OE-core has updated kernel headers to 5.19 and that is resulting in
failures:
| /build/cje/workspace/poky/build/tmp/work/corei7-64-poky-linux/ipmctl/03.00.00.0439-r0/git/src/os/linux/lnx_system.c:336:52: error: 'ND_DEVICE_NAMESPACE_BLK' undeclared (first use in this function); did you mean 'ND_DEVICE_NAMESPACE_IO'?
| 336 | (nstype == ND_DEVICE_NAMESPACE_BLK))
| | ^~~~~~~~~~~~~~~~~~~~~~~
| | ND_DEVICE_NAMESPACE_IO
| compilation terminated due to -Wfatal-errors.
For more details:
https://github.com/intel/ipmctl/pull/194/
Signed-off-by: Anuj Mittal <anuj.mittal@intel.com>
intel-mediasdk depends only on libva
intel-mediasdk has a runtime dependency to intel-media-driver
removed libdrm dependency from intel-mediasdk because libva depends on libdrm
Signed-off-by: Sebastian Suesens <Sebastian.Suesens@baslerweb.com>
Signed-off-by: Anuj Mittal <anuj.mittal@intel.com>
Prevent host paths from getting into target packages. Also prevents
buildpaths warnings for files:
| File /usr/lib/libopenvino.so in package openvino-inference-engine contains reference to TMPDIR [buildpaths]
| File /usr/lib/python3.10/site-packages/openvino/inference_engine/ie_api.so in package openvino-inference-engine-python3 contains reference to TMPDIR [buildpaths]
| File /usr/src/debug/openvino-inference-engine/2022.1-r0/build/src/plugins/intel_cpu/cross-compiled/proposal_imp_disp.cpp in package openvino-inference-engine-src contains reference to TMPDIR
Signed-off-by: Anuj Mittal <anuj.mittal@intel.com>
* Don't build with clang specifically and let user decide.
* Drop already merged patch: 0001-Enable-LLVM-15.0-support.patch
* ispc generated headers include a comment will full path to the header. Patch the code to drop this comment.
* Tweak bison and flex invocation to make sure they don't include #line directives.
* Add flex-native to DEPENDS.
* Release notes:
https://github.com/ispc/ispc/releases/tag/v1.18.0
Signed-off-by: Yogesh Tyagi <yogesh.tyagi@intel.com>
Signed-off-by: Anuj Mittal <anuj.mittal@intel.com>
We test this kernel only with 64 bit machine types. Make changes to
reflect that. intel-core2-32 should be built with linux-yocto kernel.
Signed-off-by: Anuj Mittal <anuj.mittal@intel.com>
* Remove upstreamed patches and refresh others.
* Include the LICENSE.md file and remove the cpp file which just points to
MIT license.
* Update the license to MIT and Apache-2.0
* Install vcb tool from -native recipe.
Signed-off-by: Anuj Mittal <anuj.mittal@intel.com>
Patch submitted to use uint32_t instead of int for IOCTLs commands.
Warning log:
| ../../../git/xcore/fake_v4l2_device.h: In member function 'virtual int XCam::FakeV4l2Device::io_control(int, void*)':
| ../../../git/xcore/fake_v4l2_device.h:42:14: error: narrowing conversion of '3225441794' from 'long unsigned int' to 'int' [-Wnarrowing]
| 42 | case VIDIOC_ENUM_FMT:
| | ^~~~~~~~~~~~~~~
| make[4]: *** [Makefile:685: libgstxcamsrc_la-gstxcamsrc.lo] Error 1
Signed-off-by: Naveen Saini <naveen.kumar.saini@intel.com>
Signed-off-by: Anuj Mittal <anuj.mittal@intel.com>
The patch was removed from SRC_URI in an earlier commit but we forgot to
actually remove the patch file itself.
Signed-off-by: Anuj Mittal <anuj.mittal@intel.com>
Ignore warnings generated with gcc12 for now.
| /ipmctl/03.00.00.0438-r0/git/DcpmPkg/cli/NvmDimmCli.c: In function 'showHelp':
| /ipmctl/03.00.00.0438-r0/git/DcpmPkg/cli/NvmDimmCli.c:1031:24: error: the comparison will always evaluate as 'true' for the address of 'options' will never be NULL [-Werror=address]
| 1031 | (pCmd->options != NULL)) {
| | ^~
| compilation terminated due to -Wfatal-errors.
| cc1: all warnings being treated as errors
Signed-off-by: Anuj Mittal <anuj.mittal@intel.com>
intel-microcode-20220510 includes fixes for CVE-2021-33117 and CVE-2022-21151.
CVE-2021-33117:
A potential security vulnerability in some 3rd Generation Intel® Xeon® Scalable
Processors may allow information disclosure. Intel is releasing firmware
updates to mitigate this potential vulnerability.
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00586.html
CVE-2022-21151:
A potential security vulnerability in some Intel® Processors may allow
information disclosure. Intel is releasing firmware updates to mitigate this
potential vulnerability.
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00617.html
Signed-off-by: Ovidiu Panait <ovidiu.panait@windriver.com>
Signed-off-by: Anuj Mittal <anuj.mittal@intel.com>