=ffed07bb
ether b8:ce:f6:81:df:6a
inet 192.168.10.31 netmask 0xff00 broadcast 192.168.10.255
media: Ethernet 25GBase-CR
status: active
nd6 options=29
Hi,
Do you have the same MTU size on linux machine?
--
WBR, Andrey V. Elsukov
OpenPGP_signature
&optval, sizeof(optval)) == -1)
err(1, "setsockopt(IPV6_USE_MIN_MTU)");
}
```
--
WBR, Andrey V. Elsukov
OpenPGP_signature
Description: OpenPGP digital signature
ind and delete deprecated addresses from an
interface.
Then NPTv6 module will use first global prefix on the interface.
--
WBR, Andrey V. Elsukov
OpenPGP_signature
Description: OpenPGP digital signature
res
appearance of new IPv6 address.
2. Then, even if you delete old IPv6 address by hand, NPTv6 won't try to
peak another one until there won't appear new address.
3. There should be some logic that takes into account presence of
temporary and deprecated addresses on the interface
hen modify ETHER_BPF_MTAP() macro, probably make
some tweaks for tcpdump and you will get what you need. It seems not so
hard.
--
WBR, Andrey V. Elsukov
IPv6. Make sure your firewall doesn't block
ICMPv6 types needed for IPv6 to work. Check that multicast functions
correctly.
# ifconfig
# ndp -an
# netstat -s
# ifmstat
--
WBR, Andrey V. Elsukov
x27;m missing?
Hi,
probably you need to use rtsold(8).
--
WBR, Andrey V. Elsukov
00
reqid: 104
pf firewall entries are set to allow esp over that tunnel.
Now, I do want to route local IPv6 in addition, *if* that is possible, at all.
Hi,
try something like this:
ifconfig_ipsec0_ipv6="inet6 fd00:b:b:b::250 fd00:a:a:a::254 prefixlen
128"
--
WBR, Andrey V. Elsukov
find, can be found at:
> http://people.freebsd.org/~emaste/patches/fwd_tag_findpcb.diff
Hi Ed,
it seems this problem was there before my breakage.
Also, it think that m_tag_unlink is redundant here, because you clear
the M_IP_NEXTHOP/M_IP6_NEXTHOP f
x27;t use #ifdefs with
increased size here. So, what the best way to fix this?
--
WBR, Andrey V. Elsukov
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-ne
On 01.07.2013 16:26, Vijay Singh wrote:
> If you enable OFED, then the llentry size is expanded to store IB addresses
> as well. Code should be in 9.x.
Yes, but this isn't solution.
--
WBR, Andrey V. Elsukov
___
freebsd-net@freebsd.org m
ch includes fixes for several issues relating to FIBs:
Hi,
I also have a small patch.
Since icmp6_mtudisc_update() calls tcp_maxmtu6() where inc->inc_fibnum
is used, I think it is good idea to initialize this field.
--
WBR, Andrey V. Elsukov
6p_lookup_mcast_ifp() function. It seems to me,
that v4mapped addresses isn't supported in the multicast code. If you
remove KASSERT from in6p_lookup_mcast_ifp(), this address will be
treated as invalid later.
--
WBR, Andrey V. Elsukov
signature.asc
Description: OpenPGP digital signature
also there are many of small changes that
should be done. I would like to see your opinions about first point.
[1] http://tinyurl.com/figure2-12
--
WBR, Andrey V. Elsukov
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo
packets are "intact". Why does the kernel not forward those
> packets?
What is the last rule? I suspect it is "deny all"?
--
WBR, Andrey V. Elsukov
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listin
on't see in the code how it can affect routing.
Make sure:
1. net.inet.ip.forwarding=1 (gateway_enable="YES" in rc.conf)
2. you have route and gateway is reachable (route get/arp -n).
--
WBR, Andrey V. Elsukov
___
freebsd-net
to route (with fastforwarding)
about 7 Mpps IPv4 and 2.5Mpps IPv6. But the stock system is far from
even half of this results.
--
WBR, Andrey V. Elsukov
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To un
On 05.12.2011 9:29, Adrian Chadd wrote:
> Hi,
>
> Can you please just fire up kgdb and get a backtrace from the core?
There should be core.X.txt file, usually it already has a backtrace.
--
WBR, Andrey V. Elsukov
___
freebsd-net@freebsd.or
site: http://userfw.net/
Hi, Maxim
Why do you called it "userfw"? Does it work in user level? :)
--
WBR, Andrey V. Elsukov
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send
om A.
> What's the reason? I'm really confused with what I saw! Is it a bug?
>
> Any hints or suggestions are really appreciated.
Please, read the ipfw(4) manual page about the sysctl variable
net.link.ether.ipfw.
--
WBR, Andrey V. Elsukov
ifp = NULL;
> - IFNET_RUNLOCK_NOSLEEP();
> -
> - KASSERT(ifp != NULL, ("%s: ifnet went away", __func__));
> -#endif
> if (ifp == NULL)
> return (ENOENT);
>
>
--
WBR, Andrey V. Elsukov
__
gt;
> Index: if_vlan.c
> ===
> --- if_vlan.c (revision 239294)
Hi, John.
This also works, thanks.
--
WBR, Andrey V. Elsukov
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send a
/pfil_forward.diff
Also we have done some tests with the ixia traffic generator connected
via 10G network adapter. Tests have show that there is no visible
difference, and there is no visible performance degradation.
Any objections?
--
WBR, Andrey V. Elsukov
signature.asc
Description: OpenPGP
e
net.inet.ip.forwarding and net.inet6.ip6.forwarding variables, and
placing it into net.inet.ip.fw is undesirable, because we can have
kernel without ipfw. So, i decided to choose pfil, because it could not
work without pfil.
--
WBR, Andrey V. Elsukov
signature.asc
Description: OpenPGP digital signature
But I think 512
buckets is too many.
2. What hash function is better to use?
3. Using the whole 128 bit of address to hash seems like overkill.
--
WBR, Andrey V. Elsukov
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/fr
WBR, Andrey V. Elsukov
signature.asc
Description: OpenPGP digital signature
The following reply was made to PR kern/157802; it has been noted by GNATS.
From: "Andrey V. Elsukov"
To: bug-follo...@freebsd.org, alexey_kovale...@inbox.ru
Cc:
Subject: Re: kern/157802: [dummynet] [panic] kernel panic in dummynet
Date: Thu, 16 Jun 2011 15:05:59 +0400
Hi, Alexey
--
WBR, Andrey V. Elsukov
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"
, Andrey V. Elsukov
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"
Peter Kirk wrote:
On Friday 20 June 2008 11:10:06 Andrey V. Elsukov wrote:
I have a fresh installation of FreeBSD7 on x86, with no big changes to
the system.
Can you show `ifconfig -u` output?
re0: flags=8843 metric 0 mtu 1500
options=9b
It's problem in re(4) driver.
Try t
ror: for each function it appears in.)
*** Error code 1
IPFW_TABLES_MAX seems like defined in netinet/ip_fw.h, which is included
in ipfw2.c:
IPFW_TABLES_MAX protected by _KERNEL macro. This is why you get
an error.
--
WBR, Andrey V. Elsukov
___
freebs
remote CDP
Something similar was rejected at least two times :)
http://www.freebsd.org/cgi/query-pr.cgi?pr=kern/83622
http://www.freebsd.org/cgi/query-pr.cgi?pr=kern/110720
--
WBR, Andrey V. Elsukov
___
freebsd-net@freebsd.org mailing
k this information through ifconfig(8) with a
callback, clean up the file upon restart, but we can not prevent other
programs from calling IOCSIFNAME on the interface. Any idea for this?
What about using interface index as a key(see if_nameindex(3))?
--
WBR, Andrey V. Elsukov
__
On 24.07.2014 16:47, John Jasen wrote:
> On 07/24/2014 05:24 AM, Andrey V. Elsukov wrote:
>> On 22.07.2014 19:18, John Jasen wrote:
>>> Feedback and/or tips and tricks more than welcome.
>>>
>>> Outstanding questions:
>>>
>>> Would i
better to fix this in the kernel or the JDK.
Hi,
you said that this code works in linux. I looked in the linux kernel
source, and I think it should return EINVAL too.
net/ipv6/mcast.c:ipv6_sock_mc_join:
154 if (!ipv6_addr_is_multicast(addr))
155
On 03.09.2014 17:39, Craig Rodrigues wrote:
> On Wed, Sep 3, 2014 at 5:19 AM, Andrey V. Elsukov wrote:
>> On 03.09.2014 14:05, bugzilla-nore...@freebsd.org wrote:
>>
>> Hi,
>>
>> you said that this code works in linux. I looked in the linux kernel
>> sour
l panic occurs. Hence, when we do not get an
>> interface,
>> A> > we just drop the packet in question.
> Ok, moving off to freebsd-net. How should we proceded with debugging
> further?
Probably this can occurs when outgoing interface disappeared
(netgrapg/tun/tap/lagg
p;revision=256673
--
WBR, Andrey V. Elsukov
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"
imilar functional will be needed when mobile IPv6 support will
be added.
--
WBR, Andrey V. Elsukov
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"
? It is small and should be applicable
to stable/10.
--
WBR, Andrey V. Elsukov
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"
On 21.10.2014 00:00, Matthew Grooms wrote:
> On 10/20/2014 2:47 PM, Andrey V. Elsukov wrote:
>> On 20.10.2014 20:18, Matthew Grooms wrote:
>>> Lastly, I tried to locate a relevant PR but didn't find anything
>>> concrete. Is this related to the issue? And if s
e pfil consumer and not the other.
pf and ipfw deal differently when they want to determine incoming interface.
> It looks like the last commit to 10.0-RELEASE is r255926, which is the
> last real code change ( r257176 is just a header file include ) before
> your commit of 272695 in C
th using gif + IPsec
> transport mode instead of enc + IPsec tunnel mode. I was hoping that
> changing the configuration would work around the issue. Unfortunately,
> gif + IPsec transport mode was exhibiting the same type of problems that
> enc +
r and outer header.
* deprecate support for various GREXXX ioctls, use our standard ioctls
for tunnels.
me(4):
* use the same locking model as gre(4);
* use if_transmit;
* implementation conform to RFC 2004;
--
WBR, Andrey V. Elsukov
signature.asc
Description: OpenPGP digital signature
On 29.10.2014 12:35, Andrey V. Elsukov wrote:
> Hi All,
>
> I prepared the patch for review
> https://reviews.freebsd.org/D1023
For those who want to test, I prepared a tarball with sources
https://people.freebsd.org/~ae/gre.tgz
Modules should work on stable/10 and h
dress before doing ip_savecontrol.
Hi,
udp_input() doesn't overwrite destination address. Probably you have NAT
that does this.
--
WBR, Andrey V. Elsukov
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
dp_usrreq.c?v=FREEBSD8#L461
The more recent FreeBSD versions don't overwrite destination address.
https://svnweb.freebsd.org/base?view=revision&revision=225044
--
WBR, Andrey V. Elsukov
___
freebsd-net@freebsd.org mailing list
4/IPv6 on rate close to 8.6 Mpps. The same kernel compiled with IPSEC
can forward only 180 kpps. I think this problem should be solved before
enabling it in GENERIC.
--
WBR, Andrey V. Elsukov
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.
t;
> I think this is why we need IPSEC in GENERIC to let more tests involved.
> Maybe it also helps in kernel SSL encryption (key per IP vs per TCP
> session).
IPSEC had unresolved bugs for years, and now all will be magically
fixed. I think we need some way to enable/disable it on th
On 05.11.2014 19:18, Evandro Nunes wrote:
> On Wed, Nov 5, 2014 at 1:52 PM, Andrey V. Elsukov wrote:
>
>> On 05.11.2014 18:39, George Neville-Neil wrote:
>>> Howdy,
>>>
>>> Last night (Pacific Time) I committed a change so that GENERIC, on HEAD
>>>
On 05.11.2014 18:52, Andrey V. Elsukov wrote:
> recently we did some IP forwarding tests and the GENERIC kernel is
> several times faster than GENERIC+IPSEC. Even when IPSEC has no SA.
>
> I didn't do test on vanilla kernel, but our kernel is able forward
> IPv4/IPv6 on ra
a difference between these two approaches?
> I notice that, with a custom kernel, patching is much more complex and
> time consuming. As binary updates are not possible any more.
You don't need rebuild the kernel. Just load the module.
--
WBR, Andrey V. Elsukov
__
generic code in
the network stack.
--
WBR, Andrey V. Elsukov
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"
tunnel modes with and without
gif(4)/gre(4). So, just tried between two CURRENT hosts and it works.
I use racoon and isakmpd for IKE. ICMP, TCP (ssh) and UDP (ike) works
for me. How do you test? Do you use software crypto or aesni?
--
WBR, Andrey V. Elsukov
signature.asc
Description: OpenPGP digital signature
my side through a firewall with inner address Y and outer
> address U.
Do you use gif(4) to create tunnels?
--
WBR, Andrey V. Elsukov
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send
On 20.11.2014 20:38, Adrian Chadd wrote:
> On 20 November 2014 09:33, Andrey V. Elsukov wrote:
>> Hi All,
>>
>> we already did some changes in network stack in head/, that made ability
>> for merging changes into stable branches much harder.
>>
>> What you
ply arrives later, the packet is not printed as replied,
but considered as replied when calculating statistics.
-X timeout
Specify a timeout, in seconds, before ping exits regardless of
how many packets have been received.
--
WBR, Andrey V. Elsukov
___
x27;t contain some user-visible/useful feature,
that users can test or discuss, please, use special phabricator's group
'#network' for review instead of freebsd-net@.
Thanks.
--
WBR, Andrey V. Elsukov
signature.asc
Description: OpenPGP digital signature
y of original mbuf.
Are you sure this doesn't introduce mbuf leak?
--
WBR, Andrey V. Elsukov
signature.asc
Description: OpenPGP digital signature
fs6_in_truncated);
> + goto bad;
> + }
This is very rare case, I think, but plen can be zero in case, when
jumbo payload option is present. Probably this is the reason why this
check is done after hop-by-hop options parsing.
--
WBR, Andrey V. Elsukov
signature.asc
Description: OpenPGP digital signature
rg/html/rfc2473
--
WBR, Andrey V. Elsukov
signature.asc
Description: OpenPGP digital signature
prefix.
--
WBR, Andrey V. Elsukov
signature.asc
Description: OpenPGP digital signature
is for every PCB? Why not initialize inp_sp only when
application does needed configuration via setsockopt(IP_IPSEC_POLICY)?
--
WBR, Andrey V. Elsukov
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
T
t:
#ifdef IPSEC
- switch(ip_ipsec_output(&m, inp, &flags, &error)) {
+ switch(ip_ipsec_output(&m, NULL, &flags, &error)) {
case 1:
goto bad;
case -1:
--
WBR, Andrey V. Elsukov
___
freebs
with new VM's but i will set up a IPSec connection and report back.
Thank you. But I think something will not work if you try it with IPSec.
Probably if you use some IKE software, it will not work with this patch.
--
WBR, Andrey V. Elsukov
___
fr
Andrey V. Elsukov
signature.asc
Description: OpenPGP digital signature
0.11.12.13) at on eth0
> ? (192.168.1.125) at b4:52:7e:95:2a:f5 [ether] on eth0
I think it is because FreeBSD sends ICMP redirects when it finds that
route to the given destination goes back to the receiving interface.
Try to disable ICMP redirects:
# sysctl net.inet.ip.redirect=0
get the crash dump and
show content of your /var/crash/core.txt.N file?
Also can you try this module instead of one from your base system?
https://people.freebsd.org/~ae/gre-10.tgz
This is ported to stable/10 version from 11.0-CURRENT.
--
WBR, Andrey V. Elsukov
signature.asc
Description: OpenPGP digital signature
gre(4) uses mbuf_tag to prevent
infinity loop and stack exhausting. When packet goes through ip_divert,
it loses this tag. You need to check your rules and avoid applying
divert rules to GRE packets. Also you can use some netgraph based tcpmss
implementation.
--
WBR, Andrey V. Elsukov
signature.asc
Description: OpenPGP digital signature
On 28.05.2015 17:22, Julian Kornberger wrote:
> Am 28.05.2015 um 15:59 schrieb Andrey V. Elsukov:> Can you enable
> dumpon(8) in your rc.conf, then get the crash dump and
>> show content of your /var/crash/core.txt.N file?
>>
>> Also can you try this module instead o
On 29.05.2015 04:13, Julian Kornberger wrote:
> Am 29.05.2015 um 01:35 schrieb Andrey V. Elsukov:
>> The actual panic occurs when ip_output() does RO_RTFREE() to cached
>> route owned by gre(4).
>>
>> #7 0x80a58105 in ip_output (m=0xf800054bb000,
>&g
On 01.06.2015 18:56, Julian Kornberger wrote:
> Am 28.05.2015 um 15:59 schrieb Andrey V. Elsukov:
>> Also can you try this module instead of one from your base system?
>> https://people.freebsd.org/~ae/gre-10.tgz
>>
>> This is ported to stable/10 version from 11.0-CUR
n on the router some app has
been joined to multicast group on the specific interface used as
outgoing in send_packet.
--
WBR, Andrey V. Elsukov
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscrib
uter. So, if you
break something, this will not be found soon.
--
WBR, Andrey V. Elsukov
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"
r(ifp, &pktinfo->ipi6_addr);
if (ia == NULL)
return (EADDRNOTAVAIL);
--
WBR, Andrey V. Elsukov
signature.asc
Description: OpenPGP digital signature
e ndp command shows two other devices on the network which it claims are
> routers. But I still can't get routing.
>
> Is the above message pointing at my error or at my provider's error?
No, this is debug message. It means that sin6_scope_id is already filled
in struct sockaddr
On 01.10.2015 06:39, Sechang Son wrote:
> Hi,
>
> Can somebody tell me the name of the routine that configures 127.0.0.1 to
> loif of Vnet‹i.e., V_loif? I checked Œvnet_loif_init¹ but it does not seem
> to be doing thatŠ Thanks a lot.
It is ipv4_up() from /etc/network.subr.
--
f81d00, off=20)
> at /usr/src/sys/netinet/ip_encap.c:149
> #10 0x80a77f57 in ip_input (m=0xf8001ef81d00)
> at /usr/src/sys/netinet/ip_input.c:734
> [...]
>
> Any ideas?
Can you test this patch?
--
W
https://svnweb.freebsd.org/base?view=revision&revision=288529
--
WBR, Andrey V. Elsukov
signature.asc
Description: OpenPGP digital signature
breakage.
--
WBR, Andrey V. Elsukov
signature.asc
Description: OpenPGP digital signature
deserve a PR?
If you want filter a RIPv2 packets, may be it's a good idea
to use src-port or dst-port 520 with udp protocol?
--
WBR, Andrey V. Elsukov
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"
> Is it possible to use ng_tag in conjunction with pf? I have a setup
At this time it's impossible. You can use ng_tag(4) in conjunction with ipfw(4).
--
WBR, Andrey V. Elsukov
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org
IPFIREWALL_VERBOSE #enable logging to syslogd(8)
> options IPFIREWALL_VERBOSE_LIMIT=100#limit verbosity
> options IPDIVERT
> options LIBALIAS
You need also:
options IPFIREWALL_NAT #ipfw kernel na
Randy Bush wrote:
# grep -n nat /etc/ipfw.rules
33:add nat 123 all from any to any
34:add nat 123 config if vr0
- add is not needed here.
--
WBR, Andrey V. Elsukov
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman
:
About which lines you talk?
--
WBR, Andrey V. Elsukov
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"
accounting.
In the your /etc/ipfw.sh script you should use "-f" flag when you run
ipfw flush command.
--
WBR, Andrey V. Elsukov
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"
rt script.
2) Are you sure? [yn] - message from ipfw, when you run `ipfw flush` in the
/etc/ipfw.sh script.
--
WBR, Andrey V. Elsukov
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"
was a discussion about WOL support. Look to topics:
1. FreeBSD WOL sis on
2. How to add wake on lan support for your card
And as i remember, Sam Leffer has made some work for WOL support.
--
WBR, Andrey V. Elsukov
___
freebsd-net@freebsd.org mailing list
t my patch?
--
WBR, Andrey V. Elsukov
Index: src/sbin/ipfw/ipfw2.c
===
RCS file: /ncvs/src/sbin/ipfw/ipfw2.c,v
retrieving revision 1.118
diff -u -p -r1.118 ipfw2.c
--- src/sbin/ipfw/ipfw2.c 27 Feb 2008 13:52:33 - 1.118
++
ch has this hardware.
--
WBR, Andrey V. Elsukov
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"
mrouted, you can install it from ports/net/mrouted.
--
WBR, Andrey V. Elsukov
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"
this:
>
> nat on ipsec0 from 172.30.1.1/28 to any -> 172.30.1.1
>
> But while it works on external interfaces, it does nothing for ipsec.
Can you describe your configuration, it is not clear to me, how you
expect it should work?
--
WBR, Andrey V. Elsukov
signature.asc
Description: OpenPGP digital signature
the header usually doesn't automatically add
support for this device. You need to teach probe function to use defined
id. So, you need to add this id to some array in the if_em.c, probably
this is igb_vendor_info_array.
--
WBR, Andrey V. Elsukov
signature.asc
Description: OpenPGP digital signature
On 12.09.2017 16:35, Andrey V. Elsukov wrote:
>> Either add E1000_DEV_ID_I350_COPPER_NOEE elsewhere, or try without _NOEE
>> appendix if datasheet suggests.
>
> Hi,
>
> just defining device id in the header usually doesn't automatically add
> support for this
Hi All,
we are wondering, is it possible to use such configuration under
FreeBSD? I.e. split one mce interface 40G => 4x10G or 100G => 4x25G?
--
WBR, Andrey V. Elsukov
signature.asc
Description: OpenPGP digital signature
is one card with QSPF28 splited into 4x10G.
--
WBR, Andrey V. Elsukov
signature.asc
Description: OpenPGP digital signature
pp=0x0, inp=) at
> /usr/src/sys/netinet6
Hi,
can you show your nat rules?
Also what will show following commands in kgdb:
f 9
i lo
p *ifp
p *ro
p *m
--
WBR, Andrey V. Elsukov
signature.asc
Description: OpenPGP digital signature
om any to any via "$oif"
From first glance I don't see any restrictions in libalias/nat44 to not
try to translate IPv6 packet assuming it as IPv4.
--
WBR, Andrey V. Elsukov
signature.asc
Description: OpenPGP digital signature
one = 1; /* exit outer loop */
- if (!IPFW_NAT_LOADED) {
+ if (!is_ipv4 || !IPFW_NAT_LOADED) {
retval = IP_FW_DENY;
break;
}
--
WBR, Andrey V. Elsukov
signature.asc
Description: OpenPGP digital signature
described in
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=206231
And the proposed patch is partially like your. I think if you still have
the problem you need to reopen this PR.
--
WBR, Andrey V. Elsukov
signature.asc
Description: OpenPGP digital signature
1 - 100 of 317 matches
Mail list logo