From nobody Thu Dec 19 09:06:03 2024 X-Original-To: net@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4YDPmF6SBGz5gsNQ for ; Thu, 19 Dec 2024 09:06:05 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R10" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4YDPmF4JzCz45LW for ; Thu, 19 Dec 2024 09:06:05 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1734599165; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=Yw0cMv5HDwvZjk8BemwPTvi973glqftjXOB8pTOTmvk=; b=nQWT55EhXOxbyhwpzjyly9W2RkmCVjAyggmMBLjbdWcB6OV2fqxYyIunxq6dlLTN+C7ekE hZbVCOyc34dL8HsYhNVW1qqkjp2djVD+8cronJPsXDDAJ+YO6KzlMkuOM5c7qRUcF/WJ2X UTsslzc0O78WYLeNgkcEVE9qhbO61JKPL5+ySifTJNtwa/DvtwRxWzbcNriQHKV6BIbRsk igyTXxP7yhCVqCqCzYIKIXmIlqC9qkF7VmogucjnyFmj0y7wDwa0iWd6pPUObqRU3QQXjw osLRRGe2J/Vezo/wx01K3BfEeVKe0tkNH/NrmY3gtmxiPgIPYE+KFrFy/CDe/Q== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1734599165; a=rsa-sha256; cv=none; b=vP2ILYh6lYpy573bFna4UURJFOzroJ2A/4ML65AIfkNwpQUiFlVCT//JI9sIEIbnMLkH6u 5ZiAkr7mU7RcKAEJ7lph+fqUn+bum5rN7Nkzzhmgrz82mLPm3HPlMFBfj4pdP1nRsA7aaA lEnBIBmOoTYXrrC8cw2gjWnTUbYbNnwPSmi5hLg1o2IV0cQoRcQLQu3ZtsxMw7XnQ4xBWJ ts9/2sDVJSz9zkfG+7YOTK98k0Sg8JYk9ONde/bg4gxsvCjecRAJBx1SrX/2HfZ7BPmU8V ebE3KPqmW/kh1Fz4M+/z2V12+f3ck6M1Lunfhx9OrweSIPx3IKyYarrmUCfb+A== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4YDPmF3wzxzn9c for ; Thu, 19 Dec 2024 09:06:05 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 4BJ965PW072958 for ; Thu, 19 Dec 2024 09:06:05 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 4BJ965bo072957 for net@FreeBSD.org; Thu, 19 Dec 2024 09:06:05 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 165059] vtnet(4): Networking breaks with a router using virtio net driver on KVM host Date: Thu, 19 Dec 2024 09:06:03 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 9.0-RELEASE X-Bugzilla-Keywords: needs-qa X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: thj@FreeBSD.org X-Bugzilla-Status: Open X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: maintainer-feedback? X-Bugzilla-Changed-Fields: cc Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Networking and TCP/IP with FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-net List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-net@FreeBSD.org MIME-Version: 1.0 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D165059 Tom Jones changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |thj@FreeBSD.org --- Comment #34 from Tom Jones --- Hi, This was highlighted to me as a long standing issue that the foundation mig= ht look at. There is a decade of discussion here and it isn't super clear if t= here are several symptoms that are addressed by disabling checksum offload or if there are multiple issues. I think there are two different cases (if I were writing tests, which I will try to). FreeBSD as a router on Linux KVM incorrectly skips checksum calculations breaking forwarding. FreeBSD as a router with checksum offload disabled is unable to forward suitable traffic rates. can someone confirm by reading of the thread and suggest other failure case= s? My preference would be to write tests for issues we can identify, close this bug and track fixing the tests in their own bugs. 10 years of comments is h= ard to reason about :). Ideally someone(s) running FreeBSD on KVM would help me populate a wiki page with exemplar use cases, that would allow me to find someone to help write tests and put together a test environment. --=20 You are receiving this mail because: You are on the CC list for the bug.=