Re: ICMP6

2024-06-09 Thread Marek Zarychta
W dniu 7.06.2024 o 15:55, Zhenlei Huang pisze: As discussed with Marek in Telegram, those looks pretty safe to MFC. I can do the MFC if no explicit objections. Great to hear ! -- Marek Zarychta

Re: ICMP6

2024-06-07 Thread Zhenlei Huang
> On Jun 7, 2024, at 4:10 PM, Marek Zarychta > wrote: > > Invaluable Committers, Dear Subscribers, > > I found Gleb's fixes to ICMP6 error rate limiting extremely useful, > especially since this limiting is not working at all in stable/14 (as far as > I was able to test). It looks to me

Re: Importing dhcpcd(8) into FreeBSD base

2024-06-07 Thread Roy Marples
Hi Ed On Thu, 06 Jun 2024 02:48:36 +0100 Ed Maste wrote --- > On Sun, 7 Aug 2022 at 01:32, Ben Woods woods...@freebsd.org> wrote: > In the previous threads some objections were raised about dhcpcd's > lack of sandboxing (Capsicum / privilege separation), which has since > been

tap not (re-)adding IPv6 link-local anymore?

2024-05-31 Thread Bjoern A. Zeeb
Hi, using tap with bhyve when I reboot an instance but the tap8 does not get destroyed but re-used it loses it's IPv6 link-local address and as bhyve starts again (remote end comes up) it doesn't come back. I have to manually toggle tap8 down, tap8 up to get the IPv6 link-locla back. Anyone

Re: ifp gone in ip6_output() -> panic

2024-05-23 Thread Bjoern A. Zeeb
On Wed, 22 May 2024, Zhenlei Huang wrote: On May 22, 2024, at 12:17 PM, Bjoern A. Zeeb wrote: Hi, sorry, I cannot dump; this is a diskless and netdump does not do IPv6; needless to say that would be funny in this case anyway; unfortunately I have also already re-compiled the kernel so I

Re: ifp gone in ip6_output() -> panic

2024-05-22 Thread Zhenlei Huang
> On May 22, 2024, at 12:17 PM, Bjoern A. Zeeb > wrote: > > Hi, > > sorry, I cannot dump; this is a diskless and netdump does not do IPv6; > needless to say that would be funny in this case anyway; unfortunately > I have also already re-compiled the kernel so I

Re: networking in 14.1 release notes

2024-05-20 Thread mike tancsa
On 5/20/2024 11:54 AM, Mike Karels wrote: That sounds like an outright bug. Looks like it was true in 14.0 as well. Is there a bug report? I couldn't find one. I didnt open one. Wasnt sure if it the change was a deliberate one or on the wrong side of POLA. To me it feels unnecessary to have

Re: networking in 14.1 release notes

2024-05-20 Thread Mike Karels
On 20 May 2024, at 10:15, mike tancsa wrote: > On 5/19/2024 8:59 PM, Mike Karels wrote: >> On 19 May 2024, at 18:29, mike tancsa wrote: >> >>> On 5/18/2024 10:49 AM, Mike Karels wrote: I have no networking changes at all in the 14.1 release notes. Is there anything that should be

Re: networking in 14.1 release notes

2024-05-20 Thread mike tancsa
On 5/19/2024 8:59 PM, Mike Karels wrote: On 19 May 2024, at 18:29, mike tancsa wrote: On 5/18/2024 10:49 AM, Mike Karels wrote: I have no networking changes at all in the 14.1 release notes. Is there anything that should be mentioned? Feel free to reply to me individually. Not sure if

Re: networking in 14.1 release notes

2024-05-20 Thread Mark Saad
John  I vote for importing intels man page provided with the source . It’s better then nothing.---Mark Saad | nones...@longcount.orgOn May 20, 2024, at 12:36 AM, John Hay wrote:Hi Mike,The ice(4) driver for Intel E800 Ethernet controllers has been in the tree since May 2020, but it seems it was

Re: networking in 14.1 release notes

2024-05-19 Thread John Hay
Hi Mike, The ice(4) driver for Intel E800 Ethernet controllers has been in the tree since May 2020, but it seems it was never added to the release notes. It also does not have a man page. There is a bug report for the missing man page: https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=262892

Re: networking in 14.1 release notes

2024-05-19 Thread Mike Karels
On 19 May 2024, at 18:29, mike tancsa wrote: > On 5/18/2024 10:49 AM, Mike Karels wrote: >> I have no networking changes at all in the 14.1 release notes. Is there >> anything that should be mentioned? Feel free to reply to me individually. >> > Not sure if appropriate or not, but when going to

Re: networking in 14.1 release notes

2024-05-19 Thread mike tancsa
On 5/18/2024 10:49 AM, Mike Karels wrote: I have no networking changes at all in the 14.1 release notes. Is there anything that should be mentioned? Feel free to reply to me individually. Not sure if appropriate or not, but when going to 13.x to 14.x, not all vlan configs work now in rc.conf

Re: removing RIP/RIPng (routed/route6d)

2024-05-17 Thread Paul Vixie
<> That's been a very workable system. p vixie On May 17, 2024 21:32, "Rodney W. Grimes" wrote: > Scott writes: > > Anyway, fun's over. Perhaps this is a greater lesson that the Foundation > > provide the rules under which code is added or removed from base and then > > we'd all be

Re: removing RIP/RIPng (routed/route6d)

2024-05-17 Thread Rodney W. Grimes
> Scott writes: > > Anyway, fun's over. Perhaps this is a greater lesson that the Foundation > > provide the rules under which code is added or removed from base and then > > we'd all be the wiser. > > The FreeBSD Foundation does not set project policy, the FreeBSD Core > Team does. Sadly

Re: removing RIP/RIPng (routed/route6d)

2024-05-16 Thread Dag-Erling Smørgrav
Scott writes: > Anyway, fun's over. Perhaps this is a greater lesson that the Foundation > provide the rules under which code is added or removed from base and then > we'd all be the wiser. The FreeBSD Foundation does not set project policy, the FreeBSD Core Team does. DES -- Dag-Erling

Re: removing RIP/RIPng (routed/route6d)

2024-05-16 Thread Lexi Winter
Scott: > I'm never sure whether to respond to sophistry and rhetoric, but why not, > let's play: my intention with this post was not to engage in sophistry, but to explain (or justify) the reasoning behind my proposal to remove RIP/RIPng, since you seemed to be asking for more details on that. i

Re: removing RIP/RIPng (routed/route6d)

2024-05-16 Thread Scott
On Thu, May 16, 2024 at 02:02:52PM +0100, Lexi Winter wrote: > Scott: > > I use RIPv2 for it's simplicity and small memory and CPU requirements. It > > has its place and shouldn't be considered "legacy" despite its > > shortcomings. > > It's not uncommon for vendors like Cisco to produce

Re: removing RIP/RIPng (routed/route6d)

2024-05-16 Thread Tomek CEDRO
On Thu, May 16, 2024 at 3:03 PM Lexi Winter wrote: > (..) > almost anything would be useful for someone, somewhere. for example, > i'd quite like to see a basic Wayland compositor (such as hikari) and a > terminal emulator in the base system, because that's a bit nicer to use > than vt(4) if you

Re: removing RIP/RIPng (routed/route6d)

2024-05-16 Thread Lexi Winter
Scott: > I use RIPv2 for it's simplicity and small memory and CPU requirements. It > has its place and shouldn't be considered "legacy" despite its shortcomings. > It's not uncommon for vendors like Cisco to produce "basic" feature sets of > IOS that do not include any link-state protocols.

Re: removing RIP/RIPng (routed/route6d)

2024-05-15 Thread Paul Vixie
, and not the only one for the community. take deep breaths. re: John Howie wrote on 2024-05-15 19:04: FreeBSD (and BSD Unix in general) has a rich history of being a “complete” OS – kernel and userland. If there was really a demand for a minimalist version of FreeBSD, why have people not forked FreeBSD

Re: removing RIP/RIPng (routed/route6d)

2024-05-15 Thread John Howie
installs (yes, I know it is meant for embedded systems, but it works). I think we need to stop trying to find solutions for non-existent problems. From: owner-freebsd-...@freebsd.org on behalf of Marek Zarychta Date: Wednesday, May 15, 2024 at 11:19 AM To: freebsd-net@freebsd.org Subject: Re

Re: removing RIP/RIPng (routed/route6d)

2024-05-15 Thread Marek Zarychta
Today Michael Sierchio wrote: There is an argument to be made that all such components of the "base" system should be packages, and managed that way.  That would facilitate removal or addition of things like MTAs, Route daemons for various protocols, etc.  and permit them to be updated

Re: removing RIP/RIPng (routed/route6d)

2024-05-15 Thread Michael Sierchio
There is an argument to be made that all such components of the "base" system should be packages, and managed that way. That would facilitate removal or addition of things like MTAs, Route daemons for various protocols, etc. and permit them to be updated independent of the base system. Too much

Re: removing RIP/RIPng (routed/route6d)

2024-05-15 Thread John Howie
I use RIP all the time. Removing it would be a pain. What is the justification? Moving it to ports is an option, but now we have to compile, distribute, and install it. Sent from my iPhone > On May 15, 2024, at 07:40, Tomek CEDRO wrote: > > On Wed, May 15, 2024 at 4:20 PM Scott wrote: >>>

Re: removing RIP/RIPng (routed/route6d)

2024-05-15 Thread Tomek CEDRO
On Wed, May 15, 2024 at 4:20 PM Scott wrote: > On Mon, Apr 15, 2024 at 09:49:27PM +0100, Lexi Winter wrote: > > (..) > > i'd like to submit a patch to remove both of these daemons from src. if > > there's some concern that people still want to use the BSD > > implementation of routed/route6d,

Re: removing RIP/RIPng (routed/route6d)

2024-05-15 Thread Scott
On Mon, Apr 15, 2024 at 09:49:27PM +0100, Lexi Winter wrote: > [note: this is a copy of a mail i sent this to arch@, but someone > suggested also asking net@ about this.] > > hello, > > currently FreeBSD ships routed(8) and route6d(8) which implement the RIP > resp. RIPng routing protocols. > >

Re: Discarding inbound ICMP REDIRECT by default

2024-05-08 Thread Ed Maste
On Tue, 7 May 2024 at 14:35, Marek Zarychta wrote: > > But what about IPv6 ? We have "net.inet6.icmp6.rediraccept" knob which > defaults to 1. Can ICMPv6 redirects be fixed along with the change > proposed for the legacy IP protocol? It may make sense to apply the same default change for IPv6,

Re: Discarding inbound ICMP REDIRECT by default

2024-05-07 Thread Marek Zarychta
W dniu 7.05.2024 o 20:12, Ed Maste pisze: I propose that we start dropping inbound ICMP REDIRECTs by default, by setting the net.inet.icmp.drop_redirect sysctl to 1 by default (and changing the associated rc.conf machinery). I've opened a Phabricator review at https://reviews.freebsd.org/D45102.

Re: review request: changing the default ifconfig(8) address format to CIDR

2024-05-05 Thread Warner Losh
I'll remind everybody that ifconfig has had IFCONFIG_FORMAT since ``` commit 7c2aa744374aa3449ad81f60852e74ad73d823e6 Author: Allan Jude Date: Tue May 31 17:30:08 2016 + ifconfig(8) now supports some output formatting options ``` so we've already 7 years into this process. This is

Re: How to configure the networking on FreeBSD to assign the same IP between host and guest in order to make work CloudFlare Warp on FreeBSD

2024-05-05 Thread Mario Marietto
This is what I did : on FreeBSD : /etc/rc.conf : ifconfig_em0="inet 192.168.1.5 netmask 255.255.255.0" defaultrouter="192.168.1.10" On Ubuntu : echo 1 > /proc/sys/net/ipv4/ip_forward iptables -A PREROUTING -t nat -p tcp -d 192.168.1.10 -j DNAT --to-destination 192.168.1.5 iptables -A

Re: review request: changing the default ifconfig(8) address format to CIDR

2024-05-04 Thread Lexi Winter
Jessica Clarke: > On 4 May 2024, at 16:34, Lexi Winter wrote: > Do we need to care about supporting (/ do we currently support) > historical non-contiguous netmasks? At a glance the CIDR code doesn’t > handle that and will stop at the first 0, so changing to that by > default would break such

Re: review request: changing the default ifconfig(8) address format to CIDR

2024-05-04 Thread Jessica Clarke
On 4 May 2024, at 16:34, Lexi Winter wrote: > hi, > > i've just submitted this PR: > > https://github.com/freebsd/freebsd-src/pull/1216 > > which contains this commit: > > commit 57d273c90ee1c17446236aba25ed0bd291c4f126 (HEAD -> lf/main, > hemlock/lf/main) > Author: Lexi Winter > Date:

Re: How to configure the networking on FreeBSD to assign the same IP between host and guest in order to make work CloudFlare Warp on FreeBSD

2024-05-04 Thread Mario Marietto
So. Please help me further... Let's say that the IP number assigned to Ubuntu is 192.168.1.9,on FreeBSD I do : /etc/rc.conf : defaultrouter="192.168.1.9" ? even if the VM starts after the booting of FreeBSD ? About configuring the DNAT iptables rule I have no idea. Please help me to

Re: How to configure the networking on FreeBSD to assign the same IP between host and guest in order to make work CloudFlare Warp on FreeBSD

2024-05-04 Thread Apoorv Sachan
Hi Mario You can set the ip if the Ubuntu machine as the default route on the freeBSD host. This will take all the traffic oroginating in freeBSD host through the warp-tunnel. And configure a DNAT iptables rule in the Ubuntu machine to return the traffic back to freeBSD machine. This way you

Re: Question about netinet6/in6.h

2024-04-27 Thread Mike Karels
On 26 Apr 2024, at 23:02, Bakul Shah wrote: > On Apr 26, 2024, at 8:41 PM, Warner Losh wrote: >> >> >> >> On Fri, Apr 26, 2024, 9:33 PM Bakul Shah wrote: >> >> >>> On Apr 26, 2024, at 5:02 PM, Mike Karels wrote: >>> >>> On 26 Apr 2024, at 18:06, Warner Losh wrote: >>> On Fri, Apr 26, 2024

Re: Question about netinet6/in6.h

2024-04-26 Thread Bakul Shah
On Apr 26, 2024, at 8:41 PM, Warner Losh wrote: > > > > On Fri, Apr 26, 2024, 9:33 PM Bakul Shah wrote: > > > > On Apr 26, 2024, at 5:02 PM, Mike Karels wrote: > > > > On 26 Apr 2024, at 18:06, Warner Losh wrote: > > > >> On Fri, Apr 26, 2024 at 4:21 PM Mike Karels wrote: > >> > >>> On

Re: Question about netinet6/in6.h

2024-04-26 Thread Warner Losh
On Fri, Apr 26, 2024, 9:33 PM Bakul Shah wrote: > > > > On Apr 26, 2024, at 5:02 PM, Mike Karels wrote: > > > > On 26 Apr 2024, at 18:06, Warner Losh wrote: > > > >> On Fri, Apr 26, 2024 at 4:21 PM Mike Karels wrote: > >> > >>> On 26 Apr 2024, at 15:49, Mike Karels wrote: > >>> > On 26

Re: Question about netinet6/in6.h

2024-04-26 Thread Bakul Shah
> On Apr 26, 2024, at 5:02 PM, Mike Karels wrote: > > On 26 Apr 2024, at 18:06, Warner Losh wrote: > >> On Fri, Apr 26, 2024 at 4:21 PM Mike Karels wrote: >> >>> On 26 Apr 2024, at 15:49, Mike Karels wrote: >>> On 26 Apr 2024, at 15:01, Warner Losh wrote: > This has to be a

Re: Question about netinet6/in6.h

2024-04-26 Thread Mike Karels
On 26 Apr 2024, at 18:06, Warner Losh wrote: > On Fri, Apr 26, 2024 at 4:21 PM Mike Karels wrote: > >> On 26 Apr 2024, at 15:49, Mike Karels wrote: >> >>> On 26 Apr 2024, at 15:01, Warner Losh wrote: >>> This has to be a FAQ I'm porting a program from Linux, I often see an error

Re: Question about netinet6/in6.h

2024-04-26 Thread Warner Losh
On Fri, Apr 26, 2024 at 4:21 PM Mike Karels wrote: > On 26 Apr 2024, at 15:49, Mike Karels wrote: > > > On 26 Apr 2024, at 15:01, Warner Losh wrote: > > > >> This has to be a FAQ > >> > >> I'm porting a program from Linux, I often see an error like: > >> ./test/mock-ifaddrs.c:95:19: error: no

Re: Question about netinet6/in6.h

2024-04-26 Thread Mike Karels
On 26 Apr 2024, at 15:49, Mike Karels wrote: > On 26 Apr 2024, at 15:01, Warner Losh wrote: > >> This has to be a FAQ >> >> I'm porting a program from Linux, I often see an error like: >> ./test/mock-ifaddrs.c:95:19: error: no member named 's6_addr32' in 'struct >> in6_addr' >>95 |

Re: Question about netinet6/in6.h

2024-04-26 Thread Mike Karels
On 26 Apr 2024, at 15:01, Warner Losh wrote: > This has to be a FAQ > > I'm porting a program from Linux, I often see an error like: > ./test/mock-ifaddrs.c:95:19: error: no member named 's6_addr32' in 'struct > in6_addr' >95 | ipv6->sin6_addr.s6_addr32[3] = 0; > |

Re: Source IPv4 address selection vs BGP IX connection

2024-04-26 Thread Mike Karels
On 25 Apr 2024, at 15:56, Gregory Shapiro wrote: >> of course, gethostid(3) is now deprecated in favour of sysctl(3), and the >> hostid(8) command is gone, and there's now more than one flavour of >> Internet-capable UNIX in the world, and there's more than one Internet >> address family now. so

Re: Source IPv4 address selection vs BGP IX connection

2024-04-25 Thread Rodney W. Grimes
> > of course, gethostid(3) is now deprecated in favour of sysctl(3), and the > > hostid(8) command is gone, and there's now more than one flavour of > > Internet-capable UNIX in the world, and there's more than one Internet > > address family now. so what i did in 1990 is a guide only inasmuch as

Re: Source IPv4 address selection vs BGP IX connection

2024-04-25 Thread Gregory Shapiro
> of course, gethostid(3) is now deprecated in favour of sysctl(3), and the > hostid(8) command is gone, and there's now more than one flavour of > Internet-capable UNIX in the world, and there's more than one Internet > address family now. so what i did in 1990 is a guide only inasmuch as some >

Re: Source IPv4 address selection vs BGP IX connection

2024-04-24 Thread Paul Vixie
agreed. and one of my mods to the ultrix (~4.3bsd) kernel for gatekeeper.dec.com back in ~1990 was to use the result of gethostid(3) if that result was nonzero and if a socket was not already bound. so named(8) and ntpd(8) and anything else that used explicit binding got what they expected,

Re: Source IPv4 address selection vs BGP IX connection

2024-04-24 Thread mike tancsa
On 4/23/2024 10:12 PM, Gregory Shapiro wrote: Short version: Using FreeBSD as a BGP router has network issues caused by suboptimal default IPv4 source address selection when connected to Internet Exchanges (which are required to use IPs that aren't routable on the Internet). I was hoping to

Re: Source IPv4 address selection vs BGP IX connection

2024-04-24 Thread Gregory Shapiro
> The mistake your making, IMHO, is that an IX connected eBGP FreeBSD > router _SHOULD NOT_ be doing ANYTHING other than BGP on the IX > connected interface, and anything like DNS and outbound SMTP should be > going inward on the AS, not outward to the internet. Fair point and thank you for the

Re: Source IPv4 address selection vs BGP IX connection

2024-04-24 Thread Gregory Shapiro
On Wed, Apr 24, 2024 at 07:10:51AM +0200, Marek Zarychta wrote: > W dniu 24.04.2024 o 04:12, Gregory Shapiro pisze: > > Short version: > > > > Using FreeBSD as a BGP router has network issues caused by suboptimal > > default IPv4 source address selection when connected to Internet > > Exchanges

Re: Source IPv4 address selection vs BGP IX connection

2024-04-24 Thread Rodney W. Grimes
> Short version: > > Using FreeBSD as a BGP router has network issues caused by suboptimal > default IPv4 source address selection when connected to Internet > Exchanges (which are required to use IPs that aren't routable on the > Internet). I was hoping to find more elegant workarounds or

Re: Source IPv4 address selection vs BGP IX connection

2024-04-23 Thread Marek Zarychta
W dniu 24.04.2024 o 04:12, Gregory Shapiro pisze: Short version: Using FreeBSD as a BGP router has network issues caused by suboptimal default IPv4 source address selection when connected to Internet Exchanges (which are required to use IPs that aren't routable on the Internet). I was hoping

Re: ixl(4) bhyve(8) SR-IOV with Transparent VLAN associated w/ VF's

2024-04-19 Thread Paul Procacci
On Wed, Apr 17, 2024 at 10:04 PM Lexi Winter wrote: > Paul Procacci: > > I'm assigning VF's to bhyve with pci passthru. > [...] > > Given this, I figured the best option would be to set the VLAN on the VF > on > > the host prior to handing it off to the bhyve instance effectively > enabling > >

Re: ixl(4) bhyve(8) SR-IOV with Transparent VLAN associated w/ VF's

2024-04-17 Thread Lexi Winter
Paul Procacci: > I'm assigning VF's to bhyve with pci passthru. [...] > Given this, I figured the best option would be to set the VLAN on the VF on > the host prior to handing it off to the bhyve instance effectively enabling > transparent vlans. [...] > Has anyone done this? Does anyone have any

Re: removing RIP/RIPng (routed/route6d)

2024-04-16 Thread Ed Maste
On Mon, 15 Apr 2024 at 16:49, Lexi Winter wrote: > > currently FreeBSD ships routed(8) and route6d(8) which implement the RIP > resp. RIPng routing protocols. > ... > i'd like to submit a patch to remove both of these daemons from src. if > there's some concern that people still want to use the

Re: Request for Testing: TCP RACK

2024-04-10 Thread Nuno Teixeira
(...) Backup server is https://www.rsync.net/ (free 500GB for FreeBSD developers). Nuno Teixeira escreveu (quarta, 10/04/2024 à(s) 13:39): > With base stack I can complete restic check successfully > downloading/reading/checking all files from a "big" remote compressed > backup. > Changing it

Re: Request for Testing: TCP RACK

2024-04-10 Thread Nuno Teixeira
With base stack I can complete restic check successfully downloading/reading/checking all files from a "big" remote compressed backup. Changing it to RACK stack, it fails. I run this command often because in the past, compression corruption occured and this is the equivalent of restoring backup

Re: Request for Testing: TCP RACK

2024-04-10 Thread tuexen
> On 10. Apr 2024, at 13:40, Nuno Teixeira wrote: > > Hello all, > > @ current 1500018 and fetching torrents with net-p2p/qbittorrent finished > ~2GB download and connection UP until the end: > > --- > Apr 10 11:26:46 leg kernel: re0: watchdog timeout > Apr 10 11:26:46 leg kernel: re0:

Re: Request for Testing: TCP RACK

2024-04-10 Thread Nuno Teixeira
Hello all, @ current 1500018 and fetching torrents with net-p2p/qbittorrent finished ~2GB download and connection UP until the end: --- Apr 10 11:26:46 leg kernel: re0: watchdog timeout Apr 10 11:26:46 leg kernel: re0: link state changed to DOWN Apr 10 11:26:49 leg dhclient[58810]: New IP

Re: How to ignore a default route for one of the dhclient-ed interface?

2024-04-08 Thread Roy Marples
On Mon, 08 Apr 2024 04:16:47 +0100 Anton Yudin wrote --- >   I'm running a FreeBSD 14 with two interfaces that use DHCP.  I would like > to make one of the interfaces to never set the default route.  Right now the > first interface to be fully up sets the default route. > >   I

Re: How to ignore a default route for one of the dhclient-ed interface?

2024-04-08 Thread list_freebsd
On 2024-04-07 20:16, Anton Yudin wrote:   I'm running a FreeBSD 14 with two interfaces that use DHCP.   I would like to make one of the interfaces to never set the default route.   Right now the first interface to be fully up sets the default route.   I tried to set the following in

Re: TCP socket handling errors

2024-04-04 Thread Michael Tuexen
> On 3. Apr 2024, at 19:46, Sad Clouds wrote: > > On Wed, 3 Apr 2024 17:28:52 +0200 > Michael Tuexen wrote: > >>> On 3. Apr 2024, at 15:44, Sad Clouds wrote: >>> >>> I found a bug that is still open from May 2010 and describes the same >>> behaviour that I see with my application: >>> >>>

Re: TCP socket handling errors

2024-04-03 Thread Sad Clouds
On Wed, 3 Apr 2024 17:28:52 +0200 Michael Tuexen wrote: > > On 3. Apr 2024, at 15:44, Sad Clouds wrote: > > > > I found a bug that is still open from May 2010 and describes the same > > behaviour that I see with my application: > > > > https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=146845

Re: TCP socket handling errors

2024-04-03 Thread Michael Tuexen
> On 3. Apr 2024, at 15:44, Sad Clouds wrote: > > I found a bug that is still open from May 2010 and describes the same > behaviour that I see with my application: > > https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=146845 > > If this hasn't been fixed over the last 14 years, then I guess I

Re: TCP socket handling errors

2024-04-03 Thread Sad Clouds
I found a bug that is still open from May 2010 and describes the same behaviour that I see with my application: https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=146845 If this hasn't been fixed over the last 14 years, then I guess I will add some code to simply ignore ECONNRESET on close(2) for

Re: vnet with interfaces

2024-03-30 Thread Benoit Chesneau
Thanks for the link! the VIMAGE concept is such an interesting hack.. Benoît Chesneau, Enki Multimedia — t. +33608655490  Sent with Proton Mail secure email. On Thursday, March 28th, 2024 at 10:17, Tom Jones wrote: > > On Tue, Mar 26, 2024, at 18:31, Benoit Chesneau wrote: > > > How does

Re: Request for Testing: TCP RACK

2024-03-28 Thread tuexen
> On 28. Mar 2024, at 15:00, Nuno Teixeira wrote: > > Hello all! > > Running rack @b7b78c1c169 "Optimize HPTS..." very happy on my laptop (amd64)! > > Thanks all! Thanks for the feedback! Best regards Michael > > Drew Gallatin escreveu (quinta, 21/03/2024 à(s) 12:58): > The entire point is

Re: Request for Testing: TCP RACK

2024-03-28 Thread Nuno Teixeira
Hello all! Running rack @b7b78c1c169 "Optimize HPTS..." very happy on my laptop (amd64)! Thanks all! Drew Gallatin escreveu (quinta, 21/03/2024 à(s) 12:58): > The entire point is to *NOT* go through the overhead of scheduling > something asynchronously, but to take advantage of the fact that

Re: vnet with interfaces

2024-03-28 Thread Mario Marietto
---> A very simple and elegant shell management tool to play with bhyve is vm-bhyve I never use it. I created my own elegant script that in my opinion works better than vm-bhyve. And I think that I can improve it I will... On Tue, Mar 26, 2024 at 8:30 PM Tomek CEDRO wrote: > On Tue, Mar

Re: vnet with interfaces

2024-03-28 Thread Tom Jones
On Tue, Mar 26, 2024, at 18:31, Benoit Chesneau wrote: > How does work VNET with interfaces? Is this as efficient as using pci > passtrough in a vm ? Overhead should be minimal, while the device is logically missing from the default vnet there isn't any more "in the way" for actual usage.

Re: vnet with interfaces

2024-03-26 Thread Tomek CEDRO
On Tue, Mar 26, 2024 at 7:32 PM Benoit Chesneau wrote: > How does work VNET with interfaces? Is this as efficient as using pci > passtrough in a vm ? > Benoît Vnet allows you to control networks by the system and make various configurations networks jails etc, example here:

Re: ipv4 route with ipv6 local link nexthop ?

2024-03-22 Thread Zhenlei Huang
> On Mar 22, 2024, at 5:05 PM, Benoit Chesneau > wrote: > > Awesome! Do we have a chance it land in a patch release soon ? Or better to > use a STABLE until the 14.1 is released? > Or you can stay on 14.0 If the workaround can fulfill. 14.1 is about to be released at 18 June as per the

Re: ipv4 route with ipv6 local link nexthop ?

2024-03-22 Thread Benoit Chesneau
Awesome! Do we have a chance it land in a patch release soon ? Or better to use a STABLE until the 14.1 is released? Benoît On Thursday, March 14th, 2024 at 10:56, Zhenlei Huang wrote: >> On Mar 14, 2024, at 9:04 AM, Zhenlei Huang wrote: >> >>> On Mar 14, 2024, at 3:07 AM, Marek Zarychta

Re: Request for Testing: TCP RACK

2024-03-21 Thread Drew Gallatin
The entire point is to *NOT* go through the overhead of scheduling something asynchronously, but to take advantage of the fact that a user/kernel transition is going to trash the cache anyway. In the common case of a system which has less than the threshold number of connections , we access

Re: Request for Testing: TCP RACK

2024-03-20 Thread Konstantin Belousov
On Tue, Mar 19, 2024 at 06:19:52AM -0400, rrs wrote: > Ok I have created > > https://reviews.freebsd.org/D44420 > > > To address the issue. I also attach a short version of the patch that Nuno > can try and validate > > it works. Drew you may want to try this and validate the optimization does

Re: Request for Testing: TCP RACK

2024-03-18 Thread Drew Gallatin
No. The goal is to run on every return to userspace for every thread. Drew On Mon, Mar 18, 2024, at 3:41 PM, Konstantin Belousov wrote: > On Mon, Mar 18, 2024 at 03:13:11PM -0400, Drew Gallatin wrote: > > I got the idea from > >

Re: Request for Testing: TCP RACK

2024-03-18 Thread Konstantin Belousov
On Mon, Mar 18, 2024 at 03:13:11PM -0400, Drew Gallatin wrote: > I got the idea from > https://people.mpi-sws.org/~druschel/publications/soft-timers-tocs.pdf > The gist is that the TCP pacing stuff needs to run frequently, and > rather than run it out of a clock interrupt, its more efficient to

Re: Request for Testing: TCP RACK

2024-03-18 Thread Drew Gallatin
I got the idea from https://people.mpi-sws.org/~druschel/publications/soft-timers-tocs.pdf The gist is that the TCP pacing stuff needs to run frequently, and rather than run it out of a clock interrupt, its more efficient to run it out of a system call context at just the point where we

Re: Request for Testing: TCP RACK

2024-03-18 Thread Konstantin Belousov
On Mon, Mar 18, 2024 at 07:26:10AM -0500, Mike Karels wrote: > On 18 Mar 2024, at 7:04, tue...@freebsd.org wrote: > > >> On 18. Mar 2024, at 12:42, Nuno Teixeira wrote: > >> > >> Hello all! > >> > >> It works just fine! > >> System performance is OK. > >> Using patch on

Re: Request for Testing: TCP RACK

2024-03-18 Thread Mike Karels
On 18 Mar 2024, at 7:04, tue...@freebsd.org wrote: >> On 18. Mar 2024, at 12:42, Nuno Teixeira wrote: >> >> Hello all! >> >> It works just fine! >> System performance is OK. >> Using patch on main-n268841-b0aaf8beb126(-dirty). >> >> --- >> net.inet.tcp.functions_available: >> Stack

Re: Request for Testing: TCP RACK

2024-03-18 Thread tuexen
> On 18. Mar 2024, at 12:42, Nuno Teixeira wrote: > > Hello all! > > It works just fine! > System performance is OK. > Using patch on main-n268841-b0aaf8beb126(-dirty). > > --- > net.inet.tcp.functions_available: > Stack D AliasPCB count >

Re: Request for Testing: TCP RACK

2024-03-18 Thread Nuno Teixeira
Hello all! It works just fine! System performance is OK. Using patch on main-n268841-b0aaf8beb126(-dirty). --- net.inet.tcp.functions_available: Stack D AliasPCB count freebsd freebsd 0 rack

Re: Request for Testing: TCP RACK

2024-03-17 Thread Nuno Teixeira
Hello, > I don't have the full context, but it seems like the complaint is a > performance regression in bonnie++ and perhaps other things when tcp_hpts is > loaded, even when it is not used. Is that correct? > > If so, I suspect its because we drive the tcp_hpts_softclock() routine from >

Re: Request for Testing: TCP RACK

2024-03-17 Thread tuexen
> On 17. Mar 2024, at 16:39, Drew Gallatin wrote: > > I don't have the full context, but it seems like the complaint is a > performance regression in bonnie++ and perhaps other things when tcp_hpts is > loaded, even when it is not used. Is that correct? Correct. > > If so, I suspect its

Re: Request for Testing: TCP RACK

2024-03-17 Thread Drew Gallatin
Resending with the patch as an attachment. Drew On Sun, Mar 17, 2024, at 11:39 AM, Drew Gallatin wrote: > I don't have the full context, but it seems like the complaint is a > performance regression in bonnie++ and perhaps other things when tcp_hpts is > loaded, even when it is not used. Is

Re: Request for Testing: TCP RACK

2024-03-17 Thread Drew Gallatin
I don't have the full context, but it seems like the complaint is a performance regression in bonnie++ and perhaps other things when tcp_hpts is loaded, even when it is not used. Is that correct? If so, I suspect its because we drive the tcp_hpts_softclock() routine from userret(), in order

Re: Request for Testing: TCP RACK

2024-03-17 Thread Nuno Teixeira
Hello, > > - I can't remember better tests to do as I can feel the entire OS is > > being slow, without errors, just slow. > This is interesting. It seems a consequence on loading TCPHPTS, not actually > using it. Exactly, just loading module and not using it by setting sysctl. > I have CCed

Re: Request for Testing: TCP RACK

2024-03-17 Thread tuexen
> On 16. Mar 2024, at 21:29, Nuno Teixeira wrote: > >> Just to double check: you only load the tcp_rack. You don't run >> sysctl net.inet.tcp.functions_default=rack > > I'm not using sysctl, just loading module. And you also don't have net.inet.tcp.functions_default=rack in /etc/sysctl.conf

Re: Request for Testing: TCP RACK

2024-03-16 Thread Nuno Teixeira
> Just to double check: you only load the tcp_rack. You don't run > sysctl net.inet.tcp.functions_default=rack I'm not using sysctl, just loading module. > What does "poudriere testport net/gitup" do? Only build stuff or does is > also download something? > > What does bonnie++ do? poudriere is

Re: Request for Testing: TCP RACK

2024-03-16 Thread tuexen
> On 16. Mar 2024, at 20:06, Nuno Teixeira wrote: > >>> Will update amd64 laptop to main-n268827-75464941dc17 (Mar 16) and test it. >> Please do so... > > @main-n268827-75464941dc17 GENERIC-NODEBUG amd64 > > Ok, I think I have here some numbers related to disk performance being > affected by

Re: Request for Testing: TCP RACK

2024-03-16 Thread Nuno Teixeira
> > Will update amd64 laptop to main-n268827-75464941dc17 (Mar 16) and test it. > Please do so... @main-n268827-75464941dc17 GENERIC-NODEBUG amd64 Ok, I think I have here some numbers related to disk performance being affected by tcp_rack that somehow is messing with something. NOTES: - test

Re: Request for Testing: TCP RACK

2024-03-16 Thread tuexen
> On 16. Mar 2024, at 15:00, Nuno Teixeira wrote: > >> If you load tcp_rack via kldload, tcphtps get loaded automatically. >> If you load if via /boot/loader.conf, you need to have >> tcphpts_load="YES" >> in addition to >> tcp_rack_load="YES" > > As of my tests, loader.conf:

Re: Request for Testing: TCP RACK

2024-03-16 Thread Nuno Teixeira
> If you load tcp_rack via kldload, tcphtps get loaded automatically. > If you load if via /boot/loader.conf, you need to have > tcphpts_load="YES" > in addition to > tcp_rack_load="YES" As of my tests, loader.conf: tcp_rack_load="YES" loads tcphtps.ko auto: 31 0x81f53000545e0

Re: Request for Testing: TCP RACK

2024-03-16 Thread tuexen
> On 16. Mar 2024, at 11:59, Nuno Teixeira wrote: > >>> Resuming I only need to add: >>> >>> options TCPHPTS >>> >>> Is this correct? >>> >> >> Yeah, that will probably fix it. According to a comment in >> /usr/src/sys/netinet/tcp_hpts.c it adds a high precision timer >> system for

Re: Request for Testing: TCP RACK

2024-03-16 Thread Nuno Teixeira
> > Resuming I only need to add: > > > > options TCPHPTS > > > > Is this correct? > > > > Yeah, that will probably fix it. According to a comment in > /usr/src/sys/netinet/tcp_hpts.c it adds a high precision timer > system for tcp, used by RACK and BBR. As tuexen said, on main,

Re: Request for Testing: TCP RACK

2024-03-16 Thread Gary Jennejohn
On Sat, 16 Mar 2024 10:11:22 + Nuno Teixeira wrote: > (...) > > > These entries are missing in GENERIC: > > > > makeoptions WITH_EXTRA_TCP_STACKS=1 > > From > https://cgit.freebsd.org/src/commit/?id=3a338c534154164504005beb00a3c6feb03756cc > WITH_EXTRA_TCP_STACKS was dropped. > > >

Re: Request for Testing: TCP RACK

2024-03-16 Thread tuexen
> On 16. Mar 2024, at 11:11, Nuno Teixeira wrote: > > (...) > >> These entries are missing in GENERIC: >> >> makeoptions WITH_EXTRA_TCP_STACKS=1 > > From > https://cgit.freebsd.org/src/commit/?id=3a338c534154164504005beb00a3c6feb03756cc > WITH_EXTRA_TCP_STACKS was dropped. > >> options

Re: Request for Testing: TCP RACK

2024-03-16 Thread Nuno Teixeira
(...) > These entries are missing in GENERIC: > > makeoptions WITH_EXTRA_TCP_STACKS=1 >From >https://cgit.freebsd.org/src/commit/?id=3a338c534154164504005beb00a3c6feb03756cc WITH_EXTRA_TCP_STACKS was dropped. > options TCPHPTS That's the missing option in GENERIC that could lead

Re: Request for Testing: TCP RACK

2024-03-16 Thread Gary Jennejohn
On Sat, 16 Mar 2024 09:49:24 + Nuno Teixeira wrote: > Hello Gary, > > Nice that you found this. > > tcp_tack manual doesn't mention that we need extra config in kernel > but it loads module and it is shown in sysctl > net.inet.tcp.functions_available without errors. > > I will add missing

Re: Request for Testing: TCP RACK

2024-03-16 Thread Nuno Teixeira
Hello Gary, Nice that you found this. tcp_tack manual doesn't mention that we need extra config in kernel but it loads module and it is shown in sysctl net.inet.tcp.functions_available without errors. I will add missing config to GENERIC and see how it goes. Cheers, Gary Jennejohn escreveu

  1   2   3   4   5   6   7   8   9   10   >