From: Jan Kiszka <jan.kiszka@siemens.com>
To: Harald Seiler <hws@denx.de>,
isar-users@googlegroups.com,
Quirin Gylstorff <quirin.gylstorff@siemens.com>
Subject: Re: [RFC PATCH] classes: Add initramfs class
Date: Mon, 21 Sep 2020 21:25:42 +0200 [thread overview]
Message-ID: <433a8c30-796e-344f-35b7-0ce17a1fad7f@siemens.com> (raw)
In-Reply-To: <20200921104212.1387227-1-hws@denx.de>
On 21.09.20 12:42, Harald Seiler wrote:
> Add a new "image" class for generating a custom initramfs. It works
> like this: A new minimal debian rootfs is bootstrapped and all
> dependency packages for the new initramfs are installed. Then, an
> initramfs is generated from this rootfs and deployed like usual.
>
> This new initramfs.bbclass "image" class should be pulled in by an
> "initramfs image" recipe. Said recipe then specifies all dependencies
> of the initramfs via INITRAMFS_INSTALL and INITRAMFS_PREINSTALL (which
> are analogous to the respective IMAGE_* variables).
>
> initramfs.bbclass intentionally does _not_ expose a mechanism to change
> /etc/initramfs-tools/initramfs.conf and /etc/initramfs-tools/modules.
> Changes to their settings are better done via packages that deploy
> conf-hooks to /usr/share/initramfs-tools/conf-hooks.d/ and module
> fragment files to /usr/share/initramfs-tools/modules.d/.
>
> Signed-off-by: Harald Seiler <hws@denx.de>
> ---
>
> Notes:
> I had this idea while searching for a way to build an initramfs that
> uses dm-verity to assert integrity of the rootfs. To me, this feels
> like a much cleaner solution than anything else I tried and I'm happy to
> report that, using this approach, I got everything working nicely in the
> original project.
>
> In my opinion, this design has a number of advantages over the previous
> solutions we have seen so far:
>
> - It does not suffer any kind of initramfs pollution, caused by
> packages installed into a rootfs. This is a big problem when trying
> to generated an initramfs from e.g. `buildchroot-target` as many
> unrelated packaged could be installed there which would all get
> pulled into the initrd (if they install hooks/scripts).
>
> This also means, with this new approach, the integrator has maximum
> control over the contents of the initramfs.
>
> - There are no needs to change the initramfs generation process in any
> way, the debian tooling can be used exactly like its meant to.
>
> - As most isar-generated images will never regenerate the initramfs
> from the running system, all initramfs related packages are dead-weight
> to the image. This is a problem when trying to generate the initramfs
> from the actual image rootfs.
>
> When it is necessary to rebuild the initramfs in a running system,
> the packages designed for this new class could just be installed into
> the rootfs, without any changes necessary. This means, any generic
> initramfs module packages can be used both with the in-rootfs mechanism
> and initramfs.bbclass.
>
> - Because of this complete isolation and independence, implementation
> of complex logic is much easier: For example dm-verity needs
> a root-hash that is only available after the rootfs has been cast into
> a filesystem image. With this new approach, this can be modelled with
> a simple task dependency.
>
> meta/classes/initramfs.bbclass | 41 ++++++++++++++++++++++++++++++++++
> 1 file changed, 41 insertions(+)
> create mode 100644 meta/classes/initramfs.bbclass
>
> diff --git a/meta/classes/initramfs.bbclass b/meta/classes/initramfs.bbclass
> new file mode 100644
> index 000000000000..8af9b4b379a5
> --- /dev/null
> +++ b/meta/classes/initramfs.bbclass
> @@ -0,0 +1,41 @@
> +# This software is a part of ISAR.
> +
> +# Make workdir and stamps machine-specific without changing common PN target
> +WORKDIR = "${TMPDIR}/work/${DISTRO}-${DISTRO_ARCH}/${PN}-${MACHINE}/${PV}-${PR}"
> +STAMP = "${STAMPS_DIR}/${DISTRO}-${DISTRO_ARCH}/${PN}-${MACHINE}/${PV}-${PR}"
> +STAMPCLEAN = "${STAMPS_DIR}/${DISTRO}-${DISTRO_ARCH}/${PN}-${MACHINE}/*-*"
> +
> +INITRAMFS_INSTALL ?= ""
> +INITRAMFS_PREINSTALL ?= ""
> +INITRAMFS_ROOTFS ?= "${WORKDIR}/rootfs"
> +INITRAMFS_IMAGE_FILE = "${DEPLOY_DIR_IMAGE}/${INITRAMFS_FULLNAME}.initrd.img"
> +
> +# Install proper kernel
> +INITRAMFS_INSTALL += "${@ ("linux-image-" + d.getVar("KERNEL_NAME", True)) if d.getVar("KERNEL_NAME", True) else ""}"
> +
> +# Name of the initramfs including distro&machine names
> +INITRAMFS_FULLNAME = "${PN}-${DISTRO}-${MACHINE}"
> +
> +DEPENDS += "${INITRAMFS_INSTALL}"
> +
> +ROOTFSDIR = "${INITRAMFS_ROOTFS}"
> +ROOTFS_FEATURES = ""
> +ROOTFS_PACKAGES = "initramfs-tools ${INITRAMFS_PREINSTALL} ${INITRAMFS_INSTALL}"
> +
> +inherit rootfs
> +
> +do_generate_initramfs() {
> + rootfs_do_mounts
> + rootfs_do_qemu
> +
> + sudo -E chroot "${INITRAMFS_ROOTFS}" \
> + update-initramfs -u -v
> +
> + if [ ! -e "${INITRAMFS_ROOTFS}/initrd.img" ]; then
> + die "No initramfs was found after generation!"
> + fi
> +
> + rm -rf "${INITRAMFS_IMAGE_FILE}"
> + cp "${INITRAMFS_ROOTFS}/initrd.img" "${INITRAMFS_IMAGE_FILE}"
> +}
> +addtask generate_initramfs after do_rootfs before do_build
>
I think the public would also benefit from a use / test case, i.e. some
recipe that inherits this and generates an own initramfs with
extensions. For merging this, that will be mandatory anyway.
Quirin, what is your impression of this approach?
Jan
--
Siemens AG, Corporate Technology, CT RDA IOT SES-DE
Corporate Competence Center Embedded Linux
next prev parent reply other threads:[~2020-09-21 19:25 UTC|newest]
Thread overview: 19+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-09-21 10:42 Harald Seiler
2020-09-21 19:25 ` Jan Kiszka [this message]
2020-09-22 10:34 ` Harald Seiler
2020-09-22 11:04 ` Jan Kiszka
2020-09-22 12:10 ` Gylstorff Quirin
2020-09-22 12:18 ` Harald Seiler
2020-09-23 16:20 ` [PATCH v2 1/3] " Harald Seiler
2020-09-25 13:16 ` Henning Schild
2020-10-06 12:24 ` Harald Seiler
2020-09-23 16:20 ` [PATCH v2 2/3] Add example initramfs module recipe Harald Seiler
2020-09-23 16:20 ` [PATCH v2 3/3] Add custom isar-initramfs example Harald Seiler
2020-09-25 9:13 ` Jan Kiszka
2020-09-25 11:28 ` Harald Seiler
2020-10-13 15:11 ` Jan Kiszka
2021-01-14 10:11 ` [PATCH v3 1/3] classes: Add initramfs class Harald Seiler
2021-01-14 10:11 ` [PATCH v3 2/3] Add example initramfs module recipe Harald Seiler
2021-01-14 10:11 ` [PATCH v3 3/3] Add custom isar-initramfs example Harald Seiler
2021-01-18 9:11 ` [PATCH v3 1/3] classes: Add initramfs class florian.bezdeka
2021-01-18 10:00 ` Harald Seiler
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=433a8c30-796e-344f-35b7-0ce17a1fad7f@siemens.com \
--to=jan.kiszka@siemens.com \
--cc=hws@denx.de \
--cc=isar-users@googlegroups.com \
--cc=quirin.gylstorff@siemens.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox