Jump to content

zador.blood.stained

Members
  • Posts

    3633
  • Joined

  • Last visited

Reputation Activity

  1. Like
    zador.blood.stained got a reaction from wildcat_paris in gpg signing of armbian images   
    .asc file is a digital signature for .raw image (maybe you confused it with a public key), it is generated for each file individually after building, and it can be used to verify both file integrity and origin. You may want to read something like this and this to understand it better.
  2. Like
    zador.blood.stained reacted to rellla in black screen mpv player   
    1) use https://github.com/rellla/softhddevice-openglosd/tree/glesas source for the softhddevice plugin
    2) compile it with "GLES2=1 make"
    Glut is needed for the opengl version. We are on arm, we don't have that.
    And be aware: it's WIP!
    Didn't I say that already ?
  3. Like
    zador.blood.stained got a reaction from wildcat_paris in black screen mpv player   
    âžœ ~ % apt-file search glu.pc libglu1-mesa-dev: /usr/lib/arm-linux-gnueabihf/pkgconfig/glu.pc So you probably need to install libglu1-mesa-dev package
  4. Like
    zador.blood.stained got a reaction from Igor in Install debian in Lime2-eMMC   
    Either eMMC or NAND can be enabled by default since they share pins.
    Enabling eMMC in u-boot (via patch) should be safe, this is needed to boot from eMMC. Enabling eMMC in fex files by default can be done only for boards that don't have NAND variant. This is needed to see eMMC in OS. For mainline there will be separate DT file for Lime2-eMMC board.
  5. Like
    zador.blood.stained got a reaction from wildcat_paris in missing /lib/firmware/files   
    Non-free firmware package was removed from Xenial due to license issues. Since it doesn't have any dependencies, you can manually install package, for example, for Wily.
     
    For build-dep you have to uncomment or add deb-src entries for each deb entry, check this for example. 
     
    SHA1 is considered "not secure enough" currently, new APT keys should use more secure hashing algorithms. It is just a warning though, it should not affect anything.
  6. Like
    zador.blood.stained reacted to Igor in [Documentation] software proposal for Armbian wiki   
    OK, let's use Github wiki as a base. I already done some rework. First part is more or less done, now going to script part and fine tuning on the top of it.
     
    https://github.com/igorpecovnik/lib/wiki
  7. Like
    zador.blood.stained reacted to tkaiser in [Documentation] software proposal for Armbian wiki   
    The one problem I had with a github wiki was how to access the raw contents? But as usual it's quite easy. Editing wiki pages creates revisions and raw .md can be obtained in an automated fashion:
     
    The latest revision of https://github.com/ThomasKaiser/lib/wiki/01-User-documentation for example is always accessible as: https://raw.github.com/wiki/ThomasKaiser/lib/01-User-documentation.md
     
    The whole wiki is just a git repo in itself so cloning it locally is also possible: https://github.com/ThomasKaiser/lib.wiki.git
  8. Like
    zador.blood.stained got a reaction from Gravelrash in HOWTO : NFS Server and Client Configuration   
    Minor detail - let user pick their favorite editor, "edit file /etc/exports" should be simple enough.
     
    They are insecure anyway since you don't configure authentication or access limiting 
     
    fsid=num|root|uuid NFS needs to be able to identify each filesystem that it exports. Normally it will use a UUID for the filesystem (if the filesystem has such a thing) or the device number of the device holding the filesystem (if the filesystem is stored on the device). As not all filesystems are stored on devices, and not all filesystems have UUIDs, it is sometimes necessary to explicitly tell NFS how to identify a filesystem. This is done with the fsid= option. For NFSv4, there is a distinguished filesystem which is the root of all exported filesystem. This is specified with fsid=root or fsid=0 both of which mean exactly the same thing. Other filesystems can be identified with a small integer, or a UUID which should contain 32 hex digits and arbitrary punctua†tion. Linux kernels version 2.6.20 and earlier do not understand the UUID setting so a small integer must be used if an fsid option needs to be set for such kernels. Setting both a small number and a UUID is supported so the same configuration can be made to work on old and new kernels alike. TL;DR from my experience - explicit fsid parameter is needed when underlying filesystem doesn't support UUID (i.e. tmpfs)
    Edit: I mean for non fsid=0/fsid=root shares.
     
           nohide This option is based on the option of the same name provided  in               IRIX  NFS.  Normally, if a server exports two filesystems one of               which is mounted on the other, then  the  client  will  have  to               mount  both filesystems explicitly to get access to them.  If it               just mounts the parent, it will see an empty  directory  at  the               place where the other filesystem is mounted.  That filesystem is               "hidden".               The  nohide  option  is  currently only effective on single host               exports.  It does not work reliably with  netgroup,  subnet,  or               wildcard exports. User ID Mapping nfsd bases its access control to files on the server machine on the uid and gid provided in each NFS RPC request. The normal behavior a user would expect is that she can access her files on the server just as she would on a normal file system. This requires that the same uids and gids are used on the client and the server machine. This is not always true, nor is it always desirable. Very often, it is not desirable that the root user on a client machine is also treated as root when accessing files on the NFS server. To this end, uid 0 is normally mapped to a different id: the so-called anony†mous or nobody uid. This mode of operation (called `root squashing') is the default, and can be turned off with no_root_squash. By default, exportfs chooses a uid and gid of 65534 for squashed access. These values can also be overridden by the anonuid and anongid options. Finally, you can map all user requests to the anonymous uid by specifying the all_squash option. Here's the complete list of mapping options: root_squash Map requests from uid/gid 0 to the anonymous uid/gid. Note that this does not apply to any other uids or gids that might be equally sensitive, such as user bin or group staff. no_root_squash Turn off root squashing. This option is mainly useful for disk†less clients.        -a     Export or unexport all directories.        -r     Reexport all directories, synchronizing  /var/lib/nfs/etab  with               /etc/exports   and  files  under  /etc/exports.d.   This  option               removes entries in /var/lib/nfs/etab  which  have  been  deleted               from /etc/exports or files under /etc/exports.d, and removes any               entries from the kernel export table which are no longer valid.   "exportfs -ra" is enough to apply any changes made in /etc/exports
    Restarting nfs-kernel-server may be needed to apply changes made in /etc/default/nfs-kernel-server or to disconnect already connected clients
     
    Not exactly. This is not documented well, but I meant building image with "ROOTFS_TYPE=nfs" option, which creates small SD card image and rootfs archive. Edit boot script on SD, deploy and export rootfs on a server and you are done.
  9. Like
    zador.blood.stained got a reaction from wildcat_paris in HOWTO : NFS Server and Client Configuration   
    Minor detail - let user pick their favorite editor, "edit file /etc/exports" should be simple enough.
     
    They are insecure anyway since you don't configure authentication or access limiting 
     
    fsid=num|root|uuid NFS needs to be able to identify each filesystem that it exports. Normally it will use a UUID for the filesystem (if the filesystem has such a thing) or the device number of the device holding the filesystem (if the filesystem is stored on the device). As not all filesystems are stored on devices, and not all filesystems have UUIDs, it is sometimes necessary to explicitly tell NFS how to identify a filesystem. This is done with the fsid= option. For NFSv4, there is a distinguished filesystem which is the root of all exported filesystem. This is specified with fsid=root or fsid=0 both of which mean exactly the same thing. Other filesystems can be identified with a small integer, or a UUID which should contain 32 hex digits and arbitrary punctua†tion. Linux kernels version 2.6.20 and earlier do not understand the UUID setting so a small integer must be used if an fsid option needs to be set for such kernels. Setting both a small number and a UUID is supported so the same configuration can be made to work on old and new kernels alike. TL;DR from my experience - explicit fsid parameter is needed when underlying filesystem doesn't support UUID (i.e. tmpfs)
    Edit: I mean for non fsid=0/fsid=root shares.
     
           nohide This option is based on the option of the same name provided  in               IRIX  NFS.  Normally, if a server exports two filesystems one of               which is mounted on the other, then  the  client  will  have  to               mount  both filesystems explicitly to get access to them.  If it               just mounts the parent, it will see an empty  directory  at  the               place where the other filesystem is mounted.  That filesystem is               "hidden".               The  nohide  option  is  currently only effective on single host               exports.  It does not work reliably with  netgroup,  subnet,  or               wildcard exports. User ID Mapping nfsd bases its access control to files on the server machine on the uid and gid provided in each NFS RPC request. The normal behavior a user would expect is that she can access her files on the server just as she would on a normal file system. This requires that the same uids and gids are used on the client and the server machine. This is not always true, nor is it always desirable. Very often, it is not desirable that the root user on a client machine is also treated as root when accessing files on the NFS server. To this end, uid 0 is normally mapped to a different id: the so-called anony†mous or nobody uid. This mode of operation (called `root squashing') is the default, and can be turned off with no_root_squash. By default, exportfs chooses a uid and gid of 65534 for squashed access. These values can also be overridden by the anonuid and anongid options. Finally, you can map all user requests to the anonymous uid by specifying the all_squash option. Here's the complete list of mapping options: root_squash Map requests from uid/gid 0 to the anonymous uid/gid. Note that this does not apply to any other uids or gids that might be equally sensitive, such as user bin or group staff. no_root_squash Turn off root squashing. This option is mainly useful for disk†less clients.        -a     Export or unexport all directories.        -r     Reexport all directories, synchronizing  /var/lib/nfs/etab  with               /etc/exports   and  files  under  /etc/exports.d.   This  option               removes entries in /var/lib/nfs/etab  which  have  been  deleted               from /etc/exports or files under /etc/exports.d, and removes any               entries from the kernel export table which are no longer valid.   "exportfs -ra" is enough to apply any changes made in /etc/exports
    Restarting nfs-kernel-server may be needed to apply changes made in /etc/default/nfs-kernel-server or to disconnect already connected clients
     
    Not exactly. This is not documented well, but I meant building image with "ROOTFS_TYPE=nfs" option, which creates small SD card image and rootfs archive. Edit boot script on SD, deploy and export rootfs on a server and you are done.
  10. Like
    zador.blood.stained got a reaction from Tido in [Documentation] software proposal for Armbian wiki   
    Noticed following problems:
    Links need some work Inline code (`code`) needs another color for highlighting Youtube video block needs to be removed or converted to link Line wraps in code blocks are not perfect Whole document needs index (hope this tool does support that) Page numbers may be good too
  11. Like
    zador.blood.stained got a reaction from ChrisArena52 in SPI on Allwinner / Banana / Cubietruck ...   
    -22 is -EINVAL error. One of possible reasons may be transfer size limitation here: https://github.com/torvalds/linux/blob/master/drivers/spi/spi-sun4i.c#L178
    This patch removes this limit http://lists.infradead.org/pipermail/linux-arm-kernel/2015-August/363074.html
    but I don't have proper hardware to test it.
  12. Like
    zador.blood.stained reacted to Igor in Testers wanted: sunxi adjustments for RPi-Monitor   
    done.
    apt-get update apt-get install rpimonitor
  13. Like
    zador.blood.stained got a reaction from wildcat_paris in Guvcview for OPI (Orange PI PC / 2Plus / 2E)   
    Building https://github.com/avafinger/guvcview with "debianization" overlay from Ubuntu resulted in these packages.
  14. Like
    zador.blood.stained got a reaction from wildcat_paris in Testers wanted: sunxi adjustments for RPi-Monitor   
    BTW, there is an alternative to this - hosting this deb file on apt.armbian.com
  15. Like
    zador.blood.stained got a reaction from tkaiser in Testers wanted: sunxi adjustments for RPi-Monitor   
    Downloading and installing .deb file manually (with all dependencies) without setting up repository?
    Depends: perl, librrds-perl, libhttp-daemon-perl (>= 6.0.0) | libwww-perl (<< 6.0.0), libjson-perl, libipc-sharelite-perl, libfile-which-perl, aptitude apt-get install perl librrds-perl libhttp-daemon-perl libwww-perl libjson-perl libipc-sharelite-perl libfile-which-perl wget -O rpimonitor_2.10-1_all.deb https://github.com/XavierBerger/RPi-Monitor-deb/blob/master/packages/rpimonitor_2.10-1_all.deb?raw=true dpkg -i rpimonitor_2.10-1_all.deb
  16. Like
    zador.blood.stained reacted to martinayotte in RTL8189FS patches for Mainline   
    I've been working on the rtl8189fs patches for Mainline.
     
    Althouth the source code change between Legacy and Mainline is pretty trivial, preparing good and nice patches becomes a tedious task :
     
    - First, the original patch in Legacy contains tons of DOS file formatted (strange for a Linux driver, shame on Realtek) and even dos2unix failed on some files because of binaries character (probably Chinese), I had to edit many files because I wouldn't "signed-off" such ugly thing. (btw, maybe that dos2unix job should be done one Legacy to make it cleaner)
     
    - It is a quick big patch, but about the same size as the one in Legacy, about 10MB of text file.
     
    - Even after applying the patch, we still need to have some other patches, one for DefConfig in Igor's lib/config and one for DTS which I will work on tomorrow ...
     
    - Then, lots of testing need to be done, especially that I need to figured out that everything is working in the fresh build environment, then a PR will be sent to Igor.
  17. Like
    zador.blood.stained got a reaction from rodolfo in Armbian SD card backup   
    It's not a "live system" exactly, it is "root on NFS" started from FEL: https://github.com/igorpecovnik/lib/blob/master/documentation/fel-boot.md
     
    Setting up RAM only system is not wise because FEL transfer speed is too slow (less than 1 MB/s) to load anything close to full OS. If you don't want to use NFS at all, you can try to pack busybox and rsync into initrd and don't use rootfs at all.
  18. Like
    zador.blood.stained got a reaction from rodolfo in Armbian SD card backup   
    What do you need to solve here? The "universal" part? If you prepare u-boot images and .bin files (H3) and .dtb file (A10/A20) for all available boards and give user a selection menu, this part is solved. The only requirements are
    a ) Linux host (another SBC will work)
    b ) network connection (wired Ethetnet or g_ether will work, wireless is significantly harder AFAIK due to shared libraries dependencies for wpasupplicant).
  19. Like
    zador.blood.stained reacted to rellla in black screen mpv player   
    If CONFIG_CMA is not set, you have to set sunxi_ve_mem_reserve. 150+ would be a good value. In Armbian default it is not set.
    If CONFIG_CMA is set, sunxi_ve_mem_reserve= is ignored. By default, the CMA memory is hardcoded to 80MB.
     
    So, if no patch activates CMA, you don't have to care about that, but just set sunxi_ve_mem_reserve. In this case, you also don't need libump and must not compile libcedrus with USE_UMP=1.
    To let Mali and the VE use the same memory area for zerocopy features in the future (for the upcoming vdpau_gles_interop feature e.g.) you need to use UMP with CMA memory as backend. And then you have to increase the hardcoded 80MB depending on how much surfaces etc. your app uses.
     
    I hope, this was kind of understandable
     
    Regards
    rellla
  20. Like
    zador.blood.stained got a reaction from tkaiser in Ethernet USB gadget not working on legacy   
    You can specify VID and PID as  module parameters to g_ether - check
    sudo modinfo g_ether BTW. Did you try to force standart Microsoft RNDIS driver or it's impossible on Win10 x64?
  21. Like
    zador.blood.stained got a reaction from dimag0g in Claim a task, set DUE date and start doing it!   
    @Gravelrash
     
    Please take a look at updated hostapd compilation script for example.
     
    Directory structure is easy to fix afterwards, but if you want to do it right from the start, here is recommended setup:
    If package can be cross-compiled, it's better to put in into "$SOURCES/<package_name>" directory and compile & pack it in-place.
    If package needs to be compiled in chroot, put in into "$CACHEDIR/sdcard/root/<package_name>", so you can access it in chroot in "/root/<package_name>". Don't forget to remove this directory after you successfully built the package.
    After building a package copy it to "$DEST/debs"
     
    If there are no dependencies between packages, create new script in "extras" for each package. If some packages needs to be built in specific order, you can build several packages in one script.
  22. Like
    zador.blood.stained got a reaction from wildcat_paris in Error buiding H3 image   
    There needs to be an udev rule overriding this behavior. I'll add this to board support package later.
     
     
    % dpkg -S $(which free) procps: /usr/bin/free
  23. Like
    zador.blood.stained got a reaction from LarsN in Problems mounting drive with usrjquota   
    It will be enabled by default in new Armbian releases
  24. Like
    zador.blood.stained got a reaction from wildcat_paris in Problems mounting drive with usrjquota   
    linux-sun7i-default.config: CONFIG_QUOTA=y
    linux-sunxi-next.config: # CONFIG_QUOTA is not set
  25. Like
    zador.blood.stained got a reaction from tkaiser in Prepare v5.15   
    Short changelog:
    Removed autodetection for H3 boards, changed DVFS and thermal settings Repackaged tools, hostapd and firmware (may require manual installation of packages) Odroid C2: Fixed headers packaging script, updated kernel configuration, updated boot script Added back watchdog to sun7i-default kernel Purging and reinstalling "unattended-upgrades" package should be recommended in changelog Script "40-updates" update logic was changed; script was switched to python3 since Xenial doesn't use python2 by default. Installing "python3-apt" should be recommended in changelog. Reworked initrd images handling on kernel upgrade ... (to be added) Other fixes and enhancements  
    Release 5.15 closes following issues: #285, #345, #362 (closed), #337 (closed)
     
    I would propose some changes in this release:
     
    1. Change "auto eth0" to "allow-hotplug eth0" and "auto wlan0" to "allow-hotplug wlan0" (uncommented) for all distributions except Wheezy, pack new interfaces files to board support packages;
     
    2. Reduce number of preinstalled packages. In my opinion, default package list is rather big and some software can be removed from prebuilt images, especially if:
    We don't provide any custom configuration for the package It can be used only with addidional hardware or is rather useless in default CLI images Is not required for any preinstalled scripts and required packages So I propose removing these packages:
    libmtp-runtime mtp-tools bluez (but add "bluetooth" metapackage to desktop list?) ir-keytable weather-util weather-util-data dvb-apps libbluetooth-dev libbluetooth3 subversion iptables thin-provisioning-tools Any additions, thoughts or suggestions?
     
    Edit: added thin-provisioning-tools
×
×
  • Create New...

Important Information

Terms of Use - Privacy Policy - Guidelines