From mboxrd@z Thu Jan 1 00:00:00 1970 X-GM-THRID: 7201062888117633024 X-Received: by 2002:a2e:83c9:0:b0:2ca:b91:6e18 with SMTP id s9-20020a2e83c9000000b002ca0b916e18mr5005445ljh.84.1703834965274; Thu, 28 Dec 2023 23:29:25 -0800 (PST) X-BeenThere: isar-users@googlegroups.com Received: by 2002:adf:d1c2:0:b0:336:e368:e02f with SMTP id b2-20020adfd1c2000000b00336e368e02fls1406742wrd.2.-pod-prod-06-eu; Thu, 28 Dec 2023 23:29:23 -0800 (PST) X-Google-Smtp-Source: AGHT+IGDUCmxCbPsniigTK0p8AZXXNVidMEGsAcAc4bUUl3CLNVC2VIZ9Dj/bQ5X5ZSguxanmuiq X-Received: by 2002:a05:600c:3f92:b0:40d:6335:3542 with SMTP id fs18-20020a05600c3f9200b0040d63353542mr1373288wmb.16.1703834963534; Thu, 28 Dec 2023 23:29:23 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1703834963; cv=none; d=google.com; s=arc-20160816; b=LeVLKnfoch/49sfiUzWOFJa0WCva2gXudUpE79M4awLq/wD5VoePTdomLs/iSBtdT4 aGW41uoXgwofxI674/6yk3e/WHt7oZvLN4qJ7e2u7vsBh6TzNTr2QCTwXanOjhhc3X3R rPgO/4RfIPly2NNNAU6LTItVxsmByDqQFKus/NFDEBJJz2b9bidBrZ/5s2ylYSo0Qrsv mUnxlWbnfifvOK0Pbyz9Ldvdzn3CZt59uCek4H+Hfh22ou0fHdusZYewwj/R/vsqL7TE +P3hu2HX50GlGmSoKy4qSRPJ+gEik0rz8tGkL/rCly5IJoxolWoegy4ZRgfA4OFu1zBu NEQg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:date:message-id; bh=mMyZ5+WJA31N9lhDUwNkPcZqhyLVzWOA3rvd8cFosqA=; fh=UdvzdKFqzX0CE2xwp/Uup8PynKGCNyHU4UsepCGoq94=; b=Neu19cJDSAVn8skXB8cyv2Fbxfch0V/UCf2buWIgQWAnt6XdPQNMlIwODio92iXyy8 RKXXG9OPDx60oAB4nT986qpZvAf120fPcog/Gb5j6C/4Nc+Dhfhc+fkJXL6a+8/kwxLi oJ/34f2jnlRP/hBCuKgg7+AQLVNhZgU69kSvJmDU7zIKovk3ysind/cSUYnL1oqHuv7b p2kCVP2VISHH5jJyeKIP4F2xa8KPW4gOah5s96+RA5sTIzjx0PxOS9/6U4K9RF9Y9yOJ lrHodvxPJHn/EA3rMK0M/VXQggXDfhe1mSjsSOlmHQ4lORTDPb/Cct5IhWfPouKPgGtR UO8A== ARC-Authentication-Results: i=1; gmr-mx.google.com; spf=pass (google.com: domain of amikan@ilbers.de designates 85.214.156.166 as permitted sender) smtp.mailfrom=amikan@ilbers.de Return-Path: Received: from shymkent.ilbers.de (shymkent.ilbers.de. [85.214.156.166]) by gmr-mx.google.com with ESMTPS id m28-20020a05600c091c00b0040d6d74d343si79549wmp.0.2023.12.28.23.29.23 for (version=TLS1_2 cipher=ECDHE-ECDSA-CHACHA20-POLY1305 bits=256/256); Thu, 28 Dec 2023 23:29:23 -0800 (PST) Received-SPF: pass (google.com: domain of amikan@ilbers.de designates 85.214.156.166 as permitted sender) client-ip=85.214.156.166; Authentication-Results: gmr-mx.google.com; spf=pass (google.com: domain of amikan@ilbers.de designates 85.214.156.166 as permitted sender) smtp.mailfrom=amikan@ilbers.de Received: from [127.0.0.1] (host-80-81-17-52.static.customer.m-online.net [80.81.17.52]) (authenticated bits=0) by shymkent.ilbers.de (8.15.2/8.15.2/Debian-8+deb9u1) with ESMTPSA id 3BT7TLZo002139 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 29 Dec 2023 08:29:22 +0100 Message-ID: Date: Fri, 29 Dec 2023 09:29:19 +0200 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH v3 2/3] deploy boot files via sstate-cache Content-Language: en-US, ru-RU To: Felix Moessbauer , isar-users@googlegroups.com Cc: adriaan.schmidt@siemens.com, jan.kiszka@siemens.com References: <20230223064359.4171845-1-felix.moessbauer@siemens.com> <20230223064359.4171845-3-felix.moessbauer@siemens.com> From: Anton Mikanovich In-Reply-To: <20230223064359.4171845-3-felix.moessbauer@siemens.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-1.0 required=5.0 tests=ALL_TRUSTED autolearn=unavailable autolearn_force=no version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on shymkent.ilbers.de X-TUID: uGblHFrxUTlW 23/02/2023 08:43, Felix Moessbauer wrote: > This patch changes how we deploy the boot files. > Instead of manually deploying, we use the sstate infrastructure for > that. By that, accidental overrides of the artifacts can be > automatically detected. On clean, the artifacts are also cleaned. > > Signed-off-by: Felix Moessbauer Hello Felix, This logic fails on fargets that deploy DTB files if building several distros inside one builddir. DTB filenames are usually the same in this case, so it is detected as copy of already exist files. Steps to reproduce: $ bitbake mc:imx6-sabrelite-bullseye:isar-image-base And right after then $ bitbake mc:imx6-sabrelite-buster:isar-image-base Will trigger: ERROR: mc:imx6-sabrelite-buster:isar-image-base-1.0-r0 do_copy_boot_files: The recipe isar-image-base is trying to install files into a shared area when those files already exist.