From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mp11.migadu.com ([2001:41d0:403:58f0::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by ms8.migadu.com with LMTPS id aFRaL54/QWWGNQAA9RJhRA:P1 (envelope-from ) for ; Tue, 31 Oct 2023 18:55:42 +0100 Received: from aspmx1.migadu.com ([2001:41d0:403:58f0::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by mp11.migadu.com with LMTPS id aFRaL54/QWWGNQAA9RJhRA (envelope-from ) for ; Tue, 31 Oct 2023 18:55:42 +0100 Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by aspmx1.migadu.com (Postfix) with ESMTPS id 5032957CBF for ; Tue, 31 Oct 2023 18:55:42 +0100 (CET) Authentication-Results: aspmx1.migadu.com; dkim=fail ("headers rsa verify failed") header.d=gmail.com header.s=20230601 header.b="U81cTO/L"; dmarc=fail reason="SPF not aligned (relaxed)" header.from=gmail.com (policy=none); spf=pass (aspmx1.migadu.com: domain of "guix-patches-bounces+larch=yhetil.org@gnu.org" designates 209.51.188.17 as permitted sender) smtp.mailfrom="guix-patches-bounces+larch=yhetil.org@gnu.org" ARC-Seal: i=1; s=key1; d=yhetil.org; t=1698774942; a=rsa-sha256; cv=none; b=iLvutLrYzo7iHQSCSq/rulCVVHdVT3Ib0c2/EjDeo938Tpb1f2Jv9D5VSZUbHp1tQlCaKF YicxrBZZdduV5L0QADNV94SBJlmdUq6mwtk2R/Y6g8C/NqVVk4TTpxjIsv242a7jwbBepv lnpJbVrr5Zt3xxZBudGoUj5xfNaTRuRFByX+qVVfgU0/ngJ+7NqvjT2kbZNkRGqZVsw/d6 Yl0LTthAgexQIIeRywGZALBjh8QhFfhZNUdUoSRhYBLCcTD7+3Vjn9ohN/pqa6XNGdnRKo W4qgH9WqSGK6KfTSxAkkTgAzeNuMiz4sVVZpPkesQ1HlFek9pwQQSSTpz6qIdA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=yhetil.org; s=key1; t=1698774942; h=from:from:sender:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:resent-cc:resent-from:resent-sender: resent-message-id:in-reply-to:in-reply-to:references:references: list-id:list-help:list-unsubscribe:list-subscribe:list-post: dkim-signature; bh=eKvq+OPBf4SD6PmILbYCaOyQSpbW6NkEOSWKNjYeU00=; b=YFT9I3z+x/ibW+OEuJtdl2gTf7MJBGuGPoxsXkYIP/4jGzKwRmUri42FsB8sJzCmDgx2bJ QiYqkxEdFT4AW53TbnPblZ7Jhkd8vLYHqpIGnRZ9mkeSHHSxcW08e6MmFyn1QMwC8R2gj5 OlyIAzNh+o6r+rLkfsOw67nu+MTMCE4+I2bhluPzYaTNejf2rgXUj+xzuBM/qxL8Sp75CN cDW+JLOD1hm+efZ/C86OVoytNGiJ6hPwrhBPa3Tc228FHD7wiHhf3RFFZVDcMnjRXF8kFU 8NKBMjA5pjEcK6eEOdWoWkUyGNaQtk/r2j5/Vpov6VYuG2rL/ZsTUhtszg/0yg== ARC-Authentication-Results: i=1; aspmx1.migadu.com; dkim=fail ("headers rsa verify failed") header.d=gmail.com header.s=20230601 header.b="U81cTO/L"; dmarc=fail reason="SPF not aligned (relaxed)" header.from=gmail.com (policy=none); spf=pass (aspmx1.migadu.com: domain of "guix-patches-bounces+larch=yhetil.org@gnu.org" designates 209.51.188.17 as permitted sender) smtp.mailfrom="guix-patches-bounces+larch=yhetil.org@gnu.org" Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1qxsxe-00089O-Pi; Tue, 31 Oct 2023 13:55:30 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1qxsxd-000891-0P for guix-patches@gnu.org; Tue, 31 Oct 2023 13:55:29 -0400 Received: from debbugs.gnu.org ([2001:470:142:5::43]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1qxsxc-0002w8-OV for guix-patches@gnu.org; Tue, 31 Oct 2023 13:55:28 -0400 Received: from Debian-debbugs by debbugs.gnu.org with local (Exim 4.84_2) (envelope-from ) id 1qxsyA-0006Dx-DM for guix-patches@gnu.org; Tue, 31 Oct 2023 13:56:02 -0400 X-Loop: help-debbugs@gnu.org Subject: [bug#66560] [DOCUMENTATION] doc: Include steps for mounting EFI partitions. Resent-From: Maxim Cournoyer Original-Sender: "Debbugs-submit" Resent-CC: guix-patches@gnu.org Resent-Date: Tue, 31 Oct 2023 17:56:02 +0000 Resent-Message-ID: Resent-Sender: help-debbugs@gnu.org X-GNU-PR-Message: followup 66560 X-GNU-PR-Package: guix-patches X-GNU-PR-Keywords: To: Christina O'Donnell Cc: 66560@debbugs.gnu.org, Ludovic =?UTF-8?Q?Court=C3=A8s?= Received: via spool by 66560-submit@debbugs.gnu.org id=B66560.169877491623854 (code B ref 66560); Tue, 31 Oct 2023 17:56:02 +0000 Received: (at 66560) by debbugs.gnu.org; 31 Oct 2023 17:55:16 +0000 Received: from localhost ([127.0.0.1]:49123 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1qxsxM-0006Cb-JV for submit@debbugs.gnu.org; Tue, 31 Oct 2023 13:55:16 -0400 Received: from mail-vk1-xa32.google.com ([2607:f8b0:4864:20::a32]:46161) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1qxsxH-0006C9-EQ for 66560@debbugs.gnu.org; Tue, 31 Oct 2023 13:55:11 -0400 Received: by mail-vk1-xa32.google.com with SMTP id 71dfb90a1353d-49d39f07066so2489135e0c.0 for <66560@debbugs.gnu.org>; Tue, 31 Oct 2023 10:54:33 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1698774868; x=1699379668; darn=debbugs.gnu.org; h=mime-version:user-agent:message-id:date:references:in-reply-to :subject:cc:to:from:from:to:cc:subject:date:message-id:reply-to; bh=eKvq+OPBf4SD6PmILbYCaOyQSpbW6NkEOSWKNjYeU00=; b=U81cTO/LBv5b0CUkJZa9Zt0UHd5kHsGCCdm5xBjU9HEmMz76yB3loIi2+gSNoG9IL2 wl+15GOAGH+kqYTm9BYnaJ3NgG0Dh6z6KsygypWDSnAfvqDMx6xCKxjrHPsgmAHC7HKd /rahLQ0znxrQeQ6jJAifDbclvxftFRE1pV85Nx1D5MELWj5fyKz2tIcZOSDoPehiUegq zl3uUgKFXY8oGV9UyxFfFOmO81jd0mu6STuxzaLRZTHrLbOd75Sx14/ohxKtK2hCt3ea 3wBH8O4MTHtO6JlsUul7h5Xt6DZXe7AI8QOBy34olufJQTY4wHEQq6cLy/U4SgU6uqUR OrKg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1698774868; x=1699379668; h=mime-version:user-agent:message-id:date:references:in-reply-to :subject:cc:to:from:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=eKvq+OPBf4SD6PmILbYCaOyQSpbW6NkEOSWKNjYeU00=; b=UkBn92vIrlfvyeqhHJRhYE/0xXBkjK8kkaBXownSoXRgge5hQNOgTZVHdV6EAjM0SD B5ddSt5iLlEB2M/K98fwg8HuoGCFXoa7GM08elOyHnchsu8N91eCdPS+PG836Fsjw/ay 4BHDTJQhoTTd5Ft5vC6jpB/1GddVuGK+zTTxb/pa9lydM+ZMdKDMTZ8knp8f/D+wmtCu WxnjaZu7QkjnMvZGl7zwErOD/C0t2VSAmT7bteeKgyiucnQC00R8biEkIybjihzVWFqu dILPOy0ENyA4+qc+0Fg8vgMv8uDO/iSpdig/7vE5YlNfP6vFn9kJ0oXetnm0G6S3CMqv CfEQ== X-Gm-Message-State: AOJu0Yw8fe3S0COoYgKiFzCWHQ7ZuVOFsZwi0evW+k9AC1au9JtTzocO skxJYXZmMlEQfPCJvsqNGzc= X-Google-Smtp-Source: AGHT+IGbUfNAYPEQsDXMEoX5YcTafg41LEMIFckqTLIxMRWYvS4NNTc3JIT97p5HWHyej/lkPrfwHw== X-Received: by 2002:a1f:2a93:0:b0:48d:2bcf:f959 with SMTP id q141-20020a1f2a93000000b0048d2bcff959mr10309029vkq.3.1698774867816; Tue, 31 Oct 2023 10:54:27 -0700 (PDT) Received: from hurd (dsl-10-128-239.b2b2c.ca. [72.10.128.239]) by smtp.gmail.com with ESMTPSA id cs3-20020ad44c43000000b0066d15724feesm717303qvb.68.2023.10.31.10.54.27 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 31 Oct 2023 10:54:27 -0700 (PDT) From: Maxim Cournoyer In-Reply-To: <655dcf80f8770bd887d5c5305335d880cef7fec5.1697371222.git.cdo@mutix.org> (Christina O'Donnell's message of "Sun, 15 Oct 2023 13:00:24 +0100") References: <655dcf80f8770bd887d5c5305335d880cef7fec5.1697371222.git.cdo@mutix.org> Date: Tue, 31 Oct 2023 13:54:26 -0400 Message-ID: <87y1fiptil.fsf@gmail.com> User-Agent: Gnus/5.13 (Gnus v5.13) MIME-Version: 1.0 Content-Type: text/plain X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list X-BeenThere: guix-patches@gnu.org List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: guix-patches-bounces+larch=yhetil.org@gnu.org Sender: guix-patches-bounces+larch=yhetil.org@gnu.org X-Migadu-Flow: FLOW_IN X-Migadu-Country: US X-Migadu-Scanner: mx11.migadu.com X-Spam-Score: 2.89 X-Migadu-Queue-Id: 5032957CBF X-Migadu-Spam-Score: 2.89 X-TUID: uvXnVRsMNuc4 Hi! Thanks for attempting to improve the documentation! Christina O'Donnell writes: > This patch ammends the Chrooting section of the Guix manual to help EFI users > who have misconfigured their bootloader. This was neccessary for me after the > first couple botched installation attempts. > > * doc/guix.texi (Chrooting into an existing system): Add missing mounts for > repairing broken EFI partitions. > --- > doc/guix.texi | 32 ++++++++++++++++++++++++++++++-- > 1 file changed, 30 insertions(+), 2 deletions(-) > > diff --git a/doc/guix.texi b/doc/guix.texi > index 3517c95251..72909fc0cb 100644 > --- a/doc/guix.texi > +++ b/doc/guix.texi > @@ -3046,8 +3046,36 @@ Chrooting into an existing system > mount --rbind /dev /mnt/dev > @end example > > -If your system is EFI-based, you must also mount the ESP partition. > -Assuming it is @file{/dev/sda1}, you can do so with: > +@item > +There are a few more steps for those who are on EFI-based systems. If > +you're using another bootloader method then you may safely skip these. > +They are adapted from @url{https://wiki.debian.org/GrubEFIReinstall, a > +page on the Debian Wiki}. It seems odd to use an item entry like the above; I'd use nested enumeration at that point instead. > +@item > +Verify that you are booting in from UEFI by checking that > +@file{/sys/firmware/efi} isn't empty. If you look at the latest manual, this should not be empty since mount --rbind is used (the 'r' in the name is for recursive) for the whole /sys directory: mount --rbind /proc /mnt/proc mount --rbind /sys /mnt/sys mount --rbind /dev /mnt/dev > +@item > +If the directory @file{/sys/firmware/efi/efivars} is empty, you need to > +boot the rescue system including the kernel option "efi=runtime" and > +mount the EFI variables before proceeding: > + > +@example sh > +mount -t efivarfs none /sys/firmware/efi/efivars > +@end example Maybe the only information missing here is the "if empty, run with "efi=runtime" bit? Also note that the latest version of the manually mentions using Guix System rather than another live rescue image, so perhaps it just wouldn't happen then? It seems we assume that /sys/firmware/efi exists for UEFI systems in the documentation elswehere, without having to mention that "efi=runtime" bit, so I'm inclined to think it's not necessary for Guix System. > +@item > +If your bootloader installation failed, you may need to bind > +@file{efivars} between the two systems. > + > +@example sh > +mount --bind /sys/firmware/efi/efivars /mnt/sys/firmware/efi/efivars > +@end example This should be covered by the --rbind, asusming the host contains /sys/firmware/efi/efivars. So I think we don't need to change anything to the manual. If the "efi=runtime" advice is truly useful even on Guix System, we could mention it like so: --8<---------------cut here---------------start------------->8--- modified doc/guix.texi @@ -43075,6 +43075,11 @@ Chrooting into an existing system mount /dev/sda1 /mnt/boot/efi @end example +If using an EFI-based system, also make sure that the directory +@file{/sys/firmware/efi/efivars} is @emph{not} empty. If it is empty, +you will need to reboot your rescue system with the kernel option +@option{efi=runtime} and redo the steps from the beginning. + @item Enter your system via chroot: --8<---------------cut here---------------end--------------->8--- -- Thanks, Maxim