From owner-freebsd-bugs@freebsd.org Mon Apr 26 19:48:25 2021 Return-Path: Delivered-To: freebsd-bugs@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id BD3425EDDF6 for ; Mon, 26 Apr 2021 19:48:25 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 4FTb6d4r4Mz4VmX for ; Mon, 26 Apr 2021 19:48:25 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id A44885EDDF4; Mon, 26 Apr 2021 19:48:25 +0000 (UTC) Delivered-To: bugs@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id A40A55EE22B for ; Mon, 26 Apr 2021 19:48:25 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4FTb6d48lFz4VkL for ; Mon, 26 Apr 2021 19:48:25 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 81DAE52EE for ; Mon, 26 Apr 2021 19:48:25 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 13QJmPvm013130 for ; Mon, 26 Apr 2021 19:48:25 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 13QJmPap013129 for bugs@FreeBSD.org; Mon, 26 Apr 2021 19:48:25 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 255432] pf fragment reassembly leads to invalid IP checksum since 13.0-RELEASE Date: Mon, 26 Apr 2021 19:48:25 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 13.0-RELEASE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: topical@gmx.net X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 26 Apr 2021 19:48:25 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D255432 Bug ID: 255432 Summary: pf fragment reassembly leads to invalid IP checksum since 13.0-RELEASE Product: Base System Version: 13.0-RELEASE Hardware: amd64 OS: Any Status: New Severity: Affects Some People Priority: --- Component: kern Assignee: bugs@FreeBSD.org Reporter: topical@gmx.net Scenario: I have 2 lagg interfaces: one with mtu 1500 another with mtu 9000. Both have several VLANs. Fragmented UDP packets are received by VLAN of first interface, reassembled= by pf ("scrub in all fragment reassemble"), and then sent out as jumbo frame by VLAN of second interface. All networks cards are mellanox ("mce"). All H/W offload features but LRO a= re enabled. Before 13.0 everything worked fine. Since 13.0, the resulting jumbo frame is sent out with invalid IP checksum and thus discarded by receiver. Disabling TXCSUM on outgoing VLAN interface doesn't change anything. I tried to disable VLAN_HWCSUM on outgoing LAGG interface, but this seems t= o be impossible without reboot - ifconfig still shows this feature as enabled. As this is a production system, rebooting for further tests is not an option.= =20 But: if I decrease mtu of outgoing VLAN interface to 1500, the packet gets fragmented again and IP checksums are correct.=20 I know that there are (cheap) network cards with broken/limited H/W offload support and thus you should disable all these features. But AFAIK mellanox cards are not affected by this and actually they worked until 13.0 --=20 You are receiving this mail because: You are the assignee for the bug.=