Re: Soft RAID and EFI systems

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Feb 4, 2014, at 1:57 AM, David Brown <david.brown@xxxxxxxxxxxx> wrote:
> The most important way to protect your FAT32 system is simply to avoid
> writing to it except when absolutely necessary.  If it is mounted
> read-only, and only updated when changing grub or updating the kernel,
> then just make sure you don't power-cycle your machine at that time.
> The smaller the critical window, the smaller the chances of problems.

I agree. I even question why most linux distros persistently mount the EFI System partition at /boot/efi for no apparently good reason. Windows and OS X do not keep the ESP mounted even read-only. It's pretty much never updated. If we're constantly updating the ESP for things like grub.cfg modifications, I think the implementation is flawed.

On EFI, grubx64.efi/core.img needs to look for grub.cfg /boot/grub2 not /boot/efi/EFI/fedora
https://bugzilla.redhat.com/show_bug.cgi?id=1048999



Chris Murphy

--
To unsubscribe from this list: send the line "unsubscribe linux-raid" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [Linux RAID Wiki]     [ATA RAID]     [Linux SCSI Target Infrastructure]     [Linux Block]     [Linux IDE]     [Linux SCSI]     [Linux Hams]     [Device Mapper]     [Device Mapper Cryptographics]     [Kernel]     [Linux Admin]     [Linux Net]     [GFS]     [RPM]     [git]     [Yosemite Forum]


  Powered by Linux