From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mp1 ([2001:41d0:2:4a6f::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by ms11 with LMTPS id uGf2DGiT017xCQAA0tVLHw (envelope-from ) for ; Sun, 31 May 2020 11:22:16 +0000 Received: from aspmx1.migadu.com ([2001:41d0:2:4a6f::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by mp1 with LMTPS id WAujCGiT016SSQAAbx9fmQ (envelope-from ) for ; Sun, 31 May 2020 11:22:16 +0000 Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by aspmx1.migadu.com (Postfix) with ESMTPS id AD8C894029E for ; Sun, 31 May 2020 11:22:15 +0000 (UTC) Received: from localhost ([::1]:38242 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1jfM2g-0005hE-1f for larch@yhetil.org; Sun, 31 May 2020 07:22:14 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]:55296) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1jfM2V-0005gy-MN for bug-guix@gnu.org; Sun, 31 May 2020 07:22:04 -0400 Received: from debbugs.gnu.org ([209.51.188.43]:48317) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1jfM2T-00010u-VK for bug-guix@gnu.org; Sun, 31 May 2020 07:22:03 -0400 Received: from Debian-debbugs by debbugs.gnu.org with local (Exim 4.84_2) (envelope-from ) id 1jfM2T-0006FS-Qg for bug-guix@gnu.org; Sun, 31 May 2020 07:22:01 -0400 X-Loop: help-debbugs@gnu.org Subject: bug#41625: Sporadic guix-offload crashes due to EOF errors Resent-From: Marius Bakke Original-Sender: "Debbugs-submit" Resent-CC: bug-guix@gnu.org Resent-Date: Sun, 31 May 2020 11:22:01 +0000 Resent-Message-ID: Resent-Sender: help-debbugs@gnu.org X-GNU-PR-Message: followup 41625 X-GNU-PR-Package: guix X-GNU-PR-Keywords: To: 41625@debbugs.gnu.org Received: via spool by 41625-submit@debbugs.gnu.org id=B41625.159092411324000 (code B ref 41625); Sun, 31 May 2020 11:22:01 +0000 Received: (at 41625) by debbugs.gnu.org; 31 May 2020 11:21:53 +0000 Received: from localhost ([127.0.0.1]:59863 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1jfM2K-0006F2-Qs for submit@debbugs.gnu.org; Sun, 31 May 2020 07:21:52 -0400 Received: from eggs.gnu.org ([209.51.188.92]:47846) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1jfM2J-0006Ep-89 for 41625@debbugs.gnu.org; Sun, 31 May 2020 07:21:51 -0400 Received: from fencepost.gnu.org ([2001:470:142:3::e]:53535) by eggs.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1jfM2E-0000z7-1P for 41625@debbugs.gnu.org; Sun, 31 May 2020 07:21:46 -0400 Received: from ti0006q161-2604.bb.online.no ([84.202.68.75]:37014 helo=localhost) by fencepost.gnu.org with esmtpsa (TLS1.2:RSA_AES_256_CBC_SHA1:256) (Exim 4.82) (envelope-from ) id 1jfM2D-0002xJ-Hh for 41625@debbugs.gnu.org; Sun, 31 May 2020 07:21:45 -0400 From: Marius Bakke In-Reply-To: <87k10swgyy.fsf@gnu.org> References: <87mu5owhxh.fsf@gnu.org> <87k10swgyy.fsf@gnu.org> Date: Sun, 31 May 2020 13:21:43 +0200 Message-ID: <87h7vwwdrs.fsf@gnu.org> MIME-Version: 1.0 Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha512; protocol="application/pgp-signature" X-Spam-Score: -1.4 (-) X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list X-Spam-Score: -2.4 (--) X-BeenThere: bug-guix@gnu.org List-Id: Bug reports for GNU Guix List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: bug-guix-bounces+larch=yhetil.org@gnu.org Sender: "bug-Guix" X-Scanner: scn0 Authentication-Results: aspmx1.migadu.com; dkim=none; dmarc=none; spf=pass (aspmx1.migadu.com: domain of bug-guix-bounces@gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=bug-guix-bounces@gnu.org X-Spam-Score: -3.11 X-TUID: eI9LCE03IgRL --=-=-= Content-Type: text/plain Marius Bakke writes: > 'guix offload test' passes without problems. Not so fast, running it in a loop reveals the crash. There is a trace file in /root/offloadtest.trace on Berlin with such an occurence. It looks like a timeout is reached shortly before the EOF error: 10139 poll([{fd=14, events=POLLIN|POLLOUT}], 1, 0) = 1 ([{fd=14, revents=POLLOUT}]) 10139 poll([{fd=14, events=POLLIN}], 1, 15000) = 0 (Timeout) 10139 write(2, "Backtrace:\n", 11) = 11 This seems to be from a different node than the one reported previously, as the preceding connect() was to this machine: 10139 connect(44, {sa_family=AF_INET, sin_port=htons(22), sin_addr=inet_addr("141.80.167.186")}, 16) = -1 EINPROGRESS (Operation now in progress) --=-=-= Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQEzBAEBCgAdFiEEu7At3yzq9qgNHeZDoqBt8qM6VPoFAl7Tk0cACgkQoqBt8qM6 VPpkSwgAuUZtpdzkttyqECe0BebW8+V/xeKAa06wXCk8rdVZhbAfmJ57MM4p6L/Q BVn3Qy3LBrZJ3IskgIUZXIByOoIPK15L5hyMUMVV5GDQrU+UDIBJNKH8H0o9XsJY 2DequT4SsQ7aF8njhA21xZ8XLvMk6pu7SPNZPLszvapDEM9kgA39DTx6lfxBLw0V D9v+pVQtuZqg37ge6jYBZrH1uoZm7vFbO1QXESVBUT4xmY5hjnsBpLUFcUOnuW1m C39lpgtBPwC1umLVgVoyCAB5XCb6i1LMyFQ1ysLLbkBXyCfDs0ZhHSZeZm/3hbAx n2POIAqxUseebhbqDjKHnYm57HckXA== =z0CC -----END PGP SIGNATURE----- --=-=-=--