/srv/irclogs.ubuntu.com/2014/04/19/#ubuntu-uk.txt

=== Lcawte is now known as Lcawte|Away
ali1234Azelphur: the real question is why are you still using software centre?01:00
Azelphurali1234: I'm not, but other new users are :P01:00
ali1234oh, them.01:00
=== Hornet- is now known as Hornet
brobostigonmorning boys and girls.09:12
=== Lcawte|Away is now known as Lcawte
=== Monotoko is now known as Guest27897
bashrclooks like popey is on pump.io13:26
directhexpope.io13:37
brobostigon:)13:38
mappsurgh14:10
mappsmugged it again14:10
bashrcI appear to have got my server into a condition of stability by stopping the oom-killer from killing mysql14:32
directhexom nom nom oom14:46
directhexthe linux oom killer is unfit for purpose14:47
ali1234anyone got the link to that FAQ about how to write alsa applications properly so they work with pulseaudio?14:50
ali1234it was like "alsa best-practices" or something14:54
SuperEngineerDear work's laptop, I do recall I told you what would happen if your Outlook in box botred me to tears... I gave you fair warning... I warn you that I knew how to "delete all"... I did warn you that I knew where the off switch off was.... I did warn you that I Steam installed on my own pooter... ;)14:56
SuperEngineer*bored14:57
* SuperEngineer kills work's laptop14:58
SuperEngineer[and laughs manically - movie style]14:58
bashrcdirecthex: the oom-killer is just unintelligent and can't tell critical applications from non-critical ones15:19
directhexbashrc, it also can't complete a kill op before getting invoked again, on a machine with a lot of ram, since it doesn't scale15:20
bashrcwith a lot of ram you can set swapiness to zero, but I'm only on a Beaglebone with limited system resources15:21
bashrcthe next kernel release for the Beaglebone should also include zram, which may help15:24
directhexRamDoubler(tm) for Linux(tm)!15:31
=== lee1 is now known as Cueball
andylockranhey guys18:24
andylockranany idea how to identify a process pinging tonnes of udp connections?18:25
andylockran19:24:40.561770 IP 220.241.62.169.49838 > 85.119.82.243.10320: UDP, length 17218:25
penguin42that can be tricky18:31
andylockranyeah, proving to be18:33
andylockranhave spent a few hours on it so far18:33
penguin42have you tried looking at the contents of the packets to see if they suggest anything?18:34
penguin42hmm I wonder if you can do it with perf's trace18:34
andylockranthe packets contents don't give me any clues18:35
penguin42andylockran: try perf trace -a -e sendmsg18:35
andylockranthough I can tell it looks like it's being used as a rtp relay18:35
penguin42says he guessing it's using sendmsg to send the packets18:36
andylockranhmm, kinda buging me now18:40
penguin42andylockran: Try that perf command - it should show every process using the sendmsg syscall18:40
andylockranmerlin:/# perf18:42
andylockran/usr/bin/perf: line 24: exec: perf_2.6.32: not found18:42
andylockranE: linux-tools-2.6.32 is not installed.18:42
penguin42if you tab complete on perf_ do you have anything?18:42
penguin42hmm bit old, might not have trace18:42
penguin42andylockran: The other way that might work is creating an iptalbes rule to block them - not sure if that would show the process in the log?18:46
andylockranOk - blocking the process via ip seems to have blocked the data18:50
andylockranbut the process is still running18:50
penguin42but are you generating logs showing it?18:51
andylockranall I've got at the moment is the tcpdump18:52
penguin42andylockran: I mean make the iptables log the rejects - I can't remember what info you get in the logs when you do that18:53
andylockranooh, ok18:53
andylockranhttps://gist.github.com/anonymous/4dd0e8da0d82cfa8e63a18:55
penguin42andylockran: ah, external syslogging?18:55
penguin42what's pid 1881 then?18:56
andylockrannamed18:56
penguin42so is that saying that named is sending zillions of moans to rsyslog for some reason?18:57
andylockranstill going strong with those proceses stoped18:57
penguin42did you check if you had perf_something installed ?18:58
andylockranI've got perf_3.218:59
andylockranperf: 'trace' is not a perf-command. See 'perf --help'.18:59
penguin42yeh probably too new a feature19:00
penguin42thing is if they were going to rsyslog I'd have expected some text in the packet - how are you capturing them with tcpdump?19:02
andylockranhttps://gist.github.com/anonymous/793876c3889facf530c319:02
penguin42yeh what tcpdump command are you using?19:03
shaunocurious, do you have then coming inbound too?19:03
andylockranI used wireshark19:03
MartijnVdSShireWark19:03
andylockraninbound, nthing.19:03
penguin42andylockran: So with your wireshark, what's the contents of those packets - 200 bytes of something19:04
andylockranhttps://gist.github.com/anonymous/a1c43dbb4ab4bea1f80819:04
penguin42hmm, 200 bytes of not much19:05
andylockran22:43:39.533789 IP (tos 0x80, ttl 56, id 30442, offset 0, flags [DF], proto TCP (6), length 100)19:05
andylockran    80.229.11.208.57889 > 85.119.82.243.22: Flags [P.], cksum 0x67c6 (correct), seq 192:240, ack 196913, win 8192, options [nop,nop,TS val 512981144 ecr 183589], length 4819:05
andylockranthere are loads - lots of them each second19:06
penguin42andylockran: You could trace strace -p on every process one at a time until you find the victim19:07
penguin42andylockran: is something showing up in top as using cpu - if it's shifting that much you'd think it would be19:07
shaunothat last one I'd expect to see loads of19:08
andylockranyeah - nothing is showing load19:08
penguin42if you just run perf top for a few seconds what's it showing?19:10
shaunoloads and loads.  it's your ssh connection.  so as you try to list the packets, it's creating more packets, so it lists more packets ..19:10
penguin42shauno: Oh yeh, that's not the UDP packets he was previously complaining of though19:11
shaunoright, just pointing out that the last one is a red herring :)19:11
penguin42andylockran: So the packet you grabbed the hex of - how did you select that, have you got the actual udp packets you're worrying about19:12
andylockranJust randomly selected19:13
andylockranthey all seem v. similar at the top level19:14
andylockranthe IP that they're comunicating with is weird though19:14
andylockran220.241.62.16919:14
andylockranwhich comes up as a phone site - so I guess I'm relaying their calls for free19:15
shaunohong kong.  lovely.19:15
andylockraneven with inbound and outbound conns blocked to that ip, it continues.19:16
penguin42andylockran: iptraffic rule?19:16
penguin42iptables I mean19:16
penguin42andylockran: However, if your box has been owned it could have a hidden process that won't show up in top or anything19:17
andylockranset https://gist.github.com/anonymous/ec3cb8a7cc08801ff1b019:17
andylockranpenguin42: scared it's the latter :(19:17
penguin42andylockran: so what does   perf top    show ?19:18
andylockranpenguin42: nowt19:19
penguin42andylockran: How do you mean nowt19:19
andylockranit doesn't show anything.  just says 0 cycles (not sure how to use it though)19:20
penguin42really? Oh never seen that19:20
penguin42andylockran: What distro?19:22
andylockrandebian wheezy19:23
penguin42the other possibility is it's just got something like an ipsec or other kernel level vpn enabled19:23
penguin42andylockran: if you do    mount -t debugfs nodev /sys/kernel/debug   does it mount it?19:24
andylockranhttps://gist.github.com/anonymous/d594efb9b8523dc679b819:24
penguin42ok, what about ls /sys/kernel/debug/tracing ?19:25
andylockranls /sys/kernel/debug/tracing19:25
andylockranavailable_events   buffer_size_kb  events   per_cpu    README    set_event  trace_clock   trace_options  tracing_cpumask  tracing_on19:25
andylockranavailable_tracers  current_tracer  options  printk_formats  saved_cmdlines  trace      trace_marker  trace_pipe     tracing_enabled19:25
penguin42ooh that's promising - now can I figure out ftrace19:25
andylockrancheers for your time buddy - much appreciated19:25
penguin42andylockran: Can you install the trace-cmd package?19:26
andylockrangit://git.kernel.org/pub/scm/linux/kernel/git/rostedt/trace-cmd.git?19:27
penguin42yes, although it should be packaged - it is on ubuntu, not sure about wheezy19:27
andylockraninstalled19:28
penguin42andylockran: so hmm now the idea is to do    trace-cmd record   something to record something19:29
penguin42andylockran: Maybe all the syscalls19:29
andylockranhttps://gist.github.com/anonymous/ae9c17f2124c3a77612c19:31
penguin42andylockran: how about    trace-cmd record -e syscalls:sys_exit_sendmsg19:31
andylockranhttps://gist.github.com/anonymous/7a07a716341c6ddc736819:32
penguin42andylockran: trace-cmd list |grep send19:32
andylockranmerlin:~/trace-cmd# trace-cmd list |grep send19:34
andylockransched:sched_signal_send19:34
penguin42hmm that's boring - it doesn't seem to have syscalls19:34
penguin42how about grep for    net    instead of send?19:35
penguin42if it has net_dev_xmit  it would be good19:36
andylockrannothing on net19:36
penguin42ok, that's just too old19:36
davmor2Well this seems to of worked.   Server Upgrades FTW19:37
andylockranperf_5.219:37
penguin42andylockran: Other than strace'ing every pid I can't think of much19:37
penguin42andylockran: Your kernel/perf is just too old for any of the funkier tools19:37
andylockranaww . damnit :(19:38
penguin42andylockran: Tried running rkhunter?19:39
penguin42andylockran: Anything fun in dmesg?19:40
andylockrannowt19:40
penguin42andylockran: well I'm out of ideas - it's not looking good for the machine though19:42
shaunowhy do they always put blue LEDs in wifi dongles :/  if something's going on the side of my laptop, it shouldn't have a rescue strobe attached to it21:13
penguin42shauno: Because we've run out of other LED colours that are 'cool'21:44
shaunoI'm entirely in favour of no LEDs21:45
StevenRhrrm. As far as I can tell, Ubuntu 14.04 LTS is released.... why doesn't do-release-upgrade see it?22:58
* penguin42 has half a memory that in 10.04 the update didn't happen until 12.04.1 was out, but I might be imagining that23:00
StevenRpenguin42: you're right23:02
StevenRUsers of 12.04 LTS will be offered the automatic upgrade when 14.04.1 LTS is released, which is scheduled for July 24th23:02
StevenRhttp://fridge.ubuntu.com/2014/04/17/ubuntu-14-04-trusty-tahr-released/23:02
StevenRthanks penguin4223:03
penguin42still, I should probably upgrade my dad's 12.1023:03
gingis there an ubuntu ppa related channel?23:09
penguin42not that I'm aware of, there is #ubuntu-packaging if your problem is rying to package stuff23:16
gingtrying to find out if you can put a binary package you have no source for in a ppa23:25
penguin42I suspect that's technically doable, not sure if it's allowed under the rules or not23:30

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!