From owner-freebsd-net@freebsd.org Tue Dec 17 13:17:01 2019 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 7FAB71E8277 for ; Tue, 17 Dec 2019 13:17:01 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 47cdvx2vJpz4L6r for ; Tue, 17 Dec 2019 13:17:01 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 637011E8276; Tue, 17 Dec 2019 13:17:01 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 633311E8275 for ; Tue, 17 Dec 2019 13:17:01 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 47cdvx23QSz4L6q for ; Tue, 17 Dec 2019 13:17:01 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 41E6FE6C0 for ; Tue, 17 Dec 2019 13:17:01 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id xBHDH1fK006250 for ; Tue, 17 Dec 2019 13:17:01 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id xBHDH1A5006249 for net@FreeBSD.org; Tue, 17 Dec 2019 13:17:01 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 242677] multicast: setsockopt(...IP_DROP_MEMBERSHIP...) doesn't lead to sending IGMP packet. Date: Tue, 17 Dec 2019 13:17:01 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: CURRENT X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Many People X-Bugzilla-Who: aleksandr.fedorov@itglobal.com X-Bugzilla-Status: In Progress X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: hselasky@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 17 Dec 2019 13:17:01 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D242677 --- Comment #4 from Aleksandr Fedorov --- It seems that regression was introduced at r349369: https://svnweb.freebsd.org/base/head/sys/netinet/in_mcast.c?r1=3D347691&r2= =3D349369&pathrev=3D349369 I tested ipv6 version with your patch, it's look good. Before patch: # tcpdump -i igb1 -vvv tcpdump: listening on igb1, link-type EN10MB (Ethernet), capture size 262144 bytes 16:12:20.141207 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.1.55 tell 192.168.1.55, length 28 16:12:22.359877 IP6 (hlim 1, next-header Options (0) payload length: 36) fe80::aa1e:84ff:fe93:d5f5 > ff02::16: HBH (pa dn)(rtalert: 0x0000) [icmp6 sum ok] ICMP6, multicast listener report v2, 1 group record(s) [gaddr ff12::1 to_ex { }] 16:12:24.479711 IP6 (hlim 1, next-header Options (0) payload length: 36) fe80::aa1e:84ff:fe93:d5f5 > ff02::16: HBH (pa dn)(rtalert: 0x0000) [icmp6 sum ok] ICMP6, multicast listener report v2, 1 group record(s) [gaddr ff12::1 to_ex { }] 16:12:32.945688 IP6 (hlim 1, next-header Options (0) payload length: 36) fe80::aa1e:84ff:fe93:d5f5 > ff02::16: HBH (pa dn)(rtalert: 0x0000) [icmp6 sum ok] ICMP6, multicast listener report v2, 1 group record(s) [gaddr ff12::1 to_ex { }] 16:12:33.793701 IP6 (hlim 1, next-header Options (0) payload length: 36) fe80::aa1e:84ff:fe93:d5f5 > ff02::16: HBH (pa dn)(rtalert: 0x0000) [icmp6 sum ok] ICMP6, multicast listener report v2, 1 group record(s) [gaddr ff12::1 to_ex { }] After patch: # tcpdump -i igb1 -vvv tcpdump: listening on igb1, link-type EN10MB (Ethernet), capture size 262144 bytes 15:57:34.351600 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.1.55 tell 192.168.1.55, length 28 15:57:36.607299 IP6 (hlim 1, next-header Options (0) payload length: 36) fe80::aa1e:84ff:fe93:d5f5 > ff02::16: HBH (pa dn)(rtalert: 0x0000) [icmp6 sum ok] ICMP6, multicast listener report v2, 1 group record(s) [gaddr ff12::1 to_ex { }] 15:57:37.031254 IP6 (hlim 1, next-header Options (0) payload length: 36) fe80::aa1e:84ff:fe93:d5f5 > ff02::16: HBH (pa dn)(rtalert: 0x0000) [icmp6 sum ok] ICMP6, multicast listener report v2, 1 group record(s) [gaddr ff12::1 to_ex { }] 15:57:41.676026 IP6 (hlim 1, next-header Options (0) payload length: 36) fe80::aa1e:84ff:fe93:d5f5 > ff02::16: HBH (pa dn)(rtalert: 0x0000) [icmp6 sum ok] ICMP6, multicast listener report v2, 1 group record(s) [gaddr ff12::1 block { }] 15:57:43.158268 IP6 (hlim 1, next-header Options (0) payload length: 36) fe80::aa1e:84ff:fe93:d5f5 > ff02::16: HBH (pa dn)(rtalert: 0x0000) [icmp6 sum ok] ICMP6, multicast listener report v2, 1 group record(s) [gaddr ff12::1 block { }] 15:57:46.941264 IP6 (hlim 1, next-header Options (0) payload length: 36) fe80::aa1e:84ff:fe93:d5f5 > ff02::16: HBH (pa dn)(rtalert: 0x0000) [icmp6 sum ok] ICMP6, multicast listener report v2, 1 group record(s) [gaddr ff12::1 to_ex { }] 15:57:50.121248 IP6 (hlim 1, next-header Options (0) payload length: 36) fe80::aa1e:84ff:fe93:d5f5 > ff02::16: HBH (pa dn)(rtalert: 0x0000) [icmp6 sum ok] ICMP6, multicast listener report v2, 1 group record(s) [gaddr ff12::1 to_ex { }] 15:57:52.029263 IP6 (hlim 1, next-header Options (0) payload length: 36) fe80::aa1e:84ff:fe93:d5f5 > ff02::16: HBH (pa dn)(rtalert: 0x0000) [icmp6 sum ok] ICMP6, multicast listener report v2, 1 group record(s) [gaddr ff12::1 block { }] 15:57:54.139271 IP6 (hlim 1, next-header Options (0) payload length: 36) fe80::aa1e:84ff:fe93:d5f5 > ff02::16: HBH (pa dn)(rtalert: 0x0000) [icmp6 sum ok] ICMP6, multicast listener report v2, 1 group record(s) [gaddr ff12::1 block { }] I also checked vmstat -m |grep multi and didn't found any memory leaks. Thanks! --=20 You are receiving this mail because: You are on the CC list for the bug.=