Shad0wWulf

Members
  • Posts

    29
  • Joined

  • Last visited

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

Shad0wWulf's Achievements

Noob

Noob (1/14)

1

Reputation

  1. Here is my return from your command I dont know the diffrences betwen the two docker lan types. But i think i remember somewhere seeing that to set a mac-address / vlan / custom IP macvlan was better? But i dont really know. Its not been a issue afaik appart from filling my logs.
  2. I have just captured a panic whilst watching the syslog, this was whilst i was running the mover script to move stuff from the cache to the array, i have removed the 'file' events showing the filenames. root@ShadowServer:~# tail -n 42 -f /var/log/syslog Dec 20 01:31:27 ShadowServer kernel: docker0: port 4(vethc275c49) entered forwarding state Dec 20 01:31:27 ShadowServer kernel: eth0: renamed from vethe9cb8fd Dec 20 01:31:27 ShadowServer kernel: IPv6: ADDRCONF(NETDEV_CHANGE): vethc275c49: link becomes ready Dec 20 01:31:43 ShadowServer nginx: 2023/12/20 01:31:43 [error] 16753#16753: *166459 upstream timed out (110: Connection timed out) while reading response header from upstream, client: 192.168.1.129, server: , request: "POST /plugins/dynamix.file.manager/include/Control.php HTTP/1.1", upstream: "fastcgi://unix:/var/run/php5-fpm.sock", host: "192.168.1.6", referrer: "http://192.168.1.6/Shares/Browse?dir=/mnt/user/docker_os" Dec 20 01:32:27 ShadowServer kernel: docker0: port 4(vethc275c49) entered disabled state Dec 20 01:32:27 ShadowServer kernel: vethe9cb8fd: renamed from eth0 Dec 20 01:32:27 ShadowServer kernel: docker0: port 4(vethc275c49) entered disabled state Dec 20 01:32:27 ShadowServer kernel: device vethc275c49 left promiscuous mode Dec 20 01:32:27 ShadowServer kernel: docker0: port 4(vethc275c49) entered disabled state Dec 20 01:32:27 ShadowServer kernel: docker0: port 4(vethc1fbe72) entered blocking state Dec 20 01:32:27 ShadowServer kernel: docker0: port 4(vethc1fbe72) entered disabled state Dec 20 01:32:27 ShadowServer kernel: device vethc1fbe72 entered promiscuous mode Dec 20 01:32:27 ShadowServer kernel: docker0: port 4(vethc1fbe72) entered blocking state Dec 20 01:32:27 ShadowServer kernel: docker0: port 4(vethc1fbe72) entered forwarding state Dec 20 01:32:27 ShadowServer kernel: eth0: renamed from vethb739cb6 Dec 20 01:32:27 ShadowServer kernel: IPv6: ADDRCONF(NETDEV_CHANGE): vethc1fbe72: link becomes ready Dec 20 01:33:27 ShadowServer kernel: docker0: port 4(vethc1fbe72) entered disabled state Dec 20 01:33:27 ShadowServer kernel: vethb739cb6: renamed from eth0 Dec 20 01:33:27 ShadowServer kernel: docker0: port 4(vethc1fbe72) entered disabled state Dec 20 01:33:27 ShadowServer kernel: device vethc1fbe72 left promiscuous mode Dec 20 01:33:27 ShadowServer kernel: docker0: port 4(vethc1fbe72) entered disabled state Dec 20 01:33:27 ShadowServer kernel: docker0: port 4(vethc8bd284) entered blocking state Dec 20 01:33:27 ShadowServer kernel: docker0: port 4(vethc8bd284) entered disabled state Dec 20 01:33:27 ShadowServer kernel: device vethc8bd284 entered promiscuous mode Dec 20 01:33:27 ShadowServer kernel: docker0: port 4(vethc8bd284) entered blocking state Dec 20 01:33:27 ShadowServer kernel: docker0: port 4(vethc8bd284) entered forwarding state Dec 20 01:33:27 ShadowServer kernel: eth0: renamed from vethb5722e3 Dec 20 01:33:27 ShadowServer kernel: IPv6: ADDRCONF(NETDEV_CHANGE): vethc8bd284: link becomes ready Dec 20 01:34:27 ShadowServer kernel: vethb5722e3: renamed from eth0 Dec 20 01:34:27 ShadowServer kernel: docker0: port 4(vethc8bd284) entered disabled state Dec 20 01:34:27 ShadowServer kernel: docker0: port 4(vethc8bd284) entered disabled state Dec 20 01:34:27 ShadowServer kernel: device vethc8bd284 left promiscuous mode Dec 20 01:34:27 ShadowServer kernel: docker0: port 4(vethc8bd284) entered disabled state Dec 20 01:34:27 ShadowServer kernel: docker0: port 4(veth1232170) entered blocking state Dec 20 01:34:27 ShadowServer kernel: docker0: port 4(veth1232170) entered disabled state Dec 20 01:34:27 ShadowServer kernel: device veth1232170 entered promiscuous mode Dec 20 01:34:27 ShadowServer kernel: docker0: port 4(veth1232170) entered blocking state Dec 20 01:34:27 ShadowServer kernel: docker0: port 4(veth1232170) entered forwarding state Dec 20 01:34:27 ShadowServer kernel: eth0: renamed from veth0670ac7 Dec 20 01:34:27 ShadowServer kernel: IPv6: ADDRCONF(NETDEV_CHANGE): veth1232170: link becomes ready Dec 20 01:34:46 ShadowServer sshd[28834]: Accepted password for root from 192.168.1.129 port 59765 ssh2 Dec 20 01:34:56 ShadowServer sshd[10811]: Connection closed by 192.168.1.6 port 33134 [preauth] Dec 20 01:35:27 ShadowServer kernel: docker0: port 4(veth1232170) entered disabled state Dec 20 01:35:27 ShadowServer kernel: veth0670ac7: renamed from eth0 Dec 20 01:35:27 ShadowServer kernel: docker0: port 4(veth1232170) entered disabled state Dec 20 01:35:27 ShadowServer kernel: device veth1232170 left promiscuous mode Dec 20 01:35:27 ShadowServer kernel: docker0: port 4(veth1232170) entered disabled state Dec 20 01:35:27 ShadowServer kernel: docker0: port 4(vethe9c392f) entered blocking state Dec 20 01:35:27 ShadowServer kernel: docker0: port 4(vethe9c392f) entered disabled state Dec 20 01:35:27 ShadowServer kernel: device vethe9c392f entered promiscuous mode Dec 20 01:35:27 ShadowServer kernel: docker0: port 4(vethe9c392f) entered blocking state Dec 20 01:35:27 ShadowServer kernel: docker0: port 4(vethe9c392f) entered forwarding state Dec 20 01:35:27 ShadowServer kernel: eth0: renamed from vethb0f42b8 Dec 20 01:35:27 ShadowServer kernel: IPv6: ADDRCONF(NETDEV_CHANGE): vethe9c392f: link becomes ready Dec 20 01:36:13 ShadowServer kernel: mdcmd (44): set md_write_method 1 Dec 20 01:36:13 ShadowServer kernel: Dec 20 01:36:14 ShadowServer move: sed: couldn't flush stdout: Broken pipe Dec 20 01:36:14 ShadowServer kernel: mdcmd (45): set md_write_method auto Dec 20 01:36:14 ShadowServer kernel: Dec 20 01:36:22 ShadowServer root: plugin: running: anonymous Dec 20 01:36:22 ShadowServer root: plugin: running: anonymous Dec 20 01:36:22 ShadowServer root: plugin: creating: /boot/config/plugins/ca.mover.tuning/ca.mover.tuning-2023.12.19-x86_64-1.txz - downloading from URL https://raw.github.com/hugenbd/ca.mover.tuning/master/archive/ca.mover.tuning-2023.12.19-x86_64-1.txz Dec 20 01:36:23 ShadowServer root: plugin: checking: /boot/config/plugins/ca.mover.tuning/ca.mover.tuning-2023.12.19-x86_64-1.txz - MD5 Dec 20 01:36:23 ShadowServer root: plugin: running: upgradepkg --install-new /boot/config/plugins/ca.mover.tuning/ca.mover.tuning-2023.12.19-x86_64-1.txz Dec 20 01:36:23 ShadowServer root: plugin: running: anonymous Dec 20 01:36:23 ShadowServer root: plugin: ca.mover.tuning.plg updated Dec 20 01:36:26 ShadowServer flash_backup: adding task: /usr/local/emhttp/plugins/dynamix.my.servers/scripts/UpdateFlashBackup update Dec 20 01:36:27 ShadowServer kernel: docker0: port 4(vethe9c392f) entered disabled state Dec 20 01:36:27 ShadowServer kernel: vethb0f42b8: renamed from eth0 Dec 20 01:36:27 ShadowServer kernel: docker0: port 4(vethe9c392f) entered disabled state Dec 20 01:36:27 ShadowServer kernel: device vethe9c392f left promiscuous mode Dec 20 01:36:27 ShadowServer kernel: docker0: port 4(vethe9c392f) entered disabled state Dec 20 01:36:27 ShadowServer kernel: docker0: port 4(veth54db5b9) entered blocking state Dec 20 01:36:27 ShadowServer kernel: docker0: port 4(veth54db5b9) entered disabled state Dec 20 01:36:27 ShadowServer kernel: device veth54db5b9 entered promiscuous mode Dec 20 01:36:27 ShadowServer kernel: docker0: port 4(veth54db5b9) entered blocking state Dec 20 01:36:27 ShadowServer kernel: docker0: port 4(veth54db5b9) entered forwarding state Dec 20 01:36:27 ShadowServer kernel: eth0: renamed from veth9106bc4 Dec 20 01:36:27 ShadowServer kernel: IPv6: ADDRCONF(NETDEV_CHANGE): veth54db5b9: link becomes ready Dec 20 01:36:48 ShadowServer login: pam_unix(remote:session): session closed for user root Dec 20 01:37:11 ShadowServer emhttpd: shcmd (522): /usr/local/sbin/mover |& logger -t move & Dec 20 01:37:11 ShadowServer root: Starting Mover Dec 20 01:37:11 ShadowServer root: Forcing turbo write on Dec 20 01:37:11 ShadowServer kernel: mdcmd (46): set md_write_method 1 Dec 20 01:37:11 ShadowServer kernel: Dec 20 01:37:11 ShadowServer root: ionice -c 2 -n 7 nice -n 19 /usr/local/emhttp/plugins/ca.mover.tuning/age_mover start 1 0 0 '' '' '' '' no 20 '' '' 0 Dec 20 01:37:11 ShadowServer move: Log Level: 1 Dec 20 01:37:11 ShadowServer move: mover: started Dec 20 01:37:27 ShadowServer kernel: docker0: port 4(veth54db5b9) entered disabled state Dec 20 01:37:27 ShadowServer kernel: veth9106bc4: renamed from eth0 Dec 20 01:37:27 ShadowServer kernel: docker0: port 4(veth54db5b9) entered disabled state Dec 20 01:37:27 ShadowServer kernel: device veth54db5b9 left promiscuous mode Dec 20 01:37:27 ShadowServer kernel: docker0: port 4(veth54db5b9) entered disabled state Dec 20 01:37:27 ShadowServer kernel: docker0: port 4(vethfdc61f8) entered blocking state Dec 20 01:37:27 ShadowServer kernel: docker0: port 4(vethfdc61f8) entered disabled state Dec 20 01:37:27 ShadowServer kernel: device vethfdc61f8 entered promiscuous mode Dec 20 01:37:27 ShadowServer kernel: docker0: port 4(vethfdc61f8) entered blocking state Dec 20 01:37:27 ShadowServer kernel: docker0: port 4(vethfdc61f8) entered forwarding state Dec 20 01:37:27 ShadowServer kernel: eth0: renamed from veth685cbee Dec 20 01:37:27 ShadowServer kernel: IPv6: ADDRCONF(NETDEV_CHANGE): vethfdc61f8: link becomes ready Dec 20 01:38:26 ShadowServer flash_backup: adding task: /usr/local/emhttp/plugins/dynamix.my.servers/scripts/UpdateFlashBackup update Dec 20 01:38:27 ShadowServer kernel: docker0: port 4(vethfdc61f8) entered disabled state Dec 20 01:38:27 ShadowServer kernel: veth685cbee: renamed from eth0 Dec 20 01:38:27 ShadowServer kernel: docker0: port 4(vethfdc61f8) entered disabled state Dec 20 01:38:27 ShadowServer kernel: device vethfdc61f8 left promiscuous mode Dec 20 01:38:27 ShadowServer kernel: docker0: port 4(vethfdc61f8) entered disabled state Dec 20 01:38:27 ShadowServer kernel: docker0: port 4(vethf659c58) entered blocking state Dec 20 01:38:27 ShadowServer kernel: docker0: port 4(vethf659c58) entered disabled state Dec 20 01:38:27 ShadowServer kernel: device vethf659c58 entered promiscuous mode Dec 20 01:38:27 ShadowServer kernel: docker0: port 4(vethf659c58) entered blocking state Dec 20 01:38:27 ShadowServer kernel: docker0: port 4(vethf659c58) entered forwarding state Dec 20 01:38:27 ShadowServer kernel: eth0: renamed from veth6602189 Dec 20 01:38:27 ShadowServer kernel: IPv6: ADDRCONF(NETDEV_CHANGE): vethf659c58: link becomes ready Dec 20 01:39:04 ShadowServer root: Forcing turbo write on Dec 20 01:39:04 ShadowServer kernel: mdcmd (47): set md_write_method 1 Dec 20 01:39:04 ShadowServer kernel: Dec 20 01:39:04 ShadowServer root: ionice -c 2 -n 0 nice -n 0 /usr/local/emhttp/plugins/ca.mover.tuning/age_mover stop Dec 20 01:39:04 ShadowServer move: stat: write error: Broken pipe Dec 20 01:39:04 ShadowServer root: Restoring original turbo write mode Dec 20 01:39:04 ShadowServer kernel: mdcmd (48): set md_write_method auto Dec 20 01:39:04 ShadowServer kernel: Dec 20 01:39:13 ShadowServer root: Forcing turbo write on Dec 20 01:39:13 ShadowServer kernel: mdcmd (49): set md_write_method 1 Dec 20 01:39:13 ShadowServer kernel: Dec 20 01:39:13 ShadowServer root: ionice -c 2 -n 0 nice -n 0 /usr/local/emhttp/plugins/ca.mover.tuning/age_mover start 1 0 0 '' '' '' '' no 20 '' '' 0 Dec 20 01:39:27 ShadowServer kernel: docker0: port 4(vethf659c58) entered disabled state Dec 20 01:39:27 ShadowServer kernel: veth6602189: renamed from eth0 Dec 20 01:39:27 ShadowServer kernel: docker0: port 4(vethf659c58) entered disabled state Dec 20 01:39:27 ShadowServer kernel: device vethf659c58 left promiscuous mode Dec 20 01:39:27 ShadowServer kernel: docker0: port 4(vethf659c58) entered disabled state Dec 20 01:39:27 ShadowServer kernel: docker0: port 4(veth618cf16) entered blocking state Dec 20 01:39:27 ShadowServer kernel: docker0: port 4(veth618cf16) entered disabled state Dec 20 01:39:27 ShadowServer kernel: device veth618cf16 entered promiscuous mode Dec 20 01:39:27 ShadowServer kernel: docker0: port 4(veth618cf16) entered blocking state Dec 20 01:39:27 ShadowServer kernel: docker0: port 4(veth618cf16) entered forwarding state Dec 20 01:39:27 ShadowServer kernel: eth0: renamed from veth3b6957b Dec 20 01:39:27 ShadowServer kernel: IPv6: ADDRCONF(NETDEV_CHANGE): veth618cf16: link becomes ready Dec 20 01:39:29 ShadowServer root: Mover already running Dec 20 01:39:32 ShadowServer root: Starting Mover Dec 20 01:39:32 ShadowServer root: Mover already running Dec 20 01:39:36 ShadowServer root: Mover already running Dec 20 01:40:27 ShadowServer kernel: docker0: port 4(veth618cf16) entered disabled state Dec 20 01:40:27 ShadowServer kernel: veth3b6957b: renamed from eth0 Dec 20 01:40:27 ShadowServer kernel: docker0: port 4(veth618cf16) entered disabled state Dec 20 01:40:27 ShadowServer kernel: device veth618cf16 left promiscuous mode Dec 20 01:40:27 ShadowServer kernel: docker0: port 4(veth618cf16) entered disabled state Dec 20 01:40:27 ShadowServer kernel: docker0: port 4(veth67ff3a9) entered blocking state Dec 20 01:40:27 ShadowServer kernel: docker0: port 4(veth67ff3a9) entered disabled state Dec 20 01:40:27 ShadowServer kernel: device veth67ff3a9 entered promiscuous mode Dec 20 01:40:27 ShadowServer kernel: docker0: port 4(veth67ff3a9) entered blocking state Dec 20 01:40:27 ShadowServer kernel: docker0: port 4(veth67ff3a9) entered forwarding state Dec 20 01:40:27 ShadowServer kernel: eth0: renamed from vethbe16cf2 Dec 20 01:40:27 ShadowServer kernel: IPv6: ADDRCONF(NETDEV_CHANGE): veth67ff3a9: link becomes ready Dec 20 01:41:27 ShadowServer kernel: docker0: port 4(veth67ff3a9) entered disabled state Dec 20 01:41:27 ShadowServer kernel: vethbe16cf2: renamed from eth0 Dec 20 01:41:27 ShadowServer kernel: docker0: port 4(veth67ff3a9) entered disabled state Dec 20 01:41:27 ShadowServer kernel: device veth67ff3a9 left promiscuous mode Dec 20 01:41:27 ShadowServer kernel: docker0: port 4(veth67ff3a9) entered disabled state Dec 20 01:41:27 ShadowServer kernel: docker0: port 4(veth98d3690) entered blocking state Dec 20 01:41:27 ShadowServer kernel: docker0: port 4(veth98d3690) entered disabled state Dec 20 01:41:27 ShadowServer kernel: device veth98d3690 entered promiscuous mode Dec 20 01:41:27 ShadowServer kernel: docker0: port 4(veth98d3690) entered blocking state Dec 20 01:41:27 ShadowServer kernel: docker0: port 4(veth98d3690) entered forwarding state Dec 20 01:41:27 ShadowServer kernel: eth0: renamed from veth102c58c Dec 20 01:41:27 ShadowServer kernel: IPv6: ADDRCONF(NETDEV_CHANGE): veth98d3690: link becomes ready Dec 20 01:42:27 ShadowServer kernel: docker0: port 4(veth98d3690) entered disabled state Dec 20 01:42:27 ShadowServer kernel: veth102c58c: renamed from eth0 Dec 20 01:42:27 ShadowServer kernel: docker0: port 4(veth98d3690) entered disabled state Dec 20 01:42:27 ShadowServer kernel: device veth98d3690 left promiscuous mode Dec 20 01:42:27 ShadowServer kernel: docker0: port 4(veth98d3690) entered disabled state Dec 20 01:42:27 ShadowServer kernel: docker0: port 4(vethc47ea33) entered blocking state Dec 20 01:42:27 ShadowServer kernel: docker0: port 4(vethc47ea33) entered disabled state Dec 20 01:42:27 ShadowServer kernel: device vethc47ea33 entered promiscuous mode Dec 20 01:42:27 ShadowServer kernel: docker0: port 4(vethc47ea33) entered blocking state Dec 20 01:42:27 ShadowServer kernel: docker0: port 4(vethc47ea33) entered forwarding state Dec 20 01:42:27 ShadowServer kernel: eth0: renamed from veth7290eb1 Dec 20 01:42:27 ShadowServer kernel: IPv6: ADDRCONF(NETDEV_CHANGE): vethc47ea33: link becomes ready mvlogger: Log Level: 1 mvlogger: *********************************MOVER -SHARE- START******************************* mvlogger: Wed Dec 20 01:42:36 GMT 2023 mvlogger: Share supplied __torrents Sharecfg: /boot/config/shares/__torrents.cfg mvlogger: Cache Pool Name: array_cache mvlogger: Share Path: /mnt/array_cache/__torrents mvlogger: Complete Mover Command: find "/mnt/array_cache/__torrents" -depth | /usr/local/sbin/move -d 1 Dec 20 01:43:27 ShadowServer kernel: docker0: port 4(vethc47ea33) entered disabled state Dec 20 01:43:27 ShadowServer kernel: veth7290eb1: renamed from eth0 Dec 20 01:43:27 ShadowServer kernel: docker0: port 4(vethc47ea33) entered disabled state Dec 20 01:43:27 ShadowServer kernel: device vethc47ea33 left promiscuous mode Dec 20 01:43:27 ShadowServer kernel: docker0: port 4(vethc47ea33) entered disabled state Dec 20 01:43:27 ShadowServer kernel: docker0: port 4(vethdd556bb) entered blocking state Dec 20 01:43:27 ShadowServer kernel: docker0: port 4(vethdd556bb) entered disabled state Dec 20 01:43:27 ShadowServer kernel: device vethdd556bb entered promiscuous mode Dec 20 01:43:27 ShadowServer kernel: docker0: port 4(vethdd556bb) entered blocking state Dec 20 01:43:27 ShadowServer kernel: docker0: port 4(vethdd556bb) entered forwarding state Dec 20 01:43:27 ShadowServer kernel: eth0: renamed from vetha074045 Dec 20 01:43:27 ShadowServer kernel: IPv6: ADDRCONF(NETDEV_CHANGE): vethdd556bb: link becomes ready Dec 20 01:43:45 ShadowServer kernel: sd 9:0:1:0: device_block, handle(0x000c) Dec 20 01:43:45 ShadowServer kernel: sd 9:0:1:0: device_unblock and setting to running, handle(0x000c) Dec 20 01:43:45 ShadowServer kernel: sd 9:0:1:0: Power-on or device reset occurred Dec 20 01:44:08 ShadowServer kernel: sd 9:0:1:0: device_block, handle(0x000c) Dec 20 01:44:08 ShadowServer kernel: sd 9:0:1:0: device_unblock and setting to running, handle(0x000c) Dec 20 01:44:08 ShadowServer kernel: sd 9:0:1:0: Power-on or device reset occurred Dec 20 01:44:27 ShadowServer kernel: vetha074045: renamed from eth0 Dec 20 01:44:27 ShadowServer kernel: docker0: port 4(vethdd556bb) entered disabled state Dec 20 01:44:27 ShadowServer kernel: docker0: port 4(vethdd556bb) entered disabled state Dec 20 01:44:27 ShadowServer kernel: device vethdd556bb left promiscuous mode Dec 20 01:44:27 ShadowServer kernel: docker0: port 4(vethdd556bb) entered disabled state Dec 20 01:44:27 ShadowServer kernel: docker0: port 4(veth97f46a5) entered blocking state Dec 20 01:44:27 ShadowServer kernel: docker0: port 4(veth97f46a5) entered disabled state Dec 20 01:44:27 ShadowServer kernel: device veth97f46a5 entered promiscuous mode Dec 20 01:44:27 ShadowServer kernel: docker0: port 4(veth97f46a5) entered blocking state Dec 20 01:44:27 ShadowServer kernel: docker0: port 4(veth97f46a5) entered forwarding state Dec 20 01:44:27 ShadowServer kernel: eth0: renamed from veth66e6e94 Dec 20 01:44:27 ShadowServer kernel: IPv6: ADDRCONF(NETDEV_CHANGE): veth97f46a5: link becomes ready Dec 20 01:45:27 ShadowServer kernel: docker0: port 4(veth97f46a5) entered disabled state Dec 20 01:45:27 ShadowServer kernel: veth66e6e94: renamed from eth0 Dec 20 01:45:27 ShadowServer kernel: docker0: port 4(veth97f46a5) entered disabled state Dec 20 01:45:27 ShadowServer kernel: device veth97f46a5 left promiscuous mode Dec 20 01:45:27 ShadowServer kernel: docker0: port 4(veth97f46a5) entered disabled state Dec 20 01:45:27 ShadowServer kernel: docker0: port 4(vethdf81211) entered blocking state Dec 20 01:45:27 ShadowServer kernel: docker0: port 4(vethdf81211) entered disabled state Dec 20 01:45:27 ShadowServer kernel: device vethdf81211 entered promiscuous mode Dec 20 01:45:27 ShadowServer kernel: docker0: port 4(vethdf81211) entered blocking state Dec 20 01:45:27 ShadowServer kernel: docker0: port 4(vethdf81211) entered forwarding state Dec 20 01:45:27 ShadowServer kernel: eth0: renamed from vethbf8ab81 Dec 20 01:45:27 ShadowServer kernel: IPv6: ADDRCONF(NETDEV_CHANGE): vethdf81211: link becomes ready Dec 20 01:46:27 ShadowServer kernel: vethbf8ab81: renamed from eth0 Dec 20 01:46:27 ShadowServer kernel: docker0: port 4(vethdf81211) entered disabled state Dec 20 01:46:27 ShadowServer kernel: docker0: port 4(vethdf81211) entered disabled state Dec 20 01:46:27 ShadowServer kernel: device vethdf81211 left promiscuous mode Dec 20 01:46:27 ShadowServer kernel: docker0: port 4(vethdf81211) entered disabled state Dec 20 01:46:27 ShadowServer kernel: docker0: port 4(veth4856440) entered blocking state Dec 20 01:46:27 ShadowServer kernel: docker0: port 4(veth4856440) entered disabled state Dec 20 01:46:27 ShadowServer kernel: device veth4856440 entered promiscuous mode Dec 20 01:46:27 ShadowServer kernel: docker0: port 4(veth4856440) entered blocking state Dec 20 01:46:27 ShadowServer kernel: docker0: port 4(veth4856440) entered forwarding state Dec 20 01:46:27 ShadowServer kernel: eth0: renamed from vethc27d199 Dec 20 01:46:27 ShadowServer kernel: IPv6: ADDRCONF(NETDEV_CHANGE): veth4856440: link becomes ready Dec 20 01:47:27 ShadowServer kernel: docker0: port 4(veth4856440) entered disabled state Dec 20 01:47:27 ShadowServer kernel: vethc27d199: renamed from eth0 Dec 20 01:47:27 ShadowServer kernel: docker0: port 4(veth4856440) entered disabled state Dec 20 01:47:27 ShadowServer kernel: device veth4856440 left promiscuous mode Dec 20 01:47:27 ShadowServer kernel: docker0: port 4(veth4856440) entered disabled state Dec 20 01:47:27 ShadowServer kernel: docker0: port 4(veth70bcc38) entered blocking state Dec 20 01:47:27 ShadowServer kernel: docker0: port 4(veth70bcc38) entered disabled state Dec 20 01:47:27 ShadowServer kernel: device veth70bcc38 entered promiscuous mode Dec 20 01:47:27 ShadowServer kernel: docker0: port 4(veth70bcc38) entered blocking state Dec 20 01:47:27 ShadowServer kernel: docker0: port 4(veth70bcc38) entered forwarding state Dec 20 01:47:27 ShadowServer kernel: eth0: renamed from veth4519e4a Dec 20 01:47:27 ShadowServer kernel: IPv6: ADDRCONF(NETDEV_CHANGE): veth70bcc38: link becomes ready Dec 20 01:48:27 ShadowServer kernel: docker0: port 4(veth70bcc38) entered disabled state Dec 20 01:48:27 ShadowServer kernel: veth4519e4a: renamed from eth0 Dec 20 01:48:27 ShadowServer kernel: docker0: port 4(veth70bcc38) entered disabled state Dec 20 01:48:27 ShadowServer kernel: device veth70bcc38 left promiscuous mode Dec 20 01:48:27 ShadowServer kernel: docker0: port 4(veth70bcc38) entered disabled state Dec 20 01:48:27 ShadowServer kernel: docker0: port 4(veth6b5182c) entered blocking state Dec 20 01:48:27 ShadowServer kernel: docker0: port 4(veth6b5182c) entered disabled state Dec 20 01:48:27 ShadowServer kernel: device veth6b5182c entered promiscuous mode Dec 20 01:48:27 ShadowServer kernel: docker0: port 4(veth6b5182c) entered blocking state Dec 20 01:48:27 ShadowServer kernel: docker0: port 4(veth6b5182c) entered forwarding state Dec 20 01:48:27 ShadowServer kernel: eth0: renamed from veth812aafa Dec 20 01:48:27 ShadowServer kernel: IPv6: ADDRCONF(NETDEV_CHANGE): veth6b5182c: link becomes ready Dec 20 01:48:44 ShadowServer kernel: general protection fault, probably for non-canonical address 0x1dc06b4567f3fe09: 0000 [#1] PREEMPT SMP NOPTI Dec 20 01:48:44 ShadowServer kernel: CPU: 7 PID: 24175 Comm: python3 Tainted: P W O 6.1.64-Unraid #1 Dec 20 01:48:44 ShadowServer kernel: Hardware name: Micro-Star International Co., Ltd. MS-7B79/X470 GAMING PLUS MAX (MS-7B79), BIOS H.B0 02/03/2021 Dec 20 01:48:44 ShadowServer kernel: RIP: 0010:nf_nat_setup_info+0x76d/0x7d1 [nf_nat] Dec 20 01:48:44 ShadowServer kernel: Code: 8b 05 10 64 00 00 48 8d 8b 90 00 00 00 4a 8d 14 e0 48 8b 02 48 89 93 98 00 00 00 48 89 83 90 00 00 00 48 85 c0 48 89 0a 74 04 <48> 89 48 08 4c 89 ef e8 34 8f 9b e0 eb 18 41 ff cd 48 8b 83 80 00 Dec 20 01:48:44 ShadowServer kernel: RSP: 0018:ffffc9000337b9b8 EFLAGS: 00010202 Dec 20 01:48:44 ShadowServer kernel: RAX: 1dc06b4567f3fe01 RBX: ffff88859b8cf800 RCX: ffff88859b8cf890 Dec 20 01:48:44 ShadowServer kernel: RDX: ffff8881d38e72b8 RSI: 28674b5d62832765 RDI: ffffffffa0ecdfbc Dec 20 01:48:44 ShadowServer kernel: RBP: ffffc9000337ba80 R08: 4d9057f52401884b R09: 06f620f696de1c14 Dec 20 01:48:44 ShadowServer kernel: R10: bb759a7275153498 R11: ffffc9000337b990 R12: 000000000001ce57 Dec 20 01:48:44 ShadowServer kernel: R13: ffffffffa0ecdfbc R14: ffffc9000337b9d8 R15: ffffffff82a14d00 Dec 20 01:48:44 ShadowServer kernel: FS: 0000147f9283cb30(0000) GS:ffff888c0e9c0000(0000) knlGS:0000000000000000 Dec 20 01:48:44 ShadowServer kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 Dec 20 01:48:44 ShadowServer kernel: CR2: 0000150ae4c09ff8 CR3: 00000001df000000 CR4: 00000000003506e0 Dec 20 01:48:44 ShadowServer kernel: Call Trace: Dec 20 01:48:44 ShadowServer kernel: <TASK> Dec 20 01:48:44 ShadowServer kernel: ? __die_body+0x1a/0x5c Dec 20 01:48:44 ShadowServer kernel: ? die_addr+0x38/0x51 Dec 20 01:48:44 ShadowServer kernel: ? exc_general_protection+0x30f/0x345 Dec 20 01:48:44 ShadowServer kernel: ? asm_exc_general_protection+0x22/0x30 Dec 20 01:48:44 ShadowServer kernel: ? nf_nat_setup_info+0x76d/0x7d1 [nf_nat] Dec 20 01:48:44 ShadowServer kernel: ? nf_nat_setup_info+0x742/0x7d1 [nf_nat] Dec 20 01:48:44 ShadowServer kernel: __nf_nat_alloc_null_binding+0x66/0x81 [nf_nat] Dec 20 01:48:44 ShadowServer kernel: nf_nat_inet_fn+0xc0/0x1a8 [nf_nat] Dec 20 01:48:44 ShadowServer kernel: nf_nat_ipv4_out+0x15/0x91 [nf_nat] Dec 20 01:48:44 ShadowServer kernel: nf_hook_slow+0x3d/0x96 Dec 20 01:48:44 ShadowServer kernel: ? __ip_finish_output+0x144/0x144 Dec 20 01:48:44 ShadowServer kernel: nf_hook+0xdf/0x110 Dec 20 01:48:44 ShadowServer kernel: ? __ip_finish_output+0x144/0x144 Dec 20 01:48:44 ShadowServer kernel: ip_output+0x78/0x88 Dec 20 01:48:44 ShadowServer kernel: ? __ip_finish_output+0x144/0x144 Dec 20 01:48:44 ShadowServer kernel: ip_send_skb+0x15/0x3b Dec 20 01:48:44 ShadowServer kernel: udp_send_skb+0x278/0x2e6 Dec 20 01:48:44 ShadowServer kernel: udp_sendmsg+0x756/0x9bd Dec 20 01:48:44 ShadowServer kernel: ? ip_neigh_gw4+0x8b/0x8b Dec 20 01:48:44 ShadowServer kernel: ? _raw_read_lock_bh+0x13/0x1c Dec 20 01:48:44 ShadowServer kernel: ? __local_bh_enable_ip+0x56/0x6b Dec 20 01:48:44 ShadowServer kernel: ? sock_i_uid+0x35/0x3e Dec 20 01:48:44 ShadowServer kernel: ? sock_sendmsg_nosec+0x2b/0x40 Dec 20 01:48:44 ShadowServer kernel: sock_sendmsg_nosec+0x2b/0x40 Dec 20 01:48:44 ShadowServer kernel: __sys_sendto+0xcc/0x10b Dec 20 01:48:44 ShadowServer kernel: ? __seccomp_filter+0x89/0x2ff Dec 20 01:48:44 ShadowServer kernel: __x64_sys_sendto+0x20/0x27 Dec 20 01:48:44 ShadowServer kernel: do_syscall_64+0x6b/0x81 Dec 20 01:48:44 ShadowServer kernel: entry_SYSCALL_64_after_hwframe+0x64/0xce Dec 20 01:48:44 ShadowServer kernel: RIP: 0033:0x14810afaef63 Dec 20 01:48:44 ShadowServer kernel: Code: c3 8b 07 85 c0 75 24 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 <c3> e9 70 d0 ff ff 41 54 b8 02 00 00 00 55 48 89 f5 be 00 88 08 00 Dec 20 01:48:44 ShadowServer kernel: RSP: 002b:0000147f92828b28 EFLAGS: 00000246 ORIG_RAX: 000000000000002c Dec 20 01:48:44 ShadowServer kernel: RAX: ffffffffffffffda RBX: 000000000000002c RCX: 000014810afaef63 Dec 20 01:48:44 ShadowServer kernel: RDX: 0000000000000024 RSI: 0000147f92828eb0 RDI: 0000000000000079 Dec 20 01:48:44 ShadowServer kernel: RBP: 0000147f9283cb30 R08: 0000147f92828d9c R09: 0000000000000010 Dec 20 01:48:44 ShadowServer kernel: R10: 0000000000004000 R11: 0000000000000246 R12: 0000000000bd7dbe Dec 20 01:48:44 ShadowServer kernel: R13: 0000000000000000 R14: 0000147f92828db8 R15: 0000000000000002 Dec 20 01:48:44 ShadowServer kernel: </TASK> Dec 20 01:48:44 ShadowServer kernel: Modules linked in: bluetooth ecdh_generic ecc vhci_hcd usbip_host usbip_core udp_diag macvlan veth xt_nat xt_tcpudp xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_addrtype br_netfilter xfs dm_crypt dm_mod nfsd auth_rpcgss oid_registry lockd grace sunrpc md_mod zfs(PO) zunicode(PO) zzstd(O) zlua(O) zavl(PO) icp(PO) zcommon(PO) znvpair(PO) spl(O) tcp_diag inet_diag af_packet nct6775 nct6775_core hwmon_vid ip6table_filter ip6_tables iptable_filter ip_tables x_tables efivarfs bridge 8021q garp mrp stp llc bonding tls atlantic r8169 realtek edac_mce_amd edac_core intel_rapl_msr intel_rapl_common iosf_mbi kvm_amd kvm crct10dif_pclmul crc32_pclmul crc32c_intel ghash_clmulni_intel sha512_ssse3 sha256_ssse3 sha1_ssse3 aesni_intel i2c_piix4 crypto_simd cryptd input_leds wmi_bmof led_class mpt3sas rapl nvme i2c_core k10temp ahci raid_class ccp scsi_transport_sas libahci nvme_core wmi button Dec 20 01:48:44 ShadowServer kernel: acpi_cpufreq unix [last unloaded: atlantic] Dec 20 01:48:44 ShadowServer kernel: general protection fault, probably for non-canonical address 0x226691d5e46755bd: 0000 [#2] PREEMPT SMP NOPTI Dec 20 01:48:44 ShadowServer kernel: ---[ end trace 0000000000000000 ]--- Dec 20 01:48:44 ShadowServer kernel: CPU: 1 PID: 31844 Comm: mattermost Tainted: P D W O 6.1.64-Unraid #1 Dec 20 01:48:44 ShadowServer kernel: Hardware name: Micro-Star International Co., Ltd. MS-7B79/X470 GAMING PLUS MAX (MS-7B79), BIOS H.B0 02/03/2021 Dec 20 01:48:44 ShadowServer kernel: RIP: 0010:nf_nat_setup_info+0x76d/0x7d1 [nf_nat] Dec 20 01:48:44 ShadowServer kernel: Code: 8b 05 10 64 00 00 48 8d 8b 90 00 00 00 4a 8d 14 e0 48 8b 02 48 89 93 98 00 00 00 48 89 83 90 00 00 00 48 85 c0 48 89 0a 74 04 <48> 89 48 08 4c 89 ef e8 34 8f 9b e0 eb 18 41 ff cd 48 8b 83 80 00 Dec 20 01:48:44 ShadowServer kernel: RSP: 0018:ffffc9000007c8c8 EFLAGS: 00010202 Dec 20 01:48:44 ShadowServer kernel: RAX: 226691d5e46755b5 RBX: ffff888447cc4a00 RCX: ffff888447cc4a90 Dec 20 01:48:44 ShadowServer kernel: RDX: ffff8881d38fb840 RSI: 6ee177764246efeb RDI: ffffffffa0ece280 Dec 20 01:48:44 ShadowServer kernel: RBP: ffffc9000007c990 R08: acf3bf23ac1cb0d0 R09: 2e2584241d50b53f Dec 20 01:48:44 ShadowServer kernel: R10: 6bea278719f3d1f4 R11: ffffc9000007c8a0 R12: 000000000001f708 Dec 20 01:48:44 ShadowServer kernel: R13: ffffffffa0ece280 R14: ffffc9000007c8e8 R15: ffffffff82a14d00 Dec 20 01:48:44 ShadowServer kernel: FS: 000014fb62ef9640(0000) GS:ffff888c0e840000(0000) knlGS:0000000000000000 Dec 20 01:48:44 ShadowServer kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 Dec 20 01:48:44 ShadowServer kernel: CR2: 000000c0025fd010 CR3: 00000001cdd66000 CR4: 00000000003506e0 Dec 20 01:48:44 ShadowServer kernel: RIP: 0010:nf_nat_setup_info+0x76d/0x7d1 [nf_nat] Dec 20 01:48:44 ShadowServer kernel: Call Trace: Dec 20 01:48:44 ShadowServer kernel: <IRQ> Dec 20 01:48:44 ShadowServer kernel: Code: 8b 05 10 64 00 00 48 8d 8b 90 00 00 00 4a 8d 14 e0 48 8b 02 48 89 93 98 00 00 00 48 89 83 90 00 00 00 48 85 c0 48 89 0a 74 04 <48> 89 48 08 4c 89 ef e8 34 8f 9b e0 eb 18 41 ff cd 48 8b 83 80 00 Dec 20 01:48:44 ShadowServer kernel: ? __die_body+0x1a/0x5c
  3. In the past week I've been getting random kernel crashes which just unalive the server, cant even ping it. I month or so ago i had loads of random errors on one disk, removed and rebuilt it, another disk failed but first one was fine with no errors. I rebuilt the second one, again with no errors (no bad sectors ect) so put it down to a cable having a hissy fit. Come forward to a few days ago and I'm getting just complete lockups, kernel freezes. cant ping, cant do anything. I don't know what they mean. I think this is the 4th time now. Takes approx 12 - 24 hours for it to happen again. Previous couple of times i was doing heavy file moves. This last time it was doing nothing as far as i know. Though i did get get done watching something on plex.... Photos of the Kernel Crashes, One was taken earlier today, and the other yesterday, I didnt have my screen setup to grab the other times. https://imgur.com/a/dgSD9rh Rough Spec: Micro-Star International Co., Ltd. X470 GAMING PLUS MAX (MS-7B79) , Version 3.0 American Megatrends International, LLC., Version H.B0 BIOS dated: Wed 3 Feb 2021 12:00:00 AM GMT AMD Ryzen 7 2700X Eight-Core @ 3700 MHz Memory: 48 GiB DDR4 10GB Network Card 6 Disks, 2 Parity (XFS) 3 Disks in a 'array_cache' pool (ZFS) 2 Disks in a 'backups' pool (BTRFS) 1 NVME in 'docker_appdata' pool (BTRFS) 1 NVME in 'storage_vm' pool (BTRFS) PARITY Parity is valid Last check completed on Tue 5 Dec 2023 09:32:34 AM GMT (fourteen days ago) Duration: 1 day, 16 hours, 32 minutes, 47 seconds. Average speed: 95.9 MB/s Finding 0 errors Next check scheduled on Mon 1 Jan 2024 12:00:00 AM GMT Due in: 12 days, 1 hour, 17 minutes Your hardware profile was last submitted on 30/09/2022 I have just turned on the syslog mirror so it will have to crash again for me to provide it. I will also attach my diagnostics if I can figure how to any help is greatly appreciated shadowserver-diagnostics-20231219-2146.zip
  4. Oh thanks, I shall see what I can do about requesting it. Is there something I can do in the meantime, try and install one myself? I'm not technical in this aspect at all.
  5. attached, thank you. shadowserver-diagnostics-20210513-1047.zip
  6. I stupidly did no research before jumping on eBay to buy the first card I saw :: INTEL NETEFFECT NE020 NETWORK ADAPTER - PCI EXPRESS - E10G81GFSR https://www.ebay.co.uk/itm/224082550585 It shows up in the System Devices tab as a PCI device: 06:00.0 Ethernet controller: NetEffect NE020 10Gb Accelerated Ethernet Adapter (iWARP RNIC) (rev 05) Also the hardware profile: But its just not showing up in the Network settings at all. I've tried with one of my existing DAC cables, And also the two SFP+ they came with (Finisar FTLX8571D3BCL), Its connected on my switch fine, Tested same fiber cable between two switches and all works so switches support it. If it came with these they should also be supported. So what's the issue, drivers? I have also added the following to, /boot/syslinux/syslinux.cfg ixgbe.allow_unsupported_sfp=1 & tried ixgbe.allow_unsupported_sfp=1,1 which i found on https://community.ui.com/questions/Can-I-use-Ubiquity-SFP-modules-in-Intel-PCI-cards/917d7de4-4fcc-4d3f-875a-72c222ae2135#answer/0bc32e06-9248-46fe-afd3-0198cb7d74db But I must of done it wrong, as no luck. Has anybody else used the same cards / offer any suggestions. I bought two of them!
  7. Right, Those settings were only changed to try and fix it. I removed my very long 120 char master key and removed all symbols and made it alot shorter and that seems to have fixed it, But not on the first run after a fair few of retrys it eventually started. So i guess some odd config was saved in the .env file which now was overwritten. Very odd Thanks
  8. For everyone using Bitnami Redis with a password the answer to this is to use this connection string: redis://default:[PASSWORD]@[IP]:6379
  9. It doesn't work, It will appear as if its booting. chuck out all of this in the log, and then it will quit. No warnings, no errors no nothing. ##### Performing vars check ##### All required vars are set. ##### Building OTS configuration file from environment variables ##### ##### Apply style customisations ##### % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed ##### Starting OTS ##### `/` is not writable. Bundler will use `/tmp/bundler/home/unknown' as your home directory temporarily. /usr/local/lib/ruby/2.6.0/fileutils/version.rb:4: warning: already initialized constant FileUtils::VERSION /usr/local/bundle/gems/fileutils-1.3.0/lib/fileutils/version.rb:4: warning: previous definition of VERSION was here /usr/local/lib/ruby/2.6.0/fileutils.rb:1267: warning: already initialized constant FileUtils::Entry_::S_IF_DOOR /usr/local/bundle/gems/fileutils-1.3.0/lib/fileutils.rb:1285: warning: previous definition of S_IF_DOOR was here /usr/local/lib/ruby/2.6.0/fileutils.rb:1540: warning: already initialized constant FileUtils::Entry_::DIRECTORY_TERM /usr/local/bundle/gems/fileutils-1.3.0/lib/fileutils.rb:1568: warning: previous definition of DIRECTORY_TERM was here /usr/local/lib/ruby/2.6.0/fileutils.rb:1595: warning: already initialized constant FileUtils::OPT_TABLE /usr/local/bundle/gems/fileutils-1.3.0/lib/fileutils.rb:1626: warning: previous definition of OPT_TABLE was here /usr/local/lib/ruby/2.6.0/fileutils.rb:1649: warning: already initialized constant FileUtils::LOW_METHODS /usr/local/bundle/gems/fileutils-1.3.0/lib/fileutils.rb:1685: warning: previous definition of LOW_METHODS was here /usr/local/lib/ruby/2.6.0/fileutils.rb:1656: warning: already initialized constant FileUtils::METHODS /usr/local/bundle/gems/fileutils-1.3.0/lib/fileutils.rb:1692: warning: previous definition of METHODS was here /source/onetime/vendor/bundle/ruby/2.6.0/gems/thin-1.5.0/lib/thin/server.rb:104: warning: constant ::Fixnum is deprecated /source/onetime/lib/onetime/core_ext.rb:30: warning: constant ::Fixnum is deprecated /source/onetime/vendor/bundle/ruby/2.6.0/gems/attic-0.5.3/lib/attic.rb:13: warning: constant ::Fixnum is deprecated /source/onetime/vendor/bundle/ruby/2.6.0/gems/gibbler-0.8.9/lib/gibbler.rb:654: warning: constant ::Fixnum is deprecated /source/onetime/vendor/bundle/ruby/2.6.0/gems/gibbler-0.8.9/lib/gibbler.rb:655: warning: constant ::Bignum is deprecated This is the create command from Docker root@localhost:# /usr/local/emhttp/plugins/dynamix.docker.manager/scripts/docker create --name='OneTimeSecret' --net='bridge' --privileged=true -e TZ="UTC" -e HOST_OS="Unraid" -e 'OTS_DOMAIN'='onetimepw.mydomain.com' -e 'OTS_MASTER_KEY'='myrandomkey' -e 'OTS_REDIS_HOST'='192.168.1.6' -e 'OTS_REDIS_PORT'='6379' -e 'OTS_REDIS_PW'='redispw' -e 'OTS_IMAGE_FAV_ICON'='' -e 'OTS_IMAGE_LOGO'='https://www.computingtech.net/wp-content/uploads/2016/08/Full_Flat_CT_Logo.png' -e 'OTS_COLOR'='#DD4A22' -e 'OTS_SSL'='true' -p '5000:5000/tcp' 'siw36/onetimesecret'
  10. Thanks for this, But getting a error: ##### Performing vars check ##### All required vars are set. ##### Building OTS configuration file from environment variables ##### ##### Apply style customisations ##### % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed ##### Starting OTS ##### `/` is not writable. Bundler will use `/tmp/bundler/home/unknown' as your home directory temporarily. Tried using a container path of /data but not going to use / as thats everything.
  11. Hi Do we have a rough eta when the InvoiceNinja template will be updated? They released some very good features I would find very useful the other day so eager to update Also I'm quite stupid when it comes too all of this template / docker stuff, Is there any reason why the official docker for it isn't being used? What's changed? Very happy its available at all with your team though Thanks
  12. I will try and upload the repair now. But i think this is due to the unclean shutdowns (like 30 of them) due to unraid crashing. Never seen the corruption thing until today. Nov 30 11:19:29 ShadowServer kernel: WARNING: CPU: 3 PID: 727 at net/netfilter/nf_conntrack_core.c:1120 __nf_conntrack_confirm+0x98/0x1e0 Nov 30 11:19:29 ShadowServer kernel: Modules linked in: veth xt_CHECKSUM ipt_REJECT ip6table_mangle ip6table_nat iptable_mangle ip6table_filter ip6_tables vhost_net tun vhost vhost_iotlb tap macvlan xt_nat xt_MASQUERADE iptable_filter iptable_nat nf_nat ip_tables xfs dm_crypt dm_mod dax nfsd lockd grace sunrpc md_mod nct6775 hwmon_vid bonding x86_pkg_temp_thermal intel_powerclamp wmi_bmof mxm_wmi coretemp kvm_intel kvm crct10dif_pclmul crc32_pclmul crc32c_intel ghash_clmulni_intel aesni_intel crypto_simd cryptd glue_helper rapl intel_cstate ahci intel_uncore mpt3sas libahci i2c_i801 i2c_smbus i2c_core input_leds led_class atlantic raid_class scsi_transport_sas fan thermal wmi video backlight acpi_pad button Nov 30 11:19:29 ShadowServer kernel: CPU: 3 PID: 727 Comm: kworker/3:1 Not tainted 5.8.18-Unraid #1 Nov 30 11:19:29 ShadowServer kernel: Hardware name: ASUS All Series/Z97-E/USB 3.1, BIOS 0701 03/16/2016 Nov 30 11:19:29 ShadowServer kernel: Workqueue: events macvlan_process_broadcast [macvlan] Nov 30 11:19:29 ShadowServer kernel: RIP: 0010:__nf_conntrack_confirm+0x98/0x1e0 Nov 30 11:19:29 ShadowServer kernel: Code: 56 e4 ff ff 8b 54 24 14 89 c6 41 89 c4 48 c1 eb 20 89 df 41 89 de e8 c6 e1 ff ff 84 c0 75 b9 48 8b 85 80 00 00 00 a8 08 74 18 <0f> 0b 89 df 44 89 e6 31 db e8 80 de ff ff e8 26 e1 ff ff e9 1f 01 Nov 30 11:19:29 ShadowServer kernel: RSP: 0000:ffffc9000012cde0 EFLAGS: 00010202 Nov 30 11:19:29 ShadowServer kernel: RAX: 0000000000000188 RBX: 000000000000a632 RCX: 00000000973c4d1a Nov 30 11:19:29 ShadowServer kernel: RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffff82009328 Nov 30 11:19:29 ShadowServer kernel: RBP: ffff8881d27fd900 R08: 0000000033c0adc6 R09: ffff88839a71d120 Nov 30 11:19:29 ShadowServer kernel: R10: 0000000000000098 R11: ffff88801eb19100 R12: 00000000000052ba Nov 30 11:19:29 ShadowServer kernel: R13: ffffffff82097800 R14: 000000000000a632 R15: ffff8881d27fd90c Nov 30 11:19:29 ShadowServer kernel: FS: 0000000000000000(0000) GS:ffff88840ff80000(0000) knlGS:0000000000000000 Nov 30 11:19:29 ShadowServer kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 Nov 30 11:19:29 ShadowServer kernel: CR2: 0000000000000000 CR3: 000000000400a001 CR4: 00000000001606e0 Nov 30 11:19:29 ShadowServer kernel: Call Trace: Nov 30 11:19:29 ShadowServer kernel: <IRQ> Nov 30 11:19:29 ShadowServer kernel: nf_conntrack_confirm+0x2f/0x36 Nov 30 11:19:29 ShadowServer kernel: nf_hook_slow+0x39/0x8e Nov 30 11:19:29 ShadowServer kernel: nf_hook.constprop.0+0xae/0xc8 Nov 30 11:19:29 ShadowServer kernel: ? ip_protocol_deliver_rcu+0x10d/0x10d Nov 30 11:19:29 ShadowServer kernel: ip_local_deliver+0x49/0x75 Nov 30 11:19:29 ShadowServer kernel: __netif_receive_skb_one_core+0x74/0x95 Nov 30 11:19:29 ShadowServer kernel: process_backlog+0xa3/0x136 Nov 30 11:19:29 ShadowServer kernel: net_rx_action+0xf3/0x277 Nov 30 11:19:29 ShadowServer kernel: __do_softirq+0xc4/0x1c2 Nov 30 11:19:29 ShadowServer kernel: asm_call_irq_on_stack+0x12/0x20 Nov 30 11:19:29 ShadowServer kernel: </IRQ> Nov 30 11:19:29 ShadowServer kernel: do_softirq_own_stack+0x2c/0x39 Nov 30 11:19:29 ShadowServer kernel: do_softirq+0x3a/0x44 Nov 30 11:19:29 ShadowServer kernel: netif_rx_ni+0x1c/0x22 Nov 30 11:19:29 ShadowServer kernel: macvlan_broadcast+0x10e/0x13c [macvlan] Nov 30 11:19:29 ShadowServer kernel: macvlan_process_broadcast+0xf4/0x13a [macvlan] Nov 30 11:19:29 ShadowServer kernel: process_one_work+0x13c/0x1d5 Nov 30 11:19:29 ShadowServer kernel: worker_thread+0x18b/0x22f Nov 30 11:19:29 ShadowServer kernel: ? process_scheduled_works+0x27/0x27 Nov 30 11:19:29 ShadowServer kernel: kthread+0xe5/0xea Nov 30 11:19:29 ShadowServer kernel: ? kthread_unpark+0x52/0x52 Nov 30 11:19:29 ShadowServer kernel: ret_from_fork+0x22/0x30 Nov 30 11:19:29 ShadowServer kernel: ---[ end trace 25e0c3cbcbb7f6af ]--- As im fed up with this, and my data is getting all broken, I've orderd some new bits for AMD 2600 lying around so will rebuild it with that. So if it is a hardware issue it hopefully should be fixed.... But time will tell, I will post back once all up and running & if its stable after a week.
  13. Its crashed again, surprise . Even after disabling one of the cores, I think it did last a bit longer but that may of just been in my head. Please find attached the syslog (zipped) from the last day, and the screenshot of the tail command. The only new line which wasn't in the syslog is: Hangcheck: hangcheck value past margin! But its the same as before, everything unresponsive. But interestingly as I'm tailing, It wont let me exit it so i cant check the top command to see if its the same thing as before. Its worth noting stuff like XMP is disabled and its basically running in as failsafe mode as possible bios wise. 2020-11-28.zip
  14. Its what support asked me to do, as they suspect its a Hardware issue, So going to do that and see what happens. Somebody on the facebook group suggested isolating at least one of the cores just for the dockers and vm's so the os wasnt starved, still early days but seems to be working so far. But its not a permanent solution. But its a good start.
  15. All the files were text So i did that right at least. I will remember to zip any text files in the future.