Signed-off-by: Zheng Ruoqin <zhengrq.f...@fujitsu.com> --- ...t-using-sandbox-when-cross-compiling.patch | 33 ----------------- ...467179428a0e3ea9e4aa9738ac12ff02822d.patch | 35 ------------------- .../{openssh_8.9p1.bb => openssh_9.0p1.bb} | 4 +-- 3 files changed, 1 insertion(+), 71 deletions(-) delete mode 100644 meta/recipes-connectivity/openssh/openssh/0001-Default-to-not-using-sandbox-when-cross-compiling.patch delete mode 100644 meta/recipes-connectivity/openssh/openssh/f107467179428a0e3ea9e4aa9738ac12ff02822d.patch rename meta/recipes-connectivity/openssh/{openssh_8.9p1.bb => openssh_9.0p1.bb} (96%)
diff --git a/meta/recipes-connectivity/openssh/openssh/0001-Default-to-not-using-sandbox-when-cross-compiling.patch b/meta/recipes-connectivity/openssh/openssh/0001-Default-to-not-using-sandbox-when-cross-compiling.patch deleted file mode 100644 index 0241c290ac..0000000000 --- a/meta/recipes-connectivity/openssh/openssh/0001-Default-to-not-using-sandbox-when-cross-compiling.patch +++ /dev/null @@ -1,33 +0,0 @@ -From 56194e9a6043873b0ec84f9d15c6e4caca2580c8 Mon Sep 17 00:00:00 2001 -From: Darren Tucker <dtuc...@dtucker.net> -Date: Tue, 8 Mar 2022 20:04:06 +1100 -Subject: [PATCH] Default to not using sandbox when cross compiling. - -On most systems poll(2) does not work when the number of FDs is reduced -with setrlimit, so assume it doesn't when cross compiling and we can't -run the test. bz#3398. - -Signed-off-by: Khem Raj <raj.k...@gmail.com> -Upstream-Status: Backport [https://anongit.mindrot.org/openssh.git/patch/?id=8cf5275452a950869cb90eeac7d220b01f77b12e] ---- - configure.ac | 4 ++-- - 1 file changed, 2 insertions(+), 2 deletions(-) - -diff --git a/configure.ac b/configure.ac -index 17fb1e6..a165d08 100644 ---- a/configure.ac -+++ b/configure.ac -@@ -3574,8 +3574,8 @@ AC_RUN_IFELSE( - select_works_with_rlimit=yes], - [AC_MSG_RESULT([no]) - select_works_with_rlimit=no], -- [AC_MSG_WARN([cross compiling: assuming yes]) -- select_works_with_rlimit=yes] -+ [AC_MSG_WARN([cross compiling: assuming no]) -+ select_works_with_rlimit=no] - ) - - AC_CHECK_MEMBERS([struct pollfd.fd], [], [], [[ --- -2.35.1 - diff --git a/meta/recipes-connectivity/openssh/openssh/f107467179428a0e3ea9e4aa9738ac12ff02822d.patch b/meta/recipes-connectivity/openssh/openssh/f107467179428a0e3ea9e4aa9738ac12ff02822d.patch deleted file mode 100644 index 847c0a143c..0000000000 --- a/meta/recipes-connectivity/openssh/openssh/f107467179428a0e3ea9e4aa9738ac12ff02822d.patch +++ /dev/null @@ -1,35 +0,0 @@ -From f107467179428a0e3ea9e4aa9738ac12ff02822d Mon Sep 17 00:00:00 2001 -From: Colin Watson <cjwat...@debian.org> -Date: Thu, 24 Feb 2022 16:04:18 +0000 -Subject: [PATCH] Improve detection of -fzero-call-used-regs=all support - -GCC doesn't tell us whether this option is supported unless it runs into -the situation where it would need to emit corresponding code. - -Upstream-Status: Backport -Signed-off-by: Alexander Kanavin <a...@linutronix.de> ---- - m4/openssh.m4 | 3 +++ - 1 file changed, 3 insertions(+) - -diff --git a/m4/openssh.m4 b/m4/openssh.m4 -index 4f9c3792dc1..8c33c701b8b 100644 ---- a/m4/openssh.m4 -+++ b/m4/openssh.m4 -@@ -14,6 +14,8 @@ AC_DEFUN([OSSH_CHECK_CFLAG_COMPILE], [{ - AC_COMPILE_IFELSE([AC_LANG_SOURCE([[ - #include <stdlib.h> - #include <stdio.h> -+/* Trivial function to help test for -fzero-call-used-regs */ -+void f(int n) {} - int main(int argc, char **argv) { - (void)argv; - /* Some math to catch -ftrapv problems in the toolchain */ -@@ -21,6 +23,7 @@ int main(int argc, char **argv) { - float l = i * 2.1; - double m = l / 0.5; - long long int n = argc * 12345LL, o = 12345LL * (long long int)argc; -+ f(0); - printf("%d %d %d %f %f %lld %lld\n", i, j, k, l, m, n, o); - /* - * Test fallthrough behaviour. clang 10's -Wimplicit-fallthrough does diff --git a/meta/recipes-connectivity/openssh/openssh_8.9p1.bb b/meta/recipes-connectivity/openssh/openssh_9.0p1.bb similarity index 96% rename from meta/recipes-connectivity/openssh/openssh_8.9p1.bb rename to meta/recipes-connectivity/openssh/openssh_9.0p1.bb index f306b1245a..975faed547 100644 --- a/meta/recipes-connectivity/openssh/openssh_8.9p1.bb +++ b/meta/recipes-connectivity/openssh/openssh_9.0p1.bb @@ -24,10 +24,8 @@ SRC_URI = "http://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-${PV}.tar file://fix-potential-signed-overflow-in-pointer-arithmatic.patch \ file://sshd_check_keys \ file://add-test-support-for-busybox.patch \ - file://f107467179428a0e3ea9e4aa9738ac12ff02822d.patch \ - file://0001-Default-to-not-using-sandbox-when-cross-compiling.patch \ " -SRC_URI[sha256sum] = "fd497654b7ab1686dac672fb83dfb4ba4096e8b5ffcdaccd262380ae58bec5e7" +SRC_URI[sha256sum] = "03974302161e9ecce32153cfa10012f1e65c8f3750f573a73ab1befd5972a28a" # This CVE is specific to OpenSSH with the pam opie which we don't build/use here CVE_CHECK_IGNORE += "CVE-2007-2768" -- 2.25.1
-=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#164600): https://lists.openembedded.org/g/openembedded-core/message/164600 Mute This Topic: https://lists.openembedded.org/mt/90538190/21656 Group Owner: openembedded-core+ow...@lists.openembedded.org Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub [arch...@mail-archive.com] -=-=-=-=-=-=-=-=-=-=-=-