https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268400
Mark Johnston changed:
What|Removed |Added
Status|Open|In Progress
Assignee|b..
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268400
Mark Johnston changed:
What|Removed |Added
Attachment #240668|0 |1
is obsolete|
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268400
--- Comment #21 from Daniel Ponte ---
(In reply to Mark Johnston from comment #20)
Yes, the patch has been stable for some time now.
--
You are receiving this mail because:
You are the assignee for the bug.
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268400
--- Comment #20 from Mark Johnston ---
(In reply to Daniel Ponte from comment #19)
Sorry for the delay. To be clear, the patch now appears to be holding up? I
am working on a proper patch now, for inclusion into 14.0.
--
You are receivi
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268400
--- Comment #19 from Daniel Ponte ---
I disabled all hardware offloads on the 67 machine as well (70 always had them
disabled) and now I am seeing correct checksums everywhere. I will continue to
monitor the situation with this patch and KT
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268400
--- Comment #18 from Daniel Ponte ---
Note that the tcpdump was being run on the 67 host, so NIC checksum offload
would not apply to the incorrect received checksum (but certainly may to the
incorrect sent one).
--
You are receiving this
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268400
--- Comment #17 from Daniel Ponte ---
I know, which is why I am somewhat stumped, here.
15:49:07.223007 IP (tos 0x0, ttl 54, id 0, offset 0, flags [DF], proto TCP (6),
length 40)
71.xxx.xxx.xxx.443 > 67.yyy.yyy.yyy.13889: Flags [R], ck
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268400
--- Comment #16 from Mark Johnston ---
(In reply to Daniel Ponte from comment #14)
The patch should not have any effect on IPv4 packets.
--
You are receiving this mail because:
You are the assignee for the bug.
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268400
--- Comment #15 from Daniel Ponte ---
Rolling back this patch appears to resolve the incorrect checksum issues.
--
You are receiving this mail because:
You are the assignee for the bug.
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268400
--- Comment #14 from Daniel Ponte ---
It looks like hosts are receiving incorrect TCP checksums, both over IPv4 and
IPv6.
--
You are receiving this mail because:
You are the assignee for the bug.
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268400
--- Comment #13 from Daniel Ponte ---
Actually, I slightly recant that statement. Doing more testing:
* KTLS and IPv4 works fine
* KTLS and IPv6 works fine unless the response is large.
So, maybe this is related to this patch.
--
You ar
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268400
--- Comment #12 from Daniel Ponte ---
Yes and no. I have had no further crashes from this issue with the patch
applied. However, it appears that KTLS is now totally broken for me (clients
never receive the response from nginx). I don't thin
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268400
Mark Johnston changed:
What|Removed |Added
Blocks||271607
Referenced Bugs:
https://
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268400
--- Comment #11 from Mark Johnston ---
(In reply to Daniel Ponte from comment #10)
Have you had success with the patch applied?
--
You are receiving this mail because:
You are the assignee for the bug.
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268400
--- Comment #10 from Daniel Ponte ---
(In reply to Mark Johnston from comment #9)
Thank you. I have applied and am building now.
--
You are receiving this mail because:
You are the assignee for the bug.
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268400
--- Comment #9 from Mark Johnston ---
Created attachment 240668
--> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=240668&action=edit
workaround
(In reply to Daniel Ponte from comment #8)
That's right. That would take a bit of time
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268400
--- Comment #8 from Daniel Ponte ---
Would this basically involve porting dfd5240189ca0 to netinet6, or am I missing
the big picture?
--
You are receiving this mail because:
You are the assignee for the bug.
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268400
--- Comment #7 from Mark Johnston ---
(In reply to Kristof Provost from comment #6)
I think you're right. I thought there was a reason for not converting the
in6_cksum() routines to use m_apply(), but I can't find it.
--
You are receivin
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268400
Kristof Provost changed:
What|Removed |Added
CC||ma...@freebsd.org
--- Comment #6
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268400
--- Comment #5 from Daniel Ponte ---
Yes, the entire issue is the complexity of the setup, which is a production
setup, and is bringing out a corner case. I do not need to use kTLS but I
figured the project would be interested in fixing thi
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268400
Zhenlei Huang changed:
What|Removed |Added
CC||k...@freebsd.org
--- Comment #4 fr
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268400
--- Comment #3 from Daniel Ponte ---
My interface configuration and pf policy are rather large and complex and it
would take some time to sanitize them. Could I send directly to someone?
That said, I can confirm this is still happening in
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268400
--- Comment #2 from Zhenlei Huang ---
Can you please share you network interfaces and firewall configuration
`pf.conf` ?
--
You are receiving this mail because:
You are the assignee for the bug.
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268400
Graham Perrin changed:
What|Removed |Added
Status|New |Open
CC|
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268400
--- Comment #1 from Daniel Ponte ---
Created attachment 238823
--> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=238823&action=edit
backtrace
Attaching raw backtrace
--
You are receiving this mail because:
You are the assignee fo
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268400
Bug ID: 268400
Summary: Page fault kernel panic with KTLS enabled
Product: Base System
Version: 13.1-STABLE
Hardware: amd64
OS: Any
Status: New
Seve
26 matches
Mail list logo