From owner-freebsd-net@freebsd.org Wed Jul 24 16:51:29 2019 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 2B47CB1F8F for ; Wed, 24 Jul 2019 16:51:29 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 468848E0D6 for ; Wed, 24 Jul 2019 16:51:26 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 599F9B1F84; Wed, 24 Jul 2019 16:51:23 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 595CCB1F83 for ; Wed, 24 Jul 2019 16:51:23 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 3B3928E0A5 for ; Wed, 24 Jul 2019 16:51:23 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id ABC351956C for ; Wed, 24 Jul 2019 16:51:19 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id x6OGpJIQ028098 for ; Wed, 24 Jul 2019 16:51:19 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id x6OGpJdo028095 for net@FreeBSD.org; Wed, 24 Jul 2019 16:51:19 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 239417] ARP ping fails from the host to bridged vnet jails Date: Wed, 24 Jul 2019 16:51:19 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 12.0-STABLE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: yuri@freebsd.org X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: net@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-Rspamd-Queue-Id: 3B3928E0A5 X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.98 / 15.00]; local_wl_from(0.00)[freebsd.org]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.98)[-0.979,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; ASN(0.00)[asn:11403, ipnet:2610:1c1:1::/48, country:US] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 24 Jul 2019 16:51:29 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D239417 --- Comment #2 from Yuri Victorovich --- arping -v -v ,,, log: > $ arping -v -v 192.168.5.205 > arping: clock_getres() =3D 0s 1ns > arping: libnet_init() > arping: Autodetected interface sk0 > arping: libnet_init(sk0) > Timestamp types: > Name Description > arping: chroot(/var/empty): Operation not permitted > arping: setgroups(0, NULL): Operation not permitted > arping: setgid(): Operation not permitted > arping: setuid(): Operation not permitted > arping: pcap_get_selectable_fd(): 5 > This box: Interface: sk0 IP: 192.168.5.3 MAC address: 00:1c:32:3a:87= :32 > ARPING 192.168.5.205 > arping: sending packet at time 145827.861062692 > Timeout > arping: sending packet at time 145828.867484471 > Timeout > arping: sending packet at time 145829.873842180 > ^C > the PR should be for Ports & Packages But net/arping normally works, except for in this situation. In this case it doesn't get ARP responses, which seems to be a kernel probl= em because ARP responses are supposed to come from all bridged peers. arping of the same jail from another such jail, or from outside hosts works, just not from the host where jail resides. --=20 You are receiving this mail because: You are the assignee for the bug.=