Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

do_compile error with package mozjs #7

Closed
lamb0145 opened this issue Sep 20, 2014 · 1 comment
Closed

do_compile error with package mozjs #7

lamb0145 opened this issue Sep 20, 2014 · 1 comment

Comments

@lamb0145
Copy link

My yocto program is from "https://wiki.linaro.org/HowTo/ARMv8/OpenEmbedded".

When I do "bitbake mozjs -f", I get a error below:

bitbake mozjs -f

Loading cache: 100% |##########################################################################################################################| ETA: 00:00:00
Loaded 2418 entries from dependency cache.
WARNING: No recipes available for:
/home/wkf/halogen/openembedded/jenkins-setup/meta-selinux/recipes-kernel/linux/linux-yocto_3.4.bbappend
/home/wkf/halogen/openembedded/jenkins-setup/meta-virtualization/recipes-kernel/linux/linux-yocto_3.4.bbappend
/home/wkf/halogen/openembedded/jenkins-setup/meta-selinux/recipes-extended/at/at_3.1.14.bbappend
NOTE: Resolving any missing task queue dependencies

Build Configuration:
BB_VERSION = "1.23.1"
BUILD_SYS = "x86_64-linux"
NATIVELSBSTRING = "SUSE-LINUX-11"
TARGET_SYS = "aarch64-oe-linux"
MACHINE = "genericarmv8"
DISTRO = "nodistro"
DISTRO_VERSION = "nodistro.0"
TUNE_FEATURES = "aarch64"
meta-oe
meta-filesystems
meta-initramfs
meta-webserver
meta-networking
meta-gnome = "master:8c6721febfe1972c3bff6012ca7c70148343ec06"
meta-aarch64
meta-bigendian
meta-linaro
meta-linaro-toolchain
meta-linaro-integration = "master:a6d9587b06c8b513cf7013281a520e69fac99d72"
meta-virtualization = "master:4544c08af803f6ce569fd67216b33ee5e6c28cfa"
meta-browser = "master:61cf2e04146c47be37d7652c8ecbfb47d66c52fb"
meta-selinux = "master:fe356c16f803c01d57770ef4512c746517cabe95"
meta = "master:ccf616b7263e446d5f0cd1169d84bfdcbc115f57"
meta-java = "master:d2b75b615e4612f9fa05950c1d76d4a719e573d4"

NOTE: Preparing runqueue
NOTE: Tainting hash to force rebuild of task /home/wkf/halogen/openembedded/jenkins-setup/meta-openembedded/meta-oe/recipes-extended/mozjs/mozjs_17.0.0.bb, do_rm_work_all
WARNING: /home/wkf/halogen/openembedded/jenkins-setup/meta-openembedded/meta-oe/recipes-extended/mozjs/mozjs_17.0.0.bb.do_rm_work_all is tainted from a forced run
NOTE: Executing SetScene Tasks
NOTE: Executing RunQueue Tasks
ERROR: Function failed: do_compile (log file is located at /home/wkf/halogen/openembedded/jenkins-setup/build/tmp-eglibc/work/aarch64-oe-linux/mozjs/17.0.0-r0/temp/log.do_compile.58030)
ERROR: Logfile of failure stored in: /home/wkf/halogen/openembedded/jenkins-setup/build/tmp-eglibc/work/aarch64-oe-linux/mozjs/17.0.0-r0/temp/log.do_compile.58030
Log data follows:
| DEBUG: SITE files ['endian-little', 'bit-64', 'arm-common', 'common-linux', 'common-glibc', 'aarch64-linux', 'common']
| DEBUG: Executing shell function do_compile
| NOTE: make -j 64
| make export
| make[1]: Entering directory /home/wkf/halogen/openembedded/jenkins-setup/build/tmp-eglibc/work/aarch64-oe-linux/mozjs/17.0.0-r0/build' | make -C config/ nsinstall | mkdir -p /home/wkf/halogen/openembedded/jenkins-setup/build/tmp-eglibc/work/aarch64-oe-linux/mozjs/17.0.0-r0/build/.deps | /usr/local/bin/python2.7 /home/wkf/halogen/openembedded/jenkins-setup/build/tmp-eglibc/work/aarch64-oe-linux/mozjs/17.0.0-r0/mozjs17.0.0/js/src/builtin/embedjs.py selfhosted.out.h /home/wkf/halogen/openembedded/jenkins-setup/build/tmp-eglibc/work/aarch64-oe-linux/mozjs/17.0.0-r0/mozjs17.0.0/js/src/js.msg \ | /home/wkf/halogen/openembedded/jenkins-setup/build/tmp-eglibc/work/aarch64-oe-linux/mozjs/17.0.0-r0/mozjs17.0.0/js/src/builtin/macros.py /home/wkf/halogen/openembedded/jenkins-setup/build/tmp-eglibc/work/aarch64-oe-linux/mozjs/17.0.0-r0/mozjs17.0.0/js/src/builtin/array.js | nsinstall.c | make[2]: Entering directory/home/wkf/halogen/openembedded/jenkins-setup/build/tmp-eglibc/work/aarch64-oe-linux/mozjs/17.0.0-r0/build/config'
| gcc -o host_nsinstall.o -c -O2 -pipe -g -feliminate-unused-debug-types -DXP_UNIX -O3 -DUNICODE -D_UNICODE -I/home/wkf/halogen/openembedded/jenkins-setup/build/tmp-eglibc/work/aarch64-oe-linux/mozjs/17.0.0-r0/mozjs17.0.0/js/src/config -I. -I../dist/include /home/wkf/halogen/openembedded/jenkins-setup/build/tmp-eglibc/work/aarch64-oe-linux/mozjs/17.0.0-r0/mozjs17.0.0/js/src/config/nsinstall.c
| pathsub.c
| gcc -o host_pathsub.o -c -O2 -pipe -g -feliminate-unused-debug-types -DXP_UNIX -O3 -DUNICODE -D_UNICODE -I/home/wkf/halogen/openembedded/jenkins-setup/build/tmp-eglibc/work/aarch64-oe-linux/mozjs/17.0.0-r0/mozjs17.0.0/js/src/config -I. -I../dist/include /home/wkf/halogen/openembedded/jenkins-setup/build/tmp-eglibc/work/aarch64-oe-linux/mozjs/17.0.0-r0/mozjs17.0.0/js/src/config/pathsub.c
| Traceback (most recent call last):
| File "/home/wkf/halogen/openembedded/jenkins-setup/build/tmp-eglibc/work/aarch64-oe-linux/mozjs/17.0.0-r0/mozjs17.0.0/js/src/builtin/embedjs.py", line 12, in
| import re, sys, os, js2c, fileinput
| File "/home/wkf/halogen/openembedded/jenkins-setup/build/tmp-eglibc/work/aarch64-oe-linux/mozjs/17.0.0-r0/mozjs17.0.0/js/src/builtin/js2c.py", line 36, in
| import bz2
| ImportError: No module named bz2
| make[1]: *** [selfhosted.out.h] Error 1
| make[1]: *** Waiting for unfinished jobs....
| gcc -o nsinstall -O2 -pipe -g -feliminate-unused-debug-types -DXP_UNIX -O3 -DUNICODE -D_UNICODE -Wl,-O1 -Wl,--hash-style=gnu -Wl,--as-needed host_nsinstall.o host_pathsub.o
| make[2]: Leaving directory /home/wkf/halogen/openembedded/jenkins-setup/build/tmp-eglibc/work/aarch64-oe-linux/mozjs/17.0.0-r0/build/config' | make[1]: Leaving directory/home/wkf/halogen/openembedded/jenkins-setup/build/tmp-eglibc/work/aarch64-oe-linux/mozjs/17.0.0-r0/build'
| make: *** [default] Error 2
| ERROR: oe_runmake failed
| WARNING: /home/wkf/halogen/openembedded/jenkins-setup/build/tmp-eglibc/work/aarch64-oe-linux/mozjs/17.0.0-r0/temp/run.do_compile.58030:145 exit 1 from
| exit 1
| ERROR: Function failed: do_compile (log file is located at /home/wkf/halogen/openembedded/jenkins-setup/build/tmp-eglibc/work/aarch64-oe-linux/mozjs/17.0.0-r0/temp/log.do_compile.58030)
ERROR: Task 6 (/home/wkf/halogen/openembedded/jenkins-setup/meta-openembedded/meta-oe/recipes-extended/mozjs/mozjs_17.0.0.bb, do_compile) failed with exit code '1'
NOTE: Tasks Summary: Attempted 675 tasks of which 657 didn't need to be rerun and 1 failed.
Waiting for 0 running tasks to finish:

Summary: 1 task failed:
/home/wkf/halogen/openembedded/jenkins-setup/meta-openembedded/meta-oe/recipes-extended/mozjs/mozjs_17.0.0.bb, do_compile
Summary: There were 2 WARNING messages shown.
Summary: There was 1 ERROR message shown, returning a non-zero exit code.

philb pushed a commit that referenced this issue Jul 8, 2015
the patch comes from:
https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455
https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch

The cleanup function in telnetd is called both directly and on SIGCHLD
signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while
running on a 2.6.31.11 kernel.

What we were seeing is hangs like these:

  (gdb) bt
  #0  0xb7702424 in __kernel_vsyscall ()
  #1  0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6
  #2  0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6
  #3  0xb767e6e0 in utmpname () from ./lib/libc.so.6
  #4  0xb76bcde7 in logout () from ./lib/libutil.so.1
  #5  0x0804c827 in cleanup ()
  #6  <signal handler called>
  #7  0xb7702424 in __kernel_vsyscall ()
  #8  0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6
  #9  0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6
  #10 0xb767d675 in getutline_r () from ./lib/libc.so.6
  #11 0xb76bce42 in logout () from ./lib/libutil.so.1
  #12 0x0804c827 in cleanup ()
  #13 0x0804a0b5 in telnet ()
  #14 0x0804a9c3 in main ()

and what has happened here is that the user closes the telnet session
via the escape character. This causes telnetd to call cleanup in frame
the SIGCHLD signal is delivered while telnetd is executing cleanup.

Telnetd then calls the signal handler for SIGCHLD, which is cleanup().
Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the
__libc_utmp_lock lock, and utmpname above does the same thing in frame

The fix registers the SIGCHLD handler as cleanup_sighandler, and makes
cleanup disable the SIGCHLD signal before calling cleanup_sighandler.

Signed-off-by: Simon Kagstrom <simon.kagstrom@netinsight.net>
Signed-off-by: Li Wang <li.wang@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
philb pushed a commit that referenced this issue Jul 15, 2015
the patch comes from:
https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455
https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch

The cleanup function in telnetd is called both directly and on SIGCHLD
signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while
running on a 2.6.31.11 kernel.

What we were seeing is hangs like these:

  (gdb) bt
  #0  0xb7702424 in __kernel_vsyscall ()
  #1  0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6
  #2  0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6
  #3  0xb767e6e0 in utmpname () from ./lib/libc.so.6
  #4  0xb76bcde7 in logout () from ./lib/libutil.so.1
  #5  0x0804c827 in cleanup ()
  #6  <signal handler called>
  #7  0xb7702424 in __kernel_vsyscall ()
  #8  0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6
  #9  0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6
  #10 0xb767d675 in getutline_r () from ./lib/libc.so.6
  #11 0xb76bce42 in logout () from ./lib/libutil.so.1
  #12 0x0804c827 in cleanup ()
  #13 0x0804a0b5 in telnet ()
  #14 0x0804a9c3 in main ()

and what has happened here is that the user closes the telnet session
via the escape character. This causes telnetd to call cleanup in frame
the SIGCHLD signal is delivered while telnetd is executing cleanup.

Telnetd then calls the signal handler for SIGCHLD, which is cleanup().
Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the
__libc_utmp_lock lock, and utmpname above does the same thing in frame

The fix registers the SIGCHLD handler as cleanup_sighandler, and makes
cleanup disable the SIGCHLD signal before calling cleanup_sighandler.

Signed-off-by: Simon Kagstrom <simon.kagstrom@netinsight.net>
Signed-off-by: Li Wang <li.wang@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
philb pushed a commit that referenced this issue Jul 15, 2015
the patch comes from:
https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455
https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch

The cleanup function in telnetd is called both directly and on SIGCHLD
signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while
running on a 2.6.31.11 kernel.

What we were seeing is hangs like these:

  (gdb) bt
  #0  0xb7702424 in __kernel_vsyscall ()
  #1  0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6
  #2  0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6
  #3  0xb767e6e0 in utmpname () from ./lib/libc.so.6
  #4  0xb76bcde7 in logout () from ./lib/libutil.so.1
  #5  0x0804c827 in cleanup ()
  #6  <signal handler called>
  #7  0xb7702424 in __kernel_vsyscall ()
  #8  0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6
  #9  0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6
  #10 0xb767d675 in getutline_r () from ./lib/libc.so.6
  #11 0xb76bce42 in logout () from ./lib/libutil.so.1
  #12 0x0804c827 in cleanup ()
  #13 0x0804a0b5 in telnet ()
  #14 0x0804a9c3 in main ()

and what has happened here is that the user closes the telnet session
via the escape character. This causes telnetd to call cleanup in frame
the SIGCHLD signal is delivered while telnetd is executing cleanup.

Telnetd then calls the signal handler for SIGCHLD, which is cleanup().
Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the
__libc_utmp_lock lock, and utmpname above does the same thing in frame

The fix registers the SIGCHLD handler as cleanup_sighandler, and makes
cleanup disable the SIGCHLD signal before calling cleanup_sighandler.

Signed-off-by: Simon Kagstrom <simon.kagstrom@netinsight.net>
Signed-off-by: Li Wang <li.wang@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
philb pushed a commit that referenced this issue Jul 16, 2015
the patch comes from:
https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455
https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch

The cleanup function in telnetd is called both directly and on SIGCHLD
signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while
running on a 2.6.31.11 kernel.

What we were seeing is hangs like these:

  (gdb) bt
  #0  0xb7702424 in __kernel_vsyscall ()
  #1  0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6
  #2  0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6
  #3  0xb767e6e0 in utmpname () from ./lib/libc.so.6
  #4  0xb76bcde7 in logout () from ./lib/libutil.so.1
  #5  0x0804c827 in cleanup ()
  #6  <signal handler called>
  #7  0xb7702424 in __kernel_vsyscall ()
  #8  0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6
  #9  0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6
  #10 0xb767d675 in getutline_r () from ./lib/libc.so.6
  #11 0xb76bce42 in logout () from ./lib/libutil.so.1
  #12 0x0804c827 in cleanup ()
  #13 0x0804a0b5 in telnet ()
  #14 0x0804a9c3 in main ()

and what has happened here is that the user closes the telnet session
via the escape character. This causes telnetd to call cleanup in frame
the SIGCHLD signal is delivered while telnetd is executing cleanup.

Telnetd then calls the signal handler for SIGCHLD, which is cleanup().
Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the
__libc_utmp_lock lock, and utmpname above does the same thing in frame

The fix registers the SIGCHLD handler as cleanup_sighandler, and makes
cleanup disable the SIGCHLD signal before calling cleanup_sighandler.

Signed-off-by: Simon Kagstrom <simon.kagstrom@netinsight.net>
Signed-off-by: Li Wang <li.wang@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
philb pushed a commit that referenced this issue Jul 27, 2015
the patch comes from:
https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455
https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch

The cleanup function in telnetd is called both directly and on SIGCHLD
signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while
running on a 2.6.31.11 kernel.

What we were seeing is hangs like these:

  (gdb) bt
  #0  0xb7702424 in __kernel_vsyscall ()
  #1  0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6
  #2  0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6
  #3  0xb767e6e0 in utmpname () from ./lib/libc.so.6
  #4  0xb76bcde7 in logout () from ./lib/libutil.so.1
  #5  0x0804c827 in cleanup ()
  #6  <signal handler called>
  #7  0xb7702424 in __kernel_vsyscall ()
  #8  0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6
  #9  0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6
  #10 0xb767d675 in getutline_r () from ./lib/libc.so.6
  #11 0xb76bce42 in logout () from ./lib/libutil.so.1
  #12 0x0804c827 in cleanup ()
  #13 0x0804a0b5 in telnet ()
  #14 0x0804a9c3 in main ()

and what has happened here is that the user closes the telnet session
via the escape character. This causes telnetd to call cleanup in frame
the SIGCHLD signal is delivered while telnetd is executing cleanup.

Telnetd then calls the signal handler for SIGCHLD, which is cleanup().
Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the
__libc_utmp_lock lock, and utmpname above does the same thing in frame

The fix registers the SIGCHLD handler as cleanup_sighandler, and makes
cleanup disable the SIGCHLD signal before calling cleanup_sighandler.

Signed-off-by: Simon Kagstrom <simon.kagstrom@netinsight.net>
Signed-off-by: Li Wang <li.wang@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
philb pushed a commit that referenced this issue Jul 29, 2015
the patch comes from:
https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455
https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch

The cleanup function in telnetd is called both directly and on SIGCHLD
signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while
running on a 2.6.31.11 kernel.

What we were seeing is hangs like these:

  (gdb) bt
  #0  0xb7702424 in __kernel_vsyscall ()
  #1  0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6
  #2  0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6
  #3  0xb767e6e0 in utmpname () from ./lib/libc.so.6
  #4  0xb76bcde7 in logout () from ./lib/libutil.so.1
  #5  0x0804c827 in cleanup ()
  #6  <signal handler called>
  #7  0xb7702424 in __kernel_vsyscall ()
  #8  0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6
  #9  0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6
  #10 0xb767d675 in getutline_r () from ./lib/libc.so.6
  #11 0xb76bce42 in logout () from ./lib/libutil.so.1
  #12 0x0804c827 in cleanup ()
  #13 0x0804a0b5 in telnet ()
  #14 0x0804a9c3 in main ()

and what has happened here is that the user closes the telnet session
via the escape character. This causes telnetd to call cleanup in frame
the SIGCHLD signal is delivered while telnetd is executing cleanup.

Telnetd then calls the signal handler for SIGCHLD, which is cleanup().
Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the
__libc_utmp_lock lock, and utmpname above does the same thing in frame

The fix registers the SIGCHLD handler as cleanup_sighandler, and makes
cleanup disable the SIGCHLD signal before calling cleanup_sighandler.

Signed-off-by: Simon Kagstrom <simon.kagstrom@netinsight.net>
Signed-off-by: Li Wang <li.wang@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
philb pushed a commit that referenced this issue Jul 30, 2015
the patch comes from:
https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455
https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch

The cleanup function in telnetd is called both directly and on SIGCHLD
signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while
running on a 2.6.31.11 kernel.

What we were seeing is hangs like these:

  (gdb) bt
  #0  0xb7702424 in __kernel_vsyscall ()
  #1  0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6
  #2  0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6
  #3  0xb767e6e0 in utmpname () from ./lib/libc.so.6
  #4  0xb76bcde7 in logout () from ./lib/libutil.so.1
  #5  0x0804c827 in cleanup ()
  #6  <signal handler called>
  #7  0xb7702424 in __kernel_vsyscall ()
  #8  0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6
  #9  0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6
  #10 0xb767d675 in getutline_r () from ./lib/libc.so.6
  #11 0xb76bce42 in logout () from ./lib/libutil.so.1
  #12 0x0804c827 in cleanup ()
  #13 0x0804a0b5 in telnet ()
  #14 0x0804a9c3 in main ()

and what has happened here is that the user closes the telnet session
via the escape character. This causes telnetd to call cleanup in frame
the SIGCHLD signal is delivered while telnetd is executing cleanup.

Telnetd then calls the signal handler for SIGCHLD, which is cleanup().
Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the
__libc_utmp_lock lock, and utmpname above does the same thing in frame

The fix registers the SIGCHLD handler as cleanup_sighandler, and makes
cleanup disable the SIGCHLD signal before calling cleanup_sighandler.

Signed-off-by: Simon Kagstrom <simon.kagstrom@netinsight.net>
Signed-off-by: Li Wang <li.wang@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
philb pushed a commit that referenced this issue Aug 3, 2015
the patch comes from:
https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455
https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch

The cleanup function in telnetd is called both directly and on SIGCHLD
signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while
running on a 2.6.31.11 kernel.

What we were seeing is hangs like these:

  (gdb) bt
  #0  0xb7702424 in __kernel_vsyscall ()
  #1  0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6
  #2  0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6
  #3  0xb767e6e0 in utmpname () from ./lib/libc.so.6
  #4  0xb76bcde7 in logout () from ./lib/libutil.so.1
  #5  0x0804c827 in cleanup ()
  #6  <signal handler called>
  #7  0xb7702424 in __kernel_vsyscall ()
  #8  0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6
  #9  0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6
  #10 0xb767d675 in getutline_r () from ./lib/libc.so.6
  #11 0xb76bce42 in logout () from ./lib/libutil.so.1
  #12 0x0804c827 in cleanup ()
  #13 0x0804a0b5 in telnet ()
  #14 0x0804a9c3 in main ()

and what has happened here is that the user closes the telnet session
via the escape character. This causes telnetd to call cleanup in frame
the SIGCHLD signal is delivered while telnetd is executing cleanup.

Telnetd then calls the signal handler for SIGCHLD, which is cleanup().
Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the
__libc_utmp_lock lock, and utmpname above does the same thing in frame

The fix registers the SIGCHLD handler as cleanup_sighandler, and makes
cleanup disable the SIGCHLD signal before calling cleanup_sighandler.

Signed-off-by: Simon Kagstrom <simon.kagstrom@netinsight.net>
Signed-off-by: Li Wang <li.wang@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
philb pushed a commit that referenced this issue Aug 17, 2015
the patch comes from:
https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455
https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch

The cleanup function in telnetd is called both directly and on SIGCHLD
signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while
running on a 2.6.31.11 kernel.

What we were seeing is hangs like these:

  (gdb) bt
  #0  0xb7702424 in __kernel_vsyscall ()
  #1  0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6
  #2  0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6
  #3  0xb767e6e0 in utmpname () from ./lib/libc.so.6
  #4  0xb76bcde7 in logout () from ./lib/libutil.so.1
  #5  0x0804c827 in cleanup ()
  #6  <signal handler called>
  #7  0xb7702424 in __kernel_vsyscall ()
  #8  0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6
  #9  0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6
  #10 0xb767d675 in getutline_r () from ./lib/libc.so.6
  #11 0xb76bce42 in logout () from ./lib/libutil.so.1
  #12 0x0804c827 in cleanup ()
  #13 0x0804a0b5 in telnet ()
  #14 0x0804a9c3 in main ()

and what has happened here is that the user closes the telnet session
via the escape character. This causes telnetd to call cleanup in frame
the SIGCHLD signal is delivered while telnetd is executing cleanup.

Telnetd then calls the signal handler for SIGCHLD, which is cleanup().
Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the
__libc_utmp_lock lock, and utmpname above does the same thing in frame

The fix registers the SIGCHLD handler as cleanup_sighandler, and makes
cleanup disable the SIGCHLD signal before calling cleanup_sighandler.

Signed-off-by: Simon Kagstrom <simon.kagstrom@netinsight.net>
Signed-off-by: Li Wang <li.wang@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
philb pushed a commit that referenced this issue Aug 18, 2015
the patch comes from:
https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455
https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch

The cleanup function in telnetd is called both directly and on SIGCHLD
signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while
running on a 2.6.31.11 kernel.

What we were seeing is hangs like these:

  (gdb) bt
  #0  0xb7702424 in __kernel_vsyscall ()
  #1  0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6
  #2  0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6
  #3  0xb767e6e0 in utmpname () from ./lib/libc.so.6
  #4  0xb76bcde7 in logout () from ./lib/libutil.so.1
  #5  0x0804c827 in cleanup ()
  #6  <signal handler called>
  #7  0xb7702424 in __kernel_vsyscall ()
  #8  0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6
  #9  0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6
  #10 0xb767d675 in getutline_r () from ./lib/libc.so.6
  #11 0xb76bce42 in logout () from ./lib/libutil.so.1
  #12 0x0804c827 in cleanup ()
  #13 0x0804a0b5 in telnet ()
  #14 0x0804a9c3 in main ()

and what has happened here is that the user closes the telnet session
via the escape character. This causes telnetd to call cleanup in frame
the SIGCHLD signal is delivered while telnetd is executing cleanup.

Telnetd then calls the signal handler for SIGCHLD, which is cleanup().
Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the
__libc_utmp_lock lock, and utmpname above does the same thing in frame

The fix registers the SIGCHLD handler as cleanup_sighandler, and makes
cleanup disable the SIGCHLD signal before calling cleanup_sighandler.

Signed-off-by: Simon Kagstrom <simon.kagstrom@netinsight.net>
Signed-off-by: Li Wang <li.wang@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
philb pushed a commit that referenced this issue Aug 18, 2015
the patch comes from:
https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455
https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch

The cleanup function in telnetd is called both directly and on SIGCHLD
signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while
running on a 2.6.31.11 kernel.

What we were seeing is hangs like these:

  (gdb) bt
  #0  0xb7702424 in __kernel_vsyscall ()
  #1  0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6
  #2  0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6
  #3  0xb767e6e0 in utmpname () from ./lib/libc.so.6
  #4  0xb76bcde7 in logout () from ./lib/libutil.so.1
  #5  0x0804c827 in cleanup ()
  #6  <signal handler called>
  #7  0xb7702424 in __kernel_vsyscall ()
  #8  0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6
  #9  0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6
  #10 0xb767d675 in getutline_r () from ./lib/libc.so.6
  #11 0xb76bce42 in logout () from ./lib/libutil.so.1
  #12 0x0804c827 in cleanup ()
  #13 0x0804a0b5 in telnet ()
  #14 0x0804a9c3 in main ()

and what has happened here is that the user closes the telnet session
via the escape character. This causes telnetd to call cleanup in frame
the SIGCHLD signal is delivered while telnetd is executing cleanup.

Telnetd then calls the signal handler for SIGCHLD, which is cleanup().
Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the
__libc_utmp_lock lock, and utmpname above does the same thing in frame

The fix registers the SIGCHLD handler as cleanup_sighandler, and makes
cleanup disable the SIGCHLD signal before calling cleanup_sighandler.

Signed-off-by: Simon Kagstrom <simon.kagstrom@netinsight.net>
Signed-off-by: Li Wang <li.wang@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
philb pushed a commit that referenced this issue Aug 20, 2015
the patch comes from:
https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455
https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch

The cleanup function in telnetd is called both directly and on SIGCHLD
signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while
running on a 2.6.31.11 kernel.

What we were seeing is hangs like these:

  (gdb) bt
  #0  0xb7702424 in __kernel_vsyscall ()
  #1  0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6
  #2  0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6
  #3  0xb767e6e0 in utmpname () from ./lib/libc.so.6
  #4  0xb76bcde7 in logout () from ./lib/libutil.so.1
  #5  0x0804c827 in cleanup ()
  #6  <signal handler called>
  #7  0xb7702424 in __kernel_vsyscall ()
  #8  0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6
  #9  0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6
  #10 0xb767d675 in getutline_r () from ./lib/libc.so.6
  #11 0xb76bce42 in logout () from ./lib/libutil.so.1
  #12 0x0804c827 in cleanup ()
  #13 0x0804a0b5 in telnet ()
  #14 0x0804a9c3 in main ()

and what has happened here is that the user closes the telnet session
via the escape character. This causes telnetd to call cleanup in frame
the SIGCHLD signal is delivered while telnetd is executing cleanup.

Telnetd then calls the signal handler for SIGCHLD, which is cleanup().
Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the
__libc_utmp_lock lock, and utmpname above does the same thing in frame

The fix registers the SIGCHLD handler as cleanup_sighandler, and makes
cleanup disable the SIGCHLD signal before calling cleanup_sighandler.

Signed-off-by: Simon Kagstrom <simon.kagstrom@netinsight.net>
Signed-off-by: Li Wang <li.wang@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
philb pushed a commit that referenced this issue Aug 24, 2015
the patch comes from:
https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455
https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch

The cleanup function in telnetd is called both directly and on SIGCHLD
signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while
running on a 2.6.31.11 kernel.

What we were seeing is hangs like these:

  (gdb) bt
  #0  0xb7702424 in __kernel_vsyscall ()
  #1  0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6
  #2  0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6
  #3  0xb767e6e0 in utmpname () from ./lib/libc.so.6
  #4  0xb76bcde7 in logout () from ./lib/libutil.so.1
  #5  0x0804c827 in cleanup ()
  #6  <signal handler called>
  #7  0xb7702424 in __kernel_vsyscall ()
  #8  0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6
  #9  0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6
  #10 0xb767d675 in getutline_r () from ./lib/libc.so.6
  #11 0xb76bce42 in logout () from ./lib/libutil.so.1
  #12 0x0804c827 in cleanup ()
  #13 0x0804a0b5 in telnet ()
  #14 0x0804a9c3 in main ()

and what has happened here is that the user closes the telnet session
via the escape character. This causes telnetd to call cleanup in frame
the SIGCHLD signal is delivered while telnetd is executing cleanup.

Telnetd then calls the signal handler for SIGCHLD, which is cleanup().
Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the
__libc_utmp_lock lock, and utmpname above does the same thing in frame

The fix registers the SIGCHLD handler as cleanup_sighandler, and makes
cleanup disable the SIGCHLD signal before calling cleanup_sighandler.

Signed-off-by: Simon Kagstrom <simon.kagstrom@netinsight.net>
Signed-off-by: Li Wang <li.wang@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
philb pushed a commit that referenced this issue Aug 24, 2015
the patch comes from:
https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455
https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch

The cleanup function in telnetd is called both directly and on SIGCHLD
signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while
running on a 2.6.31.11 kernel.

What we were seeing is hangs like these:

  (gdb) bt
  #0  0xb7702424 in __kernel_vsyscall ()
  #1  0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6
  #2  0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6
  #3  0xb767e6e0 in utmpname () from ./lib/libc.so.6
  #4  0xb76bcde7 in logout () from ./lib/libutil.so.1
  #5  0x0804c827 in cleanup ()
  #6  <signal handler called>
  #7  0xb7702424 in __kernel_vsyscall ()
  #8  0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6
  #9  0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6
  #10 0xb767d675 in getutline_r () from ./lib/libc.so.6
  #11 0xb76bce42 in logout () from ./lib/libutil.so.1
  #12 0x0804c827 in cleanup ()
  #13 0x0804a0b5 in telnet ()
  #14 0x0804a9c3 in main ()

and what has happened here is that the user closes the telnet session
via the escape character. This causes telnetd to call cleanup in frame
the SIGCHLD signal is delivered while telnetd is executing cleanup.

Telnetd then calls the signal handler for SIGCHLD, which is cleanup().
Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the
__libc_utmp_lock lock, and utmpname above does the same thing in frame

The fix registers the SIGCHLD handler as cleanup_sighandler, and makes
cleanup disable the SIGCHLD signal before calling cleanup_sighandler.

Signed-off-by: Simon Kagstrom <simon.kagstrom@netinsight.net>
Signed-off-by: Li Wang <li.wang@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
philb pushed a commit that referenced this issue Aug 27, 2015
the patch comes from:
https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455
https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch

The cleanup function in telnetd is called both directly and on SIGCHLD
signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while
running on a 2.6.31.11 kernel.

What we were seeing is hangs like these:

  (gdb) bt
  #0  0xb7702424 in __kernel_vsyscall ()
  #1  0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6
  #2  0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6
  #3  0xb767e6e0 in utmpname () from ./lib/libc.so.6
  #4  0xb76bcde7 in logout () from ./lib/libutil.so.1
  #5  0x0804c827 in cleanup ()
  #6  <signal handler called>
  #7  0xb7702424 in __kernel_vsyscall ()
  #8  0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6
  #9  0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6
  #10 0xb767d675 in getutline_r () from ./lib/libc.so.6
  #11 0xb76bce42 in logout () from ./lib/libutil.so.1
  #12 0x0804c827 in cleanup ()
  #13 0x0804a0b5 in telnet ()
  #14 0x0804a9c3 in main ()

and what has happened here is that the user closes the telnet session
via the escape character. This causes telnetd to call cleanup in frame
the SIGCHLD signal is delivered while telnetd is executing cleanup.

Telnetd then calls the signal handler for SIGCHLD, which is cleanup().
Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the
__libc_utmp_lock lock, and utmpname above does the same thing in frame

The fix registers the SIGCHLD handler as cleanup_sighandler, and makes
cleanup disable the SIGCHLD signal before calling cleanup_sighandler.

Signed-off-by: Simon Kagstrom <simon.kagstrom@netinsight.net>
Signed-off-by: Li Wang <li.wang@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
philb pushed a commit that referenced this issue Aug 31, 2015
the patch comes from:
https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455
https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch

The cleanup function in telnetd is called both directly and on SIGCHLD
signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while
running on a 2.6.31.11 kernel.

What we were seeing is hangs like these:

  (gdb) bt
  #0  0xb7702424 in __kernel_vsyscall ()
  #1  0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6
  #2  0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6
  #3  0xb767e6e0 in utmpname () from ./lib/libc.so.6
  #4  0xb76bcde7 in logout () from ./lib/libutil.so.1
  #5  0x0804c827 in cleanup ()
  #6  <signal handler called>
  #7  0xb7702424 in __kernel_vsyscall ()
  #8  0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6
  #9  0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6
  #10 0xb767d675 in getutline_r () from ./lib/libc.so.6
  #11 0xb76bce42 in logout () from ./lib/libutil.so.1
  #12 0x0804c827 in cleanup ()
  #13 0x0804a0b5 in telnet ()
  #14 0x0804a9c3 in main ()

and what has happened here is that the user closes the telnet session
via the escape character. This causes telnetd to call cleanup in frame
the SIGCHLD signal is delivered while telnetd is executing cleanup.

Telnetd then calls the signal handler for SIGCHLD, which is cleanup().
Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the
__libc_utmp_lock lock, and utmpname above does the same thing in frame

The fix registers the SIGCHLD handler as cleanup_sighandler, and makes
cleanup disable the SIGCHLD signal before calling cleanup_sighandler.

Signed-off-by: Simon Kagstrom <simon.kagstrom@netinsight.net>
Signed-off-by: Li Wang <li.wang@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
philb pushed a commit that referenced this issue Sep 14, 2015
the patch comes from:
https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455
https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch

The cleanup function in telnetd is called both directly and on SIGCHLD
signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while
running on a 2.6.31.11 kernel.

What we were seeing is hangs like these:

  (gdb) bt
  #0  0xb7702424 in __kernel_vsyscall ()
  #1  0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6
  #2  0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6
  #3  0xb767e6e0 in utmpname () from ./lib/libc.so.6
  #4  0xb76bcde7 in logout () from ./lib/libutil.so.1
  #5  0x0804c827 in cleanup ()
  #6  <signal handler called>
  #7  0xb7702424 in __kernel_vsyscall ()
  #8  0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6
  #9  0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6
  #10 0xb767d675 in getutline_r () from ./lib/libc.so.6
  #11 0xb76bce42 in logout () from ./lib/libutil.so.1
  #12 0x0804c827 in cleanup ()
  #13 0x0804a0b5 in telnet ()
  #14 0x0804a9c3 in main ()

and what has happened here is that the user closes the telnet session
via the escape character. This causes telnetd to call cleanup in frame
the SIGCHLD signal is delivered while telnetd is executing cleanup.

Telnetd then calls the signal handler for SIGCHLD, which is cleanup().
Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the
__libc_utmp_lock lock, and utmpname above does the same thing in frame

The fix registers the SIGCHLD handler as cleanup_sighandler, and makes
cleanup disable the SIGCHLD signal before calling cleanup_sighandler.

Signed-off-by: Simon Kagstrom <simon.kagstrom@netinsight.net>
Signed-off-by: Li Wang <li.wang@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
@shr-project
Copy link
Contributor

We don't use github.com for tracking issues.

If the issue is still valid, then send a patch to openembedded-devel@lists.openembedded.org

halstead pushed a commit that referenced this issue Apr 13, 2018
WARNING: hddtemp-0.3-beta15-r1 do_patch:
Some of the context lines in patches were ignored. This can lead to incorrectly applied patches.
The context lines in the patches can be updated with devtool:

    devtool modify <recipe>
    devtool finish --force-patch-refresh <recipe> <layer_path>

Then the updated patches and the source tree (in devtool's workspace)
should be reviewed to make sure the patches apply in the correct place
and don't introduce duplicate lines (which can, and does happen
when some of the context is ignored). Further information:
http://lists.openembedded.org/pipermail/openembedded-core/2018-March/148675.html
https://bugzilla.yoctoproject.org/show_bug.cgi?id=10450
Details:
Applying patch hddtemp_0.3-beta15-52.diff
patching file doc/hddtemp.8
patching file po/fr.po
patching file po/ru.po
patching file po/sv.po
patching file po/pt.po
patching file po/de.po
patching file po/LINGUAS
patching file po/hddtemp.pot
patching file src/sata.c
patching file src/satacmds.c
patching file src/backtrace.c
patching file src/daemon.c
patching file src/hddtemp.c
Hunk #5 succeeded at 268 with fuzz 2 (offset 4 lines).
Hunk #6 succeeded at 283 (offset 4 lines).
Hunk #7 succeeded at 295 (offset 4 lines).
Hunk #8 succeeded at 372 (offset 4 lines).
Hunk #9 succeeded at 409 (offset 4 lines).
Hunk #10 succeeded at 483 (offset 4 lines).
Hunk #11 succeeded at 496 (offset 4 lines).
Hunk #12 succeeded at 510 (offset 4 lines).
Hunk #13 succeeded at 532 (offset 4 lines).
patching file src/ata.c
patching file src/hddtemp.h
patching file src/scsicmds.c

Now at patch hddtemp_0.3-beta15-52.diff

Signed-off-by: Armin Kuster <akuster808@gmail.com>
kraj pushed a commit to kraj/meta-openembedded that referenced this issue May 29, 2018
When switch PATCHTOOL to patch, the key-replay-cve-multiple.patch can't
be apply with "--dry-run" as follows:

checking file src/ap/ieee802_11.c
checking file src/ap/wpa_auth.c
checking file src/ap/wpa_auth.h
checking file src/ap/wpa_auth_ft.c
checking file src/ap/wpa_auth_i.h
checking file src/common/wpa_common.h
checking file src/rsn_supp/wpa.c
checking file src/rsn_supp/wpa_i.h
checking file src/rsn_supp/wpa.c
Hunk openembedded#1 FAILED at 709.
Hunk openembedded#2 FAILED at 757.
Hunk openembedded#3 succeeded at 840 (offset -12 lines).
Hunk openembedded#4 FAILED at 868.
Hunk openembedded#5 FAILED at 900.
Hunk openembedded#6 FAILED at 924.
Hunk openembedded#7 succeeded at 1536 (offset -38 lines).
Hunk openembedded#8 FAILED at 2386.
Hunk openembedded#9 FAILED at 2920.
Hunk openembedded#10 succeeded at 2940 (offset -46 lines).
Hunk openembedded#11 FAILED at 2998.
8 out of 11 hunks FAILED
checking file src/rsn_supp/wpa_i.h
Hunk openembedded#1 FAILED at 32.
1 out of 1 hunk FAILED
checking file src/common/wpa_common.h
Hunk openembedded#1 succeeded at 215 with fuzz 1.
checking file src/rsn_supp/wpa.c
checking file src/rsn_supp/wpa_i.h
checking file src/ap/wpa_auth.c
Hunk openembedded#1 succeeded at 1898 (offset -3 lines).
Hunk openembedded#2 succeeded at 2470 (offset -3 lines).
checking file src/rsn_supp/tdls.c
checking file src/rsn_supp/wpa.c
Hunk openembedded#1 succeeded at 2378 (offset -62 lines).
checking file src/rsn_supp/wpa_ft.c
checking file src/rsn_supp/wpa_i.h
Hunk openembedded#1 succeeded at 123 (offset -5 lines).

So split the key-replay-cve-multiple.patch to 7 patches.

Signed-off-by: Zheng Ruoqin <zhengrq.fnst@cn.fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
kraj pushed a commit to kraj/meta-openembedded that referenced this issue May 29, 2018
When switch PATCHTOOL to patch, the key-replay-cve-multiple.patch can't
be apply with "--dry-run" as follows:

checking file src/ap/ieee802_11.c
checking file src/ap/wpa_auth.c
checking file src/ap/wpa_auth.h
checking file src/ap/wpa_auth_ft.c
checking file src/ap/wpa_auth_i.h
checking file src/common/wpa_common.h
checking file src/rsn_supp/wpa.c
checking file src/rsn_supp/wpa_i.h
checking file src/rsn_supp/wpa.c
Hunk openembedded#1 FAILED at 709.
Hunk openembedded#2 FAILED at 757.
Hunk openembedded#3 succeeded at 840 (offset -12 lines).
Hunk openembedded#4 FAILED at 868.
Hunk openembedded#5 FAILED at 900.
Hunk openembedded#6 FAILED at 924.
Hunk openembedded#7 succeeded at 1536 (offset -38 lines).
Hunk openembedded#8 FAILED at 2386.
Hunk openembedded#9 FAILED at 2920.
Hunk openembedded#10 succeeded at 2940 (offset -46 lines).
Hunk openembedded#11 FAILED at 2998.
8 out of 11 hunks FAILED
checking file src/rsn_supp/wpa_i.h
Hunk openembedded#1 FAILED at 32.
1 out of 1 hunk FAILED
checking file src/common/wpa_common.h
Hunk openembedded#1 succeeded at 215 with fuzz 1.
checking file src/rsn_supp/wpa.c
checking file src/rsn_supp/wpa_i.h
checking file src/ap/wpa_auth.c
Hunk openembedded#1 succeeded at 1898 (offset -3 lines).
Hunk openembedded#2 succeeded at 2470 (offset -3 lines).
checking file src/rsn_supp/tdls.c
checking file src/rsn_supp/wpa.c
Hunk openembedded#1 succeeded at 2378 (offset -62 lines).
checking file src/rsn_supp/wpa_ft.c
checking file src/rsn_supp/wpa_i.h
Hunk openembedded#1 succeeded at 123 (offset -5 lines).

So split the key-replay-cve-multiple.patch to 7 patches.

Signed-off-by: Zheng Ruoqin <zhengrq.fnst@cn.fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
kraj pushed a commit to kraj/meta-openembedded that referenced this issue May 29, 2018
When switch PATCHTOOL to patch, the key-replay-cve-multiple.patch can't
be apply with "--dry-run" as follows:

checking file src/ap/ieee802_11.c
checking file src/ap/wpa_auth.c
checking file src/ap/wpa_auth.h
checking file src/ap/wpa_auth_ft.c
checking file src/ap/wpa_auth_i.h
checking file src/common/wpa_common.h
checking file src/rsn_supp/wpa.c
checking file src/rsn_supp/wpa_i.h
checking file src/rsn_supp/wpa.c
Hunk openembedded#1 FAILED at 709.
Hunk openembedded#2 FAILED at 757.
Hunk openembedded#3 succeeded at 840 (offset -12 lines).
Hunk openembedded#4 FAILED at 868.
Hunk openembedded#5 FAILED at 900.
Hunk openembedded#6 FAILED at 924.
Hunk openembedded#7 succeeded at 1536 (offset -38 lines).
Hunk openembedded#8 FAILED at 2386.
Hunk openembedded#9 FAILED at 2920.
Hunk openembedded#10 succeeded at 2940 (offset -46 lines).
Hunk openembedded#11 FAILED at 2998.
8 out of 11 hunks FAILED
checking file src/rsn_supp/wpa_i.h
Hunk openembedded#1 FAILED at 32.
1 out of 1 hunk FAILED
checking file src/common/wpa_common.h
Hunk openembedded#1 succeeded at 215 with fuzz 1.
checking file src/rsn_supp/wpa.c
checking file src/rsn_supp/wpa_i.h
checking file src/ap/wpa_auth.c
Hunk openembedded#1 succeeded at 1898 (offset -3 lines).
Hunk openembedded#2 succeeded at 2470 (offset -3 lines).
checking file src/rsn_supp/tdls.c
checking file src/rsn_supp/wpa.c
Hunk openembedded#1 succeeded at 2378 (offset -62 lines).
checking file src/rsn_supp/wpa_ft.c
checking file src/rsn_supp/wpa_i.h
Hunk openembedded#1 succeeded at 123 (offset -5 lines).

So split the key-replay-cve-multiple.patch to 7 patches.

Signed-off-by: Zheng Ruoqin <zhengrq.fnst@cn.fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
jpuhlman pushed a commit to MontaVista-OpenSourceTechnology/meta-openembedded that referenced this issue Jun 13, 2018
Source: meta-openembedded
MR: 00000
Type: Integration
Disposition: Merged from meta-openembedded
ChangeID: 543bb9c
Description:

When switch PATCHTOOL to patch, the key-replay-cve-multiple.patch can't
be apply with "--dry-run" as follows:

checking file src/ap/ieee802_11.c
checking file src/ap/wpa_auth.c
checking file src/ap/wpa_auth.h
checking file src/ap/wpa_auth_ft.c
checking file src/ap/wpa_auth_i.h
checking file src/common/wpa_common.h
checking file src/rsn_supp/wpa.c
checking file src/rsn_supp/wpa_i.h
checking file src/rsn_supp/wpa.c
Hunk openembedded#1 FAILED at 709.
Hunk openembedded#2 FAILED at 757.
Hunk openembedded#3 succeeded at 840 (offset -12 lines).
Hunk openembedded#4 FAILED at 868.
Hunk openembedded#5 FAILED at 900.
Hunk openembedded#6 FAILED at 924.
Hunk openembedded#7 succeeded at 1536 (offset -38 lines).
Hunk openembedded#8 FAILED at 2386.
Hunk openembedded#9 FAILED at 2920.
Hunk openembedded#10 succeeded at 2940 (offset -46 lines).
Hunk openembedded#11 FAILED at 2998.
8 out of 11 hunks FAILED
checking file src/rsn_supp/wpa_i.h
Hunk openembedded#1 FAILED at 32.
1 out of 1 hunk FAILED
checking file src/common/wpa_common.h
Hunk openembedded#1 succeeded at 215 with fuzz 1.
checking file src/rsn_supp/wpa.c
checking file src/rsn_supp/wpa_i.h
checking file src/ap/wpa_auth.c
Hunk openembedded#1 succeeded at 1898 (offset -3 lines).
Hunk openembedded#2 succeeded at 2470 (offset -3 lines).
checking file src/rsn_supp/tdls.c
checking file src/rsn_supp/wpa.c
Hunk openembedded#1 succeeded at 2378 (offset -62 lines).
checking file src/rsn_supp/wpa_ft.c
checking file src/rsn_supp/wpa_i.h
Hunk openembedded#1 succeeded at 123 (offset -5 lines).

So split the key-replay-cve-multiple.patch to 7 patches.

Signed-off-by: Zheng Ruoqin <zhengrq.fnst@cn.fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
Signed-off-by: Jeremy Puhlman <jpuhlman@mvista.com>
halstead pushed a commit that referenced this issue Jun 20, 2018
When switch PATCHTOOL to patch, the key-replay-cve-multiple.patch can't
be apply with "--dry-run" as follows:

checking file src/ap/ieee802_11.c
checking file src/ap/wpa_auth.c
checking file src/ap/wpa_auth.h
checking file src/ap/wpa_auth_ft.c
checking file src/ap/wpa_auth_i.h
checking file src/common/wpa_common.h
checking file src/rsn_supp/wpa.c
checking file src/rsn_supp/wpa_i.h
checking file src/rsn_supp/wpa.c
Hunk #1 FAILED at 709.
Hunk #2 FAILED at 757.
Hunk #3 succeeded at 840 (offset -12 lines).
Hunk #4 FAILED at 868.
Hunk #5 FAILED at 900.
Hunk #6 FAILED at 924.
Hunk #7 succeeded at 1536 (offset -38 lines).
Hunk #8 FAILED at 2386.
Hunk #9 FAILED at 2920.
Hunk #10 succeeded at 2940 (offset -46 lines).
Hunk #11 FAILED at 2998.
8 out of 11 hunks FAILED
checking file src/rsn_supp/wpa_i.h
Hunk #1 FAILED at 32.
1 out of 1 hunk FAILED
checking file src/common/wpa_common.h
Hunk #1 succeeded at 215 with fuzz 1.
checking file src/rsn_supp/wpa.c
checking file src/rsn_supp/wpa_i.h
checking file src/ap/wpa_auth.c
Hunk #1 succeeded at 1898 (offset -3 lines).
Hunk #2 succeeded at 2470 (offset -3 lines).
checking file src/rsn_supp/tdls.c
checking file src/rsn_supp/wpa.c
Hunk #1 succeeded at 2378 (offset -62 lines).
checking file src/rsn_supp/wpa_ft.c
checking file src/rsn_supp/wpa_i.h
Hunk #1 succeeded at 123 (offset -5 lines).

So split the key-replay-cve-multiple.patch to 7 patches.

Signed-off-by: Zheng Ruoqin <zhengrq.fnst@cn.fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
(cherry picked from commit 543bb9c)
Signed-off-by: Armin Kuster <akuster808@gmail.com>
jpuhlman pushed a commit to MontaVista-OpenSourceTechnology/meta-openembedded that referenced this issue Jun 26, 2018
Source: meta-openembedded
MR: 00000
Type: Integration
Disposition: Merged from meta-openembedded
ChangeID: 49f937b
Description:

When switch PATCHTOOL to patch, the key-replay-cve-multiple.patch can't
be apply with "--dry-run" as follows:

checking file src/ap/ieee802_11.c
checking file src/ap/wpa_auth.c
checking file src/ap/wpa_auth.h
checking file src/ap/wpa_auth_ft.c
checking file src/ap/wpa_auth_i.h
checking file src/common/wpa_common.h
checking file src/rsn_supp/wpa.c
checking file src/rsn_supp/wpa_i.h
checking file src/rsn_supp/wpa.c
Hunk openembedded#1 FAILED at 709.
Hunk openembedded#2 FAILED at 757.
Hunk openembedded#3 succeeded at 840 (offset -12 lines).
Hunk openembedded#4 FAILED at 868.
Hunk openembedded#5 FAILED at 900.
Hunk openembedded#6 FAILED at 924.
Hunk openembedded#7 succeeded at 1536 (offset -38 lines).
Hunk openembedded#8 FAILED at 2386.
Hunk openembedded#9 FAILED at 2920.
Hunk openembedded#10 succeeded at 2940 (offset -46 lines).
Hunk openembedded#11 FAILED at 2998.
8 out of 11 hunks FAILED
checking file src/rsn_supp/wpa_i.h
Hunk openembedded#1 FAILED at 32.
1 out of 1 hunk FAILED
checking file src/common/wpa_common.h
Hunk openembedded#1 succeeded at 215 with fuzz 1.
checking file src/rsn_supp/wpa.c
checking file src/rsn_supp/wpa_i.h
checking file src/ap/wpa_auth.c
Hunk openembedded#1 succeeded at 1898 (offset -3 lines).
Hunk openembedded#2 succeeded at 2470 (offset -3 lines).
checking file src/rsn_supp/tdls.c
checking file src/rsn_supp/wpa.c
Hunk openembedded#1 succeeded at 2378 (offset -62 lines).
checking file src/rsn_supp/wpa_ft.c
checking file src/rsn_supp/wpa_i.h
Hunk openembedded#1 succeeded at 123 (offset -5 lines).

So split the key-replay-cve-multiple.patch to 7 patches.

Signed-off-by: Zheng Ruoqin <zhengrq.fnst@cn.fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
(cherry picked from commit 543bb9c)
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Signed-off-by: Jeremy Puhlman <jpuhlman@mvista.com>
kraj pushed a commit to YoeDistro/meta-openembedded that referenced this issue Jun 13, 2019
* Add EXTRA_CPANFLAGS to fix "undefined symbol: RAND_seed"
* Add DEPENDS on libcrypt-openssl-guess-perl-native
* Add runtime and ptest dependencies

Upstream release notes:
0.15  2018-04-22 rurban
        - fix mingw hints for pkg-config support (akiym, PR openembedded#7)

0.14  2018-04-17 rurban
        - add library paths to LIBS from Crypt::OpenSSL::Guess (akiym, PR openembedded#6)

0.13  2018-04-14 rurban
        - move Crypt::OpenSSL::Guess to configure dependency. (grinnz, PR openembedded#4)

0.12  2018-04-13 rurban
        - use Crypt::OpenSSL::Guess to resolve OpenSSL include path,
          fixes MacOS's homebrew OpenSSL installation problem. (akiym, PR openembedded#3)

Signed-off-by: Tim Orling <timothy.t.orling@linux.intel.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
kraj pushed a commit to YoeDistro/meta-openembedded that referenced this issue Jun 13, 2019
* Add EXTRA_CPANFLAGS to fix "undefined symbol: RAND_seed"
* Add DEPENDS on libcrypt-openssl-guess-perl-native
* Add runtime and ptest dependencies

Upstream release notes:
0.15  2018-04-22 rurban
        - fix mingw hints for pkg-config support (akiym, PR openembedded#7)

0.14  2018-04-17 rurban
        - add library paths to LIBS from Crypt::OpenSSL::Guess (akiym, PR openembedded#6)

0.13  2018-04-14 rurban
        - move Crypt::OpenSSL::Guess to configure dependency. (grinnz, PR openembedded#4)

0.12  2018-04-13 rurban
        - use Crypt::OpenSSL::Guess to resolve OpenSSL include path,
          fixes MacOS's homebrew OpenSSL installation problem. (akiym, PR openembedded#3)

Signed-off-by: Tim Orling <timothy.t.orling@linux.intel.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
kraj pushed a commit to YoeDistro/meta-openembedded that referenced this issue Jun 14, 2019
* Add EXTRA_CPANFLAGS to fix "undefined symbol: RAND_seed"
* Add DEPENDS on libcrypt-openssl-guess-perl-native
* Add runtime and ptest dependencies

Upstream release notes:
0.15  2018-04-22 rurban
        - fix mingw hints for pkg-config support (akiym, PR openembedded#7)

0.14  2018-04-17 rurban
        - add library paths to LIBS from Crypt::OpenSSL::Guess (akiym, PR openembedded#6)

0.13  2018-04-14 rurban
        - move Crypt::OpenSSL::Guess to configure dependency. (grinnz, PR openembedded#4)

0.12  2018-04-13 rurban
        - use Crypt::OpenSSL::Guess to resolve OpenSSL include path,
          fixes MacOS's homebrew OpenSSL installation problem. (akiym, PR openembedded#3)

Signed-off-by: Tim Orling <timothy.t.orling@linux.intel.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
kraj pushed a commit to YoeDistro/meta-openembedded that referenced this issue Jun 14, 2019
* Add EXTRA_CPANFLAGS to fix "undefined symbol: RAND_seed"
* Add DEPENDS on libcrypt-openssl-guess-perl-native
* Add runtime and ptest dependencies

Upstream release notes:
0.15  2018-04-22 rurban
        - fix mingw hints for pkg-config support (akiym, PR openembedded#7)

0.14  2018-04-17 rurban
        - add library paths to LIBS from Crypt::OpenSSL::Guess (akiym, PR openembedded#6)

0.13  2018-04-14 rurban
        - move Crypt::OpenSSL::Guess to configure dependency. (grinnz, PR openembedded#4)

0.12  2018-04-13 rurban
        - use Crypt::OpenSSL::Guess to resolve OpenSSL include path,
          fixes MacOS's homebrew OpenSSL installation problem. (akiym, PR openembedded#3)

Signed-off-by: Tim Orling <timothy.t.orling@linux.intel.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
kraj pushed a commit to YoeDistro/meta-openembedded that referenced this issue Jun 15, 2019
* Add EXTRA_CPANFLAGS to fix "undefined symbol: RAND_seed"
* Add DEPENDS on libcrypt-openssl-guess-perl-native
* Add runtime and ptest dependencies

Upstream release notes:
0.15  2018-04-22 rurban
        - fix mingw hints for pkg-config support (akiym, PR openembedded#7)

0.14  2018-04-17 rurban
        - add library paths to LIBS from Crypt::OpenSSL::Guess (akiym, PR openembedded#6)

0.13  2018-04-14 rurban
        - move Crypt::OpenSSL::Guess to configure dependency. (grinnz, PR openembedded#4)

0.12  2018-04-13 rurban
        - use Crypt::OpenSSL::Guess to resolve OpenSSL include path,
          fixes MacOS's homebrew OpenSSL installation problem. (akiym, PR openembedded#3)

Signed-off-by: Tim Orling <timothy.t.orling@linux.intel.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
jpuhlman pushed a commit to MontaVista-OpenSourceTechnology/meta-openembedded that referenced this issue Jun 28, 2019
Source: meta-openembedded
MR: 00000
Type: Integration
Disposition: Merged from meta-openembedded
ChangeID: b86d2d0
Description:

* Add EXTRA_CPANFLAGS to fix "undefined symbol: RAND_seed"
* Add DEPENDS on libcrypt-openssl-guess-perl-native
* Add runtime and ptest dependencies

Upstream release notes:
0.15  2018-04-22 rurban
        - fix mingw hints for pkg-config support (akiym, PR openembedded#7)

0.14  2018-04-17 rurban
        - add library paths to LIBS from Crypt::OpenSSL::Guess (akiym, PR openembedded#6)

0.13  2018-04-14 rurban
        - move Crypt::OpenSSL::Guess to configure dependency. (grinnz, PR openembedded#4)

0.12  2018-04-13 rurban
        - use Crypt::OpenSSL::Guess to resolve OpenSSL include path,
          fixes MacOS's homebrew OpenSSL installation problem. (akiym, PR openembedded#3)

Signed-off-by: Tim Orling <timothy.t.orling@linux.intel.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
Signed-off-by: Jeremy Puhlman <jpuhlman@mvista.com>
kraj pushed a commit to YoeDistro/meta-openembedded that referenced this issue Jun 2, 2020
Version 3.36.3

==============
- Fix enum type generation. (openembedded#52)

Version 3.36.2
==============
- Fix screensaver unlock problems. (openembedded#46)
- Fix few small memory leaks.
- Fix screenshot saving to clipboard. (openembedded#50)
- Active desktop icon rename with F2 key. (LP:#1875703)
- Fix creating new desktop icons. (LP:#1875317)
- Updated translations.

Version 3.36.1
==============
- Disable unimplemented icon placement modes. (openembedded#41)
- Fix lock screen button in end session dialog. (openembedded#43)
- Exclude Extensions application from menu. (openembedded#42)
- Fix visibility of input source button in lock screen. (openembedded#45)
- Do no close/destroy desktop window. (gnome-applets#15)
- Fix use after free in System Indicators. (gnome-panel#21)

Version 3.36.0
==============
- Save screenshot to clipboard when filename is empty.
- Show password box on key presses. (openembedded#36)
- Fix system indicators localisation. (openembedded#39)
- Fix build with gettext 0.20+. (!25)
- Add UsbProtection plugin to required components.
- Disable screen locking without PAM configuration file. (openembedded#38)
- Updated translations.

Version 3.35.2
==============
- Add Yaru as supported theme. (openembedded#31)
- Screensaver based on gnome-screensaver. (openembedded#18)
- Fix crash and memory leaks in notifications module.
- New system indicators applet for gnome-panel.
- Install gnome panel layout for GNOME Flashback session.
- Updated translations.

Version 3.35.1
==============
- Remove desktop-background module.
- Add root-background module, disabled by default.
- Add new desktop module for icons and background. (openembedded#7)
- Install compiz configuration. (!16)
- Add support for shift_caps_switch XKB option. (openembedded#24)

Signed-off-by: Andreas Müller <schnitzeltony@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
kraj pushed a commit to YoeDistro/meta-openembedded that referenced this issue Jun 2, 2020
Version 3.36.3

==============
- Fix enum type generation. (openembedded#52)

Version 3.36.2
==============
- Fix screensaver unlock problems. (openembedded#46)
- Fix few small memory leaks.
- Fix screenshot saving to clipboard. (openembedded#50)
- Active desktop icon rename with F2 key. (LP:#1875703)
- Fix creating new desktop icons. (LP:#1875317)
- Updated translations.

Version 3.36.1
==============
- Disable unimplemented icon placement modes. (openembedded#41)
- Fix lock screen button in end session dialog. (openembedded#43)
- Exclude Extensions application from menu. (openembedded#42)
- Fix visibility of input source button in lock screen. (openembedded#45)
- Do no close/destroy desktop window. (gnome-applets#15)
- Fix use after free in System Indicators. (gnome-panel#21)

Version 3.36.0
==============
- Save screenshot to clipboard when filename is empty.
- Show password box on key presses. (openembedded#36)
- Fix system indicators localisation. (openembedded#39)
- Fix build with gettext 0.20+. (!25)
- Add UsbProtection plugin to required components.
- Disable screen locking without PAM configuration file. (openembedded#38)
- Updated translations.

Version 3.35.2
==============
- Add Yaru as supported theme. (openembedded#31)
- Screensaver based on gnome-screensaver. (openembedded#18)
- Fix crash and memory leaks in notifications module.
- New system indicators applet for gnome-panel.
- Install gnome panel layout for GNOME Flashback session.
- Updated translations.

Version 3.35.1
==============
- Remove desktop-background module.
- Add root-background module, disabled by default.
- Add new desktop module for icons and background. (openembedded#7)
- Install compiz configuration. (!16)
- Add support for shift_caps_switch XKB option. (openembedded#24)

Signed-off-by: Andreas Müller <schnitzeltony@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
kraj pushed a commit to YoeDistro/meta-openembedded that referenced this issue Jun 2, 2020
Version 3.36.3

==============
- Fix enum type generation. (openembedded#52)

Version 3.36.2
==============
- Fix screensaver unlock problems. (openembedded#46)
- Fix few small memory leaks.
- Fix screenshot saving to clipboard. (openembedded#50)
- Active desktop icon rename with F2 key. (LP:#1875703)
- Fix creating new desktop icons. (LP:#1875317)
- Updated translations.

Version 3.36.1
==============
- Disable unimplemented icon placement modes. (openembedded#41)
- Fix lock screen button in end session dialog. (openembedded#43)
- Exclude Extensions application from menu. (openembedded#42)
- Fix visibility of input source button in lock screen. (openembedded#45)
- Do no close/destroy desktop window. (gnome-applets#15)
- Fix use after free in System Indicators. (gnome-panel#21)

Version 3.36.0
==============
- Save screenshot to clipboard when filename is empty.
- Show password box on key presses. (openembedded#36)
- Fix system indicators localisation. (openembedded#39)
- Fix build with gettext 0.20+. (!25)
- Add UsbProtection plugin to required components.
- Disable screen locking without PAM configuration file. (openembedded#38)
- Updated translations.

Version 3.35.2
==============
- Add Yaru as supported theme. (openembedded#31)
- Screensaver based on gnome-screensaver. (openembedded#18)
- Fix crash and memory leaks in notifications module.
- New system indicators applet for gnome-panel.
- Install gnome panel layout for GNOME Flashback session.
- Updated translations.

Version 3.35.1
==============
- Remove desktop-background module.
- Add root-background module, disabled by default.
- Add new desktop module for icons and background. (openembedded#7)
- Install compiz configuration. (!16)
- Add support for shift_caps_switch XKB option. (openembedded#24)

Signed-off-by: Andreas Müller <schnitzeltony@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
kraj pushed a commit to YoeDistro/meta-openembedded that referenced this issue Jun 3, 2020
Version 3.36.3

==============
- Fix enum type generation. (openembedded#52)

Version 3.36.2
==============
- Fix screensaver unlock problems. (openembedded#46)
- Fix few small memory leaks.
- Fix screenshot saving to clipboard. (openembedded#50)
- Active desktop icon rename with F2 key. (LP:#1875703)
- Fix creating new desktop icons. (LP:#1875317)
- Updated translations.

Version 3.36.1
==============
- Disable unimplemented icon placement modes. (openembedded#41)
- Fix lock screen button in end session dialog. (openembedded#43)
- Exclude Extensions application from menu. (openembedded#42)
- Fix visibility of input source button in lock screen. (openembedded#45)
- Do no close/destroy desktop window. (gnome-applets#15)
- Fix use after free in System Indicators. (gnome-panel#21)

Version 3.36.0
==============
- Save screenshot to clipboard when filename is empty.
- Show password box on key presses. (openembedded#36)
- Fix system indicators localisation. (openembedded#39)
- Fix build with gettext 0.20+. (!25)
- Add UsbProtection plugin to required components.
- Disable screen locking without PAM configuration file. (openembedded#38)
- Updated translations.

Version 3.35.2
==============
- Add Yaru as supported theme. (openembedded#31)
- Screensaver based on gnome-screensaver. (openembedded#18)
- Fix crash and memory leaks in notifications module.
- New system indicators applet for gnome-panel.
- Install gnome panel layout for GNOME Flashback session.
- Updated translations.

Version 3.35.1
==============
- Remove desktop-background module.
- Add root-background module, disabled by default.
- Add new desktop module for icons and background. (openembedded#7)
- Install compiz configuration. (!16)
- Add support for shift_caps_switch XKB option. (openembedded#24)

Signed-off-by: Andreas Müller <schnitzeltony@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
iipeace pushed a commit to iipeace/meta-openembedded that referenced this issue Jun 16, 2020
Version 3.36.3

==============
- Fix enum type generation. (openembedded#52)

Version 3.36.2
==============
- Fix screensaver unlock problems. (openembedded#46)
- Fix few small memory leaks.
- Fix screenshot saving to clipboard. (openembedded#50)
- Active desktop icon rename with F2 key. (LP:#1875703)
- Fix creating new desktop icons. (LP:#1875317)
- Updated translations.

Version 3.36.1
==============
- Disable unimplemented icon placement modes. (openembedded#41)
- Fix lock screen button in end session dialog. (openembedded#43)
- Exclude Extensions application from menu. (openembedded#42)
- Fix visibility of input source button in lock screen. (openembedded#45)
- Do no close/destroy desktop window. (gnome-applets#15)
- Fix use after free in System Indicators. (gnome-panel#21)

Version 3.36.0
==============
- Save screenshot to clipboard when filename is empty.
- Show password box on key presses. (openembedded#36)
- Fix system indicators localisation. (openembedded#39)
- Fix build with gettext 0.20+. (!25)
- Add UsbProtection plugin to required components.
- Disable screen locking without PAM configuration file. (openembedded#38)
- Updated translations.

Version 3.35.2
==============
- Add Yaru as supported theme. (openembedded#31)
- Screensaver based on gnome-screensaver. (openembedded#18)
- Fix crash and memory leaks in notifications module.
- New system indicators applet for gnome-panel.
- Install gnome panel layout for GNOME Flashback session.
- Updated translations.

Version 3.35.1
==============
- Remove desktop-background module.
- Add root-background module, disabled by default.
- Add new desktop module for icons and background. (openembedded#7)
- Install compiz configuration. (!16)
- Add support for shift_caps_switch XKB option. (openembedded#24)

Signed-off-by: Andreas Müller <schnitzeltony@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
kraj pushed a commit to YoeDistro/meta-openembedded that referenced this issue Jan 12, 2021
It builds out of tree fine now.

Release notes for 4.16.0

========================
- Fulltext now searches files with UTF-7, UTF-8, UTF-16 BE/LE, and
UTF-32 BE/LE encodings
- Replace Gtk/Gdk/GLib deprecated code (openembedded#6)
- Use "match all" method for fulltext search (openembedded#30)

Translation Updates:
Arabic, Basque, Belarusian, Danish, Estonian, Finnish, French,
Indonesian, Japanese, Kabyle, Norwegian Bokmål, Portuguese, Portuguese
(Brazil), Russian, Serbian, Slovak, Slovenian, Spanish, Swedish, Turkish

Release notes for 4.15.0
========================
[Please note that this is a development release.]

Disclaimer on the significant version bump (1.4.x to 4.15.x):
With this release, Catfish has started integrating Xfce components.
Going forward, Catfish's versioning scheme will reflect the target Xfce
release.

Dependency Changes:
- GTK >= 3.22
- GLib >= 2.42
- Python 2 support has been removed
- Python 3 >= 3.2 (openembedded#33)
- Xfconf >= 4.14.0 (requires GObject Introspection, see INSTALL)
- Zeitgeist optional dependency now requires GObject Introspection

New Features:
- Added Ctrl+H shortcut to show/hide hidden files (openembedded#16)
- Added "Today" and "Month" filters to the sidebar (openembedded#23)
- Fulltext searches now include more text files (openembedded#7)

General:
- New app icon, now using an rDNS icon name (org.xfce.catfish)
- Migrated ChangeLog to NEWS to better match Xfce projects
- Renamed README to README.md and updated to match Xfce projects
- Updated INSTALL to reference python3-specific packages (openembedded#36)
- Various in-app icon updates (openembedded#15, openembedded#17, openembedded#26)
- Added additional padding to Other and Custom gear icons (openembedded#20)

Bug Fixes:
- Check if zeitgeist daemon is running at startup (openembedded#34)
- Correctly position custom filter popups above gear icon (openembedded#18)
- Default to the current date in the custom date filters (openembedded#24)
- Fix 'list' object has no attribute 'lower' (openembedded#9)
- Fix fulltext freeze with special files (openembedded#32)
- Fix python crash when some extension scheme is used (openembedded#35)
- Fix statusbar moving on mouseover
- Move custom file extension hint to tooltip (openembedded#25)
- Sidebar entries no longer move when losing focus (openembedded#22)

Translation Updates:
Albanian, Arabic, Armenian (Armenia), Basque, Belarusian, Bulgarian,
Catalan, Chinese (China), Chinese (Taiwan), Croatian, Czech, Danish,
Dutch, Eastern Armenian, English (Australia), Estonian, Finnish, French,
Galician, German, Greek, Hebrew, Hungarian, Icelandic, Indonesian,
Interlingue, Italian, Japanese, Korean, Lithuanian, Malay, Norwegian
Bokmål, Norwegian Nynorsk, Polish, Portuguese, Portuguese (Brazil),
Russian, Serbian, Slovak, Slovenian, Spanish, Thai, Turkish, Ukrainian

Signed-off-by: Andreas Müller <schnitzeltony@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
kraj pushed a commit to YoeDistro/meta-openembedded that referenced this issue Jan 13, 2021
It builds out of tree fine now.

Release notes for 4.16.0

========================
- Fulltext now searches files with UTF-7, UTF-8, UTF-16 BE/LE, and
UTF-32 BE/LE encodings
- Replace Gtk/Gdk/GLib deprecated code (openembedded#6)
- Use "match all" method for fulltext search (openembedded#30)

Translation Updates:
Arabic, Basque, Belarusian, Danish, Estonian, Finnish, French,
Indonesian, Japanese, Kabyle, Norwegian Bokmål, Portuguese, Portuguese
(Brazil), Russian, Serbian, Slovak, Slovenian, Spanish, Swedish, Turkish

Release notes for 4.15.0
========================
[Please note that this is a development release.]

Disclaimer on the significant version bump (1.4.x to 4.15.x):
With this release, Catfish has started integrating Xfce components.
Going forward, Catfish's versioning scheme will reflect the target Xfce
release.

Dependency Changes:
- GTK >= 3.22
- GLib >= 2.42
- Python 2 support has been removed
- Python 3 >= 3.2 (openembedded#33)
- Xfconf >= 4.14.0 (requires GObject Introspection, see INSTALL)
- Zeitgeist optional dependency now requires GObject Introspection

New Features:
- Added Ctrl+H shortcut to show/hide hidden files (openembedded#16)
- Added "Today" and "Month" filters to the sidebar (openembedded#23)
- Fulltext searches now include more text files (openembedded#7)

General:
- New app icon, now using an rDNS icon name (org.xfce.catfish)
- Migrated ChangeLog to NEWS to better match Xfce projects
- Renamed README to README.md and updated to match Xfce projects
- Updated INSTALL to reference python3-specific packages (openembedded#36)
- Various in-app icon updates (openembedded#15, openembedded#17, openembedded#26)
- Added additional padding to Other and Custom gear icons (openembedded#20)

Bug Fixes:
- Check if zeitgeist daemon is running at startup (openembedded#34)
- Correctly position custom filter popups above gear icon (openembedded#18)
- Default to the current date in the custom date filters (openembedded#24)
- Fix 'list' object has no attribute 'lower' (openembedded#9)
- Fix fulltext freeze with special files (openembedded#32)
- Fix python crash when some extension scheme is used (openembedded#35)
- Fix statusbar moving on mouseover
- Move custom file extension hint to tooltip (openembedded#25)
- Sidebar entries no longer move when losing focus (openembedded#22)

Translation Updates:
Albanian, Arabic, Armenian (Armenia), Basque, Belarusian, Bulgarian,
Catalan, Chinese (China), Chinese (Taiwan), Croatian, Czech, Danish,
Dutch, Eastern Armenian, English (Australia), Estonian, Finnish, French,
Galician, German, Greek, Hebrew, Hungarian, Icelandic, Indonesian,
Interlingue, Italian, Japanese, Korean, Lithuanian, Malay, Norwegian
Bokmål, Norwegian Nynorsk, Polish, Portuguese, Portuguese (Brazil),
Russian, Serbian, Slovak, Slovenian, Spanish, Thai, Turkish, Ukrainian

Signed-off-by: Andreas Müller <schnitzeltony@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
schnitzeltony added a commit to schnitzeltony/meta-openembedded that referenced this issue Jan 14, 2021
It builds out of tree fine now.

Release notes for 4.16.0
========================
- Fulltext now searches files with UTF-7, UTF-8, UTF-16 BE/LE, and
UTF-32 BE/LE encodings
- Replace Gtk/Gdk/GLib deprecated code (openembedded#6)
- Use "match all" method for fulltext search (openembedded#30)

Translation Updates:
Arabic, Basque, Belarusian, Danish, Estonian, Finnish, French,
Indonesian, Japanese, Kabyle, Norwegian Bokmål, Portuguese, Portuguese
(Brazil), Russian, Serbian, Slovak, Slovenian, Spanish, Swedish, Turkish

Release notes for 4.15.0
========================
[Please note that this is a development release.]

Disclaimer on the significant version bump (1.4.x to 4.15.x):
With this release, Catfish has started integrating Xfce components.
Going forward, Catfish's versioning scheme will reflect the target Xfce
release.

Dependency Changes:
- GTK >= 3.22
- GLib >= 2.42
- Python 2 support has been removed
- Python 3 >= 3.2 (openembedded#33)
- Xfconf >= 4.14.0 (requires GObject Introspection, see INSTALL)
- Zeitgeist optional dependency now requires GObject Introspection

New Features:
- Added Ctrl+H shortcut to show/hide hidden files (openembedded#16)
- Added "Today" and "Month" filters to the sidebar (openembedded#23)
- Fulltext searches now include more text files (openembedded#7)

General:
- New app icon, now using an rDNS icon name (org.xfce.catfish)
- Migrated ChangeLog to NEWS to better match Xfce projects
- Renamed README to README.md and updated to match Xfce projects
- Updated INSTALL to reference python3-specific packages (openembedded#36)
- Various in-app icon updates (openembedded#15, openembedded#17, openembedded#26)
- Added additional padding to Other and Custom gear icons (openembedded#20)

Bug Fixes:
- Check if zeitgeist daemon is running at startup (openembedded#34)
- Correctly position custom filter popups above gear icon (openembedded#18)
- Default to the current date in the custom date filters (openembedded#24)
- Fix 'list' object has no attribute 'lower' (openembedded#9)
- Fix fulltext freeze with special files (openembedded#32)
- Fix python crash when some extension scheme is used (openembedded#35)
- Fix statusbar moving on mouseover
- Move custom file extension hint to tooltip (openembedded#25)
- Sidebar entries no longer move when losing focus (openembedded#22)

Translation Updates:
Albanian, Arabic, Armenian (Armenia), Basque, Belarusian, Bulgarian,
Catalan, Chinese (China), Chinese (Taiwan), Croatian, Czech, Danish,
Dutch, Eastern Armenian, English (Australia), Estonian, Finnish, French,
Galician, German, Greek, Hebrew, Hungarian, Icelandic, Indonesian,
Interlingue, Italian, Japanese, Korean, Lithuanian, Malay, Norwegian
Bokmål, Norwegian Nynorsk, Polish, Portuguese, Portuguese (Brazil),
Russian, Serbian, Slovak, Slovenian, Spanish, Thai, Turkish, Ukrainian

Signed-off-by: Andreas Müller <schnitzeltony@gmail.com>
schnitzeltony added a commit to schnitzeltony/meta-openembedded that referenced this issue Jan 14, 2021
It builds out of tree fine now.

Release notes for 4.16.0
========================
- Fulltext now searches files with UTF-7, UTF-8, UTF-16 BE/LE, and
UTF-32 BE/LE encodings
- Replace Gtk/Gdk/GLib deprecated code (openembedded#6)
- Use "match all" method for fulltext search (openembedded#30)

Translation Updates:
Arabic, Basque, Belarusian, Danish, Estonian, Finnish, French,
Indonesian, Japanese, Kabyle, Norwegian Bokmål, Portuguese, Portuguese
(Brazil), Russian, Serbian, Slovak, Slovenian, Spanish, Swedish, Turkish

Release notes for 4.15.0
========================
[Please note that this is a development release.]

Disclaimer on the significant version bump (1.4.x to 4.15.x):
With this release, Catfish has started integrating Xfce components.
Going forward, Catfish's versioning scheme will reflect the target Xfce
release.

Dependency Changes:
- GTK >= 3.22
- GLib >= 2.42
- Python 2 support has been removed
- Python 3 >= 3.2 (openembedded#33)
- Xfconf >= 4.14.0 (requires GObject Introspection, see INSTALL)
- Zeitgeist optional dependency now requires GObject Introspection

New Features:
- Added Ctrl+H shortcut to show/hide hidden files (openembedded#16)
- Added "Today" and "Month" filters to the sidebar (openembedded#23)
- Fulltext searches now include more text files (openembedded#7)

General:
- New app icon, now using an rDNS icon name (org.xfce.catfish)
- Migrated ChangeLog to NEWS to better match Xfce projects
- Renamed README to README.md and updated to match Xfce projects
- Updated INSTALL to reference python3-specific packages (openembedded#36)
- Various in-app icon updates (openembedded#15, openembedded#17, openembedded#26)
- Added additional padding to Other and Custom gear icons (openembedded#20)

Bug Fixes:
- Check if zeitgeist daemon is running at startup (openembedded#34)
- Correctly position custom filter popups above gear icon (openembedded#18)
- Default to the current date in the custom date filters (openembedded#24)
- Fix 'list' object has no attribute 'lower' (openembedded#9)
- Fix fulltext freeze with special files (openembedded#32)
- Fix python crash when some extension scheme is used (openembedded#35)
- Fix statusbar moving on mouseover
- Move custom file extension hint to tooltip (openembedded#25)
- Sidebar entries no longer move when losing focus (openembedded#22)

Translation Updates:
Albanian, Arabic, Armenian (Armenia), Basque, Belarusian, Bulgarian,
Catalan, Chinese (China), Chinese (Taiwan), Croatian, Czech, Danish,
Dutch, Eastern Armenian, English (Australia), Estonian, Finnish, French,
Galician, German, Greek, Hebrew, Hungarian, Icelandic, Indonesian,
Interlingue, Italian, Japanese, Korean, Lithuanian, Malay, Norwegian
Bokmål, Norwegian Nynorsk, Polish, Portuguese, Portuguese (Brazil),
Russian, Serbian, Slovak, Slovenian, Spanish, Thai, Turkish, Ukrainian

Signed-off-by: Andreas Müller <schnitzeltony@gmail.com>
schnitzeltony added a commit to schnitzeltony/meta-openembedded that referenced this issue Mar 7, 2021
Although not mentioned below and obstacles in the way,
0001-Makefile.in.in-remove-bashisms.patch made it upstream [1].

Release notes for 1.0.13
========================
New Features:
- Add Cupertino layout (openembedded#7)
- Add Redmond 7 layout (openembedded#8)
- Add Xfce 4.16 layout

General:
- Updated existing templates to support Xfce 4.16
- Makefile.in.in: remove bashisms
- Enabled exporting Whisker menu configuration (openembedded#11)

Updated translations

[1] https://gitlab.xfce.org/apps/xfce4-panel-profiles/-/commit/1565fe5f450732a82a76b828610fc935501584d0

Signed-off-by: Andreas Müller <schnitzeltony@gmail.com>
kraj pushed a commit to YoeDistro/meta-openembedded that referenced this issue Mar 8, 2021
Although not mentioned below and obstacles in the way,
0001-Makefile.in.in-remove-bashisms.patch made it upstream [1].

Release notes for 1.0.13
========================
New Features:
- Add Cupertino layout (openembedded#7)
- Add Redmond 7 layout (openembedded#8)
- Add Xfce 4.16 layout

General:
- Updated existing templates to support Xfce 4.16
- Makefile.in.in: remove bashisms
- Enabled exporting Whisker menu configuration (openembedded#11)

Updated translations

[1] https://gitlab.xfce.org/apps/xfce4-panel-profiles/-/commit/1565fe5f450732a82a76b828610fc935501584d0

Signed-off-by: Andreas Müller <schnitzeltony@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
halstead pushed a commit that referenced this issue Apr 7, 2021
* fixes:
WARNING: opencv-4.1.0-r0 do_patch: Fuzz detected:

Applying patch CVE-2019-14491.patch
patching file modules/objdetect/src/cascadedetect.cpp
Hunk #1 succeeded at 46 with fuzz 1 (offset -1 lines).
Hunk #2 succeeded at 540 (offset -1 lines).
Hunk #3 succeeded at 552 (offset -1 lines).
Hunk #4 succeeded at 613 (offset -1 lines).
Hunk #5 succeeded at 774 (offset -1 lines).
Hunk #6 succeeded at 825 (offset -1 lines).
Hunk #7 succeeded at 1470 (offset -36 lines).
patching file modules/objdetect/src/cascadedetect.hpp

The context lines in the patches can be updated with devtool:

    devtool modify opencv
    devtool finish --force-patch-refresh opencv <layer_path>

Don't forget to review changes done by devtool!

WARNING: opencv-4.1.0-r0 do_patch: QA Issue: Patch log indicates that patches do not apply cleanly. [patch-fuzz]

Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
jpuhlman pushed a commit to MontaVista-OpenSourceTechnology/meta-openembedded that referenced this issue Apr 8, 2021
Source: meta-openembedded
MR: 108246
Type: Integration
Disposition: Merged from meta-openembedded
ChangeID: 637967e
Description:

* fixes:
WARNING: opencv-4.1.0-r0 do_patch: Fuzz detected:

Applying patch CVE-2019-14491.patch
patching file modules/objdetect/src/cascadedetect.cpp
Hunk openembedded#1 succeeded at 46 with fuzz 1 (offset -1 lines).
Hunk openembedded#2 succeeded at 540 (offset -1 lines).
Hunk openembedded#3 succeeded at 552 (offset -1 lines).
Hunk openembedded#4 succeeded at 613 (offset -1 lines).
Hunk openembedded#5 succeeded at 774 (offset -1 lines).
Hunk openembedded#6 succeeded at 825 (offset -1 lines).
Hunk openembedded#7 succeeded at 1470 (offset -36 lines).
patching file modules/objdetect/src/cascadedetect.hpp

The context lines in the patches can be updated with devtool:

    devtool modify opencv
    devtool finish --force-patch-refresh opencv <layer_path>

Don't forget to review changes done by devtool!

WARNING: opencv-4.1.0-r0 do_patch: QA Issue: Patch log indicates that patches do not apply cleanly. [patch-fuzz]

Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Signed-off-by: Jeremy Puhlman <jpuhlman@mvista.com>
kraj pushed a commit to YoeDistro/meta-openembedded that referenced this issue Oct 31, 2022
Fix RDEPENDS, in particular perl-module-perlio-encoding and
perl-module-encode-encoding were needed to be able to open the database in
/usr/lib/perl5/5.36.0/vendor_perl/MIME/types.db... even though no
warnings or errors were reported.

bin/collect-types was dropped in 2.18

Upstream release notes:

version 2.22: Wed 27 Oct 16:54:38 CEST 2021

        Changes:
        - webm keeps on producting unexpected results [issue openembedded#11, Даша
	  Федорова]
        - iana updates

version 2.21: Fri 28 May 12:01:00 CEST 2021

        Changes:
        - application/octet-stream is better for .dat [issue openembedded#11, Даша
	  Федорова]
        - add video/webm which Google forgot to register [issue openembedded#12,
	  Brent Laabs]
        - add image/webp which Google registered too late [issue openembedded#12,
	  Brent Laabs]

version 2.20: Thu 22 Apr 12:48:35 CEST 2021

        Fixes:
        - problems with PAUSE cause the previous release to show-up in
          the wrong location.  Let's hope this release solves it.

        Changes:
        - heif/heic/heifs/heics/hif fix [issue openembedded#9, Даша Федорова]
        - no 'and' and 'or' extensions [issue openembedded#9, Даша Федорова]
        - application/octet-stream is better for .bin [issue openembedded#10, Даша
	  Федорова]

version 2.19: Fri 16 Apr 11:47:10 CEST 2021

        Improvements:
        - update with the newest data from IANA and Apache httpd

        Changes:
        - mp4 preference is video/mp4 [issue openembedded#5, Даша Федорова]
        - yt preference is video/vnd.youtube.yt [issue openembedded#6, Даша
	  Федорова]
        - 3gp and 3gpp preference is video/3gpp [issue openembedded#7, Даша
	  Федорова]

version 2.18: Wed  9 Dec 10:29:46 CET 2020

        Improvements:
        - update with newest data

        Changes:
        - Mojo 6.0 changed types() into mapping() [Dmitry Latin]
        - Mojo 7.94 adds experimental file_type()
        - Mojo 7.94 adds experimental content_type()

Signed-off-by: Tim Orling <tim.orling@konsulko.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
eigendude added a commit to eigendude/meta-openembedded that referenced this issue Apr 23, 2024
Update samba from Yocto Honister branch
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants