From nobody Fri Mar 31 04:29:38 2023 X-Original-To: bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4PnnPZ4ZYZz42s7Q for ; Fri, 31 Mar 2023 04:29:38 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4PnnPZ3Tbwz3xVB for ; Fri, 31 Mar 2023 04:29:38 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1680236978; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=URiZFg8QncPCMecQeLGdSRSAFdzzsRUiuB4yaq0TNvY=; b=nC+7UcSOYrf6paSa0SWZ/1bQVAr4Nw5s97IcNBL7XQUVqXCaEhfsuUIXyNBUX+MofJDJoF GU+/r+isW20LOclWp09D2qffPml9WAdj/inoYmRHR72dimOqTD+wLBDxnIkPc/Bo4mcrjT NdYLz1PBI+UVPUgjg3FCYIgvYE9Ab8h7me/D8gEXW/pJP3isscl4LVd2SUBKLZW3NF9rTR 6pvXNRmdpy1r+2ewtcCLWN2PqG8MpGkFC4s0SqYtyyHOJNp9VW2ouUM9kycKzAaBkGvu+t jUc76KslDtRfFgbYNB69b4p9DjkKpBLGXVWdM13Mjh2Mtbj4XqHsZevLpxoLTg== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1680236978; a=rsa-sha256; cv=none; b=b0kZhD30F42UBviGY0vv8hO+o4lBhQoSEsQc2Jf7NUzEarfLVgpRL20xCLi7xIo1FWYPg3 up5IddNEtOGzouUoQm0QhdBMipPNl0OV+rjrjWUp0kEttxWOsb2y10A/EkYuD4dOYAB4HN uymhcL53FSHF2ne9gViRLQkG8LDUsmpiNIX1rdGbMEDeMbcHI75Yy9iUEfb+11WtfUqj4A IO5Bn/HHIZrd06qFwI0l55MGyOFApqP/HZDg2Ig6L0R/bYsTIymj0qsIagv6Ip2zIbgye2 9seQ/1hjg/rSI4ksm/uYm7q6x0s2Nzc4anA1ZEMxHGOy1l4ZhS0LTDToIVRRaw== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4PnnPZ2HJSzfcb for ; Fri, 31 Mar 2023 04:29:38 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 32V4TcLO033032 for ; Fri, 31 Mar 2023 04:29:38 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 32V4Tcbk033031 for bugs@FreeBSD.org; Fri, 31 Mar 2023 04:29:38 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 270559] if_bridge: do not forward packets properly for vlan 1 Date: Fri, 31 Mar 2023 04:29:38 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: CURRENT X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: zlei@FreeBSD.org X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-bugs@freebsd.org MIME-Version: 1.0 X-ThisMailContainsUnwantedMimeParts: N https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D270559 Bug ID: 270559 Summary: if_bridge: do not forward packets properly for vlan 1 Product: Base System Version: CURRENT Hardware: Any OS: Any Status: New Severity: Affects Only Me Priority: --- Component: kern Assignee: bugs@FreeBSD.org Reporter: zlei@FreeBSD.org A simple setup: jail0 br0 jail1=20= =20=20=20=20=20=20=20=20 +-----------------------+ +------------------+=20=20=20=20=20 +------------------------+=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20= =20=20=20=20=20=20=20=20=20=20=20=20=20=20 | | | | |=20=20=20=20=20= =20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20 |=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20= =20=20=20=20=20=20 | +------+ +-----+ | | +-----+ +-----+ | | +-----+ +---= ---+ |=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20= =20=20=20=20=20=20 | |vlan1 ------ep0b ------------ ep0a| |ep1a -------------ep1b ------ vl= an1| |=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20= =20=20=20=20=20=20 | +------+ +-----+ | | +-----+ +-----+ | | +-----+ +---= ---+ |=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20= =20=20=20=20=20=20 |192.168.1.1/24 | | | |=20=20=20=20=20= =20=20=20=20 192.168.1.2/24|=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20= =20=20=20=20=20=20=20=20=20=20 +-----------------------+ +------------------+=20=20=20=20=20 +------------------------+=20 The test script: ``` #/bin/sh # vlan id 1 is expected to fail this test vid=3D1 ep0a=3D$( ifconfig epair create ) ep0b=3D${ep0a%a}b ep1a=3D$( ifconfig epair create ) ep1b=3D${ep1a%a}b br0=3D$( ifconfig bridge create ) ifconfig $br0 addm $ep0a addm $ep1a ifconfig $ep0a up ifconfig $ep1a up ifconfig $br0 up j0=3D$( jail -ic vnet persist ) j1=3D$( jail -ic vnet persist ) ifconfig $ep0b vnet $j0 ifconfig $ep1b vnet $j1 # load if_vlan.ko if not built into kernel kldload -nq if_vlan jexec $j0 ifconfig $ep0b up jexec $j1 ifconfig $ep1b up jexec $j0 ifconfig ${ep0b}.${vid} create jexec $j1 ifconfig ${ep1b}.${vid} create # Set ether address of $ep0b (untagged) same with ${ep1b}.${vid} jexec $j1 ifconfig ${ep1b}.${vid} ether 02:09:a2:78:9a:bc jexec $j0 ifconfig ${ep0b} ether 02:09:a2:78:9a:bc jexec $j0 ifconfig ${ep0b}.${vid} ether 02:09:a2:12:34:56 # Add ip address, will also populate $br0's fowarding table, by ARP announcement jexec $j0 ifconfig ${ep0b}.${vid} inet 192.168.1.1/24 jexec $j1 ifconfig ${ep1b}.${vid} inet 192.168.1.2/24 sleep 0.5 echo "=3D=3D=3D=3D=3D=3D=3D=3D jail $j0 =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D" jexec $j0 ifconfig echo "=3D=3D=3D=3D=3D=3D=3D=3D jail $j1 =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D" jexec $j1 ifconfig echo "=3D=3D=3D=3D=3D=3D=3D=3D learned addresses on $br0 =3D=3D=3D=3D=3D=3D= =3D=3D" ifconfig $br0 addr echo "=3D=3D=3D=3D check contection =3D=3D=3D=3D" jexec $j0 ping -t5 -c3 192.168.1.2 # This will trigger a mac flap (by ARP announcement) jexec $j0 ifconfig $ep0b inet 192.168.2.1/24 sleep 0.5 echo "=3D=3D=3D=3D=3D=3D=3D=3D learned addresses on $br0 , after mac flap = =3D=3D=3D=3D" ifconfig $br0 addr echo "=3D=3D=3D=3D=3D=3D=3D=3D re-check contection =3D=3D=3D=3D=3D=3D=3D=3D" jexec $j0 ping -t5 -c3 192.168.1.2 rval=3D$? jail -R $j1 jail -R $j0 ifconfig $br0 destroy ifconfig $ep1a destroy ifconfig $ep0a destroy exit $rval ``` --=20 You are receiving this mail because: You are the assignee for the bug.=