summaryrefslogtreecommitdiffstats
path: root/meta/recipes-connectivity/openssh
diff options
context:
space:
mode:
authorzhengruoqin <zhengrq.fnst@fujitsu.com>2022-04-18 20:27:14 +0800
committerRichard Purdie <richard.purdie@linuxfoundation.org>2022-04-19 14:14:12 +0100
commit6d46321a15134bf5b7ebf9789ce8e464d0153d04 (patch)
tree1f845f3779b606c765a0c0256d52118c2702bf0b /meta/recipes-connectivity/openssh
parentbab5779e9156dad6b169b61db082c8bd1b12084b (diff)
downloadpoky-6d46321a15134bf5b7ebf9789ce8e464d0153d04.tar.gz
openssh: upgrade 8.9p1 -> 9.0p1
(From OE-Core rev: ee2b6da307512beecebc468194d614ba5de33d01) Signed-off-by: Zheng Ruoqin <zhengrq.fnst@fujitsu.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-connectivity/openssh')
-rw-r--r--meta/recipes-connectivity/openssh/openssh/0001-Default-to-not-using-sandbox-when-cross-compiling.patch33
-rw-r--r--meta/recipes-connectivity/openssh/openssh/f107467179428a0e3ea9e4aa9738ac12ff02822d.patch35
-rw-r--r--meta/recipes-connectivity/openssh/openssh_9.0p1.bb (renamed from meta/recipes-connectivity/openssh/openssh_8.9p1.bb)4
3 files changed, 1 insertions, 71 deletions
diff --git a/meta/recipes-connectivity/openssh/openssh/0001-Default-to-not-using-sandbox-when-cross-compiling.patch b/meta/recipes-connectivity/openssh/openssh/0001-Default-to-not-using-sandbox-when-cross-compiling.patch
deleted file mode 100644
index 0241c290ac..0000000000
--- a/meta/recipes-connectivity/openssh/openssh/0001-Default-to-not-using-sandbox-when-cross-compiling.patch
+++ /dev/null
@@ -1,33 +0,0 @@
1From 56194e9a6043873b0ec84f9d15c6e4caca2580c8 Mon Sep 17 00:00:00 2001
2From: Darren Tucker <dtucker@dtucker.net>
3Date: Tue, 8 Mar 2022 20:04:06 +1100
4Subject: [PATCH] Default to not using sandbox when cross compiling.
5
6On most systems poll(2) does not work when the number of FDs is reduced
7with setrlimit, so assume it doesn't when cross compiling and we can't
8run the test. bz#3398.
9
10Signed-off-by: Khem Raj <raj.khem@gmail.com>
11Upstream-Status: Backport [https://anongit.mindrot.org/openssh.git/patch/?id=8cf5275452a950869cb90eeac7d220b01f77b12e]
12---
13 configure.ac | 4 ++--
14 1 file changed, 2 insertions(+), 2 deletions(-)
15
16diff --git a/configure.ac b/configure.ac
17index 17fb1e6..a165d08 100644
18--- a/configure.ac
19+++ b/configure.ac
20@@ -3574,8 +3574,8 @@ AC_RUN_IFELSE(
21 select_works_with_rlimit=yes],
22 [AC_MSG_RESULT([no])
23 select_works_with_rlimit=no],
24- [AC_MSG_WARN([cross compiling: assuming yes])
25- select_works_with_rlimit=yes]
26+ [AC_MSG_WARN([cross compiling: assuming no])
27+ select_works_with_rlimit=no]
28 )
29
30 AC_CHECK_MEMBERS([struct pollfd.fd], [], [], [[
31--
322.35.1
33
diff --git a/meta/recipes-connectivity/openssh/openssh/f107467179428a0e3ea9e4aa9738ac12ff02822d.patch b/meta/recipes-connectivity/openssh/openssh/f107467179428a0e3ea9e4aa9738ac12ff02822d.patch
deleted file mode 100644
index 847c0a143c..0000000000
--- a/meta/recipes-connectivity/openssh/openssh/f107467179428a0e3ea9e4aa9738ac12ff02822d.patch
+++ /dev/null
@@ -1,35 +0,0 @@
1From f107467179428a0e3ea9e4aa9738ac12ff02822d Mon Sep 17 00:00:00 2001
2From: Colin Watson <cjwatson@debian.org>
3Date: Thu, 24 Feb 2022 16:04:18 +0000
4Subject: [PATCH] Improve detection of -fzero-call-used-regs=all support
5
6GCC doesn't tell us whether this option is supported unless it runs into
7the situation where it would need to emit corresponding code.
8
9Upstream-Status: Backport
10Signed-off-by: Alexander Kanavin <alex@linutronix.de>
11---
12 m4/openssh.m4 | 3 +++
13 1 file changed, 3 insertions(+)
14
15diff --git a/m4/openssh.m4 b/m4/openssh.m4
16index 4f9c3792dc1..8c33c701b8b 100644
17--- a/m4/openssh.m4
18+++ b/m4/openssh.m4
19@@ -14,6 +14,8 @@ AC_DEFUN([OSSH_CHECK_CFLAG_COMPILE], [{
20 AC_COMPILE_IFELSE([AC_LANG_SOURCE([[
21 #include <stdlib.h>
22 #include <stdio.h>
23+/* Trivial function to help test for -fzero-call-used-regs */
24+void f(int n) {}
25 int main(int argc, char **argv) {
26 (void)argv;
27 /* Some math to catch -ftrapv problems in the toolchain */
28@@ -21,6 +23,7 @@ int main(int argc, char **argv) {
29 float l = i * 2.1;
30 double m = l / 0.5;
31 long long int n = argc * 12345LL, o = 12345LL * (long long int)argc;
32+ f(0);
33 printf("%d %d %d %f %f %lld %lld\n", i, j, k, l, m, n, o);
34 /*
35 * Test fallthrough behaviour. clang 10's -Wimplicit-fallthrough does
diff --git a/meta/recipes-connectivity/openssh/openssh_8.9p1.bb b/meta/recipes-connectivity/openssh/openssh_9.0p1.bb
index f306b1245a..975faed547 100644
--- a/meta/recipes-connectivity/openssh/openssh_8.9p1.bb
+++ b/meta/recipes-connectivity/openssh/openssh_9.0p1.bb
@@ -24,10 +24,8 @@ SRC_URI = "http://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-${PV}.tar
24 file://fix-potential-signed-overflow-in-pointer-arithmatic.patch \ 24 file://fix-potential-signed-overflow-in-pointer-arithmatic.patch \
25 file://sshd_check_keys \ 25 file://sshd_check_keys \
26 file://add-test-support-for-busybox.patch \ 26 file://add-test-support-for-busybox.patch \
27 file://f107467179428a0e3ea9e4aa9738ac12ff02822d.patch \
28 file://0001-Default-to-not-using-sandbox-when-cross-compiling.patch \
29 " 27 "
30SRC_URI[sha256sum] = "fd497654b7ab1686dac672fb83dfb4ba4096e8b5ffcdaccd262380ae58bec5e7" 28SRC_URI[sha256sum] = "03974302161e9ecce32153cfa10012f1e65c8f3750f573a73ab1befd5972a28a"
31 29
32# This CVE is specific to OpenSSH with the pam opie which we don't build/use here 30# This CVE is specific to OpenSSH with the pam opie which we don't build/use here
33CVE_CHECK_IGNORE += "CVE-2007-2768" 31CVE_CHECK_IGNORE += "CVE-2007-2768"