-
Notifications
You must be signed in to change notification settings - Fork 734
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
multipath-tools #8
Closed
Closed
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
SCRREV includes patches up to 9/12/2014. Modify upstream source to be better set up for cross compilation. Signed-off-by: Joe Slater <jslater@windriver.com>
Add a little processing to find correct directory for source upstream. Update LIC_FILES_CHKSUM since the latest package doesn't include a COPYRIGHT file anymore. Signed-off-by: Joe Slater <jslater@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com> Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
No changes other than source checksum. Signed-off-by: Joe Slater <jslater@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com> Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
following security fixes included: MEGACO dissector infinite loop. (Bug 10333) CVE-2014-6423 Netflow dissector crash. (Bug 10370) CVE-2014-6424 CUPS dissector crash. (Bug 10353) CVE-2014-6425 HIP dissector infinite loop. CVE-2014-6426 RTSP dissector crash. (Bug 10381) CVE-2014-6427 SES dissector crash. (Bug 10454) CVE-2014-6428 Sniffer file parser crash. (Bug 10461) CVE-2014-6429 CVE-2014-6430 CVE-2014-6431 CVE-2014-6432 re-org'd dd file to be more in-line with style guide. Signed-off-by: Armin Kuster <akuster808@gmail.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com> Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
Signed-off-by: Roy Li <rongqing.li@windriver.com> Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
Signed-off-by: YangHaibo <b40869@freescale.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com> Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
No changes except to source version. Signed-off-by: Joe Slater <jslater@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com> Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
philb
pushed a commit
that referenced
this pull request
Jul 8, 2015
the patch comes from: https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455 https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch The cleanup function in telnetd is called both directly and on SIGCHLD signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while running on a 2.6.31.11 kernel. What we were seeing is hangs like these: (gdb) bt #0 0xb7702424 in __kernel_vsyscall () #1 0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6 #2 0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6 #3 0xb767e6e0 in utmpname () from ./lib/libc.so.6 #4 0xb76bcde7 in logout () from ./lib/libutil.so.1 #5 0x0804c827 in cleanup () #6 <signal handler called> #7 0xb7702424 in __kernel_vsyscall () #8 0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6 #9 0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6 #10 0xb767d675 in getutline_r () from ./lib/libc.so.6 #11 0xb76bce42 in logout () from ./lib/libutil.so.1 #12 0x0804c827 in cleanup () #13 0x0804a0b5 in telnet () #14 0x0804a9c3 in main () and what has happened here is that the user closes the telnet session via the escape character. This causes telnetd to call cleanup in frame the SIGCHLD signal is delivered while telnetd is executing cleanup. Telnetd then calls the signal handler for SIGCHLD, which is cleanup(). Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the __libc_utmp_lock lock, and utmpname above does the same thing in frame The fix registers the SIGCHLD handler as cleanup_sighandler, and makes cleanup disable the SIGCHLD signal before calling cleanup_sighandler. Signed-off-by: Simon Kagstrom <simon.kagstrom@netinsight.net> Signed-off-by: Li Wang <li.wang@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
philb
pushed a commit
that referenced
this pull request
Jul 15, 2015
the patch comes from: https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455 https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch The cleanup function in telnetd is called both directly and on SIGCHLD signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while running on a 2.6.31.11 kernel. What we were seeing is hangs like these: (gdb) bt #0 0xb7702424 in __kernel_vsyscall () #1 0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6 #2 0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6 #3 0xb767e6e0 in utmpname () from ./lib/libc.so.6 #4 0xb76bcde7 in logout () from ./lib/libutil.so.1 #5 0x0804c827 in cleanup () #6 <signal handler called> #7 0xb7702424 in __kernel_vsyscall () #8 0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6 #9 0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6 #10 0xb767d675 in getutline_r () from ./lib/libc.so.6 #11 0xb76bce42 in logout () from ./lib/libutil.so.1 #12 0x0804c827 in cleanup () #13 0x0804a0b5 in telnet () #14 0x0804a9c3 in main () and what has happened here is that the user closes the telnet session via the escape character. This causes telnetd to call cleanup in frame the SIGCHLD signal is delivered while telnetd is executing cleanup. Telnetd then calls the signal handler for SIGCHLD, which is cleanup(). Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the __libc_utmp_lock lock, and utmpname above does the same thing in frame The fix registers the SIGCHLD handler as cleanup_sighandler, and makes cleanup disable the SIGCHLD signal before calling cleanup_sighandler. Signed-off-by: Simon Kagstrom <simon.kagstrom@netinsight.net> Signed-off-by: Li Wang <li.wang@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
philb
pushed a commit
that referenced
this pull request
Jul 15, 2015
the patch comes from: https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455 https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch The cleanup function in telnetd is called both directly and on SIGCHLD signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while running on a 2.6.31.11 kernel. What we were seeing is hangs like these: (gdb) bt #0 0xb7702424 in __kernel_vsyscall () #1 0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6 #2 0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6 #3 0xb767e6e0 in utmpname () from ./lib/libc.so.6 #4 0xb76bcde7 in logout () from ./lib/libutil.so.1 #5 0x0804c827 in cleanup () #6 <signal handler called> #7 0xb7702424 in __kernel_vsyscall () #8 0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6 #9 0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6 #10 0xb767d675 in getutline_r () from ./lib/libc.so.6 #11 0xb76bce42 in logout () from ./lib/libutil.so.1 #12 0x0804c827 in cleanup () #13 0x0804a0b5 in telnet () #14 0x0804a9c3 in main () and what has happened here is that the user closes the telnet session via the escape character. This causes telnetd to call cleanup in frame the SIGCHLD signal is delivered while telnetd is executing cleanup. Telnetd then calls the signal handler for SIGCHLD, which is cleanup(). Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the __libc_utmp_lock lock, and utmpname above does the same thing in frame The fix registers the SIGCHLD handler as cleanup_sighandler, and makes cleanup disable the SIGCHLD signal before calling cleanup_sighandler. Signed-off-by: Simon Kagstrom <simon.kagstrom@netinsight.net> Signed-off-by: Li Wang <li.wang@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
philb
pushed a commit
that referenced
this pull request
Jul 16, 2015
the patch comes from: https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455 https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch The cleanup function in telnetd is called both directly and on SIGCHLD signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while running on a 2.6.31.11 kernel. What we were seeing is hangs like these: (gdb) bt #0 0xb7702424 in __kernel_vsyscall () #1 0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6 #2 0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6 #3 0xb767e6e0 in utmpname () from ./lib/libc.so.6 #4 0xb76bcde7 in logout () from ./lib/libutil.so.1 #5 0x0804c827 in cleanup () #6 <signal handler called> #7 0xb7702424 in __kernel_vsyscall () #8 0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6 #9 0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6 #10 0xb767d675 in getutline_r () from ./lib/libc.so.6 #11 0xb76bce42 in logout () from ./lib/libutil.so.1 #12 0x0804c827 in cleanup () #13 0x0804a0b5 in telnet () #14 0x0804a9c3 in main () and what has happened here is that the user closes the telnet session via the escape character. This causes telnetd to call cleanup in frame the SIGCHLD signal is delivered while telnetd is executing cleanup. Telnetd then calls the signal handler for SIGCHLD, which is cleanup(). Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the __libc_utmp_lock lock, and utmpname above does the same thing in frame The fix registers the SIGCHLD handler as cleanup_sighandler, and makes cleanup disable the SIGCHLD signal before calling cleanup_sighandler. Signed-off-by: Simon Kagstrom <simon.kagstrom@netinsight.net> Signed-off-by: Li Wang <li.wang@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
philb
pushed a commit
that referenced
this pull request
Jul 27, 2015
the patch comes from: https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455 https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch The cleanup function in telnetd is called both directly and on SIGCHLD signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while running on a 2.6.31.11 kernel. What we were seeing is hangs like these: (gdb) bt #0 0xb7702424 in __kernel_vsyscall () #1 0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6 #2 0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6 #3 0xb767e6e0 in utmpname () from ./lib/libc.so.6 #4 0xb76bcde7 in logout () from ./lib/libutil.so.1 #5 0x0804c827 in cleanup () #6 <signal handler called> #7 0xb7702424 in __kernel_vsyscall () #8 0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6 #9 0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6 #10 0xb767d675 in getutline_r () from ./lib/libc.so.6 #11 0xb76bce42 in logout () from ./lib/libutil.so.1 #12 0x0804c827 in cleanup () #13 0x0804a0b5 in telnet () #14 0x0804a9c3 in main () and what has happened here is that the user closes the telnet session via the escape character. This causes telnetd to call cleanup in frame the SIGCHLD signal is delivered while telnetd is executing cleanup. Telnetd then calls the signal handler for SIGCHLD, which is cleanup(). Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the __libc_utmp_lock lock, and utmpname above does the same thing in frame The fix registers the SIGCHLD handler as cleanup_sighandler, and makes cleanup disable the SIGCHLD signal before calling cleanup_sighandler. Signed-off-by: Simon Kagstrom <simon.kagstrom@netinsight.net> Signed-off-by: Li Wang <li.wang@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
philb
pushed a commit
that referenced
this pull request
Jul 29, 2015
the patch comes from: https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455 https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch The cleanup function in telnetd is called both directly and on SIGCHLD signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while running on a 2.6.31.11 kernel. What we were seeing is hangs like these: (gdb) bt #0 0xb7702424 in __kernel_vsyscall () #1 0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6 #2 0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6 #3 0xb767e6e0 in utmpname () from ./lib/libc.so.6 #4 0xb76bcde7 in logout () from ./lib/libutil.so.1 #5 0x0804c827 in cleanup () #6 <signal handler called> #7 0xb7702424 in __kernel_vsyscall () #8 0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6 #9 0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6 #10 0xb767d675 in getutline_r () from ./lib/libc.so.6 #11 0xb76bce42 in logout () from ./lib/libutil.so.1 #12 0x0804c827 in cleanup () #13 0x0804a0b5 in telnet () #14 0x0804a9c3 in main () and what has happened here is that the user closes the telnet session via the escape character. This causes telnetd to call cleanup in frame the SIGCHLD signal is delivered while telnetd is executing cleanup. Telnetd then calls the signal handler for SIGCHLD, which is cleanup(). Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the __libc_utmp_lock lock, and utmpname above does the same thing in frame The fix registers the SIGCHLD handler as cleanup_sighandler, and makes cleanup disable the SIGCHLD signal before calling cleanup_sighandler. Signed-off-by: Simon Kagstrom <simon.kagstrom@netinsight.net> Signed-off-by: Li Wang <li.wang@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
philb
pushed a commit
that referenced
this pull request
Jul 30, 2015
the patch comes from: https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455 https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch The cleanup function in telnetd is called both directly and on SIGCHLD signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while running on a 2.6.31.11 kernel. What we were seeing is hangs like these: (gdb) bt #0 0xb7702424 in __kernel_vsyscall () #1 0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6 #2 0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6 #3 0xb767e6e0 in utmpname () from ./lib/libc.so.6 #4 0xb76bcde7 in logout () from ./lib/libutil.so.1 #5 0x0804c827 in cleanup () #6 <signal handler called> #7 0xb7702424 in __kernel_vsyscall () #8 0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6 #9 0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6 #10 0xb767d675 in getutline_r () from ./lib/libc.so.6 #11 0xb76bce42 in logout () from ./lib/libutil.so.1 #12 0x0804c827 in cleanup () #13 0x0804a0b5 in telnet () #14 0x0804a9c3 in main () and what has happened here is that the user closes the telnet session via the escape character. This causes telnetd to call cleanup in frame the SIGCHLD signal is delivered while telnetd is executing cleanup. Telnetd then calls the signal handler for SIGCHLD, which is cleanup(). Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the __libc_utmp_lock lock, and utmpname above does the same thing in frame The fix registers the SIGCHLD handler as cleanup_sighandler, and makes cleanup disable the SIGCHLD signal before calling cleanup_sighandler. Signed-off-by: Simon Kagstrom <simon.kagstrom@netinsight.net> Signed-off-by: Li Wang <li.wang@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
philb
pushed a commit
that referenced
this pull request
Aug 3, 2015
the patch comes from: https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455 https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch The cleanup function in telnetd is called both directly and on SIGCHLD signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while running on a 2.6.31.11 kernel. What we were seeing is hangs like these: (gdb) bt #0 0xb7702424 in __kernel_vsyscall () #1 0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6 #2 0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6 #3 0xb767e6e0 in utmpname () from ./lib/libc.so.6 #4 0xb76bcde7 in logout () from ./lib/libutil.so.1 #5 0x0804c827 in cleanup () #6 <signal handler called> #7 0xb7702424 in __kernel_vsyscall () #8 0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6 #9 0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6 #10 0xb767d675 in getutline_r () from ./lib/libc.so.6 #11 0xb76bce42 in logout () from ./lib/libutil.so.1 #12 0x0804c827 in cleanup () #13 0x0804a0b5 in telnet () #14 0x0804a9c3 in main () and what has happened here is that the user closes the telnet session via the escape character. This causes telnetd to call cleanup in frame the SIGCHLD signal is delivered while telnetd is executing cleanup. Telnetd then calls the signal handler for SIGCHLD, which is cleanup(). Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the __libc_utmp_lock lock, and utmpname above does the same thing in frame The fix registers the SIGCHLD handler as cleanup_sighandler, and makes cleanup disable the SIGCHLD signal before calling cleanup_sighandler. Signed-off-by: Simon Kagstrom <simon.kagstrom@netinsight.net> Signed-off-by: Li Wang <li.wang@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
philb
pushed a commit
that referenced
this pull request
Aug 17, 2015
the patch comes from: https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455 https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch The cleanup function in telnetd is called both directly and on SIGCHLD signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while running on a 2.6.31.11 kernel. What we were seeing is hangs like these: (gdb) bt #0 0xb7702424 in __kernel_vsyscall () #1 0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6 #2 0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6 #3 0xb767e6e0 in utmpname () from ./lib/libc.so.6 #4 0xb76bcde7 in logout () from ./lib/libutil.so.1 #5 0x0804c827 in cleanup () #6 <signal handler called> #7 0xb7702424 in __kernel_vsyscall () #8 0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6 #9 0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6 #10 0xb767d675 in getutline_r () from ./lib/libc.so.6 #11 0xb76bce42 in logout () from ./lib/libutil.so.1 #12 0x0804c827 in cleanup () #13 0x0804a0b5 in telnet () #14 0x0804a9c3 in main () and what has happened here is that the user closes the telnet session via the escape character. This causes telnetd to call cleanup in frame the SIGCHLD signal is delivered while telnetd is executing cleanup. Telnetd then calls the signal handler for SIGCHLD, which is cleanup(). Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the __libc_utmp_lock lock, and utmpname above does the same thing in frame The fix registers the SIGCHLD handler as cleanup_sighandler, and makes cleanup disable the SIGCHLD signal before calling cleanup_sighandler. Signed-off-by: Simon Kagstrom <simon.kagstrom@netinsight.net> Signed-off-by: Li Wang <li.wang@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
philb
pushed a commit
that referenced
this pull request
Aug 18, 2015
the patch comes from: https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455 https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch The cleanup function in telnetd is called both directly and on SIGCHLD signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while running on a 2.6.31.11 kernel. What we were seeing is hangs like these: (gdb) bt #0 0xb7702424 in __kernel_vsyscall () #1 0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6 #2 0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6 #3 0xb767e6e0 in utmpname () from ./lib/libc.so.6 #4 0xb76bcde7 in logout () from ./lib/libutil.so.1 #5 0x0804c827 in cleanup () #6 <signal handler called> #7 0xb7702424 in __kernel_vsyscall () #8 0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6 #9 0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6 #10 0xb767d675 in getutline_r () from ./lib/libc.so.6 #11 0xb76bce42 in logout () from ./lib/libutil.so.1 #12 0x0804c827 in cleanup () #13 0x0804a0b5 in telnet () #14 0x0804a9c3 in main () and what has happened here is that the user closes the telnet session via the escape character. This causes telnetd to call cleanup in frame the SIGCHLD signal is delivered while telnetd is executing cleanup. Telnetd then calls the signal handler for SIGCHLD, which is cleanup(). Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the __libc_utmp_lock lock, and utmpname above does the same thing in frame The fix registers the SIGCHLD handler as cleanup_sighandler, and makes cleanup disable the SIGCHLD signal before calling cleanup_sighandler. Signed-off-by: Simon Kagstrom <simon.kagstrom@netinsight.net> Signed-off-by: Li Wang <li.wang@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
philb
pushed a commit
that referenced
this pull request
Aug 18, 2015
the patch comes from: https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455 https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch The cleanup function in telnetd is called both directly and on SIGCHLD signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while running on a 2.6.31.11 kernel. What we were seeing is hangs like these: (gdb) bt #0 0xb7702424 in __kernel_vsyscall () #1 0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6 #2 0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6 #3 0xb767e6e0 in utmpname () from ./lib/libc.so.6 #4 0xb76bcde7 in logout () from ./lib/libutil.so.1 #5 0x0804c827 in cleanup () #6 <signal handler called> #7 0xb7702424 in __kernel_vsyscall () #8 0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6 #9 0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6 #10 0xb767d675 in getutline_r () from ./lib/libc.so.6 #11 0xb76bce42 in logout () from ./lib/libutil.so.1 #12 0x0804c827 in cleanup () #13 0x0804a0b5 in telnet () #14 0x0804a9c3 in main () and what has happened here is that the user closes the telnet session via the escape character. This causes telnetd to call cleanup in frame the SIGCHLD signal is delivered while telnetd is executing cleanup. Telnetd then calls the signal handler for SIGCHLD, which is cleanup(). Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the __libc_utmp_lock lock, and utmpname above does the same thing in frame The fix registers the SIGCHLD handler as cleanup_sighandler, and makes cleanup disable the SIGCHLD signal before calling cleanup_sighandler. Signed-off-by: Simon Kagstrom <simon.kagstrom@netinsight.net> Signed-off-by: Li Wang <li.wang@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
philb
pushed a commit
that referenced
this pull request
Aug 20, 2015
the patch comes from: https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455 https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch The cleanup function in telnetd is called both directly and on SIGCHLD signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while running on a 2.6.31.11 kernel. What we were seeing is hangs like these: (gdb) bt #0 0xb7702424 in __kernel_vsyscall () #1 0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6 #2 0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6 #3 0xb767e6e0 in utmpname () from ./lib/libc.so.6 #4 0xb76bcde7 in logout () from ./lib/libutil.so.1 #5 0x0804c827 in cleanup () #6 <signal handler called> #7 0xb7702424 in __kernel_vsyscall () #8 0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6 #9 0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6 #10 0xb767d675 in getutline_r () from ./lib/libc.so.6 #11 0xb76bce42 in logout () from ./lib/libutil.so.1 #12 0x0804c827 in cleanup () #13 0x0804a0b5 in telnet () #14 0x0804a9c3 in main () and what has happened here is that the user closes the telnet session via the escape character. This causes telnetd to call cleanup in frame the SIGCHLD signal is delivered while telnetd is executing cleanup. Telnetd then calls the signal handler for SIGCHLD, which is cleanup(). Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the __libc_utmp_lock lock, and utmpname above does the same thing in frame The fix registers the SIGCHLD handler as cleanup_sighandler, and makes cleanup disable the SIGCHLD signal before calling cleanup_sighandler. Signed-off-by: Simon Kagstrom <simon.kagstrom@netinsight.net> Signed-off-by: Li Wang <li.wang@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
philb
pushed a commit
that referenced
this pull request
Aug 24, 2015
the patch comes from: https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455 https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch The cleanup function in telnetd is called both directly and on SIGCHLD signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while running on a 2.6.31.11 kernel. What we were seeing is hangs like these: (gdb) bt #0 0xb7702424 in __kernel_vsyscall () #1 0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6 #2 0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6 #3 0xb767e6e0 in utmpname () from ./lib/libc.so.6 #4 0xb76bcde7 in logout () from ./lib/libutil.so.1 #5 0x0804c827 in cleanup () #6 <signal handler called> #7 0xb7702424 in __kernel_vsyscall () #8 0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6 #9 0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6 #10 0xb767d675 in getutline_r () from ./lib/libc.so.6 #11 0xb76bce42 in logout () from ./lib/libutil.so.1 #12 0x0804c827 in cleanup () #13 0x0804a0b5 in telnet () #14 0x0804a9c3 in main () and what has happened here is that the user closes the telnet session via the escape character. This causes telnetd to call cleanup in frame the SIGCHLD signal is delivered while telnetd is executing cleanup. Telnetd then calls the signal handler for SIGCHLD, which is cleanup(). Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the __libc_utmp_lock lock, and utmpname above does the same thing in frame The fix registers the SIGCHLD handler as cleanup_sighandler, and makes cleanup disable the SIGCHLD signal before calling cleanup_sighandler. Signed-off-by: Simon Kagstrom <simon.kagstrom@netinsight.net> Signed-off-by: Li Wang <li.wang@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
philb
pushed a commit
that referenced
this pull request
Aug 24, 2015
the patch comes from: https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455 https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch The cleanup function in telnetd is called both directly and on SIGCHLD signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while running on a 2.6.31.11 kernel. What we were seeing is hangs like these: (gdb) bt #0 0xb7702424 in __kernel_vsyscall () #1 0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6 #2 0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6 #3 0xb767e6e0 in utmpname () from ./lib/libc.so.6 #4 0xb76bcde7 in logout () from ./lib/libutil.so.1 #5 0x0804c827 in cleanup () #6 <signal handler called> #7 0xb7702424 in __kernel_vsyscall () #8 0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6 #9 0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6 #10 0xb767d675 in getutline_r () from ./lib/libc.so.6 #11 0xb76bce42 in logout () from ./lib/libutil.so.1 #12 0x0804c827 in cleanup () #13 0x0804a0b5 in telnet () #14 0x0804a9c3 in main () and what has happened here is that the user closes the telnet session via the escape character. This causes telnetd to call cleanup in frame the SIGCHLD signal is delivered while telnetd is executing cleanup. Telnetd then calls the signal handler for SIGCHLD, which is cleanup(). Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the __libc_utmp_lock lock, and utmpname above does the same thing in frame The fix registers the SIGCHLD handler as cleanup_sighandler, and makes cleanup disable the SIGCHLD signal before calling cleanup_sighandler. Signed-off-by: Simon Kagstrom <simon.kagstrom@netinsight.net> Signed-off-by: Li Wang <li.wang@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
philb
pushed a commit
that referenced
this pull request
Aug 27, 2015
the patch comes from: https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455 https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch The cleanup function in telnetd is called both directly and on SIGCHLD signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while running on a 2.6.31.11 kernel. What we were seeing is hangs like these: (gdb) bt #0 0xb7702424 in __kernel_vsyscall () #1 0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6 #2 0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6 #3 0xb767e6e0 in utmpname () from ./lib/libc.so.6 #4 0xb76bcde7 in logout () from ./lib/libutil.so.1 #5 0x0804c827 in cleanup () #6 <signal handler called> #7 0xb7702424 in __kernel_vsyscall () #8 0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6 #9 0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6 #10 0xb767d675 in getutline_r () from ./lib/libc.so.6 #11 0xb76bce42 in logout () from ./lib/libutil.so.1 #12 0x0804c827 in cleanup () #13 0x0804a0b5 in telnet () #14 0x0804a9c3 in main () and what has happened here is that the user closes the telnet session via the escape character. This causes telnetd to call cleanup in frame the SIGCHLD signal is delivered while telnetd is executing cleanup. Telnetd then calls the signal handler for SIGCHLD, which is cleanup(). Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the __libc_utmp_lock lock, and utmpname above does the same thing in frame The fix registers the SIGCHLD handler as cleanup_sighandler, and makes cleanup disable the SIGCHLD signal before calling cleanup_sighandler. Signed-off-by: Simon Kagstrom <simon.kagstrom@netinsight.net> Signed-off-by: Li Wang <li.wang@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
philb
pushed a commit
that referenced
this pull request
Aug 31, 2015
the patch comes from: https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455 https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch The cleanup function in telnetd is called both directly and on SIGCHLD signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while running on a 2.6.31.11 kernel. What we were seeing is hangs like these: (gdb) bt #0 0xb7702424 in __kernel_vsyscall () #1 0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6 #2 0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6 #3 0xb767e6e0 in utmpname () from ./lib/libc.so.6 #4 0xb76bcde7 in logout () from ./lib/libutil.so.1 #5 0x0804c827 in cleanup () #6 <signal handler called> #7 0xb7702424 in __kernel_vsyscall () #8 0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6 #9 0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6 #10 0xb767d675 in getutline_r () from ./lib/libc.so.6 #11 0xb76bce42 in logout () from ./lib/libutil.so.1 #12 0x0804c827 in cleanup () #13 0x0804a0b5 in telnet () #14 0x0804a9c3 in main () and what has happened here is that the user closes the telnet session via the escape character. This causes telnetd to call cleanup in frame the SIGCHLD signal is delivered while telnetd is executing cleanup. Telnetd then calls the signal handler for SIGCHLD, which is cleanup(). Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the __libc_utmp_lock lock, and utmpname above does the same thing in frame The fix registers the SIGCHLD handler as cleanup_sighandler, and makes cleanup disable the SIGCHLD signal before calling cleanup_sighandler. Signed-off-by: Simon Kagstrom <simon.kagstrom@netinsight.net> Signed-off-by: Li Wang <li.wang@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
philb
pushed a commit
that referenced
this pull request
Sep 14, 2015
the patch comes from: https://bugs.launchpad.net/ubuntu/+source/netkit-telnet/+bug/507455 https://launchpadlibrarian.net/37882973/0001-telnetd-Fix-deadlock-on-cleanup.patch The cleanup function in telnetd is called both directly and on SIGCHLD signals. This, unfortunately, triggered a deadlock in eglibc 2.9 while running on a 2.6.31.11 kernel. What we were seeing is hangs like these: (gdb) bt #0 0xb7702424 in __kernel_vsyscall () #1 0xb7658e61 in __lll_lock_wait_private () from ./lib/libc.so.6 #2 0xb767e7b5 in _L_lock_15 () from ./lib/libc.so.6 #3 0xb767e6e0 in utmpname () from ./lib/libc.so.6 #4 0xb76bcde7 in logout () from ./lib/libutil.so.1 #5 0x0804c827 in cleanup () #6 <signal handler called> #7 0xb7702424 in __kernel_vsyscall () #8 0xb7641003 in __fcntl_nocancel () from ./lib/libc.so.6 #9 0xb767e0c3 in getutline_r_file () from ./lib/libc.so.6 #10 0xb767d675 in getutline_r () from ./lib/libc.so.6 #11 0xb76bce42 in logout () from ./lib/libutil.so.1 #12 0x0804c827 in cleanup () #13 0x0804a0b5 in telnet () #14 0x0804a9c3 in main () and what has happened here is that the user closes the telnet session via the escape character. This causes telnetd to call cleanup in frame the SIGCHLD signal is delivered while telnetd is executing cleanup. Telnetd then calls the signal handler for SIGCHLD, which is cleanup(). Ouch. The actual deadlock is in libc. getutline_r in frame #10 gets the __libc_utmp_lock lock, and utmpname above does the same thing in frame The fix registers the SIGCHLD handler as cleanup_sighandler, and makes cleanup disable the SIGCHLD signal before calling cleanup_sighandler. Signed-off-by: Simon Kagstrom <simon.kagstrom@netinsight.net> Signed-off-by: Li Wang <li.wang@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
halstead
pushed a commit
that referenced
this pull request
Apr 13, 2018
WARNING: hddtemp-0.3-beta15-r1 do_patch: Some of the context lines in patches were ignored. This can lead to incorrectly applied patches. The context lines in the patches can be updated with devtool: devtool modify <recipe> devtool finish --force-patch-refresh <recipe> <layer_path> Then the updated patches and the source tree (in devtool's workspace) should be reviewed to make sure the patches apply in the correct place and don't introduce duplicate lines (which can, and does happen when some of the context is ignored). Further information: http://lists.openembedded.org/pipermail/openembedded-core/2018-March/148675.html https://bugzilla.yoctoproject.org/show_bug.cgi?id=10450 Details: Applying patch hddtemp_0.3-beta15-52.diff patching file doc/hddtemp.8 patching file po/fr.po patching file po/ru.po patching file po/sv.po patching file po/pt.po patching file po/de.po patching file po/LINGUAS patching file po/hddtemp.pot patching file src/sata.c patching file src/satacmds.c patching file src/backtrace.c patching file src/daemon.c patching file src/hddtemp.c Hunk #5 succeeded at 268 with fuzz 2 (offset 4 lines). Hunk #6 succeeded at 283 (offset 4 lines). Hunk #7 succeeded at 295 (offset 4 lines). Hunk #8 succeeded at 372 (offset 4 lines). Hunk #9 succeeded at 409 (offset 4 lines). Hunk #10 succeeded at 483 (offset 4 lines). Hunk #11 succeeded at 496 (offset 4 lines). Hunk #12 succeeded at 510 (offset 4 lines). Hunk #13 succeeded at 532 (offset 4 lines). patching file src/ata.c patching file src/hddtemp.h patching file src/scsicmds.c Now at patch hddtemp_0.3-beta15-52.diff Signed-off-by: Armin Kuster <akuster808@gmail.com>
kraj
pushed a commit
to kraj/meta-openembedded
that referenced
this pull request
May 29, 2018
When switch PATCHTOOL to patch, the key-replay-cve-multiple.patch can't be apply with "--dry-run" as follows: checking file src/ap/ieee802_11.c checking file src/ap/wpa_auth.c checking file src/ap/wpa_auth.h checking file src/ap/wpa_auth_ft.c checking file src/ap/wpa_auth_i.h checking file src/common/wpa_common.h checking file src/rsn_supp/wpa.c checking file src/rsn_supp/wpa_i.h checking file src/rsn_supp/wpa.c Hunk openembedded#1 FAILED at 709. Hunk openembedded#2 FAILED at 757. Hunk openembedded#3 succeeded at 840 (offset -12 lines). Hunk openembedded#4 FAILED at 868. Hunk openembedded#5 FAILED at 900. Hunk openembedded#6 FAILED at 924. Hunk openembedded#7 succeeded at 1536 (offset -38 lines). Hunk openembedded#8 FAILED at 2386. Hunk openembedded#9 FAILED at 2920. Hunk openembedded#10 succeeded at 2940 (offset -46 lines). Hunk openembedded#11 FAILED at 2998. 8 out of 11 hunks FAILED checking file src/rsn_supp/wpa_i.h Hunk openembedded#1 FAILED at 32. 1 out of 1 hunk FAILED checking file src/common/wpa_common.h Hunk openembedded#1 succeeded at 215 with fuzz 1. checking file src/rsn_supp/wpa.c checking file src/rsn_supp/wpa_i.h checking file src/ap/wpa_auth.c Hunk openembedded#1 succeeded at 1898 (offset -3 lines). Hunk openembedded#2 succeeded at 2470 (offset -3 lines). checking file src/rsn_supp/tdls.c checking file src/rsn_supp/wpa.c Hunk openembedded#1 succeeded at 2378 (offset -62 lines). checking file src/rsn_supp/wpa_ft.c checking file src/rsn_supp/wpa_i.h Hunk openembedded#1 succeeded at 123 (offset -5 lines). So split the key-replay-cve-multiple.patch to 7 patches. Signed-off-by: Zheng Ruoqin <zhengrq.fnst@cn.fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
kraj
pushed a commit
to kraj/meta-openembedded
that referenced
this pull request
May 29, 2018
When switch PATCHTOOL to patch, the key-replay-cve-multiple.patch can't be apply with "--dry-run" as follows: checking file src/ap/ieee802_11.c checking file src/ap/wpa_auth.c checking file src/ap/wpa_auth.h checking file src/ap/wpa_auth_ft.c checking file src/ap/wpa_auth_i.h checking file src/common/wpa_common.h checking file src/rsn_supp/wpa.c checking file src/rsn_supp/wpa_i.h checking file src/rsn_supp/wpa.c Hunk openembedded#1 FAILED at 709. Hunk openembedded#2 FAILED at 757. Hunk openembedded#3 succeeded at 840 (offset -12 lines). Hunk openembedded#4 FAILED at 868. Hunk openembedded#5 FAILED at 900. Hunk openembedded#6 FAILED at 924. Hunk openembedded#7 succeeded at 1536 (offset -38 lines). Hunk openembedded#8 FAILED at 2386. Hunk openembedded#9 FAILED at 2920. Hunk openembedded#10 succeeded at 2940 (offset -46 lines). Hunk openembedded#11 FAILED at 2998. 8 out of 11 hunks FAILED checking file src/rsn_supp/wpa_i.h Hunk openembedded#1 FAILED at 32. 1 out of 1 hunk FAILED checking file src/common/wpa_common.h Hunk openembedded#1 succeeded at 215 with fuzz 1. checking file src/rsn_supp/wpa.c checking file src/rsn_supp/wpa_i.h checking file src/ap/wpa_auth.c Hunk openembedded#1 succeeded at 1898 (offset -3 lines). Hunk openembedded#2 succeeded at 2470 (offset -3 lines). checking file src/rsn_supp/tdls.c checking file src/rsn_supp/wpa.c Hunk openembedded#1 succeeded at 2378 (offset -62 lines). checking file src/rsn_supp/wpa_ft.c checking file src/rsn_supp/wpa_i.h Hunk openembedded#1 succeeded at 123 (offset -5 lines). So split the key-replay-cve-multiple.patch to 7 patches. Signed-off-by: Zheng Ruoqin <zhengrq.fnst@cn.fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
kraj
pushed a commit
to kraj/meta-openembedded
that referenced
this pull request
May 29, 2018
When switch PATCHTOOL to patch, the key-replay-cve-multiple.patch can't be apply with "--dry-run" as follows: checking file src/ap/ieee802_11.c checking file src/ap/wpa_auth.c checking file src/ap/wpa_auth.h checking file src/ap/wpa_auth_ft.c checking file src/ap/wpa_auth_i.h checking file src/common/wpa_common.h checking file src/rsn_supp/wpa.c checking file src/rsn_supp/wpa_i.h checking file src/rsn_supp/wpa.c Hunk openembedded#1 FAILED at 709. Hunk openembedded#2 FAILED at 757. Hunk openembedded#3 succeeded at 840 (offset -12 lines). Hunk openembedded#4 FAILED at 868. Hunk openembedded#5 FAILED at 900. Hunk openembedded#6 FAILED at 924. Hunk openembedded#7 succeeded at 1536 (offset -38 lines). Hunk openembedded#8 FAILED at 2386. Hunk openembedded#9 FAILED at 2920. Hunk openembedded#10 succeeded at 2940 (offset -46 lines). Hunk openembedded#11 FAILED at 2998. 8 out of 11 hunks FAILED checking file src/rsn_supp/wpa_i.h Hunk openembedded#1 FAILED at 32. 1 out of 1 hunk FAILED checking file src/common/wpa_common.h Hunk openembedded#1 succeeded at 215 with fuzz 1. checking file src/rsn_supp/wpa.c checking file src/rsn_supp/wpa_i.h checking file src/ap/wpa_auth.c Hunk openembedded#1 succeeded at 1898 (offset -3 lines). Hunk openembedded#2 succeeded at 2470 (offset -3 lines). checking file src/rsn_supp/tdls.c checking file src/rsn_supp/wpa.c Hunk openembedded#1 succeeded at 2378 (offset -62 lines). checking file src/rsn_supp/wpa_ft.c checking file src/rsn_supp/wpa_i.h Hunk openembedded#1 succeeded at 123 (offset -5 lines). So split the key-replay-cve-multiple.patch to 7 patches. Signed-off-by: Zheng Ruoqin <zhengrq.fnst@cn.fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
jpuhlman
pushed a commit
to MontaVista-OpenSourceTechnology/meta-openembedded
that referenced
this pull request
Jun 13, 2018
Source: meta-openembedded MR: 00000 Type: Integration Disposition: Merged from meta-openembedded ChangeID: 543bb9c Description: When switch PATCHTOOL to patch, the key-replay-cve-multiple.patch can't be apply with "--dry-run" as follows: checking file src/ap/ieee802_11.c checking file src/ap/wpa_auth.c checking file src/ap/wpa_auth.h checking file src/ap/wpa_auth_ft.c checking file src/ap/wpa_auth_i.h checking file src/common/wpa_common.h checking file src/rsn_supp/wpa.c checking file src/rsn_supp/wpa_i.h checking file src/rsn_supp/wpa.c Hunk openembedded#1 FAILED at 709. Hunk openembedded#2 FAILED at 757. Hunk openembedded#3 succeeded at 840 (offset -12 lines). Hunk openembedded#4 FAILED at 868. Hunk openembedded#5 FAILED at 900. Hunk openembedded#6 FAILED at 924. Hunk openembedded#7 succeeded at 1536 (offset -38 lines). Hunk openembedded#8 FAILED at 2386. Hunk openembedded#9 FAILED at 2920. Hunk openembedded#10 succeeded at 2940 (offset -46 lines). Hunk openembedded#11 FAILED at 2998. 8 out of 11 hunks FAILED checking file src/rsn_supp/wpa_i.h Hunk openembedded#1 FAILED at 32. 1 out of 1 hunk FAILED checking file src/common/wpa_common.h Hunk openembedded#1 succeeded at 215 with fuzz 1. checking file src/rsn_supp/wpa.c checking file src/rsn_supp/wpa_i.h checking file src/ap/wpa_auth.c Hunk openembedded#1 succeeded at 1898 (offset -3 lines). Hunk openembedded#2 succeeded at 2470 (offset -3 lines). checking file src/rsn_supp/tdls.c checking file src/rsn_supp/wpa.c Hunk openembedded#1 succeeded at 2378 (offset -62 lines). checking file src/rsn_supp/wpa_ft.c checking file src/rsn_supp/wpa_i.h Hunk openembedded#1 succeeded at 123 (offset -5 lines). So split the key-replay-cve-multiple.patch to 7 patches. Signed-off-by: Zheng Ruoqin <zhengrq.fnst@cn.fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com> Signed-off-by: Jeremy Puhlman <jpuhlman@mvista.com>
kraj
pushed a commit
to YoeDistro/meta-openembedded
that referenced
this pull request
Jun 2, 2020
Overview of changes in 3.36.0 ============================= * Updated translations: Finnish Kurdish (Sorani) Overview of changes in 3.35.90 ============================== * Bugs fixed: !41 Polish some rough edges in the Meson build !43 build: Remove AC_ISC_POSIX !44 build: Remove AC_HEADER_STDC !45 kerberos-identity-manager: Remove unused signal handler ID openembedded#43 daemon, dbus: Enable checking if a provider type is supported * Updated translations: Croatian English (British) Japanese Malay Overview of changes in 3.35.3 ============================= * Remove Pocket (!18) * Bugs fixed: !36 Drop the priv pointer from the GObject instance structures !37 Port away from deprecated GLib API like g_memove and g_get_current_time !39 webview: Port to JSCValue !40 Use the G_DECLARE_* macros to reduce GObject boilerplate openembedded#83 Add Exchange and Last.fm icons * Updated translations: Galician Russian Overview of changes in 3.35.1 ============================= * Bugs fixed: openembedded#8 icons: Unbreak providers without any visual identity Signed-off-by: Andreas Müller <schnitzeltony@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
kraj
pushed a commit
to YoeDistro/meta-openembedded
that referenced
this pull request
Jun 2, 2020
Version 3.36.1 ============== - Fix fullscreen regression. (openembedded#8) - Do not unfocus on new window. - Updated translations. Version 3.36.0 ============== - Fix fullscreen regression. - Remove some dead code. Version 3.35.92 =============== - Use ARGB visual for window frame. Version 3.35.1 ============== - Add support for _GTK_WORKAREAS_Dn. (!3) - Add support for _GNOME_WM_STRUT_AREA. - Clip shape region to window size. (#627879) - Don't move focus to fullscreen window that is on other monitor. - Fix blurry titlebar font. (openembedded#2) - Fix shadow regression with Metacity theme. - Fix some memory leaks. - Updated translations. Signed-off-by: Andreas Müller <schnitzeltony@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
kraj
pushed a commit
to YoeDistro/meta-openembedded
that referenced
this pull request
Jun 2, 2020
Overview of changes in 3.36.0 ============================= * Updated translations: Finnish Kurdish (Sorani) Overview of changes in 3.35.90 ============================== * Bugs fixed: !41 Polish some rough edges in the Meson build !43 build: Remove AC_ISC_POSIX !44 build: Remove AC_HEADER_STDC !45 kerberos-identity-manager: Remove unused signal handler ID openembedded#43 daemon, dbus: Enable checking if a provider type is supported * Updated translations: Croatian English (British) Japanese Malay Overview of changes in 3.35.3 ============================= * Remove Pocket (!18) * Bugs fixed: !36 Drop the priv pointer from the GObject instance structures !37 Port away from deprecated GLib API like g_memove and g_get_current_time !39 webview: Port to JSCValue !40 Use the G_DECLARE_* macros to reduce GObject boilerplate openembedded#83 Add Exchange and Last.fm icons * Updated translations: Galician Russian Overview of changes in 3.35.1 ============================= * Bugs fixed: openembedded#8 icons: Unbreak providers without any visual identity Signed-off-by: Andreas Müller <schnitzeltony@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
kraj
pushed a commit
to YoeDistro/meta-openembedded
that referenced
this pull request
Jun 2, 2020
Version 3.36.1 ============== - Fix fullscreen regression. (openembedded#8) - Do not unfocus on new window. - Updated translations. Version 3.36.0 ============== - Fix fullscreen regression. - Remove some dead code. Version 3.35.92 =============== - Use ARGB visual for window frame. Version 3.35.1 ============== - Add support for _GTK_WORKAREAS_Dn. (!3) - Add support for _GNOME_WM_STRUT_AREA. - Clip shape region to window size. (#627879) - Don't move focus to fullscreen window that is on other monitor. - Fix blurry titlebar font. (openembedded#2) - Fix shadow regression with Metacity theme. - Fix some memory leaks. - Updated translations. Signed-off-by: Andreas Müller <schnitzeltony@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
kraj
pushed a commit
to YoeDistro/meta-openembedded
that referenced
this pull request
Jun 2, 2020
Overview of changes in 3.36.0 ============================= * Updated translations: Finnish Kurdish (Sorani) Overview of changes in 3.35.90 ============================== * Bugs fixed: !41 Polish some rough edges in the Meson build !43 build: Remove AC_ISC_POSIX !44 build: Remove AC_HEADER_STDC !45 kerberos-identity-manager: Remove unused signal handler ID openembedded#43 daemon, dbus: Enable checking if a provider type is supported * Updated translations: Croatian English (British) Japanese Malay Overview of changes in 3.35.3 ============================= * Remove Pocket (!18) * Bugs fixed: !36 Drop the priv pointer from the GObject instance structures !37 Port away from deprecated GLib API like g_memove and g_get_current_time !39 webview: Port to JSCValue !40 Use the G_DECLARE_* macros to reduce GObject boilerplate openembedded#83 Add Exchange and Last.fm icons * Updated translations: Galician Russian Overview of changes in 3.35.1 ============================= * Bugs fixed: openembedded#8 icons: Unbreak providers without any visual identity Signed-off-by: Andreas Müller <schnitzeltony@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
kraj
pushed a commit
to YoeDistro/meta-openembedded
that referenced
this pull request
Jun 2, 2020
Version 3.36.1 ============== - Fix fullscreen regression. (openembedded#8) - Do not unfocus on new window. - Updated translations. Version 3.36.0 ============== - Fix fullscreen regression. - Remove some dead code. Version 3.35.92 =============== - Use ARGB visual for window frame. Version 3.35.1 ============== - Add support for _GTK_WORKAREAS_Dn. (!3) - Add support for _GNOME_WM_STRUT_AREA. - Clip shape region to window size. (#627879) - Don't move focus to fullscreen window that is on other monitor. - Fix blurry titlebar font. (openembedded#2) - Fix shadow regression with Metacity theme. - Fix some memory leaks. - Updated translations. Signed-off-by: Andreas Müller <schnitzeltony@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
kraj
pushed a commit
to YoeDistro/meta-openembedded
that referenced
this pull request
Jun 3, 2020
Overview of changes in 3.36.0 ============================= * Updated translations: Finnish Kurdish (Sorani) Overview of changes in 3.35.90 ============================== * Bugs fixed: !41 Polish some rough edges in the Meson build !43 build: Remove AC_ISC_POSIX !44 build: Remove AC_HEADER_STDC !45 kerberos-identity-manager: Remove unused signal handler ID openembedded#43 daemon, dbus: Enable checking if a provider type is supported * Updated translations: Croatian English (British) Japanese Malay Overview of changes in 3.35.3 ============================= * Remove Pocket (!18) * Bugs fixed: !36 Drop the priv pointer from the GObject instance structures !37 Port away from deprecated GLib API like g_memove and g_get_current_time !39 webview: Port to JSCValue !40 Use the G_DECLARE_* macros to reduce GObject boilerplate openembedded#83 Add Exchange and Last.fm icons * Updated translations: Galician Russian Overview of changes in 3.35.1 ============================= * Bugs fixed: openembedded#8 icons: Unbreak providers without any visual identity Signed-off-by: Andreas Müller <schnitzeltony@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
kraj
pushed a commit
to YoeDistro/meta-openembedded
that referenced
this pull request
Jun 3, 2020
Version 3.36.1 ============== - Fix fullscreen regression. (openembedded#8) - Do not unfocus on new window. - Updated translations. Version 3.36.0 ============== - Fix fullscreen regression. - Remove some dead code. Version 3.35.92 =============== - Use ARGB visual for window frame. Version 3.35.1 ============== - Add support for _GTK_WORKAREAS_Dn. (!3) - Add support for _GNOME_WM_STRUT_AREA. - Clip shape region to window size. (#627879) - Don't move focus to fullscreen window that is on other monitor. - Fix blurry titlebar font. (openembedded#2) - Fix shadow regression with Metacity theme. - Fix some memory leaks. - Updated translations. Signed-off-by: Andreas Müller <schnitzeltony@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
iipeace
pushed a commit
to iipeace/meta-openembedded
that referenced
this pull request
Jun 16, 2020
Overview of changes in 3.36.0 ============================= * Updated translations: Finnish Kurdish (Sorani) Overview of changes in 3.35.90 ============================== * Bugs fixed: !41 Polish some rough edges in the Meson build !43 build: Remove AC_ISC_POSIX !44 build: Remove AC_HEADER_STDC !45 kerberos-identity-manager: Remove unused signal handler ID openembedded#43 daemon, dbus: Enable checking if a provider type is supported * Updated translations: Croatian English (British) Japanese Malay Overview of changes in 3.35.3 ============================= * Remove Pocket (!18) * Bugs fixed: !36 Drop the priv pointer from the GObject instance structures !37 Port away from deprecated GLib API like g_memove and g_get_current_time !39 webview: Port to JSCValue !40 Use the G_DECLARE_* macros to reduce GObject boilerplate openembedded#83 Add Exchange and Last.fm icons * Updated translations: Galician Russian Overview of changes in 3.35.1 ============================= * Bugs fixed: openembedded#8 icons: Unbreak providers without any visual identity Signed-off-by: Andreas Müller <schnitzeltony@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
iipeace
pushed a commit
to iipeace/meta-openembedded
that referenced
this pull request
Jun 16, 2020
Version 3.36.1 ============== - Fix fullscreen regression. (openembedded#8) - Do not unfocus on new window. - Updated translations. Version 3.36.0 ============== - Fix fullscreen regression. - Remove some dead code. Version 3.35.92 =============== - Use ARGB visual for window frame. Version 3.35.1 ============== - Add support for _GTK_WORKAREAS_Dn. (!3) - Add support for _GNOME_WM_STRUT_AREA. - Clip shape region to window size. (#627879) - Don't move focus to fullscreen window that is on other monitor. - Fix blurry titlebar font. (openembedded#2) - Fix shadow regression with Metacity theme. - Fix some memory leaks. - Updated translations. Signed-off-by: Andreas Müller <schnitzeltony@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
kraj
pushed a commit
to YoeDistro/meta-openembedded
that referenced
this pull request
Jul 22, 2020
>From release notes [1]: * Fix saving plugin title with overridden default text (Bug #16822) * Fix extra key press to select search items (Issue openembedded#8) * Fix icon view skipping first item when pressing arrow key * Fix incorrect signal name * Fix nonfunctional grab check * Translation updates: Asturian, Dutch, Esperanto, Hungarian, Icelandic, Portuguese, Portuguese (Brazil), Russian [1] https://gottcode.org/xfce4-whiskermenu-plugin/ Signed-off-by: Andreas Müller <schnitzeltony@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
schnitzeltony
added a commit
to schnitzeltony/meta-openembedded
that referenced
this pull request
Jan 3, 2021
Release notes for 0.8.0 ======================= - fix GarconMenuItem file documentation - Remove GSourceFunc casts - Remove GLIB_CHECK_VERSION IFDEFs which are obsolete after glib bump Release notes for 0.7.3 ======================= [Please note that this is a development release.] - garcon now needs libxfce4ui/4util 4.15.6+ - Use the symbolic close icon in the error dialog - Don't launch apps as children - bump glib (and gio, gthread, etc) minimum to 2.50.0 - relax automake requirement to 1.15 - Add new icon needed for xfce4-about-dialog. - Translation Updates: Slovenian Release notes for 0.7.2 ======================= [Please note that this is a development release.] - Update README.md - Translation Updates: Armenian, Armenian (Armenia), Hebrew, Lithuanian, Occitan (post 1500), Uyghur Release notes for 0.7.1 ======================= [Please note that this is a development release.] - Drop support for Gtk2 - Drop Gtk3 ifdefs - Switch to xfce_gtk_image_menu_item - Add support for GObject Introspection (Fixes openembedded#4) - Improve GObject introspection annotations (Fixes openembedded#8) - Fix missing transfer annotation - Field codes expansion API update - Transfer some code to libxfce4util - Fix default merge rules in xfce-applications.menu (Bug #15504) - Rename exo-helpers to the new xfce4-xx ones - Do not add INSTALL in dist tarball - Fix a memory leak - Switch to README.md and foreign automake mode - README: Use table for debug arguments - Add basic GitLab pipeline - Translation Updates: Albanian, Asturian, Chinese (Hong Kong), Danish, Dutch, Eastern Armenian, Estonian, Greek, Hebrew, Indonesian, Interlingue, Norwegian Nynorsk, Polish, Portuguese, Uzbek, Uzbek (Latin) Signed-off-by: Andreas Müller <schnitzeltony@gmail.com>
schnitzeltony
added a commit
to schnitzeltony/meta-openembedded
that referenced
this pull request
Jan 4, 2021
Release notes for 0.8.0 ======================= - fix GarconMenuItem file documentation - Remove GSourceFunc casts - Remove GLIB_CHECK_VERSION IFDEFs which are obsolete after glib bump Release notes for 0.7.3 ======================= [Please note that this is a development release.] - garcon now needs libxfce4ui/4util 4.15.6+ - Use the symbolic close icon in the error dialog - Don't launch apps as children - bump glib (and gio, gthread, etc) minimum to 2.50.0 - relax automake requirement to 1.15 - Add new icon needed for xfce4-about-dialog. - Translation Updates: Slovenian Release notes for 0.7.2 ======================= [Please note that this is a development release.] - Update README.md - Translation Updates: Armenian, Armenian (Armenia), Hebrew, Lithuanian, Occitan (post 1500), Uyghur Release notes for 0.7.1 ======================= [Please note that this is a development release.] - Drop support for Gtk2 - Drop Gtk3 ifdefs - Switch to xfce_gtk_image_menu_item - Add support for GObject Introspection (Fixes openembedded#4) - Improve GObject introspection annotations (Fixes openembedded#8) - Fix missing transfer annotation - Field codes expansion API update - Transfer some code to libxfce4util - Fix default merge rules in xfce-applications.menu (Bug #15504) - Rename exo-helpers to the new xfce4-xx ones - Do not add INSTALL in dist tarball - Fix a memory leak - Switch to README.md and foreign automake mode - README: Use table for debug arguments - Add basic GitLab pipeline - Translation Updates: Albanian, Asturian, Chinese (Hong Kong), Danish, Dutch, Eastern Armenian, Estonian, Greek, Hebrew, Indonesian, Interlingue, Norwegian Nynorsk, Polish, Portuguese, Uzbek, Uzbek (Latin) Signed-off-by: Andreas Müller <schnitzeltony@gmail.com>
schnitzeltony
added a commit
to schnitzeltony/meta-openembedded
that referenced
this pull request
Jan 6, 2021
Release notes for 0.8.0 ======================= - fix GarconMenuItem file documentation - Remove GSourceFunc casts - Remove GLIB_CHECK_VERSION IFDEFs which are obsolete after glib bump Release notes for 0.7.3 ======================= [Please note that this is a development release.] - garcon now needs libxfce4ui/4util 4.15.6+ - Use the symbolic close icon in the error dialog - Don't launch apps as children - bump glib (and gio, gthread, etc) minimum to 2.50.0 - relax automake requirement to 1.15 - Add new icon needed for xfce4-about-dialog. - Translation Updates: Slovenian Release notes for 0.7.2 ======================= [Please note that this is a development release.] - Update README.md - Translation Updates: Armenian, Armenian (Armenia), Hebrew, Lithuanian, Occitan (post 1500), Uyghur Release notes for 0.7.1 ======================= [Please note that this is a development release.] - Drop support for Gtk2 - Drop Gtk3 ifdefs - Switch to xfce_gtk_image_menu_item - Add support for GObject Introspection (Fixes openembedded#4) - Improve GObject introspection annotations (Fixes openembedded#8) - Fix missing transfer annotation - Field codes expansion API update - Transfer some code to libxfce4util - Fix default merge rules in xfce-applications.menu (Bug #15504) - Rename exo-helpers to the new xfce4-xx ones - Do not add INSTALL in dist tarball - Fix a memory leak - Switch to README.md and foreign automake mode - README: Use table for debug arguments - Add basic GitLab pipeline - Translation Updates: Albanian, Asturian, Chinese (Hong Kong), Danish, Dutch, Eastern Armenian, Estonian, Greek, Hebrew, Indonesian, Interlingue, Norwegian Nynorsk, Polish, Portuguese, Uzbek, Uzbek (Latin) Signed-off-by: Andreas Müller <schnitzeltony@gmail.com>
kraj
pushed a commit
to YoeDistro/meta-openembedded
that referenced
this pull request
Jan 6, 2021
Release notes for 0.8.0 ======================= - fix GarconMenuItem file documentation - Remove GSourceFunc casts - Remove GLIB_CHECK_VERSION IFDEFs which are obsolete after glib bump Release notes for 0.7.3 ======================= [Please note that this is a development release.] - garcon now needs libxfce4ui/4util 4.15.6+ - Use the symbolic close icon in the error dialog - Don't launch apps as children - bump glib (and gio, gthread, etc) minimum to 2.50.0 - relax automake requirement to 1.15 - Add new icon needed for xfce4-about-dialog. - Translation Updates: Slovenian Release notes for 0.7.2 ======================= [Please note that this is a development release.] - Update README.md - Translation Updates: Armenian, Armenian (Armenia), Hebrew, Lithuanian, Occitan (post 1500), Uyghur Release notes for 0.7.1 ======================= [Please note that this is a development release.] - Drop support for Gtk2 - Drop Gtk3 ifdefs - Switch to xfce_gtk_image_menu_item - Add support for GObject Introspection (Fixes openembedded#4) - Improve GObject introspection annotations (Fixes openembedded#8) - Fix missing transfer annotation - Field codes expansion API update - Transfer some code to libxfce4util - Fix default merge rules in xfce-applications.menu (Bug #15504) - Rename exo-helpers to the new xfce4-xx ones - Do not add INSTALL in dist tarball - Fix a memory leak - Switch to README.md and foreign automake mode - README: Use table for debug arguments - Add basic GitLab pipeline - Translation Updates: Albanian, Asturian, Chinese (Hong Kong), Danish, Dutch, Eastern Armenian, Estonian, Greek, Hebrew, Indonesian, Interlingue, Norwegian Nynorsk, Polish, Portuguese, Uzbek, Uzbek (Latin) Signed-off-by: Andreas Müller <schnitzeltony@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
kraj
pushed a commit
to YoeDistro/meta-openembedded
that referenced
this pull request
Jan 6, 2021
Release notes for 0.8.0 ======================= - fix GarconMenuItem file documentation - Remove GSourceFunc casts - Remove GLIB_CHECK_VERSION IFDEFs which are obsolete after glib bump Release notes for 0.7.3 ======================= [Please note that this is a development release.] - garcon now needs libxfce4ui/4util 4.15.6+ - Use the symbolic close icon in the error dialog - Don't launch apps as children - bump glib (and gio, gthread, etc) minimum to 2.50.0 - relax automake requirement to 1.15 - Add new icon needed for xfce4-about-dialog. - Translation Updates: Slovenian Release notes for 0.7.2 ======================= [Please note that this is a development release.] - Update README.md - Translation Updates: Armenian, Armenian (Armenia), Hebrew, Lithuanian, Occitan (post 1500), Uyghur Release notes for 0.7.1 ======================= [Please note that this is a development release.] - Drop support for Gtk2 - Drop Gtk3 ifdefs - Switch to xfce_gtk_image_menu_item - Add support for GObject Introspection (Fixes openembedded#4) - Improve GObject introspection annotations (Fixes openembedded#8) - Fix missing transfer annotation - Field codes expansion API update - Transfer some code to libxfce4util - Fix default merge rules in xfce-applications.menu (Bug #15504) - Rename exo-helpers to the new xfce4-xx ones - Do not add INSTALL in dist tarball - Fix a memory leak - Switch to README.md and foreign automake mode - README: Use table for debug arguments - Add basic GitLab pipeline - Translation Updates: Albanian, Asturian, Chinese (Hong Kong), Danish, Dutch, Eastern Armenian, Estonian, Greek, Hebrew, Indonesian, Interlingue, Norwegian Nynorsk, Polish, Portuguese, Uzbek, Uzbek (Latin) Signed-off-by: Andreas Müller <schnitzeltony@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
kraj
pushed a commit
to YoeDistro/meta-openembedded
that referenced
this pull request
Jan 6, 2021
Release notes for 0.8.0 ======================= - fix GarconMenuItem file documentation - Remove GSourceFunc casts - Remove GLIB_CHECK_VERSION IFDEFs which are obsolete after glib bump Release notes for 0.7.3 ======================= [Please note that this is a development release.] - garcon now needs libxfce4ui/4util 4.15.6+ - Use the symbolic close icon in the error dialog - Don't launch apps as children - bump glib (and gio, gthread, etc) minimum to 2.50.0 - relax automake requirement to 1.15 - Add new icon needed for xfce4-about-dialog. - Translation Updates: Slovenian Release notes for 0.7.2 ======================= [Please note that this is a development release.] - Update README.md - Translation Updates: Armenian, Armenian (Armenia), Hebrew, Lithuanian, Occitan (post 1500), Uyghur Release notes for 0.7.1 ======================= [Please note that this is a development release.] - Drop support for Gtk2 - Drop Gtk3 ifdefs - Switch to xfce_gtk_image_menu_item - Add support for GObject Introspection (Fixes openembedded#4) - Improve GObject introspection annotations (Fixes openembedded#8) - Fix missing transfer annotation - Field codes expansion API update - Transfer some code to libxfce4util - Fix default merge rules in xfce-applications.menu (Bug #15504) - Rename exo-helpers to the new xfce4-xx ones - Do not add INSTALL in dist tarball - Fix a memory leak - Switch to README.md and foreign automake mode - README: Use table for debug arguments - Add basic GitLab pipeline - Translation Updates: Albanian, Asturian, Chinese (Hong Kong), Danish, Dutch, Eastern Armenian, Estonian, Greek, Hebrew, Indonesian, Interlingue, Norwegian Nynorsk, Polish, Portuguese, Uzbek, Uzbek (Latin) Signed-off-by: Andreas Müller <schnitzeltony@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
schnitzeltony
added a commit
to schnitzeltony/meta-openembedded
that referenced
this pull request
Jan 7, 2021
Release notes for 0.8.0 ======================= - fix GarconMenuItem file documentation - Remove GSourceFunc casts - Remove GLIB_CHECK_VERSION IFDEFs which are obsolete after glib bump Release notes for 0.7.3 ======================= [Please note that this is a development release.] - garcon now needs libxfce4ui/4util 4.15.6+ - Use the symbolic close icon in the error dialog - Don't launch apps as children - bump glib (and gio, gthread, etc) minimum to 2.50.0 - relax automake requirement to 1.15 - Add new icon needed for xfce4-about-dialog. - Translation Updates: Slovenian Release notes for 0.7.2 ======================= [Please note that this is a development release.] - Update README.md - Translation Updates: Armenian, Armenian (Armenia), Hebrew, Lithuanian, Occitan (post 1500), Uyghur Release notes for 0.7.1 ======================= [Please note that this is a development release.] - Drop support for Gtk2 - Drop Gtk3 ifdefs - Switch to xfce_gtk_image_menu_item - Add support for GObject Introspection (Fixes openembedded#4) - Improve GObject introspection annotations (Fixes openembedded#8) - Fix missing transfer annotation - Field codes expansion API update - Transfer some code to libxfce4util - Fix default merge rules in xfce-applications.menu (Bug #15504) - Rename exo-helpers to the new xfce4-xx ones - Do not add INSTALL in dist tarball - Fix a memory leak - Switch to README.md and foreign automake mode - README: Use table for debug arguments - Add basic GitLab pipeline - Translation Updates: Albanian, Asturian, Chinese (Hong Kong), Danish, Dutch, Eastern Armenian, Estonian, Greek, Hebrew, Indonesian, Interlingue, Norwegian Nynorsk, Polish, Portuguese, Uzbek, Uzbek (Latin) Signed-off-by: Andreas Müller <schnitzeltony@gmail.com>
schnitzeltony
added a commit
to schnitzeltony/meta-openembedded
that referenced
this pull request
Mar 7, 2021
Although not mentioned below and obstacles in the way, 0001-Makefile.in.in-remove-bashisms.patch made it upstream [1]. Release notes for 1.0.13 ======================== New Features: - Add Cupertino layout (openembedded#7) - Add Redmond 7 layout (openembedded#8) - Add Xfce 4.16 layout General: - Updated existing templates to support Xfce 4.16 - Makefile.in.in: remove bashisms - Enabled exporting Whisker menu configuration (openembedded#11) Updated translations [1] https://gitlab.xfce.org/apps/xfce4-panel-profiles/-/commit/1565fe5f450732a82a76b828610fc935501584d0 Signed-off-by: Andreas Müller <schnitzeltony@gmail.com>
kraj
pushed a commit
to YoeDistro/meta-openembedded
that referenced
this pull request
Mar 8, 2021
Although not mentioned below and obstacles in the way, 0001-Makefile.in.in-remove-bashisms.patch made it upstream [1]. Release notes for 1.0.13 ======================== New Features: - Add Cupertino layout (openembedded#7) - Add Redmond 7 layout (openembedded#8) - Add Xfce 4.16 layout General: - Updated existing templates to support Xfce 4.16 - Makefile.in.in: remove bashisms - Enabled exporting Whisker menu configuration (openembedded#11) Updated translations [1] https://gitlab.xfce.org/apps/xfce4-panel-profiles/-/commit/1565fe5f450732a82a76b828610fc935501584d0 Signed-off-by: Andreas Müller <schnitzeltony@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
kraj
pushed a commit
to YoeDistro/meta-openembedded
that referenced
this pull request
Mar 7, 2022
Changelog: ========= Fix openembedded#8 by adding missing gettimeofday.c to MANIFEST.in Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
kraj
pushed a commit
to YoeDistro/meta-openembedded
that referenced
this pull request
Mar 7, 2022
Changelog: ========= Fix openembedded#8 by adding missing gettimeofday.c to MANIFEST.in Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
kraj
pushed a commit
to YoeDistro/meta-openembedded
that referenced
this pull request
Mar 7, 2022
Changelog: ========= Fix openembedded#8 by adding missing gettimeofday.c to MANIFEST.in Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
kraj
pushed a commit
to YoeDistro/meta-openembedded
that referenced
this pull request
Mar 8, 2022
Changelog: ========= Fix openembedded#8 by adding missing gettimeofday.c to MANIFEST.in Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
kraj
pushed a commit
to YoeDistro/meta-openembedded
that referenced
this pull request
Mar 8, 2022
Changelog: ========= Fix openembedded#8 by adding missing gettimeofday.c to MANIFEST.in Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
kraj
pushed a commit
to YoeDistro/meta-openembedded
that referenced
this pull request
Mar 9, 2022
Changelog: ========= Fix openembedded#8 by adding missing gettimeofday.c to MANIFEST.in Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
halstead
pushed a commit
that referenced
this pull request
Mar 9, 2022
Changelog: ========= Fix #8 by adding missing gettimeofday.c to MANIFEST.in Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com> Signed-off-by: Trevor Gamblin <trevor.gamblin@windriver.com>
kraj
pushed a commit
to YoeDistro/meta-openembedded
that referenced
this pull request
Mar 4, 2023
Changelog: ========== fix incorrect behaviour of __or__ and __ior__, see openembedded#8 Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
kraj
pushed a commit
to YoeDistro/meta-openembedded
that referenced
this pull request
Mar 4, 2023
Changelog: ========== fix incorrect behaviour of __or__ and __ior__, see openembedded#8 Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
kraj
pushed a commit
to YoeDistro/meta-openembedded
that referenced
this pull request
Mar 4, 2023
Changelog: ========== fix incorrect behaviour of __or__ and __ior__, see openembedded#8 Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Only the multipath-tools commit is new. The others are already in master. This is actually a dup of a patch I sent to openembedded-devel.