No Description

Rebecca Chang 9cf308f7e8 Merge branch 'starfive-kirkstone' into 'starfive-kirkstone' 4 months ago
conf c837de8dc5 dubhe: Add initial Dubhe-70 support 4 months ago
recipes-benchmark 38100047e6 dhrystone: Add patch to remove prompt 11 months ago
recipes-bsp 0302005c98 dubhe: u-boot-starfive: Update U-Boot 4 months ago
recipes-connectivity 076a8b58f5 sshpass: add new package 6 months ago
recipes-core c837de8dc5 dubhe: Add initial Dubhe-70 support 4 months ago
recipes-crypto 11f6b5a6db jh8100: libkcapi: Added recipe 6 months ago
recipes-devtools 59e9e98749 gcc: Patch update 4 months ago
recipes-extended 5b0089ba89 jh8100: mnn: Fix build with gcc-13 8 months ago
recipes-graphics 9b1355c268 weston: Add weston recipe 6 months ago
recipes-httpd 768e9d8773 nginx: Add nginx-upload-module 1 year ago
recipes-kernel 6c5ff38d68 dubhe: linux-starfive-dev: Upgrade version to 6.6.31 4 months ago
recipes-multimedia 7ee42bc0dd Merge branch 'starfive-kirkstone' into 'starfive-kirkstone' 5 months ago
recipes-support d921365a92 jh8100: i3c-tools: Added recipe 11 months ago
tools fb3a3ff8ee meta-starfive: Remove dependency on meta-riscv 1 year ago
wic 08962150ad jh8100: starfive-jh8100: Update machine config and wks 11 months ago
README.md fb3a3ff8ee meta-starfive: Remove dependency on meta-riscv 1 year ago
setup.sh 8bc5190056 dubhe: setup.sh: Update setup script 10 months ago

README.md

StarFive Linux Software Development Kit (SDK)

The StarFive Dubhe Linux SDK is based on Yocto Project. It enables the creation of Linux distributions for any embedded project, as well as easy migration from a different architecture platform. The meta-starfive layer provides additional modifications such as Linux Kernel, and toolchains like GCC and LLVM.

Supported Features

  • FPGA Image Generation
    • Able to generate an image to boot up on FPGA directly


  • Yocto extensible-SDK (eSDK)
    • Shell-script installer
    • Shrink-wrapped distro maintainer environment
    • Updateable and Extensible

Setting up meta-starfive

Guide to use meta-starfive using Yocto

Dependencies

First, you need to download the essential Yocto dependencies, which can also be found on their official Yocto Guide:

$ sudo apt install gawk wget git diffstat unzip texinfo gcc build-essential chrpath socat cpio python3 python3-pip python3-pexpect xz-utils debianutils iputils-ping python3-git python3-jinja2 libegl1-mesa libsdl1.2-dev pylint3 xterm python3-subunit mesa-common-dev zstd liblz4-tool

Installing Repo

Next, you will need to install the repo command from Google.

Setup

Create a workspace

Now, we will be creating a workspace and retrieve the latest layers needed for our image creation.

$ mkdir starfive-yocto && cd starfive-yocto
$ repo init -u https://github.com/starfive-tech/meta-starfive -b starfive-kirkstone -m tools/manifests/starfive.xml
$ repo sync
$ repo start work --all

Setup Bitbake Environment

After having all the layers required, you can now source into the build environment by running the setup.sh script in the meta-starfive layer. You should run the script in the starfive-yocto folder directory.

$ . ./meta-starfive/setup.sh

Available Machines

In meta-starfive, there is currently only one buildable machine that you can build for:

  • starfive-dubhe: The StarFive Dubhe machine

Build Images

To build a initramfs image with QSPI-Image binary:

$ MACHINE=starfive-dubhe bitbake qspi-image

For the bitbake command, you can control the number of parallel tasks and the number of cores that Bitbake will use. You can either add the variables in the <build_directory>/conf/local.conf file, or add it in your shell environment command, for example:

$ PARALLEL_MAKE="-j 6" BB_NUMBER_THREADS=4 MACHINE=starfive-dubhe bitbake qspi-image

To populate the extensible eSDK shell script, you can use the -c populate_sdk_ext command:

$ MACHINE=starfive-dubhe bitbake qspi-image -c populate_sdk_ext

NOTE: For your first build, it may take several hours to build the image.

Running in QEMU

Run the 64-bit machine in QEMU using the following command:

MACHINE=starfive-dubhe runqemu nographic dubhe-image-initramfs


Tip: Once QEMU starts, in nographic mode, the terminal is ‘controlled’ by the Linux console. Thus, to kill QEMU and get back to the terminal, you can:

  • CTRL-a x to kill QEMU and exit

Running on FPGA

You will find image components such as openSBI (fwpayload.bin) and the Linux kernel in the bitbake build directory (/build/tmp-glibc/deploy/images/starfive-dubhe/_) after your bitbake process is done. You can also find the full QSPI binary image generated (QSPI-Image.bin), which includes the boot codes, openSBI and kernel in a single binary.

You can flash the QSPI binary into the FPGA via openOCD or other FPGA flashing tools.


Modifying the Kernel

To modify the kernel, you can use the devtool command line:

$ MACHINE=starfive-dubhe devtool modify virtual/kernel

The devtool command will fetch the source code and unpack them in the _‘build/workspace/sources/‘_ directory.

Now you can make your changes in your source code in the workspace directory.

Building the Kernel

After you had done your changes, you can build only the kernel by:

$ MACHINE=starfive-dubhe devtool build <kernel_name>

or 

$ MACHINE=starfive-dubhe bitbake virtual/kernel

You can obtain the image generated in the images folder _build/tmp-glibc/deploy/images/starfive-dubhe/_

Saving the Modification

Once you are happy with the changes, you can go to the source folder and commit your changes:

  • Go to _workspace/sources/_:
    • $ git status
    • $ git add .
    • $ git commit -m "Changes added"
  • Create a bbappend and patch file:
    • $ devtool finish <kernel_name> <layer_path>
  • Rebuilding the Image

    To rebuild your image, the steps include:

    $ MACHINE=starfive-dubhe bitbake qspi-image
    

    Rebuilding will take less time as the sstate-cache is saved during your first build.

    Extras

    In case you accidentally deleted files in the build/tmp/deploy/images/ directory and some of the files are not automatically re-created when you build the image again, you can rebuild and recreate the kernel files by:

    $ MACHINE=starfive-dubhe bitbake -c clean virtual/kernel
    $ MACHINE=starfive-dubhe bitbake virtual/kernel