From d44a8a0fa0487804a3716c01fc34920c834e2e1d Mon Sep 17 00:00:00 2001 From: bmah Date: Sat, 10 Jan 2004 19:17:21 +0000 Subject: New errata: Mention APIC problems and workarounds, NFSv4 client bug, new TCP MSS size/rate limiting feature. Fix a typo. [1] Submitted by: Aniruddha Bohra [1] --- release/doc/en_US.ISO8859-1/errata/article.sgml | 38 +++++++++++++++++++++++-- 1 file changed, 36 insertions(+), 2 deletions(-) diff --git a/release/doc/en_US.ISO8859-1/errata/article.sgml b/release/doc/en_US.ISO8859-1/errata/article.sgml index 421de7d..26bde04 100644 --- a/release/doc/en_US.ISO8859-1/errata/article.sgml +++ b/release/doc/en_US.ISO8859-1/errata/article.sgml @@ -162,7 +162,7 @@ (9 Jan 2004) In some cases, ATA devices may behave erratically, particularly SATA devices. Reported symptoms - include command timouts or missing interrupts. These problems + include command timeouts or missing interrupts. These problems appear to be timing-dependent, making them rather difficult to isolate. Workarounds include: @@ -197,6 +197,21 @@ channels with dynamic mixing in software) in the &man.pcm.4; driver has been known to cause some instability. + (10 Jan 2004) Although APIC interrupt routing seems to work + correctly on many systems, on some others (such as some laptops) + it can cause various errors, such as &man.ata.4; errors or hangs + when starting or exiting X11. For these situations, it may be + advisable to disable APIC routing, using the safe + mode of the bootloader or the + hint.apic.0.disabled loader tunable. Note + that disabling APIC is not compatible with SMP systems. + + (10 Jan 2004) The NFSv4 client may panic when attempting an + NFSv4 operation against an NFSv3/NFSv2-only server. This + problem has been fixed with revision 1.4 of + src/sys/rpc/rpcclnt.c in &os; + &release.current;. + ]]> @@ -209,7 +224,26 @@ ]]> No news. + + (10 Jan 2004) The TCP implementation in &os; now includes + protection against a certain class of TCP MSS resource + exhaustion attacks, in the form of limits on the size and rate + of TCP segments. The first limit sets the minimum allowed + maximum TCP segment size, and is controlled by the + net.inet.tcp.minmss sysctl variable (the + default value is 216 bytes). The second + limit is set by the + net.inet.tcp.minmssoverload variable, and + controls the maximum rate of connections whose average segment + size is less than net.inet.tcp.minmss. + Connections exceeding this packet rate are reset and dropped. + Because this feature was added late in the &release.prev; + release cycle, connection rate limiting is disabled by default, + but can be enabled manually by assigning a non-zero value to + net.inet.tcp.minmssoverload (the default + value in &release.current; at the time of this writing is + 1000 packets per second). + ]]> -- cgit v1.1