[Bug 1347684] Re: icmp response flapping during CPU load
I have trouble with run apport-collect from shell # dpkg -l | grep qemu ii ipxe-qemu 1.0.0+git-2013.c3d1e78-2ubuntu1 all PXE boot firmware - ROM images for qemu ii qemu-common 2.0.0+dfsg-2ubuntu1.1 all dummy transitional package from qemu-common to qemu-keymaps ii qemu-keymaps2.0.0+dfsg-2ubuntu1.1 all QEMU keyboard maps ii qemu-kvm2.0.0+dfsg-2ubuntu1.1 amd64QEMU Full virtualization on x86 hardware (transitional package) ii qemu-system-common 2.0.0+dfsg-2ubuntu1.1 amd64QEMU full system emulation binaries (common files) ii qemu-system-x86 2.0.0+dfsg-2ubuntu1.1 amd64QEMU full system emulation binaries (x86) ii qemu-utils 2.0.0+dfsg-2ubuntu1.1 amd64QEMU utilities # uname -a Linux g8-4 3.13.0-31-generic #55-Ubuntu SMP Tue Jul 1 15:51:53 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux # cat /etc/*-release DISTRIB_ID=Ubuntu DISTRIB_RELEASE=14.04 DISTRIB_CODENAME=trusty DISTRIB_DESCRIPTION=Ubuntu 14.04 LTS NAME=Ubuntu VERSION=14.04, Trusty Tahr ID=ubuntu ID_LIKE=debian PRETTY_NAME=Ubuntu 14.04 LTS VERSION_ID=14.04 HOME_URL=http://www.ubuntu.com/; SUPPORT_URL=http://help.ubuntu.com/; BUG_REPORT_URL=http://bugs.launchpad.net/ubuntu/; ** Attachment added: dmidecode https://bugs.launchpad.net/ubuntu/+source/qemu-kvm/+bug/1347684/+attachment/4180577/+files/dmidecode -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to qemu-kvm in Ubuntu. https://bugs.launchpad.net/bugs/1347684 Title: icmp response flapping during CPU load To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/qemu-kvm/+bug/1347684/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1347684] Re: icmp response flapping during CPU load
** Changed in: qemu-kvm (Ubuntu) Status: Incomplete = New -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to qemu-kvm in Ubuntu. https://bugs.launchpad.net/bugs/1347684 Title: icmp response flapping during CPU load To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/qemu-kvm/+bug/1347684/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1347684] [NEW] icmp response flapping during CPU load
Public bug reported: ICMP response flapping detected when CPU is high utilization in a quest system. It is log ICMP response. 54916 - PID of guest OS. # while true ; do pidstat -p 54916 1 1 | grep -v -e Linux -e Average; ping -c1 10.11.110.213 | grep ttl=64; done 05:06:19 PM UID PID%usr %system %guest%CPU CPU Command 05:06:20 PM 109 549160.00 18.00 25.00 30.00 5 qemu-system-x86 64 bytes from 10.11.110.213: icmp_seq=1 ttl=64 time=0.939 ms 05:06:20 PM UID PID%usr %system %guest%CPU CPU Command 05:06:21 PM 109 549160.00 72.00 31.00 72.00 5 qemu-system-x86 64 bytes from 10.11.110.213: icmp_seq=1 ttl=64 time=0.166 ms 05:06:21 PM UID PID%usr %system %guest%CPU CPU Command 05:06:22 PM 109 54916 47.00 55.006.00 108.00 0 qemu-system-x86 64 bytes from 10.11.110.213: icmp_seq=1 ttl=64 time=0.086 ms 05:06:22 PM UID PID%usr %system %guest%CPU CPU Command 05:06:23 PM 109 549160.00 149.003.00 149.00 0 qemu-system-x86 64 bytes from 10.11.110.213: icmp_seq=1 ttl=64 time=3406 ms 05:06:27 PM UID PID%usr %system %guest%CPU CPU Command 05:06:28 PM 109 54916 50.000.00 86.00 136.00 0 qemu-system-x86 64 bytes from 10.11.110.213: icmp_seq=1 ttl=64 time=0.312 ms 05:06:28 PM UID PID%usr %system %guest%CPU CPU Command 05:06:29 PM 109 549160.000.00 43.00 22.00 0 qemu-system-x86 64 bytes from 10.11.110.213: icmp_seq=1 ttl=64 time=0.338 ms 05:06:29 PM UID PID%usr %system %guest%CPU CPU Command 05:06:30 PM 109 549160.000.00 32.00 16.00 0 qemu-system-x86 64 bytes from 10.11.110.213: icmp_seq=1 ttl=64 time=0.134 ms 05:06:30 PM UID PID%usr %system %guest%CPU CPU Command 05:06:31 PM 109 549160.00 26.00 43.00 47.00 0 qemu-system-x86 64 bytes from 10.11.110.213: icmp_seq=1 ttl=64 time=0.296 ms 05:06:31 PM UID PID%usr %system %guest%CPU CPU Command 05:06:32 PM 109 54916 61.000.00 70.00 131.00 5 qemu-system-x86 64 bytes from 10.11.110.213: icmp_seq=1 ttl=64 time=0.139 ms 05:06:32 PM UID PID%usr %system %guest%CPU CPU Command 05:06:33 PM 109 549160.00 102.00 28.00 102.00 5 qemu-system-x86 64 bytes from 10.11.110.213: icmp_seq=1 ttl=64 time=0.153 ms 05:06:33 PM UID PID%usr %system %guest%CPU CPU Command 05:06:34 PM 109 54916 24.00 49.000.00 73.00 6 qemu-system-x86 64 bytes from 10.11.110.213: icmp_seq=1 ttl=64 time=3205 ms 05:06:37 PM UID PID%usr %system %guest%CPU CPU Command 05:06:38 PM 109 549160.000.00 148.00 123.00 7 qemu-system-x86 64 bytes from 10.11.110.213: icmp_seq=1 ttl=64 time=0.097 ms 05:06:38 PM UID PID%usr %system %guest%CPU CPU Command 05:06:39 PM 109 549160.00 23.00 55.00 52.00 0 qemu-system-x86 64 bytes from 10.11.110.213: icmp_seq=1 ttl=64 time=0.323 ms 05:06:39 PM UID PID%usr %system %guest%CPU CPU Command 05:06:40 PM 109 54916 50.00 52.003.00 105.00 0 qemu-system-x86 64 bytes from 10.11.110.213: icmp_seq=1 ttl=64 time=4260 ms 05:06:44 PM UID PID%usr %system %guest%CPU CPU Command 05:06:45 PM 109 549160.00 54.00 85.00 96.0012 qemu-system-x86 64 bytes from 10.11.110.213: icmp_seq=1 ttl=64 time=0.306 ms 05:06:45 PM UID PID%usr %system %guest%CPU CPU Command 05:06:46 PM 109 549160.00 38.00 71.00 74.00 7 qemu-system-x86 64 bytes from 10.11.110.213: icmp_seq=1 ttl=64 time=0.143 ms 05:06:46 PM UID PID%usr %system %guest%CPU CPU Command 05:06:47 PM 109 54916 60.000.00 78.00 138.0011 qemu-system-x86 64 bytes from 10.11.110.213: icmp_seq=1 ttl=64 time=0.188 ms 05:06:47 PM UID PID%usr %system %guest%CPU CPU Command 05:06:48 PM 109 549160.000.00 78.00 42.0011 qemu-system-x86 64 bytes from 10.11.110.213: icmp_seq=1 ttl=64 time=0.140 ms 05:06:48 PM UID PID%usr %system %guest%CPU CPU Command 05:06:49 PM 109 549160.00 14.00 44.00 37.0011 qemu-system-x86 64 bytes from 10.11.110.213: icmp_seq=1 ttl=64 time=0.234 ms 05:06:49 PM UID PID%usr %system %guest%CPU CPU Command 05:06:50 PM 109 549160.004.004.005.0011 qemu-system-x86 64 bytes from 10.11.110.213: icmp_seq=1 ttl=64 time=0.185 ms 05:06:50 PM UID PID%usr %system %guest%CPU CPU Command 05:06:51 PM 109 549160.001.001.002.0011 qemu-system-x86 64 bytes from 10.11.110.213: icmp_seq=1 ttl=64 time=0.274 ms ^C64 bytes from 10.11.110.213: icmp_seq=1 ttl=64 time=0.144 ms 05:06:52 PM UID
[Bug 1181777] Re: kvm: freeze a guest with a NIC PCI passthrough
Yes. It's works for me. But I can't find the message about ROM invalid: grep -i -e invalid -e rom [0.00] ACPI Warning: Invalid length for Pm1aControlBlock: 32, using default 16 (20110623/tbfadt-610) [0.00] ACPI Warning: Invalid length for Pm2ControlBlock: 32, using default 8 (20110623/tbfadt-610) [6.233547] IOMMU 0 0xfbdfe000: using Queued invalidation [6.238509] IOMMU 1 0xf4ffe000: using Queued invalidation Thanks all! -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to seabios in Ubuntu. https://bugs.launchpad.net/bugs/1181777 Title: kvm: freeze a guest with a NIC PCI passthrough To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/seabios/+bug/1181777/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1181777] Re: kvm: freeze a guest with a NIC PCI passthrough
About #22 #25: https://bugzilla.kernel.org/show_bug.cgi?id=60850 ** Bug watch added: Linux Kernel Bug Tracker #60850 http://bugzilla.kernel.org/show_bug.cgi?id=60850 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to ipxe in Ubuntu. https://bugs.launchpad.net/bugs/1181777 Title: kvm: freeze a guest with a NIC PCI passthrough To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ipxe/+bug/1181777/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1181777] Re: kvm: freeze a guest with a NIC PCI passthrough
** Attachment added: 13.10 dmesg https://bugs.launchpad.net/ubuntu/+source/ipxe/+bug/1181777/+attachment/3799505/+files/1310.txt -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to ipxe in Ubuntu. https://bugs.launchpad.net/bugs/1181777 Title: kvm: freeze a guest with a NIC PCI passthrough To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ipxe/+bug/1181777/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1181777] Re: kvm: freeze a guest with a NIC PCI passthrough
** Attachment added: strace from 12.04 https://bugs.launchpad.net/ubuntu/+source/ipxe/+bug/1181777/+attachment/3799507/+files/strace1204.txt -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to ipxe in Ubuntu. https://bugs.launchpad.net/bugs/1181777 Title: kvm: freeze a guest with a NIC PCI passthrough To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ipxe/+bug/1181777/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1181777] Re: kvm: freeze a guest with a NIC PCI passthrough
** Attachment added: 13.04 dmesg https://bugs.launchpad.net/ubuntu/+source/ipxe/+bug/1181777/+attachment/3799504/+files/1304.txt -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to ipxe in Ubuntu. https://bugs.launchpad.net/bugs/1181777 Title: kvm: freeze a guest with a NIC PCI passthrough To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ipxe/+bug/1181777/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1181777] Re: kvm: freeze a guest with a NIC PCI passthrough
Not solved yet. Please see the screenshot. # dpkg -l | grep -e ipxe -e seab ii ipxe 1.0.0+git-20130710.936134e-0ubuntu1.12.04.1~ppa1 PXE boot firmware ii ipxe-qemu 1.0.0+git-20130710.936134e-0ubuntu1.12.04.1~ppa1 Virtual package to support use of kvm-ipxe with qemu ii kvm-ipxe 1.0.0+git-20130710.936134e-0ubuntu1.12.04.1~ppa1 transitional dummy package ii seabios 1.7.3-1 Legacy BIOS implementation I tested 13.04 and 13.10 full installation (#10 was the test in chroot in 12.04). But I got new problem with # virsh nodedev-detach pci__02_00_1 After this command I found some messages in dmesg about kernel errors (please see attach 1304 and 1310) ** Attachment added: qemu screenshot https://bugs.launchpad.net/ubuntu/+source/ipxe/+bug/1181777/+attachment/3799503/+files/qemu.png -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to ipxe in Ubuntu. https://bugs.launchpad.net/bugs/1181777 Title: kvm: freeze a guest with a NIC PCI passthrough To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ipxe/+bug/1181777/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1181777] Re: kvm: freeze a guest with a NIC PCI passthrough
dpkg -l | grep ipxe ii ipxe 1.0.0+git-20130710.936134e-0ubuntu1.12.04.1~ppa1 PXE boot firmware ii ipxe-qemu 1.0.0+git-20130710.936134e-0ubuntu1.12.04.1~ppa1 Virtual package to support use of kvm-ipxe with qemu ii kvm-ipxe 1.0.0+git-20130710.936134e-0ubuntu1.12.04.1~ppa1 transitional dummy package -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to ipxe in Ubuntu. https://bugs.launchpad.net/bugs/1181777 Title: kvm: freeze a guest with a NIC PCI passthrough To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ipxe/+bug/1181777/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1181777] Re: kvm: freeze a guest with a NIC PCI passthrough
Hi, not solved yet. PID USER PR NI VIRT RES SHR S %CPU %MEMTIME+ COMMAND 10710 root 20 0 805m 543m 6724 S 100 0.6 0:10.81 qemu-system-x86 # apt-file search qemu-system-x86 qemu-kvm: /usr/bin/qemu-system-x86_64 qemu-kvm: /usr/share/man/man1/qemu-system-x86_64.1.gz qemu-kvm-spice: /usr/bin/qemu-system-x86_64-spice Not sure, but may be the problem in qemu-kvm package? -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to ipxe in Ubuntu. https://bugs.launchpad.net/bugs/1181777 Title: kvm: freeze a guest with a NIC PCI passthrough To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ipxe/+bug/1181777/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1181777] Re: kvm: freeze a guest with a NIC PCI passthrough
Thank you Serge! The issue not solved. # aptitude show ipxe | grep -i version Version: 1.0.0+git-3.55f6c88-0ubuntu2.12.04.1~ppa1 # aptitude show kvm-ipxe | grep -i version Version: 1.0.0+git-3.55f6c88-0ubuntu2.12.04.1~ppa1 Strace log: ---cut select(16, [5 6 15], [], [], {0, 987950}) = 1 (in [5], left {0, 970520}) read(15, 0x7fffb8dcc480, 16)= -1 EAGAIN (Resource temporarily unavailable) read(5, \16\0\0\0\0\0\0\0\376\377\377\377\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0..., 128) = 128 rt_sigaction(SIGALRM, NULL, {0x7fc3dedf4250, ~[KILL STOP RTMIN RT_1], SA_RESTORER, 0x7fc3db7c9cb0}, 8) = 0 write(7, \1\0\0\0\0\0\0\0, 8) = 8 read(5, 0x7fffb8dcc400, 128)= -1 EAGAIN (Resource temporarily unavailable) timer_gettime(0, {it_interval={0, 0}, it_value={0, 0}}) = 0 timer_settime(0, 0, {it_interval={0, 0}, it_value={0, 25}}, NULL) = 0 recvfrom(10, 0x7fc3e00d3ec4, 4096, 0, 0, 0) = -1 EAGAIN (Resource temporarily unavailable) select(11, [10], NULL, NULL, {0, 0})= 0 (Timeout) timer_gettime(0, {it_interval={0, 0}, it_value={0, 951}}) = 0 futex(0x7fc3dfa46460, FUTEX_WAKE_PRIVATE, 1) = 1 select(16, [5 6 15], [], [], {1, 0})= 2 (in [5 6], left {0, 98}) read(15, 0x7fffb8dcc480, 16)= -1 EAGAIN (Resource temporarily unavailable) read(6, \1\0\0\0\0\0\0\0, 512)= 8 read(5, \16\0\0\0\0\0\0\0\376\377\377\377\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0..., 128) = 128 rt_sigaction(SIGALRM, NULL, {0x7fc3dedf4250, ~[KILL STOP RTMIN RT_1], SA_RESTORER, 0x7fc3db7c9cb0}, 8) = 0 write(7, \1\0\0\0\0\0\0\0, 8) = 8 read(5, 0x7fffb8dcc400, 128)= -1 EAGAIN (Resource temporarily unavailable) timer_gettime(0, {it_interval={0, 0}, it_value={0, 0}}) = 0 timer_settime(0, 0, {it_interval={0, 0}, it_value={0, 28933959}}, NULL) = 0 futex(0x7fc3dfa46460, FUTEX_WAKE_PRIVATE, 1) = 1 select(16, [5 6 15], [], [], {1, 0})= 1 (in [6], left {0, 98}) read(15, 0x7fffb8dcc480, 16)= -1 EAGAIN (Resource temporarily unavailable) read(6, \1\0\0\0\0\0\0\0, 512)= 8 futex(0x7fc3dfa46460, FUTEX_WAKE_PRIVATE, 1) = 1 select(16, [5 6 15], [], [], {1, 0})= 1 (in [5], left {0, 971287}) read(15, 0x7fffb8dcc480, 16)= -1 EAGAIN (Resource temporarily unavailable) read(5, \16\0\0\0\0\0\0\0\376\377\377\377\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0..., 128) = 128 rt_sigaction(SIGALRM, NULL, {0x7fc3dedf4250, ~[KILL STOP RTMIN RT_1], SA_RESTORER, 0x7fc3db7c9cb0}, 8) = 0 write(7, \1\0\0\0\0\0\0\0, 8) = 8 read(5, 0x7fffb8dcc400, 128)= -1 EAGAIN (Resource temporarily unavailable) timer_gettime(0, {it_interval={0, 0}, it_value={0, 0}}) = 0 timer_settime(0, 0, {it_interval={0, 0}, it_value={0, 25}}, NULL) = 0 recvfrom(10, 0x7fc3e00d3ec4, 4096, 0, 0, 0) = -1 EAGAIN (Resource temporarily unavailable) select(11, [10], NULL, NULL, {0, 0})= 0 (Timeout) timer_gettime(0, {it_interval={0, 0}, it_value={0, 173410}}) = 0 futex(0x7fc3dfa46460, FUTEX_WAKE_PRIVATE, 1) = 1 select(16, [5 6 15], [], [], {1, 0})= 1 (in [6], left {0, 98}) read(15, 0x7fffb8dcc480, 16)= -1 EAGAIN (Resource temporarily unavailable) read(6, \1\0\0\0\0\0\0\0, 512)= 8 futex(0x7fc3dfa46460, FUTEX_WAKE_PRIVATE, 1) = 1 select(16, [5 6 15], [], [], {1, 0})= 1 (in [5], left {0, 99}) read(15, 0x7fffb8dcc480, 16)= -1 EAGAIN (Resource temporarily unavailable) read(5, \16\0\0\0\0\0\0\0\376\377\377\377\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0..., 128) = 128 rt_sigaction(SIGALRM, NULL, {0x7fc3dedf4250, ~[KILL STOP RTMIN RT_1], SA_RESTORER, 0x7fc3db7c9cb0}, 8) = 0 write(7, \1\0\0\0\0\0\0\0, 8) = 8 read(5, 0x7fffb8dcc400, 128)= -1 EAGAIN (Resource temporarily unavailable) timer_gettime(0, {it_interval={0, 0}, it_value={0, 0}}) = 0 timer_settime(0, 0, {it_interval={0, 0}, it_value={0, 29129841}}, NULL) = 0 futex(0x7fc3dfa46460, FUTEX_WAKE_PRIVATE, 1) = 1 select(16, [5 6 15], [], [], {1, 0})= 1 (in [6], left {0, 98}) read(15, 0x7fffb8dcc480, 16)= -1 EAGAIN (Resource temporarily unavailable) read(6, \1\0\0\0\0\0\0\0, 512)= 8 futex(0x7fc3dfa46460, FUTEX_WAKE_PRIVATE, 1) = 1 select(16, [5 6 15], [], [], {1, 0})= 1 (in [5], left {0, 971140}) read(15, 0x7fffb8dcc480, 16)= -1 EAGAIN (Resource temporarily unavailable) read(5, \16\0\0\0\0\0\0\0\376\377\377\377\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0..., 128) = 128 rt_sigaction(SIGALRM, NULL, {0x7fc3dedf4250, ~[KILL STOP RTMIN RT_1], SA_RESTORER, 0x7fc3db7c9cb0}, 8) = 0 write(7, \1\0\0\0\0\0\0\0, 8) = 8 read(5, 0x7fffb8dcc400, 128)= -1 EAGAIN (Resource temporarily unavailable) timer_gettime(0, {it_interval={0, 0}, it_value={0, 0}}) = 0 timer_settime(0, 0, {it_interval={0, 0}, it_value={0, 25}}, NULL) = 0 recvfrom(10, 0x7fc3e00d3ec4, 4096, 0, 0, 0) = -1 EAGAIN (Resource temporarily unavailable) select(11, [10], NULL, NULL, {0, 0})= 0 (Timeout) timer_gettime(0, {it_interval={0,
[Bug 1181777] Re: kvm: freeze a guest with a NIC PCI passthrough
I tried qemu in saucy. No issue found. IPXE works fine. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to qemu-kvm in Ubuntu. https://bugs.launchpad.net/bugs/1181777 Title: kvm: freeze a guest with a NIC PCI passthrough To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/qemu-kvm/+bug/1181777/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1181777] Re: kvm: freeze a guest with a NIC PCI passthrough
Yes, I have a possibility. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to qemu-kvm in Ubuntu. https://bugs.launchpad.net/bugs/1181777 Title: kvm: freeze a guest with a NIC PCI passthrough To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/qemu-kvm/+bug/1181777/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1181777] Re: kvm: freeze a guest with a NIC PCI passthrough
I tried upstream qemu. But the issue not solved yet. On Centos it work fine. qemu in Centos use gPXE instead iPXE. Please see screenshot. ** Attachment added: Screenshot of QEMU.png https://bugs.launchpad.net/ubuntu/+source/qemu-kvm/+bug/1181777/+attachment/3741491/+files/Screenshot%20of%20QEMU.png ** Changed in: qemu-kvm (Ubuntu) Status: Incomplete = New -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to qemu-kvm in Ubuntu. https://bugs.launchpad.net/bugs/1181777 Title: kvm: freeze a guest with a NIC PCI passthrough To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/qemu-kvm/+bug/1181777/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1181777] Re: kvm: freeze a guest with a NIC PCI passthrough
Start qemu-system-x86_64 -m 512 -device pci-assign,host=03:00.1 -boot d not solve the issue. PID USER PR NI VIRT RES SHR S %CPU %MEMTIME+ COMMAND 40062 root 20 0 805m 543m 6724 S 99 0.6 0:35.63 qemu-system-x86 ** Attachment added: w.log https://bugs.launchpad.net/ubuntu/+source/qemu-kvm/+bug/1181777/+attachment/3716837/+files/w.log ** Changed in: qemu-kvm (Ubuntu) Status: Incomplete = New -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to qemu-kvm in Ubuntu. https://bugs.launchpad.net/bugs/1181777 Title: kvm: freeze a guest with a NIC PCI passthrough To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/qemu-kvm/+bug/1181777/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1181777] Re: kvm: freeze a guest with a NIC PCI passthrough
** Changed in: qemu-kvm (Ubuntu) Status: Incomplete = New -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to qemu-kvm in Ubuntu. https://bugs.launchpad.net/bugs/1181777 Title: kvm: freeze a guest with a NIC PCI passthrough To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/qemu-kvm/+bug/1181777/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1181777] Re: kvm: freeze a guest with a NIC PCI passthrough
Hello. This is the step by step history of commands. The domain w is not rinnung. # virsh list --all Id Name State -- - wshut off There are all NICs on the host system # virsh nodedev-list --tree | grep -A 18 '+- pci__00_02_0' +- pci__00_02_0 | | | +- pci__03_00_0 | | | | | +- net_eth0_2c_76_8a_4f_45_00 | | | +- pci__03_00_1 | | | | | +- net_eth1_2c_76_8a_4f_45_01 | | | +- pci__03_00_2 | | | | | +- net_eth2_2c_76_8a_4f_45_02 | | | +- pci__03_00_3 | | | +- net_eth3_2c_76_8a_4f_45_03 Dump xml for eht1 # virsh nodedev-dumpxml pci__03_00_1 device namepci__03_00_1/name parentpci__00_02_0/parent driver nametg3/name /driver capability type='pci' domain0/domain bus3/bus slot0/slot function1/function product id='0x1657'NetXtreme BCM5719 Gigabit Ethernet PCIe/product vendor id='0x14e4'Broadcom Corporation/vendor capability type='virt_functions' /capability /capability /device Add the host device # virsh edit w ... hostdev mode='subsystem' type='pci' managed='yes' source address domain='0x' bus='0x03' slot='0x00' function='0x1'/ /source /hostdev ... Dettach the NIC from host # virsh nodedev-dettach pci__03_00_1 # virsh start w The image file of guest OS is not contain a OS, this is only a RAW partition. I'm trying to boot the guest with live cd ISO. But problem is while running seabios or iPXE (IMHO). Please, see the screenshot. ** Attachment added: VNC screenshot https://bugs.launchpad.net/ubuntu/+source/qemu-kvm/+bug/1181777/+attachment/3682131/+files/Screenshot%20of%20QEMU%20%28w%29.png -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to qemu-kvm in Ubuntu. https://bugs.launchpad.net/bugs/1181777 Title: kvm: freeze a guest with a NIC PCI passthrough To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/qemu-kvm/+bug/1181777/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1181777] [NEW] kvm: freeze a guest with a NIC PCI passthrough
Public bug reported: After attach NIC to guest domain, this domain freeze and CPU load 100% on host system. # virsh start w # top top - 19:08:14 up 28 min, 1 user, load average: 1.00, 0.97, 0.75 Tasks: 277 total, 1 running, 276 sleeping, 0 stopped, 0 zombie Cpu(s): 1.2%us, 1.2%sy, 0.0%ni, 97.5%id, 0.0%wa, 0.0%hi, 0.0%si, 0.0%st Mem: 99035416k total, 2537044k used, 96498372k free,84844k buffers Swap:0k total,0k used,0k free, 484432k cached PID USER PR NI VIRT RES SHR S %CPU %MEMTIME+ COMMAND 21168 libvirt- 20 0 837m 544m 6916 S 103 0.6 9:57.66 kvm # cat /etc/libvirt/qemuw.xml !-- WARNING: THIS IS AN AUTO-GENERATED FILE. CHANGES TO IT ARE LIKELY TO BE OVERWRITTEN AND LOST. Changes to this xml configuration should be made using: virsh edit w or other application using the libvirt API. -- domain type='kvm' namew/name uuid640ff4d4-665a-5a73-9e85-aecd4e75f18f/uuid memory524288/memory currentMemory524288/currentMemory vcpu1/vcpu os type arch='x86_64' machine='pc-1.0'hvm/type boot dev='cdrom'/ /os features acpi/ apic/ pae/ /features cpu match='exact' modelWestmere/model vendorIntel/vendor feature policy='require' name='tm2'/ feature policy='require' name='est'/ feature policy='require' name='vmx'/ feature policy='require' name='ds'/ feature policy='require' name='ss'/ feature policy='require' name='vme'/ feature policy='require' name='rdtscp'/ feature policy='require' name='ht'/ feature policy='require' name='dca'/ feature policy='require' name='pbe'/ feature policy='require' name='tm'/ feature policy='require' name='monitor'/ feature policy='require' name='pdpe1gb'/ feature policy='require' name='ds_cpl'/ feature policy='require' name='xtpr'/ feature policy='require' name='acpi'/ feature policy='require' name='x2apic'/ /cpu clock offset='utc'/ on_poweroffdestroy/on_poweroff on_rebootrestart/on_reboot on_crashrestart/on_crash devices emulator/usr/bin/kvm/emulator disk type='file' device='disk' driver name='qemu' type='raw' cache='writeback'/ source file='/var/lib/libvirt/images/w.img'/ target dev='vda' bus='virtio'/ address type='pci' domain='0x' bus='0x00' slot='0x04' function='0x0'/ /disk disk type='file' device='cdrom' driver name='qemu' type='raw'/ source file='/home/sanches/sysrescue33.iso'/ target dev='hdc' bus='ide'/ readonly/ address type='drive' controller='0' bus='1' unit='0'/ /disk controller type='ide' index='0' address type='pci' domain='0x' bus='0x00' slot='0x01' function='0x1'/ /controller interface type='network' mac address='52:54:00:08:ad:b9'/ source network='default'/ model type='virtio'/ address type='pci' domain='0x' bus='0x00' slot='0x03' function='0x0'/ /interface serial type='pty' target port='0'/ /serial console type='pty' target type='serial' port='0'/ /console input type='mouse' bus='ps2'/ graphics type='vnc' port='5932' autoport='no' listen='10.1.110.133' passwd='123' listen type='address' address='10.1.110.133'/ /graphics video model type='cirrus' vram='9216' heads='1'/ address type='pci' domain='0x' bus='0x00' slot='0x02' function='0x0'/ /video hostdev mode='subsystem' type='pci' managed='yes' source address domain='0x' bus='0x03' slot='0x00' function='0x1'/ /source address type='pci' domain='0x' bus='0x00' slot='0x06' function='0x0'/ /hostdev memballoon model='virtio' address type='pci' domain='0x' bus='0x00' slot='0x05' function='0x0'/ /memballoon /devices /domain # strace read(21, 0x7fffd9558200, 16)= -1 EAGAIN (Resource temporarily unavailable) read(7, \16\0\0\0\0\0\0\0\376\377\377\377\0\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0..., 128) = 128 rt_sigaction(SIGALRM, NULL, {0x7f21895d1250, ~[KILL STOP RTMIN RT_1], SA_RESTORER, 0x7f2185fa7cb0}, 8) = 0 write(9, \1\0\0\0\0\0\0\0, 8) = 8 read(7, 0x7fffd9558180, 128)= -1 EAGAIN (Resource temporarily unavailable) timer_gettime(0x1, {it_interval={0, 0}, it_value={0, 0}}) = 0 timer_settime(0x1, 0, {it_interval={0, 0}, it_value={0, 864}}, NULL) = 0 futex(0x7f218a223460, FUTEX_WAKE_PRIVATE, 1) = 1 select(24, [7 8 11 15 21 22 23], [], [], {1, 0}) = 1 (in [8], left {0, 98}) read(21, 0x7fffd9558200, 16)= -1 EAGAIN (Resource temporarily unavailable) read(8, \1\0\0\0\0\0\0\0, 512)= 8 futex(0x7f218a223460, FUTEX_WAKE_PRIVATE, 1) = 1 select(24, [7 8 11 15 21 22 23], [], [], {1, 0}) = 1 (in [7], left {0, 991512}) read(21,
[Bug 1123973] [NEW] Unable to load dynamic library '/usr/lib/php5/20090626/mysqlnd.so'
Public bug reported: % php5 PHP Warning: PHP Startup: Unable to load dynamic library '/usr/lib/php5/20090626/mysqlnd.so' - /usr/lib/php5/20090626/mysqlnd.so: cannot open shared object file: No such file or directory in Unknown on line 0 ProblemType: Bug DistroRelease: Ubuntu 12.04 Package: php5 5.3.10-1ubuntu3.5 ProcVersionSignature: Ubuntu 3.2.0-36.57-virtual 3.2.35 Uname: Linux 3.2.0-36-virtual x86_64 ApportVersion: 2.0.1-0ubuntu17.1 Architecture: amd64 Date: Wed Feb 13 14:25:48 2013 MarkForUpload: True PackageArchitecture: all ProcEnviron: TERM=screen PATH=(custom, no user) LANG=en_US.UTF-8 SHELL=/bin/zsh SourcePackage: php5 UpgradeStatus: No upgrade log present (probably fresh install) ** Affects: php5 (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-bug php5 precise -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to php5 in Ubuntu. https://bugs.launchpad.net/bugs/1123973 Title: Unable to load dynamic library '/usr/lib/php5/20090626/mysqlnd.so' To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1123973/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1123973] Re: Unable to load dynamic library '/usr/lib/php5/20090626/mysqlnd.so'
apt-get purge mysqlnd solved this issue. /etc/php5/cli/conf.d/10-mysqlnd.ini and /etc/php5/conf.d/10-mysqlnd.ini was deleted. ** Changed in: php5 (Ubuntu) Status: Incomplete = Invalid -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to php5 in Ubuntu. https://bugs.launchpad.net/bugs/1123973 Title: Unable to load dynamic library '/usr/lib/php5/20090626/mysqlnd.so' To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1123973/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 406171] Re: [SRU] COUNTER64 broken in NetSNMP::agent
I confirm this bug in Lucid. The net-snmp package does not contain this patch http://net-snmp.svn.sourceforge.net/viewvc/net- snmp/branches/V5-4-patches/net- snmp/perl/agent/agent.xs?view=patchr1=17246r2=17245pathrev=17246 . After apply this patch, issue was fixed. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to net-snmp in Ubuntu. https://bugs.launchpad.net/bugs/406171 Title: [SRU] COUNTER64 broken in NetSNMP::agent To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/net-snmp/+bug/406171/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs