In D30398#713041, @melifaro wrote:Also: will you write a commit message, or do you prefer me doing it?
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Feed Advanced Search
Advanced Search
Advanced Search
Aug 20 2021
Aug 20 2021
melifaro added reviewers for D30398: Route IPv4 packets via IPv6 next-hops: network, ae, olivier, • hselasky.
In D30398#713040, @melifaro wrote:You also need to add a bit of family wrapping logic inside fill_nhop_from_info(), so we get a proper family for the nexthop.
.
Pass correct AF to nd6_resolve()
In D30398#712308, @melifaro wrote:In D30398#712270, @zlei.huang_gmail.com wrote:It should be the other way round :-) e.g. D31379 is a pre-requisite.
Could you try to apply it first, build on top and test?
Also: will you write a commit message, or do you prefer me doing it?
You also need to add a bit of family wrapping logic inside fill_nhop_from_info(), so we get a proper family for the nexthop.
Aug 18 2021
Aug 18 2021
In D30398#712308, @melifaro wrote:In D30398#712270, @zlei.huang_gmail.com wrote:It should be the other way round :-) e.g. D31379 is a pre-requisite.
Could you try to apply it first, build on top and test?
Added feature(3) knob.
Cleaned up some comments.
In D30398#712270, @zlei.huang_gmail.com wrote:
It should be the other way round :-) e.g. D31379 is a pre-requisite.
Could you try to apply it first, build on top and test?
.
@melifaro Sorry for late response ;)
Rebased on latest main branch
Aug 9 2021
Aug 9 2021
In D30398#708795, @melifaro wrote:I've updated the aforementioned D31379 to reflect the committed parts.
If you could update this review to use the new functionality (e.g. nd6_resolve() returning lle with the proper encap) , that would be awesome.
Aug 8 2021
Aug 8 2021
Aug 7 2021
Aug 7 2021
Aug 6 2021
Aug 6 2021
I've updated the aforementioned D31379 to reflect the committed parts.
If you could update this review to use the new functionality (e.g. nd6_resolve() returning lle with the proper encap) , that would be awesome.
Aug 2 2021
Aug 2 2021
I've added D31379 with the lltable support for IPvX over IPvY.
Basically, the diff creates per-family "child" lle entries attached to the main lle entry. The purpose of each child entry is to have an object with a proper encap, so it can be referenced just like standard lle.
Aug 1 2021
Aug 1 2021
Jul 9 2021
Jul 9 2021
Rework sending queued LLE packets.
Jul 6 2021
Jul 6 2021
I have some WIP patch on making nd6_resolve() return LLEs with proper encap. Hope to publish it later this week.
Jun 25 2021
Jun 25 2021
In D30398#691776, @melifaro wrote:LGTM, I guess the biggest remaining piece now is lle handling, especially sending queued LLE packets upon successful resolution.
In D30398#691776, @melifaro wrote:LGTM, I guess the biggest remaining piece now is lle handling, especially sending queued LLE packets upon successful resolution.
Jun 21 2021
Jun 21 2021
In D30811#693218, @zlei.huang_gmail.com wrote:Can you please share the discussion? Thanks!
I think I hit the issue that the useloopback was trying to resolve.
Jun 19 2021
Jun 19 2021
In D30811#692900, @donner wrote:I'm surprised. There was a discussion about not redirecting /32 on interfaces to loopback. So we see the consequence.
Jun 18 2021
Jun 18 2021
I believe this bug is also related: #255685
I'm surprised. There was a discussion about not redirecting /32 on interfaces to loopback. So we see the consequence.
Jun 15 2021
Jun 15 2021
LGTM, I guess the biggest remaining piece now is lle handling, especially sending queued LLE packets upon successful resolution.
Updated as @melifaro suggested.
Jun 12 2021
Jun 12 2021
In D30398#683204, @zlei.huang_gmail.com wrote:
- inpcb LLE caching
If I remember correctly, there is LLE caching in route object, and inpcb caches the route.
- slow path - sending packets when there is no LLE entry
Current implementation when there is no LLE entry sending packets is blocked, I wonder if we can re-queue them.
ether_resolve_addr() will consume an mbuf and add it to the sending queue of the particular lle we're looking to resolve.
Once lle is resolved we iterate through this queue and re-send these using if_output() (end of arp_check_update_lle() for IPv4). Here we need to distingush between IPv4 or IPv6 packets somehow - either by inspecting IP version field or having a separate queues for IPv4/IPv6. Personally I'd experiment with the former approach.
This version looks pretty neat, please see some comments inline.
Jun 11 2021
Jun 11 2021
Reuse route.ro_dst to get the address family of outbound / forwarded packets.
May 24 2021
May 24 2021
In D30398#682930, @melifaro wrote:First of all, thanks for working on this! This is the important feature we need to have in base, preferably turned on by default.
I'd love to land this.
Glad to get your response !
I'm interested with scalable network, and recently exploring the CLOS network architecture described by RFC 7938. It need large number of IPs and configuration
and BGP unnumbered seems to rescue (RFC 5549).
Thanks your effort on FreeBSD's routing component, it is not too hard to implement such feature in the dataplane :)
I spent some time thinking about the potential implementation option some time ago. Let me try to summarise my thoughts below.
May 22 2021
May 22 2021
First of all, thanks for working on this! This is the important feature we need to have in base, preferably turned on by default.
I'd love to land this.
May 19 2021
May 19 2021
zlei added a comment to D29968: Do not forward datagrams original from 169.254.0.0/16 link-local addresses.
Thanks @donner :)
May 18 2021
May 18 2021
May 17 2021
May 17 2021
zlei added a comment to D29968: Do not forward datagrams original from 169.254.0.0/16 link-local addresses.
Hi, since I do not have access to the src repository, could someone check in the diff please ?
zlei added a comment to D29968: Do not forward datagrams original from 169.254.0.0/16 link-local addresses.
Friendly ping @donner , there're changes since your first acceptance, do you have any objections?
May 8 2021
May 8 2021
Do you have a committer for this patch?
May 1 2021
May 1 2021
• karels accepted D29968: Do not forward datagrams original from 169.254.0.0/16 link-local addresses.
Re: avoiding ntohl(): that would be possible, but probably not within the scope of this change.
melifaro added inline comments to D29968: Do not forward datagrams original from 169.254.0.0/16 link-local addresses.
Apr 30 2021
Apr 30 2021
zlei added inline comments to D29968: Do not forward datagrams original from 169.254.0.0/16 link-local addresses.
Apr 27 2021
Apr 27 2021
rgrimes accepted D29968: Do not forward datagrams original from 169.254.0.0/16 link-local addresses.
I am accepting this without the IPSTAT_INC(ips_forward) issue being fixed, as it looks to me as if that is an existing and separate problem in the code. Probably a walk through should be done to see that ips_forward and ips_cantforward are all done correctly.
zlei updated the diff for D29968: Do not forward datagrams original from 169.254.0.0/16 link-local addresses.
zlei added a comment to D29968: Do not forward datagrams original from 169.254.0.0/16 link-local addresses.
In D29968#673077, @rgrimes wrote:I would still like to see the "169.254.0.0/16" changed to IN_LINKLOCAL, purpose of macro is to locate this value one place and one place only, scattering this string in the code undoes that.
Apr 26 2021
Apr 26 2021
rgrimes added a comment to D29968: Do not forward datagrams original from 169.254.0.0/16 link-local addresses.
I would still like to see the "169.254.0.0/16" changed to IN_LINKLOCAL, purpose of macro is to locate this value one place and one place only, scattering this string in the code undoes that.
zlei updated the diff for D29968: Do not forward datagrams original from 169.254.0.0/16 link-local addresses.
Update as @rgrimes suggested.
rgrimes added inline comments to D29968: Do not forward datagrams original from 169.254.0.0/16 link-local addresses.
So we are currently handle all multicast packets from LL sources as locally handled streams regardless of the destination.
That might be correct, even if the local machine is processing the multicast destination itself. So it is able to receive such stream over the local link.
zlei updated the diff for D29968: Do not forward datagrams original from 169.254.0.0/16 link-local addresses.
Then the condition belongs to line 740
if (V_ip_mrouter && !IN_LINKLOCAL{(ntohl(ip->ip_src.s_addr))) {
donner requested changes to D29968: Do not forward datagrams original from 169.254.0.0/16 link-local addresses.
zlei added inline comments to D29968: Do not forward datagrams original from 169.254.0.0/16 link-local addresses.
zlei added inline comments to D29968: Do not forward datagrams original from 169.254.0.0/16 link-local addresses.
zlei updated the summary of D29968: Do not forward datagrams original from 169.254.0.0/16 link-local addresses.
zlei updated the diff for D29968: Do not forward datagrams original from 169.254.0.0/16 link-local addresses.
Added full context.
zlei added a comment to D29968: Do not forward datagrams original from 169.254.0.0/16 link-local addresses.
In D29968#672749, @donner wrote:May you please add context to the diff?
donner added inline comments to D29968: Do not forward datagrams original from 169.254.0.0/16 link-local addresses.
donner added a comment to D29968: Do not forward datagrams original from 169.254.0.0/16 link-local addresses.
May you please add context to the diff?
zlei updated the diff for D29968: Do not forward datagrams original from 169.254.0.0/16 link-local addresses.
RFC 3927 2.7: Do not forward IPv4 packets with a Link-Local source address even if they have a multicast destination address.
zlei added a comment to D29968: Do not forward datagrams original from 169.254.0.0/16 link-local addresses.
In D29968#672733, @karels wrote:Moving the code down fixes a couple of problems, but it introduces a new one: multicasts from link-locals can be forwarded if we are a multicast router. Maybe add a separate check in that section? We should still receive such multicasts.
• karels added a comment to D29968: Do not forward datagrams original from 169.254.0.0/16 link-local addresses.
Moving the code down fixes a couple of problems, but it introduces a new one: multicasts from link-locals can be forwarded if we are a multicast router. Maybe add a separate check in that section? We should still receive such multicasts.
zlei updated the summary of D29968: Do not forward datagrams original from 169.254.0.0/16 link-local addresses.
zlei added a reviewer for D29968: Do not forward datagrams original from 169.254.0.0/16 link-local addresses: network.
Apr 25 2021
Apr 25 2021
zlei requested review of D29968: Do not forward datagrams original from 169.254.0.0/16 link-local addresses.
Apr 23 2021
Apr 23 2021
Apr 20 2021
Apr 20 2021
Mar 28 2021
Mar 28 2021
Mar 3 2021
Mar 3 2021
Feb 19 2021
Feb 19 2021
Feb 10 2021
Feb 10 2021
jhb added inline comments to D24021: ipfw: Add me4 as to refer to an host's IPv4 address in add_src() and add_dst()..
Jan 31 2021
Jan 31 2021
Jan 30 2021
Jan 30 2021
LGTM
Jan 29 2021
Jan 29 2021
donner added a comment to D25607: libalias: Use switch/case statements to compare IPv4 protocol type (TCP/UDP/ICMP).
While we are here, may you reformat the code to match style(9).
swicth and case does line up:
philip added a comment to D25607: libalias: Use switch/case statements to compare IPv4 protocol type (TCP/UDP/ICMP).
I agree that this makes the code more readable.
The patch should be rebased though. There's a conflict in netinet/libalias/alias.c.