New oom-killer related crash for low RAM UC devices

Bug #2067631 reported by Massimiliano Girardi
12
This bug affects 2 people
Affects Status Importance Assigned to Milestone
snapd
Fix Committed
High
Zygmunt Krynicki

Bug Description

Checkbox18 is getting killed by the oom-killer during test sessions when the
new version of snapd (2.63) is in use on very low RAM (<500Mb) Ubuntu Core
devices. This behaviour is reproducible (100% of the runs are killed with the
new snapd version) and doesn't happen with the previous one (2.62).

The Checkbox snap is installed in devmode, this triggers various audit messages
and warnings to be produced but we have discovered that this new version of
snapd produces way more messages/complains in the journal.

Namely the line that seems to be most rappresented in these logs is in the form
of:
```
core18-memory audit[2114]: SECCOMP ... syscall=NNN
```
This line doesn't appear in the snapd2.62 log, a similar line about
```
core18-memory audit[3698]: AVC ...
```
is present but in a quantity that is an order of magnitude less

Here is a table with the syscalls and their meaning (truncated, >1k)
ID COUNT MEANING
4 36313 stat
257 23271 openat
5 20478 fstat
3 18008 close
0 14508 read
8 9872 lseek
228 7541 clock_gettime
16 4109 ioctl
9 4071 mmap
202 3417 futex
10 2981 mprotect
21 2375 access
78 2084 getdents
6 1975 lstat
13 1914 rt_sigaction
11 1666 munmap
83 1446 mkdir
12 1526 brk
96 1176 gettimeofday
267 1108 readlinkat

For reference, this is the previous version counts:
ID COUNT
 41 42
 116 30

While Checkbox has started but is "idle" (waiting for a test to run), the
following are logged over and over:
```
May 30 14:22:11 core18-memory audit[2373]: SECCOMP auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2373 comm="python3" exe="/usr/bin/python3.6" sig=0 arch=c000003e syscall=7 compat=0 ip=0x7fb1a9217bb9 code=0x7ffc0000
May 30 14:22:11 core18-memory kernel: audit: type=1326 audit(1717078931.530:477233): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2373 comm="python3" exe="/usr/bin/python3.6" sig=0 arch=c000003e syscall=228 compat=0 ip=0x7ffdc63f4b62 code=0x7ffc0000
```

To work around this issue we have tried to (several combinations of the following):
- Created a very large (4Gb) swap file for it to use, it is used and the oom-killer
  is still invoked at ~20% space occupied (the system freezes at this occupancy,
  ressurrects after the oom-killer is done)
- Forcing vm.overcommit_memory
- Enabling RateLimitIntervalSec=, RateLimitBurst= for journald (needs re-testing
  possibly not done properly)

The only things that seem to work are:
- Using the older version of snapd
- Using a device with more RAM (1Gb works fine)
- Increasing (when running in a VM) the RAM (so same machine, more RAM)

We have created the following shared drive directories with the logs of a run
crashing with this issue on the new version, and one passing bootstrap with the
old version. You can find it here: https://drive.google.com/drive/folders/10MnsCWeRL0O-X2kDZmP_Rt6koGDoh3lO

As an exaple, the following was failing with this new issue on the new version of
snapd (this log is basically checkbox crashing and restarting):
- http://10.102.156.15:8080/job/cert-sugarland-pdk-core20-beta/47/console
While here, after downgrading snapd it seems to work fine:
- http://10.102.156.15:8080/job/cert-sugarland-pdk-core20-beta/48/console

Reproducing steps:
- Provision a machine (or VM) with any UC operating system (we tested uc20 and uc18) with less than 500Mb of ram and the last version of snapd
- Install checkbox18 (or 20) and checkbox uc18/uc20
  - sudo snap install checkbox18
  - sudo snap install checkbox --channel=uc18 --devmode
- Run `sudo checkbox.checkbox-cli run com.canonical.certification::sru-ubuntucore`
- Checkbox should be killed by the oom-killer soon after

description: updated
description: updated
Zygmunt Krynicki (zyga)
Changed in snapd:
assignee: nobody → Zygmunt Krynicki (zyga)
description: updated
Revision history for this message
Zygmunt Krynicki (zyga) wrote (last edit ):

I've filed a jira task https://warthogs.atlassian.net/browse/SNAPDENG-22672 for internal scheduling.

Changed in snapd:
status: New → In Progress
Revision history for this message
Zygmunt Krynicki (zyga) wrote :
Download full text (5.3 KiB)

During the x86_64/efi core24 boot up process, with snapd 2.63, using the pre-created image from cdimage.ubuntu.com:

d82b5b9b86e7b592dc6b48edfbce7b16be6c5064c779db91f720a1ce071622a0 ubuntu-core-24-amd64.img.xz

I hit OOM during boot-up, when snapd.recovery-chooser-trigger crashes on boot:

Jun 04 10:58:03 localhost systemd[1]: Starting snapd.recovery-chooser-trigger.service - Wait for the Ubuntu Core chooser trigger...
Jun 04 10:58:03 localhost snap-bootstrap[147]: cmd_recovery_chooser_trigger.go:91: trigger wait timeout 10s
Jun 04 10:58:03 localhost snap-bootstrap[147]: cmd_recovery_chooser_trigger.go:92: device timeout 2s
Jun 04 10:58:03 localhost snap-bootstrap[147]: cmd_recovery_chooser_trigger.go:93: marker file /run/snapd-recovery-chooser-triggered
Jun 04 10:58:03 localhost snap-bootstrap[147]: triggerwatch.go:108: waiting for trigger key: KEY_1
Jun 04 10:58:03 localhost snap-bootstrap[147]: evdev.go:91: isa0060/serio0/input0: AT Translated Set 2 keyboard: starting wait, hold 2s to trigger
Jun 04 10:58:03 localhost snap-bootstrap[147]: evdev.go:91: isa0060/serio0/input0: AT Translated Set 2 keyboard: starting wait, hold 2s to trigger
Jun 04 10:58:08 localhost snap-bootstrap[147]: triggerwatch.go:146: Switching root
Jun 04 10:58:10 localhost systemd[1]: snapd.recovery-chooser-trigger.service: A process of this unit has been killed by the OOM killer.
Jun 04 10:58:17 localhost systemd[1]: Starting snapd.recovery-chooser-trigger.service - Wait for the Ubuntu Core chooser trigger...
Jun 04 10:58:19 localhost snap-bootstrap[904]: cmd_recovery_chooser_trigger.go:91: trigger wait timeout 10s
Jun 04 10:58:19 localhost snap-bootstrap[904]: cmd_recovery_chooser_trigger.go:92: device timeout 2s
Jun 04 10:58:19 localhost snap-bootstrap[904]: cmd_recovery_chooser_trigger.go:93: marker file /run/snapd-recovery-chooser-triggered
Jun 04 10:58:19 localhost snap-bootstrap[904]: triggerwatch.go:108: waiting for trigger key: KEY_1
Jun 04 10:58:19 localhost snap-bootstrap[904]: evdev.go:91: isa0060/serio0/input0: AT Translated Set 2 keyboard: starting wait, hold 2s to trigger
Jun 04 10:58:32 localhost systemd[1]: snapd.recovery-chooser-trigger.service: Main process exited, code=killed, status=9/KILL
Jun 04 10:58:32 localhost systemd[1]: snapd.recovery-chooser-trigger.service: Failed with result 'signal'.
Jun 04 10:58:32 localhost systemd[1]: Failed to start snapd.recovery-chooser-trigger.service - Wait for the Ubuntu Core chooser trigger.
Jun 04 10:58:32 localhost systemd[1]: snapd.recovery-chooser-trigger.service: Consumed 4.889s CPU time.

Rolling back snapd to 2.62 (21470) I get the same kind of crash on boot:

[ 10.166281] Out of memory: Killed process 147 (snap-bootstrap) total-vm:2240016kB, anon-rss:400284kB, file-rss:0kB, shmem-rss:9216kB, UID:0 pgtables:1004kB oom_score_adj:0

Jun 04 11:29:43 localhost systemd[1]: Starting snapd.recovery-chooser-trigger.service - Wait for the Ubuntu Core chooser trigger...
Jun 04 11:29:43 localhost snap-bootstrap[147]: cmd_recovery_chooser_trigger.go:91: trigger wait timeout 10s
Jun 04 11:29:43 localhost snap-bootstrap[147]: cmd_recovery_chooser_trigger.go:92: device timeout 2s
Jun 04 11:29:43 localhost snap-boot...

Read more...

Revision history for this message
Zygmunt Krynicki (zyga) wrote :
Download full text (4.4 KiB)

 I can run checkbox both on 2.62 and 2.63 with qemu using -m 460 -smp 1 - the system boots enough for me to complete the test run without hitting OOM:

==================================[ Results ]===================================
 ☑ : Collect information about installed system (lsb-release)
 ☑ : Collect information about installed snap packages
 ☑ : Collect information about the CPU
 ☑ : Attaches json dumps of installed dkms package information.
 ☑ : Attach detailed sysfs property output from udev
 ☑ : Provide links to requirements documents
 ☑ : Collect information about system memory (/proc/meminfo)
 ☑ : Attaches json dumps of system info tools
 ☑ : Enumerate available system executables
 ☑ : Resource to detect if dmi data is present
 ☑ : Attaches json dumps of raw dmi devices
 ☑ : Collect information about hardware devices (DMI)
 ☑ : Attach info block devices and their mount points
 ☑ : Attach dump of udev database
 ☑ : Collect information about the EFI configuration
 ☑ : Attach a copy of /proc/cmdline
 ☑ : Collect information about installed software packages
 ☑ : Attach a copy of /sys/class/dmi/id/*
 ☑ : Collect information about installation media (casper)
 ☑ : Attach PCI configuration space hex dump
 ☑ : Collect information about hardware devices (udev)
 ☑ : Collect information about the running kernel
 ☑ : Attaches json dumps of udev_resource.py
 ☑ : Create resource info for environment variables
 ☑ : Collect information about kernel modules
 ☑ : Collect information about dpkg version
 ☑ : Attach the contents of /etc/modprobe.*
 ☑ : Check that data for a complete result are present
 ☑ : acpi_sleep_attachment
 ☒ : codecs_attachment
 ☑ : Attach a copy of /proc/cpuinfo
 ☑ : Attach a copy of dmesg
 ☑ : Attach output of dmidecode
 ☑ : Attaches firmware version info
 ☑ : Attach a list of PCI devices
 ☑ : Attach copy of /proc/meminfo
 ☑ : Attach the contents of /etc/modprobe.*
 ☑ : Attach the contents of /etc/modules
 ☑ : Identify what service is managing each physical network interface
 ☑ : Collect logging from the net_if_management job
 ☑ : Attach sysctl configuration files.
 ☑ : Attach a list of currently running kernel modules
 ☑ : Hardware Manifest
 ☐ : Check that at least one audio capture device exists
 ☐ : Check that at least one audio playback device exists
 ☐ : Captured sound matches played one (automated)
 ☐ : bluetooth/detect-output
 ☐ : Test the CPU scaling capabilities
 ☐ : Attach CPU scaling capabilities log
 ☑ : cpu_offlining
 ☐ : Test offlining of each CPU core
 ☐ : Check CPU topology for accuracy between proc and sysfs
 ☒ : Disk performance test for vda
 ☐ : Automated test of SD Card reading & writing (udisk2)
 ☑ : Check amount of memory reported by meminfo against DMI
 ☐ : Detect if at least one ethernet device is detected
 ☑ : Gather info on current state of network devices
 ☒ : networking/http
 ☑ : Can ping another machine over Ethernet port ens3
 ☑ : Creates resource info for RTC
 ☒ : Test that RTC functions properly (if present)
 ☑ : power-management/fwts_wakealarm
 ☑ : power-management/fwts_wakealarm-log-attach
 ☑ : Display USB devices attached to SUT
 ☐ : Test USB 2.0 or 1.1 ports
 ☑ : Verify that all the CPUs are...

Read more...

Revision history for this message
Fernando Bravo Hernández (ferbraher) wrote :

Just as a note, the test plans from which we got the logs, were launched using the remote session.
I had a launcher like this one:

[launcher]
app_id = com.canonical.certification:checkbox
launcher_version = 1
stock_reports = text, submission_files, certification
local_submission = yes

[test plan]
unit = com.canonical.certification::client-cert-iot-ubuntucore-18-automated
forced = yes

[test selection]
forced = yes

[ui]
type = silent
auto_retry = yes
max_attempts = 4
delay_before_retry = 30

And I run the remote session into a VM with 256MB and Ubuntu Core 18.

 - checkbox-cli control <vm-ip> launcher

The spam of logs was similar in both cases, but with the remote setup, the checkbox agent was killed by OOM killer and restarted again, so the session continued restarting indefinitely.

Revision history for this message
Zygmunt Krynicki (zyga) wrote :

I'm trying to reproduce this issue on core24 with piboot as the boot loader, running on Raspberry Pi 3B+ with 1GB of ram. I'm seeing _some_ unexpected audit messages:

Jun 07 15:28:00 pi3-2 kernel: audit: type=1326 audit(1717766880.238:1370554): auid=1000 uid=0 gid=0 ses=1 subj=unconfined pid=3373 comm="python3" exe="/usr/bin/python3.6" sig=0 arch=c00000b7 syscall=34 compat=0 ip=0xffff8e58b410 code=0x7ffc0000

^ This is mkdirat. This is not a denial, but we're still logging an audit message which is unusal.

There's quite a bit more of stuff like that and I don't really have checkbox running yet. It's just starting and ... churning. I know pi is slow but is it that slow?

Revision history for this message
Massimiliano Girardi (hook25) wrote :

Wait are you testing the Checkbox20 snap on core24? I don't think that is going to work at all actually. We always run the checkboxXX version on coreXX. Linking a setup that uses core18 + checkbox18 + checkbox uc18.

New version of snapd:

http://10.102.156.15:8080/job/cert-rpi3aplus-arm64-pi-kernel-18-pi-beta/77/console

Old version of snapd:

http://10.102.156.15:8080/job/cert-rpi3aplus-arm64-pi-kernel-18-pi-beta/82/console

Revision history for this message
Zygmunt Krynicki (zyga) wrote :

I'm trying to get something to work so that I can do A/B comparison. I cannot boot ubuntu core 18 or 20 on my pi3b+ hardware (uboot is stuck).

Checkbox 18 does actually run, so that much I can use for analysis.

Revision history for this message
Zygmunt Krynicki (zyga) wrote (last edit ):
Download full text (6.7 KiB)

Tested snapd revisions:

snapd 2.62 21473 latest/stable canonical✓ snapd
snapd 2.63 21761 latest/stable canonical✓ snapd

I've limited my pi3b+ board to 400MB of memory by adding a constraint to piboot's config.txt

zyga@pi3-2:~$ tail -n2 /run/mnt/ubuntu-seed/config.txt

total_mem=400

I've got 304MB of total memory (some of the 400MB of "total" memory is reserved to the video core)

zyga@pi3-2:~$ free -m
               total used free shared buff/cache available
Mem: 304 139 18 4 158 164
Swap: 0 0 0

zyga@pi3-2:~$ cat /etc/os-release
NAME="Ubuntu Core"
VERSION="24"
ID=ubuntu-core
PRETTY_NAME="Ubuntu Core 24"
VERSION_ID="24"
HOME_URL="https://snapcraft.io/"
BUG_REPORT_URL="https://bugs.launchpad.net/snappy/"

zyga@pi3-2:~$ snap list
Name Version Rev Tracking Publisher Notes
checkbox 3.3.0-dev19 5219 uc18/stable ce-certification-qa devmode
checkbox18 3.3.0-dev19 3005 latest/stable ce-certification-qa -
console-conf 24.04.1+git45g5f9fae19+gd81a15d 41 24/stable canonical✓ -
core18 20240416 2826 latest/stable canonical✓ base
core24 20240528 424 latest/stable canonical✓ base
pi 24-1 142 24/stable canonical✓ gadget
pi-kernel 6.8.0-1005.5 852 24/stable canonical✓ kernel
snapd 2.63 21761 latest/stable canonical✓ snapd

Even with this I'm able to run checkbox:

sudo checkbox.checkbox-cli run com.canonical.certification::sru-ubuntucore

(lots of output removed)

 ☑ : Collect information about the CPU
 ☐ : Attach detailed sysfs property output from udev
 ☑ : Create resource info for environment variables
 ☑ : Collect information about installed system (lsb-release)
 ☑ : Attach a copy of /proc/cmdline
 ☑ : Collect information about installed software packages
 ☑ : Attach dump of udev database
 ☑ : Collect information about system memory (/proc/meminfo)
 ☑ : Attach the contents of /etc/modprobe.*
 ☑ : Attach PCI configuration space hex dump
 ☑ : Collect information about the running kernel
 ☑ : Attaches json dumps of udev_resource.py
 ☑ : Provide links to requirements documents
 ☐ : Attaches json dumps of system info tools
 ☑ : Collect information about installed snap packages
 ☑ : Attaches json dumps of installed dkms package information.
 ☑ : Enumerate available system executables
 ☑ : Resource to detect if dmi data is present
 ☐ : Attaches json dumps of raw dmi devices
 ☑ : Collect information about installation media (casper)
 ☑ : Collect information about dpkg version
 ☑ : Collect information about kernel modules
 ☐ : Attach a copy of /sys/class/dmi/id/*
 ☑ : Collect information about hardware devices (udev)
 ☐ : Collect information about hardware devices (DMI)
 ☑ : Attach info bloc...

Read more...

Revision history for this message
Zygmunt Krynicki (zyga) wrote :
Download full text (12.9 KiB)

My raspberry pi 3B+ no longer boots core24 with memory limit set to 395MB - (assuming 128MB is used by the videocore side, this leaves just 267MB of memory for all of Linux. I have nothing on the serial port but there's a backtrace on HDMI where plymouthd crashes somewhere in freetype.

With some more memory I was able to move to checkbox for core-24 from edge:

zyga@pi3-2:~$ snap list
Name Version Rev Tracking Publisher Notes
checkbox 4.0.0-dev297 7268 uc24/edge ce-certification-qa devmode
checkbox18 3.3.0-dev19 3005 latest/stable ce-certification-qa disabled
checkbox24 4.0.0-dev297 25 latest/edge ce-certification-qa -
console-conf 24.04.1+git45g5f9fae19+gd81a15d 41 24/stable canonical✓ -
core18 20240416 2826 latest/stable canonical✓ base
core24 20240528 424 latest/stable canonical✓ base
pi 24-1 142 24/stable canonical✓ gadget
pi-kernel 6.8.0-1005.5 852 24/stable canonical✓ kernel
snapd 2.63 21761 latest/stable canonical✓ snapd

Note that "some more memory" is still significantly less than 512MB:

zyga@pi3-2:~$ free -m
               total used free shared buff/cache available
Mem: 299 150 57 4 104 148
Swap: 0 0 0

Again I limited memory with config.txt:

# XXX: artificially limit available memory to stress-test the system.
total_mem=395
gpu_mem=64

With this limit I can complete a checkbox run. While not the best overall estimate, the total memory needed in the system.slice was about 180MB (1024)

zyga@pi3-2:/sys/fs/cgroup$ cat system.slice/memory.peak
190345216

The result I've obtained:

Finalizing session that hasn't been submitted anywhere: checkbox-run-2024-06-10T08.58.22
==================================[ Results ]===================================
 ☑ : Collect information about system memory (/proc/meminfo)
 ☑ : Enumerate available system executables
 ☑ : Attach information about block devices and their mount points.
 ☑ : Collect information about the CPU
 ☐ : Attaches JSON dumps of system info tools
 ☑ : Provide links to requirements documents
 ☑ : Attach a copy of /proc/cmdline
 ☑ : Collect information about installed software packages
 ☑ : Resource to detect if dmi data is present
 ☐ : Attaches JSON dumps of raw DMI devices
 ☑ : Collect information about the running kernel
 ☑ : Collect information about the EFI configuration
 ☑ : Collect information about installed system (lsb-release)
 ☑ : Attaches json dumps of installed dkms package information.
 ☑ : Create resource info for environment variables
 ☐ : Attach detailed sysfs property output from udev
 ☑ : Collect information about hardware devices (udev)
 ☒ : Collect information about installed snap packages
 ☑ : Collect information about kernel modules
 ☑ : Attach PCI conf...

Revision history for this message
Zygmunt Krynicki (zyga) wrote :
Download full text (17.0 KiB)

I've reproduced the failure:

[ 2174.310348] dmesg invoked oom-killer: gfp_mask=0x14200ca(GFP_HIGHUSER_MOVABLE), nodemask=(null), order=0, oom_score_adj=0
[ 2174.310349] dmesg cpuset=/ mems_allowed=0
[ 2174.310362] CPU: 0 PID: 2226 Comm: dmesg Not tainted 4.15.0-225-generic #237-Ubuntu
[ 2174.310363] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 2024.02-2 03/11/2024
[ 2174.310363] Call Trace:
[ 2174.310392] dump_stack+0x6d/0x8b
[ 2174.310395] dump_header+0x71/0x282
[ 2174.310398] ? ___ratelimit+0x9c/0x100
[ 2174.310410] oom_kill_process+0x21f/0x420
[ 2174.310411] out_of_memory+0x116/0x4e0
[ 2174.310412] __alloc_pages_slowpath+0xa3d/0xe70
[ 2174.310417] ? alloc_pages_current+0x6a/0xe0
[ 2174.310418] __alloc_pages_nodemask+0x29a/0x2c0
[ 2174.310419] alloc_pages_current+0x6a/0xe0
[ 2174.310422] __page_cache_alloc+0x81/0xa0
[ 2174.310423] filemap_fault+0x42f/0x750
[ 2174.310424] ? filemap_map_pages+0x181/0x390
[ 2174.310427] __do_fault+0x34/0x100
[ 2174.310428] __handle_mm_fault+0x982/0xc50
[ 2174.310429] handle_mm_fault+0xe7/0x260
[ 2174.310439] __do_page_fault+0x281/0x4b0
[ 2174.310440] ? __schedule+0x256/0x890
[ 2174.310441] do_page_fault+0x2e/0xe0
[ 2174.310444] ? async_page_fault+0x2f/0x50
[ 2174.310449] do_async_page_fault+0x51/0x80
[ 2174.310449] async_page_fault+0x45/0x50
[ 2174.310453] RIP: 0033:0x7f419bfeb100
[ 2174.310454] RSP: 002b:00007ffd5f9b4cf8 EFLAGS: 00010246
[ 2174.310477] RAX: 000055930a25d169 RBX: 00007f419c31c760 RCX: 000055930a25d16a
[ 2174.310477] RDX: 0000000000000001 RSI: 000055930a25d169 RDI: 000055930b43a8a7
[ 2174.310478] RBP: 0000000000000001 R08: 00007f419c31c760 R09: 0000000000000000
[ 2174.310478] R10: 0000000000000005 R11: 000055930a058f02 R12: 0000000000000001
[ 2174.310478] R13: 000055930a25d16a R14: 0000000000000000 R15: 0000000000000000
[ 2174.310481] Mem-Info:
[ 2174.310483] active_anon:32340 inactive_anon:996 isolated_anon:0
                active_file:236 inactive_file:281 isolated_file:0
                unevictable:0 dirty:0 writeback:0 unstable:0
                slab_reclaimable:3321 slab_unreclaimable:13715
                mapped:37 shmem:1375 pagetables:1063 bounce:0
                free:637 free_pcp:6 free_cma:0
[ 2174.310486] Node 0 active_anon:129360kB inactive_anon:3984kB active_file:944kB inactive_file:1124kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:148kB dirty:0kB writeback:0kB shmem:5500kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes
[ 2174.310487] Node 0 DMA free:868kB min:128kB low:160kB high:192kB active_anon:8228kB inactive_anon:608kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15000kB managed:14912kB mlocked:0kB kernel_stack:32kB pagetables:92kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB
[ 2174.310490] lowmem_reserve[]: 0 185 185 185 185
[ 2174.310491] Node 0 DMA32 free:1680kB min:1680kB low:2100kB high:2520kB active_anon:121132kB inactive_anon:3376kB active_file:944kB inactive_file:1124kB unevictable:0kB writepending:0kB present:240772kB managed:213444kB mlocked:0kB kernel_stack:1648kB pagetables:4160kB bounce:0kB free_pcp:24kB local_pcp:2...

Changed in snapd:
importance: Undecided → High
Revision history for this message
Zygmunt Krynicki (zyga) wrote :

I'm working on bisecting the failure. Having said that the system _is_ running on fumes in terms of RAM. Checkbox is using a good fraction of available system RAM when the failure occurrs (both python processes are checkbox)

Zygmunt Krynicki (zyga)
Changed in snapd:
status: In Progress → Fix Committed
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.