[Bug 227461] [hast] regression, unable to start hast, pid XXX (hastd), uid 0: exited on signal 6 (core dumped)

2018-04-17 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=227461

--- Comment #5 from e...@norma.perm.ru ---
Created attachment 192583
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=192583&action=edit
HAST nodebug patch

This patch removes several debug lines leading to SIGABRT.

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
freebsd-net@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


[Bug 227461] [hast] regression, unable to start hast, pid XXX (hastd), uid 0: exited on signal 6 (core dumped)

2018-04-17 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=227461

--- Comment #6 from e...@norma.perm.ru ---
This patch removes the debugging leading to SIGABRT, the author is
a...@freebsd.org. ae@ is pessimistic about it, saying that it solves nothing, 
and
just makes HAST to contunue by removing the abort() call in pjdlog_abort().

However, this got me a working HAST, first time without a bunch of
warning/error/assert messages on both nodes.

This probably need more attention.

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
freebsd-net@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


[Bug 221919] ixl: TX queue hang when using TSO and having a high and mixed network load

2018-04-17 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=221919

Steven Hartland  changed:

   What|Removed |Added

 CC||s...@freebsd.org

--- Comment #18 from Steven Hartland  ---
That review is still pending.

We've just had what appears to be a RX hang with TSO disabled, related?

No messages in /var/log/messages tcpdump still showing outbound traffic but no
inbound, had to reboot to recover.

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
freebsd-net@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


[Bug 227502] Unable to add pfsense as monitored target in ntopng

2018-04-17 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=227502

--- Comment #2 from Florin Samareanu  ---
Hello,

I got this in the ntopng bug I raised (
https://github.com/ntop/ntopng/issues/1734 ):

@fsamareanu sure. In SNMP some fields are encoded with TLV (Type Length Value),
where the length specifies how many bytes to read on the next field. The daemon
you are using seems to ignore the "Length" value from some SNMP fields (at
least in version, error-status, error-index fields) and assume length 1. This
works well with snmpwalk which uses a 1 byte values but it does not with ntopng
which uses 4 bytes values.

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
freebsd-net@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


[Bug 227502] Unable to add pfsense as monitored target in ntopng

2018-04-17 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=227502

--- Comment #3 from Eugene Grosbein  ---
(In reply to Florin Samareanu from comment #2)

The problem is more complex. Indeed, "In SNMP some fields are encoded with TLV
(Type Length Value), where the length specifies how many bytes to read on the
next field" - that's true. But ASN.1/DER encoding standard states that if
integer value is small enought to be fit in single byte, it MUST be encoded
with single byte and using 4 bytes is not allowed for such case by this
standard.

snmpwalk can send small or large integers and it encodes them just right using
noted "minimal integer" encoding: 1 or more bytes correspongingly. bsnmpd
parses both of small and large TLV fileds just fine.

On the other hand, ejrh/snmp library used by ntopng ALWAYS encodes integers
using 4 bytes, even for small values (R=1 in the test above). That is standard
violation that does not pass bsnmpd's strict validation, but pass relaxed
validation of net-snmpd.

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
freebsd-net@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


[Bug 193953] vlan(4) on LACP lagg(4) do not update if_baudrate value and thus SNMP daemons do not provide high capacity counters

2018-04-17 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=193953

Eugene Grosbein  changed:

   What|Removed |Added

   See Also||https://reviews.freebsd.org
   ||/D15112

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-net@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


Changed behaviour of pf after new handling of EACCES in tcp_output() in r315514

2018-04-17 Thread Andreas Longwitz
In FreeBSD V11 the commit r315514 introduced a new handling of the error
code EACCES from ip_output() in tcp_output.c:

   case EACCES:
tp->t_softerror = error;
return (0);

If I use pf and block output with a rule like
   block out quick on em0 inet proto tcp from any to any port 23
and try
  date; telnet 192.168.0.122 23; date
then I see in V10 immediately reply

Di 17 Apr 2018 10:46:37 CEST
Trying 192.168.0.122...
telnet: connect to address 192.168.0.122: Permission denied
telnet: Unable to connect to remote host
Di 17 Apr 2018 10:46:37 CEST

and in V11 with commit r315514 the same reply after 90 seconds, in the
meantime telnet is waiting on WCHAN "connec":

Di. 17 Apr. 2018 10:46:28 CEST
Trying 192.168.0.122...
telnet: connect to address 192.168.0.122: Permission denied
telnet: Unable to connect to remote host
Di. 17 Apr. 2018 10:47:43 CEST

I like to know if this is intended behaviour.

Andreas Longwitz

___
freebsd-net@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


Re: Changed behaviour of pf after new handling of EACCES in tcp_output() in r315514

2018-04-17 Thread Andrey V. Elsukov
On 17.04.2018 17:02, Andreas Longwitz wrote:
> and in V11 with commit r315514 the same reply after 90 seconds, in the
> meantime telnet is waiting on WCHAN "connec":
> 
> Di. 17 Apr. 2018 10:46:28 CEST
> Trying 192.168.0.122...
> telnet: connect to address 192.168.0.122: Permission denied
> telnet: Unable to connect to remote host
> Di. 17 Apr. 2018 10:47:43 CEST
> 
> I like to know if this is intended behaviour.

This change was based on
https://svnweb.freebsd.org/base?view=revision&revision=309610

Now I think it can be removed, because:

1. SAs should be configured by application before initiating of TCP
connection;
2. If there are no matching SAs, connection will be dropped after
several tries.
3. Even if connection will be dropped after first failed SYN, there is
special tcps_sig_err_buildsig error counter, that will be incremented
and we can determine the cause.

So, can you try this patch? And maybe someone who uses TCP-MD5 can try
it too (with and without configured SAs)?

-- 
WBR, Andrey V. Elsukov
Index: tcp_output.c
===
--- tcp_output.c	(revision 332505)
+++ tcp_output.c	(working copy)
@@ -1586,8 +1586,6 @@ timer:
 		SOCKBUF_UNLOCK_ASSERT(&so->so_snd);	/* Check gotos. */
 		switch (error) {
 		case EACCES:
-			tp->t_softerror = error;
-			return (0);
 		case EPERM:
 			tp->t_softerror = error;
 			return (error);


signature.asc
Description: OpenPGP digital signature


Re: Changed behaviour of pf after new handling of EACCES in tcp_output() in r315514

2018-04-17 Thread Andreas Longwitz
Thanks for quick answer,

> This change was based on
>   https://svnweb.freebsd.org/base?view=revision&revision=309610
> 
> Now I think it can be removed, because:
> 
> 1. SAs should be configured by application before initiating of TCP
> connection;
> 2. If there are no matching SAs, connection will be dropped after
> several tries.
> 3. Even if connection will be dropped after first failed SYN, there is
> special tcps_sig_err_buildsig error counter, that will be incremented
> and we can determine the cause.

So you introduced the change as part of the new IPSec project and not to
help pf in the special situation of reloading rukes (Bug 214613), correct ?

> So, can you try this patch? And maybe someone who uses TCP-MD5 can try
> it too (with and without configured SAs)?

I tried your patch on FreeBSD 11 (r331217) and FreeBSD 12 (r328652) and
pf workes in both cases as expected, the telnet command now returned
immediately.

Compared to the old behaviour your patch reverted two lines in
tcp_output.c but not the line "EACCES:". I think thats what you wanted,
tp->t_softerror is now set to EACCESS, when this error occurs. It seems
to me that this does not make a big difference, but maybe I am wrong.

Do you plan to commit your patch ?


Andreas Longwitz

___
freebsd-net@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


[Bug 227566] option RSS brokes conn to localhost

2018-04-17 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=227566

Mark Linimon  changed:

   What|Removed |Added

   Assignee|b...@freebsd.org|n...@freebsd.org

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-net@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


[Bug 227566] option RSS brokes conn to localhost

2018-04-17 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=227566

Adrian Chadd  changed:

   What|Removed |Added

 CC||adr...@freebsd.org

--- Comment #1 from Adrian Chadd  ---
is it broken on -head?

-adrian

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-net@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"