From mboxrd@z Thu Jan 1 00:00:00 1970 X-GM-THRID: 6736062139219312640 X-Received: by 2002:ac2:53a3:: with SMTP id j3mr31149681lfh.155.1568367714648; Fri, 13 Sep 2019 02:41:54 -0700 (PDT) X-BeenThere: isar-users@googlegroups.com Received: by 2002:a19:5d57:: with SMTP id p23ls2859044lfj.4.gmail; Fri, 13 Sep 2019 02:41:54 -0700 (PDT) X-Google-Smtp-Source: APXvYqxT1rkeOBHWTeBcObkuxf1iedPqJmdwWLNyK7yPUtxRPf8sDGMggkGhzdMPjMzmhnRaX0Q8 X-Received: by 2002:ac2:47e3:: with SMTP id b3mr29257422lfp.80.1568367714061; Fri, 13 Sep 2019 02:41:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1568367714; cv=none; d=google.com; s=arc-20160816; b=uE7vq4U8ECBcOuM+AgFyCI59h3pFtV2BFeghISK4nxUSXp7M3g7AlENrZrefiAZ+B/ 2YVznU+NqcHyq2w9A1kIFG4Jrxh8gU8jehAqO0sqbm+EmtnSniWuAksKPrfBqjrl7d+D u8i+KQGn5DnKF9YVBsF+WzdVKKDWoJlW0L42d3q4u/eMZbKJEP3neWqxafxmxvIc22rq /FPXjpCYxvgHcwZsQ+iLUfmMsGTpakEFIrKl5lIE40/1sFFf/Qw3P8WZ4z33f/995IMn J3ZdxrwbLRj1TYN6yCBaCVCTQYjn0VB/zwayKZeB4J/CHUtMolEIcBNwPAZdEIeTCiJP D1dQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:content-language:in-reply-to:mime-version :user-agent:date:message-id:from:references:to:subject; bh=yQwRPatUTeUiHaPtBTx1rW3Q80568t+lL4LQXlpL5EY=; b=hY5FfeC/2JdcpygOFKpFkdLWzSxKCyM5qm7rUFo7FZBwTz5qUGmHjavc0h5dwkd0S+ zv4rHxrqLsKwVO8DhlGvMWsRlLiUBqupBkBGHap0ZiRmW9CfXCI+tDNBaKYX9999FBaV 7ePwiWFBA5galXU1sovOla0nD2Dcsg8OW/loVzE/ik79UfUp6MFrDicKVCrb3nJn85bp eWhhAL/JOZAf4piZNwuHGs7xIFDM09Z1vdcEVKjagdkLtA3Pb4YGboKcQ4rcGpJp8wTu o00PbEHaYYiBGc5jaYVubpHQAg7jBk2Xle0++rsR5iBhh9U7f2dzyD0oDkgVMxeZepzu JELw== ARC-Authentication-Results: i=1; gmr-mx.google.com; spf=pass (google.com: domain of jan.kiszka@siemens.com designates 194.138.37.39 as permitted sender) smtp.mailfrom=jan.kiszka@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com Return-Path: Received: from lizzard.sbs.de (lizzard.sbs.de. [194.138.37.39]) by gmr-mx.google.com with ESMTPS id c8si1679332lfm.4.2019.09.13.02.41.53 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 13 Sep 2019 02:41:54 -0700 (PDT) Received-SPF: pass (google.com: domain of jan.kiszka@siemens.com designates 194.138.37.39 as permitted sender) client-ip=194.138.37.39; Authentication-Results: gmr-mx.google.com; spf=pass (google.com: domain of jan.kiszka@siemens.com designates 194.138.37.39 as permitted sender) smtp.mailfrom=jan.kiszka@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com Received: from mail1.sbs.de (mail1.sbs.de [192.129.41.35]) by lizzard.sbs.de (8.15.2/8.15.2) with ESMTPS id x8D9frY1006719 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for ; Fri, 13 Sep 2019 11:41:53 +0200 Received: from [167.87.15.56] ([167.87.15.56]) by mail1.sbs.de (8.15.2/8.15.2) with ESMTP id x8D9fqfx022416 for ; Fri, 13 Sep 2019 11:41:53 +0200 Subject: Re: fakechroot To: isar-users@googlegroups.com References: <87486b31-2560-1b78-6d7e-86bf10fc306f@siemens.com> <20190913081406.GJ6062@yssyq.m.ilbers.de> <8db6f5f1-8a36-768c-1b5d-0a0a3df866fb@siemens.com> <20190913093317.GL6062@yssyq.m.ilbers.de> From: Jan Kiszka Message-ID: <9f5a0a84-fb22-5371-a7a8-d42c28b26da5@siemens.com> Date: Fri, 13 Sep 2019 11:41:52 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0 MIME-Version: 1.0 In-Reply-To: <20190913093317.GL6062@yssyq.m.ilbers.de> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-TUID: uc0t+rxGPlx8 On 13.09.19 11:33, Baurzhan Ismagulov wrote: > On Fri, Sep 13, 2019 at 11:08:21AM +0200, Quirin Gylstorff wrote: >> This was only an initial test but with fakechroot and fakeroot it should be >> possible to have a non-priviledged debootstrap and chroot process. >> >> - Initial Creating with debootstrap did work. e.g.: >> fakechroot fakeroot debootstrap buster amd64 >> - what also work was using chroot to enter the create rootfs. >> fakechroot chroot amd64 > > Thanks for sharing. That could be a welcome change. > > 1. How does fakechroot fakeroot perform privileged operations like chown, > mknod, accessing other's files, mounting, etc.? > > We need that information to be consistent across multiple commands in > multiple recipes (bootstrap, customize, install stuff, deploy, etc.). > Wrapping one command is probably possible with any tool -- but currently I > don't see how they could do what we need. > > Regarding keeping the information across multiple commands, Yocto's pseudo > should allegedly be able to do that (not sure whether it keeps the state in > a daemon or a file). Evaluating that was our next step (very low prio ATM) > -- maybe that could be interesting for you as well. > > 2. fakechroot fakeroot is reported to work with foreign-arch chroots. Have you > tried that? > Note that we can't use fakeroot for most package builds because Debian use it as well, and nesting is not supported. Jan -- Siemens AG, Corporate Technology, CT RDA IOT SES-DE Corporate Competence Center Embedded Linux