[oe] Fwd: [openembedded][Qt5]: typing problem.
-- Forwarded message - From: Mohamed Dawod Date: Sat, Sep 15, 2018 at 10:51 AM Subject: [openembedded][Qt5]: typing problem. To: , < openembedded-devel@lists.openembedded.org> HI everyone, I am trying to build custom image supporting wayland weston instead of x11 and support qt5 apps. I successfully built it but when I try to type any thing in the text box in the qt5 app. no thing happen !! also the initial text in text boxes appears very small!! I added "fontconfig" and "frretype" to the PACAGECONFIG variabl in qtbase_git.bb recipe.. How to solve this problem ? Thank you in advance, Regards, -- Mohamed Dawod Computer Engineering Department Faculty of Engineering Cairo University -- Mohamed Dawod Computer Engineering Department Faculty of Engineering Cairo University -- ___ Openembedded-devel mailing list Openembedded-devel@lists.openembedded.org http://lists.openembedded.org/mailman/listinfo/openembedded-devel
[oe] [meta-initramfs][PATCH] klibc: fix build with GCC and -pie for mips, mips64, aarch64
The MCONFIG makefiles for mips/mips64 do disable pic so we do not insist linking it with -pie. For aarch64 we have to readd the -Os optimization to avoid | usr/dash/shell.h:103:25: error: '-mgeneral-regs-only' is incompatible with floating-point argument as committed (c296fb707ae3 klibc: Pass Optimization with KLIBCOPTFLAGS) but reverted (76bc58e9329 klibc: Fix build with security flags) trying to fix the i386 build (see ld.bfd: discarded output section: `.got.plt'). This latter issue was fixed for i386 passing -pie to the linker. Signed-off-by: Andrea Adami --- meta-initramfs/recipes-devtools/klibc/klibc.inc | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/meta-initramfs/recipes-devtools/klibc/klibc.inc b/meta-initramfs/recipes-devtools/klibc/klibc.inc index 837b026..6342be0 100644 --- a/meta-initramfs/recipes-devtools/klibc/klibc.inc +++ b/meta-initramfs/recipes-devtools/klibc/klibc.inc @@ -44,7 +44,7 @@ EXTRA_OEMAKE = "'KLIBCARCH=${KLIBC_ARCH}' \ 'INSTALLDIR=${libdir}/klibc' \ 'SHLIBDIR=${libdir}' \ '${KLIBCTHUMB}' \ -'KLIBCOPTFLAGS=${TUNE_CCARGS}' \ +'KLIBCOPTFLAGS=${TUNE_CCARGS} -Os' \ V=1 \ " EXTRA_OEMAKE += "'EXTRA_KLIBCAFLAGS=${SECURITY_CFLAGS} -Wa,--noexecstack' \ @@ -76,3 +76,5 @@ KLIBC_ARCH_powerpc64 = "ppc64" THIS_LIBKLIBC = "libklibc (= ${PV}-${PR})" SECURITY_LDFLAGS = "${@'-z relro -z now -pie' if '${GCCPIE}' else ''}" +SECURITY_LDFLAGS_mips = "" +SECURITY_LDFLAGS_mips64 = "" -- 2.7.4 -- ___ Openembedded-devel mailing list Openembedded-devel@lists.openembedded.org http://lists.openembedded.org/mailman/listinfo/openembedded-devel
Re: [oe] [meta-initramfs][PATCH v2] klibc: fix build on i386 with GCC and security flags enabled
On 2018年09月15日 18:58, Andrea Adami wrote: On Sat, Sep 15, 2018 at 10:15 AM Hongxu Jia wrote: On 2018年09月15日 02:02, Andrea Adami wrote: ld fails if distro's security-flags are enabled: Inject the SECURITY_XFLAGS if security_flags.inc was included. Fix on i386: ld: discarded output section: `.got.plt' Signed-off-by: Andrea Adami --- meta-initramfs/recipes-devtools/klibc/klibc.inc | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/meta-initramfs/recipes-devtools/klibc/klibc.inc b/meta-initramfs/recipes-devtools/klibc/klibc.inc index 3d25e96..837b026 100644 --- a/meta-initramfs/recipes-devtools/klibc/klibc.inc +++ b/meta-initramfs/recipes-devtools/klibc/klibc.inc @@ -47,7 +47,8 @@ EXTRA_OEMAKE = "'KLIBCARCH=${KLIBC_ARCH}' \ 'KLIBCOPTFLAGS=${TUNE_CCARGS}' \ V=1 \ " -EXTRA_OEMAKE += 'EXTRA_KLIBCAFLAGS="-Wa,--noexecstack" EXTRA_KLIBCLDFLAGS="-z noexecstack"' +EXTRA_OEMAKE += "'EXTRA_KLIBCAFLAGS=${SECURITY_CFLAGS} -Wa,--noexecstack' \ + 'EXTRA_KLIBCLDFLAGS=${SECURITY_LDFLAGS} -z noexecstack'" Is it necessary to pass SECURITY_XFLAGS directly? While including security_flags.inc, CC will contain SECURITY_CFLAGS and LDFLAGS will contain SECURITY_LDFLAGS. Maybe you should make sure to pass LDFLAGS to EXTRA_KLIBCLDFLAGS to avoid ldflags qa warning. [security_flags.inc] 58 TARGET_CC_ARCH_append_class-target = " ${SECURITY_CFLAGS}" 59 TARGET_LDFLAGS_append_class-target = " ${SECURITY_LDFLAGS}" [security_flags.inc] export FIX_ARMV4_EABI_BX = "${FIX_V4BX}" KLIBCTHUMB = "${@['CONFIG_KLIBC_THUMB=n', 'CONFIG_KLIBC_THUMB=y'][(d.getVar('ARM_INSTRUCTION_SET') == 'thumb')]}" @@ -74,5 +75,4 @@ KLIBC_ARCH_powerpc = "ppc" KLIBC_ARCH_powerpc64 = "ppc64" THIS_LIBKLIBC = "libklibc (= ${PV}-${PR})" -SECURITY_CFLAGS = "-fno-PIE -no-pie" -SECURITY_LDFLAGS = "-no-pie" +SECURITY_LDFLAGS = "${@'-z relro -z now -pie' if '${GCCPIE}' else ''}" The same reason, it is not necessary to test GCCPIE, and it missed "-Wl,"?, how about directly set SECURITY_STACK_PROTECTOR = "" Hi, thanks for reviewing. It is true the SECURITY_CFLAGS are passed to the compiler. The problem is, klibc has its own arch makefiles (MCONFIG) and the linker is called directly, so if you just append the LDFLAGS like this: EXTRA_OEMAKE += "'EXTRA_KLIBCAFLAGS=-Wa,--noexecstack' \ 'EXTRA_KLIBCLDFLAGS=${LDFLAGS} -z noexecstack'" you get: i586-oe-linux-musl-ld.bfd -m elf_i386 -o usr/kinit/ipconfig/static/ipconfig -W l,-O1 -Wl,--hash-style=gnu -Wl,--as-needed -z relro -z now -pie -z noexecstack u sr/klibc/arch/i386/crt0.o --start-group usr/kinit/ipconfig/main.o usr/kinit/ipc onfig/netdev.o usr/kinit/ipconfig/packet.o usr/kinit/ipconfig/dhcp_proto.o usr/k init/ipconfig/bootp_proto.o usr/klibc/libc.a /tmp/build/tmp-musl/work/i586-oe-l inux-musl/klibc/2.0.4-r0/recipe-sysroot/usr/lib/i586-oe-linux-musl/*/libgcc.a -- end-group ; cp -f usr/kinit/ipconfig/static/ipconfig usr/kinit/ipconfig/static/i pconfig.g ; i586-oe-linux-musl-strip --strip-all -R .comment -R .note --strip-al l -R .comment -R .note --strip-all -R .comment -R .note usr/kinit/ipconfig/stati c/ipconfig i586-oe-linux-musl-ld.bfd: unrecognized option '-Wl,-O1' Thus I am expliciting the SECURITY_LDFLAGS. Note that this patch, injecting the -pie, does now break build for mips, because the MCONFIG foir mips disables pic. The immediate fix is to remove -pie for mips (standard behavior). OK, thanks for the explain //Hongxu Cheers Andrea //Hongxu -- ___ Openembedded-devel mailing list Openembedded-devel@lists.openembedded.org http://lists.openembedded.org/mailman/listinfo/openembedded-devel
Re: [oe] [meta-initramfs][PATCH v2] klibc: fix build on i386 with GCC and security flags enabled
On Sat, Sep 15, 2018 at 10:15 AM Hongxu Jia wrote: > > On 2018年09月15日 02:02, Andrea Adami wrote: > > ld fails if distro's security-flags are enabled: > > Inject the SECURITY_XFLAGS if security_flags.inc was included. > > > > Fix on i386: ld: discarded output section: `.got.plt' > > > > Signed-off-by: Andrea Adami > > --- > > meta-initramfs/recipes-devtools/klibc/klibc.inc | 6 +++--- > > 1 file changed, 3 insertions(+), 3 deletions(-) > > > > diff --git a/meta-initramfs/recipes-devtools/klibc/klibc.inc > > b/meta-initramfs/recipes-devtools/klibc/klibc.inc > > index 3d25e96..837b026 100644 > > --- a/meta-initramfs/recipes-devtools/klibc/klibc.inc > > +++ b/meta-initramfs/recipes-devtools/klibc/klibc.inc > > @@ -47,7 +47,8 @@ EXTRA_OEMAKE = "'KLIBCARCH=${KLIBC_ARCH}' \ > > 'KLIBCOPTFLAGS=${TUNE_CCARGS}' \ > >V=1 \ > > " > > -EXTRA_OEMAKE += 'EXTRA_KLIBCAFLAGS="-Wa,--noexecstack" > > EXTRA_KLIBCLDFLAGS="-z noexecstack"' > > +EXTRA_OEMAKE += "'EXTRA_KLIBCAFLAGS=${SECURITY_CFLAGS} -Wa,--noexecstack' \ > > + 'EXTRA_KLIBCLDFLAGS=${SECURITY_LDFLAGS} -z noexecstack'" > > > Is it necessary to pass SECURITY_XFLAGS directly? While including > security_flags.inc, > CC will contain SECURITY_CFLAGS and LDFLAGS will contain SECURITY_LDFLAGS. > Maybe you should make sure to pass LDFLAGS to EXTRA_KLIBCLDFLAGS to avoid > ldflags qa warning. > > [security_flags.inc] > 58 TARGET_CC_ARCH_append_class-target = " ${SECURITY_CFLAGS}" > 59 TARGET_LDFLAGS_append_class-target = " ${SECURITY_LDFLAGS}" > [security_flags.inc] > > > export FIX_ARMV4_EABI_BX = "${FIX_V4BX}" > > KLIBCTHUMB = "${@['CONFIG_KLIBC_THUMB=n', > > 'CONFIG_KLIBC_THUMB=y'][(d.getVar('ARM_INSTRUCTION_SET') == 'thumb')]}" > > @@ -74,5 +75,4 @@ KLIBC_ARCH_powerpc = "ppc" > > KLIBC_ARCH_powerpc64 = "ppc64" > > THIS_LIBKLIBC = "libklibc (= ${PV}-${PR})" > > > > -SECURITY_CFLAGS = "-fno-PIE -no-pie" > > -SECURITY_LDFLAGS = "-no-pie" > > +SECURITY_LDFLAGS = "${@'-z relro -z now -pie' if '${GCCPIE}' else ''}" > > The same reason, it is not necessary to test GCCPIE, > > and it missed "-Wl,"?, how about directly set SECURITY_STACK_PROTECTOR = "" > Hi, thanks for reviewing. It is true the SECURITY_CFLAGS are passed to the compiler. The problem is, klibc has its own arch makefiles (MCONFIG) and the linker is called directly, so if you just append the LDFLAGS like this: EXTRA_OEMAKE += "'EXTRA_KLIBCAFLAGS=-Wa,--noexecstack' \ 'EXTRA_KLIBCLDFLAGS=${LDFLAGS} -z noexecstack'" you get: i586-oe-linux-musl-ld.bfd -m elf_i386 -o usr/kinit/ipconfig/static/ipconfig -W l,-O1 -Wl,--hash-style=gnu -Wl,--as-needed -z relro -z now -pie -z noexecstack u sr/klibc/arch/i386/crt0.o --start-group usr/kinit/ipconfig/main.o usr/kinit/ipc onfig/netdev.o usr/kinit/ipconfig/packet.o usr/kinit/ipconfig/dhcp_proto.o usr/k init/ipconfig/bootp_proto.o usr/klibc/libc.a /tmp/build/tmp-musl/work/i586-oe-l inux-musl/klibc/2.0.4-r0/recipe-sysroot/usr/lib/i586-oe-linux-musl/*/libgcc.a -- end-group ; cp -f usr/kinit/ipconfig/static/ipconfig usr/kinit/ipconfig/static/i pconfig.g ; i586-oe-linux-musl-strip --strip-all -R .comment -R .note --strip-al l -R .comment -R .note --strip-all -R .comment -R .note usr/kinit/ipconfig/stati c/ipconfig i586-oe-linux-musl-ld.bfd: unrecognized option '-Wl,-O1' Thus I am expliciting the SECURITY_LDFLAGS. Note that this patch, injecting the -pie, does now break build for mips, because the MCONFIG foir mips disables pic. The immediate fix is to remove -pie for mips (standard behavior). Cheers Andrea > > //Hongxu > -- ___ Openembedded-devel mailing list Openembedded-devel@lists.openembedded.org http://lists.openembedded.org/mailman/listinfo/openembedded-devel
[oe] [openembedded][Qt5]: typing problem.
HI everyone, I am trying to build custom image supporting wayland weston instead of x11 and support qt5 apps. I successfully built it but when I try to type any thing in the text box in the qt5 app. no thing happen !! also the initial text in text boxes appears very small!! I added "fontconfig" and "frretype" to the PACAGECONFIG variabl in qtbase_git.bb recipe.. How to solve this problem ? Thank you in advance, Regards, -- Mohamed Dawod Computer Engineering Department Faculty of Engineering Cairo University -- ___ Openembedded-devel mailing list Openembedded-devel@lists.openembedded.org http://lists.openembedded.org/mailman/listinfo/openembedded-devel
Re: [oe] [meta-initramfs][PATCH v2] klibc: fix build on i386 with GCC and security flags enabled
On 2018年09月15日 02:02, Andrea Adami wrote: ld fails if distro's security-flags are enabled: Inject the SECURITY_XFLAGS if security_flags.inc was included. Fix on i386: ld: discarded output section: `.got.plt' Signed-off-by: Andrea Adami --- meta-initramfs/recipes-devtools/klibc/klibc.inc | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/meta-initramfs/recipes-devtools/klibc/klibc.inc b/meta-initramfs/recipes-devtools/klibc/klibc.inc index 3d25e96..837b026 100644 --- a/meta-initramfs/recipes-devtools/klibc/klibc.inc +++ b/meta-initramfs/recipes-devtools/klibc/klibc.inc @@ -47,7 +47,8 @@ EXTRA_OEMAKE = "'KLIBCARCH=${KLIBC_ARCH}' \ 'KLIBCOPTFLAGS=${TUNE_CCARGS}' \ V=1 \ " -EXTRA_OEMAKE += 'EXTRA_KLIBCAFLAGS="-Wa,--noexecstack" EXTRA_KLIBCLDFLAGS="-z noexecstack"' +EXTRA_OEMAKE += "'EXTRA_KLIBCAFLAGS=${SECURITY_CFLAGS} -Wa,--noexecstack' \ + 'EXTRA_KLIBCLDFLAGS=${SECURITY_LDFLAGS} -z noexecstack'" Is it necessary to pass SECURITY_XFLAGS directly? While including security_flags.inc, CC will contain SECURITY_CFLAGS and LDFLAGS will contain SECURITY_LDFLAGS. Maybe you should make sure to pass LDFLAGS to EXTRA_KLIBCLDFLAGS to avoid ldflags qa warning. [security_flags.inc] 58 TARGET_CC_ARCH_append_class-target = " ${SECURITY_CFLAGS}" 59 TARGET_LDFLAGS_append_class-target = " ${SECURITY_LDFLAGS}" [security_flags.inc] export FIX_ARMV4_EABI_BX = "${FIX_V4BX}" KLIBCTHUMB = "${@['CONFIG_KLIBC_THUMB=n', 'CONFIG_KLIBC_THUMB=y'][(d.getVar('ARM_INSTRUCTION_SET') == 'thumb')]}" @@ -74,5 +75,4 @@ KLIBC_ARCH_powerpc = "ppc" KLIBC_ARCH_powerpc64 = "ppc64" THIS_LIBKLIBC = "libklibc (= ${PV}-${PR})" -SECURITY_CFLAGS = "-fno-PIE -no-pie" -SECURITY_LDFLAGS = "-no-pie" +SECURITY_LDFLAGS = "${@'-z relro -z now -pie' if '${GCCPIE}' else ''}" The same reason, it is not necessary to test GCCPIE, and it missed "-Wl,"?, how about directly set SECURITY_STACK_PROTECTOR = "" //Hongxu -- ___ Openembedded-devel mailing list Openembedded-devel@lists.openembedded.org http://lists.openembedded.org/mailman/listinfo/openembedded-devel
Re: [oe] [meta-oe][PATCH v2] libdevmapper: Install dmsetup
It is fine to me //Hongxu On 2018年09月15日 07:57, Andrew Bresticker wrote: Commit 6aa1dd223a140 ("lvm2/libdevmapper: fix invoking lvcreate failed") moved installation of dmsetup back to lvm2 from libdevmapper, but dmsetup had intentionally been moved to libdevmapper in commit 269d009a81d4 ("lvm2: libdevicemapper package needs udev rules and dmsetup"). Add it back to libdevmapper by explicitly installing it in do_install(), and refresh explicitly-do-not-install-libdm.patch so that we also explicitly do not install dmsetup as part of lvm2. Signed-off-by: Andrew Bresticker --- .../lvm2/libdevmapper_2.02.180.bb | 1 + ...0001-explicitly-do-not-install-libdm.patch | 28 +++ 2 files changed, 23 insertions(+), 6 deletions(-) diff --git a/meta-oe/recipes-support/lvm2/libdevmapper_2.02.180.bb b/meta-oe/recipes-support/lvm2/libdevmapper_2.02.180.bb index f3f11ef64..26af3275d 100644 --- a/meta-oe/recipes-support/lvm2/libdevmapper_2.02.180.bb +++ b/meta-oe/recipes-support/lvm2/libdevmapper_2.02.180.bb @@ -9,6 +9,7 @@ TARGET_CC_ARCH += "${LDFLAGS}" do_install() { oe_runmake 'DESTDIR=${D}' -C libdm install +oe_runmake 'DESTDIR=${D}' -C tools install_device-mapper } RRECOMMENDS_${PN}_append_class-target = " lvm2-udevrules" diff --git a/meta-oe/recipes-support/lvm2/lvm2/0001-explicitly-do-not-install-libdm.patch b/meta-oe/recipes-support/lvm2/lvm2/0001-explicitly-do-not-install-libdm.patch index e85818dbd..7f5dd9334 100644 --- a/meta-oe/recipes-support/lvm2/lvm2/0001-explicitly-do-not-install-libdm.patch +++ b/meta-oe/recipes-support/lvm2/lvm2/0001-explicitly-do-not-install-libdm.patch @@ -1,4 +1,4 @@ -From 0a8e466fcf99622896e070c5133165e4278e8cfb Mon Sep 17 00:00:00 2001 +From 5a3e13ae94318c2bed60f875bb3852c45ce0113c Mon Sep 17 00:00:00 2001 From: Hongxu Jia Date: Thu, 25 May 2017 05:27:11 -0400 Subject: [PATCH] explicitly do not install libdm @@ -9,12 +9,14 @@ explicitly do not do the installation here. Upstream-Status: Inappropriate [meta-oe specific] Signed-off-by: Hongxu Jia +Signed-off-by: Andrew Bresticker --- libdm/Makefile.in | 6 -- - 1 file changed, 4 insertions(+), 2 deletions(-) + tools/Makefile.in | 3 ++- + 2 files changed, 6 insertions(+), 3 deletions(-) diff --git a/libdm/Makefile.in b/libdm/Makefile.in -index 3c9a4ce..45c91c6 100644 +index 66ec39513..c779c9d86 100644 --- a/libdm/Makefile.in +++ b/libdm/Makefile.in @@ -77,9 +77,11 @@ ifeq ("@PKGCONFIG@", "yes") @@ -23,14 +25,28 @@ index 3c9a4ce..45c91c6 100644 -install: $(INSTALL_TYPE) install_include +install: -+ echo "Do not install device mappler in lvm2" ++ echo "Do not install device mapper in lvm2" -install_device-mapper: install +install_device-mapper: -+ echo "Do not install device mappler in lvm2" ++ echo "Do not install device mapper in lvm2" install_include: $(srcdir)/libdevmapper.h $(INSTALL_DATA) -D $< $(includedir)/$( -- ___ Openembedded-devel mailing list Openembedded-devel@lists.openembedded.org http://lists.openembedded.org/mailman/listinfo/openembedded-devel