etwork configuration.
>
> Summary of the issue:
> Under certain conditions, the system attempts to send TCP packets larger than
> 9 KB through a netgraph-based tunnel with MTU 1472, even though MSS was
> negotiated to 1400.
>
> This happens when the initial route is
Hello,
I hope my netgraph (understanding) issue/question fits to net@.
My issue:
I'm observing VLAN tagged frames reading VID=0 when received inside a
bhyve(8) VM, while they (correctly) read VID=77 at ng_eiface(4)
ng_bridge(4) members.
Narrowed down to be a netgraph(4) problem:
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=283702
Mark Johnston changed:
What|Removed |Added
CC||ma...@freebsd.org
--- Comment #4 f
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=237072
Mark Linimon changed:
What|Removed |Added
Resolution|--- |Overcome By Events
Stat
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=283702
Philip Paeps changed:
What|Removed |Added
Assignee|sect...@freebsd.org |n...@freebsd.org
Severity
W dniu 16.10.2024 o 16:19, Palle Girgensohn pisze:
Hi!
Using FreeBSD-14.1, I have a rather simple setup with jails using
netgraph (using the `/usr/share/examples/jails/jng` script and "model").
(...)
I assume I'm doing some simple mistake here, but find very little
informatio
4 Try: sysctl net.link.bridge.pfil_member=0 sysctl net.link.bridge.pfil_bridge=1 Although I do not know if this ablies to netgraph or to if_bridge(4) only. But obviously your rules are not applied to the bridge interface. The default of the tunables above is the other way round - don't filter on bridge inter
do not relate to
> netgraph bridges?
>
> Any idea what tuneables would do the job?
Nope, that was just a guess, because I know that these tunables are necessary
for if_bridge and nobody else answered.
I never used netgraph.
Kind regards,
Patrick
d I can just telnet 1.2.3.4
>
> Try:
>
> sysctl net.link.bridge.pfil_member=0
> sysctl net.link.bridge.pfil_bridge=1
>
> Although I do not know if this ablies to netgraph or to if_bridge(4) only.
>
> But obviously your rules are not applied to the bridge interf
.bridge.pfil_bridge=1
Although I do not know if this ablies to netgraph or to if_bridge(4) only.
But obviously your rules are not applied to the bridge interface. The default
of the tunables above is the other way round - don't filter on bridge
interfaces.
HTH,
Patrick
--
punkt.de GmbH
Patrick
Hi!
Using FreeBSD-14.1, I have a rather simple setup with jails using netgraph
(using the `/usr/share/examples/jails/jng` script and "model").
The host machine has two interfaces:
bnxt0: (external, has no IP#)
bnxt1: 192.168.1.79/24
jail.conf:
--
host.hostname = "$name.ex
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=223824
Mark Linimon changed:
What|Removed |Added
Flags|mfc-stable13? |
--- Comment #9 from Mark Linimon
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=249327
Mark Linimon changed:
What|Removed |Added
Status|Open|Closed
Resolution|---
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=237072
Mark Linimon changed:
What|Removed |Added
Flags|mfc-stable12?, |
|mfc-stable11?
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=223824
Mark Linimon changed:
What|Removed |Added
Flags|mfc-stable11-, |
|mfc-stable10-
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=187835
Vladyslav V. Prodan changed:
What|Removed |Added
Status|New |Closed
Resolution|--
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=187835
--- Comment #22 from Vladyslav V. Prodan ---
(In reply to Vladyslav V. Prodan from comment #21)
```
# ifconfig |grep ngeth|wc -l
3003
```
--
You are receiving this mail because:
You are the assignee for the bug.
You are on the CC lis
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=187835
Vladyslav V. Prodan changed:
What|Removed |Added
Status|Closed |New
Resolution|FIXED
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=278130
Gleb Smirnoff changed:
What|Removed |Added
Assignee|n...@freebsd.org |gleb...@freebsd.org
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=278130
--- Comment #2 from David Marker ---
Added review D44615 as requested.
--
You are receiving this mail because:
You are the assignee for the bug.
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=278130
Mark Linimon changed:
What|Removed |Added
Assignee|b...@freebsd.org|n...@freebsd.org
--
You are receiv
y performant these days
https://issue.freebsdfoundation.org/publication/?i=660151
Benoit
> Le sam. 25 nov. 2023 à 00:33, Jim Thompson nov. 2023 à 00:33, Jim Thompson <> a écrit :
>
>
>
> On Nov 24, 2023 at 12:48:07 AM, Benoit Chesneau <
> beno...@enki-multimedia.eu&g
00:33, Jim Thompson <[j...@netgate.com](mailto:Le sam.
25 nov. 2023 à 00:33, Jim Thompson < a écrit :
> On Nov 24, 2023 at 12:48:07 AM, Benoit Chesneau
> wrote:
>
>> netgraph and vpp looks similar in their intent. Both are graphs to process
>> packets.
>>
On Nov 24, 2023 at 12:48:07 AM, Benoit Chesneau
wrote:
> netgraph and vpp looks similar in their intent. Both are graphs to
> process packets.
>
> I thought that usinv netgraph sounds interresting to build a modern
> router or cpe. What about the perforance? Did anyone compRe
netgraph and vpp looks similar in their intent. Both are graphs to process
packets.
I thought that usinv netgraph sounds interresting to build a modern router or
cpe. What about the perforance? Did anyone compRe? Also is there any difference
in term of implementation of the processing? Id
On 10/8/23 11:00, Benoit Chesneau wrote:
Before I am doing some performance tests myself, did someone comparend
netgraph ng_bridge vs if_bridge with recent multi thread additions in
netgraph ?
The advantage I see in using netgraph is remooving the need of using
tap interfaces and instead
Before I am doing some performance tests myself, did someone comparend netgraph
ng_bridge vs if_bridge with recent multi thread additions in netgraph ?
The advantage I see in using netgraph is remooving the need of using tap
interfaces and instead using netgraph sockets. Which seems to be more
I may be wrong but xdp linux looks a lot like netgraph. Packets are processed
at kernel level and we can chain instructions over them. Is there any
comparison of their features around?
|ng_base.c (netgraph)|(netgraph)
Flags||mfc-stable13?
--
You are receiving this mail because:
You are the assignee for the bug.
The drawback of this solution is using patched sources and having
duplicated packets for vlan1000 inside the jail, but the desired state is:
vlan 1499 *--> epair0
vlan 1000 <--> epair0
Any suggestions on how to make it work with netgraph(3) will be warmly
appreciated.
[1]
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=270083
Mark Linimon changed:
What|Removed |Added
CC|n...@freebsd.org |
Assignee|b...@freebsd.o
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=270083
Marek Zarychta changed:
What|Removed |Added
CC||n...@freebsd.org
--- Comment #1 f
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=237072
Graham Perrin changed:
What|Removed |Added
See Also|https://github.com/Hardened |
|BSD/hardenedBS
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=246706
Kubilay Kocak changed:
What|Removed |Added
Keywords||crash
--
You are receiving this m
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=246706
Graham Perrin changed:
What|Removed |Added
CC||grahamper...@freebsd.org
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=246706
Eugene Grosbein changed:
What|Removed |Added
Resolution|--- |Overcome By Events
S
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=255872
Takanori Watanabe changed:
What|Removed |Added
Flags|mfc-stable12?, |mfc-stable12+,
picked from commit 14803ec8d193d8d46f4137a7dba61b277c6a2fed)
sys/netgraph/bluetooth/hci/ng_hci_evnt.c | 1 +
1 file changed, 1 insertion(+)
--
You are receiving this mail because:
You are on the CC list for the bug.
picked from commit 14803ec8d193d8d46f4137a7dba61b277c6a2fed)
sys/netgraph/bluetooth/hci/ng_hci_evnt.c | 1 +
1 file changed, 1 insertion(+)
--
You are receiving this mail because:
You are on the CC list for the bug.
Author: Lutz Donnerhacke
AuthorDate: 2021-06-02 22:29:46 +
Commit: Lutz Donnerhacke
CommitDate: 2021-06-16 11:48:22 +
tests/netgraph: Inital framework for testing libnetgraph
Provide a framework of functions to test various netgraph modules.
Tests contain:
- creating
Author: Lutz Donnerhacke
AuthorDate: 2021-06-02 22:29:46 +
Commit: Lutz Donnerhacke
CommitDate: 2021-06-16 11:44:15 +
tests/netgraph: Inital framework for testing libnetgraph
Provide a framework of functions to test various netgraph modules.
Tests contain:
- creating
: Lutz Donnerhacke
AuthorDate: 2021-06-02 22:29:46 +
Commit: Lutz Donnerhacke
CommitDate: 2021-06-15 12:31:32 +
tests/netgraph: Inital framework for testing libnetgraph
Provide a framework of functions to test various netgraph modules.
Tests contain:
- creating
: Lutz Donnerhacke
AuthorDate: 2021-05-04 19:20:39 +
Commit: Lutz Donnerhacke
CommitDate: 2021-06-10 09:35:21 +
netgraph/ng_base: Renaming a node to the same name is a noop
Detailed analysis in
https://github.com/genneko/freebsd-vimage-jails/issues/2
brought the
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=241954
Lutz Donnerhacke changed:
What|Removed |Added
Flags|mfc-stable13?, |mfc-stable13+,
: Lutz Donnerhacke
AuthorDate: 2021-05-04 19:20:39 +
Commit: Lutz Donnerhacke
CommitDate: 2021-06-10 09:33:19 +
netgraph/ng_base: Renaming a node to the same name is a noop
Detailed analysis in
https://github.com/genneko/freebsd-vimage-jails/issues/2
brought the
: Lutz Donnerhacke
AuthorDate: 2021-05-04 19:20:39 +
Commit: Lutz Donnerhacke
CommitDate: 2021-06-10 09:29:34 +
netgraph/ng_base: Renaming a node to the same name is a noop
Detailed analysis in
https://github.com/genneko/freebsd-vimage-jails/issues/2
brought the
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=255872
Kubilay Kocak changed:
What|Removed |Added
CC||m...@johnson.org
Keyword
picked from commit 14803ec8d193d8d46f4137a7dba61b277c6a2fed)
sys/netgraph/bluetooth/hci/ng_hci_evnt.c | 1 +
1 file changed, 1 insertion(+)
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=241954
Kubilay Kocak changed:
What|Removed |Added
Summary|netgraph fails on |netgraph: Fails on
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=241954
Lutz Donnerhacke changed:
What|Removed |Added
Flags||mfc-stable13?,
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=241954
Lutz Donnerhacke changed:
What|Removed |Added
Resolution|--- |FIXED
Status|In Pro
: Lutz Donnerhacke
AuthorDate: 2021-05-04 19:20:39 +
Commit: Lutz Donnerhacke
CommitDate: 2021-06-04 09:20:19 +
netgraph/ng_base: Renaming a node to the same name is a noop
Detailed analysis in
https://github.com/genneko/freebsd-vimage-jails/issues/2
brought the problem
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=255872
Ed Maste changed:
What|Removed |Added
CC||ema...@freebsd.org
--- Comment #4 from
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=255872
Takanori Watanabe changed:
What|Removed |Added
Status|Open|Closed
CC|
: Takanori Watanabe
AuthorDate: 2021-05-26 09:23:33 +
Commit: Takanori Watanabe
CommitDate: 2021-05-26 09:23:33 +
Fix a use-after-free in an error case.
PR: 255872
Submitted by: lylgood
Differential Revision: https://reviews.freebsd.org/D30454
sys/netgraph
Summary|[PATCH] |netgraph/bluetooth/hci: Fix
|netgraph/bluetooth/hci: Fix |a use after free in
|a use after free in |le_connection_complete
|le_connection_complete |
--
You are receiving this mail
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=255872
Rodney W. Grimes changed:
What|Removed |Added
CC||n...@freebsd.org
--
You are re
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=255872
Mark Johnston changed:
What|Removed |Added
CC||ma...@freebsd.org
Stat
+,
||mfc-stable12+,
||mfc-stable11+
URL||https://reviews.freebsd.org
||/D30273
Summary|[PATCH] netgraph: Fix a |netgraph
: Lutz Donnerhacke
AuthorDate: 2021-05-15 09:32:57 +
Commit: Lutz Donnerhacke
CommitDate: 2021-05-23 13:01:34 +
netgraph/ng_checksum: Fix double free error
m_pullup(9) frees the mbuf(9) chain in the case of an allocation error.
The mbuf chain must not be freed again
: Lutz Donnerhacke
AuthorDate: 2021-05-15 09:32:57 +
Commit: Lutz Donnerhacke
CommitDate: 2021-05-23 12:59:28 +
netgraph/ng_checksum: Fix double free error
m_pullup(9) frees the mbuf(9) chain in the case of an allocation error.
The mbuf chain must not be freed again
: Lutz Donnerhacke
AuthorDate: 2021-05-15 09:32:57 +
Commit: Lutz Donnerhacke
CommitDate: 2021-05-23 12:55:20 +
netgraph/ng_checksum: Fix double free error
m_pullup(9) frees the mbuf(9) chain in the case of an allocation error.
The mbuf chain must not be freed again
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=255874
Lutz Donnerhacke changed:
What|Removed |Added
Resolution|--- |FIXED
Status|In Pro
: Lutz Donnerhacke
AuthorDate: 2021-05-15 09:32:57 +
Commit: Lutz Donnerhacke
CommitDate: 2021-05-16 17:39:51 +
netgraph/ng_checksum: Fix double free error
m_pullup(9) frees the mbuf(9) chain in the case of an allocation error.
The mbuf chain must not be freed again in
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=246706
Lutz Donnerhacke changed:
What|Removed |Added
Status|New |Open
--- Comment #1 from Lutz D
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=255874
Lutz Donnerhacke changed:
What|Removed |Added
Status|Open|In Progress
--- Comment #1 from
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=255874
Lutz Donnerhacke changed:
What|Removed |Added
Status|New |Open
Keywords|
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=255874
Mark Linimon changed:
What|Removed |Added
Assignee|b...@freebsd.org|n...@freebsd.org
--
You are receiv
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=255872
Mark Linimon changed:
What|Removed |Added
Assignee|b...@freebsd.org|n...@freebsd.org
--
You are receiv
Author: Lutz Donnerhacke
AuthorDate: 2021-02-07 21:07:34 +
Commit: Lutz Donnerhacke
CommitDate: 2021-05-09 13:25:05 +
netgraph/ng_base: Allow larger BINARY2ASCII conversions
Allocate the necessary memory for the conversion dynamically starting
with a value which is
Author: Lutz Donnerhacke
AuthorDate: 2021-02-07 21:07:34 +
Commit: Lutz Donnerhacke
CommitDate: 2021-05-09 13:23:19 +
netgraph/ng_base: Allow larger BINARY2ASCII conversions
Allocate the necessary memory for the conversion dynamically starting
with a value which is
Author: Lutz Donnerhacke
AuthorDate: 2021-02-07 21:07:34 +
Commit: Lutz Donnerhacke
CommitDate: 2021-05-09 13:20:48 +
netgraph/ng_base: Allow larger BINARY2ASCII conversions
Allocate the necessary memory for the conversion dynamically starting
with a value which is
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=241954
Lutz Donnerhacke changed:
What|Removed |Added
Status|Open|In Progress
--- Comment #3 from
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=241954
--- Comment #2 from Lutz Donnerhacke ---
https://github.com/genneko/freebsd-vimage-jails/issues/2 describes the problem
in detail: ng_name_node() is called twice and does not recognize the rename to
the identical name. This might be solvabl
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=241954
Lutz Donnerhacke changed:
What|Removed |Added
Status|New |Open
CC|
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=243833
Neel Chauhan changed:
What|Removed |Added
Status|New |Closed
Resolution|---
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=241954
--- Comment #1 from Kurt Jaeger ---
See also:
https://github.com/genneko/freebsd-vimage-jails/issues/2
--
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-net@
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=243829
Neel Chauhan changed:
What|Removed |Added
Resolution|--- |FIXED
Status|New
: Lutz Donnerhacke
AuthorDate: 2021-01-17 20:35:28 +
Commit: Lutz Donnerhacke
CommitDate: 2021-02-16 08:25:59 +
netgraph/ng_source: Allow ng_source to inject into any netgraph network
PR: 240530
Reviewed by:kp
Differential Revision: https
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=187835
Lutz Donnerhacke changed:
What|Removed |Added
Status|Open|Closed
Resolution|---
: Lutz Donnerhacke
AuthorDate: 2021-02-07 21:07:34 +
Commit: Lutz Donnerhacke
CommitDate: 2021-02-08 13:31:58 +
netgraph/ng_base: Allow larger BINARY2ASCII conversions
Allocate the necessary memory for the conversion dynamically starting
with a value which is sufficient
If you like to understand your network, try:
# ngctl dot [-c]
and paste the output to http://www.webgraphviz.com/
I used it when was building the graph :)
On 2/6/21 11:48 AM, Lutz Donnerhacke wrote:
On Sat, Feb 06, 2021 at 11:10:29AM -0500, petru garstea wrote:
Greetings,
I have come up with
nding on the direction). Even ng_one2many or
ng_hub might be a better solution.
If you only need the eiface to attach tcpdump, you can omit it completely,
because tcpdump is able to sniff on the fxp0 even if the netgraph hooks are
set.
___
freebs
On Sat, Feb 06, 2021 at 11:10:29AM -0500, petru garstea wrote:
> Greetings,
>
> I have come up with a graph with no use of ng_tee, ng_hub or ng_one2many.
>
> Also I validated the flows on a collector
>
> In case anybody has the same use case I am sharing the graph
>
> mkpeer re0: netflow lower ifac
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=240685
Lutz Donnerhacke changed:
What|Removed |Added
Status|New |Closed
Resolution|---
can omit it completely,
because tcpdump is able to sniff on the fxp0 even if the netgraph hooks are
set.
___
freebsd-net@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"
On Tue, Feb 02, 2021 at 10:05:15AM -0500, petru garstea wrote:
> Hi,
>
> I need help to unify 2 netgraphs
>
> 1st ng_bridge netgraph
>
> ngctl mkpeer fxp0: bridge lower link0
> ngctl connect fxp0: em0:lower upper link1
> ngctl name fxp0:lower em0Bridge
> ngctl mkpeer
Hi,
I need help to unify 2 netgraphs
1st ng_bridge netgraph
ngctl mkpeer fxp0: bridge lower link0
ngctl connect fxp0: em0:lower upper link1
ngctl name fxp0:lower em0Bridge
ngctl mkpeer fxp0:lower eiface link3 ether
2nd ng_netflow netgraph
mkpeer fxp0: netflowlower iface0
name fxp0:lower
: Lutz Donnerhacke
AuthorDate: 2021-01-02 13:58:17 +
Commit: Lutz Donnerhacke
CommitDate: 2021-02-01 14:07:31 +
netgraph/ng_tag: permit variable length data
ng_tag(4) operate on arbitrary data of mbuf_tags(9). Those structures
are padded to the next multiple of the
: Lutz Donnerhacke
AuthorDate: 2021-01-02 13:58:17 +
Commit: Lutz Donnerhacke
CommitDate: 2021-02-01 13:55:42 +
netgraph/ng_tag: permit variable length data
ng_tag(4) operate on arbitrary data of mbuf_tags(9). Those structures
are padded to the next multiple of the
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=249327
Kubilay Kocak changed:
What|Removed |Added
Severity|Affects Only Me |Affects Some People
Keyw
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=249327
Bjoern A. Zeeb changed:
What|Removed |Added
Status|New |Open
--- Comment #3 from Bjoern A
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=249327
--- Comment #2 from Markus Stoff ---
The proposed fix has been approved in review D26489.
--
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-net@freebsd.org ma
I am having a problem monitoring network stats on jails on a host.
Scenario:
One host, FreeBSD 12.1, with a small number of vnet jails.
I'm using netgraph to bridge two or more VLANs from physical NICs into
each jail - so each jail has at least 2 ngether interfaces which are the
only NI
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=249327
--- Comment #1 from Markus Stoff ---
See also review D26489.
--
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-net@freebsd.org mailing list
https://lists.free
Summary|IP address parsing in |fix IP address parsing in
|netgraph eats to many |netgraph eating too many
|characters |characters
--
You are receiving this mail because:
You are the assignee for the bug
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=249275
Markus Stoff changed:
What|Removed |Added
Resolution|--- |Overcome By Events
Stat
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=249275
--- Comment #1 from Markus Stoff ---
Please let me also have your thoughts at review D26420.
--
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-net@freebsd.org
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=249275
Mark Linimon changed:
What|Removed |Added
Assignee|b...@freebsd.org|n...@freebsd.org
--
You are receiv
hi!
On Fri, 3 Jul 2020 at 20:12, Neel Chauhan wrote:
> Hi freebsd-hackers@, freebsd-net@,
>
> These two patches that will be described are a continuation of r357092.
>
> r357092 added support for RFC 6598/Carrier Grade NAT (subnet:
> 100.64.0.0/10) in libalias and IPFW in-kernel NAT.
>
> These t
1 - 100 of 1584 matches
Mail list logo