From nobody Wed Mar 02 09:32:01 2022 X-Original-To: virtualization@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 574411A06E98 for ; Wed, 2 Mar 2022 09:32:02 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4K7pmL0hymz4Z3d for ; Wed, 2 Mar 2022 09:32:02 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id EC23C21219 for ; Wed, 2 Mar 2022 09:32:01 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 2229W1Qa013950 for ; Wed, 2 Mar 2022 09:32:01 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 2229W1EN013948 for virtualization@FreeBSD.org; Wed, 2 Mar 2022 09:32:01 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: virtualization@FreeBSD.org Subject: [Bug 262292] Seemingly not possible for IPv6 to function over tap devices on if_bridge Date: Wed, 02 Mar 2022 09:32:01 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: bhyve X-Bugzilla-Version: 13.0-STABLE X-Bugzilla-Keywords: bhyve, ipv6 X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: paul.g.webster@googlemail.com X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: virtualization@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status keywords bug_severity priority component assigned_to reporter Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Discussion List-Archive: https://lists.freebsd.org/archives/freebsd-virtualization List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-virtualization@freebsd.org X-BeenThere: freebsd-virtualization@freebsd.org MIME-Version: 1.0 ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1646213522; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=oTnkq5lHckReMnxOr+wn9nvQGADuOp7ClUdTZbOpKiE=; b=MXqa2lvtmOSJCGAWQRLiK1ilh82W/vSDIaHvXe9Cg78f1wOP4AyXav6p12ksS7eIEbel1U DybAdZGUeeVlMKgtBqyO1IdV7h66aW+HsaEwEobN9Nb/eaXO1ZaoIa4YKbmuO5QNtqstGy XG53NP+KJEZBKwDm93qMWlHFBWB1psZN8uqCaMpSbuTbxPiq2pDNwxFlCBUHj+b1VbzMXg A7G3wCqddG3KZmN9wmAMKZDA9gGo6uIEzFQRcLurBm3X00pyrMUgtjQTVQ9p+s1gfMxrPW E/+B1gdBdR+TGA87zXxIFu3avMlI1GlFqXW7fLV2yYjVl1JC8iFv/rzPj3d4qg== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1646213522; a=rsa-sha256; cv=none; b=fu7mUlSr00hObqZ3EPyDOj8sdjBp8+a3g0zibCUHBfuS8zUtpy8GJKi8ZMqQ1/JmiWVU8f dQY+z7ctCQBprzvnQGTSZCp/D1X9m7wXXL3+bA/NdOd3gbRA4bWYa4TTaYzVpN+IjffDQR QpucYpF582ZbX0wrel+iHwOqz1l3WFO38jcOwu/h1LU6nZAIwVPR1EBUKL/EKz//tAedHH lbZryzRIrduCfFG6woo8mxkiSvFtIU4O0daA8AsArGrvPw/meNXZe0tGNTPU8vZPkoao8L UC9IAcY+oIp0I4QIFuWMwN+CAjxqcCc1bYB5TeL2EnTkTnvGFiCKZnPN3C+FTA== ARC-Authentication-Results: i=1; mx1.freebsd.org; none X-ThisMailContainsUnwantedMimeParts: N https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D262292 Bug ID: 262292 Summary: Seemingly not possible for IPv6 to function over tap devices on if_bridge Product: Base System Version: 13.0-STABLE Hardware: amd64 OS: Any Status: New Keywords: bhyve, ipv6 Severity: Affects Only Me Priority: --- Component: bhyve Assignee: virtualization@FreeBSD.org Reporter: paul.g.webster@googlemail.com Good day all, I run a set of VM's on an if_bridge: bridge103: flags=3D8843 metric 0 mt= u 1500 ether 58:9c:fc:10:ff:f5 inet 192.168.103.1 netmask 0xffffff00 broadcast 192.168.103.255 inet6 fe80::5a9c:fcff:fe10:fff5%bridge103 prefixlen 64 scopeid 0x4 inet6 2a01:4f8:190:1183::103:1 prefixlen 64 id 00:00:00:00:00:00 priority 32768 hellotime 2 fwddelay 15 maxage 20 holdcnt 6 proto rstp maxaddr 2000 timeout 1200 root id 00:00:00:00:00:00 priority 32768 ifcost 0 port 0 member: tap1033 flags=3D143 ifmaxaddr 0 port 9 priority 128 path cost 2000000 member: tap1032 flags=3D143 ifmaxaddr 0 port 8 priority 128 path cost 2000000 member: tap1031 flags=3D143 ifmaxaddr 0 port 11 priority 128 path cost 2000000 member: tap1030 flags=3D143 ifmaxaddr 0 port 10 priority 128 path cost 2000000 groups: bridge nd6 options=3D63 IPv4 functionality is working as expected, and ipv6 on the host works perfectly. However no guest may ping6 its closest host inet6 address (tap1033->bridge1= 03) and get a response. tcpdump reveals that bridge103 received the request, but does not appear to= do anything about it: root@de1:/usr/venv/bhyve/init # tcpdump -vvi bridge103 icmp6 tcpdump: listening on bridge103, link-type EN10MB (Ethernet), capture size 262144 bytes 20:11:53.073960 IP6 (hlim 255, next-header ICMPv6 (58) payload length: 32) 2a01:4f8:190:1183::103:2 > ff02::1:ff03:1: [icmp6 sum ok] ICMP6, neighbor solicitation, length 32, who has 2a01:4f8:190:1183::103:1 source link-address option (1), length 8 (1): 00:d3:4d:be:3f:ab 0x0000: 00d3 4dbe 3fab 20:11:54.120586 IP6 (hlim 255, next-header ICMPv6 (58) payload length: 32) 2a01:4f8:190:1183::103:2 > ff02::1:ff03:1: [icmp6 sum ok] ICMP6, neighbor solicitation, length 32, who has 2a01:4f8:190:1183::103:1 source link-address option (1), length 8 (1): 00:d3:4d:be:3f:ab 0x0000: 00d3 4dbe 3fab The same is true for all other VM's that are connected via virtio/tap to an if_bridge, bearing in mind the ICMP request is seen perhaps the problem is = with if_bridge. Unfortunatly I am now somewhat out of my depth with bhyve/if_bridge_tap, I = have tried everything I can possible think of and am hoping someone here knows w= hat is causing such an issue. Notable the inet6 that is directly assigned to each bridge is reachable from the outside, that would be these: em0: inet6 2a01:4f8:190:1183::1:1 prefixlen 64 lo0: inet6 ::1 prefixlen 128 bridge102: inet6 2a01:4f8:190:1183::102:1 prefixlen 64 bridge103: inet6 2a01:4f8:190:1183::103:1 prefixlen 64 bridge104: inet6 2a01:4f8:190:1183::104:1 prefixlen 64 As the VM in the above examples was 2a01:4f8:190:1183::103:2 assigned to bridge 103, there should be no way it failed to get a response that I can s= ee --=20 You are receiving this mail because: You are the assignee for the bug.=