33416 (high severity): Use-after-free via pointer aliasing in `png_set_tRNS` and `png_set_PLTE`. (Reported by Halil Oktay and Ryo Shimada; fixed by Halil Oktay and Cosmin Truta.) * Fixed CVE-2026-33636 (high severity): Out-of-bounds read/write in the palette expansion on ARM Neon. (Reported by Taegu Ha; fixed by Taegu Ha and Cosmin Truta.) * Fixed uninitialized reads beyond `num_trans` in `trans_alpha` buffers. (Contributed by Halil Oktay.) * Fixed stale `info_ptr->palette` after in-place gamma and background transforms. * Fixed wrong channel indices in `png_image_read_and_map` RGB_ALPHA path. (Contributed by Yuelin Wang.) * Fixed wrong background color in colormap read. (Contributed by Yuelin Wang.) * Fixed dead loop in sPLT write. (Contributed by Yuelin Wang.) * Added missing null pointer checks in four public API functions. (Contributed by Yuelin Wang.) * Validated shift bit depths in `png_set_shift` to prevent infinite loop. (Contributed by Yuelin Wang.) * Avoided undefined behavior in library and tests. * Deprecated the hardly-ever-tested POINTER_INDEXING config option. * Added negative-stride test coverage for the simplified API. * Fixed memory leaks and API misuse in oss-fuzz. (Contributed by Owen Sanzas.) * Implemented various fixes and improvements in oss-fuzz. (Contributed by Bob Friesenhahn and Philippe Antoine.) * Performed various refactorings and cleanups. [1] https://github.com/pnggroup/libpng/blob/v1.6.56/ANNOUNCE Signed-off-by: Peter Marko Signed-off-by: Richard Purdie (cherry picked from commit 987cf163b4a4beaa540ad4f91b1a31bcfbd71b4c) Signed-off-by: Yoann Congal --- .../libpng/{libpng_1.6.55.bb => libpng_1.6.56.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta/recipes-multimedia/libpng/{libpng_1.6.55.bb => libpng_1.6.56.bb} (97%) diff --git a/meta/recipes-multimedia/libpng/libpng_1.6.55.bb b/meta/recipes-multimedia/libpng/libpng_1.6.56.bb similarity index 97% rename from meta/recipes-multimedia/libpng/libpng_1.6.55.bb rename to meta/recipes-multimedia/libpng/libpng_1.6.56.bb index 18ecc9d855a..6ae500ca92b 100644 --- a/meta/recipes-multimedia/libpng/libpng_1.6.55.bb +++ b/meta/recipes-multimedia/libpng/libpng_1.6.56.bb @@ -14,7 +14,7 @@ SRC_URI = "${SOURCEFORGE_MIRROR}/${BPN}/${BPN}${LIBV}/${BP}.tar.xz \ file://run-ptest \ " -SRC_URI[sha256sum] = "d925722864837ad5ae2a82070d4b2e0603dc72af44bd457c3962298258b8e82d" +SRC_URI[sha256sum] = "f7d8bf1601b7804f583a254ab343a6549ca6cf27d255c302c47af2d9d36a6f18" MIRRORS += "${SOURCEFORGE_MIRROR}/project/${BPN}/${BPN}${LIBV}/ ${SOURCEFORGE_MIRROR}/project/${BPN}/${BPN}${LIBV}/older-releases/" From patchwork Thu Apr 16 22:30:16 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86337 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id EA2EAF8DFF7 for ; Thu, 16 Apr 2026 22:33:26 +0000 (UTC) Received: from mail-wm1-f67.google.com (mail-wm1-f67.google.com [209.85.128.67]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.28271.1776378801775630678 for ; Thu, 16 Apr 2026 15:33:22 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=m68Yd48P; spf=pass (domain: smile.fr, ip: 209.85.128.67, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f67.google.com with SMTP id 5b1f17b1804b1-488b0e1b870so731805e9.2 for ; Thu, 16 Apr 2026 15:33:21 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378800; x=1776983600; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=U2otvjNxhfg/FKlFkmYbnyjoFjWiNsNv0c4SQ18zkQc=; b=m68Yd48PgpKsdAGJchNHDnHO88SZWXQx/tpQfFzTuctureJZq4TlZSdDpVtyW6UBZu jrhebbxa4ESx4+Fe2ZGxGNe6LYhgw5euNGG96Zw/ywsD58JXNCaomWo+h0pUa6xltFmS 1G9SxejCY1+KDu7rapkwvQsZgJp2HCBahqZCE= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378800; x=1776983600; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=U2otvjNxhfg/FKlFkmYbnyjoFjWiNsNv0c4SQ18zkQc=; b=kCrTQyB2bIR3IuxF/K1RrXBNLgzrj8SXMiTvnPqXnFZgV3sdD2NEmFdBFCHF00W3Xw JliRKnxrmjWQi1vLVT+d5GaAz11ad9Sa62fVogOQCGFkHdw2AbC5KCFmgWdvwWBjO5FY U8Dgpqvy1kXCzStoxWl7DIOol/91rsyVqe+yP2S6QcRDkrlvSS9KuvjABbMWnppOg8PF 5KUiEa32mVd5aJEgWEr+pxbcoFRT/RP9KpvcBdbq6EeMCAFMmSqQq4a6HXmrWyA1YOLA tZ48CSJcGfCBlJ9Mlht5o5Sd+gGgWsG9YEj+Da7oAcFnHLskir+cUpqiV1uPwbrjLazj PrIg== X-Gm-Message-State: AOJu0Yza8AGXg9YkQ1Jul4ypNnN/XVJb6dm/dfIioIjl1Rl6eLdhaX/k owbcbZNhUegdVSwSVF+kKF8OjTW31bSp78IEzDiXhS2W06HANMD9ShowJoH6xwaUFNYaSFkCfau +0QBrvlTPqLiI X-Gm-Gg: AeBDiesSk3yR2kbHyNU+1Dz2heWfQPzHBC3VggYDLtVua2q7A8Ev3cw1g0jVFK44MKO 9DEfXOVQs8Og3zy+c7FPXFMWkJNas8nW24y1SEXb+pZIFTmrtA6VF6dxShJEVWu+LFcRdb0v+NT j5iNaVsqqP41dldOQj2Dy1274Ubn1QZ7Ds8/q6s85mGTncg0SOniBAXV0eqgp/Lkeww0Vwvzp1K zkMyzj1vNZt6tJbDUw3+XcbWHVlcdVoNxWkpysRl0MdRrlz8814gH/qJ/ZmMqlPapTsZ9t6ZJkR o8Lf9YZHap2nU371VrTenNx0Qu40/NXURw/4LBnPq4V7yc4vJGjz/DbubCLZHe4VBAfa8CNPWMx X2pnLvCdhNKZph06sNi3RJOh9KjVbN4gkqgVwHcYYmXw9kYv5gfSuSjeRW9ZEqcfw/q5BLWdxTB zN1x1Ez3tLy+Xddxn/ICHiy6D6jcrBePX1osdOtOix8sYWEMuMAw1J1k5OmvpChg50EdrloEH2r GnII4HijFnQRQ7SDx6YbuLwvFWkU6VmxmAHig== X-Received: by 2002:a05:600c:3110:b0:488:8c89:cfaa with SMTP id 5b1f17b1804b1-488fb73841dmr5248835e9.3.1776378799750; Thu, 16 Apr 2026 15:33:19 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.19 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:19 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 33/51] recipetool: Recognise https://git. as git urls Date: Fri, 17 Apr 2026 00:30:16 +0200 Message-ID: <272e0ce9cb776f14166aaddeeac9d570089e298c.1776377993.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:26 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235462 From: Richard Purdie If a url has git. in it, assume it is likely to be a git cloneable url and should be treated as such. This allows us to switch from https://git.yoctoproject.org/git/XXX urls to the preferred https://git.yoctoproject.org/XXX form. Signed-off-by: Richard Purdie (cherry picked from commit cedc9209e3bae0da8d61423b16c74c49a132aa63) Signed-off-by: Yoann Congal --- scripts/lib/recipetool/create.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/scripts/lib/recipetool/create.py b/scripts/lib/recipetool/create.py index ef0ba974a99..adafaba47e5 100644 --- a/scripts/lib/recipetool/create.py +++ b/scripts/lib/recipetool/create.py @@ -368,7 +368,7 @@ def supports_srcrev(uri): def reformat_git_uri(uri): '''Convert any http[s]://....git URI into git://...;protocol=http[s]''' checkuri = uri.split(';', 1)[0] - if checkuri.endswith('.git') or '/git/' in checkuri or re.match('https?://git(hub|lab).com/[^/]+/[^/]+/?$', checkuri): + if checkuri.endswith('.git') or '/git/' in checkuri or re.match('https?://git(hub|lab).com/[^/]+/[^/]+/?$', checkuri) or re.match(r'https?://git\..*', checkuri): # Appends scheme if the scheme is missing if not '://' in uri: uri = 'git://' + uri From patchwork Thu Apr 16 22:30:17 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86348 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6E0EFFA0C5E for ; Thu, 16 Apr 2026 22:33:27 +0000 (UTC) Received: from mail-wm1-f65.google.com (mail-wm1-f65.google.com [209.85.128.65]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.28272.1776378802339626939 for ; Thu, 16 Apr 2026 15:33:22 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=xJItR3CB; spf=pass (domain: smile.fr, ip: 209.85.128.65, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f65.google.com with SMTP id 5b1f17b1804b1-488b8bc6bc9so241135e9.3 for ; Thu, 16 Apr 2026 15:33:22 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378800; x=1776983600; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=qQ+oTPOH9/tKMRLEMfTumVffv5c6sMHBTGnRX0018Kk=; b=xJItR3CBsPATBey2rgrlWyt9fKfQXM2lcJHYV3+tlbZAkllVDrLvOW7VM3HBc/RFJS yn/C896O90aMpzWW5liqUV9x+6+71pHqscDQfizei3sDy1lWXHPosJjiPpCkdv2vHbZo wmfRQaVy7iCSAHZTTspNA0iQytg1j1cmCNJKU= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378800; x=1776983600; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=qQ+oTPOH9/tKMRLEMfTumVffv5c6sMHBTGnRX0018Kk=; b=apvhivmi96lIOaNLZrNvEfRPnOujzxH+y6AudnW+X5YhrSNOlnkTFiQj6H543EJa98 USXJCMMIOKd6VWvKQ6PoYW4pKZBsqWN2nyCMgWjBAImrX/bWQiH6LKtnlveQZ8yWFa78 jVvOUp9kC0kCzYgbaSTBBgog8Bs1ROTAtMArCthFUECCJsODZDZy1y3p+T8getiu/d73 O0jFfezWcmZK/8qI1b65zk0cEZla+2H/7LRXE39EwElwI3TKvxqyB5M1uG+kyTnbLht6 V624fGFqkIGWjYhO+2PhtfF1wbq4IZi+0HarrlDfH30nX86nBvK0ikUwM1y7owCl3wnY 7rrg== X-Gm-Message-State: AOJu0YyL8Ud593q/QwdXZ9IA5nXvIt/IDT9kV3iSlQecaKF92RdR9Kn+ bm+bVjt0tXrhzMZVmsnewIAuE9aqK/xQJ7+PB9DXNjCL9f54w2sCRnKB9RMK8sj3I40gpLMazpo KYNraLojt1fc1 X-Gm-Gg: AeBDiesPOrLiK+SGuRchEAwsL5683FAAb4lq0nU5vm4KIPkoQhoy0+J1hzMp2bjQA++ 6ziwsahaEBavSoU5HSB5JKJx2t7/1o5od2KjH03FyODZWcs26QrTqMnSpNQwTMg0Kpx41n0u4Ty P4SyzQ3+jtQLPQQo5BDH/Y/sSdDphl3Ve6szp0S1J08W8PD85a2gDvfH4GJATY8oQnxG4Lsc/7D Oq6VrfyIs2hCZ582S56WD8gATv3vhAJzs45FGDXXDg1O0RDE0LwiWa7OdArSeLILigBMIGauNQy 0A3x/79m2yIRXnV6cj+cvx+fFwGqq0umg5NM5jSL8BoaGimBBhRjQ274dc71RyLcOJbHevtjJdk m0PAQS2pGjwqml1xUMmTK6Wy7z17Da8E3FpBY+Z564vGflK0TYpaPpYxAdAZ63GBuA1lyWvF5Ps NWt3TbSgtB52i5ZDBpXTZx7zxC2lPh8HDu5IX8H4EWsoUz8jN87FV8fXjk/cBoMTYDqBRsWZaDj wV/q19MP0B7e1mLpH+0KilIfppJExoct4TT3g== X-Received: by 2002:a05:600c:a105:b0:486:fb69:4960 with SMTP id 5b1f17b1804b1-488fb7786e4mr3531785e9.19.1776378800403; Thu, 16 Apr 2026 15:33:20 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.19 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:19 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 34/51] selftest/scripts: Update old git protocol references Date: Fri, 17 Apr 2026 00:30:17 +0200 Message-ID: <4825bf044255dfff2d2ce5b288aff006ec5dd584.1776377993.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:27 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235463 From: Richard Purdie git protocol accesses to our infrastructure are currently struggling and this has highlighted a number of places we're making those obsolete access forms. Update them to use https instead of the git protocol since it is preferred and more reliable. The devtool test needed quoting to handle the ';' in the url. The -f option to devtool also shows a deprecation warning so remove that. There were internal references to git protocol urls inside the nested git submodules test report, which means those repos need updating to use new git revisions. Signed-off-by: Richard Purdie (cherry picked from commit 1ceba42623c5187d2f5a100d6a523abcdc75d34e) Signed-off-by: Yoann Congal --- .../recipes-test/devtool/devtool-upgrade-test2_git.bb | 2 +- .../devtool/devtool-upgrade-test2_git.bb.upgraded | 2 +- .../recipes-test/devtool/devtool-upgrade-test5_git.bb | 4 ++-- .../devtool/devtool-upgrade-test5_git.bb.upgraded | 4 ++-- meta/lib/oeqa/selftest/cases/devtool.py | 6 +++--- meta/lib/oeqa/selftest/cases/externalsrc.py | 2 +- meta/lib/oeqa/selftest/cases/gitarchivetests.py | 2 +- meta/lib/oeqa/selftest/cases/sstatetests.py | 2 +- meta/lib/oeqa/selftest/cases/yoctotestresultsquerytests.py | 2 +- scripts/yocto_testresults_query.py | 2 +- 10 files changed, 14 insertions(+), 14 deletions(-) diff --git a/meta-selftest/recipes-test/devtool/devtool-upgrade-test2_git.bb b/meta-selftest/recipes-test/devtool/devtool-upgrade-test2_git.bb index 66d66e95e29..fdc85243787 100644 --- a/meta-selftest/recipes-test/devtool/devtool-upgrade-test2_git.bb +++ b/meta-selftest/recipes-test/devtool/devtool-upgrade-test2_git.bb @@ -11,7 +11,7 @@ SRCREV = "1a3e1343761b30750bed70e0fd688f6d3c7b3717" PV = "0.1+git" PR = "r2" -SRC_URI = "git://git.yoctoproject.org/dbus-wait;branch=master" +SRC_URI = "git://git.yoctoproject.org/dbus-wait;branch=master;protocol=https" UPSTREAM_CHECK_COMMITS = "1" RECIPE_NO_UPDATE_REASON = "This recipe is used to test devtool upgrade feature" diff --git a/meta-selftest/recipes-test/devtool/devtool-upgrade-test2_git.bb.upgraded b/meta-selftest/recipes-test/devtool/devtool-upgrade-test2_git.bb.upgraded index d3256ef5df8..07f7c50c775 100644 --- a/meta-selftest/recipes-test/devtool/devtool-upgrade-test2_git.bb.upgraded +++ b/meta-selftest/recipes-test/devtool/devtool-upgrade-test2_git.bb.upgraded @@ -10,7 +10,7 @@ DEPENDS = "dbus" SRCREV = "6cc6077a36fe2648a5f993fe7c16c9632f946517" PV = "0.1+git" -SRC_URI = "git://git.yoctoproject.org/dbus-wait;branch=master" +SRC_URI = "git://git.yoctoproject.org/dbus-wait;branch=master;protocol=https" UPSTREAM_CHECK_COMMITS = "1" RECIPE_NO_UPDATE_REASON = "This recipe is used to test devtool upgrade feature" diff --git a/meta-selftest/recipes-test/devtool/devtool-upgrade-test5_git.bb b/meta-selftest/recipes-test/devtool/devtool-upgrade-test5_git.bb index 7e8b001a287..f2a1358c8aa 100644 --- a/meta-selftest/recipes-test/devtool/devtool-upgrade-test5_git.bb +++ b/meta-selftest/recipes-test/devtool/devtool-upgrade-test5_git.bb @@ -6,11 +6,11 @@ LIC_FILES_CHKSUM = "file://${COMMON_LICENSE_DIR}/MIT;md5=0835ade698e0bcf8506ecda INHIBIT_DEFAULT_DEPS = "1" # Note: this is intentionally not the latest version in the original .bb -SRCREV = "132fea6e4dee56b61bcf5721c94e8b2445c6a017" +SRCREV = "f280847494763cdcf71197557a81ba7d8a6bce42" PV = "0.1+git" PR = "r2" -SRC_URI = "gitsm://git.yoctoproject.org/git-submodule-test;branch=master" +SRC_URI = "gitsm://git.yoctoproject.org/git-submodule-test;branch=master;protocol=https" UPSTREAM_CHECK_COMMITS = "1" RECIPE_NO_UPDATE_REASON = "This recipe is used to test devtool upgrade feature" diff --git a/meta-selftest/recipes-test/devtool/devtool-upgrade-test5_git.bb.upgraded b/meta-selftest/recipes-test/devtool/devtool-upgrade-test5_git.bb.upgraded index 938c46b0163..aa0d72f0ed1 100644 --- a/meta-selftest/recipes-test/devtool/devtool-upgrade-test5_git.bb.upgraded +++ b/meta-selftest/recipes-test/devtool/devtool-upgrade-test5_git.bb.upgraded @@ -6,10 +6,10 @@ LIC_FILES_CHKSUM = "file://${COMMON_LICENSE_DIR}/MIT;md5=0835ade698e0bcf8506ecda INHIBIT_DEFAULT_DEPS = "1" # Note: this is intentionally not the latest version in the original .bb -SRCREV = "a2885dd7d25380d23627e7544b7bbb55014b16ee" +SRCREV = "0a60d6af95d22b4c50446559cd41942a8acd2d57" PV = "0.1+git" -SRC_URI = "gitsm://git.yoctoproject.org/git-submodule-test;branch=master" +SRC_URI = "gitsm://git.yoctoproject.org/git-submodule-test;branch=master;protocol=https" UPSTREAM_CHECK_COMMITS = "1" RECIPE_NO_UPDATE_REASON = "This recipe is used to test devtool upgrade feature" diff --git a/meta/lib/oeqa/selftest/cases/devtool.py b/meta/lib/oeqa/selftest/cases/devtool.py index c7bd1831a9c..73a79b21041 100644 --- a/meta/lib/oeqa/selftest/cases/devtool.py +++ b/meta/lib/oeqa/selftest/cases/devtool.py @@ -584,7 +584,7 @@ class DevtoolAddTests(DevtoolBase): def test_devtool_add_fetch_git(self): tempdir = tempfile.mkdtemp(prefix='devtoolqa') self.track_for_cleanup(tempdir) - url = 'gitsm://git.yoctoproject.org/mraa' + url = 'gitsm://git.yoctoproject.org/mraa;protocol=https' url_branch = '%s;branch=master' % url checkrev = 'ae127b19a50aa54255e4330ccfdd9a5d058e581d' testrecipe = 'mraa' @@ -593,7 +593,7 @@ class DevtoolAddTests(DevtoolBase): self.track_for_cleanup(self.workspacedir) self.add_command_to_tearDown('bitbake -c cleansstate %s' % testrecipe) self.add_command_to_tearDown('bitbake-layers remove-layer */workspace') - result = runCmd('devtool add %s %s -a -f %s' % (testrecipe, srcdir, url)) + result = runCmd('devtool add %s %s -a "%s"' % (testrecipe, srcdir, url)) self.assertExists(os.path.join(self.workspacedir, 'conf', 'layer.conf'), 'Workspace directory not created: %s' % result.output) self.assertTrue(os.path.isfile(os.path.join(srcdir, 'imraa', 'imraa.c')), 'Unable to find imraa/imraa.c in source directory') # Test devtool status @@ -1996,7 +1996,7 @@ class DevtoolUpgradeTests(DevtoolBase): self._test_devtool_upgrade_git_by_recipe('devtool-upgrade-test2', '6cc6077a36fe2648a5f993fe7c16c9632f946517') def test_devtool_upgrade_gitsm(self): - self._test_devtool_upgrade_git_by_recipe('devtool-upgrade-test5', 'a2885dd7d25380d23627e7544b7bbb55014b16ee') + self._test_devtool_upgrade_git_by_recipe('devtool-upgrade-test5', '0a60d6af95d22b4c50446559cd41942a8acd2d57') def test_devtool_upgrade_drop_md5sum(self): # Check preconditions diff --git a/meta/lib/oeqa/selftest/cases/externalsrc.py b/meta/lib/oeqa/selftest/cases/externalsrc.py index 1d800dc82ca..c127d254e36 100644 --- a/meta/lib/oeqa/selftest/cases/externalsrc.py +++ b/meta/lib/oeqa/selftest/cases/externalsrc.py @@ -17,7 +17,7 @@ class ExternalSrc(OESelftestTestCase): # so we check only that a recipe with externalsrc can be parsed def test_externalsrc_srctree_hash_files(self): test_recipe = "git-submodule-test" - git_url = "git://git.yoctoproject.org/git-submodule-test" + git_url = "https://git.yoctoproject.org/git-submodule-test" externalsrc_dir = tempfile.TemporaryDirectory(prefix="externalsrc").name self.write_config( diff --git a/meta/lib/oeqa/selftest/cases/gitarchivetests.py b/meta/lib/oeqa/selftest/cases/gitarchivetests.py index dcf0eb3be56..454f4bd4683 100644 --- a/meta/lib/oeqa/selftest/cases/gitarchivetests.py +++ b/meta/lib/oeqa/selftest/cases/gitarchivetests.py @@ -105,7 +105,7 @@ class GitArchiveTests(OESelftestTestCase): delete_fake_repository(path) def test_get_tags_without_valid_remote(self): - url = 'git://git.yoctoproject.org/poky' + url = 'https://git.yoctoproject.org/poky' path, git_obj = create_fake_repository(False, None, False) tags = ga.get_tags(git_obj, self.log, pattern="yocto-*", url=url) diff --git a/meta/lib/oeqa/selftest/cases/sstatetests.py b/meta/lib/oeqa/selftest/cases/sstatetests.py index 44dd674a325..687640a4016 100644 --- a/meta/lib/oeqa/selftest/cases/sstatetests.py +++ b/meta/lib/oeqa/selftest/cases/sstatetests.py @@ -221,7 +221,7 @@ class SStateTests(SStateBase): # Use dbus-wait as a local git repo we can add a commit between two builds in pn = 'dbus-wait' srcrev = '6cc6077a36fe2648a5f993fe7c16c9632f946517' - url = 'git://git.yoctoproject.org/dbus-wait' + url = 'https://git.yoctoproject.org/dbus-wait' result = runCmd('git clone %s noname' % url, cwd=tempdir) srcdir = os.path.join(tempdir, 'noname') result = runCmd('git reset --hard %s' % srcrev, cwd=srcdir) diff --git a/meta/lib/oeqa/selftest/cases/yoctotestresultsquerytests.py b/meta/lib/oeqa/selftest/cases/yoctotestresultsquerytests.py index b1015d60efe..be062cf7839 100644 --- a/meta/lib/oeqa/selftest/cases/yoctotestresultsquerytests.py +++ b/meta/lib/oeqa/selftest/cases/yoctotestresultsquerytests.py @@ -36,4 +36,4 @@ class TestResultsQueryTests(OESelftestTestCase): shutil.rmtree(workdir, ignore_errors=True) self.fail(f"Can not execute git commands in {workdir}") shutil.rmtree(workdir) - self.assertEqual(url, "git://git.yoctoproject.org/yocto-testresults") + self.assertEqual(url, "https://git.yoctoproject.org/yocto-testresults") diff --git a/scripts/yocto_testresults_query.py b/scripts/yocto_testresults_query.py index 521ead8473a..08bd8cbff17 100755 --- a/scripts/yocto_testresults_query.py +++ b/scripts/yocto_testresults_query.py @@ -21,7 +21,7 @@ script_path = os.path.dirname(os.path.realpath(__file__)) poky_path = os.path.abspath(os.path.join(script_path, "..")) resulttool = os.path.abspath(os.path.join(script_path, "resulttool")) logger = scriptutils.logger_create(sys.argv[0]) -testresults_default_url="git://git.yoctoproject.org/yocto-testresults" +testresults_default_url="https://git.yoctoproject.org/yocto-testresults" def create_workdir(): workdir = tempfile.mkdtemp(prefix='yocto-testresults-query.') From patchwork Thu Apr 16 22:30:18 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86344 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 79DADF8E482 for ; Thu, 16 Apr 2026 22:33:27 +0000 (UTC) Received: from mail-wm1-f67.google.com (mail-wm1-f67.google.com [209.85.128.67]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.28273.1776378802671155783 for ; Thu, 16 Apr 2026 15:33:22 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=Psup7E9i; spf=pass (domain: smile.fr, ip: 209.85.128.67, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f67.google.com with SMTP id 5b1f17b1804b1-488a88aeec9so604255e9.2 for ; Thu, 16 Apr 2026 15:33:22 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378801; x=1776983601; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=whCwqBJh3d3qNfBeye3GzVfXJB2JnvzIkn5icCEhv/g=; b=Psup7E9iKCps9GE/qNACUixjSduDGM7FMsPKKY3xiNWp5/PJ9dEv3zh7CHH0+IcMil h940Wy+YbcZFbs082S9pgA+FF+OzsHbmqLjkMYYexgdxpFFys+JZF2p7HxfUsSGCvSdy S2AnrAkX+O+OELsYH6nQk88BHnxU/0D0w8oi8= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378801; x=1776983601; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=whCwqBJh3d3qNfBeye3GzVfXJB2JnvzIkn5icCEhv/g=; b=dDbtcWXwAXpZOrjrg97dhFuo5WrAje72i/ZkKdb3or35bWlLQw5hu8RrWj45ycd1nX qudOQMtejUBJId6yxiPq0URCHvXmoI9i3VLJwyrX0LK7OdBvrsKaceu48NuSeBY7Jwq9 qCsR/7XWY/PistqykuvQCxm+3ec5L/Flja/lvlf06xnFfzSwOdmJV0eycf7dlsHVKWge Nf+tDVj9+/VQnUtx4sG+XKWqJYRP7sz4R1qBSTdEArg4ox0AxNQj4HiNToWKS5RdXUYy D2UxWHkLzSfcQd08l//eJgPbcRgmVWqkOIrNVehEfj5Ey5cVV7Dk4Ay/46X/54eaxy3c GbGA== X-Gm-Message-State: AOJu0Yx4swC9TxqtJFRZRAkXnv9NOXjcCe6UyJvQrecRpAzcCX6XTFnF 8grx9Z/sxYF9utCytRnJ4mcHfBlh99zBKysFzTaLQpx9rizuUdAwKTTAOoZ1GpVFoD6uRO/8UUh 8ZtdBxjfQArSR X-Gm-Gg: AeBDiev320ym/QIhx4qSxE86BXknhurLefJsYnSObQiftfU6O+7ba1RSLX0IQhEbPZ4 sN7lPhf2JO+HXgw4DZDJb5ON9/TaqYmmrGl8RH64l2ZYTbu0sordkxZQgRHopCOM5ZcL5URRGIz rceuGuoxIM+VHos/dR59KqA5oPmpIY0sB++G+il9iMQzXPH60PfYHaVHMFofBPLbUn/lM8Ehinr I7xIJxT8muIsZWDU1S51yrRkQfFF4n/SPpgqIuyPj8rKOuEBIvlFD08v2WmA6zge/6KC8O63MNJ H2m5oGi7ID4/jKGVPFJG8puJ8G3roWsVRWq8SYWG8FWRoH0DzbhuiNEuzy/RC4ikTg+we8rZFoo pByJKjuKE0STk7AeACN8B3Bw4E7H6wclJaXxTxTcVYI7qqHhL7UZt2XMidLIYJxcAH9jVNw6eAY bi3D9uB/rLbFLCByRUu65Erq285ioG8MEnViCb9p5d4osPLTO4QK5bu60KYH/YSrqnL+DeAQvqP go4FjNzpVFPwteLD+38hL27FVGjZadpln0Ln1xEgCwc4Clc X-Received: by 2002:a05:600c:1390:b0:483:709e:f238 with SMTP id 5b1f17b1804b1-488fb78ea6fmr4810405e9.29.1776378800848; Thu, 16 Apr 2026 15:33:20 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.20 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:20 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 35/51] archiver: Don't try to preserve all attributes when copying files Date: Fri, 17 Apr 2026 00:30:18 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:27 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235464 From: Richard Purdie Similar to https://git.openembedded.org/bitbake/commit/?id=2f35dac0c821ab231459922ed98e1b2cc599ca9a there is a problem in this code when copying from an NFS mount. We currently use cp -p, which is a shortcut for --preserve=mode,ownership,timestamps. We shouldn't need to preserve mode/ownership, only timestamps. Update the code in the same way the bitbake fetcher was fixed for consistency. This fixes build failures on OpenSUSE 16.0. Signed-off-by: Richard Purdie (cherry picked from commit 6e8313688fa994c82e4c846993ed8da0d1f4db0e) Signed-off-by: Yoann Congal --- meta/classes/archiver.bbclass | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/meta/classes/archiver.bbclass b/meta/classes/archiver.bbclass index a95c899a0f8..a48dd259fa6 100644 --- a/meta/classes/archiver.bbclass +++ b/meta/classes/archiver.bbclass @@ -398,7 +398,7 @@ python do_ar_mirror() { # We now have an appropriate localpath bb.note('Copying source mirror') - cmd = 'cp -fpPRH %s %s' % (localpath, destdir) + cmd = 'cp --force --preserve=timestamps --no-dereference --recursive -H %s %s' % (localpath, destdir) subprocess.check_call(cmd, shell=True) } From patchwork Thu Apr 16 22:30:19 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86345 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8B5BEF8E484 for ; Thu, 16 Apr 2026 22:33:27 +0000 (UTC) Received: from mail-wm1-f67.google.com (mail-wm1-f67.google.com [209.85.128.67]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.28586.1776378803728865105 for ; Thu, 16 Apr 2026 15:33:24 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=tjspvLG+; spf=pass (domain: smile.fr, ip: 209.85.128.67, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f67.google.com with SMTP id 5b1f17b1804b1-488b8efed61so689465e9.1 for ; Thu, 16 Apr 2026 15:33:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378802; x=1776983602; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=MYFTEJZe4DIV7YB1HGlxm7n6+5/dpCJAZhYQu3GUKHQ=; b=tjspvLG+M+/UFYPDot7VZdjh/UhMLiLUtmiQ+3CxZMEPLcxmu0uVEnjnhdZjyTRy2j 5Eg4rrDeVV5M7moX8JA0Jj9wvczzO4KNYRdWaXjfKW7FdkJFyv5HUnOhu/iArhWO3i7R sLYMbA7ShpxV2Yhzizjgnx3aAd2dHoqV6LY00= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378802; x=1776983602; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=MYFTEJZe4DIV7YB1HGlxm7n6+5/dpCJAZhYQu3GUKHQ=; b=gPJJll7Luzx63L/86fEKD2VVUO7ZzowbLDYKvClwpVy3R0SFtk+SkyHhCXm8P3eSXk HlkL41GOz3VgIfL2NZgsUTuCJTOibH1sV7KkFcxAMxQWh7MsjZNte1eTqYTGOEUSvPVr qjwG1L6JR+HCYYAIw44IWLjM/ZgKpX906tIL6ph05CvQIzIO5oK45nPqmYJJbL+ehJ+K HeElZRmLMnalg3IlzvENKy2qq6O25fsZTd+uMzshyTLOI25LfaDfXaeBUQ8WbYX+ZMFq AcatIPQa1Y4C8f+c1x1OZdGNJyv1k9VU3n4t+4PBb2fXfZNQe0f+t22BSuFjf9HInsJ3 WOqA== X-Gm-Message-State: AOJu0YwnRkLcSmlPV63DMCRCgUsg3F51wsd/z4Quzwz8N3XIW9jA/bGu ikGLvR0u/pdPeH5eS80ak8xW3hEUDUptsscbaKT9zQprKhOISxYTH7SK7MxGrfcr00OOif0o6MZ bbFsypvPkG17Y X-Gm-Gg: AeBDieu3zMhV7Y3Hxh3xLT21ADeQmxaYxUpWyi7lLbMGLyW67WVGl3DAUVjsxQF7qiB FLmzUr0t9YJLwQZYSQwLTrGg8wYALoP5ordCigxceLboITZDkypGl3k34d91xrhIW4ZXtcAD4uL ECamWG0GSH+wNRvWwfD+YiJo78jtsk4e80bAFwGLikduLgfegHLKphyaY8Fy2IT0AiRlf+q43/H +fpIgLFw9eFfGBuvYFvImElW9E8nL885isCHTjyBsRJrXXJFklm+qGflCSC4f6v1jHWD8gKSdnN h6Hyyiaxf7mmsO7rOju1zehE/pJPKeKe5VtD7XXa9M+MYz+8p0zPXU2tCNp59Fl0N9cVID5NmFJ 4Cd48NbIy0KLyigiVHtC8r+hD9x6IS5VYVwydhQzr3pte1YHCB/ewQr4B0bVbYzJtPpfbablweP gnqZoX4tMXKh73nA2cE/9TxxV4R899PNllzK1tsIHKyLdMIfK5ZuY3N4H6hFMq4qz9DxHTyzjMC JhOPpElAU4qkaxQrAObNJ90OtmUYKhJmZer0Q== X-Received: by 2002:a05:600c:3150:b0:485:3cef:d6ea with SMTP id 5b1f17b1804b1-488fb8b9deamr2696325e9.13.1776378801807; Thu, 16 Apr 2026 15:33:21 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.20 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:21 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 36/51] license.py: Drop visit_Str from SeenVisitor in selftest Date: Fri, 17 Apr 2026 00:30:19 +0200 Message-ID: <4bffedef91d04e848a4a31e2618b837d2b82436a.1776377993.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:27 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235465 From: Sunil Dora ast.Str was deprecated in Python 3.8 and removed in Python 3.14. In [1], visit_Str was already removed from the LicenseVisitor subclasses (FlattenVisitor, ListVisitor) in oe/license.py since bitbake now requires Python 3.8+. However, the test-only SeenVisitor class in the selftest was missed at that time and still uses visit_Str/node.s. On Python 3.14, ast.Str is fully removed so visit_Str is never called, causing test_single_licenses to return [] instead of the expected license list. Replace visit_Str/node.s with visit_Constant/node.value in SeenVisitor. [1] https://git.openembedded.org/openembedded-core/commit/meta/lib/oe/license.py?id=6d3da37adbcaf5a7a3dade08f9d052571b195249 Fixes [YOCTO #16220] Signed-off-by: Sunil Dora Signed-off-by: Richard Purdie (cherry picked from commit 8a5b019eec72676893507d018e7609745d2e3f49) Signed-off-by: Yoann Congal --- meta/lib/oeqa/selftest/cases/oelib/license.py | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/meta/lib/oeqa/selftest/cases/oelib/license.py b/meta/lib/oeqa/selftest/cases/oelib/license.py index 5eea12e7619..49b28951f76 100644 --- a/meta/lib/oeqa/selftest/cases/oelib/license.py +++ b/meta/lib/oeqa/selftest/cases/oelib/license.py @@ -12,8 +12,8 @@ class SeenVisitor(oe.license.LicenseVisitor): self.seen = [] oe.license.LicenseVisitor.__init__(self) - def visit_Str(self, node): - self.seen.append(node.s) + def visit_Constant(self, node): + self.seen.append(node.value) class TestSingleLicense(TestCase): licenses = [ From patchwork Thu Apr 16 22:30:20 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86333 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id AC0D1F8DFE3 for ; Thu, 16 Apr 2026 22:33:26 +0000 (UTC) Received: from mail-wm1-f42.google.com (mail-wm1-f42.google.com [209.85.128.42]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.28274.1776378804944782731 for ; Thu, 16 Apr 2026 15:33:25 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=BRzSDzxc; spf=pass (domain: smile.fr, ip: 209.85.128.42, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f42.google.com with SMTP id 5b1f17b1804b1-488b3f8fa2bso10620665e9.1 for ; Thu, 16 Apr 2026 15:33:24 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378803; x=1776983603; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=g1sjjgMJpj1M94vEE/TxwPq6m7Lyysw0wegXrHYT2Zs=; b=BRzSDzxcuH9hGAqs78nIxKoVrnTfBosdMiTkDk276/73vvad+9GEu6DiMUpz7qtbff 8iJqSsax353F++NETDD5QlWcRDKLC4EntQFwOgzE2O5IBXJEkabVbNSp980iKm/fEuWW K4QJ+lYU/X5cedj5PcKLh3QhjtB7vvB/IvldU= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378803; x=1776983603; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=g1sjjgMJpj1M94vEE/TxwPq6m7Lyysw0wegXrHYT2Zs=; b=WNZhZjxG886JfgwyEWXR9IhJA2zHQLa4aUZqZsFWcC0fUf+loYnFINqpiDcWubhC4k +fSyR/oBGtxEmyhgiGeskg6px+1OAFKnZlIS+neqt8TYVvVXlovugZkRYcZRsF3zhDi9 aCxpzFFXa6E99TLS8SkvnTpmmXwS2O+zBivdKU8BPzyW9sQT7zmcSK3BF1UES4dmWBPq GsgivjQDFFnmWy2mmUunaq6SHA5iegT2UCIOFrMhg4FDH/SsgVlnm6TrZITYOMM7+9+n rJVfkbMJ8fHVw5pQjveFxq8L1W9RPAuZvLC0gCYfpS1n8ng2Ayb8mjJFcZkzvI7iwJkh Yx8Q== X-Gm-Message-State: AOJu0YwJnd3oEmiaasjXGmsMZltbfQI1qOLXgTPtBqnRdYaLECLn1/or 6dalQpJY8w5YauVyVAU4GeTFotVJ3hoNb2xLbppAao2TymCTKqA3xckkiRnXzPDx6A9+jHxxeGo lD4sYt55gXA== X-Gm-Gg: AeBDietEAM7jdx4NMzx8P4GqbCFrbp/5a5JOgrNAwx23dUjtT034e1QwLgPU+2tc0kD XYP7bS6WYTVGoMU963eqIf9FjYrO54Jxy7TSA5BXdUvc9jg9qJxdlNlLaCnDQcA6EHG1OBJvFbj cfCjrGyWHNBh57zUVzQDQYnhduO0RdopZuC1Bxipb0jZg03O5+ZL0b0V8/MwUittM9nyX7luobD VGe5rNTyg6vgNfP+nUUD+9hPihP5oogmELqg8WaT7QHafyclwMWCt1emBqLha+PX/JC5KePuy7V tPJf+D7751cagji314pqw1P5SX9lIhWAzyU85U3DkQKLOKtLo1N2ULplgZ535zdiKCk0GGSv3fL fclHjOCZ+i+MkzRa4/Q8gI9NuDREpME2GE29cAZwDH7AiPpjvbPfk0II05n846hMJj9ORlCCdnz o6J47YY7NDLq/y9byhdDdRznRV/gpTgyWRs0UwyZsuUb6Pl53OpTAoOZvu3DvLj6aKB5I2GLP2w dEdOPHNfCuofcud9BORfz4nb1eHSzmiYNSu1Q== X-Received: by 2002:a05:600c:a411:b0:488:c239:d498 with SMTP id 5b1f17b1804b1-488fb89e84fmr2605965e9.8.1776378803017; Thu, 16 Apr 2026 15:33:23 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.22 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:22 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 37/51] oeqa/selftest/devtool: add vulkan feature check for test needing it Date: Fri, 17 Apr 2026 00:30:20 +0200 Message-ID: <6f9c690d34938522c850f49b818601bea7752817.1776377993.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:26 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235466 From: Yoann Congal When run with a distro without 'vulkan' DISTRO_FEATURES: $ oe-selftest -r devtool.DevtoolUpdateTests.test_devtool_git_submodules 2026-04-14 14:36:57,036 - oe-selftest - INFO - test_devtool_git_submodules (devtool.DevtoolUpdateTests.test_devtool_git_submodules) vulkan-samples is unavailable: vulkan-samples was skipped: using DISTRO 'nodistro', which is missing required DISTRO_FEATURES: 'vulkan' 2026-04-14 14:37:13,002 - oe-selftest - INFO - ... ERROR 2026-04-14 14:37:13,002 - oe-selftest - INFO - Traceback (most recent call last): File "/.../openembedded-core/meta/lib/oeqa/selftest/cases/devtool.py", line 1695, in test_devtool_git_submodules self.assertIn('gitsm://', src_uri, 'This test expects the %s recipe to be a git recipe with submodules' % recipe) ~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/usr/lib/python3.13/unittest/case.py", line 1171, in assertIn if member not in container: ^^^^^^^^^^^^^^^^^^^^^^^ TypeError: argument of type 'NoneType' is not iterable This is caused by vulkan-samples being skipped because it needs the vulkan DISTRO_FEATURES. Note that this is not seen in testing because nodistro has vulkan enabled by default since 2e1e7c86064 (bitbake.conf: Enable opengl ptest multiarch wayland vulkan in DISTRO_FEATURES by default, 2026-02-21) Signed-off-by: Yoann Congal --- meta/lib/oeqa/selftest/cases/devtool.py | 2 ++ 1 file changed, 2 insertions(+) diff --git a/meta/lib/oeqa/selftest/cases/devtool.py b/meta/lib/oeqa/selftest/cases/devtool.py index 73a79b21041..23849b0bf2f 100644 --- a/meta/lib/oeqa/selftest/cases/devtool.py +++ b/meta/lib/oeqa/selftest/cases/devtool.py @@ -18,6 +18,7 @@ from oeqa.selftest.case import OESelftestTestCase from oeqa.utils.commands import runCmd, bitbake, get_bb_var, create_temp_layer from oeqa.utils.commands import get_bb_vars, runqemu, runqemu_check_taps, get_test_layer from oeqa.core.decorator import OETestTag +from oeqa.core.decorator.data import skipIfNotFeature from bb.utils import mkdirhier, edit_bblayers_conf oldmetapath = None @@ -1685,6 +1686,7 @@ class DevtoolUpdateTests(DevtoolBase): # Try building bitbake('%s -c patch' % testrecipe) + @skipIfNotFeature('vulkan', 'Test requires vulkan to be in DISTRO_FEATURES (operates on vulkan-samples)') def test_devtool_git_submodules(self): # This tests if we can add a patch in a git submodule and extract it properly using devtool finish # Check preconditions From patchwork Thu Apr 16 22:30:21 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86347 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id AD912F8E486 for ; Thu, 16 Apr 2026 22:33:27 +0000 (UTC) Received: from mail-wm1-f50.google.com (mail-wm1-f50.google.com [209.85.128.50]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.28275.1776378805367387653 for ; Thu, 16 Apr 2026 15:33:25 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=Ui4b5P3N; spf=pass (domain: smile.fr, ip: 209.85.128.50, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f50.google.com with SMTP id 5b1f17b1804b1-4887ca8e529so543745e9.0 for ; Thu, 16 Apr 2026 15:33:25 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378803; x=1776983603; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=CFm7VjounM+gu7O7oiKUuw+UTStgcv5QPDvogYmbpV4=; b=Ui4b5P3NlrLSZFp1H77qr9F++XTwODQZCrpi2I4Fh4/p76NIbdWGsELuDNU1TnMfcY p3ri0bnsekqe4jBeEMqn/b8kuh9cHn21I45sMPvkIG0FQuE9ObyTyaKVYXQTgsR9WIEL RJb94vJZKkUMFcbOavs8nHKDwCe4C0FLJk+AQ= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378803; x=1776983603; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=CFm7VjounM+gu7O7oiKUuw+UTStgcv5QPDvogYmbpV4=; b=bqcLdUUv6YX4Xr7sDpG6JsP+5ChVkw8Ki8MqNDY9HfqHYIG9zhqEOdU2AYr8CXKXSA K3wNrLPjmZIDVe8JmjI3ZY1Jj/U43yonK4kCbRUR/dv6h/do/4e272Nwk9YKNFQS6zrh Q49boW96TvMoqD2Sbj+pPrS67Jlm/HA5UW9L6TOlB1lZTo91c5KA97UxtpVhbSzxz5YG Prsppx+Wr6vxF6kV3NeHLTMwawXmmfXfEu2f+UlByxYTGBcEOVmmV9zxfH4BHoktTPZ0 jmC4U9LDcW4UQ5V5ZNDy8BDoQDsDX5U3JGtHgOVBw0SoZ0jnldBY5hrr47iJoOPifqb8 N1FQ== X-Gm-Message-State: AOJu0YyCS8WTpHb0Z+qBKeeWwN3Qq7c6nuzWmKfWJ/qOFCkjWCuAC/BN 7RYvgQYpl+qbWadvMYSEk6b7jnCAFW/UlMFArwsAhLXiGgH9Z4l+oc++CDRwUdXO/tJroa8aKsp UXHwsO5uTLg== X-Gm-Gg: AeBDievAYQKtToLEkK9fwQ3pJVTGzi1kdd+c4RH5TinSF+vMImGd2MJUKNhlEh7kVU0 ybnfEIiGotSL13Tl+MGfL9VHDbz/xuAlx4IppJEkddh4kzTMBkrEr8Vflc6E2bPh1Dwg1Zsb79I OaemFMZRFSsKtonuz987MvcDt41wu8V5xNRerru5WWNMqKOE/jzEJEtDky2qSHvRoZ3QlGR3OOa IJ2vSKCaE5w09eYXzXeE9Sve3kkD/2pi9+fWXCW1KmUJkCfKFVY8dWPm79tUHv4qa9BUKy0VLuZ X/vDxHZilZ8GnYaZSkanZ+/9EsaCmWvVzhGSVNRXCX6bmm1Jll6qEocP2JyoQzDdabFPZaMIPb+ x1iTAK9DwW97FCG4z9SSmmYgoqju0lHMAlYxonipVky+C/Byg1llMx/oJtoU8fSit9tgWYisZhw H8BgI9WpfMxpZ180vHt/6fyzlRblKc11Cn0tGQnMb0qgobqlOhv0baye2WIUQaisYu+cpWklH4f x9jKxRoILhtiWTupg7lB24Ub7GnEwYg55NM00PzSz9acVH7 X-Received: by 2002:a05:600c:8b6b:b0:485:3c2e:60d5 with SMTP id 5b1f17b1804b1-488fb8859ddmr3392145e9.2.1776378803568; Thu, 16 Apr 2026 15:33:23 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.23 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:23 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 38/51] selftest/minidebuginfo: extract files from tar archive using tarfile module Date: Fri, 17 Apr 2026 00:30:21 +0200 Message-ID: <99d513c47f2feeffe442ac9344a13350f65a1cc8.1776377993.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:27 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235467 From: Alexander Kanavin Python 3.14 added security checks around archive extraction, and by default will refuse to handle symlinks with absolute paths. It's possible to handle this using 'filter' argument, but it is not always available in older Python versions on various host distributions we need to support, so let's extract only the needed files directly using tarfile module. busybox is itself a symlink to busybox.nosuid, so both are extracted. [YOCTO #16195] Signed-off-by: Alexander Kanavin Signed-off-by: Richard Purdie (cherry picked from commit d52d00a3bb4a1ba93e88f1d24d8bb99d6aa321eb) Signed-off-by: Yoann Congal --- meta/lib/oeqa/selftest/cases/minidebuginfo.py | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/meta/lib/oeqa/selftest/cases/minidebuginfo.py b/meta/lib/oeqa/selftest/cases/minidebuginfo.py index a8923460f90..5f37522c325 100644 --- a/meta/lib/oeqa/selftest/cases/minidebuginfo.py +++ b/meta/lib/oeqa/selftest/cases/minidebuginfo.py @@ -6,7 +6,7 @@ import os import subprocess import tempfile -import shutil +import tarfile from oeqa.core.decorator import OETestTag from oeqa.selftest.case import OESelftestTestCase @@ -33,7 +33,10 @@ IMAGE_FSTYPES = "tar.bz2" # ".gnu_debugdata" which stores minidebuginfo. with tempfile.TemporaryDirectory(prefix = "unpackfs-") as unpackedfs: filename = os.path.join(bb_vars['DEPLOY_DIR_IMAGE'], "{}.tar.bz2".format(bb_vars['IMAGE_LINK_NAME'])) - shutil.unpack_archive(filename, unpackedfs) + with tarfile.open(filename) as tar: + tar.extract("./bin/busybox", path=unpackedfs) + tar.extract("./bin/busybox.nosuid", path=unpackedfs) + tar.extract("./lib/libc.so.6", path=unpackedfs) r = runCmd([bb_vars['READELF'], "-W", "-S", os.path.join(unpackedfs, "bin", "busybox")], native_sysroot = native_sysroot, target_sys = target_sys) From patchwork Thu Apr 16 22:30:22 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86349 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id B9582F8E488 for ; Thu, 16 Apr 2026 22:33:27 +0000 (UTC) Received: from mail-wm1-f65.google.com (mail-wm1-f65.google.com [209.85.128.65]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.28276.1776378806385555214 for ; Thu, 16 Apr 2026 15:33:26 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=h3VufN32; spf=pass (domain: smile.fr, ip: 209.85.128.65, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f65.google.com with SMTP id 5b1f17b1804b1-4887f49ec5aso621815e9.1 for ; Thu, 16 Apr 2026 15:33:26 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378804; x=1776983604; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=8x20e9wxeDlAXdEuZpXs2g/DEGuOIR/2HUSKnMHglAo=; b=h3VufN32ce9GFx0h0CMfXydc9hi5Hzk1OmGEo9pbsMKCcSCNBXIxXP8PCGQPDOtk9K W1QEmQZX/qZvbcfJ4jqJFrLx0YeIyQE+bH3RqSd8tZqlTGJrYy0lFuy18u4576YqTUHt h8zCnNP1B/pJ/LZ+WmZmzXQFwEPvMcbfi8vik= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378804; x=1776983604; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=8x20e9wxeDlAXdEuZpXs2g/DEGuOIR/2HUSKnMHglAo=; b=fhVWtY8mTQFtafmdWriWxmERe0RqzSYAa4zwDW1uCsswbmHIZEvg9ly1CgWo3l6Hhc AChFmAjxjA/dLxzW3mk+TzXbp3FptxdW0j8iFNpc8ZQqjqvwhEyjOpa5RGyn1yBK0p9X YXhjgkCcDls8j2Co3SUeFSgXvdwvegzdwIgx5rejAC/A9dOpyjbtDMMbN8q09ooUB2iu QWXy5fJdMVNpN8Y+AoNf7IXnr/o9oy6lkZkNZmk9zGpIhbAv85WVMqq5QOAYhU+DkC6I lsxW2W5E+PXjGNjBaqB6g/93eIUaoml8JPeHryF7KHGbQAKC7wjVxl4n6ze0mZ6DdYSf +wzA== X-Gm-Message-State: AOJu0YxbvdkZLQlFEAq8KJPyPOdroHboGWQJl5/RnAEi4Wk7ZdFgsTfH J1rHfGkRBn0CtaoukcHMB8Rm/YxXm887Rcixs0j3N6Qjc80BPWIg6szru8pY4quu17001zSLj5q rwQno7hAe8kZW X-Gm-Gg: AeBDiesGj0puGiLVTp1bHc6tZWkIoqGsEHiC0khpiWrihTjCJGn9YfdTc98gnssES2D qro6CX1JKIC3AvjC0gvCRgYF8hDsTVZvpVdLrnP0haadBmQNEPaRW4AVjSe+bw2Y5XfjIHkAn1D jvAS39jpjtFdltUlWoFa3ljpv3y8LdLFaX8e4iBnUJqKA+CdSkeNsXnn1inFogJDtgIhCaI7A9H QO61GI+LNDK5rA4RbzY+BkejsEqW8DbjYX6JkYhkv8cp7dZMGWdJuiIDyh+rTAfgisuUdsHJMUR wufsC2E+WOFF1gYawEYG9pkmuJupjv/sZ0/lCzqM6X5lhFWleYH9F9Na6w9vhdsjoyqAGbcI1At tV6xP5u54VnA1bw7fnMCSw2ucNQbf5b0CAdSlHGRShfgyrKuzHUom2i7JEC5eqOQX0g0iJ46VSx EiM4YPNXgIO3xqGNJ4vEeU3P/e4xjOxNX+XCGuH41OjIkFyAR4vEzV555uv5iU1/wQ+GfublllI 1BXxd2EPeKcM1Do1rAQ7qImDQdT52tvFhi38g== X-Received: by 2002:a05:600c:8909:b0:485:30f7:6e88 with SMTP id 5b1f17b1804b1-488fb78a385mr3876775e9.31.1776378804502; Thu, 16 Apr 2026 15:33:24 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.23 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:23 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 39/51] selftest/gdbserver: replace shutil.unpack_archive with tarfile extract Date: Fri, 17 Apr 2026 00:30:22 +0200 Message-ID: <2a9d7bc66aafb111413331f5c510935b14a86c9b.1776377993.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:27 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235468 From: Alexander Kanavin This is a followup to https://lists.openembedded.org/g/openembedded-core/message/233609 as the same issue happened in a different selftest. [YOCTO #16195] Signed-off-by: Alexander Kanavin Signed-off-by: Richard Purdie (cherry picked from commit c7468e70c238b056acbe06ef722b62b02626db8f) Signed-off-by: Yoann Congal --- meta/lib/oeqa/selftest/cases/gdbserver.py | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/meta/lib/oeqa/selftest/cases/gdbserver.py b/meta/lib/oeqa/selftest/cases/gdbserver.py index 1c713331900..fe1fa6dac1f 100644 --- a/meta/lib/oeqa/selftest/cases/gdbserver.py +++ b/meta/lib/oeqa/selftest/cases/gdbserver.py @@ -7,6 +7,7 @@ import os import time import tempfile import shutil +import tarfile import concurrent.futures from oeqa.selftest.case import OESelftestTestCase @@ -41,7 +42,8 @@ CORE_IMAGE_EXTRA_INSTALL = "gdbserver" filename = os.path.join(bb_vars['DEPLOY_DIR_IMAGE'], "%s-dbg.tar.bz2" % bb_vars['IMAGE_LINK_NAME']) shutil.unpack_archive(filename, debugfs) filename = os.path.join(bb_vars['DEPLOY_DIR_IMAGE'], "%s.tar.bz2" % bb_vars['IMAGE_LINK_NAME']) - shutil.unpack_archive(filename, debugfs) + with tarfile.open(filename) as tar: + tar.extract("./bin/kmod", path=debugfs) with runqemu("core-image-minimal", runqemuparams="nographic") as qemu: status, output = qemu.run_serial("kmod --help") From patchwork Thu Apr 16 22:30:23 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86350 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id C9431F8E48A for ; Thu, 16 Apr 2026 22:33:27 +0000 (UTC) Received: from mail-wm1-f43.google.com (mail-wm1-f43.google.com [209.85.128.43]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.28277.1776378806907643686 for ; Thu, 16 Apr 2026 15:33:27 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=nT3Tm+Eb; spf=pass (domain: smile.fr, ip: 209.85.128.43, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f43.google.com with SMTP id 5b1f17b1804b1-488b0e1b870so732615e9.2 for ; Thu, 16 Apr 2026 15:33:26 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378805; x=1776983605; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=cOJc0sc2X9W0KluyZy40GdVF8HL/+LAlKeITT2hK1+4=; b=nT3Tm+Eb5y7wGM+PIo4ZTABWBAEHy2/0ysrD/yqpnRT7jw35gUR0bxUmLl9hNLVBsR rbKkvQAn2sVJKGWYxpVfbOYzhruDoIRuPzmlssgv2S/VJnSTTSc6Wf6PKNgMhjk4mwpO Hv8c/G7/1s0Yli5XOB9cxa4sWmy/FglW5gVg8= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378805; x=1776983605; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=cOJc0sc2X9W0KluyZy40GdVF8HL/+LAlKeITT2hK1+4=; b=fJdJ5z/+K7ZXHH2EqvU2Dk0kkwovQdb4aoSijPa5a1pZ8W2iLo0ZVovuz9JZVQOTeZ h9xegmzD3Cs9klBVp84nEBNh/keic77Yb9jSrkeoQqlLexreY239HpgjdPo/pdAyef8V Jcw2sgtVxot4s4AzX1BcjVVDeH7ef1EQ8XCxIFWiLzLX9qElV0kEO0x+Q3N+A7iM8DwZ dw+u56iOqmNnAT6tZfGHmXupEEzGDd05U+dXJbiEkuClsTHhCex5QoS7B6bRv6fJTfAs Khm9fJ3Zf0+4sH0/cKzHhJSa7Nx9DYoBTNPVJivZqP2RBYbjatBQD76uJ2frmWyivBUH X0lg== X-Gm-Message-State: AOJu0YyhYOAta/7Yn5vhzFpbi3mUmerXbpDq4HKJ6+mlEqIFAXS2Ejrc ngTLIJXsvBuVrK5XfR5MJISk03ZzAyE/paT5qwWgXPGJr3/mwg4X2XXwUvOYwvC7UwdN0BM1v4W gUYlAumjoCg== X-Gm-Gg: AeBDiev1OgS8dOirVk2qSibOKKNWalFx730mIjW5T0Mj4l+K7Y3WKBEcZ0NvFzGBGN6 NvYuECOARpv3JYYQ3X9RwI/ywu8vGBZnxQhK4JnQhamsSGkiOHXHuAxk19ROWlf8qiPKQ8Sw7cY s0iw457iVHBiD/5K4813Yf1DMLMZxtULi1Ui0oqK7ggbPnQTKiZqhZo2vbQFOTezgeSoSue2TEC YwCwg8H0iuewOeN2gSlD/ZYNmU6E17yHyporYa64FWWUiz2SHZXKR/KXMxW4dbY884eLa/PyOeL E85yDA6uwWXuV0tQPwR2CQrbQh1f0O+rimnSaKx77zYK+aZ6/kuOz1Qn/kT6MjSdx2mO3ObBYGe DP17wVyCRykcjV5g5PFqp63J5ecRR9HO1/tLitw2xgqRY8MSGteRU8FrxLc2h66Vo+d4dYP0c2o QnJ8Z7/PHHTHGJZ9xpVkaC/Sl7YkwYm6bOi9dj9XT8XMPqx4AEIO0J6pinf3ZIPitb0cbgdhsd/ t2o67b07/g+6m6j3hDp1iS61KCUNsDbTr/eOA== X-Received: by 2002:a05:600c:621b:b0:487:5c0:671f with SMTP id 5b1f17b1804b1-488fb742e74mr5488045e9.9.1776378805016; Thu, 16 Apr 2026 15:33:25 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.24 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:24 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 40/51] oeqa/selftest: add wayland feature check for tests needing it Date: Fri, 17 Apr 2026 00:30:23 +0200 Message-ID: <17841fd5e64cb2f0e966e848481a1807918dc62d.1776377993.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:27 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235469 From: Yoann Congal When run with a distro without 'wayland' DISTRO_FEATURES: 2026-04-14 17:42:00,568 - oe-selftest - INFO - FAIL: test_sstate_32_64_same_hash (sstatetests.SStateHashSameSigs.test_sstate_32_64_same_hash) 2026-04-14 17:42:00,568 - oe-selftest - INFO - ---------------------------------------------------------------------- 2026-04-14 17:42:00,568 - oe-selftest - INFO - Traceback (most recent call last): File ".../openembedded-core/meta/lib/oeqa/selftest/cases/sstatetests.py", line 407, in test_sstate_32_64_same_hash self.sstate_hashtest("i686") ~~~~~~~~~~~~~~~~~~~~^^^^^^^^ File ".../openembedded-core/meta/lib/oeqa/core/decorator/__init__.py", line 35, in wrapped_f return func(*args, **kwargs) File ".../openembedded-core/meta/lib/oeqa/selftest/cases/sstatetests.py", line 371, in sstate_hashtest bitbake("core-image-weston -S none") ~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ... AssertionError: Command 'bitbake core-image-weston -S none' returned non-zero exit status 1: ... ERROR: Nothing PROVIDES 'core-image-weston' core-image-weston was skipped: using DISTRO 'nodistro', which is missing required DISTRO_FEATURES: 'wayland' 2026-04-14 17:42:00,568 - oe-selftest - INFO - FAIL: test_core_image_full_cmdline_weston (incompatible_lic.NoGPL3InImagesTests.test_core_image_full_cmdline_weston) 2026-04-14 17:42:00,568 - oe-selftest - INFO - ---------------------------------------------------------------------- 2026-04-14 17:42:00,568 - oe-selftest - INFO - Traceback (most recent call last): File ".../openembedded-core/meta/lib/oeqa/selftest/cases/incompatible_lic.py", line 153, in test_core_image_full_cmdline_weston bitbake('core-image-full-cmdline core-image-weston') ~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ... AssertionError: Command 'bitbake core-image-full-cmdline core-image-weston' returned non-zero exit status 1: ... ERROR: Nothing PROVIDES 'core-image-weston' core-image-weston was skipped: using DISTRO 'nodistro', which is missing required DISTRO_FEATURES: 'wayland' This is caused by core-image-weston being skipped because it needs the wayland DISTRO_FEATURES. Note that this is not seen in testing because nodistro has wayland enabled by default since 2e1e7c86064 (bitbake.conf: Enable opengl ptest multiarch wayland vulkan in DISTRO_FEATURES by default, 2026-02-21) Signed-off-by: Yoann Congal --- meta/lib/oeqa/selftest/cases/incompatible_lic.py | 2 ++ meta/lib/oeqa/selftest/cases/sstatetests.py | 2 ++ 2 files changed, 4 insertions(+) diff --git a/meta/lib/oeqa/selftest/cases/incompatible_lic.py b/meta/lib/oeqa/selftest/cases/incompatible_lic.py index 93884f57319..0e225ad02c7 100644 --- a/meta/lib/oeqa/selftest/cases/incompatible_lic.py +++ b/meta/lib/oeqa/selftest/cases/incompatible_lic.py @@ -5,6 +5,7 @@ # from oeqa.selftest.case import OESelftestTestCase from oeqa.utils.commands import bitbake +from oeqa.core.decorator.data import skipIfNotFeature class IncompatibleLicenseTestObsolete(OESelftestTestCase): @@ -142,6 +143,7 @@ require conf/distro/include/no-gplv3.inc """) bitbake('core-image-minimal') + @skipIfNotFeature('wayland', 'Test requires wayland to be in DISTRO_FEATURES') def test_core_image_full_cmdline_weston(self): self.write_config(""" IMAGE_CLASSES += "testimage" diff --git a/meta/lib/oeqa/selftest/cases/sstatetests.py b/meta/lib/oeqa/selftest/cases/sstatetests.py index 687640a4016..02fd45fe0d9 100644 --- a/meta/lib/oeqa/selftest/cases/sstatetests.py +++ b/meta/lib/oeqa/selftest/cases/sstatetests.py @@ -15,6 +15,7 @@ import re from oeqa.utils.commands import runCmd, bitbake, get_bb_var, create_temp_layer, get_bb_vars from oeqa.selftest.case import OESelftestTestCase from oeqa.core.decorator import OETestTag +from oeqa.core.decorator.data import skipIfNotFeature import oe import bb.siggen @@ -354,6 +355,7 @@ class SStateCacheManagement(SStateBase): self.run_test_sstate_cache_management_script('m4', global_config, target_config, ignore_patterns=['populate_lic']) class SStateHashSameSigs(SStateBase): + @skipIfNotFeature('wayland', 'Test requires wayland to be in DISTRO_FEATURES') def sstate_hashtest(self, sdkmachine): self.write_config(""" From patchwork Thu Apr 16 22:30:24 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86353 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id C5EF5F8E486 for ; Thu, 16 Apr 2026 22:33:37 +0000 (UTC) Received: from mail-wm1-f66.google.com (mail-wm1-f66.google.com [209.85.128.66]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.28280.1776378807994121215 for ; Thu, 16 Apr 2026 15:33:28 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=rEgo1rhA; spf=pass (domain: smile.fr, ip: 209.85.128.66, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f66.google.com with SMTP id 5b1f17b1804b1-4852a9c6309so474585e9.0 for ; Thu, 16 Apr 2026 15:33:27 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378806; x=1776983606; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=P7+oiW+E7TFCEvgg7t8LoFkNmsqgnc8T2/jUJQznBMw=; b=rEgo1rhAMn9GPwgFNHLKsVvWqmKnH87IVAFKXPSajO530XvTzAIYgqiepAC/EZpYtk G6n9uBUVBPP69oOl72VkGpbb1dCR8MN477pH80OoLTaJpYTpy6jYBLi6yKfq+hqyez7O y1g2gbcCgeoUjErZrHe2HcMSmxTGTCwuCaGi4= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378806; x=1776983606; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=P7+oiW+E7TFCEvgg7t8LoFkNmsqgnc8T2/jUJQznBMw=; b=V9E+APHT6T5VszStAC8H/hC83yr+MBi/YcxRJ9mWXMceB0rEJaA+836TkusTmEpO/D GA/K4ADGE+irxiSqSrAb9XyDFl4UhAvrnRhhoyvKI49TyNmw3DJfJvWJLwRWLy7FaN49 mWQsx6phnJ+HJC09RFhyRwvcpcGkZ21FmXFa1n8X6BjlSo6rFRnVQUcf1/TwYAbuegY2 8yI4X8vEyxMZmCJZGiwodviUeG7621VsblYpJWhkq+aL74RnLmOYBjZGRWG6ubD1u/MP we6cH0N1dQyXPS7FawBC+SXnnibTiyOSVNdZBH2p4r5eUz8QL1H0bORXxeWSi3XKOyV3 9+5g== X-Gm-Message-State: AOJu0Yxi0g6zzKNUk/W25hN7EiSXOvV9656Pb2td39MkVat2TasJF0Gj LR9Qyu0bpNdC4jtOz3K3KFRG/bWTqnf444Bb07O0P/7SsslZj6EQ3b0w2U6yVrQfOBEs2IFtY+b Hup2Ph634LNgg X-Gm-Gg: AeBDietbyM342/jwh5rp3M2f4ev2lr8+Z73T3PcGKM5lImLxVUeN9p11H/kSrP+/FZ8 SpMAdKjYeL+sAmJU74uIArg+9u+JbzwhSk02SQ9/5Y68a+pT+hvVyJgcq8hm6Ur6F98kWfoaSzV Ov7H/MPXe3PaOZx9kLeKESWB1vEw0MveKzSTmUhWLi6DzCIjKbrZ+rEfivSmsP0e7j6ejnxfw+9 FV+jrWC1sZ4mEUfcn652ET6PCYRZYdqmTLQZGehbR/vgAv+2t1BzG9ACZD4phPD3YTzh2k4WN45 HMklIp4xk484SQsa4CHugLNESKaAM8DJp+YFGc8/bKNlnAuF0RBgKGElvO6B2a9CKcBoUcgwGck MZq2AcikJ/Nql1ZnDUO2eaC/PJtMh1YDsx5TUskId5NWptI4DzOjOoZ7gQmVnd6wzgtis0gZGAI Cvh0O9z5etmMydzqewvwV637f1tRkIkE/yk3a6YVtznZhmgw2Im7mcrll9UkglN9MThrwQz4LTf OVQtwnLXmv1gd504Mkmz73lIMLPzgzRsd4cKQ== X-Received: by 2002:a05:600c:4e0e:b0:485:557d:9fe with SMTP id 5b1f17b1804b1-488fb74d67dmr5170865e9.12.1776378806132; Thu, 16 Apr 2026 15:33:26 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.25 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:25 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 41/51] report-error.bbclass: replace 'codecs.open()' with 'open()' Date: Fri, 17 Apr 2026 00:30:24 +0200 Message-ID: <52d542285b3345d474eb5246e178d268138a443d.1776377993.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:37 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235470 From: Trevor Gamblin With newer Python versions, codecs.open() is deprecated: https://docs.python.org/3/library/codecs.html#codecs.open Replace it with the preferred call to open(). Signed-off-by: Trevor Gamblin Signed-off-by: Mathieu Dubois-Briand (cherry picked from commit 58b9f90779d1227e30a7de4948b10e49fb5b5ac1) Signed-off-by: Yoann Congal --- meta/classes/report-error.bbclass | 8 +++----- 1 file changed, 3 insertions(+), 5 deletions(-) diff --git a/meta/classes/report-error.bbclass b/meta/classes/report-error.bbclass index 2b880c8b0c7..01ac1f2a37f 100644 --- a/meta/classes/report-error.bbclass +++ b/meta/classes/report-error.bbclass @@ -10,19 +10,17 @@ ERR_REPORT_DIR ?= "${LOG_DIR}/error-report" def errorreport_getdata(e): - import codecs logpath = e.data.getVar('ERR_REPORT_DIR') datafile = os.path.join(logpath, "error-report.txt") - with codecs.open(datafile, 'r', 'utf-8') as f: + with open(datafile, mode='r', encoding='utf-8', errors='strict') as f: data = f.read() return data def errorreport_savedata(e, newdata, file): import json - import codecs logpath = e.data.getVar('ERR_REPORT_DIR') datafile = os.path.join(logpath, file) - with codecs.open(datafile, 'w', 'utf-8') as f: + with open(datafile, mode='w', encoding='utf-8', errors='strict') as f: json.dump(newdata, f, indent=4, sort_keys=True) return datafile @@ -86,7 +84,7 @@ python errorreport_handler () { taskdata['task'] = task if log: try: - with codecs.open(log, encoding='utf-8') as logFile: + with open(log, encoding='utf-8') as logFile: logdata = logFile.read() # Replace host-specific paths so the logs are cleaner for d in ("TOPDIR", "TMPDIR"): From patchwork Thu Apr 16 22:30:25 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86352 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id DA646F8E489 for ; Thu, 16 Apr 2026 22:33:37 +0000 (UTC) Received: from mail-wm1-f66.google.com (mail-wm1-f66.google.com [209.85.128.66]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.28281.1776378808415272403 for ; Thu, 16 Apr 2026 15:33:28 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=I34F6t3a; spf=pass (domain: smile.fr, ip: 209.85.128.66, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f66.google.com with SMTP id 5b1f17b1804b1-488a4bc360bso297095e9.0 for ; Thu, 16 Apr 2026 15:33:28 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378806; x=1776983606; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=0uHzev+D2TX5lx68FpEJum0Jy8kOUbQhyO7z07ltsbM=; b=I34F6t3asgpuCb1YbjpyvLmioqFasAbaPWCTJBmqMvNDS9plsmsyrUlPt8SQUusr4j TTG0GA9/p6128KPNGdsyUNjUiEdoSicTbJ/wnLLKiDdqcgiSUDGFz7Nodl64wgZ01saN JqUGVEy17YauquaeYdf1kBW62zdio6t120zUY= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378806; x=1776983606; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=0uHzev+D2TX5lx68FpEJum0Jy8kOUbQhyO7z07ltsbM=; b=kBlDVHzuvGZXU2fw1jODJfG0HQguFn/eJmfjp5qhj3tv7rVrIGRmK80VmrFjlNTCDn WadsrPT/WYyoeZ8C5O/sFfiiOH585MGEAYwjOF1SRAPcPI6P+ZUeQvauTICmSu8BSwzn dOcYGAgVkVPtLkiBs+gqyl6S0aFkO7Qel0Sv+MbIhUj5Eh1I4E8AQiu50b/3A32ZzV4F JcRjqDNndNGaNnRX8M52WRq3/pcxY5zWwH/nodw1rqx4ft1tmJKVYCg//QOz6V+cGqvN vHDv8bTI45y6NX165hvHbScczlN2Gk2G+SvfZjLCzFJVFHZY0COk1LXsKKqhqIhAmzPq XUGg== X-Gm-Message-State: AOJu0YxAAq9FelrVi7X1aC5rHCilur+KThWF69cWrIrPR0zQvhLanCQO FHAXgQCTrtFJfwPVq6/tY+kikwOxs2UJ6XWhrUFbgg11fhuw6bEz4wJObIw9gXF7V/myJ+U+AB+ 3DFUoBydQ7hr4 X-Gm-Gg: AeBDietSAIMUOMl9j2Yz2T//Bkm/2kqCByHOwmHocg2C/vAQ0kYlwzWq+rq5/ubD/Ow veafC9xatku2kqCyfK0LntLff46z0gmbv9vSI4ORuU+oGtQFkMCdf1qdFFC+d8Fy1jMTYMxehM1 R706Uesxy/KuN5TIW8f5UqSigCFJqkmb3jExGqivB5vVF9rvgCBrOKTPs4iB2p9pzgKXOMWiv0v iFhVj2vHojQX2OhPCrkRQbq47oxBgT4pDSHu/FMtC/CJSgpNxqMcb8qq4Ug1T+tVKdCFnqKc/6r y3uM7hiTg1VqNptTHN4xkNidweZvLq/kU4GXhkGwh+cnz/TjqiokYYYdR+OrONws6X0pDUqfERc 2zfFj7lUUNPUpcn/JQS5naoBQ7iOrPh7MINgalnVUnbD4QtBKrTO4bF3gv90fFEDphg1F3QFup9 H6oAR7QxUR8qM5jKwTRsAItgoCnp+WQh1yvpvf2merzNednEjklt7DkE3LkZSAJWPBGH/jMtcdH JxApcnnX39dHJi6XCZSdFkm1y85ncL4dRRMlQ== X-Received: by 2002:a05:600c:c118:b0:488:b187:d8ed with SMTP id 5b1f17b1804b1-488fb73d758mr3967705e9.2.1776378806615; Thu, 16 Apr 2026 15:33:26 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.26 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:26 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 42/51] oeqa/sdk: Default to https git protocol for YP/OE repos Date: Fri, 17 Apr 2026 00:30:25 +0200 Message-ID: <5d669fd8ed500b753859e8e76ac875d83252311b.1776377993.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:37 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235471 From: Yoann Congal Following up on commit 139102a73d41 ("recipes: Default to https git protocol where possible"), > The recommendation from server maintainers is that the https protocol > is both faster and more reliable than the dedicated git protocol at this point. > Switch to it where possible. Signed-off-by: Yoann Congal --- meta/lib/oeqa/buildtools-docs/cases/build.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/meta/lib/oeqa/buildtools-docs/cases/build.py b/meta/lib/oeqa/buildtools-docs/cases/build.py index 6e3ee94292b..9f963f18f8d 100644 --- a/meta/lib/oeqa/buildtools-docs/cases/build.py +++ b/meta/lib/oeqa/buildtools-docs/cases/build.py @@ -15,5 +15,5 @@ class BuildTests(OESDKTestCase): """ def test_docs_build(self): with tempfile.TemporaryDirectory(prefix='docs-tarball-build-', dir=self.tc.sdk_dir) as testdir: - self._run('git clone git://git.yoctoproject.org/yocto-docs %s' % testdir) + self._run('git clone https://git.yoctoproject.org/yocto-docs %s' % testdir) self._run('cd %s/documentation && make html' % testdir) From patchwork Thu Apr 16 22:30:26 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86359 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id F048DF8E48B for ; Thu, 16 Apr 2026 22:33:37 +0000 (UTC) Received: from mail-wm1-f65.google.com (mail-wm1-f65.google.com [209.85.128.65]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.28283.1776378808934427987 for ; Thu, 16 Apr 2026 15:33:29 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=Osx22Fqb; spf=pass (domain: smile.fr, ip: 209.85.128.65, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f65.google.com with SMTP id 5b1f17b1804b1-48896199cbaso496855e9.1 for ; Thu, 16 Apr 2026 15:33:28 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378807; x=1776983607; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=MQ1nnPZD4T81cHP4CPJAEtZLqfKwRd1IwiROmD+jMLs=; b=Osx22FqbLa+n3jlCwfeg654z0fnm4U2wRQAzypNI4oRKIkgtYLkM6Z5p36PmUrfHwO UlB2vASrtFsyiw5LE1nrKonp07nZ1oTSlskH2U+6dYjmYzQHe5M1YVusnX4AhV/q4T0q joyx/nWqY56y/YJbNzvBkwl2EWcDIrE4eyOEc= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378807; x=1776983607; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=MQ1nnPZD4T81cHP4CPJAEtZLqfKwRd1IwiROmD+jMLs=; b=sfyRBU8suwb+FCWwnLpFl/yTbFAdu5dccb/LsJ9c1wnNFy96jl7D+MMNHZe3cAPKXb JeZbcyc0jr2QMx695gvbwqUnidWNlfP7yBz0aopTRjY4AZi9ZYzFyvp79dS0QymJvwwE 8e2hElZKU6y2QCW1jLzpI9rc1B/ZZlA9rCDgwXzObQeuIbrwTz0YUaDewvk9Ff6B8qoc DKAYoatrD/uj1ox1qSUE2kE37z5DpTfcIlBFjf9seEcnxLI0IRfiVqpUBjWtenLL5nsS 4DV6M/yFCSHQJOfGf0aQiHTkZN3NIH1M42PUpeW1tg2CggSqwmxoahOn11ycXvlUEGT2 KJZw== X-Gm-Message-State: AOJu0Yw2KfkBvn1a9nyM44cPcw41e2O8Xcw5GGRmHL0NjBBvJXRCAFsV vGLuvPzhSYj0siQDpBQH8CvgNlMtTPq4QDAYhoggwUPExRozaBLxV3yt6KkexAfh0Ch87US8ilE y99bku87Iz4Ad X-Gm-Gg: AeBDieshtJYjcJsqewStbCvB9w4MMHnoo5aCX4bBQW7P3g70Szwe0uSCt7bsxvD+zXk P+p0qdoqJVfjLanE4l8UQowrj2SDdTrIrDxyhm2zn6szpxBg98/UIUubFAcv8pFpau/ivTE37AD 0zDex3ZOQN1gfpFPNrajmKGqirE9lYwvf1IPDREUS++ogYMnNToMVrB8CwaMI7ctph0nN806qMS 5cCQw9biZi+rkwmqSCSl6RVT/MYyFxsBWcL92UNitXKZYQbEmKRv0ZMTTCrce6PQKOmz9UMRfSP V5y1mdEO21ShKJnxRqXIaiu+Ym/rZCByUNkixt3d0cQdCetqi1vVQ0A8yRcW2PTcxR7KxRZ5Vcx 6FkWZuwmvsUTp52v+vG0z2sXC9FvWSCIoZt1RUBLD0jZJrXXbrLRcbNz4Xg8KWTb2T1KLGZBnsk E5BVeNZyy1kQb3HHIVR2qno7z5XI/XYP07XUm69G1chyDW4cNKhVTi3YtAAsTk+fU3z2B2itvyz ziGWmZlj8U++l2+FIBi/U9f+o2G8ivpMs/lwQ== X-Received: by 2002:a05:600c:8b68:b0:488:7f69:4abf with SMTP id 5b1f17b1804b1-488fb75405fmr5988975e9.12.1776378807027; Thu, 16 Apr 2026 15:33:27 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.26 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:26 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 43/51] scripts: Default to https git protocol for YP/OE repos Date: Fri, 17 Apr 2026 00:30:26 +0200 Message-ID: <95cf84a4ea77c4a8af2cf814857f50c8a3508c1e.1776377993.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:37 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235472 From: Yoann Congal Following up on commit 139102a73d41 ("recipes: Default to https git protocol where possible"), > The recommendation from server maintainers is that the https protocol > is both faster and more reliable than the dedicated git protocol at this point. > Switch to it where possible. Signed-off-by: Yoann Congal --- scripts/combo-layer.conf.example | 4 ++-- scripts/contrib/patchtest.sh | 4 ++-- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/scripts/combo-layer.conf.example b/scripts/combo-layer.conf.example index 90e2b58723b..4ae3db45ab1 100644 --- a/scripts/combo-layer.conf.example +++ b/scripts/combo-layer.conf.example @@ -14,7 +14,7 @@ signoff = False # mandatory options # git upstream uri -src_uri = git://git.openembedded.org/bitbake +src_uri = https://git.openembedded.org/bitbake # the directory to clone the component repo local_repo_dir = /home/kyu3/src/test/bitbake @@ -76,7 +76,7 @@ last_revision = # that matches the original commit. [oe-core] -src_uri = git://git.openembedded.org/openembedded-core +src_uri = https://git.openembedded.org/openembedded-core local_repo_dir = /home/kyu3/src/test/oecore dest_dir = . last_revision = diff --git a/scripts/contrib/patchtest.sh b/scripts/contrib/patchtest.sh index b1e1ea334b9..550b6a88f3c 100755 --- a/scripts/contrib/patchtest.sh +++ b/scripts/contrib/patchtest.sh @@ -75,8 +75,8 @@ source $PTENV/bin/activate cd $PTENV # clone or pull -clone git://git.yoctoproject.org/patchtest $PT -clone git://git.yoctoproject.org/patchtest-oe $PTOE +clone https://git.yoctoproject.org/patchtest $PT +clone https://git.yoctoproject.org/patchtest-oe $PTOE # install requirements pip install -r $PT/requirements.txt --quiet From patchwork Thu Apr 16 22:30:27 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86360 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 17EFEF8E48F for ; Thu, 16 Apr 2026 22:33:38 +0000 (UTC) Received: from mail-wm1-f68.google.com (mail-wm1-f68.google.com [209.85.128.68]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.28587.1776378809414199636 for ; Thu, 16 Apr 2026 15:33:29 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=IDVQ5KQQ; spf=pass (domain: smile.fr, ip: 209.85.128.68, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f68.google.com with SMTP id 5b1f17b1804b1-488afb0427eso615575e9.1 for ; Thu, 16 Apr 2026 15:33:29 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378807; x=1776983607; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=h9Nnrvx4/eK/kurTiCBxu/SuYuMbkiFrB430vDHwplU=; b=IDVQ5KQQbrDKhkEqOLSLteEE0vWUJb3450YWQL7mFK7nrHZluCn54KJIbVE/oeXEKY u/HMsLicmHRdeslkViupxgFUYbiXlPo3h69cHbBJ+afRI+dtO3rzI168YwJK+b00gP3J Mfr3vTpLejHccxa3hqGPwHbEpplMPxbbieotE= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378807; x=1776983607; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=h9Nnrvx4/eK/kurTiCBxu/SuYuMbkiFrB430vDHwplU=; b=ptirEmNXC9maP06pFElSUA91G3VAu8HGDDqGAiGQp90udsPmUFZkh7yYORgTcegdpI lWSsbPlkwgx0njcCSmiHETLyZy1FGuZeOPp9kbxgYSFIPB+ic2qR9YTLCj6bIG29rkJv mjw+1D4fH3gccG0Zwh784+8SKSwS6yRUw+PsEluU01BpF9s08SmAF6+tXYEsjQTLsgbF W4/erUyHpaZJl7gTLuYmrbgAtylgVOOCYjCA/QK8Ydzgcb5zexv6pnSoY2XKajitsn8v tC7D5m7Hk3oDyUZvxgQYzYbr9b/UT+7ijUJIGZuN/IGv9Dz4pTZZPsCG3Zibuvn8/1uq P0FA== X-Gm-Message-State: AOJu0YyanLHXySLsA0RhQPWlBRE5CkGGwZLCDQuVlB02zHFtwvZqUdgE Ijx/lvlefZHe1TKQ2mFEvLd//E7tpqovrz0OCrasKAGqQD4pi8fJX6AIjsNmR3vnhePwH0sWswd S39mfmJx5Y+1u X-Gm-Gg: AeBDievORmLMs7L8ZfN51I16aw9eAteK1Q6Np5NCWE6Zu1Vgw9QPoirScVWkm9LO/e4 jsQoqS+p7ieg2U3hvZ/ZMO6B2TweZbqpeY0JzznOrZ06YqONoxJn7ukOTcBWwPJ+vo9meNxHxtR STLBvCdiKVT8QvPhnOhYTKTxylp0MO0gk/A6CYY96WKK7itrHh69GagFdTBvbHYDrvFv0qERlKW S5b9ZiPipLGYtZXwdvPpxrVlL4nS54uNgkk6EjQTey0Ly+2J8Ixwp6YYRzp4F3+d0wQjTHUIKbd sxs0Tu4s0/wlrkLHc4RKjPbBrhuXqiJ31Ke7t2H4rWNormq7XlOEiKh3Ul0pJ7WY+PgNR/LTzXM CTtVn+w8n6TpwF8Khk81O6mkMGUIw2aEm8KUiRwkSbPmiyqSd/pAnYdkC2K4R7luN3skXES0BFz mhfy1sPUjC0EbvADiBavOMX9TiPUYF/My0WtuP/IdMkRVBq90Xhontwvjjfw94jazK9kRr2Mchx AgjjhthjJMhANx+wd3mdQpPWcPb7D8AI6qimQ== X-Received: by 2002:a05:600d:e:b0:488:7ff5:2c67 with SMTP id 5b1f17b1804b1-488fb757d23mr5161585e9.12.1776378807536; Thu, 16 Apr 2026 15:33:27 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.27 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:27 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 44/51] oeqa/selftest/git-submodule-test: Default to https git protocol for YP/OE repos Date: Fri, 17 Apr 2026 00:30:27 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:38 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235473 From: Yoann Congal Following up on commit 139102a73d41 ("recipes: Default to https git protocol where possible"), > The recommendation from server maintainers is that the https protocol > is both faster and more reliable than the dedicated git protocol at this point. > Switch to it where possible. Use ";protocol=https" for the parent git submodule and, also, update the SRCREV to point to a commit where submodules are reference through a https:// URL instead of a git:// one. Update the expected output of the archiver test. Signed-off-by: Yoann Congal --- .../recipes-test/git-submodule-test/git-submodule-test.bb | 4 ++-- meta/lib/oeqa/selftest/cases/archiver.py | 4 ++-- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/meta-selftest/recipes-test/git-submodule-test/git-submodule-test.bb b/meta-selftest/recipes-test/git-submodule-test/git-submodule-test.bb index 1c0886dcbe2..09f6b2e4a7e 100644 --- a/meta-selftest/recipes-test/git-submodule-test/git-submodule-test.bb +++ b/meta-selftest/recipes-test/git-submodule-test/git-submodule-test.bb @@ -7,8 +7,8 @@ INHIBIT_DEFAULT_DEPS = "1" UPSTREAM_VERSION_UNKNOWN = "1" -SRC_URI = "gitsm://git.yoctoproject.org/git-submodule-test;branch=master" -SRCREV = "a2885dd7d25380d23627e7544b7bbb55014b16ee" +SRC_URI = "gitsm://git.yoctoproject.org/git-submodule-test;branch=master;protocol=https" +SRCREV = "f280847494763cdcf71197557a81ba7d8a6bce42" do_test_git_as_user() { cd ${S} diff --git a/meta/lib/oeqa/selftest/cases/archiver.py b/meta/lib/oeqa/selftest/cases/archiver.py index 612ec675a78..82b0293338a 100644 --- a/meta/lib/oeqa/selftest/cases/archiver.py +++ b/meta/lib/oeqa/selftest/cases/archiver.py @@ -335,8 +335,8 @@ class Archiver(OESelftestTestCase): bb_vars = get_bb_vars(['DEPLOY_DIR_SRC']) for target_file_name in [ - 'gitsmshallow_git.yoctoproject.org.git-submodule-test_a2885dd-1_master.tar.gz', - 'gitsmshallow_git.yoctoproject.org.bitbake-gitsm-test1_bare_120f4c7-1.tar.gz', + 'gitsmshallow_git.yoctoproject.org.git-submodule-test_f280847-1_master.tar.gz', + 'gitsmshallow_git.yoctoproject.org.bitbake-gitsm-test1_bare_79a0efa-1.tar.gz', 'gitsmshallow_git.yoctoproject.org.bitbake-gitsm-test2_bare_f66699e-1.tar.gz', 'gitsmshallow_git.openembedded.org.bitbake_bare_52a144a-1.tar.gz', 'gitsmshallow_git.openembedded.org.bitbake_bare_c39b997-1.tar.gz' From patchwork Thu Apr 16 22:30:28 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86356 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 2E19AF8E491 for ; Thu, 16 Apr 2026 22:33:38 +0000 (UTC) Received: from mail-wm1-f67.google.com (mail-wm1-f67.google.com [209.85.128.67]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.28588.1776378810044871090 for ; Thu, 16 Apr 2026 15:33:30 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=N2wGR/m2; spf=pass (domain: smile.fr, ip: 209.85.128.67, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f67.google.com with SMTP id 5b1f17b1804b1-488b00ed86fso431675e9.3 for ; Thu, 16 Apr 2026 15:33:29 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378808; x=1776983608; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=mDKd2bbbfFIyySKfofCK/Fc2GManWznOSa76B3168KU=; b=N2wGR/m24WcMRWEp0jxM42VXwzOGI5gigfX7/ojtp6hiuFz6+8z/98qH9p+VdS+xtq 12dT6IAzbnhubZTHZM/kYMxLdKSHmtei9e1QIbJ0b/euERAkUUqCDIFCBjNiDQXsyE59 eGmJRpAKuZ+Y0aFlo7xh0xK1QvAy5fHrFCJwQ= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378808; x=1776983608; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=mDKd2bbbfFIyySKfofCK/Fc2GManWznOSa76B3168KU=; b=MLNbt0RaToRgoKElwqE/UJcfj2VTKSYwLLE1Hwhx9/bvfFqbtthQZ8AU+vEsXVHMIb +ZJtD0XKykWSoWHdTLA91n4HmThTLuS62yitnZO1ocGUop2vrO64GJ/Ej2yg3UqzxUgy RPPJd6oVCZjgVACuFKrrh72lvVsxMyAxG02M7hAJWFXQL9Dyln8V+yKNOAM9MWZqWmO2 d5yd4su8UhuXK0BHgtHmfX/VfFmy6kOrrI56gJ+JJEBiHtyX9QN1vxKMCjeZxO1WxI9U HjwY7NADMj0NUEziOaO5ezwa19jVFRyrkGNeRUN75iITe6eUHJlVjHT+QMA8Mwl8CKnG ljbA== X-Gm-Message-State: AOJu0Yw3F39AI6uTdd1JG3rWidX22RrnQwbYkIUBp/frA8DCEpWkvfOG AgRe38CuXUh91QfQ3E8f9uc8xaMZIi4VRnqLgtoyJ/LoQqTGP8H1b62/fX6/0hNZ/rpDVS09VB3 1fENUe9PIj9qU X-Gm-Gg: AeBDievt7wff1IUVHnV16rLFoKEY/lgHqarf7UhWVKdEWwe4i9FI8WYqGduf9hmzXbL y3B/YVLvJB0Aokq87qYcPPP8iSIJf5VrLiHQ0UTrPiJqaPToSbBjFuS+NZrt3NwGHVAbgDWxOGU Y8SzLCphRE4F2FFgqZufKcUJ4hpFdWIwWGsQfM8osZgzhhCsSlBHz1nlY8O41G4PafuSIP7C4QZ zALyKR5qgZ/XCerLtkBpVok0/53gxoZDk3AYKz2bd/xWl2YGA3mFWdx7NcR3VNTgud1Gih7jNPi zSpF/LIFPTbkqTFd9mauIxAOutG2CCTZlY89G9qm6RFCn3H+GnSf8L5cQ7wNuZ2RqTrMom2vwNi WRk9cUiSBXzVTkxIKTi9RnjZVQ502UeuIbo6C5eEe3+he0ZbKTJcKk96VWVER8LLpNu5tkg78M7 lWqoesPRNKVA997QBAO0/5L+ClkzGKno5GlBwvcHVDdCp9CZRLTVq/jBKue1fQBqwy8/FaRnLyr NVwr1XX5h9WI+OLJQmwiiHgAwjnKoGQ4iXbxzDxsGNE0Qrc X-Received: by 2002:a05:600d:8449:b0:488:869c:edaa with SMTP id 5b1f17b1804b1-488fb74e103mr4294745e9.7.1776378807979; Thu, 16 Apr 2026 15:33:27 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.27 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:27 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 45/51] meta/files/layers.example.json: switch to https clone URIs Date: Fri, 17 Apr 2026 00:30:28 +0200 Message-ID: <70cb257f3f81da851157b209731fada79cd476e2.1776377993.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:38 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235474 From: Yoann Congal Following up on commit 139102a73d41 ("recipes: Default to https git protocol where possible"), > The recommendation from server maintainers is that the https protocol > is both faster and more reliable than the dedicated git protocol at this point. > Switch to it where possible. Signed-off-by: Yoann Congal --- meta/files/layers.example.json | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/meta/files/layers.example.json b/meta/files/layers.example.json index f3b65220831..8ea1f225e8f 100644 --- a/meta/files/layers.example.json +++ b/meta/files/layers.example.json @@ -20,7 +20,7 @@ "describe": "15.0-hardknott-3.3-310-g0a96edae", "remotes": { "origin": { - "uri": "git://git.yoctoproject.org/meta-intel" + "uri": "https://git.yoctoproject.org/meta-intel" } }, "rev": "0a96edae609a3f48befac36af82cf1eed6786b4a" @@ -32,7 +32,7 @@ "describe": "4.1_M1-374-g9dda719b2a", "remotes": { "origin": { - "uri": "git://git.yoctoproject.org/poky" + "uri": "https://git.yoctoproject.org/poky" }, "poky-contrib": { "uri": "ssh://git@push.yoctoproject.org/poky-contrib" From patchwork Thu Apr 16 22:30:29 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86354 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 39EE4F8E493 for ; Thu, 16 Apr 2026 22:33:38 +0000 (UTC) Received: from mail-wm1-f68.google.com (mail-wm1-f68.google.com [209.85.128.68]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.28589.1776378810551750138 for ; Thu, 16 Apr 2026 15:33:30 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=1Za3GPdo; spf=pass (domain: smile.fr, ip: 209.85.128.68, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f68.google.com with SMTP id 5b1f17b1804b1-4852b81c73aso367835e9.3 for ; Thu, 16 Apr 2026 15:33:30 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378809; x=1776983609; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=wvestLG+2fVfR2dHIKIgfyF55VeM3T3KshMVwHxPZoI=; b=1Za3GPdodow9lW7tzNsj694UXsOHxl5F4GC7CSNtrcHafPncOyCaoBOeVy5gdhSE+D 8U9M3HN3+b7wccGqIgc80Grb0Bst8ss5YmOEt0GrnQzioU+alRNnbrbK3u2DYbufGOp5 r6houjBuVVLefiQC09a/0JGOyba4ECoR8rnnY= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378809; x=1776983609; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=wvestLG+2fVfR2dHIKIgfyF55VeM3T3KshMVwHxPZoI=; b=Mm4MC3UegruBM5tvUwhTk3/EtzI1T58rewusEmUsrB0E8FUG32NcMLiNwuvP701sP6 0P8kF0Ls79UJ8wXTZj/3gp4EdsPekYfdELqH66akXlSGT8pnqwiFvQr4IQflCKTec9XJ COEQve4LFC7MxY/Uv5denS+Oyl/S2ZOPWnuSFmuF0M8CSVQV9PVUXpGN1DkI7pzwYgmX ShDAjSux4AcJ5nqjWRTLlk/SOB1hopD5vIAURhkl9wUGsrxFy5ZNtZXUNFnO32gdApWa eZ7l7n0wUeReZ8Z/PS7614Dh3lEEEbv5082TuWCeSDUMTIxA8sboa19nGn68DtMrbrLP Yqpw== X-Gm-Message-State: AOJu0YxnJQrOJAacllFXTE1OCmd+q7s4pWD9eXN4uBXaPTqydct9A7vC hq3yjMRDgwuZrA+KmigPWeNLtauTh03gGISsps1c6JEHes6T0tQkFVksbqqWiTfIIKCsBZsXbxO QfGBv4fr/uz2k X-Gm-Gg: AeBDieu1qZderR2N6rjfzyuELccqAZD/Kbgza2krny614SXeR3u7Bm27tfhq+8VcLvM dGJBsxyAC1zbbUHy/1+0VNw0IjIUkqH+GMf13q4lKbsV8u2rMlDcRMHFH7UfW+2r6kd7z/0CdAB APb5AGq7imIDonxX/bl8aul4uwK/0joJ2eZqVY7CYBMrwjm8iesQZUM+bNzVZUy5gHUwXvI44xO wyG2EI5nEc0YwpMKU4zNqw6EGU7T4iacUQH67XUbfWM8j4jIu2IUgp50HfZ2S9PsOBaCdLNyR2F FrAl+yBFLqlfb77W84jIF0HMDOoHdP0Zr0EU2Vu0BJpwnCkrSa0lq2cXhQX6LV3QsSvEw9C698U oA0yehq6b7BMlAgjQZf5MH2q7q7GdNtGO96KPJ1orNe2Sa5rp+D0NtOeM4uaCNKNWICXH6UZize 2p4RGYXK8ZEmylS9jkuGDuVD9AGImjxEbCdVPeIiushlJyIpUxcgTgRD+yQcRGcZDm9U9uutAYb 9dNNZsdQ56V7H/34afM9gQ4568emOyS+7B4/g== X-Received: by 2002:a05:600c:1993:b0:485:3dfc:569 with SMTP id 5b1f17b1804b1-488fb768e62mr5461695e9.16.1776378808644; Thu, 16 Apr 2026 15:33:28 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.28 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:28 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 46/51] build-appliance-image: switch SRC_URI to https protocol Date: Fri, 17 Apr 2026 00:30:29 +0200 Message-ID: <148737aa32d34aee65428db552f63d7842215a6f.1776377993.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:38 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235475 From: Yoann Congal Following up on commit 139102a73d41 ("recipes: Default to https git protocol where possible"), > The recommendation from server maintainers is that the https protocol > is both faster and more reliable than the dedicated git protocol at this point. > Switch to it where possible. Signed-off-by: Yoann Congal --- meta/recipes-core/images/build-appliance-image_15.0.0.bb | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/meta/recipes-core/images/build-appliance-image_15.0.0.bb b/meta/recipes-core/images/build-appliance-image_15.0.0.bb index dd6b5081c10..b40ebf51d02 100644 --- a/meta/recipes-core/images/build-appliance-image_15.0.0.bb +++ b/meta/recipes-core/images/build-appliance-image_15.0.0.bb @@ -31,9 +31,9 @@ SRCREV_oe-core ?= "05d149ee0905cbce655a9e0c3767e8fdfcbb8997" SRCREV_yocto ?= "9b98ec5e6cfb6c9dc74d3c2e6304eeb274f7c487" SRCREV_FORMAT = "bitbake_oe-core_yocto" -SRC_URI = "git://git.openembedded.org/bitbake;name=bitbake;branch=2.16;destsuffix=bitbake \ - git://git.openembedded.org/openembedded-core;name=oe-core;branch=whinlatter;destsuffix=openembedded-core \ - git://git.yoctoproject.org/meta-yocto;name=yocto;branch=whinlatter;destsuffix=meta-yocto \ +SRC_URI = "git://git.openembedded.org/bitbake;name=bitbake;branch=2.16;destsuffix=bitbake;protocol=https \ + git://git.openembedded.org/openembedded-core;name=oe-core;branch=whinlatter;destsuffix=openembedded-core;protocol=https \ + git://git.yoctoproject.org/meta-yocto;name=yocto;branch=whinlatter;destsuffix=meta-yocto;protocol=https \ file://Yocto_Build_Appliance.vmx \ file://Yocto_Build_Appliance.vmxf \ file://README_VirtualBox_Guest_Additions.txt \ From patchwork Thu Apr 16 22:30:30 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86357 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 48536F8E495 for ; Thu, 16 Apr 2026 22:33:38 +0000 (UTC) Received: from mail-wm1-f66.google.com (mail-wm1-f66.google.com [209.85.128.66]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.28285.1776378810999882085 for ; Thu, 16 Apr 2026 15:33:31 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=kUgA+t8h; spf=pass (domain: smile.fr, ip: 209.85.128.66, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f66.google.com with SMTP id 5b1f17b1804b1-488ba6366a7so567245e9.0 for ; Thu, 16 Apr 2026 15:33:30 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378809; x=1776983609; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=xAd0/5j1V5xgW4q/pId9w5+bSBm8u0tp0yA30KouV0A=; b=kUgA+t8h+ymfdy2nTIAsKM/7Y5rpho++ocy5YjxYVGNyPyZjl1RZ5O84hU2e46VE9c /AIIb8Zj+/IBPU/ORg3y5grCCXw4MlS5mG1KSJgxBYJL/PrM90OoRsbX1/fLjvl+eGYO UCYHDxUiVa3qlxFpUX2z4D8HyD2GbicqMMf2Y= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378809; x=1776983609; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=xAd0/5j1V5xgW4q/pId9w5+bSBm8u0tp0yA30KouV0A=; b=SKI5SfELDA8E3yHhIJiBCqXopFkOCMMkj5KxAcLLsRfT9Lfh8hqNaIRM8K98Qnef4c gqX1Iab81NdELL19+ifuC842F2w+NMXG0fLiDcHFp/Ud17RnbvmCUQqvwyPzShV51w05 OFa9NOd8Rc4G6FVv3ZePIjRKf1bsK2QTnVWDDbBeaN584SjK9DvJZ8LRoJ/PvBATrSSa +c9CYl/oJJCnNtIyWgf5/Ibg24mZtGgirtQM8Jt5bqr5eceJ6/QSmuPxOlI4URC12Lnj d/5mhP5QY+ozdabes4YJgPiaNf4j2bCV+2jpr56iJUs0BC4XHRaAi9I3QlcK0JYxTNGa CvCw== X-Gm-Message-State: AOJu0YzqoBfp/vq2Vl2itj7xd8Dqx30NGPaVeTeKwgNz8v5qCKNSQm1/ vmswsLON1omahfXvfn3ygBnLm1bEgXvItCBIkB5baeQPFNnaLwYt6VCb8wEYYdbewWJ17pe3ioy E0E4le35Xvoko X-Gm-Gg: AeBDiettqTr9gGWYeajmUaxin2D6l9GWn8Ra6ibD52FWcLB7qz5ael8VFVTAUQL1vjh p+w4NRaAIml7QZ8ZznPBlsVqie/sfNlNm+7LnHcVrexdBqHF68Vcg+YXaEK5f3yBZvyoJmPs9ja oSbdRw1Dw2Z2lgzULBsyFUDTn16ac8EWFkRtt4YVJ8274CSRDwtoDPXERy8dYlu50ngcAUXmoMV f4rTgMy+1Anku6N61KlFzJ6w4oJBakdfCaimEK5Tba3x6yzFt35xlrvDxHTd6bKTghVqvoVnVMt skFlZDO5NsLZe2peREkrXN5XRQJfuu5EZTJ20NLhpezyKCCmBD2/3TVqnUus1SaDynidsTDHtfL jAdJv60RdEGWgRkPBDMVl2izepLQHE1e/zuPAG7uRKvlMgc3KPh3xVDpfzQhlW2nz5RyhXcHiIf j4m077zUJxWuPXoOil+qngjYafQm+AaLpbn56SGEcqpxeaSVvucMUiPeiYiWAYAqqcLVcz44Q+H sexJkVkEl0Yeth+Glf4FMVDDbxUselAgSbaTQ== X-Received: by 2002:a05:600c:8183:b0:488:ab26:8fe0 with SMTP id 5b1f17b1804b1-488fb765b1dmr5036075e9.15.1776378809189; Thu, 16 Apr 2026 15:33:29 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.28 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:28 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 47/51] scripts/install-buildtools: Update to 5.3.3 Date: Fri, 17 Apr 2026 00:30:30 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:38 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235476 From: Yoann Congal Update to the 5.3.3 release of the 5.3 series for buildtools Signed-off-by: Yoann Congal --- scripts/install-buildtools | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/scripts/install-buildtools b/scripts/install-buildtools index b9c008a2ecd..7807bde910a 100755 --- a/scripts/install-buildtools +++ b/scripts/install-buildtools @@ -57,8 +57,8 @@ logger = scriptutils.logger_create(PROGNAME, stream=sys.stdout) DEFAULT_INSTALL_DIR = os.path.join(os.path.split(scripts_path)[0],'buildtools') DEFAULT_BASE_URL = 'https://downloads.yoctoproject.org/releases/yocto' -DEFAULT_RELEASE = 'yocto-5.3.2' -DEFAULT_INSTALLER_VERSION = '5.3.2' +DEFAULT_RELEASE = 'yocto-5.3.3' +DEFAULT_INSTALLER_VERSION = '5.3.3' DEFAULT_BUILDDATE = '202110XX' # Python version sanity check From patchwork Thu Apr 16 22:30:31 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86362 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 9B963F8E49B for ; Thu, 16 Apr 2026 22:33:38 +0000 (UTC) Received: from mail-wm1-f68.google.com (mail-wm1-f68.google.com [209.85.128.68]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.28290.1776378813972747963 for ; Thu, 16 Apr 2026 15:33:34 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=nuHrzi82; spf=pass (domain: smile.fr, ip: 209.85.128.68, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f68.google.com with SMTP id 5b1f17b1804b1-4887fd35e60so230325e9.2 for ; Thu, 16 Apr 2026 15:33:33 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378812; x=1776983612; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=/e15iNu/oA1NowLZSlazRA3wU+hHIByc+2q8MNosoLY=; b=nuHrzi82HErZoVomaOa1xquqVDnuPNxWX2pB4HM5eRP3w9N5GzBlkntHMIqHdzSrjZ buovr5z429bXpgdAnkY8P4qXGzE81+vi7HEaG30PrpO43unF+sVwqSX1qhup23G1YRKM 8l74jBe464RJCVDG0lz3RPLhld2QZWfbC7o+Q= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378812; x=1776983612; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=/e15iNu/oA1NowLZSlazRA3wU+hHIByc+2q8MNosoLY=; b=gPnvXZuFwLIvfIl6sMyU51RXTBSkgdR7LHyu3Nf/ME52CKQy5XIQiyx+QCVPE0rEhc N91yWCICU0FssvF/VK4UaLTuq3GEt+KI0tXG+YdLyFHiepItumdHgkqUiAx9LiAJGJcJ lVpDBk/ece4/yfuw4ihRTRS2dmVDdA1lk/ke5As44MPJ79cIzSRy//38+a+xijT7mE4o CsfLvo+qZa60QIwW3oy0DMG9Pq9dtxHEjacOqLgmSaaMwyF8Bc/r2HCuqd6P62j2A7Lj N06ub2GkgVLMnhshhxoe2tj2/St/nWR8uam7yMtXOF9gT5mWw7hugMuVWQEdFCjDdc8Y bTCg== X-Gm-Message-State: AOJu0YyQzGpX5q3Zni69elxKoQrPeO+xbzcXFcuuQkan//sep4FF326W HwbjaIQusv53o7yBb/TiSmCIdUcWTsKeBwMQgpLSalFHpYQKYba4FJ/A3ldaFT7CmWJxulDY1GG pF0BTnjSl5cg2 X-Gm-Gg: AeBDiesVE0F3WVJ3F+IxmGcNjH/39Cy1HMcgc7tM8DbtzMdz2GmuYCYHmFCv0YUkNOA WhL2r9ZPnZ0LhuVxN4bVbwPupQjYPlJR96NFEotesVo7CQXgw2e7HHdg13eY523tjRCcITBFNXA 5HI2JKeo+vVp+tVha/Lz2Uu4VvNK7nrRotOVlcwFiohxlUN3WswWZf2X0rXQf85ki8aIkjgCnFd RWGtkqBs+nAsIYfqsO/Xk66K9tBKJGIL/FkHoCzrfn/V81NMtMDmO7FoJ+nX+hpagXJXqFaGnLQ Gk1tmE3kNuTSTh6t+zBJa4xxfSYXEMbOIpaT8idcofpCXI6IT2UaZ8gVsX7qLdWMxkQZhM2aw4J 8mEMF3HY7i8uz6+rjUCbV+TimOMf8uSuYAAuOqjxAXZjSI96Z7AVhzrh2/PaWI7cLwjmPSTX3PA UKDdQuCA2paw3p7QyY4dAvT/pj7+qga8pZMJ59MuccWfFhqgsT0MLVLSoDFk7Ujnip7Jan2Fhqv zwlgK/VFXHz0nqfcxV+wLIgmy2DRzpcDcfRmA== X-Received: by 2002:a05:600c:1389:b0:485:9a50:338d with SMTP id 5b1f17b1804b1-488fb739d3amr5669975e9.3.1776378810377; Thu, 16 Apr 2026 15:33:30 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.29 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:29 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 48/51] binutils: Upgrade to 2.45.1 release Date: Fri, 17 Apr 2026 00:30:31 +0200 Message-ID: <315e7bac640bb6cafb287ea39a3e4405aadba8c2.1776377993.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:38 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235480 From: Hemanth Kumar M D Brings binutils 2.45.1 release and followed by latest commits from 2.45 branch: 12d0a1dbc1b i386: Add GLIBC_ABI_GNU_TLS dependency only if used e3a18893e1c LoongArch: Use more appropriate assertions for the relocation of TLS LE b136efd10a7 Re: dlltool memory leaks b4bde11f310 ld: Don't use -mdirect-extern-access for LoongArch a813a6a6ea0 Re-enable development on the 2.45 branch 48324fde1e2 (tag: binutils-2_45_1) This is the 2.45.1 release ab776bc8685 lto: Set plugin_format to bfd_plugin_no only if known_used is set cec7ab85f24 aarch64: gas: Allow movprfx with fmmla and bfscale [PR gas/33562] 0b040187894 aarch64, gas: Relax Armv9.6-A mandatory feature set 4df2be75910 i386: Add GLIBC_ABI_GNU_TLS version dependency 71c1de4b0c8 x86-64: Add GLIBC_ABI_DT_X86_64_PLT version dependency b0fe5c23780 x86: Add GLIBC_ABI_GNU2_TLS version dependency d5945a221ff x86: Copy non_got_ref_without_indirect_extern_access Testing Results: +-------------------------------+--------+--------+------+ | Metric | Before | After | Diff | +-------------------------------+--------+--------+------+ | Expected passes | 317 | 317 | 0 | | Unexpected failures | 1 | 1 | 0 | | Untested testcases | 5 | 5 | 0 | | Unsupported tests | 8 | 8 | 0 | +-------------------------------+--------+--------+------+ ld/configure is regenerated. Signed-off-by: Hemanth Kumar M D Signed-off-by: Yoann Congal --- .../binutils/binutils-2.45.inc | 6 +- ...-system-directories-when-cross-linki.patch | 38 +- .../binutils/0008-Use-libtool-2.4.patch | 1827 ++++++++--------- 3 files changed, 836 insertions(+), 1035 deletions(-) diff --git a/meta/recipes-devtools/binutils/binutils-2.45.inc b/meta/recipes-devtools/binutils/binutils-2.45.inc index 81d46bfb734..6001f2b1cb5 100644 --- a/meta/recipes-devtools/binutils/binutils-2.45.inc +++ b/meta/recipes-devtools/binutils/binutils-2.45.inc @@ -12,8 +12,8 @@ LIC_FILES_CHKSUM = "\ # When upgrading to next major release, ensure that there is no trailing .0, so # that upstream version check can work correctly. -PV = "2.45" -CVE_VERSION = "2.45" +PV = "2.45.1+git" +CVE_VERSION = "2.45.1" SRCBRANCH ?= "binutils-2_45-branch" UPSTREAM_CHECK_GITTAGREGEX = "binutils-(?P\d+_(\d_?)*)" @@ -23,7 +23,7 @@ CVE_STATUS[CVE-2025-7546] = "cpe-stable-backport: fix available in used git hash CVE_STATUS[CVE-2025-69650] = "disputed: observed behavior only in pre-release code, does not affect any tagged version" CVE_STATUS[CVE-2025-69651] = "disputed: observed behavior only in pre-release code, does not affect any tagged version" -SRCREV ?= "2f028c6bb163a045db95439fb92e1dcbc919413c" +SRCREV ?= "12d0a1dbc1b9ecc3a3ae7361bccb70ab32c16cf1" BINUTILS_GIT_URI ?= "git://sourceware.org/git/binutils-gdb.git;branch=${SRCBRANCH};protocol=https" SRC_URI = "\ ${BINUTILS_GIT_URI} \ diff --git a/meta/recipes-devtools/binutils/binutils/0006-warn-for-uses-of-system-directories-when-cross-linki.patch b/meta/recipes-devtools/binutils/binutils/0006-warn-for-uses-of-system-directories-when-cross-linki.patch index 86ff7fdaa02..42374cbd313 100644 --- a/meta/recipes-devtools/binutils/binutils/0006-warn-for-uses-of-system-directories-when-cross-linki.patch +++ b/meta/recipes-devtools/binutils/binutils/0006-warn-for-uses-of-system-directories-when-cross-linki.patch @@ -63,10 +63,10 @@ Signed-off-by: Khem Raj 9 files changed, 89 insertions(+), 4 deletions(-) diff --git a/ld/config.in b/ld/config.in -index 37812241bd9..be89571196c 100644 +index 790efd336be..2b237bcda5e 100644 --- a/ld/config.in +++ b/ld/config.in -@@ -78,6 +78,9 @@ +@@ -86,6 +86,9 @@ language is requested. */ #undef ENABLE_NLS @@ -77,7 +77,7 @@ index 37812241bd9..be89571196c 100644 #undef EXTRA_SHLIB_EXTENSION diff --git a/ld/configure b/ld/configure -index 4afc58566fc..ca3d58ff618 100755 +index cd410bd64d1..d3c0762133c 100755 --- a/ld/configure +++ b/ld/configure @@ -841,6 +841,7 @@ enable_checking @@ -88,7 +88,7 @@ index 4afc58566fc..ca3d58ff618 100755 enable_gold enable_got enable_compressed_debug_sections -@@ -1533,6 +1534,8 @@ Optional Features: +@@ -1535,6 +1536,8 @@ Optional Features: --disable-largefile omit support for large files --enable-checking enable run-time checks --enable-targets alternative target configurations @@ -97,25 +97,25 @@ index 4afc58566fc..ca3d58ff618 100755 --enable-gold[=ARG] build gold [ARG={default,yes,no}] --enable-got= GOT handling scheme (target, single, negative, multigot) -@@ -11514,7 +11517,7 @@ else +@@ -11519,7 +11522,7 @@ else lt_dlunknown=0; lt_dlno_uscore=1; lt_dlneed_uscore=2 lt_status=$lt_dlunknown cat > conftest.$ac_ext <<_LT_EOF --#line 11517 "configure" -+#line 11520 "configure" +-#line 11522 "configure" ++#line 11525 "configure" #include "confdefs.h" #if HAVE_DLFCN_H -@@ -11620,7 +11623,7 @@ else +@@ -11625,7 +11628,7 @@ else lt_dlunknown=0; lt_dlno_uscore=1; lt_dlneed_uscore=2 lt_status=$lt_dlunknown cat > conftest.$ac_ext <<_LT_EOF --#line 11623 "configure" -+#line 11626 "configure" +-#line 11628 "configure" ++#line 11631 "configure" #include "confdefs.h" #if HAVE_DLFCN_H -@@ -15367,6 +15370,19 @@ fi +@@ -15372,6 +15375,19 @@ fi @@ -136,7 +136,7 @@ index 4afc58566fc..ca3d58ff618 100755 if test "${enable_gold+set}" = set; then : enableval=$enable_gold; case "${enableval}" in diff --git a/ld/configure.ac b/ld/configure.ac -index 3ee84958b1c..99ea84513da 100644 +index f528ae42ef7..dcf1e17fae6 100644 --- a/ld/configure.ac +++ b/ld/configure.ac @@ -115,6 +115,16 @@ AC_SUBST(use_sysroot) @@ -176,10 +176,10 @@ index c8688153bd4..0b16caf347a 100644 enum endian_enum endian; diff --git a/ld/ld.texi b/ld/ld.texi -index 413335ad765..7bea7fd7e1f 100644 +index cf750d15259..3b3f1c53c37 100644 --- a/ld/ld.texi +++ b/ld/ld.texi -@@ -3350,6 +3350,18 @@ creation of the metadata note, if one had been enabled by an earlier +@@ -3378,6 +3378,18 @@ creation of the metadata note, if one had been enabled by an earlier occurrence of the --package-metadata option. If the linker has been built with libjansson, then the JSON string will be validated. @@ -227,7 +227,7 @@ index 75fd360d5e3..5a825c52bd3 100644 static void diff --git a/ld/ldlex.h b/ld/ldlex.h -index 815da76a4c0..53fabed4ba2 100644 +index c8d61478c60..c54eef8c170 100644 --- a/ld/ldlex.h +++ b/ld/ldlex.h @@ -151,6 +151,8 @@ enum option_values @@ -240,10 +240,10 @@ index 815da76a4c0..53fabed4ba2 100644 OPTION_PRINT_OUTPUT_FORMAT, OPTION_PRINT_SYSROOT, diff --git a/ld/ldmain.c b/ld/ldmain.c -index 7878bd3922f..c9293a3cf41 100644 +index 67c60c3f80d..175321a38cb 100644 --- a/ld/ldmain.c +++ b/ld/ldmain.c -@@ -672,6 +672,8 @@ main (int argc, char **argv) +@@ -671,6 +671,8 @@ main (int argc, char **argv) command_line.warn_mismatch = true; command_line.warn_search_mismatch = true; command_line.check_section_addresses = -1; @@ -252,7 +252,7 @@ index 7878bd3922f..c9293a3cf41 100644 /* We initialize DEMANGLING based on the environment variable COLLECT_NO_DEMANGLE. The gcc collect2 program will demangle the -@@ -1876,7 +1878,7 @@ undefined_symbol (struct bfd_link_info *info, +@@ -1875,7 +1877,7 @@ undefined_symbol (struct bfd_link_info *info, argv[1] = "undefined-symbol"; argv[2] = (char *) name; argv[3] = NULL; @@ -261,7 +261,7 @@ index 7878bd3922f..c9293a3cf41 100644 if (verbose) einfo (_("%P: About to run error handling script '%s' with arguments: '%s' '%s'\n"), argv[0], argv[1], argv[2]); -@@ -1897,7 +1899,7 @@ undefined_symbol (struct bfd_link_info *info, +@@ -1896,7 +1898,7 @@ undefined_symbol (struct bfd_link_info *info, carry on to issue the normal error message. */ } #endif /* SUPPORT_ERROR_HANDLING_SCRIPT */ diff --git a/meta/recipes-devtools/binutils/binutils/0008-Use-libtool-2.4.patch b/meta/recipes-devtools/binutils/binutils/0008-Use-libtool-2.4.patch index dd26bc61076..f84c33e2e38 100644 --- a/meta/recipes-devtools/binutils/binutils/0008-Use-libtool-2.4.patch +++ b/meta/recipes-devtools/binutils/binutils/0008-Use-libtool-2.4.patch @@ -45,8 +45,6 @@ Signed-off-by: Khem Raj zlib/configure | 1331 ++++++++---- 34 files changed, 15653 insertions(+), 5737 deletions(-) -diff --git a/bfd/Makefile.in b/bfd/Makefile.in -index 8a670ad1d05..ec2850a97c0 100644 --- a/bfd/Makefile.in +++ b/bfd/Makefile.in @@ -339,6 +339,7 @@ DATADIRNAME = @DATADIRNAME@ @@ -73,8 +71,6 @@ index 8a670ad1d05..ec2850a97c0 100644 ac_ct_CC = @ac_ct_CC@ ac_ct_DUMPBIN = @ac_ct_DUMPBIN@ all_backends = @all_backends@ -diff --git a/bfd/configure b/bfd/configure -index 86561b30ac4..c5a7ed1ed36 100755 --- a/bfd/configure +++ b/bfd/configure @@ -710,6 +710,9 @@ OTOOL @@ -124,7 +120,7 @@ index 86561b30ac4..c5a7ed1ed36 100755 test "X`print -r -- $ECHO 2>/dev/null`" = "X$ECHO"; then ECHO='print -r --' elif test "X`printf %s $ECHO 2>/dev/null`" = "X$ECHO"; then -@@ -5793,8 +5799,8 @@ $as_echo_n "checking whether the shell understands some XSI constructs... " >&6; +@@ -5793,8 +5799,8 @@ $as_echo_n "checking whether the shell u # Try some XSI features xsi_shell=no ( _lt_dummy="a/b/c" @@ -260,7 +256,7 @@ index 86561b30ac4..c5a7ed1ed36 100755 file_magic_cmd=$lt_cv_file_magic_cmd deplibs_check_method=$lt_cv_deplibs_check_method test -z "$deplibs_check_method" && deplibs_check_method=unknown -@@ -6201,6 +6302,157 @@ test -z "$deplibs_check_method" && deplibs_check_method=unknown +@@ -6201,6 +6302,157 @@ test -z "$deplibs_check_method" && depli @@ -479,7 +475,7 @@ index 86561b30ac4..c5a7ed1ed36 100755 if test "x$ac_ct_AR" = x; then AR="false" else -@@ -6302,25 +6564,20 @@ ac_tool_warned=yes ;; +@@ -6302,25 +6564,19 @@ ac_tool_warned=yes ;; esac AR=$ac_ct_AR fi @@ -511,11 +507,10 @@ index 86561b30ac4..c5a7ed1ed36 100755 + rm -f conftest.* +: ${AR=ar} +: ${AR_FLAGS=cru} -+ -@@ -6331,6 +6588,63 @@ test -z "$AR_FLAGS" && AR_FLAGS=cru +@@ -6332,6 +6588,64 @@ test -z "$AR_FLAGS" && AR_FLAGS=cru @@ -576,9 +571,10 @@ index 86561b30ac4..c5a7ed1ed36 100755 + + + - ++ if test -n "$ac_tool_prefix"; then # Extract the first word of "${ac_tool_prefix}strip", so it can be a program name with args. + set dummy ${ac_tool_prefix}strip; ac_word=$2 @@ -6671,8 +6985,8 @@ esac lt_cv_sys_global_symbol_to_cdecl="sed -n -e 's/^T .* \(.*\)$/extern int \1();/p' -e 's/^$symcode* .* \(.*\)$/extern char \1;/p'" @@ -626,7 +622,7 @@ index 86561b30ac4..c5a7ed1ed36 100755 const char *name; void *address; } -@@ -6786,8 +7113,8 @@ static const void *lt_preloaded_setup() { +@@ -6786,8 +7113,8 @@ static const void *lt_preloaded_setup() _LT_EOF # Now try linking the two files. mv conftest.$ac_objext conftstm.$ac_objext @@ -648,7 +644,7 @@ index 86561b30ac4..c5a7ed1ed36 100755 else echo "cannot find nm_test_func in $nlist" >&5 fi -@@ -6835,6 +7162,14 @@ else +@@ -6835,6 +7162,18 @@ else $as_echo "ok" >&6; } fi @@ -660,20 +656,17 @@ index 86561b30ac4..c5a7ed1ed36 100755 +fi + + ++ ++ ++ ++ -@@ -6853,6 +7188,47 @@ fi +@@ -6856,6 +7195,43 @@ fi -+ -+ -+ -+ -+ -+ -+ +{ $as_echo "$as_me:${as_lineno-$LINENO}: checking for sysroot" >&5 +$as_echo_n "checking for sysroot... " >&6; } + @@ -708,9 +701,12 @@ index 86561b30ac4..c5a7ed1ed36 100755 +$as_echo "${lt_sysroot:-no}" >&6; } + + - - - ++ ++ ++ + # Check whether --enable-libtool-lock was given. + if test "${enable_libtool_lock+set}" = set; then : + enableval=$enable_libtool_lock; @@ -7062,6 +7438,123 @@ esac need_locks="$enable_libtool_lock" @@ -853,7 +849,7 @@ index 86561b30ac4..c5a7ed1ed36 100755 if test "$GCC" = yes; then lt_prog_compiler_wl='-Wl,' -@@ -8345,6 +8838,12 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -8345,6 +8838,12 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='--shared' lt_prog_compiler_static='--static' ;; @@ -866,7 +862,7 @@ index 86561b30ac4..c5a7ed1ed36 100755 pgcc* | pgf77* | pgf90* | pgf95* | pgfortran*) # Portland Group compilers (*not* the Pentium gcc compiler, # which looks to be a dead project) -@@ -8407,7 +8906,7 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -8407,7 +8906,7 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='-KPIC' lt_prog_compiler_static='-Bstatic' case $cc_basename in @@ -1027,7 +1023,7 @@ index 86561b30ac4..c5a7ed1ed36 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" archive_expsym_cmds='$CC -o $output_objdir/$soname $libobjs $deplibs '"\${wl}$no_entry_flag"' $compiler_flags `if test "x${allow_undefined_flag}" != "x"; then func_echo_all "${wl}${allow_undefined_flag}"; else :; fi` '"\${wl}$exp_sym_flag:\$export_symbols $shared_flag" -@@ -9236,7 +9758,13 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9236,7 +9758,13 @@ if test -z "$aix_libpath"; then aix_libp else # Determine the default libpath from the value encoded in an # empty executable. @@ -1085,7 +1081,7 @@ index 86561b30ac4..c5a7ed1ed36 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" # Warning - without using the other run time loading flags, -@@ -9309,20 +9844,63 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9309,20 +9844,63 @@ if test -z "$aix_libpath"; then aix_libp # Microsoft Visual C++. # hardcode_libdir_flag_spec is actually meaningless, as there is # no search path for DLLs. @@ -1163,7 +1159,7 @@ index 86561b30ac4..c5a7ed1ed36 100755 ;; darwin* | rhapsody*) -@@ -9383,7 +9961,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9383,7 +9961,7 @@ if test -z "$aix_libpath"; then aix_libp # FreeBSD 3 and greater uses gcc -shared to do shared libraries. freebsd* | dragonfly*) @@ -1172,7 +1168,7 @@ index 86561b30ac4..c5a7ed1ed36 100755 hardcode_libdir_flag_spec='-R$libdir' hardcode_direct=yes hardcode_shlibpath_var=no -@@ -9391,7 +9969,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9391,7 +9969,7 @@ if test -z "$aix_libpath"; then aix_libp hpux9*) if test "$GCC" = yes; then @@ -1181,7 +1177,7 @@ index 86561b30ac4..c5a7ed1ed36 100755 else archive_cmds='$RM $output_objdir/$soname~$LD -b +b $install_libdir -o $output_objdir/$soname $libobjs $deplibs $linker_flags~test $output_objdir/$soname = $lib || mv $output_objdir/$soname $lib' fi -@@ -9407,7 +9985,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9407,7 +9985,7 @@ if test -z "$aix_libpath"; then aix_libp hpux10*) if test "$GCC" = yes && test "$with_gnu_ld" = no; then @@ -1190,7 +1186,7 @@ index 86561b30ac4..c5a7ed1ed36 100755 else archive_cmds='$LD -b +h $soname +b $install_libdir -o $lib $libobjs $deplibs $linker_flags' fi -@@ -9431,10 +10009,10 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9431,10 +10009,10 @@ if test -z "$aix_libpath"; then aix_libp archive_cmds='$CC -shared ${wl}+h ${wl}$soname ${wl}+nodefaultrpath -o $lib $libobjs $deplibs $compiler_flags' ;; ia64*) @@ -1248,7 +1244,7 @@ index 86561b30ac4..c5a7ed1ed36 100755 else archive_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -o $lib' archive_expsym_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -exports_file $export_symbols -o $lib' -@@ -9614,7 +10205,7 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -9614,7 +10205,7 @@ rm -f core conftest.err conftest.$ac_obj osf4* | osf5*) # as osf3* with the addition of -msym flag if test "$GCC" = yes; then allow_undefined_flag=' ${wl}-expect_unresolved ${wl}\*' @@ -1257,7 +1253,7 @@ index 86561b30ac4..c5a7ed1ed36 100755 hardcode_libdir_flag_spec='${wl}-rpath ${wl}$libdir' else allow_undefined_flag=' -expect_unresolved \*' -@@ -9633,9 +10224,9 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -9633,9 +10224,9 @@ rm -f core conftest.err conftest.$ac_obj no_undefined_flag=' -z defs' if test "$GCC" = yes; then wlarc='${wl}' @@ -1407,7 +1403,7 @@ index 86561b30ac4..c5a7ed1ed36 100755 fi fi -@@ -17977,13 +18627,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_single_quote_subst"`' +@@ -17977,13 +18627,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_ lt_unset='`$ECHO "$lt_unset" | $SED "$delay_single_quote_subst"`' lt_SP2NL='`$ECHO "$lt_SP2NL" | $SED "$delay_single_quote_subst"`' lt_NL2SP='`$ECHO "$lt_NL2SP" | $SED "$delay_single_quote_subst"`' @@ -1428,7 +1424,7 @@ index 86561b30ac4..c5a7ed1ed36 100755 STRIP='`$ECHO "$STRIP" | $SED "$delay_single_quote_subst"`' RANLIB='`$ECHO "$RANLIB" | $SED "$delay_single_quote_subst"`' old_postinstall_cmds='`$ECHO "$old_postinstall_cmds" | $SED "$delay_single_quote_subst"`' -@@ -17998,14 +18655,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$lt_cv_sys_global_symbol_pipe" | $SED "$de +@@ -17998,14 +18655,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$l lt_cv_sys_global_symbol_to_cdecl='`$ECHO "$lt_cv_sys_global_symbol_to_cdecl" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address_lib_prefix='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address_lib_prefix" | $SED "$delay_single_quote_subst"`' @@ -1447,7 +1443,7 @@ index 86561b30ac4..c5a7ed1ed36 100755 DSYMUTIL='`$ECHO "$DSYMUTIL" | $SED "$delay_single_quote_subst"`' NMEDIT='`$ECHO "$NMEDIT" | $SED "$delay_single_quote_subst"`' LIPO='`$ECHO "$LIPO" | $SED "$delay_single_quote_subst"`' -@@ -18038,12 +18698,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcode_shlibpath_var" | $SED "$delay_single_q +@@ -18038,12 +18698,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcod hardcode_automatic='`$ECHO "$hardcode_automatic" | $SED "$delay_single_quote_subst"`' inherit_rpath='`$ECHO "$inherit_rpath" | $SED "$delay_single_quote_subst"`' link_all_deplibs='`$ECHO "$link_all_deplibs" | $SED "$delay_single_quote_subst"`' @@ -1561,7 +1557,7 @@ index 86561b30ac4..c5a7ed1ed36 100755 # A symbol stripping program. STRIP=$lt_STRIP -@@ -19079,6 +19770,12 @@ global_symbol_to_c_name_address=$lt_lt_cv_sys_global_symbol_to_c_name_address +@@ -19079,6 +19770,12 @@ global_symbol_to_c_name_address=$lt_lt_c # Transform the output of nm in a C name address pair when lib prefix is needed. global_symbol_to_c_name_address_lib_prefix=$lt_lt_cv_sys_global_symbol_to_c_name_address_lib_prefix @@ -1822,15 +1818,9 @@ index 86561b30ac4..c5a7ed1ed36 100755 -_LT_EOF - ;; - esac -- -- -- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ -- || (rm -f "$cfgfile"; exit 1) -- -- mv -f "$cfgfile" "$ofile" || + sed '$q' "$ltmain" >> "$cfgfile" \ + || (rm -f "$cfgfile"; exit 1) -+ + + if test x"$xsi_shell" = xyes; then + sed -e '/^func_dirname ()$/,/^} # func_dirname /c\ +func_dirname ()\ @@ -1988,14 +1978,15 @@ index 86561b30ac4..c5a7ed1ed36 100755 + { $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: Unable to substitute extended shell functions in $ofile" >&5 +$as_echo "$as_me: WARNING: Unable to substitute extended shell functions in $ofile" >&2;} +fi -+ -+ + +- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ +- || (rm -f "$cfgfile"; exit 1) + +- mv -f "$cfgfile" "$ofile" || + mv -f "$cfgfile" "$ofile" || (rm -f "$ofile" && cp "$cfgfile" "$ofile" && rm -f "$cfgfile") chmod +x "$ofile" -diff --git a/bfd/configure.ac b/bfd/configure.ac -index 5879a04785d..5ccc499d8d7 100644 --- a/bfd/configure.ac +++ b/bfd/configure.ac @@ -281,7 +281,7 @@ changequote(,)dnl @@ -2007,8 +1998,6 @@ index 5879a04785d..5ccc499d8d7 100644 fi fi -diff --git a/binutils/Makefile.in b/binutils/Makefile.in -index 549b5a361c8..e1487641218 100644 --- a/binutils/Makefile.in +++ b/binutils/Makefile.in @@ -495,6 +495,7 @@ DEBUGINFOD_LIBS = @DEBUGINFOD_LIBS@ @@ -2035,8 +2024,6 @@ index 549b5a361c8..e1487641218 100644 ac_ct_CC = @ac_ct_CC@ ac_ct_DUMPBIN = @ac_ct_DUMPBIN@ am__include = @am__include@ -diff --git a/binutils/configure b/binutils/configure -index 0ff4539f458..6dca572ea4b 100755 --- a/binutils/configure +++ b/binutils/configure @@ -704,8 +704,11 @@ OTOOL @@ -2088,7 +2075,7 @@ index 0ff4539f458..6dca572ea4b 100755 test "X`print -r -- $ECHO 2>/dev/null`" = "X$ECHO"; then ECHO='print -r --' elif test "X`printf %s $ECHO 2>/dev/null`" = "X$ECHO"; then -@@ -5690,8 +5696,8 @@ $as_echo_n "checking whether the shell understands some XSI constructs... " >&6; +@@ -5690,8 +5696,8 @@ $as_echo_n "checking whether the shell u # Try some XSI features xsi_shell=no ( _lt_dummy="a/b/c" @@ -2224,7 +2211,7 @@ index 0ff4539f458..6dca572ea4b 100755 file_magic_cmd=$lt_cv_file_magic_cmd deplibs_check_method=$lt_cv_deplibs_check_method test -z "$deplibs_check_method" && deplibs_check_method=unknown -@@ -6098,6 +6199,157 @@ test -z "$deplibs_check_method" && deplibs_check_method=unknown +@@ -6098,6 +6199,157 @@ test -z "$deplibs_check_method" && depli @@ -2590,7 +2577,7 @@ index 0ff4539f458..6dca572ea4b 100755 const char *name; void *address; } -@@ -6683,8 +7010,8 @@ static const void *lt_preloaded_setup() { +@@ -6683,8 +7010,8 @@ static const void *lt_preloaded_setup() _LT_EOF # Now try linking the two files. mv conftest.$ac_objext conftstm.$ac_objext @@ -2612,7 +2599,7 @@ index 0ff4539f458..6dca572ea4b 100755 else echo "cannot find nm_test_func in $nlist" >&5 fi -@@ -6732,6 +7059,18 @@ else +@@ -6732,6 +7059,15 @@ else $as_echo "ok" >&6; } fi @@ -2625,18 +2612,13 @@ index 0ff4539f458..6dca572ea4b 100755 + + + -+ -+ -+ -@@ -6748,6 +7087,43 @@ fi +@@ -6753,6 +7089,46 @@ fi -+ -+ + + + @@ -2672,9 +2654,14 @@ index 0ff4539f458..6dca572ea4b 100755 + + { $as_echo "$as_me:${as_lineno-$LINENO}: result: ${lt_sysroot:-no}" >&5 +$as_echo "${lt_sysroot:-no}" >&6; } - - - ++ ++ ++ ++ ++ + # Check whether --enable-libtool-lock was given. + if test "${enable_libtool_lock+set}" = set; then : + enableval=$enable_libtool_lock; @@ -6959,6 +7335,123 @@ esac need_locks="$enable_libtool_lock" @@ -2817,7 +2804,7 @@ index 0ff4539f458..6dca572ea4b 100755 if test "$GCC" = yes; then lt_prog_compiler_wl='-Wl,' -@@ -8273,6 +8766,12 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -8273,6 +8766,12 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='--shared' lt_prog_compiler_static='--static' ;; @@ -2830,7 +2817,7 @@ index 0ff4539f458..6dca572ea4b 100755 pgcc* | pgf77* | pgf90* | pgf95* | pgfortran*) # Portland Group compilers (*not* the Pentium gcc compiler, # which looks to be a dead project) -@@ -8335,7 +8834,7 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -8335,7 +8834,7 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='-KPIC' lt_prog_compiler_static='-Bstatic' case $cc_basename in @@ -2991,7 +2978,7 @@ index 0ff4539f458..6dca572ea4b 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" archive_expsym_cmds='$CC -o $output_objdir/$soname $libobjs $deplibs '"\${wl}$no_entry_flag"' $compiler_flags `if test "x${allow_undefined_flag}" != "x"; then func_echo_all "${wl}${allow_undefined_flag}"; else :; fi` '"\${wl}$exp_sym_flag:\$export_symbols $shared_flag" -@@ -9164,7 +9686,13 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9164,7 +9686,13 @@ if test -z "$aix_libpath"; then aix_libp else # Determine the default libpath from the value encoded in an # empty executable. @@ -3049,7 +3036,7 @@ index 0ff4539f458..6dca572ea4b 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" # Warning - without using the other run time loading flags, -@@ -9237,20 +9772,63 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9237,20 +9772,63 @@ if test -z "$aix_libpath"; then aix_libp # Microsoft Visual C++. # hardcode_libdir_flag_spec is actually meaningless, as there is # no search path for DLLs. @@ -3127,7 +3114,7 @@ index 0ff4539f458..6dca572ea4b 100755 ;; darwin* | rhapsody*) -@@ -9311,7 +9889,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9311,7 +9889,7 @@ if test -z "$aix_libpath"; then aix_libp # FreeBSD 3 and greater uses gcc -shared to do shared libraries. freebsd* | dragonfly*) @@ -3136,7 +3123,7 @@ index 0ff4539f458..6dca572ea4b 100755 hardcode_libdir_flag_spec='-R$libdir' hardcode_direct=yes hardcode_shlibpath_var=no -@@ -9319,7 +9897,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9319,7 +9897,7 @@ if test -z "$aix_libpath"; then aix_libp hpux9*) if test "$GCC" = yes; then @@ -3145,7 +3132,7 @@ index 0ff4539f458..6dca572ea4b 100755 else archive_cmds='$RM $output_objdir/$soname~$LD -b +b $install_libdir -o $output_objdir/$soname $libobjs $deplibs $linker_flags~test $output_objdir/$soname = $lib || mv $output_objdir/$soname $lib' fi -@@ -9335,7 +9913,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9335,7 +9913,7 @@ if test -z "$aix_libpath"; then aix_libp hpux10*) if test "$GCC" = yes && test "$with_gnu_ld" = no; then @@ -3154,7 +3141,7 @@ index 0ff4539f458..6dca572ea4b 100755 else archive_cmds='$LD -b +h $soname +b $install_libdir -o $lib $libobjs $deplibs $linker_flags' fi -@@ -9359,10 +9937,10 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9359,10 +9937,10 @@ if test -z "$aix_libpath"; then aix_libp archive_cmds='$CC -shared ${wl}+h ${wl}$soname ${wl}+nodefaultrpath -o $lib $libobjs $deplibs $compiler_flags' ;; ia64*) @@ -3212,7 +3199,7 @@ index 0ff4539f458..6dca572ea4b 100755 else archive_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -o $lib' archive_expsym_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -exports_file $export_symbols -o $lib' -@@ -9542,7 +10133,7 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -9542,7 +10133,7 @@ rm -f core conftest.err conftest.$ac_obj osf4* | osf5*) # as osf3* with the addition of -msym flag if test "$GCC" = yes; then allow_undefined_flag=' ${wl}-expect_unresolved ${wl}\*' @@ -3221,7 +3208,7 @@ index 0ff4539f458..6dca572ea4b 100755 hardcode_libdir_flag_spec='${wl}-rpath ${wl}$libdir' else allow_undefined_flag=' -expect_unresolved \*' -@@ -9561,9 +10152,9 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -9561,9 +10152,9 @@ rm -f core conftest.err conftest.$ac_obj no_undefined_flag=' -z defs' if test "$GCC" = yes; then wlarc='${wl}' @@ -3362,7 +3349,7 @@ index 0ff4539f458..6dca572ea4b 100755 int main () { void *self = dlopen (0, LT_DLGLOBAL|LT_DLLAZY_OR_NOW); -@@ -17102,13 +17752,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_single_quote_subst"`' +@@ -17102,13 +17752,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_ lt_unset='`$ECHO "$lt_unset" | $SED "$delay_single_quote_subst"`' lt_SP2NL='`$ECHO "$lt_SP2NL" | $SED "$delay_single_quote_subst"`' lt_NL2SP='`$ECHO "$lt_NL2SP" | $SED "$delay_single_quote_subst"`' @@ -3383,7 +3370,7 @@ index 0ff4539f458..6dca572ea4b 100755 STRIP='`$ECHO "$STRIP" | $SED "$delay_single_quote_subst"`' RANLIB='`$ECHO "$RANLIB" | $SED "$delay_single_quote_subst"`' old_postinstall_cmds='`$ECHO "$old_postinstall_cmds" | $SED "$delay_single_quote_subst"`' -@@ -17123,14 +17780,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$lt_cv_sys_global_symbol_pipe" | $SED "$de +@@ -17123,14 +17780,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$l lt_cv_sys_global_symbol_to_cdecl='`$ECHO "$lt_cv_sys_global_symbol_to_cdecl" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address_lib_prefix='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address_lib_prefix" | $SED "$delay_single_quote_subst"`' @@ -3402,7 +3389,7 @@ index 0ff4539f458..6dca572ea4b 100755 DSYMUTIL='`$ECHO "$DSYMUTIL" | $SED "$delay_single_quote_subst"`' NMEDIT='`$ECHO "$NMEDIT" | $SED "$delay_single_quote_subst"`' LIPO='`$ECHO "$LIPO" | $SED "$delay_single_quote_subst"`' -@@ -17163,12 +17823,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcode_shlibpath_var" | $SED "$delay_single_q +@@ -17163,12 +17823,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcod hardcode_automatic='`$ECHO "$hardcode_automatic" | $SED "$delay_single_quote_subst"`' inherit_rpath='`$ECHO "$inherit_rpath" | $SED "$delay_single_quote_subst"`' link_all_deplibs='`$ECHO "$link_all_deplibs" | $SED "$delay_single_quote_subst"`' @@ -3516,7 +3503,7 @@ index 0ff4539f458..6dca572ea4b 100755 # A symbol stripping program. STRIP=$lt_STRIP -@@ -18201,6 +18892,12 @@ global_symbol_to_c_name_address=$lt_lt_cv_sys_global_symbol_to_c_name_address +@@ -18201,6 +18892,12 @@ global_symbol_to_c_name_address=$lt_lt_c # Transform the output of nm in a C name address pair when lib prefix is needed. global_symbol_to_c_name_address_lib_prefix=$lt_lt_cv_sys_global_symbol_to_c_name_address_lib_prefix @@ -3777,15 +3764,9 @@ index 0ff4539f458..6dca572ea4b 100755 -_LT_EOF - ;; - esac -- -- -- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ -- || (rm -f "$cfgfile"; exit 1) -- -- mv -f "$cfgfile" "$ofile" || + sed '$q' "$ltmain" >> "$cfgfile" \ + || (rm -f "$cfgfile"; exit 1) -+ + + if test x"$xsi_shell" = xyes; then + sed -e '/^func_dirname ()$/,/^} # func_dirname /c\ +func_dirname ()\ @@ -3943,14 +3924,15 @@ index 0ff4539f458..6dca572ea4b 100755 + { $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: Unable to substitute extended shell functions in $ofile" >&5 +$as_echo "$as_me: WARNING: Unable to substitute extended shell functions in $ofile" >&2;} +fi -+ -+ + +- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ +- || (rm -f "$cfgfile"; exit 1) + +- mv -f "$cfgfile" "$ofile" || + mv -f "$cfgfile" "$ofile" || (rm -f "$ofile" && cp "$cfgfile" "$ofile" && rm -f "$cfgfile") chmod +x "$ofile" -diff --git a/gas/Makefile.in b/gas/Makefile.in -index 1f24d4a5bbc..0147b491612 100644 --- a/gas/Makefile.in +++ b/gas/Makefile.in @@ -384,6 +384,7 @@ CYGPATH_W = @CYGPATH_W@ @@ -3977,8 +3959,6 @@ index 1f24d4a5bbc..0147b491612 100644 ac_ct_CC = @ac_ct_CC@ ac_ct_DUMPBIN = @ac_ct_DUMPBIN@ am__include = @am__include@ -diff --git a/gas/configure b/gas/configure -index ca149e79195..ad4377e140a 100755 --- a/gas/configure +++ b/gas/configure @@ -692,8 +692,11 @@ OTOOL @@ -4030,7 +4010,7 @@ index ca149e79195..ad4377e140a 100755 test "X`print -r -- $ECHO 2>/dev/null`" = "X$ECHO"; then ECHO='print -r --' elif test "X`printf %s $ECHO 2>/dev/null`" = "X$ECHO"; then -@@ -5386,8 +5392,8 @@ $as_echo_n "checking whether the shell understands some XSI constructs... " >&6; +@@ -5386,8 +5392,8 @@ $as_echo_n "checking whether the shell u # Try some XSI features xsi_shell=no ( _lt_dummy="a/b/c" @@ -4166,7 +4146,7 @@ index ca149e79195..ad4377e140a 100755 file_magic_cmd=$lt_cv_file_magic_cmd deplibs_check_method=$lt_cv_deplibs_check_method test -z "$deplibs_check_method" && deplibs_check_method=unknown -@@ -5794,6 +5895,157 @@ test -z "$deplibs_check_method" && deplibs_check_method=unknown +@@ -5794,6 +5895,157 @@ test -z "$deplibs_check_method" && depli @@ -4436,7 +4416,7 @@ index ca149e79195..ad4377e140a 100755 + lt_cv_ar_at_file=no + cat confdefs.h - <<_ACEOF >conftest.$ac_ext +/* end confdefs.h. */ -+ + +int +main () +{ @@ -4466,7 +4446,7 @@ index ca149e79195..ad4377e140a 100755 + fi + fi + rm -f conftest.* libconftest.a - ++ +fi +rm -f core conftest.err conftest.$ac_objext conftest.$ac_ext @@ -4529,7 +4509,7 @@ index ca149e79195..ad4377e140a 100755 const char *name; void *address; } -@@ -6379,8 +6706,8 @@ static const void *lt_preloaded_setup() { +@@ -6379,8 +6706,8 @@ static const void *lt_preloaded_setup() _LT_EOF # Now try linking the two files. mv conftest.$ac_objext conftstm.$ac_objext @@ -4551,7 +4531,7 @@ index ca149e79195..ad4377e140a 100755 else echo "cannot find nm_test_func in $nlist" >&5 fi -@@ -6428,6 +6755,19 @@ else +@@ -6428,6 +6755,15 @@ else $as_echo "ok" >&6; } fi @@ -4564,21 +4544,16 @@ index ca149e79195..ad4377e140a 100755 + + + -+ -+ -+ -+ -@@ -6444,6 +6784,42 @@ fi +@@ -6449,6 +6785,46 @@ fi + + + -+ +{ $as_echo "$as_me:${as_lineno-$LINENO}: checking for sysroot" >&5 +$as_echo_n "checking for sysroot... " >&6; } + @@ -4611,9 +4586,14 @@ index ca149e79195..ad4377e140a 100755 + + { $as_echo "$as_me:${as_lineno-$LINENO}: result: ${lt_sysroot:-no}" >&5 +$as_echo "${lt_sysroot:-no}" >&6; } - - - ++ ++ ++ ++ ++ + # Check whether --enable-libtool-lock was given. + if test "${enable_libtool_lock+set}" = set; then : + enableval=$enable_libtool_lock; @@ -6655,6 +7031,123 @@ esac need_locks="$enable_libtool_lock" @@ -4756,7 +4736,7 @@ index ca149e79195..ad4377e140a 100755 if test "$GCC" = yes; then lt_prog_compiler_wl='-Wl,' -@@ -7969,6 +8462,12 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -7969,6 +8462,12 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='--shared' lt_prog_compiler_static='--static' ;; @@ -4769,7 +4749,7 @@ index ca149e79195..ad4377e140a 100755 pgcc* | pgf77* | pgf90* | pgf95* | pgfortran*) # Portland Group compilers (*not* the Pentium gcc compiler, # which looks to be a dead project) -@@ -8031,7 +8530,7 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -8031,7 +8530,7 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='-KPIC' lt_prog_compiler_static='-Bstatic' case $cc_basename in @@ -4930,7 +4910,7 @@ index ca149e79195..ad4377e140a 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" archive_expsym_cmds='$CC -o $output_objdir/$soname $libobjs $deplibs '"\${wl}$no_entry_flag"' $compiler_flags `if test "x${allow_undefined_flag}" != "x"; then func_echo_all "${wl}${allow_undefined_flag}"; else :; fi` '"\${wl}$exp_sym_flag:\$export_symbols $shared_flag" -@@ -8860,7 +9382,13 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -8860,7 +9382,13 @@ if test -z "$aix_libpath"; then aix_libp else # Determine the default libpath from the value encoded in an # empty executable. @@ -4988,7 +4968,7 @@ index ca149e79195..ad4377e140a 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" # Warning - without using the other run time loading flags, -@@ -8933,20 +9468,63 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -8933,20 +9468,63 @@ if test -z "$aix_libpath"; then aix_libp # Microsoft Visual C++. # hardcode_libdir_flag_spec is actually meaningless, as there is # no search path for DLLs. @@ -5066,7 +5046,7 @@ index ca149e79195..ad4377e140a 100755 ;; darwin* | rhapsody*) -@@ -9007,7 +9585,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9007,7 +9585,7 @@ if test -z "$aix_libpath"; then aix_libp # FreeBSD 3 and greater uses gcc -shared to do shared libraries. freebsd* | dragonfly*) @@ -5075,7 +5055,7 @@ index ca149e79195..ad4377e140a 100755 hardcode_libdir_flag_spec='-R$libdir' hardcode_direct=yes hardcode_shlibpath_var=no -@@ -9015,7 +9593,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9015,7 +9593,7 @@ if test -z "$aix_libpath"; then aix_libp hpux9*) if test "$GCC" = yes; then @@ -5084,7 +5064,7 @@ index ca149e79195..ad4377e140a 100755 else archive_cmds='$RM $output_objdir/$soname~$LD -b +b $install_libdir -o $output_objdir/$soname $libobjs $deplibs $linker_flags~test $output_objdir/$soname = $lib || mv $output_objdir/$soname $lib' fi -@@ -9031,7 +9609,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9031,7 +9609,7 @@ if test -z "$aix_libpath"; then aix_libp hpux10*) if test "$GCC" = yes && test "$with_gnu_ld" = no; then @@ -5093,7 +5073,7 @@ index ca149e79195..ad4377e140a 100755 else archive_cmds='$LD -b +h $soname +b $install_libdir -o $lib $libobjs $deplibs $linker_flags' fi -@@ -9055,10 +9633,10 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9055,10 +9633,10 @@ if test -z "$aix_libpath"; then aix_libp archive_cmds='$CC -shared ${wl}+h ${wl}$soname ${wl}+nodefaultrpath -o $lib $libobjs $deplibs $compiler_flags' ;; ia64*) @@ -5151,7 +5131,7 @@ index ca149e79195..ad4377e140a 100755 else archive_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -o $lib' archive_expsym_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -exports_file $export_symbols -o $lib' -@@ -9238,7 +9829,7 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -9238,7 +9829,7 @@ rm -f core conftest.err conftest.$ac_obj osf4* | osf5*) # as osf3* with the addition of -msym flag if test "$GCC" = yes; then allow_undefined_flag=' ${wl}-expect_unresolved ${wl}\*' @@ -5160,7 +5140,7 @@ index ca149e79195..ad4377e140a 100755 hardcode_libdir_flag_spec='${wl}-rpath ${wl}$libdir' else allow_undefined_flag=' -expect_unresolved \*' -@@ -9257,9 +9848,9 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -9257,9 +9848,9 @@ rm -f core conftest.err conftest.$ac_obj no_undefined_flag=' -z defs' if test "$GCC" = yes; then wlarc='${wl}' @@ -5301,7 +5281,7 @@ index ca149e79195..ad4377e140a 100755 int main () { void *self = dlopen (0, LT_DLGLOBAL|LT_DLLAZY_OR_NOW); -@@ -16771,13 +17421,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_single_quote_subst"`' +@@ -16771,13 +17421,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_ lt_unset='`$ECHO "$lt_unset" | $SED "$delay_single_quote_subst"`' lt_SP2NL='`$ECHO "$lt_SP2NL" | $SED "$delay_single_quote_subst"`' lt_NL2SP='`$ECHO "$lt_NL2SP" | $SED "$delay_single_quote_subst"`' @@ -5322,7 +5302,7 @@ index ca149e79195..ad4377e140a 100755 STRIP='`$ECHO "$STRIP" | $SED "$delay_single_quote_subst"`' RANLIB='`$ECHO "$RANLIB" | $SED "$delay_single_quote_subst"`' old_postinstall_cmds='`$ECHO "$old_postinstall_cmds" | $SED "$delay_single_quote_subst"`' -@@ -16792,14 +17449,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$lt_cv_sys_global_symbol_pipe" | $SED "$de +@@ -16792,14 +17449,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$l lt_cv_sys_global_symbol_to_cdecl='`$ECHO "$lt_cv_sys_global_symbol_to_cdecl" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address_lib_prefix='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address_lib_prefix" | $SED "$delay_single_quote_subst"`' @@ -5341,7 +5321,7 @@ index ca149e79195..ad4377e140a 100755 DSYMUTIL='`$ECHO "$DSYMUTIL" | $SED "$delay_single_quote_subst"`' NMEDIT='`$ECHO "$NMEDIT" | $SED "$delay_single_quote_subst"`' LIPO='`$ECHO "$LIPO" | $SED "$delay_single_quote_subst"`' -@@ -16832,12 +17492,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcode_shlibpath_var" | $SED "$delay_single_q +@@ -16832,12 +17492,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcod hardcode_automatic='`$ECHO "$hardcode_automatic" | $SED "$delay_single_quote_subst"`' inherit_rpath='`$ECHO "$inherit_rpath" | $SED "$delay_single_quote_subst"`' link_all_deplibs='`$ECHO "$link_all_deplibs" | $SED "$delay_single_quote_subst"`' @@ -5455,7 +5435,7 @@ index ca149e79195..ad4377e140a 100755 # A symbol stripping program. STRIP=$lt_STRIP -@@ -17877,6 +18568,12 @@ global_symbol_to_c_name_address=$lt_lt_cv_sys_global_symbol_to_c_name_address +@@ -17877,6 +18568,12 @@ global_symbol_to_c_name_address=$lt_lt_c # Transform the output of nm in a C name address pair when lib prefix is needed. global_symbol_to_c_name_address_lib_prefix=$lt_lt_cv_sys_global_symbol_to_c_name_address_lib_prefix @@ -5716,15 +5696,9 @@ index ca149e79195..ad4377e140a 100755 -_LT_EOF - ;; - esac -- -- -- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ -- || (rm -f "$cfgfile"; exit 1) -- -- mv -f "$cfgfile" "$ofile" || + sed '$q' "$ltmain" >> "$cfgfile" \ + || (rm -f "$cfgfile"; exit 1) -+ + + if test x"$xsi_shell" = xyes; then + sed -e '/^func_dirname ()$/,/^} # func_dirname /c\ +func_dirname ()\ @@ -5882,14 +5856,15 @@ index ca149e79195..ad4377e140a 100755 + { $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: Unable to substitute extended shell functions in $ofile" >&5 +$as_echo "$as_me: WARNING: Unable to substitute extended shell functions in $ofile" >&2;} +fi -+ -+ + +- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ +- || (rm -f "$cfgfile"; exit 1) + +- mv -f "$cfgfile" "$ofile" || + mv -f "$cfgfile" "$ofile" || (rm -f "$ofile" && cp "$cfgfile" "$ofile" && rm -f "$cfgfile") chmod +x "$ofile" -diff --git a/gprof/Makefile.in b/gprof/Makefile.in -index 719e1810bcd..037f9cd5834 100644 --- a/gprof/Makefile.in +++ b/gprof/Makefile.in @@ -327,6 +327,7 @@ CYGPATH_W = @CYGPATH_W@ @@ -5916,8 +5891,6 @@ index 719e1810bcd..037f9cd5834 100644 ac_ct_CC = @ac_ct_CC@ ac_ct_DUMPBIN = @ac_ct_DUMPBIN@ am__include = @am__include@ -diff --git a/gprof/configure b/gprof/configure -index e40de173a1e..82cd6d600b8 100755 --- a/gprof/configure +++ b/gprof/configure @@ -671,8 +671,11 @@ OTOOL @@ -5969,7 +5942,7 @@ index e40de173a1e..82cd6d600b8 100755 test "X`print -r -- $ECHO 2>/dev/null`" = "X$ECHO"; then ECHO='print -r --' elif test "X`printf %s $ECHO 2>/dev/null`" = "X$ECHO"; then -@@ -5264,8 +5270,8 @@ $as_echo_n "checking whether the shell understands some XSI constructs... " >&6; +@@ -5264,8 +5270,8 @@ $as_echo_n "checking whether the shell u # Try some XSI features xsi_shell=no ( _lt_dummy="a/b/c" @@ -6105,7 +6078,7 @@ index e40de173a1e..82cd6d600b8 100755 file_magic_cmd=$lt_cv_file_magic_cmd deplibs_check_method=$lt_cv_deplibs_check_method test -z "$deplibs_check_method" && deplibs_check_method=unknown -@@ -5672,6 +5773,157 @@ test -z "$deplibs_check_method" && deplibs_check_method=unknown +@@ -5672,6 +5773,157 @@ test -z "$deplibs_check_method" && depli @@ -6324,7 +6297,7 @@ index e40de173a1e..82cd6d600b8 100755 if test "x$ac_ct_AR" = x; then AR="false" else -@@ -5773,25 +6035,19 @@ ac_tool_warned=yes ;; +@@ -5773,29 +6035,81 @@ ac_tool_warned=yes ;; esac AR=$ac_ct_AR fi @@ -6356,13 +6329,17 @@ index e40de173a1e..82cd6d600b8 100755 + rm -f conftest.* +: ${AR=ar} +: ${AR_FLAGS=cru} - - - -@@ -5803,6 +6059,64 @@ test -z "$AR_FLAGS" && AR_FLAGS=cru - - - ++ ++ ++ ++ ++ ++ ++ ++ ++ ++ ++ +{ $as_echo "$as_me:${as_lineno-$LINENO}: checking for archiver @FILE support" >&5 +$as_echo_n "checking for archiver @FILE support... " >&6; } +if ${lt_cv_ar_at_file+:} false; then : @@ -6371,11 +6348,11 @@ index e40de173a1e..82cd6d600b8 100755 + lt_cv_ar_at_file=no + cat confdefs.h - <<_ACEOF >conftest.$ac_ext +/* end confdefs.h. */ -+ + +int +main () +{ -+ + + ; + return 0; +} @@ -6404,26 +6381,19 @@ index e40de173a1e..82cd6d600b8 100755 + +fi +rm -f core conftest.err conftest.$ac_objext conftest.$ac_ext -+ + +fi +{ $as_echo "$as_me:${as_lineno-$LINENO}: result: $lt_cv_ar_at_file" >&5 +$as_echo "$lt_cv_ar_at_file" >&6; } -+ + +if test "x$lt_cv_ar_at_file" = xno; then + archiver_list_spec= +else + archiver_list_spec=$lt_cv_ar_at_file +fi -+ -+ -+ -+ -+ -+ -+ - if test -n "$ac_tool_prefix"; then - # Extract the first word of "${ac_tool_prefix}strip", so it can be a program name with args. - set dummy ${ac_tool_prefix}strip; ac_word=$2 + + + @@ -6142,8 +6456,8 @@ esac lt_cv_sys_global_symbol_to_cdecl="sed -n -e 's/^T .* \(.*\)$/extern int \1();/p' -e 's/^$symcode* .* \(.*\)$/extern char \1;/p'" @@ -6471,7 +6441,7 @@ index e40de173a1e..82cd6d600b8 100755 const char *name; void *address; } -@@ -6257,8 +6584,8 @@ static const void *lt_preloaded_setup() { +@@ -6257,8 +6584,8 @@ static const void *lt_preloaded_setup() _LT_EOF # Now try linking the two files. mv conftest.$ac_objext conftstm.$ac_objext @@ -6493,7 +6463,7 @@ index e40de173a1e..82cd6d600b8 100755 else echo "cannot find nm_test_func in $nlist" >&5 fi -@@ -6306,6 +6633,18 @@ else +@@ -6306,6 +6633,16 @@ else $as_echo "ok" >&6; } fi @@ -6507,18 +6477,13 @@ index e40de173a1e..82cd6d600b8 100755 + + + -+ -+ -@@ -6322,6 +6661,43 @@ fi +@@ -6327,6 +6664,45 @@ fi -+ -+ -+ + + +{ $as_echo "$as_me:${as_lineno-$LINENO}: checking for sysroot" >&5 @@ -6553,9 +6518,14 @@ index e40de173a1e..82cd6d600b8 100755 + + { $as_echo "$as_me:${as_lineno-$LINENO}: result: ${lt_sysroot:-no}" >&5 +$as_echo "${lt_sysroot:-no}" >&6; } - - - ++ ++ ++ ++ ++ + # Check whether --enable-libtool-lock was given. + if test "${enable_libtool_lock+set}" = set; then : + enableval=$enable_libtool_lock; @@ -6533,6 +6909,123 @@ esac need_locks="$enable_libtool_lock" @@ -6698,7 +6668,7 @@ index e40de173a1e..82cd6d600b8 100755 if test "$GCC" = yes; then lt_prog_compiler_wl='-Wl,' -@@ -7847,6 +8340,12 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -7847,6 +8340,12 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='--shared' lt_prog_compiler_static='--static' ;; @@ -6711,7 +6681,7 @@ index e40de173a1e..82cd6d600b8 100755 pgcc* | pgf77* | pgf90* | pgf95* | pgfortran*) # Portland Group compilers (*not* the Pentium gcc compiler, # which looks to be a dead project) -@@ -7909,7 +8408,7 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -7909,7 +8408,7 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='-KPIC' lt_prog_compiler_static='-Bstatic' case $cc_basename in @@ -6872,7 +6842,7 @@ index e40de173a1e..82cd6d600b8 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" archive_expsym_cmds='$CC -o $output_objdir/$soname $libobjs $deplibs '"\${wl}$no_entry_flag"' $compiler_flags `if test "x${allow_undefined_flag}" != "x"; then func_echo_all "${wl}${allow_undefined_flag}"; else :; fi` '"\${wl}$exp_sym_flag:\$export_symbols $shared_flag" -@@ -8738,7 +9260,13 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -8738,7 +9260,13 @@ if test -z "$aix_libpath"; then aix_libp else # Determine the default libpath from the value encoded in an # empty executable. @@ -6930,7 +6900,7 @@ index e40de173a1e..82cd6d600b8 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" # Warning - without using the other run time loading flags, -@@ -8811,20 +9346,63 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -8811,20 +9346,63 @@ if test -z "$aix_libpath"; then aix_libp # Microsoft Visual C++. # hardcode_libdir_flag_spec is actually meaningless, as there is # no search path for DLLs. @@ -7008,7 +6978,7 @@ index e40de173a1e..82cd6d600b8 100755 ;; darwin* | rhapsody*) -@@ -8885,7 +9463,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -8885,7 +9463,7 @@ if test -z "$aix_libpath"; then aix_libp # FreeBSD 3 and greater uses gcc -shared to do shared libraries. freebsd* | dragonfly*) @@ -7017,7 +6987,7 @@ index e40de173a1e..82cd6d600b8 100755 hardcode_libdir_flag_spec='-R$libdir' hardcode_direct=yes hardcode_shlibpath_var=no -@@ -8893,7 +9471,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -8893,7 +9471,7 @@ if test -z "$aix_libpath"; then aix_libp hpux9*) if test "$GCC" = yes; then @@ -7026,7 +6996,7 @@ index e40de173a1e..82cd6d600b8 100755 else archive_cmds='$RM $output_objdir/$soname~$LD -b +b $install_libdir -o $output_objdir/$soname $libobjs $deplibs $linker_flags~test $output_objdir/$soname = $lib || mv $output_objdir/$soname $lib' fi -@@ -8909,7 +9487,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -8909,7 +9487,7 @@ if test -z "$aix_libpath"; then aix_libp hpux10*) if test "$GCC" = yes && test "$with_gnu_ld" = no; then @@ -7035,7 +7005,7 @@ index e40de173a1e..82cd6d600b8 100755 else archive_cmds='$LD -b +h $soname +b $install_libdir -o $lib $libobjs $deplibs $linker_flags' fi -@@ -8933,10 +9511,10 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -8933,10 +9511,10 @@ if test -z "$aix_libpath"; then aix_libp archive_cmds='$CC -shared ${wl}+h ${wl}$soname ${wl}+nodefaultrpath -o $lib $libobjs $deplibs $compiler_flags' ;; ia64*) @@ -7093,7 +7063,7 @@ index e40de173a1e..82cd6d600b8 100755 else archive_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -o $lib' archive_expsym_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -exports_file $export_symbols -o $lib' -@@ -9116,7 +9707,7 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -9116,7 +9707,7 @@ rm -f core conftest.err conftest.$ac_obj osf4* | osf5*) # as osf3* with the addition of -msym flag if test "$GCC" = yes; then allow_undefined_flag=' ${wl}-expect_unresolved ${wl}\*' @@ -7102,7 +7072,7 @@ index e40de173a1e..82cd6d600b8 100755 hardcode_libdir_flag_spec='${wl}-rpath ${wl}$libdir' else allow_undefined_flag=' -expect_unresolved \*' -@@ -9135,9 +9726,9 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -9135,9 +9726,9 @@ rm -f core conftest.err conftest.$ac_obj no_undefined_flag=' -z defs' if test "$GCC" = yes; then wlarc='${wl}' @@ -7243,7 +7213,7 @@ index e40de173a1e..82cd6d600b8 100755 int main () { void *self = dlopen (0, LT_DLGLOBAL|LT_DLLAZY_OR_NOW); -@@ -14478,13 +15128,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_single_quote_subst"`' +@@ -14478,13 +15128,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_ lt_unset='`$ECHO "$lt_unset" | $SED "$delay_single_quote_subst"`' lt_SP2NL='`$ECHO "$lt_SP2NL" | $SED "$delay_single_quote_subst"`' lt_NL2SP='`$ECHO "$lt_NL2SP" | $SED "$delay_single_quote_subst"`' @@ -7264,7 +7234,7 @@ index e40de173a1e..82cd6d600b8 100755 STRIP='`$ECHO "$STRIP" | $SED "$delay_single_quote_subst"`' RANLIB='`$ECHO "$RANLIB" | $SED "$delay_single_quote_subst"`' old_postinstall_cmds='`$ECHO "$old_postinstall_cmds" | $SED "$delay_single_quote_subst"`' -@@ -14499,14 +15156,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$lt_cv_sys_global_symbol_pipe" | $SED "$de +@@ -14499,14 +15156,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$l lt_cv_sys_global_symbol_to_cdecl='`$ECHO "$lt_cv_sys_global_symbol_to_cdecl" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address_lib_prefix='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address_lib_prefix" | $SED "$delay_single_quote_subst"`' @@ -7283,7 +7253,7 @@ index e40de173a1e..82cd6d600b8 100755 DSYMUTIL='`$ECHO "$DSYMUTIL" | $SED "$delay_single_quote_subst"`' NMEDIT='`$ECHO "$NMEDIT" | $SED "$delay_single_quote_subst"`' LIPO='`$ECHO "$LIPO" | $SED "$delay_single_quote_subst"`' -@@ -14539,12 +15199,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcode_shlibpath_var" | $SED "$delay_single_q +@@ -14539,12 +15199,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcod hardcode_automatic='`$ECHO "$hardcode_automatic" | $SED "$delay_single_quote_subst"`' inherit_rpath='`$ECHO "$inherit_rpath" | $SED "$delay_single_quote_subst"`' link_all_deplibs='`$ECHO "$link_all_deplibs" | $SED "$delay_single_quote_subst"`' @@ -7397,7 +7367,7 @@ index e40de173a1e..82cd6d600b8 100755 # A symbol stripping program. STRIP=$lt_STRIP -@@ -15578,6 +16269,12 @@ global_symbol_to_c_name_address=$lt_lt_cv_sys_global_symbol_to_c_name_address +@@ -15578,6 +16269,12 @@ global_symbol_to_c_name_address=$lt_lt_c # Transform the output of nm in a C name address pair when lib prefix is needed. global_symbol_to_c_name_address_lib_prefix=$lt_lt_cv_sys_global_symbol_to_c_name_address_lib_prefix @@ -7658,15 +7628,9 @@ index e40de173a1e..82cd6d600b8 100755 -_LT_EOF - ;; - esac -- -- -- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ -- || (rm -f "$cfgfile"; exit 1) -- -- mv -f "$cfgfile" "$ofile" || + sed '$q' "$ltmain" >> "$cfgfile" \ + || (rm -f "$cfgfile"; exit 1) -+ + + if test x"$xsi_shell" = xyes; then + sed -e '/^func_dirname ()$/,/^} # func_dirname /c\ +func_dirname ()\ @@ -7824,14 +7788,15 @@ index e40de173a1e..82cd6d600b8 100755 + { $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: Unable to substitute extended shell functions in $ofile" >&5 +$as_echo "$as_me: WARNING: Unable to substitute extended shell functions in $ofile" >&2;} +fi -+ -+ + +- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ +- || (rm -f "$cfgfile"; exit 1) + +- mv -f "$cfgfile" "$ofile" || + mv -f "$cfgfile" "$ofile" || (rm -f "$ofile" && cp "$cfgfile" "$ofile" && rm -f "$cfgfile") chmod +x "$ofile" -diff --git a/gprofng/Makefile.in b/gprofng/Makefile.in -index f770dac57c5..dbdfd96c5ff 100644 --- a/gprofng/Makefile.in +++ b/gprofng/Makefile.in @@ -254,6 +254,7 @@ CXXFLAGS = @CXXFLAGS@ @@ -7850,8 +7815,6 @@ index f770dac57c5..dbdfd96c5ff 100644 MKDIR_P = @MKDIR_P@ NM = @NM@ NMEDIT = @NMEDIT@ -diff --git a/gprofng/configure b/gprofng/configure -index 3fd5b61c9a7..c2178fc289f 100755 --- a/gprofng/configure +++ b/gprofng/configure @@ -672,6 +672,8 @@ OTOOL @@ -7900,7 +7863,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 test "X`print -r -- $ECHO 2>/dev/null`" = "X$ECHO"; then ECHO='print -r --' elif test "X`printf %s $ECHO 2>/dev/null`" = "X$ECHO"; then -@@ -6887,8 +6892,8 @@ $as_echo_n "checking whether the shell understands some XSI constructs... " >&6; +@@ -6887,8 +6892,8 @@ $as_echo_n "checking whether the shell u # Try some XSI features xsi_shell=no ( _lt_dummy="a/b/c" @@ -8036,7 +7999,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 file_magic_cmd=$lt_cv_file_magic_cmd deplibs_check_method=$lt_cv_deplibs_check_method test -z "$deplibs_check_method" && deplibs_check_method=unknown -@@ -7295,6 +7395,157 @@ test -z "$deplibs_check_method" && deplibs_check_method=unknown +@@ -7295,6 +7395,157 @@ test -z "$deplibs_check_method" && depli @@ -8255,7 +8218,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 if test "x$ac_ct_AR" = x; then AR="false" else -@@ -7396,25 +7657,19 @@ ac_tool_warned=yes ;; +@@ -7396,29 +7657,81 @@ ac_tool_warned=yes ;; esac AR=$ac_ct_AR fi @@ -8287,13 +8250,17 @@ index 3fd5b61c9a7..c2178fc289f 100755 + rm -f conftest.* +: ${AR=ar} +: ${AR_FLAGS=cru} - - - -@@ -7426,6 +7681,64 @@ test -z "$AR_FLAGS" && AR_FLAGS=cru - - - ++ ++ ++ ++ ++ ++ ++ ++ ++ ++ ++ +{ $as_echo "$as_me:${as_lineno-$LINENO}: checking for archiver @FILE support" >&5 +$as_echo_n "checking for archiver @FILE support... " >&6; } +if ${lt_cv_ar_at_file+:} false; then : @@ -8306,7 +8273,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 +int +main () +{ -+ + + ; + return 0; +} @@ -8332,29 +8299,22 @@ index 3fd5b61c9a7..c2178fc289f 100755 + fi + fi + rm -f conftest.* libconftest.a -+ + +fi +rm -f core conftest.err conftest.$ac_objext conftest.$ac_ext -+ + +fi +{ $as_echo "$as_me:${as_lineno-$LINENO}: result: $lt_cv_ar_at_file" >&5 +$as_echo "$lt_cv_ar_at_file" >&6; } -+ + +if test "x$lt_cv_ar_at_file" = xno; then + archiver_list_spec= +else + archiver_list_spec=$lt_cv_ar_at_file +fi -+ -+ -+ -+ -+ -+ -+ - if test -n "$ac_tool_prefix"; then - # Extract the first word of "${ac_tool_prefix}strip", so it can be a program name with args. - set dummy ${ac_tool_prefix}strip; ac_word=$2 + + + @@ -7765,8 +8078,8 @@ esac lt_cv_sys_global_symbol_to_cdecl="sed -n -e 's/^T .* \(.*\)$/extern int \1();/p' -e 's/^$symcode* .* \(.*\)$/extern char \1;/p'" @@ -8402,7 +8362,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 const char *name; void *address; } -@@ -7880,8 +8206,8 @@ static const void *lt_preloaded_setup() { +@@ -7880,8 +8206,8 @@ static const void *lt_preloaded_setup() _LT_EOF # Now try linking the two files. mv conftest.$ac_objext conftstm.$ac_objext @@ -8424,7 +8384,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 else echo "cannot find nm_test_func in $nlist" >&5 fi -@@ -7929,6 +8255,14 @@ else +@@ -7929,6 +8255,16 @@ else $as_echo "ok" >&6; } fi @@ -8436,18 +8396,15 @@ index 3fd5b61c9a7..c2178fc289f 100755 +fi + + ++ ++ -@@ -7947,6 +8281,47 @@ fi +@@ -7950,6 +8286,45 @@ fi -+ -+ -+ -+ -+ + + +{ $as_echo "$as_me:${as_lineno-$LINENO}: checking for sysroot" >&5 @@ -8484,9 +8441,12 @@ index 3fd5b61c9a7..c2178fc289f 100755 +$as_echo "${lt_sysroot:-no}" >&6; } + + - - - ++ ++ ++ + # Check whether --enable-libtool-lock was given. + if test "${enable_libtool_lock+set}" = set; then : + enableval=$enable_libtool_lock; @@ -8156,6 +8531,123 @@ esac need_locks="$enable_libtool_lock" @@ -8646,7 +8606,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 if test "$GCC" = yes; then lt_prog_compiler_wl='-Wl,' -@@ -9441,6 +9943,12 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -9441,6 +9943,12 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='--shared' lt_prog_compiler_static='--static' ;; @@ -8659,7 +8619,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 pgcc* | pgf77* | pgf90* | pgf95* | pgfortran*) # Portland Group compilers (*not* the Pentium gcc compiler, # which looks to be a dead project) -@@ -9503,7 +10011,7 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -9503,7 +10011,7 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='-KPIC' lt_prog_compiler_static='-Bstatic' case $cc_basename in @@ -8820,7 +8780,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" archive_expsym_cmds='$CC -o $output_objdir/$soname $libobjs $deplibs '"\${wl}$no_entry_flag"' $compiler_flags `if test "x${allow_undefined_flag}" != "x"; then func_echo_all "${wl}${allow_undefined_flag}"; else :; fi` '"\${wl}$exp_sym_flag:\$export_symbols $shared_flag" -@@ -10332,7 +10863,13 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -10332,7 +10863,13 @@ if test -z "$aix_libpath"; then aix_libp else # Determine the default libpath from the value encoded in an # empty executable. @@ -8878,7 +8838,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" # Warning - without using the other run time loading flags, -@@ -10405,20 +10949,63 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -10405,20 +10949,63 @@ if test -z "$aix_libpath"; then aix_libp # Microsoft Visual C++. # hardcode_libdir_flag_spec is actually meaningless, as there is # no search path for DLLs. @@ -8956,7 +8916,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 ;; darwin* | rhapsody*) -@@ -10479,7 +11066,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -10479,7 +11066,7 @@ if test -z "$aix_libpath"; then aix_libp # FreeBSD 3 and greater uses gcc -shared to do shared libraries. freebsd* | dragonfly*) @@ -8965,7 +8925,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 hardcode_libdir_flag_spec='-R$libdir' hardcode_direct=yes hardcode_shlibpath_var=no -@@ -10487,7 +11074,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -10487,7 +11074,7 @@ if test -z "$aix_libpath"; then aix_libp hpux9*) if test "$GCC" = yes; then @@ -8974,7 +8934,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 else archive_cmds='$RM $output_objdir/$soname~$LD -b +b $install_libdir -o $output_objdir/$soname $libobjs $deplibs $linker_flags~test $output_objdir/$soname = $lib || mv $output_objdir/$soname $lib' fi -@@ -10503,7 +11090,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -10503,7 +11090,7 @@ if test -z "$aix_libpath"; then aix_libp hpux10*) if test "$GCC" = yes && test "$with_gnu_ld" = no; then @@ -8983,7 +8943,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 else archive_cmds='$LD -b +h $soname +b $install_libdir -o $lib $libobjs $deplibs $linker_flags' fi -@@ -10527,10 +11114,10 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -10527,10 +11114,10 @@ if test -z "$aix_libpath"; then aix_libp archive_cmds='$CC -shared ${wl}+h ${wl}$soname ${wl}+nodefaultrpath -o $lib $libobjs $deplibs $compiler_flags' ;; ia64*) @@ -9041,7 +9001,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 else archive_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -o $lib' archive_expsym_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -exports_file $export_symbols -o $lib' -@@ -10710,7 +11310,7 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -10710,7 +11310,7 @@ rm -f core conftest.err conftest.$ac_obj osf4* | osf5*) # as osf3* with the addition of -msym flag if test "$GCC" = yes; then allow_undefined_flag=' ${wl}-expect_unresolved ${wl}\*' @@ -9050,7 +9010,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 hardcode_libdir_flag_spec='${wl}-rpath ${wl}$libdir' else allow_undefined_flag=' -expect_unresolved \*' -@@ -10729,9 +11329,9 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -10729,9 +11329,9 @@ rm -f core conftest.err conftest.$ac_obj no_undefined_flag=' -z defs' if test "$GCC" = yes; then wlarc='${wl}' @@ -9207,7 +9167,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 compiler=$CC compiler_CXX=$CC for cc_temp in $compiler""; do -@@ -13093,7 +13754,13 @@ $as_echo_n "checking whether the $compiler linker ($LD) supports shared librarie +@@ -13093,7 +13754,13 @@ $as_echo_n "checking whether the $compil allow_undefined_flag_CXX='-berok' # Determine the default libpath from the value encoded in an empty # executable. @@ -9265,7 +9225,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 hardcode_libdir_flag_spec_CXX='${wl}-blibpath:$libdir:'"$aix_libpath" -@@ -13134,7 +13808,13 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -13134,7 +13808,13 @@ if test -z "$aix_libpath"; then aix_libp else # Determine the default libpath from the value encoded in an # empty executable. @@ -9323,7 +9283,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 hardcode_libdir_flag_spec_CXX='${wl}-blibpath:$libdir:'"$aix_libpath" # Warning - without using the other run time loading flags, -@@ -13205,29 +13892,75 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -13205,29 +13892,75 @@ if test -z "$aix_libpath"; then aix_libp ;; cygwin* | mingw* | pw32* | cegcc*) @@ -9422,7 +9382,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 darwin* | rhapsody*) -@@ -13333,7 +14066,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -13333,7 +14066,7 @@ if test -z "$aix_libpath"; then aix_libp ;; *) if test "$GXX" = yes; then @@ -9431,7 +9391,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 else # FIXME: insert proper C++ library support ld_shlibs_CXX=no -@@ -13404,10 +14137,10 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -13404,10 +14137,10 @@ if test -z "$aix_libpath"; then aix_libp archive_cmds_CXX='$CC -shared -nostdlib -fPIC ${wl}+h ${wl}$soname ${wl}+nodefaultrpath -o $lib $predep_objects $libobjs $deplibs $postdep_objects $compiler_flags' ;; ia64*) @@ -9444,7 +9404,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 ;; esac fi -@@ -13448,9 +14181,9 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -13448,9 +14181,9 @@ if test -z "$aix_libpath"; then aix_libp *) if test "$GXX" = yes; then if test "$with_gnu_ld" = no; then @@ -9456,7 +9416,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 fi fi link_all_deplibs_CXX=yes -@@ -13728,7 +14461,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -13728,7 +14461,7 @@ if test -z "$aix_libpath"; then aix_libp archive_cmds_CXX='$CC -shared -nostdlib ${allow_undefined_flag} $predep_objects $libobjs $deplibs $postdep_objects $compiler_flags ${wl}-soname ${wl}$soname `test -n "$verstring" && func_echo_all "${wl}-set_version ${wl}$verstring"` ${wl}-update_registry ${wl}${output_objdir}/so_locations -o $lib' ;; *) @@ -9465,7 +9425,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 ;; esac -@@ -13774,7 +14507,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -13774,7 +14507,7 @@ if test -z "$aix_libpath"; then aix_libp solaris*) case $cc_basename in @@ -9474,7 +9434,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 # Sun C++ 4.2, 5.x and Centerline C++ archive_cmds_need_lc_CXX=yes no_undefined_flag_CXX=' -zdefs' -@@ -13815,9 +14548,9 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -13815,9 +14548,9 @@ if test -z "$aix_libpath"; then aix_libp if test "$GXX" = yes && test "$with_gnu_ld" = no; then no_undefined_flag_CXX=' ${wl}-z ${wl}defs' if $CC --version | $GREP -v '^2\.7' > /dev/null; then @@ -9500,7 +9460,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 if { { eval echo "\"\$as_me\":${as_lineno-$LINENO}: \"$ac_compile\""; } >&5 (eval $ac_compile) 2>&5 ac_status=$? -@@ -13966,7 +14706,7 @@ if { { eval echo "\"\$as_me\":${as_lineno-$LINENO}: \"$ac_compile\""; } >&5 +@@ -13966,7 +14706,7 @@ if { { eval echo "\"\$as_me\":${as_linen pre_test_object_deps_done=no for p in `eval "$output_verbose_link_cmd"`; do @@ -9509,7 +9469,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 -L* | -R* | -l*) # Some compilers place space between "-{L,R}" and the path. -@@ -13975,13 +14715,22 @@ if { { eval echo "\"\$as_me\":${as_lineno-$LINENO}: \"$ac_compile\""; } >&5 +@@ -13975,13 +14715,22 @@ if { { eval echo "\"\$as_me\":${as_linen test $p = "-R"; then prev=$p continue @@ -9536,7 +9496,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 # Internal compiler library paths should come after those # provided the user. The postdeps already come after the # user supplied libs so there is no need to process them. -@@ -14001,8 +14750,10 @@ if { { eval echo "\"\$as_me\":${as_lineno-$LINENO}: \"$ac_compile\""; } >&5 +@@ -14001,8 +14750,10 @@ if { { eval echo "\"\$as_me\":${as_linen postdeps_CXX="${postdeps_CXX} ${prev}${p}" fi fi @@ -9573,7 +9533,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 # C++ specific cases for pic, static, wl, etc. if test "$GXX" = yes; then -@@ -14244,6 +14994,11 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -14244,6 +14994,11 @@ $as_echo_n "checking for $compiler optio ;; esac ;; @@ -9585,7 +9545,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 dgux*) case $cc_basename in ec++*) -@@ -14396,7 +15151,7 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -14396,7 +15151,7 @@ $as_echo_n "checking for $compiler optio ;; solaris*) case $cc_basename in @@ -9632,7 +9592,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 case $host_os in aix[4-9]*) # If we're using GNU nm, then we don't want the "-C" option. -@@ -14713,15 +15478,20 @@ $as_echo_n "checking whether the $compiler linker ($LD) supports shared librarie +@@ -14713,15 +15478,20 @@ $as_echo_n "checking whether the $compil ;; pw32*) export_symbols_cmds_CXX="$ltdll_cmds" @@ -9751,7 +9711,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 LDCXX=$LD LD=$lt_save_LD GCC=$lt_save_GCC -@@ -18025,13 +18855,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_single_quote_subst"`' +@@ -18025,13 +18855,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_ lt_unset='`$ECHO "$lt_unset" | $SED "$delay_single_quote_subst"`' lt_SP2NL='`$ECHO "$lt_SP2NL" | $SED "$delay_single_quote_subst"`' lt_NL2SP='`$ECHO "$lt_NL2SP" | $SED "$delay_single_quote_subst"`' @@ -9772,7 +9732,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 STRIP='`$ECHO "$STRIP" | $SED "$delay_single_quote_subst"`' RANLIB='`$ECHO "$RANLIB" | $SED "$delay_single_quote_subst"`' old_postinstall_cmds='`$ECHO "$old_postinstall_cmds" | $SED "$delay_single_quote_subst"`' -@@ -18046,14 +18883,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$lt_cv_sys_global_symbol_pipe" | $SED "$de +@@ -18046,14 +18883,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$l lt_cv_sys_global_symbol_to_cdecl='`$ECHO "$lt_cv_sys_global_symbol_to_cdecl" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address_lib_prefix='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address_lib_prefix" | $SED "$delay_single_quote_subst"`' @@ -9791,7 +9751,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 DSYMUTIL='`$ECHO "$DSYMUTIL" | $SED "$delay_single_quote_subst"`' NMEDIT='`$ECHO "$NMEDIT" | $SED "$delay_single_quote_subst"`' LIPO='`$ECHO "$LIPO" | $SED "$delay_single_quote_subst"`' -@@ -18086,12 +18926,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcode_shlibpath_var" | $SED "$delay_single_q +@@ -18086,12 +18926,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcod hardcode_automatic='`$ECHO "$hardcode_automatic" | $SED "$delay_single_quote_subst"`' inherit_rpath='`$ECHO "$inherit_rpath" | $SED "$delay_single_quote_subst"`' link_all_deplibs='`$ECHO "$link_all_deplibs" | $SED "$delay_single_quote_subst"`' @@ -9805,7 +9765,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 file_list_spec='`$ECHO "$file_list_spec" | $SED "$delay_single_quote_subst"`' variables_saved_for_relink='`$ECHO "$variables_saved_for_relink" | $SED "$delay_single_quote_subst"`' need_lib_prefix='`$ECHO "$need_lib_prefix" | $SED "$delay_single_quote_subst"`' -@@ -18130,8 +18970,8 @@ old_archive_cmds_CXX='`$ECHO "$old_archive_cmds_CXX" | $SED "$delay_single_quote +@@ -18130,8 +18970,8 @@ old_archive_cmds_CXX='`$ECHO "$old_archi compiler_CXX='`$ECHO "$compiler_CXX" | $SED "$delay_single_quote_subst"`' GCC_CXX='`$ECHO "$GCC_CXX" | $SED "$delay_single_quote_subst"`' lt_prog_compiler_no_builtin_flag_CXX='`$ECHO "$lt_prog_compiler_no_builtin_flag_CXX" | $SED "$delay_single_quote_subst"`' @@ -9815,7 +9775,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 lt_prog_compiler_static_CXX='`$ECHO "$lt_prog_compiler_static_CXX" | $SED "$delay_single_quote_subst"`' lt_cv_prog_compiler_c_o_CXX='`$ECHO "$lt_cv_prog_compiler_c_o_CXX" | $SED "$delay_single_quote_subst"`' archive_cmds_need_lc_CXX='`$ECHO "$archive_cmds_need_lc_CXX" | $SED "$delay_single_quote_subst"`' -@@ -18158,12 +18998,12 @@ hardcode_shlibpath_var_CXX='`$ECHO "$hardcode_shlibpath_var_CXX" | $SED "$delay_ +@@ -18158,12 +18998,12 @@ hardcode_shlibpath_var_CXX='`$ECHO "$har hardcode_automatic_CXX='`$ECHO "$hardcode_automatic_CXX" | $SED "$delay_single_quote_subst"`' inherit_rpath_CXX='`$ECHO "$inherit_rpath_CXX" | $SED "$delay_single_quote_subst"`' link_all_deplibs_CXX='`$ECHO "$link_all_deplibs_CXX" | $SED "$delay_single_quote_subst"`' @@ -9957,7 +9917,7 @@ index 3fd5b61c9a7..c2178fc289f 100755 # A symbol stripping program. STRIP=$lt_STRIP -@@ -19218,6 +20089,12 @@ global_symbol_to_c_name_address=$lt_lt_cv_sys_global_symbol_to_c_name_address +@@ -19218,6 +20089,12 @@ global_symbol_to_c_name_address=$lt_lt_c # Transform the output of nm in a C name address pair when lib prefix is needed. global_symbol_to_c_name_address_lib_prefix=$lt_lt_cv_sys_global_symbol_to_c_name_address_lib_prefix @@ -10218,15 +10178,9 @@ index 3fd5b61c9a7..c2178fc289f 100755 -_LT_EOF - ;; - esac -- -- -- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ -- || (rm -f "$cfgfile"; exit 1) -- -- mv -f "$cfgfile" "$ofile" || + sed '$q' "$ltmain" >> "$cfgfile" \ + || (rm -f "$cfgfile"; exit 1) -+ + + if test x"$xsi_shell" = xyes; then + sed -e '/^func_dirname ()$/,/^} # func_dirname /c\ +func_dirname ()\ @@ -10384,8 +10338,11 @@ index 3fd5b61c9a7..c2178fc289f 100755 + { $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: Unable to substitute extended shell functions in $ofile" >&5 +$as_echo "$as_me: WARNING: Unable to substitute extended shell functions in $ofile" >&2;} +fi -+ -+ + +- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ +- || (rm -f "$cfgfile"; exit 1) + +- mv -f "$cfgfile" "$ofile" || + mv -f "$cfgfile" "$ofile" || (rm -f "$ofile" && cp "$cfgfile" "$ofile" && rm -f "$cfgfile") chmod +x "$ofile" @@ -10426,8 +10383,6 @@ index 3fd5b61c9a7..c2178fc289f 100755 # Specify filename containing input files. file_list_spec=$lt_file_list_spec_CXX -diff --git a/gprofng/doc/Makefile.in b/gprofng/doc/Makefile.in -index 162ae4b19c1..9e6017aa0ff 100644 --- a/gprofng/doc/Makefile.in +++ b/gprofng/doc/Makefile.in @@ -238,6 +238,7 @@ CXXFLAGS = @CXXFLAGS@ @@ -10446,8 +10401,6 @@ index 162ae4b19c1..9e6017aa0ff 100644 MKDIR_P = @MKDIR_P@ NM = @NM@ NMEDIT = @NMEDIT@ -diff --git a/gprofng/gp-display-html/Makefile.in b/gprofng/gp-display-html/Makefile.in -index 2b8580f40f9..a01e34702d7 100644 --- a/gprofng/gp-display-html/Makefile.in +++ b/gprofng/gp-display-html/Makefile.in @@ -198,6 +198,7 @@ CXXFLAGS = @CXXFLAGS@ @@ -10466,8 +10419,6 @@ index 2b8580f40f9..a01e34702d7 100644 MKDIR_P = @MKDIR_P@ NM = @NM@ NMEDIT = @NMEDIT@ -diff --git a/gprofng/libcollector/Makefile.in b/gprofng/libcollector/Makefile.in -index 4448745f17e..ff20f8f0715 100644 --- a/gprofng/libcollector/Makefile.in +++ b/gprofng/libcollector/Makefile.in @@ -316,6 +316,7 @@ CXXFLAGS = @CXXFLAGS@ @@ -10486,8 +10437,6 @@ index 4448745f17e..ff20f8f0715 100644 MKDIR_P = @MKDIR_P@ NM = @NM@ NMEDIT = @NMEDIT@ -diff --git a/gprofng/libcollector/configure b/gprofng/libcollector/configure -index afdf3966baf..877afeb7c01 100755 --- a/gprofng/libcollector/configure +++ b/gprofng/libcollector/configure @@ -640,6 +640,8 @@ OTOOL @@ -10536,7 +10485,7 @@ index afdf3966baf..877afeb7c01 100755 test "X`print -r -- $ECHO 2>/dev/null`" = "X$ECHO"; then ECHO='print -r --' elif test "X`printf %s $ECHO 2>/dev/null`" = "X$ECHO"; then -@@ -6702,8 +6707,8 @@ $as_echo_n "checking whether the shell understands some XSI constructs... " >&6; +@@ -6702,8 +6707,8 @@ $as_echo_n "checking whether the shell u # Try some XSI features xsi_shell=no ( _lt_dummy="a/b/c" @@ -10672,7 +10621,7 @@ index afdf3966baf..877afeb7c01 100755 file_magic_cmd=$lt_cv_file_magic_cmd deplibs_check_method=$lt_cv_deplibs_check_method test -z "$deplibs_check_method" && deplibs_check_method=unknown -@@ -7110,6 +7210,157 @@ test -z "$deplibs_check_method" && deplibs_check_method=unknown +@@ -7110,6 +7210,157 @@ test -z "$deplibs_check_method" && depli @@ -10891,7 +10840,7 @@ index afdf3966baf..877afeb7c01 100755 if test "x$ac_ct_AR" = x; then AR="false" else -@@ -7211,25 +7472,19 @@ ac_tool_warned=yes ;; +@@ -7211,29 +7472,81 @@ ac_tool_warned=yes ;; esac AR=$ac_ct_AR fi @@ -10923,13 +10872,17 @@ index afdf3966baf..877afeb7c01 100755 + rm -f conftest.* +: ${AR=ar} +: ${AR_FLAGS=cru} - - - -@@ -7241,6 +7496,64 @@ test -z "$AR_FLAGS" && AR_FLAGS=cru - - - ++ ++ ++ ++ ++ ++ ++ ++ ++ ++ ++ +{ $as_echo "$as_me:${as_lineno-$LINENO}: checking for archiver @FILE support" >&5 +$as_echo_n "checking for archiver @FILE support... " >&6; } +if ${lt_cv_ar_at_file+:} false; then : @@ -10942,7 +10895,7 @@ index afdf3966baf..877afeb7c01 100755 +int +main () +{ -+ + + ; + return 0; +} @@ -10968,29 +10921,22 @@ index afdf3966baf..877afeb7c01 100755 + fi + fi + rm -f conftest.* libconftest.a -+ + +fi +rm -f core conftest.err conftest.$ac_objext conftest.$ac_ext -+ + +fi +{ $as_echo "$as_me:${as_lineno-$LINENO}: result: $lt_cv_ar_at_file" >&5 +$as_echo "$lt_cv_ar_at_file" >&6; } -+ + +if test "x$lt_cv_ar_at_file" = xno; then + archiver_list_spec= +else + archiver_list_spec=$lt_cv_ar_at_file +fi -+ -+ -+ -+ -+ -+ -+ - if test -n "$ac_tool_prefix"; then - # Extract the first word of "${ac_tool_prefix}strip", so it can be a program name with args. - set dummy ${ac_tool_prefix}strip; ac_word=$2 + + + @@ -7580,8 +7893,8 @@ esac lt_cv_sys_global_symbol_to_cdecl="sed -n -e 's/^T .* \(.*\)$/extern int \1();/p' -e 's/^$symcode* .* \(.*\)$/extern char \1;/p'" @@ -11038,7 +10984,7 @@ index afdf3966baf..877afeb7c01 100755 const char *name; void *address; } -@@ -7695,8 +8021,8 @@ static const void *lt_preloaded_setup() { +@@ -7695,8 +8021,8 @@ static const void *lt_preloaded_setup() _LT_EOF # Now try linking the two files. mv conftest.$ac_objext conftstm.$ac_objext @@ -11060,7 +11006,7 @@ index afdf3966baf..877afeb7c01 100755 else echo "cannot find nm_test_func in $nlist" >&5 fi -@@ -7744,6 +8070,13 @@ else +@@ -7744,6 +8070,25 @@ else $as_echo "ok" >&6; } fi @@ -11071,13 +11017,6 @@ index afdf3966baf..877afeb7c01 100755 + nm_file_list_spec='@' +fi + - - - -@@ -7763,6 +8096,48 @@ fi - - - + + + @@ -11085,9 +11024,21 @@ index afdf3966baf..877afeb7c01 100755 + + + ++ ++ ++ ++ ++ + + + +@@ -7758,8 +8103,38 @@ fi + + + +{ $as_echo "$as_me:${as_lineno-$LINENO}: checking for sysroot" >&5 +$as_echo_n "checking for sysroot... " >&6; } -+ + +# Check whether --with-libtool-sysroot was given. +if test "${with_libtool_sysroot+set}" = set; then : + withval=$with_libtool_sysroot; @@ -11114,15 +11065,12 @@ index afdf3966baf..877afeb7c01 100755 + as_fn_error $? "The sysroot must be an absolute path." "$LINENO" 5 + ;; +esac -+ + + { $as_echo "$as_me:${as_lineno-$LINENO}: result: ${lt_sysroot:-no}" >&5 +$as_echo "${lt_sysroot:-no}" >&6; } -+ -+ -+ - # Check whether --enable-libtool-lock was given. + @@ -7971,6 +8346,123 @@ esac need_locks="$enable_libtool_lock" @@ -11282,7 +11230,7 @@ index afdf3966baf..877afeb7c01 100755 if test "$GCC" = yes; then lt_prog_compiler_wl='-Wl,' -@@ -9286,6 +9788,12 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -9286,6 +9788,12 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='--shared' lt_prog_compiler_static='--static' ;; @@ -11295,7 +11243,7 @@ index afdf3966baf..877afeb7c01 100755 pgcc* | pgf77* | pgf90* | pgf95* | pgfortran*) # Portland Group compilers (*not* the Pentium gcc compiler, # which looks to be a dead project) -@@ -9348,7 +9856,7 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -9348,7 +9856,7 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='-KPIC' lt_prog_compiler_static='-Bstatic' case $cc_basename in @@ -11456,7 +11404,7 @@ index afdf3966baf..877afeb7c01 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" archive_expsym_cmds='$CC -o $output_objdir/$soname $libobjs $deplibs '"\${wl}$no_entry_flag"' $compiler_flags `if test "x${allow_undefined_flag}" != "x"; then func_echo_all "${wl}${allow_undefined_flag}"; else :; fi` '"\${wl}$exp_sym_flag:\$export_symbols $shared_flag" -@@ -10177,7 +10708,13 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -10177,7 +10708,13 @@ if test -z "$aix_libpath"; then aix_libp else # Determine the default libpath from the value encoded in an # empty executable. @@ -11514,7 +11462,7 @@ index afdf3966baf..877afeb7c01 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" # Warning - without using the other run time loading flags, -@@ -10250,20 +10794,63 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -10250,20 +10794,63 @@ if test -z "$aix_libpath"; then aix_libp # Microsoft Visual C++. # hardcode_libdir_flag_spec is actually meaningless, as there is # no search path for DLLs. @@ -11592,7 +11540,7 @@ index afdf3966baf..877afeb7c01 100755 ;; darwin* | rhapsody*) -@@ -10324,7 +10911,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -10324,7 +10911,7 @@ if test -z "$aix_libpath"; then aix_libp # FreeBSD 3 and greater uses gcc -shared to do shared libraries. freebsd* | dragonfly*) @@ -11601,7 +11549,7 @@ index afdf3966baf..877afeb7c01 100755 hardcode_libdir_flag_spec='-R$libdir' hardcode_direct=yes hardcode_shlibpath_var=no -@@ -10332,7 +10919,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -10332,7 +10919,7 @@ if test -z "$aix_libpath"; then aix_libp hpux9*) if test "$GCC" = yes; then @@ -11610,7 +11558,7 @@ index afdf3966baf..877afeb7c01 100755 else archive_cmds='$RM $output_objdir/$soname~$LD -b +b $install_libdir -o $output_objdir/$soname $libobjs $deplibs $linker_flags~test $output_objdir/$soname = $lib || mv $output_objdir/$soname $lib' fi -@@ -10348,7 +10935,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -10348,7 +10935,7 @@ if test -z "$aix_libpath"; then aix_libp hpux10*) if test "$GCC" = yes && test "$with_gnu_ld" = no; then @@ -11619,7 +11567,7 @@ index afdf3966baf..877afeb7c01 100755 else archive_cmds='$LD -b +h $soname +b $install_libdir -o $lib $libobjs $deplibs $linker_flags' fi -@@ -10372,10 +10959,10 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -10372,10 +10959,10 @@ if test -z "$aix_libpath"; then aix_libp archive_cmds='$CC -shared ${wl}+h ${wl}$soname ${wl}+nodefaultrpath -o $lib $libobjs $deplibs $compiler_flags' ;; ia64*) @@ -11677,7 +11625,7 @@ index afdf3966baf..877afeb7c01 100755 else archive_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -o $lib' archive_expsym_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -exports_file $export_symbols -o $lib' -@@ -10555,7 +11155,7 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -10555,7 +11155,7 @@ rm -f core conftest.err conftest.$ac_obj osf4* | osf5*) # as osf3* with the addition of -msym flag if test "$GCC" = yes; then allow_undefined_flag=' ${wl}-expect_unresolved ${wl}\*' @@ -11686,7 +11634,7 @@ index afdf3966baf..877afeb7c01 100755 hardcode_libdir_flag_spec='${wl}-rpath ${wl}$libdir' else allow_undefined_flag=' -expect_unresolved \*' -@@ -10574,9 +11174,9 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -10574,9 +11174,9 @@ rm -f core conftest.err conftest.$ac_obj no_undefined_flag=' -z defs' if test "$GCC" = yes; then wlarc='${wl}' @@ -11843,7 +11791,7 @@ index afdf3966baf..877afeb7c01 100755 compiler=$CC compiler_CXX=$CC for cc_temp in $compiler""; do -@@ -12938,7 +13599,13 @@ $as_echo_n "checking whether the $compiler linker ($LD) supports shared librarie +@@ -12938,7 +13599,13 @@ $as_echo_n "checking whether the $compil allow_undefined_flag_CXX='-berok' # Determine the default libpath from the value encoded in an empty # executable. @@ -11901,7 +11849,7 @@ index afdf3966baf..877afeb7c01 100755 hardcode_libdir_flag_spec_CXX='${wl}-blibpath:$libdir:'"$aix_libpath" -@@ -12979,7 +13653,13 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -12979,7 +13653,13 @@ if test -z "$aix_libpath"; then aix_libp else # Determine the default libpath from the value encoded in an # empty executable. @@ -11959,7 +11907,7 @@ index afdf3966baf..877afeb7c01 100755 hardcode_libdir_flag_spec_CXX='${wl}-blibpath:$libdir:'"$aix_libpath" # Warning - without using the other run time loading flags, -@@ -13050,29 +13737,75 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -13050,29 +13737,75 @@ if test -z "$aix_libpath"; then aix_libp ;; cygwin* | mingw* | pw32* | cegcc*) @@ -12058,7 +12006,7 @@ index afdf3966baf..877afeb7c01 100755 darwin* | rhapsody*) -@@ -13178,7 +13911,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -13178,7 +13911,7 @@ if test -z "$aix_libpath"; then aix_libp ;; *) if test "$GXX" = yes; then @@ -12067,7 +12015,7 @@ index afdf3966baf..877afeb7c01 100755 else # FIXME: insert proper C++ library support ld_shlibs_CXX=no -@@ -13249,10 +13982,10 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -13249,10 +13982,10 @@ if test -z "$aix_libpath"; then aix_libp archive_cmds_CXX='$CC -shared -nostdlib -fPIC ${wl}+h ${wl}$soname ${wl}+nodefaultrpath -o $lib $predep_objects $libobjs $deplibs $postdep_objects $compiler_flags' ;; ia64*) @@ -12080,7 +12028,7 @@ index afdf3966baf..877afeb7c01 100755 ;; esac fi -@@ -13293,9 +14026,9 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -13293,9 +14026,9 @@ if test -z "$aix_libpath"; then aix_libp *) if test "$GXX" = yes; then if test "$with_gnu_ld" = no; then @@ -12092,7 +12040,7 @@ index afdf3966baf..877afeb7c01 100755 fi fi link_all_deplibs_CXX=yes -@@ -13573,7 +14306,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -13573,7 +14306,7 @@ if test -z "$aix_libpath"; then aix_libp archive_cmds_CXX='$CC -shared -nostdlib ${allow_undefined_flag} $predep_objects $libobjs $deplibs $postdep_objects $compiler_flags ${wl}-soname ${wl}$soname `test -n "$verstring" && func_echo_all "${wl}-set_version ${wl}$verstring"` ${wl}-update_registry ${wl}${output_objdir}/so_locations -o $lib' ;; *) @@ -12101,7 +12049,7 @@ index afdf3966baf..877afeb7c01 100755 ;; esac -@@ -13619,7 +14352,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -13619,7 +14352,7 @@ if test -z "$aix_libpath"; then aix_libp solaris*) case $cc_basename in @@ -12110,7 +12058,7 @@ index afdf3966baf..877afeb7c01 100755 # Sun C++ 4.2, 5.x and Centerline C++ archive_cmds_need_lc_CXX=yes no_undefined_flag_CXX=' -zdefs' -@@ -13660,9 +14393,9 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -13660,9 +14393,9 @@ if test -z "$aix_libpath"; then aix_libp if test "$GXX" = yes && test "$with_gnu_ld" = no; then no_undefined_flag_CXX=' ${wl}-z ${wl}defs' if $CC --version | $GREP -v '^2\.7' > /dev/null; then @@ -12136,7 +12084,7 @@ index afdf3966baf..877afeb7c01 100755 if { { eval echo "\"\$as_me\":${as_lineno-$LINENO}: \"$ac_compile\""; } >&5 (eval $ac_compile) 2>&5 ac_status=$? -@@ -13811,7 +14551,7 @@ if { { eval echo "\"\$as_me\":${as_lineno-$LINENO}: \"$ac_compile\""; } >&5 +@@ -13811,7 +14551,7 @@ if { { eval echo "\"\$as_me\":${as_linen pre_test_object_deps_done=no for p in `eval "$output_verbose_link_cmd"`; do @@ -12145,7 +12093,7 @@ index afdf3966baf..877afeb7c01 100755 -L* | -R* | -l*) # Some compilers place space between "-{L,R}" and the path. -@@ -13820,13 +14560,22 @@ if { { eval echo "\"\$as_me\":${as_lineno-$LINENO}: \"$ac_compile\""; } >&5 +@@ -13820,13 +14560,22 @@ if { { eval echo "\"\$as_me\":${as_linen test $p = "-R"; then prev=$p continue @@ -12172,7 +12120,7 @@ index afdf3966baf..877afeb7c01 100755 # Internal compiler library paths should come after those # provided the user. The postdeps already come after the # user supplied libs so there is no need to process them. -@@ -13846,8 +14595,10 @@ if { { eval echo "\"\$as_me\":${as_lineno-$LINENO}: \"$ac_compile\""; } >&5 +@@ -13846,8 +14595,10 @@ if { { eval echo "\"\$as_me\":${as_linen postdeps_CXX="${postdeps_CXX} ${prev}${p}" fi fi @@ -12209,7 +12157,7 @@ index afdf3966baf..877afeb7c01 100755 # C++ specific cases for pic, static, wl, etc. if test "$GXX" = yes; then -@@ -14089,6 +14839,11 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -14089,6 +14839,11 @@ $as_echo_n "checking for $compiler optio ;; esac ;; @@ -12221,7 +12169,7 @@ index afdf3966baf..877afeb7c01 100755 dgux*) case $cc_basename in ec++*) -@@ -14241,7 +14996,7 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -14241,7 +14996,7 @@ $as_echo_n "checking for $compiler optio ;; solaris*) case $cc_basename in @@ -12268,7 +12216,7 @@ index afdf3966baf..877afeb7c01 100755 case $host_os in aix[4-9]*) # If we're using GNU nm, then we don't want the "-C" option. -@@ -14558,15 +15323,20 @@ $as_echo_n "checking whether the $compiler linker ($LD) supports shared librarie +@@ -14558,15 +15323,20 @@ $as_echo_n "checking whether the $compil ;; pw32*) export_symbols_cmds_CXX="$ltdll_cmds" @@ -12387,7 +12335,7 @@ index afdf3966baf..877afeb7c01 100755 LDCXX=$LD LD=$lt_save_LD GCC=$lt_save_GCC -@@ -16359,13 +17189,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_single_quote_subst"`' +@@ -16359,13 +17189,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_ lt_unset='`$ECHO "$lt_unset" | $SED "$delay_single_quote_subst"`' lt_SP2NL='`$ECHO "$lt_SP2NL" | $SED "$delay_single_quote_subst"`' lt_NL2SP='`$ECHO "$lt_NL2SP" | $SED "$delay_single_quote_subst"`' @@ -12408,7 +12356,7 @@ index afdf3966baf..877afeb7c01 100755 STRIP='`$ECHO "$STRIP" | $SED "$delay_single_quote_subst"`' RANLIB='`$ECHO "$RANLIB" | $SED "$delay_single_quote_subst"`' old_postinstall_cmds='`$ECHO "$old_postinstall_cmds" | $SED "$delay_single_quote_subst"`' -@@ -16380,14 +17217,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$lt_cv_sys_global_symbol_pipe" | $SED "$de +@@ -16380,14 +17217,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$l lt_cv_sys_global_symbol_to_cdecl='`$ECHO "$lt_cv_sys_global_symbol_to_cdecl" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address_lib_prefix='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address_lib_prefix" | $SED "$delay_single_quote_subst"`' @@ -12427,7 +12375,7 @@ index afdf3966baf..877afeb7c01 100755 DSYMUTIL='`$ECHO "$DSYMUTIL" | $SED "$delay_single_quote_subst"`' NMEDIT='`$ECHO "$NMEDIT" | $SED "$delay_single_quote_subst"`' LIPO='`$ECHO "$LIPO" | $SED "$delay_single_quote_subst"`' -@@ -16420,12 +17260,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcode_shlibpath_var" | $SED "$delay_single_q +@@ -16420,12 +17260,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcod hardcode_automatic='`$ECHO "$hardcode_automatic" | $SED "$delay_single_quote_subst"`' inherit_rpath='`$ECHO "$inherit_rpath" | $SED "$delay_single_quote_subst"`' link_all_deplibs='`$ECHO "$link_all_deplibs" | $SED "$delay_single_quote_subst"`' @@ -12441,7 +12389,7 @@ index afdf3966baf..877afeb7c01 100755 file_list_spec='`$ECHO "$file_list_spec" | $SED "$delay_single_quote_subst"`' variables_saved_for_relink='`$ECHO "$variables_saved_for_relink" | $SED "$delay_single_quote_subst"`' need_lib_prefix='`$ECHO "$need_lib_prefix" | $SED "$delay_single_quote_subst"`' -@@ -16464,8 +17304,8 @@ old_archive_cmds_CXX='`$ECHO "$old_archive_cmds_CXX" | $SED "$delay_single_quote +@@ -16464,8 +17304,8 @@ old_archive_cmds_CXX='`$ECHO "$old_archi compiler_CXX='`$ECHO "$compiler_CXX" | $SED "$delay_single_quote_subst"`' GCC_CXX='`$ECHO "$GCC_CXX" | $SED "$delay_single_quote_subst"`' lt_prog_compiler_no_builtin_flag_CXX='`$ECHO "$lt_prog_compiler_no_builtin_flag_CXX" | $SED "$delay_single_quote_subst"`' @@ -12451,7 +12399,7 @@ index afdf3966baf..877afeb7c01 100755 lt_prog_compiler_static_CXX='`$ECHO "$lt_prog_compiler_static_CXX" | $SED "$delay_single_quote_subst"`' lt_cv_prog_compiler_c_o_CXX='`$ECHO "$lt_cv_prog_compiler_c_o_CXX" | $SED "$delay_single_quote_subst"`' archive_cmds_need_lc_CXX='`$ECHO "$archive_cmds_need_lc_CXX" | $SED "$delay_single_quote_subst"`' -@@ -16492,12 +17332,12 @@ hardcode_shlibpath_var_CXX='`$ECHO "$hardcode_shlibpath_var_CXX" | $SED "$delay_ +@@ -16492,12 +17332,12 @@ hardcode_shlibpath_var_CXX='`$ECHO "$har hardcode_automatic_CXX='`$ECHO "$hardcode_automatic_CXX" | $SED "$delay_single_quote_subst"`' inherit_rpath_CXX='`$ECHO "$inherit_rpath_CXX" | $SED "$delay_single_quote_subst"`' link_all_deplibs_CXX='`$ECHO "$link_all_deplibs_CXX" | $SED "$delay_single_quote_subst"`' @@ -12593,7 +12541,7 @@ index afdf3966baf..877afeb7c01 100755 # A symbol stripping program. STRIP=$lt_STRIP -@@ -17549,6 +18420,12 @@ global_symbol_to_c_name_address=$lt_lt_cv_sys_global_symbol_to_c_name_address +@@ -17549,6 +18420,12 @@ global_symbol_to_c_name_address=$lt_lt_c # Transform the output of nm in a C name address pair when lib prefix is needed. global_symbol_to_c_name_address_lib_prefix=$lt_lt_cv_sys_global_symbol_to_c_name_address_lib_prefix @@ -12854,15 +12802,9 @@ index afdf3966baf..877afeb7c01 100755 -_LT_EOF - ;; - esac -- -- -- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ -- || (rm -f "$cfgfile"; exit 1) -- -- mv -f "$cfgfile" "$ofile" || + sed '$q' "$ltmain" >> "$cfgfile" \ + || (rm -f "$cfgfile"; exit 1) -+ + + if test x"$xsi_shell" = xyes; then + sed -e '/^func_dirname ()$/,/^} # func_dirname /c\ +func_dirname ()\ @@ -13020,8 +12962,11 @@ index afdf3966baf..877afeb7c01 100755 + { $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: Unable to substitute extended shell functions in $ofile" >&5 +$as_echo "$as_me: WARNING: Unable to substitute extended shell functions in $ofile" >&2;} +fi -+ -+ + +- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ +- || (rm -f "$cfgfile"; exit 1) + +- mv -f "$cfgfile" "$ofile" || + mv -f "$cfgfile" "$ofile" || (rm -f "$ofile" && cp "$cfgfile" "$ofile" && rm -f "$cfgfile") chmod +x "$ofile" @@ -13062,8 +13007,6 @@ index afdf3966baf..877afeb7c01 100755 # Specify filename containing input files. file_list_spec=$lt_file_list_spec_CXX -diff --git a/gprofng/src/Makefile.in b/gprofng/src/Makefile.in -index 0cdd4443670..07fdb4cfc6f 100644 --- a/gprofng/src/Makefile.in +++ b/gprofng/src/Makefile.in @@ -322,6 +322,7 @@ CXXFLAGS = @CXXFLAGS@ @@ -13082,8 +13025,6 @@ index 0cdd4443670..07fdb4cfc6f 100644 MKDIR_P = @MKDIR_P@ NM = @NM@ NMEDIT = @NMEDIT@ -diff --git a/ld/Makefile.in b/ld/Makefile.in -index c3d08edbef1..7ee6acd3e03 100644 --- a/ld/Makefile.in +++ b/ld/Makefile.in @@ -390,6 +390,7 @@ CYGPATH_W = @CYGPATH_W@ @@ -13110,8 +13051,6 @@ index c3d08edbef1..7ee6acd3e03 100644 ac_ct_CC = @ac_ct_CC@ ac_ct_CXX = @ac_ct_CXX@ ac_ct_DUMPBIN = @ac_ct_DUMPBIN@ -diff --git a/ld/configure b/ld/configure -index ca3d58ff618..3cbf90b055f 100755 --- a/ld/configure +++ b/ld/configure @@ -703,8 +703,11 @@ OTOOL @@ -13134,7 +13073,7 @@ index ca3d58ff618..3cbf90b055f 100755 enable_libtool_lock enable_plugins enable_largefile -@@ -1582,6 +1586,8 @@ Optional Packages: +@@ -1587,6 +1591,8 @@ Optional Packages: --with-pic try to use only PIC/non-PIC objects [default=use both] --with-gnu-ld assume the C compiler uses GNU ld [default=no] @@ -13143,7 +13082,7 @@ index ca3d58ff618..3cbf90b055f 100755 --with-lib-path=dir1:dir2... set default LIB_PATH --with-sysroot=DIR Search for usr/lib et al within DIR. --with-gnu-ld assume the C compiler uses GNU ld default=no -@@ -5391,8 +5397,8 @@ esac +@@ -5396,8 +5402,8 @@ esac @@ -13154,7 +13093,7 @@ index ca3d58ff618..3cbf90b055f 100755 -@@ -5432,7 +5438,7 @@ ECHO=$ECHO$ECHO$ECHO$ECHO$ECHO$ECHO +@@ -5437,7 +5443,7 @@ ECHO=$ECHO$ECHO$ECHO$ECHO$ECHO$ECHO { $as_echo "$as_me:${as_lineno-$LINENO}: checking how to print strings" >&5 $as_echo_n "checking how to print strings... " >&6; } # Test print first, because it will be a builtin if present. @@ -13163,7 +13102,7 @@ index ca3d58ff618..3cbf90b055f 100755 test "X`print -r -- $ECHO 2>/dev/null`" = "X$ECHO"; then ECHO='print -r --' elif test "X`printf %s $ECHO 2>/dev/null`" = "X$ECHO"; then -@@ -6125,8 +6131,8 @@ $as_echo_n "checking whether the shell understands some XSI constructs... " >&6; +@@ -6130,8 +6136,8 @@ $as_echo_n "checking whether the shell u # Try some XSI features xsi_shell=no ( _lt_dummy="a/b/c" @@ -13174,7 +13113,7 @@ index ca3d58ff618..3cbf90b055f 100755 && eval 'test $(( 1 + 1 )) -eq 2 \ && test "${#_lt_dummy}" -eq 5' ) >/dev/null 2>&1 \ && xsi_shell=yes -@@ -6175,6 +6181,80 @@ esac +@@ -6180,6 +6186,80 @@ esac @@ -13255,7 +13194,7 @@ index ca3d58ff618..3cbf90b055f 100755 { $as_echo "$as_me:${as_lineno-$LINENO}: checking for $LD option to reload object files" >&5 $as_echo_n "checking for $LD option to reload object files... " >&6; } if ${lt_cv_ld_reload_flag+:} false; then : -@@ -6191,6 +6271,11 @@ case $reload_flag in +@@ -6196,6 +6276,11 @@ case $reload_flag in esac reload_cmds='$LD$reload_flag -o $output$reload_objs' case $host_os in @@ -13267,7 +13206,7 @@ index ca3d58ff618..3cbf90b055f 100755 darwin*) if test "$GCC" = yes; then reload_cmds='$LTCC $LTCFLAGS -nostdlib ${wl}-r -o $output$reload_objs' -@@ -6359,7 +6444,8 @@ mingw* | pw32*) +@@ -6364,7 +6449,8 @@ mingw* | pw32*) lt_cv_deplibs_check_method='file_magic ^x86 archive import|^x86 DLL' lt_cv_file_magic_cmd='func_win32_libid' else @@ -13277,7 +13216,7 @@ index ca3d58ff618..3cbf90b055f 100755 lt_cv_file_magic_cmd='$OBJDUMP -f' fi ;; -@@ -6518,6 +6604,21 @@ esac +@@ -6523,6 +6609,21 @@ esac fi { $as_echo "$as_me:${as_lineno-$LINENO}: result: $lt_cv_deplibs_check_method" >&5 $as_echo "$lt_cv_deplibs_check_method" >&6; } @@ -13299,7 +13238,7 @@ index ca3d58ff618..3cbf90b055f 100755 file_magic_cmd=$lt_cv_file_magic_cmd deplibs_check_method=$lt_cv_deplibs_check_method test -z "$deplibs_check_method" && deplibs_check_method=unknown -@@ -6533,6 +6634,157 @@ test -z "$deplibs_check_method" && deplibs_check_method=unknown +@@ -6538,6 +6639,157 @@ test -z "$deplibs_check_method" && depli @@ -13457,7 +13396,7 @@ index ca3d58ff618..3cbf90b055f 100755 plugin_option= plugin_names="liblto_plugin.so liblto_plugin-0.dll cyglto_plugin-0.dll" for plugin in $plugin_names; do -@@ -6547,8 +6799,10 @@ for plugin in $plugin_names; do +@@ -6552,8 +6804,10 @@ for plugin in $plugin_names; do done if test -n "$ac_tool_prefix"; then @@ -13470,7 +13409,7 @@ index ca3d58ff618..3cbf90b055f 100755 { $as_echo "$as_me:${as_lineno-$LINENO}: checking for $ac_word" >&5 $as_echo_n "checking for $ac_word... " >&6; } if ${ac_cv_prog_AR+:} false; then : -@@ -6564,7 +6818,7 @@ do +@@ -6569,7 +6823,7 @@ do test -z "$as_dir" && as_dir=. for ac_exec_ext in '' $ac_executable_extensions; do if as_fn_executable_p "$as_dir/$ac_word$ac_exec_ext"; then @@ -13479,7 +13418,7 @@ index ca3d58ff618..3cbf90b055f 100755 $as_echo "$as_me:${as_lineno-$LINENO}: found $as_dir/$ac_word$ac_exec_ext" >&5 break 2 fi -@@ -6584,11 +6838,15 @@ $as_echo "no" >&6; } +@@ -6589,11 +6843,15 @@ $as_echo "no" >&6; } fi @@ -13498,7 +13437,7 @@ index ca3d58ff618..3cbf90b055f 100755 { $as_echo "$as_me:${as_lineno-$LINENO}: checking for $ac_word" >&5 $as_echo_n "checking for $ac_word... " >&6; } if ${ac_cv_prog_ac_ct_AR+:} false; then : -@@ -6604,7 +6862,7 @@ do +@@ -6609,7 +6867,7 @@ do test -z "$as_dir" && as_dir=. for ac_exec_ext in '' $ac_executable_extensions; do if as_fn_executable_p "$as_dir/$ac_word$ac_exec_ext"; then @@ -13507,7 +13446,7 @@ index ca3d58ff618..3cbf90b055f 100755 $as_echo "$as_me:${as_lineno-$LINENO}: found $as_dir/$ac_word$ac_exec_ext" >&5 break 2 fi -@@ -6623,6 +6881,10 @@ else +@@ -6628,6 +6886,10 @@ else $as_echo "no" >&6; } fi @@ -13518,7 +13457,7 @@ index ca3d58ff618..3cbf90b055f 100755 if test "x$ac_ct_AR" = x; then AR="false" else -@@ -6634,29 +6896,81 @@ ac_tool_warned=yes ;; +@@ -6639,25 +6901,19 @@ ac_tool_warned=yes ;; esac AR=$ac_ct_AR fi @@ -13550,16 +13489,12 @@ index ca3d58ff618..3cbf90b055f 100755 + rm -f conftest.* +: ${AR=ar} +: ${AR_FLAGS=cru} -+ -+ -+ -+ -+ -+ -+ -+ -+ -+ + + + +@@ -6669,6 +6925,64 @@ test -z "$AR_FLAGS" && AR_FLAGS=cru + + +{ $as_echo "$as_me:${as_lineno-$LINENO}: checking for archiver @FILE support" >&5 +$as_echo_n "checking for archiver @FILE support... " >&6; } @@ -13573,7 +13508,7 @@ index ca3d58ff618..3cbf90b055f 100755 +int +main () +{ - ++ + ; + return 0; +} @@ -13602,20 +13537,27 @@ index ca3d58ff618..3cbf90b055f 100755 + +fi +rm -f core conftest.err conftest.$ac_objext conftest.$ac_ext - ++ +fi +{ $as_echo "$as_me:${as_lineno-$LINENO}: result: $lt_cv_ar_at_file" >&5 +$as_echo "$lt_cv_ar_at_file" >&6; } - ++ +if test "x$lt_cv_ar_at_file" = xno; then + archiver_list_spec= +else + archiver_list_spec=$lt_cv_ar_at_file +fi - - - -@@ -7003,8 +7317,8 @@ esac ++ ++ ++ ++ ++ ++ ++ + if test -n "$ac_tool_prefix"; then + # Extract the first word of "${ac_tool_prefix}strip", so it can be a program name with args. + set dummy ${ac_tool_prefix}strip; ac_word=$2 +@@ -7008,8 +7322,8 @@ esac lt_cv_sys_global_symbol_to_cdecl="sed -n -e 's/^T .* \(.*\)$/extern int \1();/p' -e 's/^$symcode* .* \(.*\)$/extern char \1;/p'" # Transform an extracted symbol line into symbol name and symbol address @@ -13626,7 +13568,7 @@ index ca3d58ff618..3cbf90b055f 100755 # Handle CRLF in mingw tool chain opt_cr= -@@ -7040,6 +7354,7 @@ for ac_symprfx in "" "_"; do +@@ -7045,6 +7359,7 @@ for ac_symprfx in "" "_"; do else lt_cv_sys_global_symbol_pipe="sed -n -e 's/^.*[ ]\($symcode$symcode*\)[ ][ ]*$ac_symprfx$sympat$opt_cr$/$symxfrm/p'" fi @@ -13634,7 +13576,7 @@ index ca3d58ff618..3cbf90b055f 100755 # Check to see that the pipe works correctly. pipe_works=no -@@ -7081,6 +7396,18 @@ _LT_EOF +@@ -7086,6 +7401,18 @@ _LT_EOF if $GREP ' nm_test_var$' "$nlist" >/dev/null; then if $GREP ' nm_test_func$' "$nlist" >/dev/null; then cat <<_LT_EOF > conftest.$ac_ext @@ -13653,7 +13595,7 @@ index ca3d58ff618..3cbf90b055f 100755 #ifdef __cplusplus extern "C" { #endif -@@ -7092,7 +7419,7 @@ _LT_EOF +@@ -7097,7 +7424,7 @@ _LT_EOF cat <<_LT_EOF >> conftest.$ac_ext /* The mapping between symbol names and symbols. */ @@ -13662,7 +13604,7 @@ index ca3d58ff618..3cbf90b055f 100755 const char *name; void *address; } -@@ -7118,8 +7445,8 @@ static const void *lt_preloaded_setup() { +@@ -7123,8 +7450,8 @@ static const void *lt_preloaded_setup() _LT_EOF # Now try linking the two files. mv conftest.$ac_objext conftstm.$ac_objext @@ -13673,7 +13615,7 @@ index ca3d58ff618..3cbf90b055f 100755 LIBS="conftstm.$ac_objext" CFLAGS="$CFLAGS$lt_prog_compiler_no_builtin_flag" if { { eval echo "\"\$as_me\":${as_lineno-$LINENO}: \"$ac_link\""; } >&5 -@@ -7129,8 +7456,8 @@ _LT_EOF +@@ -7134,8 +7461,8 @@ _LT_EOF test $ac_status = 0; } && test -s conftest${ac_exeext}; then pipe_works=yes fi @@ -13684,7 +13626,7 @@ index ca3d58ff618..3cbf90b055f 100755 else echo "cannot find nm_test_func in $nlist" >&5 fi -@@ -7167,6 +7494,27 @@ else +@@ -7172,6 +7499,20 @@ else $as_echo "ok" >&6; } fi @@ -13702,31 +13644,24 @@ index ca3d58ff618..3cbf90b055f 100755 + + + -+ -+ -+ -+ -+ -+ -+ -@@ -7179,10 +7527,38 @@ fi +@@ -7191,6 +7532,41 @@ fi +{ $as_echo "$as_me:${as_lineno-$LINENO}: checking for sysroot" >&5 +$as_echo_n "checking for sysroot... " >&6; } - ++ +# Check whether --with-libtool-sysroot was given. +if test "${with_libtool_sysroot+set}" = set; then : + withval=$with_libtool_sysroot; +else + with_libtool_sysroot=no +fi - - ++ ++ +lt_sysroot= +case ${with_libtool_sysroot} in #( + yes) @@ -13745,13 +13680,16 @@ index ca3d58ff618..3cbf90b055f 100755 + as_fn_error $? "The sysroot must be an absolute path." "$LINENO" 5 + ;; +esac - ++ + { $as_echo "$as_me:${as_lineno-$LINENO}: result: ${lt_sysroot:-no}" >&5 +$as_echo "${lt_sysroot:-no}" >&6; } ++ ++ ++ - -@@ -7394,6 +7770,123 @@ esac + # Check whether --enable-libtool-lock was given. +@@ -7399,6 +7775,123 @@ esac need_locks="$enable_libtool_lock" @@ -13875,7 +13813,7 @@ index ca3d58ff618..3cbf90b055f 100755 case $host_os in rhapsody* | darwin*) -@@ -7957,6 +8450,8 @@ _LT_EOF +@@ -7962,6 +8455,8 @@ _LT_EOF $LTCC $LTCFLAGS -c -o conftest.o conftest.c 2>&5 echo "$AR cru libconftest.a conftest.o" >&5 $AR cru libconftest.a conftest.o 2>&5 @@ -13884,7 +13822,7 @@ index ca3d58ff618..3cbf90b055f 100755 cat > conftest.c << _LT_EOF int main() { return 0;} _LT_EOF -@@ -8027,6 +8522,16 @@ done +@@ -8032,6 +8527,16 @@ done @@ -13901,7 +13839,7 @@ index ca3d58ff618..3cbf90b055f 100755 # Set options -@@ -8542,8 +9047,6 @@ fi +@@ -8547,8 +9052,6 @@ fi lt_prog_compiler_pic= lt_prog_compiler_static= @@ -13910,7 +13848,7 @@ index ca3d58ff618..3cbf90b055f 100755 if test "$GCC" = yes; then lt_prog_compiler_wl='-Wl,' -@@ -8709,6 +9212,12 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -8714,6 +9217,12 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='--shared' lt_prog_compiler_static='--static' ;; @@ -13923,7 +13861,7 @@ index ca3d58ff618..3cbf90b055f 100755 pgcc* | pgf77* | pgf90* | pgf95* | pgfortran*) # Portland Group compilers (*not* the Pentium gcc compiler, # which looks to be a dead project) -@@ -8771,7 +9280,7 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -8776,7 +9285,7 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='-KPIC' lt_prog_compiler_static='-Bstatic' case $cc_basename in @@ -13932,7 +13870,7 @@ index ca3d58ff618..3cbf90b055f 100755 lt_prog_compiler_wl='-Qoption ld ';; *) lt_prog_compiler_wl='-Wl,';; -@@ -8828,13 +9337,17 @@ case $host_os in +@@ -8833,13 +9342,17 @@ case $host_os in lt_prog_compiler_pic="$lt_prog_compiler_pic -DPIC" ;; esac @@ -13956,7 +13894,7 @@ index ca3d58ff618..3cbf90b055f 100755 # # Check to make sure the PIC flag actually works. -@@ -8895,6 +9408,11 @@ fi +@@ -8900,6 +9413,11 @@ fi @@ -13968,7 +13906,7 @@ index ca3d58ff618..3cbf90b055f 100755 # # Check to make sure the static flag actually works. # -@@ -9245,7 +9763,8 @@ _LT_EOF +@@ -9250,7 +9768,8 @@ _LT_EOF allow_undefined_flag=unsupported always_export_symbols=no enable_shared_with_static_runtimes=yes @@ -13978,7 +13916,7 @@ index ca3d58ff618..3cbf90b055f 100755 if $LD --help 2>&1 | $GREP 'auto-import' > /dev/null; then archive_cmds='$CC -shared $libobjs $deplibs $compiler_flags -o $output_objdir/$soname ${wl}--enable-auto-image-base -Xlinker --out-implib -Xlinker $lib' -@@ -9344,12 +9863,12 @@ _LT_EOF +@@ -9349,12 +9868,12 @@ _LT_EOF whole_archive_flag_spec='--whole-archive$convenience --no-whole-archive' hardcode_libdir_flag_spec= hardcode_libdir_flag_spec_ld='-rpath $libdir' @@ -13993,7 +13931,7 @@ index ca3d58ff618..3cbf90b055f 100755 fi ;; esac -@@ -9363,8 +9882,8 @@ _LT_EOF +@@ -9368,8 +9887,8 @@ _LT_EOF archive_cmds='$LD -Bshareable $libobjs $deplibs $linker_flags -o $lib' wlarc= else @@ -14004,7 +13942,7 @@ index ca3d58ff618..3cbf90b055f 100755 fi ;; -@@ -9382,8 +9901,8 @@ _LT_EOF +@@ -9387,8 +9906,8 @@ _LT_EOF _LT_EOF elif $LD --help 2>&1 | $GREP ': supported targets:.* elf' > /dev/null; then @@ -14015,7 +13953,7 @@ index ca3d58ff618..3cbf90b055f 100755 else ld_shlibs=no fi -@@ -9429,8 +9948,8 @@ _LT_EOF +@@ -9434,8 +9953,8 @@ _LT_EOF *) if $LD --help 2>&1 | $GREP ': supported targets:.* elf' > /dev/null; then @@ -14026,7 +13964,7 @@ index ca3d58ff618..3cbf90b055f 100755 else ld_shlibs=no fi -@@ -9560,7 +10079,13 @@ _LT_EOF +@@ -9565,7 +10084,13 @@ _LT_EOF allow_undefined_flag='-berok' # Determine the default libpath from the value encoded in an # empty executable. @@ -14041,7 +13979,7 @@ index ca3d58ff618..3cbf90b055f 100755 /* end confdefs.h. */ int -@@ -9573,22 +10098,29 @@ main () +@@ -9578,22 +10103,29 @@ main () _ACEOF if ac_fn_c_try_link "$LINENO"; then : @@ -14084,7 +14022,7 @@ index ca3d58ff618..3cbf90b055f 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" archive_expsym_cmds='$CC -o $output_objdir/$soname $libobjs $deplibs '"\${wl}$no_entry_flag"' $compiler_flags `if test "x${allow_undefined_flag}" != "x"; then func_echo_all "${wl}${allow_undefined_flag}"; else :; fi` '"\${wl}$exp_sym_flag:\$export_symbols $shared_flag" -@@ -9600,7 +10132,13 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9605,7 +10137,13 @@ if test -z "$aix_libpath"; then aix_libp else # Determine the default libpath from the value encoded in an # empty executable. @@ -14099,7 +14037,7 @@ index ca3d58ff618..3cbf90b055f 100755 /* end confdefs.h. */ int -@@ -9613,22 +10151,29 @@ main () +@@ -9618,22 +10156,29 @@ main () _ACEOF if ac_fn_c_try_link "$LINENO"; then : @@ -14142,7 +14080,7 @@ index ca3d58ff618..3cbf90b055f 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" # Warning - without using the other run time loading flags, -@@ -9673,20 +10218,63 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9678,20 +10223,63 @@ if test -z "$aix_libpath"; then aix_libp # Microsoft Visual C++. # hardcode_libdir_flag_spec is actually meaningless, as there is # no search path for DLLs. @@ -14220,7 +14158,7 @@ index ca3d58ff618..3cbf90b055f 100755 ;; darwin* | rhapsody*) -@@ -9747,7 +10335,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9752,7 +10340,7 @@ if test -z "$aix_libpath"; then aix_libp # FreeBSD 3 and greater uses gcc -shared to do shared libraries. freebsd* | dragonfly*) @@ -14229,7 +14167,7 @@ index ca3d58ff618..3cbf90b055f 100755 hardcode_libdir_flag_spec='-R$libdir' hardcode_direct=yes hardcode_shlibpath_var=no -@@ -9755,7 +10343,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9760,7 +10348,7 @@ if test -z "$aix_libpath"; then aix_libp hpux9*) if test "$GCC" = yes; then @@ -14238,7 +14176,7 @@ index ca3d58ff618..3cbf90b055f 100755 else archive_cmds='$RM $output_objdir/$soname~$LD -b +b $install_libdir -o $output_objdir/$soname $libobjs $deplibs $linker_flags~test $output_objdir/$soname = $lib || mv $output_objdir/$soname $lib' fi -@@ -9771,7 +10359,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9776,7 +10364,7 @@ if test -z "$aix_libpath"; then aix_libp hpux10*) if test "$GCC" = yes && test "$with_gnu_ld" = no; then @@ -14247,7 +14185,7 @@ index ca3d58ff618..3cbf90b055f 100755 else archive_cmds='$LD -b +h $soname +b $install_libdir -o $lib $libobjs $deplibs $linker_flags' fi -@@ -9795,10 +10383,10 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9800,10 +10388,10 @@ if test -z "$aix_libpath"; then aix_libp archive_cmds='$CC -shared ${wl}+h ${wl}$soname ${wl}+nodefaultrpath -o $lib $libobjs $deplibs $compiler_flags' ;; ia64*) @@ -14260,7 +14198,7 @@ index ca3d58ff618..3cbf90b055f 100755 ;; esac else -@@ -9877,23 +10465,36 @@ fi +@@ -9882,23 +10470,36 @@ fi irix5* | irix6* | nonstopux*) if test "$GCC" = yes; then @@ -14305,7 +14243,7 @@ index ca3d58ff618..3cbf90b055f 100755 else archive_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -o $lib' archive_expsym_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -exports_file $export_symbols -o $lib' -@@ -9978,7 +10579,7 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -9983,7 +10584,7 @@ rm -f core conftest.err conftest.$ac_obj osf4* | osf5*) # as osf3* with the addition of -msym flag if test "$GCC" = yes; then allow_undefined_flag=' ${wl}-expect_unresolved ${wl}\*' @@ -14314,7 +14252,7 @@ index ca3d58ff618..3cbf90b055f 100755 hardcode_libdir_flag_spec='${wl}-rpath ${wl}$libdir' else allow_undefined_flag=' -expect_unresolved \*' -@@ -9997,9 +10598,9 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -10002,9 +10603,9 @@ rm -f core conftest.err conftest.$ac_obj no_undefined_flag=' -z defs' if test "$GCC" = yes; then wlarc='${wl}' @@ -14326,7 +14264,7 @@ index ca3d58ff618..3cbf90b055f 100755 else case `$CC -V 2>&1` in *"Compilers 5.0"*) -@@ -10575,8 +11176,9 @@ cygwin* | mingw* | pw32* | cegcc*) +@@ -10580,8 +11181,9 @@ cygwin* | mingw* | pw32* | cegcc*) need_version=no need_lib_prefix=no @@ -14338,7 +14276,7 @@ index ca3d58ff618..3cbf90b055f 100755 library_names_spec='$libname.dll.a' # DLL is installed to $(libdir)/../bin by postinstall_cmds postinstall_cmds='base_file=`basename \${file}`~ -@@ -10609,13 +11211,71 @@ cygwin* | mingw* | pw32* | cegcc*) +@@ -10614,13 +11216,71 @@ cygwin* | mingw* | pw32* | cegcc*) library_names_spec='`echo ${libname} | sed -e 's/^lib/pw/'``echo ${release} | $SED -e 's/[.]/-/g'`${versuffix}${shared_ext}' ;; esac @@ -14411,16 +14349,16 @@ index ca3d58ff618..3cbf90b055f 100755 # FIXME: first we should search . and the directory the executable is in shlibpath_var=PATH ;; -@@ -11517,7 +12177,7 @@ else +@@ -11522,7 +12182,7 @@ else lt_dlunknown=0; lt_dlno_uscore=1; lt_dlneed_uscore=2 lt_status=$lt_dlunknown cat > conftest.$ac_ext <<_LT_EOF --#line 11520 "configure" +-#line 11525 "configure" +#line $LINENO "configure" #include "confdefs.h" #if HAVE_DLFCN_H -@@ -11561,10 +12221,10 @@ else +@@ -11566,10 +12226,10 @@ else /* When -fvisbility=hidden is used, assume the code has been annotated correspondingly for the symbols needed. */ #if defined(__GNUC__) && (((__GNUC__ == 3) && (__GNUC_MINOR__ >= 3)) || (__GNUC__ > 3)) @@ -14433,16 +14371,16 @@ index ca3d58ff618..3cbf90b055f 100755 int main () { void *self = dlopen (0, LT_DLGLOBAL|LT_DLLAZY_OR_NOW); -@@ -11623,7 +12283,7 @@ else +@@ -11628,7 +12288,7 @@ else lt_dlunknown=0; lt_dlno_uscore=1; lt_dlneed_uscore=2 lt_status=$lt_dlunknown cat > conftest.$ac_ext <<_LT_EOF --#line 11626 "configure" +-#line 11631 "configure" +#line $LINENO "configure" #include "confdefs.h" #if HAVE_DLFCN_H -@@ -11667,10 +12327,10 @@ else +@@ -11672,10 +12332,10 @@ else /* When -fvisbility=hidden is used, assume the code has been annotated correspondingly for the symbols needed. */ #if defined(__GNUC__) && (((__GNUC__ == 3) && (__GNUC_MINOR__ >= 3)) || (__GNUC__ > 3)) @@ -14455,7 +14393,7 @@ index ca3d58ff618..3cbf90b055f 100755 int main () { void *self = dlopen (0, LT_DLGLOBAL|LT_DLLAZY_OR_NOW); -@@ -12062,6 +12722,7 @@ $RM -r conftest* +@@ -12067,6 +12727,7 @@ $RM -r conftest* # Allow CC to be a program name with arguments. lt_save_CC=$CC @@ -14463,7 +14401,7 @@ index ca3d58ff618..3cbf90b055f 100755 lt_save_LD=$LD lt_save_GCC=$GCC GCC=$GXX -@@ -12079,6 +12740,7 @@ $RM -r conftest* +@@ -12084,6 +12745,7 @@ $RM -r conftest* fi test -z "${LDCXX+set}" || LD=$LDCXX CC=${CXX-"c++"} @@ -14471,7 +14409,7 @@ index ca3d58ff618..3cbf90b055f 100755 compiler=$CC compiler_CXX=$CC for cc_temp in $compiler""; do -@@ -12361,7 +13023,13 @@ $as_echo_n "checking whether the $compiler linker ($LD) supports shared librarie +@@ -12366,7 +13028,13 @@ $as_echo_n "checking whether the $compil allow_undefined_flag_CXX='-berok' # Determine the default libpath from the value encoded in an empty # executable. @@ -14486,7 +14424,7 @@ index ca3d58ff618..3cbf90b055f 100755 /* end confdefs.h. */ int -@@ -12374,22 +13042,29 @@ main () +@@ -12379,22 +13047,29 @@ main () _ACEOF if ac_fn_cxx_try_link "$LINENO"; then : @@ -14529,7 +14467,7 @@ index ca3d58ff618..3cbf90b055f 100755 hardcode_libdir_flag_spec_CXX='${wl}-blibpath:$libdir:'"$aix_libpath" -@@ -12402,7 +13077,13 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -12407,7 +13082,13 @@ if test -z "$aix_libpath"; then aix_libp else # Determine the default libpath from the value encoded in an # empty executable. @@ -14544,7 +14482,7 @@ index ca3d58ff618..3cbf90b055f 100755 /* end confdefs.h. */ int -@@ -12415,22 +13096,29 @@ main () +@@ -12420,22 +13101,29 @@ main () _ACEOF if ac_fn_cxx_try_link "$LINENO"; then : @@ -14587,7 +14525,7 @@ index ca3d58ff618..3cbf90b055f 100755 hardcode_libdir_flag_spec_CXX='${wl}-blibpath:$libdir:'"$aix_libpath" # Warning - without using the other run time loading flags, -@@ -12473,29 +13161,75 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -12478,29 +13166,75 @@ if test -z "$aix_libpath"; then aix_libp ;; cygwin* | mingw* | pw32* | cegcc*) @@ -14686,7 +14624,7 @@ index ca3d58ff618..3cbf90b055f 100755 darwin* | rhapsody*) -@@ -12601,7 +13335,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -12606,7 +13340,7 @@ if test -z "$aix_libpath"; then aix_libp ;; *) if test "$GXX" = yes; then @@ -14695,7 +14633,7 @@ index ca3d58ff618..3cbf90b055f 100755 else # FIXME: insert proper C++ library support ld_shlibs_CXX=no -@@ -12672,10 +13406,10 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -12677,10 +13411,10 @@ if test -z "$aix_libpath"; then aix_libp archive_cmds_CXX='$CC -shared -nostdlib -fPIC ${wl}+h ${wl}$soname ${wl}+nodefaultrpath -o $lib $predep_objects $libobjs $deplibs $postdep_objects $compiler_flags' ;; ia64*) @@ -14708,7 +14646,7 @@ index ca3d58ff618..3cbf90b055f 100755 ;; esac fi -@@ -12716,9 +13450,9 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -12721,9 +13455,9 @@ if test -z "$aix_libpath"; then aix_libp *) if test "$GXX" = yes; then if test "$with_gnu_ld" = no; then @@ -14720,7 +14658,7 @@ index ca3d58ff618..3cbf90b055f 100755 fi fi link_all_deplibs_CXX=yes -@@ -12996,7 +13730,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -13001,7 +13735,7 @@ if test -z "$aix_libpath"; then aix_libp archive_cmds_CXX='$CC -shared -nostdlib ${allow_undefined_flag} $predep_objects $libobjs $deplibs $postdep_objects $compiler_flags ${wl}-soname ${wl}$soname `test -n "$verstring" && func_echo_all "${wl}-set_version ${wl}$verstring"` ${wl}-update_registry ${wl}${output_objdir}/so_locations -o $lib' ;; *) @@ -14729,7 +14667,7 @@ index ca3d58ff618..3cbf90b055f 100755 ;; esac -@@ -13042,7 +13776,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -13047,7 +13781,7 @@ if test -z "$aix_libpath"; then aix_libp solaris*) case $cc_basename in @@ -14738,7 +14676,7 @@ index ca3d58ff618..3cbf90b055f 100755 # Sun C++ 4.2, 5.x and Centerline C++ archive_cmds_need_lc_CXX=yes no_undefined_flag_CXX=' -zdefs' -@@ -13083,9 +13817,9 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -13088,9 +13822,9 @@ if test -z "$aix_libpath"; then aix_libp if test "$GXX" = yes && test "$with_gnu_ld" = no; then no_undefined_flag_CXX=' ${wl}-z ${wl}defs' if $CC --version | $GREP -v '^2\.7' > /dev/null; then @@ -14750,7 +14688,7 @@ index ca3d58ff618..3cbf90b055f 100755 # Commands to make compiler produce verbose output that lists # what "hidden" libraries, object files and flags are used when -@@ -13221,6 +13955,13 @@ private: +@@ -13226,6 +13960,13 @@ private: }; _LT_EOF @@ -14764,7 +14702,7 @@ index ca3d58ff618..3cbf90b055f 100755 if { { eval echo "\"\$as_me\":${as_lineno-$LINENO}: \"$ac_compile\""; } >&5 (eval $ac_compile) 2>&5 ac_status=$? -@@ -13234,7 +13975,7 @@ if { { eval echo "\"\$as_me\":${as_lineno-$LINENO}: \"$ac_compile\""; } >&5 +@@ -13239,7 +13980,7 @@ if { { eval echo "\"\$as_me\":${as_linen pre_test_object_deps_done=no for p in `eval "$output_verbose_link_cmd"`; do @@ -14773,7 +14711,7 @@ index ca3d58ff618..3cbf90b055f 100755 -L* | -R* | -l*) # Some compilers place space between "-{L,R}" and the path. -@@ -13243,13 +13984,22 @@ if { { eval echo "\"\$as_me\":${as_lineno-$LINENO}: \"$ac_compile\""; } >&5 +@@ -13248,13 +13989,22 @@ if { { eval echo "\"\$as_me\":${as_linen test $p = "-R"; then prev=$p continue @@ -14800,7 +14738,7 @@ index ca3d58ff618..3cbf90b055f 100755 # Internal compiler library paths should come after those # provided the user. The postdeps already come after the # user supplied libs so there is no need to process them. -@@ -13269,8 +14019,10 @@ if { { eval echo "\"\$as_me\":${as_lineno-$LINENO}: \"$ac_compile\""; } >&5 +@@ -13274,8 +14024,10 @@ if { { eval echo "\"\$as_me\":${as_linen postdeps_CXX="${postdeps_CXX} ${prev}${p}" fi fi @@ -14811,7 +14749,7 @@ index ca3d58ff618..3cbf90b055f 100755 *.$objext) # This assumes that the test object file only shows up # once in the compiler output. -@@ -13306,6 +14058,7 @@ else +@@ -13311,6 +14063,7 @@ else fi $RM -f confest.$objext @@ -14819,7 +14757,7 @@ index ca3d58ff618..3cbf90b055f 100755 # PORTME: override above test on systems where it is broken case $host_os in -@@ -13341,7 +14094,7 @@ linux*) +@@ -13346,7 +14099,7 @@ linux*) solaris*) case $cc_basename in @@ -14828,7 +14766,7 @@ index ca3d58ff618..3cbf90b055f 100755 # The more standards-conforming stlport4 library is # incompatible with the Cstd library. Avoid specifying # it if it's in CXXFLAGS. Ignore libCrun as -@@ -13406,8 +14159,6 @@ fi +@@ -13411,8 +14164,6 @@ fi lt_prog_compiler_pic_CXX= lt_prog_compiler_static_CXX= @@ -14837,7 +14775,7 @@ index ca3d58ff618..3cbf90b055f 100755 # C++ specific cases for pic, static, wl, etc. if test "$GXX" = yes; then -@@ -13512,6 +14263,11 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -13517,6 +14268,11 @@ $as_echo_n "checking for $compiler optio ;; esac ;; @@ -14849,7 +14787,7 @@ index ca3d58ff618..3cbf90b055f 100755 dgux*) case $cc_basename in ec++*) -@@ -13664,7 +14420,7 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -13669,7 +14425,7 @@ $as_echo_n "checking for $compiler optio ;; solaris*) case $cc_basename in @@ -14858,7 +14796,7 @@ index ca3d58ff618..3cbf90b055f 100755 # Sun C++ 4.2, 5.x and Centerline C++ lt_prog_compiler_pic_CXX='-KPIC' lt_prog_compiler_static_CXX='-Bstatic' -@@ -13729,10 +14485,17 @@ case $host_os in +@@ -13734,10 +14490,17 @@ case $host_os in lt_prog_compiler_pic_CXX="$lt_prog_compiler_pic_CXX -DPIC" ;; esac @@ -14879,7 +14817,7 @@ index ca3d58ff618..3cbf90b055f 100755 # # Check to make sure the PIC flag actually works. -@@ -13790,6 +14553,8 @@ fi +@@ -13795,6 +14558,8 @@ fi @@ -14888,7 +14826,7 @@ index ca3d58ff618..3cbf90b055f 100755 # # Check to make sure the static flag actually works. # -@@ -13967,6 +14732,7 @@ fi +@@ -13972,6 +14737,7 @@ fi $as_echo_n "checking whether the $compiler linker ($LD) supports shared libraries... " >&6; } export_symbols_cmds_CXX='$NM $libobjs $convenience | $global_symbol_pipe | $SED '\''s/.* //'\'' | sort | uniq > $export_symbols' @@ -14896,7 +14834,7 @@ index ca3d58ff618..3cbf90b055f 100755 case $host_os in aix[4-9]*) # If we're using GNU nm, then we don't want the "-C" option. -@@ -13981,15 +14747,20 @@ $as_echo_n "checking whether the $compiler linker ($LD) supports shared librarie +@@ -13986,15 +14752,20 @@ $as_echo_n "checking whether the $compil ;; pw32*) export_symbols_cmds_CXX="$ltdll_cmds" @@ -14922,7 +14860,7 @@ index ca3d58ff618..3cbf90b055f 100755 { $as_echo "$as_me:${as_lineno-$LINENO}: result: $ld_shlibs_CXX" >&5 $as_echo "$ld_shlibs_CXX" >&6; } -@@ -14252,8 +15023,9 @@ cygwin* | mingw* | pw32* | cegcc*) +@@ -14257,8 +15028,9 @@ cygwin* | mingw* | pw32* | cegcc*) need_version=no need_lib_prefix=no @@ -14934,7 +14872,7 @@ index ca3d58ff618..3cbf90b055f 100755 library_names_spec='$libname.dll.a' # DLL is installed to $(libdir)/../bin by postinstall_cmds postinstall_cmds='base_file=`basename \${file}`~ -@@ -14285,13 +15057,71 @@ cygwin* | mingw* | pw32* | cegcc*) +@@ -14290,13 +15062,71 @@ cygwin* | mingw* | pw32* | cegcc*) library_names_spec='`echo ${libname} | sed -e 's/^lib/pw/'``echo ${release} | $SED -e 's/[.]/-/g'`${versuffix}${shared_ext}' ;; esac @@ -15007,7 +14945,7 @@ index ca3d58ff618..3cbf90b055f 100755 # FIXME: first we should search . and the directory the executable is in shlibpath_var=PATH ;; -@@ -14855,6 +15685,7 @@ fi +@@ -14860,6 +15690,7 @@ fi fi # test -n "$compiler" CC=$lt_save_CC @@ -15015,7 +14953,7 @@ index ca3d58ff618..3cbf90b055f 100755 LDCXX=$LD LD=$lt_save_LD GCC=$lt_save_GCC -@@ -19900,13 +20731,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_single_quote_subst"`' +@@ -19949,13 +20780,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_ lt_unset='`$ECHO "$lt_unset" | $SED "$delay_single_quote_subst"`' lt_SP2NL='`$ECHO "$lt_SP2NL" | $SED "$delay_single_quote_subst"`' lt_NL2SP='`$ECHO "$lt_NL2SP" | $SED "$delay_single_quote_subst"`' @@ -15036,7 +14974,7 @@ index ca3d58ff618..3cbf90b055f 100755 STRIP='`$ECHO "$STRIP" | $SED "$delay_single_quote_subst"`' RANLIB='`$ECHO "$RANLIB" | $SED "$delay_single_quote_subst"`' old_postinstall_cmds='`$ECHO "$old_postinstall_cmds" | $SED "$delay_single_quote_subst"`' -@@ -19921,14 +20759,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$lt_cv_sys_global_symbol_pipe" | $SED "$de +@@ -19970,14 +20808,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$l lt_cv_sys_global_symbol_to_cdecl='`$ECHO "$lt_cv_sys_global_symbol_to_cdecl" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address_lib_prefix='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address_lib_prefix" | $SED "$delay_single_quote_subst"`' @@ -15055,7 +14993,7 @@ index ca3d58ff618..3cbf90b055f 100755 DSYMUTIL='`$ECHO "$DSYMUTIL" | $SED "$delay_single_quote_subst"`' NMEDIT='`$ECHO "$NMEDIT" | $SED "$delay_single_quote_subst"`' LIPO='`$ECHO "$LIPO" | $SED "$delay_single_quote_subst"`' -@@ -19961,12 +20802,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcode_shlibpath_var" | $SED "$delay_single_q +@@ -20010,12 +20851,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcod hardcode_automatic='`$ECHO "$hardcode_automatic" | $SED "$delay_single_quote_subst"`' inherit_rpath='`$ECHO "$inherit_rpath" | $SED "$delay_single_quote_subst"`' link_all_deplibs='`$ECHO "$link_all_deplibs" | $SED "$delay_single_quote_subst"`' @@ -15069,7 +15007,7 @@ index ca3d58ff618..3cbf90b055f 100755 file_list_spec='`$ECHO "$file_list_spec" | $SED "$delay_single_quote_subst"`' variables_saved_for_relink='`$ECHO "$variables_saved_for_relink" | $SED "$delay_single_quote_subst"`' need_lib_prefix='`$ECHO "$need_lib_prefix" | $SED "$delay_single_quote_subst"`' -@@ -20005,8 +20846,8 @@ old_archive_cmds_CXX='`$ECHO "$old_archive_cmds_CXX" | $SED "$delay_single_quote +@@ -20054,8 +20895,8 @@ old_archive_cmds_CXX='`$ECHO "$old_archi compiler_CXX='`$ECHO "$compiler_CXX" | $SED "$delay_single_quote_subst"`' GCC_CXX='`$ECHO "$GCC_CXX" | $SED "$delay_single_quote_subst"`' lt_prog_compiler_no_builtin_flag_CXX='`$ECHO "$lt_prog_compiler_no_builtin_flag_CXX" | $SED "$delay_single_quote_subst"`' @@ -15079,7 +15017,7 @@ index ca3d58ff618..3cbf90b055f 100755 lt_prog_compiler_static_CXX='`$ECHO "$lt_prog_compiler_static_CXX" | $SED "$delay_single_quote_subst"`' lt_cv_prog_compiler_c_o_CXX='`$ECHO "$lt_cv_prog_compiler_c_o_CXX" | $SED "$delay_single_quote_subst"`' archive_cmds_need_lc_CXX='`$ECHO "$archive_cmds_need_lc_CXX" | $SED "$delay_single_quote_subst"`' -@@ -20033,12 +20874,12 @@ hardcode_shlibpath_var_CXX='`$ECHO "$hardcode_shlibpath_var_CXX" | $SED "$delay_ +@@ -20082,12 +20923,12 @@ hardcode_shlibpath_var_CXX='`$ECHO "$har hardcode_automatic_CXX='`$ECHO "$hardcode_automatic_CXX" | $SED "$delay_single_quote_subst"`' inherit_rpath_CXX='`$ECHO "$inherit_rpath_CXX" | $SED "$delay_single_quote_subst"`' link_all_deplibs_CXX='`$ECHO "$link_all_deplibs_CXX" | $SED "$delay_single_quote_subst"`' @@ -15093,7 +15031,7 @@ index ca3d58ff618..3cbf90b055f 100755 file_list_spec_CXX='`$ECHO "$file_list_spec_CXX" | $SED "$delay_single_quote_subst"`' hardcode_action_CXX='`$ECHO "$hardcode_action_CXX" | $SED "$delay_single_quote_subst"`' compiler_lib_search_dirs_CXX='`$ECHO "$compiler_lib_search_dirs_CXX" | $SED "$delay_single_quote_subst"`' -@@ -20076,8 +20917,13 @@ reload_flag \ +@@ -20125,8 +20966,13 @@ reload_flag \ OBJDUMP \ deplibs_check_method \ file_magic_cmd \ @@ -15107,7 +15045,7 @@ index ca3d58ff618..3cbf90b055f 100755 STRIP \ RANLIB \ CC \ -@@ -20087,12 +20933,14 @@ lt_cv_sys_global_symbol_pipe \ +@@ -20136,12 +20982,14 @@ lt_cv_sys_global_symbol_pipe \ lt_cv_sys_global_symbol_to_cdecl \ lt_cv_sys_global_symbol_to_c_name_address \ lt_cv_sys_global_symbol_to_c_name_address_lib_prefix \ @@ -15123,7 +15061,7 @@ index ca3d58ff618..3cbf90b055f 100755 DSYMUTIL \ NMEDIT \ LIPO \ -@@ -20108,7 +20956,6 @@ no_undefined_flag \ +@@ -20157,7 +21005,6 @@ no_undefined_flag \ hardcode_libdir_flag_spec \ hardcode_libdir_flag_spec_ld \ hardcode_libdir_separator \ @@ -15131,7 +15069,7 @@ index ca3d58ff618..3cbf90b055f 100755 exclude_expsyms \ include_expsyms \ file_list_spec \ -@@ -20130,8 +20977,8 @@ LD_CXX \ +@@ -20179,8 +21026,8 @@ LD_CXX \ reload_flag_CXX \ compiler_CXX \ lt_prog_compiler_no_builtin_flag_CXX \ @@ -15141,7 +15079,7 @@ index ca3d58ff618..3cbf90b055f 100755 lt_prog_compiler_static_CXX \ lt_cv_prog_compiler_c_o_CXX \ export_dynamic_flag_spec_CXX \ -@@ -20143,7 +20990,6 @@ no_undefined_flag_CXX \ +@@ -20192,7 +21039,6 @@ no_undefined_flag_CXX \ hardcode_libdir_flag_spec_CXX \ hardcode_libdir_flag_spec_ld_CXX \ hardcode_libdir_separator_CXX \ @@ -15149,7 +15087,7 @@ index ca3d58ff618..3cbf90b055f 100755 exclude_expsyms_CXX \ include_expsyms_CXX \ file_list_spec_CXX \ -@@ -20177,6 +21023,7 @@ module_cmds \ +@@ -20226,6 +21072,7 @@ module_cmds \ module_expsym_cmds \ export_symbols_cmds \ prelink_cmds \ @@ -15157,7 +15095,7 @@ index ca3d58ff618..3cbf90b055f 100755 postinstall_cmds \ postuninstall_cmds \ finish_cmds \ -@@ -20191,7 +21038,8 @@ archive_expsym_cmds_CXX \ +@@ -20240,7 +21087,8 @@ archive_expsym_cmds_CXX \ module_cmds_CXX \ module_expsym_cmds_CXX \ export_symbols_cmds_CXX \ @@ -15167,7 +15105,7 @@ index ca3d58ff618..3cbf90b055f 100755 case \`eval \\\\\$ECHO \\\\""\\\\\$\$var"\\\\"\` in *[\\\\\\\`\\"\\\$]*) eval "lt_\$var=\\\\\\"\\\`\\\$ECHO \\"\\\$\$var\\" | \\\$SED -e \\"\\\$double_quote_subst\\" -e \\"\\\$sed_quote_subst\\" -e \\"\\\$delay_variable_subst\\"\\\`\\\\\\"" -@@ -20956,7 +21804,8 @@ $as_echo X"$file" | +@@ -21005,7 +21853,8 @@ $as_echo X"$file" | # NOTE: Changes made to this file will be lost: look at ltmain.sh. # # Copyright (C) 1996, 1997, 1998, 1999, 2000, 2001, 2003, 2004, 2005, @@ -15177,7 +15115,7 @@ index ca3d58ff618..3cbf90b055f 100755 # Written by Gordon Matzigkeit, 1996 # # This file is part of GNU Libtool. -@@ -21059,19 +21908,42 @@ SP2NL=$lt_lt_SP2NL +@@ -21108,19 +21957,42 @@ SP2NL=$lt_lt_SP2NL # turn newlines into spaces. NL2SP=$lt_lt_NL2SP @@ -15221,7 +15159,7 @@ index ca3d58ff618..3cbf90b055f 100755 # A symbol stripping program. STRIP=$lt_STRIP -@@ -21101,6 +21973,12 @@ global_symbol_to_c_name_address=$lt_lt_cv_sys_global_symbol_to_c_name_address +@@ -21150,6 +22022,12 @@ global_symbol_to_c_name_address=$lt_lt_c # Transform the output of nm in a C name address pair when lib prefix is needed. global_symbol_to_c_name_address_lib_prefix=$lt_lt_cv_sys_global_symbol_to_c_name_address_lib_prefix @@ -15234,7 +15172,7 @@ index ca3d58ff618..3cbf90b055f 100755 # The name of the directory that contains temporary libtool files. objdir=$objdir -@@ -21110,6 +21988,9 @@ MAGIC_CMD=$MAGIC_CMD +@@ -21159,6 +22037,9 @@ MAGIC_CMD=$MAGIC_CMD # Must we lock files when doing compilation? need_locks=$lt_need_locks @@ -15244,7 +15182,7 @@ index ca3d58ff618..3cbf90b055f 100755 # Tool to manipulate archived DWARF debug symbol files on Mac OS X. DSYMUTIL=$lt_DSYMUTIL -@@ -21224,12 +22105,12 @@ with_gcc=$GCC +@@ -21273,12 +22154,12 @@ with_gcc=$GCC # Compiler flag to turn off builtin functions. no_builtin_flag=$lt_lt_prog_compiler_no_builtin_flag @@ -15260,7 +15198,7 @@ index ca3d58ff618..3cbf90b055f 100755 # Compiler flag to prevent dynamic linking. link_static_flag=$lt_lt_prog_compiler_static -@@ -21316,9 +22197,6 @@ inherit_rpath=$inherit_rpath +@@ -21365,9 +22246,6 @@ inherit_rpath=$inherit_rpath # Whether libtool must link a program against all its dependency libraries. link_all_deplibs=$link_all_deplibs @@ -15270,7 +15208,7 @@ index ca3d58ff618..3cbf90b055f 100755 # Set to "yes" if exported symbols are required. always_export_symbols=$always_export_symbols -@@ -21334,6 +22212,9 @@ include_expsyms=$lt_include_expsyms +@@ -21383,6 +22261,9 @@ include_expsyms=$lt_include_expsyms # Commands necessary for linking programs (against libraries) with templates. prelink_cmds=$lt_prelink_cmds @@ -15280,7 +15218,7 @@ index ca3d58ff618..3cbf90b055f 100755 # Specify filename containing input files. file_list_spec=$lt_file_list_spec -@@ -21380,210 +22261,169 @@ ltmain="$ac_aux_dir/ltmain.sh" +@@ -21429,210 +22310,169 @@ ltmain="$ac_aux_dir/ltmain.sh" # if finds mixed CR/LF and LF-only lines. Since sed operates in # text mode, it properly converts lines to CR/LF. This bash problem # is reportedly fixed, but why not run on old versions too? @@ -15482,15 +15420,9 @@ index ca3d58ff618..3cbf90b055f 100755 -_LT_EOF - ;; - esac -- -- -- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ -- || (rm -f "$cfgfile"; exit 1) -- -- mv -f "$cfgfile" "$ofile" || + sed '$q' "$ltmain" >> "$cfgfile" \ + || (rm -f "$cfgfile"; exit 1) -+ + + if test x"$xsi_shell" = xyes; then + sed -e '/^func_dirname ()$/,/^} # func_dirname /c\ +func_dirname ()\ @@ -15648,13 +15580,16 @@ index ca3d58ff618..3cbf90b055f 100755 + { $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: Unable to substitute extended shell functions in $ofile" >&5 +$as_echo "$as_me: WARNING: Unable to substitute extended shell functions in $ofile" >&2;} +fi -+ -+ + +- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ +- || (rm -f "$cfgfile"; exit 1) + +- mv -f "$cfgfile" "$ofile" || + mv -f "$cfgfile" "$ofile" || (rm -f "$ofile" && cp "$cfgfile" "$ofile" && rm -f "$cfgfile") chmod +x "$ofile" -@@ -21611,12 +22451,12 @@ with_gcc=$GCC_CXX +@@ -21660,12 +22500,12 @@ with_gcc=$GCC_CXX # Compiler flag to turn off builtin functions. no_builtin_flag=$lt_lt_prog_compiler_no_builtin_flag_CXX @@ -15670,7 +15605,7 @@ index ca3d58ff618..3cbf90b055f 100755 # Compiler flag to prevent dynamic linking. link_static_flag=$lt_lt_prog_compiler_static_CXX -@@ -21703,9 +22543,6 @@ inherit_rpath=$inherit_rpath_CXX +@@ -21752,9 +22592,6 @@ inherit_rpath=$inherit_rpath_CXX # Whether libtool must link a program against all its dependency libraries. link_all_deplibs=$link_all_deplibs_CXX @@ -15680,7 +15615,7 @@ index ca3d58ff618..3cbf90b055f 100755 # Set to "yes" if exported symbols are required. always_export_symbols=$always_export_symbols_CXX -@@ -21721,6 +22558,9 @@ include_expsyms=$lt_include_expsyms_CXX +@@ -21770,6 +22607,9 @@ include_expsyms=$lt_include_expsyms_CXX # Commands necessary for linking programs (against libraries) with templates. prelink_cmds=$lt_prelink_cmds_CXX @@ -15690,8 +15625,6 @@ index ca3d58ff618..3cbf90b055f 100755 # Specify filename containing input files. file_list_spec=$lt_file_list_spec_CXX -diff --git a/libbacktrace/Makefile.in b/libbacktrace/Makefile.in -index 49852a21d37..d371dda2d34 100644 --- a/libbacktrace/Makefile.in +++ b/libbacktrace/Makefile.in @@ -1,7 +1,7 @@ @@ -15742,7 +15675,7 @@ index 49852a21d37..d371dda2d34 100644 @NATIVE_TRUE@am__EXEEXT_1 = allocfail$(EXEEXT) @HAVE_BUILDID_TRUE@@HAVE_ELF_TRUE@@HAVE_OBJCOPY_DEBUGLINK_TRUE@@NATIVE_TRUE@am__EXEEXT_2 = b2test$(EXEEXT) @HAVE_BUILDID_TRUE@@HAVE_DWZ_TRUE@@HAVE_ELF_TRUE@@HAVE_OBJCOPY_DEBUGLINK_TRUE@@NATIVE_TRUE@am__EXEEXT_3 = b3test$(EXEEXT) -@@ -253,6 +222,37 @@ am__EXEEXT_16 = $(am__EXEEXT_4) $(am__EXEEXT_5) $(am__EXEEXT_6) \ +@@ -253,6 +222,37 @@ am__EXEEXT_16 = $(am__EXEEXT_4) $(am__EX $(am__EXEEXT_7) $(am__EXEEXT_8) $(am__EXEEXT_9) \ $(am__EXEEXT_10) $(am__EXEEXT_11) $(am__EXEEXT_12) \ $(am__EXEEXT_13) $(am__EXEEXT_14) $(am__EXEEXT_15) @@ -15754,7 +15687,7 @@ index 49852a21d37..d371dda2d34 100644 +AM_V_lt = $(am__v_lt_@AM_V@) +am__v_lt_ = $(am__v_lt_@AM_DEFAULT_V@) +am__v_lt_0 = --silent -+am__v_lt_1 = ++am__v_lt_1 = +am__objects_1 = atomic.lo dwarf.lo fileline.lo posix.lo print.lo \ + sort.lo state.lo +@NATIVE_TRUE@am_libbacktrace_alloc_la_OBJECTS = $(am__objects_1) @@ -15818,7 +15751,7 @@ index 49852a21d37..d371dda2d34 100644 RECHECK_LOGS = $(TEST_LOGS) TEST_SUITE_LOG = test-suite.log TEST_EXTENSIONS = @EXEEXT@ .test -@@ -861,8 +859,11 @@ CLOCK_GETTIME_LINK = @CLOCK_GETTIME_LINK@ +@@ -861,8 +859,11 @@ CLOCK_GETTIME_LINK = @CLOCK_GETTIME_LINK COMM = @COMM@ CPP = @CPP@ CPPFLAGS = @CPPFLAGS@ @@ -15854,7 +15787,7 @@ index 49852a21d37..d371dda2d34 100644 ac_ct_CC = @ac_ct_CC@ ac_ct_DUMPBIN = @ac_ct_DUMPBIN@ am__leading_dot = @am__leading_dot@ -@@ -1267,8 +1271,8 @@ Makefile: $(srcdir)/Makefile.in $(top_builddir)/config.status +@@ -1267,8 +1271,8 @@ Makefile: $(srcdir)/Makefile.in $(top_bu echo ' $(SHELL) ./config.status'; \ $(SHELL) ./config.status;; \ *) \ @@ -15865,7 +15798,7 @@ index 49852a21d37..d371dda2d34 100644 esac; $(top_srcdir)/../multilib.am $(am__empty): -@@ -1300,6 +1304,15 @@ backtrace-supported.h: $(top_builddir)/config.status $(srcdir)/backtrace-support +@@ -1300,6 +1304,15 @@ backtrace-supported.h: $(top_builddir)/c install-debuginfo-for-buildid.sh: $(top_builddir)/config.status $(srcdir)/install-debuginfo-for-buildid.sh.in cd $(top_builddir) && $(SHELL) ./config.status $@ @@ -15881,7 +15814,7 @@ index 49852a21d37..d371dda2d34 100644 clean-checkLTLIBRARIES: -test -z "$(check_LTLIBRARIES)" || rm -f $(check_LTLIBRARIES) @list='$(check_LTLIBRARIES)'; \ -@@ -1337,15 +1350,6 @@ libbacktrace_instrumented_alloc.la: $(libbacktrace_instrumented_alloc_la_OBJECTS +@@ -1337,15 +1350,6 @@ libbacktrace_instrumented_alloc.la: $(li libbacktrace_noformat.la: $(libbacktrace_noformat_la_OBJECTS) $(libbacktrace_noformat_la_DEPENDENCIES) $(EXTRA_libbacktrace_noformat_la_DEPENDENCIES) $(AM_V_CCLD)$(LINK) $(am_libbacktrace_noformat_la_rpath) $(libbacktrace_noformat_la_OBJECTS) $(libbacktrace_noformat_la_LIBADD) $(LIBS) @@ -15933,8 +15866,6 @@ index 49852a21d37..d371dda2d34 100644 $(check_DATA) $(MAKE) $(AM_MAKEFLAGS) check-TESTS check: check-am -diff --git a/libbacktrace/aclocal.m4 b/libbacktrace/aclocal.m4 -index 528e6173930..d88a5ec84f2 100644 --- a/libbacktrace/aclocal.m4 +++ b/libbacktrace/aclocal.m4 @@ -1,6 +1,6 @@ @@ -15946,7 +15877,7 @@ index 528e6173930..d88a5ec84f2 100644 # This file is free software; the Free Software Foundation # gives unlimited permission to copy and/or distribute it, -@@ -20,7 +20,7 @@ You have another version of autoconf. It may work, but is not guaranteed to. +@@ -20,7 +20,7 @@ You have another version of autoconf. I If you have problems, you may need to regenerate the build system entirely. To do so, use the procedure documented by the package, typically 'autoreconf'.])]) @@ -15955,7 +15886,7 @@ index 528e6173930..d88a5ec84f2 100644 # # This file is free software; the Free Software Foundation # gives unlimited permission to copy and/or distribute it, -@@ -32,10 +32,10 @@ To do so, use the procedure documented by the package, typically 'autoreconf'.]) +@@ -32,10 +32,10 @@ To do so, use the procedure documented b # generated from the m4 files accompanying Automake X.Y. # (This private macro should not be called outside this file.) AC_DEFUN([AM_AUTOMAKE_VERSION], @@ -16014,7 +15945,7 @@ index 528e6173930..d88a5ec84f2 100644 dnl Autoconf wants to disallow AM_ names. We explicitly allow dnl the ones we care about. m4_pattern_allow([^AM_[A-Z]+FLAGS$])dnl -@@ -207,7 +211,7 @@ m4_ifval([$3], [_AM_SET_OPTION([no-define])])dnl +@@ -207,7 +211,7 @@ m4_ifval([$3], [_AM_SET_OPTION([no-defin [_AM_SET_OPTIONS([$1])dnl dnl Diagnose old-style AC_INIT with new-style AM_AUTOMAKE_INIT. m4_if( @@ -16082,7 +16013,7 @@ index 528e6173930..d88a5ec84f2 100644 # # This file is free software; the Free Software Foundation # gives unlimited permission to copy and/or distribute it, -@@ -399,7 +417,7 @@ AC_MSG_CHECKING([whether to enable maintainer-specific portions of Makefiles]) +@@ -399,7 +417,7 @@ AC_MSG_CHECKING([whether to enable maint # Fake the existence of programs that GNU maintainers use. -*- Autoconf -*- @@ -16168,7 +16099,7 @@ index 528e6173930..d88a5ec84f2 100644 # # This file is free software; the Free Software Foundation # gives unlimited permission to copy and/or distribute it, -@@ -721,7 +734,7 @@ AC_DEFUN([AM_SUBST_NOTMAKE], [_AM_SUBST_NOTMAKE($@)]) +@@ -721,7 +734,7 @@ AC_DEFUN([AM_SUBST_NOTMAKE], [_AM_SUBST_ # Check how to create a tarball. -*- Autoconf -*- @@ -16177,8 +16108,6 @@ index 528e6173930..d88a5ec84f2 100644 # # This file is free software; the Free Software Foundation # gives unlimited permission to copy and/or distribute it, -diff --git a/libbacktrace/configure b/libbacktrace/configure -index 4ab612dc780..68f6b8566e9 100755 --- a/libbacktrace/configure +++ b/libbacktrace/configure @@ -686,7 +686,10 @@ OTOOL @@ -16242,7 +16171,7 @@ index 4ab612dc780..68f6b8566e9 100755 fi # Use eval to expand $SHELL if eval "$MISSING --is-lightweight"; then -@@ -4558,8 +4562,8 @@ MAKEINFO=${MAKEINFO-"${am_missing_run}makeinfo"} +@@ -4558,8 +4562,8 @@ MAKEINFO=${MAKEINFO-"${am_missing_run}ma # For better backward compatibility. To be removed once Automake 1.9.x # dies out for good. For more background, see: @@ -16253,7 +16182,7 @@ index 4ab612dc780..68f6b8566e9 100755 mkdir_p='$(MKDIR_P)' # We need awk for the "check" target (and possibly the TAP driver). The -@@ -4578,6 +4582,20 @@ am__tar='$${TAR-tar} chof - "$$tardir"' am__untar='$${TAR-tar} xf -' +@@ -4578,6 +4582,20 @@ am__tar='$${TAR-tar} chof - "$$tardir"' @@ -16303,7 +16232,7 @@ index 4ab612dc780..68f6b8566e9 100755 test "X`print -r -- $ECHO 2>/dev/null`" = "X$ECHO"; then ECHO='print -r --' elif test "X`printf %s $ECHO 2>/dev/null`" = "X$ECHO"; then -@@ -6187,8 +6205,8 @@ $as_echo_n "checking whether the shell understands some XSI constructs... " >&6; +@@ -6187,8 +6205,8 @@ $as_echo_n "checking whether the shell u # Try some XSI features xsi_shell=no ( _lt_dummy="a/b/c" @@ -16439,7 +16368,7 @@ index 4ab612dc780..68f6b8566e9 100755 file_magic_cmd=$lt_cv_file_magic_cmd deplibs_check_method=$lt_cv_deplibs_check_method test -z "$deplibs_check_method" && deplibs_check_method=unknown -@@ -6595,6 +6708,157 @@ test -z "$deplibs_check_method" && deplibs_check_method=unknown +@@ -6595,6 +6708,157 @@ test -z "$deplibs_check_method" && depli @@ -16658,7 +16587,7 @@ index 4ab612dc780..68f6b8566e9 100755 if test "x$ac_ct_AR" = x; then AR="false" else -@@ -6696,31 +6970,83 @@ ac_tool_warned=yes ;; +@@ -6696,25 +6970,19 @@ ac_tool_warned=yes ;; esac AR=$ac_ct_AR fi @@ -16690,14 +16619,10 @@ index 4ab612dc780..68f6b8566e9 100755 + rm -f conftest.* +: ${AR=ar} +: ${AR_FLAGS=cru} -+ -+ -+ -+ -+ +@@ -6726,6 +6994,64 @@ test -z "$AR_FLAGS" && AR_FLAGS=cru @@ -16754,9 +16679,14 @@ index 4ab612dc780..68f6b8566e9 100755 +fi + + - - - ++ ++ ++ ++ ++ + if test -n "$ac_tool_prefix"; then + # Extract the first word of "${ac_tool_prefix}strip", so it can be a program name with args. + set dummy ${ac_tool_prefix}strip; ac_word=$2 @@ -7065,8 +7391,8 @@ esac lt_cv_sys_global_symbol_to_cdecl="sed -n -e 's/^T .* \(.*\)$/extern int \1();/p' -e 's/^$symcode* .* \(.*\)$/extern char \1;/p'" @@ -16804,7 +16734,7 @@ index 4ab612dc780..68f6b8566e9 100755 const char *name; void *address; } -@@ -7180,8 +7519,8 @@ static const void *lt_preloaded_setup() { +@@ -7180,8 +7519,8 @@ static const void *lt_preloaded_setup() _LT_EOF # Now try linking the two files. mv conftest.$ac_objext conftstm.$ac_objext @@ -16826,7 +16756,7 @@ index 4ab612dc780..68f6b8566e9 100755 else echo "cannot find nm_test_func in $nlist" >&5 fi -@@ -7229,6 +7568,18 @@ else +@@ -7229,6 +7568,19 @@ else $as_echo "ok" >&6; } fi @@ -16842,18 +16772,14 @@ index 4ab612dc780..68f6b8566e9 100755 + + + ++ -@@ -7245,6 +7596,43 @@ fi +@@ -7249,6 +7601,42 @@ fi -+ -+ -+ -+ -+ +{ $as_echo "$as_me:${as_lineno-$LINENO}: checking for sysroot" >&5 +$as_echo_n "checking for sysroot... " >&6; } + @@ -16886,59 +16812,17 @@ index 4ab612dc780..68f6b8566e9 100755 + + { $as_echo "$as_me:${as_lineno-$LINENO}: result: ${lt_sysroot:-no}" >&5 +$as_echo "${lt_sysroot:-no}" >&6; } ++ ++ ++ ++ + # Check whether --enable-libtool-lock was given. + if test "${enable_libtool_lock+set}" = set; then : +@@ -7456,6 +7844,123 @@ esac + need_locks="$enable_libtool_lock" -@@ -7411,50 +7799,167 @@ _ACEOF - if ac_fn_c_try_link "$LINENO"; then : - lt_cv_cc_needs_belf=yes - else -- lt_cv_cc_needs_belf=no -+ lt_cv_cc_needs_belf=no -+fi -+rm -f core conftest.err conftest.$ac_objext \ -+ conftest$ac_exeext conftest.$ac_ext -+ ac_ext=c -+ac_cpp='$CPP $CPPFLAGS' -+ac_compile='$CC -c $CFLAGS $CPPFLAGS conftest.$ac_ext >&5' -+ac_link='$CC -o conftest$ac_exeext $CFLAGS $CPPFLAGS $LDFLAGS conftest.$ac_ext $LIBS >&5' -+ac_compiler_gnu=$ac_cv_c_compiler_gnu -+ -+fi -+{ $as_echo "$as_me:${as_lineno-$LINENO}: result: $lt_cv_cc_needs_belf" >&5 -+$as_echo "$lt_cv_cc_needs_belf" >&6; } -+ if test x"$lt_cv_cc_needs_belf" != x"yes"; then -+ # this is probably gcc 2.8.0, egcs 1.0 or newer; no need for -belf -+ CFLAGS="$SAVE_CFLAGS" -+ fi -+ ;; -+sparc*-*solaris*) -+ # Find out which ABI we are using. -+ echo 'int i;' > conftest.$ac_ext -+ if { { eval echo "\"\$as_me\":${as_lineno-$LINENO}: \"$ac_compile\""; } >&5 -+ (eval $ac_compile) 2>&5 -+ ac_status=$? -+ $as_echo "$as_me:${as_lineno-$LINENO}: \$? = $ac_status" >&5 -+ test $ac_status = 0; }; then -+ case `/usr/bin/file conftest.o` in -+ *64-bit*) -+ case $lt_cv_prog_gnu_ld in -+ yes*) LD="${LD-ld} -m elf64_sparc" ;; -+ *) -+ if ${LD-ld} -64 -r -o conftest2.o conftest.o >/dev/null 2>&1; then -+ LD="${LD-ld} -64" -+ fi -+ ;; -+ esac -+ ;; -+ esac -+ fi -+ rm -rf conftest* -+ ;; -+esac -+ -+need_locks="$enable_libtool_lock" -+ +if test -n "$ac_tool_prefix"; then + # Extract the first word of "${ac_tool_prefix}mt", so it can be a program name with args. +set dummy ${ac_tool_prefix}mt; ac_word=$2 @@ -17014,21 +16898,8 @@ index 4ab612dc780..68f6b8566e9 100755 +else + { $as_echo "$as_me:${as_lineno-$LINENO}: result: no" >&5 +$as_echo "no" >&6; } - fi --rm -f core conftest.err conftest.$ac_objext \ -- conftest$ac_exeext conftest.$ac_ext -- ac_ext=c --ac_cpp='$CPP $CPPFLAGS' --ac_compile='$CC -c $CFLAGS $CPPFLAGS conftest.$ac_ext >&5' --ac_link='$CC -o conftest$ac_exeext $CFLAGS $CPPFLAGS $LDFLAGS conftest.$ac_ext $LIBS >&5' --ac_compiler_gnu=$ac_cv_c_compiler_gnu - --fi --{ $as_echo "$as_me:${as_lineno-$LINENO}: result: $lt_cv_cc_needs_belf" >&5 --$as_echo "$lt_cv_cc_needs_belf" >&6; } -- if test x"$lt_cv_cc_needs_belf" != x"yes"; then -- # this is probably gcc 2.8.0, egcs 1.0 or newer; no need for -belf -- CFLAGS="$SAVE_CFLAGS" ++fi ++ + if test "x$ac_ct_MANIFEST_TOOL" = x; then + MANIFEST_TOOL=":" + else @@ -17039,28 +16910,7 @@ index 4ab612dc780..68f6b8566e9 100755 +ac_tool_warned=yes ;; +esac + MANIFEST_TOOL=$ac_ct_MANIFEST_TOOL - fi -- ;; --sparc*-*solaris*) -- # Find out which ABI we are using. -- echo 'int i;' > conftest.$ac_ext -- if { { eval echo "\"\$as_me\":${as_lineno-$LINENO}: \"$ac_compile\""; } >&5 -- (eval $ac_compile) 2>&5 -- ac_status=$? -- $as_echo "$as_me:${as_lineno-$LINENO}: \$? = $ac_status" >&5 -- test $ac_status = 0; }; then -- case `/usr/bin/file conftest.o` in -- *64-bit*) -- case $lt_cv_prog_gnu_ld in -- yes*) LD="${LD-ld} -m elf64_sparc" ;; -- *) -- if ${LD-ld} -64 -r -o conftest2.o conftest.o >/dev/null 2>&1; then -- LD="${LD-ld} -64" -- fi -- ;; -- esac -- ;; -- esac ++ fi +else + MANIFEST_TOOL="$ac_cv_prog_MANIFEST_TOOL" +fi @@ -17077,10 +16927,7 @@ index 4ab612dc780..68f6b8566e9 100755 + cat conftest.err >&5 + if $GREP 'Manifest Tool' conftest.out > /dev/null; then + lt_cv_path_mainfest_tool=yes - fi -- rm -rf conftest* -- ;; --esac ++ fi + rm -f conftest* +fi +{ $as_echo "$as_me:${as_lineno-$LINENO}: result: $lt_cv_path_mainfest_tool" >&5 @@ -17091,11 +16938,11 @@ index 4ab612dc780..68f6b8566e9 100755 + + + - --need_locks="$enable_libtool_lock" - ++ ++ case $host_os in + rhapsody* | darwin*) @@ -8019,6 +8524,8 @@ _LT_EOF $LTCC $LTCFLAGS -c -o conftest.o conftest.c 2>&5 echo "$AR cru libconftest.a conftest.o" >&5 @@ -17114,7 +16961,7 @@ index 4ab612dc780..68f6b8566e9 100755 if test "$GCC" = yes; then lt_prog_compiler_wl='-Wl,' -@@ -8770,6 +9275,12 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -8770,6 +9275,12 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='--shared' lt_prog_compiler_static='--static' ;; @@ -17127,7 +16974,7 @@ index 4ab612dc780..68f6b8566e9 100755 pgcc* | pgf77* | pgf90* | pgf95* | pgfortran*) # Portland Group compilers (*not* the Pentium gcc compiler, # which looks to be a dead project) -@@ -8832,7 +9343,7 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -8832,7 +9343,7 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='-KPIC' lt_prog_compiler_static='-Bstatic' case $cc_basename in @@ -17288,7 +17135,7 @@ index 4ab612dc780..68f6b8566e9 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" archive_expsym_cmds='$CC -o $output_objdir/$soname $libobjs $deplibs '"\${wl}$no_entry_flag"' $compiler_flags `if test "x${allow_undefined_flag}" != "x"; then func_echo_all "${wl}${allow_undefined_flag}"; else :; fi` '"\${wl}$exp_sym_flag:\$export_symbols $shared_flag" -@@ -9661,7 +10195,13 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9661,7 +10195,13 @@ if test -z "$aix_libpath"; then aix_libp else # Determine the default libpath from the value encoded in an # empty executable. @@ -17346,7 +17193,7 @@ index 4ab612dc780..68f6b8566e9 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" # Warning - without using the other run time loading flags, -@@ -9734,20 +10281,63 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9734,20 +10281,63 @@ if test -z "$aix_libpath"; then aix_libp # Microsoft Visual C++. # hardcode_libdir_flag_spec is actually meaningless, as there is # no search path for DLLs. @@ -17424,7 +17271,7 @@ index 4ab612dc780..68f6b8566e9 100755 ;; darwin* | rhapsody*) -@@ -9808,7 +10398,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9808,7 +10398,7 @@ if test -z "$aix_libpath"; then aix_libp # FreeBSD 3 and greater uses gcc -shared to do shared libraries. freebsd* | dragonfly*) @@ -17433,7 +17280,7 @@ index 4ab612dc780..68f6b8566e9 100755 hardcode_libdir_flag_spec='-R$libdir' hardcode_direct=yes hardcode_shlibpath_var=no -@@ -9816,7 +10406,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9816,7 +10406,7 @@ if test -z "$aix_libpath"; then aix_libp hpux9*) if test "$GCC" = yes; then @@ -17442,7 +17289,7 @@ index 4ab612dc780..68f6b8566e9 100755 else archive_cmds='$RM $output_objdir/$soname~$LD -b +b $install_libdir -o $output_objdir/$soname $libobjs $deplibs $linker_flags~test $output_objdir/$soname = $lib || mv $output_objdir/$soname $lib' fi -@@ -9832,7 +10422,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9832,7 +10422,7 @@ if test -z "$aix_libpath"; then aix_libp hpux10*) if test "$GCC" = yes && test "$with_gnu_ld" = no; then @@ -17451,7 +17298,7 @@ index 4ab612dc780..68f6b8566e9 100755 else archive_cmds='$LD -b +h $soname +b $install_libdir -o $lib $libobjs $deplibs $linker_flags' fi -@@ -9856,10 +10446,10 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9856,10 +10446,10 @@ if test -z "$aix_libpath"; then aix_libp archive_cmds='$CC -shared ${wl}+h ${wl}$soname ${wl}+nodefaultrpath -o $lib $libobjs $deplibs $compiler_flags' ;; ia64*) @@ -17509,7 +17356,7 @@ index 4ab612dc780..68f6b8566e9 100755 else archive_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -o $lib' archive_expsym_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -exports_file $export_symbols -o $lib' -@@ -10039,7 +10642,7 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -10039,7 +10642,7 @@ rm -f core conftest.err conftest.$ac_obj osf4* | osf5*) # as osf3* with the addition of -msym flag if test "$GCC" = yes; then allow_undefined_flag=' ${wl}-expect_unresolved ${wl}\*' @@ -17518,7 +17365,7 @@ index 4ab612dc780..68f6b8566e9 100755 hardcode_libdir_flag_spec='${wl}-rpath ${wl}$libdir' else allow_undefined_flag=' -expect_unresolved \*' -@@ -10058,9 +10661,9 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -10058,9 +10661,9 @@ rm -f core conftest.err conftest.$ac_obj no_undefined_flag=' -z defs' if test "$GCC" = yes; then wlarc='${wl}' @@ -17659,7 +17506,7 @@ index 4ab612dc780..68f6b8566e9 100755 int main () { void *self = dlopen (0, LT_DLGLOBAL|LT_DLLAZY_OR_NOW); -@@ -15191,13 +15853,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_single_quote_subst"`' +@@ -15191,13 +15853,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_ lt_unset='`$ECHO "$lt_unset" | $SED "$delay_single_quote_subst"`' lt_SP2NL='`$ECHO "$lt_SP2NL" | $SED "$delay_single_quote_subst"`' lt_NL2SP='`$ECHO "$lt_NL2SP" | $SED "$delay_single_quote_subst"`' @@ -17680,7 +17527,7 @@ index 4ab612dc780..68f6b8566e9 100755 STRIP='`$ECHO "$STRIP" | $SED "$delay_single_quote_subst"`' RANLIB='`$ECHO "$RANLIB" | $SED "$delay_single_quote_subst"`' old_postinstall_cmds='`$ECHO "$old_postinstall_cmds" | $SED "$delay_single_quote_subst"`' -@@ -15212,14 +15881,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$lt_cv_sys_global_symbol_pipe" | $SED "$de +@@ -15212,14 +15881,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$l lt_cv_sys_global_symbol_to_cdecl='`$ECHO "$lt_cv_sys_global_symbol_to_cdecl" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address_lib_prefix='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address_lib_prefix" | $SED "$delay_single_quote_subst"`' @@ -17699,7 +17546,7 @@ index 4ab612dc780..68f6b8566e9 100755 DSYMUTIL='`$ECHO "$DSYMUTIL" | $SED "$delay_single_quote_subst"`' NMEDIT='`$ECHO "$NMEDIT" | $SED "$delay_single_quote_subst"`' LIPO='`$ECHO "$LIPO" | $SED "$delay_single_quote_subst"`' -@@ -15252,12 +15924,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcode_shlibpath_var" | $SED "$delay_single_q +@@ -15252,12 +15924,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcod hardcode_automatic='`$ECHO "$hardcode_automatic" | $SED "$delay_single_quote_subst"`' inherit_rpath='`$ECHO "$inherit_rpath" | $SED "$delay_single_quote_subst"`' link_all_deplibs='`$ECHO "$link_all_deplibs" | $SED "$delay_single_quote_subst"`' @@ -17813,7 +17660,7 @@ index 4ab612dc780..68f6b8566e9 100755 # A symbol stripping program. STRIP=$lt_STRIP -@@ -16223,6 +16926,12 @@ global_symbol_to_c_name_address=$lt_lt_cv_sys_global_symbol_to_c_name_address +@@ -16223,6 +16926,12 @@ global_symbol_to_c_name_address=$lt_lt_c # Transform the output of nm in a C name address pair when lib prefix is needed. global_symbol_to_c_name_address_lib_prefix=$lt_lt_cv_sys_global_symbol_to_c_name_address_lib_prefix @@ -18074,15 +17921,9 @@ index 4ab612dc780..68f6b8566e9 100755 -_LT_EOF - ;; - esac -- -- -- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ -- || (rm -f "$cfgfile"; exit 1) -- -- mv -f "$cfgfile" "$ofile" || + sed '$q' "$ltmain" >> "$cfgfile" \ + || (rm -f "$cfgfile"; exit 1) -+ + + if test x"$xsi_shell" = xyes; then + sed -e '/^func_dirname ()$/,/^} # func_dirname /c\ +func_dirname ()\ @@ -18240,14 +18081,15 @@ index 4ab612dc780..68f6b8566e9 100755 + { $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: Unable to substitute extended shell functions in $ofile" >&5 +$as_echo "$as_me: WARNING: Unable to substitute extended shell functions in $ofile" >&2;} +fi -+ -+ + +- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ +- || (rm -f "$cfgfile"; exit 1) + +- mv -f "$cfgfile" "$ofile" || + mv -f "$cfgfile" "$ofile" || (rm -f "$ofile" && cp "$cfgfile" "$ofile" && rm -f "$cfgfile") chmod +x "$ofile" -diff --git a/libctf/Makefile.in b/libctf/Makefile.in -index 5d9587766dc..146b7a71685 100644 --- a/libctf/Makefile.in +++ b/libctf/Makefile.in @@ -442,6 +442,7 @@ CYGPATH_W = @CYGPATH_W@ @@ -18266,8 +18108,6 @@ index 5d9587766dc..146b7a71685 100644 MKDIR_P = @MKDIR_P@ MKINSTALLDIRS = @MKINSTALLDIRS@ MSGFMT = @MSGFMT@ -diff --git a/libctf/configure b/libctf/configure -index 7466d56a18b..0325e438a47 100755 --- a/libctf/configure +++ b/libctf/configure @@ -669,6 +669,8 @@ OTOOL @@ -18316,7 +18156,7 @@ index 7466d56a18b..0325e438a47 100755 test "X`print -r -- $ECHO 2>/dev/null`" = "X$ECHO"; then ECHO='print -r --' elif test "X`printf %s $ECHO 2>/dev/null`" = "X$ECHO"; then -@@ -8235,8 +8240,8 @@ $as_echo_n "checking whether the shell understands some XSI constructs... " >&6; +@@ -8235,8 +8240,8 @@ $as_echo_n "checking whether the shell u # Try some XSI features xsi_shell=no ( _lt_dummy="a/b/c" @@ -18452,7 +18292,7 @@ index 7466d56a18b..0325e438a47 100755 file_magic_cmd=$lt_cv_file_magic_cmd deplibs_check_method=$lt_cv_deplibs_check_method test -z "$deplibs_check_method" && deplibs_check_method=unknown -@@ -8643,6 +8743,157 @@ test -z "$deplibs_check_method" && deplibs_check_method=unknown +@@ -8643,6 +8743,157 @@ test -z "$deplibs_check_method" && depli @@ -18818,7 +18658,7 @@ index 7466d56a18b..0325e438a47 100755 const char *name; void *address; } -@@ -9228,8 +9554,8 @@ static const void *lt_preloaded_setup() { +@@ -9228,8 +9554,8 @@ static const void *lt_preloaded_setup() _LT_EOF # Now try linking the two files. mv conftest.$ac_objext conftstm.$ac_objext @@ -18840,7 +18680,7 @@ index 7466d56a18b..0325e438a47 100755 else echo "cannot find nm_test_func in $nlist" >&5 fi -@@ -9277,6 +9603,17 @@ else +@@ -9277,6 +9603,20 @@ else $as_echo "ok" >&6; } fi @@ -18855,19 +18695,16 @@ index 7466d56a18b..0325e438a47 100755 + + + ++ ++ ++ -@@ -9293,6 +9630,44 @@ fi +@@ -9296,6 +9636,41 @@ fi -+ -+ -+ -+ -+ -+ +{ $as_echo "$as_me:${as_lineno-$LINENO}: checking for sysroot" >&5 +$as_echo_n "checking for sysroot... " >&6; } + @@ -18900,9 +18737,12 @@ index 7466d56a18b..0325e438a47 100755 + + { $as_echo "$as_me:${as_lineno-$LINENO}: result: ${lt_sysroot:-no}" >&5 +$as_echo "${lt_sysroot:-no}" >&6; } ++ ++ ++ - + # Check whether --enable-libtool-lock was given. @@ -9504,6 +9879,123 @@ esac need_locks="$enable_libtool_lock" @@ -19045,7 +18885,7 @@ index 7466d56a18b..0325e438a47 100755 if test "$GCC" = yes; then lt_prog_compiler_wl='-Wl,' -@@ -10788,6 +11280,12 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -10788,6 +11280,12 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='--shared' lt_prog_compiler_static='--static' ;; @@ -19058,7 +18898,7 @@ index 7466d56a18b..0325e438a47 100755 pgcc* | pgf77* | pgf90* | pgf95* | pgfortran*) # Portland Group compilers (*not* the Pentium gcc compiler, # which looks to be a dead project) -@@ -10850,7 +11348,7 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -10850,7 +11348,7 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='-KPIC' lt_prog_compiler_static='-Bstatic' case $cc_basename in @@ -19219,7 +19059,7 @@ index 7466d56a18b..0325e438a47 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" archive_expsym_cmds='$CC -o $output_objdir/$soname $libobjs $deplibs '"\${wl}$no_entry_flag"' $compiler_flags `if test "x${allow_undefined_flag}" != "x"; then func_echo_all "${wl}${allow_undefined_flag}"; else :; fi` '"\${wl}$exp_sym_flag:\$export_symbols $shared_flag" -@@ -11679,7 +12200,13 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -11679,7 +12200,13 @@ if test -z "$aix_libpath"; then aix_libp else # Determine the default libpath from the value encoded in an # empty executable. @@ -19277,7 +19117,7 @@ index 7466d56a18b..0325e438a47 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" # Warning - without using the other run time loading flags, -@@ -11752,20 +12286,63 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -11752,20 +12286,63 @@ if test -z "$aix_libpath"; then aix_libp # Microsoft Visual C++. # hardcode_libdir_flag_spec is actually meaningless, as there is # no search path for DLLs. @@ -19355,7 +19195,7 @@ index 7466d56a18b..0325e438a47 100755 ;; darwin* | rhapsody*) -@@ -11826,7 +12403,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -11826,7 +12403,7 @@ if test -z "$aix_libpath"; then aix_libp # FreeBSD 3 and greater uses gcc -shared to do shared libraries. freebsd* | dragonfly*) @@ -19364,7 +19204,7 @@ index 7466d56a18b..0325e438a47 100755 hardcode_libdir_flag_spec='-R$libdir' hardcode_direct=yes hardcode_shlibpath_var=no -@@ -11834,7 +12411,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -11834,7 +12411,7 @@ if test -z "$aix_libpath"; then aix_libp hpux9*) if test "$GCC" = yes; then @@ -19373,7 +19213,7 @@ index 7466d56a18b..0325e438a47 100755 else archive_cmds='$RM $output_objdir/$soname~$LD -b +b $install_libdir -o $output_objdir/$soname $libobjs $deplibs $linker_flags~test $output_objdir/$soname = $lib || mv $output_objdir/$soname $lib' fi -@@ -11850,7 +12427,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -11850,7 +12427,7 @@ if test -z "$aix_libpath"; then aix_libp hpux10*) if test "$GCC" = yes && test "$with_gnu_ld" = no; then @@ -19382,7 +19222,7 @@ index 7466d56a18b..0325e438a47 100755 else archive_cmds='$LD -b +h $soname +b $install_libdir -o $lib $libobjs $deplibs $linker_flags' fi -@@ -11874,10 +12451,10 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -11874,10 +12451,10 @@ if test -z "$aix_libpath"; then aix_libp archive_cmds='$CC -shared ${wl}+h ${wl}$soname ${wl}+nodefaultrpath -o $lib $libobjs $deplibs $compiler_flags' ;; ia64*) @@ -19440,7 +19280,7 @@ index 7466d56a18b..0325e438a47 100755 else archive_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -o $lib' archive_expsym_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -exports_file $export_symbols -o $lib' -@@ -12057,7 +12647,7 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -12057,7 +12647,7 @@ rm -f core conftest.err conftest.$ac_obj osf4* | osf5*) # as osf3* with the addition of -msym flag if test "$GCC" = yes; then allow_undefined_flag=' ${wl}-expect_unresolved ${wl}\*' @@ -19449,7 +19289,7 @@ index 7466d56a18b..0325e438a47 100755 hardcode_libdir_flag_spec='${wl}-rpath ${wl}$libdir' else allow_undefined_flag=' -expect_unresolved \*' -@@ -12076,9 +12666,9 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -12076,9 +12666,9 @@ rm -f core conftest.err conftest.$ac_obj no_undefined_flag=' -z defs' if test "$GCC" = yes; then wlarc='${wl}' @@ -19590,7 +19430,7 @@ index 7466d56a18b..0325e438a47 100755 int main () { void *self = dlopen (0, LT_DLGLOBAL|LT_DLLAZY_OR_NOW); -@@ -17813,13 +18462,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_single_quote_subst"`' +@@ -17821,13 +18470,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_ lt_unset='`$ECHO "$lt_unset" | $SED "$delay_single_quote_subst"`' lt_SP2NL='`$ECHO "$lt_SP2NL" | $SED "$delay_single_quote_subst"`' lt_NL2SP='`$ECHO "$lt_NL2SP" | $SED "$delay_single_quote_subst"`' @@ -19611,7 +19451,7 @@ index 7466d56a18b..0325e438a47 100755 STRIP='`$ECHO "$STRIP" | $SED "$delay_single_quote_subst"`' RANLIB='`$ECHO "$RANLIB" | $SED "$delay_single_quote_subst"`' old_postinstall_cmds='`$ECHO "$old_postinstall_cmds" | $SED "$delay_single_quote_subst"`' -@@ -17834,14 +18490,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$lt_cv_sys_global_symbol_pipe" | $SED "$de +@@ -17842,14 +18498,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$l lt_cv_sys_global_symbol_to_cdecl='`$ECHO "$lt_cv_sys_global_symbol_to_cdecl" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address_lib_prefix='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address_lib_prefix" | $SED "$delay_single_quote_subst"`' @@ -19630,7 +19470,7 @@ index 7466d56a18b..0325e438a47 100755 DSYMUTIL='`$ECHO "$DSYMUTIL" | $SED "$delay_single_quote_subst"`' NMEDIT='`$ECHO "$NMEDIT" | $SED "$delay_single_quote_subst"`' LIPO='`$ECHO "$LIPO" | $SED "$delay_single_quote_subst"`' -@@ -17874,12 +18533,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcode_shlibpath_var" | $SED "$delay_single_q +@@ -17882,12 +18541,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcod hardcode_automatic='`$ECHO "$hardcode_automatic" | $SED "$delay_single_quote_subst"`' inherit_rpath='`$ECHO "$inherit_rpath" | $SED "$delay_single_quote_subst"`' link_all_deplibs='`$ECHO "$link_all_deplibs" | $SED "$delay_single_quote_subst"`' @@ -19644,7 +19484,7 @@ index 7466d56a18b..0325e438a47 100755 file_list_spec='`$ECHO "$file_list_spec" | $SED "$delay_single_quote_subst"`' variables_saved_for_relink='`$ECHO "$variables_saved_for_relink" | $SED "$delay_single_quote_subst"`' need_lib_prefix='`$ECHO "$need_lib_prefix" | $SED "$delay_single_quote_subst"`' -@@ -17934,8 +18593,13 @@ reload_flag \ +@@ -17942,8 +18601,13 @@ reload_flag \ OBJDUMP \ deplibs_check_method \ file_magic_cmd \ @@ -19658,7 +19498,7 @@ index 7466d56a18b..0325e438a47 100755 STRIP \ RANLIB \ CC \ -@@ -17945,12 +18609,14 @@ lt_cv_sys_global_symbol_pipe \ +@@ -17953,12 +18617,14 @@ lt_cv_sys_global_symbol_pipe \ lt_cv_sys_global_symbol_to_cdecl \ lt_cv_sys_global_symbol_to_c_name_address \ lt_cv_sys_global_symbol_to_c_name_address_lib_prefix \ @@ -19674,7 +19514,7 @@ index 7466d56a18b..0325e438a47 100755 DSYMUTIL \ NMEDIT \ LIPO \ -@@ -17966,7 +18632,6 @@ no_undefined_flag \ +@@ -17974,7 +18640,6 @@ no_undefined_flag \ hardcode_libdir_flag_spec \ hardcode_libdir_flag_spec_ld \ hardcode_libdir_separator \ @@ -19682,7 +19522,7 @@ index 7466d56a18b..0325e438a47 100755 exclude_expsyms \ include_expsyms \ file_list_spec \ -@@ -18002,6 +18667,7 @@ module_cmds \ +@@ -18010,6 +18675,7 @@ module_cmds \ module_expsym_cmds \ export_symbols_cmds \ prelink_cmds \ @@ -19690,7 +19530,7 @@ index 7466d56a18b..0325e438a47 100755 postinstall_cmds \ postuninstall_cmds \ finish_cmds \ -@@ -18861,7 +19527,8 @@ $as_echo X"$file" | +@@ -18869,7 +19535,8 @@ $as_echo X"$file" | # NOTE: Changes made to this file will be lost: look at ltmain.sh. # # Copyright (C) 1996, 1997, 1998, 1999, 2000, 2001, 2003, 2004, 2005, @@ -19700,7 +19540,7 @@ index 7466d56a18b..0325e438a47 100755 # Written by Gordon Matzigkeit, 1996 # # This file is part of GNU Libtool. -@@ -18964,19 +19631,42 @@ SP2NL=$lt_lt_SP2NL +@@ -18972,19 +19639,42 @@ SP2NL=$lt_lt_SP2NL # turn newlines into spaces. NL2SP=$lt_lt_NL2SP @@ -19744,7 +19584,7 @@ index 7466d56a18b..0325e438a47 100755 # A symbol stripping program. STRIP=$lt_STRIP -@@ -19006,6 +19696,12 @@ global_symbol_to_c_name_address=$lt_lt_cv_sys_global_symbol_to_c_name_address +@@ -19014,6 +19704,12 @@ global_symbol_to_c_name_address=$lt_lt_c # Transform the output of nm in a C name address pair when lib prefix is needed. global_symbol_to_c_name_address_lib_prefix=$lt_lt_cv_sys_global_symbol_to_c_name_address_lib_prefix @@ -19757,7 +19597,7 @@ index 7466d56a18b..0325e438a47 100755 # The name of the directory that contains temporary libtool files. objdir=$objdir -@@ -19015,6 +19711,9 @@ MAGIC_CMD=$MAGIC_CMD +@@ -19023,6 +19719,9 @@ MAGIC_CMD=$MAGIC_CMD # Must we lock files when doing compilation? need_locks=$lt_need_locks @@ -19767,7 +19607,7 @@ index 7466d56a18b..0325e438a47 100755 # Tool to manipulate archived DWARF debug symbol files on Mac OS X. DSYMUTIL=$lt_DSYMUTIL -@@ -19129,12 +19828,12 @@ with_gcc=$GCC +@@ -19137,12 +19836,12 @@ with_gcc=$GCC # Compiler flag to turn off builtin functions. no_builtin_flag=$lt_lt_prog_compiler_no_builtin_flag @@ -19783,7 +19623,7 @@ index 7466d56a18b..0325e438a47 100755 # Compiler flag to prevent dynamic linking. link_static_flag=$lt_lt_prog_compiler_static -@@ -19221,9 +19920,6 @@ inherit_rpath=$inherit_rpath +@@ -19229,9 +19928,6 @@ inherit_rpath=$inherit_rpath # Whether libtool must link a program against all its dependency libraries. link_all_deplibs=$link_all_deplibs @@ -19793,7 +19633,7 @@ index 7466d56a18b..0325e438a47 100755 # Set to "yes" if exported symbols are required. always_export_symbols=$always_export_symbols -@@ -19239,6 +19935,9 @@ include_expsyms=$lt_include_expsyms +@@ -19247,6 +19943,9 @@ include_expsyms=$lt_include_expsyms # Commands necessary for linking programs (against libraries) with templates. prelink_cmds=$lt_prelink_cmds @@ -19803,7 +19643,7 @@ index 7466d56a18b..0325e438a47 100755 # Specify filename containing input files. file_list_spec=$lt_file_list_spec -@@ -19271,210 +19970,169 @@ ltmain="$ac_aux_dir/ltmain.sh" +@@ -19279,210 +19978,169 @@ ltmain="$ac_aux_dir/ltmain.sh" # if finds mixed CR/LF and LF-only lines. Since sed operates in # text mode, it properly converts lines to CR/LF. This bash problem # is reportedly fixed, but why not run on old versions too? @@ -20005,15 +19845,9 @@ index 7466d56a18b..0325e438a47 100755 -_LT_EOF - ;; - esac -- -- -- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ -- || (rm -f "$cfgfile"; exit 1) -- -- mv -f "$cfgfile" "$ofile" || + sed '$q' "$ltmain" >> "$cfgfile" \ + || (rm -f "$cfgfile"; exit 1) -+ + + if test x"$xsi_shell" = xyes; then + sed -e '/^func_dirname ()$/,/^} # func_dirname /c\ +func_dirname ()\ @@ -20171,14 +20005,15 @@ index 7466d56a18b..0325e438a47 100755 + { $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: Unable to substitute extended shell functions in $ofile" >&5 +$as_echo "$as_me: WARNING: Unable to substitute extended shell functions in $ofile" >&2;} +fi -+ -+ + +- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ +- || (rm -f "$cfgfile"; exit 1) + +- mv -f "$cfgfile" "$ofile" || + mv -f "$cfgfile" "$ofile" || (rm -f "$ofile" && cp "$cfgfile" "$ofile" && rm -f "$cfgfile") chmod +x "$ofile" -diff --git a/libsframe/Makefile.in b/libsframe/Makefile.in -index fa705dd9f13..d6ab725f71d 100644 --- a/libsframe/Makefile.in +++ b/libsframe/Makefile.in @@ -404,6 +404,7 @@ CPPFLAGS = @CPPFLAGS@ @@ -20197,8 +20032,6 @@ index fa705dd9f13..d6ab725f71d 100644 MKDIR_P = @MKDIR_P@ NM = @NM@ NMEDIT = @NMEDIT@ -diff --git a/libsframe/configure b/libsframe/configure -index 4727eff533a..ff7a4ab5c7a 100755 --- a/libsframe/configure +++ b/libsframe/configure @@ -658,6 +658,8 @@ OTOOL @@ -20247,7 +20080,7 @@ index 4727eff533a..ff7a4ab5c7a 100755 test "X`print -r -- $ECHO 2>/dev/null`" = "X$ECHO"; then ECHO='print -r --' elif test "X`printf %s $ECHO 2>/dev/null`" = "X$ECHO"; then -@@ -6202,8 +6207,8 @@ $as_echo_n "checking whether the shell understands some XSI constructs... " >&6; +@@ -6202,8 +6207,8 @@ $as_echo_n "checking whether the shell u # Try some XSI features xsi_shell=no ( _lt_dummy="a/b/c" @@ -20383,7 +20216,7 @@ index 4727eff533a..ff7a4ab5c7a 100755 file_magic_cmd=$lt_cv_file_magic_cmd deplibs_check_method=$lt_cv_deplibs_check_method test -z "$deplibs_check_method" && deplibs_check_method=unknown -@@ -6610,6 +6710,157 @@ test -z "$deplibs_check_method" && deplibs_check_method=unknown +@@ -6610,6 +6710,157 @@ test -z "$deplibs_check_method" && depli @@ -20602,7 +20435,7 @@ index 4727eff533a..ff7a4ab5c7a 100755 if test "x$ac_ct_AR" = x; then AR="false" else -@@ -6711,25 +6972,19 @@ ac_tool_warned=yes ;; +@@ -6711,29 +6972,81 @@ ac_tool_warned=yes ;; esac AR=$ac_ct_AR fi @@ -20634,13 +20467,17 @@ index 4727eff533a..ff7a4ab5c7a 100755 + rm -f conftest.* +: ${AR=ar} +: ${AR_FLAGS=cru} - - - -@@ -6741,6 +6996,64 @@ test -z "$AR_FLAGS" && AR_FLAGS=cru - - - ++ ++ ++ ++ ++ ++ ++ ++ ++ ++ ++ +{ $as_echo "$as_me:${as_lineno-$LINENO}: checking for archiver @FILE support" >&5 +$as_echo_n "checking for archiver @FILE support... " >&6; } +if ${lt_cv_ar_at_file+:} false; then : @@ -20653,7 +20490,7 @@ index 4727eff533a..ff7a4ab5c7a 100755 +int +main () +{ -+ + + ; + return 0; +} @@ -20679,29 +20516,22 @@ index 4727eff533a..ff7a4ab5c7a 100755 + fi + fi + rm -f conftest.* libconftest.a -+ + +fi +rm -f core conftest.err conftest.$ac_objext conftest.$ac_ext -+ + +fi +{ $as_echo "$as_me:${as_lineno-$LINENO}: result: $lt_cv_ar_at_file" >&5 +$as_echo "$lt_cv_ar_at_file" >&6; } -+ + +if test "x$lt_cv_ar_at_file" = xno; then + archiver_list_spec= +else + archiver_list_spec=$lt_cv_ar_at_file +fi -+ -+ -+ -+ -+ -+ -+ - if test -n "$ac_tool_prefix"; then - # Extract the first word of "${ac_tool_prefix}strip", so it can be a program name with args. - set dummy ${ac_tool_prefix}strip; ac_word=$2 + + + @@ -7080,8 +7393,8 @@ esac lt_cv_sys_global_symbol_to_cdecl="sed -n -e 's/^T .* \(.*\)$/extern int \1();/p' -e 's/^$symcode* .* \(.*\)$/extern char \1;/p'" @@ -20749,7 +20579,7 @@ index 4727eff533a..ff7a4ab5c7a 100755 const char *name; void *address; } -@@ -7195,8 +7521,8 @@ static const void *lt_preloaded_setup() { +@@ -7195,8 +7521,8 @@ static const void *lt_preloaded_setup() _LT_EOF # Now try linking the two files. mv conftest.$ac_objext conftstm.$ac_objext @@ -20771,7 +20601,7 @@ index 4727eff533a..ff7a4ab5c7a 100755 else echo "cannot find nm_test_func in $nlist" >&5 fi -@@ -7244,6 +7570,14 @@ else +@@ -7244,6 +7570,13 @@ else $as_echo "ok" >&6; } fi @@ -20782,11 +20612,10 @@ index 4727eff533a..ff7a4ab5c7a 100755 + nm_file_list_spec='@' +fi + -+ -@@ -7262,6 +7596,47 @@ fi +@@ -7265,6 +7598,48 @@ fi @@ -20795,8 +20624,6 @@ index 4727eff533a..ff7a4ab5c7a 100755 + + + -+ -+ +{ $as_echo "$as_me:${as_lineno-$LINENO}: checking for sysroot" >&5 +$as_echo_n "checking for sysroot... " >&6; } + @@ -20831,9 +20658,12 @@ index 4727eff533a..ff7a4ab5c7a 100755 +$as_echo "${lt_sysroot:-no}" >&6; } + + - - - ++ ++ ++ + # Check whether --enable-libtool-lock was given. + if test "${enable_libtool_lock+set}" = set; then : + enableval=$enable_libtool_lock; @@ -7471,6 +7846,123 @@ esac need_locks="$enable_libtool_lock" @@ -20976,7 +20806,7 @@ index 4727eff533a..ff7a4ab5c7a 100755 if test "$GCC" = yes; then lt_prog_compiler_wl='-Wl,' -@@ -8755,6 +9247,12 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -8755,6 +9247,12 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='--shared' lt_prog_compiler_static='--static' ;; @@ -20989,7 +20819,7 @@ index 4727eff533a..ff7a4ab5c7a 100755 pgcc* | pgf77* | pgf90* | pgf95* | pgfortran*) # Portland Group compilers (*not* the Pentium gcc compiler, # which looks to be a dead project) -@@ -8817,7 +9315,7 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -8817,7 +9315,7 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='-KPIC' lt_prog_compiler_static='-Bstatic' case $cc_basename in @@ -21150,7 +20980,7 @@ index 4727eff533a..ff7a4ab5c7a 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" archive_expsym_cmds='$CC -o $output_objdir/$soname $libobjs $deplibs '"\${wl}$no_entry_flag"' $compiler_flags `if test "x${allow_undefined_flag}" != "x"; then func_echo_all "${wl}${allow_undefined_flag}"; else :; fi` '"\${wl}$exp_sym_flag:\$export_symbols $shared_flag" -@@ -9646,7 +10167,13 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9646,7 +10167,13 @@ if test -z "$aix_libpath"; then aix_libp else # Determine the default libpath from the value encoded in an # empty executable. @@ -21208,7 +21038,7 @@ index 4727eff533a..ff7a4ab5c7a 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" # Warning - without using the other run time loading flags, -@@ -9719,20 +10253,63 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9719,20 +10253,63 @@ if test -z "$aix_libpath"; then aix_libp # Microsoft Visual C++. # hardcode_libdir_flag_spec is actually meaningless, as there is # no search path for DLLs. @@ -21286,7 +21116,7 @@ index 4727eff533a..ff7a4ab5c7a 100755 ;; darwin* | rhapsody*) -@@ -9793,7 +10370,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9793,7 +10370,7 @@ if test -z "$aix_libpath"; then aix_libp # FreeBSD 3 and greater uses gcc -shared to do shared libraries. freebsd* | dragonfly*) @@ -21295,7 +21125,7 @@ index 4727eff533a..ff7a4ab5c7a 100755 hardcode_libdir_flag_spec='-R$libdir' hardcode_direct=yes hardcode_shlibpath_var=no -@@ -9801,7 +10378,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9801,7 +10378,7 @@ if test -z "$aix_libpath"; then aix_libp hpux9*) if test "$GCC" = yes; then @@ -21304,7 +21134,7 @@ index 4727eff533a..ff7a4ab5c7a 100755 else archive_cmds='$RM $output_objdir/$soname~$LD -b +b $install_libdir -o $output_objdir/$soname $libobjs $deplibs $linker_flags~test $output_objdir/$soname = $lib || mv $output_objdir/$soname $lib' fi -@@ -9817,7 +10394,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9817,7 +10394,7 @@ if test -z "$aix_libpath"; then aix_libp hpux10*) if test "$GCC" = yes && test "$with_gnu_ld" = no; then @@ -21313,7 +21143,7 @@ index 4727eff533a..ff7a4ab5c7a 100755 else archive_cmds='$LD -b +h $soname +b $install_libdir -o $lib $libobjs $deplibs $linker_flags' fi -@@ -9841,10 +10418,10 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9841,10 +10418,10 @@ if test -z "$aix_libpath"; then aix_libp archive_cmds='$CC -shared ${wl}+h ${wl}$soname ${wl}+nodefaultrpath -o $lib $libobjs $deplibs $compiler_flags' ;; ia64*) @@ -21371,7 +21201,7 @@ index 4727eff533a..ff7a4ab5c7a 100755 else archive_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -o $lib' archive_expsym_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -exports_file $export_symbols -o $lib' -@@ -10024,7 +10614,7 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -10024,7 +10614,7 @@ rm -f core conftest.err conftest.$ac_obj osf4* | osf5*) # as osf3* with the addition of -msym flag if test "$GCC" = yes; then allow_undefined_flag=' ${wl}-expect_unresolved ${wl}\*' @@ -21380,7 +21210,7 @@ index 4727eff533a..ff7a4ab5c7a 100755 hardcode_libdir_flag_spec='${wl}-rpath ${wl}$libdir' else allow_undefined_flag=' -expect_unresolved \*' -@@ -10043,9 +10633,9 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -10043,9 +10633,9 @@ rm -f core conftest.err conftest.$ac_obj no_undefined_flag=' -z defs' if test "$GCC" = yes; then wlarc='${wl}' @@ -21521,7 +21351,7 @@ index 4727eff533a..ff7a4ab5c7a 100755 int main () { void *self = dlopen (0, LT_DLGLOBAL|LT_DLLAZY_OR_NOW); -@@ -13579,13 +14228,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_single_quote_subst"`' +@@ -13579,13 +14228,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_ lt_unset='`$ECHO "$lt_unset" | $SED "$delay_single_quote_subst"`' lt_SP2NL='`$ECHO "$lt_SP2NL" | $SED "$delay_single_quote_subst"`' lt_NL2SP='`$ECHO "$lt_NL2SP" | $SED "$delay_single_quote_subst"`' @@ -21542,7 +21372,7 @@ index 4727eff533a..ff7a4ab5c7a 100755 STRIP='`$ECHO "$STRIP" | $SED "$delay_single_quote_subst"`' RANLIB='`$ECHO "$RANLIB" | $SED "$delay_single_quote_subst"`' old_postinstall_cmds='`$ECHO "$old_postinstall_cmds" | $SED "$delay_single_quote_subst"`' -@@ -13600,14 +14256,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$lt_cv_sys_global_symbol_pipe" | $SED "$de +@@ -13600,14 +14256,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$l lt_cv_sys_global_symbol_to_cdecl='`$ECHO "$lt_cv_sys_global_symbol_to_cdecl" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address_lib_prefix='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address_lib_prefix" | $SED "$delay_single_quote_subst"`' @@ -21561,7 +21391,7 @@ index 4727eff533a..ff7a4ab5c7a 100755 DSYMUTIL='`$ECHO "$DSYMUTIL" | $SED "$delay_single_quote_subst"`' NMEDIT='`$ECHO "$NMEDIT" | $SED "$delay_single_quote_subst"`' LIPO='`$ECHO "$LIPO" | $SED "$delay_single_quote_subst"`' -@@ -13640,12 +14299,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcode_shlibpath_var" | $SED "$delay_single_q +@@ -13640,12 +14299,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcod hardcode_automatic='`$ECHO "$hardcode_automatic" | $SED "$delay_single_quote_subst"`' inherit_rpath='`$ECHO "$inherit_rpath" | $SED "$delay_single_quote_subst"`' link_all_deplibs='`$ECHO "$link_all_deplibs" | $SED "$delay_single_quote_subst"`' @@ -21675,7 +21505,7 @@ index 4727eff533a..ff7a4ab5c7a 100755 # A symbol stripping program. STRIP=$lt_STRIP -@@ -14669,6 +15359,12 @@ global_symbol_to_c_name_address=$lt_lt_cv_sys_global_symbol_to_c_name_address +@@ -14669,6 +15359,12 @@ global_symbol_to_c_name_address=$lt_lt_c # Transform the output of nm in a C name address pair when lib prefix is needed. global_symbol_to_c_name_address_lib_prefix=$lt_lt_cv_sys_global_symbol_to_c_name_address_lib_prefix @@ -21936,15 +21766,9 @@ index 4727eff533a..ff7a4ab5c7a 100755 -_LT_EOF - ;; - esac -- -- -- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ -- || (rm -f "$cfgfile"; exit 1) -- -- mv -f "$cfgfile" "$ofile" || + sed '$q' "$ltmain" >> "$cfgfile" \ + || (rm -f "$cfgfile"; exit 1) -+ + + if test x"$xsi_shell" = xyes; then + sed -e '/^func_dirname ()$/,/^} # func_dirname /c\ +func_dirname ()\ @@ -22102,14 +21926,15 @@ index 4727eff533a..ff7a4ab5c7a 100755 + { $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: Unable to substitute extended shell functions in $ofile" >&5 +$as_echo "$as_me: WARNING: Unable to substitute extended shell functions in $ofile" >&2;} +fi -+ -+ + +- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ +- || (rm -f "$cfgfile"; exit 1) + +- mv -f "$cfgfile" "$ofile" || + mv -f "$cfgfile" "$ofile" || (rm -f "$ofile" && cp "$cfgfile" "$ofile" && rm -f "$cfgfile") chmod +x "$ofile" -diff --git a/libtool.m4 b/libtool.m4 -index e36fdd3c0e2..4acf9d67956 100644 --- a/libtool.m4 +++ b/libtool.m4 @@ -1,7 +1,8 @@ @@ -22141,7 +21966,7 @@ index e36fdd3c0e2..4acf9d67956 100644 # LT_PREREQ(VERSION) -@@ -166,10 +168,13 @@ _LT_DECL([], [exeext], [0], [Executable file suffix (normally "")])dnl +@@ -166,10 +168,13 @@ _LT_DECL([], [exeext], [0], [Executable dnl m4_require([_LT_FILEUTILS_DEFAULTS])dnl m4_require([_LT_CHECK_SHELL_FEATURES])dnl @@ -22155,7 +21980,7 @@ index e36fdd3c0e2..4acf9d67956 100644 _LT_CONFIG_LIBTOOL_INIT([ # See if we are running on zsh, and set the options which allow our -@@ -632,7 +637,7 @@ m4_ifset([AC_PACKAGE_NAME], [AC_PACKAGE_NAME ])config.lt[]dnl +@@ -632,7 +637,7 @@ m4_ifset([AC_PACKAGE_NAME], [AC_PACKAGE_ m4_ifset([AC_PACKAGE_VERSION], [ AC_PACKAGE_VERSION]) configured by $[0], generated by m4_PACKAGE_STRING. @@ -22260,7 +22085,7 @@ index e36fdd3c0e2..4acf9d67956 100644 test "X`print -r -- $ECHO 2>/dev/null`" = "X$ECHO"; then ECHO='print -r --' elif test "X`printf %s $ECHO 2>/dev/null`" = "X$ECHO"; then -@@ -1163,6 +1178,39 @@ _LT_DECL([], [ECHO], [1], [An echo program that protects backslashes]) +@@ -1163,6 +1178,39 @@ _LT_DECL([], [ECHO], [1], [An echo progr ])# _LT_PROG_ECHO_BACKSLASH @@ -22528,7 +22353,7 @@ index e36fdd3c0e2..4acf9d67956 100644 file_magic_cmd=$lt_cv_file_magic_cmd deplibs_check_method=$lt_cv_deplibs_check_method test -z "$deplibs_check_method" && deplibs_check_method=unknown -@@ -3225,7 +3382,11 @@ test -z "$deplibs_check_method" && deplibs_check_method=unknown +@@ -3225,7 +3382,11 @@ test -z "$deplibs_check_method" && depli _LT_DECL([], [deplibs_check_method], [1], [Method to check whether dependent libraries are shared objects]) _LT_DECL([], [file_magic_cmd], [1], @@ -22656,7 +22481,7 @@ index e36fdd3c0e2..4acf9d67956 100644 const char *name; void *address; } -@@ -3569,15 +3804,15 @@ static const void *lt_preloaded_setup() { +@@ -3569,15 +3804,15 @@ static const void *lt_preloaded_setup() _LT_EOF # Now try linking the two files. mv conftest.$ac_objext conftstm.$ac_objext @@ -22690,7 +22515,7 @@ index e36fdd3c0e2..4acf9d67956 100644 _LT_DECL([global_symbol_pipe], [lt_cv_sys_global_symbol_pipe], [1], [Take the output of nm and produce a listing of raw symbols and C names]) _LT_DECL([global_symbol_to_cdecl], [lt_cv_sys_global_symbol_to_cdecl], [1], -@@ -3620,6 +3862,8 @@ _LT_DECL([global_symbol_to_c_name_address], +@@ -3620,6 +3862,8 @@ _LT_DECL([global_symbol_to_c_name_addres _LT_DECL([global_symbol_to_c_name_address_lib_prefix], [lt_cv_sys_global_symbol_to_c_name_address_lib_prefix], [1], [Transform the output of nm in a C name address pair when lib prefix is needed]) @@ -22775,7 +22600,7 @@ index e36fdd3c0e2..4acf9d67956 100644 # # Check to make sure the static flag actually works. # -@@ -4272,6 +4531,7 @@ _LT_TAGDECL([link_static_flag], [lt_prog_compiler_static], [1], +@@ -4272,6 +4531,7 @@ _LT_TAGDECL([link_static_flag], [lt_prog m4_defun([_LT_LINKER_SHLIBS], [AC_REQUIRE([LT_PATH_LD])dnl AC_REQUIRE([LT_PATH_NM])dnl @@ -23097,7 +22922,7 @@ index e36fdd3c0e2..4acf9d67956 100644 if test -n "$CXX" && ( test "X$CXX" != "Xno" && ( (test "X$CXX" = "Xg++" && `g++ -v >/dev/null 2>&1` ) || (test "X$CXX" != "Xg++"))) ; then -@@ -5546,6 +5872,7 @@ if test "$_lt_caught_CXX_error" != yes; then +@@ -5546,6 +5872,7 @@ if test "$_lt_caught_CXX_error" != yes; # Allow CC to be a program name with arguments. lt_save_CC=$CC @@ -23105,7 +22930,7 @@ index e36fdd3c0e2..4acf9d67956 100644 lt_save_LD=$LD lt_save_GCC=$GCC GCC=$GXX -@@ -5563,6 +5890,7 @@ if test "$_lt_caught_CXX_error" != yes; then +@@ -5563,6 +5890,7 @@ if test "$_lt_caught_CXX_error" != yes; fi test -z "${LDCXX+set}" || LD=$LDCXX CC=${CXX-"c++"} @@ -23113,7 +22938,7 @@ index e36fdd3c0e2..4acf9d67956 100644 compiler=$CC _LT_TAGVAR(compiler, $1)=$CC _LT_CC_BASENAME([$compiler]) -@@ -5726,7 +6054,7 @@ if test "$_lt_caught_CXX_error" != yes; then +@@ -5726,7 +6054,7 @@ if test "$_lt_caught_CXX_error" != yes; _LT_TAGVAR(allow_undefined_flag, $1)='-berok' # Determine the default libpath from the value encoded in an empty # executable. @@ -23122,7 +22947,7 @@ index e36fdd3c0e2..4acf9d67956 100644 _LT_TAGVAR(hardcode_libdir_flag_spec, $1)='${wl}-blibpath:$libdir:'"$aix_libpath" _LT_TAGVAR(archive_expsym_cmds, $1)='$CC -o $output_objdir/$soname $libobjs $deplibs '"\${wl}$no_entry_flag"' $compiler_flags `if test "x${allow_undefined_flag}" != "x"; then func_echo_all "${wl}${allow_undefined_flag}"; else :; fi` '"\${wl}$exp_sym_flag:\$export_symbols $shared_flag" -@@ -5738,7 +6066,7 @@ if test "$_lt_caught_CXX_error" != yes; then +@@ -5738,7 +6066,7 @@ if test "$_lt_caught_CXX_error" != yes; else # Determine the default libpath from the value encoded in an # empty executable. @@ -23131,7 +22956,7 @@ index e36fdd3c0e2..4acf9d67956 100644 _LT_TAGVAR(hardcode_libdir_flag_spec, $1)='${wl}-blibpath:$libdir:'"$aix_libpath" # Warning - without using the other run time loading flags, # -berok will link without error, but may produce a broken library. -@@ -5780,29 +6108,75 @@ if test "$_lt_caught_CXX_error" != yes; then +@@ -5780,29 +6108,75 @@ if test "$_lt_caught_CXX_error" != yes; ;; cygwin* | mingw* | pw32* | cegcc*) @@ -23230,7 +23055,7 @@ index e36fdd3c0e2..4acf9d67956 100644 darwin* | rhapsody*) _LT_DARWIN_LINKER_FEATURES($1) ;; -@@ -5877,7 +6251,7 @@ if test "$_lt_caught_CXX_error" != yes; then +@@ -5877,7 +6251,7 @@ if test "$_lt_caught_CXX_error" != yes; ;; *) if test "$GXX" = yes; then @@ -23239,7 +23064,7 @@ index e36fdd3c0e2..4acf9d67956 100644 else # FIXME: insert proper C++ library support _LT_TAGVAR(ld_shlibs, $1)=no -@@ -5948,10 +6322,10 @@ if test "$_lt_caught_CXX_error" != yes; then +@@ -5948,10 +6322,10 @@ if test "$_lt_caught_CXX_error" != yes; _LT_TAGVAR(archive_cmds, $1)='$CC -shared -nostdlib -fPIC ${wl}+h ${wl}$soname ${wl}+nodefaultrpath -o $lib $predep_objects $libobjs $deplibs $postdep_objects $compiler_flags' ;; ia64*) @@ -23252,7 +23077,7 @@ index e36fdd3c0e2..4acf9d67956 100644 ;; esac fi -@@ -5992,9 +6366,9 @@ if test "$_lt_caught_CXX_error" != yes; then +@@ -5992,9 +6366,9 @@ if test "$_lt_caught_CXX_error" != yes; *) if test "$GXX" = yes; then if test "$with_gnu_ld" = no; then @@ -23264,7 +23089,7 @@ index e36fdd3c0e2..4acf9d67956 100644 fi fi _LT_TAGVAR(link_all_deplibs, $1)=yes -@@ -6272,7 +6646,7 @@ if test "$_lt_caught_CXX_error" != yes; then +@@ -6272,7 +6646,7 @@ if test "$_lt_caught_CXX_error" != yes; _LT_TAGVAR(archive_cmds, $1)='$CC -shared -nostdlib ${allow_undefined_flag} $predep_objects $libobjs $deplibs $postdep_objects $compiler_flags ${wl}-soname ${wl}$soname `test -n "$verstring" && func_echo_all "${wl}-set_version ${wl}$verstring"` ${wl}-update_registry ${wl}${output_objdir}/so_locations -o $lib' ;; *) @@ -23273,7 +23098,7 @@ index e36fdd3c0e2..4acf9d67956 100644 ;; esac -@@ -6318,7 +6692,7 @@ if test "$_lt_caught_CXX_error" != yes; then +@@ -6318,7 +6692,7 @@ if test "$_lt_caught_CXX_error" != yes; solaris*) case $cc_basename in @@ -23282,7 +23107,7 @@ index e36fdd3c0e2..4acf9d67956 100644 # Sun C++ 4.2, 5.x and Centerline C++ _LT_TAGVAR(archive_cmds_need_lc,$1)=yes _LT_TAGVAR(no_undefined_flag, $1)=' -zdefs' -@@ -6359,9 +6733,9 @@ if test "$_lt_caught_CXX_error" != yes; then +@@ -6359,9 +6733,9 @@ if test "$_lt_caught_CXX_error" != yes; if test "$GXX" = yes && test "$with_gnu_ld" = no; then _LT_TAGVAR(no_undefined_flag, $1)=' ${wl}-z ${wl}defs' if $CC --version | $GREP -v '^2\.7' > /dev/null; then @@ -23294,7 +23119,7 @@ index e36fdd3c0e2..4acf9d67956 100644 # Commands to make compiler produce verbose output that lists # what "hidden" libraries, object files and flags are used when -@@ -6491,6 +6865,7 @@ if test "$_lt_caught_CXX_error" != yes; then +@@ -6491,6 +6865,7 @@ if test "$_lt_caught_CXX_error" != yes; fi # test -n "$compiler" CC=$lt_save_CC @@ -23502,7 +23327,7 @@ index e36fdd3c0e2..4acf9d67956 100644 ])# _LT_LANG_RC_CONFIG -@@ -7161,6 +7591,15 @@ _LT_DECL([], [OBJDUMP], [1], [An object symbol dumper]) +@@ -7161,6 +7591,15 @@ _LT_DECL([], [OBJDUMP], [1], [An object AC_SUBST([OBJDUMP]) ]) @@ -23529,7 +23354,7 @@ index e36fdd3c0e2..4acf9d67956 100644 && eval 'test $(( 1 + 1 )) -eq 2 \ && test "${#_lt_dummy}" -eq 5' ) >/dev/null 2>&1 \ && xsi_shell=yes -@@ -7294,206 +7733,162 @@ _LT_DECL([NL2SP], [lt_NL2SP], [1], [turn newlines into spaces])dnl +@@ -7294,206 +7733,162 @@ _LT_DECL([NL2SP], [lt_NL2SP], [1], [turn ])# _LT_CHECK_SHELL_FEATURES @@ -23627,6 +23452,31 @@ index e36fdd3c0e2..4acf9d67956 100644 -{ - func_len_result=${#1} -} +- +-_LT_EOF +- ;; +- *) # Bourne compatible functions. +- cat << \_LT_EOF >> "$cfgfile" +- +-# func_dirname file append nondir_replacement +-# Compute the dirname of FILE. If nonempty, add APPEND to the result, +-# otherwise set result to NONDIR_REPLACEMENT. +-func_dirname () +-{ +- # Extract subdirectory from the argument. +- func_dirname_result=`$ECHO "${1}" | $SED "$dirname"` +- if test "X$func_dirname_result" = "X${1}"; then +- func_dirname_result="${3}" +- else +- func_dirname_result="$func_dirname_result${2}" +- fi +-} +- +-# func_basename file +-func_basename () +-{ +- func_basename_result=`$ECHO "${1}" | $SED "$basename"` +-} +# _LT_PROG_FUNCTION_REPLACE (FUNCNAME, REPLACEMENT-BODY) +# ------------------------------------------------------ +# In `$cfgfile', look for function FUNCNAME delimited by `^FUNCNAME ()$' and @@ -23643,23 +23493,22 @@ index e36fdd3c0e2..4acf9d67956 100644 +test 0 -eq $? || _lt_function_replace_fail=: +]) --_LT_EOF -- ;; -- *) # Bourne compatible functions. -- cat << \_LT_EOF >> "$cfgfile" +-dnl func_dirname_and_basename +-dnl A portable version of this function is already defined in general.m4sh +-dnl so there is no need for it here. --# func_dirname file append nondir_replacement --# Compute the dirname of FILE. If nonempty, add APPEND to the result, --# otherwise set result to NONDIR_REPLACEMENT. --func_dirname () +-# func_stripname prefix suffix name +-# strip PREFIX and SUFFIX off of NAME. +-# PREFIX and SUFFIX must not contain globbing or regex special +-# characters, hashes, percent signs, but SUFFIX may contain a leading +-# dot (in which case that matches only a dot). +-# func_strip_suffix prefix name +-func_stripname () -{ -- # Extract subdirectory from the argument. -- func_dirname_result=`$ECHO "${1}" | $SED "$dirname"` -- if test "X$func_dirname_result" = "X${1}"; then -- func_dirname_result="${3}" -- else -- func_dirname_result="$func_dirname_result${2}" -- fi +- case ${2} in +- .*) func_stripname_result=`$ECHO "${3}" | $SED "s%^${1}%%; s%\\\\${2}\$%%"`;; +- *) func_stripname_result=`$ECHO "${3}" | $SED "s%^${1}%%; s%${2}\$%%"`;; +- esac -} +# _LT_PROG_REPLACE_SHELLFNS +# ------------------------- @@ -23683,45 +23532,24 @@ index e36fdd3c0e2..4acf9d67956 100644 + esac + func_basename_result="${1##*/}"]) --# func_basename file --func_basename () --{ -- func_basename_result=`$ECHO "${1}" | $SED "$basename"` --} +-# sed scripts: +-my_sed_long_opt='1s/^\(-[[^=]]*\)=.*/\1/;q' +-my_sed_long_arg='1s/^-[[^=]]*=//' + _LT_PROG_FUNCTION_REPLACE([func_stripname], [dnl + # pdksh 5.2.14 does not do ${X%$Y} correctly if both X and Y are + # positional parameters, so assign one to ordinary parameter first. + func_stripname_result=${3} + func_stripname_result=${func_stripname_result#"${1}"} + func_stripname_result=${func_stripname_result%"${2}"}]) - --dnl func_dirname_and_basename --dnl A portable version of this function is already defined in general.m4sh --dnl so there is no need for it here. ++ + _LT_PROG_FUNCTION_REPLACE([func_split_long_opt], [dnl + func_split_long_opt_name=${1%%=*} + func_split_long_opt_arg=${1#*=}]) - --# func_stripname prefix suffix name --# strip PREFIX and SUFFIX off of NAME. --# PREFIX and SUFFIX must not contain globbing or regex special --# characters, hashes, percent signs, but SUFFIX may contain a leading --# dot (in which case that matches only a dot). --# func_strip_suffix prefix name --func_stripname () --{ -- case ${2} in -- .*) func_stripname_result=`$ECHO "${3}" | $SED "s%^${1}%%; s%\\\\${2}\$%%"`;; -- *) func_stripname_result=`$ECHO "${3}" | $SED "s%^${1}%%; s%${2}\$%%"`;; -- esac --} ++ + _LT_PROG_FUNCTION_REPLACE([func_split_short_opt], [dnl + func_split_short_opt_arg=${1#??} + func_split_short_opt_name=${1%"$func_split_short_opt_arg"}]) - --# sed scripts: --my_sed_long_opt='1s/^\(-[[^=]]*\)=.*/\1/;q' --my_sed_long_arg='1s/^-[[^=]]*=//' ++ + _LT_PROG_FUNCTION_REPLACE([func_lo2o], [dnl + case ${1} in + *.lo) func_lo2o_result=${1%.lo}.${objext} ;; @@ -23769,9 +23597,7 @@ index e36fdd3c0e2..4acf9d67956 100644 + func_quote_for_eval "${2}" +dnl m4 expansion turns \\\\ into \\, and then the shell eval turns that into \ + eval "${1}+=\\\\ \\$func_quote_for_eval_result"]) - --_LT_EOF --esac ++ + # Save a `func_append' function call where possible by direct use of '+=' + sed -e 's%func_append \([[a-zA-Z_]]\{1,\}\) "%\1+="%g' $cfgfile > $cfgfile.tmp \ + && mv -f "$cfgfile.tmp" "$cfgfile" \ @@ -23785,14 +23611,17 @@ index e36fdd3c0e2..4acf9d67956 100644 + test 0 -eq $? || _lt_function_replace_fail=: +fi --case $lt_shell_append in -- yes) -- cat << \_LT_EOF >> "$cfgfile" +-_LT_EOF +-esac +if test x"$_lt_function_replace_fail" = x":"; then + AC_MSG_WARN([Unable to substitute extended shell functions in $ofile]) +fi +]) +-case $lt_shell_append in +- yes) +- cat << \_LT_EOF >> "$cfgfile" +- -# func_append var value -# Append VALUE to the end of shell variable VAR. -func_append () @@ -23878,8 +23707,6 @@ index e36fdd3c0e2..4acf9d67956 100644 +_LT_DECL([to_tool_file_cmd], [lt_cv_to_tool_file_cmd], + [0], [convert $build files to toolchain format])dnl +])# _LT_PATH_CONVERSION_FUNCTIONS -diff --git a/ltmain.sh b/ltmain.sh -index 1a710177fb2..09693d7b99b 100644 --- a/ltmain.sh +++ b/ltmain.sh @@ -1,10 +1,9 @@ @@ -24311,31 +24138,7 @@ index 1a710177fb2..09693d7b99b 100644 +$progname: of $PACKAGE $VERSION and run autoconf again. +_LT_EOF + fi - -- # Shorthand for --mode=foo, only valid as the first argument -- case $1 in -- clean|clea|cle|cl) -- shift; set dummy --mode clean ${1+"$@"}; shift -- ;; -- compile|compil|compi|comp|com|co|c) -- shift; set dummy --mode compile ${1+"$@"}; shift -- ;; -- execute|execut|execu|exec|exe|ex|e) -- shift; set dummy --mode execute ${1+"$@"}; shift -- ;; -- finish|finis|fini|fin|fi|f) -- shift; set dummy --mode finish ${1+"$@"}; shift -- ;; -- install|instal|insta|inst|ins|in|i) -- shift; set dummy --mode install ${1+"$@"}; shift -- ;; -- link|lin|li|l) -- shift; set dummy --mode link ${1+"$@"}; shift -- ;; -- uninstall|uninstal|uninsta|uninst|unins|unin|uni|un|u) -- shift; set dummy --mode uninstall ${1+"$@"}; shift -- ;; -- esac ++ + exit $EXIT_MISMATCH + fi +} @@ -24365,9 +24168,7 @@ index 1a710177fb2..09693d7b99b 100644 + shift; set dummy --mode uninstall ${1+"$@"}; shift + ;; +esac - -- # Parse non-mode specific arguments: -- while test "$#" -gt 0; do ++ + + +# Option defaults: @@ -24383,8 +24184,34 @@ index 1a710177fb2..09693d7b99b 100644 +opt_verbose=: +opt_silent=false +opt_verbose=false -+ -+ + +- # Shorthand for --mode=foo, only valid as the first argument +- case $1 in +- clean|clea|cle|cl) +- shift; set dummy --mode clean ${1+"$@"}; shift +- ;; +- compile|compil|compi|comp|com|co|c) +- shift; set dummy --mode compile ${1+"$@"}; shift +- ;; +- execute|execut|execu|exec|exe|ex|e) +- shift; set dummy --mode execute ${1+"$@"}; shift +- ;; +- finish|finis|fini|fin|fi|f) +- shift; set dummy --mode finish ${1+"$@"}; shift +- ;; +- install|instal|insta|inst|ins|in|i) +- shift; set dummy --mode install ${1+"$@"}; shift +- ;; +- link|lin|li|l) +- shift; set dummy --mode link ${1+"$@"}; shift +- ;; +- uninstall|uninstal|uninsta|uninst|unins|unin|uni|un|u) +- shift; set dummy --mode uninstall ${1+"$@"}; shift +- ;; +- esac + +- # Parse non-mode specific arguments: +- while test "$#" -gt 0; do +# Parse options once, thoroughly. This comes as soon as possible in the +# script to make things like `--version' happen as quickly as we can. +{ @@ -24628,13 +24455,13 @@ index 1a710177fb2..09693d7b99b 100644 - fi -} - -+ # Darwin sucks -+ eval std_shrext=\"$shrext_cmds\" - +- -## ----------- ## -## Main. ## -## ----------- ## -- ++ # Darwin sucks ++ eval std_shrext=\"$shrext_cmds\" + -$opt_help || { - # Sanity checks first: - func_check_version_match @@ -25355,7 +25182,7 @@ index 1a710177fb2..09693d7b99b 100644 "") # Generic help is extracted from the usage comments # at the start of this file. -@@ -1659,8 +2327,8 @@ This mode accepts the following additional options: +@@ -1659,8 +2327,8 @@ This mode accepts the following addition -o OUTPUT-FILE set the output file name to OUTPUT-FILE -no-suppress do not suppress compiler output for multiple passes @@ -25366,7 +25193,7 @@ index 1a710177fb2..09693d7b99b 100644 -shared do not build a \`.o' file suitable for static linking -static only build a \`.o' file suitable for static linking -Wc,FLAG pass FLAG directly to the compiler -@@ -1804,7 +2472,7 @@ Otherwise, only FILE itself is deleted using RM." +@@ -1804,7 +2472,7 @@ Otherwise, only FILE itself is deleted u ;; *) @@ -25468,7 +25295,7 @@ index 1a710177fb2..09693d7b99b 100644 + do + if test -d "$opt"; then + func_append libdirs " $opt" - ++ + elif test -f "$opt"; then + if func_lalib_unsafe_p "$opt"; then + func_append libs " $opt" @@ -25488,7 +25315,7 @@ index 1a710177fb2..09693d7b99b 100644 + else + sysroot_cmd= + fi -+ + + # Remove sysroot references + if $opt_dry_run; then + for lib in $libs; do @@ -25900,7 +25727,7 @@ index 1a710177fb2..09693d7b99b 100644 lt_${my_prefix}_LTX_preloaded_symbols[] = {\ { \"$my_originator\", (void *) 0 }," -@@ -2736,7 +3493,7 @@ static const void *lt_preloaded_setup() { +@@ -2736,7 +3493,7 @@ static const void *lt_preloaded_setup() for arg in $LTCFLAGS; do case $arg in -pie | -fpie | -fPIE) ;; @@ -26411,7 +26238,7 @@ index 1a710177fb2..09693d7b99b 100644 */ EOF cat <<"EOF" -@@ -3462,22 +4272,13 @@ int setenv (const char *, const char *, int); +@@ -3462,22 +4272,13 @@ int setenv (const char *, const char *, if (stale) { free ((void *) stale); stale = 0; } \ } while (0) @@ -26438,7 +26265,7 @@ index 1a710177fb2..09693d7b99b 100644 void *xmalloc (size_t num); char *xstrdup (const char *string); -@@ -3487,7 +4288,10 @@ char *chase_symlinks (const char *pathspec); +@@ -3487,7 +4288,10 @@ char *chase_symlinks (const char *pathsp int make_executable (const char *path); int check_executable (const char *path); char *strendzap (char *str, const char *pat); @@ -26766,7 +26593,7 @@ index 1a710177fb2..09693d7b99b 100644 vfprintf (stderr, message, ap); fprintf (stderr, ".\n"); -@@ -3988,20 +4832,32 @@ lt_error_core (int exit_status, const char *mode, +@@ -3988,20 +4832,32 @@ lt_error_core (int exit_status, const ch } void @@ -26804,7 +26631,7 @@ index 1a710177fb2..09693d7b99b 100644 { #ifdef HAVE_SETENV /* always make a copy, for consistency with !HAVE_SETENV */ -@@ -4049,9 +4905,9 @@ lt_extend_str (const char *orig_value, const char *add, int to_end) +@@ -4049,9 +4905,9 @@ lt_extend_str (const char *orig_value, c void lt_update_exe_path (const char *name, const char *value) { @@ -26817,7 +26644,7 @@ index 1a710177fb2..09693d7b99b 100644 if (name && *name && value && *value) { -@@ -4070,9 +4926,9 @@ lt_update_exe_path (const char *name, const char *value) +@@ -4070,9 +4926,9 @@ lt_update_exe_path (const char *name, co void lt_update_lib_path (const char *name, const char *value) { @@ -29070,8 +28897,6 @@ index 1a710177fb2..09693d7b99b 100644 if test -n "$exec_cmd"; then eval exec "$exec_cmd" -diff --git a/ltoptions.m4 b/ltoptions.m4 -index 5ef12ced2a8..17cfd51c0b3 100644 --- a/ltoptions.m4 +++ b/ltoptions.m4 @@ -8,7 +8,7 @@ @@ -29083,8 +28908,6 @@ index 5ef12ced2a8..17cfd51c0b3 100644 # This is to help aclocal find these macros, as it can't see m4_define. AC_DEFUN([LTOPTIONS_VERSION], [m4_if([1])]) -diff --git a/ltversion.m4 b/ltversion.m4 -index bf87f77132d..9c7b5d41185 100644 --- a/ltversion.m4 +++ b/ltversion.m4 @@ -7,17 +7,17 @@ @@ -29111,8 +28934,6 @@ index bf87f77132d..9c7b5d41185 100644 _LT_DECL(, macro_version, 0, [Which release of libtool.m4 was used?]) _LT_DECL(, macro_revision, 0) ]) -diff --git a/lt~obsolete.m4 b/lt~obsolete.m4 -index bf92b5e0790..c573da90c5c 100644 --- a/lt~obsolete.m4 +++ b/lt~obsolete.m4 @@ -7,7 +7,7 @@ @@ -29124,8 +28945,6 @@ index bf92b5e0790..c573da90c5c 100644 # These exist entirely to fool aclocal when bootstrapping libtool. # -diff --git a/opcodes/Makefile.in b/opcodes/Makefile.in -index 4399354e5a9..4b1625febf3 100644 --- a/opcodes/Makefile.in +++ b/opcodes/Makefile.in @@ -298,6 +298,7 @@ CYGPATH_W = @CYGPATH_W@ @@ -29152,8 +28971,6 @@ index 4399354e5a9..4b1625febf3 100644 ac_ct_CC = @ac_ct_CC@ ac_ct_DUMPBIN = @ac_ct_DUMPBIN@ am__include = @am__include@ -diff --git a/opcodes/configure b/opcodes/configure -index 3dd6b692f89..64e9ba9b587 100755 --- a/opcodes/configure +++ b/opcodes/configure @@ -686,6 +686,9 @@ OTOOL @@ -29203,7 +29020,7 @@ index 3dd6b692f89..64e9ba9b587 100755 test "X`print -r -- $ECHO 2>/dev/null`" = "X$ECHO"; then ECHO='print -r --' elif test "X`printf %s $ECHO 2>/dev/null`" = "X$ECHO"; then -@@ -5542,8 +5548,8 @@ $as_echo_n "checking whether the shell understands some XSI constructs... " >&6; +@@ -5542,8 +5548,8 @@ $as_echo_n "checking whether the shell u # Try some XSI features xsi_shell=no ( _lt_dummy="a/b/c" @@ -29339,7 +29156,7 @@ index 3dd6b692f89..64e9ba9b587 100755 file_magic_cmd=$lt_cv_file_magic_cmd deplibs_check_method=$lt_cv_deplibs_check_method test -z "$deplibs_check_method" && deplibs_check_method=unknown -@@ -5950,6 +6051,157 @@ test -z "$deplibs_check_method" && deplibs_check_method=unknown +@@ -5950,6 +6051,157 @@ test -z "$deplibs_check_method" && depli @@ -29558,7 +29375,7 @@ index 3dd6b692f89..64e9ba9b587 100755 if test "x$ac_ct_AR" = x; then AR="false" else -@@ -6051,25 +6313,20 @@ ac_tool_warned=yes ;; +@@ -6051,29 +6313,81 @@ ac_tool_warned=yes ;; esac AR=$ac_ct_AR fi @@ -29591,11 +29408,14 @@ index 3dd6b692f89..64e9ba9b587 100755 +: ${AR=ar} +: ${AR_FLAGS=cru} + - - - -@@ -6080,6 +6337,63 @@ test -z "$AR_FLAGS" && AR_FLAGS=cru - ++ ++ ++ ++ ++ ++ ++ ++ +{ $as_echo "$as_me:${as_lineno-$LINENO}: checking for archiver @FILE support" >&5 @@ -29639,25 +29459,19 @@ index 3dd6b692f89..64e9ba9b587 100755 + +fi +rm -f core conftest.err conftest.$ac_objext conftest.$ac_ext -+ + +fi +{ $as_echo "$as_me:${as_lineno-$LINENO}: result: $lt_cv_ar_at_file" >&5 +$as_echo "$lt_cv_ar_at_file" >&6; } -+ + +if test "x$lt_cv_ar_at_file" = xno; then + archiver_list_spec= +else + archiver_list_spec=$lt_cv_ar_at_file +fi -+ -+ -+ -+ -+ -+ - if test -n "$ac_tool_prefix"; then - # Extract the first word of "${ac_tool_prefix}strip", so it can be a program name with args. + + @@ -6420,8 +6734,8 @@ esac lt_cv_sys_global_symbol_to_cdecl="sed -n -e 's/^T .* \(.*\)$/extern int \1();/p' -e 's/^$symcode* .* \(.*\)$/extern char \1;/p'" @@ -29705,7 +29519,7 @@ index 3dd6b692f89..64e9ba9b587 100755 const char *name; void *address; } -@@ -6535,8 +6862,8 @@ static const void *lt_preloaded_setup() { +@@ -6535,8 +6862,8 @@ static const void *lt_preloaded_setup() _LT_EOF # Now try linking the two files. mv conftest.$ac_objext conftstm.$ac_objext @@ -29727,7 +29541,7 @@ index 3dd6b692f89..64e9ba9b587 100755 else echo "cannot find nm_test_func in $nlist" >&5 fi -@@ -6584,6 +6911,14 @@ else +@@ -6584,6 +6911,12 @@ else $as_echo "ok" >&6; } fi @@ -29737,12 +29551,10 @@ index 3dd6b692f89..64e9ba9b587 100755 +elif $NM --help 2>/dev/null | grep '[@]FILE' >/dev/null; then + nm_file_list_spec='@' +fi -+ -+ -@@ -6602,6 +6937,47 @@ fi +@@ -6605,6 +6938,49 @@ fi @@ -29752,7 +29564,6 @@ index 3dd6b692f89..64e9ba9b587 100755 + + + -+ +{ $as_echo "$as_me:${as_lineno-$LINENO}: checking for sysroot" >&5 +$as_echo_n "checking for sysroot... " >&6; } + @@ -29787,9 +29598,12 @@ index 3dd6b692f89..64e9ba9b587 100755 +$as_echo "${lt_sysroot:-no}" >&6; } + + - - - ++ ++ ++ + # Check whether --enable-libtool-lock was given. + if test "${enable_libtool_lock+set}" = set; then : + enableval=$enable_libtool_lock; @@ -6811,6 +7187,123 @@ esac need_locks="$enable_libtool_lock" @@ -29932,7 +29746,7 @@ index 3dd6b692f89..64e9ba9b587 100755 if test "$GCC" = yes; then lt_prog_compiler_wl='-Wl,' -@@ -8095,6 +8588,12 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -8095,6 +8588,12 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='--shared' lt_prog_compiler_static='--static' ;; @@ -29945,7 +29759,7 @@ index 3dd6b692f89..64e9ba9b587 100755 pgcc* | pgf77* | pgf90* | pgf95* | pgfortran*) # Portland Group compilers (*not* the Pentium gcc compiler, # which looks to be a dead project) -@@ -8157,7 +8656,7 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -8157,7 +8656,7 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='-KPIC' lt_prog_compiler_static='-Bstatic' case $cc_basename in @@ -30106,7 +29920,7 @@ index 3dd6b692f89..64e9ba9b587 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" archive_expsym_cmds='$CC -o $output_objdir/$soname $libobjs $deplibs '"\${wl}$no_entry_flag"' $compiler_flags `if test "x${allow_undefined_flag}" != "x"; then func_echo_all "${wl}${allow_undefined_flag}"; else :; fi` '"\${wl}$exp_sym_flag:\$export_symbols $shared_flag" -@@ -8986,7 +9508,13 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -8986,7 +9508,13 @@ if test -z "$aix_libpath"; then aix_libp else # Determine the default libpath from the value encoded in an # empty executable. @@ -30164,7 +29978,7 @@ index 3dd6b692f89..64e9ba9b587 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" # Warning - without using the other run time loading flags, -@@ -9059,20 +9594,63 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9059,20 +9594,63 @@ if test -z "$aix_libpath"; then aix_libp # Microsoft Visual C++. # hardcode_libdir_flag_spec is actually meaningless, as there is # no search path for DLLs. @@ -30242,7 +30056,7 @@ index 3dd6b692f89..64e9ba9b587 100755 ;; darwin* | rhapsody*) -@@ -9133,7 +9711,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9133,7 +9711,7 @@ if test -z "$aix_libpath"; then aix_libp # FreeBSD 3 and greater uses gcc -shared to do shared libraries. freebsd* | dragonfly*) @@ -30251,7 +30065,7 @@ index 3dd6b692f89..64e9ba9b587 100755 hardcode_libdir_flag_spec='-R$libdir' hardcode_direct=yes hardcode_shlibpath_var=no -@@ -9141,7 +9719,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9141,7 +9719,7 @@ if test -z "$aix_libpath"; then aix_libp hpux9*) if test "$GCC" = yes; then @@ -30260,7 +30074,7 @@ index 3dd6b692f89..64e9ba9b587 100755 else archive_cmds='$RM $output_objdir/$soname~$LD -b +b $install_libdir -o $output_objdir/$soname $libobjs $deplibs $linker_flags~test $output_objdir/$soname = $lib || mv $output_objdir/$soname $lib' fi -@@ -9157,7 +9735,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9157,7 +9735,7 @@ if test -z "$aix_libpath"; then aix_libp hpux10*) if test "$GCC" = yes && test "$with_gnu_ld" = no; then @@ -30269,7 +30083,7 @@ index 3dd6b692f89..64e9ba9b587 100755 else archive_cmds='$LD -b +h $soname +b $install_libdir -o $lib $libobjs $deplibs $linker_flags' fi -@@ -9181,10 +9759,10 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9181,10 +9759,10 @@ if test -z "$aix_libpath"; then aix_libp archive_cmds='$CC -shared ${wl}+h ${wl}$soname ${wl}+nodefaultrpath -o $lib $libobjs $deplibs $compiler_flags' ;; ia64*) @@ -30327,7 +30141,7 @@ index 3dd6b692f89..64e9ba9b587 100755 else archive_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -o $lib' archive_expsym_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -exports_file $export_symbols -o $lib' -@@ -9364,7 +9955,7 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -9364,7 +9955,7 @@ rm -f core conftest.err conftest.$ac_obj osf4* | osf5*) # as osf3* with the addition of -msym flag if test "$GCC" = yes; then allow_undefined_flag=' ${wl}-expect_unresolved ${wl}\*' @@ -30336,7 +30150,7 @@ index 3dd6b692f89..64e9ba9b587 100755 hardcode_libdir_flag_spec='${wl}-rpath ${wl}$libdir' else allow_undefined_flag=' -expect_unresolved \*' -@@ -9383,9 +9974,9 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -9383,9 +9974,9 @@ rm -f core conftest.err conftest.$ac_obj no_undefined_flag=' -z defs' if test "$GCC" = yes; then wlarc='${wl}' @@ -30477,7 +30291,7 @@ index 3dd6b692f89..64e9ba9b587 100755 int main () { void *self = dlopen (0, LT_DLGLOBAL|LT_DLLAZY_OR_NOW); -@@ -14846,13 +15496,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_single_quote_subst"`' +@@ -14846,13 +15496,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_ lt_unset='`$ECHO "$lt_unset" | $SED "$delay_single_quote_subst"`' lt_SP2NL='`$ECHO "$lt_SP2NL" | $SED "$delay_single_quote_subst"`' lt_NL2SP='`$ECHO "$lt_NL2SP" | $SED "$delay_single_quote_subst"`' @@ -30498,7 +30312,7 @@ index 3dd6b692f89..64e9ba9b587 100755 STRIP='`$ECHO "$STRIP" | $SED "$delay_single_quote_subst"`' RANLIB='`$ECHO "$RANLIB" | $SED "$delay_single_quote_subst"`' old_postinstall_cmds='`$ECHO "$old_postinstall_cmds" | $SED "$delay_single_quote_subst"`' -@@ -14867,14 +15524,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$lt_cv_sys_global_symbol_pipe" | $SED "$de +@@ -14867,14 +15524,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$l lt_cv_sys_global_symbol_to_cdecl='`$ECHO "$lt_cv_sys_global_symbol_to_cdecl" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address_lib_prefix='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address_lib_prefix" | $SED "$delay_single_quote_subst"`' @@ -30517,7 +30331,7 @@ index 3dd6b692f89..64e9ba9b587 100755 DSYMUTIL='`$ECHO "$DSYMUTIL" | $SED "$delay_single_quote_subst"`' NMEDIT='`$ECHO "$NMEDIT" | $SED "$delay_single_quote_subst"`' LIPO='`$ECHO "$LIPO" | $SED "$delay_single_quote_subst"`' -@@ -14907,12 +15567,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcode_shlibpath_var" | $SED "$delay_single_q +@@ -14907,12 +15567,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcod hardcode_automatic='`$ECHO "$hardcode_automatic" | $SED "$delay_single_quote_subst"`' inherit_rpath='`$ECHO "$inherit_rpath" | $SED "$delay_single_quote_subst"`' link_all_deplibs='`$ECHO "$link_all_deplibs" | $SED "$delay_single_quote_subst"`' @@ -30631,7 +30445,7 @@ index 3dd6b692f89..64e9ba9b587 100755 # A symbol stripping program. STRIP=$lt_STRIP -@@ -15945,6 +16636,12 @@ global_symbol_to_c_name_address=$lt_lt_cv_sys_global_symbol_to_c_name_address +@@ -15945,6 +16636,12 @@ global_symbol_to_c_name_address=$lt_lt_c # Transform the output of nm in a C name address pair when lib prefix is needed. global_symbol_to_c_name_address_lib_prefix=$lt_lt_cv_sys_global_symbol_to_c_name_address_lib_prefix @@ -30892,15 +30706,9 @@ index 3dd6b692f89..64e9ba9b587 100755 -_LT_EOF - ;; - esac -- -- -- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ -- || (rm -f "$cfgfile"; exit 1) -- -- mv -f "$cfgfile" "$ofile" || + sed '$q' "$ltmain" >> "$cfgfile" \ + || (rm -f "$cfgfile"; exit 1) -+ + + if test x"$xsi_shell" = xyes; then + sed -e '/^func_dirname ()$/,/^} # func_dirname /c\ +func_dirname ()\ @@ -31058,14 +30866,15 @@ index 3dd6b692f89..64e9ba9b587 100755 + { $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: Unable to substitute extended shell functions in $ofile" >&5 +$as_echo "$as_me: WARNING: Unable to substitute extended shell functions in $ofile" >&2;} +fi -+ -+ + +- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ +- || (rm -f "$cfgfile"; exit 1) + +- mv -f "$cfgfile" "$ofile" || + mv -f "$cfgfile" "$ofile" || (rm -f "$ofile" && cp "$cfgfile" "$ofile" && rm -f "$cfgfile") chmod +x "$ofile" -diff --git a/zlib/Makefile.in b/zlib/Makefile.in -index 951260ac4c5..9398823cc09 100644 --- a/zlib/Makefile.in +++ b/zlib/Makefile.in @@ -281,6 +281,7 @@ CPPFLAGS = @CPPFLAGS@ @@ -31092,8 +30901,6 @@ index 951260ac4c5..9398823cc09 100644 ac_ct_CC = @ac_ct_CC@ ac_ct_DUMPBIN = @ac_ct_DUMPBIN@ am__include = @am__include@ -diff --git a/zlib/configure b/zlib/configure -index cae55c5ca49..24193ee5db7 100755 --- a/zlib/configure +++ b/zlib/configure @@ -648,8 +648,11 @@ OTOOL @@ -31145,7 +30952,7 @@ index cae55c5ca49..24193ee5db7 100755 test "X`print -r -- $ECHO 2>/dev/null`" = "X$ECHO"; then ECHO='print -r --' elif test "X`printf %s $ECHO 2>/dev/null`" = "X$ECHO"; then -@@ -5053,8 +5059,8 @@ $as_echo_n "checking whether the shell understands some XSI constructs... " >&6; +@@ -5053,8 +5059,8 @@ $as_echo_n "checking whether the shell u # Try some XSI features xsi_shell=no ( _lt_dummy="a/b/c" @@ -31281,7 +31088,7 @@ index cae55c5ca49..24193ee5db7 100755 file_magic_cmd=$lt_cv_file_magic_cmd deplibs_check_method=$lt_cv_deplibs_check_method test -z "$deplibs_check_method" && deplibs_check_method=unknown -@@ -5461,6 +5562,158 @@ test -z "$deplibs_check_method" && deplibs_check_method=unknown +@@ -5461,6 +5562,158 @@ test -z "$deplibs_check_method" && depli @@ -31501,7 +31308,7 @@ index cae55c5ca49..24193ee5db7 100755 if test "x$ac_ct_AR" = x; then AR="false" else -@@ -5562,25 +5825,19 @@ ac_tool_warned=yes ;; +@@ -5562,29 +5825,81 @@ ac_tool_warned=yes ;; esac AR=$ac_ct_AR fi @@ -31533,13 +31340,17 @@ index cae55c5ca49..24193ee5db7 100755 + rm -f conftest.* +: ${AR=ar} +: ${AR_FLAGS=cru} - - - -@@ -5592,6 +5849,64 @@ test -z "$AR_FLAGS" && AR_FLAGS=cru - - - ++ ++ ++ ++ ++ ++ ++ ++ ++ ++ ++ +{ $as_echo "$as_me:${as_lineno-$LINENO}: checking for archiver @FILE support" >&5 +$as_echo_n "checking for archiver @FILE support... " >&6; } +if ${lt_cv_ar_at_file+:} false; then : @@ -31548,11 +31359,11 @@ index cae55c5ca49..24193ee5db7 100755 + lt_cv_ar_at_file=no + cat confdefs.h - <<_ACEOF >conftest.$ac_ext +/* end confdefs.h. */ -+ + +int +main () +{ -+ + + ; + return 0; +} @@ -31581,26 +31392,19 @@ index cae55c5ca49..24193ee5db7 100755 + +fi +rm -f core conftest.err conftest.$ac_objext conftest.$ac_ext -+ + +fi +{ $as_echo "$as_me:${as_lineno-$LINENO}: result: $lt_cv_ar_at_file" >&5 +$as_echo "$lt_cv_ar_at_file" >&6; } -+ + +if test "x$lt_cv_ar_at_file" = xno; then + archiver_list_spec= +else + archiver_list_spec=$lt_cv_ar_at_file +fi -+ -+ -+ -+ -+ -+ -+ - if test -n "$ac_tool_prefix"; then - # Extract the first word of "${ac_tool_prefix}strip", so it can be a program name with args. - set dummy ${ac_tool_prefix}strip; ac_word=$2 + + + @@ -5931,8 +6246,8 @@ esac lt_cv_sys_global_symbol_to_cdecl="sed -n -e 's/^T .* \(.*\)$/extern int \1();/p' -e 's/^$symcode* .* \(.*\)$/extern char \1;/p'" @@ -31648,7 +31452,7 @@ index cae55c5ca49..24193ee5db7 100755 const char *name; void *address; } -@@ -6046,8 +6374,8 @@ static const void *lt_preloaded_setup() { +@@ -6046,8 +6374,8 @@ static const void *lt_preloaded_setup() _LT_EOF # Now try linking the two files. mv conftest.$ac_objext conftstm.$ac_objext @@ -31670,7 +31474,7 @@ index cae55c5ca49..24193ee5db7 100755 else echo "cannot find nm_test_func in $nlist" >&5 fi -@@ -6095,6 +6423,17 @@ else +@@ -6095,6 +6423,15 @@ else $as_echo "ok" >&6; } fi @@ -31683,18 +31487,13 @@ index cae55c5ca49..24193ee5db7 100755 + + + -+ -+ -@@ -6112,6 +6451,43 @@ fi +@@ -6117,6 +6454,45 @@ fi -+ -+ -+ + + +{ $as_echo "$as_me:${as_lineno-$LINENO}: checking for sysroot" >&5 @@ -31729,9 +31528,14 @@ index cae55c5ca49..24193ee5db7 100755 + + { $as_echo "$as_me:${as_lineno-$LINENO}: result: ${lt_sysroot:-no}" >&5 +$as_echo "${lt_sysroot:-no}" >&6; } - - - ++ ++ ++ ++ ++ + # Check whether --enable-libtool-lock was given. + if test "${enable_libtool_lock+set}" = set; then : + enableval=$enable_libtool_lock; @@ -6326,6 +6702,123 @@ esac need_locks="$enable_libtool_lock" @@ -31874,7 +31678,7 @@ index cae55c5ca49..24193ee5db7 100755 if test "$GCC" = yes; then lt_prog_compiler_wl='-Wl,' -@@ -7910,6 +8403,12 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -7910,6 +8403,12 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='--shared' lt_prog_compiler_static='--static' ;; @@ -31887,7 +31691,7 @@ index cae55c5ca49..24193ee5db7 100755 pgcc* | pgf77* | pgf90* | pgf95* | pgfortran*) # Portland Group compilers (*not* the Pentium gcc compiler, # which looks to be a dead project) -@@ -7972,7 +8471,7 @@ $as_echo_n "checking for $compiler option to produce PIC... " >&6; } +@@ -7972,7 +8471,7 @@ $as_echo_n "checking for $compiler optio lt_prog_compiler_pic='-KPIC' lt_prog_compiler_static='-Bstatic' case $cc_basename in @@ -32048,7 +31852,7 @@ index cae55c5ca49..24193ee5db7 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" archive_expsym_cmds='$CC -o $output_objdir/$soname $libobjs $deplibs '"\${wl}$no_entry_flag"' $compiler_flags `if test "x${allow_undefined_flag}" != "x"; then func_echo_all "${wl}${allow_undefined_flag}"; else :; fi` '"\${wl}$exp_sym_flag:\$export_symbols $shared_flag" -@@ -8804,7 +9326,13 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -8804,7 +9326,13 @@ if test -z "$aix_libpath"; then aix_libp else # Determine the default libpath from the value encoded in an # empty executable. @@ -32106,7 +31910,7 @@ index cae55c5ca49..24193ee5db7 100755 hardcode_libdir_flag_spec='${wl}-blibpath:$libdir:'"$aix_libpath" # Warning - without using the other run time loading flags, -@@ -8880,20 +9415,63 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -8880,20 +9415,63 @@ if test -z "$aix_libpath"; then aix_libp # Microsoft Visual C++. # hardcode_libdir_flag_spec is actually meaningless, as there is # no search path for DLLs. @@ -32184,7 +31988,7 @@ index cae55c5ca49..24193ee5db7 100755 ;; darwin* | rhapsody*) -@@ -8954,7 +9532,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -8954,7 +9532,7 @@ if test -z "$aix_libpath"; then aix_libp # FreeBSD 3 and greater uses gcc -shared to do shared libraries. freebsd* | dragonfly*) @@ -32193,7 +31997,7 @@ index cae55c5ca49..24193ee5db7 100755 hardcode_libdir_flag_spec='-R$libdir' hardcode_direct=yes hardcode_shlibpath_var=no -@@ -8962,7 +9540,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -8962,7 +9540,7 @@ if test -z "$aix_libpath"; then aix_libp hpux9*) if test "$GCC" = yes; then @@ -32202,7 +32006,7 @@ index cae55c5ca49..24193ee5db7 100755 else archive_cmds='$RM $output_objdir/$soname~$LD -b +b $install_libdir -o $output_objdir/$soname $libobjs $deplibs $linker_flags~test $output_objdir/$soname = $lib || mv $output_objdir/$soname $lib' fi -@@ -8978,7 +9556,7 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -8978,7 +9556,7 @@ if test -z "$aix_libpath"; then aix_libp hpux10*) if test "$GCC" = yes && test "$with_gnu_ld" = no; then @@ -32211,7 +32015,7 @@ index cae55c5ca49..24193ee5db7 100755 else archive_cmds='$LD -b +h $soname +b $install_libdir -o $lib $libobjs $deplibs $linker_flags' fi -@@ -9002,10 +9580,10 @@ if test -z "$aix_libpath"; then aix_libpath="/usr/lib:/lib"; fi +@@ -9002,10 +9580,10 @@ if test -z "$aix_libpath"; then aix_libp archive_cmds='$CC -shared ${wl}+h ${wl}$soname ${wl}+nodefaultrpath -o $lib $libobjs $deplibs $compiler_flags' ;; ia64*) @@ -32272,7 +32076,7 @@ index cae55c5ca49..24193ee5db7 100755 else archive_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -o $lib' archive_expsym_cmds='$CC -shared $libobjs $deplibs $compiler_flags -soname $soname `test -n "$verstring" && func_echo_all "-set_version $verstring"` -update_registry ${output_objdir}/so_locations -exports_file $export_symbols -o $lib' -@@ -9188,7 +9779,7 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -9188,7 +9779,7 @@ rm -f core conftest.err conftest.$ac_obj osf4* | osf5*) # as osf3* with the addition of -msym flag if test "$GCC" = yes; then allow_undefined_flag=' ${wl}-expect_unresolved ${wl}\*' @@ -32281,7 +32085,7 @@ index cae55c5ca49..24193ee5db7 100755 hardcode_libdir_flag_spec='${wl}-rpath ${wl}$libdir' else allow_undefined_flag=' -expect_unresolved \*' -@@ -9207,9 +9798,9 @@ rm -f core conftest.err conftest.$ac_objext \ +@@ -9207,9 +9798,9 @@ rm -f core conftest.err conftest.$ac_obj no_undefined_flag=' -z defs' if test "$GCC" = yes; then wlarc='${wl}' @@ -32422,7 +32226,7 @@ index cae55c5ca49..24193ee5db7 100755 int main () { void *self = dlopen (0, LT_DLGLOBAL|LT_DLLAZY_OR_NOW); -@@ -12377,13 +13027,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_single_quote_subst"`' +@@ -12377,13 +13027,20 @@ exeext='`$ECHO "$exeext" | $SED "$delay_ lt_unset='`$ECHO "$lt_unset" | $SED "$delay_single_quote_subst"`' lt_SP2NL='`$ECHO "$lt_SP2NL" | $SED "$delay_single_quote_subst"`' lt_NL2SP='`$ECHO "$lt_NL2SP" | $SED "$delay_single_quote_subst"`' @@ -32443,7 +32247,7 @@ index cae55c5ca49..24193ee5db7 100755 STRIP='`$ECHO "$STRIP" | $SED "$delay_single_quote_subst"`' RANLIB='`$ECHO "$RANLIB" | $SED "$delay_single_quote_subst"`' old_postinstall_cmds='`$ECHO "$old_postinstall_cmds" | $SED "$delay_single_quote_subst"`' -@@ -12398,14 +13055,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$lt_cv_sys_global_symbol_pipe" | $SED "$de +@@ -12398,14 +13055,17 @@ lt_cv_sys_global_symbol_pipe='`$ECHO "$l lt_cv_sys_global_symbol_to_cdecl='`$ECHO "$lt_cv_sys_global_symbol_to_cdecl" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address" | $SED "$delay_single_quote_subst"`' lt_cv_sys_global_symbol_to_c_name_address_lib_prefix='`$ECHO "$lt_cv_sys_global_symbol_to_c_name_address_lib_prefix" | $SED "$delay_single_quote_subst"`' @@ -32462,7 +32266,7 @@ index cae55c5ca49..24193ee5db7 100755 DSYMUTIL='`$ECHO "$DSYMUTIL" | $SED "$delay_single_quote_subst"`' NMEDIT='`$ECHO "$NMEDIT" | $SED "$delay_single_quote_subst"`' LIPO='`$ECHO "$LIPO" | $SED "$delay_single_quote_subst"`' -@@ -12438,12 +13098,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcode_shlibpath_var" | $SED "$delay_single_q +@@ -12438,12 +13098,12 @@ hardcode_shlibpath_var='`$ECHO "$hardcod hardcode_automatic='`$ECHO "$hardcode_automatic" | $SED "$delay_single_quote_subst"`' inherit_rpath='`$ECHO "$inherit_rpath" | $SED "$delay_single_quote_subst"`' link_all_deplibs='`$ECHO "$link_all_deplibs" | $SED "$delay_single_quote_subst"`' @@ -32576,7 +32380,7 @@ index cae55c5ca49..24193ee5db7 100755 # A symbol stripping program. STRIP=$lt_STRIP -@@ -13309,6 +14000,12 @@ global_symbol_to_c_name_address=$lt_lt_cv_sys_global_symbol_to_c_name_address +@@ -13309,6 +14000,12 @@ global_symbol_to_c_name_address=$lt_lt_c # Transform the output of nm in a C name address pair when lib prefix is needed. global_symbol_to_c_name_address_lib_prefix=$lt_lt_cv_sys_global_symbol_to_c_name_address_lib_prefix @@ -32837,15 +32641,9 @@ index cae55c5ca49..24193ee5db7 100755 -_LT_EOF - ;; - esac -- -- -- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ -- || (rm -f "$cfgfile"; exit 1) -- -- mv -f "$cfgfile" "$ofile" || + sed '$q' "$ltmain" >> "$cfgfile" \ + || (rm -f "$cfgfile"; exit 1) -+ + + if test x"$xsi_shell" = xyes; then + sed -e '/^func_dirname ()$/,/^} # func_dirname /c\ +func_dirname ()\ @@ -33003,8 +32801,11 @@ index cae55c5ca49..24193ee5db7 100755 + { $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: Unable to substitute extended shell functions in $ofile" >&5 +$as_echo "$as_me: WARNING: Unable to substitute extended shell functions in $ofile" >&2;} +fi -+ -+ + +- sed -n '/^# Generated shell functions inserted here/,$p' "$ltmain" >> "$cfgfile" \ +- || (rm -f "$cfgfile"; exit 1) + +- mv -f "$cfgfile" "$ofile" || + mv -f "$cfgfile" "$ofile" || (rm -f "$ofile" && cp "$cfgfile" "$ofile" && rm -f "$cfgfile") chmod +x "$ofile" From patchwork Thu Apr 16 22:30:32 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86355 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 17E7DF8E48C for ; Thu, 16 Apr 2026 22:33:38 +0000 (UTC) Received: from mail-wm1-f66.google.com (mail-wm1-f66.google.com [209.85.128.66]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.28591.1776378813209884137 for ; Thu, 16 Apr 2026 15:33:33 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=OFbEeDlY; spf=pass (domain: smile.fr, ip: 209.85.128.66, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f66.google.com with SMTP id 5b1f17b1804b1-488a9033b2cso426435e9.2 for ; Thu, 16 Apr 2026 15:33:33 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378811; x=1776983611; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=O69+O4/4Sn4ICRg/ebU8dP4Zne7e0jQcoY58zN/PKgw=; b=OFbEeDlYfT51JH3AdoKfwnDo+sO4+1ZXUpVtJmknWFx+/7iAg68ziC3tpi4zMo4Alo lkjdWGqcSjSwlKcSQDgLJNE634qI9Tsxk6oDFEZyt9wmGjDvFybBkjpAP7DAwsJnbj4y 8+UCZX74AmPQr3Xp5RLn+YwzUsmkinQ8z8XsM= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378811; x=1776983611; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=O69+O4/4Sn4ICRg/ebU8dP4Zne7e0jQcoY58zN/PKgw=; b=rDUcQWnAGFv+S2Y8+ByXu7LBwR1iSHmGST3tO+FGkTWcAJEaVfKdbVoNdNqD+eUGZt AB0zntRyEuInPuk4bTF4iQ75bnFWidsnPhjOg51pruZlwmd1S3pGAK14h/eOO//UCiP+ fKwqWUpaglbue1w6jREgZSRtLlcdYAcEqTePGzQLT8gVvBX1NQbZrx6L/VsnBRvTJgcN 9H9SrDbrYVhPEVqSmY/LY+pR1aR1K2dnibnLbo3sDBIMlKy8WrSqgoaryB72+6/34e3M Zc2HJNsh9jaU/RI/rvDzPe10qG2CT6HS4l8GNQzu0tBeChfgfC/js0ALd62R2+yXGqL7 /fLg== X-Gm-Message-State: AOJu0Yz5YqUYsU9Dda4D4il6lkvPaYWvWKm+0ncgSl+W5HnWMwv05M9P Z0b99Mpv3DgRNIFrzc8w1ygglx3+nwIqAaIkxw9qQyb17HODv+fuDdIS19oiiZ1veU7o8bpcb95 Z24eOUw6PT7Wm X-Gm-Gg: AeBDievDNyi1vQQB6aASW7lEcpHfOyMRKOT+6dx7hYm27G7RdaEAEl5PYCqUJnucKrT /limaXyXiP6tqFRt34Ho/txvRiwpl/cs12VA6B6Nux+GdWTlKw/fI8VNABbSlHw3dchYawO/BEY O31DshEpDezFUrL9llNrr8RjXDDY+bD1Q94ws8RgQGnBur5+xCNl0ylm1ZqsKPVJ0yPtDrqTyrb FoPD2nmZ6NVsc8FtbHyZ8F7NPhLG7laHMJQhJM7Am+jXbpyouW5rdymdCe7mTX2AE1V0izJGwB0 ZciG9tQBzKi8f8W85MukmP0/2Pv7m4LXSF9C4hpGCW1O/1bFJEViQG7aKSGUVUhcEtaU1oi9u8c ciRY6bfDWOAxA51BZzr6+mPNjob5xBqYxJipVfhwlTdcmOBrqQ8t+8Z6xq9AZHRPGBQ6BGKYFOk W8y9JNs0c63gB2AjhfB8DH97YDi/Og+4cFcmS6hzVRDU2D5g2ImK8PvydmrRGloseNp3a0NyLuw oYmKUHkLthXs0SAKoYMNMZOdAcP6D2TVGYgoM5Mt3WjJrRz X-Received: by 2002:a05:600c:3513:b0:488:a977:8de with SMTP id 5b1f17b1804b1-488fb77a3a7mr4869265e9.16.1776378811397; Thu, 16 Apr 2026 15:33:31 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.30 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:30 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 49/51] ptest-runner: Upgrade 2.4.5.1 -> 2.5.0 Date: Fri, 17 Apr 2026 00:30:32 +0200 Message-ID: <31bf35f2ac53dd323ec5da1d38595bcaf3127087.1776377993.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:38 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235477 From: Yoann Congal Changelog: - utils.c: Fix dirname() handling in run_ptests() - ptest-runner-collect-system-data: add info to logs - main.c: Set PYTHONUNBUFFERED in the environment - utils.c: print a message when a timeout occurs - main.c: Add print_helptext() for detailed help - main.print_usage: Remove unused argument list of -l Signed-off-by: Yoann Congal Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit 869d70d46c8e31cfc380b5143059cab3713cae26) Signed-off-by: Yoann Congal --- .../{ptest-runner_2.4.5.1.bb => ptest-runner_2.5.0.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta/recipes-support/ptest-runner/{ptest-runner_2.4.5.1.bb => ptest-runner_2.5.0.bb} (95%) diff --git a/meta/recipes-support/ptest-runner/ptest-runner_2.4.5.1.bb b/meta/recipes-support/ptest-runner/ptest-runner_2.5.0.bb similarity index 95% rename from meta/recipes-support/ptest-runner/ptest-runner_2.4.5.1.bb rename to meta/recipes-support/ptest-runner/ptest-runner_2.5.0.bb index 89f85e24555..d9ec0baf799 100644 --- a/meta/recipes-support/ptest-runner/ptest-runner_2.4.5.1.bb +++ b/meta/recipes-support/ptest-runner/ptest-runner_2.5.0.bb @@ -7,7 +7,7 @@ HOMEPAGE = "http://git.yoctoproject.org/cgit/cgit.cgi/ptest-runner2/about/" LICENSE = "GPL-2.0-or-later" LIC_FILES_CHKSUM = "file://LICENSE;md5=751419260aa954499f7abaabaa882bbe" -SRCREV = "c99e8c2737ff802f110612cc2d90c60233c33255" +SRCREV = "7429fdd52abb5b08a9e8acef14b1bc4604f09c8f" SRC_URI = "git://git.yoctoproject.org/ptest-runner2;branch=master;protocol=https \ " From patchwork Thu Apr 16 22:30:33 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86361 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 66885F8E497 for ; Thu, 16 Apr 2026 22:33:38 +0000 (UTC) Received: from mail-wm1-f65.google.com (mail-wm1-f65.google.com [209.85.128.65]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.28289.1776378813713726747 for ; Thu, 16 Apr 2026 15:33:34 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=BMr7pfBe; spf=pass (domain: smile.fr, ip: 209.85.128.65, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f65.google.com with SMTP id 5b1f17b1804b1-488a14c31eeso294555e9.0 for ; Thu, 16 Apr 2026 15:33:33 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378812; x=1776983612; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=93pRZvB+6NlRXsqjP6IlnZS+yTZCKGuRN2fXK5NK9rI=; b=BMr7pfBeEv8XtAY1sTtXontMH0cD3aDeCDSjtjyzR9uQyyPYMuNhM7xP4a+o6/6PSk Jg3ER9yxn+ZQmKWnkfJkiMlHxLapBP8DhnTzNL94I9BNy81sfmWDFQ+PhpIRfhWRwCxc JPPYo1Q9CvmD0VX1ITTYQ0/FejRcor8k0xVEA= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378812; x=1776983612; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=93pRZvB+6NlRXsqjP6IlnZS+yTZCKGuRN2fXK5NK9rI=; b=UfokrKl3pKGzFi2OVZpK6gJuw5hOed4hEQT0qC55CRfZONoU7kcHJ4WLKwlma3HkqI Gd1FN09Ql/PkYWOuojdsir8Qfvi2N++SEvp9PlYd1cCBqRhhXebfooBOkxI12+XcUaUg 03yoCVU+DNlDelYdCHqeDYqDYjqMrVZ+RT9rRewbx/FKFTByC9eT3lq5cGrlkQe77+C0 Nd1Lce+9KcJ+w+Z98m9UxOPgb1BdIa0gr/3f8Y4cS64nmy/28lFo84Dn4Tw9GDmSdkpu qS6o/0cGERJdU6hA7JUotA0co0F2+cZjmtm0Bwl7XWmeQjL/cvkY/xOVajhX1+etTW2O 2NGw== X-Gm-Message-State: AOJu0YzmuOOV8YBL7T5oooWAXoe6av+4DBW7r9nwfACB1szDf1ZeC297 Iu5VxAV4AcVoEHJCXkn6kseT3hJbpSJWx3lR6K0cz6j7oeoaFn0hx1AOxEZoHWKw5EzimUbmsMF 47tpQrJNzxRkx X-Gm-Gg: AeBDiesqHKqal3WIbhpLpi7p2LSVfowh7x2muuFSrCXdQzAKxIBAB8w/l88N3gmbRRT Yn+E0YCXzNvGaSXaX/2xVpv/e6wDvFMDhoS37GwMTs8nVSqLRncnCAdIibwyqqS1OhZCeEhobEu T0fScPZpF5wGBvIxYSeRCOTsGhmiA+gpBcknELn85/BASQmmoqqTROt0C7fvaNQ/W4P0xhO6mXA n4vw9GAuJH6LEJ8S0Eo9VPOfCJTKDbqkMdfm8qXkiY3PTnBVzgHev62yFERrSc3RqG0T4Z4NZlR gGOJ4q2115CDzNXCjos3NcL3HIZd3L0Y36OEr6fWi9xXUMjFe02KWYkH+VNUMKBxZSaPtbVNZzx 7CiSMZogG7pRCvQqKL3TN+HqJeODT+XchQ9P7x9uJjQxcDW9Gr9NaGcO6d6JP0ICZ+KEn6MZNks A/ko9cl5quwIXuv3sEN9NJhHcfLffLJPI66JACNky5wcIC9CScYh2Gvpl7qhYuSh/swja9pw8Zs zhqNnOeKKJFDgMJ2W7qAzl7DjTOJL8CipmbEQ== X-Received: by 2002:a05:600c:4f0e:b0:488:945a:ed63 with SMTP id 5b1f17b1804b1-488fb6e8491mr6665395e9.0.1776378811784; Thu, 16 Apr 2026 15:33:31 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.31 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:31 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 50/51] ptest-runner: Use git tag in SRC_URI Date: Fri, 17 Apr 2026 00:30:33 +0200 Message-ID: <723ef34c5869cdaec1ce51baa89979e7a43439ee.1776377993.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:38 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235478 From: Yoann Congal Also, remove an extra line split. Signed-off-by: Yoann Congal Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit 1f87b57c8223e01e909a6e71e39aa152a80d8287) Signed-off-by: Yoann Congal --- meta/recipes-support/ptest-runner/ptest-runner_2.5.0.bb | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/meta/recipes-support/ptest-runner/ptest-runner_2.5.0.bb b/meta/recipes-support/ptest-runner/ptest-runner_2.5.0.bb index d9ec0baf799..607fe4b5ff2 100644 --- a/meta/recipes-support/ptest-runner/ptest-runner_2.5.0.bb +++ b/meta/recipes-support/ptest-runner/ptest-runner_2.5.0.bb @@ -9,8 +9,7 @@ LIC_FILES_CHKSUM = "file://LICENSE;md5=751419260aa954499f7abaabaa882bbe" SRCREV = "7429fdd52abb5b08a9e8acef14b1bc4604f09c8f" -SRC_URI = "git://git.yoctoproject.org/ptest-runner2;branch=master;protocol=https \ -" +SRC_URI = "git://git.yoctoproject.org/ptest-runner2;branch=master;protocol=https;tag=v${PV}" FILES:${PN} = "${bindir}/ptest-runner ${bindir}/ptest-runner-collect-system-data" From patchwork Thu Apr 16 22:30:34 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86358 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 7A464F8E499 for ; Thu, 16 Apr 2026 22:33:38 +0000 (UTC) Received: from mail-wm1-f68.google.com (mail-wm1-f68.google.com [209.85.128.68]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.28291.1776378814174011316 for ; Thu, 16 Apr 2026 15:33:34 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=MlUf+6rB; spf=pass (domain: smile.fr, ip: 209.85.128.68, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f68.google.com with SMTP id 5b1f17b1804b1-4887f49ec5aso622765e9.1 for ; Thu, 16 Apr 2026 15:33:33 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776378812; x=1776983612; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=MJjAfvq/mXOl+wN8dJQo6cp9ud8dBu1/csvJV8B5oIk=; b=MlUf+6rBeTa9/opkzcOumjHyzXfKXfkXpyu0QXuHI0Xp8uoDp3VCcogSGOs4ufwcd3 xLoYtVN07DIdMTwwHAy+3BCID5MqMHYoh83CzIztu2c164tEcvNr9OX+xW1mMopNZ3v7 dUqP7NGAonRBcdnpTGwnbggw7wP0WvCUxx9z8= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776378812; x=1776983612; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=MJjAfvq/mXOl+wN8dJQo6cp9ud8dBu1/csvJV8B5oIk=; b=CwfuIUlfDkSR8y9PTJSQzD9lNb/2CGF/Gb6DX0H10QfFIbFVOIxKPELmpoNXsk0rsW DX8k+2DH9MUXXo1LuZFKxNhjRiq8LlaDpcD3qgA4JWs7eXuDrwNugUSsfT8bifZm9s+D Bxe2XISjyFKdHBFG9tt+Jfgi3oawnPQg1bj/o28AhEWu9hxRORqJbSf+KKDX1gVaCSpH 0oItWPVidNRl62+9JiAjOd6CvTAkDVuEC6XvkqbskLME3FgpUgVvWmHMENNI36d4uX3Z xkBJA3/0pXROmzLH59jXJSv2TPRwP/uUBuxYL8W21opLcKKIHHMkQXNpcsgGOPTqZeUB onXg== X-Gm-Message-State: AOJu0YwGpRTDmPGJCyvlhG0FLdJ0zwPjkhNUnR8GD2wjXwN0Opsn5RVy /QlwwYK2y04rk+CAnkCYlkUmejNLoS1BmDKZTbIiPiTGnRISAr3fy9z+WImA4+1gSiT95lhuVpH spZAek+BZ7bhk X-Gm-Gg: AeBDievjXvzgbNM/hnCs6HFEFk/6X+gw8sqLCXdprlu/sz7HDFGATQIHFKKDgWMoVla ItLPzL//oNNo+DikP0Pi4BnSb6DA4CRmzGvYRTagLoWEDEAdd0rrjOuYWNXakiuQoufDKtWUJiY jWl4wS+ecDm8FkEptzmqWZxgrQ4kfFY1VkFaKmTWLTbK/jPdrLXXEZRPHeRA8Zr1y/A8dnJsYJ6 77Jczp3vl4DskrARHPdyLYn5ZD3Q+MU3ai52v8oorS5Um/a0Hbe1sRKuDyV0duHOeyC39qPQxNV Tiy1owt1EnrnxM/uGPzhR9yL1yaUBsjRzy0LYuWgKD3twT/+tNNNIokussAGtoOD1N5rJ2OD4hR clqbWcfOZEsTXLqid8ZNS7epWT3ehPFKBSxT/mhfSMzrU4cV9oAMfiEsoTFAkBNtlF4HE62qkdY iALhlR0jG7WDtSeW1YIDTAV5WLVZbM/QOCNnMSTIl6VfPVzyuf/nSCi50yV9+QlvU/vcjkZjCUC WbM3VBNwYp1YI/ZKjqMF46JjMNxbAIHuky3eJ4TiSGnOJtY X-Received: by 2002:a05:600c:4746:b0:488:9439:881a with SMTP id 5b1f17b1804b1-488fb738412mr5015185e9.2.1776378812327; Thu, 16 Apr 2026 15:33:32 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-488f57da2aesm141885005e9.0.2026.04.16.15.33.31 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Apr 2026 15:33:32 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter v2 51/51] ptest-runner: Upgrade 2.5.0 -> 2.5.1 Date: Fri, 17 Apr 2026 00:30:34 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 22:33:38 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235479 From: Richard Purdie Pull in buffering fix: """ When running slow ptests, we can see an issue where the tests are writing output but it doesn't make it to the process (e.g. ssh connection) running ptest-runner. The issue is that the standard buffering for non-interactive terminals is 8kb and some ptests don't output enough data to trigger a write. This can lead to the controlling connection timing out. This change forces the output streams to be line buffered in all cases. Most ptest output would contain newlines so this should work well. stderr can be unbuffered by default but making it consistent here seems the best approach. Testing with this change on slow ptest runs (e.g. qemu emulated) showed much more consistent data with this change. """ Signed-off-by: Richard Purdie (cherry picked from commit b57105311f1c5fd879dd58fa1de8862ebad989c1) Signed-off-by: Yoann Congal --- .../{ptest-runner_2.5.0.bb => ptest-runner_2.5.1.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta/recipes-support/ptest-runner/{ptest-runner_2.5.0.bb => ptest-runner_2.5.1.bb} (95%) diff --git a/meta/recipes-support/ptest-runner/ptest-runner_2.5.0.bb b/meta/recipes-support/ptest-runner/ptest-runner_2.5.1.bb similarity index 95% rename from meta/recipes-support/ptest-runner/ptest-runner_2.5.0.bb rename to meta/recipes-support/ptest-runner/ptest-runner_2.5.1.bb index 607fe4b5ff2..f5628d6e468 100644 --- a/meta/recipes-support/ptest-runner/ptest-runner_2.5.0.bb +++ b/meta/recipes-support/ptest-runner/ptest-runner_2.5.1.bb @@ -7,7 +7,7 @@ HOMEPAGE = "http://git.yoctoproject.org/cgit/cgit.cgi/ptest-runner2/about/" LICENSE = "GPL-2.0-or-later" LIC_FILES_CHKSUM = "file://LICENSE;md5=751419260aa954499f7abaabaa882bbe" -SRCREV = "7429fdd52abb5b08a9e8acef14b1bc4604f09c8f" +SRCREV = "afe64efbb3f028e898fa9a5efcdc3010ebdf283c" SRC_URI = "git://git.yoctoproject.org/ptest-runner2;branch=master;protocol=https;tag=v${PV}"