From mboxrd@z Thu Jan 1 00:00:00 1970 X-GM-THRID: 6563188160178683904 X-Received: by 2002:adf:ea87:: with SMTP id s7-v6mr1616150wrm.5.1528133808748; Mon, 04 Jun 2018 10:36:48 -0700 (PDT) X-BeenThere: isar-users@googlegroups.com Received: by 2002:a1c:7202:: with SMTP id n2-v6ls163343wmc.10.canary-gmail; Mon, 04 Jun 2018 10:36:48 -0700 (PDT) X-Google-Smtp-Source: ADUXVKLU7agkF4z5DAITHDDTpCxQyRdv2KTQC+zV1h4JDkwWDR5+aIteDJIV1C1XgC7RuGIDIn6h X-Received: by 2002:a1c:32c1:: with SMTP id y184-v6mr1765938wmy.4.1528133808349; Mon, 04 Jun 2018 10:36:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1528133808; cv=none; d=google.com; s=arc-20160816; b=jyd5Yvb+JEuZk9jNM0ISLu0aPMzFBb3qKU321q6+FccsnY/O84bUiqqku3qsaNeUu7 IvNDOtVFG4xhFdH2IvCJlibsWeh+2jfN36jtO9mVvcfwRIVvC94o+NXh2A1grck0HQ+t JVdEacMdxEIbszCeXCrc/v8HpAoTYZauawvhW4wrZPGCCUhPKFUNf0162/90ORFm00yu 5Z7JKs8W1aHokgZku4maNc3zGhJojesF38d/wu6ry9LlRxOjHywYmZNfmEyCTPQ0W3Wg IGZZSMHQW4g+D6czcucCKiEwvT9PfZSoBdxSY8YMpPnYsC7Zj/j9hVUPSkVR7GhKJXN+ I2Zw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:subject:cc:to:from:date:arc-authentication-results; bh=tNGZE0l5ofnAqy4swUzDMBoXv6se2wBvbx/KqsWPX0U=; b=iPqGb4vSd2KwOqfP4rN4c/DeB+pFtL9tgldcQ6GcFb3xO8MIs8zd+9L6noPSsTpTJm uBgHyeYQJ5G7jjc0/NwCf5KJ/G7eWjryyENcUpqGuHW/Jj+9oGnGM66YUckvANBjyBYU 0ZMOz+g03Ks+nUL1FIl5npl/16qgq4JzfGcEDhbzm5zEaVcfcs/xlqBMYIGnkeGsmosl cANyZb9+czU90FwrtR4hSjWiINBBAmlxtTMEowyBX1S9k42iUqu5AX8wDgQAHGcVJxgH kBz1TLm2H6NcfF0jQQccdbF1qZRK1pJa4T9L0dBeP6p3JH4T/xlCRSePL+lnPbgOML6Z WcSA== ARC-Authentication-Results: i=1; gmr-mx.google.com; spf=pass (google.com: domain of henning.schild@siemens.com designates 192.35.17.2 as permitted sender) smtp.mailfrom=henning.schild@siemens.com Return-Path: Received: from thoth.sbs.de (thoth.sbs.de. [192.35.17.2]) by gmr-mx.google.com with ESMTPS id p17-v6si23080wmd.2.2018.06.04.10.36.48 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 04 Jun 2018 10:36:48 -0700 (PDT) Received-SPF: pass (google.com: domain of henning.schild@siemens.com designates 192.35.17.2 as permitted sender) client-ip=192.35.17.2; Authentication-Results: gmr-mx.google.com; spf=pass (google.com: domain of henning.schild@siemens.com designates 192.35.17.2 as permitted sender) smtp.mailfrom=henning.schild@siemens.com Received: from mail2.siemens.de (mail2.siemens.de [139.25.208.11]) by thoth.sbs.de (8.15.2/8.15.2) with ESMTPS id w54HalCl016360 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 4 Jun 2018 19:36:47 +0200 Received: from md1pvb1c.ad001.siemens.net (md1pvb1c.ad001.siemens.net [139.25.68.40]) by mail2.siemens.de (8.15.2/8.15.2) with ESMTP id w54HalHe025471; Mon, 4 Jun 2018 19:36:47 +0200 Date: Mon, 4 Jun 2018 19:36:46 +0200 From: Henning Schild To: "[ext] claudius.heine.ext@siemens.com" Cc: , Claudius Heine Subject: Re: [PATCH 0/1] Disable daemon activation Message-ID: <20180604193646.769f01ca@md1pvb1c.ad001.siemens.net> In-Reply-To: <20180604112159.18605-1-claudius.heine.ext@siemens.com> References: <20180604112159.18605-1-claudius.heine.ext@siemens.com> X-Mailer: Claws Mail 3.15.0-dirty (GTK+ 2.24.31; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-TUID: DblkdOnOzAuA Hi, this looks pretty nasty, and this is the "old" way of doing something like that. I would prefer adding some cgroup support to Isar to deal with that and other things. But if it works and did so in Debian for years ... why not. We could cgreate a temporary cgroup where we cgexec "sudo chroot", when that returns we destroy the cgroup and autokill everything running in there. This might also work for the umounts that we now still do explicit. I guess cgroups are a feature we can expect from a modern Linux build host, question is can we rely on the tools or should we create them manually. If you are building in docker you get what i described for "free". It takes care of cgroups and cleaning up after a finished build, but only once you end the container. Henning Am Mon, 4 Jun 2018 13:21:58 +0200 schrieb "[ext] claudius.heine.ext@siemens.com" : > From: Claudius Heine > > Hi, > > this patch disables the daemon activation in the chroot environment. > > Since I could not reproduce the problem this patch handles, please > test if this fixes it, if the code looks fine. > > Cheers, > Claudius > > Claudius Heine (1): > meta/isar-bootstrap: deactivate daemon activation in chroot > environment > > meta/classes/isar-bootstrap-helper.bbclass | 2 + > .../isar-bootstrap/files/chroot-setup.sh | 133 > ++++++++++++++++++ .../isar-bootstrap/isar-bootstrap.bb | > 11 +- 3 files changed, 144 insertions(+), 2 deletions(-) > create mode 100644 > meta/recipes-core/isar-bootstrap/files/chroot-setup.sh >