Current problem reports assigned to freebsd-net@FreeBSD.org
Note: to view an individual PR, use: http://www.freebsd.org/cgi/query-pr.cgi?pr=(number). The following is a listing of current problems submitted by FreeBSD users. These represent problem reports covering all versions including experimental development code and obsolete releases. S Tracker Resp. Description o kern/131310 net[panic] 7.1 panics with mpd netgraph interface changes o kern/131162 net[ath] Atheros driver bugginess and kernel crashes o kern/131153 net[iwi] iwi doesn't see a wireless network f kern/131087 net[ipw] [panic] ipw / iwi - no sent/received packets; iw o kern/130846 net[vge] vge0 not autonegotiating to 1000baseTX full dupl o kern/130820 net[ndis] wpa_supplicant(8) returns 'no space on device' o kern/130652 net[kernel] [patch] Possible deadlock in rt_check() (sys/ o kern/130628 net[nfs] NFS / rpc.lockd deadlock on 7.1-R f kern/130605 net[tcp] Certain hardware produces "Network is unreachabl o conf/130555 net[rc.d] [patch] No good way to set ipfilter variables a o kern/130525 net[ndis] [panic] 64 bit ar5008 ndisgen-erated driver cau o kern/130311 net[wlan_xauth] [panic] hostapd restart causing kernel pa o bin/130159 net[patch] ppp(8) fails to correctly set routes o kern/130109 net[ipfw] Can not set fib for packets originated from loc f kern/130059 net[panic] Leaking 50k mbufs/hour o kern/129846 net[panic] /usr/sbin/ppp causes panic "Sleeping thread ow o kern/129750 net[ath] Atheros AR5006 exits on "cannot map register spa f kern/129719 net[nfs] [panic] Panic during shutdown, tcp_ctloutput: in o kern/129580 net[ndis] Netgear WG311v3 (ndis) causes kenel trap at boo o kern/129517 net[ipsec] [panic] double fault / stack overflow o kern/129508 net[panic] Kernel panic with EtherIP (may be related to S o kern/129352 net[xl] [patch] xl0 watchdog timeout o kern/129219 net[ppp] Kernel panic when using kernel mode ppp o kern/129135 net[vge] vge driver on a VIA mini-ITX not working o bin/128954 netifconfig(8) deletes valid routes o kern/128917 net[wpi] [panic] if_wpi and wpa+tkip causing kernel panic o kern/128884 net[msk] if_msk page fault while in kernel mode o kern/128840 net[igb] page fault under load with igb/LRO o bin/128602 net[an] wpa_supplicant(8) crashes with an(4) o kern/128598 net[bluetooth] WARNING: attempt to net_add_domain(bluetoo o kern/128448 net[nfs] 6.4-RC1 Boot Fails if NFS Hostname cannot be res o conf/128334 net[request] use wpa_cli in the "WPA DHCP" situation o bin/128295 net[patch] ifconfig(8) does not print TOE4 or TOE6 capabi o bin/128001 netwpa_supplicant(8), wlan(4), and wi(4) issues o kern/127928 net[tcp] [patch] TCP bandwidth gets squeezed every time t o kern/127834 net[ixgbe] [patch] wrong error counting o kern/127826 net[iwi] iwi0 driver has reduced performance and connecti o kern/127815 net[gif] [patch] if_gif does not set vlan attributes from o kern/127724 net[rtalloc] rtfree: 0xc5a8f870 has 1 refs f bin/127719 netarp: Segmentation fault (core dumped) s kern/127587 net[bge] [request] if_bge(4) doesn't support BCM576X fami f kern/127528 net[icmp]: icmp socket receives icmp replies not owned by o bin/127192 netrouted(8) removes the secondary alias IP of interface f kern/127145 net[wi]: prism (wi) driver crash at bigger traffic o kern/127102 net[wpi] Intel 3945ABG low throughput o kern/127057 net[udp] Unable to send UDP packet via IPv6 socket to IPv o kern/127050 net[carp] ipv6 does not work on carp interfaces [regressi o kern/126945 net[carp] CARP interface destruction with ifconfig destro o kern/126924 net[an] [patch] printf -> device_printf and simplify prob o kern/126895 net[patch] [ral] Add antenna selection (marked as TBD) o kern/126874 net[vlan]: Zebra problem if ifconfig vlanX destroy o bin/126822 netwpa_supplicant(8): WPA PSK does not work in adhoc mode o kern/126714 net[carp] CARP interface renaming makes system no longer o kern/126695 netrtfree messages and network disruption upon use of if_ o kern/126688 net[ixgbe] [patch] 1.4.7 ixgbe driver panic with 4GB and o kern/126475 net[ath] [panic] ath pcmcia card inevitably panics under o kern/126469 net[fxp] [panic] fxp(4) related kernel panic o kern/126339 net[ipw] ipw driver drops the connection o kern/126214 net[ath] txpower problem with Atheros wifi card o kern/126075 net[inet] [patch] internet control accesses beyond end of o bin/125922 net[patch] Deadlock in arp(
Anyone working on the FreeBSD driver for broadcom 5784M Gige chip?
Hi, there: I'm new to FreeBSD community and this is my first email to the mailing group. Recently I'm working on Broadcom 5784M Gige driver. My code base is close to FreeBSD, but FreeBSD bge driver doesn't support the chip yet. The linux driver supports the chip. I'm wondering whether anyone is working or plans to work on to port the linux code to FreeBSD base. If so, I hope we can share some information together. Thanks. Another thing, I found one dead loop in current src/sys/dev/bge/if_bge.c (both 216/217 revisions): around line 2682, if mii_phy_probe( ) fails, the code will go back to again (4 lines back). Variable trys will reset to 0 every time, so the (trys++<4) condition is forever false. I don't know how to report the bug to freebsd Community yet. So I just attach the related code below. The fix is simple: just move "trys=0" line before again: Thanks and best wishes to everyone! -Helen === src/sys/dev/bge/if_bge.c: around line 2676 BGE_CLRBIT(sc, BGE_MODE_CTL, BGE_MODECTL_STACKUP); again: bge_asf_driver_up(sc); trys = 0; if (mii_phy_probe(dev, &sc->bge_miibus,<< line 2682 bge_ifmedia_upd, bge_ifmedia_sts)) { if (trys++ < 4) { device_printf(sc->bge_dev, "Try again\n"); bge_miibus_writereg(sc->bge_dev, 1, MII_BMCR, BMCR_RESET); goto again; } device_printf(sc->bge_dev, "MII without any PHY!\n"); error = ENXIO; goto fail; } ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"
Re: SCTP, possible bug in peer authentication key
Note that all of these changes are now in Head.. however I am not sure of the likely-hood of them moving into 7 since the xsctp_ changes for the mib (rwnd and assoc_id) break ABI compatability. I have now (in head) padded up the structures at the end (in case we need to add more). But in general this means I cannot commit to stable many changes. I will go back and see what can be done :-( I may be able to do some "ifdef" and other magic so I can pull in the changes that have went on.. not sure. R On Jan 29, 2009, at 12:29 PM, Peter Lei wrote: There's a corresponding change that is needed for pulling the auth info out of the cookie for the other direction (i.e. server side handling). I've committed that into the SCTP project repo, and should also get in with Randall's next commit. --peter On Jan 29, 2009, at 2:23 AM, Michael Tüxen wrote: Hi Yann, very good catch! You are right. I have committed your patch to Randalls repository, so it will show up in the FreeBSD sources soon (next time he syncs them)... Best regards Michael On Jan 28, 2009, at 8:51 PM, Yann WANWANSCAPPEL wrote: Hi all, I think I found a bug in the SCTP authentication code, in sctp_load_addresses_from_init() in sctp_pcb.c keylen = sizeof(*p_random) + random_len + sizeof(*chunks) + num_chunks + sizeof(*hmacs) + hmacs_len; The keylen calculation assumes the Chunk List Parameter (CHUNKS) vl-param was present in the received INIT packet, which can be false if peer SCTP does not require any chunk to be authenticated (this typically occurs if peer does not support ASCONF). From RFC 4895, 6.1 * An SCTP endpoint has a list of chunks it only accepts if they are * received in an authenticated way. This list is included in the INIT * and INIT-ACK, and MAY be omitted if it is empty. Since this list * does not change during the lifetime of the SCTP endpoint there is no * problem in case of INIT collision. This case is properly handled later in the build of the key /* append in the AUTH chunks */ if (chunks != NULL) { . } I think the calculated keylen should be something like this : keylen = sizeof(*p_random) + random_len + sizeof(*hmacs) + hmacs_len; if (chunks != NULL) { keylen += sizeof(*chunks) + num_chunks } This problem results in authenticated packets sent from peer SCTP to be discarded. The problem does not occurs if peer SCTP is modified to send an empty Chunk List Parameter, (eg num_chunks = 0 in the decoding). Br, Yann ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org " ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send any mail to "freebsd-net- unsubscr...@freebsd.org" -- Randall Stewart 803-317-4952 (cell) 803-345-0391(direct) ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"
Re: kern/88336: [ipsec] [patch] setkey(8) -D fails to report all SAs
Old Synopsis: [kernel] [patch] setkey(8) -D fails to report all SAs New Synopsis: [ipsec] [patch] setkey(8) -D fails to report all SAs Responsible-Changed-From-To: freebsd-bugs->freebsd-net Responsible-Changed-By: rwatson Responsible-Changed-When: Mon Feb 9 23:26:47 UTC 2009 Responsible-Changed-Why: Tag as ipsec; assign to freebsd-net. http://www.freebsd.org/cgi/query-pr.cgi?pr=88336 ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"
SO_BINDANY in FreeBSD
Hello folks, OpenBSD provides a SO_BINDANY socket option that allows an application to produce traffic from an IP address which is not configured on the host: http://www.openbsd.org/cgi-bin/man.cgi?query=setsockopt This is useful to run a transparent proxy which receives connections from X and wants to connect to the real destination pretending to be X. Is there any possibility to see this option implemented in FreeBSD? Do you otherwise have workarounds for getting the same behavior with reasonable complexity (eg, avoiding handling raw frames with bpf)? ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"