Re: [OE-core] [hardknott][PATCH] mklibs: remove recipes and class

2021-11-14 Thread Jacob Kroon

On 11/15/21 01:59, Khem Raj wrote:

On Sun, Nov 14, 2021 at 11:47 AM Jacob Kroon  wrote:


On 11/14/21 20:36, Richard Purdie wrote:

On Sun, 2021-11-14 at 07:50 +0100, Jacob Kroon wrote:

From: Alexander Kanavin 

This is not enabled or tested by default, and has never been
ported to python 3 upstream[1], which means it doesn't work at all
with plain poky. If you need it, please put it in a separate layer
and/or modernize to work with py3.

https://salsa.debian.org/installer-team/mklibs/-/blob/master/src/mklibs

Signed-off-by: Alexander Kanavin 
Signed-off-by: Jacob Kroon 
Signed-off-by: Richard Purdie 
(cherry picked from commit 908df863b419d1cad7317153101fc827e7e3a354)


What issue is it causing in hardknott? Normally we don't backport invasive
changes like that...



The problem is that mklibs-native doesn't build with gcc 11, and
"image-mklibs" was in USER_CLASSES by default in hardknott.

I sent a patch to fix mklibs build here:

https://lists.openembedded.org/g/openembedded-core/message/151982


This fix is correct and it is trivial. We can apply it



but after some discussions we just decided to drop mklibs support
entirely with the proposed patch.


Was there any other reason ?



To have it successfully build (with mklibs actually enabled by putting 
your image in MKLIBS_OPTIMIZED_IMAGES) would require additional fixes, 
including updating mklibs to python3 I believe.


/Jacob

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#158275): 
https://lists.openembedded.org/g/openembedded-core/message/158275
Mute This Topic: https://lists.openembedded.org/mt/87042685/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



Re: [OE-core] linux-firmware: discrepancy around the brcmfmac/cyfmac43430

2021-11-14 Thread Awais Belal
Ping!


BR,
Awais

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#158274): 
https://lists.openembedded.org/g/openembedded-core/message/158274
Mute This Topic: https://lists.openembedded.org/mt/86989608/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



Re: [OE-core] [PATCH 05/24] xserver-xorg: convert from autotools to meson

2021-11-14 Thread Zoltan Boszormenyi via lists.openembedded.org

2021. 11. 10. 20:39 keltezéssel, Alexander Kanavin írta:

Not every option was carried over, drop them accordingly.

Signed-off-by: Alexander Kanavin 
---
  .../xorg-xserver/xserver-xorg.inc | 55 ---
  1 file changed, 22 insertions(+), 33 deletions(-)

diff --git a/meta/recipes-graphics/xorg-xserver/xserver-xorg.inc 
b/meta/recipes-graphics/xorg-xserver/xserver-xorg.inc
index 6a5f274046..4a7048aced 100644
--- a/meta/recipes-graphics/xorg-xserver/xserver-xorg.inc
+++ b/meta/recipes-graphics/xorg-xserver/xserver-xorg.inc
@@ -23,7 +23,7 @@ CVE_PRODUCT = "xorg-server"
  
  S = "${WORKDIR}/${XORG_PN}-${PV}"
  
-inherit autotools pkgconfig

+inherit meson pkgconfig
  
  inherit features_check

  REQUIRED_DISTRO_FEATURES = "x11"
@@ -105,50 +105,39 @@ FILES:${PN}-module-libxf1bpp = 
"${libdir}/xorg/modules/libxf1bpp.so"
  FILES:${PN}-module-libxf4bpp = "${libdir}/xorg/modules/libxf4bpp.so"
  FILES:xf86-video-modesetting = 
"${libdir}/xorg/modules/drivers/modesetting_drv.so"
  
-EXTRA_OECONF += "--with-fop=no \

- --with-pic \
- --disable-static \
- --disable-record \
- --disable-xnest \
- --enable-xvfb \
- --enable-composite \
- --without-dtrace \
- --with-int10=x86emu \
- --sysconfdir=/etc/X11 \
- --localstatedir=/var \
- --with-xkb-output=/var/lib/xkb \
+EXTRA_OEMESON += " \
+ -Dxnest=false \
+ -Dxvfb=true \
+ -Ddtrace=false \
+ -Dint10=x86emu \
+ -Dxkb_output_dir=/var/lib/xkb \
  "
  
-OPENGL_PKGCONFIGS = "dri glx glamor dri3 xshmfence"

+OPENGL_PKGCONFIGS = "dri glx glamor dri3"
  PACKAGECONFIG ??= "dga dri2 udev ${XORG_CRYPTO} \
 ${@bb.utils.contains('DISTRO_FEATURES', 'opengl', 
'${OPENGL_PKGCONFIGS}', '', d)} \
-   ${@bb.utils.contains('DISTRO_FEATURES', 'systemd', 'systemd 
systemd-logind', '', d)} \
+   ${@bb.utils.contains('DISTRO_FEATURES', 'systemd', 
'systemd-logind', '', d)} \
  "
  
-PACKAGECONFIG[udev] = "--enable-config-udev,--disable-config-udev,udev"

-PACKAGECONFIG[dga] = "--enable-dga,--disable-dga"
-PACKAGECONFIG[dri] = "--enable-dri,--disable-dri,virtual/mesa"
-PACKAGECONFIG[dri2] = "--enable-dri2,--disable-dri2"
-# DRI3 requires xshmfence to also be enabled
-PACKAGECONFIG[dri3] = "--enable-dri3,--disable-dri3"
-PACKAGECONFIG[glx] = "--enable-glx,--disable-glx,virtual/libgl virtual/libx11"
-PACKAGECONFIG[glamor] = "--enable-glamor,--disable-glamor,libepoxy 
virtual/libgbm,libegl"
-PACKAGECONFIG[unwind] = "--enable-libunwind,--disable-libunwind,libunwind"
-PACKAGECONFIG[xshmfence] = 
"--enable-xshmfence,--disable-xshmfence,libxshmfence"
-PACKAGECONFIG[xmlto] = "--with-xmlto, --without-xmlto, xmlto-native 
docbook-xml-dtd4-native docbook-xsl-stylesheets-native"
-PACKAGECONFIG[systemd-logind] = 
"--enable-systemd-logind=yes,--enable-systemd-logind=no,dbus,"
-PACKAGECONFIG[systemd] = 
"--with-systemd-daemon,--without-systemd-daemon,systemd"
-PACKAGECONFIG[xinerama] = "--enable-xinerama,--disable-xinerama"
+PACKAGECONFIG[udev] = "-Dudev=true,-Dudev=false,udev"
+PACKAGECONFIG[dga] = "-Ddga=true,-Ddga=false"
+PACKAGECONFIG[dri] = "-Ddri1=true,-Ddri1=false,virtual/mesa"
+PACKAGECONFIG[dri2] = "-Ddri2=true,-Ddri2=false"
+PACKAGECONFIG[dri3] = "-Ddri3=true,-Ddri3=false"
+PACKAGECONFIG[glx] = "-Dglx=true,-Dglx=false,virtual/libgl virtual/libx11"
+PACKAGECONFIG[glamor] = "-Dglamor=true,-Dglamor=false,libepoxy 
virtual/libgbm,libegl"
+PACKAGECONFIG[unwind] = "-Dlibunwind=true,-Dlibunwind=false,libunwind"
+PACKAGECONFIG[systemd-logind] = 
"-Dsystemd_logind=true,-Dsystemd_logind=false,dbus,"
+PACKAGECONFIG[xinerama] = "-Dxinerama=true,-Dxinerama=false"
  
  # Xorg requires a SHA1 implementation, pick one

  XORG_CRYPTO ??= "openssl"
-PACKAGECONFIG[openssl] = "--with-sha1=libcrypto,,openssl"
-PACKAGECONFIG[nettle] = "--with-sha1=libnettle,,nettle"
-PACKAGECONFIG[gcrypt] = "--with-sha1=libgcrypt,,libgcrypt"
+PACKAGECONFIG[openssl] = "-Dsha1=libcrypto,,openssl"
+PACKAGECONFIG[nettle] = "-Dsha1=libnettle,,nettle"
+PACKAGECONFIG[gcrypt] = "-Dsha1=libgcrypt,,libgcrypt"
  
  do_install:append () {

# Its assumed base-files creates this for us
-   rmdir ${D}${localstatedir}/log/


The comment is related to the presence of /var/log and
now it doesn't make sense after removing the above line.
Please remove the comment, too.


  sed -i -e 's,${libdir}/xorg/modules,${prefix}/lib*/xorg/modules,' 
${D}${mandir}/man5/xorg.conf.5
  }
  









-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#158273): 
https://lists.openembedded.org/g/openembedded-core/message/158273
Mute This Topic: https://lists.openembedded.org/mt/86965698/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: 

Re: [OE-core] [hardknott][PATCH] mklibs: remove recipes and class

2021-11-14 Thread Khem Raj
On Sun, Nov 14, 2021 at 11:47 AM Jacob Kroon  wrote:
>
> On 11/14/21 20:36, Richard Purdie wrote:
> > On Sun, 2021-11-14 at 07:50 +0100, Jacob Kroon wrote:
> >> From: Alexander Kanavin 
> >>
> >> This is not enabled or tested by default, and has never been
> >> ported to python 3 upstream[1], which means it doesn't work at all
> >> with plain poky. If you need it, please put it in a separate layer
> >> and/or modernize to work with py3.
> >>
> >> https://salsa.debian.org/installer-team/mklibs/-/blob/master/src/mklibs
> >>
> >> Signed-off-by: Alexander Kanavin 
> >> Signed-off-by: Jacob Kroon 
> >> Signed-off-by: Richard Purdie 
> >> (cherry picked from commit 908df863b419d1cad7317153101fc827e7e3a354)
> >
> > What issue is it causing in hardknott? Normally we don't backport invasive
> > changes like that...
> >
>
> The problem is that mklibs-native doesn't build with gcc 11, and
> "image-mklibs" was in USER_CLASSES by default in hardknott.
>
> I sent a patch to fix mklibs build here:
>
> https://lists.openembedded.org/g/openembedded-core/message/151982

This fix is correct and it is trivial. We can apply it

>
> but after some discussions we just decided to drop mklibs support
> entirely with the proposed patch.

Was there any other reason ?

>
> /Jacob
>
> 
>

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#158272): 
https://lists.openembedded.org/g/openembedded-core/message/158272
Mute This Topic: https://lists.openembedded.org/mt/87042685/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core] [PATCH 5/5] shaderc: upgrade 2021.2 -> 2021.3

2021-11-14 Thread Jose Quaresma
- SHADERC_SKIP_COPYRIGHT_CHECK is a new cmake option to skip
the copyright check and as we don't needs it we can avoid the check.
https://github.com/google/shaderc/commit/f6d6dddfabfec1041c0dfb8e7ff3608a5f82227c

Signed-off-by: Jose Quaresma 
---
 .../shaderc/{shaderc_2021.2.bb => shaderc_2021.3.bb}   | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)
 rename meta/recipes-graphics/shaderc/{shaderc_2021.2.bb => shaderc_2021.3.bb} 
(91%)

diff --git a/meta/recipes-graphics/shaderc/shaderc_2021.2.bb 
b/meta/recipes-graphics/shaderc/shaderc_2021.3.bb
similarity index 91%
rename from meta/recipes-graphics/shaderc/shaderc_2021.2.bb
rename to meta/recipes-graphics/shaderc/shaderc_2021.3.bb
index eee9817d65..cc2cfc18a8 100644
--- a/meta/recipes-graphics/shaderc/shaderc_2021.2.bb
+++ b/meta/recipes-graphics/shaderc/shaderc_2021.3.bb
@@ -6,7 +6,7 @@ HOMEPAGE = "https://github.com/google/shaderc;
 LICENSE = "Apache-2.0"
 LIC_FILES_CHKSUM = "file://LICENSE;md5=86d3f3a95c324c9479bd8986968f4327"
 
-SRCREV = "2c5ef1b8f8b1fdcbe1b22764e82d5caaa1d04ef9"
+SRCREV = "6fabc36fbebacfcef8cf82463df2a8247120ebf0"
 SRC_URI = "git://github.com/google/shaderc.git;protocol=https;branch=main \
file://0001-cmake-disable-building-external-dependencies.patch \
file://0002-libshaderc_util-fix-glslang-header-file-location.patch \
@@ -23,6 +23,7 @@ EXTRA_OECMAKE = " \
 -DBUILD_EXTERNAL=OFF \
 -DSHADERC_SKIP_TESTS=ON \
 -DSHADERC_SKIP_EXAMPLES=ON \
+-DSHADERC_SKIP_COPYRIGHT_CHECK=ON \
 "
 
 BBCLASSEXTEND = "native nativesdk"
-- 
2.33.1


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#158271): 
https://lists.openembedded.org/g/openembedded-core/message/158271
Mute This Topic: https://lists.openembedded.org/mt/87054851/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core] [PATCH 4/5] glslang: upgrade 11.6.0 -> 11.7.0

2021-11-14 Thread Jose Quaresma
Signed-off-by: Jose Quaresma 
---
 .../glslang/{glslang_11.6.0.bb => glslang_11.7.0.bb}| 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)
 rename meta/recipes-graphics/glslang/{glslang_11.6.0.bb => glslang_11.7.0.bb} 
(95%)

diff --git a/meta/recipes-graphics/glslang/glslang_11.6.0.bb 
b/meta/recipes-graphics/glslang/glslang_11.7.0.bb
similarity index 95%
rename from meta/recipes-graphics/glslang/glslang_11.6.0.bb
rename to meta/recipes-graphics/glslang/glslang_11.7.0.bb
index e2388a1a57..0b4bf21bca 100644
--- a/meta/recipes-graphics/glslang/glslang_11.6.0.bb
+++ b/meta/recipes-graphics/glslang/glslang_11.7.0.bb
@@ -8,7 +8,7 @@ HOMEPAGE = 
"https://www.khronos.org/opengles/sdk/tools/Reference-Compiler;
 LICENSE = "BSD-3-Clause & BSD-2-Clause & MIT & Apache-2.0 & 
GPL-3-with-bison-exception"
 LIC_FILES_CHKSUM = "file://LICENSE.txt;md5=c5ce49c0456e9b413b98a4368c378229"
 
-SRCREV = "2fb89a0072ae7316af1c856f22663fde4928128a"
+SRCREV = "925503088e2bcd76921b1e102c37fc320bace254"
 SRC_URI = 
"git://github.com/KhronosGroup/glslang.git;protocol=https;branch=master \
file://0001-generate-glslang-pkg-config.patch"
 UPSTREAM_CHECK_GITTAGREGEX = "^(?P\d+(\.\d+)+)$"
-- 
2.33.1


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#158270): 
https://lists.openembedded.org/g/openembedded-core/message/158270
Mute This Topic: https://lists.openembedded.org/mt/87054850/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core] [PATCH 2/5] spirv-headers: bump to last master

2021-11-14 Thread Jose Quaresma
SPIRV-Tools v2021.4 require this revision
https://github.com/KhronosGroup/SPIRV-Tools/commit/21e3f681e2004590c7865bc8c0195a4ab8e66c88

Signed-off-by: Jose Quaresma 
---
 meta/recipes-graphics/spir/spirv-headers_1.5.5.bb | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/meta/recipes-graphics/spir/spirv-headers_1.5.5.bb 
b/meta/recipes-graphics/spir/spirv-headers_1.5.5.bb
index 101a2e2948..522708618e 100644
--- a/meta/recipes-graphics/spir/spirv-headers_1.5.5.bb
+++ b/meta/recipes-graphics/spir/spirv-headers_1.5.5.bb
@@ -7,7 +7,7 @@ HOMEPAGE = "https://www.khronos.org/registry/spir-v;
 LICENSE = "MIT"
 LIC_FILES_CHKSUM = "file://LICENSE;md5=c938b85bceb8fb26c1a807f28a52ae2d"
 
-SRCREV = "c8213b3c5a2cf3a0f5c4d1e7d7b8fc2ac9f4806d"
+SRCREV = "814e728b30ddd0f4509233099a3ad96fd4318c07"
 SRC_URI = 
"git://github.com/KhronosGroup/SPIRV-Headers;protocol=https;branch=master"
 UPSTREAM_CHECK_GITTAGREGEX = "^(?P\d+(\.\d+)+)$"
 S = "${WORKDIR}/git"
-- 
2.33.1


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#158268): 
https://lists.openembedded.org/g/openembedded-core/message/158268
Mute This Topic: https://lists.openembedded.org/mt/87054848/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core] [PATCH 3/5] spirv-tools: upgrade 2021.3 -> 2021.4

2021-11-14 Thread Jose Quaresma
Signed-off-by: Jose Quaresma 
---
 .../spir/{spirv-tools_2021.3.bb => spirv-tools_2021.4.bb}   | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)
 rename meta/recipes-graphics/spir/{spirv-tools_2021.3.bb => 
spirv-tools_2021.4.bb} (96%)

diff --git a/meta/recipes-graphics/spir/spirv-tools_2021.3.bb 
b/meta/recipes-graphics/spir/spirv-tools_2021.4.bb
similarity index 96%
rename from meta/recipes-graphics/spir/spirv-tools_2021.3.bb
rename to meta/recipes-graphics/spir/spirv-tools_2021.4.bb
index bf44b58c99..ed56f4668f 100644
--- a/meta/recipes-graphics/spir/spirv-tools_2021.3.bb
+++ b/meta/recipes-graphics/spir/spirv-tools_2021.4.bb
@@ -7,7 +7,7 @@ SECTION = "graphics"
 LICENSE  = "Apache-2.0"
 LIC_FILES_CHKSUM = "file://LICENSE;md5=3b83ef96387f14655fc854ddc3c6bd57"
 
-SRCREV = "1fbed83c8aab8517d821fcb4164c08567951938f"
+SRCREV = "ab8eb607750208066e2d57eff6a34dbaf05f5ada"
 SRC_URI = 
"git://github.com/KhronosGroup/SPIRV-Tools.git;branch=master;protocol=https"
 UPSTREAM_CHECK_GITTAGREGEX = "^v(?P\d+(\.\d+)+)$"
 S = "${WORKDIR}/git"
-- 
2.33.1


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#158269): 
https://lists.openembedded.org/g/openembedded-core/message/158269
Mute This Topic: https://lists.openembedded.org/mt/87054849/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core] [PATCH 1/5] spirv-headers: upgrade 1.5.4 -> 1.5.5

2021-11-14 Thread Jose Quaresma
Signed-off-by: Jose Quaresma 
---
 .../spir/{spirv-headers_1.5.4.bb => spirv-headers_1.5.5.bb} | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)
 rename meta/recipes-graphics/spir/{spirv-headers_1.5.4.bb => 
spirv-headers_1.5.5.bb} (92%)

diff --git a/meta/recipes-graphics/spir/spirv-headers_1.5.4.bb 
b/meta/recipes-graphics/spir/spirv-headers_1.5.5.bb
similarity index 92%
rename from meta/recipes-graphics/spir/spirv-headers_1.5.4.bb
rename to meta/recipes-graphics/spir/spirv-headers_1.5.5.bb
index 6c978ce51a..101a2e2948 100644
--- a/meta/recipes-graphics/spir/spirv-headers_1.5.4.bb
+++ b/meta/recipes-graphics/spir/spirv-headers_1.5.5.bb
@@ -7,7 +7,7 @@ HOMEPAGE = "https://www.khronos.org/registry/spir-v;
 LICENSE = "MIT"
 LIC_FILES_CHKSUM = "file://LICENSE;md5=c938b85bceb8fb26c1a807f28a52ae2d"
 
-SRCREV = "6cae8216a6ea19ff3f237af01e54378c1ff81fcd"
+SRCREV = "c8213b3c5a2cf3a0f5c4d1e7d7b8fc2ac9f4806d"
 SRC_URI = 
"git://github.com/KhronosGroup/SPIRV-Headers;protocol=https;branch=master"
 UPSTREAM_CHECK_GITTAGREGEX = "^(?P\d+(\.\d+)+)$"
 S = "${WORKDIR}/git"
-- 
2.33.1


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#158267): 
https://lists.openembedded.org/g/openembedded-core/message/158267
Mute This Topic: https://lists.openembedded.org/mt/87054847/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core] [hardknott][PATCH] mklibs-native: drop deprecated cpp17 exceptions

2021-11-14 Thread Jacob Kroon
From: Andrej Valek 

gcc11 has -std=gnu++17 as default. Remove deprecated C++17 exceptions based
on http://www.open-std.org/jtc1/sc22/wg21/docs/papers/2016/p0003r5.html.

Signed-off-by: Andrej Valek 
Signed-off-by: Steve Sakoman 
(cherry picked from commit ef8b7946b4793db653ef7dd716e1d3f919a84725)
---
 ...ecated-exception-specification-cpp17.patch | 431 ++
 .../mklibs/mklibs-native_0.1.44.bb|   1 +
 2 files changed, 432 insertions(+)
 create mode 100644 
meta/recipes-devtools/mklibs/files/remove-deprecated-exception-specification-cpp17.patch

diff --git 
a/meta/recipes-devtools/mklibs/files/remove-deprecated-exception-specification-cpp17.patch
 
b/meta/recipes-devtools/mklibs/files/remove-deprecated-exception-specification-cpp17.patch
new file mode 100644
index 00..f96cc7d302
--- /dev/null
+++ 
b/meta/recipes-devtools/mklibs/files/remove-deprecated-exception-specification-cpp17.patch
@@ -0,0 +1,431 @@
+From 597c7a8333df84a87cc48fb8477b603ffbf372a6 Mon Sep 17 00:00:00 2001
+From: Andrej Valek 
+Date: Mon, 23 Aug 2021 12:45:11 +0200
+Subject: [PATCH] feat(cpp17): remove deprecated exception specifications for
+ C++ 17
+
+Upstream-Status: Submitted 
[https://salsa.debian.org/installer-team/mklibs/-/merge_requests/2]
+
+based on: http://www.open-std.org/jtc1/sc22/wg21/docs/papers/2016/p0003r5.html
+
+Signed-off-by: Andrej Valek 
+---
+ src/mklibs-readelf/elf.cpp  | 48 -
+ src/mklibs-readelf/elf.hpp  | 18 
+ src/mklibs-readelf/elf_data.hpp | 36 +++
+ 3 files changed, 51 insertions(+), 51 deletions(-)
+
+diff --git a/src/mklibs-readelf/elf.cpp b/src/mklibs-readelf/elf.cpp
+index 0e4c0f3..2e6d0f6 100644
+--- a/src/mklibs-readelf/elf.cpp
 b/src/mklibs-readelf/elf.cpp
+@@ -36,7 +36,7 @@ file::~file () throw ()
+ delete *it;
+ }
+ 
+-file *file::open (const char *filename) throw (std::bad_alloc, 
std::runtime_error)
++file *file::open (const char *filename) throw ()
+ {
+   struct stat buf;
+   int fd;
+@@ -72,7 +72,7 @@ file *file::open (const char *filename) throw 
(std::bad_alloc, std::runtime_erro
+ }
+ 
+ template
+-file *file::open_class(uint8_t *mem, size_t len) throw (std::bad_alloc, 
std::runtime_error)
++file *file::open_class(uint8_t *mem, size_t len) throw ()
+ {
+   switch (mem[EI_DATA])
+   {
+@@ -86,7 +86,7 @@ file *file::open_class(uint8_t *mem, size_t len) throw 
(std::bad_alloc, std::run
+ }
+ 
+ template 
+-file_data<_class, _data>::file_data(uint8_t *mem, size_t len) throw 
(std::bad_alloc, std::runtime_error)
++file_data<_class, _data>::file_data(uint8_t *mem, size_t len) throw ()
+ : file(mem, len)
+ {
+   if (mem[EI_CLASS] != _class::id)
+@@ -190,7 +190,7 @@ section_data<_class, _data>::section_data(Shdr *shdr, 
uint8_t *mem) throw ()
+ }
+ 
+ template 
+-void section_data<_class, _data>::update(const file ) throw 
(std::bad_alloc)
++void section_data<_class, _data>::update(const file ) throw ()
+ {
+   const section_type  =
+ dynamic_cast 
&>(file.get_section(file.get_shstrndx()));
+@@ -204,7 +204,7 @@ section_type::~section_type() throw 
()
+ }
+ 
+ template 
+-section_real<_class, _data, section_type_DYNAMIC>::section_real(Shdr *header, 
uint8_t *mem) throw (std::bad_alloc)
++section_real<_class, _data, section_type_DYNAMIC>::section_real(Shdr *header, 
uint8_t *mem) throw ()
+ : section_data<_class, _data>(header, mem)
+ {
+   if (this->type != SHT_DYNAMIC)
+@@ -221,7 +221,7 @@ section_real<_class, _data, 
section_type_DYNAMIC>::section_real(Shdr *header, ui
+ }
+ 
+ template 
+-void section_real<_class, _data, section_type_DYNAMIC>::update(const file 
) throw (std::bad_alloc)
++void section_real<_class, _data, section_type_DYNAMIC>::update(const file 
) throw ()
+ {
+   section_data<_class, _data>::update(file);
+ 
+@@ -243,7 +243,7 @@ section_type::~section_type() throw ()
+ }
+ 
+ template 
+-section_real<_class, _data, section_type_DYNSYM>::section_real(Shdr *header, 
uint8_t *mem) throw (std::bad_alloc)
++section_real<_class, _data, section_type_DYNSYM>::section_real(Shdr *header, 
uint8_t *mem) throw ()
+ : section_data<_class, _data>(header, mem)
+ {
+   if (this->type != SHT_DYNSYM)
+@@ -260,7 +260,7 @@ section_real<_class, _data, 
section_type_DYNSYM>::section_real(Shdr *header, uin
+ }
+ 
+ template 
+-void section_real<_class, _data, section_type_DYNSYM>::update(const file 
) throw (std::bad_alloc)
++void section_real<_class, _data, section_type_DYNSYM>::update(const file 
) throw ()
+ {
+   section_data<_class, _data>::update (file);
+ 
+@@ -285,7 +285,7 @@ const version_definition 
*section_type::get_version_def
+ }
+ 
+ template 
+-section_real<_class, _data, section_type_GNU_VERDEF>::section_real(Shdr 
*header, uint8_t *mem) throw (std::bad_alloc)
++section_real<_class, _data, section_type_GNU_VERDEF>::section_real(Shdr 
*header, uint8_t *mem) throw ()
+ : section_data<_class, _data>(header, mem)
+ {
+   if (this->type != 

Re: [OE-core] [hardknott][PATCH] mklibs: remove recipes and class

2021-11-14 Thread Jacob Kroon

On 11/14/21 20:51, Richard Purdie wrote:

On Sun, 2021-11-14 at 20:47 +0100, Jacob Kroon wrote:

On 11/14/21 20:36, Richard Purdie wrote:

On Sun, 2021-11-14 at 07:50 +0100, Jacob Kroon wrote:

From: Alexander Kanavin 

This is not enabled or tested by default, and has never been
ported to python 3 upstream[1], which means it doesn't work at all
with plain poky. If you need it, please put it in a separate layer
and/or modernize to work with py3.

https://salsa.debian.org/installer-team/mklibs/-/blob/master/src/mklibs

Signed-off-by: Alexander Kanavin 
Signed-off-by: Jacob Kroon 
Signed-off-by: Richard Purdie 
(cherry picked from commit 908df863b419d1cad7317153101fc827e7e3a354)


What issue is it causing in hardknott? Normally we don't backport invasive
changes like that...



The problem is that mklibs-native doesn't build with gcc 11, and
"image-mklibs" was in USER_CLASSES by default in hardknott.

I sent a patch to fix mklibs build here:

https://lists.openembedded.org/g/openembedded-core/message/151982

but after some discussions we just decided to drop mklibs support
entirely with the proposed patch.


ok, that is something we should fix. My worry is that the backport as is will
need everyone to update their local.conf since the class will no longer be there
and it will throw errors if people try and include it. This isn't what people
expect from a point release.

Could we just remove it from local.conf in hardknott? That should solve the
issue but reduce risk to anyone who has hardknott already working fine with an
older gcc.



Yeah I'm ok with that, I'm even ok with leaving it as it is :-)

Or perhaps we should forward-port

ef8b7946b4793db653ef7dd716e1d3f919a84725

in dunfell branch to hardknott, which also should take care of it.

/Jacob

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#158265): 
https://lists.openembedded.org/g/openembedded-core/message/158265
Mute This Topic: https://lists.openembedded.org/mt/87042685/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



Re: [OE-core] [hardknott][PATCH] mklibs: remove recipes and class

2021-11-14 Thread Richard Purdie
On Sun, 2021-11-14 at 20:47 +0100, Jacob Kroon wrote:
> On 11/14/21 20:36, Richard Purdie wrote:
> > On Sun, 2021-11-14 at 07:50 +0100, Jacob Kroon wrote:
> > > From: Alexander Kanavin 
> > > 
> > > This is not enabled or tested by default, and has never been
> > > ported to python 3 upstream[1], which means it doesn't work at all
> > > with plain poky. If you need it, please put it in a separate layer
> > > and/or modernize to work with py3.
> > > 
> > > https://salsa.debian.org/installer-team/mklibs/-/blob/master/src/mklibs
> > > 
> > > Signed-off-by: Alexander Kanavin 
> > > Signed-off-by: Jacob Kroon 
> > > Signed-off-by: Richard Purdie 
> > > (cherry picked from commit 908df863b419d1cad7317153101fc827e7e3a354)
> > 
> > What issue is it causing in hardknott? Normally we don't backport invasive
> > changes like that...
> > 
> 
> The problem is that mklibs-native doesn't build with gcc 11, and 
> "image-mklibs" was in USER_CLASSES by default in hardknott.
> 
> I sent a patch to fix mklibs build here:
> 
> https://lists.openembedded.org/g/openembedded-core/message/151982
> 
> but after some discussions we just decided to drop mklibs support 
> entirely with the proposed patch.

ok, that is something we should fix. My worry is that the backport as is will
need everyone to update their local.conf since the class will no longer be there
and it will throw errors if people try and include it. This isn't what people
expect from a point release.

Could we just remove it from local.conf in hardknott? That should solve the
issue but reduce risk to anyone who has hardknott already working fine with an
older gcc.

Cheers,

Richard


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#158264): 
https://lists.openembedded.org/g/openembedded-core/message/158264
Mute This Topic: https://lists.openembedded.org/mt/87042685/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



Re: [OE-core] [hardknott][PATCH] mklibs: remove recipes and class

2021-11-14 Thread Jacob Kroon

On 11/14/21 20:36, Richard Purdie wrote:

On Sun, 2021-11-14 at 07:50 +0100, Jacob Kroon wrote:

From: Alexander Kanavin 

This is not enabled or tested by default, and has never been
ported to python 3 upstream[1], which means it doesn't work at all
with plain poky. If you need it, please put it in a separate layer
and/or modernize to work with py3.

https://salsa.debian.org/installer-team/mklibs/-/blob/master/src/mklibs

Signed-off-by: Alexander Kanavin 
Signed-off-by: Jacob Kroon 
Signed-off-by: Richard Purdie 
(cherry picked from commit 908df863b419d1cad7317153101fc827e7e3a354)


What issue is it causing in hardknott? Normally we don't backport invasive
changes like that...



The problem is that mklibs-native doesn't build with gcc 11, and 
"image-mklibs" was in USER_CLASSES by default in hardknott.


I sent a patch to fix mklibs build here:

https://lists.openembedded.org/g/openembedded-core/message/151982

but after some discussions we just decided to drop mklibs support 
entirely with the proposed patch.


/Jacob

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#158263): 
https://lists.openembedded.org/g/openembedded-core/message/158263
Mute This Topic: https://lists.openembedded.org/mt/87042685/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



Re: [OE-core] [hardknott][PATCH] mklibs: remove recipes and class

2021-11-14 Thread Richard Purdie
On Sun, 2021-11-14 at 07:50 +0100, Jacob Kroon wrote:
> From: Alexander Kanavin 
> 
> This is not enabled or tested by default, and has never been
> ported to python 3 upstream[1], which means it doesn't work at all
> with plain poky. If you need it, please put it in a separate layer
> and/or modernize to work with py3.
> 
> https://salsa.debian.org/installer-team/mklibs/-/blob/master/src/mklibs
> 
> Signed-off-by: Alexander Kanavin 
> Signed-off-by: Jacob Kroon 
> Signed-off-by: Richard Purdie 
> (cherry picked from commit 908df863b419d1cad7317153101fc827e7e3a354)

What issue is it causing in hardknott? Normally we don't backport invasive
changes like that...

Cheers,

Richard


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#158262): 
https://lists.openembedded.org/g/openembedded-core/message/158262
Mute This Topic: https://lists.openembedded.org/mt/87042685/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core] [PATCH 2/2] vulkan-samples: Enable for architectures where it builds

2021-11-14 Thread Khem Raj
With last upgade it has stopped working on arm/mips/x86/rv32
basically all 32bit architectures. Until this is fixed enable it
for architectures where its known to build now.

Signed-off-by: Khem Raj 
---
 meta/recipes-graphics/vulkan/vulkan-samples_git.bb | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/meta/recipes-graphics/vulkan/vulkan-samples_git.bb 
b/meta/recipes-graphics/vulkan/vulkan-samples_git.bb
index 81d8c6faf91..1e45e9f04bf 100644
--- a/meta/recipes-graphics/vulkan/vulkan-samples_git.bb
+++ b/meta/recipes-graphics/vulkan/vulkan-samples_git.bb
@@ -19,7 +19,7 @@ UPSTREAM_CHECK_GITTAGREGEX = "These are not the releases 
you're looking for"
 S = "${WORKDIR}/git"
 
 REQUIRED_DISTRO_FEATURES = 'vulkan'
-COMPATIBLE_HOST:x86 = "null"
+COMPATIBLE_HOST = "(x86_64|aarch64|mips64|powerpc64|riscv64).*-linux"
 
 inherit cmake features_check
 
-- 
2.33.1


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#158261): 
https://lists.openembedded.org/g/openembedded-core/message/158261
Mute This Topic: https://lists.openembedded.org/mt/87050302/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core] [PATCH v2 1/2] vulkan-samples: Fix cmake errors about plain signature

2021-11-14 Thread Khem Raj
Fix some typecasting errors seen on 32bit platforms with clang

Signed-off-by: Khem Raj 
---
v2: Add another typecasting fix

 ...dd-explicit-static_cast-from-vk-Buff.patch | 35 +
 ...-mix-plain-and-keyword-target_link_l.patch | 38 +++
 .../vulkan/vulkan-samples_git.bb  |  2 +
 3 files changed, 75 insertions(+)
 create mode 100644 
meta/recipes-graphics/vulkan/vulkan-samples/0001-framework-core-Add-explicit-static_cast-from-vk-Buff.patch
 create mode 100644 
meta/recipes-graphics/vulkan/vulkan-samples/0001-framework-do-not-mix-plain-and-keyword-target_link_l.patch

diff --git 
a/meta/recipes-graphics/vulkan/vulkan-samples/0001-framework-core-Add-explicit-static_cast-from-vk-Buff.patch
 
b/meta/recipes-graphics/vulkan/vulkan-samples/0001-framework-core-Add-explicit-static_cast-from-vk-Buff.patch
new file mode 100644
index 000..b0e7cdabe4a
--- /dev/null
+++ 
b/meta/recipes-graphics/vulkan/vulkan-samples/0001-framework-core-Add-explicit-static_cast-from-vk-Buff.patch
@@ -0,0 +1,35 @@
+From f88fd472e57b59013570f08949dbbc0875c1bae4 Mon Sep 17 00:00:00 2001
+From: Khem Raj 
+Date: Sat, 13 Nov 2021 18:37:13 -0800
+Subject: [PATCH] framework/core: Add explicit static_cast from vk::Buffer to
+ VkBuffer
+
+This fixes errors like
+framework/core/hpp_buffer.cpp:149:3: error: no matching function for call to 
'vmaDestroyBuffer'
+| vmaDestroyBuffer(vmaAllocator, handle, vmaAllocation);
+| ^~~~
+| 
/mnt/b/yoe/master/build/tmp/work/riscv32-yoe-linux-musl/vulkan-samples/git-r0/git/third_party/vma/src/vk_mem_alloc.h:3803:33:
 note: candidate function not viable: no known conversion from 'vk::Buffer' to 
'V
+kBuffer' (aka 'unsigned long long') for 2nd argument
+
+Upstream-Status: Submitted 
[https://github.com/KhronosGroup/Vulkan-Samples/pull/395]
+Signed-off-by: Khem Raj 
+---
+ framework/core/hpp_buffer.cpp | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/framework/core/hpp_buffer.cpp b/framework/core/hpp_buffer.cpp
+index c1f5649..2609e4e 100644
+--- a/framework/core/hpp_buffer.cpp
 b/framework/core/hpp_buffer.cpp
+@@ -146,7 +146,7 @@ void HPPBuffer::destroy()
+   {
+   assert(vmaAllocation != VK_NULL_HANDLE);
+   unmap();
+-  vmaDestroyBuffer(vmaAllocator, handle, vmaAllocation);
++  vmaDestroyBuffer(vmaAllocator, static_cast(handle), 
vmaAllocation);
+   }
+ }
+ 
+-- 
+2.33.1
+
diff --git 
a/meta/recipes-graphics/vulkan/vulkan-samples/0001-framework-do-not-mix-plain-and-keyword-target_link_l.patch
 
b/meta/recipes-graphics/vulkan/vulkan-samples/0001-framework-do-not-mix-plain-and-keyword-target_link_l.patch
new file mode 100644
index 000..66ed8bb47d3
--- /dev/null
+++ 
b/meta/recipes-graphics/vulkan/vulkan-samples/0001-framework-do-not-mix-plain-and-keyword-target_link_l.patch
@@ -0,0 +1,38 @@
+From 64b806ab702a6f445fd84aca5f03bb85b86a66e3 Mon Sep 17 00:00:00 2001
+From: Khem Raj 
+Date: Thu, 11 Nov 2021 18:37:09 -0800
+Subject: [PATCH] framework: do not mix plain and keyword
+ target_link_libraries() signatures
+
+Fixes
+| CMake Error at framework/CMakeLists.txt:461 (target_link_libraries):
+|   The plain signature for target_link_libraries has already been used with
+|   the target "framework".  All uses of target_link_libraries with a target   
 |   must be either all-keyword or 
all-plain.
+|
+|   The uses of the plain signature are here:
+|  
 |* framework/CMakeLists.txt:453 
(target_link_libraries)
+|
+
+Upstream-Status: Submitted 
[https://github.com/KhronosGroup/Vulkan-Samples/pull/395]
+
+Signed-off-by: Khem Raj 
+---
+ framework/CMakeLists.txt | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/framework/CMakeLists.txt b/framework/CMakeLists.txt
+index 948c796..13d3324 100644
+--- a/framework/CMakeLists.txt
 b/framework/CMakeLists.txt
+@@ -450,7 +450,7 @@ target_link_libraries(${PROJECT_NAME} PUBLIC
+ plugins)
+ 
+ if(${NEED_LINK_ATOMIC})
+-target_link_libraries(${PROJECT_NAME} atomic)
++target_link_libraries(${PROJECT_NAME} PUBLIC atomic)
+ endif()
+ 
+ # Link platform specific libraries
+-- 
+2.33.1
+
diff --git a/meta/recipes-graphics/vulkan/vulkan-samples_git.bb 
b/meta/recipes-graphics/vulkan/vulkan-samples_git.bb
index 613ed592c61..81d8c6faf91 100644
--- a/meta/recipes-graphics/vulkan/vulkan-samples_git.bb
+++ b/meta/recipes-graphics/vulkan/vulkan-samples_git.bb
@@ -7,6 +7,8 @@ LIC_FILES_CHKSUM = 
"file://LICENSE;md5=48aa35cefb768436223a6e7f18dc2a2a"
 
 SRC_URI = 
"gitsm://github.com/KhronosGroup/Vulkan-Samples.git;branch=master;protocol=https
 \

file://0001-CMakeLists.txt-do-not-hardcode-lib-as-installation-t.patch \
+   
file://0001-framework-do-not-mix-plain-and-keyword-target_link_l.patch \
+   

[OE-core] OE-core CVE metrics for honister on Sun 14 Nov 2021 05:30:01 AM HST

2021-11-14 Thread Steve Sakoman
Branch: honister

New this week: 6 CVEs
CVE-2021-3927: vim 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3927 *
CVE-2021-3928: vim 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3928 *
CVE-2021-41771: go 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-41771 *
CVE-2021-41772: go 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-41772 *
CVE-2021-43396: glibc 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-43396 *
CVE-2021-43400: bluez5 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-43400 *

Removed this week: 0 CVEs

Full list:  Found 24 unpatched CVEs
CVE-2016-20012: openssh 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-20012 *
CVE-2019-12067: qemu:qemu-native:qemu-system-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12067 *
CVE-2020-18974: nasm:nasm-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-18974 *
CVE-2020-35503: qemu:qemu-native:qemu-system-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-35503 *
CVE-2021-20255: qemu:qemu-native:qemu-system-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20255 *
CVE-2021-25219: bind 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-25219 *
CVE-2021-31879: wget 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-31879 *
CVE-2021-3507: qemu:qemu-native:qemu-system-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3507 *
CVE-2021-36976: libarchive:libarchive-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-36976 *
CVE-2021-3713: qemu:qemu-native:qemu-system-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3713 *
CVE-2021-3796: vim 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3796 *
CVE-2021-38297: go 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38297 *
CVE-2021-3872: vim 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3872 *
CVE-2021-3875: vim 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3875 *
CVE-2021-3903: vim 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3903 *
CVE-2021-3927: vim 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3927 *
CVE-2021-3928: vim 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3928 *
CVE-2021-39537: ncurses:ncurses-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-39537 *
CVE-2021-41617: openssh 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-41617 *
CVE-2021-41771: go 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-41771 *
CVE-2021-41772: go 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-41772 *
CVE-2021-42762: webkitgtk 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-42762 *
CVE-2021-43396: glibc 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-43396 *
CVE-2021-43400: bluez5 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-43400 *

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#158259): 
https://lists.openembedded.org/g/openembedded-core/message/158259
Mute This Topic: https://lists.openembedded.org/mt/87048275/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core] OE-core CVE metrics for hardknott on Sun 14 Nov 2021 05:00:01 AM HST

2021-11-14 Thread Steve Sakoman
Branch: hardknott

New this week: 4 CVEs
CVE-2021-3927: vim 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3927 *
CVE-2021-3928: vim 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3928 *
CVE-2021-41771: go 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-41771 *
CVE-2021-41772: go 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-41772 *

Removed this week: 0 CVEs

Full list:  Found 43 unpatched CVEs
CVE-2013-0340: expat:expat-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0340 *
CVE-2016-20012: openssh 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-20012 *
CVE-2019-12067: qemu:qemu-native:qemu-system-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12067 *
CVE-2020-18974: nasm:nasm-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-18974 *
CVE-2020-29623: webkitgtk 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-29623 *
CVE-2020-35503: qemu:qemu-native:qemu-system-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-35503 *
CVE-2021-1765: webkitgtk 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1765 *
CVE-2021-1789: webkitgtk 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1789 *
CVE-2021-1799: webkitgtk 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1799 *
CVE-2021-1801: webkitgtk 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1801 *
CVE-2021-1870: webkitgtk 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1870 *
CVE-2021-20196: qemu:qemu-native:qemu-system-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20196 *
CVE-2021-20255: qemu:qemu-native:qemu-system-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20255 *
CVE-2021-22922: curl:curl-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22922 *
CVE-2021-22923: curl:curl-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22923 *
CVE-2021-22945: curl:curl-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22945 *
CVE-2021-22946: curl:curl-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22946 *
CVE-2021-22947: curl:curl-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22947 *
CVE-2021-25219: bind 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-25219 *
CVE-2021-27645: glibc 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-27645 *
CVE-2021-31879: wget 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-31879 *
CVE-2021-33574: glibc 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33574 *
CVE-2021-33833: connman 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33833 *
CVE-2021-33928: libsolv 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33928 *
CVE-2021-33929: libsolv 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33929 *
CVE-2021-33930: libsolv 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33930 *
CVE-2021-33938: libsolv 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33938 *
CVE-2021-3445: libdnf 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3445 *
CVE-2021-3507: qemu:qemu-native:qemu-system-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3507 *
CVE-2021-36976: libarchive 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-36976 *
CVE-2021-3713: qemu:qemu-native:qemu-system-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3713 *
CVE-2021-38297: go 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38297 *
CVE-2021-38604: glibc 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38604 *
CVE-2021-3872: vim 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3872 *
CVE-2021-3875: vim 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3875 *
CVE-2021-3903: vim 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3903 *
CVE-2021-3927: vim 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3927 *
CVE-2021-3928: vim 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3928 *
CVE-2021-40491: inetutils 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-40491 *
CVE-2021-40528: libgcrypt:libgcrypt-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-40528 *
CVE-2021-41771: go 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-41771 *
CVE-2021-41772: go 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-41772 *
CVE-2021-42762: webkitgtk 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-42762 *

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#158258): 
https://lists.openembedded.org/g/openembedded-core/message/158258
Mute This Topic: https://lists.openembedded.org/mt/87047717/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core] OE-core CVE metrics for dunfell on Sun 14 Nov 2021 04:30:01 AM HST

2021-11-14 Thread Steve Sakoman
Branch: dunfell

New this week: 0 CVEs

Removed this week: 0 CVEs

Full list:  Found 79 unpatched CVEs
CVE-2016-20012: openssh 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-20012 *
CVE-2018-21232: re2c:re2c-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-21232 *
CVE-2019-12067: qemu:qemu-native:qemu-system-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12067 *
CVE-2020-13253: qemu:qemu-native:qemu-system-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-13253 *
CVE-2020-13754: qemu:qemu-native:qemu-system-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-13754 *
CVE-2020-13791: qemu:qemu-native:qemu-system-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-13791 *
CVE-2020-14372: grub:grub-efi:grub-efi-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14372 *
CVE-2020-15469: qemu:qemu-native:qemu-system-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15469 *
CVE-2020-15705: grub:grub-efi:grub-efi-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15705 *
CVE-2020-15859: qemu:qemu-native:qemu-system-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15859 *
CVE-2020-15900: ghostscript-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15900 *
CVE-2020-16590: 
binutils:binutils-cross-testsuite:binutils-cross-x86_64:binutils-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-16590 *
CVE-2020-16591: 
binutils:binutils-cross-testsuite:binutils-cross-x86_64:binutils-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-16591 *
CVE-2020-16599: 
binutils:binutils-cross-testsuite:binutils-cross-x86_64:binutils-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-16599 *
CVE-2020-17380: qemu:qemu-native:qemu-system-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17380 *
CVE-2020-18974: nasm:nasm-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-18974 *
CVE-2020-25632: grub:grub-efi:grub-efi-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25632 *
CVE-2020-25647: grub:grub-efi:grub-efi-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25647 *
CVE-2020-25742: qemu:qemu-native:qemu-system-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25742 *
CVE-2020-25743: qemu:qemu-native:qemu-system-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25743 *
CVE-2020-27661: qemu:qemu-native:qemu-system-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27661 *
CVE-2020-27749: grub:grub-efi:grub-efi-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27749 *
CVE-2020-27779: grub:grub-efi:grub-efi-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27779 *
CVE-2020-27821: qemu:qemu-native:qemu-system-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27821 *
CVE-2020-29510: go:go-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-29510 *
CVE-2020-29623: webkitgtk 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-29623 *
CVE-2020-35503: qemu:qemu-native:qemu-system-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-35503 *
CVE-2020-35504: qemu:qemu-native:qemu-system-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-35504 *
CVE-2020-35505: qemu:qemu-native:qemu-system-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-35505 *
CVE-2020-35506: qemu:qemu-native:qemu-system-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-35506 *
CVE-2020-36254: dropbear 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-36254 *
CVE-2020-3810: apt 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-3810 *
CVE-2021-0129: bluez5 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-0129 *
CVE-2021-1765: webkitgtk 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1765 *
CVE-2021-1789: webkitgtk 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1789 *
CVE-2021-1799: webkitgtk 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1799 *
CVE-2021-1801: webkitgtk 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1801 *
CVE-2021-1870: webkitgtk 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1870 *
CVE-2021-20225: grub:grub-efi:grub-efi-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20225 *
CVE-2021-20233: grub:grub-efi:grub-efi-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20233 *
CVE-2021-20255: qemu:qemu-native:qemu-system-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20255 *
CVE-2021-20294: 
binutils:binutils-cross-testsuite:binutils-cross-x86_64:binutils-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20294 *
CVE-2021-25219: bind 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-25219 *
CVE-2021-27097: u-boot 

[OE-core] OE-core CVE metrics for master on Sun 14 Nov 2021 04:00:01 AM HST

2021-11-14 Thread Steve Sakoman
Branch: master

New this week: 6 CVEs
CVE-2021-3927: vim 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3927 *
CVE-2021-3928: vim 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3928 *
CVE-2021-41771: go 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-41771 *
CVE-2021-41772: go 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-41772 *
CVE-2021-43396: glibc 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-43396 *
CVE-2021-43519: lua:lua-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-43519 *

Removed this week: 4 CVEs
CVE-2021-3796: vim 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3796 *
CVE-2021-3872: vim 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3872 *
CVE-2021-3875: vim 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3875 *
CVE-2021-3903: vim 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3903 *

Full list:  Found 14 unpatched CVEs
CVE-2019-12067: qemu:qemu-native:qemu-system-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12067 *
CVE-2020-18974: nasm:nasm-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-18974 *
CVE-2021-20255: qemu:qemu-native:qemu-system-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20255 *
CVE-2021-3527: qemu:qemu-native:qemu-system-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3527 *
CVE-2021-3682: qemu:qemu-native:qemu-system-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3682 *
CVE-2021-36976: libarchive:libarchive-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-36976 *
CVE-2021-3713: qemu:qemu-native:qemu-system-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3713 *
CVE-2021-38297: go 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38297 *
CVE-2021-3927: vim 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3927 *
CVE-2021-3928: vim 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3928 *
CVE-2021-41771: go 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-41771 *
CVE-2021-41772: go 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-41772 *
CVE-2021-43396: glibc 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-43396 *
CVE-2021-43519: lua:lua-native 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-43519 *

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#158256): 
https://lists.openembedded.org/g/openembedded-core/message/158256
Mute This Topic: https://lists.openembedded.org/mt/87046598/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-