Message ID | 761d02cc-e6cb-d6b4-426f-00ebaa993f83@ipfire.org |
---|---|
State | Accepted |
Commit | db9ba592ca4b6d3fe2ae7e1c9a9057aacb25fe22 |
Headers |
Return-Path: <development-bounces@lists.ipfire.org> Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384 client-signature ECDSA (P-384) client-digest SHA384) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by web04.haj.ipfire.org (Postfix) with ESMTPS id 4JzPwL35Wpz3wsl for <patchwork@web04.haj.ipfire.org>; Wed, 16 Feb 2022 17:24:50 +0000 (UTC) Received: from mail02.haj.ipfire.org (mail02.haj.ipfire.org [172.28.1.201]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384 client-signature ECDSA (P-384) client-digest SHA384) (Client CN "mail02.haj.ipfire.org", Issuer "R3" (verified OK)) by mail01.ipfire.org (Postfix) with ESMTPS id 4JzPwJ41fSz39v; Wed, 16 Feb 2022 17:24:48 +0000 (UTC) Received: from mail02.haj.ipfire.org (localhost [127.0.0.1]) by mail02.haj.ipfire.org (Postfix) with ESMTP id 4JzPwJ2R08z2yWd; Wed, 16 Feb 2022 17:24:48 +0000 (UTC) Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) client-signature ECDSA (P-384)) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by mail02.haj.ipfire.org (Postfix) with ESMTPS id 4JzPwH12DVz2xNQ for <development@lists.ipfire.org>; Wed, 16 Feb 2022 17:24:47 +0000 (UTC) Received: from [127.0.0.1] (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384) (No client certificate requested) by mail01.ipfire.org (Postfix) with ESMTPSA id 4JzPwD4RsGzW9 for <development@lists.ipfire.org>; Wed, 16 Feb 2022 17:24:44 +0000 (UTC) DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003ed25519; t=1645032285; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=ra/zBTZzAevCOOjT2LZeiUc3xku6t1fmj0BFCmnhuMM=; b=gdQhWztt61KukgfWu7JE1gRiGCfmZkchkUfTgd7N7GkJKCCrgORhkpovGZnZ+VM9LR1vl+ VS9OJk1GtVeFq1Aw== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003rsa; t=1645032285; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=ra/zBTZzAevCOOjT2LZeiUc3xku6t1fmj0BFCmnhuMM=; b=RTf27Dod7sEy43x45GhTtiL0JtG+fOfDhuCAUZEVUCzLhxH8RF2cECdX8Jj9IHSIzTCaRI upDJoPboYj8WiQJvtaHK57C/nQoXxrJj2evPF53pYGoHBEigqjZhTIVbeCpg2O7gZOHwjt XPbtiwXP5/12auYD1Fzo3u6IPfqEGeQjg49qF6iJkLenB22MGlJuW9mQ8hihc8gq8pDq2A nchlHP0Vu2qRnu7XKx7uCboctFxEel/wxY9khldE0WO0vb/hcGuCkGzrvttKjAa/yUTJkw 93WKJ0MCUEZLm92G7+Q8uPN9bRX8ffROsfyhgKdNyTvL06nwHES22t9SrCmQiw== Message-ID: <761d02cc-e6cb-d6b4-426f-00ebaa993f83@ipfire.org> Date: Wed, 16 Feb 2022 17:24:41 +0000 MIME-Version: 1.0 Content-Language: en-US To: "IPFire: Development" <development@lists.ipfire.org> From: =?utf-8?q?Peter_M=C3=BCller?= <peter.mueller@ipfire.org> Subject: [PATCH] make.sh: SIGKILL and SIGSTOP cannot be trapped Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: development@lists.ipfire.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: IPFire development talk <development.lists.ipfire.org> List-Unsubscribe: <https://lists.ipfire.org/mailman/options/development>, <mailto:development-request@lists.ipfire.org?subject=unsubscribe> List-Archive: <http://lists.ipfire.org/pipermail/development/> List-Post: <mailto:development@lists.ipfire.org> List-Help: <mailto:development-request@lists.ipfire.org?subject=help> List-Subscribe: <https://lists.ipfire.org/mailman/listinfo/development>, <mailto:development-request@lists.ipfire.org?subject=subscribe> Errors-To: development-bounces@lists.ipfire.org Sender: "Development" <development-bounces@lists.ipfire.org> |
Series |
make.sh: SIGKILL and SIGSTOP cannot be trapped
|
|
Commit Message
Peter Müller
Feb. 16, 2022, 5:24 p.m. UTC
There is no sense in instructing "trap" to catch signals it cannot trap
whatsoever.
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
---
make.sh | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
Comments
Hello, Is this a cosmetic change or does this fix a real world problem? -Michael > On 16 Feb 2022, at 17:24, Peter Müller <peter.mueller@ipfire.org> wrote: > > There is no sense in instructing "trap" to catch signals it cannot trap > whatsoever. > > Signed-off-by: Peter Müller <peter.mueller@ipfire.org> > --- > make.sh | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/make.sh b/make.sh > index 4dd068e4b..c06b4ec38 100755 > --- a/make.sh > +++ b/make.sh > @@ -437,7 +437,7 @@ prepareenv() { > fi > > # Trap on emergency exit > - trap "exiterror 'Build process interrupted'" SIGINT SIGTERM SIGKILL SIGSTOP SIGQUIT > + trap "exiterror 'Build process interrupted'" SIGINT SIGTERM SIGQUIT > > # Checking if running as root user > if [ $(id -u) -ne 0 ]; then > -- > 2.34.1
Hello Michael, rather cosmetic. shellcheck complains about this, and I was wondering why a SIGSTOP'ed build caused my workstation to malfunction until a reboot the other way. The current "trap" command just arises false expectations... :-) Thanks, and best regards, Peter Müller > Hello, > > Is this a cosmetic change or does this fix a real world problem? > > -Michael > >> On 16 Feb 2022, at 17:24, Peter Müller <peter.mueller@ipfire.org> wrote: >> >> There is no sense in instructing "trap" to catch signals it cannot trap >> whatsoever. >> >> Signed-off-by: Peter Müller <peter.mueller@ipfire.org> >> --- >> make.sh | 2 +- >> 1 file changed, 1 insertion(+), 1 deletion(-) >> >> diff --git a/make.sh b/make.sh >> index 4dd068e4b..c06b4ec38 100755 >> --- a/make.sh >> +++ b/make.sh >> @@ -437,7 +437,7 @@ prepareenv() { >> fi >> >> # Trap on emergency exit >> - trap "exiterror 'Build process interrupted'" SIGINT SIGTERM SIGKILL SIGSTOP SIGQUIT >> + trap "exiterror 'Build process interrupted'" SIGINT SIGTERM SIGQUIT >> >> # Checking if running as root user >> if [ $(id -u) -ne 0 ]; then >> -- >> 2.34.1 >
Okay. Thank you for the explanation. Reviewed-by: Michael Tremer <michael.tremer@ipfire.org> > On 16 Feb 2022, at 17:27, Peter Müller <peter.mueller@ipfire.org> wrote: > > Hello Michael, > > rather cosmetic. shellcheck complains about this, and I was wondering why > a SIGSTOP'ed build caused my workstation to malfunction until a reboot the > other way. > > The current "trap" command just arises false expectations... :-) > > Thanks, and best regards, > Peter Müller > >> Hello, >> >> Is this a cosmetic change or does this fix a real world problem? >> >> -Michael >> >>> On 16 Feb 2022, at 17:24, Peter Müller <peter.mueller@ipfire.org> wrote: >>> >>> There is no sense in instructing "trap" to catch signals it cannot trap >>> whatsoever. >>> >>> Signed-off-by: Peter Müller <peter.mueller@ipfire.org> >>> --- >>> make.sh | 2 +- >>> 1 file changed, 1 insertion(+), 1 deletion(-) >>> >>> diff --git a/make.sh b/make.sh >>> index 4dd068e4b..c06b4ec38 100755 >>> --- a/make.sh >>> +++ b/make.sh >>> @@ -437,7 +437,7 @@ prepareenv() { >>> fi >>> >>> # Trap on emergency exit >>> - trap "exiterror 'Build process interrupted'" SIGINT SIGTERM SIGKILL SIGSTOP SIGQUIT >>> + trap "exiterror 'Build process interrupted'" SIGINT SIGTERM SIGQUIT >>> >>> # Checking if running as root user >>> if [ $(id -u) -ne 0 ]; then >>> -- >>> 2.34.1 >>
diff --git a/make.sh b/make.sh index 4dd068e4b..c06b4ec38 100755 --- a/make.sh +++ b/make.sh @@ -437,7 +437,7 @@ prepareenv() { fi # Trap on emergency exit - trap "exiterror 'Build process interrupted'" SIGINT SIGTERM SIGKILL SIGSTOP SIGQUIT + trap "exiterror 'Build process interrupted'" SIGINT SIGTERM SIGQUIT # Checking if running as root user if [ $(id -u) -ne 0 ]; then