fsck
error when creating a Mender Artifact using the snapshot featureWhen running mender-artifact write -f ssh://...
command to create a Mender Artifact from a virtual
device, you can get the following error:
runFsck error: fsck error: exit status 12
Recent releases of the virtual device use new filesystem features, which requires up to date
filesystem tools (namely e2fsck
) on the host. Debian 12, Ubuntu 24.04 and newer OSs work correctly.
Workaround the issue by executing a few extra steps:
On the shell of the virtual device execute:
mkfifo /data/mender/dump
mender-snapshot dump > /data/mender/dump
Then, back to the shell on the host where you have the variables form the Get Started guide, run:
ssh -p 8822 root@${IP_ADDRESS} cat /data/mender/dump > rootfs.ext4
mender-artifact write rootfs-image \
-f ssh://"${USER}@${IP_ADDRESS}" \
-t "${DEVICE_TYPE}" \
-n system-v1 \
-o system-v1.mender \
-f rootfs.ext4
From here, upload the system-v1.mender
and continue with the rest of the steps in the guide.
mender-client
package have been kept backAfter releasing the Mender client version 4.0.0, we realized a critical issue with the Debian
packaging. Therefore, we decided to revert it and mark back the 3.5.2 release as the latest version
in the APT repository. If you upgraded the mender-client
package to version 4.0.0 on a device
during that time, APT will keep the mender-client
package to the 4.0.0 version and won't downgrade
it to the 3.5.2 version by default.
To solve the issue, either:
apt-get install mender-client
We removed the previously deprecated stable APT repository:
deb [arch=your-arch] https://downloads.mender.io/repos/debian stable main
If you see errors of the form:
Err:3 https://downloads.mender.io/repos/debian stable InRelease
403 Forbidden [IP: 52.222.214.71 443]
it means you are using the old repository, please update to the current one (see Set up the APT repository section).
In order to remove the obsolete repository deb [arch=your-arch] https://downloads.mender.io/repos/debian stable main
you can use the following command:
add-apt-repository -r "deb [arch=$(dpkg --print-architecture)] https://downloads.mender.io/repos/debian stable main"
and then re-add the new one with:
add-apt-repository "deb [arch=$(dpkg --print-architecture)] https://downloads.mender.io/repos/debian debian/buster/stable main"
In case you see the following errors during apt-get update
:
E: Repository 'http://raspbian.raspberrypi.org/raspbian buster InRelease' changed its 'Suite' value from 'stable' to 'oldstable'
N: This must be accepted explicitly before updates for this repository can be applied. See apt-secure(8) manpage for details.
In order to accept the change of the suite name, you need to run:
apt-get update --allow-releaseinfo-change
Waiting for root device ${mender_kernel_root}...
after using mender-convert
Depending on the release of Raspbian in use and eventually applied package updates, booting can
block on the step Waiting for root device ${mender_kernel_root}...
.
This can be mitigated by adding the following line in config.txt
on the sd cards boot partition, respectively uncommenting if it is already is prepared:
arm_64bit=0
.
The Raspberry Pi Imager can be instructed to pre-configure the flashed image, for example
This is done by injecting a firstrun.sh
script together with the statement systemd.run_success_action=reboot
on the command line. On a menderized image, this will loop forever.
To solve this problem, either reflash the image without adding customizations, or modify the cmdline.txt
file on the boot partition of the file, removing the above systemd
parameter.
The mender-client version 3.2.0 Debian package is deprecated. If you are getting installation errors, with a missing libffi6 dependency, then please install the new Debian package, as per the installation instructions in downloads
Logs are usually needed in order to diagnose an issue.
The Mender client by default logs to the system log using systemd
, so the easiest way to retrieve logs
is to run the following command:
journalctl -u mender-updated
Please note that the default log level is Info. It is possible to increase the
verbosity by editing the Mender systemd unit file and add the --log-level debug
option:
ExecStart=/usr/bin/mender-update --log-level debug daemon
Note that in Mender clients older than 4.0.0, the binary and systemd service are called
mender
and mender-client
, respectively.
In addition to system logging, Mender also writes debug logs directly to a file when a deployment starts. This file in turn gets uploaded to the server if the deployment fails.
By default, log files for the past 5 deployments are kept.
They are stored in /var/lib/mender/
, named by the deployment id,
for example deployments.0001.fcd8bca2-6dae-488e-969e-23559c674ba5.log
.
In order to see what the Mender client is doing currently, follow the log as it is being written with this command:
journalctl -u mender-updated -f
Note that in Mender clients older than 4.0.0, the systemd service is called mender-client
.
To stop it use Ctrl+C.
The Mender client can not connect to the server, typically the first time it tries, and emits messages like the following to the mender-authd
log or syslog at the device:
... level=info msg="Mender state: authorize-wait -> bootstrapped" module=mender
... level=error msg="authorize failed: transient error: authorization request failed: failed to execute authorization request:
Post https://<SERVER-URI>/api/devices/v1/authentication/auth_requests: x509: certificate has expired or is not yet valid" module=state
This could occur in several places, and the distinguishing message is x509: certificate has expired or is not yet valid. Each TLS certificate has a validity period, Not Before and Not After, and this message means that the Mender client concludes that the current time is outside this range.
Most commonly this is caused by incorrect time setting on the device which runs the Mender client. Check this by
running date
on the device, and make sure it is correct. Consult the section on Correct clock
for a more detailed discussion.
To determine the status of your time synchronization, execute the following:
# timedatectl status
Note that it can take some time after boot before the time synchronization is completed. If after 5-10 minutes, the time still has not synchronized, consult with your local network administrator for further troubleshooting.
If this is not the problem, you need to verify that the certificates you are using are valid. Replace the hostname with the one for your Mender API Gateway below and run the following command:
echo | openssl s_client -connect mender.example.com:443 2>/dev/null | openssl x509 -noout -dates
notBefore=Dec 14 19:52:46 2016 GMT
notAfter=Dec 12 19:52:46 2026 GMT
Also note that the storage proxy has its own certificate, and it runs on the same host as the API Gateway on port 9000 by default. Adjust the hostname and verify the validity of its certificate with the following command:
echo | openssl s_client -connect s3.example.com:9000 2>/dev/null | openssl x509 -noout -dates
notBefore=Dec 14 19:52:46 2016 GMT
notAfter=Dec 12 19:52:46 2026 GMT
We can see that both these certificates are currently valid. Also see the documentation on certificates for an overview and description on how to generate new certificates.
The Mender client can not connect to the server, typically the first time it tries, and emits messages like the following to the mender-authd
log or syslog at the device:
... level=info msg="Mender state: authorize-wait -> bootstrapped" module=mender
... level=error msg="authorize failed :transient error :authorisation request failed: failed do execute authorisation request:
Post https://<SERVER-URI>/api/devices/v1/authentication/auth_requests: x509: certificate signed by unknown authority" module=state
This could occur in several places, and the distinguishing message is x509: certificate signed by unknown authority. The message shows that the Mender client rejects the Mender Server's certificate because it does not trust the certificate authority (CA).
If your server is using a certificate that is signed by an official Certificate Authority, then you likely need to update your client's root certificate store. For example, hosted Mender uses an official CA so the only reason your client would reject this is if it does not have updated root certificates in its system store.
Hosted Mender is available in multiple regions to connect to. Make sure you select your desired one before proceeding.
On the other hand, if you set up the Mender Server yourself as described in
Production installation and generated certificates as part of it,
your need to make sure that the server certificates are in /etc/mender/server.crt
on your device.
To test that they match, run cat /etc/mender/server.crt
on your device, and compare that to the output
of the following command, adjusting the hostnames mender.example.com / s3.example.com (ideally run on device, but can be run from elsewhere as well):
openssl s_client -showcerts -connect mender.example.com:443 < /dev/null 2>/dev/null | openssl x509 && openssl s_client -showcerts -connect s3.example.com:9000 < /dev/null 2>/dev/null | openssl x509
If these mismatch, then you need to update /etc/mender/server.crt
on your client.
You can do this manually for testing purposes, and you should
include the certificates in your Yocto Project build.
The Mender Client detected a self-signed certificate that is the only one in the chain and the same certificate can't be located in the trusted store. That means the OpenSSL is unable to verify the server identity. You have to either use another (not self-signed) certificate or include the certificate in the local trust store.
The key length for the end entity in the certificate chain is too short.
This can happen in conjunction with the security level setting in the OpenSSL
configuration file, and the actual key length. First check if the security level
setting is what you want it to be. Start by locating the openssl.cnf
file,
by running:
# openssl version -d
OPENSSLDIR: "/opt/local/etc/openssl"
In the above example you can find the configuration file
at /opt/local/etc/openssl/openssl.cnf
and check the security level:
# cat `openssl version -d | sed -e 's/.*"\([^"]*\)".*/\1/'`/openssl.cnf | grep SECLEVEL
CipherString = DEFAULT@SECLEVEL=2
A security level of 2
is the default one on many installations nowadays.
Starting with the Mender Client 2.4.0, the client uses OpenSSL and it is possible that you see this error with shorter keys and certain values of security level. You have two choices: make the keys longer, or decrease the security level.
_INCONSISTENT
appended to itThe _INCONSISTENT
suffix is appended to the software name on a device when the last Artifact deployment failed, and either the rollback also failed, or the particular Update Module being used has no rollback capability. As the name implies, in this case the device is in an inconsistent state, somewhere between two known states. In this case the deployment log of the last deployment may provide more information about what went wrong, and whether there is cause for concern.
When deploying an update with the Mender client, you see a log message similar to the following:
ERRO[0001] update install failed: failed to read and install update: reader: unsupported version: 2 module=state
The problem here is most likely that you have built a new version of the Artifact format that your Mender Client does not support. It could also be that you are building a very old version of the Artifact format that your new version of the Mender Client does not support.
In either case the solution is to build a different version of the Artifact format that your Mender Client supports until you have upgraded all Mender Clients and can use the corresponding latest version of the Mender Artifact format.
You have the Mender binary on your device and try to trigger a rootfs update but you get output similar to the following:
mender-update install /media/rootfs-image-mydevice.mender
Mounted root does not match boot loader environment
-or-
mender install /media/rootfs-image-mydevice.mender
ERRO[0000] exit status 1 module=partitions
ERRO[0000] No match between boot and root partitions. module=main
The problem here is most likely that the device does not have the partition layout Mender expects. This could have happened if you just placed the Mender binary into your rootfs, but did not reflash the entire storage device with the .sdimg.
file output from the Yocto Project build. When this happens, output from mount
and fw_printenv
can confirm that this is the problem you are seeing. The solution is to flash your entire storage device with the .sdimg
output from the Yocto Project build process.
If you are using the Mender client in demo mode, either by selecting it when running mender setup
, or set up with the demo layer, the Mender client has more aggressive polling intervals to simplify testing.
See the documentation on building for production and polling intervals to reduce the network bandwidth usage.
For more specific troubleshooting issue please look at the troubleshooting section for the delta update module.
The delta mechanism makes use of the Provides and Depends.
The block below shows 3 example artifacts.
+-------------------------------+
|Type: rootfs-image |
|Version: v1 |
|Checksum: 5bb84175 |
| |
|Provides |
|rootfs-image.checksum: 5bb84175| -> matches the Depends for the delta
+-------------------------------+
+--------------------------------+ +--------------------------------+
|Type: mender-binary-delta | |Type: rootfs-image |
|Version: v2 | |Version: v2 |
|Checksum: ff532419 | |Checksum: b9147deb5 |
| | | |
|Provides | |Provides |
|rootfs-image.checksum: b9147deb5| |rootfs-image.checksum: b9147deb5|
| | +--------------------------------+
|Depends: |
|rootfs-image.checksum: 5bb841755|
+--------------------------------+
v1
rootfs-image
type artifact - contains the entire partition contentchecksum
and rootfs-image.checksum
v2 mender-binary-delta
mender-binary-delta
type artifact - contains only a delta (binary difference between two payloads)rootfs-image.checksum: 5bb841755
defines the checksumchecksum
and rootfs-image.checksum
differ
checksum
- checksum of the delta payloadrootfs-image.checksum
- checksum of the payload once it's running on the devicev2 rootfs-image
rootfs-image
type artifact - it contains the entire partition contentrootfs-image.checksum: b9147deb5
- same as the v2 mender-binary-delta
mender-artifact read <mender-artifact.mender>
mender-update show-provides
Releases -> Select Release -> Expand the artifact info by clicking it -> Expand Provides and Depends
The checksum shown with mender-update show-provides
does not necessarily represent the running partition's actual checksum.
For example, if you remount the partition rw
, change something and remount it ro
, the checksum in the mender-update show-provides
won't change, while the checksum of the running partition changes.
As part of your troubleshooting, you can check that the actual checksum on the device is the same as in the Depends
field.
A general command should be something like the below.
You can identify your active root file system ($ACTIVE_PARTITION
in the following dd
) with a command like lsblk
, fdisk -l
, mount
or similar.
The payload size of the version running on the device can be obtained from mender-artifact read delta.mender
, check for the variable rootfs_file_size
and use it as $PAYLOAD_SIZE
in the following dd
.
dd if=/dev/$ACTIVE_PARTITION bs=1M count=$PAYLOAD_SIZE iflag=count_bytes | sha256sum -
Check for mount
commands inside any state script that you implemented. The checksum will change if the root file system gets mounted as rw
.
A bootloader variable can set the file system to rw
and remount it as ro
later. Therefore, make sure the partition is never mounted as rw
.
cat /proc/cmdline
shows the parameters passed to the kernel when it started. Make sure there is no rw
value on the output.
In the /etc/fstab
file make sure the root file system is mounted as ro
. Remember that the parameter defaults
include the value rw
.
In Nvidia devices using meta-tegra
from the OE4T project, the variable KERNEL_ROOTSPEC
could set the mount of the root filesystem to be read-write in an early boot stage. Check its value with bitbake -e <image>
if in doubt.
Xdelta3: target window checksum mismatch: XD3_INVALID_INPUT
This message is caused by the root filesystem being altered, which usually is avoided by mounting read-only. Depending on your operating system, there might be background services that modify on-disk storage in a supposedly transparent manner, though. Those need to be either disabled completely, or configured to not operate on the root filesystem partition.
Known services with this effect:
fstrim
from the util-linux
package© 2024 Northern.tech AS