[Kernel-packages] [Bug 1699772] Re: linux-image-4.10.0-24-generic, linux-image-4.8.0-56-generic, linux-image-4.4.0-81-generic, linux-image-3.13.0-121-generic Regression: many user-space apps crashing

2017-09-12 Thread Pete Cheslock
This affects linux-aws 4.4.0-1020-aws as well. I ran into this issue on that kernel. https://github.com/collectd/collectd/issues/2321#issuecomment-311634825 Seems maybe fixed in 4.4.0-1022-aws ** Bug watch added: github.com/collectd/collectd/issues #2321 https://github.com/collectd/collectd/is

[Kernel-packages] [Bug 1655842] Re: "Out of memory" errors after upgrade to 4.4.0-59

2017-08-16 Thread Pete Cheslock
> kthreadd invoked oom-killer: gfp_mask=0x26000c0, order=2, oom_score_adj=0 Yea - that 2nd order allocation failure is the exact same issue I was able to see (same GFP mask also) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-aws i

[Kernel-packages] [Bug 1655842] Re: "Out of memory" errors after upgrade to 4.4.0-59

2017-08-16 Thread Pete Cheslock
I have seemingly solved this issue with linux-aws version 4.4.0-1016-aws at the very least. The specific issue I was seeing was 2nd order allocations failing when OOMKiller triggered. At the time I was thinking the issue was due to XFS and memory fragmentation with lots and lots of memory mapped

[Kernel-packages] [Bug 1655842] Re: "Out of memory" errors after upgrade to 4.4.0-59

2017-06-16 Thread Pete Cheslock
@nicholas-hatch - what file system are your disks formatted as? I was able to stop the OOM's on my ES hosts by moving from XFS to EXT4. My belief is that there was a memory fragmentation issue with ES and many small files on XFS formatted volumes. -- You received this bug notification because y

[Kernel-packages] [Bug 1666260] Re: "Out of memory" errors after upgrade to 4.4.0-59 + 4.8.0-34

2017-03-24 Thread Pete Cheslock
I've tried setting vm.vfs_cache_pressure = 300 per the top post and still seeing regular (daily) oom's on 4.4.0-66-generic -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1666260 Title: "

[Kernel-packages] [Bug 1655842] Re: "Out of memory" errors after upgrade to 4.4.0-59

2017-03-20 Thread Pete Cheslock
We have been seeing this issue recently as well. We are running 4.4.0-66-generic #87-Ubuntu - I can attempt to downgrade to 4.4.0-57 but its a large cluster with a lot of data so it may take some time. Attached a kern.log from this most recent oom. ** Attachment added: "kern.log" https://bugs

[Kernel-packages] [Bug 1668129] ProcInterrupts.txt

2017-02-26 Thread Pete Cheslock
apport information ** Attachment added: "ProcInterrupts.txt" https://bugs.launchpad.net/bugs/1668129/+attachment/4827357/+files/ProcInterrupts.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad

[Kernel-packages] [Bug 1668129] Lspci.txt

2017-02-26 Thread Pete Cheslock
apport information ** Attachment added: "Lspci.txt" https://bugs.launchpad.net/bugs/1668129/+attachment/4827355/+files/Lspci.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1668129

[Kernel-packages] [Bug 1668129] UdevDb.txt

2017-02-26 Thread Pete Cheslock
apport information ** Attachment added: "UdevDb.txt" https://bugs.launchpad.net/bugs/1668129/+attachment/4827359/+files/UdevDb.txt ** Changed in: linux (Ubuntu) Status: Incomplete => Confirmed -- You received this bug notification because you are a member of Kernel Packages, which is

[Kernel-packages] [Bug 1668129] ProcModules.txt

2017-02-26 Thread Pete Cheslock
apport information ** Attachment added: "ProcModules.txt" https://bugs.launchpad.net/bugs/1668129/+attachment/4827358/+files/ProcModules.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/b

[Kernel-packages] [Bug 1668129] ProcCpuinfo.txt

2017-02-26 Thread Pete Cheslock
apport information ** Attachment added: "ProcCpuinfo.txt" https://bugs.launchpad.net/bugs/1668129/+attachment/4827356/+files/ProcCpuinfo.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/b

[Kernel-packages] [Bug 1668129] Re: Amazon I3 Instance Buffer I/O error on dev nvme0n1

2017-02-26 Thread Pete Cheslock
apport information ** Tags added: apport-collected ec2-images xenial ** Description changed: On the AWS i3 instance class - when putting the new NVME storage disks under high IO load - seeing data corruption and errors in dmesg [ 662.884390] blk_update_request: I/O error, dev nvme0n

[Kernel-packages] [Bug 1668129] [NEW] Amazon I3 Instance Buffer I/O error on dev nvme0n1

2017-02-26 Thread Pete Cheslock
Public bug reported: On the AWS i3 instance class - when putting the new NVME storage disks under high IO load - seeing data corruption and errors in dmesg [ 662.884390] blk_update_request: I/O error, dev nvme0n1, sector 120063912 [ 662.887824] Buffer I/O error on dev nvme0n1, logical block 14

[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [] ? audit_compare_dname_path+0x2b/0xa0

2015-05-15 Thread Pete Cheslock
Ah - crap - sorry about that. You are right. Thanks! -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1450442 Title: Kernel Oops - unable to handle kernel NULL pointer dereference at (

[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [] ? audit_compare_dname_path+0x2b/0xa0

2015-05-15 Thread Pete Cheslock
I'm still able to recreate this issue with kernel version 3.13.0-52-generic #85-Ubuntu SMP Wed Apr 29 16:44:17 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux It looks like a different set of audit rules causes the same issue. To replicate: Install 3.13.0-52-generic kernel apt-get install auditd in /etc

[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [] ? audit_compare_dname_path+0x2b/0xa0

2015-04-30 Thread Pete Cheslock
I've tested the build from http://people.canonical.com/~arges/lp1450442/ - and i'm no longer able to replicate this issue. This looks like it works for me. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.laun

[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [] ? audit_compare_dname_path+0x2b/0xa0

2015-04-30 Thread Pete Cheslock
It looks like this might be related? https://bugs.launchpad.net/ubuntu/+source/linux-lts-trusty/+bug/1450643 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1450442 Title: Kernel Oops - u

[Kernel-packages] [Bug 1450643] Re: Installing linux-image-3.13.0-51-generic with auditd causes inability to ssh into the system

2015-04-30 Thread Pete Cheslock
*** This bug is a duplicate of bug 1450442 *** https://bugs.launchpad.net/bugs/1450442 Additional way to replicate Setup a vanilla ubuntu 14.04 system apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic linux-image-3.13.0-51-generic reboot login apt-get install auditd ec

[Kernel-packages] [Bug 1450643] Re: Installing linux-image-3.13.0-51-generic with auditd causes unrecoverable system state

2015-04-30 Thread Pete Cheslock
*** This bug is a duplicate of bug 1450442 *** https://bugs.launchpad.net/bugs/1450442 While i'm not sure exactly - this seems to be the only commit in 3.13.0-51 around the audit area. https://lkml.org/lkml/2014/9/5/66 -- You received this bug notification because you are a member of Kernel

[Kernel-packages] [Bug 1450643] [NEW] Installing linux-image-3.13.0-51-generic with auditd causes unrecoverable system state

2015-04-30 Thread Pete Cheslock
Public bug reported: When installing linux kernel 3.13.0-51 onto a system that has auditd installed with at least one rule enabled, the following stacktrace occurs when various processes occur (pretty much anything by root). [ 41.813593] type=1305 audit(1430428709.300:28): audit_pid=0 old=880