diff options
author | Alexander Kanavin <alex.kanavin@gmail.com> | 2022-05-05 07:04:45 +0200 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2022-05-05 21:17:37 +0100 |
commit | 990b07108707a1b7c252b7d7e2e4c92410943859 (patch) | |
tree | 6a1ea2d60b821a194173011f7a854b07440580b9 /meta/recipes-core/systemd/systemd/0012-don-t-pass-AT_SYMLINK_NOFOLLOW-flag-to-faccessat.patch | |
parent | 4eba2c38d7ea200fed9479abed336496cc1c3e1f (diff) | |
download | poky-990b07108707a1b7c252b7d7e2e4c92410943859.tar.gz |
systemd: upgrade 250.4 -> 250.5
Drop 0029-network-enable-KeepConfiguration-when-running-on-net.patch as
patch merged upstream.
(From OE-Core rev: e07ba76fc78b44f338e574644a8ae3b6cddc9f08)
Signed-off-by: Alexander Kanavin <alex@linutronix.de>
Signed-off-by: Luca Ceresoli <luca.ceresoli@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-core/systemd/systemd/0012-don-t-pass-AT_SYMLINK_NOFOLLOW-flag-to-faccessat.patch')
-rw-r--r-- | meta/recipes-core/systemd/systemd/0012-don-t-pass-AT_SYMLINK_NOFOLLOW-flag-to-faccessat.patch | 18 |
1 files changed, 11 insertions, 7 deletions
diff --git a/meta/recipes-core/systemd/systemd/0012-don-t-pass-AT_SYMLINK_NOFOLLOW-flag-to-faccessat.patch b/meta/recipes-core/systemd/systemd/0012-don-t-pass-AT_SYMLINK_NOFOLLOW-flag-to-faccessat.patch index 0026a7b72a..6eecd3197c 100644 --- a/meta/recipes-core/systemd/systemd/0012-don-t-pass-AT_SYMLINK_NOFOLLOW-flag-to-faccessat.patch +++ b/meta/recipes-core/systemd/systemd/0012-don-t-pass-AT_SYMLINK_NOFOLLOW-flag-to-faccessat.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 5d4c6b2f4b88b69b31f967371d2a6136c65dc3fd Mon Sep 17 00:00:00 2001 | 1 | From 46fdc959257d60d9b32953cae0152ae118f8564b Mon Sep 17 00:00:00 2001 |
2 | From: Andre McCurdy <armccurdy@gmail.com> | 2 | From: Andre McCurdy <armccurdy@gmail.com> |
3 | Date: Tue, 10 Oct 2017 14:33:30 -0700 | 3 | Date: Tue, 10 Oct 2017 14:33:30 -0700 |
4 | Subject: [PATCH] don't pass AT_SYMLINK_NOFOLLOW flag to faccessat() | 4 | Subject: [PATCH] don't pass AT_SYMLINK_NOFOLLOW flag to faccessat() |
@@ -27,13 +27,15 @@ Upstream-Status: Inappropriate [musl specific] | |||
27 | Signed-off-by: Andre McCurdy <armccurdy@gmail.com> | 27 | Signed-off-by: Andre McCurdy <armccurdy@gmail.com> |
28 | 28 | ||
29 | --- | 29 | --- |
30 | src/basic/fs-util.h | 23 +++++++++++++++++++++-- | 30 | src/basic/fs-util.h | 21 ++++++++++++++++++++- |
31 | src/shared/base-filesystem.c | 6 +++--- | 31 | src/shared/base-filesystem.c | 6 +++--- |
32 | 2 files changed, 24 insertions(+), 5 deletions(-) | 32 | 2 files changed, 23 insertions(+), 4 deletions(-) |
33 | 33 | ||
34 | diff --git a/src/basic/fs-util.h b/src/basic/fs-util.h | ||
35 | index 0bbb3f6298..3dc494dbfb 100644 | ||
34 | --- a/src/basic/fs-util.h | 36 | --- a/src/basic/fs-util.h |
35 | +++ b/src/basic/fs-util.h | 37 | +++ b/src/basic/fs-util.h |
36 | @@ -46,8 +46,27 @@ int futimens_opath(int fd, const struct | 38 | @@ -46,8 +46,27 @@ int futimens_opath(int fd, const struct timespec ts[2]); |
37 | int fd_warn_permissions(const char *path, int fd); | 39 | int fd_warn_permissions(const char *path, int fd); |
38 | int stat_warn_permissions(const char *path, const struct stat *st); | 40 | int stat_warn_permissions(const char *path, const struct stat *st); |
39 | 41 | ||
@@ -62,9 +64,11 @@ Signed-off-by: Andre McCurdy <armccurdy@gmail.com> | |||
62 | 64 | ||
63 | int touch_file(const char *path, bool parents, usec_t stamp, uid_t uid, gid_t gid, mode_t mode); | 65 | int touch_file(const char *path, bool parents, usec_t stamp, uid_t uid, gid_t gid, mode_t mode); |
64 | int touch(const char *path); | 66 | int touch(const char *path); |
67 | diff --git a/src/shared/base-filesystem.c b/src/shared/base-filesystem.c | ||
68 | index 5f5328c8cf..d396bc99fe 100644 | ||
65 | --- a/src/shared/base-filesystem.c | 69 | --- a/src/shared/base-filesystem.c |
66 | +++ b/src/shared/base-filesystem.c | 70 | +++ b/src/shared/base-filesystem.c |
67 | @@ -117,7 +117,7 @@ int base_filesystem_create(const char *r | 71 | @@ -117,7 +117,7 @@ int base_filesystem_create(const char *root, uid_t uid, gid_t gid) { |
68 | return log_error_errno(errno, "Failed to open root file system: %m"); | 72 | return log_error_errno(errno, "Failed to open root file system: %m"); |
69 | 73 | ||
70 | for (size_t i = 0; i < ELEMENTSOF(table); i++) { | 74 | for (size_t i = 0; i < ELEMENTSOF(table); i++) { |
@@ -73,7 +77,7 @@ Signed-off-by: Andre McCurdy <armccurdy@gmail.com> | |||
73 | continue; | 77 | continue; |
74 | 78 | ||
75 | if (table[i].target) { | 79 | if (table[i].target) { |
76 | @@ -125,7 +125,7 @@ int base_filesystem_create(const char *r | 80 | @@ -125,7 +125,7 @@ int base_filesystem_create(const char *root, uid_t uid, gid_t gid) { |
77 | 81 | ||
78 | /* check if one of the targets exists */ | 82 | /* check if one of the targets exists */ |
79 | NULSTR_FOREACH(s, table[i].target) { | 83 | NULSTR_FOREACH(s, table[i].target) { |
@@ -82,7 +86,7 @@ Signed-off-by: Andre McCurdy <armccurdy@gmail.com> | |||
82 | continue; | 86 | continue; |
83 | 87 | ||
84 | /* check if a specific file exists at the target path */ | 88 | /* check if a specific file exists at the target path */ |
85 | @@ -136,7 +136,7 @@ int base_filesystem_create(const char *r | 89 | @@ -136,7 +136,7 @@ int base_filesystem_create(const char *root, uid_t uid, gid_t gid) { |
86 | if (!p) | 90 | if (!p) |
87 | return log_oom(); | 91 | return log_oom(); |
88 | 92 | ||