From: Anton Mikanovich <amikan@ilbers.de>
To: "Schmidt, Adriaan" <adriaan.schmidt@siemens.com>,
"Schild, Henning" <henning.schild@siemens.com>,
"isar-users@googlegroups.com" <isar-users@googlegroups.com>
Cc: "jan.kiszka@siemens.com" <jan.kiszka@siemens.com>,
"quirin.gylstorff@siemens.com" <quirin.gylstorff@siemens.com>
Subject: Re: [PATCHv3 0/3] sstate bug fix
Date: Wed, 16 Feb 2022 17:08:47 +0300 [thread overview]
Message-ID: <fbbd8b5b-afd4-f1c8-0b08-6e8ecf7b8d8c@ilbers.de> (raw)
In-Reply-To: <AS4PR10MB531804A473B9D43B8F302AB4ED349@AS4PR10MB5318.EURPRD10.PROD.OUTLOOK.COM>
15.02.2022 13:08, Schmidt, Adriaan wrote:
> The root problem here is that the sstate code does not "see" when/which files are put into DEPLOY_DIR_IMAGE as a side-effect of tasks.
>
> Unfortunately, we just found out that this problem is not limited to rootfs recipes. There are examples of dpkg recipes [1] placing artifacts into the deploy dir, which also breaks with sstate caching.
>
> One option I can see is:
> * "forbid" (by convention/documentation) recipes from manually placing files in DEPLOY_DIR_IMAGE
> * instead, recipes need to set a variable (e.g., FILES_TO_DEPLOY)
> * these files will be deployed by isar classes
> * sstate will cache and restore these files
>
> Or we go the OE way:
> * no-one writes directly to DEPLOY_DIR_IMAGE, but instead to IMGDEPLOYDIR, which is below WORKDIR
> * isar classes transfer the deployed artifacts to DEPLOY_DIR_IMAGE (in OE this transfer is actually done implicitly by sstate code)
>
> Q:
> * is DEPLOY_DIR_IMAGE the only location with that problem? Or should we assume that recipes have side-effects writing to arbitrary locations?
>
> Adriaan
>
> [1] https://gitlab.com/cip-project/cip-core/isar-cip-core/-/blob/master/recipes-bsp/efibootguard/efibootguard_0.9-git%2Bisar.bb#L42
The way binaries installed to DEPLOY_DIR_IMAGE definitely need to be
changed, but does anything speak against merging this patchset?
next prev parent reply other threads:[~2022-02-16 14:08 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-02-04 16:41 henning.schild
2022-02-04 16:41 ` [PATCHv3 1/3] sstate: change rootfs task to cache henning.schild
2022-02-04 16:41 ` [PATCHv3 2/3] sstate: fix task order and deps henning.schild
2022-02-04 16:41 ` [PATCHv3 3/3] buildchroot: make function buildchroot_install_files idempotent henning.schild
2022-02-15 10:08 ` [PATCHv3 0/3] sstate bug fix Schmidt, Adriaan
2022-02-16 14:08 ` Anton Mikanovich [this message]
2022-02-21 9:23 ` Anton Mikanovich
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=fbbd8b5b-afd4-f1c8-0b08-6e8ecf7b8d8c@ilbers.de \
--to=amikan@ilbers.de \
--cc=adriaan.schmidt@siemens.com \
--cc=henning.schild@siemens.com \
--cc=isar-users@googlegroups.com \
--cc=jan.kiszka@siemens.com \
--cc=quirin.gylstorff@siemens.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox