From mboxrd@z Thu Jan 1 00:00:00 1970 X-GM-THRID: 6864480010557718528 X-Received: by 2002:a17:906:644e:: with SMTP id l14mr21340017ejn.60.1599495654956; Mon, 07 Sep 2020 09:20:54 -0700 (PDT) X-BeenThere: isar-users@googlegroups.com Received: by 2002:a17:906:f1c6:: with SMTP id gx6ls1124676ejb.8.gmail; Mon, 07 Sep 2020 09:20:53 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxba9zwMJUIjwlb5zDnzLGbJhiUriAL5Hd4OsOKRUdT+MbPOSAgwowbeJcuYJsrcSZRmyvz X-Received: by 2002:a17:906:77d1:: with SMTP id m17mr22169406ejn.96.1599495653818; Mon, 07 Sep 2020 09:20:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1599495653; cv=none; d=google.com; s=arc-20160816; b=05tyRQSN9dZllVTn2WRJoQX1spvMjUKazKldApRdyYf/vE1uZ8tJ3S6a3A+UzlXf3/ c+7qz2MB8gArS8I9K0epdzv8VAVq7hDJXnagJA9ctkGI5WhJjX6Dot2vPK4kXIduEMZH GjISIXvfRz/Bc7qByDzFsxwEuUoSqW0Bdy4yrRS7hm3nRszh22HBrfhtc5RxeSkUeliR +T6cn5kHVR2+Y6424mhpG1Q64axsASbX5kriimAlqPLtD7fVV4cRgcquS6ACxk06tnsa hkkRnlTLc3XI60d5Pg7WkS0SxUh9vZ9HELZoDWcboS2sODOUKHb2w9/Mv/yMlslPR8ft R3Jw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=mime-version:references:in-reply-to:message-id:date:subject:to:from :ironport-sdr:ironport-sdr; bh=/eIQ4flEnHFLsnbLrsaYvjdU3f8OXhRnWV8EVZn2e3M=; b=sz1K/speomKauLLhoV2IAuovPnhGd484TLswZphiKiioWs1hSMrB5U0FlfbvXjvLI9 vTKbKNHGp5E/JXYHTaQ8UxDcORgBX9n8GLCBC7qNUUOCB55ycjAhp9jNDUcI8fD2Buhb wnV6pIGM7sGoowPNPmA+T8+u+IeiJfBUj/hMOyWcAscMkW5JMa8txnAz9IaplnKUaq+K UFA0nnI/CF3Q2H/cyiJid9xamVOaaLaVWu1bMoeD+11oZDgNdwjjRo5bZfUVnjUgb41O u5ihuHZLdRcoDanFDUA1Q6nCZZjJ7BIlo1tjcJ7Up5ik/SyYtOpGVW4g48Rrt9no3tBE Kqpw== ARC-Authentication-Results: i=1; gmr-mx.google.com; spf=pass (google.com: domain of vijaikumar_kanagarajan@mentor.com designates 68.232.137.252 as permitted sender) smtp.mailfrom=Vijaikumar_Kanagarajan@mentor.com Return-Path: Received: from esa4.mentor.iphmx.com (esa4.mentor.iphmx.com. [68.232.137.252]) by gmr-mx.google.com with ESMTPS id w16si466474edq.4.2020.09.07.09.20.53 for (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Mon, 07 Sep 2020 09:20:53 -0700 (PDT) Received-SPF: pass (google.com: domain of vijaikumar_kanagarajan@mentor.com designates 68.232.137.252 as permitted sender) client-ip=68.232.137.252; Authentication-Results: gmr-mx.google.com; spf=pass (google.com: domain of vijaikumar_kanagarajan@mentor.com designates 68.232.137.252 as permitted sender) smtp.mailfrom=Vijaikumar_Kanagarajan@mentor.com IronPort-SDR: K1KhRBqna0+rN+O+yw9OL+qQ6qGnl9b3jiptiHMZ7mJH4W9zSvZBzLjSNsOEPaM2BNRyWhJDtQ iPCc3+CaV8tRS7MAmwo6DU+UJYlRys0jPJPwEmAKFgw9Pv07myUfDQ6L0tAuW1e+C9PCeUL4HJ 6qn4mfTM/u7DB6Ll5Ics1seNkPlUxO63zJHfS78Czk9s7MM0PcVsVSisteJtKF8dxng4Pj3oI5 VV2TmQ+Be4ug0ujSOUPLBn+noaM7wKToV3FbWwW2l3tjWAjTXhq/n9k/PQQdWjvMjscvmPuVeU vbc= X-IronPort-AV: E=Sophos;i="5.76,402,1592899200"; d="scan'208";a="52770206" Received: from orw-gwy-02-in.mentorg.com ([192.94.38.167]) by esa4.mentor.iphmx.com with ESMTP; 07 Sep 2020 08:20:52 -0800 IronPort-SDR: pq+Ig9ULJV6kUy1HQHnRkpsqXoRQEiKFeGUQMWilVD7Xx7zRO6Pc5co+ynxyBt2OREl5y0e7oJ tGrleolCVvU3x3e0IqL57gP27ZbxjZEbMIEcJdjSt3ireWrK+m6DHXSFgIm6Iza/givpyW1W39 kbVLeYGxaeZU3hi8Y/DnlrRu4T3jYJ814A1pq1QA2a6ad5Kx2GdQRaWlD9MsKG9N86Zif1px1X Vy+QI0h+TFWYN9NWtVtPZ1gdEJ/1wMNcJDWnz2XvzQjErF92a7oqzv97vocFWbjORELF+le9l/ xv8= From: Vijai Kumar K To: , Subject: [PATCH v3 9/9] meta-isar/canned-wks: Remove unwanted /boot mountpoint Date: Mon, 7 Sep 2020 21:50:18 +0530 Message-ID: <20200907162018.16636-6-Vijaikumar_Kanagarajan@mentor.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20200907162018.16636-1-Vijaikumar_Kanagarajan@mentor.com> References: <20200907161756.16372-4-Vijaikumar_Kanagarajan@mentor.com> <20200907162018.16636-1-Vijaikumar_Kanagarajan@mentor.com> MIME-Version: 1.0 Content-Type: text/plain Return-Path: Vijaikumar_Kanagarajan@mentor.com X-ClientProxiedBy: SVR-ORW-MBX-09.mgc.mentorg.com (147.34.90.209) To svr-orw-mbx-01.mgc.mentorg.com (147.34.90.201) X-TUID: EqEVvdNDvleQ In the older version of wic, the fstab entry for /boot mountpoint was skipped. However in the latest wic this is not the case. Adding a /boot mountpoint in part results in creating a fstab entry for automount. It is observed that in some kickstart files, /boot is used as a mount point for bootloaders. This was okay with the previous wic since anyway it ignored adding /boot mount points to fstab. With the new wic, this now causes an unwanted mount of that partition in /boot which inturn makes the original contents of /boot unavailable after a successful boot. This is not the default behaviour expected. Remove such bogus /boot mount point in wks files. Signed-off-by: Vijai Kumar K --- RECIPE-API-CHANGELOG.md | 23 +++++++++++++++++++ .../lib/wic/canned-wks/common-isar.wks.inc | 2 +- .../scripts/lib/wic/canned-wks/hikey.wks | 2 +- .../lib/wic/canned-wks/sdimage-efi.wks | 2 +- 4 files changed, 26 insertions(+), 3 deletions(-) diff --git a/RECIPE-API-CHANGELOG.md b/RECIPE-API-CHANGELOG.md index 1839770..c677b1d 100644 --- a/RECIPE-API-CHANGELOG.md +++ b/RECIPE-API-CHANGELOG.md @@ -246,3 +246,26 @@ by setting DEBIAN_BUILD_DEPENDS. ${S} can now be used for checking out sources without being linked implicitly with ${D} which needs to be filled explicitly in do_install as before. + +### Wic adds /boot mountpoint to fstab + +With the latest wic, /boot mount point, if any, is added to /etc/fstab. Debian +uses /boot to store the kernel and initrd images. + +Any wks file which assumed that /boot would be skipped from /etc/fstab should +now be corrected. Otherwise, the original /boot contents, i.e kernel initrd & +config files will be unavailable after boot. + +Below is an example wks entry that might cause an issue. The rootfs already +has /boot with valid contents. Specifying /boot as mount point for the efi +partition would only make /boot contents of "part /" unavailable after boot. +``` +part /boot --source bootimg-efi-isar --sourceparams "loader=grub-efi" --ondisk sda --label efi --part-type EF00 --align 1024 +part / --source rootfs --ondisk sda --fstype ext4 --label platform --align 1024 --use-uuid +``` +If mounting /boot parition is an unwanted behaviour in your target then +remove it. +``` +part --source bootimg-efi-isar --sourceparams "loader=grub-efi" --ondisk sda --label efi --part-type EF00 --align 1024 +part / --source rootfs --ondisk sda --fstype ext4 --label platform --align 1024 --use-uuid +``` diff --git a/meta-isar/scripts/lib/wic/canned-wks/common-isar.wks.inc b/meta-isar/scripts/lib/wic/canned-wks/common-isar.wks.inc index c8ea4c2..e7dabd4 100644 --- a/meta-isar/scripts/lib/wic/canned-wks/common-isar.wks.inc +++ b/meta-isar/scripts/lib/wic/canned-wks/common-isar.wks.inc @@ -1,3 +1,3 @@ # This file is included into 3 canned wks files from this directory -part /boot --source bootimg-pcbios-isar --ondisk sda --label boot --active --align 1024 +part --source bootimg-pcbios-isar --ondisk sda --label boot --active --align 1024 part / --source rootfs --ondisk sda --fstype=ext4 --label platform --align 1024 diff --git a/meta-isar/scripts/lib/wic/canned-wks/hikey.wks b/meta-isar/scripts/lib/wic/canned-wks/hikey.wks index 1e82f8c..840858e 100644 --- a/meta-isar/scripts/lib/wic/canned-wks/hikey.wks +++ b/meta-isar/scripts/lib/wic/canned-wks/hikey.wks @@ -3,7 +3,7 @@ # # SPDX-License-Identifier: MIT -part /boot --source bootimg-efi-isar --sourceparams "loader=grub-efi" --ondisk mmcblk1 --label efi --part-type EF00 --align 1024 +part --source bootimg-efi-isar --sourceparams "loader=grub-efi" --ondisk mmcblk1 --label efi --part-type EF00 --align 1024 part / --source rootfs --ondisk mmcblk1 --fstype ext4 --label platform --align 1024 --use-uuid diff --git a/meta-isar/scripts/lib/wic/canned-wks/sdimage-efi.wks b/meta-isar/scripts/lib/wic/canned-wks/sdimage-efi.wks index 2afa016..e0fa7a1 100644 --- a/meta-isar/scripts/lib/wic/canned-wks/sdimage-efi.wks +++ b/meta-isar/scripts/lib/wic/canned-wks/sdimage-efi.wks @@ -2,7 +2,7 @@ # long-description: Creates a partitioned EFI disk image without any swap that # the user can directly dd to boot media. -part /boot --source bootimg-efi-isar --sourceparams "loader=grub-efi" --ondisk sda --label efi --part-type EF00 --align 1024 +part --source bootimg-efi-isar --sourceparams "loader=grub-efi" --ondisk sda --label efi --part-type EF00 --align 1024 part / --source rootfs --ondisk sda --fstype ext4 --label platform --align 1024 --use-uuid -- 2.17.1