Re: kern/166406: [ipfw] ipfw does not set ALTQ identifier for ipv6 traffic

2012-03-28 Thread linimon
Old Synopsis: ipfw does not set ALTQ identifier for ipv6 traffic
New Synopsis: [ipfw] ipfw does not set ALTQ identifier for ipv6 traffic

Responsible-Changed-From-To: freebsd-bugs->freebsd-ipfw
Responsible-Changed-By: linimon
Responsible-Changed-When: Wed Mar 28 08:53:25 UTC 2012
Responsible-Changed-Why: 
Over to maintainer(s).

http://www.freebsd.org/cgi/query-pr.cgi?pr=166406
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: kern/166411: [pf] simply enabling pf makes udpxy not to work

2012-03-28 Thread linimon
Old Synopsis: simply enabling pf makes udpxy not to work
New Synopsis: [pf] simply enabling pf makes udpxy not to work

Responsible-Changed-From-To: freebsd-bugs->freebsd-pf
Responsible-Changed-By: linimon
Responsible-Changed-When: Wed Mar 28 08:54:35 UTC 2012
Responsible-Changed-Why: 
Over to maintainer(s).

http://www.freebsd.org/cgi/query-pr.cgi?pr=166411
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: kern/166458: [libc] bind(2) incorrectly interprets SO_REUSEADDR option as also implying SO_REUSEPORT on FreeBSD

2012-03-28 Thread glebius
Synopsis: [libc] bind(2) incorrectly interprets SO_REUSEADDR option as also 
implying SO_REUSEPORT on FreeBSD

State-Changed-From-To: open->analyzed
State-Changed-By: glebius
State-Changed-When: Wed Mar 28 09:02:08 UTC 2012
State-Changed-Why: 
This PR needs discussion.

http://www.freebsd.org/cgi/query-pr.cgi?pr=166458
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: kern/166458: bind() incorrectly interprets SO_REUSEADDR option as also implying SO_REUSEPORT on FreeBSD

2012-03-28 Thread Gleb Smirnoff
The following reply was made to PR kern/166458; it has been noted by GNATS.

From: Gleb Smirnoff 
To: Sean Bruno 
Cc: freebsd-gnats-sub...@freebsd.org
Subject: Re: kern/166458: bind() incorrectly interprets SO_REUSEADDR option
 as also implying SO_REUSEPORT on FreeBSD
Date: Wed, 28 Mar 2012 13:01:40 +0400

   Sean,
 
 On Wed, Mar 28, 2012 at 12:53:03AM +, Sean Bruno wrote:
 S>  ... seems to be a bug in FreeBSD when specifying port number 0 in 
the 
 S> socket address passed to the bind system call in order to let the kernel
 S> select a free port number.
 S> 
 S> The semantics of SO_REUSEADDR is inconsistently implemented on FreeBSD.
 S> 
 S> FreeBSD 4 jail environment (on a FreeBSD 4 host):
 S> 
 S> dev-tegge:~$ ./bindbug 
 S> serversock addr is 10.76.250.174:40328
 S> dup bind: Address already in use
 S> This error was expected, tried to bind to used addr/port
 S> dup2 bind: Address already in use
 S> This error was expected, tried to bind to used port without SO_REUSEPORT
 S> autosock addr is 10.76.250.174:40328
 S> bug triggered, port number conflict on sockets without SO_REUSEPORT
 S> listen succeded after implicitly overlapping port bind
 S> 
 S> FreeBSD 6 host enironment:
 S> 
 S> tegge-store1:~:$ ./bindbug 
 S> serversock addr is 127.0.0.1:59073
 S> dup bind: Address already in use
 S> This error was expected, tried to bind to used addr/port
 S> BUG: binding duplicate socket to server port succeeded
 S> dup2sock addr is 0.0.0.0:59073
 S> overlapping explicit bind to same port number succeeded without SO_REUSEPORT
 S> listen succeeded after explicitly overlapping port bind
 S> autosock addr is 0.0.0.0:59073
 S> bug triggered, port number conflict on sockets without SO_REUSEPORT
 S> listen succeded after implicitly overlapping port bind
 S> 
 S> RHEL4 host environment:
 S> 
 S> [tegge@dell-bl1s3 ~]$ time ./bindbug 
 S> serversock addr is 127.0.0.1:43270
 S> dup bind: Address already in use
 S> This error was expected, tried to bind to used addr/port
 S> dup2 bind: Address already in use
 S> This error was expected, tried to bind to used port without SO_REUSEPORT
 S> bug not triggered after 16777216 iterations
 
 I don't see a bug in FreeBSD 6 behavior.
 
 To speak about bug we need to have a clear description of correct behavior.
 Unfortunately the SO_REUSEADDR option is tersely documented in our manuals,
 as well as in POSIX. Thus I will advocate to the TCP/IP Book by Stevens
 as documentation, quoting it, page 720:
 
 SO_REUSEADDR   Allows the process to bind to a port number that is already in 
use, but
the IP address being bound (including the wildcard) must not 
already
be bound to that same port.
For example, if an attached interface has the IP address 
140.252.1.29
then one socket can be bound to 140.252.1.29, port ; another
socket can be bound to 127.0.0.1, port ; and another socket 
can be
bound to the wildcard IP address, port . The call to bind 
for the
second and third cases must be preceeded by a call to 
setsockopt,
setting the SO_REUSEADDR option.
 
 
http://books.google.ru/books?id=ESM3CWY5xRYC&pg=PA720&hl=ru&source=gbs_toc_r&cad=4#v=onepage&q&f=false
 
 -- 
 Totus tuus, Glebius.
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: misc/166340: Process under FreeBSD 9.0 hangs in uninterruptable sleep with apparently no syscall (empty wchan)

2012-03-28 Thread Christian Esken
The following reply was made to PR kern/166340; it has been noted by GNATS.

From: Christian Esken 
To: bug-follo...@freebsd.org
Cc: Konstantin Belousov , a...@freebsd.org
Subject: Re: misc/166340: Process under FreeBSD 9.0 hangs in uninterruptable
 sleep with apparently no syscall (empty wchan)
Date: Wed, 28 Mar 2012 15:30:29 +0200

 --=-KhwYlamRji7Rmc2IYneE
 Content-Type: text/plain; charset="UTF-8"
 Content-Transfer-Encoding: 7bit
 
 Yes. It sounds like a good idea to get a consistent "snapshot" of
 everything. So here it is. pid = 2527
 
 
 # ps -o user,pid,ppid,pending,caught,ignored,blocked,stat,wchan 2527
 USER PID  PPID  PENDING   CAUGHT  IGNORED  BLOCKED STAT WCHAN
 nobody  2527  25250 80005006 79f880100 D- 
 
 # ps -o pid,paddr 2527
   PID PADDR
  2527 fe025a476488
 
 # procstat -kk 2527
   PIDTID COMM TDNAME   KSTACK
  2527 101206 serelog  -mi_switch+0x2eb
 sleepq_check_timeout+0x9f sleepq_timedwait_sig+0x20 _sleep+0x2a1
 soreceive_generic+0xea9 kern_recvit+0x1c4 recvit+0x21 sys_recvfrom+0x82
 amd64_syscall+0x478 Xfast_syscall+0xf7 
 
 
 The kgdb data is attached.
 
 The smallest ktr trace I could produce is approximately 200MB. It's
 still rather big, so if you want a filtered version I would need to know
 how exactly this should be done (I haven't found a way to filter for a
 pid).
 Posting the full 200MB as followup is surely not appreciated, so I can
 either upload/send it somewhere or will find a place where you can
 download it. Any favored solution for you, Konstantin? We can use direct
 mail if preferred for discussing the details.
 
  
  Christian
 
 
 
 --=-KhwYlamRji7Rmc2IYneE
 Content-Disposition: attachment; filename="kgdb.2527.txt"
 Content-Type: text/plain; name="kgdb.2527.txt"; charset="UTF-8"
 Content-Transfer-Encoding: 7bit
 
 (kgdb) p *(struct proc *)0xfe025a476488
 $1 = {p_list = {le_next = 0xfe01a3f44910, le_prev = 0xfe02c73f8488}, 
p_threads = {tqh_first = 0xfe004edc0480, tqh_last = 0xfe004edc0490}, 
p_slock = {lock_object = {
   lo_name = 0x80d3f62c "process slock", lo_flags = 720896, lo_data 
= 0, lo_witness = 0xff8000689f80}, mtx_lock = 4}, p_ucred = 
0xfe021f48d000, p_fd = 0xfe026f3bc600, p_fdtol = 0x0, 
   p_stats = 0xfe018e9c6a00, p_limit = 0xfe004ed0fb00, p_limco = 
{c_links = {sle = {sle_next = 0x0}, tqe = {tqe_next = 0x0, tqe_prev = 0x0}}, 
c_time = 0, c_arg = 0x0, c_func = 0, c_lock = 0xfe025a476580, 
 c_flags = 0, c_cpu = 0}, p_sigacts = 0xfe035ebe5000, p_flag = 
268452096, p_state = PRS_NORMAL, p_pid = 2527, p_hash = {le_next = 0x0, le_prev 
= 0xff80006aaef8}, p_pglist = {le_next = 0x0, 
 le_prev = 0xfe01a3827790}, p_pptr = 0xfe0008353910, p_sibling = 
{le_next = 0xfe004e8a6910, le_prev = 0xfe01b9f639f0}, p_children = 
{lh_first = 0x0}, p_mtx = {lock_object = {
   lo_name = 0x80d3f61f "process lock", lo_flags = 21168128, 
lo_data = 0, lo_witness = 0xff8000688400}, mtx_lock = 4}, p_ksi = 
0xfe004e0f10e0, p_sigqueue = {sq_signals = {__bits = {16384, 0, 0, 0}}, 
 sq_kill = {__bits = {0, 0, 0, 0}}, sq_list = {tqh_first = 
0xfe02f5841540, tqh_last = 0xfe0287f372a0}, sq_proc = 
0xfe025a476488, sq_flags = 1}, p_oppid = 0, p_dbg_child = 0, p_vmspace = 
0xfe018e5d7000, 
   p_swtick = 340601, p_realtimer = {it_interval = {tv_sec = 0, tv_usec = 0}, 
it_value = {tv_sec = 0, tv_usec = 0}}, p_ru = {ru_utime = {tv_sec = 0, tv_usec 
= 0}, ru_stime = {tv_sec = 0, tv_usec = 0}, ru_maxrss = 0, 
 ru_ixrss = 0, ru_idrss = 0, ru_isrss = 0, ru_minflt = 0, ru_majflt = 0, 
ru_nswap = 0, ru_inblock = 0, ru_oublock = 0, ru_msgsnd = 0, ru_msgrcv = 0, 
ru_nsignals = 0, ru_nvcsw = 0, ru_nivcsw = 0}, p_rux = {
 rux_runtime = 798780190, rux_uticks = 12, rux_sticks = 45, rux_iticks = 0, 
rux_uu = 84077, rux_su = 315289, rux_tu = 399367}, p_crux = {rux_runtime = 0, 
rux_uticks = 0, rux_sticks = 0, rux_iticks = 0, rux_uu = 0, 
 rux_su = 0, rux_tu = 0}, p_profthreads = 0, p_exitthreads = 0, p_traceflag 
= 0, p_tracevp = 0x0, p_tracecred = 0x0, p_textvp = 0xfe007d9de000, p_lock 
= 0, p_sigiolst = {slh_first = 0x0}, p_sigparent = 20, 
   p_sig = 0, p_code = 0, p_stops = 0, p_stype = 0, p_step = 0 '\0', p_pfsflags 
= 0 '\0', p_nlminfo = 0x0, p_aioinfo = 0x0, p_singlethread = 0x0, p_suspcount = 
0, p_xthread = 0x0, p_boundary_count = 0, p_pendingcnt = 2, 
   p_itimers = 0x0, p_procdesc = 0x0, p_magic = 3203398350, p_osrel = 900044, 
p_comm = "serelog", '\0' , p_pgrp = 0xfe01a3827780, 
p_sysent = 0x810f1380, p_args = 0xfe020cf38300, 
   p_cpulimit = 9223372036854775807, p_nice = 0 '\0', p_fibnum = 0, p_xstat = 
0, p_klist = {kl_list = {slh_first = 0x0}, kl_lock = 0x807f6ce0 
, kl_unlock = 0x807f6d00 , 
 kl_assert_locked = 0x807f6fe0 , 
kl_assert_unlocked = 0x807f6fc0 , 
kl_lockarg = 0xfe025a476580}, p_numthreads = 1, p_md = {md

Re: kern/166459: [atkbdc] [patch] other id for atkbdc

2012-03-28 Thread jkim
Synopsis: [atkbdc] [patch] other id for atkbdc

Responsible-Changed-From-To: freebsd-bugs->jkim
Responsible-Changed-By: jkim
Responsible-Changed-When: Wed Mar 28 17:53:08 UTC 2012
Responsible-Changed-Why: 
I'll take it.  Actually, the PNP ID is PNP0320 (little-endian).

http://www.freebsd.org/cgi/query-pr.cgi?pr=166459
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


misc/166477: NFS data corruption.

2012-03-28 Thread Paul Mezzanini

>Number: 166477
>Category:   misc
>Synopsis:   NFS data corruption.
>Confidential:   no
>Severity:   serious
>Priority:   medium
>Responsible:freebsd-bugs
>State:  open
>Quarter:
>Keywords:   
>Date-Required:
>Class:  sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Wed Mar 28 21:20:11 UTC 2012
>Closed-Date:
>Last-Modified:
>Originator: Paul Mezzanini
>Release:9.0-RELEASE
>Organization:
Rochester Institute of Technology
>Environment:
FreeBSD tardis.rc.rit.edu 9.0-RELEASE FreeBSD 9.0-RELEASE #0: Tue Jan  3 
07:46:30 UTC 2012 r...@farrell.cse.buffalo.edu:/usr/obj/usr/src/sys/GENERIC 
 amd64

>Description:
Environment:
NFS Client - clean FreeBSD 9 amd64 install
NFS Server - BlueArc Mercury 110 NAS

MTU 9000


Specifying default mount options will cause the data corruption to occur.  It 
is consistent on which files are corrupted.  Not all files become corrupt.  I 
have not found what triggers the error within a file.  File type (binary/text) 
does not seem to be a factor.  

I am still gathering data to try and isolate exactly where this error is being 
introduced.  
>How-To-Repeat:
copy a file from the bluearc to local disk via nfs.  "Copy" can be either cp, 
rsync or any other read method.  


>Fix:
Force mount to use oldnfs OR force rsize/wsize to 32768



>Release-Note:
>Audit-Trail:
>Unformatted:
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: kern/166382: [patch] snd_hda(4) is in a bad state after suspend/resume cycle

2012-03-28 Thread Brandon Gooch
On Sat, Mar 24, 2012 at 11:22 PM,   wrote:
> Synopsis: [patch] snd_hda(4) is in a bad state after suspend/resume cycle
>
> Responsible-Changed-From-To: freebsd-bugs->mav
> Responsible-Changed-By: eadler
> Responsible-Changed-When: Sun Mar 25 04:22:54 UTC 2012
> Responsible-Changed-Why:
> over to maintainer
>
> http://www.freebsd.org/cgi/query-pr.cgi?pr=166382

Hey mav, thanks for taking a look and providing a patch!
Unfortunately, it doesn't fix the suspend/resume issue  The headphone
jack sense polling doesn't work after resume unless the callback is
reinitialized.

Does it hurt to reinit the callback in the case of both polling and
non-polling configuartions?

-Brandon
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"