[Bug 245981] bnxt(4): BCM57414 / BCM57416 not initializing: bnxt0: Unable to allocate device TX queue / queue memory

2022-05-19 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=245981

SJ  changed:

   What|Removed |Added

 CC||sa...@rbrd.io

--- Comment #24 from SJ  ---
Experiencing issues with the BCM57416 on new hardware, with a fresh install of
FreeBSD 13.0.

Firmware version shipped with card: 22.00.07.60

% uname -a
FreeBSD foo 13.0-RELEASE-p11 FreeBSD 13.0-RELEASE-p11 

On running `kldload /boot/kernel/if_bnxt.ko`, the following appears in
/var/log/messages:

May 19 10:37:17  foo kernel: bnxt0:  mem
0xb8a1-0xb8a1,0xb890-0xb89f,0xb8a22000-0xb8a23fff at device 0.0
numa-domain 0 on pci9
May 19 10:37:17  foo kernel: bnxt0: Using 256 TX descriptors and 256
RX descriptors
May 19 10:37:17  foo kernel: bnxt0: Using 0 RX queues 0 TX queues
May 19 10:37:17  foo kernel: bnxt0: Using MSI-X interrupts with 1
vectors
May 19 10:37:17  foo kernel: bnxt0: iflib_dma_alloc_align:
bus_dma_tag_create failed: 22
May 19 10:37:17  foo kernel: bnxt0: Unable to allocate device TX
queue
May 19 10:37:17  foo kernel: bnxt0: Unable to allocate queue memory
May 19 10:37:17  foo kernel: device_attach: bnxt0 attach returned 22
May 19 10:37:17  foo kernel: bnxt0:  mem
0xb8a0-0xb8a0,0xb880-0xb88f,0xb8a2-0xb8a21fff at device 0.1
numa-domain 0 on pci9
May 19 10:37:17  foo kernel: bnxt0: Using 256 TX descriptors and 256
RX descriptors
May 19 10:37:17  foo kernel: bnxt0: Using 0 RX queues 0 TX queues
May 19 10:37:17  foo kernel: bnxt0: Using MSI-X interrupts with 1
vectors
May 19 10:37:17  foo kernel: bnxt0: iflib_dma_alloc_align:
bus_dma_tag_create failed: 22
May 19 10:37:17  foo kernel: bnxt0: Unable to allocate device TX
queue
May 19 10:37:17  foo kernel: bnxt0: Unable to allocate queue memory
May 19 10:37:17  foo kernel: device_attach: bnxt0 attach returned 22


% pciconf -l -BbcevV
...
vendor = 'Broadcom Inc. and subsidiaries'
device = 'BCM57416 NetXtreme-E Dual-Media 10G RDMA Ethernet Controller'
class  = network
subclass   = ethernet
bar   [10] = type Prefetchable Memory, range 64, base 0xb8a1, size
65536, enabled
bar   [18] = type Prefetchable Memory, range 64, base 0xb890, size
1048576, enabled
bar   [20] = type Prefetchable Memory, range 64, base 0xb8a22000, size
8192, enabled
cap 01[48] = powerspec 3  supports D0 D3  current D0
cap 03[50] = VPD
cap 05[58] = MSI supports 8 messages, 64 bit 
cap 11[a0] = MSI-X supports 74 messages
 Table in map 0x20[0x0], PBA in map 0x20[0x4a0]
cap 10[ac] = PCI-Express 2 endpoint max data 256(512) FLR RO NS
 max read 512
 link x8(x8) speed 8.0(8.0) ClockPM disabled
ecap 0001[100] = AER 1 0 fatal 0 non-fatal 1 corrected
ecap 0003[13c] = Serial 1 f4ee08fffe25fabd
ecap 0004[150] = Power Budgeting 1
ecap 0002[160] = VC 1 max VC0
ecap 000b[180] = Vendor [1] ID  Rev 0 Length 32
ecap 0018[1b0] = LTR 1
ecap 000e[1b8] = ARI 1
ecap 0017[230] = TPH Requester 1
ecap 0019[300] = PCIe Sec 1 lane errors 0
ecap 001f[200] = Precision Time Measurement 1
  PCI-e errors = Correctable Error Detected
 Unsupported Request Detected
 Corrected = Advisory Non-Fatal Error
VPD ident  = 'Broadcom Adv. Dual 10GBASE-T Ethernet'
VPD ro PN  = 'BCM957416'
VPD ro MN  = '1028'
VPD ro V0  = 'FFV22.00.07.60'
VPD ro V1  = 'DSV1028VPDR.VER2.1'
VPD ro V2  = 'NPY2'
VPD ro V3  = 'PMT1'
VPD ro V4  = 'NMVBroadcom Corp'
VPD ro V5  = 'DTINIC'
VPD ro V6  =
'DCM1001FF1202FF1403FF1604FF1805FF1A06FF1C07FF1E08FF2101FF2302FF2503FF2704FF2905FF2B06FF2D07FF2F08FF'
VPD ro V7  = 'L1D0'
none89@pci0:94:0:1: class=0x02 rev=0x01 hdr=0x00 vendor=0x14e4
device=0x16d8 subvendor=0x1028 subdevice=0x1fea
vendor = 'Broadcom Inc. and subsidiaries'
device = 'BCM57416 NetXtreme-E Dual-Media 10G RDMA Ethernet Controller'
class  = network
subclass   = ethernet
bar   [10] = type Prefetchable Memory, range 64, base 0xb8a0, size
65536, enabled
bar   [18] = type Prefetchable Memory, range 64, base 0xb880, size
1048576, enabled
bar   [20] = type Prefetchable Memory, range 64, base 0xb8a2, size
8192, enabled
cap 01[48] = powerspec 3  supports D0 D3  current D0
cap 03[50] = VPD
cap 05[58] = MSI supports 8 messages, 64 bit 
cap 11[a0] = MSI-X supports 74 messages
 Table in map 0x20[0x0], PBA in map 0x20[0x4a0]
cap 10[ac] = PCI-Express 2 endpoint max data 256(512) FLR RO NS
 max read 512
 link x8(x8) speed 8.0(8.0) ClockPM disabled
ecap 0001[100] = AER 1 0 fatal 0 non-fatal 1 corrected
ecap 0003[13c] = Serial 1 f4ee08fffe25fabd
ecap 0004[150] = Power Budgeting 1
ecap 000b[180] = Vendor [1] ID 

[Bug 245981] bnxt(4): BCM57414 / BCM57416 not initializing: bnxt0: Unable to allocate device TX queue / queue memory

2022-05-19 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=245981

--- Comment #25 from Kurt Jaeger  ---
(In reply to SJ from comment #24)
Can you update to 13.1, as it contains some fixes for bnxt ?

-- 
You are receiving this mail because:
You are on the CC list for the bug.
You are the assignee for the bug.


[Bug 245981] bnxt(4): BCM57414 / BCM57416 not initializing: bnxt0: Unable to allocate device TX queue / queue memory

2022-05-19 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=245981

--- Comment #26 from SJ  ---
(In reply to Kurt Jaeger from comment #25)

Done!

% uname -a
FreeBSD foo 13.1-RELEASE FreeBSD 13.1-RELEASE

% kldstat
Id Refs AddressSize Name
 1   27 0x8020  1f30590 kernel
 21 0x82131000   5ec1d8 zfs.ko
 31 0x8271e000 af68 cryptodev.ko
 41 0x82c11000 3378 acpi_wmi.ko
 51 0x82c15000 3250 ichsmb.ko
 61 0x82c19000 2180 smbus.ko
 71 0x82c1c000 2110 pchtherm.ko
 81 0x82c1f000 2a08 mac_ntpd.ko

% kldload /boot/kernel/if_bnxt.ko 

May 19 12:05:21  chlorine kernel: bnxt0:  mem
0xb8a1-0xb8a1,0xb890-0xb89f,0xb8a22000-0xb8a23fff at device 0.0
numa-domain 0 on pci9
May 19 12:05:21  chlorine kernel: bnxt0: Using 256 TX descriptors
and 256 RX descriptors
May 19 12:05:21  chlorine kernel: bnxt0: Using 0 RX queues 0 TX
queues
May 19 12:05:21  chlorine kernel: bnxt0: Using MSI-X interrupts with
1 vectors
May 19 12:05:21  chlorine kernel: bnxt0: iflib_dma_alloc_align:
bus_dma_tag_create failed: 22
May 19 12:05:21  chlorine kernel: bnxt0: Unable to allocate device
TX queue
May 19 12:05:21  chlorine kernel: bnxt0: Unable to allocate queue
memory
May 19 12:05:21  chlorine kernel: device_attach: bnxt0 attach
returned 22
May 19 12:05:21  chlorine kernel: Warning: failed attempt to remove
oid fc with child autoneg
May 19 12:05:21  chlorine kernel: pci0:94:0:0: Device leaked memory
resources
May 19 12:05:21  chlorine kernel: sysctl_warn_reuse: can't re-use a
leaf (dev.bnxt.0.%desc)!
May 19 12:05:21  chlorine kernel: sysctl_warn_reuse: can't re-use a
leaf (dev.bnxt.0.%driver)!
May 19 12:05:21  chlorine kernel: sysctl_warn_reuse: can't re-use a
leaf (dev.bnxt.0.%location)!
May 19 12:05:21  chlorine kernel: sysctl_warn_reuse: can't re-use a
leaf (dev.bnxt.0.%pnpinfo)!
May 19 12:05:21  chlorine kernel: sysctl_warn_reuse: can't re-use a
leaf (dev.bnxt.0.%parent)!
May 19 12:05:21  chlorine kernel: sysctl_warn_reuse: can't re-use a
leaf (dev.bnxt.0.%domain)!
May 19 12:05:21  chlorine kernel: bnxt0:  mem
0xb8a0-0xb8a0,0xb880-0xb88f,0xb8a2-0xb8a21fff at device 0.1
numa-domain 0 on pci9
May 19 12:05:21  chlorine kernel: sysctl_warn_reuse: can't re-use a
leaf (dev.bnxt.0.iflib.driver_version)!
May 19 12:05:21  chlorine kernel: sysctl_warn_reuse: can't re-use a
leaf (dev.bnxt.0.iflib.override_ntxqs)!
May 19 12:05:21  chlorine kernel: sysctl_warn_reuse: can't re-use a
leaf (dev.bnxt.0.iflib.override_nrxqs)!
May 19 12:05:21  chlorine kernel: sysctl_warn_reuse: can't re-use a
leaf (dev.bnxt.0.iflib.override_qs_enable)!
May 19 12:05:21  chlorine kernel: sysctl_warn_reuse: can't re-use a
leaf (dev.bnxt.0.iflib.disable_msix)!
May 19 12:05:21  chlorine kernel: sysctl_warn_reuse: can't re-use a
leaf (dev.bnxt.0.iflib.rx_budget)!
May 19 12:05:21  chlorine kernel: sysctl_warn_reuse: can't re-use a
leaf (dev.bnxt.0.iflib.tx_abdicate)!
May 19 12:05:21  chlorine kernel: sysctl_warn_reuse: can't re-use a
leaf (dev.bnxt.0.iflib.core_offset)!
May 19 12:05:21  chlorine kernel: sysctl_warn_reuse: can't re-use a
leaf (dev.bnxt.0.iflib.separate_txrx)!
May 19 12:05:21  chlorine kernel: sysctl_warn_reuse: can't re-use a
leaf (dev.bnxt.0.iflib.use_logical_cores)!
May 19 12:05:21  chlorine kernel: sysctl_warn_reuse: can't re-use a
leaf (dev.bnxt.0.iflib.override_ntxds)!
May 19 12:05:21  chlorine kernel: sysctl_warn_reuse: can't re-use a
leaf (dev.bnxt.0.iflib.override_nrxds)!
May 19 12:05:21  chlorine kernel: sysctl_warn_reuse: can't re-use a
leaf (dev.bnxt.0.nvram.mfg_id)!
May 19 12:05:21  chlorine kernel: sysctl_warn_reuse: can't re-use a
leaf (dev.bnxt.0.nvram.device_id)!
May 19 12:05:21  chlorine kernel: sysctl_warn_reuse: can't re-use a
leaf (dev.bnxt.0.nvram.sector_size)!
May 19 12:05:21  chlorine kernel: sysctl_warn_reuse: can't re-use a
leaf (dev.bnxt.0.nvram.size)!
May 19 12:05:21  chlorine kernel: sysctl_warn_reuse: can't re-use a
leaf (dev.bnxt.0.nvram.reserved_size)!
May 19 12:05:21  chlorine kernel: sysctl_warn_reuse: can't re-use a
leaf (dev.bnxt.0.nvram.available_size)!
May 19 12:05:21  chlorine kernel: sysctl_warn_reuse: can't re-use a
leaf (dev.bnxt.0.rss_key)!
May 19 12:05:21  chlorine kernel: sysctl_warn_reuse: can't re-use a
leaf (dev.bnxt.0.rss_type)!
May 19 12:05:21  chlorine kernel: sysctl_warn_reuse: can't re-use a
leaf (dev.bnxt.0.rx_stall)!
May 19 12:05:21  chlorine kernel: sysctl_warn_reuse: can't re-use a
leaf (dev.bnxt.0.vlan_strip)!
May 19 12:05:21  chlorine kernel: sysctl_warn_reuse: can't re-use a
leaf (dev.bnxt.0.if_name)!
May 19 12:05:21  chlorine kernel: sysctl_warn_reuse: can't re-use a
leaf (dev.bnxt.0.intr_coal_rx_usecs)!
May 19 12:05:21  chlorine kernel: sysctl_warn_reuse: can't re-use a
leaf (dev.bnxt.0.intr_coal_rx_frames)!
May 19 12:05:21  chlorine kernel: sysctl_warn_reuse: can't re-use a
leaf (dev.bnxt.0.intr_coal_rx_usecs_irq)!
May 19 12:05:21  chlorine kernel: sys

[Bug 245981] bnxt(4): BCM57414 / BCM57416 not initializing: bnxt0: Unable to allocate device TX queue / queue memory

2022-05-19 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=245981

--- Comment #27 from Kurt Jaeger  ---
(In reply to SJ from comment #26)
If the interfaces can be made to appear, are they usable ?
Is the performance appropriate ?

Or do they show, but fail to work ?

-- 
You are receiving this mail because:
You are the assignee for the bug.
You are on the CC list for the bug.


[Bug 245981] bnxt(4): BCM57414 / BCM57416 not initializing: bnxt0: Unable to allocate device TX queue / queue memory

2022-05-19 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=245981

--- Comment #28 from SJ  ---
(In reply to Kurt Jaeger from comment #27)

After some testing, I can confirm that they show, but fail to work. When
configuring one of the interfaces to use DHCP, it doesn't obtain anything,
showing the IP 0.0.0.0.

bnxt0: flags=8863 metric 0 mtu 1500
options=4e527bb
ether foo
inet 0.0.0.0 netmask 0xff00 broadcast 255.255.255.255
media: Ethernet autoselect (10Gbase-T )
status: active
nd6 options=29

No luck with a static configuration either. I've tried rebooting and reloading
if_bnxt.ko after changes to see if there's any difference.

% ping -I bnxt0 ...
ping: invalid multicast interface: `bnxt0'

Thanks!

-- 
You are receiving this mail because:
You are the assignee for the bug.
You are on the CC list for the bug.


[Bug 245981] bnxt(4): BCM57414 / BCM57416 not initializing: bnxt0: Unable to allocate device TX queue / queue memory

2022-05-19 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=245981

--- Comment #29 from Kurt Jaeger  ---
I tested 13.1-RC1 with the BCM57414. I have no BCM57416 to test 8-(

-- 
You are receiving this mail because:
You are the assignee for the bug.
You are on the CC list for the bug.


[Bug 245981] bnxt(4): BCM57414 / BCM57416 not initializing: bnxt0: Unable to allocate device TX queue / queue memory

2022-05-19 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=245981

--- Comment #30 from SJ  ---
(In reply to Kurt Jaeger from comment #29)

As per #20, it seems like firmware version 21.65.33.33 may work. Whether or not
it'll let me upgrade is a different thing altogether! It'll be tomorrow or
Monday before I'll be able to test this out, but will report back.

-- 
You are receiving this mail because:
You are the assignee for the bug.
You are on the CC list for the bug.


[Bug 263986] IPv6 address gets detached when using multiple IPv6 routers

2022-05-19 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=263986

Tatsuki Makino  changed:

   What|Removed |Added

 CC||tatsuki_mak...@hotmail.com

--- Comment #1 from Tatsuki Makino  ---
memorandum: RFC 4861 6.3.4.

-- 
You are receiving this mail because:
You are the assignee for the bug.


[Bug 263379] [regression] [ipsec] compatibility broken between stable/12 and stable/13 opencrypto in AEAD mode

2022-05-19 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=263379

--- Comment #16 from commit-h...@freebsd.org ---
A commit in branch stable/13 references this bug:

URL:
https://cgit.FreeBSD.org/src/commit/?id=6835ace580917ec512eb96cf9c456f4acc161247

commit 6835ace580917ec512eb96cf9c456f4acc161247
Author: John Baldwin 
AuthorDate: 2022-04-27 19:18:52 +
Commit: John Baldwin 
CommitDate: 2022-05-20 00:35:34 +

setkey(8): Clarify language around AEAD ciphers.

AEAD ciphers for IPsec combine both encryption and authentication.  As
such, ESP configurations using an AEAD cipher should not use a
seperate authentication algorithm via -A.  However, this was not
apparent from the setkey manpage and 12.x and earlier did not perform
sufficient argument validation permitting users to pair an explicit -A
such as SHA256-HMAC with AES-GCM.  (The result was a non-standard
combination of AES-CTR with the specified MAC, but with the wrong
initial block counter (and thus different keystream) compared to using
AES-CTR as the cipher.)

Attempt to clarify this in the manpage by explicitly calling out AEAD
ciphers (currently only AES-GCM) and noting that AEAD ciphers should
not use -A.

While here, explicitly note which authentication algorithms can be
used with esp vs esp-old.  Also add subsection headings for the
different algorithm lists and tidy some language.

I did not convert the tables to column lists (Bl -column) though that
would probably be more correct than using literal blocks (Bd
-literal).

PR: 263379
Reviewed by:Pau Amma , markj
Differential Revision:  https://reviews.freebsd.org/D34947

(cherry picked from commit e6dede145616ed8f98c629c23a2ba206b812c921)

 sbin/setkey/setkey.8 | 58 +---
 1 file changed, 32 insertions(+), 26 deletions(-)

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug 263379] [regression] [ipsec] compatibility broken between stable/12 and stable/13 opencrypto in AEAD mode

2022-05-19 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=263379

--- Comment #17 from commit-h...@freebsd.org ---
A commit in branch stable/12 references this bug:

URL:
https://cgit.FreeBSD.org/src/commit/?id=6aaf8a8b1bcf500aa7342043d43007ff9c52cd65

commit 6aaf8a8b1bcf500aa7342043d43007ff9c52cd65
Author: John Baldwin 
AuthorDate: 2022-04-27 19:18:52 +
Commit: John Baldwin 
CommitDate: 2022-05-20 00:42:24 +

setkey(8): Clarify language around AEAD ciphers.

AEAD ciphers for IPsec combine both encryption and authentication.  As
such, ESP configurations using an AEAD cipher should not use a
seperate authentication algorithm via -A.  However, this was not
apparent from the setkey manpage and 12.x and earlier did not perform
sufficient argument validation permitting users to pair an explicit -A
such as SHA256-HMAC with AES-GCM.  (The result was a non-standard
combination of AES-CTR with the specified MAC, but with the wrong
initial block counter (and thus different keystream) compared to using
AES-CTR as the cipher.)

Attempt to clarify this in the manpage by explicitly calling out AEAD
ciphers (currently only AES-GCM) and noting that AEAD ciphers should
not use -A.

While here, explicitly note which authentication algorithms can be
used with esp vs esp-old.  Also add subsection headings for the
different algorithm lists and tidy some language.

I did not convert the tables to column lists (Bl -column) though that
would probably be more correct than using literal blocks (Bd
-literal).

PR: 263379
Reviewed by:Pau Amma , markj
Differential Revision:  https://reviews.freebsd.org/D34947

(cherry picked from commit e6dede145616ed8f98c629c23a2ba206b812c921)

 sbin/setkey/setkey.8 | 74 
 1 file changed, 40 insertions(+), 34 deletions(-)

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug 193953] vlan(4) on LACP lagg(4) do not update if_baudrate value and thus SNMP daemons do not provide high capacity counters

2022-05-19 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=193953

--- Comment #15 from Marek Zarychta  ---
Committed to main https://cgit.freebsd.org/src/commit/?id=f2ab9160
Thanks, we are looking forward to MFC.

-- 
You are receiving this mail because:
You are the assignee for the bug.
You are on the CC list for the bug.


[Bug 193953] vlan(4) on LACP lagg(4) do not update if_baudrate value and thus SNMP daemons do not provide high capacity counters

2022-05-19 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=193953

Marek Zarychta  changed:

   What|Removed |Added

 CC||w...@freebsd.org
  Flags||mfc-stable13?,
   ||mfc-stable12?

-- 
You are receiving this mail because:
You are the assignee for the bug.
You are on the CC list for the bug.


[Bug 263831] netinet6 in6_proto.c missing IPPROTO_ETHERIP entry at FreeBSD 13.1-RC5

2022-05-20 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=263831

Hiroki Sato  changed:

   What|Removed |Added

 Status|New |In Progress
   Assignee|n...@freebsd.org |h...@freebsd.org

-- 
You are receiving this mail because:
You are the assignee for the bug.


[Bug 264094] seting net.inet.tcp.cc.algorithm to htcp triggers panic on the most recent CURRENT

2022-05-20 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264094

Marek Zarychta  changed:

   What|Removed |Added

 CC||n...@freebsd.org

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug 264094] setting net.inet.tcp.cc.algorithm to htcp triggers panic on the most recent CURRENT

2022-05-20 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264094

Marek Zarychta  changed:

   What|Removed |Added

Summary|seting  |setting
   |net.inet.tcp.cc.algorithm   |net.inet.tcp.cc.algorithm
   |to htcp triggers panic on   |to htcp triggers panic on
   |the most recent CURRENT |the most recent CURRENT

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug 264094] setting net.inet.tcp.cc.algorithm to htcp triggers panic on the most recent CURRENT

2022-05-20 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264094

Michael Tuexen  changed:

   What|Removed |Added

 CC||tue...@freebsd.org
 Status|New |In Progress
   Assignee|b...@freebsd.org|tue...@freebsd.org

--- Comment #1 from Michael Tuexen  ---
I can reproduce the issue, will look into it.

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug 264094] [tcp] setting net.inet.tcp.cc.algorithm to htcp triggers panic on the most recent CURRENT

2022-05-20 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264094

Michael Tuexen  changed:

   What|Removed |Added

Summary|setting |[tcp] setting
   |net.inet.tcp.cc.algorithm   |net.inet.tcp.cc.algorithm
   |to htcp triggers panic on   |to htcp triggers panic on
   |the most recent CURRENT |the most recent CURRENT

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug 263756] igb interface not receiving vlan packets since 12.3

2022-05-20 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=263756

Natalino Picone  changed:

   What|Removed |Added

 CC||natalino.picone@nozominetwo
   ||rks.com

--- Comment #3 from Natalino Picone  ---
(In reply to sec from comment #2)

I had the same issue and I agree that 260468 should be merged on 12.3.

Does anybody know why hwfiltering has been enabled by default?

-- 
You are receiving this mail because:
You are the assignee for the bug.


[Bug 264006] dwc: dwc interface is not able to send packets when changing the dwc interface's media from the auto-negotiation mode to the forced mode

2022-05-20 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264006

--- Comment #1 from Jiahao LI  ---
Created attachment 234058
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=234058&action=edit
Fix patch following other drivers code sequence

Updating the previous patch.

Following other drivers' implementation, smsc, axe, axge and re, to change the
link-up state in dwc_softc struct.

-- 
You are receiving this mail because:
You are the assignee for the bug.


[Bug 264094] cc_htcp(4): Setting net.inet.tcp.cc.algorithm to htcp triggers panic on the most recent CURRENT

2022-05-20 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264094

Kubilay Kocak  changed:

   What|Removed |Added

   Keywords||crash, needs-qa
   Severity|Affects Only Me |Affects Many People
Summary|[tcp] setting   |cc_htcp(4): Setting
   |net.inet.tcp.cc.algorithm   |net.inet.tcp.cc.algorithm
   |to htcp triggers panic on   |to htcp triggers panic on
   |the most recent CURRENT |the most recent CURRENT
  Flags||mfc-stable13?,
   ||mfc-stable12?

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug 224961] VLAN ID 0 Not Supported

2022-05-21 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=224961

demus...@gmail.com changed:

   What|Removed |Added

 CC||demus...@gmail.com

--- Comment #6 from demus...@gmail.com ---
More and more ISP's are using a tagged vlan0 on their interfaces now.
I agree that it's time to incorporate this. It's starting to effect too many
people and adding a managed switch between handoff and WAN is not a real
solution.

-- 
You are receiving this mail because:
You are the assignee for the bug.


[Bug 224961] VLAN ID 0 Not Supported

2022-05-21 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=224961

Hans Petter Selasky  changed:

   What|Removed |Added

 CC||hsela...@freebsd.org

--- Comment #7 from Hans Petter Selasky  ---
Look for "pcp" in "man ifconfig"

--HPS

-- 
You are receiving this mail because:
You are the assignee for the bug.


[Bug 264114] net/wireguard-kmod: Crashes on 13.1-RELEASE: panic: vm_fault_lookup: fault on nofault entry, addr: 0 (wireguard)

2022-05-21 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264114

Kubilay Kocak  changed:

   What|Removed |Added

 CC||n...@freebsd.org
   Assignee|b...@freebsd.org|de...@freebsd.org

--- Comment #2 from Kubilay Kocak  ---
^Triage: Assign to maintainer for coordination

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug 264114] net/wireguard-kmod: Crashes on 13.1-RELEASE: panic: vm_fault_lookup: fault on nofault entry, addr: 0 (wireguard)

2022-05-21 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264114

--- Comment #3 from Nick Briggs  ---
It would be a much better UX if the wireguard kmod if_wg.ko were tagged such
that the kernel module loader noticed that it was not compatible with the new
kernel.

The virtualbox module seems to be coded so that the module loader detects that
situation, reports an error, and refuses to load.  I much prefer that over
having to deal with a system that panics each time someone tries establish a
tunnel.

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug 264114] net/wireguard-kmod: Crashes on 13.1-RELEASE: panic: vm_fault_lookup: fault on nofault entry, addr: 0 (wireguard)

2022-05-21 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264114

--- Comment #4 from Bernhard Froehlich  ---
Okay I keep this PR open to mark all future PRs as duplicates.

The reason for the panic is that all packages are build on 13.0 which works
fine for userland packages because they are compatible with 13.1. For kernel
modules there is no such compatibility guarantee so you have to build kernel
modules for exactly that kernel or you get panics like these.

This has been the situation for ages. Nothing new. Virtual box has had such bug
reports for years until all users were aware (removing module before reboot
etc.). With vbox it was even more critical because we traditionally loaded it
very early via loader which could result in a bootloop of panics. In a
DevSummit in 2012 we talked about that problem in a session. Finally about two
weeks ago jhb@ did send patches for virtualbox-kmod to address this.

https://cgit.freebsd.org/ports/commit/?id=bc6d5725ed6c7b6538da70328d89afe901736a90

It will not take another 10 years to fix it for wireguard.

For the moment if anyone experiences panics after an update (or fresh install
from 13.1) please don't use the binary package but install from ports using
"make install" to make sure it matches your kernel.

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug 264114] net/wireguard-kmod: Crashes on 13.1-RELEASE: panic: vm_fault_lookup: fault on nofault entry, addr: 0 (wireguard)

2022-05-22 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264114

lb...@disroot.org changed:

   What|Removed |Added

 CC||lb...@disroot.org

--- Comment #5 from lb...@disroot.org ---
(In reply to Bernhard Froehlich from comment #4)

Thanks. But it may takes a lot of time and space when doing port compiling on
embedded system.

It would be great if someone manages to resolve related package system
drawbacks. Or someone adds some description in the Freebsd Handbook.

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug 264114] net/wireguard-kmod: Crashes on 13.1-RELEASE: panic: vm_fault_lookup: fault on nofault entry, addr: 0 (wireguard)

2022-05-22 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264114

Marek Zarychta  changed:

   What|Removed |Added

 CC||zarych...@plan-b.pwste.edu.
   ||pl

--- Comment #6 from Marek Zarychta  ---
Maybe it's high time to change the default policy of the Project? Instead of
building all packages on approaching EoL minor version (13.0) in this case, the
packages might be built on the upcoming minor version with some advance, let's
say entering the RC phase could be the turning point.
Such an approach definitely would improve the user experience.

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug 264114] net/wireguard-kmod: Crashes on 13.1-RELEASE: panic: vm_fault_lookup: fault on nofault entry, addr: 0 (wireguard)

2022-05-22 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264114

--- Comment #7 from Bernhard Froehlich  ---
(In reply to Marek Zarychta from comment #6)
No that does not work. Compatibility only works in one direction. Packages are
build with the oldest supported version on that branch which is correct. A
possibility would be to have a small additional repository for all kmod ports
and build that per release.

I will drag this to portmgr@ to make them aware of the problem. I will let you
all know if there are any news.

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug 264094] cc_htcp(4): Setting net.inet.tcp.cc.algorithm to htcp triggers panic on the most recent CURRENT

2022-05-22 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264094

--- Comment #2 from Michael Tuexen  ---
The panic happens on arm64, but not amd64. It does happen when using clang14
(most recent version in the main tree), it does not happen when using clang13.
I also does not happen using clang14 when forcing htcp_recalc_beta() not to be
inlined.

The panic happens when accessing V_htcp_adaptive_backoff in
https://cgit.freebsd.org/src/tree/sys/netinet/cc/cc_htcp.c#n471

I disassembled htcp_recalc_beta() when using clang14 and the function not being
inlined. This is the relevant code:

(kgdb) disassemble htcp_recalc_beta
Dump of assembler code for function htcp_recalc_beta:
  0x000113cc <+0>:  stp x29, x30, [sp, #-16]!
  0x000113d0 <+4>:  mov x29, sp
  0x000113d4 <+8>:  ldr x8, [x0]  ; x8 = ccv
  0x000113d8 <+12>: ldr x9, [x18] ; x9 = curthread
  0x000113dc <+16>: adrpx10, 0x21000  ; x10 = ???
  0x000113e0 <+20>: ldr x9, [x9, #1368]   ; x9 =
curthread->td_vnet
  0x000113e4 <+24>: ldr x10, [x10, #2168] ; x10 = ???
  0x000113e8 <+28>: ldr x9, [x9, #40] ; x9 =
curthread->td_vnet->vnet_data_base
  0x000113ec <+32>: ldr w9, [x9, x10] ; w9 =
V_htcp_adaptive_backoff ???
  0x000113f0 <+36>: cbz w9, 0x11428 

I don't understand the computations in relation to x10, which is the offset
used to get the relevant variable.

However, this code works.

Looking at the code generated by clang13 when htcp_recalc_beta() is inlined,
one gets:

  0x000150610f28 <+212>:ldr x10, [x0]; x10 = ccv
  0x000150610f2c <+216>:ldr x11, [x18]   ; x11 =
curthread
  0x000150610f30 <+220>:ldr x11, [x11, #1368]; x11 =
curthread->td_vnet
  0x000150610f34 <+224>:ldr x12, [x11, #40]  ; x12 =
curthread->td_vnet->vnet_data_base
  0x000150610f38 <+228>:adrpx11, 0x000150621000  ; ???
  0x000150610f3c <+232>:ldr x11, [x11, #2256]; ???
  0x000150610f40 <+236>:ldr w12, [x12, x11]
  0x000150610f44 <+240>:cbz w12, 0x000150610f7c


It looks similar and it does work.

Now comes the inlined code from clang14:

  0x0001016acf28 <+212>:ldr x10, [x0] ; x10 = ccv
  0x0001016acf2c <+216>:ldr x11, [x18]; x11 = curthread
  0x0001016acf30 <+220>:ldr x12, [x11, #1368] ; x12 =
curthread->td_vnet
  0x0001016acf34 <+224>:nop
  0x0001016acf38 <+228>:adr x11, 0x0001016bd520

  0x0001016acf3c <+232>:ldr x12, [x12, #40]   ; x12 =
curthread->td_vnet->vnet_data_base
==>0x0001016acf40 <+236>:   ldr w12, [x12, x11]
  0x0001016acf44 <+240>:cbz w12, 0x0001016acf7c


I reached out at arm-free...@freebsd.org for some help regarding the generated
code.

-- 
You are receiving this mail because:
You are on the CC list for the bug.


Problem reports for n...@freebsd.org that need special attention

2022-05-22 Thread bugzilla-noreply
To view an individual PR, use:
  https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=(Bug Id).

The following is a listing of current problems submitted by FreeBSD users,
which need special attention. These represent problem reports covering
all versions including experimental development code and obsolete releases.

Status  |Bug Id | Description
+---+---
In Progress |221146 | [ixgbe] Problem with second laggport  
New |204438 | setsockopt() handling of kern.ipc.maxsockbuf limi 
New |213410 | [carp] service netif restart causes hang only whe 
Open|  7556 | ppp: sl_compress_init() will fail if called anyth 
Open|193452 | Dell PowerEdge 210 II -- Kernel panic bce (broadc 
Open|202510 | [CARP] advertisements sourced from CARP IP cause  
Open|207261 | netmap: Doesn't do TX sync with kqueue
Open|73 | igb(4): Kernel panic (fatal trap 12) due to netwo 
Open|225438 | panic in6_unlink_ifa() due to race
Open|227720 | Kernel panic in ppp server
Open|230807 | if_alc(4): Driver not working for Killer Networki 
Open|236888 | ppp daemon: Allow MTU to be overridden for PPPoE  
Open|237072 | netgraph(4): performance issue [on HardenedBSD]?  
Open|237840 | Removed dummynet dependency on ipfw   
Open|237973 | pf: implement egress keyword to simplify rules ac 
Open|238324 | Add XG-C100C/AQtion AQC107 10GbE NIC driver   
Open|238707 | Lock order reversal: rtentry vs "nd6 list"
Open|240944 | em(4): Crash with Intel 82571EB NIC with AMD Pile 
Open|241106 | tun/ppp: panic: vm_fault: fault on nofault entry  
Open|241162 | Panic in closefp() triggered by nginx (uwsgi with 
Open|241191 | route flush panic with RADIX_MPATH
Open|243463 | ix0: Watchdog timeout 
Open|247111 | pxeboot very slow with i219LM 
Open|257709 | netinet6: Set net.inet6.icmp6.nodeinfo default to 
Open|118111 | rc: network.subr Add MAC address based interface  

25 problems total for which you should take action.


[Bug 264094] cc_htcp(4): Setting net.inet.tcp.cc.algorithm to htcp triggers panic on the most recent CURRENT

2022-05-22 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264094

--- Comment #3 from Marek Zarychta  ---
Thank you for digging into this. It looks like a clang14 flaw. Please see: bug
264021 and probably also bug 264115.

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug 264094] cc_htcp(4): Setting net.inet.tcp.cc.algorithm to htcp triggers panic on the most recent CURRENT

2022-05-22 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264094

Jessica Clarke  changed:

   What|Removed |Added

 CC||jrt...@freebsd.org

--- Comment #4 from Jessica Clarke  ---
This looks like it's caused by
https://github.com/llvm/llvm-project/commit/8acc3b4ab0c76b9c2a54182e31a02f90ebb96329
given the loss of a LDR of the ADRP and the insertion of a NOP (ignoring the
instruction rescheduling that changes register allocation slightly).

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug 264094] cc_htcp(4): Setting net.inet.tcp.cc.algorithm to htcp triggers panic on the most recent CURRENT

2022-05-22 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264094

--- Comment #5 from Jessica Clarke  ---
Well, that composed with
https://github.com/llvm/llvm-project/commit/4450a2a23df0e7081ca7fee3ec641774afedc2bc

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug 264094] cc_htcp(4): Setting net.inet.tcp.cc.algorithm to htcp triggers panic on the most recent CURRENT

2022-05-22 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264094

--- Comment #6 from Jessica Clarke  ---
To confirm, you are using cc_htcp.ko rather than compiling it into your kernel?

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug 264094] cc_htcp(4): Setting net.inet.tcp.cc.algorithm to htcp triggers panic on the most recent CURRENT

2022-05-22 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264094

--- Comment #7 from Marek Zarychta  ---
(In reply to Jessica Clarke from comment #6)
>To confirm, you are using cc_htcp.ko rather than compiling it into your kernel?

Of course. Good idea. I didn't know it is even possible to build the kernel
with cc_htpc support.

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug 264094] cc_htcp(4): Setting net.inet.tcp.cc.algorithm to htcp triggers panic on the most recent CURRENT

2022-05-22 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264094

--- Comment #8 from Jessica Clarke  ---
(In reply to Marek Zarychta from comment #7)

In the kernel should work as it's prepared for those kinds of optimisations,
but kernel modules should not, as they rely on the indirection persisting and
being rewritten on load. Marking the special vnet and dpcpu symbols as weak
might be sufficient to stop the relaxations, but I wouldn't like to say for
sure, kernel modules get build with weird symbol interposition semantics that
have always been asking for trouble.

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug 264094] cc_htcp(4): Setting net.inet.tcp.cc.algorithm to htcp triggers panic on the most recent CURRENT

2022-05-22 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264094

John F. Carr  changed:

   What|Removed |Added

 CC||j...@mit.edu

--- Comment #9 from John F. Carr  ---
The problem is introduced in the process of turning the .o into a .ko.
Pinpointing the bug requires study of the exact definition of the ARM
relocation types, in assembly and in ELF.

If you change -c to -S in the command for building cc_htcp.o you get two
consecutive lines of assembly

adrpx11, :got:vnet_entry_htcp_adaptive_backoff
ldr x11, [x11, :got_lo12:vnet_entry_htcp_adaptive_backoff]

In cc_htcp.o these become (objdump --disassemble --reloc)

 200:   900badrpx11, 0 
200: R_AARCH64_ADR_GOT_PAGE
vnet_entry_htcp_adaptive_backoff
 204:   f940016bldr x11, [x11]
204: R_AARCH64_LD64_GOT_LO12_NC
vnet_entry_htcp_adaptive_backoff

In cc_htcp.ko these are incorrectly optimized after the linker determines the
variable is close to the instruction:

   10f50:   d503201fnop
   10f54:   10082f6badr x11, 21540


This computes the address of the value instead of loading the value.  The
optimization would be correct if there were an adrp+adr pair but it is not
correct for adrp+ld.  So is :got_lo12: the wrong prefix, is
R_AARCH64_LD64_GOT_LO12_NC the wrong binary relocation code, or did the linker
forget to check the opcode of the instruction it rewrote?

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug 264114] net/wireguard-kmod: Crashes on 13.1-RELEASE: panic: vm_fault_lookup: fault on nofault entry, addr: 0 (wireguard)

2022-05-22 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264114

Kyle Evans  changed:

   What|Removed |Added

 CC||kev...@freebsd.org

--- Comment #8 from Kyle Evans  ---
I wish we had known this was an issue back in neta/rc... we put time into
diagnosing an issue with binary compatible with the drm ports this cycle, we
would have done the same for wireguard.

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug 264094] cc_htcp(4): Setting net.inet.tcp.cc.algorithm to htcp triggers panic on the most recent CURRENT

2022-05-22 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264094

--- Comment #10 from Jessica Clarke  ---
(In reply to John F. Carr from comment #9)

The optimisation is correct for non-preemptible symbols. It's not correct for
preemptible symbols (or hacks like vnet/dpcpu that rely on symbol and
relocation abuse).

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug 264094] cc_htcp(4): Setting net.inet.tcp.cc.algorithm to htcp triggers panic on the most recent CURRENT

2022-05-23 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264094

--- Comment #11 from Michael Tuexen  ---
(In reply to Jessica Clarke from comment #6)
I just tested that the problem does not show up if you build the CC module in
the kernel using the CC_HTCP kernel option.

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug 264094] cc_htcp(4): Setting net.inet.tcp.cc.algorithm to htcp triggers panic on the most recent CURRENT

2022-05-23 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264094

Michael Tuexen  changed:

   What|Removed |Added

   Assignee|tue...@freebsd.org  |b...@freebsd.org
 Status|In Progress |Open

--- Comment #12 from Michael Tuexen  ---
Resigning as assignee since it is a clang issue, not a networking issue.

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug 264059] mlx4en(4) Mellanox ConnectX-3 10g eth not working in 13.1: mlx4_core0: Unable to determine PCI device chain minimum BW

2022-05-23 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264059

--- Comment #9 from Hans Petter Selasky  ---
Ping

--HPS

-- 
You are receiving this mail because:
You are on the CC list for the bug.
You are the assignee for the bug.


[Bug 264059] mlx4en(4) Mellanox ConnectX-3 10g eth not working in 13.1: mlx4_core0: Unable to determine PCI device chain minimum BW

2022-05-23 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264059

--- Comment #10 from crb  ---
Sorry, I thought I left a message and closed this.  I was, indeed, missing the
module you suggested.  When I loaded that the machine started working.  Thank
you!

-- 
You are receiving this mail because:
You are the assignee for the bug.
You are on the CC list for the bug.


[Bug 264059] mlx4en(4) Mellanox ConnectX-3 10g eth not working in 13.1: mlx4_core0: Unable to determine PCI device chain minimum BW

2022-05-23 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264059

Hans Petter Selasky  changed:

   What|Removed |Added

 Resolution|--- |FIXED
 Status|Open|Closed

--- Comment #11 from Hans Petter Selasky  ---
Thank you!

Then I'll close this issue.

--HPS

-- 
You are receiving this mail because:
You are on the CC list for the bug.
You are the assignee for the bug.


[Bug 263824] genet(4): Driver interface may overwrite memory in a consecutive memory copy operations when parsing TX packet

2022-05-23 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=263824

--- Comment #7 from commit-h...@freebsd.org ---
A commit in branch stable/13 references this bug:

URL:
https://cgit.FreeBSD.org/src/commit/?id=7e6e22aab6b993e42328bafe0f64ee14a2b7c43c

commit 7e6e22aab6b993e42328bafe0f64ee14a2b7c43c
Author: Mike Karels 
AuthorDate: 2022-05-09 12:19:52 +
Commit: Mike Karels 
CommitDate: 2022-05-23 11:53:01 +

genet: fix output packet corruption in uncommon case

The code for the "shift" block in the COPY macro set the pointer for
the next copy block to the wrong value.  In this case, the link-layer
header would be overwritten by the network-layer header.  This case is
difficult or impossible to exercise in the current driver without
changing the value of the hw.genet.tx_hdr_min sysctl.  Correct the
pointer.  While here, remove a line in the macro that was marked
"unneeded", which was actually wrong.

PR: 263824
Submitted by:   jiah...@blackberry.com

(cherry picked from commit 1de9aa4d4f7938f36e6485dad817908a6e45bb32)

 sys/arm64/broadcom/genet/if_genet.c | 3 +--
 1 file changed, 1 insertion(+), 2 deletions(-)

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug 263824] genet(4): Driver interface may overwrite memory in a consecutive memory copy operations when parsing TX packet

2022-05-23 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=263824

Mike Karels  changed:

   What|Removed |Added

 Status|In Progress |Closed
 Resolution|--- |FIXED

--- Comment #8 from Mike Karels  ---
Fixed on main and stable/13

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug 245981] bnxt(4): BCM57414 / BCM57416 not initializing: bnxt0: Unable to allocate device TX queue / queue memory

2022-05-23 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=245981

--- Comment #31 from SJ  ---
I couldn't find a version matching 21.65.33.33, but downgraded the NIC firmware
to 21.60.22.11 and everything worked fine after loading the kernel module.
Tried upgrading to 22.00.07.60 again after that and can confirm that now works
as well. 

Bit of an odd one, but happy to report no further issues. Cheers!

-- 
You are receiving this mail because:
You are on the CC list for the bug.
You are the assignee for the bug.


[Bug 264094] cc_htcp(4): Setting net.inet.tcp.cc.algorithm to htcp triggers panic on the most recent CURRENT

2022-05-23 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264094

--- Comment #13 from Michael Tuexen  ---
Just another data point: Disabling VNET also works around the problem.

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug 264094] cc_htcp(4): Setting net.inet.tcp.cc.algorithm to htcp triggers panic on the most recent CURRENT

2022-05-23 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264094

--- Comment #14 from Jessica Clarke  ---
Yes, it's a problem with how VNET (and DPCPU) are designed

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug 264193] pf: scrub max-mss rule stops working (but still counts) after 13.1-RELEASE upgrade

2022-05-23 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264193

Kubilay Kocak  changed:

   What|Removed |Added

 Status|New |Open
  Flags||mfc-stable13?,
   ||mfc-stable12-
Summary|Broken scrub max-mss|pf: scrub max-mss rule
   ||stops working (but still
   ||counts) after 13.1-RELEASE
   ||upgrade
 Blocks||264030
 CC||n...@freebsd.org
   Assignee|b...@freebsd.org|p...@freebsd.org
   Keywords||needs-qa, regression


Referenced Bugs:

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264030
[Bug 264030] [tracking] 13.1-RELEASE issue reports
-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug 264191] mbuf: debugnet panics with mbuf cache with multiple instances of the same driver

2022-05-23 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264191

Kubilay Kocak  changed:

   What|Removed |Added

 CC||hsela...@freebsd.org,
   ||n...@freebsd.org
   See Also||https://bugs.freebsd.org/bu
   ||gzilla/show_bug.cgi?id=2589
   ||23
Summary|debugnet panics with mbuf   |mbuf: debugnet panics with
   |cache with multiple |mbuf cache with multiple
   |instances of the same   |instances of the same
   |driver  |driver
  Flags||maintainer-feedback?(cem@fr
   ||eebsd.org),
   ||maintainer-feedback?(markj@
   ||FreeBSD.org),
   ||maintainer-feedback?(hselas
   ||k...@freebsd.org)
   Keywords||crash, needs-qa
   Assignee|b...@freebsd.org|n...@freebsd.org
 Status|New |Open
   Severity|Affects Only Me |Affects Some People

--- Comment #1 from Kubilay Kocak  ---
^Triage: Unsure of specific relevance, but see also src 5a7de2b42caf via 258923
given mlx mention here and mlx, panic, debugnet_mbuf_reinit() and debugnet
activation there.

-- 
You are receiving this mail because:
You are on the CC list for the bug.
You are the assignee for the bug.


[Bug 258923] [mlx4en] Wrong mbuf cluster size in mlx4_en_debugnet_init leads to panic

2022-05-23 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=258923

Kubilay Kocak  changed:

   What|Removed |Added

   See Also||https://bugs.freebsd.org/bu
   ||gzilla/show_bug.cgi?id=2641
   ||91

-- 
You are receiving this mail because:
You are the assignee for the bug.


[Bug 264191] mbuf: debugnet panics with mbuf cache with multiple instances of the same driver

2022-05-23 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264191

--- Comment #2 from Kubilay Kocak  ---
See also base 5a7de2b42caf via bug 258923 apologies.

-- 
You are receiving this mail because:
You are the assignee for the bug.
You are on the CC list for the bug.


[Bug 264179] Boot hangs up with Alderlake's intel GbE NIC

2022-05-23 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264179

Mark Linimon  changed:

   What|Removed |Added

   Keywords||IntelNetworking, regression
   Assignee|b...@freebsd.org|n...@freebsd.org

-- 
You are receiving this mail because:
You are the assignee for the bug.


[Bug 264179] 13.1-RELEASE hands in boot with Intel Alderlake GbE NIC

2022-05-23 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264179

Kubilay Kocak  changed:

   What|Removed |Added

 Blocks||264030
 Status|New |Open
Summary|Boot hangs up with  |13.1-RELEASE hands in boot
   |Alderlake's intel GbE NIC   |with Intel Alderlake GbE
   ||NIC
 CC||n...@freebsd.org
   Keywords||needs-qa

--- Comment #1 from Kubilay Kocak  ---
- Can you confirm boot behaviour is OK on 12.1-RELEASE ?
- Is the system able to boot single user? (to obtain and attach pciconf -lv and
usbconfig list output)
- Does boot verbose show anything additional?
- How does behaviour change without any USB devices connected?
- How does behaviour change after disabling USB controllers in BIOS/UEFI?
- How does behaviour change after disabling:
   - just onboard network controller
   - just pci network controller
   - both network controllers


Referenced Bugs:

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264030
[Bug 264030] [tracking] 13.1-RELEASE issue reports
-- 
You are receiving this mail because:
You are on the CC list for the bug.
You are the assignee for the bug.


[Bug 264094] cc_htcp(4): Setting net.inet.tcp.cc.algorithm to htcp triggers panic on the most recent CURRENT

2022-05-23 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264094

Kubilay Kocak  changed:

   What|Removed |Added

   Severity|Affects Many People |Affects Some People
 CC||toolch...@freebsd.org
   Assignee|b...@freebsd.org|toolch...@freebsd.org
  Flags||maintainer-feedback?(toolch
   ||a...@freebsd.org)

--- Comment #15 from Kubilay Kocak  ---
(In reply to Michael Tuexen from comment #12)

Any details on that isolation that could help toolchain@ with root causing and
resolution Michael?

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug 264191] mbuf: debugnet panics with mbuf cache with multiple instances of the same driver

2022-05-24 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264191

--- Comment #3 from Bryan Drewery  ---
(In reply to Kubilay Kocak from comment #2)

None of this is a recent regression. It is design flaws.

-- 
You are receiving this mail because:
You are on the CC list for the bug.
You are the assignee for the bug.


[Bug 264094] cc_htcp(4): Setting net.inet.tcp.cc.algorithm to htcp triggers panic on the most recent CURRENT

2022-05-24 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264094

--- Comment #16 from Michael Tuexen  ---
(In reply to Kubilay Kocak from comment #15)
I think I gave all information I can provide. I'm not familiar with the
internals for clang...

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug 264094] cc_htcp(4): Setting net.inet.tcp.cc.algorithm to htcp triggers panic on the most recent CURRENT

2022-05-24 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264094

Kubilay Kocak  changed:

   What|Removed |Added

   See Also||https://bugs.freebsd.org/bu
   ||gzilla/show_bug.cgi?id=2640
   ||21,
   ||https://bugs.freebsd.org/bu
   ||gzilla/show_bug.cgi?id=2641
   ||15

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug 264179] 13.1-RELEASE hands in boot with Intel Alderlake GbE NIC

2022-05-25 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264179

--- Comment #2 from Yasuhiro Kimura  ---
(In reply to Kubilay Kocak from comment #1)

> - Can you confirm boot behaviour is OK on 12.1-RELEASE ?

Do you mean 12.3-RELEASE? If so, same hangup happens with it.

> - Is the system able to boot single user? (to obtain and attach pciconf -lv 
> and usbconfig list output)

No. Hangup happens before reaching single user shell.
But on 13.0-RELEASE `pciconf -lv` gets following result.

yasu@maybe[1002]% pciconf -lv  
 ~
hostb0@pci0:0:0:0:  class=0x06 rev=0x05 hdr=0x00 vendor=0x8086
device=0x4630 subvendor=0x1458 subdevice=0x5000
vendor = 'Intel Corporation'
class  = bridge
subclass   = HOST-PCI
pcib1@pci0:0:1:0:   class=0x060400 rev=0x05 hdr=0x01 vendor=0x8086
device=0x460d subvendor=0x1458 subdevice=0x5000
vendor = 'Intel Corporation'
class  = bridge
subclass   = PCI-PCI
vgapci0@pci0:0:2:0: class=0x03 rev=0x0c hdr=0x00 vendor=0x8086
device=0x4692 subvendor=0x1458 subdevice=0xd000
vendor = 'Intel Corporation'
class  = display
subclass   = VGA
none0@pci0:0:10:0:  class=0x118000 rev=0x01 hdr=0x00 vendor=0x8086
device=0x467d subvendor=0x subdevice=0x
vendor = 'Intel Corporation'
class  = dasp
xhci0@pci0:0:20:0:  class=0x0c0330 rev=0x11 hdr=0x00 vendor=0x8086
device=0x7ae0 subvendor=0x1458 subdevice=0x5007
vendor = 'Intel Corporation'
class  = serial bus
subclass   = USB
none1@pci0:0:20:2:  class=0x05 rev=0x11 hdr=0x00 vendor=0x8086
device=0x7aa7 subvendor=0x subdevice=0x
vendor = 'Intel Corporation'
class  = memory
subclass   = RAM
none2@pci0:0:21:0:  class=0x0c8000 rev=0x11 hdr=0x00 vendor=0x8086
device=0x7acc subvendor=0x subdevice=0x
vendor = 'Intel Corporation'
class  = serial bus
none3@pci0:0:21:1:  class=0x0c8000 rev=0x11 hdr=0x00 vendor=0x8086
device=0x7acd subvendor=0x subdevice=0x
vendor = 'Intel Corporation'
class  = serial bus
none4@pci0:0:21:2:  class=0x0c8000 rev=0x11 hdr=0x00 vendor=0x8086
device=0x7ace subvendor=0x subdevice=0x
vendor = 'Intel Corporation'
class  = serial bus
none5@pci0:0:21:3:  class=0x0c8000 rev=0x11 hdr=0x00 vendor=0x8086
device=0x7acf subvendor=0x subdevice=0x
vendor = 'Intel Corporation'
class  = serial bus
none6@pci0:0:22:0:  class=0x078000 rev=0x11 hdr=0x00 vendor=0x8086
device=0x7ae8 subvendor=0x1458 subdevice=0x1c3a
vendor = 'Intel Corporation'
class  = simple comms
ahci0@pci0:0:23:0:  class=0x010601 rev=0x11 hdr=0x00 vendor=0x8086
device=0x7ae2 subvendor=0x1458 subdevice=0xb005
vendor = 'Intel Corporation'
class  = mass storage
subclass   = SATA
none7@pci0:0:25:0:  class=0x0c8000 rev=0x11 hdr=0x00 vendor=0x8086
device=0x7afc subvendor=0x subdevice=0x
vendor = 'Intel Corporation'
class  = serial bus
none8@pci0:0:25:1:  class=0x0c8000 rev=0x11 hdr=0x00 vendor=0x8086
device=0x7afd subvendor=0x subdevice=0x
vendor = 'Intel Corporation'
class  = serial bus
pcib2@pci0:0:28:0:  class=0x060400 rev=0x11 hdr=0x01 vendor=0x8086
device=0x7ab8 subvendor=0x subdevice=0x
vendor = 'Intel Corporation'
class  = bridge
subclass   = PCI-PCI
pcib3@pci0:0:28:4:  class=0x060400 rev=0x11 hdr=0x01 vendor=0x8086
device=0x7abc subvendor=0x1458 subdevice=0x5001
vendor = 'Intel Corporation'
class  = bridge
subclass   = PCI-PCI
isab0@pci0:0:31:0:  class=0x060100 rev=0x11 hdr=0x00 vendor=0x8086
device=0x7a87 subvendor=0x1458 subdevice=0x5001
vendor = 'Intel Corporation'
class  = bridge
subclass   = PCI-ISA
hdac0@pci0:0:31:3:  class=0x040300 rev=0x11 hdr=0x00 vendor=0x8086
device=0x7ad0 subvendor=0x1458 subdevice=0xa194
vendor = 'Intel Corporation'
class  = multimedia
subclass   = HDA
none9@pci0:0:31:4:  class=0x0c0500 rev=0x11 hdr=0x00 vendor=0x8086
device=0x7aa3 subvendor=0x1458 subdevice=0x5001
vendor = 'Intel Corporation'
class  = serial bus
subclass   = SMBus
none10@pci0:0:31:5: class=0x0c8000 rev=0x11 hdr=0x00 vendor=0x8086
device=0x7aa4 subvendor=0x subdevice=0x
vendor = 'Intel Corporation'
class  = serial bus
none11@pci0:0:31:6: class=0x02 rev=0x11 hdr=0x00 vendor=0x8086
device=0x1a1d subvendor=0x1458 subdevice=0xe000
vendor = 'Intel Corporation'
device = 'Ethernet Connection (17) I219-V'
class  = network
subclass   = ethernet
em0@pci0:1:0:0: class=0x02 rev=0x00 hdr=0x00 vendor=0x8086 device=0x10d3
subvendor=0x8086 subdevice=0xa01f
vendor = 'Intel Corporation'
device = '82574L Gigabit Network Connection'
class  = network
  

[Bug 264179] 13.1-RELEASE hands in boot with Intel Alderlake GbE NIC

2022-05-25 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264179

--- Comment #3 from Yasuhiro Kimura  ---
According to the suggestion in freebsd-stable ML, I added
'hint.em.1.disabled=1' to /boot/loader.conf and then 13.1-RELEASE boots
successfully.

-- 
You are receiving this mail because:
You are on the CC list for the bug.
You are the assignee for the bug.


[Bug 263756] igb interface not receiving vlan packets since 12.3

2022-05-25 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=263756

Ryan Steinmetz  changed:

   What|Removed |Added

 CC||z...@freebsd.org

--- Comment #4 from Ryan Steinmetz  ---
I ran into this as well.  This resolved my issue:
ifconfig igb0 -vlanhwfilter -vlanhwtag

-- 
You are receiving this mail because:
You are the assignee for the bug.


[Bug 263756] igb interface not receiving vlan packets since 12.3

2022-05-25 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=263756

--- Comment #5 from Natalino Picone  ---
(In reply to Ryan Steinmetz from comment #4)

This is not working as the 12.3 intel driver contains a bug.
ifconfig reports that features have been disabled, but they are not.
See https://reviews.freebsd.org/D33154 which I think should also be merged on
12.3

-- 
You are receiving this mail because:
You are the assignee for the bug.


[Bug 263756] igb interface not receiving vlan packets since 12.3

2022-05-25 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=263756

--- Comment #6 from Ryan Steinmetz  ---
(In reply to Natalino Picone from comment #5)
My use case is closer to what s...@42.org described--where I have vlan
interfaces created.

I don't think my situation is identical to what you reported, but, seems
related.

-- 
You are receiving this mail because:
You are the assignee for the bug.


[Bug 264248] ib_cm: Fix a resource leak in ib_cm_insert_listen()

2022-05-25 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264248

Mark Linimon  changed:

   What|Removed |Added

   Assignee|b...@freebsd.org|n...@freebsd.org

-- 
You are receiving this mail because:
You are the assignee for the bug.


[Bug 264248] ib_cm: Fix a resource leak in ib_cm_insert_listen()

2022-05-26 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264248

--- Comment #1 from Hans Petter Selasky  ---
Have you checked if a fix exist in Linux?

-- 
You are receiving this mail because:
You are the assignee for the bug.


maintainer-feedback requested: [Bug 264257] Panic: Fatal trap 12: page fault while in kernel mode (if_io_tqg_4) - m_copydata ... at /usr/src/sys/kern/uipc_mbuf.c:659

2022-05-26 Thread bugzilla-noreply
Kubilay Kocak  has asked freebsd-net (Nobody)
 for maintainer-feedback:
Bug 264257: Panic: Fatal trap 12: page fault while in kernel mode (if_io_tqg_4)
- m_copydata ... at /usr/src/sys/kern/uipc_mbuf.c:659
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264257



[Bug 264257] Panic: Fatal trap 12: page fault while in kernel mode (if_io_tqg_4) - m_copydata ... at /usr/src/sys/kern/uipc_mbuf.c:659

2022-05-26 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264257

Kubilay Kocak  changed:

   What|Removed |Added

 CC||hsela...@freebsd.org,
   ||j...@freebsd.org,
   ||ma...@freebsd.org,
   ||n...@freebsd.org
Summary|[panic] Fatal trap 12: page |Panic: Fatal trap 12: page
   |fault while in kernel mode  |fault while in kernel mode
   |(if_io_tqg_4)   |(if_io_tqg_4) - m_copydata
   ||... at
   ||/usr/src/sys/kern/uipc_mbuf
   ||.c:659
 Blocks||264030
   Assignee|b...@freebsd.org|n...@freebsd.org
   Keywords||crash, needs-qa
  Flags||maintainer-feedback?(net@Fr
   ||eeBSD.org),
   ||maintainer-feedback?(hselas
   ||k...@freebsd.org),
   ||maintainer-feedback?(markj@
   ||FreeBSD.org),
   ||maintainer-feedback?(jhb@Fr
   ||eeBSD.org), mfc-stable13?
 Status|New |Open


Referenced Bugs:

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264030
[Bug 264030] [tracking] 13.1-RELEASE issue reports
-- 
You are receiving this mail because:
You are on the CC list for the bug.
You are the assignee for the bug.


[Bug 264257] Panic: Fatal trap 12: page fault while in kernel mode (if_io_tqg_4) - m_copydata ... at /usr/src/sys/kern/uipc_mbuf.c:659

2022-05-26 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264257

Michael Tuexen  changed:

   What|Removed |Added

 CC||tue...@freebsd.org

--- Comment #2 from Michael Tuexen  ---
Can you provide information how to reproduce it?

-- 
You are receiving this mail because:
You are the assignee for the bug.
You are on the CC list for the bug.


[Bug 264257] Panic: Fatal trap 12: page fault while in kernel mode (if_io_tqg_4) - m_copydata ... at /usr/src/sys/kern/uipc_mbuf.c:659

2022-05-26 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264257

--- Comment #3 from iron.ud...@gmail.com ---
(In reply to Michael Tuexen from comment #2)

Unfortunately I don't know how to reproduce this bug. The server was working a
week or so without any problem. Today it suddenly panicked and restarted.
Workload is typical: web-server, postgresql, S3 (minio).

-- 
You are receiving this mail because:
You are the assignee for the bug.
You are on the CC list for the bug.


[Bug 264257] Panic: Fatal trap 12: page fault while in kernel mode (if_io_tqg_4) - m_copydata ... at /usr/src/sys/kern/uipc_mbuf.c:659

2022-05-26 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264257

--- Comment #4 from iron.ud...@gmail.com ---
(In reply to Michael Tuexen from comment #2)

Do you need all of my sysctls from /etc/sysctl.conf and /boot/loader.conf?

-- 
You are receiving this mail because:
You are the assignee for the bug.
You are on the CC list for the bug.


[Bug 264179] 13.1-RELEASE hands in boot with Intel Alderlake GbE NIC

2022-05-26 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264179

--- Comment #4 from Yasuhiro Kimura  ---
Now boot succeeds with 13.1-RELEASE and `pciconf -lv` gets following result.

yasu@maybe[1028]% pciconf -lv
hostb0@pci0:0:0:0:  class=0x06 rev=0x05 hdr=0x00 vendor=0x8086
device=0x4630 subvendor=0x1458 subdevice=0x5000
vendor = 'Intel Corporation'
class  = bridge
subclass   = HOST-PCI
pcib1@pci0:0:1:0:   class=0x060400 rev=0x05 hdr=0x01 vendor=0x8086
device=0x460d subvendor=0x1458 subdevice=0x5000
vendor = 'Intel Corporation'
class  = bridge
subclass   = PCI-PCI
vgapci0@pci0:0:2:0: class=0x03 rev=0x0c hdr=0x00 vendor=0x8086
device=0x4692 subvendor=0x1458 subdevice=0xd000
vendor = 'Intel Corporation'
class  = display
subclass   = VGA
none0@pci0:0:10:0:  class=0x118000 rev=0x01 hdr=0x00 vendor=0x8086
device=0x467d subvendor=0x subdevice=0x
vendor = 'Intel Corporation'
class  = dasp
xhci0@pci0:0:20:0:  class=0x0c0330 rev=0x11 hdr=0x00 vendor=0x8086
device=0x7ae0 subvendor=0x1458 subdevice=0x5007
vendor = 'Intel Corporation'
class  = serial bus
subclass   = USB
none1@pci0:0:20:2:  class=0x05 rev=0x11 hdr=0x00 vendor=0x8086
device=0x7aa7 subvendor=0x subdevice=0x
vendor = 'Intel Corporation'
class  = memory
subclass   = RAM
ig4iic0@pci0:0:21:0:class=0x0c8000 rev=0x11 hdr=0x00 vendor=0x8086
device=0x7acc subvendor=0x subdevice=0x
vendor = 'Intel Corporation'
class  = serial bus
ig4iic1@pci0:0:21:1:class=0x0c8000 rev=0x11 hdr=0x00 vendor=0x8086
device=0x7acd subvendor=0x subdevice=0x
vendor = 'Intel Corporation'
class  = serial bus
ig4iic2@pci0:0:21:2:class=0x0c8000 rev=0x11 hdr=0x00 vendor=0x8086
device=0x7ace subvendor=0x subdevice=0x
vendor = 'Intel Corporation'
class  = serial bus
ig4iic3@pci0:0:21:3:class=0x0c8000 rev=0x11 hdr=0x00 vendor=0x8086
device=0x7acf subvendor=0x subdevice=0x
vendor = 'Intel Corporation'
class  = serial bus
none2@pci0:0:22:0:  class=0x078000 rev=0x11 hdr=0x00 vendor=0x8086
device=0x7ae8 subvendor=0x1458 subdevice=0x1c3a
vendor = 'Intel Corporation'
class  = simple comms
ahci0@pci0:0:23:0:  class=0x010601 rev=0x11 hdr=0x00 vendor=0x8086
device=0x7ae2 subvendor=0x1458 subdevice=0xb005
vendor = 'Intel Corporation'
class  = mass storage
subclass   = SATA
ig4iic4@pci0:0:25:0:class=0x0c8000 rev=0x11 hdr=0x00 vendor=0x8086
device=0x7afc subvendor=0x subdevice=0x
vendor = 'Intel Corporation'
class  = serial bus
ig4iic5@pci0:0:25:1:class=0x0c8000 rev=0x11 hdr=0x00 vendor=0x8086
device=0x7afd subvendor=0x subdevice=0x
vendor = 'Intel Corporation'
class  = serial bus
pcib2@pci0:0:28:0:  class=0x060400 rev=0x11 hdr=0x01 vendor=0x8086
device=0x7ab8 subvendor=0x subdevice=0x
vendor = 'Intel Corporation'
class  = bridge
subclass   = PCI-PCI
pcib3@pci0:0:28:4:  class=0x060400 rev=0x11 hdr=0x01 vendor=0x8086
device=0x7abc subvendor=0x1458 subdevice=0x5001
vendor = 'Intel Corporation'
class  = bridge
subclass   = PCI-PCI
isab0@pci0:0:31:0:  class=0x060100 rev=0x11 hdr=0x00 vendor=0x8086
device=0x7a87 subvendor=0x1458 subdevice=0x5001
vendor = 'Intel Corporation'
class  = bridge
subclass   = PCI-ISA
hdac0@pci0:0:31:3:  class=0x040300 rev=0x11 hdr=0x00 vendor=0x8086
device=0x7ad0 subvendor=0x1458 subdevice=0xa194
vendor = 'Intel Corporation'
class  = multimedia
subclass   = HDA
ichsmb0@pci0:0:31:4:class=0x0c0500 rev=0x11 hdr=0x00 vendor=0x8086
device=0x7aa3 subvendor=0x1458 subdevice=0x5001
vendor = 'Intel Corporation'
class  = serial bus
subclass   = SMBus
none3@pci0:0:31:5:  class=0x0c8000 rev=0x11 hdr=0x00 vendor=0x8086
device=0x7aa4 subvendor=0x subdevice=0x
vendor = 'Intel Corporation'
class  = serial bus
em1@pci0:0:31:6:class=0x02 rev=0x11 hdr=0x00 vendor=0x8086
device=0x1a1d subvendor=0x1458 subdevice=0xe000
vendor = 'Intel Corporation'
device = 'Ethernet Connection (17) I219-V'
class  = network
subclass   = ethernet
em0@pci0:1:0:0: class=0x02 rev=0x00 hdr=0x00 vendor=0x8086 device=0x10d3
subvendor=0x8086 subdevice=0xa01f
vendor = 'Intel Corporation'
device = '82574L Gigabit Network Connection'
class  = network
subclass   = ethernet
nvme0@pci0:3:0:0:   class=0x010802 rev=0x00 hdr=0x00 vendor=0x15b7
device=0x5006 subvendor=0x15b7 subdevice=0x5006
vendor = 'Sandisk Corp'
device = 'WD Black SN750 / PC SN730 NVMe SSD'
class  = mass storage
subclass   = NVM

-- 
You are receiving this mail because:
You are on the CC list for the bug.
You are the assignee for the bug.


[Bug 264257] Panic: Fatal trap 12: page fault while in kernel mode (if_io_tqg_4) - m_copydata ... at /usr/src/sys/kern/uipc_mbuf.c:659

2022-05-27 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264257

--- Comment #5 from John Baldwin  ---
Looks like it walked off the end of the mbuf chain as it tried to copy one byte
too many.  You could try going up to frame 8 (tcp_output) to see if the
arguments passed to m_copydata() are still around (looks like we know the mbuf
chain via m@entry for frame 9, but knowing the original length and offset and
confirming it walked off the end would be good).  You'd have to figure out why
the length was wrong though and that might need more digging in the tp or the
like.

-- 
You are receiving this mail because:
You are on the CC list for the bug.
You are the assignee for the bug.


[Bug 264257] Panic: Fatal trap 12: page fault while in kernel mode (if_io_tqg_4) - m_copydata ... at /usr/src/sys/kern/uipc_mbuf.c:659

2022-05-27 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264257

--- Comment #6 from iron.ud...@gmail.com ---
(In reply to John Baldwin from comment #5)

Oh...I'm not sure that I can do it by myself. I'm not so expirianced in
debugging. Can I send you compressed core dump file?

-- 
You are receiving this mail because:
You are on the CC list for the bug.
You are the assignee for the bug.


[Bug 264257] Panic: Fatal trap 12: page fault while in kernel mode (if_io_tqg_4) - m_copydata ... at /usr/src/sys/kern/uipc_mbuf.c:659

2022-05-27 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264257

--- Comment #7 from John Baldwin  ---
Hmm, unfortunately it would need to be the contents of /boot/kernel and
/usr/lib/debug/boot/kernel along with the vmcore.  However, if you can stick
those all in a tarball I can take a look at them.  It might be simpler to store
them at a URL and mail that to me directly.

-- 
You are receiving this mail because:
You are on the CC list for the bug.
You are the assignee for the bug.


[Bug 264257] Panic: Fatal trap 12: page fault while in kernel mode (if_io_tqg_4) - m_copydata ... at /usr/src/sys/kern/uipc_mbuf.c:659

2022-05-27 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264257

--- Comment #8 from iron.ud...@gmail.com ---
(In reply to John Baldwin from comment #7)

Emailed you link on archive.

-- 
You are receiving this mail because:
You are on the CC list for the bug.
You are the assignee for the bug.


[Bug 234073] ixl: SR-IOV causes "Malicious Driver Detection event" when not all VFs are in passthrough mode

2022-05-27 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=234073

--- Comment #18 from benoitc  ---
is there anything that can be done for it ? Any update needed? It's kind of
suprising nobody came with a solution in 3 years on such obvious issue.

-- 
You are receiving this mail because:
You are the assignee for the bug.


[Bug 234073] ixl: SR-IOV causes "Malicious Driver Detection event" when not all VFs are in passthrough mode

2022-05-27 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=234073

--- Comment #19 from benoitc  ---
is there anything that can be done for it ? Any update needed? It's kind of
suprising nobody came with a solution in 3 years on such obvious issue.

-- 
You are receiving this mail because:
You are the assignee for the bug.


[Bug 264257] Panic: Fatal trap 12: page fault while in kernel mode (if_io_tqg_4) - m_copydata ... at /usr/src/sys/kern/uipc_mbuf.c:659

2022-05-27 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264257

--- Comment #9 from Michael Tuexen  ---
(In reply to iron.udjin from comment #8)
You might also send the link to me (tue...@freebsd.org) and Richard
(rsch...@freebsd.org), if you are willing to do so.

-- 
You are receiving this mail because:
You are the assignee for the bug.
You are on the CC list for the bug.


[Bug 264257] Panic: Fatal trap 12: page fault while in kernel mode (if_io_tqg_4) - m_copydata ... at /usr/src/sys/kern/uipc_mbuf.c:659

2022-05-27 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264257

--- Comment #10 from iron.ud...@gmail.com ---
(In reply to Michael Tuexen from comment #9)

Done.

-- 
You are receiving this mail because:
You are the assignee for the bug.
You are on the CC list for the bug.


[Bug 264257] Panic: Fatal trap 12: page fault while in kernel mode (if_io_tqg_4) - m_copydata ... at /usr/src/sys/kern/uipc_mbuf.c:659

2022-05-27 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264257

--- Comment #11 from Michael Tuexen  ---
(In reply to iron.udjin from comment #10)
Thanks! I could download the tarball and will also have a look at it.

-- 
You are receiving this mail because:
You are the assignee for the bug.
You are on the CC list for the bug.


[Bug 264114] net/wireguard-kmod: Crashes on 13.1-RELEASE: panic: vm_fault_lookup: fault on nofault entry, addr: 0 (wireguard)

2022-05-28 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264114

--- Comment #9 from Bernhard Froehlich  ---
So far no response from portmgr@ but I have created a patch similar to what was
done in virtualbox-ose-kmod to avoid that the kernel module can be loaded on a
kernel with a different minor version.

https://reviews.freebsd.org/D35341

-- 
You are receiving this mail because:
You are on the CC list for the bug.


Problem reports for n...@freebsd.org that need special attention

2022-05-29 Thread bugzilla-noreply
To view an individual PR, use:
  https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=(Bug Id).

The following is a listing of current problems submitted by FreeBSD users,
which need special attention. These represent problem reports covering
all versions including experimental development code and obsolete releases.

Status  |Bug Id | Description
+---+---
In Progress |221146 | [ixgbe] Problem with second laggport  
New |204438 | setsockopt() handling of kern.ipc.maxsockbuf limi 
New |213410 | [carp] service netif restart causes hang only whe 
Open|  7556 | ppp: sl_compress_init() will fail if called anyth 
Open|193452 | Dell PowerEdge 210 II -- Kernel panic bce (broadc 
Open|202510 | [CARP] advertisements sourced from CARP IP cause  
Open|207261 | netmap: Doesn't do TX sync with kqueue
Open|73 | igb(4): Kernel panic (fatal trap 12) due to netwo 
Open|225438 | panic in6_unlink_ifa() due to race
Open|227720 | Kernel panic in ppp server
Open|230807 | if_alc(4): Driver not working for Killer Networki 
Open|236888 | ppp daemon: Allow MTU to be overridden for PPPoE  
Open|237072 | netgraph(4): performance issue [on HardenedBSD]?  
Open|237840 | Removed dummynet dependency on ipfw   
Open|237973 | pf: implement egress keyword to simplify rules ac 
Open|238324 | Add XG-C100C/AQtion AQC107 10GbE NIC driver   
Open|238707 | Lock order reversal: rtentry vs "nd6 list"
Open|240944 | em(4): Crash with Intel 82571EB NIC with AMD Pile 
Open|241106 | tun/ppp: panic: vm_fault: fault on nofault entry  
Open|241162 | Panic in closefp() triggered by nginx (uwsgi with 
Open|241191 | route flush panic with RADIX_MPATH
Open|243463 | ix0: Watchdog timeout 
Open|247111 | pxeboot very slow with i219LM 
Open|257709 | netinet6: Set net.inet6.icmp6.nodeinfo default to 
Open|118111 | rc: network.subr Add MAC address based interface  

25 problems total for which you should take action.


[Bug 264191] mbuf: debugnet panics with mbuf cache with multiple instances of the same driver

2022-05-29 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264191

Conrad Meyer  changed:

   What|Removed |Added

  Flags|maintainer-feedback?(cem@fr |
   |eebsd.org)  |

-- 
You are receiving this mail because:
You are on the CC list for the bug.
You are the assignee for the bug.


[Bug 234073] ixl(4): SR-IOV causes "Malicious Driver Detection event" when not all VFs are in passthrough mode

2022-05-29 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=234073

Kubilay Kocak  changed:

   What|Removed |Added

 Status|New |Open
 CC||free...@intel.com,
   ||n...@freebsd.org
   Severity|Affects Some People |Affects Many People
Summary|ixl: SR-IOV causes  |ixl(4): SR-IOV causes
   |"Malicious Driver Detection |"Malicious Driver Detection
   |event" when not all VFs are |event" when not all VFs are
   |in passthrough mode |in passthrough mode
  Flags||maintainer-feedback?(krzysz
   ||tof.gala...@intel.com),
   ||maintainer-feedback?(freebs
   ||d...@intel.com),
   ||mfc-stable13?,
   ||mfc-stable12?
   Keywords||needs-qa
   Priority|--- |Normal

-- 
You are receiving this mail because:
You are the assignee for the bug.
You are on the CC list for the bug.


[Bug 211062] ix(4): SR-IOV virtual function driver fails to attach (Intel 10-Gigabit X540-AT2)

2022-05-29 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=211062

Kubilay Kocak  changed:

   What|Removed |Added

Summary|ix(4): sr-iov virtual   |ix(4): SR-IOV virtual
   |function driver fails to|function driver fails to
   |attach  |attach (Intel 10-Gigabit
   ||X540-AT2)
   Priority|--- |Normal
   Severity|Affects Some People |Affects Many People
 CC||free...@intel.com
  Flags|maintainer-feedback?(rstone |maintainer-feedback?(freebs
   |@FreeBSD.org)   |d...@intel.com)
   See Also||https://bugs.freebsd.org/bu
   ||gzilla/show_bug.cgi?id=2298
   ||52
Version|CURRENT |12.2-RELEASE

-- 
You are receiving this mail because:
You are the assignee for the bug.


[Bug 211062] ix(4): SR-IOV virtual function driver fails to attach (Intel 10-Gigabit X540-AT2)

2022-05-29 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=211062

Kubilay Kocak  changed:

   What|Removed |Added

 CC||n...@freebsd.org

-- 
You are receiving this mail because:
You are on the CC list for the bug.
You are the assignee for the bug.


[Bug 263568] ix(4): SR-IOV connection lost after loading VM with a passthrough device (Intel X520-DAA2)

2022-05-29 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=263568

Kubilay Kocak  changed:

   What|Removed |Added

   Keywords||IntelNetworking
   Priority|--- |Normal
 CC||free...@intel.com,
   ||n...@freebsd.org
  Flags||maintainer-feedback?(freebs
   ||d...@intel.com)
   Assignee|b...@freebsd.org|n...@freebsd.org
Summary|ix(4): sr-iov: connection   |ix(4): SR-IOV connection
   |lost after loading vm with  |lost after loading VM with
   |a passthrough device|a passthrough device (Intel
   ||X520-DAA2)
   Severity|Affects Only Me |Affects Many People

-- 
You are receiving this mail because:
You are the assignee for the bug.
You are on the CC list for the bug.


[Bug 200836] iovctl(8): Return descriptions in the returned schema reported by iovctl -S

2022-05-29 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=200836

Kubilay Kocak  changed:

   What|Removed |Added

  Component|kern|bin
 CC||n...@freebsd.org
Summary|SR-IOV support should   |iovctl(8): Return
   |include config option   |descriptions in the
   |description |returned schema reported by
   ||iovctl -S
  Flags||maintainer-feedback?(rstone
   ||@FreeBSD.org),
   ||mfc-stable13?,
   ||mfc-stable12?
   Assignee|b...@freebsd.org|n...@freebsd.org
   Keywords||feature

--- Comment #6 from Kubilay Kocak  ---
^Triage: Update summary to accurately reflect feature request. Request feedback
from Ryan re resolution (work-on or close)

-- 
You are receiving this mail because:
You are on the CC list for the bug.
You are the assignee for the bug.


[Bug 232472] ixgbe(4): Hyper-V Guest FreeBSD-current and Intel X540 SR-IOV passthru not working

2022-05-29 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=232472

Kubilay Kocak  changed:

   What|Removed |Added

   Assignee|virtualizat...@freebsd.org  |n...@freebsd.org
 CC||free...@intel.com,
   ||n...@freebsd.org
  Flags||maintainer-feedback?(whu@Fr
   ||eeBSD.org),
   ||maintainer-feedback?(freebs
   ||d...@intel.com),
   ||mfc-stable13?,
   ||mfc-stable12?
Summary|Hyper-V Guest   |ixgbe(4): Hyper-V Guest
   |FreeBSD-current and Intel   |FreeBSD-current and Intel
   |X540 SR-IOV pass-thru not   |X540 SR-IOV passthru not
   |working |working
   Keywords||needs-qa
Version|CURRENT |13.0-RELEASE

-- 
You are receiving this mail because:
You are the assignee for the bug.
You are on the CC list for the bug.


[Bug 232472] ixgbe(4): SR-IOV passthru not workingon Hyper-V 13-CURRENT guest with Intel X540

2022-05-29 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=232472

Kubilay Kocak  changed:

   What|Removed |Added

Summary|ixgbe(4): Hyper-V Guest |ixgbe(4): SR-IOV passthru
   |FreeBSD-current and Intel   |not workingon Hyper-V
   |X540 SR-IOV passthru not|13-CURRENT guest with Intel
   |working |X540

-- 
You are receiving this mail because:
You are on the CC list for the bug.
You are the assignee for the bug.


[Bug 239849] ixgbe(4): SR-IOV does not work on Intel x710 and Windows Server 2019 (Hyper-V) and 13.0-CURRENT

2022-05-29 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=239849

Kubilay Kocak  changed:

   What|Removed |Added

 Resolution|--- |DUPLICATE
Summary|INTEL X710, WINDOWS SERVER  |ixgbe(4): SR-IOV does not
   |2019 HYPER-V, FreeBSD   |work on Intel x710 and
   |Current, iavf   |Windows Server 2019
   ||(Hyper-V) and 13.0-CURRENT
 CC||free...@intel.com,
   ||n...@freebsd.org
Version|CURRENT |13.0-RELEASE
 Status|Open|Closed

--- Comment #4 from Kubilay Kocak  ---
^Triage: Close duplicate of bug 232472. Both issues have the same patch
attached.

*** This bug has been marked as a duplicate of bug 232472 ***

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug 232472] ixgbe(4): SR-IOV passthru not workingon Hyper-V 13-CURRENT guest with Intel X540

2022-05-29 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=232472

--- Comment #5 from Kubilay Kocak  ---
*** Bug 239849 has been marked as a duplicate of this bug. ***

-- 
You are receiving this mail because:
You are the assignee for the bug.
You are on the CC list for the bug.


[Bug 253620] Calling route delete with an invalid gateway deletes the route

2022-05-30 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=253620

--- Comment #2 from Alexander V. Chernikov  ---
I'll close this PR on Jun 5 if there are no other questions.

-- 
You are receiving this mail because:
You are the assignee for the bug.


[Bug 258528] [fib_algo][routing] crash after switch algo

2022-05-30 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=258528

--- Comment #1 from Alexander V. Chernikov  ---
Sorry for the belated reply. Were there any other similar crashes after this
one?

-- 
You are receiving this mail because:
You are on the CC list for the bug.
You are the assignee for the bug.


[Bug 264248] ib_cm: Fix a resource leak in ib_cm_insert_listen()

2022-05-30 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264248

Hans Petter Selasky  changed:

   What|Removed |Added

   Assignee|n...@freebsd.org |hsela...@freebsd.org

-- 
You are receiving this mail because:
You are the assignee for the bug.


[Bug 232472] ixgbe(4): SR-IOV passthru not working on Hyper-V 13-CURRENT guest with Intel X540 (0x152E)

2022-05-30 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=232472

Kubilay Kocak  changed:

   What|Removed |Added

   Keywords||feature
Summary|ixgbe(4): SR-IOV passthru   |ixgbe(4): SR-IOV passthru
   |not workingon Hyper-V   |not working on Hyper-V
   |13-CURRENT guest with Intel |13-CURRENT guest with Intel
   |X540|X540 (0x152E)

--- Comment #6 from Kubilay Kocak  ---
(In reply to Wei Hu from comment #4)

Is this a backport of changes committed to later (> 11.x) or a direct patch for
11.x? If the latter, are we able to produce a patch for CURRENT for user
testing?

@Intel Could you review attachment 219194 and provide advice on getting these
changes into base and upstream versions of the driver

-- 
You are receiving this mail because:
You are on the CC list for the bug.
You are the assignee for the bug.


[Bug 232472] ixgbe(4): SR-IOV passthru not working on Hyper-V 13-CURRENT guest with Intel X540 (0x152E)

2022-05-30 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=232472

Kubilay Kocak  changed:

   What|Removed |Added

 Attachment #219194||maintainer-approval?(freebs
  Flags||d...@intel.com)

-- 
You are receiving this mail because:
You are on the CC list for the bug.
You are the assignee for the bug.


[Bug 263568] ix(4): SR-IOV connection lost after loading VM with a passthrough device (Intel X520-DAA2)

2022-05-30 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=263568

Kubilay Kocak  changed:

   What|Removed |Added

 CC||e...@freebsd.org,
   ||kbowl...@freebsd.org,
   ||krzysztof.gala...@intel.com
  Flags||maintainer-feedback?(kbowli
   ||n...@freebsd.org),
   ||maintainer-feedback?(krzysz
   ||tof.gala...@intel.com),
   ||maintainer-feedback?(erj@fr
   ||eebsd.org)

--- Comment #4 from Kubilay Kocak  ---
^Triage: Request feedback from folks that play in the sys/dev/ixgbe area

-- 
You are receiving this mail because:
You are the assignee for the bug.
You are on the CC list for the bug.


[Bug 232472] ixgbe(4): SR-IOV passthru not working on Hyper-V 13-CURRENT guest with Intel X540 (0x152E)

2022-05-30 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=232472

Kubilay Kocak  changed:

   What|Removed |Added

  Flags||maintainer-feedback?(kbowli
   ||n...@freebsd.org),
   ||maintainer-feedback?(erj@fr
   ||eebsd.org),
   ||maintainer-feedback?(krzysz
   ||tof.gala...@intel.com)
 CC||e...@freebsd.org,
   ||kbowl...@freebsd.org,
   ||krzysztof.gala...@intel.com

--- Comment #7 from Kubilay Kocak  ---
^Triage: Request feedback from folks that play in the sys/dev/ixgbe area

-- 
You are receiving this mail because:
You are the assignee for the bug.
You are on the CC list for the bug.


  1   2   3   4   5   6   7   8   9   10   >