Thank you Valentin, please add me in cc for future review, so it goes directly 
into the main inbox, and for any people that you want to review your changes. 
Also reply to the patch, so it is easy to comment in the same thread.

I have applied the series into a master build without direct internet 
connectivity. It breaks the build by default since the class is inherit in your 
patch 4.

WARNING: yocto-master/meta/recipes-kernel/linux/linux-yocto_6.12.bb: Exception 
during build_dependencies for fetcher_hashes_dummyfunc                          
               | ETA:  0:00:31
WARNING: yocto-master/meta/recipes-kernel/linux/linux-yocto_6.12.bb: Error 
during finalise of 
/local/edaturu/yocto-master/meta/recipes-kernel/linux/linux-yocto_6.12.bb
WARNING: yocto-master/meta/recipes-kernel/linux/linux-yocto_6.16.bb: Exception 
during build_dependencies for fetcher_hashes_dummyfunc
WARNING: yocto-master/meta/recipes-kernel/linux/linux-yocto_6.16.bb: Error 
during finalise of 
/local/edaturu/yocto-master/meta/recipes-kernel/linux/linux-yocto_6.16.bb
WARNING: yocto-master/meta/recipes-kernel/linux/linux-yocto_6.18.bb: Exception 
during build_dependencies for fetcher_hashes_dummyfunc                          
               | ETA:  0:00:29
WARNING: yocto-master/meta/recipes-kernel/linux/linux-yocto_6.18.bb: Error 
during finalise of 
/local/edaturu/yocto-master/meta/recipes-kernel/linux/linux-yocto_6.18.bb
ERROR: ExpansionError during parsing  
/yocto-master/meta/recipes-kernel/linux/linux-yocto_6.18.bb###########################
                                                    | ETA:  0:00:02
bb.data_smart.ExpansionError: Failure expanding variable 
fetcher_hashes_dummyfunc[vardepvalue], expression was 
${@bb.fetch.get_hashvalue(d)}<mailto:$%[email protected]_hashvalue(d)%7d> which 
triggered exception UntrustedUrl: git -c gc.autoDetach=false -c core.pager=cat 
-c safe.bareRepository=all -c clone.defaultRemoteName=origin ls-remote 
https://github.com/CVEProject/cvelistV5.git
The variable dependency chain for the failure is: 
fetcher_hashes_dummyfunc[vardepvalue]

ERROR: Parsing halted due to errors, see error messages above


You should make sure that nothing is executed by default. You could set a new 
variable to enable the initialization, for example ENABLE_KERNEL_CVE_EXCLUSIONS 
= “1” but it is defaulted to ENABLE_KERNEL_CVE_EXCLUSIONS ?= “0”



The problem is that you are adding into the linux-yocto recipe since it is 
inhering the class. I had exactly the same problem in my original patch.

https://patchwork.yoctoproject.org/project/oe-core/patch/[email protected]/



Since you have the SRC_URI defined, bitbake verifies that the SRCREV is valid. 
If you don’t have internet connection, cannot be verified and the build fails.



SRC_URI:append = " 
${GENERATE_CVE_EXCLUSIONS_SRC_URI};name=generate-cve-exclusions"

SRCREV_generate-cve-exclusions = "${GENERATE_CVE_EXCLUSIONS_SRCREV}"



Probably it needs to be conditionally initialize only if it is the intended 
behaviour. It also add the source in the kernel tree, which probably is not the 
intended behaviour.

Best regards,
Daniel

From: [email protected] 
<[email protected]> On Behalf Of vboudevin via 
lists.openembedded.org
Sent: Thursday, 15 January 2026 20:06
To: [email protected]
Subject: Re: [OE-core] [[PATCH v2] 3/4] generate-cve-exclusions: Move python 
script

Hi Daniel,

I updated the class based on your recommendations: 
https://lists.openembedded.org/g/openembedded-core/message/229427

Now it works with a custom repo/a fixed SRCREV for deterministic purposes (also 
integrated an offline mode based on DL_DIR content).

Keep me informed if you see something else to modify.
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#229526): 
https://lists.openembedded.org/g/openembedded-core/message/229526
Mute This Topic: https://lists.openembedded.org/mt/117111077/21656
Group Owner: [email protected]
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[[email protected]]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to