From nobody Sun Jul 16 03:54:57 2023 X-Original-To: freebsd-net@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4R3WZP5hwsz4mXHV for ; Sun, 16 Jul 2023 03:55:09 +0000 (UTC) (envelope-from crapsh@monkeybrains.net) Received: from sfo.monkeybrains.net (sfo.monkeybrains.net [208.69.40.9]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "sfo.monkeybrains.net", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4R3WZN3MdNz4K61 for ; Sun, 16 Jul 2023 03:55:08 +0000 (UTC) (envelope-from crapsh@monkeybrains.net) Authentication-Results: mx1.freebsd.org; dkim=pass header.d=monkeybrains.net header.s=dkim header.b=VZRb6Dgc; spf=pass (mx1.freebsd.org: domain of crapsh@monkeybrains.net designates 208.69.40.9 as permitted sender) smtp.mailfrom=crapsh@monkeybrains.net; dmarc=pass (policy=none) header.from=monkeybrains.net Received: from [192.168.118.204] (148-64-102-167.PUBLIC.monkeybrains.net [148.64.102.167]) (authenticated bits=0) by sfo.monkeybrains.net (8.16.1/8.16.1) with ESMTPSA id 36G3sxSP055406 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO) for ; Sat, 15 Jul 2023 20:55:00 -0700 (PDT) (envelope-from crapsh@monkeybrains.net) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=monkeybrains.net; s=dkim; t=1689479700; bh=p3R/Lz7mbw1NXjZ3XiOnTnNPw4sXRUk0rtZztFItft8=; h=Date:To:From:Subject; b=VZRb6Dgcy+8iwXDfbR4FFTr3A9my4lq6X57w4mTI2gMu8azD9JLaXQOE7wCbpoySL tvxU6j2eOxyh5WEpYEZGyuxNzXb/u9a35t4oFwiS+xK6Qx86yKVIFIzCxxxEpc1XUP KrXeYldZEDBPXqs607UO4eQxPkNySSxE0+sqOoUs= X-Authentication-Warning: mail.monkeybrains.net: Host 148-64-102-167.PUBLIC.monkeybrains.net [148.64.102.167] claimed to be [192.168.118.204] Message-ID: <156f55a9-9a0b-f2e8-f542-1933f6dc229a@monkeybrains.net> Date: Sat, 15 Jul 2023 20:54:57 -0700 List-Id: Networking and TCP/IP with FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-net List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-net@freebsd.org MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:102.0) Gecko/20100101 Thunderbird/102.13.0 To: freebsd-net@freebsd.org Content-Language: en-US From: Rudy Subject: VLAN not working - jails, bridges, and VLANs Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Virus-Scanned: clamav-milter 0.103.3 at mail.monkeybrains.net X-Virus-Status: Clean X-Spamd-Result: default: False [-4.00 / 15.00]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; NEURAL_HAM_SHORT(-1.00)[-1.000]; DMARC_POLICY_ALLOW(-0.50)[monkeybrains.net,none]; R_SPF_ALLOW(-0.20)[+ptr]; R_DKIM_ALLOW(-0.20)[monkeybrains.net:s=dkim]; MIME_GOOD(-0.10)[text/plain]; ASN(0.00)[asn:32329, ipnet:208.69.40.0/22, country:US]; MLMMJ_DEST(0.00)[freebsd-net@freebsd.org]; MIME_TRACE(0.00)[0:+]; DKIM_TRACE(0.00)[monkeybrains.net:+]; FROM_EQ_ENVFROM(0.00)[]; HAS_XAW(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; MID_RHS_MATCH_FROM(0.00)[]; ARC_NA(0.00)[]; RCVD_COUNT_TWO(0.00)[2]; FROM_HAS_DN(0.00)[]; TO_DN_NONE(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-net@freebsd.org]; RCVD_TLS_ALL(0.00)[] X-Rspamd-Queue-Id: 4R3WZN3MdNz4K61 X-Spamd-Bar: --- X-ThisMailContainsUnwantedMimeParts: N Kernel: FreeBSD 13.1-RELEASE-p8 GENERIC amd64 Issue: vlan traffic not in the jail Weird issue today... I have a bridge with on the host, two jails, and a vlan in the jail. The jails were networking just fine with their native vlan (1), but the host would not pass 802.1q traffic to the jail. If I created the vlan91 on the host, that would 'wake up vlan awareness on the bridge'.  I could then destroy the vlan91 on the host, and the jail still passes traffic. The Workaround: host#ifconfig vlan91 create vlan 91 vlandev igb1 10.1.1.1/28; ifconfig vlan91 destroy Maybe something wrong with the bridge spanning tree implementation?  It's like that bridge was created before the vlans, and the non-native vlans are pruned. Rudy host# ifconfig bridge0 bridge0: flags=8843 metric 0 mtu 1500     ether 58:9c:fc:00:69:7f     id 00:00:00:00:00:00 priority 32768 hellotime 2 fwddelay 15     maxage 20 holdcnt 6 proto rstp maxaddr 2000 timeout 1200     root id 00:00:00:00:00:00 priority 32768 ifcost 0 port 0     member: epair1a flags=143             ifmaxaddr 0 port 12 priority 128 path cost 2000     member: epair0a flags=143             ifmaxaddr 0 port 11 priority 128 path cost 2000     member: igb1 flags=143             ifmaxaddr 0 port 4 priority 128 path cost 20000     groups: bridge jail0#  ifconfig epair1b: flags=8863 metric 0 mtu 1500     options=8     ether 02:eb:91:68:32:0b     inet 10.10.40.112 netmask 0xffffff00 broadcast 10.10.40.255     groups: epair     media: Ethernet 10Gbase-T (10Gbase-T )     status: active     nd6 options=21 vlan91: flags=8843 metric 0 mtu 1500     ether 02:eb:91:68:32:0b     inet 10.8.254.68 netmask 0xfffffff0 broadcast 10.8.254.79     groups: vlan     vlan: 91 vlanproto: 802.1q vlanpcp: 0 parent interface: epair1b     media: Ethernet 10Gbase-T (10Gbase-T )     status: active     nd6 options=29 host# kldstat Id Refs Address                Size Name  1   50 0xffffffff80200000  1f30470 kernel  2    1 0xffffffff82131000   5ec1f8 zfs.ko  3    1 0xffffffff8271e000     b7d0 opensolaris.ko  4    1 0xffffffff82ae5000     3378 acpi_wmi.ko  5    1 0xffffffff82ae9000     3250 ichsmb.ko  6    1 0xffffffff82aed000     2180 smbus.ko  7    1 0xffffffff82af0000     8d38 ioat.ko  8    1 0xffffffff82af9000     2110 pchtherm.ko  9    1 0xffffffff82afc000     2340 uhid.ko 10    1 0xffffffff82aff000     4350 ums.ko 11    1 0xffffffff82b04000     3380 usbhid.ko 12    1 0xffffffff82b08000     31f8 hidbus.ko 13    1 0xffffffff82b0c000     2a08 mac_ntpd.ko 14    1 0xffffffff82b0f000     7638 if_bridge.ko 15    1 0xffffffff82b17000     50d8 bridgestp.ko 16    1 0xffffffff82b1d000     3a64 if_epair.ko