Buildroot

From eLinux.org
Jump to: navigation, search

Buildroot is a nice, simple, and efficient embedded Linux build system.

Important links

Developer days

Upcoming:

Past:

Talks

This section gathers the list of talks given about Buildroot, as well as the slides and video when available.

Past:

List of forks

  • SkiffOS is a modular config layering system for Buildroot with support for 50+ targets.
  • Batocera.linux is an open-source and completely free retro-gaming distribution.
  • Home Assistant Operating System. Home Assistant Operating System (formerly HassOS) is an operating system optimized for hosting Home Assistant and its Add-ons.
  • OpenIL. OpenIL is an open source project based on Buildroot and designed for embedded industrial solution.
  • Bsquask SDK. A Rasberry-Pi related fork.
  • buildroot-rpi. Another RPi related fork, with a lot of focus on Qt5 and GStreamer (appears to be defunct).
  • Buildroot Submodule. Not a fork, but a convenience layer on top of buildroot.
  • Experimental 'shell' around Buildroot. Another wrapper around Buildroot, to help manage projects.

Todo list

This is a list of improvements that we would like to see in buildroot. Feel free to add suggestions here. If you're working on one of these items, put your name and the date behind it, to avoid duplicate work.

There are a number of patches that have been determined to be useful but for various reasons nobody currently has time to review or test them. Anybody, especially a person new to buildroot, is welcome to adopt these patches and resubmit them to the mailing list.

Perpetual work

Some jobs are never finished. When you have a bit of uninterrupted time you would like to spend on Buildroot, you can pick one of these things.

Autobuild failures

The autobuild failures are random configurations for which the build fails. This is what we want to fix. A summary of failures is sent daily to the mailing list, this gives a good summary of the most frequently failing packages.

  • Go to the failing output ("end log" link) and see if it's an error message that you can make sense of. Often you can't, then just skip it and look for something else.
  • Check on patchwork if a fix was already posted. Also check in recent commit history if a fix was already committed. Also ask on IRC if someone is working on it.
  • Reproduce the issue with the br-reproduce-build script. However, it is often easier to first attempt to reproduce it by simply downloading the defconfig as .config, run make olddefconfig, then make <the package that fails>. Not all issues can be reproduced this way however! Also, if the failing configuration was using a Buildroot toolchain rather than an external toolchain, it can be worth to first try to reproduce with an external toolchain (which reduces the build time by quite a lot).
  • Produce a fix. Here are some hints.
    • Perhaps the package simply doesn't support that configuration (target architecture, libc type, static build, threads, GCC version) and a dependency has to be added in Config.in.
    • Sometimes a fix was already found by someone else and sent upstream, so check its bugs list, pull requests and recent commits. Also check if OpenEmbedded has a fix already.
    • Sometimes a similar issue was recently fixed for another package, so you can git log --grep '<some part of the error message>'.
  • Test the fix with the actual configuration (so no switching to external toolchain any more). Do a full clean build.
  • Check your changes with the utils/check-package script.
  • Post your fix according to the contribution guidelines in the manual.

See this commit for an example of what the commit message should look like. Important is to have:

  • the compilation error;
  • the Fixes: line;
  • your Signed-off-by.

Update CVE exceptions

Buildroot keeps track of which CVEs apply to each package, based on a CPE ID. However, many CVEs don't actually apply. In particular very old CVEs are likely not to be applicable to the version currently shipped in Buildroot.

  • Look at the package statistics. Sort by "CVEs". Look for a package with old CVEs.
  • For each CVE, check if it really applies.
  • If not, update the package's FOO_IGNORE_CVES with the CVE to ignore. Commit with a commit message that explains in detail why the CVE can be ignored. Example commit message.
  • If the CVE really applies, check if there is an upstream patch fixing it.
  • Check your changes with the utils/check-package script.
  • Post your fix according to the contribution guidelines in the manual.

Packages

Note: if you start working on any of these packages, please edit this section to indicate it. If the package is proposed in a bug report, please also update the bug report. Sending a mail to the mailing list also never hurts, you never know that someone else started working on it without following this guideline.

Important

Nice to have

Toolchain

Documentation

  • Convert the documentation + the generation workflow from current asciidoc to either markdown or ReStructuredText (people are nowadays more used to that syntax, and they are formatted directly when viewed in gitlab/github).
  • Document how to contribute (how often to repost, what to expect, ...) basic guide
  • Document that package patches should be sent upstream

Core Buildroot infrastructure

  • Cargo and Go post-process handling for vendoring
    • Add support for tarball formats other than gz
  • Several improvements are possible in the download infrastructure (even after all the improvements that were already done):
    • Rename the downloaded files so they include the package name and version. Special care has to be taken for primary and secondary sites, and for extra downloads (including patches).
    • Split between FOO_SITE and FOO_SOURCE shouldn't be necessary. Or it could be made optional, i.e. make it possible to specify the full path in FOO_SOURCE.
  • Add instrumentation scripts to analyse package installed files:
    • find libraries with wrong RPATH/RUNPATH tags
    • detect unused .so libs (eg. shared libs that are not DT_NEEDED by anything - note: only detect those libs, don't remove: can be used as plugin (dlopen), or used by an application built outside Buildroot)
  • A script that checks consistency of depends/select for packages. Maybe it can be integrated to the current check-package.

Testing infrastructure

  • Fix run-tests to use a config file for download and output directories, can be overridden in the environment
  • Documentation on how to add a test, including naming convention

TODO items under discussion

Here are some nice-to-have's for which it is not entirely clear if and how they could be implemented:

  • Out-of-tree builds, which allows the package source to be shared between different output directories and between host and target compiles.
  • It would be nice if you could run a buildroot command that prepares a local copy of a package's source, and allows you to generate patches for it later. This could use git or quilt to keep track of the patches.
  • It would be nice if there was a make target to reinstall everything to the target (i.e. remove all the target-installed stamps, remove the root stamp, maybe remove the target too). However, what is missing is the copying of the toolchain support files (libc.so etc.). It's not obvious that this can be done in a reliable way.
  • To facilitate debugging, all packages should be installed to the staging directory. The target directory should in fact be a subset of the staging directory. See the FOSDEM 2013 discussion at http://elinux.org/Buildroot:DeveloperDaysFOSDEM2013, and the discussion around patch http://patchwork.ozlabs.org/patch/252718/. This is however a significant change in Buildroot, so probably difficult to implement, and will raise a number of quite complicated questions.