Re: request for MFC of em/igb drivers

2010-11-24 Thread John Hay
On Tue, Nov 23, 2010 at 09:41:49AM +0100, Fabien Thomas wrote:
> That fix on ixgbe would also be great to commit on ixgbe before release.
> This fix a crash on high packet load with bpf (mbuf freed behind bpf 
> analysis).
> 

A fix to ixgbe to fix ipv6 routing would also be great! :-)

John

> Fabien
> 


> > 
> 
> > On 17.11.2010 23:39, Jack Vogel wrote:
> >> Yes, everyone, I plan on updating all the drivers, there has been no
> >> activity
> >> because I've tracking down a couple bugs that are tough, involving days
> >> of testing to reproduce. I know we're getting close and I appreciate any
> >> reports like this before.
> >> 
> >> Stay tuned
> >> 
> >> Jack
> > 
> > Thanks for response. Do you play to MFC fixes before 8.2-RELEASE?
> > We are in PRERELEASE state already :-)
> > ___
> > freebsd-net@freebsd.org mailing list
> > http://lists.freebsd.org/mailman/listinfo/freebsd-net
> > To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


Jail source address selection in 8.1-RELEASE

2010-11-24 Thread Steve Polyack

Hi,
There appears to be a loosely documented sysctl 
'security.jail.param.ip4.saddrsel' which should limit source IP 
selection of jails to their primary jail interface/IP.  The sysctl does 
not appear to do anything, however:


# sysctl security.jail.param.ip4.saddrsel=0
 ->
# echo $?
0
# sysctl security.jail.param.ip4.saddrsel
#
# sysctl -d security.jail.param.ip4.saddrsel
security.jail.param.ip4.saddrsel: Do (not) use IPv4 source address 
selection rather than the primary jail IPv4 address.


Is this tunable only available when VIMAGE jails are built? The 
8.1-RELEASE Release Notes suggest it is for VIMAGE jail(8) containers, 
while 7.3-RELEASE Release Notes suggest that it is available for the 
entire jail(8) subsystem as 'security.jail.ip4_saddrsel', a different OID.


FreeBSD  8.1-RELEASE FreeBSD 8.1-RELEASE #0: Tue Aug  3 16:24:09 EDT 
2010 r...@:/usr/obj/usr/src/sys/GENERIC  amd64



___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


problem with hostapd

2010-11-24 Thread David Cornejo
Hi,

Today I updated a 9.0-CURRENT system acting as an access point and it
stopped working.  From a Windows 7 machine it complains that there is a
network key mismatch.  I've checked it, changed it, and still no dice.  I
took the debug output from hostapd and find two odd things:  first there is
a "frame too short for this IEEE 802.1X packet" message, and then I see
"ioctl[SIOCS80211]: No such file or directory" messages.  The rc.conf and
hostapd.conf are copied direct from a similar device compiled in February
which works fine.  I also used the same wlan_* options from the earlier
working version.

Any ideas on what might have changed or how I can further debug?

thanks,
dave c


hostapd.conf:

interface=wlan0
driver=bsd
logger_syslog=-1
logger_syslog_level=0
logger_stdout=-1
logger_stdout_level=0
dump_file=/tmp/hostapd.dump
ctrl_interface=/var/run/hostapd
ctrl_interface_group=wheel
ssid=evilthings
wpa=1
wpa_passphrase=goodthings
wpa_key_mgmt=WPA-PSK
wpa_pairwise=TKIP

output from hostapd:

[r...@charlie] 133% hostapd -Kdd -P /var/run/hostapd.pid /etc/hostapd.conf
Configuration file: /etc/hostapd.conf
ctrl_interface_group=0 (from group name 'wheel')
bsd_set_iface_flags: flags=0x

BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits)
Completing interface initialization
Flushing old station entries
bsd_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=3

Deauthenticate all stations
bsd_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=2

bsd_set_privacy: enabled=0

bsd_set_key: alg=0 addr=0x0 key_idx=0 set_tx=1 seq_len=0 key_len=0
bsd_del_key: addr=00:00:00:00:00:00 key_idx=0

bsd_set_key: alg=0 addr=0x0 key_idx=1 set_tx=0 seq_len=0 key_len=0
bsd_del_key: addr=00:00:00:00:00:00 key_idx=1

bsd_set_key: alg=0 addr=0x0 key_idx=2 set_tx=0 seq_len=0 key_len=0
bsd_del_key: addr=00:00:00:00:00:00 key_idx=2

bsd_set_key: alg=0 addr=0x0 key_idx=3 set_tx=0 seq_len=0 key_len=0
bsd_del_key: addr=00:00:00:00:00:00 key_idx=3

bsd_get_ssid: ssid="evilthings"

Using interface wlan0 with hwaddr 00:80:48:54:b9:da and ssid 'evilthings'
Deriving WPA PSK based on passphrase
SSID - hexdump_ascii(len=10):
 65 76 69 6c 74 68 69 6e 67 73 evilthings
PSK (ASCII passphrase) - hexdump_ascii(len=10):
 67 6f 6f 64 74 68 69 6e 67 73 goodthings
PSK (from passphrase) - hexdump(len=32): 83 db fa 65 f8 ed 74 40 a6 79 b8 c1
d7 6d a5 a7 07 4d b4 71 44 c5 e2 3e c5 bc 76 63 79 ab 13 d6
bsd_set_ieee8021x: enabled=1

WPA: group state machine entering state GTK_INIT (VLAN-ID 0)
GMK - hexdump(len=32): 32 78 22 93 ba 57 ca 6d fb e1 6f dd 30 9c 8d 7e 04 04
98 bb 27 7d db 17 47 a8 d7 1b 86 11 7b 30
GTK - hexdump(len=32): fa 33 d0 55 64 e2 00 e5 56 4c 36 0a 94 61 4d 96 0f fd
09 ba ac 96 0c 1d 1f 3a 9b 12 ed db 65 40
WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0)
bsd_set_key: alg=2 addr=0x0 key_idx=1 set_tx=1 seq_len=0 key_len=32
bsd_set_privacy: enabled=1

bsd_set_opt_ie: set WPA+RSN ie (len 24)

bsd_set_iface_flags: flags=0x1

wlan0: Setup of interface done.
Discard routing message to if#0 (not for us 9)

wlan0: STA 00:21:6a:a9:5e:90 IEEE 802.11: associated
STA included WPA IE in (Re)AssocReq
  New STA
wlan0: STA 00:21:6a:a9:5e:90 WPA: event 1 notification
bsd_set_key: alg=0 addr=0x2845b308 key_idx=0 set_tx=1 seq_len=0 key_len=0
bsd_del_key: addr=00:21:6a:a9:5e:90 key_idx=0

wlan0: STA 00:21:6a:a9:5e:90 WPA: start authentication
WPA: 00:21:6a:a9:5e:90 WPA_PTK entering state INITIALIZE
bsd_set_key: alg=0 addr=0x2845b308 key_idx=0 set_tx=1 seq_len=0 key_len=0
bsd_del_key: addr=00:21:6a:a9:5e:90 key_idx=0

bsd_set_sta_authorized: addr=00:21:6a:a9:5e:90 authorized=0

wlan0: STA 00:21:6a:a9:5e:90 IEEE 802.1X: unauthorizing port
WPA: 00:21:6a:a9:5e:90 WPA_PTK_GROUP entering state IDLE
WPA: 00:21:6a:a9:5e:90 WPA_PTK entering state AUTHENTICATION
WPA: 00:21:6a:a9:5e:90 WPA_PTK entering state AUTHENTICATION2
WPA: 00:21:6a:a9:5e:90 WPA_PTK entering state INITPSK
WPA: 00:21:6a:a9:5e:90 WPA_PTK entering state PTKSTART
wlan0: STA 00:21:6a:a9:5e:90 WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=1 secure=0 mic=0 ack=1 install=0 pairwise=8
kde_len=0 keyidx=0 encr=0)
TX EAPOL - hexdump(len=113): 00 21 6a a9 5e 90 00 80 48 54 b9 da 88 8e 02 03
00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 6e 23 b1 b1 69 6f bc 93 4a b6
61 b5 89 88 29 22 36 da 56 cb 5f b1 7e 94 91 50 be 8b ba ba c1 f5 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X: 139 bytes from 00:21:6a:a9:5e:90
   IEEE 802.1X: version=0 type=128 length=18516
   frame too short for this IEEE 802.1X packet
wlan0: STA 00:21:6a:a9:5e:90 WPA: EAPOL-Key timeout
WPA: 00:21:6a:a9:5e:90 WPA_PTK entering state PTKSTART
wlan0: STA 00:21:6a:a9:5e:90 WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=1 secure=0 mic=0 ack=1 install=0 pairwise=8
kde_len=0 keyidx=0 encr=0)
TX EAPOL - hexdump(len=113): 00 21 6a a9 5e 90 00 80 48 54 

Re: problem with hostapd

2010-11-24 Thread Adrian Chadd
Hi,

Would you please try -head just before rui committed his wpa/hostapd
update and report back to -net and Rui directly?

I saw some hostapd broken-ness when I tried -head last week but i
haven't had time to dig up details for Rui. It seems you just have.
:-)

Thanks!


ADrian



On 25 November 2010 07:57, David Cornejo  wrote:
> Hi,
>
> Today I updated a 9.0-CURRENT system acting as an access point and it
> stopped working.  From a Windows 7 machine it complains that there is a
> network key mismatch.  I've checked it, changed it, and still no dice.  I
> took the debug output from hostapd and find two odd things:  first there is
> a "frame too short for this IEEE 802.1X packet" message, and then I see
> "ioctl[SIOCS80211]: No such file or directory" messages.  The rc.conf and
> hostapd.conf are copied direct from a similar device compiled in February
> which works fine.  I also used the same wlan_* options from the earlier
> working version.
>
> Any ideas on what might have changed or how I can further debug?
>
> thanks,
> dave c
>
>
> hostapd.conf:
>
> interface=wlan0
> driver=bsd
> logger_syslog=-1
> logger_syslog_level=0
> logger_stdout=-1
> logger_stdout_level=0
> dump_file=/tmp/hostapd.dump
> ctrl_interface=/var/run/hostapd
> ctrl_interface_group=wheel
> ssid=evilthings
> wpa=1
> wpa_passphrase=goodthings
> wpa_key_mgmt=WPA-PSK
> wpa_pairwise=TKIP
>
> output from hostapd:
>
> [r...@charlie] 133% hostapd -Kdd -P /var/run/hostapd.pid /etc/hostapd.conf
> Configuration file: /etc/hostapd.conf
> ctrl_interface_group=0 (from group name 'wheel')
> bsd_set_iface_flags: flags=0x
>
> BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits)
> Completing interface initialization
> Flushing old station entries
> bsd_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=3
>
> Deauthenticate all stations
> bsd_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=2
>
> bsd_set_privacy: enabled=0
>
> bsd_set_key: alg=0 addr=0x0 key_idx=0 set_tx=1 seq_len=0 key_len=0
> bsd_del_key: addr=00:00:00:00:00:00 key_idx=0
>
> bsd_set_key: alg=0 addr=0x0 key_idx=1 set_tx=0 seq_len=0 key_len=0
> bsd_del_key: addr=00:00:00:00:00:00 key_idx=1
>
> bsd_set_key: alg=0 addr=0x0 key_idx=2 set_tx=0 seq_len=0 key_len=0
> bsd_del_key: addr=00:00:00:00:00:00 key_idx=2
>
> bsd_set_key: alg=0 addr=0x0 key_idx=3 set_tx=0 seq_len=0 key_len=0
> bsd_del_key: addr=00:00:00:00:00:00 key_idx=3
>
> bsd_get_ssid: ssid="evilthings"
>
> Using interface wlan0 with hwaddr 00:80:48:54:b9:da and ssid 'evilthings'
> Deriving WPA PSK based on passphrase
> SSID - hexdump_ascii(len=10):
>     65 76 69 6c 74 68 69 6e 67 73                     evilthings
> PSK (ASCII passphrase) - hexdump_ascii(len=10):
>     67 6f 6f 64 74 68 69 6e 67 73                     goodthings
> PSK (from passphrase) - hexdump(len=32): 83 db fa 65 f8 ed 74 40 a6 79 b8 c1
> d7 6d a5 a7 07 4d b4 71 44 c5 e2 3e c5 bc 76 63 79 ab 13 d6
> bsd_set_ieee8021x: enabled=1
>
> WPA: group state machine entering state GTK_INIT (VLAN-ID 0)
> GMK - hexdump(len=32): 32 78 22 93 ba 57 ca 6d fb e1 6f dd 30 9c 8d 7e 04 04
> 98 bb 27 7d db 17 47 a8 d7 1b 86 11 7b 30
> GTK - hexdump(len=32): fa 33 d0 55 64 e2 00 e5 56 4c 36 0a 94 61 4d 96 0f fd
> 09 ba ac 96 0c 1d 1f 3a 9b 12 ed db 65 40
> WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0)
> bsd_set_key: alg=2 addr=0x0 key_idx=1 set_tx=1 seq_len=0 key_len=32
> bsd_set_privacy: enabled=1
>
> bsd_set_opt_ie: set WPA+RSN ie (len 24)
>
> bsd_set_iface_flags: flags=0x1
>
> wlan0: Setup of interface done.
> Discard routing message to if#0 (not for us 9)
>
> wlan0: STA 00:21:6a:a9:5e:90 IEEE 802.11: associated
> STA included WPA IE in (Re)AssocReq
>  New STA
> wlan0: STA 00:21:6a:a9:5e:90 WPA: event 1 notification
> bsd_set_key: alg=0 addr=0x2845b308 key_idx=0 set_tx=1 seq_len=0 key_len=0
> bsd_del_key: addr=00:21:6a:a9:5e:90 key_idx=0
>
> wlan0: STA 00:21:6a:a9:5e:90 WPA: start authentication
> WPA: 00:21:6a:a9:5e:90 WPA_PTK entering state INITIALIZE
> bsd_set_key: alg=0 addr=0x2845b308 key_idx=0 set_tx=1 seq_len=0 key_len=0
> bsd_del_key: addr=00:21:6a:a9:5e:90 key_idx=0
>
> bsd_set_sta_authorized: addr=00:21:6a:a9:5e:90 authorized=0
>
> wlan0: STA 00:21:6a:a9:5e:90 IEEE 802.1X: unauthorizing port
> WPA: 00:21:6a:a9:5e:90 WPA_PTK_GROUP entering state IDLE
> WPA: 00:21:6a:a9:5e:90 WPA_PTK entering state AUTHENTICATION
> WPA: 00:21:6a:a9:5e:90 WPA_PTK entering state AUTHENTICATION2
> WPA: 00:21:6a:a9:5e:90 WPA_PTK entering state INITPSK
> WPA: 00:21:6a:a9:5e:90 WPA_PTK entering state PTKSTART
> wlan0: STA 00:21:6a:a9:5e:90 WPA: sending 1/4 msg of 4-Way Handshake
> WPA: Send EAPOL(version=1 secure=0 mic=0 ack=1 install=0 pairwise=8
> kde_len=0 keyidx=0 encr=0)
> TX EAPOL - hexdump(len=113): 00 21 6a a9 5e 90 00 80 48 54 b9 da 88 8e 02 03
> 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 6e 23 b1 b1 69 6f bc 93 4a b6
> 61 b5 89 88 29 22 36 da 56 cb 5f b1 7e 94 91 50 be 8b ba ba c1 f5 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0

Re: problem with hostapd

2010-11-24 Thread David Cornejo
are you referring to rev 214734 on Nov 3rd?

may not be able to get to the hardware to test until Monday though

thanks!

On Wed, Nov 24, 2010 at 5:20 PM, Adrian Chadd  wrote:

> Hi,
>
> Would you please try -head just before rui committed his wpa/hostapd
> update and report back to -net and Rui directly?
>
> I saw some hostapd broken-ness when I tried -head last week but i
> haven't had time to dig up details for Rui. It seems you just have.
> :-)
>
> Thanks!
>
>
> ADrian
>
>
>
> On 25 November 2010 07:57, David Cornejo  wrote:
> > Hi,
> >
> > Today I updated a 9.0-CURRENT system acting as an access point and it
> > stopped working.  From a Windows 7 machine it complains that there is a
> > network key mismatch.  I've checked it, changed it, and still no dice.  I
> > took the debug output from hostapd and find two odd things:  first there
> is
> > a "frame too short for this IEEE 802.1X packet" message, and then I see
> > "ioctl[SIOCS80211]: No such file or directory" messages.  The rc.conf and
> > hostapd.conf are copied direct from a similar device compiled in February
> > which works fine.  I also used the same wlan_* options from the earlier
> > working version.
> >
> > Any ideas on what might have changed or how I can further debug?
> >
> > thanks,
> > dave c
> >
> >
> > hostapd.conf:
> >
> > interface=wlan0
> > driver=bsd
> > logger_syslog=-1
> > logger_syslog_level=0
> > logger_stdout=-1
> > logger_stdout_level=0
> > dump_file=/tmp/hostapd.dump
> > ctrl_interface=/var/run/hostapd
> > ctrl_interface_group=wheel
> > ssid=evilthings
> > wpa=1
> > wpa_passphrase=goodthings
> > wpa_key_mgmt=WPA-PSK
> > wpa_pairwise=TKIP
> >
> > output from hostapd:
> >
> > [r...@charlie] 133% hostapd -Kdd -P /var/run/hostapd.pid
> /etc/hostapd.conf
> > Configuration file: /etc/hostapd.conf
> > ctrl_interface_group=0 (from group name 'wheel')
> > bsd_set_iface_flags: flags=0x
> >
> > BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits)
> > Completing interface initialization
> > Flushing old station entries
> > bsd_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=3
> >
> > Deauthenticate all stations
> > bsd_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=2
> >
> > bsd_set_privacy: enabled=0
> >
> > bsd_set_key: alg=0 addr=0x0 key_idx=0 set_tx=1 seq_len=0 key_len=0
> > bsd_del_key: addr=00:00:00:00:00:00 key_idx=0
> >
> > bsd_set_key: alg=0 addr=0x0 key_idx=1 set_tx=0 seq_len=0 key_len=0
> > bsd_del_key: addr=00:00:00:00:00:00 key_idx=1
> >
> > bsd_set_key: alg=0 addr=0x0 key_idx=2 set_tx=0 seq_len=0 key_len=0
> > bsd_del_key: addr=00:00:00:00:00:00 key_idx=2
> >
> > bsd_set_key: alg=0 addr=0x0 key_idx=3 set_tx=0 seq_len=0 key_len=0
> > bsd_del_key: addr=00:00:00:00:00:00 key_idx=3
> >
> > bsd_get_ssid: ssid="evilthings"
> >
> > Using interface wlan0 with hwaddr 00:80:48:54:b9:da and ssid 'evilthings'
> > Deriving WPA PSK based on passphrase
> > SSID - hexdump_ascii(len=10):
> > 65 76 69 6c 74 68 69 6e 67 73 evilthings
> > PSK (ASCII passphrase) - hexdump_ascii(len=10):
> > 67 6f 6f 64 74 68 69 6e 67 73 goodthings
> > PSK (from passphrase) - hexdump(len=32): 83 db fa 65 f8 ed 74 40 a6 79 b8
> c1
> > d7 6d a5 a7 07 4d b4 71 44 c5 e2 3e c5 bc 76 63 79 ab 13 d6
> > bsd_set_ieee8021x: enabled=1
> >
> > WPA: group state machine entering state GTK_INIT (VLAN-ID 0)
> > GMK - hexdump(len=32): 32 78 22 93 ba 57 ca 6d fb e1 6f dd 30 9c 8d 7e 04
> 04
> > 98 bb 27 7d db 17 47 a8 d7 1b 86 11 7b 30
> > GTK - hexdump(len=32): fa 33 d0 55 64 e2 00 e5 56 4c 36 0a 94 61 4d 96 0f
> fd
> > 09 ba ac 96 0c 1d 1f 3a 9b 12 ed db 65 40
> > WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0)
> > bsd_set_key: alg=2 addr=0x0 key_idx=1 set_tx=1 seq_len=0 key_len=32
> > bsd_set_privacy: enabled=1
> >
> > bsd_set_opt_ie: set WPA+RSN ie (len 24)
> >
> > bsd_set_iface_flags: flags=0x1
> >
> > wlan0: Setup of interface done.
> > Discard routing message to if#0 (not for us 9)
> >
> > wlan0: STA 00:21:6a:a9:5e:90 IEEE 802.11: associated
> > STA included WPA IE in (Re)AssocReq
> >  New STA
> > wlan0: STA 00:21:6a:a9:5e:90 WPA: event 1 notification
> > bsd_set_key: alg=0 addr=0x2845b308 key_idx=0 set_tx=1 seq_len=0 key_len=0
> > bsd_del_key: addr=00:21:6a:a9:5e:90 key_idx=0
> >
> > wlan0: STA 00:21:6a:a9:5e:90 WPA: start authentication
> > WPA: 00:21:6a:a9:5e:90 WPA_PTK entering state INITIALIZE
> > bsd_set_key: alg=0 addr=0x2845b308 key_idx=0 set_tx=1 seq_len=0 key_len=0
> > bsd_del_key: addr=00:21:6a:a9:5e:90 key_idx=0
> >
> > bsd_set_sta_authorized: addr=00:21:6a:a9:5e:90 authorized=0
> >
> > wlan0: STA 00:21:6a:a9:5e:90 IEEE 802.1X: unauthorizing port
> > WPA: 00:21:6a:a9:5e:90 WPA_PTK_GROUP entering state IDLE
> > WPA: 00:21:6a:a9:5e:90 WPA_PTK entering state AUTHENTICATION
> > WPA: 00:21:6a:a9:5e:90 WPA_PTK entering state AUTHENTICATION2
> > WPA: 00:21:6a:a9:5e:90 WPA_PTK entering state INITPSK
> > WPA: 00:21:6a:a9:5e:90 WPA_PTK entering state PTKSTART
> > wlan0: STA 00:21:6a:a9:5e:90 WPA: