From: "vijaikumar....@gmail.com" <vijaikumar.kanagarajan@gmail.com>
To: isar-users <isar-users@googlegroups.com>
Subject: Re: [PATCH v2 10/10] meta-isar/canned-wks: Remove /boot mountpoint
Date: Sun, 13 Sep 2020 22:32:52 -0700 (PDT) [thread overview]
Message-ID: <012bdb9c-eb81-4477-9866-1378cb2cc825n@googlegroups.com> (raw)
In-Reply-To: <20200909170923.280d958b@md1za8fc.ad001.siemens.net>
[-- Attachment #1.1: Type: text/plain, Size: 9486 bytes --]
On Wednesday, September 9, 2020 at 8:39:27 PM UTC+5:30 Henning Schild wrote:
> On Sat, 5 Sep 2020 09:06:08 -0700 (PDT)
> "vijaikumar....@gmail.com" <vijaikumar....@gmail.com> wrote:
>
> > On Saturday, September 5, 2020 at 2:28:17 PM UTC+5:30 Henning Schild
> > wrote:
> >
> > > Hi,
> > >
> > > i do not like this one at all. Suggesting people to hide the boot
> > > partition from debian as hard as they can? If i understand it
> > > correctly.
> >
> > AFAIU , /boot mount-point[1] is wrong and is not needed without
> > --exclude-path of /boot in rootfs partition.
> > This optional mount-point serves only one purpose, i.e, to have an
> > entry added in fstab or not by wic.
> > We were okay with saying this EFI/bootloader partition mount-point as
> > /boot, since older wic
> > was not adding the /boot mount-point to fstab.
> > With this commit [2] in OE this is no longer the case.
> > /boot is added to fstab and at boot the system would try to mount to
> > this efi partiton to /boot
> > directory which, if successful, will make the kernel, initrd and
> > config files which were already available in /boot
> > of rootfs unavailable when the system is booted. I donot see
> > --exclude-path for /boot in the wks file,
> > so this would just be wrong to have a mount-point like this.
>
> Not sure i get all that, but to me it seems we need a wks file without
> boot or we need one with boot and the exclude. The exclude might not be
> needed on OE, on debian it is ... so adding the exclude could be a
> better default/example than removing the boot partition.
>
> > [1]
> >
> https://github.com/ilbers/isar/blob/a0d6de4ac7dfb926b38cfcd44f2bc8852f2e43e3/meta-isar/scripts/lib/wic/canned-wks/sdimage-efi.wks#L5
> > [2]
> >
> https://github.com/openembedded/openembedded-core/commit/2376b05512ddb8c4ec3aaf1df11071f536a76bd9
> >
> >
> > > In fact the hiding is an issue that should be solved, debian should
> > > know about that partition and use it correctly.
> > >
> > > On EFI it only contains the bootloader, so such isar images will be
> > > able to receive kernel updates with apt-get during their lifetime.
> > > They will never be able to update the bootloader, but that might be
> > > ok.
> > >
> > > On BIOS the story is different. These systems have the kernel in
> > > the roots/boot only that kernel is never used for booting and the
> > > machines will never be able to update the kernel they boot.
> > >
> > > I always wanted to solve that but it was not too easy. The first
> > > idea was just bootloader in the boot partition, like efi. But
> > > syslinux can not boot files from other partitions, so we need the
> > > kernel and initrd there.
> > > But now with the exclude feature it might be easier. Place the
> > > bootloader and config into rootfs/boot and point to the kernel
> > > initrd symlinks in the config. (Done in our custom BIOS plugin)
> > > And now take rootfs/boot as boot, excluding it from rootfs.
> >
> >
> > Can you point me to some code where these kind of scenarios are? I
> > assume these are all downstream? For downstream you could customize
> > the wks with neccessary /boot as mountpoint for EFI and
> > "--exclude-path /boot" to achieve
> > what you want. I donot see the issue in removing it here.
>
> There is no code to point to. What i described is the current state of
> Isar and a possible direction it could take to fix the fact that the
> boot partition is never visible in the running system. An issue
> especially problematic for BIOS boot, since kernel updating is broken.
>
I see, this is only with the the legacy bios based boot. In that case,
since we
have the /boot mount automatically, we can modify the wks file to exclude
/boot and mount the syslinux boot partition in the rootfs. we might also
need
to copy over the config and system map files to the syslinux partition for
completion.
I will add an additional patch for legacy bios and send in v3.
For rest of the images, not specifying /boot is the right way, since those
fetch
the kernel and initrd directly from the root partition.
Thanks,
Vijai Kumar K
>
> Just build a BIOS booting qemu (conf/machine/qemui386.conf), and install
> i.e. linux-image-rt in the running system with apt-get
>
> I am not saying this should not be merged. But this is a good time to
> look at the "debians do not know about that boot partition" issue
> again, instead of possibly making it worse and including bad examples
> into meta-isar ... which will later end up in other layers.
>
> Henning
>
> >
> > >
> > > Henning
> > >
> > > On Thu, 3 Sep 2020 00:32:47 +0530
> > > Vijai Kumar K <Vijaikumar_...@mentor.com> wrote:
> > >
> > > > In the older version of wic, the fstab entry for /boot mountpoint
> > > > was skipped.
> > > > However in the latest wic this is not the case. Adding a /boot
> > > > mountpoint in part results in creating a fstab entry for
> > > > automount. Remove it to avoid the unwanted mount which makes
> > > > original contents unavailable in debian rootfilesystem.
> > > >
> > > > Signed-off-by: Vijai Kumar K <Vijaikumar_...@mentor.com>
> > > > ---
> > > > RECIPE-API-CHANGELOG.md | 17
> > > > +++++++++++++++++ .../lib/wic/canned-wks/common-isar.wks.inc |
> > > > 2 +- meta-isar/scripts/lib/wic/canned-wks/hikey.wks | 2 +-
> > > > .../scripts/lib/wic/canned-wks/sdimage-efi.wks | 2 +-
> > > > 4 files changed, 20 insertions(+), 3 deletions(-)
> > > >
> > > > diff --git a/RECIPE-API-CHANGELOG.md b/RECIPE-API-CHANGELOG.md
> > > > index 1839770..070cde3 100644
> > > > --- a/RECIPE-API-CHANGELOG.md
> > > > +++ b/RECIPE-API-CHANGELOG.md
> > > > @@ -246,3 +246,20 @@ by setting DEBIAN_BUILD_DEPENDS.
> > > >
> > > > ${S} can now be used for checking out sources without being
> > > > linked implicitly with ${D} which needs to be filled explicitly
> > > > in do_install as before. +
> > > > +### Wic adds /boot mountpoint to fstab
> > > > +
> > > > +With the latest wic, /boot mount point, if any, is added to
> > > > /etc/fstab. Debian +uses /boot to store the kernel and initrd
> > > > images. If an image's wks file +specifies /boot mountpoint for
> > > > boot partitions like EFI, the image may fail to +boot or might
> > > > make the original contents of /boot unavailable after boot. +All
> > > > unwanted /boot mountpoints should be removed. +
> > >
> >
> > Maybe I can add a bit more to
> > this sentence to make it clear, something like unless you know what
> > you are doing.
> > I could add the rest of the wks entry below to highlight that /boot
> > is not excluded in the first place.
> >
> >
> > > > +Below is an example wks entry that might cause an issue.
> >
> > > +```
> > > > +part /boot --source bootimg-efi-isar --sourceparams
> > > > "loader=grub-efi" --ondisk sda --label efi --part-type EF00
> > > > --align 1024 +``` +Drop the /boot entry to avoid issues.
> > > > +```
> > > > +part --source bootimg-efi-isar --sourceparams "loader=grub-efi"
> > > > --ondisk sda --label efi --part-type EF00 --align 1024 +```
> > > > diff --git
> > > > a/meta-isar/scripts/lib/wic/canned-wks/common-isar.wks.inc
> > > > b/meta-isar/scripts/lib/wic/canned-wks/common-isar.wks.inc index
> > > > c8ea4c2..e7dabd4 100644 ---
> > > > a/meta-isar/scripts/lib/wic/canned-wks/common-isar.wks.inc +++
> > > > b/meta-isar/scripts/lib/wic/canned-wks/common-isar.wks.inc @@
> > > > -1,3 +1,3 @@ # This file is included into 3 canned wks files from
> > > > this directory -part /boot --source bootimg-pcbios-isar --ondisk
> > > > sda --label boot --active --align 1024 +part --source
> > > > bootimg-pcbios-isar --ondisk sda --label boot --active --align
> > > > 1024 part / --source rootfs --ondisk sda --fstype=ext4 --label
> > > > platform --align 1024 diff --git
> > > > a/meta-isar/scripts/lib/wic/canned-wks/hikey.wks
> > > > b/meta-isar/scripts/lib/wic/canned-wks/hikey.wks index
> > > > 1e82f8c..840858e 100644 ---
> > > > a/meta-isar/scripts/lib/wic/canned-wks/hikey.wks +++
> > > > b/meta-isar/scripts/lib/wic/canned-wks/hikey.wks @@ -3,7 +3,7 @@
> > > > # # SPDX-License-Identifier: MIT
> > > >
> > > > -part /boot --source bootimg-efi-isar --sourceparams
> > > > "loader=grub-efi" --ondisk mmcblk1 --label efi --part-type EF00
> > > > --align 1024 +part --source bootimg-efi-isar --sourceparams
> > > > "loader=grub-efi" --ondisk mmcblk1 --label efi --part-type EF00
> > > > --align 1024 part / --source rootfs --ondisk mmcblk1 --fstype
> > > > ext4 --label platform --align 1024 --use-uuid diff --git
> > > > a/meta-isar/scripts/lib/wic/canned-wks/sdimage-efi.wks
> > > > b/meta-isar/scripts/lib/wic/canned-wks/sdimage-efi.wks index
> > > > 2afa016..e0fa7a1 100644 ---
> > > > a/meta-isar/scripts/lib/wic/canned-wks/sdimage-efi.wks +++
> > > > b/meta-isar/scripts/lib/wic/canned-wks/sdimage-efi.wks @@ -2,7
> > > > +2,7 @@ # long-description: Creates a partitioned EFI disk image
> > > > without any swap that # the user can directly dd to boot media.
> > > > -part /boot --source bootimg-efi-isar --sourceparams
> > > > "loader=grub-efi" --ondisk sda --label efi --part-type EF00
> > > > --align 1024 +part --source bootimg-efi-isar --sourceparams
> > > > "loader=grub-efi" --ondisk sda --label efi --part-type EF00
> > > > --align 1024 part / --source rootfs --ondisk sda --fstype ext4
> > > > --label platform --align 1024 --use-uuid
> > >
> > >
> >
>
>
[-- Attachment #1.2: Type: text/html, Size: 12390 bytes --]
next prev parent reply other threads:[~2020-09-14 5:32 UTC|newest]
Thread overview: 29+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-09-02 18:56 [PATCH v2 00/10] WIC update Vijai Kumar K
2020-09-02 18:56 ` [PATCH v2 01/10] wic: Update to the latest wic from openembedded core Vijai Kumar K
2020-09-05 9:00 ` Henning Schild
2020-09-05 9:21 ` vijai kumar
2020-09-02 18:56 ` [PATCH v2 02/10] wic/plugins: Fix wic plugins to work with the latest wic Vijai Kumar K
2020-09-02 18:56 ` [PATCH v2 03/10] wic-img: Satisfy the quirks of " Vijai Kumar K
2020-09-05 8:30 ` Henning Schild
2020-09-05 16:24 ` vijaikumar....@gmail.com
2020-09-09 14:52 ` Henning Schild
2020-09-02 18:56 ` [PATCH v2 04/10] oe.path: Add copyhardlink() helper function Vijai Kumar K
2020-09-02 18:56 ` [PATCH v2 05/10] lib/oe/path: try hardlinking instead of guessing when it might fail Vijai Kumar K
2020-09-02 18:56 ` [PATCH v2 06/10] wic_fakeroot: Handle standalone pseudo invocations Vijai Kumar K
2020-09-05 8:38 ` Henning Schild
2020-09-05 15:19 ` vijaikumar....@gmail.com
2020-09-05 9:19 ` Henning Schild
2020-09-05 15:22 ` vijaikumar....@gmail.com
2020-09-02 18:56 ` [PATCH v2 07/10] meta-isar/conf: Add provision to debug WIC Vijai Kumar K
2020-09-02 18:56 ` [PATCH v2 08/10] debian-common: Add tar as a dependency for wic Vijai Kumar K
2020-09-02 19:02 ` [PATCH v2 09/10] wic: misc: Add /bin to the list of searchpaths Vijai Kumar K
2020-09-02 19:02 ` [PATCH v2 10/10] meta-isar/canned-wks: Remove /boot mountpoint Vijai Kumar K
2020-09-05 8:58 ` Henning Schild
2020-09-05 16:06 ` vijaikumar....@gmail.com
2020-09-09 15:09 ` Henning Schild
2020-09-14 5:32 ` vijaikumar....@gmail.com [this message]
2020-09-05 8:45 ` [PATCH v2 09/10] wic: misc: Add /bin to the list of searchpaths Henning Schild
2020-09-05 9:33 ` vijai kumar
2020-09-03 5:46 ` [PATCH v2 00/10] WIC update vijaikumar....@gmail.com
2020-09-05 9:04 ` Henning Schild
2020-09-05 9:25 ` vijai kumar
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=012bdb9c-eb81-4477-9866-1378cb2cc825n@googlegroups.com \
--to=vijaikumar.kanagarajan@gmail.com \
--cc=isar-users@googlegroups.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox