From owner-freebsd-bugs@freebsd.org Fri Apr 24 22:06:37 2020 Return-Path: Delivered-To: freebsd-bugs@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 05FD52C46F7 for ; Fri, 24 Apr 2020 22:06:37 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 4987YS6QxZz4DCM for ; Fri, 24 Apr 2020 22:06:36 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id DAC3E2C46F6; Fri, 24 Apr 2020 22:06:36 +0000 (UTC) Delivered-To: bugs@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id DA8AC2C46F5 for ; Fri, 24 Apr 2020 22:06:36 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4987YS5YS4z4DCL for ; Fri, 24 Apr 2020 22:06:36 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 9B8D025016 for ; Fri, 24 Apr 2020 22:06:36 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 03OM6afX073459 for ; Fri, 24 Apr 2020 22:06:36 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 03OM6aCE073458 for bugs@FreeBSD.org; Fri, 24 Apr 2020 22:06:36 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 245894] ixl(4) does not support more than 255 VLANs Date: Fri, 24 Apr 2020 22:06:36 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 12.1-STABLE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: ncrogers@gmail.com X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 24 Apr 2020 22:06:37 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D245894 Bug ID: 245894 Summary: ixl(4) does not support more than 255 VLANs Product: Base System Version: 12.1-STABLE Hardware: amd64 OS: Any Status: New Severity: Affects Some People Priority: --- Component: kern Assignee: bugs@FreeBSD.org Reporter: ncrogers@gmail.com When configuring 256 or more VLAN interfaces on an ixl(4) interface, the adapter drops frames for the 256th and later configured VIDs. Enabling promiscuous mode fixes the problem. Example dmesg output when this happens: ixl1: i40e_aq_add_macvlan status I40E_ERR_ADMIN_QUEUE_ERROR, error I40E_AQ_RC_ENOSPC pciconf -lcv ixl0 ixl0@pci0:183:0:0: class=3D0x020000 card=3D0x37d215d9 chip=3D0x37d2808= 6 rev=3D0x04 hdr=3D0x00 vendor =3D 'Intel Corporation' device =3D 'Ethernet Connection X722 for 10GBASE-T' class =3D network subclass =3D ethernet cap 01[40] =3D powerspec 3 supports D0 D3 current D0 cap 05[50] =3D MSI supports 1 message, 64 bit, vector masks=20 cap 11[70] =3D MSI-X supports 129 messages, enabled Table in map 0x1c[0x0], PBA in map 0x1c[0x1000] cap 10[a0] =3D PCI-Express 2 endpoint max data 256(512) FLR RO link x1(x1) speed 2.5(2.5) ASPM disabled(L0s/L1) cap 03[e0] =3D VPD ecap 0001[100] =3D AER 2 0 fatal 0 non-fatal 1 corrected ecap 0003[140] =3D Serial 1 188779ffff6b1fac ecap 000e[150] =3D ARI 1 ecap 0010[160] =3D SR-IOV 1 IOV disabled, Memory Space disabled, ARI di= sabled 0 VFs configured out of 32 supported First VF RID Offset 0x0110, VF RID Stride 0x0001 VF Device ID 0x37cd Page Sizes: 4096 (enabled), 8192, 65536, 262144, 10485= 76, 4194304 ecap 0017[1a0] =3D TPH Requester 1 ecap 000d[1b0] =3D ACS 1 This appears to be a firmware problem, but I am not quite sure. The Linux driver seems to automatically disable promisc mode when the firmware returns I40E_AQ_RC_ENOSPC after adding a MAC/VLAN filter. I tried toggling vlanhwfilter and/or vlanhwtag to no avail. Enabling promisc mode fixes the problem. It would be nice if the driver did this automatically, or I would like to at least understand why the firmware does not support this. Is there a way to disable the MAC/VLAN filtering in the adapter and just rely on the OS? Thanks for any assistance. --=20 You are receiving this mail because: You are the assignee for the bug.=