Re: kern/121955: [ipfw] [panic] freebsd 7.0 panic with mpd

2008-04-25 Thread oleg
Synopsis: [ipfw] [panic] freebsd 7.0 panic with mpd

State-Changed-From-To: open-patched
State-Changed-By: oleg
State-Changed-When: Fri Apr 25 10:20:48 UTC 2008
State-Changed-Why: 
In private discussion PR author confirms that suggested patch did help.



Responsible-Changed-From-To: freebsd-ipfw-oleg
Responsible-Changed-By: oleg
Responsible-Changed-When: Fri Apr 25 10:20:48 UTC 2008
Responsible-Changed-Why: 
see above.


http://www.freebsd.org/cgi/query-pr.cgi?pr=121955
___
freebsd-ipfw@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ipfw
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: kern/121955: [ipfw] [panic] freebsd 7.0 panic with mpd

2008-03-28 Thread Alexander Shulikov
Trouble fixed by updating to FreeBSD 7.0-STABLE. Now:
# uptime
 1:14PM  up  4:41, 2 users, load averages: 0.00, 0.00, 0.00
Let's look, that will be further.

-- реклама ---
Научим каждого зарабатывать на колебаниях курсов валют.
Запись на бесплатный семинар 
http://www.fxclub.org/condition_howtrade_freeseminar/

___
freebsd-ipfw@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ipfw
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: kern/121955: [ipfw] [panic] freebsd 7.0 panic with mpd

2008-03-25 Thread Alexander Shulikov
 I can not answer this for sure but trying it out is for free :) but it will
  not help here I guess

  Even if I believe the problem is in ipfw you probably should try to isolate 
 if
  it is in any means related to mpd, probably you can run your ppp from another
  server and run ipfw only on this one, after that you know more

  you are with 7-R or 7-Stable?

I use FreeBSD 7.0-RELEASE. And don't want use stable, because it is
high probability to get dump on another problems. :)
On Friday I shall try the considered variants and write results.

   Andrey and AT Matik:

  my name is João, this is my company email address

Sorry.
___
freebsd-ipfw@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ipfw
To unsubscribe, send any mail to [EMAIL PROTECTED]

Re: kern/121955: [ipfw] [panic] freebsd 7.0 panic with mpd

2008-03-25 Thread Alexander Shulikov
I did tuning, that was in my other letters (net.isr.direct=0, tuning
in /boot/loader.conf)
And received panic after 12 minutes:
Fatal trap 12: page fault while in kernel mode
cpuid = 0; apic id = 00
fault virtual address   = 0xf2a9864
fault code  = supervisor read, page not present
instruction pointer = 0x20:0xc7d1a95f
stack pointer   = 0x28:0xed8ccae4
frame pointer   = 0x28:0xed8ccbd8
code segment= base 0x0, limit 0xf, type 0x1b
= DPL 0, pres 1, def32 1, gran 1
processor eflags= interrupt enabled, resume, IOPL = 0
current process = 12 (swi1: net)
trap number = 12
panic: page fault
cpuid = 0
Uptime: 12m14s
Physical memory: 1015 MB
Dumping 67 MB: (CTRL-C to abort)  52 36 20 4

#0  doadump () at pcpu.h:195
195 pcpu.h: No such file or directory.
in pcpu.h
(kgdb) backtrace
#0  doadump () at pcpu.h:195
#1  0xc055a0b7 in boot (howto=260) at /usr/src/sys/kern/kern_shutdown.c:409
#2  0xc055a379 in panic (fmt=Variable fmt is not available.
) at /usr/src/sys/kern/kern_shutdown.c:563
#3  0xc07ac59c in trap_fatal (frame=0xed8ccaa4, eva=254449764) at
/usr/src/sys/i386/i386/trap.c:899
#4  0xc07ac800 in trap_pfault (frame=0xed8ccaa4, usermode=0,
eva=254449764) at /usr/src/sys/i386/i386/trap.c:812
#5  0xc07ad182 in trap (frame=0xed8ccaa4) at /usr/src/sys/i386/i386/trap.c:490
#6  0xc079431b in calltrap () at /usr/src/sys/i386/i386/exception.s:139
#7  0xc7d1a95f in ?? ()
Previous frame inner to this frame (corrupt stack?)

Also I fix ipfw.sh and remove all queues from it. Used only pipes.
___
freebsd-ipfw@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ipfw
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: kern/121955: [ipfw] [panic] freebsd 7.0 panic with mpd

2008-03-24 Thread Alexander Shulikov
The following reply was made to PR kern/121955; it has been noted by GNATS.

From: Alexander Shulikov [EMAIL PROTECTED]
To: [EMAIL PROTECTED], [EMAIL PROTECTED]
Cc:  
Subject: Re: kern/121955: [ipfw] [panic] freebsd 7.0 panic with mpd
Date: Mon, 24 Mar 2008 10:07:14 +0200

 I receive new dump with mpd-4.4 and FreeBSD 7.0-RELEASE:
 
 # kgdb /usr/obj/usr/src/sys/kkk/kernel.debug /var/crash/vmcore.2
 [GDB will not be able to debug user-mode threads:
 /usr/lib/libthread_db.so: Undefined symbol ps_pglobal_lookup]
 GNU gdb 6.1.1 [FreeBSD]
 Copyright 2004 Free Software Foundation, Inc.
 GDB is free software, covered by the GNU General Public License, and you are
 welcome to change it and/or distribute copies of it under certain conditions.
 Type show copying to see the conditions.
 There is absolutely no warranty for GDB.  Type show warranty for details.
 This GDB was configured as i386-marcel-freebsd.
 
 Unread portion of the kernel message buffer:
 
 Fatal double fault:
 eip = 0xc062ffa1
 esp = 0xe3fedf40
 ebp = 0xe3fee264
 cpuid = 0; apic id = 00
 panic: double fault
 cpuid = 0
 Uptime: 3m19s
 Physical memory: 1015 MB
 Dumping 62 MB: (CTRL-C to abort)  (CTRL-C to abort)  47 (CTRL-C to abort)  31 
15
 
 #0  doadump () at pcpu.h:195
 195 pcpu.h: No such file or directory.
 in pcpu.h
 (kgdb) backtrace
 #0  doadump () at pcpu.h:195
 #1  0xc055a0b7 in boot (howto=260) at /usr/src/sys/kern/kern_shutdown.c:409
 #2  0xc055a379 in panic (fmt=Variable fmt is not available.
 ) at /usr/src/sys/kern/kern_shutdown.c:563
 #3  0xc07ac2ab in dblfault_handler () at /usr/src/sys/i386/i386/trap.c:928
 #4  0xc062ffa1 in ipfw_chk (args=0xe3fee27c) at
 /usr/src/sys/netinet/ip_fw2.c:2303
 #5  0xc0634771 in ipfw_check_out (arg=0x0, m0=0xe3fee380,
 ifp=0xc3c6bc00, dir=2, inp=0x0)
 at /usr/src/sys/netinet/ip_fw_pfil.c:251
 #6  0xc05f99f8 in pfil_run_hooks (ph=0xc0870ea0, mp=0xe3fee410,
 ifp=0xc3c6bc00, dir=2, inp=0x0) at /usr/src/sys/net/pfil.c:78
 #7  0xc0638ee2 in ip_output (m=0xc3f82600, opt=0x0, ro=0xe3fee3e4,
 flags=1, imo=0x0, inp=0x0)
 at /usr/src/sys/netinet/ip_output.c:438
 #8  0xc0628cf6 in dummynet_send (m=0xc3f82600) at
 /usr/src/sys/netinet/ip_dummynet.c:840
 #9  0xc062b23c in dummynet_io (m=0xc3f82600, dir=1, fwa=0xe3fee578) at
 /usr/src/sys/netinet/ip_dummynet.c:1373
 #10 0xc063489e in ipfw_check_out (arg=0x0, m0=0xe3fee67c,
 ifp=0xc3c6bc00, dir=2, inp=0x0)
 at /usr/src/sys/netinet/ip_fw_pfil.c:289
 #11 0xc05f99f8 in pfil_run_hooks (ph=0xc0870ea0, mp=0xe3fee70c,
 ifp=0xc3c6bc00, dir=2, inp=0x0) at /usr/src/sys/net/pfil.c:78
 #12 0xc0638ee2 in ip_output (m=0xc3f82600, opt=0x0, ro=0xe3fee6e0,
 flags=0, imo=0x0, inp=0x0)
 at /usr/src/sys/netinet/ip_output.c:438
 #13 0xc069aa55 in tcp_respond (tp=0x0, ipgen=0xc3f96031,
 th=0xc3f96045, m=0xc3f82600, ack=2416490148, seq=0, flags=Variable
 flags is not available.
 )
 at /usr/src/sys/netinet/tcp_subr.c:572
 #14 0xc0692ab6 in tcp_dropwithreset (m=0xc3f82600, th=0xc3f96045,
 tp=0x0, tlen=1, rstreason=3)
 at /usr/src/sys/netinet/tcp_input.c:2470
 #15 0xc0695933 in tcp_input (m=0xc3f82600, off0=20) at
 /usr/src/sys/netinet/tcp_input.c:851
 #16 0xc06375e8 in ip_input (m=0xc3f82600) at 
/usr/src/sys/netinet/ip_input.c:665
 #17 0xc05f8195 in netisr_dispatch (num=2, m=0xc3f82600) at
 /usr/src/sys/net/netisr.c:185
 #18 0xc0628d22 in dummynet_send (m=0xc3f82600) at
 /usr/src/sys/netinet/ip_dummynet.c:846
 #19 0xc062b23c in dummynet_io (m=0xc3f82600, dir=2, fwa=0xe3feea08) at
 /usr/src/sys/netinet/ip_dummynet.c:1373
 #20 0xc06345b7 in ipfw_check_in (arg=0x0, m0=0xe3feeb0c,
 ifp=0xc3c6bc00, dir=1, inp=0x0)
 at /usr/src/sys/netinet/ip_fw_pfil.c:163
 #21 0xc05f99f8 in pfil_run_hooks (ph=0xc0870ea0, mp=0xe3feeb64,
 ifp=0xc3c6bc00, dir=1, inp=0x0) at /usr/src/sys/net/pfil.c:78
 #22 0xc0637121 in ip_input (m=0xc3f82600) at 
/usr/src/sys/netinet/ip_input.c:417
 #23 0xc05f8195 in netisr_dispatch (num=2, m=0xc3f82600) at
 /usr/src/sys/net/netisr.c:185
 #24 0xc060d2c4 in ng_iface_rcvdata (hook=0xc3ee6400, item=0xc40917c0)
 at /usr/src/sys/netgraph/ng_iface.c:757
 #25 0xc060704d in ng_apply_item (node=0xc4097b00, item=0xc40917c0,
 rw=0) at /usr/src/sys/netgraph/ng_base.c:2483
 #26 0xc0609cb9 in ng_snd_item (item=0xc40917c0, flags=0) at
 /usr/src/sys/netgraph/ng_base.c:2411
 #27 0xc060704d in ng_apply_item (node=0xc4791c00, item=0xc40917c0,
 rw=0) at /usr/src/sys/netgraph/ng_base.c:2483
 #28 0xc0609cb9 in ng_snd_item (item=0xc40917c0, flags=0) at
 /usr/src/sys/netgraph/ng_base.c:2411
 #29 0xc060c049 in ng_car_rcvdata (hook=0xc429d900, item=0xc40917c0) at
 /usr/src/sys/netgraph/ng_car.c:368
 #30 0xc060704d in ng_apply_item (node=0xc4791d00, item=0xc40917c0,
 rw=0) at /usr/src/sys/netgraph/ng_base.c:2483
 #31 0xc0609cb9 in ng_snd_item (item=0xc40917c0, flags=0) at
 /usr/src/sys/netgraph/ng_base.c:2411
 #32 0xc060704d in ng_apply_item (node=0xc4791c00, item=0xc40917c0,
 rw=0) at /usr/src/sys/netgraph/ng_base.c:2483
 #33 0xc0609cb9 in ng_snd_item (item=0xc40917c0

Re: kern/121955: [ipfw] [panic] freebsd 7.0 panic with mpd

2008-03-24 Thread AT Matik
On Monday 24 March 2008 07:11:15 Andrey V. Elsukov wrote:
 Alexander Shulikov wrote:
  For bug kern/121955: ([ipfw] [panic] freebsd 7.0 panic with mpd)
  I receive new dump with mpd-4.4 and FreeBSD 7.0-RELEASE:

 Did you reset sysctl variable `net.inet.ip.fw.one_pass` into zero?
 There is well known double panic with dummynet, when packet re
 injected into pipe again and again. Check your rules.


what do you mean? By setting to 0 the packages are not re-injected into the 
pipe but go through other existing rules after the matching pipe, or not?


-- 

Atenciosamente, J.M.
Responsável Plantão Site Support Matik
Infomatik Internet Technology
(18)3551.8155  (18)8112.7007
http://info.matik.com.br







A mensagem foi scaneada pelo sistema de e-mail e pode ser considerada segura.
Service fornecido pelo Datacenter Matik  https://datacenter.matik.com.br
___
freebsd-ipfw@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ipfw
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: kern/121955: [ipfw] [panic] freebsd 7.0 panic with mpd

2008-03-24 Thread AT Matik
On Monday 24 March 2008 12:46:41 Alexander Shulikov wrote:
 Interesting changelog in cvs:

 Revision 1.114: download - view: text, markup, annotated - select for diffs
 Tue Dec 25 09:36:51 2007 UTC (2 months, 4 weeks ago) by oleg
 Branches: MAIN
 Diff to: previous 1.113: preferred, colored
 Changes since revision 1.113: +22 -7 lines

 Workaround p-numbytes overflow, which can result in infinite loop inside
 dummynet module (prerequisite is using queues with fat pipe).

 PR:   kern/113548


nice, this was in december right and after this date the problem still ocurres 
with dynamic pipes (mask src|dst-ip 0xfff)





 2008/3/24, Alexander Shulikov [EMAIL PROTECTED]:
  In real script I have in and out. But some ip's for the same speed I
   add in table, and then do:
   # 512/128
   ${fwcmd} pipe 357 config bw 128Kbit/s queue 100 mask src-ip 0x
   ${fwcmd} pipe 358 config bw 512Kbit/s queue 100 mask dst-ip 0x
   ${fwcmd} add pipe 357 ip from table(3) to any in
   ${fwcmd} add pipe 358 ip from any to table(3) out
 
   IPs for individual speed added as in example in previous letter, but
   with in/out.
 
   But what can I do for resolve this problem. Now I have server with
   FreeBSD 6.2 and copy of this configs - and all works fine. o_O
 
   2008/3/24, AT Matik [EMAIL PROTECTED]:
On Monday 24 March 2008 11:51:44 Alexander Shulikov wrote:
  # sysctl -a | grep one_pass
  net.inet.ip.fw.one_pass: 0
 
  Yes - it eq 0. But I need it for next situation: all net I need
  shape at one speed, but invididual ip addresses to another speed.
  For example,
  ipfw pipe 1 config bw 10Mbit/s queue 100
  ipfw pipe 2 config bw 10Mbit/s queue 100
  ipfw add pipe 1 ip from 192.168.1.0/24 to any
  ipfw add pipe 2 ip from any to 192.168.1.0/24
  ipfw pipe 3 config bw 1Mbit/s queue 100
  ipfw pipe 4 config bw 1Mbit/s queue 100
  ipfw add pipe 3 ip from 192.168.1.1/32 to any
  ipfw add pipe 4 ip from any to 192.168.1.1/32
   
that should work, I have similar setups running fine
 the /32 mask you should not need but I am missing the in/out
definition in your rules
   
  ..
 
 
  Also this configuration work in FreeBSD 6.2. (May be in 6.2 smaller
  call tree?)
 
  2008/3/24, AT Matik [EMAIL PROTECTED]:
   On Monday 24 March 2008 08:08:02 Andrey V. Elsukov wrote:
 AT Matik wrote:
  what do you mean? By setting to 0 the packages are not
  re-injected into the pipe but go through other existing
  rules after the matching pipe, or not?

 When you reset net.inet.ip.fw.one_pass to zero, packets return
 back into ipfw to the next rule after dummynet/netgraph. And
 if you have similar rules packets will be passed into
 dummynet/netgraph again.

 This is example how to get double fault (from mail archive):
  
   jaaa well but that is the famous bw 0 example which is not valid,
   as by itself certainly an invalid config, not connected to the
   existing problem the reporter has I guess
  
João
  
 ifconfig em0 192.168.0.2/24
 kldload ipfw
 kldload dummynet
 sysctl net.inet.ip.fw.one_pass=0
 ipfw pipe 2 config bw 0
 ipfw add 2 pipe 2 ip from any to any
 ipfw add 2 pipe 2 ip from any to any
 ipfw add 2 pipe 2 ip from any to any
 ipfw add 2 pipe 2 ip from any to any
 ipfw add 2 pipe 2 ip from any to any
 ipfw add 2 pipe 2 ip from any to any
 ipfw add 2 pipe 2 ip from any to any
 ipfw add 2 pipe 2 ip from any to any
 ipfw add 2 pipe 2 ip from any to any
 ipfw add 2 pipe 2 ip from any to any
 ipfw add 2 pipe 2 ip from any to any
 ipfw add 2 pipe 2 ip from any to any
 ipfw add 2 pipe 2 ip from any to any
 ipfw add 2 pipe 2 ip from any to any
 ipfw add 2 pipe 2 ip from any to any
 ipfw add 2 pipe 2 ip from any to any
 ipfw add 2 pipe 2 ip from any to any
 ping 192.168.0.1
  
--
  
  
   Atenciosamente, J.M.
Responsável Plantão Site Support Matik
Infomatik Internet Technology
(18)3551.8155  (18)8112.7007
http://info.matik.com.br
  
  
  
  
  
  
  
A mensagem foi scaneada pelo sistema de e-mail e pode ser
   considerada segura. Service fornecido pelo Datacenter Matik
   https://datacenter.matik.com.br
   
--
   
   
 Atenciosamente, J.M.
 Responsável Plantão Site Support Matik
 Infomatik Internet Technology
 (18)3551.8155  (18)8112.7007
 http://info.matik.com.br
   
   
   
   
   
   
   
 A mensagem foi scaneada pelo sistema de e-mail e pode ser considerada
segura. Service fornecido pelo Datacenter Matik 
https://datacenter.matik.com.br

-- 

Atenciosamente, J.M.
Responsável Plantão 

Re: kern/121955: [ipfw] [panic] freebsd 7.0 panic with mpd

2008-03-24 Thread Alexander Shulikov
By default I have:
# sysctl kern.ipc.nmbclusters
kern.ipc.nmbclusters: 25600
# sysctl net.inet.ip.intr_queue_maxlen
net.inet.ip.intr_queue_maxlen: 50

What range of value is optimal to try?
Also I add to loader.conf:
kern.maxusers=1536
kern.ipc.maxpipekva=3200
net.graph.maxalloc=2048
(but it was added after panic's)

Other thing, that I want to try - net.isr.direct - 0? May be it
temprorary resolved problem, because packet will be going to queue for
processing.

2008/3/24, AT Matik [EMAIL PROTECTED]:
 On Monday 24 March 2008 12:11:44 Alexander Shulikov wrote:
   In real script I have in and out. But some ip's for the same speed I
   add in table, and then do:
   # 512/128
   ${fwcmd} pipe 357 config bw 128Kbit/s queue 100 mask src-ip 0x
   ${fwcmd} pipe 358 config bw 512Kbit/s queue 100 mask dst-ip 0x
   ${fwcmd} add pipe 357 ip from table(3) to any in
   ${fwcmd} add pipe 358 ip from any to table(3) out
  
   IPs for individual speed added as in example in previous letter, but
   with in/out.
  
   But what can I do for resolve this problem. Now I have server with
   FreeBSD 6.2 and copy of this configs - and all works fine. o_O
  



 well I use the above different, first I define the pipe and second the bw
  anyway I do not use tables

  also seems you use long queues so may be you like to tune
  net.inet.ip.intr_queue_maxlen and mbuf of your machine




   2008/3/24, AT Matik [EMAIL PROTECTED]:
On Monday 24 March 2008 11:51:44 Alexander Shulikov wrote:
  # sysctl -a | grep one_pass
  net.inet.ip.fw.one_pass: 0
 
  Yes - it eq 0. But I need it for next situation: all net I need shape
  at one speed, but invididual ip addresses to another speed.
  For example,
  ipfw pipe 1 config bw 10Mbit/s queue 100
  ipfw pipe 2 config bw 10Mbit/s queue 100
  ipfw add pipe 1 ip from 192.168.1.0/24 to any
  ipfw add pipe 2 ip from any to 192.168.1.0/24
  ipfw pipe 3 config bw 1Mbit/s queue 100
  ipfw pipe 4 config bw 1Mbit/s queue 100
  ipfw add pipe 3 ip from 192.168.1.1/32 to any
  ipfw add pipe 4 ip from any to 192.168.1.1/32
   
that should work, I have similar setups running fine
 the /32 mask you should not need but I am missing the in/out definition
in your rules
   
  ..
 
 
  Also this configuration work in FreeBSD 6.2. (May be in 6.2 smaller
  call tree?)
 
  2008/3/24, AT Matik [EMAIL PROTECTED]:
   On Monday 24 March 2008 08:08:02 Andrey V. Elsukov wrote:
 AT Matik wrote:
  what do you mean? By setting to 0 the packages are not
  re-injected into the pipe but go through other existing rules
  after the matching pipe, or not?

 When you reset net.inet.ip.fw.one_pass to zero, packets return
 back into ipfw to the next rule after dummynet/netgraph. And if
 you have similar rules packets will be passed into
 dummynet/netgraph again.

 This is example how to get double fault (from mail archive):
  
   jaaa well but that is the famous bw 0 example which is not valid, as
   by itself certainly an invalid config, not connected to the existing
   problem the reporter has I guess
  
João
  
 ifconfig em0 192.168.0.2/24
 kldload ipfw
 kldload dummynet
 sysctl net.inet.ip.fw.one_pass=0
 ipfw pipe 2 config bw 0
 ipfw add 2 pipe 2 ip from any to any
 ipfw add 2 pipe 2 ip from any to any
 ipfw add 2 pipe 2 ip from any to any
 ipfw add 2 pipe 2 ip from any to any
 ipfw add 2 pipe 2 ip from any to any
 ipfw add 2 pipe 2 ip from any to any
 ipfw add 2 pipe 2 ip from any to any
 ipfw add 2 pipe 2 ip from any to any
 ipfw add 2 pipe 2 ip from any to any
 ipfw add 2 pipe 2 ip from any to any
 ipfw add 2 pipe 2 ip from any to any
 ipfw add 2 pipe 2 ip from any to any
 ipfw add 2 pipe 2 ip from any to any
 ipfw add 2 pipe 2 ip from any to any
 ipfw add 2 pipe 2 ip from any to any
 ipfw add 2 pipe 2 ip from any to any
 ipfw add 2 pipe 2 ip from any to any
 ping 192.168.0.1
  
--
  
  
   Atenciosamente, J.M.
Responsável Plantão Site Support Matik
Infomatik Internet Technology
(18)3551.8155  (18)8112.7007
http://info.matik.com.br
  
  
  
  
  
  
  
A mensagem foi scaneada pelo sistema de e-mail e pode ser
   considerada segura. Service fornecido pelo Datacenter Matik
   https://datacenter.matik.com.br
   
--
   
   
 Atenciosamente, J.M.
 Responsável Plantão Site Support Matik
 Infomatik Internet Technology
 (18)3551.8155  (18)8112.7007
 http://info.matik.com.br
   
   
   
   
   
   
   
 A mensagem foi scaneada pelo sistema de e-mail e pode ser considerada
segura. Service 

Re: kern/121955: [ipfw] [panic] freebsd 7.0 panic with mpd

2008-03-24 Thread AT Matik
On Monday 24 March 2008 16:08:10 Alexander Shulikov wrote:
 By default I have:
 # sysctl kern.ipc.nmbclusters
 kern.ipc.nmbclusters: 25600

hard to say, do you checked netstat -m if you get to your limit? If you get 
there set it higher

 # sysctl net.inet.ip.intr_queue_maxlen
 net.inet.ip.intr_queue_maxlen: 50

seems to be the default
try 128, 256, 512


 What range of value is optimal to try?
 Also I add to loader.conf:
 kern.maxusers=1536

I guess maxusers does not help for your setup and probably you should let the 
system selftune itself


 kern.ipc.maxpipekva=3200
 net.graph.maxalloc=2048
 (but it was added after panic's)


I believe both do not help anything for ipfw


 Other thing, that I want to try - net.isr.direct - 0? May be it
 temprorary resolved problem, because packet will be going to queue for
 processing.


I guess this does not help dummynet either




 2008/3/24, AT Matik [EMAIL PROTECTED]:
  On Monday 24 March 2008 12:11:44 Alexander Shulikov wrote:
In real script I have in and out. But some ip's for the same speed I
add in table, and then do:
# 512/128
${fwcmd} pipe 357 config bw 128Kbit/s queue 100 mask src-ip 0x
${fwcmd} pipe 358 config bw 512Kbit/s queue 100 mask dst-ip 0x
${fwcmd} add pipe 357 ip from table(3) to any in
${fwcmd} add pipe 358 ip from any to table(3) out
   
IPs for individual speed added as in example in previous letter, but
with in/out.
   
But what can I do for resolve this problem. Now I have server with
FreeBSD 6.2 and copy of this configs - and all works fine. o_O
 
  well I use the above different, first I define the pipe and second the bw
   anyway I do not use tables
 
   also seems you use long queues so may be you like to tune
   net.inet.ip.intr_queue_maxlen and mbuf of your machine
 
2008/3/24, AT Matik [EMAIL PROTECTED]:
 On Monday 24 March 2008 11:51:44 Alexander Shulikov wrote:
   # sysctl -a | grep one_pass
   net.inet.ip.fw.one_pass: 0
  
   Yes - it eq 0. But I need it for next situation: all net I need
   shape at one speed, but invididual ip addresses to another speed.
   For example,
   ipfw pipe 1 config bw 10Mbit/s queue 100
   ipfw pipe 2 config bw 10Mbit/s queue 100
   ipfw add pipe 1 ip from 192.168.1.0/24 to any
   ipfw add pipe 2 ip from any to 192.168.1.0/24
   ipfw pipe 3 config bw 1Mbit/s queue 100
   ipfw pipe 4 config bw 1Mbit/s queue 100
   ipfw add pipe 3 ip from 192.168.1.1/32 to any
   ipfw add pipe 4 ip from any to 192.168.1.1/32

 that should work, I have similar setups running fine
  the /32 mask you should not need but I am missing the in/out
 definition in your rules

   ..
  
  
   Also this configuration work in FreeBSD 6.2. (May be in 6.2
   smaller call tree?)
  
   2008/3/24, AT Matik [EMAIL PROTECTED]:
On Monday 24 March 2008 08:08:02 Andrey V. Elsukov wrote:
  AT Matik wrote:
   what do you mean? By setting to 0 the packages are not
   re-injected into the pipe but go through other existing
   rules after the matching pipe, or not?
 
  When you reset net.inet.ip.fw.one_pass to zero, packets
  return back into ipfw to the next rule after
  dummynet/netgraph. And if you have similar rules packets
  will be passed into
  dummynet/netgraph again.
 
  This is example how to get double fault (from mail archive):
   
jaaa well but that is the famous bw 0 example which is not
valid, as by itself certainly an invalid config, not connected
to the existing problem the reporter has I guess
   
 João
   
  ifconfig em0 192.168.0.2/24
  kldload ipfw
  kldload dummynet
  sysctl net.inet.ip.fw.one_pass=0
  ipfw pipe 2 config bw 0
  ipfw add 2 pipe 2 ip from any to any
  ipfw add 2 pipe 2 ip from any to any
  ipfw add 2 pipe 2 ip from any to any
  ipfw add 2 pipe 2 ip from any to any
  ipfw add 2 pipe 2 ip from any to any
  ipfw add 2 pipe 2 ip from any to any
  ipfw add 2 pipe 2 ip from any to any
  ipfw add 2 pipe 2 ip from any to any
  ipfw add 2 pipe 2 ip from any to any
  ipfw add 2 pipe 2 ip from any to any
  ipfw add 2 pipe 2 ip from any to any
  ipfw add 2 pipe 2 ip from any to any
  ipfw add 2 pipe 2 ip from any to any
  ipfw add 2 pipe 2 ip from any to any
  ipfw add 2 pipe 2 ip from any to any
  ipfw add 2 pipe 2 ip from any to any
  ipfw add 2 pipe 2 ip from any to any
  ping 192.168.0.1
   
 --
   
   
Atenciosamente, J.M.
 Responsável Plantão Site Support Matik
 Infomatik Internet Technology
 (18)3551.8155  (18)8112.7007
 http://info.matik.com.br
   

Re: kern/121955: [ipfw] [panic] freebsd 7.0 panic with mpd

2008-03-24 Thread AT Matik
On Monday 24 March 2008 17:00:43 Alexander Shulikov wrote:
 2008/3/24, AT Matik [EMAIL PROTECTED]:
  On Monday 24 March 2008 16:08:10 Alexander Shulikov wrote:
 By default I have:
 # sysctl kern.ipc.nmbclusters
 kern.ipc.nmbclusters: 25600
  
   hard to say, do you checked netstat -m if you get to your limit? If you
   get there set it higher

 When It works - there is alright. But when panic - I can't to see it.


I guess it will not grow so fast from one moment to another


 Other thing, that I want to try - net.isr.direct - 0? May be it
 temprorary resolved problem, because packet will be going to queue
 for processing.
  
   I guess this does not help dummynet either

 Alexander Motin (mpd server and partially netgraph developer) say
  thing, that probably trouble in depth of stack.
  And may be net.isr.direct=0 will help to process packets from queue,
  but not at the arrival time. Or no?

I can not answer this for sure but trying it out is for free :) but it will 
not help here I guess

Even if I believe the problem is in ipfw you probably should try to isolate if 
it is in any means related to mpd, probably you can run your ppp from another 
server and run ipfw only on this one, after that you know more

you are with 7-R or 7-Stable?



 Andrey and AT Matik:

my name is João, this is my company email address



 Can we talk via jabber or icq? (for decrease traffic in conference,
 but send in conference result)
 ___
 freebsd-ipfw@freebsd.org mailing list
 http://lists.freebsd.org/mailman/listinfo/freebsd-ipfw
 To unsubscribe, send any mail to [EMAIL PROTECTED]







 A mensagem foi scaneada pelo sistema de e-mail e pode ser considerada
 segura. Service fornecido pelo Datacenter Matik 
 https://datacenter.matik.com.br

-- 

Atenciosamente, J.M.
Responsável Plantão Site Support Matik
Infomatik Internet Technology
(18)3551.8155  (18)8112.7007
http://info.matik.com.br







A mensagem foi scaneada pelo sistema de e-mail e pode ser considerada segura.
Service fornecido pelo Datacenter Matik  https://datacenter.matik.com.br
___
freebsd-ipfw@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ipfw
To unsubscribe, send any mail to [EMAIL PROTECTED]