From owner-freebsd-hackers@FreeBSD.ORG Tue Sep 26 17:06:29 2006 Return-Path: X-Original-To: freebsd-hackers@freebsd.org Delivered-To: freebsd-hackers@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id BD02316A4E1 for ; Tue, 26 Sep 2006 17:06:29 +0000 (UTC) (envelope-from jhb@freebsd.org) Received: from server.baldwin.cx (66-23-211-162.clients.speedfactory.net [66.23.211.162]) by mx1.FreeBSD.org (Postfix) with ESMTP id C39F443DD7 for ; Tue, 26 Sep 2006 17:06:01 +0000 (GMT) (envelope-from jhb@freebsd.org) Received: from localhost.corp.yahoo.com (john@localhost [127.0.0.1]) (authenticated bits=0) by server.baldwin.cx (8.13.6/8.13.6) with ESMTP id k8QH5wSu049594; Tue, 26 Sep 2006 13:05:58 -0400 (EDT) (envelope-from jhb@freebsd.org) From: John Baldwin To: freebsd-hackers@freebsd.org Date: Tue, 26 Sep 2006 12:16:31 -0400 User-Agent: KMail/1.9.1 References: <7591D6A9-27EE-4ADE-AF09-84F8636ADD98@sarenet.es> <45180525.3060309@savvis.net> In-Reply-To: <45180525.3060309@savvis.net> MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit Content-Disposition: inline Message-Id: <200609261216.31760.jhb@freebsd.org> X-Greylist: Sender succeeded SMTP AUTH authentication, not delayed by milter-greylist-2.0.2 (server.baldwin.cx [127.0.0.1]); Tue, 26 Sep 2006 13:06:00 -0400 (EDT) X-Virus-Scanned: ClamAV 0.88.3/1946/Tue Sep 26 09:18:37 2006 on server.baldwin.cx X-Virus-Status: Clean X-Spam-Status: No, score=-4.4 required=4.2 tests=ALL_TRUSTED,AWL,BAYES_00 autolearn=ham version=3.1.3 X-Spam-Checker-Version: SpamAssassin 3.1.3 (2006-06-01) on server.baldwin.cx Cc: Borja Marcos Subject: Re: network stack problem in sparc64? X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 26 Sep 2006 17:06:29 -0000 On Monday 25 September 2006 12:34, Maksim Yevmenkin wrote: > Borja Marcos wrote: > > Hello, > > > > I saw this some time ago but always forgot to report it. > > > > I'm running a pair of machines with FreeBSD/sparc64 (various versions, > > one of them is running -STABLE now), and I've seen a problem with the > > network stack. > > > > Looking at buffer and window sizes, > > > > earendil# sysctl net.inet.tcp|fgrep space > > net.inet.tcp.sendspace: 0 > > net.inet.tcp.recvspace: 0 > > > > earendil# sysctl net.inet.udp > > net.inet.udp.checksum: 1 > > net.inet.udp.maxdgram: 0 > > net.inet.udp.recvspace: 0 > > > > When I try to modify them, it doesn't work at all. For example, trying > > to run nfcapd/nfsen in a sparc64 box, I get an error for a setsockopt() > > call > > > > earendil# /usr/local/etc/rc.d/nfsen start > > Starting nfsenStarting nfcpad: upstream1setsockopt(SO_RCVBUF,200000): > > Invalid argument > > Terminated due to errors. > > nfcapd exec error: exit: 255, signal: 0, coredump: 0 > > > > > > For x86 machines the values are correctly reported and they work as > > expected. > > > > I have been poking Google for this but I haven't seen any mention of this. > > hmmm... how about this (untested) patch? Probably better to use SYSCTL_ULONG() instead of SYSCTL_INT() and leave the variables as u_long. > --- tcp_usrreq.c.orig Fri Nov 4 12:26:14 2005 > +++ tcp_usrreq.c Mon Sep 25 09:31:42 2006 > @@ -1161,10 +1161,10 @@ > * sizes, respectively. These are obsolescent (this information should > * be set by the route). > */ > -u_long tcp_sendspace = 1024*32; > +int tcp_sendspace = 1024*32; > SYSCTL_INT(_net_inet_tcp, TCPCTL_SENDSPACE, sendspace, CTLFLAG_RW, > &tcp_sendspace , 0, "Maximum outgoing TCP datagram size"); > -u_long tcp_recvspace = 1024*64; > +int tcp_recvspace = 1024*64; > SYSCTL_INT(_net_inet_tcp, TCPCTL_RECVSPACE, recvspace, CTLFLAG_RW, > &tcp_recvspace , 0, "Maximum incoming TCP datagram size"); > > --- udp_usrreq.c.orig Wed Sep 13 11:19:26 2006 > +++ udp_usrreq.c Mon Sep 25 09:32:00 2006 > @@ -923,12 +923,12 @@ > return (error); > } > > -u_long udp_sendspace = 9216; /* really max datagram size */ > +int udp_sendspace = 9216; /* really max datagram size */ > /* 40 1K datagrams */ > SYSCTL_INT(_net_inet_udp, UDPCTL_MAXDGRAM, maxdgram, CTLFLAG_RW, > &udp_sendspace, 0, "Maximum outgoing UDP datagram size"); > > -u_long udp_recvspace = 40 * (1024 + > +int udp_recvspace = 40 * (1024 + > #ifdef INET6 > sizeof(struct sockaddr_in6) > #else > > thanks, > max > _______________________________________________ > freebsd-hackers@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-hackers > To unsubscribe, send any mail to "freebsd-hackers-unsubscribe@freebsd.org" > > -- John Baldwin