[Bug 1699772] Re: linux-image-4.10.0-24-generic, linux-image-4.8.0-56-generic, linux-image-4.4.0-81-generic, linux-image-3.13.0-121-generic Regression: many user-space apps crashing

2017-09-12 Thread Pete Cheslock
This affects linux-aws 4.4.0-1020-aws as well. I ran into this issue on that kernel. https://github.com/collectd/collectd/issues/2321#issuecomment-311634825 Seems maybe fixed in 4.4.0-1022-aws ** Bug watch added: github.com/collectd/collectd/issues #2321 https://github.com/collectd/collectd/is

[Bug 1655842] Re: "Out of memory" errors after upgrade to 4.4.0-59

2017-08-16 Thread Pete Cheslock
> kthreadd invoked oom-killer: gfp_mask=0x26000c0, order=2, oom_score_adj=0 Yea - that 2nd order allocation failure is the exact same issue I was able to see (same GFP mask also) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https:/

[Bug 1655842] Re: "Out of memory" errors after upgrade to 4.4.0-59

2017-08-16 Thread Pete Cheslock
I have seemingly solved this issue with linux-aws version 4.4.0-1016-aws at the very least. The specific issue I was seeing was 2nd order allocations failing when OOMKiller triggered. At the time I was thinking the issue was due to XFS and memory fragmentation with lots and lots of memory mapped

[Bug 1655842] Re: "Out of memory" errors after upgrade to 4.4.0-59

2017-06-16 Thread Pete Cheslock
@nicholas-hatch - what file system are your disks formatted as? I was able to stop the OOM's on my ES hosts by moving from XFS to EXT4. My belief is that there was a memory fragmentation issue with ES and many small files on XFS formatted volumes. -- You received this bug notification because y

[Bug 1666260] Re: "Out of memory" errors after upgrade to 4.4.0-59 + 4.8.0-34

2017-03-24 Thread Pete Cheslock
I've tried setting vm.vfs_cache_pressure = 300 per the top post and still seeing regular (daily) oom's on 4.4.0-66-generic -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1666260 Title: "Out of memory

[Bug 1655842] Re: "Out of memory" errors after upgrade to 4.4.0-59

2017-03-20 Thread Pete Cheslock
We have been seeing this issue recently as well. We are running 4.4.0-66-generic #87-Ubuntu - I can attempt to downgrade to 4.4.0-57 but its a large cluster with a lot of data so it may take some time. Attached a kern.log from this most recent oom. ** Attachment added: "kern.log" https://bugs

[Bug 1668129] UdevDb.txt

2017-02-26 Thread Pete Cheslock
apport information ** Attachment added: "UdevDb.txt" https://bugs.launchpad.net/bugs/1668129/+attachment/4827359/+files/UdevDb.txt ** Changed in: linux (Ubuntu) Status: Incomplete => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subs

[Bug 1668129] ProcModules.txt

2017-02-26 Thread Pete Cheslock
apport information ** Attachment added: "ProcModules.txt" https://bugs.launchpad.net/bugs/1668129/+attachment/4827358/+files/ProcModules.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1668129

[Bug 1668129] Lspci.txt

2017-02-26 Thread Pete Cheslock
apport information ** Attachment added: "Lspci.txt" https://bugs.launchpad.net/bugs/1668129/+attachment/4827355/+files/Lspci.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1668129 Title: Amaz

[Bug 1668129] ProcInterrupts.txt

2017-02-26 Thread Pete Cheslock
apport information ** Attachment added: "ProcInterrupts.txt" https://bugs.launchpad.net/bugs/1668129/+attachment/4827357/+files/ProcInterrupts.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/166

[Bug 1668129] ProcCpuinfo.txt

2017-02-26 Thread Pete Cheslock
apport information ** Attachment added: "ProcCpuinfo.txt" https://bugs.launchpad.net/bugs/1668129/+attachment/4827356/+files/ProcCpuinfo.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1668129

[Bug 1668129] Re: Amazon I3 Instance Buffer I/O error on dev nvme0n1

2017-02-26 Thread Pete Cheslock
apport information ** Tags added: apport-collected ec2-images xenial ** Description changed: On the AWS i3 instance class - when putting the new NVME storage disks under high IO load - seeing data corruption and errors in dmesg [ 662.884390] blk_update_request: I/O error, dev nvme0n

[Bug 1668129] [NEW] Amazon I3 Instance Buffer I/O error on dev nvme0n1

2017-02-26 Thread Pete Cheslock
Public bug reported: On the AWS i3 instance class - when putting the new NVME storage disks under high IO load - seeing data corruption and errors in dmesg [ 662.884390] blk_update_request: I/O error, dev nvme0n1, sector 120063912 [ 662.887824] Buffer I/O error on dev nvme0n1, logical block 14

[Bug 1563026] Re: LXC/LXD installed by default on Ubuntu server

2016-04-11 Thread Pete Cheslock
I agree with both Tom and lightraven24, in that adding in packages that are not asked for becomes overkill when your "container" is effectively an amazon instance. Having the ability to create a truely "minimal" build of ubuntu in order to run on a cloud service provider is important to reduce pos

[Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [] ? audit_compare_dname_path+0x2b/0xa0

2015-05-15 Thread Pete Cheslock
Ah - crap - sorry about that. You are right. Thanks! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1450442 Title: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call

[Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [] ? audit_compare_dname_path+0x2b/0xa0

2015-05-15 Thread Pete Cheslock
I'm still able to recreate this issue with kernel version 3.13.0-52-generic #85-Ubuntu SMP Wed Apr 29 16:44:17 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux It looks like a different set of audit rules causes the same issue. To replicate: Install 3.13.0-52-generic kernel apt-get install auditd in /etc

[Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [] ? audit_compare_dname_path+0x2b/0xa0

2015-04-30 Thread Pete Cheslock
I've tested the build from http://people.canonical.com/~arges/lp1450442/ - and i'm no longer able to replicate this issue. This looks like it works for me. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bug

[Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [] ? audit_compare_dname_path+0x2b/0xa0

2015-04-30 Thread Pete Cheslock
It looks like this might be related? https://bugs.launchpad.net/ubuntu/+source/linux-lts-trusty/+bug/1450643 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1450442 Title: Kernel Oops - unable to hand

[Bug 1450643] Re: Installing linux-image-3.13.0-51-generic with auditd causes inability to ssh into the system

2015-04-30 Thread Pete Cheslock
*** This bug is a duplicate of bug 1450442 *** https://bugs.launchpad.net/bugs/1450442 Additional way to replicate Setup a vanilla ubuntu 14.04 system apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic linux-image-3.13.0-51-generic reboot login apt-get install auditd ec

[Bug 1450643] Re: Installing linux-image-3.13.0-51-generic with auditd causes unrecoverable system state

2015-04-30 Thread Pete Cheslock
*** This bug is a duplicate of bug 1450442 *** https://bugs.launchpad.net/bugs/1450442 While i'm not sure exactly - this seems to be the only commit in 3.13.0-51 around the audit area. https://lkml.org/lkml/2014/9/5/66 -- You received this bug notification because you are a member of Ubuntu

[Bug 1450643] [NEW] Installing linux-image-3.13.0-51-generic with auditd causes unrecoverable system state

2015-04-30 Thread Pete Cheslock
Public bug reported: When installing linux kernel 3.13.0-51 onto a system that has auditd installed with at least one rule enabled, the following stacktrace occurs when various processes occur (pretty much anything by root). [ 41.813593] type=1305 audit(1430428709.300:28): audit_pid=0 old=880