[Bug 1505564] Re: Soft lockup with "block nbdX: Attempted send on closed socket" spam

2015-11-24 Thread Junien Fridrick
Unfortunately, one server managed to crashdump, even with your patched kernel. apport is above, crashdump is at https://private- fileshare.canonical.com/~axino/201511241217.crash.lp1505564.matar.tar.xz - sha1sum 056fae2554e52989a24094945b297c0c5906be7c I've diverted qemu-nbd again. Please let me

[Bug 1520225] KernLog.txt

2015-11-26 Thread Junien Fridrick
apport information ** Attachment added: "KernLog.txt" https://bugs.launchpad.net/bugs/1520225/+attachment/4525786/+files/KernLog.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1520225 Title:

[Bug 1520225] Dependencies.txt

2015-11-26 Thread Junien Fridrick
apport information ** Attachment added: "Dependencies.txt" https://bugs.launchpad.net/bugs/1520225/+attachment/4525785/+files/Dependencies.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1520225

[Bug 1520225] lxcsyslog.txt

2015-11-26 Thread Junien Fridrick
apport information ** Attachment added: "lxcsyslog.txt" https://bugs.launchpad.net/bugs/1520225/+attachment/4525790/+files/lxcsyslog.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1520225 Titl

[Bug 1520225] RelatedPackageVersions.txt

2015-11-26 Thread Junien Fridrick
apport information ** Attachment added: "RelatedPackageVersions.txt" https://bugs.launchpad.net/bugs/1520225/+attachment/4525787/+files/RelatedPackageVersions.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launch

[Bug 1520225] lxc-net.default.txt

2015-11-26 Thread Junien Fridrick
apport information ** Attachment added: "lxc-net.default.txt" https://bugs.launchpad.net/bugs/1520225/+attachment/4525788/+files/lxc-net.default.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1

[Bug 1520225] lxc.default.txt

2015-11-26 Thread Junien Fridrick
apport information ** Attachment added: "lxc.default.txt" https://bugs.launchpad.net/bugs/1520225/+attachment/4525789/+files/lxc.default.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1520225

[Bug 1520225] [NEW] lxc-stop powered off a server

2015-11-26 Thread Junien Fridrick
Public bug reported: Hi, Earlier today, a server got powered off and I'm 99% sure it's because I ran the following command as root : # lxc-stop -n The container was started manually with : # lxc-start -n -F --share-net 1 and it wasn't fully booted (ie I didn't have the console yet). syslog

[Bug 1520225] Re: lxc-stop powered off a server

2015-11-26 Thread Junien Fridrick
Hi, container config : http://paste.ubuntu.com/13524088/ /etc/apt/sources.list.d just contains a repo for some homemade backports "dpkg -l | grep lxc" was given in the initial comment, but here it is again : $ dpkg -l|grep lxc ii liblxc1 1.0.7-0ubuntu0.10 amd64 Linux Containers userspace tools (

[Bug 1505564] Re: Soft lockup with "block nbdX: Attempted send on closed socket" spam

2015-12-23 Thread Junien Fridrick
Hi Dan, Thanks for your investigation. Sorry for the delay, but finally I managed to reboot the compute nodes with the "notsc" kernel parameter. I also disabled the qemu-nbd workaround. Once that was done, it didn't take long for a node to crash, which would indicate that notsc didn't fix the pro

[Bug 1505564] Re: Soft lockup with "block nbdX: Attempted send on closed socket" spam

2016-01-13 Thread Junien Fridrick
I resumed the tests on Monday, and so far we're looking good. Your change prevented ~10 locks so far, it would seem. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1505564 Title: Soft lockup with "bl

[Bug 1505564] Re: Soft lockup with "block nbdX: Attempted send on closed socket" spam

2016-03-04 Thread Junien Fridrick
Thanks ! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1505564 Title: Soft lockup with "block nbdX: Attempted send on closed socket" spam To manage notifications about this bug go to: https://bugs.

[Bug 1505564] Re: Soft lockup with "block nbdX: Attempted send on closed socket" spam

2015-12-30 Thread Junien Fridrick
Re-reading comment #318 Dan, I realize that we may be investigating a symptom and not the root cause. Whenever the soft-lockup happens, the serial console does get flooded "block nbdX: Attempted send on closed socket". If the serial console getting flooded causes soft lockups, then it is indeed a

[Bug 1505564] Re: Soft lockup with "block nbdX: Attempted send on closed socket" spam

2016-01-08 Thread Junien Fridrick
I applied the patch, and it saved a reboot twice already, I think. dmesg from one server : http://pastebin.ubuntu.com/14438525/ I have to stop the tests for the weekend though, I'll resume on Monday. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscrib

[Bug 1826857] Re: offloading disabled when using linuxbrige or bonding

2019-07-23 Thread Junien Fridrick
I don't think I tested with OVS out of the picture. However, none of the physical interface was enslaved to an OVS bridge, so I'd say this is not an ovs bug and can likely be repro'ed outside of OVS. I don't have time to do this in the short term though. ** Changed in: openvswitch (Ubuntu)

[Bug 1948995] Re: Allow reverting to older revisions of a snap

2021-10-28 Thread Junien Fridrick
@anonymouse67 hello ! so how do you suggest we fix our production system now ? ** Changed in: snapd (Ubuntu) Status: Invalid => New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1948995 Title:

[Bug 1948995] Re: Allow reverting to older revisions of a snap

2021-10-28 Thread Junien Fridrick
OK thanks. I must say that this is not a great user experience. How would we "increase the number of revisions that are kept around on a system" ? It seems that the default of 2 is pretty low for servers. ** Changed in: snapd (Ubuntu) Status: Incomplete => New -- You received this bug not

[Bug 1943024] [NEW] unreliable/racy/incomplete interface state detection at boot

2021-09-08 Thread Junien Fridrick
Public bug reported: Hi, This is somewhat related to bug 1772137. I have a "firewall" script in routable.d and here's what I get upon boot : https://pastebin.canonical.com/p/bCkQrdm3HB/ I'm interested in the "vlan3060" interface. This interface, once networkd finishes its setup, properly comes u

[Bug 1952264] Re: ntp sync checks fail when server as no IPv6 connectivity

2021-11-25 Thread Junien Fridrick
I investigated this quite a bit, and this appears to be an ntp bug and not a charm bug. This host is a trusty host, running ntp version 1:4.2.6.p5+dfsg-3ubuntu2.14.04.13. We have other hosts running the same version that don't have the problem described above. I spent quite some time investigatin

[Bug 1952264] Re: ntpd interface listing is bugged

2021-11-25 Thread Junien Fridrick
** Summary changed: - ntp sync checks fail when server as no IPv6 connectivity + ntpd interface listing is bugged -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1952264 Title: ntpd interface listing

[Bug 1904580] Re: Permissions 0644 for '/var/lib/nova/.ssh/id_rsa' are too open

2022-04-19 Thread Junien Fridrick
Any update here ? This is blocking critical node evacuation. Thanks ! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1904580 Title: Permissions 0644 for '/var/lib/nova/.ssh/id_rsa' are too open To m

<    1   2   3   4