[16/16] pax-utils: remove

Message ID 20180727153248.22838-16-ross.burton@intel.com
State New
Headers show
Series
  • [01/16] oeqa/sdk: add test that CMake works
Related show

Commit Message

Ross Burton July 27, 2018, 3:32 p.m.
This was packaged originally to perform QA tests on binaries (text relocations
and RPATHs), but we perform those tests at build-time now.

Signed-off-by: Ross Burton <ross.burton@intel.com>

---
 meta/recipes-devtools/pax-utils/pax-utils_1.2.2.bb | 36 ----------------------
 1 file changed, 36 deletions(-)
 delete mode 100644 meta/recipes-devtools/pax-utils/pax-utils_1.2.2.bb

-- 
2.11.0

-- 
_______________________________________________
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core

Comments

Christopher Larson July 27, 2018, 4:01 p.m. | #1
Should this be moved to meta-oe rather than just removed?

On Fri, Jul 27, 2018 at 8:34 AM Ross Burton <ross.burton@intel.com> wrote:

> This was packaged originally to perform QA tests on binaries (text

> relocations

> and RPATHs), but we perform those tests at build-time now.

>

> Signed-off-by: Ross Burton <ross.burton@intel.com>

> ---

>  meta/recipes-devtools/pax-utils/pax-utils_1.2.2.bb | 36

> ----------------------

>  1 file changed, 36 deletions(-)

>  delete mode 100644 meta/recipes-devtools/pax-utils/pax-utils_1.2.2.bb

>

> diff --git a/meta/recipes-devtools/pax-utils/pax-utils_1.2.2.bb

> b/meta/recipes-devtools/pax-utils/pax-utils_1.2.2.bb

> deleted file mode 100644

> index 9635a5e7082..00000000000

> --- a/meta/recipes-devtools/pax-utils/pax-utils_1.2.2.bb

> +++ /dev/null

> @@ -1,36 +0,0 @@

> -SUMMARY = "Security-focused ELF files checking tool"

> -DESCRIPTION = "This is a small set of various PaX aware and related \

> -utilities for ELF binaries. It can check ELF binary files and running \

> -processes for issues that might be relevant when using ELF binaries \

> -along with PaX, such as non-PIC code or executable stack and heap."

> -HOMEPAGE = "http://www.gentoo.org/proj/en/hardened/pax-utils.xml"

> -LICENSE = "GPLv2+"

> -LIC_FILES_CHKSUM = "file://COPYING;md5=eb723b61539feef013de476e68b5c50a"

> -

> -SRC_URI = "https://dev.gentoo.org/~vapier/dist/pax-utils-${PV}.tar.xz"

> -SRC_URI[md5sum] = "a580468318f0ff42edf4a8cd314cc942"

> -SRC_URI[sha256sum] =

> "7f4a7f8db6b4743adde7582fa48992ad01776796fcde030683732f56221337d9"

> -

> -RDEPENDS_${PN} += "bash"

> -

> -export GNULIB_OVERRIDES_WINT_T = "0"

> -

> -do_configure_prepend() {

> -    touch ${S}/NEWS ${S}/AUTHORS ${S}/ChangeLog ${S}/README

> -}

> -

> -do_install() {

> -    oe_runmake PREFIX=${D}${prefix} DESTDIR=${D} install

> -}

> -

> -BBCLASSEXTEND = "native"

> -

> -inherit autotools pkgconfig

> -

> -PACKAGECONFIG ??= ""

> -

> -PACKAGECONFIG[libcap] = "--with-caps, --without-caps, libcap"

> -PACKAGECONFIG[libseccomp] = "--with-seccomp, --without-seccomp,

> libseccomp"

> -PACKAGECONFIG[pyelftools] = "--with-python, --without-python,, pyelftools"

> -

> -EXTRA_OECONF += "--enable-largefile"

> --

> 2.11.0

>

> --

> _______________________________________________

> Openembedded-core mailing list

> Openembedded-core@lists.openembedded.org

> http://lists.openembedded.org/mailman/listinfo/openembedded-core

>



-- 
Christopher Larson
kergoth at gmail dot com
Founder - BitBake, OpenEmbedded, OpenZaurus
Senior Software Engineer, Mentor Graphics
<div dir="ltr">Should this be moved to meta-oe rather than just removed?<br></div><br><div class="gmail_quote"><div dir="ltr">On Fri, Jul 27, 2018 at 8:34 AM Ross Burton &lt;<a href="mailto:ross.burton@intel.com">ross.burton@intel.com</a>&gt; wrote:<br></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">This was packaged originally to perform QA tests on binaries (text relocations<br>
and RPATHs), but we perform those tests at build-time now.<br>
<br>
Signed-off-by: Ross Burton &lt;<a href="mailto:ross.burton@intel.com" target="_blank">ross.burton@intel.com</a>&gt;<br>

---<br>
 meta/recipes-devtools/pax-utils/<a href="http://pax-utils_1.2.2.bb" rel="noreferrer" target="_blank">pax-utils_1.2.2.bb</a> | 36 ----------------------<br>
 1 file changed, 36 deletions(-)<br>
 delete mode 100644 meta/recipes-devtools/pax-utils/<a href="http://pax-utils_1.2.2.bb" rel="noreferrer" target="_blank">pax-utils_1.2.2.bb</a><br>
<br>
diff --git a/meta/recipes-devtools/pax-utils/<a href="http://pax-utils_1.2.2.bb" rel="noreferrer" target="_blank">pax-utils_1.2.2.bb</a> b/meta/recipes-devtools/pax-utils/<a href="http://pax-utils_1.2.2.bb" rel="noreferrer" target="_blank">pax-utils_1.2.2.bb</a><br>
deleted file mode 100644<br>
index 9635a5e7082..00000000000<br>
--- a/meta/recipes-devtools/pax-utils/<a href="http://pax-utils_1.2.2.bb" rel="noreferrer" target="_blank">pax-utils_1.2.2.bb</a><br>
+++ /dev/null<br>
@@ -1,36 +0,0 @@<br>
-SUMMARY = &quot;Security-focused ELF files checking tool&quot;<br>
-DESCRIPTION = &quot;This is a small set of various PaX aware and related \<br>
-utilities for ELF binaries. It can check ELF binary files and running \<br>
-processes for issues that might be relevant when using ELF binaries \<br>
-along with PaX, such as non-PIC code or executable stack and heap.&quot;<br>
-HOMEPAGE = &quot;<a href="http://www.gentoo.org/proj/en/hardened/pax-utils.xml" rel="noreferrer" target="_blank">http://www.gentoo.org/proj/en/hardened/pax-utils.xml</a>&quot;<br>
-LICENSE = &quot;GPLv2+&quot;<br>
-LIC_FILES_CHKSUM = &quot;file://COPYING;md5=eb723b61539feef013de476e68b5c50a&quot;<br>
-<br>
-SRC_URI = &quot;<a href="https://dev.gentoo.org/~vapier/dist/pax-utils-$%7BPV%7D.tar.xz" rel="noreferrer" target="_blank">https://dev.gentoo.org/~vapier/dist/pax-utils-${PV}.tar.xz</a>&quot;<br>
-SRC_URI[md5sum] = &quot;a580468318f0ff42edf4a8cd314cc942&quot;<br>
-SRC_URI[sha256sum] = &quot;7f4a7f8db6b4743adde7582fa48992ad01776796fcde030683732f56221337d9&quot;<br>
-<br>
-RDEPENDS_${PN} += &quot;bash&quot;<br>
-<br>
-export GNULIB_OVERRIDES_WINT_T = &quot;0&quot;<br>
-<br>
-do_configure_prepend() {<br>
-    touch ${S}/NEWS ${S}/AUTHORS ${S}/ChangeLog ${S}/README<br>
-}<br>
-<br>
-do_install() {<br>
-    oe_runmake PREFIX=${D}${prefix} DESTDIR=${D} install<br>
-}<br>
-<br>
-BBCLASSEXTEND = &quot;native&quot;<br>
-<br>
-inherit autotools pkgconfig<br>
-<br>
-PACKAGECONFIG ??= &quot;&quot;<br>
-<br>
-PACKAGECONFIG[libcap] = &quot;--with-caps, --without-caps, libcap&quot;<br>
-PACKAGECONFIG[libseccomp] = &quot;--with-seccomp, --without-seccomp, libseccomp&quot;<br>
-PACKAGECONFIG[pyelftools] = &quot;--with-python, --without-python,, pyelftools&quot;<br>
-<br>
-EXTRA_OECONF += &quot;--enable-largefile&quot;<br>
-- <br>
2.11.0<br>
<br>
-- <br>
_______________________________________________<br>
Openembedded-core mailing list<br>
<a href="mailto:Openembedded-core@lists.openembedded.org" target="_blank">Openembedded-core@lists.openembedded.org</a><br>
<a href="http://lists.openembedded.org/mailman/listinfo/openembedded-core" rel="noreferrer" target="_blank">http://lists.openembedded.org/mailman/listinfo/openembedded-core</a><br>
</blockquote></div><br clear="all"><br>-- <br><div dir="ltr" class="gmail_signature" data-smartmail="gmail_signature"><div dir="ltr"><div><div dir="ltr">Christopher Larson<br>kergoth at gmail dot com<br>Founder - BitBake, OpenEmbedded, OpenZaurus<br>Senior Software Engineer, Mentor Graphics</div></div></div></div>
-- 
_______________________________________________
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core
Ross Burton July 27, 2018, 4:13 p.m. | #2
Yes, I had it in a branch already, just hit the send button.

Ross

On 27 July 2018 at 17:01, Christopher Larson <kergoth@gmail.com> wrote:
> Should this be moved to meta-oe rather than just removed?

>

> On Fri, Jul 27, 2018 at 8:34 AM Ross Burton <ross.burton@intel.com> wrote:

>>

>> This was packaged originally to perform QA tests on binaries (text

>> relocations

>> and RPATHs), but we perform those tests at build-time now.

>>

>> Signed-off-by: Ross Burton <ross.burton@intel.com>

>> ---

>>  meta/recipes-devtools/pax-utils/pax-utils_1.2.2.bb | 36

>> ----------------------

>>  1 file changed, 36 deletions(-)

>>  delete mode 100644 meta/recipes-devtools/pax-utils/pax-utils_1.2.2.bb

>>

>> diff --git a/meta/recipes-devtools/pax-utils/pax-utils_1.2.2.bb

>> b/meta/recipes-devtools/pax-utils/pax-utils_1.2.2.bb

>> deleted file mode 100644

>> index 9635a5e7082..00000000000

>> --- a/meta/recipes-devtools/pax-utils/pax-utils_1.2.2.bb

>> +++ /dev/null

>> @@ -1,36 +0,0 @@

>> -SUMMARY = "Security-focused ELF files checking tool"

>> -DESCRIPTION = "This is a small set of various PaX aware and related \

>> -utilities for ELF binaries. It can check ELF binary files and running \

>> -processes for issues that might be relevant when using ELF binaries \

>> -along with PaX, such as non-PIC code or executable stack and heap."

>> -HOMEPAGE = "http://www.gentoo.org/proj/en/hardened/pax-utils.xml"

>> -LICENSE = "GPLv2+"

>> -LIC_FILES_CHKSUM = "file://COPYING;md5=eb723b61539feef013de476e68b5c50a"

>> -

>> -SRC_URI = "https://dev.gentoo.org/~vapier/dist/pax-utils-${PV}.tar.xz"

>> -SRC_URI[md5sum] = "a580468318f0ff42edf4a8cd314cc942"

>> -SRC_URI[sha256sum] =

>> "7f4a7f8db6b4743adde7582fa48992ad01776796fcde030683732f56221337d9"

>> -

>> -RDEPENDS_${PN} += "bash"

>> -

>> -export GNULIB_OVERRIDES_WINT_T = "0"

>> -

>> -do_configure_prepend() {

>> -    touch ${S}/NEWS ${S}/AUTHORS ${S}/ChangeLog ${S}/README

>> -}

>> -

>> -do_install() {

>> -    oe_runmake PREFIX=${D}${prefix} DESTDIR=${D} install

>> -}

>> -

>> -BBCLASSEXTEND = "native"

>> -

>> -inherit autotools pkgconfig

>> -

>> -PACKAGECONFIG ??= ""

>> -

>> -PACKAGECONFIG[libcap] = "--with-caps, --without-caps, libcap"

>> -PACKAGECONFIG[libseccomp] = "--with-seccomp, --without-seccomp,

>> libseccomp"

>> -PACKAGECONFIG[pyelftools] = "--with-python, --without-python,,

>> pyelftools"

>> -

>> -EXTRA_OECONF += "--enable-largefile"

>> --

>> 2.11.0

>>

>> --

>> _______________________________________________

>> Openembedded-core mailing list

>> Openembedded-core@lists.openembedded.org

>> http://lists.openembedded.org/mailman/listinfo/openembedded-core

>

>

>

> --

> Christopher Larson

> kergoth at gmail dot com

> Founder - BitBake, OpenEmbedded, OpenZaurus

> Senior Software Engineer, Mentor Graphics

-- 
_______________________________________________
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core
Khem Raj July 27, 2018, 5:52 p.m. | #3
On Fri, Jul 27, 2018 at 8:34 AM Ross Burton <ross.burton@intel.com> wrote:

> This was packaged originally to perform QA tests on binaries (text

> relocations

> and RPATHs), but we perform those tests at build-time now.



So how did we replace scanelf functionality
I still think that it is a core tool from hardening point of view

>

>

> Signed-off-by: Ross Burton <ross.burton@intel.com>

> ---

>  meta/recipes-devtools/pax-utils/pax-utils_1.2.2.bb | 36

> ----------------------

>  1 file changed, 36 deletions(-)

>  delete mode 100644 meta/recipes-devtools/pax-utils/pax-utils_1.2.2.bb

>

> diff --git a/meta/recipes-devtools/pax-utils/pax-utils_1.2.2.bb

> b/meta/recipes-devtools/pax-utils/pax-utils_1.2.2.bb

> deleted file mode 100644

> index 9635a5e7082..00000000000

> --- a/meta/recipes-devtools/pax-utils/pax-utils_1.2.2.bb

> +++ /dev/null

> @@ -1,36 +0,0 @@

> -SUMMARY = "Security-focused ELF files checking tool"

> -DESCRIPTION = "This is a small set of various PaX aware and related \

> -utilities for ELF binaries. It can check ELF binary files and running \

> -processes for issues that might be relevant when using ELF binaries \

> -along with PaX, such as non-PIC code or executable stack and heap."

> -HOMEPAGE = "http://www.gentoo.org/proj/en/hardened/pax-utils.xml"

> -LICENSE = "GPLv2+"

> -LIC_FILES_CHKSUM = "file://COPYING;md5=eb723b61539feef013de476e68b5c50a"

> -

> -SRC_URI = "https://dev.gentoo.org/~vapier/dist/pax-utils-${PV}.tar.xz"

> -SRC_URI[md5sum] = "a580468318f0ff42edf4a8cd314cc942"

> -SRC_URI[sha256sum] =

> "7f4a7f8db6b4743adde7582fa48992ad01776796fcde030683732f56221337d9"

> -

> -RDEPENDS_${PN} += "bash"

> -

> -export GNULIB_OVERRIDES_WINT_T = "0"

> -

> -do_configure_prepend() {

> -    touch ${S}/NEWS ${S}/AUTHORS ${S}/ChangeLog ${S}/README

> -}

> -

> -do_install() {

> -    oe_runmake PREFIX=${D}${prefix} DESTDIR=${D} install

> -}

> -

> -BBCLASSEXTEND = "native"

> -

> -inherit autotools pkgconfig

> -

> -PACKAGECONFIG ??= ""

> -

> -PACKAGECONFIG[libcap] = "--with-caps, --without-caps, libcap"

> -PACKAGECONFIG[libseccomp] = "--with-seccomp, --without-seccomp,

> libseccomp"

> -PACKAGECONFIG[pyelftools] = "--with-python, --without-python,, pyelftools"

> -

> -EXTRA_OECONF += "--enable-largefile"

> --

> 2.11.0

>

> --

> _______________________________________________

> Openembedded-core mailing list

> Openembedded-core@lists.openembedded.org

> http://lists.openembedded.org/mailman/listinfo/openembedded-core

>
<div><br></div><div><br><div class="gmail_quote"><div dir="ltr">On Fri, Jul 27, 2018 at 8:34 AM Ross Burton &lt;<a href="mailto:ross.burton@intel.com">ross.burton@intel.com</a>&gt; wrote:<br></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">This was packaged originally to perform QA tests on binaries (text relocations<br>
and RPATHs), but we perform those tests at build-time now.</blockquote><div dir="auto"><br></div><div dir="auto">So how did we replace scanelf functionality </div><div dir="auto">I still think that it is a core tool from hardening point of view </div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><br>
<br>
Signed-off-by: Ross Burton &lt;<a href="mailto:ross.burton@intel.com" target="_blank">ross.burton@intel.com</a>&gt;<br>

---<br>
 meta/recipes-devtools/pax-utils/<a href="http://pax-utils_1.2.2.bb" rel="noreferrer" target="_blank">pax-utils_1.2.2.bb</a> | 36 ----------------------<br>
 1 file changed, 36 deletions(-)<br>
 delete mode 100644 meta/recipes-devtools/pax-utils/<a href="http://pax-utils_1.2.2.bb" rel="noreferrer" target="_blank">pax-utils_1.2.2.bb</a><br>
<br>
diff --git a/meta/recipes-devtools/pax-utils/<a href="http://pax-utils_1.2.2.bb" rel="noreferrer" target="_blank">pax-utils_1.2.2.bb</a> b/meta/recipes-devtools/pax-utils/<a href="http://pax-utils_1.2.2.bb" rel="noreferrer" target="_blank">pax-utils_1.2.2.bb</a><br>
deleted file mode 100644<br>
index 9635a5e7082..00000000000<br>
--- a/meta/recipes-devtools/pax-utils/<a href="http://pax-utils_1.2.2.bb" rel="noreferrer" target="_blank">pax-utils_1.2.2.bb</a><br>
+++ /dev/null<br>
@@ -1,36 +0,0 @@<br>
-SUMMARY = &quot;Security-focused ELF files checking tool&quot;<br>
-DESCRIPTION = &quot;This is a small set of various PaX aware and related \<br>
-utilities for ELF binaries. It can check ELF binary files and running \<br>
-processes for issues that might be relevant when using ELF binaries \<br>
-along with PaX, such as non-PIC code or executable stack and heap.&quot;<br>
-HOMEPAGE = &quot;<a href="http://www.gentoo.org/proj/en/hardened/pax-utils.xml" rel="noreferrer" target="_blank">http://www.gentoo.org/proj/en/hardened/pax-utils.xml</a>&quot;<br>
-LICENSE = &quot;GPLv2+&quot;<br>
-LIC_FILES_CHKSUM = &quot;file://COPYING;md5=eb723b61539feef013de476e68b5c50a&quot;<br>
-<br>
-SRC_URI = &quot;<a href="https://dev.gentoo.org/~vapier/dist/pax-utils-$%7BPV%7D.tar.xz" rel="noreferrer" target="_blank">https://dev.gentoo.org/~vapier/dist/pax-utils-${PV}.tar.xz</a>&quot;<br>
-SRC_URI[md5sum] = &quot;a580468318f0ff42edf4a8cd314cc942&quot;<br>
-SRC_URI[sha256sum] = &quot;7f4a7f8db6b4743adde7582fa48992ad01776796fcde030683732f56221337d9&quot;<br>
-<br>
-RDEPENDS_${PN} += &quot;bash&quot;<br>
-<br>
-export GNULIB_OVERRIDES_WINT_T = &quot;0&quot;<br>
-<br>
-do_configure_prepend() {<br>
-    touch ${S}/NEWS ${S}/AUTHORS ${S}/ChangeLog ${S}/README<br>
-}<br>
-<br>
-do_install() {<br>
-    oe_runmake PREFIX=${D}${prefix} DESTDIR=${D} install<br>
-}<br>
-<br>
-BBCLASSEXTEND = &quot;native&quot;<br>
-<br>
-inherit autotools pkgconfig<br>
-<br>
-PACKAGECONFIG ??= &quot;&quot;<br>
-<br>
-PACKAGECONFIG[libcap] = &quot;--with-caps, --without-caps, libcap&quot;<br>
-PACKAGECONFIG[libseccomp] = &quot;--with-seccomp, --without-seccomp, libseccomp&quot;<br>
-PACKAGECONFIG[pyelftools] = &quot;--with-python, --without-python,, pyelftools&quot;<br>
-<br>
-EXTRA_OECONF += &quot;--enable-largefile&quot;<br>
-- <br>
2.11.0<br>
<br>
-- <br>
_______________________________________________<br>
Openembedded-core mailing list<br>
<a href="mailto:Openembedded-core@lists.openembedded.org" target="_blank">Openembedded-core@lists.openembedded.org</a><br>
<a href="http://lists.openembedded.org/mailman/listinfo/openembedded-core" rel="noreferrer" target="_blank">http://lists.openembedded.org/mailman/listinfo/openembedded-core</a><br>
</blockquote></div></div>
-- 
_______________________________________________
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core
Ross Burton July 27, 2018, 5:58 p.m. | #4
If someone wants to use it, it will be in meta-oe.

Ross

On 27 July 2018 at 18:52, Khem Raj <raj.khem@gmail.com> wrote:
>

>

> On Fri, Jul 27, 2018 at 8:34 AM Ross Burton <ross.burton@intel.com> wrote:

>>

>> This was packaged originally to perform QA tests on binaries (text

>> relocations

>> and RPATHs), but we perform those tests at build-time now.

>

>

> So how did we replace scanelf functionality

> I still think that it is a core tool from hardening point of view

>>

>>

>>

>> Signed-off-by: Ross Burton <ross.burton@intel.com>

>> ---

>>  meta/recipes-devtools/pax-utils/pax-utils_1.2.2.bb | 36

>> ----------------------

>>  1 file changed, 36 deletions(-)

>>  delete mode 100644 meta/recipes-devtools/pax-utils/pax-utils_1.2.2.bb

>>

>> diff --git a/meta/recipes-devtools/pax-utils/pax-utils_1.2.2.bb

>> b/meta/recipes-devtools/pax-utils/pax-utils_1.2.2.bb

>> deleted file mode 100644

>> index 9635a5e7082..00000000000

>> --- a/meta/recipes-devtools/pax-utils/pax-utils_1.2.2.bb

>> +++ /dev/null

>> @@ -1,36 +0,0 @@

>> -SUMMARY = "Security-focused ELF files checking tool"

>> -DESCRIPTION = "This is a small set of various PaX aware and related \

>> -utilities for ELF binaries. It can check ELF binary files and running \

>> -processes for issues that might be relevant when using ELF binaries \

>> -along with PaX, such as non-PIC code or executable stack and heap."

>> -HOMEPAGE = "http://www.gentoo.org/proj/en/hardened/pax-utils.xml"

>> -LICENSE = "GPLv2+"

>> -LIC_FILES_CHKSUM = "file://COPYING;md5=eb723b61539feef013de476e68b5c50a"

>> -

>> -SRC_URI = "https://dev.gentoo.org/~vapier/dist/pax-utils-${PV}.tar.xz"

>> -SRC_URI[md5sum] = "a580468318f0ff42edf4a8cd314cc942"

>> -SRC_URI[sha256sum] =

>> "7f4a7f8db6b4743adde7582fa48992ad01776796fcde030683732f56221337d9"

>> -

>> -RDEPENDS_${PN} += "bash"

>> -

>> -export GNULIB_OVERRIDES_WINT_T = "0"

>> -

>> -do_configure_prepend() {

>> -    touch ${S}/NEWS ${S}/AUTHORS ${S}/ChangeLog ${S}/README

>> -}

>> -

>> -do_install() {

>> -    oe_runmake PREFIX=${D}${prefix} DESTDIR=${D} install

>> -}

>> -

>> -BBCLASSEXTEND = "native"

>> -

>> -inherit autotools pkgconfig

>> -

>> -PACKAGECONFIG ??= ""

>> -

>> -PACKAGECONFIG[libcap] = "--with-caps, --without-caps, libcap"

>> -PACKAGECONFIG[libseccomp] = "--with-seccomp, --without-seccomp,

>> libseccomp"

>> -PACKAGECONFIG[pyelftools] = "--with-python, --without-python,,

>> pyelftools"

>> -

>> -EXTRA_OECONF += "--enable-largefile"

>> --

>> 2.11.0

>>

>> --

>> _______________________________________________

>> Openembedded-core mailing list

>> Openembedded-core@lists.openembedded.org

>> http://lists.openembedded.org/mailman/listinfo/openembedded-core

-- 
_______________________________________________
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core

Patch

diff --git a/meta/recipes-devtools/pax-utils/pax-utils_1.2.2.bb b/meta/recipes-devtools/pax-utils/pax-utils_1.2.2.bb
deleted file mode 100644
index 9635a5e7082..00000000000
--- a/meta/recipes-devtools/pax-utils/pax-utils_1.2.2.bb
+++ /dev/null
@@ -1,36 +0,0 @@ 
-SUMMARY = "Security-focused ELF files checking tool"
-DESCRIPTION = "This is a small set of various PaX aware and related \
-utilities for ELF binaries. It can check ELF binary files and running \
-processes for issues that might be relevant when using ELF binaries \
-along with PaX, such as non-PIC code or executable stack and heap."
-HOMEPAGE = "http://www.gentoo.org/proj/en/hardened/pax-utils.xml"
-LICENSE = "GPLv2+"
-LIC_FILES_CHKSUM = "file://COPYING;md5=eb723b61539feef013de476e68b5c50a"
-
-SRC_URI = "https://dev.gentoo.org/~vapier/dist/pax-utils-${PV}.tar.xz"
-SRC_URI[md5sum] = "a580468318f0ff42edf4a8cd314cc942"
-SRC_URI[sha256sum] = "7f4a7f8db6b4743adde7582fa48992ad01776796fcde030683732f56221337d9"
-
-RDEPENDS_${PN} += "bash"
-
-export GNULIB_OVERRIDES_WINT_T = "0"
-
-do_configure_prepend() {
-    touch ${S}/NEWS ${S}/AUTHORS ${S}/ChangeLog ${S}/README
-}
-
-do_install() {
-    oe_runmake PREFIX=${D}${prefix} DESTDIR=${D} install
-}
-
-BBCLASSEXTEND = "native"
-
-inherit autotools pkgconfig
-
-PACKAGECONFIG ??= ""
-
-PACKAGECONFIG[libcap] = "--with-caps, --without-caps, libcap"
-PACKAGECONFIG[libseccomp] = "--with-seccomp, --without-seccomp, libseccomp"
-PACKAGECONFIG[pyelftools] = "--with-python, --without-python,, pyelftools"
-
-EXTRA_OECONF += "--enable-largefile"