meta-openembedded: subtree update:ce51958eca..a2928764c2

Adrian Bunk (3):
      python3-cmd2: Remove PNBLACKLIST
      php: Remove no longer needed CFLAGS_append_aarch64
      php: Move more into php.inc after php5 removal

Alistair Francis (4):
      python3-requests-future: Initial commit of 0.9.5
      python3-xmlrunner: Initial commit of 1.7.7
      python3-fasteners: Initial commit of 0.15
      python3-python-vlc: Initial commit of 3.0.7110

Anuj Mittal (3):
      python3-defusedxml: add recipe
      python-networkx: upgrade 2.1 -> 2.2
      python3-networkx: add recipe

Khem Raj (9):
      php: Turn PCRE JIT off for riscv
      redis: Fix build with clang/x86
      android-tools: Recognise i686 for HOST_ARCH
      netdata: Update to 1.17.0 and fix build with clang/x86
      safec: Define _GNU_SOURCE
      safec: Upgrade to 3.5 release
      openocd: Add --disable-werror always
      breakpad: Update dont-clobber-rsp patch to latest
      gparted: add to deps instead of overwriting

Martin Jansa (3):
      remmina: add distro_features_check for GTK3DISTROFEATURES
      ceres-solver: fix the paths in .cmake files
      ceres-solver: add PACKAGECONFIG for suitesparse and lapack

Naveen Saini (1):
      pm-graph: upgrade 5.3 -> 5.5

Oleksandr Kravchuk (1):
      analyze-suspend: update to 5.5

Peter Kjellerstedt (1):
      lvm2/libdevmapper: Make it build for native

Randy MacLeod (1):
      poppler: update from 0.79.0 to 0.80.0

Slater, Joseph (1):
      openhpi: control snmp-bc ptest generation

Stefan Agner (1):
      fuse3: add libfuse3 recipe

Trevor Gamblin (1):
      gvfs: upgrade 1.40.2 -> 1.41.2 for CVE fixes

Yi Zhao (2):
      php: fix module path in mod_php.conf
      apache-websocket: fix module path

Yuan Chao (2):
      python-atomicwrites: new recipe
      python-pytest: fix runtime error

Zang Ruochen (1):
      python-certifi: upgrade 2019.6.16 -> 2019.9.11

Change-Id: Iba065b25686a1ac22d647226d9ea0c61c5b4578f
Signed-off-by: Brad Bishop <bradleyb@fuzziesquirrel.com>
diff --git a/meta-openembedded/meta-oe/recipes-devtools/breakpad/breakpad/dont-clobber-rsp.patch b/meta-openembedded/meta-oe/recipes-devtools/breakpad/breakpad/dont-clobber-rsp.patch
index b1c37fc..edf9035 100644
--- a/meta-openembedded/meta-oe/recipes-devtools/breakpad/breakpad/dont-clobber-rsp.patch
+++ b/meta-openembedded/meta-oe/recipes-devtools/breakpad/breakpad/dont-clobber-rsp.patch
@@ -1,3 +1,8 @@
+From d1d7b616219fd47736c804ff4c2f393d7184a75b Mon Sep 17 00:00:00 2001
+From: Khem Raj <raj.khem@gmail.com>
+Date: Sun, 23 Dec 2018 16:58:04 -0800
+Subject: [PATCH] chromium: stack pointer clobber
+
 Do not add stack pointer to clobber list
 
 it was being ignored until gcc 9.0 became capable
@@ -7,9 +12,23 @@
 
 Upstream-Status: Submitted [https://chromium-review.googlesource.com/c/linux-syscall-support/+/1390160]
 Signed-off-by: Khem Raj <raj.khem@gmail.com>
+---
+ src/third_party/lss/linux_syscall_support.h | 10 +++++-----
+ 1 file changed, 5 insertions(+), 5 deletions(-)
 
+Index: b/src/third_party/lss/linux_syscall_support.h
+===================================================================
 --- a/src/third_party/lss/linux_syscall_support.h
 +++ b/src/third_party/lss/linux_syscall_support.h
+@@ -1957,7 +1957,7 @@ struct kernel_statfs {
+                            LSS_ENTRYPOINT                                     \
+                            "pop %%ebx"                                        \
+                            args                                               \
+-                           : "esp", "memory");                                \
++                           : "memory");                                       \
+       LSS_RETURN(type,__res)
+     #undef  _syscall0
+     #define _syscall0(type,name)                                              \
 @@ -1966,7 +1966,7 @@ struct kernel_statfs {
          __asm__ volatile(LSS_ENTRYPOINT                                       \
                           : "=a" (__res)                                       \
@@ -19,6 +38,33 @@
          LSS_RETURN(type,__res);                                               \
        }
      #undef  _syscall1
+@@ -2014,7 +2014,7 @@ struct kernel_statfs {
+                              : "i" (__NR_##name), "ri" ((long)(arg1)),        \
+                                "c" ((long)(arg2)), "d" ((long)(arg3)),        \
+                                "S" ((long)(arg4)), "D" ((long)(arg5))         \
+-                             : "esp", "memory");                              \
++                             : "memory");                                     \
+         LSS_RETURN(type,__res);                                               \
+       }
+     #undef  _syscall6
+@@ -2036,7 +2036,7 @@ struct kernel_statfs {
+                              : "i" (__NR_##name),  "0" ((long)(&__s)),        \
+                                "c" ((long)(arg2)), "d" ((long)(arg3)),        \
+                                "S" ((long)(arg4)), "D" ((long)(arg5))         \
+-                             : "esp", "memory");                              \
++                             : "memory");                                     \
+         LSS_RETURN(type,__res);                                               \
+       }
+     LSS_INLINE int LSS_NAME(clone)(int (*fn)(void *), void *child_stack,
+@@ -2122,7 +2122,7 @@ struct kernel_statfs {
+                            : "0"(-EINVAL), "i"(__NR_clone),
+                              "m"(fn), "m"(child_stack), "m"(flags), "m"(arg),
+                              "m"(parent_tidptr), "m"(newtls), "m"(child_tidptr)
+-                           : "esp", "memory", "ecx", "edx", "esi", "edi");
++                           : "memory", "ecx", "edx", "esi", "edi");
+       LSS_RETURN(int, __res);
+     }
+ 
 @@ -2407,7 +2407,7 @@ struct kernel_statfs {
                                 "d"(LSS_SYSCALL_ARG(parent_tidptr)),
                                 "r"(LSS_SYSCALL_ARG(newtls)),