Complete section on main build.

This commit is contained in:
Bradley M. Kuhn 2014-11-07 09:20:07 -05:00
parent 5d8c372377
commit 57b58fe21a

View file

@ -472,38 +472,32 @@ kept a
log of the build}, which is not included herein due its size (approximately log of the build}, which is not included herein due its size (approximately
7.2K of text). 7.2K of text).
% FIXME: We should somewhere (perhaps on each step we discuss) talk about Upon competition of the ``make'' process, the investigator immediately found
% what often goes wrong on those steps, and why this is right. As written (almost to his surprise) several large firmware files in the ``bin/ar71xx''
% now, there is no driving home of the fact that it is uncommon that things directory. Typically, this step in the CCS verification process is
% are so smooth. :) harrowing. In most cases, the ``make'' step will fail due to a missing
% FIXME(dg): Hopefully the below will suffice. I can expand more/differently if package or because toolchain paths are not setup correctly.
% such is desired. (I presume the above comment relates to the below text.)
* The "make" step completed successfully on our system and resulted in several From experience, the investigator is sure that ThinkPenguin's engineers did
files being generated in the bin/ar71xx directory, namely firmware images. the most important step in self-CCS verification: use one's own instructions
** This step is normally where we run into the greatest number of build issues on a clean system. Ideally, an employee with similar skills but
(and thus compliance problems). In many cases, the "make" step will fail due unfamiliar with the specific product can most easily verify CCS and identify
to a missing package or because toolchain paths are not setup correctly. As problems before a violation occurs.
a result, it is important to test the provided instructions on a clean system
before distributing the binaries and corresponding source. Listing the
specific GNU/Linux distribution and any non-default packages required for the
build (ie. those installed before testing the instructions) in the build
instructions makes it easier for the end user to successfully build the
source release.
* There appeared to be several filesystem and kernel images, for different % FIXME: Is there stuff about the above in the compliance guide? If so, link
hardware versions. It was unclear which one to install on the particular % to it. If not, write it, then link to it. :)
device we received or how to install it, both of which should have been
mentioned in the README.
% FIXME: Below, we probably want to talk to them to add this, and also, be a However, upon completing the ``make'', the investigator was unclear which
% bit more expansive. filesystem and kernel images to use for the TPE-NWIFIROUTER hardware.
Ideally, the original ``README'' would indicate which image is appropriate
* The above installation issue is mitigated by the availability of a web UI in for the included hardware. However, this was ultimately an annoyance rather
the product that performs firmware image installation. It would be best if than a compliance issue due to other information available. Specifically,
instructions like those at http://librecmc.org/librecmc/wiki?name=Tp+MR3020 the web UI on the TPE-NWIFIROUTER performs firmware image installation.
were included in the README, as the user cannot be expected to infer that or While ideal would be to find
to find such a link. \href{http://librecmc.org/librecmc/wiki?name=Tp+MR3020}{instructions similar
to these} in the README itself. However, application of the reasonableness
standard indicates compliance, since a knowledgeable user was able to
determine the proper course of action.
\section{Root Filesystem and Kernel Installation} \section{Root Filesystem and Kernel Installation}