From mboxrd@z Thu Jan 1 00:00:00 1970 X-GM-THRID: 6444118035258146816 X-Received: by 10.25.193.148 with SMTP id r142mr337940lff.0.1500388149800; Tue, 18 Jul 2017 07:29:09 -0700 (PDT) X-BeenThere: isar-users@googlegroups.com Received: by 10.28.0.78 with SMTP id 75ls610431wma.16.gmail; Tue, 18 Jul 2017 07:29:09 -0700 (PDT) X-Received: by 10.223.132.134 with SMTP id 6mr168692wrg.6.1500388149478; Tue, 18 Jul 2017 07:29:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1500388149; cv=none; d=google.com; s=arc-20160816; b=Rd0u5eHO0vHvmfHcCtKzRpN0rKcVD4Ak9s3YuefUG8kQftgBypkfjEIgc+Z1m96tqB qRgD/TqLvCkihIs7GfrQTXDr9hg96+yl987PgHfKbdk4VxFMK+wwFhtK0fz7wmVNaj+E sExgjtdxeHHirqcQFoaXykhv0Zxmn4cxqIcdyo691DhVrvDp5MtEwLWKVnIOyEDVAhYn GKoc3ZYyC3hf11M8T1Nknb7FutAz/UtGXCUj2Mx2NLjAaaiGcFSq/hJFQio3drZLFquy UcYbG0OeNY/2AgeAxnVnqchviJ7oxtJ8T3S1n9zo0xKi+NVwjniaYp7SMEIp5pnxmLKj vKww== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=message-id:date:subject:cc:to:from:arc-authentication-results; bh=tf6KZSjdjo637hEXvSutzwDJxIPsnuSDTlXmoSl2kKQ=; b=XaTMakYWYtWv8iZBZ8fNuWPGzRstS9LpAg1kAzXdr44FZUGfHij2LRhrsCiLQcSADt g4i3LJ1K0L7Y65P5vM1ibRDXJvGVOrJR25vt87kNgwaxJLURzp2AkxnNHJpMuCUZEXUP 7r6n5RXPDPZ51jkyJ+OjlqN1LHUrbaIdNeloQmSZLJ4VSJbnobwKOYeOAWn4CEqHw4vi ICqwfcxDfEhA7m9esDkoWqZS1KGPboFrLkhm9UCiiTvRAuhr0wjt/dQZBVPssfKz9Jqe D9yAycxGHiIH6ib5uxuK7unspvnFHhlu6vTzP6pXLu5B6Z97R0jB55DdHxr1ELlW7WsQ LAPQ== ARC-Authentication-Results: i=1; gmr-mx.google.com; spf=neutral (google.com: 192.35.17.28 is neither permitted nor denied by best guess record for domain of henning.schild@siemens.com) smtp.mailfrom=henning.schild@siemens.com Return-Path: Received: from goliath.siemens.de (goliath.siemens.de. [192.35.17.28]) by gmr-mx.google.com with ESMTPS id k68si835388wmg.4.2017.07.18.07.29.09 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 18 Jul 2017 07:29:09 -0700 (PDT) Received-SPF: neutral (google.com: 192.35.17.28 is neither permitted nor denied by best guess record for domain of henning.schild@siemens.com) client-ip=192.35.17.28; Authentication-Results: gmr-mx.google.com; spf=neutral (google.com: 192.35.17.28 is neither permitted nor denied by best guess record for domain of henning.schild@siemens.com) smtp.mailfrom=henning.schild@siemens.com Received: from mail1.siemens.de (mail1.siemens.de [139.23.33.14]) by goliath.siemens.de (8.15.2/8.15.2) with ESMTPS id v6IET9oY025547 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for ; Tue, 18 Jul 2017 16:29:09 +0200 Received: from md1em3qc.ww002.siemens.net ([139.25.68.40]) by mail1.siemens.de (8.15.2/8.15.2) with ESMTP id v6IET8kn026279; Tue, 18 Jul 2017 16:29:08 +0200 From: Henning Schild To: isar-users@googlegroups.com Cc: Henning Schild Subject: [PATCH] meta: ext4-img: copy and keep attributes, always copy with sudo Date: Tue, 18 Jul 2017 16:30:56 +0200 Message-Id: <20170718143056.1392-1-henning.schild@siemens.com> X-Mailer: git-send-email 2.13.0 X-TUID: 78QXst4AsAF6 Some security enhancing packages can cause our initrd to be not readable by a normal user. So we need to copy with sudo. Also regular cp would destroy ownership and other attributes of files, possibly creating problems in the future. Signed-off-by: Henning Schild --- meta/classes/ext4-img.bbclass | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/meta/classes/ext4-img.bbclass b/meta/classes/ext4-img.bbclass index 5652757..7492f96 100644 --- a/meta/classes/ext4-img.bbclass +++ b/meta/classes/ext4-img.bbclass @@ -21,16 +21,16 @@ do_ext4_image() { mkdir -p ${WORKDIR}/mnt sudo mount -o loop ${EXT4_IMAGE_FILE} ${WORKDIR}/mnt - sudo cp -r ${S}/* ${WORKDIR}/mnt + sudo cp -a ${S}/* ${WORKDIR}/mnt sudo umount ${WORKDIR}/mnt rm -r ${WORKDIR}/mnt if [ -n "${KERNEL_IMAGE}" ]; then - cp ${S}/boot/${KERNEL_IMAGE} ${DEPLOY_DIR_IMAGE} + sudo cp -a ${S}/boot/${KERNEL_IMAGE} ${DEPLOY_DIR_IMAGE} fi if [ -n "${INITRD_IMAGE}" ]; then - cp ${S}/boot/${INITRD_IMAGE} ${DEPLOY_DIR_IMAGE} + sudo cp -a ${S}/boot/${INITRD_IMAGE} ${DEPLOY_DIR_IMAGE} fi } -- 2.13.0