Re: TCP sends 9KB segments via netgraph tunnel despite MTU/MSS — TSO-related?

2025-05-14 Thread Konstantin Belousov
etwork configuration. > > Summary of the issue: > Under certain conditions, the system attempts to send TCP packets larger than > 9 KB through a netgraph-based tunnel with MTU 1472, even though MSS was > negotiated to 1400. > > This happens when the initial route is

Rewritten VLAN tag at ng_ether(4) and ng_socket(4) as bhyve(8) netgraph backend

2025-03-29 Thread Harry Schmalzbauer
Hello, I hope my netgraph (understanding) issue/question fits to net@. My issue: I'm observing VLAN tagged frames reading VID=0 when received inside a bhyve(8) VM, while they (correctly) read VID=77 at ng_eiface(4) ng_bridge(4) members. Narrowed down to be a netgraph(4) problem:

[Bug 283702] Out-of-bounds read in Netgraph parsing of binary Netgraph packets

2025-02-28 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=283702 Mark Johnston changed: What|Removed |Added CC||ma...@freebsd.org --- Comment #4 f

[Bug 237072] netgraph(4): performance issue [on HardenedBSD]?

2025-01-24 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=237072 Mark Linimon changed: What|Removed |Added Resolution|--- |Overcome By Events Stat

[Bug 283702] Out-of-bounds read in Netgraph parsing of binary Netgraph packets

2024-12-28 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=283702 Philip Paeps changed: What|Removed |Added Assignee|sect...@freebsd.org |n...@freebsd.org Severity

Re: pf for netgraph jails?

2024-10-31 Thread Marek Zarychta
W dniu 16.10.2024 o 16:19, Palle Girgensohn pisze: Hi! Using FreeBSD-14.1, I have a rather simple setup with jails using netgraph (using the `/usr/share/examples/jails/jng` script and "model"). (...) I assume I'm doing some simple mistake here, but find very little informatio

Re: pf for netgraph jails?

2024-10-31 Thread Aleksandr Fedorov
4   Try:  sysctl net.link.bridge.pfil_member=0 sysctl net.link.bridge.pfil_bridge=1  Although I do not know if this ablies to netgraph or to if_bridge(4) only.  But obviously your rules are not applied to the bridge interface. The default of the tunables above is the other way round - don't filter on bridge inter

Re: pf for netgraph jails?

2024-10-31 Thread Patrick M. Hausen
do not relate to > netgraph bridges? > > Any idea what tuneables would do the job? Nope, that was just a guess, because I know that these tunables are necessary for if_bridge and nobody else answered. I never used netgraph. Kind regards, Patrick

Re: pf for netgraph jails?

2024-10-31 Thread Palle Girgensohn
d I can just telnet 1.2.3.4 > > Try: > > sysctl net.link.bridge.pfil_member=0 > sysctl net.link.bridge.pfil_bridge=1 > > Although I do not know if this ablies to netgraph or to if_bridge(4) only. > > But obviously your rules are not applied to the bridge interf

Re: pf for netgraph jails?

2024-10-16 Thread Patrick M. Hausen
.bridge.pfil_bridge=1 Although I do not know if this ablies to netgraph or to if_bridge(4) only. But obviously your rules are not applied to the bridge interface. The default of the tunables above is the other way round - don't filter on bridge interfaces. HTH, Patrick -- punkt.de GmbH Patrick

pf for netgraph jails?

2024-10-16 Thread Palle Girgensohn
Hi! Using FreeBSD-14.1, I have a rather simple setup with jails using netgraph (using the `/usr/share/examples/jails/jng` script and "model"). The host machine has two interfaces: bnxt0: (external, has no IP#) bnxt1: 192.168.1.79/24 jail.conf: -- host.hostname = "$name.ex

[Bug 223824] Panic in ng_base.c (netgraph)

2024-10-07 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=223824 Mark Linimon changed: What|Removed |Added Flags|mfc-stable13? | --- Comment #9 from Mark Linimon

[Bug 249327] fix IP address parsing in netgraph eating too many characters

2024-10-04 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=249327 Mark Linimon changed: What|Removed |Added Status|Open|Closed Resolution|---

[Bug 237072] netgraph(4): performance issue [on HardenedBSD]?

2024-10-02 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=237072 Mark Linimon changed: What|Removed |Added Flags|mfc-stable12?, | |mfc-stable11?

[Bug 223824] Panic in ng_base.c (netgraph)

2024-07-31 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=223824 Mark Linimon changed: What|Removed |Added Flags|mfc-stable11-, | |mfc-stable10-

[Bug 187835] ngctl(8) strange behavior when adding more than 530 vlan through netgraph

2024-07-29 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=187835 Vladyslav V. Prodan changed: What|Removed |Added Status|New |Closed Resolution|--

[Bug 187835] ngctl(8) strange behavior when adding more than 530 vlan through netgraph

2024-07-25 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=187835 --- Comment #22 from Vladyslav V. Prodan --- (In reply to Vladyslav V. Prodan from comment #21) ``` # ifconfig |grep ngeth|wc -l 3003 ``` -- You are receiving this mail because: You are the assignee for the bug. You are on the CC lis

[Bug 187835] ngctl(8) strange behavior when adding more than 530 vlan through netgraph

2024-07-25 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=187835 Vladyslav V. Prodan changed: What|Removed |Added Status|Closed |New Resolution|FIXED

[Bug 278130] [netgraph][patch] ng_bridge hooks should auto assign number for [up]link

2024-04-03 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=278130 Gleb Smirnoff changed: What|Removed |Added Assignee|n...@freebsd.org |gleb...@freebsd.org

[Bug 278130] [netgraph][patch] ng_bridge hooks should auto assign number for [up]link

2024-04-03 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=278130 --- Comment #2 from David Marker --- Added review D44615 as requested. -- You are receiving this mail because: You are the assignee for the bug.

[Bug 278130] [netgraph][patch] ng_bridge hooks should auto assign number for [up]link

2024-04-03 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=278130 Mark Linimon changed: What|Removed |Added Assignee|b...@freebsd.org|n...@freebsd.org -- You are receiv

Re: Re : Re: netgraph and vpp

2023-11-26 Thread Jim Thompson
y performant these days https://issue.freebsdfoundation.org/publication/?i=660151 Benoit > Le sam. 25 nov. 2023 à 00:33, Jim Thompson nov. 2023 à 00:33, Jim Thompson <> a écrit : > > > > On Nov 24, 2023 at 12:48:07 AM, Benoit Chesneau < > beno...@enki-multimedia.eu&g

Re : Re: netgraph and vpp

2023-11-25 Thread Benoit Chesneau
00:33, Jim Thompson <[j...@netgate.com](mailto:Le sam. 25 nov. 2023 à 00:33, Jim Thompson < a écrit : > On Nov 24, 2023 at 12:48:07 AM, Benoit Chesneau > wrote: > >> netgraph and vpp looks similar in their intent. Both are graphs to process >> packets. >>

Re: netgraph and vpp

2023-11-24 Thread Jim Thompson
On Nov 24, 2023 at 12:48:07 AM, Benoit Chesneau wrote: > netgraph and vpp looks similar in their intent. Both are graphs to > process packets. > > I thought that usinv netgraph sounds interresting to build a modern > router or cpe. What about the perforance? Did anyone compRe

netgraph and vpp

2023-11-23 Thread Benoit Chesneau
netgraph and vpp looks similar in their intent. Both are graphs to process packets. I thought that usinv netgraph sounds interresting to build a modern router or cpe. What about the perforance? Did anyone compRe? Also is there any difference in term of implementation of the processing? Id

Re: performance of netgraph vs bridge

2023-10-08 Thread Goran Mekić
On 10/8/23 11:00, Benoit Chesneau wrote: Before I am doing some performance tests myself, did someone comparend netgraph ng_bridge vs if_bridge with recent multi thread additions in netgraph ? The advantage I see in using netgraph is remooving the need of using tap interfaces  and instead

performance of netgraph vs bridge

2023-10-08 Thread Benoit Chesneau
Before I am doing some performance tests myself, did someone comparend netgraph ng_bridge vs if_bridge with recent multi thread additions in netgraph ? The advantage I see in using netgraph is remooving the need of using tap interfaces and instead using netgraph sockets. Which seems to be more

linux xdp vs netgraph

2023-10-05 Thread Benoit Chesneau
I may be wrong but xdp linux looks a lot like netgraph. Packets are processed at kernel level and we can chain instructions over them. Is there any comparison of their features around?

[Bug 223824] Panic in ng_base.c (netgraph)

2023-07-09 Thread bugzilla-noreply
|ng_base.c (netgraph)|(netgraph) Flags||mfc-stable13? -- You are receiving this mail because: You are the assignee for the bug.

bridging VLANs with netgraph(3)

2023-03-25 Thread Marek Zarychta
The drawback of this solution is using patched sources and having duplicated packets for vlan1000 inside the jail, but the desired state is: vlan 1499 *--> epair0 vlan 1000 <--> epair0 Any suggestions on how to make it work with netgraph(3) will be warmly appreciated. [1]

[Bug 270083] [netgraph] ng_netflow, NetFlow v9: maximum packets count between re-announcing data templates is ignored

2023-03-12 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=270083 Mark Linimon changed: What|Removed |Added CC|n...@freebsd.org | Assignee|b...@freebsd.o

[Bug 270083] [netgraph] ng_netflow, NetFlow v9: maximum packets count between re-announcing data templates is ignored

2023-03-10 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=270083 Marek Zarychta changed: What|Removed |Added CC||n...@freebsd.org --- Comment #1 f

[Bug 237072] netgraph(4): performance issue [on HardenedBSD]?

2023-01-22 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=237072 Graham Perrin changed: What|Removed |Added See Also|https://github.com/Hardened | |BSD/hardenedBS

[Bug 246706] [netgraph] kernel panic due to corrupted memory

2022-11-08 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=246706 Kubilay Kocak changed: What|Removed |Added Keywords||crash -- You are receiving this m

[Bug 246706] [netgraph] kernel panic due to corrupted memory

2022-10-23 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=246706 Graham Perrin changed: What|Removed |Added CC||grahamper...@freebsd.org

[Bug 246706] [netgraph] kernel panic due to corrupted memory

2022-10-22 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=246706 Eugene Grosbein changed: What|Removed |Added Resolution|--- |Overcome By Events S

[Bug 255872] netgraph/bluetooth/hci: Fix a use after free in le_connection_complete

2021-06-27 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=255872 Takanori Watanabe changed: What|Removed |Added Flags|mfc-stable12?, |mfc-stable12+,

[Bug 255872] netgraph/bluetooth/hci: Fix a use after free in le_connection_complete

2021-06-27 Thread bugzilla-noreply
picked from commit 14803ec8d193d8d46f4137a7dba61b277c6a2fed) sys/netgraph/bluetooth/hci/ng_hci_evnt.c | 1 + 1 file changed, 1 insertion(+) -- You are receiving this mail because: You are on the CC list for the bug.

[Bug 255872] netgraph/bluetooth/hci: Fix a use after free in le_connection_complete

2021-06-27 Thread bugzilla-noreply
picked from commit 14803ec8d193d8d46f4137a7dba61b277c6a2fed) sys/netgraph/bluetooth/hci/ng_hci_evnt.c | 1 + 1 file changed, 1 insertion(+) -- You are receiving this mail because: You are on the CC list for the bug.

[Bug 241954] netgraph: Fails on concurrent node rename

2021-06-16 Thread bugzilla-noreply
Author: Lutz Donnerhacke AuthorDate: 2021-06-02 22:29:46 + Commit: Lutz Donnerhacke CommitDate: 2021-06-16 11:48:22 + tests/netgraph: Inital framework for testing libnetgraph Provide a framework of functions to test various netgraph modules. Tests contain: - creating

[Bug 241954] netgraph: Fails on concurrent node rename

2021-06-16 Thread bugzilla-noreply
Author: Lutz Donnerhacke AuthorDate: 2021-06-02 22:29:46 + Commit: Lutz Donnerhacke CommitDate: 2021-06-16 11:44:15 + tests/netgraph: Inital framework for testing libnetgraph Provide a framework of functions to test various netgraph modules. Tests contain: - creating

[Bug 241954] netgraph: Fails on concurrent node rename

2021-06-15 Thread bugzilla-noreply
: Lutz Donnerhacke AuthorDate: 2021-06-02 22:29:46 + Commit: Lutz Donnerhacke CommitDate: 2021-06-15 12:31:32 + tests/netgraph: Inital framework for testing libnetgraph Provide a framework of functions to test various netgraph modules. Tests contain: - creating

[Bug 241954] netgraph: Fails on concurrent node rename

2021-06-10 Thread bugzilla-noreply
: Lutz Donnerhacke AuthorDate: 2021-05-04 19:20:39 + Commit: Lutz Donnerhacke CommitDate: 2021-06-10 09:35:21 + netgraph/ng_base: Renaming a node to the same name is a noop Detailed analysis in https://github.com/genneko/freebsd-vimage-jails/issues/2 brought the

[Bug 241954] netgraph: Fails on concurrent node rename

2021-06-10 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=241954 Lutz Donnerhacke changed: What|Removed |Added Flags|mfc-stable13?, |mfc-stable13+,

[Bug 241954] netgraph: Fails on concurrent node rename

2021-06-10 Thread bugzilla-noreply
: Lutz Donnerhacke AuthorDate: 2021-05-04 19:20:39 + Commit: Lutz Donnerhacke CommitDate: 2021-06-10 09:33:19 + netgraph/ng_base: Renaming a node to the same name is a noop Detailed analysis in https://github.com/genneko/freebsd-vimage-jails/issues/2 brought the

[Bug 241954] netgraph: Fails on concurrent node rename

2021-06-10 Thread bugzilla-noreply
: Lutz Donnerhacke AuthorDate: 2021-05-04 19:20:39 + Commit: Lutz Donnerhacke CommitDate: 2021-06-10 09:29:34 + netgraph/ng_base: Renaming a node to the same name is a noop Detailed analysis in https://github.com/genneko/freebsd-vimage-jails/issues/2 brought the

[Bug 255872] netgraph/bluetooth/hci: Fix a use after free in le_connection_complete

2021-06-09 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=255872 Kubilay Kocak changed: What|Removed |Added CC||m...@johnson.org Keyword

[Bug 255872] netgraph/bluetooth/hci: Fix a use after free in le_connection_complete

2021-06-08 Thread bugzilla-noreply
picked from commit 14803ec8d193d8d46f4137a7dba61b277c6a2fed) sys/netgraph/bluetooth/hci/ng_hci_evnt.c | 1 + 1 file changed, 1 insertion(+) -- You are receiving this mail because: You are on the CC list for the bug.

[Bug 241954] netgraph: Fails on concurrent node rename

2021-06-04 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=241954 Kubilay Kocak changed: What|Removed |Added Summary|netgraph fails on |netgraph: Fails on

[Bug 241954] netgraph fails on concurrent node rename

2021-06-04 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=241954 Lutz Donnerhacke changed: What|Removed |Added Flags||mfc-stable13?,

[Bug 241954] netgraph fails on concurrent node rename

2021-06-04 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=241954 Lutz Donnerhacke changed: What|Removed |Added Resolution|--- |FIXED Status|In Pro

[Bug 241954] netgraph fails on concurrent node rename

2021-06-04 Thread bugzilla-noreply
: Lutz Donnerhacke AuthorDate: 2021-05-04 19:20:39 + Commit: Lutz Donnerhacke CommitDate: 2021-06-04 09:20:19 + netgraph/ng_base: Renaming a node to the same name is a noop Detailed analysis in https://github.com/genneko/freebsd-vimage-jails/issues/2 brought the problem

[Bug 255872] netgraph/bluetooth/hci: Fix a use after free in le_connection_complete

2021-05-26 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=255872 Ed Maste changed: What|Removed |Added CC||ema...@freebsd.org --- Comment #4 from

[Bug 255872] netgraph/bluetooth/hci: Fix a use after free in le_connection_complete

2021-05-26 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=255872 Takanori Watanabe changed: What|Removed |Added Status|Open|Closed CC|

[Bug 255872] netgraph/bluetooth/hci: Fix a use after free in le_connection_complete

2021-05-26 Thread bugzilla-noreply
: Takanori Watanabe AuthorDate: 2021-05-26 09:23:33 + Commit: Takanori Watanabe CommitDate: 2021-05-26 09:23:33 + Fix a use-after-free in an error case. PR: 255872 Submitted by: lylgood Differential Revision: https://reviews.freebsd.org/D30454 sys/netgraph

[Bug 255872] netgraph/bluetooth/hci: Fix a use after free in le_connection_complete

2021-05-25 Thread bugzilla-noreply
Summary|[PATCH] |netgraph/bluetooth/hci: Fix |netgraph/bluetooth/hci: Fix |a use after free in |a use after free in |le_connection_complete |le_connection_complete | -- You are receiving this mail

[Bug 255872] [PATCH] netgraph/bluetooth/hci: Fix a use after free in le_connection_complete

2021-05-25 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=255872 Rodney W. Grimes changed: What|Removed |Added CC||n...@freebsd.org -- You are re

[Bug 255872] [PATCH] netgraph/bluetooth/hci: Fix a use after free in le_connection_complete

2021-05-25 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=255872 Mark Johnston changed: What|Removed |Added CC||ma...@freebsd.org Stat

[Bug 255874] netgraph: Fix a double free in ng_checksum_rcvdata

2021-05-23 Thread bugzilla-noreply
+, ||mfc-stable12+, ||mfc-stable11+ URL||https://reviews.freebsd.org ||/D30273 Summary|[PATCH] netgraph: Fix a |netgraph

[Bug 255874] [PATCH] netgraph: Fix a double free in ng_checksum_rcvdata

2021-05-23 Thread bugzilla-noreply
: Lutz Donnerhacke AuthorDate: 2021-05-15 09:32:57 + Commit: Lutz Donnerhacke CommitDate: 2021-05-23 13:01:34 + netgraph/ng_checksum: Fix double free error m_pullup(9) frees the mbuf(9) chain in the case of an allocation error. The mbuf chain must not be freed again

[Bug 255874] [PATCH] netgraph: Fix a double free in ng_checksum_rcvdata

2021-05-23 Thread bugzilla-noreply
: Lutz Donnerhacke AuthorDate: 2021-05-15 09:32:57 + Commit: Lutz Donnerhacke CommitDate: 2021-05-23 12:59:28 + netgraph/ng_checksum: Fix double free error m_pullup(9) frees the mbuf(9) chain in the case of an allocation error. The mbuf chain must not be freed again

[Bug 255874] [PATCH] netgraph: Fix a double free in ng_checksum_rcvdata

2021-05-23 Thread bugzilla-noreply
: Lutz Donnerhacke AuthorDate: 2021-05-15 09:32:57 + Commit: Lutz Donnerhacke CommitDate: 2021-05-23 12:55:20 + netgraph/ng_checksum: Fix double free error m_pullup(9) frees the mbuf(9) chain in the case of an allocation error. The mbuf chain must not be freed again

[Bug 255874] [PATCH] netgraph: Fix a double free in ng_checksum_rcvdata

2021-05-16 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=255874 Lutz Donnerhacke changed: What|Removed |Added Resolution|--- |FIXED Status|In Pro

[Bug 255874] [PATCH] netgraph: Fix a double free in ng_checksum_rcvdata

2021-05-16 Thread bugzilla-noreply
: Lutz Donnerhacke AuthorDate: 2021-05-15 09:32:57 + Commit: Lutz Donnerhacke CommitDate: 2021-05-16 17:39:51 + netgraph/ng_checksum: Fix double free error m_pullup(9) frees the mbuf(9) chain in the case of an allocation error. The mbuf chain must not be freed again in

[Bug 246706] [netgraph] kernel panic due to corrupted memory

2021-05-15 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=246706 Lutz Donnerhacke changed: What|Removed |Added Status|New |Open --- Comment #1 from Lutz D

[Bug 255874] [PATCH] netgraph: Fix a double free in ng_checksum_rcvdata

2021-05-15 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=255874 Lutz Donnerhacke changed: What|Removed |Added Status|Open|In Progress --- Comment #1 from

[Bug 255874] [PATCH] netgraph: Fix a double free in ng_checksum_rcvdata

2021-05-15 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=255874 Lutz Donnerhacke changed: What|Removed |Added Status|New |Open Keywords|

[Bug 255874] [PATCH] netgraph: Fix a double free in ng_checksum_rcvdata

2021-05-14 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=255874 Mark Linimon changed: What|Removed |Added Assignee|b...@freebsd.org|n...@freebsd.org -- You are receiv

[Bug 255872] [PATCH] netgraph/bluetooth/hci: Fix a use after free in le_connection_complete

2021-05-14 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=255872 Mark Linimon changed: What|Removed |Added Assignee|b...@freebsd.org|n...@freebsd.org -- You are receiv

[Bug 187835] ngctl(8) strange behavior when adding more than 530 vlan through netgraph

2021-05-09 Thread bugzilla-noreply
Author: Lutz Donnerhacke AuthorDate: 2021-02-07 21:07:34 + Commit: Lutz Donnerhacke CommitDate: 2021-05-09 13:25:05 + netgraph/ng_base: Allow larger BINARY2ASCII conversions Allocate the necessary memory for the conversion dynamically starting with a value which is

[Bug 187835] ngctl(8) strange behavior when adding more than 530 vlan through netgraph

2021-05-09 Thread bugzilla-noreply
Author: Lutz Donnerhacke AuthorDate: 2021-02-07 21:07:34 + Commit: Lutz Donnerhacke CommitDate: 2021-05-09 13:23:19 + netgraph/ng_base: Allow larger BINARY2ASCII conversions Allocate the necessary memory for the conversion dynamically starting with a value which is

[Bug 187835] ngctl(8) strange behavior when adding more than 530 vlan through netgraph

2021-05-09 Thread bugzilla-noreply
Author: Lutz Donnerhacke AuthorDate: 2021-02-07 21:07:34 + Commit: Lutz Donnerhacke CommitDate: 2021-05-09 13:20:48 + netgraph/ng_base: Allow larger BINARY2ASCII conversions Allocate the necessary memory for the conversion dynamically starting with a value which is

[Bug 241954] netgraph fails on concurrent node rename

2021-05-04 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=241954 Lutz Donnerhacke changed: What|Removed |Added Status|Open|In Progress --- Comment #3 from

[Bug 241954] netgraph fails on concurrent node rename

2021-05-04 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=241954 --- Comment #2 from Lutz Donnerhacke --- https://github.com/genneko/freebsd-vimage-jails/issues/2 describes the problem in detail: ng_name_node() is called twice and does not recognize the rename to the identical name. This might be solvabl

[Bug 241954] netgraph fails on concurrent node rename

2021-05-02 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=241954 Lutz Donnerhacke changed: What|Removed |Added Status|New |Open CC|

[Bug 243833] netgraph: If queue is full, don't enqueue in ng_source_rcvdata()

2021-03-15 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=243833 Neel Chauhan changed: What|Removed |Added Status|New |Closed Resolution|---

[Bug 241954] netgraph fails on concurrent node rename

2021-03-08 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=241954 --- Comment #1 from Kurt Jaeger --- See also: https://github.com/genneko/freebsd-vimage-jails/issues/2 -- You are receiving this mail because: You are the assignee for the bug. ___ freebsd-net@

[Bug 243829] netgraph: Add RFC 6598/Carrier Grade NAT support to ng_nat

2021-03-02 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=243829 Neel Chauhan changed: What|Removed |Added Resolution|--- |FIXED Status|New

[Bug 240530] netgraph/ng_source: Allow ng_source to inject into any netgraph network

2021-02-16 Thread bugzilla-noreply
: Lutz Donnerhacke AuthorDate: 2021-01-17 20:35:28 + Commit: Lutz Donnerhacke CommitDate: 2021-02-16 08:25:59 + netgraph/ng_source: Allow ng_source to inject into any netgraph network PR: 240530 Reviewed by:kp Differential Revision: https

[Bug 187835] ngctl(8) strange behavior when adding more than 530 vlan through netgraph

2021-02-08 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=187835 Lutz Donnerhacke changed: What|Removed |Added Status|Open|Closed Resolution|---

[Bug 187835] ngctl(8) strange behavior when adding more than 530 vlan through netgraph

2021-02-08 Thread bugzilla-noreply
: Lutz Donnerhacke AuthorDate: 2021-02-07 21:07:34 + Commit: Lutz Donnerhacke CommitDate: 2021-02-08 13:31:58 + netgraph/ng_base: Allow larger BINARY2ASCII conversions Allocate the necessary memory for the conversion dynamically starting with a value which is sufficient

Re: netgraph with ng_netflow and ng_gridge nodes

2021-02-06 Thread petru garstea
If you like to understand your network, try: # ngctl dot [-c] and paste the output to http://www.webgraphviz.com/ I used it when was building the graph :) On 2/6/21 11:48 AM, Lutz Donnerhacke wrote: On Sat, Feb 06, 2021 at 11:10:29AM -0500, petru garstea wrote: Greetings, I have come up with

Re: netgraph with ng_netflow and ng_gridge nodes

2021-02-06 Thread petru garstea
nding on the direction). Even ng_one2many or ng_hub might be a better solution. If you only need the eiface to attach tcpdump, you can omit it completely, because tcpdump is able to sniff on the fxp0 even if the netgraph hooks are set. ___ freebs

Re: netgraph with ng_netflow and ng_gridge nodes

2021-02-06 Thread Lutz Donnerhacke
On Sat, Feb 06, 2021 at 11:10:29AM -0500, petru garstea wrote: > Greetings, > > I have come up with a graph with no use of ng_tee, ng_hub or ng_one2many. > > Also I validated the flows on a collector > > In case anybody has the same use case I am sharing the graph > > mkpeer re0: netflow lower ifac

[Bug 240685] netgraph/ng_vlan_rotate: IEEE 802.1ad VLAN manipulation netgraph node type (new type)

2021-02-04 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=240685 Lutz Donnerhacke changed: What|Removed |Added Status|New |Closed Resolution|---

Re: netgraph with ng_netflow and ng_gridge nodes

2021-02-02 Thread Lutz Donnerhacke
can omit it completely, because tcpdump is able to sniff on the fxp0 even if the netgraph hooks are set. ___ freebsd-net@freebsd.org mailing list https://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"

Re: netgraph with ng_netflow and ng_gridge nodes

2021-02-02 Thread Lutz Donnerhacke
On Tue, Feb 02, 2021 at 10:05:15AM -0500, petru garstea wrote: > Hi, > > I need help to unify 2 netgraphs > > 1st ng_bridge netgraph > > ngctl mkpeer fxp0: bridge lower link0 > ngctl connect fxp0: em0:lower upper link1 > ngctl name fxp0:lower em0Bridge > ngctl mkpeer

netgraph with ng_netflow and ng_gridge nodes

2021-02-02 Thread petru garstea
Hi, I need help to unify 2 netgraphs 1st ng_bridge netgraph ngctl mkpeer fxp0: bridge lower link0 ngctl connect fxp0: em0:lower upper link1 ngctl name fxp0:lower em0Bridge ngctl mkpeer fxp0:lower eiface link3 ether 2nd ng_netflow netgraph mkpeer fxp0: netflowlower iface0 name fxp0:lower

[Bug 241462] netgraph/ng_tag: Variable length data can not be set for all length

2021-02-01 Thread bugzilla-noreply
: Lutz Donnerhacke AuthorDate: 2021-01-02 13:58:17 + Commit: Lutz Donnerhacke CommitDate: 2021-02-01 14:07:31 + netgraph/ng_tag: permit variable length data ng_tag(4) operate on arbitrary data of mbuf_tags(9). Those structures are padded to the next multiple of the

[Bug 241462] netgraph/ng_tag: Variable length data can not be set for all length

2021-02-01 Thread bugzilla-noreply
: Lutz Donnerhacke AuthorDate: 2021-01-02 13:58:17 + Commit: Lutz Donnerhacke CommitDate: 2021-02-01 13:55:42 + netgraph/ng_tag: permit variable length data ng_tag(4) operate on arbitrary data of mbuf_tags(9). Those structures are padded to the next multiple of the

[Bug 249327] fix IP address parsing in netgraph eating too many characters

2020-10-31 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=249327 Kubilay Kocak changed: What|Removed |Added Severity|Affects Only Me |Affects Some People Keyw

[Bug 249327] fix IP address parsing in netgraph eating too many characters

2020-10-31 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=249327 Bjoern A. Zeeb changed: What|Removed |Added Status|New |Open --- Comment #3 from Bjoern A

[Bug 249327] fix IP address parsing in netgraph eating too many characters

2020-10-31 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=249327 --- Comment #2 from Markus Stoff --- The proposed fix has been approved in review D26489. -- You are receiving this mail because: You are the assignee for the bug. ___ freebsd-net@freebsd.org ma

Getting netgraph stats

2020-10-23 Thread Paul Thornton
I am having a problem monitoring network stats on jails on a host. Scenario: One host, FreeBSD 12.1, with a small number of vnet jails. I'm using netgraph to bridge two or more VLANs from physical NICs into each jail - so each jail has at least 2 ngether interfaces which are the only NI

[Bug 249327] fix IP address parsing in netgraph eating too many characters

2020-09-20 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=249327 --- Comment #1 from Markus Stoff --- See also review D26489. -- You are receiving this mail because: You are the assignee for the bug. ___ freebsd-net@freebsd.org mailing list https://lists.free

[Bug 249327] fix IP address parsing in netgraph eating too many characters

2020-09-15 Thread bugzilla-noreply
Summary|IP address parsing in |fix IP address parsing in |netgraph eats to many |netgraph eating too many |characters |characters -- You are receiving this mail because: You are the assignee for the bug

[Bug 249275] New netgraph nodetype: ng_antispoof

2020-09-14 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=249275 Markus Stoff changed: What|Removed |Added Resolution|--- |Overcome By Events Stat

[Bug 249275] New netgraph nodetype: ng_antispoof

2020-09-13 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=249275 --- Comment #1 from Markus Stoff --- Please let me also have your thoughts at review D26420. -- You are receiving this mail because: You are the assignee for the bug. ___ freebsd-net@freebsd.org

[Bug 249275] New netgraph nodetype: ng_antispoof

2020-09-12 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=249275 Mark Linimon changed: What|Removed |Added Assignee|b...@freebsd.org|n...@freebsd.org -- You are receiv

Re: Reviewing two IPFW/netgraph/natd patches (RFC 6598/Carrier Grade NAT)

2020-07-05 Thread Adrian Chadd
hi! On Fri, 3 Jul 2020 at 20:12, Neel Chauhan wrote: > Hi freebsd-hackers@, freebsd-net@, > > These two patches that will be described are a continuation of r357092. > > r357092 added support for RFC 6598/Carrier Grade NAT (subnet: > 100.64.0.0/10) in libalias and IPFW in-kernel NAT. > > These t

  1   2   3   4   5   6   7   8   9   10   >