Enables multiple folders in -d option the current use case is to be able
specify multilib folders in the same run.
The -d option allows directories without whitespaces inside, example to
run after compile:
$ ./ptest-runner -d "test/data tests/data2/"
[YOCTO #12604]
Signed-off-by: Aníbal Limón
Fixes,
...
alimon@blackbox:~/upstream/ptest-runner2$ make CC=gcc check
gcc -std=gnu99 -pedantic -Wall -Werror -I . -g -c tests/main.c -o tests/main.o
gcc -std=gnu99 -pedantic -Wall -Werror -I . -g -c tests/ptest_list.c -o
tests/ptest_list.o
gcc -std=gnu99 -pedantic -Wall -Werror -I . -g -c
Hi all,
On Fri, Apr 10, 2020 at 8:56 AM Marek Belisko wrote:
>
> Hi,
>
> in meta-intel in machine configuration SERIAL_CONSOLES are defined as
> : SERIAL_CONSOLES = "115200;ttyS0 115200;ttyS1 115200;ttyS2"
>
For a more generic solution, could this be made a weak assignment?
I am on a SMARC
From: Bartosz Golaszewski
I'm terribly sorry for spamming, but I eventually decided to resend it: not
only the tags were messed up but I also added a v2 on top. This time it
should be good.
===
This series attempts to introduce support for dm-verity in meta-security.
It depends on a series[1]
From: Bartosz Golaszewski
This adds various bits and pieces to enable generating a working example
of a full chain of trust up to dm-verity-protected rootfs level on Beagle
Bone Black.
The new initramfs is quite generic and should work for other SoCs as well
when using fitImage.
The following
From: Bartosz Golaszewski
This adds a class that allows to generate conversions of ext[234] and
btrfs partitions images with dm-verity hash data appended at the end as
well as a corresponding .env file containing the root hash and data
offset that can be stored in a secure location (e.g. signed
pt., 10 kwi 2020 o 14:34 Bartosz Golaszewski napisał(a):
>
> From: Bartosz Golaszewski
>
> This series attempts to introduce support for dm-verity in meta-security.
> It depends on a series[1] I submitted for OE-core that introduces multi-stage
> image deployment that's currently pending review
From: Bartosz Golaszewski
This series attempts to introduce support for dm-verity in meta-security.
It depends on a series[1] I submitted for OE-core that introduces multi-stage
image deployment that's currently pending review (although the general idea
was accepted by Richard). This new way of
From: Bartosz Golaszewski
This adds various bits and pieces to enable generating a working example
of a full chain of trust up to dm-verity-protected rootfs level on Beagle
Bone Black.
The new initramfs is quite generic and should work for other SoCs as well
when using fitImage.
The following
From: Bartosz Golaszewski
This adds a class that allows to generate conversions of ext[234] and
btrfs partitions images with dm-verity hash data appended at the end as
well as a corresponding .env file containing the root hash and data
offset that can be stored in a secure location (e.g. signed
Interrupts are off during resume from RAM, this will triger a warning
when allocate memory in non-preemptible context on RT since commit
0efa03618228 ("mm: Warn on memory allocation in non-preemptible
context on RT"), exclude suspend from this warning check.
Fixes: 0efa03618228 ("mm: Warn on
Hi Bruce.
Trouble help merged features/f2fs to yocto-5.2
Thank you
发件人: Bruce Ashfield
发送时间: 2020年3月26日 10:33
收件人: Zhang, Qiang
抄送: linux-yocto@lists.yoctoproject.org
主题: Re: [linux-yocto][yocto-kernel-cache][master yocto-5.4][PATCH]
features/f2fs: add f2fs
Hi,
in meta-intel in machine configuration SERIAL_CONSOLES are defined as
: SERIAL_CONSOLES = "115200;ttyS0 115200;ttyS1 115200;ttyS2"
I would like to remove content of this variable (as on my target
system I get always this in journalctl):
Apr 06 11:12:54 intel-corei7-64 systemd[1]:
13 matches
Mail list logo