Re: Poor performance with stable/13 and Mellanox ConnectX-6 (mlx5)

2022-06-14 Thread Andrey V. Elsukov
=ffed07bb     ether b8:ce:f6:81:df:6a     inet 192.168.10.31 netmask 0xff00 broadcast 192.168.10.255     media: Ethernet 25GBase-CR     status: active     nd6 options=29 Hi, Do you have the same MTU size on linux machine? -- WBR, Andrey V. Elsukov OpenPGP_signature

Re: ICMPv6 over lo0

2022-11-15 Thread Andrey V. Elsukov
&optval, sizeof(optval)) == -1) err(1, "setsockopt(IPV6_USE_MIN_MTU)"); } ``` -- WBR, Andrey V. Elsukov OpenPGP_signature Description: OpenPGP digital signature

Re: NPTv6: prefix doesn't change in IPFW when prefix changes on dynamic interface

2022-11-24 Thread Andrey V. Elsukov
ind and delete deprecated addresses from an interface. Then NPTv6 module will use first global prefix on the interface. -- WBR, Andrey V. Elsukov OpenPGP_signature Description: OpenPGP digital signature

Re: IPFW: IPv6 and NPTv6 issues: multiple IPv6 addresses confuses IPFW

2023-02-19 Thread Andrey V. Elsukov
res appearance of new IPv6 address. 2. Then, even if you delete old IPv6 address by hand, NPTv6 won't try to peak another one until there won't appear new address. 3. There should be some logic that takes into account presence of temporary and deprecated addresses on the interface

Re: Is there a FreeBSD equivalent of 'tcpdump -i any' from Linux?

2023-08-03 Thread Andrey V. Elsukov
hen modify ETHER_BPF_MTAP() macro, probably make some tweaks for tcpdump and you will get what you need. It seems not so hard. -- WBR, Andrey V. Elsukov

Re: em0: No buffer space available for IPv6 traffic but IPv4 is OK

2023-08-21 Thread Andrey V. Elsukov
IPv6. Make sure your firewall doesn't block ICMPv6 types needed for IPv6 to work. Check that multicast functions correctly. # ifconfig # ndp -an # netstat -s # ifmstat -- WBR, Andrey V. Elsukov

Re: Restarting IPv6

2023-10-04 Thread Andrey V. Elsukov
x27;m missing? Hi, probably you need to use rtsold(8). -- WBR, Andrey V. Elsukov

Re: Howto: ipsec tunnel routing both IPv4 and IPv6? Possible?

2024-01-15 Thread Andrey V. Elsukov
00 reqid: 104 pf firewall entries are set to allow esp over that tunnel. Now, I do want to route local IPv6 in addition, *if* that is possible, at all. Hi, try something like this: ifconfig_ipsec0_ipv6="inet6 fd00:b:b:b::250 fd00:a:a:a::254 prefixlen 128" -- WBR, Andrey V. Elsukov

Re: [PATCH] Handle PACKET_TAG_IPFORWARD and TIMEWAIT state

2013-03-01 Thread Andrey V. Elsukov
find, can be found at: > http://people.freebsd.org/~emaste/patches/fwd_tag_findpcb.diff Hi Ed, it seems this problem was there before my breakage. Also, it think that m_tag_unlink is redundant here, because you clear the M_IP_NEXTHOP/M_IP6_NEXTHOP f

Problem with fwip(4) and limited size ll_addr in the struct llentry

2013-07-01 Thread Andrey V. Elsukov
x27;t use #ifdefs with increased size here. So, what the best way to fix this? -- WBR, Andrey V. Elsukov ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send any mail to "freebsd-ne

Re: Problem with fwip(4) and limited size ll_addr in the struct llentry

2013-07-01 Thread Andrey V. Elsukov
On 01.07.2013 16:26, Vijay Singh wrote: > If you enable OFED, then the llentry size is expanded to store IB addresses > as well. Code should be in 9.x. Yes, but this isn't solution. -- WBR, Andrey V. Elsukov ___ freebsd-net@freebsd.org m

Re: CFR: FIB handling improvements

2013-08-22 Thread Andrey V. Elsukov
ch includes fixes for several issues relating to FIBs: Hi, I also have a small patch. Since icmp6_mtudisc_update() calls tcp_maxmtu6() where inc->inc_fibnum is used, I think it is good idea to initialize this field. -- WBR, Andrey V. Elsukov

Re: devel/jenkins port not starting. Kernel panic in IPv6 multicast code

2013-08-27 Thread Andrey V. Elsukov
6p_lookup_mcast_ifp() function. It seems to me, that v4mapped addresses isn't supported in the multicast code. If you remove KASSERT from in6p_lookup_mcast_ifp(), this address will be treated as invalid later. -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

[RFC] Don't embed scope zone id into IPv6 addresses

2013-09-24 Thread Andrey V. Elsukov
also there are many of small changes that should be done. I would like to see your opinions about first point. [1] http://tinyurl.com/figure2-12 -- WBR, Andrey V. Elsukov ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo

Re: ipfw / routing issue on 9.2-RELEASE

2014-03-05 Thread Andrey V. Elsukov
packets are "intact". Why does the kernel not forward those > packets? What is the last rule? I suspect it is "deny all"? -- WBR, Andrey V. Elsukov ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listin

Re: ipfw / routing issue on 9.2-RELEASE

2014-03-05 Thread Andrey V. Elsukov
on't see in the code how it can affect routing. Make sure: 1. net.inet.ip.forwarding=1 (gateway_enable="YES" in rc.conf) 2. you have route and gateway is reachable (route get/arp -n). -- WBR, Andrey V. Elsukov ___ freebsd-net

Re: fastforward/routing: a 3 million packet-per-second system?

2014-07-24 Thread Andrey V. Elsukov
to route (with fastforwarding) about 7 Mpps IPv4 and 2.5Mpps IPv6. But the stock system is far from even half of this results. -- WBR, Andrey V. Elsukov ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To un

Re: [urtw] Wifi link dying randomly. reboot required to reconnect.

2011-12-05 Thread Andrey V. Elsukov
On 05.12.2011 9:29, Adrian Chadd wrote: > Hi, > > Can you please just fire up kgdb and get a backtrace from the core? There should be core.X.txt file, usually it already has a backtrace. -- WBR, Andrey V. Elsukov ___ freebsd-net@freebsd.or

Re: userfw - modular packet filter

2012-02-13 Thread Andrey V. Elsukov
site: http://userfw.net/ Hi, Maxim Why do you called it "userfw"? Does it work in user level? :) -- WBR, Andrey V. Elsukov ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send

Re: problem on ipfw using mac addresses

2012-07-04 Thread Andrey V. Elsukov
om A. > What's the reason? I'm really confused with what I saw! Is it a bug? > > Any hints or suggestions are really appreciated. Please, read the ipfw(4) manual page about the sysctl variable net.link.ether.ipfw. -- WBR, Andrey V. Elsukov

Re: kern/168742: detaching of ethernet adapter with configured vlans leads to panic

2012-08-14 Thread Andrey V. Elsukov
ifp = NULL; > - IFNET_RUNLOCK_NOSLEEP(); > - > - KASSERT(ifp != NULL, ("%s: ifnet went away", __func__)); > -#endif > if (ifp == NULL) > return (ENOENT); > > -- WBR, Andrey V. Elsukov __

Re: kern/168742: detaching of ethernet adapter with configured vlans leads to panic

2012-08-20 Thread Andrey V. Elsukov
gt; > Index: if_vlan.c > === > --- if_vlan.c (revision 239294) Hi, John. This also works, thanks. -- WBR, Andrey V. Elsukov ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send a

[RFC] Enabling IPFIREWALL_FORWARD in run-time

2012-10-19 Thread Andrey V. Elsukov
/pfil_forward.diff Also we have done some tests with the ixia traffic generator connected via 10G network adapter. Tests have show that there is no visible difference, and there is no visible performance degradation. Any objections? -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP

Re: [RFC] Enabling IPFIREWALL_FORWARD in run-time

2012-10-19 Thread Andrey V. Elsukov
e net.inet.ip.forwarding and net.inet6.ip6.forwarding variables, and placing it into net.inet.ip.fw is undesirable, because we can have kernel without ipfw. So, i decided to choose pfil, because it could not work without pfil. -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

[RFC] IPv6 ifaddr hash

2012-12-07 Thread Andrey V. Elsukov
But I think 512 buckets is too many. 2. What hash function is better to use? 3. Using the whole 128 bit of address to hash seems like overkill. -- WBR, Andrey V. Elsukov ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/fr

Re: dummynet, flowmask and IPv6

2011-04-29 Thread Andrey V. Elsukov
WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: kern/157802: [dummynet] [panic] kernel panic in dummynet

2011-06-16 Thread Andrey V. Elsukov
The following reply was made to PR kern/157802; it has been noted by GNATS. From: "Andrey V. Elsukov" To: bug-follo...@freebsd.org, alexey_kovale...@inbox.ru Cc: Subject: Re: kern/157802: [dummynet] [panic] kernel panic in dummynet Date: Thu, 16 Jun 2011 15:05:59 +0400 Hi, Alexey

Re: freebsd 8.1 crash with ECMP

2010-08-22 Thread Andrey V. Elsukov
-- WBR, Andrey V. Elsukov ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"

Re: UDP checksum invalid on FreeBSD7/x86

2008-06-20 Thread Andrey V. Elsukov
, Andrey V. Elsukov ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Re: UDP checksum invalid on FreeBSD7/x86

2008-06-20 Thread Andrey V. Elsukov
Peter Kirk wrote: On Friday 20 June 2008 11:10:06 Andrey V. Elsukov wrote: I have a fresh installation of FreeBSD7 on x86, with no big changes to the system. Can you show `ifconfig -u` output? re0: flags=8843 metric 0 mtu 1500 options=9b It's problem in re(4) driver. Try t

Re: IPFW_TABLES_MAX in src/sbin/ipfw/ipfw2.c

2008-09-01 Thread Andrey V. Elsukov
ror: for each function it appears in.) *** Error code 1 IPFW_TABLES_MAX seems like defined in netinet/ip_fw.h, which is included in ipfw2.c: IPFW_TABLES_MAX protected by _KERNEL macro. This is why you get an error. -- WBR, Andrey V. Elsukov ___ freebs

Re: RFC: interface description

2009-08-13 Thread Andrey V. Elsukov
remote CDP Something similar was rejected at least two times :) http://www.freebsd.org/cgi/query-pr.cgi?pr=kern/83622 http://www.freebsd.org/cgi/query-pr.cgi?pr=kern/110720 -- WBR, Andrey V. Elsukov ___ freebsd-net@freebsd.org mailing

Re: RFC: interface description

2009-08-13 Thread Andrey V. Elsukov
k this information through ifconfig(8) with a callback, clean up the file upon restart, but we can not prevent other programs from calling IOCSIFNAME on the interface. Any idea for this? What about using interface index as a key(see if_nameindex(3))? -- WBR, Andrey V. Elsukov __

Re: fastforward/routing: a 3 million packet-per-second system?

2014-07-28 Thread Andrey V. Elsukov
On 24.07.2014 16:47, John Jasen wrote: > On 07/24/2014 05:24 AM, Andrey V. Elsukov wrote: >> On 22.07.2014 19:18, John Jasen wrote: >>> Feedback and/or tips and tricks more than welcome. >>> >>> Outstanding questions: >>> >>> Would i

Re: [Bug 193246] Bug in IPv6 multicast join(), uncovered by Jenkins

2014-09-03 Thread Andrey V. Elsukov
better to fix this in the kernel or the JDK. Hi, you said that this code works in linux. I looked in the linux kernel source, and I think it should return EINVAL too. net/ipv6/mcast.c:ipv6_sock_mc_join: 154 if (!ipv6_addr_is_multicast(addr)) 155

Re: [Bug 193246] Bug in IPv6 multicast join(), uncovered by Jenkins

2014-09-03 Thread Andrey V. Elsukov
On 03.09.2014 17:39, Craig Rodrigues wrote: > On Wed, Sep 3, 2014 at 5:19 AM, Andrey V. Elsukov wrote: >> On 03.09.2014 14:05, bugzilla-nore...@freebsd.org wrote: >> >> Hi, >> >> you said that this code works in linux. I looked in the linux kernel >> sour

Re: svn commit: r272089 - head/sys/netpfil/ipfw

2014-09-25 Thread Andrey V. Elsukov
l panic occurs. Hence, when we do not get an >> interface, >> A> > we just drop the packet in question. > Ok, moving off to freebsd-net. How should we proceded with debugging > further? Probably this can occurs when outgoing interface disappeared (netgrapg/tun/tap/lagg

Re: Addressing refcount issues in ip6_setdstifaddr and ip6_getdstifaddr routines.

2014-09-30 Thread Andrey V. Elsukov
p;revision=256673 -- WBR, Andrey V. Elsukov ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"

Re: Addressing refcount issues in ip6_setdstifaddr and ip6_getdstifaddr routines.

2014-10-03 Thread Andrey V. Elsukov
imilar functional will be needed when mobile IPv6 support will be added. -- WBR, Andrey V. Elsukov ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"

Re: Broken IPsec + enc +pf/ipfw

2014-10-20 Thread Andrey V. Elsukov
? It is small and should be applicable to stable/10. -- WBR, Andrey V. Elsukov ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"

Re: Broken IPsec + enc +pf/ipfw

2014-10-20 Thread Andrey V. Elsukov
On 21.10.2014 00:00, Matthew Grooms wrote: > On 10/20/2014 2:47 PM, Andrey V. Elsukov wrote: >> On 20.10.2014 20:18, Matthew Grooms wrote: >>> Lastly, I tried to locate a relevant PR but didn't find anything >>> concrete. Is this related to the issue? And if s

Re: Broken IPsec + enc +pf/ipfw

2014-10-21 Thread Andrey V. Elsukov
e pfil consumer and not the other. pf and ipfw deal differently when they want to determine incoming interface. > It looks like the last commit to 10.0-RELEASE is r255926, which is the > last real code change ( r257176 is just a header file include ) before > your commit of 272695 in C

Re: Broken IPsec + enc +pf/ipfw

2014-10-23 Thread Andrey V. Elsukov
th using gif + IPsec > transport mode instead of enc + IPsec tunnel mode. I was hoping that > changing the configuration would work around the issue. Unfortunately, > gif + IPsec transport mode was exhibiting the same type of problems that > enc +

[RFC][RFT] overhaul if_gre(4)

2014-10-29 Thread Andrey V. Elsukov
r and outer header. * deprecate support for various GREXXX ioctls, use our standard ioctls for tunnels. me(4): * use the same locking model as gre(4); * use if_transmit; * implementation conform to RFC 2004; -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: [RFC][RFT] overhaul if_gre(4)

2014-10-29 Thread Andrey V. Elsukov
On 29.10.2014 12:35, Andrey V. Elsukov wrote: > Hi All, > > I prepared the patch for review > https://reviews.freebsd.org/D1023 For those who want to test, I prepared a tarball with sources https://people.freebsd.org/~ae/gre.tgz Modules should work on stable/10 and h

Re: transparent udp proxy

2014-10-31 Thread Andrey V. Elsukov
dress before doing ip_savecontrol. Hi, udp_input() doesn't overwrite destination address. Probably you have NAT that does this. -- WBR, Andrey V. Elsukov ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net

Re: transparent udp proxy

2014-10-31 Thread Andrey V. Elsukov
dp_usrreq.c?v=FREEBSD8#L461 The more recent FreeBSD versions don't overwrite destination address. https://svnweb.freebsd.org/base?view=revision&revision=225044 -- WBR, Andrey V. Elsukov ___ freebsd-net@freebsd.org mailing list

Re: netmap in GENERIC, by default, on HEAD

2014-11-05 Thread Andrey V. Elsukov
4/IPv6 on rate close to 8.6 Mpps. The same kernel compiled with IPSEC can forward only 180 kpps. I think this problem should be solved before enabling it in GENERIC. -- WBR, Andrey V. Elsukov ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.

Re: netmap in GENERIC, by default, on HEAD

2014-11-05 Thread Andrey V. Elsukov
t; > I think this is why we need IPSEC in GENERIC to let more tests involved. > Maybe it also helps in kernel SSL encryption (key per IP vs per TCP > session). IPSEC had unresolved bugs for years, and now all will be magically fixed. I think we need some way to enable/disable it on th

Re: netmap in GENERIC, by default, on HEAD

2014-11-05 Thread Andrey V. Elsukov
On 05.11.2014 19:18, Evandro Nunes wrote: > On Wed, Nov 5, 2014 at 1:52 PM, Andrey V. Elsukov wrote: > >> On 05.11.2014 18:39, George Neville-Neil wrote: >>> Howdy, >>> >>> Last night (Pacific Time) I committed a change so that GENERIC, on HEAD >>>

Re: netmap in GENERIC, by default, on HEAD

2014-11-05 Thread Andrey V. Elsukov
On 05.11.2014 18:52, Andrey V. Elsukov wrote: > recently we did some IP forwarding tests and the GENERIC kernel is > several times faster than GENERIC+IPSEC. Even when IPSEC has no SA. > > I didn't do test on vanilla kernel, but our kernel is able forward > IPv4/IPv6 on ra

Re: kldload ip_mroute.ko vs. kernel options MROUTING

2014-11-13 Thread Andrey V. Elsukov
a difference between these two approaches? > I notice that, with a custom kernel, patching is much more complex and > time consuming. As binary updates are not possible any more. You don't need rebuild the kernel. Just load the module. -- WBR, Andrey V. Elsukov __

[RFC] add macros for ifnet statistic accounting

2014-11-20 Thread Andrey V. Elsukov
generic code in the network stack. -- WBR, Andrey V. Elsukov ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"

Re: IPsec is very broken...

2014-11-20 Thread Andrey V. Elsukov
tunnel modes with and without gif(4)/gre(4). So, just tried between two CURRENT hosts and it works. I use racoon and isakmpd for IKE. ICMP, TCP (ssh) and UDP (ike) works for me. How do you test? Do you use software crypto or aesni? -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: IPSec and StrongSWAN result in wrong forward

2014-12-12 Thread Andrey V. Elsukov
my side through a firewall with inner address Y and outer > address U. Do you use gif(4) to create tunnels? -- WBR, Andrey V. Elsukov ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send

Re: [RFC] add macros for ifnet statistic accounting

2014-12-19 Thread Andrey V. Elsukov
On 20.11.2014 20:38, Adrian Chadd wrote: > On 20 November 2014 09:33, Andrey V. Elsukov wrote: >> Hi All, >> >> we already did some changes in network stack in head/, that made ability >> for merging changes into stable branches much harder. >> >> What you

Re: timeout option in ping6

2015-01-16 Thread Andrey V. Elsukov
ply arrives later, the packet is not printed as replied, but considered as replied when calculating statistics. -X timeout Specify a timeout, in seconds, before ping exits regardless of how many packets have been received. -- WBR, Andrey V. Elsukov ___

Use public mailing list for reviewing patches

2015-03-03 Thread Andrey V. Elsukov
x27;t contain some user-visible/useful feature, that users can test or discuss, please, use special phabricator's group '#network' for review instead of freebsd-net@. Thanks. -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: [PATCH] Fix panic with pf fastroute

2015-03-11 Thread Andrey V. Elsukov
y of original mbuf. Are you sure this doesn't introduce mbuf leak? -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: Padded packets in ip6_input()

2015-03-15 Thread Andrey V. Elsukov
fs6_in_truncated); > + goto bad; > + } This is very rare case, I think, but plen can be zero in case, when jumbo payload option is present. Probably this is the reason why this check is done after hop-by-hop options parsing. -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: gre(4) over IPv6

2015-03-16 Thread Andrey V. Elsukov
rg/html/rfc2473 -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: pagefault in IPv6 codepath in defrouter_select()

2015-03-26 Thread Andrey V. Elsukov
prefix. -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: IPSec Performance under Xen

2015-04-23 Thread Andrey V. Elsukov
is for every PCB? Why not initialize inp_sp only when application does needed configuration via setsockopt(IP_IPSEC_POLICY)? -- WBR, Andrey V. Elsukov ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net T

Re: IPSec Performance under Xen

2015-04-23 Thread Andrey V. Elsukov
t: #ifdef IPSEC - switch(ip_ipsec_output(&m, inp, &flags, &error)) { + switch(ip_ipsec_output(&m, NULL, &flags, &error)) { case 1: goto bad; case -1: -- WBR, Andrey V. Elsukov ___ freebs

Re: IPSec Performance under Xen

2015-04-23 Thread Andrey V. Elsukov
with new VM's but i will set up a IPSec connection and report back. Thank you. But I think something will not work if you try it with IPSec. Probably if you use some IKE software, it will not work with this patch. -- WBR, Andrey V. Elsukov ___ fr

Re: FreeBSD makes linux think other subet is in same lan.

2015-05-06 Thread Andrey V. Elsukov
Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: FreeBSD makes linux think other subet is in same lan.

2015-05-07 Thread Andrey V. Elsukov
0.11.12.13) at on eth0 > ? (192.168.1.125) at b4:52:7e:95:2a:f5 [ether] on eth0 I think it is because FreeBSD sends ICMP redirects when it finds that route to the given destination goes back to the receiving interface. Try to disable ICMP redirects: # sysctl net.inet.ip.redirect=0

Re: Crash with GRE und IPFW fwd

2015-05-28 Thread Andrey V. Elsukov
get the crash dump and show content of your /var/crash/core.txt.N file? Also can you try this module instead of one from your base system? https://people.freebsd.org/~ae/gre-10.tgz This is ported to stable/10 version from 11.0-CURRENT. -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: Crash with GRE und IPFW fwd

2015-05-28 Thread Andrey V. Elsukov
gre(4) uses mbuf_tag to prevent infinity loop and stack exhausting. When packet goes through ip_divert, it loses this tag. You need to check your rules and avoid applying divert rules to GRE packets. Also you can use some netgraph based tcpmss implementation. -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: Crash with GRE und IPFW fwd

2015-05-28 Thread Andrey V. Elsukov
On 28.05.2015 17:22, Julian Kornberger wrote: > Am 28.05.2015 um 15:59 schrieb Andrey V. Elsukov:> Can you enable > dumpon(8) in your rc.conf, then get the crash dump and >> show content of your /var/crash/core.txt.N file? >> >> Also can you try this module instead o

Re: Crash with GRE und IPFW fwd

2015-05-28 Thread Andrey V. Elsukov
On 29.05.2015 04:13, Julian Kornberger wrote: > Am 29.05.2015 um 01:35 schrieb Andrey V. Elsukov: >> The actual panic occurs when ip_output() does RO_RTFREE() to cached >> route owned by gre(4). >> >> #7 0x80a58105 in ip_output (m=0xf800054bb000, >&g

Re: Crash with GRE und IPFW fwd

2015-06-06 Thread Andrey V. Elsukov
On 01.06.2015 18:56, Julian Kornberger wrote: > Am 28.05.2015 um 15:59 schrieb Andrey V. Elsukov: >> Also can you try this module instead of one from your base system? >> https://people.freebsd.org/~ae/gre-10.tgz >> >> This is ported to stable/10 version from 11.0-CUR

Re: Multicast routing questions

2015-06-25 Thread Andrey V. Elsukov
n on the router some app has been joined to multicast group on the specific interface used as outgoing in send_packet. -- WBR, Andrey V. Elsukov ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscrib

Re: Multicast routing questions

2015-06-25 Thread Andrey V. Elsukov
uter. So, if you break something, this will not be found soon. -- WBR, Andrey V. Elsukov ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"

Re: radvd issue on CURRENT

2015-07-03 Thread Andrey V. Elsukov
r(ifp, &pktinfo->ipi6_addr); if (ia == NULL) return (EADDRNOTAVAIL); -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: What does this sa6_recoverscope msg mean?

2015-07-07 Thread Andrey V. Elsukov
e ndp command shows two other devices on the network which it claims are > routers. But I still can't get routing. > > Is the above message pointing at my error or at my provider's error? No, this is debug message. It means that sin6_scope_id is already filled in struct sockaddr

Re: routine that configure 127.0.0.1

2015-10-01 Thread Andrey V. Elsukov
On 01.10.2015 06:39, Sechang Son wrote: > Hi, > > Can somebody tell me the name of the routine that configures 127.0.0.1 to > loif of Vnet‹i.e., V_loif? I checked Œvnet_loif_init¹ but it does not seem > to be doing thatŠ Thanks a lot. It is ipv4_up() from /etc/network.subr. --

Re: Page fault after destroying/reconfiguring GRE interface

2015-10-04 Thread Andrey V. Elsukov
f81d00, off=20) > at /usr/src/sys/netinet/ip_encap.c:149 > #10 0x80a77f57 in ip_input (m=0xf8001ef81d00) > at /usr/src/sys/netinet/ip_input.c:734 > [...] > > Any ideas? Can you test this patch? -- W

Re: Page fault after destroying/reconfiguring GRE interface

2015-10-05 Thread Andrey V. Elsukov
https://svnweb.freebsd.org/base?view=revision&revision=288529 -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: panic: refcount inconsistency: found: 0 total: 1

2015-11-03 Thread Andrey V. Elsukov
breakage. -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: ipfw tags & filtering incoming broadcasts

2007-04-11 Thread Andrey V. Elsukov
deserve a PR? If you want filter a RIPv2 packets, may be it's a good idea to use src-port or dst-port 520 with udp protocol? -- WBR, Andrey V. Elsukov ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Re: ng_tag and pf?

2007-04-17 Thread Andrey V. Elsukov
> Is it possible to use ng_tag in conjunction with pf? I have a setup At this time it's impossible. You can use ng_tag(4) in conjunction with ipfw(4). -- WBR, Andrey V. Elsukov ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org

Re: ipfw nat befuddlement

2007-10-07 Thread Andrey V. Elsukov
IPFIREWALL_VERBOSE #enable logging to syslogd(8) > options IPFIREWALL_VERBOSE_LIMIT=100#limit verbosity > options IPDIVERT > options LIBALIAS You need also: options IPFIREWALL_NAT #ipfw kernel na

Re: ipfw nat befuddlement

2007-10-08 Thread Andrey V. Elsukov
Randy Bush wrote: # grep -n nat /etc/ipfw.rules 33:add nat 123 all from any to any 34:add nat 123 config if vr0 - add is not needed here. -- WBR, Andrey V. Elsukov ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman

Re: IPFW/Divert problem...

2007-11-05 Thread Andrey V. Elsukov
: About which lines you talk? -- WBR, Andrey V. Elsukov ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Re: IPFW/Divert problem...

2007-11-06 Thread Andrey V. Elsukov
accounting. In the your /etc/ipfw.sh script you should use "-f" flag when you run ipfw flush command. -- WBR, Andrey V. Elsukov ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Re: IPFW/Divert problem...

2007-11-06 Thread Andrey V. Elsukov
rt script. 2) Are you sure? [yn] - message from ipfw, when you run `ipfw flush` in the /etc/ipfw.sh script. -- WBR, Andrey V. Elsukov ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Re: WOL suport in Broadcom 5721 (57XX)

2007-12-17 Thread Andrey V. Elsukov
was a discussion about WOL support. Look to topics: 1. FreeBSD WOL sis on 2. How to add wake on lan support for your card And as i remember, Sam Leffer has made some work for WOL support. -- WBR, Andrey V. Elsukov ___ freebsd-net@freebsd.org mailing list

Re: addition to ipfw table..

2008-04-16 Thread Andrey V. Elsukov
t my patch? -- WBR, Andrey V. Elsukov Index: src/sbin/ipfw/ipfw2.c === RCS file: /ncvs/src/sbin/ipfw/ipfw2.c,v retrieving revision 1.118 diff -u -p -r1.118 ipfw2.c --- src/sbin/ipfw/ipfw2.c 27 Feb 2008 13:52:33 - 1.118 ++

Re: kern/123053: [re] re(4) unsupported hardware revision

2008-04-24 Thread Andrey V. Elsukov
ch has this hardware. -- WBR, Andrey V. Elsukov ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Re: [Removal of mrouted in FreeBSD-7.0]

2008-06-06 Thread Andrey V. Elsukov
mrouted, you can install it from ports/net/mrouted. -- WBR, Andrey V. Elsukov ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Re: NAT-before-ipsec using if_ipsec

2017-08-24 Thread Andrey V. Elsukov
this: > > nat on ipsec0 from 172.30.1.1/28 to any -> 172.30.1.1 > > But while it works on external interfaces, it does nothing for ipsec. Can you describe your configuration, it is not clear to me, how you expect it should work? -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: Need help

2017-09-12 Thread Andrey V. Elsukov
the header usually doesn't automatically add support for this device. You need to teach probe function to use defined id. So, you need to add this id to some array in the if_em.c, probably this is igb_vendor_info_array. -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: Need help

2017-09-12 Thread Andrey V. Elsukov
On 12.09.2017 16:35, Andrey V. Elsukov wrote: >> Either add E1000_DEV_ID_I350_COPPER_NOEE elsewhere, or try without _NOEE >> appendix if datasheet suggests. > > Hi, > > just defining device id in the header usually doesn't automatically add > support for this

Splitting Mellanox ConnectX-4 interface using breakout cables

2017-09-13 Thread Andrey V. Elsukov
Hi All, we are wondering, is it possible to use such configuration under FreeBSD? I.e. split one mce interface 40G => 4x10G or 100G => 4x25G? -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: Splitting Mellanox ConnectX-4 interface using breakout cables

2017-09-13 Thread Andrey V. Elsukov
is one card with QSPF28 splited into 4x10G. -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: FreeBSD 11.1-RELEASE: Kernel panic in ipv6_output() via tcp6_usr_connect()

2017-10-31 Thread Andrey V. Elsukov
pp=0x0, inp=) at > /usr/src/sys/netinet6 Hi, can you show your nat rules? Also what will show following commands in kgdb: f 9 i lo p *ifp p *ro p *m -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: FreeBSD 11.1-RELEASE: Kernel panic in ipv6_output() via tcp6_usr_connect()

2017-11-01 Thread Andrey V. Elsukov
om any to any via "$oif" From first glance I don't see any restrictions in libalias/nat44 to not try to translate IPv6 packet assuming it as IPv4. -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: FreeBSD 11.1-RELEASE: Kernel panic in ipv6_output() via tcp6_usr_connect()

2017-11-06 Thread Andrey V. Elsukov
one = 1; /* exit outer loop */ - if (!IPFW_NAT_LOADED) { + if (!is_ipv4 || !IPFW_NAT_LOADED) { retval = IP_FW_DENY; break; } -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: FreeBSD 11.1-RELEASE: Kernel panic in ipv6_output() via tcp6_usr_connect()

2017-11-06 Thread Andrey V. Elsukov
described in https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=206231 And the proposed patch is partially like your. I think if you still have the problem you need to reopen this PR. -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

  1   2   3   4   >