From mboxrd@z Thu Jan 1 00:00:00 1970 X-GM-THRID: 6651523578180141056 X-Received: by 2002:a05:6402:286:: with SMTP id l6mr108561edv.11.1548696161220; Mon, 28 Jan 2019 09:22:41 -0800 (PST) X-BeenThere: isar-users@googlegroups.com Received: by 2002:a17:906:628b:: with SMTP id t11ls838875ejk.1.gmail; Mon, 28 Jan 2019 09:22:40 -0800 (PST) X-Google-Smtp-Source: ALg8bN5C4LDXWsfQY1xwSOfBdkGNTplXs+cxjl4r9CUNR4oovVUEQU3N620LN26bTgnga4OHO2lv X-Received: by 2002:a17:906:698c:: with SMTP id i12-v6mr114337ejr.10.1548696160796; Mon, 28 Jan 2019 09:22:40 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1548696160; cv=none; d=google.com; s=arc-20160816; b=Cvyw/nWen4UwwkO4neu4S9O1Xm7kLGKEqRUmvFAY+PcxKsWr6K/U8NcPfdiMymxQW/ nuEFz1QFu2ftB+IOVisTbo3xWrKtWml2YLmKbn9vYC91KD4Bs18FGlJIcRXzcB5vdozw GJGKNpqqXJKTqH2xTvkYIUUOiABfYf1ENjF/th0mv/+ieC6gWmlnsFGYGIfCYYYy8RnZ GYqxz+BjAYfgOJ5UAQQXpS3vWDLHEm3Pb5l85hn/olA5l8ovtJu+HEaRgjvNOkun566F XluJEUjl0Uc/L2xL5V0XqoByxF4C20BrzhruWc9L9T+O6yobGFg0wne3ubdqgmXlUNXZ iz6Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:subject:cc:to:from:date; bh=JNyVSqmARN5DCvdlwLM6eB+dFnaD67B1wDw146e6ofQ=; b=kadgxgzM4AUNPQ0JPsI8dyIFXzJlSm9jBKLuNJz/57I6ZJATJAgTsPoLKbcVFbu+sv rK+kmykBtZAWDpf0EZL4w6h8L+C2PUq5RMU2qUVc77qZEUmCvZqGWlF5KDmnWUqCo633 VgZ4msq9gL8sxjVZWONwzKYajAZ8OS22rQQtlZoHy6aoEzj6Rjl1SQ1zFRfXpxmIi5t3 q5TwhuNbd4Km+flh0YA+EEqMSkBKi63jiv5DXK4RPVp9s19ZnusulbKin2Ne3oY1Z1fb glIXke4Tj57m1ZCu5WFUf2UcvPUFYSfRMtVXv9qNcx5KVc9yx9oz71xsS3xm1l/hxrYb DnFA== ARC-Authentication-Results: i=1; gmr-mx.google.com; spf=pass (google.com: domain of henning.schild@siemens.com designates 192.35.17.2 as permitted sender) smtp.mailfrom=henning.schild@siemens.com Return-Path: Received: from thoth.sbs.de (thoth.sbs.de. [192.35.17.2]) by gmr-mx.google.com with ESMTPS id i17si2049919edg.2.2019.01.28.09.22.40 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 28 Jan 2019 09:22:40 -0800 (PST) Received-SPF: pass (google.com: domain of henning.schild@siemens.com designates 192.35.17.2 as permitted sender) client-ip=192.35.17.2; Authentication-Results: gmr-mx.google.com; spf=pass (google.com: domain of henning.schild@siemens.com designates 192.35.17.2 as permitted sender) smtp.mailfrom=henning.schild@siemens.com Received: from mail1.sbs.de (mail1.sbs.de [192.129.41.35]) by thoth.sbs.de (8.15.2/8.15.2) with ESMTPS id x0SHMdZs030307 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 28 Jan 2019 18:22:40 +0100 Received: from md1za8fc.ad001.siemens.net ([139.25.0.69]) by mail1.sbs.de (8.15.2/8.15.2) with ESMTP id x0SHMcnq026115; Mon, 28 Jan 2019 18:22:38 +0100 Date: Mon, 28 Jan 2019 18:22:37 +0100 From: Henning Schild To: Claudius Heine Cc: , Claudius Heine Subject: Re: [PATCH 2/2] integrate ubifs image type Message-ID: <20190128182237.04ab656b@md1za8fc.ad001.siemens.net> In-Reply-To: References: <20190128122821.10002-1-claudius.heine.ext@siemens.com> <20190128122821.10002-3-claudius.heine.ext@siemens.com> <20190128140344.7bc5f072@md1za8fc.ad001.siemens.net> X-Mailer: Claws Mail 3.15.0-dirty (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-TUID: +LwabtBK68Lq Am Mon, 28 Jan 2019 14:40:36 +0100 schrieb Claudius Heine : > Hi Henning, > > On 28/01/2019 14.03, Henning Schild wrote: > > Am Mon, 28 Jan 2019 13:28:21 +0100 > > schrieb "[ext] claudius.heine.ext@siemens.com" > > : > > > >> From: Claudius Heine > >> > >> Signed-off-by: Claudius Heine > >> --- > >> doc/user_manual.md | 1 + > >> meta-isar/conf/local.conf.sample | 1 + > >> .../multiconfig/qemuamd64-buster-ubifs.conf | 16 +++++++ > >> meta/classes/ubifs-img.bbclass | 42 > >> +++++++++++++++++++ scripts/ci_build.sh | > >> 1 + 5 files changed, 61 insertions(+) > >> create mode 100644 > >> meta-isar/conf/multiconfig/qemuamd64-buster-ubifs.conf create mode > >> 100644 meta/classes/ubifs-img.bbclass > >> > >> diff --git a/doc/user_manual.md b/doc/user_manual.md > >> index c4fe42a..c9924ad 100644 > >> --- a/doc/user_manual.md > >> +++ b/doc/user_manual.md > >> @@ -476,6 +476,7 @@ Isar contains additional image type classes > >> that can be used as reference: > >> - `ext4-img` > >> - `rpi-sdimg` > >> - `targz-img` > >> + - `ubifs-img` > >> - `wic-img` > >> > >> --- > >> diff --git a/meta-isar/conf/local.conf.sample > >> b/meta-isar/conf/local.conf.sample index a671b20..9ea366c 100644 > >> --- a/meta-isar/conf/local.conf.sample > >> +++ b/meta-isar/conf/local.conf.sample > >> @@ -53,6 +53,7 @@ BBMULTICONFIG = " \ > >> hikey-stretch \ > >> qemuamd64-buster \ > >> qemuamd64-buster-tgz \ > >> + qemuamd64-buster-ubifs \ > >> rpi-jessie \ > >> " > >> > >> diff --git a/meta-isar/conf/multiconfig/qemuamd64-buster-ubifs.conf > >> b/meta-isar/conf/multiconfig/qemuamd64-buster-ubifs.conf new file > >> mode 100644 index 0000000..7c638b9 > >> --- /dev/null > >> +++ b/meta-isar/conf/multiconfig/qemuamd64-buster-ubifs.conf > >> @@ -0,0 +1,16 @@ > >> +# This software is a part of ISAR. > >> +# Copyright (c) Siemens AG, 2018 > >> +# > >> +# SPDX-License-Identifier: MIT > >> + > >> +MACHINE ?= "qemuamd64" > >> + > >> +DISTRO ?= "debian-buster" > >> +DISTRO_ARCH ?= "amd64" > >> + > >> +KERNEL_NAME ?= "amd64" > >> + > >> +MKUBIFS_ARGS ?= "-m 0x1000 -e 0x3e000 -c 1500" > >> +IMAGE_TYPE ?= "ubifs-img" > >> + > >> +IMAGE_INSTALL += "sshd-regen-keys" > >> diff --git a/meta/classes/ubifs-img.bbclass > >> b/meta/classes/ubifs-img.bbclass new file mode 100644 > >> index 0000000..f5e17d3 > >> --- /dev/null > >> +++ b/meta/classes/ubifs-img.bbclass > >> @@ -0,0 +1,42 @@ > >> +# This software is a part of ISAR. > >> +# Copyright (c) Siemens AG, 2018 > >> + > >> +python() { > >> + if not d.getVar("MKUBIFS_ARGS"): > >> + bb.fatal("MKUBIFS_ARGS must be set") > >> +} > >> + > >> +inherit image > > > > I dislike all this variable setting and additional mounting. > > > >> +UBIFS_IMAGE_FILE ?= "${IMAGE_FULLNAME}.ubifs.img" > >> + > >> +IMAGER_INSTALL += "mtd-utils" > >> + > >> +PP = "/home/builder/${PN}" > > > > That is already defined in another file in Isar. We should rather > > find a common location and refactor. > > > >> +PP_DEPLOY = "${PP}/deploy" > >> +PP_ROOTFS = "${PP}/rootfs" > > > > Similar comments might apply here. > > Do you think that refactoring should be part of this patchset? I am not sure, just wanted to write it down. On the one hand it would be nice to solve all drive-by issues as we go. On the other hand that will slow down development and impose on contributors. So feel free to ignore my comments, the inconsistencies are not your fault and asking you to fix them would be too much. > >> +BUILDROOT = "${BUILDCHROOT_DIR}${PP}" > >> +BUILDROOT_DEPLOY = "${BUILDCHROOT_DIR}${PP_DEPLOY}" > >> +BUILDROOT_ROOTFS = "${BUILDCHROOT_DIR}${PP_ROOTFS}" > > > > Same here, and "buildroot" to me is something else ;). > > That is part of my plot to slowly merge bitbake, isar and buildroot ;) Good first step. We actually have buildroot isar recipes in jailhouse-images, so this name can potentially get confusing for real. > > > >> +do_ubifs_image[stamp-extra-info] = "${DISTRO}-${MACHINE}" > >> + > >> +# Generate ubifs filesystem image > >> +do_ubifs_image() { > >> + rm -f ${DEPLOY_DIR_IMAGE}/${UBIFS_IMAGE_FILE} > >> + > >> + buildchroot_do_mounts > >> + > >> + sudo flock ${MOUNT_LOCKFILE} -c ' \ > >> + mkdir -p ${BUILDROOT_DEPLOY} ${BUILDROOT_ROOTFS} > >> + mount --bind ${DEPLOY_DIR_IMAGE} ${BUILDROOT_DEPLOY} > >> + mount --bind ${IMAGE_ROOTFS} ${BUILDROOT_ROOTFS} > >> + ' > > > > I think this mounting should also be required by a proper ext4 > > class. On the other hand the wic one moves the image into the final > > deploy folder. > > Not sure what is best but maybe a good idea to go for "always move" > > or "always mount". > > Hmm.. In OE this task would not to touch the deploy directory and > *copy* all artifacts in a dedicated task AFAIK. But OE has a > completely different image creation pipeline and infrastructure than > isar, so who knows how things should be done here. We currently generate and deploy in one task. The fun thing is that we need multiple commands and can probably end up in weird states if we get interrupted or fail. Changing that general pattern is a discussion of its own, since it would change the API. Staying in the current API i think the mount and generate directly into deploy ... no more chmod/chown mv ... whatever. Would be the cleanest way. We already have a reliable umount mechanism to clean up if things go wrong. If you agree: Please include that deploydir/rootfs mount into the common mounts and update your imager. I will do the same for wic and maybe ext4. > I am open to discussion about implementing some rules and > documentation about how things should be done in isar. I assume that consistent references are equally efficient as documentation, maybe more. Henning > Claudius > > > > > Henning > > > >> + # Create ubifs image using buildchroot tools > >> + sudo chroot ${BUILDCHROOT_DIR} /usr/sbin/mkfs.ubifs > >> ${MKUBIFS_ARGS} \ > >> + -r "${PP_ROOTFS}" > >> "${PP_DEPLOY}/${UBIFS_IMAGE_FILE}" +} > >> + > >> +addtask ubifs_image before do_build after do_copy_boot_files > >> do_install_imager_deps diff --git a/scripts/ci_build.sh > >> b/scripts/ci_build.sh index f3523e8..dcde0b4 100755 > >> --- a/scripts/ci_build.sh > >> +++ b/scripts/ci_build.sh > >> @@ -115,6 +115,7 @@ else > >> multiconfig:qemuamd64-stretch:isar-image-base \ > >> multiconfig:qemuamd64-buster:isar-image-base \ > >> multiconfig:qemuamd64-buster-tgz:isar-image-base \ > >> + multiconfig:qemuamd64-buster-ubifs:isar-image-base \ > >> multiconfig:rpi-jessie:isar-image-base > >> # qemu-user-static of <= buster too old to build that > >> #multiconfig:qemuarm64-buster:isar-image-base > > >