diff options
author | Khem Raj <raj.khem@gmail.com> | 2023-09-25 11:04:12 -0700 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2023-09-27 11:50:34 +0100 |
commit | 68038100084135d11bbafa567f64e604baf2d80c (patch) | |
tree | 3b5ef0749da9fd18b9fbd004570b3481f698f633 /meta/recipes-core | |
parent | b6f5656c623bdbfab0e766aabdef738cae43a57c (diff) | |
download | poky-68038100084135d11bbafa567f64e604baf2d80c.tar.gz |
systemd: Refresh patches to avoid patch-fuzz
(From OE-Core rev: eb8a86fee9eeae787cc0a58ef2ed087fd48d93eb)
Signed-off-by: Khem Raj <raj.khem@gmail.com>
Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-core')
3 files changed, 31 insertions, 90 deletions
diff --git a/meta/recipes-core/systemd/systemd/0014-Use-uintmax_t-for-handling-rlim_t.patch b/meta/recipes-core/systemd/systemd/0014-Use-uintmax_t-for-handling-rlim_t.patch index 1d50faa363..2071f4fb20 100644 --- a/meta/recipes-core/systemd/systemd/0014-Use-uintmax_t-for-handling-rlim_t.patch +++ b/meta/recipes-core/systemd/systemd/0014-Use-uintmax_t-for-handling-rlim_t.patch | |||
@@ -26,11 +26,9 @@ Signed-off-by: Chen Qi <Qi.Chen@windriver.com> | |||
26 | src/core/execute.c | 4 ++-- | 26 | src/core/execute.c | 4 ++-- |
27 | 3 files changed, 9 insertions(+), 15 deletions(-) | 27 | 3 files changed, 9 insertions(+), 15 deletions(-) |
28 | 28 | ||
29 | diff --git a/src/basic/format-util.h b/src/basic/format-util.h | ||
30 | index 8719df3e29..9becc96066 100644 | ||
31 | --- a/src/basic/format-util.h | 29 | --- a/src/basic/format-util.h |
32 | +++ b/src/basic/format-util.h | 30 | +++ b/src/basic/format-util.h |
33 | @@ -34,13 +34,7 @@ assert_cc(sizeof(gid_t) == sizeof(uint32_t)); | 31 | @@ -34,13 +34,7 @@ assert_cc(sizeof(gid_t) == sizeof(uint32 |
34 | # error Unknown timex member size | 32 | # error Unknown timex member size |
35 | #endif | 33 | #endif |
36 | 34 | ||
@@ -45,11 +43,9 @@ index 8719df3e29..9becc96066 100644 | |||
45 | 43 | ||
46 | #if SIZEOF_DEV_T == 8 | 44 | #if SIZEOF_DEV_T == 8 |
47 | # define DEV_FMT "%" PRIu64 | 45 | # define DEV_FMT "%" PRIu64 |
48 | diff --git a/src/basic/rlimit-util.c b/src/basic/rlimit-util.c | ||
49 | index 33dfde9d6c..e018fd81fd 100644 | ||
50 | --- a/src/basic/rlimit-util.c | 46 | --- a/src/basic/rlimit-util.c |
51 | +++ b/src/basic/rlimit-util.c | 47 | +++ b/src/basic/rlimit-util.c |
52 | @@ -44,7 +44,7 @@ int setrlimit_closest(int resource, const struct rlimit *rlim) { | 48 | @@ -44,7 +44,7 @@ int setrlimit_closest(int resource, cons |
53 | fixed.rlim_max == highest.rlim_max) | 49 | fixed.rlim_max == highest.rlim_max) |
54 | return 0; | 50 | return 0; |
55 | 51 | ||
@@ -58,7 +54,7 @@ index 33dfde9d6c..e018fd81fd 100644 | |||
58 | 54 | ||
59 | return RET_NERRNO(setrlimit(resource, &fixed)); | 55 | return RET_NERRNO(setrlimit(resource, &fixed)); |
60 | } | 56 | } |
61 | @@ -307,13 +307,13 @@ int rlimit_format(const struct rlimit *rl, char **ret) { | 57 | @@ -307,13 +307,13 @@ int rlimit_format(const struct rlimit *r |
62 | if (rl->rlim_cur >= RLIM_INFINITY && rl->rlim_max >= RLIM_INFINITY) | 58 | if (rl->rlim_cur >= RLIM_INFINITY && rl->rlim_max >= RLIM_INFINITY) |
63 | r = free_and_strdup(&s, "infinity"); | 59 | r = free_and_strdup(&s, "infinity"); |
64 | else if (rl->rlim_cur >= RLIM_INFINITY) | 60 | else if (rl->rlim_cur >= RLIM_INFINITY) |
@@ -76,20 +72,18 @@ index 33dfde9d6c..e018fd81fd 100644 | |||
76 | if (r < 0) | 72 | if (r < 0) |
77 | return -ENOMEM; | 73 | return -ENOMEM; |
78 | 74 | ||
79 | @@ -403,7 +403,7 @@ int rlimit_nofile_safe(void) { | 75 | @@ -407,7 +407,7 @@ int rlimit_nofile_safe(void) { |
80 | 76 | rl.rlim_max = MIN(rl.rlim_max, (rlim_t) read_nr_open()); | |
81 | rl.rlim_cur = FD_SETSIZE; | 77 | rl.rlim_cur = MIN((rlim_t) FD_SETSIZE, rl.rlim_max); |
82 | if (setrlimit(RLIMIT_NOFILE, &rl) < 0) | 78 | if (setrlimit(RLIMIT_NOFILE, &rl) < 0) |
83 | - return log_debug_errno(errno, "Failed to lower RLIMIT_NOFILE's soft limit to " RLIM_FMT ": %m", rl.rlim_cur); | 79 | - return log_debug_errno(errno, "Failed to lower RLIMIT_NOFILE's soft limit to " RLIM_FMT ": %m", rl.rlim_cur); |
84 | + return log_debug_errno(errno, "Failed to lower RLIMIT_NOFILE's soft limit to " RLIM_FMT ": %m", (uintmax_t)rl.rlim_cur); | 80 | + return log_debug_errno(errno, "Failed to lower RLIMIT_NOFILE's soft limit to " RLIM_FMT ": %m", (uintmax_t)rl.rlim_cur); |
85 | 81 | ||
86 | return 1; | 82 | return 1; |
87 | } | 83 | } |
88 | diff --git a/src/core/execute.c b/src/core/execute.c | ||
89 | index 8ef76de9ab..ea1c203e43 100644 | ||
90 | --- a/src/core/execute.c | 84 | --- a/src/core/execute.c |
91 | +++ b/src/core/execute.c | 85 | +++ b/src/core/execute.c |
92 | @@ -6667,9 +6667,9 @@ void exec_context_dump(const ExecContext *c, FILE* f, const char *prefix) { | 86 | @@ -6707,9 +6707,9 @@ void exec_context_dump(const ExecContext |
93 | for (unsigned i = 0; i < RLIM_NLIMITS; i++) | 87 | for (unsigned i = 0; i < RLIM_NLIMITS; i++) |
94 | if (c->rlimit[i]) { | 88 | if (c->rlimit[i]) { |
95 | fprintf(f, "%sLimit%s: " RLIM_FMT "\n", | 89 | fprintf(f, "%sLimit%s: " RLIM_FMT "\n", |
@@ -101,6 +95,3 @@ index 8ef76de9ab..ea1c203e43 100644 | |||
101 | } | 95 | } |
102 | 96 | ||
103 | if (c->ioprio_set) { | 97 | if (c->ioprio_set) { |
104 | -- | ||
105 | 2.39.2 | ||
106 | |||
diff --git a/meta/recipes-core/systemd/systemd/0021-do-not-disable-buffer-in-writing-files.patch b/meta/recipes-core/systemd/systemd/0021-do-not-disable-buffer-in-writing-files.patch index ef6b5342ca..c85087219c 100644 --- a/meta/recipes-core/systemd/systemd/0021-do-not-disable-buffer-in-writing-files.patch +++ b/meta/recipes-core/systemd/systemd/0021-do-not-disable-buffer-in-writing-files.patch | |||
@@ -42,11 +42,9 @@ Signed-off-by: Scott Murray <scott.murray@konsulko.com> | |||
42 | src/vconsole/vconsole-setup.c | 2 +- | 42 | src/vconsole/vconsole-setup.c | 2 +- |
43 | 20 files changed, 36 insertions(+), 37 deletions(-) | 43 | 20 files changed, 36 insertions(+), 37 deletions(-) |
44 | 44 | ||
45 | diff --git a/src/basic/cgroup-util.c b/src/basic/cgroup-util.c | ||
46 | index 11b4375ed5..7d81a6007f 100644 | ||
47 | --- a/src/basic/cgroup-util.c | 45 | --- a/src/basic/cgroup-util.c |
48 | +++ b/src/basic/cgroup-util.c | 46 | +++ b/src/basic/cgroup-util.c |
49 | @@ -400,7 +400,7 @@ int cg_kill_kernel_sigkill(const char *controller, const char *path) { | 47 | @@ -400,7 +400,7 @@ int cg_kill_kernel_sigkill(const char *c |
50 | if (r < 0) | 48 | if (r < 0) |
51 | return r; | 49 | return r; |
52 | 50 | ||
@@ -55,7 +53,7 @@ index 11b4375ed5..7d81a6007f 100644 | |||
55 | if (r < 0) | 53 | if (r < 0) |
56 | return r; | 54 | return r; |
57 | 55 | ||
58 | @@ -806,7 +806,7 @@ int cg_install_release_agent(const char *controller, const char *agent) { | 56 | @@ -806,7 +806,7 @@ int cg_install_release_agent(const char |
59 | 57 | ||
60 | sc = strstrip(contents); | 58 | sc = strstrip(contents); |
61 | if (isempty(sc)) { | 59 | if (isempty(sc)) { |
@@ -64,7 +62,7 @@ index 11b4375ed5..7d81a6007f 100644 | |||
64 | if (r < 0) | 62 | if (r < 0) |
65 | return r; | 63 | return r; |
66 | } else if (!path_equal(sc, agent)) | 64 | } else if (!path_equal(sc, agent)) |
67 | @@ -824,7 +824,7 @@ int cg_install_release_agent(const char *controller, const char *agent) { | 65 | @@ -824,7 +824,7 @@ int cg_install_release_agent(const char |
68 | 66 | ||
69 | sc = strstrip(contents); | 67 | sc = strstrip(contents); |
70 | if (streq(sc, "0")) { | 68 | if (streq(sc, "0")) { |
@@ -73,7 +71,7 @@ index 11b4375ed5..7d81a6007f 100644 | |||
73 | if (r < 0) | 71 | if (r < 0) |
74 | return r; | 72 | return r; |
75 | 73 | ||
76 | @@ -851,7 +851,7 @@ int cg_uninstall_release_agent(const char *controller) { | 74 | @@ -851,7 +851,7 @@ int cg_uninstall_release_agent(const cha |
77 | if (r < 0) | 75 | if (r < 0) |
78 | return r; | 76 | return r; |
79 | 77 | ||
@@ -82,7 +80,7 @@ index 11b4375ed5..7d81a6007f 100644 | |||
82 | if (r < 0) | 80 | if (r < 0) |
83 | return r; | 81 | return r; |
84 | 82 | ||
85 | @@ -861,7 +861,7 @@ int cg_uninstall_release_agent(const char *controller) { | 83 | @@ -861,7 +861,7 @@ int cg_uninstall_release_agent(const cha |
86 | if (r < 0) | 84 | if (r < 0) |
87 | return r; | 85 | return r; |
88 | 86 | ||
@@ -91,7 +89,7 @@ index 11b4375ed5..7d81a6007f 100644 | |||
91 | if (r < 0) | 89 | if (r < 0) |
92 | return r; | 90 | return r; |
93 | 91 | ||
94 | @@ -1764,7 +1764,7 @@ int cg_set_attribute(const char *controller, const char *path, const char *attri | 92 | @@ -1764,7 +1764,7 @@ int cg_set_attribute(const char *control |
95 | if (r < 0) | 93 | if (r < 0) |
96 | return r; | 94 | return r; |
97 | 95 | ||
@@ -100,11 +98,9 @@ index 11b4375ed5..7d81a6007f 100644 | |||
100 | } | 98 | } |
101 | 99 | ||
102 | int cg_get_attribute(const char *controller, const char *path, const char *attribute, char **ret) { | 100 | int cg_get_attribute(const char *controller, const char *path, const char *attribute, char **ret) { |
103 | diff --git a/src/basic/namespace-util.c b/src/basic/namespace-util.c | ||
104 | index f5c0e04cec..272b920022 100644 | ||
105 | --- a/src/basic/namespace-util.c | 101 | --- a/src/basic/namespace-util.c |
106 | +++ b/src/basic/namespace-util.c | 102 | +++ b/src/basic/namespace-util.c |
107 | @@ -227,12 +227,12 @@ int userns_acquire(const char *uid_map, const char *gid_map) { | 103 | @@ -227,12 +227,12 @@ int userns_acquire(const char *uid_map, |
108 | freeze(); | 104 | freeze(); |
109 | 105 | ||
110 | xsprintf(path, "/proc/" PID_FMT "/uid_map", pid); | 106 | xsprintf(path, "/proc/" PID_FMT "/uid_map", pid); |
@@ -119,11 +115,9 @@ index f5c0e04cec..272b920022 100644 | |||
119 | if (r < 0) | 115 | if (r < 0) |
120 | return log_error_errno(r, "Failed to write GID map: %m"); | 116 | return log_error_errno(r, "Failed to write GID map: %m"); |
121 | 117 | ||
122 | diff --git a/src/basic/procfs-util.c b/src/basic/procfs-util.c | ||
123 | index 64a95dd866..12cd16db1c 100644 | ||
124 | --- a/src/basic/procfs-util.c | 118 | --- a/src/basic/procfs-util.c |
125 | +++ b/src/basic/procfs-util.c | 119 | +++ b/src/basic/procfs-util.c |
126 | @@ -64,13 +64,13 @@ int procfs_tasks_set_limit(uint64_t limit) { | 120 | @@ -64,13 +64,13 @@ int procfs_tasks_set_limit(uint64_t limi |
127 | * decrease it, as threads-max is the much more relevant sysctl. */ | 121 | * decrease it, as threads-max is the much more relevant sysctl. */ |
128 | if (limit > pid_max-1) { | 122 | if (limit > pid_max-1) { |
129 | sprintf(buffer, "%" PRIu64, limit+1); /* Add one, since PID 0 is not a valid PID */ | 123 | sprintf(buffer, "%" PRIu64, limit+1); /* Add one, since PID 0 is not a valid PID */ |
@@ -139,11 +133,9 @@ index 64a95dd866..12cd16db1c 100644 | |||
139 | if (r < 0) { | 133 | if (r < 0) { |
140 | uint64_t threads_max; | 134 | uint64_t threads_max; |
141 | 135 | ||
142 | diff --git a/src/basic/sysctl-util.c b/src/basic/sysctl-util.c | ||
143 | index b66a6622ae..8d1c93008a 100644 | ||
144 | --- a/src/basic/sysctl-util.c | 136 | --- a/src/basic/sysctl-util.c |
145 | +++ b/src/basic/sysctl-util.c | 137 | +++ b/src/basic/sysctl-util.c |
146 | @@ -58,7 +58,7 @@ int sysctl_write(const char *property, const char *value) { | 138 | @@ -58,7 +58,7 @@ int sysctl_write(const char *property, c |
147 | 139 | ||
148 | log_debug("Setting '%s' to '%s'", p, value); | 140 | log_debug("Setting '%s' to '%s'", p, value); |
149 | 141 | ||
@@ -152,8 +144,6 @@ index b66a6622ae..8d1c93008a 100644 | |||
152 | } | 144 | } |
153 | 145 | ||
154 | int sysctl_writef(const char *property, const char *format, ...) { | 146 | int sysctl_writef(const char *property, const char *format, ...) { |
155 | diff --git a/src/binfmt/binfmt.c b/src/binfmt/binfmt.c | ||
156 | index e1ddf97914..df6e156f19 100644 | ||
157 | --- a/src/binfmt/binfmt.c | 147 | --- a/src/binfmt/binfmt.c |
158 | +++ b/src/binfmt/binfmt.c | 148 | +++ b/src/binfmt/binfmt.c |
159 | @@ -30,7 +30,7 @@ static bool arg_unregister = false; | 149 | @@ -30,7 +30,7 @@ static bool arg_unregister = false; |
@@ -165,7 +155,7 @@ index e1ddf97914..df6e156f19 100644 | |||
165 | } | 155 | } |
166 | 156 | ||
167 | static int apply_rule(const char *filename, unsigned line, const char *rule) { | 157 | static int apply_rule(const char *filename, unsigned line, const char *rule) { |
168 | @@ -58,7 +58,7 @@ static int apply_rule(const char *filename, unsigned line, const char *rule) { | 158 | @@ -58,7 +58,7 @@ static int apply_rule(const char *filena |
169 | if (r >= 0) | 159 | if (r >= 0) |
170 | log_debug("%s:%u: Rule '%s' deleted.", filename, line, rulename); | 160 | log_debug("%s:%u: Rule '%s' deleted.", filename, line, rulename); |
171 | 161 | ||
@@ -183,11 +173,9 @@ index e1ddf97914..df6e156f19 100644 | |||
183 | if (r < 0) | 173 | if (r < 0) |
184 | log_warning_errno(r, "Failed to flush binfmt_misc rules, ignoring: %m"); | 174 | log_warning_errno(r, "Failed to flush binfmt_misc rules, ignoring: %m"); |
185 | else | 175 | else |
186 | diff --git a/src/core/cgroup.c b/src/core/cgroup.c | ||
187 | index 4cac3f6a89..bebe2cd120 100644 | ||
188 | --- a/src/core/cgroup.c | 176 | --- a/src/core/cgroup.c |
189 | +++ b/src/core/cgroup.c | 177 | +++ b/src/core/cgroup.c |
190 | @@ -4349,7 +4349,7 @@ int unit_cgroup_freezer_action(Unit *u, FreezerAction action) { | 178 | @@ -4349,7 +4349,7 @@ int unit_cgroup_freezer_action(Unit *u, |
191 | u->freezer_state = FREEZER_THAWING; | 179 | u->freezer_state = FREEZER_THAWING; |
192 | } | 180 | } |
193 | 181 | ||
@@ -196,11 +184,9 @@ index 4cac3f6a89..bebe2cd120 100644 | |||
196 | if (r < 0) | 184 | if (r < 0) |
197 | return r; | 185 | return r; |
198 | 186 | ||
199 | diff --git a/src/core/main.c b/src/core/main.c | ||
200 | index c0b8126d96..fe676320ba 100644 | ||
201 | --- a/src/core/main.c | 187 | --- a/src/core/main.c |
202 | +++ b/src/core/main.c | 188 | +++ b/src/core/main.c |
203 | @@ -1737,7 +1737,7 @@ static void initialize_core_pattern(bool skip_setup) { | 189 | @@ -1737,7 +1737,7 @@ static void initialize_core_pattern(bool |
204 | if (getpid_cached() != 1) | 190 | if (getpid_cached() != 1) |
205 | return; | 191 | return; |
206 | 192 | ||
@@ -209,11 +195,9 @@ index c0b8126d96..fe676320ba 100644 | |||
209 | if (r < 0) | 195 | if (r < 0) |
210 | log_warning_errno(r, "Failed to write '%s' to /proc/sys/kernel/core_pattern, ignoring: %m", | 196 | log_warning_errno(r, "Failed to write '%s' to /proc/sys/kernel/core_pattern, ignoring: %m", |
211 | arg_early_core_pattern); | 197 | arg_early_core_pattern); |
212 | diff --git a/src/core/smack-setup.c b/src/core/smack-setup.c | ||
213 | index bcaa237c8d..4032bde19e 100644 | ||
214 | --- a/src/core/smack-setup.c | 198 | --- a/src/core/smack-setup.c |
215 | +++ b/src/core/smack-setup.c | 199 | +++ b/src/core/smack-setup.c |
216 | @@ -319,17 +319,17 @@ int mac_smack_setup(bool *loaded_policy) { | 200 | @@ -319,17 +319,17 @@ int mac_smack_setup(bool *loaded_policy) |
217 | } | 201 | } |
218 | 202 | ||
219 | #if HAVE_SMACK_RUN_LABEL | 203 | #if HAVE_SMACK_RUN_LABEL |
@@ -235,8 +219,6 @@ index bcaa237c8d..4032bde19e 100644 | |||
235 | if (r < 0) | 219 | if (r < 0) |
236 | log_warning_errno(r, "Failed to set SMACK netlabel rule \"127.0.0.1 -CIPSO\": %m"); | 220 | log_warning_errno(r, "Failed to set SMACK netlabel rule \"127.0.0.1 -CIPSO\": %m"); |
237 | #endif | 221 | #endif |
238 | diff --git a/src/home/homework.c b/src/home/homework.c | ||
239 | index 28907386a4..f9e45349a7 100644 | ||
240 | --- a/src/home/homework.c | 222 | --- a/src/home/homework.c |
241 | +++ b/src/home/homework.c | 223 | +++ b/src/home/homework.c |
242 | @@ -278,7 +278,7 @@ static void drop_caches_now(void) { | 224 | @@ -278,7 +278,7 @@ static void drop_caches_now(void) { |
@@ -248,11 +230,9 @@ index 28907386a4..f9e45349a7 100644 | |||
248 | if (r < 0) | 230 | if (r < 0) |
249 | log_warning_errno(r, "Failed to drop caches, ignoring: %m"); | 231 | log_warning_errno(r, "Failed to drop caches, ignoring: %m"); |
250 | else | 232 | else |
251 | diff --git a/src/libsystemd/sd-device/sd-device.c b/src/libsystemd/sd-device/sd-device.c | ||
252 | index 8c65ee3469..153edab081 100644 | ||
253 | --- a/src/libsystemd/sd-device/sd-device.c | 233 | --- a/src/libsystemd/sd-device/sd-device.c |
254 | +++ b/src/libsystemd/sd-device/sd-device.c | 234 | +++ b/src/libsystemd/sd-device/sd-device.c |
255 | @@ -2515,7 +2515,7 @@ _public_ int sd_device_set_sysattr_value(sd_device *device, const char *sysattr, | 235 | @@ -2515,7 +2515,7 @@ _public_ int sd_device_set_sysattr_value |
256 | if (!value) | 236 | if (!value) |
257 | return -ENOMEM; | 237 | return -ENOMEM; |
258 | 238 | ||
@@ -261,11 +241,9 @@ index 8c65ee3469..153edab081 100644 | |||
261 | if (r < 0) { | 241 | if (r < 0) { |
262 | /* On failure, clear cache entry, as we do not know how it fails. */ | 242 | /* On failure, clear cache entry, as we do not know how it fails. */ |
263 | device_remove_cached_sysattr_value(device, sysattr); | 243 | device_remove_cached_sysattr_value(device, sysattr); |
264 | diff --git a/src/nspawn/nspawn-cgroup.c b/src/nspawn/nspawn-cgroup.c | ||
265 | index 0deb4ebb30..bae8eead9e 100644 | ||
266 | --- a/src/nspawn/nspawn-cgroup.c | 244 | --- a/src/nspawn/nspawn-cgroup.c |
267 | +++ b/src/nspawn/nspawn-cgroup.c | 245 | +++ b/src/nspawn/nspawn-cgroup.c |
268 | @@ -122,7 +122,7 @@ int sync_cgroup(pid_t pid, CGroupUnified unified_requested, uid_t uid_shift) { | 246 | @@ -122,7 +122,7 @@ int sync_cgroup(pid_t pid, CGroupUnified |
269 | fn = strjoina(tree, cgroup, "/cgroup.procs"); | 247 | fn = strjoina(tree, cgroup, "/cgroup.procs"); |
270 | 248 | ||
271 | sprintf(pid_string, PID_FMT, pid); | 249 | sprintf(pid_string, PID_FMT, pid); |
@@ -274,8 +252,6 @@ index 0deb4ebb30..bae8eead9e 100644 | |||
274 | if (r < 0) { | 252 | if (r < 0) { |
275 | log_error_errno(r, "Failed to move process: %m"); | 253 | log_error_errno(r, "Failed to move process: %m"); |
276 | goto finish; | 254 | goto finish; |
277 | diff --git a/src/nspawn/nspawn.c b/src/nspawn/nspawn.c | ||
278 | index 36d336dfc8..8c5c69596b 100644 | ||
279 | --- a/src/nspawn/nspawn.c | 255 | --- a/src/nspawn/nspawn.c |
280 | +++ b/src/nspawn/nspawn.c | 256 | +++ b/src/nspawn/nspawn.c |
281 | @@ -2774,7 +2774,7 @@ static int reset_audit_loginuid(void) { | 257 | @@ -2774,7 +2774,7 @@ static int reset_audit_loginuid(void) { |
@@ -305,8 +281,6 @@ index 36d336dfc8..8c5c69596b 100644 | |||
305 | if (r < 0) | 281 | if (r < 0) |
306 | return log_error_errno(r, "Failed to write GID map: %m"); | 282 | return log_error_errno(r, "Failed to write GID map: %m"); |
307 | 283 | ||
308 | diff --git a/src/shared/binfmt-util.c b/src/shared/binfmt-util.c | ||
309 | index a26175474b..1413a9c72c 100644 | ||
310 | --- a/src/shared/binfmt-util.c | 284 | --- a/src/shared/binfmt-util.c |
311 | +++ b/src/shared/binfmt-util.c | 285 | +++ b/src/shared/binfmt-util.c |
312 | @@ -46,7 +46,7 @@ int disable_binfmt(void) { | 286 | @@ -46,7 +46,7 @@ int disable_binfmt(void) { |
@@ -318,11 +292,9 @@ index a26175474b..1413a9c72c 100644 | |||
318 | if (r < 0) | 292 | if (r < 0) |
319 | return log_warning_errno(r, "Failed to unregister binfmt_misc entries: %m"); | 293 | return log_warning_errno(r, "Failed to unregister binfmt_misc entries: %m"); |
320 | 294 | ||
321 | diff --git a/src/shared/cgroup-setup.c b/src/shared/cgroup-setup.c | ||
322 | index 2ea83f05d3..8626bb184c 100644 | ||
323 | --- a/src/shared/cgroup-setup.c | 295 | --- a/src/shared/cgroup-setup.c |
324 | +++ b/src/shared/cgroup-setup.c | 296 | +++ b/src/shared/cgroup-setup.c |
325 | @@ -351,7 +351,7 @@ int cg_attach(const char *controller, const char *path, pid_t pid) { | 297 | @@ -351,7 +351,7 @@ int cg_attach(const char *controller, co |
326 | 298 | ||
327 | xsprintf(c, PID_FMT "\n", pid); | 299 | xsprintf(c, PID_FMT "\n", pid); |
328 | 300 | ||
@@ -340,11 +312,9 @@ index 2ea83f05d3..8626bb184c 100644 | |||
340 | if (r < 0) { | 312 | if (r < 0) { |
341 | log_debug_errno(r, "Failed to %s controller %s for %s (%s): %m", | 313 | log_debug_errno(r, "Failed to %s controller %s for %s (%s): %m", |
342 | FLAGS_SET(mask, bit) ? "enable" : "disable", n, p, fs); | 314 | FLAGS_SET(mask, bit) ? "enable" : "disable", n, p, fs); |
343 | diff --git a/src/shared/coredump-util.c b/src/shared/coredump-util.c | ||
344 | index 3d2f179049..c1b6c170ac 100644 | ||
345 | --- a/src/shared/coredump-util.c | 315 | --- a/src/shared/coredump-util.c |
346 | +++ b/src/shared/coredump-util.c | 316 | +++ b/src/shared/coredump-util.c |
347 | @@ -163,7 +163,7 @@ int set_coredump_filter(uint64_t value) { | 317 | @@ -163,7 +163,7 @@ int set_coredump_filter(uint64_t value) |
348 | xsprintf(t, "0x%"PRIx64, value); | 318 | xsprintf(t, "0x%"PRIx64, value); |
349 | 319 | ||
350 | return write_string_file("/proc/self/coredump_filter", t, | 320 | return write_string_file("/proc/self/coredump_filter", t, |
@@ -353,11 +323,9 @@ index 3d2f179049..c1b6c170ac 100644 | |||
353 | } | 323 | } |
354 | 324 | ||
355 | /* Turn off core dumps but only if we're running outside of a container. */ | 325 | /* Turn off core dumps but only if we're running outside of a container. */ |
356 | diff --git a/src/shared/sleep-util.c b/src/shared/sleep-util.c | ||
357 | index d7277399fb..d06d636fcc 100644 | ||
358 | --- a/src/shared/sleep-util.c | 326 | --- a/src/shared/sleep-util.c |
359 | +++ b/src/shared/sleep-util.c | 327 | +++ b/src/shared/sleep-util.c |
360 | @@ -1044,7 +1044,7 @@ int write_resume_config(dev_t devno, uint64_t offset, const char *device) { | 328 | @@ -1044,7 +1044,7 @@ int write_resume_config(dev_t devno, uin |
361 | 329 | ||
362 | /* We write the offset first since it's safer. Note that this file is only available in 4.17+, so | 330 | /* We write the offset first since it's safer. Note that this file is only available in 4.17+, so |
363 | * fail gracefully if it doesn't exist and we're only overwriting it with 0. */ | 331 | * fail gracefully if it doesn't exist and we're only overwriting it with 0. */ |
@@ -366,7 +334,7 @@ index d7277399fb..d06d636fcc 100644 | |||
366 | if (r == -ENOENT) { | 334 | if (r == -ENOENT) { |
367 | if (offset != 0) | 335 | if (offset != 0) |
368 | return log_error_errno(SYNTHETIC_ERRNO(EOPNOTSUPP), | 336 | return log_error_errno(SYNTHETIC_ERRNO(EOPNOTSUPP), |
369 | @@ -1060,7 +1060,7 @@ int write_resume_config(dev_t devno, uint64_t offset, const char *device) { | 337 | @@ -1060,7 +1060,7 @@ int write_resume_config(dev_t devno, uin |
370 | log_debug("Wrote resume_offset=%s for device '%s' to /sys/power/resume_offset.", | 338 | log_debug("Wrote resume_offset=%s for device '%s' to /sys/power/resume_offset.", |
371 | offset_str, device); | 339 | offset_str, device); |
372 | 340 | ||
@@ -375,11 +343,9 @@ index d7277399fb..d06d636fcc 100644 | |||
375 | if (r < 0) | 343 | if (r < 0) |
376 | return log_error_errno(r, | 344 | return log_error_errno(r, |
377 | "Failed to write device '%s' (%s) to /sys/power/resume: %m", | 345 | "Failed to write device '%s' (%s) to /sys/power/resume: %m", |
378 | diff --git a/src/shared/smack-util.c b/src/shared/smack-util.c | ||
379 | index b3b5c905ad..bbfa1973fd 100644 | ||
380 | --- a/src/shared/smack-util.c | 346 | --- a/src/shared/smack-util.c |
381 | +++ b/src/shared/smack-util.c | 347 | +++ b/src/shared/smack-util.c |
382 | @@ -113,7 +113,7 @@ int mac_smack_apply_pid(pid_t pid, const char *label) { | 348 | @@ -113,7 +113,7 @@ int mac_smack_apply_pid(pid_t pid, const |
383 | return 0; | 349 | return 0; |
384 | 350 | ||
385 | p = procfs_file_alloca(pid, "attr/current"); | 351 | p = procfs_file_alloca(pid, "attr/current"); |
@@ -388,8 +354,6 @@ index b3b5c905ad..bbfa1973fd 100644 | |||
388 | if (r < 0) | 354 | if (r < 0) |
389 | return r; | 355 | return r; |
390 | 356 | ||
391 | diff --git a/src/sleep/sleep.c b/src/sleep/sleep.c | ||
392 | index 765dd4974f..cd6afb001b 100644 | ||
393 | --- a/src/sleep/sleep.c | 357 | --- a/src/sleep/sleep.c |
394 | +++ b/src/sleep/sleep.c | 358 | +++ b/src/sleep/sleep.c |
395 | @@ -139,7 +139,7 @@ static int write_mode(char **modes) { | 359 | @@ -139,7 +139,7 @@ static int write_mode(char **modes) { |
@@ -401,7 +365,7 @@ index 765dd4974f..cd6afb001b 100644 | |||
401 | if (k >= 0) | 365 | if (k >= 0) |
402 | return 0; | 366 | return 0; |
403 | 367 | ||
404 | @@ -160,7 +160,7 @@ static int write_state(FILE **f, char **states) { | 368 | @@ -160,7 +160,7 @@ static int write_state(FILE **f, char ** |
405 | STRV_FOREACH(state, states) { | 369 | STRV_FOREACH(state, states) { |
406 | int k; | 370 | int k; |
407 | 371 | ||
@@ -410,11 +374,9 @@ index 765dd4974f..cd6afb001b 100644 | |||
410 | if (k >= 0) | 374 | if (k >= 0) |
411 | return 0; | 375 | return 0; |
412 | log_debug_errno(k, "Failed to write '%s' to /sys/power/state: %m", *state); | 376 | log_debug_errno(k, "Failed to write '%s' to /sys/power/state: %m", *state); |
413 | diff --git a/src/udev/udev-rules.c b/src/udev/udev-rules.c | ||
414 | index 0ce79f815c..28aab475d0 100644 | ||
415 | --- a/src/udev/udev-rules.c | 377 | --- a/src/udev/udev-rules.c |
416 | +++ b/src/udev/udev-rules.c | 378 | +++ b/src/udev/udev-rules.c |
417 | @@ -2634,7 +2634,6 @@ static int udev_rule_apply_token_to_event( | 379 | @@ -2634,7 +2634,6 @@ static int udev_rule_apply_token_to_even |
418 | log_event_debug(dev, token, "ATTR '%s' writing '%s'", buf, value); | 380 | log_event_debug(dev, token, "ATTR '%s' writing '%s'", buf, value); |
419 | r = write_string_file(buf, value, | 381 | r = write_string_file(buf, value, |
420 | WRITE_STRING_FILE_VERIFY_ON_FAILURE | | 382 | WRITE_STRING_FILE_VERIFY_ON_FAILURE | |
@@ -422,11 +384,9 @@ index 0ce79f815c..28aab475d0 100644 | |||
422 | WRITE_STRING_FILE_AVOID_NEWLINE | | 384 | WRITE_STRING_FILE_AVOID_NEWLINE | |
423 | WRITE_STRING_FILE_VERIFY_IGNORE_NEWLINE); | 385 | WRITE_STRING_FILE_VERIFY_IGNORE_NEWLINE); |
424 | if (r < 0) | 386 | if (r < 0) |
425 | diff --git a/src/vconsole/vconsole-setup.c b/src/vconsole/vconsole-setup.c | ||
426 | index 7d3e9db73f..2d4a0c4c9d 100644 | ||
427 | --- a/src/vconsole/vconsole-setup.c | 387 | --- a/src/vconsole/vconsole-setup.c |
428 | +++ b/src/vconsole/vconsole-setup.c | 388 | +++ b/src/vconsole/vconsole-setup.c |
429 | @@ -259,7 +259,7 @@ static int toggle_utf8_vc(const char *name, int fd, bool utf8) { | 389 | @@ -260,7 +260,7 @@ static int toggle_utf8_vc(const char *na |
430 | static int toggle_utf8_sysfs(bool utf8) { | 390 | static int toggle_utf8_sysfs(bool utf8) { |
431 | int r; | 391 | int r; |
432 | 392 | ||
@@ -435,6 +395,3 @@ index 7d3e9db73f..2d4a0c4c9d 100644 | |||
435 | if (r < 0) | 395 | if (r < 0) |
436 | return log_warning_errno(r, "Failed to %s sysfs UTF-8 flag: %m", enable_disable(utf8)); | 396 | return log_warning_errno(r, "Failed to %s sysfs UTF-8 flag: %m", enable_disable(utf8)); |
437 | 397 | ||
438 | -- | ||
439 | 2.39.2 | ||
440 | |||
diff --git a/meta/recipes-core/systemd/systemd/0022-Handle-__cpu_mask-usage.patch b/meta/recipes-core/systemd/systemd/0022-Handle-__cpu_mask-usage.patch index 341543afdc..580aff327d 100644 --- a/meta/recipes-core/systemd/systemd/0022-Handle-__cpu_mask-usage.patch +++ b/meta/recipes-core/systemd/systemd/0022-Handle-__cpu_mask-usage.patch | |||
@@ -23,8 +23,6 @@ Signed-off-by: Scott Murray <scott.murray@konsulko.com> | |||
23 | src/test/test-sizeof.c | 2 +- | 23 | src/test/test-sizeof.c | 2 +- |
24 | 2 files changed, 3 insertions(+), 1 deletion(-) | 24 | 2 files changed, 3 insertions(+), 1 deletion(-) |
25 | 25 | ||
26 | diff --git a/src/shared/cpu-set-util.h b/src/shared/cpu-set-util.h | ||
27 | index 3c63a58826..4c2d4347fc 100644 | ||
28 | --- a/src/shared/cpu-set-util.h | 26 | --- a/src/shared/cpu-set-util.h |
29 | +++ b/src/shared/cpu-set-util.h | 27 | +++ b/src/shared/cpu-set-util.h |
30 | @@ -6,6 +6,8 @@ | 28 | @@ -6,6 +6,8 @@ |
@@ -36,8 +34,6 @@ index 3c63a58826..4c2d4347fc 100644 | |||
36 | /* This wraps the libc interface with a variable to keep the allocated size. */ | 34 | /* This wraps the libc interface with a variable to keep the allocated size. */ |
37 | typedef struct CPUSet { | 35 | typedef struct CPUSet { |
38 | cpu_set_t *set; | 36 | cpu_set_t *set; |
39 | diff --git a/src/test/test-sizeof.c b/src/test/test-sizeof.c | ||
40 | index 6cf92bffde..937d26ca55 100644 | ||
41 | --- a/src/test/test-sizeof.c | 37 | --- a/src/test/test-sizeof.c |
42 | +++ b/src/test/test-sizeof.c | 38 | +++ b/src/test/test-sizeof.c |
43 | @@ -1,6 +1,5 @@ | 39 | @@ -1,6 +1,5 @@ |
@@ -47,7 +43,7 @@ index 6cf92bffde..937d26ca55 100644 | |||
47 | #include <stdio.h> | 43 | #include <stdio.h> |
48 | #include <string.h> | 44 | #include <string.h> |
49 | #include <sys/resource.h> | 45 | #include <sys/resource.h> |
50 | @@ -11,6 +10,7 @@ | 46 | @@ -12,6 +11,7 @@ |
51 | #include <float.h> | 47 | #include <float.h> |
52 | 48 | ||
53 | #include "time-util.h" | 49 | #include "time-util.h" |
@@ -55,6 +51,3 @@ index 6cf92bffde..937d26ca55 100644 | |||
55 | 51 | ||
56 | /* Print information about various types. Useful when diagnosing | 52 | /* Print information about various types. Useful when diagnosing |
57 | * gcc diagnostics on an unfamiliar architecture. */ | 53 | * gcc diagnostics on an unfamiliar architecture. */ |
58 | -- | ||
59 | 2.39.2 | ||
60 | |||