Current problem reports assigned to freebsd-net@FreeBSD.org

2009-02-09 Thread FreeBSD bugmaster
Note: to view an individual PR, use:
  http://www.freebsd.org/cgi/query-pr.cgi?pr=(number).

The following is a listing of current problems submitted by FreeBSD users.
These represent problem reports covering all versions including
experimental development code and obsolete releases.


S Tracker  Resp.  Description

o kern/131310  net[panic] 7.1 panics with mpd netgraph interface changes
o kern/131162  net[ath] Atheros driver bugginess and kernel crashes
o kern/131153  net[iwi] iwi doesn't see a wireless network
f kern/131087  net[ipw] [panic] ipw / iwi - no sent/received packets; iw
o kern/130846  net[vge] vge0 not autonegotiating to 1000baseTX full dupl
o kern/130820  net[ndis] wpa_supplicant(8) returns 'no space on device'
o kern/130652  net[kernel] [patch] Possible deadlock in rt_check() (sys/
o kern/130628  net[nfs] NFS / rpc.lockd deadlock on 7.1-R
f kern/130605  net[tcp] Certain hardware produces "Network is unreachabl
o conf/130555  net[rc.d] [patch] No good way to set ipfilter variables a
o kern/130525  net[ndis] [panic] 64 bit ar5008 ndisgen-erated driver cau
o kern/130311  net[wlan_xauth] [panic] hostapd restart causing kernel pa
o bin/130159   net[patch] ppp(8) fails to correctly set routes
o kern/130109  net[ipfw] Can not set fib for packets originated from loc
f kern/130059  net[panic] Leaking 50k mbufs/hour
o kern/129846  net[panic] /usr/sbin/ppp causes panic "Sleeping thread ow
o kern/129750  net[ath] Atheros AR5006 exits on "cannot map register spa
f kern/129719  net[nfs] [panic] Panic during shutdown, tcp_ctloutput: in
o kern/129580  net[ndis] Netgear WG311v3 (ndis) causes kenel trap at boo
o kern/129517  net[ipsec] [panic] double fault / stack overflow
o kern/129508  net[panic] Kernel panic with EtherIP (may be related to S
o kern/129352  net[xl] [patch] xl0 watchdog timeout
o kern/129219  net[ppp] Kernel panic when using kernel mode ppp
o kern/129135  net[vge] vge driver on a VIA mini-ITX not working
o bin/128954   netifconfig(8) deletes valid routes
o kern/128917  net[wpi] [panic] if_wpi and wpa+tkip causing kernel panic
o kern/128884  net[msk] if_msk page fault while in kernel mode
o kern/128840  net[igb] page fault under load with igb/LRO
o bin/128602   net[an] wpa_supplicant(8) crashes with an(4)
o kern/128598  net[bluetooth] WARNING: attempt to net_add_domain(bluetoo
o kern/128448  net[nfs] 6.4-RC1 Boot Fails if NFS Hostname cannot be res
o conf/128334  net[request] use wpa_cli in the "WPA DHCP" situation
o bin/128295   net[patch] ifconfig(8) does not print TOE4 or TOE6 capabi
o bin/128001   netwpa_supplicant(8), wlan(4), and wi(4) issues
o kern/127928  net[tcp] [patch] TCP bandwidth gets squeezed every time t
o kern/127834  net[ixgbe] [patch] wrong error counting
o kern/127826  net[iwi] iwi0 driver has reduced performance and connecti
o kern/127815  net[gif] [patch] if_gif does not set vlan attributes from
o kern/127724  net[rtalloc] rtfree: 0xc5a8f870 has 1 refs
f bin/127719   netarp: Segmentation fault (core dumped)
s kern/127587  net[bge] [request] if_bge(4) doesn't support BCM576X fami
f kern/127528  net[icmp]: icmp socket receives icmp replies not owned by
o bin/127192   netrouted(8) removes the secondary alias IP of interface 
f kern/127145  net[wi]: prism (wi) driver crash at bigger traffic
o kern/127102  net[wpi] Intel 3945ABG low throughput
o kern/127057  net[udp] Unable to send UDP packet via IPv6 socket to IPv
o kern/127050  net[carp] ipv6 does not work on carp interfaces [regressi
o kern/126945  net[carp] CARP interface destruction with ifconfig destro
o kern/126924  net[an] [patch] printf -> device_printf and simplify prob
o kern/126895  net[patch] [ral] Add antenna selection (marked as TBD)
o kern/126874  net[vlan]: Zebra problem if ifconfig vlanX destroy
o bin/126822   netwpa_supplicant(8): WPA PSK does not work in adhoc mode
o kern/126714  net[carp] CARP interface renaming makes system no longer 
o kern/126695  netrtfree messages and network disruption upon use of if_
o kern/126688  net[ixgbe] [patch] 1.4.7 ixgbe driver panic with 4GB and 
o kern/126475  net[ath] [panic] ath pcmcia card inevitably panics under 
o kern/126469  net[fxp] [panic] fxp(4) related kernel panic
o kern/126339  net[ipw] ipw driver drops the connection
o kern/126214  net[ath] txpower problem with Atheros wifi card
o kern/126075  net[inet] [patch] internet control accesses beyond end of
o bin/125922   net[patch] Deadlock in arp(

Anyone working on the FreeBSD driver for broadcom 5784M Gige chip?

2009-02-09 Thread Zhang, Helen
Hi, there:

 

I'm new to FreeBSD community and this is my first email to the mailing
group.

 

Recently I'm working on Broadcom 5784M Gige driver. My code base is
close to FreeBSD, 

but FreeBSD bge driver doesn't support the chip yet. The linux driver
supports the chip.  

I'm wondering whether anyone is working or plans to work on to port the
linux code to 

FreeBSD base. If so, I hope we can share some information together.
Thanks.

 

Another thing, I found one dead loop in current src/sys/dev/bge/if_bge.c
(both 216/217 

revisions): around line 2682,  if mii_phy_probe( ) fails, the code will
go back to again (4 lines 

back). Variable trys will reset to 0 every time, so the (trys++<4)
condition is forever false. 

 

I don't know how to report the bug to freebsd Community yet. So I just
attach the related 

code below. The fix is simple: just move "trys=0" line before again:

 

Thanks and best wishes to everyone!

 

-Helen

 

===

src/sys/dev/bge/if_bge.c: around line 2676

 

BGE_CLRBIT(sc, BGE_MODE_CTL, BGE_MODECTL_STACKUP);

again:

bge_asf_driver_up(sc);

 

trys = 0;

if (mii_phy_probe(dev, &sc->bge_miibus,<< line
2682

bge_ifmedia_upd, bge_ifmedia_sts)) {

if (trys++ < 4) {

device_printf(sc->bge_dev, "Try
again\n");

bge_miibus_writereg(sc->bge_dev, 1,
MII_BMCR,

BMCR_RESET);

goto again;

}

 

device_printf(sc->bge_dev, "MII without any
PHY!\n");

error = ENXIO;

goto fail;

}

 

 

___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


Re: SCTP, possible bug in peer authentication key

2009-02-09 Thread Randall Stewart

Note that all of these changes are now in Head.. however
I am not sure of the likely-hood of them moving into 7 since
the xsctp_ changes for the mib (rwnd and assoc_id) break
ABI compatability. I have now (in head) padded up the structures
at the end  (in case we need to add more). But in general this
means I cannot commit to stable many changes. I will go back and
see what can be done :-(

I may be able to do some "ifdef" and other magic so I can
pull in the changes that have went on.. not sure.

R
On Jan 29, 2009, at 12:29 PM, Peter Lei wrote:

There's a corresponding change that is needed for pulling the auth  
info
out of the cookie for the other direction (i.e. server side  
handling).   I've

committed that into the SCTP project repo, and should also get in with
Randall's next commit.

--peter

On Jan 29, 2009, at 2:23 AM, Michael Tüxen wrote:


Hi Yann,

very good catch! You are right.

I have committed your patch to Randalls repository, so it will
show up in the FreeBSD sources soon (next time he syncs them)...

Best regards
Michael

On Jan 28, 2009, at 8:51 PM, Yann WANWANSCAPPEL wrote:


Hi all,

I think I found a bug in the SCTP authentication code, in
sctp_load_addresses_from_init() in sctp_pcb.c

keylen = sizeof(*p_random) + random_len + sizeof(*chunks) +  
num_chunks +

sizeof(*hmacs) + hmacs_len;

The keylen calculation assumes the Chunk List Parameter (CHUNKS)
vl-param was present in the received INIT packet, which can be  
false if
peer SCTP does not require any chunk to be authenticated (this  
typically

occurs if peer does not support ASCONF).


From RFC 4895, 6.1


* An SCTP endpoint has a list of chunks it only accepts if they are
* received in an authenticated way.  This list is included in the  
INIT

* and INIT-ACK, and MAY be omitted if it is empty.  Since this list
* does not change during the lifetime of the SCTP endpoint there  
is no

* problem in case of INIT collision.

This case is properly handled later in the build of the key

/* append in the AUTH chunks */
if (chunks != NULL) {
.
}

I think the calculated keylen should be something like this :

keylen = sizeof(*p_random) + random_len + sizeof(*hmacs) +  
hmacs_len;


if (chunks != NULL) {
keylen += sizeof(*chunks) + num_chunks
}

This problem results in authenticated packets sent from peer SCTP  
to be

discarded.

The problem does not occurs if peer SCTP is modified to send an  
empty

Chunk List Parameter, (eg num_chunks = 0 in the decoding).

Br,
Yann









___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org 
"




___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net- 
unsubscr...@freebsd.org"




--
Randall Stewart
803-317-4952 (cell)
803-345-0391(direct)

___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


Re: kern/88336: [ipsec] [patch] setkey(8) -D fails to report all SAs

2009-02-09 Thread rwatson
Old Synopsis: [kernel] [patch] setkey(8) -D fails to report all SAs
New Synopsis: [ipsec] [patch] setkey(8) -D fails to report all SAs

Responsible-Changed-From-To: freebsd-bugs->freebsd-net
Responsible-Changed-By: rwatson
Responsible-Changed-When: Mon Feb 9 23:26:47 UTC 2009
Responsible-Changed-Why: 
Tag as ipsec; assign to freebsd-net.

http://www.freebsd.org/cgi/query-pr.cgi?pr=88336
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


SO_BINDANY in FreeBSD

2009-02-09 Thread Mij

Hello folks,

OpenBSD provides a SO_BINDANY socket option that allows an
application to produce traffic from an IP address which is not  
configured

on the host:

http://www.openbsd.org/cgi-bin/man.cgi?query=setsockopt

This is useful to run a transparent proxy which receives connections  
from

X and wants to connect to the real destination pretending to be X.

Is there any possibility to see this option implemented in FreeBSD? Do
you otherwise have workarounds for getting the same behavior with
reasonable complexity (eg, avoiding handling raw frames with bpf)?
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"