2043 lines
98 KiB
XML
2043 lines
98 KiB
XML
<!DOCTYPE chapter PUBLIC "-//OASIS//DTD DocBook XML V4.2//EN"
|
|
"http://www.oasis-open.org/docbook/xml/4.2/docbookx.dtd"
|
|
[<!ENTITY % poky SYSTEM "../poky.ent"> %poky; ] >
|
|
|
|
<chapter id='technical-details'>
|
|
<title>Technical Details</title>
|
|
|
|
<para>
|
|
This chapter provides technical details for various parts of the
|
|
Yocto Project.
|
|
Currently, topics include Yocto Project components,
|
|
cross-toolchain generation, shared state (sstate) cache,
|
|
x32, Wayland support, and Licenses.
|
|
</para>
|
|
|
|
<section id='usingpoky-components'>
|
|
<title>Yocto Project Components</title>
|
|
|
|
<para>
|
|
The
|
|
<link linkend='bitbake-term'>BitBake</link>
|
|
task executor together with various types of configuration files form
|
|
the OpenEmbedded Core.
|
|
This section overviews these components by describing their use and
|
|
how they interact.
|
|
</para>
|
|
|
|
<para>
|
|
BitBake handles the parsing and execution of the data files.
|
|
The data itself is of various types:
|
|
<itemizedlist>
|
|
<listitem><para><emphasis>Recipes:</emphasis> Provides details
|
|
about particular pieces of software.
|
|
</para></listitem>
|
|
<listitem><para><emphasis>Class Data:</emphasis> Abstracts
|
|
common build information (e.g. how to build a Linux kernel).
|
|
</para></listitem>
|
|
<listitem><para><emphasis>Configuration Data:</emphasis> Defines
|
|
machine-specific settings, policy decisions, and so forth.
|
|
Configuration data acts as the glue to bind everything
|
|
together.
|
|
</para></listitem>
|
|
</itemizedlist>
|
|
</para>
|
|
|
|
<para>
|
|
BitBake knows how to combine multiple data sources together and refers
|
|
to each data source as a layer.
|
|
For information on layers, see the
|
|
"<ulink url='&YOCTO_DOCS_DEV_URL;#understanding-and-creating-layers'>Understanding and
|
|
Creating Layers</ulink>" section of the Yocto Project Development
|
|
Tasks Manual.
|
|
</para>
|
|
|
|
<para>
|
|
Following are some brief details on these core components.
|
|
For additional information on how these components interact during
|
|
a build, see the
|
|
"<link linkend='development-concepts'>Development Concepts</link>"
|
|
section.
|
|
</para>
|
|
|
|
<section id='usingpoky-components-bitbake'>
|
|
<title>BitBake</title>
|
|
|
|
<para>
|
|
BitBake is the tool at the heart of the OpenEmbedded build system
|
|
and is responsible for parsing the
|
|
<link linkend='metadata'>Metadata</link>,
|
|
generating a list of tasks from it, and then executing those tasks.
|
|
</para>
|
|
|
|
<para>
|
|
This section briefly introduces BitBake.
|
|
If you want more information on BitBake, see the
|
|
<ulink url='&YOCTO_DOCS_BB_URL;#bitbake-user-manual'>BitBake User Manual</ulink>.
|
|
</para>
|
|
|
|
<para>
|
|
To see a list of the options BitBake supports, use either of
|
|
the following commands:
|
|
<literallayout class='monospaced'>
|
|
$ bitbake -h
|
|
$ bitbake --help
|
|
</literallayout>
|
|
</para>
|
|
|
|
<para>
|
|
The most common usage for BitBake is <filename>bitbake <replaceable>packagename</replaceable></filename>, where
|
|
<filename>packagename</filename> is the name of the package you want to build
|
|
(referred to as the "target" in this manual).
|
|
The target often equates to the first part of a recipe's filename
|
|
(e.g. "foo" for a recipe named
|
|
<filename>foo_1.3.0-r0.bb</filename>).
|
|
So, to process the <filename>matchbox-desktop_1.2.3.bb</filename> recipe file, you
|
|
might type the following:
|
|
<literallayout class='monospaced'>
|
|
$ bitbake matchbox-desktop
|
|
</literallayout>
|
|
Several different versions of <filename>matchbox-desktop</filename> might exist.
|
|
BitBake chooses the one selected by the distribution configuration.
|
|
You can get more details about how BitBake chooses between different
|
|
target versions and providers in the
|
|
"<ulink url='&YOCTO_DOCS_BB_URL;#bb-bitbake-preferences'>Preferences</ulink>"
|
|
section of the BitBake User Manual.
|
|
</para>
|
|
|
|
<para>
|
|
BitBake also tries to execute any dependent tasks first.
|
|
So for example, before building <filename>matchbox-desktop</filename>, BitBake
|
|
would build a cross compiler and <filename>glibc</filename> if they had not already
|
|
been built.
|
|
</para>
|
|
|
|
<para>
|
|
A useful BitBake option to consider is the <filename>-k</filename> or
|
|
<filename>--continue</filename> option.
|
|
This option instructs BitBake to try and continue processing the job
|
|
as long as possible even after encountering an error.
|
|
When an error occurs, the target that
|
|
failed and those that depend on it cannot be remade.
|
|
However, when you use this option other dependencies can still be
|
|
processed.
|
|
</para>
|
|
</section>
|
|
|
|
<section id='usingpoky-components-metadata'>
|
|
<title>Metadata (Recipes)</title>
|
|
|
|
<para>
|
|
Files that have the <filename>.bb</filename> suffix are "recipes"
|
|
files.
|
|
In general, a recipe contains information about a single piece of
|
|
software.
|
|
This information includes the location from which to download the
|
|
unaltered source, any source patches to be applied to that source
|
|
(if needed), which special configuration options to apply,
|
|
how to compile the source files, and how to package the compiled
|
|
output.
|
|
</para>
|
|
|
|
<para>
|
|
The term "package" is sometimes used to refer to recipes. However,
|
|
since the word "package" is used for the packaged output from the OpenEmbedded
|
|
build system (i.e. <filename>.ipk</filename> or <filename>.deb</filename> files),
|
|
this document avoids using the term "package" when referring to recipes.
|
|
</para>
|
|
</section>
|
|
|
|
<section id='metadata-virtual-providers'>
|
|
<title>Metadata (Virtual Providers)</title>
|
|
|
|
<para>
|
|
Prior to the build, if you know that several different recipes
|
|
provide the same functionality, you can use a virtual provider
|
|
(i.e. <filename>virtual/*</filename>) as a placeholder for the
|
|
actual provider.
|
|
The actual provider would be determined at build
|
|
time.
|
|
In this case, you should add <filename>virtual/*</filename>
|
|
to <link linkend='var-DEPENDS'><filename>DEPENDS</filename></link>,
|
|
rather than listing the specified provider.
|
|
You would select the actual provider by setting the
|
|
<link linkend='var-PREFERRED_PROVIDER'><filename>PREFERRED_PROVIDER</filename></link>
|
|
variable (i.e. <filename>PREFERRED_PROVIDER_virtual/*</filename>)
|
|
in the build's configuration file (e.g.
|
|
<filename>poky/build/conf/local.conf</filename>).
|
|
<note>
|
|
Any recipe that PROVIDES a <filename>virtual/*</filename> item
|
|
that is ultimately not selected through
|
|
<filename>PREFERRED_PROVIDER</filename> does not get built.
|
|
Preventing these recipes from building is usually the desired
|
|
behavior since this mechanism's purpose is to select between
|
|
mutually exclusive alternative providers.
|
|
</note>
|
|
</para>
|
|
|
|
<para>
|
|
The following lists specific examples of virtual providers:
|
|
<itemizedlist>
|
|
<listitem><para>
|
|
<filename>virtual/mesa</filename>:
|
|
Provides <filename>gbm.pc</filename>.
|
|
</para></listitem>
|
|
<listitem><para>
|
|
<filename>virtual/egl</filename>:
|
|
Provides <filename>egl.pc</filename> and possibly
|
|
<filename>wayland-egl.pc</filename>.
|
|
</para></listitem>
|
|
<listitem><para>
|
|
<filename>virtual/libgl</filename>:
|
|
Provides <filename>gl.pc</filename> (i.e. libGL).
|
|
</para></listitem>
|
|
<listitem><para>
|
|
<filename>virtual/libgles1</filename>:
|
|
Provides <filename>glesv1_cm.pc</filename>
|
|
(i.e. libGLESv1_CM).
|
|
</para></listitem>
|
|
<listitem><para>
|
|
<filename>virtual/libgles2</filename>:
|
|
Provides <filename>glesv2.pc</filename> (i.e. libGLESv2).
|
|
</para></listitem>
|
|
</itemizedlist>
|
|
</para>
|
|
</section>
|
|
|
|
<section id='usingpoky-components-classes'>
|
|
<title>Classes</title>
|
|
|
|
<para>
|
|
Class files (<filename>.bbclass</filename>) contain information that
|
|
is useful to share between
|
|
<link linkend='metadata'>Metadata</link> files.
|
|
An example is the
|
|
<link linkend='ref-classes-autotools'><filename>autotools</filename></link>
|
|
class, which contains common settings for any application that
|
|
Autotools uses.
|
|
The "<link linkend='ref-classes'>Classes</link>" chapter provides
|
|
details about classes and how to use them.
|
|
</para>
|
|
</section>
|
|
|
|
<section id='usingpoky-components-configuration'>
|
|
<title>Configuration</title>
|
|
|
|
<para>
|
|
The configuration files (<filename>.conf</filename>) define various configuration variables
|
|
that govern the OpenEmbedded build process.
|
|
These files fall into several areas that define machine configuration options,
|
|
distribution configuration options, compiler tuning options, general common configuration
|
|
options, and user configuration options in <filename>local.conf</filename>, which is found
|
|
in the
|
|
<link linkend='build-directory'>Build Directory</link>.
|
|
</para>
|
|
</section>
|
|
</section>
|
|
|
|
<section id="cross-development-toolchain-generation">
|
|
<title>Cross-Development Toolchain Generation</title>
|
|
|
|
<para>
|
|
The Yocto Project does most of the work for you when it comes to
|
|
creating
|
|
<link linkend='cross-development-toolchain'>cross-development toolchains</link>.
|
|
This section provides some technical background on how
|
|
cross-development toolchains are created and used.
|
|
For more information on toolchains, you can also see the
|
|
<ulink url='&YOCTO_DOCS_SDK_URL;'>Yocto Project Application Development and the Extensible Software Development Kit (eSDK)</ulink>
|
|
manual.
|
|
</para>
|
|
|
|
<para>
|
|
In the Yocto Project development environment, cross-development
|
|
toolchains are used to build the image and applications that run on the
|
|
target hardware.
|
|
With just a few commands, the OpenEmbedded build system creates
|
|
these necessary toolchains for you.
|
|
</para>
|
|
|
|
<para>
|
|
The following figure shows a high-level build environment regarding
|
|
toolchain construction and use.
|
|
</para>
|
|
|
|
<para>
|
|
<imagedata fileref="figures/cross-development-toolchains.png" width="8in" depth="6in" align="center" />
|
|
</para>
|
|
|
|
<para>
|
|
Most of the work occurs on the Build Host.
|
|
This is the machine used to build images and generally work within the
|
|
the Yocto Project environment.
|
|
When you run BitBake to create an image, the OpenEmbedded build system
|
|
uses the host <filename>gcc</filename> compiler to bootstrap a
|
|
cross-compiler named <filename>gcc-cross</filename>.
|
|
The <filename>gcc-cross</filename> compiler is what BitBake uses to
|
|
compile source files when creating the target image.
|
|
You can think of <filename>gcc-cross</filename> simply as an
|
|
automatically generated cross-compiler that is used internally within
|
|
BitBake only.
|
|
<note>
|
|
The extensible SDK does not use
|
|
<filename>gcc-cross-canadian</filename> since this SDK
|
|
ships a copy of the OpenEmbedded build system and the sysroot
|
|
within it contains <filename>gcc-cross</filename>.
|
|
</note>
|
|
</para>
|
|
|
|
<para>
|
|
The chain of events that occurs when <filename>gcc-cross</filename> is
|
|
bootstrapped is as follows:
|
|
<literallayout class='monospaced'>
|
|
gcc -> binutils-cross -> gcc-cross-initial -> linux-libc-headers -> glibc-initial -> glibc -> gcc-cross -> gcc-runtime
|
|
</literallayout>
|
|
<itemizedlist>
|
|
<listitem><para><filename>gcc</filename>:
|
|
The build host's GNU Compiler Collection (GCC).
|
|
</para></listitem>
|
|
<listitem><para><filename>binutils-cross</filename>:
|
|
The bare minimum binary utilities needed in order to run
|
|
the <filename>gcc-cross-initial</filename> phase of the
|
|
bootstrap operation.
|
|
</para></listitem>
|
|
<listitem><para><filename>gcc-cross-initial</filename>:
|
|
An early stage of the bootstrap process for creating
|
|
the cross-compiler.
|
|
This stage builds enough of the <filename>gcc-cross</filename>,
|
|
the C library, and other pieces needed to finish building the
|
|
final cross-compiler in later stages.
|
|
This tool is a "native" package (i.e. it is designed to run on
|
|
the build host).
|
|
</para></listitem>
|
|
<listitem><para><filename>linux-libc-headers</filename>:
|
|
Headers needed for the cross-compiler.
|
|
</para></listitem>
|
|
<listitem><para><filename>glibc-initial</filename>:
|
|
An initial version of the Embedded GLIBC needed to bootstrap
|
|
<filename>glibc</filename>.
|
|
</para></listitem>
|
|
<listitem><para><filename>gcc-cross</filename>:
|
|
The final stage of the bootstrap process for the
|
|
cross-compiler.
|
|
This stage results in the actual cross-compiler that
|
|
BitBake uses when it builds an image for a targeted
|
|
device.
|
|
<note>
|
|
If you are replacing this cross compiler toolchain
|
|
with a custom version, you must replace
|
|
<filename>gcc-cross</filename>.
|
|
</note>
|
|
This tool is also a "native" package (i.e. it is
|
|
designed to run on the build host).
|
|
</para></listitem>
|
|
<listitem><para><filename>gcc-runtime</filename>:
|
|
Runtime libraries resulting from the toolchain bootstrapping
|
|
process.
|
|
This tool produces a binary that consists of the
|
|
runtime libraries need for the targeted device.
|
|
</para></listitem>
|
|
</itemizedlist>
|
|
</para>
|
|
|
|
<para>
|
|
You can use the OpenEmbedded build system to build an installer for
|
|
the relocatable SDK used to develop applications.
|
|
When you run the installer, it installs the toolchain, which contains
|
|
the development tools (e.g., the
|
|
<filename>gcc-cross-canadian</filename>),
|
|
<filename>binutils-cross-canadian</filename>, and other
|
|
<filename>nativesdk-*</filename> tools,
|
|
which are tools native to the SDK (i.e. native to
|
|
<link linkend='var-SDK_ARCH'><filename>SDK_ARCH</filename></link>),
|
|
you need to cross-compile and test your software.
|
|
The figure shows the commands you use to easily build out this
|
|
toolchain.
|
|
This cross-development toolchain is built to execute on the
|
|
<link linkend='var-SDKMACHINE'><filename>SDKMACHINE</filename></link>,
|
|
which might or might not be the same
|
|
machine as the Build Host.
|
|
<note>
|
|
If your target architecture is supported by the Yocto Project,
|
|
you can take advantage of pre-built images that ship with the
|
|
Yocto Project and already contain cross-development toolchain
|
|
installers.
|
|
</note>
|
|
</para>
|
|
|
|
<para>
|
|
Here is the bootstrap process for the relocatable toolchain:
|
|
<literallayout class='monospaced'>
|
|
gcc -> binutils-crosssdk -> gcc-crosssdk-initial -> linux-libc-headers ->
|
|
glibc-initial -> nativesdk-glibc -> gcc-crosssdk -> gcc-cross-canadian
|
|
</literallayout>
|
|
<itemizedlist>
|
|
<listitem><para><filename>gcc</filename>:
|
|
The build host's GNU Compiler Collection (GCC).
|
|
</para></listitem>
|
|
<listitem><para><filename>binutils-crosssdk</filename>:
|
|
The bare minimum binary utilities needed in order to run
|
|
the <filename>gcc-crosssdk-initial</filename> phase of the
|
|
bootstrap operation.
|
|
</para></listitem>
|
|
<listitem><para><filename>gcc-crosssdk-initial</filename>:
|
|
An early stage of the bootstrap process for creating
|
|
the cross-compiler.
|
|
This stage builds enough of the
|
|
<filename>gcc-crosssdk</filename> and supporting pieces so that
|
|
the final stage of the bootstrap process can produce the
|
|
finished cross-compiler.
|
|
This tool is a "native" binary that runs on the build host.
|
|
</para></listitem>
|
|
<listitem><para><filename>linux-libc-headers</filename>:
|
|
Headers needed for the cross-compiler.
|
|
</para></listitem>
|
|
<listitem><para><filename>glibc-initial</filename>:
|
|
An initial version of the Embedded GLIBC needed to bootstrap
|
|
<filename>nativesdk-glibc</filename>.
|
|
</para></listitem>
|
|
<listitem><para><filename>nativesdk-glibc</filename>:
|
|
The Embedded GLIBC needed to bootstrap the
|
|
<filename>gcc-crosssdk</filename>.
|
|
</para></listitem>
|
|
<listitem><para><filename>gcc-crosssdk</filename>:
|
|
The final stage of the bootstrap process for the
|
|
relocatable cross-compiler.
|
|
The <filename>gcc-crosssdk</filename> is a transitory compiler
|
|
and never leaves the build host.
|
|
Its purpose is to help in the bootstrap process to create the
|
|
eventual relocatable <filename>gcc-cross-canadian</filename>
|
|
compiler, which is relocatable.
|
|
This tool is also a "native" package (i.e. it is
|
|
designed to run on the build host).
|
|
</para></listitem>
|
|
<listitem><para><filename>gcc-cross-canadian</filename>:
|
|
The final relocatable cross-compiler.
|
|
When run on the
|
|
<link linkend='var-SDKMACHINE'><filename>SDKMACHINE</filename></link>,
|
|
this tool
|
|
produces executable code that runs on the target device.
|
|
Only one cross-canadian compiler is produced per architecture
|
|
since they can be targeted at different processor optimizations
|
|
using configurations passed to the compiler through the
|
|
compile commands.
|
|
This circumvents the need for multiple compilers and thus
|
|
reduces the size of the toolchains.
|
|
</para></listitem>
|
|
</itemizedlist>
|
|
</para>
|
|
|
|
<note>
|
|
For information on advantages gained when building a
|
|
cross-development toolchain installer, see the
|
|
"<ulink url='&YOCTO_DOCS_SDK_URL;#sdk-building-an-sdk-installer'>Building an SDK Installer</ulink>"
|
|
section in the Yocto Project Application Development and the
|
|
Extensible Software Development Kit (eSDK) manual.
|
|
</note>
|
|
</section>
|
|
|
|
<section id="shared-state-cache">
|
|
<title>Shared State Cache</title>
|
|
|
|
<para>
|
|
By design, the OpenEmbedded build system builds everything from scratch unless
|
|
BitBake can determine that parts do not need to be rebuilt.
|
|
Fundamentally, building from scratch is attractive as it means all parts are
|
|
built fresh and there is no possibility of stale data causing problems.
|
|
When developers hit problems, they typically default back to building from scratch
|
|
so they know the state of things from the start.
|
|
</para>
|
|
|
|
<para>
|
|
Building an image from scratch is both an advantage and a disadvantage to the process.
|
|
As mentioned in the previous paragraph, building from scratch ensures that
|
|
everything is current and starts from a known state.
|
|
However, building from scratch also takes much longer as it generally means
|
|
rebuilding things that do not necessarily need to be rebuilt.
|
|
</para>
|
|
|
|
<para>
|
|
The Yocto Project implements shared state code that supports incremental builds.
|
|
The implementation of the shared state code answers the following questions that
|
|
were fundamental roadblocks within the OpenEmbedded incremental build support system:
|
|
<itemizedlist>
|
|
<listitem><para>What pieces of the system have changed and what pieces have
|
|
not changed?</para></listitem>
|
|
<listitem><para>How are changed pieces of software removed and replaced?</para></listitem>
|
|
<listitem><para>How are pre-built components that do not need to be rebuilt from scratch
|
|
used when they are available?</para></listitem>
|
|
</itemizedlist>
|
|
</para>
|
|
|
|
<para>
|
|
For the first question, the build system detects changes in the "inputs" to a given task by
|
|
creating a checksum (or signature) of the task's inputs.
|
|
If the checksum changes, the system assumes the inputs have changed and the task needs to be
|
|
rerun.
|
|
For the second question, the shared state (sstate) code tracks which tasks add which output
|
|
to the build process.
|
|
This means the output from a given task can be removed, upgraded or otherwise manipulated.
|
|
The third question is partly addressed by the solution for the second question
|
|
assuming the build system can fetch the sstate objects from remote locations and
|
|
install them if they are deemed to be valid.
|
|
</para>
|
|
|
|
<note>
|
|
The OpenEmbedded build system does not maintain
|
|
<link linkend='var-PR'><filename>PR</filename></link> information
|
|
as part of the shared state packages.
|
|
Consequently, considerations exist that affect maintaining shared
|
|
state feeds.
|
|
For information on how the OpenEmbedded build system
|
|
works with packages and can
|
|
track incrementing <filename>PR</filename> information, see the
|
|
"<ulink url='&YOCTO_DOCS_DEV_URL;#automatically-incrementing-a-binary-package-revision-number'>Automatically Incrementing a Binary Package Revision Number</ulink>"
|
|
section in the Yocto Project Development Tasks Manual.
|
|
</note>
|
|
|
|
<para>
|
|
The rest of this section goes into detail about the overall incremental build
|
|
architecture, the checksums (signatures), shared state, and some tips and tricks.
|
|
</para>
|
|
|
|
<section id='overall-architecture'>
|
|
<title>Overall Architecture</title>
|
|
|
|
<para>
|
|
When determining what parts of the system need to be built, BitBake
|
|
works on a per-task basis rather than a per-recipe basis.
|
|
You might wonder why using a per-task basis is preferred over a per-recipe basis.
|
|
To help explain, consider having the IPK packaging backend enabled and then switching to DEB.
|
|
In this case, the
|
|
<link linkend='ref-tasks-install'><filename>do_install</filename></link>
|
|
and
|
|
<link linkend='ref-tasks-package'><filename>do_package</filename></link>
|
|
task outputs are still valid.
|
|
However, with a per-recipe approach, the build would not include the
|
|
<filename>.deb</filename> files.
|
|
Consequently, you would have to invalidate the whole build and rerun it.
|
|
Rerunning everything is not the best solution.
|
|
Also, in this case, the core must be "taught" much about specific tasks.
|
|
This methodology does not scale well and does not allow users to easily add new tasks
|
|
in layers or as external recipes without touching the packaged-staging core.
|
|
</para>
|
|
</section>
|
|
|
|
<section id='checksums'>
|
|
<title>Checksums (Signatures)</title>
|
|
|
|
<para>
|
|
The shared state code uses a checksum, which is a unique signature of a task's
|
|
inputs, to determine if a task needs to be run again.
|
|
Because it is a change in a task's inputs that triggers a rerun, the process
|
|
needs to detect all the inputs to a given task.
|
|
For shell tasks, this turns out to be fairly easy because
|
|
the build process generates a "run" shell script for each task and
|
|
it is possible to create a checksum that gives you a good idea of when
|
|
the task's data changes.
|
|
</para>
|
|
|
|
<para>
|
|
To complicate the problem, there are things that should not be
|
|
included in the checksum.
|
|
First, there is the actual specific build path of a given task -
|
|
the <link linkend='var-WORKDIR'><filename>WORKDIR</filename></link>.
|
|
It does not matter if the work directory changes because it should
|
|
not affect the output for target packages.
|
|
Also, the build process has the objective of making native
|
|
or cross packages relocatable.
|
|
<note>
|
|
Both native and cross packages run on the build host.
|
|
However, cross packages generate output for the target
|
|
architecture.
|
|
</note>
|
|
The checksum therefore needs to exclude
|
|
<filename>WORKDIR</filename>.
|
|
The simplistic approach for excluding the work directory is to set
|
|
<filename>WORKDIR</filename> to some fixed value and create the
|
|
checksum for the "run" script.
|
|
</para>
|
|
|
|
<para>
|
|
Another problem results from the "run" scripts containing functions that
|
|
might or might not get called.
|
|
The incremental build solution contains code that figures out dependencies
|
|
between shell functions.
|
|
This code is used to prune the "run" scripts down to the minimum set,
|
|
thereby alleviating this problem and making the "run" scripts much more
|
|
readable as a bonus.
|
|
</para>
|
|
|
|
<para>
|
|
So far we have solutions for shell scripts.
|
|
What about Python tasks?
|
|
The same approach applies even though these tasks are more difficult.
|
|
The process needs to figure out what variables a Python function accesses
|
|
and what functions it calls.
|
|
Again, the incremental build solution contains code that first figures out
|
|
the variable and function dependencies, and then creates a checksum for the data
|
|
used as the input to the task.
|
|
</para>
|
|
|
|
<para>
|
|
Like the <filename>WORKDIR</filename> case, situations exist where dependencies
|
|
should be ignored.
|
|
For these cases, you can instruct the build process to ignore a dependency
|
|
by using a line like the following:
|
|
<literallayout class='monospaced'>
|
|
PACKAGE_ARCHS[vardepsexclude] = "MACHINE"
|
|
</literallayout>
|
|
This example ensures that the
|
|
<link linkend='var-PACKAGE_ARCHS'><filename>PACKAGE_ARCHS</filename></link>
|
|
variable does not
|
|
depend on the value of
|
|
<link linkend='var-MACHINE'><filename>MACHINE</filename></link>,
|
|
even if it does reference it.
|
|
</para>
|
|
|
|
<para>
|
|
Equally, there are cases where we need to add dependencies BitBake is not able to find.
|
|
You can accomplish this by using a line like the following:
|
|
<literallayout class='monospaced'>
|
|
PACKAGE_ARCHS[vardeps] = "MACHINE"
|
|
</literallayout>
|
|
This example explicitly adds the <filename>MACHINE</filename> variable as a
|
|
dependency for <filename>PACKAGE_ARCHS</filename>.
|
|
</para>
|
|
|
|
<para>
|
|
Consider a case with in-line Python, for example, where BitBake is not
|
|
able to figure out dependencies.
|
|
When running in debug mode (i.e. using <filename>-DDD</filename>), BitBake
|
|
produces output when it discovers something for which it cannot figure out
|
|
dependencies.
|
|
The Yocto Project team has currently not managed to cover those dependencies
|
|
in detail and is aware of the need to fix this situation.
|
|
</para>
|
|
|
|
<para>
|
|
Thus far, this section has limited discussion to the direct inputs into a task.
|
|
Information based on direct inputs is referred to as the "basehash" in the
|
|
code.
|
|
However, there is still the question of a task's indirect inputs - the
|
|
things that were already built and present in the
|
|
<link linkend='build-directory'>Build Directory</link>.
|
|
The checksum (or signature) for a particular task needs to add the hashes
|
|
of all the tasks on which the particular task depends.
|
|
Choosing which dependencies to add is a policy decision.
|
|
However, the effect is to generate a master checksum that combines the basehash
|
|
and the hashes of the task's dependencies.
|
|
</para>
|
|
|
|
<para>
|
|
At the code level, there are a variety of ways both the basehash and the
|
|
dependent task hashes can be influenced.
|
|
Within the BitBake configuration file, we can give BitBake some extra information
|
|
to help it construct the basehash.
|
|
The following statement effectively results in a list of global variable
|
|
dependency excludes - variables never included in any checksum:
|
|
<literallayout class='monospaced'>
|
|
BB_HASHBASE_WHITELIST ?= "TMPDIR FILE PATH PWD BB_TASKHASH BBPATH DL_DIR \
|
|
SSTATE_DIR THISDIR FILESEXTRAPATHS FILE_DIRNAME HOME LOGNAME SHELL TERM \
|
|
USER FILESPATH STAGING_DIR_HOST STAGING_DIR_TARGET COREBASE PRSERV_HOST \
|
|
PRSERV_DUMPDIR PRSERV_DUMPFILE PRSERV_LOCKDOWN PARALLEL_MAKE \
|
|
CCACHE_DIR EXTERNAL_TOOLCHAIN CCACHE CCACHE_DISABLE LICENSE_PATH SDKPKGSUFFIX"
|
|
</literallayout>
|
|
The previous example excludes
|
|
<link linkend='var-WORKDIR'><filename>WORKDIR</filename></link>
|
|
since that variable is actually constructed as a path within
|
|
<link linkend='var-TMPDIR'><filename>TMPDIR</filename></link>, which is on
|
|
the whitelist.
|
|
</para>
|
|
|
|
<para>
|
|
The rules for deciding which hashes of dependent tasks to include through
|
|
dependency chains are more complex and are generally accomplished with a
|
|
Python function.
|
|
The code in <filename>meta/lib/oe/sstatesig.py</filename> shows two examples
|
|
of this and also illustrates how you can insert your own policy into the system
|
|
if so desired.
|
|
This file defines the two basic signature generators
|
|
<link linkend='oe-core'>OE-Core</link> uses: "OEBasic" and
|
|
"OEBasicHash".
|
|
By default, there is a dummy "noop" signature handler enabled in BitBake.
|
|
This means that behavior is unchanged from previous versions.
|
|
OE-Core uses the "OEBasicHash" signature handler by default
|
|
through this setting in the <filename>bitbake.conf</filename> file:
|
|
<literallayout class='monospaced'>
|
|
BB_SIGNATURE_HANDLER ?= "OEBasicHash"
|
|
</literallayout>
|
|
The "OEBasicHash" <filename>BB_SIGNATURE_HANDLER</filename> is the same as the
|
|
"OEBasic" version but adds the task hash to the stamp files.
|
|
This results in any
|
|
<link linkend='metadata'>Metadata</link>
|
|
change that changes the task hash, automatically
|
|
causing the task to be run again.
|
|
This removes the need to bump <link linkend='var-PR'><filename>PR</filename></link>
|
|
values, and changes to Metadata automatically ripple across the build.
|
|
</para>
|
|
|
|
<para>
|
|
It is also worth noting that the end result of these signature generators is to
|
|
make some dependency and hash information available to the build.
|
|
This information includes:
|
|
<itemizedlist>
|
|
<listitem><para><filename>BB_BASEHASH_task-</filename><replaceable>taskname</replaceable>:
|
|
The base hashes for each task in the recipe.
|
|
</para></listitem>
|
|
<listitem><para><filename>BB_BASEHASH_</filename><replaceable>filename</replaceable><filename>:</filename><replaceable>taskname</replaceable>:
|
|
The base hashes for each dependent task.
|
|
</para></listitem>
|
|
<listitem><para><filename>BBHASHDEPS_</filename><replaceable>filename</replaceable><filename>:</filename><replaceable>taskname</replaceable>:
|
|
The task dependencies for each task.
|
|
</para></listitem>
|
|
<listitem><para><filename>BB_TASKHASH</filename>:
|
|
The hash of the currently running task.
|
|
</para></listitem>
|
|
</itemizedlist>
|
|
</para>
|
|
</section>
|
|
|
|
<section id='shared-state'>
|
|
<title>Shared State</title>
|
|
|
|
<para>
|
|
Checksums and dependencies, as discussed in the previous section, solve half the
|
|
problem of supporting a shared state.
|
|
The other part of the problem is being able to use checksum information during the build
|
|
and being able to reuse or rebuild specific components.
|
|
</para>
|
|
|
|
<para>
|
|
The
|
|
<link linkend='ref-classes-sstate'><filename>sstate</filename></link>
|
|
class is a relatively generic implementation of how to "capture"
|
|
a snapshot of a given task.
|
|
The idea is that the build process does not care about the source of a task's output.
|
|
Output could be freshly built or it could be downloaded and unpacked from
|
|
somewhere - the build process does not need to worry about its origin.
|
|
</para>
|
|
|
|
<para>
|
|
There are two types of output, one is just about creating a directory
|
|
in <link linkend='var-WORKDIR'><filename>WORKDIR</filename></link>.
|
|
A good example is the output of either
|
|
<link linkend='ref-tasks-install'><filename>do_install</filename></link>
|
|
or
|
|
<link linkend='ref-tasks-package'><filename>do_package</filename></link>.
|
|
The other type of output occurs when a set of data is merged into a shared directory
|
|
tree such as the sysroot.
|
|
</para>
|
|
|
|
<para>
|
|
The Yocto Project team has tried to keep the details of the
|
|
implementation hidden in <filename>sstate</filename> class.
|
|
From a user's perspective, adding shared state wrapping to a task
|
|
is as simple as this
|
|
<link linkend='ref-tasks-deploy'><filename>do_deploy</filename></link>
|
|
example taken from the
|
|
<link linkend='ref-classes-deploy'><filename>deploy</filename></link>
|
|
class:
|
|
<literallayout class='monospaced'>
|
|
DEPLOYDIR = "${WORKDIR}/deploy-${PN}"
|
|
SSTATETASKS += "do_deploy"
|
|
do_deploy[sstate-inputdirs] = "${DEPLOYDIR}"
|
|
do_deploy[sstate-outputdirs] = "${DEPLOY_DIR_IMAGE}"
|
|
|
|
python do_deploy_setscene () {
|
|
sstate_setscene(d)
|
|
}
|
|
addtask do_deploy_setscene
|
|
do_deploy[dirs] = "${DEPLOYDIR} ${B}"
|
|
</literallayout>
|
|
The following list explains the previous example:
|
|
<itemizedlist>
|
|
<listitem><para>
|
|
Adding "do_deploy" to <filename>SSTATETASKS</filename>
|
|
adds some required sstate-related processing, which is
|
|
implemented in the
|
|
<link linkend='ref-classes-sstate'><filename>sstate</filename></link>
|
|
class, to before and after the
|
|
<link linkend='ref-tasks-deploy'><filename>do_deploy</filename></link>
|
|
task.
|
|
</para></listitem>
|
|
<listitem><para>
|
|
The
|
|
<filename>do_deploy[sstate-inputdirs] = "${DEPLOYDIR}"</filename>
|
|
declares that <filename>do_deploy</filename> places its
|
|
output in <filename>${DEPLOYDIR}</filename> when run
|
|
normally (i.e. when not using the sstate cache).
|
|
This output becomes the input to the shared state cache.
|
|
</para></listitem>
|
|
<listitem><para>
|
|
The
|
|
<filename>do_deploy[sstate-outputdirs] = "${DEPLOY_DIR_IMAGE}"</filename>
|
|
line causes the contents of the shared state cache to be
|
|
copied to <filename>${DEPLOY_DIR_IMAGE}</filename>.
|
|
<note>
|
|
If <filename>do_deploy</filename> is not already in
|
|
the shared state cache or if its input checksum
|
|
(signature) has changed from when the output was
|
|
cached, the task will be run to populate the shared
|
|
state cache, after which the contents of the shared
|
|
state cache is copied to
|
|
<filename>${DEPLOY_DIR_IMAGE}</filename>.
|
|
If <filename>do_deploy</filename> is in the shared
|
|
state cache and its signature indicates that the
|
|
cached output is still valid (i.e. if no
|
|
relevant task inputs have changed), then the contents
|
|
of the shared state cache will be copied directly to
|
|
<filename>${DEPLOY_DIR_IMAGE}</filename> by the
|
|
<filename>do_deploy_setscene</filename> task instead,
|
|
skipping the <filename>do_deploy</filename> task.
|
|
</note>
|
|
</para></listitem>
|
|
<listitem><para>
|
|
The following task definition is glue logic needed to make
|
|
the previous settings effective:
|
|
<literallayout class='monospaced'>
|
|
python do_deploy_setscene () {
|
|
sstate_setscene(d)
|
|
}
|
|
addtask do_deploy_setscene
|
|
</literallayout>
|
|
<filename>sstate_setscene()</filename> takes the flags
|
|
above as input and accelerates the
|
|
<filename>do_deploy</filename> task through the
|
|
shared state cache if possible.
|
|
If the task was accelerated,
|
|
<filename>sstate_setscene()</filename> returns True.
|
|
Otherwise, it returns False, and the normal
|
|
<filename>do_deploy</filename> task runs.
|
|
For more information, see the
|
|
"<ulink url='&YOCTO_DOCS_BB_URL;#setscene'>setscene</ulink>"
|
|
section in the BitBake User Manual.
|
|
</para></listitem>
|
|
<listitem><para>
|
|
The <filename>do_deploy[dirs] = "${DEPLOYDIR} ${B}"</filename>
|
|
line creates <filename>${DEPLOYDIR}</filename> and
|
|
<filename>${B}</filename> before the
|
|
<filename>do_deploy</filename> task runs, and also sets
|
|
the current working directory of
|
|
<filename>do_deploy</filename> to
|
|
<filename>${B}</filename>.
|
|
For more information, see the
|
|
"<ulink url='&YOCTO_DOCS_BB_URL;#variable-flags'>Variable Flags</ulink>"
|
|
section in the BitBake User Manual.
|
|
<note>
|
|
In cases where
|
|
<filename>sstate-inputdirs</filename> and
|
|
<filename>sstate-outputdirs</filename> would be the
|
|
same, you can use
|
|
<filename>sstate-plaindirs</filename>.
|
|
For example, to preserve the
|
|
<filename>${PKGD}</filename> and
|
|
<filename>${PKGDEST}</filename> output from the
|
|
<link linkend='ref-tasks-package'><filename>do_package</filename></link>
|
|
task, use the following:
|
|
<literallayout class='monospaced'>
|
|
do_package[sstate-plaindirs] = "${PKGD} ${PKGDEST}"
|
|
</literallayout>
|
|
</note>
|
|
</para></listitem>
|
|
<listitem><para>
|
|
<filename>sstate-inputdirs</filename> and
|
|
<filename>sstate-outputdirs</filename> can also be used
|
|
with multiple directories.
|
|
For example, the following declares
|
|
<filename>PKGDESTWORK</filename> and
|
|
<filename>SHLIBWORK</filename> as shared state
|
|
input directories, which populates the shared state
|
|
cache, and <filename>PKGDATA_DIR</filename> and
|
|
<filename>SHLIBSDIR</filename> as the corresponding
|
|
shared state output directories:
|
|
<literallayout class='monospaced'>
|
|
do_package[sstate-inputdirs] = "${PKGDESTWORK} ${SHLIBSWORKDIR}"
|
|
do_package[sstate-outputdirs] = "${PKGDATA_DIR} ${SHLIBSDIR}"
|
|
</literallayout>
|
|
</para></listitem>
|
|
<listitem><para>
|
|
These methods also include the ability to take a lockfile
|
|
when manipulating shared state directory structures,
|
|
for cases where file additions or removals are sensitive:
|
|
<literallayout class='monospaced'>
|
|
do_package[sstate-lockfile] = "${PACKAGELOCK}"
|
|
</literallayout>
|
|
</para></listitem>
|
|
</itemizedlist>
|
|
</para>
|
|
|
|
<!--
|
|
<para>
|
|
In this example, we add some extra flags to the task, a name field ("deploy"), an
|
|
input directory where the task sends data, and the output
|
|
directory where the data from the task should eventually be copied.
|
|
We also add a <filename>_setscene</filename> variant of the task and add the task
|
|
name to the <filename>SSTATETASKS</filename> list.
|
|
</para>
|
|
|
|
<para>
|
|
If you have a directory whose contents you need to preserve, you can do this with
|
|
a line like the following:
|
|
<literallayout class='monospaced'>
|
|
do_package[sstate-plaindirs] = "${PKGD} ${PKGDEST}"
|
|
</literallayout>
|
|
This method, as well as the following example, also works for multiple directories.
|
|
<literallayout class='monospaced'>
|
|
do_package[sstate-inputdirs] = "${PKGDESTWORK} ${SHLIBSWORKDIR}"
|
|
do_package[sstate-outputdirs] = "${PKGDATA_DIR} ${SHLIBSDIR}"
|
|
do_package[sstate-lockfile] = "${PACKAGELOCK}"
|
|
</literallayout>
|
|
These methods also include the ability to take a lockfile when manipulating
|
|
shared state directory structures since some cases are sensitive to file
|
|
additions or removals.
|
|
</para>
|
|
-->
|
|
|
|
<para>
|
|
Behind the scenes, the shared state code works by looking in
|
|
<link linkend='var-SSTATE_DIR'><filename>SSTATE_DIR</filename></link> and
|
|
<link linkend='var-SSTATE_MIRRORS'><filename>SSTATE_MIRRORS</filename></link>
|
|
for shared state files.
|
|
Here is an example:
|
|
<literallayout class='monospaced'>
|
|
SSTATE_MIRRORS ?= "\
|
|
file://.* http://someserver.tld/share/sstate/PATH;downloadfilename=PATH \n \
|
|
file://.* file:///some/local/dir/sstate/PATH"
|
|
</literallayout>
|
|
<note>
|
|
The shared state directory (<filename>SSTATE_DIR</filename>) is
|
|
organized into two-character subdirectories, where the subdirectory
|
|
names are based on the first two characters of the hash.
|
|
If the shared state directory structure for a mirror has the
|
|
same structure as <filename>SSTATE_DIR</filename>, you must
|
|
specify "PATH" as part of the URI to enable the build system
|
|
to map to the appropriate subdirectory.
|
|
</note>
|
|
</para>
|
|
|
|
<para>
|
|
The shared state package validity can be detected just by looking at the
|
|
filename since the filename contains the task checksum (or signature) as
|
|
described earlier in this section.
|
|
If a valid shared state package is found, the build process downloads it
|
|
and uses it to accelerate the task.
|
|
</para>
|
|
|
|
<para>
|
|
The build processes use the <filename>*_setscene</filename> tasks
|
|
for the task acceleration phase.
|
|
BitBake goes through this phase before the main execution code and tries
|
|
to accelerate any tasks for which it can find shared state packages.
|
|
If a shared state package for a task is available, the shared state
|
|
package is used.
|
|
This means the task and any tasks on which it is dependent are not
|
|
executed.
|
|
</para>
|
|
|
|
<para>
|
|
As a real world example, the aim is when building an IPK-based image,
|
|
only the
|
|
<link linkend='ref-tasks-package_write_ipk'><filename>do_package_write_ipk</filename></link>
|
|
tasks would have their
|
|
shared state packages fetched and extracted.
|
|
Since the sysroot is not used, it would never get extracted.
|
|
This is another reason why a task-based approach is preferred over a
|
|
recipe-based approach, which would have to install the output from every task.
|
|
</para>
|
|
</section>
|
|
|
|
<section id='tips-and-tricks'>
|
|
<title>Tips and Tricks</title>
|
|
|
|
<para>
|
|
The code in the build system that supports incremental builds is not
|
|
simple code.
|
|
This section presents some tips and tricks that help you work around
|
|
issues related to shared state code.
|
|
</para>
|
|
|
|
<section id='debugging'>
|
|
<title>Debugging</title>
|
|
|
|
<para>
|
|
Seeing what metadata went into creating the input signature
|
|
of a shared state (sstate) task can be a useful debugging aid.
|
|
This information is available in signature information
|
|
(<filename>siginfo</filename>) files in
|
|
<link linkend='var-SSTATE_DIR'><filename>SSTATE_DIR</filename></link>.
|
|
For information on how to view and interpret information in
|
|
<filename>siginfo</filename> files, see the
|
|
"<link linkend='usingpoky-viewing-task-variable-dependencies'>Viewing Task Variable Dependencies</link>"
|
|
section.
|
|
</para>
|
|
</section>
|
|
|
|
<section id='invalidating-shared-state'>
|
|
<title>Invalidating Shared State</title>
|
|
|
|
<para>
|
|
The OpenEmbedded build system uses checksums and shared state
|
|
cache to avoid unnecessarily rebuilding tasks.
|
|
Collectively, this scheme is known as "shared state code."
|
|
</para>
|
|
|
|
<para>
|
|
As with all schemes, this one has some drawbacks.
|
|
It is possible that you could make implicit changes to your
|
|
code that the checksum calculations do not take into
|
|
account.
|
|
These implicit changes affect a task's output but do not trigger
|
|
the shared state code into rebuilding a recipe.
|
|
Consider an example during which a tool changes its output.
|
|
Assume that the output of <filename>rpmdeps</filename> changes.
|
|
The result of the change should be that all the
|
|
<filename>package</filename> and
|
|
<filename>package_write_rpm</filename> shared state cache
|
|
items become invalid.
|
|
However, because the change to the output is
|
|
external to the code and therefore implicit,
|
|
the associated shared state cache items do not become
|
|
invalidated.
|
|
In this case, the build process uses the cached items rather
|
|
than running the task again.
|
|
Obviously, these types of implicit changes can cause problems.
|
|
</para>
|
|
|
|
<para>
|
|
To avoid these problems during the build, you need to
|
|
understand the effects of any changes you make.
|
|
Realize that changes you make directly to a function
|
|
are automatically factored into the checksum calculation.
|
|
Thus, these explicit changes invalidate the associated area of
|
|
shared state cache.
|
|
However, you need to be aware of any implicit changes that
|
|
are not obvious changes to the code and could affect the output
|
|
of a given task.
|
|
</para>
|
|
|
|
<para>
|
|
When you identify an implicit change, you can easily take steps
|
|
to invalidate the cache and force the tasks to run.
|
|
The steps you can take are as simple as changing a function's
|
|
comments in the source code.
|
|
For example, to invalidate package shared state files, change
|
|
the comment statements of
|
|
<link linkend='ref-tasks-package'><filename>do_package</filename></link>
|
|
or the comments of one of the functions it calls.
|
|
Even though the change is purely cosmetic, it causes the
|
|
checksum to be recalculated and forces the OpenEmbedded build
|
|
system to run the task again.
|
|
</para>
|
|
|
|
<note>
|
|
For an example of a commit that makes a cosmetic change to
|
|
invalidate shared state, see this
|
|
<ulink url='&YOCTO_GIT_URL;/cgit.cgi/poky/commit/meta/classes/package.bbclass?id=737f8bbb4f27b4837047cb9b4fbfe01dfde36d54'>commit</ulink>.
|
|
</note>
|
|
</section>
|
|
</section>
|
|
</section>
|
|
|
|
<section id='automatically-added-runtime-dependencies'>
|
|
<title>Automatically Added Runtime Dependencies</title>
|
|
|
|
<para>
|
|
The OpenEmbedded build system automatically adds common types of
|
|
runtime dependencies between packages, which means that you do not
|
|
need to explicitly declare the packages using
|
|
<link linkend='var-RDEPENDS'><filename>RDEPENDS</filename></link>.
|
|
Three automatic mechanisms exist (<filename>shlibdeps</filename>,
|
|
<filename>pcdeps</filename>, and <filename>depchains</filename>) that
|
|
handle shared libraries, package configuration (pkg-config) modules,
|
|
and <filename>-dev</filename> and <filename>-dbg</filename> packages,
|
|
respectively.
|
|
For other types of runtime dependencies, you must manually declare
|
|
the dependencies.
|
|
<itemizedlist>
|
|
<listitem><para>
|
|
<filename>shlibdeps</filename>:
|
|
During the
|
|
<link linkend='ref-tasks-package'><filename>do_package</filename></link>
|
|
task of each recipe, all shared libraries installed by the
|
|
recipe are located.
|
|
For each shared library, the package that contains the shared
|
|
library is registered as providing the shared library.
|
|
More specifically, the package is registered as providing the
|
|
<ulink url='https://en.wikipedia.org/wiki/Soname'>soname</ulink>
|
|
of the library.
|
|
The resulting shared-library-to-package mapping
|
|
is saved globally in
|
|
<link linkend='var-PKGDATA_DIR'><filename>PKGDATA_DIR</filename></link>
|
|
by the
|
|
<link linkend='ref-tasks-packagedata'><filename>do_packagedata</filename></link>
|
|
task.</para>
|
|
|
|
<para>Simultaneously, all executables and shared libraries
|
|
installed by the recipe are inspected to see what shared
|
|
libraries they link against.
|
|
For each shared library dependency that is found,
|
|
<filename>PKGDATA_DIR</filename> is queried to
|
|
see if some package (likely from a different recipe) contains
|
|
the shared library.
|
|
If such a package is found, a runtime dependency is added from
|
|
the package that depends on the shared library to the package
|
|
that contains the library.</para>
|
|
|
|
<para>The automatically added runtime dependency also includes
|
|
a version restriction.
|
|
This version restriction specifies that at least the current
|
|
version of the package that provides the shared library must be
|
|
used, as if
|
|
"<replaceable>package</replaceable> (>= <replaceable>version</replaceable>)"
|
|
had been added to
|
|
<link linkend='var-RDEPENDS'><filename>RDEPENDS</filename></link>.
|
|
This forces an upgrade of the package containing the shared
|
|
library when installing the package that depends on the
|
|
library, if needed.</para>
|
|
|
|
<para>If you want to avoid a package being registered as
|
|
providing a particular shared library (e.g. because the library
|
|
is for internal use only), then add the library to
|
|
<link linkend='var-PRIVATE_LIBS'><filename>PRIVATE_LIBS</filename></link>
|
|
inside the package's recipe.
|
|
</para></listitem>
|
|
<listitem><para>
|
|
<filename>pcdeps</filename>:
|
|
During the
|
|
<link linkend='ref-tasks-package'><filename>do_package</filename></link>
|
|
task of each recipe, all pkg-config modules
|
|
(<filename>*.pc</filename> files) installed by the recipe are
|
|
located.
|
|
For each module, the package that contains the module is
|
|
registered as providing the module.
|
|
The resulting module-to-package mapping is saved globally in
|
|
<link linkend='var-PKGDATA_DIR'><filename>PKGDATA_DIR</filename></link>
|
|
by the
|
|
<link linkend='ref-tasks-packagedata'><filename>do_packagedata</filename></link>
|
|
task.</para>
|
|
|
|
<para>Simultaneously, all pkg-config modules installed by the
|
|
recipe are inspected to see what other pkg-config modules they
|
|
depend on.
|
|
A module is seen as depending on another module if it contains
|
|
a "Requires:" line that specifies the other module.
|
|
For each module dependency,
|
|
<filename>PKGDATA_DIR</filename> is queried to see if some
|
|
package contains the module.
|
|
If such a package is found, a runtime dependency is added from
|
|
the package that depends on the module to the package that
|
|
contains the module.
|
|
<note>
|
|
The <filename>pcdeps</filename> mechanism most often infers
|
|
dependencies between <filename>-dev</filename> packages.
|
|
</note>
|
|
</para></listitem>
|
|
<listitem><para>
|
|
<filename>depchains</filename>:
|
|
If a package <filename>foo</filename> depends on a package
|
|
<filename>bar</filename>, then <filename>foo-dev</filename>
|
|
and <filename>foo-dbg</filename> are also made to depend on
|
|
<filename>bar-dev</filename> and <filename>bar-dbg</filename>,
|
|
respectively.
|
|
Taking the <filename>-dev</filename> packages as an example,
|
|
the <filename>bar-dev</filename> package might provide
|
|
headers and shared library symlinks needed by
|
|
<filename>foo-dev</filename>, which shows the need
|
|
for a dependency between the packages.</para>
|
|
|
|
<para>The dependencies added by <filename>depchains</filename>
|
|
are in the form of
|
|
<link linkend='var-RRECOMMENDS'><filename>RRECOMMENDS</filename></link>.
|
|
<note>
|
|
By default, <filename>foo-dev</filename> also has an
|
|
<filename>RDEPENDS</filename>-style dependency on
|
|
<filename>foo</filename>, because the default value of
|
|
<filename>RDEPENDS_${PN}-dev</filename> (set in
|
|
<filename>bitbake.conf</filename>) includes
|
|
"${PN}".
|
|
</note></para>
|
|
|
|
<para>To ensure that the dependency chain is never broken,
|
|
<filename>-dev</filename> and <filename>-dbg</filename>
|
|
packages are always generated by default, even if the packages
|
|
turn out to be empty.
|
|
See the
|
|
<link linkend='var-ALLOW_EMPTY'><filename>ALLOW_EMPTY</filename></link>
|
|
variable for more information.
|
|
</para></listitem>
|
|
</itemizedlist>
|
|
</para>
|
|
|
|
<para>
|
|
The <filename>do_package</filename> task depends on the
|
|
<link linkend='ref-tasks-packagedata'><filename>do_packagedata</filename></link>
|
|
task of each recipe in
|
|
<link linkend='var-DEPENDS'><filename>DEPENDS</filename></link>
|
|
through use of a
|
|
<filename>[</filename><ulink url='&YOCTO_DOCS_BB_URL;#variable-flags'><filename>deptask</filename></ulink><filename>]</filename>
|
|
declaration, which guarantees that the required
|
|
shared-library/module-to-package mapping information will be available
|
|
when needed as long as <filename>DEPENDS</filename> has been
|
|
correctly set.
|
|
</para>
|
|
</section>
|
|
|
|
<section id='fakeroot-and-pseudo'>
|
|
<title>Fakeroot and Pseudo</title>
|
|
|
|
<para>
|
|
Some tasks are easier to implement when allowed to perform certain
|
|
operations that are normally reserved for the root user.
|
|
For example, the
|
|
<link linkend='ref-tasks-install'><filename>do_install</filename></link>
|
|
task benefits from being able to set the UID and GID of installed files
|
|
to arbitrary values.
|
|
</para>
|
|
|
|
<para>
|
|
One approach to allowing tasks to perform root-only operations
|
|
would be to require BitBake to run as root.
|
|
However, this method is cumbersome and has security issues.
|
|
The approach that is actually used is to run tasks that benefit from
|
|
root privileges in a "fake" root environment.
|
|
Within this environment, the task and its child processes believe that
|
|
they are running as the root user, and see an internally consistent
|
|
view of the filesystem.
|
|
As long as generating the final output (e.g. a package or an image)
|
|
does not require root privileges, the fact that some earlier steps ran
|
|
in a fake root environment does not cause problems.
|
|
</para>
|
|
|
|
<para>
|
|
The capability to run tasks in a fake root environment is known as
|
|
"fakeroot", which is derived from the BitBake keyword/variable
|
|
flag that requests a fake root environment for a task.
|
|
In current versions of the OpenEmbedded build system,
|
|
the program that implements fakeroot is known as Pseudo.
|
|
</para>
|
|
|
|
<para>
|
|
Pseudo overrides system calls through the
|
|
<filename>LD_PRELOAD</filename> mechanism to give the
|
|
illusion of running as root.
|
|
To keep track of "fake" file ownership and permissions resulting from
|
|
operations that require root permissions, an sqlite3
|
|
database is used.
|
|
This database is stored in
|
|
<filename>${</filename><link linkend='var-WORKDIR'><filename>WORKDIR</filename></link><filename>}/pseudo/files.db</filename>
|
|
for individual recipes.
|
|
Storing the database in a file as opposed to in memory
|
|
gives persistence between tasks, and even between builds.
|
|
<note><title>Caution</title>
|
|
If you add your own task that manipulates the same files or
|
|
directories as a fakeroot task, then that task should also run
|
|
under fakeroot.
|
|
Otherwise, the task will not be able to run root-only operations,
|
|
and will not see the fake file ownership and permissions set by the
|
|
other task.
|
|
You should also add a dependency on
|
|
<filename>virtual/fakeroot-native:do_populate_sysroot</filename>,
|
|
giving the following:
|
|
<literallayout class='monospaced'>
|
|
fakeroot do_mytask () {
|
|
...
|
|
}
|
|
do_mytask[depends] += "virtual/fakeroot-native:do_populate_sysroot"
|
|
</literallayout>
|
|
</note>
|
|
For more information, see the
|
|
<ulink url='&YOCTO_DOCS_BB_URL;#var-FAKEROOT'><filename>FAKEROOT*</filename></ulink>
|
|
variables in the BitBake User Manual.
|
|
You can also reference this
|
|
<ulink url='http://www.ibm.com/developerworks/opensource/library/os-aapseudo1/index.html'>Pseudo</ulink>
|
|
article.
|
|
</para>
|
|
</section>
|
|
|
|
<section id='wic-plug-ins-interface'>
|
|
<title>Wic Plug-Ins Interface</title>
|
|
|
|
<para>
|
|
You can extend and specialize Wic functionality by using
|
|
Wic plug-ins.
|
|
This section explains the Wic plug-in interface.
|
|
For information on using Wic in general, see the
|
|
"<ulink url='&YOCTO_DOCS_DEV_URL;#creating-partitioned-images-using-wic'>Creating Partitioned Images Using Wic</ulink>"
|
|
section in the Yocto Project Development Tasks Manual.
|
|
<note>
|
|
Wic plug-ins consist of "source" and "imager" plug-ins.
|
|
Imager plug-ins are beyond the scope of this section.
|
|
</note>
|
|
</para>
|
|
|
|
<para>
|
|
Source plug-ins provide a mechanism to customize partition
|
|
content during the Wic image generation process.
|
|
You can use source plug-ins to map values that you specify
|
|
using <filename>--source</filename> commands in kickstart
|
|
files (i.e. <filename>*.wks</filename>) to a plug-in
|
|
implementation used to populate a given partition.
|
|
<note>
|
|
If you use plug-ins that have build-time dependencies
|
|
(e.g. native tools, bootloaders, and so forth)
|
|
when building a Wic image, you need to specify those
|
|
dependencies using the
|
|
<link linkend='var-WKS_FILE_DEPENDS'><filename>WKS_FILE_DEPENDS</filename></link>
|
|
variable.
|
|
</note>
|
|
</para>
|
|
|
|
<para>
|
|
Source plug-ins are subclasses defined in plug-in files.
|
|
As shipped, the Yocto Project provides several plug-in
|
|
files.
|
|
You can see the source plug-in files that ship with the
|
|
Yocto Project
|
|
<ulink url='&YOCTO_GIT_URL;/cgit/cgit.cgi/poky/tree/scripts/lib/wic/plugins/source'>here</ulink>.
|
|
Each of these plug-in files contain source plug-ins that
|
|
are designed to populate a specific Wic image partition.
|
|
</para>
|
|
|
|
<para>
|
|
Source plug-ins are subclasses of the
|
|
<filename>SourcePlugin</filename> class, which is
|
|
defined in the
|
|
<filename>poky/scripts/lib/wic/pluginbase.py</filename>
|
|
file.
|
|
For example, the <filename>BootimgEFIPlugin</filename>
|
|
source plug-in found in the
|
|
<filename>bootimg-efi.py</filename> file is a subclass of
|
|
the <filename>SourcePlugin</filename> class, which is found
|
|
in the <filename>pluginbase.py</filename> file.
|
|
</para>
|
|
|
|
<para>
|
|
You can also implement source plug-ins in a layer outside
|
|
of the Source Repositories (external layer).
|
|
To do so, be sure that your plug-in files are located in
|
|
a directory whose path is
|
|
<filename>scripts/lib/wic/plugins/source/</filename>
|
|
within your external layer.
|
|
When the plug-in files are located there, the source
|
|
plug-ins they contain are made available to Wic.
|
|
</para>
|
|
|
|
<para>
|
|
When the Wic implementation needs to invoke a
|
|
partition-specific implementation, it looks for the plug-in
|
|
with the same name as the <filename>--source</filename>
|
|
parameter used in the kickstart file given to that
|
|
partition.
|
|
For example, if the partition is set up using the following
|
|
command in a kickstart file:
|
|
<literallayout class='monospaced'>
|
|
part /boot --source bootimg-pcbios --ondisk sda --label boot --active --align 1024
|
|
</literallayout>
|
|
The methods defined as class members of the matching
|
|
source plug-in (i.e. <filename>bootimg-pcbios</filename>)
|
|
in the <filename>bootimg-pcbios.py</filename> plug-in file
|
|
are used.
|
|
</para>
|
|
|
|
<para>
|
|
To be more concrete, here is the corresponding plug-in
|
|
definition from the <filename>bootimg-pcbios.py</filename>
|
|
file for the previous command along with an example
|
|
method called by the Wic implementation when it needs to
|
|
prepare a partition using an implementation-specific
|
|
function:
|
|
<literallayout class='monospaced'>
|
|
bootimg-pcbios.py
|
|
.
|
|
.
|
|
.
|
|
class BootimgPcbiosPlugin(SourcePlugin):
|
|
"""
|
|
Create MBR boot partition and install syslinux on it.
|
|
"""
|
|
|
|
name = 'bootimg-pcbios'
|
|
.
|
|
.
|
|
.
|
|
@classmethod
|
|
def do_prepare_partition(cls, part, source_params, creator, cr_workdir,
|
|
oe_builddir, bootimg_dir, kernel_dir,
|
|
rootfs_dir, native_sysroot):
|
|
"""
|
|
Called to do the actual content population for a partition i.e. it
|
|
'prepares' the partition to be incorporated into the image.
|
|
In this case, prepare content for legacy bios boot partition.
|
|
"""
|
|
.
|
|
.
|
|
.
|
|
</literallayout>
|
|
If a subclass (plug-in) itself does not implement a
|
|
particular function, Wic locates and uses the default
|
|
version in the superclass.
|
|
It is for this reason that all source plug-ins are derived
|
|
from the <filename>SourcePlugin</filename> class.
|
|
</para>
|
|
|
|
<para>
|
|
The <filename>SourcePlugin</filename> class defined in
|
|
the <filename>pluginbase.py</filename> file defines
|
|
a set of methods that source plug-ins can implement or
|
|
override.
|
|
Any plug-ins (subclass of
|
|
<filename>SourcePlugin</filename>) that do not implement
|
|
a particular method inherit the implementation of the
|
|
method from the <filename>SourcePlugin</filename> class.
|
|
For more information, see the
|
|
<filename>SourcePlugin</filename> class in the
|
|
<filename>pluginbase.py</filename> file for details:
|
|
</para>
|
|
|
|
<para>
|
|
The following list describes the methods implemented in the
|
|
<filename>SourcePlugin</filename> class:
|
|
<itemizedlist>
|
|
<listitem><para>
|
|
<emphasis><filename>do_prepare_partition()</filename>:</emphasis>
|
|
Called to populate a partition with actual content.
|
|
In other words, the method prepares the final
|
|
partition image that is incorporated into the
|
|
disk image.
|
|
</para></listitem>
|
|
<listitem><para>
|
|
<emphasis><filename>do_configure_partition()</filename>:</emphasis>
|
|
Called before
|
|
<filename>do_prepare_partition()</filename> to
|
|
create custom configuration files for a partition
|
|
(e.g. syslinux or grub configuration files).
|
|
</para></listitem>
|
|
<listitem><para>
|
|
<emphasis><filename>do_install_disk()</filename>:</emphasis>
|
|
Called after all partitions have been prepared and
|
|
assembled into a disk image.
|
|
This method provides a hook to allow finalization
|
|
of a disk image (e.g. writing an MBR).
|
|
</para></listitem>
|
|
<listitem><para>
|
|
<emphasis><filename>do_stage_partition()</filename>:</emphasis>
|
|
Special content-staging hook called before
|
|
<filename>do_prepare_partition()</filename>.
|
|
This method is normally empty.</para>
|
|
|
|
<para>Typically, a partition just uses the passed-in
|
|
parameters (e.g. the unmodified value of
|
|
<filename>bootimg_dir</filename>).
|
|
However, in some cases, things might need to be
|
|
more tailored.
|
|
As an example, certain files might additionally
|
|
need to be taken from
|
|
<filename>bootimg_dir + /boot</filename>.
|
|
This hook allows those files to be staged in a
|
|
customized fashion.
|
|
<note>
|
|
<filename>get_bitbake_var()</filename>
|
|
allows you to access non-standard variables
|
|
that you might want to use for this
|
|
behavior.
|
|
</note>
|
|
</para></listitem>
|
|
</itemizedlist>
|
|
</para>
|
|
|
|
<para>
|
|
You can extend the source plug-in mechanism.
|
|
To add more hooks, create more source plug-in methods
|
|
within <filename>SourcePlugin</filename> and the
|
|
corresponding derived subclasses.
|
|
The code that calls the plug-in methods uses the
|
|
<filename>plugin.get_source_plugin_methods()</filename>
|
|
function to find the method or methods needed by the call.
|
|
Retrieval of those methods is accomplished by filling up
|
|
a dict with keys that contain the method names of interest.
|
|
On success, these will be filled in with the actual
|
|
methods.
|
|
See the Wic implementation for examples and details.
|
|
</para>
|
|
</section>
|
|
|
|
<section id='x32'>
|
|
<title>x32</title>
|
|
|
|
<para>
|
|
x32 is a processor-specific Application Binary Interface (psABI) for x86_64.
|
|
An ABI defines the calling conventions between functions in a processing environment.
|
|
The interface determines what registers are used and what the sizes are for various C data types.
|
|
</para>
|
|
|
|
<para>
|
|
Some processing environments prefer using 32-bit applications even when running
|
|
on Intel 64-bit platforms.
|
|
Consider the i386 psABI, which is a very old 32-bit ABI for Intel 64-bit platforms.
|
|
The i386 psABI does not provide efficient use and access of the Intel 64-bit processor resources,
|
|
leaving the system underutilized.
|
|
Now consider the x86_64 psABI.
|
|
This ABI is newer and uses 64-bits for data sizes and program pointers.
|
|
The extra bits increase the footprint size of the programs, libraries,
|
|
and also increases the memory and file system size requirements.
|
|
Executing under the x32 psABI enables user programs to utilize CPU and system resources
|
|
more efficiently while keeping the memory footprint of the applications low.
|
|
Extra bits are used for registers but not for addressing mechanisms.
|
|
</para>
|
|
|
|
<section id='support'>
|
|
<title>Support</title>
|
|
|
|
<para>
|
|
This Yocto Project release supports the final specifications of x32
|
|
psABI.
|
|
Support for x32 psABI exists as follows:
|
|
<itemizedlist>
|
|
<listitem><para>You can create packages and images in x32 psABI format on x86_64 architecture targets.
|
|
</para></listitem>
|
|
<listitem><para>You can successfully build many recipes with the x32 toolchain.</para></listitem>
|
|
<listitem><para>You can create and boot <filename>core-image-minimal</filename> and
|
|
<filename>core-image-sato</filename> images.</para></listitem>
|
|
</itemizedlist>
|
|
</para>
|
|
</section>
|
|
|
|
<section id='completing-x32'>
|
|
<title>Completing x32</title>
|
|
|
|
<para>
|
|
Future Plans for the x32 psABI in the Yocto Project include the following:
|
|
<itemizedlist>
|
|
<listitem><para>Enhance and fix the few remaining recipes so they
|
|
work with and support x32 toolchains.</para></listitem>
|
|
<listitem><para>Enhance RPM Package Manager (RPM) support for x32 binaries.</para></listitem>
|
|
<listitem><para>Support larger images.</para></listitem>
|
|
</itemizedlist>
|
|
</para>
|
|
</section>
|
|
|
|
<section id='using-x32-right-now'>
|
|
<title>Using x32 Right Now</title>
|
|
|
|
<para>
|
|
Follow these steps to use the x32 spABI:
|
|
<itemizedlist>
|
|
<listitem><para>Enable the x32 psABI tuning file for <filename>x86_64</filename>
|
|
machines by editing the <filename>conf/local.conf</filename> like this:
|
|
<literallayout class='monospaced'>
|
|
MACHINE = "qemux86-64"
|
|
DEFAULTTUNE = "x86-64-x32"
|
|
baselib = "${@d.getVar('BASE_LIB_tune-' + (d.getVar('DEFAULTTUNE', True) \
|
|
or 'INVALID'), True) or 'lib'}"
|
|
#MACHINE = "genericx86"
|
|
#DEFAULTTUNE = "core2-64-x32"
|
|
</literallayout></para></listitem>
|
|
<listitem><para>As usual, use BitBake to build an image that supports the x32 psABI.
|
|
Here is an example:
|
|
<literallayout class='monospaced'>
|
|
$ bitbake core-image-sato
|
|
</literallayout></para></listitem>
|
|
<listitem><para>As usual, run your image using QEMU:
|
|
<literallayout class='monospaced'>
|
|
$ runqemu qemux86-64 core-image-sato
|
|
</literallayout></para></listitem>
|
|
</itemizedlist>
|
|
</para>
|
|
</section>
|
|
</section>
|
|
|
|
<section id="wayland">
|
|
<title>Wayland</title>
|
|
|
|
<para>
|
|
<ulink url='http://en.wikipedia.org/wiki/Wayland_(display_server_protocol)'>Wayland</ulink>
|
|
is a computer display server protocol that
|
|
provides a method for compositing window managers to communicate
|
|
directly with applications and video hardware and expects them to
|
|
communicate with input hardware using other libraries.
|
|
Using Wayland with supporting targets can result in better control
|
|
over graphics frame rendering than an application might otherwise
|
|
achieve.
|
|
</para>
|
|
|
|
<para>
|
|
The Yocto Project provides the Wayland protocol libraries and the
|
|
reference
|
|
<ulink url='http://en.wikipedia.org/wiki/Wayland_(display_server_protocol)#Weston'>Weston</ulink>
|
|
compositor as part of its release.
|
|
This section describes what you need to do to implement Wayland and
|
|
use the compositor when building an image for a supporting target.
|
|
</para>
|
|
|
|
<section id="wayland-support">
|
|
<title>Support</title>
|
|
|
|
<para>
|
|
The Wayland protocol libraries and the reference Weston compositor
|
|
ship as integrated packages in the <filename>meta</filename> layer
|
|
of the
|
|
<link linkend='source-directory'>Source Directory</link>.
|
|
Specifically, you can find the recipes that build both Wayland
|
|
and Weston at <filename>meta/recipes-graphics/wayland</filename>.
|
|
</para>
|
|
|
|
<para>
|
|
You can build both the Wayland and Weston packages for use only
|
|
with targets that accept the
|
|
<ulink url='http://dri.freedesktop.org/wiki/'>Mesa 3D and Direct Rendering Infrastructure</ulink>,
|
|
which is also known as Mesa DRI.
|
|
This implies that you cannot build and use the packages if your
|
|
target uses, for example, the
|
|
<trademark class='registered'>Intel</trademark> Embedded Media and
|
|
Graphics Driver (<trademark class='registered'>Intel</trademark>
|
|
EMGD) that overrides Mesa DRI.
|
|
</para>
|
|
|
|
<note>
|
|
Due to lack of EGL support, Weston 1.0.3 will not run directly on
|
|
the emulated QEMU hardware.
|
|
However, this version of Weston will run under X emulation without
|
|
issues.
|
|
</note>
|
|
</section>
|
|
|
|
<section id="enabling-wayland-in-an-image">
|
|
<title>Enabling Wayland in an Image</title>
|
|
|
|
<para>
|
|
To enable Wayland, you need to enable it to be built and enable
|
|
it to be included in the image.
|
|
</para>
|
|
|
|
<section id="enable-building">
|
|
<title>Building</title>
|
|
|
|
<para>
|
|
To cause Mesa to build the <filename>wayland-egl</filename>
|
|
platform and Weston to build Wayland with Kernel Mode
|
|
Setting
|
|
(<ulink url='https://wiki.archlinux.org/index.php/Kernel_Mode_Setting'>KMS</ulink>)
|
|
support, include the "wayland" flag in the
|
|
<link linkend="var-DISTRO_FEATURES"><filename>DISTRO_FEATURES</filename></link>
|
|
statement in your <filename>local.conf</filename> file:
|
|
<literallayout class='monospaced'>
|
|
DISTRO_FEATURES_append = " wayland"
|
|
</literallayout>
|
|
</para>
|
|
|
|
<note>
|
|
If X11 has been enabled elsewhere, Weston will build Wayland
|
|
with X11 support
|
|
</note>
|
|
</section>
|
|
|
|
<section id="enable-installation-in-an-image">
|
|
<title>Installing</title>
|
|
|
|
<para>
|
|
To install the Wayland feature into an image, you must
|
|
include the following
|
|
<link linkend='var-CORE_IMAGE_EXTRA_INSTALL'><filename>CORE_IMAGE_EXTRA_INSTALL</filename></link>
|
|
statement in your <filename>local.conf</filename> file:
|
|
<literallayout class='monospaced'>
|
|
CORE_IMAGE_EXTRA_INSTALL += "wayland weston"
|
|
</literallayout>
|
|
</para>
|
|
</section>
|
|
</section>
|
|
|
|
<section id="running-weston">
|
|
<title>Running Weston</title>
|
|
|
|
<para>
|
|
To run Weston inside X11, enabling it as described earlier and
|
|
building a Sato image is sufficient.
|
|
If you are running your image under Sato, a Weston Launcher appears
|
|
in the "Utility" category.
|
|
</para>
|
|
|
|
<para>
|
|
Alternatively, you can run Weston through the command-line
|
|
interpretor (CLI), which is better suited for development work.
|
|
To run Weston under the CLI, you need to do the following after
|
|
your image is built:
|
|
<orderedlist>
|
|
<listitem><para>Run these commands to export
|
|
<filename>XDG_RUNTIME_DIR</filename>:
|
|
<literallayout class='monospaced'>
|
|
mkdir -p /tmp/$USER-weston
|
|
chmod 0700 /tmp/$USER-weston
|
|
export XDG_RUNTIME_DIR=/tmp/$USER-weston
|
|
</literallayout></para></listitem>
|
|
<listitem><para>Launch Weston in the shell:
|
|
<literallayout class='monospaced'>
|
|
weston
|
|
</literallayout></para></listitem>
|
|
</orderedlist>
|
|
</para>
|
|
</section>
|
|
</section>
|
|
|
|
<section id="licenses">
|
|
<title>Licenses</title>
|
|
|
|
<para>
|
|
This section describes the mechanism by which the OpenEmbedded build system
|
|
tracks changes to licensing text.
|
|
The section also describes how to enable commercially licensed recipes,
|
|
which by default are disabled.
|
|
</para>
|
|
|
|
<para>
|
|
For information that can help you maintain compliance with various open
|
|
source licensing during the lifecycle of the product, see the
|
|
"<ulink url='&YOCTO_DOCS_DEV_URL;#maintaining-open-source-license-compliance-during-your-products-lifecycle'>Maintaining Open Source License Compliance During Your Project's Lifecycle</ulink>"
|
|
section in the Yocto Project Development Tasks Manual.
|
|
</para>
|
|
|
|
<section id="usingpoky-configuring-LIC_FILES_CHKSUM">
|
|
<title>Tracking License Changes</title>
|
|
|
|
<para>
|
|
The license of an upstream project might change in the future.
|
|
In order to prevent these changes going unnoticed, the
|
|
<filename><link linkend='var-LIC_FILES_CHKSUM'>LIC_FILES_CHKSUM</link></filename>
|
|
variable tracks changes to the license text. The checksums are validated at the end of the
|
|
configure step, and if the checksums do not match, the build will fail.
|
|
</para>
|
|
|
|
<section id="usingpoky-specifying-LIC_FILES_CHKSUM">
|
|
<title>Specifying the <filename>LIC_FILES_CHKSUM</filename> Variable</title>
|
|
|
|
<para>
|
|
The <filename>LIC_FILES_CHKSUM</filename>
|
|
variable contains checksums of the license text in the source
|
|
code for the recipe.
|
|
Following is an example of how to specify
|
|
<filename>LIC_FILES_CHKSUM</filename>:
|
|
<literallayout class='monospaced'>
|
|
LIC_FILES_CHKSUM = "file://COPYING;md5=xxxx \
|
|
file://licfile1.txt;beginline=5;endline=29;md5=yyyy \
|
|
file://licfile2.txt;endline=50;md5=zzzz \
|
|
..."
|
|
</literallayout>
|
|
<note><title>Notes</title>
|
|
<itemizedlist>
|
|
<listitem><para>
|
|
When using "beginline" and "endline", realize that
|
|
line numbering begins with one and not zero.
|
|
Also, the included lines are inclusive (i.e. lines
|
|
five through and including 29 in the previous
|
|
example for <filename>licfile1.txt</filename>).
|
|
</para></listitem>
|
|
<listitem><para>
|
|
When a license check fails, the selected license
|
|
text is included as part of the QA message.
|
|
Using this output, you can determine the exact
|
|
start and finish for the needed license text.
|
|
</para></listitem>
|
|
</itemizedlist>
|
|
</note>
|
|
</para>
|
|
|
|
<para>
|
|
The build system uses the
|
|
<filename><link linkend='var-S'>S</link></filename> variable as
|
|
the default directory when searching files listed in
|
|
<filename>LIC_FILES_CHKSUM</filename>.
|
|
The previous example employs the default directory.
|
|
</para>
|
|
|
|
<para>
|
|
Consider this next example:
|
|
<literallayout class='monospaced'>
|
|
LIC_FILES_CHKSUM = "file://src/ls.c;beginline=5;endline=16;\
|
|
md5=bb14ed3c4cda583abc85401304b5cd4e"
|
|
LIC_FILES_CHKSUM = "file://${WORKDIR}/license.html;md5=5c94767cedb5d6987c902ac850ded2c6"
|
|
</literallayout>
|
|
</para>
|
|
|
|
<para>
|
|
The first line locates a file in
|
|
<filename>${S}/src/ls.c</filename> and isolates lines five
|
|
through 16 as license text.
|
|
The second line refers to a file in
|
|
<filename><link linkend='var-WORKDIR'>WORKDIR</link></filename>.
|
|
</para>
|
|
<para>
|
|
Note that <filename>LIC_FILES_CHKSUM</filename> variable is
|
|
mandatory for all recipes, unless the
|
|
<filename>LICENSE</filename> variable is set to "CLOSED".
|
|
</para>
|
|
</section>
|
|
|
|
<section id="usingpoky-LIC_FILES_CHKSUM-explanation-of-syntax">
|
|
<title>Explanation of Syntax</title>
|
|
<para>
|
|
As mentioned in the previous section, the
|
|
<filename>LIC_FILES_CHKSUM</filename> variable lists all the
|
|
important files that contain the license text for the source code.
|
|
It is possible to specify a checksum for an entire file, or a specific section of a
|
|
file (specified by beginning and ending line numbers with the "beginline" and "endline"
|
|
parameters, respectively).
|
|
The latter is useful for source files with a license notice header,
|
|
README documents, and so forth.
|
|
If you do not use the "beginline" parameter, then it is assumed that the text begins on the
|
|
first line of the file.
|
|
Similarly, if you do not use the "endline" parameter, it is assumed that the license text
|
|
ends with the last line of the file.
|
|
</para>
|
|
|
|
<para>
|
|
The "md5" parameter stores the md5 checksum of the license text.
|
|
If the license text changes in any way as compared to this parameter
|
|
then a mismatch occurs.
|
|
This mismatch triggers a build failure and notifies the developer.
|
|
Notification allows the developer to review and address the license text changes.
|
|
Also note that if a mismatch occurs during the build, the correct md5
|
|
checksum is placed in the build log and can be easily copied to the recipe.
|
|
</para>
|
|
|
|
<para>
|
|
There is no limit to how many files you can specify using the
|
|
<filename>LIC_FILES_CHKSUM</filename> variable.
|
|
Generally, however, every project requires a few specifications for license tracking.
|
|
Many projects have a "COPYING" file that stores the license information for all the source
|
|
code files.
|
|
This practice allows you to just track the "COPYING" file as long as it is kept up to date.
|
|
</para>
|
|
|
|
<tip>
|
|
If you specify an empty or invalid "md5" parameter, BitBake returns an md5 mis-match
|
|
error and displays the correct "md5" parameter value during the build.
|
|
The correct parameter is also captured in the build log.
|
|
</tip>
|
|
|
|
<tip>
|
|
If the whole file contains only license text, you do not need to use the "beginline" and
|
|
"endline" parameters.
|
|
</tip>
|
|
</section>
|
|
</section>
|
|
|
|
<section id="enabling-commercially-licensed-recipes">
|
|
<title>Enabling Commercially Licensed Recipes</title>
|
|
|
|
<para>
|
|
By default, the OpenEmbedded build system disables
|
|
components that have commercial or other special licensing
|
|
requirements.
|
|
Such requirements are defined on a
|
|
recipe-by-recipe basis through the
|
|
<link linkend='var-LICENSE_FLAGS'><filename>LICENSE_FLAGS</filename></link>
|
|
variable definition in the affected recipe.
|
|
For instance, the
|
|
<filename>poky/meta/recipes-multimedia/gstreamer/gst-plugins-ugly</filename>
|
|
recipe contains the following statement:
|
|
<literallayout class='monospaced'>
|
|
LICENSE_FLAGS = "commercial"
|
|
</literallayout>
|
|
Here is a slightly more complicated example that contains both an
|
|
explicit recipe name and version (after variable expansion):
|
|
<literallayout class='monospaced'>
|
|
LICENSE_FLAGS = "license_${PN}_${PV}"
|
|
</literallayout>
|
|
In order for a component restricted by a <filename>LICENSE_FLAGS</filename>
|
|
definition to be enabled and included in an image, it
|
|
needs to have a matching entry in the global
|
|
<link linkend='var-LICENSE_FLAGS_WHITELIST'><filename>LICENSE_FLAGS_WHITELIST</filename></link>
|
|
variable, which is a variable
|
|
typically defined in your <filename>local.conf</filename> file.
|
|
For example, to enable
|
|
the <filename>poky/meta/recipes-multimedia/gstreamer/gst-plugins-ugly</filename>
|
|
package, you could add either the string
|
|
"commercial_gst-plugins-ugly" or the more general string
|
|
"commercial" to <filename>LICENSE_FLAGS_WHITELIST</filename>.
|
|
See the
|
|
"<link linkend='license-flag-matching'>License Flag Matching</link>" section
|
|
for a full explanation of how <filename>LICENSE_FLAGS</filename> matching works.
|
|
Here is the example:
|
|
<literallayout class='monospaced'>
|
|
LICENSE_FLAGS_WHITELIST = "commercial_gst-plugins-ugly"
|
|
</literallayout>
|
|
Likewise, to additionally enable the package built from the recipe containing
|
|
<filename>LICENSE_FLAGS = "license_${PN}_${PV}"</filename>, and assuming
|
|
that the actual recipe name was <filename>emgd_1.10.bb</filename>,
|
|
the following string would enable that package as well as
|
|
the original <filename>gst-plugins-ugly</filename> package:
|
|
<literallayout class='monospaced'>
|
|
LICENSE_FLAGS_WHITELIST = "commercial_gst-plugins-ugly license_emgd_1.10"
|
|
</literallayout>
|
|
As a convenience, you do not need to specify the complete license string
|
|
in the whitelist for every package.
|
|
You can use an abbreviated form, which consists
|
|
of just the first portion or portions of the license string before
|
|
the initial underscore character or characters.
|
|
A partial string will match
|
|
any license that contains the given string as the first
|
|
portion of its license.
|
|
For example, the following
|
|
whitelist string will also match both of the packages
|
|
previously mentioned as well as any other packages that have
|
|
licenses starting with "commercial" or "license".
|
|
<literallayout class='monospaced'>
|
|
LICENSE_FLAGS_WHITELIST = "commercial license"
|
|
</literallayout>
|
|
</para>
|
|
|
|
<section id="license-flag-matching">
|
|
<title>License Flag Matching</title>
|
|
|
|
<para>
|
|
License flag matching allows you to control what recipes the
|
|
OpenEmbedded build system includes in the build.
|
|
Fundamentally, the build system attempts to match
|
|
<link linkend='var-LICENSE_FLAGS'><filename>LICENSE_FLAGS</filename></link>
|
|
strings found in recipes against
|
|
<link linkend='var-LICENSE_FLAGS_WHITELIST'><filename>LICENSE_FLAGS_WHITELIST</filename></link>
|
|
strings found in the whitelist.
|
|
A match causes the build system to include a recipe in the
|
|
build, while failure to find a match causes the build system to
|
|
exclude a recipe.
|
|
</para>
|
|
|
|
<para>
|
|
In general, license flag matching is simple.
|
|
However, understanding some concepts will help you
|
|
correctly and effectively use matching.
|
|
</para>
|
|
|
|
<para>
|
|
Before a flag
|
|
defined by a particular recipe is tested against the
|
|
contents of the whitelist, the expanded string
|
|
<filename>_${PN}</filename> is appended to the flag.
|
|
This expansion makes each <filename>LICENSE_FLAGS</filename>
|
|
value recipe-specific.
|
|
After expansion, the string is then matched against the
|
|
whitelist.
|
|
Thus, specifying
|
|
<filename>LICENSE_FLAGS = "commercial"</filename>
|
|
in recipe "foo", for example, results in the string
|
|
<filename>"commercial_foo"</filename>.
|
|
And, to create a match, that string must appear in the
|
|
whitelist.
|
|
</para>
|
|
|
|
<para>
|
|
Judicious use of the <filename>LICENSE_FLAGS</filename>
|
|
strings and the contents of the
|
|
<filename>LICENSE_FLAGS_WHITELIST</filename> variable
|
|
allows you a lot of flexibility for including or excluding
|
|
recipes based on licensing.
|
|
For example, you can broaden the matching capabilities by
|
|
using license flags string subsets in the whitelist.
|
|
<note>When using a string subset, be sure to use the part of
|
|
the expanded string that precedes the appended underscore
|
|
character (e.g. <filename>usethispart_1.3</filename>,
|
|
<filename>usethispart_1.4</filename>, and so forth).
|
|
</note>
|
|
For example, simply specifying the string "commercial" in
|
|
the whitelist matches any expanded
|
|
<filename>LICENSE_FLAGS</filename> definition that starts with
|
|
the string "commercial" such as "commercial_foo" and
|
|
"commercial_bar", which are the strings the build system
|
|
automatically generates for hypothetical recipes named
|
|
"foo" and "bar" assuming those recipes simply specify the
|
|
following:
|
|
<literallayout class='monospaced'>
|
|
LICENSE_FLAGS = "commercial"
|
|
</literallayout>
|
|
Thus, you can choose to exhaustively
|
|
enumerate each license flag in the whitelist and
|
|
allow only specific recipes into the image, or
|
|
you can use a string subset that causes a broader range of
|
|
matches to allow a range of recipes into the image.
|
|
</para>
|
|
|
|
<para>
|
|
This scheme works even if the
|
|
<filename>LICENSE_FLAGS</filename> string already
|
|
has <filename>_${PN}</filename> appended.
|
|
For example, the build system turns the license flag
|
|
"commercial_1.2_foo" into "commercial_1.2_foo_foo" and would
|
|
match both the general "commercial" and the specific
|
|
"commercial_1.2_foo" strings found in the whitelist, as
|
|
expected.
|
|
</para>
|
|
|
|
<para>
|
|
Here are some other scenarios:
|
|
<itemizedlist>
|
|
<listitem><para>You can specify a versioned string in the
|
|
recipe such as "commercial_foo_1.2" in a "foo" recipe.
|
|
The build system expands this string to
|
|
"commercial_foo_1.2_foo".
|
|
Combine this license flag with a whitelist that has
|
|
the string "commercial" and you match the flag along
|
|
with any other flag that starts with the string
|
|
"commercial".</para></listitem>
|
|
<listitem><para>Under the same circumstances, you can
|
|
use "commercial_foo" in the whitelist and the
|
|
build system not only matches "commercial_foo_1.2" but
|
|
also matches any license flag with the string
|
|
"commercial_foo", regardless of the version.
|
|
</para></listitem>
|
|
<listitem><para>You can be very specific and use both the
|
|
package and version parts in the whitelist (e.g.
|
|
"commercial_foo_1.2") to specifically match a
|
|
versioned recipe.</para></listitem>
|
|
</itemizedlist>
|
|
</para>
|
|
</section>
|
|
|
|
<section id="other-variables-related-to-commercial-licenses">
|
|
<title>Other Variables Related to Commercial Licenses</title>
|
|
|
|
<para>
|
|
Other helpful variables related to commercial
|
|
license handling exist and are defined in the
|
|
<filename>poky/meta/conf/distro/include/default-distrovars.inc</filename> file:
|
|
<literallayout class='monospaced'>
|
|
COMMERCIAL_AUDIO_PLUGINS ?= ""
|
|
COMMERCIAL_VIDEO_PLUGINS ?= ""
|
|
</literallayout>
|
|
If you want to enable these components, you can do so by making sure you have
|
|
statements similar to the following
|
|
in your <filename>local.conf</filename> configuration file:
|
|
<literallayout class='monospaced'>
|
|
COMMERCIAL_AUDIO_PLUGINS = "gst-plugins-ugly-mad \
|
|
gst-plugins-ugly-mpegaudioparse"
|
|
COMMERCIAL_VIDEO_PLUGINS = "gst-plugins-ugly-mpeg2dec \
|
|
gst-plugins-ugly-mpegstream gst-plugins-bad-mpegvideoparse"
|
|
LICENSE_FLAGS_WHITELIST = "commercial_gst-plugins-ugly commercial_gst-plugins-bad commercial_qmmp"
|
|
</literallayout>
|
|
Of course, you could also create a matching whitelist
|
|
for those components using the more general "commercial"
|
|
in the whitelist, but that would also enable all the
|
|
other packages with
|
|
<link linkend='var-LICENSE_FLAGS'><filename>LICENSE_FLAGS</filename></link>
|
|
containing "commercial", which you may or may not want:
|
|
<literallayout class='monospaced'>
|
|
LICENSE_FLAGS_WHITELIST = "commercial"
|
|
</literallayout>
|
|
</para>
|
|
|
|
<para>
|
|
Specifying audio and video plug-ins as part of the
|
|
<filename>COMMERCIAL_AUDIO_PLUGINS</filename> and
|
|
<filename>COMMERCIAL_VIDEO_PLUGINS</filename> statements
|
|
(along with the enabling
|
|
<filename>LICENSE_FLAGS_WHITELIST</filename>) includes the
|
|
plug-ins or components into built images, thus adding
|
|
support for media formats or components.
|
|
</para>
|
|
</section>
|
|
</section>
|
|
</section>
|
|
</chapter>
|
|
<!--
|
|
vim: expandtab tw=80 ts=4
|
|
-->
|