From owner-freebsd-net@freebsd.org Sun Jul 5 09:03:35 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id C0B2E36660F for ; Sun, 5 Jul 2020 09:03:35 +0000 (UTC) (envelope-from stb@lassitu.de) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 4B02ml3Ttjz3Ry7 for ; Sun, 5 Jul 2020 09:03:35 +0000 (UTC) (envelope-from stb@lassitu.de) Received: by mailman.nyi.freebsd.org (Postfix) id 779F23665D8; Sun, 5 Jul 2020 09:03:35 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 776273660EA for ; Sun, 5 Jul 2020 09:03:35 +0000 (UTC) (envelope-from stb@lassitu.de) Received: from gilb.zs64.net (gilb.zs64.net [212.12.50.234]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "gilb.zs64.net", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B02mk3Mh5z3S5y for ; Sun, 5 Jul 2020 09:03:34 +0000 (UTC) (envelope-from stb@lassitu.de) Received: by gilb.zs64.net (Postfix, from stb@lassitu.de) id DF0D33161A7; Sun, 5 Jul 2020 09:03:25 +0000 (UTC) From: Stefan Bethke Message-Id: <67049C6D-5821-4C9A-921A-79745B90D8B0@lassitu.de> Content-Type: multipart/signed; boundary="Apple-Mail=_0B85E66A-2111-4A60-97FE-646B7D1890A6"; protocol="application/pgp-signature"; micalg=pgp-sha512 Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.80.23.2.2\)) Subject: Re: Bridge interface on VLAN not working Date: Sun, 5 Jul 2020 11:03:22 +0200 In-Reply-To: <0C059F66-B37D-4F9C-9B04-E7D8E2F5EDE3@develooper.com> Cc: "net@freebsd.org" To: =?utf-8?Q?Ask_Bj=C3=B8rn_Hansen?= References: <0C059F66-B37D-4F9C-9B04-E7D8E2F5EDE3@develooper.com> X-Mailer: Apple Mail (2.3608.80.23.2.2) X-Rspamd-Queue-Id: 4B02mk3Mh5z3S5y X-Spamd-Bar: ---- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of stb@lassitu.de designates 212.12.50.234 as permitted sender) smtp.mailfrom=stb@lassitu.de X-Spamd-Result: default: False [-4.73 / 15.00]; TO_DN_EQ_ADDR_SOME(0.00)[]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-0.98)[-0.980]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; MV_CASE(0.50)[]; R_SPF_ALLOW(-0.20)[+mx]; MIME_GOOD(-0.20)[multipart/signed,multipart/alternative,text/plain]; HAS_ATTACHMENT(0.00)[]; DMARC_NA(0.00)[lassitu.de]; NEURAL_HAM_LONG(-1.02)[-1.022]; TO_MATCH_ENVRCPT_SOME(0.00)[]; NEURAL_HAM_SHORT(-0.83)[-0.829]; RCPT_COUNT_TWO(0.00)[2]; SIGNED_PGP(-2.00)[]; RCVD_COUNT_ZERO(0.00)[0]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:+,3:~,4:~]; ASN(0.00)[asn:13135, ipnet:212.12.48.0/21, country:DE]; MID_RHS_MATCH_FROM(0.00)[] X-Content-Filtered-By: Mailman/MimeDel 2.1.33 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 05 Jul 2020 09:03:35 -0000 --Apple-Mail=_0B85E66A-2111-4A60-97FE-646B7D1890A6 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=utf-8 Am 04.07.2020 um 20:59 schrieb Ask Bj=C3=B8rn Hansen = : >=20 > Hi everyone, >=20 > I had this working for months until a reboot either got things started = up in a different order or cleared what I setup by hand (it=E2=80=99s a = snowflake test/development system at home) and did whatever I=E2=80=99d = actually configured. >=20 > I have a single trunk=E2=80=99ed (em) interface to the switch. The = main network is untagged, and I have various tagged networks as well. I = was using the tagged networks in bhyve virtual machines. >=20 > (Some?) traffic doesn=E2=80=99t pass from the bridged tap interfaces = (or from the bridge itself) to the vlan interface (em0.8 for example). = tcpdump shows lots of packets coming from the =E2=80=9Coutside=E2=80=9D = and in, but for example if I do a ping from one of the tap interfaces = then nothing shows up on the bridge interface (looking with tcpdump). >=20 > Another symptom is that if I move the =E2=80=9Chost IP=E2=80=9D from = the em0.8 interface to the bridge interface that=E2=80=99s including = em0.8 then I can no longer communicate with that IP from the rest of the = network. >=20 > In the output below I can ping 192.168.53.42 from another system on = VLAN 53 (outside this box) and I can ping 192.168.53.42 from another = system on the bridge, but I can=E2=80=99t ping between the system = outside this box and the VM on the bridge. >=20 > I=E2=80=99ve disabled pf everywhere. >=20 > As I mentioned, some traffic crosses but it seems like arp requests = gets blocked somewhere? >=20 > I don=E2=80=99t think it=E2=80=99s the switch, because as long as I = don=E2=80=99t use the bridge everything works fine. :-/ >=20 > Any suggestions? (or other debug output that=E2=80=99d be useful). Which kernel version are you running? I have a similar setup, but all my VLANs are tagged. I have an OpenVPN = connection with a bridge, and originally was bridging the untagged = interface over that. Since the untagged interface includes all the .1q = frames as well, and I didn't want that traffic on the VPN connection, I = changed my config to tagged only, and moved to bridging only the VLAN = interfaces, but not the physical one. I've followed the advice in the = man page and have configured IPv4 and IPv6 only on the bridge interface, = not the member interfaces. I have two more systems that also use a VLAN/bridge setup. I'm using PF, but I have restricted it (from the defaults) to only work = on the IP layer and on the configured interface, not the bridge members = and not on bridged packets. In my setup, the bridge conceptually should = behave like an external switch. I'm running 12.1-STABLE amd64 GENERIC 1201518, and I have these = interfaces (one example VLAN, I have 4 in total): ix0: flags=3D8943 metric = 0 mtu 1500 = options=3De53fbb ether d0:50:99:d8:da:83 media: Ethernet autoselect (1000baseT ) status: active nd6 options=3D29 vlan100: flags=3D8943 = metric 0 mtu 1500 options=3D200401 ether d0:50:99:d8:da:83 groups: vlan vlan: 100 vlanpcp: 0 parent interface: ix0 media: Ethernet autoselect (1000baseT ) status: active nd6 options=3D49 br100: flags=3D8843 metric 0 mtu = 1500 description: vm-br100 ether 02:00:00:00:00:64 inet 44.128.XXXX netmask 0xffffff00 broadcast 44.128.XXXX inet 44.128.XXXX netmask 0xffffffff broadcast 44.128.XXXX inet 44.128.XXXX netmask 0xffffffff broadcast 44.128.XXXX inet6 fe80::ff:fe00:64%br100 prefixlen 64 scopeid 0x10 inet6 2a02:8108:XXXX:0:ff:fe00:64 prefixlen 64 inet6 2a02:8108:XXXX::2 prefixlen 128 id 00:00:00:00:00:00 priority 32768 hellotime 2 fwddelay 15 maxage 20 holdcnt 6 proto rstp maxaddr 2000 timeout 1200 root id 00:00:00:00:00:00 priority 32768 ifcost 0 port 0 member: jous flags=3D143 ifmaxaddr 0 port 30 priority 128 path cost 2000 member: jouk flags=3D143 ifmaxaddr 0 port 29 priority 128 path cost 2000 member: tap2 flags=3D143 ifmaxaddr 0 port 9 priority 128 path cost 2000000 member: vlan100 flags=3D143 ifmaxaddr 0 port 12 priority 128 path cost 2000 groups: bridge vm-switch viid-b8446@ nd6 options=3D61 -- Stefan Bethke Fon +49 151 14070811 --Apple-Mail=_0B85E66A-2111-4A60-97FE-646B7D1890A6 Content-Transfer-Encoding: 7bit Content-Disposition: attachment; filename=signature.asc Content-Type: application/pgp-signature; name=signature.asc Content-Description: Message signed with OpenPGP -----BEGIN PGP SIGNATURE----- iQEzBAEBCgAdFiEEJ+hF98o4r3eU/HiPD885WK4W4sEFAl8Bl1oACgkQD885WK4W 4sFGFAgAqiOKctcnLx9b/zz3TRFfNY/Q3yvCg9NJg7ZB6JNoKxiajrhc1uv+s0ut l8eUdZFZ64JVM95a/R+guMesa0ZIPQ5SlpTo9xuT/CG8eBmgQiu6r4SBiQP8qI0c SBVoLsFjKJ96srMe2Dt4zJgWgXpiB85s3w0vK4U18mmr62HJpx3tS+HeBzDiHkdO vaqbeEV38AC6siZTisTC69CKo1IHOvuDmR58EDdb5vIuZ2A2JkrpqsuncdS1Fjao JbUVR1wcLOnDUb5H9V/HSYbVNhokHKlWfTO0bKDEWRY+uFy4FXi2FoQZPmkix1G+ +Sa9eMNTqaEnlm4F6TKLVCmJPjPhLw== =3/OZ -----END PGP SIGNATURE----- --Apple-Mail=_0B85E66A-2111-4A60-97FE-646B7D1890A6-- From owner-freebsd-net@freebsd.org Sun Jul 5 17:26:07 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 03A263487D1; Sun, 5 Jul 2020 17:26:07 +0000 (UTC) (envelope-from adrian.chadd@gmail.com) Received: from mail-qt1-f196.google.com (mail-qt1-f196.google.com [209.85.160.196]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B0FwZ1dn8z4C0f; Sun, 5 Jul 2020 17:26:05 +0000 (UTC) (envelope-from adrian.chadd@gmail.com) Received: by mail-qt1-f196.google.com with SMTP id i3so27331832qtq.13; Sun, 05 Jul 2020 10:26:05 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=POo6XM2qW4x9EYSS0Mrj+0zv6zefPmSdaxwEeiJemco=; b=KuHGBVmalihrQzr8N4Pyqu3oNvPY6zLCQOGAM6feyySEL9t7IsL9e/1myu1pj2CxYj KvfDGEPzJz/vQefclYRyBNHiUMEAqNDgmF6+PhfB+izYj4/JTuXyvx4EuVOUAG1B0njt FQnfzh7M0Eu2ma5B7iQbN+eRixonMdtCObdt2iQ+aqnRklnD+dfb15jc+dibJUThOCS6 uqPecJrvDAi74PfVPdEgTWj/iRfL/BQ5l+8SqxSen2fvzlPDl5pLMgCU11KT8btUuGEQ qry9ZwhRfUC8j5vDb5M+9XfXj/fKntbjdLKaaJoGRMPwpD3Jp9EZ4HcyeoqCud1guQJL gWjA== X-Gm-Message-State: AOAM530xUQqPSyaRuE72TWk2WmXxusycUFZfhUHfi+/wScB3XiMfzhyO o3cdp8n51kKA/IH8nqQEi2CG+b6uL7cljM6I4+0HJw== X-Google-Smtp-Source: ABdhPJz1Luy63S5ZT5VsFymzMbRpl1KKZ+fSSTIQ8OWmlVfGX/7y5dPjv0LQWO1J2B+EIntn3QhkftR9fsAAeFbYmoE= X-Received: by 2002:ac8:514d:: with SMTP id h13mr46151268qtn.223.1593969965260; Sun, 05 Jul 2020 10:26:05 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: From: Adrian Chadd Date: Sun, 5 Jul 2020 10:25:52 -0700 Message-ID: Subject: Re: Reviewing two IPFW/netgraph/natd patches (RFC 6598/Carrier Grade NAT) To: Neel Chauhan Cc: "freebsd-hackers@freebsd.org" , FreeBSD Net X-Rspamd-Queue-Id: 4B0FwZ1dn8z4C0f X-Spamd-Bar: / Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of adrianchadd@gmail.com designates 209.85.160.196 as permitted sender) smtp.mailfrom=adrianchadd@gmail.com X-Spamd-Result: default: False [0.61 / 15.00]; FROM_NEQ_ENVFROM(0.00)[adrian@freebsd.org,adrianchadd@gmail.com]; TO_DN_EQ_ADDR_SOME(0.00)[]; RCVD_TLS_ALL(0.00)[]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:209.85.128.0/17]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; DMARC_NA(0.00)[freebsd.org]; ARC_NA(0.00)[]; RWL_MAILSPIKE_GOOD(0.00)[209.85.160.196:from]; URI_COUNT_ODD(1.00)[1]; NEURAL_HAM_LONG(-0.77)[-0.769]; TO_MATCH_ENVRCPT_SOME(0.00)[]; NEURAL_SPAM_SHORT(0.05)[0.053]; RCVD_IN_DNSWL_NONE(0.00)[209.85.160.196:from]; HTTP_TO_IP(1.00)[]; NEURAL_HAM_MEDIUM(-0.68)[-0.676]; FORGED_SENDER(0.30)[adrian@freebsd.org,adrianchadd@gmail.com]; R_DKIM_NA(0.00)[]; FREEMAIL_ENVFROM(0.00)[gmail.com]; RCVD_COUNT_TWO(0.00)[2]; MIME_TRACE(0.00)[0:+,1:+,2:~]; TAGGED_FROM(0.00)[]; ASN(0.00)[asn:15169, ipnet:209.85.128.0/17, country:US] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.33 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 05 Jul 2020 17:26:07 -0000 hi! On Fri, 3 Jul 2020 at 20:12, Neel Chauhan wrote: > Hi freebsd-hackers@, freebsd-net@, > > These two patches that will be described are a continuation of r357092. > > r357092 added support for RFC 6598/Carrier Grade NAT (subnet: > 100.64.0.0/10) in libalias and IPFW in-kernel NAT. > > These two patches add support for RFC 6598 to natd and ng_nat > respectively: > > * natd CGN patch: https://reviews.freebsd.org/D23356 > * ng_nat CGN patch: https://reviews.freebsd.org/D23461 > > Currently, CGN support is missing from natd and ng_nat. > > Could someone please review and/or commit these patches? > I'm happy to commit these if noone complains too much to me about it. I approved one of them. I'll go approve the other now. -adrian > > Best, > > Neel Chauhan > > === > > https://www.neelc.org/ > _______________________________________________ > freebsd-hackers@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-hackers > To unsubscribe, send any mail to "freebsd-hackers-unsubscribe@freebsd.org" > From owner-freebsd-net@freebsd.org Sun Jul 5 21:00:49 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 202B634D34E for ; Sun, 5 Jul 2020 21:00:49 +0000 (UTC) (envelope-from bugzilla-noreply@FreeBSD.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 4B0LhJ73cCz4NjJ for ; Sun, 5 Jul 2020 21:00:48 +0000 (UTC) (envelope-from bugzilla-noreply@FreeBSD.org) Received: by mailman.nyi.freebsd.org (Postfix) id F231834D177; Sun, 5 Jul 2020 21:00:48 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id F1DBF34D346 for ; Sun, 5 Jul 2020 21:00:48 +0000 (UTC) (envelope-from bugzilla-noreply@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B0LhJ5wrjz4NT3 for ; Sun, 5 Jul 2020 21:00:48 +0000 (UTC) (envelope-from bugzilla-noreply@FreeBSD.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id AE53513675 for ; Sun, 5 Jul 2020 21:00:48 +0000 (UTC) (envelope-from bugzilla-noreply@FreeBSD.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 065L0mPW088686 for ; Sun, 5 Jul 2020 21:00:48 GMT (envelope-from bugzilla-noreply@FreeBSD.org) Received: (from bugzilla@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 065L0mw8088684 for net@FreeBSD.org; Sun, 5 Jul 2020 21:00:48 GMT (envelope-from bugzilla-noreply@FreeBSD.org) Message-Id: <202007052100.065L0mw8088684@kenobi.freebsd.org> X-Authentication-Warning: kenobi.freebsd.org: bugzilla set sender to bugzilla-noreply@FreeBSD.org using -f From: bugzilla-noreply@FreeBSD.org To: net@FreeBSD.org Subject: Problem reports for net@FreeBSD.org that need special attention Date: Sun, 5 Jul 2020 21:00:48 +0000 MIME-Version: 1.0 Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.33 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 05 Jul 2020 21:00:49 -0000 To view an individual PR, use: https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=(Bug Id). The following is a listing of current problems submitted by FreeBSD users, which need special attention. These represent problem reports covering all versions including experimental development code and obsolete releases. Status | Bug Id | Description ------------+-----------+--------------------------------------------------- In Progress | 221146 | [ixgbe] Problem with second laggport In Progress | 235700 | oce(4) driver causes fatal trap 12 on boot with e New | 204438 | setsockopt() handling of kern.ipc.maxsockbuf limi New | 205592 | TCP processing in IPSec causes kernel panic New | 213410 | [carp] service netif restart causes hang only whe Open | 7556 | ppp: sl_compress_init() will fail if called anyth Open | 187835 | ngctl(8) strange behavior when adding more than 5 Open | 193452 | Dell PowerEdge 210 II -- Kernel panic bce (broadc Open | 194453 | dummynet(4): pipe config bw parameter limited to Open | 200319 | Bridge+CARP crashes/freezes Open | 202510 | [CARP] advertisements sourced from CARP IP cause Open | 207261 | netmap: Doesn't do TX sync with kqueue Open | 210726 | tcp connect() can return invalid EADDRINUSE (Eg: Open | 222273 | igb(4): Kernel panic (fatal trap 12) due to netwo Open | 225438 | panic in6_unlink_ifa() due to race Open | 227720 | Kernel panic in ppp server Open | 230807 | if_alc(4): Driver not working for Killer Networki Open | 235524 | igb(4): Ethernet interface loses active link stat Open | 236888 | ppp daemon: Allow MTU to be overridden for PPPoE Open | 236983 | bnxt(4) VLAN not operational unless explicit "ifc Open | 237072 | netgraph(4): performance issue [on HardenedBSD]? Open | 237840 | Removed dummynet dependency on ipfw Open | 238324 | Add XG-C100C/AQtion AQC107 10GbE NIC driver Open | 240530 | netgraph/ng_source: Allow ng_source to inject int Open | 240944 | em(4): Crash with Intel 82571EB NIC with AMD Pile Open | 240969 | netinet6: Neighbour reachability detection broken Open | 241106 | tun/ppp: panic: vm_fault: fault on nofault entry Open | 241162 | Panic in closefp() triggered by nginx (uwsgi with Open | 243463 | ix0: Watchdog timeout Open | 244066 | divert: Add sysctls for divert socket send and re Open | 244706 | panic: NULL dereference inside __mtx_lock_sleep() Open | 118111 | rc: network.subr Add MAC address based interface 32 problems total for which you should take action. From owner-freebsd-net@freebsd.org Mon Jul 6 02:18:24 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id AC4AC352D8A for ; Mon, 6 Jul 2020 02:18:24 +0000 (UTC) (envelope-from cynthiazheng@dpxlaser.com) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 4B0Tkm0ZBpz4bRT for ; Mon, 6 Jul 2020 02:18:24 +0000 (UTC) (envelope-from cynthiazheng@dpxlaser.com) Received: by mailman.nyi.freebsd.org (Postfix) id 138E63527DA; Mon, 6 Jul 2020 02:18:24 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 13577352C9E for ; Mon, 6 Jul 2020 02:18:24 +0000 (UTC) (envelope-from cynthiazheng@dpxlaser.com) Received: from smtpbguseast1.qq.com (smtpbguseast1.qq.com [54.204.34.129]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4B0Tkg2RsRz4bhJ for ; Mon, 6 Jul 2020 02:18:18 +0000 (UTC) (envelope-from cynthiazheng@dpxlaser.com) X-QQ-mid: bizesmtp25t1594001877tglz91go Received: from DESKTOP-5RA7FIE (unknown [222.93.243.254]) by esmtp10.qq.com (ESMTP) with SMTP id 0 for ; Mon, 06 Jul 2020 10:17:56 +0800 (CST) X-QQ-SSF: 0140000A000000K0Ix20B00A0000000 X-QQ-FEAT: 006+cXb/z3aoi7By7jj5sf/8467k8L+qh5IKSW9BQH3/UiyRsGP0pxxRZB3kx ILrZ2TdwhJYfm3diAaGwqLhquIbvFuDu+iPskbbmUJ4W8ptkWhlKAYkaWYYankSEHVrlKFT pFKdZtRC5tP3cWBBOTYrrGVGNRFx5QdABlympU5TkKeSy5mIcCft3mOE1m0Xb2noIZTMRxB aL8GIQZIxua8yvrYrcXVhvr2zdJMf+Q/wQeR6CrSNx6Dxj4VUL0Sgs3jGq1I7hAkoOV0Uug 5Hii5l7Hx1h3Qlrxh7kKXRYtTcYiuqUYuxO2vFOv5sKPx3lP+U/yeMV5xv9DUUleLwV6QaZ OVM4F3SFtCTFlUs+Qo= X-QQ-GoodBg: 2 Date: Mon, 6 Jul 2020 10:17:57 +0800 (CST) From: Cynthia Zheng Reply-To: cynthiazheng@dpxlaser.com To: net@freebsd.org Message-ID: <9045003.1898.1594001877403@smtp.exmail.qq.com>+F52823562CB4D993 Subject: Greeting from Horizon Laser Technology X-QQ-SENDSIZE: 520 Feedback-ID: bizesmtp:dpxlaser.com:qybgforeign:qybgforeign5 X-QQ-Bgrelay: 1 X-Rspamd-Queue-Id: 4B0Tkg2RsRz4bhJ X-Spamd-Bar: / Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of cynthiazheng@dpxlaser.com designates 54.204.34.129 as permitted sender) smtp.mailfrom=cynthiazheng@dpxlaser.com X-Spamd-Result: default: False [0.30 / 15.00]; HAS_REPLYTO(0.00)[cynthiazheng@dpxlaser.com]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-0.83)[-0.832]; FROM_HAS_DN(0.00)[]; RWL_MAILSPIKE_GOOD(0.00)[54.204.34.129:from]; TO_MATCH_ENVRCPT_ALL(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:54.204.34.129]; NEURAL_HAM_LONG(-0.92)[-0.924]; REPLYTO_ADDR_EQ_FROM(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[net@freebsd.org]; RCPT_COUNT_ONE(0.00)[1]; TO_DN_NONE(0.00)[]; NEURAL_HAM_SHORT(-0.14)[-0.141]; RCVD_IN_DNSWL_NONE(0.00)[54.204.34.129:from]; INVALID_MSGID(1.70)[]; MIME_HTML_ONLY(0.20)[]; RCVD_TLS_LAST(0.00)[]; DMARC_NA(0.00)[dpxlaser.com]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:~]; ASN(0.00)[asn:14618, ipnet:54.204.0.0/15, country:US]; RCVD_COUNT_TWO(0.00)[2]; MID_MISSING_BRACKETS(0.50)[]; RECEIVED_SPAMHAUS_PBL(0.00)[222.93.243.254:received] X-Spam: Yes MIME-Version: 1.0 Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.33 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 06 Jul 2020 02:18:24 -0000 From owner-freebsd-net@freebsd.org Mon Jul 6 11:05:46 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id CE3D6364086 for ; Mon, 6 Jul 2020 11:05:46 +0000 (UTC) (envelope-from zeising+freebsd@daemonic.se) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 4B0jRG4Lfsz3dLT for ; Mon, 6 Jul 2020 11:05:46 +0000 (UTC) (envelope-from zeising+freebsd@daemonic.se) Received: by mailman.nyi.freebsd.org (Postfix) id 93857363CF5; Mon, 6 Jul 2020 11:05:46 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 934FB364103 for ; Mon, 6 Jul 2020 11:05:46 +0000 (UTC) (envelope-from zeising+freebsd@daemonic.se) Received: from mail.daemonic.se (mail.daemonic.se [176.58.89.161]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4B0jRF0D1bz3dfF for ; Mon, 6 Jul 2020 11:05:44 +0000 (UTC) (envelope-from zeising+freebsd@daemonic.se) Received: from cid.daemonic.se (localhost [IPv6:::1]) by mail.daemonic.se (Postfix) with ESMTP id 4B0jR51MsSz3mQC for ; Mon, 6 Jul 2020 11:05:37 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=daemonic.se; h= content-transfer-encoding:content-language:content-type :content-type:mime-version:user-agent:date:date:message-id :subject:subject:from:from:received:received; s=20151023; t= 1594033536; bh=j+LrBvobKWKbALYhYpkkfrAiR1FQckJhqUX0zyoPBns=; b=g NWUaDemQaQzj4puodz7tpoBNpJ3/+ubofXU/AqmRavgYXE1vydRl5qFcXzgZreK1 Kgb36d4ZbCn7hr/xJ8VG5J2D5y8l6h4RGeqqCORj8RODGOBt4GhfWm3Ml8ohqZBq jAPqdhUv+Bj5J4A/vNFHk5gCcQwSxMPsuq2pN6CczQ= X-Virus-Scanned: amavisd-new at daemonic.se Received: from mail.daemonic.se ([127.0.0.1]) (using TLS with cipher ECDHE-RSA-AES128-GCM-SHA256) by cid.daemonic.se (mailscanner.daemonic.se [127.0.0.1]) (amavisd-new, port 10587) with ESMTPS id ITB4SdLb1alA for ; Mon, 6 Jul 2020 11:05:36 +0000 (UTC) Received: from garnet.daemonic.se (host-95-195-31-128.mobileonline.telia.com [95.195.31.128]) by mail.daemonic.se (Postfix) with ESMTPSA id 4B0jR40MXPz3mMv for ; Mon, 6 Jul 2020 11:05:35 +0000 (UTC) To: net@FreeBSD.org From: Niclas Zeising Subject: Specifying link-local address in rc.conf Message-ID: <713e1f3e-4dd9-8dcf-c6d2-15c684bdce5b@daemonic.se> Date: Mon, 6 Jul 2020 13:05:26 +0200 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:68.0) Gecko/20100101 Thunderbird/68.10.0 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: 4B0jRF0D1bz3dfF X-Spamd-Bar: ---- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=daemonic.se header.s=20151023 header.b=g NWUaDe; dmarc=pass (policy=none) header.from=daemonic.se; spf=pass (mx1.freebsd.org: domain of zeising@daemonic.se designates 176.58.89.161 as permitted sender) smtp.mailfrom=zeising@daemonic.se X-Spamd-Result: default: False [-4.03 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; ARC_NA(0.00)[]; R_DKIM_ALLOW(-0.20)[daemonic.se:s=20151023]; NEURAL_HAM_MEDIUM(-1.03)[-1.029]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; R_SPF_ALLOW(-0.20)[+mx]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[net@freebsd.org]; TO_DN_NONE(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-0.97)[-0.969]; RCVD_COUNT_THREE(0.00)[4]; DKIM_TRACE(0.00)[daemonic.se:+]; DMARC_POLICY_ALLOW(-0.50)[daemonic.se,none]; NEURAL_HAM_SHORT(-1.03)[-1.027]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; RCVD_TLS_LAST(0.00)[]; ASN(0.00)[asn:36236, ipnet:176.58.89.0/24, country:US]; TAGGED_FROM(0.00)[freebsd]; MID_RHS_MATCH_FROM(0.00)[]; RECEIVED_SPAMHAUS_PBL(0.00)[95.195.31.128:received] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 06 Jul 2020 11:05:46 -0000 Hi! Is it possible to specify a link-local address in rc.conf, and get only that link-local address? When I add a specific link-local address, such as fe80::1/64, to an interface from the command line, and then add a global uincast address, it works as expected, I do not get an additional link-local address. When I try to do the same in rc.conf however, it does not work. I have added the following: ifconfig_vtnet0_inet6="inet6 fe80::1/64" ifconfig_vtnet0_alias0="2001:6b8::1/64" to rc.conf, but when restarting, I get both fe80::1 and a EUI64-based link-local address assigned to the interface. It does not matter which order I specify the entries in rc.conf. I have tried changing the sysctl net.inet6.ip6.auto_linklocal to 0 in /etc/sysctl.conf, but that does not work (it seems it takes effect too late, the interface still has the AUTO_LINKLOCAL flag set according to ifconfig). I tried adding -auto_linklocal to the ifconfig_* lines in /etc/rc.conf, and while this removes the AUTO_LINKLOCAL flag from the interface, a EUI64 based link-local address is still assigned to the interface. While there might not be much of a problem having mulitple link-local addresses, this is surprising. Adding a specific link-local address to an interface, even from rc.conf, shouldn't mean that the EUI64-one is created. Perhaps something like ifconfig_IF_linklocal="" should be added, or this is a bug in rc.network. I tried looking through rc.network and related rc files, but I didn't find anything obvious, and I couldn't really figure out how addresses are added to interfaces during boot. This is causing issues when I want for instance rtadvd to use the fe80::1/64 address as source for router advertisements, since it picks the EUI64 link-local address as source (which means this also ends up in client routing tables as the default gateway). I can work around this problem by adding fe80::1/64 with prefer_source, but I would prefer if there only was one link-local address on an interface. All of this is on FreeBSD 12.1. Perhaps I'm just missing something, but this behavior feels a little surprising. I can share more detailed configuration, and perhaps the whole virtual machine I'm testing on, if needed. Regards -- Niclas From owner-freebsd-net@freebsd.org Mon Jul 6 14:01:04 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id E577D368B34 for ; Mon, 6 Jul 2020 14:01:04 +0000 (UTC) (envelope-from eugen@grosbein.net) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 4B0nKX3tnRz45ks for ; Mon, 6 Jul 2020 14:01:04 +0000 (UTC) (envelope-from eugen@grosbein.net) Received: by mailman.nyi.freebsd.org (Postfix) id 8568E368B33; Mon, 6 Jul 2020 14:01:04 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 85322368D00 for ; Mon, 6 Jul 2020 14:01:04 +0000 (UTC) (envelope-from eugen@grosbein.net) Received: from hz.grosbein.net (hz.grosbein.net [IPv6:2a01:4f8:c2c:26d8::2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hz.grosbein.net", Issuer "hz.grosbein.net" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B0nKW48rxz45nd for ; Mon, 6 Jul 2020 14:01:03 +0000 (UTC) (envelope-from eugen@grosbein.net) Received: from eg.sd.rdtc.ru (eg.sd.rdtc.ru [IPv6:2a03:3100:c:13:0:0:0:5]) by hz.grosbein.net (8.15.2/8.15.2) with ESMTPS id 066E0e64021331 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 6 Jul 2020 14:00:42 GMT (envelope-from eugen@grosbein.net) X-Envelope-From: eugen@grosbein.net X-Envelope-To: zeising+freebsd@daemonic.se Received: from [10.58.0.10] (dadv@dadvw [10.58.0.10]) by eg.sd.rdtc.ru (8.15.2/8.15.2) with ESMTPS id 066E0Y1D054260 (version=TLSv1.2 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Mon, 6 Jul 2020 21:00:34 +0700 (+07) (envelope-from eugen@grosbein.net) Subject: Re: Specifying link-local address in rc.conf To: Niclas Zeising , net@FreeBSD.org References: <713e1f3e-4dd9-8dcf-c6d2-15c684bdce5b@daemonic.se> From: Eugene Grosbein Message-ID: Date: Mon, 6 Jul 2020 21:00:33 +0700 User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.8.0 MIME-Version: 1.0 In-Reply-To: <713e1f3e-4dd9-8dcf-c6d2-15c684bdce5b@daemonic.se> Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=0.3 required=5.0 tests=BAYES_00,LOCAL_FROM, SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.2 X-Spam-Report: * -2.3 BAYES_00 BODY: Bayes spam probability is 0 to 1% * [score: 0.0000] * -0.0 SPF_PASS SPF: sender matches SPF record * 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record * 2.6 LOCAL_FROM From my domains X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on hz.grosbein.net X-Rspamd-Queue-Id: 4B0nKW48rxz45nd X-Spamd-Bar: - Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=permerror (mx1.freebsd.org: domain of eugen@grosbein.net uses mechanism not recognized by this client) smtp.mailfrom=eugen@grosbein.net X-Spamd-Result: default: False [-1.26 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-0.83)[-0.833]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; NEURAL_SPAM_SHORT(0.30)[0.304]; NEURAL_HAM_LONG(-0.63)[-0.630]; TAGGED_RCPT(0.00)[freebsd]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[grosbein.net]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_SOME(0.00)[]; R_SPF_PERMFAIL(0.00)[empty SPF record]; RCPT_COUNT_TWO(0.00)[2]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:24940, ipnet:2a01:4f8::/29, country:DE]; RCVD_TLS_ALL(0.00)[]; MID_RHS_MATCH_FROM(0.00)[] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 06 Jul 2020 14:01:05 -0000 06.07.2020 18:05, Niclas Zeising wrote: > Hi! > Is it possible to specify a link-local address in rc.conf, and get only that link-local address? > > When I add a specific link-local address, such as fe80::1/64, to an interface from the command line, > and then add a global uincast address, it works as expected, I do not get an additional link-local address. What is exact syntax what works for you manually? > When I try to do the same in rc.conf however, it does not work. > I have added the following: > ifconfig_vtnet0_inet6="inet6 fe80::1/64" > ifconfig_vtnet0_alias0="2001:6b8::1/64" You missed "inet6 " address family prefix for the last line. Does adding it help? From owner-freebsd-net@freebsd.org Mon Jul 6 14:25:45 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 418CE368EE8 for ; Mon, 6 Jul 2020 14:25:45 +0000 (UTC) (envelope-from zeising+freebsd@daemonic.se) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 4B0nt070cqz478g for ; Mon, 6 Jul 2020 14:25:44 +0000 (UTC) (envelope-from zeising+freebsd@daemonic.se) Received: by mailman.nyi.freebsd.org (Postfix) id F043F36931B; Mon, 6 Jul 2020 14:25:44 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id F0058368CED for ; Mon, 6 Jul 2020 14:25:44 +0000 (UTC) (envelope-from zeising+freebsd@daemonic.se) Received: from mail.daemonic.se (mail.daemonic.se [176.58.89.161]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4B0nsz4kYFz473y for ; Mon, 6 Jul 2020 14:25:43 +0000 (UTC) (envelope-from zeising+freebsd@daemonic.se) Received: from cid.daemonic.se (localhost [IPv6:::1]) by mail.daemonic.se (Postfix) with ESMTP id 4B0nsx4j6qz3mWK; Mon, 6 Jul 2020 14:25:41 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=daemonic.se; h= content-transfer-encoding:content-language:content-type :content-type:in-reply-to:mime-version:user-agent:date:date :message-id:from:from:references:subject:subject:received :received; s=20151023; t=1594045541; bh=kGBh9mdOkKD/1mlpGwrq714m qJiT5OUDd9vDev5UIV0=; b=Xfb7ze1FCHg0guaiIanIjKpH5Lx65XnEGUUiID9z UYmbY29SOPjtK7D0auqRpM6uN3/AbcvYii3hwZhgBTpIxCZjmntZekJHr8RiBam3 eESmBUGs+w382uWOite3KqPXMxIaeHx5tzzerkquTCPxy6hen36znVn40prbSzxI /C0= X-Virus-Scanned: amavisd-new at daemonic.se Received: from mail.daemonic.se ([IPv6:::1]) (using TLS with cipher ECDHE-RSA-AES128-GCM-SHA256) by cid.daemonic.se (mailscanner.daemonic.se [IPv6:::1]) (amavisd-new, port 10587) with ESMTPS id R0fIQIUtGn14; Mon, 6 Jul 2020 14:25:41 +0000 (UTC) Received: from garnet.daemonic.se (host-95-195-31-128.mobileonline.telia.com [95.195.31.128]) by mail.daemonic.se (Postfix) with ESMTPSA id 4B0nsx0D1pz3mWF; Mon, 6 Jul 2020 14:25:40 +0000 (UTC) Subject: Re: Specifying link-local address in rc.conf To: Eugene Grosbein , net@FreeBSD.org References: <713e1f3e-4dd9-8dcf-c6d2-15c684bdce5b@daemonic.se> From: Niclas Zeising Message-ID: Date: Mon, 6 Jul 2020 16:25:40 +0200 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:68.0) Gecko/20100101 Thunderbird/68.10.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=windows-1252; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: 4B0nsz4kYFz473y X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=daemonic.se header.s=20151023 header.b=Xfb7ze1F; dmarc=pass (policy=none) header.from=daemonic.se; spf=pass (mx1.freebsd.org: domain of zeising@daemonic.se designates 176.58.89.161 as permitted sender) smtp.mailfrom=zeising@daemonic.se X-Spamd-Result: default: False [-3.52 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; ARC_NA(0.00)[]; R_DKIM_ALLOW(-0.20)[daemonic.se:s=20151023]; NEURAL_HAM_MEDIUM(-1.01)[-1.015]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+mx]; NEURAL_HAM_LONG(-0.98)[-0.978]; MIME_GOOD(-0.10)[text/plain]; RCVD_COUNT_THREE(0.00)[4]; TO_MATCH_ENVRCPT_SOME(0.00)[]; DKIM_TRACE(0.00)[daemonic.se:+]; RCPT_COUNT_TWO(0.00)[2]; DMARC_POLICY_ALLOW(-0.50)[daemonic.se,none]; NEURAL_HAM_SHORT(-0.53)[-0.531]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; RCVD_TLS_LAST(0.00)[]; ASN(0.00)[asn:36236, ipnet:176.58.89.0/24, country:US]; TAGGED_FROM(0.00)[freebsd]; MID_RHS_MATCH_FROM(0.00)[]; RECEIVED_SPAMHAUS_PBL(0.00)[95.195.31.128:received] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 06 Jul 2020 14:25:45 -0000 On 2020-07-06 16:00, Eugene Grosbein wrote: > 06.07.2020 18:05, Niclas Zeising wrote: >> Hi! >> Is it possible to specify a link-local address in rc.conf, and get only that link-local address? >> >> When I add a specific link-local address, such as fe80::1/64, to an interface from the command line, >> and then add a global uincast address, it works as expected, I do not get an additional link-local address. > > What is exact syntax what works for you manually? ifconfig vtnet0 inet6 fe80::1/64 ifconfig vtnet0 inet6 2001:6b8::1/64 This does not create additional link-local addresses, just fe80::1. > >> When I try to do the same in rc.conf however, it does not work. >> I have added the following: >> ifconfig_vtnet0_inet6="inet6 fe80::1/64" >> ifconfig_vtnet0_alias0="2001:6b8::1/64" > > You missed "inet6 " address family prefix for the last line. Does adding it help? > No, that's just an error from transcribing the setup. With that in /etc/rc.conf I get three addresses on the interface; * fe80::1/64 * the EUI64 link-local address (fe80::/64) * 2001:6b8::1/64 Regards -- Niclas From owner-freebsd-net@freebsd.org Mon Jul 6 18:19:44 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id ACEBD36D8B9 for ; Mon, 6 Jul 2020 18:19:44 +0000 (UTC) (envelope-from zeising+freebsd@daemonic.se) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 4B0v403P7Lz4Mv1 for ; Mon, 6 Jul 2020 18:19:44 +0000 (UTC) (envelope-from zeising+freebsd@daemonic.se) Received: by mailman.nyi.freebsd.org (Postfix) id 7426636D657; Mon, 6 Jul 2020 18:19:44 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 73EA936D8B8 for ; Mon, 6 Jul 2020 18:19:44 +0000 (UTC) (envelope-from zeising+freebsd@daemonic.se) Received: from mail.daemonic.se (mail.daemonic.se [IPv6:2607:f740:d:20::25]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4B0v3z2JQLz4MqF for ; Mon, 6 Jul 2020 18:19:42 +0000 (UTC) (envelope-from zeising+freebsd@daemonic.se) Received: from cid.daemonic.se (localhost [IPv6:::1]) by mail.daemonic.se (Postfix) with ESMTP id 4B0v3q05Dbz3mWM for ; Mon, 6 Jul 2020 18:19:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=daemonic.se; h= content-transfer-encoding:content-language:content-type :content-type:mime-version:user-agent:date:date:message-id :subject:subject:from:from:received:received; s=20151023; t= 1594059574; bh=oiXeaPjmPBVYHo+K3Dr1m3BJlt+/0lVqGLWhUPcjEcs=; b=n hd8QWN7rNq29b2XmxOLktU5720poZXZNseRE0JpZLVXL4eqvBMMXnr+ySGxbdLt7 6gAl6tu4Miy1cKyH0X7fxLiVp5FOQMT6yqaIgAynN2DVxDXyJz4fEKijGHbEpdrF zixhDj8zExsC46imtmAtk04A1PCx0zHtJFCcdOK4HM= X-Virus-Scanned: amavisd-new at daemonic.se Received: from mail.daemonic.se ([127.0.0.1]) (using TLS with cipher ECDHE-RSA-AES128-GCM-SHA256) by cid.daemonic.se (mailscanner.daemonic.se [127.0.0.1]) (amavisd-new, port 10587) with ESMTPS id iwMNXEC_Sn1Z for ; Mon, 6 Jul 2020 18:19:34 +0000 (UTC) Received: from garnet.daemonic.se (unknown [IPv6:2001:470:dca9:201:e911:95b5:705c:34b7]) by mail.daemonic.se (Postfix) with ESMTPSA id 4B0v3p1Mpvz3mMv for ; Mon, 6 Jul 2020 18:19:34 +0000 (UTC) To: net@FreeBSD.org From: Niclas Zeising Subject: ndp and routers with link-local addresses Message-ID: Date: Mon, 6 Jul 2020 20:19:32 +0200 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:68.0) Gecko/20100101 Thunderbird/68.10.0 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: 4B0v3z2JQLz4MqF X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=daemonic.se header.s=20151023 header.b=n hd8QWN; dmarc=pass (policy=none) header.from=daemonic.se; spf=pass (mx1.freebsd.org: domain of zeising@daemonic.se designates 2607:f740:d:20::25 as permitted sender) smtp.mailfrom=zeising@daemonic.se X-Spamd-Result: default: False [-3.73 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; ARC_NA(0.00)[]; R_DKIM_ALLOW(-0.20)[daemonic.se:s=20151023]; NEURAL_HAM_MEDIUM(-1.01)[-1.014]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; R_SPF_ALLOW(-0.20)[+mx]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[net@freebsd.org]; TO_DN_NONE(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-1.02)[-1.021]; RCVD_COUNT_THREE(0.00)[4]; DKIM_TRACE(0.00)[daemonic.se:+]; DMARC_POLICY_ALLOW(-0.50)[daemonic.se,none]; NEURAL_HAM_SHORT(-0.70)[-0.696]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; RCVD_TLS_LAST(0.00)[]; ASN(0.00)[asn:36236, ipnet:2607:f740:d::/48, country:US]; TAGGED_FROM(0.00)[freebsd]; MID_RHS_MATCH_FROM(0.00)[] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 06 Jul 2020 18:19:44 -0000 Hi! It should be possible to have routing interfaces on client facing networks with only link-local addresses if you use SLAAC (or specify the default route manually). SLAAC by default uses the link-local address in advertisements, and clients on the network uses the router link-local address as default gateway. However, if the interface on the router facing the client network only has a link-local (and no global unicast) address, NDP neighbor discovery breaks. I have a couple of issues: First off, NDP from the router to the client breaks completely, unless the client starts the conversation. Then the router can use existing NDP table entries, as long as they are valid. Secondly, source address selection on the router side for NDP is strange. Instead of using the source address on the interface directly connected to the client, the router uses a global unicast address, if any is assigned to any interface. This confuses the client. All this is tested on FreeBSD 12.1 (both router and client). I also swapped out the router for a Linux install, using Debian 10.4.0. All the cases below works out of the box on Linux. quick setup using bhyve: router: two interfaces, connect one interface to a bridge on the host client: one interface, connected to the same bridge as the router on the router (vtnet1 is connected to the bridge above) # ifconfig vtnet1 inet6 fe80::1/64 # route -6 add -net 2001:6b8::/64 -iface vtnet1 # sysctl net.inet6.icmp6.nd6_onlink_ns_rfc4861=1 # sysctl net.inet6.ip6.forwarding=1 net.inet6.icmp6.nd6_onlink_ns_rfc4861=1 is needed, otherwise NDP won't work at all. you can then add any address to vtnet1 to test the source address selection, as long as it's not in 2001:6b8::/64 (for instance, use 2001:6b8:1::1/64) on the client (vtnet0 is connected to the bridge above) # ifconfig vtnet0 inet6 2001:6b8::2/64 # route -6 add default fe80::1%vtnet0 dump the traffic on the bridge between the machines On the router, try to ping the client (2001:6b8::2) and see what happens. This does not work. On the client, ping any ipv6 address not in 2001:6b8::/64, and watch NDP. (we don't care about the icmp echo requests, the ping is just to do the NDP stuff). NDP works, using link-local address on the router. Now on the router, ping the client again. This works if the entry is still in the NDP table on the router, which was added in the previous step. clear ndp: ndp -c try again on the router, now it's failing again. Add a global unicast address to the router> # ifconfig vtnet0 inet6 2001:6b8:1::1/64 Ping the client from the router, still does not work ping anything from the client and see which source the NDP packets are using. Linux uses the link-local address of vtnet1 on the router, FreeBSD uses the global unicast address of vtnet0 for packets from the router. This should add things to the NDP table on both router and client. Ping the client on the router again, now it works, for a while, until the router tries to refresh its NDP table, then it stops working. setting net.inet6.icmp6.nd6_onlink_ns_rfc4861=1 on the client and it keeps working. More details: With this setup, NDP works in one direction. I can, from the client, get NDP working and get the ethernet address of the interface with fe80::1 on the router (by trying to ping6 something, for instance). When this is one, the router also have the client in it's ndp neighbor table. Howerver, the opposite does not work. I can't from the router get the information of the client. When I try, from the router, to ping6 the client, all I get is ping6: sendmsg: No buffer space available and I don't see any NDP packets going out on the line. If the entry for the client is already in the router NDP list, then it works. To me, it looks like the router gets confused and for some reason won't do any neighbor discovery on its own, but it works if it is done already. I also found that the source address selection for NDP is a bit strange. It looks like FreeBSD prefers to use a global unicast address as source for ndp neighbor solicitations. If I add an global unicast address to any other interface on the router, that is used as the source, instead of the link-local address on the interface connected to the client. This sometimes confuses the FreeBSD client, at least unless net.inet6.icmp6.nd6_onlink_ns_rfc4861 is set to 1. With Linux this works. I swapped out the router for a Linux one, with the same setup things work out of the box. Linux is also using the closest link-local address as a source for NDP NS. I don't know if the FreeBSD behavior is expected behavior, or if there are bugs, but it is causing interoperability problems. All this are with FreeBSD 12.1. For the Linux router I used Debian 10.4.0. Regards -- Niclas From owner-freebsd-net@freebsd.org Mon Jul 6 20:58:59 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id AC797348B44 for ; Mon, 6 Jul 2020 20:58:59 +0000 (UTC) (envelope-from zeising+freebsd@daemonic.se) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 4B0ybl3N1Qz4YNp for ; Mon, 6 Jul 2020 20:58:59 +0000 (UTC) (envelope-from zeising+freebsd@daemonic.se) Received: by mailman.nyi.freebsd.org (Postfix) id 73B0F348B43; Mon, 6 Jul 2020 20:58:59 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 737E33489EA for ; Mon, 6 Jul 2020 20:58:59 +0000 (UTC) (envelope-from zeising+freebsd@daemonic.se) Received: from mail.daemonic.se (mail.daemonic.se [176.58.89.161]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4B0ybk3QHwz4Ykx for ; Mon, 6 Jul 2020 20:58:58 +0000 (UTC) (envelope-from zeising+freebsd@daemonic.se) Received: from cid.daemonic.se (localhost [IPv6:::1]) by mail.daemonic.se (Postfix) with ESMTP id 4B0ybh2MRMz3mWM for ; Mon, 6 Jul 2020 20:58:56 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=daemonic.se; h= content-transfer-encoding:content-language:content-type :content-type:in-reply-to:mime-version:user-agent:date:date :message-id:references:from:from:subject:subject:received :received; s=20151023; t=1594069135; bh=Xa5l1JUj8o0MYFz1CWBFWgpM YSkE2na4IyDIVurbb5c=; b=JuW7osMu34p3Croug/viOk+ylA5ZIKRUbSJsmfoo 8zYeT1BmDSV+lP+S+iwcYLYq/zBHJkoey1yv7h0pvfergw2hK1a9/lgptpQLjpq+ 5Kn0hBzrdNDa+5vP6yD4/pheKxfZsEWHTdEfKG0GEA0eeSOeeMMzmNlu8Iyiub3Y q0g= X-Virus-Scanned: amavisd-new at daemonic.se Received: from mail.daemonic.se ([127.0.0.1]) (using TLS with cipher ECDHE-RSA-AES128-GCM-SHA256) by cid.daemonic.se (mailscanner.daemonic.se [127.0.0.1]) (amavisd-new, port 10587) with ESMTPS id cr0VlgeouPSo for ; Mon, 6 Jul 2020 20:58:55 +0000 (UTC) Received: from garnet.daemonic.se (unknown [IPv6:2001:470:dca9:201:e911:95b5:705c:34b7]) by mail.daemonic.se (Postfix) with ESMTPSA id 4B0ybg2NwPz3mMv for ; Mon, 6 Jul 2020 20:58:55 +0000 (UTC) Subject: Re: Specifying link-local address in rc.conf From: Niclas Zeising To: net@FreeBSD.org References: <713e1f3e-4dd9-8dcf-c6d2-15c684bdce5b@daemonic.se> Message-ID: Date: Mon, 6 Jul 2020 22:58:54 +0200 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:68.0) Gecko/20100101 Thunderbird/68.10.0 MIME-Version: 1.0 In-Reply-To: <713e1f3e-4dd9-8dcf-c6d2-15c684bdce5b@daemonic.se> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: quoted-printable X-Rspamd-Queue-Id: 4B0ybk3QHwz4Ykx X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=daemonic.se header.s=20151023 header.b=JuW7osMu; dmarc=pass (policy=none) header.from=daemonic.se; spf=pass (mx1.freebsd.org: domain of zeising@daemonic.se designates 176.58.89.161 as permitted sender) smtp.mailfrom=zeising@daemonic.se X-Spamd-Result: default: False [-3.47 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; ARC_NA(0.00)[]; R_DKIM_ALLOW(-0.20)[daemonic.se:s=20151023]; NEURAL_HAM_MEDIUM(-1.01)[-1.011]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; R_SPF_ALLOW(-0.20)[+mx]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[net@freebsd.org]; TO_DN_NONE(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-1.02)[-1.024]; RCVD_COUNT_THREE(0.00)[4]; DKIM_TRACE(0.00)[daemonic.se:+]; DMARC_POLICY_ALLOW(-0.50)[daemonic.se,none]; NEURAL_HAM_SHORT(-0.43)[-0.434]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; RCVD_TLS_LAST(0.00)[]; ASN(0.00)[asn:36236, ipnet:176.58.89.0/24, country:US]; TAGGED_FROM(0.00)[freebsd]; MID_RHS_MATCH_FROM(0.00)[] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 06 Jul 2020 20:58:59 -0000 On 2020-07-06 13:05, Niclas Zeising wrote: > Hi! > Is it possible to specify a link-local address in rc.conf, and get only= =20 > that link-local address? >=20 > When I add a specific link-local address, such as fe80::1/64, to an=20 > interface from the command line, and then add a global uincast address,= =20 > it works as expected, I do not get an additional link-local address. > When I try to do the same in rc.conf however, it does not work. > I have added the following: > ifconfig_vtnet0_inet6=3D"inet6 fe80::1/64" > ifconfig_vtnet0_alias0=3D"2001:6b8::1/64" > to rc.conf, but when restarting, I get both fe80::1 and a EUI64-based=20 > link-local address assigned to the interface.=C2=A0 It does not matter = which=20 > order I specify the entries in rc.conf. > I have tried changing the sysctl net.inet6.ip6.auto_linklocal to 0 in=20 > /etc/sysctl.conf, but that does not work (it seems it takes effect too=20 > late, the interface still has the AUTO_LINKLOCAL flag set according to=20 > ifconfig). > I tried adding -auto_linklocal to the ifconfig_* lines in /etc/rc.conf,= =20 > and while this removes the AUTO_LINKLOCAL flag from the interface, a=20 > EUI64 based link-local address is still assigned to the interface. >=20 > While there might not be much of a problem having mulitple link-local=20 > addresses, this is surprising.=C2=A0 Adding a specific link-local addre= ss to=20 > an interface, even from rc.conf, shouldn't mean that the EUI64-one is=20 > created.=C2=A0 Perhaps something like ifconfig_IF_linklocal=3D"" should= be=20 > added, or this is a bug in rc.network.=C2=A0 I tried looking through=20 > rc.network and related rc files, but I didn't find anything obvious, an= d=20 > I couldn't really figure out how addresses are added to interfaces=20 > during boot. >=20 > This is causing issues when I want for instance rtadvd to use the=20 > fe80::1/64 address as source for router advertisements, since it picks=20 > the EUI64 link-local address as source (which means this also ends up i= n=20 > client routing tables as the default gateway).=C2=A0 I can work around = this=20 > problem by adding fe80::1/64 with prefer_source, but I would prefer if=20 > there only was one link-local address on an interface. >=20 > All of this is on FreeBSD 12.1. >=20 > Perhaps I'm just missing something, but this behavior feels a little=20 > surprising. >=20 > I can share more detailed configuration, and perhaps the whole virtual=20 > machine I'm testing on, if needed. >=20 > Regards I did some more digging. It only happens when there's also an=20 ifconfig_IF for IPv4 in the /etc/rc.conf. Not working configuration (/etc/rc.conf) ifconfig_vtnet0=3D"192.168.0.1/24" ifconfig_vtnet0_ipv6=3D"inet6 fe80::1/64" ifconfig_vtnet0_alias0=3D"inet6 2001:6b8::/64" This configuration creates an EUI64-based link-local addess on vtnet0 as=20 well. Working configuration (apart from no IPv4) ifconfig_vtnet0_ipv6=3D"inet6 fe80::1/64" ifconfig_vtnet0_alias0=3D"inet6 2001:6b8::/64" Regards --=20 Niclas From owner-freebsd-net@freebsd.org Tue Jul 7 01:58:20 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id E376F34F7B8 for ; Tue, 7 Jul 2020 01:58:20 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 4B15F85hd3z3bSl for ; Tue, 7 Jul 2020 01:58:20 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id C36DC34F636; Tue, 7 Jul 2020 01:58:20 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id C336434F634 for ; Tue, 7 Jul 2020 01:58:20 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B15F843SLz3bZg for ; Tue, 7 Jul 2020 01:58:20 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 7038427B3B for ; Tue, 7 Jul 2020 01:58:20 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 0671wKCv068798 for ; Tue, 7 Jul 2020 01:58:20 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 0671wKdF068797 for net@FreeBSD.org; Tue, 7 Jul 2020 01:58:20 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 166724] [re] if_re watchdog timeout Date: Tue, 07 Jul 2020 01:58:14 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 11.1-RELEASE X-Bugzilla-Keywords: needs-patch X-Bugzilla-Severity: Affects Many People X-Bugzilla-Who: portmaster@bsdforge.com X-Bugzilla-Status: In Progress X-Bugzilla-Resolution: X-Bugzilla-Priority: Normal X-Bugzilla-Assigned-To: yongari@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 07 Jul 2020 01:58:20 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D166724 --- Comment #53 from Chris Hutchinson --- (In reply to L=C3=A1szl=C3=B3 K=C3=A1rolyi from comment #48) Hello, FWIW One of the servers I'm running with the stock FreeBSD re driver, is currently handling pf tables totaling more than 72 million addresses. This server never experiences re related lockups or watchdog messages. It's on 12/AMD64, and has the following sysctl tunables set: kern.ipc.nmbclusters: 1017660 kern.ipc.nmbjumbop: 508829 Maybe they work for you too? HTH --Chris --=20 You are receiving this mail because: You are on the CC list for the bug.= From owner-freebsd-net@freebsd.org Tue Jul 7 02:25:54 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id E8F5F3501B5 for ; Tue, 7 Jul 2020 02:25:54 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 4B15ry4PqHz3cV8 for ; Tue, 7 Jul 2020 02:25:54 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 9587934FCE8; Tue, 7 Jul 2020 02:25:54 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 954F034FF4C for ; Tue, 7 Jul 2020 02:25:54 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B15ry3Wxzz3clj for ; Tue, 7 Jul 2020 02:25:54 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 5C8BB831A for ; Tue, 7 Jul 2020 02:25:54 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 0672Psgu098948 for ; Tue, 7 Jul 2020 02:25:54 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 0672Ps3n098947 for net@FreeBSD.org; Tue, 7 Jul 2020 02:25:54 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 166724] [re] if_re watchdog timeout Date: Tue, 07 Jul 2020 02:25:53 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 11.1-RELEASE X-Bugzilla-Keywords: needs-patch X-Bugzilla-Severity: Affects Many People X-Bugzilla-Who: eugen@freebsd.org X-Bugzilla-Status: In Progress X-Bugzilla-Resolution: X-Bugzilla-Priority: Normal X-Bugzilla-Assigned-To: yongari@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: cc Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 07 Jul 2020 02:25:55 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D166724 Eugene Grosbein changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |eugen@freebsd.org --- Comment #54 from Eugene Grosbein --- (In reply to L=C3=A1szl=C3=B3 K=C3=A1rolyi from comment #50) Unfortunately, you may wait forever because the fix must be tested before it reaches distribution and GENERIC kernel. FreeBSD relies on user feedback and testing and you ought reconsider testing it in your environment. You have not rebuild the GENERIC, though. You may just rebuild kernel module and load it with /boot/loader.conf or /boot.nextboot.conf (one-time loading= ). Despite of driver presence in the GENERIC, loaded module will be used in preference. --=20 You are receiving this mail because: You are on the CC list for the bug.= From owner-freebsd-net@freebsd.org Tue Jul 7 02:48:24 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id AB7AF35188B for ; Tue, 7 Jul 2020 02:48:24 +0000 (UTC) (envelope-from sales2@edmff.xyz) Received: from mail.edmdd.xyz (mail.edmdd.xyz [194.34.249.162]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4B16Lt5Lbkz3fRn for ; Tue, 7 Jul 2020 02:48:21 +0000 (UTC) (envelope-from sales2@edmff.xyz) Reply-To: Date: Tue, 7 Jul 2020 09:46:10 +0800 From: "Bessie" To: Subject: Mllord Circuits|| Important & New MCPCB Request Message-ID: <20200707094622455265@edmff.xyz> X-mailer: Foxmail 6, 13, 102, 15 [cn] Mime-Version: 1.0 X-Rspamd-Queue-Id: 4B16Lt5Lbkz3fRn X-Spamd-Bar: ++++ Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of sales2@edmff.xyz designates 194.34.249.162 as permitted sender) smtp.mailfrom=sales2@edmff.xyz X-Spamd-Result: default: False [4.30 / 15.00]; HAS_REPLYTO(0.00)[simon.huang@mllordpcb.com]; MV_CASE(0.50)[]; R_SPF_ALLOW(-0.20)[+mx/24]; TO_DN_NONE(0.00)[]; MIME_BASE64_TEXT_BOGUS(1.00)[]; URI_COUNT_ODD(1.00)[1]; NEURAL_HAM_SHORT(-0.56)[-0.557]; MIME_BASE64_TEXT(0.10)[]; FORGED_SENDER(0.30)[Mllord Circuits,sales2@edmff.xyz]; RCVD_COUNT_ZERO(0.00)[0]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; ASN(0.00)[asn:51724, ipnet:194.34.249.0/24, country:RU]; FROM_NEQ_ENVFROM(0.00)[Mllord Circuits,sales2@edmff.xyz]; ARC_NA(0.00)[]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; HEADER_FORGED_MDN(2.00)[]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; REPLYTO_DOM_NEQ_FROM_DOM(0.00)[]; DMARC_NA(0.00)[No domain in From header]; NEURAL_SPAM_MEDIUM(0.03)[0.031]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-0.28)[-0.278]; XM_CASE(0.50)[]; GREYLIST(0.00)[pass,body] Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 X-Content-Filtered-By: Mailman/MimeDel 2.1.33 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 07 Jul 2020 02:48:24 -0000 SGVsbG8gdGhlcmUgOiANCg0KR29vZCBtb3JuaW5nLCBIb3cgYXJlIHlvdTotKQ0KDQoNClRoaXMg aXMgc2ltb24sb3ZlcnNlYXMgc2FsZXMgb2YgTWxsb3JkIFBDQiBDb21wYW55Lg0KIA0KV2UgY2Fu ICBwcm92aWRlIGFsbCBraW5kcyBvZiBQQ0IgcHJvZHVjdHMsIDFMLTI2TCBSaWdpZCBib2FyZHM7 IE1DUENCIGV0Yy4uLiBXZSBjYW4gZG8gbWluIGhvbGUgMC4xMG1tLCB0cmFjZSB3aWR0aC9zcGFj aW5nOiAzLzNtaWwuIDEyb3ogdGhpY2sgQ29wcGVyLg0KDQpQQ0Igc3VyZmFjZSBmaW5pc2hpbmc6 IE9TUCwgSEFTTCwgSEFTTC1MRiwgRU5JRywgQ2hlbWljYWwgVGluL1NsaXZlcjsgR29sZCBmaW5n ZXIgRXRjLi4NCg0KUENCIE1hdGVyaWFsOkZSNChIaWdoIHRnICBGUjQgKSxBbHVtaW51bSxSb2dl cnMgRXRjLi4gLkZQQyBtYXRlcmlhbDogUEksUEVULFBFTi4NCg0KRG9uJ3QgaGVzaXRhZSB0byBj b250YWN0IHVzLCB3ZSB3aWxsIHByb3ZpZGUgeW91ICBxdWFsaWZpZWQgUENCIHByb2R1Y3RzIGF0 IHRoZSBiZXN0IHByaWNlOyBjb3VsZCB5b3U/DQoNClAuUy4gUGxzIHBheSBhdHRlbnRpb24gdG8g dGhlIENPVklELTE5IGFuZCBzdGF5IHNhZmUuDQpUaGFuayB5b3UuDQoNCllvdXJzIHNpbmNlcmVs eQ0KU2ltb24gaHVhbmcNCk1sbG9yZCBjaXJjdWl0cyBib2FyZCBsaW1pdGVkDQpURUw6ICs4Ni03 NTUtODYyNTE2NzggIA0KV2Vic2l0ZTogd3d3IGRvdCBtbGxvcmRwY2IgZG90IGNvbQ== From owner-freebsd-net@freebsd.org Tue Jul 7 06:45:06 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 4CE843576D8 for ; Tue, 7 Jul 2020 06:45:06 +0000 (UTC) (envelope-from bounces+10810113-bdd1-freebsd-net=freebsd.org@em1420.clickmetrics.it) Received: from o1.hv1n.shared.sendgrid.net (o1.hv1n.shared.sendgrid.net [167.89.100.167]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4B1Cc12YR5z487Q for ; Tue, 7 Jul 2020 06:45:04 +0000 (UTC) (envelope-from bounces+10810113-bdd1-freebsd-net=freebsd.org@em1420.clickmetrics.it) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=clickmetrics.it; h=mime-version:from:subject:content-type:to; s=s1; bh=FX9OaLMkGbhQJg4o75HzCS+fQvEG+2iVHpmnDej30Dg=; b=Xau23HuvJFPUUy2sd7CqrUegWOzW70iDN+uyVlvvFiiM9s2/Mejjs2MTe/OcZ7e+KINS 2yLkY6dzbw7y0xg1o8a52hvwGqqEeqkhEkY6ucx0b0RjEUO4NTuZ7Xa/iGAoo6CmIZ1bsS oKvVxcEvcjFYlY/sE/ZkXwsagot2JA9HU= Received: by filterdrecv-p3las1-7754f7d4cc-2z6mv with SMTP id filterdrecv-p3las1-7754f7d4cc-2z6mv-19-5F0419E9-34 2020-07-07 06:44:57.771488069 +0000 UTC m=+995485.189998800 Received: from [192.168.1.136] (unknown) by ismtpd0005p1lon1.sendgrid.net (SG) with ESMTP id Cn6qFxiBTKeRU8PC6rNPOA for ; Tue, 07 Jul 2020 06:44:57.241 +0000 (UTC) Message-Id: Mime-Version: 1.0 From: SeoHulk Subject: Su Seohulk fai l'Analisi SEO gratuita del tuo sito e scopri il valore sui motori di ricerca Date: Tue, 07 Jul 2020 06:44:57 +0000 (UTC) X-Antivirus: Avast (VPS 200706-4, 06/07/2020), Outbound message X-Antivirus-Status: Clean X-SG-EID: =?us-ascii?Q?hqU2hzxbeQFVaVzbSqQJfz0UFZoUVCCIvPtJyGHxyAE2RDLbC7J2=2Ft74kus9Il?= =?us-ascii?Q?5bART7ldNTe=2FfHhT=2FSGFNHDiQtamsb8ijt+0KUc?= =?us-ascii?Q?wFzLbRB10PGKqnVSYFJv3O5jJsylRLgQrd0L93i?= =?us-ascii?Q?mku+8mLuqn2IcHZSPxLWpooVt3N76krIdqnrwbd?= =?us-ascii?Q?b1MiS7uThvf0MKg1ghnsu+U1e5xv20zE3HStxy9?= =?us-ascii?Q?OYpiuR5cXNeGL1mJUIWH4XyUTlI1av5xRsE1sXI?= =?us-ascii?Q?goKgTFiwTOTZP95ar40dA=3D=3D?= To: freebsd-net X-Rspamd-Queue-Id: 4B1Cc12YR5z487Q X-Spamd-Bar: +++++ Authentication-Results: mx1.freebsd.org; dkim=pass header.d=clickmetrics.it header.s=s1 header.b=Xau23Huv; dmarc=none; spf=pass (mx1.freebsd.org: domain of bounces@em1420.clickmetrics.it designates 167.89.100.167 as permitted sender) smtp.mailfrom=bounces@em1420.clickmetrics.it X-Spamd-Result: default: False [5.31 / 15.00]; REDIRECTOR_FALSE(0.00)[avast.com->sendgrid.net]; MV_CASE(0.50)[]; R_SPF_ALLOW(0.00)[+ip4:167.89.0.0/17]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[clickmetrics.it:+]; FORGED_SENDER(0.30)[agenzia@clickmetrics.it,bounces@em1420.clickmetrics.it]; MIME_TRACE(0.00)[0:+,1:+,2:~]; RCVD_TLS_LAST(0.00)[]; ASN(0.00)[asn:11377, ipnet:167.89.96.0/20, country:US]; MID_RHS_MATCH_FROM(0.00)[]; TAGGED_FROM(0.00)[10810113-bdd1-freebsd-net=freebsd.org]; FROM_NEQ_ENVFROM(0.00)[agenzia@clickmetrics.it,bounces@em1420.clickmetrics.it]; ARC_NA(0.00)[]; R_DKIM_ALLOW(0.00)[clickmetrics.it:s=s1]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_SPAM_SHORT(0.33)[0.329]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-net@freebsd.org]; DMARC_NA(0.00)[clickmetrics.it]; HTML_SHORT_LINK_IMG_2(1.00)[]; RCPT_COUNT_ONE(0.00)[1]; BAD_REP_POLICIES(0.10)[]; URIBL_GREY(1.50)[sendgrid.net:url]; NEURAL_SPAM_MEDIUM(0.93)[0.935]; NEURAL_SPAM_LONG(0.74)[0.744]; RWL_MAILSPIKE_POSSIBLE(0.00)[167.89.100.167:from]; RCVD_COUNT_TWO(0.00)[2] Content-Type: text/plain; charset=iso-8859-1; format=flowed Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.33 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 07 Jul 2020 06:45:06 -0000 Buongiorno, sono Marco Pace di Seohulk .it, il nuovo servizio gratuito e se= nza registrazione che misura subito il punteggio SEO del vostro sito Web e = la qualit=E0 del posizionamento sui Motori di Ricerca! =C8 sufficiente inserire il vostro indirizzo web per ottenere immediatament= e la Vostra analisi dettagliata SEO e posizionamento Google. Grazie all'analisi SeoHulk=AE, potete conoscere la stima del traffico giorn= aliera, la stima dei guadagni potenziali del vostro sito ed altre important= i informazioni da condividere con il vostro Webmaster. Inoltre il nostro Team Specialistico e Certificato SEO =E8 a vostra disposi= zione per risolvere tutti gli errori e applicare la soluzione perfetta. Seohulk .it =E8 un servizio certificato ISO9001, ISO27001, pluripremiato da= IAAWA, SurveyGoo, Bakkar=E0 e NetCore. Siamo disponibili anche in Live Chat su su www. seohulk .it Marco Pace Agenzia Seohulk Milano Tel 02-87168036 Cel. 393-9316379 Best Award IAAWA=AE Best Award SurveyGoo=AE Best Award Bakkar=E0=AE Best Award NetCore=AE Certificato UNI EN ISO9001 Certificato UNI EN ISO27001 --=20 Questa e-mail =E8 stata controllata per individuare virus con Avast antivir= us. https://u10810113.ct.sendgrid.net/ls/click?upn=3DVOPZfG1Q6ZcPZkw5LhZmmqsU04= UnP6f5WeGuJcnjrUkisYTSXKJrEW-2F3PxcQeHqkDjVa_oHh3B724HUwoeDcrGdlJYSUp1x38v8= KgTqmOdhcA3D1QXlXdRFBIpeVRMh38rzLvmxG7SqxhVLb-2FyAbcRTUbMgBQby9xb72y96e-2BE= rU2EMYFQK8D5oj0qJ9yo3OTRuOsIrH-2BLHmgoUY8xymFdXI5BEZn9h3wj8F4VY8Y-2B50SuPtZ= ZWV4eBB-2FQEYFtUbdelBA-2BvOK3AnIhWCOKSEs4gh6pTnptfod8IKbP2VTP8OGEu4-3D From owner-freebsd-net@freebsd.org Tue Jul 7 07:58:52 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id AF5F7359193 for ; Tue, 7 Jul 2020 07:58:52 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 4B1FF84FPnz4CjV for ; Tue, 7 Jul 2020 07:58:52 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 91B8A35909B; Tue, 7 Jul 2020 07:58:52 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 917F1358FD6 for ; Tue, 7 Jul 2020 07:58:52 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B1FF83Q1nz4D78 for ; Tue, 7 Jul 2020 07:58:52 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 55C85C23C for ; Tue, 7 Jul 2020 07:58:52 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 0677wqcn059494 for ; Tue, 7 Jul 2020 07:58:52 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 0677wqZZ059493 for net@FreeBSD.org; Tue, 7 Jul 2020 07:58:52 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 166724] [re] if_re watchdog timeout Date: Tue, 07 Jul 2020 07:58:51 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 11.1-RELEASE X-Bugzilla-Keywords: needs-patch X-Bugzilla-Severity: Affects Many People X-Bugzilla-Who: laszlo@karolyi.hu X-Bugzilla-Status: In Progress X-Bugzilla-Resolution: X-Bugzilla-Priority: Normal X-Bugzilla-Assigned-To: yongari@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 07 Jul 2020 07:58:52 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D166724 --- Comment #55 from L=C3=A1szl=C3=B3 K=C3=A1rolyi --- (In reply to Chris Hutchinson from comment #53) I think others have stated that the bigger the values are, the better. My values are way bigger than these so I don't think this helps. But thanks anyways. --=20 You are receiving this mail because: You are on the CC list for the bug.= From owner-freebsd-net@freebsd.org Tue Jul 7 08:02:04 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 913A3359642 for ; Tue, 7 Jul 2020 08:02:04 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 4B1FJr3MbHz4DLq for ; Tue, 7 Jul 2020 08:02:04 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 73559359921; Tue, 7 Jul 2020 08:02:04 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 731EF359691 for ; Tue, 7 Jul 2020 08:02:04 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B1FJr2XwXz4DdJ for ; Tue, 7 Jul 2020 08:02:04 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 3BE9FC26E for ; Tue, 7 Jul 2020 08:02:04 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 067824lg064492 for ; Tue, 7 Jul 2020 08:02:04 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 067824Bj064491 for net@FreeBSD.org; Tue, 7 Jul 2020 08:02:04 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 166724] [re] if_re watchdog timeout Date: Tue, 07 Jul 2020 08:02:02 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 11.1-RELEASE X-Bugzilla-Keywords: needs-patch X-Bugzilla-Severity: Affects Many People X-Bugzilla-Who: laszlo@karolyi.hu X-Bugzilla-Status: In Progress X-Bugzilla-Resolution: X-Bugzilla-Priority: Normal X-Bugzilla-Assigned-To: yongari@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 07 Jul 2020 08:02:04 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D166724 --- Comment #56 from L=C3=A1szl=C3=B3 K=C3=A1rolyi --- (In reply to Eugene Grosbein from comment #54) Assuming it doesn't need a custom kernel compiled, I'm willing to test this= on my server, in hopes of this thing picking up some speed. Can someone point me to a driver that has the potential to be added to the GENERIC branch when I can confirm it works? There are a couple links here pointing to various versions of the re0 driver. --=20 You are receiving this mail because: You are on the CC list for the bug.= From owner-freebsd-net@freebsd.org Tue Jul 7 08:24:34 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 35AFA35A63F for ; Tue, 7 Jul 2020 08:24:34 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 4B1Fpp0kncz4FTP for ; Tue, 7 Jul 2020 08:24:34 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 1759F359FF6; Tue, 7 Jul 2020 08:24:34 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 1725735A1E5 for ; Tue, 7 Jul 2020 08:24:34 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B1Fpn6yd1z4FYG for ; Tue, 7 Jul 2020 08:24:33 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id D2B21C634 for ; Tue, 7 Jul 2020 08:24:33 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 0678OXcx087533 for ; Tue, 7 Jul 2020 08:24:33 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 0678OXHr087532 for net@FreeBSD.org; Tue, 7 Jul 2020 08:24:33 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 166724] [re] if_re watchdog timeout Date: Tue, 07 Jul 2020 08:24:28 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 11.1-RELEASE X-Bugzilla-Keywords: needs-patch X-Bugzilla-Severity: Affects Many People X-Bugzilla-Who: ale@FreeBSD.org X-Bugzilla-Status: In Progress X-Bugzilla-Resolution: X-Bugzilla-Priority: Normal X-Bugzilla-Assigned-To: yongari@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 07 Jul 2020 08:24:34 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D166724 --- Comment #57 from Alex Dupre --- (In reply to Eugene Grosbein from comment #54) This is new to me. I was quite sure that you cannot load a module if it's already compiled into the kernel. The realtek driver Readme.txt in fact says that you have to build a new kernel without the re driver, to be able to use their driver as a module. Since when this is possible, if really is? Do you have any source code reference for that? --=20 You are receiving this mail because: You are on the CC list for the bug.= From owner-freebsd-net@freebsd.org Tue Jul 7 10:01:18 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 76DA835C749 for ; Tue, 7 Jul 2020 10:01:18 +0000 (UTC) (envelope-from f.colliot@gmail.com) Received: from mail-ua1-x934.google.com (mail-ua1-x934.google.com [IPv6:2607:f8b0:4864:20::934]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B1HyP55y9z4LTN for ; Tue, 7 Jul 2020 10:01:17 +0000 (UTC) (envelope-from f.colliot@gmail.com) Received: by mail-ua1-x934.google.com with SMTP id g4so335290uaq.10 for ; Tue, 07 Jul 2020 03:01:17 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:from:date:message-id:subject:to; bh=/ZTFPLiQK/pVT+024tcJL26UtblQV3WNU2VeD0gkooI=; b=cnlBpVZczAt4VkBec24J7s42syeTDNic2sNOdxbaD5Vxo3V/vri9370enbeHVvpyei 1rThFLFs6z6bqjdIfjiDYcysWrH2hM9dPp19rmhuyNYfRUwYshx5GsmeYj6S5Lpvqbkx WPaMPLKBXrE2swJelE9+jmEanebb17pdhkXutT/Z+6TOhQ4DHd2j8u8eoiJzHUzp+EHJ eT+5LCIsmh5e7qdtvhAUXbbeRda1MstKOSlaGed1d9JF7GRGuWmEuPGq+KHCm1s6htqJ jSeTOZ0bE/VbfHjvv9H+XlA4ZKcs1jkPTr9sltid3bsY+kibEwzS+4fFyd/1P9v3KDaq peAg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=/ZTFPLiQK/pVT+024tcJL26UtblQV3WNU2VeD0gkooI=; b=UB0C32f3kqeYXLvN4dNtI8oTxYu6HJMSqOPuCuMtPDE+pdAqqW6Hf1aY9WwjzZrJW4 Yj1V+wPTY81pkNJgewVKbm3OyR7cw5TafgcGbdTpwZ/GdQJMfnOJLwNjhfGK5JOxiSIs JDWPtWmDx2HwJFu6mDMkCMblhB5Golrcae+2bknByINAb6ZkQFqGNj9Bh0l16fneGO22 Wu8NU1YQOwQ2L7LjxWem9pZnsKiOvfyJ5mXY+D007yW96DBiY3FJYW8bIGaf1CvCTGOK Z6E9+4Mx/MnKZcJWAZP7CGvuTt+aeCnhJ0pm93tt1P69UTigM8wRz2aSAwxRr5OTVHQK 0LWA== X-Gm-Message-State: AOAM533m6w/6NhAq1cCVfkfoeF2l1CoYVLtoIfNlz5a3yubQiYNFyEDy K3KmR3unOaj44J54oX7zUmfxRTUAi3dHw0CI3wi8As7KFsRxXQ== X-Google-Smtp-Source: ABdhPJwzPuRhdmzGWMJJRkBZ5T6kUqUKauTEd0P2UuurTBJqn+yFYqXfUUUdynVE8KvaVJsiOTKXRQ7SO87JH96q0co= X-Received: by 2002:a9f:28c3:: with SMTP id d61mr37389926uad.72.1594116076450; Tue, 07 Jul 2020 03:01:16 -0700 (PDT) MIME-Version: 1.0 From: Fabrice Colliot Date: Tue, 7 Jul 2020 12:01:05 +0200 Message-ID: Subject: Multicast: membership to (*, G) group after leaving a (S, G) group To: freebsd-net@freebsd.org X-Rspamd-Queue-Id: 4B1HyP55y9z4LTN X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=cnlBpVZc; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of fcolliot@gmail.com designates 2607:f8b0:4864:20::934 as permitted sender) smtp.mailfrom=fcolliot@gmail.com X-Spamd-Result: default: False [-2.74 / 15.00]; RCVD_TLS_ALL(0.00)[]; ARC_NA(0.00)[]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; NEURAL_HAM_MEDIUM(-0.98)[-0.975]; FROM_HAS_DN(0.00)[]; FREEMAIL_FROM(0.00)[gmail.com]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-net@freebsd.org]; TO_DN_NONE(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-1.00)[-0.999]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; DKIM_TRACE(0.00)[gmail.com:+]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; RCVD_IN_DNSWL_NONE(0.00)[2607:f8b0:4864:20::934:from]; NEURAL_SPAM_SHORT(0.23)[0.230]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; FREEMAIL_ENVFROM(0.00)[gmail.com]; RCVD_COUNT_TWO(0.00)[2]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; TAGGED_FROM(0.00)[]; DWL_DNSWL_NONE(0.00)[gmail.com:dkim] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.33 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 07 Jul 2020 10:01:18 -0000 Hi, I'm using smcroute to join and leave multicast groups and I don't understand the behavior of FreeBSD when the group is left. Here is what I do: smcroute join em1 10.3.4.5 224.0.55.55 ifmcstat -i em1 em1: inet 10.10.0.1 igmpv3 rv 2 qi 125 qri 10 uri 3 group 224.0.55.55 mode include mcast-macaddr 01:00:5e:00:37:37 group 224.0.0.1 mode exclude mcast-macaddr 01:00:5e:00:00:01 smcroute leave em1 10.3.4.5 224.0.55.55 ifmcstat -i em1 em1: inet 10.10.0.1 igmpv3 rv 2 qi 125 qri 10 uri 3 group 224.0.55.55 mode undefined mcast-macaddr 01:00:5e:00:37:37 group 224.0.0.1 mode exclude mcast-macaddr 01:00:5e:00:00:01 At this point, I expected to have no membership left on em1 for 224.0.55.55 but ifmcstat shows that the interface is still a member of the group but in undefined mode. I was wondering if anybody could tell me why the group membership seems to be transitioned to a (*, G) membership when all the (S, G) memberships are removed. Thanks! Fabrice From owner-freebsd-net@freebsd.org Tue Jul 7 10:08:50 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 5696F35C579 for ; Tue, 7 Jul 2020 10:08:50 +0000 (UTC) (envelope-from freebsd@grem.de) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 4B1J760JMMz4Lwp for ; Tue, 7 Jul 2020 10:08:50 +0000 (UTC) (envelope-from freebsd@grem.de) Received: by mailman.nyi.freebsd.org (Postfix) id 0A5CF35CA3A; Tue, 7 Jul 2020 10:08:50 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 0A22735CACE for ; Tue, 7 Jul 2020 10:08:50 +0000 (UTC) (envelope-from freebsd@grem.de) Received: from mail.evolve.de (mail.evolve.de [213.239.217.29]) (using TLSv1.2 with cipher ECDHE-RSA-CHACHA20-POLY1305 (256/256 bits)) (Client CN "mail.evolve.de", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B1J746823z4Lt1 for ; Tue, 7 Jul 2020 10:08:48 +0000 (UTC) (envelope-from freebsd@grem.de) Received: by mail.evolve.de (OpenSMTPD) with ESMTP id a6a4cdea; Tue, 7 Jul 2020 10:08:39 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=grem.de; h=date:from:to:cc :subject:message-id:in-reply-to:references:mime-version :content-type:content-transfer-encoding; s=20180501; bh=iOmHSbVK LyzYkHEgjCKuiLgBC1Y=; b=DNzHmMJ/t3SDTQFQg9nf/kJ5eGgqAR4W9Xo2vAzN Bv+MKiiKI5Ae6zVvi3MXU7ei7Sn72Ux52woRRqJjo7frYHQlpxd6f67B1QT5DdZ2 gVBDMpIUOc6e4A/Bfxq1Ju/Y75lWGVora/jTgZPB9JyKdCrahmCBh4zPdkXlUzgp nQgrHYRH9qOP7hZ7K5W8ApHgbgavfpqWvl6SuzvbxLuil+CN/BhsPqeysjxkqq1s Fy85FXGhrb2f0yZfeLD+9kY3q0nc6bO4R0Jhcd7psKQ9iB53+K/kVhF0pH7KfHXG rYtBMO259vDSJStAc2r5UPuA8U7hOTFif8j22JtCkImRng== DomainKey-Signature: a=rsa-sha1; c=nofws; d=grem.de; h=date:from:to:cc :subject:message-id:in-reply-to:references:mime-version :content-type:content-transfer-encoding; q=dns; s=20180501; b=Og EqtxpT/UVoaZN8PDYr1U80y/n93LzJym1UfyhJ6qQ7jon2cl5vTMWUuX72TPmfsF 6teWR3Dlmp0wr2bB3Ihl4iBi7X6nXQO5eO8PsL9VkulXuF5wTEO0L7DaN6TbyFCT 5YBuiLXxQ8+eromKbPA7FEuy9axsQNuSvSt9CFoDgzNOumSLaIFNNzjSbeKbjhqH L1rTy0X23tVqHIRnVEq/y5I89wglNvr/1rIqBabB+p/OQTmTsZ6iODAxvgauOWzU UhIHDi7JdOn+0VL6wMH8TKZJCEpkYYYcfbg3TlKX154glsNgVjDrIQvHViT030Ny 8rSoRzJaeapTF2VIU+vw== Received: by mail.evolve.de (OpenSMTPD) with ESMTPSA id 78866b9b (TLSv1.2:ECDHE-RSA-CHACHA20-POLY1305:256:NO); Tue, 7 Jul 2020 10:08:37 +0000 (UTC) Date: Tue, 7 Jul 2020 12:08:35 +0200 From: Michael Gmelin To: Niclas Zeising Cc: net@FreeBSD.org Subject: Re: Specifying link-local address in rc.conf Message-ID: <20200707120835.4834198e@bsd64.grem.de> In-Reply-To: References: <713e1f3e-4dd9-8dcf-c6d2-15c684bdce5b@daemonic.se> X-Face: $wrgCtfdVw_H9WAY?S&9+/F"!41z'L$uo*WzT8miX?kZ~W~Lr5W7v?j0Sde\mwB&/ypo^}> +a'4xMc^^KroE~+v^&^#[B">soBo1y6(TW6#UZiC]o>C6`ej+i Face: iVBORw0KGgoAAAANSUhEUgAAADAAAAAwBAMAAAClLOS0AAAAJFBMVEWJBwe5BQDl LASZU0/LTEWEfHbyj0Txi32+sKrp1Mv944X8/fm1rS+cAAAACXBIWXMAAAsTAAAL EwEAmpwYAAAAB3RJTUUH3wESCxwC7OBhbgAAACFpVFh0Q29tbWVudAAAAAAAQ3Jl YXRlZCB3aXRoIFRoZSBHSU1QbbCXAAAAAghJREFUOMu11DFvEzEUAGCfEhBVFzuq AKkLd0O6VrIQsLXVSZXoWE5N1K3DobBBA9fQpRWc8OkWouaIjedWKiyREOKs+3PY fvalCNjgLVHeF7/3bMtBzV8C/VsQ8tecEgCcDgrzjekwKZ7TwsJZd/ywEKwwP+ZM 8P3drTsAwWn2mpWuDDuYiK1bFs6De0KUUFw0tWxm+D4AIhuuvZqtyWYeO7jQ4Aea 7jUqI+ixhQoHex4WshEvSXdood7stlv4oSuFOC4tqGcr0NjEqXgV4mMJO38nld4+ xKNxRDon7khyKVqY7YR4d+Cg0OMrkWXZOM7YDkEfKiilCn1qYv4mighZiynuHHOA Wq9QJq+BIES7lMFUtcikMnkDGHUoncA+uHgrP0ctIEqfwLHzeSo+eUA66AqzwN6n 2ZHJhw6Qh/PoyC/QENyEyC/AyNjq74Bs+3UH0xYwzDUC4B97HgLocg1QLYgDDO1v f3UX9Y307Ew4AHh67YAFFsxEpkXwpXY3eIgMhAAE3R19L919nNnuD2wlPcDE3UeT L2ytEICQib9BXgS2fU8PrD82ToYO1OEmMSnYTjSqSv9wdC0tPYC+rQRQD9ESnldF CyqfmiYW+tlALt8gH2xrMdC/youbjzPXEun+/ReXsMCDyve3dZc09fn2Oas8oXGc Jj6/fOeK5UmSMPmf/jL+GD8BEj0k/Fn6IO4AAAAASUVORK5CYII= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable X-Rspamd-Queue-Id: 4B1J746823z4Lt1 X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=grem.de header.s=20180501 header.b=DNzHmMJ/; dmarc=none; spf=pass (mx1.freebsd.org: domain of freebsd@grem.de designates 213.239.217.29 as permitted sender) smtp.mailfrom=freebsd@grem.de X-Spamd-Result: default: False [-3.17 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; ARC_NA(0.00)[]; R_DKIM_ALLOW(-0.20)[grem.de:s=20180501]; NEURAL_HAM_MEDIUM(-0.91)[-0.914]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:213.239.217.29/32]; NEURAL_HAM_LONG(-1.02)[-1.017]; TAGGED_RCPT(0.00)[freebsd]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[grem.de]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_SOME(0.00)[]; DKIM_TRACE(0.00)[grem.de:+]; RCPT_COUNT_TWO(0.00)[2]; NEURAL_HAM_SHORT(-0.74)[-0.736]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:24940, ipnet:213.239.192.0/18, country:DE]; RCVD_TLS_ALL(0.00)[] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 07 Jul 2020 10:08:50 -0000 On Mon, 6 Jul 2020 22:58:54 +0200 Niclas Zeising wrote: > On 2020-07-06 13:05, Niclas Zeising wrote: > > Hi! > > Is it possible to specify a link-local address in rc.conf, and get > > only that link-local address? > >=20 > > When I add a specific link-local address, such as fe80::1/64, to an=20 > > interface from the command line, and then add a global uincast > > address, it works as expected, I do not get an additional > > link-local address. When I try to do the same in rc.conf however, > > it does not work. I have added the following: > > ifconfig_vtnet0_inet6=3D"inet6 fe80::1/64" > > ifconfig_vtnet0_alias0=3D"2001:6b8::1/64" > > to rc.conf, but when restarting, I get both fe80::1 and a > > EUI64-based link-local address assigned to the interface.=C2=A0 It does > > not matter which order I specify the entries in rc.conf. > > I have tried changing the sysctl net.inet6.ip6.auto_linklocal to 0 > > in /etc/sysctl.conf, but that does not work (it seems it takes > > effect too late, the interface still has the AUTO_LINKLOCAL flag > > set according to ifconfig). > > I tried adding -auto_linklocal to the ifconfig_* lines in > > /etc/rc.conf, and while this removes the AUTO_LINKLOCAL flag from > > the interface, a EUI64 based link-local address is still assigned > > to the interface. > >=20 > > While there might not be much of a problem having mulitple > > link-local addresses, this is surprising.=C2=A0 Adding a specific > > link-local address to an interface, even from rc.conf, shouldn't > > mean that the EUI64-one is created.=C2=A0 Perhaps something like > > ifconfig_IF_linklocal=3D"" should be added, or this is a bug in > > rc.network.=C2=A0 I tried looking through rc.network and related rc > > files, but I didn't find anything obvious, and I couldn't really > > figure out how addresses are added to interfaces during boot. > >=20 > > This is causing issues when I want for instance rtadvd to use the=20 > > fe80::1/64 address as source for router advertisements, since it > > picks the EUI64 link-local address as source (which means this also > > ends up in client routing tables as the default gateway).=C2=A0 I can > > work around this problem by adding fe80::1/64 with prefer_source, > > but I would prefer if there only was one link-local address on an > > interface. > >=20 > > All of this is on FreeBSD 12.1. > >=20 > > Perhaps I'm just missing something, but this behavior feels a > > little surprising. > >=20 > > I can share more detailed configuration, and perhaps the whole > > virtual machine I'm testing on, if needed. > >=20 > > Regards =20 >=20 > I did some more digging. It only happens when there's also an=20 > ifconfig_IF for IPv4 in the /etc/rc.conf. >=20 > Not working configuration (/etc/rc.conf) > ifconfig_vtnet0=3D"192.168.0.1/24" > ifconfig_vtnet0_ipv6=3D"inet6 fe80::1/64" > ifconfig_vtnet0_alias0=3D"inet6 2001:6b8::/64" >=20 > This configuration creates an EUI64-based link-local addess on vtnet0 > as well. >=20 > Working configuration (apart from no IPv4) > ifconfig_vtnet0_ipv6=3D"inet6 fe80::1/64" > ifconfig_vtnet0_alias0=3D"inet6 2001:6b8::/64"" >=20 This works: ifconfig_vtnet0=3D"inet6 -auto_linklocal" ifconfig_vtnet0_ipv6=3D"up" ifconfig_vtnet0_aliases=3D"\ inet 192.168.0.1/24 inet6 fe80::1/64 inet6 2001:6b8::/64" # ifconfig vtnet0 vtnet0: flags=3D8943 metric 0 mtu 1500 options=3D80028 ether 58:9c:fc:0b:99:97 inet 192.168.0.1 netmask 0xffffff00 broadcast 192.168.0.255 inet6 fe80::1%vtnet0 prefixlen 64 scopeid 0x2 inet6 2001:6b8:: prefixlen 64 media: Ethernet 10Gbase-T status: active nd6 options=3D1 -m --=20 Michael Gmelin From owner-freebsd-net@freebsd.org Tue Jul 7 10:24:44 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 878F635D3AC for ; Tue, 7 Jul 2020 10:24:44 +0000 (UTC) (envelope-from hrs@FreeBSD.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 4B1JTS37kMz4NJ2 for ; Tue, 7 Jul 2020 10:24:44 +0000 (UTC) (envelope-from hrs@FreeBSD.org) Received: by mailman.nyi.freebsd.org (Postfix) id 6BB2C35D3AB; Tue, 7 Jul 2020 10:24:44 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 6B6BD35D33D for ; Tue, 7 Jul 2020 10:24:44 +0000 (UTC) (envelope-from hrs@FreeBSD.org) Received: from smtp.freebsd.org (smtp.freebsd.org [IPv6:2610:1c1:1:606c::24b:4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B1JTS2DV8z4NGs; Tue, 7 Jul 2020 10:24:44 +0000 (UTC) (envelope-from hrs@FreeBSD.org) Received: from localhost (unknown [IPv6:2400:4051:a743:3c00:16:ceff:fe34:2700]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) (Authenticated sender: hrs) by smtp.freebsd.org (Postfix) with ESMTPSA id 6BEEE2BAF4; Tue, 7 Jul 2020 10:24:43 +0000 (UTC) (envelope-from hrs@FreeBSD.org) Date: Tue, 07 Jul 2020 19:02:52 +0900 (JST) Message-Id: <20200707.190252.2262901305208864620.hrs@FreeBSD.org> To: zeising+freebsd@daemonic.se Cc: net@FreeBSD.org Subject: Re: Specifying link-local address in rc.conf From: Hiroki Sato In-Reply-To: <713e1f3e-4dd9-8dcf-c6d2-15c684bdce5b@daemonic.se> References: <713e1f3e-4dd9-8dcf-c6d2-15c684bdce5b@daemonic.se> X-Old-PGPkey-fingerprint: BDB3 443F A5DD B3D0 A530 FFD7 4F2C D3D8 2793 CF2D X-PGPkey-fingerprint: 6C0D 2353 27CF 80C7 901E FDD2 DBB0 7DC6 6F1F 737F X-Mailer: Mew version 6.8 on Emacs 26.3 Mime-Version: 1.0 Content-Type: Multipart/Signed; protocol="application/pgp-signature"; micalg=pgp-sha512; boundary="--Security_Multipart(Tue_Jul__7_19_02_52_2020_526)--" Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 07 Jul 2020 10:24:44 -0000 ----Security_Multipart(Tue_Jul__7_19_02_52_2020_526)-- Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit Niclas Zeising wrote in <713e1f3e-4dd9-8dcf-c6d2-15c684bdce5b@daemonic.se>: ze> Hi! ze> Is it possible to specify a link-local address in rc.conf, and get ze> only that link-local address? The following is a typical configuration if you want to disable EUI-64 LLA: ifconfig_vtnet0="inet ...." ifconfig_vtnet0_ipv6="inet6 -auto_linklocal" ifconfig_vtnet0_alias0="inet6 fe80::1/64" ifconfig_vtnet0_alias1="inet6 2001:6b8::1/64" Address family keyword is mandatory. Most of address configurations with no AF keyword are handled as expected, but some are not. -- Hiroki ----Security_Multipart(Tue_Jul__7_19_02_52_2020_526)-- Content-Type: application/pgp-signature Content-Transfer-Encoding: 7bit -----BEGIN PGP SIGNATURE----- iMkEABMKAC4WIQRsDSNTJ8+Ax5Ae/dLbsH3Gbx9zfwUCXwRITBAcaHJzQGZyZWVi c2Qub3JnAAoJENuwfcZvH3N/y5UCCQEIcB4oc0Iz+h4Dm+XGPUJwIwoUzS3JB+mv /8ugkDhMY7/XF+GWjR4Rk6u8Q9r6E483wB1i9fdq9Kb1jgRygjrbAQIFHMGrDect EUTuQG4gnIeJoyayYKILVjR4F85mQNXEl7EzdaOa71D7ZVC3O4n6+c3+uwm3OLZz tNbZj8o/9pJXI08= =zkKT -----END PGP SIGNATURE----- ----Security_Multipart(Tue_Jul__7_19_02_52_2020_526)---- From owner-freebsd-net@freebsd.org Tue Jul 7 10:28:49 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 98AFC35D6AF for ; Tue, 7 Jul 2020 10:28:49 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 4B1JZ93cMcz4NRT for ; Tue, 7 Jul 2020 10:28:49 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 7BE1535D3C3; Tue, 7 Jul 2020 10:28:49 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 7BA3935D723 for ; Tue, 7 Jul 2020 10:28:49 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B1JZ92n7zz4NRS for ; Tue, 7 Jul 2020 10:28:49 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 43B46DC54 for ; Tue, 7 Jul 2020 10:28:49 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 067ASn2A014179 for ; Tue, 7 Jul 2020 10:28:49 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 067ASnSQ014178 for net@FreeBSD.org; Tue, 7 Jul 2020 10:28:49 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 166724] [re] if_re watchdog timeout Date: Tue, 07 Jul 2020 10:28:44 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 11.1-RELEASE X-Bugzilla-Keywords: needs-patch X-Bugzilla-Severity: Affects Many People X-Bugzilla-Who: eugen@freebsd.org X-Bugzilla-Status: In Progress X-Bugzilla-Resolution: X-Bugzilla-Priority: Normal X-Bugzilla-Assigned-To: yongari@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 07 Jul 2020 10:28:49 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D166724 --- Comment #58 from Eugene Grosbein --- (In reply to Alex Dupre from comment #57) I'm sure Readme.txt was created long time ago. OTOH, this may be driver-dependent.=20 For example, this works for Intel gigabit drivers (em and igb): loading pat= ched module overrides driver built in GENERIC. I cannot supply you with a refere= nce to source, sorry. --=20 You are receiving this mail because: You are on the CC list for the bug.= From owner-freebsd-net@freebsd.org Tue Jul 7 10:38:51 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 0A2D635DB01 for ; Tue, 7 Jul 2020 10:38:51 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 4B1Jnk6bywz4Ns6 for ; Tue, 7 Jul 2020 10:38:50 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id E0B3B35D759; Tue, 7 Jul 2020 10:38:50 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id DF63035DB00 for ; Tue, 7 Jul 2020 10:38:50 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B1Jnk5Qxmz4PBg for ; Tue, 7 Jul 2020 10:38:50 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 9E15CDCD1 for ; Tue, 7 Jul 2020 10:38:50 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 067AcoBM024621 for ; Tue, 7 Jul 2020 10:38:50 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 067AcoVg024620 for net@FreeBSD.org; Tue, 7 Jul 2020 10:38:50 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 166724] [re] if_re watchdog timeout Date: Tue, 07 Jul 2020 10:38:49 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 11.1-RELEASE X-Bugzilla-Keywords: needs-patch X-Bugzilla-Severity: Affects Many People X-Bugzilla-Who: eugen@freebsd.org X-Bugzilla-Status: In Progress X-Bugzilla-Resolution: X-Bugzilla-Priority: Normal X-Bugzilla-Assigned-To: yongari@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 07 Jul 2020 10:38:51 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D166724 --- Comment #59 from Eugene Grosbein --- (In reply to Ralf Wostrack from comment #43) Can you attach your change in a form of "diff -u" for unpatched and patched versions of the source file? --=20 You are receiving this mail because: You are on the CC list for the bug.= From owner-freebsd-net@freebsd.org Tue Jul 7 10:40:24 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 8C66935DBBE for ; Tue, 7 Jul 2020 10:40:24 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 4B1JqX3B9zz4PDw for ; Tue, 7 Jul 2020 10:40:24 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 6D40735D846; Tue, 7 Jul 2020 10:40:24 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 6D06035D8E9 for ; Tue, 7 Jul 2020 10:40:24 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B1JqX2JZvz4PN2 for ; Tue, 7 Jul 2020 10:40:24 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 32CBADCD8 for ; Tue, 7 Jul 2020 10:40:24 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 067AeOhO025934 for ; Tue, 7 Jul 2020 10:40:24 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 067AeOPf025933 for net@FreeBSD.org; Tue, 7 Jul 2020 10:40:24 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 166724] if_re(4): watchdog timeout Date: Tue, 07 Jul 2020 10:40:23 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 11.1-RELEASE X-Bugzilla-Keywords: needs-patch X-Bugzilla-Severity: Affects Many People X-Bugzilla-Who: koobs@FreeBSD.org X-Bugzilla-Status: In Progress X-Bugzilla-Resolution: X-Bugzilla-Priority: Normal X-Bugzilla-Assigned-To: yongari@FreeBSD.org X-Bugzilla-Flags: mfc-stable12? mfc-stable11? X-Bugzilla-Changed-Fields: short_desc flagtypes.name Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 07 Jul 2020 10:40:24 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D166724 Kubilay Kocak changed: What |Removed |Added ---------------------------------------------------------------------------- Summary|[re] if_re watchdog timeout |if_re(4): watchdog timeout Flags| |mfc-stable12?, | |mfc-stable11? --=20 You are receiving this mail because: You are on the CC list for the bug.= From owner-freebsd-net@freebsd.org Tue Jul 7 10:45:43 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 6417A35DF12 for ; Tue, 7 Jul 2020 10:45:43 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 4B1Jxg25KVz4Pyt for ; Tue, 7 Jul 2020 10:45:43 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 4600B35DF99; Tue, 7 Jul 2020 10:45:43 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 45C4E35DF11 for ; Tue, 7 Jul 2020 10:45:43 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B1Jxg1DCXz4PrS for ; Tue, 7 Jul 2020 10:45:43 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 0E31BE2AA for ; Tue, 7 Jul 2020 10:45:43 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 067AjgmT034588 for ; Tue, 7 Jul 2020 10:45:42 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 067AjgbC034587 for net@FreeBSD.org; Tue, 7 Jul 2020 10:45:42 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 166724] if_re(4): watchdog timeout Date: Tue, 07 Jul 2020 10:45:38 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 11.1-RELEASE X-Bugzilla-Keywords: needs-patch X-Bugzilla-Severity: Affects Many People X-Bugzilla-Who: avg@FreeBSD.org X-Bugzilla-Status: In Progress X-Bugzilla-Resolution: X-Bugzilla-Priority: Normal X-Bugzilla-Assigned-To: yongari@FreeBSD.org X-Bugzilla-Flags: mfc-stable12? mfc-stable11? X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 07 Jul 2020 10:45:43 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D166724 --- Comment #60 from Andriy Gapon --- (In reply to Eugene Grosbein from comment #58) If it works, then I think that it happens by accident and may be unreliable. It's not possible to add a module (in the sense of module_t) if a module wi= th the same name is already registered. See module_register() and linker_file_register_modules(). --=20 You are receiving this mail because: You are on the CC list for the bug.= From owner-freebsd-net@freebsd.org Tue Jul 7 10:58:29 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id CADB235E606 for ; Tue, 7 Jul 2020 10:58:29 +0000 (UTC) (envelope-from hrs@FreeBSD.org) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 4B1KDP55Jxz4QrG for ; Tue, 7 Jul 2020 10:58:29 +0000 (UTC) (envelope-from hrs@FreeBSD.org) Received: by mailman.nyi.freebsd.org (Postfix) id AEABE35E605; Tue, 7 Jul 2020 10:58:29 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id AE71135E4A1 for ; Tue, 7 Jul 2020 10:58:29 +0000 (UTC) (envelope-from hrs@FreeBSD.org) Received: from smtp.freebsd.org (smtp.freebsd.org [IPv6:2610:1c1:1:606c::24b:4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B1KDP4CvXz4Qnl; Tue, 7 Jul 2020 10:58:29 +0000 (UTC) (envelope-from hrs@FreeBSD.org) Received: from localhost (unknown [IPv6:2400:4051:a743:3c00:16:ceff:fe34:2700]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) (Authenticated sender: hrs) by smtp.freebsd.org (Postfix) with ESMTPSA id C80612BF54; Tue, 7 Jul 2020 10:58:28 +0000 (UTC) (envelope-from hrs@FreeBSD.org) Date: Tue, 07 Jul 2020 19:57:54 +0900 (JST) Message-Id: <20200707.195754.1353021909850880836.hrs@FreeBSD.org> To: zeising+freebsd@daemonic.se Cc: net@FreeBSD.org Subject: Re: ndp and routers with link-local addresses From: Hiroki Sato In-Reply-To: References: X-Old-PGPkey-fingerprint: BDB3 443F A5DD B3D0 A530 FFD7 4F2C D3D8 2793 CF2D X-PGPkey-fingerprint: 6C0D 2353 27CF 80C7 901E FDD2 DBB0 7DC6 6F1F 737F X-Mailer: Mew version 6.8 on Emacs 26.3 Mime-Version: 1.0 Content-Type: Multipart/Signed; protocol="application/pgp-signature"; micalg=pgp-sha512; boundary="--Security_Multipart(Tue_Jul__7_19_57_54_2020_166)--" Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 07 Jul 2020 10:58:29 -0000 ----Security_Multipart(Tue_Jul__7_19_57_54_2020_166)-- Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit Niclas Zeising wrote in : ze> However, if the interface on the router facing the client network only ze> has a link-local (and no global unicast) address, NDP neighbor ze> discovery breaks. This is related to the prefix discovery, not neighbor discovery (L2-L3 address resolution) in NDP. In the current implementation, just adding an interface route does not mean that the prefix is on-link. Adding the prefix (i.e. an address) on the interface or receiving an Router Advertisement message with a Prefix Information Option on the interface are the only ways to update the prefix list. Neighbor discovery does not work for communications to an address within the prefix not on the prefix list because the prefix is not considered as directly-connected. This restriction can be relaxed technically by adding the prefix to the list when a route for it is installed (also discussed in https://reviews.freebsd.org/D23695, and there are experimental patches to implement it). However, adding an address within the prefix is the safest option. Is there any specific reason why using the interface route for a directly-connected prefix, instead of adding an address on the interface? I am interested in this use case. Theoretically, a router can always have Subnet-Router anycast address on each interface and it works as an on-link prefix information. For this reason, KAME implementation does not support properly to use interface route for directly-connected prefixes. -- Hiroki ----Security_Multipart(Tue_Jul__7_19_57_54_2020_166)-- Content-Type: application/pgp-signature Content-Transfer-Encoding: 7bit -----BEGIN PGP SIGNATURE----- iMoEABMKAC4WIQRsDSNTJ8+Ax5Ae/dLbsH3Gbx9zfwUCXwRVMhAcaHJzQGZyZWVi c2Qub3JnAAoJENuwfcZvH3N/+WoCCQFPEp/4Y9Yhg4CbAeghd4XV2uOCRp15dY2C RLAnQmvoPp886EMtlANdlz+EGGICb1mdxx3MrkEpYZ/fT6sSLY76cgIJAabh8qZj PzKvxDQSth5aTO6lYCYfs+H1exs2YzY9j0HGLTicT3RJ0MJY1VNktH/re4dGmbxW n9gGTiyMv1oiur8l =Zvxm -----END PGP SIGNATURE----- ----Security_Multipart(Tue_Jul__7_19_57_54_2020_166)---- From owner-freebsd-net@freebsd.org Tue Jul 7 11:48:32 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id CC5AA35F133 for ; Tue, 7 Jul 2020 11:48:32 +0000 (UTC) (envelope-from hps@selasky.org) Received: from mail.turbocat.net (turbocat.net [88.99.82.50]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4B1LL74s18z4SwY for ; Tue, 7 Jul 2020 11:48:31 +0000 (UTC) (envelope-from hps@selasky.org) Received: from hps2020.home.selasky.org (unknown [178.17.145.105]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by mail.turbocat.net (Postfix) with ESMTPSA id A8EF6260072; Tue, 7 Jul 2020 13:48:29 +0200 (CEST) Subject: Re: Multicast: membership to (*, G) group after leaving a (S, G) group To: Fabrice Colliot , freebsd-net@freebsd.org References: From: Hans Petter Selasky Message-ID: <2516812c-667c-d24a-d100-aea0f7e60b69@selasky.org> Date: Tue, 7 Jul 2020 13:48:07 +0200 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:68.0) Gecko/20100101 Thunderbird/68.8.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: 4B1LL74s18z4SwY X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of hps@selasky.org designates 88.99.82.50 as permitted sender) smtp.mailfrom=hps@selasky.org X-Spamd-Result: default: False [-2.77 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; ARC_NA(0.00)[]; MID_RHS_MATCH_FROM(0.00)[]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+a:mail.turbocat.net]; NEURAL_HAM_LONG(-1.02)[-1.021]; TAGGED_RCPT(0.00)[]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[selasky.org]; TO_MATCH_ENVRCPT_SOME(0.00)[]; NEURAL_HAM_SHORT(-0.51)[-0.515]; RCPT_COUNT_TWO(0.00)[2]; NEURAL_HAM_MEDIUM(-0.93)[-0.935]; FREEMAIL_TO(0.00)[gmail.com,freebsd.org]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; RCVD_COUNT_TWO(0.00)[2]; ASN(0.00)[asn:24940, ipnet:88.99.0.0/16, country:DE]; RCVD_TLS_ALL(0.00)[] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 07 Jul 2020 11:48:32 -0000 On 2020-07-07 12:01, Fabrice Colliot wrote: > Hi, > > I'm using smcroute to join and leave multicast groups and I don't > understand the behavior of FreeBSD when the group is left. > > Here is what I do: > > smcroute join em1 10.3.4.5 224.0.55.55 > ifmcstat -i em1 > em1: > inet 10.10.0.1 > igmpv3 rv 2 qi 125 qri 10 uri 3 > group 224.0.55.55 mode include > mcast-macaddr 01:00:5e:00:37:37 > group 224.0.0.1 mode exclude > mcast-macaddr 01:00:5e:00:00:01 > > smcroute leave em1 10.3.4.5 224.0.55.55 > ifmcstat -i em1 > em1: > inet 10.10.0.1 > igmpv3 rv 2 qi 125 qri 10 uri 3 > group 224.0.55.55 mode undefined > mcast-macaddr 01:00:5e:00:37:37 > group 224.0.0.1 mode exclude > mcast-macaddr 01:00:5e:00:00:01 > > At this point, I expected to have no membership left on em1 for 224.0.55.55 > but ifmcstat shows that the interface is still a member of the group but in > undefined mode. > > I was wondering if anybody could tell me why the group membership seems to > be transitioned to a (*, G) membership when all the (S, G) memberships are > removed. > Which version of FreeBSD is this? --HPS From owner-freebsd-net@freebsd.org Tue Jul 7 11:55:17 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 41FD435F179 for ; Tue, 7 Jul 2020 11:55:17 +0000 (UTC) (envelope-from f.colliot@gmail.com) Received: from mail-vs1-xe29.google.com (mail-vs1-xe29.google.com [IPv6:2607:f8b0:4864:20::e29]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B1LTw3Sn2z4TP8 for ; Tue, 7 Jul 2020 11:55:16 +0000 (UTC) (envelope-from f.colliot@gmail.com) Received: by mail-vs1-xe29.google.com with SMTP id x205so2129363vsc.11 for ; Tue, 07 Jul 2020 04:55:16 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=cR0RipAzCWypDcMPFiKiMjiqHG10ALuuYBokodI4f/g=; b=lvMp/tMp72kUYCUdEFMv9HH/oYE2dDpBc6zTpXedpjI2o/IvvdtitQxyf47N5FwTOh uplNZbNsGhONX5Vt+9ucAdeHcHenxk5c1hKAaPmUdqMhFBL4r6uGDrZlBQfkdwDWj/0h YxxOl09MESfDO/gxI02NqNpLVAqNQgqbAyuzwl3XzxA46J8xY7aBAY4+HvPsoTFiKQhl HbQZMG/z4o4nJ+g/nq/DgUVXdEpuO0vJs7nbApVSRObyOek9cOso9+UvePHW9pxD665P 071WbBaNkLw/rxM1q3ixuzvpXwnr8VEGPJYplBIYrI7ZAG7jzVQvMiprs+SZm+ZU7doy 1RjA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=cR0RipAzCWypDcMPFiKiMjiqHG10ALuuYBokodI4f/g=; b=NrWOZBcOw3z9X5tzylAZBT5qI2jLgFz1VpUmkHsEovolO4Mm2xqSFdMuHyAry8XutE qiBt7glgHw4ZznCypAcgYkNwwLnlxgh5vUKsF1CxZrIHYWOIHOFt0G4te8s8GScNqnSU GdaE3ukVzwZcHF/TQnOBXkvfLEK7/9lJWHAmo3ITb9UCZ8f/HR4NZzhNYr/GLrjq3Ym2 Waxsn7GC5LiFF0gnZpU8T/8Cgl2OoHogz1pFnvWOlfJgH+PeCrFQc13aFlJsFIUZMu0j nvBnaUkIWpMS6EBONjx5trYkD2sAwsMTNcRlD+yPYBtoPVhgHctPs712Fk9S/47l3RKU iRqQ== X-Gm-Message-State: AOAM531w44WuEvVPIxMVRifQcJOOOugBTdwQOQ6aFvDEYfWkGfaaR2BX JSCMj7MNWjnOBb0xJydhBwFtS+eZChJ1o4+iXnuCtJs3taw= X-Google-Smtp-Source: ABdhPJyDCtDoR3dRzXXX2bzQtNhnkamfOI/YXMB8lNu+mgHFPHaeh6hwklHBe4GzGGRObuRA3VnD+Y/OLHtPkaJS1VQ= X-Received: by 2002:a67:8084:: with SMTP id b126mr13673777vsd.163.1594122915525; Tue, 07 Jul 2020 04:55:15 -0700 (PDT) MIME-Version: 1.0 References: <2516812c-667c-d24a-d100-aea0f7e60b69@selasky.org> In-Reply-To: <2516812c-667c-d24a-d100-aea0f7e60b69@selasky.org> From: Fabrice Colliot Date: Tue, 7 Jul 2020 13:55:04 +0200 Message-ID: Subject: Re: Multicast: membership to (*, G) group after leaving a (S, G) group To: Hans Petter Selasky Cc: freebsd-net@freebsd.org X-Rspamd-Queue-Id: 4B1LTw3Sn2z4TP8 X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=lvMp/tMp; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of fcolliot@gmail.com designates 2607:f8b0:4864:20::e29 as permitted sender) smtp.mailfrom=fcolliot@gmail.com X-Spamd-Result: default: False [-3.91 / 15.00]; RCVD_TLS_ALL(0.00)[]; ARC_NA(0.00)[]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; NEURAL_HAM_MEDIUM(-0.96)[-0.965]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; FREEMAIL_FROM(0.00)[gmail.com]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-net@freebsd.org]; NEURAL_HAM_LONG(-1.01)[-1.007]; TO_MATCH_ENVRCPT_SOME(0.00)[]; DKIM_TRACE(0.00)[gmail.com:+]; RCPT_COUNT_TWO(0.00)[2]; RCVD_IN_DNSWL_NONE(0.00)[2607:f8b0:4864:20::e29:from]; NEURAL_HAM_SHORT(-0.94)[-0.939]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; FREEMAIL_ENVFROM(0.00)[gmail.com]; RCVD_COUNT_TWO(0.00)[2]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; TAGGED_FROM(0.00)[]; DWL_DNSWL_NONE(0.00)[gmail.com:dkim] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.33 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 07 Jul 2020 11:55:17 -0000 Sorry, I forgot to mention it. I've tried on FreeBSD 11.3 and FreeBSD 12.0. /Fabrice On Tue, Jul 7, 2020 at 1:48 PM Hans Petter Selasky wrote: > On 2020-07-07 12:01, Fabrice Colliot wrote: > > Hi, > > > > I'm using smcroute to join and leave multicast groups and I don't > > understand the behavior of FreeBSD when the group is left. > > > > Here is what I do: > > > > smcroute join em1 10.3.4.5 224.0.55.55 > > ifmcstat -i em1 > > em1: > > inet 10.10.0.1 > > igmpv3 rv 2 qi 125 qri 10 uri 3 > > group 224.0.55.55 mode include > > mcast-macaddr 01:00:5e:00:37:37 > > group 224.0.0.1 mode exclude > > mcast-macaddr 01:00:5e:00:00:01 > > > > smcroute leave em1 10.3.4.5 224.0.55.55 > > ifmcstat -i em1 > > em1: > > inet 10.10.0.1 > > igmpv3 rv 2 qi 125 qri 10 uri 3 > > group 224.0.55.55 mode undefined > > mcast-macaddr 01:00:5e:00:37:37 > > group 224.0.0.1 mode exclude > > mcast-macaddr 01:00:5e:00:00:01 > > > > At this point, I expected to have no membership left on em1 for > 224.0.55.55 > > but ifmcstat shows that the interface is still a member of the group but > in > > undefined mode. > > > > I was wondering if anybody could tell me why the group membership seems > to > > be transitioned to a (*, G) membership when all the (S, G) memberships > are > > removed. > > > > Which version of FreeBSD is this? > > --HPS > From owner-freebsd-net@freebsd.org Tue Jul 7 11:58:48 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 6F92935F6D5 for ; Tue, 7 Jul 2020 11:58:48 +0000 (UTC) (envelope-from hps@selasky.org) Received: from mail.turbocat.net (turbocat.net [88.99.82.50]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4B1LYz59Wbz4TVH for ; Tue, 7 Jul 2020 11:58:47 +0000 (UTC) (envelope-from hps@selasky.org) Received: from hps2020.home.selasky.org (unknown [178.17.145.105]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by mail.turbocat.net (Postfix) with ESMTPSA id ED557260072; Tue, 7 Jul 2020 13:58:45 +0200 (CEST) Subject: Re: Multicast: membership to (*, G) group after leaving a (S, G) group To: Fabrice Colliot Cc: freebsd-net@freebsd.org References: <2516812c-667c-d24a-d100-aea0f7e60b69@selasky.org> From: Hans Petter Selasky Message-ID: <4e46bc8f-26c3-85c0-7ee0-748444042c2f@selasky.org> Date: Tue, 7 Jul 2020 13:58:23 +0200 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:68.0) Gecko/20100101 Thunderbird/68.8.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: 4B1LYz59Wbz4TVH X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of hps@selasky.org designates 88.99.82.50 as permitted sender) smtp.mailfrom=hps@selasky.org X-Spamd-Result: default: False [-2.77 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; MID_RHS_MATCH_FROM(0.00)[]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+a:mail.turbocat.net:c]; NEURAL_HAM_LONG(-1.02)[-1.021]; TAGGED_RCPT(0.00)[]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[selasky.org]; TO_MATCH_ENVRCPT_SOME(0.00)[]; NEURAL_HAM_SHORT(-0.51)[-0.512]; RCPT_COUNT_TWO(0.00)[2]; NEURAL_HAM_MEDIUM(-0.93)[-0.933]; FREEMAIL_TO(0.00)[gmail.com]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:24940, ipnet:88.99.0.0/16, country:DE]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 07 Jul 2020 11:58:48 -0000 On 2020-07-07 13:55, Fabrice Colliot wrote: > Sorry, I forgot to mention it. I've tried on FreeBSD 11.3 and FreeBSD 12.0. > Can you try 12.0 using a 12-stable kernel and see if there are any differences? --HPS From owner-freebsd-net@freebsd.org Tue Jul 7 12:04:01 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id CC80536096D for ; Tue, 7 Jul 2020 12:04:01 +0000 (UTC) (envelope-from zeising+freebsd@daemonic.se) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 4B1Lh12pJKz4VrG for ; Tue, 7 Jul 2020 12:04:01 +0000 (UTC) (envelope-from zeising+freebsd@daemonic.se) Received: by mailman.nyi.freebsd.org (Postfix) id 6019F360D97; Tue, 7 Jul 2020 12:04:01 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 5FDEF36096C for ; Tue, 7 Jul 2020 12:04:01 +0000 (UTC) (envelope-from zeising+freebsd@daemonic.se) Received: from mail.daemonic.se (mail.daemonic.se [176.58.89.161]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4B1Lh10Ll0z4Vtb; Tue, 7 Jul 2020 12:04:00 +0000 (UTC) (envelope-from zeising+freebsd@daemonic.se) Received: from cid.daemonic.se (localhost [IPv6:::1]) by mail.daemonic.se (Postfix) with ESMTP id 4B1Lgs1vJfz3mgp; Tue, 7 Jul 2020 12:03:53 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=daemonic.se; h= content-transfer-encoding:content-language:content-type :content-type:in-reply-to:mime-version:user-agent:date:date :message-id:from:from:references:subject:subject:received :received; s=20151023; t=1594123432; bh=j5cBRhG7LaokBq1MPxjWmZrg XR7tjRwKwmcg++F9zyY=; b=lYakevWlFhYV/LSJRCtOToJ4Uj68/XKy9mrdz40w /18z/3sq6w+GKXXWO3Oa8ZTIHWt/4JeoU+XZAwgec47b8fn3XrN3yYvgnIPO4EzW KhPKwLEjpFq9L7qeVXspkXfJboq74OLUGHVqmSg9ctzP/FYRJ7U9hmK86c6JZW8Y Zf8= X-Virus-Scanned: amavisd-new at daemonic.se Received: from mail.daemonic.se ([127.0.0.1]) (using TLS with cipher ECDHE-RSA-AES128-GCM-SHA256) by cid.daemonic.se (mailscanner.daemonic.se [127.0.0.1]) (amavisd-new, port 10587) with ESMTPS id Pbv4RoRmaTsh; Tue, 7 Jul 2020 12:03:52 +0000 (UTC) Received: from garnet.daemonic.se (unknown [IPv6:2001:470:dca9:201:c01f:220e:48eb:d4e3]) by mail.daemonic.se (Postfix) with ESMTPSA id 4B1Lgr46yVz3mMv; Tue, 7 Jul 2020 12:03:52 +0000 (UTC) Subject: Re: ndp and routers with link-local addresses To: Hiroki Sato Cc: net@FreeBSD.org References: <20200707.195754.1353021909850880836.hrs@FreeBSD.org> From: Niclas Zeising Message-ID: Date: Tue, 7 Jul 2020 14:03:52 +0200 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:68.0) Gecko/20100101 Thunderbird/68.10.0 MIME-Version: 1.0 In-Reply-To: <20200707.195754.1353021909850880836.hrs@FreeBSD.org> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: 4B1Lh10Ll0z4Vtb X-Spamd-Bar: ---- Authentication-Results: mx1.freebsd.org; none X-Spamd-Result: default: False [-4.00 / 15.00]; REPLY(-4.00)[]; ASN(0.00)[asn:36236, ipnet:176.58.89.0/24, country:US]; TAGGED_FROM(0.00)[freebsd] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 07 Jul 2020 12:04:01 -0000 On 2020-07-07 12:57, Hiroki Sato wrote: > Niclas Zeising wrote > in : > > ze> However, if the interface on the router facing the client network only > ze> has a link-local (and no global unicast) address, NDP neighbor > ze> discovery breaks. > > This is related to the prefix discovery, not neighbor discovery > (L2-L3 address resolution) in NDP. In the current implementation, > just adding an interface route does not mean that the prefix is > on-link. Adding the prefix (i.e. an address) on the interface or > receiving an Router Advertisement message with a Prefix Information > Option on the interface are the only ways to update the prefix list. What is needed to mark a prefix as being on-link? What does the relevant RFCs say? (I haven't looked myself, to be honest). > > Neighbor discovery does not work for communications to an address > within the prefix not on the prefix list because the prefix is not > considered as directly-connected. > > This restriction can be relaxed technically by adding the prefix to > the list when a route for it is installed (also discussed in > https://reviews.freebsd.org/D23695, and there are experimental > patches to implement it). However, adding an address within the > prefix is the safest option. Is there any specific reason why using > the interface route for a directly-connected prefix, instead of > adding an address on the interface? I am interested in this use > case. On networks where SLAAC is in use, there is no need for a global address on the router interface facing the clients, since all communication with the router is done on the link-local address, and clients has the router link-local address as their next hop. In my case, nothing is preventing me from adding an address in the correct network on the interface, and getting this to work. I was just surprised it didn't work without a global unicast address, since it works on Linux, and both information I've read about the topic, as well as people I've talked to, say that it should be possible to only have a link-local address on the router. This has more to do with interoperability, and conformance with other IPv6 implementations (the one in Linux). I haven't tested other Routers, such as Cisco or Juniper, though. > > Theoretically, a router can always have Subnet-Router anycast address > on each interface and it works as an on-link prefix information. For > this reason, KAME implementation does not support properly to use > interface route for directly-connected prefixes. I'm not sure that I understand this part. I know what a subnet router anycast address is, and how to assign it, and I know what anycast is. But I'm not sure I understand the comment about the KAME implementation not properly supporting interface routes for directly connected prefixes. Regards -- Niclas From owner-freebsd-net@freebsd.org Tue Jul 7 12:21:19 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 17FD8361045 for ; Tue, 7 Jul 2020 12:21:19 +0000 (UTC) (envelope-from noreply@track-my-url.com) Received: from berra-156.mfzt.com (berra-156.mfzt.com [178.18.201.156]) by mx1.freebsd.org (Postfix) with ESMTP id 4B1M3y3Y1Sz4WYk for ; Tue, 7 Jul 2020 12:21:18 +0000 (UTC) (envelope-from noreply@track-my-url.com) DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; s=key2; d=mfzt.com; h=To:Subject:Message-ID:Date:From:Reply-To:MIME-Version:List-Unsubscribe:Content-Type:Content-Transfer-Encoding; bh=gV4QKSWzeqrYdVUC4ODpxU46oU4=; b=GurnPgZOTsFCAgLe5tLzRzppUqcaThCVaVnrCcGXrmJ5Xe6dgAS3QV1pddppEz+PVELTngmuJCoP KlwANKRQWwbdg/aeb85//O7Xmasogfg4YrDJjcu/Q0PUW7g8Xuv/lqnIWlTNLJgoU7IOMSSmxExV jk2bKk5zBUXFbcdtmwI= DomainKey-Signature: a=rsa-sha1; c=nofws; q=dns; s=key2; d=tspb.org.tr; b=dcrH5bxVOyCxYRLBipn8WyveQEY988Uv0oJrrlFCnwZywOmeT3KXS3D+ulYbRaQcRGrnwaJE/cZv fBvQZt9jWyrTH3y+4mrwx96ptW8dKhEt7JBUBL0OeuKKrCyb5nZ+avKP8GRCS1Xd+IAZX5RcWccB qMIc9d9Kyz6zJf+z0FE=; To: freebsd-net@freebsd.org Subject: =?UTF-8?B?QklTVC0zMCBFbmRla3MgdmUgUGF5IFZhZGVsaSDEsMWfbGVtIFPDtnpsZcWfbWVsZXJpeWxlIFbEsE9QJ3RhIFlhdMSxcsSxbSBGxLFyc2F0bGFyxLE=?= Message-ID: Date: Tue, 07 Jul 2020 12:09:46 +0000 From: "=?UTF-8?B?VMO8cmtpeWUgU2VybWF5ZSBQaXlhc2FsYXLEsSBCaXJsacSfaQ==?=" Reply-To: info@tspb.org.tr MIME-Version: 1.0 X-Mailer-LID: 469 X-Mailer-RecptId: 2389711 X-Mailer-SID: 5284 X-Mailer-Sent-By: 15 X-Rspamd-Queue-Id: 4B1M3y3Y1Sz4WYk X-Spamd-Bar: +++++++ Authentication-Results: mx1.freebsd.org; dkim=pass header.d=mfzt.com header.s=key2 header.b=GurnPgZO; dmarc=fail reason="No valid SPF, DKIM not aligned (relaxed)" header.from=tspb.org.tr (policy=none); spf=none (mx1.freebsd.org: domain of noreply@track-my-url.com has no SPF policy when checking 178.18.201.156) smtp.mailfrom=noreply@track-my-url.com X-Spamd-Result: default: False [7.39 / 15.00]; HAS_REPLYTO(0.00)[info@tspb.org.tr]; REPLYTO_ADDR_EQ_FROM(0.00)[]; TO_DN_NONE(0.00)[]; DKIM_TRACE(0.00)[mfzt.com:+]; FORGED_SENDER(0.30)[info@tspb.org.tr,noreply@track-my-url.com]; RCVD_COUNT_ZERO(0.00)[0]; AUTOGEN_PHP_SPAMMY(1.00)[]; HAS_INTERSPIRE_SIG(1.00)[]; R_MIXED_CHARSET(2.67)[subject]; MIME_TRACE(0.00)[0:+,1:+,2:~]; FROM_NEQ_ENVFROM(0.00)[info@tspb.org.tr,noreply@track-my-url.com]; ASN(0.00)[asn:50941, ipnet:178.18.201.0/24, country:TR]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-0.08)[-0.077]; R_DKIM_ALLOW(-0.20)[mfzt.com:s=key2]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_SPAM_SHORT(0.83)[0.825]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; HAS_PHPMAILER_SIG(0.00)[]; PHISHING(0.76)[tspb.org.tr->n-mailer-premium.com]; HAS_LIST_UNSUB(-0.01)[]; RCPT_COUNT_ONE(0.00)[1]; MANY_INVISIBLE_PARTS(0.10)[2]; NEURAL_SPAM_LONG(1.02)[1.025]; R_SPF_NA(0.00)[no SPF record]; GREYLIST(0.00)[pass,body]; DMARC_POLICY_SOFTFAIL(0.10)[tspb.org.tr : No valid SPF, DKIM not aligned (relaxed), none] X-Spam: Yes Content-Type: text/plain; format=flowed; charset="UTF-8" Content-Transfer-Encoding: 8bit X-Content-Filtered-By: Mailman/MimeDel 2.1.33 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 07 Jul 2020 12:21:19 -0000 TSPB Birlikte Eğitim Mesleki Gelişim Eğitimleri Bülteni Daha İyi Görüntülemek İçin Tıklayın [http://track-2.n-mailer-premium.com/1101D2389711|10019c00fdf926bb981d59ee664f79715a6a|01015284|0011469|00102400.html]TSPB Birlikte Eğitim Mesleki Gelişim Eğitimleri "BIST-30 Endeks ve Pay Vadeli İşlem Sözleşmeleriyle VİOP'ta Yatırım Fırsatları" - Online Eğitim"Zoom"uygulaması üzerinden gerçekleştirilecektir. Eğitimin 25 kişilik kontenjanı bulunmaktadır. Başvurularını gerçekleştirilen katılımcılara online eğitime giriş için gerekli bilgiler iletilecektir. Başvuru için: www.tspb.org.tr [http://track-2.n-mailer-premium.com/0010L2389711|10015284|001122069|1001T.html] Üyelik ve başvurularınızla ilgili sorularınız için: info@birlikteeğitim.org [mailto:info@birlikteeğitim.org] ve ya aşağıdaki telefon numarasından bize ulaşabilirsiniz. Eğitmen: Tolga Uysal-Deriva Danışmanlık& Eğitim Yönetici Ortak Eğitim Tarihi: 16 Temmuz 2020 Eğitim Süresi: ½ Gün Ders Saati: 13:30-17:30 Eğitim Ücreti: 200 TL (KDV dahil, kişi başı) Eğitim Yeri: Online Eğitim-Zoom Başvuru: www.tspb.org.tr [http://track-2.n-mailer-premium.com/1010L2389711|00105284|111022069|0010T.html] TSPB Birlikte Eğitim Büyükdere Caddesi No: 173 1.Levent Plaza A Blok Kat4 Şişli-İstanbul Telefon: 0212 280 85 67 info@birlikteegitim.org [mailto:info@birlikteegitim.org] www.tspb.org.tr [http://track-2.n-mailer-premium.com/1010L2389711|11005284|10015892|0011T.html] VİOP BIST-30 ve paya dayalı vadeli işlem sözleşmeleri nasıl işler? Spot hisse senedi portföyünüzün değerini VİOP vadeli işlem sözleşmeleriyle nasıl korursunuz? Düşük bir teminatla yüksek kazanç elde etmek mümkün mü? VİOP kaldıraç özelliğini nasıl fırsata çevirebilirsiniz? Spottan almak istediğiniz hisseyi bundan çok daha az maliyetle VİOP'da alabileceğinizi biliyor musunuz? Farklı vadeler veya ürünler arasındaki arbitraj fırsatlarından nasıl yararlanabilirsiniz? Risksiz kazanç mümkün mü? 16 Temmuz 2020 tarihinde "BIST-30 Endeks ve Pay Vadeli İşlem Sözleşmeleriyle VİOP'ta Yatırım Fırsatları" online eğitimimize bekliyoruz. EĞİTİM KONULARI Vadeli İşlem ve Opsiyon Piyasası (VİOP) VİOP Hakkında Vadeli İşlem Borsalarının Temel Fonksiyonu Vadeli İşlem (Future) Nedir? Nasıl İşler? VİOP'ta İşlem Gören Dayanak Varlıklar BIST-30 Vadeli İşlem Sözleşmesi Sözleşme Unsurları Açık Pozisyon Kavramı ve Yatırım Stratejisinde Kullanımı Teminatlandırma ve Teminat Tamamlama Çağrısının Oluşumu Başlangıç/ Sürdürme Teminatı SPAN Metodu Örnek Uygulamalarla: Pozisyonlarınn Güncellenmesi ve Kar Zararların Hesaplanması Yatırım Amaçlı İşlemler ve Kaldıraç Etkisi BIST-30 ile Portföy Korunması Yayılma Stratejileri Vadeler Arasında Ürünler Arasında Taşıma Maliyeti Modeli ve Fiyatlama Paya Dayalı Vadeli İşlem Sözleşmeleri Spot Pay İşlemleri ile Pay Vadeli İşlemler Arasındaki Farklar Teminat ve Kaldıraç Özellikleri Paya Dayalı Vadeli Sözleşmelerinde İşlem Gerçekleştirme ve Vade Sonu Paya Dayalı Vadeli İşlem Sözleşmelerinde Uzlaşma (Takas) Piyasa Yapıcılık Baz RiskiBu e-posta tarafınıza TSPB tarafından oluşturulan üye veritabanına kayıtlı olduğunuz için gönderilmiştir.Beni bu listeden çıkar [http://track-2.n-mailer-premium.com/1010U2389711|10109c00fdf926bb981d59ee664f79715a6a|0110469|01015284.html] From owner-freebsd-net@freebsd.org Tue Jul 7 12:40:43 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 41A57361E2E for ; Tue, 7 Jul 2020 12:40:43 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 4B1MVM155Jz4Y0d for ; Tue, 7 Jul 2020 12:40:43 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 2536036200B; Tue, 7 Jul 2020 12:40:43 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 24FF8361E2D for ; Tue, 7 Jul 2020 12:40:43 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B1MVM0FWwz4YCL for ; Tue, 7 Jul 2020 12:40:43 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id E1840F78D for ; Tue, 7 Jul 2020 12:40:42 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 067Cegrt052764 for ; Tue, 7 Jul 2020 12:40:42 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 067CegWv052762 for net@FreeBSD.org; Tue, 7 Jul 2020 12:40:42 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 166724] if_re(4): watchdog timeout Date: Tue, 07 Jul 2020 12:40:43 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 11.1-RELEASE X-Bugzilla-Keywords: needs-patch X-Bugzilla-Severity: Affects Many People X-Bugzilla-Who: eugen@freebsd.org X-Bugzilla-Status: In Progress X-Bugzilla-Resolution: X-Bugzilla-Priority: Normal X-Bugzilla-Assigned-To: yongari@FreeBSD.org X-Bugzilla-Flags: mfc-stable12? mfc-stable11? X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 07 Jul 2020 12:40:43 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D166724 --- Comment #61 from Eugene Grosbein --- (In reply to Andriy Gapon from comment #60) If stand-alone module is loaded by loader, which one is registered - stand-alone or built in the kernel? --=20 You are receiving this mail because: You are on the CC list for the bug.= From owner-freebsd-net@freebsd.org Tue Jul 7 12:49:33 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 60DF6362296 for ; Tue, 7 Jul 2020 12:49:33 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 4B1MhY1zMHz4YNZ for ; Tue, 7 Jul 2020 12:49:33 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 421A336238A; Tue, 7 Jul 2020 12:49:33 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 41DE2361FE0 for ; Tue, 7 Jul 2020 12:49:33 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B1MhY13fHz4YfP for ; Tue, 7 Jul 2020 12:49:33 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 04475FA9E for ; Tue, 7 Jul 2020 12:49:33 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 067CnWEO063478 for ; Tue, 7 Jul 2020 12:49:32 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 067CnWQJ063477 for net@FreeBSD.org; Tue, 7 Jul 2020 12:49:32 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 166724] if_re(4): watchdog timeout Date: Tue, 07 Jul 2020 12:49:33 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 11.1-RELEASE X-Bugzilla-Keywords: needs-patch X-Bugzilla-Severity: Affects Many People X-Bugzilla-Who: eugen@freebsd.org X-Bugzilla-Status: In Progress X-Bugzilla-Resolution: X-Bugzilla-Priority: Normal X-Bugzilla-Assigned-To: yongari@FreeBSD.org X-Bugzilla-Flags: mfc-stable12? mfc-stable11? X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 07 Jul 2020 12:49:33 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D166724 --- Comment #62 from Eugene Grosbein --- (In reply to Andriy Gapon from comment #60) I've just checked it out with 11.4-RELEASE/amd64 in Virtualbox adding if_re_load=3D"YES" to /boot/loader.conf and booting GENERIC kernel. First, loader successfully loads kernel then if_re.ko Then kernel starts and after the line "FreeBSD clang version 10.0.0 (...)" = it prints: module_register: cannot register pci/re from kernel: already loaded from if_re.ko So, the module has priority in case of /boot/loader.conf or /boot/nextboot.= conf --=20 You are receiving this mail because: You are on the CC list for the bug.= From owner-freebsd-net@freebsd.org Tue Jul 7 12:51:45 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 8629E36231F for ; Tue, 7 Jul 2020 12:51:45 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 4B1Ml51NHdz4Yx5 for ; Tue, 7 Jul 2020 12:51:45 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 2D5463621BE; Tue, 7 Jul 2020 12:51:45 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 2D13B361FF8 for ; Tue, 7 Jul 2020 12:51:45 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B1Ml50WP1z4YmC for ; Tue, 7 Jul 2020 12:51:45 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id EA953F7D9 for ; Tue, 7 Jul 2020 12:51:44 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 067Cpirb067200 for ; Tue, 7 Jul 2020 12:51:44 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 067Cpiaw067199 for net@FreeBSD.org; Tue, 7 Jul 2020 12:51:44 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 166724] if_re(4): watchdog timeout Date: Tue, 07 Jul 2020 12:51:45 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 11.1-RELEASE X-Bugzilla-Keywords: needs-patch X-Bugzilla-Severity: Affects Many People X-Bugzilla-Who: laszlo@karolyi.hu X-Bugzilla-Status: In Progress X-Bugzilla-Resolution: X-Bugzilla-Priority: Normal X-Bugzilla-Assigned-To: yongari@FreeBSD.org X-Bugzilla-Flags: mfc-stable12? mfc-stable11? X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 07 Jul 2020 12:51:45 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D166724 --- Comment #63 from L=C3=A1szl=C3=B3 K=C3=A1rolyi --- (In reply to Eugene Grosbein from comment #62) Glad to hear that. Now I only need a source where I can compile and load from, and I'll be gone load testing for a while on my gigabit connected bare metal server. --=20 You are receiving this mail because: You are on the CC list for the bug.= From owner-freebsd-net@freebsd.org Tue Jul 7 15:10:38 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id A62CC364C96 for ; Tue, 7 Jul 2020 15:10:38 +0000 (UTC) (envelope-from freebsd@grem.de) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 4B1QqL1Sxjz3Slb for ; Tue, 7 Jul 2020 15:10:38 +0000 (UTC) (envelope-from freebsd@grem.de) Received: by mailman.nyi.freebsd.org (Postfix) id 308FE364C95; Tue, 7 Jul 2020 15:10:38 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 30545364D00 for ; Tue, 7 Jul 2020 15:10:38 +0000 (UTC) (envelope-from freebsd@grem.de) Received: from mail.evolve.de (mail.evolve.de [213.239.217.29]) (using TLSv1.2 with cipher ECDHE-RSA-CHACHA20-POLY1305 (256/256 bits)) (Client CN "mail.evolve.de", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B1QqH02Qpz3SYV for ; Tue, 7 Jul 2020 15:10:34 +0000 (UTC) (envelope-from freebsd@grem.de) Received: by mail.evolve.de (OpenSMTPD) with ESMTP id ea524557; Tue, 7 Jul 2020 15:10:31 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=grem.de; h=date:from:to:cc :subject:message-id:in-reply-to:references:mime-version :content-type:content-transfer-encoding; s=20180501; bh=FsnQBMnX jkalfLk1IziWGznYuis=; b=TM4jtfYyKrSvAZNuyF3+Ojv1SZ7wV9euSwRcQ3Xy P1+ckfDDcX4w12M8drHHhVtP1vilfQrBrSKRr7jCl7eJHcT1H1w/utiiwdJoHqVM xRMb7QM0sND6fKhT+dRorddUGbxHQNTQ/cnuJIF2BFnISPFcET3QNoxOO+TgYyqm 4jtkisJ+Tb8KAuKWVSctLXX+fmQcB40Bnsi7V7LTOQLITr9lhfTf6Bh2bIqTB8sa 04pn7yiDA6wbNuhA7B5/NA7wk6x2eq+g81+UAhgQXNfjXy9/sSAAq4B/8U9pdzlw xekb4YdJNyM3/hfdm2hhUIkcLweohnDs1E9Hp/pzEK9PDw== DomainKey-Signature: a=rsa-sha1; c=nofws; d=grem.de; h=date:from:to:cc :subject:message-id:in-reply-to:references:mime-version :content-type:content-transfer-encoding; q=dns; s=20180501; b=qP Tvo7Jrrf5cZZ8HbEjeOs7dFhm/+vlyTqkR2UQSUeZA64EInp2bd5T+XzTvOZhO4G ExCg1epRultY+s8gLaGXr0cBKmMye5JHOj9J0NfcHD+BHffu55by3Dww3b2mFp4+ o6s4vR+hoLlaPjWK1eJ25SxlUI7HdJOQWS6ELkUMveWHptnJzi+GlsHIs/tMoGOO fYwrzjiAxLN41D2UqJKwgYRwfeV342x6nwAK0AP1s/3Ml4v0B2pOBtpJGCUu1omH pdAVROKAHsdieMlNKQujqcqRw65AtNtJDd+a7/NeUjCHUu29bWEwszOWBjjDE2yw JKSLgO0Q1V4jI5D++czA== Received: by mail.evolve.de (OpenSMTPD) with ESMTPSA id 6b6dd148 (TLSv1.2:ECDHE-RSA-CHACHA20-POLY1305:256:NO); Tue, 7 Jul 2020 15:10:29 +0000 (UTC) Date: Tue, 7 Jul 2020 17:10:27 +0200 From: Michael Gmelin To: Niclas Zeising Cc: net@FreeBSD.org Subject: Re: Specifying link-local address in rc.conf Message-ID: <20200707171027.4556a126@bsd64.grem.de> In-Reply-To: <20200707120835.4834198e@bsd64.grem.de> References: <713e1f3e-4dd9-8dcf-c6d2-15c684bdce5b@daemonic.se> <20200707120835.4834198e@bsd64.grem.de> X-Face: $wrgCtfdVw_H9WAY?S&9+/F"!41z'L$uo*WzT8miX?kZ~W~Lr5W7v?j0Sde\mwB&/ypo^}> +a'4xMc^^KroE~+v^&^#[B">soBo1y6(TW6#UZiC]o>C6`ej+i Face: iVBORw0KGgoAAAANSUhEUgAAADAAAAAwBAMAAAClLOS0AAAAJFBMVEWJBwe5BQDl LASZU0/LTEWEfHbyj0Txi32+sKrp1Mv944X8/fm1rS+cAAAACXBIWXMAAAsTAAAL EwEAmpwYAAAAB3RJTUUH3wESCxwC7OBhbgAAACFpVFh0Q29tbWVudAAAAAAAQ3Jl YXRlZCB3aXRoIFRoZSBHSU1QbbCXAAAAAghJREFUOMu11DFvEzEUAGCfEhBVFzuq AKkLd0O6VrIQsLXVSZXoWE5N1K3DobBBA9fQpRWc8OkWouaIjedWKiyREOKs+3PY fvalCNjgLVHeF7/3bMtBzV8C/VsQ8tecEgCcDgrzjekwKZ7TwsJZd/ywEKwwP+ZM 8P3drTsAwWn2mpWuDDuYiK1bFs6De0KUUFw0tWxm+D4AIhuuvZqtyWYeO7jQ4Aea 7jUqI+ixhQoHex4WshEvSXdood7stlv4oSuFOC4tqGcr0NjEqXgV4mMJO38nld4+ xKNxRDon7khyKVqY7YR4d+Cg0OMrkWXZOM7YDkEfKiilCn1qYv4mighZiynuHHOA Wq9QJq+BIES7lMFUtcikMnkDGHUoncA+uHgrP0ctIEqfwLHzeSo+eUA66AqzwN6n 2ZHJhw6Qh/PoyC/QENyEyC/AyNjq74Bs+3UH0xYwzDUC4B97HgLocg1QLYgDDO1v f3UX9Y307Ew4AHh67YAFFsxEpkXwpXY3eIgMhAAE3R19L919nNnuD2wlPcDE3UeT L2ytEICQib9BXgS2fU8PrD82ToYO1OEmMSnYTjSqSv9wdC0tPYC+rQRQD9ESnldF CyqfmiYW+tlALt8gH2xrMdC/youbjzPXEun+/ReXsMCDyve3dZc09fn2Oas8oXGc Jj6/fOeK5UmSMPmf/jL+GD8BEj0k/Fn6IO4AAAAASUVORK5CYII= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable X-Rspamd-Queue-Id: 4B1QqH02Qpz3SYV X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=grem.de header.s=20180501 header.b=TM4jtfYy; dmarc=none; spf=pass (mx1.freebsd.org: domain of freebsd@grem.de designates 213.239.217.29 as permitted sender) smtp.mailfrom=freebsd@grem.de X-Spamd-Result: default: False [-2.87 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; ARC_NA(0.00)[]; R_DKIM_ALLOW(-0.20)[grem.de:s=20180501]; NEURAL_HAM_MEDIUM(-0.91)[-0.915]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:213.239.217.29/32]; NEURAL_HAM_LONG(-1.02)[-1.016]; TAGGED_RCPT(0.00)[freebsd]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[grem.de]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_SOME(0.00)[]; DKIM_TRACE(0.00)[grem.de:+]; RCPT_COUNT_TWO(0.00)[2]; NEURAL_HAM_SHORT(-0.44)[-0.437]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:24940, ipnet:213.239.192.0/18, country:DE]; RCVD_TLS_ALL(0.00)[] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 07 Jul 2020 15:10:38 -0000 On Tue, 7 Jul 2020 12:08:35 +0200 Michael Gmelin wrote: > On Mon, 6 Jul 2020 22:58:54 +0200 > Niclas Zeising wrote: >=20 > > On 2020-07-06 13:05, Niclas Zeising wrote: =20 > > > Hi! > > > Is it possible to specify a link-local address in rc.conf, and get > > > only that link-local address? > > >=20 > > > When I add a specific link-local address, such as fe80::1/64, to > > > an interface from the command line, and then add a global uincast > > > address, it works as expected, I do not get an additional > > > link-local address. When I try to do the same in rc.conf however, > > > it does not work. I have added the following: > > > ifconfig_vtnet0_inet6=3D"inet6 fe80::1/64" > > > ifconfig_vtnet0_alias0=3D"2001:6b8::1/64" > > > to rc.conf, but when restarting, I get both fe80::1 and a > > > EUI64-based link-local address assigned to the interface.=C2=A0 It do= es > > > not matter which order I specify the entries in rc.conf. > > > I have tried changing the sysctl net.inet6.ip6.auto_linklocal to 0 > > > in /etc/sysctl.conf, but that does not work (it seems it takes > > > effect too late, the interface still has the AUTO_LINKLOCAL flag > > > set according to ifconfig). > > > I tried adding -auto_linklocal to the ifconfig_* lines in > > > /etc/rc.conf, and while this removes the AUTO_LINKLOCAL flag from > > > the interface, a EUI64 based link-local address is still assigned > > > to the interface. > > >=20 > > > While there might not be much of a problem having mulitple > > > link-local addresses, this is surprising.=C2=A0 Adding a specific > > > link-local address to an interface, even from rc.conf, shouldn't > > > mean that the EUI64-one is created.=C2=A0 Perhaps something like > > > ifconfig_IF_linklocal=3D"" should be added, or this is a bug in > > > rc.network.=C2=A0 I tried looking through rc.network and related rc > > > files, but I didn't find anything obvious, and I couldn't really > > > figure out how addresses are added to interfaces during boot. > > >=20 > > > This is causing issues when I want for instance rtadvd to use the=20 > > > fe80::1/64 address as source for router advertisements, since it > > > picks the EUI64 link-local address as source (which means this > > > also ends up in client routing tables as the default gateway).=C2=A0 I > > > can work around this problem by adding fe80::1/64 with > > > prefer_source, but I would prefer if there only was one > > > link-local address on an interface. > > >=20 > > > All of this is on FreeBSD 12.1. > > >=20 > > > Perhaps I'm just missing something, but this behavior feels a > > > little surprising. > > >=20 > > > I can share more detailed configuration, and perhaps the whole > > > virtual machine I'm testing on, if needed. > > >=20 > > > Regards =20 > >=20 > > I did some more digging. It only happens when there's also an=20 > > ifconfig_IF for IPv4 in the /etc/rc.conf. > >=20 > > Not working configuration (/etc/rc.conf) > > ifconfig_vtnet0=3D"192.168.0.1/24" > > ifconfig_vtnet0_ipv6=3D"inet6 fe80::1/64" > > ifconfig_vtnet0_alias0=3D"inet6 2001:6b8::/64" > >=20 > > This configuration creates an EUI64-based link-local addess on > > vtnet0 as well. > >=20 > > Working configuration (apart from no IPv4) > > ifconfig_vtnet0_ipv6=3D"inet6 fe80::1/64" > > ifconfig_vtnet0_alias0=3D"inet6 2001:6b8::/64"" =20 >=20 > > =20 >=20 > This works: >=20 > ifconfig_vtnet0=3D"inet6 -auto_linklocal" > ifconfig_vtnet0_ipv6=3D"up" > ifconfig_vtnet0_aliases=3D"\ > inet 192.168.0.1/24 inet6 fe80::1/64 inet6 2001:6b8::/64" >=20 > # ifconfig vtnet0 > vtnet0: flags=3D8943 > metric 0 mtu 1500 options=3D80028 > ether 58:9c:fc:0b:99:97 > inet 192.168.0.1 netmask 0xffffff00 broadcast 192.168.0.255 > inet6 fe80::1%vtnet0 prefixlen 64 scopeid 0x2 > inet6 2001:6b8:: prefixlen 64 > media: Ethernet 10Gbase-T > status: active > nd6 options=3D1 >=20 > -m >=20 This works too: ifconfig_vtnet0=3D"inet" ifconfig_vtnet0_ipv6=3D"inet6 -auto_linklocal" ifconfig_vtnet0_aliases=3D"\ inet 192.168.0.1/24 inet6 fe80::1/64 inet6 2001:6b8::/64" As well as this: ifconfig_vtnet0=3D"inet" ifconfig_vtnet0_ipv6=3D"inet6 -auto_linklocal fe80::1/64" ifconfig_vtnet0_aliases=3D"inet 192.168.0.1/24 inet6 2001:6b8::/64" Using `ifconfig_vtnet0=3D"inet 192.168.0.1/24"` adds the auto-generated link-local address (which is what you seem to try to avoid). Cheers, Michael --=20 Michael Gmelin From owner-freebsd-net@freebsd.org Tue Jul 7 15:19:11 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id B7E22365113 for ; Tue, 7 Jul 2020 15:19:11 +0000 (UTC) (envelope-from zeising+freebsd@daemonic.se) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 4B1R1C1Z53z3TRH for ; Tue, 7 Jul 2020 15:19:11 +0000 (UTC) (envelope-from zeising+freebsd@daemonic.se) Received: by mailman.nyi.freebsd.org (Postfix) id 35C94365111; Tue, 7 Jul 2020 15:19:11 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 3596F364E56 for ; Tue, 7 Jul 2020 15:19:11 +0000 (UTC) (envelope-from zeising+freebsd@daemonic.se) Received: from mail.daemonic.se (mail.daemonic.se [176.58.89.161]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4B1R191TfGz3TKB; Tue, 7 Jul 2020 15:19:08 +0000 (UTC) (envelope-from zeising+freebsd@daemonic.se) Received: from cid.daemonic.se (localhost [IPv6:::1]) by mail.daemonic.se (Postfix) with ESMTP id 4B1R172yzMz3mWM; Tue, 7 Jul 2020 15:19:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=daemonic.se; h= content-transfer-encoding:content-language:content-type :content-type:in-reply-to:mime-version:user-agent:date:date :message-id:from:from:references:subject:subject:received :received; s=20151023; t=1594135146; bh=9+KDuT4zg5TgpQBNRi4D7rEg TXr0763n6oDvjTBQ0Tw=; b=qywPWKqi3vc+Y9+1LOLI4sCQv9tFC05XATHgTWrr OQO28y7mMZfMc6zNM//JRPZclfXCCTY9+Dv6yeegl17+WjoV0j9MziGN+V9St1Qy O+FCG1f4+wRntBBXOgg+0S7rGi1Ed/eq4aPUuRI0bm+v14LsOc0kfuuDIsdFwWVp AKY= X-Virus-Scanned: amavisd-new at daemonic.se Received: from mail.daemonic.se ([127.0.0.1]) (using TLS with cipher ECDHE-RSA-AES128-GCM-SHA256) by cid.daemonic.se (mailscanner.daemonic.se [127.0.0.1]) (amavisd-new, port 10587) with ESMTPS id 5KsCl1iRfckz; Tue, 7 Jul 2020 15:19:06 +0000 (UTC) Received: from garnet.daemonic.se (unknown [IPv6:2001:470:dca9:201:c01f:220e:48eb:d4e3]) by mail.daemonic.se (Postfix) with ESMTPSA id 4B1R1659LGz3mMv; Tue, 7 Jul 2020 15:19:06 +0000 (UTC) Subject: Re: Specifying link-local address in rc.conf To: Hiroki Sato Cc: net@FreeBSD.org References: <713e1f3e-4dd9-8dcf-c6d2-15c684bdce5b@daemonic.se> <20200707.190252.2262901305208864620.hrs@FreeBSD.org> From: Niclas Zeising Message-ID: Date: Tue, 7 Jul 2020 17:19:06 +0200 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:68.0) Gecko/20100101 Thunderbird/68.10.0 MIME-Version: 1.0 In-Reply-To: <20200707.190252.2262901305208864620.hrs@FreeBSD.org> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: 4B1R191TfGz3TKB X-Spamd-Bar: ---- Authentication-Results: mx1.freebsd.org; none X-Spamd-Result: default: False [-4.00 / 15.00]; ASN(0.00)[asn:36236, ipnet:176.58.89.0/24, country:US]; TAGGED_FROM(0.00)[freebsd]; REPLY(-4.00)[] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 07 Jul 2020 15:19:11 -0000 On 2020-07-07 12:02, Hiroki Sato wrote: > Niclas Zeising wrote > in <713e1f3e-4dd9-8dcf-c6d2-15c684bdce5b@daemonic.se>: > > ze> Hi! > ze> Is it possible to specify a link-local address in rc.conf, and get > ze> only that link-local address? > > The following is a typical configuration if you want to disable > EUI-64 LLA: > > ifconfig_vtnet0="inet ...." > ifconfig_vtnet0_ipv6="inet6 -auto_linklocal" > ifconfig_vtnet0_alias0="inet6 fe80::1/64" > ifconfig_vtnet0_alias1="inet6 2001:6b8::1/64" > > Address family keyword is mandatory. Most of address configurations > with no AF keyword are handled as expected, but some are not. Hi! This example does not work, it generates a EUI64 link-local address on vtnet0, and then adds the other IPv6 addresses. It looks like anything that has ifconfig_vtnet0="inet ..." or even just "up" generates the link_local address. Regards -- Niclas From owner-freebsd-net@freebsd.org Tue Jul 7 15:29:52 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 18213365147 for ; Tue, 7 Jul 2020 15:29:52 +0000 (UTC) (envelope-from zeising+freebsd@daemonic.se) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 4B1RFW6Jhjz3V3C for ; Tue, 7 Jul 2020 15:29:51 +0000 (UTC) (envelope-from zeising+freebsd@daemonic.se) Received: by mailman.nyi.freebsd.org (Postfix) id D6D113652ED; Tue, 7 Jul 2020 15:29:51 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id D69963652EC for ; Tue, 7 Jul 2020 15:29:51 +0000 (UTC) (envelope-from zeising+freebsd@daemonic.se) Received: from mail.daemonic.se (mail.daemonic.se [IPv6:2607:f740:d:20::25]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4B1RFQ1lrbz3V7l for ; Tue, 7 Jul 2020 15:29:45 +0000 (UTC) (envelope-from zeising+freebsd@daemonic.se) Received: from cid.daemonic.se (localhost [IPv6:::1]) by mail.daemonic.se (Postfix) with ESMTP id 4B1RFM3DXbz3mgx; Tue, 7 Jul 2020 15:29:43 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=daemonic.se; h= content-transfer-encoding:content-language:content-type :content-type:in-reply-to:mime-version:user-agent:date:date :message-id:from:from:references:subject:subject:received :received; s=20151023; t=1594135782; bh=H8irjcxVxKyba67IJN+ggwwd 386F2UgtXctfHCkMKS4=; b=k9JRudDDo3yY6n2XdjZBLVY2sWS4195Z6klhn7S/ +CUC6jqfFkvlSgyKgxahhyV4sW5feXanCwYloLIaeM6FlYxdBaybnz/8t9ZAzZPZ xPHuHlkPGnV+BCGMv8124MufnEsvgpCgBkOz7nv08Sq1gkZvfBv8b281Tw8Xl8d7 if8= X-Virus-Scanned: amavisd-new at daemonic.se Received: from mail.daemonic.se ([127.0.0.1]) (using TLS with cipher ECDHE-RSA-AES128-GCM-SHA256) by cid.daemonic.se (mailscanner.daemonic.se [127.0.0.1]) (amavisd-new, port 10587) with ESMTPS id Uf63ZY8NzonS; Tue, 7 Jul 2020 15:29:42 +0000 (UTC) Received: from garnet.daemonic.se (unknown [IPv6:2001:470:dca9:201:c01f:220e:48eb:d4e3]) by mail.daemonic.se (Postfix) with ESMTPSA id 4B1RFL4bsyz3mMv; Tue, 7 Jul 2020 15:29:42 +0000 (UTC) Subject: Re: Specifying link-local address in rc.conf To: Michael Gmelin Cc: net@FreeBSD.org References: <713e1f3e-4dd9-8dcf-c6d2-15c684bdce5b@daemonic.se> <20200707120835.4834198e@bsd64.grem.de> <20200707171027.4556a126@bsd64.grem.de> From: Niclas Zeising Message-ID: Date: Tue, 7 Jul 2020 17:29:42 +0200 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:68.0) Gecko/20100101 Thunderbird/68.10.0 MIME-Version: 1.0 In-Reply-To: <20200707171027.4556a126@bsd64.grem.de> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: quoted-printable X-Rspamd-Queue-Id: 4B1RFQ1lrbz3V7l X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=daemonic.se header.s=20151023 header.b=k9JRudDD; dmarc=pass (policy=none) header.from=daemonic.se; spf=pass (mx1.freebsd.org: domain of zeising@daemonic.se designates 2607:f740:d:20::25 as permitted sender) smtp.mailfrom=zeising@daemonic.se X-Spamd-Result: default: False [-3.59 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; ARC_NA(0.00)[]; R_DKIM_ALLOW(-0.20)[daemonic.se:s=20151023]; NEURAL_HAM_MEDIUM(-0.93)[-0.928]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+mx]; NEURAL_HAM_LONG(-1.03)[-1.033]; MIME_GOOD(-0.10)[text/plain]; RCVD_COUNT_THREE(0.00)[4]; TO_MATCH_ENVRCPT_SOME(0.00)[]; DKIM_TRACE(0.00)[daemonic.se:+]; RCPT_COUNT_TWO(0.00)[2]; DMARC_POLICY_ALLOW(-0.50)[daemonic.se,none]; NEURAL_HAM_SHORT(-0.63)[-0.630]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; RCVD_TLS_LAST(0.00)[]; MID_RHS_MATCH_FROM(0.00)[]; TAGGED_FROM(0.00)[freebsd] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 07 Jul 2020 15:29:52 -0000 On 2020-07-07 17:10, Michael Gmelin wrote: >=20 >=20 > On Tue, 7 Jul 2020 12:08:35 +0200 > Michael Gmelin wrote: >=20 >> On Mon, 6 Jul 2020 22:58:54 +0200 >> Niclas Zeising wrote: >> >>> On 2020-07-06 13:05, Niclas Zeising wrote: >>>> Hi! >>>> Is it possible to specify a link-local address in rc.conf, and get >>>> only that link-local address? >>>> >>>> When I add a specific link-local address, such as fe80::1/64, to >>>> an interface from the command line, and then add a global uincast >>>> address, it works as expected, I do not get an additional >>>> link-local address. When I try to do the same in rc.conf however, >>>> it does not work. I have added the following: >>>> ifconfig_vtnet0_inet6=3D"inet6 fe80::1/64" >>>> ifconfig_vtnet0_alias0=3D"2001:6b8::1/64" >>>> to rc.conf, but when restarting, I get both fe80::1 and a >>>> EUI64-based link-local address assigned to the interface.=C2=A0 It d= oes >>>> not matter which order I specify the entries in rc.conf. >>>> I have tried changing the sysctl net.inet6.ip6.auto_linklocal to 0 >>>> in /etc/sysctl.conf, but that does not work (it seems it takes >>>> effect too late, the interface still has the AUTO_LINKLOCAL flag >>>> set according to ifconfig). >>>> I tried adding -auto_linklocal to the ifconfig_* lines in >>>> /etc/rc.conf, and while this removes the AUTO_LINKLOCAL flag from >>>> the interface, a EUI64 based link-local address is still assigned >>>> to the interface. >>>> >>>> While there might not be much of a problem having mulitple >>>> link-local addresses, this is surprising.=C2=A0 Adding a specific >>>> link-local address to an interface, even from rc.conf, shouldn't >>>> mean that the EUI64-one is created.=C2=A0 Perhaps something like >>>> ifconfig_IF_linklocal=3D"" should be added, or this is a bug in >>>> rc.network.=C2=A0 I tried looking through rc.network and related rc >>>> files, but I didn't find anything obvious, and I couldn't really >>>> figure out how addresses are added to interfaces during boot. >>>> >>>> This is causing issues when I want for instance rtadvd to use the >>>> fe80::1/64 address as source for router advertisements, since it >>>> picks the EUI64 link-local address as source (which means this >>>> also ends up in client routing tables as the default gateway).=C2=A0= I >>>> can work around this problem by adding fe80::1/64 with >>>> prefer_source, but I would prefer if there only was one >>>> link-local address on an interface. >>>> >>>> All of this is on FreeBSD 12.1. >>>> >>>> Perhaps I'm just missing something, but this behavior feels a >>>> little surprising. >>>> >>>> I can share more detailed configuration, and perhaps the whole >>>> virtual machine I'm testing on, if needed. >>>> >>>> Regards >>> >>> I did some more digging. It only happens when there's also an >>> ifconfig_IF for IPv4 in the /etc/rc.conf. >>> >>> Not working configuration (/etc/rc.conf) >>> ifconfig_vtnet0=3D"192.168.0.1/24" >>> ifconfig_vtnet0_ipv6=3D"inet6 fe80::1/64" >>> ifconfig_vtnet0_alias0=3D"inet6 2001:6b8::/64" >>> >>> This configuration creates an EUI64-based link-local addess on >>> vtnet0 as well. >>> >>> Working configuration (apart from no IPv4) >>> ifconfig_vtnet0_ipv6=3D"inet6 fe80::1/64" >>> ifconfig_vtnet0_alias0=3D"inet6 2001:6b8::/64"" >> >>> =20 >> >> This works: >> >> ifconfig_vtnet0=3D"inet6 -auto_linklocal" >> ifconfig_vtnet0_ipv6=3D"up" >> ifconfig_vtnet0_aliases=3D"\ >> inet 192.168.0.1/24 inet6 fe80::1/64 inet6 2001:6b8::/64" >> >> # ifconfig vtnet0 >> vtnet0: flags=3D8943 >> metric 0 mtu 1500 options=3D80028 >> ether 58:9c:fc:0b:99:97 >> inet 192.168.0.1 netmask 0xffffff00 broadcast 192.168.0.255 >> inet6 fe80::1%vtnet0 prefixlen 64 scopeid 0x2 >> inet6 2001:6b8:: prefixlen 64 >> media: Ethernet 10Gbase-T >> status: active >> nd6 options=3D1 >> >> -m >> >=20 > This works too: >=20 > ifconfig_vtnet0=3D"inet" > ifconfig_vtnet0_ipv6=3D"inet6 -auto_linklocal" > ifconfig_vtnet0_aliases=3D"\ > inet 192.168.0.1/24 inet6 fe80::1/64 inet6 2001:6b8::/64" >=20 > As well as this: >=20 > ifconfig_vtnet0=3D"inet" > ifconfig_vtnet0_ipv6=3D"inet6 -auto_linklocal fe80::1/64" > ifconfig_vtnet0_aliases=3D"inet 192.168.0.1/24 inet6 2001:6b8::/64" >=20 > Using `ifconfig_vtnet0=3D"inet 192.168.0.1/24"` adds the auto-generated > link-local address (which is what you seem to try to avoid). >=20 > Cheers, > Michael >=20 Thank you for these examples. I've also found out that ifconfig_vtnet0=3D"" following what's in your examples also work. I wonder if this should either be documented better (the manual for=20 rc.conf even brings up the vtnet0_alias0=3D"fe80::1/64" as an example) or= =20 if the rc scripts dealing with all this should be changed so that if you=20 have both ifconfig_vtnet0=3D"inet ..." and ifconfig_vtnet0_ipv6=3D"inet6=20 ..." a link-local address isn't automatically created if one is in rc.con= f. The whole handling of network interfaces in rc is (understandably) quite=20 hairy, and I don't know where this would belong, or how to fix it.=20 Maybe it's enough to have ipv6 addresses assigned before ipv4 ones, or=20 perhaps a separate ifconfig_vtnet0_link_local=3D"inet6 ..." should be add= ed. I can solve my immediate problems, I'm just thinking out loud about if=20 this is an issue that needs to be solved in a better way, or just be=20 better documented. Also thank you for the examples using ifconfig_vtnet0_aliases=3D, I was=20 unaware of that option, and have always done _alias0, _alias1 and so on.=20 This will make things easier for me. Regards --=20 Niclas From owner-freebsd-net@freebsd.org Tue Jul 7 22:59:35 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 40C0A34F9DF for ; Tue, 7 Jul 2020 22:59:35 +0000 (UTC) (envelope-from hrs@FreeBSD.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 4B1dDR10FCz4DM9 for ; Tue, 7 Jul 2020 22:59:35 +0000 (UTC) (envelope-from hrs@FreeBSD.org) Received: by mailman.nyi.freebsd.org (Postfix) id 221D834F9DE; Tue, 7 Jul 2020 22:59:35 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 21E5634FA0A for ; Tue, 7 Jul 2020 22:59:35 +0000 (UTC) (envelope-from hrs@FreeBSD.org) Received: from smtp.freebsd.org (smtp.freebsd.org [96.47.72.83]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B1dDR05V5z4DJq; Tue, 7 Jul 2020 22:59:35 +0000 (UTC) (envelope-from hrs@FreeBSD.org) Received: from localhost (unknown [IPv6:2400:4051:a743:3c00:16:ceff:fe34:2700]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) (Authenticated sender: hrs) by smtp.freebsd.org (Postfix) with ESMTPSA id 3C84C1123A; Tue, 7 Jul 2020 22:59:34 +0000 (UTC) (envelope-from hrs@FreeBSD.org) Date: Wed, 08 Jul 2020 07:59:17 +0900 (JST) Message-Id: <20200708.075917.1804911690907828255.hrs@FreeBSD.org> To: zeising+freebsd@daemonic.se Cc: net@FreeBSD.org Subject: Re: Specifying link-local address in rc.conf From: Hiroki Sato In-Reply-To: References: <713e1f3e-4dd9-8dcf-c6d2-15c684bdce5b@daemonic.se> <20200707.190252.2262901305208864620.hrs@FreeBSD.org> X-Old-PGPkey-fingerprint: BDB3 443F A5DD B3D0 A530 FFD7 4F2C D3D8 2793 CF2D X-PGPkey-fingerprint: 6C0D 2353 27CF 80C7 901E FDD2 DBB0 7DC6 6F1F 737F X-Mailer: Mew version 6.8 on Emacs 26.3 Mime-Version: 1.0 Content-Type: Multipart/Signed; protocol="application/pgp-signature"; micalg=pgp-sha512; boundary="--Security_Multipart(Wed_Jul__8_07_59_17_2020_149)--" Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 07 Jul 2020 22:59:35 -0000 ----Security_Multipart(Wed_Jul__8_07_59_17_2020_149)-- Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit Niclas Zeising wrote in : ze> On 2020-07-07 12:02, Hiroki Sato wrote: ze> > Niclas Zeising wrote ze> > in <713e1f3e-4dd9-8dcf-c6d2-15c684bdce5b@daemonic.se>: ze> > ze> Hi! ze> > ze> Is it possible to specify a link-local address in rc.conf, and get ze> > ze> only that link-local address? ze> > The following is a typical configuration if you want to disable ze> > EUI-64 LLA: ze> > ifconfig_vtnet0="inet ...." ze> > ifconfig_vtnet0_ipv6="inet6 -auto_linklocal" ze> > ifconfig_vtnet0_alias0="inet6 fe80::1/64" ze> > ifconfig_vtnet0_alias1="inet6 2001:6b8::1/64" ze> > Address family keyword is mandatory. Most of address configurations ze> > with no AF keyword are handled as expected, but some are not. ze> ze> Hi! ze> This example does not work, it generates a EUI64 link-local address on ze> vtnet0, and then adds the other IPv6 addresses. ze> It looks like anything that has ifconfig_vtnet0="inet ..." or even ze> just "up" generates the link_local address. Hmm, that's odd. Can you send me a log by the following command-line off-list? I will investigate the cause. # env -i rc_debug=YES /bin/sh -x /etc/rc.d/netif restart vtnet0 -- Hiroki ----Security_Multipart(Wed_Jul__8_07_59_17_2020_149)-- Content-Type: application/pgp-signature Content-Transfer-Encoding: 7bit -----BEGIN PGP SIGNATURE----- iMoEABMKAC4WIQRsDSNTJ8+Ax5Ae/dLbsH3Gbx9zfwUCXwT+RRAcaHJzQGZyZWVi c2Qub3JnAAoJENuwfcZvH3N/XzwCCQF0SEveb1tEERDczhAzsmACbVg2IGlG/xRb 06Z1/MXb5XnJLwFaK1FRY8aDZB9LYMMb9H0w2W3DwLtvLJXepqdw/wIJAUEopkRU x1rs2Qd5HXuGABRWV2JRxYWj2OzyJOB/0VGLlVfpqN9d4fPhornXXJkSLwBIDrHv ttBWq6SEEYCPnpow =FfCh -----END PGP SIGNATURE----- ----Security_Multipart(Wed_Jul__8_07_59_17_2020_149)---- From owner-freebsd-net@freebsd.org Wed Jul 8 09:24:45 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id A2F8B35C078 for ; Wed, 8 Jul 2020 09:24:45 +0000 (UTC) (envelope-from f.colliot@gmail.com) Received: from mail-ua1-x92d.google.com (mail-ua1-x92d.google.com [IPv6:2607:f8b0:4864:20::92d]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B1v5m62gkz3XQs for ; Wed, 8 Jul 2020 09:24:44 +0000 (UTC) (envelope-from f.colliot@gmail.com) Received: by mail-ua1-x92d.google.com with SMTP id b24so6642275uak.2 for ; Wed, 08 Jul 2020 02:24:44 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=a0fTHZG9Q4ESUycQC7SNFxwhRIhqhUipdBXWbwqbRNQ=; b=EwOUwQ+db0KCYeWmaccSj4C2TnbzbwMuD5gZLqwnMlbNHS7nYOJvp4o/g/IacLhW9E j2Be1XjPf6fLGCx/Z5N8mbAgqj5oepoOUWRJeC+xpjPIPqDvVehaeWp5pSe2Hi9Il8dR wKAzl/n//0w+OL29mSM3VEiKaSpdwvp6sbDMm1odv8ZfSopRqjlMaDPtGTuySUosaO4z 9pWAfN5tpvP1V9qaxcaZ7TY4HaOsL0ky1NiAFhAOSzHOnrJ6HgdeSdtTEVb2n89/VJTs m6V6aw4SXMxt6U84TflIunfyBaB6KFf5bnA0vSHBLuHerahOpbdRpC1bSvMT/kmtAT/i 61aw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=a0fTHZG9Q4ESUycQC7SNFxwhRIhqhUipdBXWbwqbRNQ=; b=ZVbhYyPOH+vWAM0O3Vw3mqWmOnuXSpqcw6OcrC0HZduFetK4mwR9JBapTfkyddT1fq QVi7Js10ZvTGxLCTOOCUrw9sriyZK91cf5DV9cH7tQHgpb/fYVbViMISLwuyVTwlsi26 rODojklv9JJ8zwYjGJ6n0Y/nuNhkg6Wru/5mVl5Om3CFS7GQMEfOQgQnsiPPf5ZHeUhf DAhRL5nJ/digAk0A8uq1o6QlZe4zDzBWvKnzjHbn7a+vpgMR/i0KuJ0So+Bwi4BMtrm/ tMYetC4GdXMgEJ+Kj8wT++G8QPyrRHr0VrxBKxnvMmD3RBaGWe5WjexVfVfV/WEKf8gO qExA== X-Gm-Message-State: AOAM533K3StCQ9o5KQ92cQX0IH4NhZyCZjxLFh1wTVa0RqmgkIRc7KgK q5k6EDx5uCpMPPjqBlWmgXhzmmPuW67ipZ7ZkjjEeNUp/0Pcyg== X-Google-Smtp-Source: ABdhPJwqK4N6UaO3V/FCubSukRomWsYw2beT1bp6X8WxhQyDme+1h7pHTgqnt7kVYLK7sVbO4EhKmre28n9wN0/5uaA= X-Received: by 2002:ab0:189:: with SMTP id 9mr28373927ual.75.1594200283624; Wed, 08 Jul 2020 02:24:43 -0700 (PDT) MIME-Version: 1.0 References: <2516812c-667c-d24a-d100-aea0f7e60b69@selasky.org> <4e46bc8f-26c3-85c0-7ee0-748444042c2f@selasky.org> In-Reply-To: <4e46bc8f-26c3-85c0-7ee0-748444042c2f@selasky.org> From: Fabrice Colliot Date: Wed, 8 Jul 2020 11:24:32 +0200 Message-ID: Subject: Re: Multicast: membership to (*, G) group after leaving a (S, G) group To: Hans Petter Selasky Cc: freebsd-net@freebsd.org X-Rspamd-Queue-Id: 4B1v5m62gkz3XQs X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=EwOUwQ+d; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of fcolliot@gmail.com designates 2607:f8b0:4864:20::92d as permitted sender) smtp.mailfrom=fcolliot@gmail.com X-Spamd-Result: default: False [-3.78 / 15.00]; RCVD_TLS_ALL(0.00)[]; ARC_NA(0.00)[]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; NEURAL_HAM_MEDIUM(-0.99)[-0.989]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; FREEMAIL_FROM(0.00)[gmail.com]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-net@freebsd.org]; NEURAL_HAM_LONG(-1.01)[-1.010]; TO_MATCH_ENVRCPT_SOME(0.00)[]; DKIM_TRACE(0.00)[gmail.com:+]; RCPT_COUNT_TWO(0.00)[2]; RCVD_IN_DNSWL_NONE(0.00)[2607:f8b0:4864:20::92d:from]; NEURAL_HAM_SHORT(-0.78)[-0.784]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; FREEMAIL_ENVFROM(0.00)[gmail.com]; RCVD_COUNT_TWO(0.00)[2]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; TAGGED_FROM(0.00)[]; DWL_DNSWL_NONE(0.00)[gmail.com:dkim] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.33 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 08 Jul 2020 09:24:45 -0000 > > Can you try 12.0 using a 12-stable kernel and see if there are any > differences? > I've updated my system to 12-stable and the behavior is exactly the same. Just in case, this is what uname -a returns (I'm not that familiar with FreeBSD versioning and building): FreeBSD freebsd 12.1-STABLE FreeBSD 12.1-STABLE 682166692b2(stable/12) GENERIC amd64 /Fabrice From owner-freebsd-net@freebsd.org Wed Jul 8 09:39:28 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 8D75235CB1A for ; Wed, 8 Jul 2020 09:39:28 +0000 (UTC) (envelope-from hrs@FreeBSD.org) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 4B1vQm3HBbz3Xt0 for ; Wed, 8 Jul 2020 09:39:28 +0000 (UTC) (envelope-from hrs@FreeBSD.org) Received: by mailman.nyi.freebsd.org (Postfix) id 7094C35CB19; Wed, 8 Jul 2020 09:39:28 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 705C835CB18 for ; Wed, 8 Jul 2020 09:39:28 +0000 (UTC) (envelope-from hrs@FreeBSD.org) Received: from smtp.freebsd.org (smtp.freebsd.org [96.47.72.83]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B1vQm2Rp6z3Y4S; Wed, 8 Jul 2020 09:39:28 +0000 (UTC) (envelope-from hrs@FreeBSD.org) Received: from localhost (unknown [IPv6:2400:4051:a743:3c00:16:ceff:fe34:2700]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) (Authenticated sender: hrs) by smtp.freebsd.org (Postfix) with ESMTPSA id 921A315F39; Wed, 8 Jul 2020 09:39:27 +0000 (UTC) (envelope-from hrs@FreeBSD.org) Date: Wed, 08 Jul 2020 18:35:51 +0900 (JST) Message-Id: <20200708.183551.294929323782099254.hrs@FreeBSD.org> To: zeising+freebsd@daemonic.se Cc: net@FreeBSD.org Subject: Re: ndp and routers with link-local addresses From: Hiroki Sato In-Reply-To: References: <20200707.195754.1353021909850880836.hrs@FreeBSD.org> X-Old-PGPkey-fingerprint: BDB3 443F A5DD B3D0 A530 FFD7 4F2C D3D8 2793 CF2D X-PGPkey-fingerprint: 6C0D 2353 27CF 80C7 901E FDD2 DBB0 7DC6 6F1F 737F X-Mailer: Mew version 6.8 on Emacs 26.3 Mime-Version: 1.0 Content-Type: Multipart/Signed; protocol="application/pgp-signature"; micalg=pgp-sha512; boundary="--Security_Multipart(Wed_Jul__8_18_35_51_2020_692)--" Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 08 Jul 2020 09:39:28 -0000 ----Security_Multipart(Wed_Jul__8_18_35_51_2020_692)-- Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit Niclas Zeising wrote in : ze> On 2020-07-07 12:57, Hiroki Sato wrote: ze> > Niclas Zeising wrote ze> > in : ze> > ze> However, if the interface on the router facing the client network ze> > only ze> > ze> has a link-local (and no global unicast) address, NDP neighbor ze> > ze> discovery breaks. ze> > This is related to the prefix discovery, not neighbor discovery ze> > (L2-L3 address resolution) in NDP. In the current implementation, ze> > just adding an interface route does not mean that the prefix is ze> > on-link. Adding the prefix (i.e. an address) on the interface or ze> > receiving an Router Advertisement message with a Prefix Information ze> > Option on the interface are the only ways to update the prefix list. ze> ze> What is needed to mark a prefix as being on-link? On FreeBSD, they are basically either 1) an address configured on an interface or 2) receiving RA from a router on the same link with prefix information. ze> What does the relevant RFCs say? (I haven't looked myself, to be ze> honest). RFC 5942 is the most relevant RFC. Note that the current FreeBSD implementation is based on older discussions even before RFC 4861, so the on-link assumption is a bit relaxed compared to RFC 5942. ze> On networks where SLAAC is in use, there is no need for a global ze> address on the router interface facing the clients, since all ze> communication with the router is done on the link-local address, and ze> clients has the router link-local address as their next hop. ze> ze> In my case, nothing is preventing me from adding an address in the ze> correct network on the interface, and getting this to work. I was ze> just surprised it didn't work without a global unicast address, since ze> it works on Linux, and both information I've read about the topic, as ze> well as people I've talked to, say that it should be possible to only ze> have a link-local address on the router. An IPv6 router works without GUA even on FreeBSD. However, the final hop of the packet forwarding depends on the on-link information on the router. Linux recognizes a routing table entry as source of on-link information. FreeBSD does not. This is the primary difference. RFC 5942 says making a prefix on-link may be done by "explicit manual configuration". FreeBSD defines an address configuration as its manual prefix configuration. Adding a routing table entry might be considered as an additional manual configuration, but if doing so, communications whose source is fe80::/16 and destination is a GUA will happen when it is originated from the router itself. Strictly speaking it is not against the specification, a unicast communication between two addresses which have a different scope from each other is not desirable, and at least an unexpected behavior in the current implementation. We need to carefully check if it works in our network stack before enabling it. ze> This has more to do with interoperability, and conformance with other ze> IPv6 implementations (the one in Linux). I haven't tested other ze> Routers, such as Cisco or Juniper, though. Manual configuration of the prefix list is up to the platform. It is not something determined by communication with another nodes, so I do not think this is an interoperability issue of the protocol. ze> > Theoretically, a router can always have Subnet-Router anycast address ze> > on each interface and it works as an on-link prefix information. For ze> > this reason, KAME implementation does not support properly to use ze> > interface route for directly-connected prefixes. ze> ze> I'm not sure that I understand this part. I know what a subnet router ze> anycast address is, and how to assign it, and I know what anycast ze> is. But I'm not sure I understand the comment about the KAME ze> implementation not properly supporting interface routes for directly ze> connected prefixes. On all interfaces of an IPv6 router, Subnet-Router anycast address of prefixes on the connected links must be configured, according to RFC 4291. An interface with only LLAs does not happen. This means that the prefix list is configured properly by these addresses. Most of people do not configure this anycast address in practice, however. So I used the word "theoretically". Configuring an GUA within the prefix also works and more intuitive. As explained earlier, it is an odd situation that there is an interface route with a prefix and the prefix list does not have the prefix as on-link. The odd behaviors came from it because IPv6 network stack got confused. -- Hiroki ----Security_Multipart(Wed_Jul__8_18_35_51_2020_692)-- Content-Type: application/pgp-signature Content-Transfer-Encoding: 7bit -----BEGIN PGP SIGNATURE----- iMgEABMKAC4WIQRsDSNTJ8+Ax5Ae/dLbsH3Gbx9zfwUCXwWTdxAcaHJzQGZyZWVi c2Qub3JnAAoJENuwfcZvH3N/G3ACB22XWmTIGgFIKpeJp6Gd3+8g+fayCau09k3Q pyFKp4lIwk9e6/yJqno8u4Mb9zQjkfdjirfm+zzH/XkbxDFymA4iAgjlaURonGnT fcxmTqAFoS5Op8oaBcfBNEr7ihaAz4ZOJVchYKypxzNpjGsKWEmi5MxPp7UXGrmQ pyTR4Jf9ZzqBxA== =gSJg -----END PGP SIGNATURE----- ----Security_Multipart(Wed_Jul__8_18_35_51_2020_692)---- From owner-freebsd-net@freebsd.org Wed Jul 8 10:30:03 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id E835E35E920 for ; Wed, 8 Jul 2020 10:30:03 +0000 (UTC) (envelope-from vegeta@tuxpowered.net) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 4B1wY74qvXz3cfY for ; Wed, 8 Jul 2020 10:30:03 +0000 (UTC) (envelope-from vegeta@tuxpowered.net) Received: by mailman.nyi.freebsd.org (Postfix) id A3DDD35E79F; Wed, 8 Jul 2020 10:30:03 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id A398335E6C4 for ; Wed, 8 Jul 2020 10:30:03 +0000 (UTC) (envelope-from vegeta@tuxpowered.net) Received: from mail-ed1-x534.google.com (mail-ed1-x534.google.com [IPv6:2a00:1450:4864:20::534]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B1wY64B0Cz3cLM for ; Wed, 8 Jul 2020 10:30:02 +0000 (UTC) (envelope-from vegeta@tuxpowered.net) Received: by mail-ed1-x534.google.com with SMTP id e15so41224216edr.2 for ; Wed, 08 Jul 2020 03:30:02 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=tuxpowered-net.20150623.gappssmtp.com; s=20150623; h=to:from:subject:autocrypt:message-id:date:user-agent:mime-version; bh=VLhMkV7A37FRbrH1mabzCb46A9ldXiCH4t3Y5C9jYIA=; b=bHQBHqodZb2qqTISqEHTCb/IRhejNhK8W1I/oqdqTTnrT32C48RFioC9GkuXsH6n5B PZoQypkcOpQy8OeMWsf9CIfAVcCi8tL1GrZ0J6JWkd+g9Fn5ZLDII9x2VvvUlFMcrR1F v/VYWPp+MZ/vAUXXc7VTj6Nqf8DI/CuqsnGM2WBp+BrLioQGOebjB25c8723HQtSLwOf pKakpo9q8J02y5O00U9a7wkdHYFG9y49F1drD5aPlub6snipmAHILwpwg/3mRv5LzeNZ kA0pMkplOUbxl1n62zCL6EX46mX4Gij8n60VlE8A35rg2dW97lIkfLRWtvD3EonAu+ET PWrQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:to:from:subject:autocrypt:message-id:date :user-agent:mime-version; bh=VLhMkV7A37FRbrH1mabzCb46A9ldXiCH4t3Y5C9jYIA=; b=rziu5CBCBfaB6AMRvxhzJZiwYAuVuP9BWD+sn+gv77dGTw/WW3RAe9lwk7q6wmj2Ol agxELhK1gsKXb7GnAkEJuWJ+FuUn5z25dD0WsOb8nsZ4T1/yaDE7q1et1dsKYP01L6T6 /c+WZbsaPMvyQidf6wCujF1NOGOPWoq6tXdsLuFY7FUjkw0HYO4KFVefjf1IHRYv4iEZ 6Rkey6/Evh4ceIKQJxpkiaHcp9j4y+A8y6EHVXcRyoZDPIgzWcJloKTSK836W54kzT6n WihBPspvLIMdaiNWC+RlzvwzaqaXDqvZ3QpsvLLrWLZrIEfSKRMEwf0V8ujQDvVS9tJG cHSg== X-Gm-Message-State: AOAM5301ueBbM+9FLHuJf7zehSehfZaQLcEJHasQkxQwYY76EAASm+22 Trb7RbxnGvnyT4okJU3pKDaDYO9CqEo= X-Google-Smtp-Source: ABdhPJxwZ+q774aVGKyy6dsm1VOrVoUsVpNs8taScyANVm2fPSwEu2STPrJQyuvccBIafbChvTsyfQ== X-Received: by 2002:a05:6402:cb3:: with SMTP id cn19mr64176256edb.368.1594204198892; Wed, 08 Jul 2020 03:29:58 -0700 (PDT) Received: from Proton.local ([2a02:8108:50bf:eb94:c0e3:6edb:170:1bcd]) by smtp.gmail.com with ESMTPSA id y22sm1732149ejf.108.2020.07.08.03.29.57 for (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Wed, 08 Jul 2020 03:29:57 -0700 (PDT) To: net@FreeBSD.org From: Kajetan Staszkiewicz Subject: Deadlocks when using pf tags or socket owner matching Autocrypt: addr=vegeta@tuxpowered.net; keydata= mQGiBELvVycRBADVGZM8mHAsH+R87EBg4O+QTOkL0TjroqamohMlCdBEZgFGcGVoKA9c9Az6 e7xpk90DuaWYrzBKJ+I5drx2ddqdqejLhgNm3QZubE8Cf9cCxBAxnxBZHzmmgVJMOg93lJUQ e9L1BstntodE2xz4jSBB++Zh9eZgRqbn/EICcQmmKwCg9pQfnXRAMr4tFxhsFenxa/JCvFME AK/03irNfB8DezORCfpt7lZuwL5oRJ/TvpoCfwgVkNd6gTLMgSQpKbFytLzAAmRsE+EwVpBo sUzKt4vzmW4bllgPao14TyuVcViah27/da3fHm1HIMkjvro/ONtUivInn+5L33S0meT3KyuK ofwc1A6KucNxhv4rG7RsXuhwZZmQA/0QVni2wq7yc6t15dfCxuDCxG7yXp4pE5Dghp/MMwts leIxJ3JdHaTZ9aIrYT2Rxw8mTXUs89pDi7PCqXA2N4C+RvkoZI0Q6cWs6jHNZGiZRVzkw38r 8ctqtAlcfzlAynX5+Ym9oiNMJ/c/4fAiFrWerMR1rFWDSD56ltQHk0X0oLQsS2FqZXRhbiBT dGFzemtpZXdpY3ogPHZlZ2V0YUB0dXhwb3dlcmVkLm5ldD6IewQTEQgAOwYLCQgHAwIDFQID AxYCAQIeAQIXgAIZARYhBI4RBk5u/YHyZ/QlueO0UK9tezoUBQJd5qIlBQkeucAOAAoJEOO0 UK9tezoUR7cAoIk0VDEW+znh8hbw3zDgnLhKMOj3AJ92fUPkB7huUEtUHtnjJWXNlHAnqLkB DQRC71cpEAQAjXEOKfj9O4eYTWcifEApMYzel9+aWmhNRqqUhJuNO40UDF73biRJ0cjd8miV hZGxcqIdjnZUmxn8Okr+ta7ZU4Q2KNw7B23VKd1jzDKalaUGtCbv8pnvFdBCJwwzdhHJ2vxr e7zkGMrU4x5Od/92YZRCgX229Ic8y7muveQty4sAAwYD/A/FKDQkIu16GVOu9g8ZBLLBi1HS h2eiem/efmfZS1APR7Q5Ouf6KJMeEgBCKY9yqEp9wg97Bt93oi3zP0H1I8rLmrj5hoEE/VEj Cc4XSQ3qrthmQ9bE8fPDZIgodPG1h+dlOzDQoUxKM/YZdbKmV8VkegbAmEng9rJk90gJ+7Qt iGMEGBEIACMWIQSOEQZObv2B8mf0JbnjtFCvbXs6FAUCXhcbkAUJHuo5dwAKCRDjtFCvbXs6 FK0WAJ96lSx5vRW6HaUbplfnVnARDYNo5gCgvYSyV/mBrnEGfUgA5CAx9Jdudog= Message-ID: <48de3ee4-ba52-f6a7-b2d7-c7d77a635eb9@tuxpowered.net> Date: Wed, 8 Jul 2020 12:29:55 +0200 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:68.0) Gecko/20100101 Thunderbird/68.10.0 MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="6Of8gmt13SoPjymQr9LyK3pjeHp5qDQwP" X-Rspamd-Queue-Id: 4B1wY64B0Cz3cLM X-Spamd-Bar: ---- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=tuxpowered-net.20150623.gappssmtp.com header.s=20150623 header.b=bHQBHqod; dmarc=none; spf=pass (mx1.freebsd.org: domain of vegeta@tuxpowered.net designates 2a00:1450:4864:20::534 as permitted sender) smtp.mailfrom=vegeta@tuxpowered.net X-Spamd-Result: default: False [-4.64 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; ARC_NA(0.00)[]; R_DKIM_ALLOW(-0.20)[tuxpowered-net.20150623.gappssmtp.com:s=20150623]; NEURAL_HAM_MEDIUM(-0.96)[-0.959]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2a00:1450:4000::/36]; MIME_GOOD(-0.20)[multipart/signed,multipart/mixed,text/plain]; PREVIOUSLY_DELIVERED(0.00)[net@freebsd.org]; TO_DN_NONE(0.00)[]; HAS_ATTACHMENT(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-1.04)[-1.040]; RCVD_COUNT_THREE(0.00)[3]; DMARC_NA(0.00)[tuxpowered.net]; DKIM_TRACE(0.00)[tuxpowered-net.20150623.gappssmtp.com:+]; NEURAL_HAM_SHORT(-0.04)[-0.039]; RCVD_IN_DNSWL_NONE(0.00)[2a00:1450:4864:20::534:from]; SIGNED_PGP(-2.00)[]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:+,3:~]; ASN(0.00)[asn:15169, ipnet:2a00:1450::/32, country:US]; RCVD_TLS_ALL(0.00)[]; MID_RHS_MATCH_FROM(0.00)[] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 08 Jul 2020 10:30:04 -0000 This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --6Of8gmt13SoPjymQr9LyK3pjeHp5qDQwP Content-Type: multipart/mixed; boundary="UkvR4H5J5VCKr7C31oruLwzrE00EhNufW" --UkvR4H5J5VCKr7C31oruLwzrE00EhNufW Content-Type: text/plain; charset=utf-8 Content-Language: en-GB Content-Transfer-Encoding: quoted-printable Hello group, I've decided to give a try to two functions of pf: tags, so that I can match packets on outgoing side of my loadbalancer to the ones which came in and socket ownership, so that I can match packets originating on the loadbalancer itself (dns, puppet and such). My kernel has some additional patches so I'm starting here before reporting this in Bugzilla= =2E After a few hours runnig with the new ruleset some of my systems freeze. I've built a kernel without KDB_UNATTENDED, and NMI from IPMI card got me the debugger console where I dumped the memory and rebooted the system. So far so good. Now I'm having problems understading who holds the lock which causes trouble. Looking at what NIC queue threads do, I find that all of threads apart from one are locked on backtraces similar (the exact path to reach pf_test() might be a bit different, or it's pf_test6 instead) to this: info threads: 85 Thread 100096 (PID=3D12: intr/irq301: ixl0:q7) sched_switch (td=3D0xfffff800118c6620, newtd=3D0xfffff8001513b620, flags=3D) at /usr/home/kajetan.staszkiewicz/freebsd.git/sys/kern/sched_ule.c:2103 (kgdb) thr 85 [Switching to thread 85 (Thread 100096)]#0 sched_switch (td=3D0xfffff800118c6620, newtd=3D0xfffff8001513b620, flags=3D) at /usr/home/kajetan.staszkiewicz/freebsd.git/sys/kern/sched_ule.c:2103 2103 /usr/home/kajetan.staszkiewicz/freebsd.git/sys/kern/sched_ule.c: No such file or directory. in /usr/home/kajetan.staszkiewicz/freebsd.git/sys/kern/sched_ule.c (kgdb) bt #0 sched_switch (td=3D0xfffff800118c6620, newtd=3D0xfffff8001513b620, flags=3D) at /usr/home/kajetan.staszkiewicz/freebsd.git/sys/kern/sched_ule.c:2103 #1 0xffffffff806719d8 in mi_switch (flags=3D259, newtd=3D0x0) at /usr/home/kajetan.staszkiewicz/freebsd.git/sys/kern/kern_synch.c:439 #2 0xffffffff806c3741 in turnstile_wait (ts=3D0xfffff8001503f180, owner=3D, queue=3D-500) at /usr/home/kajetan.staszkiewicz/freebsd.git/sys/kern/subr_turnstile.c:751 #3 0xffffffff80647d81 in __mtx_lock_sleep (c=3D0xffffffff8184f278, v=3D) at /usr/home/kajetan.staszkiewicz/freebsd.git/sys/kern/kern_mutex.c:637 #4 0xffffffff80661e53 in _rm_rlock (rm=3D0xffffffff8184f220, tracker=3D0xfffffe0c04808a38, trylock=3D0) at /usr/home/kajetan.staszkiewicz/freebsd.git/sys/kern/kern_rmlock.c:408 #5 0xffffffff81825604 in pf_test (dir=3D2, ifp=3D0xfffff80012f9a000, m0=3D0xfffffe0c04808cc8, inp=3D0x0) at /usr/home/kajetan.staszkiewicz/freebsd.git/sys/netpfil/pf/pf.c:6006 #6 0xffffffff81826759 in pf_test (dir=3D1, ifp=3D, m0=3D, inp=3D0x0) at /usr/home/kajetan.staszkiewicz/freebsd.git/sys/netpfil/pf/pf.c:5594 #7 0xffffffff818370ed in pf_check_in (arg=3D, m=3D0xfffffe0c04808dc0, ifp=3D, dir=3D, flags=3D, inp=3D) at /usr/home/kajetan.staszkiewicz/freebsd.git/sys/netpfil/pf/pf_ioctl.c:3916= #8 0xffffffff8077b647 in pfil_run_hooks (ph=3D0xffffffff81335108, mp=3D, ifp=3D0xfffff80012f2c000, dir=3D1, flags=3D0,= inp=3D0x0) at /usr/home/kajetan.staszkiewicz/freebsd.git/sys/net/pfil.c:1= 09 =2E.. My pf.c, function pf_test(): 6003 6004 pd.pf_mtag =3D pf_find_mtag(m); 6005 6006 PF_RULES_RLOCK(); 6007 6008 if (ip_divert_ptr !=3D NULL && 6009 ((ipfwtag =3D m_tag_locate(m, MTAG_IPFW_RULE, 0, NULL)) !=3D NULL)) { 6010 struct ipfw_rule_ref *rr =3D (struct ipfw_rule_ref *)(ipfwtag+1); All those NIC queues threads and some pfctl processes (the loadbalancer collects stats from pf labels or updates loadbalancing tables) are waiting for one more (I hope that's the correct way to get this information): (kgdb) print rm->rm_activeReaders->lh_first->rmp_thread->td_name $27 =3D 0xfffff800118c3294 "irq296: ixl0:q2" [9:17:44] hwlb-foe-aw-02 ~/ # grep ixl0:q2 ps.core2 90 Thread 100091 (PID=3D12: intr/irq296: ixl0:q2) sched_switch (td=3D0xfffff800118c3000, newtd=3D0xfffff8000b0d7000, flags=3D) at /usr/home/kajetan.staszkiewicz/freebsd.git/sys/kern/sched_ule.c:2103 And that one is waiting on: (kgdb) thr 90 [Switching to thread 90 (Thread 100091)]#0 sched_switch (td=3D0xfffff800118c3000, newtd=3D0xfffff8000b0d7000, flags=3D) at /usr/home/kajetan.staszkiewicz/freebsd.git/sys/kern/sched_ule.c:2103 2103 in /usr/home/kajetan.staszkiewicz/freebsd.git/sys/kern/sched_ule.c (kgdb) bt #0 sched_switch (td=3D0xfffff800118c3000, newtd=3D0xfffff8000b0d7000, flags=3D) at /usr/home/kajetan.staszkiewicz/freebsd.git/sys/kern/sched_ule.c:2103 #1 0xffffffff806719d8 in mi_switch (flags=3D259, newtd=3D0x0) at /usr/home/kajetan.staszkiewicz/freebsd.git/sys/kern/kern_synch.c:439 #2 0xffffffff806c3741 in turnstile_wait (ts=3D0xfffff8000b9ecb40, owner=3D, queue=3D1) at /usr/home/kajetan.staszkiewicz/freebsd.git/sys/kern/subr_turnstile.c:751 #3 0xffffffff80663511 in __rw_rlock_hard (rw=3D0xffffffff81336188, td=3D0xfffff800118c3000, v=3D) at /usr/home/kajetan.staszkiewicz/freebsd.git/sys/kern/kern_rwlock.c:601 #4 0xffffffff80795f61 in in_pcblookup_hash (pcbinfo=3D0xffffffff81336130= , faddr=3D{s_addr =3D 2208380372}, fport=3D13698, laddr=3D{s_addr =3D 27357= 72508}, lport=3D17822, lookupflags=3D2) at /usr/home/kajetan.staszkiewicz/freebsd.git/sys/netinet/in_pcb.c:19= 75 #5 0xffffffff818251c2 in pf_socket_lookup (direction=3D, pd=3D0xfffffe0c047efa98, m=3D0xfffff80015509200) at /usr/home/kajetan.staszkiewicz/freebsd.git/sys/netpfil/pf/pf.c:3052 #6 0xffffffff8182aa84 in pf_test_rule (rm=3D0xfffffe0c047efb40, sm=3D0xfffffe0c047efb48, direction=3D2, kif=3D0xfffff80012e4bb00, m=3D, off=3D20, pd=3D0xfffffe0c047efa98, am=3D0xfffffe0c047efb2= 8, rsm=3D0xfffffe0c047efb18, inp=3D0x0) at /usr/home/kajetan.staszkiewicz/freebsd.git/sys/netpfil/pf/pf.c:348= 9 #7 0xffffffff818269e2 in pf_test (dir=3D2, ifp=3D, m0=3D, inp=3D0x0) at /usr/home/kajetan.staszkiewicz/freebsd.git/sys/netpfil/pf/pf.c:6115 #8 0xffffffff81826759 in pf_test (dir=3D1, ifp=3D, m0=3D, inp=3D0x0) at /usr/home/kajetan.staszkiewicz/freebsd.git/sys/netpfil/pf/pf.c:5594 #9 0xffffffff818370ed in pf_check_in (arg=3D, m=3D0xfffffe0c047efdc0, ifp=3D, dir=3D, flags=3D, inp=3D) at /usr/home/kajetan.staszkiewicz/freebsd.git/sys/netpfil/pf/pf_ioctl.c:3916= #10 0xffffffff8077b647 in pfil_run_hooks (ph=3D0xffffffff81335108, mp=3D, ifp=3D0xfffff80012f2c000, dir=3D1, flags=3D0,= inp=3D0x0) at /usr/home/kajetan.staszkiewicz/freebsd.git/sys/net/pfil.c:1= 09 #11 0xffffffff8079a8dd in ip_input (m=3D0xfffff80015509200) at /usr/home/kajetan.staszkiewicz/freebsd.git/sys/netinet/ip_input.c:604 =2E.. pf.c line 3052 is pf_socket_lookup(): 3049 switch (pd->af) { 3050 #ifdef INET 3051 case AF_INET: 3052 inp =3D in_pcblookup_mbuf(pi, saddr->v4, sport, daddr->v4, 3053 dport, INPLOOKUP_RLOCKPCB, NULL, m); (kgdb) f 3 #3 0xffffffff80663511 in __rw_rlock_hard (rw=3D0xffffffff81336188, td=3D0xfffff800118c3000, v=3D) at /usr/home/kajetan.staszkiewicz/freebsd.git/sys/kern/kern_rwlock.c:601 601 /usr/home/kajetan.staszkiewicz/freebsd.git/sys/kern/kern_rwlock.c: No such file or directory. in /usr/home/kajetan.staszkiewicz/freebsd.git/sys/kern/kern_rwlock.c (kgdb) print *rw $37 =3D {lock_object =3D {lo_name =3D 0xffffffff80b8490f "pcbinfohash", lo_flags =3D 86179840, lo_data =3D 0, lo_witness =3D 0x0}, rw_lock =3D 18446735277970142758} (kgdb) f 2 #2 0xffffffff806c3741 in turnstile_wait (ts=3D0xfffff8000b9ecb40, owner=3D, queue=3D1) at /usr/home/kajetan.staszkiewicz/freebsd.git/sys/kern/subr_turnstile.c:751 751 /usr/home/kajetan.staszkiewicz/freebsd.git/sys/kern/subr_turnstile.c: No such file or directory. in /usr/home/kajetan.staszkiewicz/freebsd.git/sys/kern/subr_turnstile.c (kgdb) print *ts $38 =3D {ts_lock =3D {lock_object =3D {lo_name =3D 0xffffffff80b73a17 "tu= rnstile lock", lo_flags =3D 720896, lo_data =3D 0, lo_witness =3D 0x0}, mtx_lock = =3D 0}, ts_blocked =3D 0xfffff8000b9ecb60, ts_pending =3D {tqh_first =3D 0x0, tqh_last =3D 0xfffff8000b9ecb80}, ts_hash =3D {le_next =3D 0x0, le_pr= ev =3D 0xffffffff8127cba8}, ts_link =3D {le_next =3D 0x0, le_prev =3D 0xfffff8001513b748}, ts_free =3D {lh_first =3D 0xfffff80015273000}, ts_lockobj =3D 0xffffffff81336188, ts_owner =3D 0xfffff8001513b620} (kgdb) print *ts->ts_owner =2E.. td_name =3D 0xfffff8001513b8b4 "unbound" =2E.. [9:32:27] hwlb-foe-aw-02 ~/ # grep '(td=3D0xfffff8001513b620' ps.core2 175 Thread 100215 (PID=3D1308: unbound) sched_switch (td=3D0xfffff8001513b620, newtd=3D0xfffff8000b0d9620, flags=3D) at /usr/home/kajetan.staszkiewicz/freebsd.git/sys/kern/sched_ule.c:2103 (kgdb) thr 175 [Switching to thread 175 (Thread 100215)]#0 sched_switch (td=3D0xfffff8001513b620, newtd=3D0xfffff8000b0d9620, flags=3D) at /usr/home/kajetan.staszkiewicz/freebsd.git/sys/kern/sched_ule.c:2103 2103 /usr/home/kajetan.staszkiewicz/freebsd.git/sys/kern/sched_ule.c: No such file or directory. in /usr/home/kajetan.staszkiewicz/freebsd.git/sys/kern/sched_ule.c (kgdb) bt #0 sched_switch (td=3D0xfffff8001513b620, newtd=3D0xfffff8000b0d9620, flags=3D) at /usr/home/kajetan.staszkiewicz/freebsd.git/sys/kern/sched_ule.c:2103 #1 0xffffffff806719d8 in mi_switch (flags=3D259, newtd=3D0x0) at /usr/home/kajetan.staszkiewicz/freebsd.git/sys/kern/kern_synch.c:439 #2 0xffffffff806c3741 in turnstile_wait (ts=3D0xfffff8001503f180, owner=3D, queue=3D0) at /usr/home/kajetan.staszkiewicz/freebsd.git/sys/kern/subr_turnstile.c:751 #3 0xffffffff80647d81 in __mtx_lock_sleep (c=3D0xffffffff8184f278, v=3D) at /usr/home/kajetan.staszkiewicz/freebsd.git/sys/kern/kern_mutex.c:637 #4 0xffffffff80661e53 in _rm_rlock (rm=3D0xffffffff8184f220, tracker=3D0xfffffe0c04aeea48, trylock=3D0) at /usr/home/kajetan.staszkiewicz/freebsd.git/sys/kern/kern_rmlock.c:408 #5 0xffffffff8182e935 in pf_test6 (dir=3D2, pflags=3D0, ifp=3D0xfffff80012f2c000, m0=3D0xfffffe0c04aeec40, inp=3D0xfffff800154911= d0) at /usr/home/kajetan.staszkiewicz/freebsd.git/sys/netpfil/pf/pf.c:6395 #6 0xffffffff818371ed in pf_check6_out (arg=3D, m=3D0xfffffe0c04aeec40, ifp=3D, dir=3D, flags=3D, inp=3D) at /usr/home/kajetan.staszkiewicz/freebsd.git/sys/netpfil/pf/pf_ioctl.c:3976= #7 0xffffffff8077b647 in pfil_run_hooks (ph=3D0xffffffff81338060, mp=3D, ifp=3D0xfffff80012f2c000, dir=3D2, flags=3D0,= inp=3D0xfffff800154911d0) at /usr/home/kajetan.staszkiewicz/freebsd.git/sys/net/pfil.c:109 #8 0xffffffff8084fdbf in ip6_output (m0=3D, opt=3D0xfffff8010cf99400, ro=3D0xfffffe0c04aeee70, flags=3D0, im6o=3D0x0,= ifpp=3D0x0, inp=3D0xfffff800154911d0) at /usr/home/kajetan.staszkiewicz/freebsd.git/sys/netinet6/ip6_output.c:835 #9 0xffffffff80868b86 in udp6_send (so=3D, flags=3D, m=3D, addr=3D, control=3D, td=3D) at /usr/home/kajetan.staszkiewicz/freebsd.git/sys/netinet6/udp6_usrreq.c:897= #10 0xffffffff806f6ef4 in sosend_dgram (so=3D0xfffff80302b2b6d0, addr=3D, uio=3D, top=3D, control=3D0x0, flags=3D, td=3D0xfffff8001513b620) at /usr/home/kajetan.staszkiewicz/freebsd.git/sys/kern/uipc_socket.c:1174 #11 0xffffffff806fdf85 in kern_sendit (td=3D, s=3D20= , mp=3D, flags=3D0, control=3D0x0, segflg=3DUIO_USERSP= ACE) at /usr/home/kajetan.staszkiewicz/freebsd.git/sys/kern/uipc_syscalls.c:884 #12 0xffffffff806fe2de in sendit (td=3D0xfffff8001513b620, s=3D20, mp=3D0xfffffe0c04aef1c0, flags=3D0) at /usr/home/kajetan.staszkiewicz/freebsd.git/sys/kern/uipc_syscalls.c:804 #13 0xffffffff806fe12d in sys_sendto (td=3D, uap=3D) at /usr/home/kajetan.staszkiewicz/freebsd.git/sys/kern/uipc_syscalls.c:935 #14 0xffffffff8095bb46 in amd64_syscall (td=3D0xfffff8001513b620, traced=3D0) at freebsd.git/sys/amd64/amd64/../../kern/subr_syscall.c:132 #15 0xffffffff80939cdd in fast_syscall_common () at /usr/home/kajetan.staszkiewicz/freebsd.git/sys/amd64/amd64/exception.S:49= 4 #16 0x00000008017de0aa in ?? () Previous frame inner to this frame (corrupt stack?) pf.c 6395 is pf_test6(): 6392 if (m->m_flags & M_SKIP_FIREWALL) 6393 return (PF_PASS); 6394 6395 PF_RULES_RLOCK(); 6396 6397 /* We do IP header normalization and packet reassembly here = */ 6398 if (pf_normalize_ip6(m0, dir, kif, &reason, &pd) !=3D PF_PAS= S) { 6399 action =3D PF_DROP; So as far as I understand: - most NIC queues want to access "pf rulesets" lock - which is locked held by one more NIC queue which tries to lock "pcbinfohash" - which is held by unbound process - which tries to lock "pf rulesets" --=20 | pozdrawiam / greetings | Powered by macOS, Debian and FreeBSD | | Kajetan Staszkiewicz | www: http://vegeta.tuxpowered.net | `------------------------^--------------------------------------' --UkvR4H5J5VCKr7C31oruLwzrE00EhNufW-- --6Of8gmt13SoPjymQr9LyK3pjeHp5qDQwP Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- iF0EARECAB0WIQSOEQZObv2B8mf0JbnjtFCvbXs6FAUCXwWgJAAKCRDjtFCvbXs6 FIneAJ9ZUQR3DNic3s+Ztfh2Extfv+FUSQCeP6cCCPx/9HailKuFN8ywSb3Bzsw= =nVvL -----END PGP SIGNATURE----- --6Of8gmt13SoPjymQr9LyK3pjeHp5qDQwP-- From owner-freebsd-net@freebsd.org Wed Jul 8 10:52:49 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id AD84E35EFF1 for ; Wed, 8 Jul 2020 10:52:49 +0000 (UTC) (envelope-from vegeta@tuxpowered.net) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 4B1x3P2wnxz3dsF for ; Wed, 8 Jul 2020 10:52:49 +0000 (UTC) (envelope-from vegeta@tuxpowered.net) Received: by mailman.nyi.freebsd.org (Postfix) id 6464535F137; Wed, 8 Jul 2020 10:52:49 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 642C935F029 for ; Wed, 8 Jul 2020 10:52:49 +0000 (UTC) (envelope-from vegeta@tuxpowered.net) Received: from mail-ej1-x62c.google.com (mail-ej1-x62c.google.com [IPv6:2a00:1450:4864:20::62c]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B1x3N4l0Bz3f66 for ; Wed, 8 Jul 2020 10:52:48 +0000 (UTC) (envelope-from vegeta@tuxpowered.net) Received: by mail-ej1-x62c.google.com with SMTP id p20so49835120ejd.13 for ; Wed, 08 Jul 2020 03:52:48 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=tuxpowered-net.20150623.gappssmtp.com; s=20150623; h=subject:references:from:autocrypt:to:message-id:date:user-agent :mime-version:in-reply-to; bh=YD6qar9DbMxzmN2U75q2KMJwOepaSdvTAyr0idqPZhY=; b=vpvMDI24Ksr+OHm2lpI4tkoCh/Czcb2KJT1gJf2pAyRqGUgnEEKiSA4MYGW3nFf2IO ESI1fGhG+qbXRuIdcJOJwIV+K9nDyflPxarGPaYVGDD3OAV3clp6kPm69btTLAHeWZJo JZ0ogsvayrlUAESBSN48Vr2siMytQG+RWzcYh7gaRriOgqquw6n7LPE/W0pYN5yrizkQ wGZIr2SKf5XxGpmT+B8qGrVEMgCQW5hhGNWPoaRdhnKrEIfrm8hL7A/qqbIOPWh6En8x ZrEQLxgYk58HtWWLBvdRC3xlJZ1QtEE39rr3fAd3nzM2EFAgiJwD3iCGNqrXsuoBjlmA YiuQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:references:from:autocrypt:to:message-id :date:user-agent:mime-version:in-reply-to; bh=YD6qar9DbMxzmN2U75q2KMJwOepaSdvTAyr0idqPZhY=; b=Zf6CERpCofx+ahQvzhz1n7wcBov2jvcYLRMElLgGGOvu1+Qwwv/s3Kq3rO/taeq+Pr SlLACqOxCsrYnBwVthgNTt327GRNlYWHeYwnbw2RbWI28EkjW/XJMrfhd8m99LBf0+w8 +Y673375ArxPXtLrDwadYpTZVFGZ7PxoNPJzWLL99+LodTjH9pFUKQb1B5S/fW9fbiMS LpbVnl6QsscaFxhaUXG5DGiSBlJ5SgvI+elW4T8VQIcF3C8I0DPSYAEZn0hg01xcexsi gjXEkUunGRxqFEvo9SU35J8PC/GSBOj3ZiCPyPPujVdt7Ij1q7PgpzabII2ccMRgItNT nsJg== X-Gm-Message-State: AOAM531/UlDJESv8UFVWGG4u68eytLVYBTBFYDhXGMAYJT2azgc4f6DI heXyr/bMiwgiJukRXcQUiL5Vzsr8Bu8= X-Google-Smtp-Source: ABdhPJyHRhVUZCjsPdJRxZq8ZtP03byQKrpiEWwbPMysoK66ruo/wGtr7DxTLOosRuUrQZSSi5/4eA== X-Received: by 2002:a17:906:af43:: with SMTP id ly3mr50001606ejb.381.1594205566280; Wed, 08 Jul 2020 03:52:46 -0700 (PDT) Received: from Proton.local ([2a02:8108:50bf:eb94::597c]) by smtp.gmail.com with ESMTPSA id m14sm1750001ejx.80.2020.07.08.03.52.45 for (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Wed, 08 Jul 2020 03:52:45 -0700 (PDT) Subject: Re: Deadlocks when using pf tags or socket owner matching References: <48de3ee4-ba52-f6a7-b2d7-c7d77a635eb9@tuxpowered.net> From: Kajetan Staszkiewicz Autocrypt: addr=vegeta@tuxpowered.net; keydata= mQGiBELvVycRBADVGZM8mHAsH+R87EBg4O+QTOkL0TjroqamohMlCdBEZgFGcGVoKA9c9Az6 e7xpk90DuaWYrzBKJ+I5drx2ddqdqejLhgNm3QZubE8Cf9cCxBAxnxBZHzmmgVJMOg93lJUQ e9L1BstntodE2xz4jSBB++Zh9eZgRqbn/EICcQmmKwCg9pQfnXRAMr4tFxhsFenxa/JCvFME AK/03irNfB8DezORCfpt7lZuwL5oRJ/TvpoCfwgVkNd6gTLMgSQpKbFytLzAAmRsE+EwVpBo sUzKt4vzmW4bllgPao14TyuVcViah27/da3fHm1HIMkjvro/ONtUivInn+5L33S0meT3KyuK ofwc1A6KucNxhv4rG7RsXuhwZZmQA/0QVni2wq7yc6t15dfCxuDCxG7yXp4pE5Dghp/MMwts leIxJ3JdHaTZ9aIrYT2Rxw8mTXUs89pDi7PCqXA2N4C+RvkoZI0Q6cWs6jHNZGiZRVzkw38r 8ctqtAlcfzlAynX5+Ym9oiNMJ/c/4fAiFrWerMR1rFWDSD56ltQHk0X0oLQsS2FqZXRhbiBT dGFzemtpZXdpY3ogPHZlZ2V0YUB0dXhwb3dlcmVkLm5ldD6IewQTEQgAOwYLCQgHAwIDFQID AxYCAQIeAQIXgAIZARYhBI4RBk5u/YHyZ/QlueO0UK9tezoUBQJd5qIlBQkeucAOAAoJEOO0 UK9tezoUR7cAoIk0VDEW+znh8hbw3zDgnLhKMOj3AJ92fUPkB7huUEtUHtnjJWXNlHAnqLkB DQRC71cpEAQAjXEOKfj9O4eYTWcifEApMYzel9+aWmhNRqqUhJuNO40UDF73biRJ0cjd8miV hZGxcqIdjnZUmxn8Okr+ta7ZU4Q2KNw7B23VKd1jzDKalaUGtCbv8pnvFdBCJwwzdhHJ2vxr e7zkGMrU4x5Od/92YZRCgX229Ic8y7muveQty4sAAwYD/A/FKDQkIu16GVOu9g8ZBLLBi1HS h2eiem/efmfZS1APR7Q5Ouf6KJMeEgBCKY9yqEp9wg97Bt93oi3zP0H1I8rLmrj5hoEE/VEj Cc4XSQ3qrthmQ9bE8fPDZIgodPG1h+dlOzDQoUxKM/YZdbKmV8VkegbAmEng9rJk90gJ+7Qt iGMEGBEIACMWIQSOEQZObv2B8mf0JbnjtFCvbXs6FAUCXhcbkAUJHuo5dwAKCRDjtFCvbXs6 FK0WAJ96lSx5vRW6HaUbplfnVnARDYNo5gCgvYSyV/mBrnEGfUgA5CAx9Jdudog= To: net@FreeBSD.org Message-ID: Date: Wed, 8 Jul 2020 12:52:44 +0200 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:68.0) Gecko/20100101 Thunderbird/68.10.0 MIME-Version: 1.0 In-Reply-To: <48de3ee4-ba52-f6a7-b2d7-c7d77a635eb9@tuxpowered.net> Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="yEzZMLrgxrRIzpZa0bKJrQPIfBrwL7kMf" X-Rspamd-Queue-Id: 4B1x3N4l0Bz3f66 X-Spamd-Bar: ---- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=tuxpowered-net.20150623.gappssmtp.com header.s=20150623 header.b=vpvMDI24; dmarc=none; spf=pass (mx1.freebsd.org: domain of vegeta@tuxpowered.net designates 2a00:1450:4864:20::62c as permitted sender) smtp.mailfrom=vegeta@tuxpowered.net X-Spamd-Result: default: False [-4.57 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; ARC_NA(0.00)[]; R_DKIM_ALLOW(-0.20)[tuxpowered-net.20150623.gappssmtp.com:s=20150623]; NEURAL_HAM_MEDIUM(-0.96)[-0.959]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2a00:1450:4000::/36]; MIME_GOOD(-0.20)[multipart/signed,multipart/mixed,text/plain]; TO_DN_NONE(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[net@freebsd.org]; HAS_ATTACHMENT(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-1.04)[-1.039]; RCVD_COUNT_THREE(0.00)[3]; DMARC_NA(0.00)[tuxpowered.net]; NEURAL_SPAM_SHORT(0.03)[0.028]; DKIM_TRACE(0.00)[tuxpowered-net.20150623.gappssmtp.com:+]; RCVD_IN_DNSWL_NONE(0.00)[2a00:1450:4864:20::62c:from]; SIGNED_PGP(-2.00)[]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:+,3:~]; ASN(0.00)[asn:15169, ipnet:2a00:1450::/32, country:US]; RCVD_TLS_ALL(0.00)[]; MID_RHS_MATCH_FROM(0.00)[] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 08 Jul 2020 10:52:49 -0000 This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --yEzZMLrgxrRIzpZa0bKJrQPIfBrwL7kMf Content-Type: multipart/mixed; boundary="kMSNcjkdGcBOG2IAD2bce4HKefCCGnhuE" --kMSNcjkdGcBOG2IAD2bce4HKefCCGnhuE Content-Type: text/plain; charset=utf-8 Content-Language: en-GB Content-Transfer-Encoding: quoted-printable I have forgot to mention my system: it's FreeBSD 11.3-RELEASE-p9 I have also managed to replicate this (or a similar) issue on a test system built with lock debugging and I got this: Jul 8 10:32:07 hwlb-aw-01 kernel: lock order reversal: Jul 8 10:32:07 hwlb-aw-01 kernel: 1st 0xffffffff81850760 pf rulesets (pf rulesets) @ /usr/home/kajetan.staszkiewicz/freebsd.git/sys/netpfil/pf/pf.c:6006 Jul 8 10:32:07 hwlb-aw-01 kernel: 2nd 0xfffff8011f7028a8 tcpinp (tcpinp) @ /usr/home/kajetan.staszkiewicz/freebsd.git/sys/netinet/in_pcb.c:1994 Jul 8 10:32:07 hwlb-aw-01 kernel: stack backtrace: Jul 8 10:32:07 hwlb-aw-01 kernel: #0 0xffffffff806c2390 at witness_debugger+0x70 Jul 8 10:32:07 hwlb-aw-01 kernel: #1 0xffffffff806c222a at witness_checkorder+0xe3a Jul 8 10:32:07 hwlb-aw-01 kernel: #2 0xffffffff8065a01b at __rw_rlock_int+0x8b Jul 8 10:32:07 hwlb-aw-01 kernel: #3 0xffffffff80790af2 at in_pcblookup_hash+0x182 Jul 8 10:32:07 hwlb-aw-01 kernel: #4 0xffffffff81825546 at pf_socket_lookup+0xd6 Jul 8 10:32:07 hwlb-aw-01 kernel: #5 0xffffffff8182af00 at pf_test_rule+0x18c0 Jul 8 10:32:07 hwlb-aw-01 kernel: #6 0xffffffff81826e68 at pf_test+0x15e= 8 Jul 8 10:32:07 hwlb-aw-01 kernel: #7 0xffffffff81826b82 at pf_test+0x130= 2 Jul 8 10:32:07 hwlb-aw-01 kernel: #8 0xffffffff81837b7d at pf_check_in+0= x1d Jul 8 10:32:07 hwlb-aw-01 kernel: #9 0xffffffff80775107 at pfil_run_hooks+0x97 Jul 8 10:32:07 hwlb-aw-01 kernel: #10 0xffffffff8079548e at ip_input+0x3= fe Jul 8 10:32:07 hwlb-aw-01 kernel: #11 0xffffffff80774020 at netisr_dispatch_src+0x80 Jul 8 10:32:07 hwlb-aw-01 kernel: #12 0xffffffff807599af at ether_demux+0x14f Jul 8 10:32:07 hwlb-aw-01 kernel: #13 0xffffffff8075acfa at ether_nh_input+0x34a Jul 8 10:32:07 hwlb-aw-01 kernel: #14 0xffffffff80774020 at netisr_dispatch_src+0x80 Jul 8 10:32:07 hwlb-aw-01 kernel: #15 0xffffffff80759e12 at ether_input+0x62 Jul 8 10:32:07 hwlb-aw-01 kernel: #16 0xffffffff80762da3 at vlan_input+0x2a3 Jul 8 10:32:07 hwlb-aw-01 kernel: #17 0xffffffff80759995 at ether_demux+0x135 pf.c:6006 pf_test(): pd.pf_mtag =3D pf_find_mtag(m); PF_RULES_RLOCK(); if (ip_divert_ptr !=3D NULL && in_pcb.c:1994 in_pcblookup_hash(): } else { INP_RLOCK(inp); if (in_pcbrele_rlocked(inp)) --=20 | pozdrawiam / greetings | Powered by macOS, Debian and FreeBSD | | Kajetan Staszkiewicz | www: http://vegeta.tuxpowered.net | `------------------------^--------------------------------------' --kMSNcjkdGcBOG2IAD2bce4HKefCCGnhuE-- --yEzZMLrgxrRIzpZa0bKJrQPIfBrwL7kMf Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- iF0EARECAB0WIQSOEQZObv2B8mf0JbnjtFCvbXs6FAUCXwWlfAAKCRDjtFCvbXs6 FDxDAJ9Arp7gsaZJtsTOIIwNqk9VMelEwwCg9V5wV58/+g6BhNBidfXIV51+bFk= =Rn96 -----END PGP SIGNATURE----- --yEzZMLrgxrRIzpZa0bKJrQPIfBrwL7kMf-- From owner-freebsd-net@freebsd.org Wed Jul 8 13:41:19 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id BC631363076 for ; Wed, 8 Jul 2020 13:41:19 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 4B20nq4cFnz45FW for ; Wed, 8 Jul 2020 13:41:19 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 9E1A1363075; Wed, 8 Jul 2020 13:41:19 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 9DDE6363074 for ; Wed, 8 Jul 2020 13:41:19 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B20nq3mS7z45Cc for ; Wed, 8 Jul 2020 13:41:19 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 616D220EFB for ; Wed, 8 Jul 2020 13:41:19 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 068DfJE0036801 for ; Wed, 8 Jul 2020 13:41:19 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from bugzilla@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 068DfJS0036800 for net@FreeBSD.org; Wed, 8 Jul 2020 13:41:19 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: bugzilla set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 246951] carp(4): Active CARP member crashes: panic, trap_pfault, ip_input || ip_output when using ipSec, AES-NI (on Intel I350) Date: Wed, 08 Jul 2020 13:41:19 +0000 X-Bugzilla-Reason: AssignedTo CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 11.3-STABLE X-Bugzilla-Keywords: crash, needs-qa, regression X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: commit-hook@freebsd.org X-Bugzilla-Status: Open X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: net@FreeBSD.org X-Bugzilla-Flags: mfc-stable12? mfc-stable11? X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 08 Jul 2020 13:41:19 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D246951 --- Comment #18 from commit-hook@freebsd.org --- A commit references this bug: Author: markj Date: Wed Jul 8 13:40:28 UTC 2020 New revision: 363009 URL: https://svnweb.freebsd.org/changeset/base/363009 Log: MFC r362840: Fix a possible refcount leak when handling IPSec traffic. PR: 246951 Changes: stable/11/sys/netinet/ip_input.c --=20 You are receiving this mail because: You are the assignee for the bug. You are on the CC list for the bug.= From owner-freebsd-net@freebsd.org Wed Jul 8 13:43:26 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id A40E136350D for ; Wed, 8 Jul 2020 13:43:26 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 4B20rG3s7Jz454d for ; Wed, 8 Jul 2020 13:43:26 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 829533635A0; Wed, 8 Jul 2020 13:43:26 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 825AE36350C for ; Wed, 8 Jul 2020 13:43:26 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B20rG2wGnz45Tf for ; Wed, 8 Jul 2020 13:43:26 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4813D2148A for ; Wed, 8 Jul 2020 13:43:26 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 068DhQGd040657 for ; Wed, 8 Jul 2020 13:43:26 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 068DhQYg040656 for net@FreeBSD.org; Wed, 8 Jul 2020 13:43:26 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 246951] carp(4): Active CARP member crashes: panic, trap_pfault, ip_input || ip_output when using ipSec, AES-NI (on Intel I350) Date: Wed, 08 Jul 2020 13:43:26 +0000 X-Bugzilla-Reason: AssignedTo CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 11.3-STABLE X-Bugzilla-Keywords: crash, needs-qa, regression X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: markj@FreeBSD.org X-Bugzilla-Status: Closed X-Bugzilla-Resolution: FIXED X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: markj@FreeBSD.org X-Bugzilla-Flags: mfc-stable12? mfc-stable11? X-Bugzilla-Changed-Fields: bug_status assigned_to resolution Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 08 Jul 2020 13:43:26 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D246951 Mark Johnston changed: What |Removed |Added ---------------------------------------------------------------------------- Status|Open |Closed Assignee|net@FreeBSD.org |markj@FreeBSD.org Resolution|--- |FIXED --- Comment #19 from Mark Johnston --- I'm going to resolve this for now since I suspect that the patch fixes the original bug. I'll give a heads-up to the pfsense folks so that it can be integrated there. --=20 You are receiving this mail because: You are the assignee for the bug. You are on the CC list for the bug.= From owner-freebsd-net@freebsd.org Wed Jul 8 15:05:44 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 5F87C364ADE for ; Wed, 8 Jul 2020 15:05:44 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 4B22gD1wKvz49Jh for ; Wed, 8 Jul 2020 15:05:44 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 401D1364ADD; Wed, 8 Jul 2020 15:05:44 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 3FE14364B95 for ; Wed, 8 Jul 2020 15:05:44 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B22gD12Q4z49Jg for ; Wed, 8 Jul 2020 15:05:44 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 05B402238A for ; Wed, 8 Jul 2020 15:05:44 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 068F5hb6027604 for ; Wed, 8 Jul 2020 15:05:43 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 068F5h33027603 for net@FreeBSD.org; Wed, 8 Jul 2020 15:05:43 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 246951] carp(4): Active CARP member crashes: panic, trap_pfault, ip_input || ip_output when using ipSec, AES-NI (on Intel I350) Date: Wed, 08 Jul 2020 15:05:43 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 11.3-STABLE X-Bugzilla-Keywords: crash, needs-qa, regression X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: markj@FreeBSD.org X-Bugzilla-Status: Closed X-Bugzilla-Resolution: FIXED X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: markj@FreeBSD.org X-Bugzilla-Flags: mfc-stable12- mfc-stable11+ X-Bugzilla-Changed-Fields: flagtypes.name Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 08 Jul 2020 15:05:44 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D246951 Mark Johnston changed: What |Removed |Added ---------------------------------------------------------------------------- Flags|mfc-stable12?, |mfc-stable12-, |mfc-stable11? |mfc-stable11+ --- Comment #20 from Mark Johnston --- Note, the change was intentionally not merged to stable/12, as the bug does= not exist there. In particular, if you are seeing these panics on a stable/12-based branch, then the culprit lies elsewhere. --=20 You are receiving this mail because: You are on the CC list for the bug.= From owner-freebsd-net@freebsd.org Thu Jul 9 14:11:08 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 2706B36C3ED for ; Thu, 9 Jul 2020 14:11:08 +0000 (UTC) (envelope-from noreply@track-my-url.com) Received: from berra-156.mfzt.com (berra-156.mfzt.com [178.18.201.156]) by mx1.freebsd.org (Postfix) with ESMTP id 4B2dPl4kGNz45Z9 for ; Thu, 9 Jul 2020 14:11:07 +0000 (UTC) (envelope-from noreply@track-my-url.com) DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; s=key2; d=mfzt.com; h=To:Subject:Message-ID:Date:From:Reply-To:MIME-Version:List-Unsubscribe:Content-Type:Content-Transfer-Encoding; bh=ufWu4QvYtqau+XcguPKNXr9TIfI=; b=o8zqNU4N0MeZDzwxtk+jp48s6RQRWe28zCoIDJdofOrxhg2os/W1fqPFVBDlBTvMvlhwbZgmkpdc paWk8pPzG+kFU54KBxekjmlhABR3dA11td8mtZFBztIxOd2FVBM4LIllLgW8NPOEcTYVOJWJ2vgI rxyhqtfrpf3hbv7Lqs8= DomainKey-Signature: a=rsa-sha1; c=nofws; q=dns; s=key2; d=tspb.org.tr; b=DnZ5MowAVsBqSK/uAucJIGCwhQLiYhgKgSMEMFifV4frFwMKcQXJbYLngkRat/9eYbJ/HuO7EoQq GWVSCwsyLswJt21jGxksYAryrw0pNjV9cs566QuCruEFghskD/RPnudOWLlpjH3WAWuFbrMpOQOm Plt/x7R4V05NuzmQTHE=; To: freebsd-net@freebsd.org Subject: =?UTF-8?B?S2nFn2lzZWwgVmVyaWxlcmluIEtvcnVubWFzxLEgS2FudW51IChLVktLKQ==?= Message-ID: Date: Thu, 09 Jul 2020 14:03:40 +0000 From: "=?UTF-8?B?VMO8cmtpeWUgU2VybWF5ZSBQaXlhc2FsYXLEsSBCaXJsacSfaQ==?=" Reply-To: info@tspb.org.tr MIME-Version: 1.0 X-Mailer-LID: 469 X-Mailer-RecptId: 2389711 X-Mailer-SID: 5296 X-Mailer-Sent-By: 15 X-Rspamd-Queue-Id: 4B2dPl4kGNz45Z9 X-Spamd-Bar: +++++ Authentication-Results: mx1.freebsd.org; dkim=pass header.d=mfzt.com header.s=key2 header.b=o8zqNU4N; dmarc=fail reason="SPF not aligned (relaxed), DKIM not aligned (relaxed)" header.from=tspb.org.tr (policy=none); spf=pass (mx1.freebsd.org: domain of noreply@track-my-url.com designates 178.18.201.156 as permitted sender) smtp.mailfrom=noreply@track-my-url.com X-Spamd-Result: default: False [5.39 / 15.00]; HAS_REPLYTO(0.00)[info@tspb.org.tr]; R_SPF_ALLOW(-0.20)[+ip4:178.18.201.158/29:c]; REPLYTO_ADDR_EQ_FROM(0.00)[]; TO_DN_NONE(0.00)[]; DKIM_TRACE(0.00)[mfzt.com:+]; FORGED_SENDER(0.30)[info@tspb.org.tr,noreply@track-my-url.com]; RCVD_COUNT_ZERO(0.00)[0]; AUTOGEN_PHP_SPAMMY(1.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; R_MIXED_CHARSET(2.78)[subject]; HAS_INTERSPIRE_SIG(1.00)[]; FROM_NEQ_ENVFROM(0.00)[info@tspb.org.tr,noreply@track-my-url.com]; ASN(0.00)[asn:50941, ipnet:178.18.201.0/24, country:TR]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-0.32)[-0.318]; R_DKIM_ALLOW(-0.20)[mfzt.com:s=key2]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-0.10)[-0.095]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; HAS_PHPMAILER_SIG(0.00)[]; HAS_LIST_UNSUB(-0.01)[]; RCPT_COUNT_ONE(0.00)[1]; MANY_INVISIBLE_PARTS(0.10)[2]; NEURAL_SPAM_SHORT(0.35)[0.347]; PHISHING(0.69)[tspb.org.tr->n-mail-3.com]; GREYLIST(0.00)[pass,body]; DMARC_POLICY_SOFTFAIL(0.10)[tspb.org.tr : SPF not aligned (relaxed), DKIM not aligned (relaxed), none] Content-Type: text/plain; format=flowed; charset="UTF-8" Content-Transfer-Encoding: 8bit X-Content-Filtered-By: Mailman/MimeDel 2.1.33 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 09 Jul 2020 14:11:08 -0000 TSPB Birlikte Eğitim Mesleki Gelişim Eğitimleri Bülteni Daha İyi Görüntülemek İçin Tıklayın [http://track-9.n-mail-3.com/1011D2389711|00119c00fdf926bb981d59ee664f79715a6a|11005296|1010469|00102406.html]TSPB Birlikte Eğitim Mesleki Gelişim Eğitimleri "Kişisel Verilerin Korunması Kanunu (KVKK)" - Online Eğitim"Zoom"uygulaması üzerinden gerçekleştirilecektir. Eğitimin 25 kişilik kontenjanı bulunmaktadır. Başvurularını gerçekleştirilen katılımcılara online eğitime giriş için gerekli bilgiler iletilecektir. Başvuru için: www.tspb.org.tr [http://track-9.n-mail-3.com/1001L2389711|01015296|001022069|0100T.html] Üyelik ve başvurularınızla ilgili sorularınız için: info@birlikteeğitim.org [mailto:info@birlikteeğitim.org] ve ya aşağıdaki telefon numarasından bize ulaşabilirsiniz. Eğitmen: Av. Yücel Hamzaoğlu-Hamzaoğlu Partners&Hukuk Bürosu Kurucu Ortak Eğitim Tarihi: 21 Temmuz 2020 Eğitim Süresi: ½ Gün Ders Saati: 13:30-17:30 Eğitim Ücreti: 200 TL (KDV dahil, kişi başı) Eğitim Yeri: Online Eğitim-Zoom Başvuru: www.tspb.org.tr [http://track-9.n-mail-3.com/0110L2389711|10115296|001122069|1101T.html] TSPB Birlikte Eğitim Büyükdere Caddesi No: 173 1.Levent Plaza A Blok Kat4 Şişli-İstanbul Telefon: 0212 280 85 67 info@birlikteegitim.org [mailto:info@birlikteegitim.org] www.tspb.org.tr [http://track-9.n-mail-3.com/1010L2389711|01015296|01015892|0111T.html] Kişisel veri nedir? Anonim olarak toplanan bilgiler kişisel veri kabul edilebilir mi? Kişisel verilerin toplanması, kullanılması ya da aktarılması için rıza almak zorunlu mudur? Bir şirketten kişisel verilerinizin tümünü silmesini talep edebilir misiniz? Kişisel verilerinize ilişkin haklarınız nelerdir? Kişisel verilerin korunması kanunu şirketlerin uygulamalarında neleri değiştirmiştir. Kişisel verilerin korunması mevzuatına aykırılık durumunda ne gibi risk ve yaptırımlarla karşılaşılabilir? 21 Temmuz 2020 tarihinde "Kişisel Verilerin Korunması Kanunu (KVKK)" online eğitimimize bekliyoruz. EĞİTİM KONULARI Kişisel Verilerin Korunma Kanunu'na Genel Bakış Kişisel Verilerin Korunmasına İlişkin Mevzuat Düzenlemeleri Kişisel Verileri Koruma Kurulu Kararları Kişisel Veri Kişisel Verilerin Tanımı Temel Kavram ve Aktörler (Veri Sorumlusu, Veri İşleyen, İlgili Kişi) Kişisel Verilerin İşlenmesi Kişisel Verilerin İşlenmesine İlişkin Örnekler Hukuka Uygun Veri İşleme Kişisel Verilerin İşlenmesine İlişkin İstisnalar Özel Nitelikteki Kişisel Verilerin İşlenmesine İlişkin İstisnalar Açık Rızanın Unsurları Nelerdir ve Nasıl İspat Edilir? Kişisel Verilerin İşlenme İlkeleri Kişisel Verilerin Aktarılması Veri Sorumlusunun Yükümlülükleri Aydınlatma Yükümlülüğü Veri Güvenliği Kapsamındaki Yükümlülükler Anonimleştirme, Silme Yok Etme Kapsamındaki Yükümlülükler Önemli Hususlar Diğer Yükümlülükler Veri Sahibinin Hakları Veri Sorumlusuna Başvuru Kişisel Verileri Koruma Kurulu'na Şikayet Usulü Veri Sorumlulukları Sicili Hakkında Yönetmelik Veri Sorumluları Sicili-VERBİS İrtibat Kişisi Kanunlarda Öngörülen Yaptırımlar Güncel Kurul Düzenlemeleri Doğrultusunda Yaptırımlar Kanun'un Uygulanmadığı Haller KVKK Kanunu'na Uyum Tavsiyeler Politika ve Prosedürler Çalışanlara İlişkin Yükümlülük ve TedbirlerBu e-posta tarafınıza TSPB tarafından oluşturulan üye veritabanına kayıtlı olduğunuz için gönderilmiştir.Beni bu listeden çıkar [http://track-9.n-mail-3.com/1100U2389711|01019c00fdf926bb981d59ee664f79715a6a|1110469|10015296.html] From owner-freebsd-net@freebsd.org Thu Jul 9 15:13:05 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id CB2B836DD62 for ; Thu, 9 Jul 2020 15:13:05 +0000 (UTC) (envelope-from markjdb@gmail.com) Received: from mail-qv1-xf42.google.com (mail-qv1-xf42.google.com [IPv6:2607:f8b0:4864:20::f42]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B2fnD5v19z49L2; Thu, 9 Jul 2020 15:13:04 +0000 (UTC) (envelope-from markjdb@gmail.com) Received: by mail-qv1-xf42.google.com with SMTP id e3so1073689qvo.10; Thu, 09 Jul 2020 08:13:04 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:date:from:to:cc:subject:message-id:mime-version :content-disposition; bh=IDOiIttJfhtC89ju9Sf5Efu9XaNqdAAi2nLRqhpgivM=; b=ts1ZjIMgQltDT3/XncHag1kkaXXNUG8Wh56aGk8yHPlxxp27pISTDeamJTNDNLtpX8 OWSUP8+LNOdBEfonoK3dV69gacd+NK6DnpherPMiFNgqDJJ/MC/V14BmpFjxk6F1EJSO 5Y0/n76xvxPTTk5gR5BXaHgXwTxphy/lblOLkj2eeMAZ+h9KW+IMoWPgs60Vw/13N+1s L7RulhnxizH1FXHxnsqcuIlQ39iTCXcVyBo2iuZ5jSZjfkaJquyGQihH8ZycjoMz47hR EraAQNOjwsNor5vbcO70Q8HqfdASSwpv50P92a5ZocQVAHuRW2nRx0vwJ0LoNbZZ+oN3 gn7Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:from:to:cc:subject:message-id :mime-version:content-disposition; bh=IDOiIttJfhtC89ju9Sf5Efu9XaNqdAAi2nLRqhpgivM=; b=b6cjLzfIIrU7LJ6GkPdIj3khmhZuivoKRo+dt5Sr+Hep+Ia5W8fjSzbftCkCMs2wZ0 v0lE89yp53rU0IhqX7A2jc6YkuCHrwwmf9qRg46/0O08YToKBnbEFURqtGgrUff2CUQn HCIbm/S1u0mAtpBBvgm/SWY5BYxTGujP7sEZBssJy5MJ+9WQsuoDJnI9OiAGTVJfizWT hbsuo4wxNcwc6m77kdroGTUC5794Y1InprAP4ziWDlKJb8XxkASCvmHFQtIn0iBOi8Jl hRaDVMSBKc15LjEJaOfz5Xe1KpR2J16swaEzMNGURllcDpcUnk63E8wqgBou7mxI2MbL BvXw== X-Gm-Message-State: AOAM530U7Saafl7vLh7a/6ECSpNtaMtn9YgQ9VyJb7VAxn1vKKlt57eT tf5hrBkg+fkwzGmcsk5ANz8AFAZzPbs= X-Google-Smtp-Source: ABdhPJxWxxQNZtLC+siuyq5Gj1ZqkLo/fDhTaXHzz8Ow4KBK9bvEZd/bWDxv26qlmBz5ktNQC9c5Ag== X-Received: by 2002:a0c:9e4f:: with SMTP id z15mr61757394qve.119.1594307583349; Thu, 09 Jul 2020 08:13:03 -0700 (PDT) Received: from raichu (toroon0560w-lp130-14-174-91-9-204.dsl.bell.ca. [174.91.9.204]) by smtp.gmail.com with ESMTPSA id x13sm3865800qts.57.2020.07.09.08.13.02 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 09 Jul 2020 08:13:02 -0700 (PDT) Sender: Mark Johnston Date: Thu, 9 Jul 2020 11:13:00 -0400 From: Mark Johnston To: freebsd-net@freebsd.org Cc: tuexen@freebsd.org Subject: making SCTP loadable and removing it from GENERIC Message-ID: <20200709151300.GC8947@raichu> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Rspamd-Queue-Id: 4B2fnD5v19z49L2 X-Spamd-Bar: - Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=ts1ZjIMg; dmarc=none; spf=pass (mx1.freebsd.org: domain of markjdb@gmail.com designates 2607:f8b0:4864:20::f42 as permitted sender) smtp.mailfrom=markjdb@gmail.com X-Spamd-Result: default: False [-1.97 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; ARC_NA(0.00)[]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; NEURAL_HAM_MEDIUM(-0.93)[-0.933]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; MIME_GOOD(-0.10)[text/plain]; TO_DN_NONE(0.00)[]; DMARC_NA(0.00)[freebsd.org]; NEURAL_HAM_LONG(-1.02)[-1.017]; RCVD_COUNT_THREE(0.00)[3]; MID_RHS_NOT_FQDN(0.50)[]; DKIM_TRACE(0.00)[gmail.com:+]; RCPT_COUNT_TWO(0.00)[2]; RCVD_IN_DNSWL_NONE(0.00)[2607:f8b0:4864:20::f42:from]; NEURAL_HAM_SHORT(-0.32)[-0.321]; FORGED_SENDER(0.30)[markj@freebsd.org,markjdb@gmail.com]; RECEIVED_SPAMHAUS_PBL(0.00)[174.91.9.204:received]; MIME_TRACE(0.00)[0:+]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; FROM_NEQ_ENVFROM(0.00)[markj@freebsd.org,markjdb@gmail.com]; RCVD_TLS_ALL(0.00)[] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 09 Jul 2020 15:13:05 -0000 Hi, I spent some time working on making it possible to load the SCTP stack as a kernel module, the same as we do today with IPSec. There is one patch remaining to be committed before that can be done in head. One caveat is that the module can't be unloaded, as some work is needed to make this safe. However, this obviously isn't a regression. The work is based on the observations that: 1) the in-kernel SCTP stack is not widely used (I know that the same code is used in some userland applications), and 2) the SCTP stack is quite large, most FreeBSD kernel developers are unfamiliar with it, and bugs in it can easily lead to security holes. Michael has done a lot of work to fix issues in the SCTP code, particularly those found by syzkaller, but given that in-kernel SCTP has few users (almost certainly fewer than IPSec), it seems reasonable to require users to opt in to having an SCTP stack with a simple "kldload sctp". Thus, once the last patch is committed I would like to propose removing "options SCTP" from GENERIC kernel configs in head, replacing it with "options SCTP_SUPPORT" to enable sctp.ko to be loaded. I am wondering if anyone has any objections to or concerns about this proposal. Any feedback is appreciated. From owner-freebsd-net@freebsd.org Thu Jul 9 15:42:05 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id E1D4936EA4C for ; Thu, 9 Jul 2020 15:42:05 +0000 (UTC) (envelope-from tuexen@freebsd.org) Received: from drew.franken.de (mail-n.franken.de [193.175.24.27]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "*.franken.de", Issuer "Sectigo RSA Domain Validation Secure Server CA" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B2gQj5Bwfz4Bb7; Thu, 9 Jul 2020 15:42:05 +0000 (UTC) (envelope-from tuexen@freebsd.org) Received: from [IPv6:2a02:8109:1140:c3d:8586:b984:b3df:b4f] (unknown [IPv6:2a02:8109:1140:c3d:8586:b984:b3df:b4f]) (Authenticated sender: macmic) by mail-n.franken.de (Postfix) with ESMTPSA id 064ED7220C6D5; Thu, 9 Jul 2020 17:42:00 +0200 (CEST) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.80.23.2.2\)) Subject: Re: making SCTP loadable and removing it from GENERIC From: Michael Tuexen In-Reply-To: <20200709151300.GC8947@raichu> Date: Thu, 9 Jul 2020 17:41:59 +0200 Cc: freebsd-net@freebsd.org Content-Transfer-Encoding: 7bit Message-Id: References: <20200709151300.GC8947@raichu> To: Mark Johnston X-Mailer: Apple Mail (2.3608.80.23.2.2) X-Spam-Status: No, score=-2.9 required=5.0 tests=ALL_TRUSTED,BAYES_00 autolearn=disabled version=3.4.1 X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on mail-n.franken.de X-Rspamd-Queue-Id: 4B2gQj5Bwfz4Bb7 X-Spamd-Bar: / Authentication-Results: mx1.freebsd.org; none X-Spamd-Result: default: False [0.00 / 15.00]; ASN(0.00)[asn:680, ipnet:193.174.0.0/15, country:DE]; local_wl_from(0.00)[freebsd.org] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 09 Jul 2020 15:42:05 -0000 > On 9. Jul 2020, at 17:13, Mark Johnston wrote: > > Hi, > > I spent some time working on making it possible to load the SCTP stack > as a kernel module, the same as we do today with IPSec. There is one > patch remaining to be committed before that can be done in head. One > caveat is that the module can't be unloaded, as some work is needed to > make this safe. However, this obviously isn't a regression. > > The work is based on the observations that: > 1) the in-kernel SCTP stack is not widely used (I know that the same > code is used in some userland applications), and > 2) the SCTP stack is quite large, most FreeBSD kernel developers are > unfamiliar with it, and bugs in it can easily lead to security holes. > > Michael has done a lot of work to fix issues in the SCTP code, > particularly those found by syzkaller, but given that in-kernel SCTP has > few users (almost certainly fewer than IPSec), it seems reasonable to > require users to opt in to having an SCTP stack with a simple "kldload > sctp". Thus, once the last patch is committed I would like to propose > removing "options SCTP" from GENERIC kernel configs in head, replacing > it with "options SCTP_SUPPORT" to enable sctp.ko to be loaded. > > I am wondering if anyone has any objections to or concerns about this > proposal. Any feedback is appreciated. Hi Mark, maybe it is acceptable to document user visible changes. This could include * parameter tunings in /etc/sysctl.conf are only applied if the SCTP module is loaded from /etc/loader.conf. * If the module is not loaded yet, a user must have root privileges to run a program using SCTP sockets. Best regards Michael From owner-freebsd-net@freebsd.org Thu Jul 9 16:37:01 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 3B8DA36F883 for ; Thu, 9 Jul 2020 16:37:01 +0000 (UTC) (envelope-from eugen@grosbein.net) Received: from hz.grosbein.net (hz.grosbein.net [IPv6:2a01:4f8:c2c:26d8::2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hz.grosbein.net", Issuer "hz.grosbein.net" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B2hf42ng6z4GP1; Thu, 9 Jul 2020 16:36:59 +0000 (UTC) (envelope-from eugen@grosbein.net) Received: from eg.sd.rdtc.ru (eg.sd.rdtc.ru [IPv6:2a03:3100:c:13:0:0:0:5]) by hz.grosbein.net (8.15.2/8.15.2) with ESMTPS id 069GamfV083402 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 9 Jul 2020 16:36:50 GMT (envelope-from eugen@grosbein.net) X-Envelope-From: eugen@grosbein.net X-Envelope-To: tuexen@freebsd.org Received: from [10.58.0.10] (dadvw [10.58.0.10]) by eg.sd.rdtc.ru (8.15.2/8.15.2) with ESMTPS id 069Gai9Q089899 (version=TLSv1.2 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Thu, 9 Jul 2020 23:36:44 +0700 (+07) (envelope-from eugen@grosbein.net) Subject: Re: making SCTP loadable and removing it from GENERIC To: Michael Tuexen , Mark Johnston References: <20200709151300.GC8947@raichu> Cc: freebsd-net@freebsd.org From: Eugene Grosbein Message-ID: <1a425cce-4905-1d2f-d5ee-cbeb1c300afc@grosbein.net> Date: Thu, 9 Jul 2020 23:36:34 +0700 User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.8.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=0.3 required=5.0 tests=BAYES_00,LOCAL_FROM, SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.2 X-Spam-Report: * -2.3 BAYES_00 BODY: Bayes spam probability is 0 to 1% * [score: 0.0000] * -0.0 SPF_PASS SPF: sender matches SPF record * 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record * 2.6 LOCAL_FROM From my domains X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on hz.grosbein.net X-Rspamd-Queue-Id: 4B2hf42ng6z4GP1 X-Spamd-Bar: / Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=permerror (mx1.freebsd.org: domain of eugen@grosbein.net uses mechanism not recognized by this client) smtp.mailfrom=eugen@grosbein.net X-Spamd-Result: default: False [-0.09 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-0.13)[-0.127]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; TO_DN_SOME(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[grosbein.net]; NEURAL_HAM_LONG(-0.24)[-0.239]; NEURAL_SPAM_SHORT(0.38)[0.376]; RCVD_COUNT_THREE(0.00)[3]; R_SPF_PERMFAIL(0.00)[empty SPF record]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:24940, ipnet:2a01:4f8::/29, country:DE]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_TLS_ALL(0.00)[] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 09 Jul 2020 16:37:01 -0000 09.07.2020 22:41, Michael Tuexen wrote: >> I am wondering if anyone has any objections to or concerns about this >> proposal. Any feedback is appreciated. I'm for it. > maybe it is acceptable to document user visible changes. This could include > * parameter tunings in /etc/sysctl.conf are only applied if the SCTP module > is loaded from /etc/loader.conf. You mean /boot/loader.conf. This may be relaxed with "sctp_enable" knob for /etc/rc.conf and new startup script /etc/rc.d/sctp that: a) REQUIRE: kld; b) checks if sctp.ko already loaded and load it as needed; c) applies sctp sysctl tuning from /etc/sysctl.conf for values that differ. > * If the module is not loaded yet, a user must have root privileges to run > a program using SCTP sockets. From owner-freebsd-net@freebsd.org Thu Jul 9 16:59:11 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id DCB3A36FE42 for ; Thu, 9 Jul 2020 16:59:11 +0000 (UTC) (envelope-from tuexen@freebsd.org) Received: from drew.franken.de (mail-n.franken.de [193.175.24.27]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "*.franken.de", Issuer "Sectigo RSA Domain Validation Secure Server CA" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B2j7g2brkz4HRj; Thu, 9 Jul 2020 16:59:11 +0000 (UTC) (envelope-from tuexen@freebsd.org) Received: from mb.fritz.box (ip4d15f5fc.dynamic.kabel-deutschland.de [77.21.245.252]) (Authenticated sender: macmic) by mail-n.franken.de (Postfix) with ESMTPSA id 8D89D7220C6D0; Thu, 9 Jul 2020 18:59:04 +0200 (CEST) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.80.23.2.2\)) Subject: Re: making SCTP loadable and removing it from GENERIC From: Michael Tuexen In-Reply-To: <1a425cce-4905-1d2f-d5ee-cbeb1c300afc@grosbein.net> Date: Thu, 9 Jul 2020 18:59:02 +0200 Cc: Mark Johnston , freebsd-net@freebsd.org Content-Transfer-Encoding: quoted-printable Message-Id: <64E66BD2-99DA-4FBA-B5A9-03AE2C16C2DB@freebsd.org> References: <20200709151300.GC8947@raichu> <1a425cce-4905-1d2f-d5ee-cbeb1c300afc@grosbein.net> To: Eugene Grosbein X-Mailer: Apple Mail (2.3608.80.23.2.2) X-Spam-Status: No, score=-2.9 required=5.0 tests=ALL_TRUSTED,BAYES_00 autolearn=disabled version=3.4.1 X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on mail-n.franken.de X-Rspamd-Queue-Id: 4B2j7g2brkz4HRj X-Spamd-Bar: / Authentication-Results: mx1.freebsd.org; none X-Spamd-Result: default: False [0.00 / 15.00]; local_wl_from(0.00)[freebsd.org]; ASN(0.00)[asn:680, ipnet:193.174.0.0/15, country:DE] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 09 Jul 2020 16:59:11 -0000 > On 9. Jul 2020, at 18:36, Eugene Grosbein wrote: >=20 > 09.07.2020 22:41, Michael Tuexen wrote: >=20 >>> I am wondering if anyone has any objections to or concerns about = this >>> proposal. Any feedback is appreciated. >=20 > I'm for it. >=20 >> maybe it is acceptable to document user visible changes. This could = include >> * parameter tunings in /etc/sysctl.conf are only applied if the SCTP = module >> is loaded from /etc/loader.conf. >=20 > You mean /boot/loader.conf. Yes, sorry for the mistake. >=20 > This may be relaxed with "sctp_enable" knob for /etc/rc.conf and new = startup script > /etc/rc.d/sctp that: a) REQUIRE: kld; b) checks if sctp.ko already = loaded and load it as needed; > c) applies sctp sysctl tuning from /etc/sysctl.conf for values that = differ. The only difference between this and loading it from /boot/loader.conf I = see is that the above also works on some PPC platforms. Am I missing = something? Best regards Michael >=20 >> * If the module is not loaded yet, a user must have root privileges = to run >> a program using SCTP sockets. >=20 >=20 > _______________________________________________ > freebsd-net@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-net > To unsubscribe, send any mail to "freebsd-net-unsubscribe@freebsd.org" From owner-freebsd-net@freebsd.org Thu Jul 9 17:02:28 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id AA3AA350312 for ; Thu, 9 Jul 2020 17:02:28 +0000 (UTC) (envelope-from markjdb@gmail.com) Received: from mail-qt1-x829.google.com (mail-qt1-x829.google.com [IPv6:2607:f8b0:4864:20::829]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B2jCR6nLjz4Hx2; Thu, 9 Jul 2020 17:02:27 +0000 (UTC) (envelope-from markjdb@gmail.com) Received: by mail-qt1-x829.google.com with SMTP id w27so2198727qtb.7; Thu, 09 Jul 2020 10:02:27 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=KfCr5BUo+ClepYDPzb4Nm+N8DbCGobo6JTwbeTmA93w=; b=kDM+eamrpqktUYr3HQ4Kdhd+vvJDtC8fmmEo+c48cNliadkFiUQlrnN2MJfJZOS11z zgPsoW6SfLGosf8CS+cSUEXL0RJ11MAg7kltElAZ0uyobkDs0PzmMBD85rTizm+9Z0DM ldj++0whlybir9hGIsfFRhIyDs7BNY3Zo9PyEK0re1Xk8WTkOOAtGGegTcqMwF5wkJGG r/n7J1OYKN4LDwn80UAikBXuRWTrJHeUm8pD2bMufZGmW5yEAexRWvNI6rvTHDDu/L35 Sfe5x9dypk91Iwgug17NYJOvEYbn38mXkSeu3j5+Vhqyfiu4bQi9fxlRi7izsB8qxxsj o52Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:from:to:cc:subject:message-id :references:mime-version:content-disposition:in-reply-to; bh=KfCr5BUo+ClepYDPzb4Nm+N8DbCGobo6JTwbeTmA93w=; b=ngFKhKEmZPe7lZq5gfR6woUAOFECLUDsAg0wsN6JMFycUT/bZ0+dTBttwuuA77Z1FI 5gb099G3bYWyyFaJP4olk7tKnfpsgGDuwWkcE7fppShURAmF2DpHMBdUEMzI9VKX1iNq GgVo/WdsRVxeo5kKHyFU6OGwuYmYjZzE148mT0OfXQrTHNc1AemYLQVPfSAN7BUN3bmr qfbiFHIwHn9rq5SClywzQ2+wwobZtBa3IyHjUxfWH+bqPiG2H9aXmKjg4HHQHbm5hCuz a9H+OqDUsoy1DeI3fcSjREvmU9ND7E6cS35+Es6urbqNYOXJo5TDXbzWHnfHe1LJ1Df4 UtCg== X-Gm-Message-State: AOAM533J731gUqsHXe0dqCBwmv161jrik9EYlozpS2oaxPaGSXJwhsGE 7HomfO6iDfJ2Bj1uVacUxQhS/BQqJfo= X-Google-Smtp-Source: ABdhPJz+JfRJaGsfQ4T9DIbw4rs7BIEBsVV4Md0gNpPyqKfk0/6XFsLqDVb/WXIQOtHVGiihO5rUBg== X-Received: by 2002:ac8:1088:: with SMTP id a8mr35128332qtj.90.1594314146780; Thu, 09 Jul 2020 10:02:26 -0700 (PDT) Received: from raichu (toroon0560w-lp130-14-174-91-9-204.dsl.bell.ca. [174.91.9.204]) by smtp.gmail.com with ESMTPSA id i35sm4086119qtd.96.2020.07.09.10.02.25 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 09 Jul 2020 10:02:26 -0700 (PDT) Sender: Mark Johnston Date: Thu, 9 Jul 2020 13:02:23 -0400 From: Mark Johnston To: Eugene Grosbein Cc: Michael Tuexen , freebsd-net@freebsd.org Subject: Re: making SCTP loadable and removing it from GENERIC Message-ID: <20200709170223.GD8947@raichu> References: <20200709151300.GC8947@raichu> <1a425cce-4905-1d2f-d5ee-cbeb1c300afc@grosbein.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1a425cce-4905-1d2f-d5ee-cbeb1c300afc@grosbein.net> X-Rspamd-Queue-Id: 4B2jCR6nLjz4Hx2 X-Spamd-Bar: - Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=kDM+eamr; dmarc=none; spf=pass (mx1.freebsd.org: domain of markjdb@gmail.com designates 2607:f8b0:4864:20::829 as permitted sender) smtp.mailfrom=markjdb@gmail.com X-Spamd-Result: default: False [-1.85 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; NEURAL_HAM_MEDIUM(-0.97)[-0.969]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36:c]; NEURAL_HAM_LONG(-1.03)[-1.030]; MIME_GOOD(-0.10)[text/plain]; MID_RHS_NOT_FQDN(0.50)[]; DMARC_NA(0.00)[freebsd.org]; TO_DN_SOME(0.00)[]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_SOME(0.00)[]; DKIM_TRACE(0.00)[gmail.com:+]; NEURAL_HAM_SHORT(-0.15)[-0.155]; RCVD_IN_DNSWL_NONE(0.00)[2607:f8b0:4864:20::829:from]; FORGED_SENDER(0.30)[markj@freebsd.org,markjdb@gmail.com]; RECEIVED_SPAMHAUS_PBL(0.00)[174.91.9.204:received]; MIME_TRACE(0.00)[0:+]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; FROM_NEQ_ENVFROM(0.00)[markj@freebsd.org,markjdb@gmail.com]; RCVD_TLS_ALL(0.00)[] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 09 Jul 2020 17:02:28 -0000 On Thu, Jul 09, 2020 at 11:36:34PM +0700, Eugene Grosbein wrote: > 09.07.2020 22:41, Michael Tuexen wrote: > > >> I am wondering if anyone has any objections to or concerns about this > >> proposal. Any feedback is appreciated. > > I'm for it. > > > maybe it is acceptable to document user visible changes. This could include > > * parameter tunings in /etc/sysctl.conf are only applied if the SCTP module > > is loaded from /etc/loader.conf. > > You mean /boot/loader.conf. > > This may be relaxed with "sctp_enable" knob for /etc/rc.conf and new startup script > /etc/rc.d/sctp that: a) REQUIRE: kld; b) checks if sctp.ko already loaded and load it as needed; > c) applies sctp sysctl tuning from /etc/sysctl.conf for values that differ. Michael and I talked about this a bit in the past. I propose a more general solution, since it is a problem not just for SCTP: https://reviews.freebsd.org/D25601 From owner-freebsd-net@freebsd.org Thu Jul 9 17:17:01 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id E5B4E3509BE for ; Thu, 9 Jul 2020 17:17:01 +0000 (UTC) (envelope-from tuexen@freebsd.org) Received: from drew.franken.de (mail-n.franken.de [193.175.24.27]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "*.franken.de", Issuer "Sectigo RSA Domain Validation Secure Server CA" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B2jXF5cXwz4K8H; Thu, 9 Jul 2020 17:17:01 +0000 (UTC) (envelope-from tuexen@freebsd.org) Received: from mb.fritz.box (ip4d15f5fc.dynamic.kabel-deutschland.de [77.21.245.252]) (Authenticated sender: macmic) by mail-n.franken.de (Postfix) with ESMTPSA id B58F07220C6C8; Thu, 9 Jul 2020 19:16:57 +0200 (CEST) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.80.23.2.2\)) Subject: Re: making SCTP loadable and removing it from GENERIC From: Michael Tuexen In-Reply-To: <20200709170223.GD8947@raichu> Date: Thu, 9 Jul 2020 19:16:56 +0200 Cc: Eugene Grosbein , freebsd-net@freebsd.org Content-Transfer-Encoding: quoted-printable Message-Id: <4DECBF90-1EB6-4A4C-B619-21372C7D9FB0@freebsd.org> References: <20200709151300.GC8947@raichu> <1a425cce-4905-1d2f-d5ee-cbeb1c300afc@grosbein.net> <20200709170223.GD8947@raichu> To: Mark Johnston X-Mailer: Apple Mail (2.3608.80.23.2.2) X-Spam-Status: No, score=-2.9 required=5.0 tests=ALL_TRUSTED,BAYES_00 autolearn=disabled version=3.4.1 X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on mail-n.franken.de X-Rspamd-Queue-Id: 4B2jXF5cXwz4K8H X-Spamd-Bar: / Authentication-Results: mx1.freebsd.org; none X-Spamd-Result: default: False [0.00 / 15.00]; local_wl_from(0.00)[freebsd.org]; ASN(0.00)[asn:680, ipnet:193.174.0.0/15, country:DE] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 09 Jul 2020 17:17:02 -0000 > On 9. Jul 2020, at 19:02, Mark Johnston wrote: >=20 > On Thu, Jul 09, 2020 at 11:36:34PM +0700, Eugene Grosbein wrote: >> 09.07.2020 22:41, Michael Tuexen wrote: >>=20 >>>> I am wondering if anyone has any objections to or concerns about = this >>>> proposal. Any feedback is appreciated. >>=20 >> I'm for it. >>=20 >>> maybe it is acceptable to document user visible changes. This could = include >>> * parameter tunings in /etc/sysctl.conf are only applied if the SCTP = module >>> is loaded from /etc/loader.conf. >>=20 >> You mean /boot/loader.conf. >>=20 >> This may be relaxed with "sctp_enable" knob for /etc/rc.conf and new = startup script >> /etc/rc.d/sctp that: a) REQUIRE: kld; b) checks if sctp.ko already = loaded and load it as needed; >> c) applies sctp sysctl tuning from /etc/sysctl.conf for values that = differ. >=20 > Michael and I talked about this a bit in the past. I propose a more > general solution, since it is a problem not just for SCTP: > https://reviews.freebsd.org/D25601 That seems like a perfect solution for the problem! Best regards Michael From owner-freebsd-net@freebsd.org Thu Jul 9 17:29:47 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id E3639350F95 for ; Thu, 9 Jul 2020 17:29:47 +0000 (UTC) (envelope-from prvs=54599de8f1=mark.saad@lucera.com) Received: from mx0b-0017d602.pphosted.com (mx0b-0017d602.pphosted.com [148.163.153.124]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "*.pphosted.com", Issuer "Thawte RSA CA 2018" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B2jpy4P22z4KZ2; Thu, 9 Jul 2020 17:29:46 +0000 (UTC) (envelope-from prvs=54599de8f1=mark.saad@lucera.com) Received: from pps.filterd (m0101309.ppops.net [127.0.0.1]) by mx0b-0017d602.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id 069HIDGI024447; Thu, 9 Jul 2020 13:29:45 -0400 Received: from nam12-dm6-obe.outbound.protection.outlook.com (mail-dm6nam12lp2169.outbound.protection.outlook.com [104.47.59.169]) by mx0b-0017d602.pphosted.com with ESMTP id 325k103xkb-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 09 Jul 2020 13:29:45 -0400 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=RArkf0lleCRWI6uVrb6M2ZZiK/4GJiVTkiWVCqF+R0GniCs+hyKezpgwxvjx0+lVzwQha3Va0e3+2DxvWRgpiJFgNvyVEuocJgXh47UftYiaeTjf8EIifDCEP+NoAraAKqXR1mqQAtr8uJ7b5F+hq04aIP0hMFGae3JsqGg1Rxaa9w8Z+cVAlTYuQ/5YN+wHcxuDkqjsNB/RoMfXo1VrNQzCgRMvn+iSxbn4EFIHh5fMLm9ukkIPxQH+yAoFo9NktsT5BOW8L7FPp19ytxCDu64V5wlV/77YfYWweCVdfsaeL4Ubx459w3ouLWFusW5lre0inEbKF1DAqj6iARDl8g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=DcpRDuzXlbLV/M8c0++kt7iO4N3NR4lKfrB+4nzO3UU=; b=BHuVHx4/Zy+iq6XOMfs4yY1LYmM0fOMBecIj6iYzfafx+NW571R5+d0N9VBgUIfe+qLZsvkEHPRu+4DMAEaNJQ+oSt5otAIUHVGuMHw90CUPlrYYQVU6GMnNjcA4rqB6LnHiE62qcgPEJWyZ7JztRMETnQ81XDLLpgUM6V13Im8fAr9v9DaTWpUCUKdLZHN7HjDX3j2ZzR1cZg4MSGqrbSDxtEjyrwp+WXOPUHrxAktTTOoAP/BMKgjKZM5fePeBgHbOu+OetQfg4QCEliov0eRtKi8sokUCQo+q/zmksrUMwnfMphryq9SIKEmQ/bDzcEimRZhP9eYd20w3Q+eSJw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=lucera.com; dmarc=pass action=none header.from=lucera.com; dkim=pass header.d=lucera.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bgccs.onmicrosoft.com; s=selector1-bgccs-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=DcpRDuzXlbLV/M8c0++kt7iO4N3NR4lKfrB+4nzO3UU=; b=Y3xeHxDKMMTAkLTZcrXoWmWL152keQK8QmnKCuQaFyNOAAynabOB3U1fRLTwYhTf91gir7P+bSxN86f3stK11dIo/FW4XYfAqR/sM07Tu6sS9RH+0Bc+KqRpANiwnILQd45uQi/9HRXWIeDnVBODsOdM+F9uHDxAQnN0F7Ib0Wc= Received: from CY4PR12MB1704.namprd12.prod.outlook.com (2603:10b6:903:11d::22) by CY4PR12MB1206.namprd12.prod.outlook.com (2603:10b6:903:3b::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3153.22; Thu, 9 Jul 2020 17:29:42 +0000 Received: from CY4PR12MB1704.namprd12.prod.outlook.com ([fe80::c19f:823:48d2:2863]) by CY4PR12MB1704.namprd12.prod.outlook.com ([fe80::c19f:823:48d2:2863%12]) with mapi id 15.20.3174.021; Thu, 9 Jul 2020 17:29:42 +0000 From: "Saad, Mark" To: "freebsd-net@freebsd.org" CC: "Foster, Greg" , Navdeep Parhar Subject: Re: How to Increase TX Queue Priority for LACP Packets Thread-Topic: How to Increase TX Queue Priority for LACP Packets Thread-Index: AdZBE8R05PE/72svTY6segyLIx/vzAAGao0AALpZlVAABDPSKQAFHQCAAACjorYEdbvMtQ== Date: Thu, 9 Jul 2020 17:29:42 +0000 Message-ID: References: <20200613025031.GA34653@x270> , <20200617001315.GB80914@x270>, In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [69.123.99.190] x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 9f38e8a5-1cea-466e-6b92-08d8242daa50 x-ms-traffictypediagnostic: CY4PR12MB1206: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:10000; x-forefront-prvs: 04599F3534 x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: /+vKO8pkLFMlIsREqVnAUsQ+y3ldJs5j6955nhR6fM2y6egjIqOjDZ/uEGHs8xF3Y5nr94X9F3g7VhmqWQTQpjgyDueooe+tW4FAHqeuR7IzRimpbqHzFGCUEjq7IFM6Laa1jv0mmr/cGqdPgZs630Xtz3WvhKUHLR3c4nPLCqLjjNr0dp3wfuOO4nTXvG6P+KNOyDGmh+36op0Xk0a67CzNtHRKmmIMtLAX86AgKOiW3aabYATcb75liouC5loK1DmCIidGGhchT1pFUL2Ny6M+GtwnJDdC3S+ytSCXAH8byr+40sU2CxJRmi1QrvG5cG86M1u5CEK2/fOVD6hzBfF3seDkgsZ4MmoZJ6VypFu7GTcT5QvluLK861SNOOYM1oLtaP7YmRA5Y/RBz3tbBhm28ydEwoplP4aqjMK/dRWwDgU+IRPityJ355+tXb1eVmdDLoaDcYIMFZThQsfwkA== x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CY4PR12MB1704.namprd12.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(4636009)(366004)(39860400002)(396003)(346002)(376002)(136003)(316002)(478600001)(966005)(83380400001)(8936002)(54906003)(7696005)(66476007)(86362001)(52536014)(8676002)(5660300002)(33656002)(2906002)(71200400001)(4326008)(53546011)(6506007)(6916009)(9686003)(186003)(55016002)(66946007)(64756008)(76116006)(66446008)(91956017)(66556008)(26005)(10126625002); DIR:OUT; SFP:1101; x-ms-exchange-antispam-messagedata: Q7O+DbsT7J90dth9zoPx3dPqP+M6NdC6EenY+UbWPfM/MnEi810JZyp+X3wWNHTUHopn71H3igz9I0AdzbxK6DZLxWOiiid7EqZjaKco+wGWocbBjcNnObSGDJEhBPcHLRSe3Y75na7jYBomVCeQIyn5P6MLMYDHZTtq5J5Fd/Qmcd0ch+4k8EOOOEdIdWc3+msqbbYpMfj6I/jSkVZCbHHQyPysU/Mz56O8Nsy3DjvvuUu59lP5avTacMKsPwhKQCtQbQJcvGcGA8EDcPSnzaJoMI0leYDcOM+OvzUM1M8jwPU5qn7ksn+R0KRL0bIgYv0I06NxqAtRurECafJhWweFSnCZOsD0w62ryKYrPyiVqc0FfY2CN1TLAsz6aeyY2mRW6wckU36Bkj2KajOHloZgUwsnEVYzBgfff/yPmsrxD+6enObDuaAUc6oJ3DDi23lWP1a/pJZMfifTgnDzy1EttWsTdNFh4DH5D8/fywQ= x-ms-exchange-transport-forked: True Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 MIME-Version: 1.0 X-OriginatorOrg: lucera.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: CY4PR12MB1704.namprd12.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 9f38e8a5-1cea-466e-6b92-08d8242daa50 X-MS-Exchange-CrossTenant-originalarrivaltime: 09 Jul 2020 17:29:42.1321 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: cfeb5f5e-839a-44b8-ab46-47157d8f1241 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: B0Pw+XNMNoRjl++bq7tcWeSJ4d8xh8TtA3CPCE7ch9uTcIwMAOBvpRRndjHojkrRPdKZPPZ8eG+R64EtokfIFw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR12MB1206 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.235, 18.0.687 definitions=2020-07-09_09:2020-07-09, 2020-07-09 signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 mlxscore=0 clxscore=1015 impostorscore=0 lowpriorityscore=0 bulkscore=0 priorityscore=1501 adultscore=0 mlxlogscore=999 phishscore=0 malwarescore=0 spamscore=0 suspectscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2006250000 definitions=main-2007090122 X-Rspamd-Queue-Id: 4B2jpy4P22z4KZ2 X-Spamd-Bar: ---- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=bgccs.onmicrosoft.com header.s=selector1-bgccs-onmicrosoft-com header.b=Y3xeHxDK; dmarc=none; spf=pass (mx1.freebsd.org: domain of prvs=54599de8f1=mark.saad@lucera.com designates 148.163.153.124 as permitted sender) smtp.mailfrom=prvs=54599de8f1=mark.saad@lucera.com X-Spamd-Result: default: False [-4.04 / 15.00]; TO_DN_EQ_ADDR_SOME(0.00)[]; HAS_XOIP(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:148.163.153.124]; DKIM_TRACE(0.00)[bgccs.onmicrosoft.com:+]; MIME_BASE64_TEXT(0.10)[]; NEURAL_HAM_SHORT(-0.55)[-0.552]; RCVD_IN_DNSWL_LOW(-0.10)[148.163.153.124:from]; MIME_TRACE(0.00)[0:+]; RCVD_TLS_LAST(0.00)[]; ASN(0.00)[asn:22843, ipnet:148.163.152.0/22, country:US]; FROM_NEQ_ENVFROM(0.00)[Mark.Saad@lucera.com,prvs=54599de8f1=mark.saad@lucera.com]; ARC_ALLOW(-1.00)[microsoft.com:s=arcselector9901:i=1]; NEURAL_HAM_MEDIUM(-0.99)[-0.989]; RCVD_COUNT_FIVE(0.00)[5]; R_DKIM_ALLOW(-0.20)[bgccs.onmicrosoft.com:s=selector1-bgccs-onmicrosoft-com]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; NEURAL_HAM_LONG(-1.00)[-1.000]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[lucera.com]; FORGED_SENDER_VERP_SRS(0.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RWL_MAILSPIKE_POSSIBLE(0.00)[148.163.153.124:from] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 09 Jul 2020 17:29:47 -0000 TmF2ZGVlcCAvIExpc3QNCiAgIENhbiB5b3UgaGVscCBtZSB1bmRlcnN0YW5kIHdoYXQgSSBhbSBs b29raW5nIGF0IGhlcmUuIEkgZW5hYmxlZCB0aGUgbGFjcCBkZWJ1ZyB1bnRpbCBJIGZpbmFsbHkg c2F3IHRoZSBpc3N1ZSBJIG5vdGVkIGJlZm9yZS4gRHVlIHRvIHNvbWUgbG9nIHJvdGF0aW9uIHBh cnQgb2YgdGhlIG1lc3NhZ2UgaXMgY2xpcHBlZC4NCkhlcmUgaXMgYSBwYXJ0IHRoZSBmdWxsIHRo aW5nIGlzIG9uIHBhdGViaW4gaHR0cHM6Ly9wYXN0ZWJpbi5jb20vQkd0YnhjQmYNCg0KDQogMzAg MjAyMC0wNy0wOVQxNTo0NzowNC4xNDU4ODUrMDA6MDAgY2gxLWMxMDQtc2RuMDItbWdtdCBrZXJu ZWw6IHNmeGdlMDogbGFjcF9zbV9yeF90aW1lcjogQ1VSUkVOVCAtPiBFWFBJUkVEDQogMzEgMjAy MC0wNy0wOVQxNTo0NzowNC4xNDU4OTUrMDA6MDAgY2gxLWMxMDQtc2RuMDItbWdtdCBrZXJuZWw6 IHNmeGdlMDogSW50ZXJmYWNlIHN0b3BwZWQgRElTVFJJQlVUSU5HLCBwb3NzaWJsZSBmbGFwcGlu Zw0KIDMyIDIwMjAtMDctMDlUMTU6NDc6MDQuMTQ1ODk1KzAwOjAwIGNoMS1jMTA0LXNkbjAyLW1n bXQga2VybmVsOiBzZnhnZTA6IGNvbGxlY3RpbmcgZW5hYmxlZA0KIDMzIDIwMjAtMDctMDlUMTU6 NDc6MDQuMTQ1ODk2KzAwOjAwIGNoMS1jMTA0LXNkbjAyLW1nbXQga2VybmVsOiBzZnhnZTA6IGRp c2FibGUgZGlzdHJpYnV0aW5nIG9uIGFnZ3JlZ2F0b3IgWyg4MDAwLDAwLTBGLTUzLTY5LTdDLTIw LDAwRjIsMDAwMCwwMDAwKSwoODAwMCw0Ni00Qy1BOC02OC0xMy00NywwMDZBLDAwMDAsMDAwMCld LCBucG9ydHMgMiAtPiAxDQogMzQgMjAyMC0wNy0wOVQxNTo0NzowNC4xNDU5MTErMDA6MDAgY2gx LWMxMDQtc2RuMDItbWdtdCBrZXJuZWw6IHNmeGdlMTogbGFjcF9zZWxlY3RfdHhfcG9ydDogd2Fp dGluZyB0cmFuc2l0DQogMzUgMjAyMC0wNy0wOVQxNTo0NzowNC4xNDU5MTIrMDA6MDAgY2gxLWMx MDQtc2RuMDItbWdtdCBrZXJuZWw6IG1hcmtlciB0cmFuc21pdCwgcG9ydD02LCBzeXM9MDA6MGY6 NTM6Njk6N2M6MjAsIGlkPTQ4Nw0KIDM2IDIwMjAtMDctMDlUMTU6NDc6MDQuMTQ1OTEyKzAwOjAw IGNoMS1jMTA0LXNkbjAyLW1nbXQga2VybmVsOiBzZnhnZTA6IHNmeGdlMTogbGFjcF9zZWxlY3Rf dHhfcG9ydDogd2FpdGluZyB0cmFuc2l0DQogMzcgMjAyMC0wNy0wOVQxNTo0NzowNC4xNDU5MTMr MDA6MDAgY2gxLWMxMDQtc2RuMDItbWdtdCBrZXJuZWw6IG1hcmtlciB0cmFuc21pdCwgcG9ydD01 LCBzeXM9MDA6MGY6NTM6Njk6N2M6MjAsIGlkPTQ4Nw0KIDM4IDIwMjAtMDctMDlUMTU6NDc6MDQu MTQ1OTE0KzAwOjAwIGNoMS1jMTA0LXNkbjAyLW1nbXQga2VybmVsOiBtYXJrZXIgcmVzcG9uc2Us IHBvcnQ9Niwgc3lzPTAwOjBmOjUzOjY5OjdjOjIwLCBpZD00ODcNCiAzOSAyMDIwLTA3LTA5VDE1 OjQ3OjA0LjE0NTkxNCswMDowMCBjaDEtYzEwNC1zZG4wMi1tZ210IGtlcm5lbDogWyg4MDAwLDAw LTBGLTUzLTY5LTdDLTIwLDAwRjIsMDAwMCwwMDAwKSwoODAwMCw0Ni00Qy1BOC02OC0xMy00Nyww MDZBLDAwMDAsMDAwMCldLCBzcGVlZD0xMDAwMDAwMDAwMCwgbnBvcnRzPTENCiA0MCAyMDIwLTA3 LTA5VDE1OjQ3OjA0LjE0NTkyMiswMDowMCBjaDEtYzEwNC1zZG4wMi1tZ210IGtlcm5lbDogc2Z4 Z2UwOiBsYWNwX3NlbGVjdF90eF9wb3J0OiB3YWl0aW5nIHRyYW5zaXQNCiA0MSAyMDIwLTA3LTA5 VDE1OjQ3OjA0LjE0NTkyMyswMDowMCBjaDEtYzEwNC1zZG4wMi1tZ210IGtlcm5lbDogbGFjcF9z ZWxlY3RfdHhfcG9ydDogd2FpdGluZyB0cmFuc2l0DQogNDIgMjAyMC0wNy0wOVQxNTo0NzowNC4x NDU5MjMrMDA6MDAgY2gxLWMxMDQtc2RuMDItbWdtdCBrZXJuZWw6IGFjdGl2ZSBhZ2dyZWdhdG9y IG5vdCBjaGFuZ2VkDQogNDMgMjAyMC0wNy0wOVQxNTo0NzowNC4xNDU5MjQrMDA6MDAgY2gxLWMx MDQtc2RuMDItbWdtdCBrZXJuZWw6IGxhY3Bfc2VsZWN0X3R4X3BvcnQ6IHdhaXRpbmcgdHJhbnNp dA0KIDQ0IDIwMjAtMDctMDlUMTU6NDc6MDQuMTQ1OTI1KzAwOjAwIGNoMS1jMTA0LXNkbjAyLW1n bXQga2VybmVsOiBtYXJrZXIgcmVzcG9uc2UsIHBvcnQ9NSwgc3lzPTAwOjBmOjUzOjY5OjdjOjIw LCBpZD00ODcNCiA0NSAyMDIwLTA3LTA5VDE1OjQ3OjA0LjE0NTkyNSswMDowMCBjaDEtYzEwNC1z ZG4wMi1tZ210IGtlcm5lbDogbGFjcF9zZWxlY3RfdHhfcG9ydDogd2FpdGluZyB0cmFuc2l0DQog NDYgMjAyMC0wNy0wOVQxNTo0NzowNC4xNDU5MjYrMDA6MDAgY2gxLWMxMDQtc2RuMDItbWdtdCBr ZXJuZWw6IG5ldyBbKDgwMDAsMDAtMEYtNTMtNjktN0MtMjAsMDBGMiwwMDAwLDAwMDApLCg4MDAw LDQ2LTRDLUE4LTY4LTEzLTQ3LDAwNkEsMDAwMCwwMDAwKV0NCiA0NyAyMDIwLTA3LTA5VDE1OjQ3 OjA0LjE0NTkyNiswMDowMCBjaDEtYzEwNC1zZG4wMi1tZ210IGtlcm5lbDogU2V0IHRhYmxlIDEg d2l0aCAxIHBvcnRzDQogNDggMjAyMC0wNy0wOVQxNTo0NzowNC4xNDU5MjcrMDA6MDAgY2gxLWMx MDQtc2RuMDItbWdtdCBrZXJuZWw6IHNmeGdlMDogbXV4X3N0YXRlIDQgLT4gMw0KIDQ5IDIwMjAt MDctMDlUMTU6NDc6MDQuMTQ1OTI4KzAwOjAwIGNoMS1jMTA0LXNkbjAyLW1nbXQga2VybmVsOiBz ZnhnZTA6IGNvbGxlY3RpbmcgZGlzYWJsZWQNCiA1MCAyMDIwLTA3LTA5VDE1OjQ3OjA0LjE0NTkz MCswMDowMCBjaDEtYzEwNC1zZG4wMi1tZ210IGtlcm5lbDogc2Z4Z2UwOiBtdXhfc3RhdGUgMyAt PiAyDQogNTEgMjAyMC0wNy0wOVQxNTo0NzowNC4xNDU5MzErMDA6MDAgY2gxLWMxMDQtc2RuMDIt bWdtdCBrZXJuZWw6IHNmeGdlMDogbGFjcGR1IHRyYW5zbWl0DQogNTIgMjAyMC0wNy0wOVQxNTo0 NzowNC4xNDU5MzErMDA6MDAgY2gxLWMxMDQtc2RuMDItbWdtdCBrZXJuZWw6IGFjdG9yPSg4MDAw LDAwLTBGLTUzLTY5LTdDLTIwLDAwRjIsODAwMCwwMDA1KQ0KIDUzIDIwMjAtMDctMDlUMTU6NDc6 MDQuMTQ1OTMyKzAwOjAwIGNoMS1jMTA0LXNkbjAyLW1nbXQga2VybmVsOiBhY3Rvci5zdGF0ZT04 ZDxBQ1RJVklUWSxBR0dSRUdBVElPTixTWU5DLEVYUElSRUQ+DQogNTQgMjAyMC0wNy0wOVQxNTo0 NzowNC4xNDU5MzIrMDA6MDAgY2gxLWMxMDQtc2RuMDItbWdtdCBrZXJuZWw6IHBhcnRuZXI9KDgw MDAsNDYtNEMtQTgtNjgtMTMtNDcsMDA2QSw4MDAwLDAwMDYpDQogNTUgMjAyMC0wNy0wOVQxNTo0 NzowNC4xNDU5MzMrMDA6MDAgY2gxLWMxMDQtc2RuMDItbWdtdCBrZXJuZWw6IHBhcnRuZXIuc3Rh dGU9Mzc8QUNUSVZJVFksVElNRU9VVCxBR0dSRUdBVElPTixDT0xMRUNUSU5HLERJU1RSSUJVVElO Rz4NCiA1NiAyMDIwLTA3LTA5VDE1OjQ3OjA0LjE0NTkzNSswMDowMCBjaDEtYzEwNC1zZG4wMi1t Z210IGtlcm5lbDogbWF4ZGVsYXk9MA0KIDU3IDIwMjAtMDctMDlUMTU6NDc6MDQuMTQ1OTM3KzAw OjAwIGNoMS1jMTA0LXNkbjAyLW1nbXQga2VybmVsOiBxdWV1ZSBmbHVzaCBjb21wbGV0ZQ0KDQoN Cg0KDQotLS0NCk1hcmsgU2FhZA0KbWFyay5zYWFkQGx1Y2VyYS5jb20NCg0KDQpfX19fX19fX19f X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fDQpGcm9tOiBvd25lci1mcmVlYnNkLW5ldEBm cmVlYnNkLm9yZyA8b3duZXItZnJlZWJzZC1uZXRAZnJlZWJzZC5vcmc+IG9uIGJlaGFsZiBvZiBT YWFkLCBNYXJrIDxNYXJrLlNhYWRAbHVjZXJhLmNvbT4NClNlbnQ6IFR1ZXNkYXksIEp1bmUgMTYs IDIwMjAgODozMSBQTQ0KVG86IE5hdmRlZXAgUGFyaGFyDQpDYzogRm9zdGVyLCBHcmVnOyBmcmVl YnNkLW5ldEBmcmVlYnNkLm9yZw0KU3ViamVjdDogUmU6IEhvdyB0byBJbmNyZWFzZSBUWCBRdWV1 ZSBQcmlvcml0eSBmb3IgTEFDUCBQYWNrZXRzDQoNCk5hdmRlZXANCiAgIFRoYW5rcyBmb3IgZ2V0 dGluZyBiYWNrIDsgSeKAmWxsIGRvIHNvbWUgZGlnZ2luZy4gQmFjayB0byB0aGUgcXVlc3Rpb24g YWJvdXQgcnVubmluZyB3aXRoIExBQ1AgZGVidWcgb24gLiBEb2VzIHRoaXMgcHV0IHRoZSBuaWNz IGludG8gcHJvbWlzY3VvdXMgbW9kZSA/DQotLS0NCk1hcmsgU2FhZCB8IG1hcmsuc2FhZEBsdWNl cmEuY29tDQoNCj4gT24gSnVuIDE2LCAyMDIwLCBhdCA4OjEzIFBNLCBOYXZkZWVwIFBhcmhhciA8 bnBAZnJlZWJzZC5vcmc+IHdyb3RlOg0KPg0KPiDvu79XZSBjb3VsZCBoYXZlIGEgZ2xvYmFsIGtu b2IgdGhhdCB0ZWxscyBhbGwgTklDIGRyaXZlcnMgdG8gdXNlIGEgcmVzZXJ2ZWQNCj4gcXVldWUg Zm9yIG5vbi1SU1MgdHJhZmZpYywgYnV0IHRoYXQgd291bGQgYmUgYWR2aXNvcnkgYXQgYmVzdCBi ZWNhdXNlDQo+IHRoZSB0eCBxdWV1ZSBzZWxlY3Rpb24gdGFrZXMgcGxhY2UgaW5zaWRlIHRoZSBk cml2ZXIncyAob3IgaWZsaWIncykNCj4gdHJhbnNtaXQgcm91dGluZS4gIFRoZSBtZWF0IG9mIHRo ZSBjaGFuZ2UgaXMgZ29pbmcgdG8gYmUgaW4gaWZsaWIgYW5kDQo+IGFsbCBub24taWZsaWIgZHJp dmVycycgaWZfdHJhbnNtaXQuDQo+DQo+IFJlZ2FyZHMsDQo+IE5hdmRlZXANCj4NCj4+IE9uIFR1 ZSwgSnVuIDE2LCAyMDIwIGF0IDA5OjQ4OjE5UE0gKzAwMDAsIFNhYWQsIE1hcmsgd3JvdGU6DQo+ PiBBbGwNCj4+IElzIHRoZXJlIGFueSB3YXkgdG8gbWFrZSB0aGlzIGNoYW5nZSBvbiBvdGhlciBu aWMncyBsaWtlIEludGVsIGl4IGFuZA0KPj4gU29sYXJmbGFyZSBzZnhnZSA/IEkgaGF2ZSBzZWVu IHNpbWlsYXIgaXNzdWVzIG9uIGJvdGggd2l0aCAxMi4xDQo+PiBtYWlubHkgd2l0aCBzb2xhcmZs YXJlIG5pY3MuDQo+Pg0KPj4gLS0tDQo+PiBNYXJrIFNhYWQNCj4+IG1hcmsuc2FhZEBsdWNlcmEu Y29tDQo+Pg0KPj4NCj4+IF9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18N Cj4+IEZyb206IG93bmVyLWZyZWVic2QtbmV0QGZyZWVic2Qub3JnIDxvd25lci1mcmVlYnNkLW5l dEBmcmVlYnNkLm9yZz4gb24gYmVoYWxmIG9mIEZvc3RlciwgR3JlZyA8Z2Zvc3RlckBwYW5hc2Fz LmNvbT4NCj4+IFNlbnQ6IFR1ZXNkYXksIEp1bmUgMTYsIDIwMjAgMzo1NiBQTQ0KPj4gVG86IE5h dmRlZXAgUGFyaGFyDQo+PiBDYzogZnJlZWJzZC1uZXRAZnJlZWJzZC5vcmcNCj4+IFN1YmplY3Q6 IFJFOiBIb3cgdG8gSW5jcmVhc2UgVFggUXVldWUgUHJpb3JpdHkgZm9yIExBQ1AgUGFja2V0cw0K Pj4NCj4+IEhJIE5hdmRlZXAsDQo+Pg0KPj4gVGhhbmtzIGZvciB0aGUgaW5mb3JtYXRpb24hICBJ J3ZlIGludGVncmF0ZWQgdGhlIGNoYW5nZXMgYW5kIHdpbGwgYmUNCj4+IHRlc3RpbmcgbW9yZSB0 b2RheS4NCj4+DQo+PiBXZSBoYXZlIHNlZW4gdGhlIExBQ1AgcG9ydCBmbGFwcGluZyB1bmRlciBk aWZmZXJlbnQgc2NlbmFyaW9zLCBtb3N0IHdlDQo+PiBiZWxpZXZlIGFyZSB0cmFmZmljL2xvYWQg YmFzZWQuDQo+Pg0KPj4gSSBkaWQgc2VlIHRoZSBmbGFwcGluZyB1bmV4cGVjdGVkbHkgd2hlbiBJ IGp1c3QgZW5hYmxlZCBMQUNQIGRlYnVnDQo+PiAoZS5nLiwgc3lzY3RsIG5ldC5saW5rLmxhZ2cu bGFjcC5kZWJ1Zz0xKS4gICAgIElzIHRoaXMgYSBrbm93bg0KPj4gcHJvYmxlbT8NCj4+DQo+PiBU aGFua3MNCj4+IEdyZWcNCj4+DQo+PiAtLS0tLU9yaWdpbmFsIE1lc3NhZ2UtLS0tLQ0KPj4gRnJv bTogTmF2ZGVlcCBQYXJoYXIgPG5wYXJoYXJAZ21haWwuY29tPiBPbiBCZWhhbGYgT2YgTmF2ZGVl cCBQYXJoYXINCj4+IFNlbnQ6IEZyaWRheSwgSnVuZSAxMiwgMjAyMCA3OjUxIFBNDQo+PiBUbzog Rm9zdGVyLCBHcmVnIDxnZm9zdGVyQHBhbmFzYXMuY29tPg0KPj4gQ2M6IGZyZWVic2QtbmV0QGZy ZWVic2Qub3JnDQo+PiBTdWJqZWN0OiBSZTogSG93IHRvIEluY3JlYXNlIFRYIFF1ZXVlIFByaW9y aXR5IGZvciBMQUNQIFBhY2tldHMNCj4+DQo+Pj4gT24gRnJpLCBKdW4gMTIsIDIwMjAgYXQgMTE6 NDc6NDFQTSArMDAwMCwgRm9zdGVyLCBHcmVnIHdyb3RlOg0KPj4+IEZyZWVCU0QgTmV0d29ya2Vy cywNCj4+Pg0KPj4+IFdlIGFyZSBzZWVpbmcgTEFDUCBwb3J0IGZsYXBwaW5nIG9uIG91ciBGcmVl QlNEIDEwLjQvMTIuMSBzeXN0ZW1zDQo+Pj4gdW5kZXIgZGlmZmVyZW50IGNvbmRpdGlvbnMuDQo+ Pj4NCj4+PiBDYW4gc29tZW9uZSBleHBsYWluIG9yIHBvaW50IG1lIHRvIHRoZSBpbmZvcm1hdGlv biBvbiBob3cgdG8gcXVldWUNCj4+PiB0aGUgTEFDUCBwYWNrZXRzIHRvIGEgaGlnaGVyIHByaW9y aXR5IHF1ZXVlID8NCj4+Pg0KPj4+IFdlIGFyZSB1c2luZyB0aGUgQ2hlbHNpbyBUNTgwLUxQLUNS IGFkYXB0ZXIvY3hnYmUgZHJpdmVyLiAgVGhlDQo+Pj4gQ2hlc2xpbyBOSUNzIGhhdmUgOCBUWC9S WCBxdWV1ZXMgZWFjaCwgYnV0IEkgZG9uJ3Qga25vdyBob3cgdG8NCj4+PiBleHBsaWNpdGx5IHB1 dCB0aGUgTEFDUCBwYWNrZXRzIGluIHRoZSBoaWdoZXIgcHJpb3JpdHkgVFggcXVldWUuDQo+Pj4N Cj4+PiBJJ3ZlIHJlYWQgYWJvdXQgUEYvQUxUUSBhbmQgdGhpbmsgdGhpcyBtYXkgYmUgb3Zlcmtp bGwgb3VyIG5lZWRzLA0KPj4+IGFuZCB3YXMgd29uZGVyaW5nIGlmIHRoZXJlIHdhcyBhIHNpbXBs ZXIgbWV0aG9kLg0KPj4NCj4+IFRoaXMgaXMgY3hnYmUgc3BlY2lmaWMgYnV0IHRoYXQncyB3aGF0 IHlvdSdyZSB1c2luZyBzbyBpdCdsbCBkby4NCj4+DQo+PiBBZGQgImh3LmN4Z2JlLnJzcnZfbm9m bG93cT0xIiB0byB5b3VyIC9ib290L2xvYWRlci5jb25mLiAgVGhhdA0KPj4gcmVzZXJ2ZXMgb25l IHR4IHF1ZXVlIGZvciBub24tUlNTIHRyYWZmaWMgKGxpa2UgQVJQLCBMQUNQKS4gIFlvdSBtaWdo dA0KPj4gYWxzbyB3YW50IHRvIGluY3JlYXNlIHRoZSBudW1iZXIgb2YgdHggcXVldWVzIHRvIGNv bXBlbnNhdGUgZm9yIHRoZQ0KPj4gb25lIHRoYXQncyBub3cgcmVzZXJ2ZWQuICBVc2UgImh3LmN4 Z2JlLm50eHE9OSIgZm9yIHRoYXQuICBUaGUgbnR4cQ0KPj4ga25vYiBtaWdodCBiZSBkaWZmZXJl bnQgb24gMTAuNCBidXQgdGhlIG1hbiBwYWdlIG1hdGNoaW5nIHRoZSBkcml2ZXINCj4+IHNob3Vs ZCBoYXZlIGl0cyBleGFjdCBuYW1lLg0KPj4NCj4+IFJlZ2FyZHMsDQo+PiBOYXZkZWVwDQo+Pg0K Pj4gX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18NCj4+IGZy ZWVic2QtbmV0QGZyZWVic2Qub3JnIG1haWxpbmcgbGlzdA0KPj4gaHR0cHM6Ly9saXN0cy5mcmVl YnNkLm9yZy9tYWlsbWFuL2xpc3RpbmZvL2ZyZWVic2QtbmV0DQo+PiBUbyB1bnN1YnNjcmliZSwg c2VuZCBhbnkgbWFpbCB0byAiZnJlZWJzZC1uZXQtdW5zdWJzY3JpYmVAZnJlZWJzZC5vcmciDQo+ Pg0KPg0KX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18NCmZy ZWVic2QtbmV0QGZyZWVic2Qub3JnIG1haWxpbmcgbGlzdA0KaHR0cHM6Ly9saXN0cy5mcmVlYnNk Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL2ZyZWVic2QtbmV0DQpUbyB1bnN1YnNjcmliZSwgc2VuZCBh bnkgbWFpbCB0byAiZnJlZWJzZC1uZXQtdW5zdWJzY3JpYmVAZnJlZWJzZC5vcmciDQoNCg== From owner-freebsd-net@freebsd.org Thu Jul 9 19:01:39 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 1F347353788 for ; Thu, 9 Jul 2020 19:01:39 +0000 (UTC) (envelope-from eugen@grosbein.net) Received: from hz.grosbein.net (hz.grosbein.net [IPv6:2a01:4f8:c2c:26d8::2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hz.grosbein.net", Issuer "hz.grosbein.net" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B2lry0ySmz4Tw5; Thu, 9 Jul 2020 19:01:37 +0000 (UTC) (envelope-from eugen@grosbein.net) Received: from eg.sd.rdtc.ru (eg.sd.rdtc.ru [IPv6:2a03:3100:c:13:0:0:0:5]) by hz.grosbein.net (8.15.2/8.15.2) with ESMTPS id 069J1Ua5085644 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 9 Jul 2020 19:01:32 GMT (envelope-from eugen@grosbein.net) X-Envelope-From: eugen@grosbein.net X-Envelope-To: tuexen@freebsd.org Received: from [10.58.0.10] (dadvw [10.58.0.10]) by eg.sd.rdtc.ru (8.15.2/8.15.2) with ESMTPS id 069J1QZF090900 (version=TLSv1.2 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Fri, 10 Jul 2020 02:01:26 +0700 (+07) (envelope-from eugen@grosbein.net) Subject: Re: making SCTP loadable and removing it from GENERIC To: Michael Tuexen References: <20200709151300.GC8947@raichu> <1a425cce-4905-1d2f-d5ee-cbeb1c300afc@grosbein.net> <64E66BD2-99DA-4FBA-B5A9-03AE2C16C2DB@freebsd.org> Cc: Mark Johnston , freebsd-net@freebsd.org From: Eugene Grosbein Message-ID: Date: Fri, 10 Jul 2020 02:01:16 +0700 User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.8.0 MIME-Version: 1.0 In-Reply-To: <64E66BD2-99DA-4FBA-B5A9-03AE2C16C2DB@freebsd.org> Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=0.3 required=5.0 tests=BAYES_00,LOCAL_FROM, SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.2 X-Spam-Report: * -2.3 BAYES_00 BODY: Bayes spam probability is 0 to 1% * [score: 0.0000] * -0.0 SPF_PASS SPF: sender matches SPF record * 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record * 2.6 LOCAL_FROM From my domains X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on hz.grosbein.net X-Rspamd-Queue-Id: 4B2lry0ySmz4Tw5 X-Spamd-Bar: / Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=permerror (mx1.freebsd.org: domain of eugen@grosbein.net uses mechanism not recognized by this client) smtp.mailfrom=eugen@grosbein.net X-Spamd-Result: default: False [-0.18 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-0.13)[-0.127]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; TO_DN_SOME(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[grosbein.net]; NEURAL_HAM_LONG(-0.24)[-0.239]; NEURAL_SPAM_SHORT(0.29)[0.289]; RCVD_COUNT_THREE(0.00)[3]; R_SPF_PERMFAIL(0.00)[empty SPF record]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:24940, ipnet:2a01:4f8::/29, country:DE]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_TLS_ALL(0.00)[] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 09 Jul 2020 19:01:39 -0000 09.07.2020 23:59, Michael Tuexen wrote: >> This may be relaxed with "sctp_enable" knob for /etc/rc.conf and new startup script >> /etc/rc.d/sctp that: a) REQUIRE: kld; b) checks if sctp.ko already loaded and load it as needed; >> c) applies sctp sysctl tuning from /etc/sysctl.conf for values that differ. > The only difference between this and loading it from /boot/loader.conf I see > is that the above also works on some PPC platforms. Am I missing something? This is mostly optimization issue as kld_list from /etc/rc.conf is processed when kernel is up and running so file system cache is engaged to cache directories etc. Loader reads modules much slower especially for slow media like CompactFlash. Also, some platforms like MIPS32 using U-Boot have no loader at all. U-Boot may start kernel directly. From owner-freebsd-net@freebsd.org Thu Jul 9 19:41:32 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id A9CF5354340 for ; Thu, 9 Jul 2020 19:41:32 +0000 (UTC) (envelope-from tuexen@freebsd.org) Received: from drew.franken.de (mail-n.franken.de [193.175.24.27]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "*.franken.de", Issuer "Sectigo RSA Domain Validation Secure Server CA" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B2ml029jvz4WSj; Thu, 9 Jul 2020 19:41:31 +0000 (UTC) (envelope-from tuexen@freebsd.org) Received: from mb.fritz.box (ip4d15f5fc.dynamic.kabel-deutschland.de [77.21.245.252]) (Authenticated sender: macmic) by mail-n.franken.de (Postfix) with ESMTPSA id B6A907220B82B; Thu, 9 Jul 2020 21:41:27 +0200 (CEST) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.80.23.2.2\)) Subject: Re: making SCTP loadable and removing it from GENERIC From: Michael Tuexen In-Reply-To: Date: Thu, 9 Jul 2020 21:41:26 +0200 Cc: Mark Johnston , freebsd-net@freebsd.org Content-Transfer-Encoding: quoted-printable Message-Id: References: <20200709151300.GC8947@raichu> <1a425cce-4905-1d2f-d5ee-cbeb1c300afc@grosbein.net> <64E66BD2-99DA-4FBA-B5A9-03AE2C16C2DB@freebsd.org> To: Eugene Grosbein X-Mailer: Apple Mail (2.3608.80.23.2.2) X-Spam-Status: No, score=-2.9 required=5.0 tests=ALL_TRUSTED,BAYES_00 autolearn=disabled version=3.4.1 X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on mail-n.franken.de X-Rspamd-Queue-Id: 4B2ml029jvz4WSj X-Spamd-Bar: / Authentication-Results: mx1.freebsd.org; none X-Spamd-Result: default: False [0.00 / 15.00]; ASN(0.00)[asn:680, ipnet:193.174.0.0/15, country:DE]; local_wl_from(0.00)[freebsd.org] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 09 Jul 2020 19:41:32 -0000 > On 9. Jul 2020, at 21:01, Eugene Grosbein wrote: >=20 > 09.07.2020 23:59, Michael Tuexen wrote: >=20 >>> This may be relaxed with "sctp_enable" knob for /etc/rc.conf and new = startup script >>> /etc/rc.d/sctp that: a) REQUIRE: kld; b) checks if sctp.ko already = loaded and load it as needed; >>> c) applies sctp sysctl tuning from /etc/sysctl.conf for values that = differ. >> The only difference between this and loading it from = /boot/loader.conf I see >> is that the above also works on some PPC platforms. Am I missing = something? >=20 > This is mostly optimization issue as kld_list from /etc/rc.conf is = processed > when kernel is up and running so file system cache is engaged to cache = directories etc. > Loader reads modules much slower especially for slow media like = CompactFlash. OK. Thank you for the explanation. >=20 > Also, some platforms like MIPS32 using U-Boot have no loader at all. > U-Boot may start kernel directly. I know. The only platform I'm personally affected is 64-bit PPC using petitboot. But I can compile SCTP in the kernel and have no problem with this limitation. However, loading with kld_list and Marks patch to run sysctl = initialisation after that would be a perfect fit for an SCTP module. I really like = that, but I have no idea whether this fits in the architecture or not... Best regards Michael > _______________________________________________ > freebsd-net@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-net > To unsubscribe, send any mail to "freebsd-net-unsubscribe@freebsd.org" From owner-freebsd-net@freebsd.org Thu Jul 9 19:44:32 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 665193544EC for ; Thu, 9 Jul 2020 19:44:32 +0000 (UTC) (envelope-from SRS0=nAK9=AU=mail.sermon-archive.info=doug@sermon-archive.info) Received: from mail.sermon-archive.info (sermon-archive.info [71.177.216.148]) by mx1.freebsd.org (Postfix) with ESMTP id 4B2mpR4J1bz4WxZ; Thu, 9 Jul 2020 19:44:31 +0000 (UTC) (envelope-from SRS0=nAK9=AU=mail.sermon-archive.info=doug@sermon-archive.info) Received: from [10.0.1.251] (mini [10.0.1.251]) by mail.sermon-archive.info (Postfix) with ESMTPSA id 4B2mpK2fG8z2fjRM; Thu, 9 Jul 2020 12:44:25 -0700 (PDT) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.14\)) Subject: Re: making SCTP loadable and removing it from GENERIC From: Doug Hardie In-Reply-To: <20200709151300.GC8947@raichu> Date: Thu, 9 Jul 2020 12:44:25 -0700 Cc: freebsd-net@freebsd.org, tuexen@freebsd.org Content-Transfer-Encoding: quoted-printable Message-Id: <63F4446F-DECF-4DE8-99CA-EC8755A5D4A1@mail.sermon-archive.info> References: <20200709151300.GC8947@raichu> To: Mark Johnston X-Mailer: Apple Mail (2.3445.104.14) X-Virus-Scanned: clamav-milter 0.101.4 at mail X-Virus-Status: Clean X-Rspamd-Queue-Id: 4B2mpR4J1bz4WxZ X-Spamd-Bar: - Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of SRS0=nAK9=AU=mail.sermon-archive.info=doug@sermon-archive.info designates 71.177.216.148 as permitted sender) smtp.mailfrom=SRS0=nAK9=AU=mail.sermon-archive.info=doug@sermon-archive.info X-Spamd-Result: default: False [-1.63 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.001]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; MV_CASE(0.50)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; R_SPF_ALLOW(-0.20)[+ip4:71.177.216.148]; DMARC_NA(0.00)[lafn.org: no valid DMARC record]; TO_DN_SOME(0.00)[]; NEURAL_HAM_LONG(-1.02)[-1.018]; NEURAL_HAM_SHORT(-0.21)[-0.208]; FORGED_SENDER(0.30)[bc979@lafn.org,SRS0=nAK9=AU=mail.sermon-archive.info=doug@sermon-archive.info]; RCVD_NO_TLS_LAST(0.10)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:5650, ipnet:71.177.216.0/23, country:US]; FROM_NEQ_ENVFROM(0.00)[bc979@lafn.org,SRS0=nAK9=AU=mail.sermon-archive.info=doug@sermon-archive.info]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 09 Jul 2020 19:44:32 -0000 > On 9 July 2020, at 08:13, Mark Johnston wrote: >=20 > Hi, >=20 > I spent some time working on making it possible to load the SCTP stack > as a kernel module, the same as we do today with IPSec. There is one > patch remaining to be committed before that can be done in head. One > caveat is that the module can't be unloaded, as some work is needed to > make this safe. However, this obviously isn't a regression. >=20 > The work is based on the observations that: > 1) the in-kernel SCTP stack is not widely used (I know that the same > code is used in some userland applications), and > 2) the SCTP stack is quite large, most FreeBSD kernel developers are > unfamiliar with it, and bugs in it can easily lead to security = holes. >=20 > Michael has done a lot of work to fix issues in the SCTP code, > particularly those found by syzkaller, but given that in-kernel SCTP = has > few users (almost certainly fewer than IPSec), it seems reasonable to > require users to opt in to having an SCTP stack with a simple "kldload > sctp". Thus, once the last patch is committed I would like to propose > removing "options SCTP" from GENERIC kernel configs in head, replacing > it with "options SCTP_SUPPORT" to enable sctp.ko to be loaded. >=20 > I am wondering if anyone has any objections to or concerns about this > proposal. Any feedback is appreciated. I have a number of systems using SCTP. It is a key part of a = distributed application. As a user of SCTP, I have a slight objection = to removing it from the kernel. It would require me to remember when = setting up a new system to enable that. I am not likely to remember. = What is going to happen if you run an application that uses SCTP and the = module is not loaded? What will remind me how to fix the issue? I am = not likely to remember about this 6 months from now. -- Doug= From owner-freebsd-net@freebsd.org Thu Jul 9 20:00:20 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 213FC354B81 for ; Thu, 9 Jul 2020 20:00:20 +0000 (UTC) (envelope-from tuexen@freebsd.org) Received: from drew.franken.de (mail-n.franken.de [193.175.24.27]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "*.franken.de", Issuer "Sectigo RSA Domain Validation Secure Server CA" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B2n8g6r4kz4Y0x; Thu, 9 Jul 2020 20:00:19 +0000 (UTC) (envelope-from tuexen@freebsd.org) Received: from mb.fritz.box (ip4d15f5fc.dynamic.kabel-deutschland.de [77.21.245.252]) (Authenticated sender: macmic) by mail-n.franken.de (Postfix) with ESMTPSA id 2BE847220B82B; Thu, 9 Jul 2020 22:00:17 +0200 (CEST) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.80.23.2.2\)) Subject: Re: making SCTP loadable and removing it from GENERIC From: Michael Tuexen In-Reply-To: <63F4446F-DECF-4DE8-99CA-EC8755A5D4A1@mail.sermon-archive.info> Date: Thu, 9 Jul 2020 22:00:16 +0200 Cc: Mark Johnston , freebsd-net@freebsd.org Content-Transfer-Encoding: quoted-printable Message-Id: <5C210E52-0447-450C-B515-70FDC5EA29F4@freebsd.org> References: <20200709151300.GC8947@raichu> <63F4446F-DECF-4DE8-99CA-EC8755A5D4A1@mail.sermon-archive.info> To: Doug Hardie X-Mailer: Apple Mail (2.3608.80.23.2.2) X-Spam-Status: No, score=-2.9 required=5.0 tests=ALL_TRUSTED,BAYES_00 autolearn=disabled version=3.4.1 X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on mail-n.franken.de X-Rspamd-Queue-Id: 4B2n8g6r4kz4Y0x X-Spamd-Bar: / Authentication-Results: mx1.freebsd.org; none X-Spamd-Result: default: False [0.00 / 15.00]; local_wl_from(0.00)[freebsd.org]; ASN(0.00)[asn:680, ipnet:193.174.0.0/15, country:DE] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 09 Jul 2020 20:00:20 -0000 > On 9. Jul 2020, at 21:44, Doug Hardie wrote: >=20 >> On 9 July 2020, at 08:13, Mark Johnston wrote: >>=20 >> Hi, >>=20 >> I spent some time working on making it possible to load the SCTP = stack >> as a kernel module, the same as we do today with IPSec. There is one >> patch remaining to be committed before that can be done in head. One >> caveat is that the module can't be unloaded, as some work is needed = to >> make this safe. However, this obviously isn't a regression. >>=20 >> The work is based on the observations that: >> 1) the in-kernel SCTP stack is not widely used (I know that the same >> code is used in some userland applications), and >> 2) the SCTP stack is quite large, most FreeBSD kernel developers are >> unfamiliar with it, and bugs in it can easily lead to security = holes. >>=20 >> Michael has done a lot of work to fix issues in the SCTP code, >> particularly those found by syzkaller, but given that in-kernel SCTP = has >> few users (almost certainly fewer than IPSec), it seems reasonable to >> require users to opt in to having an SCTP stack with a simple = "kldload >> sctp". Thus, once the last patch is committed I would like to = propose >> removing "options SCTP" from GENERIC kernel configs in head, = replacing >> it with "options SCTP_SUPPORT" to enable sctp.ko to be loaded. >>=20 >> I am wondering if anyone has any objections to or concerns about this >> proposal. Any feedback is appreciated. >=20 > I have a number of systems using SCTP. It is a key part of a = distributed application. As a user of SCTP, I have a slight objection = to removing it from the kernel. It would require me to remember when = setting up a new system to enable that. I am not likely to remember. = What is going to happen if you run an application that uses SCTP and the = module is not loaded? What will remind=20 The socket() call would fail. What then happens depend on the error = handling in your application. > me how to fix the issue? I am not likely to remember about this 6 = months from now. I'm not sure, but I guess Mark is planning to MFC the changes to = stable/12. So you would test this when upgrading to 12.2, I guess. I suggested to document what user have to do (assuming they read UPGRADING and it gets documented there. Best regards Michael >=20 > -- Doug From owner-freebsd-net@freebsd.org Thu Jul 9 20:10:50 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id C920D355181 for ; Thu, 9 Jul 2020 20:10:50 +0000 (UTC) (envelope-from markjdb@gmail.com) Received: from mail-qt1-x841.google.com (mail-qt1-x841.google.com [IPv6:2607:f8b0:4864:20::841]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B2nNn5hXnz4Ytn; Thu, 9 Jul 2020 20:10:49 +0000 (UTC) (envelope-from markjdb@gmail.com) Received: by mail-qt1-x841.google.com with SMTP id w27so2673060qtb.7; Thu, 09 Jul 2020 13:10:49 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=mFGYMg2wzSSFxIKAWLpbQwjf3SCuFxu+TV5U45sURoE=; b=E7XwRetHcfiF+rqeG+z9rB6u9uoaRrHt1Iziz5uPZe45dVWqCQK80CT6u86T5Ql9xu oqruKZzSr2hi/oIIY1KwYjSC25DEMXecvP+1ErBYN2S5ZXa20PcGsh0JwDWHjelPmj7f 2HbyrgSrLlUpW8jDrD4bNMIUhEjj0TxrWrAc4R/fpJNWToOfNGIG6HxK10ZQWqKyPWpG qIFUXTHCuDh/jxweIz67mOdj1SSwCtzf4bfEKXMsRbc/dNLTXBu35LtiSfs732sO6mrk 921DGgym9ApqW4jGo3Rj23Zv1QHF8AILlOzHmz2o356g/Us6Rl2zowzooX3cveaAealb McQw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:from:to:cc:subject:message-id :references:mime-version:content-disposition:in-reply-to; bh=mFGYMg2wzSSFxIKAWLpbQwjf3SCuFxu+TV5U45sURoE=; b=W8OApaqd03AhdGGS6EBRqUebCYUnZcuwmyipcDoDeOr5YKbAYqUSsaKZq2Kzb4m9Nf Wbu2axlxeTgRFu33KFv/KldM8F1o6QPbHEOZot/WNoSZUTkwlFy7Yw4RfC78BeGXggBt CRs47wETyU3EWhPxMooVdmxNlrvglKZtpxq/LMuuYXlL6UgimJThpyQs6o/NRBEIH/6P lbd0PtiT7+bd8nNu85B8vYphhw9/JIx16xS2TZV1v35xKSrbkLhyU4i7287CO+5B9790 kzsfYhoeD5R5b2H/iraGVvkzUqDXDcsEZKnalCYfJOlThj/qP+iodd0obuPc7t2G8qRg eQ3w== X-Gm-Message-State: AOAM531YwMAEyKn4vfW+ZTxHRpJxZdiv+/8+xszl+6DiBoA0DZzxzH2r Z9LWzkDIlvY9uGnqSZQmw5ld09gKfzk= X-Google-Smtp-Source: ABdhPJwYfeCIBtD73YsNSdY7HD+kBOhEFZv2qAIAjAZr0utmLF2ccKOuL6i4TzhJD8kXr5p388terw== X-Received: by 2002:aed:238d:: with SMTP id j13mr63106909qtc.220.1594325447539; Thu, 09 Jul 2020 13:10:47 -0700 (PDT) Received: from raichu (toroon0560w-lp130-14-174-91-9-204.dsl.bell.ca. [174.91.9.204]) by smtp.gmail.com with ESMTPSA id v28sm4493719qkv.31.2020.07.09.13.10.46 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 09 Jul 2020 13:10:46 -0700 (PDT) Sender: Mark Johnston Date: Thu, 9 Jul 2020 16:10:44 -0400 From: Mark Johnston To: Doug Hardie Cc: freebsd-net@freebsd.org, tuexen@freebsd.org Subject: Re: making SCTP loadable and removing it from GENERIC Message-ID: <20200709201044.GG8947@raichu> References: <20200709151300.GC8947@raichu> <63F4446F-DECF-4DE8-99CA-EC8755A5D4A1@mail.sermon-archive.info> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <63F4446F-DECF-4DE8-99CA-EC8755A5D4A1@mail.sermon-archive.info> X-Rspamd-Queue-Id: 4B2nNn5hXnz4Ytn X-Spamd-Bar: - Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=E7XwRetH; dmarc=none; spf=pass (mx1.freebsd.org: domain of markjdb@gmail.com designates 2607:f8b0:4864:20::841 as permitted sender) smtp.mailfrom=markjdb@gmail.com X-Spamd-Result: default: False [-1.79 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; NEURAL_HAM_MEDIUM(-0.97)[-0.967]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36:c]; NEURAL_HAM_LONG(-1.03)[-1.029]; MIME_GOOD(-0.10)[text/plain]; MID_RHS_NOT_FQDN(0.50)[]; DMARC_NA(0.00)[freebsd.org]; TO_DN_SOME(0.00)[]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_SOME(0.00)[]; DKIM_TRACE(0.00)[gmail.com:+]; NEURAL_HAM_SHORT(-0.09)[-0.091]; RCVD_IN_DNSWL_NONE(0.00)[2607:f8b0:4864:20::841:from]; FORGED_SENDER(0.30)[markj@freebsd.org,markjdb@gmail.com]; RECEIVED_SPAMHAUS_PBL(0.00)[174.91.9.204:received]; MIME_TRACE(0.00)[0:+]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; FROM_NEQ_ENVFROM(0.00)[markj@freebsd.org,markjdb@gmail.com]; RCVD_TLS_ALL(0.00)[] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 09 Jul 2020 20:10:50 -0000 On Thu, Jul 09, 2020 at 12:44:25PM -0700, Doug Hardie wrote: > > On 9 July 2020, at 08:13, Mark Johnston wrote: > > > > Hi, > > > > I spent some time working on making it possible to load the SCTP stack > > as a kernel module, the same as we do today with IPSec. There is one > > patch remaining to be committed before that can be done in head. One > > caveat is that the module can't be unloaded, as some work is needed to > > make this safe. However, this obviously isn't a regression. > > > > The work is based on the observations that: > > 1) the in-kernel SCTP stack is not widely used (I know that the same > > code is used in some userland applications), and > > 2) the SCTP stack is quite large, most FreeBSD kernel developers are > > unfamiliar with it, and bugs in it can easily lead to security holes. > > > > Michael has done a lot of work to fix issues in the SCTP code, > > particularly those found by syzkaller, but given that in-kernel SCTP has > > few users (almost certainly fewer than IPSec), it seems reasonable to > > require users to opt in to having an SCTP stack with a simple "kldload > > sctp". Thus, once the last patch is committed I would like to propose > > removing "options SCTP" from GENERIC kernel configs in head, replacing > > it with "options SCTP_SUPPORT" to enable sctp.ko to be loaded. > > > > I am wondering if anyone has any objections to or concerns about this > > proposal. Any feedback is appreciated. > > I have a number of systems using SCTP. It is a key part of a distributed application. As a user of SCTP, I have a slight objection to removing it from the kernel. It would require me to remember when setting up a new system to enable that. I am not likely to remember. To be clear, with the proposed change SCTP can be loaded at boot by adding a single line: sctp_load="YES" to /boot/loader.conf, or kld_list="sctp" to /etc/rc.conf. Also, the change will not be present in a release until 13.0 or possibly 12.2, which provides plenty of time, and the release notes will reflect the change. I was really looking for objections pointing out that a dynamically loaded SCTP stack would prevent or inhibit some workflow. Relying on being able to configure systems from memory rather than using a checklist or some automated configuration management does not seem to be a good reason for keeping SCTP in the kernel. > What is going to happen if you run an application that uses SCTP and the module is not loaded? An attempt to create an SCTP socket will fail with EPROTONOSUPPORT, "Protocol not supported". > What will remind me how to fix the issue? I am not likely to remember about this 6 months from now. Hopefully "protocol not supported" is a sufficiently descriptive error message. From owner-freebsd-net@freebsd.org Thu Jul 9 21:15:43 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 4B584356730 for ; Thu, 9 Jul 2020 21:15:43 +0000 (UTC) (envelope-from SRS0=nAK9=AU=mail.sermon-archive.info=doug@sermon-archive.info) Received: from mail.sermon-archive.info (sermon-archive.info [71.177.216.148]) by mx1.freebsd.org (Postfix) with ESMTP id 4B2pqf4Cgdz4dcN; Thu, 9 Jul 2020 21:15:42 +0000 (UTC) (envelope-from SRS0=nAK9=AU=mail.sermon-archive.info=doug@sermon-archive.info) Received: from [10.0.1.251] (mini [10.0.1.251]) by mail.sermon-archive.info (Postfix) with ESMTPSA id 4B2pqd28whz2fv2N; Thu, 9 Jul 2020 14:15:41 -0700 (PDT) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.14\)) Subject: Re: making SCTP loadable and removing it from GENERIC From: Doug Hardie In-Reply-To: <20200709201044.GG8947@raichu> Date: Thu, 9 Jul 2020 14:15:40 -0700 Cc: Doug Hardie , freebsd-net@freebsd.org, tuexen@freebsd.org Content-Transfer-Encoding: quoted-printable Message-Id: <3DC5AC46-604E-4CB4-93EC-6421ED575DBB@mail.sermon-archive.info> References: <20200709151300.GC8947@raichu> <63F4446F-DECF-4DE8-99CA-EC8755A5D4A1@mail.sermon-archive.info> <20200709201044.GG8947@raichu> To: Mark Johnston X-Mailer: Apple Mail (2.3445.104.14) X-Virus-Scanned: clamav-milter 0.101.4 at mail X-Virus-Status: Clean X-Rspamd-Queue-Id: 4B2pqf4Cgdz4dcN X-Spamd-Bar: - Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of SRS0=nAK9=AU=mail.sermon-archive.info=doug@sermon-archive.info designates 71.177.216.148 as permitted sender) smtp.mailfrom=SRS0=nAK9=AU=mail.sermon-archive.info=doug@sermon-archive.info X-Spamd-Result: default: False [-1.99 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.02)[-1.023]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[4]; MV_CASE(0.50)[]; R_SPF_ALLOW(-0.20)[+ip4:71.177.216.148]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[lafn.org: no valid DMARC record]; NEURAL_HAM_LONG(-1.02)[-1.025]; TO_DN_SOME(0.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; NEURAL_HAM_SHORT(-0.54)[-0.537]; FORGED_SENDER(0.30)[bc979@lafn.org,SRS0=nAK9=AU=mail.sermon-archive.info=doug@sermon-archive.info]; RCVD_NO_TLS_LAST(0.10)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:5650, ipnet:71.177.216.0/23, country:US]; FROM_NEQ_ENVFROM(0.00)[bc979@lafn.org,SRS0=nAK9=AU=mail.sermon-archive.info=doug@sermon-archive.info]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 09 Jul 2020 21:15:43 -0000 > On 9 July 2020, at 13:10, Mark Johnston wrote: >=20 > On Thu, Jul 09, 2020 at 12:44:25PM -0700, Doug Hardie wrote: >>> On 9 July 2020, at 08:13, Mark Johnston wrote: >>>=20 >>> Hi, >>>=20 >>> I spent some time working on making it possible to load the SCTP = stack >>> as a kernel module, the same as we do today with IPSec. There is = one >>> patch remaining to be committed before that can be done in head. = One >>> caveat is that the module can't be unloaded, as some work is needed = to >>> make this safe. However, this obviously isn't a regression. >>>=20 >>> The work is based on the observations that: >>> 1) the in-kernel SCTP stack is not widely used (I know that the same >>> code is used in some userland applications), and >>> 2) the SCTP stack is quite large, most FreeBSD kernel developers are >>> unfamiliar with it, and bugs in it can easily lead to security = holes. >>>=20 >>> Michael has done a lot of work to fix issues in the SCTP code, >>> particularly those found by syzkaller, but given that in-kernel SCTP = has >>> few users (almost certainly fewer than IPSec), it seems reasonable = to >>> require users to opt in to having an SCTP stack with a simple = "kldload >>> sctp". Thus, once the last patch is committed I would like to = propose >>> removing "options SCTP" from GENERIC kernel configs in head, = replacing >>> it with "options SCTP_SUPPORT" to enable sctp.ko to be loaded. >>>=20 >>> I am wondering if anyone has any objections to or concerns about = this >>> proposal. Any feedback is appreciated. >>=20 >> I have a number of systems using SCTP. It is a key part of a = distributed application. As a user of SCTP, I have a slight objection = to removing it from the kernel. It would require me to remember when = setting up a new system to enable that. I am not likely to remember. >=20 > To be clear, with the proposed change SCTP can be loaded at boot by > adding a single line: sctp_load=3D"YES" to /boot/loader.conf, or > kld_list=3D"sctp" to /etc/rc.conf. Also, the change will not be = present > in a release until 13.0 or possibly 12.2, which provides plenty of = time, > and the release notes will reflect the change. >=20 > I was really looking for objections pointing out that a dynamically > loaded SCTP stack would prevent or inhibit some workflow. Relying on > being able to configure systems from memory rather than using a > checklist or some automated configuration management does not seem to = be > a good reason for keeping SCTP in the kernel. >=20 >> What is going to happen if you run an application that uses SCTP and = the module is not loaded? >=20 > An attempt to create an SCTP socket will fail with EPROTONOSUPPORT, > "Protocol not supported". >=20 >> What will remind me how to fix the issue? I am not likely to = remember about this 6 months from now. >=20 > Hopefully "protocol not supported" is a sufficiently descriptive error > message.=20 Actually, the users of these systems would have no clue about that = message. All they would figure out is that the system is down and they = can't do their job and bitch to the CEO. I am going to assume that that = error will be produced by the socket call and I have added code to check = for it and email me if it occurs. I believe that the only viable = approach for us is the rc.conf solution as some of these systems are = rhapsberry pi 3s which I understand don't use the loader.conf file. One of the configurations we are considering is for each user to have = their own Rhapsberry Pi and eliminate the central server. All data is = replicated between all the machines so there is no need for a central = server anymore. If I can make that work, it would be a large cost = savings for my client. -- Doug From owner-freebsd-net@freebsd.org Thu Jul 9 21:45:41 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id EC8F5357780 for ; Thu, 9 Jul 2020 21:45:41 +0000 (UTC) (envelope-from tuexen@freebsd.org) Received: from drew.franken.de (drew.ipv6.franken.de [IPv6:2001:638:a02:a001:20e:cff:fe4a:feaa]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "*.franken.de", Issuer "Sectigo RSA Domain Validation Secure Server CA" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B2qVF3ZWTz4gLS; Thu, 9 Jul 2020 21:45:41 +0000 (UTC) (envelope-from tuexen@freebsd.org) Received: from mb.fritz.box (ip4d15f5fc.dynamic.kabel-deutschland.de [77.21.245.252]) (Authenticated sender: macmic) by mail-n.franken.de (Postfix) with ESMTPSA id 246FA7220B82B; Thu, 9 Jul 2020 23:45:35 +0200 (CEST) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.80.23.2.2\)) Subject: Re: making SCTP loadable and removing it from GENERIC From: Michael Tuexen In-Reply-To: <3DC5AC46-604E-4CB4-93EC-6421ED575DBB@mail.sermon-archive.info> Date: Thu, 9 Jul 2020 23:45:34 +0200 Cc: Mark Johnston , freebsd-net@freebsd.org Content-Transfer-Encoding: quoted-printable Message-Id: <814D36BF-46D9-4093-9D7C-36A79771C742@freebsd.org> References: <20200709151300.GC8947@raichu> <63F4446F-DECF-4DE8-99CA-EC8755A5D4A1@mail.sermon-archive.info> <20200709201044.GG8947@raichu> <3DC5AC46-604E-4CB4-93EC-6421ED575DBB@mail.sermon-archive.info> To: Doug Hardie X-Mailer: Apple Mail (2.3608.80.23.2.2) X-Spam-Status: No, score=-2.9 required=5.0 tests=ALL_TRUSTED,BAYES_00 autolearn=disabled version=3.4.1 X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on mail-n.franken.de X-Rspamd-Queue-Id: 4B2qVF3ZWTz4gLS X-Spamd-Bar: / Authentication-Results: mx1.freebsd.org; none X-Spamd-Result: default: False [0.00 / 15.00]; ASN(0.00)[asn:680, ipnet:2001:638::/32, country:DE]; local_wl_from(0.00)[freebsd.org] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 09 Jul 2020 21:45:42 -0000 > On 9. Jul 2020, at 23:15, Doug Hardie wrote: >=20 >> On 9 July 2020, at 13:10, Mark Johnston wrote: >>=20 >> On Thu, Jul 09, 2020 at 12:44:25PM -0700, Doug Hardie wrote: >>>> On 9 July 2020, at 08:13, Mark Johnston wrote: >>>>=20 >>>> Hi, >>>>=20 >>>> I spent some time working on making it possible to load the SCTP = stack >>>> as a kernel module, the same as we do today with IPSec. There is = one >>>> patch remaining to be committed before that can be done in head. = One >>>> caveat is that the module can't be unloaded, as some work is needed = to >>>> make this safe. However, this obviously isn't a regression. >>>>=20 >>>> The work is based on the observations that: >>>> 1) the in-kernel SCTP stack is not widely used (I know that the = same >>>> code is used in some userland applications), and >>>> 2) the SCTP stack is quite large, most FreeBSD kernel developers = are >>>> unfamiliar with it, and bugs in it can easily lead to security = holes. >>>>=20 >>>> Michael has done a lot of work to fix issues in the SCTP code, >>>> particularly those found by syzkaller, but given that in-kernel = SCTP has >>>> few users (almost certainly fewer than IPSec), it seems reasonable = to >>>> require users to opt in to having an SCTP stack with a simple = "kldload >>>> sctp". Thus, once the last patch is committed I would like to = propose >>>> removing "options SCTP" from GENERIC kernel configs in head, = replacing >>>> it with "options SCTP_SUPPORT" to enable sctp.ko to be loaded. >>>>=20 >>>> I am wondering if anyone has any objections to or concerns about = this >>>> proposal. Any feedback is appreciated. >>>=20 >>> I have a number of systems using SCTP. It is a key part of a = distributed application. As a user of SCTP, I have a slight objection = to removing it from the kernel. It would require me to remember when = setting up a new system to enable that. I am not likely to remember. >>=20 >> To be clear, with the proposed change SCTP can be loaded at boot by >> adding a single line: sctp_load=3D"YES" to /boot/loader.conf, or >> kld_list=3D"sctp" to /etc/rc.conf. Also, the change will not be = present >> in a release until 13.0 or possibly 12.2, which provides plenty of = time, >> and the release notes will reflect the change. >>=20 >> I was really looking for objections pointing out that a dynamically >> loaded SCTP stack would prevent or inhibit some workflow. Relying on >> being able to configure systems from memory rather than using a >> checklist or some automated configuration management does not seem to = be >> a good reason for keeping SCTP in the kernel. >>=20 >>> What is going to happen if you run an application that uses SCTP and = the module is not loaded? >>=20 >> An attempt to create an SCTP socket will fail with EPROTONOSUPPORT, >> "Protocol not supported". >>=20 >>> What will remind me how to fix the issue? I am not likely to = remember about this 6 months from now. >>=20 >> Hopefully "protocol not supported" is a sufficiently descriptive = error >> message.=20 >=20 > Actually, the users of these systems would have no clue about that = message. All they would figure out is that the system is down and they = can't do their job and bitch to the CEO. I am going to assume that that = error will be produced by the socket call and I have added code to check = for it and email me if it occurs. I believe that the only viable = approach for us is the rc.conf solution as some of these systems are = rhapsberry pi 3s which I understand don't use the loader.conf file. OK. Do you control the kernel which is running on the machines? If that = is the case, you could add a line to the kernel config, rebuild the kernel and use = that custom kernel with compiled-in SCTP support. That is still possible. >=20 > One of the configurations we are considering is for each user to have = their own Rhapsberry Pi and eliminate the central server. All data is = replicated between all the machines so there is no need for a central = server anymore. If I can make that work, it would be a large cost = savings for my client. If that gets rid of the need to use SCTP, that would also work. Best regards Michael >=20 > -- Doug >=20 >=20 > _______________________________________________ > freebsd-net@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-net > To unsubscribe, send any mail to "freebsd-net-unsubscribe@freebsd.org" From owner-freebsd-net@freebsd.org Thu Jul 9 23:24:08 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 71EBB358FD6 for ; Thu, 9 Jul 2020 23:24:08 +0000 (UTC) (envelope-from markjdb@gmail.com) Received: from mail-qk1-x729.google.com (mail-qk1-x729.google.com [IPv6:2607:f8b0:4864:20::729]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B2sgp646Nz3Xyj; Thu, 9 Jul 2020 23:24:06 +0000 (UTC) (envelope-from markjdb@gmail.com) Received: by mail-qk1-x729.google.com with SMTP id r22so3544233qke.13; Thu, 09 Jul 2020 16:24:06 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=anvy/Wj3Cs4geKJqoYBkbdJL3ptDNlcdI+Sr4EN9u1Y=; b=jeG4nDajx2UpZlrZlyfssduAw+bgxNa4NMsRmfAYwB7nv2OSWynhWOpDptlrzm9p8r MUZDg9xeqaJf2jdoASJqLRlkoof5EuejZ9DIOyBOIdNOtOoDR8w/JTS+NNCOwTLhIY3Y /5zu0ZqHq7GQxZynG9DSn+R2tMqbZHUCkkMyEuT9a39SlDjHchkcGb7NZ2yN5Q/0NFkT DxCjK3W3X3m6NTVOHzz2OBOgWCNTXGGS3+Xu9X8rC5LinjzJpetl6yLQIKZuMZrXqBcv 7zG9tAReYSWxq/9Wr6nvdBTHxWd4YnjZHBaQYvlx3qVRvAW9hg/pqLJzsmahXTcL9RJp i3+w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:from:to:cc:subject:message-id :references:mime-version:content-disposition:in-reply-to; bh=anvy/Wj3Cs4geKJqoYBkbdJL3ptDNlcdI+Sr4EN9u1Y=; b=CnjuuRpX/pqiUx2K02+hmXhbKl7GUpGBE6d5rrgs0vNbC58iN63q1ZJMi0V4QLHZsR aIo9cYbpgNsA/lVsSjPT1kbo/ekqDO3DtnVz3NDcwScbr5pfQ15Cu61sdwW7WvsS75xS NTaJR96/2/a5JH3G9Z+ypCBZt3sht7Fw1WCPveHLDnx66yCi/ojuKpnZkTrIbbWF+fvp hLMG/Z2nMgnjvKPerF3YEw69Nmy4DpW1dx7/S1Z2zZPJBCuB7uTqFxGYRjYL7dz3/52k Ihkj0gCcuYyKyW7ZRJBxf5akOdzxQG7zkMCKloy3N2pik4CVOCgD36MvSrJAW+X62Z4p HKkw== X-Gm-Message-State: AOAM5329Aozxctd6LIS1zknGYR0Zsnf0ztFwCLAp3YkIpUI9S9ICf+NU XKE83kRO7rwOqPeMVL+MH7M= X-Google-Smtp-Source: ABdhPJxqfJSkjOQsiLIfYD+6bNopaC2nIz+4BH6K6VgDA3NS+0BjUrhQQdkQJPRcuT/PxCvxWn0uzA== X-Received: by 2002:a37:6191:: with SMTP id v139mr65272925qkb.213.1594337045630; Thu, 09 Jul 2020 16:24:05 -0700 (PDT) Received: from raichu (toroon0560w-lp130-14-174-91-9-204.dsl.bell.ca. [174.91.9.204]) by smtp.gmail.com with ESMTPSA id i57sm5885381qte.75.2020.07.09.16.24.04 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 09 Jul 2020 16:24:04 -0700 (PDT) Sender: Mark Johnston Date: Thu, 9 Jul 2020 19:24:00 -0400 From: Mark Johnston To: Doug Hardie Cc: freebsd-net@freebsd.org, tuexen@freebsd.org Subject: Re: making SCTP loadable and removing it from GENERIC Message-ID: <20200709232400.GA83392@raichu> References: <20200709151300.GC8947@raichu> <63F4446F-DECF-4DE8-99CA-EC8755A5D4A1@mail.sermon-archive.info> <20200709201044.GG8947@raichu> <3DC5AC46-604E-4CB4-93EC-6421ED575DBB@mail.sermon-archive.info> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <3DC5AC46-604E-4CB4-93EC-6421ED575DBB@mail.sermon-archive.info> X-Rspamd-Queue-Id: 4B2sgp646Nz3Xyj X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=jeG4nDaj; dmarc=none; spf=pass (mx1.freebsd.org: domain of markjdb@gmail.com designates 2607:f8b0:4864:20::729 as permitted sender) smtp.mailfrom=markjdb@gmail.com X-Spamd-Result: default: False [-2.05 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; ARC_NA(0.00)[]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; NEURAL_HAM_MEDIUM(-0.97)[-0.967]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; MIME_GOOD(-0.10)[text/plain]; MID_RHS_NOT_FQDN(0.50)[]; DMARC_NA(0.00)[freebsd.org]; NEURAL_HAM_LONG(-1.03)[-1.029]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_SOME(0.00)[]; DKIM_TRACE(0.00)[gmail.com:+]; NEURAL_HAM_SHORT(-0.35)[-0.352]; RCVD_IN_DNSWL_NONE(0.00)[2607:f8b0:4864:20::729:from]; FORGED_SENDER(0.30)[markj@freebsd.org,markjdb@gmail.com]; RECEIVED_SPAMHAUS_PBL(0.00)[174.91.9.204:received]; MIME_TRACE(0.00)[0:+]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; FROM_NEQ_ENVFROM(0.00)[markj@freebsd.org,markjdb@gmail.com]; RCVD_TLS_ALL(0.00)[] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 09 Jul 2020 23:24:08 -0000 On Thu, Jul 09, 2020 at 02:15:40PM -0700, Doug Hardie wrote: > > On 9 July 2020, at 13:10, Mark Johnston wrote: > > Hopefully "protocol not supported" is a sufficiently descriptive error > > message. > > Actually, the users of these systems would have no clue about that message. All they would figure out is that the system is down and they can't do their job and bitch to the CEO. I am going to assume that that error will be produced by the socket call and I have added code to check for it and email me if it occurs. I believe that the only viable approach for us is the rc.conf solution as some of these systems are rhapsberry pi 3s which I understand don't use the loader.conf file. My RPi3 boots via loader.efi, which reads loader.conf. From owner-freebsd-net@freebsd.org Fri Jul 10 00:06:47 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 223E735A13E for ; Fri, 10 Jul 2020 00:06:47 +0000 (UTC) (envelope-from eugen@grosbein.net) Received: from hz.grosbein.net (hz.grosbein.net [IPv6:2a01:4f8:c2c:26d8::2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hz.grosbein.net", Issuer "hz.grosbein.net" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B2td16kHBz3ZZV; Fri, 10 Jul 2020 00:06:45 +0000 (UTC) (envelope-from eugen@grosbein.net) Received: from eg.sd.rdtc.ru (eg.sd.rdtc.ru [IPv6:2a03:3100:c:13:0:0:0:5]) by hz.grosbein.net (8.15.2/8.15.2) with ESMTPS id 06A06bCY090175 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 10 Jul 2020 00:06:39 GMT (envelope-from eugen@grosbein.net) X-Envelope-From: eugen@grosbein.net X-Envelope-To: bc979@lafn.org Received: from [10.58.0.10] (dadvw [10.58.0.10]) by eg.sd.rdtc.ru (8.15.2/8.15.2) with ESMTPS id 06A06WYn093712 (version=TLSv1.2 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Fri, 10 Jul 2020 07:06:32 +0700 (+07) (envelope-from eugen@grosbein.net) Subject: Re: making SCTP loadable and removing it from GENERIC To: Doug Hardie , Mark Johnston References: <20200709151300.GC8947@raichu> <63F4446F-DECF-4DE8-99CA-EC8755A5D4A1@mail.sermon-archive.info> Cc: freebsd-net@freebsd.org, tuexen@freebsd.org From: Eugene Grosbein Message-ID: <44d21cf7-e154-f7f4-12ee-6dce1c3f9a63@grosbein.net> Date: Fri, 10 Jul 2020 07:06:22 +0700 User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.8.0 MIME-Version: 1.0 In-Reply-To: <63F4446F-DECF-4DE8-99CA-EC8755A5D4A1@mail.sermon-archive.info> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=0.3 required=5.0 tests=BAYES_00,LOCAL_FROM, SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.2 X-Spam-Report: * -2.3 BAYES_00 BODY: Bayes spam probability is 0 to 1% * [score: 0.0000] * -0.0 SPF_PASS SPF: sender matches SPF record * 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record * 2.6 LOCAL_FROM From my domains X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on hz.grosbein.net X-Rspamd-Queue-Id: 4B2td16kHBz3ZZV X-Spamd-Bar: - Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=permerror (mx1.freebsd.org: domain of eugen@grosbein.net uses mechanism not recognized by this client) smtp.mailfrom=eugen@grosbein.net X-Spamd-Result: default: False [-1.29 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-0.44)[-0.443]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[4]; TO_DN_SOME(0.00)[]; NEURAL_HAM_LONG(-0.93)[-0.927]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[grosbein.net]; NEURAL_SPAM_SHORT(0.18)[0.177]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_SOME(0.00)[]; R_SPF_PERMFAIL(0.00)[empty SPF record]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:24940, ipnet:2a01:4f8::/29, country:DE]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_TLS_ALL(0.00)[] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 10 Jul 2020 00:06:47 -0000 10.07.2020 2:44, Doug Hardie wrote: >> On 9 July 2020, at 08:13, Mark Johnston wrote: >> >> Hi, >> >> I spent some time working on making it possible to load the SCTP stack >> as a kernel module, the same as we do today with IPSec. There is one >> patch remaining to be committed before that can be done in head. One >> caveat is that the module can't be unloaded, as some work is needed to >> make this safe. However, this obviously isn't a regression. >> >> The work is based on the observations that: >> 1) the in-kernel SCTP stack is not widely used (I know that the same >> code is used in some userland applications), and >> 2) the SCTP stack is quite large, most FreeBSD kernel developers are >> unfamiliar with it, and bugs in it can easily lead to security holes. >> >> Michael has done a lot of work to fix issues in the SCTP code, >> particularly those found by syzkaller, but given that in-kernel SCTP has >> few users (almost certainly fewer than IPSec), it seems reasonable to >> require users to opt in to having an SCTP stack with a simple "kldload >> sctp". Thus, once the last patch is committed I would like to propose >> removing "options SCTP" from GENERIC kernel configs in head, replacing >> it with "options SCTP_SUPPORT" to enable sctp.ko to be loaded. >> >> I am wondering if anyone has any objections to or concerns about this >> proposal. Any feedback is appreciated. > > I have a number of systems using SCTP. It is a key part of a distributed application. As a user of SCTP, I have a slight objection to removing it from the kernel. It would require me to remember when setting up a new system to enable that. I am not likely to remember. What is going to happen if you run an application that uses SCTP and the module is not loaded? What will remind me how to fix the issue? I am not likely to remember about this 6 months from now. If an application starts with superuser privileges (as root), it is allowed to perform the check and load the module if needed: int modload(const char *name) { if (modfind(name) < 0) if (kldload(name) < 0 || modfind(name) < 0) { warn("%s: module not found", name); return 0; } return 1; } ... modload("sctp"); This works for both cases of sctp built into the kernel and already loaded as module. Alternatively, if an application already has rc.d startup script, you don't even need to change application source code but add required_modules="sctp" to the script, see rc.subr(8), then sctp.ko would be loaded automagically if it was not loaded yet and not present in the kernel. From owner-freebsd-net@freebsd.org Fri Jul 10 00:39:44 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 8C42935A825 for ; Fri, 10 Jul 2020 00:39:44 +0000 (UTC) (envelope-from SRS0=QZZD=AV=mail.sermon-archive.info=doug@sermon-archive.info) Received: from mail.sermon-archive.info (sermon-archive.info [71.177.216.148]) by mx1.freebsd.org (Postfix) with ESMTP id 4B2vM35nnHz3c2y; Fri, 10 Jul 2020 00:39:43 +0000 (UTC) (envelope-from SRS0=QZZD=AV=mail.sermon-archive.info=doug@sermon-archive.info) Received: from [10.0.1.251] (mini [10.0.1.251]) by mail.sermon-archive.info (Postfix) with ESMTPSA id 4B2vM20vg0z2fjyb; Thu, 9 Jul 2020 17:39:42 -0700 (PDT) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.14\)) Subject: Re: making SCTP loadable and removing it from GENERIC From: Doug Hardie In-Reply-To: <814D36BF-46D9-4093-9D7C-36A79771C742@freebsd.org> Date: Thu, 9 Jul 2020 17:39:41 -0700 Cc: Mark Johnston , freebsd-net@freebsd.org Content-Transfer-Encoding: quoted-printable Message-Id: <380F73C8-1E0F-4FEC-BFEF-4D4DC04A849C@mail.sermon-archive.info> References: <20200709151300.GC8947@raichu> <63F4446F-DECF-4DE8-99CA-EC8755A5D4A1@mail.sermon-archive.info> <20200709201044.GG8947@raichu> <3DC5AC46-604E-4CB4-93EC-6421ED575DBB@mail.sermon-archive.info> <814D36BF-46D9-4093-9D7C-36A79771C742@freebsd.org> To: Michael Tuexen X-Mailer: Apple Mail (2.3445.104.14) X-Virus-Scanned: clamav-milter 0.101.4 at mail X-Virus-Status: Clean X-Rspamd-Queue-Id: 4B2vM35nnHz3c2y X-Spamd-Bar: - Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of SRS0=QZZD=AV=mail.sermon-archive.info=doug@sermon-archive.info designates 71.177.216.148 as permitted sender) smtp.mailfrom=SRS0=QZZD=AV=mail.sermon-archive.info=doug@sermon-archive.info X-Spamd-Result: default: False [-1.64 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.001]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; MV_CASE(0.50)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; R_SPF_ALLOW(-0.20)[+ip4:71.177.216.148]; DMARC_NA(0.00)[lafn.org: no valid DMARC record]; TO_DN_SOME(0.00)[]; NEURAL_HAM_LONG(-1.01)[-1.013]; NEURAL_HAM_SHORT(-0.22)[-0.222]; FORGED_SENDER(0.30)[bc979@lafn.org,SRS0=QZZD=AV=mail.sermon-archive.info=doug@sermon-archive.info]; RCVD_NO_TLS_LAST(0.10)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:5650, ipnet:71.177.216.0/23, country:US]; FROM_NEQ_ENVFROM(0.00)[bc979@lafn.org,SRS0=QZZD=AV=mail.sermon-archive.info=doug@sermon-archive.info]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 10 Jul 2020 00:39:44 -0000 > On 9 July 2020, at 14:45, Michael Tuexen wrote: >=20 >> On 9. Jul 2020, at 23:15, Doug Hardie wrote: >>=20 >> Actually, the users of these systems would have no clue about that = message. All they would figure out is that the system is down and they = can't do their job and bitch to the CEO. I am going to assume that that = error will be produced by the socket call and I have added code to check = for it and email me if it occurs. I believe that the only viable = approach for us is the rc.conf solution as some of these systems are = rhapsberry pi 3s which I understand don't use the loader.conf file. > OK. Do you control the kernel which is running on the machines? If = that is the case, > you could add a line to the kernel config, rebuild the kernel and use = that custom > kernel with compiled-in SCTP support. That is still possible. As best as I can tell, compiling a non-generic kernel may not be easily = done. The Pi's are not located anywhere near me and it would be = extremely difficult to deal with any kernel issues. I prefer to live = with generic kernels. Life has been much easer since I switched to = them. >>=20 >> One of the configurations we are considering is for each user to have = their own Rhapsberry Pi and eliminate the central server. All data is = replicated between all the machines so there is no need for a central = server anymore. If I can make that work, it would be a large cost = savings for my client. > If that gets rid of the need to use SCTP, that would also work. SCTP is the heart of the replication system. I had numerous problems = trying to get UDP to work. The record sizes can be up to 28 Mb. I = think it is theoretically possible to be even larger, but I have never = seen any over 28 Mb. SCTP handles that just fine. It also handles = multi-homing which we also use. -- Doug From owner-freebsd-net@freebsd.org Fri Jul 10 00:43:34 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id B1FF735A8BC for ; Fri, 10 Jul 2020 00:43:34 +0000 (UTC) (envelope-from SRS0=QZZD=AV=mail.sermon-archive.info=doug@sermon-archive.info) Received: from mail.sermon-archive.info (sermon-archive.info [71.177.216.148]) by mx1.freebsd.org (Postfix) with ESMTP id 4B2vRV0tL3z3cRK; Fri, 10 Jul 2020 00:43:33 +0000 (UTC) (envelope-from SRS0=QZZD=AV=mail.sermon-archive.info=doug@sermon-archive.info) Received: from [10.0.1.251] (mini [10.0.1.251]) by mail.sermon-archive.info (Postfix) with ESMTPSA id 4B2vRT2GwYz2fjv9; Thu, 9 Jul 2020 17:43:33 -0700 (PDT) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.14\)) Subject: Re: making SCTP loadable and removing it from GENERIC From: Doug Hardie In-Reply-To: <20200709232400.GA83392@raichu> Date: Thu, 9 Jul 2020 17:43:33 -0700 Cc: freebsd-net@freebsd.org, Michael Tuexen Content-Transfer-Encoding: quoted-printable Message-Id: <444BE513-EE05-4F3C-89C4-5EBFFCBC7819@mail.sermon-archive.info> References: <20200709151300.GC8947@raichu> <63F4446F-DECF-4DE8-99CA-EC8755A5D4A1@mail.sermon-archive.info> <20200709201044.GG8947@raichu> <3DC5AC46-604E-4CB4-93EC-6421ED575DBB@mail.sermon-archive.info> <20200709232400.GA83392@raichu> To: Mark Johnston X-Mailer: Apple Mail (2.3445.104.14) X-Virus-Scanned: clamav-milter 0.101.4 at mail X-Virus-Status: Clean X-Rspamd-Queue-Id: 4B2vRV0tL3z3cRK X-Spamd-Bar: - Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of SRS0=QZZD=AV=mail.sermon-archive.info=doug@sermon-archive.info designates 71.177.216.148 as permitted sender) smtp.mailfrom=SRS0=QZZD=AV=mail.sermon-archive.info=doug@sermon-archive.info X-Spamd-Result: default: False [-1.68 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.001]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; R_SPF_ALLOW(-0.20)[+ip4:71.177.216.148:c]; MV_CASE(0.50)[]; MIME_GOOD(-0.10)[text/plain]; TO_MATCH_ENVRCPT_ALL(0.00)[]; DMARC_NA(0.00)[lafn.org: no valid DMARC record]; TO_DN_SOME(0.00)[]; NEURAL_HAM_LONG(-1.02)[-1.018]; NEURAL_HAM_SHORT(-0.26)[-0.265]; FORGED_SENDER(0.30)[bc979@lafn.org,SRS0=QZZD=AV=mail.sermon-archive.info=doug@sermon-archive.info]; RCVD_NO_TLS_LAST(0.10)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:5650, ipnet:71.177.216.0/23, country:US]; FROM_NEQ_ENVFROM(0.00)[bc979@lafn.org,SRS0=QZZD=AV=mail.sermon-archive.info=doug@sermon-archive.info]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 10 Jul 2020 00:43:34 -0000 > On 9 July 2020, at 16:24, Mark Johnston wrote: >=20 > On Thu, Jul 09, 2020 at 02:15:40PM -0700, Doug Hardie wrote: >>> On 9 July 2020, at 13:10, Mark Johnston wrote: >>> Hopefully "protocol not supported" is a sufficiently descriptive = error >>> message.=20 >>=20 >> Actually, the users of these systems would have no clue about that = message. All they would figure out is that the system is down and they = can't do their job and bitch to the CEO. I am going to assume that that = error will be produced by the socket call and I have added code to check = for it and email me if it occurs. I believe that the only viable = approach for us is the rc.conf solution as some of these systems are = rhapsberry pi 3s which I understand don't use the loader.conf file. >=20 > My RPi3 boots via loader.efi, which reads loader.conf. Thanks. I did not know that. I don't have a RPi to test yet. All of = the ones are in production at other locations. -- Doug= From owner-freebsd-net@freebsd.org Fri Jul 10 06:45:45 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id C8A2F360C47 for ; Fri, 10 Jul 2020 06:45:45 +0000 (UTC) (envelope-from patfbsd@davenulle.org) Received: from sender4-of-o58.zoho.com (sender4-of-o58.zoho.com [136.143.188.58]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4B33TN4PLHz4CLQ for ; Fri, 10 Jul 2020 06:45:44 +0000 (UTC) (envelope-from patfbsd@davenulle.org) ARC-Seal: i=1; a=rsa-sha256; t=1594363540; cv=none; d=zohomail.com; s=zohoarc; b=nglXJ4CBmQat6qVWNS4ACRrLp66FxF3cdPGV7xaAdcZmxmRkE5/Nl7GZTI7pOe5g4fMfUGrdZqoNRibciogVspEpycbcyMptr+9KM8QLwIEk5Rw5v1+0kmd0REYieWiJgD6a1CBw0v6CTq9cVgxIPqrVrni8FlAVndSy3WAhOM0= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1594363540; h=Content-Type:Content-Transfer-Encoding:Date:From:MIME-Version:Message-ID:Subject:To; bh=YCuN93pyalsIOi935kNtlXJC+C4zmQLrR/ibSy891E0=; b=G62hileRAUDD3Y6jA2qgLSdL5zJR/EEl1zUVjNTRtvlzm31V6KsR8Kucq+zxSjjTea5761GwfEBlRtQDT80u9xx2aqEGZL/kjJQ8hOsDk4A1ywwKMF2h0zxHhDIPsdJ2xWud0ZUj3ILCJ+2/OEnoalqzcSFaafLQHSS6g9EFGTI= ARC-Authentication-Results: i=1; mx.zohomail.com; spf=pass smtp.mailfrom=patfbsd@davenulle.org; dmarc=pass header.from= header.from= Received: from mr185033.univ-rennes1.fr (mr185033.univ-rennes1.fr [129.20.185.33]) by mx.zohomail.com with SMTPS id 15943635386511014.9167564904135; Thu, 9 Jul 2020 23:45:38 -0700 (PDT) Date: Fri, 10 Jul 2020 08:45:30 +0200 From: Patrick Lamaiziere To: freebsd-net@freebsd.org Subject: poor performance with Intel X520 card Message-ID: <20200710084530.777ce321@mr185033.univ-rennes1.fr> X-Mailer: Claws Mail 3.16.0 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-ZohoMailClient: External X-Rspamd-Queue-Id: 4B33TN4PLHz4CLQ X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=none (mx1.freebsd.org: domain of patfbsd@davenulle.org has no SPF policy when checking 136.143.188.58) smtp.mailfrom=patfbsd@davenulle.org X-Spamd-Result: default: False [-2.80 / 15.00]; NEURAL_HAM_MEDIUM(-0.79)[-0.789]; ARC_ALLOW(-1.00)[zohomail.com:s=zohoarc:i=1]; FROM_HAS_DN(0.00)[]; RWL_MAILSPIKE_GOOD(0.00)[136.143.188.58:from]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-0.34)[-0.335]; MIME_GOOD(-0.10)[text/plain]; TO_DN_NONE(0.00)[]; DMARC_NA(0.00)[davenulle.org]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_SHORT(-0.57)[-0.574]; RCVD_IN_DNSWL_NONE(0.00)[136.143.188.58:from]; R_SPF_NA(0.00)[no SPF record]; FROM_EQ_ENVFROM(0.00)[]; RCVD_TLS_LAST(0.00)[]; R_DKIM_NA(0.00)[]; ASN(0.00)[asn:2639, ipnet:136.143.188.0/24, country:US]; MIME_TRACE(0.00)[0:+]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 10 Jul 2020 06:45:45 -0000 Hello, That is mostly for the record but it looks like the intel X520 is not very good and generates a high level of interrupts. On a router / firewall with 500 Kpps in input (dropped by pf) is enough to put the CPUs at 100% busy. We use FreeBSD 11.3 on a machine with 12 CPU Intel(R) Xeon(R) CPU E5-2643 v3 @ 3.40GHz (3400.07-MHz K8-class CPU) FreeBSD/SMP: Multiprocessor System Detected: 12 CPUs FreeBSD/SMP: 2 package(s) x 6 core(s) Multi threading is disabled. ix0: port 0x3020-0x303f mem 0x92300000-0x923fffff,0x92404000-0x92407fff irq 34 at device 0.0 numa-domain 0 on pci5 ix0: Using MSI-X interrupts with 9 vectors ix0: Ethernet address: a0:36:9f:93:84:10 ix0: PCI Express Bus: Speed 5.0GT/s Width x8 ix0: netmap queues/slots: TX 8/2048, RX 8/2048 I've set fews tunable in loader.conf but I don't remember why loader.conf # cartes ix #hw.ix.max_interrupt_rate=100000 #hw.ix.enable_aim=0 hw.ix.tx_process_limit=-1 hw.ix.rx_process_limit=-1 #hw.ix.num_queues=6 hw.intr_storm_threshold=9000 Well, do you think another NIC cards can help to reach a better pps rate ? I think 500 Kpps is quite low for such a machine. Thanks, best regards. From owner-freebsd-net@freebsd.org Fri Jul 10 09:39:46 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 6B831364C78 for ; Fri, 10 Jul 2020 09:39:46 +0000 (UTC) (envelope-from tuexen@freebsd.org) Received: from drew.franken.de (mail-n.franken.de [193.175.24.27]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "*.franken.de", Issuer "Sectigo RSA Domain Validation Secure Server CA" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B37L96L0Dz4PBH; Fri, 10 Jul 2020 09:39:45 +0000 (UTC) (envelope-from tuexen@freebsd.org) Received: from mb.fritz.box (ip4d15f5fc.dynamic.kabel-deutschland.de [77.21.245.252]) (Authenticated sender: macmic) by mail-n.franken.de (Postfix) with ESMTPSA id 6E49A721BE003; Fri, 10 Jul 2020 11:39:40 +0200 (CEST) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.80.23.2.2\)) Subject: Re: making SCTP loadable and removing it from GENERIC From: Michael Tuexen In-Reply-To: <44d21cf7-e154-f7f4-12ee-6dce1c3f9a63@grosbein.net> Date: Fri, 10 Jul 2020 11:39:38 +0200 Cc: Doug Hardie , Mark Johnston , freebsd-net@freebsd.org Content-Transfer-Encoding: quoted-printable Message-Id: <4B6A707F-88C4-43B8-96BF-24BC32E2C9A9@freebsd.org> References: <20200709151300.GC8947@raichu> <63F4446F-DECF-4DE8-99CA-EC8755A5D4A1@mail.sermon-archive.info> <44d21cf7-e154-f7f4-12ee-6dce1c3f9a63@grosbein.net> To: Eugene Grosbein X-Mailer: Apple Mail (2.3608.80.23.2.2) X-Spam-Status: No, score=-2.9 required=5.0 tests=ALL_TRUSTED,BAYES_00 autolearn=disabled version=3.4.1 X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on mail-n.franken.de X-Rspamd-Queue-Id: 4B37L96L0Dz4PBH X-Spamd-Bar: / Authentication-Results: mx1.freebsd.org; none X-Spamd-Result: default: False [0.00 / 15.00]; local_wl_from(0.00)[freebsd.org]; ASN(0.00)[asn:680, ipnet:193.174.0.0/15, country:DE] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 10 Jul 2020 09:39:46 -0000 > On 10. Jul 2020, at 02:06, Eugene Grosbein wrote: >=20 > 10.07.2020 2:44, Doug Hardie wrote: >=20 >>> On 9 July 2020, at 08:13, Mark Johnston wrote: >>>=20 >>> Hi, >>>=20 >>> I spent some time working on making it possible to load the SCTP = stack >>> as a kernel module, the same as we do today with IPSec. There is = one >>> patch remaining to be committed before that can be done in head. = One >>> caveat is that the module can't be unloaded, as some work is needed = to >>> make this safe. However, this obviously isn't a regression. >>>=20 >>> The work is based on the observations that: >>> 1) the in-kernel SCTP stack is not widely used (I know that the same >>> code is used in some userland applications), and >>> 2) the SCTP stack is quite large, most FreeBSD kernel developers are >>> unfamiliar with it, and bugs in it can easily lead to security = holes. >>>=20 >>> Michael has done a lot of work to fix issues in the SCTP code, >>> particularly those found by syzkaller, but given that in-kernel SCTP = has >>> few users (almost certainly fewer than IPSec), it seems reasonable = to >>> require users to opt in to having an SCTP stack with a simple = "kldload >>> sctp". Thus, once the last patch is committed I would like to = propose >>> removing "options SCTP" from GENERIC kernel configs in head, = replacing >>> it with "options SCTP_SUPPORT" to enable sctp.ko to be loaded. >>>=20 >>> I am wondering if anyone has any objections to or concerns about = this >>> proposal. Any feedback is appreciated. >>=20 >> I have a number of systems using SCTP. It is a key part of a = distributed application. As a user of SCTP, I have a slight objection = to removing it from the kernel. It would require me to remember when = setting up a new system to enable that. I am not likely to remember. = What is going to happen if you run an application that uses SCTP and the = module is not loaded? What will remind me how to fix the issue? I am = not likely to remember about this 6 months from now. >=20 > If an application starts with superuser privileges (as root), it is = allowed to perform the check > and load the module if needed: >=20 > int > modload(const char *name) > { > if (modfind(name) < 0) > if (kldload(name) < 0 || modfind(name) < 0) { > warn("%s: module not found", name); > return 0; > } > return 1; > } > ... > modload("sctp"); >=20 > This works for both cases of sctp built into the kernel and already = loaded as module. Hi Eugene, you are completely right. However, it requires that the program needs to = run with root privileges just to be able to communicate. In the context of userland stack, this is one of the most important = issues. In case of SCTP, this is needed to open a raw socket to send/recv SCTP = packets. This is one of the reasons why you use UDP encapsulation... Best regards Michael >=20 > Alternatively, if an application already has rc.d startup script, you = don't even need to change > application source code but add required_modules=3D"sctp" to the = script, see rc.subr(8), > then sctp.ko would be loaded automagically if it was not loaded yet = and not present in the kernel. Interesting, I did not know that. Thanks for sharing. Best regards Michael >=20 >=20 From owner-freebsd-net@freebsd.org Fri Jul 10 10:29:31 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 68508366151 for ; Fri, 10 Jul 2020 10:29:31 +0000 (UTC) (envelope-from SRS0=QZZD=AV=mail.sermon-archive.info=doug@sermon-archive.info) Received: from mail.sermon-archive.info (sermon-archive.info [71.177.216.148]) by mx1.freebsd.org (Postfix) with ESMTP id 4B38RZ51tWz4RQ0; Fri, 10 Jul 2020 10:29:30 +0000 (UTC) (envelope-from SRS0=QZZD=AV=mail.sermon-archive.info=doug@sermon-archive.info) Received: from [10.0.1.251] (mini [10.0.1.251]) by mail.sermon-archive.info (Postfix) with ESMTPSA id 4B38RY6F3Fz2fjQj; Fri, 10 Jul 2020 03:29:29 -0700 (PDT) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.14\)) Subject: Re: making SCTP loadable and removing it from GENERIC From: Doug Hardie In-Reply-To: <4B6A707F-88C4-43B8-96BF-24BC32E2C9A9@freebsd.org> Date: Fri, 10 Jul 2020 03:29:29 -0700 Cc: Eugene Grosbein , Mark Johnston , freebsd-net@freebsd.org Content-Transfer-Encoding: quoted-printable Message-Id: <081C36F7-190F-489E-9100-E5B78A911710@mail.sermon-archive.info> References: <20200709151300.GC8947@raichu> <63F4446F-DECF-4DE8-99CA-EC8755A5D4A1@mail.sermon-archive.info> <44d21cf7-e154-f7f4-12ee-6dce1c3f9a63@grosbein.net> <4B6A707F-88C4-43B8-96BF-24BC32E2C9A9@freebsd.org> To: Michael Tuexen X-Mailer: Apple Mail (2.3445.104.14) X-Virus-Scanned: clamav-milter 0.101.4 at mail X-Virus-Status: Clean X-Rspamd-Queue-Id: 4B38RZ51tWz4RQ0 X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of SRS0=QZZD=AV=mail.sermon-archive.info=doug@sermon-archive.info designates 71.177.216.148 as permitted sender) smtp.mailfrom=SRS0=QZZD=AV=mail.sermon-archive.info=doug@sermon-archive.info X-Spamd-Result: default: False [-2.27 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-0.99)[-0.995]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[4]; MV_CASE(0.50)[]; R_SPF_ALLOW(-0.20)[+ip4:71.177.216.148]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[lafn.org: no valid DMARC record]; NEURAL_HAM_LONG(-1.02)[-1.024]; TO_DN_SOME(0.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; NEURAL_HAM_SHORT(-0.85)[-0.854]; FORGED_SENDER(0.30)[bc979@lafn.org,SRS0=QZZD=AV=mail.sermon-archive.info=doug@sermon-archive.info]; RCVD_NO_TLS_LAST(0.10)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:5650, ipnet:71.177.216.0/23, country:US]; FROM_NEQ_ENVFROM(0.00)[bc979@lafn.org,SRS0=QZZD=AV=mail.sermon-archive.info=doug@sermon-archive.info]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 10 Jul 2020 10:29:31 -0000 > On 10 July 2020, at 02:39, Michael Tuexen wrote: >=20 > Hi Eugene, >=20 > you are completely right. However, it requires that the program needs = to run > with root privileges just to be able to communicate. > In the context of userland stack, this is one of the most important = issues. > In case of SCTP, this is needed to open a raw socket to send/recv SCTP = packets. > This is one of the reasons why you use UDP encapsulation... I see RFC 6951 on UDP encapsulation and understand there are situations = where that would be needed. However, my replication processes do run as = root. Just for fun, I started them as non-root and SCTP worked just = fine. I didn't see any raw sockets in a ktrace of the processes. 76330 replicate CALL socket(PF_INET6,0x5,IPPROTO_SCTP) 76330 replicate RET socket 5 =20 -- Doug From owner-freebsd-net@freebsd.org Fri Jul 10 11:10:58 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id AAF9D366B71 for ; Fri, 10 Jul 2020 11:10:58 +0000 (UTC) (envelope-from tuexen@freebsd.org) Received: from drew.franken.de (drew.ipv6.franken.de [IPv6:2001:638:a02:a001:20e:cff:fe4a:feaa]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "*.franken.de", Issuer "Sectigo RSA Domain Validation Secure Server CA" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B39MQ25tnz4TNP; Fri, 10 Jul 2020 11:10:57 +0000 (UTC) (envelope-from tuexen@freebsd.org) Received: from mb.fritz.box (ip4d15f5fc.dynamic.kabel-deutschland.de [77.21.245.252]) (Authenticated sender: macmic) by mail-n.franken.de (Postfix) with ESMTPSA id E36B2721BE00B; Fri, 10 Jul 2020 13:10:44 +0200 (CEST) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.80.23.2.2\)) Subject: Re: making SCTP loadable and removing it from GENERIC From: Michael Tuexen In-Reply-To: <081C36F7-190F-489E-9100-E5B78A911710@mail.sermon-archive.info> Date: Fri, 10 Jul 2020 13:10:41 +0200 Cc: Eugene Grosbein , Mark Johnston , freebsd-net@freebsd.org Content-Transfer-Encoding: quoted-printable Message-Id: <011CF79D-2696-49DA-91AF-47D4823FDE04@freebsd.org> References: <20200709151300.GC8947@raichu> <63F4446F-DECF-4DE8-99CA-EC8755A5D4A1@mail.sermon-archive.info> <44d21cf7-e154-f7f4-12ee-6dce1c3f9a63@grosbein.net> <4B6A707F-88C4-43B8-96BF-24BC32E2C9A9@freebsd.org> <081C36F7-190F-489E-9100-E5B78A911710@mail.sermon-archive.info> To: Doug Hardie X-Mailer: Apple Mail (2.3608.80.23.2.2) X-Spam-Status: No, score=-2.9 required=5.0 tests=ALL_TRUSTED,BAYES_00 autolearn=disabled version=3.4.1 X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on mail-n.franken.de X-Rspamd-Queue-Id: 4B39MQ25tnz4TNP X-Spamd-Bar: / Authentication-Results: mx1.freebsd.org; none X-Spamd-Result: default: False [0.00 / 15.00]; ASN(0.00)[asn:680, ipnet:2001:638::/32, country:DE]; local_wl_from(0.00)[freebsd.org] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 10 Jul 2020 11:10:58 -0000 > On 10. Jul 2020, at 12:29, Doug Hardie wrote: >=20 >> On 10 July 2020, at 02:39, Michael Tuexen wrote: >>=20 >> Hi Eugene, >>=20 >> you are completely right. However, it requires that the program needs = to run >> with root privileges just to be able to communicate. >> In the context of userland stack, this is one of the most important = issues. >> In case of SCTP, this is needed to open a raw socket to send/recv = SCTP packets. >> This is one of the reasons why you use UDP encapsulation... >=20 > I see RFC 6951 on UDP encapsulation and understand there are = situations where that would be needed. However, my replication = processes do run as root. Just for fun, I started them as non-root and = SCTP worked just fine. I didn't see any raw sockets in a ktrace of the = processes. >=20 > 76330 replicate CALL = socket(PF_INET6,0x5,IPPROTO_SCTP) > 76330 replicate RET socket 5 Hi Doug, sorry, I wasn't clear. If you use an SCTP kernel stack, you don't need root privileges, except = for binding to a port smaller than 1024. This is the same for TCP and UDP. If you want to use a userland SCTP stack, the program must be able to = send and receive SCTP packets. That is done via a raw socket, which need root privileges = to be opened. Since you are using a kernel stack, you don't see any raw socket = interactions, but the opening of an SCTP socket. The FreeBSD SCTP sources are also the basis of the SCTP userland stack = usrsctp. That is why I have some experience with people running userland SCTP stacks. = One of the issues they report, is that they don't want to run an application with = root privileges just to do communication. I agree with that. To avoid using root privileges just for network communication, the = solution is to use a kernel stack or a userland stack with raw sockets, which can be = realised by using UDP encapsulation. If you run you application as root due to other constraints, there is no = problem for you to also load a kernel module. So you do not have the problem I was = referring to. Best regards Michael >=20 > -- Doug >=20 From owner-freebsd-net@freebsd.org Fri Jul 10 15:27:28 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 95D7A36C444 for ; Fri, 10 Jul 2020 15:27:28 +0000 (UTC) (envelope-from cristian.cardoso11@gmail.com) Received: from mail-ej1-x62a.google.com (mail-ej1-x62a.google.com [IPv6:2a00:1450:4864:20::62a]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B3H3M4RxLz4kbx for ; Fri, 10 Jul 2020 15:27:27 +0000 (UTC) (envelope-from cristian.cardoso11@gmail.com) Received: by mail-ej1-x62a.google.com with SMTP id lx13so6525100ejb.4 for ; Fri, 10 Jul 2020 08:27:27 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=5szIIaA5Qqh/zEGo695hFkuRBxCyhaV5fvyXk1i6BQk=; b=iaiPL3xyp93UC3NT7PZq1D4cAOGSvxQLlOZOOYgUi89MAPHaxsG5BVeoIo/40Jtp+J KFqWLEpY6jBJ/kulkZSm469PvtF9EK6JFs3ZTynmN/TprSTIVUfA+b9+dj4AWQy08zkS YWEdSHsgJ0xOtuKuRJLVkFofANocD6ZXHuW3VeX658US0dc4+78qkQTabSkAet6jd2lW QH/evJ6lCuQWCTtHsTUQ29CcdO8v1/i1koJWvV29Wp8aZOELEIvxHPJQe8mwfeJnm+6X J9n2vP8kSMIGyx2/E4hjXCLUkXZs6BXOzn0yau8iwK8+J4z/GopJNKBr2nxyH6WOR3jr E1YQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=5szIIaA5Qqh/zEGo695hFkuRBxCyhaV5fvyXk1i6BQk=; b=DBHjqlnLTPAEd89f7+NKK/MWrR5seMQsU0MklUYmiU0dKihqrKDcsOV34mQ0hRHDkO qoRTjuPy2JSIxeZWt/1B9KSHWKcy7GdPSomgTLXEWiPIZVcykt1FNEmvChTjFu1MsyIe 6pjZK7HU7HQSyH+9bU2duLExSG6oELI1uyBMQyO+Nv8x/uqHbpToU2M8rnBjp+MkAoVy OTapRLhVqsKbHyfCLb6a0bC/Mfj7tvW/XIDPvTlCt+DMRM9faAAxjHiLSKEL0RTFredY +fdRXyZXY2iHyvjcckAwYcy0LrCUjwdUnimS2UeYYxGBEfTOH+UQXByRS48tdQfO6eRr gAMw== X-Gm-Message-State: AOAM5316WN7hgKKN5Vbuhlk4/uQylT0dhAydTfO8ozDoJFZoCRl1+vak mufsxk2154MYRZkCuGvY+eRVSAeKxmaYzZYZMSbBI+IpZA== X-Google-Smtp-Source: ABdhPJyWGXLqelAHEKFWEpYsLabeXUbTwXWvp3GmRfP9MHQDzZxEMRXkRpVYX+zWD/zjEk5lKl+N9eOezq7Ps/QOXCM= X-Received: by 2002:a17:907:20b4:: with SMTP id pw20mr63871193ejb.225.1594394845636; Fri, 10 Jul 2020 08:27:25 -0700 (PDT) MIME-Version: 1.0 References: <20200710084530.777ce321@mr185033.univ-rennes1.fr> In-Reply-To: <20200710084530.777ce321@mr185033.univ-rennes1.fr> From: Cristian Cardoso Date: Fri, 10 Jul 2020 12:27:15 -0300 Message-ID: Subject: Re: poor performance with Intel X520 card To: Patrick Lamaiziere Cc: freebsd-net@freebsd.org Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Rspamd-Queue-Id: 4B3H3M4RxLz4kbx X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=iaiPL3xy; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of cristiancardoso11@gmail.com designates 2a00:1450:4864:20::62a as permitted sender) smtp.mailfrom=cristiancardoso11@gmail.com X-Spamd-Result: default: False [-3.13 / 15.00]; RCVD_TLS_ALL(0.00)[]; ARC_NA(0.00)[]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; NEURAL_HAM_MEDIUM(-0.99)[-0.995]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; FREEMAIL_FROM(0.00)[gmail.com]; R_SPF_ALLOW(-0.20)[+ip6:2a00:1450:4000::/36]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-net@freebsd.org]; NEURAL_HAM_LONG(-1.04)[-1.036]; TO_MATCH_ENVRCPT_SOME(0.00)[]; DKIM_TRACE(0.00)[gmail.com:+]; RCPT_COUNT_TWO(0.00)[2]; RCVD_IN_DNSWL_NONE(0.00)[2a00:1450:4864:20::62a:from]; NEURAL_HAM_SHORT(-0.10)[-0.104]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; FREEMAIL_ENVFROM(0.00)[gmail.com]; RCVD_COUNT_TWO(0.00)[2]; ASN(0.00)[asn:15169, ipnet:2a00:1450::/32, country:US]; TAGGED_FROM(0.00)[]; DWL_DNSWL_NONE(0.00)[gmail.com:dkim] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 10 Jul 2020 15:27:28 -0000 Hello This interface is 14.8 Mpps, but such capacity is only possible without a firewall performing filtering. The more firewall rules on your router, the less forwarding capacity the card will have, due to having to process the packet in CPU to match the rules and then forward the packet. In the link that follows, a little is talked about: https://wiki.freebsd.org/NetworkPerformanceTuning Here are some more useful links on FreeBSD and network tuning https://calomel.org/freebsd_network_tuning.html https://people.freebsd.org/~olivier/talks/2017_EuroBSDCon-Tuning_FreeBSD_fo= r_routing_and_firewalling.pdf Em sex., 10 de jul. de 2020 =C3=A0s 03:45, Patrick Lamaiziere escreveu: > > Hello, > > That is mostly for the record but it looks like the intel X520 is not > very good and generates a high level of interrupts. > > On a router / firewall with 500 Kpps in input (dropped by pf) is enough t= o put the CPUs at > 100% busy. > > We use FreeBSD 11.3 on a machine with 12 CPU Intel(R) Xeon(R) CPU E5-2643= v3 @ 3.40GHz (3400.07-MHz K8-class CPU) > FreeBSD/SMP: Multiprocessor System Detected: 12 CPUs > FreeBSD/SMP: 2 package(s) x 6 core(s) > Multi threading is disabled. > > ix0: = port 0x3020-0x303f mem 0x92300000-0x923fffff,0x92404000-0x92407fff irq 34 a= t device 0.0 numa-domain 0 on pci5 > ix0: Using MSI-X interrupts with 9 vectors > ix0: Ethernet address: a0:36:9f:93:84:10 > ix0: PCI Express Bus: Speed 5.0GT/s Width x8 > ix0: netmap queues/slots: TX 8/2048, RX 8/2048 > > I've set fews tunable in loader.conf but I don't remember why > loader.conf > # cartes ix > #hw.ix.max_interrupt_rate=3D100000 > #hw.ix.enable_aim=3D0 > hw.ix.tx_process_limit=3D-1 > hw.ix.rx_process_limit=3D-1 > #hw.ix.num_queues=3D6 > hw.intr_storm_threshold=3D9000 > > Well, do you think another NIC cards can help to reach a better pps rate = ? I think 500 Kpps is quite low for such a machine. > > Thanks, best regards. > > _______________________________________________ > freebsd-net@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-net > To unsubscribe, send any mail to "freebsd-net-unsubscribe@freebsd.org" From owner-freebsd-net@freebsd.org Fri Jul 10 16:21:24 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 420CE36D59A for ; Fri, 10 Jul 2020 16:21:24 +0000 (UTC) (envelope-from olivier@freebsd.org) Received: from smtp.freebsd.org (smtp.freebsd.org [IPv6:2610:1c1:1:606c::24b:4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B3JFc0hDVz4nNb for ; Fri, 10 Jul 2020 16:21:24 +0000 (UTC) (envelope-from olivier@freebsd.org) Received: from mail-pg1-f177.google.com (mail-pg1-f177.google.com [209.85.215.177]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) (Authenticated sender: olivier/mail) by smtp.freebsd.org (Postfix) with ESMTPSA id ED53B2EA1A for ; Fri, 10 Jul 2020 16:21:23 +0000 (UTC) (envelope-from olivier@freebsd.org) Received: by mail-pg1-f177.google.com with SMTP id z5so2739781pgb.6 for ; Fri, 10 Jul 2020 09:21:23 -0700 (PDT) X-Gm-Message-State: AOAM531lQSh78K+AebOKEJeTUWLPviKLApcALsUjNL1oCQtC/YVpiGPM D7ve+DQlPy5CDgL+93+2s5lA+iN57LeuEDHKEcQ= X-Google-Smtp-Source: ABdhPJxfsVmcaWt2yDmHHZL6ae/gRl9gfhHr5FT9tpUa0T1a3ZRxdjcD+rTF4PmerhZKHl4ApbLncbX05z5ML8HW42M= X-Received: by 2002:a62:1782:: with SMTP id 124mr15505036pfx.204.1594398082895; Fri, 10 Jul 2020 09:21:22 -0700 (PDT) MIME-Version: 1.0 References: <20200710084530.777ce321@mr185033.univ-rennes1.fr> In-Reply-To: <20200710084530.777ce321@mr185033.univ-rennes1.fr> From: =?UTF-8?Q?Olivier_Cochard=2DLabb=C3=A9?= Date: Fri, 10 Jul 2020 18:21:11 +0200 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: poor performance with Intel X520 card To: Patrick Lamaiziere Cc: freebsd-net@freebsd.org Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.33 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 10 Jul 2020 16:21:24 -0000 On Fri, Jul 10, 2020 at 8:45 AM Patrick Lamaiziere wrote: > Hello, > > That is mostly for the record but it looks like the intel X520 is not > very good and generates a high level of interrupts. > > On a router / firewall with 500 Kpps in input (dropped by pf) is enough to > put the CPUs at > 100% busy. > > Hi Patrick, yes 500 Kpps is quite low: Do you have a very complex long pf rule set? A 8 core Atom C2758 with an old Intel 10G 82599 is able to reach about 1.6Mpps (with one pf rule), so I would expect more on your setup. https://github.com/ocochard/netbenches/blob/master/Atom_C2758_8Cores-Intel_82599/forwarding-pf-ipfw/results/fbsd12-stable.r354440.BSDRP.1.96/README.md So, try this: - Identify the bottleneck: pmcstat and flamegraph are the tools for that; - Use FreeBSD -head or a 12-stable minimum but not less; - You should follow instruction here: https://wiki.freebsd.org/10gFreeBSD/Router Regards, Olivier From owner-freebsd-net@freebsd.org Fri Jul 10 16:29:26 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id E61FA36D890 for ; Fri, 10 Jul 2020 16:29:26 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 4B3JQt5sYbz4p62 for ; Fri, 10 Jul 2020 16:29:26 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id C91F936D904; Fri, 10 Jul 2020 16:29:26 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id C8E7736D3DB for ; Fri, 10 Jul 2020 16:29:26 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B3JQt51H0z4p3j for ; Fri, 10 Jul 2020 16:29:26 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 8F05B24AB0 for ; Fri, 10 Jul 2020 16:29:26 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 06AGTQu5002718 for ; Fri, 10 Jul 2020 16:29:26 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 06AGTQrM002717 for net@FreeBSD.org; Fri, 10 Jul 2020 16:29:26 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 238520] [sctp] Fatal trap 9: general protection fault while in kernel mode Date: Fri, 10 Jul 2020 16:29:25 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: CURRENT X-Bugzilla-Keywords: crash, stress2 X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: markj@FreeBSD.org X-Bugzilla-Status: Closed X-Bugzilla-Resolution: FIXED X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: tuexen@freebsd.org X-Bugzilla-Flags: mfc-stable12+ mfc-stable11? X-Bugzilla-Changed-Fields: cc resolution bug_status Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 10 Jul 2020 16:29:27 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D238520 Mark Johnston changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |markj@FreeBSD.org Resolution|--- |FIXED Status|In Progress |Closed --=20 You are receiving this mail because: You are on the CC list for the bug.= From owner-freebsd-net@freebsd.org Fri Jul 10 17:08:51 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 4B0F036E532 for ; Fri, 10 Jul 2020 17:08:51 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 4B3KJM1GGNz4rBf for ; Fri, 10 Jul 2020 17:08:51 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 29A7D36DDF6; Fri, 10 Jul 2020 17:08:51 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 2843B36E4C0 for ; Fri, 10 Jul 2020 17:08:51 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B3KJM07JPz4rSR for ; Fri, 10 Jul 2020 17:08:51 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id DC7CD25494 for ; Fri, 10 Jul 2020 17:08:50 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 06AH8ofQ044362 for ; Fri, 10 Jul 2020 17:08:50 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 06AH8oLd044361 for net@FreeBSD.org; Fri, 10 Jul 2020 17:08:50 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 224218] Kernel panic in SCTP/IpV6 server mode Date: Fri, 10 Jul 2020 17:08:50 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 11.1-RELEASE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: markj@FreeBSD.org X-Bugzilla-Status: Closed X-Bugzilla-Resolution: Overcome By Events X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: tuexen@freebsd.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: cc resolution bug_status Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 10 Jul 2020 17:08:51 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D224218 Mark Johnston changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |markj@FreeBSD.org Resolution|--- |Overcome By Events Status|In Progress |Closed --- Comment #25 from Mark Johnston --- Closing since the default stack size was increased on i386. The two major offenders in SCTP, sctp_auth_get_cookie_params() and sctp_load_addresses_from_init() are still there. They both allocate 3 512-= byte buffers on the stack. I can't see an easy way to fix that; all three buffe= rs are used to temporarily store data until we know the combined size of the d= ata, at which point a buffer to store all of it is allocated. It might be possible to avoid the temporary buffers by using m_pulldown() to ensure that the parameter headers are contiguous, and then use m_copydata()= to copy data into the key buffer once we know the combined length. This is a = bit tricky to get right and I have no setup to test such a change. However, it would shave 1536 bytes off the stack frame and avoid some extra copying. --=20 You are receiving this mail because: You are on the CC list for the bug.= From owner-freebsd-net@freebsd.org Fri Jul 10 18:21:08 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id AC4CA36FCFB for ; Fri, 10 Jul 2020 18:21:08 +0000 (UTC) (envelope-from markjdb@gmail.com) Received: from mail-qk1-x741.google.com (mail-qk1-x741.google.com [IPv6:2607:f8b0:4864:20::741]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B3Lvk6mhCz3Sw5 for ; Fri, 10 Jul 2020 18:21:06 +0000 (UTC) (envelope-from markjdb@gmail.com) Received: by mail-qk1-x741.google.com with SMTP id b185so6209123qkg.1 for ; Fri, 10 Jul 2020 11:21:06 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:date:from:to:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=6iZwV3pB8ex4HdAAXM9N9BTwVZHjlpXmhOxogSXwKUE=; b=S76diRiZkSx1vfCAWyl92oBgHIWTGpWId0d3SyhEubIAJJKMMpH/xBJbLU5uLPR2xA fnM7KHAdEMPHRqIhadQqfzkMok9NUS02C6BQqRbR9ePsUugnqPJgk7pdaiwcZIeKL4tx 87uUuA12NaZ9HDfnaWlECkkm1HWhS0Atu5iYSX3ftvbuREnfdIdiwzDFrMrfJ5tDxlQn gEWqbAL+h0a4mSEyrunaeFT351X3XlyxW6uh4AiMsSzFZ/6nw4UdP9s9o2yjLZybA3J5 U9CQ6wjktknfB3BZKBYzYgxkCM8UBzuAqwZQhKnD+M3Q03i6o45xDBe6qb+rFY/8qt7t j/TA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:from:to:subject:message-id :references:mime-version:content-disposition:in-reply-to; bh=6iZwV3pB8ex4HdAAXM9N9BTwVZHjlpXmhOxogSXwKUE=; b=kSauZZu0VB2FJFCE5Cu9LQXGNj2Jt5cMsrtaHTQQpNlw6tL7qJNDMUhQ2IUA0XLYsX KMxlARJ8yuxNDgsQmE7bHCYzvbl9ov+gzwv2mz0Fp2YxLql96lscOcxnLGOsywgrKk5V ffpad2AKmXtDdbnIDaknBhDFRDeW/YT6v6ofzcxrA1nQx8UWUXTCNSnecUHGOtCm6LzD UD01+3wWxCphaSiWUMo299fyA0eT6oCRksEVogFTmC5l5EK1mEyJ2Yptop92Jiamdx0f xEEs+Nfn/ciA5K9cEGJfsn06P0goNa7RtiwJJ2jw3h9R8mRs3lwQaZh/VyrujnfLA5ek umnA== X-Gm-Message-State: AOAM530VwewT22Ld5Fjg7+IQdjayDq8cpLNmdeIT9mjTMQy/O04jQJ6b z/1yBf/3gTkV2DzO5mN8X1kuOWPmzBY= X-Google-Smtp-Source: ABdhPJyvky8ESxksYvEQa2VLMtz8BOIutzRdDnBj8qge8a6HaakEBYsg6vUEIYBTQoAj2IP8YIQacQ== X-Received: by 2002:a37:6348:: with SMTP id x69mr69257135qkb.350.1594405265781; Fri, 10 Jul 2020 11:21:05 -0700 (PDT) Received: from raichu (toroon0560w-lp130-14-174-91-9-204.dsl.bell.ca. [174.91.9.204]) by smtp.gmail.com with ESMTPSA id m7sm8637728qti.6.2020.07.10.11.21.04 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 10 Jul 2020 11:21:05 -0700 (PDT) Sender: Mark Johnston Date: Fri, 10 Jul 2020 14:21:03 -0400 From: Mark Johnston To: freebsd-net@freebsd.org Subject: Re: making SCTP loadable and removing it from GENERIC Message-ID: <20200710182103.GB9380@raichu> References: <20200709151300.GC8947@raichu> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200709151300.GC8947@raichu> X-Rspamd-Queue-Id: 4B3Lvk6mhCz3Sw5 X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=S76diRiZ; dmarc=none; spf=pass (mx1.freebsd.org: domain of markjdb@gmail.com designates 2607:f8b0:4864:20::741 as permitted sender) smtp.mailfrom=markjdb@gmail.com X-Spamd-Result: default: False [-2.08 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36:c]; TO_DN_NONE(0.00)[]; RCVD_COUNT_THREE(0.00)[3]; DKIM_TRACE(0.00)[gmail.com:+]; NEURAL_HAM_SHORT(-0.51)[-0.509]; FORGED_SENDER(0.30)[markj@freebsd.org,markjdb@gmail.com]; RECEIVED_SPAMHAUS_PBL(0.00)[174.91.9.204:received]; MIME_TRACE(0.00)[0:+]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; FROM_NEQ_ENVFROM(0.00)[markj@freebsd.org,markjdb@gmail.com]; TO_DOM_EQ_FROM_DOM(0.00)[]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-0.88)[-0.879]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-0.99)[-0.991]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-net@freebsd.org]; DMARC_NA(0.00)[freebsd.org]; RCPT_COUNT_ONE(0.00)[1]; RCVD_IN_DNSWL_NONE(0.00)[2607:f8b0:4864:20::741:from]; MID_RHS_NOT_FQDN(0.50)[]; RCVD_TLS_ALL(0.00)[] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 10 Jul 2020 18:21:08 -0000 On Thu, Jul 09, 2020 at 11:13:00AM -0400, Mark Johnston wrote: > Hi, > > I spent some time working on making it possible to load the SCTP stack > as a kernel module, the same as we do today with IPSec. There is one > patch remaining to be committed before that can be done in head. One > caveat is that the module can't be unloaded, as some work is needed to > make this safe. However, this obviously isn't a regression. > > The work is based on the observations that: > 1) the in-kernel SCTP stack is not widely used (I know that the same > code is used in some userland applications), and > 2) the SCTP stack is quite large, most FreeBSD kernel developers are > unfamiliar with it, and bugs in it can easily lead to security holes. > > Michael has done a lot of work to fix issues in the SCTP code, > particularly those found by syzkaller, but given that in-kernel SCTP has > few users (almost certainly fewer than IPSec), it seems reasonable to > require users to opt in to having an SCTP stack with a simple "kldload > sctp". Thus, once the last patch is committed I would like to propose > removing "options SCTP" from GENERIC kernel configs in head, replacing > it with "options SCTP_SUPPORT" to enable sctp.ko to be loaded. > > I am wondering if anyone has any objections to or concerns about this > proposal. Any feedback is appreciated. As a follow-up, here is the proposed change now that requisite code has been committed to head: https://reviews.freebsd.org/D25611 I will wait for a week or so for feedback. From owner-freebsd-net@freebsd.org Fri Jul 10 18:48:20 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 02CE5370B99 for ; Fri, 10 Jul 2020 18:48:20 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 4B3MW76P3Qz3WG7 for ; Fri, 10 Jul 2020 18:48:19 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id D9AA1370B17; Fri, 10 Jul 2020 18:48:19 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id D971937057B for ; Fri, 10 Jul 2020 18:48:19 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B3MW75VcWz3W7j for ; Fri, 10 Jul 2020 18:48:19 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 9CB78264F5 for ; Fri, 10 Jul 2020 18:48:19 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 06AImJ3i050884 for ; Fri, 10 Jul 2020 18:48:19 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 06AImJWZ050883 for net@FreeBSD.org; Fri, 10 Jul 2020 18:48:19 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 224218] Kernel panic in SCTP/IpV6 server mode Date: Fri, 10 Jul 2020 18:48:19 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 11.1-RELEASE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: tuexen@freebsd.org X-Bugzilla-Status: Closed X-Bugzilla-Resolution: Overcome By Events X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: tuexen@freebsd.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 10 Jul 2020 18:48:20 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D224218 --- Comment #26 from Michael Tuexen --- (In reply to Mark Johnston from comment #25) Increasing the stack size is a workaround. The plan was to rewrite the hand= ling such that only one buffer is needed. That is why I left the bug open. Since= it is closed now, such an optimisation does not seem to be wanted anymore. --=20 You are receiving this mail because: You are on the CC list for the bug.= From owner-freebsd-net@freebsd.org Fri Jul 10 18:50:30 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id E185F370EA5 for ; Fri, 10 Jul 2020 18:50:30 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 4B3MYf5kH8z3WSM for ; Fri, 10 Jul 2020 18:50:30 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id C4379370EA4; Fri, 10 Jul 2020 18:50:30 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id C38C0370EA3 for ; Fri, 10 Jul 2020 18:50:30 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B3MYf3nVdz3WBg for ; Fri, 10 Jul 2020 18:50:30 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 6493226791 for ; Fri, 10 Jul 2020 18:50:30 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 06AIoUG3052631 for ; Fri, 10 Jul 2020 18:50:30 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 06AIoUVp052630 for net@FreeBSD.org; Fri, 10 Jul 2020 18:50:30 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 224218] Kernel panic in SCTP/IpV6 server mode Date: Fri, 10 Jul 2020 18:50:30 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 11.1-RELEASE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: markj@FreeBSD.org X-Bugzilla-Status: Open X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: tuexen@freebsd.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: resolution bug_status Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 10 Jul 2020 18:50:31 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D224218 Mark Johnston changed: What |Removed |Added ---------------------------------------------------------------------------- Resolution|Overcome By Events |--- Status|Closed |Open --- Comment #27 from Mark Johnston --- (In reply to Michael Tuexen from comment #26) Sorry. I closed the bug only because the submitter's original problem was resolved and I was going through some old bug reports. Since you plan to w= ork on the bug I reopened the PR. --=20 You are receiving this mail because: You are on the CC list for the bug.= From owner-freebsd-net@freebsd.org Fri Jul 10 18:53:19 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 02240370ED1 for ; Fri, 10 Jul 2020 18:53:19 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 4B3Mct6DFlz3WQp for ; Fri, 10 Jul 2020 18:53:18 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id C450E370D48; Fri, 10 Jul 2020 18:53:18 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id C41AF37109A for ; Fri, 10 Jul 2020 18:53:18 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B3Mct2wbSz3Wfp for ; Fri, 10 Jul 2020 18:53:18 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 49733269A6 for ; Fri, 10 Jul 2020 18:53:18 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 06AIrIb7057609 for ; Fri, 10 Jul 2020 18:53:18 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 06AIrIxc057608 for net@FreeBSD.org; Fri, 10 Jul 2020 18:53:18 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 224218] Kernel panic in SCTP/IpV6 server mode Date: Fri, 10 Jul 2020 18:53:17 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 11.1-RELEASE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: tuexen@freebsd.org X-Bugzilla-Status: Open X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: tuexen@freebsd.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 10 Jul 2020 18:53:19 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D224218 --- Comment #28 from Michael Tuexen --- (In reply to Mark Johnston from comment #27) OK, great. I think reducing the stack space worth the effort. It is not that hard, will improve also the handling of pathological parameter configuratio= ns. I haven't done this yet, because I also must extend packetdrill to have a w= ay to test all the strange disallowed combinations. And packetdrill is still missing support for the Authentication extension... --=20 You are receiving this mail because: You are on the CC list for the bug.= From owner-freebsd-net@freebsd.org Fri Jul 10 20:29:18 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 5C5E33728E4 for ; Fri, 10 Jul 2020 20:29:18 +0000 (UTC) (envelope-from kp@FreeBSD.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 4B3Plf1rWGz3d16 for ; Fri, 10 Jul 2020 20:29:18 +0000 (UTC) (envelope-from kp@FreeBSD.org) Received: by mailman.nyi.freebsd.org (Postfix) id 3D988372D89; Fri, 10 Jul 2020 20:29:18 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 3D638372CA3 for ; Fri, 10 Jul 2020 20:29:18 +0000 (UTC) (envelope-from kp@FreeBSD.org) Received: from smtp.freebsd.org (smtp.freebsd.org [96.47.72.83]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B3Plf0nPbz3cxf; Fri, 10 Jul 2020 20:29:18 +0000 (UTC) (envelope-from kp@FreeBSD.org) Received: from venus.codepro.be (venus.codepro.be [5.9.86.228]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mx1.codepro.be", Issuer "Let's Encrypt Authority X3" (verified OK)) (Authenticated sender: kp) by smtp.freebsd.org (Postfix) with ESMTPSA id D9C0410757; Fri, 10 Jul 2020 20:29:17 +0000 (UTC) (envelope-from kp@FreeBSD.org) Received: by venus.codepro.be (Postfix, authenticated sender kp) id 63EF01265A; Fri, 10 Jul 2020 22:29:16 +0200 (CEST) From: "Kristof Provost" To: "Kajetan Staszkiewicz" Cc: net@FreeBSD.org Subject: Re: Deadlocks when using pf tags or socket owner matching Date: Fri, 10 Jul 2020 22:29:15 +0200 X-Mailer: MailMate (1.13.1r5671) Message-ID: <7572280D-1808-46FE-AD72-06F827E1512A@FreeBSD.org> In-Reply-To: References: <48de3ee4-ba52-f6a7-b2d7-c7d77a635eb9@tuxpowered.net> MIME-Version: 1.0 Content-Type: text/plain; charset="UTF-8"; format=flowed Content-Transfer-Encoding: 8bit X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 10 Jul 2020 20:29:18 -0000 On 8 Jul 2020, at 12:52, Kajetan Staszkiewicz wrote: > I have forgot to mention my system: it's FreeBSD 11.3-RELEASE-p9 > > I have also managed to replicate this (or a similar) issue on a test > system built with lock debugging and I got this: > > Jul 8 10:32:07 hwlb-aw-01 kernel: lock order reversal: > Jul 8 10:32:07 hwlb-aw-01 kernel: 1st 0xffffffff81850760 pf rulesets > (pf rulesets) @ > /usr/home/kajetan.staszkiewicz/freebsd.git/sys/netpfil/pf/pf.c:6006 > Jul 8 10:32:07 hwlb-aw-01 kernel: 2nd 0xfffff8011f7028a8 tcpinp > (tcpinp) @ > /usr/home/kajetan.staszkiewicz/freebsd.git/sys/netinet/in_pcb.c:1994 This lock order reversal is almost certainly the reason for the deadlock you report in your previous e-mail. The problem relates to the UID filtering functionality, so not using that feature will avoid the deadlock. I believe I’ve seen previous reports about issues in this area as well. I’ll try to put this on my short-sh term todo list, but I can’t promise anything. Free time is exceptionally rare these days. Best regards, Kristof From owner-freebsd-net@freebsd.org Sat Jul 11 06:58:16 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 2F3203582EB for ; Sat, 11 Jul 2020 06:58:16 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 4B3gjN0WwZz4SbX for ; Sat, 11 Jul 2020 06:58:16 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 1208A3582EA; Sat, 11 Jul 2020 06:58:16 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 11CCF3582E9 for ; Sat, 11 Jul 2020 06:58:16 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B3gjM6n4Nz4SbW for ; Sat, 11 Jul 2020 06:58:15 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id CDB73F1E8 for ; Sat, 11 Jul 2020 06:58:15 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 06B6wFmU016153 for ; Sat, 11 Jul 2020 06:58:15 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 06B6wFUg016152 for net@FreeBSD.org; Sat, 11 Jul 2020 06:58:15 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 206932] Realtek 8111 card stops responding under high load in netmap mode Date: Sat, 11 Jul 2020 06:58:16 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: CURRENT X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: linimon@FreeBSD.org X-Bugzilla-Status: Closed X-Bugzilla-Resolution: Overcome By Events X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: net@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: resolution bug_status Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 11 Jul 2020 06:58:16 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D206932 Mark Linimon changed: What |Removed |Added ---------------------------------------------------------------------------- Resolution|--- |Overcome By Events Status|In Progress |Closed --=20 You are receiving this mail because: You are the assignee for the bug.= From owner-freebsd-net@freebsd.org Sat Jul 11 06:59:13 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id E8945358813 for ; Sat, 11 Jul 2020 06:59:13 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 4B3gkT5rf7z4Sc7 for ; Sat, 11 Jul 2020 06:59:13 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id C8BD63585B2; Sat, 11 Jul 2020 06:59:13 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id C889135875F for ; Sat, 11 Jul 2020 06:59:13 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B3gkT51zbz4SqP for ; Sat, 11 Jul 2020 06:59:13 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 90191F28E for ; Sat, 11 Jul 2020 06:59:13 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 06B6xDR5016875 for ; Sat, 11 Jul 2020 06:59:13 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 06B6xDjf016874 for net@FreeBSD.org; Sat, 11 Jul 2020 06:59:13 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 189088] Assigning the same IP to multiple interfaces in different FIBs creates a host route for only one. Date: Sat, 11 Jul 2020 06:59:13 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: Unspecified X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: linimon@FreeBSD.org X-Bugzilla-Status: Open X-Bugzilla-Resolution: X-Bugzilla-Priority: Normal X-Bugzilla-Assigned-To: net@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_status Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 11 Jul 2020 06:59:14 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D189088 Mark Linimon changed: What |Removed |Added ---------------------------------------------------------------------------- Status|In Progress |Open --- Comment #6 from Mark Linimon --- Not currently being worked on. --=20 You are receiving this mail because: You are the assignee for the bug.= From owner-freebsd-net@freebsd.org Sat Jul 11 18:23:56 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id B682E36C696 for ; Sat, 11 Jul 2020 18:23:56 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 4B3ywX38Bvz4NhR for ; Sat, 11 Jul 2020 18:23:56 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 6BCC936C5A7; Sat, 11 Jul 2020 18:23:56 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 6B85536C695 for ; Sat, 11 Jul 2020 18:23:56 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B3ywX2HZHz4NYy for ; Sat, 11 Jul 2020 18:23:56 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 321B51780C for ; Sat, 11 Jul 2020 18:23:56 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 06BINuvm041745 for ; Sat, 11 Jul 2020 18:23:56 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 06BINuu2041744 for net@FreeBSD.org; Sat, 11 Jul 2020 18:23:56 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 203288] axge(4) panics on unplug Date: Sat, 11 Jul 2020 18:23:55 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: CURRENT X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: thj@FreeBSD.org X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: net@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: cc Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 11 Jul 2020 18:23:56 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D203288 Tom Jones changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |thj@FreeBSD.org --- Comment #1 from Tom Jones --- I was unable to reproduce on 12.1-RELEASE using the below device, could you confirm that this still panics? at usbus0 axge0 on uhub1=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20= =20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20= =20=20=20=20=20=20=20=20=20=20=20=20=20 axge0: on usbus0=20=20=20=20=20=20=20=20=20=20=20=20=20= =20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20 miibus0: on axge0=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20= =20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20= =20=20=20=20 rgephy0: PHY 3 on miibus0 rgephy0: none, 10baseT, 10baseT-FDX, 10baseT-FDX-flow, 100baseTX, 100baseTX-FDX, 100baseTX-FDX-flow, 1000baseT-FDX, 1000baseT-FDX-master, 1000baseT-FDX-flow, 1000baseT-FDX-flow-master, auto, auto-flow ugen0.2: at usbus0 (disconnected) axge0: at uhub1, port 1, addr 1 (disconnected)=20=20=20=20=20=20=20=20=20= =20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20 rgephy0: detached=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20= =20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20= =20=20=20=20=20=20=20=20=20=20=20 miibus0: detached=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20= =20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20= =20=20=20=20=20=20=20=20=20=20=20 axge0: detached --=20 You are receiving this mail because: You are the assignee for the bug.=