From mboxrd@z Thu Jan 1 00:00:00 1970 X-GM-THRID: 6948713968808493056 X-Received: by 2002:a17:906:600b:: with SMTP id o11mr28505159ejj.345.1618246507451; Mon, 12 Apr 2021 09:55:07 -0700 (PDT) X-BeenThere: isar-users@googlegroups.com Received: by 2002:a17:907:c24:: with SMTP id ga36ls1582675ejc.9.gmail; Mon, 12 Apr 2021 09:55:06 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzpXCjw0eFX09wbjarZ49vYt9+AcuIYXeluIE9VOD1Ov7R+DJaTV3PuLHtAVcGcT2Aw3bnc X-Received: by 2002:a17:906:350e:: with SMTP id r14mr1621726eja.365.1618246506550; Mon, 12 Apr 2021 09:55:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1618246506; cv=none; d=google.com; s=arc-20160816; b=ylo5sKXZ2LmNnJCJfrQlsWhhAXePZYi20d7wvM8MpaLdaHO2v1ApOcOZbRd27CKxP+ SLEmbCMcNdlcMFAdKfOXP4UsqPq567784g09Ijdr+8aoDYhxeS/tI85Q9mx8hom6M027 ZIFSm++2dLt29HqYL/xD6MgvbB6eeaNH0UTueCxkxcdZFG24BwpY9QK7Zs98mlvVPWl9 /XpjJW0EKNa5eDMG5LlhggaZPIJ6/zpRkowlVKcMrJT7V8dBcOvLnekFwH9Auen0nXPQ yn/7OWCsO3gOHOyQhLklKkajxea/SN0L+u1y7V13erVQQXSXZ5QYANawHqCD6KZfdJOE C+iw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:content-language:in-reply-to:mime-version :user-agent:date:message-id:from:references:to:subject; bh=Crl5Kz7d9ZUs/HRFUdKhbZpRr9VMqwNdMItRDiMpSyQ=; b=i4XRB+Y7bKMXnKyzz1vXQ7Fr2Y8T7+Uc1owooIGKC98DOKwn6hWrzXY9iSPtVyM8pu 3n4ijMZmteS98SdxpuQeeKA5FMaaw/lKURZDDfyRoYhjui0aRNgRFuo6tUJwc5LTc4pC 4TrpvMG0kRzAnRunIjouWkr242lRA/Ov5w6SOLzLeEkWox41/M76nNiI4B/LywqPovWm qVN7ZYDm27HanPmiBPYj1mbpxXix3t1ocekdmPl3ipWP5yJea8aZ8QcmbP9TBi6nG5Wd KVUQeXfd6Ntprx6TsTMSd1/2SLBelzhstat/NvuuHYb0+e/Lt3myhLuJI2L1of9o0c1h s6Nw== ARC-Authentication-Results: i=1; gmr-mx.google.com; spf=pass (google.com: domain of jan.kiszka@siemens.com designates 194.138.37.39 as permitted sender) smtp.mailfrom=jan.kiszka@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com Return-Path: Received: from lizzard.sbs.de (lizzard.sbs.de. [194.138.37.39]) by gmr-mx.google.com with ESMTPS id m18si600832edd.5.2021.04.12.09.55.06 for (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Mon, 12 Apr 2021 09:55:06 -0700 (PDT) Received-SPF: pass (google.com: domain of jan.kiszka@siemens.com designates 194.138.37.39 as permitted sender) client-ip=194.138.37.39; Authentication-Results: gmr-mx.google.com; spf=pass (google.com: domain of jan.kiszka@siemens.com designates 194.138.37.39 as permitted sender) smtp.mailfrom=jan.kiszka@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com Received: from mail2.sbs.de (mail2.sbs.de [192.129.41.66]) by lizzard.sbs.de (8.15.2/8.15.2) with ESMTPS id 13CGt6PI023883 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for ; Mon, 12 Apr 2021 18:55:06 +0200 Received: from [167.87.46.221] ([167.87.46.221]) by mail2.sbs.de (8.15.2/8.15.2) with ESMTP id 13CGpSLT009451; Mon, 12 Apr 2021 18:51:28 +0200 Subject: Re: [PATCH] doc: add a section on flashing images To: Henning Schild , isar-users@googlegroups.com References: <20210408091900.26115-1-henning.schild@siemens.com> From: Jan Kiszka Message-ID: <2229cf56-88ff-57ac-4fb5-8b0903aa8e5f@siemens.com> Date: Mon, 12 Apr 2021 18:51:28 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.8.0 MIME-Version: 1.0 In-Reply-To: <20210408091900.26115-1-henning.schild@siemens.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-TUID: ElsEeg8VDHnv On 08.04.21 11:19, Henning Schild wrote: > Signed-off-by: Henning Schild > --- > doc/user_manual.md | 8 ++++++++ > 1 file changed, 8 insertions(+) > > diff --git a/doc/user_manual.md b/doc/user_manual.md > index 70cf20a74828..e1d7166911e2 100644 > --- a/doc/user_manual.md > +++ b/doc/user_manual.md > @@ -232,6 +232,14 @@ qemu-system-x86_64 -m 256M -nographic -bios edk2/Build/OvmfX64/RELEASE_*/FV/OVMF > qemu-system-i386 -m 256M -nographic -hda tmp/deploy/images/qemui386/isar-image-base-debian-buster-qemui386.wic.img > ``` > > +#### Flashing such images to a physical device > + > +wic images can be flashed in multiple ways. The most generic and easy way is probably with [ etcher ](https://etcher.io). That works on many operating systems and is relatively easy to use. On top it can decompress images on the fly, should they be compressed. It also offers some sort of protection so you do not write to the wrong device and maybe break your machine. > + > +If you have a unix shell there are other ways. Make sure to always double check the target device, those tools will not warn if you choose the wrong target. > + > +`dd` is the most generic option, available pretty much everywhere. For large images that contain a lot of empty space `dd` might be a little slow because it writes all that empty space. In that case `bmaptool` can be used instead. It's "bmap-tools" officially, a link to it would be good (https://github.com/intel/bmap-tools). Some distros like Debian call the package bmaptool. In general, would put it before mentioning dd, also because "bmaptool copy" checks if the target device is mounted before writing - which can be quite a mess if you didn't notice this. We recommend it therefore in most of our end-user facing layers. Jan > + > ### Generate container image with root filesystem > > A runnable container image is generated if you set IMAGE_TYPE to > -- Siemens AG, T RDA IOT Corporate Competence Center Embedded Linux