Book Image

Embedded Linux Development Using Yocto Project - Third Edition

By : Otavio Salvador, Daiane Angolini
Book Image

Embedded Linux Development Using Yocto Project - Third Edition

By: Otavio Salvador, Daiane Angolini

Overview of this book

The Yocto Project is the industry standard for developing dependable embedded Linux projects. It stands out from other frameworks by offering time-efficient development with enhanced reliability and robustness. With Embedded Linux Development Using Yocto Project, you’ll acquire an understanding of Yocto Project tools, helping you perform different Linux-based tasks. You’ll gain a deep understanding of Poky and BitBake, explore practical use cases for building a Linux subsystem project, employ Yocto Project tools available for embedded Linux, and uncover the secrets of SDK, recipe tool, and others. This new edition is aligned with the latest long-term support release of the aforementioned technologies and introduces two new chapters, covering optimal emulation in QEMU for faster product development and best practices. By the end of this book, you’ll be well-equipped to generate and run an image for real hardware boards. You’ll gain hands-on experience in building efficient Linux systems using the Yocto Project.
Table of Contents (20 chapters)

Guidelines to follow for general projects

This section discusses some project-related guidelines to follow to reduce the general project risk and avoid common pitfalls.

Continuously monitor the project license constraints

Depending on the project we are working on, license compliance might be a big or a small topic. Some projects have very restricted license constraints, such as the following:

  • The inability to use GPLv3-released software
  • Copyleft contamination of project-specific intellectual property
  • Company-wise license constraints

The advice is to start this process at the beginning of the project, reducing the amount of rework throughout the project. However, the project license constraints and the project component’s licenses may change, requiring us to monitor our license compliance continuously.

Security can harm your project

In our hyper-connected era, every connected device is a potential target for a security attack. As embedded device...