From mboxrd@z Thu Jan 1 00:00:00 1970 X-GM-THRID: 6563188160178683904 X-Received: by 2002:a19:cc41:: with SMTP id c62-v6mr669486lfg.24.1528135360403; Mon, 04 Jun 2018 11:02:40 -0700 (PDT) X-BeenThere: isar-users@googlegroups.com Received: by 2002:a19:f501:: with SMTP id j1-v6ls1798842lfb.16.gmail; Mon, 04 Jun 2018 11:02:39 -0700 (PDT) X-Google-Smtp-Source: ADUXVKLUnG/vui+rAgg9672vukiLxjWYuF4+Q3b4cxWW5TrxL0BgKNQZUfBNAlkBLVu+vsrjtGXr X-Received: by 2002:a19:ec06:: with SMTP id b6-v6mr943838lfa.5.1528135359946; Mon, 04 Jun 2018 11:02:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1528135359; cv=none; d=google.com; s=arc-20160816; b=zH2gnadg7thCpWQlFqA7szjuYuY0ilISXt/yRjwRUWBFOYFWTe5BDVqpiMFXcthE3k V+MicDaZY6AeHOG+xqAoy29muiwfWlp/Eqg+SVeBw/jccisYDkYS+30j2ITwLq6Fa+vT JdUzp44D6xbiExEMBXBLeqK4eTkOnYmRqgwU4yoRHAUxpBUasskZ9SuyxCM6/Ofg//lW KmcBARljPgNSBPcPrfeEdfeOf4t3dVmDKwvmackzn+H6KX9dCfVjmjvLibczxtc4M3si 8rxyTx7X5PBzNExXhpPiT5C2YFigQ1sYwJrknk3K5ZPVoLZ90R37Fv/MRpCtWqyK9DSz P62A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:subject:cc:to:from:date:arc-authentication-results; bh=mA9ZbQMQZUkjS50OQDH4KznuJyUfpIc29+grMhxtdBA=; b=uNGze6dlD0m047pmGCN9F2MpmHECr5cRR9Rrq3LUp9yVzqIcTr/rCo0AD+/tv6omBW nwo6F/zAA+3jjD9TaTxvYwMUnoFisLuHtk6amtA2drxR0vVlAznUAJV/yQJHKnpmuoBI TgJdpyWsn6xQr26Wz7wBOvNyj3vrmJ/S0MYdJyGUR2kz6TzI59zbvdewHIVnmZma8m/+ igNn0WUIkUCzLC3tNewrcXJkqoGiSlNY/UKIqge3G24iXTRnohRw4ctvx7gq3Co1aVmk 0prvTv1BDU08NdoFkGvjs1+adj7Yiv9vtBUaOw92MgFYlQKikK+FaiubOzvWOVfhR2f7 Y43A== ARC-Authentication-Results: i=1; gmr-mx.google.com; spf=pass (google.com: domain of henning.schild@siemens.com designates 192.35.17.2 as permitted sender) smtp.mailfrom=henning.schild@siemens.com Return-Path: Received: from thoth.sbs.de (thoth.sbs.de. [192.35.17.2]) by gmr-mx.google.com with ESMTPS id v11-v6si137879ljg.4.2018.06.04.11.02.39 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 04 Jun 2018 11:02:39 -0700 (PDT) Received-SPF: pass (google.com: domain of henning.schild@siemens.com designates 192.35.17.2 as permitted sender) client-ip=192.35.17.2; Authentication-Results: gmr-mx.google.com; spf=pass (google.com: domain of henning.schild@siemens.com designates 192.35.17.2 as permitted sender) smtp.mailfrom=henning.schild@siemens.com Received: from mail1.siemens.de (mail1.siemens.de [139.23.33.14]) by thoth.sbs.de (8.15.2/8.15.2) with ESMTPS id w54I2ctJ010875 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 4 Jun 2018 20:02:38 +0200 Received: from md1pvb1c.ad001.siemens.net (md1pvb1c.ad001.siemens.net [139.25.68.40]) by mail1.siemens.de (8.15.2/8.15.2) with ESMTP id w54I2cNT000631; Mon, 4 Jun 2018 20:02:38 +0200 Date: Mon, 4 Jun 2018 20:02:37 +0200 From: Henning Schild To: Claudius Heine Cc: "[ext] claudius.heine.ext@siemens.com" , Subject: Re: [PATCH 0/1] Disable daemon activation Message-ID: <20180604200237.3dbfb767@md1pvb1c.ad001.siemens.net> In-Reply-To: <811a5cb6069e5f3bc9e010a11bca870be0d63400.camel@denx.de> References: <20180604112159.18605-1-claudius.heine.ext@siemens.com> <20180604193646.769f01ca@md1pvb1c.ad001.siemens.net> <811a5cb6069e5f3bc9e010a11bca870be0d63400.camel@denx.de> X-Mailer: Claws Mail 3.15.0-dirty (GTK+ 2.24.31; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-TUID: qFk8skJQ6KuN Am Mon, 4 Jun 2018 19:48:11 +0200 schrieb Claudius Heine : > Hi Henning, > > On Mon, 2018-06-04 at 19:36 +0200, Henning Schild wrote: > > Hi, > > > > this looks pretty nasty, > > Yes it is. But its mostly copied from debian-installer source. I just > added a bit execution environment and parametrized the target path. > > > and this is the "old" way of doing something > > like that. I would prefer adding some cgroup support to Isar to deal > > with that and other things. But if it works and did so in Debian for > > years ... why not. > > > > We could cgreate a temporary cgroup where we cgexec "sudo chroot", > > when > > that returns we destroy the cgroup and autokill everything running > > in there. This might also work for the umounts that we now still do > > explicit. > > > > I guess cgroups are a feature we can expect from a modern Linux > > build host, question is can we rely on the tools or should we > > create them manually. > > > > If you are building in docker you get what i described for "free". > > It takes care of cgroups and cleaning up after a finished build, but > > only > > once you end the container. > > I could not reproduce this issue. I installed openssh-server to the > image without this patch applied and did not stop the container. (As I > usually don't) But there were still no left over running applications. > I don't know why. My guess is that you can not reproduce because port 22 is busy on your host ;). > If you like you can implement a better way using cgroups. AFAIK you > are more experienced in those. I would have to test that out first. I am not sure about the severity of the "issue" and if we should do anything at all ... Henning > Claudius > > > > > Henning > > > > Am Mon, 4 Jun 2018 13:21:58 +0200 > > schrieb "[ext] claudius.heine.ext@siemens.com" > > : > > > > > From: Claudius Heine > > > > > > Hi, > > > > > > this patch disables the daemon activation in the chroot > > > environment. > > > > > > Since I could not reproduce the problem this patch handles, please > > > test if this fixes it, if the code looks fine. > > > > > > Cheers, > > > Claudius > > > > > > Claudius Heine (1): > > > meta/isar-bootstrap: deactivate daemon activation in chroot > > > environment > > > > > > meta/classes/isar-bootstrap-helper.bbclass | 2 + > > > .../isar-bootstrap/files/chroot-setup.sh | 133 > > > ++++++++++++++++++ .../isar-bootstrap/isar-bootstrap.bb | > > > 11 +- 3 files changed, 144 insertions(+), 2 deletions(-) > > > create mode 100644 > > > meta/recipes-core/isar-bootstrap/files/chroot-setup.sh > > > > > > >