[Bug 263445] [tcp] Fatal trap 12: page fault while in kernel mode // supervisor read data, page not present // 13.1-RC3

2022-06-07 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=263445

--- Comment #20 from commit-h...@freebsd.org ---
A commit in branch main references this bug:

URL:
https://cgit.FreeBSD.org/src/commit/?id=231e0dd5d1fb7778b1cb285e5ebee5502d5ad253

commit 231e0dd5d1fb7778b1cb285e5ebee5502d5ad253
Author: Richard Scheffenegger 
AuthorDate: 2022-06-07 16:16:54 +
Commit: Richard Scheffenegger 
CommitDate: 2022-06-07 16:18:42 +

tcp: skip sackhole checks on NULL

Inadvertedly introduced NULL pointer dereference during
sackhole sanity check in D35387.

Reviewed By:glebius
PR: 263445
MFC after:  1 week
Sponsored by:   NetApp, Inc.
Differential Revision: https://reviews.freebsd.org/D35423

 sys/netinet/tcp_sack.c | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

-- 
You are receiving this mail because:
You are the assignee for the bug.


[Bug 264193] pf: scrub max-mss rule stops working (but still counts) after 13.1-RELEASE upgrade

2022-06-07 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264193

--- Comment #10 from Kristof Provost  ---
(In reply to Gleb Smirnoff from comment #8)
It must have changed something to change the behaviour. We've fixed a number of
bugs in pf between 13.0 and 13.1, but I'm not sure which of this fixes is
responsible.

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug 263445] [tcp] Fatal trap 12: page fault while in kernel mode // supervisor read data, page not present // 13.1-RC3

2022-06-07 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=263445

--- Comment #19 from commit-h...@freebsd.org ---
A commit in branch main references this bug:

URL:
https://cgit.FreeBSD.org/src/commit/?id=91d6afe6e2a912fd5059fc11dbeffc85474897af

commit 91d6afe6e2a912fd5059fc11dbeffc85474897af
Author: Richard Scheffenegger 
AuthorDate: 2022-06-07 07:07:09 +
Commit: Richard Scheffenegger 
CommitDate: 2022-06-07 07:38:16 +

tcp: Sanity check of SACK holes on retransmissions

Adding a few KASSERT() to validate sanity of sack holes, and
bail out if sack hole is inconsistent to avoid panicing non-invariant
builds.

Reviewed By:hselasky, glebius
PR: 263445
MFC after:  1 week
Sponsored by:   NetApp, Inc.
Differential Revision:  https://reviews.freebsd.org/D35387

 sys/netinet/tcp_sack.c | 12 
 1 file changed, 12 insertions(+)

-- 
You are receiving this mail because:
You are the assignee for the bug.


[Bug 263445] [tcp] Fatal trap 12: page fault while in kernel mode // supervisor read data, page not present // 13.1-RC3

2022-06-07 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=263445

--- Comment #18 from Igor A. Valkov  ---
(In reply to Michael Tuexen from comment #16)
Ok. Now rebuilding kernel without options KERN_TLS.

In the previous configuration, uptime is:
10:11  up 7 days, 11 hrs, 2 users, load averages: 17,39 16,85 17,08
:-) crashes are very random.

-- 
You are receiving this mail because:
You are the assignee for the bug.


[Bug 263445] [tcp] Fatal trap 12: page fault while in kernel mode // supervisor read data, page not present // 13.1-RC3

2022-06-07 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=263445

Richard Scheffenegger  changed:

   What|Removed |Added

 Status|New |In Progress

--- Comment #17 from Richard Scheffenegger  ---
While we don't yet understand how the TCPCB ends up in the peculiar state it is
in when the panic happens, there appearts to be a symptomatic treatment by
ignoring invalid SACK scoreboard state which however is in the approximate
correct sequence space (thus no fully random memory contents).

See https://reviews.freebsd.org/D35387

-- 
You are receiving this mail because:
You are the assignee for the bug.


[Bug 264056] mlx4(4) Fix resource leak in mlx4_opreq_action()

2022-06-07 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264056

--- Comment #6 from commit-h...@freebsd.org ---
A commit in branch stable/12 references this bug:

URL:
https://cgit.FreeBSD.org/src/commit/?id=936bd793479e274155fa2c42e770d0e4e35943cc

commit 936bd793479e274155fa2c42e770d0e4e35943cc
Author: Hans Petter Selasky 
AuthorDate: 2022-05-19 08:10:48 +
Commit: Hans Petter Selasky 
CommitDate: 2022-06-07 06:46:14 +

mlx4: Fix a memory leak bug.

In function mlx4_opreq_action(), pointer "mailbox" is not released,
when mlx4_cmd_box() return and error, causing a memory leak bug.
Fix this issue by going to "out" label, mlx4_free_cmd_mailbox() can
free this pointer.

Linux commit:
febfd9d3c7f74063e8e630b15413ca91b567f963

PR: 264056
Sponsored by:   NVIDIA Networking

(cherry picked from commit 527762b2f776381569bd662ce236d2845234c0a7)

 sys/dev/mlx4/mlx4_core/mlx4_fw.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug 264056] mlx4(4) Fix resource leak in mlx4_opreq_action()

2022-06-07 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264056

--- Comment #5 from commit-h...@freebsd.org ---
A commit in branch stable/13 references this bug:

URL:
https://cgit.FreeBSD.org/src/commit/?id=267e6442d049939cd9c8ab5e3b0134deace39e66

commit 267e6442d049939cd9c8ab5e3b0134deace39e66
Author: Hans Petter Selasky 
AuthorDate: 2022-05-19 08:10:48 +
Commit: Hans Petter Selasky 
CommitDate: 2022-06-07 06:44:28 +

mlx4: Fix a memory leak bug.

In function mlx4_opreq_action(), pointer "mailbox" is not released,
when mlx4_cmd_box() return and error, causing a memory leak bug.
Fix this issue by going to "out" label, mlx4_free_cmd_mailbox() can
free this pointer.

Linux commit:
febfd9d3c7f74063e8e630b15413ca91b567f963

PR: 264056
Sponsored by:   NVIDIA Networking

(cherry picked from commit 527762b2f776381569bd662ce236d2845234c0a7)

 sys/dev/mlx4/mlx4_core/mlx4_fw.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

-- 
You are receiving this mail because:
You are on the CC list for the bug.