public inbox for isar-users@googlegroups.com
 help / color / mirror / Atom feed
From: "'Badrikesh Prusty' via isar-users" <isar-users@googlegroups.com>
To: isar-users <isar-users@googlegroups.com>
Subject: Re: [PATCH v3 0/1] image-postproc: ignore systemd preset failures
Date: Sun, 26 Apr 2026 21:18:33 -0700 (PDT)	[thread overview]
Message-ID: <a5997ec4-bc73-4772-80f3-3713a9c788ebn@googlegroups.com> (raw)
In-Reply-To: <cc816d1921dae6691dd414ea9f48a06c28148fd6.camel@siemens.com>


[-- Attachment #1.1: Type: text/plain, Size: 6003 bytes --]

Hi,

Apologies for the delayed response.
It looks like /proc and /sys are already mounted during the beginng of the 
do_rootfs_postprocess task via rootfs_do_mounts function. Shell function 
run order:
```
$ grep "DEBUG: Shell" temp/log.do_rootfs_postprocess
DEBUG: Shell function rootfs_do_mounts finished
DEBUG: Shell function rootfs_do_qemu finished
DEBUG: Shell function image_postprocess_disable_systemd_firstboot finished
DEBUG: Shell function image_postprocess_sshd_key_regen finished
DEBUG: Shell function image_postprocess_machine_id finished
DEBUG: Shell function image_postprocess_mark finished
DEBUG: Shell function image_postprocess_configure finished
DEBUG: Shell function generate_sbom finished
DEBUG: Shell function rootfs_postprocess_clean_package_cache finished
DEBUG: Shell function rootfs_postprocess_clean_log_files finished
DEBUG: Shell function rootfs_postprocess_clean_debconf_cache finished
DEBUG: Shell function rootfs_postprocess_clean_pycache finished
DEBUG: Shell function rootfs_postprocess_clean_ldconfig_cache finished
DEBUG: Shell function rootfs_postprocess_clean_tmp finished
DEBUG: Shell function rootfs_generate_manifest finished
DEBUG: Shell function rootfs_export_dpkg_status finished
DEBUG: Shell function rootfs_cleanup_isar_apt finished
DEBUG: Shell function image_postprocess_populate_systemd_preset finished
DEBUG: Shell function image_disable_systemd_networkd finished
DEBUG: Shell function rootfs_do_umounts finished
``` 

Added "ls -l" to list the rootfs directories after do_mounts: (/proc and 
/sys mounted)

```
lrwxrwxrwx   1 root       root          7 Mar  2 21:50 bin -> usr/bin
drwxr-xr-x   2 root       root       4.0K Apr 23 06:28 boot
-rwxr-xr-x   1 root       root       3.5K Apr 21 11:05 chroot-setup.sh
drwxr-xr-x  15 root       root       3.4K Apr 23 06:27 dev
drwxr-xr-x  58 root       root       4.0K Apr 23 06:28 etc
drwxr-xr-x   3 root       root       4.0K Apr 23 06:28 home
lrwxrwxrwx   1 root       root         29 Apr 23 06:28 initrd.img -> 
boot/initrd.img-6.12.78-cip19
lrwxrwxrwx   1 root       root         29 Apr 23 06:28 initrd.img.old -> 
boot/initrd.img-6.12.78-cip19
drwxr-xr-x   5 industrial industrial 4.0K Apr 21 11:05 isar-apt
drwxr-xr-x  11 industrial industrial 4.0K Apr 23 06:28 isar-work
lrwxrwxrwx   1 root       root          7 Mar  2 21:50 lib -> usr/lib
lrwxrwxrwx   1 root       root          9 Mar  2 21:50 lib64 -> usr/lib64
drwxr-xr-x   2 root       root       4.0K Apr 21 11:05 media
drwxr-xr-x   2 root       root       4.0K Apr 21 11:05 mnt
drwxr-xr-x   3 root       root       4.0K Apr 23 06:28 opt
dr-xr-xr-x 813 root       root          0 Apr 23 06:28 proc
drwx------   3 root       root       4.0K Apr 23 06:28 root
drwxr-xr-x   9 root       root       4.0K Apr 23 06:28 run
lrwxrwxrwx   1 root       root          8 Mar  2 21:50 sbin -> usr/sbin
drwxr-xr-x   2 root       root       4.0K Apr 21 11:05 srv
drwxr-xr-x  13 root       root          0 Mar  2 21:50 sys
drwxrwxrwt   2 root       root       4.0K Apr 23 06:28 tmp
drwxr-xr-x  12 root       root       4.0K Apr 21 11:05 usr
drwxr-xr-x  11 root       root       4.0K Apr 21 11:05 var
lrwxrwxrwx   1 root       root         26 Apr 23 06:28 vmlinuz -> 
boot/vmlinuz-6.12.78-cip19
lrwxrwxrwx   1 root       root         26 Apr 23 06:28 vmlinuz.old -> 
boot/vmlinuz-6.12.78-cip19
```

Will send a v4 patch with a “Fixes” tag. That should unblock builds for 
Bookworm or earlier that mask the systemd service.

Many Thanks,
Badrikesh

On Friday, February 20, 2026 at 1:51:04 PM UTC+5:30 MOESSBAUER, Felix wrote:

> On Thu, 2026-02-19 at 20:10 +0100, Jan Kiszka wrote:
> > On 19.02.26 18:52, Jan Kiszka wrote:
> > > On 19.02.26 05:44, 'Badrikesh Prusty' via isar-users wrote:
> > > > changes in v3:
> > > > * Do not disable pre-population of enabled systemd services during 
> build,
> > > > as this is the correct default behavior. Downstream layers can 
> disable
> > > > it if needed.
> > > > * Ignore failures from systemd preset only.
> > > > 
> > > > changes in v2:
> > > > * Disable populate-systemd-preset at build time by default due to 
> service
> > > > failures observed on some systems.
> > > > 
> > > > Badrikesh Prusty (1):
> > > > image-postproc: ignore systemd preset failures
> > > > 
> > > > meta/classes-recipe/rootfs.bbclass | 2 +-
> > > > 1 file changed, 1 insertion(+), 1 deletion(-)
> > > > 
> > > 
> > > Is this series aiming at these new warnings of Isar?
> > > 
> > > DEBUG: Executing shell function 
> image_postprocess_disable_systemd_firstboot
> > > /proc/ is not mounted. This is not a supported mode of operation. 
> Please fix
> > > your invocation environment to mount /proc/ and /sys/ properly. 
> Proceeding anyway.
> > > Your mileage may vary.
> > > Created symlink '/etc/systemd/system/systemd-firstboot.service' → 
> '/dev/null'.
> > > WARNING: Your image is not configured completely according to 
> systemd-firstboot.
> > > WARNING: It prompted: ""
> > > DEBUG: Shell function image_postprocess_disable_systemd_firstboot 
> finished
> > > 
> > 
> > Hmm, no. This seems to be another to-do for Felix' rootless patches. I
> > was running them, and this warning is gone when going back to vanilla 
> Isar.
>
> Good catch. We need /proc and /sys mounted, which we currently not do
> in this task.
>
> Felix
>
> > 
> > Jan
> > 
> > -- 
> > Siemens AG, Foundational Technologies
> > Linux Expert Center
>
> -- 
> Siemens AG
> Linux Expert Center
> Friedrich-Ludwig-Bauer-Str. 3
> 85748 Garching, Germany
>
>

-- 
You received this message because you are subscribed to the Google Groups "isar-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to isar-users+unsubscribe@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/isar-users/a5997ec4-bc73-4772-80f3-3713a9c788ebn%40googlegroups.com.

[-- Attachment #1.2: Type: text/html, Size: 7414 bytes --]

      reply	other threads:[~2026-04-27  4:18 UTC|newest]

Thread overview: 8+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-02-19  4:44 'Badrikesh Prusty' via isar-users
2026-02-19  4:44 ` [PATCH v3 1/1] " 'Badrikesh Prusty' via isar-users
2026-02-19 13:36   ` 'MOESSBAUER, Felix' via isar-users
2026-02-19 15:26     ` 'Prusty, Badrikesh' via isar-users
2026-02-19 17:52 ` [PATCH v3 0/1] " 'Jan Kiszka' via isar-users
2026-02-19 19:10   ` 'Jan Kiszka' via isar-users
2026-02-20  8:20     ` 'MOESSBAUER, Felix' via isar-users
2026-04-27  4:18       ` 'Badrikesh Prusty' via isar-users [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=a5997ec4-bc73-4772-80f3-3713a9c788ebn@googlegroups.com \
    --to=isar-users@googlegroups.com \
    --cc=badrikesh.prusty@siemens.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox