From patchwork Tue Apr 21 10:41:45 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Richard Purdie X-Patchwork-Id: 86589 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1CF4EF8925A for ; Tue, 21 Apr 2026 10:41:58 +0000 (UTC) Received: from mail-wm1-f46.google.com (mail-wm1-f46.google.com [209.85.128.46]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.22300.1776768111676775887 for ; Tue, 21 Apr 2026 03:41:52 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@linuxfoundation.org header.s=google header.b=bSh1E9Mj; spf=pass (domain: linuxfoundation.org, ip: 209.85.128.46, mailfrom: richard.purdie@linuxfoundation.org) Received: by mail-wm1-f46.google.com with SMTP id 5b1f17b1804b1-4891f625344so21587635e9.0 for ; Tue, 21 Apr 2026 03:41:51 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linuxfoundation.org; s=google; t=1776768110; x=1777372910; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:message-id:date:subject:to :from:from:to:cc:subject:date:message-id:reply-to; bh=fYwTCwCco7pSyd9RlhyZNoAJXoG9zuuYbYt6fq9BPvY=; b=bSh1E9MjMvf6scxs0Zt51Uz8OdjAok9JjcB7WDqArTcd5B09EkKXrnD0KahBnUd7T5 Ap5N3eF9fs4+ravQpwQIFkvAFq+QzMrhXA2x/yU8gT+riuDVsctSygikJwHm8WByUrII uKeEOLTezjdPZ03N/Bvdegt7SpVUF1hk3Eddc= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776768110; x=1777372910; h=content-transfer-encoding:mime-version:message-id:date:subject:to :from:x-gm-gg:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=fYwTCwCco7pSyd9RlhyZNoAJXoG9zuuYbYt6fq9BPvY=; b=L9YDOvLZmSIB9nJqv72FycIBMhYj4VQAedVXqBk8v1Bzs53lQopSabtZ3GR+ht92Fu nTG9oqFkIQKZhjuW32buOVeRAXco6wGcKupguqZvgE1hEIdjxOR579ANXzq1U47qAERR nmYsiajZEB2sjT2xaOPzbbDSSc4MIRSHF29/KC0QbhNzHJTJ5ospE3ZXDEMKrCxnfhzd H9CUHPYkralTk0Jv11hN+wEq8w5ILsNNnutoxvN1/oJqKddRk78E4Cf29aIDAWVDgw4p GCdXNWuZLJJhz1Kn/nNpWwKz/gE31wpx2uPH5QiRKZV+WoBjerfJXRk1yyRCef2XpSGA 4XQA== X-Gm-Message-State: AOJu0YzdIukpaUa03mTVXnt0jyF6Q+SE41QZmzDRV25LIWijdb3b6ogM 4AGsT4361RnaIMLgWBF3nS7zclIAd7iiPBC+06KMeNSakqU+CIczYwMQxWInwKMl95tN881cdrD Ucx05QtQ= X-Gm-Gg: AeBDieu1E0WzDr80v8qAVrFr3RGIs5UvjsJWUjvNTPFCKMIvk9mrViTsHMzrNWSuK4J IYecPDvc8gVwD05diutm4EQ1WpWtyWQZ9e2HevHtXItEq6Ed26vO2LrbzR96lopn+mcqVyzMqu9 ZCc/1dz0ELITPUCaITAsOW/SzHSy96MwDe5hD+JWhgPs3m9+vxw9MdgXSf3wy6t/5s2G1plrSJc Hz61hM9gcNXSuzOyNd7YKQKRB7Q5uOy5BT+co87ataTWBsyQuyo0wiL7wnUkdtewvI27m7Xf4xf bVoHvM5coImRYao6VkuLYFs4VzCgWn1M93S2ixR18/2QYFPEngDzzCmBDvPRT5EM6wk7ej6GBX8 816GkGQtqzXng0AsM4jsVLhQ7t+zd0a1l1vz88n9ApxBRmqfF191sD1WUQ/6QtcMFOwDJYWQsP+ D+msv1OosdTFmgGSWFhjnb6kuN/Nhd16ALXBhEx0S6o97nqLafsJhpMV+Lz4VOwBc= X-Received: by 2002:a05:600c:8b6b:b0:485:3c2e:60d5 with SMTP id 5b1f17b1804b1-488fb8859ddmr234463735e9.2.1776768109342; Tue, 21 Apr 2026 03:41:49 -0700 (PDT) Received: from max.int.rpsys.net ([2001:8b0:aba:5f3c:aba4:e0e8:1cef:1732]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-48a4b329542sm163759995e9.3.2026.04.21.03.41.48 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 21 Apr 2026 03:41:48 -0700 (PDT) From: Richard Purdie To: openembedded-core@lists.openembedded.org Subject: [PATCH 1/3] pseudo: Update to 1.7.4 Date: Tue, 21 Apr 2026 11:41:45 +0100 Message-ID: <20260421104147.1994119-1-richard.purdie@linuxfoundation.org> X-Mailer: git-send-email 2.53.0 MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 21 Apr 2026 10:41:58 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235663 Update to pull in a full openat2 wrapper which works on Fedora 44. This update includes the commits: * Makefile.in: Bump version to 1.9.4 * test: Add renameat2 test cases * test: Add openat2 test cases * makewrappers/openat2: Add preserve_path option * openat2: Implement openat2 wrapper * ports/linux/guts/renameat2.c: Add comment why this isn't implemented * Add b4 configuration * pseudo_setupenvp: Handle malloc failure safely * pseudo_setupenvp: Allocate space for new env vars if needed Signed-off-by: Richard Purdie --- meta/recipes-devtools/pseudo/pseudo_git.bb | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/meta/recipes-devtools/pseudo/pseudo_git.bb b/meta/recipes-devtools/pseudo/pseudo_git.bb index 4d316299033..68b311cb916 100644 --- a/meta/recipes-devtools/pseudo/pseudo_git.bb +++ b/meta/recipes-devtools/pseudo/pseudo_git.bb @@ -12,8 +12,8 @@ SRC_URI:append:class-nativesdk = " \ file://older-glibc-symbols.patch" SRC_URI[prebuilt.sha256sum] = "ed9f456856e9d86359f169f46a70ad7be4190d6040282b84c8d97b99072485aa" -SRCREV = "56e1f8df4761da60e41812fc32b1de797d1765e9" -PV = "1.9.3+git" +SRCREV = "6c0d8c6b81ca7c2ef2b5a9a996605e1a51814442" +PV = "1.9.4" # largefile and 64bit time_t support adds these macros via compiler flags globally # remove them for pseudo since pseudo intercepts some of the functions which will be From patchwork Tue Apr 21 10:41:46 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Richard Purdie X-Patchwork-Id: 86587 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id EE028F89256 for ; Tue, 21 Apr 2026 10:41:57 +0000 (UTC) Received: from mail-wm1-f43.google.com (mail-wm1-f43.google.com [209.85.128.43]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.22301.1776768112569851182 for ; Tue, 21 Apr 2026 03:41:52 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@linuxfoundation.org header.s=google header.b=QIj1WqTI; spf=pass (domain: linuxfoundation.org, ip: 209.85.128.43, mailfrom: richard.purdie@linuxfoundation.org) Received: by mail-wm1-f43.google.com with SMTP id 5b1f17b1804b1-4891d7164ddso12840985e9.3 for ; Tue, 21 Apr 2026 03:41:52 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linuxfoundation.org; s=google; t=1776768110; x=1777372910; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=NcrfMoNG5qMWeu4LuMbvRUNKlPt4IDS2YnmJCSss3jg=; b=QIj1WqTICiHshOJyg1mPt7heEvGpd43wo5W3Ldc1H3rrxt3UV+zvptamgn8itEEm07 XuG/2MYc/bUBzTfkuKxMJjY6r3oPbtNG/k1yCL3PJFdR7iO2t3oCQK4rxeoHBQ9imXIp x3HwHGhwSzG8Jor5aqLYMOLm9IXx4+BrTAw70= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776768110; x=1777372910; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=NcrfMoNG5qMWeu4LuMbvRUNKlPt4IDS2YnmJCSss3jg=; b=oY965w63zAiiCIAKEC59GFxdxHCK2bMJkb8wJF6jmyXJNMaob9KK8Deg/h/0BYBfOu +QLKsLvrcQfAiTNUA5bUM23ooq9xdMl8KbkdhI0S4EC+S/yQ8d9fW9XWoOazpzVj7qJn +nKanbS3bwdIYXc0tImq8ck0tuPDy52eL/HG2XMhhzHd9hSzglYEe7nawCJpphjebmt1 /PXBPS21TjKHG33mfoVneMfrbS3ufHqaPLnoWruPPSm4oE0fEXDp/5EyeH33l6+BJwQ/ RrR7UpW0lZTMZvAZWlevPSRRbnvAijlQtPzIphfwaFTpTKW/YTaI46Ft3VDktzAbGPv1 vw4A== X-Gm-Message-State: AOJu0Yz+qXOCHIu/6BMZEPco3jRSW3MKjTaqqjHH1WkYdh70bnr151q/ CF2e6vRflAcocmN65NMHJkHOfCev7LJD54dCcTMco3XAE/Y/ns5vntuFolfaoBUdc0ezroOX3lc beNWjofM= X-Gm-Gg: AeBDieuw4b5Ruy0uCx7PYKg95hEUHi/kkZCulNnCZniHaT40XpEJTJ+FiPEZCEF7sh9 UjsOoK9NMJkyANdBNPDxLFMQuLRrGfOTuS2fj2tEgs1zqkqEdLyaMscryDz7BdnmKAoIH/kKThB KEsQzw6YNztnGJmga857QP1FQzy/mWAoD4aKw6XTzq2nk67k+fKjNu9rK0bOQ4wOQ9hz0i9XI5Z s16TU6MzTUZv78rhlei6d86E08Mvyycoh4MfpgvvUQoySqL9FnJAOgh163+ctFZwJN/2aciUy4E uxBG4aAJEkj3VVOXhKNNwRKlEIAbCToVzmjjU5nQnFCxWA128gAmdGwOENbu4f6iUG+GJk3nxKP Enb7ze3MvlZXZr7ZB6tdqnmBwb8yloLie6CeAEFDS/YNwXhq+E34XWDO7U4qGUE8evuYLUKXnzq gMoqSXGjWcMkfxNo48ActPladoLPuQnIiFtDnkixK5yEvsCnxuKnKiE0x87v/Cikg= X-Received: by 2002:a05:600c:628c:b0:48a:52d4:888c with SMTP id 5b1f17b1804b1-48a52d48985mr73954165e9.3.1776768110136; Tue, 21 Apr 2026 03:41:50 -0700 (PDT) Received: from max.int.rpsys.net ([2001:8b0:aba:5f3c:aba4:e0e8:1cef:1732]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-48a4b329542sm163759995e9.3.2026.04.21.03.41.49 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 21 Apr 2026 03:41:49 -0700 (PDT) From: Richard Purdie To: openembedded-core@lists.openembedded.org Subject: [PATCH 2/3] shadow: Disable tallylog execution Date: Tue, 21 Apr 2026 11:41:46 +0100 Message-ID: <20260421104147.1994119-2-richard.purdie@linuxfoundation.org> X-Mailer: git-send-email 2.53.0 In-Reply-To: <20260421104147.1994119-1-richard.purdie@linuxfoundation.org> References: <20260421104147.1994119-1-richard.purdie@linuxfoundation.org> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 21 Apr 2026 10:41:57 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235664 We don't want to be calling tallylog from our native tools, disable it. Signed-off-by: Richard Purdie --- .../shadow/files/notallylog.patch | 19 +++++++++++++++++++ meta/recipes-extended/shadow/shadow_4.19.4.bb | 1 + 2 files changed, 20 insertions(+) create mode 100644 meta/recipes-extended/shadow/files/notallylog.patch diff --git a/meta/recipes-extended/shadow/files/notallylog.patch b/meta/recipes-extended/shadow/files/notallylog.patch new file mode 100644 index 00000000000..94773ace2ba --- /dev/null +++ b/meta/recipes-extended/shadow/files/notallylog.patch @@ -0,0 +1,19 @@ +We don't want to call /sbin/pam_tally2 in the native tools case so +disable this function. + +Upstream-Status: Inappropriate [OE cross configuration specific] + +Index: shadow-4.19.4/src/useradd.c +=================================================================== +--- shadow-4.19.4.orig/src/useradd.c ++++ shadow-4.19.4/src/useradd.c +@@ -2046,6 +2046,9 @@ static void tallylog_reset (const char * + int failed; + int status; + ++ /* Don't call /sbin/pam_tally2 in native builds */ ++ return; ++ + if (access(pam_tally2, X_OK) == -1) + return; + diff --git a/meta/recipes-extended/shadow/shadow_4.19.4.bb b/meta/recipes-extended/shadow/shadow_4.19.4.bb index 9fe6a27e411..3ab9ae9c287 100644 --- a/meta/recipes-extended/shadow/shadow_4.19.4.bb +++ b/meta/recipes-extended/shadow/shadow_4.19.4.bb @@ -25,6 +25,7 @@ SRC_URI:append:class-target = " \ SRC_URI:append:class-native = " \ file://commonio.c-fix-unexpected-open-failure-in-chroot-env.patch \ file://disable_syslog.patch \ + file://notallylog.patch \ " SRC_URI[sha256sum] = "ba7e9aed1c5420203ac549583d6e6f485a819ac7505af9c7cd8c13b2013210b8" UPSTREAM_CHECK_REGEX = "releases/tag/v?(?P\d+(\.\d+)+)$" From patchwork Tue Apr 21 10:41:47 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Richard Purdie X-Patchwork-Id: 86588 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 0B335F89258 for ; Tue, 21 Apr 2026 10:41:58 +0000 (UTC) Received: from mail-wm1-f51.google.com (mail-wm1-f51.google.com [209.85.128.51]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.22302.1776768113157955470 for ; Tue, 21 Apr 2026 03:41:53 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@linuxfoundation.org header.s=google header.b=Ukho3Lju; spf=pass (domain: linuxfoundation.org, ip: 209.85.128.51, mailfrom: richard.purdie@linuxfoundation.org) Received: by mail-wm1-f51.google.com with SMTP id 5b1f17b1804b1-488af96f6b2so52543635e9.0 for ; Tue, 21 Apr 2026 03:41:52 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linuxfoundation.org; s=google; t=1776768111; x=1777372911; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=p8edV5zzHH6dorLxvV9egypfqYvTGo8gPKF3r8qn6Xo=; b=Ukho3LjuAeMcIEG6Nt9tdR74DoEvlqd4pS+3pRdpL0lO43H484WTPOBQZASJi/8hPM xObUAKnu92jaYytkqxP4XpFZ2uLTZiOBgSJ9cU/L0cac7wxWgZbYXeC7bZRQJYVTR7fz sHPRTxrUXzpJrwG8+uMFPeOvQI4TFSHpG9DVI= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776768111; x=1777372911; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=p8edV5zzHH6dorLxvV9egypfqYvTGo8gPKF3r8qn6Xo=; b=rvtv2kIzIdT5CBij/je4sJ9GolPpbY2GNdGroaOFeZJ4hdHXUEMjcdxKqlnj2KKmZK nWmWzC4TpijPGdcKgx44Fx6TJtf6MnlO1FuDwsG7rgB9iUDani0CjhHzKJ4lpEwXvw1a 5hLJLn8DA7rzhF1YaCTBQ4wjKoc5qh+gq649Je/l+1xeUQVBDA++VdHVctKuFXPxXlPZ yw05e7YjAbdowDf2ABMn1UeB1k30jOQZlq6qP0imD4t4LlrpVOzjLqloKvQ2vFNmzysR knYJoqu7dMYEhgVUrI0n5Tr8OpmiBVdEjddx1oNK3p/B4Nx1LSNv/GtgzVHmwVy6TH5W 6I6g== X-Gm-Message-State: AOJu0Yx9OHo9PLDswxgsS3zQ7Q5e4M+qQ1G0Qq+kDteHDZ+tbWeuQPFj VnXvYcqLiQFsJFMz5KapLGHKLklHEOhHUyHhbzoEFEbJJlZbPT48WobEhGD5AvKqtnI4w+3evSD 6IdXPHW4= X-Gm-Gg: AeBDievSWnAHfQYVT8UgWZxJvA9TGsmIPlYGCpNDnD5/vBPD93aYbkJla2kWzMpX8PP 4dxa/J4/aQSASu79H1V60gTtxjwlFVDk1mGABvz7lmk5oWScSNUlenRmVvrEy7NX4Ge3xTU4f1y w0fLPGU3nuKaQdkur7BADDrnjwCLGFLFmVLZPS6mY9NpmhIlDr6f24LidlwFQHyjBYyPG+lOsXI K5u5isKGJ3GPcNdJnTE2PZ3rQffv4/lqo0lWAX4bfdv0wfMzLuYV+bfaLOVaXsysIDA2mJ/8V43 ekLCe0OItDsyknSeq09V/LJoYvBZH+1tYtRkGl5fpyCTkL+kZYa7ZFPA8wkgfWlFOC4gWNAbooN UQeHInXCB1aGte2x2x3IDi2anOb34nOBAcFSfWN7/KDO5w3X2bOf1T1jzNINH9ACrbwLR4Tc85U 4oyjhpKxg2VyDe03sLQ2vC1dlsuVTYXq5ceMxoEwOGVl7hgg5Nrn8TNpsohbBIfWQ= X-Received: by 2002:a05:600c:3216:b0:489:1ff1:74d3 with SMTP id 5b1f17b1804b1-4891ff17521mr53571175e9.20.1776768111069; Tue, 21 Apr 2026 03:41:51 -0700 (PDT) Received: from max.int.rpsys.net ([2001:8b0:aba:5f3c:aba4:e0e8:1cef:1732]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-48a4b329542sm163759995e9.3.2026.04.21.03.41.50 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 21 Apr 2026 03:41:50 -0700 (PDT) From: Richard Purdie To: openembedded-core@lists.openembedded.org Subject: [PATCH 3/3] shadow: Drop pointless patch Date: Tue, 21 Apr 2026 11:41:47 +0100 Message-ID: <20260421104147.1994119-3-richard.purdie@linuxfoundation.org> X-Mailer: git-send-email 2.53.0 In-Reply-To: <20260421104147.1994119-1-richard.purdie@linuxfoundation.org> References: <20260421104147.1994119-1-richard.purdie@linuxfoundation.org> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 21 Apr 2026 10:41:58 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235665 As far as I can tell, this patch is a no-op and doens't change the code. As such, I think it just complicates things and can be removed. Signed-off-by: Richard Purdie --- ...nexpected-open-failure-in-chroot-env.patch | 48 ------------------- meta/recipes-extended/shadow/shadow_4.19.4.bb | 1 - 2 files changed, 49 deletions(-) delete mode 100644 meta/recipes-extended/shadow/files/commonio.c-fix-unexpected-open-failure-in-chroot-env.patch diff --git a/meta/recipes-extended/shadow/files/commonio.c-fix-unexpected-open-failure-in-chroot-env.patch b/meta/recipes-extended/shadow/files/commonio.c-fix-unexpected-open-failure-in-chroot-env.patch deleted file mode 100644 index 699269ed643..00000000000 --- a/meta/recipes-extended/shadow/files/commonio.c-fix-unexpected-open-failure-in-chroot-env.patch +++ /dev/null @@ -1,48 +0,0 @@ -From f7b765c022e4cad9140ac44712885c66e149abdc Mon Sep 17 00:00:00 2001 -From: Chen Qi -Date: Thu, 17 Jul 2014 15:53:34 +0800 -Subject: [PATCH] commonio.c-fix-unexpected-open-failure-in-chroot-env - -Upstream-Status: Inappropriate [OE specific] - -commonio.c: fix unexpected open failure in chroot environment - -When using commands with '-R ' option in our pseudo environment, -we would usually get the 'Pemission Denied' error. This patch serves as -a workaround to this problem. - -Note that this patch doesn't change the logic in the code, it just expands -the codes. - -Signed-off-by: Chen Qi ---- - lib/commonio.c | 16 ++++++++++++---- - 1 file changed, 12 insertions(+), 4 deletions(-) - -diff --git a/lib/commonio.c b/lib/commonio.c -index 4d83e83..9ee0e13 100644 ---- a/lib/commonio.c -+++ b/lib/commonio.c -@@ -604,10 +604,18 @@ int commonio_open (struct commonio_db *db, int mode) - db->cursor = NULL; - db->changed = false; - -- fd = open (db->filename, -- (db->readonly ? O_RDONLY : O_RDWR) -- | O_NOCTTY | O_NONBLOCK | O_NOFOLLOW | O_CLOEXEC); -- saved_errno = errno; -+ if (db->readonly) { -+ fd = open (db->filename, -+ (true ? O_RDONLY : O_RDWR) -+ | O_NOCTTY | O_NONBLOCK | O_NOFOLLOW | O_CLOEXEC); -+ saved_errno = errno; -+ } else { -+ fd = open (db->filename, -+ (false ? O_RDONLY : O_RDWR) -+ | O_NOCTTY | O_NONBLOCK | O_NOFOLLOW| O_CLOEXEC); -+ saved_errno = errno; -+ } -+ - db->fp = NULL; - if (fd >= 0) { - #ifdef WITH_TCB diff --git a/meta/recipes-extended/shadow/shadow_4.19.4.bb b/meta/recipes-extended/shadow/shadow_4.19.4.bb index 3ab9ae9c287..94f155641cc 100644 --- a/meta/recipes-extended/shadow/shadow_4.19.4.bb +++ b/meta/recipes-extended/shadow/shadow_4.19.4.bb @@ -23,7 +23,6 @@ SRC_URI:append:class-target = " \ " SRC_URI:append:class-native = " \ - file://commonio.c-fix-unexpected-open-failure-in-chroot-env.patch \ file://disable_syslog.patch \ file://notallylog.patch \ "