aboutsummaryrefslogtreecommitdiffstats
path: root/meta/recipes-support
AgeCommit message (Collapse)Author
2015-02-23ca-certificates: clean up before do_compile()Andreas Oberritter
Otherwise the script which converts mozilla certificates extracts each certificate twice. Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
2015-02-23gpgme: enable native buildsAndreas Oberritter
Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
2015-02-23libassuan: enable native buildsAndreas Oberritter
Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
2015-02-23pth: enable native buildsAndreas Oberritter
Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
2015-02-23nss: CVE-2014-1544Li Wang
the patch comes from: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-1544 https://hg.mozilla.org/projects/nss/rev/204f22c527f8 author Robert Relyea <rrelyea@redhat.com> https://bugzilla.mozilla.org/show_bug.cgi?id=963150 Bug 963150: Add nssCertificate_AddRef and nssCertificate_Destroy calls to PK11_ImportCert to prevent nssTrustDomain_AddCertsToCache from freeing the CERTCertificate associated with the NSSCertificate. r=wtc. Signed-off-by: Li Wang <li.wang@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> (cherry picked from commit 7ef613c7f4b9e4ff153766f31dae81fc4810c0df) Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
2015-02-23boost: Upgrade to 1.56.0Saul Wold
Rebase boostconfig to handle moved user-config file Signed-off-by: Saul Wold <sgw@linux.intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> (cherry picked from commit a6afd754290cecbe57392d13477557051b438817) Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
2015-02-23nss: CVE-2013-5606Li Wang
the patch comes from: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-5606 https://bugzilla.mozilla.org/show_bug.cgi?id=910438 http://hg.mozilla.org/projects/nss/rev/d29898e0981c The CERT_VerifyCert function in lib/certhigh/certvfy.c in Mozilla Network Security Services (NSS) 3.15 before 3.15.3 provides an unexpected return value for an incompatible key-usage certificate when the CERTVerifyLog argument is valid, which might allow remote attackers to bypass intended access restrictions via a crafted certificate. Signed-off-by: Li Wang <li.wang@windriver.com> Signed-off-by: Jackie Huang <jackie.huang@windriver.com> Signed-off-by: Saul Wold <sgw@linux.intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> (cherry picked from commit 1e153b1b21276d56144add464d592cd7b96a4ede) Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
2015-02-23nspr: Fix for CVE-2014-1545Xufeng Zhang
Mozilla Netscape Portable Runtime (NSPR) before 4.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write) via vectors involving the sprintf and console functions.Per: http://cwe.mitre.org/data/definitions/787.html Signed-off-by: Xufeng Zhang <xufeng.zhang@windriver.com> Signed-off-by: Jackie Huang <jackie.huang@windriver.com> Signed-off-by: Saul Wold <sgw@linux.intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> (cherry picked from commit 191cab2f679491c2b6ddba49c5cf4886dcd22f57) Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
2015-02-23libevdev: add new recipe (needed by xf86-input-evdev)Ross Burton
Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Saul Wold <sgw@linux.intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> (cherry picked from commit ad8e7f6d379a99649a1431a4bae7ad0bb0a78d9d) Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
2015-02-23ca-certificates: Update to 20140325Saul Wold
Changes to debian/copyright: Update to "Copyright: Mozilla Contributors" for mozilla/{certdata.txt,nssckbi.h} Backported on additional patch from ca-certificates tree [YOCTO #6454] Signed-off-by: Saul Wold <sgw@linux.intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> (cherry picked from commit 3af33d60f03afb19543247b5350137ff3a7ee7e0) Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
2015-02-23nss-3.15.1: fix CVE-2013-1739yzhu1
Mozilla Network Security Services (NSS) before 3.15.2 does not ensure that data structures are initialized before read operations, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a decryption failure. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-1739 Signed-off-by: yzhu1 <yanjun.zhu@windriver.com> Signed-off-by: Jackie Huang <jackie.huang@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> (cherry picked from commit 9b43af77d112e75fa9827a9080b7e94f41f9a116) Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
2015-02-23nss: CVE-2013-1740Li Wang
the patch comes from: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-1740 https://bugzilla.mozilla.org/show_bug.cgi?id=919877 https://bugzilla.mozilla.org/show_bug.cgi?id=713933 changeset: 10946:f28426e944ae user: Wan-Teh Chang <wtc@google.com> date: Tue Nov 26 16:44:39 2013 -0800 summary: Bug 713933: Handle the return value of both ssl3_HandleRecord calls changeset: 10945:774c7dec7565 user: Wan-Teh Chang <wtc@google.com> date: Mon Nov 25 19:16:23 2013 -0800 summary: Bug 713933: Declare the |falseStart| local variable in the smallest changeset: 10848:141fae8fb2e8 user: Wan-Teh Chang <wtc@google.com> date: Mon Sep 23 11:25:41 2013 -0700 summary: Bug 681839: Allow SSL_HandshakeNegotiatedExtension to be called before the handshake is finished, r=brian@briansmith.org changeset: 10898:1b9c43d28713 user: Brian Smith <brian@briansmith.org> date: Thu Oct 31 15:40:42 2013 -0700 summary: Bug 713933: Make SSL False Start work with asynchronous certificate validation, r=wtc Signed-off-by: Li Wang <li.wang@windriver.com> Signed-off-by: Roy Li <rongqing.li@windriver.com> Signed-off-by: Saul Wold <sgw@linux.intel.com> (cherry picked from commit 11e728e64e37eec72ed0cb3fb4d5a49ddeb88666) Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
2015-02-23nss: CVE-2014-1492Li Wang
the patch comes from: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-1492 https://bugzilla.mozilla.org/show_bug.cgi?id=903885 changeset: 11063:709d4e597979 user: Kai Engert <kaie@kuix.de> date: Wed Mar 05 18:38:55 2014 +0100 summary: Bug 903885, address requests to clarify comments from wtc changeset: 11046:2ffa40a3ff55 tag: tip user: Wan-Teh Chang <wtc@google.com> date: Tue Feb 25 18:17:08 2014 +0100 summary: Bug 903885, fix IDNA wildcard handling v4, r=kaie changeset: 11045:15ea62260c21 user: Christian Heimes <sites@cheimes.de> date: Mon Feb 24 17:50:25 2014 +0100 summary: Bug 903885, fix IDNA wildcard handling, r=kaie Signed-off-by: Li Wang <li.wang@windriver.com> Signed-off-by: Roy Li <rongqing.li@windriver.com> Signed-off-by: Saul Wold <sgw@linux.intel.com> (cherry picked from commit a83a1b26704f1f3aadaa235bf38094f03b3610fd) Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
2015-02-23ca-certificates: generate CAfile for -native in do_installKoen Kooi
Git-replacement-native needs the generated files in place for https:// URIs: WARNING: Failed to fetch URL git://github.com/kernelslacker/trinity.git;protocol=https, attempting MIRRORS if available ERROR: Fetcher failure: Fetch command failed with exit code 128, output: Cloning into bare repository '/build/linaro/build/build/downloads/git2/github.com.kernelslacker.trinity.git'... fatal: unable to access 'https://github.com/kernelslacker/trinity.git/': error setting certificate verify locations: CAfile: /build/linaro/build/build/tmp-eglibc/sysroots/x86_64-linux/etc/ssl/certs/ca-certificates.crt CApath: none ERROR: Function failed: Fetcher failure for URL: 'git://github.com/kernelslacker/trinity.git;protocol=https'. Unable to fetch URL from any source. ERROR: Logfile of failure stored in: /build/linaro/build/build/tmp-eglibc/work/aarch64-oe-linux/trinity/1.3-r0/temp/log.do_fetch.7843 ERROR: Task 1378 (/build/linaro/build/meta-linaro/meta-linaro/recipes-extra/trinity/trinity_1.3.bb, do_fetch) failed with exit code '1' Signed-off-by: Koen Kooi <koen.kooi@linaro.org> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> (cherry picked from commit 74a772727cbf4d76d2ef314041acafb3086e4ff9) Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
2015-02-23nss-3.15.1: fix CVE-2013-5605yanjun.zhu
Mozilla Network Security Services (NSS) 3.14 before 3.14.5 and 3.15 before 3.15.3 allows remote attackers to cause a denial of service or possibly have unspecified other impact via invalid handshake packets. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-5605 Signed-off-by: yanjun.zhu <yanjun.zhu@windriver.com> Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> (cherry picked from commit 09e8cd6f09284ad3faf0bc05d623a43e2b174866) Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
2015-02-23nss-3.15.1: fix CVE-2013-1741yanjun.zhu
Integer overflow in Mozilla Network Security Services (NSS) 3.15 before 3.15.3 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large size value. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-1741 Signed-off-by: yanjun.zhu <yanjun.zhu@windriver.com> Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> (cherry picked from commit b666d173ff0ba213bf81e2c035a605a28e5395ea) Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
2015-02-23gnupg: CVE-2013-4576Yong Zhang
GnuPG 1.x before 1.4.16 generates RSA keys using sequences of introductions with certain patterns that introduce a side channel, which allows physically proximate attackers to extract RSA keys via a chosen-ciphertext attack and acoustic cryptanalysis during decryption. NOTE: applications are not typically expected to protect themselves from acoustic side-channel attacks, since this is arguably the responsibility of the physical device. Accordingly, issues of this type would not normally receive a CVE identifier. However, for this issue, the developer has specified a security policy in which GnuPG should offer side-channel resistance, and developer-specified security-policy violations are within the scope of CVE. Signed-off-by: Yong Zhang <yong.zhang@windriver.com> Signed-off-by: Jackie Huang <jackie.huang@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> (cherry picked from commit 46b80c80b0e008820b34f4360054e1697df2650d) Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
2015-02-23gnupg: CVE-2013-4351Ming Liu
GnuPG 1.4.x, 2.0.x, and 2.1.x treats a key flags subpacket with all bits cleared (no usage permitted) as if it has all bits set (all usage permitted), which might allow remote attackers to bypass intended cryptographic protection mechanisms by leveraging the subkey. Signed-off-by: Ming Liu <ming.liu@windriver.com> Signed-off-by: Jackie Huang <jackie.huang@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> (cherry picked from commit 259aebc9dbcaeb1587aaaab849942f55fa321724) Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
2015-02-23boost: Pass CFLAGS, CXXFLAGS and LDFLAGS correctly into boost.buildMike Crowe
The compileflags and linkflags do_boostconfig puts into user-config.jam are having no effect. According to http://www.boost.org/boost-build2/doc/html/bbv2/reference/tools.html the correct syntax would be <compileflags>"the flags" <linkflags>"the flags". Since the flags specified were having no effect they can't be necessary and can be safely removed. We should be passing ${CFLAGS}, ${CXXFLAGS} and ${LDFLAGS} instead so that users of the recipe can pass arbitrary flags as they choose. Signed-off-by: Mike Crowe <mac@mcrowe.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> (cherry picked from commit f09d2583894be0a4069600381046bec5e7f0277b) Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
2015-02-23boost: Move files -> boostSaul Wold
Signed-off-by: Saul Wold <sgw@linux.intel.com> (cherry picked from commit aca3d0bfd8335b7fd293d81c0647bf72b4de23d3) Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
2015-02-23boost: updating to 1.55.0Lukas Bulwahn
When updating to 1.55.0, the backport patches for recent versions of glibc and linking boost-thread to boost-atomic were removed, as they have been added to the current version. Although the arm-intrinsics.patch is reported with Status: Backport, it was not merged to version 1.55.0 yet. The boost recipe for 1.55.0 was tested intensively for the different qemu machines with the meta-ros layer, which uses boost in various recipes. During the compilation, no errors were discovered. Signed-off-by: Lukas Bulwahn <lukas.bulwahn@oss.bmw-carit.de> Signed-off-by: Saul Wold <sgw@linux.intel.com> (cherry picked from commit e0bc74e14f7ad67ff85959ce7c0a111d05ac7f2f) Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
2015-02-23attr: Add nativesdk in BBCLASSEXTENDDavid Nyström
Signed-off-by: David Nyström <david.nystrom@enea.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> (cherry picked from commit 6f527443e57bd5f565975888ada014b68365207e) Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
2015-02-23ca-certificates: Clarify in Description that certs are Debian basedSaul Wold
Signed-off-by: Saul Wold <sgw@linux.intel.com> (cherry picked from commit f1d0b7fb15833b149b6999f4021e688212c1b6ce) Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
2014-06-24consolekit: fix console-kit-log-system-start.service startupJonathan Liu
console-kit-log-system-start.service fails to to start if the /var/log/ConsoleKit directory does not exist. Normally it is created automatically but as we mount a tmpfs at /var/log, we need to add a tmpfiles.d entry to create it. (From OE-Core master rev: 2a9a14bf400fe0c263c58aa85b02aba7311b1328) Signed-off-by: Jonathan Liu <net147@gmail.com> Signed-off-by: Saul Wold <sgw@linux.intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
2014-06-06gnutls: patch for CVE-2014-3466 backportedValentin Popa
Backported patch for CVE-2014-3466. This patch is for dora. Signed-off-by: Valentin Popa <valentin.popa@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2014-03-06gnutls: fix failure during do_compilePaul Eggleton
Add a Debian patch to fix a load of errors building the documentation within do_compile e.g.: | ./x509-api.texi:15: misplaced { | ./x509-api.texi:15: misplaced } (From OE-Core master rev: b09a9a5f298596795f17243e5ffcf7dab295a8e6) Signed-off-by: Paul Eggleton <paul.eggleton@linux.intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2014-03-05gnutls: Fixed bug that prevented the rejection of v1 intermediate CA ↵Karl Hiramoto
certificates. This patch is for the OE-Core dora branch - it comes from upstream: >From 467478d8ff08a3cb4be3034ff04c9d08a0ceba3e From: Nikos Mavrogiannopoulos <nmav@redhat.com> Date: Wed, 12 Feb 2014 16:41:33 +0100 For more info see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1959 http://www.gnutls.org/security.html#GNUTLS-SA-2014-1 https://www.gitorious.org/gnutls/gnutls/commit/467478d8ff08a3cb4be3034ff04c9d08a0ceba3e Signed-off-by: Karl Hiramoto <karl@hiramoto.org> Signed-off-by: Paul Eggleton <paul.eggleton@linux.intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2014-03-05gnutls: CVE-2014-0092 correct return codesKarl Hiramoto
This patch is for the OE-Core dora branch - it comes from upstream: git://gitorious.org/gnutls/gnutls.git branch: gnutls_2_12_x commit: 6aa26f78150ccbdf0aec1878a41c17c41d358a3b Author: Nikos Mavrogiannopoulos <nmav@gnutls.org> Date: Thu Feb 27 19:42:26 2014 +0100 For more info see: http://www.gnutls.org/security.html#GNUTLS-SA-2014-2 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0092 https://www.gitorious.org/gnutls/gnutls/commit/6aa26f78150ccbdf0aec1878a41c17c41d358a3b Signed-off-by: Karl Hiramoto <karl@hiramoto.org> Signed-off-by: Paul Eggleton <paul.eggleton@linux.intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2014-01-26libsoup: Remove libproxy from DEPENDSPhil Blundell
Although libsoup did use to support direct usage of libproxy, it hasn't done so for some time. Worse, if libsoup depends on libproxy then it is impossible to build libproxy against webkit since webkit itself depends on libsoup in some configurations. Fix this by removing the extraneous entry from DEPENDS. (From OE-Core master rev: e588ba009402be27c643f2596acea0f178d4e42f) Signed-off-by: Phil Blundell <pb@pbcl.net> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
2014-01-26icu: CVE-2013-2924Yue Tao
Use-after-free vulnerability in International Components for Unicode (ICU), as used in Google Chrome before 30.0.1599.66 and other products, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-2924 (From OE-Core master rev: 36e2981687acc5b7a74f08718d4578f92af4dc8b) Signed-off-by: Yue Tao <Yue.Tao@windriver.com> Signed-off-by: Robert Yang <liezhi.yang@windriver.com> Signed-off-by: Mark Hatle <mark.hatle@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
2013-12-19libsoup-2.4: add intltool-native to DEPENDSPaul Eggleton
The configure script looks for this; most of the time dependency chains ensure this is present but we need to be explicit or failures can occur. Reported by Nicolas Dechesne <nicolas.dechesne@linaro.org> (From OE-Core master rev: 22e45ed7d74ceb4a719e7b5889400c20ed4a0783) Signed-off-by: Paul Eggleton <paul.eggleton@linux.intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2013-12-12boost: Add patch to avoid undefined references to ↵Phil Blundell
boost::atomic::lockpool::get_lock_for() Boost::thread uses functions from boost::atomic but doesn't actually link with libboost_atomic. This works fine on platforms where BOOST_ATOMIC_FLAG_LOCK_FREE is true but will lead to undefined symbol references otherwise. Fix this by applying a patch from the upstream bug tracker to add the missing library linkage. (From OE-Core master rev: 1ffc27173576589191b037d111ecb59d94631de0) Signed-off-by: Phil Blundell <pb@pbcl.net> Signed-off-by: Saul Wold <sgw@linux.intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
2013-12-12libnl: Fix random segfaults due to memory corruptionKhem Raj
This is a backport from upstream fixes a severe problem w.r.t memory management, where it would result in random segfaults in applications depending on libnl Signed-off-by: Khem Raj <raj.khem@gmail.com> Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
2013-12-12libcap: fix CAP_LAST_CAPRoy Li
(From OE-Core master rev: 9032c10cc882a96acdfd0739f090d121ab625a18) Signed-off-by: Roy Li <rongqing.li@windriver.com> Signed-off-by: Saul Wold <sgw@linux.intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
2013-10-06aspell: Add PACKAGECONFIG for cursesMartin Jansa
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2013-09-30nss: Fix return codes in postinstallDavid Nyström
exit 0 was done if $D != NULL, if one or more shlibsign executions fails. Signed-off-by: David Nyström <david.nystrom@enea.com> Signed-off-by: Saul Wold <sgw@linux.intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2013-09-24ptest-runner: compatibile with busyboxRoy Li
Do not use pushd, busybox does not support it if system only has busybox; Replace find command with ls to avoid some busybox's find unsupported options; Signed-off-by: Roy Li <rongqing.li@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2013-09-24boost: set up PACKAGECONFIG for boost-python libraryLukas Bulwahn
Until now, the comment in the boost.inc file suggested to enable the boost-python library by uncommenting some lines in that file. Using the new PACKAGECONFIG feature, boost-python can now be added optionally without need to modify the file or copying those lines into a bbappend file. Furthermore, we obtain the python version by inheriting python-dir instead of fixing the python version in this file. This commit is motivated by the need in the meta-ros layer, as discussed in the issue #145 of the meta-ros issue tracker [1]. [1] https://github.com/bmwcarit/meta-ros/pull/145 Signed-off-by: Lukas Bulwahn <lukas.bulwahn@oss.bmw-carit.de> Signed-off-by: Saul Wold <sgw@linux.intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2013-09-20libunistring: remove the test to convert euc-jp in configureJackie Huang
Remove the test "Test against HP-UX 11.11 bug: No converter from EUC-JP to UTF-8 is provided" since we don't support HP-UX and if the euc-jp is not installed on the host, libunistring will be built without iconv support and will cause guild-native configure fail. Signed-off-by: Jackie Huang <jackie.huang@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2013-09-12icu-native: do_install: Segmentation faultRobert Yang
There was a "Segmentation fault" error when build icu-native when the TMPDIR is in a deep directory (for example, when len(readlink -f $TMPDIR == 410)), use LARGE_BUFFER_MAX_SIZE for cmd rather than SMALL_BUFFER_MAX_SIZE would fix the problem, this should be a misplay because other cmd uses LARGE_BUFFER_MAX_SIZE. [YOCTO #5171] Signed-off-by: Robert Yang <liezhi.yang@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2013-09-11ptest-runner: trivial fixes and refineRoy Li
1. ptest files may be installed under /usr/lib64/ for 64bit filesystem or under /usr/lib/ for 64bit multilib filesystem, so we should check both directories 2. If a soft link is linking to a directory under the same directory, we only run once. [YOCTO #5125] [YOCTO #5126] Signed-off-by: Roy Li <rongqing.li@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2013-09-11libcroco: disable Bsymbolic if it is not supported on some hostsTing Liu
When trying to build on my Centos 5.5 machine, got below error: | checking for gtkdoc-mkpdf... no | checking whether to build gtk-doc documentation... no | checking for CROCO... yes | checking if gcc supports "-Wl,-Bsymbolic-functions" flag... | configure: error: -Bsymbolic requested but not supported by ld. Use --disable-Bsymbolic to disable | Configure failed. The contents of all config.log files follows to aid debugging | | configure: exit 1 | ERROR: oe_runconf failed Set --enable-Bsymbolic=auto to disable it when it is not suppported. Signed-off-by: Ting Liu <b28495@freescale.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2013-09-06boost: adding serialization to BOOST_LIBSLukas Bulwahn
Since its initial commit from the classic OpenEmbedded repository in 43e94412c45b4b79485a64010c76d89b245bb235, serialization was commented out, reportedly due to some issue with powerpc in the boost version 1.36. In the classic OpenEmbedded repository, serialization has been added again since version 1.4x. The commit removes the outdated comment and adds serialization to the BOOST_LIBS after testing `bitbake boost` and bitbaking some applications using boost from the meta-ros layer for qemuppc. Signed-off-by: Lukas Bulwahn <lukas.bulwahn@oss.bmw-carit.de> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2013-09-01meta: Don't use deprecated bitbake APIRichard Purdie
These have been deprecated for a long time, convert the remaining references to the correct modules and prepare for removal of the compatibility support from bitbake. Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2013-08-26gpgme: update to 1.4.3Paul Eggleton
Signed-off-by: Paul Eggleton <paul.eggleton@linux.intel.com> Signed-off-by: Saul Wold <sgw@linux.intel.com>
2013-08-26nativesdk-ca-certificates: prepopulate ca-certificates.crtChristopher Larson
As postinsts aren't run for nativesdk packages when populating an SDK, we need to prepopulate up-front. Signed-off-by: Christopher Larson <chris_larson@mentor.com> Signed-off-by: Saul Wold <sgw@linux.intel.com>
2013-08-26ca-certificates: add recipe (version 20130610)Christopher Larson
We need this for certain nativesdk recipes, as we can't rely on the certificate path or bundle path being the same across distros, and it's useful in many cases on the target as well. This is based on the 20130119 recipe from meta-oe, with the following changes: - use the debian git repository to avoid vanishing sources - obey our target paths - default to a sysroot relative to the script location (make relocatable) - define SUMMARY - don't inherit autotools, this isn't an autotools package - add MPL-2.0 to LICENSE, as that's the license of the certdata - install the script man page - use a native rather than cross recipe, as it's not bound in any way to the target system - add nativesdk to bbclassextend, for use in SDKs Signed-off-by: Christopher Larson <chris_larson@mentor.com> Signed-off-by: Saul Wold <sgw@linux.intel.com>
2013-08-22libiconv: Extend to nativesdk and support non-linux targetsRichard Purdie
This library is currently only available when targeting non-libc. This patch also makes it available when targetting non-linux since it is likely of use then. It also adds a BBCLASSEXTEND for nativesdk since again, it can be useful in that context. Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2013-08-22gnupg: Update to 2.0.21Saul Wold
Signed-off-by: Saul Wold <sgw@linux.intel.com>
2013-08-22boost: fix build when PARALLEL_MAKE is not setMarko Lindqvist
It was passing "None" to bjam, which then parsed it as unknown build target. Signed-off-by: Marko Lindqvist <cazfi74@gmail.com> Signed-off-by: Saul Wold <sgw@linux.intel.com>