From mboxrd@z Thu Jan 1 00:00:00 1970 X-GM-THRID: 6864480010557718528 X-Received: by 2002:a2e:541c:: with SMTP id i28mr2190287ljb.77.1599664167775; Wed, 09 Sep 2020 08:09:27 -0700 (PDT) X-BeenThere: isar-users@googlegroups.com Received: by 2002:a19:6e4d:: with SMTP id q13ls189461lfk.1.gmail; Wed, 09 Sep 2020 08:09:26 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwQl8SMDcmqJ0Q0Z7sJcKDTi/HNtsmmTQa6HZY/mwqoVxvZlXOeS5LbcOIAH00RNHb3cc5G X-Received: by 2002:a19:5e19:: with SMTP id s25mr2037895lfb.196.1599664166620; Wed, 09 Sep 2020 08:09:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1599664166; cv=none; d=google.com; s=arc-20160816; b=slzCrPioc2UXvhTPlmD2bwc+HWjReKAEYdpvAT9C7EP74AV4x8XTqgW7J8K9Ez9g2A CefeS9OPR48Lav69NAOdKhf5Z9OhQyq7B6vjrWzcaDyjxnWr0/nSmlmErd6tdjyxPtFZ Ctrr1Lf1zFL2uhW7H/JghOj+XvBdx/gkqVoafgUJJWQR3qyw1JcZgOwwwdqveWMvblB2 6K5O1562uEA6AG2rcnvDwBHB9szTkt176wIYA2d5XBaYNvU1KPqn3v1x+7TgyoAP+kdS qlgD2FBvig+U4KK8V2BkZyrF50CuuJg17Q/gV+USo95jpciiApSKBBOI++Kvy8epDxiG aa9g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:subject:cc:to:from:date; bh=RQI2R9lSToXk22BcYXC5EBcUYEyafq6QruvAH8FLCYY=; b=CTya7yYeDxmeGfp4RSE09xlNV6SulHIcGR0pBnaTWmxlbT+f1+RWzAyLNSMsMAY9bh BynE1oRS5pXVRcXD754W3gc7VVjS1zaaB7e+vTco9F+dBGnpp836qd5N+gOn1QKzZBW1 Il+J46oPhLezG85WLMNsnBXkol1KEMZ+rWV953jJNmjeh6jvl/fpLxQcHDjwZNkWpruT TXyX0GMbzentH6uARJWxVPHCA/ydhj6adAwvCey0q3CmRXL+XNIWEB178hcAfPPSj2G0 fSzz3AYslFdGRlsoczmBjracNg9a9g1XnpvfkOV7k3VcQLfhTlfmtL3Yi0A2C3Q0AJu8 cc1Q== ARC-Authentication-Results: i=1; gmr-mx.google.com; spf=pass (google.com: domain of henning.schild@siemens.com designates 192.35.17.14 as permitted sender) smtp.mailfrom=henning.schild@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com Return-Path: Received: from david.siemens.de (david.siemens.de. [192.35.17.14]) by gmr-mx.google.com with ESMTPS id 14si122342lfq.5.2020.09.09.08.09.26 for (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Wed, 09 Sep 2020 08:09:26 -0700 (PDT) Received-SPF: pass (google.com: domain of henning.schild@siemens.com designates 192.35.17.14 as permitted sender) client-ip=192.35.17.14; Authentication-Results: gmr-mx.google.com; spf=pass (google.com: domain of henning.schild@siemens.com designates 192.35.17.14 as permitted sender) smtp.mailfrom=henning.schild@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com Received: from mail1.sbs.de (mail1.sbs.de [192.129.41.35]) by david.siemens.de (8.15.2/8.15.2) with ESMTPS id 089F9OCO011387 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 9 Sep 2020 17:09:25 +0200 Received: from md1za8fc.ad001.siemens.net ([167.87.59.40]) by mail1.sbs.de (8.15.2/8.15.2) with ESMTP id 089F9OQS005221; Wed, 9 Sep 2020 17:09:24 +0200 Date: Wed, 9 Sep 2020 17:09:23 +0200 From: Henning Schild To: "vijaikumar....@gmail.com" Cc: isar-users Subject: Re: [PATCH v2 10/10] meta-isar/canned-wks: Remove /boot mountpoint Message-ID: <20200909170923.280d958b@md1za8fc.ad001.siemens.net> In-Reply-To: References: <20200902185624.15044-9-Vijaikumar_Kanagarajan@mentor.com> <20200902190247.15421-1-Vijaikumar_Kanagarajan@mentor.com> <20200902190247.15421-2-Vijaikumar_Kanagarajan@mentor.com> <20200905105815.263d8c3e@md1za8fc.ad001.siemens.net> X-Mailer: Claws Mail 3.17.6 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-TUID: H/D7MnfpIHs5 On Sat, 5 Sep 2020 09:06:08 -0700 (PDT) "vijaikumar....@gmail.com" wrote: > On Saturday, September 5, 2020 at 2:28:17 PM UTC+5:30 Henning Schild > wrote: > > > Hi, > > > > i do not like this one at all. Suggesting people to hide the boot > > partition from debian as hard as they can? If i understand it > > correctly. > > AFAIU , /boot mount-point[1] is wrong and is not needed without > --exclude-path of /boot in rootfs partition. > This optional mount-point serves only one purpose, i.e, to have an > entry added in fstab or not by wic. > We were okay with saying this EFI/bootloader partition mount-point as > /boot, since older wic > was not adding the /boot mount-point to fstab. > With this commit [2] in OE this is no longer the case. > /boot is added to fstab and at boot the system would try to mount to > this efi partiton to /boot > directory which, if successful, will make the kernel, initrd and > config files which were already available in /boot > of rootfs unavailable when the system is booted. I donot see > --exclude-path for /boot in the wks file, > so this would just be wrong to have a mount-point like this. Not sure i get all that, but to me it seems we need a wks file without boot or we need one with boot and the exclude. The exclude might not be needed on OE, on debian it is ... so adding the exclude could be a better default/example than removing the boot partition. > [1] > https://github.com/ilbers/isar/blob/a0d6de4ac7dfb926b38cfcd44f2bc8852f2e43e3/meta-isar/scripts/lib/wic/canned-wks/sdimage-efi.wks#L5 > [2] > https://github.com/openembedded/openembedded-core/commit/2376b05512ddb8c4ec3aaf1df11071f536a76bd9 > > > > In fact the hiding is an issue that should be solved, debian should > > know about that partition and use it correctly. > > > > On EFI it only contains the bootloader, so such isar images will be > > able to receive kernel updates with apt-get during their lifetime. > > They will never be able to update the bootloader, but that might be > > ok. > > > > On BIOS the story is different. These systems have the kernel in > > the roots/boot only that kernel is never used for booting and the > > machines will never be able to update the kernel they boot. > > > > I always wanted to solve that but it was not too easy. The first > > idea was just bootloader in the boot partition, like efi. But > > syslinux can not boot files from other partitions, so we need the > > kernel and initrd there. > > But now with the exclude feature it might be easier. Place the > > bootloader and config into rootfs/boot and point to the kernel > > initrd symlinks in the config. (Done in our custom BIOS plugin) > > And now take rootfs/boot as boot, excluding it from rootfs. > > > Can you point me to some code where these kind of scenarios are? I > assume these are all downstream? For downstream you could customize > the wks with neccessary /boot as mountpoint for EFI and > "--exclude-path /boot" to achieve > what you want. I donot see the issue in removing it here. There is no code to point to. What i described is the current state of Isar and a possible direction it could take to fix the fact that the boot partition is never visible in the running system. An issue especially problematic for BIOS boot, since kernel updating is broken. Just build a BIOS booting qemu (conf/machine/qemui386.conf), and install i.e. linux-image-rt in the running system with apt-get I am not saying this should not be merged. But this is a good time to look at the "debians do not know about that boot partition" issue again, instead of possibly making it worse and including bad examples into meta-isar ... which will later end up in other layers. Henning > > > > > Henning > > > > On Thu, 3 Sep 2020 00:32:47 +0530 > > Vijai Kumar K wrote: > > > > > In the older version of wic, the fstab entry for /boot mountpoint > > > was skipped. > > > However in the latest wic this is not the case. Adding a /boot > > > mountpoint in part results in creating a fstab entry for > > > automount. Remove it to avoid the unwanted mount which makes > > > original contents unavailable in debian rootfilesystem. > > > > > > Signed-off-by: Vijai Kumar K > > > --- > > > RECIPE-API-CHANGELOG.md | 17 > > > +++++++++++++++++ .../lib/wic/canned-wks/common-isar.wks.inc | > > > 2 +- meta-isar/scripts/lib/wic/canned-wks/hikey.wks | 2 +- > > > .../scripts/lib/wic/canned-wks/sdimage-efi.wks | 2 +- > > > 4 files changed, 20 insertions(+), 3 deletions(-) > > > > > > diff --git a/RECIPE-API-CHANGELOG.md b/RECIPE-API-CHANGELOG.md > > > index 1839770..070cde3 100644 > > > --- a/RECIPE-API-CHANGELOG.md > > > +++ b/RECIPE-API-CHANGELOG.md > > > @@ -246,3 +246,20 @@ by setting DEBIAN_BUILD_DEPENDS. > > > > > > ${S} can now be used for checking out sources without being > > > linked implicitly with ${D} which needs to be filled explicitly > > > in do_install as before. + > > > +### Wic adds /boot mountpoint to fstab > > > + > > > +With the latest wic, /boot mount point, if any, is added to > > > /etc/fstab. Debian +uses /boot to store the kernel and initrd > > > images. If an image's wks file +specifies /boot mountpoint for > > > boot partitions like EFI, the image may fail to +boot or might > > > make the original contents of /boot unavailable after boot. +All > > > unwanted /boot mountpoints should be removed. + > > > > Maybe I can add a bit more to > this sentence to make it clear, something like unless you know what > you are doing. > I could add the rest of the wks entry below to highlight that /boot > is not excluded in the first place. > > > > > +Below is an example wks entry that might cause an issue. > > > +``` > > > +part /boot --source bootimg-efi-isar --sourceparams > > > "loader=grub-efi" --ondisk sda --label efi --part-type EF00 > > > --align 1024 +``` +Drop the /boot entry to avoid issues. > > > +``` > > > +part --source bootimg-efi-isar --sourceparams "loader=grub-efi" > > > --ondisk sda --label efi --part-type EF00 --align 1024 +``` > > > diff --git > > > a/meta-isar/scripts/lib/wic/canned-wks/common-isar.wks.inc > > > b/meta-isar/scripts/lib/wic/canned-wks/common-isar.wks.inc index > > > c8ea4c2..e7dabd4 100644 --- > > > a/meta-isar/scripts/lib/wic/canned-wks/common-isar.wks.inc +++ > > > b/meta-isar/scripts/lib/wic/canned-wks/common-isar.wks.inc @@ > > > -1,3 +1,3 @@ # This file is included into 3 canned wks files from > > > this directory -part /boot --source bootimg-pcbios-isar --ondisk > > > sda --label boot --active --align 1024 +part --source > > > bootimg-pcbios-isar --ondisk sda --label boot --active --align > > > 1024 part / --source rootfs --ondisk sda --fstype=ext4 --label > > > platform --align 1024 diff --git > > > a/meta-isar/scripts/lib/wic/canned-wks/hikey.wks > > > b/meta-isar/scripts/lib/wic/canned-wks/hikey.wks index > > > 1e82f8c..840858e 100644 --- > > > a/meta-isar/scripts/lib/wic/canned-wks/hikey.wks +++ > > > b/meta-isar/scripts/lib/wic/canned-wks/hikey.wks @@ -3,7 +3,7 @@ > > > # # SPDX-License-Identifier: MIT > > > > > > -part /boot --source bootimg-efi-isar --sourceparams > > > "loader=grub-efi" --ondisk mmcblk1 --label efi --part-type EF00 > > > --align 1024 +part --source bootimg-efi-isar --sourceparams > > > "loader=grub-efi" --ondisk mmcblk1 --label efi --part-type EF00 > > > --align 1024 part / --source rootfs --ondisk mmcblk1 --fstype > > > ext4 --label platform --align 1024 --use-uuid diff --git > > > a/meta-isar/scripts/lib/wic/canned-wks/sdimage-efi.wks > > > b/meta-isar/scripts/lib/wic/canned-wks/sdimage-efi.wks index > > > 2afa016..e0fa7a1 100644 --- > > > a/meta-isar/scripts/lib/wic/canned-wks/sdimage-efi.wks +++ > > > b/meta-isar/scripts/lib/wic/canned-wks/sdimage-efi.wks @@ -2,7 > > > +2,7 @@ # long-description: Creates a partitioned EFI disk image > > > without any swap that # the user can directly dd to boot media. > > > -part /boot --source bootimg-efi-isar --sourceparams > > > "loader=grub-efi" --ondisk sda --label efi --part-type EF00 > > > --align 1024 +part --source bootimg-efi-isar --sourceparams > > > "loader=grub-efi" --ondisk sda --label efi --part-type EF00 > > > --align 1024 part / --source rootfs --ondisk sda --fstype ext4 > > > --label platform --align 1024 --use-uuid > > > > >