From mboxrd@z Thu Jan 1 00:00:00 1970 X-GM-THRID: 6449247988281769984 X-Received: by 10.46.83.29 with SMTP id h29mr1552822ljb.40.1501582560404; Tue, 01 Aug 2017 03:16:00 -0700 (PDT) X-BeenThere: isar-users@googlegroups.com Received: by 10.25.149.136 with SMTP id x130ls148666lfd.26.gmail; Tue, 01 Aug 2017 03:16:00 -0700 (PDT) X-Received: by 10.25.56.91 with SMTP id d27mr1835576lfj.7.1501582559750; Tue, 01 Aug 2017 03:15:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1501582559; cv=none; d=google.com; s=arc-20160816; b=VozXTxJ4OylLU0NL4zaC3YuiddSk0DjsWdrJpUE3ynYPZ25+1Ma0nPEqW/DTriFy8R SuR9bFlXFfMkk0vbXoCqyYl9KoJ95ajDkVYRYjzp1I3YxV4+NoUkDjL2OGmEzdpn9U3I wfCkI//gbr5zqbKT2wJ2Eq4A///VHDV6ipufiDn9OV0ZdiFKmIcZeV9hzEiMqigvZ33V aJp67SHN+vsAQ1+3ky1CofsijB7oyfn+pNBPJMVFtM17496X8P6GXXnRjW9Z6EwcOZrU qEDXFNpeeP2QEV1KyiI1nndVD0SXR91MQQfFoGqgyPGbRl8qstd8dVO77GCfMq5n+qH8 wDXg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=references:in-reply-to:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=CMHEWwSd826Y68hLMcpvhV/VoBviYSenrDUjqQWOvys=; b=XaUr+6Td3teLGLt8Ei5aZs4iv5SWTMdGQF0BDlB4YD0rxuC5vHzGQ0DXu50jbvIdJ2 HMskpX0OkCu4yOiIX9JOgpYyqUHL9FDHX02pniSrVXNNvLuezkvm6CM3Yf5igRlrLcCg VwWMAVh7qs9Fd6OONioHlxfvf6+xuQreYxzBcNRgPCgl51Fypw2iM2ptsDiysqhi8LZo K/EpczTRg7nu6+Ne17QSj3udn1Rv13hhVeHGe+vEeVeG8mLpmsdreJ8W6Nh6ZHF1FAKs B0aRUVDVOgnAkWPfCERs69q6BpalbgLcvqT7wuZb5vOpOi3+uCPdSYY02CCmlggae6SK FeGA== ARC-Authentication-Results: i=1; gmr-mx.google.com; spf=neutral (google.com: 192.35.17.2 is neither permitted nor denied by best guess record for domain of henning.schild@siemens.com) smtp.mailfrom=henning.schild@siemens.com Return-Path: Received: from thoth.sbs.de (thoth.sbs.de. [192.35.17.2]) by gmr-mx.google.com with ESMTPS id f204si66932wme.3.2017.08.01.03.15.59 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 01 Aug 2017 03:15:59 -0700 (PDT) Received-SPF: neutral (google.com: 192.35.17.2 is neither permitted nor denied by best guess record for domain of henning.schild@siemens.com) client-ip=192.35.17.2; Authentication-Results: gmr-mx.google.com; spf=neutral (google.com: 192.35.17.2 is neither permitted nor denied by best guess record for domain of henning.schild@siemens.com) smtp.mailfrom=henning.schild@siemens.com Received: from mail3.siemens.de (mail3.siemens.de [139.25.208.14]) by thoth.sbs.de (8.15.2/8.15.2) with ESMTPS id v71AFxoC026388 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for ; Tue, 1 Aug 2017 12:15:59 +0200 Received: from md1em3qc.ww002.siemens.net ([139.25.68.40]) by mail3.siemens.de (8.15.2/8.15.2) with ESMTP id v71AFx5u016179; Tue, 1 Aug 2017 12:15:59 +0200 From: Henning Schild To: isar-users@googlegroups.com Cc: Henning Schild Subject: [PATCH 01/16] meta: ext4-img: copy and keep attributes, always copy with sudo Date: Tue, 1 Aug 2017 12:17:19 +0200 Message-Id: <5e98880f61dba959ada0c9bc8feca65b0a5760e5.1501582237.git.henning.schild@siemens.com> X-Mailer: git-send-email 2.13.0 In-Reply-To: References: In-Reply-To: References: X-TUID: EaLZs6WsWClu Some security enhancing packages can cause our initrd to be not readable by a normal user. So we need to copy with sudo. Also regular cp would destroy ownership and other attributes of files, possibly creating problems in the future. Signed-off-by: Henning Schild --- meta/classes/ext4-img.bbclass | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/meta/classes/ext4-img.bbclass b/meta/classes/ext4-img.bbclass index 65d4c11..6dc2039 100644 --- a/meta/classes/ext4-img.bbclass +++ b/meta/classes/ext4-img.bbclass @@ -21,16 +21,16 @@ do_ext4_image() { mkdir -p ${WORKDIR}/mnt sudo mount -o loop ${EXT4_IMAGE_FILE} ${WORKDIR}/mnt - sudo cp -r ${S}/* ${WORKDIR}/mnt + sudo cp -a ${S}/* ${WORKDIR}/mnt sudo umount ${WORKDIR}/mnt rm -r ${WORKDIR}/mnt if [ -n "${KERNEL_IMAGE}" ]; then - cp ${S}/boot/${KERNEL_IMAGE} ${DEPLOY_DIR_IMAGE} + sudo cp -a ${S}/boot/${KERNEL_IMAGE} ${DEPLOY_DIR_IMAGE} fi if [ -n "${INITRD_IMAGE}" ]; then - cp ${S}/boot/${INITRD_IMAGE} ${DEPLOY_DIR_IMAGE} + sudo cp -a ${S}/boot/${INITRD_IMAGE} ${DEPLOY_DIR_IMAGE} fi } -- 2.13.0