Re: network locks up with udp traffic

2015-01-24 Thread Dmitry Sivachenko

> On 23 янв. 2015 г., at 21:58, Adrian Chadd  wrote:
> 
> Hi,
> 
> When this next happens, please do this as root:
> 
> procstat -ka
> 
> That'll hopefully provide enough information to figure out which
> processes are blocking where and how they got there.
> 
> 


Hello,

I am attaching procstat -ka output (and top output to see snmpd process in 
"*udp" state).
ifconfig process was started with "net0" argument (net0 is a renamed igb0 in my 
case).

last pid:  4686;  load averages:  0.71,  0.69,  0.68  up 0+03:44:3212:53:43
55 processes:  1 running, 52 sleeping, 2 lock

Mem: 4647M Active, 37G Inact, 2293M Wired, 635M Cache, 1655M Buf, 1985M Free
Swap: 49G Total, 29M Used, 49G Free


  PID USERNAME  THR PRI NICE   SIZERES STATE   C   TIMEWCPU COMMAND
 4658 mitya   9  210  1099M   521M uwait   3   0:30   0.00% ngram_m
 4656 mitya   9  210   843M   566M uwait  15   0:30   0.00% ngram_m
 4660 mitya   9  200  1100M   523M uwait   5   0:26   0.00% ngram_m
 4659 mitya   9  210   764M   486M uwait   4   0:19   0.00% ngram_m
 4662 mitya   9  200   678M   441M uwait   5   0:18   0.00% ngram_m
 4661 mitya   9  210   772M   491M uwait   4   0:18   0.00% ngram_m
 4657 mitya   9  200   762M   484M uwait   3   0:17   0.00% ngram_m
 4666 mitya   9  200   678M   440M uwait  15   0:17   0.00% ngram_m
 4663 mitya   9  200   682M   448M uwait   4   0:17   0.00% ngram_m
 4665 mitya   9  200   688M   446M uwait  14   0:17   0.00% ngram_m
 4664 mitya   9  200   673M   432M uwait  14   0:15   0.00% ngram_m
  830 root1  200 64512K  4244K *udp3   0:06   0.00% snmpd
  660 root1  200 14508K  1312K select  5   0:00   0.00% syslogd
  912 root   11  200 83972K  3616K uwait   7   0:00   0.00% collect
  864 root2  200   123M 24324K select 15   0:00   0.00% ruby19
  810 root1  200 25456K  2220K select  4   0:00   0.00% ntpd
  874 www 1  200 28616K  2324K kqread 12   0:00   0.00% nginx
  875 www 1  200 28616K  2324K kqread 14   0:00   0.00% nginx

  PIDTID COMM TDNAME   KSTACK   
0 10 kernel   swapper  mi_switch sleepq_timedwait 
_sleep swapper btext 
0 100055 kernel   firmware taskq   mi_switch sleepq_wait _sleep 
taskqueue_thread_loop fork_exit fork_trampoline 
0 100059 kernel   thread taskq mi_switch sleepq_wait _sleep 
taskqueue_thread_loop fork_exit fork_trampoline 
0 100060 kernel   ffs_trim taskq   mi_switch sleepq_wait _sleep 
taskqueue_thread_loop fork_exit fork_trampoline 
0 100065 kernel   aiod_bio taskq   mi_switch sleepq_wait _sleep 
taskqueue_thread_loop fork_exit fork_trampoline 
0 100066 kernel   acpi_task_0  mi_switch sleepq_wait 
msleep_spin_sbt taskqueue_thread_loop fork_exit fork_trampoline 
0 100067 kernel   acpi_task_1  mi_switch sleepq_wait 
msleep_spin_sbt taskqueue_thread_loop fork_exit fork_trampoline 
0 100068 kernel   acpi_task_2  mi_switch sleepq_wait 
msleep_spin_sbt taskqueue_thread_loop fork_exit fork_trampoline 
0 100069 kernel   kqueue taskq mi_switch sleepq_wait _sleep 
taskqueue_thread_loop fork_exit fork_trampoline 
0 100087 kernel   em0 rxq  mi_switch sleepq_wait 
msleep_spin_sbt taskqueue_thread_loop fork_exit fork_trampoline 
0 100089 kernel   em0 txq  mi_switch sleepq_wait 
msleep_spin_sbt taskqueue_thread_loop fork_exit fork_trampoline 
0 100092 kernel   em1 rxq  mi_switch sleepq_wait 
msleep_spin_sbt taskqueue_thread_loop fork_exit fork_trampoline 
0 100094 kernel   em1 txq  mi_switch sleepq_wait 
msleep_spin_sbt taskqueue_thread_loop fork_exit fork_trampoline 
0 100136 kernel   mca taskqmi_switch sleepq_wait 
msleep_spin_sbt taskqueue_thread_loop fork_exit fork_trampoline 
0 100138 kernel   dummynet mi_switch sleepq_wait 
msleep_spin_sbt taskqueue_thread_loop fork_exit fork_trampoline 
0 100139 kernel   CAM taskqmi_switch sleepq_wait _sleep 
taskqueue_thread_loop fork_exit fork_trampoline 
1 11 init -mi_switch sleepq_catch_signals 
sleepq_wait_sig _sleep kern_wait6 sys_wait4 amd64_syscall Xfast_syscall 
2 100062 cam  doneq0   mi_switch sleepq_wait _sleep 
xpt_done_td fork_exit fork_trampoline 
2 100063 cam  doneq1   mi_switch sleepq_wait _sleep 
xpt_done_td fork_exit fork_trampoline 
2 100064 cam  doneq2   mi_switch sleepq_wait _sleep 
xpt_done_td fork_exit fork_trampoline 
2 100140 cam  scanner  mi_switch sleepq_wait _sleep 
xpt_scanner_thread fork_exit fork_trampoline 
3 100137 sctp_itera

[Bug 191520] [PATCH] Implementation of draft-ieft-tcpm-newcwv-06

2015-01-24 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=191520

Kubilay Kocak  changed:

   What|Removed |Added

   Keywords||feature, needs-qa, patch

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


Re: network locks up with udp traffic

2015-01-24 Thread Adrian Chadd
Hi,

Can you compile your kernel with WITNESS and repeat this test? It
looks like it's stuck in some lock ordering thing between some UDP
paths and an inpcb lookup.

It should log in dmesg the first time a LOR occurs, regardless of
whether it actively causes a hang.

(And yes, this is definitely critical enough to be a FreeBSD PR... :)

Thanks!



-adrian



On 24 January 2015 at 02:14, Dmitry Sivachenko  wrote:
>
>> On 23 янв. 2015 г., at 21:58, Adrian Chadd  wrote:
>>
>> Hi,
>>
>> When this next happens, please do this as root:
>>
>> procstat -ka
>>
>> That'll hopefully provide enough information to figure out which
>> processes are blocking where and how they got there.
>>
>>
>
>
> Hello,
>
> I am attaching procstat -ka output (and top output to see snmpd process in 
> "*udp" state).
> ifconfig process was started with "net0" argument (net0 is a renamed igb0 in 
> my case).
>
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"

Re: network locks up with udp traffic

2015-01-24 Thread Dmitry Sivachenko

> On 24 янв. 2015 г., at 20:29, Adrian Chadd  wrote:
> 
> Hi,
> 
> Can you compile your kernel with WITNESS and repeat this test? It
> looks like it's stuck in some lock ordering thing between some UDP
> paths and an inpcb lookup.
> 
> It should log in dmesg the first time a LOR occurs, regardless of
> whether it actively causes a hang.



Here is what I got in dmesg just before my net locked up:

lock order reversal:
 1st 0x80e79008 pcbinfohash (pcbinfohash) @ 
/opt/WRK/src/sys/netinet6/udp6_usrreq.c:1202
 2nd 0x80e78fb0 udp (udp) @ /opt/WRK/src/sys/netinet6/in6_pcb.c:614
lock order reversal:
 1st 0x80e79008 pcbinfohash (pcbinfohash) @ 
/opt/WRK/src/sys/netinet6/udp6_usrreq.c:1202
 2nd 0x80e78d58 tcp (tcp) @ /opt/WRK/src/sys/netinet6/in6_pcb.c:614
lock order reversal:
 1st 0x80e79008 pcbinfohash (pcbinfohash) @ 
/opt/WRK/src/sys/netinet6/udp6_usrreq.c:1202
 2nd 0x80e781c0 rip (rip) @ /opt/WRK/src/sys/netinet6/in6_pcb.c:614

When I was saving this dmesg output to disk, I got another LOR:

lock order reversal:
 1st 0xfe0baf12fd78 bufwait (bufwait) @ /opt/WRK/src/sys/kern/vfs_bio.c:3065
 2nd 0xf80011416c00 dirhash (dirhash) @ 
/opt/WRK/src/sys/ufs/ufs/ufs_dirhash.c:284


Please tell me if I can provide more information to help tracking this down.

Thanks!
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"

Re: network locks up with udp traffic

2015-01-24 Thread Adrian Chadd
Hi!

To be clear:

* is your kernel modified in any way; and
* did witness give you a full stacktrace as part of the lock order
reversal? All of that would be good.

Thanks,




On 24 January 2015 at 09:53, Dmitry Sivachenko  wrote:
>
>> On 24 янв. 2015 г., at 20:29, Adrian Chadd  wrote:
>>
>> Hi,
>>
>> Can you compile your kernel with WITNESS and repeat this test? It
>> looks like it's stuck in some lock ordering thing between some UDP
>> paths and an inpcb lookup.
>>
>> It should log in dmesg the first time a LOR occurs, regardless of
>> whether it actively causes a hang.
>
>
>
> Here is what I got in dmesg just before my net locked up:
>
> lock order reversal:
>  1st 0x80e79008 pcbinfohash (pcbinfohash) @ 
> /opt/WRK/src/sys/netinet6/udp6_usrreq.c:1202
>  2nd 0x80e78fb0 udp (udp) @ /opt/WRK/src/sys/netinet6/in6_pcb.c:614
> lock order reversal:
>  1st 0x80e79008 pcbinfohash (pcbinfohash) @ 
> /opt/WRK/src/sys/netinet6/udp6_usrreq.c:1202
>  2nd 0x80e78d58 tcp (tcp) @ /opt/WRK/src/sys/netinet6/in6_pcb.c:614
> lock order reversal:
>  1st 0x80e79008 pcbinfohash (pcbinfohash) @ 
> /opt/WRK/src/sys/netinet6/udp6_usrreq.c:1202
>  2nd 0x80e781c0 rip (rip) @ /opt/WRK/src/sys/netinet6/in6_pcb.c:614
>
> When I was saving this dmesg output to disk, I got another LOR:
>
> lock order reversal:
>  1st 0xfe0baf12fd78 bufwait (bufwait) @ 
> /opt/WRK/src/sys/kern/vfs_bio.c:3065
>  2nd 0xf80011416c00 dirhash (dirhash) @ 
> /opt/WRK/src/sys/ufs/ufs/ufs_dirhash.c:284
>
>
> Please tell me if I can provide more information to help tracking this down.
>
> Thanks!
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"

Re: network locks up with udp traffic

2015-01-24 Thread Dmitry Sivachenko

> On 24 янв. 2015 г., at 21:56, Adrian Chadd  wrote:
> 
> Hi!
> 
> To be clear:
> 
> * is your kernel modified in any way; and


No, it isn't


> * did witness give you a full stacktrace as part of the lock order
> reversal? All of that would be good.
> 


I provided the full output I saw on console.

___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"

[Bug 188897] [dc] dc ethernet driver seems to prevent the detection of other NIC chipsets

2015-01-24 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=188897

--- Comment #7 from c...@eugeneweb.com ---
Created attachment 152106
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=152106&action=edit
This is a verbose dmesg for another dc quadport card, a DFE-570TX

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


[Bug 194515] Fatal Trap 12 Kernel with vimage

2015-01-24 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=194515

--- Comment #19 from Craig Rodrigues  ---
(In reply to darius from comment #18)

I'm OK with merging this to stable/10, but I would like to get
some feedback from PF users on the state of things in CURRENT before merging.
What is your experience with this patch?
Herbert Skuhra has provided good feedback, but getting a few more people
to try it and report would be great.

Herbert found another bug in CURRENT:
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=195859

That is a bug in the bridge code, and not part of the VIMAGE + PF fixes.
However, all this stuff is interrelated.

It would be nice to get a fix in for PR 195859, so provide a consistent
testing environment for VIMAGE in CURRENT.  That will make it easier to
backport patches to stable/10.

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


Re: network locks up with udp traffic

2015-01-24 Thread Adrian Chadd
Ah, try adding STACK to your config?


-a


On 24 January 2015 at 11:45, Dmitry Sivachenko  wrote:
>
>> On 24 янв. 2015 г., at 21:56, Adrian Chadd  wrote:
>>
>> Hi!
>>
>> To be clear:
>>
>> * is your kernel modified in any way; and
>
>
> No, it isn't
>
>
>> * did witness give you a full stacktrace as part of the lock order
>> reversal? All of that would be good.
>>
>
>
> I provided the full output I saw on console.
>
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"

[Differential] [Request, 226 lines] D1641: Implement PCI SR-IOV initialization methods

2015-01-24 Thread rstone (Ryan Stone)
rstone created this revision.
rstone added a reviewer: jfvogel.
rstone added a subscriber: freebsd-net.

REVISION SUMMARY
  Implement the two new PCI methods used to initialize and uninitialize
  SR-IOV on a PF.  On initialization, the PF must allocate a VEB,
  which is a virtual switch instance implemented by the hardware.  The
  PF's interface is made a child of this switch.

REVISION DETAIL
  https://reviews.freebsd.org/D1641

AFFECTED FILES
  sys/dev/ixl/if_ixl.c
  sys/dev/ixl/ixl.h
  sys/dev/ixl/ixl_pf.h

To: rstone, jfvogel
Cc: freebsd-net
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


[Differential] [Request, 118 lines] D1642: Implement PCI SR-IOV method to initialize individual VFs

2015-01-24 Thread rstone (Ryan Stone)
rstone created this revision.
rstone added a reviewer: jfvogel.
rstone added a subscriber: freebsd-net.

REVISION SUMMARY
  For each VF that has been allocated, the PF driver must allocate
  a Virtual Switch Interface (VSI), which is a virtual port on the
  virtual Fortville switch (VEB).
  
  In device_attach() for the PF, we now have to initialize all RX
  and TX queues instead just those that will be used by the PF,
  as there is no way of know how many will be allocated at runtime
  for the VFs.

REVISION DETAIL
  https://reviews.freebsd.org/D1642

AFFECTED FILES
  sys/dev/ixl/if_ixl.c
  sys/dev/ixl/ixl.h
  sys/dev/ixl/ixl_pf.h
  sys/dev/ixl/ixlv.h

To: rstone, jfvogel
Cc: freebsd-net
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


[Differential] [Request, 225 lines] D1643: Implement resetting a VF

2015-01-24 Thread rstone (Ryan Stone)
rstone created this revision.
rstone added a reviewer: jfvogel.
rstone added a subscriber: freebsd-net.

REVISION SUMMARY
  Add the ability to do a full reset of a VF's state.  This involves
  stopping the VF in hardware, releasing all resources, re-allocating
  a new VSI, and finally allocating the VSI's queue resources.

REVISION DETAIL
  https://reviews.freebsd.org/D1643

AFFECTED FILES
  sys/dev/ixl/if_ixl.c
  sys/dev/ixl/ixl.h

To: rstone, jfvogel
Cc: freebsd-net
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


[Differential] [Request, 1, 330 lines] D1640: Refactor network stack state separate from VSI state

2015-01-24 Thread rstone (Ryan Stone)
rstone created this revision.
rstone added a reviewer: jfvogel.
rstone added a subscriber: freebsd-net.

REVISION SUMMARY
  Currently the ixl driver has a struct ixl_vsi that it uses to
  track both network stack interface state (e.g. the ifnet) and
  Virtual Station Interface (VSI) state in the hardware.  However,
  when the ixl driver is acting as a PF device for SR-IOV, we will
  allocate VSIs for the VFs, but won't have any network stack state
  for those VSIs in the ixl driver itself (instead the ixlv driver
  will attach to the VF device, which has its own state independent
  of the PF driver).
  
  Fix this by introducing a new structure, ixl_ifx, which will be
  used to track network stack state.  Refactor both the ixl and
  ixlv drivers to move their network stack state into this new
  structure, and retain the ixl_vsi structure to track only
  information related to details of the VSI allocated from the hw.

REVISION DETAIL
  https://reviews.freebsd.org/D1640

AFFECTED FILES
  sys/dev/ixl/if_ixl.c
  sys/dev/ixl/if_ixlv.c
  sys/dev/ixl/ixl.h
  sys/dev/ixl/ixl_pf.h
  sys/dev/ixl/ixl_txrx.c
  sys/dev/ixl/ixlv.h
  sys/dev/ixl/ixlvc.c

To: rstone, jfvogel
Cc: freebsd-net
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


[Differential] [Request, 21 lines] D1645: Add support for VERSION VC message

2015-01-24 Thread rstone (Ryan Stone)
rstone created this revision.
rstone added a reviewer: jfvogel.
rstone added a subscriber: freebsd-net.

REVISION SUMMARY
  The VC message format is versioned.  Implement the VERSION VC
  message, which the VF uses to discover the version of the VC
  protocol implemented by the PF.  The VF will not be able to
  come up if the PF's version is incompatible.

REVISION DETAIL
  https://reviews.freebsd.org/D1645

AFFECTED FILES
  sys/dev/ixl/if_ixl.c

To: rstone, jfvogel
Cc: freebsd-net
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


[Differential] [Request, 32 lines] D1647: Add support for GET_VF_RESOURCES VC message

2015-01-24 Thread rstone (Ryan Stone)
rstone created this revision.
rstone added a reviewer: jfvogel.
rstone added a subscriber: freebsd-net.

REVISION SUMMARY
  This message is sent by the VF driver to discover the capabilities
  of the VF, like the number of rx/tx queues supported.

REVISION DETAIL
  https://reviews.freebsd.org/D1647

AFFECTED FILES
  sys/dev/ixl/if_ixl.c
  sys/dev/ixl/ixl_pf.h

To: rstone, jfvogel
Cc: freebsd-net
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


[Differential] [Request, 152 lines] D1644: Add infrastructure for handling the VC msg channel from VFs

2015-01-24 Thread rstone (Ryan Stone)
rstone created this revision.
rstone added a reviewer: jfvogel.
rstone added a subscriber: freebsd-net.

REVISION SUMMARY
  The VF drivers do not have unrestricted access to the hardware.
  To configure the VF (e.g. set the MAC address), they are required
  to send a message the PF requesting the configuration.  These
  messages are passed over the "Virtual Channel" (VC).  Add the
  infrastructure required to receive Admin Queue interrupts
  indicating that a VC message has been received.  Also add functions
  for sending responses back to the VFs.
  
  At this stage no VC messages are actually handled.  Implementation
  of individual VC messages will be added in subsequent commits.

REVISION DETAIL
  https://reviews.freebsd.org/D1644

AFFECTED FILES
  sys/dev/ixl/if_ixl.c
  sys/dev/ixl/ixl_pf.h

To: rstone, jfvogel
Cc: freebsd-net
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


Re: network locks up with udp traffic

2015-01-24 Thread Dmitry Sivachenko

> On 25 янв. 2015 г., at 0:10, Adrian Chadd  wrote:
> 
> Ah, try adding STACK to your config?
> 


It's already there.
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"

[Differential] [Request, 68 lines] D1651: Add support for ENABLE/DISABLE_QUEUES VC messages

2015-01-24 Thread rstone (Ryan Stone)
rstone created this revision.
rstone added a reviewer: jfvogel.
rstone added a subscriber: freebsd-net.

REVISION SUMMARY
  These messages are sent by the VF to enable or disable packet
  reception and transmission from its queues.  Despite the fact
  that a bitmask of queues is provided in the message, this is
  ignored and all queues are either enabled or disabled.  This
  matches the behaviour of the Linux PF driver.

REVISION DETAIL
  https://reviews.freebsd.org/D1651

AFFECTED FILES
  sys/dev/ixl/if_ixl.c

To: rstone, jfvogel
Cc: freebsd-net
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


[Differential] [Request, 38 lines] D1648: Add stubs for deprecated VC messages

2015-01-24 Thread rstone (Ryan Stone)
rstone created this revision.
rstone added a reviewer: jfvogel.
rstone added a subscriber: freebsd-net.

REVISION SUMMARY
  There are a couple of VC message types defined in the enum that
  seem to have been deprecated early in the Fortville SR-IOV
  development process.  Explicitly implement them to return an
  error to document that these are intentionally not supported.

REVISION DETAIL
  https://reviews.freebsd.org/D1648

AFFECTED FILES
  sys/dev/ixl/if_ixl.c

To: rstone, jfvogel
Cc: freebsd-net
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


[Differential] [Request, 19 lines] D1646: Add support for RESET_VF VC message

2015-01-24 Thread rstone (Ryan Stone)
rstone created this revision.
rstone added a reviewer: jfvogel.
rstone added a subscriber: freebsd-net.

REVISION SUMMARY
  This VC message is used by the VF driver to request a full reset
  of the VF state.  Unlike all other VC messages, no response is
  sent to the message.

REVISION DETAIL
  https://reviews.freebsd.org/D1646

AFFECTED FILES
  sys/dev/ixl/if_ixl.c

To: rstone, jfvogel
Cc: freebsd-net
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


[Differential] [Request, 165 lines] D1650: Add support for CONFIG_IRQ_MAP VC message

2015-01-24 Thread rstone (Ryan Stone)
rstone created this revision.
rstone added a reviewer: jfvogel.
rstone added a subscriber: freebsd-net.

REVISION SUMMARY
  This message is used by the VF to request that its RX and TX
  queues be associated with particular MSI-X vectors.  This
  configuration is performed via a fairly complicated linked-list
  mechanism in the hardware.  The linked list is built up backwards
  (from the tail to the head) as it turns out to simplify the logic
  significantly.

REVISION DETAIL
  https://reviews.freebsd.org/D1650

AFFECTED FILES
  sys/dev/ixl/if_ixl.c
  sys/dev/ixl/ixl.h

To: rstone, jfvogel
Cc: freebsd-net
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


[Differential] [Request, 161 lines] D1652: Add support for ADD/DEL_ETHER_ADDRESS VC messages

2015-01-24 Thread rstone (Ryan Stone)
rstone created this revision.
rstone added a reviewer: jfvogel.
rstone added a subscriber: freebsd-net.

REVISION SUMMARY
  The ADD message is sent by the VF to request that a MAC address
  filter be added to the Fortville switch to direct packets destined
  to that MAC be routed to the VF's VSI.  The DEL message deletes
  a MAC address filter that was previously established.  This has
  security implications in a VM environment (a VM could listen in
  on packets that it's not entitled to see), so the VF has to have
  this capability enabled on it.

REVISION DETAIL
  https://reviews.freebsd.org/D1652

AFFECTED FILES
  sys/dev/ixl/if_ixl.c
  sys/dev/ixl/ixl.h
  sys/dev/ixl/ixl_pf.h

To: rstone, jfvogel
Cc: freebsd-net
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


[Differential] [Request, 49 lines] D1654: Add support for CONFIG_PROMISCUOUS_MODE VC message

2015-01-24 Thread rstone (Ryan Stone)
rstone created this revision.
rstone added a reviewer: jfvogel.
rstone added a subscriber: freebsd-net.

REVISION SUMMARY
  This message is sent by the VF driver to request that the VSI
  be placed in or taken out of promiscuous mode.

REVISION DETAIL
  https://reviews.freebsd.org/D1654

AFFECTED FILES
  sys/dev/ixl/if_ixl.c
  sys/dev/ixl/ixl_pf.h

To: rstone, jfvogel
Cc: freebsd-net
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


[Differential] [Request, 177 lines] D1649: Add support for CONFIG_VSI_QUEUES VC message

2015-01-24 Thread rstone (Ryan Stone)
rstone created this revision.
rstone added a reviewer: jfvogel.
rstone added a subscriber: freebsd-net.

REVISION SUMMARY
  This message is sent by the VF to request that the PF configure
  its RX and TX queues.  The PF is required to validate that the
  request is sane before applying the configuration.

REVISION DETAIL
  https://reviews.freebsd.org/D1649

AFFECTED FILES
  sys/dev/ixl/if_ixl.c
  sys/dev/ixl/ixl.h

To: rstone, jfvogel
Cc: freebsd-net
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


[Differential] [Request, 41 lines] D1655: Add support for GET_STATS VC message

2015-01-24 Thread rstone (Ryan Stone)
rstone created this revision.
rstone added a reviewer: jfvogel.
rstone added a subscriber: freebsd-net.

REVISION SUMMARY
  The Fortville hardware tracks a small number of per-VSI counters,
  like packet and byte counters.  The GET_STATS message is sent by
  the VF driver to request a copy of the current value of those
  counters.

REVISION DETAIL
  https://reviews.freebsd.org/D1655

AFFECTED FILES
  sys/dev/ixl/if_ixl.c

To: rstone, jfvogel
Cc: freebsd-net
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


[Differential] [Request, 121 lines] D1653: Add support for ADD/DEL_VLAN VC messages

2015-01-24 Thread rstone (Ryan Stone)
rstone created this revision.
rstone added a reviewer: jfvogel.
rstone added a subscriber: freebsd-net.

REVISION SUMMARY
  These messages are sent by the PF to change configuration related
  to the hardware vlan filtering and stripping.  If a VF is
  subscribed to one or more vlans then the vlan header will be
  stripped by the hardware, and other vlans will be filtered in
  hardware.

REVISION DETAIL
  https://reviews.freebsd.org/D1653

AFFECTED FILES
  sys/dev/ixl/if_ixl.c
  sys/dev/ixl/ixl_pf.h

To: rstone, jfvogel
Cc: freebsd-net
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


[Differential] [Request, 34 lines] D1657: Allow VFs to run while the PF is admin down

2015-01-24 Thread rstone (Ryan Stone)
rstone created this revision.
rstone added a reviewer: jfvogel.
rstone added a subscriber: freebsd-net.

REVISION SUMMARY
  Ensure that the admin queue interrupt stays enabled as long as
  we have VFs.  It is a requirement that the VFs be able to keep
  running correctly even if the PF ifnet is admin down.

REVISION DETAIL
  https://reviews.freebsd.org/D1657

AFFECTED FILES
  sys/dev/ixl/if_ixl.c

To: rstone, jfvogel
Cc: freebsd-net
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


[Differential] [Request, 65 lines] D1656: Handle VFLR events from VFs

2015-01-24 Thread rstone (Ryan Stone)
rstone created this revision.
rstone added a reviewer: jfvogel.
rstone added a subscriber: freebsd-net.

REVISION SUMMARY
  If a VF resets itself via a Function Level Reset (FLR) bit, the PF
  receives an interrupt with a VFLR event.  The PF is required to
  re-initialize the VF state when this happens.

REVISION DETAIL
  https://reviews.freebsd.org/D1656

AFFECTED FILES
  sys/dev/ixl/if_ixl.c
  sys/dev/ixl/ixl.h
  sys/dev/ixl/ixl_pf.h

To: rstone, jfvogel
Cc: freebsd-net
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


[Differential] [Request, 24 lines] D1659: Register ixl as an SR-IOV-capable driver during attach

2015-01-24 Thread rstone (Ryan Stone)
rstone created this revision.
rstone added a reviewer: jfvogel.
rstone added a subscriber: freebsd-net.

REVISION SUMMARY
  Now that the driver's SR-IOV implementation is complete, during
  attach register the device as being SR-IOV capable.  This will
  cause the SR-IOV infrastructure to create the device node in
  /dev/iov used to configure SR-IOV on this device, making it
  possible for the administrator to enable SR-IOV.

REVISION DETAIL
  https://reviews.freebsd.org/D1659

AFFECTED FILES
  sys/dev/ixl/if_ixl.c

To: rstone, jfvogel
Cc: freebsd-net
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


[Differential] [Request, 34 lines] D1658: Add sysctls for per-VF hardware counters

2015-01-24 Thread rstone (Ryan Stone)
rstone created this revision.
rstone added a reviewer: jfvogel.
rstone added a subscriber: freebsd-net.

REVISION SUMMARY
  For debugging purposes, add sysctls that reflect the value of each
  VF's hardware counters.

REVISION DETAIL
  https://reviews.freebsd.org/D1658

AFFECTED FILES
  sys/dev/ixl/if_ixl.c
  sys/dev/ixl/ixl_pf.h

To: rstone, jfvogel
Cc: freebsd-net
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


[Differential] [Request, 23 lines] D1661: Add some security-related config parameters

2015-01-24 Thread rstone (Ryan Stone)
rstone created this revision.
rstone added a reviewer: jfvogel.
rstone added a subscriber: freebsd-net.

REVISION SUMMARY
  Allow the administrator to prevent VFs from sending packets with
  a source MAC that is not the VF's MAC (anti-spoof).  Default this
  to on.
  
  Allow the administrator to give VFs the ability to override the
  MAC address that was specified at creation time.  By default VFs
  will not be permitted to do this.
  
  Allow the administrator to give the VFs the ability to enter
  promiscuous mode.

REVISION DETAIL
  https://reviews.freebsd.org/D1661

AFFECTED FILES
  sys/dev/ixl/if_ixl.c
  sys/dev/ixl/ixl_pf.h

To: rstone, jfvogel
Cc: freebsd-net
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


[Differential] [Request, 21 lines] D1660: Add support for mac-addr parameter

2015-01-24 Thread rstone (Ryan Stone)
rstone created this revision.
rstone added a reviewer: jfvogel.
rstone added a subscriber: freebsd-net.

REVISION SUMMARY
  Implement a mac-addr SR-IOV configuration parameter, which the
  administrator can specify to force a VF to use a particular MAC
  address.  By default, the VF driver cannot change its MAC address
  if it has been specified by the administrator.

REVISION DETAIL
  https://reviews.freebsd.org/D1660

AFFECTED FILES
  sys/dev/ixl/if_ixl.c
  sys/dev/ixl/ixl.h

To: rstone, jfvogel
Cc: freebsd-net
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


Re: network locks up with udp traffic

2015-01-24 Thread Adrian Chadd
On 24 January 2015 at 14:45, Dmitry Sivachenko  wrote:
>
>> On 25 янв. 2015 г., at 0:10, Adrian Chadd  wrote:
>>
>> Ah, try adding STACK to your config?
>>
>
>
> It's already there.

Hm, not sure why you're not getting the full stacks in the witness
dump. Maybe try KDB and KDB_TRACE ?



-adrian
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"

Re: network locks up with udp traffic

2015-01-24 Thread Dmitry Sivachenko

> On 25 янв. 2015 г., at 1:45, Dmitry Sivachenko  wrote:
> 
> 
>> On 25 янв. 2015 г., at 0:10, Adrian Chadd  wrote:
>> 
>> Ah, try adding STACK to your config?
>> 
> 
> 
> It's already there.


Ah, sorry, it is options DDB that was missing.  Now we have full stack:


lock order reversal:
 1st 0x80ea5588 pcbinfohash (pcbinfohash) @ /opt/WRK/src/sys/netinet6/ud
p6_usrreq.c:1202
 2nd 0x80ea5530 udp (udp) @ /opt/WRK/src/sys/netinet6/in6_pcb.c:614
KDB: stack backtrace:
db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfe0c581c1270
kdb_backtrace() at kdb_backtrace+0x39/frame 0xfe0c581c1320
witness_checkorder() at witness_checkorder+0xc04/frame 0xfe0c581c13a0
_rw_wlock_cookie() at _rw_wlock_cookie+0x45/frame 0xfe0c581c13e0
in6_pcbnotify() at in6_pcbnotify+0x12e/frame 0xfe0c581c1480
udp6_common_ctlinput() at udp6_common_ctlinput+0x111/frame 0xfe0c581c14e0
pfctlinput2() at pfctlinput2+0x7d/frame 0xfe0c581c1520
ip6_output() at ip6_output+0x15b8/frame 0xfe0c581c1780
udp6_send() at udp6_send+0x75c/frame 0xfe0c581c1910
sosend_dgram() at sosend_dgram+0x30b/frame 0xfe0c581c1980
kern_sendit() at kern_sendit+0x191/frame 0xfe0c581c1a30
sendit() at sendit+0x225/frame 0xfe0c581c1a80
sys_sendmsg() at sys_sendmsg+0x68/frame 0xfe0c581c1ae0
amd64_syscall() at amd64_syscall+0x244/frame 0xfe0c581c1bf0
Xfast_syscall() at Xfast_syscall+0xfb/frame 0xfe0c581c1bf0
--- syscall (28, FreeBSD ELF64, sys_sendmsg), rip = 0x803ec5eaa, rsp = 
0x7fffdf5f6848, rbp = 0x7fffdf5f6880 ---


lock order reversal:
 1st 0x80ea5588 pcbinfohash (pcbinfohash) @ 
/opt/WRK/src/sys/netinet6/udp6_usrreq.c:1202
 2nd 0x80ea52d8 tcp (tcp) @ /opt/WRK/src/sys/netinet6/in6_pcb.c:614
KDB: stack backtrace:
db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfe0c581c1240
kdb_backtrace() at kdb_backtrace+0x39/frame 0xfe0c581c12f0
witness_checkorder() at witness_checkorder+0xc04/frame 0xfe0c581c1370
_rw_wlock_cookie() at _rw_wlock_cookie+0x45/frame 0xfe0c581c13b0
in6_pcbnotify() at in6_pcbnotify+0x12e/frame 0xfe0c581c1450
tcp6_ctlinput() at tcp6_ctlinput+0x1a5/frame 0xfe0c581c14e0
pfctlinput2() at pfctlinput2+0x7d/frame 0xfe0c581c1520
ip6_output() at ip6_output+0x15b8/frame 0xfe0c581c1780
udp6_send() at udp6_send+0x75c/frame 0xfe0c581c1910
sosend_dgram() at sosend_dgram+0x30b/frame 0xfe0c581c1980
kern_sendit() at kern_sendit+0x191/frame 0xfe0c581c1a30
sendit() at sendit+0x225/frame 0xfe0c581c1a80
sys_sendmsg() at sys_sendmsg+0x68/frame 0xfe0c581c1ae0
amd64_syscall() at amd64_syscall+0x244/frame 0xfe0c581c1bf0
Xfast_syscall() at Xfast_syscall+0xfb/frame 0xfe0c581c1bf0
--- syscall (28, FreeBSD ELF64, sys_sendmsg), rip = 0x803ec5eaa, rsp = 
0x7fffdf5f6848, rbp = 0x7fffdf5f6880 ---



lock order reversal:
 1st 0x80ea5588 pcbinfohash (pcbinfohash) @ 
/opt/WRK/src/sys/netinet6/udp6_usrreq.c:1202
 2nd 0x80ea4740 rip (rip) @ /opt/WRK/src/sys/netinet6/in6_pcb.c:614
KDB: stack backtrace:
db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfe0c581c12b0
kdb_backtrace() at kdb_backtrace+0x39/frame 0xfe0c581c1360
witness_checkorder() at witness_checkorder+0xc04/frame 0xfe0c581c13e0
_rw_wlock_cookie() at _rw_wlock_cookie+0x45/frame 0xfe0c581c1420
in6_pcbnotify() at in6_pcbnotify+0x12e/frame 0xfe0c581c14c0
rip6_ctlinput() at rip6_ctlinput+0x70/frame 0xfe0c581c14e0
pfctlinput2() at pfctlinput2+0x7d/frame 0xfe0c581c1520
ip6_output() at ip6_output+0x15b8/frame 0xfe0c581c1780
udp6_send() at udp6_send+0x75c/frame 0xfe0c581c1910
sosend_dgram() at sosend_dgram+0x30b/frame 0xfe0c581c1980
kern_sendit() at kern_sendit+0x191/frame 0xfe0c581c1a30
sendit() at sendit+0x225/frame 0xfe0c581c1a80
sys_sendmsg() at sys_sendmsg+0x68/frame 0xfe0c581c1ae0
amd64_syscall() at amd64_syscall+0x244/frame 0xfe0c581c1bf0
Xfast_syscall() at Xfast_syscall+0xfb/frame 0xfe0c581c1bf0
--- syscall (28, FreeBSD ELF64, sys_sendmsg), rip = 0x803ec5eaa, rsp = 
0x7fffdf5f6848, rbp = 0x7fffdf5f6880 ---
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"

Re: network locks up with udp traffic

2015-01-24 Thread Adrian Chadd
ok, cool. You definitely have enough for a freebsd bug report.

Would you mind adding it? https://bugs.freebsd.org/submit/



-a


On 24 January 2015 at 15:07, Dmitry Sivachenko  wrote:
>
>> On 25 янв. 2015 г., at 1:45, Dmitry Sivachenko  wrote:
>>
>>
>>> On 25 янв. 2015 г., at 0:10, Adrian Chadd  wrote:
>>>
>>> Ah, try adding STACK to your config?
>>>
>>
>>
>> It's already there.
>
>
> Ah, sorry, it is options DDB that was missing.  Now we have full stack:
>
>
> lock order reversal:
>  1st 0x80ea5588 pcbinfohash (pcbinfohash) @ 
> /opt/WRK/src/sys/netinet6/ud
> p6_usrreq.c:1202
>  2nd 0x80ea5530 udp (udp) @ /opt/WRK/src/sys/netinet6/in6_pcb.c:614
> KDB: stack backtrace:
> db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfe0c581c1270
> kdb_backtrace() at kdb_backtrace+0x39/frame 0xfe0c581c1320
> witness_checkorder() at witness_checkorder+0xc04/frame 0xfe0c581c13a0
> _rw_wlock_cookie() at _rw_wlock_cookie+0x45/frame 0xfe0c581c13e0
> in6_pcbnotify() at in6_pcbnotify+0x12e/frame 0xfe0c581c1480
> udp6_common_ctlinput() at udp6_common_ctlinput+0x111/frame 0xfe0c581c14e0
> pfctlinput2() at pfctlinput2+0x7d/frame 0xfe0c581c1520
> ip6_output() at ip6_output+0x15b8/frame 0xfe0c581c1780
> udp6_send() at udp6_send+0x75c/frame 0xfe0c581c1910
> sosend_dgram() at sosend_dgram+0x30b/frame 0xfe0c581c1980
> kern_sendit() at kern_sendit+0x191/frame 0xfe0c581c1a30
> sendit() at sendit+0x225/frame 0xfe0c581c1a80
> sys_sendmsg() at sys_sendmsg+0x68/frame 0xfe0c581c1ae0
> amd64_syscall() at amd64_syscall+0x244/frame 0xfe0c581c1bf0
> Xfast_syscall() at Xfast_syscall+0xfb/frame 0xfe0c581c1bf0
> --- syscall (28, FreeBSD ELF64, sys_sendmsg), rip = 0x803ec5eaa, rsp = 
> 0x7fffdf5f6848, rbp = 0x7fffdf5f6880 ---
>
>
> lock order reversal:
>  1st 0x80ea5588 pcbinfohash (pcbinfohash) @ 
> /opt/WRK/src/sys/netinet6/udp6_usrreq.c:1202
>  2nd 0x80ea52d8 tcp (tcp) @ /opt/WRK/src/sys/netinet6/in6_pcb.c:614
> KDB: stack backtrace:
> db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfe0c581c1240
> kdb_backtrace() at kdb_backtrace+0x39/frame 0xfe0c581c12f0
> witness_checkorder() at witness_checkorder+0xc04/frame 0xfe0c581c1370
> _rw_wlock_cookie() at _rw_wlock_cookie+0x45/frame 0xfe0c581c13b0
> in6_pcbnotify() at in6_pcbnotify+0x12e/frame 0xfe0c581c1450
> tcp6_ctlinput() at tcp6_ctlinput+0x1a5/frame 0xfe0c581c14e0
> pfctlinput2() at pfctlinput2+0x7d/frame 0xfe0c581c1520
> ip6_output() at ip6_output+0x15b8/frame 0xfe0c581c1780
> udp6_send() at udp6_send+0x75c/frame 0xfe0c581c1910
> sosend_dgram() at sosend_dgram+0x30b/frame 0xfe0c581c1980
> kern_sendit() at kern_sendit+0x191/frame 0xfe0c581c1a30
> sendit() at sendit+0x225/frame 0xfe0c581c1a80
> sys_sendmsg() at sys_sendmsg+0x68/frame 0xfe0c581c1ae0
> amd64_syscall() at amd64_syscall+0x244/frame 0xfe0c581c1bf0
> Xfast_syscall() at Xfast_syscall+0xfb/frame 0xfe0c581c1bf0
> --- syscall (28, FreeBSD ELF64, sys_sendmsg), rip = 0x803ec5eaa, rsp = 
> 0x7fffdf5f6848, rbp = 0x7fffdf5f6880 ---
>
>
>
> lock order reversal:
>  1st 0x80ea5588 pcbinfohash (pcbinfohash) @ 
> /opt/WRK/src/sys/netinet6/udp6_usrreq.c:1202
>  2nd 0x80ea4740 rip (rip) @ /opt/WRK/src/sys/netinet6/in6_pcb.c:614
> KDB: stack backtrace:
> db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfe0c581c12b0
> kdb_backtrace() at kdb_backtrace+0x39/frame 0xfe0c581c1360
> witness_checkorder() at witness_checkorder+0xc04/frame 0xfe0c581c13e0
> _rw_wlock_cookie() at _rw_wlock_cookie+0x45/frame 0xfe0c581c1420
> in6_pcbnotify() at in6_pcbnotify+0x12e/frame 0xfe0c581c14c0
> rip6_ctlinput() at rip6_ctlinput+0x70/frame 0xfe0c581c14e0
> pfctlinput2() at pfctlinput2+0x7d/frame 0xfe0c581c1520
> ip6_output() at ip6_output+0x15b8/frame 0xfe0c581c1780
> udp6_send() at udp6_send+0x75c/frame 0xfe0c581c1910
> sosend_dgram() at sosend_dgram+0x30b/frame 0xfe0c581c1980
> kern_sendit() at kern_sendit+0x191/frame 0xfe0c581c1a30
> sendit() at sendit+0x225/frame 0xfe0c581c1a80
> sys_sendmsg() at sys_sendmsg+0x68/frame 0xfe0c581c1ae0
> amd64_syscall() at amd64_syscall+0x244/frame 0xfe0c581c1bf0
> Xfast_syscall() at Xfast_syscall+0xfb/frame 0xfe0c581c1bf0
> --- syscall (28, FreeBSD ELF64, sys_sendmsg), rip = 0x803ec5eaa, rsp = 
> 0x7fffdf5f6848, rbp = 0x7fffdf5f6880 ---
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"

[Bug 197059] network locks up with IPv6 udp traffic

2015-01-24 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=197059

Bug ID: 197059
   Summary: network locks up with IPv6 udp traffic
   Product: Base System
   Version: 10.0-STABLE
  Hardware: Any
OS: Any
Status: New
  Severity: Affects Only Me
  Priority: ---
 Component: kern
  Assignee: freebsd-b...@freebsd.org
  Reporter: de...@freebsd.org
CC: adr...@freebsd.org, freebsd-net@FreeBSD.org

Hello!

I am using FreeBSD-10/stable.  We have a program at work that transmits data
via UDP.
When I run several instances of this program simultaneously, after a few
seconds network stops working.
If I login from console, I see some network daemons like ntpd, snmpd are in
"*udp" state.

If I try to deal with network interface (ifconfig igb0 for instance), ifconfig
utility stuck in "L" state (Marks a process that is waiting to acquire a
lock.).
I found the only way to fix that: reboot.

What can be the cause for such a behaviour?

lock order reversal:
1st 0x80ea5588 pcbinfohash (pcbinfohash) @ /opt/WRK/src/sys/netinet6/ud
p6_usrreq.c:1202
2nd 0x80ea5530 udp (udp) @ /opt/WRK/src/sys/netinet6/in6_pcb.c:614
KDB: stack backtrace:
db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfe0c581c1270
kdb_backtrace() at kdb_backtrace+0x39/frame 0xfe0c581c1320
witness_checkorder() at witness_checkorder+0xc04/frame 0xfe0c581c13a0
_rw_wlock_cookie() at _rw_wlock_cookie+0x45/frame 0xfe0c581c13e0
in6_pcbnotify() at in6_pcbnotify+0x12e/frame 0xfe0c581c1480
udp6_common_ctlinput() at udp6_common_ctlinput+0x111/frame 0xfe0c581c14e0
pfctlinput2() at pfctlinput2+0x7d/frame 0xfe0c581c1520
ip6_output() at ip6_output+0x15b8/frame 0xfe0c581c1780
udp6_send() at udp6_send+0x75c/frame 0xfe0c581c1910
sosend_dgram() at sosend_dgram+0x30b/frame 0xfe0c581c1980
kern_sendit() at kern_sendit+0x191/frame 0xfe0c581c1a30
sendit() at sendit+0x225/frame 0xfe0c581c1a80
sys_sendmsg() at sys_sendmsg+0x68/frame 0xfe0c581c1ae0
amd64_syscall() at amd64_syscall+0x244/frame 0xfe0c581c1bf0
Xfast_syscall() at Xfast_syscall+0xfb/frame 0xfe0c581c1bf0
--- syscall (28, FreeBSD ELF64, sys_sendmsg), rip = 0x803ec5eaa, rsp =
0x7fffdf5f6848, rbp = 0x7fffdf5f6880 ---


lock order reversal:
1st 0x80ea5588 pcbinfohash (pcbinfohash) @
/opt/WRK/src/sys/netinet6/udp6_usrreq.c:1202
2nd 0x80ea52d8 tcp (tcp) @ /opt/WRK/src/sys/netinet6/in6_pcb.c:614
KDB: stack backtrace:
db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfe0c581c1240
kdb_backtrace() at kdb_backtrace+0x39/frame 0xfe0c581c12f0
witness_checkorder() at witness_checkorder+0xc04/frame 0xfe0c581c1370
_rw_wlock_cookie() at _rw_wlock_cookie+0x45/frame 0xfe0c581c13b0
in6_pcbnotify() at in6_pcbnotify+0x12e/frame 0xfe0c581c1450
tcp6_ctlinput() at tcp6_ctlinput+0x1a5/frame 0xfe0c581c14e0
pfctlinput2() at pfctlinput2+0x7d/frame 0xfe0c581c1520
ip6_output() at ip6_output+0x15b8/frame 0xfe0c581c1780
udp6_send() at udp6_send+0x75c/frame 0xfe0c581c1910
sosend_dgram() at sosend_dgram+0x30b/frame 0xfe0c581c1980
kern_sendit() at kern_sendit+0x191/frame 0xfe0c581c1a30
sendit() at sendit+0x225/frame 0xfe0c581c1a80
sys_sendmsg() at sys_sendmsg+0x68/frame 0xfe0c581c1ae0
amd64_syscall() at amd64_syscall+0x244/frame 0xfe0c581c1bf0
Xfast_syscall() at Xfast_syscall+0xfb/frame 0xfe0c581c1bf0
--- syscall (28, FreeBSD ELF64, sys_sendmsg), rip = 0x803ec5eaa, rsp =
0x7fffdf5f6848, rbp = 0x7fffdf5f6880 ---



lock order reversal:
1st 0x80ea5588 pcbinfohash (pcbinfohash) @
/opt/WRK/src/sys/netinet6/udp6_usrreq.c:1202
2nd 0x80ea4740 rip (rip) @ /opt/WRK/src/sys/netinet6/in6_pcb.c:614
KDB: stack backtrace:
db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfe0c581c12b0
kdb_backtrace() at kdb_backtrace+0x39/frame 0xfe0c581c1360
witness_checkorder() at witness_checkorder+0xc04/frame 0xfe0c581c13e0
_rw_wlock_cookie() at _rw_wlock_cookie+0x45/frame 0xfe0c581c1420
in6_pcbnotify() at in6_pcbnotify+0x12e/frame 0xfe0c581c14c0
rip6_ctlinput() at rip6_ctlinput+0x70/frame 0xfe0c581c14e0
pfctlinput2() at pfctlinput2+0x7d/frame 0xfe0c581c1520
ip6_output() at ip6_output+0x15b8/frame 0xfe0c581c1780
udp6_send() at udp6_send+0x75c/frame 0xfe0c581c1910
sosend_dgram() at sosend_dgram+0x30b/frame 0xfe0c581c1980
kern_sendit() at kern_sendit+0x191/frame 0xfe0c581c1a30
sendit() at sendit+0x225/frame 0xfe0c581c1a80
sys_sendmsg() at sys_sendmsg+0x68/frame 0xfe0c581c1ae0
amd64_syscall() at amd64_syscall+0x244/frame 0xfe0c581c1bf0
Xfast_syscall() at Xfast_syscall+0xfb/frame 0xfe0c581c1bf0
--- syscall (28, FreeBSD ELF64, sys_sendmsg), rip = 0x803ec5eaa, rsp =
0x7fffdf5f6848, rbp = 0x7fffdf5f6880 ---

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___