[ANNOUNCEMENT] Yocto Project 3.1.8 (dunfell-23.0.8) is Released
Vineela
Hello,
We are pleased to announce the Yocto Project 3.1.8 (dunfell-23.0.8) Release is now available for download.
http://downloads.yoctoproject.org/releases/yocto/yocto-3.1.8/poky-dunfell-23.0.8.tar.bz2 http://mirrors.kernel.org/yocto/yocto/yocto-3.1.8/poky-dunfell-23.0.8.tar.bz2
A gpg signed version of these release notes is available at:
http://downloads.yoctoproject.org/releases/yocto/yocto-3.1.8/RELEASENOTES
Full Test Report:
http://downloads.yoctoproject.org/releases/yocto/yocto-3.1.8/testreport.txt
Thank you for everyone's contributions to this release.
Vineela Tummalapalli Yocto Project Build and Release
- -------------------------- yocto-3.1.8 Release Notes - --------------------------
- -------------------------- Repositories/Downloads - --------------------------
Repository Name: poky Repository Location: https://git.yoctoproject.org/git/poky Branch: dunfell Tag: yocto-3.1.8 Git Revision: 6ebb33bdaccaeadff0c85aab27acf35723df00d8 Release Artefact: poky-dunfell-23.0.8 sha: 3ca4775bec270eae7d30bf290db42d918378891ba1be6026f30f6bc245be60e4 Download Locations: http://downloads.yoctoproject.org/releases/yocto/yocto-3.1.8/poky-dunfell-23.0.8.tar.bz2 http://mirrors.kernel.org/yocto/yocto/yocto-3.1.8/poky-dunfell-23.0.8.tar.bz2
Repository Name: openembedded-core Repository Location: https://git.openembedded.org/openembedded-core Branch: dunfell Tag: 2020-04.8-dunfell Git Revision: ecd636154e7cfc1349a7cfd8026a85eafa219535 Release Artefact: oecore-dunfell-23.0.8 sha: bf986f379fe1e038ccff49aee6f85e7006758738cddd916eb8dd3032a981c929 Download Locations: http://downloads.yoctoproject.org/releases/yocto/yocto-3.1.8/oecore-dunfell-23.0.8.tar.bz2 http://mirrors.kernel.org/yocto/yocto/yocto-3.1.8/oecore-dunfell-23.0.8.tar.bz2
Repository Name: meta-mingw Repository Location: https://git.yoctoproject.org/git/meta-mingw Branch: dunfell Tag: yocto-3.1.8 Git Revision: 524de686205b5d6736661d4532f5f98fee8589b7 Release Artefact: meta-mingw-dunfell-23.0.8 sha: 1c9f7ba3e9dba8ceb8155890c7365af6fc6486e54fba4aa3fb8032f6ea494bdb Download Locations: http://downloads.yoctoproject.org/releases/yocto/yocto-3.1.8/meta-mingw-dunfell-23.0.8.tar.bz2 http://mirrors.kernel.org/yocto/yocto/yocto-3.1.8/meta-mingw-dunfell-23.0.8.tar.bz2
Repository Name: meta-gplv2 Repository Location: https://git.yoctoproject.org/git/meta-gplv2 Branch: dunfell Tag: yocto-3.1.8 Git Revision: 60b251c25ba87e946a0ca4cdc8d17b1cb09292ac Release Artefact: meta-gplv2-dunfell-23.0.8 sha: 8106a9651a4d1a111f7922557d56898a00a6c1c88c80477997bf5a38a16fd208 Download Locations: http://downloads.yoctoproject.org/releases/yocto/yocto-3.1.8/meta-gplv2-dunfell-23.0.8.tar.bz2 http://mirrors.kernel.org/yocto/yocto/yocto-3.1.8/meta-gplv2-dunfell-23.0.8.tar.bz2
Repository Name: bitbake Repository Location: https://git.openembedded.org/bitbake Branch: 1.46 Tag: 2020-04.8-dunfell Git Revision: 078f3164dcb1de7a141bec3a8fd52631d0362631 Release Artefact: bitbake-dunfell-23.0.8 sha: 888ada8f64b94d03c430fcf309e994ed0bd96ff09d4909aacc0706e0cf8c8659 Download Locations: http://downloads.yoctoproject.org/releases/yocto/yocto-3.1.8/bitbake-dunfell-23.0.8.tar.bz2 http://mirrors.kernel.org/yocto/yocto/yocto-3.1.8/bitbake-dunfell-23.0.8.tar.bz2
Repository Name: yocto-docs Repository Location: https://git.yoctoproject.org/git/yocto-docs Branch: dunfell Tag: yocto-3.1.8 Git Revision:09b64a4d246bdcca62dddee152deef7b0dea69d7
- ------------ Contributors - ------------ Alexander Kanavin Anatol Belski Anuj Mittal Bruce Ashfield Chen Qi Christophe Chapuis Diego Sueiro Douglas Royds Gavin Li Guillaume Champagne Jose Quaresma Joshua Watt Kai Uwe Broulik Khem Raj Konrad Weihmann Lee Chee Yang Marek Vasut Mark Hatle Michael Opdenacker Mike Crowe Mikko Rapeli Mingli Yu Niels Avonds Peter Budny Peter Morrow Reto Schneider Richard Purdie Robert P. J. Day Romain Naour Ross Burton Stefan Ghinea Steve Sakoman Vinay Kumar Yanfei Xu Yann Dirson Yi Fan Yu Zhang Qiang zhengruoqin
- --------------- Known Issues - --------------- Intermittent Failure in ptest : strace.printstrn-umoven.gen.test
- --------------- Security Fixes - --------------- db: update CVE_PRODUCT avahi: Exclude CVE-2021-26720 from cve-check librsvg: Exclude CVE-2018-1000041 from cve-check coreutils: Exclude CVE-2016-2781 from cve-check tiff: Exclude CVE-2015-7313 from cve-check bluez: Exclude CVE-2020-12352 CVE-2020-24490 from cve-check ghostscript: Exclude CVE-2013-6629 from cve-check cpio: Exclude CVE-2010-4226 from cve-check unzip: Exclude CVE-2008-0888 from cve-check openssh: Exclude CVE-2008-3844 from cve-check openssh: Exclude CVE-2007-2768 from cve-check logrotate: Exclude CVE-2011-1548,1549,1550 from cve-check jquery: Exclude CVE-2007-2379 from cve-check qemu: Exclude CVE-2018-18438 from cve-check qemu: Exclude CVE-2007-0998 from cve-check qemu: Exclude CVE-2017-5957 from cve-check builder: whitelist CVE-2008-4178 (a different builder) libnotify: whitelist CVE-2013-7381 (specific to the NodeJS bindings) cairo: backport patch for CVE-2020-35492 glibc: Document and whitelist CVE-2019-1010022-25 tiff: fix CVE-2020-35523 CVE-2020-35524 qemu: fix CVE-2021-3392 subversion: fix CVE-2020-17525 binutils: fix CVE-2021-3487 tar: Fix CVE-2021-20193 Binutils: Fix CVE-2021-20197 wpa-supplicant: fix CVE-2021-30004 curl: Patch CVE-2021-22876 & CVE-2021-22890
- --------------- Fixes - --------------- build-appliance-image: Update to dunfell head revision poky.conf: Bump version for 3.1.8 release poky.conf: Add fedora33 as a supported distro documentation: prepare for 3.1.8 release ref-system-requirements.rst: Add Fedora 33 to list of supported distros sstate: Handle manifest 'corruption' issue boost: fix do_fetch failure Revert "cml1.bbclass: Return sorted list of cfg files" bitbake: providers: selected version not available should be a warning meta/lib/oe/rootfs.py: Fix typo "Restoreing" -> "Restoring" image.bbclass: fix comment "pacackages" -> "packages" dejagnu: needs expect at runtime linux-yocto/5.4: qemuppc32: reduce serial shutdown issues linux-firmware: include all relevant files in -bcm4356 linux-firmware: upgrade 20210208 -> 20210315 lsb-release: fix reproducibility failure oeqa/qemurunner: Improve handling of run_serial for shutdown commands oeqa/qemurunner: Fix binary vs str issue oeqa/qemurunner: Improve logging thread exit handling for qemu shutdown test python3-jinja2: 2.11.2 -> 2.11.3 poky-tiny.conf: set PREFERRED_VERSION_linux-yocto-tiny to 5.4% reproducible.py: add quilt-ptest and valgrind-ptest ovmf: update edk2-stable202005 -> edk2-stable202008 ovmf: update to 202005 ovmf: update to 202002 lib/package_manager: Use shutil.copy instead of bb.utils.copyfile for intercepts libevent: Increase ptest timing tolerance 50 ms -> 100 ms sanity.bbclass: mention CONNECTIVITY_CHECK_URIS in network failure message classes/image: Use xargs to set file timestamps Revert "oeqa: Set LD_LIBRARY_PATH when executing native commands" diffoscope: add native libraries to LD_LIBRARY_PATH make-mod-scripts: add HOSTCXX definitions and gmp-native dependency perf: fix python-audit RDEPENDS cml1.bbclass: Return sorted list of cfg files rootfs.py: find .ko.gz and .ko.xz kernel modules as well pybootchart/draw: Avoid divide by zero error gstreamer1.0-plugins-good: on wayland qt5 needs qtwayland kernel.bbclass: Remove do_install[prefunc] no longer needed ptest-runner: libgcc must be installed for pthread_cancel to work linux-yocto/5.4: update to v5.4.116 linux-yocto/5.4: update to v5.4.114 wireless-regdb: upgrade 2020.11.20 -> 2021.04.21 yocto-uninative: Update to 3.1 which includes a patchelf fix bitbake: fetch/gitsm: Fix crash when using git LFS and submodules bitbake: runqueue: Fix deferred task issues bitbake: bitbake: tests/fetch: remove write protected files too bitbake: bitbake: tests/fetch: fix test execution without .gitconfig license_image.bbclass: Fix symlink to generic license files license_image.bbclass: Detect broken symlinks linux-firmware: Package RSI 911x WiFi firmware yocto-check-layer: Avoid bug when iterating and autoadding dependencies kernel.bbclass: Configuration for environment with HOSTCXX meta/lib/oeqa/core/tests/cases/timeout.py: add a testcase for the previous fix oeqa: tear down oeqa decorators if one of them raises an exception in setup oeqa/selftest/bblayers: Add test case for bitbake-layers layerindex-show-depends cve-update-db-native: skip on empty cpe23Uri linux-yocto/5.4: fix arm defconfig warnings linux-yocto/5.4: update to v5.4.112 linux-yocto/5.4: update to v5.4.111 linux-yocto/5.4: update to v5.4.109 ca-certificates: Fix openssl runtime cert dependencies parselogs: ignore floppy error on qemu-system-x86 at boot stage groff: not ship /usr/bin/grap2graph libtool: make sure autoheader run before automake kmod: do not symlink config.guess/config.sub during autoreconf pseudo: Upgrade to add trailing slashes ignore path fix lib/oe/terminal: Fix tmux new-session on older tmux versions (<1.9) sanity: Further improve directory sanity tests sanity: Add error check for '%' in build path insane: clean up some more warning messages oeqa/selftest: Ensure packages classes are set correctly for maintainers test oeqa/selftest: Hardcode test assumptions about heartbeat event timings externalsrc: Detect code changes in submodules Revert "externalsrc: Detect code changes in submodules" go_1.14: don't set -buildmode=pie when building for windows targets goarch: map target os to windows for mingw* TARGET_OS image-live.bbclass: optional depends when ROOTFS empty diffoscope: Upgrade 168 -> 172 diffoscope: Upgrade 136 -> 168 selftest/reproducible: Sort the unused exclusion list selftest/reproducible: track unusued entries in the exclusion list selftest/reproducible: adjust exclusion list for dunfell selftest/reproducible: add an exclusion list for items that are not yet reproducible selftest/reproducible: enable world reproducibility test
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Re: systemd, ELF binaries and runtime dependency tracking
Luca Bocassi
On Tue, 2021-06-01 at 09:23 -0700, Khem Raj wrote:
Yeah, I was thinking of starting from the systemd recipe only. Given the project has to add support for it, a distro-wide rollout wouldn't make much sense anyway. -- Kind regards, Luca Boccassi
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Re: How to switch yocto INIT_MANAGER from systemd to sysvinit
#dunfell
Swapna Nannapaneni
Example helps. Thanks!!
On Mon, May 31, 2021 at 2:05 AM Zoran <zoran.stojsavljevic@...> wrote: What about the following:
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Re: systemd, ELF binaries and runtime dependency tracking
On 6/1/21 9:13 AM, Luca Boccassi wrote:
On Tue, 2021-06-01 at 07:58 -0700, Khem Raj wrote:right and thats why I will be reluctant to go too far at distro level unless there is general interest in wider communities as it can make us an island.Yes ideally ELF shared objects/the linker/the loader would support weak There have been lots of theoretical discussions about pros and cons,you could tool it as a packageconfig for systemd alone and run with it and see how it pans out. So leaving aside other distros, is this something that would concretelywe could certainly try that, provided systemd upstream is supportive of it.
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Re: systemd, ELF binaries and runtime dependency tracking
Luca Bocassi
On Tue, 2021-06-01 at 07:58 -0700, Khem Raj wrote:
Yes ideally ELF shared objects/the linker/the loader would support weak symbols (like dylib on OSX). Unfortunately they do not, and it seems there's no interest to add it becasue there's no concrete use case that shows it's useful. But that cannot happen until there's some support for it. Chicken and egg... There have been lots of theoretical discussions about pros and cons, and my hope was that if at least one distro could find it useful, and could show that it is in practice useful and the theoretical issues are not that problematic and could be solved, others would follow suit. So leaving aside other distros, is this something that would concretely benefit the Yocto project for handling the systemd recipe? There are currently 12 dlopen()-based optional dependencies in systemd, and the number grows with each release. -- Kind regards, Luca Boccassi
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Yocto Technical Team Minutes, Engineering Sync, for June 1 2021
Trevor Woerner
Yocto Technical Team Minutes, Engineering Sync, for June 1 2021
archive: https://docs.google.com/document/d/1ly8nyhO14kDNnFcW2QskANXW3ZT7QwKC5wWVDg9dDH4/edit == disclaimer == Best efforts are made to ensure the below is accurate and valid. However, errors sometimes happen. If any errors or omissions are found, please feel free to reply to this email with any corrections. == attendees == Trevor Woerner, Stephen Jolley, Colin McAllister, Armin Kuster, Joshua Watt, Steve Sakoman, Saul Wold, Richard Purdie, Philip Ballister, Bruce Ashfield, Randy MacLeod, Michael Ambrus, Michael Halstead, Daiane Angolini, Peter Kjellerstedt, Trevor Gamblin, Ross Burton, Tim Orling, Alexandre Belloni, Jan-Simon Möller, Scott Murray, Tony Tascioglu == notes == - 3.4 M1 (honister) to be built next week - 3.1.8 (dunfell) passed QA, waiting final approval for release - CVE issue count: master=6, hardknott=14 - AUH to run more regularly - multiconfig issues still not ironed out - ptest based on core-image-minimal instead of core-image-sato - record high levels of AB intermittent issues == general == RP: AB int issues seemed to be helped by limited the number of threads used for compression RP: two cases of trying to talk to upstream but found problems with our logging, upstream says “go away and fix your logging” before we can continue discussions PeterK: question about yocto-poky tags RP: we stopped adding “hardknott-pokyversion” (e.g. “hardknott-25.0”) tags and this broke PeterK’s workflow. i would prefer to move away from these tags and use yocto tags instead PeterK: i’m okay moving to something new. “hardknott-3.3.1” would be better than “hardknott-25.0”. also, could we wait and not change this in the middle of a release series? (i.e. wait for the first release of honister). RP: i need to talk to MichaelH and Vineela and figure something out RP: this is part of a larger task to rationalize the release process a bit better (e.g. also need to tie in the documentation releases too with Nico) RP: this tells us that people are using some of these things that we didn’t think were being used MichaelH: Vineela and I have a couple other release things we need to go over, i’ll make a meeting. we could add tags going backwards so we can transition now. this would give us some correlation to the tags in openembedded etc TimO: freenode? RP: we didn’t do anything last week (due to Summit). i think Nico needs to coordinate with MichaelH. i believe we are moving over to libera.chat Scott: fd.o seems to have moved to OFTC TrevorW: do we have ops in #yocto and #oe? RP: yes TimO + PhilipB: we’ve got slack too JPEW: matrix integration too? TimO: yes Jan-Simon JPEW: SBOM RP: please discuss on licensing email list RP: i think there’s a plugfest going on and i don’t think anyone from YP has signed up Randy: Mark from WR is attending RP: i’d like to fly the YP flag there JPEW: details? RP: https://docs.google.com/forms/d/e/1FAIpQLSdVOewc3uCZh39inX4X7QsA_jaQMqyrEiLFrWEZEpWxRCi3eQ/viewform Philip: who’s interested in showing up at the plugfest? JPEW: i would, but 22nd doesn’t work for me Philip: i could go ??: what’s the layer? Saul: meta-doubleopen Ross: 22 doesn’t work for me either, but i could help put stuff together beforehand TrevorW: videos for YPS are up https://www.youtube.com/playlist?list=PLD4M5FoHz-TwWYbaJwduH8ZYNYvva76QQ https://elinux.org/YPS_May2021_Presentations Jan-Simon: what’s the procedure for updating layerindex? RP: PaulE is an admin Ross: I was added recently RP: MichaelH who are the admins? MichaelH: myself, PaulE, Ross, JaMa, Nico, Randy TimO: PaulE recently added me too J-S: there are a lot of issues with the layerindex (e.g. emails bouncing) Randy: should we move the next monthly meeting to avoid the 4th of July? RP: sounds good, we’ll move it to July 13th
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Re: systemd, ELF binaries and runtime dependency tracking
On 5/31/21 3:40 PM, Paul Eggleton wrote:
Hi folksFinding dlopen dependencies is a neat idea, but it has to be accepted cross distro, and also applications have to manually declare it in code if I understand systemd's patch correctly. This will be hard to accomplish as you can see changes are spread across apps from distro point of view. Perhaps there is a smarter way of detecting adding them in ELF spec itself and then have tools like linker help implement this and also possibly collect the information or guide the users to achieve this would be helpful. Cheers
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Yocto Project Status WW22`21
Stephen Jolley
Current Dev Position: YP 3.4 M1 Next Deadline: 7th June 2021 YP 3.4 M1 build
Next Team Meetings:
Key Status/Updates:
We are working to identify the load pattern on the infrastructure that seems to trigger these.
Ways to contribute:
YP 3.4 Milestone Dates:
Planned upcoming dot releases:
Tracking Metrics:
The Yocto Project’s technical governance is through its Technical Steering Committee, more information is available at: https://wiki.yoctoproject.org/wiki/TSC
The Status reports are now stored on the wiki at: https://wiki.yoctoproject.org/wiki/Weekly_Status
[If anyone has suggestions for other information you’d like to see on this weekly status update, let us know!]
Thanks,
Stephen K. Jolley Yocto Project Program Manager ( Cell: (208) 244-4460 * Email: sjolley.yp.pm@...
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Reminder: Yocto Project Technical Team Meeting @ Monthly from 8am on the first Tuesday (PDT)
Stephen Jolley
All,
Just a reminder we will hold the monthly Yocto Project Technical Meeting at 8am PST tomorrow. (6/1)
Yocto Project Technical Team Meeting: We encourage people attending the meeting to logon and announce themselves on the Yocto Project IRC chancel during the meeting (optional): Yocto IRC: http://webchat.freenode.net/?channels=#yocto
Wiki: https://www.yoctoproject.org/public-virtual-meetings/
When Monthly from 8am to 9am on the first Tuesday Pacific Time Where Zoom Meeting: https://zoom.us/j/990892712?pwd=cHU1MjhoM2x6ck81bkcrYjRrcmJsUT09
We are tracking the minutes at: https://docs.google.com/document/d/1ly8nyhO14kDNnFcW2QskANXW3ZT7QwKC5wWVDg9dDH4/edit?pli=1 Please request access if you want to assist in editing them. The world should have view access.
Thanks,
Stephen K. Jolley Yocto Project Program Manager ( Cell: (208) 244-4460 * Email: sjolley.yp.pm@...
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
systemd, ELF binaries and runtime dependency tracking
Paul Eggleton <paul.eggleton@...>
Hi folks
Upstream in the systemd project, a proposal has been made to add a special section to output ELF binaries to record soft runtime dependencies, so that they could be read and utilised by distribution build systems such as ours (they would be translated into RRECOMMENDS in our case). At the moment that doesn't seem to have generated a huge amount of interest in the traditional distro space, but would it be interesting for us? https://github.com/systemd/systemd/pull/17416 For clarity, we (Microsoft) will volunteer to do the integration assuming the above pull request gets reopened and merged, which is more likely if we express our interest. Cheers Paul
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
M+ & H bugs with Milestone Movements WW22
Stephen Jolley
All,
Thanks,
Stephen K. Jolley Yocto Project Program Manager ( Cell: (208) 244-4460 * Email: sjolley.yp.pm@...
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Enhancements/Bugs closed WW22!
Stephen Jolley
All,
Thanks,
Stephen K. Jolley Yocto Project Program Manager ( Cell: (208) 244-4460 * Email: sjolley.yp.pm@...
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Current high bug count owners for Yocto Project 3.4
Stephen Jolley
All,
Thanks,
Stephen K. Jolley Yocto Project Program Manager ( Cell: (208) 244-4460 * Email: sjolley.yp.pm@...
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Yocto Project Newcomer & Unassigned Bugs - Help Needed
Stephen Jolley
All,
The triage team is starting to try and collect up and classify bugs which a newcomer to the project would be able to work on in a way which means people can find them. They're being listed on the triage page under the appropriate heading: https://wiki.yoctoproject.org/wiki/Bug_Triage#Newcomer_Bugs Also please review: https://www.openembedded.org/wiki/How_to_submit_a_patch_to_OpenEmbedded and how to create a bugzilla account at: https://bugzilla.yoctoproject.org/createaccount.cgi The idea is these bugs should be straight forward for a person to help work on who doesn't have deep experience with the project. If anyone can help, please take ownership of the bug and send patches! If anyone needs help/advice there are people on irc who can likely do so, or some of the more experienced contributors will likely be happy to help too.
Also, the triage team meets weekly and does its best to handle the bugs reported into the Bugzilla. The number of people attending that meeting has fallen, as have the number of people available to help fix bugs. One of the things we hear users report is they don't know how to help. We (the triage team) are therefore going to start reporting out the currently 353 unassigned or newcomer bugs.
We're hoping people may be able to spare some time now and again to help out with these. Bugs are split into two types, "true bugs" where things don't work as they should and "enhancements" which are features we'd want to add to the system. There are also roughly four different "priority" classes right now, “3.2”, “3.3, "3.99" and "Future", the more pressing/urgent issues being in "3.2" and then “3.3”.
Please review this link and if a bug is something you would be able to help with either take ownership of the bug, or send me (sjolley.yp.pm@...) an e-mail with the bug number you would like and I will assign it to you (please make sure you have a Bugzilla account). The list is at: https://wiki.yoctoproject.org/wiki/Bug_Triage_Archive#Unassigned_or_Newcomer_Bugs
Thanks,
Stephen K. Jolley Yocto Project Program Manager ( Cell: (208) 244-4460 * Email: sjolley.yp.pm@...
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Bitbake failure
Cris Scott
Not sure who to ask about this. Using https://push.yoctoproject.org/cgit/cgit.cgi/poky/tree/meta/recipes-extended/lighttpd/lighttpd_1.4.59.bb to build lighttpd, bitbake fails, and I receive tons of messages that look like:
ERROR: lighttpd-1.4.59-r0 do_package_qa: QA Issue: /usr/lib/mod_staticfile.so contained in package lighttpd-module-staticfile requires libc.so.6(GLIBC_2.4), but no providers found in RDEPENDS_lighttpd-module-staticfile? [file-rdeps]
Can someone point me in the right direction to resolve this?
-Bill
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
kernel init debug features
Monsees, Steven C (US)
I have kernels based off “rocko” and “zeus” for both Arm and Intel… all using sysvinit (not systemd).
Under the Yocto build system, how can I easily set the following kernel configuration variables based on the build for testing/debug ?
· sched_rt_period_us · sched_rt_runtime_us · overcommit_memory
thanks, Steve
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Conditionally install files depending on locale
Hello,
I'm trying to put together a recipe where I conditionally install files depending on the image locale. I can see from the reference manual that Yocto will use the contents of IMAGE_LINGUAS to install locales during the root filesystem construction process. How can I go about creating locales for my custom packages/recipes?
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
[meta-security][PATCH 4/4] meta-hardening/initscripts: missed overide.
Helps pass YCL.
Signed-off-by: Armin Kuster <akuster808@...> --- .../recipes-core/initscripts/initscripts_1.0.bbappend | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/meta-hardening/recipes-core/initscripts/initscripts_1.0.bbappend b/meta-hardening/recipes-core/initscripts/initscripts_1.0.bbappend index 896b039..f943cb3 100644 --- a/meta-hardening/recipes-core/initscripts/initscripts_1.0.bbappend +++ b/meta-hardening/recipes-core/initscripts/initscripts_1.0.bbappend @@ -1,4 +1,4 @@ -FILESEXTRAPATHS_prepend := "${THISDIR}/files:" +FILESEXTRAPATHS_prepend_harden := "${THISDIR}/files:" SRC_URI_append_harden = " file://mountall.sh" -- 2.25.1
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
[meta-security][PATCH 3/4] meta-integrity: YCL fixups
We wont need the linux-% once the kernel-feature class is included in
core. Move the inherit into the image itself. Drop kernel patches not being used. Signed-off-by: Armin Kuster <akuster808@...> --- .../images/integrity-image-minimal.bb | 2 + .../recipes-kernel/linux/linux-%.bbappend | 5 - .../0001-ima-fix-ima_inode_post_setattr.patch | 51 ------- ...for-creating-files-using-the-mknodat.patch | 138 ------------------ ...-file-hash-setting-by-user-to-fix-an.patch | 60 -------- 5 files changed, 2 insertions(+), 254 deletions(-) delete mode 100644 meta-integrity/recipes-kernel/linux/linux-%.bbappend delete mode 100644 meta-integrity/recipes-kernel/linux/linux/0001-ima-fix-ima_inode_post_setattr.patch delete mode 100644 meta-integrity/recipes-kernel/linux/linux/0002-ima-add-support-for-creating-files-using-the-mknodat.patch delete mode 100644 meta-integrity/recipes-kernel/linux/linux/Revert-ima-limit-file-hash-setting-by-user-to-fix-an.patch diff --git a/meta-integrity/recipes-core/images/integrity-image-minimal.bb b/meta-integrity/recipes-core/images/integrity-image-minimal.bb index 1a3a30a..4e7895a 100644 --- a/meta-integrity/recipes-core/images/integrity-image-minimal.bb +++ b/meta-integrity/recipes-core/images/integrity-image-minimal.bb @@ -13,6 +13,8 @@ IMAGE_INSTALL = "\ LICENSE = "MIT" inherit core-image +inherit ${@bb.utils.contains('DISTRO_FEATURES', 'modsign', 'kernel-modsign', '', d)} + export IMAGE_BASENAME = "integrity-image-minimal" diff --git a/meta-integrity/recipes-kernel/linux/linux-%.bbappend b/meta-integrity/recipes-kernel/linux/linux-%.bbappend deleted file mode 100644 index f9a48cd..0000000 --- a/meta-integrity/recipes-kernel/linux/linux-%.bbappend +++ /dev/null @@ -1,5 +0,0 @@ -KERNEL_FEATURES_append = " ${@bb.utils.contains("DISTRO_FEATURES", "ima", " features/ima/ima.scc", "" ,d)}" - -KERNEL_FEATURES_append = " ${@bb.utils.contains('DISTRO_FEATURES', 'modsign', ' features/ima/modsign.scc', '', d)}" - -inherit ${@bb.utils.contains('DISTRO_FEATURES', 'modsign', 'kernel-modsign', '', d)} diff --git a/meta-integrity/recipes-kernel/linux/linux/0001-ima-fix-ima_inode_post_setattr.patch b/meta-integrity/recipes-kernel/linux/linux/0001-ima-fix-ima_inode_post_setattr.patch deleted file mode 100644 index 64016dd..0000000 --- a/meta-integrity/recipes-kernel/linux/linux/0001-ima-fix-ima_inode_post_setattr.patch +++ /dev/null @@ -1,51 +0,0 @@ -From 45ea681ebc0dd44aaec5d3cc4143b9722070d3ac Mon Sep 17 00:00:00 2001 -From: Mimi Zohar <zohar@...> -Date: Tue, 8 Mar 2016 16:43:55 -0500 -Subject: [PATCH] ima: fix ima_inode_post_setattr - -Changing file metadata (eg. uid, guid) could result in having to -re-appraise a file's integrity, but does not change the "new file" -status nor the security.ima xattr. The IMA_PERMIT_DIRECTIO and -IMA_DIGSIG_REQUIRED flags are policy rule specific. This patch -only resets these flags, not the IMA_NEW_FILE or IMA_DIGSIG flags. - -With this patch, changing the file timestamp will not remove the -file signature on new files. - -Upstream-Status: Accepted [https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/security/integrity/ima/ima_appraise.c?id=42a4c603198f0d45b7aa936d3ac6ba1b8bd14a1b] - -Reported-by: Dmitry Rozhkov <dmitry.rozhkov@...> -Signed-off-by: Mimi Zohar <zohar@...> ---- - security/integrity/ima/ima_appraise.c | 2 +- - security/integrity/integrity.h | 1 + - 2 files changed, 2 insertions(+), 1 deletion(-) - -diff --git a/security/integrity/ima/ima_appraise.c b/security/integrity/ima/ima_appraise.c -index 4df493e..a384ba1 100644 ---- a/security/integrity/ima/ima_appraise.c -+++ b/security/integrity/ima/ima_appraise.c -@@ -327,7 +327,7 @@ void ima_inode_post_setattr(struct dentry *dentry) - if (iint) { - iint->flags &= ~(IMA_APPRAISE | IMA_APPRAISED | - IMA_APPRAISE_SUBMASK | IMA_APPRAISED_SUBMASK | -- IMA_ACTION_FLAGS); -+ IMA_ACTION_RULE_FLAGS); - if (must_appraise) - iint->flags |= IMA_APPRAISE; - } -diff --git a/security/integrity/integrity.h b/security/integrity/integrity.h -index 0fc9519..f9decae 100644 ---- a/security/integrity/integrity.h -+++ b/security/integrity/integrity.h -@@ -28,6 +28,7 @@ - - /* iint cache flags */ - #define IMA_ACTION_FLAGS 0xff000000 -+#define IMA_ACTION_RULE_FLAGS 0x06000000 - #define IMA_DIGSIG 0x01000000 - #define IMA_DIGSIG_REQUIRED 0x02000000 - #define IMA_PERMIT_DIRECTIO 0x04000000 --- -2.5.0 - diff --git a/meta-integrity/recipes-kernel/linux/linux/0002-ima-add-support-for-creating-files-using-the-mknodat.patch b/meta-integrity/recipes-kernel/linux/linux/0002-ima-add-support-for-creating-files-using-the-mknodat.patch deleted file mode 100644 index 6ab7ce2..0000000 --- a/meta-integrity/recipes-kernel/linux/linux/0002-ima-add-support-for-creating-files-using-the-mknodat.patch +++ /dev/null @@ -1,138 +0,0 @@ -From baaec960e9e7be0b526eaf831b079ddfe5c15124 Mon Sep 17 00:00:00 2001 -From: Mimi Zohar <zohar@...> -Date: Thu, 10 Mar 2016 18:19:20 +0200 -Subject: [PATCH] ima: add support for creating files using the mknodat - syscall - -Commit 3034a14 "ima: pass 'opened' flag to identify newly created files" -stopped identifying empty files as new files. However new empty files -can be created using the mknodat syscall. On systems with IMA-appraisal -enabled, these empty files are not labeled with security.ima extended -attributes properly, preventing them from subsequently being opened in -order to write the file data contents. This patch marks these empty -files, created using mknodat, as new in order to allow the file data -contents to be written. - -Files with security.ima xattrs containing a file signature are considered -"immutable" and can not be modified. The file contents need to be -written, before signing the file. This patch relaxes this requirement -for new files, allowing the file signature to be written before the file -contents. - -Upstream-Status: Accepted [https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/security/integrity/ima/ima_appraise.c?id=05d1a717ec0430c916a749b94eb90ab74bbfa356] - -Signed-off-by: Mimi Zohar <zohar@...> ---- - fs/namei.c | 2 ++ - include/linux/ima.h | 7 ++++++- - security/integrity/ima/ima_appraise.c | 3 +++ - security/integrity/ima/ima_main.c | 32 +++++++++++++++++++++++++++++++- - 4 files changed, 42 insertions(+), 2 deletions(-) - -diff --git a/fs/namei.c b/fs/namei.c -index ccd7f98..19502da 100644 ---- a/fs/namei.c -+++ b/fs/namei.c -@@ -3526,6 +3526,8 @@ retry: - switch (mode & S_IFMT) { - case 0: case S_IFREG: - error = vfs_create(path.dentry->d_inode,dentry,mode,true); -+ if (!error) -+ ima_post_path_mknod(dentry); - break; - case S_IFCHR: case S_IFBLK: - error = vfs_mknod(path.dentry->d_inode,dentry,mode, -diff --git a/include/linux/ima.h b/include/linux/ima.h -index 120ccc5..7f51971 100644 ---- a/include/linux/ima.h -+++ b/include/linux/ima.h -@@ -20,7 +20,7 @@ extern void ima_file_free(struct file *file); - extern int ima_file_mmap(struct file *file, unsigned long prot); - extern int ima_module_check(struct file *file); - extern int ima_fw_from_file(struct file *file, char *buf, size_t size); -- -+extern void ima_post_path_mknod(struct dentry *dentry); - #else - static inline int ima_bprm_check(struct linux_binprm *bprm) - { -@@ -52,6 +52,11 @@ static inline int ima_fw_from_file(struct file *file, char *buf, size_t size) - return 0; - } - -+static inline void ima_post_path_mknod(struct dentry *dentry) -+{ -+ return; -+} -+ - #endif /* CONFIG_IMA */ - - #ifdef CONFIG_IMA_APPRAISE -diff --git a/security/integrity/ima/ima_appraise.c b/security/integrity/ima/ima_appraise.c -index 4df493e..20806ea 100644 ---- a/security/integrity/ima/ima_appraise.c -+++ b/security/integrity/ima/ima_appraise.c -@@ -274,6 +274,11 @@ out: - xattr_value->type != EVM_IMA_XATTR_DIGSIG)) { - if (!ima_fix_xattr(dentry, iint)) - status = INTEGRITY_PASS; -+ } else if ((inode->i_size == 0) && -+ (iint->flags & IMA_NEW_FILE) && -+ (xattr_value && -+ xattr_value->type == EVM_IMA_XATTR_DIGSIG)) { -+ status = INTEGRITY_PASS; - } - integrity_audit_msg(AUDIT_INTEGRITY_DATA, inode, filename, - op, cause, rc, 0); -diff --git a/security/integrity/ima/ima_main.c b/security/integrity/ima/ima_main.c -index eeee00dc..705bf78 100644 ---- a/security/integrity/ima/ima_main.c -+++ b/security/integrity/ima/ima_main.c -@@ -242,7 +242,8 @@ static int process_measurement(struct file *file, int mask, int function, - ima_audit_measurement(iint, pathname); - - out_digsig: -- if ((mask & MAY_WRITE) && (iint->flags & IMA_DIGSIG)) -+ if ((mask & MAY_WRITE) && (iint->flags & IMA_DIGSIG) && -+ !(iint->flags & IMA_NEW_FILE)) - rc = -EACCES; - kfree(xattr_value); - out_free: -@@ -310,6 +311,35 @@ int ima_file_check(struct file *file, int mask, int opened) - EXPORT_SYMBOL_GPL(ima_file_check); - - /** -+ * ima_post_path_mknod - mark as a new inode -+ * @dentry: newly created dentry -+ * -+ * Mark files created via the mknodat syscall as new, so that the -+ * file data can be written later. -+ */ -+void ima_post_path_mknod(struct dentry *dentry) -+{ -+ struct integrity_iint_cache *iint; -+ struct inode *inode; -+ int must_appraise; -+ -+ if (!dentry || !dentry->d_inode) -+ return; -+ -+ inode = dentry->d_inode; -+ if (inode->i_size != 0) -+ return; -+ -+ must_appraise = ima_must_appraise(inode, MAY_ACCESS, FILE_CHECK); -+ if (!must_appraise) -+ return; -+ -+ iint = integrity_inode_get(inode); -+ if (iint) -+ iint->flags |= IMA_NEW_FILE; -+} -+ -+/** - * ima_module_check - based on policy, collect/store/appraise measurement. - * @file: pointer to the file to be measured/appraised - * --- -2.5.0 - diff --git a/meta-integrity/recipes-kernel/linux/linux/Revert-ima-limit-file-hash-setting-by-user-to-fix-an.patch b/meta-integrity/recipes-kernel/linux/linux/Revert-ima-limit-file-hash-setting-by-user-to-fix-an.patch deleted file mode 100644 index 157c007..0000000 --- a/meta-integrity/recipes-kernel/linux/linux/Revert-ima-limit-file-hash-setting-by-user-to-fix-an.patch +++ /dev/null @@ -1,60 +0,0 @@ -From a34d61850b680c152e1dcc958ee83c3ab3261c3d Mon Sep 17 00:00:00 2001 -From: Patrick Ohly <patrick.ohly@...> -Date: Tue, 15 Nov 2016 10:10:23 +0100 -Subject: [PATCH] Revert "ima: limit file hash setting by user to fix and log - modes" - -This reverts commit c68ed80c97d9720f51ef31fe91560fdd1e121533. - -The original motivation was security hardening ("File hashes are -automatically set and updated and should not be manually set.") - -However, that hardening ignores and breaks some valid use cases: -- File hashes might not be set because the file is currently - outside of the policy and therefore have to be set by the - creator. Examples: - - Booting into an initramfs with an IMA-enabled kernel but - without setting an IMA policy, then installing - the OS onto the target partition by unpacking a rootfs archive - which has the file hashes pre-computed. - - Unpacking a file into a staging area with meta data (like owner) - that leaves the file outside of the current policy, then changing - the meta data such that it becomes part of the current policy. -- "should not be set manually" implies that the creator is aware - of IMA semantic, the current system's configuration, and then - skips setting file hashes in security.ima if (and only if) the - kernel would prevent it. That's not the case for standard, unmodified - tools. Example: unpacking an archive with security.ima xattrs with - bsdtar or GNU tar. - -Upstream-Status: Submitted [https://sourceforge.net/p/linux-ima/mailman/message/35492824/] - -Signed-off-by: Patrick Ohly <patrick.ohly@...> ---- - security/integrity/ima/ima_appraise.c | 8 ++------ - 1 file changed, 2 insertions(+), 6 deletions(-) - -diff --git a/security/integrity/ima/ima_appraise.c b/security/integrity/ima/ima_appraise.c -index 4b9b4a4..b8b2dd9 100644 ---- a/security/integrity/ima/ima_appraise.c -+++ b/security/integrity/ima/ima_appraise.c -@@ -385,14 +385,10 @@ int ima_inode_setxattr(struct dentry *dentry, const char *xattr_name, - result = ima_protect_xattr(dentry, xattr_name, xattr_value, - xattr_value_len); - if (result == 1) { -- bool digsig; -- - if (!xattr_value_len || (xvalue->type >= IMA_XATTR_LAST)) - return -EINVAL; -- digsig = (xvalue->type == EVM_IMA_XATTR_DIGSIG); -- if (!digsig && (ima_appraise & IMA_APPRAISE_ENFORCE)) -- return -EPERM; -- ima_reset_appraise_flags(d_backing_inode(dentry), digsig); -+ ima_reset_appraise_flags(d_backing_inode(dentry), -+ (xvalue->type == EVM_IMA_XATTR_DIGSIG) ? 1 : 0); - result = 0; - } - return result; --- -2.1.4 - -- 2.25.1
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
[meta-security][PATCH 2/4] meta-tpm: remove linux-yocto
Signed-off-by: Armin Kuster <akuster808@...>
--- .../recipes-kernel/linux/linux-yocto/tpm.cfg | 8 -------- .../recipes-kernel/linux/linux-yocto/tpm.scc | 3 --- .../recipes-kernel/linux/linux-yocto/tpm2.cfg | 6 ------ .../recipes-kernel/linux/linux-yocto/tpm2.scc | 3 --- .../linux/linux-yocto/tpm_i2c.cfg | 15 --------------- .../linux/linux-yocto/tpm_i2c.scc | 6 ------ .../linux/linux-yocto/tpm_x86.cfg | 4 ---- .../recipes-kernel/linux/linux-yocto/vtpm.cfg | 5 ----- .../recipes-kernel/linux/linux-yocto/vtpm.scc | 4 ---- .../linux/linux-yocto_5.%.bbappend | 17 ----------------- 10 files changed, 71 deletions(-) delete mode 100644 meta-tpm/recipes-kernel/linux/linux-yocto/tpm.cfg delete mode 100644 meta-tpm/recipes-kernel/linux/linux-yocto/tpm.scc delete mode 100644 meta-tpm/recipes-kernel/linux/linux-yocto/tpm2.cfg delete mode 100644 meta-tpm/recipes-kernel/linux/linux-yocto/tpm2.scc delete mode 100644 meta-tpm/recipes-kernel/linux/linux-yocto/tpm_i2c.cfg delete mode 100644 meta-tpm/recipes-kernel/linux/linux-yocto/tpm_i2c.scc delete mode 100644 meta-tpm/recipes-kernel/linux/linux-yocto/tpm_x86.cfg delete mode 100644 meta-tpm/recipes-kernel/linux/linux-yocto/vtpm.cfg delete mode 100644 meta-tpm/recipes-kernel/linux/linux-yocto/vtpm.scc delete mode 100644 meta-tpm/recipes-kernel/linux/linux-yocto_5.%.bbappend diff --git a/meta-tpm/recipes-kernel/linux/linux-yocto/tpm.cfg b/meta-tpm/recipes-kernel/linux/linux-yocto/tpm.cfg deleted file mode 100644 index 8782823..0000000 --- a/meta-tpm/recipes-kernel/linux/linux-yocto/tpm.cfg +++ /dev/null @@ -1,8 +0,0 @@ -CONFIG_HW_RANDOM_TPM=y -CONFIG_TCG_TPM=y -CONFIG_TCG_TIS_CORE=y -CONFIG_TCG_TIS=y -CONFIG_SECURITYFS=y -CONFIG_TCG_NSC=m -CONFIG_TCG_ATMEL=m -CONFIG_TCG_INFINEON=m diff --git a/meta-tpm/recipes-kernel/linux/linux-yocto/tpm.scc b/meta-tpm/recipes-kernel/linux/linux-yocto/tpm.scc deleted file mode 100644 index 2949ed4..0000000 --- a/meta-tpm/recipes-kernel/linux/linux-yocto/tpm.scc +++ /dev/null @@ -1,3 +0,0 @@ -define KFEATURE_DESCRIPTION "Enable TPM" - -kconf hardware tpm.cfg diff --git a/meta-tpm/recipes-kernel/linux/linux-yocto/tpm2.cfg b/meta-tpm/recipes-kernel/linux/linux-yocto/tpm2.cfg deleted file mode 100644 index a81b54d..0000000 --- a/meta-tpm/recipes-kernel/linux/linux-yocto/tpm2.cfg +++ /dev/null @@ -1,6 +0,0 @@ -CONFIG_HW_RANDOM_TPM=y -CONFIG_TCG_TPM=y -CONFIG_TCG_TIS_CORE=y -CONFIG_TCG_TIS=y -CONFIG_TCG_CRB=y -CONFIG_SECURITYFS=y diff --git a/meta-tpm/recipes-kernel/linux/linux-yocto/tpm2.scc b/meta-tpm/recipes-kernel/linux/linux-yocto/tpm2.scc deleted file mode 100644 index 088148f..0000000 --- a/meta-tpm/recipes-kernel/linux/linux-yocto/tpm2.scc +++ /dev/null @@ -1,3 +0,0 @@ -define KFEATURE_DESCRIPTION "Enable TPM 2.0" - -kconf hardware tpm2.cfg diff --git a/meta-tpm/recipes-kernel/linux/linux-yocto/tpm_i2c.cfg b/meta-tpm/recipes-kernel/linux/linux-yocto/tpm_i2c.cfg deleted file mode 100644 index 59993f9..0000000 --- a/meta-tpm/recipes-kernel/linux/linux-yocto/tpm_i2c.cfg +++ /dev/null @@ -1,15 +0,0 @@ -CONFIG_HW_RANDOM_TPM=y -CONFIG_TCG_TPM=y -CONFIG_TCG_TIS_CORE=y -CONFIG_TCG_TIS=y -CONFIG_SECURITYFS=y - -CONFIG_REGMAP_I2C=y -CONFIG_I2C_BOARDINFO=y -CONFIG_I2C_COMPAT=y -CONFIG_RTC_I2C_AND_SPI=y - -CONFIG_TCG_TIS_I2C_ATMEL=m -CONFIG_TCG_TIS_I2C_INFINEON=m -CONFIG_TCG_TIS_I2C_NUVOTON=m -CONFIG_TCG_TIS_ST33ZP24_I2C=m diff --git a/meta-tpm/recipes-kernel/linux/linux-yocto/tpm_i2c.scc b/meta-tpm/recipes-kernel/linux/linux-yocto/tpm_i2c.scc deleted file mode 100644 index 0e4eedb..0000000 --- a/meta-tpm/recipes-kernel/linux/linux-yocto/tpm_i2c.scc +++ /dev/null @@ -1,6 +0,0 @@ -define KFEATURE_DESCRIPTION "Enable TPM i2c" - -include features/i2c/i2c.scc - -kconf hardware tpm_i2c.cfg - diff --git a/meta-tpm/recipes-kernel/linux/linux-yocto/tpm_x86.cfg b/meta-tpm/recipes-kernel/linux/linux-yocto/tpm_x86.cfg deleted file mode 100644 index 8be331a..0000000 --- a/meta-tpm/recipes-kernel/linux/linux-yocto/tpm_x86.cfg +++ /dev/null @@ -1,4 +0,0 @@ -CONFIG_TCG_NSC=m -CONFIG_TCG_ATMEL=m -CONFIG_TCG_INFINEON=m -CONFIG_TCG_TIS_ST33ZP24=m diff --git a/meta-tpm/recipes-kernel/linux/linux-yocto/vtpm.cfg b/meta-tpm/recipes-kernel/linux/linux-yocto/vtpm.cfg deleted file mode 100644 index a8b3758..0000000 --- a/meta-tpm/recipes-kernel/linux/linux-yocto/vtpm.cfg +++ /dev/null @@ -1,5 +0,0 @@ -CONFIG_HW_RANDOM_TPM=y -CONFIG_TCG_TPM=y -CONFIG_TCG_VTPM_PROXY=y -CONFIG_SECURITYFS=y -~ diff --git a/meta-tpm/recipes-kernel/linux/linux-yocto/vtpm.scc b/meta-tpm/recipes-kernel/linux/linux-yocto/vtpm.scc deleted file mode 100644 index e842da6..0000000 --- a/meta-tpm/recipes-kernel/linux/linux-yocto/vtpm.scc +++ /dev/null @@ -1,4 +0,0 @@ -define KFEATURE_DESCRIPTION "Enable vTPM" - -kconf hardware vtpm.cfg - diff --git a/meta-tpm/recipes-kernel/linux/linux-yocto_5.%.bbappend b/meta-tpm/recipes-kernel/linux/linux-yocto_5.%.bbappend deleted file mode 100644 index cea8b1b..0000000 --- a/meta-tpm/recipes-kernel/linux/linux-yocto_5.%.bbappend +++ /dev/null @@ -1,17 +0,0 @@ -FILESEXTRAPATHS_prepend := "${THISDIR}/linux-yocto:" - -# Enable tpm in kernel -SRC_URI_append_x86 = " \ - ${@bb.utils.contains('MACHINE_FEATURES', 'tpm', 'file://tpm.scc', '', d)} \ - ${@bb.utils.contains('MACHINE_FEATURES', 'tpm2', 'file://tpm2.scc', '', d)} \ - " - -SRC_URI_append_x86-64 = " \ - ${@bb.utils.contains('MACHINE_FEATURES', 'tpm', 'file://tpm.scc', '', d)} \ - ${@bb.utils.contains('MACHINE_FEATURES', 'tpm2', 'file://tpm2.scc', '', d)} \ - " - -SRC_URI += " \ - ${@bb.utils.contains('MACHINE_FEATURES', 'tpm_i2c', 'file://tpm_i2c.scc', '', d)} \ - ${@bb.utils.contains('MACHINE_FEATURES', 'vtpm', 'file://vtpm.scc', '', d)} \ - " -- 2.25.1
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|