Op 26 sep. 2014, om 01:13 heeft Ross Burton ross.bur...@intel.com het
volgende geschreven:
Otherwise this is a non-deterministic build dependency.
Signed-off-by: Ross Burton ross.bur...@intel.com
---
meta/recipes-support/curl/curl_7.37.1.bb |1 +
1 file changed, 1 insertion(+)
diff
On Friday 26 September 2014 08:55:03 Koen Kooi wrote:
Op 26 sep. 2014, om 01:13 heeft Ross Burton ross.bur...@intel.com het
volgende geschreven:
Otherwise this is a non-deterministic build dependency.
Signed-off-by: Ross Burton ross.bur...@intel.com
---
On 26 September 2014 07:55, Koen Kooi k...@dominion.thruhere.net wrote:
Using librtmp has nasty legal consequences in various countries, is there a
way to express that risk? Something analogous to the commercial license
protection we have.
Agreed, but wouldn't that be something done in the
On Friday 26 September 2014 10:43:26 Burton, Ross wrote:
On 26 September 2014 07:55, Koen Kooi k...@dominion.thruhere.net wrote:
Using librtmp has nasty legal consequences in various countries, is there
a way to express that risk? Something analogous to the commercial license
protection we
* pass --enable-debug-frame on aarch64 architecture
* include patches:
- aarch64 port (backported from upstream)
- Support-building-with-older-compilers (fix undefined reference to
`unreachable' on older compilers)
Signed-off-by: Fathi Boudra fathi.bou...@linaro.org
---
Package managements (smart/apt-get/opkg-cl) generate some warn messages
to stdout, and we need to catch them and output by bb.warn.
Here is an example, while invoking smart to attempt install doc packages,
if install failed, it generates warn message to stdout.
...
|warning: Can't install
Test steps:
1. vim local.conf
...
IMAGE_INSTALL_append = shadow man-pages hdparm
EXTRA_IMAGE_FEATURES += doc-pkgs
...
2. bitbake core-image-minimal
...
|WARNING: Unable attempt to install packages. Command '...'
returned 1:
|error: file /usr/share/man/man5/passwd.5 from install of
Paul's patch added checking in smart to ignore failed install with --attempt
...
commit e9c1191da4f84c9743b053e7030ab28b48f57c44
Author: Paul Eggleton paul.eggle...@linux.intel.com
Date: Thu Feb 6 13:39:01 2014 +
python-smartpm: really ignore conflicts during install with --attempt
...
aplay/arecord (alsa-utils v1.0.28) cannot interrupt streaming
via CTRL-C. Fixed the issue by reverting buggy patches and
properly handling 'in_aborting' flag in appropriate functions.
Signed-off-by: Anant Agrawal anant_agra...@mentor.com
Signed-off-by: Mikhail Durnev mikhail_dur...@mentor.com
From: Khem Raj khem_...@cable.comcast.com
CVE-2014-6271
Change-Id: Ia6a9f7dab108f0ba40c84eef2d8a61dc2303f3f3
Signed-off-by: Khem Raj khem_...@cable.comcast.com
---
.../bash/bash-3.2.48/shellshock.patch | 84 +
meta/recipes-extended/bash/bash/shellshock.patch |
From: Khem Raj khem_...@cable.comcast.com
CVE-2014-6271
Change-Id: Ia6a9f7dab108f0ba40c84eef2d8a61dc2303f3f3
Signed-off-by: Khem Raj khem_...@cable.comcast.com
---
.../bash/bash-3.2.48/shellshock.patch | 84 +
meta/recipes-extended/bash/bash/shellshock.patch |
On 9/25/14, 7:23 PM, Bruce Ashfield bruce.ashfi...@windriver.com wrote:
On 2014-09-25, 10:00 PM, nitin.a.kam...@intel.com wrote:
From: Nitin A Kamble nitin.a.kam...@intel.com
The lttng-modules recipe was failing for meta-intel BSPs with the v3.17
kernel.
These BSP kernels were enabling some
CVE-2014-6271
Change-Id: Ia6a9f7dab108f0ba40c84eef2d8a61dc2303f3f3
Signed-off-by: Khem Raj raj.k...@gmail.com
---
.../bash/bash-3.2.48/shellshock.patch | 84 +
meta/recipes-extended/bash/bash/shellshock.patch | 101 +
CVE-2014-6271
Change-Id: Ia6a9f7dab108f0ba40c84eef2d8a61dc2303f3f3
Signed-off-by: Khem Raj raj.k...@gmail.com
---
.../bash/bash-3.2.48/shellshock.patch | 84 +
meta/recipes-extended/bash/bash/shellshock.patch | 101 +
On 14-09-26 12:23 PM, Kamble, Nitin A wrote:
On 9/25/14, 7:23 PM, Bruce Ashfield bruce.ashfi...@windriver.com wrote:
On 2014-09-25, 10:00 PM, nitin.a.kam...@intel.com wrote:
From: Nitin A Kamble nitin.a.kam...@intel.com
The lttng-modules recipe was failing for meta-intel BSPs with the
RP, Saul,
FYI, The fix for lttng-modules has gone upstream now. I have updated the
patch accordingly on the contrib branch.
Thanks,
Nitin
On 9/25/14, 7:00 PM, Kamble, Nitin A nitin.a.kam...@intel.com wrote:
From: Nitin A Kamble nitin.a.kam...@intel.com
The lttng-modules recipe was failing
A warning is issued when run about an unexpected operator due to a
syntax error with an extra if empedded in the shell conditional. Remove
the extra if.
Signed-off-by: Darren Hart dvh...@linux.intel.com
Cc: Bruce Ashfield bruce.ashfi...@windriver.com
---
meta/classes/kernel-yocto.bbclass | 2 +-
On 14-09-26 03:04 PM, Darren Hart wrote:
A warning is issued when run about an unexpected operator due to a
syntax error with an extra if empedded in the shell conditional. Remove
the extra if.
ouch. How on earth did that survive ?
Acked-by: Bruce Ashfield bruce.ashfi...@windriver.com
On 26 September 2014 17:33, Khem Raj raj.k...@gmail.com wrote:
CVE-2014-6271
Is this meant to replace the patch I sent last night, or did you not
notice that? It's been a funny day here, but I was about to send the
C-Pull with that integrated.
Ross
--
This is a followup patch to incomplete CVE-2014-6271 fix
code execution via specially-crafted environment
Change-Id: Ibb0a587ee6e09b8174e92d005356e822ad40d4ed
Signed-off-by: Khem Raj raj.k...@gmail.com
---
meta/recipes-extended/bash/bash-3.2.48/shellshock1.patch | 16
This is a followup patch to incomplete CVE-2014-6271 fix
code execution via specially-crafted environment
Change-Id: Ibb0a587ee6e09b8174e92d005356e822ad40d4ed
Signed-off-by: Khem Raj raj.k...@gmail.com
---
meta/recipes-extended/bash/bash-3.2.48/shellshock1.patch | 16
On Fri, Sep 26, 2014 at 1:15 PM, Burton, Ross ross.bur...@intel.com wrote:
On 26 September 2014 17:33, Khem Raj raj.k...@gmail.com wrote:
CVE-2014-6271
Is this meant to replace the patch I sent last night, or did you not
notice that?
I did not notice that
It's been a funny day here, but I
On Fri, Sep 26, 2014 at 1:15 PM, Burton, Ross ross.bur...@intel.com wrote:
On 26 September 2014 17:33, Khem Raj raj.k...@gmail.com wrote:
CVE-2014-6271
Is this meant to replace the patch I sent last night, or did you not
notice that? It's been a funny day here, but I was about to send the
On 26 September 2014 22:07, Khem Raj raj.k...@gmail.com wrote:
Now that I see, you posted half fix like my first set. So either way
the second patch I sent
it needed to complete this vulnerability. I dont care whichever goes
in for the first one.
I've rebased your second patch onto what I
Hi,
This consolidated pull has been through the AB. There was a failing in the SDK
which has been fixed in this series. There's also a failure in the sanity tests
for systemd but this has been intermittently occuring in master so we should
investigate this independently.
Ross
The following
oprofile_git.bb does not unpack because it stills uses
INC_PR, which is no longer expanded. If one fixes that,
patching fails. Since there is another, later, version oprofile
recipe, we might just as well get rid of this one.
Signed-off-by: Joe Slater jsla...@windriver.com
---
26 matches
Mail list logo