Unfortunately, one server managed to crashdump, even with your patched
kernel. apport is above, crashdump is at https://private-
fileshare.canonical.com/~axino/201511241217.crash.lp1505564.matar.tar.xz
- sha1sum 056fae2554e52989a24094945b297c0c5906be7c
I've diverted qemu-nbd again.
Please let me
apport information
** Attachment added: "KernLog.txt"
https://bugs.launchpad.net/bugs/1520225/+attachment/4525786/+files/KernLog.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1520225
Title:
apport information
** Attachment added: "Dependencies.txt"
https://bugs.launchpad.net/bugs/1520225/+attachment/4525785/+files/Dependencies.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1520225
apport information
** Attachment added: "lxcsyslog.txt"
https://bugs.launchpad.net/bugs/1520225/+attachment/4525790/+files/lxcsyslog.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1520225
Titl
apport information
** Attachment added: "RelatedPackageVersions.txt"
https://bugs.launchpad.net/bugs/1520225/+attachment/4525787/+files/RelatedPackageVersions.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launch
apport information
** Attachment added: "lxc-net.default.txt"
https://bugs.launchpad.net/bugs/1520225/+attachment/4525788/+files/lxc-net.default.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1
apport information
** Attachment added: "lxc.default.txt"
https://bugs.launchpad.net/bugs/1520225/+attachment/4525789/+files/lxc.default.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1520225
Public bug reported:
Hi,
Earlier today, a server got powered off and I'm 99% sure it's because I ran the
following command as root :
# lxc-stop -n
The container was started manually with :
# lxc-start -n -F --share-net 1
and it wasn't fully booted (ie I didn't have the console yet).
syslog
Hi,
container config : http://paste.ubuntu.com/13524088/
/etc/apt/sources.list.d just contains a repo for some homemade backports
"dpkg -l | grep lxc" was given in the initial comment, but here it is again :
$ dpkg -l|grep lxc
ii liblxc1 1.0.7-0ubuntu0.10 amd64 Linux Containers userspace tools (
Hi Dan,
Thanks for your investigation. Sorry for the delay, but finally I
managed to reboot the compute nodes with the "notsc" kernel parameter. I
also disabled the qemu-nbd workaround.
Once that was done, it didn't take long for a node to crash, which would
indicate that notsc didn't fix the pro
I resumed the tests on Monday, and so far we're looking good. Your
change prevented ~10 locks so far, it would seem.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1505564
Title:
Soft lockup with "bl
Thanks !
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1505564
Title:
Soft lockup with "block nbdX: Attempted send on closed socket" spam
To manage notifications about this bug go to:
https://bugs.
Re-reading comment #318 Dan, I realize that we may be investigating a
symptom and not the root cause.
Whenever the soft-lockup happens, the serial console does get flooded
"block nbdX: Attempted send on closed socket". If the serial console
getting flooded causes soft lockups, then it is indeed a
I applied the patch, and it saved a reboot twice already, I think. dmesg
from one server : http://pastebin.ubuntu.com/14438525/
I have to stop the tests for the weekend though, I'll resume on Monday.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscrib
I don't think I tested with OVS out of the picture. However, none of the
physical interface was enslaved to an OVS bridge, so I'd say this is not
an ovs bug and can likely be repro'ed outside of OVS. I don't have time
to do this in the short term though.
** Changed in: openvswitch (Ubuntu)
@anonymouse67 hello ! so how do you suggest we fix our production system
now ?
** Changed in: snapd (Ubuntu)
Status: Invalid => New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1948995
Title:
OK thanks. I must say that this is not a great user experience. How
would we "increase the number of revisions that are kept around on a
system" ? It seems that the default of 2 is pretty low for servers.
** Changed in: snapd (Ubuntu)
Status: Incomplete => New
--
You received this bug not
Public bug reported:
Hi,
This is somewhat related to bug 1772137. I have a "firewall" script in
routable.d and here's what I get upon boot :
https://pastebin.canonical.com/p/bCkQrdm3HB/
I'm interested in the "vlan3060" interface. This interface, once
networkd finishes its setup, properly comes u
I investigated this quite a bit, and this appears to be an ntp bug and
not a charm bug.
This host is a trusty host, running ntp version
1:4.2.6.p5+dfsg-3ubuntu2.14.04.13. We have other hosts running the same
version that don't have the problem described above.
I spent quite some time investigatin
** Summary changed:
- ntp sync checks fail when server as no IPv6 connectivity
+ ntpd interface listing is bugged
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1952264
Title:
ntpd interface listing
Any update here ? This is blocking critical node evacuation. Thanks !
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1904580
Title:
Permissions 0644 for '/var/lib/nova/.ssh/id_rsa' are too open
To m
301 - 321 of 321 matches
Mail list logo