Dab-Rc3-Manifest.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

Dab-Rc3-Manifest.Pdf Printed by dl9pf Jul 24, 17 13:10 changes_chinook_3.0.0_dab_3.99.3.txt Page 1/64 added projects : meta−altera at revision 4364dbfcb600da82ecdfc4797f112d187e40f1c3 meta−boundary at revision d44ee8f58d841cf13fbe63dab271344e2b9ba6db meta−freescale at revision fa774ad7fb797957601a8c9fee45af453fea34b7 meta−freescale−3rdparty at revision 1879485e63ce369292c89b5902ff6df13509090b meta−freescale−distro at revision cd5c7a2539f40004f74126e9fdf08254fd9a6390 meta−renesas−rcar−gen3 at revision 4fa88fc2e452dd1ca5992cb605b3cd1823ee5316 meta−updater at revision 45c155a67d3532ad32342fc512e8bf6341ab9e5d removed projects : meta−amb at revision ef3495bb8d6543709f6d1f7b657cb894d32c1757 meta−fsl−arm at revision e2254e7b2ded0c2b66b1226f879b3a6d52037b2d meta−fsl−arm−extra at revision e95f4ae61fdaf6452d6dfa9cb59dbdf9cdf73c99 meta−rcar at revision e15ae276da312d71e016e2b30d2414b4c02ecbf8 changed projects : meta−agl changed from fb57dd647f577b5df40380c6f3996443bbe0cf8b to refs/tags/dab/3.99.3 [−] fb57dd6 Apply bluetooth/smack patches also to rpi kernel [−] 5dbfea7 dra7xx−evm: Fix issue with bluetooth pairing [−] fc9db17 Add entry for official pi touchscreen over DSI port [−] b674ca4 Ensure the codename is in OVERRIDES [−] 5c82102 meta−oic: Hotfix to support aarch64 for DragonBoard−410c [−] 0723edd linux−raspberrypi: add ENABLE_CMA options to kernel command line [−] 0a42053 50_local.conf.inc: Enable CMA within the raspberrypi3 template [−] 7b1d649 rpi−config: add configurable CMA low and high water marks [−] d81c329 Set defaultbranch to chinook in gitreview [+] 4307ed5 Update poky−agl.conf for 3.99.3 [+] c98f908 tests: templates/qemux86−64: KVM updates [+] 2acf164 Only apply CVE−2017−1000364 to 4.8 kernel − 4.4 needs different patchset [+] 29f14a1 Fix: can−bus not applied at kernel configuration [+] ef59830 tests: templates/qemux86−64: enable QEMU audio driver [+] 86c6c25 image−vm: Allow for xz compressed vmdk images [+] 726da22 meta−agl−bsp/meta−intel: make new 4.8 .bbappend [+] d630d90 tests: templates/qemux86−64: add MACHINE name to rootfs filename [+] 8146379 tests: templates/qemux86−64: add (empty) DTB [+] fa250dc qemux86−64: root using root=PARTUUID [+] 2516499 Add low−level−can−generator as devtool in SDK [+] 590eb98 agl−devel: auto−add drivers for vmdk images [+] e3f0129 qemux86−64: add hwtest environment [+] 04b54de af−main: add RDEPENDS on bash [+] 8b23708 Update freescale layer names, add nitrogen inc file [+] 59bdc8c backport open−vm−tools recipe [+] 944d506 Possibility to copy wgt without installing them [+] 351cd31 Fix weston failed [+] dbaf564 systemd: remove timesystemd feature [+] f98e42d systemd−udev: ensure convention for naming udev rules [+] 8f792e4 af−binder: Fix const issue in afb−auth.h [+] e6aef67 netboot: fix dependency loop for qemu build [+] 2dcf3bb test templates: m3ulcb−nogfx: use core−image−minimal [+] 0de328c Add ath9k_htc driver to rcar−gen3 for demos [+] b439a3d Integration of low−level−can−service apps [+] 6cbdc4b Fix i.MX6 (usb) [+] 78db756 Disable rpi3 tests as they are broken right now with the kernel Image [+] ad07b43 Upgrade framework and binder [+] ed6c7b9 Add systemd synchronization script [+] c80a038 af−main: Allow service to run by default [+] 8163781 Handle error during run−agl−postinsts [+] b2f32e7 Executing /bin/bash explicitly [+] 97d5e55 framework: update DAB for RC3 [+] f53472b af−main: make sockets.target accessible by group [+] 52bba29 Framework: Leverage agl−devel and set PV [+] 8ef673e Add gst−record argument to weston option [+] 0c48402 Fix for image format dependencies during parsing [+] 04001fc Fix i.MX6 [+] 99e6be9 m3ulcb−nogfx: add test templates for LAVA job and environment [+] c42f34f af−binder: Fix error report (really) [+] 1a1cae6 db410c kernel fixed CVE−2017−1000364 upstream thus remove our patches [+] c8d6044 weston−init: set udev rule to display group for gst−record feature. [+] ed8a31d raspberrypi3−64: test: add LAVA env and job template [+] 74d0ccd Fix rpi−sdimg after IMAGE_FSTYPE being enforced in poky−agl.conf [+] af694da Enable OTA updates using inc from meta−updater [+] 377b4d8 Fix for CVE−2017−1000366 in glibc [+] 17fb0f4 Backport fix for CVE−2017−1000364 to linux−yocto−4.8 [+] 79c117d Fix CVE−2017−1000364 by backporting the patches for gen3 [+] 4220a13 Fix CVE−2017−1000364 for dragonboard−410c by backporting the patches from upstream kernel v4.9 [+] e542468 Fix CVE−2017−1000364 by backporting the patches for rpi3 [+] 50e1176 afw: Fix error report [+] a7bbf55 af−main: moves reload of service [+] 0dca647 Enforce same IMAGE_FSTYPES across all boards for AGL [+] 60709af Add CAN drivers by default to AGL boards [+] 82b5fcf af−main: report error status in afm−install [+] 091ef1a Bump DISTRO_VERSION for DD rc2 [+] 7d2b5bd Add .gitreview for dab [+] 31deb53 af−main: ensure socket activation [+] 65f8170 af−main: Fix service and their socket activation [+] e46f5db agl_raspberrypi*.inc: Set KERNEL_IMAGETYPE to Image [+] 2116982 meta−agl−netboot: increase IMAGE_ROOTFS_EXTRA_SPACE [+] a2953a1 support MACHINE=raspberrypi3−64 [+] 838146c Remove sdcard_image−rpi−gdp.bbclass [+] 077caaf Add hibernation image area [+] 8ae8c01 Set idle−time to 0 in weston.service. [+] 95b850f systemd: remove automounting [+] 4c8a4dd lightmediascanner: change scan path [+] f34a027 raspberrypi2: change GPU_MEM to 255 [+] 11a6af7 Add hibernation image area [+] 4b93238 Framework: fix and upgrade [+] f500359 README.renesas−gen3: add uboot env to setup ethernet [+] 8fd7f86 Fix for memory corruption during hibernate [+] 4af95fe Enable SOTA for supported architectures [+] 15b3dd2 enabling https for wget in busybox [+] 0412024 Framework: Fix and upgrade [+] 72e4d6c tcf−agent: kill with USR2 in systemd stop Monday July 24, 2017 1/64 Printed by dl9pf Jul 24, 17 13:10 changes_chinook_3.0.0_dab_3.99.3.txt Page 2/64 [+] 0ea9f9f agl−login−manager,agl−desktop−config: Move layer to meta−agl [+] 5a63eef Add support for cflags for pi0/1 [+] ab98f7c rygel: disable user systemd service [+] 0b8a33d libmicrohttp: update to version 0.9.55 [+] cb0de9c lightmediascanner: remove udev workaround [+] 79fe06d Add override for DISTRO_CODENAME [+] 3bc8101 Add u−boot Hibernation code for porter board. [+] a14e289 Add kernel Hibernation code for porter board. [+] 5b5a54b Add s3ctl Hibernation code for porter board. [+] 65abb1f Add gles Hibernation code for porter board. [+] 77e55a2 agl−image−weston: fix weston regression [+] 509048c pulseaudio: fix service/socket unit installation [+] 7657ce6 Security−manager: update of global user name [+] 74973b9 A fix is in upstream now. The mirror @ sources.openembedded.org was checked and has a copy of the ta rball. [+] e68fd87 Add hotfix for sg3−utils SRC_URI not available [+] 9883a20 Add support H.264 Encoder proprietary Library for R−Car Gen3 [+] 310012e Bump version for DARING DAB rc1 [+] f40999a appfw:fix dep in af−binder−dev on af−binder−tools [+] 43aaed6 run−agl−postinsts: run before systemd−user−sessions [+] 4bb0f58 Fix typo in cyclone5 configuration template [+] e8054e0 pulseaudio: enable ofono hfp backend [+] 8f73d08 meta−rcar−3 setup: Improve error message [+] 4b9d3c5 Update Renesas gen3 setup script for BSP 2.19. [+] 8ec229f Allows specific features for agl−devel [+] b9bd517 lightmediascanner: add −D_FILE_OFFSET_BITS=64 to CFLAGS [+] 3564e1d Make /usr/local compatible with SOTA [+] 99a568b agl−audio−plugin: Fix Pulseaudio version [+] efbf8d9 af−binder: changes the packaging [+] f2cbb76 dragonboard−410c: install 96boards−tools for resizing partition [+] 6ca247d Run weston with dedicated ’display’ user and group [+] 7c227f3 Fix build of mozjs, gpm and libatasmart due to SECURITY_%FLAGS [+] a569352 Add machine templates for the beaglebone [+] a54f7f5 libmicrohttpd: upgrade to 0.9.54 [+] 0c195f1 linux−renesas: Applies Smack patch for bluetooth [+] 4755ea3 Fix Readme.weston−ini−conf Readme [+] 744f963 Upgrade af−binder [+] 272689b web−runtime: add missing runtime dependencies [+] 379f0a1 dra7xx: Fix build error with mozjs and libatasmart [+] bccdc57 x86_64−tune: fix KVM qemu options [+] 35e565f Switch to medium compiler [+] e8aff1a Enforce unified tunings across all target boards of AGL [+] 1f42bdf sdcard: rpi−sdimg: fix mcopy issue with boot.scr [+] 68386e6 raspberrypi3: change GPU_MEM to 255 [+] a1c76d6 Enable lava test−run on vayu board [+] ea0a1f9 agl−postints: remove unneeded Glob [+] 71d255f Enable test−run on porterboard [+] d9a02b9 Remove sota−related includes from meta−agl−bsp [+] ae8716e Remove sota from agl−ci−change−features [+] bc5c606 Enforce uImage as KERNEL_IMAGETYPE for rpi [+] 349a5fe meta−agl−bsp/meta−raspberrypi: Upgrade to v12.0.3 [+] 5450a1b change default screen transform to 270 [+] deec51b rtl−sdr: remove −I/usr/include from pkg−config [+] 50e118a dragonboard−410c: linux: update to kernel 4.9 [+] 3759dc5 Change require to include to unbreak builds without ag−sota feature [+] cfdfe1d Temporary fix for the agl−sota feature [+] c46e117 poky−agl: exempt qtwebengine from security flags [+] 8807f8e Switch to meta−updater [+] 61bf680 Revert "Switch to meta−updater" − waiting for main commit to be updated. [+] 521815f Switch to meta−updater [+] 2058488 lightmediascanner: delete the remove rule [+] 5c71ba5 bluez5: add interface access for MediaPlayer application [+] 11d1133 meta−agl−bsp/meta−qcom: Fix kernel config fragment about smack [+] 055289b systemd: rename udev rule to conform with convention [+] 0e42453 af−main: Improve environment setting [+] dc2cbc9 meta−agl−bsp/meta−ti: Fix kernel config fragment about smack [+] 683e2f5 lightmediascanner: rename udev rule to conform with
Recommended publications
  • Tizen IVI “From Scratch” Customizing, Building and Testing
    Tizen IVI “from scratch” Customizing, building and testing Stéphane Desneux Senior Software Engineer Eurogiciel <[email protected]> Eurogiciel ● Open source development and integration: ● Maintainers in multiple domains on tizen.org ● Embedded systems for real-time multimedia: ▪ Widi/Miracast stack ▪ Wayland/Weston ▪ Webkit2 browser with HW acceleration ● Applications: HTML5/CSS3, jquery, jqmobi, Cordova ● Location : Vannes (Brittany), France 14 2 FOSDEM' Automotive devroom – Tizen “from scratch” : customize, build, test ! Agenda ● Tizen & Tizen:IVI : short introduction ● From source code to target devices ● Customize ● Build ● Flash, Run, Test ! 14 3 FOSDEM' Automotive devroom – Tizen “from scratch” : customize, build, test ! Tizen: a short introduction Definition ● Open source project ● Hosted at the Linux Foundation ● Innovative Web-based platform for multiple devices ● Sponsored by worldwide companies ● Samsung & Intel are two big contributors ● Built on industry standards: ● GNU/Linux kernel, GNU libc ● POSIX ● W3C ● Many upstream Open Source projects 14 5 FOSDEM' Automotive devroom – Tizen “from scratch” : customize, build, test ! Tizen Profiles ● Multiple vertical profiles (derived from Tizen:Generic) ● IVI ● Mobile ● Future: other devices (TV, ...) ● Each profile adds its own enhancements ● Tizen packaging format: RPM 14 6 FOSDEM' Automotive devroom – Tizen “from scratch” : customize, build, test ! From source code … … to target devices 1: Source code GIT Repositories Remote Local Clone source repo Developers
    [Show full text]
  • Next Generation Web Scanning Presentation
    Next generation web scanning New Zealand: A case study First presented at KIWICON III 2009 By Andrew Horton aka urbanadventurer NZ Web Recon Goal: To scan all of New Zealand's web-space to see what's there. Requirements: – Targets – Scanning – Analysis Sounds easy, right? urbanadventurer (Andrew Horton) www.morningstarsecurity.com Targets urbanadventurer (Andrew Horton) www.morningstarsecurity.com Targets What does 'NZ web-space' mean? It could mean: •Geographically within NZ regardless of the TLD •The .nz TLD hosted anywhere •All of the above For this scan it means, IPs geographically within NZ urbanadventurer (Andrew Horton) www.morningstarsecurity.com Finding Targets We need creative methods to find targets urbanadventurer (Andrew Horton) www.morningstarsecurity.com DNS Zone Transfer urbanadventurer (Andrew Horton) www.morningstarsecurity.com Find IP addresses on IRC and by resolving lots of NZ websites 58.*.*.* 60.*.*.* 65.*.*.* 91.*.*.* 110.*.*.* 111.*.*.* 113.*.*.* 114.*.*.* 115.*.*.* 116.*.*.* 117.*.*.* 118.*.*.* 119.*.*.* 120.*.*.* 121.*.*.* 122.*.*.* 123.*.*.* 124.*.*.* 125.*.*.* 130.*.*.* 131.*.*.* 132.*.*.* 138.*.*.* 139.*.*.* 143.*.*.* 144.*.*.* 146.*.*.* 150.*.*.* 153.*.*.* 156.*.*.* 161.*.*.* 162.*.*.* 163.*.*.* 165.*.*.* 166.*.*.* 167.*.*.* 192.*.*.* 198.*.*.* 202.*.*.* 203.*.*.* 210.*.*.* 218.*.*.* 219.*.*.* 222.*.*.* 729,580,500 IPs. More than we want to try. urbanadventurer (Andrew Horton) www.morningstarsecurity.com IP address blocks in the IANA IPv4 Address Space Registry Prefix Designation Date Whois Status [1] -----
    [Show full text]
  • Environmental Protection Commission[567]
    IAC 5/19/21 Environmental Protection[567] Analysis, p.1 ENVIRONMENTAL PROTECTION COMMISSION[567] Former Water, Air and Waste Management[900], renamed by 1986 Iowa Acts, chapter 1245, Environmental Protection Commission under the “umbrella” of the Department of Natural Resources. TITLE I GENERAL CHAPTER 1 OPERATION OF ENVIRONMENTAL PROTECTION COMMISSION 1.1(17A,455A) Scope 1.2(17A,455A) Time of meetings 1.3(17A,455A) Place of meetings 1.4(17A,455A) Notification of meetings 1.5(17A,455A) Attendance and participation by the public 1.6(17A,455A) Quorum and voting requirements 1.7(17A,455A) Conduct of meeting 1.8(17A,455A) Minutes, transcripts, and recordings of meetings 1.9(17A,455A) Officers and duties 1.10(17A,455A) Election and succession of officers 1.11(68B) Sales of goods and services CHAPTER 2 PUBLIC RECORDS AND FAIR INFORMATION PRACTICES (Uniform Rules) 2.1(17A,22) Adoption by reference CHAPTER 3 SUBMISSION OF INFORMATION AND COMPLAINTS—INVESTIGATIONS 3.1(17A,455B) Adoption by reference CHAPTER 4 AGENCY PROCEDURE FOR RULE MAKING 4.1(17A) Adoption by reference CHAPTER 5 PETITIONS FOR RULE MAKING 5.1(17A) Adoption by reference CHAPTER 6 DECLARATORY ORDERS 6.1(17A) Adoption by reference CHAPTER 7 RULES OF PRACTICE IN CONTESTED CASES 7.1(17A) Adoption by reference CHAPTER 8 CONTRACTS FOR PUBLIC IMPROVEMENTS AND PROFESSIONAL SERVICES 8.1(17A) Adoption by reference CHAPTER 9 DELEGATION OF CONSTRUCTION PERMITTING AUTHORITY 9.1(455B) Scope 9.2(455B,17A) Forms 9.3(455B) Procedures 9.4(455B) Criteria for permitting authority at local public
    [Show full text]
  • Long Comment Regarding a Proposed Exemption Under 17 U.S.C. 1201 for Software Freedom Conservancy Proposed Class: 20 – Smart T
    Long Comment Regarding a Proposed Exemption Under 17 U.S.C. 1201 For Software Freedom Conservancy Proposed Class: 20 – Smart TVs No multimedia evidence is being provided in connection with this comment Item 1. Commenter Information The Petition submitter is Software Freedom Conservancy (“Conservancy”), a 501(c)(3) not-for-profit organization that helps promote, improve, develop, and defend Free, Libre, and Open Source Software (“FLOSS”)—software developed by volunteer communities and licensed for the benefit of everyone. Conservancy is the nonprofit home for dozens of FLOSS projects representing well over a thousand volunteer contributors. Conservancy's communities maintain some of the most fundamental utilities in computing today, and introduce innovations that will shape how software will be created in the future. Among the projects for which Conservancy provides logistical, administrative, and legal support are BusyBox and Samba, both of which are commonly installed on “smart” or computer- embedded consumer electronics devices. BusyBox provides a number of key system utilities that enable such devices to run applications, interact with files, access network services, and more.1 It is also used by community projects focused on unlocking and improving Samsung-2 and LG- manufactured Smart TVs.3 Samba permits devices to interact with files stored on other networked devices.4 Conservancy also represents the interests of several contributors to the Linux kernel, the core component of the operating system of most Smart TVs. Conservancy may be contacted through its authorized representatives and pro bono counsel at Tor Ekeland, P.C., 195 Plymouth Street, Brooklyn, New York 11201: Aaron Williamson Frederic Jennings (718) 285-9349 (718) 514-2075 [email protected] [email protected] Item 2.
    [Show full text]
  • Tizen Based Remote Controller CAR Using Raspberry Pi2
    #ELC2016 Tizen based remote controller CAR using raspberry pi2 Pintu Kumar ([email protected], [email protected]) Samsung Research India – Bangalore : Tizen Kernel/BSP Team Embedded Linux Conference – 06th April/2016 1 CONTENT #ELC2016 • INTRODUCTION • RASPBERRY PI2 OVERVIEW • TIZEN OVERVIEW • HARDWARE & SOFTWARE REQUIREMENTS • SOFTWARE CUSTOMIZATION • SOFTWARE SETUP & INTERFACING • HARDWARE INTERFACING & CONNECTIONS • ROBOT CONTROL MECHANISM • SOME RESULTS • CONCLUSION • REFERENCES Embedded Linux Conference – 06th April/2016 2 INTRODUCTION #ELC2016 • This talk is about designing a remote controller robot (toy car) using the raspberry pi2 hardware, pi2 Linux Kernel and Tizen OS as platform. • In this presentation, first we will see how to replace and boot Tizen OS on Raspberry Pi using the pre-built Tizen images. Then we will see how to setup Bluetooth, Wi-Fi on Tizen and finally see how to control a robot remotely using Tizen smart phone application. Embedded Linux Conference – 06th April/2016 3 RASPBERRY PI2 - OVERVIEW #ELC2016 1 GB RAM Embedded Linux Conference – 06th April/2016 4 Raspberry PI2 Features #ELC2016 • Broadcom BCM2836 900MHz Quad Core ARM Cortex-A7 CPU • 1GB RAM • 4 USB ports • 40 GPIO pins • Full HDMI port • Ethernet port • Combined 3.5mm audio jack and composite video • Camera interface (CSI) • Display interface (DSI) • Micro SD card slot • Video Core IV 3D graphics core Embedded Linux Conference – 06th April/2016 5 PI2 GPIO Pins #ELC2016 Embedded Linux Conference – 06th April/2016 6 TIZEN OVERVIEW #ELC2016 Embedded Linux Conference – 06th April/2016 7 TIZEN Profiles #ELC2016 Mobile Wearable IVI TV TIZEN Camera PC/Tablet Printer Common Next?? • TIZEN is the OS of everything.
    [Show full text]
  • Hardening Linux Processes Extending Grsecurity to Integrate System Call Filters and Namespaces
    Universidad de Los Andes Tesis de Maestr´ıa Hardening Linux Processes Extending Grsecurity to Integrate System Call Filters and Namespaces David Derby Cardona Facultad de Ingenier´ıa Departamento de Ingenier´ıade Sistemas y Computaci´on June 2016 Universidad de Los Andes Tesis de Maestr´ıa Hardening Linux Processes Extending Grsecurity to Integrate System Call Filters and Namespaces David Derby Cardona Asesor: Sandra Rueda Rodr´ıguez Jurados: Rafael G´omezD´ıaz Fabian Molina Molina Facultad de Ingenier´ıa Departamento de Ingenier´ıade Sistemas y Computaci´on June 2016 Abstract The area of Linux sandboxing has seen various developments in recent years with the intro- duction of operating system containers and the ever present need to harden the security of applications. Two of the more prominent technologies that have been used when creating sandboxes are namespaces and system call filters. Whilst these technologies have been ef- fective for creating sandboxes, they are limited in that they require a developer to integrate them into their software. This work proposes to use these two technologies to enforce the Principle of Least Privilege on every process on a system. The solution extends a grsecurity hardened Linux kernel and allows the user to define security policies for each process which permit them to behave as intended. The presented results demonstrate the effectiveness of the extended Linux kernel and its impact on performance. The results provide a basis that may be built upon to deliver a comprehensive solution that would be appealing for use in real world environments. 1 Contents Abstract 1 Index of Figures 4 Index of Tables 5 1 Introduction 1 2 Context and Problem Description 3 2.1 Linux .
    [Show full text]
  • Unbreakable Enterprise Kernel Release Notes for Unbreakable Enterprise Kernel Release 3
    Unbreakable Enterprise Kernel Release Notes for Unbreakable Enterprise Kernel Release 3 E48380-10 June 2020 Oracle Legal Notices Copyright © 2013, 2020, Oracle and/or its affiliates. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs) and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government end users are "commercial computer software" or "commercial computer software documentation" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, reproduction, duplication, release, display, disclosure, modification, preparation of derivative works, and/or adaptation of i) Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs), ii) Oracle computer documentation and/or iii) other Oracle data, is subject to the rights and limitations specified in the license contained in the applicable contract.
    [Show full text]
  • About Security Solutions in Fog Computing
    “Ovidius” University Annals, Economic Sciences Series Volume XVI, Issue 1/2016 About Security Solutions in Fog Computing Eugen Petac Faculty of Mathematics and Computer Science “Ovidius” University of Constanța, Romania [email protected] Andreea-Oana Petac Faculty of Mathematics and Computer Science “Ovidius” University of Constanța, Romania [email protected] Abstract The key for improving a system's performance, its security and reliability is to have the data processed locally in remote data centers. Fog computing extends cloud computing through its services to devices and users at the edge of the network. Through this paper it is explored the fog computing environment. Security issues in this area are also described. Fog computing provides the improved quality of services to the user by complementing shortages of cloud in IoT (Internet of Things) environment. Our proposal, named Adaptive Fog Computing Node Security Profile (AFCNSP), which is based security Linux solutions, will get an improved security of fog node with rich feature sets. Key words: Fog Computing, IoT, Fog Computing Security J.E.L. classification: L8, M1, M3 1. Introduction Fog computing is a modern computing paradigm, representing distributed computing services, applications, access to pieces of information and various storage data, the user not needing to know the physical configurations for the systems that provide these services. This new technology is based on the tendency of cutting out the costs of the delivery services and increasing the dexterity of the deployment of the services. Utilizing this distributed computing concept, the services can be hosted at end devices (e.g. access points), creating an automated response that drives the value.
    [Show full text]
  • Linux, Yocto and Fpgas
    Embedded Open Source Experts Linux, Yocto and FPGAs Integrating Linux and Yocto builds into different SoCs From a Linux software perspective: ➤ Increased demand for Linux on FPGAs ➤ Many things to mange, both technical and practical ➤ FPGAs with integrated CPU cores – very similar many other SoCs Here are some experiences and observations... © Codiax 2019 ● Page 2 Why use Linux? ➤ De-facto standard ➤ Huge HW support ➤ FOSS ➤ Flexible ➤ Adaptable ➤ Stable ➤ Scalable ➤ Royalty free ➤ Vendor independent ➤ Large community ➤ Long lifetime Why not Linux? ➤ Too big ➤ Real-time requirements ➤ Certification ➤ Boot time ➤ Licensing ➤ Too open? Desktop Shells: Desktop Display server: Display BrailleDisplay Touch-Screen Mouse & Keyboard Wayland Compositor Wayland + development tools = a lot code!of source Linux system example weston, clayton,mutter,KWin evdev libinput GNOME Shell D radeon nouveau lima etna_viv freedreno tegra-re lima nouveau radeon freedreno etna_viv e libwayland-server libwayland-server s Cinnamon k t o kms p Linux kernel, Linux kernel, Plasma 2 w i (Kernel Mode Setting) Mode (Kernel d g Cairo-Dock e t s drm (Direct Rendering Manager) Rendering (Direct drm cache coherent L2-Caches L2-Caches cache coherent CPU &GPU Enlight. DR19 System libraries: System oflibraries): form (in the Toolkits Interface User µClibc Pango glibc glibc main memory possibly adaptations to Wayland/Mir libwayland / COGL libwayland Cairo Cairo (Xr) GTK+ Clutter 2D Application 2D GModule GThread GThread GLib GObject Glib GIO ATK devicedrivers other& modules System
    [Show full text]
  • Daemon Management Under Systemd ZBIGNIEWSYSADMIN JĘDRZEJEWSKI-SZMEK and JÓHANN B
    Daemon Management Under Systemd ZBIGNIEWSYSADMIN JĘDRZEJEWSKI-SZMEK AND JÓHANN B. GUÐMUNDSSON Zbigniew Jędrzejewski-Szmek he systemd project is the basic user-space building block used to works in a mixed experimental- construct a modern Linux OS. The main daemon, systemd, is the first computational neuroscience lab process started by the kernel, and it brings up the system and acts as and writes stochastic simulators T and programs for the analysis a service manager. This article shows how to start a daemon under systemd, of experimental data. In his free time he works describes the supervision and management capabilities that systemd pro- on systemd and the Fedora Linux distribution. vides, and shows how they can be applied to turn a simple application into [email protected] a robust and secure daemon. It is a common misconception that systemd is somehow limited to desktop distributions. This is hardly true; similarly to Jóhann B. Guðmundsson, the Linux kernel, systemd supports and is used on servers and desktops, but Penguin Farmer, IT Fireman, Archer, Enduro Rider, Viking- it is also in the cloud and extends all the way down to embedded devices. In Reenactor, and general general it tries to be as portable as the kernel. It is now the default on new insignificant being in an installations in Debian, Ubuntu, Fedora/RHEL/CentOS, OpenSUSE/SUSE, insignificant world, living in the middle of the Arch, Tizen, and various derivatives. North Atlantic on an erupting rock on top of the world who has done a thing or two in Systemd refers both to the system manager and to the project as a whole.
    [Show full text]
  • Comparison of Web Server Software from Wikipedia, the Free Encyclopedia
    Create account Log in Article Talk Read Edit ViewM ohrisetory Search Comparison of web server software From Wikipedia, the free encyclopedia Main page This article is a comparison of web server software. Contents Featured content Contents [hide] Current events 1 Overview Random article 2 Features Donate to Wikipedia 3 Operating system support Wikimedia Shop 4 See also Interaction 5 References Help 6 External links About Wikipedia Community portal Recent changes Overview [edit] Contact page Tools Server Developed by Software license Last stable version Latest release date What links here AOLserver NaviSoft Mozilla 4.5.2 2012-09-19 Related changes Apache HTTP Server Apache Software Foundation Apache 2.4.10 2014-07-21 Upload file Special pages Apache Tomcat Apache Software Foundation Apache 7.0.53 2014-03-30 Permanent link Boa Paul Phillips GPL 0.94.13 2002-07-30 Page information Caudium The Caudium Group GPL 1.4.18 2012-02-24 Wikidata item Cite this page Cherokee HTTP Server Álvaro López Ortega GPL 1.2.103 2013-04-21 Hiawatha HTTP Server Hugo Leisink GPLv2 9.6 2014-06-01 Print/export Create a book HFS Rejetto GPL 2.2f 2009-02-17 Download as PDF IBM HTTP Server IBM Non-free proprietary 8.5.5 2013-06-14 Printable version Internet Information Services Microsoft Non-free proprietary 8.5 2013-09-09 Languages Jetty Eclipse Foundation Apache 9.1.4 2014-04-01 Čeština Jexus Bing Liu Non-free proprietary 5.5.2 2014-04-27 Galego Nederlands lighttpd Jan Kneschke (Incremental) BSD variant 1.4.35 2014-03-12 Português LiteSpeed Web Server LiteSpeed Technologies Non-free proprietary 4.2.3 2013-05-22 Русский Mongoose Cesanta Software GPLv2 / commercial 5.5 2014-10-28 中文 Edit links Monkey HTTP Server Monkey Software LGPLv2 1.5.1 2014-06-10 NaviServer Various Mozilla 1.1 4.99.6 2014-06-29 NCSA HTTPd Robert McCool Non-free proprietary 1.5.2a 1996 Nginx NGINX, Inc.
    [Show full text]
  • Smack Labeled
    SP Project 2 Basic SMACK features 1 Tizen project flow Tizen dev. environment Project 0 build Tizen Porting to Odroid-U3 Tizen application Project 2 development Basic SMACK Project 1 features Tizen web application Tizen development security Project 3 : SMACK SMACK security rule modify Tizen platform Project 4 development New SMACK rules Linux kernel development 2 Tizen Security Model . Non-root applications • All applications run under same non-root user ID . Application sandboxing • All applications are sandboxed by Smack . Resource access control • Important system objects are Smack labeled . Least privilege • All applications will have manifest file describing permissions 3 Tizen Security Model . Mandatory access control powered by Smack • Each application is Smack labeled and has proper Smack rules − Assigned and maintained by manifest file from each package • Application based sandboxing − Each application is able to write to home directory only . SMACK (Simple Mandatory Access Control Kernel) • Upstream Linux Security Module • Simple {subject, object, permission} access control model 4 SMACK . Units SMACK • Subject, Object, Access permission • Subject: processes • Object: processes, files . Rules SMACK • SMACK rule files in /opt/etc/smack/ • Rule format (subject) (object) (access permission) When (subject) accesses (object), access between them follows (access permission) E.g.: When (process) accesses (file), read only is permitted reference site #1 reference site #2 5 SMACK Application Web Application Native Application Web Framework
    [Show full text]