summaryrefslogtreecommitdiffstats
path: root/meta-oe/recipes-extended/redis
Commit message (Collapse)AuthorAgeFilesLines
* redis: Fix CVE-2025-21605Vijay Anusuri2025-07-022-0/+63
| | | | | | | Upstream-Status: Backport from https://github.com/redis/redis/commit/42fb340ce426364d64f5dccc9c2549e58f48ac6f Signed-off-by: Vijay Anusuri <vanusuri@mvista.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* redis: fix CVE-2024-51741Divya Chellam2025-02-092-0/+90
| | | | | | | | | | | | | | | | | Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem is fixed in Redis 7.2.7 and 7.4.2. Reference: https://nvd.nist.gov/vuln/detail/CVE-2024-51741 Upstream-patch: https://github.com/redis/redis/commit/15e212bf69de28d2b4585aa79cc2a40f49e4a94d Signed-off-by: Divya Chellam <divya.chellam@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* redis: fix CVE-2024-46981Divya Chellam2025-02-094-0/+73
| | | | | | | | | | | | | | | | | | | | Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to manipulate the garbage collector and potentially lead to remote code execution. The problem is fixed in 7.4.2, 7.2.7, and 6.2.17. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands. Reference: https://nvd.nist.gov/vuln/detail/CVE-2024-46981 Upstream-patch: https://github.com/redis/redis/commit/e344b2b5879aa52870e6838212dfb78b7968fcbf Signed-off-by: Divya Chellam <divya.chellam@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* redis: fix CVE-2024-31449Divya Chellam2025-02-094-0/+100
| | | | | | | | | | | | | | | | | | | | Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability. Reference: https://nvd.nist.gov/vuln/detail/CVE-2024-31449 Upstream-patches: https://github.com/redis/redis/commit/1f7c148be2cbacf7d50aa461c58b871e87cc5ed9 https://github.com/redis/redis/commit/fe8de4313f85e0f8af2eff1f78b52cfe56fb4c71 Signed-off-by: Divya Chellam <divya.chellam@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* redis: fix CVE-2024-31228Divya Chellam2025-02-094-0/+138
| | | | | | | | | | | | | | | | | | | | | Redis is an open source, in-memory database that persists on disk. Authenticated users can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as `KEYS`, `SCAN`, `PSUBSCRIBE`, `FUNCTION LIST`, `COMMAND LIST` and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crash. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability. References: https://security-tracker.debian.org/tracker/CVE-2024-31228 Upstream-patch: https://github.com/redis/redis/commit/9317bf64659b33166a943ec03d5d9b954e86afb0 Signed-off-by: Divya Chellam <divya.chellam@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* redis: fix CVE-2024-31227Divya Chellam2025-02-092-0/+34
| | | | | | | | | | | | | | | | | | Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem exists in Redis 7 prior to versions 7.2.6 and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability. Reference: https://security-tracker.debian.org/tracker/CVE-2024-31227 Upstream-patch: https://github.com/redis/redis/commit/b351d5a3210e61cc3b22ba38a723d6da8f3c298a Signed-off-by: Divya Chellam <divya.chellam@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* redis: fix CVE-2023-45145Divya Chellam2025-02-094-0/+146
| | | | | | | | | | | | | | | | | | | | | | | Redis is an in-memory database that persists on disk. On startup, Redis begins listening on a Unix socket before adjusting its permissions to the user-provided configuration. If a permissive umask(2) is used, this creates a race condition that enables, during a short period of time, another process to establish an otherwise unauthorized connection. This problem has existed since Redis 2.6.0-RC1. This issue has been addressed in Redis versions 7.2.2, 7.0.14 and 6.2.14. Users are advised to upgrade. For users unable to upgrade, it is possible to work around the problem by disabling Unix sockets, starting Redis with a restrictive umask, or storing the Unix socket file in a protected directory. Reference: https://security-tracker.debian.org/tracker/CVE-2023-45145 Upstream-patch: https://github.com/redis/redis/commit/7f486ea6eebf0afce74f2e59763b9b82b78629dc Signed-off-by: Divya Chellam <divya.chellam@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* redis: fix CVE-2023-41056Divya Chellam2025-02-092-0/+64
| | | | | | | | | | | | | | | | | Redis is an in-memory database that persists on disk. Redis incorrectly handles resizing of memory buffers which can result in integer overflow that leads to heap overflow and potential remote code execution. This issue has been patched in version 7.0.15 and 7.2.4. Reference: https://nvd.nist.gov/vuln/detail/CVE-2023-41056 Upstream-patch: https://github.com/redis/redis/commit/e351099e1119fb89496be578f5232c61ce300224 Signed-off-by: Divya Chellam <divya.chellam@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* redis: upgrade 7.0.12 -> 7.0.13Polampalli, Archana2023-09-2310-1/+1
| | | | | | | | | | | | | | | | | | | | | This release has only security and bug fixes. ChangeLog: https://github.com/redis/redis/releases/tag/7.0.13 Security Fixes: https://nvd.nist.gov/vuln/detail/CVE-2023-41053 $ git log --oneline 7.0.12..7.0.13 49dbedb1d (tag: 7.0.13, origin/7.0) Redis 7.0.13 0f14d3279 Fix sort_ro get-keys function return wrong key number (#12522) 4d67bb6af do not call handleClientsBlockedOnKeys inside yielding command (#12459) 37599fe75 Ensure that the function load timeout is disabled during loading from RDB/AOF and on replicas. (#12451) ea1bc6f62 Process loss of slot ownership in cluster bus (#12344) 646069a90 Skip test for sdsRemoveFreeSpace when mem_allocator is not jemalloc (#11878) Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com> Signed-off-by: Armin Kuster <akuster@mvista.com>
* redis: upgrade 7.0.11 -> 7.0.12Polampalli, Archana2023-08-0310-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | This release has only security and bug fixes. ChangeLog: https://github.com/redis/redis/releases/tag/7.0.12 Security Fixes: https://nvd.nist.gov/vuln/detail/CVE-2023-36824 https://nvd.nist.gov/vuln/detail/CVE-2022-24834 $ git log --oneline 7.0.11..7.0.12 8e73f9d34 (tag: 7.0.12, origin/7.0) Redis 7.0.12 f90ecfb1f Fix compile errors when building with gcc-12 or clang (partial #12035) bd1dac0c6 Fix possible crash in command getkeys (#12380) 25f610fc2 Use Reservoir Sampling for random sampling of dict, and fix hang during fork (#12276) eb64a97d3 Add missing return on -UNKILLABLE sent by master case (#12277) 2ba8de9d5 Fix WAIT for clients being blocked in a module command (#12220) 1d2839a83 Fix memory leak when RM_Call's RUN_AS_USER fails (#12158) c340fd5a3 Prevent repetitive backlog trimming (#12155) 88682ca30 Free backlog only if rsi is invalid when master reboot (#12088) f6a7c9f9e Lua cjson and cmsgpack integer overflow issues (CVE-2022-24834) Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* redis: use the files path correctlyChen Qi2023-06-1510-2/+0
| | | | | | | | | | | | | | | | | | | | | Recipes are not expected to set FILESPATH directly, they are expected to use FILESEXTRAPATH. I can see the seting of FILESPATH in this recipe only wants to find redis-7 specific patches and files. This could be easily achieved by using redis-7.0.11/ directory to hold all those files. Using FILESPATH in this way removes the possibility of overriding some files (e.g., the redis service file) from other layers via FILESEXTRAPATH:prepend, which is kind of a common practice and is actually working for basically all other recipes. This is because we have: meta/classes-global/base.bbclass:FILESPATH = "${@base_set_filespath(["${FILE_DIRNAME}/${BP}", "${FILE_DIRNAME}/${BPN}", "${FILE_DIRNAME}/files"], d)}" And FILESEXTRAPATH is handled in base_set_filespath. Signed-off-by: Chen Qi <Qi.Chen@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* redis: fix do_patch fuzz warningChangqing Li2023-05-062-2/+2
| | | | | | | | | | | | | | Fix: WARNING: lib32-redis-7.0.4-r0 do_patch: Fuzz detected: Applying patch GNU_SOURCE.patch patching file src/zmalloc.c Hunk #1 succeeded at 32 with fuzz 2 (offset 4 lines). There are two version of redis, and need different GNU_SOURCE.patch Signed-off-by: Changqing Li <changqing.li@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* redis: upgrade 7.0.10 -> 7.0.11Changqing Li2023-04-281-1/+1
| | | | | Signed-off-by: Changqing Li <changqing.li@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* redis: upgrade 7.0.9 -> 7.0.10Changqing Li2023-04-281-1/+1
| | | | | | | | | | | | | | | | | | | Upgrade urgency: SECURITY, contains fixes to security issues. Security Fixes: * (CVE-2023-28425) Specially crafted MSETNX command can lead to assertion and denial-of-service Bug Fixes ========= * Large blocks of replica client output buffer may lead to psync loops and unnecessary memory usage (#11666) * Fix CLIENT REPLY OFF|SKIP to not silence push notifications (#11875) * Trim excessive memory usage in stream nodes when exceeding `stream-node-max-bytes` (#11885) * Fix module RM_Call commands failing with OOM when maxmemory is changed to zero (#11319) Signed-off-by: Changqing Li <changqing.li@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* redis: upgrade 6.2.11 -> 6.2.12Changqing Li2023-04-281-1/+1
| | | | | Signed-off-by: Changqing Li <changqing.li@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* redis: upgrade 6.2.8 -> 6.2.11Changqing Li2023-03-131-1/+1
| | | | | Signed-off-by: Changqing Li <changqing.li@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* redis: upgrade 7.0.7 -> 7.0.9Changqing Li2023-03-071-1/+1
| | | | | Signed-off-by: Changqing Li <changqing.li@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* redis: 7.0.5 -> 7.0.7Changqing Li2023-01-252-10/+12
| | | | | | | | | This upgrade include fix for CVE-2022-3647 Signed-off-by: Changqing Li <changqing.li@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com> (cherry picked from commit d869383b0f9848a07ab3d7fbb5b7f687dce7744a) Signed-off-by: Armin Kuster <akuster808@gmail.com>
* redis: upgrade 7.0.4 to 7.0.5Changqing Li2023-01-251-1/+1
| | | | | | | Signed-off-by: Changqing Li <changqing.li@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com> (cherry picked from commit c8d9407eec21e1eb3e34b66cac8d11fe13c6e63e) Signed-off-by: Armin Kuster <akuster808@gmail.com>
* redis: 6.2.7 -> 6.2.8Changqing Li2023-01-252-7/+10
| | | | | | | This upgrade include fix for CVE-2022-3647 Signed-off-by: Changqing Li <changqing.li@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* redis: build with USE_SYSTEMD=yes when systemd is enabledZheng Qiu2022-11-192-2/+7
| | | | | | | | | | | | | Compile redis with full systemd support when the chosen init system is systemd. Enabling systemd supervision allows redis to communicate the actual server status (i.e. "Loading dataset", "Waiting for master<->replica sync") to systemd, instead of declaring readiness right after initializing the server process. Signed-off-by: Zheng Qiu <zheng.qiu@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* redis: upgrade 7.0.2 -> 7.0.4wangmy2022-07-261-1/+1
| | | | | | | | | | | | | | | | | Changelog: ========== Upgrade urgency: SECURITY, contains fixes to security issues. Security Fixes: ---------------- (CVE-2022-31144) A specially crafted XAUTOCLAIM command on a stream key in a specific state may result with heap overflow, and potentially remote code execution. The problem affects Redis versions 7.0.0 or newer. Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com> (cherry picked from commit d9f8d015a45188c3cf2d6841ea05319032930dbc) Signed-off-by: Armin Kuster <akuster808@gmail.com>
* redis: upgrade 7.0-rc3 -> 7.0.2Changqing Li2022-07-181-1/+1
| | | | | | | | This upgrade include CVE fix: CVE-2022-24735 CVE-2022-24736 Signed-off-by: Changqing Li <changqing.li@windriver.com>
* redis: upgrade 6.2.6 -> 6.2.7Changqing Li2022-07-182-7/+9
| | | | | | | | This upgrade include CVE fix: CVE-2022-24735 CVE-2022-24736 Signed-off-by: Changqing Li <changqing.li@windriver.com>
* redis: upgrade to 7.0-rc3Oleksandr Kravchuk2022-04-131-1/+1
| | | | | Signed-off-by: Oleksandr Kravchuk <open.source@oleksandr-kravchuk.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: remove fuzz warningMingli Yu2022-03-091-4/+14
| | | | | | | | | | | | Fixes: WARNING: lib32-redis-7.0-rc1-r0 do_patch: Fuzz detected: Applying patch GNU_SOURCE.patch patching file src/zmalloc.c Hunk #1 succeeded at 32 with fuzz 2 (offset 4 lines). Signed-off-by: Mingli Yu <mingli.yu@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: add recipe for 7.0-rc1Oleksandr Kravchuk2022-02-0310-0/+1702
| | | | | | | | | Redis 7.0 "includes changes that potentially break backwards compatibility with older versions", so let's let folks some time to test 7.0 and later decide which version(s) we want to keep. Signed-off-by: Oleksandr Kravchuk <open.source@oleksandr-kravchuk.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 6.2.5 -> 6.2.6wangmy2021-10-141-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Upgrade urgency: SECURITY, contains fixes to security issues. Security Fixes: (CVE-2021-41099) Integer to heap buffer overflow handling certain string commands and network payloads, when proto-max-bulk-len is manually configured to a non-default, very large value [reported by yiyuaner]. (CVE-2021-32762) Integer to heap buffer overflow issue in redis-cli and redis-sentinel parsing large multi-bulk replies on some older and less common platforms [reported by Microsoft Vulnerability Research]. (CVE-2021-32687) Integer to heap buffer overflow with intsets, when set-max-intset-entries is manually configured to a non-default, very large value [reported by Pawel Wieczorkiewicz, AWS]. (CVE-2021-32675) Denial Of Service when processing RESP request payloads with a large number of elements on many connections. (CVE-2021-32672) Random heap reading issue with Lua Debugger [reported by Meir Shpilraien]. (CVE-2021-32628) Integer to heap buffer overflow handling ziplist-encoded data types, when configuring a large, non-default value for hash-max-ziplist-entries, hash-max-ziplist-value, zset-max-ziplist-entries or zset-max-ziplist-value [reported by sundb]. (CVE-2021-32627) Integer to heap buffer overflow issue with streams, when configuring a non-default, large value for proto-max-bulk-len and client-query-buffer-limit [reported by sundb]. (CVE-2021-32626) Specially crafted Lua scripts may result with Heap buffer overflow [reported by Meir Shpilraien]. Bug fixes that involve behavior changes: GEO* STORE with empty source key deletes the destination key and return 0 (#9271) Previously it would have returned an empty array like the non-STORE variant. PUBSUB NUMPAT replies with number of patterns rather than number of subscriptions (#9209) This actually changed in 6.2.0 but was overlooked and omitted from the release notes. Bug fixes that are only applicable to previous releases of Redis 6.2: Fix CLIENT PAUSE, used an old timeout from previous PAUSE (#9477) Fix CLIENT PAUSE in a replica would mess the replication offset (#9448) Add some missing error statistics in INFO errorstats (#9328) Other bug fixes: Fix incorrect reply of COMMAND command key positions for MIGRATE command (#9455) Fix appendfsync to always guarantee fsync before reply, on MacOS and FreeBSD (kqueue) (#9416) Fix the wrong mis-detection of sync_file_range system call, affecting performance (#9371) CLI tools: When redis-cli received ASK response, it didn't handle it (#8930) Improvements: Add latency monitor sample when key is deleted via lazy expire (#9317) Sanitize corrupt payload improvements (#9321, #9399) Delete empty keys when loading RDB file or handling a RESTORE command (#9297, #9349) Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: advance to version 6.2.5Joe Slater2021-09-091-1/+1
| | | | | | | Pull in fix for CVE-2021-32761. Signed-off-by: Joe Slater <joe.slater@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* Convert to new override syntaxMartin Jansa2021-08-031-10/+10
| | | | | | | | | | This is the result of automated script (0.9.1) conversion: oe-core/scripts/contrib/convert-overrides.py . converting the metadata to use ":" as the override character instead of "_". Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
* redis: upgrade to 6.2.4Tony Tascioglu2021-06-301-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Upstream changelog: Upgrade urgency: SECURITY, Contains fixes to security issues that affect authenticated client connections. MODERATE otherwise. Fix integer overflow in STRALGO LCS (CVE-2021-32625) An integer overflow bug in Redis version 6.0 or newer can be exploited using the STRALGO LCS command to corrupt the heap and potentially result with remote code execution. This is a result of an incomplete fix by CVE-2021-29477. Bug fixes that are only applicable to previous releases of Redis 6.2: Fix crash after a diskless replication fork child is terminated (#8991) Fix redis-benchmark crash on unsupported configs (#8916) Other bug fixes: Fix crash in UNLINK on a stream key with deleted consumer groups (#8932) SINTERSTORE: Add missing keyspace del event when none of the sources exist (#8949) Sentinel: Fix CONFIG SET of empty string sentinel-user/sentinel-pass configs (#8958) Enforce client output buffer soft limit when no traffic (#8833) Improvements: Hide AUTH passwords in MIGRATE command from slowlog (#8859) Signed-off-by: Tony Tascioglu <tony.tascioglu@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 6.2.2 -> 6.2.3Andreas Müller2021-05-222-7/+5
| | | | | Signed-off-by: Andreas Müller <schnitzeltony@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 6.2.1 -> 6.2.2zangrc2021-04-231-1/+1
| | | | | Signed-off-by: Zang Ruochen <zangrc.fnst@fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 6.0.9 -> 6.2.1Yi Fan Yu2021-04-135-76/+62
| | | | | | | | | | Refresh 3 patches. Removed Patch: ilp32.patch fixed by upstream 0719388cfb1a79160204314beb1de1f9c29a3684 Signed-off-by: Yi Fan Yu <yifan.yu@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: Update to 6.0.9Khem Raj2020-12-141-3/+1
| | | | Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: Fix build on 32bit targets and clangKhem Raj2020-11-022-0/+30
| | | | Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: Fix build with clang on riscv32Khem Raj2020-10-272-0/+49
| | | | | | | | | clang defines __ILP32__ for rv32 but gcc does not as a result backtracing gets enabled when using clang but not when using gcc so clang build exposes a porting error. Therefore add code to return correct mcontext on rv32 Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 6.0.7 -> 6.0.8Zang Ruochen2020-09-171-2/+2
| | | | | Signed-off-by: Zang Ruochen <zangrc.fnst@cn.fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 6.0.6 -> 6.0.7Zang Ruochen2020-09-101-2/+2
| | | | | Signed-off-by: Zang Ruochen <zangrc.fnst@cn.fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 6.0.5 -> 6.0.6Zang Ruochen2020-08-071-3/+3
| | | | | | | -License-Update: Copyright year updated to 2020. Signed-off-by: Zang Ruochen <zangrc.fnst@cn.fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 6.0.4 -> 6.0.5Zang Ruochen2020-06-301-2/+2
| | | | | Signed-off-by: Zang Ruochen <zangrc.fnst@cn.fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 5.0.9 -> 6.0.4Andreas Müller2020-06-192-10/+15
| | | | | Signed-off-by: Andreas Müller <schnitzeltony@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 5.0.8 -> 5.0.9Wang Mingyu2020-04-251-2/+2
| | | | | Signed-off-by: Wang Mingyu <wangmy@cn.fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 5.0.7 -> 5.0.8Zang Ruochen2020-03-173-32/+4
| | | | | | | | | | | -Refresh the following patch: 0001-src-Do-not-reset-FINAL_LIBS.patch -0005-Mark-extern-definition-of-SDS_NOINIT-in-sds.h.patch Removed since this is included in 5.0.8 Signed-off-by: Zang Ruochen <zangrc.fnst@cn.fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: Upgrade to 5.0.7Khem Raj2019-12-235-128/+58
| | | | | | | | Remove an upstreamed patch Add patches to build with new glibc/gcc Drop atomic removal patch and link with libatomic when needed Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: Clarify BSD license variantChristophe PRIOUZEAU2019-10-251-1/+1
| | | | | | | The License of redis is BSD-3-Clause. Signed-off-by: Christophe Priouzeau <christophe.priouzeau@st.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: Fix build with clang/x86Khem Raj2019-09-102-1/+36
| | | | | | | | | Need to link with libatomics for 64bit atomics support Fixes i686-yoe-linux/i686-yoe-linux-ld: networking.o: in function `createClient': | /usr/src/debug/redis/4.0.14-r0/redis-4.0.14/src/networking.c:103: undefined reference to `__atomic_fetch_add_8' Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: backport a fix for stack trace generation on aarch64Martin Jansa2019-08-122-0/+46
| | | | | Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: Upgrade to 4.0.14Khem Raj2019-04-141-4/+4
| | | | | | | Add needed depends Do not build jemalloc Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: Fix ocasional parallel build failureKhem Raj2019-04-071-0/+4
| | | | | | | | | | | Sometimes with high parallel build we see compile errors e.g. clang-8: error: linker command failed with exit code 1 (use -v to see invocation) make[3]: *** [Makefile:52: lua] Error 1 Therefore try to build dependencies before main build Signed-off-by: Khem Raj <raj.khem@gmail.com>