Date: Mon, 22 Jul 2019 07:42:07 +0000 From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 239371] epair(4) doesn't expose network traffic to bpf(4), ex. wireshark doesn't see it Message-ID: <bug-239371-227-0kuEBaabjf@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-239371-227@https.bugs.freebsd.org/bugzilla/> References: <bug-239371-227@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=239371 --- Comment #4 from Kristof Provost <kp@freebsd.org> --- I asked because there seem to be issues with bpf on i386. Those cause the pf tests to fail there. Are these old-style (i.e. non-vnet) jails? In that case I wonder if you're not looking on the wrong interface. Looped back packets always turn up on lo0, even if from looking at the IP addresses you'd expect to see them on the interface. (Because there's a more specific route for the IP that tells it to use lo0.) -- You are receiving this mail because: You are the assignee for the bug.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-239371-227-0kuEBaabjf>
