From patchwork Mon May 17 17:53:57 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Petr Vorel X-Patchwork-Id: 1479719 Return-Path: X-Original-To: incoming-buildroot@patchwork.ozlabs.org Delivered-To: patchwork-incoming-buildroot@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=busybox.net (client-ip=140.211.166.136; helo=smtp3.osuosl.org; envelope-from=buildroot-bounces@busybox.net; receiver=) Authentication-Results: ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=gmail.com header.i=@gmail.com header.a=rsa-sha256 header.s=20161025 header.b=OTfmwVpd; dkim-atps=neutral Received: from smtp3.osuosl.org (smtp3.osuosl.org [140.211.166.136]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 4FkRb82W3Wz9sPf for ; Tue, 18 May 2021 03:54:12 +1000 (AEST) Received: from localhost (localhost [127.0.0.1]) by smtp3.osuosl.org (Postfix) with ESMTP id D30C060AD5; Mon, 17 May 2021 17:54:10 +0000 (UTC) X-Virus-Scanned: amavisd-new at osuosl.org Received: from smtp3.osuosl.org ([127.0.0.1]) by localhost (smtp3.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1KFJ2Kpn5Djg; Mon, 17 May 2021 17:54:09 +0000 (UTC) Received: from ash.osuosl.org (ash.osuosl.org [140.211.166.34]) by smtp3.osuosl.org (Postfix) with ESMTP id E5AC260AD6; Mon, 17 May 2021 17:54:08 +0000 (UTC) X-Original-To: buildroot@lists.busybox.net Delivered-To: buildroot@osuosl.org Received: from smtp4.osuosl.org (smtp4.osuosl.org [140.211.166.137]) by ash.osuosl.org (Postfix) with ESMTP id 66ADD1BF344 for ; Mon, 17 May 2021 17:54:07 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by smtp4.osuosl.org (Postfix) with ESMTP id 55B4040351 for ; Mon, 17 May 2021 17:54:07 +0000 (UTC) X-Virus-Scanned: amavisd-new at osuosl.org Authentication-Results: smtp4.osuosl.org (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com Received: from smtp4.osuosl.org ([127.0.0.1]) by localhost (smtp4.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id v-jDSSd4qjfR for ; Mon, 17 May 2021 17:54:06 +0000 (UTC) X-Greylist: whitelisted by SQLgrey-1.8.0 Received: from mail-wm1-x32c.google.com (mail-wm1-x32c.google.com [IPv6:2a00:1450:4864:20::32c]) by smtp4.osuosl.org (Postfix) with ESMTPS id CA22840319 for ; Mon, 17 May 2021 17:54:05 +0000 (UTC) Received: by mail-wm1-x32c.google.com with SMTP id 62so3027916wmb.3 for ; Mon, 17 May 2021 10:54:05 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=kXOFJtWNgONaBhk1V8PuUOWphnlWpwjFHEV0lFxgsag=; b=OTfmwVpd7IC2IYkCdaF7aUo/4Jf9Z+XjHO52tG8pn8J65RzM8t8rwg27Wlg/QzRAVr nJwHZUO2Lz/exy/cwtcjlGzFybEd2OGJ9Y3JjYPvT316WUVFcy7sCX/7j/nVWKzVtYPl arzmPkV/MGfCOvibZ5MqjwqsScln+VOeh13a2rOtVTtAcUt9CojdEyQP7j0jUXvp4fB3 pW4nmdNxTCPk9YKgMyV6O2kxxyLkeCIjrAIrKe8FeFLrPMFE9VEwWdvtsNN2IEpaHQkK D5+GeIYW5ube3WcItDQflqHgvgOsiCQSA6MJcF8EiSfJwjqDCJIdT9EyrSJgk6GcjGuZ LLrg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=kXOFJtWNgONaBhk1V8PuUOWphnlWpwjFHEV0lFxgsag=; b=CYfPZPHH4URGDoei4/2T2EjMpoFu5m+mdsbulDEdiZS420rwdunJhW2mhQmHZfAzKw 2yAwjV6VoSAxCG+zXABSON7HC40AAdURq68Scit+8wwfsMbgbC8+fCrOtK8LHcm93i4m iwNBgwVJnMNIdVqT6G0thrFvgmM2zrkqA97ELddIeUa7sjXK6+E4BaTBLA0spsOVrhjj emU0vyj1xkJSGP1Jb9OLYdx6KOm8i0YeQwIuTG35DECcEwLuzHu0m9Jr315hNZMtZ/jF POgykQ9rxqf32CoJqrRgwM9gzGf38lnXlSmE0EzYg1tUZiTmoOiQtwLJ3OsMWxhAT4/i 0nCQ== X-Gm-Message-State: AOAM53320Bf1Ma4M0wAGbMo6FcmREasV1WIHJ0ExYo9YtWqFyHgV2pQu /uChnqWoibeiXnaqDXRmTYtqjJbXgnl9qg== X-Google-Smtp-Source: ABdhPJxBdGQaBEnpWRzZoitrYoNB/qJPiIRVVzaMKtg0V/05/DzGwfSJW/yroiUeLLOgoOx/I+FIrA== X-Received: by 2002:a1c:b384:: with SMTP id c126mr824528wmf.110.1621274044062; Mon, 17 May 2021 10:54:04 -0700 (PDT) Received: from dell5510.suse.de ([62.201.25.198]) by smtp.gmail.com with ESMTPSA id f1sm20343235wrr.63.2021.05.17.10.54.03 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 17 May 2021 10:54:03 -0700 (PDT) From: Petr Vorel To: buildroot@buildroot.org Date: Mon, 17 May 2021 19:53:57 +0200 Message-Id: <20210517175357.32742-1-petr.vorel@gmail.com> X-Mailer: git-send-email 2.31.1 MIME-Version: 1.0 Subject: [Buildroot] [PATCH v2 1/1] package/iproute2: bump version to 5.12.0 X-BeenThere: buildroot@busybox.net X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussion and development of buildroot List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Heiko Thiery , Thomas Petazzoni Errors-To: buildroot-bounces@busybox.net Sender: "buildroot" Backport from upstream mailing list patch from Heiko Thiery which fixes missing {name_to,open_by}_handle_at() on uclibc-ng < 1.0.35. Drop patch from v5.8.0. Signed-off-by: Petr Vorel --- NOTE: "config.mk: Rerun configure when it is newer than config.mk" [1] shouldn't be needed. Waiting for test runs. Kind regards, Petr [1] https://git.kernel.org/pub/scm/network/iproute2/iproute2-next.git/commit/?id=62c88ed9402650823a88c2974efdc39a320dfe7b .../0001-devlink-update-include-files.patch | 55 --------- ...-when-name-open-_to_handle_at-is-not.patch | 114 ++++++++++++++++++ package/iproute2/iproute2.hash | 2 +- package/iproute2/iproute2.mk | 2 +- 4 files changed, 116 insertions(+), 57 deletions(-) delete mode 100644 package/iproute2/0001-devlink-update-include-files.patch create mode 100644 package/iproute2/0001-lib-fs-fix-issue-when-name-open-_to_handle_at-is-not.patch diff --git a/package/iproute2/0001-devlink-update-include-files.patch b/package/iproute2/0001-devlink-update-include-files.patch deleted file mode 100644 index 8cc6e4ec60..0000000000 --- a/package/iproute2/0001-devlink-update-include-files.patch +++ /dev/null @@ -1,55 +0,0 @@ -From 12fafa27c7b306e6c397e858f4d5a8159500f659 Mon Sep 17 00:00:00 2001 -From: Stephen Hemminger -Date: Thu, 11 Jun 2020 09:46:46 -0700 -Subject: devlink: update include files - -Use the tool iwyu to get more complete list of includes for -all the bits used by devlink. - -This should also fix build with musl libc. - -Fixes: c4dfddccef4e ("fix JSON output of mon command") -Reported-off-by: Dan Robertson -Signed-off-by: Stephen Hemminger - -[Retrieved from: -https://git.kernel.org/pub/scm/network/iproute2/iproute2.git/commit/?id=12fafa27c7b306e6c397e858f4d5a8159500f659] -Signed-off-by: Fabrice Fontaine ---- - devlink/devlink.c | 9 ++++++++- - 1 file changed, 8 insertions(+), 1 deletion(-) - -diff --git a/devlink/devlink.c b/devlink/devlink.c -index 507972c3..ce2e4676 100644 ---- a/devlink/devlink.c -+++ b/devlink/devlink.c -@@ -19,18 +19,25 @@ - #include - #include - #include -+#include -+#include -+#include -+#include - #include - #define _LINUX_SYSINFO_H /* avoid collision with musl header */ - #include - #include -+#include - #include - #include -+#include -+#include - #include - - #include "SNAPSHOT.h" - #include "list.h" - #include "mnlg.h" --#include "json_writer.h" -+#include "json_print.h" - #include "utils.h" - #include "namespace.h" - --- -cgit 1.2.3-1.el7 - diff --git a/package/iproute2/0001-lib-fs-fix-issue-when-name-open-_to_handle_at-is-not.patch b/package/iproute2/0001-lib-fs-fix-issue-when-name-open-_to_handle_at-is-not.patch new file mode 100644 index 0000000000..b4e6374874 --- /dev/null +++ b/package/iproute2/0001-lib-fs-fix-issue-when-name-open-_to_handle_at-is-not.patch @@ -0,0 +1,114 @@ +From c5b72cc56bf88160bbf477ec8565fed865e7a1c9 Mon Sep 17 00:00:00 2001 +From: Heiko Thiery +Date: Sat, 8 May 2021 08:49:26 +0200 +Subject: [PATCH] lib/fs: fix issue when {name,open}_to_handle_at() is not + implemented + +With commit d5e6ee0dac64 the usage of functions name_to_handle_at() and +open_by_handle_at() are introduced. But these function are not available +e.g. in uclibc-ng < 1.0.35. To have a backward compatibility check for the +availability in the configure script and in case of absence do a direct +syscall. + +Fixes: d5e6ee0dac64 ("ss: introduce cgroup2 cache and helper functions") +Cc: Dmitry Yakunin +Cc: Petr Vorel +Signed-off-by: Heiko Thiery +Reviewed-by: Petr Vorel +Signed-off-by: David Ahern +[ upstream-status: https://git.kernel.org/pub/scm/network/iproute2/iproute2-next.git/commit/?id=c5b72cc56bf88160bbf477ec8565fed865e7a1c9 ] +--- + configure | 28 ++++++++++++++++++++++++++++ + lib/fs.c | 25 +++++++++++++++++++++++++ + 2 files changed, 53 insertions(+) + +diff --git a/configure b/configure +index 2c363d3b..179eae08 100755 +--- a/configure ++++ b/configure +@@ -202,6 +202,31 @@ EOF + rm -f $TMPDIR/setnstest.c $TMPDIR/setnstest + } + ++check_name_to_handle_at() ++{ ++ cat >$TMPDIR/name_to_handle_at_test.c < ++#include ++#include ++int main(int argc, char **argv) ++{ ++ struct file_handle *fhp; ++ int mount_id, flags, dirfd; ++ char *pathname; ++ name_to_handle_at(dirfd, pathname, fhp, &mount_id, flags); ++ return 0; ++} ++EOF ++ if $CC -I$INCLUDE -o $TMPDIR/name_to_handle_at_test $TMPDIR/name_to_handle_at_test.c >/dev/null 2>&1; then ++ echo "yes" ++ echo "CFLAGS += -DHAVE_HANDLE_AT" >>$CONFIG ++ else ++ echo "no" ++ fi ++ rm -f $TMPDIR/name_to_handle_at_test.c $TMPDIR/name_to_handle_at_test ++} ++ + check_ipset() + { + cat >$TMPDIR/ipsettest.c < ++#endif ++ + #define CGROUP2_FS_NAME "cgroup2" + + /* if not already mounted cgroup2 is mounted here for iproute2's use */ + #define MNT_CGRP2_PATH "/var/run/cgroup2" + ++ ++#ifndef HAVE_HANDLE_AT ++struct file_handle { ++ unsigned handle_bytes; ++ int handle_type; ++ unsigned char f_handle[]; ++}; ++ ++static int name_to_handle_at(int dirfd, const char *pathname, ++ struct file_handle *handle, int *mount_id, int flags) ++{ ++ return syscall(__NR_name_to_handle_at, dirfd, pathname, handle, ++ mount_id, flags); ++} ++ ++static int open_by_handle_at(int mount_fd, struct file_handle *handle, int flags) ++{ ++ return syscall(__NR_open_by_handle_at, mount_fd, handle, flags); ++} ++#endif ++ + /* return mount path of first occurrence of given fstype */ + static char *find_fs_mount(const char *fs_to_find) + { +-- +2.31.1 + diff --git a/package/iproute2/iproute2.hash b/package/iproute2/iproute2.hash index b2a9e21e11..a5d6bf022c 100644 --- a/package/iproute2/iproute2.hash +++ b/package/iproute2/iproute2.hash @@ -1,3 +1,3 @@ # From https://kernel.org/pub/linux/utils/net/iproute2/sha256sums.asc -sha256 725dc7ba94aae54c6f8d4223ca055d9fb4fe89d6994b1c03bfb4411c4dd10f21 iproute2-5.7.0.tar.xz +sha256 9d268db98a36ee2a0e3ff3b92b2efff66fc1138a51e409bdef6ab3cfe15f326f iproute2-5.12.0.tar.xz sha256 e6d6a009505e345fe949e1310334fcb0747f28dae2856759de102ab66b722cb4 COPYING diff --git a/package/iproute2/iproute2.mk b/package/iproute2/iproute2.mk index 3460c5c3b3..6cc0dd5210 100644 --- a/package/iproute2/iproute2.mk +++ b/package/iproute2/iproute2.mk @@ -4,7 +4,7 @@ # ################################################################################ -IPROUTE2_VERSION = 5.7.0 +IPROUTE2_VERSION = 5.12.0 IPROUTE2_SOURCE = iproute2-$(IPROUTE2_VERSION).tar.xz IPROUTE2_SITE = $(BR2_KERNEL_MIRROR)/linux/utils/net/iproute2 IPROUTE2_DEPENDENCIES = host-bison host-flex host-pkgconf \