[Bug 189088] Assigning the same IP to multiple interfaces in different FIBs creates a host route for only one.

2020-07-10 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=189088 Mark Linimon changed: What|Removed |Added Status|In Progress |Open --- Comment #6 from Mark Linim

[Bug 206932] Realtek 8111 card stops responding under high load in netmap mode

2020-07-10 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=206932 Mark Linimon changed: What|Removed |Added Resolution|--- |Overcome By Events Stat

Re: Deadlocks when using pf tags or socket owner matching

2020-07-10 Thread Kristof Provost
On 8 Jul 2020, at 12:52, Kajetan Staszkiewicz wrote: I have forgot to mention my system: it's FreeBSD 11.3-RELEASE-p9 I have also managed to replicate this (or a similar) issue on a test system built with lock debugging and I got this: Jul 8 10:32:07 hwlb-aw-01 kernel: lock order reversal: Jul

[Bug 224218] Kernel panic in SCTP/IpV6 server mode

2020-07-10 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=224218 --- Comment #28 from Michael Tuexen --- (In reply to Mark Johnston from comment #27) OK, great. I think reducing the stack space worth the effort. It is not that hard, will improve also the handling of pathological parameter configurations.

[Bug 224218] Kernel panic in SCTP/IpV6 server mode

2020-07-10 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=224218 Mark Johnston changed: What|Removed |Added Resolution|Overcome By Events |--- Status|Closed

[Bug 224218] Kernel panic in SCTP/IpV6 server mode

2020-07-10 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=224218 --- Comment #26 from Michael Tuexen --- (In reply to Mark Johnston from comment #25) Increasing the stack size is a workaround. The plan was to rewrite the handling such that only one buffer is needed. That is why I left the bug open. Since

Re: making SCTP loadable and removing it from GENERIC

2020-07-10 Thread Mark Johnston
On Thu, Jul 09, 2020 at 11:13:00AM -0400, Mark Johnston wrote: > Hi, > > I spent some time working on making it possible to load the SCTP stack > as a kernel module, the same as we do today with IPSec. There is one > patch remaining to be committed before that can be done in head. One > caveat i

[Bug 224218] Kernel panic in SCTP/IpV6 server mode

2020-07-10 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=224218 Mark Johnston changed: What|Removed |Added CC||ma...@freebsd.org Resoluti

[Bug 238520] [sctp] Fatal trap 9: general protection fault while in kernel mode

2020-07-10 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=238520 Mark Johnston changed: What|Removed |Added CC||ma...@freebsd.org Resoluti

Re: poor performance with Intel X520 card

2020-07-10 Thread Olivier Cochard-Labbé
On Fri, Jul 10, 2020 at 8:45 AM Patrick Lamaiziere wrote: > Hello, > > That is mostly for the record but it looks like the intel X520 is not > very good and generates a high level of interrupts. > > On a router / firewall with 500 Kpps in input (dropped by pf) is enough to > put the CPUs at > 100

Re: poor performance with Intel X520 card

2020-07-10 Thread Cristian Cardoso
Hello This interface is 14.8 Mpps, but such capacity is only possible without a firewall performing filtering. The more firewall rules on your router, the less forwarding capacity the card will have, due to having to process the packet in CPU to match the rules and then forward the packet. In the

Re: making SCTP loadable and removing it from GENERIC

2020-07-10 Thread Michael Tuexen
> On 10. Jul 2020, at 12:29, Doug Hardie wrote: > >> On 10 July 2020, at 02:39, Michael Tuexen wrote: >> >> Hi Eugene, >> >> you are completely right. However, it requires that the program needs to run >> with root privileges just to be able to communicate. >> In the context of userland stack,

Re: making SCTP loadable and removing it from GENERIC

2020-07-10 Thread Doug Hardie
> On 10 July 2020, at 02:39, Michael Tuexen wrote: > > Hi Eugene, > > you are completely right. However, it requires that the program needs to run > with root privileges just to be able to communicate. > In the context of userland stack, this is one of the most important issues. > In case of SCT

Re: making SCTP loadable and removing it from GENERIC

2020-07-10 Thread Michael Tuexen
> On 10. Jul 2020, at 02:06, Eugene Grosbein wrote: > > 10.07.2020 2:44, Doug Hardie wrote: > >>> On 9 July 2020, at 08:13, Mark Johnston wrote: >>> >>> Hi, >>> >>> I spent some time working on making it possible to load the SCTP stack >>> as a kernel module, the same as we do today with IPSe