Re: kern/182661: [PANIC] 9.2-RELEASE vm_page_unwire: page n's wire count is zero

2013-10-08 Thread John Marshall
The following reply was made to PR kern/182661; it has been noted by GNATS.

From: John Marshall 
To: freebsd-gnats-sub...@freebsd.org
Cc:  
Subject: Re: kern/182661: [PANIC] 9.2-RELEASE vm_page_unwire: page n's wire
 count is zero
Date: Tue, 8 Oct 2013 18:47:36 +1100

 At the request of kib@ I tested with stable/9 and head and found the
 panic introduced in the following commits.
 
   stable/9  r244654
   head  r240285
 
 -- 
 John Marshall
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: bin/181532: [patch] route(8): 'route get' without destination gives misleading error message

2013-10-08 Thread glebius
Synopsis: [patch] route(8): 'route get' without destination gives misleading 
error message

Responsible-Changed-From-To: freebsd-bugs->glebius
Responsible-Changed-By: glebius
Responsible-Changed-When: Tue Oct 8 08:16:53 UTC 2013
Responsible-Changed-Why: 
Track it.

http://www.freebsd.org/cgi/query-pr.cgi?pr=181532
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: bin/181532: [patch] route(8): 'route get' without destination gives misleading error message

2013-10-08 Thread glebius
Synopsis: [patch] route(8): 'route get' without destination gives misleading 
error message

State-Changed-From-To: open->patched
State-Changed-By: glebius
State-Changed-When: Tue Oct 8 08:15:29 UTC 2013
State-Changed-Why: 
Fixed in head/.

http://www.freebsd.org/cgi/query-pr.cgi?pr=181532
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


kern/182828: [patch] [igb] Revision 247430 broke outgoing interface stats for stable/8

2013-10-08 Thread Eugene Grosbein

>Number: 182828
>Category:   kern
>Synopsis:   [patch] [igb] Revision 247430 broke outgoing interface stats 
>for stable/8
>Confidential:   no
>Severity:   non-critical
>Priority:   low
>Responsible:freebsd-bugs
>State:  open
>Quarter:
>Keywords:   
>Date-Required:
>Class:  sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Tue Oct 08 12:40:00 UTC 2013
>Closed-Date:
>Last-Modified:
>Originator: Eugene Grosbein
>Release:FreeBSD 8.4-STABLE amd64
>Organization:
RDTC JSC
>Environment:
System: FreeBSD eg.sd.rdtc.ru 8.4-STABLE FreeBSD 8.4-STABLE #3 r251830M: Mon 
Sep 30 18:01:03 NOVT 2013 
r...@eg.sd.rdtc.ru:/usr/local/obj/usr/local/src/sys/EG amd64

>Description:
There was r241037 commit by glebius@ to head fixing
"inaccurate overrated if_obytes accounting" in the HEAD:
http://svnweb.freebsd.org/base?view=revision&revision=241037

And there was _incomplete_ MFC to stable/8 r247430:
http://svnweb.freebsd.org/base?view=revision&revision=247430

r247430 contained some parts of r241037 but missed others vital
parts, so it introduced "inaccurate overrated if_obytes accounting"
to stable/8. For example, igb(4) now suffers from same problem.

>How-To-Repeat:
Run recent 8.4-STABLE with igb(4), make lots of outgoing traffic
and see that interface statistics is overrated.

>Fix:

Make mentioned MFC more complete. At least, merge
changes to sys/net/if_var.h to delete extra increase of if_obytes
and to sys/dev/oce/oce_if.c to fix last consumer
of drbr_stats_update() in stable/8:

--- sys/net/if_var.h2012/09/28 17:36:00 241036
+++ sys/net/if_var.h2012/09/28 18:28:27 241037
@@ -590,22 +590,10 @@
 } while (0)
 
 #ifdef _KERNEL
-static __inline void
-drbr_stats_update(struct ifnet *ifp, int len, int mflags)
-{
-#ifndef NO_SLOW_STATS
-   ifp->if_obytes += len;
-   if (mflags & M_MCAST)
-   ifp->if_omcasts++;
-#endif
-}
-
 static __inline int
 drbr_enqueue(struct ifnet *ifp, struct buf_ring *br, struct mbuf *m)
 {  
int error = 0;
-   int len = m->m_pkthdr.len;
-   int mflags = m->m_flags;
 
 #ifdef ALTQ
if (ALTQ_IS_ENABLED(&ifp->if_snd)) {
@@ -613,12 +601,10 @@
return (error);
}
 #endif
-   if ((error = buf_ring_enqueue_bytes(br, m, len)) == ENOBUFS) {
-   br->br_drops++;
+   error = buf_ring_enqueue(br, m);
+   if (error)
m_freem(m);
-   } else
-   drbr_stats_update(ifp, len, mflags);
-   
+
return (error);
 }
 
--- sys/dev/oce/oce_if.c2012/09/28 17:36:00 241036
+++ sys/dev/oce/oce_if.c2012/09/28 18:28:27 241037
@@ -1183,7 +1183,9 @@
}  
break;
}
-   drbr_stats_update(ifp, next->m_pkthdr.len, next->m_flags);
+   ifp->if_obytes += next->m_pkthdr.len;
+   if (next->m_flags & M_MCAST)
+   ifp->if_omcasts++;
ETHER_BPF_MTAP(ifp, next);
next = drbr_dequeue(ifp, br);
}

Eugene Grosbein
>Release-Note:
>Audit-Trail:
>Unformatted:
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


misc/182836: [PATCH] net/freeradius2: always build against ports openssl

2013-10-08 Thread Mark Felder

>Number: 182836
>Category:   misc
>Synopsis:   [PATCH] net/freeradius2: always build against ports openssl
>Confidential:   no
>Severity:   non-critical
>Priority:   low
>Responsible:freebsd-bugs
>State:  open
>Quarter:
>Keywords:   
>Date-Required:
>Class:  sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Tue Oct 08 17:40:00 UTC 2013
>Closed-Date:
>Last-Modified:
>Originator: Mark Felder
>Release:
>Organization:
>Environment:
>Description:
radiusd is extremely sensitive to libssl changes. For example, my server is 
running FreeBSD 9.1-p7 and when you try to use the package on the 
pkg-test.freebsd.org repository it does not work

libssl version mismatch.  Built with: 90818f   Linked: 90819f

So as it turns out my libssl version is slightly newer than the 9.1-RELEASE on 
the package repository which breaks this package. We should just build against 
the one in ports so we always have a working net/freeradius2 package.
>How-To-Repeat:

>Fix:


Patch attached with submission follows:

Index: Makefile
===
--- Makefile(revision 329094)
+++ Makefile(working copy)
@@ -3,6 +3,7 @@
 
 PORTNAME=  freeradius
 DISTVERSION=   2.2.1
+PORTREVISION=  1
 CATEGORIES=net
 MASTER_SITES=  ftp://ftp.freeradius.org/pub/freeradius/%SUBDIR%/ \
ftp://ftp.ntua.gr/pub/net/radius/freeradius/%SUBDIR%/ \
@@ -32,6 +33,7 @@
 USE_AUTOTOOLS= libltdl libtool autoconf
 USE_BZIP2= yes
 USE_OPENSSL=   yes
+WITH_OPENSSL_PORT=yes
 MAKE_ARGS+=LDFLAGS="-L${LOCALBASE}/lib ${PTHREAD_LIBS}"
 CFLAGS+=   -I${LOCALBASE}/include -L${LOCALBASE}/lib
 MAKE_JOBS_UNSAFE=  yes


>Release-Note:
>Audit-Trail:
>Unformatted:
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: kern/182557: Frequent reboots due to kernel trap happening in pf_test_rule

2013-10-08 Thread Berend de Boer
The following reply was made to PR kern/182557; it has been noted by GNATS.

From: Berend de Boer 
To: bug-follo...@freebsd.org, ber...@pobox.com
Cc:  
Subject: Re: kern/182557: Frequent reboots due to kernel trap happening in
 pf_test_rule
Date: Wed, 09 Oct 2013 11:43:40 +1300

 This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
 --m8PnxkPi4fANfrXgfiwC2bHbC45iND1mD
 Content-Type: text/plain; charset=ISO-8859-1
 Content-Transfer-Encoding: quoted-printable
 
 Happens on 10-ALPHA5 as well:
 
 Oct  9 08:29:08 bmach kernel: Kernel page fault with the following
 non-sleepable locks held:
 Oct  9 08:29:08 bmach kernel: shared rw pf rulesets (pf rulesets) r =3D 0=
 
 (0x81d03ae8) locked @
 /usr/src/head/sys/modules/pf/../../netpfil/pf/pf.c:5660
 Oct  9 08:29:08 bmach kernel: shared rm PFil shared rmlock (PFil shared
 rmlock) r =3D 0 (0x8170cd00) locked @ /usr/src/head/sys/net/pfil.=
 c:77
 Oct  9 08:29:08 bmach kernel: shared rw udpinp (udpinp) r =3D 0
 (0xf80017affda8) locked @ /usr/src/head/sys/netinet/udp_usrreq.c:981
 Oct  9 08:29:08 bmach kernel: KDB: stack backtrace:
 Oct  9 08:29:08 bmach kernel: db_trace_self_wrapper() at
 db_trace_self_wrapper+0x2b/frame 0xfe011e9acb30
 Oct  9 08:29:08 bmach kernel: kdb_backtrace() at
 kdb_backtrace+0x39/frame 0xfe011e9acbe0
 Oct  9 08:29:08 bmach kernel: witness_warn() at witness_warn+0x4a8/frame
 0xfe011e9acca0
 Oct  9 08:29:08 bmach kernel: trap_pfault() at trap_pfault+0x5a/frame
 0xfe011e9acd40
 Oct  9 08:29:08 bmach kernel: trap() at trap+0x670/frame 0xfe011e9acf=
 60
 Oct  9 08:29:08 bmach kernel: calltrap() at calltrap+0x8/frame
 0xfe011e9acf60
 Oct  9 08:29:08 bmach kernel: --- trap 0xc, rip =3D 0x81ce1f6e,
 rsp =3D 0xfe011e9ad020, rbp =3D 0xfe011e9ad4f0 ---
 Oct  9 08:29:08 bmach kernel: pf_test_rule() at
 pf_test_rule+0x248e/frame 0xfe011e9ad4f0
 Oct  9 08:29:08 bmach kernel: pf_test() at pf_test+0x9c8/frame
 0xfe011e9ad690
 Oct  9 08:29:08 bmach kernel: pf_check_out() at pf_check_out+0x3c/frame
 0xfe011e9ad6c0
 Oct  9 08:29:08 bmach kernel: pfil_run_hooks() at
 pfil_run_hooks+0x93/frame 0xfe011e9ad750
 Oct  9 08:29:08 bmach kernel: ip_output() at ip_output+0x8c8/frame
 0xfe011e9ad840
 Oct  9 08:29:08 bmach kernel: udp_send() at udp_send+0x866/frame
 0xfe011e9ad900
 Oct  9 08:29:08 bmach kernel: sosend_dgram() at sosend_dgram+0x36b/frame
 0xfe011e9ad980
 Oct  9 08:29:08 bmach kernel: kern_sendit() at kern_sendit+0x207/frame
 0xfe011e9ada30
 Oct  9 08:29:08 bmach kernel: sendit() at sendit+0x116/frame
 0xfe011e9ada80
 Oct  9 08:29:08 bmach kernel: sys_sendmsg() at sys_sendmsg+0x61/frame
 0xfe011e9adae0
 Oct  9 08:29:08 bmach kernel: amd64_syscall() at
 amd64_syscall+0x265/frame 0xfe011e9adbf0
 Oct  9 08:29:08 bmach kernel: Xfast_syscall() at
 Xfast_syscall+0xfb/frame 0xfe011e9adbf0
 Oct  9 08:29:08 bmach kernel: --- syscall (28, FreeBSD ELF64,
 sys_sendmsg), rip =3D 0x80131769a, rsp =3D 0x7fbfd178, rbp =3D
 0x7fbfd1a0 ---
 Oct  9 08:29:08 bmach kernel:
 Oct  9 08:29:08 bmach kernel:
 Oct  9 08:29:08 bmach kernel: Fatal trap 12: page fault while in kernel m=
 ode
 Oct  9 08:29:08 bmach kernel: cpuid =3D 1; apic id =3D 01
 Oct  9 08:29:08 bmach kernel: fault virtual address=3D 0x10
 Oct  9 08:29:08 bmach kernel: fault code   =3D supervisor read 
data, page
 not present
 Oct  9 08:29:08 bmach kernel: instruction pointer  =3D 0x20:0x81ce=
 1f6e
 Oct  9 08:29:08 bmach kernel: stack pointer=3D
 0x28:0xfe011e9ad020
 Oct  9 08:29:08 bmach kernel: frame pointer=3D
 0x28:0xfe011e9ad4f0
 Oct  9 08:29:11 bmach kernel: code segment =3D base 0x0, limit 
0xf,
 type 0x1b
 Oct  9 08:29:11 bmach kernel: =3D DPL 0, pres 1, long 1, def32 0, gran 1
 Oct  9 08:29:11 bmach kernel: processor eflags =3D interrupt enabled,
 resume, IOPL =3D 0
 Oct  9 08:29:11 bmach kernel: current process  =3D 1082 (named)
 
 
 --m8PnxkPi4fANfrXgfiwC2bHbC45iND1mD
 Content-Type: application/pgp-signature; name="signature.asc"
 Content-Description: OpenPGP digital signature
 Content-Disposition: attachment; filename="signature.asc"
 
 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.4.11 (GNU/Linux)
 Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
 
 iQIcBAEBCAAGBQJSVIqcAAoJEKOfeD48G3g5Sc4QALf3p0PkP0MW9Ffmk903TqEB
 V1H/9mffN2jvvg/4Gs7svQnawbXJsG7sMvTKG4+rxYMiWZC4L1cp0AIWwR0A6BHc
 DfSWmLA1OzvmeMN6r1jcUacDpZW59rfRjkuMiwHIf8SmzDS4Pk7RTU1X6h4TWjOY
 7TTx3agIVZk1quHxw5nXUJE/5bIfcPs9YgxSaG53pCM3R593m37iV4828RurQiZm
 XBgiX2ktwABpyp1ja2YkI5XuOIZLM3xUAsdOMVV+RmIn2P1Q2Ctify99xAGWG83a
 3L44uvgkRLDTstKpKReJiPxln4isphbjYJiXVUjovpORlGRnWYi7Taafv+ZXlVAQ
 Q7EAerCboTyfuxyMeDLc7ehpkH8kWerxTJ49DtFRAyJjy3pIdvFT8OCuMdlmO9kJ
 PQpfhXm0TcH4C+18UqSIgYL/9T3RkvT/yPy1BCpD8gIvPQX7lcmg+RdvFNAdm4Wn
 fe7BCnK/IpEqlO/kqY4hFuZ9V24ugpX0I2keFZBTwybn7MP5tNxa9FZkTPF6aKHV
 Z2gev74wAfqylcQPedZUwg0hTM6f3DXZvbmeI+hbGzovC1nhFMRB0

kern/182842: lock order reversal

2013-10-08 Thread Berend de Boer

>Number: 182842
>Category:   kern
>Synopsis:   lock order reversal
>Confidential:   no
>Severity:   non-critical
>Priority:   low
>Responsible:freebsd-bugs
>State:  open
>Quarter:
>Keywords:   
>Date-Required:
>Class:  sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Tue Oct 08 22:50:01 UTC 2013
>Closed-Date:
>Last-Modified:
>Originator: Berend de Boer
>Release:FreeBSD 10.0-ALPHA5 (latest svn)
>Organization:
Xplain Hosting
>Environment:
FreeBSD bmach.nederware.nl 10.0-ALPHA5 FreeBSD 10.0-ALPHA5 #0 r256132: Wed Oct  
9 07:55:11 NZDT 2013 
r...@bmach.nederware.nl:/usr/obj/usr/src/head/sys/BMACH  amd64

>Description:
Oct  9 11:35:00 bmach kernel: lock order reversal:
Oct  9 11:35:00 bmach kernel: 1st 0xfe00f2c25f90 bufwait (bufwait) @ 
/usr/src/head/sys/kern/vfs_bio.c:3049
Oct  9 11:35:00 bmach kernel: 2nd 0xf80120adb530 snaplk (snaplk) @ 
/usr/src/head/sys/ufs/ffs/ffs_snapshot.c:2297
Oct  9 11:35:00 bmach kernel: KDB: stack backtrace:
Oct  9 11:35:00 bmach kernel: db_trace_self_wrapper() at 
db_trace_self_wrapper+0x2b/frame 0xfe011e5e85d0
Oct  9 11:35:00 bmach kernel: kdb_backtrace() at kdb_backtrace+0x39/frame 
0xfe011e5e8680
Oct  9 11:35:00 bmach kernel: witness_checkorder() at 
witness_checkorder+0xd23/frame 0xfe011e5e8710
Oct  9 11:35:00 bmach kernel: __lockmgr_args() at __lockmgr_args+0x86c/frame 
0xfe011e5e8840
Oct  9 11:35:00 bmach kernel: ffs_copyonwrite() at ffs_copyonwrite+0x17a/frame 
0xfe011e5e88f0
Oct  9 11:35:00 bmach kernel: ffs_geom_strategy() at 
ffs_geom_strategy+0xdd/frame 0xfe011e5e8920
Oct  9 11:35:00 bmach kernel: bufwrite() at bufwrite+0x170/frame 
0xfe011e5e8970
Oct  9 11:35:00 bmach kernel: ffs_sbupdate() at ffs_sbupdate+0x1c8/frame 
0xfe011e5e89e0
Oct  9 11:35:00 bmach kernel: ffs_sync() at ffs_sync+0x526/frame 
0xfe011e5e8ab0
Oct  9 11:35:00 bmach kernel: sync_fsync() at sync_fsync+0x129/frame 
0xfe011e5e8ae0
Oct  9 11:35:00 bmach kernel: VOP_FSYNC_APV() at VOP_FSYNC_APV+0xf0/frame 
0xfe011e5e8b10
Oct  9 11:35:00 bmach kernel: sched_sync() at sched_sync+0x34c/frame 
0xfe011e5e8bb0
Oct  9 11:35:00 bmach kernel: fork_exit() at fork_exit+0x84/frame 
0xfe011e5e8bf0
Oct  9 11:35:00 bmach kernel: fork_trampoline() at fork_trampoline+0xe/frame 
0xfe011e5e8bf0
Oct  9 11:35:00 bmach kernel: --- trap 0, rip = 0, rsp = 0xfe011e5e8cb0, 
rbp = 0 ---

>How-To-Repeat:
Happens after reboot.
>Fix:


>Release-Note:
>Audit-Trail:
>Unformatted:
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: ports/182836: [PATCH] net/freeradius2: always build against ports openssl

2013-10-08 Thread linimon
Synopsis: [PATCH] net/freeradius2: always build against ports openssl

Responsible-Changed-From-To: freebsd-bugs->freebsd-ports-bugs
Responsible-Changed-By: linimon
Responsible-Changed-When: Wed Oct 9 01:25:42 UTC 2013
Responsible-Changed-Why: 
ports PR.

http://www.freebsd.org/cgi/query-pr.cgi?pr=182836
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


kern/182847: Remove dead code

2013-10-08 Thread Sven-Thorsten Dietrich

>Number: 182847
>Category:   kern
>Synopsis:   Remove dead code
>Confidential:   no
>Severity:   non-critical
>Priority:   low
>Responsible:freebsd-bugs
>State:  open
>Quarter:
>Keywords:   
>Date-Required:
>Class:  sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Wed Oct 09 03:10:00 UTC 2013
>Closed-Date:
>Last-Modified:
>Originator: Sven-Thorsten Dietrich
>Release:HEAD
>Organization:
Vyatta
>Environment:
N/A
>Description:
Remove #if 0 dead code
>How-To-Repeat:

>Fix:
Apply patch.

Is there a better way to submit patches - this is really tedious through this 
web interface,

Patch attached with submission follows:

Signed-off-by: Sven-Thorsten Dietrich 
Index: netinet6/ip6_mroute.h
===
--- netinet6/ip6_mroute.h   (revision 256126)
+++ netinet6/ip6_mroute.h   (working copy)
@@ -145,11 +145,6 @@
 struct omrt6msg {
u_long  unused1;
u_char  im6_msgtype;/* what type of message */
-#if 0
-#define MRT6MSG_NOCACHE1
-#define MRT6MSG_WRONGMIF   2
-#define MRT6MSG_WHOLEPKT   3   /* used for user level encap*/
-#endif
u_char  im6_mbz;/* must be zero */
u_char  im6_mif;/* mif rec'd on */
u_char  unused2;


>Release-Note:
>Audit-Trail:
>Unformatted:
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: kern/182847: [netinet6] [patch] Remove dead code

2013-10-08 Thread linimon
Old Synopsis: Remove dead code
New Synopsis: [netinet6] [patch] Remove dead code

Responsible-Changed-From-To: freebsd-bugs->freebsd-net
Responsible-Changed-By: linimon
Responsible-Changed-When: Wed Oct 9 03:34:41 UTC 2013
Responsible-Changed-Why: 
Over to maintainer(s).

http://www.freebsd.org/cgi/query-pr.cgi?pr=182847
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"