[OE-core] [PATCH] systemtap: fix systemtap-native build error on Fedora 40

2024-06-09 Thread Victor Kamensky
Backport of couple patches from upstream. Signed-off-by: Victor Kamensky --- ...gcc-version-compatibility-hack-redux.patch | 32 ...e.cxx-gcc-version-compatibility-hack.patch | 52 +++ .../systemtap/systemtap_git.inc | 2 + 3 files changed, 86 insertio

[oe-core][PATCH] gstreamer1.0-plugins-bad: drop PACKAGECONFIG for sctp and srtp

2024-06-09 Thread Markus Volk
- connect them to webrtc This avoids: ../gst-plugins-bad-1.24.3/ext/sctp/meson.build:8:33: ERROR: Feature sctp cannot be disabled: webrtc option is enabled ../gst-plugins-bad-1.24.3/ext/srtp/meson.build:10:33: ERROR: Feature srtp cannot be disabled: webrtc option is enabled Signed-off-by: Mar

[OE-core] [PATCH v2] cve-check: Introduce CVE_CHECK_MANIFEST_JSON_SUFFIX

2024-06-09 Thread Aleksandar Nikolic
The variable contains the suffix of the CVE JSON manifest file. By default, this variable is set to 'json', so the current behavior is not changed, but enables developers to use some other suffix, e.g., cve.json (similar to spdx.json). Signed-off-by: Aleksandar Nikolic --- meta/classes/cve-check

[OE-core] [PATCH] cve-check: Introduce CVE_CHECK_MANIFEST_JSON_SUFFIX

2024-06-09 Thread Aleksandar Nikolic
The variable contains the suffix of the CVE JSON manifest file. By default, this variable is set to 'json', so the current behavior is not changed, but enables developers to use some other suffix, e.g., cve.json (similar to spdx.json). Signed-off-by: Aleksandar Nikolic --- meta/classes/cve-check

[oe-core][PATCH] ell: update 0.65 -> 0.66

2024-06-09 Thread Markus Volk
ver 0.66: Fix issue with handling event callback when stopping ACD. Fix issue with handling ICMPv6 DNS and domain lists. Add support for notification lists. Signed-off-by: Markus Volk --- meta/recipes-core/ell/{ell_0.65.bb => ell_0.66.bb} | 2 +- 1 file changed, 1 inserti

Re: [OE-core] [PATCH] classes/kernel: No symlink in postinst without KERNEL_IMAGETYPE_SYMLINK

2024-06-09 Thread Jörg Sommer via lists . openembedded . org
Jörg Sommer via lists.openembedded.org schrieb am So 09. Jun, 16:59 (GMT): > diff --git a/meta/classes-recipe/kernel.bbclass > b/meta/classes-recipe/kernel.bbclass > index d6eedf942c..89badd90f1 100644 > --- a/meta/classes-recipe/kernel.bbclass > +++ b/meta/classes-recipe/kernel.bbclass > @@ -115,

[OE-core] [PATCH] classes/kernel: No symlink in postinst without KERNEL_IMAGETYPE_SYMLINK

2024-06-09 Thread Jörg Sommer via lists . openembedded . org
From: Jörg Sommer The commit “Use a copy of image for kernel*.rpm if fs doesn't support symlinks” [1] added postinst and postrm scripts to the kernel package which create a symlink after package installation. This should not happen if `KERNEL_IMAGETYPE_SYMLINK` is not `1`. Background: The u-boot

[OE-core] OE-core CVE metrics for scarthgap on Sun 09 Jun 2024 03:00:01 AM HST

2024-06-09 Thread Steve Sakoman
Branch: scarthgap New this week: 0 CVEs Removed this week: 0 CVEs Full list: Found 68 unpatched CVEs CVE-2019-14899 (CVSS3: 7.4 HIGH): linux-yocto https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14899 * CVE-2021-3714 (CVSS3: 5.9 MEDIUM): linux-yocto https://web.nvd.nist.gov/view/vul

[OE-core] OE-core CVE metrics for kirkstone on Sun 09 Jun 2024 02:00:01 AM HST

2024-06-09 Thread Steve Sakoman
Branch: kirkstone New this week: 0 CVEs Removed this week: 0 CVEs Full list: Found 33 unpatched CVEs CVE-2021-35937 (CVSS3: 6.4 MEDIUM): rpm:rpm-native https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-35937 * CVE-2021-35938 (CVSS3: 6.7 MEDIUM): rpm:rpm-native https://web.nvd.nist.gov

[OE-core] OE-core CVE metrics for master on Sun 09 Jun 2024 01:00:01 AM HST

2024-06-09 Thread Steve Sakoman
Branch: master New this week: 0 CVEs Removed this week: 1 CVEs CVE-2022-46456 (CVSS3: 6.1 MEDIUM): nasm:nasm-native https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46456 * Full list: Found 36 unpatched CVEs CVE-2019-14899 (CVSS3: 7.4 HIGH): linux-yocto https://web.nvd.nist.gov/view/

[OE-core] [PATCH v1 2/2] systemd: bpf-framework: pass STAGING_INCDIR to eBPF compiler

2024-06-09 Thread Johannes Schneider via lists.openembedded.org
The eBPFs are pre-compiled during the systemd-build with a different compiler than the cross-compiler used to build systemd itself. This is either a 'clang-native' or a gcc (bpf-unknown-none) which do not see the BUILD_CFLAGS set -isystem ${STAGING_INCDIR}. For this the meson.build file constructi

[OE-core] Patchtest results for [PATCH v1 2/2] systemd: bpf-framework: pass STAGING_INCDIR to eBPF compiler

2024-06-09 Thread Patchtest
Thank you for your submission. Patchtest identified one or more issues with the patch. Please see the log below for more information: --- Testing patch /home/patchtest/share/mboxes/v1-2-2-systemd-bpf-framework-pass-STAGING_INCDIR-to-eBPF-compiler.patch FAIL: test Upstream-Status presence: Added

[OE-core] [PATCH v1 1/2] systemd: add PACKAGECONFIG for bpf-framework

2024-06-09 Thread Johannes Schneider via lists.openembedded.org
The bpf-framework is used to pre-compile eBPFs that required for the systemd.resource-control features RestrictFileSystems=[1] and RestrictNetworkInterfaces=[2] to work. Apart from 'clang-native' to compile the eBPFs, the required kernel switches are described in [3]. Link: https://www.freedeskt

[OE-core] [PATCH v1 2/2] systemd: bpf-framework: pass STAGING_INCDIR to eBPF compiler

2024-06-09 Thread Johannes Schneider via lists.openembedded.org
The eBPFs are pre-compiled during the systemd-build with a different compiler than the cross-compiler used to build systemd itself. This is either a 'clang-native' or a gcc (bpf-unknown-none) which do not see the BUILD_CFLAGS set -isystem ${STAGING_INCDIR}. For this the meson.build file constructi

[OE-core] [PATCH v1 0/2] systemd and RestrictNetworkInterfaces

2024-06-09 Thread Johannes Schneider via lists.openembedded.org
Systemd has eBPF based resource-control features to limit file-system and network-interface access [1][2] For these to be usable the corresponding eBPFs that come with systemd need to be compiled an deployed to the system - this could now be done by setting the PACKAGECONFIG+="bpf-framework" in th