From nobody Fri Dec 20 20:28:42 2024 X-Original-To: bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4YFJsV5Q5yz5Z0b2 for ; Fri, 20 Dec 2024 20:28:46 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R10" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4YFJsT5grfz4Scq for ; Fri, 20 Dec 2024 20:28:45 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1734726525; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=vF8HSGY0dlTMvuiDpqHQrHvamajvXkAtYrvgG1hfTM8=; b=XgK7SLnSG/BgOoCqbGYhLS7SUEnSXXPMM3Kt0f2QsM8tVcO3k89GoK5r+usGLqoSMtJMKh VW4gGe1MlqZJ9zwnMW0YXYd602AzAMCa8PoqGonCQ97Zebe5WI+vLubI6tCWUK9NwCH8jF n0V7b32OM0TdiHowtQSSNCyRGzDMCd401aczLSKlnIN7jq47RI3Qn9tjRyPjxGg6W53TAO RFWIKsjiJDR0Oq0+afaA+tbcylc5k+4eBOebGXL4ADNfZl7NHsOm/yDqbby/Q61ggE041e RH7AzQfC6W7pSMf5xgNPP3YyxRf7t9DOVde5SAHp9zU4vil2WX9E1GKleuywzg== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1734726525; a=rsa-sha256; cv=none; b=Xbqcmb1aRmXlJ6i90bVCRUUY/svECv6V/KpaAifLCTcPjq1uL1JQVrQxVl/0KhMe+lnAkV kQrYM+g85C40WXikGkGYqk8JFodrEpLTMh83Nv160PaV7+5LEurozROv1IvPdlia2rrFh3 5HwopXKTFEiwy4fzu8tnSzB4EwFkzwr2bYjyXs5Qw6rICg24cx5WAuHHs6sQkznBO3mn65 LjVNB0/KMDgMreVYkm5F9ukj43wdgb59T+ntKpWhZrRE086ibTMrlPbM1+1856RCVGg2x+ AEgwhQF/VJHLaxD4xYCFnF2lfO2MdyPx+NmkOTT5zBD0+U7xjRk4KtO/BXkQnA== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4YFJsT4s2YztFV for ; Fri, 20 Dec 2024 20:28:45 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 4BKKSj7g033008 for ; Fri, 20 Dec 2024 20:28:45 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 4BKKSjJ4033007 for bugs@FreeBSD.org; Fri, 20 Dec 2024 20:28:45 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 165059] vtnet(4): Networking breaks with a router using virtio net driver on KVM host Date: Fri, 20 Dec 2024 20:28:42 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 9.0-RELEASE X-Bugzilla-Keywords: needs-qa X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: afedorov@FreeBSD.org X-Bugzilla-Status: Open X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: maintainer-feedback? X-Bugzilla-Changed-Fields: cc Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-bugs@FreeBSD.org MIME-Version: 1.0 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D165059 Aleksandr Fedorov changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |afedorov@FreeBSD.org --- Comment #37 from Aleksandr Fedorov --- This is simply because FreeBSD does not know how to forward and NAT packets with offload. KVM forwards packets to a virtual machine that can be up to 64 kilobytes in size and without checksums. This is optimization!!! Just read the virtio specification: struct virtio_net_hdr { #define VIRTIO_NET_HDR_F_NEEDS_CSUM 1 #define VIRTIO_NET_HDR_F_DATA_VALID 2 #define VIRTIO_NET_HDR_F_RSC_INFO 4 u8 flags; #define VIRTIO_NET_HDR_GSO_NONE 0 #define VIRTIO_NET_HDR_GSO_TCPV4 1 #define VIRTIO_NET_HDR_GSO_UDP 3 #define VIRTIO_NET_HDR_GSO_TCPV6 4 #define VIRTIO_NET_HDR_GSO_UDP_L4 5 #define VIRTIO_NET_HDR_GSO_ECN 0x80 u8 gso_type; le16 hdr_len; le16 gso_size; le16 csum_start; le16 csum_offset; le16 num_buffers; le32 hash_value; (Only if VIRTIO_NET_F_HASH_REPORT negotiated) le16 hash_report; (Only if VIRTIO_NET_F_HASH_REPORT negotiated) le16 padding_reserved; (Only if VIRTIO_NET_F_HASH_REPORT negotiated) }; https://docs.oasis-open.org/virtio/virtio/v1.2/csd01/virtio-v1.2-csd01.html= #x1-2170001 --=20 You are receiving this mail because: You are the assignee for the bug.=