diff mbox series

[01/51] sato-icon-theme: check for new commits rather than tags

Message ID 20220720084442.2940187-1-alex@linutronix.de
State New
Headers show
Series [01/51] sato-icon-theme: check for new commits rather than tags | expand

Commit Message

Alexander Kanavin July 20, 2022, 8:43 a.m. UTC
Signed-off-by: Alexander Kanavin <alex@linutronix.de>
---
 meta/recipes-sato/sato-icon-theme/sato-icon-theme_git.bb | 1 +
 1 file changed, 1 insertion(+)

Comments

Alexander Kanavin July 20, 2022, 8:49 a.m. UTC | #1
Note: this update fails on x32 with

| configure: error: unrecognized GNU build triplet linux-gnux32

This time I want to put my foot down and suggest that we just drop the
whole x32 variant from the autobuilder (I had already sent a patch for
this previously). In all likelihood it was never used to ship anything
to customers, and was only devised to look better in benchmarks
against competition.

Alex


On Wed, 20 Jul 2022 at 10:44, Alexander Kanavin via
lists.openembedded.org <alex.kanavin=gmail.com@lists.openembedded.org>
wrote:
>
> Signed-off-by: Alexander Kanavin <alex@linutronix.de>
> ---
>  .../rpm/files/0001-CVE-2021-3521.patch        |  57 ---
>  ...lib-rpm-as-the-installation-path-for.patch |  14 +-
>  .../rpm/files/0002-CVE-2021-3521.patch        |  64 ----
>  .../rpm/files/0003-CVE-2021-3521.patch        | 329 ------------------
>  .../rpm/{rpm_4.17.0.bb => rpm_4.17.1.bb}      |   5 +-
>  5 files changed, 8 insertions(+), 461 deletions(-)
>  delete mode 100644 meta/recipes-devtools/rpm/files/0001-CVE-2021-3521.patch
>  delete mode 100644 meta/recipes-devtools/rpm/files/0002-CVE-2021-3521.patch
>  delete mode 100644 meta/recipes-devtools/rpm/files/0003-CVE-2021-3521.patch
>  rename meta/recipes-devtools/rpm/{rpm_4.17.0.bb => rpm_4.17.1.bb} (97%)
>
> diff --git a/meta/recipes-devtools/rpm/files/0001-CVE-2021-3521.patch b/meta/recipes-devtools/rpm/files/0001-CVE-2021-3521.patch
> deleted file mode 100644
> index 044b4dd2a0..0000000000
> --- a/meta/recipes-devtools/rpm/files/0001-CVE-2021-3521.patch
> +++ /dev/null
> @@ -1,57 +0,0 @@
> -From 9a6871126f472feea057d5f803505ec8cc78f083 Mon Sep 17 00:00:00 2001
> -From: Panu Matilainen <pmatilai@redhat.com>
> -Date: Thu, 30 Sep 2021 09:56:20 +0300
> -Subject: [PATCH 1/3] Refactor pgpDigParams construction to helper function
> -
> -No functional changes, just to reduce code duplication and needed by
> -the following commits.
> -
> -CVE: CVE-2021-3521
> -Upstream-Status: Backport [https://github.com/rpm-software-management/rpm/commit/9f03f42e2]
> -
> -Signed-off-by: Changqing Li <changqing.li@windriver.com>
> ----
> - rpmio/rpmpgp.c | 13 +++++++++----
> - 1 file changed, 9 insertions(+), 4 deletions(-)
> -
> -diff --git a/rpmio/rpmpgp.c b/rpmio/rpmpgp.c
> -index d0688ebe9a..e472b5320f 100644
> ---- a/rpmio/rpmpgp.c
> -+++ b/rpmio/rpmpgp.c
> -@@ -1041,6 +1041,13 @@ unsigned int pgpDigParamsAlgo(pgpDigParams digp, unsigned int algotype)
> -     return algo;
> - }
> -
> -+static pgpDigParams pgpDigParamsNew(uint8_t tag)
> -+{
> -+    pgpDigParams digp = xcalloc(1, sizeof(*digp));
> -+    digp->tag = tag;
> -+    return digp;
> -+}
> -+
> - int pgpPrtParams(const uint8_t * pkts, size_t pktlen, unsigned int pkttype,
> -                pgpDigParams * ret)
> - {
> -@@ -1058,8 +1065,7 @@ int pgpPrtParams(const uint8_t * pkts, size_t pktlen, unsigned int pkttype,
> -           if (pkttype && pkt.tag != pkttype) {
> -               break;
> -           } else {
> --              digp = xcalloc(1, sizeof(*digp));
> --              digp->tag = pkt.tag;
> -+              digp = pgpDigParamsNew(pkt.tag);
> -           }
> -       }
> -
> -@@ -1105,8 +1111,7 @@ int pgpPrtParamsSubkeys(const uint8_t *pkts, size_t pktlen,
> -               digps = xrealloc(digps, alloced * sizeof(*digps));
> -           }
> -
> --          digps[count] = xcalloc(1, sizeof(**digps));
> --          digps[count]->tag = PGPTAG_PUBLIC_SUBKEY;
> -+          digps[count] = pgpDigParamsNew(PGPTAG_PUBLIC_SUBKEY);
> -           /* Copy UID from main key to subkey */
> -           digps[count]->userid = xstrdup(mainkey->userid);
> -
> ---
> -2.17.1
> -
> diff --git a/meta/recipes-devtools/rpm/files/0001-Do-not-hardcode-lib-rpm-as-the-installation-path-for.patch b/meta/recipes-devtools/rpm/files/0001-Do-not-hardcode-lib-rpm-as-the-installation-path-for.patch
> index 6d236ac400..c6cf9d4c88 100644
> --- a/meta/recipes-devtools/rpm/files/0001-Do-not-hardcode-lib-rpm-as-the-installation-path-for.patch
> +++ b/meta/recipes-devtools/rpm/files/0001-Do-not-hardcode-lib-rpm-as-the-installation-path-for.patch
> @@ -1,4 +1,4 @@
> -From 8d013fe154a162305f76141151baf767dd04b598 Mon Sep 17 00:00:00 2001
> +From 4ab6a4c5bbad65c3401016bb26b87214cdd0c59b Mon Sep 17 00:00:00 2001
>  From: Alexander Kanavin <alex.kanavin@gmail.com>
>  Date: Mon, 27 Feb 2017 09:43:30 +0200
>  Subject: [PATCH] Do not hardcode "lib/rpm" as the installation path for
> @@ -14,10 +14,10 @@ Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com>
>   3 files changed, 4 insertions(+), 4 deletions(-)
>
>  diff --git a/configure.ac b/configure.ac
> -index eb7d6941b..10a889b5d 100644
> +index 372875fc4..1b7add9ee 100644
>  --- a/configure.ac
>  +++ b/configure.ac
> -@@ -871,7 +871,7 @@ else
> +@@ -884,7 +884,7 @@ else
>       usrprefix=$prefix
>   fi
>
> @@ -27,10 +27,10 @@ index eb7d6941b..10a889b5d 100644
>
>   AC_SUBST(OBJDUMP)
>  diff --git a/macros.in b/macros.in
> -index a1f795e5f..689e784ef 100644
> +index d53ab5ed5..9d10441c8 100644
>  --- a/macros.in
>  +++ b/macros.in
> -@@ -933,7 +933,7 @@ package or when debugging this package.\
> +@@ -911,7 +911,7 @@ package or when debugging this package.\
>   %_sharedstatedir      %{_prefix}/com
>   %_localstatedir               %{_prefix}/var
>   %_lib                 lib
> @@ -40,7 +40,7 @@ index a1f795e5f..689e784ef 100644
>   %_infodir             %{_datadir}/info
>   %_mandir              %{_datadir}/man
>  diff --git a/rpm.am b/rpm.am
> -index 7b57f433b..9bbb9ee96 100644
> +index ebe4e40d1..e6920e258 100644
>  --- a/rpm.am
>  +++ b/rpm.am
>  @@ -1,10 +1,10 @@
> @@ -55,4 +55,4 @@ index 7b57f433b..9bbb9ee96 100644
>  +rpmconfigdir = $(libdir)/rpm
>
>   # Libtool version (current-revision-age) for all our libraries
> - rpm_version_info = 11:0:2
> + rpm_version_info = 12:0:3
> diff --git a/meta/recipes-devtools/rpm/files/0002-CVE-2021-3521.patch b/meta/recipes-devtools/rpm/files/0002-CVE-2021-3521.patch
> deleted file mode 100644
> index 683b57d455..0000000000
> --- a/meta/recipes-devtools/rpm/files/0002-CVE-2021-3521.patch
> +++ /dev/null
> @@ -1,64 +0,0 @@
> -From c4b1bee51bbdd732b94b431a951481af99117703 Mon Sep 17 00:00:00 2001
> -From: Panu Matilainen <pmatilai@redhat.com>
> -Date: Thu, 30 Sep 2021 09:51:10 +0300
> -Subject: [PATCH 2/3] Process MPI's from all kinds of signatures
> -
> -No immediate effect but needed by the following commits.
> -
> -CVE: CVE-2021-3521
> -Upstream-Status: Backport [https://github.com/rpm-software-management/rpm/commit/b5e8bc74b]
> -
> -Signed-off-by: Changqing Li <changqing.li@windriver.com>
> -
> ----
> - rpmio/rpmpgp.c | 13 +++++--------
> - 1 file changed, 5 insertions(+), 8 deletions(-)
> -
> -diff --git a/rpmio/rpmpgp.c b/rpmio/rpmpgp.c
> -index 25f67048fd..509e777e6d 100644
> ---- a/rpmio/rpmpgp.c
> -+++ b/rpmio/rpmpgp.c
> -@@ -543,7 +543,7 @@ pgpDigAlg pgpDigAlgFree(pgpDigAlg alg)
> -     return NULL;
> - }
> -
> --static int pgpPrtSigParams(pgpTag tag, uint8_t pubkey_algo, uint8_t sigtype,
> -+static int pgpPrtSigParams(pgpTag tag, uint8_t pubkey_algo,
> -               const uint8_t *p, const uint8_t *h, size_t hlen,
> -               pgpDigParams sigp)
> - {
> -@@ -556,10 +556,8 @@ static int pgpPrtSigParams(pgpTag tag, uint8_t pubkey_algo, uint8_t sigtype,
> -       int mpil = pgpMpiLen(p);
> -       if (pend - p < mpil)
> -           break;
> --      if (sigtype == PGPSIGTYPE_BINARY || sigtype == PGPSIGTYPE_TEXT) {
> --          if (sigalg->setmpi(sigalg, i, p))
> --              break;
> --      }
> -+        if (sigalg->setmpi(sigalg, i, p))
> -+            break;
> -       p += mpil;
> -     }
> -
> -@@ -619,7 +617,7 @@ static int pgpPrtSig(pgpTag tag, const uint8_t *h, size_t hlen,
> -       }
> -
> -       p = ((uint8_t *)v) + sizeof(*v);
> --      rc = pgpPrtSigParams(tag, v->pubkey_algo, v->sigtype, p, h, hlen, _digp);
> -+      rc = pgpPrtSigParams(tag, v->pubkey_algo, p, h, hlen, _digp);
> -     } break;
> -     case 4:
> -     {   pgpPktSigV4 v = (pgpPktSigV4)h;
> -@@ -677,8 +675,7 @@ static int pgpPrtSig(pgpTag tag, const uint8_t *h, size_t hlen,
> -       p += 2;
> -       if (p > hend)
> -           return 1;
> --
> --      rc = pgpPrtSigParams(tag, v->pubkey_algo, v->sigtype, p, h, hlen, _digp);
> -+      rc = pgpPrtSigParams(tag, v->pubkey_algo, p, h, hlen, _digp);
> -     } break;
> -     default:
> -       rpmlog(RPMLOG_WARNING, _("Unsupported version of signature: V%d\n"), version);
> ---
> -2.17.1
> -
> diff --git a/meta/recipes-devtools/rpm/files/0003-CVE-2021-3521.patch b/meta/recipes-devtools/rpm/files/0003-CVE-2021-3521.patch
> deleted file mode 100644
> index a5ec802501..0000000000
> --- a/meta/recipes-devtools/rpm/files/0003-CVE-2021-3521.patch
> +++ /dev/null
> @@ -1,329 +0,0 @@
> -From 07676ca03ad8afcf1ca95a2353c83fbb1d970b9b Mon Sep 17 00:00:00 2001
> -From: Panu Matilainen <pmatilai@redhat.com>
> -Date: Thu, 30 Sep 2021 09:59:30 +0300
> -Subject: [PATCH 3/3] Validate and require subkey binding signatures on PGP
> - public keys
> -
> -All subkeys must be followed by a binding signature by the primary key
> -as per the OpenPGP RFC, enforce the presence and validity in the parser.
> -
> -The implementation is as kludgey as they come to work around our
> -simple-minded parser structure without touching API, to maximise
> -backportability. Store all the raw packets internally as we decode them
> -to be able to access previous elements at will, needed to validate ordering
> -and access the actual data. Add testcases for manipulated keys whose
> -import previously would succeed.
> -
> -Depends on the two previous commits:
> -7b399fcb8f52566e6f3b4327197a85facd08db91 and
> -236b802a4aa48711823a191d1b7f753c82a89ec5
> -
> -Fixes CVE-2021-3521.
> -
> -Upstream-Status: Backport [https://github.com/rpm-software-management/rpm/commit/bd36c5dc9]
> -CVE:CVE-2021-3521
> -
> -Signed-off-by: Changqing Li <changqing.li@windriver.com>
> -
> ----
> - rpmio/rpmpgp.c                                | 99 +++++++++++++++++--
> - tests/Makefile.am                             |  3 +
> - tests/data/keys/CVE-2021-3521-badbind.asc     | 25 +++++
> - .../data/keys/CVE-2021-3521-nosubsig-last.asc | 25 +++++
> - tests/data/keys/CVE-2021-3521-nosubsig.asc    | 37 +++++++
> - tests/rpmsigdig.at                            | 28 ++++++
> - 6 files changed, 209 insertions(+), 8 deletions(-)
> - create mode 100644 tests/data/keys/CVE-2021-3521-badbind.asc
> - create mode 100644 tests/data/keys/CVE-2021-3521-nosubsig-last.asc
> - create mode 100644 tests/data/keys/CVE-2021-3521-nosubsig.asc
> -
> -diff --git a/rpmio/rpmpgp.c b/rpmio/rpmpgp.c
> -index 509e777e6d..371ad4d9b6 100644
> ---- a/rpmio/rpmpgp.c
> -+++ b/rpmio/rpmpgp.c
> -@@ -1061,33 +1061,116 @@ static pgpDigParams pgpDigParamsNew(uint8_t tag)
> -     return digp;
> - }
> -
> -+static int hashKey(DIGEST_CTX hash, const struct pgpPkt *pkt, int exptag)
> -+{
> -+    int rc = -1;
> -+    if (pkt->tag == exptag) {
> -+       uint8_t head[] = {
> -+           0x99,
> -+           (pkt->blen >> 8),
> -+           (pkt->blen     ),
> -+       };
> -+
> -+       rpmDigestUpdate(hash, head, 3);
> -+       rpmDigestUpdate(hash, pkt->body, pkt->blen);
> -+       rc = 0;
> -+    }
> -+    return rc;
> -+}
> -+
> -+static int pgpVerifySelf(pgpDigParams key, pgpDigParams selfsig,
> -+                       const struct pgpPkt *all, int i)
> -+{
> -+    int rc = -1;
> -+    DIGEST_CTX hash = NULL;
> -+
> -+    switch (selfsig->sigtype) {
> -+    case PGPSIGTYPE_SUBKEY_BINDING:
> -+       hash = rpmDigestInit(selfsig->hash_algo, 0);
> -+       if (hash) {
> -+           rc = hashKey(hash, &all[0], PGPTAG_PUBLIC_KEY);
> -+           if (!rc)
> -+               rc = hashKey(hash, &all[i-1], PGPTAG_PUBLIC_SUBKEY);
> -+       }
> -+       break;
> -+    default:
> -+       /* ignore types we can't handle */
> -+       rc = 0;
> -+       break;
> -+    }
> -+
> -+    if (hash && rc == 0)
> -+       rc = pgpVerifySignature(key, selfsig, hash);
> -+
> -+    rpmDigestFinal(hash, NULL, NULL, 0);
> -+
> -+    return rc;
> -+}
> -+
> - int pgpPrtParams(const uint8_t * pkts, size_t pktlen, unsigned int pkttype,
> -                pgpDigParams * ret)
> - {
> -     const uint8_t *p = pkts;
> -     const uint8_t *pend = pkts + pktlen;
> -     pgpDigParams digp = NULL;
> --    struct pgpPkt pkt;
> -+    pgpDigParams selfsig = NULL;
> -+    int i = 0;
> -+    int alloced = 16; /* plenty for normal cases */
> -+    struct pgpPkt *all = xmalloc(alloced * sizeof(*all));
> -     int rc = -1; /* assume failure */
> -+    int expect = 0;
> -+    int prevtag = 0;
> -
> -     while (p < pend) {
> --      if (decodePkt(p, (pend - p), &pkt))
> -+      struct pgpPkt *pkt = &all[i];
> -+      if (decodePkt(p, (pend - p), pkt))
> -           break;
> -
> -       if (digp == NULL) {
> --          if (pkttype && pkt.tag != pkttype) {
> -+               if (pkttype && pkt->tag != pkttype) {
> -               break;
> -           } else {
> --              digp = pgpDigParamsNew(pkt.tag);
> -+              digp = pgpDigParamsNew(pkt->tag);
> -           }
> -       }
> -
> --      if (pgpPrtPkt(&pkt, digp))
> -+        if (expect) {
> -+            if (pkt->tag != expect)
> -+                break;
> -+            selfsig = pgpDigParamsNew(pkt->tag);
> -+        }
> -+      if (pgpPrtPkt(pkt, selfsig ? selfsig : digp))
> -           break;
> -
> --      p += (pkt.body - pkt.head) + pkt.blen;
> --      if (pkttype == PGPTAG_SIGNATURE)
> --          break;
> -+      if (selfsig) {
> -+           /* subkeys must be followed by binding signature */
> -+           if (prevtag == PGPTAG_PUBLIC_SUBKEY) {
> -+               if (selfsig->sigtype != PGPSIGTYPE_SUBKEY_BINDING)
> -+                   break;
> -+           }
> -+
> -+           int xx = pgpVerifySelf(digp, selfsig, all, i);
> -+
> -+           selfsig = pgpDigParamsFree(selfsig);
> -+           if (xx)
> -+               break;
> -+           expect = 0;
> -+       }
> -+
> -+       if (pkt->tag == PGPTAG_PUBLIC_SUBKEY)
> -+           expect = PGPTAG_SIGNATURE;
> -+       prevtag = pkt->tag;
> -+
> -+       i++;
> -+       p += (pkt->body - pkt->head) + pkt->blen;
> -+       if (pkttype == PGPTAG_SIGNATURE)
> -+           break;
> -+
> -+       if (alloced <= i) {
> -+           alloced *= 2;
> -+           all = xrealloc(all, alloced * sizeof(*all));
> -+       }
> -+
> -     }
> -
> -     rc = (digp && (p == pend)) ? 0 : -1;
> -diff --git a/tests/Makefile.am b/tests/Makefile.am
> -index a41ce10de8..7bb23247f1 100644
> ---- a/tests/Makefile.am
> -+++ b/tests/Makefile.am
> -@@ -107,6 +107,9 @@ EXTRA_DIST += data/SPECS/hello-config-buildid.spec
> - EXTRA_DIST += data/SPECS/hello-cd.spec
> - EXTRA_DIST += data/keys/rpm.org-rsa-2048-test.pub
> - EXTRA_DIST += data/keys/rpm.org-rsa-2048-test.secret
> -+EXTRA_DIST += data/keys/CVE-2021-3521-badbind.asc
> -+EXTRA_DIST += data/keys/CVE-2022-3521-nosubsig.asc
> -+EXTRA_DIST += data/keys/CVE-2022-3521-nosubsig-last.asc
> - EXTRA_DIST += data/macros.testfile
> - EXTRA_DIST += data/macros.debug
> - EXTRA_DIST += data/SOURCES/foo.c
> -diff --git a/tests/data/keys/CVE-2021-3521-badbind.asc b/tests/data/keys/CVE-2021-3521-badbind.asc
> -new file mode 100644
> -index 0000000000..aea00f9d7a
> ---- /dev/null
> -+++ b/tests/data/keys/CVE-2021-3521-badbind.asc
> -@@ -0,0 +1,25 @@
> -+-----BEGIN PGP PUBLIC KEY BLOCK-----
> -+Version: rpm-4.17.90 (NSS-3)
> -+
> -+mQENBFjmORgBCAC7TMEk6wnjSs8Dr4yqSScWdU2pjcqrkTxuzdWvowcIUPZI0w/g
> -+HkRqGd4apjvY2V15kjL10gk3QhFP3pZ/9p7zh8o8NHX7aGdSGDK7NOq1eFaErPRY
> -+91LW9RiZ0lbOjXEzIL0KHxUiTQEmdXJT43DJMFPyW9fkCWg0OltiX618FUdWWfI8
> -+eySdLur1utnqBvdEbCUvWK2RX3vQZQdvEBODnNk2pxqTyV0w6VPQ96W++lF/5Aas
> -+7rUv3HIyIXxIggc8FRrnH+y9XvvHDonhTIlGnYZN4ubm9i4y3gOkrZlGTrEw7elQ
> -+1QeMyG2QQEbze8YjpTm4iLABCBrRfPRaQpwrABEBAAG0IXJwbS5vcmcgUlNBIHRl
> -+c3RrZXkgPHJzYUBycG0ub3JnPokBNwQTAQgAIQUCWOY5GAIbAwULCQgHAgYVCAkK
> -+CwIEFgIDAQIeAQIXgAAKCRBDRFkeGWTF/MxxCACnjqFL+MmPh9W9JQKT2DcLbBzf
> -+Cqo6wcEBoCOcwgRSk8dSikhARoteoa55JRJhuMyeKhhEAogE9HRmCPFdjezFTwgB
> -+BDVBpO2dZ023mLXDVCYX3S8pShOgCP6Tn4wqCnYeAdLcGg106N4xcmgtcssJE+Pr
> -+XzTZksbZsrTVEmL/Ym+R5w5jBfFnGk7Yw7ndwfQsfNXQb5AZynClFxnX546lcyZX
> -+fEx3/e6ezw57WNOUK6WT+8b+EGovPkbetK/rGxNXuWaP6X4A/QUm8O98nCuHYFQq
> -++mvNdsCBqGf7mhaRGtpHk/JgCn5rFvArMDqLVrR9hX0LdCSsH7EGE+bR3r7wuQEN
> -+BFjmORgBCACk+vDZrIXQuFXEYToZVwb2attzbbJJCqD71vmZTLsW0QxuPKRgbcYY
> -+zp4K4lVBnHhFrF8MOUOxJ7kQWIJZMZFt+BDcptCYurbD2H4W2xvnWViiC+LzCMzz
> -+iMJT6165uefL4JHTDPxC2fFiM9yrc72LmylJNkM/vepT128J5Qv0gRUaQbHiQuS6
> -+Dm/+WRnUfx3i89SV4mnBxb/Ta93GVqoOciWwzWSnwEnWYAvOb95JL4U7c5J5f/+c
> -+KnQDHsW7sIiIdscsWzvgf6qs2Ra1Zrt7Fdk4+ZS2f/adagLhDO1C24sXf5XfMk5m
> -+L0OGwZSr9m5s17VXxfspgU5ugc8kBJfzABEBAAE=
> -+=WCfs
> -+-----END PGP PUBLIC KEY BLOCK-----
> -+
> -diff --git a/tests/data/keys/CVE-2021-3521-nosubsig-last.asc b/tests/data/keys/CVE-2021-3521-nosubsig-last.asc
> -new file mode 100644
> -index 0000000000..aea00f9d7a
> ---- /dev/null
> -+++ b/tests/data/keys/CVE-2021-3521-nosubsig-last.asc
> -@@ -0,0 +1,25 @@
> -+-----BEGIN PGP PUBLIC KEY BLOCK-----
> -+Version: rpm-4.17.90 (NSS-3)
> -+
> -+mQENBFjmORgBCAC7TMEk6wnjSs8Dr4yqSScWdU2pjcqrkTxuzdWvowcIUPZI0w/g
> -+HkRqGd4apjvY2V15kjL10gk3QhFP3pZ/9p7zh8o8NHX7aGdSGDK7NOq1eFaErPRY
> -+91LW9RiZ0lbOjXEzIL0KHxUiTQEmdXJT43DJMFPyW9fkCWg0OltiX618FUdWWfI8
> -+eySdLur1utnqBvdEbCUvWK2RX3vQZQdvEBODnNk2pxqTyV0w6VPQ96W++lF/5Aas
> -+7rUv3HIyIXxIggc8FRrnH+y9XvvHDonhTIlGnYZN4ubm9i4y3gOkrZlGTrEw7elQ
> -+1QeMyG2QQEbze8YjpTm4iLABCBrRfPRaQpwrABEBAAG0IXJwbS5vcmcgUlNBIHRl
> -+c3RrZXkgPHJzYUBycG0ub3JnPokBNwQTAQgAIQUCWOY5GAIbAwULCQgHAgYVCAkK
> -+CwIEFgIDAQIeAQIXgAAKCRBDRFkeGWTF/MxxCACnjqFL+MmPh9W9JQKT2DcLbBzf
> -+Cqo6wcEBoCOcwgRSk8dSikhARoteoa55JRJhuMyeKhhEAogE9HRmCPFdjezFTwgB
> -+BDVBpO2dZ023mLXDVCYX3S8pShOgCP6Tn4wqCnYeAdLcGg106N4xcmgtcssJE+Pr
> -+XzTZksbZsrTVEmL/Ym+R5w5jBfFnGk7Yw7ndwfQsfNXQb5AZynClFxnX546lcyZX
> -+fEx3/e6ezw57WNOUK6WT+8b+EGovPkbetK/rGxNXuWaP6X4A/QUm8O98nCuHYFQq
> -++mvNdsCBqGf7mhaRGtpHk/JgCn5rFvArMDqLVrR9hX0LdCSsH7EGE+bR3r7wuQEN
> -+BFjmORgBCACk+vDZrIXQuFXEYToZVwb2attzbbJJCqD71vmZTLsW0QxuPKRgbcYY
> -+zp4K4lVBnHhFrF8MOUOxJ7kQWIJZMZFt+BDcptCYurbD2H4W2xvnWViiC+LzCMzz
> -+iMJT6165uefL4JHTDPxC2fFiM9yrc72LmylJNkM/vepT128J5Qv0gRUaQbHiQuS6
> -+Dm/+WRnUfx3i89SV4mnBxb/Ta93GVqoOciWwzWSnwEnWYAvOb95JL4U7c5J5f/+c
> -+KnQDHsW7sIiIdscsWzvgf6qs2Ra1Zrt7Fdk4+ZS2f/adagLhDO1C24sXf5XfMk5m
> -+L0OGwZSr9m5s17VXxfspgU5ugc8kBJfzABEBAAE=
> -+=WCfs
> -+-----END PGP PUBLIC KEY BLOCK-----
> -+
> -diff --git a/tests/data/keys/CVE-2021-3521-nosubsig.asc b/tests/data/keys/CVE-2021-3521-nosubsig.asc
> -new file mode 100644
> -index 0000000000..3a2e7417f8
> ---- /dev/null
> -+++ b/tests/data/keys/CVE-2021-3521-nosubsig.asc
> -@@ -0,0 +1,37 @@
> -+-----BEGIN PGP PUBLIC KEY BLOCK-----
> -+Version: rpm-4.17.90 (NSS-3)
> -+
> -+mQENBFjmORgBCAC7TMEk6wnjSs8Dr4yqSScWdU2pjcqrkTxuzdWvowcIUPZI0w/g
> -+HkRqGd4apjvY2V15kjL10gk3QhFP3pZ/9p7zh8o8NHX7aGdSGDK7NOq1eFaErPRY
> -+91LW9RiZ0lbOjXEzIL0KHxUiTQEmdXJT43DJMFPyW9fkCWg0OltiX618FUdWWfI8
> -+eySdLur1utnqBvdEbCUvWK2RX3vQZQdvEBODnNk2pxqTyV0w6VPQ96W++lF/5Aas
> -+7rUv3HIyIXxIggc8FRrnH+y9XvvHDonhTIlGnYZN4ubm9i4y3gOkrZlGTrEw7elQ
> -+1QeMyG2QQEbze8YjpTm4iLABCBrRfPRaQpwrABEBAAG0IXJwbS5vcmcgUlNBIHRl
> -+c3RrZXkgPHJzYUBycG0ub3JnPokBNwQTAQgAIQUCWOY5GAIbAwULCQgHAgYVCAkK
> -+CwIEFgIDAQIeAQIXgAAKCRBDRFkeGWTF/MxxCACnjqFL+MmPh9W9JQKT2DcLbBzf
> -+Cqo6wcEBoCOcwgRSk8dSikhARoteoa55JRJhuMyeKhhEAogE9HRmCPFdjezFTwgB
> -+BDVBpO2dZ023mLXDVCYX3S8pShOgCP6Tn4wqCnYeAdLcGg106N4xcmgtcssJE+Pr
> -+XzTZksbZsrTVEmL/Ym+R5w5jBfFnGk7Yw7ndwfQsfNXQb5AZynClFxnX546lcyZX
> -+fEx3/e6ezw57WNOUK6WT+8b+EGovPkbetK/rGxNXuWaP6X4A/QUm8O98nCuHYFQq
> -++mvNdsCBqGf7mhaRGtpHk/JgCn5rFvArMDqLVrR9hX0LdCSsH7EGE+bR3r7wuQEN
> -+BFjmORgBCACk+vDZrIXQuFXEYToZVwb2attzbbJJCqD71vmZTLsW0QxuPKRgbcYY
> -+zp4K4lVBnHhFrF8MOUOxJ7kQWIJZMZFt+BDcptCYurbD2H4W2xvnWViiC+LzCMzz
> -+iMJT6165uefL4JHTDPxC2fFiM9yrc72LmylJNkM/vepT128J5Qv0gRUaQbHiQuS6
> -+Dm/+WRnUfx3i89SV4mnBxb/Ta93GVqoOciWwzWSnwEnWYAvOb95JL4U7c5J5f/+c
> -+KnQDHsW7sIiIdscsWzvgf6qs2Ra1Zrt7Fdk4+ZS2f/adagLhDO1C24sXf5XfMk5m
> -+L0OGwZSr9m5s17VXxfspgU5ugc8kBJfzABEBAAG5AQ0EWOY5GAEIAKT68NmshdC4
> -+VcRhOhlXBvZq23NtskkKoPvW+ZlMuxbRDG48pGBtxhjOngriVUGceEWsXww5Q7En
> -+uRBYglkxkW34ENym0Ji6tsPYfhbbG+dZWKIL4vMIzPOIwlPrXrm558vgkdMM/ELZ
> -+8WIz3KtzvYubKUk2Qz+96lPXbwnlC/SBFRpBseJC5LoOb/5ZGdR/HeLz1JXiacHF
> -+v9Nr3cZWqg5yJbDNZKfASdZgC85v3kkvhTtzknl//5wqdAMexbuwiIh2xyxbO+B/
> -+qqzZFrVmu3sV2Tj5lLZ/9p1qAuEM7ULbixd/ld8yTmYvQ4bBlKv2bmzXtVfF+ymB
> -+Tm6BzyQEl/MAEQEAAYkBHwQYAQgACQUCWOY5GAIbDAAKCRBDRFkeGWTF/PANB/9j
> -+mifmj6z/EPe0PJFhrpISt9PjiUQCt0IPtiL5zKAkWjHePIzyi+0kCTBF6DDLFxos
> -+3vN4bWnVKT1kBhZAQlPqpJTg+m74JUYeDGCdNx9SK7oRllATqyu+5rncgxjWVPnQ
> -+zu/HRPlWJwcVFYEVXYL8xzfantwQTqefjmcRmBRdA2XJITK+hGWwAmrqAWx+q5xX
> -+Pa8wkNMxVzNS2rUKO9SoVuJ/wlUvfoShkJ/VJ5HDp3qzUqncADfdGN35TDzscngQ
> -+gHvnMwVBfYfSCABV1hNByoZcc/kxkrWMmsd/EnIyLd1Q1baKqc3cEDuC6E6/o4yJ
> -+E4XX4jtDmdZPreZALsiB
> -+=rRop
> -+-----END PGP PUBLIC KEY BLOCK-----
> -+
> -diff --git a/tests/rpmsigdig.at b/tests/rpmsigdig.at
> -index 8e7c759b8f..e2d30a7f1b 100644
> ---- a/tests/rpmsigdig.at
> -+++ b/tests/rpmsigdig.at
> -@@ -2,6 +2,34 @@
> -
> - AT_BANNER([RPM signatures and digests])
> -
> -+AT_SETUP([rpmkeys --import invalid keys])
> -+AT_KEYWORDS([rpmkeys import])
> -+RPMDB_INIT
> -+
> -+AT_CHECK([
> -+runroot rpmkeys --import /data/keys/CVE-2021-3521-badbind.asc
> -+],
> -+[1],
> -+[],
> -+[error: /data/keys/CVE-2021-3521-badbind.asc: key 1 import failed.]
> -+)
> -+AT_CHECK([
> -+runroot rpmkeys --import /data/keys/CVE-2021-3521-nosubsig.asc
> -+],
> -+[1],
> -+[],
> -+[error: /data/keys/CVE-2021-3521-nosubsig.asc: key 1 import failed.]
> -+)
> -+
> -+AT_CHECK([
> -+runroot rpmkeys --import /data/keys/CVE-2021-3521-nosubsig-last.asc
> -+],
> -+[1],
> -+[],
> -+[error: /data/keys/CVE-2021-3521-nosubsig-last.asc: key 1 import failed.]
> -+)
> -+AT_CLEANUP
> -+
> - # ------------------------------
> - # Test pre-built package verification
> - AT_SETUP([rpmkeys -Kv <unsigned> 1])
> ---
> -2.17.1
> -
> diff --git a/meta/recipes-devtools/rpm/rpm_4.17.0.bb b/meta/recipes-devtools/rpm/rpm_4.17.1.bb
> similarity index 97%
> rename from meta/recipes-devtools/rpm/rpm_4.17.0.bb
> rename to meta/recipes-devtools/rpm/rpm_4.17.1.bb
> index c392ac0db4..e3015172f8 100644
> --- a/meta/recipes-devtools/rpm/rpm_4.17.0.bb
> +++ b/meta/recipes-devtools/rpm/rpm_4.17.1.bb
> @@ -39,13 +39,10 @@ SRC_URI = "git://github.com/rpm-software-management/rpm;branch=rpm-4.17.x;protoc
>             file://0001-tools-Add-error.h-for-non-glibc-case.patch \
>             file://0001-docs-do-not-build-manpages-requires-pandoc.patch \
>             file://0001-build-pack.c-do-not-insert-payloadflags-into-.rpm-me.patch \
> -           file://0001-CVE-2021-3521.patch \
> -           file://0002-CVE-2021-3521.patch \
> -           file://0003-CVE-2021-3521.patch \
>             "
>
>  PE = "1"
> -SRCREV = "3e74e8ba2dd5e76a5353d238dc7fc38651ce27b3"
> +SRCREV = "5bef402da334595ed9302b8bca1acdf5e88bfe11"
>
>  S = "${WORKDIR}/git"
>
> --
> 2.30.2
>
>
> -=-=-=-=-=-=-=-=-=-=-=-
> Links: You receive all messages sent to this group.
> View/Reply Online (#168299): https://lists.openembedded.org/g/openembedded-core/message/168299
> Mute This Topic: https://lists.openembedded.org/mt/92500534/1686489
> Group Owner: openembedded-core+owner@lists.openembedded.org
> Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub [alex.kanavin@gmail.com]
> -=-=-=-=-=-=-=-=-=-=-=-
>
Richard Purdie July 20, 2022, 9:23 a.m. UTC | #2
On Wed, 2022-07-20 at 10:49 +0200, Alexander Kanavin wrote:
> Note: this update fails on x32 with
> 
> > configure: error: unrecognized GNU build triplet linux-gnux32
> 
> This time I want to put my foot down and suggest that we just drop the
> whole x32 variant from the autobuilder (I had already sent a patch for
> this previously). In all likelihood it was never used to ship anything
> to customers, and was only devised to look better in benchmarks
> against competition.

That amounts to dropping x32 support because as soon as we remove these
tests, it will bitrot.

There is still some value in the project being able to support
different architectures and different type sizes so I do still lean
towards keeping this alive at a minimal level.

Cheers,

Richard
Alexander Kanavin July 20, 2022, 9:28 a.m. UTC | #3
On Wed, 20 Jul 2022 at 11:23, Richard Purdie
<richard.purdie@linuxfoundation.org> wrote:
> That amounts to dropping x32 support because as soon as we remove these
> tests, it will bitrot.
>
> There is still some value in the project being able to support
> different architectures and different type sizes so I do still lean
> towards keeping this alive at a minimal level.

But then why not replace x32 with riscv32, which as well has 32 bit
pointers but 64 bit integers and thus trips over the same type size
issues?

Alex
Ross Burton July 20, 2022, 9:50 a.m. UTC | #4
On 20 Jul 2022, at 10:28, Alexander Kanavin via lists.openembedded.org <alex.kanavin=gmail.com@lists.openembedded.org> wrote:
> 
> On Wed, 20 Jul 2022 at 11:23, Richard Purdie
> <richard.purdie@linuxfoundation.org> wrote:
>> That amounts to dropping x32 support because as soon as we remove these
>> tests, it will bitrot.
>> 
>> There is still some value in the project being able to support
>> different architectures and different type sizes so I do still lean
>> towards keeping this alive at a minimal level.
> 
> But then why not replace x32 with riscv32, which as well has 32 bit
> pointers but 64 bit integers and thus trips over the same type size
> issues?

Does the RISC-V ecosystem care about riscv32?

The problem with Intel x32 is that very few people care, so we end up fixing upstream software.  If RISC-V cares then we won’t be alone.

Also, Intel should get to have an opinion on this.  If they actually care about x32 then they can help fix the issues, if they don’t then we can easily switch to a platform that has support.

Ross
Alexander Kanavin July 20, 2022, 9:58 a.m. UTC | #5
On Wed, 20 Jul 2022 at 11:50, Ross Burton <Ross.Burton@arm.com> wrote:
> Also, Intel should get to have an opinion on this.  If they actually care about x32 then they can help fix the issues, if they don’t then we can easily switch to a platform that has support.

Ok, let's ask Intel, specifically Anuj :-)

Anuj, does Intel still care about x32, and would anyone notice if
yocto drops x32 support from master branch?

Alex
Marko Lindqvist July 20, 2022, 9:59 a.m. UTC | #6
On Wed, 20 Jul 2022 at 12:50, Ross Burton <ross.burton@arm.com> wrote:
>
> On 20 Jul 2022, at 10:28, Alexander Kanavin via lists.openembedded.org <alex.kanavin=gmail.com@lists.openembedded.org> wrote:
> >
> > On Wed, 20 Jul 2022 at 11:23, Richard Purdie
> > <richard.purdie@linuxfoundation.org> wrote:
> >> That amounts to dropping x32 support because as soon as we remove these
> >> tests, it will bitrot.
> >>
> >> There is still some value in the project being able to support
> >> different architectures and different type sizes so I do still lean
> >> towards keeping this alive at a minimal level.
> >
> > But then why not replace x32 with riscv32, which as well has 32 bit
> > pointers but 64 bit integers and thus trips over the same type size
> > issues?
>
> Does the RISC-V ecosystem care about riscv32?
>
> The problem with Intel x32 is that very few people care, so we end up fixing upstream software.  If RISC-V cares then we won’t be alone.
>
> Also, Intel should get to have an opinion on this.  If they actually care about x32 then they can help fix the issues, if they don’t then we can easily switch to a platform that has support.

 How much difference is there between x32 and riscv32 in upstreams? As
they would trip on the same issues, one would assume that if the issue
is fixed for one, it gets fixed for the other too.
 But might be that relevant upstreams need to have much of the code
duplicated (fixing one copy does not fix the other)


  - ML
Alexander Kanavin July 20, 2022, 10:06 a.m. UTC | #7
On Wed, 20 Jul 2022 at 12:00, Marko Lindqvist <cazfi74@gmail.com> wrote:
>  How much difference is there between x32 and riscv32 in upstreams? As
> they would trip on the same issues, one would assume that if the issue
> is fixed for one, it gets fixed for the other too.
>  But might be that relevant upstreams need to have much of the code
> duplicated (fixing one copy does not fix the other)

The fixing is often wrapped in target-specific conditionals, and so
fixing one does not address the other, until the conditional is
expanded with additional or statements, or checks are done from first
principles (e.g. actual type sizes).

Alex
Anuj Mittal July 20, 2022, 3:41 p.m. UTC | #8
On Wed, 2022-07-20 at 11:58 +0200, Alexander Kanavin wrote:
> On Wed, 20 Jul 2022 at 11:50, Ross Burton <Ross.Burton@arm.com>
> wrote:
> > Also, Intel should get to have an opinion on this.  If they
> > actually care about x32 then they can help fix the issues, if they
> > don’t then we can easily switch to a platform that has support.
> 
> Ok, let's ask Intel, specifically Anuj :-)
> 
> Anuj, does Intel still care about x32, and would anyone notice if
> yocto drops x32 support from master branch?
> 

I don't know if there are any Yocto users of it who might notice.

Instead of dropping the testing completely, may be we should switch to
building/testing just the core-image-minimal image on autobuilder and
keep at least some minimal support for now.

Thanks,

Anuj
Alexander Kanavin July 20, 2022, 3:46 p.m. UTC | #9
On Wed, 20 Jul 2022 at 17:41, Mittal, Anuj <anuj.mittal@intel.com> wrote:
> I don't know if there are any Yocto users of it who might notice.
>
> Instead of dropping the testing completely, may be we should switch to
> building/testing just the core-image-minimal image on autobuilder and
> keep at least some minimal support for now.

There's actually already a patch for that :)
https://lists.yoctoproject.org/g/yocto/message/56880

Alex
Alexander Kanavin July 27, 2022, 2:56 p.m. UTC | #10
On Wed, 20 Jul 2022 at 17:46, Alexander Kanavin via
lists.yoctoproject.org <alex.kanavin=gmail.com@lists.yoctoproject.org>
wrote:
>
> On Wed, 20 Jul 2022 at 17:41, Mittal, Anuj <anuj.mittal@intel.com> wrote:
> > I don't know if there are any Yocto users of it who might notice.
> >
> > Instead of dropping the testing completely, may be we should switch to
> > building/testing just the core-image-minimal image on autobuilder and
> > keep at least some minimal support for now.
>
> There's actually already a patch for that :)
> https://lists.yoctoproject.org/g/yocto/message/56880

Which I just resent. Now we have confirmation from Intel that nobody
minds reducing the scope of the AB test.

Alex
Anuj Mittal July 27, 2022, 3:18 p.m. UTC | #11
On Wed, 2022-07-27 at 16:56 +0200, Alexander Kanavin wrote:
> On Wed, 20 Jul 2022 at 17:46, Alexander Kanavin via
> lists.yoctoproject.org
> <alex.kanavin=gmail.com@lists.yoctoproject.org>
> wrote:
> > 
> > On Wed, 20 Jul 2022 at 17:41, Mittal, Anuj <anuj.mittal@intel.com>
> > wrote:
> > > I don't know if there are any Yocto users of it who might notice.
> > > 
> > > Instead of dropping the testing completely, may be we should
> > > switch to
> > > building/testing just the core-image-minimal image on autobuilder
> > > and
> > > keep at least some minimal support for now.
> > 
> > There's actually already a patch for that :)
> > https://lists.yoctoproject.org/g/yocto/message/56880
> 
> Which I just resent. Now we have confirmation from Intel that nobody
> minds reducing the scope of the AB test.
> 

It was just a personal opinion saying that I won't mind. If it's
needed, then someone would hopefully fix the issues.

Thanks,

Anuj
diff mbox series

Patch

diff --git a/meta/recipes-sato/sato-icon-theme/sato-icon-theme_git.bb b/meta/recipes-sato/sato-icon-theme/sato-icon-theme_git.bb
index e2140bfdd7..1ebbf010f3 100644
--- a/meta/recipes-sato/sato-icon-theme/sato-icon-theme_git.bb
+++ b/meta/recipes-sato/sato-icon-theme/sato-icon-theme_git.bb
@@ -10,6 +10,7 @@  DEPENDS = "icon-naming-utils-native libxml-simple-perl-native"
 
 SRC_URI = "git://git.yoctoproject.org/sato-icon-theme.git;protocol=https;branch=master"
 SRCREV = "d23f04ecb0328f655bf195df8eb04c1b734d53a9"
+UPSTREAM_CHECK_COMMITS = "1"
 
 S = "${WORKDIR}/git"