From mboxrd@z Thu Jan 1 00:00:00 1970 X-GM-THRID: 6727995572123336704 X-Received: by 2002:a17:906:5181:: with SMTP id y1mr12810341ejk.311.1566483539407; Thu, 22 Aug 2019 07:18:59 -0700 (PDT) X-BeenThere: isar-users@googlegroups.com Received: by 2002:a17:906:19d2:: with SMTP id h18ls1887334ejd.8.gmail; Thu, 22 Aug 2019 07:18:58 -0700 (PDT) X-Google-Smtp-Source: APXvYqw4OIH+hdSssRlhrmmNvKtZ+O/FTNERVzJPT3qy0y7WwsvUC17v8zharaQyAksXhDbhzGfw X-Received: by 2002:a17:906:12d3:: with SMTP id l19mr32943595ejb.149.1566483538746; Thu, 22 Aug 2019 07:18:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1566483538; cv=none; d=google.com; s=arc-20160816; b=vI10l409qmlQAI68SglVR0us+lXCsK5WRseQIcY3sZgNyoAii5X0as2c5PO8JmOD1N iZycraIGhcHQY4O5g0X6C7rs9DhDWRHENQFUyReiYqoMUzzKRz18dElq/KbGhwqZUfgY P3/kcz0KGhMp4QvvxCpu/rQ84GPCeef+V0LFUEE+3ZFvz0bY/XWzdxCVxqgYlhPdf9tA H/25/nLI/8n07l9dXgc/EaUFATuGT/jfzHk8p+/d4JxdT8QHoMPcxmZQR0HekohsRQC5 BfDB06vXVaoXnwAOsXlcUkbCEqDglJ5vDjc/zHnrmosLdCX5/XPtfJgb7GG3I538Thu0 zStg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:content-language:mime-version:user-agent :date:message-id:subject:from:to; bh=074ZzCtRO20Eoa1vTKjoIETxOzC4hX0QzEW99yfH750=; b=P9aWawh6pQ+J7Z9/aFvSpog+l+idnz+TfcpX8u4ihfZFy5XSrjga4qwYdRwIm5grzz M6ZzAT8IF+yYI6aqHgS4Az/VvDgJw7UNv2BN9DUrW3xZ5t+UYm0krjhEGlISJtDEEFM1 ka/wirqTTlEMtPm0TOnwG3HKVCsgTSzdTALcwsoQFzjIdTVUhRvuK78vSGd36OL5AuCU YOaqPTh1nI36iMIDedBZIMQfkub0HpblgeVbGmzhr7ZH9gpJyHssqTfVmcAXQAWSCjlM J/iFlBIGYY/0SpI8LSx7tomTGZN+alqYmYjjkxnT+vzRb9gERfOrk+zT8kn1LQ0Mup6F +jBQ== ARC-Authentication-Results: i=1; gmr-mx.google.com; spf=pass (google.com: domain of jan.kiszka@siemens.com designates 192.35.17.2 as permitted sender) smtp.mailfrom=jan.kiszka@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com Return-Path: Received: from thoth.sbs.de (thoth.sbs.de. [192.35.17.2]) by gmr-mx.google.com with ESMTPS id m16si1603864edv.2.2019.08.22.07.18.58 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 22 Aug 2019 07:18:58 -0700 (PDT) Received-SPF: pass (google.com: domain of jan.kiszka@siemens.com designates 192.35.17.2 as permitted sender) client-ip=192.35.17.2; Authentication-Results: gmr-mx.google.com; spf=pass (google.com: domain of jan.kiszka@siemens.com designates 192.35.17.2 as permitted sender) smtp.mailfrom=jan.kiszka@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com Received: from mail1.sbs.de (mail1.sbs.de [192.129.41.35]) by thoth.sbs.de (8.15.2/8.15.2) with ESMTPS id x7MEIwY7003871 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for ; Thu, 22 Aug 2019 16:18:58 +0200 Received: from [139.25.68.37] (md1q0hnc.ad001.siemens.net [139.25.68.37] (may be forged)) by mail1.sbs.de (8.15.2/8.15.2) with ESMTP id x7MEIv2u026976 for ; Thu, 22 Aug 2019 16:18:57 +0200 To: isar-users From: Jan Kiszka Subject: isar-bootstrap failures with debian-buster targets Message-ID: Date: Thu, 22 Aug 2019 16:18:57 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-TUID: TxItHXzi397f Hi all, only on my machine so far, I'm seeing weird failures of buster-targeting non-x86 builds, primarily armhf and also mipsel. The pattern is always some out-of-memory inside apt during "apt-get update": [...] '/work/build/tmp/work/debian-buster-armhf/isar-bootstrap-target-1.0-r0/chroot-setup.sh' -> '/work/build/tmp/work/debian-buster-armhf/isar-bootstrap-target-1.0-r0/rootfs/chroot-setup.sh' dpkg-divert: warning: diverting file '/sbin/start-stop-daemon' from an Essential package with rename is dangerous, use --no-rename Hit:1 http://ftp.debian.org/debian buster InRelease Get:2 http://ftp.debian.org/debian buster-updates InRelease [49.3 kB] Get:3 http://security-cdn.debian.org buster/updates InRelease [39.1 kB] Get:4 http://ftp.debian.org/debian buster/contrib Sources [43.1 kB] Get:5 http://ftp.debian.org/debian buster/main Sources [7,827 kB] Get:6 http://ftp.debian.org/debian buster/non-free Sources [86.2 kB] Get:7 http://ftp.debian.org/debian buster/main Translation-en [5,967 kB] Get:8 http://ftp.debian.org/debian buster/contrib Translation-en [44.7 kB] Get:9 http://ftp.debian.org/debian buster/non-free Translation-en [88.3 kB] Get:10 http://ftp.debian.org/debian buster-updates/main Sources [1,204 B] Get:11 http://ftp.debian.org/debian buster-updates/main armhf Packages [884 B] Get:12 http://ftp.debian.org/debian buster-updates/main Translation-en [600 B] Reading package lists... E: Could not read from /var/lib/apt/lists/partial/security.debian.org_dists_buster_updates_InRelease - getline (12: Cannot allocate memory) E: The repository 'http://security.debian.org buster/updates InRelease' provides only weak security information. WARNING: exit code 100 from a shell command. ERROR: Function failed: do_bootstrap (log file is located at /work/build/tmp/work/debian-buster-armhf/isar-bootstrap-target-1.0-r0/temp/log.do_bootstrap.1156) This is apparently caused by the getline here: https://salsa.debian.org/apt-team/apt/blob/master/apt-pkg/contrib/fileutl.cc#L989 That just reads an absolutely valid line first line from a Release file that is valid as well (identical to the file an x86 target downloaded e.g.). ENOMEM makes zero sense /wrt to the overall system memory available. It also does not correlate with parallel builds, I've also seen it when just building that single target. And, of course, it also succeeds when retrying often enough. Anyone any idea? Build host is latest kas-project/kas-isar, i.e. a Debian 10 instance. Thanks, Jan -- Siemens AG, Corporate Technology, CT RDA IOT SES-DE Corporate Competence Center Embedded Linux