slarm64 This forum is for the discussion of slarm64. |
Notices |
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
Are you new to LinuxQuestions.org? Visit the following links:
Site Howto |
Site FAQ |
Sitemap |
Register Now
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
|
 |
|
01-25-2022, 02:48 PM
|
#1
|
Senior Member
Registered: Aug 2014
Posts: 2,158
Rep: 
|
Rock64 RK3328 (aarch64)
previous discussion Rock64
|
|
|
01-26-2022, 10:49 AM
|
#2
|
Senior Member
Registered: Aug 2014
Posts: 2,158
Original Poster
Rep: 
|
Last edited by sndwvs; 01-26-2022 at 10:52 AM.
|
|
1 members found this post helpful.
|
01-26-2022, 11:06 AM
|
#3
|
Member
Registered: Jul 2008
Location: Tilburg, The Netherlands
Distribution: Void Linux, Slackware, Devuan
Posts: 183
Rep: 
|
Thanks! Should I comment out the mirror in /etc/slackpkg/mirrors and update? Is that safe to do?
|
|
|
01-26-2022, 06:38 PM
|
#4
|
Member
Registered: Mar 2019
Distribution: Slackware
Posts: 309
Rep: 
|
Quote:
Originally Posted by Hannes Worst
Thanks! Should I comment out the mirror in /etc/slackpkg/mirrors and update? Is that safe to do?
|
UNcomment your mirror of choice and upgrade to your heart's content. Yes, totally safe to do, I have a Rock64 running slarm64 24/7 as a torrent box and LAN server / update mirror, I keep it upgraded regularly. No problems, highly stable.
|
|
1 members found this post helpful.
|
02-14-2022, 11:59 AM
|
#5
|
Senior Member
Registered: Aug 2014
Posts: 2,158
Original Poster
Rep: 
|
|
|
|
03-12-2022, 12:01 AM
|
#6
|
LQ Newbie
Registered: Oct 2012
Location: Various
Distribution: Slackware64-current
Posts: 8
Rep: 
|
Just a quick FYI/bug report. I'm writing up some nice instructions for getting Octoprint up on the Rock64. In doing that, I'm trying to do everything "right". If you do the recommended slackpkg commands, it will brick it. Well, just not boot to that SD again, until you reimage or fix it.
Code:
slackpkg update
slackpkg install-new
slackpkg upgrade-all
slackpkg clean-system
It's the slackpkg clean-system that's doing it.
The image I'm installing with is: slarm64-current-aarch64-xfce-rock64-5.16.9-build-20220214.img
I was doing it on Mar-10-2022 and Mar-11-2022.
It did it using both slarm64-15.0 and slarm64-current from
Code:
http://dl.slarm64.org/slarm64/slarm64-15.0/
http://dl.slarm64.org/slarm64/slarm64-current/
At the beginning of 'slackpkg clean-system', it says that it's going to remove these packages. They're all listed, even though it's obvious that some are totally unrelated. Just trying to be complete.
Code:
ffmpeg-rockchip-4.4.1-aarch64-2
kernel-firmware-rk3328-5.16.9-aarch64-1mara
kernel-headers-rk3328-5.16.9-aarch64-1mara
kernel-modules-rk3328-5.16.9-aarch64-1mara
kernel-rk3328-5.16.9-aarch64-1mara
kernel-source-rk3328-5.16.9-noarch-1mara
libass-20210619_4779444-aarch64-1mara
libdrm-rockchip-2.4.109-aarch64-1mara
libgl-rk3328-r7p0-aarch64-6mara
lightdm-1.30.0-aarch64-7mara
lightdm-gtk-greeter-2.0.8-aarch64-1mara
mpv-rockchip-0.34.0-aarch64-1mara
transmission-20220102_a5c6168-aarch64-1mara
xfce4-alsa-plugin-20200607_7192d34-aarch64-2mara
xfce4-xkb-plugin-0.8.1-aarch64-1mara
I'm guessing that some part of the installation for the kernel isn't happening, so removing the files breaks it. There is also nothing in the default /etc/slackpkg/blacklist . I tried to get a serial console up to my board, but that didn't work with either a CP2102 or FTDI FT232RL, at 1500000 8N1N, so I can't give any more useful feedback there. I've done it several times now, and I haven't done anything extra before updating. I'm trying to go through my instructions to make sure they're easy for a layman, so it's by the numbers simple.
Also, there's something wrong with the osdn.net mirrors. Some files on some mirrors are showing 404, and slackpkg is saving a 0 byte file for each. That upsets it when it's trying to install them. It was also throwing md5sum and gpg errors, but I think they were all caused by the 404 thing. Switching to dl.slarm64.org links fixed that. Sorry for sucking up your bandwidth.
Code:
https://osdn.net/projects/slarm64/storage/slarm64-15.0/
https://osdn.net/projects/slarm64/storage/slarm64-current/
If you need any more info, feel free to ask. I don't mind doing stuff to this board for a little while to test. Once it's managing it's printer, I'd like to leave it there.
|
|
|
03-12-2022, 01:02 AM
|
#7
|
Senior Member
Registered: Aug 2014
Posts: 2,158
Original Poster
Rep: 
|
Quote:
Originally Posted by JWSmythe
Just a quick FYI/bug report. I'm writing up some nice instructions for getting Octoprint up on the Rock64. In doing that, I'm trying to do everything "right". If you do the recommended slackpkg commands, it will brick it. Well, just not boot to that SD again, until you reimage or fix it.
Code:
slackpkg update
slackpkg install-new
slackpkg upgrade-all
slackpkg clean-system
It's the slackpkg clean-system that's doing it.
The image I'm installing with is: slarm64-current-aarch64-xfce-rock64-5.16.9-build-20220214.img
I was doing it on Mar-10-2022 and Mar-11-2022.
It did it using both slarm64-15.0 and slarm64-current from
Code:
http://dl.slarm64.org/slarm64/slarm64-15.0/
http://dl.slarm64.org/slarm64/slarm64-current/
At the beginning of 'slackpkg clean-system', it says that it's going to remove these packages. They're all listed, even though it's obvious that some are totally unrelated. Just trying to be complete.
Code:
ffmpeg-rockchip-4.4.1-aarch64-2
kernel-firmware-rk3328-5.16.9-aarch64-1mara
kernel-headers-rk3328-5.16.9-aarch64-1mara
kernel-modules-rk3328-5.16.9-aarch64-1mara
kernel-rk3328-5.16.9-aarch64-1mara
kernel-source-rk3328-5.16.9-noarch-1mara
libass-20210619_4779444-aarch64-1mara
libdrm-rockchip-2.4.109-aarch64-1mara
libgl-rk3328-r7p0-aarch64-6mara
lightdm-1.30.0-aarch64-7mara
lightdm-gtk-greeter-2.0.8-aarch64-1mara
mpv-rockchip-0.34.0-aarch64-1mara
transmission-20220102_a5c6168-aarch64-1mara
xfce4-alsa-plugin-20200607_7192d34-aarch64-2mara
xfce4-xkb-plugin-0.8.1-aarch64-1mara
I'm guessing that some part of the installation for the kernel isn't happening, so removing the files breaks it. There is also nothing in the default /etc/slackpkg/blacklist . I tried to get a serial console up to my board, but that didn't work with either a CP2102 or FTDI FT232RL, at 1500000 8N1N, so I can't give any more useful feedback there. I've done it several times now, and I haven't done anything extra before updating. I'm trying to go through my instructions to make sure they're easy for a layman, so it's by the numbers simple.
|
That's right, the kernel used for rock64 is not vanilla ( a number of patches have been applied), so when you purge, you remove the kernel.
Some packages are also removed that are not included in the slarm64 distribution (which repeats the slackware64 package base).
Quote:
Originally Posted by JWSmythe
Also, there's something wrong with the osdn.net mirrors. Some files on some mirrors are showing 404, and slackpkg is saving a 0 byte file for each. That upsets it when it's trying to install them. It was also throwing md5sum and gpg errors, but I think they were all caused by the 404 thing. Switching to dl.slarm64.org links fixed that. Sorry for sucking up your bandwidth.
Code:
https://osdn.net/projects/slarm64/storage/slarm64-15.0/
https://osdn.net/projects/slarm64/storage/slarm64-current/
If you need any more info, feel free to ask. I don't mind doing stuff to this board for a little while to test. Once it's managing it's printer, I'd like to leave it there.
|
Уes, there is something strange with osdn.net.
|
|
|
03-12-2022, 11:07 AM
|
#8
|
LQ Newbie
Registered: Oct 2012
Location: Various
Distribution: Slackware64-current
Posts: 8
Rep: 
|
Quote:
Originally Posted by sndwvs
That's right, the kernel used for rock64 is not vanilla ( a number of patches have been applied), so when you purge, you remove the kernel.
Some packages are also removed that are not included in the slarm64 distribution (which repeats the slackware64 package base).
|
Shouldn't kernel-* be added to /etc/slackpkg/blacklist by default? So normal users don't accidentally blow away their kernels? When I saw it, I assumed that it had been upgraded by another kernel-* package, and those were leftovers.
I have updated my instructions to warn about this. Just to not do clean-system, not update the blacklist.
|
|
|
03-12-2022, 01:42 PM
|
#9
|
Senior Member
Registered: Aug 2014
Posts: 2,158
Original Poster
Rep: 
|
Quote:
Originally Posted by JWSmythe
Shouldn't kernel-* be added to /etc/slackpkg/blacklist by default? So normal users don't accidentally blow away their kernels? When I saw it, I assumed that it had been upgraded by another kernel-* package, and those were leftovers.
I have updated my instructions to warn about this. Just to not do clean-system, not update the blacklist.
|
To be honest, I would not like to remove the ability for the user to control his system (this happened for the first time).
osdn.net loading fixed.
|
|
1 members found this post helpful.
|
03-12-2022, 04:24 PM
|
#10
|
LQ Newbie
Registered: Oct 2012
Location: Various
Distribution: Slackware64-current
Posts: 8
Rep: 
|
Quote:
Originally Posted by sndwvs
To be honest, I would not like to remove the ability for the user to control his system (this happened for the first time).
osdn.net loading fixed.
|
Fair enough. I put it in my writeup, with an explanation. I hope someone might use it, but there's a good chance this whole thing will only ever be read by 3 people.
BTW, did you notice that wget doesn't work on http s://dl.slarm64.org? It's something with the ZeroSSL CA. I guess it isn't in our cert bundle.
My site (also tested below) was failing with the ca-certificates included on the installation image, but it was fixed after updating ca-certificates to current. That was because of a recent problem with Let's Encrypt, which was fixed recently.
I checked it with wget on the Rock64, and on my Slackware64 14.2 server. Those are both broken It also fails under the Kali WSL on Windows, with the "certificate ... doesn't have a known issuer". I also updated the ca-certificates on the Rock64 with the mainstream Slackware-current package (20220309), and it still fails.
It does work fine with current Chrome on Win11. I know the Chrome folks are more attentive to keeping all the certs updated. It doesn't matter to me, and just using the http:// link works perfectly, but some people may not know or bother to look. I will try building my own updated ca-certificates package with the Slackware-current build scripts, and see if it fixes anything, but that looks like it last gathered the cert data 3 days ago. So it's a problem with ZeroSSL's trust, not slarm64, other than making life difficult for people.
Code:
root@rock64:~# slackpkg search ca-certificates
Looking for ca-certificates in package list. Please wait... DONE
The list below shows all packages with name matching "ca-certificates".
[ installed ] - ca-certificates-20220309-noarch-1
You can search specific files using "slackpkg file-search file".
root@rock64:~# wget https://dl.slarm64.org
--2022-03-12 22:02:18-- https://dl.slarm64.org/
Resolving dl.slarm64.org (dl.slarm64.org)... 193.151.15.132
Connecting to dl.slarm64.org (dl.slarm64.org)|193.151.15.132|:443... connected.
ERROR: cannot verify dl.slarm64.org's certificate, issued by ‘CN=ZeroSSL RSA Domain Secure Site CA,O=ZeroSSL,C=AT’:
Unable to locally verify the issuer's authority.
To connect to dl.slarm64.org insecurely, use `--no-check-certificate'.
root@rock64:~# wget https://jwsmythe.com
--2022-03-12 22:02:27-- https://jwsmythe.com/
Resolving jwsmythe.com (jwsmythe.com)... 47.206.58.201
Connecting to jwsmythe.com (jwsmythe.com)|47.206.58.201|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: 5281 (5.2K) [text/html]
Saving to: ‘index.html.2’
index.html.2 100%[============================================================>] 5.16K --.-KB/s in 0s
2022-03-12 22:02:27 (18.5 MB/s) - ‘index.html.2’ saved [5281/5281]
root@rock64:~#
|
|
|
03-12-2022, 06:43 PM
|
#11
|
Senior Member
Registered: Aug 2014
Posts: 2,158
Original Poster
Rep: 
|
Quote:
Originally Posted by JWSmythe
BTW, did you notice that wget doesn't work on http s://dl.slarm64.org? It's something with the ZeroSSL CA. I guess it isn't in our cert bundle.
My site (also tested below) was failing with the ca-certificates included on the installation image, but it was fixed after updating ca-certificates to current. That was because of a recent problem with Let's Encrypt, which was fixed recently.
I checked it with wget on the Rock64, and on my Slackware64 14.2 server. Those are both broken It also fails under the Kali WSL on Windows, with the "certificate ... doesn't have a known issuer". I also updated the ca-certificates on the Rock64 with the mainstream Slackware-current package (20220309), and it still fails.
It does work fine with current Chrome on Win11. I know the Chrome folks are more attentive to keeping all the certs updated. It doesn't matter to me, and just using the http:// link works perfectly, but some people may not know or bother to look. I will try building my own updated ca-certificates package with the Slackware-current build scripts, and see if it fixes anything, but that looks like it last gathered the cert data 3 days ago. So it's a problem with ZeroSSL's trust, not slarm64, other than making life difficult for people.
Code:
root@rock64:~# slackpkg search ca-certificates
Looking for ca-certificates in package list. Please wait... DONE
The list below shows all packages with name matching "ca-certificates".
[ installed ] - ca-certificates-20220309-noarch-1
You can search specific files using "slackpkg file-search file".
root@rock64:~# wget https://dl.slarm64.org
--2022-03-12 22:02:18-- https://dl.slarm64.org/
Resolving dl.slarm64.org (dl.slarm64.org)... 193.151.15.132
Connecting to dl.slarm64.org (dl.slarm64.org)|193.151.15.132|:443... connected.
ERROR: cannot verify dl.slarm64.org's certificate, issued by ‘CN=ZeroSSL RSA Domain Secure Site CA,O=ZeroSSL,C=AT’:
Unable to locally verify the issuer's authority.
To connect to dl.slarm64.org insecurely, use `--no-check-certificate'.
root@rock64:~# wget https://jwsmythe.com
--2022-03-12 22:02:27-- https://jwsmythe.com/
Resolving jwsmythe.com (jwsmythe.com)... 47.206.58.201
Connecting to jwsmythe.com (jwsmythe.com)|47.206.58.201|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: 5281 (5.2K) [text/html]
Saving to: ‘index.html.2’
index.html.2 100%[============================================================>] 5.16K --.-KB/s in 0s
2022-03-12 22:02:27 (18.5 MB/s) - ‘index.html.2’ saved [5281/5281]
root@rock64:~#
|
try
Code:
update-ca-certificates
after that should work.
|
|
|
03-13-2022, 03:08 PM
|
#12
|
LQ Newbie
Registered: Oct 2012
Location: Various
Distribution: Slackware64-current
Posts: 8
Rep: 
|
Quote:
Originally Posted by sndwvs
try
Code:
update-ca-certificates
after that should work.
|
Looks like someone fixed something.  It works now, without running update-ca-certificate. The timestamp on ca-certificates.crt is a few minutes before the tests I commented with.
|
|
|
03-13-2022, 10:20 PM
|
#13
|
Member
Registered: Mar 2019
Distribution: Slackware
Posts: 309
Rep: 
|
On a slightly different note, I am running into an issue with u-boot when trying to build a post-"dirty pipe" image for this board. (bold emphasis added)
Code:
UPD include/generated/timestamp_autogenerated.h
CC cmd/version.o
AR cmd/built-in.o
LD u-boot
OBJCOPY u-boot-nodtb.bin
./"arch/arm/mach-rockchip/make_fit_atf.py" \
arch/arm/dts/rk3328-rock64.dtb > u-boot.its
RELOC u-boot-nodtb.bin
MKIMAGE u-boot.itb
/hdd/slarm64/images_build_kit/build/source/u-boot /hdd/slarm64/images_build_kit/build/source/u-boot
tools/mkimage: Can't open /hdd/slarm64/images_build_kit/build/source/rkbin/bin/rk33/rk3328_ddr_333MHz_v1.19.bin: No such file or directory
Error: Bad parameters for image type
Usage: tools/mkimage -l image
-l ==> list image header information
tools/mkimage [-x] -A arch -O os -T type -C comp -a addr -e ep -n name -d data_file[:data_file...] image
-A ==> set architecture to 'arch'
-O ==> set operating system to 'os'
-T ==> set image type to 'type'
-C ==> set compression type 'comp'
-a ==> set load address to 'addr' (hex)
-e ==> set entry point to 'ep' (hex)
-n ==> set image name to 'name'
-d ==> use image data from 'datafile'
-x ==> set XIP (execute in place)
tools/mkimage [-D dtc_options] [-f fit-image.its|-f auto|-F] [-b <dtb> [-b <dtb>]] [-E] [-B size] [-i <ramdisk.cpio.gz>] fit-image
<dtb> file is used with -f auto, it may occur multiple times.
-D => set all options for device tree compiler
-f => input filename for FIT source
-i => input filename for ramdisk file
-E => place data outside of the FIT structure
-B => align size in hex for FIT structure and header
Signing / verified boot options: [-k keydir] [-K dtb] [ -c <comment>] [-p addr] [-r] [-N engine]
-k => set directory containing private keys
-K => write public keys to this .dtb file
-G => use this signing key (in lieu of -k)
-c => add comment in signature node
-F => re-sign existing FIT image
-p => place external data at a static position
-r => mark keys used as 'required' in dtb
-N => openssl engine to use for signing
tools/mkimage -V ==> print version information and exit
Use '-T list' to see a list of available image types
A quick look in the directory with the missing file shows that a version bump is needed in the mentioned binary:
Code:
root@quartz:/hdd/slarm64/images_build_kit# ls /hdd/slarm64/images_build_kit/build/source/rkbin/bin/rk33/
px30_bl31_v1.22.elf rk3308_ddr_451MHz_uart4_m0_v1.31.bin* rk3366_miniloader_v1.02.bin rk3399_miniloader_spinor_v1.14.bin*
px30_bl32_v1.15.bin rk3308_ddr_589MHz_uart2_m1_v1.31.bin rk3366_usbplug_v1.02.bin rk3399_miniloader_v1.26.bin*
px30_ddr_333MHz_v1.16.bin* rk3308_ddr_589MHz_uart4_m0_v1.31.bin* rk3368_bl30_v2.13.bin rk3399_usbplug_spinor_v1.14.bin*
px30_miniloader_slc_v1.31.bin* rk3308_miniloader_v1.27.bin rk3368_bl30_v2.16.bin* rk3399_usbplug_v1.26.bin*
px30_miniloader_v1.31.bin* rk3308_miniloader_wo_ftl_v1.27.bin rk3368_bl31_v1.91.bin* rk3399pro_bl31_v1.35.elf
px30_usbplug_slc_v1.31.bin* rk3308_usbplug_v1.27.bin rk3368_bl32_v0.10.bin rk3399pro_bl32_v2.01.bin
px30_usbplug_v1.31.bin* rk3308_usbplug_wo_ftl_v1.27.bin rk3368_ddr_600MHz_v2.06.bin* rk3399pro_ddr_666MHz_v1.25.bin*
rk322xh_bl31_v1.46.elf* rk3326_bl31_v1.22.elf rk3368_miniloader_v2.58.bin* rk3399pro_ddr_800MHz_v1.25.bin*
rk322xh_bl32_v2.01.bin rk3326_bl32_v1.15.bin rk3368_miniloader_v2.68.bin* rk3399pro_ddr_933MHz_v1.25.bin*
rk322xh_ddr_333MHz_v1.17.bin rk3326_ddr_333MHz_v1.16.bin* rk3368_usbplug_v2.58.bin* rk3399pro_miniloader_v1.26.bin*
rk322xh_ddr_400MHz_v1.17.bin rk3326_miniloader_aarch32_slc_v1.29.bin rk3368_usbplug_v2.62.bin* rk3399pro_usbplug_v1.26.bin*
rk322xh_miniloader_v2.50.bin* rk3326_miniloader_aarch32_v1.16.bin rk3368_usbplug_v2.68.bin* rknpu_lion_bl31_v1.12.elf*
rk322xh_usbplug_v2.50.bin* rk3326_miniloader_slc_v1.31.bin* rk3368h_bl31_v2.28.elf* rknpu_lion_bl32_v1.13.bin
rk3308_bl31_aarch32_v2.22.elf* rk3326_miniloader_v1.28.bin* rk3368h_bl32_v2.01.bin rknpu_lion_ddr_933MHz_v1.04.bin
rk3308_bl31_v2.22.elf* rk3326_usbplug_slc_v1.31.bin* rk3399_bl31_v1.35.elf rknpu_lion_miniloader_usb_v1.03.bin*
rk3308_bl32_v1.16.bin rk3326_usbplug_v1.28.bin* rk3399_bl32_v2.01.bin rkpx5_miniloader_v2.62.bin*
rk3308_ddr_393MHz_uart2_m1_v1.31.bin* rk3328_ddr_333MHz_v1.17.bin rk3399_ddr_666MHz_v1.25.bin*
rk3308_ddr_393MHz_uart4_m0_v1.31.bin* rk3328_ddr_400MHz_v1.17.bin rk3399_ddr_800MHz_v1.25.bin*
rk3308_ddr_451MHz_uart2_m1_v1.31.bin* rk3366_ddr_800MHz_v1.00.bin rk3399_ddr_933MHz_v1.25.bin*
I recall that the last time this happened I worked around it with a symlink. I just wanted to bring it up here in case you wanted to add a more elegant solution.
Thank you, as always.
|
|
|
03-14-2022, 01:05 AM
|
#14
|
Senior Member
Registered: Aug 2014
Posts: 2,158
Original Poster
Rep: 
|
|
|
1 members found this post helpful.
|
03-17-2022, 12:00 AM
|
#15
|
Member
Registered: Mar 2019
Distribution: Slackware
Posts: 309
Rep: 
|
Quote:
Originally Posted by sndwvs
|
Hmmm... alright. Now I am getting a different error in roughly the same spot:
Code:
MKIMAGE tpl/u-boot-tpl-rockchip.bin
CAT idbloader.img
CAT u-boot-rockchip.bin
UPD include/generated/timestamp_autogenerated.h
CC cmd/version.o
AR cmd/built-in.o
LD u-boot
OBJCOPY u-boot-nodtb.bin
./"arch/arm/mach-rockchip/make_fit_atf.py" \
arch/arm/dts/rk3328-rock64.dtb > u-boot.its
RELOC u-boot-nodtb.bin
MKIMAGE u-boot.itb
/hdd/slarm64/images_build_kit/build/source/u-boot /hdd/slarm64/images_build_kit/build/source/u-boot
Error: SPL image is too large (size 0x7800 than 0x7000)
Error: Bad parameters for image type
Usage: tools/mkimage -l image
-l ==> list image header information
tools/mkimage [-x] -A arch -O os -T type -C comp -a addr -e ep -n name -d data_file[:data_file...] image
-A ==> set architecture to 'arch'
-O ==> set operating system to 'os'
-T ==> set image type to 'type'
-C ==> set compression type 'comp'
-a ==> set load address to 'addr' (hex)
-e ==> set entry point to 'ep' (hex)
-n ==> set image name to 'name'
-d ==> use image data from 'datafile'
-x ==> set XIP (execute in place)
tools/mkimage [-D dtc_options] [-f fit-image.its|-f auto|-F] [-b <dtb> [-b <dtb>]] [-E] [-B size] [-i <ramdisk.cpio.gz>] fit-image
<dtb> file is used with -f auto, it may occur multiple times.
-D => set all options for device tree compiler
-f => input filename for FIT source
-i => input filename for ramdisk file
-E => place data outside of the FIT structure
-B => align size in hex for FIT structure and header
Signing / verified boot options: [-k keydir] [-K dtb] [ -c <comment>] [-p addr] [-r] [-N engine]
-k => set directory containing private keys
-K => write public keys to this .dtb file
-G => use this signing key (in lieu of -k)
-c => add comment in signature node
-F => re-sign existing FIT image
-p => place external data at a static position
-r => mark keys used as 'required' in dtb
-N => openssl engine to use for signing
tools/mkimage -V ==> print version information and exit
Use '-T list' to see a list of available image types
I have tried switching between the two sources for rkbin as well as u-boot-tools in config/sources/rockchip.inc, but nothing lets me get past the u-boot compilation stage above.
FWIW, I am getting something similar when I try to build images for Quartz64 also. So, maybe something is going on with the rockchip boot sources and I just need to be more patient.
Just for your info, nothing critical. Thanks much.
|
|
|
All times are GMT -5. The time now is 02:29 AM.
|
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.
|
Latest Threads
LQ News
|
|