public inbox for cip-dev@lists.cip-project.org
 help / color / mirror / Atom feed
From: Jan Kiszka <jan.kiszka@siemens.com>
To: Kamlesh Gurudasani <kamlesh@ti.com>,
	dinesh.kumar@toshiba-tsip.com, cip-dev@lists.cip-project.org,
	pavel@denx.de, Quirin Gylstorff <quirin.gylstorff@siemens.com>
Subject: Re: [PATCH isar-cip-core v2] *: Add SPDX-License-Identifier MIT header
Date: Thu, 26 Mar 2026 16:10:25 +0100	[thread overview]
Message-ID: <93a682d4-ce36-4ec2-b35e-dd5e42aef1a3@siemens.com> (raw)
In-Reply-To: <cf8bf9cd-bb30-40eb-ac4d-2a3b27dc31d6@siemens.com>

On 26.03.26 13:05, Jan Kiszka wrote:
> On 24.03.26 15:39, Jan Kiszka wrote:
>> On 24.03.26 09:40, Kamlesh Gurudasani wrote:
>>> Add missing license headers to configuration, template, script,
>>> and wic partition layout files to make licensing consistent
>>> across the repository.
>>>
>>> Command Used:
>>> git ls-files | xargs grep -rL SPDX-License-Identifier
>>>
>>> Signed-off-by: Kamlesh Gurudasani <kamlesh@ti.com>
>>> ---
>>> Changes in v2:
>>> - added license to remaining files
>>> - Link to v1: https://lore.kernel.org/r/20260316-license-v1-1-5bb039f50c05@ti.com
>>> ---
>>>  conf/distro/debian-bullseye-backports.list                                       | 3 +++
>>>  conf/distro/debian-buster-backports.list                                         | 3 +++
>>>  conf/distro/preferences.ovmf-snakeoil.conf                                       | 3 +++
>>>  conf/distro/preferences.swupdate-bullseye-backports.conf                         | 3 +++
>>>  recipes-bsp/u-boot/files/ftpm-stmm.cfg                                           | 3 +++
>>>  recipes-bsp/u-boot/files/no-grub-workaround.cfg                                  | 3 +++
>>>  recipes-bsp/u-boot/files/qemu-extra.cfg                                          | 3 +++
>>>  recipes-bsp/u-boot/files/secure-boot.cfg                                         | 3 +++
>>>  recipes-bsp/u-boot/files/ti-extra.cfg                                            | 3 +++
>>>  recipes-core/customizations/files/99-silent-printk.conf                          | 3 +++
>>>  recipes-core/customizations/files/99-watchdog.conf                               | 3 +++
>>>  recipes-core/customizations/files/ssh-permit-root.conf                           | 3 +++
>>>  recipes-core/home-fs/files/home.mount                                            | 3 +++
>>>  recipes-core/home-fs/files/postinst                                              | 3 +++
>>>  recipes-core/immutable-rootfs/files/95-disable-package-updates.preset            | 3 +++
>>>  recipes-core/immutable-rootfs/files/immutable-rootfs.tmpfiles.tmpl               | 3 +++
>>>  recipes-core/immutable-rootfs/files/postinst                                     | 3 +++
>>>  recipes-core/journald-config/files/persistent-journal.conf                       | 3 +++
>>>  recipes-core/kernel-panic/files/sysrq-panic.service                              | 3 +++
>>>  recipes-core/ltp/files/debian/control.tmpl                                       | 3 +++
>>>  recipes-core/ltp/files/debian/rules                                              | 3 +++
>>>  recipes-core/move-homedir-var/files/move-homedir-var.tmpfiles.tmpl               | 3 +++
>>>  recipes-core/security-customizations/files/postinst                              | 2 ++
>>>  recipes-core/security-customizations/files/ssh-pam-remote.conf                   | 3 +++
>>>  recipes-core/security-customizations/files/ssh-remote-session-term.conf          | 3 +++
>>>  recipes-core/swupdate-config-wfx/files/suricatta_wfx.conf.tmpl                   | 3 +++
>>>  recipes-core/swupdate-config/files/hwrevision.tmpl                               | 3 +++
>>>  recipes-core/swupdate-config/files/swupdate.cfg                                  | 3 +++
>>>  recipes-core/swupdate-handler-roundrobin/files/swupdate.handler.efibootguard.ini | 3 +++
>>>  recipes-core/tmp-fs/files/postinst                                               | 3 +++
>>>  recipes-devtools/swupdate-signer/files/sign-swu-cms                              | 3 +++
>>>  recipes-initramfs/initramfs-crypt-hook/files/encrypt_partition.env.tmpl          | 3 +++
>>>  recipes-initramfs/initramfs-crypt-hook/files/pwquality.conf                      | 3 +++
>>>  recipes-initramfs/initramfs-factory-reset-hook/files/factory-reset-script.tmpl   | 2 ++
>>>  recipes-initramfs/initramfs-factory-reset-hook/files/reset-env.tmpl              | 3 +++
>>>  recipes-initramfs/initramfs-overlay-hook/files/local-bottom.tmpl                 | 2 ++
>>>  recipes-initramfs/initramfs-overlay-hook/files/overlay_recovery_action.script    | 2 ++
>>>  recipes-kernel/linux/files/no-module-signing.cfg                                 | 3 +++
>>>  recipes-kernel/linux/files/no-tpm-hwrng.cfg                                      | 3 +++
>>>  recipes-kernel/linux/files/preempt-rt.cfg                                        | 3 +++
>>>  recipes-security/fail2ban-config/files/systemd-defaults.conf                     | 3 +++
>>>  scripts/deploy-cip-core.sh                                                       | 3 +++
>>>  scripts/generate-sb-db-from-existing-certificate.sh                              | 3 +++
>>>  scripts/generate_secure_boot_keys.sh                                             | 3 +++
>>>  scripts/start-efishell.sh                                                        | 3 +++
>>>  scripts/submit_lava.sh                                                           | 3 +++
>>>  scripts/update-linux-cip.sh                                                      | 3 +++
>>>  scripts/update-ltp.sh                                                            | 3 +++
>>>  tests/templates/IEC_template.yml                                                 | 3 +++
>>>  tests/templates/secureboot_corrupt_rootfs_steps.yml                              | 3 +++
>>>  tests/templates/secureboot_negative_test.yml                                     | 3 +++
>>>  tests/templates/secureboot_template.yml                                          | 3 +++
>>>  tests/templates/secureboot_unsigned_bootloader_steps.yml                         | 3 +++
>>>  tests/templates/secureboot_unsigned_kernel_steps.yml                             | 3 +++
>>>  tests/templates/swupdate-test-action-M-COM.yml                                   | 3 +++
>>>  tests/templates/swupdate_corrupt_swu_artifact_steps.yml                          | 3 +++
>>>  tests/templates/swupdate_corrupt_swu_steps.yml                                   | 3 +++
>>>  tests/templates/swupdate_negative_test.yml                                       | 3 +++
>>>  tests/templates/swupdate_reboot_without_confirm.yml                              | 3 +++
>>>  tests/templates/swupdate_same_uuid_steps.yml                                     | 3 +++
>>>  tests/templates/swupdate_template.yml                                            | 3 +++
>>>  wic/ebg-signed-sysparts.inc                                                      | 3 +++
>>>  wic/ebg-sysparts.inc                                                             | 3 +++
>>>  wic/hihope-rzg2m-efibootguard.wks.in                                             | 3 +++
>>>  wic/qemu-arm64-efibootguard-secureboot.wks.in                                    | 3 +++
>>>  wic/qemu-arm64-efibootguard.wks.in                                               | 3 +++
>>>  wic/qemu-riscv64-efibootguard.wks.in                                             | 3 +++
>>>  wic/x86-uefi-efibootguard-secureboot.wks.in                                      | 3 +++
>>>  wic/x86-uefi-efibootguard.wks.in                                                 | 3 +++
>>>  69 files changed, 203 insertions(+)
>>>
>>> diff --git a/conf/distro/debian-bullseye-backports.list b/conf/distro/debian-bullseye-backports.list
>>> index 1594907..6107928 100644
>>> --- a/conf/distro/debian-bullseye-backports.list
>>> +++ b/conf/distro/debian-bullseye-backports.list
>>> @@ -1 +1,4 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  deb http://archive.debian.org/debian bullseye-backports main contrib non-free
>>> diff --git a/conf/distro/debian-buster-backports.list b/conf/distro/debian-buster-backports.list
>>> index 7134a35..842019e 100644
>>> --- a/conf/distro/debian-buster-backports.list
>>> +++ b/conf/distro/debian-buster-backports.list
>>> @@ -1 +1,4 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  deb http://archive.debian.org/debian buster-backports main contrib non-free
>>> diff --git a/conf/distro/preferences.ovmf-snakeoil.conf b/conf/distro/preferences.ovmf-snakeoil.conf
>>> index b51d1d4..25b7da4 100644
>>> --- a/conf/distro/preferences.ovmf-snakeoil.conf
>>> +++ b/conf/distro/preferences.ovmf-snakeoil.conf
>>> @@ -1,3 +1,6 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  Package: ovmf
>>>  Pin: release n=buster-backports
>>>  Pin-Priority: 801
>>> diff --git a/conf/distro/preferences.swupdate-bullseye-backports.conf b/conf/distro/preferences.swupdate-bullseye-backports.conf
>>> index c5f6685..da307cd 100644
>>> --- a/conf/distro/preferences.swupdate-bullseye-backports.conf
>>> +++ b/conf/distro/preferences.swupdate-bullseye-backports.conf
>>> @@ -1,3 +1,6 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  Package: dh-nodejs
>>>  Pin: release n=bullseye-backports
>>>  Pin-Priority: 801
>>> diff --git a/recipes-bsp/u-boot/files/ftpm-stmm.cfg b/recipes-bsp/u-boot/files/ftpm-stmm.cfg
>>> index af5da93..a6fe2a3 100644
>>> --- a/recipes-bsp/u-boot/files/ftpm-stmm.cfg
>>> +++ b/recipes-bsp/u-boot/files/ftpm-stmm.cfg
>>> @@ -1,3 +1,6 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  ### Enable OPTEE, fTPM and StMM
>>>  CONFIG_TEE=y
>>>  CONFIG_OPTEE=y
>>> diff --git a/recipes-bsp/u-boot/files/no-grub-workaround.cfg b/recipes-bsp/u-boot/files/no-grub-workaround.cfg
>>> index dc09edd..8a01ff6 100644
>>> --- a/recipes-bsp/u-boot/files/no-grub-workaround.cfg
>>> +++ b/recipes-bsp/u-boot/files/no-grub-workaround.cfg
>>> @@ -1,2 +1,5 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  ### Disable grub workaround
>>>  # CONFIG_EFI_GRUB_ARM32_WORKAROUND is not set
>>> diff --git a/recipes-bsp/u-boot/files/qemu-extra.cfg b/recipes-bsp/u-boot/files/qemu-extra.cfg
>>> index e643db7..5380ad8 100644
>>> --- a/recipes-bsp/u-boot/files/qemu-extra.cfg
>>> +++ b/recipes-bsp/u-boot/files/qemu-extra.cfg
>>> @@ -1,3 +1,6 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  ### QEMU extra config
>>>  CONFIG_MMC=y
>>>  CONFIG_SUPPORT_EMMC_RPMB=y
>>> diff --git a/recipes-bsp/u-boot/files/secure-boot.cfg b/recipes-bsp/u-boot/files/secure-boot.cfg
>>> index 694356f..7b09a53 100644
>>> --- a/recipes-bsp/u-boot/files/secure-boot.cfg
>>> +++ b/recipes-bsp/u-boot/files/secure-boot.cfg
>>> @@ -1,3 +1,6 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  ### Secure boot config
>>>  # CONFIG_BOOTSTD_DEFAULTS is not set
>>>  # CONFIG_BOOTMETH_CROS is not set
>>> diff --git a/recipes-bsp/u-boot/files/ti-extra.cfg b/recipes-bsp/u-boot/files/ti-extra.cfg
>>> index c10d046..9500055 100644
>>> --- a/recipes-bsp/u-boot/files/ti-extra.cfg
>>> +++ b/recipes-bsp/u-boot/files/ti-extra.cfg
>>> @@ -1,3 +1,6 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  ### FTPM + RPMB + StandaloneMM setup
>>>  CONFIG_OPTEE_SERVICE_DISCOVERY=y
>>>  CONFIG_TPM=y
>>> diff --git a/recipes-core/customizations/files/99-silent-printk.conf b/recipes-core/customizations/files/99-silent-printk.conf
>>> index ad24d3a..c5b3799 100644
>>> --- a/recipes-core/customizations/files/99-silent-printk.conf
>>> +++ b/recipes-core/customizations/files/99-silent-printk.conf
>>> @@ -1 +1,4 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  kernel.printk = 3 4 1 3
>>> diff --git a/recipes-core/customizations/files/99-watchdog.conf b/recipes-core/customizations/files/99-watchdog.conf
>>> index c02756d..1f38c55 100644
>>> --- a/recipes-core/customizations/files/99-watchdog.conf
>>> +++ b/recipes-core/customizations/files/99-watchdog.conf
>>> @@ -1,3 +1,6 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  [Manager]
>>>  RuntimeWatchdogSec=60s
>>>  ShutdownWatchdogSec=60s
>>> diff --git a/recipes-core/customizations/files/ssh-permit-root.conf b/recipes-core/customizations/files/ssh-permit-root.conf
>>> index 1073982..ab26ab5 100644
>>> --- a/recipes-core/customizations/files/ssh-permit-root.conf
>>> +++ b/recipes-core/customizations/files/ssh-permit-root.conf
>>> @@ -1 +1,4 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  PermitRootLogin yes
>>> diff --git a/recipes-core/home-fs/files/home.mount b/recipes-core/home-fs/files/home.mount
>>> index 062517a..653495c 100644
>>> --- a/recipes-core/home-fs/files/home.mount
>>> +++ b/recipes-core/home-fs/files/home.mount
>>> @@ -1,3 +1,6 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  [Unit]
>>>  Description=Mount /home partition
>>>  Before=local-fs.target
>>> diff --git a/recipes-core/home-fs/files/postinst b/recipes-core/home-fs/files/postinst
>>> index ab0db84..904aa73 100755
>>> --- a/recipes-core/home-fs/files/postinst
>>> +++ b/recipes-core/home-fs/files/postinst
>>> @@ -1,4 +1,7 @@
>>>  #!/bin/sh
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  
>>>  set -e
>>>  
>>> diff --git a/recipes-core/immutable-rootfs/files/95-disable-package-updates.preset b/recipes-core/immutable-rootfs/files/95-disable-package-updates.preset
>>> index 7e6e9ef..b3b52ce 100644
>>> --- a/recipes-core/immutable-rootfs/files/95-disable-package-updates.preset
>>> +++ b/recipes-core/immutable-rootfs/files/95-disable-package-updates.preset
>>> @@ -1,3 +1,6 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  disable apt-daily.timer
>>>  disable apt-daily-upgrade.timer
>>>  disable dpkg-db-backup.timer
>>> diff --git a/recipes-core/immutable-rootfs/files/immutable-rootfs.tmpfiles.tmpl b/recipes-core/immutable-rootfs/files/immutable-rootfs.tmpfiles.tmpl
>>> index e6d25d2..4cdfc6f 100644
>>> --- a/recipes-core/immutable-rootfs/files/immutable-rootfs.tmpfiles.tmpl
>>> +++ b/recipes-core/immutable-rootfs/files/immutable-rootfs.tmpfiles.tmpl
>>> @@ -1,3 +1,6 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  L /var/lib/dpkg - - - - ${IMMUTABLE_DATA_DIR}/var/lib/dpkg
>>>  d /var/log/audit 0700 root adm -
>>>  d /var/lib/apt 0755 root root -
>>> diff --git a/recipes-core/immutable-rootfs/files/postinst b/recipes-core/immutable-rootfs/files/postinst
>>> index a6e1962..3b8071e 100644
>>> --- a/recipes-core/immutable-rootfs/files/postinst
>>> +++ b/recipes-core/immutable-rootfs/files/postinst
>>> @@ -1,4 +1,7 @@
>>>  #!/bin/sh
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  
>>>  set -e
>>>  
>>> diff --git a/recipes-core/journald-config/files/persistent-journal.conf b/recipes-core/journald-config/files/persistent-journal.conf
>>> index 21dfde0..3e3419f 100644
>>> --- a/recipes-core/journald-config/files/persistent-journal.conf
>>> +++ b/recipes-core/journald-config/files/persistent-journal.conf
>>> @@ -1,2 +1,5 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  [Journal]
>>>  Storage=persistent
>>> diff --git a/recipes-core/kernel-panic/files/sysrq-panic.service b/recipes-core/kernel-panic/files/sysrq-panic.service
>>> index 4f199fe..e892165 100644
>>> --- a/recipes-core/kernel-panic/files/sysrq-panic.service
>>> +++ b/recipes-core/kernel-panic/files/sysrq-panic.service
>>> @@ -1,3 +1,6 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  [Unit]
>>>  Description=sysrq panic
>>>  
>>> diff --git a/recipes-core/ltp/files/debian/control.tmpl b/recipes-core/ltp/files/debian/control.tmpl
>>> index 0bfc0c2..a7d0087 100644
>>> --- a/recipes-core/ltp/files/debian/control.tmpl
>>> +++ b/recipes-core/ltp/files/debian/control.tmpl
>>> @@ -1,3 +1,6 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  Source: ltp-full
>>>  Section: embedded
>>>  Priority: optional
>>> diff --git a/recipes-core/ltp/files/debian/rules b/recipes-core/ltp/files/debian/rules
>>> index 4e1747c..32d3c29 100755
>>> --- a/recipes-core/ltp/files/debian/rules
>>> +++ b/recipes-core/ltp/files/debian/rules
>>> @@ -1,4 +1,7 @@
>>>  #!/usr/bin/make -f
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  export DEB_CFLAGS_MAINT_APPEND  = -Wall  -Wno-format-security
>>>  export DEB_BUILD_MAINT_OPTIONS=hardening=-branch
>>>  
>>> diff --git a/recipes-core/move-homedir-var/files/move-homedir-var.tmpfiles.tmpl b/recipes-core/move-homedir-var/files/move-homedir-var.tmpfiles.tmpl
>>> index 92e4a30..1821f92 100644
>>> --- a/recipes-core/move-homedir-var/files/move-homedir-var.tmpfiles.tmpl
>>> +++ b/recipes-core/move-homedir-var/files/move-homedir-var.tmpfiles.tmpl
>>> @@ -1,2 +1,5 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  L /home - - - - /var/home
>>>  C /var/home - - - - ${IMMUTABLE_DATA_DIR}/home
>>> diff --git a/recipes-core/security-customizations/files/postinst b/recipes-core/security-customizations/files/postinst
>>> index f8ebf9e..788e225 100755
>>> --- a/recipes-core/security-customizations/files/postinst
>>> +++ b/recipes-core/security-customizations/files/postinst
>>> @@ -3,6 +3,8 @@
>>>  # CIP Security, generic profile
>>>  # Security Package configurations
>>>  #
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  
>>>  set -e
>>>  
>>> diff --git a/recipes-core/security-customizations/files/ssh-pam-remote.conf b/recipes-core/security-customizations/files/ssh-pam-remote.conf
>>> index d460b0c..ea120b2 100644
>>> --- a/recipes-core/security-customizations/files/ssh-pam-remote.conf
>>> +++ b/recipes-core/security-customizations/files/ssh-pam-remote.conf
>>> @@ -1,3 +1,6 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  # Enable PAM configuration for Remote Session
>>>  ChallengeResponseAuthentication yes
>>>  KbdInteractiveAuthentication yes
>>> diff --git a/recipes-core/security-customizations/files/ssh-remote-session-term.conf b/recipes-core/security-customizations/files/ssh-remote-session-term.conf
>>> index d11b92e..171ea9b 100644
>>> --- a/recipes-core/security-customizations/files/ssh-remote-session-term.conf
>>> +++ b/recipes-core/security-customizations/files/ssh-remote-session-term.conf
>>> @@ -1,3 +1,6 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  # CR2.6: Remote session termination
>>>  # Terminate remote session after inactive time period
>>>  
>>> diff --git a/recipes-core/swupdate-config-wfx/files/suricatta_wfx.conf.tmpl b/recipes-core/swupdate-config-wfx/files/suricatta_wfx.conf.tmpl
>>> index 744b426..f750f3d 100644
>>> --- a/recipes-core/swupdate-config-wfx/files/suricatta_wfx.conf.tmpl
>>> +++ b/recipes-core/swupdate-config-wfx/files/suricatta_wfx.conf.tmpl
>>> @@ -1 +1,4 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  SWUPDATE_SURICATTA_ARGS="--server lua -u ${WFX_URL} -i $(cat /etc/machine-id)"
>>> diff --git a/recipes-core/swupdate-config/files/hwrevision.tmpl b/recipes-core/swupdate-config/files/hwrevision.tmpl
>>> index 1eb0996..b937200 100644
>>> --- a/recipes-core/swupdate-config/files/hwrevision.tmpl
>>> +++ b/recipes-core/swupdate-config/files/hwrevision.tmpl
>>> @@ -1 +1,4 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  cip-${MACHINE} ${MACHINE_HW_VERSION}
>>> diff --git a/recipes-core/swupdate-config/files/swupdate.cfg b/recipes-core/swupdate-config/files/swupdate.cfg
>>> index 3e2b45c..5c05fbe 100644
>>> --- a/recipes-core/swupdate-config/files/swupdate.cfg
>>> +++ b/recipes-core/swupdate-config/files/swupdate.cfg
>>> @@ -1,3 +1,6 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  globals :
>>>  {
>>>      bootloader = "ebg";
>>> diff --git a/recipes-core/swupdate-handler-roundrobin/files/swupdate.handler.efibootguard.ini b/recipes-core/swupdate-handler-roundrobin/files/swupdate.handler.efibootguard.ini
>>> index 58271da..8f93cc9 100644
>>> --- a/recipes-core/swupdate-handler-roundrobin/files/swupdate.handler.efibootguard.ini
>>> +++ b/recipes-core/swupdate-handler-roundrobin/files/swupdate.handler.efibootguard.ini
>>> @@ -1,3 +1,6 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  [image]
>>>  chainhandler=raw
>>>  
>>> diff --git a/recipes-core/tmp-fs/files/postinst b/recipes-core/tmp-fs/files/postinst
>>> index 39067f1..ae0f74a 100755
>>> --- a/recipes-core/tmp-fs/files/postinst
>>> +++ b/recipes-core/tmp-fs/files/postinst
>>> @@ -1,4 +1,7 @@
>>>  #!/bin/sh
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  
>>>  set -e
>>>  
>>> diff --git a/recipes-devtools/swupdate-signer/files/sign-swu-cms b/recipes-devtools/swupdate-signer/files/sign-swu-cms
>>> index cb0cd4a..bc1ec13 100644
>>> --- a/recipes-devtools/swupdate-signer/files/sign-swu-cms
>>> +++ b/recipes-devtools/swupdate-signer/files/sign-swu-cms
>>> @@ -1,4 +1,7 @@
>>>  #!/bin/sh
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  in_file=$1
>>>  out_file=$2
>>>  inkey="/usr/share/swupdate-signing/swupdate-sign.key"
>>> diff --git a/recipes-initramfs/initramfs-crypt-hook/files/encrypt_partition.env.tmpl b/recipes-initramfs/initramfs-crypt-hook/files/encrypt_partition.env.tmpl
>>> index bb93361..452714d 100644
>>> --- a/recipes-initramfs/initramfs-crypt-hook/files/encrypt_partition.env.tmpl
>>> +++ b/recipes-initramfs/initramfs-crypt-hook/files/encrypt_partition.env.tmpl
>>> @@ -1,3 +1,6 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  PARTITIONS="${CRYPT_PARTITIONS}"
>>>  CREATE_FILE_SYSTEM_CMD="${CRYPT_CREATE_FILE_SYSTEM_CMD}"
>>>  SETUP_TIMEOUT="${CRYPT_SETUP_TIMEOUT}"
>>> diff --git a/recipes-initramfs/initramfs-crypt-hook/files/pwquality.conf b/recipes-initramfs/initramfs-crypt-hook/files/pwquality.conf
>>> index d4c8981..8e087f2 100644
>>> --- a/recipes-initramfs/initramfs-crypt-hook/files/pwquality.conf
>>> +++ b/recipes-initramfs/initramfs-crypt-hook/files/pwquality.conf
>>> @@ -1,3 +1,6 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  # we don't have a dictionary in the initramfs
>>>  # this solves the error "Password generation failed - required entropy too low for settings"
>>>  dictcheck = 0
>>> diff --git a/recipes-initramfs/initramfs-factory-reset-hook/files/factory-reset-script.tmpl b/recipes-initramfs/initramfs-factory-reset-hook/files/factory-reset-script.tmpl
>>> index f0ad40c..94b5f8b 100644
>>> --- a/recipes-initramfs/initramfs-factory-reset-hook/files/factory-reset-script.tmpl
>>> +++ b/recipes-initramfs/initramfs-factory-reset-hook/files/factory-reset-script.tmpl
>>> @@ -7,6 +7,8 @@
>>>  # Authors:
>>>  #  Quirin Gylstorff <quirin.gylstorff@siemens.com>
>>>  #
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  . /usr/share/factory-reset/reset-env
>>>  
>>>  . /scripts/cip-initramfs-functions
>>> diff --git a/recipes-initramfs/initramfs-factory-reset-hook/files/reset-env.tmpl b/recipes-initramfs/initramfs-factory-reset-hook/files/reset-env.tmpl
>>> index d3e18a2..07e2376 100644
>>> --- a/recipes-initramfs/initramfs-factory-reset-hook/files/reset-env.tmpl
>>> +++ b/recipes-initramfs/initramfs-factory-reset-hook/files/reset-env.tmpl
>>> @@ -1,3 +1,6 @@
>>>  #!/bin/sh
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  INITRAMFS_FACTORY_RESET_DEVICES="${INITRAMFS_FACTORY_RESET_DEVICES}"
>>>  INITRAMFS_FACTORY_RESET_LUKS_FORMAT_TYPE="${INITRAMFS_FACTORY_RESET_LUKS_FORMAT_TYPE}"
>>> diff --git a/recipes-initramfs/initramfs-overlay-hook/files/local-bottom.tmpl b/recipes-initramfs/initramfs-overlay-hook/files/local-bottom.tmpl
>>> index bce588c..8a697f8 100644
>>> --- a/recipes-initramfs/initramfs-overlay-hook/files/local-bottom.tmpl
>>> +++ b/recipes-initramfs/initramfs-overlay-hook/files/local-bottom.tmpl
>>> @@ -7,6 +7,8 @@
>>>  #  Jan Kiszka <jan.kiszka@siemens.com>
>>>  #  Quirin Gylstorff <quirin.gylstorff@siemens.com>
>>>  #
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  
>>>  ovl_storage_path="${INITRAMFS_OVERLAY_STORAGE_PATH}"
>>>  ovl_lower_dirs="${INITRAMFS_OVERLAY_PATHS}"
>>> diff --git a/recipes-initramfs/initramfs-overlay-hook/files/overlay_recovery_action.script b/recipes-initramfs/initramfs-overlay-hook/files/overlay_recovery_action.script
>>> index 0cd084b..11ca731 100644
>>> --- a/recipes-initramfs/initramfs-overlay-hook/files/overlay_recovery_action.script
>>> +++ b/recipes-initramfs/initramfs-overlay-hook/files/overlay_recovery_action.script
>>> @@ -7,6 +7,8 @@
>>>  # Authors:
>>>  #  Clara Kowalsky <clara.kowalsky@siemens.com>
>>>  #
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  
>>>  partition_fstype="$1"
>>>  ovl_partition_device="$2"
>>> diff --git a/recipes-kernel/linux/files/no-module-signing.cfg b/recipes-kernel/linux/files/no-module-signing.cfg
>>> index ab54f68..064ef9c 100644
>>> --- a/recipes-kernel/linux/files/no-module-signing.cfg
>>> +++ b/recipes-kernel/linux/files/no-module-signing.cfg
>>> @@ -1,2 +1,5 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  # CONFIG_SECURITY_LOCKDOWN_LSM is not set
>>>  # CONFIG_MODULE_SIG is not set
>>> diff --git a/recipes-kernel/linux/files/no-tpm-hwrng.cfg b/recipes-kernel/linux/files/no-tpm-hwrng.cfg
>>> index ab46cd8..08e98ff 100644
>>> --- a/recipes-kernel/linux/files/no-tpm-hwrng.cfg
>>> +++ b/recipes-kernel/linux/files/no-tpm-hwrng.cfg
>>> @@ -1,2 +1,5 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  # see https://lore.kernel.org/lkml/bbc41534-a2d9-42dc-ac8a-ff8a0b4fd41f@siemens.com/
>>>  # CONFIG_HW_RANDOM_TPM is not set
>>> diff --git a/recipes-kernel/linux/files/preempt-rt.cfg b/recipes-kernel/linux/files/preempt-rt.cfg
>>> index afbf53d..f558365 100644
>>> --- a/recipes-kernel/linux/files/preempt-rt.cfg
>>> +++ b/recipes-kernel/linux/files/preempt-rt.cfg
>>> @@ -1,3 +1,6 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  # >= 5.10
>>>  CONFIG_EXPERT=y
>>>  CONFIG_PREEMPT_RT=y
>>> diff --git a/recipes-security/fail2ban-config/files/systemd-defaults.conf b/recipes-security/fail2ban-config/files/systemd-defaults.conf
>>> index 16e0d5e..32a8e48 100644
>>> --- a/recipes-security/fail2ban-config/files/systemd-defaults.conf
>>> +++ b/recipes-security/fail2ban-config/files/systemd-defaults.conf
>>> @@ -1,3 +1,6 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  [DEFAULT]
>>>  
>>>  syslog_backend = systemd
>>> diff --git a/scripts/deploy-cip-core.sh b/scripts/deploy-cip-core.sh
>>> index 623c216..1e08e47 100755
>>> --- a/scripts/deploy-cip-core.sh
>>> +++ b/scripts/deploy-cip-core.sh
>>> @@ -1,4 +1,7 @@
>>>  #!/bin/sh
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  
>>>  set -e
>>>  
>>> diff --git a/scripts/generate-sb-db-from-existing-certificate.sh b/scripts/generate-sb-db-from-existing-certificate.sh
>>> index dddd9b5..42d09dd 100755
>>> --- a/scripts/generate-sb-db-from-existing-certificate.sh
>>> +++ b/scripts/generate-sb-db-from-existing-certificate.sh
>>> @@ -1,4 +1,7 @@
>>>  #!/bin/sh
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  
>>>  set -e
>>>  
>>> diff --git a/scripts/generate_secure_boot_keys.sh b/scripts/generate_secure_boot_keys.sh
>>> index 8be0569..28ae34c 100755
>>> --- a/scripts/generate_secure_boot_keys.sh
>>> +++ b/scripts/generate_secure_boot_keys.sh
>>> @@ -1,4 +1,7 @@
>>>  #!/bin/sh
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  
>>>  set -e
>>>  
>>> diff --git a/scripts/start-efishell.sh b/scripts/start-efishell.sh
>>> index fff8a6a..86e2ddd 100755
>>> --- a/scripts/start-efishell.sh
>>> +++ b/scripts/start-efishell.sh
>>> @@ -1,4 +1,7 @@
>>>  #!/bin/sh
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  
>>>  set -e
>>>  
>>> diff --git a/scripts/submit_lava.sh b/scripts/submit_lava.sh
>>> index b3180a1..a4d20ec 100755
>>> --- a/scripts/submit_lava.sh
>>> +++ b/scripts/submit_lava.sh
>>> @@ -1,4 +1,7 @@
>>>  #!/bin/bash
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  # Copyright (C) 2024, Renesas Electronics Europe GmbH
>>>  # Chris Paterson <chris.paterson2@renesas.com>
>>>  # Sai Ashrith <sai.sathujoda@toshiba-tsip.com>
>>> diff --git a/scripts/update-linux-cip.sh b/scripts/update-linux-cip.sh
>>> index 5fbfa57..df306b2 100755
>>> --- a/scripts/update-linux-cip.sh
>>> +++ b/scripts/update-linux-cip.sh
>>> @@ -1,4 +1,7 @@
>>>  #!/bin/bash
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  REPO_ROOT=$(git rev-parse --show-toplevel)
>>>  pushd "${REPO_ROOT}"/recipes-kernel/linux >/dev/null || exit 1
>>>  
>>> diff --git a/scripts/update-ltp.sh b/scripts/update-ltp.sh
>>> index dc8b947..321cc3c 100755
>>> --- a/scripts/update-ltp.sh
>>> +++ b/scripts/update-ltp.sh
>>> @@ -1,4 +1,7 @@
>>>  #!/bin/bash
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  
>>>  REPO_ROOT=$(git rev-parse --show-toplevel)
>>>  pushd "${REPO_ROOT}"/recipes-core/ltp > /dev/null || exit
>>> diff --git a/tests/templates/IEC_template.yml b/tests/templates/IEC_template.yml
>>> index f8558cd..148f07e 100644
>>> --- a/tests/templates/IEC_template.yml
>>> +++ b/tests/templates/IEC_template.yml
>>> @@ -1,3 +1,6 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  device_type: qemu
>>>  job_name: #architecture# IEC layer testing
>>>  timeouts:
>>> diff --git a/tests/templates/secureboot_corrupt_rootfs_steps.yml b/tests/templates/secureboot_corrupt_rootfs_steps.yml
>>> index b6f6628..5c47b30 100644
>>> --- a/tests/templates/secureboot_corrupt_rootfs_steps.yml
>>> +++ b/tests/templates/secureboot_corrupt_rootfs_steps.yml
>>> @@ -1,3 +1,6 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>            - "apt-get update"
>>>            - "apt install -y fdisk"
>>>            - "rootfs_start_sector=$(fdisk -l -o Name,Start cip-core-image-security-cip-core-#distribution#-#architecture#.wic | awk -v name=systema '$0 ~ name {print $2}')"
>>> diff --git a/tests/templates/secureboot_negative_test.yml b/tests/templates/secureboot_negative_test.yml
>>> index 2fcdbfa..a8e4226 100644
>>> --- a/tests/templates/secureboot_negative_test.yml
>>> +++ b/tests/templates/secureboot_negative_test.yml
>>> @@ -1,3 +1,6 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  device_type: qemu
>>>  job_name: #architecture# secure boot testing
>>>  timeouts:
>>> diff --git a/tests/templates/secureboot_template.yml b/tests/templates/secureboot_template.yml
>>> index e29b64a..0a075e2 100644
>>> --- a/tests/templates/secureboot_template.yml
>>> +++ b/tests/templates/secureboot_template.yml
>>> @@ -1,3 +1,6 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  device_type: qemu
>>>  job_name: #architecture# secure boot testing
>>>  timeouts:
>>> diff --git a/tests/templates/secureboot_unsigned_bootloader_steps.yml b/tests/templates/secureboot_unsigned_bootloader_steps.yml
>>> index 8d64b05..f4f4043 100644
>>> --- a/tests/templates/secureboot_unsigned_bootloader_steps.yml
>>> +++ b/tests/templates/secureboot_unsigned_bootloader_steps.yml
>>> @@ -1,3 +1,6 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>            - "apt-get update"
>>>            - "apt install --yes guestfish sbsigntool"
>>>            - "guestfish add cip-core-image-security-cip-core-#distribution#-#architecture#.wic : run : mount /dev/sda1 / : copy-out /EFI/BOOT/bootx64.efi ."
>>> diff --git a/tests/templates/secureboot_unsigned_kernel_steps.yml b/tests/templates/secureboot_unsigned_kernel_steps.yml
>>> index f097ed6..6ab334a 100644
>>> --- a/tests/templates/secureboot_unsigned_kernel_steps.yml
>>> +++ b/tests/templates/secureboot_unsigned_kernel_steps.yml
>>> @@ -1,3 +1,6 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>            - "apt-get update"
>>>            - "apt install --yes guestfish sbsigntool"
>>>            - "guestfish add cip-core-image-security-cip-core-#distribution#-#architecture#.wic : run : mount /dev/sda2 / : copy-out /linux.efi ."
>>> diff --git a/tests/templates/swupdate-test-action-M-COM.yml b/tests/templates/swupdate-test-action-M-COM.yml
>>> index 56ff106..69c9cb7 100644
>>> --- a/tests/templates/swupdate-test-action-M-COM.yml
>>> +++ b/tests/templates/swupdate-test-action-M-COM.yml
>>> @@ -1,3 +1,6 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  # TEST BLOCK 1
>>>  # Fail the job if software update application failed
>>>  - test:
>>> diff --git a/tests/templates/swupdate_corrupt_swu_artifact_steps.yml b/tests/templates/swupdate_corrupt_swu_artifact_steps.yml
>>> index 2fad3fd..043867e 100644
>>> --- a/tests/templates/swupdate_corrupt_swu_artifact_steps.yml
>>> +++ b/tests/templates/swupdate_corrupt_swu_artifact_steps.yml
>>> @@ -1,3 +1,6 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>              - curl -v --trace-time http://$LAVA_DISPATCHER_IP/tmp/$LAVA_JOB_ID/downloads/common/cip-core-image-security-cip-core-#distribution#-#architecture#.swu --output /root/cip-core-image-security-cip-core-#distribution#-#architecture#.swu
>>>              - mkdir -p swu
>>>              - cpio -ivd --directory=/root/swu < /root/cip-core-image-security-cip-core-#distribution#-#architecture#.swu
>>> diff --git a/tests/templates/swupdate_corrupt_swu_steps.yml b/tests/templates/swupdate_corrupt_swu_steps.yml
>>> index 74c9217..3cdb793 100644
>>> --- a/tests/templates/swupdate_corrupt_swu_steps.yml
>>> +++ b/tests/templates/swupdate_corrupt_swu_steps.yml
>>> @@ -1,3 +1,6 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>              - curl -v --trace-time http://$LAVA_DISPATCHER_IP/tmp/$LAVA_JOB_ID/downloads/common/cip-core-image-security-cip-core-#distribution#-#architecture#.swu --output /root/cip-core-image-security-cip-core-#distribution#-#architecture#.swu
>>>              - mkdir -p swu
>>>              - dd if=/dev/zero of=/root/cip-core-image-security-cip-core-#distribution#-#architecture#.swu bs=1M count=5
>>> diff --git a/tests/templates/swupdate_negative_test.yml b/tests/templates/swupdate_negative_test.yml
>>> index bb79b07..250eaa8 100644
>>> --- a/tests/templates/swupdate_negative_test.yml
>>> +++ b/tests/templates/swupdate_negative_test.yml
>>> @@ -1,3 +1,6 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  device_type: qemu
>>>  job_name: #architecture# software update testing
>>>  timeouts:
>>> diff --git a/tests/templates/swupdate_reboot_without_confirm.yml b/tests/templates/swupdate_reboot_without_confirm.yml
>>> index bfad106..074eb1a 100644
>>> --- a/tests/templates/swupdate_reboot_without_confirm.yml
>>> +++ b/tests/templates/swupdate_reboot_without_confirm.yml
>>> @@ -1,3 +1,6 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  # qemu-swtpm.sock will be gone after soft reboot.
>>>  # So the swtpm socket need to be started again for proper reboot
>>>  # To start the swtpm daemon, first the existing one should be killed
>>> diff --git a/tests/templates/swupdate_same_uuid_steps.yml b/tests/templates/swupdate_same_uuid_steps.yml
>>> index 3ff2e02..8329055 100644
>>> --- a/tests/templates/swupdate_same_uuid_steps.yml
>>> +++ b/tests/templates/swupdate_same_uuid_steps.yml
>>> @@ -1,3 +1,6 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>              - curl -v --trace-time http://$LAVA_DISPATCHER_IP/tmp/$LAVA_JOB_ID/downloads/common/cip-core-image-security-cip-core-#distribution#-#architecture#.swu --output /root/cip-core-image-security-cip-core-#distribution#-#architecture#.swu
>>>              - mkdir -p swu
>>>              - cpio -ivd --directory=/root/swu < /root/cip-core-image-security-cip-core-#distribution#-#architecture#.swu
>>> diff --git a/tests/templates/swupdate_template.yml b/tests/templates/swupdate_template.yml
>>> index e1f71a9..9a3366b 100644
>>> --- a/tests/templates/swupdate_template.yml
>>> +++ b/tests/templates/swupdate_template.yml
>>> @@ -1,3 +1,6 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  device_type: qemu
>>>  job_name: #architecture# software update testing
>>>  timeouts:
>>> diff --git a/wic/ebg-signed-sysparts.inc b/wic/ebg-signed-sysparts.inc
>>> index c35878f..8210598 100644
>>> --- a/wic/ebg-signed-sysparts.inc
>>> +++ b/wic/ebg-signed-sysparts.inc
>>> @@ -1,3 +1,6 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  # default partition layout EFI Boot Guard usage, signed version
>>>  
>>>  # EFI partition containing efibootguard bootloader binary
>>> diff --git a/wic/ebg-sysparts.inc b/wic/ebg-sysparts.inc
>>> index 0290024..b7f1afa 100644
>>> --- a/wic/ebg-sysparts.inc
>>> +++ b/wic/ebg-sysparts.inc
>>> @@ -1,3 +1,6 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  # default partition layout EFI Boot Guard usage
>>>  
>>>  # EFI partition containing efibootguard bootloader binary
>>> diff --git a/wic/hihope-rzg2m-efibootguard.wks.in b/wic/hihope-rzg2m-efibootguard.wks.in
>>> index fdbad14..99c8d10 100644
>>> --- a/wic/hihope-rzg2m-efibootguard.wks.in
>>> +++ b/wic/hihope-rzg2m-efibootguard.wks.in
>>> @@ -1,3 +1,6 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  # short-description: RZ/G2M image with EFI Boot Guard and SWUpdate
>>>  # long-description: Disk image for HiHope RZ/G2M board with EFI Boot Guard and SWUpdate
>>>  
>>> diff --git a/wic/qemu-arm64-efibootguard-secureboot.wks.in b/wic/qemu-arm64-efibootguard-secureboot.wks.in
>>> index 941a552..88eb91c 100644
>>> --- a/wic/qemu-arm64-efibootguard-secureboot.wks.in
>>> +++ b/wic/qemu-arm64-efibootguard-secureboot.wks.in
>>> @@ -1,3 +1,6 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  include ebg-signed-sysparts.inc
>>>  
>>>  part --source rawcopy --sourceparams "file=${IMAGE_FULLNAME}.verity" --align 1024 --fixed-size 1G --uuid "${ABROOTFS_PART_UUID_A}" --part-type 0FC63DAF-8483-4772-8E79-3D69D8477DE4 --part-name systema
>>> diff --git a/wic/qemu-arm64-efibootguard.wks.in b/wic/qemu-arm64-efibootguard.wks.in
>>> index 21c0b24..117c47c 100644
>>> --- a/wic/qemu-arm64-efibootguard.wks.in
>>> +++ b/wic/qemu-arm64-efibootguard.wks.in
>>> @@ -1,3 +1,6 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  # short-description: arm64 with EFI Boot Guard and SWUpdate
>>>  # long-description: Disk image for arm64 machines with EFI Boot Guard and SWUpdate
>>>  
>>> diff --git a/wic/qemu-riscv64-efibootguard.wks.in b/wic/qemu-riscv64-efibootguard.wks.in
>>> index 948c67d..a5dd09b 100644
>>> --- a/wic/qemu-riscv64-efibootguard.wks.in
>>> +++ b/wic/qemu-riscv64-efibootguard.wks.in
>>> @@ -1,3 +1,6 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  # short-description: riscv64 with EFI Boot Guard and SWUpdate
>>>  # long-description: Disk image for riscv64 machines with EFI Boot Guard and SWUpdate
>>>  
>>> diff --git a/wic/x86-uefi-efibootguard-secureboot.wks.in b/wic/x86-uefi-efibootguard-secureboot.wks.in
>>> index 2af3e58..f15f9e0 100644
>>> --- a/wic/x86-uefi-efibootguard-secureboot.wks.in
>>> +++ b/wic/x86-uefi-efibootguard-secureboot.wks.in
>>> @@ -1,3 +1,6 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  include ebg-signed-sysparts.inc
>>>  
>>>  part --source rawcopy --sourceparams "file=${IMAGE_FULLNAME}.verity" --align 1024 --fixed-size 1G --uuid "${ABROOTFS_PART_UUID_A}" --part-type 0FC63DAF-8483-4772-8E79-3D69D8477DE4 --part-name systema
>>> diff --git a/wic/x86-uefi-efibootguard.wks.in b/wic/x86-uefi-efibootguard.wks.in
>>> index 3640ecf..982a87a 100644
>>> --- a/wic/x86-uefi-efibootguard.wks.in
>>> +++ b/wic/x86-uefi-efibootguard.wks.in
>>> @@ -1,3 +1,6 @@
>>> +#
>>> +# SPDX-License-Identifier: MIT
>>> +#
>>>  # short-description: x86 with EFI Boot Guard and SWUpdate
>>>  # long-description: Disk image for x86 machines with EFI Boot Guard and SWUpdate
>>>  
>>>
>>> ---
>>> base-commit: e3158569eee297f1837a6d3fd7e0f1a0534c2b8b
>>> change-id: 20260316-license-c5fcde3618d2
>>>
>>> Best regards,
>>
>> Thanks, applied. Will follow up with fixing two more spots so that we
>> are only left with files that cannot receive headers.
>>
> 
> Quirin spotted that modifying hwrevision.tmpl is causing our red
> pipeline rigth now. I've dropped that changed and force-pushed the update.
> 

Two more files dropped (swupdate.cfg and
swupdate.handler.efibootguard.ini) in the hope to get green lights
again. Who expected funtional breakages from license tagged? :D

Jan

-- 
Siemens AG, Foundational Technologies
Linux Expert Center


      reply	other threads:[~2026-03-26 15:10 UTC|newest]

Thread overview: 5+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-03-24  8:40 [PATCH isar-cip-core v2] *: Add SPDX-License-Identifier MIT header Kamlesh Gurudasani
2026-03-24 14:39 ` Jan Kiszka
2026-03-25  5:46   ` dinesh.kumar
2026-03-26 12:05   ` Jan Kiszka
2026-03-26 15:10     ` Jan Kiszka [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=93a682d4-ce36-4ec2-b35e-dd5e42aef1a3@siemens.com \
    --to=jan.kiszka@siemens.com \
    --cc=cip-dev@lists.cip-project.org \
    --cc=dinesh.kumar@toshiba-tsip.com \
    --cc=kamlesh@ti.com \
    --cc=pavel@denx.de \
    --cc=quirin.gylstorff@siemens.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox