public inbox for cip-dev@lists.cip-project.org
 help / color / mirror / Atom feed
From: Jan Kiszka <jan.kiszka@siemens.com>
To: Kamlesh Gurudasani <kamlesh@ti.com>,
	dinesh.kumar@toshiba-tsip.com, cip-dev@lists.cip-project.org,
	pavel@denx.de, Quirin Gylstorff <quirin.gylstorff@siemens.com>
Subject: Re: [PATCH isar-cip-core v2] *: Add SPDX-License-Identifier MIT header
Date: Thu, 26 Mar 2026 13:05:06 +0100	[thread overview]
Message-ID: <cf8bf9cd-bb30-40eb-ac4d-2a3b27dc31d6@siemens.com> (raw)
In-Reply-To: <62e3e3c2-bd72-4d60-9ee9-d460371a0955@siemens.com>

On 24.03.26 15:39, Jan Kiszka wrote:
> On 24.03.26 09:40, Kamlesh Gurudasani wrote:
>> Add missing license headers to configuration, template, script,
>> and wic partition layout files to make licensing consistent
>> across the repository.
>>
>> Command Used:
>> git ls-files | xargs grep -rL SPDX-License-Identifier
>>
>> Signed-off-by: Kamlesh Gurudasani <kamlesh@ti.com>
>> ---
>> Changes in v2:
>> - added license to remaining files
>> - Link to v1: https://lore.kernel.org/r/20260316-license-v1-1-5bb039f50c05@ti.com
>> ---
>>  conf/distro/debian-bullseye-backports.list                                       | 3 +++
>>  conf/distro/debian-buster-backports.list                                         | 3 +++
>>  conf/distro/preferences.ovmf-snakeoil.conf                                       | 3 +++
>>  conf/distro/preferences.swupdate-bullseye-backports.conf                         | 3 +++
>>  recipes-bsp/u-boot/files/ftpm-stmm.cfg                                           | 3 +++
>>  recipes-bsp/u-boot/files/no-grub-workaround.cfg                                  | 3 +++
>>  recipes-bsp/u-boot/files/qemu-extra.cfg                                          | 3 +++
>>  recipes-bsp/u-boot/files/secure-boot.cfg                                         | 3 +++
>>  recipes-bsp/u-boot/files/ti-extra.cfg                                            | 3 +++
>>  recipes-core/customizations/files/99-silent-printk.conf                          | 3 +++
>>  recipes-core/customizations/files/99-watchdog.conf                               | 3 +++
>>  recipes-core/customizations/files/ssh-permit-root.conf                           | 3 +++
>>  recipes-core/home-fs/files/home.mount                                            | 3 +++
>>  recipes-core/home-fs/files/postinst                                              | 3 +++
>>  recipes-core/immutable-rootfs/files/95-disable-package-updates.preset            | 3 +++
>>  recipes-core/immutable-rootfs/files/immutable-rootfs.tmpfiles.tmpl               | 3 +++
>>  recipes-core/immutable-rootfs/files/postinst                                     | 3 +++
>>  recipes-core/journald-config/files/persistent-journal.conf                       | 3 +++
>>  recipes-core/kernel-panic/files/sysrq-panic.service                              | 3 +++
>>  recipes-core/ltp/files/debian/control.tmpl                                       | 3 +++
>>  recipes-core/ltp/files/debian/rules                                              | 3 +++
>>  recipes-core/move-homedir-var/files/move-homedir-var.tmpfiles.tmpl               | 3 +++
>>  recipes-core/security-customizations/files/postinst                              | 2 ++
>>  recipes-core/security-customizations/files/ssh-pam-remote.conf                   | 3 +++
>>  recipes-core/security-customizations/files/ssh-remote-session-term.conf          | 3 +++
>>  recipes-core/swupdate-config-wfx/files/suricatta_wfx.conf.tmpl                   | 3 +++
>>  recipes-core/swupdate-config/files/hwrevision.tmpl                               | 3 +++
>>  recipes-core/swupdate-config/files/swupdate.cfg                                  | 3 +++
>>  recipes-core/swupdate-handler-roundrobin/files/swupdate.handler.efibootguard.ini | 3 +++
>>  recipes-core/tmp-fs/files/postinst                                               | 3 +++
>>  recipes-devtools/swupdate-signer/files/sign-swu-cms                              | 3 +++
>>  recipes-initramfs/initramfs-crypt-hook/files/encrypt_partition.env.tmpl          | 3 +++
>>  recipes-initramfs/initramfs-crypt-hook/files/pwquality.conf                      | 3 +++
>>  recipes-initramfs/initramfs-factory-reset-hook/files/factory-reset-script.tmpl   | 2 ++
>>  recipes-initramfs/initramfs-factory-reset-hook/files/reset-env.tmpl              | 3 +++
>>  recipes-initramfs/initramfs-overlay-hook/files/local-bottom.tmpl                 | 2 ++
>>  recipes-initramfs/initramfs-overlay-hook/files/overlay_recovery_action.script    | 2 ++
>>  recipes-kernel/linux/files/no-module-signing.cfg                                 | 3 +++
>>  recipes-kernel/linux/files/no-tpm-hwrng.cfg                                      | 3 +++
>>  recipes-kernel/linux/files/preempt-rt.cfg                                        | 3 +++
>>  recipes-security/fail2ban-config/files/systemd-defaults.conf                     | 3 +++
>>  scripts/deploy-cip-core.sh                                                       | 3 +++
>>  scripts/generate-sb-db-from-existing-certificate.sh                              | 3 +++
>>  scripts/generate_secure_boot_keys.sh                                             | 3 +++
>>  scripts/start-efishell.sh                                                        | 3 +++
>>  scripts/submit_lava.sh                                                           | 3 +++
>>  scripts/update-linux-cip.sh                                                      | 3 +++
>>  scripts/update-ltp.sh                                                            | 3 +++
>>  tests/templates/IEC_template.yml                                                 | 3 +++
>>  tests/templates/secureboot_corrupt_rootfs_steps.yml                              | 3 +++
>>  tests/templates/secureboot_negative_test.yml                                     | 3 +++
>>  tests/templates/secureboot_template.yml                                          | 3 +++
>>  tests/templates/secureboot_unsigned_bootloader_steps.yml                         | 3 +++
>>  tests/templates/secureboot_unsigned_kernel_steps.yml                             | 3 +++
>>  tests/templates/swupdate-test-action-M-COM.yml                                   | 3 +++
>>  tests/templates/swupdate_corrupt_swu_artifact_steps.yml                          | 3 +++
>>  tests/templates/swupdate_corrupt_swu_steps.yml                                   | 3 +++
>>  tests/templates/swupdate_negative_test.yml                                       | 3 +++
>>  tests/templates/swupdate_reboot_without_confirm.yml                              | 3 +++
>>  tests/templates/swupdate_same_uuid_steps.yml                                     | 3 +++
>>  tests/templates/swupdate_template.yml                                            | 3 +++
>>  wic/ebg-signed-sysparts.inc                                                      | 3 +++
>>  wic/ebg-sysparts.inc                                                             | 3 +++
>>  wic/hihope-rzg2m-efibootguard.wks.in                                             | 3 +++
>>  wic/qemu-arm64-efibootguard-secureboot.wks.in                                    | 3 +++
>>  wic/qemu-arm64-efibootguard.wks.in                                               | 3 +++
>>  wic/qemu-riscv64-efibootguard.wks.in                                             | 3 +++
>>  wic/x86-uefi-efibootguard-secureboot.wks.in                                      | 3 +++
>>  wic/x86-uefi-efibootguard.wks.in                                                 | 3 +++
>>  69 files changed, 203 insertions(+)
>>
>> diff --git a/conf/distro/debian-bullseye-backports.list b/conf/distro/debian-bullseye-backports.list
>> index 1594907..6107928 100644
>> --- a/conf/distro/debian-bullseye-backports.list
>> +++ b/conf/distro/debian-bullseye-backports.list
>> @@ -1 +1,4 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  deb http://archive.debian.org/debian bullseye-backports main contrib non-free
>> diff --git a/conf/distro/debian-buster-backports.list b/conf/distro/debian-buster-backports.list
>> index 7134a35..842019e 100644
>> --- a/conf/distro/debian-buster-backports.list
>> +++ b/conf/distro/debian-buster-backports.list
>> @@ -1 +1,4 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  deb http://archive.debian.org/debian buster-backports main contrib non-free
>> diff --git a/conf/distro/preferences.ovmf-snakeoil.conf b/conf/distro/preferences.ovmf-snakeoil.conf
>> index b51d1d4..25b7da4 100644
>> --- a/conf/distro/preferences.ovmf-snakeoil.conf
>> +++ b/conf/distro/preferences.ovmf-snakeoil.conf
>> @@ -1,3 +1,6 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  Package: ovmf
>>  Pin: release n=buster-backports
>>  Pin-Priority: 801
>> diff --git a/conf/distro/preferences.swupdate-bullseye-backports.conf b/conf/distro/preferences.swupdate-bullseye-backports.conf
>> index c5f6685..da307cd 100644
>> --- a/conf/distro/preferences.swupdate-bullseye-backports.conf
>> +++ b/conf/distro/preferences.swupdate-bullseye-backports.conf
>> @@ -1,3 +1,6 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  Package: dh-nodejs
>>  Pin: release n=bullseye-backports
>>  Pin-Priority: 801
>> diff --git a/recipes-bsp/u-boot/files/ftpm-stmm.cfg b/recipes-bsp/u-boot/files/ftpm-stmm.cfg
>> index af5da93..a6fe2a3 100644
>> --- a/recipes-bsp/u-boot/files/ftpm-stmm.cfg
>> +++ b/recipes-bsp/u-boot/files/ftpm-stmm.cfg
>> @@ -1,3 +1,6 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  ### Enable OPTEE, fTPM and StMM
>>  CONFIG_TEE=y
>>  CONFIG_OPTEE=y
>> diff --git a/recipes-bsp/u-boot/files/no-grub-workaround.cfg b/recipes-bsp/u-boot/files/no-grub-workaround.cfg
>> index dc09edd..8a01ff6 100644
>> --- a/recipes-bsp/u-boot/files/no-grub-workaround.cfg
>> +++ b/recipes-bsp/u-boot/files/no-grub-workaround.cfg
>> @@ -1,2 +1,5 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  ### Disable grub workaround
>>  # CONFIG_EFI_GRUB_ARM32_WORKAROUND is not set
>> diff --git a/recipes-bsp/u-boot/files/qemu-extra.cfg b/recipes-bsp/u-boot/files/qemu-extra.cfg
>> index e643db7..5380ad8 100644
>> --- a/recipes-bsp/u-boot/files/qemu-extra.cfg
>> +++ b/recipes-bsp/u-boot/files/qemu-extra.cfg
>> @@ -1,3 +1,6 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  ### QEMU extra config
>>  CONFIG_MMC=y
>>  CONFIG_SUPPORT_EMMC_RPMB=y
>> diff --git a/recipes-bsp/u-boot/files/secure-boot.cfg b/recipes-bsp/u-boot/files/secure-boot.cfg
>> index 694356f..7b09a53 100644
>> --- a/recipes-bsp/u-boot/files/secure-boot.cfg
>> +++ b/recipes-bsp/u-boot/files/secure-boot.cfg
>> @@ -1,3 +1,6 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  ### Secure boot config
>>  # CONFIG_BOOTSTD_DEFAULTS is not set
>>  # CONFIG_BOOTMETH_CROS is not set
>> diff --git a/recipes-bsp/u-boot/files/ti-extra.cfg b/recipes-bsp/u-boot/files/ti-extra.cfg
>> index c10d046..9500055 100644
>> --- a/recipes-bsp/u-boot/files/ti-extra.cfg
>> +++ b/recipes-bsp/u-boot/files/ti-extra.cfg
>> @@ -1,3 +1,6 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  ### FTPM + RPMB + StandaloneMM setup
>>  CONFIG_OPTEE_SERVICE_DISCOVERY=y
>>  CONFIG_TPM=y
>> diff --git a/recipes-core/customizations/files/99-silent-printk.conf b/recipes-core/customizations/files/99-silent-printk.conf
>> index ad24d3a..c5b3799 100644
>> --- a/recipes-core/customizations/files/99-silent-printk.conf
>> +++ b/recipes-core/customizations/files/99-silent-printk.conf
>> @@ -1 +1,4 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  kernel.printk = 3 4 1 3
>> diff --git a/recipes-core/customizations/files/99-watchdog.conf b/recipes-core/customizations/files/99-watchdog.conf
>> index c02756d..1f38c55 100644
>> --- a/recipes-core/customizations/files/99-watchdog.conf
>> +++ b/recipes-core/customizations/files/99-watchdog.conf
>> @@ -1,3 +1,6 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  [Manager]
>>  RuntimeWatchdogSec=60s
>>  ShutdownWatchdogSec=60s
>> diff --git a/recipes-core/customizations/files/ssh-permit-root.conf b/recipes-core/customizations/files/ssh-permit-root.conf
>> index 1073982..ab26ab5 100644
>> --- a/recipes-core/customizations/files/ssh-permit-root.conf
>> +++ b/recipes-core/customizations/files/ssh-permit-root.conf
>> @@ -1 +1,4 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  PermitRootLogin yes
>> diff --git a/recipes-core/home-fs/files/home.mount b/recipes-core/home-fs/files/home.mount
>> index 062517a..653495c 100644
>> --- a/recipes-core/home-fs/files/home.mount
>> +++ b/recipes-core/home-fs/files/home.mount
>> @@ -1,3 +1,6 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  [Unit]
>>  Description=Mount /home partition
>>  Before=local-fs.target
>> diff --git a/recipes-core/home-fs/files/postinst b/recipes-core/home-fs/files/postinst
>> index ab0db84..904aa73 100755
>> --- a/recipes-core/home-fs/files/postinst
>> +++ b/recipes-core/home-fs/files/postinst
>> @@ -1,4 +1,7 @@
>>  #!/bin/sh
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  
>>  set -e
>>  
>> diff --git a/recipes-core/immutable-rootfs/files/95-disable-package-updates.preset b/recipes-core/immutable-rootfs/files/95-disable-package-updates.preset
>> index 7e6e9ef..b3b52ce 100644
>> --- a/recipes-core/immutable-rootfs/files/95-disable-package-updates.preset
>> +++ b/recipes-core/immutable-rootfs/files/95-disable-package-updates.preset
>> @@ -1,3 +1,6 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  disable apt-daily.timer
>>  disable apt-daily-upgrade.timer
>>  disable dpkg-db-backup.timer
>> diff --git a/recipes-core/immutable-rootfs/files/immutable-rootfs.tmpfiles.tmpl b/recipes-core/immutable-rootfs/files/immutable-rootfs.tmpfiles.tmpl
>> index e6d25d2..4cdfc6f 100644
>> --- a/recipes-core/immutable-rootfs/files/immutable-rootfs.tmpfiles.tmpl
>> +++ b/recipes-core/immutable-rootfs/files/immutable-rootfs.tmpfiles.tmpl
>> @@ -1,3 +1,6 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  L /var/lib/dpkg - - - - ${IMMUTABLE_DATA_DIR}/var/lib/dpkg
>>  d /var/log/audit 0700 root adm -
>>  d /var/lib/apt 0755 root root -
>> diff --git a/recipes-core/immutable-rootfs/files/postinst b/recipes-core/immutable-rootfs/files/postinst
>> index a6e1962..3b8071e 100644
>> --- a/recipes-core/immutable-rootfs/files/postinst
>> +++ b/recipes-core/immutable-rootfs/files/postinst
>> @@ -1,4 +1,7 @@
>>  #!/bin/sh
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  
>>  set -e
>>  
>> diff --git a/recipes-core/journald-config/files/persistent-journal.conf b/recipes-core/journald-config/files/persistent-journal.conf
>> index 21dfde0..3e3419f 100644
>> --- a/recipes-core/journald-config/files/persistent-journal.conf
>> +++ b/recipes-core/journald-config/files/persistent-journal.conf
>> @@ -1,2 +1,5 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  [Journal]
>>  Storage=persistent
>> diff --git a/recipes-core/kernel-panic/files/sysrq-panic.service b/recipes-core/kernel-panic/files/sysrq-panic.service
>> index 4f199fe..e892165 100644
>> --- a/recipes-core/kernel-panic/files/sysrq-panic.service
>> +++ b/recipes-core/kernel-panic/files/sysrq-panic.service
>> @@ -1,3 +1,6 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  [Unit]
>>  Description=sysrq panic
>>  
>> diff --git a/recipes-core/ltp/files/debian/control.tmpl b/recipes-core/ltp/files/debian/control.tmpl
>> index 0bfc0c2..a7d0087 100644
>> --- a/recipes-core/ltp/files/debian/control.tmpl
>> +++ b/recipes-core/ltp/files/debian/control.tmpl
>> @@ -1,3 +1,6 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  Source: ltp-full
>>  Section: embedded
>>  Priority: optional
>> diff --git a/recipes-core/ltp/files/debian/rules b/recipes-core/ltp/files/debian/rules
>> index 4e1747c..32d3c29 100755
>> --- a/recipes-core/ltp/files/debian/rules
>> +++ b/recipes-core/ltp/files/debian/rules
>> @@ -1,4 +1,7 @@
>>  #!/usr/bin/make -f
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  export DEB_CFLAGS_MAINT_APPEND  = -Wall  -Wno-format-security
>>  export DEB_BUILD_MAINT_OPTIONS=hardening=-branch
>>  
>> diff --git a/recipes-core/move-homedir-var/files/move-homedir-var.tmpfiles.tmpl b/recipes-core/move-homedir-var/files/move-homedir-var.tmpfiles.tmpl
>> index 92e4a30..1821f92 100644
>> --- a/recipes-core/move-homedir-var/files/move-homedir-var.tmpfiles.tmpl
>> +++ b/recipes-core/move-homedir-var/files/move-homedir-var.tmpfiles.tmpl
>> @@ -1,2 +1,5 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  L /home - - - - /var/home
>>  C /var/home - - - - ${IMMUTABLE_DATA_DIR}/home
>> diff --git a/recipes-core/security-customizations/files/postinst b/recipes-core/security-customizations/files/postinst
>> index f8ebf9e..788e225 100755
>> --- a/recipes-core/security-customizations/files/postinst
>> +++ b/recipes-core/security-customizations/files/postinst
>> @@ -3,6 +3,8 @@
>>  # CIP Security, generic profile
>>  # Security Package configurations
>>  #
>> +# SPDX-License-Identifier: MIT
>> +#
>>  
>>  set -e
>>  
>> diff --git a/recipes-core/security-customizations/files/ssh-pam-remote.conf b/recipes-core/security-customizations/files/ssh-pam-remote.conf
>> index d460b0c..ea120b2 100644
>> --- a/recipes-core/security-customizations/files/ssh-pam-remote.conf
>> +++ b/recipes-core/security-customizations/files/ssh-pam-remote.conf
>> @@ -1,3 +1,6 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  # Enable PAM configuration for Remote Session
>>  ChallengeResponseAuthentication yes
>>  KbdInteractiveAuthentication yes
>> diff --git a/recipes-core/security-customizations/files/ssh-remote-session-term.conf b/recipes-core/security-customizations/files/ssh-remote-session-term.conf
>> index d11b92e..171ea9b 100644
>> --- a/recipes-core/security-customizations/files/ssh-remote-session-term.conf
>> +++ b/recipes-core/security-customizations/files/ssh-remote-session-term.conf
>> @@ -1,3 +1,6 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  # CR2.6: Remote session termination
>>  # Terminate remote session after inactive time period
>>  
>> diff --git a/recipes-core/swupdate-config-wfx/files/suricatta_wfx.conf.tmpl b/recipes-core/swupdate-config-wfx/files/suricatta_wfx.conf.tmpl
>> index 744b426..f750f3d 100644
>> --- a/recipes-core/swupdate-config-wfx/files/suricatta_wfx.conf.tmpl
>> +++ b/recipes-core/swupdate-config-wfx/files/suricatta_wfx.conf.tmpl
>> @@ -1 +1,4 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  SWUPDATE_SURICATTA_ARGS="--server lua -u ${WFX_URL} -i $(cat /etc/machine-id)"
>> diff --git a/recipes-core/swupdate-config/files/hwrevision.tmpl b/recipes-core/swupdate-config/files/hwrevision.tmpl
>> index 1eb0996..b937200 100644
>> --- a/recipes-core/swupdate-config/files/hwrevision.tmpl
>> +++ b/recipes-core/swupdate-config/files/hwrevision.tmpl
>> @@ -1 +1,4 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  cip-${MACHINE} ${MACHINE_HW_VERSION}
>> diff --git a/recipes-core/swupdate-config/files/swupdate.cfg b/recipes-core/swupdate-config/files/swupdate.cfg
>> index 3e2b45c..5c05fbe 100644
>> --- a/recipes-core/swupdate-config/files/swupdate.cfg
>> +++ b/recipes-core/swupdate-config/files/swupdate.cfg
>> @@ -1,3 +1,6 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  globals :
>>  {
>>      bootloader = "ebg";
>> diff --git a/recipes-core/swupdate-handler-roundrobin/files/swupdate.handler.efibootguard.ini b/recipes-core/swupdate-handler-roundrobin/files/swupdate.handler.efibootguard.ini
>> index 58271da..8f93cc9 100644
>> --- a/recipes-core/swupdate-handler-roundrobin/files/swupdate.handler.efibootguard.ini
>> +++ b/recipes-core/swupdate-handler-roundrobin/files/swupdate.handler.efibootguard.ini
>> @@ -1,3 +1,6 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  [image]
>>  chainhandler=raw
>>  
>> diff --git a/recipes-core/tmp-fs/files/postinst b/recipes-core/tmp-fs/files/postinst
>> index 39067f1..ae0f74a 100755
>> --- a/recipes-core/tmp-fs/files/postinst
>> +++ b/recipes-core/tmp-fs/files/postinst
>> @@ -1,4 +1,7 @@
>>  #!/bin/sh
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  
>>  set -e
>>  
>> diff --git a/recipes-devtools/swupdate-signer/files/sign-swu-cms b/recipes-devtools/swupdate-signer/files/sign-swu-cms
>> index cb0cd4a..bc1ec13 100644
>> --- a/recipes-devtools/swupdate-signer/files/sign-swu-cms
>> +++ b/recipes-devtools/swupdate-signer/files/sign-swu-cms
>> @@ -1,4 +1,7 @@
>>  #!/bin/sh
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  in_file=$1
>>  out_file=$2
>>  inkey="/usr/share/swupdate-signing/swupdate-sign.key"
>> diff --git a/recipes-initramfs/initramfs-crypt-hook/files/encrypt_partition.env.tmpl b/recipes-initramfs/initramfs-crypt-hook/files/encrypt_partition.env.tmpl
>> index bb93361..452714d 100644
>> --- a/recipes-initramfs/initramfs-crypt-hook/files/encrypt_partition.env.tmpl
>> +++ b/recipes-initramfs/initramfs-crypt-hook/files/encrypt_partition.env.tmpl
>> @@ -1,3 +1,6 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  PARTITIONS="${CRYPT_PARTITIONS}"
>>  CREATE_FILE_SYSTEM_CMD="${CRYPT_CREATE_FILE_SYSTEM_CMD}"
>>  SETUP_TIMEOUT="${CRYPT_SETUP_TIMEOUT}"
>> diff --git a/recipes-initramfs/initramfs-crypt-hook/files/pwquality.conf b/recipes-initramfs/initramfs-crypt-hook/files/pwquality.conf
>> index d4c8981..8e087f2 100644
>> --- a/recipes-initramfs/initramfs-crypt-hook/files/pwquality.conf
>> +++ b/recipes-initramfs/initramfs-crypt-hook/files/pwquality.conf
>> @@ -1,3 +1,6 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  # we don't have a dictionary in the initramfs
>>  # this solves the error "Password generation failed - required entropy too low for settings"
>>  dictcheck = 0
>> diff --git a/recipes-initramfs/initramfs-factory-reset-hook/files/factory-reset-script.tmpl b/recipes-initramfs/initramfs-factory-reset-hook/files/factory-reset-script.tmpl
>> index f0ad40c..94b5f8b 100644
>> --- a/recipes-initramfs/initramfs-factory-reset-hook/files/factory-reset-script.tmpl
>> +++ b/recipes-initramfs/initramfs-factory-reset-hook/files/factory-reset-script.tmpl
>> @@ -7,6 +7,8 @@
>>  # Authors:
>>  #  Quirin Gylstorff <quirin.gylstorff@siemens.com>
>>  #
>> +# SPDX-License-Identifier: MIT
>> +#
>>  . /usr/share/factory-reset/reset-env
>>  
>>  . /scripts/cip-initramfs-functions
>> diff --git a/recipes-initramfs/initramfs-factory-reset-hook/files/reset-env.tmpl b/recipes-initramfs/initramfs-factory-reset-hook/files/reset-env.tmpl
>> index d3e18a2..07e2376 100644
>> --- a/recipes-initramfs/initramfs-factory-reset-hook/files/reset-env.tmpl
>> +++ b/recipes-initramfs/initramfs-factory-reset-hook/files/reset-env.tmpl
>> @@ -1,3 +1,6 @@
>>  #!/bin/sh
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  INITRAMFS_FACTORY_RESET_DEVICES="${INITRAMFS_FACTORY_RESET_DEVICES}"
>>  INITRAMFS_FACTORY_RESET_LUKS_FORMAT_TYPE="${INITRAMFS_FACTORY_RESET_LUKS_FORMAT_TYPE}"
>> diff --git a/recipes-initramfs/initramfs-overlay-hook/files/local-bottom.tmpl b/recipes-initramfs/initramfs-overlay-hook/files/local-bottom.tmpl
>> index bce588c..8a697f8 100644
>> --- a/recipes-initramfs/initramfs-overlay-hook/files/local-bottom.tmpl
>> +++ b/recipes-initramfs/initramfs-overlay-hook/files/local-bottom.tmpl
>> @@ -7,6 +7,8 @@
>>  #  Jan Kiszka <jan.kiszka@siemens.com>
>>  #  Quirin Gylstorff <quirin.gylstorff@siemens.com>
>>  #
>> +# SPDX-License-Identifier: MIT
>> +#
>>  
>>  ovl_storage_path="${INITRAMFS_OVERLAY_STORAGE_PATH}"
>>  ovl_lower_dirs="${INITRAMFS_OVERLAY_PATHS}"
>> diff --git a/recipes-initramfs/initramfs-overlay-hook/files/overlay_recovery_action.script b/recipes-initramfs/initramfs-overlay-hook/files/overlay_recovery_action.script
>> index 0cd084b..11ca731 100644
>> --- a/recipes-initramfs/initramfs-overlay-hook/files/overlay_recovery_action.script
>> +++ b/recipes-initramfs/initramfs-overlay-hook/files/overlay_recovery_action.script
>> @@ -7,6 +7,8 @@
>>  # Authors:
>>  #  Clara Kowalsky <clara.kowalsky@siemens.com>
>>  #
>> +# SPDX-License-Identifier: MIT
>> +#
>>  
>>  partition_fstype="$1"
>>  ovl_partition_device="$2"
>> diff --git a/recipes-kernel/linux/files/no-module-signing.cfg b/recipes-kernel/linux/files/no-module-signing.cfg
>> index ab54f68..064ef9c 100644
>> --- a/recipes-kernel/linux/files/no-module-signing.cfg
>> +++ b/recipes-kernel/linux/files/no-module-signing.cfg
>> @@ -1,2 +1,5 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  # CONFIG_SECURITY_LOCKDOWN_LSM is not set
>>  # CONFIG_MODULE_SIG is not set
>> diff --git a/recipes-kernel/linux/files/no-tpm-hwrng.cfg b/recipes-kernel/linux/files/no-tpm-hwrng.cfg
>> index ab46cd8..08e98ff 100644
>> --- a/recipes-kernel/linux/files/no-tpm-hwrng.cfg
>> +++ b/recipes-kernel/linux/files/no-tpm-hwrng.cfg
>> @@ -1,2 +1,5 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  # see https://lore.kernel.org/lkml/bbc41534-a2d9-42dc-ac8a-ff8a0b4fd41f@siemens.com/
>>  # CONFIG_HW_RANDOM_TPM is not set
>> diff --git a/recipes-kernel/linux/files/preempt-rt.cfg b/recipes-kernel/linux/files/preempt-rt.cfg
>> index afbf53d..f558365 100644
>> --- a/recipes-kernel/linux/files/preempt-rt.cfg
>> +++ b/recipes-kernel/linux/files/preempt-rt.cfg
>> @@ -1,3 +1,6 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  # >= 5.10
>>  CONFIG_EXPERT=y
>>  CONFIG_PREEMPT_RT=y
>> diff --git a/recipes-security/fail2ban-config/files/systemd-defaults.conf b/recipes-security/fail2ban-config/files/systemd-defaults.conf
>> index 16e0d5e..32a8e48 100644
>> --- a/recipes-security/fail2ban-config/files/systemd-defaults.conf
>> +++ b/recipes-security/fail2ban-config/files/systemd-defaults.conf
>> @@ -1,3 +1,6 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  [DEFAULT]
>>  
>>  syslog_backend = systemd
>> diff --git a/scripts/deploy-cip-core.sh b/scripts/deploy-cip-core.sh
>> index 623c216..1e08e47 100755
>> --- a/scripts/deploy-cip-core.sh
>> +++ b/scripts/deploy-cip-core.sh
>> @@ -1,4 +1,7 @@
>>  #!/bin/sh
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  
>>  set -e
>>  
>> diff --git a/scripts/generate-sb-db-from-existing-certificate.sh b/scripts/generate-sb-db-from-existing-certificate.sh
>> index dddd9b5..42d09dd 100755
>> --- a/scripts/generate-sb-db-from-existing-certificate.sh
>> +++ b/scripts/generate-sb-db-from-existing-certificate.sh
>> @@ -1,4 +1,7 @@
>>  #!/bin/sh
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  
>>  set -e
>>  
>> diff --git a/scripts/generate_secure_boot_keys.sh b/scripts/generate_secure_boot_keys.sh
>> index 8be0569..28ae34c 100755
>> --- a/scripts/generate_secure_boot_keys.sh
>> +++ b/scripts/generate_secure_boot_keys.sh
>> @@ -1,4 +1,7 @@
>>  #!/bin/sh
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  
>>  set -e
>>  
>> diff --git a/scripts/start-efishell.sh b/scripts/start-efishell.sh
>> index fff8a6a..86e2ddd 100755
>> --- a/scripts/start-efishell.sh
>> +++ b/scripts/start-efishell.sh
>> @@ -1,4 +1,7 @@
>>  #!/bin/sh
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  
>>  set -e
>>  
>> diff --git a/scripts/submit_lava.sh b/scripts/submit_lava.sh
>> index b3180a1..a4d20ec 100755
>> --- a/scripts/submit_lava.sh
>> +++ b/scripts/submit_lava.sh
>> @@ -1,4 +1,7 @@
>>  #!/bin/bash
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  # Copyright (C) 2024, Renesas Electronics Europe GmbH
>>  # Chris Paterson <chris.paterson2@renesas.com>
>>  # Sai Ashrith <sai.sathujoda@toshiba-tsip.com>
>> diff --git a/scripts/update-linux-cip.sh b/scripts/update-linux-cip.sh
>> index 5fbfa57..df306b2 100755
>> --- a/scripts/update-linux-cip.sh
>> +++ b/scripts/update-linux-cip.sh
>> @@ -1,4 +1,7 @@
>>  #!/bin/bash
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  REPO_ROOT=$(git rev-parse --show-toplevel)
>>  pushd "${REPO_ROOT}"/recipes-kernel/linux >/dev/null || exit 1
>>  
>> diff --git a/scripts/update-ltp.sh b/scripts/update-ltp.sh
>> index dc8b947..321cc3c 100755
>> --- a/scripts/update-ltp.sh
>> +++ b/scripts/update-ltp.sh
>> @@ -1,4 +1,7 @@
>>  #!/bin/bash
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  
>>  REPO_ROOT=$(git rev-parse --show-toplevel)
>>  pushd "${REPO_ROOT}"/recipes-core/ltp > /dev/null || exit
>> diff --git a/tests/templates/IEC_template.yml b/tests/templates/IEC_template.yml
>> index f8558cd..148f07e 100644
>> --- a/tests/templates/IEC_template.yml
>> +++ b/tests/templates/IEC_template.yml
>> @@ -1,3 +1,6 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  device_type: qemu
>>  job_name: #architecture# IEC layer testing
>>  timeouts:
>> diff --git a/tests/templates/secureboot_corrupt_rootfs_steps.yml b/tests/templates/secureboot_corrupt_rootfs_steps.yml
>> index b6f6628..5c47b30 100644
>> --- a/tests/templates/secureboot_corrupt_rootfs_steps.yml
>> +++ b/tests/templates/secureboot_corrupt_rootfs_steps.yml
>> @@ -1,3 +1,6 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>            - "apt-get update"
>>            - "apt install -y fdisk"
>>            - "rootfs_start_sector=$(fdisk -l -o Name,Start cip-core-image-security-cip-core-#distribution#-#architecture#.wic | awk -v name=systema '$0 ~ name {print $2}')"
>> diff --git a/tests/templates/secureboot_negative_test.yml b/tests/templates/secureboot_negative_test.yml
>> index 2fcdbfa..a8e4226 100644
>> --- a/tests/templates/secureboot_negative_test.yml
>> +++ b/tests/templates/secureboot_negative_test.yml
>> @@ -1,3 +1,6 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  device_type: qemu
>>  job_name: #architecture# secure boot testing
>>  timeouts:
>> diff --git a/tests/templates/secureboot_template.yml b/tests/templates/secureboot_template.yml
>> index e29b64a..0a075e2 100644
>> --- a/tests/templates/secureboot_template.yml
>> +++ b/tests/templates/secureboot_template.yml
>> @@ -1,3 +1,6 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  device_type: qemu
>>  job_name: #architecture# secure boot testing
>>  timeouts:
>> diff --git a/tests/templates/secureboot_unsigned_bootloader_steps.yml b/tests/templates/secureboot_unsigned_bootloader_steps.yml
>> index 8d64b05..f4f4043 100644
>> --- a/tests/templates/secureboot_unsigned_bootloader_steps.yml
>> +++ b/tests/templates/secureboot_unsigned_bootloader_steps.yml
>> @@ -1,3 +1,6 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>            - "apt-get update"
>>            - "apt install --yes guestfish sbsigntool"
>>            - "guestfish add cip-core-image-security-cip-core-#distribution#-#architecture#.wic : run : mount /dev/sda1 / : copy-out /EFI/BOOT/bootx64.efi ."
>> diff --git a/tests/templates/secureboot_unsigned_kernel_steps.yml b/tests/templates/secureboot_unsigned_kernel_steps.yml
>> index f097ed6..6ab334a 100644
>> --- a/tests/templates/secureboot_unsigned_kernel_steps.yml
>> +++ b/tests/templates/secureboot_unsigned_kernel_steps.yml
>> @@ -1,3 +1,6 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>            - "apt-get update"
>>            - "apt install --yes guestfish sbsigntool"
>>            - "guestfish add cip-core-image-security-cip-core-#distribution#-#architecture#.wic : run : mount /dev/sda2 / : copy-out /linux.efi ."
>> diff --git a/tests/templates/swupdate-test-action-M-COM.yml b/tests/templates/swupdate-test-action-M-COM.yml
>> index 56ff106..69c9cb7 100644
>> --- a/tests/templates/swupdate-test-action-M-COM.yml
>> +++ b/tests/templates/swupdate-test-action-M-COM.yml
>> @@ -1,3 +1,6 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  # TEST BLOCK 1
>>  # Fail the job if software update application failed
>>  - test:
>> diff --git a/tests/templates/swupdate_corrupt_swu_artifact_steps.yml b/tests/templates/swupdate_corrupt_swu_artifact_steps.yml
>> index 2fad3fd..043867e 100644
>> --- a/tests/templates/swupdate_corrupt_swu_artifact_steps.yml
>> +++ b/tests/templates/swupdate_corrupt_swu_artifact_steps.yml
>> @@ -1,3 +1,6 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>              - curl -v --trace-time http://$LAVA_DISPATCHER_IP/tmp/$LAVA_JOB_ID/downloads/common/cip-core-image-security-cip-core-#distribution#-#architecture#.swu --output /root/cip-core-image-security-cip-core-#distribution#-#architecture#.swu
>>              - mkdir -p swu
>>              - cpio -ivd --directory=/root/swu < /root/cip-core-image-security-cip-core-#distribution#-#architecture#.swu
>> diff --git a/tests/templates/swupdate_corrupt_swu_steps.yml b/tests/templates/swupdate_corrupt_swu_steps.yml
>> index 74c9217..3cdb793 100644
>> --- a/tests/templates/swupdate_corrupt_swu_steps.yml
>> +++ b/tests/templates/swupdate_corrupt_swu_steps.yml
>> @@ -1,3 +1,6 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>              - curl -v --trace-time http://$LAVA_DISPATCHER_IP/tmp/$LAVA_JOB_ID/downloads/common/cip-core-image-security-cip-core-#distribution#-#architecture#.swu --output /root/cip-core-image-security-cip-core-#distribution#-#architecture#.swu
>>              - mkdir -p swu
>>              - dd if=/dev/zero of=/root/cip-core-image-security-cip-core-#distribution#-#architecture#.swu bs=1M count=5
>> diff --git a/tests/templates/swupdate_negative_test.yml b/tests/templates/swupdate_negative_test.yml
>> index bb79b07..250eaa8 100644
>> --- a/tests/templates/swupdate_negative_test.yml
>> +++ b/tests/templates/swupdate_negative_test.yml
>> @@ -1,3 +1,6 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  device_type: qemu
>>  job_name: #architecture# software update testing
>>  timeouts:
>> diff --git a/tests/templates/swupdate_reboot_without_confirm.yml b/tests/templates/swupdate_reboot_without_confirm.yml
>> index bfad106..074eb1a 100644
>> --- a/tests/templates/swupdate_reboot_without_confirm.yml
>> +++ b/tests/templates/swupdate_reboot_without_confirm.yml
>> @@ -1,3 +1,6 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  # qemu-swtpm.sock will be gone after soft reboot.
>>  # So the swtpm socket need to be started again for proper reboot
>>  # To start the swtpm daemon, first the existing one should be killed
>> diff --git a/tests/templates/swupdate_same_uuid_steps.yml b/tests/templates/swupdate_same_uuid_steps.yml
>> index 3ff2e02..8329055 100644
>> --- a/tests/templates/swupdate_same_uuid_steps.yml
>> +++ b/tests/templates/swupdate_same_uuid_steps.yml
>> @@ -1,3 +1,6 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>              - curl -v --trace-time http://$LAVA_DISPATCHER_IP/tmp/$LAVA_JOB_ID/downloads/common/cip-core-image-security-cip-core-#distribution#-#architecture#.swu --output /root/cip-core-image-security-cip-core-#distribution#-#architecture#.swu
>>              - mkdir -p swu
>>              - cpio -ivd --directory=/root/swu < /root/cip-core-image-security-cip-core-#distribution#-#architecture#.swu
>> diff --git a/tests/templates/swupdate_template.yml b/tests/templates/swupdate_template.yml
>> index e1f71a9..9a3366b 100644
>> --- a/tests/templates/swupdate_template.yml
>> +++ b/tests/templates/swupdate_template.yml
>> @@ -1,3 +1,6 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  device_type: qemu
>>  job_name: #architecture# software update testing
>>  timeouts:
>> diff --git a/wic/ebg-signed-sysparts.inc b/wic/ebg-signed-sysparts.inc
>> index c35878f..8210598 100644
>> --- a/wic/ebg-signed-sysparts.inc
>> +++ b/wic/ebg-signed-sysparts.inc
>> @@ -1,3 +1,6 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  # default partition layout EFI Boot Guard usage, signed version
>>  
>>  # EFI partition containing efibootguard bootloader binary
>> diff --git a/wic/ebg-sysparts.inc b/wic/ebg-sysparts.inc
>> index 0290024..b7f1afa 100644
>> --- a/wic/ebg-sysparts.inc
>> +++ b/wic/ebg-sysparts.inc
>> @@ -1,3 +1,6 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  # default partition layout EFI Boot Guard usage
>>  
>>  # EFI partition containing efibootguard bootloader binary
>> diff --git a/wic/hihope-rzg2m-efibootguard.wks.in b/wic/hihope-rzg2m-efibootguard.wks.in
>> index fdbad14..99c8d10 100644
>> --- a/wic/hihope-rzg2m-efibootguard.wks.in
>> +++ b/wic/hihope-rzg2m-efibootguard.wks.in
>> @@ -1,3 +1,6 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  # short-description: RZ/G2M image with EFI Boot Guard and SWUpdate
>>  # long-description: Disk image for HiHope RZ/G2M board with EFI Boot Guard and SWUpdate
>>  
>> diff --git a/wic/qemu-arm64-efibootguard-secureboot.wks.in b/wic/qemu-arm64-efibootguard-secureboot.wks.in
>> index 941a552..88eb91c 100644
>> --- a/wic/qemu-arm64-efibootguard-secureboot.wks.in
>> +++ b/wic/qemu-arm64-efibootguard-secureboot.wks.in
>> @@ -1,3 +1,6 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  include ebg-signed-sysparts.inc
>>  
>>  part --source rawcopy --sourceparams "file=${IMAGE_FULLNAME}.verity" --align 1024 --fixed-size 1G --uuid "${ABROOTFS_PART_UUID_A}" --part-type 0FC63DAF-8483-4772-8E79-3D69D8477DE4 --part-name systema
>> diff --git a/wic/qemu-arm64-efibootguard.wks.in b/wic/qemu-arm64-efibootguard.wks.in
>> index 21c0b24..117c47c 100644
>> --- a/wic/qemu-arm64-efibootguard.wks.in
>> +++ b/wic/qemu-arm64-efibootguard.wks.in
>> @@ -1,3 +1,6 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  # short-description: arm64 with EFI Boot Guard and SWUpdate
>>  # long-description: Disk image for arm64 machines with EFI Boot Guard and SWUpdate
>>  
>> diff --git a/wic/qemu-riscv64-efibootguard.wks.in b/wic/qemu-riscv64-efibootguard.wks.in
>> index 948c67d..a5dd09b 100644
>> --- a/wic/qemu-riscv64-efibootguard.wks.in
>> +++ b/wic/qemu-riscv64-efibootguard.wks.in
>> @@ -1,3 +1,6 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  # short-description: riscv64 with EFI Boot Guard and SWUpdate
>>  # long-description: Disk image for riscv64 machines with EFI Boot Guard and SWUpdate
>>  
>> diff --git a/wic/x86-uefi-efibootguard-secureboot.wks.in b/wic/x86-uefi-efibootguard-secureboot.wks.in
>> index 2af3e58..f15f9e0 100644
>> --- a/wic/x86-uefi-efibootguard-secureboot.wks.in
>> +++ b/wic/x86-uefi-efibootguard-secureboot.wks.in
>> @@ -1,3 +1,6 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  include ebg-signed-sysparts.inc
>>  
>>  part --source rawcopy --sourceparams "file=${IMAGE_FULLNAME}.verity" --align 1024 --fixed-size 1G --uuid "${ABROOTFS_PART_UUID_A}" --part-type 0FC63DAF-8483-4772-8E79-3D69D8477DE4 --part-name systema
>> diff --git a/wic/x86-uefi-efibootguard.wks.in b/wic/x86-uefi-efibootguard.wks.in
>> index 3640ecf..982a87a 100644
>> --- a/wic/x86-uefi-efibootguard.wks.in
>> +++ b/wic/x86-uefi-efibootguard.wks.in
>> @@ -1,3 +1,6 @@
>> +#
>> +# SPDX-License-Identifier: MIT
>> +#
>>  # short-description: x86 with EFI Boot Guard and SWUpdate
>>  # long-description: Disk image for x86 machines with EFI Boot Guard and SWUpdate
>>  
>>
>> ---
>> base-commit: e3158569eee297f1837a6d3fd7e0f1a0534c2b8b
>> change-id: 20260316-license-c5fcde3618d2
>>
>> Best regards,
> 
> Thanks, applied. Will follow up with fixing two more spots so that we
> are only left with files that cannot receive headers.
> 

Quirin spotted that modifying hwrevision.tmpl is causing our red
pipeline rigth now. I've dropped that changed and force-pushed the update.

Jan

-- 
Siemens AG, Foundational Technologies
Linux Expert Center


  parent reply	other threads:[~2026-03-26 12:05 UTC|newest]

Thread overview: 5+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-03-24  8:40 [PATCH isar-cip-core v2] *: Add SPDX-License-Identifier MIT header Kamlesh Gurudasani
2026-03-24 14:39 ` Jan Kiszka
2026-03-25  5:46   ` dinesh.kumar
2026-03-26 12:05   ` Jan Kiszka [this message]
2026-03-26 15:10     ` Jan Kiszka

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=cf8bf9cd-bb30-40eb-ac4d-2a3b27dc31d6@siemens.com \
    --to=jan.kiszka@siemens.com \
    --cc=cip-dev@lists.cip-project.org \
    --cc=dinesh.kumar@toshiba-tsip.com \
    --cc=kamlesh@ti.com \
    --cc=pavel@denx.de \
    --cc=quirin.gylstorff@siemens.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox