This affects linux-aws 4.4.0-1020-aws as well. I ran into this issue on
that kernel.
https://github.com/collectd/collectd/issues/2321#issuecomment-311634825
Seems maybe fixed in 4.4.0-1022-aws
** Bug watch added: github.com/collectd/collectd/issues #2321
https://github.com/collectd/collectd/is
> kthreadd invoked oom-killer: gfp_mask=0x26000c0, order=2,
oom_score_adj=0
Yea - that 2nd order allocation failure is the exact same issue I was
able to see (same GFP mask also)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https:/
I have seemingly solved this issue with linux-aws version 4.4.0-1016-aws
at the very least. The specific issue I was seeing was 2nd order
allocations failing when OOMKiller triggered. At the time I was
thinking the issue was due to XFS and memory fragmentation with lots and
lots of memory mapped
@nicholas-hatch - what file system are your disks formatted as? I was
able to stop the OOM's on my ES hosts by moving from XFS to EXT4. My
belief is that there was a memory fragmentation issue with ES and many
small files on XFS formatted volumes.
--
You received this bug notification because y
I've tried setting vm.vfs_cache_pressure = 300 per the top post and
still seeing regular (daily) oom's on 4.4.0-66-generic
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1666260
Title:
"Out of memory
We have been seeing this issue recently as well. We are running
4.4.0-66-generic #87-Ubuntu - I can attempt to downgrade to 4.4.0-57 but
its a large cluster with a lot of data so it may take some time.
Attached a kern.log from this most recent oom.
** Attachment added: "kern.log"
https://bugs
apport information
** Attachment added: "UdevDb.txt"
https://bugs.launchpad.net/bugs/1668129/+attachment/4827359/+files/UdevDb.txt
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subs
apport information
** Attachment added: "ProcModules.txt"
https://bugs.launchpad.net/bugs/1668129/+attachment/4827358/+files/ProcModules.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1668129
apport information
** Attachment added: "Lspci.txt"
https://bugs.launchpad.net/bugs/1668129/+attachment/4827355/+files/Lspci.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1668129
Title:
Amaz
apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/1668129/+attachment/4827357/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/166
apport information
** Attachment added: "ProcCpuinfo.txt"
https://bugs.launchpad.net/bugs/1668129/+attachment/4827356/+files/ProcCpuinfo.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1668129
apport information
** Tags added: apport-collected ec2-images xenial
** Description changed:
On the AWS i3 instance class - when putting the new NVME storage disks
under high IO load - seeing data corruption and errors in dmesg
[ 662.884390] blk_update_request: I/O error, dev nvme0n
Public bug reported:
On the AWS i3 instance class - when putting the new NVME storage disks
under high IO load - seeing data corruption and errors in dmesg
[ 662.884390] blk_update_request: I/O error, dev nvme0n1, sector 120063912
[ 662.887824] Buffer I/O error on dev nvme0n1, logical block 14
I agree with both Tom and lightraven24, in that adding in packages that
are not asked for becomes overkill when your "container" is effectively
an amazon instance. Having the ability to create a truely "minimal"
build of ubuntu in order to run on a cloud service provider is important
to reduce pos
Ah - crap - sorry about that. You are right. Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1450442
Title:
Kernel Oops - unable to handle kernel NULL pointer dereference at
(null); Call
I'm still able to recreate this issue with kernel version
3.13.0-52-generic #85-Ubuntu SMP Wed Apr 29 16:44:17 UTC 2015 x86_64
x86_64 x86_64 GNU/Linux
It looks like a different set of audit rules causes the same issue.
To replicate:
Install 3.13.0-52-generic kernel
apt-get install auditd
in /etc
I've tested the build from http://people.canonical.com/~arges/lp1450442/
- and i'm no longer able to replicate this issue. This looks like it
works for me.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bug
It looks like this might be related?
https://bugs.launchpad.net/ubuntu/+source/linux-lts-trusty/+bug/1450643
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1450442
Title:
Kernel Oops - unable to hand
*** This bug is a duplicate of bug 1450442 ***
https://bugs.launchpad.net/bugs/1450442
Additional way to replicate
Setup a vanilla ubuntu 14.04 system
apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic
linux-image-3.13.0-51-generic
reboot
login
apt-get install auditd
ec
*** This bug is a duplicate of bug 1450442 ***
https://bugs.launchpad.net/bugs/1450442
While i'm not sure exactly - this seems to be the only commit in
3.13.0-51 around the audit area. https://lkml.org/lkml/2014/9/5/66
--
You received this bug notification because you are a member of Ubuntu
Public bug reported:
When installing linux kernel 3.13.0-51 onto a system that has auditd
installed with at least one rule enabled, the following stacktrace
occurs when various processes occur (pretty much anything by root).
[ 41.813593] type=1305 audit(1430428709.300:28): audit_pid=0 old=880
21 matches
Mail list logo