public inbox for isar-users@googlegroups.com
 help / color / mirror / Atom feed
From: "vijaikumar....@gmail.com" <vijaikumar.kanagarajan@gmail.com>
To: isar-users <isar-users@googlegroups.com>
Subject: Re: [PATCH v2 10/10] meta-isar/canned-wks: Remove /boot mountpoint
Date: Sat, 5 Sep 2020 09:06:08 -0700 (PDT)	[thread overview]
Message-ID: <bfb4e59b-c6ed-4f12-aa23-bd9b00e1a7b6n@googlegroups.com> (raw)
In-Reply-To: <20200905105815.263d8c3e@md1za8fc.ad001.siemens.net>


[-- Attachment #1.1: Type: text/plain, Size: 7072 bytes --]



On Saturday, September 5, 2020 at 2:28:17 PM UTC+5:30 Henning Schild wrote:

> Hi, 
>
> i do not like this one at all. Suggesting people to hide the boot 
> partition from debian as hard as they can? If i understand it correctly. 
>

AFAIU , /boot mount-point[1] is wrong and is not needed without 
--exclude-path of /boot in rootfs partition. 
This optional mount-point serves only one purpose, i.e, to have an entry 
added in fstab or not by wic.
We were okay with saying this EFI/bootloader partition mount-point as 
/boot, since older wic
was not adding the /boot mount-point to fstab.
With this commit [2] in OE this is no longer the case.
/boot is added to fstab and at boot the system would try to mount to this 
efi partiton to /boot
directory which, if successful, will make the kernel, initrd and config 
files which were already available in /boot
of rootfs unavailable when the system is booted. I donot see --exclude-path 
for /boot in the wks file,
so this would just be wrong to have a mount-point like this. 

[1] 
https://github.com/ilbers/isar/blob/a0d6de4ac7dfb926b38cfcd44f2bc8852f2e43e3/meta-isar/scripts/lib/wic/canned-wks/sdimage-efi.wks#L5  
[2] https://github.com/openembedded/openembedded-core/commit/2376b05512ddb8c4ec3aaf1df11071f536a76bd9


> In fact the hiding is an issue that should be solved, debian should 
> know about that partition and use it correctly. 
>
> On EFI it only contains the bootloader, so such isar images will be 
> able to receive kernel updates with apt-get during their lifetime. They 
> will never be able to update the bootloader, but that might be ok. 
>
> On BIOS the story is different. These systems have the kernel in the 
> roots/boot only that kernel is never used for booting and the machines 
> will never be able to update the kernel they boot. 
>
> I always wanted to solve that but it was not too easy. The first idea 
> was just bootloader in the boot partition, like efi. But syslinux can 
> not boot files from other partitions, so we need the kernel and initrd 
> there. 
> But now with the exclude feature it might be easier. Place the 
> bootloader and config into rootfs/boot and point to the kernel initrd 
> symlinks in the config. (Done in our custom BIOS plugin) 
> And now take rootfs/boot as boot, excluding it from rootfs.


Can you point me to some code where these kind of scenarios are? I assume
these are all downstream? For downstream you could customize the wks
with neccessary /boot as mountpoint for EFI and "--exclude-path /boot" to 
achieve
what you want. I donot see the issue in removing it here.


>
> Henning 
>
> On Thu, 3 Sep 2020 00:32:47 +0530 
> Vijai Kumar K <Vijaikumar_...@mentor.com> wrote: 
>
> > In the older version of wic, the fstab entry for /boot mountpoint 
> > was skipped. 
> > However in the latest wic this is not the case. Adding a /boot 
> > mountpoint in part results in creating a fstab entry for automount. 
> > Remove it to avoid the unwanted mount which makes original contents 
> > unavailable in debian rootfilesystem. 
> > 
> > Signed-off-by: Vijai Kumar K <Vijaikumar_...@mentor.com> 
> > --- 
> > RECIPE-API-CHANGELOG.md | 17 
> > +++++++++++++++++ .../lib/wic/canned-wks/common-isar.wks.inc | 
> > 2 +- meta-isar/scripts/lib/wic/canned-wks/hikey.wks | 2 +- 
> > .../scripts/lib/wic/canned-wks/sdimage-efi.wks | 2 +- 
> > 4 files changed, 20 insertions(+), 3 deletions(-) 
> > 
> > diff --git a/RECIPE-API-CHANGELOG.md b/RECIPE-API-CHANGELOG.md 
> > index 1839770..070cde3 100644 
> > --- a/RECIPE-API-CHANGELOG.md 
> > +++ b/RECIPE-API-CHANGELOG.md 
> > @@ -246,3 +246,20 @@ by setting DEBIAN_BUILD_DEPENDS. 
> > 
> > ${S} can now be used for checking out sources without being linked 
> > implicitly with ${D} which needs to be filled explicitly in 
> > do_install as before. + 
> > +### Wic adds /boot mountpoint to fstab 
> > + 
> > +With the latest wic, /boot mount point, if any, is added to 
> > /etc/fstab. Debian +uses /boot to store the kernel and initrd images. 
> > If an image's wks file +specifies /boot mountpoint for boot 
> > partitions like EFI, the image may fail to +boot or might make the 
> > original contents of /boot unavailable after boot. +All unwanted 
> > /boot mountpoints should be removed. + 
>

Maybe I can add a bit more to
this sentence to make it clear, something like unless you know what you are 
doing.
I could add the rest of the wks entry below to highlight that /boot is not 
excluded in the first place.
 

> > +Below is an example wks entry that might cause an issue. 

> +``` 
> > +part /boot --source bootimg-efi-isar --sourceparams 
> > "loader=grub-efi" --ondisk sda --label efi --part-type EF00 --align 
> > 1024 +``` +Drop the /boot entry to avoid issues. 
> > +``` 
> > +part --source bootimg-efi-isar --sourceparams "loader=grub-efi" 
> > --ondisk sda --label efi --part-type EF00 --align 1024 +``` 
> > diff --git a/meta-isar/scripts/lib/wic/canned-wks/common-isar.wks.inc 
> > b/meta-isar/scripts/lib/wic/canned-wks/common-isar.wks.inc index 
> > c8ea4c2..e7dabd4 100644 --- 
> > a/meta-isar/scripts/lib/wic/canned-wks/common-isar.wks.inc +++ 
> > b/meta-isar/scripts/lib/wic/canned-wks/common-isar.wks.inc @@ -1,3 
> > +1,3 @@ # This file is included into 3 canned wks files from this 
> > directory -part /boot --source bootimg-pcbios-isar --ondisk sda 
> > --label boot --active --align 1024 +part --source bootimg-pcbios-isar 
> > --ondisk sda --label boot --active --align 1024 part / --source 
> > rootfs --ondisk sda --fstype=ext4 --label platform --align 1024 diff 
> > --git a/meta-isar/scripts/lib/wic/canned-wks/hikey.wks 
> > b/meta-isar/scripts/lib/wic/canned-wks/hikey.wks index 
> > 1e82f8c..840858e 100644 --- 
> > a/meta-isar/scripts/lib/wic/canned-wks/hikey.wks +++ 
> > b/meta-isar/scripts/lib/wic/canned-wks/hikey.wks @@ -3,7 +3,7 @@ # 
> > # SPDX-License-Identifier: MIT 
> > 
> > -part /boot --source bootimg-efi-isar --sourceparams 
> > "loader=grub-efi" --ondisk mmcblk1 --label efi --part-type EF00 
> > --align 1024 +part --source bootimg-efi-isar --sourceparams 
> > "loader=grub-efi" --ondisk mmcblk1 --label efi --part-type EF00 
> > --align 1024 part / --source rootfs --ondisk mmcblk1 --fstype ext4 
> > --label platform --align 1024 --use-uuid diff --git 
> > a/meta-isar/scripts/lib/wic/canned-wks/sdimage-efi.wks 
> > b/meta-isar/scripts/lib/wic/canned-wks/sdimage-efi.wks index 
> > 2afa016..e0fa7a1 100644 --- 
> > a/meta-isar/scripts/lib/wic/canned-wks/sdimage-efi.wks +++ 
> > b/meta-isar/scripts/lib/wic/canned-wks/sdimage-efi.wks @@ -2,7 +2,7 
> > @@ # long-description: Creates a partitioned EFI disk image without 
> > any swap that # the user can directly dd to boot media. 
> > -part /boot --source bootimg-efi-isar --sourceparams 
> > "loader=grub-efi" --ondisk sda --label efi --part-type EF00 --align 
> > 1024 +part --source bootimg-efi-isar --sourceparams "loader=grub-efi" 
> > --ondisk sda --label efi --part-type EF00 --align 1024 part / 
> > --source rootfs --ondisk sda --fstype ext4 --label platform --align 
> > 1024 --use-uuid 
>
>

[-- Attachment #1.2: Type: text/html, Size: 8745 bytes --]

  reply	other threads:[~2020-09-05 16:06 UTC|newest]

Thread overview: 29+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-09-02 18:56 [PATCH v2 00/10] WIC update Vijai Kumar K
2020-09-02 18:56 ` [PATCH v2 01/10] wic: Update to the latest wic from openembedded core Vijai Kumar K
2020-09-05  9:00   ` Henning Schild
2020-09-05  9:21     ` vijai kumar
2020-09-02 18:56 ` [PATCH v2 02/10] wic/plugins: Fix wic plugins to work with the latest wic Vijai Kumar K
2020-09-02 18:56 ` [PATCH v2 03/10] wic-img: Satisfy the quirks of " Vijai Kumar K
2020-09-05  8:30   ` Henning Schild
2020-09-05 16:24     ` vijaikumar....@gmail.com
2020-09-09 14:52       ` Henning Schild
2020-09-02 18:56 ` [PATCH v2 04/10] oe.path: Add copyhardlink() helper function Vijai Kumar K
2020-09-02 18:56 ` [PATCH v2 05/10] lib/oe/path: try hardlinking instead of guessing when it might fail Vijai Kumar K
2020-09-02 18:56 ` [PATCH v2 06/10] wic_fakeroot: Handle standalone pseudo invocations Vijai Kumar K
2020-09-05  8:38   ` Henning Schild
2020-09-05 15:19     ` vijaikumar....@gmail.com
2020-09-05  9:19   ` Henning Schild
2020-09-05 15:22     ` vijaikumar....@gmail.com
2020-09-02 18:56 ` [PATCH v2 07/10] meta-isar/conf: Add provision to debug WIC Vijai Kumar K
2020-09-02 18:56 ` [PATCH v2 08/10] debian-common: Add tar as a dependency for wic Vijai Kumar K
2020-09-02 19:02   ` [PATCH v2 09/10] wic: misc: Add /bin to the list of searchpaths Vijai Kumar K
2020-09-02 19:02     ` [PATCH v2 10/10] meta-isar/canned-wks: Remove /boot mountpoint Vijai Kumar K
2020-09-05  8:58       ` Henning Schild
2020-09-05 16:06         ` vijaikumar....@gmail.com [this message]
2020-09-09 15:09           ` Henning Schild
2020-09-14  5:32             ` vijaikumar....@gmail.com
2020-09-05  8:45     ` [PATCH v2 09/10] wic: misc: Add /bin to the list of searchpaths Henning Schild
2020-09-05  9:33       ` vijai kumar
2020-09-03  5:46 ` [PATCH v2 00/10] WIC update vijaikumar....@gmail.com
2020-09-05  9:04   ` Henning Schild
2020-09-05  9:25     ` vijai kumar

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=bfb4e59b-c6ed-4f12-aa23-bd9b00e1a7b6n@googlegroups.com \
    --to=vijaikumar.kanagarajan@gmail.com \
    --cc=isar-users@googlegroups.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox