From: Jan Kiszka <jan.kiszka@siemens.com>
To: isar-users@googlegroups.com
Subject: Re: isar-bootstrap failures with debian-buster targets
Date: Tue, 3 Sep 2019 19:02:05 +0200 [thread overview]
Message-ID: <dd1ecc31-4436-6c7e-5558-de9baa557675@siemens.com> (raw)
In-Reply-To: <ad0d27c1-5544-d629-c316-fd83a2381756@siemens.com>
On 03.09.19 18:23, [ext] Jan Kiszka wrote:
> On 03.09.19 17:44, Baurzhan Ismagulov wrote:
>> On Tue, Aug 27, 2019 at 09:10:21AM +0200, Jan Kiszka wrote:
>>>> FWIW, this also occurred on an internal Jenkins machine (stretch host, stretch
>>>> workspace, no docker). This happening only with buster target, we have only two
>>>> candidates: bug in qemu or bug Debian, no?
>>>
>>> Yeah, stretch host does not seem to make a difference. I've seen it
>>> meanwhile also with the stretch-based kas image.
>>>
>>> Should we try to file bug? Question is: against which component? debootstrap?
>>
>> I think the best candidate would be the package containing the binary that
>> fails -- presumably apt.
>>
>> For me, the questions are:
>>
>> 1. Can we rule out qemu in some way?
>>
>> 2. Is it reproducible in a simple way?
>
> Well, for me at least: Just started the OrangePi Zero build of jailhouse-images,
> which is now buster-based, and it failed again. I suspect I can trigger this now
> for a couple of times in a row.
>
>>
>> I.e., ideally, it should be reproducible from the command line on the host
>> natively, otherwise we'll probably end up just having reported the problem --
>> which is admittedly also necessary.
>>
>
> That's not where I am yet, only seeing it on my SUSE host.
>
>>
>> That said, the links below (at least one of which appears to be an automated
>> translation from English) refer to the same problem in the context of
>> Singularity, which would point rather into the direction of qemu. What is
>> actually the size of RAM available to the guest in our case? Apt has the
>> history of requiring considerable amounts of RAM.
>>
>> 1. https://issue.life/questions/51632062
>> 2. https://bug200.com/post/51632062
>>
>
> Well, we only saw the issue with armhf and mipsel so far, right? I did a lot of
> arm64 builds recently on the very same machine, which are qemu-based, and none
> failed this way. I do not know how much virtual memory qemu-user leaves the
> application, but it is already constrained to 32-bit.
>
> Hmm, there some tunables to qemu-user. I'm currently playing with
> QEMU_RESERVED_VA, will keep you posted...
>
Nope, would have been too easy: Even QEMU_RESERVED_VA=4000M, which is close to
the maximum, makes no difference.
I also tried to reproduce outside of the container, but that did not work so
far. At least, that reduces the probability that the kernel is the key.
Jan
--
Siemens AG, Corporate Technology, CT RDA IOT SES-DE
Corporate Competence Center Embedded Linux
prev parent reply other threads:[~2019-09-03 17:02 UTC|newest]
Thread overview: 10+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-08-22 14:18 Jan Kiszka
2019-08-22 14:47 ` Baurzhan Ismagulov
2019-08-22 15:00 ` Jan Kiszka
2019-08-22 15:27 ` Baurzhan Ismagulov
2019-08-23 12:26 ` Jan Kiszka
2019-08-27 4:33 ` Baurzhan Ismagulov
2019-08-27 7:10 ` Jan Kiszka
2019-09-03 15:44 ` Baurzhan Ismagulov
2019-09-03 16:23 ` Jan Kiszka
2019-09-03 17:02 ` Jan Kiszka [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=dd1ecc31-4436-6c7e-5558-de9baa557675@siemens.com \
--to=jan.kiszka@siemens.com \
--cc=isar-users@googlegroups.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox