FreeBSD 8.2, MPD5 - crash when net.isr.bindthreads=0

2011-07-13 Thread Adrian M
Hi,
I always get a kernel crash when "net.isr.bindthreads=0" and around
4700 l2tp sessions. With "net.isr.bindthreads=1" the system is stable
and I manage to get around 6500 sessions.
If somebody is interested here are the crash details:
http://pluto.stsisp.ro/crash-isr/

--
Best regards,
Adrian Minta
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


(TCP/IP) Server side sends RST after 3-way handshake.Syn flood defense or queue overflow?

2011-07-13 Thread Vladimir Budnev
Hello.

Iv faced some problem and seems don't realize the mechanincs why does it
occures.
First of all i'd like to notice that my freebsd knowledge and expirience is
limited, especially in such "strange" cases.

In details(code example ill be at the end):

System:
# uname -spr
FreeBSD 7.2-RELEASE amd64

We have simple TCP client and server.

Server is very casual, it listens on some port in while->select->accept
loop.

Client knocks on server port and sends some data and closes the port.
First it was designed for sending data 3-5/times per minute. But once during
test I'v noticed that if client sends data very fast (more precisely it
opens and closes socket to server very fast) there is
"54 - Connection reset by peer" error on call to "connect".(on client side
ofc)

Some illustration from tcpdump:
(test on localhost.server side is port 10002.i'v cuted other fields for
simplicity)
<...>
13:48:58.491229 IP 127.0.0.1.56677 > 127.0.0.1.10002: S
13:48:58.491255 IP 127.0.0.1.10002 > 127.0.0.1.56677: S  ack
13:48:58.491266 IP 127.0.0.1.56677 > 127.0.0.1.10002: . ack
13:48:58.491300 IP 127.0.0.1.56677 > 127.0.0.1.10002: P
13:48:58.491346 IP 127.0.0.1.56677 > 127.0.0.1.10002: F
13:48:58.491365 IP 127.0.0.1.10002 > 127.0.0.1.56677: . ack

13:48:58.491466 IP 127.0.0.1.55238 > 127.0.0.1.10002: S//
13:48:58.491490 IP 127.0.0.1.10002 > 127.0.0.1.55238: S ack // handshake
13:48:58.491503 IP 127.0.0.1.55238 > 127.0.0.1.10002: . ack  //
13:48:58.491536 IP 127.0.0.1.55238 > 127.0.0.1.10002: P   <--data
13:48:58.491580 IP 127.0.0.1.55238 > 127.0.0.1.10002: F   <-- client
closes session
13:48:58.491599 IP 127.0.0.1.10002 > 127.0.0.1.55238: . ack  // OK

13:48:58.491701 IP 127.0.0.1.60212 > 127.0.0.1.10002: S
13:48:58.491726 IP 127.0.0.1.10002 > 127.0.0.1.60212: S ack
13:48:58.491738 IP 127.0.0.1.60212 > 127.0.0.1.10002: . ack
13:48:58.491745 IP 127.0.0.1.10002 > 127.0.0.1.60212: R<-- this is
strange answer.Why?

13:48:58.491887 IP 127.0.0.1.60804 > 127.0.0.1.10002: S
13:48:58.491914 IP 127.0.0.1.10002 > 127.0.0.1.60804: S ack
13:48:58.491924 IP 127.0.0.1.60804 > 127.0.0.1.10002: . ack
13:48:58.491931 IP 127.0.0.1.10002 > 127.0.0.1.60804: R
<...>

Some connections were OK but then server application begin to send RST right
after handshake.
Tuning listen backlog parameter doesn't help much, BUT what really solves
the "problem"  is increasing time interval between client
requests.egusleep(1) solves the "problem" at all.

Iv maned for some tuning like syncache and syncookies but nothing usefull,
or i missed something.But here they are:

# sysctl -a | grep syncache
net.inet.tcp.syncache.rst_on_sock_fail: 1
net.inet.tcp.syncache.rexmtlimit: 3
net.inet.tcp.syncache.hashsize: 512
net.inet.tcp.syncache.count: 0
net.inet.tcp.syncache.cachelimit: 15360
net.inet.tcp.syncache.bucketlimit: 30


ipfw rules allows any from any, nothing special.

QUESTION:
So the question is why such thing happening?Is this is some freebsd defense
from syn flood?(to be honest don't think so because seems there is no fixed
"ALLOWED syn/syn-ack/ack per seconds"). It more looks like some queue
overflow,but I don't know what queue and how it can be enlarged.

If i can provide some more info to clear some aspects I will!

Thanks in advance, Vladimir.




I'v wrote some simplified(as simply as possible imho:)) small client and
server example which reproduses the situation (at least on our test stend),
here is the code. its not perfect, but i think its easy to read as example:

NOTICE: it writes logs to local0 level.

//--
//client.c
//--
#include 
#include 
#include 
#include 
#include 
#include 
#include 
#include 
#include 
#include 
#include 
#include 
#include 
#include 
#include 

uint8_t progname[]="client";

#define MAX_ITER 300

int send_msg();

int main(int argc,char **argv){
int res=0;
uint16_t counter=0;

openlog(progname,LOG_NDELAY,LOG_LOCAL0);
syslog(LOG_DEBUG,"Started");

while( counter<=MAX_ITER ){
syslog(LOG_DEBUG,"Attemp #%d",counter);
send_msg();
counter++;
}

return res;
}

int
send_msg(){
int sock;
int res;
struct sockaddr_in src_addr;
struct sockaddr_in dst_addr;
struct timeval tv;
uint8_t target_addr[]="127.0.0.1";
uint8_t target_port[]="10002";


sock=socket(AF_INET,SOCK_STREAM,0);
if(sock<0){
syslog(LOG_ERR,"ERROR on socket: %s\n",strerror(errno));
return -1;
}

src_addr.sin_family = AF_INET;
src_addr.sin_port = htons(INADDR_ANY);
src_addr.sin_addr.s_addr = INADDR_ANY;

res=bind(sock,(struct sockaddr*)&src_addr,sizeof(struct sockaddr_in));
if(res<0){
syslog(LOG_ERR,"ERROR on bind: %s\n",strerror(errno));
close(sock);
return -1;
}

dst_addr.sin_family = AF_INET;
dst_addr.si

Re: (TCP/IP) Server side sends RST after 3-way handshake.Syn flood defense or queue overflow?

2011-07-13 Thread John Baldwin
On Wednesday, July 13, 2011 6:37:26 am Vladimir Budnev wrote:
> Hello.
> 
> Iv faced some problem and seems don't realize the mechanincs why does it
> occures.
> First of all i'd like to notice that my freebsd knowledge and expirience is
> limited, especially in such "strange" cases.
> 
> In details(code example ill be at the end):
> 
> System:
> # uname -spr
> FreeBSD 7.2-RELEASE amd64
> 
> We have simple TCP client and server.
> 
> Server is very casual, it listens on some port in while->select->accept
> loop.
> 
> Client knocks on server port and sends some data and closes the port.
> First it was designed for sending data 3-5/times per minute. But once during
> test I'v noticed that if client sends data very fast (more precisely it
> opens and closes socket to server very fast) there is
> "54 - Connection reset by peer" error on call to "connect".(on client side
> ofc)
> 
> Some illustration from tcpdump:
> (test on localhost.server side is port 10002.i'v cuted other fields for
> simplicity)
> <...>
> 13:48:58.491229 IP 127.0.0.1.56677 > 127.0.0.1.10002: S
> 13:48:58.491255 IP 127.0.0.1.10002 > 127.0.0.1.56677: S  ack
> 13:48:58.491266 IP 127.0.0.1.56677 > 127.0.0.1.10002: . ack
> 13:48:58.491300 IP 127.0.0.1.56677 > 127.0.0.1.10002: P
> 13:48:58.491346 IP 127.0.0.1.56677 > 127.0.0.1.10002: F
> 13:48:58.491365 IP 127.0.0.1.10002 > 127.0.0.1.56677: . ack
> 
> 13:48:58.491466 IP 127.0.0.1.55238 > 127.0.0.1.10002: S//
> 13:48:58.491490 IP 127.0.0.1.10002 > 127.0.0.1.55238: S ack // handshake
> 13:48:58.491503 IP 127.0.0.1.55238 > 127.0.0.1.10002: . ack  //
> 13:48:58.491536 IP 127.0.0.1.55238 > 127.0.0.1.10002: P   <--data
> 13:48:58.491580 IP 127.0.0.1.55238 > 127.0.0.1.10002: F   <-- client
> closes session
> 13:48:58.491599 IP 127.0.0.1.10002 > 127.0.0.1.55238: . ack  // OK
> 
> 13:48:58.491701 IP 127.0.0.1.60212 > 127.0.0.1.10002: S
> 13:48:58.491726 IP 127.0.0.1.10002 > 127.0.0.1.60212: S ack
> 13:48:58.491738 IP 127.0.0.1.60212 > 127.0.0.1.10002: . ack
> 13:48:58.491745 IP 127.0.0.1.10002 > 127.0.0.1.60212: R<-- this is
> strange answer.Why?
> 
> 13:48:58.491887 IP 127.0.0.1.60804 > 127.0.0.1.10002: S
> 13:48:58.491914 IP 127.0.0.1.10002 > 127.0.0.1.60804: S ack
> 13:48:58.491924 IP 127.0.0.1.60804 > 127.0.0.1.10002: . ack
> 13:48:58.491931 IP 127.0.0.1.10002 > 127.0.0.1.60804: R
> <...>
> 
> Some connections were OK but then server application begin to send RST right
> after handshake.
> Tuning listen backlog parameter doesn't help much, BUT what really solves
> the "problem"  is increasing time interval between client
> requests.egusleep(1) solves the "problem" at all.
> 
> Iv maned for some tuning like syncache and syncookies but nothing usefull,
> or i missed something.But here they are:
> 
> # sysctl -a | grep syncache
> net.inet.tcp.syncache.rst_on_sock_fail: 1
> net.inet.tcp.syncache.rexmtlimit: 3
> net.inet.tcp.syncache.hashsize: 512
> net.inet.tcp.syncache.count: 0
> net.inet.tcp.syncache.cachelimit: 15360
> net.inet.tcp.syncache.bucketlimit: 30
> 
> 
> ipfw rules allows any from any, nothing special.
> 
> QUESTION:
> So the question is why such thing happening?Is this is some freebsd defense
> from syn flood?(to be honest don't think so because seems there is no fixed
> "ALLOWED syn/syn-ack/ack per seconds"). It more looks like some queue
> overflow,but I don't know what queue and how it can be enlarged.
> 
> If i can provide some more info to clear some aspects I will!
> 
> Thanks in advance, Vladimir.

Do you have any of these in your netstat -s -p tcp output:

6186 embryonic connections dropped
63889 syncache entries added
0 retransmitted
0 dupsyn
0 dropped
63889 completed
0 bucket overflow
0 cache overflow
0 reset
0 stale
0 aborted
0 badack
0 unreach
0 zone failures
63889 cookies sent
0 cookies received

It is normal for syncache entries added == completed == cookies sent, I'm 
mostly curious about anything else besides that.  It is possible when using 
the syncache to have the network stack decide it can't create a connection 
until it gets to the end of the 3-way handshake due to resource limits, etc.  
In that case the end of the 3-way handshake will get a RST in response.  
However, if your app just sends data and calls close() without doing any 
reads, it might close() succesfully while the data is in flight before the 
client machine sees the RST, so the client app will not see any errors.  If 
the RST arrives before you finish calling write() and close() then you will 
get ECONNRESET errors from write() and close().

You can try turning off the syncache and syncookies as a test.  This will 
probably trigger more ECONNRESET errors in connect() (which your app will need 
to retry on).  However, the better fix is to track down what is cau

Re: (TCP/IP) Server side sends RST after 3-way handshake.Syn flood defense or queue overflow?

2011-07-13 Thread Vladimir Budnev
First of all thanks for response!

It is normal for syncache entries added == completed == cookies sent, I'm
> mostly curious about anything else besides that.  It is possible when using
> the syncache to have the network stack decide it can't create a connection
> until it gets to the end of the 3-way handshake due to resource limits,
> etc.
> In that case the end of the 3-way handshake will get a RST in response.
>

statistics i have:
(cutted from netstat -s -p tcp)
89514 syncache entries added
0 retransmitted
0 dupsyn
0 dropped
50220 completed
0 bucket overflow
0 cache overflow
0 reset
0 stale
39294 aborted
0 badack
0 unreach
0 zone failures
89514 cookies sent
According to your hint I see nonzero aborted field, but dont know how to get
the reason/interpret this.


> However, if your app just sends data and calls close() without doing any
> reads, it might close() succesfully while the data is in flight before the
> client machine sees the RST, so the client app will not see any errors.  If
> the RST arrives before you finish calling write() and close() then you will
> get ECONNRESET errors from write() and close().
>

Hm..hope i get your idea, the difference is that client application recieve
ECONNRESET as result to _connect_ call not as result from write/read/close,
at that point i cant ignore it. I can spin/wait and try again, but that way
every N iterations when problem occures there will be this "problem". As i
mentioned(and in code example) client on every iteration makes
connect/close, and those come very fast.
Mb i misunderstood smth.

You can try turning off the syncache and syncookies as a test.  This will
> probably trigger more ECONNRESET errors in connect() (which your app will
> need
> to retry on).

Spin idea...yeah it sounds friendly but i dont think sy/syn-ack/ack/rst
flood would be great:(


>  However, the better fix is to track down what is causing your
> connections to be dropped in the first place, e.g. if you are hitting the
> limit on inpcbs (look for failures in vmstat -z output) and fix that.
>
# vmstat -z
ITEM SIZE LIMIT  USED  FREE  REQUESTS
FAILURES
<...>
inpcb:288,25610,6, 5155,
142849,0
tcpcb:728,25600,6,  454,
142849,0
<...>
Those ones looks ok?


>
> --
> John Baldwin
>
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


Re: (TCP/IP) Server side sends RST after 3-way handshake.Syn flood defense or queue overflow?

2011-07-13 Thread John Baldwin
On Wednesday, July 13, 2011 8:37:24 am Vladimir Budnev wrote:
> statistics i have:
> (cutted from netstat -s -p tcp)
> 89514 syncache entries added
> 0 retransmitted
> 0 dupsyn
> 0 dropped
> 50220 completed
> 0 bucket overflow
> 0 cache overflow
> 0 reset
> 0 stale
> 39294 aborted
> 0 badack
> 0 unreach
> 0 zone failures
> 89514 cookies sent
> According to your hint I see nonzero aborted field, but dont know how to get
> the reason/interpret this.

Yep, the aborted entries are likely your resets.

> > However, if your app just sends data and calls close() without doing any
> > reads, it might close() succesfully while the data is in flight before the
> > client machine sees the RST, so the client app will not see any errors.  If
> > the RST arrives before you finish calling write() and close() then you will
> > get ECONNRESET errors from write() and close().
> >
> 
> Hm..hope i get your idea, the difference is that client application recieve
> ECONNRESET as result to _connect_ call not as result from write/read/close,
> at that point i cant ignore it. I can spin/wait and try again, but that way
> every N iterations when problem occures there will be this "problem". As i
> mentioned(and in code example) client on every iteration makes
> connect/close, and those come very fast.
> Mb i misunderstood smth.

Ah, when I was tracking down a similar issue I was only seeing errors on write
(or sometimes not at all) not on connect().   A bit odd you are getting errors
on connect().  Maybe the RST is arriving so fast the kernel notices it and
marks the socket error before the process asleep in connect() gets a chance to
run after it is awakened by the SYN/ACK processing.

> You can try turning off the syncache and syncookies as a test.  This will
> > probably trigger more ECONNRESET errors in connect() (which your app will
> > need
> > to retry on).
> 
> Spin idea...yeah it sounds friendly but i dont think sy/syn-ack/ack/rst
> flood would be great:(

Yes, fixing it for real would be better.

> >  However, the better fix is to track down what is causing your
> > connections to be dropped in the first place, e.g. if you are hitting the
> > limit on inpcbs (look for failures in vmstat -z output) and fix that.
> >
> # vmstat -z
> ITEM SIZE LIMIT  USED  FREE  REQUESTS
> FAILURES
> <...>
> inpcb:288,25610,6, 5155,
> 142849,0
> tcpcb:728,25600,6,  454,
> 142849,0
> <...>
> Those ones looks ok?

Hmm, perhaps compare the 'kern.ipc.numopensockets' and 'kern.ipc.maxsockets' 
tunables under load on the server?

-- 
John Baldwin
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


Re: kern/158873: When I launch pf daemon, I have a kernel panic

2011-07-13 Thread pluknet
Synopsis: When I launch pf daemon, I have a kernel panic

Responsible-Changed-From-To: freebsd-amd64->freebsd-net
Responsible-Changed-By: pluknet
Responsible-Changed-When: Wed Jul 13 19:45:29 UTC 2011
Responsible-Changed-Why: 
Reclassify.

http://www.freebsd.org/cgi/query-pr.cgi?pr=158873
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


Re: kern/158873: When I launch pf daemon, I have a kernel panic

2011-07-13 Thread Sergey Kandaurov
The following reply was made to PR kern/158873; it has been noted by GNATS.

From: Sergey Kandaurov 
To: bug-follo...@freebsd.org, gobl...@gmail.com
Cc:  
Subject: Re: kern/158873: When I launch pf daemon, I have a kernel panic
Date: Wed, 13 Jul 2011 23:50:24 +0400

 I think we need to merge net/if_pfsync.c 1.113 from vendor.
 Below is a more complete crash info.
 
 panic: _mtx_lock_sleep: recursed on non-recursive mutex pf task mtx @
 /usr/src/sys/modules/pfsync/../../contrib/pf/net/if_pfsync.c:3163
 
 cpuid = 0
 KDB: stack backtrace:
 db_trace_self_wrapper() at 0x802db93a = db_trace_self_wrapper+0x2a
 kdb_backtrace() at 0x8047f407 = kdb_backtrace+0x37
 panic() at 0x80448017 = panic+0x187
 _mtx_lock_sleep() at 0x80437513 = _mtx_lock_sleep+0x343
 _mtx_lock_flags() at 0x8043768c = _mtx_lock_flags+0x16c
 pfsync_send_plus() at 0x81072eda = pfsync_send_plus+0xaa
 pfsync_clear_states() at 0x81072ffe = pfsync_clear_states+0x6e
 pfioctl() at 0x8106024b = pfioctl+0x1c0b
 devfs_ioctl_f() at 0x803c442a = devfs_ioctl_f+0x7a
 kern_ioctl() at 0x8049984e = kern_ioctl+0xbe
 ioctl() at 0x80499aed = ioctl+0xfd
 syscallenter() at 0x8048e30b = syscallenter+0x1cb
 syscall() at 0x806bd630 = syscall+0x60
 Xfast_syscall() at 0x806a853d = Xfast_syscall+0xdd
 --- syscall (54, FreeBSD ELF64, ioctl), rip = 0x800da70ac, rsp =
 0x7fffd528, rbp = 0 ---
 KDB: enter: panic
 [ thread pid 48453 tid 100192 ]
 Stopped at  0x8047f01b = kdb_enter+0x3b:movq
 $0,0x6eeb82(%rip)
 
 
 -- 
 wbr,
 pluknet
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


Re: kern/158873: When I launch pf daemon, I have a kernel panic

2011-07-13 Thread Sergey Kandaurov
The following reply was made to PR kern/158873; it has been noted by GNATS.

From: Sergey Kandaurov 
To: bug-follo...@freebsd.org, gobl...@gmail.com
Cc:  
Subject: Re: kern/158873: When I launch pf daemon, I have a kernel panic
Date: Thu, 14 Jul 2011 00:50:38 +0400

 --000e0cd4c08e974e9704a7f99174
 Content-Type: text/plain; charset=ISO-8859-1
 
 Something like this will probably fix the panic (attached).
 
 -- 
 wbr,
 pluknet
 
 --000e0cd4c08e974e9704a7f99174
 Content-Type: text/x-patch; charset=US-ASCII; name="if_pfsync.diff"
 Content-Disposition: attachment; filename="if_pfsync.diff"
 Content-Transfer-Encoding: base64
 X-Attachment-Id: f_gq2rgfnx0
 
 SW5kZXg6IHN5cy9jb250cmliL3BmL25ldC9pZl9wZnN5bmMuYwo9PT09PT09PT09PT09PT09PT09
 PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09Ci0tLSBzeXMv
 Y29udHJpYi9wZi9uZXQvaWZfcGZzeW5jLmMJKHJldmlzaW9uIDIyMzgyMikKKysrIHN5cy9jb250
 cmliL3BmL25ldC9pZl9wZnN5bmMuYwkod29ya2luZyBjb3B5KQpAQCAtMSw0ICsxLDUgQEAKIC8q
 CSRPcGVuQlNEOiBpZl9wZnN5bmMuYyx2IDEuMTEwIDIwMDkvMDIvMjQgMDU6Mzk6MTkgZGxnIEV4
 cCAkCSovCisvKgkkT3BlbkJTRDogaWZfcGZzeW5jLmMsdiAxLjExMyAyMDA5LzAzLzAxIDEwOjM0
 OjM4IGRsZyBFeHAgJAkqLwogCiAvKgogICogQ29weXJpZ2h0IChjKSAyMDAyIE1pY2hhZWwgU2hh
 bGF5ZWZmCkBAIC01OTAsOSArNTkxLDYgQEAKIHBmc3luY19pZl9kZXF1ZXVlKHN0cnVjdCBpZm5l
 dCAqaWZwKQogewogCXN0cnVjdCBtYnVmICptOwotI2lmbmRlZiBfX0ZyZWVCU0RfXwotCWludCBz
 OwotI2VuZGlmCiAKICNpZmRlZiBfX0ZyZWVCU0RfXwogCUlGX0xPQ0soJmlmcC0+aWZfc25kKTsK
 QEAgLTYwMCw5ICs1OTgsNyBAQAogCV9JRl9ERVFVRVVFKCZpZnAtPmlmX3NuZCwgbSk7CiAJSUZf
 VU5MT0NLKCZpZnAtPmlmX3NuZCk7CiAjZWxzZQotCXMgPSBzcGxuZXQoKTsKIAlJRl9ERVFVRVVF
 KCZpZnAtPmlmX3NuZCwgbSk7Ci0Jc3BseChzKTsKICNlbmRpZgogCiAJcmV0dXJuIChtKTsKQEAg
 LTYxNSwxMyArNjExLDE3IEBACiBwZnN5bmNzdGFydChzdHJ1Y3QgaWZuZXQgKmlmcCkKIHsKIAlz
 dHJ1Y3QgbWJ1ZiAqbTsKKwlpbnQgczsKIAorCXMgPSBzcGxuZXQoKTsKKwogCXdoaWxlICgobSA9
 IHBmc3luY19pZl9kZXF1ZXVlKGlmcCkpICE9IE5VTEwpIHsKICNpZm5kZWYgX19GcmVlQlNEX18K
 IAkJSUZfRFJPUCgmaWZwLT5pZl9zbmQpOwogI2VuZGlmCiAJCW1fZnJlZW0obSk7CiAJfQorCXNw
 bHgocyk7CiB9CiAKIGludApAQCAtMTc4MCw3ICsxNzgwLDcgQEAKIAlzdHJ1Y3QgcGZzeW5jcmVx
 IHBmc3luY3I7CiAJc3RydWN0IGlmbmV0ICAgICpzaWZwOwogCXN0cnVjdCBpcCAqaXA7Ci0JaW50
 IHMsIGVycm9yOworCWludCBlcnJvcjsKIAogCXN3aXRjaCAoY21kKSB7CiAjaWYgMApAQCAtMTgw
 NiwxNyArMTgwNiw4IEBACiAJCQlyZXR1cm4gKEVJTlZBTCk7CiAJCWlmIChpZnItPmlmcl9tdHUg
 PiBNQ0xCWVRFUykgLyogWFhYIGNvdWxkIGJlIGJpZ2dlciAqLwogCQkJaWZyLT5pZnJfbXR1ID0g
 TUNMQllURVM7Ci0JCWlmIChpZnItPmlmcl9tdHUgPCBpZnAtPmlmX210dSkgewotCQkJcyA9IHNw
 bG5ldCgpOwotI2lmZGVmIF9fRnJlZUJTRF9fCi0JCQlQRl9MT0NLKCk7Ci0jZW5kaWYKKwkJaWYg
 KGlmci0+aWZyX210dSA8IGlmcC0+aWZfbXR1KQogCQkJcGZzeW5jX3NlbmRvdXQoKTsKLSNpZmRl
 ZiBfX0ZyZWVCU0RfXwotCQkJUEZfVU5MT0NLKCk7Ci0jZW5kaWYKLQkJCXNwbHgocyk7Ci0JCX0K
 IAkJaWZwLT5pZl9tdHUgPSBpZnItPmlmcl9tdHU7CiAJCWJyZWFrOwogCWNhc2UgU0lPQ0dFVFBG
 U1lOQzoKQEAgLTE4ODMsMTAgKzE4NzQsNiBAQAogCQkJcmV0dXJuIChFSU5WQUwpOwogCiAjaWZk
 ZWYgX19GcmVlQlNEX18KLQkJUEZfTE9DSygpOwotI2VuZGlmCi0JCXMgPSBzcGxuZXQoKTsKLSNp
 ZmRlZiBfX0ZyZWVCU0RfXwogCQlpZiAoc2lmcC0+aWZfbXR1IDwgc2MtPnNjX2lmcC0+aWZfbXR1
 IHx8CiAjZWxzZQogCQlpZiAoc2lmcC0+aWZfbXR1IDwgc2MtPnNjX2lmLmlmX210dSB8fApAQCAt
 MTg5OCwxMyArMTg4NSw3IEBACiAJCXNjLT5zY19zeW5jX2lmID0gc2lmcDsKIAogCQlpZiAoaW1v
 LT5pbW9fbnVtX21lbWJlcnNoaXBzID4gMCkgewotI2lmZGVmIF9fRnJlZUJTRF9fCi0JCQlQRl9V
 TkxPQ0soKTsKLSNlbmRpZgogCQkJaW5fZGVsbXVsdGkoaW1vLT5pbW9fbWVtYmVyc2hpcFstLWlt
 by0+aW1vX251bV9tZW1iZXJzaGlwc10pOwotI2lmZGVmIF9fRnJlZUJTRF9fCi0JCQlQRl9MT0NL
 KCk7Ci0jZW5kaWYKIAkJCWltby0+aW1vX211bHRpY2FzdF9pZnAgPSBOVUxMOwogCQl9CiAKQEAg
 LTE5MTgsMTAgKzE4OTksNiBAQAogCiAJCQlpZiAoIShzYy0+c2Nfc3luY19pZi0+aWZfZmxhZ3Mg
 JiBJRkZfTVVMVElDQVNUKSkgewogCQkJCXNjLT5zY19zeW5jX2lmID0gTlVMTDsKLSNpZmRlZiBf
 X0ZyZWVCU0RfXwotCQkJCVBGX1VOTE9DSygpOwotI2VuZGlmCi0JCQkJc3BseChzKTsKIAkJCQly
 ZXR1cm4gKEVBRERSTk9UQVZBSUwpOwogCQkJfQogCkBAIC0xOTMxLDE4ICsxOTA4LDExIEBACiAJ
 CQlhZGRyLnNfYWRkciA9IElOQUREUl9QRlNZTkNfR1JPVVA7CiAjZW5kaWYKIAotI2lmZGVmIF9f
 RnJlZUJTRF9fCi0JCQlQRl9VTkxPQ0soKTsKLSNlbmRpZgogCQkJaWYgKChpbW8tPmltb19tZW1i
 ZXJzaGlwWzBdID0KIAkJCSAgICBpbl9hZGRtdWx0aSgmYWRkciwgc2MtPnNjX3N5bmNfaWYpKSA9
 PSBOVUxMKSB7CiAJCQkJc2MtPnNjX3N5bmNfaWYgPSBOVUxMOwotCQkJCXNwbHgocyk7CiAJCQkJ
 cmV0dXJuIChFTk9CVUZTKTsKIAkJCX0KLSNpZmRlZiBfX0ZyZWVCU0RfXwotCQkJUEZfTE9DSygp
 OwotI2VuZGlmCiAJCQlpbW8tPmltb19udW1fbWVtYmVyc2hpcHMrKzsKIAkJCWltby0+aW1vX211
 bHRpY2FzdF9pZnAgPSBzYy0+c2Nfc3luY19pZjsKIAkJCWltby0+aW1vX211bHRpY2FzdF90dGwg
 PSBQRlNZTkNfREZMVFRMOwpAQCAtMTk5MywxMCArMTk2Myw2IEBACiAjZW5kaWYKIAkJCXBmc3lu
 Y19yZXF1ZXN0X3VwZGF0ZSgwLCAwKTsKIAkJfQotI2lmZGVmIF9fRnJlZUJTRF9fCi0JCVBGX1VO
 TE9DSygpOwotI2VuZGlmCi0JCXNwbHgocyk7CiAKIAkJYnJlYWs7CiAKQEAgLTIxNDIsMTIgKzIx
 MDgsNiBAQAogCWludCBvZmZzZXQ7CiAJaW50IHEsIGNvdW50ID0gMDsKIAotI2lmZGVmIF9fRnJl
 ZUJTRF9fCi0JUEZfQVNTRVJUKE1BX09XTkVEKTsKLSNlbHNlCi0Jc3BsYXNzZXJ0KElQTF9ORVQp
 OwotI2VuZGlmCi0KIAlpZiAoc2MgPT0gTlVMTCB8fCBzYy0+c2NfbGVuID09IFBGU1lOQ19NSU5Q
 S1QpCiAJCXJldHVybjsKIApAQCAtMjM0MiwyNyArMjMwMiwxMCBAQAogCXNjLT5zY19pZi5pZl9v
 Ynl0ZXMgKz0gbS0+bV9wa3RoZHIubGVuOwogI2VuZGlmCiAKLSNpZmRlZiBfX0ZyZWVCU0RfXwot
 CVBGX1VOTE9DSygpOwotI2VuZGlmCiAJaWYgKGlwX291dHB1

Re: kern/138029: [bpf] [panic] periodically kernel panic and reboot

2011-07-13 Thread linimon
Old Synopsis: [panic][bpf] periodically kernel panic and reboot
New Synopsis: [bpf] [panic] periodically kernel panic and reboot

State-Changed-From-To: open->feedback
State-Changed-By: linimon
State-Changed-When: Thu Jul 14 01:53:36 UTC 2011
State-Changed-Why: 
Most likely not amd64-specific.

To submitter: is this still a problem?


Responsible-Changed-From-To: freebsd-amd64->freebsd-net
Responsible-Changed-By: linimon
Responsible-Changed-When: Thu Jul 14 01:53:36 UTC 2011
Responsible-Changed-Why: 

http://www.freebsd.org/cgi/query-pr.cgi?pr=138029
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


Re: kern/158880: [bpf] bpf_filter() can leak kernel stack contents

2011-07-13 Thread linimon
Old Synopsis: bpf_filter() can leak kernel stack contents
New Synopsis: [bpf] bpf_filter() can leak kernel stack contents

Responsible-Changed-From-To: freebsd-bugs->freebsd-net
Responsible-Changed-By: linimon
Responsible-Changed-When: Thu Jul 14 01:54:35 UTC 2011
Responsible-Changed-Why: 
Over to maintainer(s).

http://www.freebsd.org/cgi/query-pr.cgi?pr=158880
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


Re: kern/158873: [pf] [panic] When I launch pf daemon, I have a kernel panic

2011-07-13 Thread linimon
Old Synopsis: When I launch pf daemon, I have a kernel panic
New Synopsis: [pf] [panic] When I launch pf daemon, I have a kernel panic

Responsible-Changed-From-To: freebsd-net->freebsd-pf
Responsible-Changed-By: linimon
Responsible-Changed-When: Thu Jul 14 01:55:42 UTC 2011
Responsible-Changed-Why: 
Over to maintainer(s).

http://www.freebsd.org/cgi/query-pr.cgi?pr=158873
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


Re: kern/154831: [arp] [patch] arp sysctl setting log_arp_permanent_modify has no effect

2011-07-13 Thread ae
Synopsis: [arp] [patch] arp sysctl setting log_arp_permanent_modify has no 
effect

State-Changed-From-To: patched->closed
State-Changed-By: ae
State-Changed-When: Thu Jul 14 04:21:55 UTC 2011
State-Changed-Why: 
Merged to stable/8. Thanks!

http://www.freebsd.org/cgi/query-pr.cgi?pr=154831
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


Re: kern/154831: commit references a PR

2011-07-13 Thread dfilter service
The following reply was made to PR kern/154831; it has been noted by GNATS.

From: dfil...@freebsd.org (dfilter service)
To: bug-follo...@freebsd.org
Cc:  
Subject: Re: kern/154831: commit references a PR
Date: Thu, 14 Jul 2011 04:21:36 + (UTC)

 Author: ae
 Date: Thu Jul 14 04:21:27 2011
 New Revision: 223995
 URL: http://svn.freebsd.org/changeset/base/223995
 
 Log:
   MFC r223840:
 Add again the checking for log_arp_permanent_modify that was by accident
 removed in the r186119.
   
 PR:kern/154831
 
 Modified:
   stable/8/sys/netinet/if_ether.c
 Directory Properties:
   stable/8/sys/   (props changed)
   stable/8/sys/amd64/include/xen/   (props changed)
   stable/8/sys/cddl/contrib/opensolaris/   (props changed)
   stable/8/sys/contrib/dev/acpica/   (props changed)
   stable/8/sys/contrib/pf/   (props changed)
 
 Modified: stable/8/sys/netinet/if_ether.c
 ==
 --- stable/8/sys/netinet/if_ether.cThu Jul 14 03:16:43 2011
(r223994)
 +++ stable/8/sys/netinet/if_ether.cThu Jul 14 04:21:27 2011
(r223995)
 @@ -680,11 +680,13 @@ match:
bcmp(ar_sha(ah), &la->ll_addr, ifp->if_addrlen)) {
if (la->la_flags & LLE_STATIC) {
LLE_WUNLOCK(la);
 -  log(LOG_ERR,
 -  "arp: %*D attempts to modify permanent "
 -  "entry for %s on %s\n",
 -  ifp->if_addrlen, (u_char *)ar_sha(ah), ":",
 -  inet_ntoa(isaddr), ifp->if_xname);
 +  if (log_arp_permanent_modify)
 +  log(LOG_ERR,
 +  "arp: %*D attempts to modify "
 +  "permanent entry for %s on %s\n",
 +  ifp->if_addrlen,
 +  (u_char *)ar_sha(ah), ":",
 +  inet_ntoa(isaddr), ifp->if_xname);
goto reply;
}
if (log_arp_movements) {
 ___
 svn-src-...@freebsd.org mailing list
 http://lists.freebsd.org/mailman/listinfo/svn-src-all
 To unsubscribe, send any mail to "svn-src-all-unsubscr...@freebsd.org"
 
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"