Re: [OE-core] kernel: export native PKGCONFIG variables

2022-12-06 Thread Christian Eggers
Hi Bruce,

on 2021-11-23, you added the following patch:

> 9172d61c57e23682c3d2c25701cbd53c84d01a27
>
> kernel: export native PKGCONFIG variables
>
> In a similar manner to cml1.bbclass, we export the pkg-config
> variables to allow a direct call to pkg-config access to the
> native sysroot versus the target sysroot.
>
> The kernel doesn't use pkg-config for target configuration,
I found some calls in the tools/ directory of the kernel.
Isn't this related to target configuration?

> and has many explicit calls to pkg-config, without the
> possibility of easy override to pkg-config-native.
I just noticed that this has recently changed:

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d5ea4fece4508bf8e72b659cd22fa4840d8d61e5

This change is in Linux 6.0, but not in 5.15. Probably it
could be backported easily.

>
> The calls to pkg-config could be made cross friendly via
> replacement with make variables, but until that effort is
> undertaken upstream, we need a bridge approach.
>
> In particular, this is required for dtschema validation,
> which is a requirement in kernel 5.16+

regards
Christian




___
Christian
Eggers
Software Engineer
​
ARRI
Arnold & Richter Cine Technik GmbH & Co. Betriebs KG
Arriweg 17,
83071
Stephanskirchen
www.arri.com

+49 8036 3009-3118
cegg...@arri.de

​
Get all the latest information from www.arri.com, Facebook, Twitter, Instagram, 
LinkedIn and YouTube.

Arnold & Richter Cine Technik GmbH & Co. Betriebs KG
Sitz: München - Registergericht: Amtsgericht München - Handelsregisternummer: 
HRA 57918
Persönlich haftender Gesellschafter: Arnold & Richter Cine Technik GmbH
Sitz: München - Registergericht: Amtsgericht München - Handelsregisternummer: 
HRB 54477
Geschäftsführer: Dr. Matthias Erb (Chairman); Dr. Michael Neuhäuser; Stephan 
Schenk; Walter Trauninger

​

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#174343): 
https://lists.openembedded.org/g/openembedded-core/message/174343
Mute This Topic: https://lists.openembedded.org/mt/95511690/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-Core][kirkstone][PATCH] grub: backport patches to fix CVE-2022-28736

2022-12-06 Thread Xiangyu Chen
From: Xiangyu Chen 

Signed-off-by: Xiangyu Chen 
---
 ...i-chainloader-Use-grub_loader_set_ex.patch |  86 +
 ...ot-Add-API-to-pass-context-to-loader.patch | 168 ++
 ...hainloader-Simplify-the-loader-state.patch | 129 ++
 meta/recipes-bsp/grub/grub2.inc   |   3 +
 4 files changed, 386 insertions(+)
 create mode 100644 
meta/recipes-bsp/grub/files/CVE-2022-28736-loader-efi-chainloader-Use-grub_loader_set_ex.patch
 create mode 100644 
meta/recipes-bsp/grub/files/commands-boot-Add-API-to-pass-context-to-loader.patch
 create mode 100644 
meta/recipes-bsp/grub/files/loader-efi-chainloader-Simplify-the-loader-state.patch

diff --git 
a/meta/recipes-bsp/grub/files/CVE-2022-28736-loader-efi-chainloader-Use-grub_loader_set_ex.patch
 
b/meta/recipes-bsp/grub/files/CVE-2022-28736-loader-efi-chainloader-Use-grub_loader_set_ex.patch
new file mode 100644
index 00..5741e53f42
--- /dev/null
+++ 
b/meta/recipes-bsp/grub/files/CVE-2022-28736-loader-efi-chainloader-Use-grub_loader_set_ex.patch
@@ -0,0 +1,86 @@
+From 04c86e0bb7b58fc2f913f798cdb18934933e532d Mon Sep 17 00:00:00 2001
+From: Chris Coulson 
+Date: Tue, 5 Apr 2022 11:48:58 +0100
+Subject: [PATCH] loader/efi/chainloader: Use grub_loader_set_ex()
+
+This ports the EFI chainloader to use grub_loader_set_ex() in order to fix
+a use-after-free bug that occurs when grub_cmd_chainloader() is executed
+more than once before a boot attempt is performed.
+
+Fixes: CVE-2022-28736
+
+Signed-off-by: Chris Coulson 
+Reviewed-by: Daniel Kiper 
+
+Upstream-Status: Backport
+CVE: CVE-2022-28736
+
+Reference to upstream patch:
+https://git.savannah.gnu.org/cgit/grub.git/commit/?id=04c86e0bb7b58fc2f913f798cdb18934933e532d
+
+Signed-off-by: Xiangyu Chen 
+---
+ grub-core/loader/efi/chainloader.c | 16 +++-
+ 1 file changed, 7 insertions(+), 9 deletions(-)
+
+diff --git a/grub-core/loader/efi/chainloader.c 
b/grub-core/loader/efi/chainloader.c
+index d1602c89b..7557eb269 100644
+--- a/grub-core/loader/efi/chainloader.c
 b/grub-core/loader/efi/chainloader.c
+@@ -44,11 +44,10 @@ GRUB_MOD_LICENSE ("GPLv3+");
+ 
+ static grub_dl_t my_mod;
+ 
+-static grub_efi_handle_t image_handle;
+-
+ static grub_err_t
+-grub_chainloader_unload (void)
++grub_chainloader_unload (void *context)
+ {
++  grub_efi_handle_t image_handle = (grub_efi_handle_t) context;
+   grub_efi_loaded_image_t *loaded_image;
+   grub_efi_boot_services_t *b;
+ 
+@@ -64,8 +63,9 @@ grub_chainloader_unload (void)
+ }
+ 
+ static grub_err_t
+-grub_chainloader_boot (void)
++grub_chainloader_boot (void *context)
+ {
++  grub_efi_handle_t image_handle = (grub_efi_handle_t) context;
+   grub_efi_boot_services_t *b;
+   grub_efi_status_t status;
+   grub_efi_uintn_t exit_data_size;
+@@ -225,6 +225,7 @@ grub_cmd_chainloader (grub_command_t cmd __attribute__ 
((unused)),
+   grub_efi_physical_address_t address = 0;
+   grub_efi_uintn_t pages = 0;
+   grub_efi_char16_t *cmdline = NULL;
++  grub_efi_handle_t image_handle = NULL;
+ 
+   if (argc == 0)
+ return grub_error (GRUB_ERR_BAD_ARGUMENT, N_("filename expected"));
+@@ -405,7 +406,7 @@ grub_cmd_chainloader (grub_command_t cmd __attribute__ 
((unused)),
+   efi_call_2 (b->free_pages, address, pages);
+   grub_free (file_path);
+ 
+-  grub_loader_set (grub_chainloader_boot, grub_chainloader_unload, 0);
++  grub_loader_set_ex (grub_chainloader_boot, grub_chainloader_unload, 
image_handle, 0);
+   return 0;
+ 
+  fail:
+@@ -423,10 +424,7 @@ grub_cmd_chainloader (grub_command_t cmd __attribute__ 
((unused)),
+ efi_call_2 (b->free_pages, address, pages);
+ 
+   if (image_handle != NULL)
+-{
+-  efi_call_1 (b->unload_image, image_handle);
+-  image_handle = NULL;
+-}
++efi_call_1 (b->unload_image, image_handle);
+ 
+   grub_dl_unref (my_mod);
+ 
+-- 
+2.34.1
+
diff --git 
a/meta/recipes-bsp/grub/files/commands-boot-Add-API-to-pass-context-to-loader.patch
 
b/meta/recipes-bsp/grub/files/commands-boot-Add-API-to-pass-context-to-loader.patch
new file mode 100644
index 00..a2c0530f04
--- /dev/null
+++ 
b/meta/recipes-bsp/grub/files/commands-boot-Add-API-to-pass-context-to-loader.patch
@@ -0,0 +1,168 @@
+From 14ceb3b3ff6db664649138442b6562c114dcf56e Mon Sep 17 00:00:00 2001
+From: Chris Coulson 
+Date: Tue, 5 Apr 2022 10:58:28 +0100
+Subject: [PATCH] commands/boot: Add API to pass context to loader
+
+Loaders rely on global variables for saving context which is consumed
+in the boot hook and freed in the unload hook. In the case where a loader
+command is executed twice, calling grub_loader_set() a second time executes
+the unload hook, but in some cases this runs when the loader's global
+context has already been updated, resulting in the updated context being
+freed and potential use-after-free bugs when the boot hook is subsequently
+called.
+
+This adds a new API, grub_loader_set_ex(), which allows a loader to specify
+context that is passed to its boot and unload hooks. This is an 

[OE-Core][master][langdale][PATCH] grub: backport patches to fix CVE-2022-28736

2022-12-06 Thread Xiangyu Chen
From: Xiangyu Chen 

Signed-off-by: Xiangyu Chen 
---
 ...i-chainloader-Use-grub_loader_set_ex.patch |  86 +
 ...ot-Add-API-to-pass-context-to-loader.patch | 168 ++
 ...hainloader-Simplify-the-loader-state.patch | 129 ++
 meta/recipes-bsp/grub/grub2.inc   |   3 +
 4 files changed, 386 insertions(+)
 create mode 100644 
meta/recipes-bsp/grub/files/CVE-2022-28736-loader-efi-chainloader-Use-grub_loader_set_ex.patch
 create mode 100644 
meta/recipes-bsp/grub/files/commands-boot-Add-API-to-pass-context-to-loader.patch
 create mode 100644 
meta/recipes-bsp/grub/files/loader-efi-chainloader-Simplify-the-loader-state.patch

diff --git 
a/meta/recipes-bsp/grub/files/CVE-2022-28736-loader-efi-chainloader-Use-grub_loader_set_ex.patch
 
b/meta/recipes-bsp/grub/files/CVE-2022-28736-loader-efi-chainloader-Use-grub_loader_set_ex.patch
new file mode 100644
index 00..5741e53f42
--- /dev/null
+++ 
b/meta/recipes-bsp/grub/files/CVE-2022-28736-loader-efi-chainloader-Use-grub_loader_set_ex.patch
@@ -0,0 +1,86 @@
+From 04c86e0bb7b58fc2f913f798cdb18934933e532d Mon Sep 17 00:00:00 2001
+From: Chris Coulson 
+Date: Tue, 5 Apr 2022 11:48:58 +0100
+Subject: [PATCH] loader/efi/chainloader: Use grub_loader_set_ex()
+
+This ports the EFI chainloader to use grub_loader_set_ex() in order to fix
+a use-after-free bug that occurs when grub_cmd_chainloader() is executed
+more than once before a boot attempt is performed.
+
+Fixes: CVE-2022-28736
+
+Signed-off-by: Chris Coulson 
+Reviewed-by: Daniel Kiper 
+
+Upstream-Status: Backport
+CVE: CVE-2022-28736
+
+Reference to upstream patch:
+https://git.savannah.gnu.org/cgit/grub.git/commit/?id=04c86e0bb7b58fc2f913f798cdb18934933e532d
+
+Signed-off-by: Xiangyu Chen 
+---
+ grub-core/loader/efi/chainloader.c | 16 +++-
+ 1 file changed, 7 insertions(+), 9 deletions(-)
+
+diff --git a/grub-core/loader/efi/chainloader.c 
b/grub-core/loader/efi/chainloader.c
+index d1602c89b..7557eb269 100644
+--- a/grub-core/loader/efi/chainloader.c
 b/grub-core/loader/efi/chainloader.c
+@@ -44,11 +44,10 @@ GRUB_MOD_LICENSE ("GPLv3+");
+ 
+ static grub_dl_t my_mod;
+ 
+-static grub_efi_handle_t image_handle;
+-
+ static grub_err_t
+-grub_chainloader_unload (void)
++grub_chainloader_unload (void *context)
+ {
++  grub_efi_handle_t image_handle = (grub_efi_handle_t) context;
+   grub_efi_loaded_image_t *loaded_image;
+   grub_efi_boot_services_t *b;
+ 
+@@ -64,8 +63,9 @@ grub_chainloader_unload (void)
+ }
+ 
+ static grub_err_t
+-grub_chainloader_boot (void)
++grub_chainloader_boot (void *context)
+ {
++  grub_efi_handle_t image_handle = (grub_efi_handle_t) context;
+   grub_efi_boot_services_t *b;
+   grub_efi_status_t status;
+   grub_efi_uintn_t exit_data_size;
+@@ -225,6 +225,7 @@ grub_cmd_chainloader (grub_command_t cmd __attribute__ 
((unused)),
+   grub_efi_physical_address_t address = 0;
+   grub_efi_uintn_t pages = 0;
+   grub_efi_char16_t *cmdline = NULL;
++  grub_efi_handle_t image_handle = NULL;
+ 
+   if (argc == 0)
+ return grub_error (GRUB_ERR_BAD_ARGUMENT, N_("filename expected"));
+@@ -405,7 +406,7 @@ grub_cmd_chainloader (grub_command_t cmd __attribute__ 
((unused)),
+   efi_call_2 (b->free_pages, address, pages);
+   grub_free (file_path);
+ 
+-  grub_loader_set (grub_chainloader_boot, grub_chainloader_unload, 0);
++  grub_loader_set_ex (grub_chainloader_boot, grub_chainloader_unload, 
image_handle, 0);
+   return 0;
+ 
+  fail:
+@@ -423,10 +424,7 @@ grub_cmd_chainloader (grub_command_t cmd __attribute__ 
((unused)),
+ efi_call_2 (b->free_pages, address, pages);
+ 
+   if (image_handle != NULL)
+-{
+-  efi_call_1 (b->unload_image, image_handle);
+-  image_handle = NULL;
+-}
++efi_call_1 (b->unload_image, image_handle);
+ 
+   grub_dl_unref (my_mod);
+ 
+-- 
+2.34.1
+
diff --git 
a/meta/recipes-bsp/grub/files/commands-boot-Add-API-to-pass-context-to-loader.patch
 
b/meta/recipes-bsp/grub/files/commands-boot-Add-API-to-pass-context-to-loader.patch
new file mode 100644
index 00..a2c0530f04
--- /dev/null
+++ 
b/meta/recipes-bsp/grub/files/commands-boot-Add-API-to-pass-context-to-loader.patch
@@ -0,0 +1,168 @@
+From 14ceb3b3ff6db664649138442b6562c114dcf56e Mon Sep 17 00:00:00 2001
+From: Chris Coulson 
+Date: Tue, 5 Apr 2022 10:58:28 +0100
+Subject: [PATCH] commands/boot: Add API to pass context to loader
+
+Loaders rely on global variables for saving context which is consumed
+in the boot hook and freed in the unload hook. In the case where a loader
+command is executed twice, calling grub_loader_set() a second time executes
+the unload hook, but in some cases this runs when the loader's global
+context has already been updated, resulting in the updated context being
+freed and potential use-after-free bugs when the boot hook is subsequently
+called.
+
+This adds a new API, grub_loader_set_ex(), which allows a loader to specify
+context that is passed to its boot and unload hooks. This is an 

Re: [OE-Core][Kirkstone][PATCH] sysstat: fix CVE-2022-39377

2022-12-06 Thread Steve Sakoman
On Tue, Dec 6, 2022 at 3:02 PM Xiangyu Chen
 wrote:
>
> Friendly ping.

Not sure how I missed this!  I've got it now.

Thanks,

Steve

> On 11/19/22 16:17, Xiangyu Chen wrote:
> > Signed-off-by: Xiangyu Chen 
> > ---
> >   .../sysstat/sysstat/CVE-2022-39377.patch  | 93 +++
> >   .../sysstat/sysstat_12.4.5.bb |  3 +-
> >   2 files changed, 95 insertions(+), 1 deletion(-)
> >   create mode 100644 
> > meta/recipes-extended/sysstat/sysstat/CVE-2022-39377.patch
> >
> > diff --git a/meta/recipes-extended/sysstat/sysstat/CVE-2022-39377.patch 
> > b/meta/recipes-extended/sysstat/sysstat/CVE-2022-39377.patch
> > new file mode 100644
> > index 00..dce7b0d61f
> > --- /dev/null
> > +++ b/meta/recipes-extended/sysstat/sysstat/CVE-2022-39377.patch
> > @@ -0,0 +1,93 @@
> > +From 9c4eaf150662ad40607923389d4519bc83b93540 Mon Sep 17 00:00:00 2001
> > +From: Sebastien 
> > +Date: Sat, 15 Oct 2022 14:24:22 +0200
> > +Subject: [PATCH] Fix size_t overflow in sa_common.c (GHSL-2022-074)
> > +
> > +allocate_structures function located in sa_common.c insufficiently
> > +checks bounds before arithmetic multiplication allowing for an
> > +overflow in the size allocated for the buffer representing system
> > +activities.
> > +
> > +This patch checks that the post-multiplied value is not greater than
> > +UINT_MAX.
> > +
> > +Signed-off-by: Sebastien 
> > +
> > +Upstream-Status: Backport from
> > +[https://github.com/sysstat/sysstat/commit/a953ee3307d51255cc96e1f211882e97f795eed9]
> > +
> > +Signed-off-by: Xiangyu Chen 
> > +---
> > + common.c| 25 +
> > + common.h|  2 ++
> > + sa_common.c |  6 ++
> > + 3 files changed, 33 insertions(+)
> > +
> > +diff --git a/common.c b/common.c
> > +index 81c7762..1a84b05 100644
> > +--- a/common.c
> >  b/common.c
> > +@@ -1655,4 +1655,29 @@ int parse_values(char *strargv, unsigned char 
> > bitmap[], int max_val, const char
> > +
> > + return 0;
> > + }
> > ++
> > ++/*
> > ++ 
> > ***
> > ++ * Check if the multiplication of the 3 values may be greater than 
> > UINT_MAX.
> > ++ *
> > ++ * IN:
> > ++ * @val1First value.
> > ++ * @val2Second value.
> > ++ * @val3Third value.
> > ++ 
> > ***
> > ++ */
> > ++void check_overflow(size_t val1, size_t val2, size_t val3)
> > ++{
> > ++if ((unsigned long long) val1 *
> > ++(unsigned long long) val2 *
> > ++(unsigned long long) val3 > UINT_MAX) {
> > ++#ifdef DEBUG
> > ++fprintf(stderr, "%s: Overflow detected (%llu). Aborting...\n",
> > ++__FUNCTION__,
> > ++(unsigned long long) val1 * (unsigned long long) val2 
> > * (unsigned long long) val3);
> > ++#endif
> > ++exit(4);
> > ++}
> > ++}
> > ++
> > + #endif /* SOURCE_SADC undefined */
> > +diff --git a/common.h b/common.h
> > +index 55b6657..e8ab98a 100644
> > +--- a/common.h
> >  b/common.h
> > +@@ -260,6 +260,8 @@ int check_dir
> > + (char *);
> > +
> > + #ifndef SOURCE_SADC
> > ++void check_overflow
> > ++(size_t, size_t, size_t);
> > + int count_bits
> > + (void *, int);
> > + int count_csvalues
> > +diff --git a/sa_common.c b/sa_common.c
> > +index 3699a84..b2cec4a 100644
> > +--- a/sa_common.c
> >  b/sa_common.c
> > +@@ -459,7 +459,13 @@ void allocate_structures(struct activity *act[])
> > + int i, j;
> > +
> > + for (i = 0; i < NR_ACT; i++) {
> > ++
> > + if (act[i]->nr_ini > 0) {
> > ++
> > ++/* Look for a possible overflow */
> > ++check_overflow((size_t) act[i]->msize, (size_t) 
> > act[i]->nr_ini,
> > ++   (size_t) act[i]->nr2);
> > ++
> > + for (j = 0; j < 3; j++) {
> > + SREALLOC(act[i]->buf[j], void,
> > + (size_t) act[i]->msize * 
> > (size_t) act[i]->nr_ini * (size_t) act[i]->nr2);
> > +--
> > +2.34.1
> > +
> > diff --git a/meta/recipes-extended/sysstat/sysstat_12.4.5.bb 
> > b/meta/recipes-extended/sysstat/sysstat_12.4.5.bb
> > index fe3db4d8a5..3a3d1fb6ba 100644
> > --- a/meta/recipes-extended/sysstat/sysstat_12.4.5.bb
> > +++ b/meta/recipes-extended/sysstat/sysstat_12.4.5.bb
> > @@ -2,6 +2,7 @@ require sysstat.inc
> >
> >   LIC_FILES_CHKSUM = "file://COPYING;md5=a23a74b3f4caf9616230789d94217acb"
> >
> > -SRC_URI += "file://0001-configure.in-remove-check-for-chkconfig.patch"
> > +SRC_URI += "file://0001-configure.in-remove-check-for-chkconfig.patch \
> > +   file://CVE-2022-39377.patch"
> >
> >   SRC_URI[sha256sum] = 
> > "ef445acea301bbb996e410842f6290a8d049e884d4868cfef7e85dc04b7eee5b"
> >
> > 
> >

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#174340): 

Re: [OE-Core][Kirkstone][PATCH] sysstat: fix CVE-2022-39377

2022-12-06 Thread Xiangyu Chen

Friendly ping.

On 11/19/22 16:17, Xiangyu Chen wrote:

Signed-off-by: Xiangyu Chen 
---
  .../sysstat/sysstat/CVE-2022-39377.patch  | 93 +++
  .../sysstat/sysstat_12.4.5.bb |  3 +-
  2 files changed, 95 insertions(+), 1 deletion(-)
  create mode 100644 meta/recipes-extended/sysstat/sysstat/CVE-2022-39377.patch

diff --git a/meta/recipes-extended/sysstat/sysstat/CVE-2022-39377.patch 
b/meta/recipes-extended/sysstat/sysstat/CVE-2022-39377.patch
new file mode 100644
index 00..dce7b0d61f
--- /dev/null
+++ b/meta/recipes-extended/sysstat/sysstat/CVE-2022-39377.patch
@@ -0,0 +1,93 @@
+From 9c4eaf150662ad40607923389d4519bc83b93540 Mon Sep 17 00:00:00 2001
+From: Sebastien 
+Date: Sat, 15 Oct 2022 14:24:22 +0200
+Subject: [PATCH] Fix size_t overflow in sa_common.c (GHSL-2022-074)
+
+allocate_structures function located in sa_common.c insufficiently
+checks bounds before arithmetic multiplication allowing for an
+overflow in the size allocated for the buffer representing system
+activities.
+
+This patch checks that the post-multiplied value is not greater than
+UINT_MAX.
+
+Signed-off-by: Sebastien 
+
+Upstream-Status: Backport from
+[https://github.com/sysstat/sysstat/commit/a953ee3307d51255cc96e1f211882e97f795eed9]
+
+Signed-off-by: Xiangyu Chen 
+---
+ common.c| 25 +
+ common.h|  2 ++
+ sa_common.c |  6 ++
+ 3 files changed, 33 insertions(+)
+
+diff --git a/common.c b/common.c
+index 81c7762..1a84b05 100644
+--- a/common.c
 b/common.c
+@@ -1655,4 +1655,29 @@ int parse_values(char *strargv, unsigned char bitmap[], 
int max_val, const char
+
+   return 0;
+ }
++
++/*
++ ***
++ * Check if the multiplication of the 3 values may be greater than UINT_MAX.
++ *
++ * IN:
++ * @val1  First value.
++ * @val2  Second value.
++ * @val3  Third value.
++ ***
++ */
++void check_overflow(size_t val1, size_t val2, size_t val3)
++{
++  if ((unsigned long long) val1 *
++  (unsigned long long) val2 *
++  (unsigned long long) val3 > UINT_MAX) {
++#ifdef DEBUG
++  fprintf(stderr, "%s: Overflow detected (%llu). Aborting...\n",
++  __FUNCTION__,
++  (unsigned long long) val1 * (unsigned long long) val2 * 
(unsigned long long) val3);
++#endif
++  exit(4);
++  }
++}
++
+ #endif /* SOURCE_SADC undefined */
+diff --git a/common.h b/common.h
+index 55b6657..e8ab98a 100644
+--- a/common.h
 b/common.h
+@@ -260,6 +260,8 @@ int check_dir
+   (char *);
+
+ #ifndef SOURCE_SADC
++void check_overflow
++  (size_t, size_t, size_t);
+ int count_bits
+   (void *, int);
+ int count_csvalues
+diff --git a/sa_common.c b/sa_common.c
+index 3699a84..b2cec4a 100644
+--- a/sa_common.c
 b/sa_common.c
+@@ -459,7 +459,13 @@ void allocate_structures(struct activity *act[])
+   int i, j;
+
+   for (i = 0; i < NR_ACT; i++) {
++
+   if (act[i]->nr_ini > 0) {
++
++  /* Look for a possible overflow */
++  check_overflow((size_t) act[i]->msize, (size_t) 
act[i]->nr_ini,
++ (size_t) act[i]->nr2);
++
+   for (j = 0; j < 3; j++) {
+   SREALLOC(act[i]->buf[j], void,
+   (size_t) act[i]->msize * (size_t) 
act[i]->nr_ini * (size_t) act[i]->nr2);
+--
+2.34.1
+
diff --git a/meta/recipes-extended/sysstat/sysstat_12.4.5.bb 
b/meta/recipes-extended/sysstat/sysstat_12.4.5.bb
index fe3db4d8a5..3a3d1fb6ba 100644
--- a/meta/recipes-extended/sysstat/sysstat_12.4.5.bb
+++ b/meta/recipes-extended/sysstat/sysstat_12.4.5.bb
@@ -2,6 +2,7 @@ require sysstat.inc
  
  LIC_FILES_CHKSUM = "file://COPYING;md5=a23a74b3f4caf9616230789d94217acb"
  
-SRC_URI += "file://0001-configure.in-remove-check-for-chkconfig.patch"

+SRC_URI += "file://0001-configure.in-remove-check-for-chkconfig.patch \
+   file://CVE-2022-39377.patch"
  
  SRC_URI[sha256sum] = "ef445acea301bbb996e410842f6290a8d049e884d4868cfef7e85dc04b7eee5b"





-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#174339): 
https://lists.openembedded.org/g/openembedded-core/message/174339
Mute This Topic: https://lists.openembedded.org/mt/95129830/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



Re: [OE-core] [PATCH 01/13] cargo-update-recipe-crates.bbclass: add a class to generate SRC_URI crate lists from Cargo.lock

2022-12-06 Thread Sergey Bostandzhyan
Hi everyone,

I promised Randy to post my experience with Yocto and Rust, which was a
first time attempt for me. Note, that when starting I had no knowledge about 
Rust whatsoever, so this is "clean start" observation.

On Tue, Dec 06, 2022 at 06:04:18PM -0500, Randy MacLeod wrote:
> On 2022-10-31 07:47, Alexander Kanavin wrote:
> >For better or worse, more and more rust components are appearing that do
> >not include their dependencies in tarballs (or git trees), and rely on cargo
> >to fetch them. On the other hand, bitbake does not use cargo (and quite 
> >possible
> >won't ever be able to), and relies on having each item explicitly listed in 
> >SRC_URI
> >with a crate:// prefix. This however creates a problem of both making such 
> >lists in
> >the first place and updating them when a recipe is updated to a newer 
> >version.
> >
> >So this class can be used to perform such updates by implementing a task 
> >that does it;
> >the next commit shows the outcome for python3-bcrypt (which has been tested 
> >to work
> >and produce a successful build).
> >
> >Note: the python script relies on tomllib library, which appears in Python 
> >3.11 and
> >does not exist in earlier versions - I've tested this by first updating 
> >python to 3.11-rc2
> >in oe-core.
> 
> 
> Thanks Alex, that's a nice approach.
> 
> I'm reply to the thread since Jin had some trouble getting started
> with this class. This pushed me to finally try it and I have some minor
> comments and suggestions.

my first issue was to actually find out how to approach this, it seems
most google hits point to meta-rust which has been around for a longer period
and I was lucky to get some hints in #oe on IRC, where Randy pointed me to 
cargo-update-recipe-crates.bbclass which is already in Poky.

The comment in the header about running bitbake -c update_crates recipe-name
allowed me to generate the .inc file, but it was not immediately clear to me
what I should do next.

The pointer to python3-bcrypt_*.bb was a bit confusing in the sense, that
from the rust perspective it only inherits cargo-update-recipe-crates,
but trying to build my package after having genrated the SRC_URI entries did
not produce any build output, I ended up with an empty -dev and an empty -dbg 
ipk.

By looking at the available classes I figured that I should probably also
inherit cargo, which indeed started to compile the application I needed to
package.

Next, I ran into some build issues for packages which I guess the application
was depending upon. I got an error:

error: failed to run custom build command for `libudev-sys v0.1.4`

which luckily had enough google hits to understand that it expects
a DEPENDS = "eudev"

It however still failed after that and it took me some time to realize
that I should also inherit pkgconfig, which finally did the trick.

I copied the working recipe back to Kirkstone and was happy to see, that it
builds there as well.

So overall, given that I had zero Rust knowledge, it wasn't a bad
experience, Yocto took care of most things for me.

> First, it works for me for adding ripgrep (1) and for Jin for
> something he was
> working on. It wasn't a perfect experience for me since at first, I
> had omitted:
> 
> S = "${WORKDIR}/git"
> 
> and
> $ bitbake -c update_crates  ripgrep
> 
> would fail silently with nothing useful in the log.do_update_crates file.
> 
> I'll likely send a patch to make it more verbose on error.
> 
> 
> It also wasn't clear how to get started but in hindsight, you need
> 'obviously'
> need a recipe that has SRC_URI and SRCREV and S and maybe a bit more
> to get started.
> 
> 
> Michael,
> 
> Do you think we should a document this workflow in addition to the
> cargo bitbake approach?

I think this should be documented more prominently, as missing information
on how to get going was the biggest obstacle, at least for me. The benefit of
this workflow is, that no additional layer is needed and that everything seems
to more or less work out of the box within the usual checkout.

The downside is a two step approach and I wonder if it would be possible to
append the SRC_URI crate entries on the fly, but in a way that still works
with sstate so that regeneration happens only when something has changed.

Anyway, it seems to be a good start, thanks to everyone who made this possible!

Kind regards,
Jin

 
 
> 1) https://github.com/BurntSushi/ripgrep
> 
> Recipe will go to meta-oe.
> 
> >
> >Signed-off-by: Alexander Kanavin 
> >---
> >  .../cargo-update-recipe-crates.bbclass| 41 +++
> >  1 file changed, 41 insertions(+)
> >  create mode 100644 meta/classes-recipe/cargo-update-recipe-crates.bbclass
> >
> >diff --git a/meta/classes-recipe/cargo-update-recipe-crates.bbclass 
> >b/meta/classes-recipe/cargo-update-recipe-crates.bbclass
> >new file mode 100644
> >index 00..f90938c734
> >--- /dev/null
> >+++ b/meta/classes-recipe/cargo-update-recipe-crates.bbclass
> >@@ -0,0 +1,41 @@
> >+#
> >+# Copyright 

Re: [kirkstone][oe-core][PATCH 1/1] libarchive: fix CVE-2022-36227 -- and langdale !

2022-12-06 Thread Steve Sakoman
On Tue, Dec 6, 2022 at 1:59 PM Randy MacLeod
 wrote:
>
> On 2022-12-06 17:16, Joe Slater wrote:
> > Import a patch from libarchive applied after release 3.6.1.
>
> Thanks Joe.
>
> Steve,
>
> This should apply to langdale as well.

"Should" :-)

It doesn't apply cleanly due to:
https://git.openembedded.org/openembedded-core-contrib/commit/?h=stable/langdale-nut=339055f5abc30ea5dc26184c94a2da39ed46a22f

But I'll tweak the patch and see what happens on the autobuilder.

Steve

> >
> > Signed-off-by: Joe Slater 
> > ---
> >   .../libarchive/cve-2022-36227.patch   | 48 +++
> >   .../libarchive/libarchive_3.6.1.bb|  4 +-
> >   2 files changed, 51 insertions(+), 1 deletion(-)
> >   create mode 100644 
> > meta/recipes-extended/libarchive/libarchive/cve-2022-36227.patch
> >
> > diff --git 
> > a/meta/recipes-extended/libarchive/libarchive/cve-2022-36227.patch 
> > b/meta/recipes-extended/libarchive/libarchive/cve-2022-36227.patch
> > new file mode 100644
> > index 00..4d13bf6492
> > --- /dev/null
> > +++ b/meta/recipes-extended/libarchive/libarchive/cve-2022-36227.patch
> > @@ -0,0 +1,48 @@
> > +From bff38efe8c110469c5080d387bec62a6ca15b1a5 Mon Sep 17 00:00:00 2001
> > +From: obiwac 
> > +Date: Fri, 22 Jul 2022 22:41:10 +0200
> > +Subject: [PATCH] libarchive: Handle a `calloc` returning NULL (fixes #1754)
> > +
> > +---
> > + libarchive/archive_write.c | 8 
> > + 1 file changed, 8 insertions(+)
> > +
> > +---
> > +CVE: CVE-2022-36227
> > +
> > +Source-Repo: https://github.com/libarchive/libarchive.git
> > +
> > +Upstream-Status: Backport [bff38efe8c... unmodified]
> > +
> > +Signed-off-by: Joe Slater 
> > +
> > +---
> > +diff --git a/libarchive/archive_write.c b/libarchive/archive_write.c
> > +index 66592e82..27626b54 100644
> > +--- a/libarchive/archive_write.c
> >  b/libarchive/archive_write.c
> > +@@ -201,6 +201,10 @@ __archive_write_allocate_filter(struct archive *_a)
> > + struct archive_write_filter *f;
> > +
> > + f = calloc(1, sizeof(*f));
> > ++
> > ++if (f == NULL)
> > ++return (NULL);
> > ++
> > + f->archive = _a;
> > + f->state = ARCHIVE_WRITE_FILTER_STATE_NEW;
> > + if (a->filter_first == NULL)
> > +@@ -548,6 +552,10 @@ archive_write_open2(struct archive *_a, void 
> > *client_data,
> > + a->client_data = client_data;
> > +
> > + client_filter = __archive_write_allocate_filter(_a);
> > ++
> > ++if (client_filter == NULL)
> > ++return (ARCHIVE_FATAL);
> > ++
> > + client_filter->open = archive_write_client_open;
> > + client_filter->write = archive_write_client_write;
> > + client_filter->close = archive_write_client_close;
> > +--
> > +2.38.1
> > +
> > diff --git a/meta/recipes-extended/libarchive/libarchive_3.6.1.bb 
> > b/meta/recipes-extended/libarchive/libarchive_3.6.1.bb
> > index c795b41628..8213940ad3 100644
> > --- a/meta/recipes-extended/libarchive/libarchive_3.6.1.bb
> > +++ b/meta/recipes-extended/libarchive/libarchive_3.6.1.bb
> > @@ -32,7 +32,9 @@ PACKAGECONFIG[zstd] = "--with-zstd,--without-zstd,zstd,"
> >
> >   EXTRA_OECONF += "--enable-largefile"
> >
> > -SRC_URI = "http://libarchive.org/downloads/libarchive-${PV}.tar.gz;
> > +SRC_URI = "http://libarchive.org/downloads/libarchive-${PV}.tar.gz \
> > +   file://cve-2022-36227.patch"
> > +
> >   UPSTREAM_CHECK_URI = "http://libarchive.org/;
> >
> >   SRC_URI[sha256sum] = 
> > "c676146577d989189940f1959d9e3980d28513d74eedfbc6b7f15ea45fe54ee2"
>
>
> --
> # Randy MacLeod
> # Wind River Linux
>

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#174337): 
https://lists.openembedded.org/g/openembedded-core/message/174337
Mute This Topic: https://lists.openembedded.org/mt/95506216/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



Re: [kirkstone][oe-core][PATCH 1/1] libarchive: fix CVE-2022-36227 -- and langdale !

2022-12-06 Thread Randy MacLeod

On 2022-12-06 17:16, Joe Slater wrote:

Import a patch from libarchive applied after release 3.6.1.


Thanks Joe.

Steve,

This should apply to langdale as well.

../Randy




Signed-off-by: Joe Slater 
---
  .../libarchive/cve-2022-36227.patch   | 48 +++
  .../libarchive/libarchive_3.6.1.bb|  4 +-
  2 files changed, 51 insertions(+), 1 deletion(-)
  create mode 100644 
meta/recipes-extended/libarchive/libarchive/cve-2022-36227.patch

diff --git a/meta/recipes-extended/libarchive/libarchive/cve-2022-36227.patch 
b/meta/recipes-extended/libarchive/libarchive/cve-2022-36227.patch
new file mode 100644
index 00..4d13bf6492
--- /dev/null
+++ b/meta/recipes-extended/libarchive/libarchive/cve-2022-36227.patch
@@ -0,0 +1,48 @@
+From bff38efe8c110469c5080d387bec62a6ca15b1a5 Mon Sep 17 00:00:00 2001
+From: obiwac 
+Date: Fri, 22 Jul 2022 22:41:10 +0200
+Subject: [PATCH] libarchive: Handle a `calloc` returning NULL (fixes #1754)
+
+---
+ libarchive/archive_write.c | 8 
+ 1 file changed, 8 insertions(+)
+
+---
+CVE: CVE-2022-36227
+
+Source-Repo: https://github.com/libarchive/libarchive.git
+
+Upstream-Status: Backport [bff38efe8c... unmodified]
+
+Signed-off-by: Joe Slater 
+
+---
+diff --git a/libarchive/archive_write.c b/libarchive/archive_write.c
+index 66592e82..27626b54 100644
+--- a/libarchive/archive_write.c
 b/libarchive/archive_write.c
+@@ -201,6 +201,10 @@ __archive_write_allocate_filter(struct archive *_a)
+   struct archive_write_filter *f;
+
+   f = calloc(1, sizeof(*f));
++
++  if (f == NULL)
++  return (NULL);
++
+   f->archive = _a;
+   f->state = ARCHIVE_WRITE_FILTER_STATE_NEW;
+   if (a->filter_first == NULL)
+@@ -548,6 +552,10 @@ archive_write_open2(struct archive *_a, void *client_data,
+   a->client_data = client_data;
+
+   client_filter = __archive_write_allocate_filter(_a);
++
++  if (client_filter == NULL)
++  return (ARCHIVE_FATAL);
++
+   client_filter->open = archive_write_client_open;
+   client_filter->write = archive_write_client_write;
+   client_filter->close = archive_write_client_close;
+--
+2.38.1
+
diff --git a/meta/recipes-extended/libarchive/libarchive_3.6.1.bb 
b/meta/recipes-extended/libarchive/libarchive_3.6.1.bb
index c795b41628..8213940ad3 100644
--- a/meta/recipes-extended/libarchive/libarchive_3.6.1.bb
+++ b/meta/recipes-extended/libarchive/libarchive_3.6.1.bb
@@ -32,7 +32,9 @@ PACKAGECONFIG[zstd] = "--with-zstd,--without-zstd,zstd,"
  
  EXTRA_OECONF += "--enable-largefile"
  
-SRC_URI = "http://libarchive.org/downloads/libarchive-${PV}.tar.gz;

+SRC_URI = "http://libarchive.org/downloads/libarchive-${PV}.tar.gz \
+   file://cve-2022-36227.patch"
+
  UPSTREAM_CHECK_URI = "http://libarchive.org/;
  
  SRC_URI[sha256sum] = "c676146577d989189940f1959d9e3980d28513d74eedfbc6b7f15ea45fe54ee2"



--
# Randy MacLeod
# Wind River Linux


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#174336): 
https://lists.openembedded.org/g/openembedded-core/message/174336
Mute This Topic: https://lists.openembedded.org/mt/95506216/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



Re: [OE-core] [PATCH 01/13] cargo-update-recipe-crates.bbclass: add a class to generate SRC_URI crate lists from Cargo.lock

2022-12-06 Thread Randy MacLeod

On 2022-10-31 07:47, Alexander Kanavin wrote:

For better or worse, more and more rust components are appearing that do
not include their dependencies in tarballs (or git trees), and rely on cargo
to fetch them. On the other hand, bitbake does not use cargo (and quite possible
won't ever be able to), and relies on having each item explicitly listed in 
SRC_URI
with a crate:// prefix. This however creates a problem of both making such 
lists in
the first place and updating them when a recipe is updated to a newer version.

So this class can be used to perform such updates by implementing a task that 
does it;
the next commit shows the outcome for python3-bcrypt (which has been tested to 
work
and produce a successful build).

Note: the python script relies on tomllib library, which appears in Python 3.11 
and
does not exist in earlier versions - I've tested this by first updating python 
to 3.11-rc2
in oe-core.



Thanks Alex, that's a nice approach.

I'm reply to the thread since Jin had some trouble getting started
with this class. This pushed me to finally try it and I have some minor
comments and suggestions.

First, it works for me for adding ripgrep (1) and for Jin for something 
he was

working on. It wasn't a perfect experience for me since at first, I
had omitted:

S = "${WORKDIR}/git"

and
$ bitbake -c update_crates  ripgrep

would fail silently with nothing useful in the log.do_update_crates file.

I'll likely send a patch to make it more verbose on error.


It also wasn't clear how to get started but in hindsight, you need 
'obviously'
need a recipe that has SRC_URI and SRCREV and S and maybe a bit more to 
get started.



Michael,

Do you think we should a document this workflow in addition to the cargo 
bitbake approach?


../Randy


1) https://github.com/BurntSushi/ripgrep

Recipe will go to meta-oe.



Signed-off-by: Alexander Kanavin 
---
  .../cargo-update-recipe-crates.bbclass| 41 +++
  1 file changed, 41 insertions(+)
  create mode 100644 meta/classes-recipe/cargo-update-recipe-crates.bbclass

diff --git a/meta/classes-recipe/cargo-update-recipe-crates.bbclass 
b/meta/classes-recipe/cargo-update-recipe-crates.bbclass
new file mode 100644
index 00..f90938c734
--- /dev/null
+++ b/meta/classes-recipe/cargo-update-recipe-crates.bbclass
@@ -0,0 +1,41 @@
+#
+# Copyright OpenEmbedded Contributors
+#
+# SPDX-License-Identifier: MIT
+#
+
+##
+## Purpose:
+## This class is used to update the list of crates in SRC_URI
+## by reading Cargo.lock in the source tree.
+##
+## See meta/recipes-devtools/python/python3-bcrypt_*.bb for an example
+##
+## To perform the update: bitbake -c update_crates recipe-name
+
+addtask do_update_crates after do_patch
+do_update_crates[depends] = "python3-native:do_populate_sysroot"
+
+do_update_crates() {
+nativepython3 - <

--
# Randy MacLeod
# Wind River Linux


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#174335): 
https://lists.openembedded.org/g/openembedded-core/message/174335
Mute This Topic: https://lists.openembedded.org/mt/94683148/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



Re: [OE-core][PATCH] oeqa/selftest/externalsrc: add test for srctree_hash_files

2022-12-06 Thread Alexandre Belloni via lists.openembedded.org
On 06/12/2022 22:07:13+, Peter Marko wrote:
> > Hello,
> > The submodule test fails on the autobuilders:
> 
> Sure, that's the point of a test - fail if issue is not fixed and pass when 
> the issue is fixed.
> Queue this together with 
> https://lists.openembedded.org/g/openembedded-core/message/174061.
> Ross asked me to provide a test for it - 
> https://lists.openembedded.org/g/openembedded-core/message/174286
> Should I resend as a series of will you try these together?

I'll queue both together, thanks!

> 
> Regards,
>   Peter
> 
> 

> 
> 
> 


-- 
Alexandre Belloni, co-owner and COO, Bootlin
Embedded Linux and Kernel engineering
https://bootlin.com

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#174334): 
https://lists.openembedded.org/g/openembedded-core/message/174334
Mute This Topic: https://lists.openembedded.org/mt/95479820/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[kirkstone][oe-core][PATCH 1/1] libarchive: fix CVE-2022-36227

2022-12-06 Thread Joe Slater
Import a patch from libarchive applied after release 3.6.1.

Signed-off-by: Joe Slater 
---
 .../libarchive/cve-2022-36227.patch   | 48 +++
 .../libarchive/libarchive_3.6.1.bb|  4 +-
 2 files changed, 51 insertions(+), 1 deletion(-)
 create mode 100644 
meta/recipes-extended/libarchive/libarchive/cve-2022-36227.patch

diff --git a/meta/recipes-extended/libarchive/libarchive/cve-2022-36227.patch 
b/meta/recipes-extended/libarchive/libarchive/cve-2022-36227.patch
new file mode 100644
index 00..4d13bf6492
--- /dev/null
+++ b/meta/recipes-extended/libarchive/libarchive/cve-2022-36227.patch
@@ -0,0 +1,48 @@
+From bff38efe8c110469c5080d387bec62a6ca15b1a5 Mon Sep 17 00:00:00 2001
+From: obiwac 
+Date: Fri, 22 Jul 2022 22:41:10 +0200
+Subject: [PATCH] libarchive: Handle a `calloc` returning NULL (fixes #1754)
+
+---
+ libarchive/archive_write.c | 8 
+ 1 file changed, 8 insertions(+)
+
+---
+CVE: CVE-2022-36227
+
+Source-Repo: https://github.com/libarchive/libarchive.git
+
+Upstream-Status: Backport [bff38efe8c... unmodified]
+
+Signed-off-by: Joe Slater 
+
+---
+diff --git a/libarchive/archive_write.c b/libarchive/archive_write.c
+index 66592e82..27626b54 100644
+--- a/libarchive/archive_write.c
 b/libarchive/archive_write.c
+@@ -201,6 +201,10 @@ __archive_write_allocate_filter(struct archive *_a)
+   struct archive_write_filter *f;
+ 
+   f = calloc(1, sizeof(*f));
++
++  if (f == NULL)
++  return (NULL);
++
+   f->archive = _a;
+   f->state = ARCHIVE_WRITE_FILTER_STATE_NEW;
+   if (a->filter_first == NULL)
+@@ -548,6 +552,10 @@ archive_write_open2(struct archive *_a, void *client_data,
+   a->client_data = client_data;
+ 
+   client_filter = __archive_write_allocate_filter(_a);
++
++  if (client_filter == NULL)
++  return (ARCHIVE_FATAL);
++
+   client_filter->open = archive_write_client_open;
+   client_filter->write = archive_write_client_write;
+   client_filter->close = archive_write_client_close;
+-- 
+2.38.1
+
diff --git a/meta/recipes-extended/libarchive/libarchive_3.6.1.bb 
b/meta/recipes-extended/libarchive/libarchive_3.6.1.bb
index c795b41628..8213940ad3 100644
--- a/meta/recipes-extended/libarchive/libarchive_3.6.1.bb
+++ b/meta/recipes-extended/libarchive/libarchive_3.6.1.bb
@@ -32,7 +32,9 @@ PACKAGECONFIG[zstd] = "--with-zstd,--without-zstd,zstd,"
 
 EXTRA_OECONF += "--enable-largefile"
 
-SRC_URI = "http://libarchive.org/downloads/libarchive-${PV}.tar.gz;
+SRC_URI = "http://libarchive.org/downloads/libarchive-${PV}.tar.gz \
+   file://cve-2022-36227.patch"
+
 UPSTREAM_CHECK_URI = "http://libarchive.org/;
 
 SRC_URI[sha256sum] = 
"c676146577d989189940f1959d9e3980d28513d74eedfbc6b7f15ea45fe54ee2"
-- 
2.38.1


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#174333): 
https://lists.openembedded.org/g/openembedded-core/message/174333
Mute This Topic: https://lists.openembedded.org/mt/95504330/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



Re: [OE-core][PATCH] oeqa/selftest/externalsrc: add test for srctree_hash_files

2022-12-06 Thread Peter Marko
> Hello,
> The submodule test fails on the autobuilders:

Sure, that's the point of a test - fail if issue is not fixed and pass when the 
issue is fixed.
Queue this together with 
https://lists.openembedded.org/g/openembedded-core/message/174061.
Ross asked me to provide a test for it - 
https://lists.openembedded.org/g/openembedded-core/message/174286
Should I resend as a series of will you try these together?

Regards,
  Peter



-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#174332): 
https://lists.openembedded.org/g/openembedded-core/message/174332
Mute This Topic: https://lists.openembedded.org/mt/95479820/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



Re: [OE-core][PATCH] oeqa/selftest/externalsrc: add test for srctree_hash_files

2022-12-06 Thread Alexandre Belloni via lists.openembedded.org
Hello,

The submodule test fails on the autobuilders:

2022-12-06 19:23:44,209 - oe-selftest - INFO - 
==
2022-12-06 19:23:44,209 - oe-selftest - INFO - FAIL: 
externalsrc.ExternalSrc.test_externalsrc_srctree_hash_files 
(subunit.RemotedTestCase)
2022-12-06 19:23:44,209 - oe-selftest - INFO - 
--
2022-12-06 19:23:44,209 - oe-selftest - INFO - 
testtools.testresult.real._StringException: Traceback (most recent call last):
  File 
"/home/pokybuild/yocto-worker/oe-selftest-fedora/build/meta/lib/oeqa/selftest/cases/externalsrc.py",
 line 34, in test_externalsrc_srctree_hash_files
self.assertEqual(get_bb_var("S", test_recipe), externalsrc_dir, msg = "S 
does not equal to EXTERNALSRC")
  File 
"/home/pokybuild/yocto-worker/oe-selftest-fedora/build/meta/lib/oeqa/utils/commands.py",
 line 288, in get_bb_var
return get_bb_vars([var], target, postconfig)[var]
  File 
"/home/pokybuild/yocto-worker/oe-selftest-fedora/build/meta/lib/oeqa/utils/commands.py",
 line 250, in get_bb_vars
bbenv = get_bb_env(target, postconfig=postconfig)
  File 
"/home/pokybuild/yocto-worker/oe-selftest-fedora/build/meta/lib/oeqa/utils/commands.py",
 line 244, in get_bb_env
return bitbake("-e %s" % target, postconfig=postconfig).output
  File 
"/home/pokybuild/yocto-worker/oe-selftest-fedora/build/meta/lib/oeqa/utils/commands.py",
 line 236, in bitbake
return runCmd(cmd, ignore_status, timeout, output_log=output_log, **options)
  File 
"/home/pokybuild/yocto-worker/oe-selftest-fedora/build/meta/lib/oeqa/utils/commands.py",
 line 214, in runCmd
raise AssertionError("Command '%s' returned non-zero exit status %d:\n%s" % 
(command, result.status, exc_output))
AssertionError: Command 'bitbake  -e git-submodule-test' returned non-zero exit 
status 1:
NOTE: Reconnecting to bitbake server...
Loading cache...done.
Loaded 0 entries from dependency cache.
Parsing recipes...ERROR: ExpansionError during parsing 
/home/pokybuild/yocto-worker/oe-selftest-fedora/build/build-st-3944040/meta-selftest/recipes-test/git-submodule-test/git-submodule-test.bb
Traceback (most recent call last):
  File "Var ", line 1, in 
  File 
"/home/pokybuild/yocto-worker/oe-selftest-fedora/build/meta/classes/externalsrc.bbclass",
 line 234, in srctree_hash_files(d=, srcdir=None):
 if os.path.exists(".gitmodules"):
>submodule_helper = subprocess.check_output(["git", 
"config", "--file", ".gitmodules", "--get-regexp", "path"], cwd=s_dir, 
env=env).decode("utf-8")
 for line in submodule_helper.splitlines():
  File "/usr/lib64/python3.10/subprocess.py", line 421, in 
check_output(timeout=None, *popenargs=(['git', 'config', '--file', 
'.gitmodules', '--get-regexp', 'path'],), **kwargs={'cwd': 
'/tmp/externalsrccxnk_jyq', 'env': {'SHELL': '/bin/bash', 
'BB_ENV_PASSTHROUGH_ADDITIONS': 'ALL_PROXY BBPATH_EXTRA BB_LOGCONFIG 
BB_NO_NETWORK BB_NUMBER_THREADS BB_SETSCENE_ENFORCE BB_SRCREV_POLICY DISTRO 
FTPS_PROXY FTP_PROXY GIT_PROXY_COMMAND HTTPS_PROXY HTTP_PROXY MACHINE NO_PROXY 
PARALLEL_MAKE SCREENDIR SDKMACHINE SOCKS5_PASSWD SOCKS5_USER SSH_AGENT_PID 
SSH_AUTH_SOCK STAMPS_DIR TCLIBC TCMODE all_proxy ftp_proxy ftps_proxy 
http_proxy https_proxy no_proxy ', 'BB_LOGCONFIG': 
'/home/pokybuild/yocto-worker/oe-selftest-fedora/build/build-st-3944040/../bitbake/contrib/autobuilderlog.json',
 'PWD': 
'/home/pokybuild/yocto-worker/oe-selftest-fedora/build/build-st-3944040', 
'LOGNAME': 'pokybuild', 'ftp_proxy': 'http://proxy.yocto.io:5187/', 'HOME': 
'/home/pokybuild', 'BBPATH': 
'/home/pokybuild/yocto-worker/oe-selftest-fedora/build/build-st-3944040', 
'USER': 'pokybuild', 'FTP_PROXY': 'http://proxy.yocto.io:5187/', 'PATH': 
'/home/pokybuild/yocto-worker/oe-selftest-fedora/build/scripts:/home/pokybuild/yocto-worker/oe-selftest-fedora/build/bitbake/bin:/home/pokybuild/.local/bin:/home/pokybuild/bin:/usr/lib64/ccache:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin',
 'LC_ALL': 'en_US.UTF-8', 'GIT_INDEX_FILE': '/tmp/oe-devtool-index18lc6e8_'}}):
 
>return run(*popenargs, stdout=PIPE, timeout=timeout, check=True,
**kwargs).stdout
  File "/usr/lib64/python3.10/subprocess.py", line 526, in run(input=None, 
capture_output=False, timeout=None, check=True, *popenargs=(['git', 'config', 
'--file', '.gitmodules', '--get-regexp', 'path'],), **kwargs={'stdout': -1, 
'cwd': '/tmp/externalsrccxnk_jyq', 'env': {'SHELL': '/bin/bash', 
'BB_ENV_PASSTHROUGH_ADDITIONS': 'ALL_PROXY BBPATH_EXTRA BB_LOGCONFIG 
BB_NO_NETWORK BB_NUMBER_THREADS BB_SETSCENE_ENFORCE BB_SRCREV_POLICY DISTRO 
FTPS_PROXY FTP_PROXY GIT_PROXY_COMMAND HTTPS_PROXY HTTP_PROXY MACHINE NO_PROXY 
PARALLEL_MAKE SCREENDIR SDKMACHINE SOCKS5_PASSWD SOCKS5_USER SSH_AGENT_PID 
SSH_AUTH_SOCK STAMPS_DIR TCLIBC TCMODE all_proxy ftp_proxy ftps_proxy 
http_proxy https_proxy no_proxy ', 'BB_LOGCONFIG': 

[oe-core][PATCH 1/1] libarchive: fix CVE-2022-36227

2022-12-06 Thread Joe Slater
Import patch applied to libarchive after the 3.6.1 release.

Signed-off-by: Joe Slater 
---
 .../libarchive/cve-2022-36227.patch   | 48 +++
 .../libarchive/libarchive_3.6.1.bb|  1 +
 2 files changed, 49 insertions(+)
 create mode 100644 
meta/recipes-extended/libarchive/libarchive/cve-2022-36227.patch

diff --git a/meta/recipes-extended/libarchive/libarchive/cve-2022-36227.patch 
b/meta/recipes-extended/libarchive/libarchive/cve-2022-36227.patch
new file mode 100644
index 00..4d13bf6492
--- /dev/null
+++ b/meta/recipes-extended/libarchive/libarchive/cve-2022-36227.patch
@@ -0,0 +1,48 @@
+From bff38efe8c110469c5080d387bec62a6ca15b1a5 Mon Sep 17 00:00:00 2001
+From: obiwac 
+Date: Fri, 22 Jul 2022 22:41:10 +0200
+Subject: [PATCH] libarchive: Handle a `calloc` returning NULL (fixes #1754)
+
+---
+ libarchive/archive_write.c | 8 
+ 1 file changed, 8 insertions(+)
+
+---
+CVE: CVE-2022-36227
+
+Source-Repo: https://github.com/libarchive/libarchive.git
+
+Upstream-Status: Backport [bff38efe8c... unmodified]
+
+Signed-off-by: Joe Slater 
+
+---
+diff --git a/libarchive/archive_write.c b/libarchive/archive_write.c
+index 66592e82..27626b54 100644
+--- a/libarchive/archive_write.c
 b/libarchive/archive_write.c
+@@ -201,6 +201,10 @@ __archive_write_allocate_filter(struct archive *_a)
+   struct archive_write_filter *f;
+ 
+   f = calloc(1, sizeof(*f));
++
++  if (f == NULL)
++  return (NULL);
++
+   f->archive = _a;
+   f->state = ARCHIVE_WRITE_FILTER_STATE_NEW;
+   if (a->filter_first == NULL)
+@@ -548,6 +552,10 @@ archive_write_open2(struct archive *_a, void *client_data,
+   a->client_data = client_data;
+ 
+   client_filter = __archive_write_allocate_filter(_a);
++
++  if (client_filter == NULL)
++  return (ARCHIVE_FATAL);
++
+   client_filter->open = archive_write_client_open;
+   client_filter->write = archive_write_client_write;
+   client_filter->close = archive_write_client_close;
+-- 
+2.38.1
+
diff --git a/meta/recipes-extended/libarchive/libarchive_3.6.1.bb 
b/meta/recipes-extended/libarchive/libarchive_3.6.1.bb
index 24d7918bf9..c812038352 100644
--- a/meta/recipes-extended/libarchive/libarchive_3.6.1.bb
+++ b/meta/recipes-extended/libarchive/libarchive_3.6.1.bb
@@ -34,6 +34,7 @@ EXTRA_OECONF += "--enable-largefile"
 
 SRC_URI = "http://libarchive.org/downloads/libarchive-${PV}.tar.gz \

file://0001-libarchive-Do-not-include-sys-mount.h-when-linux-fs..patch \
+   file://cve-2022-36227.patch \
"
 UPSTREAM_CHECK_URI = "http://libarchive.org/;
 
-- 
2.38.1


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#174330): 
https://lists.openembedded.org/g/openembedded-core/message/174330
Mute This Topic: https://lists.openembedded.org/mt/95501319/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



Re: [oe-core][PATCH] gstreamer-vaapi: rename USE_X11 variable

2022-12-06 Thread Markus Volk
Am Di, 6. Dez 2022 um 00:29:48 +0100 schrieb Markus Volk 
:

we should discuss it with upstream as it is presumably
something they'd want to fix


I submitted an issue for it



-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#174329): 
https://lists.openembedded.org/g/openembedded-core/message/174329
Mute This Topic: https://lists.openembedded.org/mt/95477995/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core][dunfell 0/7] Pull request (cover letter only)

2022-12-06 Thread Steve Sakoman
The following changes since commit 408bf1b4bb4f4ed126c17fb3676f9fa0513065ba:

  sstate: Account for reserved characters when shortening sstate filenames 
(2022-11-23 00:26:19 +)

are available in the Git repository at:

  https://git.openembedded.org/openembedded-core-contrib stable/dunfell-next
  
http://cgit.openembedded.org/openembedded-core-contrib/log/?h=stable/dunfell-next

Alexander Kanavin (1):
  linux-firmware: upgrade 20220913 -> 20221012

Chen Qi (1):
  kernel.bbclass: make KERNEL_DEBUG_TIMESTAMPS work at rebuild

Dmitry Baryshkov (1):
  linux-firmware: upgrade 20221012 -> 20221109

Mike Crowe (1):
  kernel: improve transformation from KERNEL_IMAGETYPE_FOR_MAKE

Ross Burton (1):
  pixman: backport fix for CVE-2022-44638

Vivek Kumbhar (1):
  qemu: fix CVE-2021-20196 block fdc null pointer dereference may lead
to guest crash

Wang Mingyu (1):
  mobile-broadband-provider-info: upgrade 20220725 -> 20221107

 meta/classes/kernel.bbclass   | 29 -
 .../mobile-broadband-provider-info_git.bb |  4 +-
 meta/recipes-devtools/qemu/qemu.inc   |  1 +
 .../qemu/qemu/CVE-2021-20196.patch| 62 +++
 .../xorg-lib/pixman/CVE-2022-44638.patch  | 34 ++
 .../xorg-lib/pixman_0.38.4.bb |  1 +
 ...20220913.bb => linux-firmware_20221109.bb} |  6 +-
 7 files changed, 129 insertions(+), 8 deletions(-)
 create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2021-20196.patch
 create mode 100644 meta/recipes-graphics/xorg-lib/pixman/CVE-2022-44638.patch
 rename meta/recipes-kernel/linux-firmware/{linux-firmware_20220913.bb => 
linux-firmware_20221109.bb} (99%)

-- 
2.25.1


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#174328): 
https://lists.openembedded.org/g/openembedded-core/message/174328
Mute This Topic: https://lists.openembedded.org/mt/95499858/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core] [PATCH v2] devtool/friends: Use LAYERSERIES_CORENAMES when generating LAYERSERIES_COMPAT entries

2022-12-06 Thread Richard Purdie
It seems some layers want to subvert the intent of LAYERSERIES_COMPAT
so bitbake is going to have to become stricter about the values there.
To work with this, use LAYERSERIES_CORENAMES to generate the entries in
LAYERSERIES_COMPAT instead of the current magic LAYERSERIES_COMPAT_core
value which may not continue to work.

The downside to this is when migating between releases, people would
need to update devtool workspace layer.conf files. I guess you could
argue this is a feature!

Signed-off-by: Richard Purdie 
---
v2 - fix hangs with esdk building from bitbake lockfile contention by adding 
--layerseries option

 meta/classes-recipe/populate_sdk_ext.bbclass |  3 +--
 meta/lib/bblayers/create.py  |  2 +-
 meta/lib/oeqa/selftest/cases/devtool.py  |  5 +++--
 meta/lib/oeqa/utils/commands.py  |  3 ++-
 scripts/devtool  | 15 ---
 5 files changed, 19 insertions(+), 9 deletions(-)

diff --git a/meta/classes-recipe/populate_sdk_ext.bbclass 
b/meta/classes-recipe/populate_sdk_ext.bbclass
index 01d8a693a72..f78a9f4e9b2 100644
--- a/meta/classes-recipe/populate_sdk_ext.bbclass
+++ b/meta/classes-recipe/populate_sdk_ext.bbclass
@@ -255,7 +255,7 @@ python copy_buildsystem () {
 bbpath = d.getVar('BBPATH')
 env = os.environ.copy()
 env['PYTHONDONTWRITEBYTECODE'] = '1'
-bb.process.run(['devtool', '--bbpath', bbpath, '--basepath', baseoutpath, 
'create-workspace', '--create-only', os.path.join(baseoutpath, 'workspace')], 
env=env)
+bb.process.run(['devtool', '--bbpath', bbpath, '--basepath', baseoutpath, 
'create-workspace', '--layerseries', d.getVar("LAYERSERIES_CORENAMES"), 
'--create-only', os.path.join(baseoutpath, 'workspace')], env=env)
 
 # Create bblayers.conf
 bb.utils.mkdirhier(baseoutpath + '/conf')
@@ -498,7 +498,6 @@ python copy_buildsystem () {
 else:
 tasklistfn = None
 
-
 cachedir = os.path.join(baseoutpath, 'cache')
 bb.utils.mkdirhier(cachedir)
 bb.parse.siggen.copy_unitaskhashes(cachedir)
diff --git a/meta/lib/bblayers/create.py b/meta/lib/bblayers/create.py
index 0aeb5d5f7b5..c8f3f1b370e 100644
--- a/meta/lib/bblayers/create.py
+++ b/meta/lib/bblayers/create.py
@@ -53,7 +53,7 @@ class CreatePlugin(LayerPlugin):
 shutil.copy(license_src, license_dst)
 
 # Get the compat value for core layer.
-compat = self.tinfoil.config_data.getVar('LAYERSERIES_COMPAT_core') or 
""
+compat = self.tinfoil.config_data.getVar('LAYERSERIES_CORENAMES') or ""
 
 # Create the layer.conf from templates/layer.conf
 layerconf_template = read_template('layer.conf').format(
diff --git a/meta/lib/oeqa/selftest/cases/devtool.py 
b/meta/lib/oeqa/selftest/cases/devtool.py
index 0cb7403f16e..c78a68be5b4 100644
--- a/meta/lib/oeqa/selftest/cases/devtool.py
+++ b/meta/lib/oeqa/selftest/cases/devtool.py
@@ -1076,9 +1076,10 @@ class DevtoolUpdateTests(DevtoolBase):
 def test_devtool_update_recipe_append_git(self):
 # Check preconditions
 testrecipe = 'mtd-utils-selftest'
-bb_vars = get_bb_vars(['FILE', 'SRC_URI'], testrecipe)
+bb_vars = get_bb_vars(['FILE', 'SRC_URI', 'LAYERSERIES_CORENAMES'], 
testrecipe)
 recipefile = bb_vars['FILE']
 src_uri = bb_vars['SRC_URI']
+corenames = bb_vars['LAYERSERIES_CORENAMES']
 self.assertIn('git://', src_uri, 'This test expects the %s recipe to 
be a git recipe' % testrecipe)
 for entry in src_uri.split():
 if entry.startswith('git://'):
@@ -1109,7 +1110,7 @@ class DevtoolUpdateTests(DevtoolBase):
 f.write('BBFILE_PATTERN_oeselftesttemplayer = "^${LAYERDIR}/"\n')
 f.write('BBFILE_PRIORITY_oeselftesttemplayer = "999"\n')
 f.write('BBFILE_PATTERN_IGNORE_EMPTY_oeselftesttemplayer = "1"\n')
-f.write('LAYERSERIES_COMPAT_oeselftesttemplayer = 
"${LAYERSERIES_COMPAT_core}"\n')
+f.write('LAYERSERIES_COMPAT_oeselftesttemplayer = "%s"\n' % 
corenames)
 self.add_command_to_tearDown('bitbake-layers remove-layer %s || true' 
% templayerdir)
 result = runCmd('bitbake-layers add-layer %s' % templayerdir, 
cwd=self.builddir)
 # Create the bbappend
diff --git a/meta/lib/oeqa/utils/commands.py b/meta/lib/oeqa/utils/commands.py
index f733fcdf3c8..f4daea25075 100644
--- a/meta/lib/oeqa/utils/commands.py
+++ b/meta/lib/oeqa/utils/commands.py
@@ -300,6 +300,7 @@ def get_test_layer():
 
 def create_temp_layer(templayerdir, templayername, priority=999, 
recipepathspec='recipes-*/*'):
 os.makedirs(os.path.join(templayerdir, 'conf'))
+corenames = get_bb_var('LAYERSERIES_CORENAMES')
 with open(os.path.join(templayerdir, 'conf', 'layer.conf'), 'w') as f:
 f.write('BBPATH .= ":${LAYERDIR}"\n')
 f.write('BBFILES += "${LAYERDIR}/%s/*.bb \\' % recipepathspec)
@@ -308,7 +309,7 @@ def create_temp_layer(templayerdir, templayername, 
priority=999, recipepathspec=

Re: [OE-core] [PATCH 3/6] btrfs-tools: Do not use 64bit functions for largefile support

2022-12-06 Thread Alexander Kanavin
On Tue, 6 Dec 2022 at 16:29, Richard Purdie
 wrote:
> I'm worried the mdadm upstream isn't very active so that one, whilst
> submitted, may take a while.

There's a steady amount of new commits here:
https://git.kernel.org/pub/scm/utils/mdadm/mdadm.git/log/
so I'd send directly to the person committing them (Jes Sorensen
), and cc: maillist.

Alex

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#174326): 
https://lists.openembedded.org/g/openembedded-core/message/174326
Mute This Topic: https://lists.openembedded.org/mt/95389895/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core] Yocto Project Status 6 December 2022 (WW49)

2022-12-06 Thread Stephen Jolley
Current Dev Position: YP 4.2 M1

Next Deadline: 5th December 2022 YP 4.2 Build

 

Next Team Meetings:

*   Bug Triage meeting Thursday December 8th 7:30 am PDT (

https://zoom.us/j/454367603?pwd=ZGxoa2ZXL3FkM3Y0bFd5aVpHVVZ6dz09)
*   Weekly Project Engineering Sync Tuesday December 6th at 8 am PDT (

https://zoom.us/j/990892712?pwd=cHU1MjhoM2x6ck81bkcrYjRrcmJsUT09
 )
*   Twitch -  See  
https://www.twitch.tv/theyoctojester

 

Key Status/Updates:

*   YP 4.2 M1 is due to be built this week, likely once we merge a few
remaining patches and hopefully some CVE fixes.
*   Thanks to everyone who attended or helped contribute to the Yocto
Summit, it seemed to be a success and had some good presentations!
*   There are a number of bitbake patches pending with an unresolved
dilemma on functionality versus parsing speeds.
*   CVEs in master have risen with 7 across 5 components, help in
bringing the numbers down would be appreciated
*   We are starting to see some rough plans around Y2038, largefile
support and some other topics, thanks to all those helping move this
forward, there has been some useful discussion and we look forward to seeing
the changes!
*   We have a growing number of bugs in bugzilla, any help with them is
appreciated.
*   As people are likely aware, the project has a number of components
which are either unmaintained, or have people with little to no time trying
to keep them alive. These components include: patchtest, layerindex,
devtool, toaster, wic, oeqa, autobuilder, CROPs containers, pseudo and more.
Many have open bugs. Help is welcome in trying to better look after these
components!

 

Ways to contribute:

*   There are bugs identified as possible for newcomers to the project:

https://wiki.yoctoproject.org/wiki/Newcomers
*   There are bugs that are currently unassigned for YP 4.2. See:

https://wiki.yoctoproject.org/wiki/Bug_Triage#Medium.2B_4.2_Unassigned_Enhan
cements.2FBugs
*   We'd welcome new maintainers for recipes in OE-Core. Please see the
list at:

http://git.yoctoproject.org/cgit.cgi/poky/tree/meta/conf/distro/include/main
tainers.inc and discuss with the existing maintainer, or ask on the OE-Core
mailing list. We will likely move a chunk of these to "Unassigned" soon to
help facilitate this.
*   Help is very much welcome in trying to resolve our autobuilder
intermittent issues. You can see the list of failures we're continuing to
see by searching for the "AB-INT" tag in bugzilla:

https://bugzilla.yoctoproject.org/buglist.cgi?quicksearch=AB-INT.
*   Help us resolve CVE issues:
 CVE metrics 

 

YP 4.2 Milestone Dates:

*   YP 4.2 M1 build date 2022/12/05
*   YP 4.2 M1 Release date 2022/12/16
*   YP 4.2 M2 build date 2023/01/23
*   YP 4.2 M2 Release date 2023/02/03
*   YP 4.2 M3 build date 2023/02/20
*   YP 4.2 M3 Release date 2023/03/03
*   YP 4.2 M4 build date 2023/04/03
*   YP 4.2 M4 Release date 2023/04/28

 

Upcoming dot releases:

*   YP 4.0.6 build date 2022/12/12
*   YP 4.0.6 Release date 2022/12/23
*   YP 4.1.2 build date 2023/01/09
*   YP 4.1.2 Release date 2023/01/20
*   YP 3.1.22 build date 2023/01/16
*   YP 3.1.22 Release date 2023/01/27
*   YP 4.0.7 build date 2023/01/30
*   YP 4.0.7 Release date 2023/02/10
*   YP 3.1.23 build date 2023/02/13
*   YP 3.1.23 Release date 2023/02/24
*   YP 4.0.8 build date 2023/02/27
*   YP 4.0.8 Release date 2023/03/10
*   YP 4.1.3 build date 2023/03/06
*   YP 4.1.3 Release date 2023/03/17
*   YP 3.1.24 build date 2023/03/20
*   YP 3.1.24 Release date 2023/03/31
*   YP 4.0.9 build date 2023/04/10
*   YP 4.0.9 Release date 2023/04/21
*   YP 4.1.4 build date 2023/05/01
*   YP 4.1.4 Release date 2023/05/13
*   YP 3.1.25 build date 2023/05/08
*   YP 3.1.25 Release date 2023/05/19
*   YP 4.0.10 build date 2023/05/15
*   YP 4.0.10 Release date 2023/05/26

 

Tracking Metrics:

*   WDD 2444 (last week 2446) (

https://wiki.yoctoproject.org/charts/combo.html)
*   OE-Core/Poky Patch Metrics

*   Total patches found: 1164 (last week 1175)
*   Patches in the Pending State: 285 (24%) [last week 288 (25%)]

*
https://autobuilder.yocto.io/pub/non-release/patchmetrics/

 

The Yocto 

Re: [OE-core] [PATCH 3/6] btrfs-tools: Do not use 64bit functions for largefile support

2022-12-06 Thread Richard Purdie
On Tue, 2022-12-06 at 15:58 +0100, Alexander Kanavin wrote:
> I want to once again request that the whole set is not merged into
> master until every patch has an upstream submission link. It's fine to
> test them in master-next, but please do not merge.

I did a quick check and the acl patch was merged so I think that is ok
to go in. The pseudo one doesn't need any further work either.

I'm worried the mdadm upstream isn't very active so that one, whilst
submitted, may take a while.

I do agree we need to at least get the others submitted. OE isn't in
the business of carrying patches, particularly when this is near enough
musl feature development :/

Cheers,

Richard


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#174324): 
https://lists.openembedded.org/g/openembedded-core/message/174324
Mute This Topic: https://lists.openembedded.org/mt/95389895/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



Re: [OE-core] [PATCH 2/6] acl: Enable largefile support by default

2022-12-06 Thread Richard Purdie
On Thu, 2022-12-01 at 11:02 -0800, Khem Raj wrote:
> This ensures right flags are passed so enable it. Musl and decoupled
> these APIs from _GNU_SOURCE and now are only available when
> _LARGEFILE64_SOURCE macro is enabled
> 
> Signed-off-by: Khem Raj 
> ---
>  ...rtable-version-of-dirent-and-readdir.patch | 39 +++
>  meta/recipes-support/attr/acl_2.3.1.bb|  3 ++
>  2 files changed, 42 insertions(+)
>  create mode 100644 
> meta/recipes-support/attr/acl/0001-chacl-Use-portable-version-of-dirent-and-readdir.patch
> 
> diff --git 
> a/meta/recipes-support/attr/acl/0001-chacl-Use-portable-version-of-dirent-and-readdir.patch
>  
> b/meta/recipes-support/attr/acl/0001-chacl-Use-portable-version-of-dirent-and-readdir.patch
> new file mode 100644
> index 00..c51b90216f
> --- /dev/null
> +++ 
> b/meta/recipes-support/attr/acl/0001-chacl-Use-portable-version-of-dirent-and-readdir.patch
> @@ -0,0 +1,39 @@
> +From 1a5671a4eb13b81b98c3e71f00370781563f66d8 Mon Sep 17 00:00:00 2001
> +From: Khem Raj 
> +Date: Thu, 10 Nov 2022 17:57:24 -0800
> +Subject: [PATCH] chacl: Use portable version of dirent and readdir
> +
> +Using 64bit versions on 32bit architectures should be enabled with
> +--enable-largefile, this makes it portable across musl and glibc
> +
> +Upstream-Status: Submitted 
> [https://lists.nongnu.org/archive/html/acl-devel/2022-11/msg5.html]
> +Signed-off-by: Khem Raj 

Now a backport:

https://git.savannah.nongnu.org/cgit/acl.git/commit/?id=2b42f64737adf6a2ddd491213580d6e9cdd2f5af

:)

Cheers,

Richard


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#174323): 
https://lists.openembedded.org/g/openembedded-core/message/174323
Mute This Topic: https://lists.openembedded.org/mt/95389894/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



Re: [OE-core] [PATCH 3/6] btrfs-tools: Do not use 64bit functions for largefile support

2022-12-06 Thread Alexander Kanavin
I want to once again request that the whole set is not merged into
master until every patch has an upstream submission link. It's fine to
test them in master-next, but please do not merge.

Alex

On Thu, 1 Dec 2022 at 20:08, Alexander Kanavin via
lists.openembedded.org 
wrote:
>
> On Thu, 1 Dec 2022 at 20:02, Khem Raj  wrote:
> > +Upstream-Status: Pending
>
> Please submit this and all other patches in this set upstream first.
>
> Come on Khem, you should expect this response, and I should not have
> to tell you.
>
> Alex
>
> 
>

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#174322): 
https://lists.openembedded.org/g/openembedded-core/message/174322
Mute This Topic: https://lists.openembedded.org/mt/95389895/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



Re: [OE-core][PATCH] scripts: convert-overrides: Allow command-line customizations

2022-12-06 Thread Steve Sakoman
On Tue, Dec 6, 2022 at 4:40 AM Joshua Watt  wrote:

> I don't see this one in (or pending for) kirkstone yet?

Oops, I thought I had done that. Sorry!  I've got it now for both
langdale and kirkstone.

Steve

> On Tue, Nov 15, 2022 at 3:56 PM Steve Sakoman  wrote:
> >
> >
> >
> > On Tue, Nov 15, 2022, 9:42 AM Joshua Watt  wrote:
> >>
> >> Steve,
> >>
> >> Please backport this to kirkstone and langdale.
> >>
> >> Thanks!
> >
> >
> > Ok, will do!
> >
> > Steve
> >
> >
> >>
> >> On Fri, Nov 11, 2022 at 8:55 AM Joshua Watt  wrote:
> >> >
> >> > Adds argument parsing to the conversion script so that the fields that
> >> > the script uses to do conversions can be customized on the command line.
> >> > The intention is to allows easier customization without having to fork
> >> > the script, and allow automated checking on 3rd party layers via CI
> >> > without false positives
> >> >
> >> > Signed-off-by: Joshua Watt 
> >> > ---
> >> >  scripts/contrib/convert-overrides.py | 103 +++
> >> >  1 file changed, 57 insertions(+), 46 deletions(-)
> >> >
> >> > diff --git a/scripts/contrib/convert-overrides.py 
> >> > b/scripts/contrib/convert-overrides.py
> >> > index 4d41a4c4759..1939757f1bc 100755
> >> > --- a/scripts/contrib/convert-overrides.py
> >> > +++ b/scripts/contrib/convert-overrides.py
> >> > @@ -22,50 +22,62 @@ import sys
> >> >  import tempfile
> >> >  import shutil
> >> >  import mimetypes
> >> > +import argparse
> >> >
> >> > -if len(sys.argv) < 2:
> >> > -print("Please specify a directory to run the conversion script 
> >> > against.")
> >> > -sys.exit(1)
> >> > +parser = argparse.ArgumentParser(description="Convert override syntax")
> >> > +parser.add_argument("--override", "-o", action="append", default=[], 
> >> > help="Add additional strings to consider as an override (e.g. custom 
> >> > machines/distros")
> >> > +parser.add_argument("--skip", "-s", action="append", default=[], 
> >> > help="Add additional string to skip and not consider an override")
> >> > +parser.add_argument("--skip-ext", "-e", action="append", default=[], 
> >> > help="Additional file suffixes to skip when processing (e.g. '.foo')")
> >> > +parser.add_argument("--package-vars", action="append", default=[], 
> >> > help="Additional variables to treat as package variables")
> >> > +parser.add_argument("--image-vars", action="append", default=[], 
> >> > help="Additional variables to treat as image variables")
> >> > +parser.add_argument("--short-override", action="append", default=[], 
> >> > help="Additional strings to treat as short overrides")
> >> > +parser.add_argument("path", nargs="+", help="Paths to convert")
> >> > +
> >> > +args = parser.parse_args()
> >> >
> >> >  # List of strings to treat as overrides
> >> > -vars = ["append", "prepend", "remove"]
> >> > -vars = vars + ["qemuarm", "qemux86", "qemumips", "qemuppc", 
> >> > "qemuriscv", "qemuall"]
> >> > -vars = vars + ["genericx86", "edgerouter", "beaglebone-yocto"]
> >> > -vars = vars + ["armeb", "arm", "armv5", "armv6", "armv4", "powerpc64", 
> >> > "aarch64", "riscv32", "riscv64", "x86", "mips64", "powerpc"]
> >> > -vars = vars + ["mipsarch", "x86-x32", "mips16e", "microblaze", 
> >> > "e5500-64b", "mipsisa32", "mipsisa64"]
> >> > -vars = vars + ["class-native", "class-target", "class-cross-canadian", 
> >> > "class-cross", "class-devupstream"]
> >> > -vars = vars + ["tune-",  "pn-", "forcevariable"]
> >> > -vars = vars + ["libc-musl", "libc-glibc", 
> >> > "libc-newlib","libc-baremetal"]
> >> > -vars = vars + ["task-configure", "task-compile", "task-install", 
> >> > "task-clean", "task-image-qa", "task-rm_work", "task-image-complete", 
> >> > "task-populate-sdk"]
> >> > -vars = vars + ["toolchain-clang", "mydistro", "nios2", "sdkmingw32", 
> >> > "overrideone", "overridetwo"]
> >> > -vars = vars + ["linux-gnux32", "linux-muslx32", "linux-gnun32", 
> >> > "mingw32", "poky", "darwin", "linuxstdbase"]
> >> > -vars = vars + ["linux-gnueabi", "eabi"]
> >> > -vars = vars + ["virtclass-multilib", "virtclass-mcextend"]
> >> > +vars = args.override
> >> > +vars += ["append", "prepend", "remove"]
> >> > +vars += ["qemuarm", "qemux86", "qemumips", "qemuppc", "qemuriscv", 
> >> > "qemuall"]
> >> > +vars += ["genericx86", "edgerouter", "beaglebone-yocto"]
> >> > +vars += ["armeb", "arm", "armv5", "armv6", "armv4", "powerpc64", 
> >> > "aarch64", "riscv32", "riscv64", "x86", "mips64", "powerpc"]
> >> > +vars += ["mipsarch", "x86-x32", "mips16e", "microblaze", "e5500-64b", 
> >> > "mipsisa32", "mipsisa64"]
> >> > +vars += ["class-native", "class-target", "class-cross-canadian", 
> >> > "class-cross", "class-devupstream"]
> >> > +vars += ["tune-",  "pn-", "forcevariable"]
> >> > +vars += ["libc-musl", "libc-glibc", "libc-newlib","libc-baremetal"]
> >> > +vars += ["task-configure", "task-compile", "task-install", 
> >> > "task-clean", "task-image-qa", "task-rm_work", "task-image-complete", 
> >> > "task-populate-sdk"]
> >> > +vars += 

Re: [OE-core][PATCH] scripts: convert-overrides: Allow command-line customizations

2022-12-06 Thread Joshua Watt
Steve,

I don't see this one in (or pending for) kirkstone yet?

Thanks,
Joshua Watt

On Tue, Nov 15, 2022 at 3:56 PM Steve Sakoman  wrote:
>
>
>
> On Tue, Nov 15, 2022, 9:42 AM Joshua Watt  wrote:
>>
>> Steve,
>>
>> Please backport this to kirkstone and langdale.
>>
>> Thanks!
>
>
> Ok, will do!
>
> Steve
>
>
>>
>> On Fri, Nov 11, 2022 at 8:55 AM Joshua Watt  wrote:
>> >
>> > Adds argument parsing to the conversion script so that the fields that
>> > the script uses to do conversions can be customized on the command line.
>> > The intention is to allows easier customization without having to fork
>> > the script, and allow automated checking on 3rd party layers via CI
>> > without false positives
>> >
>> > Signed-off-by: Joshua Watt 
>> > ---
>> >  scripts/contrib/convert-overrides.py | 103 +++
>> >  1 file changed, 57 insertions(+), 46 deletions(-)
>> >
>> > diff --git a/scripts/contrib/convert-overrides.py 
>> > b/scripts/contrib/convert-overrides.py
>> > index 4d41a4c4759..1939757f1bc 100755
>> > --- a/scripts/contrib/convert-overrides.py
>> > +++ b/scripts/contrib/convert-overrides.py
>> > @@ -22,50 +22,62 @@ import sys
>> >  import tempfile
>> >  import shutil
>> >  import mimetypes
>> > +import argparse
>> >
>> > -if len(sys.argv) < 2:
>> > -print("Please specify a directory to run the conversion script 
>> > against.")
>> > -sys.exit(1)
>> > +parser = argparse.ArgumentParser(description="Convert override syntax")
>> > +parser.add_argument("--override", "-o", action="append", default=[], 
>> > help="Add additional strings to consider as an override (e.g. custom 
>> > machines/distros")
>> > +parser.add_argument("--skip", "-s", action="append", default=[], 
>> > help="Add additional string to skip and not consider an override")
>> > +parser.add_argument("--skip-ext", "-e", action="append", default=[], 
>> > help="Additional file suffixes to skip when processing (e.g. '.foo')")
>> > +parser.add_argument("--package-vars", action="append", default=[], 
>> > help="Additional variables to treat as package variables")
>> > +parser.add_argument("--image-vars", action="append", default=[], 
>> > help="Additional variables to treat as image variables")
>> > +parser.add_argument("--short-override", action="append", default=[], 
>> > help="Additional strings to treat as short overrides")
>> > +parser.add_argument("path", nargs="+", help="Paths to convert")
>> > +
>> > +args = parser.parse_args()
>> >
>> >  # List of strings to treat as overrides
>> > -vars = ["append", "prepend", "remove"]
>> > -vars = vars + ["qemuarm", "qemux86", "qemumips", "qemuppc", "qemuriscv", 
>> > "qemuall"]
>> > -vars = vars + ["genericx86", "edgerouter", "beaglebone-yocto"]
>> > -vars = vars + ["armeb", "arm", "armv5", "armv6", "armv4", "powerpc64", 
>> > "aarch64", "riscv32", "riscv64", "x86", "mips64", "powerpc"]
>> > -vars = vars + ["mipsarch", "x86-x32", "mips16e", "microblaze", 
>> > "e5500-64b", "mipsisa32", "mipsisa64"]
>> > -vars = vars + ["class-native", "class-target", "class-cross-canadian", 
>> > "class-cross", "class-devupstream"]
>> > -vars = vars + ["tune-",  "pn-", "forcevariable"]
>> > -vars = vars + ["libc-musl", "libc-glibc", "libc-newlib","libc-baremetal"]
>> > -vars = vars + ["task-configure", "task-compile", "task-install", 
>> > "task-clean", "task-image-qa", "task-rm_work", "task-image-complete", 
>> > "task-populate-sdk"]
>> > -vars = vars + ["toolchain-clang", "mydistro", "nios2", "sdkmingw32", 
>> > "overrideone", "overridetwo"]
>> > -vars = vars + ["linux-gnux32", "linux-muslx32", "linux-gnun32", 
>> > "mingw32", "poky", "darwin", "linuxstdbase"]
>> > -vars = vars + ["linux-gnueabi", "eabi"]
>> > -vars = vars + ["virtclass-multilib", "virtclass-mcextend"]
>> > +vars = args.override
>> > +vars += ["append", "prepend", "remove"]
>> > +vars += ["qemuarm", "qemux86", "qemumips", "qemuppc", "qemuriscv", 
>> > "qemuall"]
>> > +vars += ["genericx86", "edgerouter", "beaglebone-yocto"]
>> > +vars += ["armeb", "arm", "armv5", "armv6", "armv4", "powerpc64", 
>> > "aarch64", "riscv32", "riscv64", "x86", "mips64", "powerpc"]
>> > +vars += ["mipsarch", "x86-x32", "mips16e", "microblaze", "e5500-64b", 
>> > "mipsisa32", "mipsisa64"]
>> > +vars += ["class-native", "class-target", "class-cross-canadian", 
>> > "class-cross", "class-devupstream"]
>> > +vars += ["tune-",  "pn-", "forcevariable"]
>> > +vars += ["libc-musl", "libc-glibc", "libc-newlib","libc-baremetal"]
>> > +vars += ["task-configure", "task-compile", "task-install", "task-clean", 
>> > "task-image-qa", "task-rm_work", "task-image-complete", 
>> > "task-populate-sdk"]
>> > +vars += ["toolchain-clang", "mydistro", "nios2", "sdkmingw32", 
>> > "overrideone", "overridetwo"]
>> > +vars += ["linux-gnux32", "linux-muslx32", "linux-gnun32", "mingw32", 
>> > "poky", "darwin", "linuxstdbase"]
>> > +vars += ["linux-gnueabi", "eabi"]
>> > +vars += ["virtclass-multilib", "virtclass-mcextend"]
>> >
>> >  # List of strings to treat as