given that the PREFERRED_PROVIDER feature is typically used for
"virtual" entities:
* virtual/kernel
* virtual/xserver
* virtual/libgl
and so on, is there a reason that this pattern is not followed for the
selection
of a udev provider, which is referred to as just
"PREFERRED_PROVIDER_udev", a
ittle choice
over which components go where... I will try a systemd-crypt variant.
Will also take a look at how other distros solve this.
- Erik
>
> Jose
>
> ${libdir}/pam.d \
> > ${nonarch_libdir}/pam.d \
> >
The conditional for the DTB nomenclature hasnt changed
and the 4.7 kernel is old enough at this point, hence
this check has become unnecessary'
Signed-off-by: Alejandro Enedino Hernandez Samaniego
---
meta/conf/machine/qemuarmv5.conf | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --
Since patchtest is in oe-core, the Python os module's methods can be
used to retrieve the repository path and tests directory by default.
This reduces the number of mandatory arguments for invocation of
patchtest unless the user wants to use a custom test suite or test
patches against a different r
Add the following from the patchtest repo:
- patchtest: core patch testing tool
- patchtest-get-branch: determine the target branch of a patch
- patchtest-get-series: pull patch series from Patchwork
- patchtest-send-results: send test results to selected mailing list
- patchtest-setup-sharedir: c
Add modules that support core patchtest functionality to
meta/lib/patchtest. These include classes and functions for handling
repository and patch objects, parsing the patchtest CLI arguments, and
other utilities.
Signed-off-by: Trevor Gamblin
---
meta/lib/patchtest/data.py | 95 ++
Add the patchtest core tools and supporting scripts to
openembedded-core. This will enable users to validate their changes
locally against the repository before submission to the mailing list,
reducing maintainer overhead and encouraging more consistent use of
important patch tags and information.
Add git-pw and boto3 to the list of requirements for patchtest.
Signed-off-by: Trevor Gamblin
---
meta/lib/patchtest/requirements.txt | 2 ++
1 file changed, 2 insertions(+)
diff --git a/meta/lib/patchtest/requirements.txt
b/meta/lib/patchtest/requirements.txt
index 785aa469f69..ba55ff905e2 10
From: Ross Burton
The patch we're applying to man_db.conf claims that the variable
@config_file_basename@ will be replaced with the package name, and that
this breaks multilib systems as that causes conflicts.
However, this suggests that both man-db and lib32-man-db are being
installed which is
From: Ross Burton
Sometimes man will want to call iconv to convert character encodings, so
recommend glibc-utils on glibc systems for that binary.
Signed-off-by: Ross Burton
---
meta/recipes-extended/man-db/man-db_2.11.2.bb | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a
temd-crypt is better appropriate for this
where we
going to put the systemd-cryptenroll and all the plugins available in
${rootlibdir}/cryptsetup
Jose
${libdir}/pam.d \
> ${nonarch_libdir}/pam.d \
> ${systemd_unitdir}/* \
>
> ---
On Mon, Oct 16, 2023 at 5:59 AM Quentin Schulz
wrote:
>
> Hi Steve,
>
> I think this is appropriate for backporting to earlier branches.
> Considering that dunfell supports both old and new syntax, I don't think
> it matters for that branch.
>
> https://git.openembedded.org/openembedded-core/commi
Hi Steve,
I think this is appropriate for backporting to earlier branches.
Considering that dunfell supports both old and new syntax, I don't think
it matters for that branch.
https://git.openembedded.org/openembedded-core/commit/meta/classes-recipe/uboot-extlinux-config.bbclass?id=b4dd9d8735
Le lun. 16 oct. 2023 à 17:37, Mark Hatle
a écrit :
> On 10/16/23 7:17 AM, Yoann Congal wrote:
> > Hi Mark,
> >
> > Le lun. 16 oct. 2023 à 02:40, Mark Hatle via lists.openembedded.org
> > a écrit :
> >> Running a number of builds recently, a small number of them failed. Note
> >> we ran about 20
On S=WORKDIR recipes, the unimplemented-ptest check will scan the whole
WORKDIR and "see" disappearing file and directory.
Signed-off-by: Yoann Congal
Reported-by: Mark Hatle
Closes: https://lists.openembedded.org/g/openembedded-core/message/189254
---
meta/classes-global/insane.bbclass | 2 ++
In some cases, pathlib.Path.glob() might throw FileNotFoundError when
file/directory disappear while it is iterating over them.
This "warning" is not important enough to crash build in this case so
just take a bb.note of the problem and move on.
Signed-off-by: Yoann Congal
Reported-by: Mark Hatl
On Sun, Oct 15, 2023 at 8:42 PM Pawan Badganchi wrote:
>
> From: rajmohan r
>
> Add patch to fix CVE-2023-4863
>
> Reference:
> https://tracker.debian.org/pkg/libwebp
> https://snapshot.debian.org/archive/debian-debug/20230916T210655Z/pool/main/libw/libwebp/libwebp_1.2.4-0.2%2Bdeb12u1.debian.tar.
On 10/16/23 7:17 AM, Yoann Congal wrote:
Hi Mark,
Le lun. 16 oct. 2023 à 02:40, Mark Hatle via lists.openembedded.org
a écrit :
Running a number of builds recently, a small number of them failed. Note we
ran about 20 builds and only 3 failed like this, the others completed. I'm
wondering
I already sent a request to meta-oe. So this request here is cancelled.
On Okt. 16 2023, at 3:41 pm, Alexander Kanavin wrote:
> Non-essential utilities like this should be going to one of the layers
> in meta-openembedded.
>
> Alex
>
> On Sat, 14 Oct 2023 at 23:07, Jan Claußen wrote:
> >
> > Hi
Yes, I just sent it to the wrong mailing list apparently.
On Okt. 16 2023, at 10:20 am, Alex Kiernan wrote:
> On Sat, Oct 14, 2023 at 10:11 PM Jan Claußen wrote:
> >
> > Another thing is that btop is dependent on a utf-8 locale being set. You
> > can still run it with the --force-utf8 flag thou
From: Siddharth Doshi
- This upgrade includes multiple security fixes.
CVE-2022-4883
CVE-2022-44617
CVE-2022-46285
CVE-2022-44617
CVE-2023-43788
CVE-2023-43789
- Removed CVE-2022-46285 as it is already fixed by this upgrade.
- License-update: additional copyright holders
f0857c0 man pages: Corr
From: Siddharth Doshi
Upstream has switched some new releases from bz2 to xz compression. Add
an XORG_EXT variable so recipes can set the file name extension needed
for the compression type.
Following the approach in oe-core/master:
6a8068e036b4b2a40b38896275b936916b4db76e
xorg-lib-common: Add
From: Siddharth Doshi
This release fixes the following CVEs:
- CVE-2023-43788
- CVE-2023-43789
Signed-off-by: Ross Burton
Signed-off-by: Siddharth Doshi
---
.../xorg-lib/{libxpm_3.5.16.bb => libxpm_3.5.17.bb} | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
rename meta/reci
Non-essential utilities like this should be going to one of the layers
in meta-openembedded.
Alex
On Sat, 14 Oct 2023 at 23:07, Jan Claußen wrote:
>
> Hi guys,
>
> I would like to add btop to the openembedded-core. The package does now
> support cmake, which eases the maintenance effort.
> Bef
On Mon, 2023-10-16 at 12:20 +0200, Markus Niebel wrote:
> Gentle ping. I added the Test case and resent the fix together with
> this test.
I think this did already merge:
https://git.yoctoproject.org/poky/commit/?id=4a56d0cc9350d3a4b028077f534a6ffda412c006
?
Cheers,
Richard
-=-=-=-=-=-=-=-=-=
The previous CVE-2023-30630_1.patch picked only the patch
"dmidecode: Write the whole dump file at once" d8cfbc808f.
But there was a refactoring which does not allow to cherry-pick it fast
forward. Resolving this conflict was not correctly done. The patch was:
+u32 len;
+u8 *table;
...
-
Hi Mark,
Le lun. 16 oct. 2023 à 02:40, Mark Hatle via lists.openembedded.org
a écrit :
> Running a number of builds recently, a small number of them failed. Note we
> ran about 20 builds and only 3 failed like this, the others completed. I'm
> wondering if maybe there is a race condition with
From: Bruce Ashfield
This is the integration of a workaround patch to avoid the serial
tx issues we are seeing on AB testing with the 6.5 kernel. Paul
Gortmaker located a 6.5 series commit that is causing tx to
intermittently stall to serial ports to stall under load.
79a314e29b53 serial-cor
${libdir}/pam.d \
${nonarch_libdir}/pam.d \
${systemd_unitdir}/* \
---
base-commit: 97f0a73c0a9db5506310328cd29f165eab3c509d
change-id: 20231016-b4-systemd-tpm2-crypt-plugin-5064c458e726
Best regards,
--
Erik Schilling
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messag
Hi Steve,
I have submitted V3 as a patch series for both CVE-2022-47008 and
CVE-2022-47011.
https://lists.openembedded.org/g/openembedded-core/topic/kirkstone_patch_v3_1_2/101993403?p=,,,20,0,0,0::recentpostdate/sticky,,,20,2,0,101993403,previd%3D1697455830547490847,nextid%3D1697438547278672189&pr
From: Deepthi Hemraj
Signed-off-by: Deepthi Hemraj
---
.../binutils/binutils-2.38.inc| 1 +
.../binutils/0028-CVE-2022-47011.patch| 35 +++
2 files changed, 36 insertions(+)
create mode 100644
meta/recipes-devtools/binutils/binutils/0028-CVE-2022-47011
From: Deepthi Hemraj
Signed-off-by: Deepthi Hemraj
---
.../binutils/binutils-2.38.inc| 1 +
.../binutils/0027-CVE-2022-47008.patch| 67 +++
2 files changed, 68 insertions(+)
create mode 100644
meta/recipes-devtools/binutils/binutils/0027-CVE-2022-47008
$MACHINE.conf in your BSP layer, and specify the
following in a linux-yocto-rt bbappend recipe:
-COMPATIBLE_MACHINE_$MACHINE = $MACHINE
+COMPATIBLE_MACHINE:$MACHINE = $MACHINE
---
base-commit: 9dc27f922f7a1eae448b9a0ffa35a85f71e58735
change-id: 20231016-dev-compatible_machine-dfa2e1a9700e
Best re
If the ipv6 feature for the distribution is not set, the package should not
contain settings for ipv6. This makes rpcbind doesn't try to bind to a IPv6
socket, and complain that this fails.
Signed-off-by: Jörg Sommer
---
.../libtirpc/libtirpc/ipv6.patch | 52 +++
...
If a distribution doesn't provide IPv6, the mapping of localhost and ::1 has
to be removed.
Signed-off-by: Jörg Sommer
---
meta/recipes-core/base-files/base-files_3.0.14.bb | 4
1 file changed, 4 insertions(+)
diff --git a/meta/recipes-core/base-files/base-files_3.0.14.bb
b/meta/recipes-c
Gentle ping. I added the Test case and resent the fix together with
this test.
Markus
Ursprüngliche Nachricht
Von: Markus Niebel
An: openembedded-core@lists.openembedded.org
Kopie: o...@ew.tq-group.com, Markus Niebel <
markus.nie...@ew.tq-group.com>
Betreff: [PATCH v2 1/2] oeqa
From: Lee Chee Yang
Signed-off-by: Lee Chee Yang
---
meta/recipes-devtools/qemu/qemu.inc | 3 +++
1 file changed, 3 insertions(+)
diff --git a/meta/recipes-devtools/qemu/qemu.inc
b/meta/recipes-devtools/qemu/qemu.inc
index b331f87c0d..78c495516f 100644
--- a/meta/recipes-devtools/qemu/qemu.in
From: Wang Mingyu
Changelog:
remove redundant assignment to variable handler_set
remove some empty lines
move child stressor invoking code into stress_run_child
use stressor array size as limit for stressor loops
Signed-off-by: Wang Mingyu
---
.../stress-ng/{stress-ng_0.16.05.bb =
From: Wang Mingyu
Changelog:
-Add support for Contentless-Delete FTS5 Indexes.
-Enhancements to the date and time functions:
-Added the octet_length(X) SQL function.
-Added the sqlite3_stmt_explain() API.
-Query planner enhancements:
-Enhancements to the decimal extension:
-If X is a
Add fix for tiffcrop tool CVE-2023-1916 [1].
A flaw was found in tiffcrop, a program distributed by the libtiff
package. A specially crafted tiff file can lead to an out-of-bounds
read in the extractImageSection function in tools/tiffcrop.c, resulting
in a denial of service and limited information
From: Wang Mingyu
Changelog:
* Make update-mime-database compatible with MSVC (by porting it to C++)
* Fix description for audio/x-xi
* ci: Use ci-templates to build image
* CI: Use dnf5 instead of dnf
* use Title Case for mime type description
* ci: Use detached pipelines
* Make app
From: Wang Mingyu
Signed-off-by: Wang Mingyu
---
meta/recipes-devtools/repo/{repo_2.36.1.bb => repo_2.37.bb} | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
rename meta/recipes-devtools/repo/{repo_2.36.1.bb => repo_2.37.bb} (95%)
diff --git a/meta/recipes-devtools/repo/repo_2.36.1.bb
b
From: Wang Mingyu
Changelog:
Include requirements files in the source distibution
Signed-off-by: Wang Mingyu
---
.../{python3-wcwidth_0.2.6.bb => python3-wcwidth_0.2.8.bb} | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
rename meta/recipes-devtools/python/{python3-wcwidth_0.2.6.bb
Notice that it references different CVE id:
https://nvd.nist.gov/vuln/detail/CVE-2023-5129
which was marked as a rejected duplicate of:
https://nvd.nist.gov/vuln/detail/CVE-2023-4863
but it's the same issue. Hence update CVE ID CVE-2023-4863
to CVE-2023-5129.patch.
Signed-off-by: Pawan
---
meta/
Hi Martin,
Extremely sorry Please ignore previous mail.
I have updated the patch CVE-2023-5129.patch.
Please find the link below and ignore this.
https://lists.openembedded.org/g/openembedded-core/message/189271
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Repl
Notice that it references different CVE id:
https://nvd.nist.gov/vuln/detail/CVE-2023-5129
which was marked as a rejected duplicate of:
https://nvd.nist.gov/vuln/detail/CVE-2023-4863
but it's the same issue. Hence update CVE ID CVE-2023-4863
to CVE-2023-5129.patch.
Signed-off-by: Pawan
---
meta/
On Sat, Oct 14, 2023 at 10:11 PM Jan Claußen wrote:
>
> Another thing is that btop is dependent on a utf-8 locale being set. You can
> still run it with the --force-utf8 flag though. Should this be set by the
> recipe as well?
>
> On Okt. 14 2023, at 11:06 pm, Jan Claußen wrote:
>
> Hi guys,
>
Hi Martin,
Please ignore previous mail.
I have updated the patch CVE-2023-5129.patch.
Please find the link below and ignore this.
https://lists.openembedded.org/g/openembedded-core/message/189268
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#18926
Notice that it references different CVE id:
https://nvd.nist.gov/vuln/detail/CVE-2023-5129
which was marked as a rejected duplicate of:
https://nvd.nist.gov/vuln/detail/CVE-2023-4863
but it's the same issue. Hence update CVE ID CVE-2023-4863
to CVE-2023-5129.patch.
Signed-off-by: Pawan
---
meta/
On Mon, 2023-10-16 at 10:23 +0300, Tony Lindgren wrote:
> * Mikko Rapeli [231016 07:16]:
> > Hi,
> >
> > On Mon, Oct 16, 2023 at 09:35:01AM +0300, Tony Lindgren wrote:
> > > * Richard Purdie [231015 21:30]:
> > > > On Sun, 2023-10-15 at 17:31 +0200, Greg Kroah-Hartman wrote:
> > > > > Can you tr
Please ignore this
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#189266):
https://lists.openembedded.org/g/openembedded-core/message/189266
Mute This Topic: https://lists.openembedded.org/mt/101991682/21656
Group Owner: openembedded-core+ow...@lis
Hi,
On Mon, Oct 16, 2023 at 10:23:52AM +0300, Tony Lindgren wrote:
> * Mikko Rapeli [231016 07:16]:
> > On Mon, Oct 16, 2023 at 09:35:01AM +0300, Tony Lindgren wrote:
> > > * Richard Purdie [231015 21:30]:
> > > > On Sun, 2023-10-15 at 17:31 +0200, Greg Kroah-Hartman wrote:
> > > > > Can you try
Hi Martin,
I have updated the patch CVE-2023-5129.patch.
Please find the link below and ignore this.
https://lists.openembedded.org/g/openembedded-core/message/189263
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#189264):
https://lists.openembedd
Notice that it references different CVE id:
https://nvd.nist.gov/vuln/detail/CVE-2023-5129
which was marked as a rejected duplicate of:
https://nvd.nist.gov/vuln/detail/CVE-2023-4863
but it's the same issue. Hence update CVE ID CVE-2023-4863
to CVE-2023-5129.patch.
Signed-off-by: Pawan
---
meta/
I believe this one is already fixed in dunfell:
https://git.openembedded.org/openembedded-core/commit/?h=dunfell&id=2ab6568d35e3d68f77a73bf56eb2d38aa6ada236
Notice that it references different CVE
id:https://nvd.nist.gov/vuln/detail/CVE-2023-5129
which was marked as a rejected duplicate
of:https:/
Hi,
On Mon, Oct 16, 2023 at 09:35:01AM +0300, Tony Lindgren wrote:
> * Richard Purdie [231015 21:30]:
> > On Sun, 2023-10-15 at 17:31 +0200, Greg Kroah-Hartman wrote:
> > > Can you try the patch below? I just sent it to Linus and it's from Tony
> > > to resolve some other pm issues with the seri
Many recipes embed other SW components. The name and version of the
embedded SW component differs from the main recipe. To detect CVEs in the
embedded SW component, it needs to be added to CVE_PRODUCT list using
name of the SW product in CVE database or with "vendor:product" syntax.
Then the versio
57 matches
Mail list logo