[Bug 247652] Unwanted leave on AllHost multicast group when calling SIOCAIFADDR ioctl with an existing IP address

2024-12-24 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=247652 Alexander Vereeken changed: What|Removed |Added Keywords|patch | -- You are receiving this m

[Bug 277125] ifconfig: ioctl (SIOCAIFADDR): File exists when P2P dest_addr route exists

2024-11-12 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=277125 Alexander V. Chernikov changed: What|Removed |Added CC||melif...@freebsd.org

[Bug 277125] ifconfig: ioctl (SIOCAIFADDR): File exists when P2P dest_addr route exists

2024-11-12 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=277125 Eugene Grosbein changed: What|Removed |Added CC||eu...@freebsd.org See

[Bug 277125] ifconfig: ioctl (SIOCAIFADDR): File exists when P2P dest_addr route exists

2024-11-03 Thread bugzilla-noreply
#1 from Jose Luis Duran --- A shorter way to reproduce it: # route add -net 192.0.2.0/24 -interface vtnet0 add net 192.0.2.0: gateway vtnet0 # ifconfig epair create epair0a # ifconfig epair0a inet 192.0.2.1/24 ifconfig: ioctl (SIOCAIFADDR): File exists I'm also not

[Bug 277125] ifconfig: ioctl (SIOCAIFADDR): File exists when P2P dest_addr route exists

2024-02-17 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=277125 Mark Linimon changed: What|Removed |Added Assignee|b...@freebsd.org|n...@freebsd.org -- You are receiv

[Bug 247652] Unwanted leave on AllHost multicast group when calling SIOCAIFADDR ioctl with an existing IP address

2023-12-28 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=247652 Mark Linimon changed: What|Removed |Added Attachment #216059|0 |1 is patch|

[Bug 250366] [tcp] The ioctl of socket fd should return -1 after listen to avoid misusing.

2020-11-30 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=250366 Kubilay Kocak changed: What|Removed |Added URL||https://reviews.freebsd.org

[Bug 250366] [tcp] The ioctl of socket fd should return -1 after listen to avoid misusing.

2020-11-30 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=250366 Michael Tuexen changed: What|Removed |Added Status|In Progress |Closed Flags|mfc-sta

[Bug 250366] [tcp] The ioctl of socket fd should return -1 after listen to avoid misusing.

2020-11-30 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=250366 --- Comment #4 from commit-h...@freebsd.org --- A commit references this bug: Author: tuexen Date: Mon Nov 30 09:21:02 UTC 2020 New revision: 368179 URL: https://svnweb.freebsd.org/changeset/base/368179 Log: MFC r367464: The ioctl

[Bug 250366] [tcp] The ioctl of socket fd should return -1 after listen to avoid misusing.

2020-11-07 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=250366 --- Comment #3 from commit-h...@freebsd.org --- A commit references this bug: Author: tuexen Date: Sat Nov 7 21:17:49 UTC 2020 New revision: 367464 URL: https://svnweb.freebsd.org/changeset/base/367464 Log: The ioctl() calls using

[Bug 250366] [tcp] The ioctl of socket fd should return -1 after listen to avoid misusing.

2020-10-21 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=250366 Michael Tuexen changed: What|Removed |Added Flags||mfc-stable12? -- You are receivi

[Bug 250366] [tcp] The ioctl of socket fd should return -1 after listen to avoid misusing.

2020-10-21 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=250366 Michael Tuexen changed: What|Removed |Added Status|New |In Progress --- Comment #2 from M

[Bug 250366] [tcp] The ioctl of socket fd should return -1 after listen to avoid misusing.

2020-10-20 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=250366 Michael Tuexen changed: What|Removed |Added CC||n...@freebsd.org,

[Bug 250366] [tcp] The ioctl of socket fd should return -1 after listen to avoid misusing.

2020-10-15 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=250366 Mark Linimon changed: What|Removed |Added Assignee|b...@freebsd.org|n...@freebsd.org -- You are receiv

[Bug 247652] Unwanted leave on AllHost multicast group when calling SIOCAIFADDR ioctl with an existing IP address

2020-06-30 Thread bugzilla-noreply
Keywords||patch Summary|Unwanted leaved on AllHost |Unwanted leave on AllHost |multicast group |multicast group when ||calling SIOCAIFADDR ioctl

[Bug 240539] tuntap: Getting "ifconfig: ioctl SIOCSIFNAME (set name): File exists" from `ifconfig tap create name tap0`

2019-09-20 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=240539 Kyle Evans changed: What|Removed |Added Status|In Progress |Closed Resolution|---

[Bug 240539] tuntap: Getting "ifconfig: ioctl SIOCSIFNAME (set name): File exists" from `ifconfig tap create name tap0`

2019-09-20 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=240539 --- Comment #8 from commit-h...@freebsd.org --- A commit references this bug: Author: kevans Date: Sat Sep 21 01:39:50 UTC 2019 New revision: 352571 URL: https://svnweb.freebsd.org/changeset/base/352571 Log: MFS r352565: SIOCSIFNAME: Do

[Bug 240539] tuntap: Getting "ifconfig: ioctl SIOCSIFNAME (set name): File exists" from `ifconfig tap create name tap0`

2019-09-20 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=240539 --- Comment #7 from commit-h...@freebsd.org --- A commit references this bug: Author: kevans Date: Fri Sep 20 21:27:42 UTC 2019 New revision: 352565 URL: https://svnweb.freebsd.org/changeset/base/352565 Log: MFC r352246: SIOCSIFNAME: Do

[Bug 240539] tuntap: Getting "ifconfig: ioctl SIOCSIFNAME (set name): File exists" from `ifconfig tap create name tap0`

2019-09-14 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=240539 Kubilay Kocak changed: What|Removed |Added Resolution|FIXED |--- Status|Closed

[Bug 240539] tuntap: Getting "ifconfig: ioctl SIOCSIFNAME (set name): File exists" from `ifconfig tap create name tap0`

2019-09-12 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=240539 Mateusz Piotrowski <0...@freebsd.org> changed: What|Removed |Added Status|New |Closed

[Bug 240539] tuntap: Getting "ifconfig: ioctl SIOCSIFNAME (set name): File exists" from `ifconfig tap create name tap0`

2019-09-12 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=240539 Kyle Evans changed: What|Removed |Added Assignee|n...@freebsd.org |kev...@freebsd.org C

[Bug 240539] tuntap: Getting "ifconfig: ioctl SIOCSIFNAME (set name): File exists" from `ifconfig tap create name tap0`

2019-09-12 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=240539 --- Comment #3 from commit-h...@freebsd.org --- A commit references this bug: Author: kevans Date: Thu Sep 12 15:36:49 UTC 2019 New revision: 352246 URL: https://svnweb.freebsd.org/changeset/base/352246 Log: SIOCSIFNAME: Do nothing if we

[Bug 240539] tuntap: Getting "ifconfig: ioctl SIOCSIFNAME (set name): File exists" from `ifconfig tap create name tap0`

2019-09-12 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=240539 Kyle Evans changed: What|Removed |Added CC||kev...@freebsd.org --- Comment #2 fro

[Bug 240539] tuntap: Getting "ifconfig: ioctl SIOCSIFNAME (set name): File exists" from `ifconfig tap create name tap0`

2019-09-12 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=240539 Mark Linimon changed: What|Removed |Added Assignee|b...@freebsd.org|n...@freebsd.org -- You are receiv

[Bug 237655] Non-deterministic panic when running pf tests in interface ioctl code (NULL passed to strncmp)

2019-08-14 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=237655 Li-Wen Hsu changed: What|Removed |Added Status|Open|Closed Resolution|---

[Bug 237655] Non-deterministic panic when running pf tests in interface ioctl code (NULL passed to strncmp)

2019-06-27 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=237655 Kubilay Kocak changed: What|Removed |Added Keywords||needs-qa Status|New

[Bug 237655] Non-deterministic panic when running pf tests in interface ioctl code (NULL passed to strncmp)

2019-06-04 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=237655 Kristof Provost changed: What|Removed |Added Assignee|k...@freebsd.org |n...@freebsd.org --- Comment #

Re: lagg: a race between ioctl and clone_destroy

2018-12-03 Thread Andriy Gapon
On 03/12/2018 14:34, Andriy Gapon wrote: > My idea is that there should be something like 'if_freed' or 'if_destroyed' > method that could be used by drivers for their cleaning up. That method would > be called from if_destroy() when we really know that the interface has no > references and, thus,

Re: lagg: a race between ioctl and clone_destroy

2018-12-03 Thread Andriy Gapon
On 30/11/2018 14:27, Andriy Gapon wrote: > Q1. Is the described race plausible? > > Q2. If yes, then has this class[*] of races been fixed by the epoch mechanism? > I suspect that lagg_ioctl() can still have that race if it's called > concurrently > with lagg_clone_destroy(). So, to re-iterate,

lagg: a race between ioctl and clone_destroy

2018-11-30 Thread Andriy Gapon
I am working on analyzing a crash with the following stack trace: _sx_slock_hard lagg_media_status ifmedia_ioctl lagg_ioctl ifioctl kern_ioctl sys_ioctl It appears that the crash happened because of a destroyed sx lock. Please note that the code base is the CURRENT from just before the time when

[Bug 227058] vxge(4): ioctl implementation reads directly from user memory

2018-05-20 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=227058 Eitan Adler changed: What|Removed |Added Status|New |Closed Resolution|---

[Bug 227086] Upgraded world - broken OpenVPN second tun - ifconfig: ioctl (SIOCAIFADDR): File exists

2018-03-30 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=227086 Marek changed: What|Removed |Added Resolution|--- |Not A Bug Status|Open

[Bug 227086] Upgraded world - broken OpenVPN second tun - ifconfig: ioctl (SIOCAIFADDR): File exists

2018-03-30 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=227086 --- Comment #3 from Eugene Grosbein --- (In reply to Marek from comment #2) The problem is the address 10.20.20.1 that is bounded first to "local system" by means of assigning it to local side of tun0. Then, an attempt is made to assign it

[Bug 227086] Upgraded world - broken OpenVPN second tun - ifconfig: ioctl (SIOCAIFADDR): File exists

2018-03-29 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=227086 --- Comment #2 from Marek --- Hi Eugene, I can test old revision only (home server "in production") :) Some more outputs from working/current configuration: # ifconfig tun0 tun0: flags=8051 metric 0 mtu 1500 options=8

[Bug 227086] Upgraded world - broken OpenVPN second tun - ifconfig: ioctl (SIOCAIFADDR): File exists

2018-03-29 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=227086 Eugene Grosbein changed: What|Removed |Added CC||eu...@freebsd.org,

[Bug 227086] Upgraded world - broken OpenVPN second tun - ifconfig: ioctl (SIOCAIFADDR): File exists

2018-03-29 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=227086 Mark Linimon changed: What|Removed |Added Assignee|freebsd-b...@freebsd.org|freebsd-net@FreeBSD.org K

[Bug 227058] vxge(4): ioctl implementation reads directly from user memory

2018-03-29 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=227058 Brooks Davis changed: What|Removed |Added Keywords||easy --- Comment #1 from Brooks Dav

[Bug 227058] vxge(4): ioctl implementation reads directly from user memory

2018-03-28 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=227058 Mark Linimon changed: What|Removed |Added Assignee|freebsd-b...@freebsd.org|freebsd-net@FreeBSD.org -- You are

Re: Fw: D3300: LAG LACP timeout tunable through IOCTL

2015-08-11 Thread hiren panchasara
On 08/11/15 at 08:04P, Lakshmi Narasimhan Sundararajan wrote: > Hi FreeBSD Team, > > We have been working on LACP timeout tunable to help expedite link failure > propagation through a IOCtl interface. > > > > The changes have been tested and review is in progress. &

Fw: D3300: LAG LACP timeout tunable through IOCTL

2015-08-11 Thread Lakshmi Narasimhan Sundararajan
Hi FreeBSD Team, We have been working on LACP timeout tunable to help expedite link failure propagation through a IOCtl interface. The changes have been tested and review is in progress. The phabricator link is https://reviews.freebsd.org/D3300 We would kindly appreciate if the changes can

Re: FreeBSD LAG LACP timeout tunable through IOCTL

2015-08-03 Thread Lakshmi Narasimhan Sundararajan
+++ sys/net/ieee8023ad_lacp.c (working copy) @@ -522,7 +522,7 @@ int error; boolean_t active = TRUE; /* XXX should be configurable */ - boolean_t fast = FALSE; /* XXX should be configurable */ + boolean_t fast = FALSE; /* Configurable via ioctl */ link_init_sdl(i

Re: FreeBSD LAG LACP timeout tunable through IOCTL

2015-07-24 Thread Pokala, Ravi
uot;Tallam, Sreen" Subject: FreeBSD LAG LACP timeout tunable through IOCTL >Hi FreeBSD team, >In FreeBSD-10 and in Current, by default LACP supports only long timeout. >FreeBSD does not provide the way to configure LACP timeout period. >We made code changes for LACP Fast-timeou

FreeBSD LAG LACP timeout tunable through IOCTL

2015-07-23 Thread Lakshmi Narasimhan Sundararajan
Hi FreeBSD team, In FreeBSD-10 and in Current, by default LACP supports only long timeout. FreeBSD does not provide the way to configure LACP timeout period. We made code changes for LACP Fast-timeout (Using IOCTL, both GET / SET) on FreeBSD-11. And we were able to successfully test the

Re: SIOCSVH, SIOCGVH ioctl(2) and virtio ethernet driver

2015-03-18 Thread Oleg Ginzburg
On Tuesday 17 March 2015 15:25:09 Gleb Smirnoff wrote: > On Mon, Mar 16, 2015 at 02:49:58AM +0300, Oleg Ginzburg wrote: > O> b) On FreeBSD-current r276500M CARP IP is established for some seconds, then vanishes: > In my case on r280167, all works okay, despite the carp_alloc_if warning: > > #/sb

Re: SIOCSVH, SIOCGVH ioctl(2) and virtio ethernet driver

2015-03-17 Thread Gleb Smirnoff
On Mon, Mar 16, 2015 at 02:49:58AM +0300, Oleg Ginzburg wrote: O> b) On FreeBSD-current r276500M CARP IP is established for some seconds, then O> vanishes: O> O> % /sbin/ifconfig vtnet0 vhid 1 advskew 100 pass navuhodonosor 192.168.1.210/24 O> state master alias O> % ifconfig vtnet0 O> vtnet0:

Re: SIOCSVH, SIOCGVH ioctl(2) and virtio ethernet driver

2015-03-15 Thread Oleg Ginzburg
On Monday 29 December 2014 14:18:01 Bryan Venteicher wrote: > On Fri, Dec 26, 2014 at 8:09 AM, Oleg Ginzburg wrote: > > is it possible to use the carp(4) protocol with > > vtnet(4) interfaces ( which is used, for example, in bhyve(8) ) > > Currently, the standard carp init operation causes an SIOC

Re: SIOCSVH, SIOCGVH ioctl(2) and virtio ethernet driver

2014-12-29 Thread Bryan Venteicher
On Fri, Dec 26, 2014 at 8:09 AM, Oleg Ginzburg wrote: > is it possible to use the carp(4) protocol with > vtnet(4) interfaces ( which is used, for example, in bhyve(8) ) > Currently, the standard carp init operation causes an SIOCGVH error: > > /sbin/ifconfig vtnet0 vhid 1 advskew 100 pass pass 1

SIOCSVH, SIOCGVH ioctl(2) and virtio ethernet driver

2014-12-26 Thread Oleg Ginzburg
is it possible to use the carp(4) protocol with vtnet(4) interfaces ( which is used, for example, in bhyve(8) ) Currently, the standard carp init operation causes an SIOCGVH error: /sbin/ifconfig vtnet0 vhid 1 advskew 100 pass pass 10.10.10.10/24 alias ifconfig: SIOCGVH: Protocol not supported

Re: Choice of private ioctl approach

2014-10-06 Thread Andrew Rybchenko
Hello John, On 09/30/2014 07:31 PM, John Baldwin wrote: On Monday, September 29, 2014 8:36:22 am Andrew Rybchenko wrote: Hello, we need to add private ioctl to the driver sfxge(4) to make FW update, do internal diagnostics commands etc. We see at least two approaches in other drivers: 1

Re: Choice of private ioctl approach

2014-09-30 Thread John Baldwin
On Monday, September 29, 2014 8:36:22 am Andrew Rybchenko wrote: > Hello, > > we need to add private ioctl to the driver sfxge(4) to make FW update, > do internal diagnostics commands etc. > We see at least two approaches in other drivers: > 1. SIOCGPRIVATE_0/ SIOCGPRIVATE_1 o

Choice of private ioctl approach

2014-09-29 Thread Andrew Rybchenko
Hello, we need to add private ioctl to the driver sfxge(4) to make FW update, do internal diagnostics commands etc. We see at least two approaches in other drivers: 1. SIOCGPRIVATE_0/ SIOCGPRIVATE_1 on net device 2. dedicated char device with its own ioctl's Is there any recommendatio

SIOCGI2C ioctl for NIC drivers

2014-08-16 Thread Alexander V. Chernikov
those info, but in a different way. I'd like to add SIOCGI2C as standard ioctl for that, picking value like 61, if there are no objections. ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe,

Re: kern/139565: [ipfilter] ipfilter ioctl SIOCDELST broken

2013-07-02 Thread cy
Synopsis: [ipfilter] ipfilter ioctl SIOCDELST broken Responsible-Changed-From-To: freebsd-net->cy Responsible-Changed-By: cy Responsible-Changed-When: Wed Jul 3 05:22:06 UTC 2013 Responsible-Changed-Why: Mine. http://www.freebsd.org/cgi/query-pr.cgi?pr=139

Re: kern/77195: [ipfilter] [patch] ipfilter ioctl SIOCGNATL does not match active sessions properly

2013-07-02 Thread cy
Synopsis: [ipfilter] [patch] ipfilter ioctl SIOCGNATL does not match active sessions properly Responsible-Changed-From-To: freebsd-net->cy Responsible-Changed-By: cy Responsible-Changed-When: Wed Jul 3 05:16:59 UTC 2013 Responsible-Changed-Why: Mine. http://www.freebsd.org/cgi/query-pr.cgi

Re: kern/155772: ifconfig(8): ioctl (SIOCAIFADDR): File exists on directly connected networks

2013-03-08 Thread melifaro
Synopsis: ifconfig(8): ioctl (SIOCAIFADDR): File exists on directly connected networks Responsible-Changed-From-To: freebsd-net->melifaro Responsible-Changed-By: melifaro Responsible-Changed-When: Fri Mar 8 20:45:18 UTC 2013 Responsible-Changed-Why: Take http://www.freebsd.org/cgi/query-pr.

Re: kern/159100: [ioctl] ioctl SIOCGIFCONF reports interface names which are blank

2011-07-24 Thread linimon
Old Synopsis: ioctl SIOCGIFCONF reports interface names which are blank New Synopsis: [ioctl] ioctl SIOCGIFCONF reports interface names which are blank State-Changed-From-To: open->closed State-Changed-By: linimon State-Changed-When: Mon Jul 25 02:58:18 UTC 2011 State-Changed-Why: Duplicate

Re: kern/155772: ifconfig(8): ioctl (SIOCAIFADDR): File exists on directly connected networks

2011-04-05 Thread Ingo Flaschberger
Hi, From: Nikolay Denev To: bug-follo...@freebsd.org, s...@ecom24.ru Cc: Subject: Re: kern/155772: ifconfig(8): ioctl (SIOCAIFADDR): File exists on directly connected networks Date: Tue, 5 Apr 2011 14:46:35 +0300 I'm not sure if this can be solved unless RADIX_MPATH is used. My worka

Re: kern/155772: ifconfig(8): ioctl (SIOCAIFADDR): File exists on directly connected networks

2011-04-05 Thread Nikolay Denev
The following reply was made to PR kern/155772; it has been noted by GNATS. From: Nikolay Denev To: bug-follo...@freebsd.org, s...@ecom24.ru Cc: Subject: Re: kern/155772: ifconfig(8): ioctl (SIOCAIFADDR): File exists on directly connected networks Date: Tue, 5 Apr 2011 14:46:35 +0300 I&#

Re: kern/155772: ifconfig(8): ioctl (SIOCAIFADDR): File exists on directly connected networks

2011-03-22 Thread linimon
Old Synopsis: ifconfig: ioctl (SIOCAIFADDR): File exists on directly connected networks New Synopsis: ifconfig(8): ioctl (SIOCAIFADDR): File exists on directly connected networks Responsible-Changed-From-To: freebsd-bugs->freebsd-net Responsible-Changed-By: linimon Responsible-Changed-When:

Inappropriate ioctl for device

2010-12-23 Thread Mohammad Hedayati
I'm writing a simple char device. So far everything went so good (read/write), but here I'm going to add support for ioctl. int ioctl(struct cdev *dev, u_long cmd, caddr_t data, int flags, struct thread *td) { int error = 0; uprintf("Here...\n"); retu

Re: kern/141134: [ppp] "ioctl (SIOCAIFADDR): File exists" error when configuring ppp interfaces

2009-12-04 Thread qingli
Synopsis: [ppp] "ioctl (SIOCAIFADDR): File exists" error when configuring ppp interfaces Responsible-Changed-From-To: freebsd-net->qingli Responsible-Changed-By: qingli Responsible-Changed-When: Fri Dec 4 18:05:10 UTC 2009 Responsible-Changed-Why: Take ownership of th

Re: kern/141134: [ppp] "ioctl (SIOCAIFADDR): File exists" error when configuring ppp interfaces

2009-12-03 Thread linimon
Old Synopsis: "ioctl (SIOCAIFADDR): File exists" error when configuring ppp interfaces New Synopsis: [ppp] "ioctl (SIOCAIFADDR): File exists" error when configuring ppp interfaces Responsible-Changed-From-To: freebsd-bugs->freebsd-net Responsible-Changed-By: linimon R

Re: kern/139565: [ipfilter] ipfilter ioctl SIOCDELST broken

2009-10-14 Thread linimon
Old Synopsis: ipfilter ioctl SIOCDELST broken New Synopsis: [ipfilter] ipfilter ioctl SIOCDELST broken Responsible-Changed-From-To: freebsd-bugs->freebsd-net Responsible-Changed-By: linimon Responsible-Changed-When: Thu Oct 15 01:00:16 UTC 2009 Responsible-Changed-Why: Over to maintaine

Re: SOLVED: lo0 not in ioctl( SIOCGIFCONF )

2008-07-22 Thread Brooks Davis
REQ(ifr) \ >>>>> ((ifr).ifr_addr.sa_len > sizeof(struct sockaddr) ? \ >>>>>(sizeof(struct ifreq) - sizeof(struct sockaddr) + \ >>>>> (ifr).ifr_addr.sa_len) : sizeof(struct ifreq)) >>>>> #endif >>>>> >>>>&g

Re: SOLVED: lo0 not in ioctl( SIOCGIFCONF )

2008-07-22 Thread Jens Rehsack
f(*ifr) ); do { n *= 2; ifr = realloc( ifr, sizeof(*ifr) * n ); bzero( ifr, sizeof(*ifr) * n ); ifc.ifc_req = ifr; ifc.ifc_len = n * sizeof(*ifr); } while( ( ioctl( fd, SIOCGIFCONF, &ifc ) == -1 ) || ( ifc.ifc_len == n * si

Re: lo0 not in ioctl( SIOCGIFCONF )

2008-07-21 Thread Brooks Davis
f ifc; >>> struct ifreq *ifr, *lifr; >>> int fd; >>> unsigned int n; >>> >>> fd = socket( AF_INET, SOCK_STREAM, 0 ); >>> bzero(&ifc, sizeof(ifc)); >>> n = 3; >>> ifr = calloc( ifc.ifc_len, siz

Re: lo0 not in ioctl( SIOCGIFCONF )

2008-07-21 Thread Jens Rehsack
ifr, sizeof(*ifr) * n ); bzero( ifr, sizeof(*ifr) * n ); ifc.ifc_req = ifr; ifc.ifc_len = n * sizeof(*ifr); } while( ( ioctl( fd, SIOCGIFCONF, &ifc ) == -1 ) || ( ifc.ifc_len == n * sizeof(*ifr)) ); There are several problems with this loop. First, icoctl won

Re: lo0 not in ioctl( SIOCGIFCONF )

2008-07-21 Thread Brooks Davis
int fd; > unsigned int n; > > fd = socket( AF_INET, SOCK_STREAM, 0 ); > bzero(&ifc, sizeof(ifc)); > n = 3; > ifr = calloc( ifc.ifc_len, sizeof(*ifr) ); > do > { > n *= 2; > ifr = realloc( ifr, sizeof(

Re: lo0 not in ioctl( SIOCGIFCONF )

2008-07-21 Thread Jens Rehsack
ifc.ifc_req = ifr; ifc.ifc_len = n * sizeof(*ifr); } while( ( ioctl( fd, SIOCGIFCONF, &ifc ) == -1 ) || ( ifc.ifc_len == n * sizeof(*ifr)) ); lifr = (struct ifreq *)&ifc.ifc_buf[ifc.ifc_len]; while (ifr < lifr) { printf( "%s\n", ifr->ifr_name )

Re: lo0 not in ioctl( SIOCGIFCONF )

2008-07-21 Thread Brooks Davis
> Hi, > > maybe this question is better asked in this list ... > > I was searching why ports/net/p5-Net-Interface was not working as > expected and found some reasons. Most of them I can answer by implementing > some test code as attached, but now I'm wondering why em0 is shown twice > and lo0 is

lo0 not in ioctl( SIOCGIFCONF )

2008-07-21 Thread Jens Rehsack
Hi, maybe this question is better asked in this list ... I was searching why ports/net/p5-Net-Interface was not working as expected and found some reasons. Most of them I can answer by implementing some test code as attached, but now I'm wondering why em0 is shown twice and lo0 is not included.

Re: Generic ioctl and ether_ioctl don't agree

2007-03-15 Thread Yar Tikhiy
On Wed, Mar 14, 2007 at 10:01:38AM -0500, Brooks Davis wrote: > On Wed, Mar 14, 2007 at 01:20:23PM +0300, Yar Tikhiy wrote: > > Hi folks, > > > > Quite a while ago I noticed that our ioctl handlers get the ioctl > > command via u_long, but ether_ioctl()'s c

Re: Generic ioctl and ether_ioctl don't agree

2007-03-15 Thread Yar Tikhiy
On Wed, Mar 14, 2007 at 12:50:12PM +, Bruce M. Simpson wrote: > Yar Tikhiy wrote: > >Hi folks, > > > >Quite a while ago I noticed that our ioctl handlers get the ioctl > >command via u_long, but ether_ioctl()'s command argument is int. > >This disarray da

Re: Generic ioctl and ether_ioctl don't agree

2007-03-14 Thread Brooks Davis
On Wed, Mar 14, 2007 at 01:20:23PM +0300, Yar Tikhiy wrote: > Hi folks, > > Quite a while ago I noticed that our ioctl handlers get the ioctl > command via u_long, but ether_ioctl()'s command argument is int. > This disarray dates back to 1998, when ioctl functions started to

Re: Generic ioctl and ether_ioctl don't agree

2007-03-14 Thread Bruce M. Simpson
Yar Tikhiy wrote: Hi folks, Quite a while ago I noticed that our ioctl handlers get the ioctl command via u_long, but ether_ioctl()'s command argument is int. This disarray dates back to 1998, when ioctl functions started to take u_long as the command, but ether_ioctl() was never

Generic ioctl and ether_ioctl don't agree

2007-03-14 Thread Yar Tikhiy
Hi folks, Quite a while ago I noticed that our ioctl handlers get the ioctl command via u_long, but ether_ioctl()'s command argument is int. This disarray dates back to 1998, when ioctl functions started to take u_long as the command, but ether_ioctl() was never fixed. Fortunately, our

Re: [PATCH] Re: ioctl: SIOCADDMULTI (howto?)

2007-02-24 Thread Bruce M. Simpson
I have now added a regression test for this bug in HEAD, under src/tools/regression/ethernet/ethermulti. BMS ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send any mail to "[EMAIL PROTECT

Re: [PATCH] Re: ioctl: SIOCADDMULTI (howto?)

2007-02-24 Thread Jouke Witteveen
On 2/17/07, Bruce M. Simpson <[EMAIL PROTECTED]> wrote: Jouke Witteveen wrote: > > So my apologies for suggesting it doesn't work at all; it seems that > the application I'm trying to get to work (wpa_supplicant for wired > interfaces) just doesn't _send_ its packets the right way. That's a big r

Re: ioctl: SIOCADDMULTI (howto?)

2007-02-20 Thread Bruce M. Simpson
Jouke Witteveen wrote: I hope someone can find a spare minute to look at if_findmulti. It would help me quite much. I verified with mtest that FreeBSD cannot delete an AF_LINK multicast membership, reproduced with both 7-CURRENT and 6.2-RELEASE. if_findmulti() appears to be doing a possibly i

Re: ioctl: SIOCADDMULTI (howto?)

2007-02-20 Thread Bruce M. Simpson
Here is a better patch for the netstat output. I haven't had time to look at the kernel yet. If this patch is good for you I'll commit it on -CURRENT. It cleans up the group membership output significantly and displays the Link-layer information separately. If anyone 'out there' has been rel

[PATCH] Re: ioctl: SIOCADDMULTI (howto?)

2007-02-17 Thread Bruce M. Simpson
Jouke Witteveen wrote: So my apologies for suggesting it doesn't work at all; it seems that the application I'm trying to get to work (wpa_supplicant for wired interfaces) just doesn't _send_ its packets the right way. That's a big relief! I added an item to the Wiki for someone to write a regr

Re: ioctl: SIOCADDMULTI (howto?)

2007-02-17 Thread Jouke Witteveen
CDELMULTI rn it appears nothing was added: > ENOENT), At least not for the values I tested, 1.80.c2.0.0.1 in > particular. I presume it doesn't work because the program has not been > revised in 3 years and revision 1.4 notes that it might not work. > If this ioctl is depricated then

Re: ioctl: SIOCADDMULTI (howto?)

2007-02-05 Thread Bruce M. Simpson
sted, 1.80.c2.0.0.1 in particular. I presume it doesn't work because the program has not been revised in 3 years and revision 1.4 notes that it might not work. If this ioctl is depricated then please tell me what is the best way to receive multicast messages from the 01.80.c2.00.00.0x (802.

ioctl: SIOCADDMULTI (howto?)

2007-02-05 Thread Jouke Witteveen
ticular. I presume it doesn't work because the program has not been revised in 3 years and revision 1.4 notes that it might not work. If this ioctl is depricated then please tell me what is the best way to receive multicast messages from the 01.80.c2.00.00.0x (802.1) range? It is ofcourse poss

Re: iwi driver: ioctl[SIOCS80211, op 21, len 42]: Invalid argument

2006-09-20 Thread Vladimir Grebenschikov
supplicant.conf > > Trying to associate with SSID 'OFFICE-PEAP' > > ioctl[SIOCS80211, op 21, len 42]: Invalid argument > > Association request to the driver failed > > ... > > "op 21" is the request to associate. The error most likely indicates > t

Re: iwi driver: ioctl[SIOCS80211, op 21, len 42]: Invalid argument

2006-09-19 Thread Sam Leffler
Vladimir Grebenschikov wrote: > Hi > > i am triing to connect Intel(R) PRO/Wireless 2200BG - iwi0 to WPA-EAP > wireless network with PEAP: > > # wpa_supplicant -i iwi0 -c /usr/local/etc/wpa_supplicant.conf > Trying to associate with SSID 'OFFICE-PEAP' > ioctl[S

Re: iwi driver: ioctl[SIOCS80211, op 21, len 42]: Invalid argument

2006-09-19 Thread Max Laier
On Tuesday 19 September 2006 10:34, Vladimir Grebenschikov wrote: > i am triing to connect Intel(R) PRO/Wireless 2200BG - iwi0 to WPA-EAP > wireless network with PEAP: > > # wpa_supplicant -i iwi0 -c /usr/local/etc/wpa_supplicant.conf > Trying to associate with SSID '

iwi driver: ioctl[SIOCS80211, op 21, len 42]: Invalid argument

2006-09-19 Thread Vladimir Grebenschikov
Hi i am triing to connect Intel(R) PRO/Wireless 2200BG - iwi0 to WPA-EAP wireless network with PEAP: # wpa_supplicant -i iwi0 -c /usr/local/etc/wpa_supplicant.conf Trying to associate with SSID 'OFFICE-PEAP' ioctl[SIOCS80211, op 21, len 42]: Invalid argument Association request to

ioctl(SIOCAIFADDR, 85.195.153.121 -> 82.198.6.19): File exists

2006-08-01 Thread Andrey Smagin
! Jul 30 12:22:35 sputnik ppp[1120]: Phase: deflink: IPV6CP protocol reject closes IPV6CP ! Jul 30 12:22:38 sputnik ppp[1120]: Warning: iface add: ioctl(SIOCAIFADDR, 85.195.153.121 -> 82.198.6.19): File exists Jul 30 12:22:38 sputnik ppp[1120]: Error: ipcp_InterfaceUp: unable to set ip address Jul

sa_len of 0 in ioctl paths, etc. and bogus routes

2006-04-09 Thread Bjoern A. Zeeb
you? ! ! We should probably catch a sa_len of 0 as early as possible in ioctl paths ! too (suggested by gnn). ! Index: route.c === RCS file: /shared/mirror/FreeBSD/r/ncvs/src/sys/net/route.c,v retrieving revision 1.114

BIOCSSEESENT ioctl not honoured for single-mbuf packets

2005-08-31 Thread Ed Maste
A coworker of mine discovered a bug in bpf with BIOCSEESENT. In sys/net/bpf.c, bpf_mtap() does if (pktlen == m->m_len) { bpf_tap(bp, mtod(m, u_char *), pktlen); return; } BPFIF_LOCK(bp); LIST_FOREACH(d, &bp->bif_dlist, bd_next) {

ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

2004-10-10 Thread Wilson Hernandez
= COM2 now this happens both on PCI and ISA I figured with ISA it would be different.. ) router# /etc/ppp/pppserv ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address ?Connection on /dev/cuaa0 is not open. ?Connection on /dev/cuaa0 is not open. ?Connection on /dev/cuaa0 is no

Re: [tcpdump-workers] [PATCH] Add ioctl to disable bpf timestamping

2004-09-25 Thread Guy Harris
Matthew Luckie wrote: The motivation for this patch was to obtain something resembling the timestamp closest to when a packet I generated and transmitted hit the wire, to infer a more accurate RTT with an associated response packet. That's certainly a worthy goal, but the patch might not help muc

Re: [tcpdump-workers] [PATCH] Add ioctl to disable bpf timestamping

2004-09-25 Thread Matthew Luckie
This is probably a pointless optimization, as you probably relatively rarely have multiple BPF devices bound to the same interface receiving the bulk of the packets (as opposed to some daemon with a filter that passes only the packets it's interested in), but would there be any advantage to hav

Re: [tcpdump-workers] [PATCH] Add ioctl to disable bpf timestamping

2004-09-25 Thread Darren Reed
In some email I received from Guy Harris, sie wrote: > On Sep 8, 2004, at 2:26 AM, Bruce M Simpson wrote: > > > Here's a patch against 5.3 to add a per-instance switch which allows > > the user to specify if captured packets should be timestamped (and, > > if so, whether microtime() or the faster

Re: [tcpdump-workers] [PATCH] Add ioctl to disable bpf timestamping

2004-09-08 Thread Guy Harris
(Noise to defeat the duplicate-message detector for [EMAIL PROTECTED]) Guy Harris wrote: This is probably a pointless optimization, "This" referring not to Bruce's proposed change, but to my proposed change to have one time stamp call per packet. ___ [

Re: [tcpdump-workers] [PATCH] Add ioctl to disable bpf timestamping

2004-09-08 Thread Guy Harris
Guy Harris wrote: This is probably a pointless optimization, "This" referring not to your change, but to having one time stamp call per packet. ___ [EMAIL PROTECTED] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send

RE: [PATCH] Add ioctl to disable bpf timestamping

2004-09-08 Thread Ed Maste
>From Bruce's patch: + if (d->bd_tstamp == BPF_TSTAMP_MICROTIME) + microtime(&hp->bh_tstamp); + else if (d->bd_tstamp == BPF_TSTAMP_GETMICROTIME) + getmicrotime(&hp->bh_tstamp); Perhaps set the timestamp to zero in the else case? Ed Maste Sandvine Inc. ___

RE: [PATCH] Add ioctl to disable bpf timestamping

2004-09-08 Thread Ed Maste
es to libpcap and/or tcpdump, > and would work with any application. I think an ioctl is the right way to do it, since you could have multiple BPF listeners with different requirements. For example, realtime inspection like Snort may not care about timestamps while manual inspection with tcpdump

Re: [tcpdump-workers] [PATCH] Add ioctl to disable bpf timestamping

2004-09-08 Thread Guy Harris
On Sep 8, 2004, at 2:26 AM, Bruce M Simpson wrote: Here's a patch against 5.3 to add a per-instance switch which allows the user to specify if captured packets should be timestamped (and, if so, whether microtime() or the faster but less accurate getmicrotime() call should be used). This is probabl

  1   2   >