diff options
Diffstat (limited to 'meta')
23 files changed, 191 insertions, 640 deletions
diff --git a/meta/recipes-extended/ghostscript/files/do-not-check-local-libpng-source.patch b/meta/recipes-extended/ghostscript/files/do-not-check-local-libpng-source.patch index c3e44fe86a..5834ffaf9f 100644 --- a/meta/recipes-extended/ghostscript/files/do-not-check-local-libpng-source.patch +++ b/meta/recipes-extended/ghostscript/files/do-not-check-local-libpng-source.patch | |||
@@ -1,7 +1,7 @@ | |||
1 | From 5ef8b85bc98f3bd9a15d5f47e24d3e23ae27c265 Mon Sep 17 00:00:00 2001 | 1 | From a954bf29a5f906b3151dffbecb5856e02e1565da Mon Sep 17 00:00:00 2001 |
2 | From: Hongxu Jia <hongxu.jia@windriver.com> | 2 | From: Hongxu Jia <hongxu.jia@windriver.com> |
3 | Date: Mon, 18 Jan 2016 01:00:30 -0500 | 3 | Date: Mon, 18 Jan 2016 01:00:30 -0500 |
4 | Subject: [PATCH] configure.ac: do not check local png source | 4 | Subject: [PATCH 03/10] configure.ac: do not check local png source |
5 | 5 | ||
6 | In oe-core, it did not need to compile local libpng | 6 | In oe-core, it did not need to compile local libpng |
7 | source in ghostscript, so do not check local png | 7 | source in ghostscript, so do not check local png |
@@ -16,10 +16,10 @@ Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com> | |||
16 | 1 file changed, 2 insertions(+), 2 deletions(-) | 16 | 1 file changed, 2 insertions(+), 2 deletions(-) |
17 | 17 | ||
18 | diff --git a/configure.ac b/configure.ac | 18 | diff --git a/configure.ac b/configure.ac |
19 | index bf6d3f5..01df03f 100644 | 19 | index 9341930..80a60b1 100644 |
20 | --- a/configure.ac | 20 | --- a/configure.ac |
21 | +++ b/configure.ac | 21 | +++ b/configure.ac |
22 | @@ -930,11 +930,11 @@ AC_SUBST(ZLIBDIR) | 22 | @@ -1114,11 +1114,11 @@ AC_SUBST(ZLIBDIR) |
23 | AC_SUBST(FT_SYS_ZLIB) | 23 | AC_SUBST(FT_SYS_ZLIB) |
24 | 24 | ||
25 | dnl png for the png output device; it also requires zlib | 25 | dnl png for the png output device; it also requires zlib |
@@ -34,5 +34,5 @@ index bf6d3f5..01df03f 100644 | |||
34 | SHARE_LIBPNG=0 | 34 | SHARE_LIBPNG=0 |
35 | LIBPNGDIR=$srcdir/libpng | 35 | LIBPNGDIR=$srcdir/libpng |
36 | -- | 36 | -- |
37 | 2.8.1 | 37 | 1.8.3.1 |
38 | 38 | ||
diff --git a/meta/recipes-extended/ghostscript/ghostscript/CVE-2017-11714.patch b/meta/recipes-extended/ghostscript/ghostscript/CVE-2017-11714.patch deleted file mode 100644 index 84983c5aea..0000000000 --- a/meta/recipes-extended/ghostscript/ghostscript/CVE-2017-11714.patch +++ /dev/null | |||
@@ -1,61 +0,0 @@ | |||
1 | From 671fd59eb657743aa86fbc1895cb15872a317caa Mon Sep 17 00:00:00 2001 | ||
2 | From: Chris Liddell <chris.liddell@artifex.com> | ||
3 | Date: Thu, 6 Jul 2017 14:54:02 +0100 | ||
4 | Subject: [PATCH] Bug 698158: prevent trying to reloc a freed object | ||
5 | |||
6 | In the token reader, we pass the scanner state structure around as a | ||
7 | t_struct ref on the Postscript operand stack. | ||
8 | |||
9 | But we explicitly free the scanner state when we're done, which leaves a | ||
10 | dangling reference on the operand stack and, unless that reference gets | ||
11 | overwritten before the next garbager run, we can end up with the garbager | ||
12 | trying to deal with an already freed object - that can cause a crash, or | ||
13 | memory corruption. | ||
14 | --- | ||
15 | psi/ztoken.c | 14 +++++++++++++- | ||
16 | 1 file changed, 13 insertions(+), 1 deletion(-) | ||
17 | |||
18 | --- end of original header | ||
19 | |||
20 | CVE: CVE-2017-11714 | ||
21 | |||
22 | Upstream-Status: Backport [git://git.ghostscript.com/ghostpdl.git] | ||
23 | |||
24 | Signed-off-by: Joe Slater <joe.slater@windriver.com> | ||
25 | |||
26 | diff --git a/psi/ztoken.c b/psi/ztoken.c | ||
27 | index 4dba7c5..af1ceeb 100644 | ||
28 | --- a/psi/ztoken.c | ||
29 | +++ b/psi/ztoken.c | ||
30 | @@ -107,6 +107,12 @@ token_continue(i_ctx_t *i_ctx_p, scanner_state * pstate, bool save) | ||
31 | int code; | ||
32 | ref token; | ||
33 | |||
34 | + /* Since we might free pstate below, and we're dealing with | ||
35 | + * gc memory referenced by the stack, we need to explicitly | ||
36 | + * remove the reference to pstate from the stack, otherwise | ||
37 | + * the garbager will fall over | ||
38 | + */ | ||
39 | + make_null(osp); | ||
40 | /* Note that gs_scan_token may change osp! */ | ||
41 | pop(1); /* remove the file or scanner state */ | ||
42 | again: | ||
43 | @@ -183,8 +189,14 @@ ztokenexec_continue(i_ctx_t *i_ctx_p) | ||
44 | static int | ||
45 | tokenexec_continue(i_ctx_t *i_ctx_p, scanner_state * pstate, bool save) | ||
46 | { | ||
47 | - os_ptr op; | ||
48 | + os_ptr op = osp; | ||
49 | int code; | ||
50 | + /* Since we might free pstate below, and we're dealing with | ||
51 | + * gc memory referenced by the stack, we need to explicitly | ||
52 | + * remove the reference to pstate from the stack, otherwise | ||
53 | + * the garbager will fall over | ||
54 | + */ | ||
55 | + make_null(osp); | ||
56 | /* Note that gs_scan_token may change osp! */ | ||
57 | pop(1); | ||
58 | again: | ||
59 | -- | ||
60 | 1.7.9.5 | ||
61 | |||
diff --git a/meta/recipes-extended/ghostscript/ghostscript/CVE-2017-5951.patch b/meta/recipes-extended/ghostscript/ghostscript/CVE-2017-5951.patch deleted file mode 100644 index 62cc1342ad..0000000000 --- a/meta/recipes-extended/ghostscript/ghostscript/CVE-2017-5951.patch +++ /dev/null | |||
@@ -1,44 +0,0 @@ | |||
1 | From bfa6b2ecbe48edc69a7d9d22a12419aed25960b8 Mon Sep 17 00:00:00 2001 | ||
2 | From: Chris Liddell <chris.liddell@artifex.com> | ||
3 | Date: Thu, 6 Apr 2017 16:44:54 +0100 | ||
4 | Subject: [PATCH] Bug 697548: use the correct param list enumerator | ||
5 | |||
6 | When we encountered dictionary in a ref_param_list, we were using the enumerator | ||
7 | for the "parent" param_list, rather than the enumerator for the param_list | ||
8 | we just created for the dictionary. That parent was usually the stack | ||
9 | list enumerator, and caused a segfault. | ||
10 | |||
11 | Using the correct enumerator works better. | ||
12 | |||
13 | Upstream-Status: Backport | ||
14 | CVE: CVE-2017-5951 | ||
15 | |||
16 | Signed-off-by: Catalin Enache <catalin.enache@windriver.com> | ||
17 | --- | ||
18 | psi/iparam.c | 7 ++++--- | ||
19 | 1 file changed, 4 insertions(+), 3 deletions(-) | ||
20 | |||
21 | diff --git a/psi/iparam.c b/psi/iparam.c | ||
22 | index 4e63b6d..b2fa85f 100644 | ||
23 | --- a/psi/iparam.c | ||
24 | +++ b/psi/iparam.c | ||
25 | @@ -770,12 +770,13 @@ ref_param_read_typed(gs_param_list * plist, gs_param_name pkey, | ||
26 | gs_param_enumerator_t enumr; | ||
27 | gs_param_key_t key; | ||
28 | ref_type keytype; | ||
29 | + dict_param_list *dlist = (dict_param_list *) pvalue->value.d.list; | ||
30 | |||
31 | param_init_enumerator(&enumr); | ||
32 | - if (!(*((iparam_list *) plist)->enumerate) | ||
33 | - ((iparam_list *) pvalue->value.d.list, &enumr, &key, &keytype) | ||
34 | + if (!(*(dlist->enumerate)) | ||
35 | + ((iparam_list *) dlist, &enumr, &key, &keytype) | ||
36 | && keytype == t_integer) { | ||
37 | - ((dict_param_list *) pvalue->value.d.list)->int_keys = 1; | ||
38 | + dlist->int_keys = 1; | ||
39 | pvalue->type = gs_param_type_dict_int_keys; | ||
40 | } | ||
41 | } | ||
42 | -- | ||
43 | 2.10.2 | ||
44 | |||
diff --git a/meta/recipes-extended/ghostscript/ghostscript/CVE-2017-7207.patch b/meta/recipes-extended/ghostscript/ghostscript/CVE-2017-7207.patch deleted file mode 100644 index a05dc02c6c..0000000000 --- a/meta/recipes-extended/ghostscript/ghostscript/CVE-2017-7207.patch +++ /dev/null | |||
@@ -1,39 +0,0 @@ | |||
1 | From 0e88bee1304993668fede72498d656a2dd33a35e Mon Sep 17 00:00:00 2001 | ||
2 | From: Ken Sharp <ken.sharp@artifex.com> | ||
3 | Date: Mon, 20 Mar 2017 09:34:11 +0000 | ||
4 | Subject: [PATCH] Ensure a device has raster memory, before trying to read it. | ||
5 | |||
6 | Bug #697676 "Null pointer dereference in mem_get_bits_rectangle()" | ||
7 | |||
8 | This is only possible by abusing/mis-using Ghostscript-specific | ||
9 | language extensions, so cannot happen in a general PostScript program. | ||
10 | |||
11 | Nevertheless, Ghostscript should not crash. So this commit checks the | ||
12 | memory device to see if raster memory has been allocated, before trying | ||
13 | to read from it. | ||
14 | |||
15 | Upstream-Status: Backport | ||
16 | CVE: CVE-2017-7207 | ||
17 | |||
18 | Author: Ken Sharp <ken.sharp@artifex.com> | ||
19 | Signed-off-by: Catalin Enache <catalin.enache@windriver.com> | ||
20 | --- | ||
21 | base/gdevmem.c | 2 ++ | ||
22 | 1 file changed, 2 insertions(+) | ||
23 | |||
24 | diff --git a/base/gdevmem.c b/base/gdevmem.c | ||
25 | index 41108ba..183f96d 100644 | ||
26 | --- a/base/gdevmem.c | ||
27 | +++ b/base/gdevmem.c | ||
28 | @@ -605,6 +605,8 @@ mem_get_bits_rectangle(gx_device * dev, const gs_int_rect * prect, | ||
29 | GB_PACKING_CHUNKY | GB_COLORS_NATIVE | GB_ALPHA_NONE; | ||
30 | return_error(gs_error_rangecheck); | ||
31 | } | ||
32 | + if (mdev->line_ptrs == 0x00) | ||
33 | + return_error(gs_error_rangecheck); | ||
34 | if ((w <= 0) | (h <= 0)) { | ||
35 | if ((w | h) < 0) | ||
36 | return_error(gs_error_rangecheck); | ||
37 | -- | ||
38 | 2.10.2 | ||
39 | |||
diff --git a/meta/recipes-extended/ghostscript/ghostscript/CVE-2017-7975.patch b/meta/recipes-extended/ghostscript/ghostscript/CVE-2017-7975.patch deleted file mode 100644 index e406086e8f..0000000000 --- a/meta/recipes-extended/ghostscript/ghostscript/CVE-2017-7975.patch +++ /dev/null | |||
@@ -1,37 +0,0 @@ | |||
1 | From b39be1019b4acc1aa50c6026463c543332e95a31 Mon Sep 17 00:00:00 2001 | ||
2 | From: Catalin Enache <catalin.enache@windriver.com> | ||
3 | Date: Mon, 8 May 2017 16:18:14 +0300 | ||
4 | |||
5 | Subject: [PATCH] Bug 697693: Prevent SEGV due to integer overflow. | ||
6 | |||
7 | While building a Huffman table, the start and end points were susceptible | ||
8 | to integer overflow. | ||
9 | |||
10 | Thank you to Jiaqi for finding this issue and suggesting a patch. | ||
11 | |||
12 | Upstream-Status: Backport | ||
13 | CVE: CVE-2017-7975 | ||
14 | |||
15 | Signed-off-by: Catalin Enache <catalin.enache@windriver.com> | ||
16 | |||
17 | Contents of this patch were extracted from a larger patch which addressed | ||
18 | two CVE's. The context (location of {) was also modified to apply to | ||
19 | ghostscript 9.21. | ||
20 | |||
21 | Signed-off-by: Joe Slater <joe.slater@windriver.com> | ||
22 | |||
23 | |||
24 | --- a/jbig2dec/jbig2_huffman.c | ||
25 | +++ b/jbig2dec/jbig2_huffman.c | ||
26 | @@ -421,8 +421,8 @@ jbig2_build_huffman_table(Jbig2Ctx *ctx, | ||
27 | |||
28 | if (PREFLEN == CURLEN) { | ||
29 | int RANGELEN = lines[CURTEMP].RANGELEN; | ||
30 | - int start_j = CURCODE << shift; | ||
31 | - int end_j = (CURCODE + 1) << shift; | ||
32 | + uint32_t start_j = CURCODE << shift; | ||
33 | + uint32_t end_j = (CURCODE + 1) << shift; | ||
34 | byte eflags = 0; | ||
35 | |||
36 | if (end_j > max_j) { | ||
37 | |||
diff --git a/meta/recipes-extended/ghostscript/ghostscript/CVE-2017-9216.patch b/meta/recipes-extended/ghostscript/ghostscript/CVE-2017-9216.patch deleted file mode 100644 index 1caeb3ef51..0000000000 --- a/meta/recipes-extended/ghostscript/ghostscript/CVE-2017-9216.patch +++ /dev/null | |||
@@ -1,36 +0,0 @@ | |||
1 | From 3ebffb1d96ba0cacec23016eccb4047dab365853 Mon Sep 17 00:00:00 2001 | ||
2 | From: Shailesh Mistry <shailesh.mistry@hotmail.co.uk> | ||
3 | Date: Wed, 24 May 2017 19:29:57 +0100 | ||
4 | Subject: [PATCH] Bug 697934: Fix SEGV due to error code being ignored. | ||
5 | |||
6 | The return code from jbig2_decode_text_region was being ignored so the | ||
7 | code continued to try and parse the invalid file using incomplete/empty | ||
8 | structures. | ||
9 | |||
10 | Upstream-Status: Backport | ||
11 | CVE: CVE-2017-9216 | ||
12 | |||
13 | Signed-off-by: Catalin Enache <catalin.enache@windriver.com> | ||
14 | --- | ||
15 | jbig2dec/jbig2_symbol_dict.c | 4 +++- | ||
16 | 1 file changed, 3 insertions(+), 1 deletion(-) | ||
17 | |||
18 | diff --git a/jbig2dec/jbig2_symbol_dict.c b/jbig2dec/jbig2_symbol_dict.c | ||
19 | index 3cc1731..672425d 100644 | ||
20 | --- a/jbig2dec/jbig2_symbol_dict.c | ||
21 | +++ b/jbig2dec/jbig2_symbol_dict.c | ||
22 | @@ -493,8 +493,10 @@ jbig2_decode_symbol_dict(Jbig2Ctx *ctx, | ||
23 | } | ||
24 | |||
25 | /* multiple symbols are handled as a text region */ | ||
26 | - jbig2_decode_text_region(ctx, segment, tparams, (const Jbig2SymbolDict * const *)refagg_dicts, | ||
27 | + code = jbig2_decode_text_region(ctx, segment, tparams, (const Jbig2SymbolDict * const *)refagg_dicts, | ||
28 | n_refagg_dicts, image, data, size, GR_stats, as, ws); | ||
29 | + if (code < 0) | ||
30 | + goto cleanup4; | ||
31 | |||
32 | SDNEWSYMS->glyphs[NSYMSDECODED] = image; | ||
33 | refagg_dicts[0]->glyphs[params->SDNUMINSYMS + NSYMSDECODED] = jbig2_image_clone(ctx, SDNEWSYMS->glyphs[NSYMSDECODED]); | ||
34 | -- | ||
35 | 2.10.2 | ||
36 | |||
diff --git a/meta/recipes-extended/ghostscript/ghostscript/CVE-2017-9611.patch b/meta/recipes-extended/ghostscript/ghostscript/CVE-2017-9611.patch deleted file mode 100644 index 58ef04d1fd..0000000000 --- a/meta/recipes-extended/ghostscript/ghostscript/CVE-2017-9611.patch +++ /dev/null | |||
@@ -1,34 +0,0 @@ | |||
1 | From c7c55972758a93350882c32147801a3485b010fe Mon Sep 17 00:00:00 2001 | ||
2 | From: Chris Liddell <chris.liddell@artifex.com> | ||
3 | Date: Mon, 12 Jun 2017 13:08:40 +0100 | ||
4 | Subject: [PATCH] Bug 698024: bounds check zone pointer in Ins_MIRP() | ||
5 | |||
6 | --- | ||
7 | base/ttinterp.c | 3 ++- | ||
8 | 1 file changed, 2 insertions(+), 1 deletion(-) | ||
9 | |||
10 | --- end of original header | ||
11 | |||
12 | CVE: CVE-2017-9611 | ||
13 | |||
14 | Upstream-Status: Backport [git://git.ghostscript.com/ghostpdl.git] | ||
15 | |||
16 | Signed-off-by: Joe Slater <joe.slater@windriver.com> | ||
17 | |||
18 | diff --git a/base/ttinterp.c b/base/ttinterp.c | ||
19 | index e56aec6..f6a6d95 100644 | ||
20 | --- a/base/ttinterp.c | ||
21 | +++ b/base/ttinterp.c | ||
22 | @@ -3858,7 +3858,8 @@ static int nInstrCount=0; | ||
23 | /* XXX: UNDOCUMENTED! cvt[-1] = 0 always */ | ||
24 | |||
25 | if ( BOUNDS( args[0], CUR.zp1.n_points ) || | ||
26 | - BOUNDS( args[1]+1, CUR.cvtSize+1 ) ) | ||
27 | + BOUNDS( args[1]+1, CUR.cvtSize+1 ) || | ||
28 | + BOUNDS(CUR.GS.rp0, CUR.zp0.n_points) ) | ||
29 | { | ||
30 | CUR.error = TT_Err_Invalid_Reference; | ||
31 | return; | ||
32 | -- | ||
33 | 1.7.9.5 | ||
34 | |||
diff --git a/meta/recipes-extended/ghostscript/ghostscript/CVE-2017-9612.patch b/meta/recipes-extended/ghostscript/ghostscript/CVE-2017-9612.patch deleted file mode 100644 index b737cc56bb..0000000000 --- a/meta/recipes-extended/ghostscript/ghostscript/CVE-2017-9612.patch +++ /dev/null | |||
@@ -1,35 +0,0 @@ | |||
1 | From 98f6da60b9d463c617e631fc254cf6d66f2e8e3c Mon Sep 17 00:00:00 2001 | ||
2 | From: Chris Liddell <chris.liddell@artifex.com> | ||
3 | Date: Mon, 12 Jun 2017 13:15:17 +0100 | ||
4 | Subject: [PATCH] Bug 698026: bounds check zone pointers in Ins_IP() | ||
5 | |||
6 | --- | ||
7 | base/ttinterp.c | 4 +++- | ||
8 | 1 file changed, 3 insertions(+), 1 deletion(-) | ||
9 | |||
10 | --- end of original header | ||
11 | |||
12 | CVE: CVE-2017-9612 | ||
13 | |||
14 | Upstream-Status: Backport [git://git.ghostscript.com/ghostpdl.git] | ||
15 | |||
16 | Signed-off-by: Joe Slater <joe.slater@windriver.com> | ||
17 | |||
18 | diff --git a/base/ttinterp.c b/base/ttinterp.c | ||
19 | index f6a6d95..e7c9d68 100644 | ||
20 | --- a/base/ttinterp.c | ||
21 | +++ b/base/ttinterp.c | ||
22 | @@ -4129,7 +4129,9 @@ static int nInstrCount=0; | ||
23 | Int point; | ||
24 | (void)args; | ||
25 | |||
26 | - if ( CUR.top < CUR.GS.loop ) | ||
27 | + if ( CUR.top < CUR.GS.loop || | ||
28 | + BOUNDS(CUR.GS.rp1, CUR.zp0.n_points) || | ||
29 | + BOUNDS(CUR.GS.rp2, CUR.zp1.n_points)) | ||
30 | { | ||
31 | CUR.error = TT_Err_Invalid_Reference; | ||
32 | return; | ||
33 | -- | ||
34 | 1.7.9.5 | ||
35 | |||
diff --git a/meta/recipes-extended/ghostscript/ghostscript/CVE-2017-9726.patch b/meta/recipes-extended/ghostscript/ghostscript/CVE-2017-9726.patch deleted file mode 100644 index 3e6c65699d..0000000000 --- a/meta/recipes-extended/ghostscript/ghostscript/CVE-2017-9726.patch +++ /dev/null | |||
@@ -1,33 +0,0 @@ | |||
1 | From 7755e67116e8973ee0e3b22d653df026a84fa01b Mon Sep 17 00:00:00 2001 | ||
2 | From: Chris Liddell <chris.liddell@artifex.com> | ||
3 | Date: Thu, 15 Jun 2017 08:58:31 +0100 | ||
4 | Subject: [PATCH] Bug 698055: bounds check zone pointer in Ins_MDRP | ||
5 | |||
6 | --- | ||
7 | base/ttinterp.c | 3 ++- | ||
8 | 1 file changed, 2 insertions(+), 1 deletion(-) | ||
9 | |||
10 | --- end of original header | ||
11 | |||
12 | CVE: CVE-2017-9726 | ||
13 | |||
14 | Upstream-Status: Backport [git://git.ghostscript.com/ghostpdl.git] | ||
15 | |||
16 | Signed-off-by: Joe Slater <joe.slater@windriver.com> | ||
17 | diff --git a/base/ttinterp.c b/base/ttinterp.c | ||
18 | index e7c9d68..af457e8 100644 | ||
19 | --- a/base/ttinterp.c | ||
20 | +++ b/base/ttinterp.c | ||
21 | @@ -3770,7 +3770,8 @@ static int nInstrCount=0; | ||
22 | |||
23 | point = (Int)args[0]; | ||
24 | |||
25 | - if ( BOUNDS( args[0], CUR.zp1.n_points ) ) | ||
26 | + if ( BOUNDS( args[0], CUR.zp1.n_points ) || | ||
27 | + BOUNDS( CUR.GS.rp0, CUR.zp0.n_points) ) | ||
28 | { | ||
29 | /* Current version of FreeType silently ignores this out of bounds error | ||
30 | * and drops the instruction, see bug #691121 | ||
31 | -- | ||
32 | 1.7.9.5 | ||
33 | |||
diff --git a/meta/recipes-extended/ghostscript/ghostscript/CVE-2017-9727.patch b/meta/recipes-extended/ghostscript/ghostscript/CVE-2017-9727.patch deleted file mode 100644 index a2f7bfa506..0000000000 --- a/meta/recipes-extended/ghostscript/ghostscript/CVE-2017-9727.patch +++ /dev/null | |||
@@ -1,35 +0,0 @@ | |||
1 | From 937ccd17ac65935633b2ebc06cb7089b91e17e6b Mon Sep 17 00:00:00 2001 | ||
2 | From: Chris Liddell <chris.liddell@artifex.com> | ||
3 | Date: Thu, 15 Jun 2017 09:05:20 +0100 | ||
4 | Subject: [PATCH] Bug 698056: make bounds check in gx_ttfReader__Read more | ||
5 | robust | ||
6 | |||
7 | --- | ||
8 | base/gxttfb.c | 3 ++- | ||
9 | 1 file changed, 2 insertions(+), 1 deletion(-) | ||
10 | |||
11 | --- end of original header | ||
12 | |||
13 | CVE: CVE-2017-9727 | ||
14 | |||
15 | Upstream-Status: Backport [git://git.ghostscript.com/ghostpdl.git] | ||
16 | |||
17 | Signed-off-by: Joe Slater <joe.slater@windriver.com> | ||
18 | |||
19 | diff --git a/base/gxttfb.c b/base/gxttfb.c | ||
20 | index 0e9a444..e1561af 100644 | ||
21 | --- a/base/gxttfb.c | ||
22 | +++ b/base/gxttfb.c | ||
23 | @@ -79,7 +79,8 @@ static void gx_ttfReader__Read(ttfReader *self, void *p, int n) | ||
24 | if (!r->error) { | ||
25 | if (r->extra_glyph_index != -1) { | ||
26 | q = r->glyph_data.bits.data + r->pos; | ||
27 | - r->error = (r->glyph_data.bits.size - r->pos < n ? | ||
28 | + r->error = ((r->pos >= r->glyph_data.bits.size || | ||
29 | + r->glyph_data.bits.size - r->pos < n) ? | ||
30 | gs_note_error(gs_error_invalidfont) : 0); | ||
31 | if (r->error == 0) | ||
32 | memcpy(p, q, n); | ||
33 | -- | ||
34 | 1.7.9.5 | ||
35 | |||
diff --git a/meta/recipes-extended/ghostscript/ghostscript/CVE-2017-9739.patch b/meta/recipes-extended/ghostscript/ghostscript/CVE-2017-9739.patch deleted file mode 100644 index 69a94df7b9..0000000000 --- a/meta/recipes-extended/ghostscript/ghostscript/CVE-2017-9739.patch +++ /dev/null | |||
@@ -1,37 +0,0 @@ | |||
1 | From c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 Mon Sep 17 00:00:00 2001 | ||
2 | From: Chris Liddell <chris.liddell@artifex.com> | ||
3 | Date: Fri, 16 Jun 2017 08:29:25 +0100 | ||
4 | Subject: [PATCH] Bug 698063: Bounds check Ins_JMPR | ||
5 | |||
6 | --- | ||
7 | base/ttinterp.c | 6 ++++++ | ||
8 | 1 file changed, 6 insertions(+) | ||
9 | |||
10 | --- end of original header | ||
11 | |||
12 | CVE: CVE-2017-9739 | ||
13 | |||
14 | Upstream-Status: Backport [git://git.ghostscript.com/ghostpdl.git] | ||
15 | |||
16 | Signed-off-by: Joe Slater <joe.slater@windriver.com> | ||
17 | |||
18 | diff --git a/base/ttinterp.c b/base/ttinterp.c | ||
19 | index af457e8..adf3f0c 100644 | ||
20 | --- a/base/ttinterp.c | ||
21 | +++ b/base/ttinterp.c | ||
22 | @@ -1794,6 +1794,12 @@ static int nInstrCount=0; | ||
23 | |||
24 | static void Ins_JMPR( INS_ARG ) | ||
25 | { | ||
26 | + if ( BOUNDS(CUR.IP + args[0], CUR.codeSize ) ) | ||
27 | + { | ||
28 | + CUR.error = TT_Err_Invalid_Reference; | ||
29 | + return; | ||
30 | + } | ||
31 | + | ||
32 | CUR.IP += (Int)(args[0]); | ||
33 | CUR.step_ins = FALSE; | ||
34 | |||
35 | -- | ||
36 | 1.7.9.5 | ||
37 | |||
diff --git a/meta/recipes-extended/ghostscript/ghostscript/CVE-2017-9835.patch b/meta/recipes-extended/ghostscript/ghostscript/CVE-2017-9835.patch deleted file mode 100644 index 7c65690c65..0000000000 --- a/meta/recipes-extended/ghostscript/ghostscript/CVE-2017-9835.patch +++ /dev/null | |||
@@ -1,125 +0,0 @@ | |||
1 | From cfde94be1d4286bc47633c6e6eaf4e659bd78066 Mon Sep 17 00:00:00 2001 | ||
2 | From: Chris Liddell <chris.liddell@artifex.com> | ||
3 | Date: Wed, 7 Jun 2017 14:55:12 +0100 | ||
4 | Subject: [PATCH] Bug 697985: bounds check the array allocations methods | ||
5 | |||
6 | The clump allocator has four allocation functions that use 'number of elements' | ||
7 | and 'size of elements' parameters (rather than a simple 'number of bytes'). | ||
8 | |||
9 | Those need specific bounds checking. | ||
10 | --- | ||
11 | base/gsalloc.c | 42 ++++++++++++++++++++++++++++-------------- | ||
12 | 1 file changed, 28 insertions(+), 14 deletions(-) | ||
13 | |||
14 | --- end of original header | ||
15 | |||
16 | CVE: CVE-2017-9835 | ||
17 | |||
18 | Upstream-Status: Backport [git://git.ghostscript.com/ghostpdl.git] | ||
19 | |||
20 | Signed-off-by: Joe Slater <joe.slater@windriver.com> | ||
21 | |||
22 | diff --git a/base/gsalloc.c b/base/gsalloc.c | ||
23 | index 741ba00..10c04dd 100644 | ||
24 | --- a/base/gsalloc.c | ||
25 | +++ b/base/gsalloc.c | ||
26 | @@ -1248,19 +1248,32 @@ i_alloc_struct_immovable(gs_memory_t * mem, gs_memory_type_ptr_t pstype, | ||
27 | alloc_trace("|+<.", imem, cname, pstype, size, obj); | ||
28 | return obj; | ||
29 | } | ||
30 | + | ||
31 | +static inline bool | ||
32 | +alloc_array_check_size(ulong num_elements, ulong elt_size, ulong *lsize) | ||
33 | +{ | ||
34 | + int64_t s = (int64_t)num_elements * elt_size; | ||
35 | + if (s > max_uint) { | ||
36 | + return false; | ||
37 | + } | ||
38 | + *lsize = (ulong)s; | ||
39 | + return true; | ||
40 | +} | ||
41 | + | ||
42 | static byte * | ||
43 | i_alloc_byte_array(gs_memory_t * mem, uint num_elements, uint elt_size, | ||
44 | client_name_t cname) | ||
45 | { | ||
46 | gs_ref_memory_t * const imem = (gs_ref_memory_t *)mem; | ||
47 | obj_header_t *obj; | ||
48 | - | ||
49 | + ulong lsize; | ||
50 | #ifdef MEMENTO | ||
51 | if (Memento_failThisEvent()) | ||
52 | return NULL; | ||
53 | #endif | ||
54 | - | ||
55 | - obj = alloc_obj(imem, (ulong) num_elements * elt_size, | ||
56 | + if (alloc_array_check_size(num_elements, elt_size, &lsize) == false) | ||
57 | + return NULL; | ||
58 | + obj = alloc_obj(imem, lsize, | ||
59 | &st_bytes, ALLOC_DIRECT, cname); | ||
60 | |||
61 | if_debug6m('A', mem, "[a%d:+b.]%s -bytes-*(%lu=%u*%u) = 0x%lx\n", | ||
62 | @@ -1275,13 +1288,14 @@ i_alloc_byte_array_immovable(gs_memory_t * mem, uint num_elements, | ||
63 | { | ||
64 | gs_ref_memory_t * const imem = (gs_ref_memory_t *)mem; | ||
65 | obj_header_t *obj; | ||
66 | - | ||
67 | + ulong lsize; | ||
68 | #ifdef MEMENTO | ||
69 | if (Memento_failThisEvent()) | ||
70 | return NULL; | ||
71 | #endif | ||
72 | - | ||
73 | - obj = alloc_obj(imem, (ulong) num_elements * elt_size, | ||
74 | + if (alloc_array_check_size(num_elements, elt_size, &lsize) == false) | ||
75 | + return NULL; | ||
76 | + obj = alloc_obj(imem, lsize, | ||
77 | &st_bytes, ALLOC_IMMOVABLE | ALLOC_DIRECT, | ||
78 | cname); | ||
79 | |||
80 | @@ -1297,7 +1311,7 @@ i_alloc_struct_array(gs_memory_t * mem, uint num_elements, | ||
81 | { | ||
82 | gs_ref_memory_t * const imem = (gs_ref_memory_t *)mem; | ||
83 | obj_header_t *obj; | ||
84 | - | ||
85 | + ulong lsize; | ||
86 | #ifdef MEMENTO | ||
87 | if (Memento_failThisEvent()) | ||
88 | return NULL; | ||
89 | @@ -1311,9 +1325,9 @@ i_alloc_struct_array(gs_memory_t * mem, uint num_elements, | ||
90 | return NULL; /* fail */ | ||
91 | } | ||
92 | #endif | ||
93 | - obj = alloc_obj(imem, | ||
94 | - (ulong) num_elements * pstype->ssize, | ||
95 | - pstype, ALLOC_DIRECT, cname); | ||
96 | + if (alloc_array_check_size(num_elements, pstype->ssize, &lsize) == false) | ||
97 | + return NULL; | ||
98 | + obj = alloc_obj(imem, lsize, pstype, ALLOC_DIRECT, cname); | ||
99 | if_debug7m('A', mem, "[a%d:+<.]%s %s*(%lu=%u*%u) = 0x%lx\n", | ||
100 | alloc_trace_space(imem), client_name_string(cname), | ||
101 | struct_type_name_string(pstype), | ||
102 | @@ -1327,16 +1341,16 @@ i_alloc_struct_array_immovable(gs_memory_t * mem, uint num_elements, | ||
103 | { | ||
104 | gs_ref_memory_t * const imem = (gs_ref_memory_t *)mem; | ||
105 | obj_header_t *obj; | ||
106 | - | ||
107 | + ulong lsize; | ||
108 | #ifdef MEMENTO | ||
109 | if (Memento_failThisEvent()) | ||
110 | return NULL; | ||
111 | #endif | ||
112 | |||
113 | ALLOC_CHECK_SIZE(mem,pstype); | ||
114 | - obj = alloc_obj(imem, | ||
115 | - (ulong) num_elements * pstype->ssize, | ||
116 | - pstype, ALLOC_IMMOVABLE | ALLOC_DIRECT, cname); | ||
117 | + if (alloc_array_check_size(num_elements, pstype->ssize, &lsize) == false) | ||
118 | + return NULL; | ||
119 | + obj = alloc_obj(imem, lsize, pstype, ALLOC_IMMOVABLE | ALLOC_DIRECT, cname); | ||
120 | if_debug7m('A', mem, "[a%d|+<.]%s %s*(%lu=%u*%u) = 0x%lx\n", | ||
121 | alloc_trace_space(imem), client_name_string(cname), | ||
122 | struct_type_name_string(pstype), | ||
123 | -- | ||
124 | 1.7.9.5 | ||
125 | |||
diff --git a/meta/recipes-extended/ghostscript/ghostscript/avoid-host-contamination.patch b/meta/recipes-extended/ghostscript/ghostscript/avoid-host-contamination.patch index c4794e7d8f..e8cb16c36b 100644 --- a/meta/recipes-extended/ghostscript/ghostscript/avoid-host-contamination.patch +++ b/meta/recipes-extended/ghostscript/ghostscript/avoid-host-contamination.patch | |||
@@ -1,14 +1,25 @@ | |||
1 | From 0ccbaa134093bf6afc79f2d20d061bca5a8754ed Mon Sep 17 00:00:00 2001 | ||
2 | From: Kai Kang <kai.kang@windriver.com> | ||
3 | Date: Thu, 29 Mar 2018 16:02:05 +0800 | ||
4 | Subject: [PATCH 04/10] avoid host contamination | ||
5 | |||
1 | Remove hardcode path refer to host to avoid host contamination. | 6 | Remove hardcode path refer to host to avoid host contamination. |
2 | 7 | ||
3 | Upstream-Status: Inappropriate [embedded specific] | 8 | Upstream-Status: Inappropriate [embedded specific] |
4 | 9 | ||
5 | Signed-off-by: Kai Kang <kai.kang@windriver.com> | 10 | Signed-off-by: Kai Kang <kai.kang@windriver.com> |
11 | |||
12 | Rebase to 9.23 | ||
13 | Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com> | ||
6 | --- | 14 | --- |
15 | devices/devs.mak | 2 +- | ||
16 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
17 | |||
7 | diff --git a/devices/devs.mak b/devices/devs.mak | 18 | diff --git a/devices/devs.mak b/devices/devs.mak |
8 | index 3070d2e..df663f0 100644 | 19 | index 846aa50..9570182 100644 |
9 | --- a/devices/devs.mak | 20 | --- a/devices/devs.mak |
10 | +++ b/devices/devs.mak | 21 | +++ b/devices/devs.mak |
11 | @@ -546,7 +546,7 @@ $(DEVOBJ)gdevxalt.$(OBJ) : $(DEVSRC)gdevxalt.c $(GDEVX) $(math__h) $(memory__h)\ | 22 | @@ -393,7 +393,7 @@ $(DEVOBJ)gdevxalt.$(OBJ) : $(DEVSRC)gdevxalt.c $(GDEVX) $(math__h) $(memory__h)\ |
12 | ### NON PORTABLE, ONLY UNIX WITH GCC SUPPORT | 23 | ### NON PORTABLE, ONLY UNIX WITH GCC SUPPORT |
13 | 24 | ||
14 | $(DEVOBJ)X11.so : $(x11alt_) $(x11_) $(DEVS_MAK) $(MAKEDIRS) | 25 | $(DEVOBJ)X11.so : $(x11alt_) $(x11_) $(DEVS_MAK) $(MAKEDIRS) |
@@ -17,3 +28,6 @@ index 3070d2e..df663f0 100644 | |||
17 | 28 | ||
18 | ###### --------------- Memory-buffered printer devices --------------- ###### | 29 | ###### --------------- Memory-buffered printer devices --------------- ###### |
19 | 30 | ||
31 | -- | ||
32 | 1.8.3.1 | ||
33 | |||
diff --git a/meta/recipes-extended/ghostscript/ghostscript/base-genht.c-add-a-preprocessor-define-to-allow-fope.patch b/meta/recipes-extended/ghostscript/ghostscript/base-genht.c-add-a-preprocessor-define-to-allow-fope.patch index d97d4ecd7d..7d80066a80 100644 --- a/meta/recipes-extended/ghostscript/ghostscript/base-genht.c-add-a-preprocessor-define-to-allow-fope.patch +++ b/meta/recipes-extended/ghostscript/ghostscript/base-genht.c-add-a-preprocessor-define-to-allow-fope.patch | |||
@@ -1,4 +1,8 @@ | |||
1 | base/genht.c: add a preprocessor define to allow fopen calling | 1 | From 9ca6f795409b988d38dd98bc2a6ecb68a9392312 Mon Sep 17 00:00:00 2001 |
2 | From: Hongxu Jia <hongxu.jia@windriver.com> | ||
3 | Date: Thu, 29 Mar 2018 16:37:40 +0800 | ||
4 | Subject: [PATCH 10/10] base/genht.c: add a preprocessor define to allow fopen | ||
5 | calling | ||
2 | 6 | ||
3 | The commit in upstream: | 7 | The commit in upstream: |
4 | http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=773c69e46e70bdd5482676437dafd2ca83397643 | 8 | http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=773c69e46e70bdd5482676437dafd2ca83397643 |
@@ -7,17 +11,19 @@ Replace all fopen calls with gp_fopen and add a preprocessor define so | |||
7 | that any unintential calls directly to fopen will cause an error. | 11 | that any unintential calls directly to fopen will cause an error. |
8 | 12 | ||
9 | Only exceptions are those in the platform specific code, and mkromfs.c. | 13 | Only exceptions are those in the platform specific code, and mkromfs.c. |
10 | This patch add a preprocessor define to allow fopen calling in base/genht.c. | 14 | This patch add a preprocessor define to allow fopen calling in |
15 | base/genht.c. | ||
11 | 16 | ||
12 | Upstream-Status: Pending | 17 | Upstream-Status: Pending |
13 | 18 | ||
19 | Rebase to 9.23 | ||
14 | Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com> | 20 | Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com> |
15 | --- | 21 | --- |
16 | base/genht.c | 4 ++++ | 22 | base/genht.c | 4 ++++ |
17 | 1 file changed, 4 insertions(+) | 23 | 1 file changed, 4 insertions(+) |
18 | 24 | ||
19 | diff --git a/base/genht.c b/base/genht.c | 25 | diff --git a/base/genht.c b/base/genht.c |
20 | index 4b04085..cc82fff 100644 | 26 | index e597e72..e96bfb5 100644 |
21 | --- a/base/genht.c | 27 | --- a/base/genht.c |
22 | +++ b/base/genht.c | 28 | +++ b/base/genht.c |
23 | @@ -16,6 +16,10 @@ | 29 | @@ -16,6 +16,10 @@ |
@@ -32,5 +38,5 @@ index 4b04085..cc82fff 100644 | |||
32 | #include "string_.h" | 38 | #include "string_.h" |
33 | #include "gscdefs.h" | 39 | #include "gscdefs.h" |
34 | -- | 40 | -- |
35 | 1.8.1.2 | 41 | 1.8.3.1 |
36 | 42 | ||
diff --git a/meta/recipes-extended/ghostscript/ghostscript/cups-no-gcrypt.patch b/meta/recipes-extended/ghostscript/ghostscript/cups-no-gcrypt.patch index a1c9368cc9..4c9bb22fa2 100644 --- a/meta/recipes-extended/ghostscript/ghostscript/cups-no-gcrypt.patch +++ b/meta/recipes-extended/ghostscript/ghostscript/cups-no-gcrypt.patch | |||
@@ -1,6 +1,12 @@ | |||
1 | Subject: [PATCH] Don't build-depend on libgcrypt, as nothing is used from it | 1 | From 9129eb7fa9dc160d64a7d9df9279a3b1dae4d793 Mon Sep 17 00:00:00 2001 |
2 | From: Jackie Huang <jackie.huang@windriver.com> | ||
3 | Date: Thu, 29 Mar 2018 16:16:18 +0800 | ||
4 | Subject: [PATCH 08/10] cups no gcrypt | ||
2 | 5 | ||
3 | Backported from http://www.cups.org/strfiles.php/3308/cups-no-gcrypt.patch | 6 | Don't build-depend on libgcrypt, as nothing is used from it |
7 | |||
8 | Backported from | ||
9 | http://www.cups.org/strfiles.php/3308/cups-no-gcrypt.patch | ||
4 | 10 | ||
5 | This addresses the cryto dependency seen during build. | 11 | This addresses the cryto dependency seen during build. |
6 | 12 | ||
@@ -8,7 +14,7 @@ Upstream-Status: Backport | |||
8 | 14 | ||
9 | Signed-off-by: Jackie Huang <jackie.huang@windriver.com> | 15 | Signed-off-by: Jackie Huang <jackie.huang@windriver.com> |
10 | 16 | ||
11 | Rebase the patch to ghostscript-9.15 | 17 | Rebase to 9.23 |
12 | Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com> | 18 | Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com> |
13 | --- | 19 | --- |
14 | cups/libs/cups/http-private.h | 1 - | 20 | cups/libs/cups/http-private.h | 1 - |
@@ -27,5 +33,5 @@ index 99a85c3..a674852 100644 | |||
27 | # include <CoreFoundation/CoreFoundation.h> | 33 | # include <CoreFoundation/CoreFoundation.h> |
28 | # include <Security/Security.h> | 34 | # include <Security/Security.h> |
29 | -- | 35 | -- |
30 | 1.9.1 | 36 | 1.8.3.1 |
31 | 37 | ||
diff --git a/meta/recipes-extended/ghostscript/ghostscript/ghostscript-9.02-genarch.patch b/meta/recipes-extended/ghostscript/ghostscript/ghostscript-9.02-genarch.patch index b4c14ea231..fc144f6255 100644 --- a/meta/recipes-extended/ghostscript/ghostscript/ghostscript-9.02-genarch.patch +++ b/meta/recipes-extended/ghostscript/ghostscript/ghostscript-9.02-genarch.patch | |||
@@ -1,22 +1,28 @@ | |||
1 | Import patch from windriver linux for cross compilation, and split patches | 1 | From 94850954b88440df6c41d2dd133c422ffc84d9aa Mon Sep 17 00:00:00 2001 |
2 | into oe way under different directories such as i586, powerpc etc according | 2 | From: Hongxu Jia <hongxu.jia@windriver.com> |
3 | to Richard's opinion. | 3 | Date: Thu, 29 Mar 2018 16:12:48 +0800 |
4 | Subject: [PATCH 07/10] not generate objarch.h at compile time | ||
5 | |||
6 | Import patch from windriver linux for cross compilation, and split | ||
7 | patches into oe way under different directories such as i586, powerpc etc | ||
8 | according to Richard's opinion. | ||
4 | 9 | ||
5 | Upstream-Status: Pending | 10 | Upstream-Status: Pending |
6 | 11 | ||
7 | Signed-off-by: Kang Kai <kai.kang@windriver.com> | 12 | Signed-off-by: Kang Kai <kai.kang@windriver.com> |
8 | Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com> | 13 | Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com> |
9 | 14 | ||
10 | # Author: Chi Xu <chi.xu@windriver.com> | 15 | Rebase to 9.23 |
11 | # Date: Feb 26 2010 | 16 | Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com> |
12 | # Summary: Generate arch.h for ppc32 | 17 | --- |
13 | # | 18 | base/lib.mak | 4 ++-- |
19 | 1 file changed, 2 insertions(+), 2 deletions(-) | ||
14 | 20 | ||
15 | Index: ghostscript-9.21/base/lib.mak | 21 | diff --git a/base/lib.mak b/base/lib.mak |
16 | =================================================================== | 22 | index 0036d1e..302877e 100644 |
17 | --- ghostscript-9.21.orig/base/lib.mak | 23 | --- a/base/lib.mak |
18 | +++ ghostscript-9.21/base/lib.mak | 24 | +++ b/base/lib.mak |
19 | @@ -73,8 +73,8 @@ arch_h=$(GLGEN)arch.h | 25 | @@ -87,8 +87,8 @@ arch_h=$(GLGEN)arch.h |
20 | stdpre_h=$(GLSRC)stdpre.h | 26 | stdpre_h=$(GLSRC)stdpre.h |
21 | stdint__h=$(GLSRC)stdint_.h $(std_h) | 27 | stdint__h=$(GLSRC)stdint_.h $(std_h) |
22 | 28 | ||
@@ -27,3 +33,6 @@ Index: ghostscript-9.21/base/lib.mak | |||
27 | 33 | ||
28 | # Platform interfaces | 34 | # Platform interfaces |
29 | 35 | ||
36 | -- | ||
37 | 1.8.3.1 | ||
38 | |||
diff --git a/meta/recipes-extended/ghostscript/ghostscript/ghostscript-9.15-parallel-make.patch b/meta/recipes-extended/ghostscript/ghostscript/ghostscript-9.15-parallel-make.patch index 3ec3956402..ffa269e3b2 100644 --- a/meta/recipes-extended/ghostscript/ghostscript/ghostscript-9.15-parallel-make.patch +++ b/meta/recipes-extended/ghostscript/ghostscript/ghostscript-9.15-parallel-make.patch | |||
@@ -1,25 +1,23 @@ | |||
1 | From 14937d9247330065359ca0fb648c28dfa5c3b224 Mon Sep 17 00:00:00 2001 | 1 | From 84bb692d6b047c09266de154f404af9817fa04aa Mon Sep 17 00:00:00 2001 |
2 | From: Huang Qiyu <huangqy.fnst@cn.fujitsu.com> | 2 | From: Robert Yang <liezhi.yang@windriver.com> |
3 | Date: Tue, 13 Dec 2016 18:16:41 +0900 | 3 | Date: Thu, 29 Mar 2018 15:59:05 +0800 |
4 | Subject: [PATCH] ghostscript-9.15-parallel-make | 4 | Subject: [PATCH 01/10] contrib.mak: fix for parallel build |
5 | 5 | ||
6 | From 767bdf8a412b0cce2b734998e9b7e55abeaf932c Mon Sep 17 00:00:00 2001 | ||
7 | From: Huang Qiyu <huangqy.fnst@cn.fujitsu.com> | ||
8 | Date: Tue, 13 Dec 2016 17:55:54 +0900 | ||
9 | Subject: [PATCH] Robert Yang <liezhi.yang@windriver.com> Date: Fri, 30 Jan | ||
10 | 2015 00:40:22 -0800 Subject: [PATCH] contrib.mak: fix for parallel build | ||
11 | |||
12 | Signed-off-by: Huang Qiyu <huangqy.fnst@cn.fujitsu.com> | ||
13 | Upstream-Status: Pending | 6 | Upstream-Status: Pending |
7 | |||
8 | Signed-off-by: Robert Yang <liezhi.yang@windriver.com> | ||
9 | |||
10 | Rebase to 9.23 | ||
11 | Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com> | ||
14 | --- | 12 | --- |
15 | contrib/contrib.mak | 2 ++ | 13 | contrib/contrib.mak | 2 ++ |
16 | 1 file changed, 2 insertions(+) | 14 | 1 file changed, 2 insertions(+) |
17 | 15 | ||
18 | diff --git a/contrib/contrib.mak b/contrib/contrib.mak | 16 | diff --git a/contrib/contrib.mak b/contrib/contrib.mak |
19 | index 55415b3..0b6b5ae 100644 | 17 | index f5a2fa4..4999752 100644 |
20 | --- a/contrib/contrib.mak | 18 | --- a/contrib/contrib.mak |
21 | +++ b/contrib/contrib.mak | 19 | +++ b/contrib/contrib.mak |
22 | @@ -1099,6 +1099,7 @@ $(DEVOBJ)dviprlib.$(OBJ) : $(JAPSRC)dviprlib.c $(JAPSRC)dviprlib.h \ | 20 | @@ -1067,6 +1067,7 @@ $(DEVOBJ)dviprlib.$(OBJ) : $(JAPSRC)dviprlib.c $(JAPSRC)dviprlib.h \ |
23 | $(DEVCC) $(O_)$@ $(C_) $(JAPSRC)dviprlib.c | 21 | $(DEVCC) $(O_)$@ $(C_) $(JAPSRC)dviprlib.c |
24 | 22 | ||
25 | extra-dmprt-install: install-libdata | 23 | extra-dmprt-install: install-libdata |
@@ -27,7 +25,7 @@ index 55415b3..0b6b5ae 100644 | |||
27 | $(INSTALL_DATA) $(JAPSRC)dmp_init.ps $(DESTDIR)$(gsdatadir)$(D)lib || exit 1 | 25 | $(INSTALL_DATA) $(JAPSRC)dmp_init.ps $(DESTDIR)$(gsdatadir)$(D)lib || exit 1 |
28 | $(INSTALL_DATA) $(JAPSRC)dmp_site.ps $(DESTDIR)$(gsdatadir)$(D)lib || exit 1 | 26 | $(INSTALL_DATA) $(JAPSRC)dmp_site.ps $(DESTDIR)$(gsdatadir)$(D)lib || exit 1 |
29 | $(INSTALL_DATA) $(JAPSRC)escp_24.src $(DESTDIR)$(gsdatadir)$(D)lib || exit 1 | 27 | $(INSTALL_DATA) $(JAPSRC)escp_24.src $(DESTDIR)$(gsdatadir)$(D)lib || exit 1 |
30 | @@ -1267,6 +1268,7 @@ $(DEVOBJ)gdevalps.$(OBJ) : $(JAPSRC)gdevalps.c $(PDEVH) \ | 28 | @@ -1235,6 +1236,7 @@ $(DEVOBJ)gdevalps.$(OBJ) : $(JAPSRC)gdevalps.c $(PDEVH) \ |
31 | ### ----------------- Additional .upp files ---------------- ### | 29 | ### ----------------- Additional .upp files ---------------- ### |
32 | 30 | ||
33 | extra-upp-install: install-libdata | 31 | extra-upp-install: install-libdata |
@@ -36,5 +34,5 @@ index 55415b3..0b6b5ae 100644 | |||
36 | $(INSTALL_DATA) $$f $(DESTDIR)$(gsdatadir)$(D)lib || exit 1; \ | 34 | $(INSTALL_DATA) $$f $(DESTDIR)$(gsdatadir)$(D)lib || exit 1; \ |
37 | done | 35 | done |
38 | -- | 36 | -- |
39 | 2.7.4 | 37 | 1.8.3.1 |
40 | 38 | ||
diff --git a/meta/recipes-extended/ghostscript/ghostscript/ghostscript-9.16-Werror-return-type.patch b/meta/recipes-extended/ghostscript/ghostscript/ghostscript-9.16-Werror-return-type.patch index d786482007..8c4a5d44e3 100644 --- a/meta/recipes-extended/ghostscript/ghostscript/ghostscript-9.16-Werror-return-type.patch +++ b/meta/recipes-extended/ghostscript/ghostscript/ghostscript-9.16-Werror-return-type.patch | |||
@@ -1,7 +1,7 @@ | |||
1 | From 5d5c83c89be0cff29dde2267fa168e6f7146be8c Mon Sep 17 00:00:00 2001 | 1 | From c481b055cd464734a3c2d80719ead4c1c92a40c9 Mon Sep 17 00:00:00 2001 |
2 | From: Robert Yang <liezhi.yang@windriver.com> | 2 | From: Robert Yang <liezhi.yang@windriver.com> |
3 | Date: Mon, 4 May 2015 22:31:48 -0700 | 3 | Date: Mon, 4 May 2015 22:31:48 -0700 |
4 | Subject: [PATCH] base/gendev.c: fix for -Werror=return-type | 4 | Subject: [PATCH 02/10] base/gendev.c: fix for -Werror=return-type |
5 | 5 | ||
6 | Fixed: | 6 | Fixed: |
7 | base/gendev.c:80:1: error: return type defaults to 'int' [-Werror=return-type] | 7 | base/gendev.c:80:1: error: return type defaults to 'int' [-Werror=return-type] |
@@ -10,11 +10,11 @@ Upstream-Status: Pending | |||
10 | 10 | ||
11 | Signed-off-by: Robert Yang <liezhi.yang@windriver.com> | 11 | Signed-off-by: Robert Yang <liezhi.yang@windriver.com> |
12 | --- | 12 | --- |
13 | base/gendev.c | 1 + | 13 | base/gendev.c | 1 + |
14 | 1 file changed, 1 insertion(+) | 14 | 1 file changed, 1 insertion(+) |
15 | 15 | ||
16 | diff --git a/base/gendev.c b/base/gendev.c | 16 | diff --git a/base/gendev.c b/base/gendev.c |
17 | index 68a745f..8058b5a 100644 | 17 | index 59d5999..7766b08 100644 |
18 | --- a/base/gendev.c | 18 | --- a/base/gendev.c |
19 | +++ b/base/gendev.c | 19 | +++ b/base/gendev.c |
20 | @@ -77,6 +77,7 @@ static const char *indent_item = ""; | 20 | @@ -77,6 +77,7 @@ static const char *indent_item = ""; |
@@ -26,5 +26,5 @@ index 68a745f..8058b5a 100644 | |||
26 | { | 26 | { |
27 | config conf; | 27 | config conf; |
28 | -- | 28 | -- |
29 | 1.7.9.5 | 29 | 1.8.3.1 |
30 | 30 | ||
diff --git a/meta/recipes-extended/ghostscript/ghostscript/ghostscript-9.21-native-fix-disable-system-libtiff.patch b/meta/recipes-extended/ghostscript/ghostscript/ghostscript-9.21-native-fix-disable-system-libtiff.patch index bff3e61763..9f2df0cc8f 100644 --- a/meta/recipes-extended/ghostscript/ghostscript/ghostscript-9.21-native-fix-disable-system-libtiff.patch +++ b/meta/recipes-extended/ghostscript/ghostscript/ghostscript-9.21-native-fix-disable-system-libtiff.patch | |||
@@ -1,22 +1,28 @@ | |||
1 | ghostscript-native:fix disable-system-libtiff | 1 | From 0124b1c29b9cfe46d73ae82ce023dd7c5b055744 Mon Sep 17 00:00:00 2001 |
2 | From: Hongxu Jia <hongxu.jia@windriver.com> | ||
3 | Date: Thu, 29 Mar 2018 16:36:12 +0800 | ||
4 | Subject: [PATCH 09/10] ghostscript-native:fix disable-system-libtiff | ||
2 | 5 | ||
3 | Modify configure to add the check to make sure | 6 | Modify configure to add the check to make sure |
4 | ghostscrip could work while system-libtiff is | 7 | ghostscrip could work while system-libtiff is |
5 | disabled. | 8 | disabled. |
6 | 9 | ||
7 | Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com> | ||
8 | |||
9 | Updated to apply to ghostscript 9.21. | ||
10 | |||
11 | Signed-off-by: Joe Slater <joe.slater@windriver.com> | ||
12 | |||
13 | Upstream-Status: Pending | 10 | Upstream-Status: Pending |
14 | 11 | ||
12 | Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com> | ||
15 | 13 | ||
14 | Rebase to ghostscript 9.23. | ||
16 | 15 | ||
16 | Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com> | ||
17 | --- | ||
18 | configure.ac | 5 +++++ | ||
19 | 1 file changed, 5 insertions(+) | ||
20 | |||
21 | diff --git a/configure.ac b/configure.ac | ||
22 | index 80a60b1..f3e9efb 100644 | ||
17 | --- a/configure.ac | 23 | --- a/configure.ac |
18 | +++ b/configure.ac | 24 | +++ b/configure.ac |
19 | @@ -1259,6 +1259,7 @@ case "x$with_system_libtiff" in | 25 | @@ -1284,6 +1284,7 @@ case "x$with_system_libtiff" in |
20 | esac | 26 | esac |
21 | 27 | ||
22 | if test x"$SHARE_LIBTIFF" = x"0" ; then | 28 | if test x"$SHARE_LIBTIFF" = x"0" ; then |
@@ -24,8 +30,8 @@ Upstream-Status: Pending | |||
24 | echo "Running libtiff configure script..." | 30 | echo "Running libtiff configure script..." |
25 | olddir=`pwd` | 31 | olddir=`pwd` |
26 | if ! test -d "$LIBTIFFCONFDIR" ; then | 32 | if ! test -d "$LIBTIFFCONFDIR" ; then |
27 | @@ -1272,6 +1273,10 @@ if test x"$SHARE_LIBTIFF" = x"0" ; then | 33 | @@ -1302,6 +1303,10 @@ if test x"$SHARE_LIBTIFF" = x"0" ; then |
28 | cd "$olddir" | 34 | |
29 | echo | 35 | echo |
30 | echo "Continuing with Ghostscript configuration..." | 36 | echo "Continuing with Ghostscript configuration..." |
31 | + else | 37 | + else |
@@ -35,3 +41,6 @@ Upstream-Status: Pending | |||
35 | fi | 41 | fi |
36 | 42 | ||
37 | AC_SUBST(SHARE_LIBTIFF) | 43 | AC_SUBST(SHARE_LIBTIFF) |
44 | -- | ||
45 | 1.8.3.1 | ||
46 | |||
diff --git a/meta/recipes-extended/ghostscript/ghostscript/ghostscript-9.21-prevent_recompiling.patch b/meta/recipes-extended/ghostscript/ghostscript/ghostscript-9.21-prevent_recompiling.patch index f2c6d04e06..e39d23d467 100644 --- a/meta/recipes-extended/ghostscript/ghostscript/ghostscript-9.21-prevent_recompiling.patch +++ b/meta/recipes-extended/ghostscript/ghostscript/ghostscript-9.21-prevent_recompiling.patch | |||
@@ -1,32 +1,40 @@ | |||
1 | Just use commands provided by ghostscript-native, preventing recompile them when | 1 | From 239d681306a8d97ed10954788d32ba2f4b55f77c Mon Sep 17 00:00:00 2001 |
2 | compile ghostscript. | 2 | From: Kang Kai <kai.kang@windriver.com> |
3 | Way to enable cross compile. | 3 | Date: Thu, 29 Mar 2018 16:10:16 +0800 |
4 | Subject: [PATCH 06/10] prevent recompiling | ||
5 | |||
6 | Just use commands provided by ghostscript-native, preventing recompile | ||
7 | them when compile ghostscript. Way to enable cross compile. | ||
4 | 8 | ||
5 | Upstream-Status: Pending | 9 | Upstream-Status: Pending |
6 | 10 | ||
7 | Signed-off-by: Kang Kai <kai.kang@windriver.com> | 11 | Signed-off-by: Kang Kai <kai.kang@windriver.com> |
8 | Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com> | 12 | Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com> |
9 | 13 | ||
10 | Rebase to 9.19 | 14 | Rebase to 9.23 |
11 | Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com> | 15 | Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com> |
16 | --- | ||
17 | base/unix-aux.mak | 44 -------------------------------------------- | ||
18 | 1 file changed, 44 deletions(-) | ||
12 | 19 | ||
13 | Rebase to 9.21 | 20 | diff --git a/base/unix-aux.mak b/base/unix-aux.mak |
14 | Signed-off-by: Joe Slater <joe.slater@windriver.com> | 21 | index 5bf72e9..9cb39d7 100644 |
15 | |||
16 | --- a/base/unix-aux.mak | 22 | --- a/base/unix-aux.mak |
17 | +++ b/base/unix-aux.mak | 23 | +++ b/base/unix-aux.mak |
18 | @@ -66,45 +66,45 @@ $(GLOBJ)gp_sysv.$(OBJ): $(GLSRC)gp_sysv. | 24 | @@ -64,50 +64,6 @@ $(GLOBJ)gp_sysv.$(OBJ): $(GLSRC)gp_sysv.c $(stdio__h) $(time__h) $(AK)\ |
19 | 25 | $(UNIX_AUX_MAK) $(MAKEDIRS) | |
20 | # -------------------------- Auxiliary programs --------------------------- # | 26 | $(GLCC) $(GLO_)gp_sysv.$(OBJ) $(C_) $(GLSRC)gp_sysv.c |
21 | 27 | ||
28 | -# -------------------------- Auxiliary programs --------------------------- # | ||
29 | - | ||
22 | -$(ECHOGS_XE): $(GLSRC)echogs.c $(AK) $(stdpre_h) $(UNIX_AUX_MAK) $(MAKEDIRS) | 30 | -$(ECHOGS_XE): $(GLSRC)echogs.c $(AK) $(stdpre_h) $(UNIX_AUX_MAK) $(MAKEDIRS) |
23 | - $(CCAUX_) $(I_)$(GLSRCDIR)$(_I) $(O_)$(ECHOGS_XE) $(GLSRC)echogs.c $(AUXEXTRALIBS) | 31 | - $(CCAUX_) $(I_)$(GLSRCDIR)$(_I) $(O_)$(ECHOGS_XE) $(GLSRC)echogs.c $(AUXEXTRALIBS) |
24 | - | 32 | - |
25 | +#$(ECHOGS_XE): $(GLSRC)echogs.c $(AK) $(stdpre_h) $(UNIX_AUX_MAK) $(MAKEDIRS) | 33 | -$(PACKPS_XE): $(GLSRC)pack_ps.c $(stdpre_h) $(UNIX_AUX_MAK) $(MAKEDIRS) |
26 | +# $(CCAUX_) $(I_)$(GLSRCDIR)$(_I) $(O_)$(ECHOGS_XE) $(GLSRC)echogs.c $(AUXEXTRALIBS) | 34 | - $(CCAUX_) $(I_)$(GLSRCDIR)$(_I) $(O_)$(PACKPS_XE) $(GLSRC)pack_ps.c $(AUXEXTRALIBS) |
27 | +# | 35 | - |
28 | # On the RS/6000 (at least), compiling genarch.c with gcc with -O | 36 | -# On the RS/6000 (at least), compiling genarch.c with gcc with -O |
29 | # produces a buggy executable. | 37 | -# produces a buggy executable. |
30 | -$(GENARCH_XE): $(GLSRC)genarch.c $(AK) $(GENARCH_DEPS) $(UNIX_AUX_MAK) $(MAKEDIRS) | 38 | -$(GENARCH_XE): $(GLSRC)genarch.c $(AK) $(GENARCH_DEPS) $(UNIX_AUX_MAK) $(MAKEDIRS) |
31 | - $(CCAUX_) $(I_)$(GLSRCDIR)$(_I) $(O_)$(GENARCH_XE) $(GLSRC)genarch.c $(AUXEXTRALIBS) | 39 | - $(CCAUX_) $(I_)$(GLSRCDIR)$(_I) $(O_)$(GENARCH_XE) $(GLSRC)genarch.c $(AUXEXTRALIBS) |
32 | - | 40 | - |
@@ -39,21 +47,9 @@ Signed-off-by: Joe Slater <joe.slater@windriver.com> | |||
39 | -$(GENHT_XE): $(GLSRC)genht.c $(AK) $(GENHT_DEPS) $(UNIX_AUX_MAK) $(MAKEDIRS) | 47 | -$(GENHT_XE): $(GLSRC)genht.c $(AK) $(GENHT_DEPS) $(UNIX_AUX_MAK) $(MAKEDIRS) |
40 | - $(CCAUX_) $(GENHT_CFLAGS) $(O_)$(GENHT_XE) $(GLSRC)genht.c $(AUXEXTRALIBS) | 48 | - $(CCAUX_) $(GENHT_CFLAGS) $(O_)$(GENHT_XE) $(GLSRC)genht.c $(AUXEXTRALIBS) |
41 | - | 49 | - |
42 | +#$(GENARCH_XE): $(GLSRC)genarch.c $(AK) $(GENARCH_DEPS) $(UNIX_AUX_MAK) $(MAKEDIRS) | 50 | -# To get GS to use the system zlib, you remove/hide the gs/zlib directory |
43 | +# $(CCAUX_) $(I_)$(GLSRCDIR)$(_I) $(O_)$(GENARCH_XE) $(GLSRC)genarch.c $(AUXEXTRALIBS) | 51 | -# which means that the mkromfs build can't find the zlib source it needs. |
44 | +# | 52 | -# So it's split into two targets, one using the zlib source directly..... |
45 | +#$(GENCONF_XE): $(GLSRC)genconf.c $(AK) $(GENCONF_DEPS) $(UNIX_AUX_MAK) $(MAKEDIRS) | ||
46 | +# $(CCAUX_) $(I_)$(GLSRCDIR)$(_I) $(O_)$(GENCONF_XE) $(GLSRC)genconf.c $(AUXEXTRALIBS) | ||
47 | +# | ||
48 | +#$(GENDEV_XE): $(GLSRC)gendev.c $(AK) $(GENDEV_DEPS) $(UNIX_AUX_MAK) $(MAKEDIRS) | ||
49 | +# $(CCAUX_) $(I_)$(GLSRCDIR)$(_I) $(O_)$(GENDEV_XE) $(GLSRC)gendev.c $(AUXEXTRALIBS) | ||
50 | +# | ||
51 | +#$(GENHT_XE): $(GLSRC)genht.c $(AK) $(GENHT_DEPS) $(UNIX_AUX_MAK) $(MAKEDIRS) | ||
52 | +# $(CCAUX_) $(GENHT_CFLAGS) $(O_)$(GENHT_XE) $(GLSRC)genht.c $(AUXEXTRALIBS) | ||
53 | +# | ||
54 | # To get GS to use the system zlib, you remove/hide the gs/zlib directory | ||
55 | # which means that the mkromfs build can't find the zlib source it needs. | ||
56 | # So it's split into two targets, one using the zlib source directly..... | ||
57 | -MKROMFS_OBJS_0=$(MKROMFS_ZLIB_OBJS) $(AUX)gpmisc.$(OBJ) $(AUX)gp_getnv.$(OBJ) \ | 53 | -MKROMFS_OBJS_0=$(MKROMFS_ZLIB_OBJS) $(AUX)gpmisc.$(OBJ) $(AUX)gp_getnv.$(OBJ) \ |
58 | - $(AUX)gscdefs.$(OBJ) $(AUX)gp_unix.$(OBJ) $(AUX)gp_unifs.$(OBJ) $(AUX)gp_unifn.$(OBJ) \ | 54 | - $(AUX)gscdefs.$(OBJ) $(AUX)gp_unix.$(OBJ) $(AUX)gp_unifs.$(OBJ) $(AUX)gp_unifn.$(OBJ) \ |
59 | - $(AUX)gp_stdia.$(OBJ) $(AUX)gsutil.$(OBJ) $(AUX)memento.$(OBJ) | 55 | - $(AUX)gp_stdia.$(OBJ) $(AUX)gsutil.$(OBJ) $(AUX)memento.$(OBJ) |
@@ -61,14 +57,7 @@ Signed-off-by: Joe Slater <joe.slater@windriver.com> | |||
61 | -$(MKROMFS_XE)_0: $(GLSRC)mkromfs.c $(MKROMFS_COMMON_DEPS) $(MKROMFS_OBJS_0) $(UNIX_AUX_MAK) $(MAKEDIRS) | 57 | -$(MKROMFS_XE)_0: $(GLSRC)mkromfs.c $(MKROMFS_COMMON_DEPS) $(MKROMFS_OBJS_0) $(UNIX_AUX_MAK) $(MAKEDIRS) |
62 | - $(CCAUX_) $(GENOPTAUX) $(I_)$(GLSRCDIR)$(_I) $(I_)$(GLOBJ)$(_I) $(I_)$(ZSRCDIR)$(_I) $(GLSRC)mkromfs.c $(O_)$(MKROMFS_XE)_0 $(MKROMFS_OBJS_0) $(AUXEXTRALIBS) | 58 | - $(CCAUX_) $(GENOPTAUX) $(I_)$(GLSRCDIR)$(_I) $(I_)$(GLOBJ)$(_I) $(I_)$(ZSRCDIR)$(_I) $(GLSRC)mkromfs.c $(O_)$(MKROMFS_XE)_0 $(MKROMFS_OBJS_0) $(AUXEXTRALIBS) |
63 | - | 59 | - |
64 | +#MKROMFS_OBJS_0=$(MKROMFS_ZLIB_OBJS) $(AUX)gpmisc.$(OBJ) $(AUX)gp_getnv.$(OBJ) \ | 60 | -# .... and one using the zlib library linked via the command line |
65 | +# $(AUX)gscdefs.$(OBJ) $(AUX)gp_unix.$(OBJ) $(AUX)gp_unifs.$(OBJ) $(AUX)gp_unifn.$(OBJ) \ | ||
66 | +# $(AUX)gp_stdia.$(OBJ) $(AUX)gsutil.$(OBJ) $(AUX)memento.$(OBJ) | ||
67 | +# | ||
68 | +#$(MKROMFS_XE)_0: $(GLSRC)mkromfs.c $(MKROMFS_COMMON_DEPS) $(MKROMFS_OBJS_0) $(UNIX_AUX_MAK) $(MAKEDIRS) | ||
69 | +# $(CCAUX_) $(GENOPTAUX) $(I_)$(GLSRCDIR)$(_I) $(I_)$(GLOBJ)$(_I) $(I_)$(ZSRCDIR)$(_I) $(GLSRC)mkromfs.c $(O_)$(MKROMFS_XE)_0 $(MKROMFS_OBJS_0) $(AUXEXTRALIBS) | ||
70 | +# | ||
71 | # .... and one using the zlib library linked via the command line | ||
72 | -MKROMFS_OBJS_1=$(AUX)gscdefs.$(OBJ) \ | 61 | -MKROMFS_OBJS_1=$(AUX)gscdefs.$(OBJ) \ |
73 | - $(AUX)gpmisc.$(OBJ) $(AUX)gp_getnv.$(OBJ) \ | 62 | - $(AUX)gpmisc.$(OBJ) $(AUX)gp_getnv.$(OBJ) \ |
74 | - $(AUX)gp_unix.$(OBJ) $(AUX)gp_unifs.$(OBJ) $(AUX)gp_unifn.$(OBJ) \ | 63 | - $(AUX)gp_unix.$(OBJ) $(AUX)gp_unifs.$(OBJ) $(AUX)gp_unifn.$(OBJ) \ |
@@ -80,17 +69,9 @@ Signed-off-by: Joe Slater <joe.slater@windriver.com> | |||
80 | -$(MKROMFS_XE): $(MKROMFS_XE)_$(SHARE_ZLIB) $(UNIX_AUX_MAK) $(MAKEDIRS) | 69 | -$(MKROMFS_XE): $(MKROMFS_XE)_$(SHARE_ZLIB) $(UNIX_AUX_MAK) $(MAKEDIRS) |
81 | - $(CP_) $(MKROMFS_XE)_$(SHARE_ZLIB) $(MKROMFS_XE) | 70 | - $(CP_) $(MKROMFS_XE)_$(SHARE_ZLIB) $(MKROMFS_XE) |
82 | - | 71 | - |
83 | +#MKROMFS_OBJS_1=$(AUX)gscdefs.$(OBJ) \ | ||
84 | +# $(AUX)gpmisc.$(OBJ) $(AUX)gp_getnv.$(OBJ) \ | ||
85 | +# $(AUX)gp_unix.$(OBJ) $(AUX)gp_unifs.$(OBJ) $(AUX)gp_unifn.$(OBJ) \ | ||
86 | +# $(AUX)gp_stdia.$(OBJ) $(AUX)gsutil.$(OBJ) | ||
87 | +# | ||
88 | +#$(MKROMFS_XE)_1: $(GLSRC)mkromfs.c $(MKROMFS_COMMON_DEPS) $(MKROMFS_OBJS_1) $(UNIX_AUX_MAK) $(MAKEDIRS) | ||
89 | +# $(CCAUX_) $(GENOPTAUX) $(I_)$(GLSRCDIR)$(_I) $(I_)$(GLOBJ)$(_I) $(I_)$(ZSRCDIR)$(_I) $(GLSRC)mkromfs.c $(O_)$(MKROMFS_XE)_1 $(MKROMFS_OBJS_1) $(AUXEXTRALIBS) | ||
90 | +# | ||
91 | +#$(MKROMFS_XE): $(MKROMFS_XE)_$(SHARE_ZLIB) $(UNIX_AUX_MAK) $(MAKEDIRS) | ||
92 | +# $(CP_) $(MKROMFS_XE)_$(SHARE_ZLIB) $(MKROMFS_XE) | ||
93 | +# | ||
94 | # Query the environment to construct gconfig_.h. | 72 | # Query the environment to construct gconfig_.h. |
95 | # These are all defined conditionally (except the JasPER one), so that | 73 | # These are all defined conditionally (except the JasPER one), so that |
96 | # they can be overridden by settings from the configure script. | 74 | # they can be overridden by settings from the configure script. |
75 | -- | ||
76 | 1.8.3.1 | ||
77 | |||
diff --git a/meta/recipes-extended/ghostscript/ghostscript/mkdir-p.patch b/meta/recipes-extended/ghostscript/ghostscript/mkdir-p.patch index 5a7eab1c21..3e6d3e3c48 100644 --- a/meta/recipes-extended/ghostscript/ghostscript/mkdir-p.patch +++ b/meta/recipes-extended/ghostscript/ghostscript/mkdir-p.patch | |||
@@ -1,4 +1,8 @@ | |||
1 | ghostscript: allow directories to be created more than once | 1 | From 2b23026f8e2a352417fb1c4da94bf69b19bef267 Mon Sep 17 00:00:00 2001 |
2 | From: Joe Slater <joe.slater@windriver.com> | ||
3 | Date: Thu, 29 Mar 2018 16:04:32 +0800 | ||
4 | Subject: [PATCH 05/10] ghostscript: allow directories to be created more than | ||
5 | once | ||
2 | 6 | ||
3 | When doing parallel builds, we might try to create directories | 7 | When doing parallel builds, we might try to create directories |
4 | more than once. This should not cause an error. | 8 | more than once. This should not cause an error. |
@@ -7,7 +11,14 @@ Upstream-Status: Pending | |||
7 | 11 | ||
8 | Signed-off-by: Joe Slater <joe.slater@windriver.com> | 12 | Signed-off-by: Joe Slater <joe.slater@windriver.com> |
9 | 13 | ||
14 | Rebase to 9.23 | ||
15 | Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com> | ||
16 | --- | ||
17 | base/unix-end.mak | 17 ++++++++--------- | ||
18 | 1 file changed, 8 insertions(+), 9 deletions(-) | ||
10 | 19 | ||
20 | diff --git a/base/unix-end.mak b/base/unix-end.mak | ||
21 | index 9ce599a..feff5a6 100644 | ||
11 | --- a/base/unix-end.mak | 22 | --- a/base/unix-end.mak |
12 | +++ b/base/unix-end.mak | 23 | +++ b/base/unix-end.mak |
13 | @@ -17,15 +17,14 @@ | 24 | @@ -17,15 +17,14 @@ |
@@ -34,3 +45,6 @@ Signed-off-by: Joe Slater <joe.slater@windriver.com> | |||
34 | 45 | ||
35 | 46 | ||
36 | gs: .gssubtarget $(UNIX_END_MAK) | 47 | gs: .gssubtarget $(UNIX_END_MAK) |
48 | -- | ||
49 | 1.8.3.1 | ||
50 | |||
diff --git a/meta/recipes-extended/ghostscript/ghostscript/remove-direct-symlink.patch b/meta/recipes-extended/ghostscript/ghostscript/remove-direct-symlink.patch new file mode 100644 index 0000000000..410004e8f4 --- /dev/null +++ b/meta/recipes-extended/ghostscript/ghostscript/remove-direct-symlink.patch | |||
@@ -0,0 +1,40 @@ | |||
1 | From 2ce79942ca509663ddf8171f45d1d324bb71bad6 Mon Sep 17 00:00:00 2001 | ||
2 | From: Hongxu Jia <hongxu.jia@windriver.com> | ||
3 | Date: Thu, 29 Mar 2018 17:22:35 +0800 | ||
4 | Subject: [PATCH] remove direct symlink | ||
5 | |||
6 | The upstream create a direct symlink to stay backward | ||
7 | compatible, a symlink is automatically created to point | ||
8 | from the old location (/usr/share/ghostscript/<version>/doc) | ||
9 | to the new location. | ||
10 | |||
11 | It caused do_populate_sysroot failure | ||
12 | ... | ||
13 | |ERROR: ghostscript-9.23-r0 do_populate_sysroot: sstate found an absolute | ||
14 | path symlink | ||
15 | ... | ||
16 | |||
17 | Without the symlink is no harm for OE | ||
18 | |||
19 | Upstream-Status: Inappropriate [OE specific] | ||
20 | |||
21 | Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com> | ||
22 | --- | ||
23 | base/unixinst.mak | 1 - | ||
24 | 1 file changed, 1 deletion(-) | ||
25 | |||
26 | diff --git a/base/unixinst.mak b/base/unixinst.mak | ||
27 | index 7fec86c..0cf2361 100644 | ||
28 | --- a/base/unixinst.mak | ||
29 | +++ b/base/unixinst.mak | ||
30 | @@ -165,7 +165,6 @@ install-doc: $(PSDOCDIR)/News.htm | ||
31 | $(SH) -c 'for f in $(DOC_PAGES) ;\ | ||
32 | do if ( test -f $(PSDOCDIR)/$$f ); then $(INSTALL_DATA) $(PSDOCDIR)/$$f $(DESTDIR)$(docdir); fi;\ | ||
33 | done' | ||
34 | - ln -s $(DESTDIR)$(docdir) $(DESTDIR)$(gsdatadir)/doc | ||
35 | |||
36 | # install the man pages for each locale | ||
37 | MAN_LCDIRS=. de | ||
38 | -- | ||
39 | 1.8.3.1 | ||
40 | |||
diff --git a/meta/recipes-extended/ghostscript/ghostscript_9.21.bb b/meta/recipes-extended/ghostscript/ghostscript_9.23.bb index 50ec7e20c5..4b3b370af7 100644 --- a/meta/recipes-extended/ghostscript/ghostscript_9.21.bb +++ b/meta/recipes-extended/ghostscript/ghostscript_9.23.bb | |||
@@ -19,12 +19,13 @@ DEPENDS_class-native = "libpng-native" | |||
19 | UPSTREAM_CHECK_URI = "https://github.com/ArtifexSoftware/ghostpdl-downloads/releases" | 19 | UPSTREAM_CHECK_URI = "https://github.com/ArtifexSoftware/ghostpdl-downloads/releases" |
20 | UPSTREAM_CHECK_REGEX = "(?P<pver>\d+(\.\d+)+)\.tar" | 20 | UPSTREAM_CHECK_REGEX = "(?P<pver>\d+(\.\d+)+)\.tar" |
21 | 21 | ||
22 | SRC_URI_BASE = "https://github.com/ArtifexSoftware/ghostpdl-downloads/releases/download/gs921/${BPN}-${PV}.tar.gz \ | 22 | SRC_URI_BASE = "https://github.com/ArtifexSoftware/ghostpdl-downloads/releases/download/gs923/${BPN}-${PV}.tar.gz \ |
23 | file://ghostscript-9.15-parallel-make.patch \ | 23 | file://ghostscript-9.15-parallel-make.patch \ |
24 | file://ghostscript-9.16-Werror-return-type.patch \ | 24 | file://ghostscript-9.16-Werror-return-type.patch \ |
25 | file://do-not-check-local-libpng-source.patch \ | 25 | file://do-not-check-local-libpng-source.patch \ |
26 | file://avoid-host-contamination.patch \ | 26 | file://avoid-host-contamination.patch \ |
27 | file://mkdir-p.patch \ | 27 | file://mkdir-p.patch \ |
28 | file://remove-direct-symlink.patch \ | ||
28 | " | 29 | " |
29 | 30 | ||
30 | SRC_URI = "${SRC_URI_BASE} \ | 31 | SRC_URI = "${SRC_URI_BASE} \ |
@@ -32,17 +33,6 @@ SRC_URI = "${SRC_URI_BASE} \ | |||
32 | file://ghostscript-9.02-genarch.patch \ | 33 | file://ghostscript-9.02-genarch.patch \ |
33 | file://objarch.h \ | 34 | file://objarch.h \ |
34 | file://cups-no-gcrypt.patch \ | 35 | file://cups-no-gcrypt.patch \ |
35 | file://CVE-2017-7207.patch \ | ||
36 | file://CVE-2017-5951.patch \ | ||
37 | file://CVE-2017-7975.patch \ | ||
38 | file://CVE-2017-9216.patch \ | ||
39 | file://CVE-2017-9611.patch \ | ||
40 | file://CVE-2017-9612.patch \ | ||
41 | file://CVE-2017-9739.patch \ | ||
42 | file://CVE-2017-9726.patch \ | ||
43 | file://CVE-2017-9727.patch \ | ||
44 | file://CVE-2017-9835.patch \ | ||
45 | file://CVE-2017-11714.patch \ | ||
46 | " | 36 | " |
47 | 37 | ||
48 | SRC_URI_class-native = "${SRC_URI_BASE} \ | 38 | SRC_URI_class-native = "${SRC_URI_BASE} \ |
@@ -50,8 +40,8 @@ SRC_URI_class-native = "${SRC_URI_BASE} \ | |||
50 | file://base-genht.c-add-a-preprocessor-define-to-allow-fope.patch \ | 40 | file://base-genht.c-add-a-preprocessor-define-to-allow-fope.patch \ |
51 | " | 41 | " |
52 | 42 | ||
53 | SRC_URI[md5sum] = "5f213281761d2750fcf27476c404d17f" | 43 | SRC_URI[md5sum] = "5a47ab47cd22dec1eb5f51c06f1c9d9c" |
54 | SRC_URI[sha256sum] = "02bceadbc4dddeb6f2eec9c8b1623d945d355ca11b8b4df035332b217d58ce85" | 44 | SRC_URI[sha256sum] = "f65964807a3c97a2c0810d4b9806585367e73129e57ae33378cea18e07a1ed9b" |
55 | 45 | ||
56 | # Put something like | 46 | # Put something like |
57 | # | 47 | # |
@@ -104,7 +94,7 @@ do_configure_append () { | |||
104 | # copy tools from the native ghostscript build | 94 | # copy tools from the native ghostscript build |
105 | if [ "${PN}" != "ghostscript-native" ]; then | 95 | if [ "${PN}" != "ghostscript-native" ]; then |
106 | mkdir -p obj/aux soobj | 96 | mkdir -p obj/aux soobj |
107 | for i in genarch genconf mkromfs echogs gendev genht; do | 97 | for i in genarch genconf mkromfs echogs gendev genht packps; do |
108 | cp ${STAGING_BINDIR_NATIVE}/ghostscript-${PV}/$i obj/aux/$i | 98 | cp ${STAGING_BINDIR_NATIVE}/ghostscript-${PV}/$i obj/aux/$i |
109 | done | 99 | done |
110 | fi | 100 | fi |
@@ -118,14 +108,14 @@ do_install_append () { | |||
118 | 108 | ||
119 | do_compile_class-native () { | 109 | do_compile_class-native () { |
120 | mkdir -p obj | 110 | mkdir -p obj |
121 | for i in genarch genconf mkromfs echogs gendev genht; do | 111 | for i in genarch genconf mkromfs echogs gendev genht packps; do |
122 | oe_runmake obj/aux/$i | 112 | oe_runmake obj/aux/$i |
123 | done | 113 | done |
124 | } | 114 | } |
125 | 115 | ||
126 | do_install_class-native () { | 116 | do_install_class-native () { |
127 | install -d ${D}${bindir}/ghostscript-${PV} | 117 | install -d ${D}${bindir}/ghostscript-${PV} |
128 | for i in genarch genconf mkromfs echogs gendev genht; do | 118 | for i in genarch genconf mkromfs echogs gendev genht packps; do |
129 | install -m 755 obj/aux/$i ${D}${bindir}/ghostscript-${PV}/$i | 119 | install -m 755 obj/aux/$i ${D}${bindir}/ghostscript-${PV}/$i |
130 | done | 120 | done |
131 | } | 121 | } |