Re: kern/154676: [netgraph] [panic] HEAD, 8.1-RELEASE panic after some play with netgraph

2011-04-15 Thread Sergey V. Dyatko
The following reply was made to PR kern/154676; it has been noted by GNATS. From: "Sergey V. Dyatko" To: bug-follo...@freebsd.org Cc: Subject: Re: kern/154676: [netgraph] [panic] HEAD, 8.1-RELEASE panic after some play with netgraph Date: Fri, 15 Apr 2011 12:06:04 +0300 Hi, Arnaud and gl

Re: kern/154676: [netgraph] [panic] HEAD, 8.1-RELEASE panic after some play with netgraph

2011-04-15 Thread Sergey V. Dyatko
The following reply was made to PR kern/154676; it has been noted by GNATS. From: "Sergey V. Dyatko" To: bug-follo...@freebsd.org Cc: Subject: Re: kern/154676: [netgraph] [panic] HEAD, 8.1-RELEASE panic after some play with netgraph Date: Fri, 15 Apr 2011 12:48:34 +0300 Hi, ops, adri

Re: kern/154676: [netgraph] [panic] HEAD, 8.1-RELEASE panic after some play with netgraph

2011-04-15 Thread glebius
Synopsis: [netgraph] [panic] HEAD, 8.1-RELEASE panic after some play with netgraph State-Changed-From-To: open->patched State-Changed-By: glebius State-Changed-When: Fri Apr 15 10:02:54 UTC 2011 State-Changed-Why: Fixed in head. http://www.freebsd.org/cgi/query-pr.cgi?pr=154676

bge(4) + asf

2011-04-15 Thread Sean Bruno
So, I note that the tuneable bge_allow_asf is set to 0. This effectively disabled IPMI for a few controllers that I have. Is there any reason to *not* turn it on? Sean if_bge.c:: static int bge_allow_asf = 0; TUNABLE_INT("hw.bge.allow_asf", &bge_allow_asf); bge0@pci0:1:0:0:class=0x0

Re: bge(4) + asf

2011-04-15 Thread Miroslav Lachman
Sean Bruno wrote: So, I note that the tuneable bge_allow_asf is set to 0. This effectively disabled IPMI for a few controllers that I have. Is there any reason to *not* turn it on? Sean if_bge.c:: static int bge_allow_asf = 0; TUNABLE_INT("hw.bge.allow_asf",&bge_allow_asf); There were s

tcpdump allocates more mbufs than allowed by bpf(4)?

2011-04-15 Thread Garrett Cooper
Hello, I did some poking around tcpdump for work today, and while doing that I ran into this item... $ sysctl net.bpf net.bpf.zerocopy_enable: 0 net.bpf.maxinsns: 512 net.bpf.maxbufsize: 524288 net.bpf.bufsize: 4096 Before I start tcpdump: $ vmstat -m | grep BPF BPF2612