xes without config.
It is good feature, as it allow to have addresses only in on place
for simple configs. And duplication of information (addresses in rc.conf
and rtadvd.conf, DNSes in resolv.conf and rtadvd.conf) looks
excessive.
--
// Bl
Hello, Freebsd-net.
Does queue/sched masks work with IPv6 addresses? I can not find any
examples for this, all examples are with 32-bit masks only...
--
// Black Lion AKA Lev Serebryakov
___
freebsd-net@freebsd.org mailing list
http
underlying interface
yet?
Is here any way to reset state of only ONE stateful ipfw rule from
command line, which could be work-around for me?
--
// Black Lion AKA Lev Serebryakov
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.
T, on any computer in my network, different
channels (read: different mcast addresses) from different computers?
Here are some discussions on forums, but almost all of them are about
7-STABLE era and results is very controversial.
--
// Black Lion AKA Lev Serebr
domain, it is not possible in my case :(
After reading many archives and forums (it is strange, but no new
material on this topic can be found), it seems to me, that igmpproxy
0.1 is only solution in my case, and it is buggy.
--
// Black Lion AKA L
e sent, buffers are overfilled, only full reset
helps (after "ifconfig wm0 down && ifconfig em0 up" ping starts to
report "Host is down" for any remote host, instead of "No buffer space
available")...
8-STABLE, 7.2.3 driver, amd64, 825
sts for mbufs denied (mbufs/clusters/mbuf+clusters)
0/0/0 requests for jumbo clusters denied (4k/9k/16k)
0/0/0 sfbufs in use (current/peak/max)
0 requests for sfbufs denied
0 requests for sfbufs delayed
0 requests for I/O initiated by sendfile
0 calls to protocol drain routines
--
// Black Lion AKA
my network. But `netstat -i' shows
0 input errors / 0 output errors / 0 collistion on physical
interface, which is if_vr.
Could I belive in these stats? Does if_vr export proper error
statistics?
--
// Black Lion AKA
,
specifications...
And prices ARE different: $100 vs $50...
--
// Black Lion AKA Lev Serebryakov <[EMAIL PROTECTED]>
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"
e here any guides how to tune NFS for performance?
--
// Black Lion AKA Lev Serebryakov <[EMAIL PROTECTED]>
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"
Xin LI wrote:
What I usually use is:
mount_nfs -3Tr 262144 -w 262144
Yep, it helps to double speed. Much better.
How should these options translates to /etc/fstab options?
--
// Lev Serebryakov
___
freebsd-net@freebsd.org mailing list
http
(AL2230)) supported?
Are here any Atheros-based (5212?) MiniPCI cards on marked?
Is Atheros 802.11n chipset (as found on TP-Link TL-WN861N 300N) supported?
--
// Black Lion AKA Lev Serebryakov
___
freebsd-net@freebsd.org mailing list
http
"WLAN
for Home, Office and Metro Wi-Fi" and "WLAN for Mobile" (BTW, link to
http://customerproducts.atheros.com/ doesn't work anymore).
Is here full list of supported chipsets, and, maybe, some table with
chipsets features (AES, WPA2, AP mode, etc)
good idea?
Are current MiniPCI versions (AR5006[suffix]) supported by RELENG_7
HAL?
--
// Black Lion AKA Lev Serebryakov
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to
or other tunnel end already (because it IS VPN server
and we NEED routing to it to CREATE tunnel!), me can not assign tunnel
interface address and connection fails :( I don't see any workaround
for this :(
--
// Black Lion AKA Lev Serebryakov
___
, but adding
fake addresses to vr2 and vr3 doesn't help at all.
Also, mpd5 creates two NG interfaces (ng0 and ng1) on startup to connect to two
providers.
But previous installation (on faster hardware) doesn't show these
errors at all!
--
// Black Lion AKA
ot servers. Ok. But this knowledge doesn't
help to fix problem :(
> Main problem is, that mount_nfs failed on startup on this router
> because bind is not ready due to these errors and all system goes to
> single-user mode :(
--
// Bl
his is an mpd problem - I had the same issue and I couldn't find a
> solution. In the end I switched to userland PPP (which has an issue with PF
> but you can work around that).
userland ppp doesn't support l2tp :(
--
// Black Lion AKA Lev Serebryakov
__
his is an mpd problem - I had the same issue and I couldn't find a
> solution. In the end I switched to userland PPP (which has an issue with PF
> but you can work around that).
userland ppp doesn't support l2tp :(
--
// Black Lion AKA Lev Serebryakov
ot servers. Ok. But this knowledge doesn't
help to fix problem :(
> Main problem is, that mount_nfs failed on startup on this router
> because bind is not ready due to these errors and all system goes to
> single-user mode :(
--
// Bl
, but adding
fake addresses to vr2 and vr3 doesn't help at all.
Also, mpd5 creates two NG interfaces (ng0 and ng1) on startup to connect to two
providers.
But previous installation (on faster hardware) doesn't show these
errors at all!
--
// Black Lion AKA
ain: 0
hw.ath.countrycode: 0
hw.ath.xchanmode: 1
hw.ath.outdoor: 1
hw.ath.calibrate: 30
--
// Black Lion AKA Lev Serebryakov
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail
Hello, Freebsd-net.
I'm getting this error on every operation with new Atheros MiniPCI
card:
ath0: ath_chan_set: unable to reset channel 6 (2437 Mhz, flags 0x490 hal flags
0x150), hal status 12
What does it mean? Maybe, card is broken?
--
// Black Lion AKA Lev Serebr
ic turbo mode. I can't recall how that's done on RELENG_7; consult
> ifconfig(8).
ifconfig ath0 -dturbo
Here is one problem: right after this request I get the same error
message again...
--
// Black Lion AKA Lev Serebryakov
___
freebs
helps. It seems, that when traffic is reauuly huge, system
with ath need a lot of mbufs. At night, when traffic is almost zero,
netstat -m shows a lot of free mbufs and clusters, so it seems, that
there is no mbuf leaks.
--
// Black Lion AKA Lev Serebryakov
_
oth uses DHCP!), for example.
--
// Black Lion AKA Lev Serebryakov
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"
cOS X / Linux), as tunnel is created
via binary browser plugin.
Is it possible to emulate this on FreeBSD? rdesktop from ports should
work as client, as I access standard Windows system, but I need some
way to emulate this VPN tunnel. Is it possible?
- --
// Lev Serebryakov
-BEGIN PGP SIGN
nux. For
example, here are script (jvpn.pl), which emulates browser, but it
loads Linux-specific share object from browser plugin (libncui.so) and
calls Linux binary (ncsvc), and it will not natively work under FreeBSD.
Linux emulator is my last resort, but maybe, here are some other ways?
- --
uter" option
could be different (looks like load-balancing).
Is here any way to solve this "source based routing" problem without
changing rules in firewall on each DHCP lease re-acquisition?
- --
// Lev Serebryakov
-BEGIN PGP SIGNATURE-
Version: GnuP
cmd
;; connection timed out; no servers could be reached
%
Problem is, latest bind (9.9 from ports) send such requests over UDP,
not TCP.
Is it Ok? Is it misconfiguration of my networks (I have such problem
in tow different installations) or something?
- --
// Lev Serebryakov
-BEGIN PG
re
> reliably.
Unfortunately, I need recursive resolver for my network and
authoritative server (with views!) on one host. unbound could not do
that, so I'm using bind from ports on CURRENT.
- --
// Lev Serebryakov
-BEGIN PGP SIGNATURE-
Version: GnuPG
; (it doesn't have UDP
header!), it doesn't pass through stateful firewall... I see now.
Thank you.
> You can add something like the following to the start of the IPFW
> ruleset to work around it (one for each NIC):
>
> $IPFW add reass ip from any to any in recv $NIC0 $IPFW
become even worse, as rul 12700 doesn't see second
outbound packet (because it is intercepted by "nat global") and TTL of
dynamic rule becomes 10 seconds! I don't see any way to achieve my
goal with "nat global", exactly because "skipto keep-state" should
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 30.01.2015 03:37, Lev Serebryakov wrote:
> Is here better way to have nat and stateful ruleset?
Actions like "create-dyn-allow" and "create-dyn-deny" will be very
nice, BTW :) But looks like it is hard to add, a
inwards and outwards
> packets for the external interface into two different sets of
> rules (and another set for other interfaces).
Yep, it is exactly what I do, these two groups of rules are not only
rules, of course.
- --
// Lev Serebryakov AKA Black Lion
-
ough.
Could you please show variant for 4 ISP links? :)
- --
// Lev Serebryakov
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (MingW32)
iQJ8BAEBCgBmBQJUy6WZXxSAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w
ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXRGOTZEMUNBMEI1RjQzMThCNjc0QjMzMEFF
QUIwM0M1OEJGREM0Nzh
ing table) fibnum in
any subsequent forwarding decisions.""
But according to ip_output.c (around line 527) "setfib" FORCES to
make NEW decision!
Do I read sources right? Maybe, wording in ipfw(8) should be changed?
- --
// Lev Serebryakov AKA Black Lion
-B
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Is it possible to add routes, passed from DHCP server, not to default
FIB but to FIB specified in /etc/dhclient.conf?
- --
// Lev Serebryakov AKA Black Lion
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (MingW32
cquire
configuration information from my ISP, but apply "default route" not
to default FIB. It is why I mention "/etc/dhclient.conf" :)
- --
// Lev Serebryakov
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (MingW32)
iQJ8BAEBCgBmBQJUz3o+XxSAAC4AKGlzc3V
000 state-allow from any to any // keep-state is implied
add 2010 nat NR from any to any // No "out" here!
add 2020 allow all from any to any
add 3000 nat NR from any to any
add 3010 check-state // Use dynamic rule based on 2000 as "allow" here
What do you think?
- --
//
d looks like, it is possible.
Please, look at sys/netinet/ip_output.c, lines 493-535.
It checks, did packet filter change (a) destination address or (b)
FIB, and if it does, it re-run routing decision.
So, it will work "as expected" and only documentation need fix :)
- --
// Lev Se
7;t solve problem of ugliness of hacks we
need use to add statefullness.
> looking at my own rules I don't seem to have a problem..
You have "check-state" only once, on entrance, before all NATs, so
it could work only for packets which don't need NAT. And looks like
(corr
so you
could not have ANOTHER "keep-state" before NAT in outgoing part or you
miss nat completely (sate is created in outgoing path, and then
checked before nat in outgoing path with "keep-state", gr, ugly!).
- --
// Lev Ser
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 03.02.2015 12:30, Lev Serebryakov wrote:
> "keep-state". Problem is, it adds "if" branch for EACH action (in
> kernel code). IMHO, it is very prohibitive. I've though about
> that, but decide it is too expen
pid "skipto", no "keep-state" at "incoming from local
network" parts of firewall, nothing!
P.S. I HATE this "all any to any" part!
- --
// Lev Serebryakov
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (MingW32)
iQJ8BAEBCgBmBQJU0POaXxSAAC4AKGlzc3Vlc
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 03.02.2015 19:13, Lev Serebryakov wrote:
> Ok, "allow-state"/"deny-state" was very limited idea. Here is more
> universal mechanism: new "keep-state-only" (aliased as
> "record-only") option,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 03.02.2015 19:55, Lev Serebryakov wrote:
>> Ok, "allow-state"/"deny-state" was very limited idea. Here is
>> more universal mechanism: new "keep-state-only" (aliased as
>> "record-o
t work.
Rule 30050 (udp one) HAS counters increased, but what is REALLY
strange, is that 11040 and 11050 (two NAT actions) always have SAME
counters, as if 11040 never change destination address. Nut 30050 sees
some packets!
Is "nat redirect_port tcp" broken in -CURRENT or do I do
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 05.02.2015 01:16, Lev Serebryakov wrote:
> nat 9 config redirect_port tcp 192.168.134.2:16881 16881
> redirect_port udp 192.158.134.2:16881 16881 redirect_port tcp
> 192.168.134.2:22 2
Also, if I add "log" to this config
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 05.02.2015 01:16, Lev Serebryakov wrote:
> I have such rules in my firewall:
>
> nat 9 config redirect_port tcp 192.168.134.2:16881 16881
> redirect_port udp 192.158.134.2:16881 16881 redirect_port tcp
> 192.168.134.2:22 2
&g
> other hand...
reass works for me, but kills all IPv6 packets, so it should be "reass
ip4 from any to any in [recv $iface]"
- --
// Lev Serebryakov AKA Black Lion
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (MingW32)
iQJ8BA
reass code
> messes around with layer2...
Looks like, reass messes around with anything but ip4 in one way or
other.
- --
// Lev Serebryakov
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (MingW32)
iQJ8BAEBCgBmBQJU2gwHXxSAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w
ZW5wZ3AuZml
The following reply was made to PR kern/121298; it has been noted by GNATS.
From: Lev Serebryakov <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED], [EMAIL PROTECTED]
Cc:
Subject: Re: kern/121298: [em] [panic] Fatal trap 12: page fault while in
kernel mode (em0 taskq)
Date: Fri, 23 May 2008 21
off. Always. It is
enabled on WinXP client, it is enabled on FreeBSD server, it us used
by iperf (with great effect), but not by samba! What do I do wrong?
--
// Black Lion AKA Lev Serebryakov <[EMAIL PROTECTED]>
___
freebsd-net@freebsd.org mail
/s? Really? Looks like a bug.
--
// Lev Serebryakov
signature.asc
Description: OpenPGP digital signature
coded.
--
// Lev Serebryakov
signature.asc
Description: OpenPGP digital signature
hread_loop fork_exit
fork_trampoline
11 100060 intr irq278: igb0:que 2 mi_switch ithread_loop fork_exit
fork_trampoline
11 100062 intr irq279: igb0:que 3 mi_switch ithread_loop fork_exit
fork_trampoline
%
--
// Lev Serebryakov
signature.asc
Description: OpenPGP digital signature
this state timeouts ssh connections):
% sysctl -a | grep igb | xz -9 > (attached)
--
// Lev Serebryakov
igb.sysctl.txt.xz
Description: Binary data
signature.asc
Description: OpenPGP digital signature
On 09.11.2017 23:23, Michael Sierchio wrote:
Nope.
> Is device polling enabled?
>
> - M
>
> On Thu, Nov 9, 2017 at 12:17 PM, Lev Serebryakov wrote:
>
>>
>> I still have problems with my E-1220v3 server equipped with Intel I210
>> adapter. It can not be l
ml
>
> Finally you should need to apply r307551 + r324179/r324193.
These fixes for situation when here is pure 100% load and it could not
be fixed without reboot. My case is "near 100%" load and it heals itself
after some time (hours).
--
// Lev Serebryakov
signature.asc
Description: OpenPGP digital signature
On 09.11.2017 23:17, Lev Serebryakov wrote:
Looks like I know where it spent all time. I've used 'pmcstat' and got
very suspicious flamegraph. Looks like problem is on codepath which lies
through
igb_refresh_mbufs
m_getjcl
uma_zalloc_arg
[zone_alloc_item]
zone_import
On 20.11.2017 19:27, Ryan Stone wrote:
> Please try the following patch. It should resolve your issue:
> https://people.freebsd.org/~rstone/patches/e1000-9k.diff
Thank you, I'll try! Really, typically I don't have this problem for
~week after reboot, so results will be la
pa
;; 18.134.168.192.in-addr.arpa. IN PTR
18.134.168.192.in-addr.arpa.3079IN PTR
sandcat.home.serebryakov.spb.ru.
--
// Lev Serebryakov
___
freebsd-net@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-net
To u
load (pure transit traffic).
when system is unresponsive I see this in `top -SH`
100083 root -76 - 0K 272K - 1 291.8H 95.31% kernel{if_io_tqg_1}
100082 root -76 - 0K 272K - 0 297.7H 95.20% kernel{if_io_tqg_0}
And it is new to me.
--
// Lev Serebryakov
signature.asc
D
On 13.07.2018 14:10, Lev Serebryakov wrote:
> when system is unresponsive I see this in `top -SH`
>
> 100083 root -76 - 0K 272K - 1 291.8H 95.31% kernel{if_io_tqg_1}
> 100082 root -76 - 0K 272K - 0 297.7H 95.20% kernel{if_io_tqg_0}
>
> And it is new to me.
272K - 1 291.8H 95.31% kernel{if_io_tqg_1}
>> 100082 root -76 - 0K 272K - 0 297.7H 95.20% kernel{if_io_tqg_0}
>>
>> And it is new to me.
>
> I'm sure you will get it solved more quick if you perform bisection of
> revision
> even though
your hardware.
>
> Regards,
> Kevin
>
> On Tue, Jul 17, 2018 at 6:03 AM, Lev Serebryakov wrote:
>> On 17.07.2018 10:54, Eugene Grosbein wrote:
>>
>>>> I have "SOHO" router on Atom D2500 with FreeBSD CURRENT. It runs
>>>> CURRENT for very lo
dev.em.1.iflib.tx_abdicate: 0
dev.em.0.iflib.tx_abdicate: 0
makes worse, not better (100% CPU load by `kernel{if_io_tqg_X}' even
under very light traffic load).
--
// Lev Serebryakov
signature.asc
Description: OpenPGP digital signature
ork_exit() at fork_exit+0x84/frame 0xfe44aab0
fork_trampoline() at fork_trampoline+0xe/frame 0xfe44aab0
--
// Lev Serebryakov
___
freebsd-net@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send
Hello Net,
I have two systems with almost identical NICs: one with igb, chip=0x15338086,
with FreeBSD
11-STABLE and other with igb, chip=0x157b8086 and FreeBSD 12-ALPHA6
installed.
All options are turned ON, mtu=9000 on both ends.
When I send single TCP stream from 12-ALPHA6 to 11-STABLE I
Hello Lev,
Saturday, September 22, 2018, 11:52:07 PM, you wrote:
> Yes, I know, that CPUs on these systems are very different, but looks like
> it is driver regression.
I prove myself wrong. 11.2-RELEASE memstick shows same speed skew.
--
Best regards,
Levmailto:
Hello Lev,
Saturday, September 22, 2018, 11:52:07 PM, you wrote:
> Any hints?
I don't know why, but "server" host could not send more than 710Mbit/s with
Ethernet flow control turned on. Turning flow control off helps.
--
Best regards,
Levmailto:l...@freebsd.org
onfig igb0 mtu 1500 down up
ifconfig igb0 mtu 9000 down up
it is limited again, looks like this action sequence reset flow control
setting (but not sysctl, it is still 0).
sysctl dev.igb.0.fc=3 dev.igb.0.fc=0
helps till next MTU switch.
--
// Lev Serebr
I have reproducible crash of ALPHA7 when I try to benchmark IPsec.
Could somebody look at it? I could provide additional info, if needed.
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=231659
--
// Lev Serebryakov
___
freebsd-net@freebsd.org
reproduce this crash on 11.2-STABLE, so it is regression.
I could provide kernel binaries and corresponding crashdumps, test any
patches, etc.
--
// Lev Serebryakov
signature.asc
Description: OpenPGP digital signature
Hello Eugene,
Saturday, October 13, 2018, 10:04:26 AM, you wrote:
>> https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=231659
>>
>> --- Comment #43 from Lev A. Serebryakov ---
>> (In reply to Eric Joyner from comment #36)
>> Yess!
>>
>> It helps em0 to pass all my torture tests (when I commen
Hello Eugene,
Saturday, October 13, 2018, 6:35:38 PM, you wrote:
>>> erj@ just did it, try updating to r339338
>> Are you sure?
> Sorry, I missed you need an update to all of ix/em/igb.
Yep, I have problem with em and igb, as I reported in this PR. I can not
reproduce it in ix, but I'm sure it
Now, when FreeBSD 12 have ChaCha20 and Poly1305 support in kernel, are
here any plans to add support of RFC7634 to IPsec?
--
// Lev Serebryakov
___
freebsd-net@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-net
To
ase note, that I'm testing endpoint, not a router, so netmap-based
packet generators & receivers is no use for me, unfortunately.
--
// Lev Serebryakov
___
freebsd-net@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-
Hello Eugene,
Friday, October 19, 2018, 10:45:50 PM, you wrote:
>> Please note, that I'm testing endpoint, not a router, so netmap-based
>> packet generators & receivers is no use for me, unfortunately.
> Try benchmarks/wrk. It works pretty well for speeds lower than 40Gbit/s
> but its version
Hello Eugene,
Saturday, October 20, 2018, 12:18:01 AM, you wrote:
Please note, that I'm testing endpoint, not a router, so netmap-based
packet generators & receivers is no use for me, unfortunately.
>>> Try benchmarks/wrk. It works pretty well for speeds lower than 40Gbit/s
>>> but its
Hello Eugene,
Saturday, October 20, 2018, 2:23:29 AM, you wrote:
> You do not need to micro-control this. The wrk provides you with nice stats
> plus you have counters of "systat -ifstat 1" during long test.
>> All these tools — wrk, nginx — are optimized for many concurrent
>> connections on p
this line.
Unfortunately, other party of this contention is not so obvious.
Flame graph without TCO could be found here:
http://lev.serebryakov.spb.ru/_sklad/gif-stacks/no-tco/gif.1280.nuttcp.send.no-tco.svg
It looks very suspicious to me.
BTW, if_gre has exactly same problem.
--
What are right conditions to spread such traffic per queues and cores?
--
// Lev Serebryakov
signature.asc
Description: OpenPGP digital signature
On 26.10.2018 15:30, Lev Serebryakov wrote:
> I have "router" with two em (82574L) NICs. It has dual-core CPU and
> each NIC creates two receive and two transmit queues:
>
> $ sysctl dev.em | grep queue | grep _irq
> dev.em.1.queue_rx_1.rx_irq: 0
> dev.em.1.que
other «embedded» hardware manufacturers. And don't
ask me about desktop MoBos :-)
--
// Lev Serebryakov
signature.asc
Description: OpenPGP digital signature
Cannot allocate RX_ring
529.315433 [ 609] netmap_obj_malloc netmap_ring request size
65792 too large
529.316256 [1464] netmap_mem2_rings_create Cannot allocate RX_ring
--
// Lev Serebryakov
signature.asc
Description: OpenPGP digital signature
On 02.11.2018 14:31, Lev Serebryakov wrote:
> $ sudo ./pkt-gen -f rx -i igb1
and pkt-gen from ports complains about invalid interface:
622.603767 main [2699] interface is igb1
622.603783 main [2824] using default burst size: 512
622.603786 main [2832] running on 1 cpus (have 4)
622.603
tmap.no_timestamp: 0
dev.netmap.verbose: 0
dev.netmap.ix_rx_miss_bufs: 0
dev.netmap.ix_rx_miss: 0
dev.netmap.ix_crcstrip: 0
#
--
// Lev Serebryakov
signature.asc
Description: OpenPGP digital signature
Hello Vincenzo,
Friday, November 2, 2018, 5:43:16 PM, you wrote:
> It looks like there is not enough memory for netmap to allocate its data
> structures.
And with latest pkt-gen from github I get this:
240.075736 [2096] netmap_ioctl API mismatch for igb1 got 12 need 11
Why?! H
Hello Freebsd-net,
I'm setting up simple experiment:
Host A with em0 and ix0 (12.BETA2)
Host B with igb1 and ix0 (11.2-STABLE)
A:em0 is connected to B:igb1
A:ix0 is connected to B:ix0
Host B has static ARP for 192.168.10.2-192.168.10.9 set to A:ix0's MAC.
Host B has forwarding enabled.
Hello Freebsd-net,
Is `pkt-gen' (for netmap) supported on FreeBSD?
${SRCTOP}/tools/tools/netmap/pkt-gen.c is very old and could not be built
(I've checked stable/11, stable/12 and head).
${PORTS}/net/pkt-gen is not so old, but more than year old + patches
pkt-gen from github could be built
gress?
Maybe. We need iflib/e1000 professionals here.
> Or maybe the interface is down while TX is stuck (thus preventing progress)?
Nope, it is up for sure. If I ^C pkt-gen it could be run again and
works again, with same problem when it try to stop.
--
// Lev Serebryakov
signature.asc
Description: OpenPGP digital signature
his flap for most of capabilities of these cards.
IMHO, it is regression.
--
// Lev Serebryakov
signature.asc
Description: OpenPGP digital signature
ut it doesn't help.
Do I have any chances to get netmap supported (maybe, not very
efficient) on this NIC?
--
// Lev Serebryakov
signature.asc
Description: OpenPGP digital signature
Hello Freebsd-net,
I have two router like this:
[NET 10.1.0.0/24] <-> (10.1.0.1 HOST A 10.2.0.1)
<->
(10.2.0.2 HOST B 10.10.10.1) <-> [NET 10.10.10.0/24)
Both HOST A and HOST B tun FreeBSD, both are routers (forwrading is
enabled), host A has "route -net 10.10.10.0/24 10.2.0.2" and host B h
Hello Eugene,
Friday, November 30, 2018, 4:06:11 AM, you wrote:
>> My SAs and SPDs looks like this (for UDP only, for tests):
>>
>> Host A:
>>
>> add 10.2.0.1 10.2.0.2 esp 0x10001 -m transport -E null "";
>> add 10.2.0.2 10.2.0.1 esp 0x10001 -m transport -E null "";
>>
>> spdadd 10.1.0.0/24 10.1
Hello Eugene,
Friday, November 30, 2018, 1:28:29 PM, you wrote:
>>> It is possible and it is the way I use extensively for long time since very
>>> old
>>> FreeBSD versions having KAME IPSEC and it works with 11.2-STABLE, too.
>> Eugeny, please note, that your example have SA and SPDs with sam
Hello Olivier,
Friday, November 30, 2018, 3:34:50 PM, you wrote:
>> I'm benchmarking different possible "native" VPN configurations and I have
>> gif(4) and gre(4) with and without IPsec in my battery. I have tunnel mode
>> IPsec too. Problem with gif(4) and gre(4) that hey are tremendously
- Step = 1 Kpps
- Trend = increasing
- Measured forwarding rate = 86 Kpps
Estimated Equilibrium Ethernet throughput= 86 Kpps (maximum value seen:
120 Kpps)
--
// Lev Serebryakov
signature.asc
Description: OpenPGP digital signature
101 - 200 of 217 matches
Mail list logo