Re: Console problem with ALT-F# keys

2011-08-26 Thread Chuck Swiger
Hi--

On Aug 25, 2011, at 5:56 PM, Pegasus Mc Cleaft wrote:
 I am running FreeBSD 9.0-BETA1 r225125 compiled with LLVM on a Xeon
 processor (CPUTYPE=core2 and CFLAGS= -mmmx -msse -msse2 -msse3 -O2
 -fno-strict-aliasing -pipe)

The FreeBSD kernel doesn't use MMX or SSE by explicit design choice.  See 
sys/conf/kern.mk:

# [ ... ]  Explicitly prohibit the use of SSE and other SIMD
# operations inside the kernel itself.  These operations are exclusively
# reserved for user applications.
#
.if ${MACHINE_ARCH} == i386  ${CC} != icc
CFLAGS+=-mno-align-long-strings -mpreferred-stack-boundary=2 \
   -mno-mmx -mno-3dnow -mno-sse -mno-sse2
INLINE_LIMIT?=  8000
.endif

Trying to override the default compiler flags to force it to use MMX/SSE is 
simply not going to work.

Regards,
-- 
-Chuck

___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


siba_bwn in GENERIC

2011-08-26 Thread Ruslan Mahmatkhanov

Good day!

Right now we have this line in GENERIC:

#device bwn # Broadcom BCM43xx wireless NICs

From user POV all he need to do to make his broadcom wifi work, is
to uncomment this line and recompile his kernel. But this actually not 
sufficient - he also need to add device siba_bwn, and then install
net/bwn-firmware-kmod. But he will know that after recompiling his 
kernel when his wireless adapter will not work as expected :).


So may be we need to also add siba_bwn (commented out by default) in 
GENERIC and some reference about net/bwn-firmware-kmod?


--
Regards,
Ruslan

Tinderboxing kills... the drives.
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


Re: siba_bwn in GENERIC

2011-08-26 Thread Adrian Chadd
On 26 August 2011 15:14, Ruslan Mahmatkhanov cvs-...@yandex.ru wrote:
 Good day!

 Right now we have this line in GENERIC:

 #device         bwn             # Broadcom BCM43xx wireless NICs

 From user POV all he need to do to make his broadcom wifi work, is
 to uncomment this line and recompile his kernel. But this actually not
 sufficient - he also need to add device siba_bwn, and then install
 net/bwn-firmware-kmod. But he will know that after recompiling his kernel
 when his wireless adapter will not work as expected :).

 So may be we need to also add siba_bwn (commented out by default) in GENERIC
 and some reference about net/bwn-firmware-kmod?

I think it's a good idea, along with any other documentation related
changes that need to occur.

Thanks,


Adrian
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


kqueue and device driver experience anyone ?

2011-08-26 Thread Luigi Rizzo
a question for the kqueue experts out there:

I am trying to add kqueue support to a device driver, and am puzzled
on what the .f_event() function may assume.

I see that some of the examples (e.g. bpf, audit_pipe.c)
expect that the function is called with the device lock held
(and even have a LOCK_ASSERT).

Others (if_tap, cam/scsi/scsi_target.c) either do not use the lock
or explicitly acquire it.

As far as i can tell the .f_event() function is called in two places:

- within knote() which in turn (through KNOTE_*() ) is called
  by the driver itself near selrecord() . So it is up to the
  device driver to call it with the device lock held;

- within kqueue_scan(), which instead is called from the upper half
  of the kernel as part of kern_kevent(). Here there seems to be no
  way that the device lock is acquired when .f_event() is called.
  Unless, of course, the knote's on which these .f_event() are
  called are not the same ones attached to devices -- so there is
  a different .f_event() function called ?

So, is there a bug in the kqueue support for bpf.c and audit_pipe.c,
or i am missing something important ?

cheers
luigi
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


Re: kqueue and device driver experience anyone ?

2011-08-26 Thread John Baldwin
On Friday, August 26, 2011 11:39:40 am Luigi Rizzo wrote:
 a question for the kqueue experts out there:
 
 I am trying to add kqueue support to a device driver, and am puzzled
 on what the .f_event() function may assume.
 
 I see that some of the examples (e.g. bpf, audit_pipe.c)
 expect that the function is called with the device lock held
 (and even have a LOCK_ASSERT).
 
 Others (if_tap, cam/scsi/scsi_target.c) either do not use the lock
 or explicitly acquire it.
 
 As far as i can tell the .f_event() function is called in two places:
 
 - within knote() which in turn (through KNOTE_*() ) is called
   by the driver itself near selrecord() . So it is up to the
   device driver to call it with the device lock held;
 
 - within kqueue_scan(), which instead is called from the upper half
   of the kernel as part of kern_kevent(). Here there seems to be no
   way that the device lock is acquired when .f_event() is called.
   Unless, of course, the knote's on which these .f_event() are
   called are not the same ones attached to devices -- so there is
   a different .f_event() function called ?
 
 So, is there a bug in the kqueue support for bpf.c and audit_pipe.c,
 or i am missing something important ?

Note that the top-half code may end up locking the device's mutex
if the mutex was tied to the knote list when the knote list was
created (e.g. knlist_init_mtx()).  In general if you want to use
locking to protect your knlist, you should tell the knlist about
the locking to use, then there are variants of KNOTE() that let it
know if the calling code already holds the appropriate lock or not
(KNOTE_LOCKED() and KNOTE_UNLOCKED()).

-- 
John Baldwin
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


RE: CARP on 9.0 (was no subject)

2011-08-26 Thread Johan Hendriks

How about:

%sudo netstat -s carp

...on both machines.

A few years ago I submitted (or maybe it was Steve Polyack) a patch to add
debugging to CARP, not sure if it ever got commited.

Need-more-Cisco'sih-Debugging.

~BAS


On Fri, 26 Aug 2011, Patrick Lamaiziere wrote:

 Le Fri, 26 Aug 2011 15:26:28 +,
 Johan Hendriks jo...@double-l.nl a ?crit :

 I am trying to set up CARP under 9.0

 ...

 Also with a higer value like advskew 200 or 254 the role of the
 servers stays the same.

 Ok, there is something wrong so.

 Did you check that the sysctl net.inet.carp.suppress_preempt is equal
 to zero ? If yes, I don't have any more idea.

 Regards.

Hello 
first off all thanks for your time.

sysctl -a | grep carp on both machines give me the following output

sysctl -a | grep carp
device  carp
net.inet.ip.same_prefix_carp_only: 0
net.inet.carp.allow: 1
net.inet.carp.preempt: 0
net.inet.carp.log: 2
net.inet.carp.arpbalance: 0
net.inet.carp.suppress_preempt: 0


netstat -s on the master

carp:
260 packets received (IPv4)
0 packets received (IPv6)
0 packets discarded for wrong TTL
0 packets shorter than header
0 discarded for bad checksums
0 discarded packets with a bad version
0 discarded because packet too short
0 discarded for bad authentication
0 discarded for bad vhid
0 discarded because of a bad address list
11430 packets sent (IPv4)
0 packets sent (IPv6)
0 send failed due to mbuf memory error

netstat -s on the slave

carp:
11735 packets received (IPv4)
0 packets received (IPv6)
0 packets discarded for wrong TTL
0 packets shorter than header
0 discarded for bad checksums
0 discarded packets with a bad version
0 discarded because packet too short
0 discarded for bad authentication
0 discarded for bad vhid
0 discarded because of a bad address list
448 packets sent (IPv4)
0 packets sent (IPv6)
0 send failed due to mbuf memory error

tcpdump -i bge0 on slave

20:10:48.868200 IP 192.168.50.40  vrrp.mcast.net: VRRPv2, Advertisement, vrid 
1, prio 50, authtype none, intvl 1s, length 36

Here the advskew is set to 50, on the slave it is 20.
So the slave should be the master.
if i raise the advskew to 254, i see the change in the capture.

Both machines are fresh install with nothing changed on them so far just a 
fresh build from a csup this morning.
And installed bash as the shell..

for freebsd-current@ the /etc/rc.conf file again
Master 
ifconfig_bge0=inet 192.168.50.40 netmask 255.255.255.0
defaultrouter=192.168.50.150
# CARP
cloned_interfaces=carp0
ifconfig_carp0=vhid 1 advskew 10 pass letmepass 192.168.50.45 netmask 
255.255.255.0

On the slave i have the following in /etc/rc.conf
ifconfig_bge0=inet 192.168.50.41 netmask 255.255.255.0
defaultrouter=192.168.50.150
# CARP
cloned_interfaces=carp0
ifconfig_carp0=vhid 1 advskew 20 pass letmepass 192.168.50.45 netmask 
255.255.255.0

regards,
Johan



___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


Re: F_RDLCK lock to FreeBSD NFS server fails to R/O target file [PATCH]

2011-08-26 Thread Rick Macklem
John wrote:
 After pondering the best way to allow the VOP_ACCESS() call to
 only query for the permissions really needed, I've come up with
 a patch that minimally adds one parameter to the nlm_get_vfs_state()
 function call with the lock type from the original argp.
 
 http://people.freebsd.org/~jwd/nlm_prot_impl.c.accmode.patch
 
I took a look at it and it seemed mostly ok. However, please note that
I am not familiar with the NLM code and try to avoid it like the plague.:-)

One place I would suggest might want to be changed is the nlm_do_unlock()
case. I don't think any file permission checking is needed for an unlock
and it seems like it might fail when the called has VWRITE but not VREAD
permissions on the file? Leaving a file locked is not a good situation.
I would just not even do the VOP_ACCESS() call for that case.
Maybe pass accmode == 0 into nlm_get_vfs_state() to indicate skip the
VOP_ACCESS() call.

I think that this patch might be a little risky to put into head at this
stage of the release cycle so, personally, I'd wait until after the 9.0
release before I'd look at committing it. Others might feel it's ok to
go in now?

rick
 I'd appreciate a review and seeing what might be required to commit
 this prior to 9 release.
 
 Thanks,
 John
 
 - John's Original Message -
  Hi Fellow NFS'ers,
 
 I believe I have found the problem we've been having with read
 locks
  while attaching to a FreeBSD NFS server.
 
 In sys/nlm/nlm_prot_impl.c, function nlm_get_vfs_state(), there
 is a call
  to VOP_ACCESS() as follows:
 
  /*
   * Check cred.
   */
  NLM_DEBUG(3, nlm_get_vfs_state(): Calling
  VOP_ACCESS(VWRITE) with cred-cr_uid=%d\n,cred-cr_uid);
  error = VOP_ACCESS(vs-vs_vp, VWRITE, cred, curthread);
  if (error) {
  NLM_DEBUG(3, nlm_get_vfs_state(): caller_name = %s
  VOP_ACCESS() returns %d\n,
  host-nh_caller_name, error);
  goto out;
  }
 
The file being accessed is read only to the user, and open()ed
with
  O_RDONLY. The lock being requested is for a read.
 
  fd = open(filename, O_RDONLY, 0);
  ...
 
  lblk.l_type = F_RDLCK;
  lblk.l_start = 0;
  lblk.l_whence= SEEK_SET;
  lblk.l_len = 0;
  lblk.l_pid = 0;
  rc = fcntl(fd, F_SETLK, lblk);
 
 Running the above from a remote system, the lock call fails with
  errno set to ENOLCK. Given cred-cr_uid comes in as 227 which is
  my uid on the remote system. Since the file is R/O to me, and the
  VOP_ACCESS() is asking for VWRITE, it fails with errno 13, EACCES,
  Permission denied.
 
 The above operations work correctly to some of our other
  favorite big-name nfs vendors :-)
 
 Opinions on the correct way to fix this?
 
  1. Since we're only asking for a read lock, why do we need to ask
 for VWRITE? I may not understand an underlying requirement for
 the VWRITE so please feel free to educate me if needed.
 
 Something like: request == F_RDLCK ? VREAD : VWRITE
 (need to figure out where to get the request from in this
 context).
 
  2. Attempt VWRITE, fallback to VREAD... seems off to me though.
 
  3. Other?
 
 I appreciate any thoughts on this.
 
  Thanks,
  John
 
 While they might not follow style(9) completely, I've uploaded
  my patch to nlm_prot.impl.c with the NLM_DEBUG() calls i've added.
  I'd appreciate it if someone would consider committing them so
  who ever debugs this file next will have them available.
 
  http://people.freebsd.org/~jwd/nlm_prot_impl.c.patch
 
 ___
 freebsd...@freebsd.org mailing list
 http://lists.freebsd.org/mailman/listinfo/freebsd-fs
 To unsubscribe, send any mail to freebsd-fs-unsubscr...@freebsd.org
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


Re: kqueue and device driver experience anyone ?

2011-08-26 Thread Luigi Rizzo
On Fri, Aug 26, 2011 at 01:13:03PM -0400, John Baldwin wrote:
 On Friday, August 26, 2011 11:39:40 am Luigi Rizzo wrote:
  a question for the kqueue experts out there:
  
  I am trying to add kqueue support to a device driver, and am puzzled
  on what the .f_event() function may assume.
  
  I see that some of the examples (e.g. bpf, audit_pipe.c)
  expect that the function is called with the device lock held
  (and even have a LOCK_ASSERT).
  
  Others (if_tap, cam/scsi/scsi_target.c) either do not use the lock
  or explicitly acquire it.
  
  As far as i can tell the .f_event() function is called in two places:
  
  - within knote() which in turn (through KNOTE_*() ) is called
by the driver itself near selrecord() . So it is up to the
device driver to call it with the device lock held;
  
  - within kqueue_scan(), which instead is called from the upper half
of the kernel as part of kern_kevent(). Here there seems to be no
way that the device lock is acquired when .f_event() is called.
Unless, of course, the knote's on which these .f_event() are
called are not the same ones attached to devices -- so there is
a different .f_event() function called ?
  
  So, is there a bug in the kqueue support for bpf.c and audit_pipe.c,
  or i am missing something important ?
 
 Note that the top-half code may end up locking the device's mutex
 if the mutex was tied to the knote list when the knote list was
 created (e.g. knlist_init_mtx()).  In general if you want to use
 locking to protect your knlist, you should tell the knlist about
 the locking to use, then there are variants of KNOTE() that let it
 know if the calling code already holds the appropriate lock or not
 (KNOTE_LOCKED() and KNOTE_UNLOCKED()).

ok, got it -- i see that bpf calls knlist_init_mtx() at init time.
So i can try to do something similar in my case, though i need to
deal with multiqueue cards which might be a bit trickier.

The other thing i need (but i believe i know how to handle it)
is tell whether .f_event() is called by KNOTE() or by kqueue_scan(),
but i believe i can use the hint argument to tell the two.

I guess i should add some notes to kqueue(9) once i understand it
better.

thanks for the clarification
luigi

The o

 -- 
 John Baldwin
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


RE: CARP on 9.0 (was no subject)

2011-08-26 Thread Johan Hendriks
SOLVED!

Was a typo in /etc/sysctl.conf
Sorry for the noise

and thanks for your time.

regards
Johan

Van: owner-freebsd-curr...@freebsd.org [owner-freebsd-curr...@freebsd.org] 
namens Johan Hendriks [jo...@double-l.nl]
Verzonden: vrijdag 26 augustus 2011 20:22
Aan: Brian Seklecki (Mobile); freebsd-questi...@freebsd.org
CC: freebsd-current@freebsd.org
Onderwerp: RE: CARP on 9.0 (was no subject)

How about:

%sudo netstat -s carp

...on both machines.

A few years ago I submitted (or maybe it was Steve Polyack) a patch to add
debugging to CARP, not sure if it ever got commited.

Need-more-Cisco'sih-Debugging.

~BAS


On Fri, 26 Aug 2011, Patrick Lamaiziere wrote:

 Le Fri, 26 Aug 2011 15:26:28 +,
 Johan Hendriks jo...@double-l.nl a ?crit :

 I am trying to set up CARP under 9.0

 ...

 Also with a higer value like advskew 200 or 254 the role of the
 servers stays the same.

 Ok, there is something wrong so.

 Did you check that the sysctl net.inet.carp.suppress_preempt is equal
 to zero ? If yes, I don't have any more idea.

 Regards.

Hello
first off all thanks for your time.

sysctl -a | grep carp on both machines give me the following output

sysctl -a | grep carp
device  carp
net.inet.ip.same_prefix_carp_only: 0
net.inet.carp.allow: 1
net.inet.carp.preempt: 0
net.inet.carp.log: 2
net.inet.carp.arpbalance: 0
net.inet.carp.suppress_preempt: 0


netstat -s on the master

carp:
260 packets received (IPv4)
0 packets received (IPv6)
0 packets discarded for wrong TTL
0 packets shorter than header
0 discarded for bad checksums
0 discarded packets with a bad version
0 discarded because packet too short
0 discarded for bad authentication
0 discarded for bad vhid
0 discarded because of a bad address list
11430 packets sent (IPv4)
0 packets sent (IPv6)
0 send failed due to mbuf memory error

netstat -s on the slave

carp:
11735 packets received (IPv4)
0 packets received (IPv6)
0 packets discarded for wrong TTL
0 packets shorter than header
0 discarded for bad checksums
0 discarded packets with a bad version
0 discarded because packet too short
0 discarded for bad authentication
0 discarded for bad vhid
0 discarded because of a bad address list
448 packets sent (IPv4)
0 packets sent (IPv6)
0 send failed due to mbuf memory error

tcpdump -i bge0 on slave

20:10:48.868200 IP 192.168.50.40  vrrp.mcast.net: VRRPv2, Advertisement, vrid 
1, prio 50, authtype none, intvl 1s, length 36

Here the advskew is set to 50, on the slave it is 20.
So the slave should be the master.
if i raise the advskew to 254, i see the change in the capture.

Both machines are fresh install with nothing changed on them so far just a 
fresh build from a csup this morning.
And installed bash as the shell..

for freebsd-current@ the /etc/rc.conf file again
Master
ifconfig_bge0=inet 192.168.50.40 netmask 255.255.255.0
defaultrouter=192.168.50.150
# CARP
cloned_interfaces=carp0
ifconfig_carp0=vhid 1 advskew 10 pass letmepass 192.168.50.45 netmask 
255.255.255.0

On the slave i have the following in /etc/rc.conf
ifconfig_bge0=inet 192.168.50.41 netmask 255.255.255.0
defaultrouter=192.168.50.150
# CARP
cloned_interfaces=carp0
ifconfig_carp0=vhid 1 advskew 20 pass letmepass 192.168.50.45 netmask 
255.255.255.0

regards,
Johan



___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


possible mountroot regression

2011-08-26 Thread Andriy Gapon

It seems that after the introduction of the mountroot scripting language a user
now has exactly one chance to try to specify a correct root device at the
mountroot prompt.  I am not sure that that is convenient/enough.

I suspect that the following code is the cause:

static void
vfs_mountroot_conf0(struct sbuf *sb)
{
char *s, *tok, *mnt, *opt;
int error;

sbuf_printf(sb, .onfail panic\n);
...

-- 
Andriy Gapon
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


ichwd attach failure

2011-08-26 Thread Mike Tancsa
Got a newish Intel board in and decided to give it a spin. Trying to
load the watchdog, I get this error below on CURRENT.  Anyone able to
get ichwd working on such a motherboard ?   full dmesg and devinfo at

http://www.tancsa.com/intel.txt
and
http://www.tancsa.com/intel-asl.txt



isab0: found ICH10 or equivalent chipset: Intel Cougar Point watchdog timer
ichwd0: Intel Cougar Point watchdog timer on isa0
isab0: found ICH10 or equivalent chipset: Intel Cougar Point watchdog timer
pcib0: allocated type 4 (0x430-0x437) for rid 0 of ichwd0
pcib0: allocated type 4 (0x460-0x47f) for rid 1 of ichwd0
ichwd0: unable to reserve GCS registers
device_attach: ichwd0 attach returned 6
pcib0: allocated type 4 (0x3f0-0x3f5) for rid 0 of fdc0
pcib0: allocated type 4 (0x3f7-0x3f7) for rid 1 of fdc0
ppc0: cannot reserve I/O port range
pcib0: allocated type 4 (0x2f8-0x2ff) for rid 0 of uart1


-- 
---
Mike Tancsa, tel +1 519 651 3400
Sentex Communications, m...@sentex.net
Providing Internet services since 1994 www.sentex.net
Cambridge, Ontario Canada   http://www.tancsa.com/
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


panic: mutex pf task mtx owned at /usr/src/sys/contrib/pf/net/if_pfsync.c:3163

2011-08-26 Thread Matthew Economou
I recently upgraded a firewall I'm using for performance testing from
a March-ish 9-CURRENT to 9.0-BETA1 (csup run August 21 around 12:00 AM
EDT).  It's basically a GENERIC kernel with debugging disabled and
things like IPsec and ALTQ enabled.  Since the upgrade, after
approximately an hour after it boots, the firewall stops passing any
traffic (IPv4 and IPv6).  OpenVPN, for example, logs the following
errors:

  write UDPv4: Operation not permitted (code=1)

Quagga, for another example, logs something similar:

  ripd[1696]: can't send packet : Operation not permitted0
  ospfd[1702]: *** sendmsg in ospf_write failed to 172.30.0.3, id 0,
off 0, len 76, interface tap0 mtu 1500: Operation not permitted

If I try to ping something from the console, I get the same error message:

  # ping 4.2.2.2
  ping: sendto: Operation not permitted
It appears that PF isn't removing any entries from the state table.
Note that the state table size is at its default of 1 (which
correlates to the amount of memory installed on the firewall - 256
MB).

State Table  Total Rate
  current entries10013
  searches  554801   13.4/s
  inserts100130.2/s
  removals   00.0/s

I've tried both my current (unmodified and working prior to the
upgrade) and experimental PF configurations, neither of which have any
effect on the problem.  Reloading the PF configuration (/etc/rc.d/pf
reload) or restarting PF altogether (/etc/rc.d/pf restart) also have
no effect.  Only if I shut down PF completely (/etc/rc.d/pf stop) do I
regain network connectivity - I can do things like ping hosts (IPv4
and IPv6), browse the web, and pass traffic that's just routed through
the firewall (i.e., not requiring NAT).  Clearing the state table
(pfsync -F state) has no effect.

The kernel I'm was running had debugging disabled for performance
testing purposes, so I booted a proper debug kernel.  It panicked in
pfsync_send_plus as soon as init enabled PF (backtrace included
below).

Starting pflog.
pflog0: promiscuous mode enabled
Aug 25 20:54:21 pflogd[1611]: [priv]: msg PRIV_OPEN_LOG received
Enabling pfpanic: mutex pf task mtx owned at
/usr/src/sys/contrib/pf/net/if_pfsync.c:3163
cpuid = 0
KDB: enter: panic
[ thread pid 1619 tid 100053 ]
Stopped at  kdb_enter+0x3a: movl$0,kdb_why
db bt
Tracing pid 1619 tid 100053 td 0xc23da2e0
kdb_enter(c09777c9,c09777c9,c0975d7b,c6fd79e0,0,...) at kdb_enter+0x3a
panic(c0975d7b,c0946080,c0944e87,c5b,c6fd7a0c,...) at panic+0x134
_mtx_assert(c0a1b388,0,c0944e87,c5b,c6fd7a24,...) at _mtx_assert+0x127
pfsync_send_plus(c6fd7a24,18,10,ad6,100,...) at pfsync_send_plus+0xf2
pfsync_clear_states(a218d664,c236fb78,c0945f1c,635,c09ae167,...) at
pfsync_clear_states+0x8d
pfioctl(c22a0800,c0cc4412,c236fb00,3,c23da2e0,...) at pfioctl+0x1b90
devfs_ioctl_f(c23ce578,c0cc4412,c236fb00,c216ce80,c23da2e0,...) at
devfs_ioctl_f+0x10b
kern_ioctl(c23da2e0,3,c0cc4412,c236fb00,1fd7cec,...) at kern_ioctl+0x21d
ioctl(c23da2e0,c6fd7cec,c6fd7d28,c097d93a,0,...) at ioctl+0x134
syscallenter(c23da2e0,c6fd7ce4,c6fd7ce4,0,0,...) at syscallenter+0x263
syscall(c6fd7d28) at syscall+0x34
Xint0x80_syscall() at Xint0x80_syscall+0x21
--- syscall (54, FreeBSD ELF32, ioctl), eip = 0x281e6263, esp =
0xbfbfe8ac, ebp = 0xbfbfe998 ---
db

I'm at a loss as to how to proceed.  Is this a known problem with PF?
Can anyone suggest a work-around?

Best wishes,
Matthew
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


Re: ichwd attach failure

2011-08-26 Thread Doug Barton
John was working on this, haven't seen an update recently though.


Doug


On 08/26/2011 14:24, Mike Tancsa wrote:
 Got a newish Intel board in and decided to give it a spin. Trying to
 load the watchdog, I get this error below on CURRENT.  Anyone able to
 get ichwd working on such a motherboard ?   full dmesg and devinfo at
 
 http://www.tancsa.com/intel.txt
 and
 http://www.tancsa.com/intel-asl.txt
 
 
 
 isab0: found ICH10 or equivalent chipset: Intel Cougar Point watchdog timer
 ichwd0: Intel Cougar Point watchdog timer on isa0
 isab0: found ICH10 or equivalent chipset: Intel Cougar Point watchdog timer
 pcib0: allocated type 4 (0x430-0x437) for rid 0 of ichwd0
 pcib0: allocated type 4 (0x460-0x47f) for rid 1 of ichwd0
 ichwd0: unable to reserve GCS registers
 device_attach: ichwd0 attach returned 6
 pcib0: allocated type 4 (0x3f0-0x3f5) for rid 0 of fdc0
 pcib0: allocated type 4 (0x3f7-0x3f7) for rid 1 of fdc0
 ppc0: cannot reserve I/O port range
 pcib0: allocated type 4 (0x2f8-0x2ff) for rid 0 of uart1
 
 



-- 

Nothin' ever doesn't change, but nothin' changes much.
-- OK Go

Breadth of IT experience, and depth of knowledge in the DNS.
Yours for the right price.  :)  http://SupersetSolutions.com/

___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


NFS mountd version 3 over TCP

2011-08-26 Thread Steve Wills
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi,

I'm trying to use 9.0-CURRENT as an NFS server for a VMWare ESXi 4.1.0.
When I attempt the mount, it logs this message:

The NFS server does not support MOUNT version 3 over TCP

Have I configured something wrong and if so what? Or is this something
related to the new NFS code?

Thanks,
Steve
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.17 (FreeBSD)

iQEcBAEBAgAGBQJOWEtYAAoJEPXPYrMgexuhWyAIAJ8Mfkjc8gtXxIYpbIDM2ECR
B6ke25NNJj4Q41a77gqPsUr6nIePwoa6LlBcTNtQxx8xtC3CobB/QBjiGSLqQKoF
cdcXj34tKE6e4cxptw+fYh7JXLalmmqd9BXgkKGf98UzXVDT0elIK7Ke/0thDp4s
SOPO8VZ6tdMgo98oONk7qmv8nR2OhnXuJVBRBIc+Xfppq23/5u2GNeaqiJRv3Ace
xVEusvPLAFtsCbyivoL27uqvJlNrA/cxA/VjzycYC+OhQ+deF3l8Ba0WNbVFSSjA
tDXjT3acrHiAw7iej7Kqs9G1sZByFvymTl86E449+o6Y+1hs2Xn/3POUwWfaCqU=
=U1iG
-END PGP SIGNATURE-
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


Re: NFS mountd version 3 over TCP

2011-08-26 Thread Steve Wills
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 08/26/11 21:41, Steve Wills wrote:
 Hi,
 
 I'm trying to use 9.0-CURRENT as an NFS server for a VMWare ESXi 4.1.0.
 When I attempt the mount, it logs this message:
 
 The NFS server does not support MOUNT version 3 over TCP
 
 Have I configured something wrong and if so what? Or is this something
 related to the new NFS code?

I guess a little more info would be helpful...

rc.conf has:

nfs_server_enable=YES
rpcbind_enable=YES
mountd_enable=YES
rpc_statd_enable=YES
rpc_lockd_enable=YES

/etc/exports contains, amongst others:

/boxy/vmware -alldirs -maproot=0:0 -network 10.0.1 -mask 255.255.255.0

rpcinfo shows:

   program version netid addressserviceowner
104tcp   0.0.0.0.0.111  rpcbindsuperuser
103tcp   0.0.0.0.0.111  rpcbindsuperuser
102tcp   0.0.0.0.0.111  rpcbindsuperuser
104udp   0.0.0.0.0.111  rpcbindsuperuser
103udp   0.0.0.0.0.111  rpcbindsuperuser
102udp   0.0.0.0.0.111  rpcbindsuperuser
104tcp6  ::.0.111   rpcbindsuperuser
103tcp6  ::.0.111   rpcbindsuperuser
104udp6  ::.0.111   rpcbindsuperuser
103udp6  ::.0.111   rpcbindsuperuser
104local /var/run/rpcbind.sock  rpcbindsuperuser
103local /var/run/rpcbind.sock  rpcbindsuperuser
102local /var/run/rpcbind.sock  rpcbindsuperuser
151udp6  ::.2.224   mountd superuser
153udp6  ::.2.224   mountd superuser
151tcp6  ::.2.224   mountd superuser
153tcp6  ::.2.224   mountd superuser
151udp   0.0.0.0.2.224  mountd superuser
153udp   0.0.0.0.2.224  mountd superuser
151tcp   0.0.0.0.2.224  mountd superuser
153tcp   0.0.0.0.2.224  mountd superuser

tcpdump here:

http://people.freebsd.org/~swills/nfs_debug.pcap

Suggestions appreciated, thanks!

Steve
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.17 (FreeBSD)

iQEcBAEBAgAGBQJOWFOLAAoJEPXPYrMgexuhCvoH/1ky5qXxfQhgTdtYEDbCsfo4
J3xiFG9es+ajpNa1LtqlaMBrvs5fxfv0F7bzklOvUKmsVE4FPuFrcOd6IvIwTw+T
U63UFocls3ZufNH+VjzxkFc5jfQ8hTDWXjKPfGMUxrCekt4pcEX4uze+I3YV/WRR
IFLTkfUCLvgEJSHn39Yl7ZmHud6kJaUUQv5ne8vWgd8KRNt4IWQqvqltYZDvwY1f
8ajYxJDwKOkVRMhRwh+4O0Fgs3Owar1W0JyNzmJ+Se9/QIVzTwQS6Q4l3jQjfSrU
YvRpMFQrb/ChZGZnH//FrXWhHK3TPg++XcRe1PGdY6KB+Fh1gjz+DRzbf5CzYBo=
=dp9s
-END PGP SIGNATURE-
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


Re: NFS mountd version 3 over TCP

2011-08-26 Thread Steve Wills
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 08/26/11 22:16, Steve Wills wrote:
 On 08/26/11 21:41, Steve Wills wrote:
 Hi,
 
 I'm trying to use 9.0-CURRENT as an NFS server for a VMWare ESXi 4.1.0.
 When I attempt the mount, it logs this message:
 
 The NFS server does not support MOUNT version 3 over TCP
 
 Have I configured something wrong and if so what? Or is this something
 related to the new NFS code?
 
 I guess a little more info would be helpful...
 
 rc.conf has:
 
 nfs_server_enable=YES
 rpcbind_enable=YES
 mountd_enable=YES
 rpc_statd_enable=YES
 rpc_lockd_enable=YES
 
 /etc/exports contains, amongst others:
 
 /boxy/vmware -alldirs -maproot=0:0 -network 10.0.1 -mask 255.255.255.0
 
 rpcinfo shows:
 
program version netid addressserviceowner
 104tcp   0.0.0.0.0.111  rpcbindsuperuser
 103tcp   0.0.0.0.0.111  rpcbindsuperuser
 102tcp   0.0.0.0.0.111  rpcbindsuperuser
 104udp   0.0.0.0.0.111  rpcbindsuperuser
 103udp   0.0.0.0.0.111  rpcbindsuperuser
 102udp   0.0.0.0.0.111  rpcbindsuperuser
 104tcp6  ::.0.111   rpcbindsuperuser
 103tcp6  ::.0.111   rpcbindsuperuser
 104udp6  ::.0.111   rpcbindsuperuser
 103udp6  ::.0.111   rpcbindsuperuser
 104local /var/run/rpcbind.sock  rpcbindsuperuser
 103local /var/run/rpcbind.sock  rpcbindsuperuser
 102local /var/run/rpcbind.sock  rpcbindsuperuser
 151udp6  ::.2.224   mountd superuser
 153udp6  ::.2.224   mountd superuser
 151tcp6  ::.2.224   mountd superuser
 153tcp6  ::.2.224   mountd superuser
 151udp   0.0.0.0.2.224  mountd superuser
 153udp   0.0.0.0.2.224  mountd superuser
 151tcp   0.0.0.0.2.224  mountd superuser
 153tcp   0.0.0.0.2.224  mountd superuser

As you might guess, this rpcinfo output indicates nfsd wasn't running. I
am seeing this:

can't bind udp addr *: Address already in use

in syslog. Setting this:

nfs_server_flags=-t -n 4

allowed it to startup, but it then timed out an fsinfo call. Adding -o
to the nfs_server_flags to use the old nfs server allowed vmware to
mount. FWIW, I can't find any reason for the udp message above, nothing
seems to be using it that I can find. Ideas? tcpdumps are available if
anyone want them.

Steve


-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.17 (FreeBSD)

iQEcBAEBAgAGBQJOWF6PAAoJEPXPYrMgexuhHPYIAJ6SVxtORDbesvU35ktAS/id
5iWyTWO3CTHXT42uP4IZBT1o2AWFu6e9wUX84YEZyujMln0E++8hZccaa8zQBJhr
febHkZxqPdQOo/mpg1ci5J70Hs1UBV9cxU3uOA83vxunOM6xwA0B+4krfflj/k7P
cPtpztmuepQQ8/S5hB5ajnfM/gFOh1f2uPwWTj2/5NSWMoVfN3f0539bh05XKfRa
4X7XKxN/J4HBRGaNjnL8IWu86AW60H9Q3gdisdtT0k9sK4X3DswmiRMlMt4M4rS8
oX0vrgruTiKZf+bsraYvhuo4JyselXMicTnW7rUOVx8jiNVVk1nymSVF1XDUOrw=
=MeJv
-END PGP SIGNATURE-
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org