-
Notifications
You must be signed in to change notification settings - Fork 721
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
do_compile error with package mozjs #7
Comments
philb
pushed a commit
that referenced
this issue
Jul 8, 2015
the patch comes from: https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455 https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch The cleanup function in telnetd is called both directly and on SIGCHLD signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while running on a 2.6.31.11 kernel. What we were seeing is hangs like these: (gdb) bt #0 0xb7702424 in __kernel_vsyscall () #1 0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6 #2 0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6 #3 0xb767e6e0 in utmpname () from ./lib/libc.so.6 #4 0xb76bcde7 in logout () from ./lib/libutil.so.1 #5 0x0804c827 in cleanup () #6 <signal handler called> #7 0xb7702424 in __kernel_vsyscall () #8 0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6 #9 0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6 #10 0xb767d675 in getutline_r () from ./lib/libc.so.6 #11 0xb76bce42 in logout () from ./lib/libutil.so.1 #12 0x0804c827 in cleanup () #13 0x0804a0b5 in telnet () #14 0x0804a9c3 in main () and what has happened here is that the user closes the telnet session via the escape character. This causes telnetd to call cleanup in frame the SIGCHLD signal is delivered while telnetd is executing cleanup. Telnetd then calls the signal handler for SIGCHLD, which is cleanup(). Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the __libc_utmp_lock lock, and utmpname above does the same thing in frame The fix registers the SIGCHLD handler as cleanup_sighandler, and makes cleanup disable the SIGCHLD signal before calling cleanup_sighandler. Signed-off-by: Simon Kagstrom <[email protected]> Signed-off-by: Li Wang <[email protected]> Signed-off-by: Martin Jansa <[email protected]>
philb
pushed a commit
that referenced
this issue
Jul 15, 2015
the patch comes from: https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455 https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch The cleanup function in telnetd is called both directly and on SIGCHLD signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while running on a 2.6.31.11 kernel. What we were seeing is hangs like these: (gdb) bt #0 0xb7702424 in __kernel_vsyscall () #1 0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6 #2 0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6 #3 0xb767e6e0 in utmpname () from ./lib/libc.so.6 #4 0xb76bcde7 in logout () from ./lib/libutil.so.1 #5 0x0804c827 in cleanup () #6 <signal handler called> #7 0xb7702424 in __kernel_vsyscall () #8 0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6 #9 0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6 #10 0xb767d675 in getutline_r () from ./lib/libc.so.6 #11 0xb76bce42 in logout () from ./lib/libutil.so.1 #12 0x0804c827 in cleanup () #13 0x0804a0b5 in telnet () #14 0x0804a9c3 in main () and what has happened here is that the user closes the telnet session via the escape character. This causes telnetd to call cleanup in frame the SIGCHLD signal is delivered while telnetd is executing cleanup. Telnetd then calls the signal handler for SIGCHLD, which is cleanup(). Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the __libc_utmp_lock lock, and utmpname above does the same thing in frame The fix registers the SIGCHLD handler as cleanup_sighandler, and makes cleanup disable the SIGCHLD signal before calling cleanup_sighandler. Signed-off-by: Simon Kagstrom <[email protected]> Signed-off-by: Li Wang <[email protected]> Signed-off-by: Martin Jansa <[email protected]>
philb
pushed a commit
that referenced
this issue
Jul 15, 2015
the patch comes from: https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455 https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch The cleanup function in telnetd is called both directly and on SIGCHLD signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while running on a 2.6.31.11 kernel. What we were seeing is hangs like these: (gdb) bt #0 0xb7702424 in __kernel_vsyscall () #1 0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6 #2 0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6 #3 0xb767e6e0 in utmpname () from ./lib/libc.so.6 #4 0xb76bcde7 in logout () from ./lib/libutil.so.1 #5 0x0804c827 in cleanup () #6 <signal handler called> #7 0xb7702424 in __kernel_vsyscall () #8 0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6 #9 0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6 #10 0xb767d675 in getutline_r () from ./lib/libc.so.6 #11 0xb76bce42 in logout () from ./lib/libutil.so.1 #12 0x0804c827 in cleanup () #13 0x0804a0b5 in telnet () #14 0x0804a9c3 in main () and what has happened here is that the user closes the telnet session via the escape character. This causes telnetd to call cleanup in frame the SIGCHLD signal is delivered while telnetd is executing cleanup. Telnetd then calls the signal handler for SIGCHLD, which is cleanup(). Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the __libc_utmp_lock lock, and utmpname above does the same thing in frame The fix registers the SIGCHLD handler as cleanup_sighandler, and makes cleanup disable the SIGCHLD signal before calling cleanup_sighandler. Signed-off-by: Simon Kagstrom <[email protected]> Signed-off-by: Li Wang <[email protected]> Signed-off-by: Martin Jansa <[email protected]>
philb
pushed a commit
that referenced
this issue
Jul 16, 2015
the patch comes from: https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455 https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch The cleanup function in telnetd is called both directly and on SIGCHLD signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while running on a 2.6.31.11 kernel. What we were seeing is hangs like these: (gdb) bt #0 0xb7702424 in __kernel_vsyscall () #1 0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6 #2 0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6 #3 0xb767e6e0 in utmpname () from ./lib/libc.so.6 #4 0xb76bcde7 in logout () from ./lib/libutil.so.1 #5 0x0804c827 in cleanup () #6 <signal handler called> #7 0xb7702424 in __kernel_vsyscall () #8 0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6 #9 0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6 #10 0xb767d675 in getutline_r () from ./lib/libc.so.6 #11 0xb76bce42 in logout () from ./lib/libutil.so.1 #12 0x0804c827 in cleanup () #13 0x0804a0b5 in telnet () #14 0x0804a9c3 in main () and what has happened here is that the user closes the telnet session via the escape character. This causes telnetd to call cleanup in frame the SIGCHLD signal is delivered while telnetd is executing cleanup. Telnetd then calls the signal handler for SIGCHLD, which is cleanup(). Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the __libc_utmp_lock lock, and utmpname above does the same thing in frame The fix registers the SIGCHLD handler as cleanup_sighandler, and makes cleanup disable the SIGCHLD signal before calling cleanup_sighandler. Signed-off-by: Simon Kagstrom <[email protected]> Signed-off-by: Li Wang <[email protected]> Signed-off-by: Martin Jansa <[email protected]>
philb
pushed a commit
that referenced
this issue
Jul 27, 2015
the patch comes from: https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455 https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch The cleanup function in telnetd is called both directly and on SIGCHLD signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while running on a 2.6.31.11 kernel. What we were seeing is hangs like these: (gdb) bt #0 0xb7702424 in __kernel_vsyscall () #1 0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6 #2 0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6 #3 0xb767e6e0 in utmpname () from ./lib/libc.so.6 #4 0xb76bcde7 in logout () from ./lib/libutil.so.1 #5 0x0804c827 in cleanup () #6 <signal handler called> #7 0xb7702424 in __kernel_vsyscall () #8 0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6 #9 0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6 #10 0xb767d675 in getutline_r () from ./lib/libc.so.6 #11 0xb76bce42 in logout () from ./lib/libutil.so.1 #12 0x0804c827 in cleanup () #13 0x0804a0b5 in telnet () #14 0x0804a9c3 in main () and what has happened here is that the user closes the telnet session via the escape character. This causes telnetd to call cleanup in frame the SIGCHLD signal is delivered while telnetd is executing cleanup. Telnetd then calls the signal handler for SIGCHLD, which is cleanup(). Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the __libc_utmp_lock lock, and utmpname above does the same thing in frame The fix registers the SIGCHLD handler as cleanup_sighandler, and makes cleanup disable the SIGCHLD signal before calling cleanup_sighandler. Signed-off-by: Simon Kagstrom <[email protected]> Signed-off-by: Li Wang <[email protected]> Signed-off-by: Martin Jansa <[email protected]>
philb
pushed a commit
that referenced
this issue
Jul 29, 2015
the patch comes from: https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455 https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch The cleanup function in telnetd is called both directly and on SIGCHLD signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while running on a 2.6.31.11 kernel. What we were seeing is hangs like these: (gdb) bt #0 0xb7702424 in __kernel_vsyscall () #1 0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6 #2 0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6 #3 0xb767e6e0 in utmpname () from ./lib/libc.so.6 #4 0xb76bcde7 in logout () from ./lib/libutil.so.1 #5 0x0804c827 in cleanup () #6 <signal handler called> #7 0xb7702424 in __kernel_vsyscall () #8 0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6 #9 0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6 #10 0xb767d675 in getutline_r () from ./lib/libc.so.6 #11 0xb76bce42 in logout () from ./lib/libutil.so.1 #12 0x0804c827 in cleanup () #13 0x0804a0b5 in telnet () #14 0x0804a9c3 in main () and what has happened here is that the user closes the telnet session via the escape character. This causes telnetd to call cleanup in frame the SIGCHLD signal is delivered while telnetd is executing cleanup. Telnetd then calls the signal handler for SIGCHLD, which is cleanup(). Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the __libc_utmp_lock lock, and utmpname above does the same thing in frame The fix registers the SIGCHLD handler as cleanup_sighandler, and makes cleanup disable the SIGCHLD signal before calling cleanup_sighandler. Signed-off-by: Simon Kagstrom <[email protected]> Signed-off-by: Li Wang <[email protected]> Signed-off-by: Martin Jansa <[email protected]>
philb
pushed a commit
that referenced
this issue
Jul 30, 2015
the patch comes from: https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455 https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch The cleanup function in telnetd is called both directly and on SIGCHLD signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while running on a 2.6.31.11 kernel. What we were seeing is hangs like these: (gdb) bt #0 0xb7702424 in __kernel_vsyscall () #1 0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6 #2 0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6 #3 0xb767e6e0 in utmpname () from ./lib/libc.so.6 #4 0xb76bcde7 in logout () from ./lib/libutil.so.1 #5 0x0804c827 in cleanup () #6 <signal handler called> #7 0xb7702424 in __kernel_vsyscall () #8 0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6 #9 0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6 #10 0xb767d675 in getutline_r () from ./lib/libc.so.6 #11 0xb76bce42 in logout () from ./lib/libutil.so.1 #12 0x0804c827 in cleanup () #13 0x0804a0b5 in telnet () #14 0x0804a9c3 in main () and what has happened here is that the user closes the telnet session via the escape character. This causes telnetd to call cleanup in frame the SIGCHLD signal is delivered while telnetd is executing cleanup. Telnetd then calls the signal handler for SIGCHLD, which is cleanup(). Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the __libc_utmp_lock lock, and utmpname above does the same thing in frame The fix registers the SIGCHLD handler as cleanup_sighandler, and makes cleanup disable the SIGCHLD signal before calling cleanup_sighandler. Signed-off-by: Simon Kagstrom <[email protected]> Signed-off-by: Li Wang <[email protected]> Signed-off-by: Martin Jansa <[email protected]>
philb
pushed a commit
that referenced
this issue
Aug 3, 2015
the patch comes from: https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455 https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch The cleanup function in telnetd is called both directly and on SIGCHLD signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while running on a 2.6.31.11 kernel. What we were seeing is hangs like these: (gdb) bt #0 0xb7702424 in __kernel_vsyscall () #1 0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6 #2 0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6 #3 0xb767e6e0 in utmpname () from ./lib/libc.so.6 #4 0xb76bcde7 in logout () from ./lib/libutil.so.1 #5 0x0804c827 in cleanup () #6 <signal handler called> #7 0xb7702424 in __kernel_vsyscall () #8 0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6 #9 0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6 #10 0xb767d675 in getutline_r () from ./lib/libc.so.6 #11 0xb76bce42 in logout () from ./lib/libutil.so.1 #12 0x0804c827 in cleanup () #13 0x0804a0b5 in telnet () #14 0x0804a9c3 in main () and what has happened here is that the user closes the telnet session via the escape character. This causes telnetd to call cleanup in frame the SIGCHLD signal is delivered while telnetd is executing cleanup. Telnetd then calls the signal handler for SIGCHLD, which is cleanup(). Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the __libc_utmp_lock lock, and utmpname above does the same thing in frame The fix registers the SIGCHLD handler as cleanup_sighandler, and makes cleanup disable the SIGCHLD signal before calling cleanup_sighandler. Signed-off-by: Simon Kagstrom <[email protected]> Signed-off-by: Li Wang <[email protected]> Signed-off-by: Martin Jansa <[email protected]>
philb
pushed a commit
that referenced
this issue
Aug 17, 2015
the patch comes from: https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455 https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch The cleanup function in telnetd is called both directly and on SIGCHLD signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while running on a 2.6.31.11 kernel. What we were seeing is hangs like these: (gdb) bt #0 0xb7702424 in __kernel_vsyscall () #1 0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6 #2 0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6 #3 0xb767e6e0 in utmpname () from ./lib/libc.so.6 #4 0xb76bcde7 in logout () from ./lib/libutil.so.1 #5 0x0804c827 in cleanup () #6 <signal handler called> #7 0xb7702424 in __kernel_vsyscall () #8 0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6 #9 0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6 #10 0xb767d675 in getutline_r () from ./lib/libc.so.6 #11 0xb76bce42 in logout () from ./lib/libutil.so.1 #12 0x0804c827 in cleanup () #13 0x0804a0b5 in telnet () #14 0x0804a9c3 in main () and what has happened here is that the user closes the telnet session via the escape character. This causes telnetd to call cleanup in frame the SIGCHLD signal is delivered while telnetd is executing cleanup. Telnetd then calls the signal handler for SIGCHLD, which is cleanup(). Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the __libc_utmp_lock lock, and utmpname above does the same thing in frame The fix registers the SIGCHLD handler as cleanup_sighandler, and makes cleanup disable the SIGCHLD signal before calling cleanup_sighandler. Signed-off-by: Simon Kagstrom <[email protected]> Signed-off-by: Li Wang <[email protected]> Signed-off-by: Martin Jansa <[email protected]>
philb
pushed a commit
that referenced
this issue
Aug 18, 2015
the patch comes from: https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455 https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch The cleanup function in telnetd is called both directly and on SIGCHLD signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while running on a 2.6.31.11 kernel. What we were seeing is hangs like these: (gdb) bt #0 0xb7702424 in __kernel_vsyscall () #1 0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6 #2 0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6 #3 0xb767e6e0 in utmpname () from ./lib/libc.so.6 #4 0xb76bcde7 in logout () from ./lib/libutil.so.1 #5 0x0804c827 in cleanup () #6 <signal handler called> #7 0xb7702424 in __kernel_vsyscall () #8 0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6 #9 0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6 #10 0xb767d675 in getutline_r () from ./lib/libc.so.6 #11 0xb76bce42 in logout () from ./lib/libutil.so.1 #12 0x0804c827 in cleanup () #13 0x0804a0b5 in telnet () #14 0x0804a9c3 in main () and what has happened here is that the user closes the telnet session via the escape character. This causes telnetd to call cleanup in frame the SIGCHLD signal is delivered while telnetd is executing cleanup. Telnetd then calls the signal handler for SIGCHLD, which is cleanup(). Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the __libc_utmp_lock lock, and utmpname above does the same thing in frame The fix registers the SIGCHLD handler as cleanup_sighandler, and makes cleanup disable the SIGCHLD signal before calling cleanup_sighandler. Signed-off-by: Simon Kagstrom <[email protected]> Signed-off-by: Li Wang <[email protected]> Signed-off-by: Martin Jansa <[email protected]>
philb
pushed a commit
that referenced
this issue
Aug 18, 2015
the patch comes from: https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455 https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch The cleanup function in telnetd is called both directly and on SIGCHLD signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while running on a 2.6.31.11 kernel. What we were seeing is hangs like these: (gdb) bt #0 0xb7702424 in __kernel_vsyscall () #1 0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6 #2 0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6 #3 0xb767e6e0 in utmpname () from ./lib/libc.so.6 #4 0xb76bcde7 in logout () from ./lib/libutil.so.1 #5 0x0804c827 in cleanup () #6 <signal handler called> #7 0xb7702424 in __kernel_vsyscall () #8 0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6 #9 0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6 #10 0xb767d675 in getutline_r () from ./lib/libc.so.6 #11 0xb76bce42 in logout () from ./lib/libutil.so.1 #12 0x0804c827 in cleanup () #13 0x0804a0b5 in telnet () #14 0x0804a9c3 in main () and what has happened here is that the user closes the telnet session via the escape character. This causes telnetd to call cleanup in frame the SIGCHLD signal is delivered while telnetd is executing cleanup. Telnetd then calls the signal handler for SIGCHLD, which is cleanup(). Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the __libc_utmp_lock lock, and utmpname above does the same thing in frame The fix registers the SIGCHLD handler as cleanup_sighandler, and makes cleanup disable the SIGCHLD signal before calling cleanup_sighandler. Signed-off-by: Simon Kagstrom <[email protected]> Signed-off-by: Li Wang <[email protected]> Signed-off-by: Martin Jansa <[email protected]>
philb
pushed a commit
that referenced
this issue
Aug 20, 2015
the patch comes from: https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455 https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch The cleanup function in telnetd is called both directly and on SIGCHLD signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while running on a 2.6.31.11 kernel. What we were seeing is hangs like these: (gdb) bt #0 0xb7702424 in __kernel_vsyscall () #1 0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6 #2 0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6 #3 0xb767e6e0 in utmpname () from ./lib/libc.so.6 #4 0xb76bcde7 in logout () from ./lib/libutil.so.1 #5 0x0804c827 in cleanup () #6 <signal handler called> #7 0xb7702424 in __kernel_vsyscall () #8 0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6 #9 0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6 #10 0xb767d675 in getutline_r () from ./lib/libc.so.6 #11 0xb76bce42 in logout () from ./lib/libutil.so.1 #12 0x0804c827 in cleanup () #13 0x0804a0b5 in telnet () #14 0x0804a9c3 in main () and what has happened here is that the user closes the telnet session via the escape character. This causes telnetd to call cleanup in frame the SIGCHLD signal is delivered while telnetd is executing cleanup. Telnetd then calls the signal handler for SIGCHLD, which is cleanup(). Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the __libc_utmp_lock lock, and utmpname above does the same thing in frame The fix registers the SIGCHLD handler as cleanup_sighandler, and makes cleanup disable the SIGCHLD signal before calling cleanup_sighandler. Signed-off-by: Simon Kagstrom <[email protected]> Signed-off-by: Li Wang <[email protected]> Signed-off-by: Martin Jansa <[email protected]>
philb
pushed a commit
that referenced
this issue
Aug 24, 2015
the patch comes from: https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455 https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch The cleanup function in telnetd is called both directly and on SIGCHLD signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while running on a 2.6.31.11 kernel. What we were seeing is hangs like these: (gdb) bt #0 0xb7702424 in __kernel_vsyscall () #1 0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6 #2 0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6 #3 0xb767e6e0 in utmpname () from ./lib/libc.so.6 #4 0xb76bcde7 in logout () from ./lib/libutil.so.1 #5 0x0804c827 in cleanup () #6 <signal handler called> #7 0xb7702424 in __kernel_vsyscall () #8 0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6 #9 0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6 #10 0xb767d675 in getutline_r () from ./lib/libc.so.6 #11 0xb76bce42 in logout () from ./lib/libutil.so.1 #12 0x0804c827 in cleanup () #13 0x0804a0b5 in telnet () #14 0x0804a9c3 in main () and what has happened here is that the user closes the telnet session via the escape character. This causes telnetd to call cleanup in frame the SIGCHLD signal is delivered while telnetd is executing cleanup. Telnetd then calls the signal handler for SIGCHLD, which is cleanup(). Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the __libc_utmp_lock lock, and utmpname above does the same thing in frame The fix registers the SIGCHLD handler as cleanup_sighandler, and makes cleanup disable the SIGCHLD signal before calling cleanup_sighandler. Signed-off-by: Simon Kagstrom <[email protected]> Signed-off-by: Li Wang <[email protected]> Signed-off-by: Martin Jansa <[email protected]>
philb
pushed a commit
that referenced
this issue
Aug 24, 2015
the patch comes from: https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455 https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch The cleanup function in telnetd is called both directly and on SIGCHLD signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while running on a 2.6.31.11 kernel. What we were seeing is hangs like these: (gdb) bt #0 0xb7702424 in __kernel_vsyscall () #1 0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6 #2 0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6 #3 0xb767e6e0 in utmpname () from ./lib/libc.so.6 #4 0xb76bcde7 in logout () from ./lib/libutil.so.1 #5 0x0804c827 in cleanup () #6 <signal handler called> #7 0xb7702424 in __kernel_vsyscall () #8 0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6 #9 0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6 #10 0xb767d675 in getutline_r () from ./lib/libc.so.6 #11 0xb76bce42 in logout () from ./lib/libutil.so.1 #12 0x0804c827 in cleanup () #13 0x0804a0b5 in telnet () #14 0x0804a9c3 in main () and what has happened here is that the user closes the telnet session via the escape character. This causes telnetd to call cleanup in frame the SIGCHLD signal is delivered while telnetd is executing cleanup. Telnetd then calls the signal handler for SIGCHLD, which is cleanup(). Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the __libc_utmp_lock lock, and utmpname above does the same thing in frame The fix registers the SIGCHLD handler as cleanup_sighandler, and makes cleanup disable the SIGCHLD signal before calling cleanup_sighandler. Signed-off-by: Simon Kagstrom <[email protected]> Signed-off-by: Li Wang <[email protected]> Signed-off-by: Martin Jansa <[email protected]>
philb
pushed a commit
that referenced
this issue
Aug 27, 2015
the patch comes from: https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455 https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch The cleanup function in telnetd is called both directly and on SIGCHLD signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while running on a 2.6.31.11 kernel. What we were seeing is hangs like these: (gdb) bt #0 0xb7702424 in __kernel_vsyscall () #1 0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6 #2 0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6 #3 0xb767e6e0 in utmpname () from ./lib/libc.so.6 #4 0xb76bcde7 in logout () from ./lib/libutil.so.1 #5 0x0804c827 in cleanup () #6 <signal handler called> #7 0xb7702424 in __kernel_vsyscall () #8 0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6 #9 0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6 #10 0xb767d675 in getutline_r () from ./lib/libc.so.6 #11 0xb76bce42 in logout () from ./lib/libutil.so.1 #12 0x0804c827 in cleanup () #13 0x0804a0b5 in telnet () #14 0x0804a9c3 in main () and what has happened here is that the user closes the telnet session via the escape character. This causes telnetd to call cleanup in frame the SIGCHLD signal is delivered while telnetd is executing cleanup. Telnetd then calls the signal handler for SIGCHLD, which is cleanup(). Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the __libc_utmp_lock lock, and utmpname above does the same thing in frame The fix registers the SIGCHLD handler as cleanup_sighandler, and makes cleanup disable the SIGCHLD signal before calling cleanup_sighandler. Signed-off-by: Simon Kagstrom <[email protected]> Signed-off-by: Li Wang <[email protected]> Signed-off-by: Martin Jansa <[email protected]>
philb
pushed a commit
that referenced
this issue
Aug 31, 2015
the patch comes from: https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455 https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch The cleanup function in telnetd is called both directly and on SIGCHLD signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while running on a 2.6.31.11 kernel. What we were seeing is hangs like these: (gdb) bt #0 0xb7702424 in __kernel_vsyscall () #1 0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6 #2 0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6 #3 0xb767e6e0 in utmpname () from ./lib/libc.so.6 #4 0xb76bcde7 in logout () from ./lib/libutil.so.1 #5 0x0804c827 in cleanup () #6 <signal handler called> #7 0xb7702424 in __kernel_vsyscall () #8 0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6 #9 0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6 #10 0xb767d675 in getutline_r () from ./lib/libc.so.6 #11 0xb76bce42 in logout () from ./lib/libutil.so.1 #12 0x0804c827 in cleanup () #13 0x0804a0b5 in telnet () #14 0x0804a9c3 in main () and what has happened here is that the user closes the telnet session via the escape character. This causes telnetd to call cleanup in frame the SIGCHLD signal is delivered while telnetd is executing cleanup. Telnetd then calls the signal handler for SIGCHLD, which is cleanup(). Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the __libc_utmp_lock lock, and utmpname above does the same thing in frame The fix registers the SIGCHLD handler as cleanup_sighandler, and makes cleanup disable the SIGCHLD signal before calling cleanup_sighandler. Signed-off-by: Simon Kagstrom <[email protected]> Signed-off-by: Li Wang <[email protected]> Signed-off-by: Martin Jansa <[email protected]>
philb
pushed a commit
that referenced
this issue
Sep 14, 2015
the patch comes from: https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455 https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch The cleanup function in telnetd is called both directly and on SIGCHLD signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while running on a 2.6.31.11 kernel. What we were seeing is hangs like these: (gdb) bt #0 0xb7702424 in __kernel_vsyscall () #1 0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6 #2 0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6 #3 0xb767e6e0 in utmpname () from ./lib/libc.so.6 #4 0xb76bcde7 in logout () from ./lib/libutil.so.1 #5 0x0804c827 in cleanup () #6 <signal handler called> #7 0xb7702424 in __kernel_vsyscall () #8 0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6 #9 0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6 #10 0xb767d675 in getutline_r () from ./lib/libc.so.6 #11 0xb76bce42 in logout () from ./lib/libutil.so.1 #12 0x0804c827 in cleanup () #13 0x0804a0b5 in telnet () #14 0x0804a9c3 in main () and what has happened here is that the user closes the telnet session via the escape character. This causes telnetd to call cleanup in frame the SIGCHLD signal is delivered while telnetd is executing cleanup. Telnetd then calls the signal handler for SIGCHLD, which is cleanup(). Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the __libc_utmp_lock lock, and utmpname above does the same thing in frame The fix registers the SIGCHLD handler as cleanup_sighandler, and makes cleanup disable the SIGCHLD signal before calling cleanup_sighandler. Signed-off-by: Simon Kagstrom <[email protected]> Signed-off-by: Li Wang <[email protected]> Signed-off-by: Martin Jansa <[email protected]>
We don't use github.com for tracking issues. If the issue is still valid, then send a patch to [email protected] |
halstead
pushed a commit
that referenced
this issue
Apr 13, 2018
WARNING: hddtemp-0.3-beta15-r1 do_patch: Some of the context lines in patches were ignored. This can lead to incorrectly applied patches. The context lines in the patches can be updated with devtool: devtool modify <recipe> devtool finish --force-patch-refresh <recipe> <layer_path> Then the updated patches and the source tree (in devtool's workspace) should be reviewed to make sure the patches apply in the correct place and don't introduce duplicate lines (which can, and does happen when some of the context is ignored). Further information: http://lists.openembedded.org/pipermail/openembedded-core/2018-March/148675.html https://bugzilla.yoctoproject.org/show_bug.cgi?id=10450 Details: Applying patch hddtemp_0.3-beta15-52.diff patching file doc/hddtemp.8 patching file po/fr.po patching file po/ru.po patching file po/sv.po patching file po/pt.po patching file po/de.po patching file po/LINGUAS patching file po/hddtemp.pot patching file src/sata.c patching file src/satacmds.c patching file src/backtrace.c patching file src/daemon.c patching file src/hddtemp.c Hunk #5 succeeded at 268 with fuzz 2 (offset 4 lines). Hunk #6 succeeded at 283 (offset 4 lines). Hunk #7 succeeded at 295 (offset 4 lines). Hunk #8 succeeded at 372 (offset 4 lines). Hunk #9 succeeded at 409 (offset 4 lines). Hunk #10 succeeded at 483 (offset 4 lines). Hunk #11 succeeded at 496 (offset 4 lines). Hunk #12 succeeded at 510 (offset 4 lines). Hunk #13 succeeded at 532 (offset 4 lines). patching file src/ata.c patching file src/hddtemp.h patching file src/scsicmds.c Now at patch hddtemp_0.3-beta15-52.diff Signed-off-by: Armin Kuster <[email protected]>
kraj
pushed a commit
to kraj/meta-openembedded
that referenced
this issue
May 29, 2018
When switch PATCHTOOL to patch, the key-replay-cve-multiple.patch can't be apply with "--dry-run" as follows: checking file src/ap/ieee802_11.c checking file src/ap/wpa_auth.c checking file src/ap/wpa_auth.h checking file src/ap/wpa_auth_ft.c checking file src/ap/wpa_auth_i.h checking file src/common/wpa_common.h checking file src/rsn_supp/wpa.c checking file src/rsn_supp/wpa_i.h checking file src/rsn_supp/wpa.c Hunk openembedded#1 FAILED at 709. Hunk openembedded#2 FAILED at 757. Hunk openembedded#3 succeeded at 840 (offset -12 lines). Hunk openembedded#4 FAILED at 868. Hunk openembedded#5 FAILED at 900. Hunk openembedded#6 FAILED at 924. Hunk openembedded#7 succeeded at 1536 (offset -38 lines). Hunk openembedded#8 FAILED at 2386. Hunk openembedded#9 FAILED at 2920. Hunk openembedded#10 succeeded at 2940 (offset -46 lines). Hunk openembedded#11 FAILED at 2998. 8 out of 11 hunks FAILED checking file src/rsn_supp/wpa_i.h Hunk openembedded#1 FAILED at 32. 1 out of 1 hunk FAILED checking file src/common/wpa_common.h Hunk openembedded#1 succeeded at 215 with fuzz 1. checking file src/rsn_supp/wpa.c checking file src/rsn_supp/wpa_i.h checking file src/ap/wpa_auth.c Hunk openembedded#1 succeeded at 1898 (offset -3 lines). Hunk openembedded#2 succeeded at 2470 (offset -3 lines). checking file src/rsn_supp/tdls.c checking file src/rsn_supp/wpa.c Hunk openembedded#1 succeeded at 2378 (offset -62 lines). checking file src/rsn_supp/wpa_ft.c checking file src/rsn_supp/wpa_i.h Hunk openembedded#1 succeeded at 123 (offset -5 lines). So split the key-replay-cve-multiple.patch to 7 patches. Signed-off-by: Zheng Ruoqin <[email protected]> Signed-off-by: Khem Raj <[email protected]>
kraj
pushed a commit
to kraj/meta-openembedded
that referenced
this issue
May 29, 2018
When switch PATCHTOOL to patch, the key-replay-cve-multiple.patch can't be apply with "--dry-run" as follows: checking file src/ap/ieee802_11.c checking file src/ap/wpa_auth.c checking file src/ap/wpa_auth.h checking file src/ap/wpa_auth_ft.c checking file src/ap/wpa_auth_i.h checking file src/common/wpa_common.h checking file src/rsn_supp/wpa.c checking file src/rsn_supp/wpa_i.h checking file src/rsn_supp/wpa.c Hunk openembedded#1 FAILED at 709. Hunk openembedded#2 FAILED at 757. Hunk openembedded#3 succeeded at 840 (offset -12 lines). Hunk openembedded#4 FAILED at 868. Hunk openembedded#5 FAILED at 900. Hunk openembedded#6 FAILED at 924. Hunk openembedded#7 succeeded at 1536 (offset -38 lines). Hunk openembedded#8 FAILED at 2386. Hunk openembedded#9 FAILED at 2920. Hunk openembedded#10 succeeded at 2940 (offset -46 lines). Hunk openembedded#11 FAILED at 2998. 8 out of 11 hunks FAILED checking file src/rsn_supp/wpa_i.h Hunk openembedded#1 FAILED at 32. 1 out of 1 hunk FAILED checking file src/common/wpa_common.h Hunk openembedded#1 succeeded at 215 with fuzz 1. checking file src/rsn_supp/wpa.c checking file src/rsn_supp/wpa_i.h checking file src/ap/wpa_auth.c Hunk openembedded#1 succeeded at 1898 (offset -3 lines). Hunk openembedded#2 succeeded at 2470 (offset -3 lines). checking file src/rsn_supp/tdls.c checking file src/rsn_supp/wpa.c Hunk openembedded#1 succeeded at 2378 (offset -62 lines). checking file src/rsn_supp/wpa_ft.c checking file src/rsn_supp/wpa_i.h Hunk openembedded#1 succeeded at 123 (offset -5 lines). So split the key-replay-cve-multiple.patch to 7 patches. Signed-off-by: Zheng Ruoqin <[email protected]> Signed-off-by: Khem Raj <[email protected]>
kraj
pushed a commit
to kraj/meta-openembedded
that referenced
this issue
May 29, 2018
When switch PATCHTOOL to patch, the key-replay-cve-multiple.patch can't be apply with "--dry-run" as follows: checking file src/ap/ieee802_11.c checking file src/ap/wpa_auth.c checking file src/ap/wpa_auth.h checking file src/ap/wpa_auth_ft.c checking file src/ap/wpa_auth_i.h checking file src/common/wpa_common.h checking file src/rsn_supp/wpa.c checking file src/rsn_supp/wpa_i.h checking file src/rsn_supp/wpa.c Hunk openembedded#1 FAILED at 709. Hunk openembedded#2 FAILED at 757. Hunk openembedded#3 succeeded at 840 (offset -12 lines). Hunk openembedded#4 FAILED at 868. Hunk openembedded#5 FAILED at 900. Hunk openembedded#6 FAILED at 924. Hunk openembedded#7 succeeded at 1536 (offset -38 lines). Hunk openembedded#8 FAILED at 2386. Hunk openembedded#9 FAILED at 2920. Hunk openembedded#10 succeeded at 2940 (offset -46 lines). Hunk openembedded#11 FAILED at 2998. 8 out of 11 hunks FAILED checking file src/rsn_supp/wpa_i.h Hunk openembedded#1 FAILED at 32. 1 out of 1 hunk FAILED checking file src/common/wpa_common.h Hunk openembedded#1 succeeded at 215 with fuzz 1. checking file src/rsn_supp/wpa.c checking file src/rsn_supp/wpa_i.h checking file src/ap/wpa_auth.c Hunk openembedded#1 succeeded at 1898 (offset -3 lines). Hunk openembedded#2 succeeded at 2470 (offset -3 lines). checking file src/rsn_supp/tdls.c checking file src/rsn_supp/wpa.c Hunk openembedded#1 succeeded at 2378 (offset -62 lines). checking file src/rsn_supp/wpa_ft.c checking file src/rsn_supp/wpa_i.h Hunk openembedded#1 succeeded at 123 (offset -5 lines). So split the key-replay-cve-multiple.patch to 7 patches. Signed-off-by: Zheng Ruoqin <[email protected]> Signed-off-by: Khem Raj <[email protected]>
jpuhlman
pushed a commit
to MontaVista-OpenSourceTechnology/meta-openembedded
that referenced
this issue
Jun 13, 2018
Source: meta-openembedded MR: 00000 Type: Integration Disposition: Merged from meta-openembedded ChangeID: 543bb9c Description: When switch PATCHTOOL to patch, the key-replay-cve-multiple.patch can't be apply with "--dry-run" as follows: checking file src/ap/ieee802_11.c checking file src/ap/wpa_auth.c checking file src/ap/wpa_auth.h checking file src/ap/wpa_auth_ft.c checking file src/ap/wpa_auth_i.h checking file src/common/wpa_common.h checking file src/rsn_supp/wpa.c checking file src/rsn_supp/wpa_i.h checking file src/rsn_supp/wpa.c Hunk openembedded#1 FAILED at 709. Hunk openembedded#2 FAILED at 757. Hunk openembedded#3 succeeded at 840 (offset -12 lines). Hunk openembedded#4 FAILED at 868. Hunk openembedded#5 FAILED at 900. Hunk openembedded#6 FAILED at 924. Hunk openembedded#7 succeeded at 1536 (offset -38 lines). Hunk openembedded#8 FAILED at 2386. Hunk openembedded#9 FAILED at 2920. Hunk openembedded#10 succeeded at 2940 (offset -46 lines). Hunk openembedded#11 FAILED at 2998. 8 out of 11 hunks FAILED checking file src/rsn_supp/wpa_i.h Hunk openembedded#1 FAILED at 32. 1 out of 1 hunk FAILED checking file src/common/wpa_common.h Hunk openembedded#1 succeeded at 215 with fuzz 1. checking file src/rsn_supp/wpa.c checking file src/rsn_supp/wpa_i.h checking file src/ap/wpa_auth.c Hunk openembedded#1 succeeded at 1898 (offset -3 lines). Hunk openembedded#2 succeeded at 2470 (offset -3 lines). checking file src/rsn_supp/tdls.c checking file src/rsn_supp/wpa.c Hunk openembedded#1 succeeded at 2378 (offset -62 lines). checking file src/rsn_supp/wpa_ft.c checking file src/rsn_supp/wpa_i.h Hunk openembedded#1 succeeded at 123 (offset -5 lines). So split the key-replay-cve-multiple.patch to 7 patches. Signed-off-by: Zheng Ruoqin <[email protected]> Signed-off-by: Khem Raj <[email protected]> Signed-off-by: Jeremy Puhlman <[email protected]>
halstead
pushed a commit
that referenced
this issue
Jun 20, 2018
When switch PATCHTOOL to patch, the key-replay-cve-multiple.patch can't be apply with "--dry-run" as follows: checking file src/ap/ieee802_11.c checking file src/ap/wpa_auth.c checking file src/ap/wpa_auth.h checking file src/ap/wpa_auth_ft.c checking file src/ap/wpa_auth_i.h checking file src/common/wpa_common.h checking file src/rsn_supp/wpa.c checking file src/rsn_supp/wpa_i.h checking file src/rsn_supp/wpa.c Hunk #1 FAILED at 709. Hunk #2 FAILED at 757. Hunk #3 succeeded at 840 (offset -12 lines). Hunk #4 FAILED at 868. Hunk #5 FAILED at 900. Hunk #6 FAILED at 924. Hunk #7 succeeded at 1536 (offset -38 lines). Hunk #8 FAILED at 2386. Hunk #9 FAILED at 2920. Hunk #10 succeeded at 2940 (offset -46 lines). Hunk #11 FAILED at 2998. 8 out of 11 hunks FAILED checking file src/rsn_supp/wpa_i.h Hunk #1 FAILED at 32. 1 out of 1 hunk FAILED checking file src/common/wpa_common.h Hunk #1 succeeded at 215 with fuzz 1. checking file src/rsn_supp/wpa.c checking file src/rsn_supp/wpa_i.h checking file src/ap/wpa_auth.c Hunk #1 succeeded at 1898 (offset -3 lines). Hunk #2 succeeded at 2470 (offset -3 lines). checking file src/rsn_supp/tdls.c checking file src/rsn_supp/wpa.c Hunk #1 succeeded at 2378 (offset -62 lines). checking file src/rsn_supp/wpa_ft.c checking file src/rsn_supp/wpa_i.h Hunk #1 succeeded at 123 (offset -5 lines). So split the key-replay-cve-multiple.patch to 7 patches. Signed-off-by: Zheng Ruoqin <[email protected]> Signed-off-by: Khem Raj <[email protected]> (cherry picked from commit 543bb9c) Signed-off-by: Armin Kuster <[email protected]>
jpuhlman
pushed a commit
to MontaVista-OpenSourceTechnology/meta-openembedded
that referenced
this issue
Jun 26, 2018
Source: meta-openembedded MR: 00000 Type: Integration Disposition: Merged from meta-openembedded ChangeID: 49f937b Description: When switch PATCHTOOL to patch, the key-replay-cve-multiple.patch can't be apply with "--dry-run" as follows: checking file src/ap/ieee802_11.c checking file src/ap/wpa_auth.c checking file src/ap/wpa_auth.h checking file src/ap/wpa_auth_ft.c checking file src/ap/wpa_auth_i.h checking file src/common/wpa_common.h checking file src/rsn_supp/wpa.c checking file src/rsn_supp/wpa_i.h checking file src/rsn_supp/wpa.c Hunk openembedded#1 FAILED at 709. Hunk openembedded#2 FAILED at 757. Hunk openembedded#3 succeeded at 840 (offset -12 lines). Hunk openembedded#4 FAILED at 868. Hunk openembedded#5 FAILED at 900. Hunk openembedded#6 FAILED at 924. Hunk openembedded#7 succeeded at 1536 (offset -38 lines). Hunk openembedded#8 FAILED at 2386. Hunk openembedded#9 FAILED at 2920. Hunk openembedded#10 succeeded at 2940 (offset -46 lines). Hunk openembedded#11 FAILED at 2998. 8 out of 11 hunks FAILED checking file src/rsn_supp/wpa_i.h Hunk openembedded#1 FAILED at 32. 1 out of 1 hunk FAILED checking file src/common/wpa_common.h Hunk openembedded#1 succeeded at 215 with fuzz 1. checking file src/rsn_supp/wpa.c checking file src/rsn_supp/wpa_i.h checking file src/ap/wpa_auth.c Hunk openembedded#1 succeeded at 1898 (offset -3 lines). Hunk openembedded#2 succeeded at 2470 (offset -3 lines). checking file src/rsn_supp/tdls.c checking file src/rsn_supp/wpa.c Hunk openembedded#1 succeeded at 2378 (offset -62 lines). checking file src/rsn_supp/wpa_ft.c checking file src/rsn_supp/wpa_i.h Hunk openembedded#1 succeeded at 123 (offset -5 lines). So split the key-replay-cve-multiple.patch to 7 patches. Signed-off-by: Zheng Ruoqin <[email protected]> Signed-off-by: Khem Raj <[email protected]> (cherry picked from commit 543bb9c) Signed-off-by: Armin Kuster <[email protected]> Signed-off-by: Jeremy Puhlman <[email protected]>
kraj
pushed a commit
to YoeDistro/meta-openembedded
that referenced
this issue
Jun 13, 2019
* Add EXTRA_CPANFLAGS to fix "undefined symbol: RAND_seed" * Add DEPENDS on libcrypt-openssl-guess-perl-native * Add runtime and ptest dependencies Upstream release notes: 0.15 2018-04-22 rurban - fix mingw hints for pkg-config support (akiym, PR openembedded#7) 0.14 2018-04-17 rurban - add library paths to LIBS from Crypt::OpenSSL::Guess (akiym, PR openembedded#6) 0.13 2018-04-14 rurban - move Crypt::OpenSSL::Guess to configure dependency. (grinnz, PR openembedded#4) 0.12 2018-04-13 rurban - use Crypt::OpenSSL::Guess to resolve OpenSSL include path, fixes MacOS's homebrew OpenSSL installation problem. (akiym, PR openembedded#3) Signed-off-by: Tim Orling <[email protected]> Signed-off-by: Khem Raj <[email protected]>
kraj
pushed a commit
to YoeDistro/meta-openembedded
that referenced
this issue
Jun 13, 2019
* Add EXTRA_CPANFLAGS to fix "undefined symbol: RAND_seed" * Add DEPENDS on libcrypt-openssl-guess-perl-native * Add runtime and ptest dependencies Upstream release notes: 0.15 2018-04-22 rurban - fix mingw hints for pkg-config support (akiym, PR openembedded#7) 0.14 2018-04-17 rurban - add library paths to LIBS from Crypt::OpenSSL::Guess (akiym, PR openembedded#6) 0.13 2018-04-14 rurban - move Crypt::OpenSSL::Guess to configure dependency. (grinnz, PR openembedded#4) 0.12 2018-04-13 rurban - use Crypt::OpenSSL::Guess to resolve OpenSSL include path, fixes MacOS's homebrew OpenSSL installation problem. (akiym, PR openembedded#3) Signed-off-by: Tim Orling <[email protected]> Signed-off-by: Khem Raj <[email protected]>
kraj
pushed a commit
to YoeDistro/meta-openembedded
that referenced
this issue
Jun 14, 2019
* Add EXTRA_CPANFLAGS to fix "undefined symbol: RAND_seed" * Add DEPENDS on libcrypt-openssl-guess-perl-native * Add runtime and ptest dependencies Upstream release notes: 0.15 2018-04-22 rurban - fix mingw hints for pkg-config support (akiym, PR openembedded#7) 0.14 2018-04-17 rurban - add library paths to LIBS from Crypt::OpenSSL::Guess (akiym, PR openembedded#6) 0.13 2018-04-14 rurban - move Crypt::OpenSSL::Guess to configure dependency. (grinnz, PR openembedded#4) 0.12 2018-04-13 rurban - use Crypt::OpenSSL::Guess to resolve OpenSSL include path, fixes MacOS's homebrew OpenSSL installation problem. (akiym, PR openembedded#3) Signed-off-by: Tim Orling <[email protected]> Signed-off-by: Khem Raj <[email protected]>
kraj
pushed a commit
to YoeDistro/meta-openembedded
that referenced
this issue
Jun 14, 2019
* Add EXTRA_CPANFLAGS to fix "undefined symbol: RAND_seed" * Add DEPENDS on libcrypt-openssl-guess-perl-native * Add runtime and ptest dependencies Upstream release notes: 0.15 2018-04-22 rurban - fix mingw hints for pkg-config support (akiym, PR openembedded#7) 0.14 2018-04-17 rurban - add library paths to LIBS from Crypt::OpenSSL::Guess (akiym, PR openembedded#6) 0.13 2018-04-14 rurban - move Crypt::OpenSSL::Guess to configure dependency. (grinnz, PR openembedded#4) 0.12 2018-04-13 rurban - use Crypt::OpenSSL::Guess to resolve OpenSSL include path, fixes MacOS's homebrew OpenSSL installation problem. (akiym, PR openembedded#3) Signed-off-by: Tim Orling <[email protected]> Signed-off-by: Khem Raj <[email protected]>
kraj
pushed a commit
to YoeDistro/meta-openembedded
that referenced
this issue
Jun 15, 2019
* Add EXTRA_CPANFLAGS to fix "undefined symbol: RAND_seed" * Add DEPENDS on libcrypt-openssl-guess-perl-native * Add runtime and ptest dependencies Upstream release notes: 0.15 2018-04-22 rurban - fix mingw hints for pkg-config support (akiym, PR openembedded#7) 0.14 2018-04-17 rurban - add library paths to LIBS from Crypt::OpenSSL::Guess (akiym, PR openembedded#6) 0.13 2018-04-14 rurban - move Crypt::OpenSSL::Guess to configure dependency. (grinnz, PR openembedded#4) 0.12 2018-04-13 rurban - use Crypt::OpenSSL::Guess to resolve OpenSSL include path, fixes MacOS's homebrew OpenSSL installation problem. (akiym, PR openembedded#3) Signed-off-by: Tim Orling <[email protected]> Signed-off-by: Khem Raj <[email protected]>
jpuhlman
pushed a commit
to MontaVista-OpenSourceTechnology/meta-openembedded
that referenced
this issue
Jun 28, 2019
Source: meta-openembedded MR: 00000 Type: Integration Disposition: Merged from meta-openembedded ChangeID: b86d2d0 Description: * Add EXTRA_CPANFLAGS to fix "undefined symbol: RAND_seed" * Add DEPENDS on libcrypt-openssl-guess-perl-native * Add runtime and ptest dependencies Upstream release notes: 0.15 2018-04-22 rurban - fix mingw hints for pkg-config support (akiym, PR openembedded#7) 0.14 2018-04-17 rurban - add library paths to LIBS from Crypt::OpenSSL::Guess (akiym, PR openembedded#6) 0.13 2018-04-14 rurban - move Crypt::OpenSSL::Guess to configure dependency. (grinnz, PR openembedded#4) 0.12 2018-04-13 rurban - use Crypt::OpenSSL::Guess to resolve OpenSSL include path, fixes MacOS's homebrew OpenSSL installation problem. (akiym, PR openembedded#3) Signed-off-by: Tim Orling <[email protected]> Signed-off-by: Khem Raj <[email protected]> Signed-off-by: Jeremy Puhlman <[email protected]>
kraj
pushed a commit
to YoeDistro/meta-openembedded
that referenced
this issue
Jun 2, 2020
Version 3.36.3 ============== - Fix enum type generation. (openembedded#52) Version 3.36.2 ============== - Fix screensaver unlock problems. (openembedded#46) - Fix few small memory leaks. - Fix screenshot saving to clipboard. (openembedded#50) - Active desktop icon rename with F2 key. (LP:#1875703) - Fix creating new desktop icons. (LP:#1875317) - Updated translations. Version 3.36.1 ============== - Disable unimplemented icon placement modes. (openembedded#41) - Fix lock screen button in end session dialog. (openembedded#43) - Exclude Extensions application from menu. (openembedded#42) - Fix visibility of input source button in lock screen. (openembedded#45) - Do no close/destroy desktop window. (gnome-applets#15) - Fix use after free in System Indicators. (gnome-panel#21) Version 3.36.0 ============== - Save screenshot to clipboard when filename is empty. - Show password box on key presses. (openembedded#36) - Fix system indicators localisation. (openembedded#39) - Fix build with gettext 0.20+. (!25) - Add UsbProtection plugin to required components. - Disable screen locking without PAM configuration file. (openembedded#38) - Updated translations. Version 3.35.2 ============== - Add Yaru as supported theme. (openembedded#31) - Screensaver based on gnome-screensaver. (openembedded#18) - Fix crash and memory leaks in notifications module. - New system indicators applet for gnome-panel. - Install gnome panel layout for GNOME Flashback session. - Updated translations. Version 3.35.1 ============== - Remove desktop-background module. - Add root-background module, disabled by default. - Add new desktop module for icons and background. (openembedded#7) - Install compiz configuration. (!16) - Add support for shift_caps_switch XKB option. (openembedded#24) Signed-off-by: Andreas Müller <[email protected]> Signed-off-by: Khem Raj <[email protected]>
kraj
pushed a commit
to YoeDistro/meta-openembedded
that referenced
this issue
Jun 2, 2020
Version 3.36.3 ============== - Fix enum type generation. (openembedded#52) Version 3.36.2 ============== - Fix screensaver unlock problems. (openembedded#46) - Fix few small memory leaks. - Fix screenshot saving to clipboard. (openembedded#50) - Active desktop icon rename with F2 key. (LP:#1875703) - Fix creating new desktop icons. (LP:#1875317) - Updated translations. Version 3.36.1 ============== - Disable unimplemented icon placement modes. (openembedded#41) - Fix lock screen button in end session dialog. (openembedded#43) - Exclude Extensions application from menu. (openembedded#42) - Fix visibility of input source button in lock screen. (openembedded#45) - Do no close/destroy desktop window. (gnome-applets#15) - Fix use after free in System Indicators. (gnome-panel#21) Version 3.36.0 ============== - Save screenshot to clipboard when filename is empty. - Show password box on key presses. (openembedded#36) - Fix system indicators localisation. (openembedded#39) - Fix build with gettext 0.20+. (!25) - Add UsbProtection plugin to required components. - Disable screen locking without PAM configuration file. (openembedded#38) - Updated translations. Version 3.35.2 ============== - Add Yaru as supported theme. (openembedded#31) - Screensaver based on gnome-screensaver. (openembedded#18) - Fix crash and memory leaks in notifications module. - New system indicators applet for gnome-panel. - Install gnome panel layout for GNOME Flashback session. - Updated translations. Version 3.35.1 ============== - Remove desktop-background module. - Add root-background module, disabled by default. - Add new desktop module for icons and background. (openembedded#7) - Install compiz configuration. (!16) - Add support for shift_caps_switch XKB option. (openembedded#24) Signed-off-by: Andreas Müller <[email protected]> Signed-off-by: Khem Raj <[email protected]>
kraj
pushed a commit
to YoeDistro/meta-openembedded
that referenced
this issue
Jun 2, 2020
Version 3.36.3 ============== - Fix enum type generation. (openembedded#52) Version 3.36.2 ============== - Fix screensaver unlock problems. (openembedded#46) - Fix few small memory leaks. - Fix screenshot saving to clipboard. (openembedded#50) - Active desktop icon rename with F2 key. (LP:#1875703) - Fix creating new desktop icons. (LP:#1875317) - Updated translations. Version 3.36.1 ============== - Disable unimplemented icon placement modes. (openembedded#41) - Fix lock screen button in end session dialog. (openembedded#43) - Exclude Extensions application from menu. (openembedded#42) - Fix visibility of input source button in lock screen. (openembedded#45) - Do no close/destroy desktop window. (gnome-applets#15) - Fix use after free in System Indicators. (gnome-panel#21) Version 3.36.0 ============== - Save screenshot to clipboard when filename is empty. - Show password box on key presses. (openembedded#36) - Fix system indicators localisation. (openembedded#39) - Fix build with gettext 0.20+. (!25) - Add UsbProtection plugin to required components. - Disable screen locking without PAM configuration file. (openembedded#38) - Updated translations. Version 3.35.2 ============== - Add Yaru as supported theme. (openembedded#31) - Screensaver based on gnome-screensaver. (openembedded#18) - Fix crash and memory leaks in notifications module. - New system indicators applet for gnome-panel. - Install gnome panel layout for GNOME Flashback session. - Updated translations. Version 3.35.1 ============== - Remove desktop-background module. - Add root-background module, disabled by default. - Add new desktop module for icons and background. (openembedded#7) - Install compiz configuration. (!16) - Add support for shift_caps_switch XKB option. (openembedded#24) Signed-off-by: Andreas Müller <[email protected]> Signed-off-by: Khem Raj <[email protected]>
kraj
pushed a commit
to YoeDistro/meta-openembedded
that referenced
this issue
Jun 3, 2020
Version 3.36.3 ============== - Fix enum type generation. (openembedded#52) Version 3.36.2 ============== - Fix screensaver unlock problems. (openembedded#46) - Fix few small memory leaks. - Fix screenshot saving to clipboard. (openembedded#50) - Active desktop icon rename with F2 key. (LP:#1875703) - Fix creating new desktop icons. (LP:#1875317) - Updated translations. Version 3.36.1 ============== - Disable unimplemented icon placement modes. (openembedded#41) - Fix lock screen button in end session dialog. (openembedded#43) - Exclude Extensions application from menu. (openembedded#42) - Fix visibility of input source button in lock screen. (openembedded#45) - Do no close/destroy desktop window. (gnome-applets#15) - Fix use after free in System Indicators. (gnome-panel#21) Version 3.36.0 ============== - Save screenshot to clipboard when filename is empty. - Show password box on key presses. (openembedded#36) - Fix system indicators localisation. (openembedded#39) - Fix build with gettext 0.20+. (!25) - Add UsbProtection plugin to required components. - Disable screen locking without PAM configuration file. (openembedded#38) - Updated translations. Version 3.35.2 ============== - Add Yaru as supported theme. (openembedded#31) - Screensaver based on gnome-screensaver. (openembedded#18) - Fix crash and memory leaks in notifications module. - New system indicators applet for gnome-panel. - Install gnome panel layout for GNOME Flashback session. - Updated translations. Version 3.35.1 ============== - Remove desktop-background module. - Add root-background module, disabled by default. - Add new desktop module for icons and background. (openembedded#7) - Install compiz configuration. (!16) - Add support for shift_caps_switch XKB option. (openembedded#24) Signed-off-by: Andreas Müller <[email protected]> Signed-off-by: Khem Raj <[email protected]>
iipeace
pushed a commit
to iipeace/meta-openembedded
that referenced
this issue
Jun 16, 2020
Version 3.36.3 ============== - Fix enum type generation. (openembedded#52) Version 3.36.2 ============== - Fix screensaver unlock problems. (openembedded#46) - Fix few small memory leaks. - Fix screenshot saving to clipboard. (openembedded#50) - Active desktop icon rename with F2 key. (LP:#1875703) - Fix creating new desktop icons. (LP:#1875317) - Updated translations. Version 3.36.1 ============== - Disable unimplemented icon placement modes. (openembedded#41) - Fix lock screen button in end session dialog. (openembedded#43) - Exclude Extensions application from menu. (openembedded#42) - Fix visibility of input source button in lock screen. (openembedded#45) - Do no close/destroy desktop window. (gnome-applets#15) - Fix use after free in System Indicators. (gnome-panel#21) Version 3.36.0 ============== - Save screenshot to clipboard when filename is empty. - Show password box on key presses. (openembedded#36) - Fix system indicators localisation. (openembedded#39) - Fix build with gettext 0.20+. (!25) - Add UsbProtection plugin to required components. - Disable screen locking without PAM configuration file. (openembedded#38) - Updated translations. Version 3.35.2 ============== - Add Yaru as supported theme. (openembedded#31) - Screensaver based on gnome-screensaver. (openembedded#18) - Fix crash and memory leaks in notifications module. - New system indicators applet for gnome-panel. - Install gnome panel layout for GNOME Flashback session. - Updated translations. Version 3.35.1 ============== - Remove desktop-background module. - Add root-background module, disabled by default. - Add new desktop module for icons and background. (openembedded#7) - Install compiz configuration. (!16) - Add support for shift_caps_switch XKB option. (openembedded#24) Signed-off-by: Andreas Müller <[email protected]> Signed-off-by: Khem Raj <[email protected]>
kraj
pushed a commit
to YoeDistro/meta-openembedded
that referenced
this issue
Jan 12, 2021
It builds out of tree fine now. Release notes for 4.16.0 ======================== - Fulltext now searches files with UTF-7, UTF-8, UTF-16 BE/LE, and UTF-32 BE/LE encodings - Replace Gtk/Gdk/GLib deprecated code (openembedded#6) - Use "match all" method for fulltext search (openembedded#30) Translation Updates: Arabic, Basque, Belarusian, Danish, Estonian, Finnish, French, Indonesian, Japanese, Kabyle, Norwegian Bokmål, Portuguese, Portuguese (Brazil), Russian, Serbian, Slovak, Slovenian, Spanish, Swedish, Turkish Release notes for 4.15.0 ======================== [Please note that this is a development release.] Disclaimer on the significant version bump (1.4.x to 4.15.x): With this release, Catfish has started integrating Xfce components. Going forward, Catfish's versioning scheme will reflect the target Xfce release. Dependency Changes: - GTK >= 3.22 - GLib >= 2.42 - Python 2 support has been removed - Python 3 >= 3.2 (openembedded#33) - Xfconf >= 4.14.0 (requires GObject Introspection, see INSTALL) - Zeitgeist optional dependency now requires GObject Introspection New Features: - Added Ctrl+H shortcut to show/hide hidden files (openembedded#16) - Added "Today" and "Month" filters to the sidebar (openembedded#23) - Fulltext searches now include more text files (openembedded#7) General: - New app icon, now using an rDNS icon name (org.xfce.catfish) - Migrated ChangeLog to NEWS to better match Xfce projects - Renamed README to README.md and updated to match Xfce projects - Updated INSTALL to reference python3-specific packages (openembedded#36) - Various in-app icon updates (openembedded#15, openembedded#17, openembedded#26) - Added additional padding to Other and Custom gear icons (openembedded#20) Bug Fixes: - Check if zeitgeist daemon is running at startup (openembedded#34) - Correctly position custom filter popups above gear icon (openembedded#18) - Default to the current date in the custom date filters (openembedded#24) - Fix 'list' object has no attribute 'lower' (openembedded#9) - Fix fulltext freeze with special files (openembedded#32) - Fix python crash when some extension scheme is used (openembedded#35) - Fix statusbar moving on mouseover - Move custom file extension hint to tooltip (openembedded#25) - Sidebar entries no longer move when losing focus (openembedded#22) Translation Updates: Albanian, Arabic, Armenian (Armenia), Basque, Belarusian, Bulgarian, Catalan, Chinese (China), Chinese (Taiwan), Croatian, Czech, Danish, Dutch, Eastern Armenian, English (Australia), Estonian, Finnish, French, Galician, German, Greek, Hebrew, Hungarian, Icelandic, Indonesian, Interlingue, Italian, Japanese, Korean, Lithuanian, Malay, Norwegian Bokmål, Norwegian Nynorsk, Polish, Portuguese, Portuguese (Brazil), Russian, Serbian, Slovak, Slovenian, Spanish, Thai, Turkish, Ukrainian Signed-off-by: Andreas Müller <[email protected]> Signed-off-by: Khem Raj <[email protected]>
kraj
pushed a commit
to YoeDistro/meta-openembedded
that referenced
this issue
Jan 13, 2021
It builds out of tree fine now. Release notes for 4.16.0 ======================== - Fulltext now searches files with UTF-7, UTF-8, UTF-16 BE/LE, and UTF-32 BE/LE encodings - Replace Gtk/Gdk/GLib deprecated code (openembedded#6) - Use "match all" method for fulltext search (openembedded#30) Translation Updates: Arabic, Basque, Belarusian, Danish, Estonian, Finnish, French, Indonesian, Japanese, Kabyle, Norwegian Bokmål, Portuguese, Portuguese (Brazil), Russian, Serbian, Slovak, Slovenian, Spanish, Swedish, Turkish Release notes for 4.15.0 ======================== [Please note that this is a development release.] Disclaimer on the significant version bump (1.4.x to 4.15.x): With this release, Catfish has started integrating Xfce components. Going forward, Catfish's versioning scheme will reflect the target Xfce release. Dependency Changes: - GTK >= 3.22 - GLib >= 2.42 - Python 2 support has been removed - Python 3 >= 3.2 (openembedded#33) - Xfconf >= 4.14.0 (requires GObject Introspection, see INSTALL) - Zeitgeist optional dependency now requires GObject Introspection New Features: - Added Ctrl+H shortcut to show/hide hidden files (openembedded#16) - Added "Today" and "Month" filters to the sidebar (openembedded#23) - Fulltext searches now include more text files (openembedded#7) General: - New app icon, now using an rDNS icon name (org.xfce.catfish) - Migrated ChangeLog to NEWS to better match Xfce projects - Renamed README to README.md and updated to match Xfce projects - Updated INSTALL to reference python3-specific packages (openembedded#36) - Various in-app icon updates (openembedded#15, openembedded#17, openembedded#26) - Added additional padding to Other and Custom gear icons (openembedded#20) Bug Fixes: - Check if zeitgeist daemon is running at startup (openembedded#34) - Correctly position custom filter popups above gear icon (openembedded#18) - Default to the current date in the custom date filters (openembedded#24) - Fix 'list' object has no attribute 'lower' (openembedded#9) - Fix fulltext freeze with special files (openembedded#32) - Fix python crash when some extension scheme is used (openembedded#35) - Fix statusbar moving on mouseover - Move custom file extension hint to tooltip (openembedded#25) - Sidebar entries no longer move when losing focus (openembedded#22) Translation Updates: Albanian, Arabic, Armenian (Armenia), Basque, Belarusian, Bulgarian, Catalan, Chinese (China), Chinese (Taiwan), Croatian, Czech, Danish, Dutch, Eastern Armenian, English (Australia), Estonian, Finnish, French, Galician, German, Greek, Hebrew, Hungarian, Icelandic, Indonesian, Interlingue, Italian, Japanese, Korean, Lithuanian, Malay, Norwegian Bokmål, Norwegian Nynorsk, Polish, Portuguese, Portuguese (Brazil), Russian, Serbian, Slovak, Slovenian, Spanish, Thai, Turkish, Ukrainian Signed-off-by: Andreas Müller <[email protected]> Signed-off-by: Khem Raj <[email protected]>
schnitzeltony
added a commit
to schnitzeltony/meta-openembedded
that referenced
this issue
Jan 14, 2021
It builds out of tree fine now. Release notes for 4.16.0 ======================== - Fulltext now searches files with UTF-7, UTF-8, UTF-16 BE/LE, and UTF-32 BE/LE encodings - Replace Gtk/Gdk/GLib deprecated code (openembedded#6) - Use "match all" method for fulltext search (openembedded#30) Translation Updates: Arabic, Basque, Belarusian, Danish, Estonian, Finnish, French, Indonesian, Japanese, Kabyle, Norwegian Bokmål, Portuguese, Portuguese (Brazil), Russian, Serbian, Slovak, Slovenian, Spanish, Swedish, Turkish Release notes for 4.15.0 ======================== [Please note that this is a development release.] Disclaimer on the significant version bump (1.4.x to 4.15.x): With this release, Catfish has started integrating Xfce components. Going forward, Catfish's versioning scheme will reflect the target Xfce release. Dependency Changes: - GTK >= 3.22 - GLib >= 2.42 - Python 2 support has been removed - Python 3 >= 3.2 (openembedded#33) - Xfconf >= 4.14.0 (requires GObject Introspection, see INSTALL) - Zeitgeist optional dependency now requires GObject Introspection New Features: - Added Ctrl+H shortcut to show/hide hidden files (openembedded#16) - Added "Today" and "Month" filters to the sidebar (openembedded#23) - Fulltext searches now include more text files (openembedded#7) General: - New app icon, now using an rDNS icon name (org.xfce.catfish) - Migrated ChangeLog to NEWS to better match Xfce projects - Renamed README to README.md and updated to match Xfce projects - Updated INSTALL to reference python3-specific packages (openembedded#36) - Various in-app icon updates (openembedded#15, openembedded#17, openembedded#26) - Added additional padding to Other and Custom gear icons (openembedded#20) Bug Fixes: - Check if zeitgeist daemon is running at startup (openembedded#34) - Correctly position custom filter popups above gear icon (openembedded#18) - Default to the current date in the custom date filters (openembedded#24) - Fix 'list' object has no attribute 'lower' (openembedded#9) - Fix fulltext freeze with special files (openembedded#32) - Fix python crash when some extension scheme is used (openembedded#35) - Fix statusbar moving on mouseover - Move custom file extension hint to tooltip (openembedded#25) - Sidebar entries no longer move when losing focus (openembedded#22) Translation Updates: Albanian, Arabic, Armenian (Armenia), Basque, Belarusian, Bulgarian, Catalan, Chinese (China), Chinese (Taiwan), Croatian, Czech, Danish, Dutch, Eastern Armenian, English (Australia), Estonian, Finnish, French, Galician, German, Greek, Hebrew, Hungarian, Icelandic, Indonesian, Interlingue, Italian, Japanese, Korean, Lithuanian, Malay, Norwegian Bokmål, Norwegian Nynorsk, Polish, Portuguese, Portuguese (Brazil), Russian, Serbian, Slovak, Slovenian, Spanish, Thai, Turkish, Ukrainian Signed-off-by: Andreas Müller <[email protected]>
schnitzeltony
added a commit
to schnitzeltony/meta-openembedded
that referenced
this issue
Jan 14, 2021
It builds out of tree fine now. Release notes for 4.16.0 ======================== - Fulltext now searches files with UTF-7, UTF-8, UTF-16 BE/LE, and UTF-32 BE/LE encodings - Replace Gtk/Gdk/GLib deprecated code (openembedded#6) - Use "match all" method for fulltext search (openembedded#30) Translation Updates: Arabic, Basque, Belarusian, Danish, Estonian, Finnish, French, Indonesian, Japanese, Kabyle, Norwegian Bokmål, Portuguese, Portuguese (Brazil), Russian, Serbian, Slovak, Slovenian, Spanish, Swedish, Turkish Release notes for 4.15.0 ======================== [Please note that this is a development release.] Disclaimer on the significant version bump (1.4.x to 4.15.x): With this release, Catfish has started integrating Xfce components. Going forward, Catfish's versioning scheme will reflect the target Xfce release. Dependency Changes: - GTK >= 3.22 - GLib >= 2.42 - Python 2 support has been removed - Python 3 >= 3.2 (openembedded#33) - Xfconf >= 4.14.0 (requires GObject Introspection, see INSTALL) - Zeitgeist optional dependency now requires GObject Introspection New Features: - Added Ctrl+H shortcut to show/hide hidden files (openembedded#16) - Added "Today" and "Month" filters to the sidebar (openembedded#23) - Fulltext searches now include more text files (openembedded#7) General: - New app icon, now using an rDNS icon name (org.xfce.catfish) - Migrated ChangeLog to NEWS to better match Xfce projects - Renamed README to README.md and updated to match Xfce projects - Updated INSTALL to reference python3-specific packages (openembedded#36) - Various in-app icon updates (openembedded#15, openembedded#17, openembedded#26) - Added additional padding to Other and Custom gear icons (openembedded#20) Bug Fixes: - Check if zeitgeist daemon is running at startup (openembedded#34) - Correctly position custom filter popups above gear icon (openembedded#18) - Default to the current date in the custom date filters (openembedded#24) - Fix 'list' object has no attribute 'lower' (openembedded#9) - Fix fulltext freeze with special files (openembedded#32) - Fix python crash when some extension scheme is used (openembedded#35) - Fix statusbar moving on mouseover - Move custom file extension hint to tooltip (openembedded#25) - Sidebar entries no longer move when losing focus (openembedded#22) Translation Updates: Albanian, Arabic, Armenian (Armenia), Basque, Belarusian, Bulgarian, Catalan, Chinese (China), Chinese (Taiwan), Croatian, Czech, Danish, Dutch, Eastern Armenian, English (Australia), Estonian, Finnish, French, Galician, German, Greek, Hebrew, Hungarian, Icelandic, Indonesian, Interlingue, Italian, Japanese, Korean, Lithuanian, Malay, Norwegian Bokmål, Norwegian Nynorsk, Polish, Portuguese, Portuguese (Brazil), Russian, Serbian, Slovak, Slovenian, Spanish, Thai, Turkish, Ukrainian Signed-off-by: Andreas Müller <[email protected]>
schnitzeltony
added a commit
to schnitzeltony/meta-openembedded
that referenced
this issue
Mar 7, 2021
Although not mentioned below and obstacles in the way, 0001-Makefile.in.in-remove-bashisms.patch made it upstream [1]. Release notes for 1.0.13 ======================== New Features: - Add Cupertino layout (openembedded#7) - Add Redmond 7 layout (openembedded#8) - Add Xfce 4.16 layout General: - Updated existing templates to support Xfce 4.16 - Makefile.in.in: remove bashisms - Enabled exporting Whisker menu configuration (openembedded#11) Updated translations [1] https://gitlab.xfce.org/apps/xfce4-panel-profiles/-/commit/1565fe5f450732a82a76b828610fc935501584d0 Signed-off-by: Andreas Müller <[email protected]>
kraj
pushed a commit
to YoeDistro/meta-openembedded
that referenced
this issue
Mar 8, 2021
Although not mentioned below and obstacles in the way, 0001-Makefile.in.in-remove-bashisms.patch made it upstream [1]. Release notes for 1.0.13 ======================== New Features: - Add Cupertino layout (openembedded#7) - Add Redmond 7 layout (openembedded#8) - Add Xfce 4.16 layout General: - Updated existing templates to support Xfce 4.16 - Makefile.in.in: remove bashisms - Enabled exporting Whisker menu configuration (openembedded#11) Updated translations [1] https://gitlab.xfce.org/apps/xfce4-panel-profiles/-/commit/1565fe5f450732a82a76b828610fc935501584d0 Signed-off-by: Andreas Müller <[email protected]> Signed-off-by: Khem Raj <[email protected]>
halstead
pushed a commit
that referenced
this issue
Apr 7, 2021
* fixes: WARNING: opencv-4.1.0-r0 do_patch: Fuzz detected: Applying patch CVE-2019-14491.patch patching file modules/objdetect/src/cascadedetect.cpp Hunk #1 succeeded at 46 with fuzz 1 (offset -1 lines). Hunk #2 succeeded at 540 (offset -1 lines). Hunk #3 succeeded at 552 (offset -1 lines). Hunk #4 succeeded at 613 (offset -1 lines). Hunk #5 succeeded at 774 (offset -1 lines). Hunk #6 succeeded at 825 (offset -1 lines). Hunk #7 succeeded at 1470 (offset -36 lines). patching file modules/objdetect/src/cascadedetect.hpp The context lines in the patches can be updated with devtool: devtool modify opencv devtool finish --force-patch-refresh opencv <layer_path> Don't forget to review changes done by devtool! WARNING: opencv-4.1.0-r0 do_patch: QA Issue: Patch log indicates that patches do not apply cleanly. [patch-fuzz] Signed-off-by: Martin Jansa <[email protected]> Signed-off-by: Armin Kuster <[email protected]>
jpuhlman
pushed a commit
to MontaVista-OpenSourceTechnology/meta-openembedded
that referenced
this issue
Apr 8, 2021
Source: meta-openembedded MR: 108246 Type: Integration Disposition: Merged from meta-openembedded ChangeID: 637967e Description: * fixes: WARNING: opencv-4.1.0-r0 do_patch: Fuzz detected: Applying patch CVE-2019-14491.patch patching file modules/objdetect/src/cascadedetect.cpp Hunk openembedded#1 succeeded at 46 with fuzz 1 (offset -1 lines). Hunk openembedded#2 succeeded at 540 (offset -1 lines). Hunk openembedded#3 succeeded at 552 (offset -1 lines). Hunk openembedded#4 succeeded at 613 (offset -1 lines). Hunk openembedded#5 succeeded at 774 (offset -1 lines). Hunk openembedded#6 succeeded at 825 (offset -1 lines). Hunk openembedded#7 succeeded at 1470 (offset -36 lines). patching file modules/objdetect/src/cascadedetect.hpp The context lines in the patches can be updated with devtool: devtool modify opencv devtool finish --force-patch-refresh opencv <layer_path> Don't forget to review changes done by devtool! WARNING: opencv-4.1.0-r0 do_patch: QA Issue: Patch log indicates that patches do not apply cleanly. [patch-fuzz] Signed-off-by: Martin Jansa <[email protected]> Signed-off-by: Armin Kuster <[email protected]> Signed-off-by: Jeremy Puhlman <[email protected]>
kraj
pushed a commit
to YoeDistro/meta-openembedded
that referenced
this issue
Oct 31, 2022
Fix RDEPENDS, in particular perl-module-perlio-encoding and perl-module-encode-encoding were needed to be able to open the database in /usr/lib/perl5/5.36.0/vendor_perl/MIME/types.db... even though no warnings or errors were reported. bin/collect-types was dropped in 2.18 Upstream release notes: version 2.22: Wed 27 Oct 16:54:38 CEST 2021 Changes: - webm keeps on producting unexpected results [issue openembedded#11, Даша Федорова] - iana updates version 2.21: Fri 28 May 12:01:00 CEST 2021 Changes: - application/octet-stream is better for .dat [issue openembedded#11, Даша Федорова] - add video/webm which Google forgot to register [issue openembedded#12, Brent Laabs] - add image/webp which Google registered too late [issue openembedded#12, Brent Laabs] version 2.20: Thu 22 Apr 12:48:35 CEST 2021 Fixes: - problems with PAUSE cause the previous release to show-up in the wrong location. Let's hope this release solves it. Changes: - heif/heic/heifs/heics/hif fix [issue openembedded#9, Даша Федорова] - no 'and' and 'or' extensions [issue openembedded#9, Даша Федорова] - application/octet-stream is better for .bin [issue openembedded#10, Даша Федорова] version 2.19: Fri 16 Apr 11:47:10 CEST 2021 Improvements: - update with the newest data from IANA and Apache httpd Changes: - mp4 preference is video/mp4 [issue openembedded#5, Даша Федорова] - yt preference is video/vnd.youtube.yt [issue openembedded#6, Даша Федорова] - 3gp and 3gpp preference is video/3gpp [issue openembedded#7, Даша Федорова] version 2.18: Wed 9 Dec 10:29:46 CET 2020 Improvements: - update with newest data Changes: - Mojo 6.0 changed types() into mapping() [Dmitry Latin] - Mojo 7.94 adds experimental file_type() - Mojo 7.94 adds experimental content_type() Signed-off-by: Tim Orling <[email protected]> Signed-off-by: Khem Raj <[email protected]>
eigendude
added a commit
to eigendude/meta-openembedded
that referenced
this issue
Apr 23, 2024
Update samba from Yocto Honister branch
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
My yocto program is from "https://wiki.linaro.org/HowTo/ARMv8/OpenEmbedded".
When I do "bitbake mozjs -f", I get a error below:
bitbake mozjs -f
Loading cache: 100% |##########################################################################################################################| ETA: 00:00:00
Loaded 2418 entries from dependency cache.
WARNING: No recipes available for:
/home/wkf/halogen/openembedded/jenkins-setup/meta-selinux/recipes-kernel/linux/linux-yocto_3.4.bbappend
/home/wkf/halogen/openembedded/jenkins-setup/meta-virtualization/recipes-kernel/linux/linux-yocto_3.4.bbappend
/home/wkf/halogen/openembedded/jenkins-setup/meta-selinux/recipes-extended/at/at_3.1.14.bbappend
NOTE: Resolving any missing task queue dependencies
Build Configuration:
BB_VERSION = "1.23.1"
BUILD_SYS = "x86_64-linux"
NATIVELSBSTRING = "SUSE-LINUX-11"
TARGET_SYS = "aarch64-oe-linux"
MACHINE = "genericarmv8"
DISTRO = "nodistro"
DISTRO_VERSION = "nodistro.0"
TUNE_FEATURES = "aarch64"
meta-oe
meta-filesystems
meta-initramfs
meta-webserver
meta-networking
meta-gnome = "master:8c6721febfe1972c3bff6012ca7c70148343ec06"
meta-aarch64
meta-bigendian
meta-linaro
meta-linaro-toolchain
meta-linaro-integration = "master:a6d9587b06c8b513cf7013281a520e69fac99d72"
meta-virtualization = "master:4544c08af803f6ce569fd67216b33ee5e6c28cfa"
meta-browser = "master:61cf2e04146c47be37d7652c8ecbfb47d66c52fb"
meta-selinux = "master:fe356c16f803c01d57770ef4512c746517cabe95"
meta = "master:ccf616b7263e446d5f0cd1169d84bfdcbc115f57"
meta-java = "master:d2b75b615e4612f9fa05950c1d76d4a719e573d4"
NOTE: Preparing runqueue
NOTE: Tainting hash to force rebuild of task /home/wkf/halogen/openembedded/jenkins-setup/meta-openembedded/meta-oe/recipes-extended/mozjs/mozjs_17.0.0.bb, do_rm_work_all
WARNING: /home/wkf/halogen/openembedded/jenkins-setup/meta-openembedded/meta-oe/recipes-extended/mozjs/mozjs_17.0.0.bb.do_rm_work_all is tainted from a forced run
NOTE: Executing SetScene Tasks
NOTE: Executing RunQueue Tasks
ERROR: Function failed: do_compile (log file is located at /home/wkf/halogen/openembedded/jenkins-setup/build/tmp-eglibc/work/aarch64-oe-linux/mozjs/17.0.0-r0/temp/log.do_compile.58030)
ERROR: Logfile of failure stored in: /home/wkf/halogen/openembedded/jenkins-setup/build/tmp-eglibc/work/aarch64-oe-linux/mozjs/17.0.0-r0/temp/log.do_compile.58030
Log data follows:
| DEBUG: SITE files ['endian-little', 'bit-64', 'arm-common', 'common-linux', 'common-glibc', 'aarch64-linux', 'common']
| DEBUG: Executing shell function do_compile
| NOTE: make -j 64
| make export
| make[1]: Entering directory
/home/wkf/halogen/openembedded/jenkins-setup/build/tmp-eglibc/work/aarch64-oe-linux/mozjs/17.0.0-r0/build' | make -C config/ nsinstall | mkdir -p /home/wkf/halogen/openembedded/jenkins-setup/build/tmp-eglibc/work/aarch64-oe-linux/mozjs/17.0.0-r0/build/.deps | /usr/local/bin/python2.7 /home/wkf/halogen/openembedded/jenkins-setup/build/tmp-eglibc/work/aarch64-oe-linux/mozjs/17.0.0-r0/mozjs17.0.0/js/src/builtin/embedjs.py selfhosted.out.h /home/wkf/halogen/openembedded/jenkins-setup/build/tmp-eglibc/work/aarch64-oe-linux/mozjs/17.0.0-r0/mozjs17.0.0/js/src/js.msg \ | /home/wkf/halogen/openembedded/jenkins-setup/build/tmp-eglibc/work/aarch64-oe-linux/mozjs/17.0.0-r0/mozjs17.0.0/js/src/builtin/macros.py /home/wkf/halogen/openembedded/jenkins-setup/build/tmp-eglibc/work/aarch64-oe-linux/mozjs/17.0.0-r0/mozjs17.0.0/js/src/builtin/array.js | nsinstall.c | make[2]: Entering directory
/home/wkf/halogen/openembedded/jenkins-setup/build/tmp-eglibc/work/aarch64-oe-linux/mozjs/17.0.0-r0/build/config'| gcc -o host_nsinstall.o -c -O2 -pipe -g -feliminate-unused-debug-types -DXP_UNIX -O3 -DUNICODE -D_UNICODE -I/home/wkf/halogen/openembedded/jenkins-setup/build/tmp-eglibc/work/aarch64-oe-linux/mozjs/17.0.0-r0/mozjs17.0.0/js/src/config -I. -I../dist/include /home/wkf/halogen/openembedded/jenkins-setup/build/tmp-eglibc/work/aarch64-oe-linux/mozjs/17.0.0-r0/mozjs17.0.0/js/src/config/nsinstall.c
| pathsub.c
| gcc -o host_pathsub.o -c -O2 -pipe -g -feliminate-unused-debug-types -DXP_UNIX -O3 -DUNICODE -D_UNICODE -I/home/wkf/halogen/openembedded/jenkins-setup/build/tmp-eglibc/work/aarch64-oe-linux/mozjs/17.0.0-r0/mozjs17.0.0/js/src/config -I. -I../dist/include /home/wkf/halogen/openembedded/jenkins-setup/build/tmp-eglibc/work/aarch64-oe-linux/mozjs/17.0.0-r0/mozjs17.0.0/js/src/config/pathsub.c
| Traceback (most recent call last):
| File "/home/wkf/halogen/openembedded/jenkins-setup/build/tmp-eglibc/work/aarch64-oe-linux/mozjs/17.0.0-r0/mozjs17.0.0/js/src/builtin/embedjs.py", line 12, in
| import re, sys, os, js2c, fileinput
| File "/home/wkf/halogen/openembedded/jenkins-setup/build/tmp-eglibc/work/aarch64-oe-linux/mozjs/17.0.0-r0/mozjs17.0.0/js/src/builtin/js2c.py", line 36, in
| import bz2
| ImportError: No module named bz2
| make[1]: *** [selfhosted.out.h] Error 1
| make[1]: *** Waiting for unfinished jobs....
| gcc -o nsinstall -O2 -pipe -g -feliminate-unused-debug-types -DXP_UNIX -O3 -DUNICODE -D_UNICODE -Wl,-O1 -Wl,--hash-style=gnu -Wl,--as-needed host_nsinstall.o host_pathsub.o
| make[2]: Leaving directory
/home/wkf/halogen/openembedded/jenkins-setup/build/tmp-eglibc/work/aarch64-oe-linux/mozjs/17.0.0-r0/build/config' | make[1]: Leaving directory
/home/wkf/halogen/openembedded/jenkins-setup/build/tmp-eglibc/work/aarch64-oe-linux/mozjs/17.0.0-r0/build'| make: *** [default] Error 2
| ERROR: oe_runmake failed
| WARNING: /home/wkf/halogen/openembedded/jenkins-setup/build/tmp-eglibc/work/aarch64-oe-linux/mozjs/17.0.0-r0/temp/run.do_compile.58030:145 exit 1 from
| exit 1
| ERROR: Function failed: do_compile (log file is located at /home/wkf/halogen/openembedded/jenkins-setup/build/tmp-eglibc/work/aarch64-oe-linux/mozjs/17.0.0-r0/temp/log.do_compile.58030)
ERROR: Task 6 (/home/wkf/halogen/openembedded/jenkins-setup/meta-openembedded/meta-oe/recipes-extended/mozjs/mozjs_17.0.0.bb, do_compile) failed with exit code '1'
NOTE: Tasks Summary: Attempted 675 tasks of which 657 didn't need to be rerun and 1 failed.
Waiting for 0 running tasks to finish:
Summary: 1 task failed:
/home/wkf/halogen/openembedded/jenkins-setup/meta-openembedded/meta-oe/recipes-extended/mozjs/mozjs_17.0.0.bb, do_compile
Summary: There were 2 WARNING messages shown.
Summary: There was 1 ERROR message shown, returning a non-zero exit code.
The text was updated successfully, but these errors were encountered: