From owner-freebsd-net@FreeBSD.ORG Wed Dec 1 13:26:07 2004 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 6DDA716A4CF for ; Wed, 1 Dec 2004 13:26:07 +0000 (GMT) Received: from smtp.astra.net.uk (smtp.astra.net.uk [212.47.64.5]) by mx1.FreeBSD.org (Postfix) with ESMTP id 37BF043D54 for ; Wed, 1 Dec 2004 13:26:06 +0000 (GMT) (envelope-from mike@nux.co.uk) Received: from imap.nux.co.uk (unknown [194.165.198.17]) (using TLSv1 with cipher EDH-RSA-DES-CBC3-SHA (168/168 bits)) (Client did not present a certificate) by smtp.astra.net.uk (Postfix) with ESMTP id E79CF3BEC7 for ; Wed, 1 Dec 2004 13:25:58 +0000 (GMT) Received: (qmail 51146 invoked from network); 1 Dec 2004 11:20:43 -0000 Received: from unknown (HELO black.eros.office) (192.168.5.130) by imap.nux.co.uk with AES256-SHA encrypted SMTP; 1 Dec 2004 11:20:43 -0000 Received: (qmail 50782 invoked by uid 2223); 30 Nov 2004 21:17:32 -0000 Received: from localhost (sendmail-bs@127.0.0.1) by localhost with SMTP; 30 Nov 2004 21:17:32 -0000 Date: Tue, 30 Nov 2004 21:17:32 +0000 (GMT) From: Mike Wolman X-X-Sender: mike@black.eros.office To: freebsd-net@freebsd.org Message-ID: <20041130204100.A50634@black.eros.office> MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed Subject: em, vlan and pf troubles X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 01 Dec 2004 13:26:07 -0000 Hi, I am having a problem with 5.3 release with pf, vlans and the em device. The machine is being used as a firewall with about 30 vlans behind it. When this was first setup things worked as expected. However today the machine froze with no messages or dump on the console. After the reboot the client vlans were having intermittent problems connecting to the internet. From a client workstation it is not possible to now ping a vlan interface on the machine eg from 192.168.0.12 (workstation) pinging to 192.168.0.1 (this machine) # tcpdump -eni vlan23 tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on vlan23, link-type EN10MB (Ethernet), capture size 96 bytes 15:56:36.858496 00:08:74:4d:93:9c > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: arp who-has 192.168.0.1 tell 192.168.0.12 15:56:36.858525 00:0c:f1:9d:af:04 > 00:08:74:4d:93:9c, ethertype ARP (0x0806), length 42: arp reply 192.168.0.1 is-at 00:0c:f1:9d:af:04 15:56:39.857172 00:08:74:4d:93:9c > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: arp who-has 192.168.0.1 tell 192.168.0.12 15:56:39.857200 00:0c:f1:9d:af:04 > 00:08:74:4d:93:9c, ethertype ARP (0x0806), length 42: arp reply 192.168.0.1 is-at 00:0c:f1:9d:af:04 15:56:45.885248 00:08:74:4d:93:9c > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: arp who-has 192.168.0.1 tell 192.168.0.12 15:56:45.885274 00:0c:f1:9d:af:04 > 00:08:74:4d:93:9c, ethertype ARP (0x0806), length 42: arp reply 192.168.0.1 is-at 00:0c:f1:9d:af:04 The arp request never makes it back to the client workstation. However the client is able to sometimes able ping past the firewall to a destination beyond it so nat looks like it is working as they have other intermittent connectivity. This particular host is the default gateway for just 2 of the vlans, there is another freebsd 5.2.1-RELEASE-p9 box as the main firewall - all machines are connected to the same switch stack (netgear) - both boxes are dells using the onboard em0 interfaces - the 5.2 box has not caused any problems. I have had a hunt on the lists and found: http://marc.theaimsgroup.com/?l=freebsd-net&m=110172867801777&w=2 I am not sure if this is related but suspect it is - if so will adding a different card from a different vendor fix this? (the machine is at a remote location but if this will fix the problem off i go) Other oddities noted are that arp requests from the machine to a client workstation does not get properly tagged when leaving when tcpdumping on the parent vlan interface (em0): 20:35:56.440045 00:0c:f1:9d:af:04 > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 42: arp who-has 192.168.0.7 tell 192.168.0.1 20:35:57.441227 00:0c:f1:9d:af:04 > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 42: arp who-has 192.168.0.7 tell 192.168.0.1 20:35:58.451243 00:0c:f1:9d:af:04 > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 42: arp who-has 192.168.0.7 tell 192.168.0.1 20:35:59.461268 00:0c:f1:9d:af:04 > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 42: arp who-has 192.168.0.7 tell 192.168.0.1 I checked this against a similar setup but with openbsd and the arp requests are properly tagged: 20:07:49.170233 0:c0:9f:30:ab:1 ff:ff:ff:ff:ff:ff 8100 46: 802.1Q vid 131 pri 0 arp who-has 10.3.131.7 tell 10.3.131.1 20:07:50.180047 0:c0:9f:30:ab:1 ff:ff:ff:ff:ff:ff 8100 46: 802.1Q vid 131 pri 0 arp who-has 10.3.131.7 tell 10.3.131.1 20:07:51.190023 0:c0:9f:30:ab:1 ff:ff:ff:ff:ff:ff 8100 46: 802.1Q vid 131 pri 0 arp who-has 10.3.131.7 tell 10.3.131.1 20:07:52.200021 0:c0:9f:30:ab:1 ff:ff:ff:ff:ff:ff 8100 46: 802.1Q vid 131 pri 0 arp who-has 10.3.131.7 tell 10.3.131.1 However for a client arp request things seem ok: 20:54:10.310243 00:01:e6:a4:4b:95 > ff:ff:ff:ff:ff:ff, ethertype 802.1Q (0x8100), length 64: vlan 119, p 0, ethertype ARP, arp who-has 172.16.13.57 tell 172.16.13.205 20:54:27.463083 00:01:e6:a4:4b:95 > ff:ff:ff:ff:ff:ff, ethertype 802.1Q (0x8100), length 64: vlan 119, p 0, ethertype ARP, arp who-has 172.16.13.57 tell 172.16.13.205 20:54:44.615286 00:01:e6:a4:4b:95 > ff:ff:ff:ff:ff:ff, ethertype 802.1Q (0x8100), length 64: vlan 119, p 0, ethertype ARP, arp who-has 172.16.13.57 tell 172.16.13.205 When trying to connect to the machine from a vlaned computer the tcpdump on em0 again shows the arp request entering with a vlan tag and the reply leaving with no vlan tag. 21:00:37.204082 00:c0:9f:31:82:f1 > ff:ff:ff:ff:ff:ff, ethertype 802.1Q (0x8100), length 64: vlan 253, p 0, ethertype ARP, arp who-has 10.2.253.2 (6f:6c:3d:49:4d:41) tell 10.2.253.50 21:00:37.204123 00:0c:f1:9d:af:04 > 00:c0:9f:31:82:f1, ethertype ARP (0x0806), length 42: arp reply 10.2.253.2 is-at 00:0c:f1:9d:af:04 Below are dmesgs, pf.conf and rc.conf, Any help would be much appreciated, Mike. ----------------------------------------- rc.conf: defaultrouter="135.196.3.9" gateway_enable="YES" hostname="thxgate2.thx.office" ifconfig_fxp0="inet 135.196.x.yy netmask 255.255.255.248" ifconfig_xl0="inet 10.2.254.2 netmask 255.255.255.0" cloned_interfaces="vlan1 vlan2 vlan3 vlan4 vlan5 vlan6 vlan7 vlan8 vlan9 vlan10 vlan11 vlan12 vlan13 vlan14 vlan15 vlan16 vlan17 vlan18 vlan19 vlan20 vlan23 vlan24 vlan25 vlan26 vlan27 vlan28 vlan29 vlan30 vlan53" ifconfig_em0="up" ifconfig_vlan1="inet 10.2.101.2 netmask 255.255.255.0 vlan 101 vlandev em0" ifconfig_vlan2="inet 10.2.102.2 netmask 255.255.255.0 vlan 102 vlandev em0" ifconfig_vlan3="inet 10.2.103.2 netmask 255.255.255.0 vlan 103 vlandev em0" ifconfig_vlan4="inet 10.2.104.2 netmask 255.255.255.0 vlan 104 vlandev em0" ifconfig_vlan5="inet 10.2.105.2 netmask 255.255.255.0 vlan 105 vlandev em0" ifconfig_vlan6="inet 10.2.106.2 netmask 255.255.255.0 vlan 106 vlandev em0" ifconfig_vlan7="inet 10.2.107.2 netmask 255.255.255.0 vlan 107 vlandev em0" ifconfig_vlan8="inet 10.2.108.2 netmask 255.255.255.0 vlan 108 vlandev em0" ifconfig_vlan9="inet 10.2.109.2 netmask 255.255.255.0 vlan 109 vlandev em0" ifconfig_vlan10="inet 10.2.110.2 netmask 255.255.255.0 vlan 110 vlandev em0" ifconfig_vlan11="inet 10.2.111.2 netmask 255.255.255.0 vlan 111 vlandev em0" ifconfig_vlan12="inet 10.2.112.2 netmask 255.255.255.0 vlan 112 vlandev em0" ifconfig_vlan13="inet 10.2.113.2 netmask 255.255.255.0 vlan 113 vlandev em0" ifconfig_vlan14="inet 10.2.114.2 netmask 255.255.255.0 vlan 114 vlandev em0" ifconfig_vlan15="inet 10.2.115.2 netmask 255.255.255.0 vlan 115 vlandev em0" ifconfig_vlan16="inet 10.2.116.2 netmask 255.255.255.0 vlan 116 vlandev em0" ifconfig_vlan17="inet 10.2.117.2 netmask 255.255.255.0 vlan 117 vlandev em0" ifconfig_vlan18="inet 10.2.118.2 netmask 255.255.255.0 vlan 118 vlandev em0" ifconfig_vlan19="inet 172.16.13.1 netmask 255.255.255.0 vlan 119 vlandev em0" ifconfig_vlan20="inet 10.2.120.2 netmask 255.255.255.0 vlan 120 vlandev em0" ifconfig_vlan23="inet 192.168.0.1 netmask 255.255.255.0 vlan 123 vlandev em0" ifconfig_vlan24="inet 10.2.124.2 netmask 255.255.255.0 vlan 124 vlandev em0" ifconfig_vlan25="inet 10.2.125.2 netmask 255.255.255.0 vlan 125 vlandev em0" ifconfig_vlan26="inet 10.2.126.2 netmask 255.255.255.0 vlan 126 vlandev em0" ifconfig_vlan27="inet 10.2.127.2 netmask 255.255.255.0 vlan 127 vlandev em0" ifconfig_vlan28="inet 10.2.128.2 netmask 255.255.255.0 vlan 128 vlandev em0" ifconfig_vlan29="inet 10.2.129.2 netmask 255.255.255.0 vlan 129 vlandev em0" ifconfig_vlan30="inet 10.2.130.2 netmask 255.255.255.0 vlan 130 vlandev em0" ifconfig_vlan53="inet 10.2.253.2 netmask 255.255.255.0 vlan 253 vlandev em0" keymap="uk.cp850" sshd_enable="YES" usbd_enable="NO" background_fsck="NO" inetd_enable="YES" pf_enable="YES" # Set to YES to enable packet filter (pf) pflog_enable="YES" ------------------------------------------------------------------------ [thxgate2] /etc# cat /etc/pf.conf ext_if = "fxp0" mgmt_if = "xl0" vnet_101 = "vlan1" vnet_102 = "vlan2" vnet_103 = "vlan3" vnet_104 = "vlan4" vnet_105 = "vlan5" vnet_106 = "vlan6" vnet_107 = "vlan7" vnet_108 = "vlan8" vnet_109 = "vlan9" vnet_110 = "vlan10" vnet_111 = "vlan11" vnet_112 = "vlan12" vnet_113 = "vlan13" vnet_114 = "vlan14" vnet_115 = "vlan15" vnet_116 = "vlan16" vnet_117 = "vlan17" vnet_118 = "vlan18" vnet_119 = "vlan19" vnet_120 = "vlan20" vnet_123 = "vlan23" vnet_124 = "vlan24" vnet_125 = "vlan25" vnet_126 = "vlan26" vnet_127 = "vlan27" vnet_128 = "vlan28" vnet_129 = "vlan29" vnet_130 = "vlan30" vnet_253 = "vlan53" thxmgmt1 = "10.2.254.3" thxmgmt2 = "10.2.254.4" thxm = "10.2.253.50" sqmail = "10.2.253.54" internal_net = "10.2.0.0/16" nuance_net = "172.16.13.0/24" other_net = "192.168.0.0/24" eros_office_ip = "194.165.yy.xx" #Tables table { xx.xxx.xx.xx yy.yy.yy.yy } table { 10.2.0.0/16 172.16.13.0/24 192.168.0.0/24 } # Options set limit { states 10000, frags 10000 } set loginterface em0 set optimization normal set block-policy drop set fingerprints "/etc/pf.os" # Normalization scrub in all # Translation nat/rdr #normal nat on ext_if1 and ext_if3 for 10.2.0.0/16 nat on $ext_if from {$internal_net} to any -> ($ext_if) #special case vlan but gets routed through ext_if nat on $ext_if from {"192.168.0.0/24"} to any -> ($ext_if) #special case get their own connection nat on $ext_if from {"172.16.13.0/24"} to any -> ($ext_if) #rdr for nagios and eros access rdr pass on $ext_if proto tcp from { } to $ext_if port 2022 -> $thxmgmt2 port 22 # rdr outgoing FTP requests to the ftp-proxy rdr on $vnet_101 proto tcp from any to any port ftp -> 127.0.0.1 port 8021 rdr on $vnet_102 proto tcp from any to any port ftp -> 127.0.0.1 port 8021 rdr on $vnet_103 proto tcp from any to any port ftp -> 127.0.0.1 port 8021 rdr on $vnet_104 proto tcp from any to any port ftp -> 127.0.0.1 port 8021 rdr on $vnet_105 proto tcp from any to any port ftp -> 127.0.0.1 port 8021 rdr on $vnet_106 proto tcp from any to any port ftp -> 127.0.0.1 port 8021 rdr on $vnet_107 proto tcp from any to any port ftp -> 127.0.0.1 port 8021 rdr on $vnet_108 proto tcp from any to any port ftp -> 127.0.0.1 port 8021 rdr on $vnet_109 proto tcp from any to any port ftp -> 127.0.0.1 port 8021 rdr on $vnet_110 proto tcp from any to any port ftp -> 127.0.0.1 port 8021 rdr on $vnet_111 proto tcp from any to any port ftp -> 127.0.0.1 port 8021 rdr on $vnet_112 proto tcp from any to any port ftp -> 127.0.0.1 port 8021 rdr on $vnet_113 proto tcp from any to any port ftp -> 127.0.0.1 port 8021 rdr on $vnet_114 proto tcp from any to any port ftp -> 127.0.0.1 port 8021 rdr on $vnet_115 proto tcp from any to any port ftp -> 127.0.0.1 port 8021 rdr on $vnet_116 proto tcp from any to any port ftp -> 127.0.0.1 port 8021 rdr on $vnet_117 proto tcp from any to any port ftp -> 127.0.0.1 port 8021 rdr on $vnet_118 proto tcp from any to any port ftp -> 127.0.0.1 port 8021 rdr on $vnet_120 proto tcp from any to any port ftp -> 127.0.0.1 port 8021 rdr on $vnet_123 proto tcp from any to any port ftp -> 127.0.0.1 port 8021 rdr on $vnet_124 proto tcp from any to any port ftp -> 127.0.0.1 port 8021 rdr on $vnet_125 proto tcp from any to any port ftp -> 127.0.0.1 port 8021 rdr on $vnet_126 proto tcp from any to any port ftp -> 127.0.0.1 port 8021 rdr on $vnet_127 proto tcp from any to any port ftp -> 127.0.0.1 port 8021 rdr on $vnet_128 proto tcp from any to any port ftp -> 127.0.0.1 port 8021 rdr on $vnet_129 proto tcp from any to any port ftp -> 127.0.0.1 port 8021 rdr on $vnet_130 proto tcp from any to any port ftp -> 127.0.0.1 port 8021 rdr on $vnet_253 proto tcp from any to any port ftp -> 127.0.0.1 port 8021 rdr on $vnet_119 proto tcp from any to any port ftp -> 127.0.0.1 port 8021 rdr on $mgmt_if proto tcp from any to any port ftp -> 127.0.0.1 port 8021 #FILTERING block log all block in quick from any to 255.255.255.255 label "$if:broadcast:drop" # Loopback lo0 pass in quick on lo0 all label "lo0:$if:in" pass out quick on lo0 all label "lo0:$if:out" #mgmt_if pass in quick log on $mgmt_if from 10.2.254.0/24 to $mgmt_if label "mgmt_net:$if:to:$if:$proto" pass in log on $mgmt_if route-to lo0 proto tcp from $mgmt_if to any port 8021 keep state label "mgmt_net:$if:$dstport" pass in log on $mgmt_if proto tcp from any to any flags S/SA keep state label "mgmt_net:$if:in:$proto" pass in log on $mgmt_if proto { udp, icmp } from any to any keep state label "mgmt_net:$if:in:$proto" pass out log on $mgmt_if all keep state label "mgmt_net:$if:out" # INTERNAL VLANS # em0 interface (internal vlan host interface) pass in quick on em0 all label "internal_vlan_parent_if:$if:in" pass out quick on em0 all label "internal_vlan_parent_if:$if:in" #Standard Vlans #block in quick log on $vnet_101 from "10.0.0.0/16" pass in log on $vnet_101 from any to ! keep state pass out log on $vnet_101 all keep state pass in log on $vnet_102 from any to ! keep state pass out log on $vnet_102 all keep state pass in log on $vnet_103 from any to ! keep state pass out log on $vnet_103 all keep state pass in log on $vnet_104 from any to ! keep state pass out log on $vnet_104 all keep state pass in log on $vnet_105 from any to ! keep state pass out log on $vnet_105 all keep state pass in log on $vnet_106 from any to ! keep state pass out log on $vnet_106 all keep state pass in log on $vnet_107 from any to ! keep state pass out log on $vnet_107 all keep state pass in log on $vnet_108 from any to ! keep state pass out log on $vnet_108 all keep state pass in log on $vnet_109 from any to ! keep state pass out log on $vnet_109 all keep state pass in log on $vnet_110 from any to ! keep state pass out log on $vnet_110 all keep state pass in log on $vnet_111 from any to ! keep state pass out log on $vnet_111 all keep state pass in log on $vnet_112 from any to ! keep state pass out log on $vnet_112 all keep state pass in log on $vnet_113 from any to ! keep state pass out log on $vnet_113 all keep state pass in log on $vnet_114 from any to ! keep state pass out log on $vnet_114 all keep state pass in log on $vnet_115 from any to ! keep state pass out log on $vnet_115 all keep state pass in log on $vnet_116 from any to ! keep state pass out log on $vnet_116 all keep state pass in log on $vnet_117 from any to ! keep state pass out log on $vnet_117 all keep state pass in log on $vnet_118 from any to ! keep state pass out log on $vnet_118 all keep state pass in log on $vnet_119 from any to ! keep state pass out log on $vnet_119 all keep state pass in log on $vnet_120 from any to ! keep state pass out log on $vnet_120 all keep state pass in log on $vnet_123 from any to ! keep state pass out log on $vnet_123 all keep state pass in log on $vnet_124 from any to ! keep state pass out log on $vnet_124 all keep state pass in log on $vnet_125 from any to ! keep state pass out log on $vnet_125 all keep state pass in log on $vnet_126 from any to ! keep state pass out log on $vnet_126 all keep state pass in log on $vnet_253 from any to ! keep state pass out log on $vnet_253 all keep state # External Interfaces # [silently drop broadcasts (cable modem noise. etc)] #block in quick on $ext_if from any to 255.255.255.255 label "ext1:$if:broadcast:drop" #antispoof log for $ext_if label "ext1:$if:antispoof" #antispoof log for all label "$if:antispoof" block quick on $ext_if proto {tcp,udp} from any to any port {137,138,139,445} label "ext1:$if:$dstport:block" #allow eros_ips to connect to ssh pass in log quick on $ext_if proto tcp from { } to $ext_if port 22 keep state label "ext1:$if:$dstport:pass" pass in log quick on $ext_if proto tcp from { } to $ext_if port 80 keep state label "ext1:$if:$dstport:pass" #allow ping from certain ips to both interfaces pass in on $ext_if inet proto icmp from { } icmp-type 8 code 0 keep state label "ext1:$if:ping:pass" # general "pass out" rules for external interfaces pass out log on $ext_if proto tcp from any to any flags S/SA keep state pass out log on $ext_if proto { udp, icmp, gre, esp, ipencap } from any to any keep state ------------------------------------------------------------------------- uname -a FreeBSD thxgate2.thx.office 5.3-RELEASE FreeBSD 5.3-RELEASE #0: Fri Nov 5 04:19:18 UTC 2004 root@harlow.cse.buffalo.edu:/usr/obj/usr/src/sys/GENERIC i386 ------------------------------------------------------------------------- dmesg: Copyright (c) 1992-2004 The FreeBSD Project. Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994 The Regents of the University of California. All rights reserved. FreeBSD 5.3-RELEASE #0: Fri Nov 5 04:19:18 UTC 2004 root@harlow.cse.buffalo.edu:/usr/obj/usr/src/sys/GENERIC Timecounter "i8254" frequency 1193182 Hz quality 0 CPU: Intel(R) Celeron(R) CPU 2.40GHz (2394.01-MHz 686-class CPU) Origin = "GenuineIntel" Id = 0xf29 Stepping = 9 Features=0xbfebfbff real memory = 267862016 (255 MB) avail memory = 252563456 (240 MB) ACPI APIC Table: ioapic0: Changing APIC ID to 1 ioapic0 irqs 0-23 on motherboard npx0: [FAST] npx0: on motherboard npx0: INT 16 interface acpi0: on motherboard acpi0: Power Button (fixed) Timecounter "ACPI-safe" frequency 3579545 Hz quality 1000 acpi_timer0: <24-bit timer at 3.579545MHz> port 0x808-0x80b on acpi0 cpu0: on acpi0 acpi_button0: on acpi0 pcib0: port 0xcf8-0xcff on acpi0 pci0: on pcib0 agp0: mem 0xf0000000-0xf7ffffff at device 0.0 on pci0 pcib1: at device 1.0 on pci0 pci1: on pcib1 uhci0: port 0xff80-0xff9f irq 16 at device 29.0 on pci0 uhci0: [GIANT-LOCKED] usb0: on uhci0 usb0: USB revision 1.0 uhub0: Intel UHCI root hub, class 9/0, rev 1.00/1.00, addr 1 uhub0: 2 ports with 2 removable, self powered uhci1: port 0xff60-0xff7f irq 19 at device 29.1 on pci0 uhci1: [GIANT-LOCKED] usb1: on uhci1 usb1: USB revision 1.0 uhub1: Intel UHCI root hub, class 9/0, rev 1.00/1.00, addr 1 uhub1: 2 ports with 2 removable, self powered uhci2: port 0xff40-0xff5f irq 18 at device 29.2 on pci0 uhci2: [GIANT-LOCKED] usb2: on uhci2 usb2: USB revision 1.0 uhub2: Intel UHCI root hub, class 9/0, rev 1.00/1.00, addr 1 uhub2: 2 ports with 2 removable, self powered uhci3: port 0xff20-0xff3f irq 16 at device 29.3 on pci0 uhci3: [GIANT-LOCKED] usb3: on uhci3 usb3: USB revision 1.0 uhub3: Intel UHCI root hub, class 9/0, rev 1.00/1.00, addr 1 uhub3: 2 ports with 2 removable, self powered pci0: at device 29.7 (no driver attached) pcib2: at device 30.0 on pci0 pci2: on pcib2 pci2: at device 0.0 (no driver attached) twe0: <3ware Storage Controller. Driver version 1.50.01.002> port 0xdcf0-0xdcff mem 0xfe000000-0xfe7fffff irq 22 at device 1.0 on pci2 twe0: [GIANT-LOCKED] twe0: 2 ports, Firmware FE7X 1.05.00.063, BIOS BE7X 1.08.00.048 xl0: <3Com 3c905C-TX Fast Etherlink XL> port 0xdd80-0xddff mem 0xfe8ddf80-0xfe8ddfff irq 17 at device 2.0 on pci2 miibus0: on xl0 ukphy0: on miibus0 ukphy0: 10baseT, 10baseT-FDX, 100baseTX, 100baseTX-FDX, auto xl0: Ethernet address: 00:04:75:f4:6f:16 fxp0: port 0xdd00-0xdd3f mem 0xfe900000-0xfe9fffff,0xfe8df000-0xfe8dffff irq 19 at device 3.0 on pci2 miibus1: on fxp0 inphy0: on miibus1 inphy0: 10baseT, 10baseT-FDX, 100baseTX, 100baseTX-FDX, auto fxp0: Ethernet address: 00:02:b3:5b:38:ee em0: port 0xdd40-0xdd7f mem 0xfe8e0000-0xfe8fffff irq 18 at device 12.0 on pci2 em0: Ethernet address: 00:0c:f1:9d:af:04 em0: Speed:N/A Duplex:N/A isab0: at device 31.0 on pci0 isa0: on isab0 atapci0: port 0xffa0-0xffaf,0x376,0x170-0x177,0x3f6,0x1f0-0x1f7 irq 18 at device 31.1 on pci0 ata0: channel #0 on atapci0 ata1: channel #1 on atapci0 atapci1: port 0xfea0-0xfeaf,0xfe30-0xfe33,0xfe20-0xfe27,0xfe10-0xfe13,0xfe00-0xfe07 irq 18 at device 31.2 on p ci0 ata2: channel #0 on atapci1 ata3: channel #1 on atapci1 pci0: at device 31.3 (no driver attached) pci0: at device 31.5 (no driver attached) fdc0: port 0x3f7,0x3f0-0x3f5 irq 6 drq 2 on acpi0 fdc0: [FAST] fd0: <1440-KB 3.5" drive> on fdc0 drive 0 atkbdc0: port 0x64,0x60 irq 1 on acpi0 atkbd0: irq 1 on atkbdc0 kbd0 at atkbd0 atkbd0: [GIANT-LOCKED] sio0: <16550A-compatible COM port> port 0x3f8-0x3ff irq 4 flags 0x10 on acpi0 sio0: type 16550A, console sio1: <16550A-compatible COM port> port 0x2f8-0x2ff irq 3 on acpi0 sio1: type 16550A ppc0: port 0x778-0x77f,0x378-0x37f irq 7 on acpi0 ppc0: SMC-like chipset (ECP/EPP/PS2/NIBBLE) in COMPATIBLE mode ppc0: FIFO with 16/16/8 bytes threshold ppbus0: on ppc0 plip0: on ppbus0 lpt0: on ppbus0 lpt0: Interrupt-driven port ppi0: on ppbus0 orm0: at iomem 0xcb800-0xcbfff,0xca000-0xcb7ff,0xc9800-0xc9fff,0xc9000-0xc97ff,0xc8000-0xc8fff,0xc0000-0xc7fff on isa0 pmtimer0 on isa0 sc0: at flags 0x100 on isa0 sc0: VGA <16 virtual consoles, flags=0x100> vga0: at port 0x3c0-0x3df iomem 0xa0000-0xbffff on isa0 Timecounter "TSC" frequency 2394014348 Hz quality 800 Timecounters tick every 10.000 msec acd0: CDROM at ata1-master UDMA33 twed0: on twe0 twed0: 38145MB (78122952 sectors) Mounting root from ufs:/dev/twed0s1a