[Bug 1347684] Re: icmp response flapping during CPU load

2014-08-18 Thread AlexanderYT
I have trouble with run apport-collect from shell

# dpkg -l | grep qemu 
ii  ipxe-qemu   1.0.0+git-2013.c3d1e78-2ubuntu1 all 
 PXE boot firmware - ROM images for qemu
ii  qemu-common 2.0.0+dfsg-2ubuntu1.1   all 
 dummy transitional package from qemu-common to qemu-keymaps
ii  qemu-keymaps2.0.0+dfsg-2ubuntu1.1   all 
 QEMU keyboard maps
ii  qemu-kvm2.0.0+dfsg-2ubuntu1.1   
amd64QEMU Full virtualization on x86 hardware (transitional package)
ii  qemu-system-common  2.0.0+dfsg-2ubuntu1.1   
amd64QEMU full system emulation binaries (common files)
ii  qemu-system-x86 2.0.0+dfsg-2ubuntu1.1   
amd64QEMU full system emulation binaries (x86)
ii  qemu-utils  2.0.0+dfsg-2ubuntu1.1   
amd64QEMU utilities

# uname -a
Linux g8-4 3.13.0-31-generic #55-Ubuntu SMP Tue Jul 1 15:51:53 UTC 2014 x86_64 
x86_64 x86_64 GNU/Linux

# cat /etc/*-release
DISTRIB_ID=Ubuntu
DISTRIB_RELEASE=14.04
DISTRIB_CODENAME=trusty
DISTRIB_DESCRIPTION=Ubuntu 14.04 LTS
NAME=Ubuntu
VERSION=14.04, Trusty Tahr
ID=ubuntu
ID_LIKE=debian
PRETTY_NAME=Ubuntu 14.04 LTS
VERSION_ID=14.04
HOME_URL=http://www.ubuntu.com/;
SUPPORT_URL=http://help.ubuntu.com/;
BUG_REPORT_URL=http://bugs.launchpad.net/ubuntu/;


** Attachment added: dmidecode
   
https://bugs.launchpad.net/ubuntu/+source/qemu-kvm/+bug/1347684/+attachment/4180577/+files/dmidecode

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu-kvm in Ubuntu.
https://bugs.launchpad.net/bugs/1347684

Title:
  icmp response flapping during CPU load

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/qemu-kvm/+bug/1347684/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1347684] Re: icmp response flapping during CPU load

2014-08-18 Thread AlexanderYT
** Changed in: qemu-kvm (Ubuntu)
   Status: Incomplete = New

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu-kvm in Ubuntu.
https://bugs.launchpad.net/bugs/1347684

Title:
  icmp response flapping during CPU load

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/qemu-kvm/+bug/1347684/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1347684] [NEW] icmp response flapping during CPU load

2014-07-23 Thread AlexanderYT
Public bug reported:

ICMP response flapping detected when CPU is high utilization in a quest
system.


It is log ICMP response. 54916 - PID of guest OS.
# while true ; do pidstat -p 54916 1 1 | grep -v -e Linux -e Average; ping -c1 
10.11.110.213 | grep ttl=64; done 


05:06:19 PM   UID   PID%usr %system  %guest%CPU   CPU  Command
05:06:20 PM   109 549160.00   18.00   25.00   30.00 5  
qemu-system-x86
64 bytes from 10.11.110.213: icmp_seq=1 ttl=64 time=0.939 ms

05:06:20 PM   UID   PID%usr %system  %guest%CPU   CPU  Command
05:06:21 PM   109 549160.00   72.00   31.00   72.00 5  
qemu-system-x86
64 bytes from 10.11.110.213: icmp_seq=1 ttl=64 time=0.166 ms

05:06:21 PM   UID   PID%usr %system  %guest%CPU   CPU  Command
05:06:22 PM   109 54916   47.00   55.006.00  108.00 0  
qemu-system-x86
64 bytes from 10.11.110.213: icmp_seq=1 ttl=64 time=0.086 ms

05:06:22 PM   UID   PID%usr %system  %guest%CPU   CPU  Command
05:06:23 PM   109 549160.00  149.003.00  149.00 0  
qemu-system-x86
64 bytes from 10.11.110.213: icmp_seq=1 ttl=64 time=3406 ms

05:06:27 PM   UID   PID%usr %system  %guest%CPU   CPU  Command
05:06:28 PM   109 54916   50.000.00   86.00  136.00 0  
qemu-system-x86
64 bytes from 10.11.110.213: icmp_seq=1 ttl=64 time=0.312 ms

05:06:28 PM   UID   PID%usr %system  %guest%CPU   CPU  Command
05:06:29 PM   109 549160.000.00   43.00   22.00 0  
qemu-system-x86
64 bytes from 10.11.110.213: icmp_seq=1 ttl=64 time=0.338 ms

05:06:29 PM   UID   PID%usr %system  %guest%CPU   CPU  Command
05:06:30 PM   109 549160.000.00   32.00   16.00 0  
qemu-system-x86
64 bytes from 10.11.110.213: icmp_seq=1 ttl=64 time=0.134 ms

05:06:30 PM   UID   PID%usr %system  %guest%CPU   CPU  Command
05:06:31 PM   109 549160.00   26.00   43.00   47.00 0  
qemu-system-x86
64 bytes from 10.11.110.213: icmp_seq=1 ttl=64 time=0.296 ms

05:06:31 PM   UID   PID%usr %system  %guest%CPU   CPU  Command
05:06:32 PM   109 54916   61.000.00   70.00  131.00 5  
qemu-system-x86
64 bytes from 10.11.110.213: icmp_seq=1 ttl=64 time=0.139 ms

05:06:32 PM   UID   PID%usr %system  %guest%CPU   CPU  Command
05:06:33 PM   109 549160.00  102.00   28.00  102.00 5  
qemu-system-x86
64 bytes from 10.11.110.213: icmp_seq=1 ttl=64 time=0.153 ms

05:06:33 PM   UID   PID%usr %system  %guest%CPU   CPU  Command
05:06:34 PM   109 54916   24.00   49.000.00   73.00 6  
qemu-system-x86
64 bytes from 10.11.110.213: icmp_seq=1 ttl=64 time=3205 ms

05:06:37 PM   UID   PID%usr %system  %guest%CPU   CPU  Command
05:06:38 PM   109 549160.000.00  148.00  123.00 7  
qemu-system-x86
64 bytes from 10.11.110.213: icmp_seq=1 ttl=64 time=0.097 ms

05:06:38 PM   UID   PID%usr %system  %guest%CPU   CPU  Command
05:06:39 PM   109 549160.00   23.00   55.00   52.00 0  
qemu-system-x86
64 bytes from 10.11.110.213: icmp_seq=1 ttl=64 time=0.323 ms

05:06:39 PM   UID   PID%usr %system  %guest%CPU   CPU  Command
05:06:40 PM   109 54916   50.00   52.003.00  105.00 0  
qemu-system-x86
64 bytes from 10.11.110.213: icmp_seq=1 ttl=64 time=4260 ms

05:06:44 PM   UID   PID%usr %system  %guest%CPU   CPU  Command
05:06:45 PM   109 549160.00   54.00   85.00   96.0012  
qemu-system-x86
64 bytes from 10.11.110.213: icmp_seq=1 ttl=64 time=0.306 ms

05:06:45 PM   UID   PID%usr %system  %guest%CPU   CPU  Command
05:06:46 PM   109 549160.00   38.00   71.00   74.00 7  
qemu-system-x86
64 bytes from 10.11.110.213: icmp_seq=1 ttl=64 time=0.143 ms

05:06:46 PM   UID   PID%usr %system  %guest%CPU   CPU  Command
05:06:47 PM   109 54916   60.000.00   78.00  138.0011  
qemu-system-x86
64 bytes from 10.11.110.213: icmp_seq=1 ttl=64 time=0.188 ms

05:06:47 PM   UID   PID%usr %system  %guest%CPU   CPU  Command
05:06:48 PM   109 549160.000.00   78.00   42.0011  
qemu-system-x86
64 bytes from 10.11.110.213: icmp_seq=1 ttl=64 time=0.140 ms

05:06:48 PM   UID   PID%usr %system  %guest%CPU   CPU  Command
05:06:49 PM   109 549160.00   14.00   44.00   37.0011  
qemu-system-x86
64 bytes from 10.11.110.213: icmp_seq=1 ttl=64 time=0.234 ms

05:06:49 PM   UID   PID%usr %system  %guest%CPU   CPU  Command
05:06:50 PM   109 549160.004.004.005.0011  
qemu-system-x86
64 bytes from 10.11.110.213: icmp_seq=1 ttl=64 time=0.185 ms

05:06:50 PM   UID   PID%usr %system  %guest%CPU   CPU  Command
05:06:51 PM   109 549160.001.001.002.0011  
qemu-system-x86
64 bytes from 10.11.110.213: icmp_seq=1 ttl=64 time=0.274 ms
^C64 bytes from 10.11.110.213: icmp_seq=1 ttl=64 time=0.144 ms

05:06:52 PM   UID   

[Bug 1181777] Re: kvm: freeze a guest with a NIC PCI passthrough

2013-09-24 Thread AlexanderYT
Yes. It's works for me. But I can't find the message about ROM invalid:
grep -i -e invalid -e  rom 
[0.00] ACPI Warning: Invalid length for Pm1aControlBlock: 32, using 
default 16 (20110623/tbfadt-610)
[0.00] ACPI Warning: Invalid length for Pm2ControlBlock: 32, using 
default 8 (20110623/tbfadt-610)
[6.233547] IOMMU 0 0xfbdfe000: using Queued invalidation
[6.238509] IOMMU 1 0xf4ffe000: using Queued invalidation


Thanks all!

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to seabios in Ubuntu.
https://bugs.launchpad.net/bugs/1181777

Title:
  kvm: freeze a guest with a NIC PCI passthrough

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/seabios/+bug/1181777/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1181777] Re: kvm: freeze a guest with a NIC PCI passthrough

2013-09-04 Thread AlexanderYT
About #22 #25:  https://bugzilla.kernel.org/show_bug.cgi?id=60850

** Bug watch added: Linux Kernel Bug Tracker #60850
   http://bugzilla.kernel.org/show_bug.cgi?id=60850

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to ipxe in Ubuntu.
https://bugs.launchpad.net/bugs/1181777

Title:
  kvm: freeze a guest with a NIC PCI passthrough

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ipxe/+bug/1181777/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1181777] Re: kvm: freeze a guest with a NIC PCI passthrough

2013-09-02 Thread AlexanderYT
** Attachment added: 13.10 dmesg
   
https://bugs.launchpad.net/ubuntu/+source/ipxe/+bug/1181777/+attachment/3799505/+files/1310.txt

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to ipxe in Ubuntu.
https://bugs.launchpad.net/bugs/1181777

Title:
  kvm: freeze a guest with a NIC PCI passthrough

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ipxe/+bug/1181777/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1181777] Re: kvm: freeze a guest with a NIC PCI passthrough

2013-09-02 Thread AlexanderYT
** Attachment added: strace from 12.04
   
https://bugs.launchpad.net/ubuntu/+source/ipxe/+bug/1181777/+attachment/3799507/+files/strace1204.txt

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to ipxe in Ubuntu.
https://bugs.launchpad.net/bugs/1181777

Title:
  kvm: freeze a guest with a NIC PCI passthrough

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ipxe/+bug/1181777/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1181777] Re: kvm: freeze a guest with a NIC PCI passthrough

2013-09-02 Thread AlexanderYT
** Attachment added: 13.04 dmesg
   
https://bugs.launchpad.net/ubuntu/+source/ipxe/+bug/1181777/+attachment/3799504/+files/1304.txt

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to ipxe in Ubuntu.
https://bugs.launchpad.net/bugs/1181777

Title:
  kvm: freeze a guest with a NIC PCI passthrough

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ipxe/+bug/1181777/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1181777] Re: kvm: freeze a guest with a NIC PCI passthrough

2013-09-02 Thread AlexanderYT
Not solved yet.  Please see the screenshot.

# dpkg -l | grep -e ipxe -e seab 
ii  ipxe 
1.0.0+git-20130710.936134e-0ubuntu1.12.04.1~ppa1 PXE boot firmware
ii  ipxe-qemu
1.0.0+git-20130710.936134e-0ubuntu1.12.04.1~ppa1 Virtual package to support use 
of kvm-ipxe with qemu
ii  kvm-ipxe 
1.0.0+git-20130710.936134e-0ubuntu1.12.04.1~ppa1 transitional dummy package
ii  seabios  1.7.3-1
  Legacy BIOS implementation


I tested 13.04 and 13.10 full installation (#10 was the test in chroot in 
12.04). 
But I got new problem with 
# virsh nodedev-detach pci__02_00_1
After this command I found some messages in dmesg about kernel errors (please 
see attach 1304 and 1310)

** Attachment added: qemu screenshot
   
https://bugs.launchpad.net/ubuntu/+source/ipxe/+bug/1181777/+attachment/3799503/+files/qemu.png

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to ipxe in Ubuntu.
https://bugs.launchpad.net/bugs/1181777

Title:
  kvm: freeze a guest with a NIC PCI passthrough

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ipxe/+bug/1181777/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1181777] Re: kvm: freeze a guest with a NIC PCI passthrough

2013-08-30 Thread AlexanderYT
dpkg -l | grep ipxe
ii  ipxe 
1.0.0+git-20130710.936134e-0ubuntu1.12.04.1~ppa1 PXE boot firmware
ii  ipxe-qemu
1.0.0+git-20130710.936134e-0ubuntu1.12.04.1~ppa1 Virtual package to support use 
of kvm-ipxe with qemu
ii  kvm-ipxe 
1.0.0+git-20130710.936134e-0ubuntu1.12.04.1~ppa1 transitional dummy package

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to ipxe in Ubuntu.
https://bugs.launchpad.net/bugs/1181777

Title:
  kvm: freeze a guest with a NIC PCI passthrough

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ipxe/+bug/1181777/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1181777] Re: kvm: freeze a guest with a NIC PCI passthrough

2013-08-29 Thread AlexanderYT
Hi,
not solved yet.  

  PID USER  PR  NI  VIRT  RES  SHR S %CPU %MEMTIME+  COMMAND

 
10710 root  20   0  805m 543m 6724 S  100  0.6   0:10.81 qemu-system-x86

# apt-file search qemu-system-x86
qemu-kvm: /usr/bin/qemu-system-x86_64
qemu-kvm: /usr/share/man/man1/qemu-system-x86_64.1.gz
qemu-kvm-spice: /usr/bin/qemu-system-x86_64-spice

Not sure, but may be the problem in qemu-kvm package?

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to ipxe in Ubuntu.
https://bugs.launchpad.net/bugs/1181777

Title:
  kvm: freeze a guest with a NIC PCI passthrough

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ipxe/+bug/1181777/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1181777] Re: kvm: freeze a guest with a NIC PCI passthrough

2013-08-27 Thread AlexanderYT
Thank you Serge!
The issue not solved. 

# aptitude show ipxe | grep -i version
Version: 1.0.0+git-3.55f6c88-0ubuntu2.12.04.1~ppa1

# aptitude show kvm-ipxe | grep -i version
Version: 1.0.0+git-3.55f6c88-0ubuntu2.12.04.1~ppa1


Strace log:
---cut
select(16, [5 6 15], [], [], {0, 987950}) = 1 (in [5], left {0, 970520})
read(15, 0x7fffb8dcc480, 16)= -1 EAGAIN (Resource temporarily 
unavailable)
read(5, 
\16\0\0\0\0\0\0\0\376\377\377\377\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0..., 
128) = 128
rt_sigaction(SIGALRM, NULL, {0x7fc3dedf4250, ~[KILL STOP RTMIN RT_1], 
SA_RESTORER, 0x7fc3db7c9cb0}, 8) = 0
write(7, \1\0\0\0\0\0\0\0, 8) = 8
read(5, 0x7fffb8dcc400, 128)= -1 EAGAIN (Resource temporarily 
unavailable)
timer_gettime(0, {it_interval={0, 0}, it_value={0, 0}}) = 0
timer_settime(0, 0, {it_interval={0, 0}, it_value={0, 25}}, NULL) = 0
recvfrom(10, 0x7fc3e00d3ec4, 4096, 0, 0, 0) = -1 EAGAIN (Resource temporarily 
unavailable)
select(11, [10], NULL, NULL, {0, 0})= 0 (Timeout)
timer_gettime(0, {it_interval={0, 0}, it_value={0, 951}}) = 0
futex(0x7fc3dfa46460, FUTEX_WAKE_PRIVATE, 1) = 1
select(16, [5 6 15], [], [], {1, 0})= 2 (in [5 6], left {0, 98})
read(15, 0x7fffb8dcc480, 16)= -1 EAGAIN (Resource temporarily 
unavailable)
read(6, \1\0\0\0\0\0\0\0, 512)= 8
read(5, 
\16\0\0\0\0\0\0\0\376\377\377\377\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0..., 
128) = 128
rt_sigaction(SIGALRM, NULL, {0x7fc3dedf4250, ~[KILL STOP RTMIN RT_1], 
SA_RESTORER, 0x7fc3db7c9cb0}, 8) = 0
write(7, \1\0\0\0\0\0\0\0, 8) = 8
read(5, 0x7fffb8dcc400, 128)= -1 EAGAIN (Resource temporarily 
unavailable)
timer_gettime(0, {it_interval={0, 0}, it_value={0, 0}}) = 0
timer_settime(0, 0, {it_interval={0, 0}, it_value={0, 28933959}}, NULL) = 0
futex(0x7fc3dfa46460, FUTEX_WAKE_PRIVATE, 1) = 1
select(16, [5 6 15], [], [], {1, 0})= 1 (in [6], left {0, 98})
read(15, 0x7fffb8dcc480, 16)= -1 EAGAIN (Resource temporarily 
unavailable)
read(6, \1\0\0\0\0\0\0\0, 512)= 8
futex(0x7fc3dfa46460, FUTEX_WAKE_PRIVATE, 1) = 1
select(16, [5 6 15], [], [], {1, 0})= 1 (in [5], left {0, 971287})
read(15, 0x7fffb8dcc480, 16)= -1 EAGAIN (Resource temporarily 
unavailable)
read(5, 
\16\0\0\0\0\0\0\0\376\377\377\377\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0..., 
128) = 128
rt_sigaction(SIGALRM, NULL, {0x7fc3dedf4250, ~[KILL STOP RTMIN RT_1], 
SA_RESTORER, 0x7fc3db7c9cb0}, 8) = 0
write(7, \1\0\0\0\0\0\0\0, 8) = 8
read(5, 0x7fffb8dcc400, 128)= -1 EAGAIN (Resource temporarily 
unavailable)
timer_gettime(0, {it_interval={0, 0}, it_value={0, 0}}) = 0
timer_settime(0, 0, {it_interval={0, 0}, it_value={0, 25}}, NULL) = 0
recvfrom(10, 0x7fc3e00d3ec4, 4096, 0, 0, 0) = -1 EAGAIN (Resource temporarily 
unavailable)
select(11, [10], NULL, NULL, {0, 0})= 0 (Timeout)
timer_gettime(0, {it_interval={0, 0}, it_value={0, 173410}}) = 0
futex(0x7fc3dfa46460, FUTEX_WAKE_PRIVATE, 1) = 1
select(16, [5 6 15], [], [], {1, 0})= 1 (in [6], left {0, 98})
read(15, 0x7fffb8dcc480, 16)= -1 EAGAIN (Resource temporarily 
unavailable)
read(6, \1\0\0\0\0\0\0\0, 512)= 8
futex(0x7fc3dfa46460, FUTEX_WAKE_PRIVATE, 1) = 1
select(16, [5 6 15], [], [], {1, 0})= 1 (in [5], left {0, 99})
read(15, 0x7fffb8dcc480, 16)= -1 EAGAIN (Resource temporarily 
unavailable)
read(5, 
\16\0\0\0\0\0\0\0\376\377\377\377\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0..., 
128) = 128
rt_sigaction(SIGALRM, NULL, {0x7fc3dedf4250, ~[KILL STOP RTMIN RT_1], 
SA_RESTORER, 0x7fc3db7c9cb0}, 8) = 0
write(7, \1\0\0\0\0\0\0\0, 8) = 8
read(5, 0x7fffb8dcc400, 128)= -1 EAGAIN (Resource temporarily 
unavailable)
timer_gettime(0, {it_interval={0, 0}, it_value={0, 0}}) = 0
timer_settime(0, 0, {it_interval={0, 0}, it_value={0, 29129841}}, NULL) = 0
futex(0x7fc3dfa46460, FUTEX_WAKE_PRIVATE, 1) = 1
select(16, [5 6 15], [], [], {1, 0})= 1 (in [6], left {0, 98})
read(15, 0x7fffb8dcc480, 16)= -1 EAGAIN (Resource temporarily 
unavailable)
read(6, \1\0\0\0\0\0\0\0, 512)= 8
futex(0x7fc3dfa46460, FUTEX_WAKE_PRIVATE, 1) = 1
select(16, [5 6 15], [], [], {1, 0})= 1 (in [5], left {0, 971140})
read(15, 0x7fffb8dcc480, 16)= -1 EAGAIN (Resource temporarily 
unavailable)
read(5, 
\16\0\0\0\0\0\0\0\376\377\377\377\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0..., 
128) = 128
rt_sigaction(SIGALRM, NULL, {0x7fc3dedf4250, ~[KILL STOP RTMIN RT_1], 
SA_RESTORER, 0x7fc3db7c9cb0}, 8) = 0
write(7, \1\0\0\0\0\0\0\0, 8) = 8
read(5, 0x7fffb8dcc400, 128)= -1 EAGAIN (Resource temporarily 
unavailable)
timer_gettime(0, {it_interval={0, 0}, it_value={0, 0}}) = 0
timer_settime(0, 0, {it_interval={0, 0}, it_value={0, 25}}, NULL) = 0
recvfrom(10, 0x7fc3e00d3ec4, 4096, 0, 0, 0) = -1 EAGAIN (Resource temporarily 
unavailable)
select(11, [10], NULL, NULL, {0, 0})= 0 (Timeout)
timer_gettime(0, {it_interval={0, 

[Bug 1181777] Re: kvm: freeze a guest with a NIC PCI passthrough

2013-07-20 Thread AlexanderYT
I tried qemu in saucy.  No issue found. IPXE works fine.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu-kvm in Ubuntu.
https://bugs.launchpad.net/bugs/1181777

Title:
  kvm: freeze a guest with a NIC PCI passthrough

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/qemu-kvm/+bug/1181777/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1181777] Re: kvm: freeze a guest with a NIC PCI passthrough

2013-07-19 Thread AlexanderYT
Yes, I have a possibility.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu-kvm in Ubuntu.
https://bugs.launchpad.net/bugs/1181777

Title:
  kvm: freeze a guest with a NIC PCI passthrough

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/qemu-kvm/+bug/1181777/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1181777] Re: kvm: freeze a guest with a NIC PCI passthrough

2013-07-18 Thread AlexanderYT
I tried upstream qemu. But the issue not solved yet.
On Centos it work fine. qemu in Centos use gPXE instead iPXE. Please see 
screenshot. 

** Attachment added: Screenshot of QEMU.png
   
https://bugs.launchpad.net/ubuntu/+source/qemu-kvm/+bug/1181777/+attachment/3741491/+files/Screenshot%20of%20QEMU.png

** Changed in: qemu-kvm (Ubuntu)
   Status: Incomplete = New

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu-kvm in Ubuntu.
https://bugs.launchpad.net/bugs/1181777

Title:
  kvm: freeze a guest with a NIC PCI passthrough

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/qemu-kvm/+bug/1181777/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1181777] Re: kvm: freeze a guest with a NIC PCI passthrough

2013-06-28 Thread AlexanderYT
Start
qemu-system-x86_64 -m 512 -device pci-assign,host=03:00.1 -boot d
not solve the issue.

  PID USER  PR  NI  VIRT  RES  SHR S %CPU %MEMTIME+  COMMAND

40062 root  20   0  805m 543m 6724 S   99  0.6   0:35.63 qemu-system-x86 


** Attachment added: w.log
   
https://bugs.launchpad.net/ubuntu/+source/qemu-kvm/+bug/1181777/+attachment/3716837/+files/w.log

** Changed in: qemu-kvm (Ubuntu)
   Status: Incomplete = New

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu-kvm in Ubuntu.
https://bugs.launchpad.net/bugs/1181777

Title:
  kvm: freeze a guest with a NIC PCI passthrough

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/qemu-kvm/+bug/1181777/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1181777] Re: kvm: freeze a guest with a NIC PCI passthrough

2013-05-21 Thread AlexanderYT
** Changed in: qemu-kvm (Ubuntu)
   Status: Incomplete = New

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu-kvm in Ubuntu.
https://bugs.launchpad.net/bugs/1181777

Title:
  kvm: freeze a guest with a NIC PCI passthrough

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/qemu-kvm/+bug/1181777/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1181777] Re: kvm: freeze a guest with a NIC PCI passthrough

2013-05-20 Thread AlexanderYT
Hello.
This is the step by step history of commands. The domain w is not rinnung.
# virsh list --all
 Id Name State
--
  - wshut off


There are  all NICs on the host system
# virsh nodedev-list --tree | grep -A 18 '+- pci__00_02_0'
  +- pci__00_02_0
  |   |
  |   +- pci__03_00_0
  |   |   |
  |   |   +- net_eth0_2c_76_8a_4f_45_00
  |   | 
  |   +- pci__03_00_1
  |   |   |
  |   |   +- net_eth1_2c_76_8a_4f_45_01
  |   | 
  |   +- pci__03_00_2
  |   |   |
  |   |   +- net_eth2_2c_76_8a_4f_45_02
  |   | 
  |   +- pci__03_00_3
  |   |
  |   +- net_eth3_2c_76_8a_4f_45_03


Dump xml for eht1
# virsh nodedev-dumpxml pci__03_00_1
device
  namepci__03_00_1/name
  parentpci__00_02_0/parent
  driver
nametg3/name
  /driver
  capability type='pci'
domain0/domain
bus3/bus
slot0/slot
function1/function
product id='0x1657'NetXtreme BCM5719 Gigabit Ethernet PCIe/product
vendor id='0x14e4'Broadcom Corporation/vendor
capability type='virt_functions'
/capability
  /capability
/device

Add the host device 
# virsh edit w
...
hostdev mode='subsystem' type='pci' managed='yes'
  source
address domain='0x' bus='0x03' slot='0x00' function='0x1'/
  /source
/hostdev
...

Dettach  the NIC from host
# virsh nodedev-dettach pci__03_00_1

# virsh start w


The image file of guest OS is not contain a OS, this is only a RAW partition. 
I'm trying to boot the guest with live cd ISO. 
But problem is while running seabios or iPXE (IMHO). Please, see the screenshot.


** Attachment added: VNC screenshot
   
https://bugs.launchpad.net/ubuntu/+source/qemu-kvm/+bug/1181777/+attachment/3682131/+files/Screenshot%20of%20QEMU%20%28w%29.png

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu-kvm in Ubuntu.
https://bugs.launchpad.net/bugs/1181777

Title:
  kvm: freeze a guest with a NIC PCI passthrough

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/qemu-kvm/+bug/1181777/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1181777] [NEW] kvm: freeze a guest with a NIC PCI passthrough

2013-05-19 Thread AlexanderYT
Public bug reported:

After attach NIC to guest domain, this domain freeze  and CPU load 100%
on host system.

# virsh start w

# top 
top - 19:08:14 up 28 min,  1 user,  load average: 1.00, 0.97, 0.75
Tasks: 277 total,   1 running, 276 sleeping,   0 stopped,   0 zombie
Cpu(s):  1.2%us,  1.2%sy,  0.0%ni, 97.5%id,  0.0%wa,  0.0%hi,  0.0%si,  0.0%st
Mem:  99035416k total,  2537044k used, 96498372k free,84844k buffers
Swap:0k total,0k used,0k free,   484432k cached

  PID USER  PR  NI  VIRT  RES  SHR S %CPU %MEMTIME+  COMMAND

 
21168 libvirt-  20   0  837m 544m 6916 S  103  0.6   9:57.66 kvm


# cat /etc/libvirt/qemuw.xml 
!--
WARNING: THIS IS AN AUTO-GENERATED FILE. CHANGES TO IT ARE LIKELY TO BE 
OVERWRITTEN AND LOST. Changes to this xml configuration should be made using:
  virsh edit w
or other application using the libvirt API.
--

domain type='kvm'
  namew/name
  uuid640ff4d4-665a-5a73-9e85-aecd4e75f18f/uuid
  memory524288/memory
  currentMemory524288/currentMemory
  vcpu1/vcpu
  os
type arch='x86_64' machine='pc-1.0'hvm/type
boot dev='cdrom'/
  /os
  features
acpi/
apic/
pae/
  /features
  cpu match='exact'
modelWestmere/model
vendorIntel/vendor
feature policy='require' name='tm2'/
feature policy='require' name='est'/
feature policy='require' name='vmx'/
feature policy='require' name='ds'/
feature policy='require' name='ss'/
feature policy='require' name='vme'/
feature policy='require' name='rdtscp'/
feature policy='require' name='ht'/
feature policy='require' name='dca'/
feature policy='require' name='pbe'/
feature policy='require' name='tm'/
feature policy='require' name='monitor'/
feature policy='require' name='pdpe1gb'/
feature policy='require' name='ds_cpl'/
feature policy='require' name='xtpr'/
feature policy='require' name='acpi'/
feature policy='require' name='x2apic'/
  /cpu
  clock offset='utc'/
  on_poweroffdestroy/on_poweroff
  on_rebootrestart/on_reboot
  on_crashrestart/on_crash
  devices
emulator/usr/bin/kvm/emulator
disk type='file' device='disk'
  driver name='qemu' type='raw' cache='writeback'/
  source file='/var/lib/libvirt/images/w.img'/
  target dev='vda' bus='virtio'/
  address type='pci' domain='0x' bus='0x00' slot='0x04' 
function='0x0'/
/disk
disk type='file' device='cdrom'
  driver name='qemu' type='raw'/
  source file='/home/sanches/sysrescue33.iso'/
  target dev='hdc' bus='ide'/
  readonly/
  address type='drive' controller='0' bus='1' unit='0'/
/disk
controller type='ide' index='0'
  address type='pci' domain='0x' bus='0x00' slot='0x01' 
function='0x1'/
/controller
interface type='network'
  mac address='52:54:00:08:ad:b9'/
  source network='default'/
  model type='virtio'/
  address type='pci' domain='0x' bus='0x00' slot='0x03' 
function='0x0'/
/interface
serial type='pty'
  target port='0'/
/serial
console type='pty'
  target type='serial' port='0'/
/console
input type='mouse' bus='ps2'/
graphics type='vnc' port='5932' autoport='no' listen='10.1.110.133' 
passwd='123'
  listen type='address' address='10.1.110.133'/
/graphics
video
  model type='cirrus' vram='9216' heads='1'/
  address type='pci' domain='0x' bus='0x00' slot='0x02' 
function='0x0'/
/video
hostdev mode='subsystem' type='pci' managed='yes'
  source
address domain='0x' bus='0x03' slot='0x00' function='0x1'/
  /source
  address type='pci' domain='0x' bus='0x00' slot='0x06' 
function='0x0'/
/hostdev
memballoon model='virtio'
  address type='pci' domain='0x' bus='0x00' slot='0x05' 
function='0x0'/
/memballoon
  /devices
/domain


# strace
read(21, 0x7fffd9558200, 16)= -1 EAGAIN (Resource temporarily 
unavailable)
read(7, 
\16\0\0\0\0\0\0\0\376\377\377\377\0\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0..., 
128) = 128
rt_sigaction(SIGALRM, NULL, {0x7f21895d1250, ~[KILL STOP RTMIN RT_1], 
SA_RESTORER, 0x7f2185fa7cb0}, 8) = 0
write(9, \1\0\0\0\0\0\0\0, 8) = 8
read(7, 0x7fffd9558180, 128)= -1 EAGAIN (Resource temporarily 
unavailable)
timer_gettime(0x1, {it_interval={0, 0}, it_value={0, 0}}) = 0
timer_settime(0x1, 0, {it_interval={0, 0}, it_value={0, 864}}, NULL) = 0
futex(0x7f218a223460, FUTEX_WAKE_PRIVATE, 1) = 1
select(24, [7 8 11 15 21 22 23], [], [], {1, 0}) = 1 (in [8], left {0, 98})
read(21, 0x7fffd9558200, 16)= -1 EAGAIN (Resource temporarily 
unavailable)
read(8, \1\0\0\0\0\0\0\0, 512)= 8
futex(0x7f218a223460, FUTEX_WAKE_PRIVATE, 1) = 1
select(24, [7 8 11 15 21 22 23], [], [], {1, 0}) = 1 (in [7], left {0, 991512})
read(21, 

[Bug 1123973] [NEW] Unable to load dynamic library '/usr/lib/php5/20090626/mysqlnd.so'

2013-02-13 Thread AlexanderYT
Public bug reported:

% php5
PHP Warning:  PHP Startup: Unable to load dynamic library 
'/usr/lib/php5/20090626/mysqlnd.so' - /usr/lib/php5/20090626/mysqlnd.so: cannot 
open shared object file: No such file or directory in Unknown on line 0

ProblemType: Bug
DistroRelease: Ubuntu 12.04
Package: php5 5.3.10-1ubuntu3.5
ProcVersionSignature: Ubuntu 3.2.0-36.57-virtual 3.2.35
Uname: Linux 3.2.0-36-virtual x86_64
ApportVersion: 2.0.1-0ubuntu17.1
Architecture: amd64
Date: Wed Feb 13 14:25:48 2013
MarkForUpload: True
PackageArchitecture: all
ProcEnviron:
 TERM=screen
 PATH=(custom, no user)
 LANG=en_US.UTF-8
 SHELL=/bin/zsh
SourcePackage: php5
UpgradeStatus: No upgrade log present (probably fresh install)

** Affects: php5 (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug php5 precise

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to php5 in Ubuntu.
https://bugs.launchpad.net/bugs/1123973

Title:
  Unable to load dynamic library '/usr/lib/php5/20090626/mysqlnd.so'

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1123973/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1123973] Re: Unable to load dynamic library '/usr/lib/php5/20090626/mysqlnd.so'

2013-02-13 Thread AlexanderYT
apt-get purge mysqlnd solved this issue.
/etc/php5/cli/conf.d/10-mysqlnd.ini and /etc/php5/conf.d/10-mysqlnd.ini
was deleted.

** Changed in: php5 (Ubuntu)
   Status: Incomplete = Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to php5 in Ubuntu.
https://bugs.launchpad.net/bugs/1123973

Title:
  Unable to load dynamic library '/usr/lib/php5/20090626/mysqlnd.so'

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1123973/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 406171] Re: [SRU] COUNTER64 broken in NetSNMP::agent

2011-07-18 Thread AlexanderYT
I confirm this bug in Lucid. The  net-snmp package does not contain this
patch http://net-snmp.svn.sourceforge.net/viewvc/net-
snmp/branches/V5-4-patches/net-
snmp/perl/agent/agent.xs?view=patchr1=17246r2=17245pathrev=17246 .
After apply this patch,  issue was fixed.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to net-snmp in Ubuntu.
https://bugs.launchpad.net/bugs/406171

Title:
  [SRU] COUNTER64 broken in NetSNMP::agent

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/net-snmp/+bug/406171/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs