This affects linux-aws 4.4.0-1020-aws as well. I ran into this issue on
that kernel.
https://github.com/collectd/collectd/issues/2321#issuecomment-311634825
Seems maybe fixed in 4.4.0-1022-aws
** Bug watch added: github.com/collectd/collectd/issues #2321
https://github.com/collectd/collectd/is
> kthreadd invoked oom-killer: gfp_mask=0x26000c0, order=2,
oom_score_adj=0
Yea - that 2nd order allocation failure is the exact same issue I was
able to see (same GFP mask also)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws i
I have seemingly solved this issue with linux-aws version 4.4.0-1016-aws
at the very least. The specific issue I was seeing was 2nd order
allocations failing when OOMKiller triggered. At the time I was
thinking the issue was due to XFS and memory fragmentation with lots and
lots of memory mapped
@nicholas-hatch - what file system are your disks formatted as? I was
able to stop the OOM's on my ES hosts by moving from XFS to EXT4. My
belief is that there was a memory fragmentation issue with ES and many
small files on XFS formatted volumes.
--
You received this bug notification because y
I've tried setting vm.vfs_cache_pressure = 300 per the top post and
still seeing regular (daily) oom's on 4.4.0-66-generic
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1666260
Title:
"
We have been seeing this issue recently as well. We are running
4.4.0-66-generic #87-Ubuntu - I can attempt to downgrade to 4.4.0-57 but
its a large cluster with a lot of data so it may take some time.
Attached a kern.log from this most recent oom.
** Attachment added: "kern.log"
https://bugs
apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/1668129/+attachment/4827357/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad
apport information
** Attachment added: "Lspci.txt"
https://bugs.launchpad.net/bugs/1668129/+attachment/4827355/+files/Lspci.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1668129
apport information
** Attachment added: "UdevDb.txt"
https://bugs.launchpad.net/bugs/1668129/+attachment/4827359/+files/UdevDb.txt
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is
apport information
** Attachment added: "ProcModules.txt"
https://bugs.launchpad.net/bugs/1668129/+attachment/4827358/+files/ProcModules.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
apport information
** Attachment added: "ProcCpuinfo.txt"
https://bugs.launchpad.net/bugs/1668129/+attachment/4827356/+files/ProcCpuinfo.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
apport information
** Tags added: apport-collected ec2-images xenial
** Description changed:
On the AWS i3 instance class - when putting the new NVME storage disks
under high IO load - seeing data corruption and errors in dmesg
[ 662.884390] blk_update_request: I/O error, dev nvme0n
Public bug reported:
On the AWS i3 instance class - when putting the new NVME storage disks
under high IO load - seeing data corruption and errors in dmesg
[ 662.884390] blk_update_request: I/O error, dev nvme0n1, sector 120063912
[ 662.887824] Buffer I/O error on dev nvme0n1, logical block 14
Ah - crap - sorry about that. You are right. Thanks!
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442
Title:
Kernel Oops - unable to handle kernel NULL pointer dereference at
(
I'm still able to recreate this issue with kernel version
3.13.0-52-generic #85-Ubuntu SMP Wed Apr 29 16:44:17 UTC 2015 x86_64
x86_64 x86_64 GNU/Linux
It looks like a different set of audit rules causes the same issue.
To replicate:
Install 3.13.0-52-generic kernel
apt-get install auditd
in /etc
I've tested the build from http://people.canonical.com/~arges/lp1450442/
- and i'm no longer able to replicate this issue. This looks like it
works for me.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.laun
It looks like this might be related?
https://bugs.launchpad.net/ubuntu/+source/linux-lts-trusty/+bug/1450643
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442
Title:
Kernel Oops - u
*** This bug is a duplicate of bug 1450442 ***
https://bugs.launchpad.net/bugs/1450442
Additional way to replicate
Setup a vanilla ubuntu 14.04 system
apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic
linux-image-3.13.0-51-generic
reboot
login
apt-get install auditd
ec
*** This bug is a duplicate of bug 1450442 ***
https://bugs.launchpad.net/bugs/1450442
While i'm not sure exactly - this seems to be the only commit in
3.13.0-51 around the audit area. https://lkml.org/lkml/2014/9/5/66
--
You received this bug notification because you are a member of Kernel
Public bug reported:
When installing linux kernel 3.13.0-51 onto a system that has auditd
installed with at least one rule enabled, the following stacktrace
occurs when various processes occur (pretty much anything by root).
[ 41.813593] type=1305 audit(1430428709.300:28): audit_pid=0 old=880
20 matches
Mail list logo