Re: [OE-core] [pyro][PATCH v2] openssl: Upgrade from 1.0.2k to 1.0.2n
akuster808wrote on 02/21/2018 07:03:50 AM: > From: akuster808 > To: Robert Joslyn , openembedded- > c...@lists.openembedded.org, > Date: 02/21/2018 07:03 AM > Subject: Re: [OE-core] [pyro][PATCH v2] openssl: Upgrade from 1.0.2kto 1.0.2n > > On 02/13/2018 07:28 PM, Robert Joslyn wrote: > Drop patches already applied upstream. Refresh parallel.patch using > latest version from master. > > LICENSE checksum changed because of updated copyright years and a minor > wording change. > > Signed-off-by: Robert Joslyn > > This is failing in the AB. > ERROR: openssl-1.0.2n-r0 do_package: objcopy failed with exit code 1 > (cmd was 'mips64-poky-linux-objcopy' --only-keep-debug '/home/ > pokybuild/yocto-autobuilder/yocto-worker/nightly-mips64/build/build/ > tmp/work/mips64-poky-linux/openssl/1.0.2n-r0/package/usr/lib/ > openssl/ptest/test/x509aux' '/home/pokybuild/yocto-autobuilder/ > yocto-worker/nightly-mips64/build/build/tmp/work/mips64-poky-linux/ > openssl/1.0.2n-r0/package/usr/lib/openssl/ptest/test/.debug/x509aux'): > mips64-poky-linux-objcopy: Unable to recognise the format of the > input file `/home/pokybuild/yocto-autobuilder/yocto-worker/nightly- > mips64/build/build/tmp/work/mips64-poky-linux/openssl/1.0.2n-r0/ > package/usr/lib/openssl/ptest/test/x509aux' > ERROR: openssl-1.0.2n-r0 do_package: Function failed: split_and_strip_files > > on mips arch64 > > DISTRO = "poky" > MACHINE = "qemuarm64" > bitbake -k core-image-sato core-image-sato-dev core-image-sato-sdk > core-image-minimal core-image-minimal-dev > dropping patch for now. > > - armin Sorry about that, looks like there were a few changes to ptest that I missed. I'll send out an updated patch later today. Thanks, Robert -- ___ Openembedded-core mailing list Openembedded-core@lists.openembedded.org http://lists.openembedded.org/mailman/listinfo/openembedded-core
Re: [OE-core] ✗ patchtest: failure for openssl: Upgrade from 1.0.2k to 1.0.2n
Patchworkwrote on 02/13/2018 12:04:30 PM: > == Series Details == > > Series: openssl: Upgrade from 1.0.2k to 1.0.2n > Revision: 1 > URL : https://urldefense.proofpoint.com/v2/url? > u=https-3A__patchwork.openembedded.org_series_10958_=DwICaQ=zVFQZQ67ypsA9mYKSCqWmQHiVkCCaN- > Gb60_N6TVnLk=jKjb9x138uKtDnkEJ0l_Ks7NxaK4YpEWM1o0MkNOIx0=e7jg3aTWVYdmFaC21AlrNvOx1_qajpaOj2OHjsTZ654=9QNMi3VNaubjQf3y9jBZmv5TBjaNNWdE9v75bBdAzR8= > State : failure > > == Summary == > > > Thank you for submitting this patch series to OpenEmbedded Core. This is > an automated response. Several tests have been executed on the proposed > series by patchtest resulting in the following failures: > > > > * Issue Series does not apply on top of target branch > [test_series_merge_on_head] > Suggested fixRebase your series on top of targeted branch > Targeted branch pyro (currently at 2c61e60cc5) > > > > If you believe any of these test results are incorrect, please reply to the > mailing list (openembedded-core@lists.openembedded.org) raising yourconcerns. > Otherwise we would appreciate you correcting the issues and submitting a new > version of the patchset if applicable. Please ensure you add/increment the > version number when sending the new version (i.e. [PATCH] -> [PATCH v2] -> > [PATCH v3] -> ...). > > --- > Guidelines: https://urldefense.proofpoint.com/v2/url? > u=https-3A__www.openembedded.org_wiki_Commit-5FPatch-5FMessage-5FGuidelines=DwICaQ=zVFQZQ67ypsA9mYKSCqWmQHiVkCCaN- > Gb60_N6TVnLk=jKjb9x138uKtDnkEJ0l_Ks7NxaK4YpEWM1o0MkNOIx0=e7jg3aTWVYdmFaC21AlrNvOx1_qajpaOj2OHjsTZ654=- > jCJpJdJRPInvZ3mPBypauSGq16-k4Z4vRCcXMQ9F70= > Test framework: https://urldefense.proofpoint.com/v2/url? > u=http-3A__git.yoctoproject.org_cgit_cgit.cgi_patchtest=DwICaQ=zVFQZQ67ypsA9mYKSCqWmQHiVkCCaN- > Gb60_N6TVnLk=jKjb9x138uKtDnkEJ0l_Ks7NxaK4YpEWM1o0MkNOIx0=e7jg3aTWVYdmFaC21AlrNvOx1_qajpaOj2OHjsTZ654=QrASQqaT3MEEj1zQgTDQ5iQO93aJ2zooq57BdIgB1cU= > Test suite: https://urldefense.proofpoint.com/v2/url? > u=http-3A__git.yoctoproject.org_cgit_cgit.cgi_patchtest-2Doe=DwICaQ=zVFQZQ67ypsA9mYKSCqWmQHiVkCCaN- > Gb60_N6TVnLk=jKjb9x138uKtDnkEJ0l_Ks7NxaK4YpEWM1o0MkNOIx0=e7jg3aTWVYdmFaC21AlrNvOx1_qajpaOj2OHjsTZ654=fqNrlIHFwuTo2gHbIXgrogfoHFxaSl1EvqECV2p4Y- > w= > Unfortunately, this is caused by my company's email filter replacing URLs with redirects from proofpoint (which you can see more of above). It's an attempt at preventing us from clicking on malicious URLs, but I had no idea it did the replacement on outgoing email as well as incoming... I'll try to send the patch from a personal email account later. Thanks, Robert -- ___ Openembedded-core mailing list Openembedded-core@lists.openembedded.org http://lists.openembedded.org/mailman/listinfo/openembedded-core
Re: [OE-core] Backport OpenSSL 1.0.2n
akuster808wrote on 02/13/2018 08:27:52 AM: > On 02/12/2018 01:08 PM, robert_jos...@selinc.com wrote: > > I'm working with the pyro release, and noticed that it's still using > > openssl 1.0.2k. The latest version in the 1.0.2 series is 1.0.2n, which is > > already available on master. Is there a reason that the newer version > > hasn't made it back to pyro (or rocko, which is on 1.0.2m)? > openssl 1.1 was added and the openssl files got restructured making > simple cherry-picking not an option for older releases. > > 1.0.2n hit master 7 days ago, sorry for the delay. > > 1.0.2n is now in stable/rocko-next and will migrate to rocko when > appropriate. Sorry, I didn't notice that it only reached master a week ago. If you've already taken care of rocko, I'll send a patch for pyro shortly. Thanks, Robert -- ___ Openembedded-core mailing list Openembedded-core@lists.openembedded.org http://lists.openembedded.org/mailman/listinfo/openembedded-core
[OE-core] Backport OpenSSL 1.0.2n
I'm working with the pyro release, and noticed that it's still using openssl 1.0.2k. The latest version in the 1.0.2 series is 1.0.2n, which is already available on master. Is there a reason that the newer version hasn't made it back to pyro (or rocko, which is on 1.0.2m)? I know new package versions are not normally backported, but looking at the change log, I only see one change mentioned that is not a CVE fix (the 1.0.2l release): https://urldefense.proofpoint.com/v2/url?u=https-3A__git.openssl.org_-3Fp-3Dopenssl.git-3Ba-3Dblob-3Bf-3DCHANGES-3Bh-3Df2fc31a25c54b12fc7db40c03d39f9a68b9ec0e5-3Bhb-3De5bba24cd8bb3e5127a578b85c6edf013a38ea6d=DwIBAg=zVFQZQ67ypsA9mYKSCqWmQHiVkCCaN-Gb60_N6TVnLk=ak_pMnzuMKndrbvJGok-seoFenjTGhP3oPNUzKUOwzHhGpNMwSJsaHunyXDlBGjO=3JjPoO2FeIBSz3wggiqKGtYceKB5t__oSe8p6yDsQfM=oeCHfmZkkXVFW1aoMZsolXeFvKI9RTUtbdGBj61kheQ= I can send patches to bring 1.0.2n to rocko and pyro if they will be accepted. Thanks, Robert -- ___ Openembedded-core mailing list Openembedded-core@lists.openembedded.org http://lists.openembedded.org/mailman/listinfo/openembedded-core
[OE-core] [PATCH] btrfs-tools: Add libgcc to RDEPENDS
From: Robert Joslynlibgcc_s.so.1 is required by btrfs-tools at runtime for certain operations, such as scrub. Signed-off-by: Robert Joslyn --- meta/recipes-devtools/btrfs-tools/btrfs-tools_4.1.2.bb | 1 + 1 file changed, 1 insertion(+) diff --git a/meta/recipes-devtools/btrfs-tools/btrfs-tools_4.1.2.bb b/meta/recipes-devtools/btrfs-tools/btrfs-tools_4.1.2.bb index 37c622b..cc2ccfc 100644 --- a/meta/recipes-devtools/btrfs-tools/btrfs-tools_4.1.2.bb +++ b/meta/recipes-devtools/btrfs-tools/btrfs-tools_4.1.2.bb @@ -11,6 +11,7 @@ LICENSE = "GPLv2" LIC_FILES_CHKSUM = "file://COPYING;md5=fcb02dc552a041dee27e4b85c7396067" SECTION = "base" DEPENDS = "util-linux attr e2fsprogs lzo acl" +RDEPENDS_${PN} = "libgcc" SRCREV = "7f1328ccb5d159efe850d4eaea9b49bbe8c4181e" SRC_URI = "git://git.kernel.org/pub/scm/linux/kernel/git/kdave/btrfs-progs.git \ -- 1.9.1 -- ___ Openembedded-core mailing list Openembedded-core@lists.openembedded.org http://lists.openembedded.org/mailman/listinfo/openembedded-core