aboutsummaryrefslogtreecommitdiff
path: root/package/libs
Commit message (Collapse)AuthorAge
* libxml2: update to 2.12.6Pascal Ernster2024-05-05
| | | | | | | | | | | | | | | | Release Notes: https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.6 Changelog (taken from the release notes): - Regressions - parser: Fix detection of duplicate attributes in XML namespace - xmlreader: Fix xmlTextReaderConstEncoding - html: Fix htmlCreatePushParserCtxt with encoding - xmllint: Return error code if XPath returns empty nodeset Compile-tested: x86_x64, Q35 VM, OpenWRT SNAPSHOT r26135-a8bfdf2ed4d9 Run-tested: x86_x64, Q35 VM, OpenWRT SNAPSHOT r26135-a8bfdf2ed4d9 Signed-off-by: Pascal Ernster <git@hardfalcon.net>
* libunwind: add support for loongarch64Weijie Gao2024-05-04
| | | | | | | Modify package depends to allow building for loongarch64. Also fix for building with musl. Signed-off-by: Weijie Gao <hackpascal@gmail.com>
* openssl: add linux64-loongarch64 into the targets listWeijie Gao2024-05-04
| | | | | | | Add "linux64-loongarch64-openwrt" into openssl configurations to enable building on loongarch64 machines. Signed-off-by: Weijie Gao <hackpascal@gmail.com>
* toolchain: Disable libtsan and liblsan sanitizer on loongarch64Weijie Gao2024-05-04
| | | | | | libtsan and liblsan are not supported by glibc on loongarch64 Signed-off-by: Weijie Gao <hackpascal@gmail.com>
* mbedtls: Remove Kconfig options removed from mbedtls 3.6.0Hauke Mehrtens2024-04-29
| | | | | | | | | | | | | | | | | These options are not available in mbedtls 3.6.0 and selecting them causes an error. MBEDTLS_CERTS_C was removed in: https://github.com/Mbed-TLS/mbedtls/commit/1aec64642cd0b9490c96fdd1fa9816741d93fce4 MBEDTLS_XTEA_C was removed in: https://github.com/Mbed-TLS/mbedtls/commit/10e8cf5fef7e062927bfbec69ad85fbf491b4299 MBEDTLS_SSL_TRUNCATED_HMAC was removed in: https://github.com/Mbed-TLS/mbedtls/commit/4a7010d1aaae937dfa328ef253d70d04b3b260ff Fixes: 0e0664264386 ("mbedtls: Update to version 3.6.0") Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
* libaudit: update to 3.1.4, join with daemon and utils, renameMarius Dinu2024-04-29
| | | | | | | | | | | | | | | | Changes: - new URL for sources (old address is dead) - daemon and utils from packages feed are merged in here - only build once - no need to update at the same time in both places - update to v3.1.4 - removed unneeded patches - added audisp-syslog - removed audispd (no longer exists) - rename and move to package/utils/audit - update new path in one dependent package Signed-off-by: Marius Dinu <m95d+git@psihoexpert.ro>
* libunwind: update to 1.8.1Weijie Gao2024-04-28
| | | | | | | | Rebased patches: - 003-fix-missing-ef_reg-defs-with-musl.patch - 004-ppc-musl.patch Signed-off-by: Weijie Gao <hackpascal@gmail.com>
* mbedtls: Update to version 3.6.0Hauke Mehrtens2024-04-28
| | | | | | | | | | | | | | | | | | | This adds support for mbedtls 3.6.0. The 3.6 version is the next LTS version of mbedtls. This version supports TLS 1.3. This switches to download using git. The codeload tar file misses some git submodules. Add some extra options added in mbedtls 3.6.0. The size of the compressed ipkg increases: 230933 bin/packages/mips_24kc/base/libmbedtls13_2.28.7-r2_mips_24kc.ipk 300154 bin/packages/mips_24kc/base/libmbedtls14_3.6.0-r1_mips_24kc.ipk The removed patch was integrated upstream. Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
* package/libs/libjson-c: fix PKG_CPE_IDFabrice Fontaine2024-04-27
| | | | | | | | | | | cpe:/a:json-c:json-c is the correct CPE ID for libjson-c: https://nvd.nist.gov/products/cpe/search/results?keyword=cpe:2.3:a:json-c:json-c Fixes: c61a2395140d92cdd37d3d6ee43a765427e8e318 (add PKG_CPE_ID ids to package and tools) Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com> Link: https://github.com/openwrt/openwrt/pull/15292 Signed-off-by: Robert Marko <robimarko@gmail.com>
* package/libs/pcre2: fix PKG_CPE_IDFabrice Fontaine2024-04-27
| | | | | | | | | cpe:/a:pcre:pcre2 is the correct CPE ID for pcre2: https://nvd.nist.gov/products/cpe/search/results?keyword=cpe:2.3:a:pcre:pcre2 Fixes: c39b0646f3f2d96d40f601209859175af8537b6d (pcre2: import pcre2 from packages feed) Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
* gettext-full: update to 0.22.5Tony Ambardar2024-04-25
| | | | | | | | | | | Release Announcement: https://savannah.gnu.org/news/?group_id=425 Refresh: - 200-libunistring-missing-link.patch Tested-by: Georgi Valkov <gvalkov@gmail.com> # MacOS Signed-off-by: Tony Ambardar <itugrok@yahoo.com>
* wolfssl: Update to 5.7.0Hauke Mehrtens2024-04-24
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | This fixes multiple security problems: * [High] CVE-2024-0901 Potential denial of service and out of bounds read. Affects TLS 1.3 on the server side when accepting a connection from a malicious TLS 1.3 client. If using TLS 1.3 on the server side it is recommended to update the version of wolfSSL used. * [Med] CVE-2024-1545 Fault Injection vulnerability in RsaPrivateDecryption function that potentially allows an attacker that has access to the same system with a victims process to perform a Rowhammer fault injection. Thanks to Junkai Liang, Zhi Zhang, Xin Zhang, Qingni Shen for the report (Peking University, The University of Western Australia)." * [Med] Fault injection attack with EdDSA signature operations. This affects ed25519 sign operations where the system could be susceptible to Rowhammer attacks. Thanks to Junkai Liang, Zhi Zhang, Xin Zhang, Qingni Shen for the report (Peking University, The University of Western Australia). Size increased a little: wolfssl 5.6.6: 516880 bin/packages/mips_24kc/base/libwolfssl5.6.6.e624513f_5.6.6-stable-r1_mips_24kc.ipk wolfssl: 5.7.0: 519429 bin/packages/mips_24kc/base/libwolfssl5.7.0.e624513f_5.7.0-stable-r1_mips_24kc.ipk Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
* mbedtls: Update to 2.28.8Hauke Mehrtens2024-04-24
| | | | | | | | | This contains a fix for: CVE-2024-28960: An issue was discovered in Mbed TLS 2.18.0 through 2.28.x before 2.28.8 and 3.x before 3.6.0, and Mbed Crypto. The PSA Crypto API mishandles shared memory. Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
* uclient: update to Git HEAD (2024-04-19)Felix Fietkau2024-04-19
| | | | | | e8780fa7792a uclient: fix http regression Signed-off-by: Felix Fietkau <nbd@nbd.name>
* uclient: update to Git HEAD (2024-04-19)Felix Fietkau2024-04-19
| | | | | | 704c78111a92 uclient-http: use ustream_ssl without ustream_fd Signed-off-by: Felix Fietkau <nbd@nbd.name>
* ustream-ssl: update to Git HEAD (2024-04-19)Felix Fietkau2024-04-19
| | | | | | 524a76e5af78 ustream-ssl: add support for using a fd instead of ustream as backing Signed-off-by: Felix Fietkau <nbd@nbd.name>
* uclient: update to Git HEAD (2024-04-18)Felix Fietkau2024-04-18
| | | | | | | c2bf660d88ec lib: add log_msg callback to get more detailed log messages 9adb4ca5219d uclient-fetch: add uclient / ustream-ssl log messages (enabled via -v) Signed-off-by: Felix Fietkau <nbd@nbd.name>
* ustream-ssl: update to Git HEAD (2024-04-18)Felix Fietkau2024-04-18
| | | | | | | f9a28a9ce864 ustream-ssl: poll connection on incomplete reads 3c49e70c4622 ustream-ssl: increase number of read buffers Signed-off-by: Felix Fietkau <nbd@nbd.name>
* ustream-ssl: update to Git HEAD (2024-04-18)Felix Fietkau2024-04-18
| | | | | | | | 60d8fbb5e669 mbedtls: handle session tickets for TLS 1.3 ac42af7981ae mbedtls: add ifdefs to fix legacy compatibility af7c3532ad49 mbedtls: another cosmetic ifdef fix Signed-off-by: Felix Fietkau <nbd@nbd.name>
* Revert "elfutils: fix a missing typedef in the last update"Felix Fietkau2024-04-15
| | | | | | | This reverts commit a9e22ffa5028e303dc32d15f1ce5e1be4c20e125. After doing a clean rebuild, it turns out that this change is not necessary Signed-off-by: Felix Fietkau <nbd@nbd.name>
* elfutils: fix a missing typedef in the last updateFelix Fietkau2024-04-15
| | | | | | Fixes perf Signed-off-by: Felix Fietkau <nbd@nbd.name>
* elfutils: update to 1.91Tony Ambardar2024-04-14
| | | | | | | | | | Release Notes: https://sourceware.org/pipermail/elfutils-devel/2024q1/006876.html Refresh patch: - 005-build_only_libs.patch Signed-off-by: Tony Ambardar <itugrok@yahoo.com>
* libbpf: Update to v1.4.0Tony Ambardar2024-04-13
| | | | | | | | | | Update to the latest upstream release to include recent improvements and bugfixes, and update copyright. Remove MAKE_VARS usage in Makefile and drop 001-cflags.patch which are no longer needed. Also add flags to disable LTO, mistakenly dropped earlier. Link: https://github.com/libbpf/libbpf/releases/tag/v1.4.0 Signed-off-by: Tony Ambardar <itugrok@yahoo.com>
* uclient: update to Git HEAD (2024-04-05)Felix Fietkau2024-04-07
| | | | | | | | | | | | | | e209a4ced1d8 add strdupa macro for compatibility af1962b9a609 uclient: add helper function for getting ustream-ssl context/ops 488f1d52cfd2 http: add helper function for checking redirect status b6e5548a3ecc uclient: defer read notifications to uloop timer 352fb3eeb408 http: call ustream_poll if not enough read data is available e611e6d0ff0b add ucode binding ddb18d265757 uclient: add function for getting the amount of pending read/write data 980220ad1762 ucode: fix a few ucode binding issues 6c16331e4bf5 ucode: add support for using a prototype for cb, pass it to callbacks Signed-off-by: Felix Fietkau <nbd@nbd.name>
* ustream-ssl: update to Git HEAD (2024-04-07)Felix Fietkau2024-04-07
| | | | | | | | | | | 7621339d7694 mbedtls: fix build on non-linux systems 268050964b08 ustream-mbedtls: add missing psa_crypto_init call 956fba242ac0 add callbacks for debug messages 9fdf3fb87af5 mbedtls: add TLS 1.3 ciphers 28c4c1e6471b mbedtls: disable TLS 1.3 in client mode when skipping verification d61493a44204 mbedtls: add missing ifdef for build with disabled debug Signed-off-by: Felix Fietkau <nbd@nbd.name>
* treewide: update PKG_MIRROR_HASH to zstPaul Spooren2024-04-06
| | | | | | | When using zst instead of xz, the hash changes. This commit fixes the hash for packages and tools in core. Signed-off-by: Paul Spooren <mail@aparcar.org>
* gettext-full: link libiconv when building host pkgYanase Yuki2024-04-05
| | | | | | | | On Fedora 40 system, some compile error happens when building iconv-ostream.c. Linking to libiconv-full fixes this. Signed-off-by: Yanase Yuki <dev@zpc.st>
* libubox: fix PKG_MIRROR_HASH of 2024-03-29Paul Spooren2024-04-04
| | | | | | | | | | The PKG_MIRROR_HASH was wrong (again), likely due to an old set of tools which did not contain the downgrade of xz. Ref 2070049 unetd: fix PKG_MIRROR_HASH Fix 89c594e libubox: update to Git HEAD (2024-03-29)" Signed-off-by: Paul Spooren <mail@aparcar.org>
* libxml2: add host build dependency on libiconv-fullFelix Fietkau2024-04-04
| | | | | | Fixes build on macOS Signed-off-by: Felix Fietkau <nbd@nbd.name>
* libubox: update to Git HEAD (2024-03-29)Felix Fietkau2024-04-04
| | | | | | | | a2fce001819e CI: add build test run 12bda4bdb197 CI: add CodeQL workflow tests eb9bcb64185a ustream: prevent recursive calls to the read callback Signed-off-by: Felix Fietkau <nbd@nbd.name>
* mbedtls: copy psa includes in InstallDevFelix Fietkau2024-04-03
| | | | | | They are required for some of the crypto API Signed-off-by: Felix Fietkau <nbd@nbd.name>
* treewide: use APK compatible version schemaPaul Spooren2024-03-22
| | | | | | | | | | | | | | | | | Different from OPKG, APK uses a deterministic version schema which chips the version into chunks and compares them individually. This enforces a certain schema which was previously entirely flexible. - Releases are added at the very and end prefixed with an `r` like `1.2.3-r3`. - Hashes are prefixed with a `~` like `1.2.3~abc123`. - Dates become semantic versions, like `2024.04.01` - Extra tags are possible like `_git`, `_alpha` and more. For full details see the APK test list: https://gitlab.alpinelinux.org/alpine/apk-tools/-/blob/master/test/version.data Signed-off-by: Paul Spooren <mail@aparcar.org>
* glibc: don't ship /etc/localtime -> /tmp/localtime symlinkDaniel Golle2024-03-20
| | | | | | | The symlink is already part of the base-files package. We don't need to ship it with glibc again. Signed-off-by: Daniel Golle <daniel@makrotopia.org>
* libevent2: make cmake use relative imported pathLiu Dongmiao2024-03-13
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | libevent2's cmake use absolute path, then cmake cannot find it when cross compiling: ``` -- Found libevent include directory: /builder/staging_dir/target-mips_24kc_musl/usr/include -- Found libevent component: /builder/staging_dir/target-mips_24kc_musl/usr/lib/libevent_core.so -- Found libevent component: /builder/staging_dir/target-mips_24kc_musl/usr/lib/libevent_extra.so -- Found libevent component: /builder/staging_dir/target-mips_24kc_musl/usr/lib/libevent_openssl.so -- Found libevent 2.1.12 in /builder/staging_dir/target-mips_24kc_musl/usr CMake Error at /builder/staging_dir/target-mips_24kc_musl/usr/lib/cmake/libevent/LibeventTargets-shared.cmake:102 (message): The imported target "libevent::core" references the file "/usr/lib/libevent_core-2.1.so.7.0.1" but this file does not exist. Possible reasons include: * The file was deleted, renamed, or moved to another location. * An install or uninstall procedure did not complete successfully. * The installation package was faulty and contained "/builder/staging_dir/target-mips_24kc_musl/usr/lib/cmake/libevent/LibeventTargets-shared.cmake" but not all the files it references. Call Stack (most recent call first): /builder/staging_dir/target-mips_24kc_musl/usr/lib/cmake/libevent/LibeventConfig.cmake:168 (include) CMakeLists.txt:34 (find_package) ``` This patch make cmake use relative imported path, so it can find libevent. Signed-off-by: Liu Dongmiao <liudongmiao@gmail.com>
* mbedtls: enable threading supportFelix Fietkau2024-03-08
| | | | | | | Fixes libssh, which requires it. Bump ABI_VERSION, since enabling this option affects data structures in mbedtls include files. Signed-off-by: Felix Fietkau <nbd@nbd.name>
* libxml2: update to 2.12.5Nick Hainke2024-02-13
| | | | | | | | Release Notes: https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.5 Fixes: CVE-2024-25062 Signed-off-by: Nick Hainke <vincent@systemli.org>
* zlib: update to 1.3.1Nick Hainke2024-02-02
| | | | | | | | | | Release Notes: https://github.com/madler/zlib/releases/tag/v1.3.1 Refresh patch: - 004-attach-sourcefiles-in-patch-002-to-buildsystem.patch Signed-off-by: Nick Hainke <vincent@systemli.org>
* openssl: update to 3.0.13Ivan Pavlov2024-02-02
| | | | | | | | | | | | | | | | Major changes between OpenSSL 3.0.12 and OpenSSL 3.0.13 [30 Jan 2024] * Fixed PKCS12 Decoding crashes ([CVE-2024-0727]) * Fixed Excessive time spent checking invalid RSA public keys ([CVE-2023-6237]) * Fixed POLY1305 MAC implementation corrupting vector registers on PowerPC CPUs which support PowerISA 2.07 ([CVE-2023-6129]) * Fix excessive time spent in DH check / generation with large Q parameter value ([CVE-2023-5678]) Signed-off-by: Ivan Pavlov <AuthorReflex@gmail.com>
* libbsd: update to 0.11.8Nick Hainke2024-01-30
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Changelog: edddd80 Release libbsd 0.11.8 dd0bdb5 test: Close all descriptors before initializing them for closefrom() 0813f37 build: Check out-of-tree builds in CI df116b5 Adjust strlcpy() and strlcat() per glibc adoption ecb44e1 Do not add a pointer to the NULL constant 459b7f7 Do not confuse code analyzers with out-of-bounds array access look alike a44f885 test: Fix short-lived memory leak 3f5ca0a build: Add a coverage regex to the CI job 9d3e59a man: Use VARIANTS instead of ALTERNATIVES in libbsd(7) f02562d man: Markup function references with Xr instead of Fn b7367c9 build: Add missing dash to macro title bar 6777eb6 pwcache: Do not declare uidtb and gidtb when not used d4e0cdc fgetln: Include <stdio.h> after <sys/*> f41d6c1 build: Refactor GNU .init_array support check into a new m4 function 30b48ed build: Refactor linker script detection into a new m4 function d0d8d01 build: Do not provide prototypes for arc4random() on Solaris cf61ebb build: Do not build the progname module if it is not needed 73b25a8 build: Sort entries alphabetically 5434ba1 build: Conditionalize wcslcpy() and wcslcat() functions on macOS dc1bd1a build: Conditionalize only id-from-name functions not the entire pwcache edc746e build: Conditionalize getprogname()/setprogname on macOS 8f998d1 progname: Include <procinfo.h> if available d08163b build: Check whether we need libperfstat on AIX 1186cf8 build: Annotate droppable functions for musl on next SOVERSION bump 6385ccc build: Conditionalize bsd_getopt() on macOS c120681 Move the version script comments before the symbols 9fa0676 Port getprogname() to AIX 92337b1 Make getprogname() porting mandatory 90b7f3a test: Do not use /dev/null as compiler output file 426bf45 build: Add generated *.sym files to .gitignore 21d12b0 build: On macOS do not build functions provided by the system bc65806 build: Select whether to include funopen() in the build system 8b7a4d9 build: Move Windows OS detection to the OS features section ccbfd1c build: Remove __MUSL__ definition from configure e0976d7 build: Add a new libbsd_strong_alias() macro and switch users to it 49c7dd1 build: Only emit link warnings for ELF objects 8622767 build: Use an export symbols file if there is no version script support 8f61036 build: Add -no-undefined libtool flag ae7942b build: Do not override the default DEPENDENCIES for libbsd a5faf17 Only use <stdio_ext.h> if present 06e8a1b Define _NSIG if it is not defined by the system 44824ac Declare environ if the system does not do so 1fb6c3f Use lockf() when flock() is not available fe16f38 test: Use open_memstream() only if available 7c652a9 test: Do not hardcode root:root user and group names ed2eb31 test: Fix closefrom() test on macOS 0f8bcdf test: Fix closefrom() test to handle open file descriptor limits 07192b3 test: Disable blank_stack_side_effects() on non-Hurd systems ca3db5e build: Do not enable ASAN for musl CI pipelines ff46386 man: Add HISTORY section to arc4random(3bsd) 4c6da57 man: Switch arc4random(3bsd) man page from OpenBSD to NetBSD 830dd88 doc: Remove written-by attribution 257800a build: Add support for sanitizer compiler flags 536a7d4 test: Exempt blank_stack_side_effects() from sanitizer checks 7ed5de0 test: Import explicit_bzero() sanitizer support changes from OpenBSD 05a802a test: Fix memory leaks in fpurge test 5962e03 man: Fix BSD and glibc versions 59a21c7 man: Update STANDARDS and HISTORY sections 7b4ebd6 include: Adjust closefrom() per glibc adoption 0dfbe76 build: Switch to debian:latest Docker image dec783d build: Fix version script linker support detection fe21244 include: Use __has_builtin to detect __builtin_offsetof support ec88b7b funopen: Replace off64_t with off_t in funopen_seek() 2337719 man: Prune unneeded <sys/types.h> include in setproctitle(3) 5dea9da build: Improve C99 compatibility of __progname configure check b9bf42d build: Enable -Wall for automake e57c078 build: Add missing AM_PROG_AR macro call to configure.ac 80f1927 build: Fix configure.ac indentation b7a8bc2 build: Require automake 1.11 e508962 build: Do not require funopen() to be ported 00b538f build: Terminate lists in variables with «# EOL» 5cfa39e build: Use «yes» instead of «true» for AC_CHECK_FUNCS cache value Signed-off-by: Nick Hainke <vincent@systemli.org>
* mbedtls: security bump to version 2.28.7orangepizza2024-01-29
| | | | | | | | | | | | | | | | | | | | | | | | | | | | This release of Mbed TLS provides bug fixes and minor enhancements. This release includes fixes for following security issues: * Timing side channel in private key RSA operations (CVE-2024-23170) Mbed TLS is vulnerable to a timing side channel in private key RSA operations. This side channel could be sufficient for an attacker to recover the plaintext. A local attacker or a remote attacker who is close to the victim on the network might have precise enough timing measurements to exploit this. It requires the attacker to send a large number of messages for decryption. * Buffer overflow in mbedtls_x509_set_extension() (CVE-2024-23775) When writing x509 extensions we failed to validate inputs passed in to mbedtls_x509_set_extension(), which could result in an integer overflow, causing a zero-length buffer to be allocated to hold the extension. The extension would then be copied into the buffer, causing a heap buffer overflow. Fixes: CVE-2024-23170, CVE-2024-23775 References: https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-01-1/ References: https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-01-2/ Signed-off-by: orangepizza <tjtncks@gmail.com> Signed-off-by: Petr Štetiar <ynezz@true.cz> [formal fixes]
* libubox: update to Git HEAD (2024-01-26)Felix Fietkau2024-01-26
| | | | | | | 6339204c212b CMakeLists.txt: bump minimum cmake version c1be505732e6 udebug: fix crash in udebug_entry_vprintf with longer strings Signed-off-by: Felix Fietkau <nbd@nbd.name>
* libtracefs: update to 1.8Nick Hainke2024-01-25
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Changes: 67f3b2a libtracefs: version 1.8 8a1322f libtracefs utest: Add tests to use mapping if supported 0a65b79 libtracefs: Add tracefs_mapped_is_supported() API 805f650 libtracefs: Call mmap ioctl if a refresh happens cf7e2a5 libtracefs: Fix tracefs_mmap() kbuf usage 3a26b26 libtracefs: Have nonblock tracefs_cpu reads set errno EAGAIN 2b5bb09 libtracefs: Have tracefs_mmap_read() include subbuf meta data dee0448 libtracefs: Have mapping work with the other tracefs_cpu* functions 28eebc1 libtracefs: Have tracefs_cpu_flush(_buf)() use mapping 065d914 libtracefs: Use mmapping for iterating raw events 1124e0e libtracefs: Use tracefs_cpu_*_buf() calls for iterator f43b293 libtracefs: Unmap mmap mapping on tracefs_cpu close 0d24516 libtracefs Documentation: Fix tracefs_cpu_snapshot_open() man pages 5ff31c0 libtracefs Documentation: Add tracefs_follow_events_clear() to main man page 0c7d9f7 libtracefs: Add man pages for tracefs_snapshot_*() functions b2dc3e0 libtracefs sql: Rename TIMESTAMP_USECS_DELTA to TIMESTAMP_DELTA_USECS 585ec77 libtracefs: Force off trace mmapping 2ed14b5 libtracefs: Add ring buffer memory mapping APIs 173ffc0 libtracefs meson: Add option to disable samples a55e2e8 libtracefs meson: Add option to disable documentation 93e20af libtracefs: Fix tracefs_instance_reset to clear synthetic events a1ecbff libtracefs utest: Add more tests to test tracefs_sql() 975c37c libtracefs utest: Add matches to trace_sql() tests 0567e2d libtracefs synthetic: Handle hashed name variables fcb3a83 libtracefs synthetic: Remove multiple adding of action in tracefs_synth_save() a9dae65 libtracefs: Fix sqlhist used uninitialized error fe7a467 libtracefs: Add updating and reading snapshot buffers 1ad57ab libtracefs: Add PID filtering API d8726bf libtracefs: Also clear max_graph_depth on reset eb4dd60 libtracefs: Add TIMESTAMP_USECS_DELTA to simplify SQL timestamp compares 8c57eb4 libtracefs: Add tracefs_instance_set/get_subbuf_size() 9bafb21 libtracefs: Add API to extract ring buffer statistics 141d25e libtracefs: Add tracefs_load_headers() API ef3fae7 libtracefs: Add kerneldoc comments to tracefs_instance_set_buffer_size() 31acfe1 libtracefs utest: Add test to test tracefs_instance_set/get_buffer_percent() 3e6d975 libtracefs: Add tracefs_instance_clear() API c4efaaf libtracefs: Add tracefs_instance_get/set_buffer_percent() 1e1cc54 libtracefs: Add API to read tracefs_cpu and return a kbuffer 7d395b1 libtracefs: Add tracefs_instance_file_write_number() e34cbd8 libtracefs: Increase splice to use pipe max size 1f50965 libtracefs: Add API to remove followers from an instance or toplevel 576ee0b libtracefs: Reset tracing before and after unit tests 118b694 libtracefs: Free dynamic event list in utest 5159973 libtracefs: Free tracing_dir in case of remount df563eb libtracefs: Free buf in clear_func_filter() 3cbac37 libtracefs: Free "missed_followers" of instance 0cbe56e libtracefs testing: Use one tep handle for most tests adac30f libtracefs Documentation: Fix tracefs_event_file_exists() issues 07ab199 libtracefs: Pass enum value where expected instead of int bb299b4 libtracefs: fix cscope makefile rule 420d677 libtracefs: Free "followers" when freeing instance 3f436fc libtracefs: Fix documentation of tracefs_trace_pipe_stream() flags 1fde9df libtracefs: Add explicit pthread dependency to meson d1989ae tracefs-perf: Add missing headers for syscall() and SYS_* defines Signed-off-by: Nick Hainke <vincent@systemli.org>
* libtraceevent: update to 1.8.2Nick Hainke2024-01-25
| | | | | | | | | | | | | | | | | | | | | | | | | Changelog: 6f6d580 libtraceevent: 1.8.2 b29b192 kbuffer: Update kbuf->next in kbuffer_refresh 4b2286c kbuffer: Always walk the events to calculate timestamp in kbuffer_read_buffer() ce0acec libtraceevent meson: Add libdl dependency to meson 15a0121 libtraceevent Documentation: Fix tep_kbuffer() prototype 85a2078 libtraceevent: 1.8.1 6b21b4c libtraceevent: Add tep_get_sub_buffer_data_size() 8cf5315 libtraceevent: 1.8 7a4d5b2 kbuffer: Add kbuffer_refresh() API 33bad32 kbuffer: Add kbuffer_subbuffer() API f6bdff7 kbuffer: Add kbuffer_dup() 0582118 kbuffer: Add kbuffer_read_buffer() 014ca24 libtraceevent: Fix tep_kbuffer() to have kbuf assign long_size afead9a libtraceevent: Add tep_get_sub_buffer_commit_offset() 3152506 libtraceevent plugins: Parse sched_switch "prev_state" field for state info 4be92aa libtraceevent: Bump meson version to >=0.58.0 9b2e543 libtraceevent: sync state char array with the kernel 5b89385 libtraceevent: Add option to disable documentation a496a39 libtraceevent: Add tep_record_is_event() API Signed-off-by: Nick Hainke <vincent@systemli.org>
* libxml2: update to 2.12.4Nick Hainke2024-01-24
| | | | | | | Release Notes: - https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.4 Signed-off-by: Nick Hainke <vincent@systemli.org>
* gettext-full: use autoreconf host fixupAlexander Egorenkov2024-01-15
| | | | | | | | | | To prevent use of host's library path on Void Linux: /usr/lib/libacl.so: file not recognized: file format not recognized collect2: error: ld returned 1 exit status libtool: error: error: relink 'libgettextlib.la' with the above command before installing it Signed-off-by: Alexander Egorenkov <egorenar-dev@posteo.net>
* libubox: work around recent macOS linker changeFelix Fietkau2024-01-09
| | | | | | | | | rpath handling seems to be more restrictive now. To deal with this, link the libubox library from STAGING_DIR_HOST to STAGING_DIR_HOSTPKG, so that packages installed to STAGING_DIR_HOSTPKG can pick it up. This mainly affects ucode, but possibly other host builds as well Signed-off-by: Felix Fietkau <nbd@nbd.name>
* mpfr: import from packages feedHannu Nyman2024-01-04
| | | | | | | Import mpfr from the packages feed to the main OpenWrt repo, as gdb 14 requires mpfr. Signed-off-by: Hannu Nyman <hannu.nyman@iki.fi>
* libnl: update to 3.9.0Nick Hainke2024-01-04
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Changes: bdf83151 libnl-3.9.0 release aa7353fd include/linux-private: import 'seg6 local' headers from kernel tree 9466f680 lib: remove unused assignment in nl_addr_parse() acd05d6e route/tc: avoid integer overflow in rtnl_tc_calc_cell_log() daa8efcb xfrm: return -NLE_MISSING_ATTR from xfrmnl_sa_get_auth_params() d8a1ff30 xfrm: fix leaking usertemplate in xfrmnl_sp_parse() 4fcb0757 socket: workaround coverity warning about time_t handling f743c62f github: update Fedora image and version for clang-format f33e8cd6 clang-format: rework container script aea3f9f2 lib: fix signed overflow warning in nl_object_diff() 57e01706 socket: explicitly cast time() to uint32_t 46e8739e src: fix leak in "nl-cls-add" a06c8f76 route/cls: add get/take wrappers for rtnl_act_append() 7912b4f9 route/cls: fix leak in error handling of rtnl_flower_append_action() efd65feb route: fix just introduced use-after-free in rtnl_act_parse() 105a6be1 route: use cleanup macro in rtnl_act_parse() 78246da7 nl-aux-route: add cleanup macro for rtnl_act_put_all() 72762b20 base: add _NL_AUTO_DEFINE_FCN_INDIRECT0() macro a70f789a route: fix memleak in rtnl_act_parse() 65ab16f2 base: don't use static array indices for buffer argument of _nl_inet_ntop() 444e2c04 route/can: implement can_device_stats a4718e67 github: build with "-fexceptions" CFLAGS 2f485cc7 xfrm: refactor error handling in XFRM parsing 01bd8fb0 include: add "nl-aux-xfrm" helpers 49c20efa xfrm: fix crashes in case of ENOMEM 9e7b5c86 xfrm: refactor nl_addr_build() calls in XFRM code dbfd87b1 xfrm: use cleanup attribute for nl_addr in XFRM parsing db424835 xfrm: fix error code for NLE_ENOMEM in xfrmnl_ae_parse() 9c97deff xfrm: fix parsing address in xfrmnl_ae_parse() 8b6dc834 nl-aux-core: add _nl_addr_build() helper 057aac13 nl-base-utils: add _nl_addr_family_to_size() helper 664f8f1b xfrm: clear XFRM_SP_ATTR_TMPL when removing the last template from a policy c4c22d26 xfrm/sp: fix reference counters of sa selector/tmpl addresses 5979fcb0 route/link: add bonding interface options set rtnl apis a735989c build: fix declaring special targets as ".PHONY" 052a97cb Makefile.am: avoid use of non-portable echo arguments 9aab12df python: Use correct decorator syntax in HTBQdisc Signed-off-by: Nick Hainke <vincent@systemli.org>
* libxml2: update to 2.12.3Nick Hainke2024-01-04
| | | | | | | | Release Notes: - https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.2 - https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.3 Signed-off-by: Nick Hainke <vincent@systemli.org>
* wolfssl: update to 5.6.6Nick Hainke2024-01-02
| | | | | | | | | | | Release Notes: https://github.com/wolfSSL/wolfssl/releases/tag/v5.6.6-stable Refresh patches: - 100-disable-hardening-check.patch Fixes: CVE-2023-6935 CVE-2023-6936 CVE-2023-6937 Signed-off-by: Nick Hainke <vincent@systemli.org>