33230 Commits

Author SHA1 Message Date
Calin Crisan
9f35f8f053 Merge branch 'thingos' into dev 2018-11-18 19:56:31 +02:00
Calin Crisan
b088ab0f26 skeleton-init-commom: do not assume /etc/hostname exists 2018-11-18 19:55:56 +02:00
Calin Crisan
010f812c81 motion: add hash 2018-11-18 18:07:32 +02:00
Calin Crisan
b87554442c Merge branch 'thingos' into dev 2018-11-18 16:44:25 +02:00
Calin Crisan
a7b265dc8a rpi-armmem: fix install command 2018-11-16 23:54:24 +02:00
Calin Crisan
d7d7977398 rpi-armmem: update & enable for all rpis 2018-11-15 23:40:57 +02:00
Calin Crisan
6cce01fcbb rpi-firmware: post-merge fix 2018-11-12 11:40:41 +02:00
Calin Crisan
e4a8de1d55 Release 2018.08.2
-----BEGIN PGP SIGNATURE-----
 
 iHAEABECADAWIQSrB9gG0s50H7iG7lCwJbqLWcNjGQUCW9G6QRIcamFjbWV0QHVj
 bGliYy5vcmcACgkQsCW6i1nDYxlGBwCgnOKITuifymOE/wuasJSTv0jgytsAoI9w
 nkOFc9/ucAmLZ7UF3po10WbV
 =4JZN
 -----END PGP SIGNATURE-----

Merge tag '2018.08.2' into buildroot-next

Release 2018.08.2
2018-11-12 11:32:13 +02:00
Calin Crisan
89851a1334 skeleton-init-commom: do not assume /etc/hosts and /etc/shadow exist 2018-11-11 23:00:55 +02:00
Calin Crisan
b4b9f83715 rpi-userland: remove non-applicable patches 2018-11-10 22:10:10 +02:00
Calin Crisan
1276eff68b Really update hashesh for rpi-firmware and rpi-userland 2018-11-10 21:55:40 +02:00
Calin Crisan
c191fa4330 Update hashesh for rpi-firmware and rpi-userland 2018-11-10 21:50:26 +02:00
Calin Crisan
4b8605e26c Merge branch 'buildroot-next' into dev 2018-11-10 20:35:24 +02:00
Calin Crisan
fd59cdb36b Update rpi-userland 2018-11-10 20:34:24 +02:00
Calin Crisan
36e6eb9e0c raspberrypi (all): update kernel 2018-11-10 20:31:57 +02:00
Calin Crisan
c77070e015 Release 2018.02.7
-----BEGIN PGP SIGNATURE-----
 
 iHAEABECADAWIQSrB9gG0s50H7iG7lCwJbqLWcNjGQUCW9IO7hIcamFjbWV0QHVj
 bGliYy5vcmcACgkQsCW6i1nDYxkTDACdG/XsSKJH+DgUvBnttigm5qNjTe4An3uK
 DeTdMVe4xqc3Tax8nLOCWaxz
 =QjVu
 -----END PGP SIGNATURE-----

Merge tag '2018.02.7' into buildroot-next

Release 2018.02.7
2018-11-09 23:33:18 +02:00
Calin Crisan
c388a80638 Merge in buildroot-2018.02.7 2018-11-09 23:00:45 +02:00
Bernd Kuhls
8c3758288a package/live555: security bump to version 2018.10.17
Changelog: http://www.live555.com/liveMedia/public/changelog.txt

Fixes CVE-2018-4013:
https://security-tracker.debian.org/tracker/CVE-2018-4013

Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 01d7686c907eab026781d700999ba09dec29b48e)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2018-10-24 17:58:57 +02:00
Bernd Kuhls
4b910d13e7 package/live555: bump version to 2018.08.05
Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit e305ae1c1b7b2b68f28842eaf8aed7a81d07a90a)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2018-10-24 17:58:50 +02:00
Bernd Kuhls
058d6a0e94 package/live555: Add a pkg-config file for the shared libraries
Needed for vlc to fix linking issue.

Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit 13f7959e8d99468ab6718f037210c972120ea775)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2018-10-24 17:58:44 +02:00
Bernd Kuhls
7da5629626 package/live555: security bump to version 2018.10.17
Changelog: http://www.live555.com/liveMedia/public/changelog.txt

Fixes CVE-2018-4013:
https://security-tracker.debian.org/tracker/CVE-2018-4013

Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 01d7686c907eab026781d700999ba09dec29b48e)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2018-10-24 17:58:25 +02:00
Bernd Kuhls
a5672d609a package/live555: bump version to 2018.08.05
Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit e305ae1c1b7b2b68f28842eaf8aed7a81d07a90a)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2018-10-24 17:58:19 +02:00
Bernd Kuhls
52b83f394e package/live555: Add a pkg-config file for the shared libraries
Needed for vlc to fix linking issue.

Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit 13f7959e8d99468ab6718f037210c972120ea775)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2018-10-24 17:58:13 +02:00
Joshua Henderson
9eb45c226c qt5base: Qt KMS support does not depend on opengl
Qt KMS support should not explicitly depend on the availability of opengl.
Don't explicitly disable KMS if opengl is not available and fallback to
detecting if libdrm is available before disabling kms.

The scenario where this is necessary involves using the Qt linuxfb backend
"dumb buffer" support via the DRM API.  This is new in Qt 5.9 [1] and only
requires KMS, but not opengl. Although on Qt 5.6, only eglfs actually
uses libdrm/kms, it doesn't hurt to add the dependency and the -kms
option there as well, and doing so keeps the logic in the .mk file
simple.

[1] http://doc.qt.io/qt-5/embedded-linux.html#linuxfb

Cc: Peter Seiderer <ps.report@gmx.net>
Cc: Julien Corjon <corjon.j@ecagroup.com>
Signed-off-by: Joshua Henderson <joshua.henderson@microchip.com>
Signed-off-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>
(cherry picked from commit f91ea94a6f4d1387b062f9f09c98badf0766127f)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2018-10-24 17:53:54 +02:00
Joshua Henderson
1a8801a2a8 qt5base: Qt KMS support does not depend on opengl
Qt KMS support should not explicitly depend on the availability of opengl.
Don't explicitly disable KMS if opengl is not available and fallback to
detecting if libdrm is available before disabling kms.

The scenario where this is necessary involves using the Qt linuxfb backend
"dumb buffer" support via the DRM API.  This is new in Qt 5.9 [1] and only
requires KMS, but not opengl. Although on Qt 5.6, only eglfs actually
uses libdrm/kms, it doesn't hurt to add the dependency and the -kms
option there as well, and doing so keeps the logic in the .mk file
simple.

[1] http://doc.qt.io/qt-5/embedded-linux.html#linuxfb

Cc: Peter Seiderer <ps.report@gmx.net>
Cc: Julien Corjon <corjon.j@ecagroup.com>
Signed-off-by: Joshua Henderson <joshua.henderson@microchip.com>
Signed-off-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>
(cherry picked from commit f91ea94a6f4d1387b062f9f09c98badf0766127f)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2018-10-24 17:53:43 +02:00
Bernd Kuhls
a8b91b25d0 package/mariadb: add option to disable build of embedded server
Size of output/target/usr:

with embedded: 1,7G
without embedded: 648M

This config option saves space on the target if the embedded server
is not used by any other package:

https://mariadb.com/kb/en/library/embedded-mariadb-interface/
Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Tested-by: Ryan Coe <bluemrp9@gmail.com>
[Peter: make Config.in option depend on _MARIADB_SERVER]
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>

(cherry picked from commit 19df27ed03b33cd86c971afb355091161972851f)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2018-10-24 17:51:36 +02:00
Bernd Kuhls
adeedc9d24 package/mariadb: add option to disable build of embedded server
Size of output/target/usr:

with embedded: 1,7G
without embedded: 648M

This config option saves space on the target if the embedded server
is not used by any other package:

https://mariadb.com/kb/en/library/embedded-mariadb-interface/
Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Tested-by: Ryan Coe <bluemrp9@gmail.com>
[Peter: make Config.in option depend on _MARIADB_SERVER]
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>

(cherry picked from commit 19df27ed03b33cd86c971afb355091161972851f)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2018-10-24 17:51:23 +02:00
Thomas Petazzoni
c494470c57 package/mongoose: add security patch fixing CVE-2018-10945
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit dea3ab68400503bebf4152277d63813508f43424)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2018-10-24 14:46:07 +02:00
Thomas Petazzoni
5ab4c16499 package/mongoose: add security patch fixing CVE-2018-10945
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit dea3ab68400503bebf4152277d63813508f43424)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2018-10-24 14:45:59 +02:00
Thomas Petazzoni
d7ed6c7ce7 package/gcc: disable libcilkrts when there is no thread support
The libcilkrts configure script errors out with "Pthreads are required
to build libcilkrts" if the C library doesn't have thread support. To
fix that, we disable libcilkrts when thread support is not available.

This issue was not noticed until now, because we only regularly build
a no-thread toolchain for ARM, and libcilkrts was enabled on ARM only
starting in gcc 7.x.

This fixes the build of no-thread toolchains on architectures where
libcilkrts is supported, i.e x86/x86-64, ARM and Sparc.

Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
Reviewed-by: Romain Naour <romain.naour@gmail.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit 076fd27da721971f44f681d5a06f68496371d96a)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2018-10-24 14:35:56 +02:00
Thomas Petazzoni
6e2e798242 package/gcc: disable libcilkrts when there is no thread support
The libcilkrts configure script errors out with "Pthreads are required
to build libcilkrts" if the C library doesn't have thread support. To
fix that, we disable libcilkrts when thread support is not available.

This issue was not noticed until now, because we only regularly build
a no-thread toolchain for ARM, and libcilkrts was enabled on ARM only
starting in gcc 7.x.

This fixes the build of no-thread toolchains on architectures where
libcilkrts is supported, i.e x86/x86-64, ARM and Sparc.

Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
Reviewed-by: Romain Naour <romain.naour@gmail.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit 076fd27da721971f44f681d5a06f68496371d96a)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2018-10-24 14:35:42 +02:00
Martin Bark
df81782687 package/ca-certificates: create ca-certificates.crt reproducibly
Sort the certificates into alphabetical order so the contents of
ca-certificates.crt can be built reproducibly.

Note: The certificates are sorted uppercase then lowercase filenames
so the contents of ca-certificates.crt matches the source debian package.

Signed-off-by: Martin Bark <martin@barkynet.com>
Signed-off-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>
(cherry picked from commit c61b49e5b5c83237c8895d8caf76a9c448c41241)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2018-10-24 14:34:06 +02:00
Martin Bark
1a33cfffc4 package/ca-certificates: create ca-certificates.crt reproducibly
Sort the certificates into alphabetical order so the contents of
ca-certificates.crt can be built reproducibly.

Note: The certificates are sorted uppercase then lowercase filenames
so the contents of ca-certificates.crt matches the source debian package.

Signed-off-by: Martin Bark <martin@barkynet.com>
Signed-off-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>
(cherry picked from commit c61b49e5b5c83237c8895d8caf76a9c448c41241)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2018-10-24 14:33:56 +02:00
Martin Bark
b557259ab4 package/ca-certificates: fix rebuilds
Rebuilding ca-certificates using make ca-certificates-rebuild
caused duplicate certificates to be installed in the target. Its build
system is broken: it doesn't detect that the output file already exists,
and instead of overwriting it, a duplicate is generated under a
different name. The net effect is that all certificates are installed
twice after rebuild.

Fix this by cleaning the build directory before building the package.

Signed-off-by: Martin Bark <martin@barkynet.com>
Signed-off-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>
(cherry picked from commit 42b10634c628918c753bfb1aad4f950fa5d41299)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2018-10-24 14:33:16 +02:00
Martin Bark
89500d4219 package/ca-certificates: fix rebuilds
Rebuilding ca-certificates using make ca-certificates-rebuild
caused duplicate certificates to be installed in the target. Its build
system is broken: it doesn't detect that the output file already exists,
and instead of overwriting it, a duplicate is generated under a
different name. The net effect is that all certificates are installed
twice after rebuild.

Fix this by cleaning the build directory before building the package.

Signed-off-by: Martin Bark <martin@barkynet.com>
Signed-off-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>
(cherry picked from commit 42b10634c628918c753bfb1aad4f950fa5d41299)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2018-10-24 14:33:02 +02:00
Martin Bark
8ca7134eca package/ca-certificates: don't hash certificates.crt
c_rehash looks at all files in /etc/ssl/certs, generates the hash for
the certificates in them, and makes a symlink from the hash to the
certificate file.

However, ca-certificates.crt is also installed in /etc/ssl/certs and
it contains all the certificates. c_rehash will take one of them (the
first?) and create a symlink from that hash to ca-certificates.crt.
Usually, this results in an error like:

WARNING: Skipping duplicate certificate ca-certificates.crt

and all is well. However, depending on filesystem order,
ca-certificates.crt may come first, and the actual certificate is
not symlinked.

To fix this install certificates.crt to /etc/ssl/certs *after* we run
c_rehash to prevent it getting hashed by mistake.

Note: $(TARGET_DIR)/etc/ssl/certs/ is already removed during install so
this fix also works for rebuilds.

Signed-off-by: Martin Bark <martin@barkynet.com>
Signed-off-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>
(cherry picked from commit d07ddd8e4ed576dbce4c33ab006f342e24d3bd6b)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2018-10-24 14:31:49 +02:00
Martin Bark
c9bb8015f4 package/ca-certificates: don't hash certificates.crt
c_rehash looks at all files in /etc/ssl/certs, generates the hash for
the certificates in them, and makes a symlink from the hash to the
certificate file.

However, ca-certificates.crt is also installed in /etc/ssl/certs and
it contains all the certificates. c_rehash will take one of them (the
first?) and create a symlink from that hash to ca-certificates.crt.
Usually, this results in an error like:

WARNING: Skipping duplicate certificate ca-certificates.crt

and all is well. However, depending on filesystem order,
ca-certificates.crt may come first, and the actual certificate is
not symlinked.

To fix this install certificates.crt to /etc/ssl/certs *after* we run
c_rehash to prevent it getting hashed by mistake.

Note: $(TARGET_DIR)/etc/ssl/certs/ is already removed during install so
this fix also works for rebuilds.

Signed-off-by: Martin Bark <martin@barkynet.com>
Signed-off-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>
(cherry picked from commit d07ddd8e4ed576dbce4c33ab006f342e24d3bd6b)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2018-10-24 14:31:38 +02:00
Francois Gerin
7b02eb66cd qt download site update
The download link was broken, former qt versions are stored into a
distinct location.

Signed-off-by: Francois Gerin <francois.gerin@essensium.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 2e6cd5c2d622eb1d092c1639b129a24e79c84367)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2018-10-24 14:28:32 +02:00
Francois Gerin
73ea45a608 qt download site update
The download link was broken, former qt versions are stored into a
distinct location.

Signed-off-by: Francois Gerin <francois.gerin@essensium.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 2e6cd5c2d622eb1d092c1639b129a24e79c84367)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2018-10-24 14:28:22 +02:00
Peter Korsgaard
b5c0f5967b spice: security bump to version 0.14.1
Fixes CVE-2018-10873: A vulnerability was discovered in SPICE before version
0.14.1 where the generated code used for demarshalling messages lacked
sufficient bounds checks.  A malicious client or server, after
authentication, could send specially crafted messages to its peer which
would result in a crash or, potentially, other impacts.

Drop patches as they are now upstream.

Add host-pkgconf as the configure script uses pkg-config.  Drop removed
--disable-automated-tests configure flag.

Add optional opus support, as that is now supported and needs to be
explicitly disabled to not use.  Explicitly disable optional gstreamer
support for now as the dependency tree is fairly complicated.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit f33f7a4f6407f624edb4b4ffe54cb09e029a49b2)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2018-10-24 14:23:50 +02:00
Peter Korsgaard
13ea5c877f spice-protocol: bump version to 0.12.14
Needed by spice 0.14.x

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit de8a4b747fb82f4a260d7d0451eaf99dfc745bc4)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2018-10-24 14:23:19 +02:00
Peter Korsgaard
025ba3e580 spice: security bump to version 0.14.1
Fixes CVE-2018-10873: A vulnerability was discovered in SPICE before version
0.14.1 where the generated code used for demarshalling messages lacked
sufficient bounds checks.  A malicious client or server, after
authentication, could send specially crafted messages to its peer which
would result in a crash or, potentially, other impacts.

Drop patches as they are now upstream.

Add host-pkgconf as the configure script uses pkg-config.  Drop removed
--disable-automated-tests configure flag.

Add optional opus support, as that is now supported and needs to be
explicitly disabled to not use.  Explicitly disable optional gstreamer
support for now as the dependency tree is fairly complicated.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit f33f7a4f6407f624edb4b4ffe54cb09e029a49b2)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2018-10-24 14:23:06 +02:00
Peter Korsgaard
530e6f6827 spice-protocol: bump version to 0.12.14
Needed by spice 0.14.x

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit de8a4b747fb82f4a260d7d0451eaf99dfc745bc4)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2018-10-24 14:22:59 +02:00
Baruch Siach
a5c200b9a6 psmisc: correct license
The license heading in source files includes the "or any later"
language.

Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit cfa3447a7829aed59ce673b22212f5c82f83fc61)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2018-10-24 14:19:56 +02:00
Baruch Siach
6bbc887846 psmisc: correct license
The license heading in source files includes the "or any later"
language.

Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit cfa3447a7829aed59ce673b22212f5c82f83fc61)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2018-10-24 14:19:47 +02:00
Baruch Siach
5d3e778fb9 libarchive: security bump to version 3.3.3
Fixes CVE-2017-14501: An out-of-bounds read flaw exists in
parse_file_info in archive_read_support_format_iso9660.c in libarchive
3.3.2 when extracting a specially crafted iso9660 iso file, related to
archive_read_format_iso9660_read_header.

Drop upstream patches.

Use upstream provided tarball hash.

Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 946f136fe174efc4560116940c93a84d456c7cfe)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2018-10-24 14:19:02 +02:00
Baruch Siach
eed32a87b3 libarchive: security bump to version 3.3.3
Fixes CVE-2017-14501: An out-of-bounds read flaw exists in
parse_file_info in archive_read_support_format_iso9660.c in libarchive
3.3.2 when extracting a specially crafted iso9660 iso file, related to
archive_read_format_iso9660_read_header.

Drop upstream patches.

Use upstream provided tarball hash.

Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 946f136fe174efc4560116940c93a84d456c7cfe)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2018-10-24 14:18:02 +02:00
Lothar Felten
b6591bb1b9 package/dtc: fix include guards for older kernel/u-boot
U-Boot has a copy of dtc in-tree. However, it has a bug in its build
system which could result in both one of the in-tree dtc include files
and the same host-installed include file to be #included.

Normally, that wouldn't be a problem, because (a) the two include files
are compatible, so it doesn't matter which one you include, and (b) the
include guards are the same in both, so only one of them really does
get included. However, upstream dtc has changed the include guards,
removing the leading underscore. Therefore, now the header file does
get included twice, which leads to multiple definitions like:

/builds/buildroot.org/buildroot/output/host/include/libfdt.h:1790:19: error: redefinition of 'fdt_appendprop_cell'
 static inline int fdt_appendprop_cell(void *fdt, int nodeoffset,
                   ^~~~~~~~~~~~~~~~~~~
In file included from tools/fdt_host.h:11:0,
                 from tools/imagetool.h:24,
                 from tools/atmelimage.c:8:
tools/../include/libfdt.h:1656:19: note: previous definition of 'fdt_appendprop_cell' was here
 static inline int fdt_appendprop_cell(void *fdt, int nodeoffset,
                   ^~~~~~~~~~~~~~~~~~~

To fix this, patch (host) dtc to accept the old include guard as well,
which restores the old behaviour. This patch is probably not
upstreamable, since it's really a hack to work around an issue in
U-Boot.  Note that it has been fixed upstream, but Buildroot supports
building older versions of U-Boot as well.

Note that the problem may still occur if you have libdtc-dev installed
on the host. However, now there is a simple workaround: enable
BR2_TARGET_UBOOT_NEEDS_DTC.

Note that a similar problem also occurs with the beaglebone fork of the
kernel. It's not clear if it has been fixed there.

Signed-off-by: Lothar Felten <lothar.felten@gmail.com>
[Arnout: rewrite commit message, rewrap patch commit message]
Signed-off-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>

(cherry picked from commit c7ffd8a75d55e24d793106eabbb80964ab91081f)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2018-10-24 14:16:19 +02:00
Bernd Kuhls
9191d78db9 {linux, linux-headers}: bump 4.{4, 9, 14, 18}.x series
Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 0064c7b25125a47d0f83075a142a24a92a05faa2)
[Peter: drop 4.18.x, linux.hash]
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2018-10-24 14:12:32 +02:00
Bernd Kuhls
3345d40679 {linux, linux-headers}: bump 4.{4, 9, 14, 18}.x series
Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 0064c7b25125a47d0f83075a142a24a92a05faa2)
[Peter: drop 4.18.x, linux.hash]
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2018-10-24 14:11:58 +02:00