Re: kern/187414: ZFS Write Deadlock

2014-03-18 Thread Gordon Yeu
The following reply was made to PR kern/187414; it has been noted by GNATS.

From: Gordon Yeu 
To: bug-follo...@freebsd.org, k...@kmd.twbbs.org
Cc:  
Subject: Re: kern/187414: ZFS Write Deadlock
Date: Tue, 18 Mar 2014 17:11:51 +0800

 --001a1135ed9639bcbf04f4ddeddd
 Content-Type: text/plain; charset=ISO-8859-1
 
 Clean install FreeBSD 10.0-STABLE r263205, everything works fine. Time to
 say goodbye to 8.4-STABLE.
 
 uname -a
 FreeBSD kmd.twbbs.org 10.0-STABLE FreeBSD 10.0-STABLE #0 r263205: Sat Mar
 15 23:38:52 CST 2014 r...@kmd.twbbs.org:/usr/obj/usr/src/sys/MERCURY
  amd64
 
 --001a1135ed9639bcbf04f4ddeddd
 Content-Type: text/html; charset=ISO-8859-1
 Content-Transfer-Encoding: quoted-printable
 
 Clean install FreeBSD 10.0-STABLE r263205, everything=
  works fine. Time to say goodbye to 8.4-STABLE.un=
 ame -aFreeBSD http://kmd.twbbs.org";>kmd.twbbs.org=
  10.0-STABLE FreeBSD 10.0-STABLE #0 r263205: Sat Mar 15 23:38:52 CST 2014 =
 =A0 =A0 r...@kmd.twbbs.org:/usr/obj/usr/src/sys/MERCURY =A0amd64
 
 
 --001a1135ed9639bcbf04f4ddeddd--
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: kern/187654: Panic on system resume (swi4: clock)

2014-03-18 Thread Robert David
The following reply was made to PR kern/187654; it has been noted by GNATS.

From: Robert David 
To: bug-follo...@freebsd.org
Cc:  
Subject: Re: kern/187654: Panic on system resume  (swi4: clock)
Date: Tue, 18 Mar 2014 11:36:02 +0100

 The git revisions are wrong:
 
 I got the same also on:  a887dd1976ef3a88756e362b7933a80b0dccc608 
 
 So the realy correct revision where it works is:
 
 9f9257101a73a807f44a8b46452822dbab7305b0
 
 This is revision when it worked for me (I got zfs snapshot for that
 revision and used that before).
 
 So maybe the borders are:
 9f9257101a73a807f44a8b46452822dbab7305b0
 a887dd1976ef3a88756e362b7933a80b0dccc608
 
 unfortunately the difference between them are aprox one month.
 
 Robert.
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


conf/187696: After upgrade 9.1->9.2 boot deadlock if ipv4_addrs_IF contains invalid values

2014-03-18 Thread Ildar Hizbulin

>Number: 187696
>Category:   conf
>Synopsis:   After upgrade 9.1->9.2 boot deadlock if ipv4_addrs_IF contains 
>invalid values
>Confidential:   no
>Severity:   non-critical
>Priority:   low
>Responsible:freebsd-bugs
>State:  open
>Quarter:
>Keywords:   
>Date-Required:
>Class:  sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Tue Mar 18 12:00:00 UTC 2014
>Closed-Date:
>Last-Modified:
>Originator: Ildar Hizbulin
>Release:9.2-RELEASE-p3
>Organization:
Ariadna-Link, JSC
>Environment:
FreeBSD vpn2.vyborg.ru 9.2-RELEASE-p3 FreeBSD 9.2-RELEASE-p3 #3 r262241: Thu 
Feb 20 22:41:39 MSK 2014 r...@vpn2.vyborg.ru:/usr/obj/usr/src/sys/VPN2  
amd64
>Description:
After upgrade FreeBSD from 9.1->9.2 deadlocking boot if ipv4_addrs_IF contains 
invalid values like "-txcsum"

ifalias_af_common_handler function goes into an infinite loop on "-txcsum" value
>How-To-Repeat:
Add to rc.conf 

ipv4_addrs_em0="192.168.0.1/24 192.168.1.1/24 -txcsum"

replace em0 existing interface name
>Fix:


>Release-Note:
>Audit-Trail:
>Unformatted:
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: conf/187696: After upgrade 9.1->9.2 boot deadlock if ipv4_addrs_IF contains invalid values

2014-03-18 Thread gjb
Synopsis: After upgrade 9.1->9.2 boot deadlock if ipv4_addrs_IF contains 
invalid values

Responsible-Changed-From-To: freebsd-bugs->freebsd-rc
Responsible-Changed-By: gjb
Responsible-Changed-When: Tue Mar 18 12:08:08 UTC 2014
Responsible-Changed-Why: 
Assign


http://www.freebsd.org/cgi/query-pr.cgi?pr=187696
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


bin/187699: Nondefault FIBs don't get loopback addresses

2014-03-18 Thread Alan Somers

>Number: 187699
>Category:   bin
>Synopsis:   Nondefault FIBs don't get  loopback addresses
>Confidential:   no
>Severity:   non-critical
>Priority:   low
>Responsible:freebsd-bugs
>State:  open
>Quarter:
>Keywords:   
>Date-Required:
>Class:  sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Tue Mar 18 15:50:00 UTC 2014
>Closed-Date:
>Last-Modified:
>Originator: Alan Somers
>Release:11.0 CURRENT
>Organization:
Spectra Logic
>Environment:
FreeBSD alans-fbsd-head 11.0-CURRENT FreeBSD 11.0-CURRENT #40 r263266: Mon Mar 
17 13:07:35 MDT 2014 
al...@ns1.eng.sldomain.com:/vmpool/obj/usr/home/alans/freebsd/head/sys/GENERIC  
amd64
>Description:
"ping 127.0.0.1" and "ping6 ::1" should always work, regardless of which FIB is 
in use.  However, they don't.  ipv4_up() in network.subr ensures adds the 
127.0.0.1 address to lo0 in the default fib, which causes the kernel to add it 
to the default fib's routing table.  But nothing adds that address to alternate 
fibs.  Nor does anything add ::1 to the inet6 routing tables for alternate FIBs.

IMHO, the best way to solve this bug would be to add 127.0.0.1 and ::1 static 
routes in /etc/rc.d/routing in the functions static_inet() and static_inet6().
>How-To-Repeat:
In /boot/loader.conf.local:
net.fibs="4"
net.add_addr_allfibs="0"

setfib 1 ping localhost# This will fail, but it should succeed
setfib 1 ping6 ::1 # This will fail, but it should succeed.
>Fix:
Working on a patch now ...

>Release-Note:
>Audit-Trail:
>Unformatted:
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: bin/187699: Nondefault FIBs don't get loopback addresses

2014-03-18 Thread asomers
Synopsis: Nondefault FIBs don't get  loopback addresses

Responsible-Changed-From-To: freebsd-bugs->asomers
Responsible-Changed-By: asomers
Responsible-Changed-When: Tue Mar 18 16:08:15 UTC 2014
Responsible-Changed-Why: 
I'll take it

http://www.freebsd.org/cgi/query-pr.cgi?pr=187699
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


misc/187700: FreeBSD Guest in Virtual Box NAT environment - PCnet-FAST III(Am79C973) and Intel PRO/1000 MT Server (82545EM) cards - not receiving IP address

2014-03-18 Thread Sastry Tumuluri

>Number: 187700
>Category:   misc
>Synopsis:   FreeBSD Guest in Virtual Box NAT environment - PCnet-FAST 
>III(Am79C973) and Intel PRO/1000 MT Server (82545EM) cards - not receiving IP 
>address
>Confidential:   no
>Severity:   non-critical
>Priority:   low
>Responsible:freebsd-bugs
>State:  open
>Quarter:
>Keywords:   
>Date-Required:
>Class:  sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Tue Mar 18 16:30:00 UTC 2014
>Closed-Date:
>Last-Modified:
>Originator: Sastry Tumuluri
>Release:10.0-RELEASE (amd64), 9.2-RELEASE (amd64)
>Organization:
Government of Haryana
>Environment:
FreeBSD 10.0-RELEASE #0 r260789: Thu Jan 16 22:34:59 UTC 2014 
r...@snap.freebsd.org:/usr/obj/usr/src/sys/GENERIC amd64
>Description:
I'm trying to use FreeBSD 10.0-RELEASE (amd64) on VirtualBox (3.2.x and 3.3.8) 
with the network setting (on VirtualBox) in NAT mode.

When I choose either of these adapters in VirtualBox 
Settings->network->NAT->Advanced:
-- PCnet-FAST III(Am79C973) 
-- Intel PRO/1000 MT Server (82545EM)
Upon boot, there is no IP address and the VM can't reach out to the internet. 

I tried assigning the IP address manually, but still can't reach out (ping 
can't reach the VirtualBox-internal default gateway: 10.0.2.2)

Boot time messages show 6x DHCPDISCOVER but no DHCPOFFER response.
Manually invoking dhclient shows the same symptom (6x DHCPDISCOVER, no 
DHCPOFFER).

The following adapters seem to work (obtain the IP address 10.0.2.15 from 
VirtualBox and get out to the Internet) just fine:
-- Intel PRO/1000 MT Desktop (82540EM) -- default
-- Intel PRO/1000 T Server (82543GC)
-- PCnet-PCI II(Am79C970A)

All the five adapters work fine on other guest OSes (e.g., xubuntu Linux).

Other info: 
1. All this, on Acer Travelmate 8372 running Xubuntu 13.10 (all updates and 
patches are current) as Host OS. I haven't tried this on any other system (will 
do if someone feels it may be relevant).

2. The problem exists in 9.2-RELEASE (amd64) as well.


>How-To-Repeat:

>Fix:


>Release-Note:
>Audit-Trail:
>Unformatted:
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: kern/187575: r263140 breaks installworld: if_ef.4/ef.4 is missing

2014-03-18 Thread glebius
Synopsis: r263140 breaks installworld: if_ef.4/ef.4 is missing

State-Changed-From-To: open->closed
State-Changed-By: glebius
State-Changed-When: Tue Mar 18 16:58:58 UTC 2014
State-Changed-Why: 
Already fixed.


Responsible-Changed-From-To: freebsd-bugs->glebius
Responsible-Changed-By: glebius
Responsible-Changed-When: Tue Mar 18 16:58:58 UTC 2014
Responsible-Changed-Why: 
Already fixed.

http://www.freebsd.org/cgi/query-pr.cgi?pr=187575
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: kern/187566: incomming ng_l2tp/ipsec packet bypass PF firewall

2014-03-18 Thread glebius
Synopsis: incomming ng_l2tp/ipsec packet bypass PF firewall

State-Changed-From-To: open->feedback
State-Changed-By: glebius
State-Changed-When: Tue Mar 18 17:03:27 UTC 2014
State-Changed-Why: 
Submitter was asked for feedback.

http://www.freebsd.org/cgi/query-pr.cgi?pr=187566
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: kern/187566: incomming ng_l2tp/ipsec packet bypass PF firewall

2014-03-18 Thread Gleb Smirnoff
The following reply was made to PR kern/187566; it has been noted by GNATS.

From: Gleb Smirnoff 
To: HASHI Hiroaki 
Cc: freebsd-gnats-sub...@freebsd.org
Subject: Re: kern/187566: incomming ng_l2tp/ipsec packet bypass PF firewall
Date: Tue, 18 Mar 2014 21:03:18 +0400

   Hiroaki-san,
 
 On Fri, Mar 14, 2014 at 04:05:37PM +0900, HASHI Hiroaki wrote:
 H> >Environment:
 H> System: FreeBSD tomba.meridiani.jp 10.0-STABLE FreeBSD 10.0-STABLE #3 
r262965: Thu Mar 13 18:44:26 JST 2014 
has...@stenmark.meridiani.jp:/usr/obj/usr/src/sys/TOMBA amd64
 H> 
 H> ng_l2tp: net/mpd5
 H> ipsec:   security/ipsec-tools
 H> 
 H> >Description:
 H> incoming packet on ng_l2tp interface bypass PF firewall rules.
 H> not nat, no filter.
 
 Can you please check whether the issue is fixed or not by r263307
 commit to stable/10?
 
 -- 
 Totus tuus, Glebius.
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: kern/173516: [cxgbe] Doesn't detect link-up after driver is first loaded

2014-03-18 Thread np
Synopsis: [cxgbe] Doesn't detect link-up after driver is first loaded

State-Changed-From-To: open->closed
State-Changed-By: np
State-Changed-When: Tue Mar 18 18:39:37 UTC 2014
State-Changed-Why: 
This is as designed.  The driver powers up the PHY only when the link
is administratively up.  So you do need an ifconfig up in order for
link state to be reported accurately.

http://www.freebsd.org/cgi/query-pr.cgi?pr=173516
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


misc/187709: version update

2014-03-18 Thread Vasiliy P. Melnik

>Number: 187709
>Category:   misc
>Synopsis:   version update
>Confidential:   no
>Severity:   non-critical
>Priority:   low
>Responsible:freebsd-bugs
>State:  open
>Quarter:
>Keywords:   
>Date-Required:
>Class:  sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Tue Mar 18 20:30:02 UTC 2014
>Closed-Date:
>Last-Modified:
>Originator: Vasiliy P. Melnik
>Release:10.0-RELEASE
>Organization:
>Environment:
FreeBSD fr10 10.0-RELEASE FreeBSD 10.0-RELEASE #0 r260789: Thu Jan 16 22:34:59 
UTC 2014 r...@snap.freebsd.org:/usr/obj/usr/src/sys/GENERIC  amd64

>Description:
This release allows to set fields on tab Personal to read-only. NIS mail 
aliases can managed on user tab and there is a new option if referrals should 
be followed. The Pro version supports Oracle databases and organizational 
roles. The self service now includes a language selection and password reset 
supports alternate email addresses.
>How-To-Repeat:

>Fix:
diff -ruN /usr/ports/sysutils/ldap-account-manager/Makefile 
/root/ldap-account-manager/Makefile
--- /usr/ports/sysutils/ldap-account-manager/Makefile   2014-02-21 
15:39:38.0 +0200
+++ /root/ldap-account-manager/Makefile 2014-03-18 22:13:46.116069310 +0200
@@ -1,7 +1,7 @@
 # $FreeBSD: head/sysutils/ldap-account-manager/Makefile 345435 2014-02-21 
13:39:38Z ehaupt $
 
 PORTNAME=  ldap-account-manager
-PORTVERSION=   4.4
+PORTVERSION=   4.5
 PORTREVISION=  1
 CATEGORIES=sysutils www
 MASTER_SITES=  SF/${SHORTNAME}/LAM/${PORTVERSION}
diff -ruN /usr/ports/sysutils/ldap-account-manager/distinfo 
/root/ldap-account-manager/distinfo
--- /usr/ports/sysutils/ldap-account-manager/distinfo   2014-01-11 
18:55:30.0 +0200
+++ /root/ldap-account-manager/distinfo 2014-03-18 22:14:02.114062838 +0200
@@ -1,2 +1,2 @@
-SHA256 (ldap-account-manager-4.4.tar.bz2) = 
990b963a98a7a6ee1e15072010b7da3a11535e205c4c5c6724676dc2deb44789
-SIZE (ldap-account-manager-4.4.tar.bz2) = 13557991
+SHA256 (ldap-account-manager-4.5.tar.bz2) = 
7652475905fdfb27b40feaa6c0dc39dc78caa6465e1654539799f5c40ae8f714
+SIZE (ldap-account-manager-4.5.tar.bz2) = 11729338


>Release-Note:
>Audit-Trail:
>Unformatted:
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: kern/187654: Panic on system resume (swi4: clock)

2014-03-18 Thread Ivan Klymenko
The following reply was made to PR kern/187654; it has been noted by GNATS.

From: Ivan Klymenko 
To: bug-follo...@freebsd.org, robert.david.pub...@gmail.com
Cc:  
Subject: Re: kern/187654: Panic on system resume  (swi4: clock)
Date: Tue, 18 Mar 2014 22:26:34 +0200

 In mailing list with the subject "Clock issues and crash on resume on
 10-Stable r263062M" there method to avoid panic:
 
 "This is actually a crash in newcons.  Try setting
 kern.vt.suspendswitch to 0 as a workaround."
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


kern/187712: config(8) does not respect KERNCONFDIR

2014-03-18 Thread Alan Somers

>Number: 187712
>Category:   kern
>Synopsis:   config(8) does not respect KERNCONFDIR
>Confidential:   no
>Severity:   non-critical
>Priority:   low
>Responsible:freebsd-bugs
>State:  open
>Quarter:
>Keywords:   
>Date-Required:
>Class:  sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Tue Mar 18 22:20:00 UTC 2014
>Closed-Date:
>Last-Modified:
>Originator: Alan Somers
>Release:11.0 CURRENT
>Organization:
Spectra Logic
>Environment:
FreeBSD alans-fbsd-head 11.0-CURRENT FreeBSD 11.0-CURRENT #40 r263266: Mon Mar 
17 13:07:35 MDT 2014 
al...@ns1.eng.sldomain.com:/vmpool/obj/usr/home/alans/freebsd/head/sys/GENERIC  
amd64
>Description:
When doing a buildkernel, you can set the make variable KERNCONFDIR if the 
kernel config file is in a location other than sys/${ARCH}/conf.  However, if 
your kernel config file uses the "include" statement to include another config 
file, config(8) will not search in KERNCONFDIR to find the included file.  My 
patch makes config(8) aware of KERNCONFDIR when processing the "include" 
statement, and causes make to set KERNCONFDIR when invoking config(8).

This bug is the more general case of ports/164242.
>How-To-Repeat:
# cd /usr/src
# cp sys/amd64/conf/GENERIC  /tmp/GENERIC_dup
# echo "include GENERIC_dup" > /tmp/GENERIC2
# make KERNCONFDIR="/tmp" KERNCONF=GENERIC2 buildkernel
--
>Fix:
Apply attached patch

Patch attached with submission follows:

Index: Makefile.inc1
===
--- Makefile.inc1   (revision 263266)
+++ Makefile.inc1   (working copy)
@@ -1013,7 +1013,7 @@
@echo ">>> stage 1: configuring the kernel"
@echo "--"
cd ${KRNLCONFDIR}; \
-   PATH=${TMPPATH} \
+   PATH=${TMPPATH} KERNCONFDIR=${KERNCONFDIR} \
config ${CONFIGARGS} -d ${KRNLOBJDIR}/${_kernel} \
${KERNCONFDIR}/${_kernel}
 .endif
Index: usr.sbin/config/lang.l
===
--- usr.sbin/config/lang.l  (revision 263266)
+++ usr.sbin/config/lang.l  (working copy)
@@ -34,6 +34,7 @@
 #include 
 #include 
 #include 
+#include 
 #include 
 #include "y.tab.h"
 #include "config.h"
@@ -258,6 +259,7 @@
FILE *fp;
struct incl *in;
char *fnamebuf;
+   char *kernconfdir;
 
fnamebuf = NULL;
fp = fopen(fname, "r");
@@ -269,6 +271,16 @@
}
}
if (fp == NULL) {
+   kernconfdir = getenv("KERNCONFDIR");
+   if (kernconfdir != NULL) {
+   asprintf(&fnamebuf, "%s/%s", kernconfdir, fname);
+   if (fnamebuf != NULL) {
+   fp = fopen(fnamebuf, "r");
+   free(fnamebuf);
+   }
+   }
+   }
+   if (fp == NULL) {
yyerror("cannot open included file");
return (-1);
}


>Release-Note:
>Audit-Trail:
>Unformatted:
 >>> Kernel build for GENERIC2 started on Tue Mar 18 12:13:27 MDT 2014
 --
 ===> GENERIC2
 mkdir -p /vmpool/obj/usr/home/alans/freebsd/head/sys
 
 --
 >>> stage 1: configuring the kernel
 --
 cd /usr/home/alans/freebsd/head/sys/amd64/conf;  
PATH=/vmpool/obj/usr/home/alans/freebsd/head/tmp/legacy/usr/sbin:/vmpool/obj/usr/home/alans/freebsd/head/tmp/legacy/usr/bin:/vmpool/obj/usr/home/alans/freebsd/head/tmp/legacy/usr/games:/vmpool/obj/usr/home
 
/alans/freebsd/head/tmp/legacy/bin:/vmpool/obj/usr/home/alans/freebsd/head/tmp/usr/sbin:/vmpool/obj/usr/home/alans/freebsd/head/tmp/usr/bin:/vmpool/obj/usr/home/alans/freebsd/head/tmp/usr/games:/sbin:/bin:/usr/sbin:/usr/bin
  config  -d /vmpool/obj/usr/ho me/alans/freebsd/head/sys/GENERIC2  
/tmp/GENERIC2
 config: /tmp/GENERIC2:2: cannot open included file
 *** Error code 1
 
 
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: kern/187712: config(8) does not respect KERNCONFDIR

2014-03-18 Thread asomers
Synopsis: config(8) does not respect KERNCONFDIR

Responsible-Changed-From-To: freebsd-bugs->asomers
Responsible-Changed-By: asomers
Responsible-Changed-When: Tue Mar 18 22:44:38 UTC 2014
Responsible-Changed-Why: 
I'll take it

http://www.freebsd.org/cgi/query-pr.cgi?pr=187712
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: kern/187566: incomming ng_l2tp/ipsec packet bypass PF firewall

2014-03-18 Thread HASHI Hiroaki
The following reply was made to PR kern/187566; it has been noted by GNATS.

From: HASHI Hiroaki 
To: gleb...@freebsd.org
Cc: freebsd-gnats-sub...@freebsd.org
Subject: Re: kern/187566: incomming ng_l2tp/ipsec packet bypass PF firewall
Date: Wed, 19 Mar 2014 09:20:59 +0900 (JST)

 Gleb-san
 
 fixed.
 
 But the problem of kern/169620 that was hidden due to this issue will
 appear again.
 
 http://www.freebsd.org/cgi/query-pr.cgi?pr=169620
 
 In "Re: kern/187566: incomming ng_l2tp/ipsec packet bypass PF firewall" at 
Tue, 18 Mar 2014 21:03:18 +0400
  Gleb Smirnoff   wrote:
 >   Hiroaki-san,
 > 
 > On Fri, Mar 14, 2014 at 04:05:37PM +0900, HASHI Hiroaki wrote:
 > H> >Environment:
 > H> System: FreeBSD tomba.meridiani.jp 10.0-STABLE FreeBSD 10.0-STABLE #3 
 > r262965: Thu Mar 13 18:44:26 JST 2014 
 > has...@stenmark.meridiani.jp:/usr/obj/usr/src/sys/TOMBA amd64
 > H> 
 > H>   ng_l2tp: net/mpd5
 > H>   ipsec:   security/ipsec-tools
 > H>   
 > H> >Description:
 > H>   incoming packet on ng_l2tp interface bypass PF firewall rules.
 > H> not nat, no filter.
 > 
 > Can you please check whether the issue is fixed or not by r263307
 > commit to stable/10?
 > 
 > -- 
 > Totus tuus, Glebius.
 > 
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


kern/187718: UDP bad performance and out-of-order packet with iperf3 and igb(4) drivers

2014-03-18 Thread Olivier Cochard-Labbe

>Number: 187718
>Category:   kern
>Synopsis:   UDP bad performance and out-of-order packet with iperf3 and 
>igb(4) drivers
>Confidential:   no
>Severity:   non-critical
>Priority:   low
>Responsible:freebsd-bugs
>State:  open
>Quarter:
>Keywords:   
>Date-Required:
>Class:  sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Wed Mar 19 00:50:00 UTC 2014
>Closed-Date:
>Last-Modified:
>Originator: Olivier Cochard-Labbe
>Release:-current
>Organization:
BSD Router project
>Environment:
FreeBSD R1 11.0-CURRENT FreeBSD 11.0-CURRENT #0 r263118M: Fri Mar 14 00:02:53 
CET 2014 
r...@orange.bsdrp.net:/usr/obj/BSDRPcur.amd64/usr/local/BSDRP/BSDRPcur/FreeBSD/src/sys/amd64
  amd64

>Description:
Testing UDP throughput with iperf and iperf3 give totally different value:

With iperf:

[root@R1]~# iperf -u -c 99.99.99.100 -w65536 -l1460 -t30 -i4 -b1000m -P1
  

Client connecting to 99.99.99.100, UDP port 5001
Sending 1460 byte datagrams
UDP buffer size: 64.0 KByte

[  3] local 99.99.99.99 port 64273 connected with 99.99.99.100 port 5001
[ ID] Interval   Transfer Bandwidth
[  3]  0.0- 4.0 sec   373 MBytes   783 Mbits/sec
[  3]  4.0- 8.0 sec   374 MBytes   784 Mbits/sec
[  3]  8.0-12.0 sec   372 MBytes   780 Mbits/sec
[  3] 12.0-16.0 sec   373 MBytes   783 Mbits/sec
[  3] 16.0-20.0 sec   373 MBytes   783 Mbits/sec
[  3] 20.0-24.0 sec   373 MBytes   782 Mbits/sec
[  3] 24.0-28.0 sec   373 MBytes   783 Mbits/sec
[  3]  0.0-30.0 sec  2.73 GBytes   783 Mbits/sec
[  3] Sent 2010212 datagrams
[  3] Server Report:
[  3]  0.0-30.0 sec  2.73 GBytes   781 Mbits/sec   0.010 ms 4953/2010211 (0.25%)
[  3]  0.0-30.0 sec  954425 datagrams received out-of-order


with iperf3.

[root@R1]~# iperf3 -u -c 99.99.99.100 -w65536 -l1460 -t30 -i4 -b1000m -P1   
  
Connecting to host 99.99.99.100, port 5201
[  4] local 99.99.99.99 port 43694 connected to 99.99.99.100 port 5201
[ ID] Interval   Transfer Bandwidth   Total Datagrams
[  4]   0.00-4.00   sec  48.7 MBytes   102 Mbits/sec  1295380  
[  4]   4.00-8.00   sec  28.2 MBytes  59.2 Mbits/sec  1334970  
[  4]   8.00-12.00  sec  31.6 MBytes  66.4 Mbits/sec  1334995  
[  4]  12.00-16.00  sec  32.0 MBytes  67.1 Mbits/sec  1330605  
[  4]  16.00-20.00  sec  47.3 MBytes  99.2 Mbits/sec  1335097  
[  4]  20.00-24.00  sec  30.6 MBytes  64.1 Mbits/sec  1335121  
[  4]  24.00-28.00  sec  35.3 MBytes  74.0 Mbits/sec  1331542  
[  4]  28.00-30.00  sec  19.3 MBytes  81.0 Mbits/sec  663836  
- - - - - - - - - - - - - - - - - - - - - - - - -
[ ID] Interval   Transfer Bandwidth   JitterLost/Total 
Datagrams
[  4]   0.00-30.00  sec   273 MBytes  76.4 Mbits/sec  7.755 ms  9381619/9954141 
(94%)  
[  4] Sent 9954141 datagrams
>How-To-Repeat:
Load on the generator during the iperf3 test is:
[root@R1]~# top -nCHSIzs1
last pid: 14453;  load averages:  0.37,  0.19,  0.09  up 4+17:17:3301:26:07
160 processes: 6 running, 104 sleeping, 50 waiting

Mem: 4192K Active, 26M Inact, 751M Wired, 27M Buf, 15G Free
Swap: 


  PID USERNAME PRI NICE   SIZERES STATE   C   TIME CPU COMMAND
14452 root 1000 14300K  1880K CPU11   0:26  96.39% iperf3
   11 root -92- 0K   800K WAIT1   0:07   0.88% intr{irq279: 
igb2:que}
   11 root -92- 0K   800K WAIT2   0:13   0.78% intr{irq280: 
igb2:que}
   11 root -92- 0K   800K WAIT3   0:05   0.68% intr{irq281: 
igb2:que}
   11 root -92- 0K   800K WAIT0   0:11   0.49% intr{irq278: 
igb2:que}


and an extract of the iperf receiver during this test:

iperf3: OUT OF ORDER - incoming packet = 9972872 and received packet = 9983051 
AND SP = 5
iperf3: OUT OF ORDER - incoming packet = 9950852 and received packet = 9983052 
AND SP = 5
iperf3: OUT OF ORDER - incoming packet = 9947731 and received packet = 9983052 
AND SP = 5
iperf3: OUT OF ORDER - incoming packet = 9972873 and received packet = 9983052 
AND SP = 5
iperf3: OUT OF ORDER - incoming packet = 9950853 and received packet = 9983053 
AND SP = 5
iperf3: OUT OF ORDER - incoming packet = 9947732 and received packet = 9983053 
AND SP = 5
iperf3: OUT OF ORDER - incoming packet = 9972874 and received packet = 9983053 
AND SP = 5
iperf3: OUT OF ORDER - incoming packet = 9950854 and received packet = 9983054 
AND SP = 5
iperf3: OUT OF ORDER - incoming packet = 9947733 and received packet = 9983054 
AND SP = 5
iperf3: OUT OF ORDER - incoming packet = 9972875 and received packet = 9983054 
AND SP = 5
iperf3: OUT OF ORDER - incoming packet = 9950855 and received packet = 9983055 
AND SP = 5
iperf3: OUT OF ORDER - incoming packet = 9947734 and received packet = 9983055 
AND SP = 5
iperf3: OUT OF ORDER - incoming packet = 9972876 and received packet = 9983055

Re: kern/187654: Panic on system resume (swi4: clock)

2014-03-18 Thread Ivan Klymenko
The following reply was made to PR kern/187654; it has been noted by GNATS.

From: Ivan Klymenko 
To: bug-follo...@freebsd.org, robert.david.pub...@gmail.com
Cc:  
Subject: Re: kern/187654: Panic on system resume  (swi4: clock)
Date: Wed, 19 Mar 2014 07:51:30 +0200

 fixed in :
 http://svnweb.freebsd.org/changeset/base/263321
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"