!RROtHmAaQIkiJzJZZE:nixos.org

NixOS Infrastructure

391 Members
Next Infra call: 2024-07-11, 18:00 CEST (UTC+2) | Infra operational issues backlog: https://github.com/orgs/NixOS/projects/52 | See #infra-alerts:nixos.org for real time alerts from Prometheus.118 Servers

Load older messages


SenderMessageTime
8 Feb 2026
@hexa:lossy.networkhexa
commit ae6761b9fea22ac802ead7757d034665cb4e795e
Author: Martin Weinelt <hexa@darmstadt.ccc.de>
Date:   Sun Mar 2 23:04:26 2025 +0100

    builders: stop using cgroups for now
    
    They currently break the build of nixosTests.systemd-boot.extraEntries on
    lix 2.91.1 and nix 2.25.2 after the edk2 202502 upgrade.
    
    The test hangs in nixos-disk-image-aarch64-linux with
    > Press ESC in 5 seconds to skip startup.nsh or any other key to continue.
    > Press ESC in 4 seconds to skip startup.nsh or any other key to continue.
    > Press ESC in 3 seconds to skip startup.nsh or any other key to continue.
    > Press ESC in 2 seconds to skip startup.nsh or any other key to continue.
    > Press ESC in 1 seconds to skip startup.nsh or any other key to continue.
    > [hangs here]
    
    And aborting the test after it times out fails with
    
    > Aborted: error: deleting cgroup '/sys/fs/cgroup/system.slice/nix-daemon.service/nix-build-uid-30022': [Device or resource busy]
19:28:35
@k900:0upti.meK900 Ugh 19:29:02
@k900:0upti.meK900 Not a fan of the whole thing at all tbh 19:29:03
@k900:0upti.meK900 Bolting on more wacky nonsense on the test driver is not the way 19:29:04
@k900:0upti.meK900 But rewriting it to be actually good is spoons 19:29:06
@hexa:lossy.networkhexahave you looked at the implementation and is it wacky?19:30:05
@hexa:lossy.networkhexa* have you looked at the implementation and are you considering it wacky?19:30:11
@k900:0upti.meK900 A little and yes 19:30:19
@hexa:lossy.networkhexamore lightweight tests would surely be appreciated19:30:21
@raitobezarius:matrix.orgraitobezariusthe biggest problem of this is not cgroups19:32:56
@raitobezarius:matrix.orgraitobezariusit's auto-allocate-uids and uid-range19:32:59
@raitobezarius:matrix.orgraitobezariusthere's no implementation ready for that in any interpreter19:33:08
@raitobezarius:matrix.orgraitobezarius notably blocked on https://github.com/NixOS/nixpkgs/pull/404864 19:33:15
@raitobezarius:matrix.orgraitobezarius(and sure, there's a PR for nsresourced integration in cppnix)19:34:22
@arianvp:matrix.orgArianYeh for now this means running tests outside of nix right?19:48:44
@arianvp:matrix.orgArianHonestly my dream setup would be new test driver and then we can just use vmspan or nspawn (they have basically identical interfaces)19:51:31
@arianvp:matrix.orgArianBut yeh that's .. work 19:51:40
@arianvp:matrix.orgArianEspecially driver that integrates with all the systemd goodies like the notify vsock stuff would be great19:52:25
@raitobezarius:matrix.orgraitobezarius
In reply to @arianvp:matrix.org
Yeh for now this means running tests outside of nix right?
That code uses uid-range
19:52:49
@raitobezarius:matrix.orgraitobezariusSo you cannot run it outside of Nix19:53:00
@arianvp:matrix.orgArianOooh20:01:34
@ma27:nicht-so.sexyma27fwiw I think the implementation improved quite a lot with the latest few commits and doesn't walk into a wrong direction design-wise. So, IMHO it's perfectly fine to start with this and iterate on that once we actually can use nsresourced (I've heard about ideas to implement this since ~2017).20:49:57
@k900:0upti.meK900I may need to skim it again20:50:13
@ma27:nicht-so.sexyma27excuse my ignorance, but now that I think of it, how feasible is it to have nsresourced et al. inside a sandbox?20:50:42
@corngood:corngood.com@corngood:corngood.com left the room.21:23:29
@raitobezarius:matrix.orgraitobezarius
In reply to @ma27:nicht-so.sexy
excuse my ignorance, but now that I think of it, how feasible is it to have nsresourced et al. inside a sandbox?
By some alignment of all the stars, we, at Lix, need uid-range stabilized to enable xattrs in the store, coincidentally, getting nspawn for our own test suite would make us happier as well, nsresourced is already mentioned in https://git.lix.systems/lix-project/lix/issues/387#issuecomment-12929 (and this is an idea that has been floating back when the systemd crew introduced it at some ASG before that comment)
21:42:42
@raitobezarius:matrix.orgraitobezariusThat being said, after the hard packaging (eBPF) problems are fixed, integrating nsresourced in the sandbox is fairly easy; what is not easy is to stabilize cgroups Stabilizing UID range without cgroups is probably a bad idea albeit possible because killing process tree in Linux without cgroups is annoyingly hard, so there would be an increase of deadlocked builds if they don't terminate well in the sandbox because process group killing is well not that good21:45:14
@kieran:4d2.orgKierán joined the room.21:45:57
@raitobezarius:matrix.orgraitobezariusObviously macOS is its own open question as it does not enjoy clear system APIs to get ranges of UIDs locked properly, but that's not my department :D21:46:12
@raitobezarius:matrix.orgraitobezarius out of completeness, artemist did the work for CppNix: https://github.com/NixOS/nix/pull/15103 21:57:42

Show newer messages


Back to Room ListRoom Version: 6