Initial commit
@@ -0,0 +1,59 @@
|
||||
.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
|
||||
|
||||
Flashing Images Using ``bmaptool``
|
||||
**********************************
|
||||
|
||||
A fast and easy way to flash an image to a bootable device is to use
|
||||
Bmaptool, which is integrated into the OpenEmbedded build system.
|
||||
Bmaptool is a generic tool that creates a file's block map (bmap) and
|
||||
then uses that map to copy the file. As compared to traditional tools
|
||||
such as dd or cp, Bmaptool can copy (or flash) large files like raw
|
||||
system image files much faster.
|
||||
|
||||
.. note::
|
||||
|
||||
- If you are using Ubuntu or Debian distributions, you can install
|
||||
the ``bmap-tools`` package using the following command and then
|
||||
use the tool without specifying ``PATH`` even from the root
|
||||
account::
|
||||
|
||||
$ sudo apt install bmap-tools
|
||||
|
||||
- If you are unable to install the ``bmap-tools`` package, you will
|
||||
need to build Bmaptool before using it. Use the following command::
|
||||
|
||||
$ bitbake bmap-tools-native
|
||||
|
||||
Following, is an example that shows how to flash a Wic image. Realize
|
||||
that while this example uses a Wic image, you can use Bmaptool to flash
|
||||
any type of image. Use these steps to flash an image using Bmaptool:
|
||||
|
||||
#. *Update your local.conf File:* You need to have the following set
|
||||
in your ``local.conf`` file before building your image::
|
||||
|
||||
IMAGE_FSTYPES += "wic wic.bmap"
|
||||
|
||||
#. *Get Your Image:* Either have your image ready (pre-built with the
|
||||
:term:`IMAGE_FSTYPES`
|
||||
setting previously mentioned) or take the step to build the image::
|
||||
|
||||
$ bitbake image
|
||||
|
||||
#. *Flash the Device:* Flash the device with the image by using Bmaptool
|
||||
depending on your particular setup. The following commands assume the
|
||||
image resides in the :term:`Build Directory`'s ``deploy/images/`` area:
|
||||
|
||||
- If you have write access to the media, use this command form::
|
||||
|
||||
$ oe-run-native bmap-tools-native bmaptool copy build-directory/tmp/deploy/images/machine/image.wic /dev/sdX
|
||||
|
||||
- If you do not have write access to the media, set your permissions
|
||||
first and then use the same command form::
|
||||
|
||||
$ sudo chmod 666 /dev/sdX
|
||||
$ oe-run-native bmap-tools-native bmaptool copy build-directory/tmp/deploy/images/machine/image.wic /dev/sdX
|
||||
|
||||
For help on the ``bmaptool`` command, use the following command::
|
||||
|
||||
$ bmaptool --help
|
||||
|
||||
@@ -0,0 +1,409 @@
|
||||
.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
|
||||
|
||||
Maintaining Build Output Quality
|
||||
********************************
|
||||
|
||||
Many factors can influence the quality of a build. For example, if you
|
||||
upgrade a recipe to use a new version of an upstream software package or
|
||||
you experiment with some new configuration options, subtle changes can
|
||||
occur that you might not detect until later. Consider the case where
|
||||
your recipe is using a newer version of an upstream package. In this
|
||||
case, a new version of a piece of software might introduce an optional
|
||||
dependency on another library, which is auto-detected. If that library
|
||||
has already been built when the software is building, the software will
|
||||
link to the built library and that library will be pulled into your
|
||||
image along with the new software even if you did not want the library.
|
||||
|
||||
The :ref:`ref-classes-buildhistory` class helps you maintain the quality of
|
||||
your build output. You can use the class to highlight unexpected and possibly
|
||||
unwanted changes in the build output. When you enable build history, it records
|
||||
information about the contents of each package and image and then commits that
|
||||
information to a local Git repository where you can examine the information.
|
||||
|
||||
The remainder of this section describes the following:
|
||||
|
||||
- :ref:`How you can enable and disable build history <dev-manual/build-quality:enabling and disabling build history>`
|
||||
|
||||
- :ref:`How to understand what the build history contains <dev-manual/build-quality:understanding what the build history contains>`
|
||||
|
||||
- :ref:`How to limit the information used for build history <dev-manual/build-quality:using build history to gather image information only>`
|
||||
|
||||
- :ref:`How to examine the build history from both a command-line and web interface <dev-manual/build-quality:examining build history information>`
|
||||
|
||||
Enabling and Disabling Build History
|
||||
====================================
|
||||
|
||||
Build history is disabled by default. To enable it, add the following
|
||||
:term:`INHERIT` statement and set the :term:`BUILDHISTORY_COMMIT` variable to
|
||||
"1" at the end of your ``conf/local.conf`` file found in the
|
||||
:term:`Build Directory`::
|
||||
|
||||
INHERIT += "buildhistory"
|
||||
BUILDHISTORY_COMMIT = "1"
|
||||
|
||||
Enabling build history as
|
||||
previously described causes the OpenEmbedded build system to collect
|
||||
build output information and commit it as a single commit to a local
|
||||
:ref:`overview-manual/development-environment:git` repository.
|
||||
|
||||
.. note::
|
||||
|
||||
Enabling build history increases your build times slightly,
|
||||
particularly for images, and increases the amount of disk space used
|
||||
during the build.
|
||||
|
||||
You can disable build history by removing the previous statements from
|
||||
your ``conf/local.conf`` file.
|
||||
|
||||
Understanding What the Build History Contains
|
||||
=============================================
|
||||
|
||||
Build history information is kept in ``${``\ :term:`TOPDIR`\ ``}/buildhistory``
|
||||
in the :term:`Build Directory` as defined by the :term:`BUILDHISTORY_DIR`
|
||||
variable. Here is an example abbreviated listing:
|
||||
|
||||
.. image:: figures/buildhistory.png
|
||||
:align: center
|
||||
:width: 50%
|
||||
|
||||
At the top level, there is a ``metadata-revs`` file that lists the
|
||||
revisions of the repositories for the enabled layers when the build was
|
||||
produced. The rest of the data splits into separate ``packages``,
|
||||
``images`` and ``sdk`` directories, the contents of which are described
|
||||
as follows.
|
||||
|
||||
Build History Package Information
|
||||
---------------------------------
|
||||
|
||||
The history for each package contains a text file that has name-value
|
||||
pairs with information about the package. For example,
|
||||
``buildhistory/packages/i586-poky-linux/busybox/busybox/latest``
|
||||
contains the following:
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
PV = 1.22.1
|
||||
PR = r32
|
||||
RPROVIDES =
|
||||
RDEPENDS = glibc (>= 2.20) update-alternatives-opkg
|
||||
RRECOMMENDS = busybox-syslog busybox-udhcpc update-rc.d
|
||||
PKGSIZE = 540168
|
||||
FILES = /usr/bin/* /usr/sbin/* /usr/lib/busybox/* /usr/lib/lib*.so.* \
|
||||
/etc /com /var /bin/* /sbin/* /lib/*.so.* /lib/udev/rules.d \
|
||||
/usr/lib/udev/rules.d /usr/share/busybox /usr/lib/busybox/* \
|
||||
/usr/share/pixmaps /usr/share/applications /usr/share/idl \
|
||||
/usr/share/omf /usr/share/sounds /usr/lib/bonobo/servers
|
||||
FILELIST = /bin/busybox /bin/busybox.nosuid /bin/busybox.suid /bin/sh \
|
||||
/etc/busybox.links.nosuid /etc/busybox.links.suid
|
||||
|
||||
Most of these
|
||||
name-value pairs correspond to variables used to produce the package.
|
||||
The exceptions are ``FILELIST``, which is the actual list of files in
|
||||
the package, and ``PKGSIZE``, which is the total size of files in the
|
||||
package in bytes.
|
||||
|
||||
There is also a file that corresponds to the recipe from which the package
|
||||
came (e.g. ``buildhistory/packages/i586-poky-linux/busybox/latest``):
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
PV = 1.22.1
|
||||
PR = r32
|
||||
DEPENDS = initscripts kern-tools-native update-rc.d-native \
|
||||
virtual/i586-poky-linux-compilerlibs virtual/i586-poky-linux-gcc \
|
||||
virtual/libc virtual/update-alternatives
|
||||
PACKAGES = busybox-ptest busybox-httpd busybox-udhcpd busybox-udhcpc \
|
||||
busybox-syslog busybox-mdev busybox-hwclock busybox-dbg \
|
||||
busybox-staticdev busybox-dev busybox-doc busybox-locale busybox
|
||||
|
||||
Finally, for those recipes fetched from a version control system (e.g.,
|
||||
Git), there is a file that lists source revisions that are specified in
|
||||
the recipe and the actual revisions used during the build. Listed
|
||||
and actual revisions might differ when
|
||||
:term:`SRCREV` is set to
|
||||
${:term:`AUTOREV`}. Here is an
|
||||
example assuming
|
||||
``buildhistory/packages/qemux86-poky-linux/linux-yocto/latest_srcrev``)::
|
||||
|
||||
# SRCREV_machine = "38cd560d5022ed2dbd1ab0dca9642e47c98a0aa1"
|
||||
SRCREV_machine = "38cd560d5022ed2dbd1ab0dca9642e47c98a0aa1"
|
||||
# SRCREV_meta = "a227f20eff056e511d504b2e490f3774ab260d6f"
|
||||
SRCREV_meta ="a227f20eff056e511d504b2e490f3774ab260d6f"
|
||||
|
||||
You can use the
|
||||
``buildhistory-collect-srcrevs`` command with the ``-a`` option to
|
||||
collect the stored :term:`SRCREV` values from build history and report them
|
||||
in a format suitable for use in global configuration (e.g.,
|
||||
``local.conf`` or a distro include file) to override floating
|
||||
:term:`AUTOREV` values to a fixed set of revisions. Here is some example
|
||||
output from this command::
|
||||
|
||||
$ buildhistory-collect-srcrevs -a
|
||||
# all-poky-linux
|
||||
SRCREV:pn-ca-certificates = "07de54fdcc5806bde549e1edf60738c6bccf50e8"
|
||||
SRCREV:pn-update-rc.d = "8636cf478d426b568c1be11dbd9346f67e03adac"
|
||||
# core2-64-poky-linux
|
||||
SRCREV:pn-binutils = "87d4632d36323091e731eb07b8aa65f90293da66"
|
||||
SRCREV:pn-btrfs-tools = "8ad326b2f28c044cb6ed9016d7c3285e23b673c8"
|
||||
SRCREV_bzip2-tests:pn-bzip2 = "f9061c030a25de5b6829e1abf373057309c734c0"
|
||||
SRCREV:pn-e2fsprogs = "02540dedd3ddc52c6ae8aaa8a95ce75c3f8be1c0"
|
||||
SRCREV:pn-file = "504206e53a89fd6eed71aeaf878aa3512418eab1"
|
||||
SRCREV_glibc:pn-glibc = "24962427071fa532c3c48c918e9d64d719cc8a6c"
|
||||
SRCREV:pn-gnome-desktop-testing = "e346cd4ed2e2102c9b195b614f3c642d23f5f6e7"
|
||||
SRCREV:pn-init-system-helpers = "dbd9197569c0935029acd5c9b02b84c68fd937ee"
|
||||
SRCREV:pn-kmod = "b6ecfc916a17eab8f93be5b09f4e4f845aabd3d1"
|
||||
SRCREV:pn-libnsl2 = "82245c0c58add79a8e34ab0917358217a70e5100"
|
||||
SRCREV:pn-libseccomp = "57357d2741a3b3d3e8425889a6b79a130e0fa2f3"
|
||||
SRCREV:pn-libxcrypt = "50cf2b6dd4fdf04309445f2eec8de7051d953abf"
|
||||
SRCREV:pn-ncurses = "51d0fd9cc3edb975f04224f29f777f8f448e8ced"
|
||||
SRCREV:pn-procps = "19a508ea121c0c4ac6d0224575a036de745eaaf8"
|
||||
SRCREV:pn-psmisc = "5fab6b7ab385080f1db725d6803136ec1841a15f"
|
||||
SRCREV:pn-ptest-runner = "bcb82804daa8f725b6add259dcef2067e61a75aa"
|
||||
SRCREV:pn-shared-mime-info = "18e558fa1c8b90b86757ade09a4ba4d6a6cf8f70"
|
||||
SRCREV:pn-zstd = "e47e674cd09583ff0503f0f6defd6d23d8b718d3"
|
||||
# qemux86_64-poky-linux
|
||||
SRCREV_machine:pn-linux-yocto = "20301aeb1a64164b72bc72af58802b315e025c9c"
|
||||
SRCREV_meta:pn-linux-yocto = "2d38a472b21ae343707c8bd64ac68a9eaca066a0"
|
||||
# x86_64-linux
|
||||
SRCREV:pn-binutils-cross-x86_64 = "87d4632d36323091e731eb07b8aa65f90293da66"
|
||||
SRCREV_glibc:pn-cross-localedef-native = "24962427071fa532c3c48c918e9d64d719cc8a6c"
|
||||
SRCREV_localedef:pn-cross-localedef-native = "794da69788cbf9bf57b59a852f9f11307663fa87"
|
||||
SRCREV:pn-debianutils-native = "de14223e5bffe15e374a441302c528ffc1cbed57"
|
||||
SRCREV:pn-libmodulemd-native = "ee80309bc766d781a144e6879419b29f444d94eb"
|
||||
SRCREV:pn-virglrenderer-native = "363915595e05fb252e70d6514be2f0c0b5ca312b"
|
||||
SRCREV:pn-zstd-native = "e47e674cd09583ff0503f0f6defd6d23d8b718d3"
|
||||
|
||||
.. note::
|
||||
|
||||
Here are some notes on using the ``buildhistory-collect-srcrevs`` command:
|
||||
|
||||
- By default, only values where the :term:`SRCREV` was not hardcoded
|
||||
(usually when :term:`AUTOREV` is used) are reported. Use the ``-a``
|
||||
option to see all :term:`SRCREV` values.
|
||||
|
||||
- The output statements might not have any effect if overrides are
|
||||
applied elsewhere in the build system configuration. Use the
|
||||
``-f`` option to add the ``forcevariable`` override to each output
|
||||
line if you need to work around this restriction.
|
||||
|
||||
- The script does apply special handling when building for multiple
|
||||
machines. However, the script does place a comment before each set
|
||||
of values that specifies which triplet to which they belong as
|
||||
previously shown (e.g., ``i586-poky-linux``).
|
||||
|
||||
Build History Image Information
|
||||
-------------------------------
|
||||
|
||||
The files produced for each image are as follows:
|
||||
|
||||
- ``image-files:`` A directory containing selected files from the root
|
||||
filesystem. The files are defined by
|
||||
:term:`BUILDHISTORY_IMAGE_FILES`.
|
||||
|
||||
- ``build-id.txt:`` Human-readable information about the build
|
||||
configuration and metadata source revisions. This file contains the
|
||||
full build header as printed by BitBake.
|
||||
|
||||
- ``*.dot:`` Dependency graphs for the image that are compatible with
|
||||
``graphviz``.
|
||||
|
||||
- ``files-in-image.txt:`` A list of files in the image with
|
||||
permissions, owner, group, size, and symlink information.
|
||||
|
||||
- ``image-info.txt:`` A text file containing name-value pairs with
|
||||
information about the image. See the following listing example for
|
||||
more information.
|
||||
|
||||
- ``installed-package-names.txt:`` A list of installed packages by name
|
||||
only.
|
||||
|
||||
- ``installed-package-sizes.txt:`` A list of installed packages ordered
|
||||
by size.
|
||||
|
||||
- ``installed-packages.txt:`` A list of installed packages with full
|
||||
package filenames.
|
||||
|
||||
.. note::
|
||||
|
||||
Installed package information is able to be gathered and produced
|
||||
even if package management is disabled for the final image.
|
||||
|
||||
Here is an example of ``image-info.txt``:
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
DISTRO = poky
|
||||
DISTRO_VERSION = 3.4+snapshot-a0245d7be08f3d24ea1875e9f8872aa6bbff93be
|
||||
USER_CLASSES = buildstats
|
||||
IMAGE_CLASSES = qemuboot qemuboot license_image
|
||||
IMAGE_FEATURES = debug-tweaks
|
||||
IMAGE_LINGUAS =
|
||||
IMAGE_INSTALL = packagegroup-core-boot speex speexdsp
|
||||
BAD_RECOMMENDATIONS =
|
||||
NO_RECOMMENDATIONS =
|
||||
PACKAGE_EXCLUDE =
|
||||
ROOTFS_POSTPROCESS_COMMAND = write_package_manifest; license_create_manifest; cve_check_write_rootfs_manifest; ssh_allow_empty_password; ssh_allow_root_login; postinst_enable_logging; rootfs_update_timestamp; write_image_test_data; empty_var_volatile; sort_passwd; rootfs_reproducible;
|
||||
IMAGE_POSTPROCESS_COMMAND = buildhistory_get_imageinfo ;
|
||||
IMAGESIZE = 9265
|
||||
|
||||
Other than ``IMAGESIZE``,
|
||||
which is the total size of the files in the image in Kbytes, the
|
||||
name-value pairs are variables that may have influenced the content of
|
||||
the image. This information is often useful when you are trying to
|
||||
determine why a change in the package or file listings has occurred.
|
||||
|
||||
Using Build History to Gather Image Information Only
|
||||
----------------------------------------------------
|
||||
|
||||
As you can see, build history produces image information, including
|
||||
dependency graphs, so you can see why something was pulled into the
|
||||
image. If you are just interested in this information and not interested
|
||||
in collecting specific package or SDK information, you can enable
|
||||
writing only image information without any history by adding the
|
||||
following to your ``conf/local.conf`` file found in the
|
||||
:term:`Build Directory`::
|
||||
|
||||
INHERIT += "buildhistory"
|
||||
BUILDHISTORY_COMMIT = "0"
|
||||
BUILDHISTORY_FEATURES = "image"
|
||||
|
||||
Here, you set the
|
||||
:term:`BUILDHISTORY_FEATURES`
|
||||
variable to use the image feature only.
|
||||
|
||||
Build History SDK Information
|
||||
-----------------------------
|
||||
|
||||
Build history collects similar information on the contents of SDKs (e.g.
|
||||
``bitbake -c populate_sdk imagename``) as compared to information it
|
||||
collects for images. Furthermore, this information differs depending on
|
||||
whether an extensible or standard SDK is being produced.
|
||||
|
||||
The following list shows the files produced for SDKs:
|
||||
|
||||
- ``files-in-sdk.txt:`` A list of files in the SDK with permissions,
|
||||
owner, group, size, and symlink information. This list includes both
|
||||
the host and target parts of the SDK.
|
||||
|
||||
- ``sdk-info.txt:`` A text file containing name-value pairs with
|
||||
information about the SDK. See the following listing example for more
|
||||
information.
|
||||
|
||||
- ``sstate-task-sizes.txt:`` A text file containing name-value pairs
|
||||
with information about task group sizes (e.g. :ref:`ref-tasks-populate_sysroot`
|
||||
tasks have a total size). The ``sstate-task-sizes.txt`` file exists
|
||||
only when an extensible SDK is created.
|
||||
|
||||
- ``sstate-package-sizes.txt:`` A text file containing name-value pairs
|
||||
with information for the shared-state packages and sizes in the SDK.
|
||||
The ``sstate-package-sizes.txt`` file exists only when an extensible
|
||||
SDK is created.
|
||||
|
||||
- ``sdk-files:`` A folder that contains copies of the files mentioned
|
||||
in ``BUILDHISTORY_SDK_FILES`` if the files are present in the output.
|
||||
Additionally, the default value of ``BUILDHISTORY_SDK_FILES`` is
|
||||
specific to the extensible SDK although you can set it differently if
|
||||
you would like to pull in specific files from the standard SDK.
|
||||
|
||||
The default files are ``conf/local.conf``, ``conf/bblayers.conf``,
|
||||
``conf/auto.conf``, ``conf/locked-sigs.inc``, and
|
||||
``conf/devtool.conf``. Thus, for an extensible SDK, these files get
|
||||
copied into the ``sdk-files`` directory.
|
||||
|
||||
- The following information appears under each of the ``host`` and
|
||||
``target`` directories for the portions of the SDK that run on the
|
||||
host and on the target, respectively:
|
||||
|
||||
.. note::
|
||||
|
||||
The following files for the most part are empty when producing an
|
||||
extensible SDK because this type of SDK is not constructed from
|
||||
packages as is the standard SDK.
|
||||
|
||||
- ``depends.dot:`` Dependency graph for the SDK that is compatible
|
||||
with ``graphviz``.
|
||||
|
||||
- ``installed-package-names.txt:`` A list of installed packages by
|
||||
name only.
|
||||
|
||||
- ``installed-package-sizes.txt:`` A list of installed packages
|
||||
ordered by size.
|
||||
|
||||
- ``installed-packages.txt:`` A list of installed packages with full
|
||||
package filenames.
|
||||
|
||||
Here is an example of ``sdk-info.txt``:
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
DISTRO = poky
|
||||
DISTRO_VERSION = 1.3+snapshot-20130327
|
||||
SDK_NAME = poky-glibc-i686-arm
|
||||
SDK_VERSION = 1.3+snapshot
|
||||
SDKMACHINE =
|
||||
SDKIMAGE_FEATURES = dev-pkgs dbg-pkgs
|
||||
BAD_RECOMMENDATIONS =
|
||||
SDKSIZE = 352712
|
||||
|
||||
Other than ``SDKSIZE``, which is
|
||||
the total size of the files in the SDK in Kbytes, the name-value pairs
|
||||
are variables that might have influenced the content of the SDK. This
|
||||
information is often useful when you are trying to determine why a
|
||||
change in the package or file listings has occurred.
|
||||
|
||||
Examining Build History Information
|
||||
-----------------------------------
|
||||
|
||||
You can examine build history output from the command line or from a web
|
||||
interface.
|
||||
|
||||
To see any changes that have occurred (assuming you have
|
||||
:term:`BUILDHISTORY_COMMIT` = "1"),
|
||||
you can simply use any Git command that allows you to view the history
|
||||
of a repository. Here is one method::
|
||||
|
||||
$ git log -p
|
||||
|
||||
You need to realize,
|
||||
however, that this method does show changes that are not significant
|
||||
(e.g. a package's size changing by a few bytes).
|
||||
|
||||
There is a command-line tool called ``buildhistory-diff``, though,
|
||||
that queries the Git repository and prints just the differences that
|
||||
might be significant in human-readable form. Here is an example::
|
||||
|
||||
$ poky/poky/scripts/buildhistory-diff . HEAD^
|
||||
Changes to images/qemux86_64/glibc/core-image-minimal (files-in-image.txt):
|
||||
/etc/anotherpkg.conf was added
|
||||
/sbin/anotherpkg was added
|
||||
* (installed-package-names.txt):
|
||||
* anotherpkg was added
|
||||
Changes to images/qemux86_64/glibc/core-image-minimal (installed-package-names.txt):
|
||||
anotherpkg was added
|
||||
packages/qemux86_64-poky-linux/v86d: PACKAGES: added "v86d-extras"
|
||||
* PR changed from "r0" to "r1"
|
||||
* PV changed from "0.1.10" to "0.1.12"
|
||||
packages/qemux86_64-poky-linux/v86d/v86d: PKGSIZE changed from 110579 to 144381 (+30%)
|
||||
* PR changed from "r0" to "r1"
|
||||
* PV changed from "0.1.10" to "0.1.12"
|
||||
|
||||
.. note::
|
||||
|
||||
The ``buildhistory-diff`` tool requires the ``GitPython``
|
||||
package. Be sure to install it using Pip3 as follows::
|
||||
|
||||
$ pip3 install GitPython --user
|
||||
|
||||
|
||||
Alternatively, you can install ``python3-git`` using the appropriate
|
||||
distribution package manager (e.g. ``apt``, ``dnf``, or ``zipper``).
|
||||
|
||||
To see changes to the build history using a web interface, follow the
|
||||
instruction in the ``README`` file
|
||||
:yocto_git:`here </buildhistory-web/>`.
|
||||
|
||||
Here is a sample screenshot of the interface:
|
||||
|
||||
.. image:: figures/buildhistory-web.png
|
||||
:width: 100%
|
||||
|
||||
@@ -0,0 +1,939 @@
|
||||
.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
|
||||
|
||||
Building
|
||||
********
|
||||
|
||||
This section describes various build procedures, such as the steps
|
||||
needed for a simple build, building a target for multiple configurations,
|
||||
generating an image for more than one machine, and so forth.
|
||||
|
||||
Building a Simple Image
|
||||
=======================
|
||||
|
||||
In the development environment, you need to build an image whenever you
|
||||
change hardware support, add or change system libraries, or add or
|
||||
change services that have dependencies. There are several methods that allow
|
||||
you to build an image within the Yocto Project. This section presents
|
||||
the basic steps you need to build a simple image using BitBake from a
|
||||
build host running Linux.
|
||||
|
||||
.. note::
|
||||
|
||||
- For information on how to build an image using
|
||||
:term:`Toaster`, see the
|
||||
:doc:`/toaster-manual/index`.
|
||||
|
||||
- For information on how to use ``devtool`` to build images, see the
|
||||
":ref:`sdk-manual/extensible:using \`\`devtool\`\` in your sdk workflow`"
|
||||
section in the Yocto Project Application Development and the
|
||||
Extensible Software Development Kit (eSDK) manual.
|
||||
|
||||
- For a quick example on how to build an image using the
|
||||
OpenEmbedded build system, see the
|
||||
:doc:`/brief-yoctoprojectqs/index` document.
|
||||
|
||||
The build process creates an entire Linux distribution from source and
|
||||
places it in your :term:`Build Directory` under ``tmp/deploy/images``. For
|
||||
detailed information on the build process using BitBake, see the
|
||||
":ref:`overview-manual/concepts:images`" section in the Yocto Project Overview
|
||||
and Concepts Manual.
|
||||
|
||||
The following figure and list overviews the build process:
|
||||
|
||||
.. image:: figures/bitbake-build-flow.png
|
||||
:width: 100%
|
||||
|
||||
#. *Set up Your Host Development System to Support Development Using the
|
||||
Yocto Project*: See the ":doc:`start`" section for options on how to get a
|
||||
build host ready to use the Yocto Project.
|
||||
|
||||
#. *Initialize the Build Environment:* Initialize the build environment
|
||||
by sourcing the build environment script (i.e.
|
||||
:ref:`structure-core-script`)::
|
||||
|
||||
$ source oe-init-build-env [build_dir]
|
||||
|
||||
When you use the initialization script, the OpenEmbedded build system
|
||||
uses ``build`` as the default :term:`Build Directory` in your current work
|
||||
directory. You can use a `build_dir` argument with the script to
|
||||
specify a different :term:`Build Directory`.
|
||||
|
||||
.. note::
|
||||
|
||||
A common practice is to use a different :term:`Build Directory` for
|
||||
different targets; for example, ``~/build/x86`` for a ``qemux86``
|
||||
target, and ``~/build/arm`` for a ``qemuarm`` target. In any
|
||||
event, it's typically cleaner to locate the :term:`Build Directory`
|
||||
somewhere outside of your source directory.
|
||||
|
||||
#. *Make Sure Your* ``local.conf`` *File is Correct*: Ensure the
|
||||
``conf/local.conf`` configuration file, which is found in the
|
||||
:term:`Build Directory`, is set up how you want it. This file defines many
|
||||
aspects of the build environment including the target machine architecture
|
||||
through the :term:`MACHINE` variable, the packaging format used during
|
||||
the build (:term:`PACKAGE_CLASSES`), and a centralized tarball download
|
||||
directory through the :term:`DL_DIR` variable.
|
||||
|
||||
#. *Build the Image:* Build the image using the ``bitbake`` command::
|
||||
|
||||
$ bitbake target
|
||||
|
||||
.. note::
|
||||
|
||||
For information on BitBake, see the :doc:`bitbake:index`.
|
||||
|
||||
The target is the name of the recipe you want to build. Common
|
||||
targets are the images in ``meta/recipes-core/images``,
|
||||
``meta/recipes-sato/images``, and so forth all found in the
|
||||
:term:`Source Directory`. Alternatively, the target
|
||||
can be the name of a recipe for a specific piece of software such as
|
||||
BusyBox. For more details about the images the OpenEmbedded build
|
||||
system supports, see the
|
||||
":ref:`ref-manual/images:Images`" chapter in the Yocto
|
||||
Project Reference Manual.
|
||||
|
||||
As an example, the following command builds the
|
||||
``core-image-minimal`` image::
|
||||
|
||||
$ bitbake core-image-minimal
|
||||
|
||||
Once an
|
||||
image has been built, it often needs to be installed. The images and
|
||||
kernels built by the OpenEmbedded build system are placed in the
|
||||
:term:`Build Directory` in ``tmp/deploy/images``. For information on how to
|
||||
run pre-built images such as ``qemux86`` and ``qemuarm``, see the
|
||||
:doc:`/sdk-manual/index` manual. For
|
||||
information about how to install these images, see the documentation
|
||||
for your particular board or machine.
|
||||
|
||||
Building Images for Multiple Targets Using Multiple Configurations
|
||||
==================================================================
|
||||
|
||||
You can use a single ``bitbake`` command to build multiple images or
|
||||
packages for different targets where each image or package requires a
|
||||
different configuration (multiple configuration builds). The builds, in
|
||||
this scenario, are sometimes referred to as "multiconfigs", and this
|
||||
section uses that term throughout.
|
||||
|
||||
This section describes how to set up for multiple configuration builds
|
||||
and how to account for cross-build dependencies between the
|
||||
multiconfigs.
|
||||
|
||||
Setting Up and Running a Multiple Configuration Build
|
||||
-----------------------------------------------------
|
||||
|
||||
To accomplish a multiple configuration build, you must define each
|
||||
target's configuration separately using a parallel configuration file in
|
||||
the :term:`Build Directory` or configuration directory within a layer, and you
|
||||
must follow a required file hierarchy. Additionally, you must enable the
|
||||
multiple configuration builds in your ``local.conf`` file.
|
||||
|
||||
Follow these steps to set up and execute multiple configuration builds:
|
||||
|
||||
- *Create Separate Configuration Files*: You need to create a single
|
||||
configuration file for each build target (each multiconfig).
|
||||
The configuration definitions are implementation dependent but often
|
||||
each configuration file will define the machine and the
|
||||
temporary directory BitBake uses for the build. Whether the same
|
||||
temporary directory (:term:`TMPDIR`) can be shared will depend on what is
|
||||
similar and what is different between the configurations. Multiple MACHINE
|
||||
targets can share the same (:term:`TMPDIR`) as long as the rest of the
|
||||
configuration is the same, multiple :term:`DISTRO` settings would need separate
|
||||
(:term:`TMPDIR`) directories.
|
||||
|
||||
For example, consider a scenario with two different multiconfigs for the same
|
||||
:term:`MACHINE`: "qemux86" built
|
||||
for two distributions such as "poky" and "poky-lsb". In this case,
|
||||
you would need to use the different :term:`TMPDIR`.
|
||||
|
||||
Here is an example showing the minimal statements needed in a
|
||||
configuration file for a "qemux86" target whose temporary build
|
||||
directory is ``tmpmultix86``::
|
||||
|
||||
MACHINE = "qemux86"
|
||||
TMPDIR = "${TOPDIR}/tmpmultix86"
|
||||
|
||||
The location for these multiconfig configuration files is specific.
|
||||
They must reside in the current :term:`Build Directory` in a sub-directory of
|
||||
``conf`` named ``multiconfig`` or within a layer's ``conf`` directory
|
||||
under a directory named ``multiconfig``. Following is an example that defines
|
||||
two configuration files for the "x86" and "arm" multiconfigs:
|
||||
|
||||
.. image:: figures/multiconfig_files.png
|
||||
:align: center
|
||||
:width: 50%
|
||||
|
||||
The usual :term:`BBPATH` search path is used to locate multiconfig files in
|
||||
a similar way to other conf files.
|
||||
|
||||
- *Add the BitBake Multi-configuration Variable to the Local
|
||||
Configuration File*: Use the
|
||||
:term:`BBMULTICONFIG`
|
||||
variable in your ``conf/local.conf`` configuration file to specify
|
||||
each multiconfig. Continuing with the example from the previous
|
||||
figure, the :term:`BBMULTICONFIG` variable needs to enable two
|
||||
multiconfigs: "x86" and "arm" by specifying each configuration file::
|
||||
|
||||
BBMULTICONFIG = "x86 arm"
|
||||
|
||||
.. note::
|
||||
|
||||
A "default" configuration already exists by definition. This
|
||||
configuration is named: "" (i.e. empty string) and is defined by
|
||||
the variables coming from your ``local.conf``
|
||||
file. Consequently, the previous example actually adds two
|
||||
additional configurations to your build: "arm" and "x86" along
|
||||
with "".
|
||||
|
||||
- *Launch BitBake*: Use the following BitBake command form to launch
|
||||
the multiple configuration build::
|
||||
|
||||
$ bitbake [mc:multiconfigname:]target [[[mc:multiconfigname:]target] ... ]
|
||||
|
||||
For the example in this section, the following command applies::
|
||||
|
||||
$ bitbake mc:x86:core-image-minimal mc:arm:core-image-sato mc::core-image-base
|
||||
|
||||
The previous BitBake command builds a ``core-image-minimal`` image
|
||||
that is configured through the ``x86.conf`` configuration file, a
|
||||
``core-image-sato`` image that is configured through the ``arm.conf``
|
||||
configuration file and a ``core-image-base`` that is configured
|
||||
through your ``local.conf`` configuration file.
|
||||
|
||||
.. note::
|
||||
|
||||
Support for multiple configuration builds in the Yocto Project &DISTRO;
|
||||
(&DISTRO_NAME;) Release does not include Shared State (sstate)
|
||||
optimizations. Consequently, if a build uses the same object twice
|
||||
in, for example, two different :term:`TMPDIR`
|
||||
directories, the build either loads from an existing sstate cache for
|
||||
that build at the start or builds the object fresh.
|
||||
|
||||
Enabling Multiple Configuration Build Dependencies
|
||||
--------------------------------------------------
|
||||
|
||||
Sometimes dependencies can exist between targets (multiconfigs) in a
|
||||
multiple configuration build. For example, suppose that in order to
|
||||
build a ``core-image-sato`` image for an "x86" multiconfig, the root
|
||||
filesystem of an "arm" multiconfig must exist. This dependency is
|
||||
essentially that the
|
||||
:ref:`ref-tasks-image` task in the
|
||||
``core-image-sato`` recipe depends on the completion of the
|
||||
:ref:`ref-tasks-rootfs` task of the
|
||||
``core-image-minimal`` recipe.
|
||||
|
||||
To enable dependencies in a multiple configuration build, you must
|
||||
declare the dependencies in the recipe using the following statement
|
||||
form::
|
||||
|
||||
task_or_package[mcdepends] = "mc:from_multiconfig:to_multiconfig:recipe_name:task_on_which_to_depend"
|
||||
|
||||
To better show how to use this statement, consider the example scenario
|
||||
from the first paragraph of this section. The following statement needs
|
||||
to be added to the recipe that builds the ``core-image-sato`` image::
|
||||
|
||||
do_image[mcdepends] = "mc:x86:arm:core-image-minimal:do_rootfs"
|
||||
|
||||
In this example, the `from_multiconfig` is "x86". The `to_multiconfig` is "arm". The
|
||||
task on which the :ref:`ref-tasks-image` task in the recipe depends is the
|
||||
:ref:`ref-tasks-rootfs` task from the ``core-image-minimal`` recipe associated
|
||||
with the "arm" multiconfig.
|
||||
|
||||
Once you set up this dependency, you can build the "x86" multiconfig
|
||||
using a BitBake command as follows::
|
||||
|
||||
$ bitbake mc:x86:core-image-sato
|
||||
|
||||
This command executes all the tasks needed to create the
|
||||
``core-image-sato`` image for the "x86" multiconfig. Because of the
|
||||
dependency, BitBake also executes through the :ref:`ref-tasks-rootfs` task for the
|
||||
"arm" multiconfig build.
|
||||
|
||||
Having a recipe depend on the root filesystem of another build might not
|
||||
seem that useful. Consider this change to the statement in the
|
||||
``core-image-sato`` recipe::
|
||||
|
||||
do_image[mcdepends] = "mc:x86:arm:core-image-minimal:do_image"
|
||||
|
||||
In this case, BitBake must
|
||||
create the ``core-image-minimal`` image for the "arm" build since the
|
||||
"x86" build depends on it.
|
||||
|
||||
Because "x86" and "arm" are enabled for multiple configuration builds
|
||||
and have separate configuration files, BitBake places the artifacts for
|
||||
each build in the respective temporary build directories (i.e.
|
||||
:term:`TMPDIR`).
|
||||
|
||||
Building an Initial RAM Filesystem (Initramfs) Image
|
||||
====================================================
|
||||
|
||||
An initial RAM filesystem (:term:`Initramfs`) image provides a temporary root
|
||||
filesystem used for early system initialization, typically providing tools and
|
||||
loading modules needed to locate and mount the final root filesystem.
|
||||
|
||||
Follow these steps to create an :term:`Initramfs` image:
|
||||
|
||||
#. *Create the :term:`Initramfs` Image Recipe:* You can reference the
|
||||
``core-image-minimal-initramfs.bb`` recipe found in the
|
||||
``meta/recipes-core`` directory of the :term:`Source Directory`
|
||||
as an example from which to work.
|
||||
|
||||
#. *Decide if You Need to Bundle the :term:`Initramfs` Image Into the Kernel
|
||||
Image:* If you want the :term:`Initramfs` image that is built to be bundled
|
||||
in with the kernel image, set the :term:`INITRAMFS_IMAGE_BUNDLE`
|
||||
variable to ``"1"`` in your ``local.conf`` configuration file and set the
|
||||
:term:`INITRAMFS_IMAGE` variable in the recipe that builds the kernel image.
|
||||
|
||||
Setting the :term:`INITRAMFS_IMAGE_BUNDLE` flag causes the :term:`Initramfs`
|
||||
image to be unpacked into the ``${B}/usr/`` directory. The unpacked
|
||||
:term:`Initramfs` image is then passed to the kernel's ``Makefile`` using the
|
||||
:term:`CONFIG_INITRAMFS_SOURCE` variable, allowing the :term:`Initramfs`
|
||||
image to be built into the kernel normally.
|
||||
|
||||
#. *Optionally Add Items to the Initramfs Image Through the Initramfs
|
||||
Image Recipe:* If you add items to the :term:`Initramfs` image by way of its
|
||||
recipe, you should use :term:`PACKAGE_INSTALL` rather than
|
||||
:term:`IMAGE_INSTALL`. :term:`PACKAGE_INSTALL` gives more direct control of
|
||||
what is added to the image as compared to the defaults you might not
|
||||
necessarily want that are set by the :ref:`ref-classes-image`
|
||||
or :ref:`ref-classes-core-image` classes.
|
||||
|
||||
#. *Build the Kernel Image and the Initramfs Image:* Build your kernel
|
||||
image using BitBake. Because the :term:`Initramfs` image recipe is a
|
||||
dependency of the kernel image, the :term:`Initramfs` image is built as well
|
||||
and bundled with the kernel image if you used the
|
||||
:term:`INITRAMFS_IMAGE_BUNDLE` variable described earlier.
|
||||
|
||||
Bundling an Initramfs Image From a Separate Multiconfig
|
||||
-------------------------------------------------------
|
||||
|
||||
There may be a case where we want to build an :term:`Initramfs` image which does not
|
||||
inherit the same distro policy as our main image, for example, we may want
|
||||
our main image to use ``TCLIBC="glibc"``, but to use ``TCLIBC="musl"`` in our :term:`Initramfs`
|
||||
image to keep a smaller footprint. However, by performing the steps mentioned
|
||||
above the :term:`Initramfs` image will inherit ``TCLIBC="glibc"`` without allowing us
|
||||
to override it.
|
||||
|
||||
To achieve this, you need to perform some additional steps:
|
||||
|
||||
#. *Create a multiconfig for your Initramfs image:* You can perform the steps
|
||||
on ":ref:`dev-manual/building:building images for multiple targets using multiple configurations`" to create a separate multiconfig.
|
||||
For the sake of simplicity let's assume such multiconfig is called: ``initramfscfg.conf`` and
|
||||
contains the variables::
|
||||
|
||||
TMPDIR="${TOPDIR}/tmp-initramfscfg"
|
||||
TCLIBC="musl"
|
||||
|
||||
#. *Set additional Initramfs variables on your main configuration:*
|
||||
Additionally, on your main configuration (``local.conf``) you need to set the
|
||||
variables::
|
||||
|
||||
INITRAMFS_MULTICONFIG = "initramfscfg"
|
||||
INITRAMFS_DEPLOY_DIR_IMAGE = "${TOPDIR}/tmp-initramfscfg/deploy/images/${MACHINE}"
|
||||
|
||||
The variables :term:`INITRAMFS_MULTICONFIG` and :term:`INITRAMFS_DEPLOY_DIR_IMAGE`
|
||||
are used to create a multiconfig dependency from the kernel to the :term:`INITRAMFS_IMAGE`
|
||||
to be built coming from the ``initramfscfg`` multiconfig, and to let the
|
||||
buildsystem know where the :term:`INITRAMFS_IMAGE` will be located.
|
||||
|
||||
Building a system with such configuration will build the kernel using the
|
||||
main configuration but the :ref:`ref-tasks-bundle_initramfs` task will grab the
|
||||
selected :term:`INITRAMFS_IMAGE` from :term:`INITRAMFS_DEPLOY_DIR_IMAGE`
|
||||
instead, resulting in a musl based :term:`Initramfs` image bundled in the kernel
|
||||
but a glibc based main image.
|
||||
|
||||
The same is applicable to avoid inheriting :term:`DISTRO_FEATURES` on :term:`INITRAMFS_IMAGE`
|
||||
or to build a different :term:`DISTRO` for it such as ``poky-tiny``.
|
||||
|
||||
|
||||
Building a Tiny System
|
||||
======================
|
||||
|
||||
Very small distributions have some significant advantages such as
|
||||
requiring less on-die or in-package memory (cheaper), better performance
|
||||
through efficient cache usage, lower power requirements due to less
|
||||
memory, faster boot times, and reduced development overhead. Some
|
||||
real-world examples where a very small distribution gives you distinct
|
||||
advantages are digital cameras, medical devices, and small headless
|
||||
systems.
|
||||
|
||||
This section presents information that shows you how you can trim your
|
||||
distribution to even smaller sizes than the ``poky-tiny`` distribution,
|
||||
which is around 5 Mbytes, that can be built out-of-the-box using the
|
||||
Yocto Project.
|
||||
|
||||
Tiny System Overview
|
||||
--------------------
|
||||
|
||||
The following list presents the overall steps you need to consider and
|
||||
perform to create distributions with smaller root filesystems, achieve
|
||||
faster boot times, maintain your critical functionality, and avoid
|
||||
initial RAM disks:
|
||||
|
||||
- :ref:`Determine your goals and guiding principles
|
||||
<dev-manual/building:goals and guiding principles>`
|
||||
|
||||
- :ref:`dev-manual/building:understand what contributes to your image size`
|
||||
|
||||
- :ref:`Reduce the size of the root filesystem
|
||||
<dev-manual/building:trim the root filesystem>`
|
||||
|
||||
- :ref:`Reduce the size of the kernel <dev-manual/building:trim the kernel>`
|
||||
|
||||
- :ref:`dev-manual/building:remove package management requirements`
|
||||
|
||||
- :ref:`dev-manual/building:look for other ways to minimize size`
|
||||
|
||||
- :ref:`dev-manual/building:iterate on the process`
|
||||
|
||||
Goals and Guiding Principles
|
||||
----------------------------
|
||||
|
||||
Before you can reach your destination, you need to know where you are
|
||||
going. Here is an example list that you can use as a guide when creating
|
||||
very small distributions:
|
||||
|
||||
- Determine how much space you need (e.g. a kernel that is 1 Mbyte or
|
||||
less and a root filesystem that is 3 Mbytes or less).
|
||||
|
||||
- Find the areas that are currently taking 90% of the space and
|
||||
concentrate on reducing those areas.
|
||||
|
||||
- Do not create any difficult "hacks" to achieve your goals.
|
||||
|
||||
- Leverage the device-specific options.
|
||||
|
||||
- Work in a separate layer so that you keep changes isolated. For
|
||||
information on how to create layers, see the
|
||||
":ref:`dev-manual/layers:understanding and creating layers`" section.
|
||||
|
||||
Understand What Contributes to Your Image Size
|
||||
----------------------------------------------
|
||||
|
||||
It is easiest to have something to start with when creating your own
|
||||
distribution. You can use the Yocto Project out-of-the-box to create the
|
||||
``poky-tiny`` distribution. Ultimately, you will want to make changes in
|
||||
your own distribution that are likely modeled after ``poky-tiny``.
|
||||
|
||||
.. note::
|
||||
|
||||
To use ``poky-tiny`` in your build, set the :term:`DISTRO` variable in your
|
||||
``local.conf`` file to "poky-tiny" as described in the
|
||||
":ref:`dev-manual/custom-distribution:creating your own distribution`"
|
||||
section.
|
||||
|
||||
Understanding some memory concepts will help you reduce the system size.
|
||||
Memory consists of static, dynamic, and temporary memory. Static memory
|
||||
is the TEXT (code), DATA (initialized data in the code), and BSS
|
||||
(uninitialized data) sections. Dynamic memory represents memory that is
|
||||
allocated at runtime: stacks, hash tables, and so forth. Temporary
|
||||
memory is recovered after the boot process. This memory consists of
|
||||
memory used for decompressing the kernel and for the ``__init__``
|
||||
functions.
|
||||
|
||||
To help you see where you currently are with kernel and root filesystem
|
||||
sizes, you can use two tools found in the :term:`Source Directory`
|
||||
in the
|
||||
``scripts/tiny/`` directory:
|
||||
|
||||
- ``ksize.py``: Reports component sizes for the kernel build objects.
|
||||
|
||||
- ``dirsize.py``: Reports component sizes for the root filesystem.
|
||||
|
||||
This next tool and command help you organize configuration fragments and
|
||||
view file dependencies in a human-readable form:
|
||||
|
||||
- ``merge_config.sh``: Helps you manage configuration files and
|
||||
fragments within the kernel. With this tool, you can merge individual
|
||||
configuration fragments together. The tool allows you to make
|
||||
overrides and warns you of any missing configuration options. The
|
||||
tool is ideal for allowing you to iterate on configurations, create
|
||||
minimal configurations, and create configuration files for different
|
||||
machines without having to duplicate your process.
|
||||
|
||||
The ``merge_config.sh`` script is part of the Linux Yocto kernel Git
|
||||
repositories (i.e. ``linux-yocto-3.14``, ``linux-yocto-3.10``,
|
||||
``linux-yocto-3.8``, and so forth) in the ``scripts/kconfig``
|
||||
directory.
|
||||
|
||||
For more information on configuration fragments, see the
|
||||
":ref:`kernel-dev/common:creating configuration fragments`"
|
||||
section in the Yocto Project Linux Kernel Development Manual.
|
||||
|
||||
- ``bitbake -u taskexp -g bitbake_target``: Using the BitBake command
|
||||
with these options brings up a Dependency Explorer from which you can
|
||||
view file dependencies. Understanding these dependencies allows you
|
||||
to make informed decisions when cutting out various pieces of the
|
||||
kernel and root filesystem.
|
||||
|
||||
Trim the Root Filesystem
|
||||
------------------------
|
||||
|
||||
The root filesystem is made up of packages for booting, libraries, and
|
||||
applications. To change things, you can configure how the packaging
|
||||
happens, which changes the way you build them. You can also modify the
|
||||
filesystem itself or select a different filesystem.
|
||||
|
||||
First, find out what is hogging your root filesystem by running the
|
||||
``dirsize.py`` script from your root directory::
|
||||
|
||||
$ cd root-directory-of-image
|
||||
$ dirsize.py 100000 > dirsize-100k.log
|
||||
$ cat dirsize-100k.log
|
||||
|
||||
You can apply a filter to the script to ignore files
|
||||
under a certain size. The previous example filters out any files below
|
||||
100 Kbytes. The sizes reported by the tool are uncompressed, and thus
|
||||
will be smaller by a relatively constant factor in a compressed root
|
||||
filesystem. When you examine your log file, you can focus on areas of
|
||||
the root filesystem that take up large amounts of memory.
|
||||
|
||||
You need to be sure that what you eliminate does not cripple the
|
||||
functionality you need. One way to see how packages relate to each other
|
||||
is by using the Dependency Explorer UI with the BitBake command::
|
||||
|
||||
$ cd image-directory
|
||||
$ bitbake -u taskexp -g image
|
||||
|
||||
Use the interface to
|
||||
select potential packages you wish to eliminate and see their dependency
|
||||
relationships.
|
||||
|
||||
When deciding how to reduce the size, get rid of packages that result in
|
||||
minimal impact on the feature set. For example, you might not need a VGA
|
||||
display. Or, you might be able to get by with ``devtmpfs`` and ``mdev``
|
||||
instead of ``udev``.
|
||||
|
||||
Use your ``local.conf`` file to make changes. For example, to eliminate
|
||||
``udev`` and ``glib``, set the following in the local configuration
|
||||
file::
|
||||
|
||||
VIRTUAL-RUNTIME_dev_manager = ""
|
||||
|
||||
Finally, you should consider exactly the type of root filesystem you
|
||||
need to meet your needs while also reducing its size. For example,
|
||||
consider ``cramfs``, ``squashfs``, ``ubifs``, ``ext2``, or an
|
||||
:term:`Initramfs` using ``initramfs``. Be aware that ``ext3`` requires a 1
|
||||
Mbyte journal. If you are okay with running read-only, you do not need
|
||||
this journal.
|
||||
|
||||
.. note::
|
||||
|
||||
After each round of elimination, you need to rebuild your system and
|
||||
then use the tools to see the effects of your reductions.
|
||||
|
||||
Trim the Kernel
|
||||
---------------
|
||||
|
||||
The kernel is built by including policies for hardware-independent
|
||||
aspects. What subsystems do you enable? For what architecture are you
|
||||
building? Which drivers do you build by default?
|
||||
|
||||
.. note::
|
||||
|
||||
You can modify the kernel source if you want to help with boot time.
|
||||
|
||||
Run the ``ksize.py`` script from the top-level Linux build directory to
|
||||
get an idea of what is making up the kernel::
|
||||
|
||||
$ cd top-level-linux-build-directory
|
||||
$ ksize.py > ksize.log
|
||||
$ cat ksize.log
|
||||
|
||||
When you examine the log, you will see how much space is taken up with
|
||||
the built-in ``.o`` files for drivers, networking, core kernel files,
|
||||
filesystem, sound, and so forth. The sizes reported by the tool are
|
||||
uncompressed, and thus will be smaller by a relatively constant factor
|
||||
in a compressed kernel image. Look to reduce the areas that are large
|
||||
and taking up around the "90% rule."
|
||||
|
||||
To examine, or drill down, into any particular area, use the ``-d``
|
||||
option with the script::
|
||||
|
||||
$ ksize.py -d > ksize.log
|
||||
|
||||
Using this option
|
||||
breaks out the individual file information for each area of the kernel
|
||||
(e.g. drivers, networking, and so forth).
|
||||
|
||||
Use your log file to see what you can eliminate from the kernel based on
|
||||
features you can let go. For example, if you are not going to need
|
||||
sound, you do not need any drivers that support sound.
|
||||
|
||||
After figuring out what to eliminate, you need to reconfigure the kernel
|
||||
to reflect those changes during the next build. You could run
|
||||
``menuconfig`` and make all your changes at once. However, that makes it
|
||||
difficult to see the effects of your individual eliminations and also
|
||||
makes it difficult to replicate the changes for perhaps another target
|
||||
device. A better method is to start with no configurations using
|
||||
``allnoconfig``, create configuration fragments for individual changes,
|
||||
and then manage the fragments into a single configuration file using
|
||||
``merge_config.sh``. The tool makes it easy for you to iterate using the
|
||||
configuration change and build cycle.
|
||||
|
||||
Each time you make configuration changes, you need to rebuild the kernel
|
||||
and check to see what impact your changes had on the overall size.
|
||||
|
||||
Remove Package Management Requirements
|
||||
--------------------------------------
|
||||
|
||||
Packaging requirements add size to the image. One way to reduce the size
|
||||
of the image is to remove all the packaging requirements from the image.
|
||||
This reduction includes both removing the package manager and its unique
|
||||
dependencies as well as removing the package management data itself.
|
||||
|
||||
To eliminate all the packaging requirements for an image, be sure that
|
||||
"package-management" is not part of your
|
||||
:term:`IMAGE_FEATURES`
|
||||
statement for the image. When you remove this feature, you are removing
|
||||
the package manager as well as its dependencies from the root
|
||||
filesystem.
|
||||
|
||||
Look for Other Ways to Minimize Size
|
||||
------------------------------------
|
||||
|
||||
Depending on your particular circumstances, other areas that you can
|
||||
trim likely exist. The key to finding these areas is through tools and
|
||||
methods described here combined with experimentation and iteration. Here
|
||||
are a couple of areas to experiment with:
|
||||
|
||||
- ``glibc``: In general, follow this process:
|
||||
|
||||
#. Remove ``glibc`` features from
|
||||
:term:`DISTRO_FEATURES`
|
||||
that you think you do not need.
|
||||
|
||||
#. Build your distribution.
|
||||
|
||||
#. If the build fails due to missing symbols in a package, determine
|
||||
if you can reconfigure the package to not need those features. For
|
||||
example, change the configuration to not support wide character
|
||||
support as is done for ``ncurses``. Or, if support for those
|
||||
characters is needed, determine what ``glibc`` features provide
|
||||
the support and restore the configuration.
|
||||
|
||||
4. Rebuild and repeat the process.
|
||||
|
||||
- ``busybox``: For BusyBox, use a process similar as described for
|
||||
``glibc``. A difference is you will need to boot the resulting system
|
||||
to see if you are able to do everything you expect from the running
|
||||
system. You need to be sure to integrate configuration fragments into
|
||||
Busybox because BusyBox handles its own core features and then allows
|
||||
you to add configuration fragments on top.
|
||||
|
||||
Iterate on the Process
|
||||
----------------------
|
||||
|
||||
If you have not reached your goals on system size, you need to iterate
|
||||
on the process. The process is the same. Use the tools and see just what
|
||||
is taking up 90% of the root filesystem and the kernel. Decide what you
|
||||
can eliminate without limiting your device beyond what you need.
|
||||
|
||||
Depending on your system, a good place to look might be Busybox, which
|
||||
provides a stripped down version of Unix tools in a single, executable
|
||||
file. You might be able to drop virtual terminal services or perhaps
|
||||
ipv6.
|
||||
|
||||
Building Images for More than One Machine
|
||||
=========================================
|
||||
|
||||
A common scenario developers face is creating images for several
|
||||
different machines that use the same software environment. In this
|
||||
situation, it is tempting to set the tunings and optimization flags for
|
||||
each build specifically for the targeted hardware (i.e. "maxing out" the
|
||||
tunings). Doing so can considerably add to build times and package feed
|
||||
maintenance collectively for the machines. For example, selecting tunes
|
||||
that are extremely specific to a CPU core used in a system might enable
|
||||
some micro optimizations in GCC for that particular system but would
|
||||
otherwise not gain you much of a performance difference across the other
|
||||
systems as compared to using a more general tuning across all the builds
|
||||
(e.g. setting :term:`DEFAULTTUNE`
|
||||
specifically for each machine's build). Rather than "max out" each
|
||||
build's tunings, you can take steps that cause the OpenEmbedded build
|
||||
system to reuse software across the various machines where it makes
|
||||
sense.
|
||||
|
||||
If build speed and package feed maintenance are considerations, you
|
||||
should consider the points in this section that can help you optimize
|
||||
your tunings to best consider build times and package feed maintenance.
|
||||
|
||||
- *Share the :term:`Build Directory`:* If at all possible, share the
|
||||
:term:`TMPDIR` across builds. The Yocto Project supports switching between
|
||||
different :term:`MACHINE` values in the same :term:`TMPDIR`. This practice
|
||||
is well supported and regularly used by developers when building for
|
||||
multiple machines. When you use the same :term:`TMPDIR` for multiple
|
||||
machine builds, the OpenEmbedded build system can reuse the existing native
|
||||
and often cross-recipes for multiple machines. Thus, build time decreases.
|
||||
|
||||
.. note::
|
||||
|
||||
If :term:`DISTRO` settings change or fundamental configuration settings
|
||||
such as the filesystem layout, you need to work with a clean :term:`TMPDIR`.
|
||||
Sharing :term:`TMPDIR` under these circumstances might work but since it is
|
||||
not guaranteed, you should use a clean :term:`TMPDIR`.
|
||||
|
||||
- *Enable the Appropriate Package Architecture:* By default, the
|
||||
OpenEmbedded build system enables three levels of package
|
||||
architectures: "all", "tune" or "package", and "machine". Any given
|
||||
recipe usually selects one of these package architectures (types) for
|
||||
its output. Depending for what a given recipe creates packages,
|
||||
making sure you enable the appropriate package architecture can
|
||||
directly impact the build time.
|
||||
|
||||
A recipe that just generates scripts can enable "all" architecture
|
||||
because there are no binaries to build. To specifically enable "all"
|
||||
architecture, be sure your recipe inherits the
|
||||
:ref:`ref-classes-allarch` class.
|
||||
This class is useful for "all" architectures because it configures
|
||||
many variables so packages can be used across multiple architectures.
|
||||
|
||||
If your recipe needs to generate packages that are machine-specific
|
||||
or when one of the build or runtime dependencies is already
|
||||
machine-architecture dependent, which makes your recipe also
|
||||
machine-architecture dependent, make sure your recipe enables the
|
||||
"machine" package architecture through the
|
||||
:term:`MACHINE_ARCH`
|
||||
variable::
|
||||
|
||||
PACKAGE_ARCH = "${MACHINE_ARCH}"
|
||||
|
||||
When you do not
|
||||
specifically enable a package architecture through the
|
||||
:term:`PACKAGE_ARCH`, The
|
||||
OpenEmbedded build system defaults to the
|
||||
:term:`TUNE_PKGARCH` setting::
|
||||
|
||||
PACKAGE_ARCH = "${TUNE_PKGARCH}"
|
||||
|
||||
- *Choose a Generic Tuning File if Possible:* Some tunes are more
|
||||
generic and can run on multiple targets (e.g. an ``armv5`` set of
|
||||
packages could run on ``armv6`` and ``armv7`` processors in most
|
||||
cases). Similarly, ``i486`` binaries could work on ``i586`` and
|
||||
higher processors. You should realize, however, that advances on
|
||||
newer processor versions would not be used.
|
||||
|
||||
If you select the same tune for several different machines, the
|
||||
OpenEmbedded build system reuses software previously built, thus
|
||||
speeding up the overall build time. Realize that even though a new
|
||||
sysroot for each machine is generated, the software is not recompiled
|
||||
and only one package feed exists.
|
||||
|
||||
- *Manage Granular Level Packaging:* Sometimes there are cases where
|
||||
injecting another level of package architecture beyond the three
|
||||
higher levels noted earlier can be useful. For example, consider how
|
||||
NXP (formerly Freescale) allows for the easy reuse of binary packages
|
||||
in their layer
|
||||
:yocto_git:`meta-freescale </meta-freescale/>`.
|
||||
In this example, the
|
||||
:yocto_git:`fsl-dynamic-packagearch </meta-freescale/tree/classes/fsl-dynamic-packagearch.bbclass>`
|
||||
class shares GPU packages for i.MX53 boards because all boards share
|
||||
the AMD GPU. The i.MX6-based boards can do the same because all
|
||||
boards share the Vivante GPU. This class inspects the BitBake
|
||||
datastore to identify if the package provides or depends on one of
|
||||
the sub-architecture values. If so, the class sets the
|
||||
:term:`PACKAGE_ARCH` value
|
||||
based on the ``MACHINE_SUBARCH`` value. If the package does not
|
||||
provide or depend on one of the sub-architecture values but it
|
||||
matches a value in the machine-specific filter, it sets
|
||||
:term:`MACHINE_ARCH`. This
|
||||
behavior reduces the number of packages built and saves build time by
|
||||
reusing binaries.
|
||||
|
||||
- *Use Tools to Debug Issues:* Sometimes you can run into situations
|
||||
where software is being rebuilt when you think it should not be. For
|
||||
example, the OpenEmbedded build system might not be using shared
|
||||
state between machines when you think it should be. These types of
|
||||
situations are usually due to references to machine-specific
|
||||
variables such as :term:`MACHINE`,
|
||||
:term:`SERIAL_CONSOLES`,
|
||||
:term:`XSERVER`,
|
||||
:term:`MACHINE_FEATURES`,
|
||||
and so forth in code that is supposed to only be tune-specific or
|
||||
when the recipe depends
|
||||
(:term:`DEPENDS`,
|
||||
:term:`RDEPENDS`,
|
||||
:term:`RRECOMMENDS`,
|
||||
:term:`RSUGGESTS`, and so forth)
|
||||
on some other recipe that already has
|
||||
:term:`PACKAGE_ARCH` defined
|
||||
as "${MACHINE_ARCH}".
|
||||
|
||||
.. note::
|
||||
|
||||
Patches to fix any issues identified are most welcome as these
|
||||
issues occasionally do occur.
|
||||
|
||||
For such cases, you can use some tools to help you sort out the
|
||||
situation:
|
||||
|
||||
- ``state-diff-machines.sh``*:* You can find this tool in the
|
||||
``scripts`` directory of the Source Repositories. See the comments
|
||||
in the script for information on how to use the tool.
|
||||
|
||||
- *BitBake's "-S printdiff" Option:* Using this option causes
|
||||
BitBake to try to establish the closest signature match it can
|
||||
(e.g. in the shared state cache) and then run ``bitbake-diffsigs``
|
||||
over the matches to determine the stamps and delta where these two
|
||||
stamp trees diverge.
|
||||
|
||||
Building Software from an External Source
|
||||
=========================================
|
||||
|
||||
By default, the OpenEmbedded build system uses the :term:`Build Directory`
|
||||
when building source code. The build process involves fetching the source
|
||||
files, unpacking them, and then patching them if necessary before the build
|
||||
takes place.
|
||||
|
||||
There are situations where you might want to build software from source
|
||||
files that are external to and thus outside of the OpenEmbedded build
|
||||
system. For example, suppose you have a project that includes a new BSP
|
||||
with a heavily customized kernel. And, you want to minimize exposing the
|
||||
build system to the development team so that they can focus on their
|
||||
project and maintain everyone's workflow as much as possible. In this
|
||||
case, you want a kernel source directory on the development machine
|
||||
where the development occurs. You want the recipe's
|
||||
:term:`SRC_URI` variable to point to
|
||||
the external directory and use it as is, not copy it.
|
||||
|
||||
To build from software that comes from an external source, all you need to do
|
||||
is inherit the :ref:`ref-classes-externalsrc` class and then set
|
||||
the :term:`EXTERNALSRC` variable to point to your external source code. Here
|
||||
are the statements to put in your ``local.conf`` file::
|
||||
|
||||
INHERIT += "externalsrc"
|
||||
EXTERNALSRC:pn-myrecipe = "path-to-your-source-tree"
|
||||
|
||||
This next example shows how to accomplish the same thing by setting
|
||||
:term:`EXTERNALSRC` in the recipe itself or in the recipe's append file::
|
||||
|
||||
EXTERNALSRC = "path"
|
||||
EXTERNALSRC_BUILD = "path"
|
||||
|
||||
.. note::
|
||||
|
||||
In order for these settings to take effect, you must globally or
|
||||
locally inherit the :ref:`ref-classes-externalsrc` class.
|
||||
|
||||
By default, :ref:`ref-classes-externalsrc` builds the source code in a
|
||||
directory separate from the external source directory as specified by
|
||||
:term:`EXTERNALSRC`. If you need
|
||||
to have the source built in the same directory in which it resides, or
|
||||
some other nominated directory, you can set
|
||||
:term:`EXTERNALSRC_BUILD`
|
||||
to point to that directory::
|
||||
|
||||
EXTERNALSRC_BUILD:pn-myrecipe = "path-to-your-source-tree"
|
||||
|
||||
Replicating a Build Offline
|
||||
===========================
|
||||
|
||||
It can be useful to take a "snapshot" of upstream sources used in a
|
||||
build and then use that "snapshot" later to replicate the build offline.
|
||||
To do so, you need to first prepare and populate your downloads
|
||||
directory your "snapshot" of files. Once your downloads directory is
|
||||
ready, you can use it at any time and from any machine to replicate your
|
||||
build.
|
||||
|
||||
Follow these steps to populate your Downloads directory:
|
||||
|
||||
#. *Create a Clean Downloads Directory:* Start with an empty downloads
|
||||
directory (:term:`DL_DIR`). You
|
||||
start with an empty downloads directory by either removing the files
|
||||
in the existing directory or by setting :term:`DL_DIR` to point to either
|
||||
an empty location or one that does not yet exist.
|
||||
|
||||
#. *Generate Tarballs of the Source Git Repositories:* Edit your
|
||||
``local.conf`` configuration file as follows::
|
||||
|
||||
DL_DIR = "/home/your-download-dir/"
|
||||
BB_GENERATE_MIRROR_TARBALLS = "1"
|
||||
|
||||
During
|
||||
the fetch process in the next step, BitBake gathers the source files
|
||||
and creates tarballs in the directory pointed to by :term:`DL_DIR`. See
|
||||
the
|
||||
:term:`BB_GENERATE_MIRROR_TARBALLS`
|
||||
variable for more information.
|
||||
|
||||
#. *Populate Your Downloads Directory Without Building:* Use BitBake to
|
||||
fetch your sources but inhibit the build::
|
||||
|
||||
$ bitbake target --runonly=fetch
|
||||
|
||||
The downloads directory (i.e. ``${DL_DIR}``) now has
|
||||
a "snapshot" of the source files in the form of tarballs, which can
|
||||
be used for the build.
|
||||
|
||||
#. *Optionally Remove Any Git or other SCM Subdirectories From the
|
||||
Downloads Directory:* If you want, you can clean up your downloads
|
||||
directory by removing any Git or other Source Control Management
|
||||
(SCM) subdirectories such as ``${DL_DIR}/git2/*``. The tarballs
|
||||
already contain these subdirectories.
|
||||
|
||||
Once your downloads directory has everything it needs regarding source
|
||||
files, you can create your "own-mirror" and build your target.
|
||||
Understand that you can use the files to build the target offline from
|
||||
any machine and at any time.
|
||||
|
||||
Follow these steps to build your target using the files in the downloads
|
||||
directory:
|
||||
|
||||
#. *Using Local Files Only:* Inside your ``local.conf`` file, add the
|
||||
:term:`SOURCE_MIRROR_URL` variable, inherit the
|
||||
:ref:`ref-classes-own-mirrors` class, and use the
|
||||
:term:`BB_NO_NETWORK` variable to your ``local.conf``::
|
||||
|
||||
SOURCE_MIRROR_URL ?= "file:///home/your-download-dir/"
|
||||
INHERIT += "own-mirrors"
|
||||
BB_NO_NETWORK = "1"
|
||||
|
||||
The :term:`SOURCE_MIRROR_URL` and :ref:`ref-classes-own-mirrors`
|
||||
class set up the system to use the downloads directory as your "own
|
||||
mirror". Using the :term:`BB_NO_NETWORK` variable makes sure that
|
||||
BitBake's fetching process in step 3 stays local, which means files
|
||||
from your "own-mirror" are used.
|
||||
|
||||
#. *Start With a Clean Build:* You can start with a clean build by
|
||||
removing the ``${``\ :term:`TMPDIR`\ ``}`` directory or using a new
|
||||
:term:`Build Directory`.
|
||||
|
||||
#. *Build Your Target:* Use BitBake to build your target::
|
||||
|
||||
$ bitbake target
|
||||
|
||||
The build completes using the known local "snapshot" of source
|
||||
files from your mirror. The resulting tarballs for your "snapshot" of
|
||||
source files are in the downloads directory.
|
||||
|
||||
.. note::
|
||||
|
||||
The offline build does not work if recipes attempt to find the
|
||||
latest version of software by setting
|
||||
:term:`SRCREV` to
|
||||
``${``\ :term:`AUTOREV`\ ``}``::
|
||||
|
||||
SRCREV = "${AUTOREV}"
|
||||
|
||||
When a recipe sets :term:`SRCREV` to
|
||||
``${``\ :term:`AUTOREV`\ ``}``, the build system accesses the network in an
|
||||
attempt to determine the latest version of software from the SCM.
|
||||
Typically, recipes that use :term:`AUTOREV` are custom or modified
|
||||
recipes. Recipes that reside in public repositories usually do not
|
||||
use :term:`AUTOREV`.
|
||||
|
||||
If you do have recipes that use :term:`AUTOREV`, you can take steps to
|
||||
still use the recipes in an offline build. Do the following:
|
||||
|
||||
#. Use a configuration generated by enabling :ref:`build
|
||||
history <dev-manual/build-quality:maintaining build output quality>`.
|
||||
|
||||
#. Use the ``buildhistory-collect-srcrevs`` command to collect the
|
||||
stored :term:`SRCREV` values from the build's history. For more
|
||||
information on collecting these values, see the
|
||||
":ref:`dev-manual/build-quality:build history package information`"
|
||||
section.
|
||||
|
||||
#. Once you have the correct source revisions, you can modify
|
||||
those recipes to set :term:`SRCREV` to specific versions of the
|
||||
software.
|
||||
|
||||
@@ -0,0 +1,525 @@
|
||||
.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
|
||||
|
||||
Making Changes to the Yocto Project
|
||||
***********************************
|
||||
|
||||
Because the Yocto Project is an open-source, community-based project,
|
||||
you can effect changes to the project. This section presents procedures
|
||||
that show you how to submit a defect against the project and how to
|
||||
submit a change.
|
||||
|
||||
Submitting a Defect Against the Yocto Project
|
||||
=============================================
|
||||
|
||||
Use the Yocto Project implementation of
|
||||
`Bugzilla <https://www.bugzilla.org/about/>`__ to submit a defect (bug)
|
||||
against the Yocto Project. For additional information on this
|
||||
implementation of Bugzilla see the ":ref:`Yocto Project
|
||||
Bugzilla <resources-bugtracker>`" section in the
|
||||
Yocto Project Reference Manual. For more detail on any of the following
|
||||
steps, see the Yocto Project
|
||||
:yocto_wiki:`Bugzilla wiki page </Bugzilla_Configuration_and_Bug_Tracking>`.
|
||||
|
||||
Use the following general steps to submit a bug:
|
||||
|
||||
#. Open the Yocto Project implementation of :yocto_bugs:`Bugzilla <>`.
|
||||
|
||||
#. Click "File a Bug" to enter a new bug.
|
||||
|
||||
#. Choose the appropriate "Classification", "Product", and "Component"
|
||||
for which the bug was found. Bugs for the Yocto Project fall into
|
||||
one of several classifications, which in turn break down into
|
||||
several products and components. For example, for a bug against the
|
||||
``meta-intel`` layer, you would choose "Build System, Metadata &
|
||||
Runtime", "BSPs", and "bsps-meta-intel", respectively.
|
||||
|
||||
#. Choose the "Version" of the Yocto Project for which you found the
|
||||
bug (e.g. &DISTRO;).
|
||||
|
||||
#. Determine and select the "Severity" of the bug. The severity
|
||||
indicates how the bug impacted your work.
|
||||
|
||||
#. Choose the "Hardware" that the bug impacts.
|
||||
|
||||
#. Choose the "Architecture" that the bug impacts.
|
||||
|
||||
#. Choose a "Documentation change" item for the bug. Fixing a bug might
|
||||
or might not affect the Yocto Project documentation. If you are
|
||||
unsure of the impact to the documentation, select "Don't Know".
|
||||
|
||||
#. Provide a brief "Summary" of the bug. Try to limit your summary to
|
||||
just a line or two and be sure to capture the essence of the bug.
|
||||
|
||||
#. Provide a detailed "Description" of the bug. You should provide as
|
||||
much detail as you can about the context, behavior, output, and so
|
||||
forth that surrounds the bug. You can even attach supporting files
|
||||
for output from logs by using the "Add an attachment" button.
|
||||
|
||||
#. Click the "Submit Bug" button submit the bug. A new Bugzilla number
|
||||
is assigned to the bug and the defect is logged in the bug tracking
|
||||
system.
|
||||
|
||||
Once you file a bug, the bug is processed by the Yocto Project Bug
|
||||
Triage Team and further details concerning the bug are assigned (e.g.
|
||||
priority and owner). You are the "Submitter" of the bug and any further
|
||||
categorization, progress, or comments on the bug result in Bugzilla
|
||||
sending you an automated email concerning the particular change or
|
||||
progress to the bug.
|
||||
|
||||
Submitting a Change to the Yocto Project
|
||||
========================================
|
||||
|
||||
Contributions to the Yocto Project and OpenEmbedded are very welcome.
|
||||
Because the system is extremely configurable and flexible, we recognize
|
||||
that developers will want to extend, configure or optimize it for their
|
||||
specific uses.
|
||||
|
||||
The Yocto Project uses a mailing list and a patch-based workflow that is
|
||||
similar to the Linux kernel but contains important differences. In
|
||||
general, there is a mailing list through which you can submit patches. You
|
||||
should send patches to the appropriate mailing list so that they can be
|
||||
reviewed and merged by the appropriate maintainer. The specific mailing
|
||||
list you need to use depends on the location of the code you are
|
||||
changing. Each component (e.g. layer) should have a ``README`` file that
|
||||
indicates where to send the changes and which process to follow.
|
||||
|
||||
You can send the patch to the mailing list using whichever approach you
|
||||
feel comfortable with to generate the patch. Once sent, the patch is
|
||||
usually reviewed by the community at large. If somebody has concerns
|
||||
with the patch, they will usually voice their concern over the mailing
|
||||
list. If a patch does not receive any negative reviews, the maintainer
|
||||
of the affected layer typically takes the patch, tests it, and then
|
||||
based on successful testing, merges the patch.
|
||||
|
||||
The "poky" repository, which is the Yocto Project's reference build
|
||||
environment, is a hybrid repository that contains several individual
|
||||
pieces (e.g. BitBake, Metadata, documentation, and so forth) built using
|
||||
the combo-layer tool. The upstream location used for submitting changes
|
||||
varies by component:
|
||||
|
||||
- *Core Metadata:* Send your patch to the
|
||||
:oe_lists:`openembedded-core </g/openembedded-core>`
|
||||
mailing list. For example, a change to anything under the ``meta`` or
|
||||
``scripts`` directories should be sent to this mailing list.
|
||||
|
||||
- *BitBake:* For changes to BitBake (i.e. anything under the
|
||||
``bitbake`` directory), send your patch to the
|
||||
:oe_lists:`bitbake-devel </g/bitbake-devel>`
|
||||
mailing list.
|
||||
|
||||
- *"meta-\*" trees:* These trees contain Metadata. Use the
|
||||
:yocto_lists:`poky </g/poky>` mailing list.
|
||||
|
||||
- *Documentation*: For changes to the Yocto Project documentation, use the
|
||||
:yocto_lists:`docs </g/docs>` mailing list.
|
||||
|
||||
For changes to other layers hosted in the Yocto Project source
|
||||
repositories (i.e. ``yoctoproject.org``) and tools use the
|
||||
:yocto_lists:`Yocto Project </g/yocto/>` general mailing list.
|
||||
|
||||
.. note::
|
||||
|
||||
Sometimes a layer's documentation specifies to use a particular
|
||||
mailing list. If so, use that list.
|
||||
|
||||
For additional recipes that do not fit into the core Metadata, you
|
||||
should determine which layer the recipe should go into and submit the
|
||||
change in the manner recommended by the documentation (e.g. the
|
||||
``README`` file) supplied with the layer. If in doubt, please ask on the
|
||||
Yocto general mailing list or on the openembedded-devel mailing list.
|
||||
|
||||
You can also push a change upstream and request a maintainer to pull the
|
||||
change into the component's upstream repository. You do this by pushing
|
||||
to a contribution repository that is upstream. See the
|
||||
":ref:`overview-manual/development-environment:git workflows and the yocto project`"
|
||||
section in the Yocto Project Overview and Concepts Manual for additional
|
||||
concepts on working in the Yocto Project development environment.
|
||||
|
||||
Maintainers commonly use ``-next`` branches to test submissions prior to
|
||||
merging patches. Thus, you can get an idea of the status of a patch based on
|
||||
whether the patch has been merged into one of these branches. The commonly
|
||||
used testing branches for OpenEmbedded-Core are as follows:
|
||||
|
||||
- *openembedded-core "master-next" branch:* This branch is part of the
|
||||
:oe_git:`openembedded-core </openembedded-core/>` repository and contains
|
||||
proposed changes to the core metadata.
|
||||
|
||||
- *poky "master-next" branch:* This branch is part of the
|
||||
:yocto_git:`poky </poky/>` repository and combines proposed
|
||||
changes to BitBake, the core metadata and the poky distro.
|
||||
|
||||
Similarly, stable branches maintained by the project may have corresponding
|
||||
``-next`` branches which collect proposed changes. For example,
|
||||
``&DISTRO_NAME_NO_CAP;-next`` and ``&DISTRO_NAME_NO_CAP_MINUS_ONE;-next``
|
||||
branches in both the "openembdedded-core" and "poky" repositories.
|
||||
|
||||
Other layers may have similar testing branches but there is no formal
|
||||
requirement or standard for these so please check the documentation for the
|
||||
layers you are contributing to.
|
||||
|
||||
The following sections provide procedures for submitting a change.
|
||||
|
||||
Preparing Changes for Submission
|
||||
--------------------------------
|
||||
|
||||
#. *Make Your Changes Locally:* Make your changes in your local Git
|
||||
repository. You should make small, controlled, isolated changes.
|
||||
Keeping changes small and isolated aids review, makes
|
||||
merging/rebasing easier and keeps the change history clean should
|
||||
anyone need to refer to it in future.
|
||||
|
||||
#. *Stage Your Changes:* Stage your changes by using the ``git add``
|
||||
command on each file you changed.
|
||||
|
||||
#. *Commit Your Changes:* Commit the change by using the ``git commit``
|
||||
command. Make sure your commit information follows standards by
|
||||
following these accepted conventions:
|
||||
|
||||
- Be sure to include a "Signed-off-by:" line in the same style as
|
||||
required by the Linux kernel. This can be done by using the
|
||||
``git commit -s`` command. Adding this line signifies that you,
|
||||
the submitter, have agreed to the Developer's Certificate of
|
||||
Origin 1.1 as follows:
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
Developer's Certificate of Origin 1.1
|
||||
|
||||
By making a contribution to this project, I certify that:
|
||||
|
||||
(a) The contribution was created in whole or in part by me and I
|
||||
have the right to submit it under the open source license
|
||||
indicated in the file; or
|
||||
|
||||
(b) The contribution is based upon previous work that, to the best
|
||||
of my knowledge, is covered under an appropriate open source
|
||||
license and I have the right under that license to submit that
|
||||
work with modifications, whether created in whole or in part
|
||||
by me, under the same open source license (unless I am
|
||||
permitted to submit under a different license), as indicated
|
||||
in the file; or
|
||||
|
||||
(c) The contribution was provided directly to me by some other
|
||||
person who certified (a), (b) or (c) and I have not modified
|
||||
it.
|
||||
|
||||
(d) I understand and agree that this project and the contribution
|
||||
are public and that a record of the contribution (including all
|
||||
personal information I submit with it, including my sign-off) is
|
||||
maintained indefinitely and may be redistributed consistent with
|
||||
this project or the open source license(s) involved.
|
||||
|
||||
- Provide a single-line summary of the change and, if more
|
||||
explanation is needed, provide more detail in the body of the
|
||||
commit. This summary is typically viewable in the "shortlist" of
|
||||
changes. Thus, providing something short and descriptive that
|
||||
gives the reader a summary of the change is useful when viewing a
|
||||
list of many commits. You should prefix this short description
|
||||
with the recipe name (if changing a recipe), or else with the
|
||||
short form path to the file being changed.
|
||||
|
||||
- For the body of the commit message, provide detailed information
|
||||
that describes what you changed, why you made the change, and the
|
||||
approach you used. It might also be helpful if you mention how you
|
||||
tested the change. Provide as much detail as you can in the body
|
||||
of the commit message.
|
||||
|
||||
.. note::
|
||||
|
||||
You do not need to provide a more detailed explanation of a
|
||||
change if the change is minor to the point of the single line
|
||||
summary providing all the information.
|
||||
|
||||
- If the change addresses a specific bug or issue that is associated
|
||||
with a bug-tracking ID, include a reference to that ID in your
|
||||
detailed description. For example, the Yocto Project uses a
|
||||
specific convention for bug references --- any commit that addresses
|
||||
a specific bug should use the following form for the detailed
|
||||
description. Be sure to use the actual bug-tracking ID from
|
||||
Bugzilla for bug-id::
|
||||
|
||||
Fixes [YOCTO #bug-id]
|
||||
|
||||
detailed description of change
|
||||
|
||||
Using Email to Submit a Patch
|
||||
-----------------------------
|
||||
|
||||
Depending on the components changed, you need to submit the email to a
|
||||
specific mailing list. For some guidance on which mailing list to use,
|
||||
see the
|
||||
:ref:`list <dev-manual/changes:submitting a change to the yocto project>`
|
||||
at the beginning of this section. For a description of all the available
|
||||
mailing lists, see the ":ref:`Mailing Lists <resources-mailinglist>`" section in the
|
||||
Yocto Project Reference Manual.
|
||||
|
||||
Here is the general procedure on how to submit a patch through email
|
||||
without using the scripts once the steps in
|
||||
:ref:`dev-manual/changes:preparing changes for submission` have been followed:
|
||||
|
||||
#. *Format the Commit:* Format the commit into an email message. To
|
||||
format commits, use the ``git format-patch`` command. When you
|
||||
provide the command, you must include a revision list or a number of
|
||||
patches as part of the command. For example, either of these two
|
||||
commands takes your most recent single commit and formats it as an
|
||||
email message in the current directory::
|
||||
|
||||
$ git format-patch -1
|
||||
|
||||
or ::
|
||||
|
||||
$ git format-patch HEAD~
|
||||
|
||||
After the command is run, the current directory contains a numbered
|
||||
``.patch`` file for the commit.
|
||||
|
||||
If you provide several commits as part of the command, the
|
||||
``git format-patch`` command produces a series of numbered files in
|
||||
the current directory – one for each commit. If you have more than
|
||||
one patch, you should also use the ``--cover`` option with the
|
||||
command, which generates a cover letter as the first "patch" in the
|
||||
series. You can then edit the cover letter to provide a description
|
||||
for the series of patches. For information on the
|
||||
``git format-patch`` command, see ``GIT_FORMAT_PATCH(1)`` displayed
|
||||
using the ``man git-format-patch`` command.
|
||||
|
||||
.. note::
|
||||
|
||||
If you are or will be a frequent contributor to the Yocto Project
|
||||
or to OpenEmbedded, you might consider requesting a contrib area
|
||||
and the necessary associated rights.
|
||||
|
||||
#. *Send the patches via email:* Send the patches to the recipients and
|
||||
relevant mailing lists by using the ``git send-email`` command.
|
||||
|
||||
.. note::
|
||||
|
||||
In order to use ``git send-email``, you must have the proper Git packages
|
||||
installed on your host.
|
||||
For Ubuntu, Debian, and Fedora the package is ``git-email``.
|
||||
|
||||
The ``git send-email`` command sends email by using a local or remote
|
||||
Mail Transport Agent (MTA) such as ``msmtp``, ``sendmail``, or
|
||||
through a direct ``smtp`` configuration in your Git ``~/.gitconfig``
|
||||
file. If you are submitting patches through email only, it is very
|
||||
important that you submit them without any whitespace or HTML
|
||||
formatting that either you or your mailer introduces. The maintainer
|
||||
that receives your patches needs to be able to save and apply them
|
||||
directly from your emails. A good way to verify that what you are
|
||||
sending will be applicable by the maintainer is to do a dry run and
|
||||
send them to yourself and then save and apply them as the maintainer
|
||||
would.
|
||||
|
||||
The ``git send-email`` command is the preferred method for sending
|
||||
your patches using email since there is no risk of compromising
|
||||
whitespace in the body of the message, which can occur when you use
|
||||
your own mail client. The command also has several options that let
|
||||
you specify recipients and perform further editing of the email
|
||||
message. For information on how to use the ``git send-email``
|
||||
command, see ``GIT-SEND-EMAIL(1)`` displayed using the
|
||||
``man git-send-email`` command.
|
||||
|
||||
The Yocto Project uses a `Patchwork instance <https://patchwork.yoctoproject.org/>`__
|
||||
to track the status of patches submitted to the various mailing lists and to
|
||||
support automated patch testing. Each submitted patch is checked for common
|
||||
mistakes and deviations from the expected patch format and submitters are
|
||||
notified by patchtest if such mistakes are found. This process helps to
|
||||
reduce the burden of patch review on maintainers.
|
||||
|
||||
.. note::
|
||||
|
||||
This system is imperfect and changes can sometimes get lost in the flow.
|
||||
Asking about the status of a patch or change is reasonable if the change
|
||||
has been idle for a while with no feedback.
|
||||
|
||||
Using Scripts to Push a Change Upstream and Request a Pull
|
||||
----------------------------------------------------------
|
||||
|
||||
For larger patch series it is preferable to send a pull request which not
|
||||
only includes the patch but also a pointer to a branch that can be pulled
|
||||
from. This involves making a local branch for your changes, pushing this
|
||||
branch to an accessible repository and then using the ``create-pull-request``
|
||||
and ``send-pull-request`` scripts from openembedded-core to create and send a
|
||||
patch series with a link to the branch for review.
|
||||
|
||||
Follow this procedure to push a change to an upstream "contrib" Git
|
||||
repository once the steps in :ref:`dev-manual/changes:preparing changes for submission` have
|
||||
been followed:
|
||||
|
||||
.. note::
|
||||
|
||||
You can find general Git information on how to push a change upstream
|
||||
in the
|
||||
`Git Community Book <https://git-scm.com/book/en/v2/Distributed-Git-Distributed-Workflows>`__.
|
||||
|
||||
#. *Push Your Commits to a "Contrib" Upstream:* If you have arranged for
|
||||
permissions to push to an upstream contrib repository, push the
|
||||
change to that repository::
|
||||
|
||||
$ git push upstream_remote_repo local_branch_name
|
||||
|
||||
For example, suppose you have permissions to push
|
||||
into the upstream ``meta-intel-contrib`` repository and you are
|
||||
working in a local branch named `your_name`\ ``/README``. The following
|
||||
command pushes your local commits to the ``meta-intel-contrib``
|
||||
upstream repository and puts the commit in a branch named
|
||||
`your_name`\ ``/README``::
|
||||
|
||||
$ git push meta-intel-contrib your_name/README
|
||||
|
||||
#. *Determine Who to Notify:* Determine the maintainer or the mailing
|
||||
list that you need to notify for the change.
|
||||
|
||||
Before submitting any change, you need to be sure who the maintainer
|
||||
is or what mailing list that you need to notify. Use either these
|
||||
methods to find out:
|
||||
|
||||
- *Maintenance File:* Examine the ``maintainers.inc`` file, which is
|
||||
located in the :term:`Source Directory` at
|
||||
``meta/conf/distro/include``, to see who is responsible for code.
|
||||
|
||||
- *Search by File:* Using :ref:`overview-manual/development-environment:git`, you can
|
||||
enter the following command to bring up a short list of all
|
||||
commits against a specific file::
|
||||
|
||||
git shortlog -- filename
|
||||
|
||||
Just provide the name of the file for which you are interested. The
|
||||
information returned is not ordered by history but does include a
|
||||
list of everyone who has committed grouped by name. From the list,
|
||||
you can see who is responsible for the bulk of the changes against
|
||||
the file.
|
||||
|
||||
- *Examine the List of Mailing Lists:* For a list of the Yocto
|
||||
Project and related mailing lists, see the ":ref:`Mailing
|
||||
lists <resources-mailinglist>`" section in
|
||||
the Yocto Project Reference Manual.
|
||||
|
||||
#. *Make a Pull Request:* Notify the maintainer or the mailing list that
|
||||
you have pushed a change by making a pull request.
|
||||
|
||||
The Yocto Project provides two scripts that conveniently let you
|
||||
generate and send pull requests to the Yocto Project. These scripts
|
||||
are ``create-pull-request`` and ``send-pull-request``. You can find
|
||||
these scripts in the ``scripts`` directory within the
|
||||
:term:`Source Directory` (e.g.
|
||||
``poky/scripts``).
|
||||
|
||||
Using these scripts correctly formats the requests without
|
||||
introducing any whitespace or HTML formatting. The maintainer that
|
||||
receives your patches either directly or through the mailing list
|
||||
needs to be able to save and apply them directly from your emails.
|
||||
Using these scripts is the preferred method for sending patches.
|
||||
|
||||
First, create the pull request. For example, the following command
|
||||
runs the script, specifies the upstream repository in the contrib
|
||||
directory into which you pushed the change, and provides a subject
|
||||
line in the created patch files::
|
||||
|
||||
$ poky/scripts/create-pull-request -u meta-intel-contrib -s "Updated Manual Section Reference in README"
|
||||
|
||||
Running this script forms ``*.patch`` files in a folder named
|
||||
``pull-``\ `PID` in the current directory. One of the patch files is a
|
||||
cover letter.
|
||||
|
||||
Before running the ``send-pull-request`` script, you must edit the
|
||||
cover letter patch to insert information about your change. After
|
||||
editing the cover letter, send the pull request. For example, the
|
||||
following command runs the script and specifies the patch directory
|
||||
and email address. In this example, the email address is a mailing
|
||||
list::
|
||||
|
||||
$ poky/scripts/send-pull-request -p ~/meta-intel/pull-10565 -t meta-intel@lists.yoctoproject.org
|
||||
|
||||
You need to follow the prompts as the script is interactive.
|
||||
|
||||
.. note::
|
||||
|
||||
For help on using these scripts, simply provide the ``-h``
|
||||
argument as follows::
|
||||
|
||||
$ poky/scripts/create-pull-request -h
|
||||
$ poky/scripts/send-pull-request -h
|
||||
|
||||
Responding to Patch Review
|
||||
--------------------------
|
||||
|
||||
You may get feedback on your submitted patches from other community members
|
||||
or from the automated patchtest service. If issues are identified in your
|
||||
patch then it is usually necessary to address these before the patch will be
|
||||
accepted into the project. In this case you should amend the patch according
|
||||
to the feedback and submit an updated version to the relevant mailing list,
|
||||
copying in the reviewers who provided feedback to the previous version of the
|
||||
patch.
|
||||
|
||||
The patch should be amended using ``git commit --amend`` or perhaps ``git
|
||||
rebase`` for more expert git users. You should also modify the ``[PATCH]``
|
||||
tag in the email subject line when sending the revised patch to mark the new
|
||||
iteration as ``[PATCH v2]``, ``[PATCH v3]``, etc as appropriate. This can be
|
||||
done by passing the ``-v`` argument to ``git format-patch`` with a version
|
||||
number.
|
||||
|
||||
Lastly please ensure that you also test your revised changes. In particular
|
||||
please don't just edit the patch file written out by ``git format-patch`` and
|
||||
resend it.
|
||||
|
||||
Submitting Changes to Stable Release Branches
|
||||
---------------------------------------------
|
||||
|
||||
The process for proposing changes to a Yocto Project stable branch differs
|
||||
from the steps described above. Changes to a stable branch must address
|
||||
identified bugs or CVEs and should be made carefully in order to avoid the
|
||||
risk of introducing new bugs or breaking backwards compatibility. Typically
|
||||
bug fixes must already be accepted into the master branch before they can be
|
||||
backported to a stable branch unless the bug in question does not affect the
|
||||
master branch or the fix on the master branch is unsuitable for backporting.
|
||||
|
||||
The list of stable branches along with the status and maintainer for each
|
||||
branch can be obtained from the
|
||||
:yocto_wiki:`Releases wiki page </Releases>`.
|
||||
|
||||
.. note::
|
||||
|
||||
Changes will not typically be accepted for branches which are marked as
|
||||
End-Of-Life (EOL).
|
||||
|
||||
With this in mind, the steps to submit a change for a stable branch are as
|
||||
follows:
|
||||
|
||||
#. *Identify the bug or CVE to be fixed:* This information should be
|
||||
collected so that it can be included in your submission.
|
||||
|
||||
See :ref:`dev-manual/vulnerabilities:checking for vulnerabilities`
|
||||
for details about CVE tracking.
|
||||
|
||||
#. *Check if the fix is already present in the master branch:* This will
|
||||
result in the most straightforward path into the stable branch for the
|
||||
fix.
|
||||
|
||||
#. *If the fix is present in the master branch --- submit a backport request
|
||||
by email:* You should send an email to the relevant stable branch
|
||||
maintainer and the mailing list with details of the bug or CVE to be
|
||||
fixed, the commit hash on the master branch that fixes the issue and
|
||||
the stable branches which you would like this fix to be backported to.
|
||||
|
||||
#. *If the fix is not present in the master branch --- submit the fix to the
|
||||
master branch first:* This will ensure that the fix passes through the
|
||||
project's usual patch review and test processes before being accepted.
|
||||
It will also ensure that bugs are not left unresolved in the master
|
||||
branch itself. Once the fix is accepted in the master branch a backport
|
||||
request can be submitted as above.
|
||||
|
||||
#. *If the fix is unsuitable for the master branch --- submit a patch
|
||||
directly for the stable branch:* This method should be considered as a
|
||||
last resort. It is typically necessary when the master branch is using
|
||||
a newer version of the software which includes an upstream fix for the
|
||||
issue or when the issue has been fixed on the master branch in a way
|
||||
that introduces backwards incompatible changes. In this case follow the
|
||||
steps in :ref:`dev-manual/changes:preparing changes for submission` and
|
||||
:ref:`dev-manual/changes:using email to submit a patch` but modify the subject header of your patch
|
||||
email to include the name of the stable branch which you are
|
||||
targetting. This can be done using the ``--subject-prefix`` argument to
|
||||
``git format-patch``, for example to submit a patch to the dunfell
|
||||
branch use
|
||||
``git format-patch --subject-prefix='&DISTRO_NAME_NO_CAP_MINUS_ONE;][PATCH' ...``.
|
||||
|
||||
@@ -0,0 +1,109 @@
|
||||
.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
|
||||
|
||||
Creating Your Own Distribution
|
||||
******************************
|
||||
|
||||
When you build an image using the Yocto Project and do not alter any
|
||||
distribution :term:`Metadata`, you are
|
||||
creating a Poky distribution. If you wish to gain more control over
|
||||
package alternative selections, compile-time options, and other
|
||||
low-level configurations, you can create your own distribution.
|
||||
|
||||
To create your own distribution, the basic steps consist of creating
|
||||
your own distribution layer, creating your own distribution
|
||||
configuration file, and then adding any needed code and Metadata to the
|
||||
layer. The following steps provide some more detail:
|
||||
|
||||
- *Create a layer for your new distro:* Create your distribution layer
|
||||
so that you can keep your Metadata and code for the distribution
|
||||
separate. It is strongly recommended that you create and use your own
|
||||
layer for configuration and code. Using your own layer as compared to
|
||||
just placing configurations in a ``local.conf`` configuration file
|
||||
makes it easier to reproduce the same build configuration when using
|
||||
multiple build machines. See the
|
||||
":ref:`dev-manual/layers:creating a general layer using the \`\`bitbake-layers\`\` script`"
|
||||
section for information on how to quickly set up a layer.
|
||||
|
||||
- *Create the distribution configuration file:* The distribution
|
||||
configuration file needs to be created in the ``conf/distro``
|
||||
directory of your layer. You need to name it using your distribution
|
||||
name (e.g. ``mydistro.conf``).
|
||||
|
||||
.. note::
|
||||
|
||||
The :term:`DISTRO` variable in your ``local.conf`` file determines the
|
||||
name of your distribution.
|
||||
|
||||
You can split out parts of your configuration file into include files
|
||||
and then "require" them from within your distribution configuration
|
||||
file. Be sure to place the include files in the
|
||||
``conf/distro/include`` directory of your layer. A common example
|
||||
usage of include files would be to separate out the selection of
|
||||
desired version and revisions for individual recipes.
|
||||
|
||||
Your configuration file needs to set the following required
|
||||
variables:
|
||||
|
||||
- :term:`DISTRO_NAME`
|
||||
|
||||
- :term:`DISTRO_VERSION`
|
||||
|
||||
These following variables are optional and you typically set them
|
||||
from the distribution configuration file:
|
||||
|
||||
- :term:`DISTRO_FEATURES`
|
||||
|
||||
- :term:`DISTRO_EXTRA_RDEPENDS`
|
||||
|
||||
- :term:`DISTRO_EXTRA_RRECOMMENDS`
|
||||
|
||||
- :term:`TCLIBC`
|
||||
|
||||
.. tip::
|
||||
|
||||
If you want to base your distribution configuration file on the
|
||||
very basic configuration from OE-Core, you can use
|
||||
``conf/distro/defaultsetup.conf`` as a reference and just include
|
||||
variables that differ as compared to ``defaultsetup.conf``.
|
||||
Alternatively, you can create a distribution configuration file
|
||||
from scratch using the ``defaultsetup.conf`` file or configuration files
|
||||
from another distribution such as Poky as a reference.
|
||||
|
||||
- *Provide miscellaneous variables:* Be sure to define any other
|
||||
variables for which you want to create a default or enforce as part
|
||||
of the distribution configuration. You can include nearly any
|
||||
variable from the ``local.conf`` file. The variables you use are not
|
||||
limited to the list in the previous bulleted item.
|
||||
|
||||
- *Point to Your distribution configuration file:* In your ``local.conf``
|
||||
file in the :term:`Build Directory`, set your :term:`DISTRO` variable to
|
||||
point to your distribution's configuration file. For example, if your
|
||||
distribution's configuration file is named ``mydistro.conf``, then
|
||||
you point to it as follows::
|
||||
|
||||
DISTRO = "mydistro"
|
||||
|
||||
- *Add more to the layer if necessary:* Use your layer to hold other
|
||||
information needed for the distribution:
|
||||
|
||||
- Add recipes for installing distro-specific configuration files
|
||||
that are not already installed by another recipe. If you have
|
||||
distro-specific configuration files that are included by an
|
||||
existing recipe, you should add an append file (``.bbappend``) for
|
||||
those. For general information and recommendations on how to add
|
||||
recipes to your layer, see the
|
||||
":ref:`dev-manual/layers:creating your own layer`" and
|
||||
":ref:`dev-manual/layers:following best practices when creating layers`"
|
||||
sections.
|
||||
|
||||
- Add any image recipes that are specific to your distribution.
|
||||
|
||||
- Add a ``psplash`` append file for a branded splash screen, using
|
||||
the :term:`SPLASH_IMAGES` variable.
|
||||
|
||||
- Add any other append files to make custom changes that are
|
||||
specific to individual recipes.
|
||||
|
||||
For information on append files, see the
|
||||
":ref:`dev-manual/layers:appending other layers metadata with your layer`"
|
||||
section.
|
||||
@@ -0,0 +1,52 @@
|
||||
.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
|
||||
|
||||
Creating a Custom Template Configuration Directory
|
||||
**************************************************
|
||||
|
||||
If you are producing your own customized version of the build system for
|
||||
use by other users, you might want to provide a custom build configuration
|
||||
that includes all the necessary settings and layers (i.e. ``local.conf`` and
|
||||
``bblayers.conf`` that are created in a new :term:`Build Directory`) and a custom
|
||||
message that is shown when setting up the build. This can be done by
|
||||
creating one or more template configuration directories in your
|
||||
custom distribution layer.
|
||||
|
||||
This can be done by using ``bitbake-layers save-build-conf``::
|
||||
|
||||
$ bitbake-layers save-build-conf ../../meta-alex/ test-1
|
||||
NOTE: Starting bitbake server...
|
||||
NOTE: Configuration template placed into /srv/work/alex/meta-alex/conf/templates/test-1
|
||||
Please review the files in there, and particularly provide a configuration description in /srv/work/alex/meta-alex/conf/templates/test-1/conf-notes.txt
|
||||
You can try out the configuration with
|
||||
TEMPLATECONF=/srv/work/alex/meta-alex/conf/templates/test-1 . /srv/work/alex/poky/oe-init-build-env build-try-test-1
|
||||
|
||||
The above command takes the config files from the currently active :term:`Build Directory` under ``conf``,
|
||||
replaces site-specific paths in ``bblayers.conf`` with ``##OECORE##``-relative paths, and copies
|
||||
the config files into a specified layer under a specified template name.
|
||||
|
||||
To use those saved templates as a starting point for a build, users should point
|
||||
to one of them with :term:`TEMPLATECONF` environment variable::
|
||||
|
||||
TEMPLATECONF=/srv/work/alex/meta-alex/conf/templates/test-1 . /srv/work/alex/poky/oe-init-build-env build-try-test-1
|
||||
|
||||
The OpenEmbedded build system uses the environment variable
|
||||
:term:`TEMPLATECONF` to locate the directory from which it gathers
|
||||
configuration information that ultimately ends up in the
|
||||
:term:`Build Directory` ``conf`` directory.
|
||||
|
||||
If :term:`TEMPLATECONF` is not set, the default value is obtained
|
||||
from ``.templateconf`` file that is read from the same directory as
|
||||
``oe-init-build-env`` script. For the Poky reference distribution this
|
||||
would be::
|
||||
|
||||
TEMPLATECONF=${TEMPLATECONF:-meta-poky/conf/templates/default}
|
||||
|
||||
If you look at a configuration template directory, you will
|
||||
see the ``bblayers.conf.sample``, ``local.conf.sample``, and
|
||||
``conf-notes.txt`` files. The build system uses these files to form the
|
||||
respective ``bblayers.conf`` file, ``local.conf`` file, and show
|
||||
users a note about the build they're setting up
|
||||
when running the ``oe-init-build-env`` setup script. These can be
|
||||
edited further if needed to improve or change the build configurations
|
||||
available to the users.
|
||||
|
||||
@@ -0,0 +1,223 @@
|
||||
.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
|
||||
|
||||
Customizing Images
|
||||
******************
|
||||
|
||||
You can customize images to satisfy particular requirements. This
|
||||
section describes several methods and provides guidelines for each.
|
||||
|
||||
Customizing Images Using ``local.conf``
|
||||
=======================================
|
||||
|
||||
Probably the easiest way to customize an image is to add a package by
|
||||
way of the ``local.conf`` configuration file. Because it is limited to
|
||||
local use, this method generally only allows you to add packages and is
|
||||
not as flexible as creating your own customized image. When you add
|
||||
packages using local variables this way, you need to realize that these
|
||||
variable changes are in effect for every build and consequently affect
|
||||
all images, which might not be what you require.
|
||||
|
||||
To add a package to your image using the local configuration file, use
|
||||
the :term:`IMAGE_INSTALL` variable with the ``:append`` operator::
|
||||
|
||||
IMAGE_INSTALL:append = " strace"
|
||||
|
||||
Use of the syntax is important; specifically, the leading space
|
||||
after the opening quote and before the package name, which is
|
||||
``strace`` in this example. This space is required since the ``:append``
|
||||
operator does not add the space.
|
||||
|
||||
Furthermore, you must use ``:append`` instead of the ``+=`` operator if
|
||||
you want to avoid ordering issues. The reason for this is because doing
|
||||
so unconditionally appends to the variable and avoids ordering problems
|
||||
due to the variable being set in image recipes and ``.bbclass`` files
|
||||
with operators like ``?=``. Using ``:append`` ensures the operation
|
||||
takes effect.
|
||||
|
||||
As shown in its simplest use, ``IMAGE_INSTALL:append`` affects all
|
||||
images. It is possible to extend the syntax so that the variable applies
|
||||
to a specific image only. Here is an example::
|
||||
|
||||
IMAGE_INSTALL:append:pn-core-image-minimal = " strace"
|
||||
|
||||
This example adds ``strace`` to the ``core-image-minimal`` image only.
|
||||
|
||||
You can add packages using a similar approach through the
|
||||
:term:`CORE_IMAGE_EXTRA_INSTALL` variable. If you use this variable, only
|
||||
``core-image-*`` images are affected.
|
||||
|
||||
Customizing Images Using Custom ``IMAGE_FEATURES`` and ``EXTRA_IMAGE_FEATURES``
|
||||
===============================================================================
|
||||
|
||||
Another method for customizing your image is to enable or disable
|
||||
high-level image features by using the
|
||||
:term:`IMAGE_FEATURES` and
|
||||
:term:`EXTRA_IMAGE_FEATURES`
|
||||
variables. Although the functions for both variables are nearly
|
||||
equivalent, best practices dictate using :term:`IMAGE_FEATURES` from within
|
||||
a recipe and using :term:`EXTRA_IMAGE_FEATURES` from within your
|
||||
``local.conf`` file, which is found in the :term:`Build Directory`.
|
||||
|
||||
To understand how these features work, the best reference is
|
||||
:ref:`meta/classes-recipe/image.bbclass <ref-classes-image>`.
|
||||
This class lists out the available
|
||||
:term:`IMAGE_FEATURES` of which most map to package groups while some, such
|
||||
as ``debug-tweaks`` and ``read-only-rootfs``, resolve as general
|
||||
configuration settings.
|
||||
|
||||
In summary, the file looks at the contents of the :term:`IMAGE_FEATURES`
|
||||
variable and then maps or configures the feature accordingly. Based on
|
||||
this information, the build system automatically adds the appropriate
|
||||
packages or configurations to the
|
||||
:term:`IMAGE_INSTALL` variable.
|
||||
Effectively, you are enabling extra features by extending the class or
|
||||
creating a custom class for use with specialized image ``.bb`` files.
|
||||
|
||||
Use the :term:`EXTRA_IMAGE_FEATURES` variable from within your local
|
||||
configuration file. Using a separate area from which to enable features
|
||||
with this variable helps you avoid overwriting the features in the image
|
||||
recipe that are enabled with :term:`IMAGE_FEATURES`. The value of
|
||||
:term:`EXTRA_IMAGE_FEATURES` is added to :term:`IMAGE_FEATURES` within
|
||||
``meta/conf/bitbake.conf``.
|
||||
|
||||
To illustrate how you can use these variables to modify your image,
|
||||
consider an example that selects the SSH server. The Yocto Project ships
|
||||
with two SSH servers you can use with your images: Dropbear and OpenSSH.
|
||||
Dropbear is a minimal SSH server appropriate for resource-constrained
|
||||
environments, while OpenSSH is a well-known standard SSH server
|
||||
implementation. By default, the ``core-image-sato`` image is configured
|
||||
to use Dropbear. The ``core-image-full-cmdline`` and ``core-image-lsb``
|
||||
images both include OpenSSH. The ``core-image-minimal`` image does not
|
||||
contain an SSH server.
|
||||
|
||||
You can customize your image and change these defaults. Edit the
|
||||
:term:`IMAGE_FEATURES` variable in your recipe or use the
|
||||
:term:`EXTRA_IMAGE_FEATURES` in your ``local.conf`` file so that it
|
||||
configures the image you are working with to include
|
||||
``ssh-server-dropbear`` or ``ssh-server-openssh``.
|
||||
|
||||
.. note::
|
||||
|
||||
See the ":ref:`ref-manual/features:image features`" section in the Yocto
|
||||
Project Reference Manual for a complete list of image features that ship
|
||||
with the Yocto Project.
|
||||
|
||||
Customizing Images Using Custom .bb Files
|
||||
=========================================
|
||||
|
||||
You can also customize an image by creating a custom recipe that defines
|
||||
additional software as part of the image. The following example shows
|
||||
the form for the two lines you need::
|
||||
|
||||
IMAGE_INSTALL = "packagegroup-core-x11-base package1 package2"
|
||||
inherit core-image
|
||||
|
||||
Defining the software using a custom recipe gives you total control over
|
||||
the contents of the image. It is important to use the correct names of
|
||||
packages in the :term:`IMAGE_INSTALL` variable. You must use the
|
||||
OpenEmbedded notation and not the Debian notation for the names (e.g.
|
||||
``glibc-dev`` instead of ``libc6-dev``).
|
||||
|
||||
The other method for creating a custom image is to base it on an
|
||||
existing image. For example, if you want to create an image based on
|
||||
``core-image-sato`` but add the additional package ``strace`` to the
|
||||
image, copy the ``meta/recipes-sato/images/core-image-sato.bb`` to a new
|
||||
``.bb`` and add the following line to the end of the copy::
|
||||
|
||||
IMAGE_INSTALL += "strace"
|
||||
|
||||
Customizing Images Using Custom Package Groups
|
||||
==============================================
|
||||
|
||||
For complex custom images, the best approach for customizing an image is
|
||||
to create a custom package group recipe that is used to build the image
|
||||
or images. A good example of a package group recipe is
|
||||
``meta/recipes-core/packagegroups/packagegroup-base.bb``.
|
||||
|
||||
If you examine that recipe, you see that the :term:`PACKAGES` variable lists
|
||||
the package group packages to produce. The ``inherit packagegroup``
|
||||
statement sets appropriate default values and automatically adds
|
||||
``-dev``, ``-dbg``, and ``-ptest`` complementary packages for each
|
||||
package specified in the :term:`PACKAGES` statement.
|
||||
|
||||
.. note::
|
||||
|
||||
The ``inherit packagegroup`` line should be located near the top of the
|
||||
recipe, certainly before the :term:`PACKAGES` statement.
|
||||
|
||||
For each package you specify in :term:`PACKAGES`, you can use :term:`RDEPENDS`
|
||||
and :term:`RRECOMMENDS` entries to provide a list of packages the parent
|
||||
task package should contain. You can see examples of these further down
|
||||
in the ``packagegroup-base.bb`` recipe.
|
||||
|
||||
Here is a short, fabricated example showing the same basic pieces for a
|
||||
hypothetical packagegroup defined in ``packagegroup-custom.bb``, where
|
||||
the variable :term:`PN` is the standard way to abbreviate the reference to
|
||||
the full packagegroup name ``packagegroup-custom``::
|
||||
|
||||
DESCRIPTION = "My Custom Package Groups"
|
||||
|
||||
inherit packagegroup
|
||||
|
||||
PACKAGES = "\
|
||||
${PN}-apps \
|
||||
${PN}-tools \
|
||||
"
|
||||
|
||||
RDEPENDS:${PN}-apps = "\
|
||||
dropbear \
|
||||
portmap \
|
||||
psplash"
|
||||
|
||||
RDEPENDS:${PN}-tools = "\
|
||||
oprofile \
|
||||
oprofileui-server \
|
||||
lttng-tools"
|
||||
|
||||
RRECOMMENDS:${PN}-tools = "\
|
||||
kernel-module-oprofile"
|
||||
|
||||
In the previous example, two package group packages are created with
|
||||
their dependencies and their recommended package dependencies listed:
|
||||
``packagegroup-custom-apps``, and ``packagegroup-custom-tools``. To
|
||||
build an image using these package group packages, you need to add
|
||||
``packagegroup-custom-apps`` and/or ``packagegroup-custom-tools`` to
|
||||
:term:`IMAGE_INSTALL`. For other forms of image dependencies see the other
|
||||
areas of this section.
|
||||
|
||||
Customizing an Image Hostname
|
||||
=============================
|
||||
|
||||
By default, the configured hostname (i.e. ``/etc/hostname``) in an image
|
||||
is the same as the machine name. For example, if
|
||||
:term:`MACHINE` equals "qemux86", the
|
||||
configured hostname written to ``/etc/hostname`` is "qemux86".
|
||||
|
||||
You can customize this name by altering the value of the "hostname"
|
||||
variable in the ``base-files`` recipe using either an append file or a
|
||||
configuration file. Use the following in an append file::
|
||||
|
||||
hostname = "myhostname"
|
||||
|
||||
Use the following in a configuration file::
|
||||
|
||||
hostname:pn-base-files = "myhostname"
|
||||
|
||||
Changing the default value of the variable "hostname" can be useful in
|
||||
certain situations. For example, suppose you need to do extensive
|
||||
testing on an image and you would like to easily identify the image
|
||||
under test from existing images with typical default hostnames. In this
|
||||
situation, you could change the default hostname to "testme", which
|
||||
results in all the images using the name "testme". Once testing is
|
||||
complete and you do not need to rebuild the image for test any longer,
|
||||
you can easily reset the default hostname.
|
||||
|
||||
Another point of interest is that if you unset the variable, the image
|
||||
will have no default hostname in the filesystem. Here is an example that
|
||||
unsets the variable in a configuration file::
|
||||
|
||||
hostname:pn-base-files = ""
|
||||
|
||||
Having no default hostname in the filesystem is suitable for
|
||||
environments that use dynamic hostnames such as virtual machines.
|
||||
|
||||
@@ -0,0 +1,82 @@
|
||||
.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
|
||||
|
||||
Using a Development Shell
|
||||
*************************
|
||||
|
||||
When debugging certain commands or even when just editing packages,
|
||||
``devshell`` can be a useful tool. When you invoke ``devshell``, all
|
||||
tasks up to and including
|
||||
:ref:`ref-tasks-patch` are run for the
|
||||
specified target. Then, a new terminal is opened and you are placed in
|
||||
``${``\ :term:`S`\ ``}``, the source
|
||||
directory. In the new terminal, all the OpenEmbedded build-related
|
||||
environment variables are still defined so you can use commands such as
|
||||
``configure`` and ``make``. The commands execute just as if the
|
||||
OpenEmbedded build system were executing them. Consequently, working
|
||||
this way can be helpful when debugging a build or preparing software to
|
||||
be used with the OpenEmbedded build system.
|
||||
|
||||
Following is an example that uses ``devshell`` on a target named
|
||||
``matchbox-desktop``::
|
||||
|
||||
$ bitbake matchbox-desktop -c devshell
|
||||
|
||||
This command spawns a terminal with a shell prompt within the
|
||||
OpenEmbedded build environment. The
|
||||
:term:`OE_TERMINAL` variable
|
||||
controls what type of shell is opened.
|
||||
|
||||
For spawned terminals, the following occurs:
|
||||
|
||||
- The ``PATH`` variable includes the cross-toolchain.
|
||||
|
||||
- The ``pkgconfig`` variables find the correct ``.pc`` files.
|
||||
|
||||
- The ``configure`` command finds the Yocto Project site files as well
|
||||
as any other necessary files.
|
||||
|
||||
Within this environment, you can run configure or compile commands as if
|
||||
they were being run by the OpenEmbedded build system itself. As noted
|
||||
earlier, the working directory also automatically changes to the Source
|
||||
Directory (:term:`S`).
|
||||
|
||||
To manually run a specific task using ``devshell``, run the
|
||||
corresponding ``run.*`` script in the
|
||||
``${``\ :term:`WORKDIR`\ ``}/temp``
|
||||
directory (e.g., ``run.do_configure.``\ `pid`). If a task's script does
|
||||
not exist, which would be the case if the task was skipped by way of the
|
||||
sstate cache, you can create the task by first running it outside of the
|
||||
``devshell``::
|
||||
|
||||
$ bitbake -c task
|
||||
|
||||
.. note::
|
||||
|
||||
- Execution of a task's ``run.*`` script and BitBake's execution of
|
||||
a task are identical. In other words, running the script re-runs
|
||||
the task just as it would be run using the ``bitbake -c`` command.
|
||||
|
||||
- Any ``run.*`` file that does not have a ``.pid`` extension is a
|
||||
symbolic link (symlink) to the most recent version of that file.
|
||||
|
||||
Remember, that the ``devshell`` is a mechanism that allows you to get
|
||||
into the BitBake task execution environment. And as such, all commands
|
||||
must be called just as BitBake would call them. That means you need to
|
||||
provide the appropriate options for cross-compilation and so forth as
|
||||
applicable.
|
||||
|
||||
When you are finished using ``devshell``, exit the shell or close the
|
||||
terminal window.
|
||||
|
||||
.. note::
|
||||
|
||||
- It is worth remembering that when using ``devshell`` you need to
|
||||
use the full compiler name such as ``arm-poky-linux-gnueabi-gcc``
|
||||
instead of just using ``gcc``. The same applies to other
|
||||
applications such as ``binutils``, ``libtool`` and so forth.
|
||||
BitBake sets up environment variables such as :term:`CC` to assist
|
||||
applications, such as ``make`` to find the correct tools.
|
||||
|
||||
- It is also worth noting that ``devshell`` still works over X11
|
||||
forwarding and similar situations.
|
||||
|
||||
@@ -0,0 +1,74 @@
|
||||
.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
|
||||
|
||||
.. _device-manager:
|
||||
|
||||
Selecting a Device Manager
|
||||
**************************
|
||||
|
||||
The Yocto Project provides multiple ways to manage the device manager
|
||||
(``/dev``):
|
||||
|
||||
- Persistent and Pre-Populated ``/dev``: For this case, the ``/dev``
|
||||
directory is persistent and the required device nodes are created
|
||||
during the build.
|
||||
|
||||
- Use ``devtmpfs`` with a Device Manager: For this case, the ``/dev``
|
||||
directory is provided by the kernel as an in-memory file system and
|
||||
is automatically populated by the kernel at runtime. Additional
|
||||
configuration of device nodes is done in user space by a device
|
||||
manager like ``udev`` or ``busybox-mdev``.
|
||||
|
||||
Using Persistent and Pre-Populated ``/dev``
|
||||
===========================================
|
||||
|
||||
To use the static method for device population, you need to set the
|
||||
:term:`USE_DEVFS` variable to "0"
|
||||
as follows::
|
||||
|
||||
USE_DEVFS = "0"
|
||||
|
||||
The content of the resulting ``/dev`` directory is defined in a Device
|
||||
Table file. The
|
||||
:term:`IMAGE_DEVICE_TABLES`
|
||||
variable defines the Device Table to use and should be set in the
|
||||
machine or distro configuration file. Alternatively, you can set this
|
||||
variable in your ``local.conf`` configuration file.
|
||||
|
||||
If you do not define the :term:`IMAGE_DEVICE_TABLES` variable, the default
|
||||
``device_table-minimal.txt`` is used::
|
||||
|
||||
IMAGE_DEVICE_TABLES = "device_table-mymachine.txt"
|
||||
|
||||
The population is handled by the ``makedevs`` utility during image
|
||||
creation:
|
||||
|
||||
Using ``devtmpfs`` and a Device Manager
|
||||
=======================================
|
||||
|
||||
To use the dynamic method for device population, you need to use (or be
|
||||
sure to set) the :term:`USE_DEVFS`
|
||||
variable to "1", which is the default::
|
||||
|
||||
USE_DEVFS = "1"
|
||||
|
||||
With this
|
||||
setting, the resulting ``/dev`` directory is populated by the kernel
|
||||
using ``devtmpfs``. Make sure the corresponding kernel configuration
|
||||
variable ``CONFIG_DEVTMPFS`` is set when building you build a Linux
|
||||
kernel.
|
||||
|
||||
All devices created by ``devtmpfs`` will be owned by ``root`` and have
|
||||
permissions ``0600``.
|
||||
|
||||
To have more control over the device nodes, you can use a device manager
|
||||
like ``udev`` or ``busybox-mdev``. You choose the device manager by
|
||||
defining the ``VIRTUAL-RUNTIME_dev_manager`` variable in your machine or
|
||||
distro configuration file. Alternatively, you can set this variable in
|
||||
your ``local.conf`` configuration file::
|
||||
|
||||
VIRTUAL-RUNTIME_dev_manager = "udev"
|
||||
|
||||
# Some alternative values
|
||||
# VIRTUAL-RUNTIME_dev_manager = "busybox-mdev"
|
||||
# VIRTUAL-RUNTIME_dev_manager = "systemd"
|
||||
|
||||
@@ -0,0 +1,45 @@
|
||||
.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
|
||||
|
||||
Conserving Disk Space
|
||||
*********************
|
||||
|
||||
Conserving Disk Space During Builds
|
||||
===================================
|
||||
|
||||
To help conserve disk space during builds, you can add the following
|
||||
statement to your project's ``local.conf`` configuration file found in
|
||||
the :term:`Build Directory`::
|
||||
|
||||
INHERIT += "rm_work"
|
||||
|
||||
Adding this statement deletes the work directory used for
|
||||
building a recipe once the recipe is built. For more information on
|
||||
"rm_work", see the :ref:`ref-classes-rm-work` class in the
|
||||
Yocto Project Reference Manual.
|
||||
|
||||
When you inherit this class and build a ``core-image-sato`` image for a
|
||||
``qemux86-64`` machine from an Ubuntu 22.04 x86-64 system, you end up with a
|
||||
final disk usage of 22 Gbytes instead of &MIN_DISK_SPACE; Gbytes. However,
|
||||
&MIN_DISK_SPACE_RM_WORK; Gbytes of initial free disk space are still needed to
|
||||
create temporary files before they can be deleted.
|
||||
|
||||
Purging Duplicate Shared State Cache Files
|
||||
==========================================
|
||||
|
||||
After multiple build iterations, the Shared State (sstate) cache can contain
|
||||
duplicate cache files for a given package, while only the most recent one
|
||||
is likely to be reusable. The following command purges all but the
|
||||
newest sstate cache file for each package::
|
||||
|
||||
sstate-cache-management.sh --remove-duplicated --cache-dir=build/sstate-cache
|
||||
|
||||
This command will ask you to confirm the deletions it identifies.
|
||||
|
||||
.. note::
|
||||
|
||||
The duplicated sstate cache files of one package must have the same
|
||||
architecture, which means that sstate cache files with multiple
|
||||
architectures are not considered as duplicate.
|
||||
|
||||
Run ``sstate-cache-management.sh`` for more details about this script.
|
||||
|
||||
@@ -0,0 +1,68 @@
|
||||
.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
|
||||
|
||||
Efficiently Fetching Source Files During a Build
|
||||
************************************************
|
||||
|
||||
The OpenEmbedded build system works with source files located through
|
||||
the :term:`SRC_URI` variable. When
|
||||
you build something using BitBake, a big part of the operation is
|
||||
locating and downloading all the source tarballs. For images,
|
||||
downloading all the source for various packages can take a significant
|
||||
amount of time.
|
||||
|
||||
This section shows you how you can use mirrors to speed up fetching
|
||||
source files and how you can pre-fetch files all of which leads to more
|
||||
efficient use of resources and time.
|
||||
|
||||
Setting up Effective Mirrors
|
||||
============================
|
||||
|
||||
A good deal that goes into a Yocto Project build is simply downloading
|
||||
all of the source tarballs. Maybe you have been working with another
|
||||
build system for which you have built up a
|
||||
sizable directory of source tarballs. Or, perhaps someone else has such
|
||||
a directory for which you have read access. If so, you can save time by
|
||||
adding statements to your configuration file so that the build process
|
||||
checks local directories first for existing tarballs before checking the
|
||||
Internet.
|
||||
|
||||
Here is an efficient way to set it up in your ``local.conf`` file::
|
||||
|
||||
SOURCE_MIRROR_URL ?= "file:///home/you/your-download-dir/"
|
||||
INHERIT += "own-mirrors"
|
||||
BB_GENERATE_MIRROR_TARBALLS = "1"
|
||||
# BB_NO_NETWORK = "1"
|
||||
|
||||
In the previous example, the
|
||||
:term:`BB_GENERATE_MIRROR_TARBALLS`
|
||||
variable causes the OpenEmbedded build system to generate tarballs of
|
||||
the Git repositories and store them in the
|
||||
:term:`DL_DIR` directory. Due to
|
||||
performance reasons, generating and storing these tarballs is not the
|
||||
build system's default behavior.
|
||||
|
||||
You can also use the
|
||||
:term:`PREMIRRORS` variable. For
|
||||
an example, see the variable's glossary entry in the Yocto Project
|
||||
Reference Manual.
|
||||
|
||||
Getting Source Files and Suppressing the Build
|
||||
==============================================
|
||||
|
||||
Another technique you can use to ready yourself for a successive string
|
||||
of build operations, is to pre-fetch all the source files without
|
||||
actually starting a build. This technique lets you work through any
|
||||
download issues and ultimately gathers all the source files into your
|
||||
download directory :ref:`structure-build-downloads`,
|
||||
which is located with :term:`DL_DIR`.
|
||||
|
||||
Use the following BitBake command form to fetch all the necessary
|
||||
sources without starting the build::
|
||||
|
||||
$ bitbake target --runall=fetch
|
||||
|
||||
This
|
||||
variation of the BitBake command guarantees that you have all the
|
||||
sources for that BitBake target should you disconnect from the Internet
|
||||
and want to do the build later offline.
|
||||
|
||||
@@ -0,0 +1,84 @@
|
||||
.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
|
||||
|
||||
Using the Error Reporting Tool
|
||||
******************************
|
||||
|
||||
The error reporting tool allows you to submit errors encountered during
|
||||
builds to a central database. Outside of the build environment, you can
|
||||
use a web interface to browse errors, view statistics, and query for
|
||||
errors. The tool works using a client-server system where the client
|
||||
portion is integrated with the installed Yocto Project
|
||||
:term:`Source Directory` (e.g. ``poky``).
|
||||
The server receives the information collected and saves it in a
|
||||
database.
|
||||
|
||||
There is a live instance of the error reporting server at
|
||||
https://errors.yoctoproject.org.
|
||||
When you want to get help with build failures, you can submit all of the
|
||||
information on the failure easily and then point to the URL in your bug
|
||||
report or send an email to the mailing list.
|
||||
|
||||
.. note::
|
||||
|
||||
If you send error reports to this server, the reports become publicly
|
||||
visible.
|
||||
|
||||
Enabling and Using the Tool
|
||||
===========================
|
||||
|
||||
By default, the error reporting tool is disabled. You can enable it by
|
||||
inheriting the :ref:`ref-classes-report-error` class by adding the
|
||||
following statement to the end of your ``local.conf`` file in your
|
||||
:term:`Build Directory`::
|
||||
|
||||
INHERIT += "report-error"
|
||||
|
||||
By default, the error reporting feature stores information in
|
||||
``${``\ :term:`LOG_DIR`\ ``}/error-report``.
|
||||
However, you can specify a directory to use by adding the following to
|
||||
your ``local.conf`` file::
|
||||
|
||||
ERR_REPORT_DIR = "path"
|
||||
|
||||
Enabling error
|
||||
reporting causes the build process to collect the errors and store them
|
||||
in a file as previously described. When the build system encounters an
|
||||
error, it includes a command as part of the console output. You can run
|
||||
the command to send the error file to the server. For example, the
|
||||
following command sends the errors to an upstream server::
|
||||
|
||||
$ send-error-report /home/brandusa/project/poky/build/tmp/log/error-report/error_report_201403141617.txt
|
||||
|
||||
In the previous example, the errors are sent to a public database
|
||||
available at https://errors.yoctoproject.org, which is used by the
|
||||
entire community. If you specify a particular server, you can send the
|
||||
errors to a different database. Use the following command for more
|
||||
information on available options::
|
||||
|
||||
$ send-error-report --help
|
||||
|
||||
When sending the error file, you are prompted to review the data being
|
||||
sent as well as to provide a name and optional email address. Once you
|
||||
satisfy these prompts, the command returns a link from the server that
|
||||
corresponds to your entry in the database. For example, here is a
|
||||
typical link: https://errors.yoctoproject.org/Errors/Details/9522/
|
||||
|
||||
Following the link takes you to a web interface where you can browse,
|
||||
query the errors, and view statistics.
|
||||
|
||||
Disabling the Tool
|
||||
==================
|
||||
|
||||
To disable the error reporting feature, simply remove or comment out the
|
||||
following statement from the end of your ``local.conf`` file in your
|
||||
:term:`Build Directory`::
|
||||
|
||||
INHERIT += "report-error"
|
||||
|
||||
Setting Up Your Own Error Reporting Server
|
||||
==========================================
|
||||
|
||||
If you want to set up your own error reporting server, you can obtain
|
||||
the code from the Git repository at :yocto_git:`/error-report-web/`.
|
||||
Instructions on how to set it up are in the README document.
|
||||
|
||||
@@ -0,0 +1,67 @@
|
||||
.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
|
||||
|
||||
Using an External SCM
|
||||
*********************
|
||||
|
||||
If you're working on a recipe that pulls from an external Source Code
|
||||
Manager (SCM), it is possible to have the OpenEmbedded build system
|
||||
notice new recipe changes added to the SCM and then build the resulting
|
||||
packages that depend on the new recipes by using the latest versions.
|
||||
This only works for SCMs from which it is possible to get a sensible
|
||||
revision number for changes. Currently, you can do this with Apache
|
||||
Subversion (SVN), Git, and Bazaar (BZR) repositories.
|
||||
|
||||
To enable this behavior, the :term:`PV` of
|
||||
the recipe needs to reference
|
||||
:term:`SRCPV`. Here is an example::
|
||||
|
||||
PV = "1.2.3+git${SRCPV}"
|
||||
|
||||
Then, you can add the following to your
|
||||
``local.conf``::
|
||||
|
||||
SRCREV:pn-PN = "${AUTOREV}"
|
||||
|
||||
:term:`PN` is the name of the recipe for
|
||||
which you want to enable automatic source revision updating.
|
||||
|
||||
If you do not want to update your local configuration file, you can add
|
||||
the following directly to the recipe to finish enabling the feature::
|
||||
|
||||
SRCREV = "${AUTOREV}"
|
||||
|
||||
The Yocto Project provides a distribution named ``poky-bleeding``, whose
|
||||
configuration file contains the line::
|
||||
|
||||
require conf/distro/include/poky-floating-revisions.inc
|
||||
|
||||
This line pulls in the
|
||||
listed include file that contains numerous lines of exactly that form::
|
||||
|
||||
#SRCREV:pn-opkg-native ?= "${AUTOREV}"
|
||||
#SRCREV:pn-opkg-sdk ?= "${AUTOREV}"
|
||||
#SRCREV:pn-opkg ?= "${AUTOREV}"
|
||||
#SRCREV:pn-opkg-utils-native ?= "${AUTOREV}"
|
||||
#SRCREV:pn-opkg-utils ?= "${AUTOREV}"
|
||||
SRCREV:pn-gconf-dbus ?= "${AUTOREV}"
|
||||
SRCREV:pn-matchbox-common ?= "${AUTOREV}"
|
||||
SRCREV:pn-matchbox-config-gtk ?= "${AUTOREV}"
|
||||
SRCREV:pn-matchbox-desktop ?= "${AUTOREV}"
|
||||
SRCREV:pn-matchbox-keyboard ?= "${AUTOREV}"
|
||||
SRCREV:pn-matchbox-panel-2 ?= "${AUTOREV}"
|
||||
SRCREV:pn-matchbox-themes-extra ?= "${AUTOREV}"
|
||||
SRCREV:pn-matchbox-terminal ?= "${AUTOREV}"
|
||||
SRCREV:pn-matchbox-wm ?= "${AUTOREV}"
|
||||
SRCREV:pn-settings-daemon ?= "${AUTOREV}"
|
||||
SRCREV:pn-screenshot ?= "${AUTOREV}"
|
||||
. . .
|
||||
|
||||
These lines allow you to
|
||||
experiment with building a distribution that tracks the latest
|
||||
development source for numerous packages.
|
||||
|
||||
.. note::
|
||||
|
||||
The ``poky-bleeding`` distribution is not tested on a regular basis. Keep
|
||||
this in mind if you use it.
|
||||
|
||||
@@ -0,0 +1,40 @@
|
||||
.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
|
||||
|
||||
Optionally Using an External Toolchain
|
||||
**************************************
|
||||
|
||||
You might want to use an external toolchain as part of your development.
|
||||
If this is the case, the fundamental steps you need to accomplish are as
|
||||
follows:
|
||||
|
||||
- Understand where the installed toolchain resides. For cases where you
|
||||
need to build the external toolchain, you would need to take separate
|
||||
steps to build and install the toolchain.
|
||||
|
||||
- Make sure you add the layer that contains the toolchain to your
|
||||
``bblayers.conf`` file through the
|
||||
:term:`BBLAYERS` variable.
|
||||
|
||||
- Set the :term:`EXTERNAL_TOOLCHAIN` variable in your ``local.conf`` file
|
||||
to the location in which you installed the toolchain.
|
||||
|
||||
The toolchain configuration is very flexible and customizable. It
|
||||
is primarily controlled with the :term:`TCMODE` variable. This variable
|
||||
controls which ``tcmode-*.inc`` file to include from the
|
||||
``meta/conf/distro/include`` directory within the :term:`Source Directory`.
|
||||
|
||||
The default value of :term:`TCMODE` is "default", which tells the
|
||||
OpenEmbedded build system to use its internally built toolchain (i.e.
|
||||
``tcmode-default.inc``). However, other patterns are accepted. In
|
||||
particular, "external-\*" refers to external toolchains. One example is
|
||||
the Mentor Graphics Sourcery G++ Toolchain. Support for this toolchain resides
|
||||
in the separate ``meta-sourcery`` layer at
|
||||
https://github.com/MentorEmbedded/meta-sourcery/.
|
||||
See its ``README`` file for details about how to use this layer.
|
||||
|
||||
Another example of external toolchain layer is
|
||||
:yocto_git:`meta-arm-toolchain </meta-arm/tree/meta-arm-toolchain/>`
|
||||
supporting GNU toolchains released by ARM.
|
||||
|
||||
You can find further information by reading about the :term:`TCMODE` variable
|
||||
in the Yocto Project Reference Manual's variable glossary.
|
||||
|
After Width: | Height: | Size: 49 KiB |
|
After Width: | Height: | Size: 49 KiB |
|
After Width: | Height: | Size: 44 KiB |
|
After Width: | Height: | Size: 72 KiB |
|
After Width: | Height: | Size: 16 KiB |
|
After Width: | Height: | Size: 18 KiB |
|
After Width: | Height: | Size: 47 KiB |
@@ -0,0 +1,155 @@
|
||||
.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
|
||||
|
||||
Enabling GObject Introspection Support
|
||||
**************************************
|
||||
|
||||
`GObject introspection <https://gi.readthedocs.io/en/latest/>`__
|
||||
is the standard mechanism for accessing GObject-based software from
|
||||
runtime environments. GObject is a feature of the GLib library that
|
||||
provides an object framework for the GNOME desktop and related software.
|
||||
GObject Introspection adds information to GObject that allows objects
|
||||
created within it to be represented across different programming
|
||||
languages. If you want to construct GStreamer pipelines using Python, or
|
||||
control UPnP infrastructure using Javascript and GUPnP, GObject
|
||||
introspection is the only way to do it.
|
||||
|
||||
This section describes the Yocto Project support for generating and
|
||||
packaging GObject introspection data. GObject introspection data is a
|
||||
description of the API provided by libraries built on top of the GLib
|
||||
framework, and, in particular, that framework's GObject mechanism.
|
||||
GObject Introspection Repository (GIR) files go to ``-dev`` packages,
|
||||
``typelib`` files go to main packages as they are packaged together with
|
||||
libraries that are introspected.
|
||||
|
||||
The data is generated when building such a library, by linking the
|
||||
library with a small executable binary that asks the library to describe
|
||||
itself, and then executing the binary and processing its output.
|
||||
|
||||
Generating this data in a cross-compilation environment is difficult
|
||||
because the library is produced for the target architecture, but its
|
||||
code needs to be executed on the build host. This problem is solved with
|
||||
the OpenEmbedded build system by running the code through QEMU, which
|
||||
allows precisely that. Unfortunately, QEMU does not always work
|
||||
perfectly as mentioned in the ":ref:`dev-manual/gobject-introspection:known issues`"
|
||||
section.
|
||||
|
||||
Enabling the Generation of Introspection Data
|
||||
=============================================
|
||||
|
||||
Enabling the generation of introspection data (GIR files) in your
|
||||
library package involves the following:
|
||||
|
||||
#. Inherit the :ref:`ref-classes-gobject-introspection` class.
|
||||
|
||||
#. Make sure introspection is not disabled anywhere in the recipe or
|
||||
from anything the recipe includes. Also, make sure that
|
||||
"gobject-introspection-data" is not in
|
||||
:term:`DISTRO_FEATURES_BACKFILL_CONSIDERED`
|
||||
and that "qemu-usermode" is not in
|
||||
:term:`MACHINE_FEATURES_BACKFILL_CONSIDERED`.
|
||||
In either of these conditions, nothing will happen.
|
||||
|
||||
#. Try to build the recipe. If you encounter build errors that look like
|
||||
something is unable to find ``.so`` libraries, check where these
|
||||
libraries are located in the source tree and add the following to the
|
||||
recipe::
|
||||
|
||||
GIR_EXTRA_LIBS_PATH = "${B}/something/.libs"
|
||||
|
||||
.. note::
|
||||
|
||||
See recipes in the ``oe-core`` repository that use that
|
||||
:term:`GIR_EXTRA_LIBS_PATH` variable as an example.
|
||||
|
||||
#. Look for any other errors, which probably mean that introspection
|
||||
support in a package is not entirely standard, and thus breaks down
|
||||
in a cross-compilation environment. For such cases, custom-made fixes
|
||||
are needed. A good place to ask and receive help in these cases is
|
||||
the :ref:`Yocto Project mailing
|
||||
lists <resources-mailinglist>`.
|
||||
|
||||
.. note::
|
||||
|
||||
Using a library that no longer builds against the latest Yocto
|
||||
Project release and prints introspection related errors is a good
|
||||
candidate for the previous procedure.
|
||||
|
||||
Disabling the Generation of Introspection Data
|
||||
==============================================
|
||||
|
||||
You might find that you do not want to generate introspection data. Or,
|
||||
perhaps QEMU does not work on your build host and target architecture
|
||||
combination. If so, you can use either of the following methods to
|
||||
disable GIR file generations:
|
||||
|
||||
- Add the following to your distro configuration::
|
||||
|
||||
DISTRO_FEATURES_BACKFILL_CONSIDERED = "gobject-introspection-data"
|
||||
|
||||
Adding this statement disables generating introspection data using
|
||||
QEMU but will still enable building introspection tools and libraries
|
||||
(i.e. building them does not require the use of QEMU).
|
||||
|
||||
- Add the following to your machine configuration::
|
||||
|
||||
MACHINE_FEATURES_BACKFILL_CONSIDERED = "qemu-usermode"
|
||||
|
||||
Adding this statement disables the use of QEMU when building packages for your
|
||||
machine. Currently, this feature is used only by introspection
|
||||
recipes and has the same effect as the previously described option.
|
||||
|
||||
.. note::
|
||||
|
||||
Future releases of the Yocto Project might have other features
|
||||
affected by this option.
|
||||
|
||||
If you disable introspection data, you can still obtain it through other
|
||||
means such as copying the data from a suitable sysroot, or by generating
|
||||
it on the target hardware. The OpenEmbedded build system does not
|
||||
currently provide specific support for these techniques.
|
||||
|
||||
Testing that Introspection Works in an Image
|
||||
============================================
|
||||
|
||||
Use the following procedure to test if generating introspection data is
|
||||
working in an image:
|
||||
|
||||
#. Make sure that "gobject-introspection-data" is not in
|
||||
:term:`DISTRO_FEATURES_BACKFILL_CONSIDERED`
|
||||
and that "qemu-usermode" is not in
|
||||
:term:`MACHINE_FEATURES_BACKFILL_CONSIDERED`.
|
||||
|
||||
#. Build ``core-image-sato``.
|
||||
|
||||
#. Launch a Terminal and then start Python in the terminal.
|
||||
|
||||
#. Enter the following in the terminal::
|
||||
|
||||
>>> from gi.repository import GLib
|
||||
>>> GLib.get_host_name()
|
||||
|
||||
#. For something a little more advanced, enter the following see:
|
||||
https://python-gtk-3-tutorial.readthedocs.io/en/latest/introduction.html
|
||||
|
||||
Known Issues
|
||||
============
|
||||
|
||||
Here are know issues in GObject Introspection Support:
|
||||
|
||||
- ``qemu-ppc64`` immediately crashes. Consequently, you cannot build
|
||||
introspection data on that architecture.
|
||||
|
||||
- x32 is not supported by QEMU. Consequently, introspection data is
|
||||
disabled.
|
||||
|
||||
- musl causes transient GLib binaries to crash on assertion failures.
|
||||
Consequently, generating introspection data is disabled.
|
||||
|
||||
- Because QEMU is not able to run the binaries correctly, introspection
|
||||
is disabled for some specific packages under specific architectures
|
||||
(e.g. ``gcr``, ``libsecret``, and ``webkit``).
|
||||
|
||||
- QEMU usermode might not work properly when running 64-bit binaries
|
||||
under 32-bit host machines. In particular, "qemumips64" is known to
|
||||
not work under i686.
|
||||
|
||||
@@ -0,0 +1,54 @@
|
||||
.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
|
||||
|
||||
======================================
|
||||
Yocto Project Development Tasks Manual
|
||||
======================================
|
||||
|
||||
|
|
||||
|
||||
.. toctree::
|
||||
:caption: Table of Contents
|
||||
:numbered:
|
||||
|
||||
intro
|
||||
start
|
||||
layers
|
||||
customizing-images
|
||||
new-recipe
|
||||
new-machine
|
||||
upgrading-recipes
|
||||
temporary-source-code
|
||||
quilt.rst
|
||||
development-shell
|
||||
python-development-shell
|
||||
building
|
||||
speeding-up-build
|
||||
libraries
|
||||
prebuilt-libraries
|
||||
x32-psabi
|
||||
gobject-introspection
|
||||
external-toolchain
|
||||
wic
|
||||
bmaptool
|
||||
securing-images
|
||||
custom-distribution
|
||||
custom-template-configuration-directory
|
||||
disk-space
|
||||
packages
|
||||
efficiently-fetching-sources
|
||||
init-manager
|
||||
device-manager
|
||||
external-scm
|
||||
read-only-rootfs
|
||||
build-quality
|
||||
runtime-testing
|
||||
debugging
|
||||
changes
|
||||
licenses
|
||||
vulnerabilities
|
||||
sbom
|
||||
error-reporting-tool
|
||||
wayland
|
||||
qemu
|
||||
|
||||
.. include:: /boilerplate.rst
|
||||
@@ -0,0 +1,162 @@
|
||||
.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
|
||||
|
||||
.. _init-manager:
|
||||
|
||||
Selecting an Initialization Manager
|
||||
***********************************
|
||||
|
||||
By default, the Yocto Project uses :wikipedia:`SysVinit <Init#SysV-style>` as
|
||||
the initialization manager. There is also support for BusyBox init, a simpler
|
||||
implementation, as well as support for :wikipedia:`systemd <Systemd>`, which
|
||||
is a full replacement for init with parallel starting of services, reduced
|
||||
shell overhead, increased security and resource limits for services, and other
|
||||
features that are used by many distributions.
|
||||
|
||||
Within the system, SysVinit and BusyBox init treat system components as
|
||||
services. These services are maintained as shell scripts stored in the
|
||||
``/etc/init.d/`` directory.
|
||||
|
||||
SysVinit is more elaborate than BusyBox init and organizes services in
|
||||
different run levels. This organization is maintained by putting links
|
||||
to the services in the ``/etc/rcN.d/`` directories, where `N/` is one
|
||||
of the following options: "S", "0", "1", "2", "3", "4", "5", or "6".
|
||||
|
||||
.. note::
|
||||
|
||||
Each runlevel has a dependency on the previous runlevel. This
|
||||
dependency allows the services to work properly.
|
||||
|
||||
Both SysVinit and BusyBox init are configured through the ``/etc/inittab``
|
||||
file, with a very similar syntax, though of course BusyBox init features
|
||||
are more limited.
|
||||
|
||||
In comparison, systemd treats components as units. Using units is a
|
||||
broader concept as compared to using a service. A unit includes several
|
||||
different types of entities. ``Service`` is one of the types of entities.
|
||||
The runlevel concept in SysVinit corresponds to the concept of a target
|
||||
in systemd, where target is also a type of supported unit.
|
||||
|
||||
In systems with SysVinit or BusyBox init, services load sequentially (i.e. one
|
||||
by one) during init and parallelization is not supported. With systemd, services
|
||||
start in parallel. This method can have an impact on the startup performance
|
||||
of a given service, though systemd will also provide more services by default,
|
||||
therefore increasing the total system boot time. systemd also substantially
|
||||
increases system size because of its multiple components and the extra
|
||||
dependencies it pulls.
|
||||
|
||||
On the contrary, BusyBox init is the simplest and the lightest solution and
|
||||
also comes with BusyBox mdev as device manager, a lighter replacement to
|
||||
:wikipedia:`udev <Udev>`, which SysVinit and systemd both use.
|
||||
|
||||
The ":ref:`device-manager`" chapter has more details about device managers.
|
||||
|
||||
Using SysVinit with udev
|
||||
=========================
|
||||
|
||||
SysVinit with the udev device manager corresponds to the
|
||||
default setting in Poky. This corresponds to setting::
|
||||
|
||||
INIT_MANAGER = "sysvinit"
|
||||
|
||||
Using BusyBox init with BusyBox mdev
|
||||
====================================
|
||||
|
||||
BusyBox init with BusyBox mdev is the simplest and lightest solution
|
||||
for small root filesystems. All you need is BusyBox, which most systems
|
||||
have anyway::
|
||||
|
||||
INIT_MANAGER = "mdev-busybox"
|
||||
|
||||
Using systemd
|
||||
=============
|
||||
|
||||
The last option is to use systemd together with the udev device
|
||||
manager. This is the most powerful and versatile solution, especially
|
||||
for more complex systems::
|
||||
|
||||
INIT_MANAGER = "systemd"
|
||||
|
||||
This will enable systemd and remove sysvinit components from the image.
|
||||
See :yocto_git:`meta/conf/distro/include/init-manager-systemd.inc
|
||||
</poky/tree/meta/conf/distro/include/init-manager-systemd.inc>` for exact
|
||||
details on what this does.
|
||||
|
||||
Controling systemd from the target command line
|
||||
-----------------------------------------------
|
||||
|
||||
Here is a quick reference for controling systemd from the command line on the
|
||||
target. Instead of opening and sometimes modifying files, most interaction
|
||||
happens through the ``systemctl`` and ``journalctl`` commands:
|
||||
|
||||
- ``systemctl status``: show the status of all services
|
||||
- ``systemctl status <service>``: show the status of one service
|
||||
- ``systemctl [start|stop] <service>``: start or stop a service
|
||||
- ``systemctl [enable|disable] <service>``: enable or disable a service at boot time
|
||||
- ``systemctl list-units``: list all available units
|
||||
- ``journalctl -a``: show all logs for all services
|
||||
- ``journalctl -f``: show only the last log entries, and keep printing updates as they arrive
|
||||
- ``journalctl -u``: show only logs from a particular service
|
||||
|
||||
Using systemd-journald without a traditional syslog daemon
|
||||
----------------------------------------------------------
|
||||
|
||||
Counter-intuitively, ``systemd-journald`` is not a syslog runtime or provider,
|
||||
and the proper way to use ``systemd-journald`` as your sole logging mechanism is to
|
||||
effectively disable syslog entirely by setting these variables in your distribution
|
||||
configuration file::
|
||||
|
||||
VIRTUAL-RUNTIME_syslog = ""
|
||||
VIRTUAL-RUNTIME_base-utils-syslog = ""
|
||||
|
||||
Doing so will prevent ``rsyslog`` / ``busybox-syslog`` from being pulled in by
|
||||
default, leaving only ``systemd-journald``.
|
||||
|
||||
Summary
|
||||
-------
|
||||
|
||||
The Yocto Project supports three different initialization managers, offering
|
||||
increasing levels of complexity and functionality:
|
||||
|
||||
.. list-table::
|
||||
:widths: 40 20 20 20
|
||||
:header-rows: 1
|
||||
|
||||
* -
|
||||
- BusyBox init
|
||||
- SysVinit
|
||||
- systemd
|
||||
* - Size
|
||||
- Small
|
||||
- Small
|
||||
- Big [#footnote-systemd-size]_
|
||||
* - Complexity
|
||||
- Small
|
||||
- Medium
|
||||
- High
|
||||
* - Support for boot profiles
|
||||
- No
|
||||
- Yes ("runlevels")
|
||||
- Yes ("targets")
|
||||
* - Services defined as
|
||||
- Shell scripts
|
||||
- Shell scripts
|
||||
- Description files
|
||||
* - Starting services in parallel
|
||||
- No
|
||||
- No
|
||||
- Yes
|
||||
* - Setting service resource limits
|
||||
- No
|
||||
- No
|
||||
- Yes
|
||||
* - Support service isolation
|
||||
- No
|
||||
- No
|
||||
- Yes
|
||||
* - Integrated logging
|
||||
- No
|
||||
- No
|
||||
- Yes
|
||||
|
||||
.. [#footnote-systemd-size] Using systemd increases the ``core-image-minimal``
|
||||
image size by 160\% for ``qemux86-64`` on Mickledore (4.2), compared to SysVinit.
|
||||
@@ -0,0 +1,59 @@
|
||||
.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
|
||||
|
||||
******************************************
|
||||
The Yocto Project Development Tasks Manual
|
||||
******************************************
|
||||
|
||||
Welcome
|
||||
=======
|
||||
|
||||
Welcome to the Yocto Project Development Tasks Manual. This manual
|
||||
provides relevant procedures necessary for developing in the Yocto
|
||||
Project environment (i.e. developing embedded Linux images and
|
||||
user-space applications that run on targeted devices). This manual groups
|
||||
related procedures into higher-level sections. Procedures can consist of
|
||||
high-level steps or low-level steps depending on the topic.
|
||||
|
||||
This manual provides the following:
|
||||
|
||||
- Procedures that help you get going with the Yocto Project; for
|
||||
example, procedures that show you how to set up a build host and work
|
||||
with the Yocto Project source repositories.
|
||||
|
||||
- Procedures that show you how to submit changes to the Yocto Project.
|
||||
Changes can be improvements, new features, or bug fixes.
|
||||
|
||||
- Procedures related to "everyday" tasks you perform while developing
|
||||
images and applications using the Yocto Project, such as
|
||||
creating a new layer, customizing an image, writing a new recipe,
|
||||
and so forth.
|
||||
|
||||
This manual does not provide the following:
|
||||
|
||||
- Redundant step-by-step instructions: For example, the
|
||||
:doc:`/sdk-manual/index` manual contains detailed
|
||||
instructions on how to install an SDK, which is used to develop
|
||||
applications for target hardware.
|
||||
|
||||
- Reference or conceptual material: This type of material resides in an
|
||||
appropriate reference manual. As an example, system variables are
|
||||
documented in the :doc:`/ref-manual/index`.
|
||||
|
||||
- Detailed public information not specific to the Yocto Project: For
|
||||
example, exhaustive information on how to use the Git version
|
||||
control system is better covered with Internet searches and official Git
|
||||
documentation than through the Yocto Project documentation.
|
||||
|
||||
Other Information
|
||||
=================
|
||||
|
||||
Because this manual presents information for many different topics,
|
||||
supplemental information is recommended for full comprehension. For
|
||||
introductory information on the Yocto Project, see the
|
||||
:yocto_home:`Yocto Project Website <>`. If you want to build an image with no
|
||||
knowledge of Yocto Project as a way of quickly testing it out, see the
|
||||
:doc:`/brief-yoctoprojectqs/index` document.
|
||||
|
||||
For a comprehensive list of links and other documentation, see the
|
||||
":ref:`ref-manual/resources:links and related documentation`"
|
||||
section in the Yocto Project Reference Manual.
|
||||
@@ -0,0 +1,905 @@
|
||||
.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
|
||||
|
||||
Understanding and Creating Layers
|
||||
*********************************
|
||||
|
||||
The OpenEmbedded build system supports organizing
|
||||
:term:`Metadata` into multiple layers.
|
||||
Layers allow you to isolate different types of customizations from each
|
||||
other. For introductory information on the Yocto Project Layer Model,
|
||||
see the
|
||||
":ref:`overview-manual/yp-intro:the yocto project layer model`"
|
||||
section in the Yocto Project Overview and Concepts Manual.
|
||||
|
||||
Creating Your Own Layer
|
||||
=======================
|
||||
|
||||
.. note::
|
||||
|
||||
It is very easy to create your own layers to use with the OpenEmbedded
|
||||
build system, as the Yocto Project ships with tools that speed up creating
|
||||
layers. This section describes the steps you perform by hand to create
|
||||
layers so that you can better understand them. For information about the
|
||||
layer-creation tools, see the
|
||||
":ref:`bsp-guide/bsp:creating a new bsp layer using the \`\`bitbake-layers\`\` script`"
|
||||
section in the Yocto Project Board Support Package (BSP) Developer's
|
||||
Guide and the ":ref:`dev-manual/layers:creating a general layer using the \`\`bitbake-layers\`\` script`"
|
||||
section further down in this manual.
|
||||
|
||||
Follow these general steps to create your layer without using tools:
|
||||
|
||||
#. *Check Existing Layers:* Before creating a new layer, you should be
|
||||
sure someone has not already created a layer containing the Metadata
|
||||
you need. You can see the :oe_layerindex:`OpenEmbedded Metadata Index <>`
|
||||
for a list of layers from the OpenEmbedded community that can be used in
|
||||
the Yocto Project. You could find a layer that is identical or close
|
||||
to what you need.
|
||||
|
||||
#. *Create a Directory:* Create the directory for your layer. When you
|
||||
create the layer, be sure to create the directory in an area not
|
||||
associated with the Yocto Project :term:`Source Directory`
|
||||
(e.g. the cloned ``poky`` repository).
|
||||
|
||||
While not strictly required, prepend the name of the directory with
|
||||
the string "meta-". For example::
|
||||
|
||||
meta-mylayer
|
||||
meta-GUI_xyz
|
||||
meta-mymachine
|
||||
|
||||
With rare exceptions, a layer's name follows this form::
|
||||
|
||||
meta-root_name
|
||||
|
||||
Following this layer naming convention can save
|
||||
you trouble later when tools, components, or variables "assume" your
|
||||
layer name begins with "meta-". A notable example is in configuration
|
||||
files as shown in the following step where layer names without the
|
||||
"meta-" string are appended to several variables used in the
|
||||
configuration.
|
||||
|
||||
#. *Create a Layer Configuration File:* Inside your new layer folder,
|
||||
you need to create a ``conf/layer.conf`` file. It is easiest to take
|
||||
an existing layer configuration file and copy that to your layer's
|
||||
``conf`` directory and then modify the file as needed.
|
||||
|
||||
The ``meta-yocto-bsp/conf/layer.conf`` file in the Yocto Project
|
||||
:yocto_git:`Source Repositories </poky/tree/meta-yocto-bsp/conf>`
|
||||
demonstrates the required syntax. For your layer, you need to replace
|
||||
"yoctobsp" with a unique identifier for your layer (e.g. "machinexyz"
|
||||
for a layer named "meta-machinexyz")::
|
||||
|
||||
# We have a conf and classes directory, add to BBPATH
|
||||
BBPATH .= ":${LAYERDIR}"
|
||||
|
||||
# We have recipes-* directories, add to BBFILES
|
||||
BBFILES += "${LAYERDIR}/recipes-*/*/*.bb \
|
||||
${LAYERDIR}/recipes-*/*/*.bbappend"
|
||||
|
||||
BBFILE_COLLECTIONS += "yoctobsp"
|
||||
BBFILE_PATTERN_yoctobsp = "^${LAYERDIR}/"
|
||||
BBFILE_PRIORITY_yoctobsp = "5"
|
||||
LAYERVERSION_yoctobsp = "4"
|
||||
LAYERSERIES_COMPAT_yoctobsp = "dunfell"
|
||||
|
||||
Following is an explanation of the layer configuration file:
|
||||
|
||||
- :term:`BBPATH`: Adds the layer's
|
||||
root directory to BitBake's search path. Through the use of the
|
||||
:term:`BBPATH` variable, BitBake locates class files (``.bbclass``),
|
||||
configuration files, and files that are included with ``include``
|
||||
and ``require`` statements. For these cases, BitBake uses the
|
||||
first file that matches the name found in :term:`BBPATH`. This is
|
||||
similar to the way the ``PATH`` variable is used for binaries. It
|
||||
is recommended, therefore, that you use unique class and
|
||||
configuration filenames in your custom layer.
|
||||
|
||||
- :term:`BBFILES`: Defines the
|
||||
location for all recipes in the layer.
|
||||
|
||||
- :term:`BBFILE_COLLECTIONS`:
|
||||
Establishes the current layer through a unique identifier that is
|
||||
used throughout the OpenEmbedded build system to refer to the
|
||||
layer. In this example, the identifier "yoctobsp" is the
|
||||
representation for the container layer named "meta-yocto-bsp".
|
||||
|
||||
- :term:`BBFILE_PATTERN`:
|
||||
Expands immediately during parsing to provide the directory of the
|
||||
layer.
|
||||
|
||||
- :term:`BBFILE_PRIORITY`:
|
||||
Establishes a priority to use for recipes in the layer when the
|
||||
OpenEmbedded build finds recipes of the same name in different
|
||||
layers.
|
||||
|
||||
- :term:`LAYERVERSION`:
|
||||
Establishes a version number for the layer. You can use this
|
||||
version number to specify this exact version of the layer as a
|
||||
dependency when using the
|
||||
:term:`LAYERDEPENDS`
|
||||
variable.
|
||||
|
||||
- :term:`LAYERDEPENDS`:
|
||||
Lists all layers on which this layer depends (if any).
|
||||
|
||||
- :term:`LAYERSERIES_COMPAT`:
|
||||
Lists the :yocto_wiki:`Yocto Project </Releases>`
|
||||
releases for which the current version is compatible. This
|
||||
variable is a good way to indicate if your particular layer is
|
||||
current.
|
||||
|
||||
#. *Add Content:* Depending on the type of layer, add the content. If
|
||||
the layer adds support for a machine, add the machine configuration
|
||||
in a ``conf/machine/`` file within the layer. If the layer adds
|
||||
distro policy, add the distro configuration in a ``conf/distro/``
|
||||
file within the layer. If the layer introduces new recipes, put the
|
||||
recipes you need in ``recipes-*`` subdirectories within the layer.
|
||||
|
||||
.. note::
|
||||
|
||||
For an explanation of layer hierarchy that is compliant with the
|
||||
Yocto Project, see the ":ref:`bsp-guide/bsp:example filesystem layout`"
|
||||
section in the Yocto Project Board Support Package (BSP) Developer's Guide.
|
||||
|
||||
#. *Optionally Test for Compatibility:* If you want permission to use
|
||||
the Yocto Project Compatibility logo with your layer or application
|
||||
that uses your layer, perform the steps to apply for compatibility.
|
||||
See the
|
||||
":ref:`dev-manual/layers:making sure your layer is compatible with yocto project`"
|
||||
section for more information.
|
||||
|
||||
Following Best Practices When Creating Layers
|
||||
=============================================
|
||||
|
||||
To create layers that are easier to maintain and that will not impact
|
||||
builds for other machines, you should consider the information in the
|
||||
following list:
|
||||
|
||||
- *Avoid "Overlaying" Entire Recipes from Other Layers in Your
|
||||
Configuration:* In other words, do not copy an entire recipe into
|
||||
your layer and then modify it. Rather, use an append file
|
||||
(``.bbappend``) to override only those parts of the original recipe
|
||||
you need to modify.
|
||||
|
||||
- *Avoid Duplicating Include Files:* Use append files (``.bbappend``)
|
||||
for each recipe that uses an include file. Or, if you are introducing
|
||||
a new recipe that requires the included file, use the path relative
|
||||
to the original layer directory to refer to the file. For example,
|
||||
use ``require recipes-core/``\ `package`\ ``/``\ `file`\ ``.inc`` instead
|
||||
of ``require`` `file`\ ``.inc``. If you're finding you have to overlay
|
||||
the include file, it could indicate a deficiency in the include file
|
||||
in the layer to which it originally belongs. If this is the case, you
|
||||
should try to address that deficiency instead of overlaying the
|
||||
include file. For example, you could address this by getting the
|
||||
maintainer of the include file to add a variable or variables to make
|
||||
it easy to override the parts needing to be overridden.
|
||||
|
||||
- *Structure Your Layers:* Proper use of overrides within append files
|
||||
and placement of machine-specific files within your layer can ensure
|
||||
that a build is not using the wrong Metadata and negatively impacting
|
||||
a build for a different machine. Following are some examples:
|
||||
|
||||
- *Modify Variables to Support a Different Machine:* Suppose you
|
||||
have a layer named ``meta-one`` that adds support for building
|
||||
machine "one". To do so, you use an append file named
|
||||
``base-files.bbappend`` and create a dependency on "foo" by
|
||||
altering the :term:`DEPENDS`
|
||||
variable::
|
||||
|
||||
DEPENDS = "foo"
|
||||
|
||||
The dependency is created during any
|
||||
build that includes the layer ``meta-one``. However, you might not
|
||||
want this dependency for all machines. For example, suppose you
|
||||
are building for machine "two" but your ``bblayers.conf`` file has
|
||||
the ``meta-one`` layer included. During the build, the
|
||||
``base-files`` for machine "two" will also have the dependency on
|
||||
``foo``.
|
||||
|
||||
To make sure your changes apply only when building machine "one",
|
||||
use a machine override with the :term:`DEPENDS` statement::
|
||||
|
||||
DEPENDS:one = "foo"
|
||||
|
||||
You should follow the same strategy when using ``:append``
|
||||
and ``:prepend`` operations::
|
||||
|
||||
DEPENDS:append:one = " foo"
|
||||
DEPENDS:prepend:one = "foo "
|
||||
|
||||
As an actual example, here's a
|
||||
snippet from the generic kernel include file ``linux-yocto.inc``,
|
||||
wherein the kernel compile and link options are adjusted in the
|
||||
case of a subset of the supported architectures::
|
||||
|
||||
DEPENDS:append:aarch64 = " libgcc"
|
||||
KERNEL_CC:append:aarch64 = " ${TOOLCHAIN_OPTIONS}"
|
||||
KERNEL_LD:append:aarch64 = " ${TOOLCHAIN_OPTIONS}"
|
||||
|
||||
DEPENDS:append:nios2 = " libgcc"
|
||||
KERNEL_CC:append:nios2 = " ${TOOLCHAIN_OPTIONS}"
|
||||
KERNEL_LD:append:nios2 = " ${TOOLCHAIN_OPTIONS}"
|
||||
|
||||
DEPENDS:append:arc = " libgcc"
|
||||
KERNEL_CC:append:arc = " ${TOOLCHAIN_OPTIONS}"
|
||||
KERNEL_LD:append:arc = " ${TOOLCHAIN_OPTIONS}"
|
||||
|
||||
KERNEL_FEATURES:append:qemuall=" features/debug/printk.scc"
|
||||
|
||||
- *Place Machine-Specific Files in Machine-Specific Locations:* When
|
||||
you have a base recipe, such as ``base-files.bb``, that contains a
|
||||
:term:`SRC_URI` statement to a
|
||||
file, you can use an append file to cause the build to use your
|
||||
own version of the file. For example, an append file in your layer
|
||||
at ``meta-one/recipes-core/base-files/base-files.bbappend`` could
|
||||
extend :term:`FILESPATH` using :term:`FILESEXTRAPATHS` as follows::
|
||||
|
||||
FILESEXTRAPATHS:prepend := "${THISDIR}/${BPN}:"
|
||||
|
||||
The build for machine "one" will pick up your machine-specific file as
|
||||
long as you have the file in
|
||||
``meta-one/recipes-core/base-files/base-files/``. However, if you
|
||||
are building for a different machine and the ``bblayers.conf``
|
||||
file includes the ``meta-one`` layer and the location of your
|
||||
machine-specific file is the first location where that file is
|
||||
found according to :term:`FILESPATH`, builds for all machines will
|
||||
also use that machine-specific file.
|
||||
|
||||
You can make sure that a machine-specific file is used for a
|
||||
particular machine by putting the file in a subdirectory specific
|
||||
to the machine. For example, rather than placing the file in
|
||||
``meta-one/recipes-core/base-files/base-files/`` as shown above,
|
||||
put it in ``meta-one/recipes-core/base-files/base-files/one/``.
|
||||
Not only does this make sure the file is used only when building
|
||||
for machine "one", but the build process locates the file more
|
||||
quickly.
|
||||
|
||||
In summary, you need to place all files referenced from
|
||||
:term:`SRC_URI` in a machine-specific subdirectory within the layer in
|
||||
order to restrict those files to machine-specific builds.
|
||||
|
||||
- *Perform Steps to Apply for Yocto Project Compatibility:* If you want
|
||||
permission to use the Yocto Project Compatibility logo with your
|
||||
layer or application that uses your layer, perform the steps to apply
|
||||
for compatibility. See the
|
||||
":ref:`dev-manual/layers:making sure your layer is compatible with yocto project`"
|
||||
section for more information.
|
||||
|
||||
- *Follow the Layer Naming Convention:* Store custom layers in a Git
|
||||
repository that use the ``meta-layer_name`` format.
|
||||
|
||||
- *Group Your Layers Locally:* Clone your repository alongside other
|
||||
cloned ``meta`` directories from the :term:`Source Directory`.
|
||||
|
||||
Making Sure Your Layer is Compatible With Yocto Project
|
||||
=======================================================
|
||||
|
||||
When you create a layer used with the Yocto Project, it is advantageous
|
||||
to make sure that the layer interacts well with existing Yocto Project
|
||||
layers (i.e. the layer is compatible with the Yocto Project). Ensuring
|
||||
compatibility makes the layer easy to be consumed by others in the Yocto
|
||||
Project community and could allow you permission to use the Yocto
|
||||
Project Compatible Logo.
|
||||
|
||||
.. note::
|
||||
|
||||
Only Yocto Project member organizations are permitted to use the
|
||||
Yocto Project Compatible Logo. The logo is not available for general
|
||||
use. For information on how to become a Yocto Project member
|
||||
organization, see the :yocto_home:`Yocto Project Website <>`.
|
||||
|
||||
The Yocto Project Compatibility Program consists of a layer application
|
||||
process that requests permission to use the Yocto Project Compatibility
|
||||
Logo for your layer and application. The process consists of two parts:
|
||||
|
||||
#. Successfully passing a script (``yocto-check-layer``) that when run
|
||||
against your layer, tests it against constraints based on experiences
|
||||
of how layers have worked in the real world and where pitfalls have
|
||||
been found. Getting a "PASS" result from the script is required for
|
||||
successful compatibility registration.
|
||||
|
||||
#. Completion of an application acceptance form, which you can find at
|
||||
:yocto_home:`/webform/yocto-project-compatible-registration`.
|
||||
|
||||
To be granted permission to use the logo, you need to satisfy the
|
||||
following:
|
||||
|
||||
- Be able to check the box indicating that you got a "PASS" when
|
||||
running the script against your layer.
|
||||
|
||||
- Answer "Yes" to the questions on the form or have an acceptable
|
||||
explanation for any questions answered "No".
|
||||
|
||||
- Be a Yocto Project Member Organization.
|
||||
|
||||
The remainder of this section presents information on the registration
|
||||
form and on the ``yocto-check-layer`` script.
|
||||
|
||||
Yocto Project Compatible Program Application
|
||||
--------------------------------------------
|
||||
|
||||
Use the form to apply for your layer's approval. Upon successful
|
||||
application, you can use the Yocto Project Compatibility Logo with your
|
||||
layer and the application that uses your layer.
|
||||
|
||||
To access the form, use this link:
|
||||
:yocto_home:`/webform/yocto-project-compatible-registration`.
|
||||
Follow the instructions on the form to complete your application.
|
||||
|
||||
The application consists of the following sections:
|
||||
|
||||
- *Contact Information:* Provide your contact information as the fields
|
||||
require. Along with your information, provide the released versions
|
||||
of the Yocto Project for which your layer is compatible.
|
||||
|
||||
- *Acceptance Criteria:* Provide "Yes" or "No" answers for each of the
|
||||
items in the checklist. There is space at the bottom of the form for
|
||||
any explanations for items for which you answered "No".
|
||||
|
||||
- *Recommendations:* Provide answers for the questions regarding Linux
|
||||
kernel use and build success.
|
||||
|
||||
``yocto-check-layer`` Script
|
||||
----------------------------
|
||||
|
||||
The ``yocto-check-layer`` script provides you a way to assess how
|
||||
compatible your layer is with the Yocto Project. You should run this
|
||||
script prior to using the form to apply for compatibility as described
|
||||
in the previous section. You need to achieve a "PASS" result in order to
|
||||
have your application form successfully processed.
|
||||
|
||||
The script divides tests into three areas: COMMON, BSP, and DISTRO. For
|
||||
example, given a distribution layer (DISTRO), the layer must pass both
|
||||
the COMMON and DISTRO related tests. Furthermore, if your layer is a BSP
|
||||
layer, the layer must pass the COMMON and BSP set of tests.
|
||||
|
||||
To execute the script, enter the following commands from your build
|
||||
directory::
|
||||
|
||||
$ source oe-init-build-env
|
||||
$ yocto-check-layer your_layer_directory
|
||||
|
||||
Be sure to provide the actual directory for your
|
||||
layer as part of the command.
|
||||
|
||||
Entering the command causes the script to determine the type of layer
|
||||
and then to execute a set of specific tests against the layer. The
|
||||
following list overviews the test:
|
||||
|
||||
- ``common.test_readme``: Tests if a ``README`` file exists in the
|
||||
layer and the file is not empty.
|
||||
|
||||
- ``common.test_parse``: Tests to make sure that BitBake can parse the
|
||||
files without error (i.e. ``bitbake -p``).
|
||||
|
||||
- ``common.test_show_environment``: Tests that the global or per-recipe
|
||||
environment is in order without errors (i.e. ``bitbake -e``).
|
||||
|
||||
- ``common.test_world``: Verifies that ``bitbake world`` works.
|
||||
|
||||
- ``common.test_signatures``: Tests to be sure that BSP and DISTRO
|
||||
layers do not come with recipes that change signatures.
|
||||
|
||||
- ``common.test_layerseries_compat``: Verifies layer compatibility is
|
||||
set properly.
|
||||
|
||||
- ``bsp.test_bsp_defines_machines``: Tests if a BSP layer has machine
|
||||
configurations.
|
||||
|
||||
- ``bsp.test_bsp_no_set_machine``: Tests to ensure a BSP layer does not
|
||||
set the machine when the layer is added.
|
||||
|
||||
- ``bsp.test_machine_world``: Verifies that ``bitbake world`` works
|
||||
regardless of which machine is selected.
|
||||
|
||||
- ``bsp.test_machine_signatures``: Verifies that building for a
|
||||
particular machine affects only the signature of tasks specific to
|
||||
that machine.
|
||||
|
||||
- ``distro.test_distro_defines_distros``: Tests if a DISTRO layer has
|
||||
distro configurations.
|
||||
|
||||
- ``distro.test_distro_no_set_distros``: Tests to ensure a DISTRO layer
|
||||
does not set the distribution when the layer is added.
|
||||
|
||||
Enabling Your Layer
|
||||
===================
|
||||
|
||||
Before the OpenEmbedded build system can use your new layer, you need to
|
||||
enable it. To enable your layer, simply add your layer's path to the
|
||||
:term:`BBLAYERS` variable in your ``conf/bblayers.conf`` file, which is
|
||||
found in the :term:`Build Directory`. The following example shows how to
|
||||
enable your new ``meta-mylayer`` layer (note how your new layer exists
|
||||
outside of the official ``poky`` repository which you would have checked
|
||||
out earlier)::
|
||||
|
||||
# POKY_BBLAYERS_CONF_VERSION is increased each time build/conf/bblayers.conf
|
||||
# changes incompatibly
|
||||
POKY_BBLAYERS_CONF_VERSION = "2"
|
||||
BBPATH = "${TOPDIR}"
|
||||
BBFILES ?= ""
|
||||
BBLAYERS ?= " \
|
||||
/home/user/poky/meta \
|
||||
/home/user/poky/meta-poky \
|
||||
/home/user/poky/meta-yocto-bsp \
|
||||
/home/user/mystuff/meta-mylayer \
|
||||
"
|
||||
|
||||
BitBake parses each ``conf/layer.conf`` file from the top down as
|
||||
specified in the :term:`BBLAYERS` variable within the ``conf/bblayers.conf``
|
||||
file. During the processing of each ``conf/layer.conf`` file, BitBake
|
||||
adds the recipes, classes and configurations contained within the
|
||||
particular layer to the source directory.
|
||||
|
||||
Appending Other Layers Metadata With Your Layer
|
||||
===============================================
|
||||
|
||||
A recipe that appends Metadata to another recipe is called a BitBake
|
||||
append file. A BitBake append file uses the ``.bbappend`` file type
|
||||
suffix, while the corresponding recipe to which Metadata is being
|
||||
appended uses the ``.bb`` file type suffix.
|
||||
|
||||
You can use a ``.bbappend`` file in your layer to make additions or
|
||||
changes to the content of another layer's recipe without having to copy
|
||||
the other layer's recipe into your layer. Your ``.bbappend`` file
|
||||
resides in your layer, while the main ``.bb`` recipe file to which you
|
||||
are appending Metadata resides in a different layer.
|
||||
|
||||
Being able to append information to an existing recipe not only avoids
|
||||
duplication, but also automatically applies recipe changes from a
|
||||
different layer into your layer. If you were copying recipes, you would
|
||||
have to manually merge changes as they occur.
|
||||
|
||||
When you create an append file, you must use the same root name as the
|
||||
corresponding recipe file. For example, the append file
|
||||
``someapp_3.1.bbappend`` must apply to ``someapp_3.1.bb``. This
|
||||
means the original recipe and append filenames are version
|
||||
number-specific. If the corresponding recipe is renamed to update to a
|
||||
newer version, you must also rename and possibly update the
|
||||
corresponding ``.bbappend`` as well. During the build process, BitBake
|
||||
displays an error on starting if it detects a ``.bbappend`` file that
|
||||
does not have a corresponding recipe with a matching name. See the
|
||||
:term:`BB_DANGLINGAPPENDS_WARNONLY`
|
||||
variable for information on how to handle this error.
|
||||
|
||||
Overlaying a File Using Your Layer
|
||||
----------------------------------
|
||||
|
||||
As an example, consider the main formfactor recipe and a corresponding
|
||||
formfactor append file both from the :term:`Source Directory`.
|
||||
Here is the main
|
||||
formfactor recipe, which is named ``formfactor_0.0.bb`` and located in
|
||||
the "meta" layer at ``meta/recipes-bsp/formfactor``::
|
||||
|
||||
SUMMARY = "Device formfactor information"
|
||||
DESCRIPTION = "A formfactor configuration file provides information about the \
|
||||
target hardware for which the image is being built and information that the \
|
||||
build system cannot obtain from other sources such as the kernel."
|
||||
SECTION = "base"
|
||||
LICENSE = "MIT"
|
||||
LIC_FILES_CHKSUM = "file://${COREBASE}/meta/COPYING.MIT;md5=3da9cfbcb788c80a0384361b4de20420"
|
||||
PR = "r45"
|
||||
|
||||
SRC_URI = "file://config file://machconfig"
|
||||
S = "${WORKDIR}"
|
||||
|
||||
PACKAGE_ARCH = "${MACHINE_ARCH}"
|
||||
INHIBIT_DEFAULT_DEPS = "1"
|
||||
|
||||
do_install() {
|
||||
# Install file only if it has contents
|
||||
install -d ${D}${sysconfdir}/formfactor/
|
||||
install -m 0644 ${S}/config ${D}${sysconfdir}/formfactor/
|
||||
if [ -s "${S}/machconfig" ]; then
|
||||
install -m 0644 ${S}/machconfig ${D}${sysconfdir}/formfactor/
|
||||
fi
|
||||
}
|
||||
|
||||
In the main recipe, note the :term:`SRC_URI`
|
||||
variable, which tells the OpenEmbedded build system where to find files
|
||||
during the build.
|
||||
|
||||
Following is the append file, which is named ``formfactor_0.0.bbappend``
|
||||
and is from the Raspberry Pi BSP Layer named ``meta-raspberrypi``. The
|
||||
file is in the layer at ``recipes-bsp/formfactor``::
|
||||
|
||||
FILESEXTRAPATHS:prepend := "${THISDIR}/${PN}:"
|
||||
|
||||
By default, the build system uses the
|
||||
:term:`FILESPATH` variable to
|
||||
locate files. This append file extends the locations by setting the
|
||||
:term:`FILESEXTRAPATHS`
|
||||
variable. Setting this variable in the ``.bbappend`` file is the most
|
||||
reliable and recommended method for adding directories to the search
|
||||
path used by the build system to find files.
|
||||
|
||||
The statement in this example extends the directories to include
|
||||
``${``\ :term:`THISDIR`\ ``}/${``\ :term:`PN`\ ``}``,
|
||||
which resolves to a directory named ``formfactor`` in the same directory
|
||||
in which the append file resides (i.e.
|
||||
``meta-raspberrypi/recipes-bsp/formfactor``. This implies that you must
|
||||
have the supporting directory structure set up that will contain any
|
||||
files or patches you will be including from the layer.
|
||||
|
||||
Using the immediate expansion assignment operator ``:=`` is important
|
||||
because of the reference to :term:`THISDIR`. The trailing colon character is
|
||||
important as it ensures that items in the list remain colon-separated.
|
||||
|
||||
.. note::
|
||||
|
||||
BitBake automatically defines the :term:`THISDIR` variable. You should
|
||||
never set this variable yourself. Using ":prepend" as part of the
|
||||
:term:`FILESEXTRAPATHS` ensures your path will be searched prior to other
|
||||
paths in the final list.
|
||||
|
||||
Also, not all append files add extra files. Many append files simply
|
||||
allow to add build options (e.g. ``systemd``). For these cases, your
|
||||
append file would not even use the :term:`FILESEXTRAPATHS` statement.
|
||||
|
||||
The end result of this ``.bbappend`` file is that on a Raspberry Pi, where
|
||||
``rpi`` will exist in the list of :term:`OVERRIDES`, the file
|
||||
``meta-raspberrypi/recipes-bsp/formfactor/formfactor/rpi/machconfig`` will be
|
||||
used during :ref:`ref-tasks-fetch` and the test for a non-zero file size in
|
||||
:ref:`ref-tasks-install` will return true, and the file will be installed.
|
||||
|
||||
Installing Additional Files Using Your Layer
|
||||
--------------------------------------------
|
||||
|
||||
As another example, consider the main ``xserver-xf86-config`` recipe and a
|
||||
corresponding ``xserver-xf86-config`` append file both from the :term:`Source
|
||||
Directory`. Here is the main ``xserver-xf86-config`` recipe, which is named
|
||||
``xserver-xf86-config_0.1.bb`` and located in the "meta" layer at
|
||||
``meta/recipes-graphics/xorg-xserver``::
|
||||
|
||||
SUMMARY = "X.Org X server configuration file"
|
||||
HOMEPAGE = "http://www.x.org"
|
||||
SECTION = "x11/base"
|
||||
LICENSE = "MIT"
|
||||
LIC_FILES_CHKSUM = "file://${COREBASE}/meta/COPYING.MIT;md5=3da9cfbcb788c80a0384361b4de20420"
|
||||
PR = "r33"
|
||||
|
||||
SRC_URI = "file://xorg.conf"
|
||||
|
||||
S = "${WORKDIR}"
|
||||
|
||||
CONFFILES:${PN} = "${sysconfdir}/X11/xorg.conf"
|
||||
|
||||
PACKAGE_ARCH = "${MACHINE_ARCH}"
|
||||
ALLOW_EMPTY:${PN} = "1"
|
||||
|
||||
do_install () {
|
||||
if test -s ${WORKDIR}/xorg.conf; then
|
||||
install -d ${D}/${sysconfdir}/X11
|
||||
install -m 0644 ${WORKDIR}/xorg.conf ${D}/${sysconfdir}/X11/
|
||||
fi
|
||||
}
|
||||
|
||||
Following is the append file, which is named ``xserver-xf86-config_%.bbappend``
|
||||
and is from the Raspberry Pi BSP Layer named ``meta-raspberrypi``. The
|
||||
file is in the layer at ``recipes-graphics/xorg-xserver``::
|
||||
|
||||
FILESEXTRAPATHS:prepend := "${THISDIR}/${PN}:"
|
||||
|
||||
SRC_URI:append:rpi = " \
|
||||
file://xorg.conf.d/98-pitft.conf \
|
||||
file://xorg.conf.d/99-calibration.conf \
|
||||
"
|
||||
do_install:append:rpi () {
|
||||
PITFT="${@bb.utils.contains("MACHINE_FEATURES", "pitft", "1", "0", d)}"
|
||||
if [ "${PITFT}" = "1" ]; then
|
||||
install -d ${D}/${sysconfdir}/X11/xorg.conf.d/
|
||||
install -m 0644 ${WORKDIR}/xorg.conf.d/98-pitft.conf ${D}/${sysconfdir}/X11/xorg.conf.d/
|
||||
install -m 0644 ${WORKDIR}/xorg.conf.d/99-calibration.conf ${D}/${sysconfdir}/X11/xorg.conf.d/
|
||||
fi
|
||||
}
|
||||
|
||||
FILES:${PN}:append:rpi = " ${sysconfdir}/X11/xorg.conf.d/*"
|
||||
|
||||
Building off of the previous example, we once again are setting the
|
||||
:term:`FILESEXTRAPATHS` variable. In this case we are also using
|
||||
:term:`SRC_URI` to list additional source files to use when ``rpi`` is found in
|
||||
the list of :term:`OVERRIDES`. The :ref:`ref-tasks-install` task will then perform a
|
||||
check for an additional :term:`MACHINE_FEATURES` that if set will cause these
|
||||
additional files to be installed. These additional files are listed in
|
||||
:term:`FILES` so that they will be packaged.
|
||||
|
||||
Prioritizing Your Layer
|
||||
=======================
|
||||
|
||||
Each layer is assigned a priority value. Priority values control which
|
||||
layer takes precedence if there are recipe files with the same name in
|
||||
multiple layers. For these cases, the recipe file from the layer with a
|
||||
higher priority number takes precedence. Priority values also affect the
|
||||
order in which multiple ``.bbappend`` files for the same recipe are
|
||||
applied. You can either specify the priority manually, or allow the
|
||||
build system to calculate it based on the layer's dependencies.
|
||||
|
||||
To specify the layer's priority manually, use the
|
||||
:term:`BBFILE_PRIORITY`
|
||||
variable and append the layer's root name::
|
||||
|
||||
BBFILE_PRIORITY_mylayer = "1"
|
||||
|
||||
.. note::
|
||||
|
||||
It is possible for a recipe with a lower version number
|
||||
:term:`PV` in a layer that has a higher
|
||||
priority to take precedence.
|
||||
|
||||
Also, the layer priority does not currently affect the precedence
|
||||
order of ``.conf`` or ``.bbclass`` files. Future versions of BitBake
|
||||
might address this.
|
||||
|
||||
Managing Layers
|
||||
===============
|
||||
|
||||
You can use the BitBake layer management tool ``bitbake-layers`` to
|
||||
provide a view into the structure of recipes across a multi-layer
|
||||
project. Being able to generate output that reports on configured layers
|
||||
with their paths and priorities and on ``.bbappend`` files and their
|
||||
applicable recipes can help to reveal potential problems.
|
||||
|
||||
For help on the BitBake layer management tool, use the following
|
||||
command::
|
||||
|
||||
$ bitbake-layers --help
|
||||
|
||||
The following list describes the available commands:
|
||||
|
||||
- ``help:`` Displays general help or help on a specified command.
|
||||
|
||||
- ``show-layers:`` Shows the current configured layers.
|
||||
|
||||
- ``show-overlayed:`` Lists overlayed recipes. A recipe is overlayed
|
||||
when a recipe with the same name exists in another layer that has a
|
||||
higher layer priority.
|
||||
|
||||
- ``show-recipes:`` Lists available recipes and the layers that
|
||||
provide them.
|
||||
|
||||
- ``show-appends:`` Lists ``.bbappend`` files and the recipe files to
|
||||
which they apply.
|
||||
|
||||
- ``show-cross-depends:`` Lists dependency relationships between
|
||||
recipes that cross layer boundaries.
|
||||
|
||||
- ``add-layer:`` Adds a layer to ``bblayers.conf``.
|
||||
|
||||
- ``remove-layer:`` Removes a layer from ``bblayers.conf``
|
||||
|
||||
- ``flatten:`` Flattens the layer configuration into a separate
|
||||
output directory. Flattening your layer configuration builds a
|
||||
"flattened" directory that contains the contents of all layers, with
|
||||
any overlayed recipes removed and any ``.bbappend`` files appended to
|
||||
the corresponding recipes. You might have to perform some manual
|
||||
cleanup of the flattened layer as follows:
|
||||
|
||||
- Non-recipe files (such as patches) are overwritten. The flatten
|
||||
command shows a warning for these files.
|
||||
|
||||
- Anything beyond the normal layer setup has been added to the
|
||||
``layer.conf`` file. Only the lowest priority layer's
|
||||
``layer.conf`` is used.
|
||||
|
||||
- Overridden and appended items from ``.bbappend`` files need to be
|
||||
cleaned up. The contents of each ``.bbappend`` end up in the
|
||||
flattened recipe. However, if there are appended or changed
|
||||
variable values, you need to tidy these up yourself. Consider the
|
||||
following example. Here, the ``bitbake-layers`` command adds the
|
||||
line ``#### bbappended ...`` so that you know where the following
|
||||
lines originate::
|
||||
|
||||
...
|
||||
DESCRIPTION = "A useful utility"
|
||||
...
|
||||
EXTRA_OECONF = "--enable-something"
|
||||
...
|
||||
|
||||
#### bbappended from meta-anotherlayer ####
|
||||
|
||||
DESCRIPTION = "Customized utility"
|
||||
EXTRA_OECONF += "--enable-somethingelse"
|
||||
|
||||
|
||||
Ideally, you would tidy up these utilities as follows::
|
||||
|
||||
...
|
||||
DESCRIPTION = "Customized utility"
|
||||
...
|
||||
EXTRA_OECONF = "--enable-something --enable-somethingelse"
|
||||
...
|
||||
|
||||
- ``layerindex-fetch``: Fetches a layer from a layer index, along
|
||||
with its dependent layers, and adds the layers to the
|
||||
``conf/bblayers.conf`` file.
|
||||
|
||||
- ``layerindex-show-depends``: Finds layer dependencies from the
|
||||
layer index.
|
||||
|
||||
- ``save-build-conf``: Saves the currently active build configuration
|
||||
(``conf/local.conf``, ``conf/bblayers.conf``) as a template into a layer.
|
||||
This template can later be used for setting up builds via :term:``TEMPLATECONF``.
|
||||
For information about saving and using configuration templates, see
|
||||
":ref:`dev-manual/custom-template-configuration-directory:creating a custom template configuration directory`".
|
||||
|
||||
- ``create-layer``: Creates a basic layer.
|
||||
|
||||
- ``create-layers-setup``: Writes out a configuration file and/or a script that
|
||||
can replicate the directory structure and revisions of the layers in a current build.
|
||||
For more information, see ":ref:`dev-manual/layers:saving and restoring the layers setup`".
|
||||
|
||||
Creating a General Layer Using the ``bitbake-layers`` Script
|
||||
============================================================
|
||||
|
||||
The ``bitbake-layers`` script with the ``create-layer`` subcommand
|
||||
simplifies creating a new general layer.
|
||||
|
||||
.. note::
|
||||
|
||||
- For information on BSP layers, see the ":ref:`bsp-guide/bsp:bsp layers`"
|
||||
section in the Yocto
|
||||
Project Board Specific (BSP) Developer's Guide.
|
||||
|
||||
- In order to use a layer with the OpenEmbedded build system, you
|
||||
need to add the layer to your ``bblayers.conf`` configuration
|
||||
file. See the ":ref:`dev-manual/layers:adding a layer using the \`\`bitbake-layers\`\` script`"
|
||||
section for more information.
|
||||
|
||||
The default mode of the script's operation with this subcommand is to
|
||||
create a layer with the following:
|
||||
|
||||
- A layer priority of 6.
|
||||
|
||||
- A ``conf`` subdirectory that contains a ``layer.conf`` file.
|
||||
|
||||
- A ``recipes-example`` subdirectory that contains a further
|
||||
subdirectory named ``example``, which contains an ``example.bb``
|
||||
recipe file.
|
||||
|
||||
- A ``COPYING.MIT``, which is the license statement for the layer. The
|
||||
script assumes you want to use the MIT license, which is typical for
|
||||
most layers, for the contents of the layer itself.
|
||||
|
||||
- A ``README`` file, which is a file describing the contents of your
|
||||
new layer.
|
||||
|
||||
In its simplest form, you can use the following command form to create a
|
||||
layer. The command creates a layer whose name corresponds to
|
||||
"your_layer_name" in the current directory::
|
||||
|
||||
$ bitbake-layers create-layer your_layer_name
|
||||
|
||||
As an example, the following command creates a layer named ``meta-scottrif``
|
||||
in your home directory::
|
||||
|
||||
$ cd /usr/home
|
||||
$ bitbake-layers create-layer meta-scottrif
|
||||
NOTE: Starting bitbake server...
|
||||
Add your new layer with 'bitbake-layers add-layer meta-scottrif'
|
||||
|
||||
If you want to set the priority of the layer to other than the default
|
||||
value of "6", you can either use the ``--priority`` option or you
|
||||
can edit the
|
||||
:term:`BBFILE_PRIORITY` value
|
||||
in the ``conf/layer.conf`` after the script creates it. Furthermore, if
|
||||
you want to give the example recipe file some name other than the
|
||||
default, you can use the ``--example-recipe-name`` option.
|
||||
|
||||
The easiest way to see how the ``bitbake-layers create-layer`` command
|
||||
works is to experiment with the script. You can also read the usage
|
||||
information by entering the following::
|
||||
|
||||
$ bitbake-layers create-layer --help
|
||||
NOTE: Starting bitbake server...
|
||||
usage: bitbake-layers create-layer [-h] [--priority PRIORITY]
|
||||
[--example-recipe-name EXAMPLERECIPE]
|
||||
layerdir
|
||||
|
||||
Create a basic layer
|
||||
|
||||
positional arguments:
|
||||
layerdir Layer directory to create
|
||||
|
||||
optional arguments:
|
||||
-h, --help show this help message and exit
|
||||
--priority PRIORITY, -p PRIORITY
|
||||
Layer directory to create
|
||||
--example-recipe-name EXAMPLERECIPE, -e EXAMPLERECIPE
|
||||
Filename of the example recipe
|
||||
|
||||
Adding a Layer Using the ``bitbake-layers`` Script
|
||||
==================================================
|
||||
|
||||
Once you create your general layer, you must add it to your
|
||||
``bblayers.conf`` file. Adding the layer to this configuration file
|
||||
makes the OpenEmbedded build system aware of your layer so that it can
|
||||
search it for metadata.
|
||||
|
||||
Add your layer by using the ``bitbake-layers add-layer`` command::
|
||||
|
||||
$ bitbake-layers add-layer your_layer_name
|
||||
|
||||
Here is an example that adds a
|
||||
layer named ``meta-scottrif`` to the configuration file. Following the
|
||||
command that adds the layer is another ``bitbake-layers`` command that
|
||||
shows the layers that are in your ``bblayers.conf`` file::
|
||||
|
||||
$ bitbake-layers add-layer meta-scottrif
|
||||
NOTE: Starting bitbake server...
|
||||
Parsing recipes: 100% |##########################################################| Time: 0:00:49
|
||||
Parsing of 1441 .bb files complete (0 cached, 1441 parsed). 2055 targets, 56 skipped, 0 masked, 0 errors.
|
||||
$ bitbake-layers show-layers
|
||||
NOTE: Starting bitbake server...
|
||||
layer path priority
|
||||
==========================================================================
|
||||
meta /home/scottrif/poky/meta 5
|
||||
meta-poky /home/scottrif/poky/meta-poky 5
|
||||
meta-yocto-bsp /home/scottrif/poky/meta-yocto-bsp 5
|
||||
workspace /home/scottrif/poky/build/workspace 99
|
||||
meta-scottrif /home/scottrif/poky/build/meta-scottrif 6
|
||||
|
||||
|
||||
Adding the layer to this file
|
||||
enables the build system to locate the layer during the build.
|
||||
|
||||
.. note::
|
||||
|
||||
During a build, the OpenEmbedded build system looks in the layers
|
||||
from the top of the list down to the bottom in that order.
|
||||
|
||||
Saving and restoring the layers setup
|
||||
=====================================
|
||||
|
||||
Once you have a working build with the correct set of layers, it is beneficial
|
||||
to capture the layer setup --- what they are, which repositories they come from
|
||||
and which SCM revisions they're at --- into a configuration file, so that this
|
||||
setup can be easily replicated later, perhaps on a different machine. Here's
|
||||
how to do this::
|
||||
|
||||
$ bitbake-layers create-layers-setup /srv/work/alex/meta-alex/
|
||||
NOTE: Starting bitbake server...
|
||||
NOTE: Created /srv/work/alex/meta-alex/setup-layers.json
|
||||
NOTE: Created /srv/work/alex/meta-alex/setup-layers
|
||||
|
||||
The tool needs a single argument which tells where to place the output, consisting
|
||||
of a json formatted layer configuration, and a ``setup-layers`` script that can use that configuration
|
||||
to restore the layers in a different location, or on a different host machine. The argument
|
||||
can point to a custom layer (which is then deemed a "bootstrap" layer that needs to be
|
||||
checked out first), or into a completely independent location.
|
||||
|
||||
The replication of the layers is performed by running the ``setup-layers`` script provided
|
||||
above:
|
||||
|
||||
#. Clone the bootstrap layer or some other repository to obtain
|
||||
the json config and the setup script that can use it.
|
||||
|
||||
#. Run the script directly with no options::
|
||||
|
||||
alex@Zen2:/srv/work/alex/my-build$ meta-alex/setup-layers
|
||||
Note: not checking out source meta-alex, use --force-bootstraplayer-checkout to override.
|
||||
|
||||
Setting up source meta-intel, revision 15.0-hardknott-3.3-310-g0a96edae, branch master
|
||||
Running 'git init -q /srv/work/alex/my-build/meta-intel'
|
||||
Running 'git remote remove origin > /dev/null 2>&1; git remote add origin git://git.yoctoproject.org/meta-intel' in /srv/work/alex/my-build/meta-intel
|
||||
Running 'git fetch -q origin || true' in /srv/work/alex/my-build/meta-intel
|
||||
Running 'git checkout -q 0a96edae609a3f48befac36af82cf1eed6786b4a' in /srv/work/alex/my-build/meta-intel
|
||||
|
||||
Setting up source poky, revision 4.1_M1-372-g55483d28f2, branch akanavin/setup-layers
|
||||
Running 'git init -q /srv/work/alex/my-build/poky'
|
||||
Running 'git remote remove origin > /dev/null 2>&1; git remote add origin git://git.yoctoproject.org/poky' in /srv/work/alex/my-build/poky
|
||||
Running 'git fetch -q origin || true' in /srv/work/alex/my-build/poky
|
||||
Running 'git remote remove poky-contrib > /dev/null 2>&1; git remote add poky-contrib ssh://git@push.yoctoproject.org/poky-contrib' in /srv/work/alex/my-build/poky
|
||||
Running 'git fetch -q poky-contrib || true' in /srv/work/alex/my-build/poky
|
||||
Running 'git checkout -q 11db0390b02acac1324e0f827beb0e2e3d0d1d63' in /srv/work/alex/my-build/poky
|
||||
|
||||
.. note::
|
||||
This will work to update an existing checkout as well.
|
||||
|
||||
.. note::
|
||||
The script is self-sufficient and requires only python3
|
||||
and git on the build machine.
|
||||
|
||||
.. note::
|
||||
Both the ``create-layers-setup`` and the ``setup-layers`` provided several additional options
|
||||
that customize their behavior - you are welcome to study them via ``--help`` command line parameter.
|
||||
|
||||
@@ -0,0 +1,267 @@
|
||||
.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
|
||||
|
||||
Working With Libraries
|
||||
**********************
|
||||
|
||||
Libraries are an integral part of your system. This section describes
|
||||
some common practices you might find helpful when working with libraries
|
||||
to build your system:
|
||||
|
||||
- :ref:`How to include static library files
|
||||
<dev-manual/libraries:including static library files>`
|
||||
|
||||
- :ref:`How to use the Multilib feature to combine multiple versions of
|
||||
library files into a single image
|
||||
<dev-manual/libraries:combining multiple versions of library files into one image>`
|
||||
|
||||
- :ref:`How to install multiple versions of the same library in parallel on
|
||||
the same system
|
||||
<dev-manual/libraries:installing multiple versions of the same library>`
|
||||
|
||||
Including Static Library Files
|
||||
==============================
|
||||
|
||||
If you are building a library and the library offers static linking, you
|
||||
can control which static library files (``*.a`` files) get included in
|
||||
the built library.
|
||||
|
||||
The :term:`PACKAGES` and
|
||||
:term:`FILES:* <FILES>` variables in the
|
||||
``meta/conf/bitbake.conf`` configuration file define how files installed
|
||||
by the :ref:`ref-tasks-install` task are packaged. By default, the :term:`PACKAGES`
|
||||
variable includes ``${PN}-staticdev``, which represents all static
|
||||
library files.
|
||||
|
||||
.. note::
|
||||
|
||||
Some previously released versions of the Yocto Project defined the
|
||||
static library files through ``${PN}-dev``.
|
||||
|
||||
Following is part of the BitBake configuration file, where you can see
|
||||
how the static library files are defined::
|
||||
|
||||
PACKAGE_BEFORE_PN ?= ""
|
||||
PACKAGES = "${PN}-src ${PN}-dbg ${PN}-staticdev ${PN}-dev ${PN}-doc ${PN}-locale ${PACKAGE_BEFORE_PN} ${PN}"
|
||||
PACKAGES_DYNAMIC = "^${PN}-locale-.*"
|
||||
FILES = ""
|
||||
|
||||
FILES:${PN} = "${bindir}/* ${sbindir}/* ${libexecdir}/* ${libdir}/lib*${SOLIBS} \
|
||||
${sysconfdir} ${sharedstatedir} ${localstatedir} \
|
||||
${base_bindir}/* ${base_sbindir}/* \
|
||||
${base_libdir}/*${SOLIBS} \
|
||||
${base_prefix}/lib/udev ${prefix}/lib/udev \
|
||||
${base_libdir}/udev ${libdir}/udev \
|
||||
${datadir}/${BPN} ${libdir}/${BPN}/* \
|
||||
${datadir}/pixmaps ${datadir}/applications \
|
||||
${datadir}/idl ${datadir}/omf ${datadir}/sounds \
|
||||
${libdir}/bonobo/servers"
|
||||
|
||||
FILES:${PN}-bin = "${bindir}/* ${sbindir}/*"
|
||||
|
||||
FILES:${PN}-doc = "${docdir} ${mandir} ${infodir} ${datadir}/gtk-doc \
|
||||
${datadir}/gnome/help"
|
||||
SECTION:${PN}-doc = "doc"
|
||||
|
||||
FILES_SOLIBSDEV ?= "${base_libdir}/lib*${SOLIBSDEV} ${libdir}/lib*${SOLIBSDEV}"
|
||||
FILES:${PN}-dev = "${includedir} ${FILES_SOLIBSDEV} ${libdir}/*.la \
|
||||
${libdir}/*.o ${libdir}/pkgconfig ${datadir}/pkgconfig \
|
||||
${datadir}/aclocal ${base_libdir}/*.o \
|
||||
${libdir}/${BPN}/*.la ${base_libdir}/*.la \
|
||||
${libdir}/cmake ${datadir}/cmake"
|
||||
SECTION:${PN}-dev = "devel"
|
||||
ALLOW_EMPTY:${PN}-dev = "1"
|
||||
RDEPENDS:${PN}-dev = "${PN} (= ${EXTENDPKGV})"
|
||||
|
||||
FILES:${PN}-staticdev = "${libdir}/*.a ${base_libdir}/*.a ${libdir}/${BPN}/*.a"
|
||||
SECTION:${PN}-staticdev = "devel"
|
||||
RDEPENDS:${PN}-staticdev = "${PN}-dev (= ${EXTENDPKGV})"
|
||||
|
||||
Combining Multiple Versions of Library Files into One Image
|
||||
===========================================================
|
||||
|
||||
The build system offers the ability to build libraries with different
|
||||
target optimizations or architecture formats and combine these together
|
||||
into one system image. You can link different binaries in the image
|
||||
against the different libraries as needed for specific use cases. This
|
||||
feature is called "Multilib".
|
||||
|
||||
An example would be where you have most of a system compiled in 32-bit
|
||||
mode using 32-bit libraries, but you have something large, like a
|
||||
database engine, that needs to be a 64-bit application and uses 64-bit
|
||||
libraries. Multilib allows you to get the best of both 32-bit and 64-bit
|
||||
libraries.
|
||||
|
||||
While the Multilib feature is most commonly used for 32 and 64-bit
|
||||
differences, the approach the build system uses facilitates different
|
||||
target optimizations. You could compile some binaries to use one set of
|
||||
libraries and other binaries to use a different set of libraries. The
|
||||
libraries could differ in architecture, compiler options, or other
|
||||
optimizations.
|
||||
|
||||
There are several examples in the ``meta-skeleton`` layer found in the
|
||||
:term:`Source Directory`:
|
||||
|
||||
- :oe_git:`conf/multilib-example.conf </openembedded-core/tree/meta-skeleton/conf/multilib-example.conf>`
|
||||
configuration file.
|
||||
|
||||
- :oe_git:`conf/multilib-example2.conf </openembedded-core/tree/meta-skeleton/conf/multilib-example2.conf>`
|
||||
configuration file.
|
||||
|
||||
- :oe_git:`recipes-multilib/images/core-image-multilib-example.bb </openembedded-core/tree/meta-skeleton/recipes-multilib/images/core-image-multilib-example.bb>`
|
||||
recipe
|
||||
|
||||
Preparing to Use Multilib
|
||||
-------------------------
|
||||
|
||||
User-specific requirements drive the Multilib feature. Consequently,
|
||||
there is no one "out-of-the-box" configuration that would
|
||||
meet your needs.
|
||||
|
||||
In order to enable Multilib, you first need to ensure your recipe is
|
||||
extended to support multiple libraries. Many standard recipes are
|
||||
already extended and support multiple libraries. You can check in the
|
||||
``meta/conf/multilib.conf`` configuration file in the
|
||||
:term:`Source Directory` to see how this is
|
||||
done using the
|
||||
:term:`BBCLASSEXTEND` variable.
|
||||
Eventually, all recipes will be covered and this list will not be
|
||||
needed.
|
||||
|
||||
For the most part, the :ref:`Multilib <ref-classes-multilib*>`
|
||||
class extension works automatically to
|
||||
extend the package name from ``${PN}`` to ``${MLPREFIX}${PN}``, where
|
||||
:term:`MLPREFIX` is the particular multilib (e.g. "lib32-" or "lib64-").
|
||||
Standard variables such as
|
||||
:term:`DEPENDS`,
|
||||
:term:`RDEPENDS`,
|
||||
:term:`RPROVIDES`,
|
||||
:term:`RRECOMMENDS`,
|
||||
:term:`PACKAGES`, and
|
||||
:term:`PACKAGES_DYNAMIC` are
|
||||
automatically extended by the system. If you are extending any manual
|
||||
code in the recipe, you can use the ``${MLPREFIX}`` variable to ensure
|
||||
those names are extended correctly.
|
||||
|
||||
Using Multilib
|
||||
--------------
|
||||
|
||||
After you have set up the recipes, you need to define the actual
|
||||
combination of multiple libraries you want to build. You accomplish this
|
||||
through your ``local.conf`` configuration file in the
|
||||
:term:`Build Directory`. An example configuration would be as follows::
|
||||
|
||||
MACHINE = "qemux86-64"
|
||||
require conf/multilib.conf
|
||||
MULTILIBS = "multilib:lib32"
|
||||
DEFAULTTUNE:virtclass-multilib-lib32 = "x86"
|
||||
IMAGE_INSTALL:append = " lib32-glib-2.0"
|
||||
|
||||
This example enables an additional library named
|
||||
``lib32`` alongside the normal target packages. When combining these
|
||||
"lib32" alternatives, the example uses "x86" for tuning. For information
|
||||
on this particular tuning, see
|
||||
``meta/conf/machine/include/ia32/arch-ia32.inc``.
|
||||
|
||||
The example then includes ``lib32-glib-2.0`` in all the images, which
|
||||
illustrates one method of including a multiple library dependency. You
|
||||
can use a normal image build to include this dependency, for example::
|
||||
|
||||
$ bitbake core-image-sato
|
||||
|
||||
You can also build Multilib packages
|
||||
specifically with a command like this::
|
||||
|
||||
$ bitbake lib32-glib-2.0
|
||||
|
||||
Additional Implementation Details
|
||||
---------------------------------
|
||||
|
||||
There are generic implementation details as well as details that are specific to
|
||||
package management systems. Following are implementation details
|
||||
that exist regardless of the package management system:
|
||||
|
||||
- The typical convention used for the class extension code as used by
|
||||
Multilib assumes that all package names specified in
|
||||
:term:`PACKAGES` that contain
|
||||
``${PN}`` have ``${PN}`` at the start of the name. When that
|
||||
convention is not followed and ``${PN}`` appears at the middle or the
|
||||
end of a name, problems occur.
|
||||
|
||||
- The :term:`TARGET_VENDOR`
|
||||
value under Multilib will be extended to "-vendormlmultilib" (e.g.
|
||||
"-pokymllib32" for a "lib32" Multilib with Poky). The reason for this
|
||||
slightly unwieldy contraction is that any "-" characters in the
|
||||
vendor string presently break Autoconf's ``config.sub``, and other
|
||||
separators are problematic for different reasons.
|
||||
|
||||
Here are the implementation details for the RPM Package Management System:
|
||||
|
||||
- A unique architecture is defined for the Multilib packages, along
|
||||
with creating a unique deploy folder under ``tmp/deploy/rpm`` in the
|
||||
:term:`Build Directory`. For example, consider ``lib32`` in a
|
||||
``qemux86-64`` image. The possible architectures in the system are "all",
|
||||
"qemux86_64", "lib32:qemux86_64", and "lib32:x86".
|
||||
|
||||
- The ``${MLPREFIX}`` variable is stripped from ``${PN}`` during RPM
|
||||
packaging. The naming for a normal RPM package and a Multilib RPM
|
||||
package in a ``qemux86-64`` system resolves to something similar to
|
||||
``bash-4.1-r2.x86_64.rpm`` and ``bash-4.1.r2.lib32_x86.rpm``,
|
||||
respectively.
|
||||
|
||||
- When installing a Multilib image, the RPM backend first installs the
|
||||
base image and then installs the Multilib libraries.
|
||||
|
||||
- The build system relies on RPM to resolve the identical files in the
|
||||
two (or more) Multilib packages.
|
||||
|
||||
Here are the implementation details for the IPK Package Management System:
|
||||
|
||||
- The ``${MLPREFIX}`` is not stripped from ``${PN}`` during IPK
|
||||
packaging. The naming for a normal RPM package and a Multilib IPK
|
||||
package in a ``qemux86-64`` system resolves to something like
|
||||
``bash_4.1-r2.x86_64.ipk`` and ``lib32-bash_4.1-rw:x86.ipk``,
|
||||
respectively.
|
||||
|
||||
- The IPK deploy folder is not modified with ``${MLPREFIX}`` because
|
||||
packages with and without the Multilib feature can exist in the same
|
||||
folder due to the ``${PN}`` differences.
|
||||
|
||||
- IPK defines a sanity check for Multilib installation using certain
|
||||
rules for file comparison, overridden, etc.
|
||||
|
||||
Installing Multiple Versions of the Same Library
|
||||
================================================
|
||||
|
||||
There are be situations where you need to install and use multiple versions
|
||||
of the same library on the same system at the same time. This
|
||||
almost always happens when a library API changes and you have
|
||||
multiple pieces of software that depend on the separate versions of the
|
||||
library. To accommodate these situations, you can install multiple
|
||||
versions of the same library in parallel on the same system.
|
||||
|
||||
The process is straightforward as long as the libraries use proper
|
||||
versioning. With properly versioned libraries, all you need to do to
|
||||
individually specify the libraries is create separate, appropriately
|
||||
named recipes where the :term:`PN` part of
|
||||
the name includes a portion that differentiates each library version
|
||||
(e.g. the major part of the version number). Thus, instead of having a
|
||||
single recipe that loads one version of a library (e.g. ``clutter``),
|
||||
you provide multiple recipes that result in different versions of the
|
||||
libraries you want. As an example, the following two recipes would allow
|
||||
the two separate versions of the ``clutter`` library to co-exist on the
|
||||
same system:
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
clutter-1.6_1.6.20.bb
|
||||
clutter-1.8_1.8.4.bb
|
||||
|
||||
Additionally, if
|
||||
you have other recipes that depend on a given library, you need to use
|
||||
the :term:`DEPENDS` variable to
|
||||
create the dependency. Continuing with the same example, if you want to
|
||||
have a recipe depend on the 1.8 version of the ``clutter`` library, use
|
||||
the following in your recipe::
|
||||
|
||||
DEPENDS = "clutter-1.8"
|
||||
|
||||
@@ -0,0 +1,522 @@
|
||||
.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
|
||||
|
||||
Working With Licenses
|
||||
*********************
|
||||
|
||||
As mentioned in the ":ref:`overview-manual/development-environment:licensing`"
|
||||
section in the Yocto Project Overview and Concepts Manual, open source
|
||||
projects are open to the public and they consequently have different
|
||||
licensing structures in place. This section describes the mechanism by
|
||||
which the :term:`OpenEmbedded Build System`
|
||||
tracks changes to
|
||||
licensing text and covers how to maintain open source license compliance
|
||||
during your project's lifecycle. The section also describes how to
|
||||
enable commercially licensed recipes, which by default are disabled.
|
||||
|
||||
Tracking License Changes
|
||||
========================
|
||||
|
||||
The license of an upstream project might change in the future. In order
|
||||
to prevent these changes going unnoticed, the
|
||||
:term:`LIC_FILES_CHKSUM`
|
||||
variable tracks changes to the license text. The checksums are validated
|
||||
at the end of the configure step, and if the checksums do not match, the
|
||||
build will fail.
|
||||
|
||||
Specifying the ``LIC_FILES_CHKSUM`` Variable
|
||||
--------------------------------------------
|
||||
|
||||
The :term:`LIC_FILES_CHKSUM` variable contains checksums of the license text
|
||||
in the source code for the recipe. Following is an example of how to
|
||||
specify :term:`LIC_FILES_CHKSUM`::
|
||||
|
||||
LIC_FILES_CHKSUM = "file://COPYING;md5=xxxx \
|
||||
file://licfile1.txt;beginline=5;endline=29;md5=yyyy \
|
||||
file://licfile2.txt;endline=50;md5=zzzz \
|
||||
..."
|
||||
|
||||
.. note::
|
||||
|
||||
- When using "beginline" and "endline", realize that line numbering
|
||||
begins with one and not zero. Also, the included lines are
|
||||
inclusive (i.e. lines five through and including 29 in the
|
||||
previous example for ``licfile1.txt``).
|
||||
|
||||
- When a license check fails, the selected license text is included
|
||||
as part of the QA message. Using this output, you can determine
|
||||
the exact start and finish for the needed license text.
|
||||
|
||||
The build system uses the :term:`S`
|
||||
variable as the default directory when searching files listed in
|
||||
:term:`LIC_FILES_CHKSUM`. The previous example employs the default
|
||||
directory.
|
||||
|
||||
Consider this next example::
|
||||
|
||||
LIC_FILES_CHKSUM = "file://src/ls.c;beginline=5;endline=16;\
|
||||
md5=bb14ed3c4cda583abc85401304b5cd4e"
|
||||
LIC_FILES_CHKSUM = "file://${WORKDIR}/license.html;md5=5c94767cedb5d6987c902ac850ded2c6"
|
||||
|
||||
The first line locates a file in ``${S}/src/ls.c`` and isolates lines
|
||||
five through 16 as license text. The second line refers to a file in
|
||||
:term:`WORKDIR`.
|
||||
|
||||
Note that :term:`LIC_FILES_CHKSUM` variable is mandatory for all recipes,
|
||||
unless the :term:`LICENSE` variable is set to "CLOSED".
|
||||
|
||||
Explanation of Syntax
|
||||
---------------------
|
||||
|
||||
As mentioned in the previous section, the :term:`LIC_FILES_CHKSUM` variable
|
||||
lists all the important files that contain the license text for the
|
||||
source code. It is possible to specify a checksum for an entire file, or
|
||||
a specific section of a file (specified by beginning and ending line
|
||||
numbers with the "beginline" and "endline" parameters, respectively).
|
||||
The latter is useful for source files with a license notice header,
|
||||
README documents, and so forth. If you do not use the "beginline"
|
||||
parameter, then it is assumed that the text begins on the first line of
|
||||
the file. Similarly, if you do not use the "endline" parameter, it is
|
||||
assumed that the license text ends with the last line of the file.
|
||||
|
||||
The "md5" parameter stores the md5 checksum of the license text. If the
|
||||
license text changes in any way as compared to this parameter then a
|
||||
mismatch occurs. This mismatch triggers a build failure and notifies the
|
||||
developer. Notification allows the developer to review and address the
|
||||
license text changes. Also note that if a mismatch occurs during the
|
||||
build, the correct md5 checksum is placed in the build log and can be
|
||||
easily copied to the recipe.
|
||||
|
||||
There is no limit to how many files you can specify using the
|
||||
:term:`LIC_FILES_CHKSUM` variable. Generally, however, every project
|
||||
requires a few specifications for license tracking. Many projects have a
|
||||
"COPYING" file that stores the license information for all the source
|
||||
code files. This practice allows you to just track the "COPYING" file as
|
||||
long as it is kept up to date.
|
||||
|
||||
.. note::
|
||||
|
||||
- If you specify an empty or invalid "md5" parameter,
|
||||
:term:`BitBake` returns an md5
|
||||
mis-match error and displays the correct "md5" parameter value
|
||||
during the build. The correct parameter is also captured in the
|
||||
build log.
|
||||
|
||||
- If the whole file contains only license text, you do not need to
|
||||
use the "beginline" and "endline" parameters.
|
||||
|
||||
Enabling Commercially Licensed Recipes
|
||||
======================================
|
||||
|
||||
By default, the OpenEmbedded build system disables components that have
|
||||
commercial or other special licensing requirements. Such requirements
|
||||
are defined on a recipe-by-recipe basis through the
|
||||
:term:`LICENSE_FLAGS` variable
|
||||
definition in the affected recipe. For instance, the
|
||||
``poky/meta/recipes-multimedia/gstreamer/gst-plugins-ugly`` recipe
|
||||
contains the following statement::
|
||||
|
||||
LICENSE_FLAGS = "commercial"
|
||||
|
||||
Here is a
|
||||
slightly more complicated example that contains both an explicit recipe
|
||||
name and version (after variable expansion)::
|
||||
|
||||
LICENSE_FLAGS = "license_${PN}_${PV}"
|
||||
|
||||
In order for a component restricted by a
|
||||
:term:`LICENSE_FLAGS` definition to be enabled and included in an image, it
|
||||
needs to have a matching entry in the global
|
||||
:term:`LICENSE_FLAGS_ACCEPTED`
|
||||
variable, which is a variable typically defined in your ``local.conf``
|
||||
file. For example, to enable the
|
||||
``poky/meta/recipes-multimedia/gstreamer/gst-plugins-ugly`` package, you
|
||||
could add either the string "commercial_gst-plugins-ugly" or the more
|
||||
general string "commercial" to :term:`LICENSE_FLAGS_ACCEPTED`. See the
|
||||
":ref:`dev-manual/licenses:license flag matching`" section for a full
|
||||
explanation of how :term:`LICENSE_FLAGS` matching works. Here is the
|
||||
example::
|
||||
|
||||
LICENSE_FLAGS_ACCEPTED = "commercial_gst-plugins-ugly"
|
||||
|
||||
Likewise, to additionally enable the package built from the recipe
|
||||
containing ``LICENSE_FLAGS = "license_${PN}_${PV}"``, and assuming that
|
||||
the actual recipe name was ``emgd_1.10.bb``, the following string would
|
||||
enable that package as well as the original ``gst-plugins-ugly``
|
||||
package::
|
||||
|
||||
LICENSE_FLAGS_ACCEPTED = "commercial_gst-plugins-ugly license_emgd_1.10"
|
||||
|
||||
As a convenience, you do not need to specify the
|
||||
complete license string for every package. You can use
|
||||
an abbreviated form, which consists of just the first portion or
|
||||
portions of the license string before the initial underscore character
|
||||
or characters. A partial string will match any license that contains the
|
||||
given string as the first portion of its license. For example, the
|
||||
following value will also match both of the packages
|
||||
previously mentioned as well as any other packages that have licenses
|
||||
starting with "commercial" or "license"::
|
||||
|
||||
LICENSE_FLAGS_ACCEPTED = "commercial license"
|
||||
|
||||
License Flag Matching
|
||||
---------------------
|
||||
|
||||
License flag matching allows you to control what recipes the
|
||||
OpenEmbedded build system includes in the build. Fundamentally, the
|
||||
build system attempts to match :term:`LICENSE_FLAGS` strings found in
|
||||
recipes against strings found in :term:`LICENSE_FLAGS_ACCEPTED`.
|
||||
A match causes the build system to include a recipe in the
|
||||
build, while failure to find a match causes the build system to exclude
|
||||
a recipe.
|
||||
|
||||
In general, license flag matching is simple. However, understanding some
|
||||
concepts will help you correctly and effectively use matching.
|
||||
|
||||
Before a flag defined by a particular recipe is tested against the
|
||||
entries of :term:`LICENSE_FLAGS_ACCEPTED`, the expanded
|
||||
string ``_${PN}`` is appended to the flag. This expansion makes each
|
||||
:term:`LICENSE_FLAGS` value recipe-specific. After expansion, the
|
||||
string is then matched against the entries. Thus, specifying
|
||||
``LICENSE_FLAGS = "commercial"`` in recipe "foo", for example, results
|
||||
in the string ``"commercial_foo"``. And, to create a match, that string
|
||||
must appear among the entries of :term:`LICENSE_FLAGS_ACCEPTED`.
|
||||
|
||||
Judicious use of the :term:`LICENSE_FLAGS` strings and the contents of the
|
||||
:term:`LICENSE_FLAGS_ACCEPTED` variable allows you a lot of flexibility for
|
||||
including or excluding recipes based on licensing. For example, you can
|
||||
broaden the matching capabilities by using license flags string subsets
|
||||
in :term:`LICENSE_FLAGS_ACCEPTED`.
|
||||
|
||||
.. note::
|
||||
|
||||
When using a string subset, be sure to use the part of the expanded
|
||||
string that precedes the appended underscore character (e.g.
|
||||
``usethispart_1.3``, ``usethispart_1.4``, and so forth).
|
||||
|
||||
For example, simply specifying the string "commercial" in the
|
||||
:term:`LICENSE_FLAGS_ACCEPTED` variable matches any expanded
|
||||
:term:`LICENSE_FLAGS` definition that starts with the string
|
||||
"commercial" such as "commercial_foo" and "commercial_bar", which
|
||||
are the strings the build system automatically generates for
|
||||
hypothetical recipes named "foo" and "bar" assuming those recipes simply
|
||||
specify the following::
|
||||
|
||||
LICENSE_FLAGS = "commercial"
|
||||
|
||||
Thus, you can choose to exhaustively enumerate each license flag in the
|
||||
list and allow only specific recipes into the image, or you can use a
|
||||
string subset that causes a broader range of matches to allow a range of
|
||||
recipes into the image.
|
||||
|
||||
This scheme works even if the :term:`LICENSE_FLAGS` string already has
|
||||
``_${PN}`` appended. For example, the build system turns the license
|
||||
flag "commercial_1.2_foo" into "commercial_1.2_foo_foo" and would match
|
||||
both the general "commercial" and the specific "commercial_1.2_foo"
|
||||
strings found in the :term:`LICENSE_FLAGS_ACCEPTED` variable, as expected.
|
||||
|
||||
Here are some other scenarios:
|
||||
|
||||
- You can specify a versioned string in the recipe such as
|
||||
"commercial_foo_1.2" in a "foo" recipe. The build system expands this
|
||||
string to "commercial_foo_1.2_foo". Combine this license flag with a
|
||||
:term:`LICENSE_FLAGS_ACCEPTED` variable that has the string
|
||||
"commercial" and you match the flag along with any other flag that
|
||||
starts with the string "commercial".
|
||||
|
||||
- Under the same circumstances, you can add "commercial_foo" in the
|
||||
:term:`LICENSE_FLAGS_ACCEPTED` variable and the build system not only
|
||||
matches "commercial_foo_1.2" but also matches any license flag with
|
||||
the string "commercial_foo", regardless of the version.
|
||||
|
||||
- You can be very specific and use both the package and version parts
|
||||
in the :term:`LICENSE_FLAGS_ACCEPTED` list (e.g.
|
||||
"commercial_foo_1.2") to specifically match a versioned recipe.
|
||||
|
||||
Other Variables Related to Commercial Licenses
|
||||
----------------------------------------------
|
||||
|
||||
There are other helpful variables related to commercial license handling,
|
||||
defined in the
|
||||
``poky/meta/conf/distro/include/default-distrovars.inc`` file::
|
||||
|
||||
COMMERCIAL_AUDIO_PLUGINS ?= ""
|
||||
COMMERCIAL_VIDEO_PLUGINS ?= ""
|
||||
|
||||
If you want to enable these components, you can do so by making sure you have
|
||||
statements similar to the following in your ``local.conf`` configuration file::
|
||||
|
||||
COMMERCIAL_AUDIO_PLUGINS = "gst-plugins-ugly-mad \
|
||||
gst-plugins-ugly-mpegaudioparse"
|
||||
COMMERCIAL_VIDEO_PLUGINS = "gst-plugins-ugly-mpeg2dec \
|
||||
gst-plugins-ugly-mpegstream gst-plugins-bad-mpegvideoparse"
|
||||
LICENSE_FLAGS_ACCEPTED = "commercial_gst-plugins-ugly commercial_gst-plugins-bad commercial_qmmp"
|
||||
|
||||
Of course, you could also create a matching list for those components using the
|
||||
more general "commercial" string in the :term:`LICENSE_FLAGS_ACCEPTED` variable,
|
||||
but that would also enable all the other packages with :term:`LICENSE_FLAGS`
|
||||
containing "commercial", which you may or may not want::
|
||||
|
||||
LICENSE_FLAGS_ACCEPTED = "commercial"
|
||||
|
||||
Specifying audio and video plugins as part of the
|
||||
:term:`COMMERCIAL_AUDIO_PLUGINS` and :term:`COMMERCIAL_VIDEO_PLUGINS` statements
|
||||
(along with :term:`LICENSE_FLAGS_ACCEPTED`) includes the plugins or
|
||||
components into built images, thus adding support for media formats or
|
||||
components.
|
||||
|
||||
.. note::
|
||||
|
||||
GStreamer "ugly" and "bad" plugins are actually available through
|
||||
open source licenses. However, the "ugly" ones can be subject to software
|
||||
patents in some countries, making it necessary to pay licensing fees
|
||||
to distribute them. The "bad" ones are just deemed unreliable by the
|
||||
GStreamer community and should therefore be used with care.
|
||||
|
||||
Maintaining Open Source License Compliance During Your Product's Lifecycle
|
||||
==========================================================================
|
||||
|
||||
One of the concerns for a development organization using open source
|
||||
software is how to maintain compliance with various open source
|
||||
licensing during the lifecycle of the product. While this section does
|
||||
not provide legal advice or comprehensively cover all scenarios, it does
|
||||
present methods that you can use to assist you in meeting the compliance
|
||||
requirements during a software release.
|
||||
|
||||
With hundreds of different open source licenses that the Yocto Project
|
||||
tracks, it is difficult to know the requirements of each and every
|
||||
license. However, the requirements of the major FLOSS licenses can begin
|
||||
to be covered by assuming that there are three main areas of concern:
|
||||
|
||||
- Source code must be provided.
|
||||
|
||||
- License text for the software must be provided.
|
||||
|
||||
- Compilation scripts and modifications to the source code must be
|
||||
provided.
|
||||
|
||||
There are other requirements beyond the scope of these three and the
|
||||
methods described in this section (e.g. the mechanism through which
|
||||
source code is distributed).
|
||||
|
||||
As different organizations have different methods of complying with open
|
||||
source licensing, this section is not meant to imply that there is only
|
||||
one single way to meet your compliance obligations, but rather to
|
||||
describe one method of achieving compliance. The remainder of this
|
||||
section describes methods supported to meet the previously mentioned
|
||||
three requirements. Once you take steps to meet these requirements, and
|
||||
prior to releasing images, sources, and the build system, you should
|
||||
audit all artifacts to ensure completeness.
|
||||
|
||||
.. note::
|
||||
|
||||
The Yocto Project generates a license manifest during image creation
|
||||
that is located in ``${DEPLOY_DIR}/licenses/``\ `image_name`\ ``-``\ `datestamp`
|
||||
to assist with any audits.
|
||||
|
||||
Providing the Source Code
|
||||
-------------------------
|
||||
|
||||
Compliance activities should begin before you generate the final image.
|
||||
The first thing you should look at is the requirement that tops the list
|
||||
for most compliance groups --- providing the source. The Yocto Project has
|
||||
a few ways of meeting this requirement.
|
||||
|
||||
One of the easiest ways to meet this requirement is to provide the
|
||||
entire :term:`DL_DIR` used by the
|
||||
build. This method, however, has a few issues. The most obvious is the
|
||||
size of the directory since it includes all sources used in the build
|
||||
and not just the source used in the released image. It will include
|
||||
toolchain source, and other artifacts, which you would not generally
|
||||
release. However, the more serious issue for most companies is
|
||||
accidental release of proprietary software. The Yocto Project provides
|
||||
an :ref:`ref-classes-archiver` class to help avoid some of these concerns.
|
||||
|
||||
Before you employ :term:`DL_DIR` or the :ref:`ref-classes-archiver` class, you
|
||||
need to decide how you choose to provide source. The source
|
||||
:ref:`ref-classes-archiver` class can generate tarballs and SRPMs and can
|
||||
create them with various levels of compliance in mind.
|
||||
|
||||
One way of doing this (but certainly not the only way) is to release
|
||||
just the source as a tarball. You can do this by adding the following to
|
||||
the ``local.conf`` file found in the :term:`Build Directory`::
|
||||
|
||||
INHERIT += "archiver"
|
||||
ARCHIVER_MODE[src] = "original"
|
||||
|
||||
During the creation of your
|
||||
image, the source from all recipes that deploy packages to the image is
|
||||
placed within subdirectories of ``DEPLOY_DIR/sources`` based on the
|
||||
:term:`LICENSE` for each recipe.
|
||||
Releasing the entire directory enables you to comply with requirements
|
||||
concerning providing the unmodified source. It is important to note that
|
||||
the size of the directory can get large.
|
||||
|
||||
A way to help mitigate the size issue is to only release tarballs for
|
||||
licenses that require the release of source. Let us assume you are only
|
||||
concerned with GPL code as identified by running the following script:
|
||||
|
||||
.. code-block:: shell
|
||||
|
||||
# Script to archive a subset of packages matching specific license(s)
|
||||
# Source and license files are copied into sub folders of package folder
|
||||
# Must be run from build folder
|
||||
#!/bin/bash
|
||||
src_release_dir="source-release"
|
||||
mkdir -p $src_release_dir
|
||||
for a in tmp/deploy/sources/*; do
|
||||
for d in $a/*; do
|
||||
# Get package name from path
|
||||
p=`basename $d`
|
||||
p=${p%-*}
|
||||
p=${p%-*}
|
||||
# Only archive GPL packages (update *GPL* regex for your license check)
|
||||
numfiles=`ls tmp/deploy/licenses/$p/*GPL* 2> /dev/null | wc -l`
|
||||
if [ $numfiles -ge 1 ]; then
|
||||
echo Archiving $p
|
||||
mkdir -p $src_release_dir/$p/source
|
||||
cp $d/* $src_release_dir/$p/source 2> /dev/null
|
||||
mkdir -p $src_release_dir/$p/license
|
||||
cp tmp/deploy/licenses/$p/* $src_release_dir/$p/license 2> /dev/null
|
||||
fi
|
||||
done
|
||||
done
|
||||
|
||||
At this point, you
|
||||
could create a tarball from the ``gpl_source_release`` directory and
|
||||
provide that to the end user. This method would be a step toward
|
||||
achieving compliance with section 3a of GPLv2 and with section 6 of
|
||||
GPLv3.
|
||||
|
||||
Providing License Text
|
||||
----------------------
|
||||
|
||||
One requirement that is often overlooked is inclusion of license text.
|
||||
This requirement also needs to be dealt with prior to generating the
|
||||
final image. Some licenses require the license text to accompany the
|
||||
binary. You can achieve this by adding the following to your
|
||||
``local.conf`` file::
|
||||
|
||||
COPY_LIC_MANIFEST = "1"
|
||||
COPY_LIC_DIRS = "1"
|
||||
LICENSE_CREATE_PACKAGE = "1"
|
||||
|
||||
Adding these statements to the
|
||||
configuration file ensures that the licenses collected during package
|
||||
generation are included on your image.
|
||||
|
||||
.. note::
|
||||
|
||||
Setting all three variables to "1" results in the image having two
|
||||
copies of the same license file. One copy resides in
|
||||
``/usr/share/common-licenses`` and the other resides in
|
||||
``/usr/share/license``.
|
||||
|
||||
The reason for this behavior is because
|
||||
:term:`COPY_LIC_DIRS` and
|
||||
:term:`COPY_LIC_MANIFEST`
|
||||
add a copy of the license when the image is built but do not offer a
|
||||
path for adding licenses for newly installed packages to an image.
|
||||
:term:`LICENSE_CREATE_PACKAGE`
|
||||
adds a separate package and an upgrade path for adding licenses to an
|
||||
image.
|
||||
|
||||
As the source :ref:`ref-classes-archiver` class has already archived the
|
||||
original unmodified source that contains the license files, you would have
|
||||
already met the requirements for inclusion of the license information
|
||||
with source as defined by the GPL and other open source licenses.
|
||||
|
||||
Providing Compilation Scripts and Source Code Modifications
|
||||
-----------------------------------------------------------
|
||||
|
||||
At this point, we have addressed all we need to prior to generating the
|
||||
image. The next two requirements are addressed during the final
|
||||
packaging of the release.
|
||||
|
||||
By releasing the version of the OpenEmbedded build system and the layers
|
||||
used during the build, you will be providing both compilation scripts
|
||||
and the source code modifications in one step.
|
||||
|
||||
If the deployment team has a :ref:`overview-manual/concepts:bsp layer`
|
||||
and a distro layer, and those
|
||||
those layers are used to patch, compile, package, or modify (in any way)
|
||||
any open source software included in your released images, you might be
|
||||
required to release those layers under section 3 of GPLv2 or section 1
|
||||
of GPLv3. One way of doing that is with a clean checkout of the version
|
||||
of the Yocto Project and layers used during your build. Here is an
|
||||
example:
|
||||
|
||||
.. code-block:: shell
|
||||
|
||||
# We built using the dunfell branch of the poky repo
|
||||
$ git clone -b dunfell git://git.yoctoproject.org/poky
|
||||
$ cd poky
|
||||
# We built using the release_branch for our layers
|
||||
$ git clone -b release_branch git://git.mycompany.com/meta-my-bsp-layer
|
||||
$ git clone -b release_branch git://git.mycompany.com/meta-my-software-layer
|
||||
# clean up the .git repos
|
||||
$ find . -name ".git" -type d -exec rm -rf {} \;
|
||||
|
||||
One thing a development organization might want to consider for end-user
|
||||
convenience is to modify
|
||||
``meta-poky/conf/templates/default/bblayers.conf.sample`` to ensure that when
|
||||
the end user utilizes the released build system to build an image, the
|
||||
development organization's layers are included in the ``bblayers.conf`` file
|
||||
automatically::
|
||||
|
||||
# POKY_BBLAYERS_CONF_VERSION is increased each time build/conf/bblayers.conf
|
||||
# changes incompatibly
|
||||
POKY_BBLAYERS_CONF_VERSION = "2"
|
||||
|
||||
BBPATH = "${TOPDIR}"
|
||||
BBFILES ?= ""
|
||||
|
||||
BBLAYERS ?= " \
|
||||
##OEROOT##/meta \
|
||||
##OEROOT##/meta-poky \
|
||||
##OEROOT##/meta-yocto-bsp \
|
||||
##OEROOT##/meta-mylayer \
|
||||
"
|
||||
|
||||
Creating and
|
||||
providing an archive of the :term:`Metadata`
|
||||
layers (recipes, configuration files, and so forth) enables you to meet
|
||||
your requirements to include the scripts to control compilation as well
|
||||
as any modifications to the original source.
|
||||
|
||||
Compliance Limitations with Executables Built from Static Libraries
|
||||
-------------------------------------------------------------------
|
||||
|
||||
When package A is added to an image via the :term:`RDEPENDS` or :term:`RRECOMMENDS`
|
||||
mechanisms as well as explicitly included in the image recipe with
|
||||
:term:`IMAGE_INSTALL`, and depends on a static linked library recipe B
|
||||
(``DEPENDS += "B"``), package B will neither appear in the generated license
|
||||
manifest nor in the generated source tarballs. This occurs as the
|
||||
:ref:`ref-classes-license` and :ref:`ref-classes-archiver` classes assume that
|
||||
only packages included via :term:`RDEPENDS` or :term:`RRECOMMENDS`
|
||||
end up in the image.
|
||||
|
||||
As a result, potential obligations regarding license compliance for package B
|
||||
may not be met.
|
||||
|
||||
The Yocto Project doesn't enable static libraries by default, in part because
|
||||
of this issue. Before a solution to this limitation is found, you need to
|
||||
keep in mind that if your root filesystem is built from static libraries,
|
||||
you will need to manually ensure that your deliveries are compliant
|
||||
with the licenses of these libraries.
|
||||
|
||||
Copying Non Standard Licenses
|
||||
=============================
|
||||
|
||||
Some packages, such as the linux-firmware package, have many licenses
|
||||
that are not in any way common. You can avoid adding a lot of these
|
||||
types of common license files, which are only applicable to a specific
|
||||
package, by using the
|
||||
:term:`NO_GENERIC_LICENSE`
|
||||
variable. Using this variable also avoids QA errors when you use a
|
||||
non-common, non-CLOSED license in a recipe.
|
||||
|
||||
Here is an example that uses the ``LICENSE.Abilis.txt`` file as
|
||||
the license from the fetched source::
|
||||
|
||||
NO_GENERIC_LICENSE[Firmware-Abilis] = "LICENSE.Abilis.txt"
|
||||
|
||||
@@ -0,0 +1,118 @@
|
||||
.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
|
||||
|
||||
Adding a New Machine
|
||||
********************
|
||||
|
||||
Adding a new machine to the Yocto Project is a straightforward process.
|
||||
This section describes how to add machines that are similar to those
|
||||
that the Yocto Project already supports.
|
||||
|
||||
.. note::
|
||||
|
||||
Although well within the capabilities of the Yocto Project, adding a
|
||||
totally new architecture might require changes to ``gcc``/``glibc``
|
||||
and to the site information, which is beyond the scope of this
|
||||
manual.
|
||||
|
||||
For a complete example that shows how to add a new machine, see the
|
||||
":ref:`bsp-guide/bsp:creating a new bsp layer using the \`\`bitbake-layers\`\` script`"
|
||||
section in the Yocto Project Board Support Package (BSP) Developer's
|
||||
Guide.
|
||||
|
||||
Adding the Machine Configuration File
|
||||
=====================================
|
||||
|
||||
To add a new machine, you need to add a new machine configuration file
|
||||
to the layer's ``conf/machine`` directory. This configuration file
|
||||
provides details about the device you are adding.
|
||||
|
||||
The OpenEmbedded build system uses the root name of the machine
|
||||
configuration file to reference the new machine. For example, given a
|
||||
machine configuration file named ``crownbay.conf``, the build system
|
||||
recognizes the machine as "crownbay".
|
||||
|
||||
The most important variables you must set in your machine configuration
|
||||
file or include from a lower-level configuration file are as follows:
|
||||
|
||||
- :term:`TARGET_ARCH` (e.g. "arm")
|
||||
|
||||
- ``PREFERRED_PROVIDER_virtual/kernel``
|
||||
|
||||
- :term:`MACHINE_FEATURES` (e.g. "apm screen wifi")
|
||||
|
||||
You might also need these variables:
|
||||
|
||||
- :term:`SERIAL_CONSOLES` (e.g. "115200;ttyS0 115200;ttyS1")
|
||||
|
||||
- :term:`KERNEL_IMAGETYPE` (e.g. "zImage")
|
||||
|
||||
- :term:`IMAGE_FSTYPES` (e.g. "tar.gz jffs2")
|
||||
|
||||
You can find full details on these variables in the reference section.
|
||||
You can leverage existing machine ``.conf`` files from
|
||||
``meta-yocto-bsp/conf/machine/``.
|
||||
|
||||
Adding a Kernel for the Machine
|
||||
===============================
|
||||
|
||||
The OpenEmbedded build system needs to be able to build a kernel for the
|
||||
machine. You need to either create a new kernel recipe for this machine,
|
||||
or extend an existing kernel recipe. You can find several kernel recipe
|
||||
examples in the Source Directory at ``meta/recipes-kernel/linux`` that
|
||||
you can use as references.
|
||||
|
||||
If you are creating a new kernel recipe, normal recipe-writing rules
|
||||
apply for setting up a :term:`SRC_URI`. Thus, you need to specify any
|
||||
necessary patches and set :term:`S` to point at the source code. You need to
|
||||
create a :ref:`ref-tasks-configure` task that configures the unpacked kernel with
|
||||
a ``defconfig`` file. You can do this by using a ``make defconfig``
|
||||
command or, more commonly, by copying in a suitable ``defconfig`` file
|
||||
and then running ``make oldconfig``. By making use of ``inherit kernel``
|
||||
and potentially some of the ``linux-*.inc`` files, most other
|
||||
functionality is centralized and the defaults of the class normally work
|
||||
well.
|
||||
|
||||
If you are extending an existing kernel recipe, it is usually a matter
|
||||
of adding a suitable ``defconfig`` file. The file needs to be added into
|
||||
a location similar to ``defconfig`` files used for other machines in a
|
||||
given kernel recipe. A possible way to do this is by listing the file in
|
||||
the :term:`SRC_URI` and adding the machine to the expression in
|
||||
:term:`COMPATIBLE_MACHINE`::
|
||||
|
||||
COMPATIBLE_MACHINE = '(qemux86|qemumips)'
|
||||
|
||||
For more information on ``defconfig`` files, see the
|
||||
":ref:`kernel-dev/common:changing the configuration`"
|
||||
section in the Yocto Project Linux Kernel Development Manual.
|
||||
|
||||
Adding a Formfactor Configuration File
|
||||
======================================
|
||||
|
||||
A formfactor configuration file provides information about the target
|
||||
hardware for which the image is being built and information that the
|
||||
build system cannot obtain from other sources such as the kernel. Some
|
||||
examples of information contained in a formfactor configuration file
|
||||
include framebuffer orientation, whether or not the system has a
|
||||
keyboard, the positioning of the keyboard in relation to the screen, and
|
||||
the screen resolution.
|
||||
|
||||
The build system uses reasonable defaults in most cases. However, if
|
||||
customization is necessary, you need to create a ``machconfig`` file in
|
||||
the ``meta/recipes-bsp/formfactor/files`` directory. This directory
|
||||
contains directories for specific machines such as ``qemuarm`` and
|
||||
``qemux86``. For information about the settings available and the
|
||||
defaults, see the ``meta/recipes-bsp/formfactor/files/config`` file
|
||||
found in the same area.
|
||||
|
||||
Following is an example for "qemuarm" machine::
|
||||
|
||||
HAVE_TOUCHSCREEN=1
|
||||
HAVE_KEYBOARD=1
|
||||
DISPLAY_CAN_ROTATE=0
|
||||
DISPLAY_ORIENTATION=0
|
||||
#DISPLAY_WIDTH_PIXELS=640
|
||||
#DISPLAY_HEIGHT_PIXELS=480
|
||||
#DISPLAY_BPP=16
|
||||
DISPLAY_DPI=150
|
||||
DISPLAY_SUBPIXEL_ORDER=vrgb
|
||||
|
||||
@@ -0,0 +1,209 @@
|
||||
.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
|
||||
|
||||
Working with Pre-Built Libraries
|
||||
********************************
|
||||
|
||||
Introduction
|
||||
============
|
||||
|
||||
Some library vendors do not release source code for their software but do
|
||||
release pre-built binaries. When shared libraries are built, they should
|
||||
be versioned (see `this article
|
||||
<https://tldp.org/HOWTO/Program-Library-HOWTO/shared-libraries.html>`__
|
||||
for some background), but sometimes this is not done.
|
||||
|
||||
To summarize, a versioned library must meet two conditions:
|
||||
|
||||
#. The filename must have the version appended, for example: ``libfoo.so.1.2.3``.
|
||||
#. The library must have the ELF tag ``SONAME`` set to the major version
|
||||
of the library, for example: ``libfoo.so.1``. You can check this by
|
||||
running ``readelf -d filename | grep SONAME``.
|
||||
|
||||
This section shows how to deal with both versioned and unversioned
|
||||
pre-built libraries.
|
||||
|
||||
Versioned Libraries
|
||||
===================
|
||||
|
||||
In this example we work with pre-built libraries for the FT4222H USB I/O chip.
|
||||
Libraries are built for several target architecture variants and packaged in
|
||||
an archive as follows::
|
||||
|
||||
├── build-arm-hisiv300
|
||||
│ └── libft4222.so.1.4.4.44
|
||||
├── build-arm-v5-sf
|
||||
│ └── libft4222.so.1.4.4.44
|
||||
├── build-arm-v6-hf
|
||||
│ └── libft4222.so.1.4.4.44
|
||||
├── build-arm-v7-hf
|
||||
│ └── libft4222.so.1.4.4.44
|
||||
├── build-arm-v8
|
||||
│ └── libft4222.so.1.4.4.44
|
||||
├── build-i386
|
||||
│ └── libft4222.so.1.4.4.44
|
||||
├── build-i486
|
||||
│ └── libft4222.so.1.4.4.44
|
||||
├── build-mips-eglibc-hf
|
||||
│ └── libft4222.so.1.4.4.44
|
||||
├── build-pentium
|
||||
│ └── libft4222.so.1.4.4.44
|
||||
├── build-x86_64
|
||||
│ └── libft4222.so.1.4.4.44
|
||||
├── examples
|
||||
│ ├── get-version.c
|
||||
│ ├── i2cm.c
|
||||
│ ├── spim.c
|
||||
│ └── spis.c
|
||||
├── ftd2xx.h
|
||||
├── install4222.sh
|
||||
├── libft4222.h
|
||||
├── ReadMe.txt
|
||||
└── WinTypes.h
|
||||
|
||||
To write a recipe to use such a library in your system:
|
||||
|
||||
- The vendor will probably have a proprietary licence, so set
|
||||
:term:`LICENSE_FLAGS` in your recipe.
|
||||
- The vendor provides a tarball containing libraries so set :term:`SRC_URI`
|
||||
appropriately.
|
||||
- Set :term:`COMPATIBLE_HOST` so that the recipe cannot be used with an
|
||||
unsupported architecture. In the following example, we only support the 32
|
||||
and 64 bit variants of the ``x86`` architecture.
|
||||
- As the vendor provides versioned libraries, we can use ``oe_soinstall``
|
||||
from :ref:`ref-classes-utils` to install the shared library and create
|
||||
symbolic links. If the vendor does not do this, we need to follow the
|
||||
non-versioned library guidelines in the next section.
|
||||
- As the vendor likely used :term:`LDFLAGS` different from those in your Yocto
|
||||
Project build, disable the corresponding checks by adding ``ldflags``
|
||||
to :term:`INSANE_SKIP`.
|
||||
- The vendor will typically ship release builds without debugging symbols.
|
||||
Avoid errors by preventing the packaging task from stripping out the symbols
|
||||
and adding them to a separate debug package. This is done by setting the
|
||||
``INHIBIT_`` flags shown below.
|
||||
|
||||
The complete recipe would look like this::
|
||||
|
||||
SUMMARY = "FTDI FT4222H Library"
|
||||
SECTION = "libs"
|
||||
LICENSE_FLAGS = "ftdi"
|
||||
LICENSE = "CLOSED"
|
||||
|
||||
COMPATIBLE_HOST = "(i.86|x86_64).*-linux"
|
||||
|
||||
# Sources available in a .tgz file in .zip archive
|
||||
# at https://ftdichip.com/wp-content/uploads/2021/01/libft4222-linux-1.4.4.44.zip
|
||||
# Found on https://ftdichip.com/software-examples/ft4222h-software-examples/
|
||||
# Since dealing with this particular type of archive is out of topic here,
|
||||
# we use a local link.
|
||||
SRC_URI = "file://libft4222-linux-${PV}.tgz"
|
||||
|
||||
S = "${WORKDIR}"
|
||||
|
||||
ARCH_DIR:x86-64 = "build-x86_64"
|
||||
ARCH_DIR:i586 = "build-i386"
|
||||
ARCH_DIR:i686 = "build-i386"
|
||||
|
||||
INSANE_SKIP:${PN} = "ldflags"
|
||||
INHIBIT_PACKAGE_STRIP = "1"
|
||||
INHIBIT_SYSROOT_STRIP = "1"
|
||||
INHIBIT_PACKAGE_DEBUG_SPLIT = "1"
|
||||
|
||||
do_install () {
|
||||
install -m 0755 -d ${D}${libdir}
|
||||
oe_soinstall ${S}/${ARCH_DIR}/libft4222.so.${PV} ${D}${libdir}
|
||||
install -d ${D}${includedir}
|
||||
install -m 0755 ${S}/*.h ${D}${includedir}
|
||||
}
|
||||
|
||||
If the precompiled binaries are not statically linked and have dependencies on
|
||||
other libraries, then by adding those libraries to :term:`DEPENDS`, the linking
|
||||
can be examined and the appropriate :term:`RDEPENDS` automatically added.
|
||||
|
||||
Non-Versioned Libraries
|
||||
=======================
|
||||
|
||||
Some Background
|
||||
---------------
|
||||
|
||||
Libraries in Linux systems are generally versioned so that it is possible
|
||||
to have multiple versions of the same library installed, which eases upgrades
|
||||
and support for older software. For example, suppose that in a versioned
|
||||
library, an actual library is called ``libfoo.so.1.2``, a symbolic link named
|
||||
``libfoo.so.1`` points to ``libfoo.so.1.2``, and a symbolic link named
|
||||
``libfoo.so`` points to ``libfoo.so.1.2``. Given these conditions, when you
|
||||
link a binary against a library, you typically provide the unversioned file
|
||||
name (i.e. ``-lfoo`` to the linker). However, the linker follows the symbolic
|
||||
link and actually links against the versioned filename. The unversioned symbolic
|
||||
link is only used at development time. Consequently, the library is packaged
|
||||
along with the headers in the development package ``${PN}-dev`` along with the
|
||||
actual library and versioned symbolic links in ``${PN}``. Because versioned
|
||||
libraries are far more common than unversioned libraries, the default packaging
|
||||
rules assume versioned libraries.
|
||||
|
||||
Yocto Library Packaging Overview
|
||||
--------------------------------
|
||||
|
||||
It follows that packaging an unversioned library requires a bit of work in the
|
||||
recipe. By default, ``libfoo.so`` gets packaged into ``${PN}-dev``, which
|
||||
triggers a QA warning that a non-symlink library is in a ``-dev`` package,
|
||||
and binaries in the same recipe link to the library in ``${PN}-dev``,
|
||||
which triggers more QA warnings. To solve this problem, you need to package the
|
||||
unversioned library into ``${PN}`` where it belongs. The following are the abridged
|
||||
default :term:`FILES` variables in ``bitbake.conf``::
|
||||
|
||||
SOLIBS = ".so.*"
|
||||
SOLIBSDEV = ".so"
|
||||
FILES:${PN} = "... ${libdir}/lib*${SOLIBS} ..."
|
||||
FILES_SOLIBSDEV ?= "... ${libdir}/lib*${SOLIBSDEV} ..."
|
||||
FILES:${PN}-dev = "... ${FILES_SOLIBSDEV} ..."
|
||||
|
||||
:term:`SOLIBS` defines a pattern that matches real shared object libraries.
|
||||
:term:`SOLIBSDEV` matches the development form (unversioned symlink). These two
|
||||
variables are then used in ``FILES:${PN}`` and ``FILES:${PN}-dev``, which puts
|
||||
the real libraries into ``${PN}`` and the unversioned symbolic link into ``${PN}-dev``.
|
||||
To package unversioned libraries, you need to modify the variables in the recipe
|
||||
as follows::
|
||||
|
||||
SOLIBS = ".so"
|
||||
FILES_SOLIBSDEV = ""
|
||||
|
||||
The modifications cause the ``.so`` file to be the real library
|
||||
and unset :term:`FILES_SOLIBSDEV` so that no libraries get packaged into
|
||||
``${PN}-dev``. The changes are required because unless :term:`PACKAGES` is changed,
|
||||
``${PN}-dev`` collects files before `${PN}`. ``${PN}-dev`` must not collect any of
|
||||
the files you want in ``${PN}``.
|
||||
|
||||
Finally, loadable modules, essentially unversioned libraries that are linked
|
||||
at runtime using ``dlopen()`` instead of at build time, should generally be
|
||||
installed in a private directory. However, if they are installed in ``${libdir}``,
|
||||
then the modules can be treated as unversioned libraries.
|
||||
|
||||
Example
|
||||
-------
|
||||
|
||||
The example below installs an unversioned x86-64 pre-built library named
|
||||
``libfoo.so``. The :term:`COMPATIBLE_HOST` variable limits recipes to the
|
||||
x86-64 architecture while the :term:`INSANE_SKIP`, :term:`INHIBIT_PACKAGE_STRIP`
|
||||
and :term:`INHIBIT_SYSROOT_STRIP` variables are all set as in the above
|
||||
versioned library example. The "magic" is setting the :term:`SOLIBS` and
|
||||
:term:`FILES_SOLIBSDEV` variables as explained above::
|
||||
|
||||
SUMMARY = "libfoo sample recipe"
|
||||
SECTION = "libs"
|
||||
LICENSE = "CLOSED"
|
||||
|
||||
SRC_URI = "file://libfoo.so"
|
||||
|
||||
COMPATIBLE_HOST = "x86_64.*-linux"
|
||||
|
||||
INSANE_SKIP:${PN} = "ldflags"
|
||||
INHIBIT_PACKAGE_STRIP = "1"
|
||||
INHIBIT_SYSROOT_STRIP = "1"
|
||||
SOLIBS = ".so"
|
||||
FILES_SOLIBSDEV = ""
|
||||
|
||||
do_install () {
|
||||
install -d ${D}${libdir}
|
||||
install -m 0755 ${WORKDIR}/libfoo.so ${D}${libdir}
|
||||
}
|
||||
|
||||
@@ -0,0 +1,50 @@
|
||||
.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
|
||||
|
||||
Using a Python Development Shell
|
||||
********************************
|
||||
|
||||
Similar to working within a development shell as described in the
|
||||
previous section, you can also spawn and work within an interactive
|
||||
Python development shell. When debugging certain commands or even when
|
||||
just editing packages, ``pydevshell`` can be a useful tool. When you
|
||||
invoke the ``pydevshell`` task, all tasks up to and including
|
||||
:ref:`ref-tasks-patch` are run for the
|
||||
specified target. Then a new terminal is opened. Additionally, key
|
||||
Python objects and code are available in the same way they are to
|
||||
BitBake tasks, in particular, the data store 'd'. So, commands such as
|
||||
the following are useful when exploring the data store and running
|
||||
functions::
|
||||
|
||||
pydevshell> d.getVar("STAGING_DIR")
|
||||
'/media/build1/poky/build/tmp/sysroots'
|
||||
pydevshell> d.getVar("STAGING_DIR", False)
|
||||
'${TMPDIR}/sysroots'
|
||||
pydevshell> d.setVar("FOO", "bar")
|
||||
pydevshell> d.getVar("FOO")
|
||||
'bar'
|
||||
pydevshell> d.delVar("FOO")
|
||||
pydevshell> d.getVar("FOO")
|
||||
pydevshell> bb.build.exec_func("do_unpack", d)
|
||||
pydevshell>
|
||||
|
||||
See the ":ref:`bitbake-user-manual/bitbake-user-manual-metadata:functions you can call from within python`"
|
||||
section in the BitBake User Manual for details about available functions.
|
||||
|
||||
The commands execute just as if the OpenEmbedded build
|
||||
system were executing them. Consequently, working this way can be
|
||||
helpful when debugging a build or preparing software to be used with the
|
||||
OpenEmbedded build system.
|
||||
|
||||
Following is an example that uses ``pydevshell`` on a target named
|
||||
``matchbox-desktop``::
|
||||
|
||||
$ bitbake matchbox-desktop -c pydevshell
|
||||
|
||||
This command spawns a terminal and places you in an interactive Python
|
||||
interpreter within the OpenEmbedded build environment. The
|
||||
:term:`OE_TERMINAL` variable
|
||||
controls what type of shell is opened.
|
||||
|
||||
When you are finished using ``pydevshell``, you can exit the shell
|
||||
either by using Ctrl+d or closing the terminal window.
|
||||
|
||||
@@ -0,0 +1,471 @@
|
||||
.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
|
||||
|
||||
*******************************
|
||||
Using the Quick EMUlator (QEMU)
|
||||
*******************************
|
||||
|
||||
The Yocto Project uses an implementation of the Quick EMUlator (QEMU)
|
||||
Open Source project as part of the Yocto Project development "tool set".
|
||||
This chapter provides both procedures that show you how to use the Quick
|
||||
EMUlator (QEMU) and other QEMU information helpful for development
|
||||
purposes.
|
||||
|
||||
Overview
|
||||
========
|
||||
|
||||
Within the context of the Yocto Project, QEMU is an emulator and
|
||||
virtualization machine that allows you to run a complete image you have
|
||||
built using the Yocto Project as just another task on your build system.
|
||||
QEMU is useful for running and testing images and applications on
|
||||
supported Yocto Project architectures without having actual hardware.
|
||||
Among other things, the Yocto Project uses QEMU to run automated Quality
|
||||
Assurance (QA) tests on final images shipped with each release.
|
||||
|
||||
.. note::
|
||||
|
||||
This implementation is not the same as QEMU in general.
|
||||
|
||||
This section provides a brief reference for the Yocto Project
|
||||
implementation of QEMU.
|
||||
|
||||
For official information and documentation on QEMU in general, see the
|
||||
following references:
|
||||
|
||||
- `QEMU Website <https://wiki.qemu.org/Main_Page>`__\ *:* The official
|
||||
website for the QEMU Open Source project.
|
||||
|
||||
- `Documentation <https://wiki.qemu.org/Manual>`__\ *:* The QEMU user
|
||||
manual.
|
||||
|
||||
Running QEMU
|
||||
============
|
||||
|
||||
To use QEMU, you need to have QEMU installed and initialized as well as
|
||||
have the proper artifacts (i.e. image files and root filesystems)
|
||||
available. Follow these general steps to run QEMU:
|
||||
|
||||
#. *Install QEMU:* QEMU is made available with the Yocto Project a
|
||||
number of ways. One method is to install a Software Development Kit
|
||||
(SDK). See ":ref:`sdk-manual/intro:the qemu emulator`" section in the
|
||||
Yocto Project Application Development and the Extensible Software
|
||||
Development Kit (eSDK) manual for information on how to install QEMU.
|
||||
|
||||
#. *Setting Up the Environment:* How you set up the QEMU environment
|
||||
depends on how you installed QEMU:
|
||||
|
||||
- If you cloned the ``poky`` repository or you downloaded and
|
||||
unpacked a Yocto Project release tarball, you can source the build
|
||||
environment script (i.e. :ref:`structure-core-script`)::
|
||||
|
||||
$ cd poky
|
||||
$ source oe-init-build-env
|
||||
|
||||
- If you installed a cross-toolchain, you can run the script that
|
||||
initializes the toolchain. For example, the following commands run
|
||||
the initialization script from the default ``poky_sdk`` directory::
|
||||
|
||||
. poky_sdk/environment-setup-core2-64-poky-linux
|
||||
|
||||
#. *Ensure the Artifacts are in Place:* You need to be sure you have a
|
||||
pre-built kernel that will boot in QEMU. You also need the target
|
||||
root filesystem for your target machine's architecture:
|
||||
|
||||
- If you have previously built an image for QEMU (e.g. ``qemux86``,
|
||||
``qemuarm``, and so forth), then the artifacts are in place in
|
||||
your :term:`Build Directory`.
|
||||
|
||||
- If you have not built an image, you can go to the
|
||||
:yocto_dl:`machines/qemu </releases/yocto/yocto-&DISTRO;/machines/qemu/>` area and download a
|
||||
pre-built image that matches your architecture and can be run on
|
||||
QEMU.
|
||||
|
||||
See the ":ref:`sdk-manual/appendix-obtain:extracting the root filesystem`"
|
||||
section in the Yocto Project Application Development and the
|
||||
Extensible Software Development Kit (eSDK) manual for information on
|
||||
how to extract a root filesystem.
|
||||
|
||||
#. *Run QEMU:* The basic ``runqemu`` command syntax is as follows::
|
||||
|
||||
$ runqemu [option ] [...]
|
||||
|
||||
Based on what you provide on the command
|
||||
line, ``runqemu`` does a good job of figuring out what you are trying
|
||||
to do. For example, by default, QEMU looks for the most recently
|
||||
built image according to the timestamp when it needs to look for an
|
||||
image. Minimally, through the use of options, you must provide either
|
||||
a machine name, a virtual machine image (``*wic.vmdk``), or a kernel
|
||||
image (``*.bin``).
|
||||
|
||||
Here are some additional examples to help illustrate further QEMU:
|
||||
|
||||
- This example starts QEMU with MACHINE set to "qemux86-64".
|
||||
Assuming a standard :term:`Build Directory`, ``runqemu``
|
||||
automatically finds the ``bzImage-qemux86-64.bin`` image file and
|
||||
the ``core-image-minimal-qemux86-64-20200218002850.rootfs.ext4``
|
||||
(assuming the current build created a ``core-image-minimal``
|
||||
image)::
|
||||
|
||||
$ runqemu qemux86-64
|
||||
|
||||
.. note::
|
||||
|
||||
When more than one image with the same name exists, QEMU finds
|
||||
and uses the most recently built image according to the
|
||||
timestamp.
|
||||
|
||||
- This example produces the exact same results as the previous
|
||||
example. This command, however, specifically provides the image
|
||||
and root filesystem type::
|
||||
|
||||
$ runqemu qemux86-64 core-image-minimal ext4
|
||||
|
||||
- This example specifies to boot an :term:`Initramfs` image and to
|
||||
enable audio in QEMU. For this case, ``runqemu`` sets the internal
|
||||
variable ``FSTYPE`` to ``cpio.gz``. Also, for audio to be enabled,
|
||||
an appropriate driver must be installed (see the ``audio`` option
|
||||
in :ref:`dev-manual/qemu:\`\`runqemu\`\` command-line options`
|
||||
for more information)::
|
||||
|
||||
$ runqemu qemux86-64 ramfs audio
|
||||
|
||||
- This example does not provide enough information for QEMU to
|
||||
launch. While the command does provide a root filesystem type, it
|
||||
must also minimally provide a `MACHINE`, `KERNEL`, or `VM` option::
|
||||
|
||||
$ runqemu ext4
|
||||
|
||||
- This example specifies to boot a virtual machine image
|
||||
(``.wic.vmdk`` file). From the ``.wic.vmdk``, ``runqemu``
|
||||
determines the QEMU architecture (`MACHINE`) to be "qemux86-64" and
|
||||
the root filesystem type to be "vmdk"::
|
||||
|
||||
$ runqemu /home/scott-lenovo/vm/core-image-minimal-qemux86-64.wic.vmdk
|
||||
|
||||
Switching Between Consoles
|
||||
==========================
|
||||
|
||||
When booting or running QEMU, you can switch between supported consoles
|
||||
by using Ctrl+Alt+number. For example, Ctrl+Alt+3 switches you to the
|
||||
serial console as long as that console is enabled. Being able to switch
|
||||
consoles is helpful, for example, if the main QEMU console breaks for
|
||||
some reason.
|
||||
|
||||
.. note::
|
||||
|
||||
Usually, "2" gets you to the main console and "3" gets you to the
|
||||
serial console.
|
||||
|
||||
Removing the Splash Screen
|
||||
==========================
|
||||
|
||||
You can remove the splash screen when QEMU is booting by using Alt+left.
|
||||
Removing the splash screen allows you to see what is happening in the
|
||||
background.
|
||||
|
||||
Disabling the Cursor Grab
|
||||
=========================
|
||||
|
||||
The default QEMU integration captures the cursor within the main window.
|
||||
It does this since standard mouse devices only provide relative input
|
||||
and not absolute coordinates. You then have to break out of the grab
|
||||
using the "Ctrl+Alt" key combination. However, the Yocto Project's
|
||||
integration of QEMU enables the wacom USB touch pad driver by default to
|
||||
allow input of absolute coordinates. This default means that the mouse
|
||||
can enter and leave the main window without the grab taking effect
|
||||
leading to a better user experience.
|
||||
|
||||
Running Under a Network File System (NFS) Server
|
||||
================================================
|
||||
|
||||
One method for running QEMU is to run it on an NFS server. This is
|
||||
useful when you need to access the same file system from both the build
|
||||
and the emulated system at the same time. It is also worth noting that
|
||||
the system does not need root privileges to run. It uses a user space
|
||||
NFS server to avoid that. Follow these steps to set up for running QEMU
|
||||
using an NFS server.
|
||||
|
||||
#. *Extract a Root Filesystem:* Once you are able to run QEMU in your
|
||||
environment, you can use the ``runqemu-extract-sdk`` script, which is
|
||||
located in the ``scripts`` directory along with the ``runqemu``
|
||||
script.
|
||||
|
||||
The ``runqemu-extract-sdk`` takes a root filesystem tarball and
|
||||
extracts it into a location that you specify. Here is an example that
|
||||
takes a file system and extracts it to a directory named
|
||||
``test-nfs``:
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
runqemu-extract-sdk ./tmp/deploy/images/qemux86-64/core-image-sato-qemux86-64.tar.bz2 test-nfs
|
||||
|
||||
#. *Start QEMU:* Once you have extracted the file system, you can run
|
||||
``runqemu`` normally with the additional location of the file system.
|
||||
You can then also make changes to the files within ``./test-nfs`` and
|
||||
see those changes appear in the image in real time. Here is an
|
||||
example using the ``qemux86`` image:
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
runqemu qemux86-64 ./test-nfs
|
||||
|
||||
.. note::
|
||||
|
||||
Should you need to start, stop, or restart the NFS share, you can use
|
||||
the following commands:
|
||||
|
||||
- To start the NFS share::
|
||||
|
||||
runqemu-export-rootfs start file-system-location
|
||||
|
||||
- To stop the NFS share::
|
||||
|
||||
runqemu-export-rootfs stop file-system-location
|
||||
|
||||
- To restart the NFS share::
|
||||
|
||||
runqemu-export-rootfs restart file-system-location
|
||||
|
||||
QEMU CPU Compatibility Under KVM
|
||||
================================
|
||||
|
||||
By default, the QEMU build compiles for and targets 64-bit and x86 Intel
|
||||
Core2 Duo processors and 32-bit x86 Intel Pentium II processors. QEMU
|
||||
builds for and targets these CPU types because they display a broad
|
||||
range of CPU feature compatibility with many commonly used CPUs.
|
||||
|
||||
Despite this broad range of compatibility, the CPUs could support a
|
||||
feature that your host CPU does not support. Although this situation is
|
||||
not a problem when QEMU uses software emulation of the feature, it can
|
||||
be a problem when QEMU is running with KVM enabled. Specifically,
|
||||
software compiled with a certain CPU feature crashes when run on a CPU
|
||||
under KVM that does not support that feature. To work around this
|
||||
problem, you can override QEMU's runtime CPU setting by changing the
|
||||
``QB_CPU_KVM`` variable in ``qemuboot.conf`` in the :term:`Build Directory`
|
||||
``deploy/image`` directory. This setting specifies a ``-cpu`` option passed
|
||||
into QEMU in the ``runqemu`` script. Running ``qemu -cpu help`` returns a
|
||||
list of available supported CPU types.
|
||||
|
||||
QEMU Performance
|
||||
================
|
||||
|
||||
Using QEMU to emulate your hardware can result in speed issues depending
|
||||
on the target and host architecture mix. For example, using the
|
||||
``qemux86`` image in the emulator on an Intel-based 32-bit (x86) host
|
||||
machine is fast because the target and host architectures match. On the
|
||||
other hand, using the ``qemuarm`` image on the same Intel-based host can
|
||||
be slower. But, you still achieve faithful emulation of ARM-specific
|
||||
issues.
|
||||
|
||||
To speed things up, the QEMU images support using ``distcc`` to call a
|
||||
cross-compiler outside the emulated system. If you used ``runqemu`` to
|
||||
start QEMU, and the ``distccd`` application is present on the host
|
||||
system, any BitBake cross-compiling toolchain available from the build
|
||||
system is automatically used from within QEMU simply by calling
|
||||
``distcc``. You can accomplish this by defining the cross-compiler
|
||||
variable (e.g. ``export CC="distcc"``). Alternatively, if you are using
|
||||
a suitable SDK image or the appropriate stand-alone toolchain is
|
||||
present, the toolchain is also automatically used.
|
||||
|
||||
.. note::
|
||||
|
||||
There are several mechanisms to connect to the system running
|
||||
on the QEMU emulator:
|
||||
|
||||
- QEMU provides a framebuffer interface that makes standard consoles
|
||||
available.
|
||||
|
||||
- Generally, headless embedded devices have a serial port. If so,
|
||||
you can configure the operating system of the running image to use
|
||||
that port to run a console. The connection uses standard IP
|
||||
networking.
|
||||
|
||||
- SSH servers are available in some QEMU images. The ``core-image-sato``
|
||||
QEMU image has a Dropbear secure shell (SSH) server that runs with
|
||||
the root password disabled. The ``core-image-full-cmdline`` and
|
||||
``core-image-lsb`` QEMU images have OpenSSH instead of Dropbear.
|
||||
Including these SSH servers allow you to use standard ``ssh`` and
|
||||
``scp`` commands. The ``core-image-minimal`` QEMU image, however,
|
||||
contains no SSH server.
|
||||
|
||||
- You can use a provided, user-space NFS server to boot the QEMU
|
||||
session using a local copy of the root filesystem on the host. In
|
||||
order to make this connection, you must extract a root filesystem
|
||||
tarball by using the ``runqemu-extract-sdk`` command. After
|
||||
running the command, you must then point the ``runqemu`` script to
|
||||
the extracted directory instead of a root filesystem image file.
|
||||
See the
|
||||
":ref:`dev-manual/qemu:running under a network file system (nfs) server`"
|
||||
section for more information.
|
||||
|
||||
QEMU Command-Line Syntax
|
||||
========================
|
||||
|
||||
The basic ``runqemu`` command syntax is as follows::
|
||||
|
||||
$ runqemu [option ] [...]
|
||||
|
||||
Based on what you provide on the command line, ``runqemu`` does a
|
||||
good job of figuring out what you are trying to do. For example, by
|
||||
default, QEMU looks for the most recently built image according to the
|
||||
timestamp when it needs to look for an image. Minimally, through the use
|
||||
of options, you must provide either a machine name, a virtual machine
|
||||
image (``*wic.vmdk``), or a kernel image (``*.bin``).
|
||||
|
||||
Following is the command-line help output for the ``runqemu`` command::
|
||||
|
||||
$ runqemu --help
|
||||
|
||||
Usage: you can run this script with any valid combination
|
||||
of the following environment variables (in any order):
|
||||
KERNEL - the kernel image file to use
|
||||
ROOTFS - the rootfs image file or nfsroot directory to use
|
||||
MACHINE - the machine name (optional, autodetected from KERNEL filename if unspecified)
|
||||
Simplified QEMU command-line options can be passed with:
|
||||
nographic - disable video console
|
||||
serial - enable a serial console on /dev/ttyS0
|
||||
slirp - enable user networking, no root privileges required
|
||||
kvm - enable KVM when running x86/x86_64 (VT-capable CPU required)
|
||||
kvm-vhost - enable KVM with vhost when running x86/x86_64 (VT-capable CPU required)
|
||||
publicvnc - enable a VNC server open to all hosts
|
||||
audio - enable audio
|
||||
[*/]ovmf* - OVMF firmware file or base name for booting with UEFI
|
||||
tcpserial=<port> - specify tcp serial port number
|
||||
biosdir=<dir> - specify custom bios dir
|
||||
biosfilename=<filename> - specify bios filename
|
||||
qemuparams=<xyz> - specify custom parameters to QEMU
|
||||
bootparams=<xyz> - specify custom kernel parameters during boot
|
||||
help, -h, --help: print this text
|
||||
|
||||
Examples:
|
||||
runqemu
|
||||
runqemu qemuarm
|
||||
runqemu tmp/deploy/images/qemuarm
|
||||
runqemu tmp/deploy/images/qemux86/<qemuboot.conf>
|
||||
runqemu qemux86-64 core-image-sato ext4
|
||||
runqemu qemux86-64 wic-image-minimal wic
|
||||
runqemu path/to/bzImage-qemux86.bin path/to/nfsrootdir/ serial
|
||||
runqemu qemux86 iso/hddimg/wic.vmdk/wic.qcow2/wic.vdi/ramfs/cpio.gz...
|
||||
runqemu qemux86 qemuparams="-m 256"
|
||||
runqemu qemux86 bootparams="psplash=false"
|
||||
runqemu path/to/<image>-<machine>.wic
|
||||
runqemu path/to/<image>-<machine>.wic.vmdk
|
||||
|
||||
``runqemu`` Command-Line Options
|
||||
================================
|
||||
|
||||
Following is a description of ``runqemu`` options you can provide on the
|
||||
command line:
|
||||
|
||||
.. note::
|
||||
|
||||
If you do provide some "illegal" option combination or perhaps you do
|
||||
not provide enough in the way of options, ``runqemu``
|
||||
provides appropriate error messaging to help you correct the problem.
|
||||
|
||||
- `QEMUARCH`: The QEMU machine architecture, which must be "qemuarm",
|
||||
"qemuarm64", "qemumips", "qemumips64", "qemuppc", "qemux86", or
|
||||
"qemux86-64".
|
||||
|
||||
- `VM`: The virtual machine image, which must be a ``.wic.vmdk``
|
||||
file. Use this option when you want to boot a ``.wic.vmdk`` image.
|
||||
The image filename you provide must contain one of the following
|
||||
strings: "qemux86-64", "qemux86", "qemuarm", "qemumips64",
|
||||
"qemumips", "qemuppc", or "qemush4".
|
||||
|
||||
- `ROOTFS`: A root filesystem that has one of the following filetype
|
||||
extensions: "ext2", "ext3", "ext4", "jffs2", "nfs", or "btrfs". If
|
||||
the filename you provide for this option uses "nfs", it must provide
|
||||
an explicit root filesystem path.
|
||||
|
||||
- `KERNEL`: A kernel image, which is a ``.bin`` file. When you provide a
|
||||
``.bin`` file, ``runqemu`` detects it and assumes the file is a
|
||||
kernel image.
|
||||
|
||||
- `MACHINE`: The architecture of the QEMU machine, which must be one of
|
||||
the following: "qemux86", "qemux86-64", "qemuarm", "qemuarm64",
|
||||
"qemumips", "qemumips64", or "qemuppc". The MACHINE and QEMUARCH
|
||||
options are basically identical. If you do not provide a MACHINE
|
||||
option, ``runqemu`` tries to determine it based on other options.
|
||||
|
||||
- ``ramfs``: Indicates you are booting an :term:`Initramfs`
|
||||
image, which means the ``FSTYPE`` is ``cpio.gz``.
|
||||
|
||||
- ``iso``: Indicates you are booting an ISO image, which means the
|
||||
``FSTYPE`` is ``.iso``.
|
||||
|
||||
- ``nographic``: Disables the video console, which sets the console to
|
||||
"ttys0". This option is useful when you have logged into a server and
|
||||
you do not want to disable forwarding from the X Window System (X11)
|
||||
to your workstation or laptop.
|
||||
|
||||
- ``serial``: Enables a serial console on ``/dev/ttyS0``.
|
||||
|
||||
- ``biosdir``: Establishes a custom directory for BIOS, VGA BIOS and
|
||||
keymaps.
|
||||
|
||||
- ``biosfilename``: Establishes a custom BIOS name.
|
||||
|
||||
- ``qemuparams=\"xyz\"``: Specifies custom QEMU parameters. Use this
|
||||
option to pass options other than the simple "kvm" and "serial"
|
||||
options.
|
||||
|
||||
- ``bootparams=\"xyz\"``: Specifies custom boot parameters for the
|
||||
kernel.
|
||||
|
||||
- ``audio``: Enables audio in QEMU. The MACHINE option must be either
|
||||
"qemux86" or "qemux86-64" in order for audio to be enabled.
|
||||
Additionally, the ``snd_intel8x0`` or ``snd_ens1370`` driver must be
|
||||
installed in linux guest.
|
||||
|
||||
- ``slirp``: Enables "slirp" networking, which is a different way of
|
||||
networking that does not need root access but also is not as easy to
|
||||
use or comprehensive as the default.
|
||||
|
||||
Using ``slirp`` by default will forward the guest machine's
|
||||
22 and 23 TCP ports to host machine's 2222 and 2323 ports
|
||||
(or the next free ports). Specific forwarding rules can be configured
|
||||
by setting ``QB_SLIRP_OPT`` as environment variable or in ``qemuboot.conf``
|
||||
in the :term:`Build Directory` ``deploy/image`` directory.
|
||||
Examples::
|
||||
|
||||
QB_SLIRP_OPT="-netdev user,id=net0,hostfwd=tcp::8080-:80"
|
||||
|
||||
QB_SLIRP_OPT="-netdev user,id=net0,hostfwd=tcp::8080-:80,hostfwd=tcp::2222-:22"
|
||||
|
||||
The first example forwards TCP port 80 from the emulated system to
|
||||
port 8080 (or the next free port) on the host system,
|
||||
allowing access to an http server running in QEMU from
|
||||
``http://<host ip>:8080/``.
|
||||
|
||||
The second example does the same, but also forwards TCP port 22 on the
|
||||
guest system to 2222 (or the next free port) on the host system,
|
||||
allowing ssh access to the emulated system using
|
||||
``ssh -P 2222 <user>@<host ip>``.
|
||||
|
||||
Keep in mind that proper configuration of firewall software is required.
|
||||
|
||||
- ``kvm``: Enables KVM when running "qemux86" or "qemux86-64" QEMU
|
||||
architectures. For KVM to work, all the following conditions must be
|
||||
met:
|
||||
|
||||
- Your MACHINE must be either qemux86" or "qemux86-64".
|
||||
|
||||
- Your build host has to have the KVM modules installed, which are
|
||||
``/dev/kvm``.
|
||||
|
||||
- The build host ``/dev/kvm`` directory has to be both writable and
|
||||
readable.
|
||||
|
||||
- ``kvm-vhost``: Enables KVM with VHOST support when running "qemux86"
|
||||
or "qemux86-64" QEMU architectures. For KVM with VHOST to work, the
|
||||
following conditions must be met:
|
||||
|
||||
- ``kvm`` option conditions defined above must be met.
|
||||
|
||||
- Your build host has to have virtio net device, which are
|
||||
``/dev/vhost-net``.
|
||||
|
||||
- The build host ``/dev/vhost-net`` directory has to be either
|
||||
readable or writable and "slirp-enabled".
|
||||
|
||||
- ``publicvnc``: Enables a VNC server open to all hosts.
|
||||
@@ -0,0 +1,89 @@
|
||||
.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
|
||||
|
||||
Using Quilt in Your Workflow
|
||||
****************************
|
||||
|
||||
`Quilt <https://savannah.nongnu.org/projects/quilt>`__ is a powerful tool
|
||||
that allows you to capture source code changes without having a clean
|
||||
source tree. This section outlines the typical workflow you can use to
|
||||
modify source code, test changes, and then preserve the changes in the
|
||||
form of a patch all using Quilt.
|
||||
|
||||
.. note::
|
||||
|
||||
With regard to preserving changes to source files, if you clean a
|
||||
recipe or have :ref:`ref-classes-rm-work` enabled, the
|
||||
:ref:`devtool workflow <sdk-manual/extensible:using \`\`devtool\`\` in your sdk workflow>`
|
||||
as described in the Yocto Project Application Development and the
|
||||
Extensible Software Development Kit (eSDK) manual is a safer
|
||||
development flow than the flow that uses Quilt.
|
||||
|
||||
Follow these general steps:
|
||||
|
||||
#. *Find the Source Code:* Temporary source code used by the
|
||||
OpenEmbedded build system is kept in the :term:`Build Directory`. See the
|
||||
":ref:`dev-manual/temporary-source-code:finding temporary source code`" section to
|
||||
learn how to locate the directory that has the temporary source code for a
|
||||
particular package.
|
||||
|
||||
#. *Change Your Working Directory:* You need to be in the directory that
|
||||
has the temporary source code. That directory is defined by the
|
||||
:term:`S` variable.
|
||||
|
||||
#. *Create a New Patch:* Before modifying source code, you need to
|
||||
create a new patch. To create a new patch file, use ``quilt new`` as
|
||||
below::
|
||||
|
||||
$ quilt new my_changes.patch
|
||||
|
||||
#. *Notify Quilt and Add Files:* After creating the patch, you need to
|
||||
notify Quilt about the files you plan to edit. You notify Quilt by
|
||||
adding the files to the patch you just created::
|
||||
|
||||
$ quilt add file1.c file2.c file3.c
|
||||
|
||||
#. *Edit the Files:* Make your changes in the source code to the files
|
||||
you added to the patch.
|
||||
|
||||
#. *Test Your Changes:* Once you have modified the source code, the
|
||||
easiest way to test your changes is by calling the :ref:`ref-tasks-compile`
|
||||
task as shown in the following example::
|
||||
|
||||
$ bitbake -c compile -f package
|
||||
|
||||
The ``-f`` or ``--force`` option forces the specified task to
|
||||
execute. If you find problems with your code, you can just keep
|
||||
editing and re-testing iteratively until things work as expected.
|
||||
|
||||
.. note::
|
||||
|
||||
All the modifications you make to the temporary source code disappear
|
||||
once you run the :ref:`ref-tasks-clean` or :ref:`ref-tasks-cleanall`
|
||||
tasks using BitBake (i.e. ``bitbake -c clean package`` and
|
||||
``bitbake -c cleanall package``). Modifications will also disappear if
|
||||
you use the :ref:`ref-classes-rm-work` feature as described in
|
||||
the ":ref:`dev-manual/disk-space:conserving disk space during builds`"
|
||||
section.
|
||||
|
||||
#. *Generate the Patch:* Once your changes work as expected, you need to
|
||||
use Quilt to generate the final patch that contains all your
|
||||
modifications::
|
||||
|
||||
$ quilt refresh
|
||||
|
||||
At this point, the
|
||||
``my_changes.patch`` file has all your edits made to the ``file1.c``,
|
||||
``file2.c``, and ``file3.c`` files.
|
||||
|
||||
You can find the resulting patch file in the ``patches/``
|
||||
subdirectory of the source (:term:`S`) directory.
|
||||
|
||||
#. *Copy the Patch File:* For simplicity, copy the patch file into a
|
||||
directory named ``files``, which you can create in the same directory
|
||||
that holds the recipe (``.bb``) file or the append (``.bbappend``)
|
||||
file. Placing the patch here guarantees that the OpenEmbedded build
|
||||
system will find the patch. Next, add the patch into the :term:`SRC_URI`
|
||||
of the recipe. Here is an example::
|
||||
|
||||
SRC_URI += "file://my_changes.patch"
|
||||
|
||||
@@ -0,0 +1,89 @@
|
||||
.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
|
||||
|
||||
Creating a Read-Only Root Filesystem
|
||||
************************************
|
||||
|
||||
Suppose, for security reasons, you need to disable your target device's
|
||||
root filesystem's write permissions (i.e. you need a read-only root
|
||||
filesystem). Or, perhaps you are running the device's operating system
|
||||
from a read-only storage device. For either case, you can customize your
|
||||
image for that behavior.
|
||||
|
||||
.. note::
|
||||
|
||||
Supporting a read-only root filesystem requires that the system and
|
||||
applications do not try to write to the root filesystem. You must
|
||||
configure all parts of the target system to write elsewhere, or to
|
||||
gracefully fail in the event of attempting to write to the root
|
||||
filesystem.
|
||||
|
||||
Creating the Root Filesystem
|
||||
============================
|
||||
|
||||
To create the read-only root filesystem, simply add the
|
||||
"read-only-rootfs" feature to your image, normally in one of two ways.
|
||||
The first way is to add the "read-only-rootfs" image feature in the
|
||||
image's recipe file via the :term:`IMAGE_FEATURES` variable::
|
||||
|
||||
IMAGE_FEATURES += "read-only-rootfs"
|
||||
|
||||
As an alternative, you can add the same feature
|
||||
from within your :term:`Build Directory`'s ``local.conf`` file with the
|
||||
associated :term:`EXTRA_IMAGE_FEATURES` variable, as in::
|
||||
|
||||
EXTRA_IMAGE_FEATURES = "read-only-rootfs"
|
||||
|
||||
For more information on how to use these variables, see the
|
||||
":ref:`dev-manual/customizing-images:Customizing Images Using Custom \`\`IMAGE_FEATURES\`\` and \`\`EXTRA_IMAGE_FEATURES\`\``"
|
||||
section. For information on the variables, see
|
||||
:term:`IMAGE_FEATURES` and
|
||||
:term:`EXTRA_IMAGE_FEATURES`.
|
||||
|
||||
Post-Installation Scripts and Read-Only Root Filesystem
|
||||
=======================================================
|
||||
|
||||
It is very important that you make sure all post-Installation
|
||||
(``pkg_postinst``) scripts for packages that are installed into the
|
||||
image can be run at the time when the root filesystem is created during
|
||||
the build on the host system. These scripts cannot attempt to run during
|
||||
the first boot on the target device. With the "read-only-rootfs" feature
|
||||
enabled, the build system makes sure that all post-installation scripts
|
||||
succeed at file system creation time. If any of these scripts
|
||||
still need to be run after the root filesystem is created, the build
|
||||
immediately fails. These build-time checks ensure that the build fails
|
||||
rather than the target device fails later during its initial boot
|
||||
operation.
|
||||
|
||||
Most of the common post-installation scripts generated by the build
|
||||
system for the out-of-the-box Yocto Project are engineered so that they
|
||||
can run during root filesystem creation (e.g. post-installation scripts
|
||||
for caching fonts). However, if you create and add custom scripts, you
|
||||
need to be sure they can be run during this file system creation.
|
||||
|
||||
Here are some common problems that prevent post-installation scripts
|
||||
from running during root filesystem creation:
|
||||
|
||||
- *Not using $D in front of absolute paths:* The build system defines
|
||||
``$``\ :term:`D` when the root
|
||||
filesystem is created. Furthermore, ``$D`` is blank when the script
|
||||
is run on the target device. This implies two purposes for ``$D``:
|
||||
ensuring paths are valid in both the host and target environments,
|
||||
and checking to determine which environment is being used as a method
|
||||
for taking appropriate actions.
|
||||
|
||||
- *Attempting to run processes that are specific to or dependent on the
|
||||
target architecture:* You can work around these attempts by using
|
||||
native tools, which run on the host system, to accomplish the same
|
||||
tasks, or by alternatively running the processes under QEMU, which
|
||||
has the ``qemu_run_binary`` function. For more information, see the
|
||||
:ref:`ref-classes-qemu` class.
|
||||
|
||||
Areas With Write Access
|
||||
=======================
|
||||
|
||||
With the "read-only-rootfs" feature enabled, any attempt by the target
|
||||
to write to the root filesystem at runtime fails. Consequently, you must
|
||||
make sure that you configure processes and applications that attempt
|
||||
these types of writes do so to directories with write access (e.g.
|
||||
``/tmp`` or ``/var/run``).
|
||||
|
||||
@@ -0,0 +1,598 @@
|
||||
.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
|
||||
|
||||
Performing Automated Runtime Testing
|
||||
************************************
|
||||
|
||||
The OpenEmbedded build system makes available a series of automated
|
||||
tests for images to verify runtime functionality. You can run these
|
||||
tests on either QEMU or actual target hardware. Tests are written in
|
||||
Python making use of the ``unittest`` module, and the majority of them
|
||||
run commands on the target system over SSH. This section describes how
|
||||
you set up the environment to use these tests, run available tests, and
|
||||
write and add your own tests.
|
||||
|
||||
For information on the test and QA infrastructure available within the
|
||||
Yocto Project, see the ":ref:`ref-manual/release-process:testing and quality assurance`"
|
||||
section in the Yocto Project Reference Manual.
|
||||
|
||||
Enabling Tests
|
||||
==============
|
||||
|
||||
Depending on whether you are planning to run tests using QEMU or on the
|
||||
hardware, you have to take different steps to enable the tests. See the
|
||||
following subsections for information on how to enable both types of
|
||||
tests.
|
||||
|
||||
Enabling Runtime Tests on QEMU
|
||||
------------------------------
|
||||
|
||||
In order to run tests, you need to do the following:
|
||||
|
||||
- *Set up to avoid interaction with sudo for networking:* To
|
||||
accomplish this, you must do one of the following:
|
||||
|
||||
- Add ``NOPASSWD`` for your user in ``/etc/sudoers`` either for all
|
||||
commands or just for ``runqemu-ifup``. You must provide the full
|
||||
path as that can change if you are using multiple clones of the
|
||||
source repository.
|
||||
|
||||
.. note::
|
||||
|
||||
On some distributions, you also need to comment out "Defaults
|
||||
requiretty" in ``/etc/sudoers``.
|
||||
|
||||
- Manually configure a tap interface for your system.
|
||||
|
||||
- Run as root the script in ``scripts/runqemu-gen-tapdevs``, which
|
||||
should generate a list of tap devices. This is the option
|
||||
typically chosen for Autobuilder-type environments.
|
||||
|
||||
.. note::
|
||||
|
||||
- Be sure to use an absolute path when calling this script
|
||||
with sudo.
|
||||
|
||||
- The package recipe ``qemu-helper-native`` is required to run
|
||||
this script. Build the package using the following command::
|
||||
|
||||
$ bitbake qemu-helper-native
|
||||
|
||||
- *Set the DISPLAY variable:* You need to set this variable so that
|
||||
you have an X server available (e.g. start ``vncserver`` for a
|
||||
headless machine).
|
||||
|
||||
- *Be sure your host's firewall accepts incoming connections from
|
||||
192.168.7.0/24:* Some of the tests (in particular DNF tests) start an
|
||||
HTTP server on a random high number port, which is used to serve
|
||||
files to the target. The DNF module serves
|
||||
``${WORKDIR}/oe-rootfs-repo`` so it can run DNF channel commands.
|
||||
That means your host's firewall must accept incoming connections from
|
||||
192.168.7.0/24, which is the default IP range used for tap devices by
|
||||
``runqemu``.
|
||||
|
||||
- *Be sure your host has the correct packages installed:* Depending
|
||||
your host's distribution, you need to have the following packages
|
||||
installed:
|
||||
|
||||
- Ubuntu and Debian: ``sysstat`` and ``iproute2``
|
||||
|
||||
- openSUSE: ``sysstat`` and ``iproute2``
|
||||
|
||||
- Fedora: ``sysstat`` and ``iproute``
|
||||
|
||||
- CentOS: ``sysstat`` and ``iproute``
|
||||
|
||||
Once you start running the tests, the following happens:
|
||||
|
||||
#. A copy of the root filesystem is written to ``${WORKDIR}/testimage``.
|
||||
|
||||
#. The image is booted under QEMU using the standard ``runqemu`` script.
|
||||
|
||||
#. A default timeout of 500 seconds occurs to allow for the boot process
|
||||
to reach the login prompt. You can change the timeout period by
|
||||
setting
|
||||
:term:`TEST_QEMUBOOT_TIMEOUT`
|
||||
in the ``local.conf`` file.
|
||||
|
||||
#. Once the boot process is reached and the login prompt appears, the
|
||||
tests run. The full boot log is written to
|
||||
``${WORKDIR}/testimage/qemu_boot_log``.
|
||||
|
||||
#. Each test module loads in the order found in :term:`TEST_SUITES`. You can
|
||||
find the full output of the commands run over SSH in
|
||||
``${WORKDIR}/testimgage/ssh_target_log``.
|
||||
|
||||
#. If no failures occur, the task running the tests ends successfully.
|
||||
You can find the output from the ``unittest`` in the task log at
|
||||
``${WORKDIR}/temp/log.do_testimage``.
|
||||
|
||||
Enabling Runtime Tests on Hardware
|
||||
----------------------------------
|
||||
|
||||
The OpenEmbedded build system can run tests on real hardware, and for
|
||||
certain devices it can also deploy the image to be tested onto the
|
||||
device beforehand.
|
||||
|
||||
For automated deployment, a "controller image" is installed onto the
|
||||
hardware once as part of setup. Then, each time tests are to be run, the
|
||||
following occurs:
|
||||
|
||||
#. The controller image is booted into and used to write the image to be
|
||||
tested to a second partition.
|
||||
|
||||
#. The device is then rebooted using an external script that you need to
|
||||
provide.
|
||||
|
||||
#. The device boots into the image to be tested.
|
||||
|
||||
When running tests (independent of whether the image has been deployed
|
||||
automatically or not), the device is expected to be connected to a
|
||||
network on a pre-determined IP address. You can either use static IP
|
||||
addresses written into the image, or set the image to use DHCP and have
|
||||
your DHCP server on the test network assign a known IP address based on
|
||||
the MAC address of the device.
|
||||
|
||||
In order to run tests on hardware, you need to set :term:`TEST_TARGET` to an
|
||||
appropriate value. For QEMU, you do not have to change anything, the
|
||||
default value is "qemu". For running tests on hardware, the following
|
||||
options are available:
|
||||
|
||||
- *"simpleremote":* Choose "simpleremote" if you are going to run tests
|
||||
on a target system that is already running the image to be tested and
|
||||
is available on the network. You can use "simpleremote" in
|
||||
conjunction with either real hardware or an image running within a
|
||||
separately started QEMU or any other virtual machine manager.
|
||||
|
||||
- *"SystemdbootTarget":* Choose "SystemdbootTarget" if your hardware is
|
||||
an EFI-based machine with ``systemd-boot`` as bootloader and
|
||||
``core-image-testmaster`` (or something similar) is installed. Also,
|
||||
your hardware under test must be in a DHCP-enabled network that gives
|
||||
it the same IP address for each reboot.
|
||||
|
||||
If you choose "SystemdbootTarget", there are additional requirements
|
||||
and considerations. See the
|
||||
":ref:`dev-manual/runtime-testing:selecting systemdboottarget`" section, which
|
||||
follows, for more information.
|
||||
|
||||
- *"BeagleBoneTarget":* Choose "BeagleBoneTarget" if you are deploying
|
||||
images and running tests on the BeagleBone "Black" or original
|
||||
"White" hardware. For information on how to use these tests, see the
|
||||
comments at the top of the BeagleBoneTarget
|
||||
``meta-yocto-bsp/lib/oeqa/controllers/beaglebonetarget.py`` file.
|
||||
|
||||
- *"EdgeRouterTarget":* Choose "EdgeRouterTarget" if you are deploying
|
||||
images and running tests on the Ubiquiti Networks EdgeRouter Lite.
|
||||
For information on how to use these tests, see the comments at the
|
||||
top of the EdgeRouterTarget
|
||||
``meta-yocto-bsp/lib/oeqa/controllers/edgeroutertarget.py`` file.
|
||||
|
||||
- *"GrubTarget":* Choose "GrubTarget" if you are deploying images and running
|
||||
tests on any generic PC that boots using GRUB. For information on how
|
||||
to use these tests, see the comments at the top of the GrubTarget
|
||||
``meta-yocto-bsp/lib/oeqa/controllers/grubtarget.py`` file.
|
||||
|
||||
- *"your-target":* Create your own custom target if you want to run
|
||||
tests when you are deploying images and running tests on a custom
|
||||
machine within your BSP layer. To do this, you need to add a Python
|
||||
unit that defines the target class under ``lib/oeqa/controllers/``
|
||||
within your layer. You must also provide an empty ``__init__.py``.
|
||||
For examples, see files in ``meta-yocto-bsp/lib/oeqa/controllers/``.
|
||||
|
||||
Selecting SystemdbootTarget
|
||||
---------------------------
|
||||
|
||||
If you did not set :term:`TEST_TARGET` to "SystemdbootTarget", then you do
|
||||
not need any information in this section. You can skip down to the
|
||||
":ref:`dev-manual/runtime-testing:running tests`" section.
|
||||
|
||||
If you did set :term:`TEST_TARGET` to "SystemdbootTarget", you also need to
|
||||
perform a one-time setup of your controller image by doing the following:
|
||||
|
||||
#. *Set EFI_PROVIDER:* Be sure that :term:`EFI_PROVIDER` is as follows::
|
||||
|
||||
EFI_PROVIDER = "systemd-boot"
|
||||
|
||||
#. *Build the controller image:* Build the ``core-image-testmaster`` image.
|
||||
The ``core-image-testmaster`` recipe is provided as an example for a
|
||||
"controller" image and you can customize the image recipe as you would
|
||||
any other recipe.
|
||||
|
||||
Here are the image recipe requirements:
|
||||
|
||||
- Inherits ``core-image`` so that kernel modules are installed.
|
||||
|
||||
- Installs normal linux utilities not BusyBox ones (e.g. ``bash``,
|
||||
``coreutils``, ``tar``, ``gzip``, and ``kmod``).
|
||||
|
||||
- Uses a custom :term:`Initramfs` image with a custom
|
||||
installer. A normal image that you can install usually creates a
|
||||
single root filesystem partition. This image uses another installer that
|
||||
creates a specific partition layout. Not all Board Support
|
||||
Packages (BSPs) can use an installer. For such cases, you need to
|
||||
manually create the following partition layout on the target:
|
||||
|
||||
- First partition mounted under ``/boot``, labeled "boot".
|
||||
|
||||
- The main root filesystem partition where this image gets installed,
|
||||
which is mounted under ``/``.
|
||||
|
||||
- Another partition labeled "testrootfs" where test images get
|
||||
deployed.
|
||||
|
||||
#. *Install image:* Install the image that you just built on the target
|
||||
system.
|
||||
|
||||
The final thing you need to do when setting :term:`TEST_TARGET` to
|
||||
"SystemdbootTarget" is to set up the test image:
|
||||
|
||||
#. *Set up your local.conf file:* Make sure you have the following
|
||||
statements in your ``local.conf`` file::
|
||||
|
||||
IMAGE_FSTYPES += "tar.gz"
|
||||
INHERIT += "testimage"
|
||||
TEST_TARGET = "SystemdbootTarget"
|
||||
TEST_TARGET_IP = "192.168.2.3"
|
||||
|
||||
#. *Build your test image:* Use BitBake to build the image::
|
||||
|
||||
$ bitbake core-image-sato
|
||||
|
||||
Power Control
|
||||
-------------
|
||||
|
||||
For most hardware targets other than "simpleremote", you can control
|
||||
power:
|
||||
|
||||
- You can use :term:`TEST_POWERCONTROL_CMD` together with
|
||||
:term:`TEST_POWERCONTROL_EXTRA_ARGS` as a command that runs on the host
|
||||
and does power cycling. The test code passes one argument to that
|
||||
command: off, on or cycle (off then on). Here is an example that
|
||||
could appear in your ``local.conf`` file::
|
||||
|
||||
TEST_POWERCONTROL_CMD = "powercontrol.exp test 10.11.12.1 nuc1"
|
||||
|
||||
In this example, the expect
|
||||
script does the following:
|
||||
|
||||
.. code-block:: shell
|
||||
|
||||
ssh test@10.11.12.1 "pyctl nuc1 arg"
|
||||
|
||||
It then runs a Python script that controls power for a label called
|
||||
``nuc1``.
|
||||
|
||||
.. note::
|
||||
|
||||
You need to customize :term:`TEST_POWERCONTROL_CMD` and
|
||||
:term:`TEST_POWERCONTROL_EXTRA_ARGS` for your own setup. The one requirement
|
||||
is that it accepts "on", "off", and "cycle" as the last argument.
|
||||
|
||||
- When no command is defined, it connects to the device over SSH and
|
||||
uses the classic reboot command to reboot the device. Classic reboot
|
||||
is fine as long as the machine actually reboots (i.e. the SSH test
|
||||
has not failed). It is useful for scenarios where you have a simple
|
||||
setup, typically with a single board, and where some manual
|
||||
interaction is okay from time to time.
|
||||
|
||||
If you have no hardware to automatically perform power control but still
|
||||
wish to experiment with automated hardware testing, you can use the
|
||||
``dialog-power-control`` script that shows a dialog prompting you to perform
|
||||
the required power action. This script requires either KDialog or Zenity
|
||||
to be installed. To use this script, set the
|
||||
:term:`TEST_POWERCONTROL_CMD`
|
||||
variable as follows::
|
||||
|
||||
TEST_POWERCONTROL_CMD = "${COREBASE}/scripts/contrib/dialog-power-control"
|
||||
|
||||
Serial Console Connection
|
||||
-------------------------
|
||||
|
||||
For test target classes requiring a serial console to interact with the
|
||||
bootloader (e.g. BeagleBoneTarget, EdgeRouterTarget, and GrubTarget),
|
||||
you need to specify a command to use to connect to the serial console of
|
||||
the target machine by using the
|
||||
:term:`TEST_SERIALCONTROL_CMD`
|
||||
variable and optionally the
|
||||
:term:`TEST_SERIALCONTROL_EXTRA_ARGS`
|
||||
variable.
|
||||
|
||||
These cases could be a serial terminal program if the machine is
|
||||
connected to a local serial port, or a ``telnet`` or ``ssh`` command
|
||||
connecting to a remote console server. Regardless of the case, the
|
||||
command simply needs to connect to the serial console and forward that
|
||||
connection to standard input and output as any normal terminal program
|
||||
does. For example, to use the picocom terminal program on serial device
|
||||
``/dev/ttyUSB0`` at 115200bps, you would set the variable as follows::
|
||||
|
||||
TEST_SERIALCONTROL_CMD = "picocom /dev/ttyUSB0 -b 115200"
|
||||
|
||||
For local
|
||||
devices where the serial port device disappears when the device reboots,
|
||||
an additional "serdevtry" wrapper script is provided. To use this
|
||||
wrapper, simply prefix the terminal command with
|
||||
``${COREBASE}/scripts/contrib/serdevtry``::
|
||||
|
||||
TEST_SERIALCONTROL_CMD = "${COREBASE}/scripts/contrib/serdevtry picocom -b 115200 /dev/ttyUSB0"
|
||||
|
||||
Running Tests
|
||||
=============
|
||||
|
||||
You can start the tests automatically or manually:
|
||||
|
||||
- *Automatically running tests:* To run the tests automatically after the
|
||||
OpenEmbedded build system successfully creates an image, first set the
|
||||
:term:`TESTIMAGE_AUTO` variable to "1" in your ``local.conf`` file in the
|
||||
:term:`Build Directory`::
|
||||
|
||||
TESTIMAGE_AUTO = "1"
|
||||
|
||||
Next, build your image. If the image successfully builds, the
|
||||
tests run::
|
||||
|
||||
bitbake core-image-sato
|
||||
|
||||
- *Manually running tests:* To manually run the tests, first globally
|
||||
inherit the :ref:`ref-classes-testimage` class by editing your
|
||||
``local.conf`` file::
|
||||
|
||||
INHERIT += "testimage"
|
||||
|
||||
Next, use BitBake to run the tests::
|
||||
|
||||
bitbake -c testimage image
|
||||
|
||||
All test files reside in ``meta/lib/oeqa/runtime/cases`` in the
|
||||
:term:`Source Directory`. A test name maps
|
||||
directly to a Python module. Each test module may contain a number of
|
||||
individual tests. Tests are usually grouped together by the area tested
|
||||
(e.g tests for systemd reside in ``meta/lib/oeqa/runtime/cases/systemd.py``).
|
||||
|
||||
You can add tests to any layer provided you place them in the proper
|
||||
area and you extend :term:`BBPATH` in
|
||||
the ``local.conf`` file as normal. Be sure that tests reside in
|
||||
``layer/lib/oeqa/runtime/cases``.
|
||||
|
||||
.. note::
|
||||
|
||||
Be sure that module names do not collide with module names used in
|
||||
the default set of test modules in ``meta/lib/oeqa/runtime/cases``.
|
||||
|
||||
You can change the set of tests run by appending or overriding
|
||||
:term:`TEST_SUITES` variable in
|
||||
``local.conf``. Each name in :term:`TEST_SUITES` represents a required test
|
||||
for the image. Test modules named within :term:`TEST_SUITES` cannot be
|
||||
skipped even if a test is not suitable for an image (e.g. running the
|
||||
RPM tests on an image without ``rpm``). Appending "auto" to
|
||||
:term:`TEST_SUITES` causes the build system to try to run all tests that are
|
||||
suitable for the image (i.e. each test module may elect to skip itself).
|
||||
|
||||
The order you list tests in :term:`TEST_SUITES` is important and influences
|
||||
test dependencies. Consequently, tests that depend on other tests should
|
||||
be added after the test on which they depend. For example, since the
|
||||
``ssh`` test depends on the ``ping`` test, "ssh" needs to come after
|
||||
"ping" in the list. The test class provides no re-ordering or dependency
|
||||
handling.
|
||||
|
||||
.. note::
|
||||
|
||||
Each module can have multiple classes with multiple test methods.
|
||||
And, Python ``unittest`` rules apply.
|
||||
|
||||
Here are some things to keep in mind when running tests:
|
||||
|
||||
- The default tests for the image are defined as::
|
||||
|
||||
DEFAULT_TEST_SUITES:pn-image = "ping ssh df connman syslog xorg scp vnc date rpm dnf dmesg"
|
||||
|
||||
- Add your own test to the list of the by using the following::
|
||||
|
||||
TEST_SUITES:append = " mytest"
|
||||
|
||||
- Run a specific list of tests as follows::
|
||||
|
||||
TEST_SUITES = "test1 test2 test3"
|
||||
|
||||
Remember, order is important. Be sure to place a test that is
|
||||
dependent on another test later in the order.
|
||||
|
||||
Exporting Tests
|
||||
===============
|
||||
|
||||
You can export tests so that they can run independently of the build
|
||||
system. Exporting tests is required if you want to be able to hand the
|
||||
test execution off to a scheduler. You can only export tests that are
|
||||
defined in :term:`TEST_SUITES`.
|
||||
|
||||
If your image is already built, make sure the following are set in your
|
||||
``local.conf`` file::
|
||||
|
||||
INHERIT += "testexport"
|
||||
TEST_TARGET_IP = "IP-address-for-the-test-target"
|
||||
TEST_SERVER_IP = "IP-address-for-the-test-server"
|
||||
|
||||
You can then export the tests with the
|
||||
following BitBake command form::
|
||||
|
||||
$ bitbake image -c testexport
|
||||
|
||||
Exporting the tests places them in the :term:`Build Directory` in
|
||||
``tmp/testexport/``\ image, which is controlled by the :term:`TEST_EXPORT_DIR`
|
||||
variable.
|
||||
|
||||
You can now run the tests outside of the build environment::
|
||||
|
||||
$ cd tmp/testexport/image
|
||||
$ ./runexported.py testdata.json
|
||||
|
||||
Here is a complete example that shows IP addresses and uses the
|
||||
``core-image-sato`` image::
|
||||
|
||||
INHERIT += "testexport"
|
||||
TEST_TARGET_IP = "192.168.7.2"
|
||||
TEST_SERVER_IP = "192.168.7.1"
|
||||
|
||||
Use BitBake to export the tests::
|
||||
|
||||
$ bitbake core-image-sato -c testexport
|
||||
|
||||
Run the tests outside of
|
||||
the build environment using the following::
|
||||
|
||||
$ cd tmp/testexport/core-image-sato
|
||||
$ ./runexported.py testdata.json
|
||||
|
||||
Writing New Tests
|
||||
=================
|
||||
|
||||
As mentioned previously, all new test files need to be in the proper
|
||||
place for the build system to find them. New tests for additional
|
||||
functionality outside of the core should be added to the layer that adds
|
||||
the functionality, in ``layer/lib/oeqa/runtime/cases`` (as long as
|
||||
:term:`BBPATH` is extended in the
|
||||
layer's ``layer.conf`` file as normal). Just remember the following:
|
||||
|
||||
- Filenames need to map directly to test (module) names.
|
||||
|
||||
- Do not use module names that collide with existing core tests.
|
||||
|
||||
- Minimally, an empty ``__init__.py`` file must be present in the runtime
|
||||
directory.
|
||||
|
||||
To create a new test, start by copying an existing module (e.g.
|
||||
``syslog.py`` or ``gcc.py`` are good ones to use). Test modules can use
|
||||
code from ``meta/lib/oeqa/utils``, which are helper classes.
|
||||
|
||||
.. note::
|
||||
|
||||
Structure shell commands such that you rely on them and they return a
|
||||
single code for success. Be aware that sometimes you will need to
|
||||
parse the output. See the ``df.py`` and ``date.py`` modules for examples.
|
||||
|
||||
You will notice that all test classes inherit ``oeRuntimeTest``, which
|
||||
is found in ``meta/lib/oetest.py``. This base class offers some helper
|
||||
attributes, which are described in the following sections:
|
||||
|
||||
Class Methods
|
||||
-------------
|
||||
|
||||
Class methods are as follows:
|
||||
|
||||
- *hasPackage(pkg):* Returns "True" if ``pkg`` is in the installed
|
||||
package list of the image, which is based on the manifest file that
|
||||
is generated during the :ref:`ref-tasks-rootfs` task.
|
||||
|
||||
- *hasFeature(feature):* Returns "True" if the feature is in
|
||||
:term:`IMAGE_FEATURES` or
|
||||
:term:`DISTRO_FEATURES`.
|
||||
|
||||
Class Attributes
|
||||
----------------
|
||||
|
||||
Class attributes are as follows:
|
||||
|
||||
- *pscmd:* Equals "ps -ef" if ``procps`` is installed in the image.
|
||||
Otherwise, ``pscmd`` equals "ps" (busybox).
|
||||
|
||||
- *tc:* The called test context, which gives access to the
|
||||
following attributes:
|
||||
|
||||
- *d:* The BitBake datastore, which allows you to use stuff such
|
||||
as ``oeRuntimeTest.tc.d.getVar("VIRTUAL-RUNTIME_init_manager")``.
|
||||
|
||||
- *testslist and testsrequired:* Used internally. The tests
|
||||
do not need these.
|
||||
|
||||
- *filesdir:* The absolute path to
|
||||
``meta/lib/oeqa/runtime/files``, which contains helper files for
|
||||
tests meant for copying on the target such as small files written
|
||||
in C for compilation.
|
||||
|
||||
- *target:* The target controller object used to deploy and
|
||||
start an image on a particular target (e.g. Qemu, SimpleRemote,
|
||||
and SystemdbootTarget). Tests usually use the following:
|
||||
|
||||
- *ip:* The target's IP address.
|
||||
|
||||
- *server_ip:* The host's IP address, which is usually used
|
||||
by the DNF test suite.
|
||||
|
||||
- *run(cmd, timeout=None):* The single, most used method.
|
||||
This command is a wrapper for: ``ssh root@host "cmd"``. The
|
||||
command returns a tuple: (status, output), which are what their
|
||||
names imply - the return code of "cmd" and whatever output it
|
||||
produces. The optional timeout argument represents the number
|
||||
of seconds the test should wait for "cmd" to return. If the
|
||||
argument is "None", the test uses the default instance's
|
||||
timeout period, which is 300 seconds. If the argument is "0",
|
||||
the test runs until the command returns.
|
||||
|
||||
- *copy_to(localpath, remotepath):*
|
||||
``scp localpath root@ip:remotepath``.
|
||||
|
||||
- *copy_from(remotepath, localpath):*
|
||||
``scp root@host:remotepath localpath``.
|
||||
|
||||
Instance Attributes
|
||||
-------------------
|
||||
|
||||
There is a single instance attribute, which is ``target``. The ``target``
|
||||
instance attribute is identical to the class attribute of the same name,
|
||||
which is described in the previous section. This attribute exists as
|
||||
both an instance and class attribute so tests can use
|
||||
``self.target.run(cmd)`` in instance methods instead of
|
||||
``oeRuntimeTest.tc.target.run(cmd)``.
|
||||
|
||||
Installing Packages in the DUT Without the Package Manager
|
||||
==========================================================
|
||||
|
||||
When a test requires a package built by BitBake, it is possible to
|
||||
install that package. Installing the package does not require a package
|
||||
manager be installed in the device under test (DUT). It does, however,
|
||||
require an SSH connection and the target must be using the
|
||||
``sshcontrol`` class.
|
||||
|
||||
.. note::
|
||||
|
||||
This method uses ``scp`` to copy files from the host to the target, which
|
||||
causes permissions and special attributes to be lost.
|
||||
|
||||
A JSON file is used to define the packages needed by a test. This file
|
||||
must be in the same path as the file used to define the tests.
|
||||
Furthermore, the filename must map directly to the test module name with
|
||||
a ``.json`` extension.
|
||||
|
||||
The JSON file must include an object with the test name as keys of an
|
||||
object or an array. This object (or array of objects) uses the following
|
||||
data:
|
||||
|
||||
- "pkg" --- a mandatory string that is the name of the package to be
|
||||
installed.
|
||||
|
||||
- "rm" --- an optional boolean, which defaults to "false", that specifies
|
||||
to remove the package after the test.
|
||||
|
||||
- "extract" --- an optional boolean, which defaults to "false", that
|
||||
specifies if the package must be extracted from the package format.
|
||||
When set to "true", the package is not automatically installed into
|
||||
the DUT.
|
||||
|
||||
Following is an example JSON file that handles test "foo" installing
|
||||
package "bar" and test "foobar" installing packages "foo" and "bar".
|
||||
Once the test is complete, the packages are removed from the DUT::
|
||||
|
||||
{
|
||||
"foo": {
|
||||
"pkg": "bar"
|
||||
},
|
||||
"foobar": [
|
||||
{
|
||||
"pkg": "foo",
|
||||
"rm": true
|
||||
},
|
||||
{
|
||||
"pkg": "bar",
|
||||
"rm": true
|
||||
}
|
||||
]
|
||||
}
|
||||
|
||||
@@ -0,0 +1,75 @@
|
||||
.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
|
||||
|
||||
Creating a Software Bill of Materials
|
||||
*************************************
|
||||
|
||||
Once you are able to build an image for your project, once the licenses for
|
||||
each software component are all identified (see
|
||||
":ref:`dev-manual/licenses:working with licenses`") and once vulnerability
|
||||
fixes are applied (see ":ref:`dev-manual/vulnerabilities:checking
|
||||
for vulnerabilities`"), the OpenEmbedded build system can generate
|
||||
a description of all the components you used, their licenses, their dependencies,
|
||||
their sources, the changes that were applied to them and the known
|
||||
vulnerabilities that were fixed.
|
||||
|
||||
This description is generated in the form of a *Software Bill of Materials*
|
||||
(:term:`SBOM`), using the :term:`SPDX` standard.
|
||||
|
||||
When you release software, this is the most standard way to provide information
|
||||
about the Software Supply Chain of your software image and SDK. The
|
||||
:term:`SBOM` tooling is often used to ensure open source license compliance by
|
||||
providing the license texts used in the product which legal departments and end
|
||||
users can read in standardized format.
|
||||
|
||||
:term:`SBOM` information is also critical to performing vulnerability exposure
|
||||
assessments, as all the components used in the Software Supply Chain are listed.
|
||||
|
||||
The OpenEmbedded build system doesn't generate such information by default.
|
||||
To make this happen, you must inherit the
|
||||
:ref:`ref-classes-create-spdx` class from a configuration file::
|
||||
|
||||
INHERIT += "create-spdx"
|
||||
|
||||
You then get :term:`SPDX` output in JSON format as an
|
||||
``IMAGE-MACHINE.spdx.json`` file in ``tmp/deploy/images/MACHINE/`` inside the
|
||||
:term:`Build Directory`.
|
||||
|
||||
This is a toplevel file accompanied by an ``IMAGE-MACHINE.spdx.index.json``
|
||||
containing an index of JSON :term:`SPDX` files for individual recipes, together
|
||||
with an ``IMAGE-MACHINE.spdx.tar.zst`` compressed archive containing all such
|
||||
files.
|
||||
|
||||
The :ref:`ref-classes-create-spdx` class offers options to include
|
||||
more information in the output :term:`SPDX` data, such as making the generated
|
||||
files more human readable (:term:`SPDX_PRETTY`), adding compressed archives of
|
||||
the files in the generated target packages (:term:`SPDX_ARCHIVE_PACKAGED`),
|
||||
adding a description of the source files used to generate host tools and target
|
||||
packages (:term:`SPDX_INCLUDE_SOURCES`) and adding archives of these source
|
||||
files themselves (:term:`SPDX_ARCHIVE_SOURCES`).
|
||||
|
||||
Though the toplevel :term:`SPDX` output is available in
|
||||
``tmp/deploy/images/MACHINE/`` inside the :term:`Build Directory`, ancillary
|
||||
generated files are available in ``tmp/deploy/spdx/MACHINE`` too, such as:
|
||||
|
||||
- The individual :term:`SPDX` JSON files in the ``IMAGE-MACHINE.spdx.tar.zst``
|
||||
archive.
|
||||
|
||||
- Compressed archives of the files in the generated target packages,
|
||||
in ``packages/packagename.tar.zst`` (when :term:`SPDX_ARCHIVE_PACKAGED`
|
||||
is set).
|
||||
|
||||
- Compressed archives of the source files used to build the host tools
|
||||
and the target packages in ``recipes/recipe-packagename.tar.zst``
|
||||
(when :term:`SPDX_ARCHIVE_SOURCES` is set). Those are needed to fulfill
|
||||
"source code access" license requirements.
|
||||
|
||||
See also the :term:`SPDX_CUSTOM_ANNOTATION_VARS` variable which allows
|
||||
to associate custom notes to a recipe.
|
||||
|
||||
See the `tools page <https://spdx.dev/resources/tools/>`__ on the :term:`SPDX`
|
||||
project website for a list of tools to consume and transform the :term:`SPDX`
|
||||
data generated by the OpenEmbedded build system.
|
||||
|
||||
See also Joshua Watt's
|
||||
`Automated SBoM generation with OpenEmbedded and the Yocto Project <https://youtu.be/Q5UQUM6zxVU>`__
|
||||
presentation at FOSDEM 2023.
|
||||
@@ -0,0 +1,156 @@
|
||||
.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
|
||||
|
||||
Making Images More Secure
|
||||
*************************
|
||||
|
||||
Security is of increasing concern for embedded devices. Consider the
|
||||
issues and problems discussed in just this sampling of work found across
|
||||
the Internet:
|
||||
|
||||
- *"*\ `Security Risks of Embedded
|
||||
Systems <https://www.schneier.com/blog/archives/2014/01/security_risks_9.html>`__\ *"*
|
||||
by Bruce Schneier
|
||||
|
||||
- *"*\ `Internet Census
|
||||
2012 <http://census2012.sourceforge.net/paper.html>`__\ *"* by Carna
|
||||
Botnet
|
||||
|
||||
- *"*\ `Security Issues for Embedded
|
||||
Devices <https://elinux.org/images/6/6f/Security-issues.pdf>`__\ *"*
|
||||
by Jake Edge
|
||||
|
||||
When securing your image is of concern, there are steps, tools, and
|
||||
variables that you can consider to help you reach the security goals you
|
||||
need for your particular device. Not all situations are identical when
|
||||
it comes to making an image secure. Consequently, this section provides
|
||||
some guidance and suggestions for consideration when you want to make
|
||||
your image more secure.
|
||||
|
||||
.. note::
|
||||
|
||||
Because the security requirements and risks are different for every
|
||||
type of device, this section cannot provide a complete reference on
|
||||
securing your custom OS. It is strongly recommended that you also
|
||||
consult other sources of information on embedded Linux system
|
||||
hardening and on security.
|
||||
|
||||
General Considerations
|
||||
======================
|
||||
|
||||
There are general considerations that help you create more secure images.
|
||||
You should consider the following suggestions to make your device
|
||||
more secure:
|
||||
|
||||
- Scan additional code you are adding to the system (e.g. application
|
||||
code) by using static analysis tools. Look for buffer overflows and
|
||||
other potential security problems.
|
||||
|
||||
- Pay particular attention to the security for any web-based
|
||||
administration interface.
|
||||
|
||||
Web interfaces typically need to perform administrative functions and
|
||||
tend to need to run with elevated privileges. Thus, the consequences
|
||||
resulting from the interface's security becoming compromised can be
|
||||
serious. Look for common web vulnerabilities such as
|
||||
cross-site-scripting (XSS), unvalidated inputs, and so forth.
|
||||
|
||||
As with system passwords, the default credentials for accessing a
|
||||
web-based interface should not be the same across all devices. This
|
||||
is particularly true if the interface is enabled by default as it can
|
||||
be assumed that many end-users will not change the credentials.
|
||||
|
||||
- Ensure you can update the software on the device to mitigate
|
||||
vulnerabilities discovered in the future. This consideration
|
||||
especially applies when your device is network-enabled.
|
||||
|
||||
- Regularly scan and apply fixes for CVE security issues affecting
|
||||
all software components in the product, see ":ref:`dev-manual/vulnerabilities:checking for vulnerabilities`".
|
||||
|
||||
- Regularly update your version of Poky and OE-Core from their upstream
|
||||
developers, e.g. to apply updates and security fixes from stable
|
||||
and :term:`LTS` branches.
|
||||
|
||||
- Ensure you remove or disable debugging functionality before producing
|
||||
the final image. For information on how to do this, see the
|
||||
":ref:`dev-manual/securing-images:considerations specific to the openembedded build system`"
|
||||
section.
|
||||
|
||||
- Ensure you have no network services listening that are not needed.
|
||||
|
||||
- Remove any software from the image that is not needed.
|
||||
|
||||
- Enable hardware support for secure boot functionality when your
|
||||
device supports this functionality.
|
||||
|
||||
Security Flags
|
||||
==============
|
||||
|
||||
The Yocto Project has security flags that you can enable that help make
|
||||
your build output more secure. The security flags are in the
|
||||
``meta/conf/distro/include/security_flags.inc`` file in your
|
||||
:term:`Source Directory` (e.g. ``poky``).
|
||||
|
||||
.. note::
|
||||
|
||||
Depending on the recipe, certain security flags are enabled and
|
||||
disabled by default.
|
||||
|
||||
Use the following line in your ``local.conf`` file or in your custom
|
||||
distribution configuration file to enable the security compiler and
|
||||
linker flags for your build::
|
||||
|
||||
require conf/distro/include/security_flags.inc
|
||||
|
||||
Considerations Specific to the OpenEmbedded Build System
|
||||
========================================================
|
||||
|
||||
You can take some steps that are specific to the OpenEmbedded build
|
||||
system to make your images more secure:
|
||||
|
||||
- Ensure "debug-tweaks" is not one of your selected
|
||||
:term:`IMAGE_FEATURES`.
|
||||
When creating a new project, the default is to provide you with an
|
||||
initial ``local.conf`` file that enables this feature using the
|
||||
:term:`EXTRA_IMAGE_FEATURES`
|
||||
variable with the line::
|
||||
|
||||
EXTRA_IMAGE_FEATURES = "debug-tweaks"
|
||||
|
||||
To disable that feature, simply comment out that line in your
|
||||
``local.conf`` file, or make sure :term:`IMAGE_FEATURES` does not contain
|
||||
"debug-tweaks" before producing your final image. Among other things,
|
||||
leaving this in place sets the root password as blank, which makes
|
||||
logging in for debugging or inspection easy during development but
|
||||
also means anyone can easily log in during production.
|
||||
|
||||
- It is possible to set a root password for the image and also to set
|
||||
passwords for any extra users you might add (e.g. administrative or
|
||||
service type users). When you set up passwords for multiple images or
|
||||
users, you should not duplicate passwords.
|
||||
|
||||
To set up passwords, use the :ref:`ref-classes-extrausers` class, which
|
||||
is the preferred method. For an example on how to set up both root and
|
||||
user passwords, see the ":ref:`ref-classes-extrausers`" section.
|
||||
|
||||
.. note::
|
||||
|
||||
When adding extra user accounts or setting a root password, be
|
||||
cautious about setting the same password on every device. If you
|
||||
do this, and the password you have set is exposed, then every
|
||||
device is now potentially compromised. If you need this access but
|
||||
want to ensure security, consider setting a different, random
|
||||
password for each device. Typically, you do this as a separate
|
||||
step after you deploy the image onto the device.
|
||||
|
||||
- Consider enabling a Mandatory Access Control (MAC) framework such as
|
||||
SMACK or SELinux and tuning it appropriately for your device's usage.
|
||||
You can find more information in the
|
||||
:yocto_git:`meta-selinux </meta-selinux/>` layer.
|
||||
|
||||
Tools for Hardening Your Image
|
||||
==============================
|
||||
|
||||
The Yocto Project provides tools for making your image more secure. You
|
||||
can find these tools in the ``meta-security`` layer of the
|
||||
:yocto_git:`Yocto Project Source Repositories <>`.
|
||||
|
||||
@@ -0,0 +1,109 @@
|
||||
.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
|
||||
|
||||
Speeding Up a Build
|
||||
*******************
|
||||
|
||||
Build time can be an issue. By default, the build system uses simple
|
||||
controls to try and maximize build efficiency. In general, the default
|
||||
settings for all the following variables result in the most efficient
|
||||
build times when dealing with single socket systems (i.e. a single CPU).
|
||||
If you have multiple CPUs, you might try increasing the default values
|
||||
to gain more speed. See the descriptions in the glossary for each
|
||||
variable for more information:
|
||||
|
||||
- :term:`BB_NUMBER_THREADS`:
|
||||
The maximum number of threads BitBake simultaneously executes.
|
||||
|
||||
- :term:`BB_NUMBER_PARSE_THREADS`:
|
||||
The number of threads BitBake uses during parsing.
|
||||
|
||||
- :term:`PARALLEL_MAKE`: Extra
|
||||
options passed to the ``make`` command during the
|
||||
:ref:`ref-tasks-compile` task in
|
||||
order to specify parallel compilation on the local build host.
|
||||
|
||||
- :term:`PARALLEL_MAKEINST`:
|
||||
Extra options passed to the ``make`` command during the
|
||||
:ref:`ref-tasks-install` task in
|
||||
order to specify parallel installation on the local build host.
|
||||
|
||||
As mentioned, these variables all scale to the number of processor cores
|
||||
available on the build system. For single socket systems, this
|
||||
auto-scaling ensures that the build system fundamentally takes advantage
|
||||
of potential parallel operations during the build based on the build
|
||||
machine's capabilities.
|
||||
|
||||
Following are additional factors that can affect build speed:
|
||||
|
||||
- File system type: The file system type that the build is being
|
||||
performed on can also influence performance. Using ``ext4`` is
|
||||
recommended as compared to ``ext2`` and ``ext3`` due to ``ext4``
|
||||
improved features such as extents.
|
||||
|
||||
- Disabling the updating of access time using ``noatime``: The
|
||||
``noatime`` mount option prevents the build system from updating file
|
||||
and directory access times.
|
||||
|
||||
- Setting a longer commit: Using the "commit=" mount option increases
|
||||
the interval in seconds between disk cache writes. Changing this
|
||||
interval from the five second default to something longer increases
|
||||
the risk of data loss but decreases the need to write to the disk,
|
||||
thus increasing the build performance.
|
||||
|
||||
- Choosing the packaging backend: Of the available packaging backends,
|
||||
IPK is the fastest. Additionally, selecting a singular packaging
|
||||
backend also helps.
|
||||
|
||||
- Using ``tmpfs`` for :term:`TMPDIR`
|
||||
as a temporary file system: While this can help speed up the build,
|
||||
the benefits are limited due to the compiler using ``-pipe``. The
|
||||
build system goes to some lengths to avoid ``sync()`` calls into the
|
||||
file system on the principle that if there was a significant failure,
|
||||
the :term:`Build Directory` contents could easily be rebuilt.
|
||||
|
||||
- Inheriting the :ref:`ref-classes-rm-work` class:
|
||||
Inheriting this class has shown to speed up builds due to
|
||||
significantly lower amounts of data stored in the data cache as well
|
||||
as on disk. Inheriting this class also makes cleanup of
|
||||
:term:`TMPDIR` faster, at the
|
||||
expense of being easily able to dive into the source code. File
|
||||
system maintainers have recommended that the fastest way to clean up
|
||||
large numbers of files is to reformat partitions rather than delete
|
||||
files due to the linear nature of partitions. This, of course,
|
||||
assumes you structure the disk partitions and file systems in a way
|
||||
that this is practical.
|
||||
|
||||
Aside from the previous list, you should keep some trade offs in mind
|
||||
that can help you speed up the build:
|
||||
|
||||
- Remove items from
|
||||
:term:`DISTRO_FEATURES`
|
||||
that you might not need.
|
||||
|
||||
- Exclude debug symbols and other debug information: If you do not need
|
||||
these symbols and other debug information, disabling the ``*-dbg``
|
||||
package generation can speed up the build. You can disable this
|
||||
generation by setting the
|
||||
:term:`INHIBIT_PACKAGE_DEBUG_SPLIT`
|
||||
variable to "1".
|
||||
|
||||
- Disable static library generation for recipes derived from
|
||||
``autoconf`` or ``libtool``: Following is an example showing how to
|
||||
disable static libraries and still provide an override to handle
|
||||
exceptions::
|
||||
|
||||
STATICLIBCONF = "--disable-static"
|
||||
STATICLIBCONF:sqlite3-native = ""
|
||||
EXTRA_OECONF += "${STATICLIBCONF}"
|
||||
|
||||
.. note::
|
||||
|
||||
- Some recipes need static libraries in order to work correctly
|
||||
(e.g. ``pseudo-native`` needs ``sqlite3-native``). Overrides,
|
||||
as in the previous example, account for these kinds of
|
||||
exceptions.
|
||||
|
||||
- Some packages have packaging code that assumes the presence of
|
||||
the static libraries. If so, you might need to exclude them as
|
||||
well.
|
||||
|
||||
@@ -0,0 +1,858 @@
|
||||
.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
|
||||
|
||||
***********************************
|
||||
Setting Up to Use the Yocto Project
|
||||
***********************************
|
||||
|
||||
This chapter provides guidance on how to prepare to use the Yocto
|
||||
Project. You can learn about creating a team environment to develop
|
||||
using the Yocto Project, how to set up a :ref:`build
|
||||
host <dev-manual/start:preparing the build host>`, how to locate
|
||||
Yocto Project source repositories, and how to create local Git
|
||||
repositories.
|
||||
|
||||
Creating a Team Development Environment
|
||||
=======================================
|
||||
|
||||
It might not be immediately clear how you can use the Yocto Project in a
|
||||
team development environment, or how to scale it for a large team of
|
||||
developers. You can adapt the Yocto Project to many different use cases
|
||||
and scenarios; however, this flexibility could cause difficulties if you
|
||||
are trying to create a working setup that scales effectively.
|
||||
|
||||
To help you understand how to set up this type of environment, this
|
||||
section presents a procedure that gives you information that can help
|
||||
you get the results you want. The procedure is high-level and presents
|
||||
some of the project's most successful experiences, practices, solutions,
|
||||
and available technologies that have proved to work well in the past;
|
||||
however, keep in mind, the procedure here is simply a starting point.
|
||||
You can build off these steps and customize the procedure to fit any
|
||||
particular working environment and set of practices.
|
||||
|
||||
#. *Determine Who is Going to be Developing:* You first need to
|
||||
understand who is going to be doing anything related to the Yocto
|
||||
Project and determine their roles. Making this determination is
|
||||
essential to completing subsequent steps, which are to get your
|
||||
equipment together and set up your development environment's
|
||||
hardware topology.
|
||||
|
||||
Here are possible roles:
|
||||
|
||||
- *Application Developer:* This type of developer does application
|
||||
level work on top of an existing software stack.
|
||||
|
||||
- *Core System Developer:* This type of developer works on the
|
||||
contents of the operating system image itself.
|
||||
|
||||
- *Build Engineer:* This type of developer manages Autobuilders and
|
||||
releases. Depending on the specifics of the environment, not all
|
||||
situations might need a Build Engineer.
|
||||
|
||||
- *Test Engineer:* This type of developer creates and manages
|
||||
automated tests that are used to ensure all application and core
|
||||
system development meets desired quality standards.
|
||||
|
||||
#. *Gather the Hardware:* Based on the size and make-up of the team,
|
||||
get the hardware together. Ideally, any development, build, or test
|
||||
engineer uses a system that runs a supported Linux distribution.
|
||||
These systems, in general, should be high performance (e.g. dual,
|
||||
six-core Xeons with 24 Gbytes of RAM and plenty of disk space). You
|
||||
can help ensure efficiency by having any machines used for testing
|
||||
or that run Autobuilders be as high performance as possible.
|
||||
|
||||
.. note::
|
||||
|
||||
Given sufficient processing power, you might also consider
|
||||
building Yocto Project development containers to be run under
|
||||
Docker, which is described later.
|
||||
|
||||
#. *Understand the Hardware Topology of the Environment:* Once you
|
||||
understand the hardware involved and the make-up of the team, you
|
||||
can understand the hardware topology of the development environment.
|
||||
You can get a visual idea of the machines and their roles across the
|
||||
development environment.
|
||||
|
||||
#. *Use Git as Your Source Control Manager (SCM):* Keeping your
|
||||
:term:`Metadata` (i.e. recipes,
|
||||
configuration files, classes, and so forth) and any software you are
|
||||
developing under the control of an SCM system that is compatible
|
||||
with the OpenEmbedded build system is advisable. Of all of the SCMs
|
||||
supported by BitBake, the Yocto Project team strongly recommends using
|
||||
:ref:`overview-manual/development-environment:git`.
|
||||
Git is a distributed system
|
||||
that is easy to back up, allows you to work remotely, and then
|
||||
connects back to the infrastructure.
|
||||
|
||||
.. note::
|
||||
|
||||
For information about BitBake, see the
|
||||
:doc:`bitbake:index`.
|
||||
|
||||
It is relatively easy to set up Git services and create
|
||||
infrastructure like :yocto_git:`/`, which is based on
|
||||
server software called ``gitolite`` with ``cgit`` being used to
|
||||
generate the web interface that lets you view the repositories. The
|
||||
``gitolite`` software identifies users using SSH keys and allows
|
||||
branch-based access controls to repositories that you can control as
|
||||
little or as much as necessary.
|
||||
|
||||
.. note::
|
||||
|
||||
The setup of these services is beyond the scope of this manual.
|
||||
However, here are sites describing how to perform setup:
|
||||
|
||||
- `Gitolite <https://gitolite.com>`__: Information for
|
||||
``gitolite``.
|
||||
|
||||
- `Interfaces, frontends, and
|
||||
tools <https://git.wiki.kernel.org/index.php/Interfaces,_frontends,_and_tools>`__:
|
||||
Documentation on how to create interfaces and frontends for
|
||||
Git.
|
||||
|
||||
#. *Set up the Application Development Machines:* As mentioned earlier,
|
||||
application developers are creating applications on top of existing
|
||||
software stacks. Following are some best practices for setting up
|
||||
machines used for application development:
|
||||
|
||||
- Use a pre-built toolchain that contains the software stack
|
||||
itself. Then, develop the application code on top of the stack.
|
||||
This method works well for small numbers of relatively isolated
|
||||
applications.
|
||||
|
||||
- Keep your cross-development toolchains updated. You can do this
|
||||
through provisioning either as new toolchain downloads or as
|
||||
updates through a package update mechanism using ``opkg`` to
|
||||
provide updates to an existing toolchain. The exact mechanics of
|
||||
how and when to do this depend on local policy.
|
||||
|
||||
- Use multiple toolchains installed locally into different
|
||||
locations to allow development across versions.
|
||||
|
||||
#. *Set up the Core Development Machines:* As mentioned earlier, core
|
||||
developers work on the contents of the operating system itself.
|
||||
Following are some best practices for setting up machines used for
|
||||
developing images:
|
||||
|
||||
- Have the :term:`OpenEmbedded Build System` available on
|
||||
the developer workstations so developers can run their own builds
|
||||
and directly rebuild the software stack.
|
||||
|
||||
- Keep the core system unchanged as much as possible and do your
|
||||
work in layers on top of the core system. Doing so gives you a
|
||||
greater level of portability when upgrading to new versions of
|
||||
the core system or Board Support Packages (BSPs).
|
||||
|
||||
- Share layers amongst the developers of a particular project and
|
||||
contain the policy configuration that defines the project.
|
||||
|
||||
#. *Set up an Autobuilder:* Autobuilders are often the core of the
|
||||
development environment. It is here that changes from individual
|
||||
developers are brought together and centrally tested. Based on this
|
||||
automated build and test environment, subsequent decisions about
|
||||
releases can be made. Autobuilders also allow for "continuous
|
||||
integration" style testing of software components and regression
|
||||
identification and tracking.
|
||||
|
||||
See ":yocto_ab:`Yocto Project Autobuilder <>`" for more
|
||||
information and links to buildbot. The Yocto Project team has found
|
||||
this implementation works well in this role. A public example of
|
||||
this is the Yocto Project Autobuilders, which the Yocto Project team
|
||||
uses to test the overall health of the project.
|
||||
|
||||
The features of this system are:
|
||||
|
||||
- Highlights when commits break the build.
|
||||
|
||||
- Populates an :ref:`sstate
|
||||
cache <overview-manual/concepts:shared state cache>` from which
|
||||
developers can pull rather than requiring local builds.
|
||||
|
||||
- Allows commit hook triggers, which trigger builds when commits
|
||||
are made.
|
||||
|
||||
- Allows triggering of automated image booting and testing under
|
||||
the QuickEMUlator (QEMU).
|
||||
|
||||
- Supports incremental build testing and from-scratch builds.
|
||||
|
||||
- Shares output that allows developer testing and historical
|
||||
regression investigation.
|
||||
|
||||
- Creates output that can be used for releases.
|
||||
|
||||
- Allows scheduling of builds so that resources can be used
|
||||
efficiently.
|
||||
|
||||
#. *Set up Test Machines:* Use a small number of shared, high
|
||||
performance systems for testing purposes. Developers can use these
|
||||
systems for wider, more extensive testing while they continue to
|
||||
develop locally using their primary development system.
|
||||
|
||||
#. *Document Policies and Change Flow:* The Yocto Project uses a
|
||||
hierarchical structure and a pull model. There are scripts to create and
|
||||
send pull requests (i.e. ``create-pull-request`` and
|
||||
``send-pull-request``). This model is in line with other open source
|
||||
projects where maintainers are responsible for specific areas of the
|
||||
project and a single maintainer handles the final "top-of-tree"
|
||||
merges.
|
||||
|
||||
.. note::
|
||||
|
||||
You can also use a more collective push model. The ``gitolite``
|
||||
software supports both the push and pull models quite easily.
|
||||
|
||||
As with any development environment, it is important to document the
|
||||
policy used as well as any main project guidelines so they are
|
||||
understood by everyone. It is also a good idea to have
|
||||
well-structured commit messages, which are usually a part of a
|
||||
project's guidelines. Good commit messages are essential when
|
||||
looking back in time and trying to understand why changes were made.
|
||||
|
||||
If you discover that changes are needed to the core layer of the
|
||||
project, it is worth sharing those with the community as soon as
|
||||
possible. Chances are if you have discovered the need for changes,
|
||||
someone else in the community needs them also.
|
||||
|
||||
#. *Development Environment Summary:* Aside from the previous steps,
|
||||
here are best practices within the Yocto Project development
|
||||
environment:
|
||||
|
||||
- Use :ref:`overview-manual/development-environment:git` as the source control
|
||||
system.
|
||||
|
||||
- Maintain your Metadata in layers that make sense for your
|
||||
situation. See the ":ref:`overview-manual/yp-intro:the yocto project layer model`"
|
||||
section in the Yocto Project Overview and Concepts Manual and the
|
||||
":ref:`dev-manual/layers:understanding and creating layers`"
|
||||
section for more information on layers.
|
||||
|
||||
- Separate the project's Metadata and code by using separate Git
|
||||
repositories. See the ":ref:`overview-manual/development-environment:yocto project source repositories`"
|
||||
section in the Yocto Project Overview and Concepts Manual for
|
||||
information on these repositories. See the
|
||||
":ref:`dev-manual/start:locating yocto project source files`"
|
||||
section for information on how to set up local Git repositories
|
||||
for related upstream Yocto Project Git repositories.
|
||||
|
||||
- Set up the directory for the shared state cache
|
||||
(:term:`SSTATE_DIR`) where
|
||||
it makes sense. For example, set up the sstate cache on a system
|
||||
used by developers in the same organization and share the same
|
||||
source directories on their machines.
|
||||
|
||||
- Set up an Autobuilder and have it populate the sstate cache and
|
||||
source directories.
|
||||
|
||||
- The Yocto Project community encourages you to send patches to the
|
||||
project to fix bugs or add features. If you do submit patches,
|
||||
follow the project commit guidelines for writing good commit
|
||||
messages. See the
|
||||
":ref:`dev-manual/changes:submitting a change to the yocto project`"
|
||||
section.
|
||||
|
||||
- Send changes to the core sooner than later as others are likely
|
||||
to run into the same issues. For some guidance on mailing lists
|
||||
to use, see the list in the
|
||||
":ref:`dev-manual/changes:submitting a change to the yocto project`"
|
||||
section. For a description
|
||||
of the available mailing lists, see the ":ref:`resources-mailinglist`" section in
|
||||
the Yocto Project Reference Manual.
|
||||
|
||||
Preparing the Build Host
|
||||
========================
|
||||
|
||||
This section provides procedures to set up a system to be used as your
|
||||
:term:`Build Host` for
|
||||
development using the Yocto Project. Your build host can be a native
|
||||
Linux machine (recommended), it can be a machine (Linux, Mac, or
|
||||
Windows) that uses `CROPS <https://github.com/crops/poky-container>`__,
|
||||
which leverages `Docker Containers <https://www.docker.com/>`__ or it
|
||||
can be a Windows machine capable of running version 2 of Windows Subsystem
|
||||
For Linux (WSL 2).
|
||||
|
||||
.. note::
|
||||
|
||||
The Yocto Project is not compatible with version 1 of
|
||||
:wikipedia:`Windows Subsystem for Linux <Windows_Subsystem_for_Linux>`.
|
||||
It is compatible but neither officially supported nor validated with
|
||||
WSL 2. If you still decide to use WSL please upgrade to
|
||||
`WSL 2 <https://learn.microsoft.com/en-us/windows/wsl/install>`__.
|
||||
|
||||
Once your build host is set up to use the Yocto Project, further steps
|
||||
are necessary depending on what you want to accomplish. See the
|
||||
following references for information on how to prepare for Board Support
|
||||
Package (BSP) development and kernel development:
|
||||
|
||||
- *BSP Development:* See the ":ref:`bsp-guide/bsp:preparing your build host to work with bsp layers`"
|
||||
section in the Yocto Project Board Support Package (BSP) Developer's
|
||||
Guide.
|
||||
|
||||
- *Kernel Development:* See the ":ref:`kernel-dev/common:preparing the build host to work on the kernel`"
|
||||
section in the Yocto Project Linux Kernel Development Manual.
|
||||
|
||||
Setting Up a Native Linux Host
|
||||
------------------------------
|
||||
|
||||
Follow these steps to prepare a native Linux machine as your Yocto
|
||||
Project Build Host:
|
||||
|
||||
#. *Use a Supported Linux Distribution:* You should have a reasonably
|
||||
current Linux-based host system. You will have the best results with
|
||||
a recent release of Fedora, openSUSE, Debian, Ubuntu, RHEL or CentOS
|
||||
as these releases are frequently tested against the Yocto Project and
|
||||
officially supported. For a list of the distributions under
|
||||
validation and their status, see the ":ref:`Supported Linux
|
||||
Distributions <system-requirements-supported-distros>`"
|
||||
section in the Yocto Project Reference Manual and the wiki page at
|
||||
:yocto_wiki:`Distribution Support </Distribution_Support>`.
|
||||
|
||||
#. *Have Enough Free Memory:* Your system should have at least 50 Gbytes
|
||||
of free disk space for building images.
|
||||
|
||||
#. *Meet Minimal Version Requirements:* The OpenEmbedded build system
|
||||
should be able to run on any modern distribution that has the
|
||||
following versions for Git, tar, Python, gcc and make.
|
||||
|
||||
- Git &MIN_GIT_VERSION; or greater
|
||||
|
||||
- tar &MIN_TAR_VERSION; or greater
|
||||
|
||||
- Python &MIN_PYTHON_VERSION; or greater.
|
||||
|
||||
- gcc &MIN_GCC_VERSION; or greater.
|
||||
|
||||
- GNU make &MIN_MAKE_VERSION; or greater
|
||||
|
||||
If your build host does not meet any of these listed version
|
||||
requirements, you can take steps to prepare the system so that you
|
||||
can still use the Yocto Project. See the
|
||||
":ref:`ref-manual/system-requirements:required git, tar, python, make and gcc versions`"
|
||||
section in the Yocto Project Reference Manual for information.
|
||||
|
||||
#. *Install Development Host Packages:* Required development host
|
||||
packages vary depending on your build host and what you want to do
|
||||
with the Yocto Project. Collectively, the number of required packages
|
||||
is large if you want to be able to cover all cases.
|
||||
|
||||
For lists of required packages for all scenarios, see the
|
||||
":ref:`ref-manual/system-requirements:required packages for the build host`"
|
||||
section in the Yocto Project Reference Manual.
|
||||
|
||||
Once you have completed the previous steps, you are ready to continue
|
||||
using a given development path on your native Linux machine. If you are
|
||||
going to use BitBake, see the
|
||||
":ref:`dev-manual/start:cloning the \`\`poky\`\` repository`"
|
||||
section. If you are going
|
||||
to use the Extensible SDK, see the ":doc:`/sdk-manual/extensible`" Chapter in the Yocto
|
||||
Project Application Development and the Extensible Software Development
|
||||
Kit (eSDK) manual. If you want to work on the kernel, see the :doc:`/kernel-dev/index`. If you are going to use
|
||||
Toaster, see the ":doc:`/toaster-manual/setup-and-use`"
|
||||
section in the Toaster User Manual.
|
||||
|
||||
Setting Up to Use CROss PlatformS (CROPS)
|
||||
-----------------------------------------
|
||||
|
||||
With `CROPS <https://github.com/crops/poky-container>`__, which
|
||||
leverages `Docker Containers <https://www.docker.com/>`__, you can
|
||||
create a Yocto Project development environment that is operating system
|
||||
agnostic. You can set up a container in which you can develop using the
|
||||
Yocto Project on a Windows, Mac, or Linux machine.
|
||||
|
||||
Follow these general steps to prepare a Windows, Mac, or Linux machine
|
||||
as your Yocto Project build host:
|
||||
|
||||
#. *Determine What Your Build Host Needs:*
|
||||
`Docker <https://www.docker.com/what-docker>`__ is a software
|
||||
container platform that you need to install on the build host.
|
||||
Depending on your build host, you might have to install different
|
||||
software to support Docker containers. Go to the Docker installation
|
||||
page and read about the platform requirements in "`Supported
|
||||
Platforms <https://docs.docker.com/engine/install/#supported-platforms>`__"
|
||||
your build host needs to run containers.
|
||||
|
||||
#. *Choose What To Install:* Depending on whether or not your build host
|
||||
meets system requirements, you need to install "Docker CE Stable" or
|
||||
the "Docker Toolbox". Most situations call for Docker CE. However, if
|
||||
you have a build host that does not meet requirements (e.g.
|
||||
Pre-Windows 10 or Windows 10 "Home" version), you must install Docker
|
||||
Toolbox instead.
|
||||
|
||||
#. *Go to the Install Site for Your Platform:* Click the link for the
|
||||
Docker edition associated with your build host's native software. For
|
||||
example, if your build host is running Microsoft Windows Version 10
|
||||
and you want the Docker CE Stable edition, click that link under
|
||||
"Supported Platforms".
|
||||
|
||||
#. *Install the Software:* Once you have understood all the
|
||||
pre-requisites, you can download and install the appropriate
|
||||
software. Follow the instructions for your specific machine and the
|
||||
type of the software you need to install:
|
||||
|
||||
- Install `Docker Desktop on
|
||||
Windows <https://docs.docker.com/docker-for-windows/install/#install-docker-desktop-on-windows>`__
|
||||
for Windows build hosts that meet requirements.
|
||||
|
||||
- Install `Docker Desktop on
|
||||
MacOs <https://docs.docker.com/docker-for-mac/install/#install-and-run-docker-desktop-on-mac>`__
|
||||
for Mac build hosts that meet requirements.
|
||||
|
||||
- Install `Docker Engine on
|
||||
CentOS <https://docs.docker.com/engine/install/centos/>`__
|
||||
for Linux build hosts running the CentOS distribution.
|
||||
|
||||
- Install `Docker Engine on
|
||||
Debian <https://docs.docker.com/engine/install/debian/>`__
|
||||
for Linux build hosts running the Debian distribution.
|
||||
|
||||
- Install `Docker Engine for
|
||||
Fedora <https://docs.docker.com/engine/install/fedora/>`__
|
||||
for Linux build hosts running the Fedora distribution.
|
||||
|
||||
- Install `Docker Engine for
|
||||
Ubuntu <https://docs.docker.com/engine/install/ubuntu/>`__
|
||||
for Linux build hosts running the Ubuntu distribution.
|
||||
|
||||
#. *Optionally Orient Yourself With Docker:* If you are unfamiliar with
|
||||
Docker and the container concept, you can learn more here -
|
||||
https://docs.docker.com/get-started/.
|
||||
|
||||
#. *Launch Docker or Docker Toolbox:* You should be able to launch
|
||||
Docker or the Docker Toolbox and have a terminal shell on your
|
||||
development host.
|
||||
|
||||
#. *Set Up the Containers to Use the Yocto Project:* Go to
|
||||
https://github.com/crops/docker-win-mac-docs/wiki and follow
|
||||
the directions for your particular build host (i.e. Linux, Mac, or
|
||||
Windows).
|
||||
|
||||
Once you complete the setup instructions for your machine, you have
|
||||
the Poky, Extensible SDK, and Toaster containers available. You can
|
||||
click those links from the page and learn more about using each of
|
||||
those containers.
|
||||
|
||||
Once you have a container set up, everything is in place to develop just
|
||||
as if you were running on a native Linux machine. If you are going to
|
||||
use the Poky container, see the
|
||||
":ref:`dev-manual/start:cloning the \`\`poky\`\` repository`"
|
||||
section. If you are going to use the Extensible SDK container, see the
|
||||
":doc:`/sdk-manual/extensible`" Chapter in the Yocto
|
||||
Project Application Development and the Extensible Software Development
|
||||
Kit (eSDK) manual. If you are going to use the Toaster container, see
|
||||
the ":doc:`/toaster-manual/setup-and-use`"
|
||||
section in the Toaster User Manual.
|
||||
|
||||
Setting Up to Use Windows Subsystem For Linux (WSL 2)
|
||||
-----------------------------------------------------
|
||||
|
||||
With `Windows Subsystem for Linux (WSL 2)
|
||||
<https://learn.microsoft.com/en-us/windows/wsl/>`__,
|
||||
you can create a Yocto Project development environment that allows you
|
||||
to build on Windows. You can set up a Linux distribution inside Windows
|
||||
in which you can develop using the Yocto Project.
|
||||
|
||||
Follow these general steps to prepare a Windows machine using WSL 2 as
|
||||
your Yocto Project build host:
|
||||
|
||||
#. *Make sure your Windows machine is capable of running WSL 2:*
|
||||
|
||||
While all Windows 11 and Windows Server 2022 builds support WSL 2,
|
||||
the first versions of Windows 10 and Windows Server 2019 didn't.
|
||||
Check the minimum build numbers for `Windows 10
|
||||
<https://learn.microsoft.com/en-us/windows/wsl/install-manual#step-2---check-requirements-for-running-wsl-2>`__
|
||||
and for `Windows Server 2019
|
||||
<https://learn.microsoft.com/en-us/windows/wsl/install-on-server>`__.
|
||||
|
||||
To check which build version you are running, you may open a command
|
||||
prompt on Windows and execute the command "ver"::
|
||||
|
||||
C:\Users\myuser> ver
|
||||
|
||||
Microsoft Windows [Version 10.0.19041.153]
|
||||
|
||||
#. *Install the Linux distribution of your choice inside WSL 2:*
|
||||
Once you know your version of Windows supports WSL 2, you can
|
||||
install the distribution of your choice from the Microsoft Store.
|
||||
Open the Microsoft Store and search for Linux. While there are
|
||||
several Linux distributions available, the assumption is that your
|
||||
pick will be one of the distributions supported by the Yocto Project
|
||||
as stated on the instructions for using a native Linux host. After
|
||||
making your selection, simply click "Get" to download and install the
|
||||
distribution.
|
||||
|
||||
#. *Check which Linux distribution WSL 2 is using:* Open a Windows
|
||||
PowerShell and run::
|
||||
|
||||
C:\WINDOWS\system32> wsl -l -v
|
||||
NAME STATE VERSION
|
||||
*Ubuntu Running 2
|
||||
|
||||
Note that WSL 2 supports running as many different Linux distributions
|
||||
as you want to install.
|
||||
|
||||
#. *Optionally Get Familiar with WSL:* You can learn more on
|
||||
https://docs.microsoft.com/en-us/windows/wsl/wsl2-about.
|
||||
|
||||
#. *Launch your WSL Distibution:* From the Windows start menu simply
|
||||
launch your WSL distribution just like any other application.
|
||||
|
||||
#. *Optimize your WSL 2 storage often:* Due to the way storage is
|
||||
handled on WSL 2, the storage space used by the underlying Linux
|
||||
distribution is not reflected immediately, and since BitBake heavily
|
||||
uses storage, after several builds, you may be unaware you are
|
||||
running out of space. As WSL 2 uses a VHDX file for storage, this issue
|
||||
can be easily avoided by regularly optimizing this file in a manual way:
|
||||
|
||||
1. *Find the location of your VHDX file:*
|
||||
|
||||
First you need to find the distro app package directory, to achieve this
|
||||
open a Windows Powershell as Administrator and run::
|
||||
|
||||
C:\WINDOWS\system32> Get-AppxPackage -Name "*Ubuntu*" | Select PackageFamilyName
|
||||
PackageFamilyName
|
||||
-----------------
|
||||
CanonicalGroupLimited.UbuntuonWindows_79abcdefgh
|
||||
|
||||
|
||||
You should now
|
||||
replace the PackageFamilyName and your user on the following path
|
||||
to find your VHDX file::
|
||||
|
||||
ls C:\Users\myuser\AppData\Local\Packages\CanonicalGroupLimited.UbuntuonWindows_79abcdefgh\LocalState\
|
||||
Mode LastWriteTime Length Name
|
||||
-a---- 3/14/2020 9:52 PM 57418973184 ext4.vhdx
|
||||
|
||||
Your VHDX file path is:
|
||||
``C:\Users\myuser\AppData\Local\Packages\CanonicalGroupLimited.UbuntuonWindows_79abcdefgh\LocalState\ext4.vhdx``
|
||||
|
||||
2a. *Optimize your VHDX file using Windows Powershell:*
|
||||
|
||||
To use the ``optimize-vhd`` cmdlet below, first install the Hyper-V
|
||||
option on Windows. Then, open a Windows Powershell as Administrator to
|
||||
optimize your VHDX file, shutting down WSL first::
|
||||
|
||||
C:\WINDOWS\system32> wsl --shutdown
|
||||
C:\WINDOWS\system32> optimize-vhd -Path C:\Users\myuser\AppData\Local\Packages\CanonicalGroupLimited.UbuntuonWindows_79abcdefgh\LocalState\ext4.vhdx -Mode full
|
||||
|
||||
A progress bar should be shown while optimizing the
|
||||
VHDX file, and storage should now be reflected correctly on the
|
||||
Windows Explorer.
|
||||
|
||||
2b. *Optimize your VHDX file using DiskPart:*
|
||||
|
||||
The ``optimize-vhd`` cmdlet noted in step 2a above is provided by
|
||||
Hyper-V. Not all SKUs of Windows can install Hyper-V. As an alternative,
|
||||
use the DiskPart tool. To start, open a Windows command prompt as
|
||||
Administrator to optimize your VHDX file, shutting down WSL first::
|
||||
|
||||
C:\WINDOWS\system32> wsl --shutdown
|
||||
C:\WINDOWS\system32> diskpart
|
||||
|
||||
DISKPART> select vdisk file="<path_to_VHDX_file>"
|
||||
DISKPART> attach vdisk readonly
|
||||
DISKPART> compact vdisk
|
||||
DISKPART> exit
|
||||
|
||||
.. note::
|
||||
|
||||
The current implementation of WSL 2 does not have out-of-the-box
|
||||
access to external devices such as those connected through a USB
|
||||
port, but it automatically mounts your ``C:`` drive on ``/mnt/c/``
|
||||
(and others), which you can use to share deploy artifacts to be later
|
||||
flashed on hardware through Windows, but your :term:`Build Directory`
|
||||
should not reside inside this mountpoint.
|
||||
|
||||
Once you have WSL 2 set up, everything is in place to develop just as if
|
||||
you were running on a native Linux machine. If you are going to use the
|
||||
Extensible SDK container, see the ":doc:`/sdk-manual/extensible`" Chapter in the Yocto
|
||||
Project Application Development and the Extensible Software Development
|
||||
Kit (eSDK) manual. If you are going to use the Toaster container, see
|
||||
the ":doc:`/toaster-manual/setup-and-use`"
|
||||
section in the Toaster User Manual.
|
||||
|
||||
Locating Yocto Project Source Files
|
||||
===================================
|
||||
|
||||
This section shows you how to locate, fetch and configure the source
|
||||
files you'll need to work with the Yocto Project.
|
||||
|
||||
.. note::
|
||||
|
||||
- For concepts and introductory information about Git as it is used
|
||||
in the Yocto Project, see the ":ref:`overview-manual/development-environment:git`"
|
||||
section in the Yocto Project Overview and Concepts Manual.
|
||||
|
||||
- For concepts on Yocto Project source repositories, see the
|
||||
":ref:`overview-manual/development-environment:yocto project source repositories`"
|
||||
section in the Yocto Project Overview and Concepts Manual."
|
||||
|
||||
Accessing Source Repositories
|
||||
-----------------------------
|
||||
|
||||
Working from a copy of the upstream :ref:`dev-manual/start:accessing source repositories` is the
|
||||
preferred method for obtaining and using a Yocto Project release. You
|
||||
can view the Yocto Project Source Repositories at
|
||||
:yocto_git:`/`. In particular, you can find the ``poky``
|
||||
repository at :yocto_git:`/poky`.
|
||||
|
||||
Use the following procedure to locate the latest upstream copy of the
|
||||
``poky`` Git repository:
|
||||
|
||||
#. *Access Repositories:* Open a browser and go to
|
||||
:yocto_git:`/` to access the GUI-based interface into the
|
||||
Yocto Project source repositories.
|
||||
|
||||
#. *Select the Repository:* Click on the repository in which you are
|
||||
interested (e.g. ``poky``).
|
||||
|
||||
#. *Find the URL Used to Clone the Repository:* At the bottom of the
|
||||
page, note the URL used to clone that repository
|
||||
(e.g. :yocto_git:`/poky`).
|
||||
|
||||
.. note::
|
||||
|
||||
For information on cloning a repository, see the
|
||||
":ref:`dev-manual/start:cloning the \`\`poky\`\` repository`" section.
|
||||
|
||||
Accessing Source Archives
|
||||
-------------------------
|
||||
|
||||
The Yocto Project also provides source archives of its releases, which
|
||||
are available on :yocto_dl:`/releases/yocto/`. Then, choose the subdirectory
|
||||
containing the release you wish to use, for example
|
||||
:yocto_dl:`yocto-&DISTRO; </releases/yocto/yocto-&DISTRO;/>`.
|
||||
|
||||
You will find there source archives of individual components (if you wish
|
||||
to use them individually), and of the corresponding Poky release bundling
|
||||
a selection of these components.
|
||||
|
||||
.. note::
|
||||
|
||||
The recommended method for accessing Yocto Project components is to
|
||||
use Git to clone the upstream repository and work from within that
|
||||
locally cloned repository.
|
||||
|
||||
Using the Downloads Page
|
||||
------------------------
|
||||
|
||||
The :yocto_home:`Yocto Project Website <>` uses a "DOWNLOADS" page
|
||||
from which you can locate and download tarballs of any Yocto Project
|
||||
release. Rather than Git repositories, these files represent snapshot
|
||||
tarballs similar to the tarballs located in the Index of Releases
|
||||
described in the ":ref:`dev-manual/start:accessing source archives`" section.
|
||||
|
||||
#. *Go to the Yocto Project Website:* Open The
|
||||
:yocto_home:`Yocto Project Website <>` in your browser.
|
||||
|
||||
#. *Get to the Downloads Area:* Select the "DOWNLOADS" item from the
|
||||
pull-down "SOFTWARE" tab menu near the top of the page.
|
||||
|
||||
#. *Select a Yocto Project Release:* Use the menu next to "RELEASE" to
|
||||
display and choose a recent or past supported Yocto Project release
|
||||
(e.g. &DISTRO_NAME_NO_CAP;, &DISTRO_NAME_NO_CAP_MINUS_ONE;, and so forth).
|
||||
|
||||
.. note::
|
||||
|
||||
For a "map" of Yocto Project releases to version numbers, see the
|
||||
:yocto_wiki:`Releases </Releases>` wiki page.
|
||||
|
||||
You can use the "RELEASE ARCHIVE" link to reveal a menu of all Yocto
|
||||
Project releases.
|
||||
|
||||
#. *Download Tools or Board Support Packages (BSPs):* From the
|
||||
"DOWNLOADS" page, you can download tools or BSPs as well. Just scroll
|
||||
down the page and look for what you need.
|
||||
|
||||
Cloning and Checking Out Branches
|
||||
=================================
|
||||
|
||||
To use the Yocto Project for development, you need a release locally
|
||||
installed on your development system. This locally installed set of
|
||||
files is referred to as the :term:`Source Directory`
|
||||
in the Yocto Project documentation.
|
||||
|
||||
The preferred method of creating your Source Directory is by using
|
||||
:ref:`overview-manual/development-environment:git` to clone a local copy of the upstream
|
||||
``poky`` repository. Working from a cloned copy of the upstream
|
||||
repository allows you to contribute back into the Yocto Project or to
|
||||
simply work with the latest software on a development branch. Because
|
||||
Git maintains and creates an upstream repository with a complete history
|
||||
of changes and you are working with a local clone of that repository,
|
||||
you have access to all the Yocto Project development branches and tag
|
||||
names used in the upstream repository.
|
||||
|
||||
Cloning the ``poky`` Repository
|
||||
-------------------------------
|
||||
|
||||
Follow these steps to create a local version of the upstream
|
||||
:term:`Poky` Git repository.
|
||||
|
||||
#. *Set Your Directory:* Change your working directory to where you want
|
||||
to create your local copy of ``poky``.
|
||||
|
||||
#. *Clone the Repository:* The following example command clones the
|
||||
``poky`` repository and uses the default name "poky" for your local
|
||||
repository::
|
||||
|
||||
$ git clone git://git.yoctoproject.org/poky
|
||||
Cloning into 'poky'...
|
||||
remote: Counting objects: 432160, done.
|
||||
remote: Compressing objects: 100% (102056/102056), done.
|
||||
remote: Total 432160 (delta 323116), reused 432037 (delta 323000)
|
||||
Receiving objects: 100% (432160/432160), 153.81 MiB | 8.54 MiB/s, done.
|
||||
Resolving deltas: 100% (323116/323116), done.
|
||||
Checking connectivity... done.
|
||||
|
||||
Unless you
|
||||
specify a specific development branch or tag name, Git clones the
|
||||
"master" branch, which results in a snapshot of the latest
|
||||
development changes for "master". For information on how to check out
|
||||
a specific development branch or on how to check out a local branch
|
||||
based on a tag name, see the
|
||||
":ref:`dev-manual/start:checking out by branch in poky`" and
|
||||
":ref:`dev-manual/start:checking out by tag in poky`" sections, respectively.
|
||||
|
||||
Once the local repository is created, you can change to that
|
||||
directory and check its status. The ``master`` branch is checked out
|
||||
by default::
|
||||
|
||||
$ cd poky
|
||||
$ git status
|
||||
On branch master
|
||||
Your branch is up-to-date with 'origin/master'.
|
||||
nothing to commit, working directory clean
|
||||
$ git branch
|
||||
* master
|
||||
|
||||
Your local repository of poky is identical to the
|
||||
upstream poky repository at the time from which it was cloned. As you
|
||||
work with the local branch, you can periodically use the
|
||||
``git pull --rebase`` command to be sure you are up-to-date
|
||||
with the upstream branch.
|
||||
|
||||
Checking Out by Branch in Poky
|
||||
------------------------------
|
||||
|
||||
When you clone the upstream poky repository, you have access to all its
|
||||
development branches. Each development branch in a repository is unique
|
||||
as it forks off the "master" branch. To see and use the files of a
|
||||
particular development branch locally, you need to know the branch name
|
||||
and then specifically check out that development branch.
|
||||
|
||||
.. note::
|
||||
|
||||
Checking out an active development branch by branch name gives you a
|
||||
snapshot of that particular branch at the time you check it out.
|
||||
Further development on top of the branch that occurs after check it
|
||||
out can occur.
|
||||
|
||||
#. *Switch to the Poky Directory:* If you have a local poky Git
|
||||
repository, switch to that directory. If you do not have the local
|
||||
copy of poky, see the
|
||||
":ref:`dev-manual/start:cloning the \`\`poky\`\` repository`"
|
||||
section.
|
||||
|
||||
#. *Determine Existing Branch Names:*
|
||||
::
|
||||
|
||||
$ git branch -a
|
||||
* master
|
||||
remotes/origin/1.1_M1
|
||||
remotes/origin/1.1_M2
|
||||
remotes/origin/1.1_M3
|
||||
remotes/origin/1.1_M4
|
||||
remotes/origin/1.2_M1
|
||||
remotes/origin/1.2_M2
|
||||
remotes/origin/1.2_M3
|
||||
. . .
|
||||
remotes/origin/thud
|
||||
remotes/origin/thud-next
|
||||
remotes/origin/warrior
|
||||
remotes/origin/warrior-next
|
||||
remotes/origin/zeus
|
||||
remotes/origin/zeus-next
|
||||
... and so on ...
|
||||
|
||||
#. *Check out the Branch:* Check out the development branch in which you
|
||||
want to work. For example, to access the files for the Yocto Project
|
||||
&DISTRO; Release (&DISTRO_NAME;), use the following command::
|
||||
|
||||
$ git checkout -b &DISTRO_NAME_NO_CAP; origin/&DISTRO_NAME_NO_CAP;
|
||||
Branch &DISTRO_NAME_NO_CAP; set up to track remote branch &DISTRO_NAME_NO_CAP; from origin.
|
||||
Switched to a new branch '&DISTRO_NAME_NO_CAP;'
|
||||
|
||||
The previous command checks out the "&DISTRO_NAME_NO_CAP;" development
|
||||
branch and reports that the branch is tracking the upstream
|
||||
"origin/&DISTRO_NAME_NO_CAP;" branch.
|
||||
|
||||
The following command displays the branches that are now part of your
|
||||
local poky repository. The asterisk character indicates the branch
|
||||
that is currently checked out for work::
|
||||
|
||||
$ git branch
|
||||
master
|
||||
* &DISTRO_NAME_NO_CAP;
|
||||
|
||||
Checking Out by Tag in Poky
|
||||
---------------------------
|
||||
|
||||
Similar to branches, the upstream repository uses tags to mark specific
|
||||
commits associated with significant points in a development branch (i.e.
|
||||
a release point or stage of a release). You might want to set up a local
|
||||
branch based on one of those points in the repository. The process is
|
||||
similar to checking out by branch name except you use tag names.
|
||||
|
||||
.. note::
|
||||
|
||||
Checking out a branch based on a tag gives you a stable set of files
|
||||
not affected by development on the branch above the tag.
|
||||
|
||||
#. *Switch to the Poky Directory:* If you have a local poky Git
|
||||
repository, switch to that directory. If you do not have the local
|
||||
copy of poky, see the
|
||||
":ref:`dev-manual/start:cloning the \`\`poky\`\` repository`"
|
||||
section.
|
||||
|
||||
#. *Fetch the Tag Names:* To checkout the branch based on a tag name,
|
||||
you need to fetch the upstream tags into your local repository::
|
||||
|
||||
$ git fetch --tags
|
||||
$
|
||||
|
||||
#. *List the Tag Names:* You can list the tag names now::
|
||||
|
||||
$ git tag
|
||||
1.1_M1.final
|
||||
1.1_M1.rc1
|
||||
1.1_M1.rc2
|
||||
1.1_M2.final
|
||||
1.1_M2.rc1
|
||||
.
|
||||
.
|
||||
.
|
||||
yocto-2.5
|
||||
yocto-2.5.1
|
||||
yocto-2.5.2
|
||||
yocto-2.5.3
|
||||
yocto-2.6
|
||||
yocto-2.6.1
|
||||
yocto-2.6.2
|
||||
yocto-2.7
|
||||
yocto_1.5_M5.rc8
|
||||
|
||||
|
||||
#. *Check out the Branch:*
|
||||
::
|
||||
|
||||
$ git checkout tags/yocto-&DISTRO; -b my_yocto_&DISTRO;
|
||||
Switched to a new branch 'my_yocto_&DISTRO;'
|
||||
$ git branch
|
||||
master
|
||||
* my_yocto_&DISTRO;
|
||||
|
||||
The previous command creates and
|
||||
checks out a local branch named "my_yocto_&DISTRO;", which is based on
|
||||
the commit in the upstream poky repository that has the same tag. In
|
||||
this example, the files you have available locally as a result of the
|
||||
``checkout`` command are a snapshot of the "&DISTRO_NAME_NO_CAP;"
|
||||
development branch at the point where Yocto Project &DISTRO; was
|
||||
released.
|
||||
@@ -0,0 +1,66 @@
|
||||
.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
|
||||
|
||||
Finding Temporary Source Code
|
||||
*****************************
|
||||
|
||||
You might find it helpful during development to modify the temporary
|
||||
source code used by recipes to build packages. For example, suppose you
|
||||
are developing a patch and you need to experiment a bit to figure out
|
||||
your solution. After you have initially built the package, you can
|
||||
iteratively tweak the source code, which is located in the
|
||||
:term:`Build Directory`, and then you can force a re-compile and quickly
|
||||
test your altered code. Once you settle on a solution, you can then preserve
|
||||
your changes in the form of patches.
|
||||
|
||||
During a build, the unpacked temporary source code used by recipes to
|
||||
build packages is available in the :term:`Build Directory` as defined by the
|
||||
:term:`S` variable. Below is the default value for the :term:`S` variable as
|
||||
defined in the ``meta/conf/bitbake.conf`` configuration file in the
|
||||
:term:`Source Directory`::
|
||||
|
||||
S = "${WORKDIR}/${BP}"
|
||||
|
||||
You should be aware that many recipes override the
|
||||
:term:`S` variable. For example, recipes that fetch their source from Git
|
||||
usually set :term:`S` to ``${WORKDIR}/git``.
|
||||
|
||||
.. note::
|
||||
|
||||
The :term:`BP` represents the base recipe name, which consists of the name
|
||||
and version::
|
||||
|
||||
BP = "${BPN}-${PV}"
|
||||
|
||||
|
||||
The path to the work directory for the recipe
|
||||
(:term:`WORKDIR`) is defined as
|
||||
follows::
|
||||
|
||||
${TMPDIR}/work/${MULTIMACH_TARGET_SYS}/${PN}/${EXTENDPE}${PV}-${PR}
|
||||
|
||||
The actual directory depends on several things:
|
||||
|
||||
- :term:`TMPDIR`: The top-level build
|
||||
output directory.
|
||||
|
||||
- :term:`MULTIMACH_TARGET_SYS`:
|
||||
The target system identifier.
|
||||
|
||||
- :term:`PN`: The recipe name.
|
||||
|
||||
- :term:`EXTENDPE`: The epoch --- if
|
||||
:term:`PE` is not specified, which is
|
||||
usually the case for most recipes, then :term:`EXTENDPE` is blank.
|
||||
|
||||
- :term:`PV`: The recipe version.
|
||||
|
||||
- :term:`PR`: The recipe revision.
|
||||
|
||||
As an example, assume a Source Directory top-level folder named
|
||||
``poky``, a default :term:`Build Directory` at ``poky/build``, and a
|
||||
``qemux86-poky-linux`` machine target system. Furthermore, suppose your
|
||||
recipe is named ``foo_1.3.0.bb``. In this case, the work directory the
|
||||
build system uses to build the package would be as follows::
|
||||
|
||||
poky/build/tmp/work/qemux86-poky-linux/foo/1.3.0-r0
|
||||
|
||||
@@ -0,0 +1,397 @@
|
||||
.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
|
||||
|
||||
Upgrading Recipes
|
||||
*****************
|
||||
|
||||
Over time, upstream developers publish new versions for software built
|
||||
by layer recipes. It is recommended to keep recipes up-to-date with
|
||||
upstream version releases.
|
||||
|
||||
While there are several methods to upgrade a recipe, you might
|
||||
consider checking on the upgrade status of a recipe first. You can do so
|
||||
using the ``devtool check-upgrade-status`` command. See the
|
||||
":ref:`devtool-checking-on-the-upgrade-status-of-a-recipe`"
|
||||
section in the Yocto Project Reference Manual for more information.
|
||||
|
||||
The remainder of this section describes three ways you can upgrade a
|
||||
recipe. You can use the Automated Upgrade Helper (AUH) to set up
|
||||
automatic version upgrades. Alternatively, you can use
|
||||
``devtool upgrade`` to set up semi-automatic version upgrades. Finally,
|
||||
you can manually upgrade a recipe by editing the recipe itself.
|
||||
|
||||
Using the Auto Upgrade Helper (AUH)
|
||||
===================================
|
||||
|
||||
The AUH utility works in conjunction with the OpenEmbedded build system
|
||||
in order to automatically generate upgrades for recipes based on new
|
||||
versions being published upstream. Use AUH when you want to create a
|
||||
service that performs the upgrades automatically and optionally sends
|
||||
you an email with the results.
|
||||
|
||||
AUH allows you to update several recipes with a single use. You can also
|
||||
optionally perform build and integration tests using images with the
|
||||
results saved to your hard drive and emails of results optionally sent
|
||||
to recipe maintainers. Finally, AUH creates Git commits with appropriate
|
||||
commit messages in the layer's tree for the changes made to recipes.
|
||||
|
||||
.. note::
|
||||
|
||||
In some conditions, you should not use AUH to upgrade recipes
|
||||
and should instead use either ``devtool upgrade`` or upgrade your
|
||||
recipes manually:
|
||||
|
||||
- When AUH cannot complete the upgrade sequence. This situation
|
||||
usually results because custom patches carried by the recipe
|
||||
cannot be automatically rebased to the new version. In this case,
|
||||
``devtool upgrade`` allows you to manually resolve conflicts.
|
||||
|
||||
- When for any reason you want fuller control over the upgrade
|
||||
process. For example, when you want special arrangements for
|
||||
testing.
|
||||
|
||||
The following steps describe how to set up the AUH utility:
|
||||
|
||||
#. *Be Sure the Development Host is Set Up:* You need to be sure that
|
||||
your development host is set up to use the Yocto Project. For
|
||||
information on how to set up your host, see the
|
||||
":ref:`dev-manual/start:Preparing the Build Host`" section.
|
||||
|
||||
#. *Make Sure Git is Configured:* The AUH utility requires Git to be
|
||||
configured because AUH uses Git to save upgrades. Thus, you must have
|
||||
Git user and email configured. The following command shows your
|
||||
configurations::
|
||||
|
||||
$ git config --list
|
||||
|
||||
If you do not have the user and
|
||||
email configured, you can use the following commands to do so::
|
||||
|
||||
$ git config --global user.name some_name
|
||||
$ git config --global user.email username@domain.com
|
||||
|
||||
#. *Clone the AUH Repository:* To use AUH, you must clone the repository
|
||||
onto your development host. The following command uses Git to create
|
||||
a local copy of the repository on your system::
|
||||
|
||||
$ git clone git://git.yoctoproject.org/auto-upgrade-helper
|
||||
Cloning into 'auto-upgrade-helper'... remote: Counting objects: 768, done.
|
||||
remote: Compressing objects: 100% (300/300), done.
|
||||
remote: Total 768 (delta 499), reused 703 (delta 434)
|
||||
Receiving objects: 100% (768/768), 191.47 KiB | 98.00 KiB/s, done.
|
||||
Resolving deltas: 100% (499/499), done.
|
||||
Checking connectivity... done.
|
||||
|
||||
AUH is not part of the :term:`OpenEmbedded-Core (OE-Core)` or
|
||||
:term:`Poky` repositories.
|
||||
|
||||
#. *Create a Dedicated Build Directory:* Run the :ref:`structure-core-script`
|
||||
script to create a fresh :term:`Build Directory` that you use exclusively
|
||||
for running the AUH utility::
|
||||
|
||||
$ cd poky
|
||||
$ source oe-init-build-env your_AUH_build_directory
|
||||
|
||||
Re-using an existing :term:`Build Directory` and its configurations is not
|
||||
recommended as existing settings could cause AUH to fail or behave
|
||||
undesirably.
|
||||
|
||||
#. *Make Configurations in Your Local Configuration File:* Several
|
||||
settings are needed in the ``local.conf`` file in the build
|
||||
directory you just created for AUH. Make these following
|
||||
configurations:
|
||||
|
||||
- If you want to enable :ref:`Build
|
||||
History <dev-manual/build-quality:maintaining build output quality>`,
|
||||
which is optional, you need the following lines in the
|
||||
``conf/local.conf`` file::
|
||||
|
||||
INHERIT =+ "buildhistory"
|
||||
BUILDHISTORY_COMMIT = "1"
|
||||
|
||||
With this configuration and a successful
|
||||
upgrade, a build history "diff" file appears in the
|
||||
``upgrade-helper/work/recipe/buildhistory-diff.txt`` file found in
|
||||
your :term:`Build Directory`.
|
||||
|
||||
- If you want to enable testing through the :ref:`ref-classes-testimage`
|
||||
class, which is optional, you need to have the following set in
|
||||
your ``conf/local.conf`` file::
|
||||
|
||||
INHERIT += "testimage"
|
||||
|
||||
.. note::
|
||||
|
||||
If your distro does not enable by default ptest, which Poky
|
||||
does, you need the following in your ``local.conf`` file::
|
||||
|
||||
DISTRO_FEATURES:append = " ptest"
|
||||
|
||||
|
||||
#. *Optionally Start a vncserver:* If you are running in a server
|
||||
without an X11 session, you need to start a vncserver::
|
||||
|
||||
$ vncserver :1
|
||||
$ export DISPLAY=:1
|
||||
|
||||
#. *Create and Edit an AUH Configuration File:* You need to have the
|
||||
``upgrade-helper/upgrade-helper.conf`` configuration file in your
|
||||
:term:`Build Directory`. You can find a sample configuration file in the
|
||||
:yocto_git:`AUH source repository </auto-upgrade-helper/tree/>`.
|
||||
|
||||
Read through the sample file and make configurations as needed. For
|
||||
example, if you enabled build history in your ``local.conf`` as
|
||||
described earlier, you must enable it in ``upgrade-helper.conf``.
|
||||
|
||||
Also, if you are using the default ``maintainers.inc`` file supplied
|
||||
with Poky and located in ``meta-yocto`` and you do not set a
|
||||
"maintainers_whitelist" or "global_maintainer_override" in the
|
||||
``upgrade-helper.conf`` configuration, and you specify "-e all" on
|
||||
the AUH command-line, the utility automatically sends out emails to
|
||||
all the default maintainers. Please avoid this.
|
||||
|
||||
This next set of examples describes how to use the AUH:
|
||||
|
||||
- *Upgrading a Specific Recipe:* To upgrade a specific recipe, use the
|
||||
following form::
|
||||
|
||||
$ upgrade-helper.py recipe_name
|
||||
|
||||
For example, this command upgrades the ``xmodmap`` recipe::
|
||||
|
||||
$ upgrade-helper.py xmodmap
|
||||
|
||||
- *Upgrading a Specific Recipe to a Particular Version:* To upgrade a
|
||||
specific recipe to a particular version, use the following form::
|
||||
|
||||
$ upgrade-helper.py recipe_name -t version
|
||||
|
||||
For example, this command upgrades the ``xmodmap`` recipe to version 1.2.3::
|
||||
|
||||
$ upgrade-helper.py xmodmap -t 1.2.3
|
||||
|
||||
- *Upgrading all Recipes to the Latest Versions and Suppressing Email
|
||||
Notifications:* To upgrade all recipes to their most recent versions
|
||||
and suppress the email notifications, use the following command::
|
||||
|
||||
$ upgrade-helper.py all
|
||||
|
||||
- *Upgrading all Recipes to the Latest Versions and Send Email
|
||||
Notifications:* To upgrade all recipes to their most recent versions
|
||||
and send email messages to maintainers for each attempted recipe as
|
||||
well as a status email, use the following command::
|
||||
|
||||
$ upgrade-helper.py -e all
|
||||
|
||||
Once you have run the AUH utility, you can find the results in the AUH
|
||||
:term:`Build Directory`::
|
||||
|
||||
${BUILDDIR}/upgrade-helper/timestamp
|
||||
|
||||
The AUH utility
|
||||
also creates recipe update commits from successful upgrade attempts in
|
||||
the layer tree.
|
||||
|
||||
You can easily set up to run the AUH utility on a regular basis by using
|
||||
a cron job. See the
|
||||
:yocto_git:`weeklyjob.sh </auto-upgrade-helper/tree/weeklyjob.sh>`
|
||||
file distributed with the utility for an example.
|
||||
|
||||
Using ``devtool upgrade``
|
||||
=========================
|
||||
|
||||
As mentioned earlier, an alternative method for upgrading recipes to
|
||||
newer versions is to use
|
||||
:doc:`devtool upgrade </ref-manual/devtool-reference>`.
|
||||
You can read about ``devtool upgrade`` in general in the
|
||||
":ref:`sdk-manual/extensible:use \`\`devtool upgrade\`\` to create a version of the recipe that supports a newer version of the software`"
|
||||
section in the Yocto Project Application Development and the Extensible
|
||||
Software Development Kit (eSDK) Manual.
|
||||
|
||||
To see all the command-line options available with ``devtool upgrade``,
|
||||
use the following help command::
|
||||
|
||||
$ devtool upgrade -h
|
||||
|
||||
If you want to find out what version a recipe is currently at upstream
|
||||
without any attempt to upgrade your local version of the recipe, you can
|
||||
use the following command::
|
||||
|
||||
$ devtool latest-version recipe_name
|
||||
|
||||
As mentioned in the previous section describing AUH, ``devtool upgrade``
|
||||
works in a less-automated manner than AUH. Specifically,
|
||||
``devtool upgrade`` only works on a single recipe that you name on the
|
||||
command line, cannot perform build and integration testing using images,
|
||||
and does not automatically generate commits for changes in the source
|
||||
tree. Despite all these "limitations", ``devtool upgrade`` updates the
|
||||
recipe file to the new upstream version and attempts to rebase custom
|
||||
patches contained by the recipe as needed.
|
||||
|
||||
.. note::
|
||||
|
||||
AUH uses much of ``devtool upgrade`` behind the scenes making AUH somewhat
|
||||
of a "wrapper" application for ``devtool upgrade``.
|
||||
|
||||
A typical scenario involves having used Git to clone an upstream
|
||||
repository that you use during build operations. Because you have built the
|
||||
recipe in the past, the layer is likely added to your
|
||||
configuration already. If for some reason, the layer is not added, you
|
||||
could add it easily using the
|
||||
":ref:`bitbake-layers <bsp-guide/bsp:creating a new bsp layer using the \`\`bitbake-layers\`\` script>`"
|
||||
script. For example, suppose you use the ``nano.bb`` recipe from the
|
||||
``meta-oe`` layer in the ``meta-openembedded`` repository. For this
|
||||
example, assume that the layer has been cloned into following area::
|
||||
|
||||
/home/scottrif/meta-openembedded
|
||||
|
||||
The following command from your :term:`Build Directory` adds the layer to
|
||||
your build configuration (i.e. ``${BUILDDIR}/conf/bblayers.conf``)::
|
||||
|
||||
$ bitbake-layers add-layer /home/scottrif/meta-openembedded/meta-oe
|
||||
NOTE: Starting bitbake server...
|
||||
Parsing recipes: 100% |##########################################| Time: 0:00:55
|
||||
Parsing of 1431 .bb files complete (0 cached, 1431 parsed). 2040 targets, 56 skipped, 0 masked, 0 errors.
|
||||
Removing 12 recipes from the x86_64 sysroot: 100% |##############| Time: 0:00:00
|
||||
Removing 1 recipes from the x86_64_i586 sysroot: 100% |##########| Time: 0:00:00
|
||||
Removing 5 recipes from the i586 sysroot: 100% |#################| Time: 0:00:00
|
||||
Removing 5 recipes from the qemux86 sysroot: 100% |##############| Time: 0:00:00
|
||||
|
||||
For this example, assume that the ``nano.bb`` recipe that
|
||||
is upstream has a 2.9.3 version number. However, the version in the
|
||||
local repository is 2.7.4. The following command from your build
|
||||
directory automatically upgrades the recipe for you::
|
||||
|
||||
$ devtool upgrade nano -V 2.9.3
|
||||
NOTE: Starting bitbake server...
|
||||
NOTE: Creating workspace layer in /home/scottrif/poky/build/workspace
|
||||
Parsing recipes: 100% |##########################################| Time: 0:00:46
|
||||
Parsing of 1431 .bb files complete (0 cached, 1431 parsed). 2040 targets, 56 skipped, 0 masked, 0 errors.
|
||||
NOTE: Extracting current version source...
|
||||
NOTE: Resolving any missing task queue dependencies
|
||||
.
|
||||
.
|
||||
.
|
||||
NOTE: Executing SetScene Tasks
|
||||
NOTE: Executing RunQueue Tasks
|
||||
NOTE: Tasks Summary: Attempted 74 tasks of which 72 didn't need to be rerun and all succeeded.
|
||||
Adding changed files: 100% |#####################################| Time: 0:00:00
|
||||
NOTE: Upgraded source extracted to /home/scottrif/poky/build/workspace/sources/nano
|
||||
NOTE: New recipe is /home/scottrif/poky/build/workspace/recipes/nano/nano_2.9.3.bb
|
||||
|
||||
.. note::
|
||||
|
||||
Using the ``-V`` option is not necessary. Omitting the version number causes
|
||||
``devtool upgrade`` to upgrade the recipe to the most recent version.
|
||||
|
||||
Continuing with this example, you can use ``devtool build`` to build the
|
||||
newly upgraded recipe::
|
||||
|
||||
$ devtool build nano
|
||||
NOTE: Starting bitbake server...
|
||||
Loading cache: 100% |################################################################################################| Time: 0:00:01
|
||||
Loaded 2040 entries from dependency cache.
|
||||
Parsing recipes: 100% |##############################################################################################| Time: 0:00:00
|
||||
Parsing of 1432 .bb files complete (1431 cached, 1 parsed). 2041 targets, 56 skipped, 0 masked, 0 errors.
|
||||
NOTE: Resolving any missing task queue dependencies
|
||||
.
|
||||
.
|
||||
.
|
||||
NOTE: Executing SetScene Tasks
|
||||
NOTE: Executing RunQueue Tasks
|
||||
NOTE: nano: compiling from external source tree /home/scottrif/poky/build/workspace/sources/nano
|
||||
NOTE: Tasks Summary: Attempted 520 tasks of which 304 didn't need to be rerun and all succeeded.
|
||||
|
||||
Within the ``devtool upgrade`` workflow, you can
|
||||
deploy and test your rebuilt software. For this example,
|
||||
however, running ``devtool finish`` cleans up the workspace once the
|
||||
source in your workspace is clean. This usually means using Git to stage
|
||||
and submit commits for the changes generated by the upgrade process.
|
||||
|
||||
Once the tree is clean, you can clean things up in this example with the
|
||||
following command from the ``${BUILDDIR}/workspace/sources/nano``
|
||||
directory::
|
||||
|
||||
$ devtool finish nano meta-oe
|
||||
NOTE: Starting bitbake server...
|
||||
Loading cache: 100% |################################################################################################| Time: 0:00:00
|
||||
Loaded 2040 entries from dependency cache.
|
||||
Parsing recipes: 100% |##############################################################################################| Time: 0:00:01
|
||||
Parsing of 1432 .bb files complete (1431 cached, 1 parsed). 2041 targets, 56 skipped, 0 masked, 0 errors.
|
||||
NOTE: Adding new patch 0001-nano.bb-Stuff-I-changed-when-upgrading-nano.bb.patch
|
||||
NOTE: Updating recipe nano_2.9.3.bb
|
||||
NOTE: Removing file /home/scottrif/meta-openembedded/meta-oe/recipes-support/nano/nano_2.7.4.bb
|
||||
NOTE: Moving recipe file to /home/scottrif/meta-openembedded/meta-oe/recipes-support/nano
|
||||
NOTE: Leaving source tree /home/scottrif/poky/build/workspace/sources/nano as-is; if you no longer need it then please delete it manually
|
||||
|
||||
|
||||
Using the ``devtool finish`` command cleans up the workspace and creates a patch
|
||||
file based on your commits. The tool puts all patch files back into the
|
||||
source directory in a sub-directory named ``nano`` in this case.
|
||||
|
||||
Manually Upgrading a Recipe
|
||||
===========================
|
||||
|
||||
If for some reason you choose not to upgrade recipes using
|
||||
:ref:`dev-manual/upgrading-recipes:Using the Auto Upgrade Helper (AUH)` or
|
||||
by :ref:`dev-manual/upgrading-recipes:Using \`\`devtool upgrade\`\``,
|
||||
you can manually edit the recipe files to upgrade the versions.
|
||||
|
||||
.. note::
|
||||
|
||||
Manually updating multiple recipes scales poorly and involves many
|
||||
steps. The recommendation to upgrade recipe versions is through AUH
|
||||
or ``devtool upgrade``, both of which automate some steps and provide
|
||||
guidance for others needed for the manual process.
|
||||
|
||||
To manually upgrade recipe versions, follow these general steps:
|
||||
|
||||
#. *Change the Version:* Rename the recipe such that the version (i.e.
|
||||
the :term:`PV` part of the recipe name)
|
||||
changes appropriately. If the version is not part of the recipe name,
|
||||
change the value as it is set for :term:`PV` within the recipe itself.
|
||||
|
||||
#. *Update* :term:`SRCREV` *if Needed*: If the source code your recipe builds
|
||||
is fetched from Git or some other version control system, update
|
||||
:term:`SRCREV` to point to the
|
||||
commit hash that matches the new version.
|
||||
|
||||
#. *Build the Software:* Try to build the recipe using BitBake. Typical
|
||||
build failures include the following:
|
||||
|
||||
- License statements were updated for the new version. For this
|
||||
case, you need to review any changes to the license and update the
|
||||
values of :term:`LICENSE` and
|
||||
:term:`LIC_FILES_CHKSUM`
|
||||
as needed.
|
||||
|
||||
.. note::
|
||||
|
||||
License changes are often inconsequential. For example, the
|
||||
license text's copyright year might have changed.
|
||||
|
||||
- Custom patches carried by the older version of the recipe might
|
||||
fail to apply to the new version. For these cases, you need to
|
||||
review the failures. Patches might not be necessary for the new
|
||||
version of the software if the upgraded version has fixed those
|
||||
issues. If a patch is necessary and failing, you need to rebase it
|
||||
into the new version.
|
||||
|
||||
#. *Optionally Attempt to Build for Several Architectures:* Once you
|
||||
successfully build the new software for a given architecture, you
|
||||
could test the build for other architectures by changing the
|
||||
:term:`MACHINE` variable and
|
||||
rebuilding the software. This optional step is especially important
|
||||
if the recipe is to be released publicly.
|
||||
|
||||
#. *Check the Upstream Change Log or Release Notes:* Checking both these
|
||||
reveals if there are new features that could break
|
||||
backwards-compatibility. If so, you need to take steps to mitigate or
|
||||
eliminate that situation.
|
||||
|
||||
#. *Optionally Create a Bootable Image and Test:* If you want, you can
|
||||
test the new software by booting it onto actual hardware.
|
||||
|
||||
#. *Create a Commit with the Change in the Layer Repository:* After all
|
||||
builds work and any testing is successful, you can create commits for
|
||||
any changes in the layer holding your upgraded recipe.
|
||||
|
||||
@@ -0,0 +1,214 @@
|
||||
.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
|
||||
|
||||
Checking for Vulnerabilities
|
||||
****************************
|
||||
|
||||
Vulnerabilities in Poky and OE-Core
|
||||
===================================
|
||||
|
||||
The Yocto Project has an infrastructure to track and address unfixed
|
||||
known security vulnerabilities, as tracked by the public
|
||||
:wikipedia:`Common Vulnerabilities and Exposures (CVE) <Common_Vulnerabilities_and_Exposures>`
|
||||
database.
|
||||
|
||||
The Yocto Project maintains a `list of known vulnerabilities
|
||||
<https://autobuilder.yocto.io/pub/non-release/patchmetrics/>`__
|
||||
for packages in Poky and OE-Core, tracking the evolution of the number of
|
||||
unpatched CVEs and the status of patches. Such information is available for
|
||||
the current development version and for each supported release.
|
||||
|
||||
Security is a process, not a product, and thus at any time, a number of security
|
||||
issues may be impacting Poky and OE-Core. It is up to the maintainers, users,
|
||||
contributors and anyone interested in the issues to investigate and possibly fix them by
|
||||
updating software components to newer versions or by applying patches to address them.
|
||||
It is recommended to work with Poky and OE-Core upstream maintainers and submit
|
||||
patches to fix them, see ":ref:`dev-manual/changes:submitting a change to the yocto project`" for details.
|
||||
|
||||
Vulnerability check at build time
|
||||
=================================
|
||||
|
||||
To enable a check for CVE security vulnerabilities using
|
||||
:ref:`ref-classes-cve-check` in the specific image or target you are building,
|
||||
add the following setting to your configuration::
|
||||
|
||||
INHERIT += "cve-check"
|
||||
|
||||
The CVE database contains some old incomplete entries which have been
|
||||
deemed not to impact Poky or OE-Core. These CVE entries can be excluded from the
|
||||
check using build configuration::
|
||||
|
||||
include conf/distro/include/cve-extra-exclusions.inc
|
||||
|
||||
With this CVE check enabled, BitBake build will try to map each compiled software component
|
||||
recipe name and version information to the CVE database and generate recipe and
|
||||
image specific reports. These reports will contain:
|
||||
|
||||
- metadata about the software component like names and versions
|
||||
|
||||
- metadata about the CVE issue such as description and NVD link
|
||||
|
||||
- for each software component, a list of CVEs which are possibly impacting this version
|
||||
|
||||
- status of each CVE: ``Patched``, ``Unpatched`` or ``Ignored``
|
||||
|
||||
The status ``Patched`` means that a patch file to address the security issue has been
|
||||
applied. ``Unpatched`` status means that no patches to address the issue have been
|
||||
applied and that the issue needs to be investigated. ``Ignored`` means that after
|
||||
analysis, it has been deemed to ignore the issue as it for example affects
|
||||
the software component on a different operating system platform.
|
||||
|
||||
After a build with CVE check enabled, reports for each compiled source recipe will be
|
||||
found in ``build/tmp/deploy/cve``.
|
||||
|
||||
For example the CVE check report for the ``flex-native`` recipe looks like::
|
||||
|
||||
$ cat poky/build/tmp/deploy/cve/flex-native
|
||||
LAYER: meta
|
||||
PACKAGE NAME: flex-native
|
||||
PACKAGE VERSION: 2.6.4
|
||||
CVE: CVE-2016-6354
|
||||
CVE STATUS: Patched
|
||||
CVE SUMMARY: Heap-based buffer overflow in the yy_get_next_buffer function in Flex before 2.6.1 might allow context-dependent attackers to cause a denial of service or possibly execute arbitrary code via vectors involving num_to_read.
|
||||
CVSS v2 BASE SCORE: 7.5
|
||||
CVSS v3 BASE SCORE: 9.8
|
||||
VECTOR: NETWORK
|
||||
MORE INFORMATION: https://nvd.nist.gov/vuln/detail/CVE-2016-6354
|
||||
|
||||
LAYER: meta
|
||||
PACKAGE NAME: flex-native
|
||||
PACKAGE VERSION: 2.6.4
|
||||
CVE: CVE-2019-6293
|
||||
CVE STATUS: Ignored
|
||||
CVE SUMMARY: An issue was discovered in the function mark_beginning_as_normal in nfa.c in flex 2.6.4. There is a stack exhaustion problem caused by the mark_beginning_as_normal function making recursive calls to itself in certain scenarios involving lots of '*' characters. Remote attackers could leverage this vulnerability to cause a denial-of-service.
|
||||
CVSS v2 BASE SCORE: 4.3
|
||||
CVSS v3 BASE SCORE: 5.5
|
||||
VECTOR: NETWORK
|
||||
MORE INFORMATION: https://nvd.nist.gov/vuln/detail/CVE-2019-6293
|
||||
|
||||
For images, a summary of all recipes included in the image and their CVEs is also
|
||||
generated in textual and JSON formats. These ``.cve`` and ``.json`` reports can be found
|
||||
in the ``tmp/deploy/images`` directory for each compiled image.
|
||||
|
||||
At build time CVE check will also throw warnings about ``Unpatched`` CVEs::
|
||||
|
||||
WARNING: flex-2.6.4-r0 do_cve_check: Found unpatched CVE (CVE-2019-6293), for more information check /poky/build/tmp/work/core2-64-poky-linux/flex/2.6.4-r0/temp/cve.log
|
||||
WARNING: libarchive-3.5.1-r0 do_cve_check: Found unpatched CVE (CVE-2021-36976), for more information check /poky/build/tmp/work/core2-64-poky-linux/libarchive/3.5.1-r0/temp/cve.log
|
||||
|
||||
It is also possible to check the CVE status of individual packages as follows::
|
||||
|
||||
bitbake -c cve_check flex libarchive
|
||||
|
||||
Fixing CVE product name and version mappings
|
||||
============================================
|
||||
|
||||
By default, :ref:`ref-classes-cve-check` uses the recipe name :term:`BPN` as CVE
|
||||
product name when querying the CVE database. If this mapping contains false positives, e.g.
|
||||
some reported CVEs are not for the software component in question, or false negatives like
|
||||
some CVEs are not found to impact the recipe when they should, then the problems can be
|
||||
in the recipe name to CVE product mapping. These mapping issues can be fixed by setting
|
||||
the :term:`CVE_PRODUCT` variable inside the recipe. This defines the name of the software component in the
|
||||
upstream `NIST CVE database <https://nvd.nist.gov/>`__.
|
||||
|
||||
The variable supports using vendor and product names like this::
|
||||
|
||||
CVE_PRODUCT = "flex_project:flex"
|
||||
|
||||
In this example the vendor name used in the CVE database is ``flex_project`` and the
|
||||
product is ``flex``. With this setting the ``flex`` recipe only maps to this specific
|
||||
product and not products from other vendors with same name ``flex``.
|
||||
|
||||
Similarly, when the recipe version :term:`PV` is not compatible with software versions used by
|
||||
the upstream software component releases and the CVE database, these can be fixed using
|
||||
the :term:`CVE_VERSION` variable.
|
||||
|
||||
Note that if the CVE entries in the NVD database contain bugs or have missing or incomplete
|
||||
information, it is recommended to fix the information there directly instead of working
|
||||
around the issues possibly for a long time in Poky and OE-Core side recipes. Feedback to
|
||||
NVD about CVE entries can be provided through the `NVD contact form <https://nvd.nist.gov/info/contact-form>`__.
|
||||
|
||||
Fixing vulnerabilities in recipes
|
||||
=================================
|
||||
|
||||
If a CVE security issue impacts a software component, it can be fixed by updating to a newer
|
||||
version of the software component or by applying a patch. For Poky and OE-Core master branches, updating
|
||||
to a newer software component release with fixes is the best option, but patches can be applied
|
||||
if releases are not yet available.
|
||||
|
||||
For stable branches, it is preferred to apply patches for the issues. For some software
|
||||
components minor version updates can also be applied if they are backwards compatible.
|
||||
|
||||
Here is an example of fixing CVE security issues with patch files,
|
||||
an example from the :oe_layerindex:`ffmpeg recipe</layerindex/recipe/47350>`::
|
||||
|
||||
SRC_URI = "https://www.ffmpeg.org/releases/${BP}.tar.xz \
|
||||
file://0001-libavutil-include-assembly-with-full-path-from-sourc.patch \
|
||||
file://fix-CVE-2020-20446.patch \
|
||||
file://fix-CVE-2020-20453.patch \
|
||||
file://fix-CVE-2020-22015.patch \
|
||||
file://fix-CVE-2020-22021.patch \
|
||||
file://fix-CVE-2020-22033-CVE-2020-22019.patch \
|
||||
file://fix-CVE-2021-33815.patch \
|
||||
|
||||
A good practice is to include the CVE identifier in both the patch file name
|
||||
and inside the patch file commit message using the format::
|
||||
|
||||
CVE: CVE-2020-22033
|
||||
|
||||
CVE checker will then capture this information and change the CVE status to ``Patched``
|
||||
in the generated reports.
|
||||
|
||||
If analysis shows that the CVE issue does not impact the recipe due to configuration, platform,
|
||||
version or other reasons, the CVE can be marked as ``Ignored`` using the :term:`CVE_CHECK_IGNORE` variable.
|
||||
As mentioned previously, if data in the CVE database is wrong, it is recommend to fix those
|
||||
issues in the CVE database directly.
|
||||
|
||||
Recipes can be completely skipped by CVE check by including the recipe name in
|
||||
the :term:`CVE_CHECK_SKIP_RECIPE` variable.
|
||||
|
||||
Implementation details
|
||||
======================
|
||||
|
||||
Here's what the :ref:`ref-classes-cve-check` class does to find unpatched CVE IDs.
|
||||
|
||||
First the code goes through each patch file provided by a recipe. If a valid CVE ID
|
||||
is found in the name of the file, the corresponding CVE is considered as patched.
|
||||
Don't forget that if multiple CVE IDs are found in the filename, only the last
|
||||
one is considered. Then, the code looks for ``CVE: CVE-ID`` lines in the patch
|
||||
file. The found CVE IDs are also considered as patched.
|
||||
|
||||
Then, the code looks up all the CVE IDs in the NIST database for all the
|
||||
products defined in :term:`CVE_PRODUCT`. Then, for each found CVE:
|
||||
|
||||
- If the package name (:term:`PN`) is part of
|
||||
:term:`CVE_CHECK_SKIP_RECIPE`, it is considered as ``Patched``.
|
||||
|
||||
- If the CVE ID is part of :term:`CVE_CHECK_IGNORE`, it is
|
||||
set as ``Ignored``.
|
||||
|
||||
- If the CVE ID is part of the patched CVE for the recipe, it is
|
||||
already considered as ``Patched``.
|
||||
|
||||
- Otherwise, the code checks whether the recipe version (:term:`PV`)
|
||||
is within the range of versions impacted by the CVE. If so, the CVE
|
||||
is considered as ``Unpatched``.
|
||||
|
||||
The CVE database is stored in :term:`DL_DIR` and can be inspected using
|
||||
``sqlite3`` command as follows::
|
||||
|
||||
sqlite3 downloads/CVE_CHECK/nvdcve_1.1.db .dump | grep CVE-2021-37462
|
||||
|
||||
When analyzing CVEs, it is recommended to:
|
||||
|
||||
- study the latest information in `CVE database <https://nvd.nist.gov/vuln/search>`__.
|
||||
|
||||
- check how upstream developers of the software component addressed the issue, e.g.
|
||||
what patch was applied, which upstream release contains the fix.
|
||||
|
||||
- check what other Linux distributions like `Debian <https://security-tracker.debian.org/tracker/>`__
|
||||
did to analyze and address the issue.
|
||||
|
||||
- follow security notices from other Linux distributions.
|
||||
|
||||
- follow public `open source security mailing lists <https://oss-security.openwall.org/wiki/mailing-lists>`__ for
|
||||
discussions and advance notifications of CVE bugs and software releases with fixes.
|
||||
|
||||
@@ -0,0 +1,90 @@
|
||||
.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
|
||||
|
||||
Using Wayland and Weston
|
||||
************************
|
||||
|
||||
:wikipedia:`Wayland <Wayland_(display_server_protocol)>`
|
||||
is a computer display server protocol that provides a method for
|
||||
compositing window managers to communicate directly with applications
|
||||
and video hardware and expects them to communicate with input hardware
|
||||
using other libraries. Using Wayland with supporting targets can result
|
||||
in better control over graphics frame rendering than an application
|
||||
might otherwise achieve.
|
||||
|
||||
The Yocto Project provides the Wayland protocol libraries and the
|
||||
reference :wikipedia:`Weston <Wayland_(display_server_protocol)#Weston>`
|
||||
compositor as part of its release. You can find the integrated packages
|
||||
in the ``meta`` layer of the :term:`Source Directory`.
|
||||
Specifically, you
|
||||
can find the recipes that build both Wayland and Weston at
|
||||
``meta/recipes-graphics/wayland``.
|
||||
|
||||
You can build both the Wayland and Weston packages for use only with targets
|
||||
that accept the :wikipedia:`Mesa 3D and Direct Rendering Infrastructure
|
||||
<Mesa_(computer_graphics)>`, which is also known as Mesa DRI. This implies that
|
||||
you cannot build and use the packages if your target uses, for example, the
|
||||
Intel Embedded Media and Graphics Driver (Intel EMGD) that overrides Mesa DRI.
|
||||
|
||||
.. note::
|
||||
|
||||
Due to lack of EGL support, Weston 1.0.3 will not run directly on the
|
||||
emulated QEMU hardware. However, this version of Weston will run
|
||||
under X emulation without issues.
|
||||
|
||||
This section describes what you need to do to implement Wayland and use
|
||||
the Weston compositor when building an image for a supporting target.
|
||||
|
||||
Enabling Wayland in an Image
|
||||
============================
|
||||
|
||||
To enable Wayland, you need to enable it to be built and enable it to be
|
||||
included (installed) in the image.
|
||||
|
||||
Building Wayland
|
||||
----------------
|
||||
|
||||
To cause Mesa to build the ``wayland-egl`` platform and Weston to build
|
||||
Wayland with Kernel Mode Setting
|
||||
(`KMS <https://wiki.archlinux.org/index.php/Kernel_Mode_Setting>`__)
|
||||
support, include the "wayland" flag in the
|
||||
:term:`DISTRO_FEATURES`
|
||||
statement in your ``local.conf`` file::
|
||||
|
||||
DISTRO_FEATURES:append = " wayland"
|
||||
|
||||
.. note::
|
||||
|
||||
If X11 has been enabled elsewhere, Weston will build Wayland with X11
|
||||
support
|
||||
|
||||
Installing Wayland and Weston
|
||||
-----------------------------
|
||||
|
||||
To install the Wayland feature into an image, you must include the
|
||||
following
|
||||
:term:`CORE_IMAGE_EXTRA_INSTALL`
|
||||
statement in your ``local.conf`` file::
|
||||
|
||||
CORE_IMAGE_EXTRA_INSTALL += "wayland weston"
|
||||
|
||||
Running Weston
|
||||
==============
|
||||
|
||||
To run Weston inside X11, enabling it as described earlier and building
|
||||
a Sato image is sufficient. If you are running your image under Sato, a
|
||||
Weston Launcher appears in the "Utility" category.
|
||||
|
||||
Alternatively, you can run Weston through the command-line interpretor
|
||||
(CLI), which is better suited for development work. To run Weston under
|
||||
the CLI, you need to do the following after your image is built:
|
||||
|
||||
#. Run these commands to export ``XDG_RUNTIME_DIR``::
|
||||
|
||||
mkdir -p /tmp/$USER-weston
|
||||
chmod 0700 /tmp/$USER-weston
|
||||
export XDG_RUNTIME_DIR=/tmp/$USER-weston
|
||||
|
||||
#. Launch Weston in the shell::
|
||||
|
||||
weston
|
||||
|
||||
@@ -0,0 +1,729 @@
|
||||
.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
|
||||
|
||||
Creating Partitioned Images Using Wic
|
||||
*************************************
|
||||
|
||||
Creating an image for a particular hardware target using the
|
||||
OpenEmbedded build system does not necessarily mean you can boot that
|
||||
image as is on your device. Physical devices accept and boot images in
|
||||
various ways depending on the specifics of the device. Usually,
|
||||
information about the hardware can tell you what image format the device
|
||||
requires. Should your device require multiple partitions on an SD card,
|
||||
flash, or an HDD, you can use the OpenEmbedded Image Creator, Wic, to
|
||||
create the properly partitioned image.
|
||||
|
||||
The ``wic`` command generates partitioned images from existing
|
||||
OpenEmbedded build artifacts. Image generation is driven by partitioning
|
||||
commands contained in an OpenEmbedded kickstart file (``.wks``)
|
||||
specified either directly on the command line or as one of a selection
|
||||
of canned kickstart files as shown with the ``wic list images`` command
|
||||
in the
|
||||
":ref:`dev-manual/wic:generate an image using an existing kickstart file`"
|
||||
section. When you apply the command to a given set of build artifacts, the
|
||||
result is an image or set of images that can be directly written onto media and
|
||||
used on a particular system.
|
||||
|
||||
.. note::
|
||||
|
||||
For a kickstart file reference, see the
|
||||
":ref:`ref-manual/kickstart:openembedded kickstart (\`\`.wks\`\`) reference`"
|
||||
Chapter in the Yocto Project Reference Manual.
|
||||
|
||||
The ``wic`` command and the infrastructure it is based on is by
|
||||
definition incomplete. The purpose of the command is to allow the
|
||||
generation of customized images, and as such, was designed to be
|
||||
completely extensible through a plugin interface. See the
|
||||
":ref:`dev-manual/wic:using the wic plugin interface`" section
|
||||
for information on these plugins.
|
||||
|
||||
This section provides some background information on Wic, describes what
|
||||
you need to have in place to run the tool, provides instruction on how
|
||||
to use the Wic utility, provides information on using the Wic plugins
|
||||
interface, and provides several examples that show how to use Wic.
|
||||
|
||||
Background
|
||||
==========
|
||||
|
||||
This section provides some background on the Wic utility. While none of
|
||||
this information is required to use Wic, you might find it interesting.
|
||||
|
||||
- The name "Wic" is derived from OpenEmbedded Image Creator (oeic). The
|
||||
"oe" diphthong in "oeic" was promoted to the letter "w", because
|
||||
"oeic" is both difficult to remember and to pronounce.
|
||||
|
||||
- Wic is loosely based on the Meego Image Creator (``mic``) framework.
|
||||
The Wic implementation has been heavily modified to make direct use
|
||||
of OpenEmbedded build artifacts instead of package installation and
|
||||
configuration, which are already incorporated within the OpenEmbedded
|
||||
artifacts.
|
||||
|
||||
- Wic is a completely independent standalone utility that initially
|
||||
provides easier-to-use and more flexible replacements for an existing
|
||||
functionality in OE-Core's :ref:`ref-classes-image-live`
|
||||
class. The difference between Wic and those examples is that with Wic
|
||||
the functionality of those scripts is implemented by a
|
||||
general-purpose partitioning language, which is based on Redhat
|
||||
kickstart syntax.
|
||||
|
||||
Requirements
|
||||
============
|
||||
|
||||
In order to use the Wic utility with the OpenEmbedded Build system, your
|
||||
system needs to meet the following requirements:
|
||||
|
||||
- The Linux distribution on your development host must support the
|
||||
Yocto Project. See the ":ref:`system-requirements-supported-distros`"
|
||||
section in the Yocto Project Reference Manual for the list of
|
||||
distributions that support the Yocto Project.
|
||||
|
||||
- The standard system utilities, such as ``cp``, must be installed on
|
||||
your development host system.
|
||||
|
||||
- You must have sourced the build environment setup script (i.e.
|
||||
:ref:`structure-core-script`) found in the :term:`Build Directory`.
|
||||
|
||||
- You need to have the build artifacts already available, which
|
||||
typically means that you must have already created an image using the
|
||||
OpenEmbedded build system (e.g. ``core-image-minimal``). While it
|
||||
might seem redundant to generate an image in order to create an image
|
||||
using Wic, the current version of Wic requires the artifacts in the
|
||||
form generated by the OpenEmbedded build system.
|
||||
|
||||
- You must build several native tools, which are built to run on the
|
||||
build system::
|
||||
|
||||
$ bitbake parted-native dosfstools-native mtools-native
|
||||
|
||||
- Include "wic" as part of the
|
||||
:term:`IMAGE_FSTYPES`
|
||||
variable.
|
||||
|
||||
- Include the name of the :ref:`wic kickstart file <openembedded-kickstart-wks-reference>`
|
||||
as part of the :term:`WKS_FILE` variable. If multiple candidate files can
|
||||
be provided by different layers, specify all the possible names through the
|
||||
:term:`WKS_FILES` variable instead.
|
||||
|
||||
Getting Help
|
||||
============
|
||||
|
||||
You can get general help for the ``wic`` command by entering the ``wic``
|
||||
command by itself or by entering the command with a help argument as
|
||||
follows::
|
||||
|
||||
$ wic -h
|
||||
$ wic --help
|
||||
$ wic help
|
||||
|
||||
Currently, Wic supports seven commands: ``cp``, ``create``, ``help``,
|
||||
``list``, ``ls``, ``rm``, and ``write``. You can get help for all these
|
||||
commands except "help" by using the following form::
|
||||
|
||||
$ wic help command
|
||||
|
||||
For example, the following command returns help for the ``write``
|
||||
command::
|
||||
|
||||
$ wic help write
|
||||
|
||||
Wic supports help for three topics: ``overview``, ``plugins``, and
|
||||
``kickstart``. You can get help for any topic using the following form::
|
||||
|
||||
$ wic help topic
|
||||
|
||||
For example, the following returns overview help for Wic::
|
||||
|
||||
$ wic help overview
|
||||
|
||||
There is one additional level of help for Wic. You can get help on
|
||||
individual images through the ``list`` command. You can use the ``list``
|
||||
command to return the available Wic images as follows::
|
||||
|
||||
$ wic list images
|
||||
genericx86 Create an EFI disk image for genericx86*
|
||||
edgerouter Create SD card image for Edgerouter
|
||||
beaglebone-yocto Create SD card image for Beaglebone
|
||||
qemux86-directdisk Create a qemu machine 'pcbios' direct disk image
|
||||
systemd-bootdisk Create an EFI disk image with systemd-boot
|
||||
mkhybridiso Create a hybrid ISO image
|
||||
mkefidisk Create an EFI disk image
|
||||
sdimage-bootpart Create SD card image with a boot partition
|
||||
directdisk-multi-rootfs Create multi rootfs image using rootfs plugin
|
||||
directdisk Create a 'pcbios' direct disk image
|
||||
directdisk-bootloader-config Create a 'pcbios' direct disk image with custom bootloader config
|
||||
qemuriscv Create qcow2 image for RISC-V QEMU machines
|
||||
directdisk-gpt Create a 'pcbios' direct disk image
|
||||
efi-bootdisk
|
||||
|
||||
Once you know the list of available
|
||||
Wic images, you can use ``help`` with the command to get help on a
|
||||
particular image. For example, the following command returns help on the
|
||||
"beaglebone-yocto" image::
|
||||
|
||||
$ wic list beaglebone-yocto help
|
||||
|
||||
Creates a partitioned SD card image for Beaglebone.
|
||||
Boot files are located in the first vfat partition.
|
||||
|
||||
Operational Modes
|
||||
=================
|
||||
|
||||
You can use Wic in two different modes, depending on how much control
|
||||
you need for specifying the OpenEmbedded build artifacts that are used
|
||||
for creating the image: Raw and Cooked:
|
||||
|
||||
- *Raw Mode:* You explicitly specify build artifacts through Wic
|
||||
command-line arguments.
|
||||
|
||||
- *Cooked Mode:* The current
|
||||
:term:`MACHINE` setting and image
|
||||
name are used to automatically locate and provide the build
|
||||
artifacts. You just supply a kickstart file and the name of the image
|
||||
from which to use artifacts.
|
||||
|
||||
Regardless of the mode you use, you need to have the build artifacts
|
||||
ready and available.
|
||||
|
||||
Raw Mode
|
||||
--------
|
||||
|
||||
Running Wic in raw mode allows you to specify all the partitions through
|
||||
the ``wic`` command line. The primary use for raw mode is if you have
|
||||
built your kernel outside of the Yocto Project :term:`Build Directory`.
|
||||
In other words, you can point to arbitrary kernel, root filesystem locations,
|
||||
and so forth. Contrast this behavior with cooked mode where Wic looks in the
|
||||
:term:`Build Directory` (e.g. ``tmp/deploy/images/``\ machine).
|
||||
|
||||
The general form of the ``wic`` command in raw mode is::
|
||||
|
||||
$ wic create wks_file options ...
|
||||
|
||||
Where:
|
||||
|
||||
wks_file:
|
||||
An OpenEmbedded kickstart file. You can provide
|
||||
your own custom file or use a file from a set of
|
||||
existing files as described by further options.
|
||||
|
||||
optional arguments:
|
||||
-h, --help show this help message and exit
|
||||
-o OUTDIR, --outdir OUTDIR
|
||||
name of directory to create image in
|
||||
-e IMAGE_NAME, --image-name IMAGE_NAME
|
||||
name of the image to use the artifacts from e.g. core-
|
||||
image-sato
|
||||
-r ROOTFS_DIR, --rootfs-dir ROOTFS_DIR
|
||||
path to the /rootfs dir to use as the .wks rootfs
|
||||
source
|
||||
-b BOOTIMG_DIR, --bootimg-dir BOOTIMG_DIR
|
||||
path to the dir containing the boot artifacts (e.g.
|
||||
/EFI or /syslinux dirs) to use as the .wks bootimg
|
||||
source
|
||||
-k KERNEL_DIR, --kernel-dir KERNEL_DIR
|
||||
path to the dir containing the kernel to use in the
|
||||
.wks bootimg
|
||||
-n NATIVE_SYSROOT, --native-sysroot NATIVE_SYSROOT
|
||||
path to the native sysroot containing the tools to use
|
||||
to build the image
|
||||
-s, --skip-build-check
|
||||
skip the build check
|
||||
-f, --build-rootfs build rootfs
|
||||
-c {gzip,bzip2,xz}, --compress-with {gzip,bzip2,xz}
|
||||
compress image with specified compressor
|
||||
-m, --bmap generate .bmap
|
||||
--no-fstab-update Do not change fstab file.
|
||||
-v VARS_DIR, --vars VARS_DIR
|
||||
directory with <image>.env files that store bitbake
|
||||
variables
|
||||
-D, --debug output debug information
|
||||
|
||||
.. note::
|
||||
|
||||
You do not need root privileges to run Wic. In fact, you should not
|
||||
run as root when using the utility.
|
||||
|
||||
Cooked Mode
|
||||
-----------
|
||||
|
||||
Running Wic in cooked mode leverages off artifacts in the
|
||||
:term:`Build Directory`. In other words, you do not have to specify kernel or
|
||||
root filesystem locations as part of the command. All you need to provide is
|
||||
a kickstart file and the name of the image from which to use artifacts
|
||||
by using the "-e" option. Wic looks in the :term:`Build Directory` (e.g.
|
||||
``tmp/deploy/images/``\ machine) for artifacts.
|
||||
|
||||
The general form of the ``wic`` command using Cooked Mode is as follows::
|
||||
|
||||
$ wic create wks_file -e IMAGE_NAME
|
||||
|
||||
Where:
|
||||
|
||||
wks_file:
|
||||
An OpenEmbedded kickstart file. You can provide
|
||||
your own custom file or use a file from a set of
|
||||
existing files provided with the Yocto Project
|
||||
release.
|
||||
|
||||
required argument:
|
||||
-e IMAGE_NAME, --image-name IMAGE_NAME
|
||||
name of the image to use the artifacts from e.g. core-
|
||||
image-sato
|
||||
|
||||
Using an Existing Kickstart File
|
||||
================================
|
||||
|
||||
If you do not want to create your own kickstart file, you can use an
|
||||
existing file provided by the Wic installation. As shipped, kickstart
|
||||
files can be found in the :ref:`overview-manual/development-environment:yocto project source repositories` in the
|
||||
following two locations::
|
||||
|
||||
poky/meta-yocto-bsp/wic
|
||||
poky/scripts/lib/wic/canned-wks
|
||||
|
||||
Use the following command to list the available kickstart files::
|
||||
|
||||
$ wic list images
|
||||
genericx86 Create an EFI disk image for genericx86*
|
||||
beaglebone-yocto Create SD card image for Beaglebone
|
||||
edgerouter Create SD card image for Edgerouter
|
||||
qemux86-directdisk Create a QEMU machine 'pcbios' direct disk image
|
||||
directdisk-gpt Create a 'pcbios' direct disk image
|
||||
mkefidisk Create an EFI disk image
|
||||
directdisk Create a 'pcbios' direct disk image
|
||||
systemd-bootdisk Create an EFI disk image with systemd-boot
|
||||
mkhybridiso Create a hybrid ISO image
|
||||
sdimage-bootpart Create SD card image with a boot partition
|
||||
directdisk-multi-rootfs Create multi rootfs image using rootfs plugin
|
||||
directdisk-bootloader-config Create a 'pcbios' direct disk image with custom bootloader config
|
||||
|
||||
When you use an existing file, you
|
||||
do not have to use the ``.wks`` extension. Here is an example in Raw
|
||||
Mode that uses the ``directdisk`` file::
|
||||
|
||||
$ wic create directdisk -r rootfs_dir -b bootimg_dir \
|
||||
-k kernel_dir -n native_sysroot
|
||||
|
||||
Here are the actual partition language commands used in the
|
||||
``genericx86.wks`` file to generate an image::
|
||||
|
||||
# short-description: Create an EFI disk image for genericx86*
|
||||
# long-description: Creates a partitioned EFI disk image for genericx86* machines
|
||||
part /boot --source bootimg-efi --sourceparams="loader=grub-efi" --ondisk sda --label msdos --active --align 1024
|
||||
part / --source rootfs --ondisk sda --fstype=ext4 --label platform --align 1024 --use-uuid
|
||||
part swap --ondisk sda --size 44 --label swap1 --fstype=swap
|
||||
|
||||
bootloader --ptable gpt --timeout=5 --append="rootfstype=ext4 console=ttyS0,115200 console=tty0"
|
||||
|
||||
Using the Wic Plugin Interface
|
||||
==============================
|
||||
|
||||
You can extend and specialize Wic functionality by using Wic plugins.
|
||||
This section explains the Wic plugin interface.
|
||||
|
||||
.. note::
|
||||
|
||||
Wic plugins consist of "source" and "imager" plugins. Imager plugins
|
||||
are beyond the scope of this section.
|
||||
|
||||
Source plugins provide a mechanism to customize partition content during
|
||||
the Wic image generation process. You can use source plugins to map
|
||||
values that you specify using ``--source`` commands in kickstart files
|
||||
(i.e. ``*.wks``) to a plugin implementation used to populate a given
|
||||
partition.
|
||||
|
||||
.. note::
|
||||
|
||||
If you use plugins that have build-time dependencies (e.g. native
|
||||
tools, bootloaders, and so forth) when building a Wic image, you need
|
||||
to specify those dependencies using the :term:`WKS_FILE_DEPENDS`
|
||||
variable.
|
||||
|
||||
Source plugins are subclasses defined in plugin files. As shipped, the
|
||||
Yocto Project provides several plugin files. You can see the source
|
||||
plugin files that ship with the Yocto Project
|
||||
:yocto_git:`here </poky/tree/scripts/lib/wic/plugins/source>`.
|
||||
Each of these plugin files contains source plugins that are designed to
|
||||
populate a specific Wic image partition.
|
||||
|
||||
Source plugins are subclasses of the ``SourcePlugin`` class, which is
|
||||
defined in the ``poky/scripts/lib/wic/pluginbase.py`` file. For example,
|
||||
the ``BootimgEFIPlugin`` source plugin found in the ``bootimg-efi.py``
|
||||
file is a subclass of the ``SourcePlugin`` class, which is found in the
|
||||
``pluginbase.py`` file.
|
||||
|
||||
You can also implement source plugins in a layer outside of the Source
|
||||
Repositories (external layer). To do so, be sure that your plugin files
|
||||
are located in a directory whose path is
|
||||
``scripts/lib/wic/plugins/source/`` within your external layer. When the
|
||||
plugin files are located there, the source plugins they contain are made
|
||||
available to Wic.
|
||||
|
||||
When the Wic implementation needs to invoke a partition-specific
|
||||
implementation, it looks for the plugin with the same name as the
|
||||
``--source`` parameter used in the kickstart file given to that
|
||||
partition. For example, if the partition is set up using the following
|
||||
command in a kickstart file::
|
||||
|
||||
part /boot --source bootimg-pcbios --ondisk sda --label boot --active --align 1024
|
||||
|
||||
The methods defined as class
|
||||
members of the matching source plugin (i.e. ``bootimg-pcbios``) in the
|
||||
``bootimg-pcbios.py`` plugin file are used.
|
||||
|
||||
To be more concrete, here is the corresponding plugin definition from
|
||||
the ``bootimg-pcbios.py`` file for the previous command along with an
|
||||
example method called by the Wic implementation when it needs to prepare
|
||||
a partition using an implementation-specific function::
|
||||
|
||||
.
|
||||
.
|
||||
.
|
||||
class BootimgPcbiosPlugin(SourcePlugin):
|
||||
"""
|
||||
Create MBR boot partition and install syslinux on it.
|
||||
"""
|
||||
|
||||
name = 'bootimg-pcbios'
|
||||
.
|
||||
.
|
||||
.
|
||||
@classmethod
|
||||
def do_prepare_partition(cls, part, source_params, creator, cr_workdir,
|
||||
oe_builddir, bootimg_dir, kernel_dir,
|
||||
rootfs_dir, native_sysroot):
|
||||
"""
|
||||
Called to do the actual content population for a partition i.e. it
|
||||
'prepares' the partition to be incorporated into the image.
|
||||
In this case, prepare content for legacy bios boot partition.
|
||||
"""
|
||||
.
|
||||
.
|
||||
.
|
||||
|
||||
If a
|
||||
subclass (plugin) itself does not implement a particular function, Wic
|
||||
locates and uses the default version in the superclass. It is for this
|
||||
reason that all source plugins are derived from the ``SourcePlugin``
|
||||
class.
|
||||
|
||||
The ``SourcePlugin`` class defined in the ``pluginbase.py`` file defines
|
||||
a set of methods that source plugins can implement or override. Any
|
||||
plugins (subclass of ``SourcePlugin``) that do not implement a
|
||||
particular method inherit the implementation of the method from the
|
||||
``SourcePlugin`` class. For more information, see the ``SourcePlugin``
|
||||
class in the ``pluginbase.py`` file for details:
|
||||
|
||||
The following list describes the methods implemented in the
|
||||
``SourcePlugin`` class:
|
||||
|
||||
- ``do_prepare_partition()``: Called to populate a partition with
|
||||
actual content. In other words, the method prepares the final
|
||||
partition image that is incorporated into the disk image.
|
||||
|
||||
- ``do_configure_partition()``: Called before
|
||||
``do_prepare_partition()`` to create custom configuration files for a
|
||||
partition (e.g. syslinux or grub configuration files).
|
||||
|
||||
- ``do_install_disk()``: Called after all partitions have been
|
||||
prepared and assembled into a disk image. This method provides a hook
|
||||
to allow finalization of a disk image (e.g. writing an MBR).
|
||||
|
||||
- ``do_stage_partition()``: Special content-staging hook called
|
||||
before ``do_prepare_partition()``. This method is normally empty.
|
||||
|
||||
Typically, a partition just uses the passed-in parameters (e.g. the
|
||||
unmodified value of ``bootimg_dir``). However, in some cases, things
|
||||
might need to be more tailored. As an example, certain files might
|
||||
additionally need to be taken from ``bootimg_dir + /boot``. This hook
|
||||
allows those files to be staged in a customized fashion.
|
||||
|
||||
.. note::
|
||||
|
||||
``get_bitbake_var()`` allows you to access non-standard variables that
|
||||
you might want to use for this behavior.
|
||||
|
||||
You can extend the source plugin mechanism. To add more hooks, create
|
||||
more source plugin methods within ``SourcePlugin`` and the corresponding
|
||||
derived subclasses. The code that calls the plugin methods uses the
|
||||
``plugin.get_source_plugin_methods()`` function to find the method or
|
||||
methods needed by the call. Retrieval of those methods is accomplished
|
||||
by filling up a dict with keys that contain the method names of
|
||||
interest. On success, these will be filled in with the actual methods.
|
||||
See the Wic implementation for examples and details.
|
||||
|
||||
Wic Examples
|
||||
============
|
||||
|
||||
This section provides several examples that show how to use the Wic
|
||||
utility. All the examples assume the list of requirements in the
|
||||
":ref:`dev-manual/wic:requirements`" section have been met. The
|
||||
examples assume the previously generated image is
|
||||
``core-image-minimal``.
|
||||
|
||||
Generate an Image using an Existing Kickstart File
|
||||
--------------------------------------------------
|
||||
|
||||
This example runs in Cooked Mode and uses the ``mkefidisk`` kickstart
|
||||
file::
|
||||
|
||||
$ wic create mkefidisk -e core-image-minimal
|
||||
INFO: Building wic-tools...
|
||||
.
|
||||
.
|
||||
.
|
||||
INFO: The new image(s) can be found here:
|
||||
./mkefidisk-201804191017-sda.direct
|
||||
|
||||
The following build artifacts were used to create the image(s):
|
||||
ROOTFS_DIR: /home/stephano/yocto/build/tmp-glibc/work/qemux86-oe-linux/core-image-minimal/1.0-r0/rootfs
|
||||
BOOTIMG_DIR: /home/stephano/yocto/build/tmp-glibc/work/qemux86-oe-linux/core-image-minimal/1.0-r0/recipe-sysroot/usr/share
|
||||
KERNEL_DIR: /home/stephano/yocto/build/tmp-glibc/deploy/images/qemux86
|
||||
NATIVE_SYSROOT: /home/stephano/yocto/build/tmp-glibc/work/i586-oe-linux/wic-tools/1.0-r0/recipe-sysroot-native
|
||||
|
||||
INFO: The image(s) were created using OE kickstart file:
|
||||
/home/stephano/yocto/openembedded-core/scripts/lib/wic/canned-wks/mkefidisk.wks
|
||||
|
||||
The previous example shows the easiest way to create an image by running
|
||||
in cooked mode and supplying a kickstart file and the "-e" option to
|
||||
point to the existing build artifacts. Your ``local.conf`` file needs to
|
||||
have the :term:`MACHINE` variable set
|
||||
to the machine you are using, which is "qemux86" in this example.
|
||||
|
||||
Once the image builds, the output provides image location, artifact use,
|
||||
and kickstart file information.
|
||||
|
||||
.. note::
|
||||
|
||||
You should always verify the details provided in the output to make
|
||||
sure that the image was indeed created exactly as expected.
|
||||
|
||||
Continuing with the example, you can now write the image from the
|
||||
:term:`Build Directory` onto a USB stick, or whatever media for which you
|
||||
built your image, and boot from the media. You can write the image by using
|
||||
``bmaptool`` or ``dd``::
|
||||
|
||||
$ oe-run-native bmap-tools-native bmaptool copy mkefidisk-201804191017-sda.direct /dev/sdX
|
||||
|
||||
or ::
|
||||
|
||||
$ sudo dd if=mkefidisk-201804191017-sda.direct of=/dev/sdX
|
||||
|
||||
.. note::
|
||||
|
||||
For more information on how to use the ``bmaptool``
|
||||
to flash a device with an image, see the
|
||||
":ref:`dev-manual/bmaptool:flashing images using \`\`bmaptool\`\``"
|
||||
section.
|
||||
|
||||
Using a Modified Kickstart File
|
||||
-------------------------------
|
||||
|
||||
Because partitioned image creation is driven by the kickstart file, it
|
||||
is easy to affect image creation by changing the parameters in the file.
|
||||
This next example demonstrates that through modification of the
|
||||
``directdisk-gpt`` kickstart file.
|
||||
|
||||
As mentioned earlier, you can use the command ``wic list images`` to
|
||||
show the list of existing kickstart files. The directory in which the
|
||||
``directdisk-gpt.wks`` file resides is
|
||||
``scripts/lib/image/canned-wks/``, which is located in the
|
||||
:term:`Source Directory` (e.g. ``poky``).
|
||||
Because available files reside in this directory, you can create and add
|
||||
your own custom files to the directory. Subsequent use of the
|
||||
``wic list images`` command would then include your kickstart files.
|
||||
|
||||
In this example, the existing ``directdisk-gpt`` file already does most
|
||||
of what is needed. However, for the hardware in this example, the image
|
||||
will need to boot from ``sdb`` instead of ``sda``, which is what the
|
||||
``directdisk-gpt`` kickstart file uses.
|
||||
|
||||
The example begins by making a copy of the ``directdisk-gpt.wks`` file
|
||||
in the ``scripts/lib/image/canned-wks`` directory and then by changing
|
||||
the lines that specify the target disk from which to boot::
|
||||
|
||||
$ cp /home/stephano/yocto/poky/scripts/lib/wic/canned-wks/directdisk-gpt.wks \
|
||||
/home/stephano/yocto/poky/scripts/lib/wic/canned-wks/directdisksdb-gpt.wks
|
||||
|
||||
Next, the example modifies the ``directdisksdb-gpt.wks`` file and
|
||||
changes all instances of "``--ondisk sda``" to "``--ondisk sdb``". The
|
||||
example changes the following two lines and leaves the remaining lines
|
||||
untouched::
|
||||
|
||||
part /boot --source bootimg-pcbios --ondisk sdb --label boot --active --align 1024
|
||||
part / --source rootfs --ondisk sdb --fstype=ext4 --label platform --align 1024 --use-uuid
|
||||
|
||||
Once the lines are changed, the
|
||||
example generates the ``directdisksdb-gpt`` image. The command points
|
||||
the process at the ``core-image-minimal`` artifacts for the Next Unit of
|
||||
Computing (nuc) :term:`MACHINE` the
|
||||
``local.conf``::
|
||||
|
||||
$ wic create directdisksdb-gpt -e core-image-minimal
|
||||
INFO: Building wic-tools...
|
||||
.
|
||||
.
|
||||
.
|
||||
Initialising tasks: 100% |#######################################| Time: 0:00:01
|
||||
NOTE: Executing SetScene Tasks
|
||||
NOTE: Executing RunQueue Tasks
|
||||
NOTE: Tasks Summary: Attempted 1161 tasks of which 1157 didn't need to be rerun and all succeeded.
|
||||
INFO: Creating image(s)...
|
||||
|
||||
INFO: The new image(s) can be found here:
|
||||
./directdisksdb-gpt-201710090938-sdb.direct
|
||||
|
||||
The following build artifacts were used to create the image(s):
|
||||
ROOTFS_DIR: /home/stephano/yocto/build/tmp-glibc/work/qemux86-oe-linux/core-image-minimal/1.0-r0/rootfs
|
||||
BOOTIMG_DIR: /home/stephano/yocto/build/tmp-glibc/work/qemux86-oe-linux/core-image-minimal/1.0-r0/recipe-sysroot/usr/share
|
||||
KERNEL_DIR: /home/stephano/yocto/build/tmp-glibc/deploy/images/qemux86
|
||||
NATIVE_SYSROOT: /home/stephano/yocto/build/tmp-glibc/work/i586-oe-linux/wic-tools/1.0-r0/recipe-sysroot-native
|
||||
|
||||
INFO: The image(s) were created using OE kickstart file:
|
||||
/home/stephano/yocto/poky/scripts/lib/wic/canned-wks/directdisksdb-gpt.wks
|
||||
|
||||
Continuing with the example, you can now directly ``dd`` the image to a
|
||||
USB stick, or whatever media for which you built your image, and boot
|
||||
the resulting media::
|
||||
|
||||
$ sudo dd if=directdisksdb-gpt-201710090938-sdb.direct of=/dev/sdb
|
||||
140966+0 records in
|
||||
140966+0 records out
|
||||
72174592 bytes (72 MB, 69 MiB) copied, 78.0282 s, 925 kB/s
|
||||
$ sudo eject /dev/sdb
|
||||
|
||||
Using a Modified Kickstart File and Running in Raw Mode
|
||||
-------------------------------------------------------
|
||||
|
||||
This next example manually specifies each build artifact (runs in Raw
|
||||
Mode) and uses a modified kickstart file. The example also uses the
|
||||
``-o`` option to cause Wic to create the output somewhere other than the
|
||||
default output directory, which is the current directory::
|
||||
|
||||
$ wic create test.wks -o /home/stephano/testwic \
|
||||
--rootfs-dir /home/stephano/yocto/build/tmp/work/qemux86-poky-linux/core-image-minimal/1.0-r0/rootfs \
|
||||
--bootimg-dir /home/stephano/yocto/build/tmp/work/qemux86-poky-linux/core-image-minimal/1.0-r0/recipe-sysroot/usr/share \
|
||||
--kernel-dir /home/stephano/yocto/build/tmp/deploy/images/qemux86 \
|
||||
--native-sysroot /home/stephano/yocto/build/tmp/work/i586-poky-linux/wic-tools/1.0-r0/recipe-sysroot-native
|
||||
|
||||
INFO: Creating image(s)...
|
||||
|
||||
INFO: The new image(s) can be found here:
|
||||
/home/stephano/testwic/test-201710091445-sdb.direct
|
||||
|
||||
The following build artifacts were used to create the image(s):
|
||||
ROOTFS_DIR: /home/stephano/yocto/build/tmp-glibc/work/qemux86-oe-linux/core-image-minimal/1.0-r0/rootfs
|
||||
BOOTIMG_DIR: /home/stephano/yocto/build/tmp-glibc/work/qemux86-oe-linux/core-image-minimal/1.0-r0/recipe-sysroot/usr/share
|
||||
KERNEL_DIR: /home/stephano/yocto/build/tmp-glibc/deploy/images/qemux86
|
||||
NATIVE_SYSROOT: /home/stephano/yocto/build/tmp-glibc/work/i586-oe-linux/wic-tools/1.0-r0/recipe-sysroot-native
|
||||
|
||||
INFO: The image(s) were created using OE kickstart file:
|
||||
test.wks
|
||||
|
||||
For this example,
|
||||
:term:`MACHINE` did not have to be
|
||||
specified in the ``local.conf`` file since the artifact is manually
|
||||
specified.
|
||||
|
||||
Using Wic to Manipulate an Image
|
||||
--------------------------------
|
||||
|
||||
Wic image manipulation allows you to shorten turnaround time during
|
||||
image development. For example, you can use Wic to delete the kernel
|
||||
partition of a Wic image and then insert a newly built kernel. This
|
||||
saves you time from having to rebuild the entire image each time you
|
||||
modify the kernel.
|
||||
|
||||
.. note::
|
||||
|
||||
In order to use Wic to manipulate a Wic image as in this example,
|
||||
your development machine must have the ``mtools`` package installed.
|
||||
|
||||
The following example examines the contents of the Wic image, deletes
|
||||
the existing kernel, and then inserts a new kernel:
|
||||
|
||||
#. *List the Partitions:* Use the ``wic ls`` command to list all the
|
||||
partitions in the Wic image::
|
||||
|
||||
$ wic ls tmp/deploy/images/qemux86/core-image-minimal-qemux86.wic
|
||||
Num Start End Size Fstype
|
||||
1 1048576 25041919 23993344 fat16
|
||||
2 25165824 72157183 46991360 ext4
|
||||
|
||||
The previous output shows two partitions in the
|
||||
``core-image-minimal-qemux86.wic`` image.
|
||||
|
||||
#. *Examine a Particular Partition:* Use the ``wic ls`` command again
|
||||
but in a different form to examine a particular partition.
|
||||
|
||||
.. note::
|
||||
|
||||
You can get command usage on any Wic command using the following
|
||||
form::
|
||||
|
||||
$ wic help command
|
||||
|
||||
|
||||
For example, the following command shows you the various ways to
|
||||
use the
|
||||
wic ls
|
||||
command::
|
||||
|
||||
$ wic help ls
|
||||
|
||||
|
||||
The following command shows what is in partition one::
|
||||
|
||||
$ wic ls tmp/deploy/images/qemux86/core-image-minimal-qemux86.wic:1
|
||||
Volume in drive : is boot
|
||||
Volume Serial Number is E894-1809
|
||||
Directory for ::/
|
||||
|
||||
libcom32 c32 186500 2017-10-09 16:06
|
||||
libutil c32 24148 2017-10-09 16:06
|
||||
syslinux cfg 220 2017-10-09 16:06
|
||||
vesamenu c32 27104 2017-10-09 16:06
|
||||
vmlinuz 6904608 2017-10-09 16:06
|
||||
5 files 7 142 580 bytes
|
||||
16 582 656 bytes free
|
||||
|
||||
The previous output shows five files, with the
|
||||
``vmlinuz`` being the kernel.
|
||||
|
||||
.. note::
|
||||
|
||||
If you see the following error, you need to update or create a
|
||||
``~/.mtoolsrc`` file and be sure to have the line "mtools_skip_check=1"
|
||||
in the file. Then, run the Wic command again::
|
||||
|
||||
ERROR: _exec_cmd: /usr/bin/mdir -i /tmp/wic-parttfokuwra ::/ returned '1' instead of 0
|
||||
output: Total number of sectors (47824) not a multiple of sectors per track (32)!
|
||||
Add mtools_skip_check=1 to your .mtoolsrc file to skip this test
|
||||
|
||||
|
||||
#. *Remove the Old Kernel:* Use the ``wic rm`` command to remove the
|
||||
``vmlinuz`` file (kernel)::
|
||||
|
||||
$ wic rm tmp/deploy/images/qemux86/core-image-minimal-qemux86.wic:1/vmlinuz
|
||||
|
||||
#. *Add In the New Kernel:* Use the ``wic cp`` command to add the
|
||||
updated kernel to the Wic image. Depending on how you built your
|
||||
kernel, it could be in different places. If you used ``devtool`` and
|
||||
an SDK to build your kernel, it resides in the ``tmp/work`` directory
|
||||
of the extensible SDK. If you used ``make`` to build the kernel, the
|
||||
kernel will be in the ``workspace/sources`` area.
|
||||
|
||||
The following example assumes ``devtool`` was used to build the
|
||||
kernel::
|
||||
|
||||
$ wic cp poky_sdk/tmp/work/qemux86-poky-linux/linux-yocto/4.12.12+git999-r0/linux-yocto-4.12.12+git999/arch/x86/boot/bzImage \
|
||||
poky/build/tmp/deploy/images/qemux86/core-image-minimal-qemux86.wic:1/vmlinuz
|
||||
|
||||
Once the new kernel is added back into the image, you can use the
|
||||
``dd`` command or :ref:`bmaptool
|
||||
<dev-manual/bmaptool:flashing images using \`\`bmaptool\`\`>`
|
||||
to flash your wic image onto an SD card or USB stick and test your
|
||||
target.
|
||||
|
||||
.. note::
|
||||
|
||||
Using ``bmaptool`` is generally 10 to 20 times faster than using ``dd``.
|
||||
|
||||
@@ -0,0 +1,54 @@
|
||||
.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
|
||||
|
||||
Using x32 psABI
|
||||
***************
|
||||
|
||||
x32 processor-specific Application Binary Interface (`x32
|
||||
psABI <https://software.intel.com/en-us/node/628948>`__) is a native
|
||||
32-bit processor-specific ABI for Intel 64 (x86-64) architectures. An
|
||||
ABI defines the calling conventions between functions in a processing
|
||||
environment. The interface determines what registers are used and what
|
||||
the sizes are for various C data types.
|
||||
|
||||
Some processing environments prefer using 32-bit applications even when
|
||||
running on Intel 64-bit platforms. Consider the i386 psABI, which is a
|
||||
very old 32-bit ABI for Intel 64-bit platforms. The i386 psABI does not
|
||||
provide efficient use and access of the Intel 64-bit processor
|
||||
resources, leaving the system underutilized. Now consider the x86_64
|
||||
psABI. This ABI is newer and uses 64-bits for data sizes and program
|
||||
pointers. The extra bits increase the footprint size of the programs,
|
||||
libraries, and also increases the memory and file system size
|
||||
requirements. Executing under the x32 psABI enables user programs to
|
||||
utilize CPU and system resources more efficiently while keeping the
|
||||
memory footprint of the applications low. Extra bits are used for
|
||||
registers but not for addressing mechanisms.
|
||||
|
||||
The Yocto Project supports the final specifications of x32 psABI as
|
||||
follows:
|
||||
|
||||
- You can create packages and images in x32 psABI format on x86_64
|
||||
architecture targets.
|
||||
|
||||
- You can successfully build recipes with the x32 toolchain.
|
||||
|
||||
- You can create and boot ``core-image-minimal`` and
|
||||
``core-image-sato`` images.
|
||||
|
||||
- There is RPM Package Manager (RPM) support for x32 binaries.
|
||||
|
||||
- There is support for large images.
|
||||
|
||||
To use the x32 psABI, you need to edit your ``conf/local.conf``
|
||||
configuration file as follows::
|
||||
|
||||
MACHINE = "qemux86-64"
|
||||
DEFAULTTUNE = "x86-64-x32"
|
||||
baselib = "${@d.getVar('BASE_LIB:tune-' + (d.getVar('DEFAULTTUNE') \
|
||||
or 'INVALID')) or 'lib'}"
|
||||
|
||||
Once you have set
|
||||
up your configuration file, use BitBake to build an image that supports
|
||||
the x32 psABI. Here is an example::
|
||||
|
||||
$ bitbake core-image-sato
|
||||
|
||||