Re: [OE-core] [PATCH] linux-dummy: Add package kernel

2019-10-31 Thread He Zhe



On 10/31/19 6:57 PM, Bruce Ashfield wrote:
> On Thu, Oct 31, 2019 at 6:20 AM  wrote:
>> From: He Zhe 
>>
>> Some package like packagegroup-core-boot may ask for package kernel. Let
>> linux-dummy rprovide package kernel to fix the following build failure.
>>
>> ERROR: Nothing RPROVIDES 'kernel' (but
>> .../meta/recipes-core/packagegroups/packagegroup-core-boot.bb RDEPENDS on or
>> otherwise requires it)
> Can you expand on what the higher level use case is that something is
> using packagegroup-core-boot (or whatever), but also linux-dummy ?
>
> It seems like this is going to hide misconfigurations .. since you may
> want something bootable, but yet are not properly configured.
>
> If there's part of that packagroup you need, why not split it up,
> rather than masking the symptom seen here ?

It's the "efi" in MACHINE_FEATURES who asks for "kernel".
https://git.openembedded.org/openembedded-core/tree/meta/recipes-core/packagegroups/packagegroup-core-boot.bb#n31

I thought the user would take care of the kernel himself, so simply added it to
linux-dummy. I'm not quite sure what you mean by "split it up".

Regards,
Zhe

>
> Bruce
>
>> Signed-off-by: He Zhe 
>> ---
>>  meta/recipes-kernel/linux/linux-dummy.bb | 7 +--
>>  1 file changed, 5 insertions(+), 2 deletions(-)
>>
>> diff --git a/meta/recipes-kernel/linux/linux-dummy.bb 
>> b/meta/recipes-kernel/linux/linux-dummy.bb
>> index 62cf6f5ea6..20d7ed815d 100644
>> --- a/meta/recipes-kernel/linux/linux-dummy.bb
>> +++ b/meta/recipes-kernel/linux/linux-dummy.bb
>> @@ -8,19 +8,22 @@ LICENSE = "GPLv2"
>>  LIC_FILES_CHKSUM = 
>> "file://${WORKDIR}/COPYING.GPL;md5=751419260aa954499f7abaabaa882bbe"
>>
>>  PROVIDES += "virtual/kernel"
>> +RPROVIDES_${PN} += "kernel lib32-kernel"
>>
>>  PACKAGES_DYNAMIC += "^kernel-module-.*"
>>  PACKAGES_DYNAMIC += "^kernel-image-.*"
>>  PACKAGES_DYNAMIC += "^kernel-firmware-.*"
>>
>> -PACKAGES += "kernel-modules kernel-vmlinux"
>> +PACKAGES += "kernel-modules kernel-vmlinux kernel"
>>  FILES_kernel-modules = ""
>>  ALLOW_EMPTY_kernel-modules = "1"
>>  DESCRIPTION_kernel-modules = "Kernel modules meta package"
>>  FILES_kernel-vmlinux = ""
>>  ALLOW_EMPTY_kernel-vmlinux = "1"
>>  DESCRIPTION_kernel-vmlinux = "Kernel vmlinux meta package"
>> -
>> +FILES_kernel = ""
>> +ALLOW_EMPTY_kernel = "1"
>> +DESCRIPTION_kernel = "Kernel meta package"
>>
>>  INHIBIT_DEFAULT_DEPS = "1"
>>
>> --
>> 2.17.1
>>
>> --
>> ___
>> Openembedded-core mailing list
>> Openembedded-core@lists.openembedded.org
>> http://lists.openembedded.org/mailman/listinfo/openembedded-core
>
>

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [warrior][PATCH 1/3] go: update 1.12.1->1.12.5

2019-10-31 Thread Martin Jansa
From: Alexander Kanavin 

Signed-off-by: Alexander Kanavin 
Signed-off-by: Richard Purdie 
---
 meta/recipes-devtools/go/go-1.12.inc | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/meta/recipes-devtools/go/go-1.12.inc 
b/meta/recipes-devtools/go/go-1.12.inc
index 66df500520..dc5e2af9e2 100644
--- a/meta/recipes-devtools/go/go-1.12.inc
+++ b/meta/recipes-devtools/go/go-1.12.inc
@@ -1,7 +1,7 @@
 require go-common.inc
 
 GO_BASEVERSION = "1.12"
-GO_MINOR = ".1"
+GO_MINOR = ".5"
 PV .= "${GO_MINOR}"
 FILESEXTRAPATHS_prepend := "${FILE_DIRNAME}/go-${GO_BASEVERSION}:"
 
@@ -20,5 +20,5 @@ SRC_URI += "\
 "
 SRC_URI_append_libc-musl = " 
file://0009-ld-replace-glibc-dynamic-linker-with-musl.patch"
 
-SRC_URI[main.md5sum] = "09fe592343465560b4b8431d870b3df3"
-SRC_URI[main.sha256sum] = 
"0be127684df4b842a64e58093154f9d15422f1405f1fcff4b2c36ffc6a15818a"
+SRC_URI[main.md5sum] = "cb6f594d22dd79af4fff9779607b1b47"
+SRC_URI[main.sha256sum] = 
"2aa5f088cbb332e73fc3def546800616b38d3bfe6b8713b8a6404060f22503e8"
-- 
2.20.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [warrior][PATCH 3/3] go-1.12: update to 1.12.9 minor release

2019-10-31 Thread Martin Jansa
From: Khem Raj 

Signed-off-by: Khem Raj 
Signed-off-by: Richard Purdie 
---
 meta/recipes-devtools/go/go-1.12.inc | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/meta/recipes-devtools/go/go-1.12.inc 
b/meta/recipes-devtools/go/go-1.12.inc
index 13a4c3bd8d..ed14b175e6 100644
--- a/meta/recipes-devtools/go/go-1.12.inc
+++ b/meta/recipes-devtools/go/go-1.12.inc
@@ -1,7 +1,7 @@
 require go-common.inc
 
 GO_BASEVERSION = "1.12"
-GO_MINOR = ".6"
+GO_MINOR = ".9"
 PV .= "${GO_MINOR}"
 FILESEXTRAPATHS_prepend := "${FILE_DIRNAME}/go-${GO_BASEVERSION}:"
 
@@ -20,5 +20,5 @@ SRC_URI += "\
 "
 SRC_URI_append_libc-musl = " 
file://0009-ld-replace-glibc-dynamic-linker-with-musl.patch"
 
-SRC_URI[main.md5sum] = "48a4141fc718dd742d106431294f08bf"
-SRC_URI[main.sha256sum] = 
"c96c5ccc7455638ae1a8b7498a030fe653731c8391c5f8e79590bce72f92b4ca"
+SRC_URI[main.md5sum] = "6132109d4050da349eadc9f7b0304ef4"
+SRC_URI[main.sha256sum] = 
"ab0e56ed9c4732a653ed22e232652709afbf573e710f56a07f7fdeca578d62fc"
-- 
2.20.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [warrior][PATCH 2/3] go: Upgrade 1.12.5 -> 1.12.6

2019-10-31 Thread Martin Jansa
From: Adrian Bunk 

Signed-off-by: Adrian Bunk 
Signed-off-by: Richard Purdie 
---
 meta/recipes-devtools/go/go-1.12.inc | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/meta/recipes-devtools/go/go-1.12.inc 
b/meta/recipes-devtools/go/go-1.12.inc
index dc5e2af9e2..13a4c3bd8d 100644
--- a/meta/recipes-devtools/go/go-1.12.inc
+++ b/meta/recipes-devtools/go/go-1.12.inc
@@ -1,7 +1,7 @@
 require go-common.inc
 
 GO_BASEVERSION = "1.12"
-GO_MINOR = ".5"
+GO_MINOR = ".6"
 PV .= "${GO_MINOR}"
 FILESEXTRAPATHS_prepend := "${FILE_DIRNAME}/go-${GO_BASEVERSION}:"
 
@@ -20,5 +20,5 @@ SRC_URI += "\
 "
 SRC_URI_append_libc-musl = " 
file://0009-ld-replace-glibc-dynamic-linker-with-musl.patch"
 
-SRC_URI[main.md5sum] = "cb6f594d22dd79af4fff9779607b1b47"
-SRC_URI[main.sha256sum] = 
"2aa5f088cbb332e73fc3def546800616b38d3bfe6b8713b8a6404060f22503e8"
+SRC_URI[main.md5sum] = "48a4141fc718dd742d106431294f08bf"
+SRC_URI[main.sha256sum] = 
"c96c5ccc7455638ae1a8b7498a030fe653731c8391c5f8e79590bce72f92b4ca"
-- 
2.20.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH v2] ofono: update to 1.31

2019-10-31 Thread Oleksandr Kravchuk
Changelog:
- Fix issue with handling CID 0 context identifier
- Fix issue with handling detach state and running LTE
- Fix issue with handling SIM states and Quectel modems

Signed-off-by: Oleksandr Kravchuk 
---
 .../ofono/{ofono_1.30.bb => ofono_1.31.bb}| 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)
 rename meta/recipes-connectivity/ofono/{ofono_1.30.bb => ofono_1.31.bb} (92%)

diff --git a/meta/recipes-connectivity/ofono/ofono_1.30.bb 
b/meta/recipes-connectivity/ofono/ofono_1.31.bb
similarity index 92%
rename from meta/recipes-connectivity/ofono/ofono_1.30.bb
rename to meta/recipes-connectivity/ofono/ofono_1.31.bb
index 10d5c90979..7d0976ad7f 100644
--- a/meta/recipes-connectivity/ofono/ofono_1.30.bb
+++ b/meta/recipes-connectivity/ofono/ofono_1.31.bb
@@ -12,8 +12,8 @@ SRC_URI = "\
 file://ofono \
 file://0001-mbim-add-an-optional-TEMP_FAILURE_RETRY-macro-copy.patch \
 "
-SRC_URI[md5sum] = "2b1ce11a4db1f4b5c8cd96eb7e96ba0c"
-SRC_URI[sha256sum] = 
"8079735efc5d7f33be9e792e791f2f7ff75c31ce67d477b994673e32319eec5c"
+SRC_URI[md5sum] = "1c26340e3c6ed132cc812595081bb3dc"
+SRC_URI[sha256sum] = 
"a15c5d28096c10eb30e47a68b6dc2e7c4a5a99d7f4cfedf0b69624f33d859e9b"
 
 inherit autotools pkgconfig update-rc.d systemd gobject-introspection-data
 
-- 
2.17.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH] gnu-efi: Upgrade 3.0.10 -> 3.0.11

2019-10-31 Thread Adrian Bunk
Patch applied upstream removed.

Signed-off-by: Adrian Bunk 
---
 ...evert-efilink-fix-build-with-gcc-4.8.patch | 38 ---
 .../{gnu-efi_3.0.10.bb => gnu-efi_3.0.11.bb}  |  5 +--
 2 files changed, 2 insertions(+), 41 deletions(-)
 delete mode 100644 
meta/recipes-bsp/gnu-efi/gnu-efi/0001-Revert-efilink-fix-build-with-gcc-4.8.patch
 rename meta/recipes-bsp/gnu-efi/{gnu-efi_3.0.10.bb => gnu-efi_3.0.11.bb} (92%)

diff --git 
a/meta/recipes-bsp/gnu-efi/gnu-efi/0001-Revert-efilink-fix-build-with-gcc-4.8.patch
 
b/meta/recipes-bsp/gnu-efi/gnu-efi/0001-Revert-efilink-fix-build-with-gcc-4.8.patch
deleted file mode 100644
index 8ab25113a4..00
--- 
a/meta/recipes-bsp/gnu-efi/gnu-efi/0001-Revert-efilink-fix-build-with-gcc-4.8.patch
+++ /dev/null
@@ -1,38 +0,0 @@
-From 1f7b2e5bd6603b30202a66b6317a41e2be85742b Mon Sep 17 00:00:00 2001
-From: Esben Haabendal 
-Date: Tue, 26 Mar 2019 13:37:02 +0100
-Subject: Revert "efilink: fix build with gcc 4.8"
-
-This reverts commit 6335e5c697c57d8b5854b8202de3733bcb151ca6, as it breaks
-gcc builds with '-nostdinc' flag.
-
-The fix in 1a53d8f88a452847b25f9689f9a08dbcf82c86e4
-(Fix for problem with undeclared intptr_t type), which is also merged
-fixes the same problem, without causing breakage.
-
-Upstream-Status: Submitted 
[https://sourceforge.net/p/gnu-efi/code/merge-requests/6/]
-
-Signed-off-by: Esben Haabendal 
-Signed-off-by: Adrian Bunk 

- inc/efilink.h | 4 
- 1 file changed, 4 deletions(-)
-
-diff --git a/inc/efilink.h b/inc/efilink.h
-index b69a6fd..cc5aa2d 100644
 a/inc/efilink.h
-+++ b/inc/efilink.h
-@@ -1,10 +1,6 @@
- #ifndef _EFI_LINK_H
- #define _EFI_LINK_H
- 
--#if defined(__GNUC__)
--#include 
--#endif
--
- /*++
- 
- Copyright (c) 1998  Intel Corporation
--- 
-2.20.1
-
diff --git a/meta/recipes-bsp/gnu-efi/gnu-efi_3.0.10.bb 
b/meta/recipes-bsp/gnu-efi/gnu-efi_3.0.11.bb
similarity index 92%
rename from meta/recipes-bsp/gnu-efi/gnu-efi_3.0.10.bb
rename to meta/recipes-bsp/gnu-efi/gnu-efi_3.0.11.bb
index ac6257fab9..9954d7f57a 100644
--- a/meta/recipes-bsp/gnu-efi/gnu-efi_3.0.10.bb
+++ b/meta/recipes-bsp/gnu-efi/gnu-efi_3.0.11.bb
@@ -16,11 +16,10 @@ SRC_URI = "${SOURCEFORGE_MIRROR}/${BPN}/${BP}.tar.bz2 \
file://parallel-make-archives.patch \
file://lib-Makefile-fix-parallel-issue.patch \
file://gnu-efi-3.0.9-fix-clang-build.patch \
-   file://0001-Revert-efilink-fix-build-with-gcc-4.8.patch \
"
 
-SRC_URI[md5sum] = "960a8379b6f95ee73d7778b70bf2a089"
-SRC_URI[sha256sum] = 
"f12082a3a5f0c3e38c67262a9f34245d139ac2cdfc0a0bdcf03c9b1f56fa4fed"
+SRC_URI[md5sum] = "21148bbcccec385a9bfdf5f678959577"
+SRC_URI[sha256sum] = 
"f28da792a2532e91e18e0101468811739a22cde9eee5eacfd0efb9bf3a61d6b9"
 
 COMPATIBLE_HOST = "(x86_64.*|i.86.*|aarch64.*|arm.*)-linux"
 COMPATIBLE_HOST_armv4 = 'null'
-- 
2.17.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] ✗ patchtest: failure for libgcrypt: CVE-2019-12904 fix Upstream-Status: Backport Signed-off-by: Shubham Agrawal

2019-10-31 Thread Patchwork
== Series Details ==

Series: libgcrypt: CVE-2019-12904 fix Upstream-Status: Backport Signed-off-by: 
Shubham Agrawal
Revision: 1
URL   : https://patchwork.openembedded.org/series/20842/
State : failure

== Summary ==


Thank you for submitting this patch series to OpenEmbedded Core. This is
an automated response. Several tests have been executed on the proposed
series by patchtest resulting in the following failures:



* Patch[thud] libgcrypt: CVE-2019-12904 fix Upstream-Status: 
Backport Signed-off-by: Shubham Agrawal
 Issue Commit shortlog is too long [test_shortlog_length] 
  Suggested fixEdit shortlog so that it is 90 characters or less (currently 
108 characters)

* Patch[thud] libgcrypt: CVE-2019-12904 fix Upstream-Status: 
Backport Signed-off-by: Shubham Agrawal
 Issue Patch is missing Signed-off-by [test_signed_off_by_presence] 
  Suggested fixSign off the patch (either manually or with "git commit 
--amend -s")

* Issue Upstream-Status is in incorrect format 
[test_upstream_status_presence_format] 
  Suggested fixFix Upstream-Status format in CVE-2019-12904_p2.patch
  Current  Upstream-status: Backport 
  Standard format  Upstream-Status: 
  Valid status Pending, Accepted, Backport, Denied, Inappropriate [reason], 
Submitted [where]



If you believe any of these test results are incorrect, please reply to the
mailing list (openembedded-core@lists.openembedded.org) raising your concerns.
Otherwise we would appreciate you correcting the issues and submitting a new
version of the patchset if applicable. Please ensure you add/increment the
version number when sending the new version (i.e. [PATCH] -> [PATCH v2] ->
[PATCH v3] -> ...).

---
Guidelines: 
https://www.openembedded.org/wiki/Commit_Patch_Message_Guidelines
Test framework: http://git.yoctoproject.org/cgit/cgit.cgi/patchtest
Test suite: http://git.yoctoproject.org/cgit/cgit.cgi/patchtest-oe

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] ✗ patchtest: failure for Corrected patch file structure as per upstream

2019-10-31 Thread Patchwork
== Series Details ==

Series: Corrected patch file structure as per upstream
Revision: 1
URL   : https://patchwork.openembedded.org/series/20841/
State : failure

== Summary ==


Thank you for submitting this patch series to OpenEmbedded Core. This is
an automated response. Several tests have been executed on the proposed
series by patchtest resulting in the following failures:



* Issue Series does not apply on top of target branch 
[test_series_merge_on_head] 
  Suggested fixRebase your series on top of targeted branch
  Targeted branch  thud (currently at cd7cf933b3)

* Patch[thud] Corrected patch file structure as per upstream
 Issue Shortlog does not follow expected format 
[test_shortlog_format] 
  Suggested fixCommit shortlog (first line of commit message) should follow 
the format ": "



If you believe any of these test results are incorrect, please reply to the
mailing list (openembedded-core@lists.openembedded.org) raising your concerns.
Otherwise we would appreciate you correcting the issues and submitting a new
version of the patchset if applicable. Please ensure you add/increment the
version number when sending the new version (i.e. [PATCH] -> [PATCH v2] ->
[PATCH v3] -> ...).

---
Guidelines: 
https://www.openembedded.org/wiki/Commit_Patch_Message_Guidelines
Test framework: http://git.yoctoproject.org/cgit/cgit.cgi/patchtest
Test suite: http://git.yoctoproject.org/cgit/cgit.cgi/patchtest-oe

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [thud][PATCH] libgcrypt: CVE-2019-12904 fix Upstream-Status: Backport Signed-off-by: Shubham Agrawal

2019-10-31 Thread shuagr97
From: Shubham Agrawal 

---
 .../libgcrypt/files/CVE-2019-12904_p1.patch| 176 +++
 .../libgcrypt/files/CVE-2019-12904_p2.patch| 330 +
 meta/recipes-support/libgcrypt/libgcrypt_1.8.4.bb  |   2 +
 3 files changed, 508 insertions(+)
 create mode 100644 meta/recipes-support/libgcrypt/files/CVE-2019-12904_p1.patch
 create mode 100644 meta/recipes-support/libgcrypt/files/CVE-2019-12904_p2.patch

diff --git a/meta/recipes-support/libgcrypt/files/CVE-2019-12904_p1.patch 
b/meta/recipes-support/libgcrypt/files/CVE-2019-12904_p1.patch
new file mode 100644
index 000..cda5211
--- /dev/null
+++ b/meta/recipes-support/libgcrypt/files/CVE-2019-12904_p1.patch
@@ -0,0 +1,176 @@
+From 263ad8ae08f287e32656d4e3e0116479f3d9ad9d Mon Sep 17 00:00:00 2001
+From: Jussi Kivilinna 
+Date: Fri, 31 May 2019 17:27:25 +0300
+Subject: [PATCH] GCM: move look-up table to .data section and unshare between 
processes
+Reply-To: shu...@microsoft.com
+
+CVE: CVE-2019-12904_p1 
+Upstream-Status: Backport 
+Signed-off-by: Shubham Agrawal 
+Upstream-commit : 
https://github.com/gpg/libgcrypt/commit/a4c561aab1014c3630bc88faf6f5246fee16b020
+
+* cipher/cipher-gcm.c (ATTR_ALIGNED_64): New.
+(gcmR): Move to 'gcm_table' structure.
+(gcm_table): New structure for look-up table with counters before and
+after.
+(gcmR): New macro.
+(prefetch_table): Handle input with length not multiple of 256.
+(do_prefetch_tables): Modify pre- and post-table counters to unshare
+look-up table pages between processes.
+--
+GnuPG-bug-id: 4541
+Signed-off-by: Jussi Kivilinna 
+---
+ cipher/cipher-gcm.c | 129 ++--
+ 1 file changed, 95 insertions(+), 34 deletions(-)
+
+diff --git a/cipher/cipher-gcm.c b/cipher/cipher-gcm.c
+index 6169d14..97a8015 100644
+--- a/cipher/cipher-gcm.c
 b/cipher/cipher-gcm.c
+@@ -30,6 +30,14 @@
+ #include "./cipher-internal.h"
+ 
+ 
++/* Helper macro to force alignment to 16 or 64 bytes.  */
++#ifdef HAVE_GCC_ATTRIBUTE_ALIGNED
++# define ATTR_ALIGNED_64  __attribute__ ((aligned (64)))
++#else
++# define ATTR_ALIGNED_64
++#endif
++
++
+ #ifdef GCM_USE_INTEL_PCLMUL
+ extern void _gcry_ghash_setup_intel_pclmul (gcry_cipher_hd_t c);
+ 
+@@ -63,40 +71,93 @@ ghash_armv8_ce_pmull (gcry_cipher_hd_t c, byte *result, 
const byte *buf,
+ 
+ 
+ #ifdef GCM_USE_TABLES
+-static const u16 gcmR[256] = {
+-  0x, 0x01c2, 0x0384, 0x0246, 0x0708, 0x06ca, 0x048c, 0x054e,
+-  0x0e10, 0x0fd2, 0x0d94, 0x0c56, 0x0918, 0x08da, 0x0a9c, 0x0b5e,
+-  0x1c20, 0x1de2, 0x1fa4, 0x1e66, 0x1b28, 0x1aea, 0x18ac, 0x196e,
+-  0x1230, 0x13f2, 0x11b4, 0x1076, 0x1538, 0x14fa, 0x16bc, 0x177e,
+-  0x3840, 0x3982, 0x3bc4, 0x3a06, 0x3f48, 0x3e8a, 0x3ccc, 0x3d0e,
+-  0x3650, 0x3792, 0x35d4, 0x3416, 0x3158, 0x309a, 0x32dc, 0x331e,
+-  0x2460, 0x25a2, 0x27e4, 0x2626, 0x2368, 0x22aa, 0x20ec, 0x212e,
+-  0x2a70, 0x2bb2, 0x29f4, 0x2836, 0x2d78, 0x2cba, 0x2efc, 0x2f3e,
+-  0x7080, 0x7142, 0x7304, 0x72c6, 0x7788, 0x764a, 0x740c, 0x75ce,
+-  0x7e90, 0x7f52, 0x7d14, 0x7cd6, 0x7998, 0x785a, 0x7a1c, 0x7bde,
+-  0x6ca0, 0x6d62, 0x6f24, 0x6ee6, 0x6ba8, 0x6a6a, 0x682c, 0x69ee,
+-  0x62b0, 0x6372, 0x6134, 0x60f6, 0x65b8, 0x647a, 0x663c, 0x67fe,
+-  0x48c0, 0x4902, 0x4b44, 0x4a86, 0x4fc8, 0x4e0a, 0x4c4c, 0x4d8e,
+-  0x46d0, 0x4712, 0x4554, 0x4496, 0x41d8, 0x401a, 0x425c, 0x439e,
+-  0x54e0, 0x5522, 0x5764, 0x56a6, 0x53e8, 0x522a, 0x506c, 0x51ae,
+-  0x5af0, 0x5b32, 0x5974, 0x58b6, 0x5df8, 0x5c3a, 0x5e7c, 0x5fbe,
+-  0xe100, 0xe0c2, 0xe284, 0xe346, 0xe608, 0xe7ca, 0xe58c, 0xe44e,
+-  0xef10, 0xeed2, 0xec94, 0xed56, 0xe818, 0xe9da, 0xeb9c, 0xea5e,
+-  0xfd20, 0xfce2, 0xfea4, 0xff66, 0xfa28, 0xfbea, 0xf9ac, 0xf86e,
+-  0xf330, 0xf2f2, 0xf0b4, 0xf176, 0xf438, 0xf5fa, 0xf7bc, 0xf67e,
+-  0xd940, 0xd882, 0xdac4, 0xdb06, 0xde48, 0xdf8a, 0xddcc, 0xdc0e,
+-  0xd750, 0xd692, 0xd4d4, 0xd516, 0xd058, 0xd19a, 0xd3dc, 0xd21e,
+-  0xc560, 0xc4a2, 0xc6e4, 0xc726, 0xc268, 0xc3aa, 0xc1ec, 0xc02e,
+-  0xcb70, 0xcab2, 0xc8f4, 0xc936, 0xcc78, 0xcdba, 0xcffc, 0xce3e,
+-  0x9180, 0x9042, 0x9204, 0x93c6, 0x9688, 0x974a, 0x950c, 0x94ce,
+-  0x9f90, 0x9e52, 0x9c14, 0x9dd6, 0x9898, 0x995a, 0x9b1c, 0x9ade,
+-  0x8da0, 0x8c62, 0x8e24, 0x8fe6, 0x8aa8, 0x8b6a, 0x892c, 0x88ee,
+-  0x83b0, 0x8272, 0x8034, 0x81f6, 0x84b8, 0x857a, 0x873c, 0x86fe,
+-  0xa9c0, 0xa802, 0xaa44, 0xab86, 0xaec8, 0xaf0a, 0xad4c, 0xac8e,
+-  0xa7d0, 0xa612, 0xa454, 0xa596, 0xa0d8, 0xa11a, 0xa35c, 0xa29e,
+-  0xb5e0, 0xb422, 0xb664, 0xb7a6, 0xb2e8, 0xb32a, 0xb16c, 0xb0ae,
+-  0xbbf0, 0xba32, 0xb874, 0xb9b6, 0xbcf8, 0xbd3a, 0xbf7c, 0xbebe,
+-};
++static struct
++{
++  volatile u32 counter_head;
++  u32 cacheline_align[64 / 4 - 1];
++  u16 R[256];
++  volatile u32 counter_tail;
++} gcm_table ATTR_ALIGNED_64 =
++  {
++0,
++{ 0, },
++{
++  0x, 0x01c2, 0x0384, 0x0246, 0x0708, 0x06ca, 0x048c, 0x054e,
++  0x0e10, 0x0fd2, 0x0d94, 0x0c56, 0x0918, 0x08da, 0x0a9c, 0x0b5e,
++  0x1c20, 0x1de2, 0x1fa4, 0x1e66, 0x1b28, 0x1aea, 0x18ac, 0x196e,
++  

[OE-core] [thud][PATCH] Corrected patch file structure as per upstream

2019-10-31 Thread shuagr97
From: Shubham Agrawal 

Signed-off-by: Shubham Agrawal 
---
 meta/recipes-support/libgcrypt/files/CVE-2019-12904_p1.patch | 10 +-
 meta/recipes-support/libgcrypt/files/CVE-2019-12904_p2.patch |  9 +
 2 files changed, 10 insertions(+), 9 deletions(-)

diff --git a/meta/recipes-support/libgcrypt/files/CVE-2019-12904_p1.patch 
b/meta/recipes-support/libgcrypt/files/CVE-2019-12904_p1.patch
index 397c6ba..cda5211 100644
--- a/meta/recipes-support/libgcrypt/files/CVE-2019-12904_p1.patch
+++ b/meta/recipes-support/libgcrypt/files/CVE-2019-12904_p1.patch
@@ -1,12 +1,13 @@
 From 263ad8ae08f287e32656d4e3e0116479f3d9ad9d Mon Sep 17 00:00:00 2001
 From: Jussi Kivilinna 
 Date: Fri, 31 May 2019 17:27:25 +0300
-Subject: [PATCH] CVE: CVE-2019-12904_p1 Status: Backport Sign off: Shubham
- agrawalshu...@microsoft.com Upstream:
- 
https://github.com/gpg/libgcrypt/commit/a4c561aab1014c3630bc88faf6f5246fee16b020
+Subject: [PATCH] GCM: move look-up table to .data section and unshare between 
processes
 Reply-To: shu...@microsoft.com
 
-GCM: move look-up table to .data section and unshare between processes
+CVE: CVE-2019-12904_p1 
+Upstream-Status: Backport 
+Signed-off-by: Shubham Agrawal 
+Upstream-commit : 
https://github.com/gpg/libgcrypt/commit/a4c561aab1014c3630bc88faf6f5246fee16b020
 
 * cipher/cipher-gcm.c (ATTR_ALIGNED_64): New.
 (gcmR): Move to 'gcm_table' structure.
@@ -17,7 +18,6 @@ after.
 (do_prefetch_tables): Modify pre- and post-table counters to unshare
 look-up table pages between processes.
 --
-
 GnuPG-bug-id: 4541
 Signed-off-by: Jussi Kivilinna 
 ---
diff --git a/meta/recipes-support/libgcrypt/files/CVE-2019-12904_p2.patch 
b/meta/recipes-support/libgcrypt/files/CVE-2019-12904_p2.patch
index f8fa800..0cb503e 100644
--- a/meta/recipes-support/libgcrypt/files/CVE-2019-12904_p2.patch
+++ b/meta/recipes-support/libgcrypt/files/CVE-2019-12904_p2.patch
@@ -1,12 +1,13 @@
 From a5c359cc68a4def9bf39f63070837d89711b4e17 Mon Sep 17 00:00:00 2001
 From: Jussi Kivilinna 
 Date: Fri, 31 May 2019 17:18:09 +0300
-Subject: [PATCH] CVE: CVE-2019-12904_p2 Status: Backport Sign off: Shubham
- agrawalshu...@microsoft.com Upstream:
- 
https://github.com/gpg/libgcrypt/commit/daedbbb5541cd8ecda1459d3b843ea4d92788762
+Subject: [PATCH] AES: move look-up tables to .data section and unshare between 
processes
 Reply-To: shu...@microsoft.com
 
-AES: move look-up tables to .data section and unshare between processes
+CVE: CVE-2019-12904_p2 
+Upstream-status: Backport 
+Signed-off-by: Shubham Agrawal 
+Upstream-commit: 
https://github.com/gpg/libgcrypt/commit/daedbbb5541cd8ecda1459d3b843ea4d92788762
 
 * cipher/rijndael-internal.h (ATTR_ALIGNED_64): New.
 * cipher/rijndael-tables.h (encT): Move to 'enc_tables' structure.
-- 
2.7.4

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


Re: [OE-core] [PATCH] ofono: update to 1.31

2019-10-31 Thread Ross Burton

On 31/10/2019 15:06, Oleksandr Kravchuk wrote:> Changelog:
> - Fix issue with handling CID 0 context identifier
> - Fix issue with handling detach state and running LTE
> - Fix issue with handling SIM states and Quectel modems

A patch just landed in master to clean up the recipe, can you rebase on 
top of that please?


Ross
--
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] ✗ patchtest: failure for libgcrypt: CVE-2019-12904 fix Status: Backport Sign off: Shubham Agrawal

2019-10-31 Thread Patchwork
== Series Details ==

Series: libgcrypt: CVE-2019-12904 fix Status: Backport Sign off: Shubham 
Agrawal
Revision: 1
URL   : https://patchwork.openembedded.org/series/20838/
State : failure

== Summary ==


Thank you for submitting this patch series to OpenEmbedded Core. This is
an automated response. Several tests have been executed on the proposed
series by patchtest resulting in the following failures:



* Patch[thud] libgcrypt: CVE-2019-12904 fix Status: Backport Sign 
off: Shubham Agrawal
 Issue Commit shortlog is too long [test_shortlog_length] 
  Suggested fixEdit shortlog so that it is 90 characters or less (currently 
94 characters)

* Patch[thud] libgcrypt: CVE-2019-12904 fix Status: Backport Sign 
off: Shubham Agrawal
 Issue Patch is missing Signed-off-by [test_signed_off_by_presence] 
  Suggested fixSign off the patch (either manually or with "git commit 
--amend -s")

* Patch[thud] libgcrypt: CVE-2019-12904 fix Status: Backport Sign 
off: Shubham Agrawal
 Issue Missing or incorrectly formatted CVE tag in included patch 
file [test_cve_tag_format] 
  Suggested fixCorrect or include the CVE tag on cve patch with format: 
"CVE: CVE--"

* Issue Added patch file is missing Upstream-Status in the header 
[test_upstream_status_presence_format] 
  Suggested fixAdd Upstream-Status:  to the header of 
meta/recipes-support/libgcrypt/files/CVE-2019-12904_p1.patch
  Standard format  Upstream-Status: 
  Valid status Pending, Accepted, Backport, Denied, Inappropriate [reason], 
Submitted [where]



If you believe any of these test results are incorrect, please reply to the
mailing list (openembedded-core@lists.openembedded.org) raising your concerns.
Otherwise we would appreciate you correcting the issues and submitting a new
version of the patchset if applicable. Please ensure you add/increment the
version number when sending the new version (i.e. [PATCH] -> [PATCH v2] ->
[PATCH v3] -> ...).

---
Guidelines: 
https://www.openembedded.org/wiki/Commit_Patch_Message_Guidelines
Test framework: http://git.yoctoproject.org/cgit/cgit.cgi/patchtest
Test suite: http://git.yoctoproject.org/cgit/cgit.cgi/patchtest-oe

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH] ell: update to 0.26

2019-10-31 Thread Oleksandr Kravchuk
Changelog:
- Fix issue with memory leak and TLS certificates
- Fix issue with buffer size and TLS PRF handling
- Add support for D-Bus non-root ObjectManager

Signed-off-by: Oleksandr Kravchuk 
---
 meta/recipes-core/ell/{ell_0.25.bb => ell_0.26.bb} | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)
 rename meta/recipes-core/ell/{ell_0.25.bb => ell_0.26.bb} (83%)

diff --git a/meta/recipes-core/ell/ell_0.25.bb 
b/meta/recipes-core/ell/ell_0.26.bb
similarity index 83%
rename from meta/recipes-core/ell/ell_0.25.bb
rename to meta/recipes-core/ell/ell_0.26.bb
index f6201f9bf6..f1f252ce4f 100644
--- a/meta/recipes-core/ell/ell_0.25.bb
+++ b/meta/recipes-core/ell/ell_0.26.bb
@@ -14,8 +14,8 @@ DEPENDS = "dbus"
 inherit autotools pkgconfig
 
 SRC_URI = 
"https://mirrors.edge.kernel.org/pub/linux/libs/${BPN}/${BPN}-${PV}.tar.xz;
-SRC_URI[md5sum] = "8a8adc712718c770a72e4df6c9855c26"
-SRC_URI[sha256sum] = 
"7f2be568219d991d566ca50c58a56e69df9a248619fed758dcd9a4b04e655e5b"
+SRC_URI[md5sum] = "4660e25541071e933a2bb02ef2f94e7d"
+SRC_URI[sha256sum] = 
"7855b4b8f271ba6ee67d87d0965b975a9a8dbeaa616665ca2248afa3b5fcbc77"
 
 do_configure_prepend () {
 mkdir -p ${S}/build-aux
-- 
2.17.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [thud][PATCH] libgcrypt: CVE-2019-12904 fix Status: Backport Sign off: Shubham Agrawal

2019-10-31 Thread shuagr97
From: Shubham Agrawal 

---
 .../libgcrypt/files/CVE-2019-12904_p1.patch| 176 +++
 .../libgcrypt/files/CVE-2019-12904_p2.patch| 329 +
 meta/recipes-support/libgcrypt/libgcrypt_1.8.4.bb  |   2 +
 3 files changed, 507 insertions(+)
 create mode 100644 meta/recipes-support/libgcrypt/files/CVE-2019-12904_p1.patch
 create mode 100644 meta/recipes-support/libgcrypt/files/CVE-2019-12904_p2.patch

diff --git a/meta/recipes-support/libgcrypt/files/CVE-2019-12904_p1.patch 
b/meta/recipes-support/libgcrypt/files/CVE-2019-12904_p1.patch
new file mode 100644
index 000..397c6ba
--- /dev/null
+++ b/meta/recipes-support/libgcrypt/files/CVE-2019-12904_p1.patch
@@ -0,0 +1,176 @@
+From 263ad8ae08f287e32656d4e3e0116479f3d9ad9d Mon Sep 17 00:00:00 2001
+From: Jussi Kivilinna 
+Date: Fri, 31 May 2019 17:27:25 +0300
+Subject: [PATCH] CVE: CVE-2019-12904_p1 Status: Backport Sign off: Shubham
+ agrawalshu...@microsoft.com Upstream:
+ 
https://github.com/gpg/libgcrypt/commit/a4c561aab1014c3630bc88faf6f5246fee16b020
+Reply-To: shu...@microsoft.com
+
+GCM: move look-up table to .data section and unshare between processes
+
+* cipher/cipher-gcm.c (ATTR_ALIGNED_64): New.
+(gcmR): Move to 'gcm_table' structure.
+(gcm_table): New structure for look-up table with counters before and
+after.
+(gcmR): New macro.
+(prefetch_table): Handle input with length not multiple of 256.
+(do_prefetch_tables): Modify pre- and post-table counters to unshare
+look-up table pages between processes.
+--
+
+GnuPG-bug-id: 4541
+Signed-off-by: Jussi Kivilinna 
+---
+ cipher/cipher-gcm.c | 129 ++--
+ 1 file changed, 95 insertions(+), 34 deletions(-)
+
+diff --git a/cipher/cipher-gcm.c b/cipher/cipher-gcm.c
+index 6169d14..97a8015 100644
+--- a/cipher/cipher-gcm.c
 b/cipher/cipher-gcm.c
+@@ -30,6 +30,14 @@
+ #include "./cipher-internal.h"
+ 
+ 
++/* Helper macro to force alignment to 16 or 64 bytes.  */
++#ifdef HAVE_GCC_ATTRIBUTE_ALIGNED
++# define ATTR_ALIGNED_64  __attribute__ ((aligned (64)))
++#else
++# define ATTR_ALIGNED_64
++#endif
++
++
+ #ifdef GCM_USE_INTEL_PCLMUL
+ extern void _gcry_ghash_setup_intel_pclmul (gcry_cipher_hd_t c);
+ 
+@@ -63,40 +71,93 @@ ghash_armv8_ce_pmull (gcry_cipher_hd_t c, byte *result, 
const byte *buf,
+ 
+ 
+ #ifdef GCM_USE_TABLES
+-static const u16 gcmR[256] = {
+-  0x, 0x01c2, 0x0384, 0x0246, 0x0708, 0x06ca, 0x048c, 0x054e,
+-  0x0e10, 0x0fd2, 0x0d94, 0x0c56, 0x0918, 0x08da, 0x0a9c, 0x0b5e,
+-  0x1c20, 0x1de2, 0x1fa4, 0x1e66, 0x1b28, 0x1aea, 0x18ac, 0x196e,
+-  0x1230, 0x13f2, 0x11b4, 0x1076, 0x1538, 0x14fa, 0x16bc, 0x177e,
+-  0x3840, 0x3982, 0x3bc4, 0x3a06, 0x3f48, 0x3e8a, 0x3ccc, 0x3d0e,
+-  0x3650, 0x3792, 0x35d4, 0x3416, 0x3158, 0x309a, 0x32dc, 0x331e,
+-  0x2460, 0x25a2, 0x27e4, 0x2626, 0x2368, 0x22aa, 0x20ec, 0x212e,
+-  0x2a70, 0x2bb2, 0x29f4, 0x2836, 0x2d78, 0x2cba, 0x2efc, 0x2f3e,
+-  0x7080, 0x7142, 0x7304, 0x72c6, 0x7788, 0x764a, 0x740c, 0x75ce,
+-  0x7e90, 0x7f52, 0x7d14, 0x7cd6, 0x7998, 0x785a, 0x7a1c, 0x7bde,
+-  0x6ca0, 0x6d62, 0x6f24, 0x6ee6, 0x6ba8, 0x6a6a, 0x682c, 0x69ee,
+-  0x62b0, 0x6372, 0x6134, 0x60f6, 0x65b8, 0x647a, 0x663c, 0x67fe,
+-  0x48c0, 0x4902, 0x4b44, 0x4a86, 0x4fc8, 0x4e0a, 0x4c4c, 0x4d8e,
+-  0x46d0, 0x4712, 0x4554, 0x4496, 0x41d8, 0x401a, 0x425c, 0x439e,
+-  0x54e0, 0x5522, 0x5764, 0x56a6, 0x53e8, 0x522a, 0x506c, 0x51ae,
+-  0x5af0, 0x5b32, 0x5974, 0x58b6, 0x5df8, 0x5c3a, 0x5e7c, 0x5fbe,
+-  0xe100, 0xe0c2, 0xe284, 0xe346, 0xe608, 0xe7ca, 0xe58c, 0xe44e,
+-  0xef10, 0xeed2, 0xec94, 0xed56, 0xe818, 0xe9da, 0xeb9c, 0xea5e,
+-  0xfd20, 0xfce2, 0xfea4, 0xff66, 0xfa28, 0xfbea, 0xf9ac, 0xf86e,
+-  0xf330, 0xf2f2, 0xf0b4, 0xf176, 0xf438, 0xf5fa, 0xf7bc, 0xf67e,
+-  0xd940, 0xd882, 0xdac4, 0xdb06, 0xde48, 0xdf8a, 0xddcc, 0xdc0e,
+-  0xd750, 0xd692, 0xd4d4, 0xd516, 0xd058, 0xd19a, 0xd3dc, 0xd21e,
+-  0xc560, 0xc4a2, 0xc6e4, 0xc726, 0xc268, 0xc3aa, 0xc1ec, 0xc02e,
+-  0xcb70, 0xcab2, 0xc8f4, 0xc936, 0xcc78, 0xcdba, 0xcffc, 0xce3e,
+-  0x9180, 0x9042, 0x9204, 0x93c6, 0x9688, 0x974a, 0x950c, 0x94ce,
+-  0x9f90, 0x9e52, 0x9c14, 0x9dd6, 0x9898, 0x995a, 0x9b1c, 0x9ade,
+-  0x8da0, 0x8c62, 0x8e24, 0x8fe6, 0x8aa8, 0x8b6a, 0x892c, 0x88ee,
+-  0x83b0, 0x8272, 0x8034, 0x81f6, 0x84b8, 0x857a, 0x873c, 0x86fe,
+-  0xa9c0, 0xa802, 0xaa44, 0xab86, 0xaec8, 0xaf0a, 0xad4c, 0xac8e,
+-  0xa7d0, 0xa612, 0xa454, 0xa596, 0xa0d8, 0xa11a, 0xa35c, 0xa29e,
+-  0xb5e0, 0xb422, 0xb664, 0xb7a6, 0xb2e8, 0xb32a, 0xb16c, 0xb0ae,
+-  0xbbf0, 0xba32, 0xb874, 0xb9b6, 0xbcf8, 0xbd3a, 0xbf7c, 0xbebe,
+-};
++static struct
++{
++  volatile u32 counter_head;
++  u32 cacheline_align[64 / 4 - 1];
++  u16 R[256];
++  volatile u32 counter_tail;
++} gcm_table ATTR_ALIGNED_64 =
++  {
++0,
++{ 0, },
++{
++  0x, 0x01c2, 0x0384, 0x0246, 0x0708, 0x06ca, 0x048c, 0x054e,
++  0x0e10, 0x0fd2, 0x0d94, 0x0c56, 0x0918, 0x08da, 0x0a9c, 0x0b5e,
++  0x1c20, 0x1de2, 0x1fa4, 0x1e66, 0x1b28, 0x1aea, 0x18ac, 0x196e,
++  

[OE-core] [PATCH] recipeutils-test: use a small dependency in the dummy recipe

2019-10-31 Thread Ross Burton
recipeutils-test has virtual/libx11 as a DEPENDS, but this will cause errors if
the recipe is built in an environment without x11 in DISTRO_FEATURES.

This dependency isn't actually used for anything so we could remove it, but to
save updating the test cases too just swap virtual/libx11 for zlib.

[ YOCTO #13611 ]

Signed-off-by: Ross Burton 
---
 meta-selftest/recipes-test/recipeutils/recipeutils-test_1.2.bb | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/meta-selftest/recipes-test/recipeutils/recipeutils-test_1.2.bb 
b/meta-selftest/recipes-test/recipeutils/recipeutils-test_1.2.bb
index 7c20d9a683e..0cd0494da8f 100644
--- a/meta-selftest/recipes-test/recipeutils/recipeutils-test_1.2.bb
+++ b/meta-selftest/recipes-test/recipeutils/recipeutils-test_1.2.bb
@@ -4,7 +4,7 @@ require recipeutils-test.inc
 
 LICENSE = "Proprietary"
 LIC_FILES_CHKSUM = 
"file://${WORKDIR}/somefile;md5=d41d8cd98f00b204e9800998ecf8427e"
-DEPENDS += "virtual/libx11"
+DEPENDS += "zlib"
 
 BBCLASSEXTEND = "native nativesdk"
 
-- 
2.20.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH] ofono: update to 1.31

2019-10-31 Thread Oleksandr Kravchuk
Changelog:
- Fix issue with handling CID 0 context identifier
- Fix issue with handling detach state and running LTE
- Fix issue with handling SIM states and Quectel modems

Signed-off-by: Oleksandr Kravchuk 
---
 .../ofono/{ofono_1.30.bb => ofono_1.31.bb}| 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)
 rename meta/recipes-connectivity/ofono/{ofono_1.30.bb => ofono_1.31.bb} (56%)

diff --git a/meta/recipes-connectivity/ofono/ofono_1.30.bb 
b/meta/recipes-connectivity/ofono/ofono_1.31.bb
similarity index 56%
rename from meta/recipes-connectivity/ofono/ofono_1.30.bb
rename to meta/recipes-connectivity/ofono/ofono_1.31.bb
index c916cb1b22..7869ac0cf7 100644
--- a/meta/recipes-connectivity/ofono/ofono_1.30.bb
+++ b/meta/recipes-connectivity/ofono/ofono_1.31.bb
@@ -5,5 +5,5 @@ SRC_URI  = "\
   file://ofono \
   file://0001-mbim-add-an-optional-TEMP_FAILURE_RETRY-macro-copy.patch \
 "
-SRC_URI[md5sum] = "2b1ce11a4db1f4b5c8cd96eb7e96ba0c"
-SRC_URI[sha256sum] = 
"8079735efc5d7f33be9e792e791f2f7ff75c31ce67d477b994673e32319eec5c"
+SRC_URI[md5sum] = "1c26340e3c6ed132cc812595081bb3dc"
+SRC_URI[sha256sum] = 
"a15c5d28096c10eb30e47a68b6dc2e7c4a5a99d7f4cfedf0b69624f33d859e9b"
-- 
2.17.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 2/2] selftest: add a test for gpl3-free images

2019-10-31 Thread Alexander Kanavin
Existing tests check that adding a specific gpl3 package (bash)
to core-image-minimal results in expected behaviour.

These tests check the ability to build two common images
without gpl3 components in them:

1. core-image-minimal needs no further tweaks and works
out of the box.

2. core-image-full-cmdline requires dropping the GNU packages
that it pulls in; for good measure this tweaked image is
verified with runtime tests.

These two tests allow dropping meta-gplv2 from being tested
on the autobuilder, however there should be a community consensus
first.

Signed-off-by: Alexander Kanavin 
---
 .../oeqa/selftest/cases/incompatible_lic.py| 18 ++
 1 file changed, 18 insertions(+)

diff --git a/meta/lib/oeqa/selftest/cases/incompatible_lic.py 
b/meta/lib/oeqa/selftest/cases/incompatible_lic.py
index 424a9e69c3e..904b5b4094a 100644
--- a/meta/lib/oeqa/selftest/cases/incompatible_lic.py
+++ b/meta/lib/oeqa/selftest/cases/incompatible_lic.py
@@ -73,3 +73,21 @@ INCOMPATIBLE_LICENSE_pn-core-image-minimal = "GPL-3.0 
LGPL-3.0"
 
 bitbake('core-image-minimal')
 
+class NoGPL3InImagesTests(OESelftestTestCase):
+def test_core_image_minimal(self):
+self.write_config("""
+INCOMPATIBLE_LICENSE_pn-core-image-minimal = "GPL-3.0 LGPL-3.0"
+""")
+bitbake('core-image-minimal')
+
+def test_core_image_full_cmdline(self):
+self.write_config("""
+INHERIT += "testimage"\n
+INCOMPATIBLE_LICENSE_pn-core-image-full-cmdline = "GPL-3.0 LGPL-3.0"\n
+RDEPENDS_packagegroup-core-full-cmdline-utils_remove = "bash bc coreutils cpio 
ed findutils gawk grep mc mc-fish mc-helpers mc-helpers-perl sed tar time"\n
+RDEPENDS_packagegroup-core-full-cmdline-dev-utils_remove = "diffutils m4 make 
patch"\n
+RDEPENDS_packagegroup-core-full-cmdline-multiuser_remove = "gzip"\n
+""")
+bitbake('core-image-full-cmdline')
+bitbake('-c testimage core-image-full-cmdline')
+
-- 
2.17.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 1/2] nfs-utils: do not depend on bash unnecessarily

2019-10-31 Thread Alexander Kanavin
Nothing in the target install actually needs it.

Signed-off-by: Alexander Kanavin 
---
 meta/recipes-connectivity/nfs-utils/nfs-utils_2.4.1.bb | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/meta/recipes-connectivity/nfs-utils/nfs-utils_2.4.1.bb 
b/meta/recipes-connectivity/nfs-utils/nfs-utils_2.4.1.bb
index 7e80354e4e7..eb32bccb57c 100644
--- a/meta/recipes-connectivity/nfs-utils/nfs-utils_2.4.1.bb
+++ b/meta/recipes-connectivity/nfs-utils/nfs-utils_2.4.1.bb
@@ -9,7 +9,7 @@ LIC_FILES_CHKSUM = 
"file://COPYING;md5=95f3a93a5c3c7888de623b46ea085a84"
 
 # util-linux for libblkid
 DEPENDS = "libcap libevent util-linux sqlite3 libtirpc"
-RDEPENDS_${PN} = "${PN}-client bash"
+RDEPENDS_${PN} = "${PN}-client"
 RRECOMMENDS_${PN} = "kernel-module-nfsd"
 
 inherit useradd
-- 
2.17.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


Re: [OE-core] [PATCH v4] coreutils: Move stdbuf into an own package coreutils-stdbuf

2019-10-31 Thread Adrian Bunk
On Wed, Oct 30, 2019 at 04:36:58PM -0400, Randy MacLeod wrote:
> On 10/28/19 6:13 PM, Adrian Bunk wrote:
> > This LD_PRELOAD trick is not really suitable for busybox,
> > so can be the only part of coreutils needed.
> 
> Which LD_PRELOAD trick?
> 
> Ah, I think you mean:
> 
>The coreutils implementation of stdbuf uses LD_PRELOAD [1]
>to dynamically load libstdbuf which calls setvbuf().
>This can't be implemented simply in busybox since it produces
>one or two statically linked executables. Therefore, stdbuf
>should be packaged separately.
> 
> [1]  ?? 
> http://git.savannah.gnu.org/gitweb/?p=coreutils.git;a=blob;f=src/stdbuf.c;h=7eaadb45fef8c01783eeb5c27853fafbcef34f1c;hb=HEAD#l188
> 
> Could you send a v5 for plebs like me?

Done.

> ../Randy

cu
Adrian

-- 

   "Is there not promise of rain?" Ling Tan asked suddenly out
of the darkness. There had been need of rain for many days.
   "Only a promise," Lao Er said.
   Pearl S. Buck - Dragon Seed

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH v5] coreutils: Move stdbuf into an own package coreutils-stdbuf

2019-10-31 Thread Adrian Bunk
The coreutils implementation of stdbuf uses LD_PRELOAD
to dynamically load libstdbuf which calls setvbuf().
This can't be implemented simply in busybox since it produces
one or two statically linked executables. Therefore, stdbuf
should be packaged separately for people who are using busybox
instead of coreutils for the other tools.

coreutils depends on the new package,
so nothing changes when installing coreutils.

Signed-off-by: Adrian Bunk 
---
 meta/recipes-core/coreutils/coreutils_8.31.bb | 6 +-
 1 file changed, 5 insertions(+), 1 deletion(-)

diff --git a/meta/recipes-core/coreutils/coreutils_8.31.bb 
b/meta/recipes-core/coreutils/coreutils_8.31.bb
index 4a74f619af..57b2c1bdba 100644
--- a/meta/recipes-core/coreutils/coreutils_8.31.bb
+++ b/meta/recipes-core/coreutils/coreutils_8.31.bb
@@ -49,7 +49,7 @@ bindir_progs = "arch basename chcon cksum comm csplit cut dir 
dircolors dirname
 env expand expr factor fmt fold groups head hostid id install \
 join link logname md5sum mkfifo nl nohup nproc od paste 
pathchk \
 pinky pr printf ptx readlink realpath runcon seq sha1sum 
sha224sum sha256sum \
-sha384sum sha512sum shred shuf sort split stdbuf sum tac tail 
tee test timeout \
+sha384sum sha512sum shred shuf sort split sum tac tail tee 
test timeout \
 tr truncate tsort tty unexpand uniq unlink uptime users vdir 
wc who whoami yes"
 
 # hostname gets a special treatment and is not included in this
@@ -58,6 +58,10 @@ base_bindir_progs = "cat chgrp chmod chown cp date dd echo 
false hostname kill l
 
 sbindir_progs= "chroot"
 
+PACKAGE_BEFORE_PN_class-target += "coreutils-stdbuf"
+FILES_coreutils-stdbuf = "${bindir}/stdbuf ${libdir}/coreutils/libstdbuf.so"
+RDEPENDS_coreutils_class-target += "coreutils-stdbuf"
+
 # Let aclocal use the relative path for the m4 file rather than the
 # absolute since coreutils has a lot of m4 files, otherwise there might
 # be an "Argument list too long" error when it is built in a long/deep
-- 
2.17.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


Re: [OE-core] [zeus 25/28] go: fix CVE-2019-16276

2019-10-31 Thread Martin Jansa
I'm sorry I was looking at wrong build before.

It doesn't happen in zeus and master. Only with warrior where this was
backported as well in:
"[OE-core] [warrior 18/19] go: fix CVE-2019-16276"

Probably because warrior is using older minor version of 1.12 go:
-GO_MINOR = ".1"
+GO_MINOR = ".9"


On Thu, Oct 31, 2019 at 12:49 PM Martin Jansa 
wrote:

> This seems to cause:
>
> ERROR: go-native-1.12.1-r0 do_patch: Fuzz detected:
>
> Applying patch
> 0001-release-branch.go1.12-security-net-textproto-don-t-n.patch
> patching file src/net/http/serve_test.go
> patching file src/net/http/transport_test.go
> Hunk #1 succeeded at 5059 with fuzz 2 (offset -74 lines).
> patching file src/net/textproto/reader.go
> patching file src/net/textproto/reader_test.go
>
> The context lines in the patches can be updated with devtool:
>
> devtool modify go-native
> devtool finish --force-patch-refresh go-native 
>
> Don't forget to review changes done by devtool!
>
> ERROR: go-native-1.12.1-r0 do_patch: QA Issue: Patch log indicates that
> patches do not apply cleanly. [patch-fuzz]
>
> and the same for go-cross and go-runtime.
>
> The version currently in master is the same, so I guess both are showing
> this QA issue.
>
> Regards,
>
> On Sat, Oct 26, 2019 at 8:54 AM Armin Kuster  wrote:
>
>> From: Chen Qi 
>>
>> Signed-off-by: Chen Qi 
>> Signed-off-by: Richard Purdie 
>> (cherry picked from commit e31f87e289dfd3bbca961e927447a9c7ba816d3f)
>> Signed-off-by: Armin Kuster 
>> ---
>>  meta/recipes-devtools/go/go-1.12.inc   |   1 +
>>  ...nch.go1.12-security-net-textproto-don-t-n.patch | 163
>> +
>>  2 files changed, 164 insertions(+)
>>  create mode 100644
>> meta/recipes-devtools/go/go-1.12/0001-release-branch.go1.12-security-net-textproto-don-t-n.patch
>>
>> diff --git a/meta/recipes-devtools/go/go-1.12.inc
>> b/meta/recipes-devtools/go/go-1.12.inc
>> index 39157ff..ed14b17 100644
>> --- a/meta/recipes-devtools/go/go-1.12.inc
>> +++ b/meta/recipes-devtools/go/go-1.12.inc
>> @@ -16,6 +16,7 @@ SRC_URI += "\
>>  file://0006-cmd-dist-separate-host-and-target-builds.patch \
>>  file://0007-cmd-go-make-GOROOT-precious-by-default.patch \
>>  file://0008-use-GOBUILDMODE-to-set-buildmode.patch \
>> +
>> file://0001-release-branch.go1.12-security-net-textproto-don-t-n.patch \
>>  "
>>  SRC_URI_append_libc-musl = "
>> file://0009-ld-replace-glibc-dynamic-linker-with-musl.patch"
>>
>> diff --git
>> a/meta/recipes-devtools/go/go-1.12/0001-release-branch.go1.12-security-net-textproto-don-t-n.patch
>> b/meta/recipes-devtools/go/go-1.12/0001-release-branch.go1.12-security-net-textproto-don-t-n.patch
>> new file mode 100644
>> index 000..7b39dbd
>> --- /dev/null
>> +++
>> b/meta/recipes-devtools/go/go-1.12/0001-release-branch.go1.12-security-net-textproto-don-t-n.patch
>> @@ -0,0 +1,163 @@
>> +From 265b691ac440bfb711d8de323346f7d72e620efe Mon Sep 17 00:00:00 2001
>> +From: Filippo Valsorda 
>> +Date: Thu, 12 Sep 2019 12:37:36 -0400
>> +Subject: [PATCH] [release-branch.go1.12-security] net/textproto: don't
>> + normalize headers with spaces before the colon
>> +
>> +RFC 7230 is clear about headers with a space before the colon, like
>> +
>> +X-Answer : 42
>> +
>> +being invalid, but we've been accepting and normalizing them for
>> compatibility
>> +purposes since CL 5690059 in 2012.
>> +
>> +On the client side, this is harmless and indeed most browsers behave the
>> same
>> +to this day. On the server side, this becomes a security issue when the
>> +behavior doesn't match that of a reverse proxy sitting in front of the
>> server.
>> +
>> +For example, if a WAF accepts them without normalizing them, it might be
>> +possible to bypass its filters, because the Go server would interpret the
>> +header differently. Worse, if the reverse proxy coalesces requests onto a
>> +single HTTP/1.1 connection to a Go server, the understanding of the
>> request
>> +boundaries can get out of sync between them, allowing an attacker to
>> tack an
>> +arbitrary method and path onto a request by other clients, including
>> +authentication headers unknown to the attacker.
>> +
>> +This was recently presented at multiple security conferences:
>> +
>> https://portswigger.net/blog/http-desync-attacks-request-smuggling-reborn
>> +
>> +net/http servers already reject header keys with invalid characters.
>> +Simply stop normalizing extra spaces in net/textproto, let it return them
>> +unchanged like it does for other invalid headers, and let net/http
>> enforce
>> +RFC 7230, which is HTTP specific. This loses us normalization on the
>> client
>> +side, but there's no right answer on the client side anyway, and hiding
>> the
>> +issue sounds worse than letting the application decide.
>> +
>> +Fixes CVE-2019-16276
>> +
>> +Change-Id: I6d272de827e0870da85d93df770d6a0e161bbcf1
>> +Reviewed-on:
>> https://team-review.git.corp.google.com/c/golang/go-private/+/549719
>> +Reviewed-by
>> 

Re: [OE-core] [zeus 25/28] go: fix CVE-2019-16276

2019-10-31 Thread Martin Jansa
This seems to cause:

ERROR: go-native-1.12.1-r0 do_patch: Fuzz detected:

Applying patch
0001-release-branch.go1.12-security-net-textproto-don-t-n.patch
patching file src/net/http/serve_test.go
patching file src/net/http/transport_test.go
Hunk #1 succeeded at 5059 with fuzz 2 (offset -74 lines).
patching file src/net/textproto/reader.go
patching file src/net/textproto/reader_test.go

The context lines in the patches can be updated with devtool:

devtool modify go-native
devtool finish --force-patch-refresh go-native 

Don't forget to review changes done by devtool!

ERROR: go-native-1.12.1-r0 do_patch: QA Issue: Patch log indicates that
patches do not apply cleanly. [patch-fuzz]

and the same for go-cross and go-runtime.

The version currently in master is the same, so I guess both are showing
this QA issue.

Regards,

On Sat, Oct 26, 2019 at 8:54 AM Armin Kuster  wrote:

> From: Chen Qi 
>
> Signed-off-by: Chen Qi 
> Signed-off-by: Richard Purdie 
> (cherry picked from commit e31f87e289dfd3bbca961e927447a9c7ba816d3f)
> Signed-off-by: Armin Kuster 
> ---
>  meta/recipes-devtools/go/go-1.12.inc   |   1 +
>  ...nch.go1.12-security-net-textproto-don-t-n.patch | 163
> +
>  2 files changed, 164 insertions(+)
>  create mode 100644
> meta/recipes-devtools/go/go-1.12/0001-release-branch.go1.12-security-net-textproto-don-t-n.patch
>
> diff --git a/meta/recipes-devtools/go/go-1.12.inc
> b/meta/recipes-devtools/go/go-1.12.inc
> index 39157ff..ed14b17 100644
> --- a/meta/recipes-devtools/go/go-1.12.inc
> +++ b/meta/recipes-devtools/go/go-1.12.inc
> @@ -16,6 +16,7 @@ SRC_URI += "\
>  file://0006-cmd-dist-separate-host-and-target-builds.patch \
>  file://0007-cmd-go-make-GOROOT-precious-by-default.patch \
>  file://0008-use-GOBUILDMODE-to-set-buildmode.patch \
> +
> file://0001-release-branch.go1.12-security-net-textproto-don-t-n.patch \
>  "
>  SRC_URI_append_libc-musl = "
> file://0009-ld-replace-glibc-dynamic-linker-with-musl.patch"
>
> diff --git
> a/meta/recipes-devtools/go/go-1.12/0001-release-branch.go1.12-security-net-textproto-don-t-n.patch
> b/meta/recipes-devtools/go/go-1.12/0001-release-branch.go1.12-security-net-textproto-don-t-n.patch
> new file mode 100644
> index 000..7b39dbd
> --- /dev/null
> +++
> b/meta/recipes-devtools/go/go-1.12/0001-release-branch.go1.12-security-net-textproto-don-t-n.patch
> @@ -0,0 +1,163 @@
> +From 265b691ac440bfb711d8de323346f7d72e620efe Mon Sep 17 00:00:00 2001
> +From: Filippo Valsorda 
> +Date: Thu, 12 Sep 2019 12:37:36 -0400
> +Subject: [PATCH] [release-branch.go1.12-security] net/textproto: don't
> + normalize headers with spaces before the colon
> +
> +RFC 7230 is clear about headers with a space before the colon, like
> +
> +X-Answer : 42
> +
> +being invalid, but we've been accepting and normalizing them for
> compatibility
> +purposes since CL 5690059 in 2012.
> +
> +On the client side, this is harmless and indeed most browsers behave the
> same
> +to this day. On the server side, this becomes a security issue when the
> +behavior doesn't match that of a reverse proxy sitting in front of the
> server.
> +
> +For example, if a WAF accepts them without normalizing them, it might be
> +possible to bypass its filters, because the Go server would interpret the
> +header differently. Worse, if the reverse proxy coalesces requests onto a
> +single HTTP/1.1 connection to a Go server, the understanding of the
> request
> +boundaries can get out of sync between them, allowing an attacker to tack
> an
> +arbitrary method and path onto a request by other clients, including
> +authentication headers unknown to the attacker.
> +
> +This was recently presented at multiple security conferences:
> +https://portswigger.net/blog/http-desync-attacks-request-smuggling-reborn
> +
> +net/http servers already reject header keys with invalid characters.
> +Simply stop normalizing extra spaces in net/textproto, let it return them
> +unchanged like it does for other invalid headers, and let net/http enforce
> +RFC 7230, which is HTTP specific. This loses us normalization on the
> client
> +side, but there's no right answer on the client side anyway, and hiding
> the
> +issue sounds worse than letting the application decide.
> +
> +Fixes CVE-2019-16276
> +
> +Change-Id: I6d272de827e0870da85d93df770d6a0e161bbcf1
> +Reviewed-on:
> https://team-review.git.corp.google.com/c/golang/go-private/+/549719
> +Reviewed-by
> :
> Brad Fitzpatrick 
> +(cherry picked from commit 1280b868e82bf173ea3e988be3092d160ee66082)
> +Reviewed-on:
> https://team-review.git.corp.google.com/c/golang/go-private/+/558776
> +Reviewed-by
> :
> Dmitri Shuralyov 
> +
> +CVE: CVE-2019-16276
> +
> +Upstream-Status: Backport [
> https://github.com/golang/go/commit/6e6f4aaf70c8b1cc81e65a26332aa9409de03ad8
> ]
> +
> 

Re: [OE-core] [PATCH] gdb: Fix CVE-2019-1010180

2019-10-31 Thread Ross Burton

On 31/10/2019 10:23, Vinay Kumar wrote:

Backport the upstream fix. that was not present in master.

Signed-off-by: Vinay Kumar 

Upstream-Status: Pending


As per patchtest:

- the commit message shoud have your S-o-b
- the patch you're adding (CVE-2019-1010180.patch) should have an 
explanation of the changes, a CVE tag (CVE: CVE-2019-1010180), an 
Upstream-Status tag (you said its a backport, so set it to Backport), 
and your S-o-b.


Note that for sanity its probably best to remove the Changelog chunk 
from the patch, as other backported patches which also touch the 
changelog will conflict.


Ross
--
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] ✗ patchtest: failure for gcr: remove intltool-native (rev2)

2019-10-31 Thread Patchwork
== Series Details ==

Series: gcr: remove intltool-native (rev2)
Revision: 2
URL   : https://patchwork.openembedded.org/series/20734/
State : failure

== Summary ==


Thank you for submitting this patch series to OpenEmbedded Core. This is
an automated response. Several tests have been executed on the proposed
series by patchtest resulting in the following failures:



* Issue Series does not apply on top of target branch 
[test_series_merge_on_head] 
  Suggested fixRebase your series on top of targeted branch
  Targeted branch  master (currently at b91b30c09f)



If you believe any of these test results are incorrect, please reply to the
mailing list (openembedded-core@lists.openembedded.org) raising your concerns.
Otherwise we would appreciate you correcting the issues and submitting a new
version of the patchset if applicable. Please ensure you add/increment the
version number when sending the new version (i.e. [PATCH] -> [PATCH v2] ->
[PATCH v3] -> ...).

---
Guidelines: 
https://www.openembedded.org/wiki/Commit_Patch_Message_Guidelines
Test framework: http://git.yoctoproject.org/cgit/cgit.cgi/patchtest
Test suite: http://git.yoctoproject.org/cgit/cgit.cgi/patchtest-oe

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 1/2] git: some tools are no longer perl, so move to main recipe

2019-10-31 Thread Ross Burton
Some tools are not written in Perl anymore, so they should be in PN no 
PN-perltools.

Signed-off-by: Ross Burton 
---
 meta/recipes-devtools/git/git.inc | 6 +-
 1 file changed, 1 insertion(+), 5 deletions(-)

diff --git a/meta/recipes-devtools/git/git.inc 
b/meta/recipes-devtools/git/git.inc
index 6e137432f0a..67fc96b7aff 100644
--- a/meta/recipes-devtools/git/git.inc
+++ b/meta/recipes-devtools/git/git.inc
@@ -94,19 +94,15 @@ do_install_append_class-nativesdk() {
 FILES_${PN} += "${datadir}/git-core ${libexecdir}/git-core/"
 
 PERLTOOLS = " \
+${bindir}/git-cvsserver \
 ${libexecdir}/git-core/git-add--interactive \
 ${libexecdir}/git-core/git-archimport \
 ${libexecdir}/git-core/git-cvsexportcommit \
 ${libexecdir}/git-core/git-cvsimport \
 ${libexecdir}/git-core/git-cvsserver \
-${bindir}/git-cvsserver \
-${libexecdir}/git-core/git-difftool \
 ${libexecdir}/git-core/git-send-email \
 ${libexecdir}/git-core/git-svn \
 ${libexecdir}/git-core/git-instaweb \
-${libexecdir}/git-core/git-submodule \
-${libexecdir}/git-core/git-am \
-${libexecdir}/git-core/git-request-pull \
 ${datadir}/gitweb/gitweb.cgi \
 ${datadir}/git-core/templates/hooks/prepare-commit-msg.sample \
 ${datadir}/git-core/templates/hooks/pre-rebase.sample \
-- 
2.20.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


Re: [OE-core] [PATCH] linux-dummy: Add package kernel

2019-10-31 Thread Bruce Ashfield
On Thu, Oct 31, 2019 at 6:20 AM  wrote:
>
> From: He Zhe 
>
> Some package like packagegroup-core-boot may ask for package kernel. Let
> linux-dummy rprovide package kernel to fix the following build failure.
>
> ERROR: Nothing RPROVIDES 'kernel' (but
> .../meta/recipes-core/packagegroups/packagegroup-core-boot.bb RDEPENDS on or
> otherwise requires it)

Can you expand on what the higher level use case is that something is
using packagegroup-core-boot (or whatever), but also linux-dummy ?

It seems like this is going to hide misconfigurations .. since you may
want something bootable, but yet are not properly configured.

If there's part of that packagroup you need, why not split it up,
rather than masking the symptom seen here ?

Bruce

>
> Signed-off-by: He Zhe 
> ---
>  meta/recipes-kernel/linux/linux-dummy.bb | 7 +--
>  1 file changed, 5 insertions(+), 2 deletions(-)
>
> diff --git a/meta/recipes-kernel/linux/linux-dummy.bb 
> b/meta/recipes-kernel/linux/linux-dummy.bb
> index 62cf6f5ea6..20d7ed815d 100644
> --- a/meta/recipes-kernel/linux/linux-dummy.bb
> +++ b/meta/recipes-kernel/linux/linux-dummy.bb
> @@ -8,19 +8,22 @@ LICENSE = "GPLv2"
>  LIC_FILES_CHKSUM = 
> "file://${WORKDIR}/COPYING.GPL;md5=751419260aa954499f7abaabaa882bbe"
>
>  PROVIDES += "virtual/kernel"
> +RPROVIDES_${PN} += "kernel lib32-kernel"
>
>  PACKAGES_DYNAMIC += "^kernel-module-.*"
>  PACKAGES_DYNAMIC += "^kernel-image-.*"
>  PACKAGES_DYNAMIC += "^kernel-firmware-.*"
>
> -PACKAGES += "kernel-modules kernel-vmlinux"
> +PACKAGES += "kernel-modules kernel-vmlinux kernel"
>  FILES_kernel-modules = ""
>  ALLOW_EMPTY_kernel-modules = "1"
>  DESCRIPTION_kernel-modules = "Kernel modules meta package"
>  FILES_kernel-vmlinux = ""
>  ALLOW_EMPTY_kernel-vmlinux = "1"
>  DESCRIPTION_kernel-vmlinux = "Kernel vmlinux meta package"
> -
> +FILES_kernel = ""
> +ALLOW_EMPTY_kernel = "1"
> +DESCRIPTION_kernel = "Kernel meta package"
>
>  INHIBIT_DEFAULT_DEPS = "1"
>
> --
> 2.17.1
>
> --
> ___
> Openembedded-core mailing list
> Openembedded-core@lists.openembedded.org
> http://lists.openembedded.org/mailman/listinfo/openembedded-core



-- 
- Thou shalt not follow the NULL pointer, for chaos and madness await
thee at its end
- "Use the force Harry" - Gandalf, Star Trek II
-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 2/2] git: cleanup man install

2019-10-31 Thread Ross Burton
Prettify by using shell loops.

Signed-off-by: Ross Burton 
---
 meta/recipes-devtools/git/git.inc | 12 ++--
 1 file changed, 6 insertions(+), 6 deletions(-)

diff --git a/meta/recipes-devtools/git/git.inc 
b/meta/recipes-devtools/git/git.inc
index 67fc96b7aff..95ab397f6af 100644
--- a/meta/recipes-devtools/git/git.inc
+++ b/meta/recipes-devtools/git/git.inc
@@ -39,12 +39,12 @@ do_compile_prepend () {
 do_install () {
oe_runmake install DESTDIR="${D}" bindir=${bindir} \
template_dir=${datadir}/git-core/templates
-   install -d ${D}/${mandir}/man1
-   install -d ${D}/${mandir}/man5
-   install -d ${D}/${mandir}/man7
-   install -t ${D}/${mandir}/man1 ${WORKDIR}/man1/*
-   install -t ${D}/${mandir}/man5 ${WORKDIR}/man5/*
-   install -t ${D}/${mandir}/man7 ${WORKDIR}/man7/*
+
+   for section in man1 man5 man7; do
+   install -d ${D}/${mandir}/$section
+   install -t ${D}/${mandir}/$section ${WORKDIR}/$section/*
+   done
+
install -d ${D}/${datadir}/bash-completion/completions/
install -m 644 ${S}/contrib/completion/git-completion.bash 
${D}/${datadir}/bash-completion/completions/git
 }
-- 
2.20.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 3/7] qemu-helper-native: pass compiler flags

2019-10-31 Thread Ross Burton
Pass all of the compiler and linker flags so the build is correctly configured.

Signed-off-by: Ross Burton 
---
 meta/recipes-devtools/qemu/qemu-helper-native_1.0.bb | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/meta/recipes-devtools/qemu/qemu-helper-native_1.0.bb 
b/meta/recipes-devtools/qemu/qemu-helper-native_1.0.bb
index d9d9da0fade..372eebd8864 100644
--- a/meta/recipes-devtools/qemu/qemu-helper-native_1.0.bb
+++ b/meta/recipes-devtools/qemu/qemu-helper-native_1.0.bb
@@ -12,7 +12,7 @@ S = "${WORKDIR}"
 inherit native
 
 do_compile() {
-   ${CC} tunctl.c -o tunctl
+   ${CC} ${CFLAGS} ${LDFLAGS} -Wall tunctl.c -o tunctl
 }
 
 do_install() {
-- 
2.20.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 2/7] qemu-helper-native: showing help shouldn't be an error

2019-10-31 Thread Ross Burton
Displaying a help message if help was requested isn't an error.

Signed-off-by: Ross Burton 
---
 meta/recipes-devtools/qemu/qemu-helper/tunctl.c | 14 --
 1 file changed, 8 insertions(+), 6 deletions(-)

diff --git a/meta/recipes-devtools/qemu/qemu-helper/tunctl.c 
b/meta/recipes-devtools/qemu/qemu-helper/tunctl.c
index fc00e997891..d745dd06cb4 100644
--- a/meta/recipes-devtools/qemu/qemu-helper/tunctl.c
+++ b/meta/recipes-devtools/qemu/qemu-helper/tunctl.c
@@ -19,7 +19,7 @@
 #define TUNSETGROUP   _IOW('T', 206, int)
 #endif
 
-static void Usage(char *name)
+static void Usage(char *name, int status)
 {
   fprintf(stderr, "Create: %s [-b] [-u owner] [-g group] [-t device-name] "
  "[-f tun-clone-device]\n", name);
@@ -28,7 +28,7 @@ static void Usage(char *name)
   fprintf(stderr, "The default tun clone device is /dev/net/tun - some systems"
  " use\n/dev/misc/net/tun instead\n\n");
   fprintf(stderr, "-b will result in brief output (just the device name)\n");
-  exit(1);
+  exit(status);
 }
 
 int main(int argc, char **argv)
@@ -63,7 +63,7 @@ int main(int argc, char **argv)
if(*end != '\0'){
  fprintf(stderr, "'%s' is neither a username nor a numeric uid.\n",
  optarg);
- Usage(name);
+ Usage(name, 1);
}
 break;
   case 'g':
@@ -76,7 +76,7 @@ int main(int argc, char **argv)
if(*end != '\0'){
  fprintf(stderr, "'%s' is neither a groupname nor a numeric group.\n",
  optarg);
- Usage(name);
+ Usage(name, 1);
}
 break;
 
@@ -84,8 +84,10 @@ int main(int argc, char **argv)
 tun = optarg;
 break;
   case 'h':
+Usage(name, 0);
+break;
   default:
-Usage(name);
+Usage(name, 1);
 }
   }
 
@@ -93,7 +95,7 @@ int main(int argc, char **argv)
   argc -= optind;
 
   if(argc > 0)
-Usage(name);
+Usage(name, 1);
 
   if((tap_fd = open(file, O_RDWR)) < 0){
 fprintf(stderr, "Failed to open '%s' : ", file);
-- 
2.20.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 7/7] wpa-supplicant: fix CVE-2019-16275

2019-10-31 Thread Ross Burton
Signed-off-by: Ross Burton 
---
 ...re-management-frame-from-unexpected-.patch | 82 +++
 .../wpa-supplicant/wpa-supplicant_2.9.bb  |  1 +
 2 files changed, 83 insertions(+)
 create mode 100644 
meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/0001-AP-Silently-ignore-management-frame-from-unexpected-.patch

diff --git 
a/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/0001-AP-Silently-ignore-management-frame-from-unexpected-.patch
 
b/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/0001-AP-Silently-ignore-management-frame-from-unexpected-.patch
new file mode 100644
index 000..7b0713cf6d7
--- /dev/null
+++ 
b/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/0001-AP-Silently-ignore-management-frame-from-unexpected-.patch
@@ -0,0 +1,82 @@
+hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect 
indication
+of disconnection in certain situations because source address validation is
+mishandled. This is a denial of service that should have been prevented by PMF
+(aka management frame protection). The attacker must send a crafted 802.11 
frame
+from a location that is within the 802.11 communications range.
+
+CVE: CVE-2019-16275
+Upstream-Status: Backport
+Signed-off-by: Ross Burton 
+
+From 8c07fa9eda13e835f3f968b2e1c9a8be3a851ff9 Mon Sep 17 00:00:00 2001
+From: Jouni Malinen 
+Date: Thu, 29 Aug 2019 11:52:04 +0300
+Subject: [PATCH] AP: Silently ignore management frame from unexpected source
+ address
+
+Do not process any received Management frames with unexpected/invalid SA
+so that we do not add any state for unexpected STA addresses or end up
+sending out frames to unexpected destination. This prevents unexpected
+sequences where an unprotected frame might end up causing the AP to send
+out a response to another device and that other device processing the
+unexpected response.
+
+In particular, this prevents some potential denial of service cases
+where the unexpected response frame from the AP might result in a
+connected station dropping its association.
+
+Signed-off-by: Jouni Malinen 
+---
+ src/ap/drv_callbacks.c | 13 +
+ src/ap/ieee802_11.c| 12 
+ 2 files changed, 25 insertions(+)
+
+diff --git a/src/ap/drv_callbacks.c b/src/ap/drv_callbacks.c
+index 31587685fe3b..34ca379edc3d 100644
+--- a/src/ap/drv_callbacks.c
 b/src/ap/drv_callbacks.c
+@@ -131,6 +131,19 @@ int hostapd_notif_assoc(struct hostapd_data *hapd, const 
u8 *addr,
+  "hostapd_notif_assoc: Skip event with no address");
+   return -1;
+   }
++
++  if (is_multicast_ether_addr(addr) ||
++  is_zero_ether_addr(addr) ||
++  os_memcmp(addr, hapd->own_addr, ETH_ALEN) == 0) {
++  /* Do not process any frames with unexpected/invalid SA so that
++   * we do not add any state for unexpected STA addresses or end
++   * up sending out frames to unexpected destination. */
++  wpa_printf(MSG_DEBUG, "%s: Invalid SA=" MACSTR
++ " in received indication - ignore this indication 
silently",
++ __func__, MAC2STR(addr));
++  return 0;
++  }
++
+   random_add_randomness(addr, ETH_ALEN);
+ 
+   hostapd_logger(hapd, addr, HOSTAPD_MODULE_IEEE80211,
+diff --git a/src/ap/ieee802_11.c b/src/ap/ieee802_11.c
+index c85a28db44b7..e7065372e158 100644
+--- a/src/ap/ieee802_11.c
 b/src/ap/ieee802_11.c
+@@ -4626,6 +4626,18 @@ int ieee802_11_mgmt(struct hostapd_data *hapd, const u8 
*buf, size_t len,
+   fc = le_to_host16(mgmt->frame_control);
+   stype = WLAN_FC_GET_STYPE(fc);
+ 
++  if (is_multicast_ether_addr(mgmt->sa) ||
++  is_zero_ether_addr(mgmt->sa) ||
++  os_memcmp(mgmt->sa, hapd->own_addr, ETH_ALEN) == 0) {
++  /* Do not process any frames with unexpected/invalid SA so that
++   * we do not add any state for unexpected STA addresses or end
++   * up sending out frames to unexpected destination. */
++  wpa_printf(MSG_DEBUG, "MGMT: Invalid SA=" MACSTR
++ " in received frame - ignore this frame silently",
++ MAC2STR(mgmt->sa));
++  return 0;
++  }
++
+   if (stype == WLAN_FC_STYPE_BEACON) {
+   handle_beacon(hapd, mgmt, len, fi);
+   return 1;
+-- 
+2.20.1
diff --git a/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.9.bb 
b/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.9.bb
index ad9e6ea4be1..3e92427bb0b 100644
--- a/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.9.bb
+++ b/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.9.bb
@@ -25,6 +25,7 @@ SRC_URI = "http://w1.fi/releases/wpa_supplicant-${PV}.tar.gz  
\
file://wpa_supplicant.conf-sane \
file://99_wpa_supplicant \
file://0001-replace-systemd-install-Alias-with-WantedBy.patch \
+

[OE-core] [PATCH] gcr: remove intltool-native

2019-10-31 Thread Ross Burton
gcr uses gettext now, so no need to depend on intltool-native.

Signed-off-by: Ross Burton 
---
 meta/recipes-gnome/gcr/gcr_3.34.0.bb | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/meta/recipes-gnome/gcr/gcr_3.34.0.bb 
b/meta/recipes-gnome/gcr/gcr_3.34.0.bb
index f13bfecbe19..616b0e5bf5d 100644
--- a/meta/recipes-gnome/gcr/gcr_3.34.0.bb
+++ b/meta/recipes-gnome/gcr/gcr_3.34.0.bb
@@ -8,7 +8,7 @@ BUGTRACKER = "https://gitlab.gnome.org/GNOME/gcr/issues;
 LICENSE = "GPLv2"
 LIC_FILES_CHKSUM = "file://COPYING;md5=55ca817ccb7d5b5b66355690e9abc605"
 
-DEPENDS = "intltool-native gtk+3 p11-kit glib-2.0 libgcrypt \
+DEPENDS = "gtk+3 p11-kit glib-2.0 libgcrypt \
${@bb.utils.contains('GI_DATA_ENABLED', 'True', 'libxslt-native', 
'', d)}"
 
 inherit gnomebase gtk-icon-cache gtk-doc distro_features_check 
upstream-version-is-even vala gobject-introspection gettext
-- 
2.20.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 6/7] squashfs-tools: clean up compile/install tasks

2019-10-31 Thread Ross Burton
The makefile can do the right thing now.

Signed-off-by: Ross Burton 
---
 .../recipes-devtools/squashfs-tools/squashfs-tools_git.bb | 8 +++-
 1 file changed, 3 insertions(+), 5 deletions(-)

diff --git a/meta/recipes-devtools/squashfs-tools/squashfs-tools_git.bb 
b/meta/recipes-devtools/squashfs-tools/squashfs-tools_git.bb
index 0e1be6bc1ff..4fd33f80482 100644
--- a/meta/recipes-devtools/squashfs-tools/squashfs-tools_git.bb
+++ b/meta/recipes-devtools/squashfs-tools/squashfs-tools_git.bb
@@ -28,13 +28,11 @@ PACKAGECONFIG[zstd] = "ZSTD_SUPPORT=1,ZSTD_SUPPORT=0,zstd"
 PACKAGECONFIG[reproducible] = "REPRODUCIBLE_DEFAULT=1,REPRODUCIBLE_DEFAULT=0,"
 
 do_compile() {
-   oe_runmake mksquashfs unsquashfs
+   oe_runmake all
 }
 
-do_install () {
-   install -d ${D}${sbindir}
-   install -m 0755 mksquashfs ${D}${sbindir}/
-   install -m 0755 unsquashfs ${D}${sbindir}/
+do_install() {
+   oe_runmake install INSTALL_DIR=${D}${sbindir}
 }
 
 ARM_INSTRUCTION_SET_armv4 = "arm"
-- 
2.20.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 5/7] squashfs-tools: remove redundant source checksums

2019-10-31 Thread Ross Burton
oe-core e37a1ecc stopped downloading a LZMA tarball, but the checksums were not
removed at the same time.

Signed-off-by: Ross Burton 
---
 meta/recipes-devtools/squashfs-tools/squashfs-tools_git.bb | 2 --
 1 file changed, 2 deletions(-)

diff --git a/meta/recipes-devtools/squashfs-tools/squashfs-tools_git.bb 
b/meta/recipes-devtools/squashfs-tools/squashfs-tools_git.bb
index 53d37872710..0e1be6bc1ff 100644
--- a/meta/recipes-devtools/squashfs-tools/squashfs-tools_git.bb
+++ b/meta/recipes-devtools/squashfs-tools/squashfs-tools_git.bb
@@ -9,8 +9,6 @@ PV = "4.4"
 SRCREV = "52eb4c279cd283ed9802dd1ceb686560b22ffb67"
 SRC_URI = "git://github.com/plougher/squashfs-tools.git;protocol=https \
 "
-SRC_URI[lzma.md5sum] = "29d5ffd03a5a3e51aef6a74e9eafb759"
-SRC_URI[lzma.sha256sum] = 
"c935fd04dd8e0e8c688a3078f3675d699679a90be81c12686837e0880aa0fa1e"
 
 S = "${WORKDIR}/git/squashfs-tools"
 
-- 
2.20.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 1/7] qemu-helper-native: add missing option to getopt() call

2019-10-31 Thread Ross Burton
Noticed by -Wall.

Signed-off-by: Ross Burton 
---
 meta/recipes-devtools/qemu/qemu-helper/tunctl.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/meta/recipes-devtools/qemu/qemu-helper/tunctl.c 
b/meta/recipes-devtools/qemu/qemu-helper/tunctl.c
index 16e24a2add6..fc00e997891 100644
--- a/meta/recipes-devtools/qemu/qemu-helper/tunctl.c
+++ b/meta/recipes-devtools/qemu/qemu-helper/tunctl.c
@@ -41,7 +41,7 @@ int main(int argc, char **argv)
   int tap_fd, opt, delete = 0, brief = 0;
   char *tun = "", *file = "/dev/net/tun", *name = argv[0], *end;
 
-  while((opt = getopt(argc, argv, "bd:f:t:u:g:")) > 0){
+  while((opt = getopt(argc, argv, "bd:f:t:u:g:h")) > 0){
 switch(opt) {
   case 'b':
 brief = 1;
-- 
2.20.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH] cve-check: ensure all known CVEs are in the report

2019-10-31 Thread Ross Burton
CVEs that are whitelisted or were not vulnerable when there are version
comparisons were not included in the report, so alter the logic to ensure that
all relevant CVEs are in the report for completeness.

Signed-off-by: Ross Burton 
---
 meta/classes/cve-check.bbclass | 9 +++--
 1 file changed, 7 insertions(+), 2 deletions(-)

diff --git a/meta/classes/cve-check.bbclass b/meta/classes/cve-check.bbclass
index c00d2910be1..f87bcc9dc61 100644
--- a/meta/classes/cve-check.bbclass
+++ b/meta/classes/cve-check.bbclass
@@ -208,12 +208,14 @@ def check_cves(d, patched_cves):
 
 if cve in cve_whitelist:
 bb.note("%s-%s has been whitelisted for %s" % (product, pv, 
cve))
+# TODO: this should be in the report as 'whitelisted'
+patched_cves.add(cve)
 elif cve in patched_cves:
 bb.note("%s has been patched" % (cve))
 else:
 to_append = False
 if (operator_start == '=' and pv == version_start):
-cves_unpatched.append(cve)
+to_append = True
 else:
 if operator_start:
 try:
@@ -243,8 +245,11 @@ def check_cves(d, patched_cves):
 to_append = to_append_start or to_append_end
 
 if to_append:
+bb.note("%s-%s is vulnerable to %s" % (product, pv, cve))
 cves_unpatched.append(cve)
-bb.debug(2, "%s-%s is not patched for %s" % (product, pv, cve))
+else:
+bb.note("%s-%s is not vulnerable to %s" % (product, pv, 
cve))
+patched_cves.add(cve)
 conn.close()
 
 return (list(patched_cves), cves_unpatched)
-- 
2.20.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 4/7] oeqa/selftest: add test for oe-run-native

2019-10-31 Thread Ross Burton
A small test to verify that oe-run-native is correctly working.

Signed-off-by: Ross Burton 
---
 meta/lib/oeqa/selftest/cases/oescripts.py | 6 ++
 1 file changed, 6 insertions(+)

diff --git a/meta/lib/oeqa/selftest/cases/oescripts.py 
b/meta/lib/oeqa/selftest/cases/oescripts.py
index c169885cf32..80d8b2c4cca 100644
--- a/meta/lib/oeqa/selftest/cases/oescripts.py
+++ b/meta/lib/oeqa/selftest/cases/oescripts.py
@@ -121,3 +121,9 @@ class OEGitproxyTests(OESelftestTestCase):
 if dash is None:
 self.skipTest("No \"dash\" found on test system.")
 self.run_oegitproxy(custom_shell=dash)
+
+class OeRunNativeTest(OESelftestTestCase):
+def test_oe_run_native(self):
+bitbake("qemu-helper-native -c addto_recipe_sysroot")
+result = runCmd("oe-run-native qemu-helper-native tunctl -h")
+self.assertIn("Delete: tunctl -d device-name [-f tun-clone-device]", 
result.output)
-- 
2.20.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] ✗ patchtest: failure for gdb: Fix CVE-2019-1010180

2019-10-31 Thread Patchwork
== Series Details ==

Series: gdb: Fix CVE-2019-1010180
Revision: 1
URL   : https://patchwork.openembedded.org/series/20820/
State : failure

== Summary ==


Thank you for submitting this patch series to OpenEmbedded Core. This is
an automated response. Several tests have been executed on the proposed
series by patchtest resulting in the following failures:



* Patchgdb: Fix CVE-2019-1010180
 Issue Missing or incorrectly formatted CVE tag in included patch 
file [test_cve_tag_format] 
  Suggested fixCorrect or include the CVE tag on cve patch with format: 
"CVE: CVE--"

* Issue A patch file has been added, but does not have a 
Signed-off-by tag [test_signed_off_by_presence] 
  Suggested fixSign off the added patch file 
(meta/recipes-devtools/gdb/gdb/CVE-2019-1010180.patch)

* Issue Added patch file is missing Upstream-Status in the header 
[test_upstream_status_presence_format] 
  Suggested fixAdd Upstream-Status:  to the header of 
meta/recipes-devtools/gdb/gdb/CVE-2019-1010180.patch
  Standard format  Upstream-Status: 
  Valid status Pending, Accepted, Backport, Denied, Inappropriate [reason], 
Submitted [where]



If you believe any of these test results are incorrect, please reply to the
mailing list (openembedded-core@lists.openembedded.org) raising your concerns.
Otherwise we would appreciate you correcting the issues and submitting a new
version of the patchset if applicable. Please ensure you add/increment the
version number when sending the new version (i.e. [PATCH] -> [PATCH v2] ->
[PATCH v3] -> ...).

---
Guidelines: 
https://www.openembedded.org/wiki/Commit_Patch_Message_Guidelines
Test framework: http://git.yoctoproject.org/cgit/cgit.cgi/patchtest
Test suite: http://git.yoctoproject.org/cgit/cgit.cgi/patchtest-oe

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH] gdb: Fix CVE-2019-1010180

2019-10-31 Thread Vinay Kumar
Backport the upstream fix. that was not present in master.

Signed-off-by: Vinay Kumar 

Upstream-Status: Pending
---
 meta/recipes-devtools/gdb/gdb-8.3.1.inc|  1 +
 .../gdb/gdb/CVE-2019-1010180.patch | 34 ++
 2 files changed, 35 insertions(+)
 create mode 100644 meta/recipes-devtools/gdb/gdb/CVE-2019-1010180.patch

diff --git a/meta/recipes-devtools/gdb/gdb-8.3.1.inc 
b/meta/recipes-devtools/gdb/gdb-8.3.1.inc
index 39f1c48..aec913f 100644
--- a/meta/recipes-devtools/gdb/gdb-8.3.1.inc
+++ b/meta/recipes-devtools/gdb/gdb-8.3.1.inc
@@ -16,6 +16,7 @@ SRC_URI = "${GNU_MIRROR}/gdb/gdb-${PV}.tar.xz \
file://0009-Change-order-of-CFLAGS.patch \
file://0010-resolve-restrict-keyword-conflict.patch \
file://0011-Fix-invalid-sigprocmask-call.patch \
+   file://CVE-2019-1010180.patch \
"
 SRC_URI[md5sum] = "73b6a5d8141672c62bf851cd34c4aa83"
 SRC_URI[sha256sum] = 
"1e55b4d7cdca7b34be12f4ceae651623aa73b2fd640152313f9f66a7149757c4"
diff --git a/meta/recipes-devtools/gdb/gdb/CVE-2019-1010180.patch 
b/meta/recipes-devtools/gdb/gdb/CVE-2019-1010180.patch
new file mode 100644
index 000..6e52024
--- /dev/null
+++ b/meta/recipes-devtools/gdb/gdb/CVE-2019-1010180.patch
@@ -0,0 +1,34 @@
+diff --git a/gdb/ChangeLog b/gdb/ChangeLog
+index 961a2e2..1dfb0cb 100644
+--- a/gdb/ChangeLog
 b/gdb/ChangeLog
+@@ -1,3 +1,9 @@
++2019-10-16  Keith Seitz  
++
++  PR gdb/23567
++  * dwarf2read.c (dwarf2_per_objfile::locate_sections): Discard
++  sections whose size is greater than the file size.
++
+ 2019-09-20  Joel Brobecker  
+ 
+   * version.in: Set GDB version number to 8.3.1.
+diff --git a/gdb/dwarf2read.c b/gdb/dwarf2read.c
+index 4251ed0..fafdb89 100644
+--- a/gdb/dwarf2read.c
 b/gdb/dwarf2read.c
+@@ -2378,6 +2378,15 @@ dwarf2_per_objfile::locate_sections (bfd *abfd, 
asection *sectp,
+   if ((aflag & SEC_HAS_CONTENTS) == 0)
+ {
+ }
++  else if (elf_section_data (sectp)->this_hdr.sh_size
++ > bfd_get_file_size (abfd))
++{
++  bfd_size_type size = elf_section_data (sectp)->this_hdr.sh_size;
++  warning (_("Discarding section %s which has a section size (%s"
++   ") larger than the file size [in module %s]"),
++ bfd_section_name (abfd, sectp), phex_nz (size, sizeof (size)),
++ bfd_get_filename (abfd));
++}
+   else if (section_is_p (sectp->name, ))
+ {
+   this->info.s.section = sectp;
-- 
2.7.4

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH] linux-dummy: Add package kernel

2019-10-31 Thread zhe.he
From: He Zhe 

Some package like packagegroup-core-boot may ask for package kernel. Let
linux-dummy rprovide package kernel to fix the following build failure.

ERROR: Nothing RPROVIDES 'kernel' (but
.../meta/recipes-core/packagegroups/packagegroup-core-boot.bb RDEPENDS on or
otherwise requires it)

Signed-off-by: He Zhe 
---
 meta/recipes-kernel/linux/linux-dummy.bb | 7 +--
 1 file changed, 5 insertions(+), 2 deletions(-)

diff --git a/meta/recipes-kernel/linux/linux-dummy.bb 
b/meta/recipes-kernel/linux/linux-dummy.bb
index 62cf6f5ea6..20d7ed815d 100644
--- a/meta/recipes-kernel/linux/linux-dummy.bb
+++ b/meta/recipes-kernel/linux/linux-dummy.bb
@@ -8,19 +8,22 @@ LICENSE = "GPLv2"
 LIC_FILES_CHKSUM = 
"file://${WORKDIR}/COPYING.GPL;md5=751419260aa954499f7abaabaa882bbe"
 
 PROVIDES += "virtual/kernel"
+RPROVIDES_${PN} += "kernel lib32-kernel"
 
 PACKAGES_DYNAMIC += "^kernel-module-.*"
 PACKAGES_DYNAMIC += "^kernel-image-.*"
 PACKAGES_DYNAMIC += "^kernel-firmware-.*"
 
-PACKAGES += "kernel-modules kernel-vmlinux"
+PACKAGES += "kernel-modules kernel-vmlinux kernel"
 FILES_kernel-modules = ""
 ALLOW_EMPTY_kernel-modules = "1"
 DESCRIPTION_kernel-modules = "Kernel modules meta package"
 FILES_kernel-vmlinux = ""
 ALLOW_EMPTY_kernel-vmlinux = "1"
 DESCRIPTION_kernel-vmlinux = "Kernel vmlinux meta package"
-
+FILES_kernel = ""
+ALLOW_EMPTY_kernel = "1"
+DESCRIPTION_kernel = "Kernel meta package"
 
 INHIBIT_DEFAULT_DEPS = "1"
 
-- 
2.17.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


Re: [OE-core] [PATCH 4/6] gcr: update to 3.34.0

2019-10-31 Thread Andreas Müller
On Thu, Oct 31, 2019 at 10:58 AM Alexander Kanavin
 wrote:
>
> I think Ross has a separate patch queued to address that.
>
> Alex
Yes - just thought is is a complete V2 -> everything fine :)

Andreas
-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


Re: [OE-core] [PATCH 4/6] gcr: update to 3.34.0

2019-10-31 Thread Alexander Kanavin
I think Ross has a separate patch queued to address that.

Alex

On Thu, 31 Oct 2019 at 10:56, Andreas Müller 
wrote:

> On Thu, Oct 31, 2019 at 10:38 AM Alexander Kanavin
>  wrote:
> >
> > inherit gettext, as gcr is now gettextized.
> >
> > Signed-off-by: Alexander Kanavin 
> > ---
> >  meta/recipes-gnome/gcr/{gcr_3.28.1.bb => gcr_3.34.0.bb} | 6 +++---
> >  1 file changed, 3 insertions(+), 3 deletions(-)
> >  rename meta/recipes-gnome/gcr/{gcr_3.28.1.bb => gcr_3.34.0.bb} (83%)
> >
> > diff --git a/meta/recipes-gnome/gcr/gcr_3.28.1.bb
> b/meta/recipes-gnome/gcr/gcr_3.34.0.bb
> > similarity index 83%
> > rename from meta/recipes-gnome/gcr/gcr_3.28.1.bb
> > rename to meta/recipes-gnome/gcr/gcr_3.34.0.bb
> > index 0a9867451ee..f13bfecbe19 100644
> > --- a/meta/recipes-gnome/gcr/gcr_3.28.1.bb
> > +++ b/meta/recipes-gnome/gcr/gcr_3.34.0.bb
> > @@ -11,12 +11,12 @@ LIC_FILES_CHKSUM =
> "file://COPYING;md5=55ca817ccb7d5b5b66355690e9abc605"
> >  DEPENDS = "intltool-native gtk+3 p11-kit glib-2.0 libgcrypt \
> > ${@bb.utils.contains('GI_DATA_ENABLED', 'True',
> 'libxslt-native', '', d)}"
> Don't know if this is a complete V2. If so intltool-native dependency
> can go (as Ross suggested).
>
> Andreas
>
-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


Re: [OE-core] [PATCH 4/6] gcr: update to 3.34.0

2019-10-31 Thread Andreas Müller
On Thu, Oct 31, 2019 at 10:38 AM Alexander Kanavin
 wrote:
>
> inherit gettext, as gcr is now gettextized.
>
> Signed-off-by: Alexander Kanavin 
> ---
>  meta/recipes-gnome/gcr/{gcr_3.28.1.bb => gcr_3.34.0.bb} | 6 +++---
>  1 file changed, 3 insertions(+), 3 deletions(-)
>  rename meta/recipes-gnome/gcr/{gcr_3.28.1.bb => gcr_3.34.0.bb} (83%)
>
> diff --git a/meta/recipes-gnome/gcr/gcr_3.28.1.bb 
> b/meta/recipes-gnome/gcr/gcr_3.34.0.bb
> similarity index 83%
> rename from meta/recipes-gnome/gcr/gcr_3.28.1.bb
> rename to meta/recipes-gnome/gcr/gcr_3.34.0.bb
> index 0a9867451ee..f13bfecbe19 100644
> --- a/meta/recipes-gnome/gcr/gcr_3.28.1.bb
> +++ b/meta/recipes-gnome/gcr/gcr_3.34.0.bb
> @@ -11,12 +11,12 @@ LIC_FILES_CHKSUM = 
> "file://COPYING;md5=55ca817ccb7d5b5b66355690e9abc605"
>  DEPENDS = "intltool-native gtk+3 p11-kit glib-2.0 libgcrypt \
> ${@bb.utils.contains('GI_DATA_ENABLED', 'True', 'libxslt-native', 
> '', d)}"
Don't know if this is a complete V2. If so intltool-native dependency
can go (as Ross suggested).

Andreas
-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 6/6] libmodulemd-v1: update to 1.8.16

2019-10-31 Thread Alexander Kanavin
Upstream added support for optional docs, so
0001-Do-not-generate-gtkdoc-or-python-bindings.patch is replaced
with an option to disable gtk-doc (as the modulemd feature is not used
in oe-core anyway).

Signed-off-by: Alexander Kanavin 
---
 ...t-generate-gtkdoc-or-python-bindings.patch | 60 ---
 .../libmodulemd/libmodulemd-v1_git.bb |  7 +--
 2 files changed, 3 insertions(+), 64 deletions(-)
 delete mode 100644 
meta/recipes-devtools/libmodulemd/libmodulemd-v1/0001-Do-not-generate-gtkdoc-or-python-bindings.patch

diff --git 
a/meta/recipes-devtools/libmodulemd/libmodulemd-v1/0001-Do-not-generate-gtkdoc-or-python-bindings.patch
 
b/meta/recipes-devtools/libmodulemd/libmodulemd-v1/0001-Do-not-generate-gtkdoc-or-python-bindings.patch
deleted file mode 100644
index d950ad5867e..000
--- 
a/meta/recipes-devtools/libmodulemd/libmodulemd-v1/0001-Do-not-generate-gtkdoc-or-python-bindings.patch
+++ /dev/null
@@ -1,60 +0,0 @@
-From 71c51206e037c0bb5759e01b307b7ce1d5934703 Mon Sep 17 00:00:00 2001
-From: Alexander Kanavin 
-Date: Fri, 6 Sep 2019 17:07:00 +0200
-Subject: [PATCH] Do not generate gtkdoc or python bindings
-
-All of these really need a configuration option.
-
-Upstream-Status: Inappropriate [oe-core specific]
-Signed-off-by: Alexander Kanavin 

- meson.build  | 12 
- modulemd/meson.build |  8 
- 2 files changed, 20 deletions(-)
-
-diff --git a/meson.build b/meson.build
-index 155c9e7..fe35d5e 100644
 a/meson.build
-+++ b/meson.build
-@@ -51,25 +51,13 @@ gnome = import('gnome')
- pkg = import('pkgconfig')
- gobject = dependency('gobject-2.0')
- yaml = dependency('yaml-0.1')
--gtkdoc = dependency('gtk-doc')
- 
- glib_prefix = dependency('glib-2.0').get_pkgconfig_variable('prefix')
--glib_docpath = join_paths(glib_prefix, 'share', 'gtk-doc', 'html')
- 
- sh = find_program('sh')
- sed = find_program('sed')
- test = find_program('test')
- 
--ret = run_command ([test, '-e', join_paths(glib_docpath, 'glib/index.html')])
--if ret.returncode() != 0
--  error('Missing documentation for GLib.')
--endif
--
--ret = run_command ([test, '-e', join_paths(glib_docpath, 
'gobject/index.html')])
--if ret.returncode() != 0
--  error('Missing documentation for GObject.')
--endif
--
- python_name = get_option('python_name')
- 
- if python_name != ''
-diff --git a/modulemd/meson.build b/modulemd/meson.build
-index 9a164b5..349c982 100644
 a/modulemd/meson.build
-+++ b/modulemd/meson.build
-@@ -523,11 +523,3 @@ configure_file(
-   configuration : xcdata
- )
- 
--gnome.gtkdoc(
--'modulemd-1.0',
--install_dir: 'modulemd-1.0',
--src_dir : './modulemd',
--main_xml : 'modulemd-docs.xml',
--install : true,
--)
--
diff --git a/meta/recipes-devtools/libmodulemd/libmodulemd-v1_git.bb 
b/meta/recipes-devtools/libmodulemd/libmodulemd-v1_git.bb
index 9790470f4fe..5409051d79f 100644
--- a/meta/recipes-devtools/libmodulemd/libmodulemd-v1_git.bb
+++ b/meta/recipes-devtools/libmodulemd/libmodulemd-v1_git.bb
@@ -4,18 +4,17 @@ LIC_FILES_CHKSUM = 
"file://COPYING;md5=25a3927bff3ee4f5b21bcb0ed3fcd6bb"
 
 SRC_URI = 
"git://github.com/fedora-modularity/libmodulemd;protocol=https;branch=1.x-maint 
\
file://0001-spec_tmpl.sh-use-bin-sh-not-usr-bin-sh.patch \
-   file://0001-Do-not-generate-gtkdoc-or-python-bindings.patch \
"
 
-PV = "1.8.15"
-SRCREV = "2d461725f781c6fdcf32893d8dcfa40bcef8dda5"
+PV = "1.8.16"
+SRCREV = "d0dcf7b373b3cf85cd39eb3bc23d31e06195a75a"
 UPSTREAM_CHECK_GITTAGREGEX = "libmodulemd-(?P1.*\d)"
 
 S = "${WORKDIR}/git"
 
 inherit meson gobject-introspection
 
-EXTRA_OEMESON = "-Ddeveloper_build=false"
+EXTRA_OEMESON = "-Ddeveloper_build=false -Dwith_docs=false"
 
 DEPENDS += "glib-2.0 libyaml glib-2.0-native python3"
 
-- 
2.17.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 3/6] oe-selftest: extend virgl gtk test to also check the SDL option

2019-10-31 Thread Alexander Kanavin
Signed-off-by: Alexander Kanavin 
---
 meta/lib/oeqa/selftest/cases/runtime_test.py | 17 +
 1 file changed, 13 insertions(+), 4 deletions(-)

diff --git a/meta/lib/oeqa/selftest/cases/runtime_test.py 
b/meta/lib/oeqa/selftest/cases/runtime_test.py
index 7d3922ce448..3632ae81ede 100644
--- a/meta/lib/oeqa/selftest/cases/runtime_test.py
+++ b/meta/lib/oeqa/selftest/cases/runtime_test.py
@@ -166,9 +166,9 @@ class TestImage(OESelftestTestCase):
 bitbake('core-image-full-cmdline socat')
 bitbake('-c testimage core-image-full-cmdline')
 
-def test_testimage_virgl_gtk(self):
+def test_testimage_virgl_gtk_sdl(self):
 """
-Summary: Check host-assisted accelerate OpenGL functionality in qemu 
with gtk frontend
+Summary: Check host-assisted accelerate OpenGL functionality in qemu 
with gtk and SDL frontends
 Expected: 1. Check that virgl kernel driver is loaded and 3d 
acceleration is enabled
   2. Check that kmscube demo runs without crashing.
 Product: oe-core
@@ -183,18 +183,27 @@ class TestImage(OESelftestTestCase):
 self.skipTest('virgl isn\'t working with Centos 7')
 
 qemu_packageconfig = get_bb_var('PACKAGECONFIG', 'qemu-system-native')
+sdl_packageconfig = get_bb_var('PACKAGECONFIG', 'libsdl2-native')
 features = 'INHERIT += "testimage"\n'
 if 'gtk+' not in qemu_packageconfig:
 features += 'PACKAGECONFIG_append_pn-qemu-system-native = " 
gtk+"\n'
+if 'sdl' not in qemu_packageconfig:
+features += 'PACKAGECONFIG_append_pn-qemu-system-native = " sdl"\n'
 if 'virglrenderer' not in qemu_packageconfig:
 features += 'PACKAGECONFIG_append_pn-qemu-system-native = " 
virglrenderer"\n'
 if 'glx' not in qemu_packageconfig:
 features += 'PACKAGECONFIG_append_pn-qemu-system-native = " glx"\n'
+if 'opengl' not in sdl_packageconfig:
+features += 'PACKAGECONFIG_append_pn-libsdl2-native = " opengl"\n'
 features += 'TEST_SUITES = "ping ssh virgl"\n'
 features += 'IMAGE_FEATURES_append = " ssh-server-dropbear"\n'
 features += 'IMAGE_INSTALL_append = " kmscube"\n'
-features += 'TEST_RUNQEMUPARAMS = "gtk gl"\n'
-self.write_config(features)
+features_gtk = features + 'TEST_RUNQEMUPARAMS = "gtk gl"\n'
+self.write_config(features_gtk)
+bitbake('core-image-minimal')
+bitbake('-c testimage core-image-minimal')
+features_sdl = features + 'TEST_RUNQEMUPARAMS = "sdl gl"\n'
+self.write_config(features_sdl)
 bitbake('core-image-minimal')
 bitbake('-c testimage core-image-minimal')
 
-- 
2.17.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 5/6] btrfs-tools: update to 5.3

2019-10-31 Thread Alexander Kanavin
Signed-off-by: Alexander Kanavin 
---
 .../btrfs-tools/{btrfs-tools_5.2.2.bb => btrfs-tools_5.3.bb}| 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)
 rename meta/recipes-devtools/btrfs-tools/{btrfs-tools_5.2.2.bb => 
btrfs-tools_5.3.bb} (97%)

diff --git a/meta/recipes-devtools/btrfs-tools/btrfs-tools_5.2.2.bb 
b/meta/recipes-devtools/btrfs-tools/btrfs-tools_5.3.bb
similarity index 97%
rename from meta/recipes-devtools/btrfs-tools/btrfs-tools_5.2.2.bb
rename to meta/recipes-devtools/btrfs-tools/btrfs-tools_5.3.bb
index 6b73c01dccb..12b5c4562dc 100644
--- a/meta/recipes-devtools/btrfs-tools/btrfs-tools_5.2.2.bb
+++ b/meta/recipes-devtools/btrfs-tools/btrfs-tools_5.3.bb
@@ -14,7 +14,7 @@ DEPENDS = "util-linux attr e2fsprogs lzo acl"
 DEPENDS_append_class-target = " udev"
 RDEPENDS_${PN} = "libgcc"
 
-SRCREV = "55a8c9626fb906c20c3206f8fd39b9a8fb259b79"
+SRCREV = "de7856cee5907938441f765ebab7cc106b7faf70"
 SRC_URI = "git://git.kernel.org/pub/scm/linux/kernel/git/kdave/btrfs-progs.git 
\

file://0001-Add-a-possibility-to-specify-where-python-modules-ar.patch \
"
-- 
2.17.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 2/6] selftest: skip virgl test on centos 7 entirely

2019-10-31 Thread Alexander Kanavin
With the sdl frontend, qemu isn't able to even boot fully,
so let's skip the test early.

Signed-off-by: Alexander Kanavin 
---
 meta-selftest/lib/oeqa/runtime/cases/virgl.py | 5 -
 meta/lib/oeqa/selftest/cases/runtime_test.py  | 2 ++
 2 files changed, 2 insertions(+), 5 deletions(-)

diff --git a/meta-selftest/lib/oeqa/runtime/cases/virgl.py 
b/meta-selftest/lib/oeqa/runtime/cases/virgl.py
index d301a19fa42..c0abfd1b161 100644
--- a/meta-selftest/lib/oeqa/runtime/cases/virgl.py
+++ b/meta-selftest/lib/oeqa/runtime/cases/virgl.py
@@ -13,11 +13,6 @@ class VirglTest(OERuntimeTestCase):
 
 @OETestDepends(['virgl.VirglTest.test_kernel_driver'])
 def test_kmscube(self):
-
-distro = oe.lsb.distro_identifier()
-if distro and distro == 'centos-7':
-self.skipTest('kmscube is not working when centos 7 is the host 
OS')
-
 status, output = self.target.run('kmscube', timeout=30)
 self.assertEqual(status, 0, "kmscube exited with non-zero status %d 
and output:\n%s" %(status, output))
 self.assertIn('renderer: "virgl"', output, "kmscube does not seem to 
use virgl:\n%s" %(output))
diff --git a/meta/lib/oeqa/selftest/cases/runtime_test.py 
b/meta/lib/oeqa/selftest/cases/runtime_test.py
index 3f212bd0eac..7d3922ce448 100644
--- a/meta/lib/oeqa/selftest/cases/runtime_test.py
+++ b/meta/lib/oeqa/selftest/cases/runtime_test.py
@@ -179,6 +179,8 @@ class TestImage(OESelftestTestCase):
 distro = oe.lsb.distro_identifier()
 if distro and distro == 'debian-8':
 self.skipTest('virgl isn\'t working with Debian 8')
+if distro and distro == 'centos-7':
+self.skipTest('virgl isn\'t working with Centos 7')
 
 qemu_packageconfig = get_bb_var('PACKAGECONFIG', 'qemu-system-native')
 features = 'INHERIT += "testimage"\n'
-- 
2.17.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 4/6] gcr: update to 3.34.0

2019-10-31 Thread Alexander Kanavin
inherit gettext, as gcr is now gettextized.

Signed-off-by: Alexander Kanavin 
---
 meta/recipes-gnome/gcr/{gcr_3.28.1.bb => gcr_3.34.0.bb} | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)
 rename meta/recipes-gnome/gcr/{gcr_3.28.1.bb => gcr_3.34.0.bb} (83%)

diff --git a/meta/recipes-gnome/gcr/gcr_3.28.1.bb 
b/meta/recipes-gnome/gcr/gcr_3.34.0.bb
similarity index 83%
rename from meta/recipes-gnome/gcr/gcr_3.28.1.bb
rename to meta/recipes-gnome/gcr/gcr_3.34.0.bb
index 0a9867451ee..f13bfecbe19 100644
--- a/meta/recipes-gnome/gcr/gcr_3.28.1.bb
+++ b/meta/recipes-gnome/gcr/gcr_3.34.0.bb
@@ -11,12 +11,12 @@ LIC_FILES_CHKSUM = 
"file://COPYING;md5=55ca817ccb7d5b5b66355690e9abc605"
 DEPENDS = "intltool-native gtk+3 p11-kit glib-2.0 libgcrypt \
${@bb.utils.contains('GI_DATA_ENABLED', 'True', 'libxslt-native', 
'', d)}"
 
-inherit gnomebase gtk-icon-cache gtk-doc distro_features_check 
upstream-version-is-even vala gobject-introspection
+inherit gnomebase gtk-icon-cache gtk-doc distro_features_check 
upstream-version-is-even vala gobject-introspection gettext
 # depends on gtk+3, but also x11 through gtk+-x11
 REQUIRED_DISTRO_FEATURES = "x11"
 
-SRC_URI[archive.md5sum] = "afd88cacfd54c1ac5b3e0eb35e3aa674"
-SRC_URI[archive.sha256sum] = 
"95204aa2111c301778ebfbe60975ce3ed698c958430ffcc2a785ac5e593d168b"
+SRC_URI[archive.md5sum] = "4af28919fb1dd36d93603e8230283b6f"
+SRC_URI[archive.sha256sum] = 
"29df50974a90987af694c0fb8926a6b366e68cacd8abd813817cfe1eb5d54524"
 
 FILES_${PN} += " \
 ${datadir}/dbus-1 \
-- 
2.17.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH 1/6] runqemu: add options that enable virgl with the SDL frontend

2019-10-31 Thread Alexander Kanavin
Signed-off-by: Alexander Kanavin 
---
 scripts/runqemu | 13 +
 1 file changed, 9 insertions(+), 4 deletions(-)

diff --git a/scripts/runqemu b/scripts/runqemu
index a05facd0db6..5c56c3fe6c1 100755
--- a/scripts/runqemu
+++ b/scripts/runqemu
@@ -67,9 +67,9 @@ of the following environment variables (in any order):
 nographic - disable video console
 sdl - choose the SDL UI frontend
 gtk - choose the Gtk UI frontend
-gl - enable virgl-based GL acceleration (also needs gtk option)
-gl-es - enable virgl-based GL acceleration, using OpenGL ES (also needs 
gtk option)
-egl-headless - enable headless EGL output; use vnc or spice to see it
+gl - enable virgl-based GL acceleration (also needs gtk or sdl options)
+gl-es - enable virgl-based GL acceleration, using OpenGL ES (also needs 
gtk or sdl options)
+egl-headless - enable headless EGL output; use vnc (via publicvnc option) 
or spice to see it
 serial - enable a serial console on /dev/ttyS0
 serialstdio - enable a serial console on the console (regardless of 
graphics mode)
 slirp - enable user networking, no root privileges is required
@@ -437,7 +437,12 @@ class BaseConfig(object):
 self.qemu_opt_script += ' -nographic'
 self.kernel_cmdline_script += ' console=ttyS0'
 elif arg == 'sdl':
-self.qemu_opt_script += ' -display sdl'
+if 'gl' in sys.argv[1:]:
+self.qemu_opt_script += ' -vga virtio -display sdl,gl=on'
+elif 'gl-es' in sys.argv[1:]:
+self.qemu_opt_script += ' -vga virtio -display sdl,gl=es'
+else:
+self.qemu_opt_script += ' -display sdl'
 elif arg == 'gtk':
 if 'gl' in sys.argv[1:]:
 self.qemu_opt_script += ' -vga virtio -display gtk,gl=on'
-- 
2.17.1

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] ✗ patchtest: failure for Backport the upstream fix. that was not present in master.

2019-10-31 Thread Patchwork
== Series Details ==

Series: Backport the upstream fix. that was not present in master.
Revision: 1
URL   : https://patchwork.openembedded.org/series/20815/
State : failure

== Summary ==


Thank you for submitting this patch series to OpenEmbedded Core. This is
an automated response. Several tests have been executed on the proposed
series by patchtest resulting in the following failures:



* PatchBackport the upstream fix. that was not present in master.
 Issue Shortlog does not follow expected format 
[test_shortlog_format] 
  Suggested fixCommit shortlog (first line of commit message) should follow 
the format ": "

* Issue A patch file has been added, but does not have a 
Signed-off-by tag [test_signed_off_by_presence] 
  Suggested fixSign off the added patch file 
(meta/recipes-devtools/gdb/gdb/CVE-2019-1010180.patch)

* Issue Added patch file is missing Upstream-Status in the header 
[test_upstream_status_presence_format] 
  Suggested fixAdd Upstream-Status:  to the header of 
meta/recipes-devtools/gdb/gdb/CVE-2019-1010180.patch
  Standard format  Upstream-Status: 
  Valid status Pending, Accepted, Backport, Denied, Inappropriate [reason], 
Submitted [where]



If you believe any of these test results are incorrect, please reply to the
mailing list (openembedded-core@lists.openembedded.org) raising your concerns.
Otherwise we would appreciate you correcting the issues and submitting a new
version of the patchset if applicable. Please ensure you add/increment the
version number when sending the new version (i.e. [PATCH] -> [PATCH v2] ->
[PATCH v3] -> ...).

---
Guidelines: 
https://www.openembedded.org/wiki/Commit_Patch_Message_Guidelines
Test framework: http://git.yoctoproject.org/cgit/cgit.cgi/patchtest
Test suite: http://git.yoctoproject.org/cgit/cgit.cgi/patchtest-oe

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


Re: [OE-core] [PATCH 2/5] oe-selftest: extend virgl gtk test to also check the SDL option

2019-10-31 Thread Alexander Kanavin
On Thu, 31 Oct 2019 at 00:14, Ross Burton  wrote:

>
>
> https://autobuilder.yoctoproject.org/typhoon/#/builders/56/builds/771/steps/8/logs/step2d
>
> Centos 7 worker, if that matters.
>

Thanks, I think it does matter. Virgl tests are already partly disabled for
centos 7 (they are not running kmscube with the gtk frontend), and it seems
that with the sdl frontend it fails even before kmscube is executed. I
guess I should disable them altogether on that (ancient) distro.

Alex
-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] [PATCH] Backport the upstream fix. that was not present in master.

2019-10-31 Thread Vinay Kumar
Signed-off-by: Vinay Kumar 
---
 meta/recipes-devtools/gdb/gdb-8.3.1.inc|  1 +
 .../gdb/gdb/CVE-2019-1010180.patch | 34 ++
 2 files changed, 35 insertions(+)
 create mode 100644 meta/recipes-devtools/gdb/gdb/CVE-2019-1010180.patch

diff --git a/meta/recipes-devtools/gdb/gdb-8.3.1.inc 
b/meta/recipes-devtools/gdb/gdb-8.3.1.inc
index 39f1c48..aec913f 100644
--- a/meta/recipes-devtools/gdb/gdb-8.3.1.inc
+++ b/meta/recipes-devtools/gdb/gdb-8.3.1.inc
@@ -16,6 +16,7 @@ SRC_URI = "${GNU_MIRROR}/gdb/gdb-${PV}.tar.xz \
file://0009-Change-order-of-CFLAGS.patch \
file://0010-resolve-restrict-keyword-conflict.patch \
file://0011-Fix-invalid-sigprocmask-call.patch \
+   file://CVE-2019-1010180.patch \
"
 SRC_URI[md5sum] = "73b6a5d8141672c62bf851cd34c4aa83"
 SRC_URI[sha256sum] = 
"1e55b4d7cdca7b34be12f4ceae651623aa73b2fd640152313f9f66a7149757c4"
diff --git a/meta/recipes-devtools/gdb/gdb/CVE-2019-1010180.patch 
b/meta/recipes-devtools/gdb/gdb/CVE-2019-1010180.patch
new file mode 100644
index 000..6e52024
--- /dev/null
+++ b/meta/recipes-devtools/gdb/gdb/CVE-2019-1010180.patch
@@ -0,0 +1,34 @@
+diff --git a/gdb/ChangeLog b/gdb/ChangeLog
+index 961a2e2..1dfb0cb 100644
+--- a/gdb/ChangeLog
 b/gdb/ChangeLog
+@@ -1,3 +1,9 @@
++2019-10-16  Keith Seitz  
++
++  PR gdb/23567
++  * dwarf2read.c (dwarf2_per_objfile::locate_sections): Discard
++  sections whose size is greater than the file size.
++
+ 2019-09-20  Joel Brobecker  
+ 
+   * version.in: Set GDB version number to 8.3.1.
+diff --git a/gdb/dwarf2read.c b/gdb/dwarf2read.c
+index 4251ed0..fafdb89 100644
+--- a/gdb/dwarf2read.c
 b/gdb/dwarf2read.c
+@@ -2378,6 +2378,15 @@ dwarf2_per_objfile::locate_sections (bfd *abfd, 
asection *sectp,
+   if ((aflag & SEC_HAS_CONTENTS) == 0)
+ {
+ }
++  else if (elf_section_data (sectp)->this_hdr.sh_size
++ > bfd_get_file_size (abfd))
++{
++  bfd_size_type size = elf_section_data (sectp)->this_hdr.sh_size;
++  warning (_("Discarding section %s which has a section size (%s"
++   ") larger than the file size [in module %s]"),
++ bfd_section_name (abfd, sectp), phex_nz (size, sizeof (size)),
++ bfd_get_filename (abfd));
++}
+   else if (section_is_p (sectp->name, ))
+ {
+   this->info.s.section = sectp;
-- 
2.7.4

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core