[yocto] [meta-rockchip][PATCH] trusted-firmware-a: Add missing Upstream-Status

2023-06-21 Thread Khem Raj
Signed-off-by: Khem Raj --- .../files/0001-dram-Fix-build-with-gcc-11.patch | 1 + 1 file changed, 1 insertion(+) diff --git a/recipes-bsp/trusted-firmware-a/files/0001-dram-Fix-build-with-gcc-11.patch b/recipes-bsp/trusted-firmware-a/files/0001-dram-Fix-build-with-gcc-11.patc

Re: [yocto] [meta-security][PATCH] dm-verity-image-initramfs: Allow compressed image types

2023-06-21 Thread Armin Kuster
this fails to build: The stack trace of python calls that resulted in this exception/failure was: File: '', lineno: 24, function: 0020:__anon_70__home_akuster_oss_clean_poky_meta_classes_recipe_rootfs_postcommands_bbclass(d) 0021:__anon_125__home_akuster_oss_clean_poky_meta_classes_recipe_image_

[yocto] [meta-security][PATCH 1/2] clamav: drop unused patch

2023-06-21 Thread Armin Kuster
Signed-off-by: Armin Kuster --- recipes-scanners/clamav/files/test.patch | 26 1 file changed, 26 deletions(-) delete mode 100644 recipes-scanners/clamav/files/test.patch diff --git a/recipes-scanners/clamav/files/test.patch b/recipes-scanners/clamav/files/test.patch d

[yocto] [meta-security][PATCH 2/2] isic: fine tune Upstream-Status

2023-06-21 Thread Armin Kuster
These are changes I did so apply the appropriate label. Signed-off-by: Armin Kuster --- recipes-security/isic/files/configure_fix.patch | 5 ++--- recipes-security/isic/files/isic-0.07-make.patch| 4 +--- recipes-security/isic/files/isic-0.07-netinet.patch | 4 +--- 3 files changed, 4 in

Re: [yocto] [meta-security][PATCH] openscap: fix buildpaths issue

2023-06-21 Thread Armin Kuster
Hello Kai, Can you rebase  this to the latest master. There was a layer reorg landed during the posting of this patch. BR, Armin On 6/20/23 11:55 PM, Kai Kang wrote: From: Kai Kang Variables PREFERRED_PYTHON_PATH and PYTHON3_PATH are set with ${PYTHON_EXECUTABLE}. For cross compile, ${PYTH

[yocto] [meta-security][PATCH] scap-security-guide: bump the number of test that pass

2023-06-21 Thread Armin Kuster
Add a eval script. Lets see how many checks pass out of the box Signed-off-by: Armin Kuster --- .../0001-standard.profile-expand-checks.patch | 228 ++ .../scap-security-guide/files/run_eval.sh | 3 + .../scap-security-guide_0.1.67.bb | 12 +- 3 files changed,

[yocto] [meta-security][PATCH 3/7] dm-verity: save veritysetup args beside runtime environment

2023-06-21 Thread Paul Gortmaker via lists.yoctoproject.org
We already have this directory to save the environment variable settings so they can be copied into the initramfs for runtime setup. There are quite a few veritysetup args, and the nature of storing the hash data after the filesystem data in an "oversized" partition can be error prone due to round

[yocto] [meta-security][PATCH 2/7] dm-verity: restructure the veritysetup arg parsing

2023-06-21 Thread Paul Gortmaker via lists.yoctoproject.org
In making changes to the existing veritysetup arg list, it is harder to see what the proposed change is since they are are glued together on one long line. Break them up so reviewing future unified diffs will be more easy to visually parse. This also makes it easier to temp. dump the args to a fi

[yocto] [meta-security][PATCH 7/7] dm-verity: add sample systemd separate hash example and doc

2023-06-21 Thread Paul Gortmaker via lists.yoctoproject.org
Create a wks.in that allows an out-of-the-box build of a bootable USB image using systemd and the hash data as a separate device or partition. A focus here was to ensure we used proper GPT names and GPT types, and the GPT UUIDs that are based on splitting the root hash. Signed-off-by: Paul Gortma

[yocto] [meta-security][PATCH 4/7] dm-verity: add support for hash storage on separate partition

2023-06-21 Thread Paul Gortmaker via lists.yoctoproject.org
There are essentially two ways for dealing with where to put the hash data for dm-verity block integrity checks. You can store both in a single partition, by using ~95% of the storage space for the filesystem and the remaining 5% tail for the hash, or you can use a completely separate partition (o

[yocto] [meta-security][PATCH 6/7] dm-verity: hook separate hash into initramfs framework

2023-06-21 Thread Paul Gortmaker via lists.yoctoproject.org
The prior commits create the separate hash so now it is time to update the initramfs framework so that veritysetup, which is responsible for binding the data and hash, is aware of when separate hash is in use, and can react accordingly. The added code follows the existing appended hash code style,

[yocto] [meta-security][PATCH 0/7] dm-verity: separate device for hash storage

2023-06-21 Thread Paul Gortmaker via lists.yoctoproject.org
The primary goal here is to enable storage of dm-verity hash on a separate device/partition. There are essentially two ways for dealing with where to put the hash data for dm-verity block integrity checks. You can store both in a single partition, by using ~95% of the storage space for the filesy

[yocto] [meta-security][PATCH 5/7] dm-verity: add wks.in fragment with dynamic build hash data

2023-06-21 Thread Paul Gortmaker via lists.yoctoproject.org
Export the dynamic build data for consumption in wic image generation. It can either be included directly or manually parsed for useful chunks in custom configurations people end up making. For convenience, it is placed alongside the work-shared/dm-verity dir where we already store the plain envi

[yocto] [meta-security][PATCH 1/7] dm-verity: add descriptive strings for "wic list images"

2023-06-21 Thread Paul Gortmaker via lists.yoctoproject.org
Without these one line descriptors and their associated marker prefix, the output from "wic list images" only shows they are available as a choice but w/o any description Signed-off-by: Paul Gortmaker --- wic/beaglebone-yocto-verity.wks.in | 1 + wic/systemd-bootdisk-dmverity.wks.in | 1 + 2 f

Re: [yocto] meta-arm-toolchain: SUPPORTED file not found #toolchain

2023-06-21 Thread Jesus Jimenez Sanchez via lists.yoctoproject.org
Hi, After a few problems that took me a while to fix, I've now used a default poky with default configuration, and it builds just fine. There must be something in one of my configuration files that appends that "image/local" at the end of WORKDIR, but I've search in entire folder and there are

Re: [yocto] [meta-security][PATCH] *.patch: add Upstream-Status to all patches

2023-06-21 Thread Martin Jansa
On Wed, Jun 21, 2023 at 3:42 PM akuster808 wrote: > Hello Martin, > Hello Armin, On 6/21/23 6:42 AM, Martin Jansa wrote: > > There is new patch-status QA check in oe-core: > > > https://git.openembedded.org/openembedded-core/commit/?id=76a685bfcf927593eac67157762a53259089ea8a > > > > This is te

Re: [yocto] [meta-security][PATCH] *.patch: add Upstream-Status to all patches

2023-06-21 Thread Armin Kuster
Hello Martin, On 6/21/23 6:42 AM, Martin Jansa wrote: There is new patch-status QA check in oe-core: https://git.openembedded.org/openembedded-core/commit/?id=76a685bfcf927593eac67157762a53259089ea8a This is temporary work around just to hide _many_ warnings from optional patch-status (if you a

Re: [yocto] python3-speechrecognition building using yocto recipe #yocto

2023-06-21 Thread Richard Purdie
On Wed, 2023-06-21 at 04:10 -0700, lavkhush2...@gmail.com wrote: > Hi all,  > > I want to create .deb file of package python3-speechrecognition  , I  > successfully builded natively on target board riscv platform and i > copied binary from target board and with using  recipe i am copying > binary

Re: [yocto] python3-speechrecognition building using yocto recipe #yocto

2023-06-21 Thread Alexander Kanavin
That's not how it works. You need to write a recipe that cross-builds the needed package from source. Taking prebuilt binaries from elsewhere is asking for trouble, and not recommended even for experienced developers. Alex On Wed, 21 Jun 2023 at 13:10, wrote: > > Hi all, > > I want to create .de

[yocto] python3-speechrecognition building using yocto recipe #yocto

2023-06-21 Thread lavkhush2208
Hi all, I want to create .deb file of package python3-speechrecognition  , I  successfully builded natively on target board riscv platform and i copied binary from target board and with using  recipe i am copying binary in path: /usr/lib/python3.8/site-packages and trying  to create .deb file f

Re: [yocto] File magic/sdk relocation

2023-06-21 Thread Oleksiy Obitotskyy via lists.yoctoproject.org
Hi, I have problem with reproducibility of this issue. What I did: build buildtools tarball and install it Than build sdk with this buildtools tarball. 1. No changes. Buildtools tarball installed and relocated into. /nobackup/oobitots/btt-master/sysroots/x86_64-xesdk-linux/usr/bin/file point

[yocto] [meta-security][PATCH] *.patch: add Upstream-Status to all patches

2023-06-21 Thread Martin Jansa
There is new patch-status QA check in oe-core: https://git.openembedded.org/openembedded-core/commit/?id=76a685bfcf927593eac67157762a53259089ea8a This is temporary work around just to hide _many_ warnings from optional patch-status (if you add it to WARN_QA). This just added Upstream-Status: Pend

Re: [yocto] [meta-selinux][dunfell][PATCH] audit: Add https protocol for clonning repository

2023-06-21 Thread Shubham Kulkarni
Hi Team, Is there any update for this patch? Can you pIs let me know, if there's any issue with the patch. Thanks, Shubham On Wed, Jun 7, 2023 at 12:57 PM Shubham Kulkarni via lists.yoctoproject.org wrote: > From: Shubham Kulkarni > > audit repository clone failing with git protocol as > gi