From mboxrd@z Thu Jan 1 00:00:00 1970 X-GM-THRID: 6736062139219312640 X-Received: by 2002:a1c:3904:: with SMTP id g4mr2944506wma.116.1568713929269; Tue, 17 Sep 2019 02:52:09 -0700 (PDT) X-BeenThere: isar-users@googlegroups.com Received: by 2002:a1c:a54b:: with SMTP id o72ls792516wme.2.gmail; Tue, 17 Sep 2019 02:52:08 -0700 (PDT) X-Google-Smtp-Source: APXvYqw6uXkMkAoXGe61Z6S/Zpy5MlZaCHgTzRtrBxDR7ks50yMT6Ka1yyKlNRNjnFx0R76EowmH X-Received: by 2002:a1c:5942:: with SMTP id n63mr2532339wmb.65.1568713928693; Tue, 17 Sep 2019 02:52:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1568713928; cv=none; d=google.com; s=arc-20160816; b=GLYDMk+rxtt2PFHLsaDguCQhjx8z0vf+8I837ZeZaZN2ogZ/E5L+SDWSNCZfxSys0W zctSdqSCx7LtinlPTn8c9hScg3PNEbtFqu9avFbQWbLjq57w6jZybcNFye/jkEm+hPWz zeh37+7GFwFrO/MXFrC8vE8agHPbal7SZvfY5C1Kuex6xbfzoT7BGnb2PlVwjDkcQVFn SJphE7TePAHBfp4UiCJ1RxA423BRn3x85MXELBRzKVNKKkIRMkFnEi2UCg4ruu1/lBS5 Ak/Bi6expUdYEcxT/FLckDuUnuuxx4L4YZPKZDBLjGAx8n4w0Fk+0XXBp/u5sbpO2s89 x5NQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:content-language:in-reply-to:mime-version :user-agent:date:message-id:from:references:cc:to:subject; bh=lj1alPoshffqoNmvg4RSiE0u6RCSiu/zPtFLyQLlgAM=; b=ASrqd7onVomlX/DrkqodZ17YzCv+whKBFQifUivHtuOtTYu/G2HTZFDWO5b9pDZGW9 zrVtwzo8oRZZDn2BdmFLbvPb7Pzn7Q0jqEFRT6DRqAIF5uAyCtiLUKL5vuycL9DgnNzY LxWKuS6giDUy4NqBEEQjrq+PoYp7gemsk1y+0JzJS0YK0fqHS6OEH3Q3iU6gqJHdqNfs yM077jQJhQdN7i4lhVnIavosFPCIQSkn44X+Az2OqmjrWlid+nyg8H2f2h7JwRno123d WlIjArMVr15E7KzUFn+nLZ/nxqX4mNJVggyjx19C8WgH4hQDH3sLl9R0cXB8OzGWT0E/ SH4Q== ARC-Authentication-Results: i=1; gmr-mx.google.com; spf=pass (google.com: domain of jan.kiszka@siemens.com designates 192.35.17.28 as permitted sender) smtp.mailfrom=jan.kiszka@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com Return-Path: Received: from goliath.siemens.de (goliath.siemens.de. [192.35.17.28]) by gmr-mx.google.com with ESMTPS id n16si95355wrs.4.2019.09.17.02.52.08 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 17 Sep 2019 02:52:08 -0700 (PDT) Received-SPF: pass (google.com: domain of jan.kiszka@siemens.com designates 192.35.17.28 as permitted sender) client-ip=192.35.17.28; Authentication-Results: gmr-mx.google.com; spf=pass (google.com: domain of jan.kiszka@siemens.com designates 192.35.17.28 as permitted sender) smtp.mailfrom=jan.kiszka@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com Received: from mail1.sbs.de (mail1.sbs.de [192.129.41.35]) by goliath.siemens.de (8.15.2/8.15.2) with ESMTPS id x8H9q81v005698 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for ; Tue, 17 Sep 2019 11:52:08 +0200 Received: from [139.22.41.114] ([139.22.41.114]) by mail1.sbs.de (8.15.2/8.15.2) with ESMTP id x8H9q7H1014595; Tue, 17 Sep 2019 11:52:07 +0200 Subject: Re: fakechroot To: Henning Schild Cc: isar-users@googlegroups.com References: <87486b31-2560-1b78-6d7e-86bf10fc306f@siemens.com> <20190913081406.GJ6062@yssyq.m.ilbers.de> <8db6f5f1-8a36-768c-1b5d-0a0a3df866fb@siemens.com> <20190913093317.GL6062@yssyq.m.ilbers.de> <9f5a0a84-fb22-5371-a7a8-d42c28b26da5@siemens.com> <20190917111454.0698c4c2@md1za8fc.ad001.siemens.net> From: Jan Kiszka Message-ID: <3d07ef39-89a9-372f-6160-f224f55b75e9@siemens.com> Date: Tue, 17 Sep 2019 11:52:07 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0 MIME-Version: 1.0 In-Reply-To: <20190917111454.0698c4c2@md1za8fc.ad001.siemens.net> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-TUID: vuOuaPuMa4Km On 17.09.19 11:14, Henning Schild wrote: > Am Fri, 13 Sep 2019 11:41:52 +0200 > schrieb "[ext] Jan Kiszka" : > >> On 13.09.19 11:33, Baurzhan Ismagulov wrote: >>> On Fri, Sep 13, 2019 at 11:08:21AM +0200, Quirin Gylstorff wrote: >>>> This was only an initial test but with fakechroot and fakeroot it >>>> should be possible to have a non-priviledged debootstrap and >>>> chroot process. >>>> >>>> - Initial Creating with debootstrap did work. e.g.: >>>> fakechroot fakeroot debootstrap buster amd64 >>>> - what also work was using chroot to enter the create rootfs. >>>> fakechroot chroot amd64 >>> >>> Thanks for sharing. That could be a welcome change. >>> >>> 1. How does fakechroot fakeroot perform privileged operations like >>> chown, mknod, accessing other's files, mounting, etc.? >>> >>> We need that information to be consistent across multiple >>> commands in multiple recipes (bootstrap, customize, install stuff, >>> deploy, etc.). Wrapping one command is probably possible with any >>> tool -- but currently I don't see how they could do what we need. >>> >>> Regarding keeping the information across multiple commands, >>> Yocto's pseudo should allegedly be able to do that (not sure >>> whether it keeps the state in a daemon or a file). Evaluating that >>> was our next step (very low prio ATM) -- maybe that could be >>> interesting for you as well. >>> >>> 2. fakechroot fakeroot is reported to work with foreign-arch >>> chroots. Have you tried that? >>> >> >> Note that we can't use fakeroot for most package builds because >> Debian use it as well, and nesting is not supported. > > Are you sure that is an issue, did you try? Most fakeroot aware tools > will detect that they are already running in fakeroot and will not try > to nest. I've ran into problems when nesting inside the build. Maybe the outer fakeroot call would detect and avoid that, but I would not bet on that. Jan -- Siemens AG, Corporate Technology, CT RDA IOT SES-DE Corporate Competence Center Embedded Linux