[yocto] tzdata overwrites existing localtime/zoneinfo?

2018-10-25 Thread Anders Montonen
Hi,

It seems to me that the tzdata package will overwrite whatever the current time 
zone is with its default. This is not great if you’re upgrading the package on 
an existing system. Should the creation of the file and link be removed from 
the do_install and only be done in the pkg_postinst?

Regards,
Anders Montonen
-- 
___
yocto mailing list
yocto@yoctoproject.org
https://lists.yoctoproject.org/listinfo/yocto


[yocto] Using dpkg-buildpackage within Yocto image

2018-10-25 Thread Fabian Sturm
Hello,


I would like to be able to build debian packages on yocto itself. This means I 
would call something like this: 


    dpkg-buildpackage -us -uc -rfakeroot


This already does not work, since fakeroot does not exist in the image. It 
seems there was an older recipe for this but I can't find it in newer releases 
(sumo).

If I build without -rfakeroot as root user I get a step further but then I get:


    dpkg-checkbuilddeps: error: Unmet build dependencies: debhelper (>= 9) 
dh-systemd


I unfortunately could not find the right recipes which would provide those 
files. Am I missing something?


Thanks in advance,

Fabian


-- 
von unterwegs-- 
___
yocto mailing list
yocto@yoctoproject.org
https://lists.yoctoproject.org/listinfo/yocto


[yocto] build core-image-minimal with no bootloader

2018-10-25 Thread Cristian Bercaru
Hello!

How do I build a core-image-minimal without any bootloader ?

I tried adding the following lines in conf/local.conf, but without any effect
IMAGE_BOOTLOADER = ""
PREFERRED_PROVIDER_u-boot = ""
PREFERRED_PROVIDER_virtual/bootloader = ""

Thank you,
Cristian Bercaru
-- 
___
yocto mailing list
yocto@yoctoproject.org
https://lists.yoctoproject.org/listinfo/yocto


Re: [yocto] Working on Dependent Recipes in eSDK

2018-10-25 Thread Aaron_Wright
> ChenQi  wrote on 10/22/2018 07:04:32 PM:
> 
> Hi Aaron,
> 
> The main pain for now is that `devtool sdk-install ' does 

> not work as expected, right?
> I just checked the codes of sdk-install, and found that it does not fit 
> the current RSS design.
> I'd like to check with you if this is the major concern from your team?
> Do you have some other concerns?
> I'll open enhancements/bugs on bugzilla and hopefully will work on them 
> in the 2.7 development cycle.
> 
> Best Regards,
> Chen Qi
> 
> ... snip ...

Well, I'm not quite sure how "devtool sdk-install " 
relates after "devtool modify " has been called. 

My developers use devtool to install dependent recipes into the eSDK when
they start working on something. Often they find that they need to make a
change in the library code that a dependent recipe provides. In effect,
they are developing a patch for the dependent recipe. So they use devtool
to say they're going to modify that dependent recipe, and they go and
make the changes they want. Then what? How do they get those changes,
that patch, available to the eSDK?

Any changes made to the library code provided by the dependent recipe are
not available to the eSDK, except through devtool commands. In effect
there are two different worlds at play, the eSDK sysroots versus the
recipe sysroots. The devtool commands seem to make use of the recipe
sysroots, but in my mind that defeats the purpose of an eSDK. So I made
a plug-in for devtool were I can force the eSDK sysroots to be updated.
I'm not sure how that works, but it seems to propagate the workspace 
(recipe sysroot land) to the eSDK, so changes that developers make are
now available for use.

I want my developers to use the toolchain (cmake, make, gcc, etc) 
provided by the eSDK and by things installed into it 
(devtool sdk-install), rather than having to use devtool as their
iterative build command.

Ultimately, I would like to be able to skip my devtool plug-in, as it 
requires the use of "devtool build " and 
"devtool sdk-sysroot" each time a dependent recipe is modified. But I am
not sure how that would work, other than the devtool build command 
should be updating the eSDK sysroots itself.
-- 
___
yocto mailing list
yocto@yoctoproject.org
https://lists.yoctoproject.org/listinfo/yocto


Re: [yocto] Need Help To Solve Errors while build of Yocto Project

2018-10-25 Thread Scott Rifenbark
Hi,

I am not a developer but according to that manual, one of the requirements
is Python 3.4 or greater.  I see Python2 stuff in the attached screen
shots.  Someone else could probably be more definitive.  That might not be
the reason but you could try with Python 3.

https://www.yoctoproject.org/docs/2.5.1/brief-yoctoprojectqs/brief-yoctoprojectqs.html#brief-compatible-distro

Scott

On Thu, Oct 25, 2018 at 8:13 AM Bhavin Dharmendrabhai Maru <
bhavin.m...@vvdntech.in> wrote:

> Hi Support Team,
>
> I am new to yocto project and start to build yocto project by the steps
> provided in below link:
>
> https://www.yoctoproject.org/docs/2.5.1/brief-yoctoprojectqs/brief-yoctoprojectqs.html
>
> I am getting errors when i give *$ bitbake core-image-sato *command.
> details screenshot of errors are attached with this email for your
> reference.
>
> Kindly help me to solve these errors. Any help in this will be appreciated.
>
> Thanks and Regards,
> Bhavin Maru
> --
> ___
> yocto mailing list
> yocto@yoctoproject.org
> https://lists.yoctoproject.org/listinfo/yocto
>
-- 
___
yocto mailing list
yocto@yoctoproject.org
https://lists.yoctoproject.org/listinfo/yocto


[yocto] [SDK] including kernel devsrc to the SDK failes

2018-10-25 Thread Måns Zigher
Hi,

I am trying to add the kernel devsrc to the SDK but I am getting the
following error

Problem: conflicting requests
  - nothing provides /bin/awk needed by kernel-devsrc-1.0-r0.imx8mqevk

I have applied the following patch to try and fix this problem.

http://git.yoctoproject.org/cgit/cgit.cgi/linux-yocto/commit/?id=8af11c1cdd8fa08217e702b57cf96e9030db52b2

I have verified that it was applied and run kernel-devsrc works. The error
is from do_populate_sdk and I am suspecting that the problem is related to
me using rpm. I believe rpm might be to smart in this case detecting the
dependency and resulting dnf from failing when running the task
do_populate_sdk. Any suggestion on how to get forward on this error. I
would like to run dnf manually to check any dependency of the kernel-devsrc
rpm package but cannot figure out how.

BR
Måns Zigher
-- 
___
yocto mailing list
yocto@yoctoproject.org
https://lists.yoctoproject.org/listinfo/yocto


Re: [linux-yocto] [PATCH] netfilter: Fix kmemleak false positive reports

2018-10-25 Thread He Zhe


On 2018/10/25 18:29, Bruce Ashfield wrote:
> On 10/23/18 6:33 AM, zhe...@windriver.com wrote:
>> From: He Zhe 
>>
>> unreferenced object 0x9643edb89900 (size 256):
>>    comm "sd-resolve", pid 220, jiffies 4295016710 (age 208.256s)
>>    hex dump (first 32 bytes):
>>  01 00 00 00 00 00 00 00 03 00 74 f3 ba b1 b6 b5  ..t.
>>  65 3e 00 00 00 00 00 00 90 f9 a0 ed 43 96 ff ff  e>..C...
>>    backtrace:
>>  [<70d5b185>] kmem_cache_alloc+0x146/0x200
>>  [<07a27faa>] __nf_conntrack_alloc.isra.13+0x4d/0x170 
>> [nf_conntrack]
>>  [] init_conntrack+0x6a/0x2f0 [nf_conntrack]
>>  [<3d38809f>] nf_conntrack_in+0x2c5/0x360 [nf_conntrack]
>>  [<1fe154e3>] ipv4_conntrack_local+0x5d/0x70 [nf_conntrack_ipv4]
>>  [<27adadb2>] nf_hook_slow+0x48/0xd0
>>  [<9893511f>] __ip_local_out+0xbd/0xf0
>>  [] ip_local_out+0x1c/0x50
>>  [<995e2f37>] ip_send_skb+0x19/0x40
>>  [<3d95f220>] udp_send_skb.isra.5+0x157/0x360
>>  [] udp_sendmsg+0x9d8/0xc10
>>  [<3bef56ec>] inet_sendmsg+0x3e/0xf0
>>  [<8d23e405>] sock_sendmsg+0x1d/0x30
>>  [<8c297097>] ___sys_sendmsg+0x108/0x2b0
>>  [] __sys_sendmmsg+0xba/0x1c0
>>  [] __x64_sys_sendmmsg+0x24/0x30
>>
>> In __nf_conntrack_confirm, object ct can be referenced to by the stack 
>> variable
>> ct and the members of ct->tuplehash. kmemleak needs at least one of them to 
>> find
>> the ct object during scan.
>>
>> When the ct object is moved from the unconfirmed hlist to the confirmed 
>> hlist.
>> kmemleak cannot see ct object if things happen in the following order and 
>> thus
>> give the above false positive report.
>> 1) ct object is removed from unconfirmed hlist.
>> 2) kmemleak scans data/bss sections.
>> 3) ct object is added to confirmed hlist and ct is destroyed as the function
>>     returns.
>> 4) kmemleak scans task stacks.
>>
>> This patch marks the ct object as not a leak.
>
> Has this also been submitted upstream ?
>
> Due to travel, I haven't gotten to it yet. But if it has been submitted
> upstream, I can get it merged by Monday

This has been submitted to lkml but has not got any attention. Mark
and I still are working on it to pinpoint the bad code.

Zhe

>
> Bruce
>
>>
>> Signed-off-by: He Zhe 
>> ---
>> This is only for v4.18
>>
>>   net/netfilter/nf_conntrack_core.c | 3 +++
>>   1 file changed, 3 insertions(+)
>>
>> diff --git a/net/netfilter/nf_conntrack_core.c 
>> b/net/netfilter/nf_conntrack_core.c
>> index 3d52804..9b554c7 100644
>> --- a/net/netfilter/nf_conntrack_core.c
>> +++ b/net/netfilter/nf_conntrack_core.c
>> @@ -35,6 +35,7 @@
>>   #include 
>>   #include 
>>   #include 
>> +#include 
>>     #include 
>>   #include 
>> @@ -1138,6 +1139,8 @@ __nf_conntrack_alloc(struct net *net,
>>   if (ct == NULL)
>>   goto out;
>>   +    kmemleak_not_leak(ct);
>> +
>>   spin_lock_init(>lock);
>>   ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple = *orig;
>>   ct->tuplehash[IP_CT_DIR_ORIGINAL].hnnode.pprev = NULL;
>>
>
>

-- 
___
linux-yocto mailing list
linux-yocto@yoctoproject.org
https://lists.yoctoproject.org/listinfo/linux-yocto


Re: [yocto] [yocto-docs][PATCH v2] kernel-dev: note about the change detection of kernel feature files

2018-10-25 Thread Bruce Ashfield

On 10/22/18 5:07 AM, Urs Fässler wrote:

It is not the expected behavior that changes on the .cfg files only
referenced from .scc files are not detected.


This looks good to me.

Also note that I have an outstanding bugzilla to see if I can invalidate
stamps, etc, when these elements change .. so at that point, I'd be able
to fixup this documentation section.

Bruce



Signed-off-by: Urs Fässler 
Signed-off-by: Pascal Bach 
---
  documentation/kernel-dev/kernel-dev-common.xml | 4 
  1 file changed, 4 insertions(+)

diff --git a/documentation/kernel-dev/kernel-dev-common.xml 
b/documentation/kernel-dev/kernel-dev-common.xml
index 83b02b1c1..2e421e7ba 100644
--- a/documentation/kernel-dev/kernel-dev-common.xml
+++ b/documentation/kernel-dev/kernel-dev-common.xml
@@ -2623,6 +2623,10 @@
  .scc file in the
  SRC_URI statement to reference multiple 
kernel
  features.
+
+Bitbake only detects changes on files listed in
+SRC_URI.
+
  
  
  




--
___
yocto mailing list
yocto@yoctoproject.org
https://lists.yoctoproject.org/listinfo/yocto


Re: [linux-yocto] [PATCH] ipv4: net namespace does not inherit network configurations

2018-10-25 Thread Bruce Ashfield

On 10/24/18 2:27 AM, zhe...@windriver.com wrote:

From: He Zhe 

patch from https://lkml.org/lkml/2014/7/29/119


Did this never make the mainline kernel ?

We either need an upstream git commit hash, or an explanation of
why it didn't make mainline. I haven't read the link you provided,
but I shouldn't have to click on anything in a commit message :D

Bruce



Ipv4 net namespace requires a similar logic change as commit a79ca223e029
[ipv6: fix bad free of addrconf_init_net] introduces for newer kernels.

Since a net namespace is independent to another. That is, there
is no any relationship between the net namespaces. So a new net
namespace should not inherit network configurations from another
net namespace including the host.

CC: Hong Zhiguo 
CC: David S. Miller 
Signed-off-by: Zhu Yanjun 
Signed-off-by: yzhu1 
Signed-off-by: He Zhe 
---
This is for linux-yocto-dev, linux-yocto master and 4.18 branches.

  net/ipv4/devinet.c | 29 -
  1 file changed, 12 insertions(+), 17 deletions(-)

diff --git a/net/ipv4/devinet.c b/net/ipv4/devinet.c
index ea4bd8a..f69b2dd 100644
--- a/net/ipv4/devinet.c
+++ b/net/ipv4/devinet.c
@@ -2412,28 +2412,23 @@ static __net_init int devinet_init_net(struct net *net)
  #endif
  
  	err = -ENOMEM;

-   all = _devconf;
-   dflt = _devconf_dflt;
+   all = kmemdup(_devconf, sizeof(ipv4_devconf), GFP_KERNEL);
+   if (all == NULL)
+   goto err_alloc_all;
  
-	if (!net_eq(net, _net)) {

-   all = kmemdup(all, sizeof(ipv4_devconf), GFP_KERNEL);
-   if (!all)
-   goto err_alloc_all;
-
-   dflt = kmemdup(dflt, sizeof(ipv4_devconf_dflt), GFP_KERNEL);
-   if (!dflt)
-   goto err_alloc_dflt;
+   dflt = kmemdup(_devconf_dflt, sizeof(ipv4_devconf_dflt), 
GFP_KERNEL);
+   if (dflt == NULL)
+   goto err_alloc_dflt;
  
  #ifdef CONFIG_SYSCTL

-   tbl = kmemdup(tbl, sizeof(ctl_forward_entry), GFP_KERNEL);
-   if (!tbl)
-   goto err_alloc_ctl;
+   tbl = kmemdup(tbl, sizeof(ctl_forward_entry), GFP_KERNEL);
+   if (tbl == NULL)
+   goto err_alloc_ctl;
  
-		tbl[0].data = >data[IPV4_DEVCONF_FORWARDING - 1];

-   tbl[0].extra1 = all;
-   tbl[0].extra2 = net;
+   tbl[0].data = >data[IPV4_DEVCONF_FORWARDING - 1];
+   tbl[0].extra1 = all;
+   tbl[0].extra2 = net;
  #endif
-   }
  
  #ifdef CONFIG_SYSCTL

err = __devinet_sysctl_register(net, "all", NETCONFA_IFINDEX_ALL, all);



--
___
linux-yocto mailing list
linux-yocto@yoctoproject.org
https://lists.yoctoproject.org/listinfo/linux-yocto


Re: [linux-yocto] [yocto-4.14][PATCH] sound.cfg: enable SND_SOC_INTEL_SKYLAKE explicitly

2018-10-25 Thread Bruce Ashfield

On 10/23/18 2:28 AM, Anuj Mittal wrote:

This helps kernels that might have the sound/soc kconfig changes backported
to 4.14 [1].


Looks good.

As I mentioned in other email, Due to travel, I haven't gotten to it
yet. But it will be merged by Monday.

Bruce



This is selected by default by SND_SOC_INTEL_SKL_* configs in 4.14 that are
enabled to be built already in sound.cfg, so this will not result in any
change in behaviour.

[1] 
https://github.com/torvalds/linux/commit/f6a118a800e35af2c63f90cbcc23093f4b53b3a2

Signed-off-by: Anuj Mittal 
---
  cfg/sound.cfg | 1 +
  1 file changed, 1 insertion(+)

diff --git a/cfg/sound.cfg b/cfg/sound.cfg
index e8b2a921..51568d4d 100644
--- a/cfg/sound.cfg
+++ b/cfg/sound.cfg
@@ -59,6 +59,7 @@ CONFIG_SND_SOC_INTEL_CHT_BSW_RT5645_MACH=m
  CONFIG_SND_SOC_INTEL_CHT_BSW_MAX98090_TI_MACH=m
  CONFIG_SND_SOC_INTEL_SKL_NAU88L25_SSM4567_MACH=m
  CONFIG_SND_SOC_INTEL_SKL_NAU88L25_MAX98357A_MACH=m
+CONFIG_SND_SOC_INTEL_SKYLAKE=m
  CONFIG_SND_SOC_AC97_CODEC=m
  CONFIG_SND_SOC_AK4104=m
  CONFIG_SND_SOC_AK4554=m



--
___
linux-yocto mailing list
linux-yocto@yoctoproject.org
https://lists.yoctoproject.org/listinfo/linux-yocto


Re: [linux-yocto] [PATCH] netfilter: Fix kmemleak false positive reports

2018-10-25 Thread Bruce Ashfield

On 10/23/18 6:33 AM, zhe...@windriver.com wrote:

From: He Zhe 

unreferenced object 0x9643edb89900 (size 256):
   comm "sd-resolve", pid 220, jiffies 4295016710 (age 208.256s)
   hex dump (first 32 bytes):
 01 00 00 00 00 00 00 00 03 00 74 f3 ba b1 b6 b5  ..t.
 65 3e 00 00 00 00 00 00 90 f9 a0 ed 43 96 ff ff  e>..C...
   backtrace:
 [<70d5b185>] kmem_cache_alloc+0x146/0x200
 [<07a27faa>] __nf_conntrack_alloc.isra.13+0x4d/0x170 [nf_conntrack]
 [] init_conntrack+0x6a/0x2f0 [nf_conntrack]
 [<3d38809f>] nf_conntrack_in+0x2c5/0x360 [nf_conntrack]
 [<1fe154e3>] ipv4_conntrack_local+0x5d/0x70 [nf_conntrack_ipv4]
 [<27adadb2>] nf_hook_slow+0x48/0xd0
 [<9893511f>] __ip_local_out+0xbd/0xf0
 [] ip_local_out+0x1c/0x50
 [<995e2f37>] ip_send_skb+0x19/0x40
 [<3d95f220>] udp_send_skb.isra.5+0x157/0x360
 [] udp_sendmsg+0x9d8/0xc10
 [<3bef56ec>] inet_sendmsg+0x3e/0xf0
 [<8d23e405>] sock_sendmsg+0x1d/0x30
 [<8c297097>] ___sys_sendmsg+0x108/0x2b0
 [] __sys_sendmmsg+0xba/0x1c0
 [] __x64_sys_sendmmsg+0x24/0x30

In __nf_conntrack_confirm, object ct can be referenced to by the stack variable
ct and the members of ct->tuplehash. kmemleak needs at least one of them to find
the ct object during scan.

When the ct object is moved from the unconfirmed hlist to the confirmed hlist.
kmemleak cannot see ct object if things happen in the following order and thus
give the above false positive report.
1) ct object is removed from unconfirmed hlist.
2) kmemleak scans data/bss sections.
3) ct object is added to confirmed hlist and ct is destroyed as the function
returns.
4) kmemleak scans task stacks.

This patch marks the ct object as not a leak.


Has this also been submitted upstream ?

Due to travel, I haven't gotten to it yet. But if it has been submitted
upstream, I can get it merged by Monday

Bruce



Signed-off-by: He Zhe 
---
This is only for v4.18

  net/netfilter/nf_conntrack_core.c | 3 +++
  1 file changed, 3 insertions(+)

diff --git a/net/netfilter/nf_conntrack_core.c 
b/net/netfilter/nf_conntrack_core.c
index 3d52804..9b554c7 100644
--- a/net/netfilter/nf_conntrack_core.c
+++ b/net/netfilter/nf_conntrack_core.c
@@ -35,6 +35,7 @@
  #include 
  #include 
  #include 
+#include 
  
  #include 

  #include 
@@ -1138,6 +1139,8 @@ __nf_conntrack_alloc(struct net *net,
if (ct == NULL)
goto out;
  
+	kmemleak_not_leak(ct);

+
spin_lock_init(>lock);
ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple = *orig;
ct->tuplehash[IP_CT_DIR_ORIGINAL].hnnode.pprev = NULL;



--
___
linux-yocto mailing list
linux-yocto@yoctoproject.org
https://lists.yoctoproject.org/listinfo/linux-yocto


Re: [linux-yocto] [PATCH 0/1] config cleanup

2018-10-25 Thread Bruce Ashfield

On 10/22/18 11:28 PM, Anuj Mittal wrote:

Hi Bruce,

Can you please merge this in 4.18, 4.19 and master? Thanks!


The patch looks fine.

Due to travel, I haven't gotten to it yet. But it will be merged
by Monday.

Bruce



Anuj Mittal (1):
   sound.cfg: enable SND_SOC_INTEL_SKYLAKE

  cfg/sound.cfg | 1 +
  1 file changed, 1 insertion(+)



--
___
linux-yocto mailing list
linux-yocto@yoctoproject.org
https://lists.yoctoproject.org/listinfo/linux-yocto


[yocto] [meta-security][PATCH] os-release: remove OS_RELEASE_FEILD extending

2018-10-25 Thread Armin Kuster
depends on the OS_RELEASRE_FEILD os-release changes in core
otherwise yocto-check-layer will fail

Signed-off-by: Armin Kuster 
---
 meta-security-compliance/recipes-core/os-release/os-release.bbappend | 3 ---
 1 file changed, 3 deletions(-)

diff --git 
a/meta-security-compliance/recipes-core/os-release/os-release.bbappend 
b/meta-security-compliance/recipes-core/os-release/os-release.bbappend
index e9fd44a..604bacb 100644
--- a/meta-security-compliance/recipes-core/os-release/os-release.bbappend
+++ b/meta-security-compliance/recipes-core/os-release/os-release.bbappend
@@ -1,4 +1 @@
-OS_RELEASE_FIELDS += "CPE_NAME"
-
 CPE_NAME="cpe:/o:openembedded:nodistro:0"
-
-- 
2.7.4

-- 
___
yocto mailing list
yocto@yoctoproject.org
https://lists.yoctoproject.org/listinfo/yocto


[yocto] [qemu] How to use qemu in your testing cycle

2018-10-25 Thread Måns Zigher
Hi,

I am trying to wrap my head around how to incorporate qemu in our
test/development cycle. I am currently building machine genericx86-64
machine producing a SDK and a number of files. One of them are the
qemuboot.conf file but it have some path that is a relative path to the
work directory. I would like to be able to supply our application developer
a way to start a qemu instance and test out our application without having
them using bitbake. I assume this should be possible but not sure exactly
how to accomplish this? Any input would be appreciated so I can get started.

BR
Måns Zigher
-- 
___
yocto mailing list
yocto@yoctoproject.org
https://lists.yoctoproject.org/listinfo/yocto


[yocto] [meta-security][PATCH 3/3] layer.con: add TESTSUITE define

2018-10-25 Thread Armin Kuster
Signed-off-by: Armin Kuster 
---
 conf/layer.conf | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/conf/layer.conf b/conf/layer.conf
index 675a149..76f5bd6 100644
--- a/conf/layer.conf
+++ b/conf/layer.conf
@@ -12,3 +12,5 @@ BBFILE_PRIORITY_security = "8"
 LAYERSERIES_COMPAT_security = "thud"
 
 LAYERDEPENDS_security = "core openembedded-layer perl-layer networking-layer 
meta-python"
+
+DEFAULT_TEST_SUITES_pn-security-build-image = " ${MINTESTSUITE} ssh scp ptest"
-- 
2.7.4

-- 
___
yocto mailing list
yocto@yoctoproject.org
https://lists.yoctoproject.org/listinfo/yocto


[yocto] [meta-security][PATCH 2/3] packagegroup-core-security: add ptest capable packages

2018-10-25 Thread Armin Kuster
and favor python-scapy

Signed-off-by: Armin Kuster 
---
 .../packagegroup/packagegroup-core-security.bb | 14 +-
 1 file changed, 13 insertions(+), 1 deletion(-)

diff --git a/recipes-security/packagegroup/packagegroup-core-security.bb 
b/recipes-security/packagegroup/packagegroup-core-security.bb
index 718ea5a..653d87b 100644
--- a/recipes-security/packagegroup/packagegroup-core-security.bb
+++ b/recipes-security/packagegroup/packagegroup-core-security.bb
@@ -12,6 +12,7 @@ PACKAGES = "\
 packagegroup-security-ids  \
 packagegroup-security-mac  \
 ${@bb.utils.contains("MACHINE_FEATURES", "tpm", 
"packagegroup-security-tpm", "",d)} \
+${@bb.utils.contains("DISTRO_FEATURES", "ptest", 
"packagegroup-security-ptest", "", d)} \
 "
 
 RDEPENDS_packagegroup-core-security = "\
@@ -20,6 +21,7 @@ RDEPENDS_packagegroup-core-security = "\
 packagegroup-security-ids  \
 packagegroup-security-mac  \
 ${@bb.utils.contains("MACHINE_FEATURES", "tpm", 
"packagegroup-security-tpm", "",d)} \
+${@bb.utils.contains("DISTRO_FEATURES", "ptest", 
"packagegroup-security-ptest", "", d)} \
 "
 
 SUMMARY_packagegroup-security-utils = "Security utilities"
@@ -27,7 +29,7 @@ RDEPENDS_packagegroup-security-utils = "\
 checksec \
 nmap \
 pinentry \
-python3-scapy \
+python-scapy \
 ding-libs \
 xmlsec1 \
 keyutils \
@@ -66,3 +68,13 @@ RDEPENDS_packagegroup-security-mac = " \
 ${@bb.utils.contains("DISTRO_FEATURES", "apparmor", "", "",d)} \
 ${@bb.utils.contains("DISTRO_FEATURES", "smack", "smack", "",d)} \
 "
+
+SUMMARY_packagegroup-security-ptest = "Security packages with ptests"
+RDEPENDS_packagegroup-security-ptest = " \
+samhain-standalone-ptest \
+xmlsec1-ptest \
+keyutils-ptest \
+libseccomp-ptest \
+python-scapy-ptest \
+ptest-runner \
+"
-- 
2.7.4

-- 
___
yocto mailing list
yocto@yoctoproject.org
https://lists.yoctoproject.org/listinfo/yocto


[yocto] [meta-security][PATCH 1/3] packagegroups: add more packages

2018-10-25 Thread Armin Kuster
Signed-off-by: Armin Kuster 
---
 recipes-security/packagegroup/packagegroup-core-security.bb | 6 +-
 1 file changed, 5 insertions(+), 1 deletion(-)

diff --git a/recipes-security/packagegroup/packagegroup-core-security.bb 
b/recipes-security/packagegroup/packagegroup-core-security.bb
index 5317aee..718ea5a 100644
--- a/recipes-security/packagegroup/packagegroup-core-security.bb
+++ b/recipes-security/packagegroup/packagegroup-core-security.bb
@@ -28,6 +28,10 @@ RDEPENDS_packagegroup-security-utils = "\
 nmap \
 pinentry \
 python3-scapy \
+ding-libs \
+xmlsec1 \
+keyutils \
+libseccomp \
 ${@bb.utils.contains("DISTRO_FEATURES", "pax", "pax-utils", "",d)} \
 "
 
@@ -52,7 +56,7 @@ RDEPENDS_packagegroup-security-hardening = " \
 SUMMARY_packagegroup-security-ids = "Security Intrusion Detection systems"
 RDEPENDS_packagegroup-security-ids = " \
 tripwire \
-samhain-client \
+samhain-standalone \
 suricata \
 "
 
-- 
2.7.4

-- 
___
yocto mailing list
yocto@yoctoproject.org
https://lists.yoctoproject.org/listinfo/yocto