* 'guix system vm-image' hangs
@ 2018-04-26 1:39 George myglc2 Clemmer
2018-04-26 3:37 ` Eric Bavier
0 siblings, 1 reply; 17+ messages in thread
From: George myglc2 Clemmer @ 2018-04-26 1:39 UTC (permalink / raw)
To: help-guix
'guix system vm-image' hangs on guix (GNU Guix) 0.14.0.4439-eb88e built
from source today. Please see log except below. It worked on guix (GNU
Guix) 0.14.0.4196-2c92a. built <2018-04-18 Wed>
TIA - George
Note: full log is avail.
g1@g1 ~/src/vm/vms/sysi20$ guix system vm-image --image-size=10G sysi19.scm
substitute: updating list of substitutes from 'https://mirror.hydra.gnu.org'... 100.0%
The following derivations will be built:
/gnu/store/s6k5yvpv7ynbrrzmxndga7y6w7zd0hcd-qemu-image.drv
/gnu/store/82gwqkkzdc7jwfs7v5442qz3mj3fw7bx-parameters.drv
/gnu/store/yngnp5b7c9316bkc2h1jqcgmkqj2j72z-init.drv
[...]
[ 0.558501] sr 1:0:0:0: Attached scsi generic sg0 type 5
[ 0.562147] Freeing unused kernel memory: 1780K
[ 0.562741] Write protecting the kernel read-only data: 18432k
[ 0.563853] Freeing unused kernel memory: 2024K
[ 0.565010] Freeing unused kernel memory: 216K
GC Warning: pthread_getattr_np or pthread_attr_getstack failed for main thread
GC Warning: Couldn't read /proc/stat
Welcome, this is GNU's early boot Guile.
Use '--repl' for an initrd REPL.
loading kernel modules...
[ 0.627471] usbcore: registered new interface driver usb-storage
[ 0.630380] usbcore: registered new interface driver uas
[ 0.637058] hidraw: raw HID events driver (C) Jiri Kosina
[ 0.638165] usbcore: registered new interface driver usbhid
[ 0.638838] usbhid: USB HID core driver
[ 0.646823] isci: Intel(R) C600 SAS Controller Driver - version 1.2.0
[ 0.674476] PCI Interrupt Link [LNKC] enabled at IRQ 11
[ 0.701700] PCI Interrupt Link [LNKD] enabled at IRQ 10
[ 0.729258] PCI Interrupt Link [LNKA] enabled at IRQ 10
[ 0.757009] PCI Interrupt Link [LNKB] enabled at IRQ 11
[ 0.815977] virtio_blk virtio5: [vda] 20971520 512-byte logical blocks (10.7 GB/10.0 GiB)
[ 0.827477] FS-Cache: Loaded
[ 0.830625] 9pnet: Installing 9P2000 support
[ 0.831776] 9p: Installing v9fs 9p2000 file system support
[ 0.832546] FS-Cache: Netfs '9p' registered for caching
configuring QEMU networking...
[ 0.846491] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
loading '/gnu/store/30bcjgk80467cgb8fjbpw3ldss5wmn2d-linux-vm-loader'...
[ 0.880302] random: fast init done
environment variable `PATH' set to `/gnu/store/1n3cvnxrz1m6jqc09d9m1grbfbs91kmv-qemu-minimal-2.12.0/bin:/gnu/store/h8670f6j1rawhhaz8wvdy5gv79lny0am-parted-3.2/sbin:/gnu/store/nm305rpb2mvridkyj4l3636nc9ql4lf9-e2fsprogs-1.43.6/bin:/gnu/store/nm305rpb2mvridkyj4l3636nc9ql4lf9-e2fsprogs-1.43.6/sbin:/gnu/store/0sq2nflm42x0znkv44add0gk82khkcb6-dosfstools-4.1/sbin:/gnu/store/0hl513mnpkhszm2hjai2w9cxmpxs0vgq-sed-4.4/bin:/gnu/store/1h44pkgdd7n6s3i2vjh54awsvfmc219j-grep-3.1/bin:/gnu/store/kgzvfby2ggi1xawsh5vjh4s93qk2dp9k-coreutils-8.28/bin:/gnu/store/k7r2m2wgj8x8jjhccwjsiimp0dlzxb7i-findutils-4.6.0/bin:/gnu/store/ahxc89r6npzf2bbl8yg5vdjicskzzjf3-gawk-4.1.4/bin:/gnu/store/cwwvdxd9d778a2xp8vbb38vl62rx992g-guix-0.14.0-11.ab85cf7/bin:/gnu/store/cwwvdxd9d778a2xp8vbb38vl62rx992g-guix-0.14.0-11.ab85cf7/sbin
'
creating partition table with 2 partitions (10190.0 MiB, 40.0 MiB)...
[ 1.344115] tsc: Refined TSC clocksource calibration: 3392.348 MHz
[ 1.344865] clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x30e6121e742, max_idle_ns: 440795321217 ns
[ 1.856062] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
C-c C-c
g1@g1 ~/src/vm/vms/sysi20$ guix --version
guix (GNU Guix) 0.14.0.4439-eb88e
^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: 'guix system vm-image' hangs
2018-04-26 1:39 'guix system vm-image' hangs George myglc2 Clemmer
@ 2018-04-26 3:37 ` Eric Bavier
2018-04-26 4:07 ` George myglc2 Clemmer
0 siblings, 1 reply; 17+ messages in thread
From: Eric Bavier @ 2018-04-26 3:37 UTC (permalink / raw)
To: George myglc2 Clemmer; +Cc: help-guix
[-- Attachment #1: Type: text/plain, Size: 2037 bytes --]
Hi George,
I've seen the same lately with 'guix system vm':
On Wed, 25 Apr 2018 21:39:30 -0400
George myglc2 Clemmer <myglc2@gmail.com> wrote:
> 'guix system vm-image' hangs on guix (GNU Guix) 0.14.0.4439-eb88e built
> from source today. Please see log except below. It worked on guix (GNU
> Guix) 0.14.0.4196-2c92a. built <2018-04-18 Wed>
>
> TIA - George
>
[...]
> environment variable `PATH' set to `/gnu/store/1n3cvnxrz1m6jqc09d9m1grbfbs91kmv-qemu-minimal-2.12.0/bin:/gnu/store/h8670f6j1rawhhaz8wvdy5gv79lny0am-parted-3.2/sbin:/gnu/store/nm305rpb2mvridkyj4l3636nc9ql4lf9-e2fsprogs-1.43.6/bin:/gnu/store/nm305rpb2mvridkyj4l3636nc9ql4lf9-e2fsprogs-1.43.6/sbin:/gnu/store/0sq2nflm42x0znkv44add0gk82khkcb6-dosfstools-4.1/sbin:/gnu/store/0hl513mnpkhszm2hjai2w9cxmpxs0vgq-sed-4.4/bin:/gnu/store/1h44pkgdd7n6s3i2vjh54awsvfmc219j-grep-3.1/bin:/gnu/store/kgzvfby2ggi1xawsh5vjh4s93qk2dp9k-coreutils-8.28/bin:/gnu/store/k7r2m2wgj8x8jjhccwjsiimp0dlzxb7i-findutils-4.6.0/bin:/gnu/store/ahxc89r6npzf2bbl8yg5vdjicskzzjf3-gawk-4.1.4/bin:/gnu/store/cwwvdxd9d778a2xp8vbb38vl62rx992g-guix-0.14.0-11.ab85cf7/bin:/gnu/store/cwwvdxd9d778a2xp8vbb38vl62rx992g-guix-0.14.0-11.ab85cf7/sbin'
> creating partition table with 2 partitions (10190.0 MiB, 40.0 MiB)...
> [ 1.344115] tsc: Refined TSC clocksource calibration: 3392.348 MHz
> [ 1.344865] clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x30e6121e742, max_idle_ns: 440795321217 ns
> [ 1.856062] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
> C-c C-c
Same log output on my end.
> g1@g1 ~/src/vm/vms/sysi20$ guix --version
> guix (GNU Guix) 0.14.0.4439-eb88e
>
I bisected the git repo to commit:
```
commit ba39d3280759fb20a4ff0092a5afac721a5fa769
Author: Mark H Weaver <mhw@netris.org>
Date: Tue Apr 24 16:51:45 2018 -0400
gnu: linux-libre: Update to 4.16.4.
* gnu/packages/linux.scm (%linux-libre-version): Update to 4.16.4.
(%linux-libre-hash): Update hash.
```
Perhaps we should open a bug.
`~Eric
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 833 bytes --]
^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: 'guix system vm-image' hangs
2018-04-26 3:37 ` Eric Bavier
@ 2018-04-26 4:07 ` George myglc2 Clemmer
2018-04-26 14:09 ` bug#31268: " Ludovic Courtès
` (2 more replies)
0 siblings, 3 replies; 17+ messages in thread
From: George myglc2 Clemmer @ 2018-04-26 4:07 UTC (permalink / raw)
To: bug-guix; +Cc: help-guix
[-- Attachment #1: Type: text/plain, Size: 2256 bytes --]
On 04/26/2018 at 03:37 Eric Bavier writes:
> Hi George,
>
> I've seen the same lately with 'guix system vm':
>
> On Wed, 25 Apr 2018 21:39:30 -0400
> George myglc2 Clemmer <myglc2@gmail.com> wrote:
>
>> 'guix system vm-image' hangs on guix (GNU Guix) 0.14.0.4439-eb88e built
>> from source today. Please see log except below. It worked on guix (GNU
>> Guix) 0.14.0.4196-2c92a. built <2018-04-18 Wed>
>>
>> TIA - George
>>
> [...]
>> environment variable `PATH' set to `/gnu/store/1n3cvnxrz1m6jqc09d9m1grbfbs91kmv-qemu-minimal-2.12.0/bin:/gnu/store/h8670f6j1rawhhaz8wvdy5gv79lny0am-parted-3.2/sbin:/gnu/store/nm305rpb2mvridkyj4l3636nc9ql4lf9-e2fsprogs-1.43.6/bin:/gnu/store/nm305rpb2mvridkyj4l3636nc9ql4lf9-e2fsprogs-1.43.6/sbin:/gnu/store/0sq2nflm42x0znkv44add0gk82khkcb6-dosfstools-4.1/sbin:/gnu/store/0hl513mnpkhszm2hjai2w9cxmpxs0vgq-sed-4.4/bin:/gnu/store/1h44pkgdd7n6s3i2vjh54awsvfmc219j-grep-3.1/bin:/gnu/store/kgzvfby2ggi1xawsh5vjh4s93qk2dp9k-coreutils-8.28/bin:/gnu/store/k7r2m2wgj8x8jjhccwjsiimp0dlzxb7i-findutils-4.6.0/bin:/gnu/store/ahxc89r6npzf2bbl8yg5vdjicskzzjf3-gawk-4.1.4/bin:/gnu/store/cwwvdxd9d778a2xp8vbb38vl62rx992g-guix-0.14.0-11.ab85cf7/bin:/gnu/store/cwwvdxd9d778a2xp8vbb38vl62rx992g-guix-0.14.0-11.ab85cf7/s
bin'
>> creating partition table with 2 partitions (10190.0 MiB, 40.0 MiB)...
>> [ 1.344115] tsc: Refined TSC clocksource calibration: 3392.348 MHz
>> [ 1.344865] clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x30e6121e742, max_idle_ns: 440795321217 ns
>> [ 1.856062] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
>> C-c C-c
>
> Same log output on my end.
>
>> g1@g1 ~/src/vm/vms/sysi20$ guix --version
>> guix (GNU Guix) 0.14.0.4439-eb88e
>>
>
> I bisected the git repo to commit:
>
> ```
> commit ba39d3280759fb20a4ff0092a5afac721a5fa769
> Author: Mark H Weaver <mhw@netris.org>
> Date: Tue Apr 24 16:51:45 2018 -0400
>
> gnu: linux-libre: Update to 4.16.4.
>
> * gnu/packages/linux.scm (%linux-libre-version): Update to 4.16.4.
> (%linux-libre-hash): Update hash.
>
> ```
>
> Perhaps we should open a bug.
>
> `~Eric
Thank you Eric! Actually I meant to send it to bug-guix@gnu.org
before. Here is something that fails here.
guix system vm-image --image-size=10G sysi19.scm
[-- Attachment #2: sysi19.scm --]
[-- Type: application/octet-stream, Size: 1501 bytes --]
;; -*-Scheme-*-
;;; minimal 'guix system vm-image' config ~ sys.scm
(define sys-packages
'(
"cups"
"git"
"glibc-utf8-locales"
"nss-certs"
"openssh"
"screen"
))
(use-modules (gnu))
(use-modules (gnu packages))
(use-modules (gnu system nss))
(use-service-modules
avahi
networking ; dhcp-client-service
ssh ; openssh-service-type
)
(operating-system
(host-name "sysi19")
(timezone "America/New_York")
(locale "en_US.utf8")
(bootloader (grub-configuration (target "/dev/sda")))
(file-systems (cons (file-system
(device "g1sd")
(title 'label)
(mount-point "/")
(type "ext4"))
%base-file-systems))
(users (cons*
(user-account
(name "g1")
(group "users")
(supplementary-groups '("wheel"))
(home-directory "/home/g1"))
(user-account
(name "al")
(group "users")
(supplementary-groups '("wheel"))
(home-directory "/home/al"))
%base-user-accounts))
(packages (append (map specification->package sys-packages)
%base-packages))
(services (cons*
(dhcp-client-service)
(service openssh-service-type
(openssh-configuration
(x11-forwarding? #t)
(permit-root-login #t)
(allow-empty-passwords? #t)
(authorized-keys
`(
("g1" ,(local-file "glc.pub"))
("al" ,(local-file "glc.pub"))
("root" ,(local-file "glc.pub"))))))
(avahi-service)
(ntp-service)
%base-services))
(name-service-switch %mdns-host-lookup-nss))
^ permalink raw reply [flat|nested] 17+ messages in thread
* bug#31268: 'guix system vm-image' hangs
2018-04-26 4:07 ` George myglc2 Clemmer
@ 2018-04-26 14:09 ` Ludovic Courtès
2018-04-30 8:23 ` Mark H Weaver
2018-04-30 8:23 ` Mark H Weaver
2 siblings, 0 replies; 17+ messages in thread
From: Ludovic Courtès @ 2018-04-26 14:09 UTC (permalink / raw)
To: George myglc2 Clemmer; +Cc: Eric Bavier, 31268
Hello,
George myglc2 Clemmer <myglc2@gmail.com> skribis:
> Thank you Eric! Actually I meant to send it to bug-guix@gnu.org
> before. Here is something that fails here.
>
> guix system vm-image --image-size=10G sysi19.scm
As of 37b9be5878d1694967a41d313de97f7a957df120 I see that ‘guix system
vm’ or “make check-system TESTS=basic” hang. Specifically, the VM that
creates the image hangs like this:
--8<---------------cut here---------------start------------->8---
Welcome, this is GNU's early boot Guile.
Use '--repl' for an initrd REPL.
loading kernel modules...
[ 0.618457] usbcore: registered new interface driver usb-storage
[ 0.620812] usbcore: registered new interface driver uas
[ 0.626976] hidraw: raw HID events driver (C) Jiri Kosina
[ 0.628093] usbcore: registered new interface driver usbhid
[ 0.628804] usbhid: USB HID core driver
[ 0.635125] isci: Intel(R) C600 SAS Controller Driver - version 1.2.0
[ 0.654740] PCI Interrupt Link [LNKC] enabled at IRQ 11
[ 0.673721] PCI Interrupt Link [LNKD] enabled at IRQ 10
[ 0.693204] PCI Interrupt Link [LNKA] enabled at IRQ 10
[ 0.714857] PCI Interrupt Link [LNKB] enabled at IRQ 11
[ 0.759651] virtio_blk virtio5: [vda] 143360 512-byte logical blocks (73.4 MB/70.0 MiB)
[ 0.765620] FS-Cache: Loaded
[ 0.767868] 9pnet: Installing 9P2000 support
[ 0.768899] 9p: Installing v9fs 9p2000 file system support
[ 0.769556] FS-Cache: Netfs '9p' registered for caching
configuring QEMU networking...
[ 0.780494] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
loading '/gnu/store/d116816xkzfaa7y1d2srvbxy5ip5cm12-linux-vm-loader'...
[ 0.802603] random: fast init done
environment variable `PATH' set to `/gnu/store/1n3cvnxrz1m6jqc09d9m1grbfbs91kmv-qemu-minimal-2.12.0/bin:/gnu/store/h8670f6j1rawhhaz8wvdy5gv79lny0am-parted-3.2/sbin:/gnu/store/nm305rpb2mvridkyj4l3636nc9ql4lf9-e2fsprogs-1.43.6/bin:/gnu/store/nm305rpb2mvridkyj4l3636nc9ql4lf9-e2fsprogs-1.43.6/sbin:/gnu/store/0sq2nflm42x0znkv44add0gk82khkcb6-dosfstools-4.1/sbin:/gnu/store/0hl513mnpkhszm2hjai2w9cxmpxs0vgq-sed-4.4/bin:/gnu/store/1h44pkgdd7n6s3i2vjh54awsvfmc219j-grep-3.1/bin:/gnu/store/kgzvfby2ggi1xawsh5vjh4s93qk2dp9k-coreutils-8.28/bin:/gnu/store/k7r2m2wgj8x8jjhccwjsiimp0dlzxb7i-findutils-4.6.0/bin:/gnu/store/ahxc89r6npzf2bbl8yg5vdjicskzzjf3-gawk-4.1.4/bin'
creating partition table with 2 partitions (20.0 MiB, 40.0 MiB)...
[ 1.344130] tsc: Refined TSC clocksource calibration: 2808.014 MHz
[ 1.345186] clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x2879d389cc4, max_idle_ns: 440795324601 ns
[ 1.792320] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
--8<---------------cut here---------------end--------------->8---
Reverting ba39d3280759fb20a4ff0092a5afac721a5fa769 (“gnu: linux-libre:
Update to 4.16.4.”) solves the problem for me.
Normally what we see is something like this:
--8<---------------cut here---------------start------------->8---
loading '/gnu/store/4i02v1lvw9nwzcfs5l1il9grhkw17iqm-linux-vm-loader'...
environment variable `PATH' set to `/gnu/store/1n3cvnxrz1m6jqc09d9m1grbfbs91kmv-qemu-minimal-2.12.0/bin:/gnu/store/h8670f6j1rawhhaz8wvdy5gv79lny0am-parted-3.2/sbin:/gnu/store/nm305rpb2mvridkyj4l3636nc9ql4lf9-e2fsprogs-1.43.6/bin:/gnu/store/nm305rpb2mvridkyj4l3636nc9ql4lf9-e2fsprogs-1.43.6/sbin:/gnu/store/0sq2nflm42x0znkv44add0gk82khkcb6-dosfstools-4.1/sbin:/gnu/store/0hl513mnpkhszm2hjai2w9cxmpxs0vgq-sed-4.4/bin:/gnu/store/1h44pkgdd7n6s3i2vjh54awsvfmc219j-grep-3.1/bin:/gnu/store/kgzvfby2ggi1xawsh5vjh4s93qk2dp9k-coreutils-8.28/bin:/gnu/store/k7r2m2wgj8x8jjhccwjsiimp0dlzxb7i-findutils-4.6.0/bin:/gnu/store/ahxc89r6npzf2bbl8yg5vdjicskzzjf3-gawk-4.1.4/bin'
creating partition table with 2 partitions (20.0 MiB, 40.0 MiB)...
Warning: The resulting partition is not properly aligned for best performance.
creating ext4 partition...
mke2fs 1.43.6 (29-Aug-2017)
ext2fs_check_if_mount: Can't check if filesystem is mounted due to missing mtab file while determining whether /dev/vda1 is mounted.
Creating filesystem with 20480 1k blocks and 5136 inodes
Filesystem UUID: bb8da7fb-04b2-437e-887a-f468da978a40
Superblock backups stored on blocks:
8193
Allocating group tables: done
Writing inode tables: done
Creating journal (1024 blocks): done
Writing superblocks and filesystem accounting information: done
[ 0.979292] EXT4-fs (vda1): mounted filesystem with ordered data mode. Opts: (null)
…
--8<---------------cut here---------------end--------------->8---
So it seems that the VM image hangs when trying to run Parted.
Mark, are you aware of anything particular that could explain this?
Perhaps a regression/incompatible change in 9P or virtio?
Ludo’.
^ permalink raw reply [flat|nested] 17+ messages in thread
* bug#31268: 'guix system vm-image' hangs
2018-04-26 4:07 ` George myglc2 Clemmer
2018-04-26 14:09 ` bug#31268: " Ludovic Courtès
@ 2018-04-30 8:23 ` Mark H Weaver
2018-04-30 8:23 ` Mark H Weaver
2 siblings, 0 replies; 17+ messages in thread
From: Mark H Weaver @ 2018-04-30 8:23 UTC (permalink / raw)
To: George myglc2 Clemmer; +Cc: help-guix, Eric Bavier, 31268
George myglc2 Clemmer <myglc2@gmail.com> writes:
> On 04/26/2018 at 03:37 Eric Bavier writes:
>
>> Hi George,
>>
>> I've seen the same lately with 'guix system vm':
>>
>> On Wed, 25 Apr 2018 21:39:30 -0400
>> George myglc2 Clemmer <myglc2@gmail.com> wrote:
>>
>>> 'guix system vm-image' hangs on guix (GNU Guix) 0.14.0.4439-eb88e built
>>> from source today. Please see log except below. It worked on guix (GNU
>>> Guix) 0.14.0.4196-2c92a. built <2018-04-18 Wed>
[...]
>> I bisected the git repo to commit:
>>
>> ```
>> commit ba39d3280759fb20a4ff0092a5afac721a5fa769
>> Author: Mark H Weaver <mhw@netris.org>
>> Date: Tue Apr 24 16:51:45 2018 -0400
>>
>> gnu: linux-libre: Update to 4.16.4.
>>
>> * gnu/packages/linux.scm (%linux-libre-version): Update to 4.16.4.
>> (%linux-libre-hash): Update hash.
FYI, I just pushed commit 8c21c64e59d3f4d223d8aeef91f06fdde7de1ab7 which
updates linux-libre to 4.16.6. Would you like to see if the problem
still persists?
Mark
^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: bug#31268: 'guix system vm-image' hangs
2018-04-26 4:07 ` George myglc2 Clemmer
2018-04-26 14:09 ` bug#31268: " Ludovic Courtès
2018-04-30 8:23 ` Mark H Weaver
@ 2018-04-30 8:23 ` Mark H Weaver
2018-04-30 14:18 ` Ludovic Courtès
2 siblings, 1 reply; 17+ messages in thread
From: Mark H Weaver @ 2018-04-30 8:23 UTC (permalink / raw)
To: George myglc2 Clemmer; +Cc: help-guix, 31268
George myglc2 Clemmer <myglc2@gmail.com> writes:
> On 04/26/2018 at 03:37 Eric Bavier writes:
>
>> Hi George,
>>
>> I've seen the same lately with 'guix system vm':
>>
>> On Wed, 25 Apr 2018 21:39:30 -0400
>> George myglc2 Clemmer <myglc2@gmail.com> wrote:
>>
>>> 'guix system vm-image' hangs on guix (GNU Guix) 0.14.0.4439-eb88e built
>>> from source today. Please see log except below. It worked on guix (GNU
>>> Guix) 0.14.0.4196-2c92a. built <2018-04-18 Wed>
[...]
>> I bisected the git repo to commit:
>>
>> ```
>> commit ba39d3280759fb20a4ff0092a5afac721a5fa769
>> Author: Mark H Weaver <mhw@netris.org>
>> Date: Tue Apr 24 16:51:45 2018 -0400
>>
>> gnu: linux-libre: Update to 4.16.4.
>>
>> * gnu/packages/linux.scm (%linux-libre-version): Update to 4.16.4.
>> (%linux-libre-hash): Update hash.
FYI, I just pushed commit 8c21c64e59d3f4d223d8aeef91f06fdde7de1ab7 which
updates linux-libre to 4.16.6. Would you like to see if the problem
still persists?
Mark
^ permalink raw reply [flat|nested] 17+ messages in thread
* bug#31268: 'guix system vm-image' hangs
2018-04-30 8:23 ` Mark H Weaver
@ 2018-04-30 14:18 ` Ludovic Courtès
2018-04-30 16:36 ` Mark H Weaver
0 siblings, 1 reply; 17+ messages in thread
From: Ludovic Courtès @ 2018-04-30 14:18 UTC (permalink / raw)
To: Mark H Weaver; +Cc: George myglc2 Clemmer, help-guix, 31268
[-- Attachment #1: Type: text/plain, Size: 695 bytes --]
Hello Mark,
Mark H Weaver <mhw@netris.org> skribis:
> FYI, I just pushed commit 8c21c64e59d3f4d223d8aeef91f06fdde7de1ab7 which
> updates linux-libre to 4.16.6. Would you like to see if the problem
> still persists?
It does.
I instrumented the code to see what happens. Opening /dev/vda works
fine, invoking “parted --version” works, so it’s really just ‘parted’
that hangs when asked to do the real thing (with 0% CPU consumption.)
However, if we strace it as with the patch below, it succeeds. It
doesn’t seem to be a simple timing issue because adding (sleep 2) before
the parted invocation doesn’t make a difference.
To be continued…
Ludo’.
[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: Type: text/x-patch, Size: 1526 bytes --]
diff --git a/gnu/build/vm.scm b/gnu/build/vm.scm
index 527b4c495..b73c8f912 100644
--- a/gnu/build/vm.scm
+++ b/gnu/build/vm.scm
@@ -242,9 +242,21 @@ actual /dev name based on DEVICE."
partition-size)
partitions)
", "))
- (apply invoke "parted" "--script"
+ (pk 'parted (which "parted"))
+ (pk 'parted2 (stat (which "parted")))
+ (pk 'opts device partitions offset)
+ (pk 'actual-options "parted" "--script"
device "mklabel" label-type
(options partitions offset))
+ (pk 'stat device (stat device))
+ (invoke "parted" "--version")
+ ;; (pk 'open-device device (open-fdes device O_WRONLY))
+ (pk 'parted)
+ (apply invoke "strace" "-s" "123"
+ "parted" "--script"
+ device "mklabel" label-type
+ (options partitions offset))
+ (pk 'parted-done)
;; Set the 'device' field of each partition.
(reverse
diff --git a/gnu/system/vm.scm b/gnu/system/vm.scm
index 09a11af86..ba54a71dd 100644
--- a/gnu/system/vm.scm
+++ b/gnu/system/vm.scm
@@ -304,7 +304,7 @@ the image."
(ice-9 binary-ports))
(let ((inputs
- '#$(append (list qemu parted e2fsprogs dosfstools)
+ '#$(append (list strace qemu parted e2fsprogs dosfstools)
(map canonical-package
(list sed grep coreutils findutils gawk))
(if register-closures? (list guix) '())))
^ permalink raw reply related [flat|nested] 17+ messages in thread
* bug#31268: 'guix system vm-image' hangs
2018-04-30 14:18 ` Ludovic Courtès
@ 2018-04-30 16:36 ` Mark H Weaver
2018-05-18 14:22 ` Clément Lassieur
0 siblings, 1 reply; 17+ messages in thread
From: Mark H Weaver @ 2018-04-30 16:36 UTC (permalink / raw)
To: Ludovic Courtès; +Cc: George myglc2 Clemmer, 31268
ludo@gnu.org (Ludovic Courtès) writes:
> Mark H Weaver <mhw@netris.org> skribis:
>
>> FYI, I just pushed commit 8c21c64e59d3f4d223d8aeef91f06fdde7de1ab7 which
>> updates linux-libre to 4.16.6. Would you like to see if the problem
>> still persists?
>
> It does.
I suggest doing a git bisect on the 4.16.y branch of the linux-stable
git repository, between the 4.16.3 and 4.16.4 tags.
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/?h=linux-4.16.y
Mark
^ permalink raw reply [flat|nested] 17+ messages in thread
* bug#31268: 'guix system vm-image' hangs
2018-04-30 16:36 ` Mark H Weaver
@ 2018-05-18 14:22 ` Clément Lassieur
2018-05-18 16:39 ` Ludovic Courtès
0 siblings, 1 reply; 17+ messages in thread
From: Clément Lassieur @ 2018-05-18 14:22 UTC (permalink / raw)
To: Mark H Weaver; +Cc: George myglc2 Clemmer, 31268
Hi,
Mark H Weaver <mhw@netris.org> writes:
> ludo@gnu.org (Ludovic Courtès) writes:
>
>> Mark H Weaver <mhw@netris.org> skribis:
>>
>>> FYI, I just pushed commit 8c21c64e59d3f4d223d8aeef91f06fdde7de1ab7 which
>>> updates linux-libre to 4.16.6. Would you like to see if the problem
>>> still persists?
>>
>> It does.
>
> I suggest doing a git bisect on the 4.16.y branch of the linux-stable
> git repository, between the 4.16.3 and 4.16.4 tags.
I did it, here is the result:
--8<---------------cut here---------------start------------->8---
cd8d7a5778a4abf76ee8fe8f1bfcf78976029f8d is the first bad commit
commit cd8d7a5778a4abf76ee8fe8f1bfcf78976029f8d
Author: Theodore Ts'o <tytso@mit.edu>
Date: Wed Apr 11 13:27:52 2018 -0400
random: fix crng_ready() test
commit 43838a23a05fbd13e47d750d3dfd77001536dd33 upstream.
The crng_init variable has three states:
0: The CRNG is not initialized at all
1: The CRNG has a small amount of entropy, hopefully good enough for
early-boot, non-cryptographical use cases
2: The CRNG is fully initialized and we are sure it is safe for
cryptographic use cases.
The crng_ready() function should only return true once we are in the
last state. This addresses CVE-2018-1108.
Reported-by: Jann Horn <jannh@google.com>
Fixes: e192be9d9a30 ("random: replace non-blocking pool...")
Cc: stable@kernel.org # 4.8+
Signed-off-by: Theodore Ts'o <tytso@mit.edu>
Reviewed-by: Jann Horn <jannh@google.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
:040000 040000 4bdc62a4604b0a754614e8601ce794f316e83622 da682af7d9d779f193becb7757a8722a71e5d85d M drivers
--8<---------------cut here---------------end--------------->8---
Clément
^ permalink raw reply [flat|nested] 17+ messages in thread
* bug#31268: 'guix system vm-image' hangs
2018-05-18 14:22 ` Clément Lassieur
@ 2018-05-18 16:39 ` Ludovic Courtès
2018-05-18 22:03 ` Clément Lassieur
2018-05-22 16:23 ` Ludovic Courtès
0 siblings, 2 replies; 17+ messages in thread
From: Ludovic Courtès @ 2018-05-18 16:39 UTC (permalink / raw)
To: Clément Lassieur; +Cc: George myglc2 Clemmer, 31268
Hi!
Clément Lassieur <clement@lassieur.org> skribis:
> Mark H Weaver <mhw@netris.org> writes:
[...]
>> I suggest doing a git bisect on the 4.16.y branch of the linux-stable
>> git repository, between the 4.16.3 and 4.16.4 tags.
>
> I did it, here is the result:
Impressive, thanks a lot! Did you have a script to do that or
something?
> cd8d7a5778a4abf76ee8fe8f1bfcf78976029f8d is the first bad commit
> commit cd8d7a5778a4abf76ee8fe8f1bfcf78976029f8d
> Author: Theodore Ts'o <tytso@mit.edu>
> Date: Wed Apr 11 13:27:52 2018 -0400
>
> random: fix crng_ready() test
>
> commit 43838a23a05fbd13e47d750d3dfd77001536dd33 upstream.
>
> The crng_init variable has three states:
>
> 0: The CRNG is not initialized at all
> 1: The CRNG has a small amount of entropy, hopefully good enough for
> early-boot, non-cryptographical use cases
> 2: The CRNG is fully initialized and we are sure it is safe for
> cryptographic use cases.
>
> The crng_ready() function should only return true once we are in the
> last state. This addresses CVE-2018-1108.
What happens I think is that libparted/fs/r/fat/fat.c:fat_create calls
‘generate_random_uint32’, which in turn indirectly calls
‘get_random_bytes’ from libuuid (package ‘e2fsprogs’). And I suppose
that’s where it blocks, even though it’s supposed to be using
/dev/urandom, which is not supposed to block.
To be continued…
Ludo’.
^ permalink raw reply [flat|nested] 17+ messages in thread
* bug#31268: 'guix system vm-image' hangs
2018-05-18 16:39 ` Ludovic Courtès
@ 2018-05-18 22:03 ` Clément Lassieur
2018-05-18 22:13 ` Ludovic Courtès
2018-05-22 16:23 ` Ludovic Courtès
1 sibling, 1 reply; 17+ messages in thread
From: Clément Lassieur @ 2018-05-18 22:03 UTC (permalink / raw)
To: Ludovic Courtès; +Cc: George myglc2 Clemmer, 31268
Ludovic Courtès <ludo@gnu.org> writes:
> Hi!
>
> Clément Lassieur <clement@lassieur.org> skribis:
>
>> Mark H Weaver <mhw@netris.org> writes:
>
> [...]
>
>>> I suggest doing a git bisect on the 4.16.y branch of the linux-stable
>>> git repository, between the 4.16.3 and 4.16.4 tags.
>>
>> I did it, here is the result:
>
> Impressive, thanks a lot! Did you have a script to do that or
> something?
You're welcome! I just used the "git bisect" command on a local git
repository that was pointed to by linux-libre <origin>. Automating it
with "git bisect run" wasn't worth it because there were only 8 tests to
do (log2(196)).
^ permalink raw reply [flat|nested] 17+ messages in thread
* bug#31268: 'guix system vm-image' hangs
2018-05-18 22:03 ` Clément Lassieur
@ 2018-05-18 22:13 ` Ludovic Courtès
0 siblings, 0 replies; 17+ messages in thread
From: Ludovic Courtès @ 2018-05-18 22:13 UTC (permalink / raw)
To: Clément Lassieur; +Cc: George myglc2 Clemmer, 31268
Clément Lassieur <clement@lassieur.org> skribis:
> Ludovic Courtès <ludo@gnu.org> writes:
>
>> Hi!
>>
>> Clément Lassieur <clement@lassieur.org> skribis:
>>
>>> Mark H Weaver <mhw@netris.org> writes:
>>
>> [...]
>>
>>>> I suggest doing a git bisect on the 4.16.y branch of the linux-stable
>>>> git repository, between the 4.16.3 and 4.16.4 tags.
>>>
>>> I did it, here is the result:
>>
>> Impressive, thanks a lot! Did you have a script to do that or
>> something?
>
> You're welcome! I just used the "git bisect" command on a local git
> repository that was pointed to by linux-libre <origin>. Automating it
> with "git bisect run" wasn't worth it because there were only 8 tests to
> do (log2(196)).
Nice, I was expecting it to require more tests. Thanks again!
Ludo’.
^ permalink raw reply [flat|nested] 17+ messages in thread
* bug#31268: 'guix system vm-image' hangs
2018-05-18 16:39 ` Ludovic Courtès
2018-05-18 22:03 ` Clément Lassieur
@ 2018-05-22 16:23 ` Ludovic Courtès
2018-05-22 18:45 ` Efraim Flashner
2018-05-22 22:55 ` Mark H Weaver
1 sibling, 2 replies; 17+ messages in thread
From: Ludovic Courtès @ 2018-05-22 16:23 UTC (permalink / raw)
To: Clément Lassieur; +Cc: 31268, George myglc2 Clemmer
[-- Attachment #1: Type: text/plain, Size: 2434 bytes --]
Hello!
(+Cc: Leo for randomness input.)
ludo@gnu.org (Ludovic Courtès) skribis:
> Clément Lassieur <clement@lassieur.org> skribis:
>
>> Mark H Weaver <mhw@netris.org> writes:
>
> [...]
>
>>> I suggest doing a git bisect on the 4.16.y branch of the linux-stable
>>> git repository, between the 4.16.3 and 4.16.4 tags.
>>
>> I did it, here is the result:
>
> Impressive, thanks a lot! Did you have a script to do that or
> something?
>
>> cd8d7a5778a4abf76ee8fe8f1bfcf78976029f8d is the first bad commit
>> commit cd8d7a5778a4abf76ee8fe8f1bfcf78976029f8d
>> Author: Theodore Ts'o <tytso@mit.edu>
>> Date: Wed Apr 11 13:27:52 2018 -0400
>>
>> random: fix crng_ready() test
>>
>> commit 43838a23a05fbd13e47d750d3dfd77001536dd33 upstream.
>>
>> The crng_init variable has three states:
>>
>> 0: The CRNG is not initialized at all
>> 1: The CRNG has a small amount of entropy, hopefully good enough for
>> early-boot, non-cryptographical use cases
>> 2: The CRNG is fully initialized and we are sure it is safe for
>> cryptographic use cases.
>>
>> The crng_ready() function should only return true once we are in the
>> last state. This addresses CVE-2018-1108.
>
> What happens I think is that libparted/fs/r/fat/fat.c:fat_create calls
> ‘generate_random_uint32’, which in turn indirectly calls
> ‘get_random_bytes’ from libuuid (package ‘e2fsprogs’). And I suppose
> that’s where it blocks, even though it’s supposed to be using
> /dev/urandom, which is not supposed to block.
I was looking at the wrong code: we’re using libuuid from util-linux,
which in turn uses getrandom(2). Since it doesn’t pass the
GRND_NONBLOCK flag, it ends up blocking forever because too little
entropy is available in the VM.
The following patches work around that:
1. Parted now explicitly uses getrandom(2) with GRND_NONBLOCK instead
of libuuid’s ‘uuid_generate’, which is good enough for this
purpose. I’ll submit it upstream.
2. e2fsprogs is changed to use a libuuid that passes GRND_NONBLOCK.
It does the job, but it’s quite inelegant.
Another approach I looked at was to seed the VM’s PRNG from /dev/hwrng,
which I thought was connected to the host via ‘virtio-rng-pci’, but I
get ENODEV while trying to read from /dev/hwrng in the guest like this:
[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: Type: text/x-patch, Size: 1008 bytes --]
diff --git a/gnu/system/vm.scm b/gnu/system/vm.scm
index b6561dfc7..3bfd6b4ca 100644
--- a/gnu/system/vm.scm
+++ b/gnu/system/vm.scm
@@ -319,6 +319,18 @@ the image."
(set-path-environment-variable "PATH" '("bin" "sbin") inputs)
+ ;; Try writing from /dev/hwrng into /dev/urandom.
+ ;; It seems that the file /dev/hwrng always exists, even
+ ;; when there is no hardware random number generator
+ ;; available. So, we handle a failed read or any other error
+ ;; reported by the operating system.
+ (let ((buf (call-with-input-file "/dev/hwrng"
+ (lambda (hwrng)
+ (get-bytevector-n hwrng 512)))))
+ (call-with-output-file "/dev/urandom"
+ (lambda (urandom)
+ (put-bytevector urandom buf))))
+
(let* ((graphs '#$(match inputs
(((names . _) ...)
names)))
[-- Attachment #3: Type: text/plain, Size: 160 bytes --]
Am I missing something, Leo?
In short, we’re almost done with this bug, now we just need to make sure
we have a reasonable fix.
Thanks,
Ludo’.
[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #4: 0003-gnu-e2fsprogs-Use-libuuid-with-non-blocking-random.patch --]
[-- Type: text/x-patch, Size: 3009 bytes --]
From 43357218f024b251fc2b741dc3e8bdc4c001051f Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Ludovic=20Court=C3=A8s?= <ludo@gnu.org>
Date: Tue, 22 May 2018 18:07:08 +0200
Subject: [PATCH 3/3] gnu: e2fsprogs: Use libuuid with non-blocking random.
Partly fixes <https://bugs.gnu.org/31268>.
* gnu/packages/linux.scm (util-linux/libuuid-non-blocking-random): New
variable.
(e2fsprogs)[inputs]: Use it instead of UTIL-LINUX.
---
gnu/packages/linux.scm | 17 ++++++++++++++++-
...util-linux-libuuid-non-blocking-random.patch | 15 +++++++++++++++
2 files changed, 31 insertions(+), 1 deletion(-)
create mode 100644 gnu/packages/patches/util-linux-libuuid-non-blocking-random.patch
diff --git a/gnu/packages/linux.scm b/gnu/packages/linux.scm
index bb4e00394..c93947e68 100644
--- a/gnu/packages/linux.scm
+++ b/gnu/packages/linux.scm
@@ -671,6 +671,20 @@ block devices, UUIDs, TTYs, and many other tools.")
(append (origin-patches (package-source util-linux))
(search-patches "util-linux-CVE-2018-7738.patch")))))))
+(define-public util-linux/libuuid-non-blocking-random
+ ;; Package variant where libuuid uses non-blocking (weak) random. See
+ ;; <https://bugs.gnu.org/31268>.
+ (package
+ (inherit util-linux)
+ (name "util-linux-weak-random")
+ (source (let ((source (package-source util-linux)))
+ (origin
+ (inherit source)
+ (patches (append (search-patches
+ "util-linux-libuuid-non-blocking-random.patch")
+ (origin-patches source))))))
+ (properties '((hidden? . #t)))))
+
(define-public ddate
(package
(name "ddate")
@@ -779,7 +793,8 @@ slabtop, and skill.")
(base32
"00ilv65dzcgiap435j89xk86shf7rrav3wsik7cahy789qijdcn9"))))
(build-system gnu-build-system)
- (inputs `(("util-linux" ,util-linux)))
+ ;; Arrange so that 'mke2fs' doesn't wait: <https://bugs.gnu.org/31268>.
+ (inputs `(("util-linux" ,util-linux/libuuid-non-blocking-random)))
(native-inputs `(("pkg-config" ,pkg-config)
("texinfo" ,texinfo) ;for the libext2fs Info manual
diff --git a/gnu/packages/patches/util-linux-libuuid-non-blocking-random.patch b/gnu/packages/patches/util-linux-libuuid-non-blocking-random.patch
new file mode 100644
index 000000000..c0b3ea24d
--- /dev/null
+++ b/gnu/packages/patches/util-linux-libuuid-non-blocking-random.patch
@@ -0,0 +1,15 @@
+Change libuuid so that 'uuid_generate' is non-blocking. This is needed when
+'mke2fs' is used during early boot in VMs with little entropy available.
+See <https://bugs.gnu.org/31268>.
+
+--- a/lib/randutils.c
++++ b/lib/randutils.c
+@@ -104,7 +104,7 @@ void random_get_bytes(void *buf, size_t nbytes)
+ int x;
+
+ errno = 0;
+- x = getrandom(cp, n, 0);
++ x = getrandom(cp, n, GRND_NONBLOCK);
+ if (x > 0) { /* success */
+ n -= x;
+ cp += x;
--
2.17.0
[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #5: 0001-gnu-parted-Use-weak-non-blocking-randomness-for-FAT-.patch --]
[-- Type: text/x-patch, Size: 3406 bytes --]
From 3110c594afb8839ba81b528f316b6d6dce757e99 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Ludovic=20Court=C3=A8s?= <ludo@gnu.org>
Date: Tue, 22 May 2018 17:34:47 +0200
Subject: [PATCH 1/3] gnu: parted: Use weak (non-blocking) randomness for FAT
serial numbers.
Partly fixes <https://bugs.gnu.org/31268>.
* gnu/packages/patches/parted-non-blocking-random.patch: New file.
* gnu/packages/disk.scm (parted)[source]: Use it.
* gnu/local.mk (dist_patch_DATA): Add it.
---
gnu/local.mk | 1 +
gnu/packages/disk.scm | 3 +-
.../patches/parted-non-blocking-random.patch | 39 +++++++++++++++++++
3 files changed, 42 insertions(+), 1 deletion(-)
create mode 100644 gnu/packages/patches/parted-non-blocking-random.patch
diff --git a/gnu/local.mk b/gnu/local.mk
index 20975306b..4222050b5 100644
--- a/gnu/local.mk
+++ b/gnu/local.mk
@@ -975,6 +975,7 @@ dist_patch_DATA = \
%D%/packages/patches/p7zip-CVE-2017-17969.patch \
%D%/packages/patches/p7zip-remove-unused-code.patch \
%D%/packages/patches/password-store-gnupg-compat.patch \
+ %D%/packages/patches/parted-non-blocking-random.patch \
%D%/packages/patches/patchelf-page-size.patch \
%D%/packages/patches/patchelf-rework-for-arm.patch \
%D%/packages/patches/patchutils-xfail-gendiff-tests.patch \
diff --git a/gnu/packages/disk.scm b/gnu/packages/disk.scm
index d7bf72683..476b26acb 100644
--- a/gnu/packages/disk.scm
+++ b/gnu/packages/disk.scm
@@ -65,7 +65,8 @@
version ".tar.xz"))
(sha256
(base32
- "1r3qpg3bhz37mgvp9chsaa3k0csby3vayfvz8ggsqz194af5i2w5"))))
+ "1r3qpg3bhz37mgvp9chsaa3k0csby3vayfvz8ggsqz194af5i2w5"))
+ (patches (search-patches "parted-non-blocking-random.patch"))))
(build-system gnu-build-system)
(arguments
`(#:phases
diff --git a/gnu/packages/patches/parted-non-blocking-random.patch b/gnu/packages/patches/parted-non-blocking-random.patch
new file mode 100644
index 000000000..e30d9f413
--- /dev/null
+++ b/gnu/packages/patches/parted-non-blocking-random.patch
@@ -0,0 +1,39 @@
+Explicitly use a non-blocking random primitive. This is used primarily
+to compute FAT "serial numbers" in libparted/fs/r/fat/fat.c:fat_create,
+for which GRND_NONBLOCK is probably good enough.
+
+Assume the running kernel does support 'getrandom', which is the case on
+GuixSD. See <https://bugs.gnu.org/31268>.
+
+--- a/libparted/labels/misc.h
++++ b/libparted/labels/misc.h
+@@ -17,7 +17,8 @@
+ along with this program. If not, see <http://www.gnu.org/licenses/>. */
+
+ #include <inttypes.h>
+-#include <uuid/uuid.h>
++#include <sys/random.h>
++#include <errno.h>
+
+ /* hack: use the ext2 uuid library to generate a reasonably random (hopefully
+ * with /dev/random) number. Unfortunately, we can only use 4 bytes of it.
+@@ -28,11 +29,17 @@ static inline uint32_t
+ generate_random_uint32 (void)
+ {
+ union {
+- uuid_t uuid;
++ char uuid[4];
+ uint32_t i;
+ } uu32;
++ ssize_t ret;
+
+- uuid_generate (uu32.uuid);
++ do
++ ret = getrandom (uu32.uuid, sizeof uu32, GRND_NONBLOCK);
++ while (ret == EAGAIN);
++
++ if (ret < sizeof uu32)
++ abort ();
+
+ return uu32.i > 0 ? uu32.i : 0xffffffff;
+ }
--
2.17.0
[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #6: 0002-vm-Use-a-deterministic-file-system-UUID-in-shared-st.patch --]
[-- Type: text/x-patch, Size: 1769 bytes --]
From 8aa37a4124db90a9991485477d1af85677c7fa1b Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Ludovic=20Court=C3=A8s?= <ludo@gnu.org>
Date: Tue, 22 May 2018 17:36:35 +0200
Subject: [PATCH 2/3] vm: Use a deterministic file system UUID in shared-store
VMs.
* gnu/system/vm.scm (system-qemu-image/shared-store): Pass
#:file-system-uuid to 'qemu-image'.
---
gnu/system/vm.scm | 8 ++++++++
1 file changed, 8 insertions(+)
diff --git a/gnu/system/vm.scm b/gnu/system/vm.scm
index 09a11af86..b6561dfc7 100644
--- a/gnu/system/vm.scm
+++ b/gnu/system/vm.scm
@@ -752,6 +752,13 @@ with the host.
When FULL-BOOT? is true, return an image that does a complete boot sequence,
bootloaded included; thus, make a disk image that contains everything the
bootloader refers to: OS kernel, initrd, bootloader data, etc."
+ (define root-uuid
+ ;; Use a fixed UUID so that 'mke2fs' doesn't wait for strong randomness
+ ;; while generating a UUID. See <https://bugs.gnu.org/31268>.
+ ;; XXX: Actually it doesn't help since 'mke2fs' calls 'uuid_generate'
+ ;; anyway.
+ (operating-system-uuid os 'dce))
+
(mlet* %store-monad ((os-drv (operating-system-derivation os))
(bootcfg (operating-system-bootcfg os)))
;; XXX: When FULL-BOOT? is true, we end up creating an image that contains
@@ -763,6 +770,7 @@ bootloader refers to: OS kernel, initrd, bootloader data, etc."
#:bootloader (bootloader-configuration-bootloader
(operating-system-bootloader os))
#:disk-image-size disk-image-size
+ #:file-system-uuid root-uuid
#:inputs (if full-boot?
`(("bootcfg" ,bootcfg))
'())
--
2.17.0
^ permalink raw reply related [flat|nested] 17+ messages in thread
* bug#31268: 'guix system vm-image' hangs
2018-05-22 16:23 ` Ludovic Courtès
@ 2018-05-22 18:45 ` Efraim Flashner
2018-05-22 22:55 ` Mark H Weaver
1 sibling, 0 replies; 17+ messages in thread
From: Efraim Flashner @ 2018-05-22 18:45 UTC (permalink / raw)
To: Ludovic Courtès; +Cc: George myglc2 Clemmer, Clément Lassieur, 31268
[-- Attachment #1: Type: text/plain, Size: 2098 bytes --]
On Tue, May 22, 2018 at 06:23:35PM +0200, Ludovic Courtès wrote:
> Hello!
>
> (+Cc: Leo for randomness input.)
<snip>
>
> Another approach I looked at was to seed the VM’s PRNG from /dev/hwrng,
> which I thought was connected to the host via ‘virtio-rng-pci’, but I
> get ENODEV while trying to read from /dev/hwrng in the guest like this:
>
> diff --git a/gnu/system/vm.scm b/gnu/system/vm.scm
> index b6561dfc7..3bfd6b4ca 100644
> --- a/gnu/system/vm.scm
> +++ b/gnu/system/vm.scm
> @@ -319,6 +319,18 @@ the image."
>
> (set-path-environment-variable "PATH" '("bin" "sbin") inputs)
>
> + ;; Try writing from /dev/hwrng into /dev/urandom.
> + ;; It seems that the file /dev/hwrng always exists, even
> + ;; when there is no hardware random number generator
> + ;; available. So, we handle a failed read or any other error
> + ;; reported by the operating system.
> + (let ((buf (call-with-input-file "/dev/hwrng"
> + (lambda (hwrng)
> + (get-bytevector-n hwrng 512)))))
> + (call-with-output-file "/dev/urandom"
> + (lambda (urandom)
> + (put-bytevector urandom buf))))
> +
> (let* ((graphs '#$(match inputs
> (((names . _) ...)
> names)))
>
> Am I missing something, Leo?
>
> In short, we’re almost done with this bug, now we just need to make sure
> we have a reasonable fix.
>
> Thanks,
> Ludo’.
>
I can confirm that on the aarch64 machines I've tested there is a
/dev/hwrng.
Another option for entropy is haveged. http://issihosts.com/haveged/
It's not very actively maintained, but it is used by other distros for
randomness on headless machines.
--
Efraim Flashner <efraim@flashner.co.il> אפרים פלשנר
GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351
Confidentiality cannot be guaranteed on emails sent or received unencrypted
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]
^ permalink raw reply [flat|nested] 17+ messages in thread
* bug#31268: 'guix system vm-image' hangs
2018-05-22 16:23 ` Ludovic Courtès
2018-05-22 18:45 ` Efraim Flashner
@ 2018-05-22 22:55 ` Mark H Weaver
2018-05-23 7:27 ` Ludovic Courtès
1 sibling, 1 reply; 17+ messages in thread
From: Mark H Weaver @ 2018-05-22 22:55 UTC (permalink / raw)
To: Ludovic Courtès; +Cc: 31268, George myglc2 Clemmer, Clément Lassieur
Hi Ludovic,
ludo@gnu.org (Ludovic Courtès) writes:
> I was looking at the wrong code: we’re using libuuid from util-linux,
> which in turn uses getrandom(2). Since it doesn’t pass the
> GRND_NONBLOCK flag, it ends up blocking forever because too little
> entropy is available in the VM.
>
> The following patches work around that:
>
> 1. Parted now explicitly uses getrandom(2) with GRND_NONBLOCK instead
> of libuuid’s ‘uuid_generate’, which is good enough for this
> purpose. I’ll submit it upstream.
>
> 2. e2fsprogs is changed to use a libuuid that passes GRND_NONBLOCK.
> It does the job, but it’s quite inelegant.
I'm uncomfortable with this approach. I think that it's proper for uuid
generation to block if there's not enough entropy.
> Another approach I looked at was to seed the VM’s PRNG from /dev/hwrng,
> which I thought was connected to the host via ‘virtio-rng-pci’, but I
> get ENODEV while trying to read from /dev/hwrng in the guest like this:
I much prefer this approach, where we seed the VM's PRNG from another
source.
> From 8aa37a4124db90a9991485477d1af85677c7fa1b Mon Sep 17 00:00:00 2001
> From: =?UTF-8?q?Ludovic=20Court=C3=A8s?= <ludo@gnu.org>
> Date: Tue, 22 May 2018 17:36:35 +0200
> Subject: [PATCH 2/3] vm: Use a deterministic file system UUID in shared-store
> VMs.
>
> * gnu/system/vm.scm (system-qemu-image/shared-store): Pass
> #:file-system-uuid to 'qemu-image'.
> ---
> gnu/system/vm.scm | 8 ++++++++
> 1 file changed, 8 insertions(+)
>
> diff --git a/gnu/system/vm.scm b/gnu/system/vm.scm
> index 09a11af86..b6561dfc7 100644
> --- a/gnu/system/vm.scm
> +++ b/gnu/system/vm.scm
> @@ -752,6 +752,13 @@ with the host.
> When FULL-BOOT? is true, return an image that does a complete boot sequence,
> bootloaded included; thus, make a disk image that contains everything the
> bootloader refers to: OS kernel, initrd, bootloader data, etc."
> + (define root-uuid
> + ;; Use a fixed UUID so that 'mke2fs' doesn't wait for strong randomness
> + ;; while generating a UUID. See <https://bugs.gnu.org/31268>.
> + ;; XXX: Actually it doesn't help since 'mke2fs' calls 'uuid_generate'
> + ;; anyway.
How about fixing mke2fs so that if you specify a fixed UUID, it won't
try to generate a random one? Would that be sufficient?
Thanks,
Mark
^ permalink raw reply [flat|nested] 17+ messages in thread
* bug#31268: 'guix system vm-image' hangs
2018-05-22 22:55 ` Mark H Weaver
@ 2018-05-23 7:27 ` Ludovic Courtès
2018-05-23 8:23 ` Ludovic Courtès
0 siblings, 1 reply; 17+ messages in thread
From: Ludovic Courtès @ 2018-05-23 7:27 UTC (permalink / raw)
To: Mark H Weaver; +Cc: 31268, George myglc2 Clemmer, Clément Lassieur
Hi Mark,
Mark H Weaver <mhw@netris.org> skribis:
> ludo@gnu.org (Ludovic Courtès) writes:
>
>> I was looking at the wrong code: we’re using libuuid from util-linux,
>> which in turn uses getrandom(2). Since it doesn’t pass the
>> GRND_NONBLOCK flag, it ends up blocking forever because too little
>> entropy is available in the VM.
>>
>> The following patches work around that:
>>
>> 1. Parted now explicitly uses getrandom(2) with GRND_NONBLOCK instead
>> of libuuid’s ‘uuid_generate’, which is good enough for this
>> purpose. I’ll submit it upstream.
>>
>> 2. e2fsprogs is changed to use a libuuid that passes GRND_NONBLOCK.
>> It does the job, but it’s quite inelegant.
>
> I'm uncomfortable with this approach. I think that it's proper for uuid
> generation to block if there's not enough entropy.
Yeah, I think #1 is OK because it’s “just” FAT serial numbers, but #2
could be more problematic.
We could keep these package variants private though, and use them only
for the purposes of ‘qemu-image’ if we don’t find a better solution.
>> From 8aa37a4124db90a9991485477d1af85677c7fa1b Mon Sep 17 00:00:00 2001
>> From: =?UTF-8?q?Ludovic=20Court=C3=A8s?= <ludo@gnu.org>
>> Date: Tue, 22 May 2018 17:36:35 +0200
>> Subject: [PATCH 2/3] vm: Use a deterministic file system UUID in shared-store
>> VMs.
>>
>> * gnu/system/vm.scm (system-qemu-image/shared-store): Pass
>> #:file-system-uuid to 'qemu-image'.
>> ---
>> gnu/system/vm.scm | 8 ++++++++
>> 1 file changed, 8 insertions(+)
>>
>> diff --git a/gnu/system/vm.scm b/gnu/system/vm.scm
>> index 09a11af86..b6561dfc7 100644
>> --- a/gnu/system/vm.scm
>> +++ b/gnu/system/vm.scm
>> @@ -752,6 +752,13 @@ with the host.
>> When FULL-BOOT? is true, return an image that does a complete boot sequence,
>> bootloaded included; thus, make a disk image that contains everything the
>> bootloader refers to: OS kernel, initrd, bootloader data, etc."
>> + (define root-uuid
>> + ;; Use a fixed UUID so that 'mke2fs' doesn't wait for strong randomness
>> + ;; while generating a UUID. See <https://bugs.gnu.org/31268>.
>> + ;; XXX: Actually it doesn't help since 'mke2fs' calls 'uuid_generate'
>> + ;; anyway.
>
> How about fixing mke2fs so that if you specify a fixed UUID, it won't
> try to generate a random one? Would that be sufficient?
mke2fs generates two UUIDs:
--8<---------------cut here---------------start------------->8---
if (fs_uuid) { … }
else
uuid_generate(fs->super->s_uuid);
[...]
uuid_generate((unsigned char *) fs->super->s_hash_seed);
--8<---------------cut here---------------end--------------->8---
The first ‘uuid_generate’ call is omitted when we pass “-U UUID” but the
second one isn’t. I don’t think we can get around it.
Thanks,
Ludo’.
^ permalink raw reply [flat|nested] 17+ messages in thread
* bug#31268: 'guix system vm-image' hangs
2018-05-23 7:27 ` Ludovic Courtès
@ 2018-05-23 8:23 ` Ludovic Courtès
0 siblings, 0 replies; 17+ messages in thread
From: Ludovic Courtès @ 2018-05-23 8:23 UTC (permalink / raw)
To: Mark H Weaver; +Cc: 31268-done, George myglc2 Clemmer, Clément Lassieur
Bah, it turns out virtio-rng was simply not enabled, so commit
d282388789a21ae031035e9fd8e94a72463d0c96 fixes that.
Done!
Ludo'.
^ permalink raw reply [flat|nested] 17+ messages in thread
end of thread, other threads:[~2018-05-23 8:24 UTC | newest]
Thread overview: 17+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2018-04-26 1:39 'guix system vm-image' hangs George myglc2 Clemmer
2018-04-26 3:37 ` Eric Bavier
2018-04-26 4:07 ` George myglc2 Clemmer
2018-04-26 14:09 ` bug#31268: " Ludovic Courtès
2018-04-30 8:23 ` Mark H Weaver
2018-04-30 8:23 ` Mark H Weaver
2018-04-30 14:18 ` Ludovic Courtès
2018-04-30 16:36 ` Mark H Weaver
2018-05-18 14:22 ` Clément Lassieur
2018-05-18 16:39 ` Ludovic Courtès
2018-05-18 22:03 ` Clément Lassieur
2018-05-18 22:13 ` Ludovic Courtès
2018-05-22 16:23 ` Ludovic Courtès
2018-05-22 18:45 ` Efraim Flashner
2018-05-22 22:55 ` Mark H Weaver
2018-05-23 7:27 ` Ludovic Courtès
2018-05-23 8:23 ` Ludovic Courtès
Code repositories for project(s) associated with this external index
https://git.savannah.gnu.org/cgit/guix.git
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.