From owner-freebsd-hackers@freebsd.org Sun Jul 29 20:49:45 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id C25551062DB4 for ; Sun, 29 Jul 2018 20:49:45 +0000 (UTC) (envelope-from dcrosstech@gmail.com) Received: from mail-oi0-x233.google.com (mail-oi0-x233.google.com [IPv6:2607:f8b0:4003:c06::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 3F24679147 for ; Sun, 29 Jul 2018 20:49:45 +0000 (UTC) (envelope-from dcrosstech@gmail.com) Received: by mail-oi0-x233.google.com with SMTP id k81-v6so17718680oib.4 for ; Sun, 29 Jul 2018 13:49:45 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:from:date:message-id:subject:to; bh=c/lykBerzaN0BXPnMAJvKwIHAfY5AfiDmiL/1k6bFi4=; b=pyjH5rqbpwv0o2b0VKfEW1nn5nsSxEckx6molV6euMoAB6ljXWTydWi2GdAPJ67Ue9 CtMTrDmsI3YV+yL1boQAnIthNyjMyF5LXh2hFjiRhYuchcGdvaE9mgBWMCA0B39buWfE z1Sx3ofW1rLsB1e9M9G6VjwFPt2+4waIiPkepHnjtMZZU3ZL3EnhsxmALWpHa2E+1zzu jRziSyPjLfjrHI7yVnJCUnst0OuvQN5N8hMkoxErhhanumFykWsCbj1e2tEdU9g3prWv 0xh1T1AuviqQRS5xWYgKtKNbMYqHWh3xwtEeY8wAjB2uH9qcVbeM/JBo78Vl38jcLxbf Uigg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=c/lykBerzaN0BXPnMAJvKwIHAfY5AfiDmiL/1k6bFi4=; b=miU/8oMw9snpNz2AzQdYLZzbC6oZJ0C+dz7LU2qkeXVFJjOgeGeac7CMlDT14UA/hy e62RWb7uanJKxTl/H1Q5szxoKpB2sUL2Ud7Lcvla5GOKTWhHehAUs9XLgLBgeT0Hj6J/ d6ksaHes5ai9V10CAwzT+qLoLmgvTD7Qpz7i/KniWz4Lsz6BPZ54GvNSeDM1M77Q5ABd 4EQqPePCV/s+zXZKol5yGzi8z17QmRDfCHGlumSqRvqLJxEpBl80FcH5C/dhH5YGuFn2 c90Ekr93DmBFFil8Ho5JwlLIEAIsF2Wmk60Cgqlk8Ajw5+FulVl+NpGq/haJ582FvGyA 735A== X-Gm-Message-State: AOUpUlEkKbX7NJY14o3Di00JvzTgnr90bkajUN/zMqOXdoRpjevU3E3W hyFkfIF0pptb7CjY7uwz1pCtgbzoL5s9gtGW2irerg== X-Google-Smtp-Source: AAOMgpfWQShIRX0t4uCAFZdBdjPyM340EMilzKJo8q7sqMiEJCZ89Engphe00GRrixlqQ75DDNB6s+oPvjOsYFyM/D8= X-Received: by 2002:aca:6908:: with SMTP id e8-v6mr2280310oic.302.1532897384345; Sun, 29 Jul 2018 13:49:44 -0700 (PDT) MIME-Version: 1.0 Received: by 2002:a9d:7017:0:0:0:0:0 with HTTP; Sun, 29 Jul 2018 13:49:44 -0700 (PDT) From: David Cross Date: Sun, 29 Jul 2018 16:49:44 -0400 Message-ID: Subject: Request for comments, new geom part type alias: freebsd-geom To: FreeBSD Hackers Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.27 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 29 Jul 2018 20:49:46 -0000 I'd like to propose that we create a GPT partition for geom labeled partitions (gmirror, gstripe, geli, etc.. anything that can be 'tasted' and automatically determined.) called 'freebsd-geom'. There are numerous cases where you shouldn't have a raw geom on a disk (for example, imagine a raid 10 of a filesystem with VMs on it..on a raw disk its possible that the lead block happens to line up with a VM disk image or anything else a BIOS may determine is bootable). So the question becomes which part id to use; IF its a mirror of a swap of UFS it seems perfectly reasonable to use freebsd-swap or freebsd-ufs (if a bit dangerous). If its a mirror or a geli then you can again be in the situation where the boot blocks (or something else), in certain circumstances mistakes these for raw filesystems with similarly calamitous results. Given these, it seems a 'freebsd-geom' (or similar) seems entirely appropriate; we can mark these for what they really are, and eliminate these cases where the system misinterprets intentions based on ambiguous data. From owner-freebsd-hackers@freebsd.org Sun Jul 29 21:01:08 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id A3249106363C for ; Sun, 29 Jul 2018 21:01:08 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: from mail-io0-x22f.google.com (mail-io0-x22f.google.com [IPv6:2607:f8b0:4001:c06::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 415F479DB9 for ; Sun, 29 Jul 2018 21:01:08 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: by mail-io0-x22f.google.com with SMTP id y10-v6so8237595ioa.10 for ; Sun, 29 Jul 2018 14:01:08 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bsdimp-com.20150623.gappssmtp.com; s=20150623; h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc; bh=DCbOqCNI5RKHCOtXtEumdKyHUNZNTpjsqJH7shXiEcE=; b=srYxnvoxMVX7kxHePVH55kN6mfUX8teZgO+iAsOYgflvRc83qSUHJZfUT2XlhUIhmO 6YGdTFGyn0ATa+Msuty6NvnLIvDUOB8j2F+YUIWZ9o8X8GWwS8Xmyi4Nvs8bi4allErv rQ516jhYdkjVWv3njxryXWGTSAVJ4nA+MmzFELpS1e7u3etmLficG+vSmfyYBS81OvYp jzwEkRxfEKSwlLNPT6dLJQbalm0QsFoq9VyVSm1qIA26YNfRUzk32mljvubbzSm8XHBN d0C4kXorKzkYC0le3UY3jXjCTDDsPkbGQfALLU9guFM2EwAPPgvSMyiSoPMniZ4bi8cW Z35g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:sender:in-reply-to:references:from :date:message-id:subject:to:cc; bh=DCbOqCNI5RKHCOtXtEumdKyHUNZNTpjsqJH7shXiEcE=; b=rEOE9yBFt7RMukOKM1SINeuqbNAh/I5FoFP7H5gVR5NZzhkbFp1SOjSMoM+F3fuPxM lHijnir6Y3nrsbDrxhgTp2U/B75PPXTvdibRG7gBEe4ICz5uslew7zv0mLfnTjRc4XyG v3nwL0/8fhA2ZrNZjVYV8TMWiJ8Ystbor9EAOn/tzhUcWh6iW39yynpspqS3pMDrLAxY 6RsLykGKk9zXSYLFR5vAHcQmR9Qqn9Ayioq3XEp8HS+7EdJTTYrOuZcPKw/YrbmGEkSH DnJ0+jO6a3bdbwtJSheaSNoeeUQik4z7Gr2Z+XziqBiNcFflbIMozJgLPxLwaucIoGbQ NDyg== X-Gm-Message-State: AOUpUlGgsT4x7eU7rjIHn6BiI0UlTk/QM+3+ChbMlaxR/GxABk3cz1ww calLuItcDsMLglyPhv8OP0KGmBUV+spr3RgEp+zkMNgefKk= X-Google-Smtp-Source: AAOMgpe/jp8rOlMcX96DxnMS2tO9vPYyHGUHatwMG5dQdz/PsJKKtZrv5eKwajlfH4vhe4cTgc3ZV500brWIHBWGFzM= X-Received: by 2002:a6b:3902:: with SMTP id g2-v6mr11591183ioa.168.1532898067363; Sun, 29 Jul 2018 14:01:07 -0700 (PDT) MIME-Version: 1.0 Sender: wlosh@bsdimp.com Received: by 2002:a4f:4485:0:0:0:0:0 with HTTP; Sun, 29 Jul 2018 14:01:06 -0700 (PDT) X-Originating-IP: [2603:300b:6:5100:1052:acc7:f9de:2b6d] In-Reply-To: References: From: Warner Losh Date: Sun, 29 Jul 2018 15:01:06 -0600 X-Google-Sender-Auth: eXhQtQBZMtsuXATDAQ9YR4ol9qs Message-ID: Subject: Re: Request for comments, new geom part type alias: freebsd-geom To: David Cross Cc: FreeBSD Hackers Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.27 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 29 Jul 2018 21:01:08 -0000 Why '-geom'? Why not 'freebsd-misc'? And what, exactly, do you mean by 'create a GPT partition'? Warner On Sun, Jul 29, 2018 at 2:49 PM, David Cross wrote: > I'd like to propose that we create a GPT partition for geom labeled > partitions (gmirror, gstripe, geli, etc.. anything that can be 'tasted' and > automatically determined.) called 'freebsd-geom'. > > There are numerous cases where you shouldn't have a raw geom on a disk (for > example, imagine a raid 10 of a filesystem with VMs on it..on a raw disk > its possible that the lead block happens to line up with a VM disk image or > anything else a BIOS may determine is bootable). > > So the question becomes which part id to use; IF its a mirror of a swap of > UFS it seems perfectly reasonable to use freebsd-swap or freebsd-ufs (if a > bit dangerous). If its a mirror or a geli then you can again be in the > situation where the boot blocks (or something else), in certain > circumstances mistakes these for raw filesystems with similarly calamitous > results. > > Given these, it seems a 'freebsd-geom' (or similar) seems entirely > appropriate; we can mark these for what they really are, and eliminate > these cases where the system misinterprets intentions based on ambiguous > data. > _______________________________________________ > freebsd-hackers@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-hackers > To unsubscribe, send any mail to "freebsd-hackers-unsubscribe@freebsd.org" > From owner-freebsd-hackers@freebsd.org Sun Jul 29 21:02:20 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 8E8EE106389F for ; Sun, 29 Jul 2018 21:02:20 +0000 (UTC) (envelope-from freebsd-rwg@pdx.rh.CN85.dnsmgr.net) Received: from pdx.rh.CN85.dnsmgr.net (br1.CN84in.dnsmgr.net [69.59.192.140]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id EAB5B7A0A0 for ; Sun, 29 Jul 2018 21:02:19 +0000 (UTC) (envelope-from freebsd-rwg@pdx.rh.CN85.dnsmgr.net) Received: from pdx.rh.CN85.dnsmgr.net (localhost [127.0.0.1]) by pdx.rh.CN85.dnsmgr.net (8.13.3/8.13.3) with ESMTP id w6TL2CQ2062740; Sun, 29 Jul 2018 14:02:12 -0700 (PDT) (envelope-from freebsd-rwg@pdx.rh.CN85.dnsmgr.net) Received: (from freebsd-rwg@localhost) by pdx.rh.CN85.dnsmgr.net (8.13.3/8.13.3/Submit) id w6TL2Cq4062739; Sun, 29 Jul 2018 14:02:12 -0700 (PDT) (envelope-from freebsd-rwg) From: "Rodney W. Grimes" Message-Id: <201807292102.w6TL2Cq4062739@pdx.rh.CN85.dnsmgr.net> Subject: Re: Request for comments, new geom part type alias: freebsd-geom In-Reply-To: To: David Cross Date: Sun, 29 Jul 2018 14:02:12 -0700 (PDT) CC: FreeBSD Hackers X-Mailer: ELM [version 2.4ME+ PL121h (25)] MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Type: text/plain; charset=US-ASCII X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 29 Jul 2018 21:02:20 -0000 > I'd like to propose that we create a GPT partition for geom labeled > partitions (gmirror, gstripe, geli, etc.. anything that can be 'tasted' and > automatically determined.) called 'freebsd-geom'. > > There are numerous cases where you shouldn't have a raw geom on a disk (for > example, imagine a raid 10 of a filesystem with VMs on it..on a raw disk > its possible that the lead block happens to line up with a VM disk image or > anything else a BIOS may determine is bootable). > > So the question becomes which part id to use; IF its a mirror of a swap of > UFS it seems perfectly reasonable to use freebsd-swap or freebsd-ufs (if a > bit dangerous). If its a mirror or a geli then you can again be in the > situation where the boot blocks (or something else), in certain > circumstances mistakes these for raw filesystems with similarly calamitous > results. > > Given these, it seems a 'freebsd-geom' (or similar) seems entirely > appropriate; we can mark these for what they really are, and eliminate > these cases where the system misinterprets intentions based on ambiguous > data. Do you have more details on just how your going to implement a "GPT" partition for geom labeled partitions. Though I think I understand what it is you want to do, how you describe it leads to some confusion on just what you are desiring to do. I am aware of some major issues involving gmultipath (GEOM::MULTIPATH) and gpt partitioned disks (GEOM::GPT) that due to bad tasting priorities you get bogus GPT error messages during boot if you have labeled your gmultipath devices, and infact can damage a gpt disk if you apply a multipath label onto a valid gpt disk. Please describe the "ambiguous data" as well, as I am not aware of what that would be. Thanks, -- Rod Grimes rgrimes@freebsd.org From owner-freebsd-hackers@freebsd.org Mon Jul 30 00:51:52 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 43F041068716 for ; Mon, 30 Jul 2018 00:51:52 +0000 (UTC) (envelope-from dcrosstech@gmail.com) Received: from mail-qk0-x22b.google.com (mail-qk0-x22b.google.com [IPv6:2607:f8b0:400d:c09::22b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id D12278188A for ; Mon, 30 Jul 2018 00:51:51 +0000 (UTC) (envelope-from dcrosstech@gmail.com) Received: by mail-qk0-x22b.google.com with SMTP id z74-v6so6768642qkb.10 for ; Sun, 29 Jul 2018 17:51:51 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=xKROJZO6zgcx4kJhgLaziiCHc2tN+Fm7esIcFM0rLsc=; b=tuZ9hXg8ISmD7DKdBzZjFiFMBrtXLDtWaNpirGEEEsQqdQ+159abO4yceCkEZdzjz+ Lbtob4Uy+1gVQaLFgYNwx/XR3IiqLEYE886+/CDkvRgLPR1/ztuBH0HiKTI+GruOA0fu Cyzx9RZMmLbcI0ZmdAb3RxDLmKdnlqBNPyiAuoJ2YJhxw5H0scgWw3SzxGfo2dolouia JYLr9R+Jp09ejgobhV6YWGnbnIOzgkWimdYupvpY00NRf7Y294cSszCQSjY/fwWmV4nU 8sdGIk5iTSzPJ87fbZPb/170HibhLNXVBHvjkQeYlUy4vvZ0GowS+pQfsVPiQsyIongy QUyQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=xKROJZO6zgcx4kJhgLaziiCHc2tN+Fm7esIcFM0rLsc=; b=gixrWFHNHFmXiLi5hq+T4EsZmzRKVVuutjwUqfIwfPoXIMWcOr4Ys9JuBrGnWRKPzW XGiXXt3tG4hW2edPG/uK1tsVEMeNGOwDuMZ2wCgolajY9ZmV0ijPjYmsIsSxkdPLD5LC 64vB7E9sTy274af+s0hgwfeybgbXSTO5Z6Zgu3nSK6am+VPDED5Ib2zZIRLgqfReUOez c9mbJjxzcong9bwI5rpeWEjrqNjt2b5As2QLZ3jK37lpF0UQBlAxBmDr1V+WB5Zz355/ cJsibSBLM2G+58jiThAU2ZiomMyuqk2NbeOmmDq4SG2twZin+6OkGpNHeK8QsVx5M7Pm aX4w== X-Gm-Message-State: AOUpUlHW4+eGdVsVmlJ3PQmPa+9B0pBk+oXUHU7KY10ktMerfcSY26dS 6XTInaKyFWezVIwY0X1nGDk= X-Google-Smtp-Source: AAOMgpdX5V5OPvEojJS+IH45Z87/Pw2jX9G/PeaCL/Ug/H6s2s36ABNejp1/rkOFmshApIisS5TwFg== X-Received: by 2002:a37:1fdf:: with SMTP id n92-v6mr14642527qkh.333.1532911911310; Sun, 29 Jul 2018 17:51:51 -0700 (PDT) Received: from [10.1.6.133] (cpe-66-66-97-162.rochester.res.rr.com. [66.66.97.162]) by smtp.gmail.com with ESMTPSA id x41-v6sm8339421qtj.71.2018.07.29.17.51.50 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sun, 29 Jul 2018 17:51:50 -0700 (PDT) Mime-Version: 1.0 (1.0) Subject: Re: Request for comments, new geom part type alias: freebsd-geom From: David Cross X-Mailer: iPhone Mail (15G77) In-Reply-To: Date: Sun, 29 Jul 2018 20:51:49 -0400 Cc: FreeBSD Hackers Message-Id: <42B97A0A-8CFD-43D6-A5F5-B2645A5D293A@gmail.com> References: To: Warner Losh Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.27 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 30 Jul 2018 00:51:52 -0000 Because I apparently I suck at mailing lists. Sorry for the dupe messages co= ming :( I am not picky about the name; I picked -geom since it seemed to be part of t= he geom system (yes.. I know 'everything' is part of the geom system in that= sense); but geom-labeled? Not sure what else to call it. 'misc' seems over= ly broad, there's a very specific but common (I think) use case where people= have gmirrors, gstripes, geli, gconcat, etc...) they are using > On Jul 29, 2018, at 17:01, Warner Losh wrote: >=20 > Why '-geom'? Why not 'freebsd-misc'? >=20 > And what, exactly, do you mean by 'create a GPT partition'? >=20 > Warner >=20 >> On Sun, Jul 29, 2018 at 2:49 PM, David Cross wrote= : >> I'd like to propose that we create a GPT partition for geom labeled >> partitions (gmirror, gstripe, geli, etc.. anything that can be 'tasted' a= nd >> automatically determined.) called 'freebsd-geom'. >>=20 >> There are numerous cases where you shouldn't have a raw geom on a disk (f= or >> example, imagine a raid 10 of a filesystem with VMs on it..on a raw disk >> its possible that the lead block happens to line up with a VM disk image o= r >> anything else a BIOS may determine is bootable). >>=20 >> So the question becomes which part id to use; IF its a mirror of a swap o= f >> UFS it seems perfectly reasonable to use freebsd-swap or freebsd-ufs (if a= >> bit dangerous). If its a mirror or a geli then you can again be in the >> situation where the boot blocks (or something else), in certain >> circumstances mistakes these for raw filesystems with similarly calamitou= s >> results. >>=20 >> Given these, it seems a 'freebsd-geom' (or similar) seems entirely >> appropriate; we can mark these for what they really are, and eliminate >> these cases where the system misinterprets intentions based on ambiguous >> data. >> _______________________________________________ >> freebsd-hackers@freebsd.org mailing list >> https://lists.freebsd.org/mailman/listinfo/freebsd-hackers >> To unsubscribe, send any mail to "freebsd-hackers-unsubscribe@freebsd.org= " >=20 From owner-freebsd-hackers@freebsd.org Mon Jul 30 00:52:37 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id CC84F106875A for ; Mon, 30 Jul 2018 00:52:37 +0000 (UTC) (envelope-from dcrosstech@gmail.com) Received: from mail-qt0-x22b.google.com (mail-qt0-x22b.google.com [IPv6:2607:f8b0:400d:c0d::22b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 68F9E81983 for ; Mon, 30 Jul 2018 00:52:37 +0000 (UTC) (envelope-from dcrosstech@gmail.com) Received: by mail-qt0-x22b.google.com with SMTP id a5-v6so10482211qtp.2 for ; Sun, 29 Jul 2018 17:52:37 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=sjj89xXkI/mZlSc2TGabSbJCpZUHkKEpr6IXFZnN/4Y=; b=K9ZbjyIuqCisIzsP+6TNWXdMh2LIzZ2CoxzOPFluDVcTP2XaQJmod5yd5v+bMUOPSK R5GUmGltDRX/6oWpsgdgBQ6TKzHhpv+NVtQxdL9SKe1u6ldZD0i5XERYRTmfk6JjonlF zG3930M3Eg5fcjNcRQjobddIKN5pK862BXaxEKGL0i31kfwwmnP76+fRSCWJDFHYXSN5 lclOOS7eDIEpdke2CUrDRFQ9oxCjFkOz7oeUPz+FfPIu0X4Ovp+c8RXdRXnpT5TKjgHk +zHN5ToGf/loguGca4Dl9WIGXkwxFXIZj3pJZ6tvnv5yMhcVa9g0VcnAZukfRD6y8M7Q S5Tw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=sjj89xXkI/mZlSc2TGabSbJCpZUHkKEpr6IXFZnN/4Y=; b=QUGUInwvDfhSwQ1UhIS4koh2BDVsEmNbDsF++e/Y6m1yg5u/Gdpr8ByTJcWKqw/ijl yOsXkEtwPIgKBNAP+mBIm2LstFP/DLOJKTvKWjB1ZXxvuxV3yi+WMO+P6AL/nxh4I2aG hT51GvdKlWskC0QJyRDcOA50tmDzQuRFV2Mp1VVxMzj28vPgmAU+eL1/UhKYPN9Jstht GYwt7s2DXzAfwZ0PobDZSK6rTV6vmuAmvUhHNpDUWosl8Jo3qzvwmesv5riFZIVa4Tiz sN28gOJKxgISMEcmmIRbXDFjk3MKVPS8b4XbJx/NfTlIaUROk3hIUiNtuMiJ+zRnNrnb SBtQ== X-Gm-Message-State: AOUpUlEgNRwcB62wFzeOYNF6cTPM42b8ecQwM/YexX3dX+qKetIz3mli WnsUpmahXvTHU9rsQHt4WyN9Yedr X-Google-Smtp-Source: AAOMgpfgjetBmN9C+DtXtKCTC1cxpwjIwCbsH0uue2A1jnK+cnXIviqgsZrQo8NfBOjEzhYZKtlPng== X-Received: by 2002:ac8:524f:: with SMTP id y15-v6mr14451094qtn.227.1532911956911; Sun, 29 Jul 2018 17:52:36 -0700 (PDT) Received: from [10.1.6.133] (cpe-66-66-97-162.rochester.res.rr.com. [66.66.97.162]) by smtp.gmail.com with ESMTPSA id m15-v6sm7483612qki.44.2018.07.29.17.52.36 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sun, 29 Jul 2018 17:52:36 -0700 (PDT) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (1.0) Subject: Re: Request for comments, new geom part type alias: freebsd-geom From: David Cross X-Mailer: iPhone Mail (15G77) In-Reply-To: <201807292102.w6TL2Cq4062739@pdx.rh.CN85.dnsmgr.net> Date: Sun, 29 Jul 2018 20:52:35 -0400 Cc: FreeBSD Hackers Content-Transfer-Encoding: quoted-printable Message-Id: <144DA23D-26CF-4293-AE97-54CC8D6B52E3@gmail.com> References: <201807292102.w6TL2Cq4062739@pdx.rh.CN85.dnsmgr.net> To: "Rodney W. Grimes" X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 30 Jul 2018 00:52:38 -0000 Just a named GPT UUID type, like freebsd-swap, freebsd-ufs As for ambiguous data: consider you have a RAID 10 of a UFS filesystem. If y= ou put that into freebsd-ufs freebsd-boot will see that and potentially atte= mpt to boot it. If you have a raw raid gstripe, what shows up to the BIOS a= s to what this drives is depends entirely on the _contents_ of the drive at a= specific position, information that could be controlled by a user. So to '= the bios' the meaning is what the OS put there, but the OS put user data the= re; how does the OS control the intent (as the BIOS sees it) of that data? On Jul 29, 2018, at 17:02, Rodney W. Grimes wrote: >> I'd like to propose that we create a GPT partition for geom labeled >> partitions (gmirror, gstripe, geli, etc.. anything that can be 'tasted' a= nd >> automatically determined.) called 'freebsd-geom'. >>=20 >> There are numerous cases where you shouldn't have a raw geom on a disk (f= or >> example, imagine a raid 10 of a filesystem with VMs on it..on a raw disk >> its possible that the lead block happens to line up with a VM disk image o= r >> anything else a BIOS may determine is bootable). >>=20 >> So the question becomes which part id to use; IF its a mirror of a swap o= f >> UFS it seems perfectly reasonable to use freebsd-swap or freebsd-ufs (if a= >> bit dangerous). If its a mirror or a geli then you can again be in the >> situation where the boot blocks (or something else), in certain >> circumstances mistakes these for raw filesystems with similarly calamitou= s >> results. >>=20 >> Given these, it seems a 'freebsd-geom' (or similar) seems entirely >> appropriate; we can mark these for what they really are, and eliminate >> these cases where the system misinterprets intentions based on ambiguous >> data. >=20 > Do you have more details on just how your going to implement a "GPT" > partition for geom labeled partitions. Though I think I understand > what it is you want to do, how you describe it leads to some confusion > on just what you are desiring to do. >=20 > I am aware of some major issues involving gmultipath (GEOM::MULTIPATH) > and gpt partitioned disks (GEOM::GPT) that due to bad tasting priorities > you get bogus GPT error messages during boot if you have labeled your > gmultipath devices, and infact can damage a gpt disk if you apply a > multipath label onto a valid gpt disk. =20 >=20 > Please describe the "ambiguous data" as well, as I am not aware of > what that would be. >=20 > Thanks, > --=20 > Rod Grimes rgrimes@freebsd= .org From owner-freebsd-hackers@freebsd.org Mon Jul 30 05:29:16 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 23544104ACCF for ; Mon, 30 Jul 2018 05:29:16 +0000 (UTC) (envelope-from eugen@grosbein.net) Received: from hz.grosbein.net (unknown [IPv6:2a01:4f8:d12:604::2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hz.grosbein.net", Issuer "hz.grosbein.net" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 940FF88BB2 for ; Mon, 30 Jul 2018 05:29:15 +0000 (UTC) (envelope-from eugen@grosbein.net) Received: from eg.sd.rdtc.ru (root@eg.sd.rdtc.ru [62.231.161.221] (may be forged)) by hz.grosbein.net (8.15.2/8.15.2) with ESMTPS id w6U5T5rD099335 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 30 Jul 2018 07:29:06 +0200 (CEST) (envelope-from eugen@grosbein.net) X-Envelope-From: eugen@grosbein.net X-Envelope-To: freebsd-rwg@pdx.rh.CN85.dnsmgr.net Received: from [10.58.0.4] ([10.58.0.4]) by eg.sd.rdtc.ru (8.15.2/8.15.2) with ESMTPS id w6U5Su8d076715 (version=TLSv1.2 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Mon, 30 Jul 2018 12:28:56 +0700 (+07) (envelope-from eugen@grosbein.net) Subject: Re: Request for comments, new geom part type alias: freebsd-geom To: David Cross , "Rodney W. Grimes" References: <201807292102.w6TL2Cq4062739@pdx.rh.CN85.dnsmgr.net> <144DA23D-26CF-4293-AE97-54CC8D6B52E3@gmail.com> Cc: FreeBSD Hackers From: Eugene Grosbein Message-ID: <5B5EA213.9090006@grosbein.net> Date: Mon, 30 Jul 2018 12:28:51 +0700 User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.7.2 MIME-Version: 1.0 In-Reply-To: <144DA23D-26CF-4293-AE97-54CC8D6B52E3@gmail.com> Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=2.2 required=5.0 tests=BAYES_00, LOCAL_FROM, RDNS_NONE, SPF_PASS autolearn=no autolearn_force=no version=3.4.1 X-Spam-Report: * -0.0 SPF_PASS SPF: sender matches SPF record * -2.3 BAYES_00 BODY: Bayes spam probability is 0 to 1% * [score: 0.0000] * 2.6 LOCAL_FROM From my domains * 1.9 RDNS_NONE Delivered to internal network by a host with no rDNS X-Spam-Level: ** X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on hz.grosbein.net X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 30 Jul 2018 05:29:16 -0000 30.07.2018 7:52, David Cross wrote: > Just a named GPT UUID type, like freebsd-swap, freebsd-ufs > > As for ambiguous data: consider you have a RAID 10 of a UFS filesystem. > If you put that into freebsd-ufs freebsd-boot will see that and potentially attempt to boot it. One should just be allowed to mark such a partition "unbootable" so no loader even tries to boot it. And use any kind of label you like including freebsd-ufs. We should not "workaround" deficiencies of our loaders (if any) but fix it instead of invention of new partition types just for that strange reason. > If you have a raw raid gstripe, what shows up to the BIOS as to what this drives is depends > entirely on the _contents_ of the drive at a specific position, information that could be controlled by a user. Why is it important how BIOS shows gstripe'd partitions if they are marked not bootable? There were times when BIOSes unconditionally booted from floppy disk drive if it had readable floppy disk at boot time, so boot area of such floppy disks had special code saying "Non-system disk, replace and strike a key" if a floppy was not supposed to be bootable. Boot area of our non-bootable partitions might have something similar. From owner-freebsd-hackers@freebsd.org Mon Jul 30 05:42:49 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 38730104B1F4 for ; Mon, 30 Jul 2018 05:42:49 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: from mail-it0-x233.google.com (mail-it0-x233.google.com [IPv6:2607:f8b0:4001:c0b::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id BD34F8926D for ; Mon, 30 Jul 2018 05:42:48 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: by mail-it0-x233.google.com with SMTP id h20-v6so15211028itf.2 for ; Sun, 29 Jul 2018 22:42:48 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bsdimp-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=5wH472VBXlyhenfPtYDkxSqdxlC3myzHw17yGlc5dQk=; b=imtMkJkWMtLgf93j4ZNh2Sd3uzZcpBp+nWLFi0fKiVi6iKJkryqJbrYpYxks2XIoSm tpWLfV9tKXGHuTyhSvFSZQHia8weaAcQ9gzWBKdBJgYITSfvyGsqM7MSb/ZgWXGXwmva yvAv61fqVFPxULwB8eoqKixvAQ5MKExVpiGTwnbtHG8vd3fWTHLaB9PjCruLHcz1g+Zj y9z0dAzApfkhiXZy+Xnc2lAQIP4DW8W3T9NK6IomlJFWx785TYEV4qLH+g4FOwm8vkxS +RED+1qWHr6w8EGt/6ndxnwG8bqzLqyTS/YliUaHgXEwdK8onX3hr/YH7ueP9NSbrH2F F8sQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=5wH472VBXlyhenfPtYDkxSqdxlC3myzHw17yGlc5dQk=; b=ATSUTHjunArt9cYC7OneSf88SoPDiIBKd85pUo5CkE2TZ1Wivgq54Ilh+R9SCFnGE1 IajaPSwSExh69Ge0nihMSqVGMCcww9yFihImBWDx9uuQZzXoUNcIVnJg3og/XtKZutIQ Zd4uzbWI2ycXbWk/7boTuUcRMImAfG8Fwn/dTzP1djzOjOZDAOO1ya/qweNGuzRf9FF/ RhLvGXe7JeeiISLvxhMesFePlIrzUWWRZVT4frw1FdSzfgMZilZfhiwi5qfY4LN3hvd/ laUyiO2Z+GLZQGEetZ0zPCHSPi8glMHlrW7rQd9X79M+WvAuSQVtYqha/mBDamd/R/kq p30w== X-Gm-Message-State: AOUpUlFwCjOetOtJ+wT6o0na1sF2msDwSyCMaI6IPWO5u1+/UGoqcKDR jhSNkYMtTzAvUkYQXwkrtxlGxQuIZn2+QrdQQkFpkg== X-Google-Smtp-Source: AAOMgpeoQXUAcCeGKCdlF6jBsQrBOgBSZU+CKJaEsXCh0qzVoGwvlOO2OV1kkFTOGXQVtbHT50adYMgKNQjyUhtvjyI= X-Received: by 2002:a24:b211:: with SMTP id u17-v6mr12671782ite.1.1532929368063; Sun, 29 Jul 2018 22:42:48 -0700 (PDT) MIME-Version: 1.0 References: <201807292102.w6TL2Cq4062739@pdx.rh.CN85.dnsmgr.net> <144DA23D-26CF-4293-AE97-54CC8D6B52E3@gmail.com> <5B5EA213.9090006@grosbein.net> In-Reply-To: <5B5EA213.9090006@grosbein.net> From: Warner Losh Date: Sun, 29 Jul 2018 23:42:36 -0600 Message-ID: Subject: Re: Request for comments, new geom part type alias: freebsd-geom To: Eugene Grosbein Cc: David Cross , "Rodney W. Grimes" , FreeBSD Hackers Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.27 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 30 Jul 2018 05:42:49 -0000 On Sun, Jul 29, 2018, 11:31 PM Eugene Grosbein wrote: > 30.07.2018 7:52, David Cross wrote: > > > Just a named GPT UUID type, like freebsd-swap, freebsd-ufs > > > > As for ambiguous data: consider you have a RAID 10 of a UFS filesystem. > > If you put that into freebsd-ufs freebsd-boot will see that and > potentially attempt to boot it. > > One should just be allowed to mark such a partition "unbootable" so no > loader even tries to boot it. > And use any kind of label you like including freebsd-ufs. > How does one do that? We should not "workaround" deficiencies of our loaders (if any) but fix it > instead of invention of new partition types just for that strange reason. > Normally this is a non issue. > If you have a raw raid gstripe, what shows up to the BIOS as to what this > drives is depends > > entirely on the _contents_ of the drive at a specific position, > information that could be controlled by a user. > > Why is it important how BIOS shows gstripe'd partitions if they are marked > not bootable? > > There were times when BIOSes unconditionally booted from floppy disk drive > if it had readable floppy disk > at boot time, so boot area of such floppy disks had special code saying > "Non-system disk, replace and strike a key" > if a floppy was not supposed to be bootable. Boot area of our non-bootable > partitions might have something similar. > No. They don't. There is no standard way to mark something unbootable... Warner _______________________________________________ > freebsd-hackers@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-hackers > To unsubscribe, send any mail to "freebsd-hackers-unsubscribe@freebsd.org" > From owner-freebsd-hackers@freebsd.org Mon Jul 30 05:50:27 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 40040104B429 for ; Mon, 30 Jul 2018 05:50:27 +0000 (UTC) (envelope-from eugen@grosbein.net) Received: from hz.grosbein.net (unknown [IPv6:2a01:4f8:d12:604::2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hz.grosbein.net", Issuer "hz.grosbein.net" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id BD19C89457 for ; Mon, 30 Jul 2018 05:50:26 +0000 (UTC) (envelope-from eugen@grosbein.net) Received: from eg.sd.rdtc.ru (root@eg.sd.rdtc.ru [62.231.161.221] (may be forged)) by hz.grosbein.net (8.15.2/8.15.2) with ESMTPS id w6U5oJKP099503 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 30 Jul 2018 07:50:20 +0200 (CEST) (envelope-from eugen@grosbein.net) X-Envelope-From: eugen@grosbein.net X-Envelope-To: imp@bsdimp.com Received: from [10.58.0.4] ([10.58.0.4]) by eg.sd.rdtc.ru (8.15.2/8.15.2) with ESMTPS id w6U5oGrZ076887 (version=TLSv1.2 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Mon, 30 Jul 2018 12:50:16 +0700 (+07) (envelope-from eugen@grosbein.net) Subject: Re: Request for comments, new geom part type alias: freebsd-geom To: Warner Losh References: <201807292102.w6TL2Cq4062739@pdx.rh.CN85.dnsmgr.net> <144DA23D-26CF-4293-AE97-54CC8D6B52E3@gmail.com> <5B5EA213.9090006@grosbein.net> Cc: David Cross , "Rodney W. Grimes" , FreeBSD Hackers From: Eugene Grosbein Message-ID: <5B5EA713.1000007@grosbein.net> Date: Mon, 30 Jul 2018 12:50:11 +0700 User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.7.2 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=2.2 required=5.0 tests=BAYES_00, LOCAL_FROM, RDNS_NONE, SPF_PASS autolearn=no autolearn_force=no version=3.4.1 X-Spam-Report: * -0.0 SPF_PASS SPF: sender matches SPF record * -2.3 BAYES_00 BODY: Bayes spam probability is 0 to 1% * [score: 0.0000] * 2.6 LOCAL_FROM From my domains * 1.9 RDNS_NONE Delivered to internal network by a host with no rDNS X-Spam-Level: ** X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on hz.grosbein.net X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 30 Jul 2018 05:50:27 -0000 30.07.2018 12:42, Warner Losh wrote: > No. They don't. There is no standard way to mark something unbootable... Then a code in the boot area of our non-bootable partitions should prevent meaningless boot attempts preferably skipping to next partition or drive like our boot0 can. From owner-freebsd-hackers@freebsd.org Mon Jul 30 07:11:31 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 1BC71104D0C4 for ; Mon, 30 Jul 2018 07:11:31 +0000 (UTC) (envelope-from eugen@grosbein.net) Received: from hz.grosbein.net (unknown [IPv6:2a01:4f8:d12:604::2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hz.grosbein.net", Issuer "hz.grosbein.net" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 96E228B86D for ; Mon, 30 Jul 2018 07:11:30 +0000 (UTC) (envelope-from eugen@grosbein.net) Received: from eg.sd.rdtc.ru (root@eg.sd.rdtc.ru [62.231.161.221] (may be forged)) by hz.grosbein.net (8.15.2/8.15.2) with ESMTPS id w6U7BMdb000259 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 30 Jul 2018 09:11:23 +0200 (CEST) (envelope-from eugen@grosbein.net) X-Envelope-From: eugen@grosbein.net X-Envelope-To: imp@bsdimp.com Received: from [10.58.0.4] ([10.58.0.4]) by eg.sd.rdtc.ru (8.15.2/8.15.2) with ESMTPS id w6U7BJwh077465 (version=TLSv1.2 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Mon, 30 Jul 2018 14:11:19 +0700 (+07) (envelope-from eugen@grosbein.net) Subject: Re: Request for comments, new geom part type alias: freebsd-geom To: Warner Losh References: <201807292102.w6TL2Cq4062739@pdx.rh.CN85.dnsmgr.net> <144DA23D-26CF-4293-AE97-54CC8D6B52E3@gmail.com> <5B5EA213.9090006@grosbein.net> Cc: David Cross , "Rodney W. Grimes" , FreeBSD Hackers From: Eugene Grosbein Message-ID: <5B5EBA12.3020609@grosbein.net> Date: Mon, 30 Jul 2018 14:11:14 +0700 User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.7.2 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=2.2 required=5.0 tests=BAYES_00, LOCAL_FROM, RDNS_NONE, SPF_PASS autolearn=no autolearn_force=no version=3.4.1 X-Spam-Report: * -0.0 SPF_PASS SPF: sender matches SPF record * -2.3 BAYES_00 BODY: Bayes spam probability is 0 to 1% * [score: 0.0000] * 2.6 LOCAL_FROM From my domains * 1.9 RDNS_NONE Delivered to internal network by a host with no rDNS X-Spam-Level: ** X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on hz.grosbein.net X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 30 Jul 2018 07:11:31 -0000 30.07.2018 12:42, Warner Losh: >> One should just be allowed to mark such a partition "unbootable" so no >> loader even tries to boot it. >> And use any kind of label you like including freebsd-ufs. > > How does one do that? > > We should not "workaround" deficiencies of our loaders (if any) but fix it >> instead of invention of new partition types just for that strange reason. >> > > Normally this is a non issue. > >> If you have a raw raid gstripe, what shows up to the BIOS as to what this >> drives is depends >>> entirely on the _contents_ of the drive at a specific position, >> information that could be controlled by a user. >> >> Why is it important how BIOS shows gstripe'd partitions if they are marked >> not bootable? >> >> There were times when BIOSes unconditionally booted from floppy disk drive >> if it had readable floppy disk >> at boot time, so boot area of such floppy disks had special code saying >> "Non-system disk, replace and strike a key" >> if a floppy was not supposed to be bootable. Boot area of our non-bootable >> partitions might have something similar. >> > > No. They don't. There is no standard way to mark something unbootable... For UEFI case there is the BootOrder list useful for this particular task. From owner-freebsd-hackers@freebsd.org Mon Jul 30 11:56:59 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 51E971053CA1; Mon, 30 Jul 2018 11:56:59 +0000 (UTC) (envelope-from elenamihailescu22@gmail.com) Received: from mail-oi0-x22e.google.com (mail-oi0-x22e.google.com [IPv6:2607:f8b0:4003:c06::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id D8F6D95C00; Mon, 30 Jul 2018 11:56:58 +0000 (UTC) (envelope-from elenamihailescu22@gmail.com) Received: by mail-oi0-x22e.google.com with SMTP id q11-v6so20658373oic.12; Mon, 30 Jul 2018 04:56:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:from:date:message-id:subject:to:cc; bh=64uKS1lktvxfxsm1mHU7il6rxsNopLY9JC2V9LQz0Aw=; b=gw63Xk55yZ6BRFLEFfX1oFIaeQOMirfZEH3sp6JTVX7fZAzXJhVhzmBBFs8OHDHRNE 8S0X48T/mL+leXs8dT78IoCEdwzUeOPLlfHyYoiGwZlvDe2lM4ywO9zpPOjtps4vSM83 4FQyLy74rukQmtw3nSQKWfFNBSTIdEGm7FHpEDjHieTdgw9/indjnX9tyZMsPCirkJmi hNre5xAWFRPUDRxC92AEays9TKjBwfX+1IWy18oMD5n/j7xL1birEyrHatALWVrZlF1T KuNfcFeLyhJmXwI4ILZ6tFbOpIBRUXceVHYw+85qDja7XYgHscdFnO+7/t+xq0JH+/bl K7QA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to:cc; bh=64uKS1lktvxfxsm1mHU7il6rxsNopLY9JC2V9LQz0Aw=; b=smvKzCglQsoEprIHGNoRCnFGtUOqsT1CDmyHHAqhSbgFlna1G4ThiE60xFWW+xDrCb 9pBTEPvbFRfHxT2WJLBVvRSYF1ruG5mNDmL6030P27XxmhNIswxRBFwbxPNTEme5noll c9SC+PNbBXgY1KOMwzfTKm1I0h6Q5JJcfRxNwr6jAlzR5xsUCFlyKIgeYfjHeDoxn+J/ M9bUraB6V0VnRGjbvP6OduSVWebOP06PYkyy3htIb0O3jjbvPPPziwk88VjY9qtseKmk ctOmSplaivA3INCBTxxS6wWirhlaSPYwhpe9JsIP+qdec5ce8lHRFrE3gjLxnJjV8wMu 8PNw== X-Gm-Message-State: AOUpUlENWPVgcjhck5s/BQt9HXxAYm1im4zZ7Gta4gLavJkFwlu9DN2u Vb+gPTQQ2qAvuhtXBry1P3QPnFkxZkVgpkUMd20CUw== X-Google-Smtp-Source: AAOMgpdA/mA45z9B5XuQm7vzaxGDJze9fOt9240GW3y1oiGBlamLbOrRihU4Ogpd9AtlxIPIjfPl+dd37Oj8h3HAnQU= X-Received: by 2002:aca:ed45:: with SMTP id l66-v6mr18550434oih.40.1532951817444; Mon, 30 Jul 2018 04:56:57 -0700 (PDT) MIME-Version: 1.0 Received: by 2002:a9d:3c4e:0:0:0:0:0 with HTTP; Mon, 30 Jul 2018 04:56:27 -0700 (PDT) From: Elena Mihailescu Date: Mon, 30 Jul 2018 14:56:27 +0300 Message-ID: Subject: bhyve internals related to FreeBSD memory mechanisms To: freebsd-virtualization@freebsd.org, freebsd-amd64@freebsd.org, freebsd-hackers@freebsd.org Cc: Mihai Carabas , Darius Mihai Content-Type: text/plain; charset="UTF-8" X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 30 Jul 2018 11:56:59 -0000 Hello, I'll start by giving some context before asking my questions. Currently, we are trying to implement a live migration feature for bhyve. In order to do that, we want to mark the guest memory copy-on-write. As we've previously discussed this problem on the freebsd-virtualization list [1], the vm_entry structure that contains the guest memory needs to have the MAP_ENTRY_COW and MAP_ENTRY_NEEDS_COPY flags set. The way the migration mechanism will work in "rounds" is described bellow (it is a pre-copy live migration technique): - in the first round, after starting the procedure and checking the compatibility of the two systems, the entire guest memory will be sent at the destination - in the second round, after the transfer is completed, only the differences (pages that were written/dirtied since the first round started) will be sent to the destination ... - in the n-th round, only the differences between this round and the round (n - 1) will be sent. Before the last round, the guest will be stopped, and the remaining memory will be sent along with the CPU state. We need the COW mechanism to determine changes between rounds. As for the number of rounds, there could be maximum 10 rounds. the value is set without running any benchmarks to limit potential overhead). The number of rounds will be decided later based on the test results. The number of new objects on the source will be also not very high since the number of steps is limited. After the migration process is completed, the guest from the source system will be destroyed and those new created object will be no longer needed (will be discarded). ---- As we could see by inspecting and debugging the bhyve code, the object (currently, we are using a 512MB bhyve guest, for more physical memory assigned to the virtual machine, there could be more objects) that describes the guest memory, is pointed to by two vm_entry structures from two different vmspace structures: - the first one is the vmspace that describes host's virtual memory - the second one is a separated vmspace structure created by the hypervisor when creating the virtual machine. I have several questions about the FreeBSD's memory management and bhyve's internals because I wasn't able to determine this yet by myself. The first one is that if someone knows whether that object that describes the guest memory is contained only by the two vm_entry structures, or whether it is contained by other entries. We could not find if it so or not. As far as I could tell, the COW can be set only for vm_entry structures. Is there a way to set as copy-on-write just certain pages or maybe just the object and not its vm_entry structure? I want to know if there is a more fine grain mechanism to set just parts of the memory as COW. We need a finer granularity when setting pages as copy-on-write because we encountered some issues: - virtio mechanisms are working by having a shared memory region between host and guest and while transferring the guest memory state, the pages that are involved in the virtio communication do not need to be set COW. - if we are trying to mark the vm_entry that contains the guest memory as COW from the host vmspace, the virtio devices will crash the guest eventually (some assertions about IOV and operation types will fail). We know that we should not set that memory as copy-on-write because it is not the way the guest sees its physical memory but, - if we set the vm_entry that contains the object with guest memory as COW from the dedicated vmspace created for the guest, the virtio devices will not fail assertions anymore, but after some time it seems that the guest filesystem is corrupted. Usually, we can start the guest normally after entering in single user mode and running fsck. Sometime, we need to install the virtual machine again. Also, after setting the vm_entry from the guest dedicated vmspace as COW, the two vm_entry will have different views of the guest memory: - the vm_entry from the guest dedicated vmspace will point to a new object (of course, after a first write access) - the vm_entry from the host vmspace that contains the guest memory will point to the old object that now has as backing object the new created object. Another question might be if it is ok to "change" the object from the host's vm_entry to point to the backing object. In this case, the two entries will point again to the same object. This might imply to remap/redo the references contained by the old object to point to the new object. [1] http://freebsd.1045724.x6.nabble.com/Inspect-pages-created-after-a-vm-object-is-marked-as-copy-on-write-td6266552.html Thank you, Elena From owner-freebsd-hackers@freebsd.org Tue Jul 31 12:16:34 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 4F8C51058837 for ; Tue, 31 Jul 2018 12:16:34 +0000 (UTC) (envelope-from timo.voelker@fh-muenster.de) Received: from mail.fh-muenster.de (mail.fh-muenster.de [212.201.120.190]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "mail.fh-muenster.de", Issuer "DFN-Verein Global Issuing CA" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id DB08C88337 for ; Tue, 31 Jul 2018 12:16:33 +0000 (UTC) (envelope-from timo.voelker@fh-muenster.de) Received: from fhad-ex04.fhad.fh-muenster.de (unknown [10.40.11.27]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by mail.fh-muenster.de (Postfix) with ESMTPS id 2616F2805E7 for ; Tue, 31 Jul 2018 14:16:25 +0200 (CEST) Received: from fhad-ex13.fhad.fh-muenster.de (10.41.11.26) by fhad-ex04.fhad.fh-muenster.de (10.40.11.27) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1415.2; Tue, 31 Jul 2018 14:16:24 +0200 Received: from fhad-ex13.fhad.fh-muenster.de ([fe80::d9a6:349d:aadc:72e6]) by fhad-ex13.fhad.fh-muenster.de ([fe80::d9a6:349d:aadc:72e6%5]) with mapi id 15.01.1415.002; Tue, 31 Jul 2018 14:16:24 +0200 From: =?iso-8859-1?Q?Timo_V=F6lker?= To: "freebsd-hackers@freebsd.org" Subject: Unable to UEFI boot 11.2 via pxeboot Thread-Topic: Unable to UEFI boot 11.2 via pxeboot Thread-Index: AQHUKMhMew0hdqUEi0aHRvEG2Omq+Q== Date: Tue, 31 Jul 2018 12:16:24 +0000 Message-ID: Accept-Language: en-US, de-DE Content-Language: en-US X-MS-Has-Attach: yes X-MS-TNEF-Correlator: x-originating-ip: [10.40.10.31] Content-Type: multipart/signed; boundary="Apple-Mail=_583B887E-EE35-41BE-AF2D-EDCBBFA24C7C"; protocol="application/pkcs7-signature"; micalg=sha1 MIME-Version: 1.0 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 31 Jul 2018 12:16:34 -0000 --Apple-Mail=_583B887E-EE35-41BE-AF2D-EDCBBFA24C7C Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=us-ascii Hi, I'm unable to boot up the amd64 11.2 via pxeboot using UEFI on a Dell = PowerEdge R430. I get this output https://ibb.co/h5ntuT If I press a key to interrupt reboot, I get to the OK prompt. If I enter = lsdev -v, it prints nothing more than "net devices:". The variable = currdev is not set (show currdev prints variable 'currdev' not found). I = configured pxeboot to be the one and only boot medium in BIOS setup.=20 However, I found a workaround that works for me. If I put an (empty) USB = stick in a USB port of the PowerEdge, it successfully boots via pxeboot = (which is still the one and only configured boot medium). I then get = this output https://ibb.co/mU8SM8 With FreeBSD 11.1 pxeboot worked on the Dell PowerEdge R430, even = without a USB stick plugged in. I couldn't test this with FreeBSD = 12-current. Hope this helps anyway to find an open issue. I found this thread which seems to be related. = https://lists.freebsd.org/pipermail/freebsd-current/2018-July/070082.html Thanks, Timo= --Apple-Mail=_583B887E-EE35-41BE-AF2D-EDCBBFA24C7C Content-Disposition: attachment; filename="smime.p7s" Content-Type: application/pkcs7-signature; name="smime.p7s" Content-Transfer-Encoding: base64 MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIQsDCCBRIw ggP6oAMCAQICCQDjC9X4ryXZgTANBgkqhkiG9w0BAQsFADCBgjELMAkGA1UEBhMCREUxKzApBgNV BAoMIlQtU3lzdGVtcyBFbnRlcnByaXNlIFNlcnZpY2VzIEdtYkgxHzAdBgNVBAsMFlQtU3lzdGVt cyBUcnVzdCBDZW50ZXIxJTAjBgNVBAMMHFQtVGVsZVNlYyBHbG9iYWxSb290IENsYXNzIDIwHhcN MTYwMjIyMTMzODIyWhcNMzEwMjIyMjM1OTU5WjCBlTELMAkGA1UEBhMCREUxRTBDBgNVBAoTPFZl cmVpbiB6dXIgRm9lcmRlcnVuZyBlaW5lcyBEZXV0c2NoZW4gRm9yc2NodW5nc25ldHplcyBlLiBW LjEQMA4GA1UECxMHREZOLVBLSTEtMCsGA1UEAxMkREZOLVZlcmVpbiBDZXJ0aWZpY2F0aW9uIEF1 dGhvcml0eSAyMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAy2DX/2ahQc3S+oeXinOr mU3qZzlaoWCARxVOjJWy5c/O01dLjc74VmwVVXYH6kb9yANFYz5w1KtUgLEjnL43KKkJ/wVdGA/E mJk3syD2ZngXh8KdDsxKMucWna4OjSl5BwAgVNwVX0qW13i2NNPBdLWd6b/Ad03qvVkH4FovbDyl ANw1vWUNj38ybfJaaktiAe6sODRZRTZJBdp4ymptW8CBaxHM0jyoi/hxGso74oDdFrRneos26k6R KT2zUVytqAy+nTTj0Q0Xg3XEOR6wlAsS8dVpjiX0uD0rv8COwx47pb9VEKsqrheXXjPOyPP0CQfj AoYxRmsBxRAMEcdZ6QIDAQABo4IBdDCCAXAwDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBST49gy JtrV8UqlkUrg6kviogzP4TAfBgNVHSMEGDAWgBS/WSA2AHmgoCJrjNXyYdK4LMuCSjASBgNVHRMB Af8ECDAGAQH/AgECMDMGA1UdIAQsMCowDwYNKwYBBAGBrSGCLAEBBDANBgsrBgEEAYGtIYIsHjAI BgZngQwBAgIwTAYDVR0fBEUwQzBBoD+gPYY7aHR0cDovL3BraTAzMzYudGVsZXNlYy5kZS9ybC9U ZWxlU2VjX0dsb2JhbFJvb3RfQ2xhc3NfMi5jcmwwgYYGCCsGAQUFBwEBBHoweDAsBggrBgEFBQcw AYYgaHR0cDovL29jc3AwMzM2LnRlbGVzZWMuZGUvb2NzcHIwSAYIKwYBBQUHMAKGPGh0dHA6Ly9w a2kwMzM2LnRlbGVzZWMuZGUvY3J0L1RlbGVTZWNfR2xvYmFsUm9vdF9DbGFzc18yLmNlcjANBgkq hkiG9w0BAQsFAAOCAQEAhwv/PgKbZchWLdY7mpiLcU/auimqIflGLvWypA+uETh5OLMOdLp2XZ7o GIKWYttMM+jd+WrfMr0sTEdgVX/ndGu0LIPYeWu2t01QC2YHte2zl63q7n8w5pn9IuJyTT6EW+75 z5nqf9dSOS6smABEfmk7v3Xu0As7Gs3l9w8ibEeE9qVHoP3QGjR9rdI9d7Pu9NdN/8Po5ZJPWT6Q RxBKsIVYwG9/+K7tCEKeHtTfFC5Nj7yelMPn7fYY+DxJ5yaopzbYLN4izYuC2Nl44lUSozuHRLYR C9UMUq9pjA8G39CiU4tXmHvP/Qck9Py9w/1KkgKXG/K3ts9lihqitXIZOTCCBawwggSUoAMCAQIC BxtjutAeLD0wDQYJKoZIhvcNAQELBQAwgZUxCzAJBgNVBAYTAkRFMUUwQwYDVQQKEzxWZXJlaW4g enVyIEZvZXJkZXJ1bmcgZWluZXMgRGV1dHNjaGVuIEZvcnNjaHVuZ3NuZXR6ZXMgZS4gVi4xEDAO BgNVBAsTB0RGTi1QS0kxLTArBgNVBAMTJERGTi1WZXJlaW4gQ2VydGlmaWNhdGlvbiBBdXRob3Jp dHkgMjAeFw0xNjA1MjQxMTM4NDBaFw0zMTAyMjIyMzU5NTlaMIGNMQswCQYDVQQGEwJERTFFMEMG A1UECgw8VmVyZWluIHp1ciBGb2VyZGVydW5nIGVpbmVzIERldXRzY2hlbiBGb3JzY2h1bmdzbmV0 emVzIGUuIFYuMRAwDgYDVQQLDAdERk4tUEtJMSUwIwYDVQQDDBxERk4tVmVyZWluIEdsb2JhbCBJ c3N1aW5nIENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAnTt5HEfeH4bLxmnXEJ45 19miMNtyHAV/KV9LaPGtGdZM4WsbsQt/oavge4uL2C3Obog6EO5X5R5/BFE267pwbWOgvpYuQOHR g0xmPRxkaeWbpK1yrmg5UYd5zBfTri9dY3FLOXrrQqeXkGkFv5D/pEBwvQPnv54YiB+fmYhNDkeN SF9lmRDS2SpJ7cG5LR2fEssV0z9/HlQvOq6TV6d+eMrVSuIa5e1BfVNfyLMq9YowrO0XBSQ/tqAL B/1NGpoDUqA2nN4kh2Xk5/rHlnMkFM3Q6BtonhhZrnZ+99EKeDyHS7A3z1PKOjgQ88tHbYxkPTxa RUq6yoB8uPPnp0xMzQIDAQABo4ICBTCCAgEwEgYDVR0TAQH/BAgwBgEB/wIBATAOBgNVHQ8BAf8E BAMCAQYwKQYDVR0gBCIwIDANBgsrBgEEAYGtIYIsHjAPBg0rBgEEAYGtIYIsAQEEMB0GA1UdDgQW BBRrOpiL+fJTidrgrbIyHgkf6Ko7dDAfBgNVHSMEGDAWgBST49gyJtrV8UqlkUrg6kviogzP4TCB jwYDVR0fBIGHMIGEMECgPqA8hjpodHRwOi8vY2RwMS5wY2EuZGZuLmRlL2dsb2JhbC1yb290LWcy LWNhL3B1Yi9jcmwvY2FjcmwuY3JsMECgPqA8hjpodHRwOi8vY2RwMi5wY2EuZGZuLmRlL2dsb2Jh bC1yb290LWcyLWNhL3B1Yi9jcmwvY2FjcmwuY3JsMIHdBggrBgEFBQcBAQSB0DCBzTAzBggrBgEF BQcwAYYnaHR0cDovL29jc3AucGNhLmRmbi5kZS9PQ1NQLVNlcnZlci9PQ1NQMEoGCCsGAQUFBzAC hj5odHRwOi8vY2RwMS5wY2EuZGZuLmRlL2dsb2JhbC1yb290LWcyLWNhL3B1Yi9jYWNlcnQvY2Fj ZXJ0LmNydDBKBggrBgEFBQcwAoY+aHR0cDovL2NkcDIucGNhLmRmbi5kZS9nbG9iYWwtcm9vdC1n Mi1jYS9wdWIvY2FjZXJ0L2NhY2VydC5jcnQwDQYJKoZIhvcNAQELBQADggEBAIF4RaROpH8OVfAJ sWo+eMxoNakc85WeP/P432s4d4ksjbWtPsfylM2gBq66zKixrTMItiSGYjZMeG5Q8NVuYI1PUjFD l0Z18GLkbmZRwUIxZ1DlSec5HsufyoZI3ggU/xVLK2aboDifAM79p+vRf1ctyExf3BARlz6WBAJc hKgpOWyU/BCSBnue7thGtBu1Aww42dywqT9xBguyAwczwo1IYyUlPHp7V273igU477igri/02wfV W4QYwam4S85skBqC5Lk9+nfx0h8zAr9T53b53CYlQW8vphv6pBOQ+nx+2QtgXey/ykGgYfsRSSnY qC11FdhKGOoW71U0IhoTjQYwggXmMIIEzqADAgECAgwdgtH8FJ0VCMZ26e4wDQYJKoZIhvcNAQEL BQAwgY0xCzAJBgNVBAYTAkRFMUUwQwYDVQQKDDxWZXJlaW4genVyIEZvZXJkZXJ1bmcgZWluZXMg RGV1dHNjaGVuIEZvcnNjaHVuZ3NuZXR6ZXMgZS4gVi4xEDAOBgNVBAsMB0RGTi1QS0kxJTAjBgNV BAMMHERGTi1WZXJlaW4gR2xvYmFsIElzc3VpbmcgQ0EwHhcNMTcwNzEwMTAxODIwWhcNMjAwNzA5 MTAxODIwWjB6MQswCQYDVQQGEwJERTEgMB4GA1UECgwXRmFjaGhvY2hzY2h1bGUgTXVlbnN0ZXIx MjAwBgNVBAsMKUZhY2hiZXJlaWNoIEVsZWt0cm90ZWNobmlrIHVuZCBJbmZvcm1hdGlrMRUwEwYD VQQDDAxUaW1vIFZvZWxrZXIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC/gQYu/Hjb 3078pLzYaFpcgo/JHZHLjOLe85YFMr056WFSN/Jwdh1Asny4ZKcLzHd7vMjr3fjg8Sgo04y+lBI4 8O5FJTgixYB1oV9DU5GlWcC/6eLhpIPNraOcK4KJVlwqw7uc1L8fbyjCMrTNtYHFEy23B9NFgxbS pxhQ6FCgS6kjziTgFL6s072+j6MMJi1RdZZUNZGq52gCyIKNAxMt2b42/Kk7PTWYCSA8HzxrLsQe YxmxoxLoGTlnZxuC8WKU+1V1pUiS+Ns3krHHBHIeeogR/JeILBX0OheqStUnnEABcsWj+4uGYxvP RdZXBXm8wKjcRcnJDrKizS4G6j27AgMBAAGjggJWMIICUjBABgNVHSAEOTA3MBEGDysGAQQBga0h giwBAQQDBTARBg8rBgEEAYGtIYIsAgEEAwEwDwYNKwYBBAGBrSGCLAEBBDAJBgNVHRMEAjAAMA4G A1UdDwEB/wQEAwIF4DAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwQwHQYDVR0OBBYEFOOJ r1RvTOvocygvlHm6xGfZS5dNMB8GA1UdIwQYMBaAFGs6mIv58lOJ2uCtsjIeCR/oqjt0MCYGA1Ud EQQfMB2BG3RpbW8udm9lbGtlckBmaC1tdWVuc3Rlci5kZTCBjQYDVR0fBIGFMIGCMD+gPaA7hjlo dHRwOi8vY2RwMS5wY2EuZGZuLmRlL2Rmbi1jYS1nbG9iYWwtZzIvcHViL2NybC9jYWNybC5jcmww P6A9oDuGOWh0dHA6Ly9jZHAyLnBjYS5kZm4uZGUvZGZuLWNhLWdsb2JhbC1nMi9wdWIvY3JsL2Nh Y3JsLmNybDCB2wYIKwYBBQUHAQEEgc4wgcswMwYIKwYBBQUHMAGGJ2h0dHA6Ly9vY3NwLnBjYS5k Zm4uZGUvT0NTUC1TZXJ2ZXIvT0NTUDBJBggrBgEFBQcwAoY9aHR0cDovL2NkcDEucGNhLmRmbi5k ZS9kZm4tY2EtZ2xvYmFsLWcyL3B1Yi9jYWNlcnQvY2FjZXJ0LmNydDBJBggrBgEFBQcwAoY9aHR0 cDovL2NkcDIucGNhLmRmbi5kZS9kZm4tY2EtZ2xvYmFsLWcyL3B1Yi9jYWNlcnQvY2FjZXJ0LmNy dDANBgkqhkiG9w0BAQsFAAOCAQEAGEYW34tG4ACeQk3vN6TBr9HRRE4Rc3tJoh5odaAx4UDnO6B7 EsTOSyZmJ5jdY6ui8ns9jiwwv6yZsuhopqSatS06aSlXoJ7GWBeTS9FbDu4Fa3+Hmfo+UiqG0cul MLOfKasuZx8bsoOq1kR7WdABUL3m7FuLhIVEeuJ39yQSiWxwJ4jZ5Cx0evaXIcGDIXOE9e+GcXz2 mm1yfFxITLHt5q37phfTDLH4IOgWt9GORlDBoatSu56QwfRGwhVYmkTRrUFss3QuQ/z3SwOt30Lj MNdVk6OkQBNj9QBH5PSH/Ok/JIQODVotZWG7HQ8/8nyzYTH0ccW/1HIrCwvKicZJcTGCA40wggOJ AgEBMIGeMIGNMQswCQYDVQQGEwJERTFFMEMGA1UECgw8VmVyZWluIHp1ciBGb2VyZGVydW5nIGVp bmVzIERldXRzY2hlbiBGb3JzY2h1bmdzbmV0emVzIGUuIFYuMRAwDgYDVQQLDAdERk4tUEtJMSUw IwYDVQQDDBxERk4tVmVyZWluIEdsb2JhbCBJc3N1aW5nIENBAgwdgtH8FJ0VCMZ26e4wCQYFKw4D AhoFAKCCAcMwGAYJKoZIhvcNAQkDMQsGCSqGSIb3DQEHATAcBgkqhkiG9w0BCQUxDxcNMTgwNzMx MTIxNjI1WjAjBgkqhkiG9w0BCQQxFgQUZzbGHUvmydx8ZwY5gJ/FYHrfn7Qwga8GCSsGAQQBgjcQ BDGBoTCBnjCBjTELMAkGA1UEBhMCREUxRTBDBgNVBAoMPFZlcmVpbiB6dXIgRm9lcmRlcnVuZyBl aW5lcyBEZXV0c2NoZW4gRm9yc2NodW5nc25ldHplcyBlLiBWLjEQMA4GA1UECwwHREZOLVBLSTEl MCMGA1UEAwwcREZOLVZlcmVpbiBHbG9iYWwgSXNzdWluZyBDQQIMHYLR/BSdFQjGdunuMIGxBgsq hkiG9w0BCRACCzGBoaCBnjCBjTELMAkGA1UEBhMCREUxRTBDBgNVBAoMPFZlcmVpbiB6dXIgRm9l cmRlcnVuZyBlaW5lcyBEZXV0c2NoZW4gRm9yc2NodW5nc25ldHplcyBlLiBWLjEQMA4GA1UECwwH REZOLVBLSTElMCMGA1UEAwwcREZOLVZlcmVpbiBHbG9iYWwgSXNzdWluZyBDQQIMHYLR/BSdFQjG dunuMA0GCSqGSIb3DQEBAQUABIIBABMt9Bf4mK2aO0tzGdjyJ+9i2MJ0OD4pmDEFYU96yCACj95D H1mGnoCInyf8V5Be+U3KXAYuMFjT34XjnXs0b4vbGbPCx8Zr4P6Gw+r/41PNYqsz2GcAhvhJW9kP t9lXSQ5Nzb/upYHrIHGJ03XvPfhoF4OvI72AAxvdMpQmYGV0/QRfM+E66XiNmktcT3RoxM2sBeM6 6g8/P7SkUkL87MSMbPFUImIP+IaC0XF+6h+X4mtV1eH1RdH2Y20oARYiaV1Vf/M6IPRny7glDPmu zcWLWGDkTGXzK/QutBYWJCZIZMzYSVaphq6hSH7nElxwuJzVc6OC209EdUga+xVwOfgAAAAAAAA= --Apple-Mail=_583B887E-EE35-41BE-AF2D-EDCBBFA24C7C-- From owner-freebsd-hackers@freebsd.org Tue Jul 31 21:49:29 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 8A1B41065F2B for ; Tue, 31 Jul 2018 21:49:29 +0000 (UTC) (envelope-from markjdb@gmail.com) Received: from mail-pl0-x235.google.com (mail-pl0-x235.google.com [IPv6:2607:f8b0:400e:c01::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id EFA747F457 for ; Tue, 31 Jul 2018 21:49:28 +0000 (UTC) (envelope-from markjdb@gmail.com) Received: by mail-pl0-x235.google.com with SMTP id u11-v6so2206609plq.5 for ; Tue, 31 Jul 2018 14:49:28 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:date:from:to:subject:message-id:mime-version :content-disposition:user-agent; bh=C6meedY3x/HxFigro+2OpCah0XglvwDixFpHsY8vmwQ=; b=a/O2pZbnYem8Y1Gpwi/LCFoaWDeMOVpNzEgfnyb83Gxw60NNIoUG4zE/CR+5+dW7rf TC6xdgkNopzboc/WY6O9O0bEB8k3OdUvNXnHKUlRVI1+zDaQt3qfJCb/dEH9idaYrrsH lrlfJowsLgTTnMioz/3qeanyKUwg7aHKL1vJ/paFDE4sAVjMQ8BLpnpvqcvJ+m7/Vyd/ 5dWG374BYNeU8LQ1b0KKPVyKwjnCLpOOWmZrZJt0ENfEn6tDzDMUNJjz2mqUKT0+poz2 2DAQBcKry0J5cKzGAwNTFb4tmVjta04rYJ6fJXKTxvFxAhlCmdknci83ZZGECKduJuXa jeQw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:from:to:subject:message-id :mime-version:content-disposition:user-agent; bh=C6meedY3x/HxFigro+2OpCah0XglvwDixFpHsY8vmwQ=; b=EWbHHSRLLNHuM1gXyyko0WVu6c5Rx9fnB3f6ZUue7jrg3/8MpjjYqqVDLUep47+i5E 3JeVY/+Zo8pw4VEk+Hzu4m7Tc5nVHvTZ9ndJjaiMZVmCae8qOtvEQ+tR8PFDG/gKL2xb VEFWwTOroJ3w55J69L/Y9fMj/RIhFnHj2PYCQKua9fgyFDw1xAG7Reg9V8qGumLLAMn6 jz7KZTN1qaw7/pdzFWfEid2mXKlguxm39htS+BR/ieOXkIrICzl9+LLplZIpyvB0/qHo Qfmp3YrdqjWQBrocjwTPauJksaFIPFBjegzNFfF+HtEym0ADlQYZ62ieo7m3G2FBqmqo Upqg== X-Gm-Message-State: AOUpUlEFM6n280Sp1wZC0DE4kOHYIaFSnnZbb4Z5PvheDrB5n3X57VDU 6jvWSZvem5oknBJ34NQ5vv3qL1my X-Google-Smtp-Source: AAOMgpf2WkOmSeY29Ua0ANRPjsSXO/HcL1ee1cLYGCBoiG8AIsITdTQaXhhijZu8rvJ2Sj8O/UNHjg== X-Received: by 2002:a17:902:22e:: with SMTP id 43-v6mr16279603plc.118.1533073767342; Tue, 31 Jul 2018 14:49:27 -0700 (PDT) Received: from raichu (toroon0560w-lp130-09-70-52-224-239.dsl.bell.ca. [70.52.224.239]) by smtp.gmail.com with ESMTPSA id s27-v6sm29213707pfk.133.2018.07.31.14.49.25 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 31 Jul 2018 14:49:26 -0700 (PDT) Sender: Mark Johnston Date: Tue, 31 Jul 2018 17:49:20 -0400 From: Mark Johnston To: freebsd-hackers@freebsd.org Subject: COMPAT_43 users? Message-ID: <20180731214920.GA95743@raichu> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.10.1 (2018-07-13) X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 31 Jul 2018 21:49:29 -0000 The COMPAT_43 kernel option, which enables syscall support for 4.3BSD binaries, hasn't been enabled in the standard kernel configs for well over a decade, and doesn't appear to be a dependency of any other kernel features. Nonetheless, the kernel contains quite a bit of code to support this option. Does anyone use it in modern versions of FreeBSD or have any arguments for keeping it? From owner-freebsd-hackers@freebsd.org Wed Aug 1 00:39:37 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 82563106AF62 for ; Wed, 1 Aug 2018 00:39:37 +0000 (UTC) (envelope-from julian@freebsd.org) Received: from vps1.elischer.org (vps1.elischer.org [204.109.63.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "vps1.elischer.org", Issuer "CA Cert Signing Authority" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 27B658BF31; Wed, 1 Aug 2018 00:39:37 +0000 (UTC) (envelope-from julian@freebsd.org) Received: from Julian-MBP3.local (124-169-199-167.dyn.iinet.net.au [124.169.199.167]) (authenticated bits=0) by vps1.elischer.org (8.15.2/8.15.2) with ESMTPSA id w710dV80024044 (version=TLSv1.2 cipher=DHE-RSA-AES128-SHA bits=128 verify=NO); Tue, 31 Jul 2018 17:39:35 -0700 (PDT) (envelope-from julian@freebsd.org) Subject: Re: COMPAT_43 users? To: freebsd-hackers@freebsd.org, John Baldwin References: <20180731214920.GA95743@raichu> From: Julian Elischer Message-ID: Date: Wed, 1 Aug 2018 08:39:26 +0800 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: <20180731214920.GA95743@raichu> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit Content-Language: en-US X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 01 Aug 2018 00:39:37 -0000 On 1/8/18 5:49 am, Mark Johnston wrote: > The COMPAT_43 kernel option, which enables syscall support for 4.3BSD > binaries, hasn't been enabled in the standard kernel configs for well > over a decade, and doesn't appear to be a dependency of any other kernel > features. Nonetheless, the kernel contains quite a bit of code to > support this option. Does anyone use it in modern versions of FreeBSD > or have any arguments for keeping it? > _______________________________________________ > freebsd-hackers@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-hackers > To unsubscribe, send any mail to "freebsd-hackers-unsubscribe@freebsd.org" > It is useful for really ancient jails I believe. The person I would trust on this is jhb. (CC'd) I occasionally like to run a freebsd-1.1 jail.. but While I enable it I am not sure if I need it. From owner-freebsd-hackers@freebsd.org Wed Aug 1 01:46:36 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id D6E2A106C6D2 for ; Wed, 1 Aug 2018 01:46:35 +0000 (UTC) (envelope-from marklmi@yahoo.com) Received: from sonic307-12.consmr.mail.ne1.yahoo.com (sonic307-12.consmr.mail.ne1.yahoo.com [66.163.190.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 656C28DC5C for ; Wed, 1 Aug 2018 01:46:35 +0000 (UTC) (envelope-from marklmi@yahoo.com) X-YMail-OSG: AmAk3AMVM1nj3.KdGSoy.C9GIdTViRbWmwHXGTRvVJC9UHGZjxDciEk7XvVnINx qfGlKAB__xqm5pdM.ta3aE.jI3k94Y.JQqnGkUf7sZsUPqmtrvN1xzv8Cz4zAfO036BOkT_4slX7 ylBd5mkcxAx3R8Bjs7YbLHLLlzrqv0OKqKG_lbFpmPSm4thkgtDSU2OM9eY6ibliXHUT9D3wqgeQ 76j8frSPT3fULoWYPJsMu5gtMjUZFO9LkNu4I4VKH1scc9KCcLu4p.JujHSTx.rf919xGYKYm2v5 bFSKs_c1doFVhBtcCE3pyW79lugMcG7qtMgtUffBCfr7eND.PrpVeGZ.aL8x8HvphGylTYS_jP2B ll2JXi0heXS2qY6YxLRwfOYcW9V5Ci5RxZfXp39qoqQk8cN6MpES4_XFSBtpF3lenUUSNWqTB_7E Qme61qGEZ2dRYI1bA.BKyIBbQvYWrnaiKXwrsQXVcukODguDzHN_CsukS6IM5rWTK4CFbm5Us0s6 qdCdJp6LBYCmTJ0bxM4.iVOJGuao04g2NEUDODiTXisZlcgFUmeDw6f6m9JBS2rF0lfhChhF6.SP Bjv2LtHnWSR6fPmwqwpyI23XAABF1V_RYaJ_PNPnzBiFy1SHetalDVPVTeGu7Gq9yGdKC4.kwFPA 4vLgWpthEBOixOqrh9IdjxV2a1S91LIM5OktplkLxc6ETzvb70ekSkPrAVK0tumJBwIRqqmfEpLZ 3QRq7n3aSihq_SFUfjxoZGZ2lty6.ZueBDI4VDJeIwnJ4BcW8SqxElEfwH5OQT.KSWVGow8yEMf1 OttbB0vp5iNczy1fHUM29Ya2D1M8VQN83pQ2fKTUQL5_Nnp9miBm9gDiS.NUq05B709CVyyMXTWI 35bScd68dluT3DRCX1ClJOf7xhahXROZ5lVKHIvdiPv7Jz5jmxCCeKz7B_Ynv.SOau.pZalpC5yb 4.zmv8xmwV29nJM9zFncTCGxjiV_UrGT44066BDRONPwEy1BN3CMzTsNMPvCaVQydVXlJi3j5Vl5 LxnYEEjGQByPOVrFK Received: from sonic.gate.mail.ne1.yahoo.com by sonic307.consmr.mail.ne1.yahoo.com with HTTP; Wed, 1 Aug 2018 01:46:34 +0000 Received: from ip70-189-131-151.lv.lv.cox.net (EHLO [192.168.0.105]) ([70.189.131.151]) by smtp425.mail.ne1.yahoo.com (Oath Hermes SMTP Server) with ESMTPA ID 8038f0495d12a8775d8b876066527fc5; Wed, 01 Aug 2018 01:46:33 +0000 (UTC) From: Mark Millard Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\)) Subject: Re: svn commit: r335873 - in head: . sys/amd64/amd64 sys/amd64/include sys/conf sys/i386/i386 sys/i386/include sys/sys sys/vm Message-Id: <226713AF-FC51-4A44-93E1-8264B1BD2C8A@yahoo.com> Date: Tue, 31 Jul 2018 18:46:31 -0700 To: mmacy@FreeBSD.org, svn-src-head@freebsd.org, freebsd-hackers@freebsd.org, freebsd-amd64@freebsd.org X-Mailer: Apple Mail (2.3445.9.1) X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 01 Aug 2018 01:46:36 -0000 > Author: mmacy > Date: Mon Jul 2 19:48:38 2018 > New Revision: 335873 > URL:=20 > https://svnweb.freebsd.org/changeset/base/335873 >=20 >=20 > Log: > inline atomics and allow tied modules to inline locks > =20 > - inline atomics in modules on i386 and amd64 (they were always > inline on other arches) > - allow modules to opt in to inlining locks by specifying > MODULE_TIED=3D1 in the makefile I recently found the following about ABI incompatibilities between clang and gcc relative to C11 language based atomics: https://bugs.llvm.org/show_bug.cgi?id=3D26462 26462 =E2=80=93 GCC/clang C11 _Atomic incompatibility So are there implications about building the kernel vs. modules that overall mix the toolchains once modules are loaded? Do the toolchains need to match, at least for amd64 and i386 TARGET_ARCH 's? For reference as an introduction to the material in llvm's 26462 . . . It appears that the normal source of platform ABI definitions are not explicit/detailed in the area and allow for incompatibilities in this area. clang and gcc made differing choices absent being constrained to match. An example (a powerpc64 context was indicated): struct A16 { char val[16]; };=20 _Atomic struct A16 a16;=20 // GCC: _Static_assert(_Alignof(a16) =3D=3D 16, "");=20 // Clang: _Static_assert(_Alignof(a16) =3D=3D 1, "");=20 Non-power-of-2 is a general problem (not a powerpc64 context from what I can tell): struct A3 { char val[3]; }; _Atomic struct A3 a3; // GCC: _Static_assert(sizeof(a3) =3D=3D 3, ""); _Static_assert(_Alignof(a3) =3D=3D 1, ""); // Clang: _Static_assert(sizeof(a3) =3D=3D 4, ""); _Static_assert(_Alignof(a3) =3D=3D 4, ""); Comment 6 (by John McCall) is relevant: QUOTE Anyway, while I prefer the Clang rule, the GCC rule is defensible, as = are any number of other rules. The important point, however, is that = having this discussion is not the right approach to solving this = problem. The layout of _Atomic(T) is ABI. ABI rules are not generally = determined by compiler implementors making things up as they go along, = or at least they shouldn't be. The Darwin ABI for _Atomic is the rule = implemented in Clang, which we actually did think about carefully when = we adopted it. Other platforms need to make their own call, and it = probably shouldn't just be "whatever's implemented in GCC", especially = on other platforms where GCC is not the system compiler. END QUOTE =3D=3D=3D Mark Millard marklmi at yahoo.com ( dsl-only.net went away in early 2018-Mar) From owner-freebsd-hackers@freebsd.org Wed Aug 1 07:55:28 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 7D088105CD63 for ; Wed, 1 Aug 2018 07:55:28 +0000 (UTC) (envelope-from kostikbel@gmail.com) Received: from kib.kiev.ua (kib.kiev.ua [IPv6:2001:470:d5e7:1::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id F0E768718E; Wed, 1 Aug 2018 07:55:27 +0000 (UTC) (envelope-from kostikbel@gmail.com) Received: from tom.home (kib@localhost [127.0.0.1]) by kib.kiev.ua (8.15.2/8.15.2) with ESMTPS id w717tClf067051 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Wed, 1 Aug 2018 10:55:15 +0300 (EEST) (envelope-from kostikbel@gmail.com) DKIM-Filter: OpenDKIM Filter v2.10.3 kib.kiev.ua w717tClf067051 Received: (from kostik@localhost) by tom.home (8.15.2/8.15.2/Submit) id w717tC7f067049; Wed, 1 Aug 2018 10:55:12 +0300 (EEST) (envelope-from kostikbel@gmail.com) X-Authentication-Warning: tom.home: kostik set sender to kostikbel@gmail.com using -f Date: Wed, 1 Aug 2018 10:55:12 +0300 From: Konstantin Belousov To: Mark Johnston Cc: freebsd-hackers@freebsd.org Subject: Re: COMPAT_43 users? Message-ID: <20180801075512.GR40119@kib.kiev.ua> References: <20180731214920.GA95743@raichu> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180731214920.GA95743@raichu> User-Agent: Mutt/1.10.1 (2018-07-13) X-Spam-Status: No, score=-2.0 required=5.0 tests=ALL_TRUSTED,BAYES_00, DKIM_ADSP_CUSTOM_MED,FREEMAIL_FROM,NML_ADSP_CUSTOM_MED autolearn=no autolearn_force=no version=3.4.1 X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on tom.home X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 01 Aug 2018 07:55:28 -0000 On Tue, Jul 31, 2018 at 05:49:20PM -0400, Mark Johnston wrote: > The COMPAT_43 kernel option, which enables syscall support for 4.3BSD > binaries, hasn't been enabled in the standard kernel configs for well > over a decade, and doesn't appear to be a dependency of any other kernel > features. Nonetheless, the kernel contains quite a bit of code to > support this option. Does anyone use it in modern versions of FreeBSD > or have any arguments for keeping it? COMPAT_43 means two things, the third part is a.out image activator. First thing is the lcall $7.$0 syscall emulator, both on amd64 and (surprisingly) i386, after 4/4 split. Second thing is the syscalls compat shims. Together, all three things allow to run pre-3.x binaries on the modern machines, including amd64. I think this is useful at least for 'waving the flag' about our ABI compatibility guarantees, and for the historic software reconstruction. I run 1.1.8 chroot and several old binaries sometimes, I know that bde does, and there was at least one more user some time ago. What do you mean by a lot of code ? Syscall compats is relatively easy. lcall $7,$0 emulation is very non-trivial but tiny. I do maintain this code and do not want it to go away. From owner-freebsd-hackers@freebsd.org Wed Aug 1 07:57:16 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 1299A105CF57; Wed, 1 Aug 2018 07:57:16 +0000 (UTC) (envelope-from kib@freebsd.org) Received: from kib.kiev.ua (kib.kiev.ua [IPv6:2001:470:d5e7:1::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 86430871C4; Wed, 1 Aug 2018 07:57:15 +0000 (UTC) (envelope-from kib@freebsd.org) Received: from tom.home (kib@localhost [127.0.0.1]) by kib.kiev.ua (8.15.2/8.15.2) with ESMTPS id w717v4hI067904 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Wed, 1 Aug 2018 10:57:07 +0300 (EEST) (envelope-from kib@freebsd.org) DKIM-Filter: OpenDKIM Filter v2.10.3 kib.kiev.ua w717v4hI067904 Received: (from kostik@localhost) by tom.home (8.15.2/8.15.2/Submit) id w717v4iV067903; Wed, 1 Aug 2018 10:57:04 +0300 (EEST) (envelope-from kib@freebsd.org) X-Authentication-Warning: tom.home: kostik set sender to kib@freebsd.org using -f Date: Wed, 1 Aug 2018 10:57:04 +0300 From: Konstantin Belousov To: Mark Millard Cc: mmacy@FreeBSD.org, svn-src-head@freebsd.org, freebsd-hackers@freebsd.org, freebsd-amd64@freebsd.org Subject: Re: svn commit: r335873 - in head: . sys/amd64/amd64 sys/amd64/include sys/conf sys/i386/i386 sys/i386/include sys/sys sys/vm Message-ID: <20180801075704.GS40119@kib.kiev.ua> References: <226713AF-FC51-4A44-93E1-8264B1BD2C8A@yahoo.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <226713AF-FC51-4A44-93E1-8264B1BD2C8A@yahoo.com> User-Agent: Mutt/1.10.1 (2018-07-13) X-Spam-Status: No, score=-2.9 required=5.0 tests=ALL_TRUSTED,BAYES_00 autolearn=ham autolearn_force=no version=3.4.1 X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on tom.home X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 01 Aug 2018 07:57:16 -0000 On Tue, Jul 31, 2018 at 06:46:31PM -0700, Mark Millard via freebsd-amd64 wrote: > > Author: mmacy > > Date: Mon Jul 2 19:48:38 2018 > > New Revision: 335873 > > URL: > > https://svnweb.freebsd.org/changeset/base/335873 > > > > > > Log: > > inline atomics and allow tied modules to inline locks > > > > - inline atomics in modules on i386 and amd64 (they were always > > inline on other arches) > > - allow modules to opt in to inlining locks by specifying > > MODULE_TIED=1 in the makefile > > I recently found the following about ABI incompatibilities > between clang and gcc relative to C11 language based > atomics: > > https://bugs.llvm.org/show_bug.cgi?id=26462 > > 26462 ??? GCC/clang C11 _Atomic incompatibility > > > So are there implications about building the kernel > vs. modules that overall mix the toolchains once > modules are loaded? Do the toolchains need to match, > at least for amd64 and i386 TARGET_ARCH 's? This is irrelevant since kernel does not use C11 atomics, we roll our own version, which tries to follow C11 model. Lack of the ABI for atomics is one of the reason to not use compiler C11 atomics in kernel and C runtime. From owner-freebsd-hackers@freebsd.org Wed Aug 1 10:15:11 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 2DC54104EC09 for ; Wed, 1 Aug 2018 10:15:11 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: from mail-it0-x242.google.com (mail-it0-x242.google.com [IPv6:2607:f8b0:4001:c0b::242]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 67F098BF71 for ; Wed, 1 Aug 2018 10:15:10 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: by mail-it0-x242.google.com with SMTP id h23-v6so8567654ita.5 for ; Wed, 01 Aug 2018 03:15:10 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bsdimp-com.20150623.gappssmtp.com; s=20150623; h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc; bh=K+4/qLrnXbRrozhIbv6LCQcPrTvYP48mk33oEvblB24=; b=0LurY6oSDyZ1JZrB5zZZGbPOB4WjWc5froj9MkH9NcmHn4QKIwHBD+Y3mfQBTCQMFs fzfvJNF4ubKw+bCQorNc12zkjX0WOokQUffUNxCyHgjyZ7VlrrCz9PFTYd+xikFuTRRa CWiqeEjttr+L3vy+SM1H9M3BgKgQq292Pjpo7+nbluW1j1rrh6zmpHaptB2qbyPk8EE2 ienH0/j9njFueJqg4DiCX1eA8RXSA441DJgsh6n6bivaXb+k4TK/zMgtxuX8WBhLuWvj 9czq5N3n7FlO4dqob0uSODe7NV2gjZU6pSUE9gp1T4ebbgt1BX3V+ItTc7eyfSxhZRwJ CVOw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:sender:in-reply-to:references:from :date:message-id:subject:to:cc; bh=K+4/qLrnXbRrozhIbv6LCQcPrTvYP48mk33oEvblB24=; b=o2fehtD3uW6M+7dqR9u9y6dLb9ROqEI7S8MndcpPBXNT2DWEkcw9o5qikk9g+4OSyw XX3dGTDMlNBvstIP9o/4tR7ltoT99ODV/QHPFfbFykOgfFXpPW3EMdJ+OwRMaDSkWUI1 sR9uxBAn/19j4KhHcuigOP8UCtog9+y5IaNKYB4YWzDnYHVt6cMrl1JX1PiPo9y7icAc gotyh4TCdN6GkN53o34zEUYyfbDNV4C9W0Etpu0yER0PsFvL57eJ/t/pmhGb9/OJ1sEe RQ4HZ8ZcHDY4q8aHURujeABelEx43+RvVtzx1K5geYl6gjSotQiOQmYgCQ/Dh6x6T7RD TWJA== X-Gm-Message-State: AOUpUlESJui0BadSue7x8PLj3HoxaxO3WInynS61IwWkiOTq1tdV13q9 3fbLKDd2Xi5ckQNlT+h/GZoqXzJN7d1hVpshGgchtQ== X-Google-Smtp-Source: AAOMgpcC1iCokYpedJRs0Et+jRpy6mUH2+bm9Fb6DV0iP5SoAjKBpwm2Vl/4+qhqIYG6HGfDzuBdTSkHbr4v1GwXBAY= X-Received: by 2002:a02:a701:: with SMTP id k1-v6mr18249410jam.140.1533118509631; Wed, 01 Aug 2018 03:15:09 -0700 (PDT) MIME-Version: 1.0 Sender: wlosh@bsdimp.com Received: by 2002:a4f:4485:0:0:0:0:0 with HTTP; Wed, 1 Aug 2018 03:15:09 -0700 (PDT) X-Originating-IP: [86.153.210.77] In-Reply-To: References: <20180731214920.GA95743@raichu> From: Warner Losh Date: Wed, 1 Aug 2018 04:15:09 -0600 X-Google-Sender-Auth: KCtBs4QTL9XIRf08ppBQM2TDfWE Message-ID: Subject: Re: COMPAT_43 users? To: Julian Elischer Cc: "freebsd-hackers@freebsd.org" , John Baldwin Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.27 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 01 Aug 2018 10:15:11 -0000 Comments say it's needed for Linux emulation and for running FreeBSD 1, 2, or 3 binaries. It's still compiled for PowerPC kernels. Despite it's name, it looks like removing it would be somewhat complicated... Warner On Tue, Jul 31, 2018 at 6:39 PM, Julian Elischer wrote: > On 1/8/18 5:49 am, Mark Johnston wrote: > >> The COMPAT_43 kernel option, which enables syscall support for 4.3BSD >> binaries, hasn't been enabled in the standard kernel configs for well >> over a decade, and doesn't appear to be a dependency of any other kernel >> features. Nonetheless, the kernel contains quite a bit of code to >> support this option. Does anyone use it in modern versions of FreeBSD >> or have any arguments for keeping it? >> _______________________________________________ >> freebsd-hackers@freebsd.org mailing list >> https://lists.freebsd.org/mailman/listinfo/freebsd-hackers >> To unsubscribe, send any mail to "freebsd-hackers-unsubscribe@freebsd.org >> " >> >> It is useful for really ancient jails I believe. The person I would trust > on this is jhb. (CC'd) > > I occasionally like to run a freebsd-1.1 jail.. but While I enable it I am > not sure if I need it. > > > > > > _______________________________________________ > freebsd-hackers@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-hackers > To unsubscribe, send any mail to "freebsd-hackers-unsubscribe@freebsd.org" > From owner-freebsd-hackers@freebsd.org Wed Aug 1 10:45:57 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 114F51051FE8; Wed, 1 Aug 2018 10:45:57 +0000 (UTC) (envelope-from eric@metricspace.net) Received: from mail.metricspace.net (mail.metricspace.net [IPv6:2001:470:1f11:617::107]) by mx1.freebsd.org (Postfix) with ESMTP id 7665E8D4E1; Wed, 1 Aug 2018 10:45:56 +0000 (UTC) (envelope-from eric@metricspace.net) Received: from [172.16.0.23] (unknown [172.16.0.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) (Authenticated sender: eric) by mail.metricspace.net (Postfix) with ESMTPSA id 19C6F5CC4; Wed, 1 Aug 2018 10:45:50 +0000 (UTC) To: "freebsd-hackers@freebsd.org" , "freebsd-security@freebsd.org security" , "freebsd-arch@freebsd.org" , freebsd-current From: Eric McCorkle Subject: Status of OpenSSL 1.1.1 Openpgp: preference=signencrypt Autocrypt: addr=eric@metricspace.net; prefer-encrypt=mutual; keydata= mDMEWue2FBYJKwYBBAHaRw8BAQdAP/qVPlXodV6pYO5b1Jw0eFyMhyDD7B5y5eFsciutEfS0 JEVyaWMgTWNDb3JrbGUgPGVyaWNAbWV0cmljc3BhY2UubmV0PoiWBBMWCAA+FiEEDxi/0rkj zd6Uc6cFCN/CKRbBwmwFAlrnthQCGwMFCQHhM4AFCwkIBwIGFQoJCAsCBBYCAwECHgECF4AA CgkQCN/CKRbBwmyGKAD/XTSBOItCKcYCPTlsaS1aQYVEwWXXFgdjWE+WsNdZUS8A/AhYAbQZ kNZNimE2rQLoklkfTA74qF/V257NuQi4QDcLuDgEWue2FBIKKwYBBAGXVQEFAQEHQKpZVyCG ync/xqejm2C1HKGXLJTUu38RvnrR3UYECz9nAwEIB4h+BBgWCAAmFiEEDxi/0rkjzd6Uc6cF CN/CKRbBwmwFAlrnthQCGwwFCQHhM4AACgkQCN/CKRbBwmyi2wEAmvaGt8QMjGELzm27gP4c jJGUi7oigsLmTiFPkpJqPz0A+QFBSCvxJaxCMyoVru/xB6bunpJ+Wtsj8HD1EuJOn4EJ Message-ID: Date: Wed, 1 Aug 2018 06:45:46 -0400 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:52.0) Gecko/20100101 Thunderbird/52.9.0 MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="uvRxCuPiU4O8rLJUO8gnVepNcNGAYCG8B" X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 01 Aug 2018 10:45:57 -0000 This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --uvRxCuPiU4O8rLJUO8gnVepNcNGAYCG8B Content-Type: multipart/mixed; boundary="5PqJ62IpHtYhdL4HEu7BZ3qbdy4AlIwSY"; protected-headers="v1" From: Eric McCorkle To: "freebsd-hackers@freebsd.org" , "freebsd-security@freebsd.org security" , "freebsd-arch@freebsd.org" , freebsd-current Message-ID: Subject: Status of OpenSSL 1.1.1 --5PqJ62IpHtYhdL4HEu7BZ3qbdy4AlIwSY Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: quoted-printable Hi folks, I'm wondering what's the status of OpenSSL 1.1.1 integration into base? More specifically, is there a repo or a branch that's started the integration? I'm aware of the wiki page and the list of port build issues, but that seems to be based on replacing the base OpenSSL with a port build (similar to the way one replaces it with LibreSSL). I have some work I'd like to do that's gating on sorting out the kernel/loader crypto situation, and I'd very much like to see OpenSSL 1.1.1 get merged, so I can start to look into doing that. Incidentally, if there's something I can do to help out with integrating 1.1.1 into base, I'd potentially be interested. --5PqJ62IpHtYhdL4HEu7BZ3qbdy4AlIwSY-- --uvRxCuPiU4O8rLJUO8gnVepNcNGAYCG8B Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- iHUEARYIAB0WIQQPGL/SuSPN3pRzpwUI38IpFsHCbAUCW2GPWgAKCRAI38IpFsHC bJePAQCmuLjTR2PAwzbA+l16EUlF5M109QDnv/UGFSBQp0RSngD/fN4NHt3Vfmq3 /dlzLN2yDCJasSCThgN25NbUisHRjQI= =RdGb -----END PGP SIGNATURE----- --uvRxCuPiU4O8rLJUO8gnVepNcNGAYCG8B-- From owner-freebsd-hackers@freebsd.org Wed Aug 1 11:42:26 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 1F7CE10578AC for ; Wed, 1 Aug 2018 11:42:26 +0000 (UTC) (envelope-from phk@critter.freebsd.dk) Received: from phk.freebsd.dk (phk.freebsd.dk [130.225.244.222]) by mx1.freebsd.org (Postfix) with ESMTP id B56CA8F7DF; Wed, 1 Aug 2018 11:42:25 +0000 (UTC) (envelope-from phk@critter.freebsd.dk) Received: from critter.freebsd.dk (unknown [192.168.55.3]) by phk.freebsd.dk (Postfix) with ESMTP id 70D1B14838; Wed, 1 Aug 2018 11:42:19 +0000 (UTC) Received: from critter.freebsd.dk (localhost [127.0.0.1]) by critter.freebsd.dk (8.15.2/8.15.2) with ESMTPS id w71BgJXb002310 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Wed, 1 Aug 2018 11:42:19 GMT (envelope-from phk@critter.freebsd.dk) Received: (from phk@localhost) by critter.freebsd.dk (8.15.2/8.15.2/Submit) id w71BgJUx002309; Wed, 1 Aug 2018 11:42:19 GMT (envelope-from phk) To: Konstantin Belousov cc: Mark Johnston , freebsd-hackers@freebsd.org Subject: Re: COMPAT_43 users? In-reply-to: <20180801075512.GR40119@kib.kiev.ua> From: "Poul-Henning Kamp" References: <20180731214920.GA95743@raichu> <20180801075512.GR40119@kib.kiev.ua> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-ID: <2307.1533123739.1@critter.freebsd.dk> Date: Wed, 01 Aug 2018 11:42:19 +0000 Message-ID: <2308.1533123739@critter.freebsd.dk> X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 01 Aug 2018 11:42:26 -0000 -------- In message <20180801075512.GR40119@kib.kiev.ua>, Konstantin Belousov writes: >Together, all three things allow to run pre-3.x binaries on the modern >machines, including amd64. I think this is useful at least for 'waving >the flag' about our ABI compatibility guarantees [...] 2.2.9 was released 12 years ago, I dare say people can suffer running 11.X for all their compatibility needs. -- Poul-Henning Kamp | UNIX since Zilog Zeus 3.20 phk@FreeBSD.ORG | TCP/IP since RFC 956 FreeBSD committer | BSD since 4.3-tahoe Never attribute to malice what can adequately be explained by incompetence. From owner-freebsd-hackers@freebsd.org Wed Aug 1 12:17:28 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id AA419105A5A7 for ; Wed, 1 Aug 2018 12:17:28 +0000 (UTC) (envelope-from julian@freebsd.org) Received: from vps1.elischer.org (vps1.elischer.org [204.109.63.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "vps1.elischer.org", Issuer "CA Cert Signing Authority" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 459BA715AE; Wed, 1 Aug 2018 12:17:28 +0000 (UTC) (envelope-from julian@freebsd.org) Received: from Julian-MBP3.local (124-169-199-167.dyn.iinet.net.au [124.169.199.167]) (authenticated bits=0) by vps1.elischer.org (8.15.2/8.15.2) with ESMTPSA id w71CHLlY027700 (version=TLSv1.2 cipher=DHE-RSA-AES128-SHA bits=128 verify=NO); Wed, 1 Aug 2018 05:17:25 -0700 (PDT) (envelope-from julian@freebsd.org) Subject: Re: COMPAT_43 users? To: Poul-Henning Kamp , Konstantin Belousov Cc: freebsd-hackers@freebsd.org, Mark Johnston References: <20180731214920.GA95743@raichu> <20180801075512.GR40119@kib.kiev.ua> <2308.1533123739@critter.freebsd.dk> From: Julian Elischer Message-ID: <7cd5a918-8a43-5c99-27fc-c4d8dda599d3@freebsd.org> Date: Wed, 1 Aug 2018 20:17:15 +0800 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: <2308.1533123739@critter.freebsd.dk> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit Content-Language: en-US X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 01 Aug 2018 12:17:28 -0000 On 1/8/18 7:42 pm, Poul-Henning Kamp wrote: > -------- > In message <20180801075512.GR40119@kib.kiev.ua>, Konstantin Belousov writes: > >> Together, all three things allow to run pre-3.x binaries on the modern >> machines, including amd64. I think this is useful at least for 'waving >> the flag' about our ABI compatibility guarantees [...] > 2.2.9 was released 12 years ago, I dare say people can suffer running > 11.X for all their compatibility needs. > but then we can't say "I run a 1.1 jail in -current, and it builds the kernel in 36 seconds".  :-) From owner-freebsd-hackers@freebsd.org Wed Aug 1 13:02:59 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 38E26105B958 for ; Wed, 1 Aug 2018 13:02:59 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: from mail-io0-x231.google.com (mail-io0-x231.google.com [IPv6:2607:f8b0:4001:c06::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 8A17A72EBC for ; Wed, 1 Aug 2018 13:02:58 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: by mail-io0-x231.google.com with SMTP id l7-v6so15987475ioj.1 for ; Wed, 01 Aug 2018 06:02:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bsdimp-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=9iFYQcW5bmYSYAKQpPKP2DdPY4RdHvnvxYD2jmtwvjQ=; b=iyxCR24fC4dqI/L954Zn7ydCbmXmQPWvyEqGSkU2iA1UvVmSLAgAnhguZdSynfF0Hq WnivKz3YwNTX4+eiGKzB85hR/dKcOh4WTlqoFhZzxJjA6RZfH2bcqlmxPV+vav6tfT9a NDWWepXvfKN80sApvLfnZ+tuy0+Q8zS4k1mSlzv0mNVoxrrwnLXhgWPzEr1xbdEGfTbv 1GtDqVC8yoB80lwOxr9H8Ceg5NMsz7IRF/y426zU7i/I8TBNcdoxj0j00btdPrN+paNM b3RARY5wgPgyJGZ2pIsUjoffNQ7RI5DtZUTBLSjohLtrFvyaewH55uwLl9GARo94Rn78 DpRA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=9iFYQcW5bmYSYAKQpPKP2DdPY4RdHvnvxYD2jmtwvjQ=; b=LfunMjxtnaZ4JI5yZXwU0RUtosEjMxf9OHtlODpM2cALiwBQ3nu11WATUZO5Cilm7S yi2sdN80nV3YK1DIGFL7lBphIKbEuxJU4UOPlZirsN630eOVU5BS41lJ8cLQy6qTpPeh JpjjtZqATewQoWvVHZk1Q4w+EnUIt+WMLUBs+qTYjHFJ/D9UacnrSMbZglg2uT6/YyKn bNzJIgV7UIru6GsC4uY7zPZJDqmR6F+V9S41xYllnrCPVW/oeh6+/UvN3bkHNiah7jLx XptJHtHU5VLnJmOHI0JgNjJpHdxxta6QoD2EVVhhIJsNUHbHm2qNlZmQM0zqG5MHWHX5 QdYg== X-Gm-Message-State: AOUpUlEm+fghCi9ddQs6p8fPAi5ZXjjkE9IAOYP0wg8RpR0Q+FwGhptl bZOP64Q2NmabyfjOjrjNBVjmaiqqrfWAS2tuKgb5FQ== X-Google-Smtp-Source: AAOMgpeua2uji37665Jo3KSqhx78c+24h3sP4o9fScVTtTBwXOSp64OteB/mdos3JzjKyjEX3Pu6HBriOS55QEWwyyQ= X-Received: by 2002:a6b:3902:: with SMTP id g2-v6mr3217918ioa.168.1533128577684; Wed, 01 Aug 2018 06:02:57 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: From: Warner Losh Date: Wed, 1 Aug 2018 14:02:46 +0100 Message-ID: Subject: Re: Status of OpenSSL 1.1.1 To: Eric McCorkle Cc: FreeBSD Hackers , freebsd-security , "freebsd-arch@freebsd.org" , freebsd-current Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.27 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 01 Aug 2018 13:02:59 -0000 On Wed, Aug 1, 2018, 12:31 PM Eric McCorkle wrote: > Hi folks, > > I'm wondering what's the status of OpenSSL 1.1.1 integration into base? > More specifically, is there a repo or a branch that's started the > integration? I'm aware of the wiki page and the list of port build > issues, but that seems to be based on replacing the base OpenSSL with a > port build (similar to the way one replaces it with LibreSSL). > > I have some work I'd like to do that's gating on sorting out the > kernel/loader crypto situation, and I'd very much like to see OpenSSL > 1.1.1 get merged, so I can start to look into doing that. > There are patches to use bear SSL for the loader. OpenSSL is simply too large to use due to limits the loader operates under. Warner Incidentally, if there's something I can do to help out with integrating > 1.1.1 into base, I'd potentially be interested. > > From owner-freebsd-hackers@freebsd.org Wed Aug 1 13:15:49 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 3214D105BF3E for ; Wed, 1 Aug 2018 13:15:49 +0000 (UTC) (envelope-from christian.mauderer@embedded-brains.de) Received: from dedi548.your-server.de (dedi548.your-server.de [85.10.215.148]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id AEC4F737EA for ; Wed, 1 Aug 2018 13:15:48 +0000 (UTC) (envelope-from christian.mauderer@embedded-brains.de) Received: from [88.198.220.130] (helo=sslproxy01.your-server.de) by dedi548.your-server.de with esmtpsa (TLSv1.2:DHE-RSA-AES256-GCM-SHA384:256) (Exim 4.85_2) (envelope-from ) id 1fkqyZ-0001Lz-SP for freebsd-hackers@freebsd.org; Wed, 01 Aug 2018 15:15:39 +0200 Received: from [82.135.62.35] (helo=mail.embedded-brains.de) by sslproxy01.your-server.de with esmtpsa (TLSv1.2:DHE-RSA-AES256-GCM-SHA384:256) (Exim 4.89) (envelope-from ) id 1fkqyZ-0006kK-Kv for freebsd-hackers@freebsd.org; Wed, 01 Aug 2018 15:15:39 +0200 Received: from localhost (localhost.localhost [127.0.0.1]) by mail.embedded-brains.de (Postfix) with ESMTP id 388952A1685 for ; Wed, 1 Aug 2018 15:15:55 +0200 (CEST) Received: from mail.embedded-brains.de ([127.0.0.1]) by localhost (zimbra.eb.localhost [127.0.0.1]) (amavisd-new, port 10032) with ESMTP id FwsKQsZ54o7K for ; Wed, 1 Aug 2018 15:15:54 +0200 (CEST) Received: from localhost (localhost.localhost [127.0.0.1]) by mail.embedded-brains.de (Postfix) with ESMTP id 695522A1686 for ; Wed, 1 Aug 2018 15:15:54 +0200 (CEST) X-Virus-Scanned: amavisd-new at zimbra.eb.localhost Received: from mail.embedded-brains.de ([127.0.0.1]) by localhost (zimbra.eb.localhost [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id MsC8NQqgnxC9 for ; Wed, 1 Aug 2018 15:15:54 +0200 (CEST) Received: from [192.168.96.177] (unknown [192.168.96.177]) by mail.embedded-brains.de (Postfix) with ESMTPSA id 131782A1685 for ; Wed, 1 Aug 2018 15:15:54 +0200 (CEST) From: Christian Mauderer Subject: Configuration for IPSec Loop-Back Test Openpgp: preference=signencrypt Autocrypt: addr=christian.mauderer@embedded-brains.de; prefer-encrypt=mutual; keydata= xsFNBFLXhAQBEACrTfMX2lFXJlA7pmoCXwz4jSRCfCOcgRRcvPxiw/Kb5ky2aG1OvFezra62 zysQQllygJdyRqBzOj0R/t8xtncR8D3MIUyLe71hpFzSOEkaC7w+cJOHLoAynV1zHpvBJ9k0 +d0ukL/mdGKwGOiI5JvKP/jxC/kHDedMr+RuHeWvwwYfYw3HgUURTBZXwl+9nzDXYAoSkt6e Lw4LK4gPAMNSg5bp9zg2oiLVH1Mc+UDiG3a11atxInuhBwCnVrvEbM4cDfaXxQwPOPnR83lV qPlcd/ggs8x5POpSYHqGWXFMkL8QcPHQQkyb+fmeo0UqKPH0n7SFs+tSkhwbpo5KtfvY5P7A KiDnKFoAg1PQn66ILd4yglt9w/F3RbDPDRp4+XGjajd5gc1IKap610Lna/ueO0Gd2Y1b/PDO njN7u7eNgwNuhbNQtTqvlItmkqx0wSbTWPC7uO1gl76VBksaXKrnrQDBiS0gOd7y0OIfd7VO TEE2ABo8iLiln1r5CN5jBhxxt7J8WMrfSI10UhREJtOWFy7c6UamDSUCdlzbakFCFY7E4CFu ipyCjQr5yBNmd5TPtJCL4KCWls4tVWDZWtBrI+BXGKMGzPO3UiPkT5T8zvlViVmTIdbrucgs 02LsSDbROOQrigXJWieiUexjajocmuRaXBZqxTu3jYS4+Ijf/wARAQABzTpDaHJpc3RpYW4g TWF1ZGVyZXIgPGNocmlzdGlhbi5tYXVkZXJlckBlbWJlZGRlZC1icmFpbnMuZGU+wsF/BBMB AgApBQJS14QEAhsjBQkJZgGABwsJCAcDAgEGFQgCCQoLBBYCAwECHgECF4AACgkQPZabD0IS fb09lQ/8CZrerI5CcF+FHx40FL0LqnFZcJ88UhqVCCc0LlsDUWLzbvbkQgiAiHoIc9AfDRhT sECeg3BMFIXEnIzNuOD0Yr6XvUSUvdo2I5VuEkGB3tX6u86KlLHCCTfi5qiy2CbeaLCEO1+D 0/09SGNZL4fWUXLmGVjPR4cbgkwbG7Hl8P9WXH/n9EHfI10/Mbj2Y+eH4WcKnumrkup0OHfk 3rjKYmbWqxyZv9oGf+AOeyTbZ59EhX2/M2+7GuuKqiggN+1oQpXyec63dvqr0YGBmkU87qEG 4ncugVXaFf+B6ILPEOgROuZwT+xK3RrNroCmjqQXeMhN8lQ0kyrcavDmqk6ovEjF2EM8cUis NuYJEwmx6YMzvfTzMuX4kLJgW+zIz+Dz9hLX9Bqeey5O5xCJVLUXOYe8snEsMy84aE1H9n/6 /zCqXwHcvLjf9nDiOMLBiwFOQyRPwfAxcyvqE9ynsAFP4sRKod4pkrOG1CeRdNtAz/92hhCN sP9FOqst85yQOPfpN/tJzlkHbTOhuAFAypBk0pZIAtiRKO+vw2VSP3BeGXRZjgQ1/ElZ0CVC xFwEB4Qfo++ClMkREquy1GdvLaZ7Gex850ptv3Uur1oLm4yu9jbuWZUQTR9dqa4RBUBKIctw fwhAq8k2GMOa33gYUWVK0l1cH8xqqpj5QONmyrNApQbOwU0EUteEBAEQAMuuzztQKBR3vsQG UGzXHps5c3l5HzvZ9uR4qBem1IWM9TGMUcRKbcPf+hmVzZIV5gkV1B/1B+h90GhEGATpbYE6 OdoCB6vlpc/aXjOVc921TqJ4jDM8iYfl0CIDC7EHBUPCsza8rMJYo4QH3noWc5UxW+ceW4ue luYK5CSCqbDhjguoZjCaVB2NkPZKSsjGmhx7Rw0JVSivdhPStQ41y2W+azSwNlEsmQkCQW9i xHEjRW1RLVDROj1robqHArLNwI0/SySmebSKJRQ8IpG0iSyivZ5ibnyLvjri2n87AUBVGv/u CtbWsA7oIwF4VlknKUJwDraPs798Ig06lFjz6WsjEa0BZjmDPBjkHZEqbbBI0h/Zmqo7AOrU iBefxJRDKjzQRHe3srJWr0TK/U4Lxmv1cMnF3U8sBJSM9TOfMF6QLjL92AQsX6SZEno6tzBg 3PkLwbxoC1rHFRVRsLfPercynpuIv5jaUDTKf5TqW2T8hCXJshcgSNb9l5JiNdj1PyqC7+2D k2I2/Ts9LkQRHQIAflxyshcjeBubUnIwR70AYvgMF12tQC6ZeW1HVCk8P/SBk78f9+T8SEws MPJL7td8iE4sbEhyzl9dKN3ols85tZeHTsSo3r8s6MoAjq876SvpslEcuQp+6tyOgsORv/nZ KaU7TiPMk6FCtGvB26FlABEBAAHCwWUEGAECAA8FAlLXhAQCGwwFCQlmAYAACgkQPZabD0IS fb1Ztg//S78bHPvMneb7HrA1deOBultlOIlb07ntz9nIdLo6VHIulc9t5RA4KWLTR927H52k zaTIf+ingyRGSSx9glQZ/9unNL8QQVE5TY/Hvzdl+y05189qQwsMyIIx16g8HN2h7dhIunuG 1HSK5bPlbD7yC8+Az3ICdMPr2kh/0rOJEqtQF4ySH/FLXGlbTGRnhOcLtSwK3rAacm9HCPNq muPHQoVT/goDbWMXjBp/dr/AOMYLDUS5lEJuGN8kKajQ4YWUZAPucNKh7XP8g/1ylnZpu5Mz XolRqDRrbLzWkcCE4fuAlrjyJPo8/Fj9MRvdF4Jf0KMBtd/UnJbyLO9TqWdQ5sp05ZE5SmL6 sjBxekiLLO3VLMeID6X4tY08VItTCbcb/OgkIqoAKOJaPbQQ8QczRfefNkUF7vuLJ8oIcy6O LssMWItO+3FVa4M1GBwrN1O+YWUVzcxbxPCS/1gOfMakfvObIFsexNZCJZRUeeYGSNnSJGON ajRod+BAC+CQQFqA4f3cdwpNTmUiiP4hAyb+dKNdgpTPNKFsouwDHsN/d2xXQqOh8CBMwndf NSGVW0B2n9YtXgW+LYcUd/3o4Ei/lYy8csG0xZ4RZ70j2Tq8oe5DXpvFcNv4E+vURhFBc5W2 cLTtbgqL8+Roy3aPZDft02dFgZUC1XXGw3C9KoR9rsE= Organization: embedded brains GmbH To: freebsd-hackers@freebsd.org Message-ID: <20127f75-c6d6-463e-046f-3844502f3da9@embedded-brains.de> Date: Wed, 1 Aug 2018 15:15:36 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: quoted-printable X-Authenticated-Sender: smtp-embedded@poldinet.de X-Virus-Scanned: Clear (ClamAV 0.100.0/24802/Wed Aug 1 10:43:37 2018) X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 01 Aug 2018 13:15:49 -0000 Hello, I'm working on a port for IPSec and ipsec-tools (racoon, setkey, libipsec) to an embedded operating system (RTEMS). RTEMS uses the FreeBSD network stack via a compatibility layer (rtems-libbsd). I can already create a IPSec connection on some real hardware with some real peer. To prevent regression in a future version, I would like to add a test that would check that the port still works. That test would have to run on a system _without_ a real hardware peer. Therefore I would like to create some IPSec loop back connection. In that case racoon would have to talk to itself because I currently only support one instance. Do you have any hints how I could create such a network? My current thought would be something along a virtual network device (maybe tun?) that can be connected to some other virtual network device via for example a bridge device. Maybe I could then try to configure two gif-devices that would use this tunnel. racoon would have to listen on both devices (maybe on different ports). Currently I have trouble setting this up. Are there any simpler ideas for an IPSec loop back connection that would use most of the stack layers= ? Thanks in advance for every answer. With kind regards Christian Mauderer From owner-freebsd-hackers@freebsd.org Wed Aug 1 14:05:34 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 60F1C105D3E4; Wed, 1 Aug 2018 14:05:34 +0000 (UTC) (envelope-from eric@metricspace.net) Received: from mail.metricspace.net (static-98-116-200-172.nycmny.fios.verizon.net [98.116.200.172]) by mx1.freebsd.org (Postfix) with ESMTP id 0773B754A8; Wed, 1 Aug 2018 14:05:33 +0000 (UTC) (envelope-from eric@metricspace.net) Received: from [192.168.43.57] (mobile-107-107-59-242.mycingular.net [107.107.59.242]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) (Authenticated sender: eric) by mail.metricspace.net (Postfix) with ESMTPSA id 7B9BF5D4F; Wed, 1 Aug 2018 14:05:32 +0000 (UTC) Subject: Re: Status of OpenSSL 1.1.1 To: Warner Losh Cc: FreeBSD Hackers , freebsd-security , "freebsd-arch@freebsd.org" , freebsd-current References: From: Eric McCorkle Openpgp: preference=signencrypt Autocrypt: addr=eric@metricspace.net; prefer-encrypt=mutual; keydata= mDMEWue2FBYJKwYBBAHaRw8BAQdAP/qVPlXodV6pYO5b1Jw0eFyMhyDD7B5y5eFsciutEfS0 JEVyaWMgTWNDb3JrbGUgPGVyaWNAbWV0cmljc3BhY2UubmV0PoiWBBMWCAA+FiEEDxi/0rkj zd6Uc6cFCN/CKRbBwmwFAlrnthQCGwMFCQHhM4AFCwkIBwIGFQoJCAsCBBYCAwECHgECF4AA CgkQCN/CKRbBwmyGKAD/XTSBOItCKcYCPTlsaS1aQYVEwWXXFgdjWE+WsNdZUS8A/AhYAbQZ kNZNimE2rQLoklkfTA74qF/V257NuQi4QDcLuDgEWue2FBIKKwYBBAGXVQEFAQEHQKpZVyCG ync/xqejm2C1HKGXLJTUu38RvnrR3UYECz9nAwEIB4h+BBgWCAAmFiEEDxi/0rkjzd6Uc6cF CN/CKRbBwmwFAlrnthQCGwwFCQHhM4AACgkQCN/CKRbBwmyi2wEAmvaGt8QMjGELzm27gP4c jJGUi7oigsLmTiFPkpJqPz0A+QFBSCvxJaxCMyoVru/xB6bunpJ+Wtsj8HD1EuJOn4EJ Message-ID: Date: Wed, 1 Aug 2018 10:05:28 -0400 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:52.0) Gecko/20100101 Thunderbird/52.9.0 MIME-Version: 1.0 In-Reply-To: Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="JA5mbHlyqvhScI7wZ6R8M1XpZcozqnJpS" X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 01 Aug 2018 14:05:34 -0000 This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --JA5mbHlyqvhScI7wZ6R8M1XpZcozqnJpS Content-Type: multipart/mixed; boundary="MkkRTdgKDiexhqqCfM3q3sy204CtZoNlA"; protected-headers="v1" From: Eric McCorkle To: Warner Losh Cc: FreeBSD Hackers , freebsd-security , "freebsd-arch@freebsd.org" , freebsd-current Message-ID: Subject: Re: Status of OpenSSL 1.1.1 References: In-Reply-To: --MkkRTdgKDiexhqqCfM3q3sy204CtZoNlA Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: quoted-printable On 08/01/2018 09:02, Warner Losh wrote: >=20 >=20 > On Wed, Aug 1, 2018, 12:31 PM Eric McCorkle > wrote: >=20 > Hi folks, >=20 > I'm wondering what's the status of OpenSSL 1.1.1 integration into b= ase? > More specifically, is there a repo or a branch that's started the > integration?=C2=A0 I'm aware of the wiki page and the list of port = build > issues, but that seems to be based on replacing the base OpenSSL wi= th a > port build (similar to the way one replaces it with LibreSSL). >=20 > I have some work I'd like to do that's gating on sorting out the > kernel/loader crypto situation, and I'd very much like to see OpenS= SL > 1.1.1 get merged, so I can start to look into doing that. >=20 >=20 > There are patches to use bear SSL for the loader. OpenSSL is simply too= > large to use due to limits the loader operates under. I was going to look into the feasibility of doing something like what LibreSSL does with portable, where they extract a subset of the full library designed to be embedded in the kernel, loader, etc. I think it ought to be possible to do something like that, but it really ought to be done in a tree with 1.1.1 integrated. --MkkRTdgKDiexhqqCfM3q3sy204CtZoNlA-- --JA5mbHlyqvhScI7wZ6R8M1XpZcozqnJpS Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- iHUEARYIAB0WIQQPGL/SuSPN3pRzpwUI38IpFsHCbAUCW2G+KAAKCRAI38IpFsHC bGLuAPwJYpPYYEmpGeu6HQnVaM9iakWHN8vM2OAGNoySUSn01QD/UfTooHun+QlI wvSpvUvJ1rCt+H5m6Ho6w49tHObnUgs= =jIbP -----END PGP SIGNATURE----- --JA5mbHlyqvhScI7wZ6R8M1XpZcozqnJpS-- From owner-freebsd-hackers@freebsd.org Wed Aug 1 14:50:07 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 1B038105F6BD for ; Wed, 1 Aug 2018 14:50:07 +0000 (UTC) (envelope-from asomers@gmail.com) Received: from mail-lf1-x12a.google.com (mail-lf1-x12a.google.com [IPv6:2a00:1450:4864:20::12a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 694B8778E1 for ; Wed, 1 Aug 2018 14:50:06 +0000 (UTC) (envelope-from asomers@gmail.com) Received: by mail-lf1-x12a.google.com with SMTP id v22-v6so13515443lfe.8 for ; Wed, 01 Aug 2018 07:50:06 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc; bh=W4b3O2oE9fKwWu9tBKHzxKmlEpg/5b/7E/e8ZxmsVeI=; b=P201cGJDbN77HwpFWsgJ3iXWxwBBgVuDlHN/3V/Ed5EsPTuFIL+s8vOxioOl1vEH80 oOfmgTZORDbue5icUMz0Cq/1EiPUK5jtjKLvxmHLZfFvNyiGLnLqaHakbfj9d0Pr3eB5 QTG/ob5wqPZkmmO56DPT3gMd57wCorZ3l7QmUz8RpeKUnyZkO8orBJHU5Jt4e3hkVgkG 0PKMWbCv2epLrD4oOrb+5aynS++WRSiGds9mQt8WbB5/P+1Llh00xeTTiRlhfXz/rZVp SD2hNKvMPerAn0h8nar/khzAfKLMXH5t0VcRwhDmYEPHl89QTfJNPcZPPQ0IaYRkJZRY Z87A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:sender:in-reply-to:references:from :date:message-id:subject:to:cc; bh=W4b3O2oE9fKwWu9tBKHzxKmlEpg/5b/7E/e8ZxmsVeI=; b=kjUYK2NngyZa6gRs8uPTVxgbIKa+O1yoYCt+CnFxNYh8BIj9S0eVEcXMP9Rt4on8Vu 6gZ7i+Pkxh44VjVP0X6wZ+Pbr4WceAO5g1JSgOSo47Qya0PdQ/Npcta9/wRBe16XCdl4 gPNF6nE/80YoL5OfFR5dB4uUnxG+Hycq9a1VgkAwtjBqWh+SBuQidb/cJtbh1oWDviKm Y11w0t5LOrMllrpGTasI9PZWP7F8YJ1cq+WofEsTPsMhv3Tzc8bxN6vYg7pnPOn8BImL rB0G2tFDZF7J68igE2wX+PVvM2ct4wI9swlTZV9d71/k59lxgd9FN8DBdH4rQObaHZXC Z8QQ== X-Gm-Message-State: AOUpUlFxUHhgpvWnbP8Pmks0+g9SDGXneE0LX3NEnuk7UQnL9DkNgbKM XFBQivt11FCzQd3WcbYlnu9E/DfKkMwpF34+EHoxhg== X-Google-Smtp-Source: AAOMgpc8BlhGTzkRfG06xtwaYLateYPR7La6AnlV94E3dYGbn+tyXUgbWuTEPgcs1HnS2PpvY7cT8idDfByXFzXqARw= X-Received: by 2002:a19:a417:: with SMTP id q23-v6mr15631976lfc.59.1533135004923; Wed, 01 Aug 2018 07:50:04 -0700 (PDT) MIME-Version: 1.0 Sender: asomers@gmail.com Received: by 2002:ab3:7851:0:0:0:0:0 with HTTP; Wed, 1 Aug 2018 07:50:04 -0700 (PDT) In-Reply-To: <20127f75-c6d6-463e-046f-3844502f3da9@embedded-brains.de> References: <20127f75-c6d6-463e-046f-3844502f3da9@embedded-brains.de> From: Alan Somers Date: Wed, 1 Aug 2018 08:50:04 -0600 X-Google-Sender-Auth: _twKfi7WPQG9cdL8AKnX2UImh-g Message-ID: Subject: Re: Configuration for IPSec Loop-Back Test To: Christian Mauderer Cc: "freebsd-hackers@freebsd.org" Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.27 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 01 Aug 2018 14:50:07 -0000 On Wed, Aug 1, 2018 at 7:15 AM, Christian Mauderer < christian.mauderer@embedded-brains.de> wrote: > Hello, > > I'm working on a port for IPSec and ipsec-tools (racoon, setkey, > libipsec) to an embedded operating system (RTEMS). RTEMS uses the > FreeBSD network stack via a compatibility layer (rtems-libbsd). > > I can already create a IPSec connection on some real hardware with some > real peer. To prevent regression in a future version, I would like to > add a test that would check that the port still works. That test would > have to run on a system _without_ a real hardware peer. Therefore I > would like to create some IPSec loop back connection. In that case > racoon would have to talk to itself because I currently only support one > instance. > > Do you have any hints how I could create such a network? > > My current thought would be something along a virtual network device > (maybe tun?) that can be connected to some other virtual network device > via for example a bridge device. Maybe I could then try to configure two > gif-devices that would use this tunnel. racoon would have to listen on > both devices (maybe on different ports). > > Currently I have trouble setting this up. Are there any simpler ideas > for an IPSec loop back connection that would use most of the stack layers? > > Thanks in advance for every answer. > > With kind regards > > Christian Mauderer > Does RTEMS support multiple FIBs? In FreeBSD I've done this kind of thing using multiple FIBs with tap(4) devices (though tun(4) might work for your use case). In the FreeBSD source tree, see tests/sys/netinet/fibs_test.sh. -Alan From owner-freebsd-hackers@freebsd.org Wed Aug 1 15:25:31 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id D73B410606C9 for ; Wed, 1 Aug 2018 15:25:30 +0000 (UTC) (envelope-from markjdb@gmail.com) Received: from mail-pl0-x243.google.com (mail-pl0-x243.google.com [IPv6:2607:f8b0:400e:c01::243]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 56A6E792D2 for ; Wed, 1 Aug 2018 15:25:30 +0000 (UTC) (envelope-from markjdb@gmail.com) Received: by mail-pl0-x243.google.com with SMTP id ba4-v6so278165plb.11 for ; Wed, 01 Aug 2018 08:25:30 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=jud+0yxNoBhqBlyrr2UmfHcSQWZS5zl3aS3zk8UQO8A=; b=O5yDO/YSw7kEIXQBy9IUoiMOdDfQpEXKINAlDHBoVXVWWnC5SY0GQwibi4Vp2Kq3oY WuBoQPkMuDauTraiWXQ7h+ejByzSMiRd35lcRRzSIvtpk9vowRew+ybNY5o5ROVgbXtI 0fqiPw5266Huw61n94DN6Nd5Pt3fLCdYV5oDAfJM3xbYbNWayC2ua/t8QrlTD8BLwcfh AzI+dtg0W4J+5GRnutyIECQyzsX92KQ7u2dbidygxfj6+nSRSgnNWv7c8zM8DB5iAg3u KjWszUPM/+KTLlyocYfpm/1FkiqND0z3qap5GfuZo1EQnYwBlQ9HR/besRGiR6DCDTu2 sE2Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:from:to:cc:subject:message-id :references:mime-version:content-disposition:in-reply-to:user-agent; bh=jud+0yxNoBhqBlyrr2UmfHcSQWZS5zl3aS3zk8UQO8A=; b=bR8dyBNg2GJNpaNQyviCuDjKDe1csWo3sn7M5NxG1d/FueALBNFBKS9Eeh0L54ARsU hyxqRy+3fRKX1vwsK3sVUCqeTFzuoAvf8jnJ/VUPytLF5D0cUEX1E5MuyDIq3o1dzsaj I/z6U5fuQSgQgwrSaLq2E4ppgMsZiUm0dQkqZBiaK1yq1HVe4+4+XvCdVOEu1rz7UNz9 zwsVYmudNct0r+hLg8EG9Gq59kxR76RQkObAzpTJpoFOHbxu+rI/mN6UkkZsm1IevXI6 /0ZTduyxtDEUItWamubCElniE7gcB/wu0fdtXDB6h472ngoZ1KcMTQl4shOCXSmsxhhn 32GQ== X-Gm-Message-State: AOUpUlHtaDo/vUKrCnHbotyufUVbbmp0s4GKBI2UV5o+xwqABp8r3KgD WYpzGxnkpoJfhI/tKuQ11pwyepwg X-Google-Smtp-Source: AAOMgpcK72idoHJ0yuyKGH8/lE/W+dQgUXago2+zILzXr0XQSmNjJdcol0fjGWivE7jVeY+g0XFbvQ== X-Received: by 2002:a17:902:24a5:: with SMTP id w34-v6mr11098120pla.285.1533137129280; Wed, 01 Aug 2018 08:25:29 -0700 (PDT) Received: from raichu (toroon0560w-lp130-09-70-52-224-239.dsl.bell.ca. [70.52.224.239]) by smtp.gmail.com with ESMTPSA id k79-v6sm20971512pfa.22.2018.08.01.08.25.27 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 01 Aug 2018 08:25:28 -0700 (PDT) Sender: Mark Johnston Date: Wed, 1 Aug 2018 11:25:25 -0400 From: Mark Johnston To: Warner Losh Cc: "freebsd-hackers@freebsd.org" Subject: Re: COMPAT_43 users? Message-ID: <20180801152525.GB97237@raichu> References: <20180731214920.GA95743@raichu> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 01 Aug 2018 15:25:31 -0000 On Wed, Aug 01, 2018 at 04:15:09AM -0600, Warner Losh wrote: > Comments say it's needed for Linux emulation and for running FreeBSD 1, 2, > or 3 binaries. It's still compiled for PowerPC kernels. Despite it's name, > it looks like removing it would be somewhat complicated... It's not required for Linux emulation anymore. > On Tue, Jul 31, 2018 at 6:39 PM, Julian Elischer wrote: > > > On 1/8/18 5:49 am, Mark Johnston wrote: > > > >> The COMPAT_43 kernel option, which enables syscall support for 4.3BSD > >> binaries, hasn't been enabled in the standard kernel configs for well > >> over a decade, and doesn't appear to be a dependency of any other kernel > >> features. Nonetheless, the kernel contains quite a bit of code to > >> support this option. Does anyone use it in modern versions of FreeBSD > >> or have any arguments for keeping it? > >> _______________________________________________ > >> freebsd-hackers@freebsd.org mailing list > >> https://lists.freebsd.org/mailman/listinfo/freebsd-hackers > >> To unsubscribe, send any mail to "freebsd-hackers-unsubscribe@freebsd.org > >> " > >> > >> It is useful for really ancient jails I believe. The person I would trust > > on this is jhb. (CC'd) > > > > I occasionally like to run a freebsd-1.1 jail.. but While I enable it I am > > not sure if I need it. > > > > > > > > > > > > _______________________________________________ > > freebsd-hackers@freebsd.org mailing list > > https://lists.freebsd.org/mailman/listinfo/freebsd-hackers > > To unsubscribe, send any mail to "freebsd-hackers-unsubscribe@freebsd.org" > > > _______________________________________________ > freebsd-hackers@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-hackers > To unsubscribe, send any mail to "freebsd-hackers-unsubscribe@freebsd.org" From owner-freebsd-hackers@freebsd.org Wed Aug 1 15:27:17 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 6363B10607B3 for ; Wed, 1 Aug 2018 15:27:17 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: from mail-it0-x233.google.com (mail-it0-x233.google.com [IPv6:2607:f8b0:4001:c0b::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id EFDC97942B for ; Wed, 1 Aug 2018 15:27:16 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: by mail-it0-x233.google.com with SMTP id h20-v6so9864169itf.2 for ; Wed, 01 Aug 2018 08:27:16 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bsdimp-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=wavGKS8YLF+YsxlQhxGJrCkFUMsZvhqK1HM8gSDwRR8=; b=E0ygdl+I0maAdHe10wqK1+J60XXEfbPJcduY1pMR5U3Gz6/SRsEeY6C5r32CbJ5mKk A7PN3D6DyET9u39VTpWhtZa91Vmk0Dw8LPRUghrx3E8Kyk4XzNO1YEGqRa7aa87uu6gI xS5P+J7Gx64DhWoV4ZdwPLHppZcPX8chgFQWo/MXcQeyfYDcQQuGiudU9T0fnFXCahgA g10htHX360jL90Yc7IKn/h1pjfH+VnG1+h2H7kkR7gN5Lpb46MYGaYaJ5W/P5hLP9KXj xZnsbSMCozGOta/vTVfvDfLo8GoYBowhetSyq13eVEkdeolVwjM2MV7XlO+vrIIGmzJ0 g1Pg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=wavGKS8YLF+YsxlQhxGJrCkFUMsZvhqK1HM8gSDwRR8=; b=tIwXLYO/QXGKg98PvBVhviMokepi3mlEGx7rd5gexNQHGjPLH/SS5HX/XF1CPDkAl6 +9s1HDN3LMafCUg0RvbxzZNdjzn0NTH2oleDM3BThZL5UA6jY7brAgc+Y4n1BEvPorcC 8ly5sJ5XnQzxzH2eQQoWkccDD4itpaqYNq4CZZI/QzLRijBXxQl0N6fbCr0OQt0LHsfq ywGpT4HWfREmK/4HM7Ea0p6o0/mu4eb3KLEn/YOyBgJfUgRjlW80sD+Nv021m92MK2AN WRMW/yJjXYlHszXG4QB/5fC3WlgSpx5BaUGiGpqWA+bRpMgjC+4+7Nri8lN1xtdOJCRQ Kbdg== X-Gm-Message-State: AOUpUlGeOovA/hO8fF90p8qdbQGRNz8VG9MnoYQ3Ks9guyeSLAwUK9Xy CNP/B6UjmN+TJsPVj0lN2thrNbDhDWa5vuqVOlCFc2KFNOE= X-Google-Smtp-Source: AAOMgpeY9gMN+9lugt/w+yMcQYLUigVY/NFC9oMUOOPpGxLrKkZl9DDMT2NfxxV7YlAS/9O/3BCZsTtXftdgXHERFEg= X-Received: by 2002:a24:3ec3:: with SMTP id s186-v6mr3850668its.73.1533137236195; Wed, 01 Aug 2018 08:27:16 -0700 (PDT) MIME-Version: 1.0 References: <20180731214920.GA95743@raichu> <20180801152525.GB97237@raichu> In-Reply-To: <20180801152525.GB97237@raichu> From: Warner Losh Date: Wed, 1 Aug 2018 16:27:04 +0100 Message-ID: Subject: Re: COMPAT_43 users? To: Mark Johnston Cc: FreeBSD Hackers Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.27 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 01 Aug 2018 15:27:17 -0000 On Wed, Aug 1, 2018, 4:25 PM Mark Johnston wrote: > On Wed, Aug 01, 2018 at 04:15:09AM -0600, Warner Losh wrote: > > Comments say it's needed for Linux emulation and for running FreeBSD 1, > 2, > > or 3 binaries. It's still compiled for PowerPC kernels. Despite it's > name, > > it looks like removing it would be somewhat complicated... > > It's not required for Linux emulation anymore. > Then we can fix the comments... Warner > On Tue, Jul 31, 2018 at 6:39 PM, Julian Elischer > wrote: > > > > > On 1/8/18 5:49 am, Mark Johnston wrote: > > > > > >> The COMPAT_43 kernel option, which enables syscall support for 4.3BSD > > >> binaries, hasn't been enabled in the standard kernel configs for well > > >> over a decade, and doesn't appear to be a dependency of any other > kernel > > >> features. Nonetheless, the kernel contains quite a bit of code to > > >> support this option. Does anyone use it in modern versions of FreeBSD > > >> or have any arguments for keeping it? > > >> _______________________________________________ > > >> freebsd-hackers@freebsd.org mailing list > > >> https://lists.freebsd.org/mailman/listinfo/freebsd-hackers > > >> To unsubscribe, send any mail to " > freebsd-hackers-unsubscribe@freebsd.org > > >> " > > >> > > >> It is useful for really ancient jails I believe. The person I would > trust > > > on this is jhb. (CC'd) > > > > > > I occasionally like to run a freebsd-1.1 jail.. but While I enable it > I am > > > not sure if I need it. > > > > > > > > > > > > > > > > > > _______________________________________________ > > > freebsd-hackers@freebsd.org mailing list > > > https://lists.freebsd.org/mailman/listinfo/freebsd-hackers > > > To unsubscribe, send any mail to " > freebsd-hackers-unsubscribe@freebsd.org" > > > > > _______________________________________________ > > freebsd-hackers@freebsd.org mailing list > > https://lists.freebsd.org/mailman/listinfo/freebsd-hackers > > To unsubscribe, send any mail to " > freebsd-hackers-unsubscribe@freebsd.org" > From owner-freebsd-hackers@freebsd.org Wed Aug 1 15:28:58 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 9064C10608D6 for ; Wed, 1 Aug 2018 15:28:58 +0000 (UTC) (envelope-from markjdb@gmail.com) Received: from mail-pl0-x242.google.com (mail-pl0-x242.google.com [IPv6:2607:f8b0:400e:c01::242]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 157F57955E for ; Wed, 1 Aug 2018 15:28:58 +0000 (UTC) (envelope-from markjdb@gmail.com) Received: by mail-pl0-x242.google.com with SMTP id j8-v6so8964494pll.12 for ; Wed, 01 Aug 2018 08:28:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=z4cR5fWOp3fzlJ4njMceI+rO4svDitf877Y/INlyz4M=; b=gsy2UyUkdE+uySsprmC36VjXrUZNpn2E9wFTscrqf00UmIgxkRHkNhP8CknWDQtrjL z68aKeKRqwRXzkc8ZZx1Zyt9XDva1LNFWUMFnxNfvGsGD7QKwpEpB0Vth8P2nNsVspb2 8tQgEtjD2X61pjkvqRG8mKV1h7vrYYAZ054r2qxrxVSHPN/jehfvHDAUKi8bFpfI75Zm YVP1zK+WhggStlmknZwBhjTMAuXJQnwd9TFLH4YXgVJYUksrXMpq52IwILXOtShOCz5n 9gPq7dTaziHPcN2UB7cHPqiinebIi/NJAQZYzwdNGTfWYF9784ytjjMELjOnz05HUfzS thFA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:from:to:cc:subject:message-id :references:mime-version:content-disposition:in-reply-to:user-agent; bh=z4cR5fWOp3fzlJ4njMceI+rO4svDitf877Y/INlyz4M=; b=MVkh2OBa7xD+fsguAicVP9aGHX+Y8lSmqKUYWG6pDYew6egRWJdD9bNUXGvXIAgTx6 ZXQy8syQ89b+XCviNyImT6mDKcyHTxI+WEzS0SpJmSvDvQ9sElX9ty8xyeGRcraQGLga brTa1InHBzjp7OhL8wA9hgW9Ld0a5023SEWK7+mEww4EgVqAr6aWgP/mY712NMbA1kPM haJIH3hF2RTUrRoc7ZLWju8eoA2+99CNUTXP7uHEEJWIf/6/I7mp/1tbn4aPCrjF2sIi aLjirYfdCLmTM6E2yYbkwgaFIG9aELewk0eR0Vo5T9Z/vmDTtCytUVt9J8Lrs7a8WQ6z Ieog== X-Gm-Message-State: AOUpUlEt/cczOyRX7W0F2wGipkUzTSN0GhWkpniY5KHcquvA4xGRm54J i9E2n5O9kYzZDra5hkJhIabuNcW/ X-Google-Smtp-Source: AAOMgpf8uiTywjpB8mwF97ANMu7OSYJArXcpqqhmY3wdxfQym9vy4XGcr/D4KTaJnV4kWjC23WmZbA== X-Received: by 2002:a17:902:9695:: with SMTP id n21-v6mr25242331plp.6.1533137337204; Wed, 01 Aug 2018 08:28:57 -0700 (PDT) Received: from raichu (toroon0560w-lp130-09-70-52-224-239.dsl.bell.ca. [70.52.224.239]) by smtp.gmail.com with ESMTPSA id d13-v6sm18726741pgq.42.2018.08.01.08.28.55 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 01 Aug 2018 08:28:56 -0700 (PDT) Sender: Mark Johnston Date: Wed, 1 Aug 2018 11:28:53 -0400 From: Mark Johnston To: Konstantin Belousov Cc: freebsd-hackers@freebsd.org Subject: Re: COMPAT_43 users? Message-ID: <20180801152853.GC97237@raichu> References: <20180731214920.GA95743@raichu> <20180801075512.GR40119@kib.kiev.ua> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180801075512.GR40119@kib.kiev.ua> User-Agent: Mutt/1.10.1 (2018-07-13) X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 01 Aug 2018 15:28:58 -0000 On Wed, Aug 01, 2018 at 10:55:12AM +0300, Konstantin Belousov wrote: > On Tue, Jul 31, 2018 at 05:49:20PM -0400, Mark Johnston wrote: > > The COMPAT_43 kernel option, which enables syscall support for 4.3BSD > > binaries, hasn't been enabled in the standard kernel configs for well > > over a decade, and doesn't appear to be a dependency of any other kernel > > features. Nonetheless, the kernel contains quite a bit of code to > > support this option. Does anyone use it in modern versions of FreeBSD > > or have any arguments for keeping it? > > COMPAT_43 means two things, the third part is a.out image activator. > First thing is the lcall $7.$0 syscall emulator, both on amd64 and > (surprisingly) i386, after 4/4 split. Second thing is the syscalls > compat shims. > > Together, all three things allow to run pre-3.x binaries on the modern > machines, including amd64. I think this is useful at least for 'waving > the flag' about our ABI compatibility guarantees, and for the historic > software reconstruction. I run 1.1.8 chroot and several old binaries > sometimes, I know that bde does, and there was at least one more user > some time ago. > > What do you mean by a lot of code ? Syscall compats is relatively easy. > lcall $7,$0 emulation is very non-trivial but tiny. I do maintain this > code and do not want it to go away. Thanks, fair enough. The question was prompted by seeing lots of COMPAT_OLDSOCK ifdefs while working on some socket code. From owner-freebsd-hackers@freebsd.org Wed Aug 1 15:31:43 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 081C01060BB0 for ; Wed, 1 Aug 2018 15:31:43 +0000 (UTC) (envelope-from markjdb@gmail.com) Received: from mail-pl0-x231.google.com (mail-pl0-x231.google.com [IPv6:2607:f8b0:400e:c01::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 7D46779A1D for ; Wed, 1 Aug 2018 15:31:42 +0000 (UTC) (envelope-from markjdb@gmail.com) Received: by mail-pl0-x231.google.com with SMTP id u11-v6so3432630plq.5 for ; Wed, 01 Aug 2018 08:31:42 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=lv1RIj/wAx55UZBcwFPf9erJgHIhxmVv8GPw9FOe6/w=; b=HZebdZQMQYmSDHh1dkWMLx/5hH8/iyYB/4LI7oWvsDYh9J0t3Dw/lA0alldSNS8w3C JhYXKUPEKtDxZJk2Y0W8HfCBgJvmEdDMIUXUZDBk59BkLPSEg8HL0gtT3jxwYYIevhI+ 2CRa5yiLxXOXvxHrP0WLCHNpI3thpWJBL3o7TSLoCJ2l9QnSteLqMu6UMgk7nRjXd25U LTNoamG+UtRWIqpeWnwSHQw2xzjnn+HqEyyuhq6Qe1kg2Dao0BVLq8JZuVu8TF354ahs tFSaAitfvwUTVTrgCwid2RPHrqk0xbktfSWZb3q8r/rILFa8f3P1tbzu6l+xP7vrPEdF JrYw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:from:to:cc:subject:message-id :references:mime-version:content-disposition:in-reply-to:user-agent; bh=lv1RIj/wAx55UZBcwFPf9erJgHIhxmVv8GPw9FOe6/w=; b=YIfFma0v/g7LmkYxXDVQpx7XHbeUXWxHf+5/n2yuTO1o1XU8Nhsk7Pf5ca+MjqknZ8 /0nHx45iIkQtgxGPHmfqBsVhQEXL78EIOn7RCc6GB/JJ5KHnkVFLYM7ZBBzCi7JJuIIR lw4rcT9gikRfNoOGCWydg5iNItCDHX2JP0+TmEZMERH2KpuVagqz7AIMClJfC3jyD9dm NeYhOb3Ac8XPTb79Wup64yKdj1ikeO6+FKdu6LEfd+TpxUYsCBFRxDZqE/jRI0GT4o1Z hLjXP2hg7BrY9DZ1CkX5O5GOmCRnefCFvfjG1XYcrS7kf+/k6y7sFLmD6FZAfO796MqB LEgQ== X-Gm-Message-State: AOUpUlFZYG4U3xDLOUkSp34ibj78bdJrPewOLhfSQsB3Bghejtk4vv9t /cSob8kagVk8Ug7MLd3VkpCkHIVm X-Google-Smtp-Source: AAOMgpceqtNNLhi2dSIDWNrRdIna5d2uyl9zA6r1cDiH7S5Qz5SUhFe6D4fMDtH5MMSmign9YcTVAg== X-Received: by 2002:a17:902:4601:: with SMTP id o1-v6mr23221030pld.202.1533137501519; Wed, 01 Aug 2018 08:31:41 -0700 (PDT) Received: from raichu (toroon0560w-lp130-09-70-52-224-239.dsl.bell.ca. [70.52.224.239]) by smtp.gmail.com with ESMTPSA id g63-v6sm23865955pfc.77.2018.08.01.08.31.40 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 01 Aug 2018 08:31:40 -0700 (PDT) Sender: Mark Johnston Date: Wed, 1 Aug 2018 11:31:37 -0400 From: Mark Johnston To: Warner Losh Cc: FreeBSD Hackers Subject: Re: COMPAT_43 users? Message-ID: <20180801153137.GD97237@raichu> References: <20180731214920.GA95743@raichu> <20180801152525.GB97237@raichu> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 01 Aug 2018 15:31:43 -0000 On Wed, Aug 01, 2018 at 04:27:04PM +0100, Warner Losh wrote: > On Wed, Aug 1, 2018, 4:25 PM Mark Johnston wrote: > > > On Wed, Aug 01, 2018 at 04:15:09AM -0600, Warner Losh wrote: > > > Comments say it's needed for Linux emulation and for running FreeBSD 1, > > 2, > > > or 3 binaries. It's still compiled for PowerPC kernels. Despite it's > > name, > > > it looks like removing it would be somewhat complicated... > > > > It's not required for Linux emulation anymore. > > > > Then we can fix the comments... I fixed one: https://svnweb.freebsd.org/base?view=revision&revision=337015 I didn't see any other places that documented the dependency. From owner-freebsd-hackers@freebsd.org Wed Aug 1 14:49:47 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 63308105F685 for ; Wed, 1 Aug 2018 14:49:47 +0000 (UTC) (envelope-from duddejeevan29@gmail.com) Received: from mail-oi0-x235.google.com (mail-oi0-x235.google.com [IPv6:2607:f8b0:4003:c06::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 03FA2778D7 for ; Wed, 1 Aug 2018 14:49:46 +0000 (UTC) (envelope-from duddejeevan29@gmail.com) Received: by mail-oi0-x235.google.com with SMTP id n21-v6so35076813oig.3 for ; Wed, 01 Aug 2018 07:49:46 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:from:date:message-id:subject:to; bh=E/+zAahMWUaZYi9xNrDwUdGG5Ag1ZLeqymM2xTeViR4=; b=tOWcbykEHVo/7JdEk2HhEHtxGw51shPH3+xt5at6GnHZwIGsnf3EppV1kXi2ezfz2T oHsSEVsRm+xc8Gv38WIWLTOpKQeww7sjk16YNBihi40UUdP5DHJVIKI51pVMmk3j7OIb 1Q3Y91/yI3bLlBcmy6Ci095qlsP+ZUHndrKwTKL+9H6C/O5XfhnYndcLhOVr4DCr6pc0 tiFLCj7HLdBc8ew4kVps/NnTy39dPTbw+y0NoOM4XU41hqkrApq6S5ZpdGKCavdulONz 6CLGyKXYVBiADULfxCnJ1R+lg3p3C+6WxpbF9L2KqiUkuB8YXMhM1sXfFITwTd/Lggzu 29DQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=E/+zAahMWUaZYi9xNrDwUdGG5Ag1ZLeqymM2xTeViR4=; b=smKsSFEydwuiydfi1FAm7eYnQYCfj3YPIMV5BWO5Sc1ktDR2442w4F3plC1iQEKyAb AEPdFHgmtpFy+KDd33nDyK6wQ8i8a4zjsqFDUQ9YvwlQeJS7vElRffsFLPADam8kLN2d ueUlAqDiR3838zDptIFQ6AKd4Pt8n1IbAEuhKcjKxoerLs8X5chNG+M9Dzc0asWEskKf A3GwnU8UjqGvw4/PzzlGaJfkKfzhPPPF6wZHRiWJ0/VzVZNRP4eBPIYBFlpbNAabRLiK OLKt61Jl1vYNqf803TdGfzJQUHdf2ilaboicQvVY0p6NKLk+3kIUiF2c5BYS+nDLm2jn qlRw== X-Gm-Message-State: AOUpUlHcQlAFrseBPjW4FaSPSqH9yfW9uoDgqrPd6ALR/Oe9WMWcqtwy 0/rkMssL0alFGbIg0URVjlKLTNUWXo5yqSvbY4Qe4GOl X-Google-Smtp-Source: AAOMgpcudFtmU3mJD4gpex1xGGapQdmgp6SqeiYzXvIAmiBKVXDSPdyBttfRWT16cpeCa1qjsBoKVLCZLR7P6LmaxK0= X-Received: by 2002:aca:d605:: with SMTP id n5-v6mr3490771oig.287.1533134986110; Wed, 01 Aug 2018 07:49:46 -0700 (PDT) MIME-Version: 1.0 From: Dudde Jeevan Date: Wed, 1 Aug 2018 16:49:35 +0200 Message-ID: Subject: FreeBSD TPM 2.0 Support To: freebsd-hackers@freebsd.org X-Mailman-Approved-At: Wed, 01 Aug 2018 15:37:54 +0000 Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.27 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 01 Aug 2018 14:49:47 -0000 Hi, Have you been successful in integrate your project base on FreeBSD with a TPM 2.0 chip ? As, i am also planning to do it. It would be good to know if you have been successful already ? Thanks Best Regards, Jeevan From owner-freebsd-hackers@freebsd.org Wed Aug 1 15:50:09 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 90539106161B for ; Wed, 1 Aug 2018 15:50:09 +0000 (UTC) (envelope-from brooks@spindle.one-eyed-alien.net) Received: from spindle.one-eyed-alien.net (spindle.one-eyed-alien.net [199.48.129.229]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 412237A71E; Wed, 1 Aug 2018 15:50:09 +0000 (UTC) (envelope-from brooks@spindle.one-eyed-alien.net) Received: by spindle.one-eyed-alien.net (Postfix, from userid 3001) id 8E50F5A9F17; Wed, 1 Aug 2018 15:50:08 +0000 (UTC) Date: Wed, 1 Aug 2018 15:50:08 +0000 From: Brooks Davis To: Mark Johnston Cc: Konstantin Belousov , freebsd-hackers@freebsd.org Subject: Re: COMPAT_43 users? Message-ID: <20180801155008.GC99632@spindle.one-eyed-alien.net> References: <20180731214920.GA95743@raichu> <20180801075512.GR40119@kib.kiev.ua> <20180801152853.GC97237@raichu> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="vGgW1X5XWziG23Ko" Content-Disposition: inline In-Reply-To: <20180801152853.GC97237@raichu> User-Agent: Mutt/1.9.4 (2018-02-28) X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 01 Aug 2018 15:50:09 -0000 --vGgW1X5XWziG23Ko Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Wed, Aug 01, 2018 at 11:28:53AM -0400, Mark Johnston wrote: > On Wed, Aug 01, 2018 at 10:55:12AM +0300, Konstantin Belousov wrote: > > On Tue, Jul 31, 2018 at 05:49:20PM -0400, Mark Johnston wrote: > > > The COMPAT_43 kernel option, which enables syscall support for 4.3BSD > > > binaries, hasn't been enabled in the standard kernel configs for well > > > over a decade, and doesn't appear to be a dependency of any other ker= nel > > > features. Nonetheless, the kernel contains quite a bit of code to > > > support this option. Does anyone use it in modern versions of FreeBSD > > > or have any arguments for keeping it? > >=20 > > COMPAT_43 means two things, the third part is a.out image activator. > > First thing is the lcall $7.$0 syscall emulator, both on amd64 and > > (surprisingly) i386, after 4/4 split. Second thing is the syscalls > > compat shims. > >=20 > > Together, all three things allow to run pre-3.x binaries on the modern > > machines, including amd64. I think this is useful at least for 'waving > > the flag' about our ABI compatibility guarantees, and for the historic > > software reconstruction. I run 1.1.8 chroot and several old binaries > > sometimes, I know that bde does, and there was at least one more user > > some time ago. > >=20 > > What do you mean by a lot of code ? Syscall compats is relatively easy. > > lcall $7,$0 emulation is very non-trivial but tiny. I do maintain this > > code and do not want it to go away. >=20 > Thanks, fair enough. The question was prompted by seeing lots of > COMPAT_OLDSOCK ifdefs while working on some socket code. I've had to figure out the COMPAT_OLDSOCK stuff a couple times in the last few years. The way it's implementation is weird in that it seems to change the system wide socket behavior in a few cases. It might be a worthy endeavor to refactor this into alternate entry points for an a.out compat layer (it's also patently absurd that you can invoke (e.g.) cpuset_setdomain(2) from an a.out binary). -- Brooks --vGgW1X5XWziG23Ko Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQEcBAEBAgAGBQJbYdavAAoJEKzQXbSebgfAupAH/2B/HkOtrcMzj245jdVg2A5U IM1zwupcID0u7UUjc1IWTPq0LKQSXtxzVcebdtiDHExHqbOATqmiRdYng9w+mUTA rIToBO00WPtPtZ04IMtRF/JIsyVl91hjgz9QBLJwEkNXEfLusu3BI/53seYLUGn5 m4/C4nNFJxN/8KUMnyUfAFZ7COdl+kPtTgO8Aq2B/Iusq1m4Qz+h4oieXVgvl34B ZYDH8l/BsDnzTcyBhpOsl1pyywS1kfI43g31YsCRyJl6EVY8rjkTckZAHxdCIP+Z jncPC/726ok3j7GdE3Zx1TDdF+N4JM9hP0+UH+KCRYRsA0e5uu6E1wksi4CUNmc= =ENNO -----END PGP SIGNATURE----- --vGgW1X5XWziG23Ko-- From owner-freebsd-hackers@freebsd.org Wed Aug 1 16:11:14 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id DE6B81062156 for ; Wed, 1 Aug 2018 16:11:14 +0000 (UTC) (envelope-from freebsd-rwg@pdx.rh.CN85.dnsmgr.net) Received: from pdx.rh.CN85.dnsmgr.net (br1.CN84in.dnsmgr.net [69.59.192.140]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4C2E37B431; Wed, 1 Aug 2018 16:11:13 +0000 (UTC) (envelope-from freebsd-rwg@pdx.rh.CN85.dnsmgr.net) Received: from pdx.rh.CN85.dnsmgr.net (localhost [127.0.0.1]) by pdx.rh.CN85.dnsmgr.net (8.13.3/8.13.3) with ESMTP id w71GB4CI077912; Wed, 1 Aug 2018 09:11:04 -0700 (PDT) (envelope-from freebsd-rwg@pdx.rh.CN85.dnsmgr.net) Received: (from freebsd-rwg@localhost) by pdx.rh.CN85.dnsmgr.net (8.13.3/8.13.3/Submit) id w71GB29F077911; Wed, 1 Aug 2018 09:11:02 -0700 (PDT) (envelope-from freebsd-rwg) From: "Rodney W. Grimes" Message-Id: <201808011611.w71GB29F077911@pdx.rh.CN85.dnsmgr.net> Subject: Re: COMPAT_43 users? In-Reply-To: <20180801155008.GC99632@spindle.one-eyed-alien.net> To: Brooks Davis Date: Wed, 1 Aug 2018 09:11:02 -0700 (PDT) CC: Mark Johnston , Konstantin Belousov , freebsd-hackers@freebsd.org X-Mailer: ELM [version 2.4ME+ PL121h (25)] MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Type: text/plain; charset=US-ASCII X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 01 Aug 2018 16:11:15 -0000 > On Wed, Aug 01, 2018 at 11:28:53AM -0400, Mark Johnston wrote: > > On Wed, Aug 01, 2018 at 10:55:12AM +0300, Konstantin Belousov wrote: > > > On Tue, Jul 31, 2018 at 05:49:20PM -0400, Mark Johnston wrote: > > > > The COMPAT_43 kernel option, which enables syscall support for 4.3BSD > > > > binaries, hasn't been enabled in the standard kernel configs for well > > > > over a decade, and doesn't appear to be a dependency of any other kernel > > > > features. Nonetheless, the kernel contains quite a bit of code to > > > > support this option. Does anyone use it in modern versions of FreeBSD > > > > or have any arguments for keeping it? > > > > > > COMPAT_43 means two things, the third part is a.out image activator. > > > First thing is the lcall $7.$0 syscall emulator, both on amd64 and > > > (surprisingly) i386, after 4/4 split. Second thing is the syscalls > > > compat shims. > > > > > > Together, all three things allow to run pre-3.x binaries on the modern > > > machines, including amd64. I think this is useful at least for 'waving > > > the flag' about our ABI compatibility guarantees, and for the historic > > > software reconstruction. I run 1.1.8 chroot and several old binaries > > > sometimes, I know that bde does, and there was at least one more user > > > some time ago. > > > > > > What do you mean by a lot of code ? Syscall compats is relatively easy. > > > lcall $7,$0 emulation is very non-trivial but tiny. I do maintain this > > > code and do not want it to go away. > > > > Thanks, fair enough. The question was prompted by seeing lots of > > COMPAT_OLDSOCK ifdefs while working on some socket code. > > I've had to figure out the COMPAT_OLDSOCK stuff a couple times in the > last few years. The way it's implementation is weird in that it seems > to change the system wide socket behavior in a few cases. It might be > a worthy endeavor to refactor this into alternate entry points for an > a.out compat layer (it's also patently absurd that you can invoke (e.g.) > cpuset_setdomain(2) from an a.out binary). I do not see what that would be absurd, a.out is a binary executable format, nothing should stop me from doing anything from an a.out that I can do from a elf. NOT being able to invoke foo(2) just because the binary was compiled to a.out would be absurd. -- Rod Grimes rgrimes@freebsd.org From owner-freebsd-hackers@freebsd.org Wed Aug 1 16:22:20 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 17A7B10626BF for ; Wed, 1 Aug 2018 16:22:20 +0000 (UTC) (envelope-from bzeeb-lists@lists.zabbadoz.net) Received: from mx1.sbone.de (mx1.sbone.de [IPv6:2a01:4f8:130:3ffc::401:25]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "mx1.sbone.de", Issuer "SBone.DE" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id A751B7BC0C; Wed, 1 Aug 2018 16:22:19 +0000 (UTC) (envelope-from bzeeb-lists@lists.zabbadoz.net) Received: from mail.sbone.de (mail.sbone.de [IPv6:fde9:577b:c1a9:31::2013:587]) (using TLSv1 with cipher ADH-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by mx1.sbone.de (Postfix) with ESMTPS id 8459D25D3A6D; Wed, 1 Aug 2018 16:22:17 +0000 (UTC) Received: from content-filter.sbone.de (content-filter.sbone.de [IPv6:fde9:577b:c1a9:31::2013:2742]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.sbone.de (Postfix) with ESMTPS id D1DDED1F84E; Wed, 1 Aug 2018 16:22:16 +0000 (UTC) X-Virus-Scanned: amavisd-new at sbone.de Received: from mail.sbone.de ([IPv6:fde9:577b:c1a9:31::2013:587]) by content-filter.sbone.de (content-filter.sbone.de [fde9:577b:c1a9:31::2013:2742]) (amavisd-new, port 10024) with ESMTP id Gql_bVDU5Qd8; Wed, 1 Aug 2018 16:22:15 +0000 (UTC) Received: from [192.168.124.1] (unknown [IPv6:fde9:577b:c1a9:31:2ef0:eeff:fe03:ee34]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by mail.sbone.de (Postfix) with ESMTPSA id 2CF12D1F835; Wed, 1 Aug 2018 16:22:15 +0000 (UTC) From: "Bjoern A. Zeeb" To: "Alan Somers" Cc: "Christian Mauderer" , freebsd-hackers@freebsd.org Subject: Re: Configuration for IPSec Loop-Back Test Date: Wed, 01 Aug 2018 16:22:14 +0000 X-Mailer: MailMate (2.0BETAr6116) Message-ID: <0842B1D8-AAB9-4553-AD0B-AB710CEDB68D@lists.zabbadoz.net> In-Reply-To: References: <20127f75-c6d6-463e-046f-3844502f3da9@embedded-brains.de> MIME-Version: 1.0 Content-Type: text/plain; format=flowed X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 01 Aug 2018 16:22:20 -0000 On 1 Aug 2018, at 14:50, Alan Somers wrote: > On Wed, Aug 1, 2018 at 7:15 AM, Christian Mauderer < > christian.mauderer@embedded-brains.de> wrote: > >> Hello, >> >> I'm working on a port for IPSec and ipsec-tools (racoon, setkey, >> libipsec) to an embedded operating system (RTEMS). RTEMS uses the >> FreeBSD network stack via a compatibility layer (rtems-libbsd). >> >> I can already create a IPSec connection on some real hardware with >> some >> real peer. To prevent regression in a future version, I would like to >> add a test that would check that the port still works. That test >> would >> have to run on a system _without_ a real hardware peer. Therefore I >> would like to create some IPSec loop back connection. In that case >> racoon would have to talk to itself because I currently only support >> one >> instance. >> >> Do you have any hints how I could create such a network? >> >> My current thought would be something along a virtual network device >> (maybe tun?) that can be connected to some other virtual network >> device >> via for example a bridge device. Maybe I could then try to configure >> two >> gif-devices that would use this tunnel. racoon would have to listen >> on >> both devices (maybe on different ports). >> >> Currently I have trouble setting this up. Are there any simpler ideas >> for an IPSec loop back connection that would use most of the stack >> layers? >> >> Thanks in advance for every answer. >> >> With kind regards >> >> Christian Mauderer >> > > Does RTEMS support multiple FIBs? In FreeBSD I've done this kind of > thing > using multiple FIBs with tap(4) devices (though tun(4) might work for > your > use case). In the FreeBSD source tree, see > tests/sys/netinet/fibs_test.sh. And, on FreeBSD, I have used VIMAGE ( which I doubt you have ) though with two vnets in two jails talking to each other or three of them with a middle node forwarding or five of them with two clients, two security gateways, and a forwarding node. /bz From owner-freebsd-hackers@freebsd.org Wed Aug 1 16:50:28 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id BF83A10630A3 for ; Wed, 1 Aug 2018 16:50:27 +0000 (UTC) (envelope-from brooks@spindle.one-eyed-alien.net) Received: from spindle.one-eyed-alien.net (spindle.one-eyed-alien.net [199.48.129.229]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 588637CD98; Wed, 1 Aug 2018 16:50:27 +0000 (UTC) (envelope-from brooks@spindle.one-eyed-alien.net) Received: by spindle.one-eyed-alien.net (Postfix, from userid 3001) id AC4D35A9F17; Wed, 1 Aug 2018 16:50:26 +0000 (UTC) Date: Wed, 1 Aug 2018 16:50:26 +0000 From: Brooks Davis To: "Rodney W. Grimes" Cc: Mark Johnston , Konstantin Belousov , freebsd-hackers@freebsd.org Subject: Re: COMPAT_43 users? Message-ID: <20180801165026.GD99632@spindle.one-eyed-alien.net> References: <20180801155008.GC99632@spindle.one-eyed-alien.net> <201808011611.w71GB29F077911@pdx.rh.CN85.dnsmgr.net> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="HG+GLK89HZ1zG0kk" Content-Disposition: inline In-Reply-To: <201808011611.w71GB29F077911@pdx.rh.CN85.dnsmgr.net> User-Agent: Mutt/1.9.4 (2018-02-28) X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 01 Aug 2018 16:50:28 -0000 --HG+GLK89HZ1zG0kk Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Wed, Aug 01, 2018 at 09:11:02AM -0700, Rodney W. Grimes wrote: > > On Wed, Aug 01, 2018 at 11:28:53AM -0400, Mark Johnston wrote: > > > On Wed, Aug 01, 2018 at 10:55:12AM +0300, Konstantin Belousov wrote: > > > > On Tue, Jul 31, 2018 at 05:49:20PM -0400, Mark Johnston wrote: > > > > > The COMPAT_43 kernel option, which enables syscall support for 4.= 3BSD > > > > > binaries, hasn't been enabled in the standard kernel configs for = well > > > > > over a decade, and doesn't appear to be a dependency of any other= kernel > > > > > features. Nonetheless, the kernel contains quite a bit of code to > > > > > support this option. Does anyone use it in modern versions of Fr= eeBSD > > > > > or have any arguments for keeping it? > > > >=20 > > > > COMPAT_43 means two things, the third part is a.out image activator. > > > > First thing is the lcall $7.$0 syscall emulator, both on amd64 and > > > > (surprisingly) i386, after 4/4 split. Second thing is the syscalls > > > > compat shims. > > > >=20 > > > > Together, all three things allow to run pre-3.x binaries on the mod= ern > > > > machines, including amd64. I think this is useful at least for 'wav= ing > > > > the flag' about our ABI compatibility guarantees, and for the histo= ric > > > > software reconstruction. I run 1.1.8 chroot and several old binaries > > > > sometimes, I know that bde does, and there was at least one more us= er > > > > some time ago. > > > >=20 > > > > What do you mean by a lot of code ? Syscall compats is relatively = easy. > > > > lcall $7,$0 emulation is very non-trivial but tiny. I do maintain = this > > > > code and do not want it to go away. > > >=20 > > > Thanks, fair enough. The question was prompted by seeing lots of > > > COMPAT_OLDSOCK ifdefs while working on some socket code. > >=20 > > I've had to figure out the COMPAT_OLDSOCK stuff a couple times in the > > last few years. The way it's implementation is weird in that it seems > > to change the system wide socket behavior in a few cases. It might be > > a worthy endeavor to refactor this into alternate entry points for an > > a.out compat layer (it's also patently absurd that you can invoke (e.g.) > > cpuset_setdomain(2) from an a.out binary). >=20 > I do not see what that would be absurd, a.out is a binary executable > format, nothing should stop me from doing anything from an a.out that > I can do from a elf. NOT being able to invoke foo(2) just because > the binary was compiled to a.out would be absurd. It's absurd because there is no sensible, supported path to create new a.out binaries targeting FreeBSD 12. IMO it would be better to limit a.out support to syscalls supported by releases where a.out was supported. -- Brooks --HG+GLK89HZ1zG0kk Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQEcBAEBAgAGBQJbYeTSAAoJEKzQXbSebgfAufsH/j7y1XQwp8Od/iufYaovMG3W RgDVmqFoKRPORHO76wVO0zSh4X/mXbjaMaCU14ANPMVSyDeUNHmjrY9HHopedt7m 78CqTKTUNZoM+g9xakL4eDk0tZNhqOsjrUJzX0kxg42NlG5/PpmS9QinktsqUC3Y c+J9SVKNRP6VsZUxFgHIzYigR38RTBOIcVw5Fg99lRC65mex2PdWkbXvZO8k32cj QGV1uoDs7DKbyvbPAs/cQYpp7DHzX+5oqyNb3FWKbyYzwUOOQZYC8HwG2AXICXan tp3KPvJVvTGkJRSlVvFuzeDAzhUjoYPAoV6gwHUz8u7lj2t0DSLodMR/CJFXJ0E= =gfNq -----END PGP SIGNATURE----- --HG+GLK89HZ1zG0kk-- From owner-freebsd-hackers@freebsd.org Wed Aug 1 17:22:09 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 3C8E210640CD for ; Wed, 1 Aug 2018 17:22:09 +0000 (UTC) (envelope-from kostikbel@gmail.com) Received: from kib.kiev.ua (kib.kiev.ua [IPv6:2001:470:d5e7:1::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id ADE9C7E3CC; Wed, 1 Aug 2018 17:22:08 +0000 (UTC) (envelope-from kostikbel@gmail.com) Received: from tom.home (kib@localhost [127.0.0.1]) by kib.kiev.ua (8.15.2/8.15.2) with ESMTPS id w71HLwMG000400 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Wed, 1 Aug 2018 20:22:01 +0300 (EEST) (envelope-from kostikbel@gmail.com) DKIM-Filter: OpenDKIM Filter v2.10.3 kib.kiev.ua w71HLwMG000400 Received: (from kostik@localhost) by tom.home (8.15.2/8.15.2/Submit) id w71HLw4r000399; Wed, 1 Aug 2018 20:21:58 +0300 (EEST) (envelope-from kostikbel@gmail.com) X-Authentication-Warning: tom.home: kostik set sender to kostikbel@gmail.com using -f Date: Wed, 1 Aug 2018 20:21:58 +0300 From: Konstantin Belousov To: Brooks Davis Cc: "Rodney W. Grimes" , Mark Johnston , freebsd-hackers@freebsd.org Subject: Re: COMPAT_43 users? Message-ID: <20180801172158.GT40119@kib.kiev.ua> References: <20180801155008.GC99632@spindle.one-eyed-alien.net> <201808011611.w71GB29F077911@pdx.rh.CN85.dnsmgr.net> <20180801165026.GD99632@spindle.one-eyed-alien.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180801165026.GD99632@spindle.one-eyed-alien.net> User-Agent: Mutt/1.10.1 (2018-07-13) X-Spam-Status: No, score=-2.0 required=5.0 tests=ALL_TRUSTED,BAYES_00, DKIM_ADSP_CUSTOM_MED,FREEMAIL_FROM,NML_ADSP_CUSTOM_MED autolearn=no autolearn_force=no version=3.4.1 X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on tom.home X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 01 Aug 2018 17:22:09 -0000 On Wed, Aug 01, 2018 at 04:50:26PM +0000, Brooks Davis wrote: > It's absurd because there is no sensible, supported path to create new > a.out binaries targeting FreeBSD 12. IMO it would be better to limit > a.out support to syscalls supported by releases where a.out was > supported. It requires somewhat non-trivial effort to limit them, while providing the access is free. We do not create new syscall table for each ABI addition. From owner-freebsd-hackers@freebsd.org Wed Aug 1 18:04:30 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id EB79A1065023 for ; Wed, 1 Aug 2018 18:04:29 +0000 (UTC) (envelope-from brooks@spindle.one-eyed-alien.net) Received: from spindle.one-eyed-alien.net (spindle.one-eyed-alien.net [199.48.129.229]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 83BD780414; Wed, 1 Aug 2018 18:04:29 +0000 (UTC) (envelope-from brooks@spindle.one-eyed-alien.net) Received: by spindle.one-eyed-alien.net (Postfix, from userid 3001) id 524A55A9F16; Wed, 1 Aug 2018 18:04:27 +0000 (UTC) Date: Wed, 1 Aug 2018 18:04:27 +0000 From: Brooks Davis To: Konstantin Belousov Cc: Brooks Davis , "Rodney W. Grimes" , Mark Johnston , freebsd-hackers@freebsd.org Subject: Re: COMPAT_43 users? Message-ID: <20180801180427.GA19860@spindle.one-eyed-alien.net> References: <20180801155008.GC99632@spindle.one-eyed-alien.net> <201808011611.w71GB29F077911@pdx.rh.CN85.dnsmgr.net> <20180801165026.GD99632@spindle.one-eyed-alien.net> <20180801172158.GT40119@kib.kiev.ua> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="mYCpIKhGyMATD0i+" Content-Disposition: inline In-Reply-To: <20180801172158.GT40119@kib.kiev.ua> User-Agent: Mutt/1.9.4 (2018-02-28) X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 01 Aug 2018 18:04:30 -0000 --mYCpIKhGyMATD0i+ Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Wed, Aug 01, 2018 at 08:21:58PM +0300, Konstantin Belousov wrote: > On Wed, Aug 01, 2018 at 04:50:26PM +0000, Brooks Davis wrote: > > It's absurd because there is no sensible, supported path to create new > > a.out binaries targeting FreeBSD 12. IMO it would be better to limit > > a.out support to syscalls supported by releases where a.out was > > supported. >=20 > It requires somewhat non-trivial effort to limit them, while providing > the access is free. We do not create new syscall table for each ABI > addition. My point was that (IMO) we should create a new syscall table to a.out to let it subsume things like COMPAT_OLDSOCK. -- Brooks --mYCpIKhGyMATD0i+ Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQEcBAEBAgAGBQJbYfYqAAoJEKzQXbSebgfAHJ4IAIRdfYJIBJDaLxMNiScc/SKJ 7ZomUs178fE39P4uLdWEEszsqZZYtf4r/diGqmoAdXj4jzs21d7hLjW+aMBEEfid jw348lAaxw/ckNPTuPz9fYfQgSB4ypG3leWEHeN83DyQR/nOlwuQ8JL8t1ADOZYu Sc+O+rETJMpZLPAB6fOcXNZq46oM35Sxi3JcgSwgeRH4C8IDR+8LDpXkI6jyXX51 QJryqMHcpeALrtrYcGluwnfiTpEjd5jEA+6rGhf8H3/bk9I6TGvtxoP/sx5H/KOy L2aik6ue4/jPgSRxmm6HIZcDorI9telBo5lpnRPvsP+laKCoVWL3n50rWqoljw4= =wgih -----END PGP SIGNATURE----- --mYCpIKhGyMATD0i+-- From owner-freebsd-hackers@freebsd.org Thu Aug 2 05:03:43 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 7730C1057692 for ; Thu, 2 Aug 2018 05:03:43 +0000 (UTC) (envelope-from lakhanshiva@gmail.com) Received: from mail-oi0-x233.google.com (mail-oi0-x233.google.com [IPv6:2607:f8b0:4003:c06::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 0A55D72F33 for ; Thu, 2 Aug 2018 05:03:43 +0000 (UTC) (envelope-from lakhanshiva@gmail.com) Received: by mail-oi0-x233.google.com with SMTP id m11-v6so1729267oic.2 for ; Wed, 01 Aug 2018 22:03:42 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to; bh=ogheatWW81BZLVK4gGs+jcj0Q8yGSk4Fs7vTi49OKlE=; b=CzZJKkmguFOdS82dSBJp6N60guCwRWytEDAhdIZI1WogZNf6acHV8c7FT8zG4pyYAd gcQNtyVsZP2eKv4PCoSBQXfQX10il828L7Vp271z11lTMSneFnW5AwKJgQzpl9Z3dKLp LNOYNLVLgi4aRBOrq25aJf+e4DC+rZlPCsiAnVn2Gi92fM0Jv8YtVkLwTNJG10sGV8QC OmOsw22CYlbHUjBz01CfrzLC01JvVGb6eKVFlrYjwUeGeucIGGJlVoK3Vv5tHanmsglU ZxOx0dLssOFy2ctSXP9pyXtG8Qwx0pTxuR2/rV4aoSPdNkbkEzBxha1P6SN6I1d0bJIJ 2fjw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=ogheatWW81BZLVK4gGs+jcj0Q8yGSk4Fs7vTi49OKlE=; b=m84jQce2I0HLMKB96aEht80XEJQA4dzcGHcHuziDmBCC9CNxyk4GliaqMX1pCdwlOj sp3fp4UIfrPEV0Wa1InOnGoKczAXsGi+DSRoY3jYVvubxneEX9CFvGbw65CKie2lm0/w 5JXAqngJcwHbSjtH4UgW3kVK20L3Xsv0KqyHYQBX6bYGGzPNwoOt6VQ/yhL74gvGAaMo 0NzFVJwG4HYxq49lUQlrbHvkC2GZP3dS+bj/JHD6joxVzT7UKT7k3o7saoal7ouyJ1m5 CiKMQ0kg0mz7Am007dKvbb0F6c2/kLlHv3uL5PVyjMpH+fvsl9jlO7Ma3MWU0OgmmT9q wLAg== X-Gm-Message-State: AOUpUlFRm7GPGKla3XjYQdkrnSnW0OQvn57nC7cFi82Gak+QUlEpvTl8 DjGs3yeSKW55lr4vi/z8VLBBvGeBsc57TFksmH47ek78 X-Google-Smtp-Source: AAOMgpcTrnzQ6x3Bz5jVDDutxObGU8PBBI7UMpCSaifP9N/rp6Kt3MekD6Vi8SawtPcf0m0MPo5CLtpbHMxjHyplEmM= X-Received: by 2002:aca:438a:: with SMTP id q132-v6mr1099330oia.331.1533186221715; Wed, 01 Aug 2018 22:03:41 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: From: Lakhan Shiva Date: Wed, 1 Aug 2018 23:03:29 -0600 Message-ID: Subject: Fwd: Error when building my branch To: freebsd-hackers@freebsd.org Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.27 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 02 Aug 2018 05:03:43 -0000 Hi All, I am getting obj_copy: elf_begin failed: invalid argument (error) when building my branch. Below is the log screenshot. Please help me figure this out. [image: builderror.JPG] Looks like similar error was faced before by somebody - https://lists.freebsd.org/pipermail/freebsd-current/2017-July/066503.html Thanks, Lakhan From owner-freebsd-hackers@freebsd.org Thu Aug 2 06:00:16 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 559581059439 for ; Thu, 2 Aug 2018 06:00:16 +0000 (UTC) (envelope-from christian.mauderer@embedded-brains.de) Received: from dedi548.your-server.de (dedi548.your-server.de [85.10.215.148]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id CE12C74E35; Thu, 2 Aug 2018 06:00:15 +0000 (UTC) (envelope-from christian.mauderer@embedded-brains.de) Received: from [88.198.220.130] (helo=sslproxy01.your-server.de) by dedi548.your-server.de with esmtpsa (TLSv1.2:DHE-RSA-AES256-GCM-SHA384:256) (Exim 4.85_2) (envelope-from ) id 1fl6ei-0007nz-Pk; Thu, 02 Aug 2018 08:00:12 +0200 Received: from [82.135.62.35] (helo=mail.embedded-brains.de) by sslproxy01.your-server.de with esmtpsa (TLSv1.2:DHE-RSA-AES256-GCM-SHA384:256) (Exim 4.89) (envelope-from ) id 1fl6ei-0001En-G3; Thu, 02 Aug 2018 08:00:12 +0200 Received: from localhost (localhost.localhost [127.0.0.1]) by mail.embedded-brains.de (Postfix) with ESMTP id C886D2A1685; Thu, 2 Aug 2018 08:00:29 +0200 (CEST) Received: from mail.embedded-brains.de ([127.0.0.1]) by localhost (zimbra.eb.localhost [127.0.0.1]) (amavisd-new, port 10032) with ESMTP id rO0yjln_7mdy; Thu, 2 Aug 2018 08:00:27 +0200 (CEST) Received: from localhost (localhost.localhost [127.0.0.1]) by mail.embedded-brains.de (Postfix) with ESMTP id 71BC02A1686; Thu, 2 Aug 2018 08:00:27 +0200 (CEST) X-Virus-Scanned: amavisd-new at zimbra.eb.localhost Received: from mail.embedded-brains.de ([127.0.0.1]) by localhost (zimbra.eb.localhost [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id 0uO0cV0fb7mN; Thu, 2 Aug 2018 08:00:27 +0200 (CEST) Received: from [192.168.96.177] (unknown [192.168.96.177]) by mail.embedded-brains.de (Postfix) with ESMTPSA id 4087A2A1685; Thu, 2 Aug 2018 08:00:27 +0200 (CEST) Subject: Re: Configuration for IPSec Loop-Back Test To: "Bjoern A. Zeeb" , Alan Somers Cc: freebsd-hackers@freebsd.org References: <20127f75-c6d6-463e-046f-3844502f3da9@embedded-brains.de> <0842B1D8-AAB9-4553-AD0B-AB710CEDB68D@lists.zabbadoz.net> From: Christian Mauderer Openpgp: preference=signencrypt Autocrypt: addr=christian.mauderer@embedded-brains.de; prefer-encrypt=mutual; keydata= xsFNBFLXhAQBEACrTfMX2lFXJlA7pmoCXwz4jSRCfCOcgRRcvPxiw/Kb5ky2aG1OvFezra62 zysQQllygJdyRqBzOj0R/t8xtncR8D3MIUyLe71hpFzSOEkaC7w+cJOHLoAynV1zHpvBJ9k0 +d0ukL/mdGKwGOiI5JvKP/jxC/kHDedMr+RuHeWvwwYfYw3HgUURTBZXwl+9nzDXYAoSkt6e Lw4LK4gPAMNSg5bp9zg2oiLVH1Mc+UDiG3a11atxInuhBwCnVrvEbM4cDfaXxQwPOPnR83lV qPlcd/ggs8x5POpSYHqGWXFMkL8QcPHQQkyb+fmeo0UqKPH0n7SFs+tSkhwbpo5KtfvY5P7A KiDnKFoAg1PQn66ILd4yglt9w/F3RbDPDRp4+XGjajd5gc1IKap610Lna/ueO0Gd2Y1b/PDO njN7u7eNgwNuhbNQtTqvlItmkqx0wSbTWPC7uO1gl76VBksaXKrnrQDBiS0gOd7y0OIfd7VO TEE2ABo8iLiln1r5CN5jBhxxt7J8WMrfSI10UhREJtOWFy7c6UamDSUCdlzbakFCFY7E4CFu ipyCjQr5yBNmd5TPtJCL4KCWls4tVWDZWtBrI+BXGKMGzPO3UiPkT5T8zvlViVmTIdbrucgs 02LsSDbROOQrigXJWieiUexjajocmuRaXBZqxTu3jYS4+Ijf/wARAQABzTpDaHJpc3RpYW4g TWF1ZGVyZXIgPGNocmlzdGlhbi5tYXVkZXJlckBlbWJlZGRlZC1icmFpbnMuZGU+wsF/BBMB AgApBQJS14QEAhsjBQkJZgGABwsJCAcDAgEGFQgCCQoLBBYCAwECHgECF4AACgkQPZabD0IS fb09lQ/8CZrerI5CcF+FHx40FL0LqnFZcJ88UhqVCCc0LlsDUWLzbvbkQgiAiHoIc9AfDRhT sECeg3BMFIXEnIzNuOD0Yr6XvUSUvdo2I5VuEkGB3tX6u86KlLHCCTfi5qiy2CbeaLCEO1+D 0/09SGNZL4fWUXLmGVjPR4cbgkwbG7Hl8P9WXH/n9EHfI10/Mbj2Y+eH4WcKnumrkup0OHfk 3rjKYmbWqxyZv9oGf+AOeyTbZ59EhX2/M2+7GuuKqiggN+1oQpXyec63dvqr0YGBmkU87qEG 4ncugVXaFf+B6ILPEOgROuZwT+xK3RrNroCmjqQXeMhN8lQ0kyrcavDmqk6ovEjF2EM8cUis NuYJEwmx6YMzvfTzMuX4kLJgW+zIz+Dz9hLX9Bqeey5O5xCJVLUXOYe8snEsMy84aE1H9n/6 /zCqXwHcvLjf9nDiOMLBiwFOQyRPwfAxcyvqE9ynsAFP4sRKod4pkrOG1CeRdNtAz/92hhCN sP9FOqst85yQOPfpN/tJzlkHbTOhuAFAypBk0pZIAtiRKO+vw2VSP3BeGXRZjgQ1/ElZ0CVC xFwEB4Qfo++ClMkREquy1GdvLaZ7Gex850ptv3Uur1oLm4yu9jbuWZUQTR9dqa4RBUBKIctw fwhAq8k2GMOa33gYUWVK0l1cH8xqqpj5QONmyrNApQbOwU0EUteEBAEQAMuuzztQKBR3vsQG UGzXHps5c3l5HzvZ9uR4qBem1IWM9TGMUcRKbcPf+hmVzZIV5gkV1B/1B+h90GhEGATpbYE6 OdoCB6vlpc/aXjOVc921TqJ4jDM8iYfl0CIDC7EHBUPCsza8rMJYo4QH3noWc5UxW+ceW4ue luYK5CSCqbDhjguoZjCaVB2NkPZKSsjGmhx7Rw0JVSivdhPStQ41y2W+azSwNlEsmQkCQW9i xHEjRW1RLVDROj1robqHArLNwI0/SySmebSKJRQ8IpG0iSyivZ5ibnyLvjri2n87AUBVGv/u CtbWsA7oIwF4VlknKUJwDraPs798Ig06lFjz6WsjEa0BZjmDPBjkHZEqbbBI0h/Zmqo7AOrU iBefxJRDKjzQRHe3srJWr0TK/U4Lxmv1cMnF3U8sBJSM9TOfMF6QLjL92AQsX6SZEno6tzBg 3PkLwbxoC1rHFRVRsLfPercynpuIv5jaUDTKf5TqW2T8hCXJshcgSNb9l5JiNdj1PyqC7+2D k2I2/Ts9LkQRHQIAflxyshcjeBubUnIwR70AYvgMF12tQC6ZeW1HVCk8P/SBk78f9+T8SEws MPJL7td8iE4sbEhyzl9dKN3ols85tZeHTsSo3r8s6MoAjq876SvpslEcuQp+6tyOgsORv/nZ KaU7TiPMk6FCtGvB26FlABEBAAHCwWUEGAECAA8FAlLXhAQCGwwFCQlmAYAACgkQPZabD0IS fb1Ztg//S78bHPvMneb7HrA1deOBultlOIlb07ntz9nIdLo6VHIulc9t5RA4KWLTR927H52k zaTIf+ingyRGSSx9glQZ/9unNL8QQVE5TY/Hvzdl+y05189qQwsMyIIx16g8HN2h7dhIunuG 1HSK5bPlbD7yC8+Az3ICdMPr2kh/0rOJEqtQF4ySH/FLXGlbTGRnhOcLtSwK3rAacm9HCPNq muPHQoVT/goDbWMXjBp/dr/AOMYLDUS5lEJuGN8kKajQ4YWUZAPucNKh7XP8g/1ylnZpu5Mz XolRqDRrbLzWkcCE4fuAlrjyJPo8/Fj9MRvdF4Jf0KMBtd/UnJbyLO9TqWdQ5sp05ZE5SmL6 sjBxekiLLO3VLMeID6X4tY08VItTCbcb/OgkIqoAKOJaPbQQ8QczRfefNkUF7vuLJ8oIcy6O LssMWItO+3FVa4M1GBwrN1O+YWUVzcxbxPCS/1gOfMakfvObIFsexNZCJZRUeeYGSNnSJGON ajRod+BAC+CQQFqA4f3cdwpNTmUiiP4hAyb+dKNdgpTPNKFsouwDHsN/d2xXQqOh8CBMwndf NSGVW0B2n9YtXgW+LYcUd/3o4Ei/lYy8csG0xZ4RZ70j2Tq8oe5DXpvFcNv4E+vURhFBc5W2 cLTtbgqL8+Roy3aPZDft02dFgZUC1XXGw3C9KoR9rsE= Organization: embedded brains GmbH Message-ID: Date: Thu, 2 Aug 2018 08:00:09 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: <0842B1D8-AAB9-4553-AD0B-AB710CEDB68D@lists.zabbadoz.net> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: quoted-printable X-Authenticated-Sender: smtp-embedded@poldinet.de X-Virus-Scanned: Clear (ClamAV 0.100.0/24804/Thu Aug 2 02:43:46 2018) X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 02 Aug 2018 06:00:16 -0000 Am 01.08.2018 um 18:22 schrieb Bjoern A. Zeeb: > On 1 Aug 2018, at 14:50, Alan Somers wrote: >=20 >> On Wed, Aug 1, 2018 at 7:15 AM, Christian Mauderer < >> christian.mauderer@embedded-brains.de> wrote: >> >>> Hello, >>> >>> I'm working on a port for IPSec and ipsec-tools (racoon, setkey, >>> libipsec) to an embedded operating system (RTEMS). RTEMS uses the >>> FreeBSD network stack via a compatibility layer (rtems-libbsd). >>> >>> I can already create a IPSec connection on some real hardware with so= me >>> real peer. To prevent regression in a future version, I would like to >>> add a test that would check that the port still works. That test woul= d >>> have to run on a system _without_ a real hardware peer. Therefore I >>> would like to create some IPSec loop back connection. In that case >>> racoon would have to talk to itself because I currently only support = one >>> instance. >>> >>> Do you have any hints how I could create such a network? >>> >>> My current thought would be something along a virtual network device >>> (maybe tun?) that can be connected to some other virtual network devi= ce >>> via for example a bridge device. Maybe I could then try to configure = two >>> gif-devices that would use this tunnel. racoon would have to listen o= n >>> both devices (maybe on different ports). >>> >>> Currently I have trouble setting this up. Are there any simpler ideas >>> for an IPSec loop back connection that would use most of the stack >>> layers? >>> >>> Thanks in advance for every answer. >>> >>> With kind regards >>> >>> Christian Mauderer >>> >> >> Does RTEMS support multiple FIBs?=C2=A0 In FreeBSD I've done this kind= of >> thing >> using multiple FIBs with tap(4) devices (though tun(4) might work for >> your >> use case).=C2=A0 In the FreeBSD source tree, see >> tests/sys/netinet/fibs_test.sh. >=20 >=20 > And, on FreeBSD,=C2=A0 I have used VIMAGE ( which I doubt you have ) th= ough > with two vnets in two jails talking to each other or three of them with > a middle node forwarding or five of them with two clients, two security > gateways, and a forwarding node. >=20 > /bz Thanks a lot for the answers. I had a look at both suggestions: - FIBs are currently not really implemented. Theoretically it should be possible to add them. But it would be quite some effort and it would add some code that is only used for the tests but would be always active. - Regarding VIMAGE / vnets: You are right: That part is not imported. Most likely I'll fall back to writing an example instead of an automated test. So we can still at least make sure that everything is compile-clean and it is possible to sometimes run the test manually. Best regards Christian Mauderer From owner-freebsd-hackers@freebsd.org Thu Aug 2 12:09:04 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 4E0EC10651CD; Thu, 2 Aug 2018 12:09:04 +0000 (UTC) (envelope-from timo.voelker@fh-muenster.de) Received: from mail.fh-muenster.de (mail.fh-muenster.de [212.201.120.190]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "mail.fh-muenster.de", Issuer "DFN-Verein Global Issuing CA" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id B0BD685220; Thu, 2 Aug 2018 12:09:03 +0000 (UTC) (envelope-from timo.voelker@fh-muenster.de) Received: from fhad-ex13.fhad.fh-muenster.de (unknown [10.41.11.26]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by mail.fh-muenster.de (Postfix) with ESMTPS id BB116284728; Thu, 2 Aug 2018 14:08:56 +0200 (CEST) Received: from fhad-ex13.fhad.fh-muenster.de (10.41.11.26) by fhad-ex13.fhad.fh-muenster.de (10.41.11.26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1415.2; Thu, 2 Aug 2018 14:08:56 +0200 Received: from fhad-ex13.fhad.fh-muenster.de ([fe80::d9a6:349d:aadc:72e6]) by fhad-ex13.fhad.fh-muenster.de ([fe80::d9a6:349d:aadc:72e6%5]) with mapi id 15.01.1415.002; Thu, 2 Aug 2018 14:08:56 +0200 From: =?utf-8?B?VGltbyBWw7Zsa2Vy?= To: "freebsd-hackers@freebsd.org" CC: "freebsd-current@freebsd.org" Subject: Re: Unable to UEFI boot 11.2 via pxeboot Thread-Topic: Unable to UEFI boot 11.2 via pxeboot Thread-Index: AQHUKMhMn24QMJWRqkeXKQYwbojdqqSsQBQA Date: Thu, 2 Aug 2018 12:08:56 +0000 Message-ID: <3DF39C46-977E-4D07-AF23-F0C7D5DAF2E6@fh-muenster.de> References: In-Reply-To: Accept-Language: en-US, de-DE Content-Language: en-US X-MS-Has-Attach: yes X-MS-TNEF-Correlator: x-originating-ip: [10.40.10.31] Content-Type: multipart/signed; boundary="Apple-Mail=_6E682B83-9F17-4551-B00B-26D7F1CF3F3F"; protocol="application/pkcs7-signature"; micalg=sha1 MIME-Version: 1.0 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 02 Aug 2018 12:09:04 -0000 --Apple-Mail=_6E682B83-9F17-4551-B00B-26D7F1CF3F3F Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=utf-8 It seems this issue is related to current as well. I did a quick test = and got this output, while I tried to (pxe)boot FreeBSD current (without = a USB stick plugged in) https://ibb.co/no8Fve Best regards Timo > On 31. Jul 2018, at 14:16, Timo V=C3=B6lker = wrote: >=20 > Hi, >=20 > I'm unable to boot up the amd64 11.2 via pxeboot using UEFI on a Dell = PowerEdge R430. I get this output >=20 > https://ibb.co/h5ntuT >=20 > If I press a key to interrupt reboot, I get to the OK prompt. If I = enter lsdev -v, it prints nothing more than "net devices:". The variable = currdev is not set (show currdev prints variable 'currdev' not found). I = configured pxeboot to be the one and only boot medium in BIOS setup.=20 >=20 > However, I found a workaround that works for me. If I put an (empty) = USB stick in a USB port of the PowerEdge, it successfully boots via = pxeboot (which is still the one and only configured boot medium). I then = get this output >=20 > https://ibb.co/mU8SM8 >=20 > With FreeBSD 11.1 pxeboot worked on the Dell PowerEdge R430, even = without a USB stick plugged in. I couldn't test this with FreeBSD = 12-current. Hope this helps anyway to find an open issue. >=20 > I found this thread which seems to be related. >=20 > = https://lists.freebsd.org/pipermail/freebsd-current/2018-July/070082.html >=20 > Thanks, >=20 > Timo --Apple-Mail=_6E682B83-9F17-4551-B00B-26D7F1CF3F3F Content-Disposition: attachment; filename="smime.p7s" Content-Type: application/pkcs7-signature; name="smime.p7s" Content-Transfer-Encoding: base64 MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIQsDCCBRIw ggP6oAMCAQICCQDjC9X4ryXZgTANBgkqhkiG9w0BAQsFADCBgjELMAkGA1UEBhMCREUxKzApBgNV BAoMIlQtU3lzdGVtcyBFbnRlcnByaXNlIFNlcnZpY2VzIEdtYkgxHzAdBgNVBAsMFlQtU3lzdGVt cyBUcnVzdCBDZW50ZXIxJTAjBgNVBAMMHFQtVGVsZVNlYyBHbG9iYWxSb290IENsYXNzIDIwHhcN MTYwMjIyMTMzODIyWhcNMzEwMjIyMjM1OTU5WjCBlTELMAkGA1UEBhMCREUxRTBDBgNVBAoTPFZl cmVpbiB6dXIgRm9lcmRlcnVuZyBlaW5lcyBEZXV0c2NoZW4gRm9yc2NodW5nc25ldHplcyBlLiBW LjEQMA4GA1UECxMHREZOLVBLSTEtMCsGA1UEAxMkREZOLVZlcmVpbiBDZXJ0aWZpY2F0aW9uIEF1 dGhvcml0eSAyMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAy2DX/2ahQc3S+oeXinOr mU3qZzlaoWCARxVOjJWy5c/O01dLjc74VmwVVXYH6kb9yANFYz5w1KtUgLEjnL43KKkJ/wVdGA/E mJk3syD2ZngXh8KdDsxKMucWna4OjSl5BwAgVNwVX0qW13i2NNPBdLWd6b/Ad03qvVkH4FovbDyl ANw1vWUNj38ybfJaaktiAe6sODRZRTZJBdp4ymptW8CBaxHM0jyoi/hxGso74oDdFrRneos26k6R KT2zUVytqAy+nTTj0Q0Xg3XEOR6wlAsS8dVpjiX0uD0rv8COwx47pb9VEKsqrheXXjPOyPP0CQfj AoYxRmsBxRAMEcdZ6QIDAQABo4IBdDCCAXAwDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBST49gy JtrV8UqlkUrg6kviogzP4TAfBgNVHSMEGDAWgBS/WSA2AHmgoCJrjNXyYdK4LMuCSjASBgNVHRMB Af8ECDAGAQH/AgECMDMGA1UdIAQsMCowDwYNKwYBBAGBrSGCLAEBBDANBgsrBgEEAYGtIYIsHjAI BgZngQwBAgIwTAYDVR0fBEUwQzBBoD+gPYY7aHR0cDovL3BraTAzMzYudGVsZXNlYy5kZS9ybC9U ZWxlU2VjX0dsb2JhbFJvb3RfQ2xhc3NfMi5jcmwwgYYGCCsGAQUFBwEBBHoweDAsBggrBgEFBQcw AYYgaHR0cDovL29jc3AwMzM2LnRlbGVzZWMuZGUvb2NzcHIwSAYIKwYBBQUHMAKGPGh0dHA6Ly9w a2kwMzM2LnRlbGVzZWMuZGUvY3J0L1RlbGVTZWNfR2xvYmFsUm9vdF9DbGFzc18yLmNlcjANBgkq hkiG9w0BAQsFAAOCAQEAhwv/PgKbZchWLdY7mpiLcU/auimqIflGLvWypA+uETh5OLMOdLp2XZ7o GIKWYttMM+jd+WrfMr0sTEdgVX/ndGu0LIPYeWu2t01QC2YHte2zl63q7n8w5pn9IuJyTT6EW+75 z5nqf9dSOS6smABEfmk7v3Xu0As7Gs3l9w8ibEeE9qVHoP3QGjR9rdI9d7Pu9NdN/8Po5ZJPWT6Q RxBKsIVYwG9/+K7tCEKeHtTfFC5Nj7yelMPn7fYY+DxJ5yaopzbYLN4izYuC2Nl44lUSozuHRLYR C9UMUq9pjA8G39CiU4tXmHvP/Qck9Py9w/1KkgKXG/K3ts9lihqitXIZOTCCBawwggSUoAMCAQIC BxtjutAeLD0wDQYJKoZIhvcNAQELBQAwgZUxCzAJBgNVBAYTAkRFMUUwQwYDVQQKEzxWZXJlaW4g enVyIEZvZXJkZXJ1bmcgZWluZXMgRGV1dHNjaGVuIEZvcnNjaHVuZ3NuZXR6ZXMgZS4gVi4xEDAO BgNVBAsTB0RGTi1QS0kxLTArBgNVBAMTJERGTi1WZXJlaW4gQ2VydGlmaWNhdGlvbiBBdXRob3Jp dHkgMjAeFw0xNjA1MjQxMTM4NDBaFw0zMTAyMjIyMzU5NTlaMIGNMQswCQYDVQQGEwJERTFFMEMG A1UECgw8VmVyZWluIHp1ciBGb2VyZGVydW5nIGVpbmVzIERldXRzY2hlbiBGb3JzY2h1bmdzbmV0 emVzIGUuIFYuMRAwDgYDVQQLDAdERk4tUEtJMSUwIwYDVQQDDBxERk4tVmVyZWluIEdsb2JhbCBJ c3N1aW5nIENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAnTt5HEfeH4bLxmnXEJ45 19miMNtyHAV/KV9LaPGtGdZM4WsbsQt/oavge4uL2C3Obog6EO5X5R5/BFE267pwbWOgvpYuQOHR g0xmPRxkaeWbpK1yrmg5UYd5zBfTri9dY3FLOXrrQqeXkGkFv5D/pEBwvQPnv54YiB+fmYhNDkeN SF9lmRDS2SpJ7cG5LR2fEssV0z9/HlQvOq6TV6d+eMrVSuIa5e1BfVNfyLMq9YowrO0XBSQ/tqAL B/1NGpoDUqA2nN4kh2Xk5/rHlnMkFM3Q6BtonhhZrnZ+99EKeDyHS7A3z1PKOjgQ88tHbYxkPTxa RUq6yoB8uPPnp0xMzQIDAQABo4ICBTCCAgEwEgYDVR0TAQH/BAgwBgEB/wIBATAOBgNVHQ8BAf8E BAMCAQYwKQYDVR0gBCIwIDANBgsrBgEEAYGtIYIsHjAPBg0rBgEEAYGtIYIsAQEEMB0GA1UdDgQW BBRrOpiL+fJTidrgrbIyHgkf6Ko7dDAfBgNVHSMEGDAWgBST49gyJtrV8UqlkUrg6kviogzP4TCB jwYDVR0fBIGHMIGEMECgPqA8hjpodHRwOi8vY2RwMS5wY2EuZGZuLmRlL2dsb2JhbC1yb290LWcy LWNhL3B1Yi9jcmwvY2FjcmwuY3JsMECgPqA8hjpodHRwOi8vY2RwMi5wY2EuZGZuLmRlL2dsb2Jh bC1yb290LWcyLWNhL3B1Yi9jcmwvY2FjcmwuY3JsMIHdBggrBgEFBQcBAQSB0DCBzTAzBggrBgEF BQcwAYYnaHR0cDovL29jc3AucGNhLmRmbi5kZS9PQ1NQLVNlcnZlci9PQ1NQMEoGCCsGAQUFBzAC hj5odHRwOi8vY2RwMS5wY2EuZGZuLmRlL2dsb2JhbC1yb290LWcyLWNhL3B1Yi9jYWNlcnQvY2Fj ZXJ0LmNydDBKBggrBgEFBQcwAoY+aHR0cDovL2NkcDIucGNhLmRmbi5kZS9nbG9iYWwtcm9vdC1n Mi1jYS9wdWIvY2FjZXJ0L2NhY2VydC5jcnQwDQYJKoZIhvcNAQELBQADggEBAIF4RaROpH8OVfAJ sWo+eMxoNakc85WeP/P432s4d4ksjbWtPsfylM2gBq66zKixrTMItiSGYjZMeG5Q8NVuYI1PUjFD l0Z18GLkbmZRwUIxZ1DlSec5HsufyoZI3ggU/xVLK2aboDifAM79p+vRf1ctyExf3BARlz6WBAJc hKgpOWyU/BCSBnue7thGtBu1Aww42dywqT9xBguyAwczwo1IYyUlPHp7V273igU477igri/02wfV W4QYwam4S85skBqC5Lk9+nfx0h8zAr9T53b53CYlQW8vphv6pBOQ+nx+2QtgXey/ykGgYfsRSSnY qC11FdhKGOoW71U0IhoTjQYwggXmMIIEzqADAgECAgwdgtH8FJ0VCMZ26e4wDQYJKoZIhvcNAQEL BQAwgY0xCzAJBgNVBAYTAkRFMUUwQwYDVQQKDDxWZXJlaW4genVyIEZvZXJkZXJ1bmcgZWluZXMg RGV1dHNjaGVuIEZvcnNjaHVuZ3NuZXR6ZXMgZS4gVi4xEDAOBgNVBAsMB0RGTi1QS0kxJTAjBgNV BAMMHERGTi1WZXJlaW4gR2xvYmFsIElzc3VpbmcgQ0EwHhcNMTcwNzEwMTAxODIwWhcNMjAwNzA5 MTAxODIwWjB6MQswCQYDVQQGEwJERTEgMB4GA1UECgwXRmFjaGhvY2hzY2h1bGUgTXVlbnN0ZXIx MjAwBgNVBAsMKUZhY2hiZXJlaWNoIEVsZWt0cm90ZWNobmlrIHVuZCBJbmZvcm1hdGlrMRUwEwYD VQQDDAxUaW1vIFZvZWxrZXIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC/gQYu/Hjb 3078pLzYaFpcgo/JHZHLjOLe85YFMr056WFSN/Jwdh1Asny4ZKcLzHd7vMjr3fjg8Sgo04y+lBI4 8O5FJTgixYB1oV9DU5GlWcC/6eLhpIPNraOcK4KJVlwqw7uc1L8fbyjCMrTNtYHFEy23B9NFgxbS pxhQ6FCgS6kjziTgFL6s072+j6MMJi1RdZZUNZGq52gCyIKNAxMt2b42/Kk7PTWYCSA8HzxrLsQe YxmxoxLoGTlnZxuC8WKU+1V1pUiS+Ns3krHHBHIeeogR/JeILBX0OheqStUnnEABcsWj+4uGYxvP RdZXBXm8wKjcRcnJDrKizS4G6j27AgMBAAGjggJWMIICUjBABgNVHSAEOTA3MBEGDysGAQQBga0h giwBAQQDBTARBg8rBgEEAYGtIYIsAgEEAwEwDwYNKwYBBAGBrSGCLAEBBDAJBgNVHRMEAjAAMA4G A1UdDwEB/wQEAwIF4DAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwQwHQYDVR0OBBYEFOOJ r1RvTOvocygvlHm6xGfZS5dNMB8GA1UdIwQYMBaAFGs6mIv58lOJ2uCtsjIeCR/oqjt0MCYGA1Ud EQQfMB2BG3RpbW8udm9lbGtlckBmaC1tdWVuc3Rlci5kZTCBjQYDVR0fBIGFMIGCMD+gPaA7hjlo dHRwOi8vY2RwMS5wY2EuZGZuLmRlL2Rmbi1jYS1nbG9iYWwtZzIvcHViL2NybC9jYWNybC5jcmww P6A9oDuGOWh0dHA6Ly9jZHAyLnBjYS5kZm4uZGUvZGZuLWNhLWdsb2JhbC1nMi9wdWIvY3JsL2Nh Y3JsLmNybDCB2wYIKwYBBQUHAQEEgc4wgcswMwYIKwYBBQUHMAGGJ2h0dHA6Ly9vY3NwLnBjYS5k Zm4uZGUvT0NTUC1TZXJ2ZXIvT0NTUDBJBggrBgEFBQcwAoY9aHR0cDovL2NkcDEucGNhLmRmbi5k ZS9kZm4tY2EtZ2xvYmFsLWcyL3B1Yi9jYWNlcnQvY2FjZXJ0LmNydDBJBggrBgEFBQcwAoY9aHR0 cDovL2NkcDIucGNhLmRmbi5kZS9kZm4tY2EtZ2xvYmFsLWcyL3B1Yi9jYWNlcnQvY2FjZXJ0LmNy dDANBgkqhkiG9w0BAQsFAAOCAQEAGEYW34tG4ACeQk3vN6TBr9HRRE4Rc3tJoh5odaAx4UDnO6B7 EsTOSyZmJ5jdY6ui8ns9jiwwv6yZsuhopqSatS06aSlXoJ7GWBeTS9FbDu4Fa3+Hmfo+UiqG0cul MLOfKasuZx8bsoOq1kR7WdABUL3m7FuLhIVEeuJ39yQSiWxwJ4jZ5Cx0evaXIcGDIXOE9e+GcXz2 mm1yfFxITLHt5q37phfTDLH4IOgWt9GORlDBoatSu56QwfRGwhVYmkTRrUFss3QuQ/z3SwOt30Lj MNdVk6OkQBNj9QBH5PSH/Ok/JIQODVotZWG7HQ8/8nyzYTH0ccW/1HIrCwvKicZJcTGCA40wggOJ AgEBMIGeMIGNMQswCQYDVQQGEwJERTFFMEMGA1UECgw8VmVyZWluIHp1ciBGb2VyZGVydW5nIGVp bmVzIERldXRzY2hlbiBGb3JzY2h1bmdzbmV0emVzIGUuIFYuMRAwDgYDVQQLDAdERk4tUEtJMSUw IwYDVQQDDBxERk4tVmVyZWluIEdsb2JhbCBJc3N1aW5nIENBAgwdgtH8FJ0VCMZ26e4wCQYFKw4D AhoFAKCCAcMwGAYJKoZIhvcNAQkDMQsGCSqGSIb3DQEHATAcBgkqhkiG9w0BCQUxDxcNMTgwODAy MTIwODU2WjAjBgkqhkiG9w0BCQQxFgQU9e+r2f2XGo5yyPugFhOw/xVLpjswga8GCSsGAQQBgjcQ BDGBoTCBnjCBjTELMAkGA1UEBhMCREUxRTBDBgNVBAoMPFZlcmVpbiB6dXIgRm9lcmRlcnVuZyBl aW5lcyBEZXV0c2NoZW4gRm9yc2NodW5nc25ldHplcyBlLiBWLjEQMA4GA1UECwwHREZOLVBLSTEl MCMGA1UEAwwcREZOLVZlcmVpbiBHbG9iYWwgSXNzdWluZyBDQQIMHYLR/BSdFQjGdunuMIGxBgsq hkiG9w0BCRACCzGBoaCBnjCBjTELMAkGA1UEBhMCREUxRTBDBgNVBAoMPFZlcmVpbiB6dXIgRm9l cmRlcnVuZyBlaW5lcyBEZXV0c2NoZW4gRm9yc2NodW5nc25ldHplcyBlLiBWLjEQMA4GA1UECwwH REZOLVBLSTElMCMGA1UEAwwcREZOLVZlcmVpbiBHbG9iYWwgSXNzdWluZyBDQQIMHYLR/BSdFQjG dunuMA0GCSqGSIb3DQEBAQUABIIBABtxJHo2eGNIFwL4hLSURisTLgQzx3F41Ppo3guu27ChflH1 INVTMg4/yGUJ754BKzWgHc42cW5TDhki0EcMaKaqfTjGXVYctjS2OpCNwhMq6YRSKmFsT81U+AZ0 WbPvZTh8JNLOWiU1LAxc8dMXrR8uIC32fM3rBGDghvs03T/XCgctj3LPn3MqKL4xNcg347O/8SzR zTRPppsJG8XuxQ260ZPg1HQKX85etVhhm+yP0c2sDwFIOezE6iZyBzKbqqTytu1UuJRdV8WIqv27 CBXHo5ROGV3Drj1e3GkIZO/biJqSYQ50doLjx/5JpcJ8qqbueOYtOascO12mEzn2u48AAAAAAAA= --Apple-Mail=_6E682B83-9F17-4551-B00B-26D7F1CF3F3F-- From owner-freebsd-hackers@freebsd.org Thu Aug 2 13:43:01 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 785661067D76; Thu, 2 Aug 2018 13:43:01 +0000 (UTC) (envelope-from kevans@freebsd.org) Received: from smtp.freebsd.org (smtp.freebsd.org [IPv6:2610:1c1:1:606c::24b:4]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "smtp.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 2777A89837; Thu, 2 Aug 2018 13:43:01 +0000 (UTC) (envelope-from kevans@freebsd.org) Received: from mail-lj1-f178.google.com (mail-lj1-f178.google.com [209.85.208.178]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G3" (verified OK)) (Authenticated sender: kevans) by smtp.freebsd.org (Postfix) with ESMTPSA id B38AB261AE; Thu, 2 Aug 2018 13:43:00 +0000 (UTC) (envelope-from kevans@freebsd.org) Received: by mail-lj1-f178.google.com with SMTP id s12-v6so2001221ljj.0; Thu, 02 Aug 2018 06:43:00 -0700 (PDT) X-Gm-Message-State: AOUpUlG76ltkE7qCM2DoeWfaKGukaXASbk4au4mZ3JrpEer6FJKPiqlr zymqwevmzUPwYDlAvEjRj3OT7+IuXfPUUp5rEgI= X-Google-Smtp-Source: AAOMgpf6CzCqCRla5wsUSvBrDs8Bxyl/uOmvgQgnxqtbdCoDA//vWKJBuOxb7A7mIZmd6AhNz7s//1hwPok1RDZAeMo= X-Received: by 2002:a2e:8617:: with SMTP id a23-v6mr2418818lji.43.1533217379231; Thu, 02 Aug 2018 06:42:59 -0700 (PDT) MIME-Version: 1.0 Received: by 2002:a2e:5742:0:0:0:0:0 with HTTP; Thu, 2 Aug 2018 06:42:38 -0700 (PDT) In-Reply-To: References: <3DF39C46-977E-4D07-AF23-F0C7D5DAF2E6@fh-muenster.de> <9A67D337-ADC9-4B19-A44D-6C08135861D3@me.com> From: Kyle Evans Date: Thu, 2 Aug 2018 08:42:38 -0500 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: Unable to UEFI boot 11.2 via pxeboot To: Toomas Soome Cc: =?UTF-8?B?VGltbyBWw7Zsa2Vy?= , "freebsd-hackers@freebsd.org" , "freebsd-current@freebsd.org" Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 02 Aug 2018 13:43:01 -0000 On Thu, Aug 2, 2018 at 7:45 AM, Toomas Soome wrote: >> On 2 Aug 2018, at 15:32, Toomas Soome wrote: >> >> >> >>> On 2 Aug 2018, at 15:08, Timo V=C3=B6lker > wrote: >>> >>> It seems this issue is related to current as well. I did a quick test a= nd got this output, while I tried to (pxe)boot FreeBSD current (without a U= SB stick plugged in) >>> >>> https://ibb.co/no8Fve >>> >>> Best regards >>> >>> Timo >> >> the hint is about efipart_inithandles() returning 2, thats errno code fo= r ENOENT. congratz, you have hit the corner case:D >> >> Since efinet_dev is part of devsw, we can not skip the devswitch init wi= th such error, we still need to walk the list. Let me see if I can provide = quick fix. >> >> rgds, >> toomas >> > > Could you check the current with https://svnweb.freebsd.org/changeset/bas= e/337131 > > thanks, > toomas > Hmm... that's less than great. Is this worth an MFC + 11.2 EN? I'd suspect it's not an entirely common case at all, but loader.efi is highly visible and actually updated in stable/11 (vs. soon-to-be thrown on ESP in head. Thanks, Kyle Evans From owner-freebsd-hackers@freebsd.org Thu Aug 2 12:45:35 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 88D9D10669B9; Thu, 2 Aug 2018 12:45:35 +0000 (UTC) (envelope-from tsoome@me.com) Received: from st13p35im-asmtp001.me.com (st13p35im-asmtp001.me.com [17.164.199.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 33F5587437; Thu, 2 Aug 2018 12:45:35 +0000 (UTC) (envelope-from tsoome@me.com) Received: from process-dkim-sign-daemon.st13p35im-asmtp001.me.com by st13p35im-asmtp001.me.com (Oracle Communications Messaging Server 8.0.2.2.20180531 64bit (built May 31 2018)) id <0PCU0060032O6J00@st13p35im-asmtp001.me.com>; Thu, 02 Aug 2018 12:45:11 +0000 (GMT) Received: from icloud.com ([127.0.0.1]) by st13p35im-asmtp001.me.com (Oracle Communications Messaging Server 8.0.2.2.20180531 64bit (built May 31 2018)) with ESMTPSA id <0PCU00H713F8F550@st13p35im-asmtp001.me.com>; Thu, 02 Aug 2018 12:45:11 +0000 (GMT) X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-08-02_03:,, signatures=0 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 clxscore=1015 suspectscore=27 malwarescore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1707230000 definitions=main-1808020133 From: Toomas Soome Message-id: MIME-version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\)) Subject: Re: Unable to UEFI boot 11.2 via pxeboot Date: Thu, 02 Aug 2018 15:45:07 +0300 In-reply-to: <9A67D337-ADC9-4B19-A44D-6C08135861D3@me.com> Cc: "freebsd-hackers@freebsd.org" , "freebsd-current@freebsd.org" To: =?utf-8?Q?Timo_V=C3=B6lker?= References: <3DF39C46-977E-4D07-AF23-F0C7D5DAF2E6@fh-muenster.de> <9A67D337-ADC9-4B19-A44D-6C08135861D3@me.com> X-Mailer: Apple Mail (2.3445.9.1) X-Mailman-Approved-At: Thu, 02 Aug 2018 13:52:40 +0000 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.27 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 02 Aug 2018 12:45:35 -0000 Could you check the current with = https://svnweb.freebsd.org/changeset/base/337131 = thanks, toomas > On 2 Aug 2018, at 15:32, Toomas Soome wrote: >=20 >=20 >=20 >> On 2 Aug 2018, at 15:08, Timo V=C3=B6lker = > = wrote: >>=20 >> It seems this issue is related to current as well. I did a quick test = and got this output, while I tried to (pxe)boot FreeBSD current (without = a USB stick plugged in) >>=20 >> https://ibb.co/no8Fve >>=20 >> Best regards >>=20 >> Timo >=20 > the hint is about efipart_inithandles() returning 2, thats errno code = for ENOENT. congratz, you have hit the corner case:D >=20 > Since efinet_dev is part of devsw, we can not skip the devswitch init = with such error, we still need to walk the list. Let me see if I can = provide quick fix. >=20 > rgds, > toomas >=20 >=20 >>=20 >>> On 31. Jul 2018, at 14:16, Timo V=C3=B6lker = > = wrote: >>>=20 >>> Hi, >>>=20 >>> I'm unable to boot up the amd64 11.2 via pxeboot using UEFI on a = Dell PowerEdge R430. I get this output >>>=20 >>> https://ibb.co/h5ntuT >>>=20 >>> If I press a key to interrupt reboot, I get to the OK prompt. If I = enter lsdev -v, it prints nothing more than "net devices:". The variable = currdev is not set (show currdev prints variable 'currdev' not found). I = configured pxeboot to be the one and only boot medium in BIOS setup.=20 >>>=20 >>> However, I found a workaround that works for me. If I put an (empty) = USB stick in a USB port of the PowerEdge, it successfully boots via = pxeboot (which is still the one and only configured boot medium). I then = get this output >>>=20 >>> https://ibb.co/mU8SM8 >>>=20 >>> With FreeBSD 11.1 pxeboot worked on the Dell PowerEdge R430, even = without a USB stick plugged in. I couldn't test this with FreeBSD = 12-current. Hope this helps anyway to find an open issue. >>>=20 >>> I found this thread which seems to be related. >>>=20 >>> = https://lists.freebsd.org/pipermail/freebsd-current/2018-July/070082.html >>>=20 >>> Thanks, >>>=20 >>> Timo >>=20 >=20 From owner-freebsd-hackers@freebsd.org Thu Aug 2 13:32:33 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id E71B510679F1; Thu, 2 Aug 2018 13:32:32 +0000 (UTC) (envelope-from tsoome@me.com) Received: from st13p35im-asmtp002.me.com (st13p35im-asmtp002.me.com [17.164.199.65]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 89CC98934D; Thu, 2 Aug 2018 13:32:32 +0000 (UTC) (envelope-from tsoome@me.com) Received: from process-dkim-sign-daemon.st13p35im-asmtp002.me.com by st13p35im-asmtp002.me.com (Oracle Communications Messaging Server 8.0.2.2.20180531 64bit (built May 31 2018)) id <0PCU00A00287NZ00@st13p35im-asmtp002.me.com>; Thu, 02 Aug 2018 12:32:06 +0000 (GMT) Received: from icloud.com ([127.0.0.1]) by st13p35im-asmtp002.me.com (Oracle Communications Messaging Server 8.0.2.2.20180531 64bit (built May 31 2018)) with ESMTPSA id <0PCU001A12TFKS10@st13p35im-asmtp002.me.com>; Thu, 02 Aug 2018 12:32:06 +0000 (GMT) X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-08-02_03:,, signatures=0 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 clxscore=1011 suspectscore=27 malwarescore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1707230000 definitions=main-1808020131 From: Toomas Soome Message-id: <9A67D337-ADC9-4B19-A44D-6C08135861D3@me.com> MIME-version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\)) Subject: Re: Unable to UEFI boot 11.2 via pxeboot Date: Thu, 02 Aug 2018 15:32:02 +0300 In-reply-to: <3DF39C46-977E-4D07-AF23-F0C7D5DAF2E6@fh-muenster.de> Cc: "freebsd-hackers@freebsd.org" , "freebsd-current@freebsd.org" To: =?utf-8?Q?Timo_V=C3=B6lker?= References: <3DF39C46-977E-4D07-AF23-F0C7D5DAF2E6@fh-muenster.de> X-Mailer: Apple Mail (2.3445.9.1) X-Mailman-Approved-At: Thu, 02 Aug 2018 14:04:49 +0000 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.27 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 02 Aug 2018 13:32:33 -0000 > On 2 Aug 2018, at 15:08, Timo V=C3=B6lker = wrote: >=20 > It seems this issue is related to current as well. I did a quick test = and got this output, while I tried to (pxe)boot FreeBSD current (without = a USB stick plugged in) >=20 > https://ibb.co/no8Fve >=20 > Best regards >=20 > Timo the hint is about efipart_inithandles() returning 2, thats errno code = for ENOENT. congratz, you have hit the corner case:D Since efinet_dev is part of devsw, we can not skip the devswitch init = with such error, we still need to walk the list. Let me see if I can = provide quick fix. rgds, toomas >=20 >> On 31. Jul 2018, at 14:16, Timo V=C3=B6lker = wrote: >>=20 >> Hi, >>=20 >> I'm unable to boot up the amd64 11.2 via pxeboot using UEFI on a Dell = PowerEdge R430. I get this output >>=20 >> https://ibb.co/h5ntuT >>=20 >> If I press a key to interrupt reboot, I get to the OK prompt. If I = enter lsdev -v, it prints nothing more than "net devices:". The variable = currdev is not set (show currdev prints variable 'currdev' not found). I = configured pxeboot to be the one and only boot medium in BIOS setup.=20 >>=20 >> However, I found a workaround that works for me. If I put an (empty) = USB stick in a USB port of the PowerEdge, it successfully boots via = pxeboot (which is still the one and only configured boot medium). I then = get this output >>=20 >> https://ibb.co/mU8SM8 >>=20 >> With FreeBSD 11.1 pxeboot worked on the Dell PowerEdge R430, even = without a USB stick plugged in. I couldn't test this with FreeBSD = 12-current. Hope this helps anyway to find an open issue. >>=20 >> I found this thread which seems to be related. >>=20 >> = https://lists.freebsd.org/pipermail/freebsd-current/2018-July/070082.html >>=20 >> Thanks, >>=20 >> Timo >=20 From owner-freebsd-hackers@freebsd.org Thu Aug 2 15:17:18 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 0C12F106A01E for ; Thu, 2 Aug 2018 15:17:18 +0000 (UTC) (envelope-from eric@metricspace.net) Received: from mail.metricspace.net (static-98-116-200-172.nycmny.fios.verizon.net [98.116.200.172]) by mx1.freebsd.org (Postfix) with ESMTP id B250D8CD10 for ; Thu, 2 Aug 2018 15:17:17 +0000 (UTC) (envelope-from eric@metricspace.net) Received: from [192.168.43.57] (mobile-166-171-184-77.mycingular.net [166.171.184.77]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) (Authenticated sender: eric) by mail.metricspace.net (Postfix) with ESMTPSA id 978135FCA for ; Thu, 2 Aug 2018 15:17:10 +0000 (UTC) To: freebsd-hackers@freebsd.org From: Eric McCorkle Subject: A few build system questions Openpgp: preference=signencrypt Autocrypt: addr=eric@metricspace.net; prefer-encrypt=mutual; keydata= mDMEWue2FBYJKwYBBAHaRw8BAQdAP/qVPlXodV6pYO5b1Jw0eFyMhyDD7B5y5eFsciutEfS0 JEVyaWMgTWNDb3JrbGUgPGVyaWNAbWV0cmljc3BhY2UubmV0PoiWBBMWCAA+FiEEDxi/0rkj zd6Uc6cFCN/CKRbBwmwFAlrnthQCGwMFCQHhM4AFCwkIBwIGFQoJCAsCBBYCAwECHgECF4AA CgkQCN/CKRbBwmyGKAD/XTSBOItCKcYCPTlsaS1aQYVEwWXXFgdjWE+WsNdZUS8A/AhYAbQZ kNZNimE2rQLoklkfTA74qF/V257NuQi4QDcLuDgEWue2FBIKKwYBBAGXVQEFAQEHQKpZVyCG ync/xqejm2C1HKGXLJTUu38RvnrR3UYECz9nAwEIB4h+BBgWCAAmFiEEDxi/0rkjzd6Uc6cF CN/CKRbBwmwFAlrnthQCGwwFCQHhM4AACgkQCN/CKRbBwmyi2wEAmvaGt8QMjGELzm27gP4c jJGUi7oigsLmTiFPkpJqPz0A+QFBSCvxJaxCMyoVru/xB6bunpJ+Wtsj8HD1EuJOn4EJ Message-ID: Date: Thu, 2 Aug 2018 11:17:06 -0400 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:52.0) Gecko/20100101 Thunderbird/52.9.0 MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="zO67tjHzJp5CWgF4wa1SK9BCgUbGQeGCw" X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 02 Aug 2018 15:17:18 -0000 This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --zO67tjHzJp5CWgF4wa1SK9BCgUbGQeGCw Content-Type: multipart/mixed; boundary="5hDHdUhoE0hufgw29YmlCoCm97Opiprhp"; protected-headers="v1" From: Eric McCorkle To: freebsd-hackers@freebsd.org Message-ID: Subject: A few build system questions --5hDHdUhoE0hufgw29YmlCoCm97Opiprhp Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: quoted-printable Hi, I have a few questions about how to accomplish some things with the build system. First, I want to create some libraries that exist only as static archives, meaning no shared object (ex. libsomething.a, but no libsomething.so) Second, how do I arrange to have sources be generated prior to the build? I can probably get away with having a shell script that does it, but I may require a tool to be built. Third, how would I go about creating a kind of derived library- that is, one created by invoking a whole bunch of linker/objcopy/etc commands on some other library? That is to say, "I want to get libsomething.a by running this script that processes libsomethingelse.a". Thanks, Eric --5hDHdUhoE0hufgw29YmlCoCm97Opiprhp-- --zO67tjHzJp5CWgF4wa1SK9BCgUbGQeGCw Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- iHUEARYIAB0WIQQPGL/SuSPN3pRzpwUI38IpFsHCbAUCW2MgcgAKCRAI38IpFsHC bIE3AP49dZ0/FuQQpcrzKb6/EoRyu70jqCu+WSH09NCsct+f4wEAlze51EzwbH9H R2mjKNaqm0meprAzjVezyMQAa3IKGg8= =9TGq -----END PGP SIGNATURE----- --zO67tjHzJp5CWgF4wa1SK9BCgUbGQeGCw-- From owner-freebsd-hackers@freebsd.org Thu Aug 2 15:33:59 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 3EDD6106A5E6 for ; Thu, 2 Aug 2018 15:33:59 +0000 (UTC) (envelope-from brooks@spindle.one-eyed-alien.net) Received: from spindle.one-eyed-alien.net (spindle.one-eyed-alien.net [199.48.129.229]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id DD60A8D725 for ; Thu, 2 Aug 2018 15:33:58 +0000 (UTC) (envelope-from brooks@spindle.one-eyed-alien.net) Received: by spindle.one-eyed-alien.net (Postfix, from userid 3001) id 462715A9F17; Thu, 2 Aug 2018 15:33:57 +0000 (UTC) Date: Thu, 2 Aug 2018 15:33:57 +0000 From: Brooks Davis To: Eric McCorkle Cc: freebsd-hackers@freebsd.org Subject: Re: A few build system questions Message-ID: <20180802153357.GA25687@spindle.one-eyed-alien.net> References: MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="FCuugMFkClbJLl1L" Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.9.4 (2018-02-28) X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 02 Aug 2018 15:33:59 -0000 --FCuugMFkClbJLl1L Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Thu, Aug 02, 2018 at 11:17:06AM -0400, Eric McCorkle wrote: > Hi, >=20 > I have a few questions about how to accomplish some things with the > build system. >=20 > First, I want to create some libraries that exist only as static > archives, meaning no shared object (ex. libsomething.a, but no > libsomething.so) If it's something for use by only the base system PRIVATELIB=3D will do it (and change the name to libprivatesomethi.a). If you want to be broadly available outside the base system, NO_SHARED=3D should do it IIRC. > Second, how do I arrange to have sources be generated prior to the > build? I can probably get away with having a shell script that does it, > but I may require a tool to be built. If it's a shell script add a target for the sources. If there's a compiled tool then you need a build-tools target to build the tool in the right stage of the bootstrap process. > Third, how would I go about creating a kind of derived library- that is, > one created by invoking a whole bunch of linker/objcopy/etc commands on > some other library? That is to say, "I want to get libsomething.a by > running this script that processes libsomethingelse.a". You'll probably want to add a libsomething.a target that depends on libsomethingelse.a and the script and add libsomething.a to _LIBS in the libsomethingelse Makefile. You will also need to make certain the script has the right failure modes (e.g. doesn't create libsomething.a unless it succeeds even if it or it's children are killed with kill -9) or life will get very confusing. You'll want to get review from at least bdrewery@ and brd@ for anything non-standard. -- Brooks --FCuugMFkClbJLl1L Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQEcBAEBAgAGBQJbYyRkAAoJEKzQXbSebgfA8e0IAJ+AGiiSqnYI0Lztgy1C+QBY 30BNdUmkVnPUZn0x+HOO3GKDxFmTPhn2Zmg4C7Ugho3jpQI3ASssw0x2Fuen3VN0 C/rUxfNKu8OwkOZL73rai4slw93u47IlF+QRdfAcTvg0n+s/mrukPVLRXZRilKmh JYKQ+qb44vIOzZ1qY2HihJoPRenvdASKDBU/DrY9vhvc0pig4/AvzwSBBdKWDyfU tkZeekePYvSVZ8eyjdjXJ2HlKVKAzQR5puaSEteAkGEqfHLmZb8asmV7O1+NLQkd Mt7c8k6Ise0hSm1C4fhAWv1LltPg7l43h/b6VHdNR6GdfobK/Nxv+ba5ptNW+kA= =5QSc -----END PGP SIGNATURE----- --FCuugMFkClbJLl1L-- From owner-freebsd-hackers@freebsd.org Thu Aug 2 13:47:21 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 6490C106801E; Thu, 2 Aug 2018 13:47:21 +0000 (UTC) (envelope-from tsoome@me.com) Received: from st13p35im-asmtp002.me.com (st13p35im-asmtp002.me.com [17.164.199.65]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 10EA489B4E; Thu, 2 Aug 2018 13:47:21 +0000 (UTC) (envelope-from tsoome@me.com) Received: from process-dkim-sign-daemon.st13p35im-asmtp002.me.com by st13p35im-asmtp002.me.com (Oracle Communications Messaging Server 8.0.2.2.20180531 64bit (built May 31 2018)) id <0PCU00I0057NEL00@st13p35im-asmtp002.me.com>; Thu, 02 Aug 2018 13:47:20 +0000 (GMT) Received: from icloud.com ([127.0.0.1]) by st13p35im-asmtp002.me.com (Oracle Communications Messaging Server 8.0.2.2.20180531 64bit (built May 31 2018)) with ESMTPSA id <0PCU00L316ARFI10@st13p35im-asmtp002.me.com>; Thu, 02 Aug 2018 13:47:18 +0000 (GMT) X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-08-02_03:,, signatures=0 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 clxscore=1015 suspectscore=27 malwarescore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1707230000 definitions=main-1808020143 Content-type: text/plain; charset=utf-8 MIME-version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\)) Subject: Re: Unable to UEFI boot 11.2 via pxeboot From: Toomas Soome In-reply-to: Date: Thu, 02 Aug 2018 16:47:14 +0300 Cc: =?utf-8?Q?Timo_V=C3=B6lker?= , "freebsd-hackers@freebsd.org" , "freebsd-current@freebsd.org" Content-transfer-encoding: quoted-printable Message-id: <92E673FE-FF42-41F3-8610-CCB960805A34@me.com> References: <3DF39C46-977E-4D07-AF23-F0C7D5DAF2E6@fh-muenster.de> <9A67D337-ADC9-4B19-A44D-6C08135861D3@me.com> To: Kyle Evans X-Mailer: Apple Mail (2.3445.9.1) X-Mailman-Approved-At: Thu, 02 Aug 2018 15:59:10 +0000 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 02 Aug 2018 13:47:21 -0000 > On 2 Aug 2018, at 16:42, Kyle Evans wrote: >=20 > On Thu, Aug 2, 2018 at 7:45 AM, Toomas Soome wrote: >>> On 2 Aug 2018, at 15:32, Toomas Soome wrote: >>>=20 >>>=20 >>>=20 >>>> On 2 Aug 2018, at 15:08, Timo V=C3=B6lker = > = wrote: >>>>=20 >>>> It seems this issue is related to current as well. I did a quick = test and got this output, while I tried to (pxe)boot FreeBSD current = (without a USB stick plugged in) >>>>=20 >>>> https://ibb.co/no8Fve >>>>=20 >>>> Best regards >>>>=20 >>>> Timo >>>=20 >>> the hint is about efipart_inithandles() returning 2, thats errno = code for ENOENT. congratz, you have hit the corner case:D >>>=20 >>> Since efinet_dev is part of devsw, we can not skip the devswitch = init with such error, we still need to walk the list. Let me see if I = can provide quick fix. >>>=20 >>> rgds, >>> toomas >>>=20 >>=20 >> Could you check the current with = https://svnweb.freebsd.org/changeset/base/337131 = >>=20 >> thanks, >> toomas >>=20 >=20 > Hmm... that's less than great. Is this worth an MFC + 11.2 EN? I'd > suspect it's not an entirely common case at all, but loader.efi is > highly visible and actually updated in stable/11 (vs. soon-to-be > thrown on ESP in head. >=20 >=20 Once the fix is confirmed, I think it is worth MFC (I haven't checked 11 = source, however). I just want to be sure the provided patch will provide = complete fix. rgds, toomas From owner-freebsd-hackers@freebsd.org Thu Aug 2 16:18:09 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 75837106B888 for ; Thu, 2 Aug 2018 16:18:09 +0000 (UTC) (envelope-from eric@metricspace.net) Received: from mail.metricspace.net (mail.metricspace.net [IPv6:2001:470:1f11:617::107]) by mx1.freebsd.org (Postfix) with ESMTP id 1AA4A8F165; Thu, 2 Aug 2018 16:18:09 +0000 (UTC) (envelope-from eric@metricspace.net) Received: from [192.168.43.57] (mobile-166-171-184-77.mycingular.net [166.171.184.77]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) (Authenticated sender: eric) by mail.metricspace.net (Postfix) with ESMTPSA id 42BC65FF7; Thu, 2 Aug 2018 16:18:08 +0000 (UTC) Subject: Re: A few build system questions To: Brooks Davis Cc: freebsd-hackers@freebsd.org References: <20180802153357.GA25687@spindle.one-eyed-alien.net> From: Eric McCorkle Openpgp: preference=signencrypt Autocrypt: addr=eric@metricspace.net; prefer-encrypt=mutual; keydata= mDMEWue2FBYJKwYBBAHaRw8BAQdAP/qVPlXodV6pYO5b1Jw0eFyMhyDD7B5y5eFsciutEfS0 JEVyaWMgTWNDb3JrbGUgPGVyaWNAbWV0cmljc3BhY2UubmV0PoiWBBMWCAA+FiEEDxi/0rkj zd6Uc6cFCN/CKRbBwmwFAlrnthQCGwMFCQHhM4AFCwkIBwIGFQoJCAsCBBYCAwECHgECF4AA CgkQCN/CKRbBwmyGKAD/XTSBOItCKcYCPTlsaS1aQYVEwWXXFgdjWE+WsNdZUS8A/AhYAbQZ kNZNimE2rQLoklkfTA74qF/V257NuQi4QDcLuDgEWue2FBIKKwYBBAGXVQEFAQEHQKpZVyCG ync/xqejm2C1HKGXLJTUu38RvnrR3UYECz9nAwEIB4h+BBgWCAAmFiEEDxi/0rkjzd6Uc6cF CN/CKRbBwmwFAlrnthQCGwwFCQHhM4AACgkQCN/CKRbBwmyi2wEAmvaGt8QMjGELzm27gP4c jJGUi7oigsLmTiFPkpJqPz0A+QFBSCvxJaxCMyoVru/xB6bunpJ+Wtsj8HD1EuJOn4EJ Message-ID: <7f143985-2ebb-210a-e314-0deebd3d9f5b@metricspace.net> Date: Thu, 2 Aug 2018 12:18:03 -0400 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:52.0) Gecko/20100101 Thunderbird/52.9.0 MIME-Version: 1.0 In-Reply-To: <20180802153357.GA25687@spindle.one-eyed-alien.net> Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="VavfiRxUF8hzDGHQFiMDhrZRUo4Izb4Qy" X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 02 Aug 2018 16:18:09 -0000 This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --VavfiRxUF8hzDGHQFiMDhrZRUo4Izb4Qy Content-Type: multipart/mixed; boundary="Nh1m1HM0WYh9A65mRXKR5NDQNXVrEgBlB"; protected-headers="v1" From: Eric McCorkle To: Brooks Davis Cc: freebsd-hackers@freebsd.org Message-ID: <7f143985-2ebb-210a-e314-0deebd3d9f5b@metricspace.net> Subject: Re: A few build system questions References: <20180802153357.GA25687@spindle.one-eyed-alien.net> In-Reply-To: <20180802153357.GA25687@spindle.one-eyed-alien.net> --Nh1m1HM0WYh9A65mRXKR5NDQNXVrEgBlB Content-Type: text/plain; charset=windows-1252 Content-Language: en-US Content-Transfer-Encoding: quoted-printable On 08/02/2018 11:33, Brooks Davis wrote: > On Thu, Aug 02, 2018 at 11:17:06AM -0400, Eric McCorkle wrote: >> Hi, >> >> I have a few questions about how to accomplish some things with the >> build system. >> >> First, I want to create some libraries that exist only as static >> archives, meaning no shared object (ex. libsomething.a, but no >> libsomething.so) >=20 > If it's something for use by only the base system PRIVATELIB=3D will > do it (and change the name to libprivatesomethi.a). If you want to be > broadly available outside the base system, NO_SHARED=3D should do it II= RC. If loader and kernel are able to use private libraries, then that is probably better, actually. --Nh1m1HM0WYh9A65mRXKR5NDQNXVrEgBlB-- --VavfiRxUF8hzDGHQFiMDhrZRUo4Izb4Qy Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- iHUEARYIAB0WIQQPGL/SuSPN3pRzpwUI38IpFsHCbAUCW2MuvAAKCRAI38IpFsHC bACOAP4/NzeMFkFQpbE85j+oyDadD456ujcR6eeQPnjWrjN9BgD/VHen+ol0oH1R aElMTdDAIPv6LE/5oBEJCa0fmhcw0wo= =hspc -----END PGP SIGNATURE----- --VavfiRxUF8hzDGHQFiMDhrZRUo4Izb4Qy-- From owner-freebsd-hackers@freebsd.org Thu Aug 2 16:31:04 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 640B5106BDA1 for ; Thu, 2 Aug 2018 16:31:04 +0000 (UTC) (envelope-from sjg@juniper.net) Received: from mx0b-00273201.pphosted.com (mx0a-00273201.pphosted.com [208.84.65.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "*.pphosted.com", Issuer "thawte SHA256 SSL CA" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id B9FFA8F9EB for ; Thu, 2 Aug 2018 16:31:03 +0000 (UTC) (envelope-from sjg@juniper.net) Received: from pps.filterd (m0108157.ppops.net [127.0.0.1]) by mx0a-00273201.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w72GNouG031726; Thu, 2 Aug 2018 09:31:02 -0700 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=to : cc : subject : in-reply-to : references : from : mime-version : content-type : content-id : date : message-id; s=PPS1017; bh=k3E8gS1SiDI6sdBf78yrTAUxXCZvDyEN6PrjYjZrS7w=; b=pzFZ6XvtaxZxxMySNDOFSl1aV16Vm/NW6mdjEOO3Jgrlmse/MGTwYYKKPP1iOfX7hW8j 7q/+PIjcidpS+miJeK4zfdgMGTzAZ3BUdCl/+7lm/AY6F4fD3a3yVOz4tyJ0gsEt0wBy d+HjO7GhieZbtg3fVr/PfhC/wSif5wE8JZUqyBo+r7ezE/1BO/+qPuYcL6vILBeCXo1b 3muyODo3mMlzJ0ImSenhLNTNH8UJgu7oYqwZm4DILWxfIdbriWJZktLV19dC+/5SWUOk 3+QhuiCpsPe4hYMRLf5DXcUHQbaBr51PqnldCdVAsIj6uCMkzwlq6ngD8wwXy7IBwgwc Gg== Received: from nam05-by2-obe.outbound.protection.outlook.com (mail-by2nam05lp0248.outbound.protection.outlook.com [216.32.181.248]) by mx0a-00273201.pphosted.com with ESMTP id 2km54jg23f-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Thu, 02 Aug 2018 09:31:02 -0700 Received: from SN1PR05CA0026.namprd05.prod.outlook.com (2a01:111:e400:5197::36) by CY1PR05MB2316.namprd05.prod.outlook.com (2a01:111:e400:c5b0::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1038.10; Thu, 2 Aug 2018 16:31:00 +0000 Received: from CO1NAM05FT021.eop-nam05.prod.protection.outlook.com (2a01:111:f400:7e50::202) by SN1PR05CA0026.outlook.office365.com (2a01:111:e400:5197::36) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.1017.8 via Frontend Transport; Thu, 2 Aug 2018 16:30:59 +0000 Received-SPF: SoftFail (protection.outlook.com: domain of transitioning juniper.net discourages use of 66.129.242.13 as permitted sender) Received: from P-EXFEND-EQX-02.jnpr.net (66.129.242.13) by CO1NAM05FT021.mail.protection.outlook.com (10.152.96.129) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P384) id 15.20.1038.3 via Frontend Transport; Thu, 2 Aug 2018 16:30:58 +0000 Received: from P-EXFEND-EQX-02.jnpr.net (10.104.8.55) by P-EXFEND-EQX-02.jnpr.net (10.104.8.55) with Microsoft SMTP Server (TLS) id 15.0.847.32; Thu, 2 Aug 2018 09:30:57 -0700 Received: from p-emfe01a-sac.jnpr.net (172.24.192.34) by P-EXFEND-EQX-02.jnpr.net (10.104.8.55) with Microsoft SMTP Server (TLS) id 15.0.847.32 via Frontend Transport; Thu, 2 Aug 2018 09:30:57 -0700 Received: from p-mailhub01.juniper.net (10.47.226.20) by p-emfe01a-sac.jnpr.net (172.24.192.21) with Microsoft SMTP Server (TLS) id 14.3.123.3; Thu, 2 Aug 2018 09:30:57 -0700 Received: from kaos.jnpr.net (kaos.jnpr.net [172.23.50.162]) by p-mailhub01.juniper.net (8.14.4/8.11.3) with ESMTP id w72GUu7L008960; Thu, 2 Aug 2018 09:30:56 -0700 (envelope-from sjg@juniper.net) Received: by kaos.jnpr.net (Postfix, from userid 1377) id BE0E513008; Thu, 2 Aug 2018 09:30:56 -0700 (PDT) Received: from kaos.jnpr.net (localhost [127.0.0.1]) by kaos.jnpr.net (Postfix) with ESMTP id BDA0A13007; Thu, 2 Aug 2018 09:30:56 -0700 (PDT) To: Eric McCorkle CC: , Subject: Re: A few build system questions In-Reply-To: References: Comments: In-reply-to: Eric McCorkle message dated "Thu, 02 Aug 2018 11:17:06 -0400." From: "Simon J. Gerraty" X-Mailer: MH-E 8.6+git; nmh 1.7.1; GNU Emacs 26.1 MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-ID: <69782.1533227456.1@kaos.jnpr.net> Date: Thu, 2 Aug 2018 09:30:56 -0700 Message-ID: <72047.1533227456@kaos.jnpr.net> X-EOPAttributedMessage: 0 X-MS-Office365-Filtering-HT: Tenant X-Forefront-Antispam-Report: CIP:66.129.242.13; IPV:CAL; SCL:-1; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10019020)(396003)(136003)(346002)(39860400002)(376002)(2980300002)(189003)(199004)(77096007)(26005)(97756001)(16586007)(11346002)(186003)(97876018)(97736004)(316002)(7696005)(69596002)(90966002)(446003)(76176011)(46406003)(336012)(53936002)(356003)(305945005)(54906003)(50466002)(126002)(7126003)(47776003)(107886003)(53416004)(76506005)(105596002)(486006)(476003)(229853002)(6266002)(50226002)(106466001)(86362001)(6246003)(26826003)(117636001)(55016002)(2906002)(478600001)(5660300001)(9686003)(8676002)(8936002)(68736007)(81166006)(2810700001)(23726003)(81156014)(6916009)(4326008)(42262002); DIR:OUT; SFP:1102; SCL:1; SRVR:CY1PR05MB2316; H:P-EXFEND-EQX-02.jnpr.net; FPR:; SPF:SoftFail; LANG:en; PTR:InfoDomainNonexistent; MX:1; A:1; X-Microsoft-Exchange-Diagnostics: 1; CO1NAM05FT021; 1:u2uSzj9jFC3RE6GAjLpQTDLn6S3l6eO27fRBTicvKRtGYEyLEYXNSvlbKZPq71udHg9NWbGLJtFh5ZroVhfl615OD/yFWIz1HxOYXMpxuxyf7xf4MuOzAb7PRJ/V6aG4 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: a5d1b760-5347-42f3-44bf-08d5f8955419 X-Microsoft-Antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989117)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(5600074)(711020)(2017052603328)(7153060); SRVR:CY1PR05MB2316; X-Microsoft-Exchange-Diagnostics: 1; CY1PR05MB2316; 3:wJps+TGLAH1VoFGUkeP0ItZuV60kw6sFjIF1SZFss2xXnC72jZ0WB6lZf0nAlXxXb3rOyJYq01icDVEPdyF/8W78xaVeH3/Z43uquFO1YBxHl8VsYtz1zo8X/JzozCQzivQSYzrsoLmwh48r42xwET43VijEa5WAMn9XqevbD7Y3jkxguZh73vECvBsXYe1LfOyzVA89Dp5ULyzbWaApFW/sXXTbfV8Wuu/CLS9m1+XZNZA5jEigiRsenuJu2aOKE7radR9zBunLBlEJH2Przc4/kjlyb3ez8tW40wJorWckQ5+BJYtPp5T46BBzt0sRffTNMh20kZXIV44j5N5c1n08Qhegp+vWUgSpo8FioiA=; 25:wGU1iKEVRSQeUX4pe8YN9hW7yHhJsaWdZK0kY3GA0MxmAq9WYBM7m8LVzJogr6e7kAeQGb9XBQ9KxMGPM04MtdEBjIvqFGYUQ7lKzvrRUdkcUhPuxaeuS3cteGHDuFJi0Nmrf0FZ2DJoBNRTY53Evx8CjAnOSIzi2hA62q0Hc2+BRIXupJ+d9Bc90MB0wKhnMMJoYiyU84M53z+L922AnTS3zLiyaghA8OeB8xr1Z0scjJ6Guq55e3MGXdU6RgIUvGPbwGl6MWcn1127fAFubtuMO4UKezZMZx3oxRJAVNg5umMLnPSfj1lrGgoLUQaNZO5axzFEKFHjpD4Fo220MQ== X-MS-TrafficTypeDiagnostic: CY1PR05MB2316: X-Microsoft-Exchange-Diagnostics: 1; CY1PR05MB2316; 31:WgOA37f+XXDc8g7NjGhNANE7EpwNHFbybs4zPbjXpSY1O9RYIOFq6vAsOpSwc2SG6YYXIUik1ZhzQVhzuQWpRYmqs7PMzGO4Q/2oyiXR3UdvJdbGNAwRAwTVQV+KaZkuXvJgDgKNxZf4Vv8x+I0qfhUYlWWOv0eKo6weiWbrDZL2xRwEwkdUWtklg2i2Y6y8Vb6GxQ3iRQbbQhSnQRW6bOcv/33fExacgPPqIyrUsDQ=; 20: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 X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:; X-MS-Exchange-SenderADCheck: 1 X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(93006095)(93003095)(3002001)(10201501046)(3231311)(944501410)(52105095)(6055026)(149027)(150027)(6041310)(20161123560045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123564045)(20161123562045)(20161123558120)(6072148)(201708071742011)(7699016); SRVR:CY1PR05MB2316; BCL:0; PCL:0; RULEID:; SRVR:CY1PR05MB2316; X-Microsoft-Exchange-Diagnostics: 1; CY1PR05MB2316; 4:HvRVZFNI6fKHuRLz1OC5IDPfh4lhnzgKKFCgoiD5YPBkOBzik/6EDUGH8DcWIz5J6iHUqQea57TTzlKBn5PskFWggwkaun6vJB5zYxzPfUk8+uLXE8B7MNjrl9Pondj4nLkPp2DHFqVd6Mc6nIrCRmBY9sXLDraJnODbStFxrPc9Pegx/Cb5Td05Y/Yw+FXjfjKHxPkUN5jR23ELjMEpZ0O6++ZVcX1sklZGNvfgx/WxbKqWXJJhDMVEi3W/OCY8U80Rgl56XxOJV7uCKhD/jg== X-Forefront-PRVS: 07521929C1 X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; CY1PR05MB2316; 23:QSuRD5rs+5W37wkn3hKGey03XjcE8igHilH5OjJpw?= =?us-ascii?Q?TEsSr5O+MIZ3WHGg1PAgy4V+L4Y78ptVvytEGB++2u/o6t64mN8KS1peRhgU?= =?us-ascii?Q?0wPXnlnNbT6JHT1hOYKQ2gP//nmPvxDrggkxiSNfdjxnAXA7YwSVqjKaJSpI?= =?us-ascii?Q?LfqUNrZcBYMsPaN5/N/G8asplAatJ2T/FE95ksjZuN8j4kChoc2FRfuzQNIs?= =?us-ascii?Q?BFpmMMo09Sy8n+h6RFi2b70SBLEirQN5UG9mBIycQC5cRKWJFhmmc/zTK7PE?= =?us-ascii?Q?zS2TZkx9fKs4pj6DS2ilFZAvC4pwh2G9AF8Z+Yau337mHK/1TW9RjGocFNIJ?= =?us-ascii?Q?u6NCELeBr6OeL0PBoqo4o+i76+nn44F3BF8laLNFNVVutulSfWXyzOb+NOjX?= =?us-ascii?Q?TKKDB6DfKP5ZvSela5SFnEtfpSo5XVtgowtyzBDZjNKI/xRimnAguVCRQwfu?= =?us-ascii?Q?087MbQBXCd2WPCd9/3YoliXvThVM52L6xUkMU+p6MxrJ8j1RcIwS1RpPlj8E?= =?us-ascii?Q?EckZszVK6fDaduFMO4CabuO+XHLX2/ny4v7Jqr9NvehLz8rebaDS9DKj5nLY?= =?us-ascii?Q?OsN4lkolKsfJapKbXvLYQUw6BgWcQo+9qeTUEJno0G7NGfnY8gdCuitt71FH?= =?us-ascii?Q?056pBCXQbRlQ9miuU82+IJ02Z1MVIuQuuhhpEuJYa4CtF0qeNMLCmg5h4SvW?= =?us-ascii?Q?jvp8Sv44PIIfVH3NbYm4dPVoMawygsTzSTi0xYBep5L4/NwuX0VDaM7V+fkM?= =?us-ascii?Q?ka6LbkU5tMpPfi49vzft8dFKb5s7HRycH+XmYoJj7uG51vpJetEZv3scbJ0t?= =?us-ascii?Q?yzFwA5mDYWlVDUP0MnhgBQulROrLWPweqg5zXUEpH0noKdpASQKrK7WhXGdu?= =?us-ascii?Q?a3F0M8L6Y9/vglT1pSoRjGxeuZU/SqltKxD51Ea8izQgbjc9xDENI2nAFj/T?= =?us-ascii?Q?/bPzddxsr6uwVfixAcaxNyB3+F8iHJwhtdh2CKX4yaO8hm1V/85hi0m+Oqrm?= =?us-ascii?Q?22ZgYC2q1z9ORI6sjUCOoHiBxccbkN80YrWKVQce9E/uWJbd9amuEHWVvf5u?= =?us-ascii?Q?79aMi8bRQY+LBDWeJ6RsRXiyLfhFJMCUy3BOjbF/ZFMkr+kZ2YA1nKEkM99j?= =?us-ascii?Q?Z7SB++rdbJ+QZbrpzvuI1/phucYCWNaXJKPjyKyrfpWK0hFSYspoMqmP+buL?= =?us-ascii?Q?ov15vMCrDEarE+xsgXJpS9vecnAoiBAqAw7oraFPecZ/9OO9UAbqRmiEVSAM?= =?us-ascii?Q?X33jRVb0m3pqBESuAkhf1cbIHuvSI8kd7ypbmLRlkVtwZrJiCG9KTtCiwHBO?= =?us-ascii?Q?umZh52Hvvi8i1A9DZD9YTQyZBw5OtvR0rWlFszjjyQNCCq2+4eneFZeSChvG?= =?us-ascii?Q?mp0nA=3D=3D?= X-Microsoft-Antispam-Message-Info: JYoA1Gk9aMEJY4cTHBkq0l3p7v1wLbJydfU/k7mvzc5OzA2P6DfwdPIVBl8OGUq2dAHUrUIdxHSNAFeZsnM5KSnSe/kaJe+r5q/Qegzeyrn0fAYYM5bU4oVmiNKz4T/AfI/8xe7vqQJ4iRg1Vk03d7gYFqRAAgrIFpxSKDJ5g+yjkuPmP6TE78nHMkRWmDZv4waJSJH/C7RThC4EFQvLkhiivg8TQsfX6Q9U11cm5/h0uPl1sa8STjVhSCpM5xpc43Fn7Y9ehAuI+OOZKi9DHOkwyM6EQuulc7SJ+fp42VuYWUfgk5lhJw8/ntfumq9vg6LQOk2jVedctyHg1YkMwHGaS/35QeiEAv2Hx4jtQ1AVrRnk4PufOHhF6cTAXvIh3UbUjb94XWi1St+eXFS+Kw== X-Microsoft-Exchange-Diagnostics: 1; CY1PR05MB2316; 6:+ba/bPkRayzyIht/4PNhMIBM+KqY3eM3SNIALBReZILLQkbkMJFyZQDd+gR2r1e8hUGKs8dUHUO662TOhpy8UZuqKrWZKOOaBYFrF8jwkyvuex19TD1+gLG4wMKzDfpXLRCmu0AZEmawi4uAUsJGoVG+xWu1Q6/tJ8IjJMqtExuU9MWruxbzyYsyEyzAcY2Mj0RC3TxEius/C8LBjs0bEhgm0yzSGLz978dOsSq2MZ1GiZve2uSsfPAVA4zr5EVGNBvVST4kZ7SkiVHlXQqWzYxTIj/uEJ4bBKeQi04wdJ5Fd7HHH4zjFeIzei8H25zUK69tznZtLmYqgm7JqUGNpF6MQ8MKnAmTQ0VAX8XLboesC6z3IdOtsYtDH+C/woO9IBHqgc5rpEwM7XKq/GeYbSfmudy7DwWEV0f7Y5SLdms4GbOc4AvQtx6kWSiSn58xgpY97J8UFx7j7oQMRwrHxQ==; 5:kolAY9RUaknP2GJUPi/1Pwwq3njJ2OxF+LTpGiv1YaP7wEa3XUlJUJMOQKsZZj60YX614CrvvTR+xd7JWe/XRExACl8aJAv73557tSyl+mK/3/tRlMbN3eHRici2z9HzQ+4ZfbwvXlgK8SSV9Yf8n9iCidnOAVIJMcCrcZNwOPw=; 7:BuGfReWyQC7yujo1d2igIRkFftuB32mb+BoUQ58+NnZE1VZvgLIlGlhlnbAHXSjXy7RZs6hC4thKYO1A/dJTI7Rn+ue//E7a9kGE6fLZvtD6Jd/sVVPg041dtwVEzp60B9gL/H0a/c+euDsVv7veedOMx2s003v1B2RpevxFFBMfmJqx0DZ6mFlJVqzasEgbOCmcCgOa6Nht0KRTgOY2w9x2n/SBaFj25TcsRmhnptzz34WLklopZnwA30CDtwve SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-OriginatorOrg: juniper.net X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Aug 2018 16:30:58.6457 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: a5d1b760-5347-42f3-44bf-08d5f8955419 X-MS-Exchange-CrossTenant-Id: bea78b3c-4cdb-4130-854a-1d193232e5f4 X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=bea78b3c-4cdb-4130-854a-1d193232e5f4; Ip=[66.129.242.13]; Helo=[P-EXFEND-EQX-02.jnpr.net] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY1PR05MB2316 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2018-08-02_04:, , signatures=0 X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=673 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1806210000 definitions=main-1808020166 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 02 Aug 2018 16:31:04 -0000 Eric McCorkle wrote: > Second, how do I arrange to have sources be generated prior to the > build? I can probably get away with having a shell script that does it, > but I may require a tool to be built. [I think brooks answered the others.] You can use the 'beforebuild' target to trigger that. If however the src generation is non-trvial and especially if you need to build them for multiple arch, it is better to do the generation in a separate dir (eg subdir like gen/) so that it is easy to do the generation once only. Separate dirs make build orchestration simpler. From owner-freebsd-hackers@freebsd.org Thu Aug 2 17:10:20 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 0BDED106CC93 for ; Thu, 2 Aug 2018 17:10:20 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: from mail-it0-x22d.google.com (mail-it0-x22d.google.com [IPv6:2607:f8b0:4001:c0b::22d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 80487711D9 for ; Thu, 2 Aug 2018 17:10:19 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: by mail-it0-x22d.google.com with SMTP id 72-v6so4505210itw.3 for ; Thu, 02 Aug 2018 10:10:19 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bsdimp-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=6OCOK9cPAFem7vP2Y0vS7mJ7qagqDAnFmbV/32Zr9uY=; b=rhinbWRevDWUl8j0O/6AxqL0LpAcCe5vYOZSt8d+/d8zGb59wKiFxxWm9RMFR23tIX tDJ5MuHfbIxEiRL1Lt3feLWrmvcdFB+CWbbZVjSa/1q7L/NAvWkNEEwq0PQAHXEA8SRX aHGbWHYS7NuhOeMmck3/aUVg2E83UzzpybisLjRFCJxzhHJc689Z+XDtFZmp4VDULZpv kEC6GF03h6cROangwMAMPS20NEaRChSBwO3uf+6tz4PZWjo2llaHGpAOYdNmI9cea8m3 tPTaTru3bCCutre9VYk9cqkAeRV6sS/HL8nUbWsgZ7DPa5IBbYiDUvAU2unWhu5goOsS aInw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=6OCOK9cPAFem7vP2Y0vS7mJ7qagqDAnFmbV/32Zr9uY=; b=i6b2LPiEmPzkfH0oVjrNVI7IK3ZoeNRGEjHt6Je4s8vNAxf7dbJh9Ivty61st79nFa lTmeQRM5edEryfkVsPqTNTKD/kMcloux6AnP4EGdO5XgHVCKi4FoIToJUr0r1jBKAZiz qQsfvEzoVc6cWlcDB6PcSw43yckBYdAt+nMluk+o2zK7/vVIJw9+whDDQj3oA+HQ709O kVnYlIJm9b3ACjzhz+8OD+Ajfku0+VeIgU31Wki3XhB19DCXh2wQK9fn4MW/IVXxJcg6 E7XyihNqgxxq+o/GOdGhSm8HpOUgQ5YuTKljo75r63CVsepb4Xak8LUwLV37dswnBBMv Xkpg== X-Gm-Message-State: AOUpUlGamE9DJczSPOWXF/KnSLHUDEXJFHBm06OLb0syFArpa05pEMgB vDr2vgJi50Xvxg4Dyny2kPRFjPL4GnzQe5jdpmp+ZQ== X-Google-Smtp-Source: AAOMgpcVS524TWaC/aKj/AGm54WlSHnoAjzp2/j/3nyPwCqN1VVDjHOyodrjetufbj2vyhPX0abQu4cULz2Xh7DujpI= X-Received: by 2002:a24:3ec3:: with SMTP id s186-v6mr3385173its.73.1533229818781; Thu, 02 Aug 2018 10:10:18 -0700 (PDT) MIME-Version: 1.0 References: <20180802153357.GA25687@spindle.one-eyed-alien.net> <7f143985-2ebb-210a-e314-0deebd3d9f5b@metricspace.net> In-Reply-To: <7f143985-2ebb-210a-e314-0deebd3d9f5b@metricspace.net> From: Warner Losh Date: Thu, 2 Aug 2018 17:56:16 +0100 Message-ID: Subject: Re: A few build system questions To: Eric McCorkle Cc: Brooks Davis , FreeBSD Hackers Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.27 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 02 Aug 2018 17:10:20 -0000 On Thu, Aug 2, 2018, 5:19 PM Eric McCorkle wrote: > On 08/02/2018 11:33, Brooks Davis wrote: > > On Thu, Aug 02, 2018 at 11:17:06AM -0400, Eric McCorkle wrote: > >> Hi, > >> > >> I have a few questions about how to accomplish some things with the > >> build system. > >> > >> First, I want to create some libraries that exist only as static > >> archives, meaning no shared object (ex. libsomething.a, but no > >> libsomething.so) > > > > If it's something for use by only the base system PRIVATELIB= will > > do it (and change the name to libprivatesomethi.a). If you want to be > > broadly available outside the base system, NO_SHARED= should do it IIRC. > > If loader and kernel are able to use private libraries, then that is > probably better, actually. > They aren't. Src/stand depends on no objects in the system other than what is built in src/stand. What you are proposing is a non-starter. The loader Warner > From owner-freebsd-hackers@freebsd.org Thu Aug 2 17:45:36 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id D6899106DD43 for ; Thu, 2 Aug 2018 17:45:35 +0000 (UTC) (envelope-from eric@metricspace.net) Received: from mail.metricspace.net (mail.metricspace.net [IPv6:2001:470:1f11:617::107]) by mx1.freebsd.org (Postfix) with ESMTP id 6C8F5734F7; Thu, 2 Aug 2018 17:45:35 +0000 (UTC) (envelope-from eric@metricspace.net) Received: from [192.168.43.57] (mobile-166-171-184-77.mycingular.net [166.171.184.77]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) (Authenticated sender: eric) by mail.metricspace.net (Postfix) with ESMTPSA id 5FFB8604A; Thu, 2 Aug 2018 17:45:32 +0000 (UTC) Subject: Re: A few build system questions To: Warner Losh Cc: Brooks Davis , FreeBSD Hackers References: <20180802153357.GA25687@spindle.one-eyed-alien.net> <7f143985-2ebb-210a-e314-0deebd3d9f5b@metricspace.net> From: Eric McCorkle Openpgp: preference=signencrypt Autocrypt: addr=eric@metricspace.net; prefer-encrypt=mutual; keydata= mDMEWue2FBYJKwYBBAHaRw8BAQdAP/qVPlXodV6pYO5b1Jw0eFyMhyDD7B5y5eFsciutEfS0 JEVyaWMgTWNDb3JrbGUgPGVyaWNAbWV0cmljc3BhY2UubmV0PoiWBBMWCAA+FiEEDxi/0rkj zd6Uc6cFCN/CKRbBwmwFAlrnthQCGwMFCQHhM4AFCwkIBwIGFQoJCAsCBBYCAwECHgECF4AA CgkQCN/CKRbBwmyGKAD/XTSBOItCKcYCPTlsaS1aQYVEwWXXFgdjWE+WsNdZUS8A/AhYAbQZ kNZNimE2rQLoklkfTA74qF/V257NuQi4QDcLuDgEWue2FBIKKwYBBAGXVQEFAQEHQKpZVyCG ync/xqejm2C1HKGXLJTUu38RvnrR3UYECz9nAwEIB4h+BBgWCAAmFiEEDxi/0rkjzd6Uc6cF CN/CKRbBwmwFAlrnthQCGwwFCQHhM4AACgkQCN/CKRbBwmyi2wEAmvaGt8QMjGELzm27gP4c jJGUi7oigsLmTiFPkpJqPz0A+QFBSCvxJaxCMyoVru/xB6bunpJ+Wtsj8HD1EuJOn4EJ Message-ID: <7a14aee9-8205-4fc7-a7a0-a9ed2f33751d@metricspace.net> Date: Thu, 2 Aug 2018 13:45:25 -0400 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:52.0) Gecko/20100101 Thunderbird/52.9.0 MIME-Version: 1.0 In-Reply-To: Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="fvchysnIemPOLSRGZ16pHlOlfFgu5o7mp" X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 02 Aug 2018 17:45:36 -0000 This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --fvchysnIemPOLSRGZ16pHlOlfFgu5o7mp Content-Type: multipart/mixed; boundary="uz9yhhPN9gGHDwqeYOlApfCe3gMZN2doh"; protected-headers="v1" From: Eric McCorkle To: Warner Losh Cc: Brooks Davis , FreeBSD Hackers Message-ID: <7a14aee9-8205-4fc7-a7a0-a9ed2f33751d@metricspace.net> Subject: Re: A few build system questions References: <20180802153357.GA25687@spindle.one-eyed-alien.net> <7f143985-2ebb-210a-e314-0deebd3d9f5b@metricspace.net> In-Reply-To: --uz9yhhPN9gGHDwqeYOlApfCe3gMZN2doh Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: quoted-printable On 08/02/2018 12:56, Warner Losh wrote: >=20 >=20 > On Thu, Aug 2, 2018, 5:19 PM Eric McCorkle > wrote: >=20 > On 08/02/2018 11:33, Brooks Davis wrote: > > On Thu, Aug 02, 2018 at 11:17:06AM -0400, Eric McCorkle wrote: > >> Hi, > >> > >> I have a few questions about how to accomplish some things with = the > >> build system. > >> > >> First, I want to create some libraries that exist only as static= > >> archives, meaning no shared object (ex. libsomething.a, but no > >> libsomething.so) > > > > If it's something for use by only the base system PRIVATELIB=3D w= ill > > do it (and change the name to libprivatesomethi.a).=C2=A0 If you = want to be > > broadly available outside the base system, NO_SHARED=3D should do= it > IIRC. >=20 > If loader and kernel are able to use private libraries, then that i= s > probably better, actually. >=20 >=20 > They aren't.=C2=A0 Src/stand depends on no objects in the system other = than > what is built in src/stand. What you are proposing is a non-starter. Th= e > loader I think you hit "send" too soon... Basically what I'm trying to do at this point is two things. First, I want to convert some certs into C declarations and embed them into a static library, which can in turn be used to embed them into applications. This is essentially the same thing that some drivers do, where they embed the firmware binaries directly into the driver. Second, and a (somewhat) separate thing, I'm trying to see if I can get a PoC of extracting the specific primitives out of OpenSSL and using them in place of the current software crypto implementations in kernel and loader. (objcopy ought to be able to do this to a static library in theory) --uz9yhhPN9gGHDwqeYOlApfCe3gMZN2doh-- --fvchysnIemPOLSRGZ16pHlOlfFgu5o7mp Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- iHUEARYIAB0WIQQPGL/SuSPN3pRzpwUI38IpFsHCbAUCW2NDNQAKCRAI38IpFsHC bLUsAP9RqMqt3vt6X/6zF/20tJbx7hyGqZCOFKVeFAHygXuvbAEAgss7TVeKjCak PghhRR7Ok7SS+Bcq8uFWQP3h2zSipQc= =885X -----END PGP SIGNATURE----- --fvchysnIemPOLSRGZ16pHlOlfFgu5o7mp-- From owner-freebsd-hackers@freebsd.org Thu Aug 2 19:01:19 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 79C54104A943 for ; Thu, 2 Aug 2018 19:01:19 +0000 (UTC) (envelope-from sjg@juniper.net) Received: from mx0b-00273201.pphosted.com (mx0b-00273201.pphosted.com [67.231.152.164]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "*.pphosted.com", Issuer "thawte SHA256 SSL CA" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id DA8E1766E9; Thu, 2 Aug 2018 19:01:18 +0000 (UTC) (envelope-from sjg@juniper.net) Received: from pps.filterd (m0108160.ppops.net [127.0.0.1]) by mx0b-00273201.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w72IwcQ9032675; Thu, 2 Aug 2018 12:01:16 -0700 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=to : cc : subject : in-reply-to : references : from : mime-version : content-type : content-id : date : message-id; s=PPS1017; bh=k3SjkViHjKKYb1Rhe7rHpbW3hUaj6TYKCzkB+hLzAfo=; b=hcM/z5uXH1xaHwGHdWYp0y/HsFMN2VMBZWLyNnLkmZG3+kXVFnn4IWKoEWtTqXmntWic YAlH8LntUubDeBFlWl50GhlO8OYRKTaLSfHWlsboX3vd/6r5NHWp/JfC/P8D64f2BHRx TwVJJNv/Oy6vXAPSa0F/JbszmRA6uC7euhD3yD1iEc/wShiThlkcRYYSLmdK0hKk9paz gS79nTfjcEwqwI5t6iKLf7htYFBa08wQiFEVeeK8IDU46IK+R09eFIEc29fcoo5uOb8I AKHtxnA73jabUMFDdy/DHDMVGHdj7AXCdXuizQm6ERU7/2n5qiMe0MKcO59br7pdo2tB yQ== Received: from nam03-by2-obe.outbound.protection.outlook.com (mail-by2nam03lp0047.outbound.protection.outlook.com [216.32.180.47]) by mx0b-00273201.pphosted.com with ESMTP id 2km6j205yw-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Thu, 02 Aug 2018 12:01:15 -0700 Received: from BN6PR05CA0005.namprd05.prod.outlook.com (2603:10b6:405:39::18) by SN1PR05MB2317.namprd05.prod.outlook.com (2a01:111:e400:7a42::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1017.12; Thu, 2 Aug 2018 19:01:13 +0000 Received: from CO1NAM05FT024.eop-nam05.prod.protection.outlook.com (2a01:111:f400:7e50::209) by BN6PR05CA0005.outlook.office365.com (2603:10b6:405:39::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.1017.8 via Frontend Transport; Thu, 2 Aug 2018 19:01:12 +0000 Received-SPF: SoftFail (protection.outlook.com: domain of transitioning juniper.net discourages use of 66.129.242.12 as permitted sender) Received: from P-EXFEND-EQX-01.jnpr.net (66.129.242.12) by CO1NAM05FT024.mail.protection.outlook.com (10.152.96.132) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.20.1038.3 via Frontend Transport; Thu, 2 Aug 2018 19:01:12 +0000 Received: from P-EXFEND-EQX-01.jnpr.net (10.104.8.54) by P-EXFEND-EQX-01.jnpr.net (10.104.8.54) with Microsoft SMTP Server (TLS) id 15.0.1367.3; Thu, 2 Aug 2018 12:01:10 -0700 Received: from p-emfe01a-sac.jnpr.net (172.24.192.34) by P-EXFEND-EQX-01.jnpr.net (10.104.8.54) with Microsoft SMTP Server (TLS) id 15.0.1367.3 via Frontend Transport; Thu, 2 Aug 2018 12:01:10 -0700 Received: from p-mailhub01.juniper.net (10.47.226.20) by p-emfe01a-sac.jnpr.net (172.24.192.21) with Microsoft SMTP Server (TLS) id 14.3.123.3; Thu, 2 Aug 2018 12:01:10 -0700 Received: from kaos.jnpr.net (kaos.jnpr.net [172.23.50.162]) by p-mailhub01.juniper.net (8.14.4/8.11.3) with ESMTP id w72J19rG003611; Thu, 2 Aug 2018 12:01:09 -0700 (envelope-from sjg@juniper.net) Received: by kaos.jnpr.net (Postfix, from userid 1377) id 96A0B130B7; Thu, 2 Aug 2018 12:01:09 -0700 (PDT) Received: from kaos.jnpr.net (localhost [127.0.0.1]) by kaos.jnpr.net (Postfix) with ESMTP id 9611E130B6; Thu, 2 Aug 2018 12:01:09 -0700 (PDT) To: Eric McCorkle CC: Warner Losh , FreeBSD Hackers , Brooks Davis , Subject: Re: A few build system questions In-Reply-To: <7a14aee9-8205-4fc7-a7a0-a9ed2f33751d@metricspace.net> References: <20180802153357.GA25687@spindle.one-eyed-alien.net> <7f143985-2ebb-210a-e314-0deebd3d9f5b@metricspace.net> <7a14aee9-8205-4fc7-a7a0-a9ed2f33751d@metricspace.net> Comments: In-reply-to: Eric McCorkle message dated "Thu, 02 Aug 2018 13:45:25 -0400." From: "Simon J. Gerraty" X-Mailer: MH-E 8.6+git; nmh 1.7.1; GNU Emacs 26.1 MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-ID: <93882.1533236469.1@kaos.jnpr.net> Date: Thu, 2 Aug 2018 12:01:09 -0700 Message-ID: <95743.1533236469@kaos.jnpr.net> X-EOPAttributedMessage: 0 X-MS-Office365-Filtering-HT: Tenant X-Forefront-Antispam-Report: CIP:66.129.242.12; IPV:CAL; SCL:-1; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10019020)(136003)(376002)(39860400002)(396003)(346002)(2980300002)(189003)(199004)(69234005)(117636001)(316002)(476003)(186003)(7696005)(26005)(46406003)(69596002)(77096007)(478600001)(23726003)(11346002)(97756001)(76176011)(446003)(7126003)(54906003)(47776003)(486006)(336012)(356003)(8676002)(8936002)(16586007)(86362001)(126002)(68736007)(50226002)(81166006)(81156014)(76506005)(107886003)(106466001)(105596002)(4326008)(305945005)(9686003)(26826003)(5660300001)(53416004)(97876018)(6266002)(90966002)(6246003)(6916009)(2810700001)(93886005)(229853002)(55016002)(97736004)(2906002)(53936002)(50466002)(42262002); DIR:OUT; SFP:1102; SCL:1; SRVR:SN1PR05MB2317; H:P-EXFEND-EQX-01.jnpr.net; FPR:; SPF:SoftFail; LANG:en; PTR:InfoDomainNonexistent; MX:1; A:1; X-Microsoft-Exchange-Diagnostics: 1; CO1NAM05FT024; 1:6gm+KO0N2fOnFjVm5syPJset7vNM7PIBElu5l4iX4crXp6aCwd+/0gLt/4g62dfB6YFR/Rf6GFfD28NoveBVDc7+yLYVohYhSHIxHkxsav9cz2E64k40f8YeiFY293c1 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 82a03e93-1517-4154-cfb4-08d5f8aa50d0 X-Microsoft-Antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989117)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(5600074)(711020)(2017052603328)(7153060); SRVR:SN1PR05MB2317; X-Microsoft-Exchange-Diagnostics: 1; SN1PR05MB2317; 3:5mYC1fdczoecagpGjS65vII4ooaVsdBeZaAJRwsadTEi+xpFuYJ9ooFFZ4aBdr4udBw14jFcWLhGPMUeFTGI+5B8MX09KaQmPhD3NY9PuOhq7fz/rN1XzAMVnHNMzdRG2qi3yjHMd4QvUqbeGgt30Aa5gyewX1D02vms3Ug1v2Fi/HBKdc+wWKn131ZCUml6fRYw3THQz5Eiik+sEPeoJ1O6jDSfTBbOqNBV5BHN2vDw9rULtE+g+LnaJdkUQ/JN8JXbPo26BhXemhhPlIFj9J6C99Daz6Pc0IHwDbuuMd7Hj8lA65PDMe4PAxrUsRfZmQvWHXV7qvqccC0xumJgdufZvrjWC+VaXP07NCZu6Bw=; 25:9c0JZsubS1sD5eUw/IUKBpXuJFr5ruNmGJ4PW+l8brTcAwhGohXK4mSr+enZQV0bON77Ma2LaBkUTUiHRx0ummiY8IX/9YCsSbx1Czo1VG8Wr1eTJDpYw9QY8sJvhjSoFhB/KN54lCZORVhAUyWfFEJ1PrrA3QWWwIXZVYje7h/qaT3g4NV1ZpqTYUYSpvxinZnvKA9NFJGdmCGvbgJoONiUgwXBE+zv/DJHqRSdxQOY93tgcL5pxvOwoCBtTBT4gnFx32P4EjQ4+SBy9NwWyx8I/9/cGmrk56NumbTQO8SUAppJJF0KDMNV3MSiZHKPWHJcP6TY8evlUgSApp3DXg== X-MS-TrafficTypeDiagnostic: SN1PR05MB2317: X-Microsoft-Exchange-Diagnostics: 1; SN1PR05MB2317; 31:5cg7ykelOeyyQdouMbfbrV8p4cdgnDQl1ORjFMw4/Sbded4T/55mapXQJP4eL/BvUCwu6TA4CDSp7cWIGHfeHk/floRyqxxeKCHo/ags/Pp2GnH/XHrpWrl6EBNMRjVzEA7K2Qt+0fZAPKWIGiUR3Ip67UWs4o9xZTl77yJtnkWd4LTxh62WJGKKuO5xMHyIlVG4SpF5LY9Y5H0BXuAcsvJur/qkLnBSw/uBXH1wa1I=; 20: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 X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:; X-MS-Exchange-SenderADCheck: 1 X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(8121501046)(5005006)(3231311)(944501410)(52105095)(93006095)(93003095)(10201501046)(3002001)(6055026)(149027)(150027)(6041310)(20161123564045)(20161123560045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123562045)(20161123558120)(6072148)(201708071742011)(7699016); SRVR:SN1PR05MB2317; BCL:0; PCL:0; RULEID:; SRVR:SN1PR05MB2317; X-Microsoft-Exchange-Diagnostics: 1; SN1PR05MB2317; 4:vmLoO7cWjTrhGrc//4uZBAHZ5nSM9rjjw8waBVQA8TO2Hfkqi7V2AHV/MdHpM0+KCRklYDpSJcmP3oS5Fq3trD35cbfnRze08LRgacJSxEfeRpPeOFzrQ5BRMFlHBMPrUaf/5MZnkITbsPfdI2MU41GhX8SCoKWK3MPdr2cznGUPpUW6S/eAuTfmeISjxm8Rf9tMDK+uwqhhLyc/55GRd72fqE+raEQHg42f+Ytam2CeSO7sLRXWxGpIpefZUJIK0+eKMXyfTGu+IYFEgqYkcw== X-Forefront-PRVS: 07521929C1 X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; SN1PR05MB2317; 23:LODlSbU5gCihqqdjy6FaCSEf9Fh/a+hXwyewC0DzV?= =?us-ascii?Q?zwfcHOsn5wB3s5kLzT7rjG1CPVNf52/xT5HA9pqL/vzcPDcXP1HB/zQH/9Rd?= =?us-ascii?Q?8EQ5bPBca6BA2Xl+UIKeZTkVhyzgFyLWjUuHJGvWUcSGn6kljyvlNnx0vrII?= =?us-ascii?Q?xXNkHp5982NuSmMl7DQLUPME4SJGYzyo8a3Fusw9l1SySClqSxb6CmMyGT4a?= =?us-ascii?Q?HAKen7Ew0ZkiM9ElxO2/KL18OVs2eOXvA1LY7Bs2GDoVToCz9VxyN4qmxXUy?= =?us-ascii?Q?Q9spm6yCV+MNBwLQI3LFgZHq5B41/RXJdSlj3xhwFMwtoKJTQOCcZJu8HLIE?= =?us-ascii?Q?2wL5u1SYl/zYYkQD8kgXXcZFYYcLOkGXisTbp978PrZsvrX0voAuggCfnFv3?= =?us-ascii?Q?IDGcazI47NhtFG91C8muJUAVjY6sA7AvyOVQy/IFO8z6cNqvby3S1kQTPnLn?= =?us-ascii?Q?lxiNIWlb2whVtlc1n/r/+fBDZ/hD8NYcCNFtOTjpzgYslE0b9YDPEhbKZ9dn?= =?us-ascii?Q?HZHA9hk6Mcf/5HRp8kWhUraXVWUt0RCjz2gZNyf3g6zA1eOzUrTpu5umtFop?= =?us-ascii?Q?ETXGBevMon3rSmjUowkZB6anqO9HXZMT/sUt0jxA5T3mOchAE5HBmSiiLTJi?= =?us-ascii?Q?V3pixhVe73XfdZX8W5CXFMdc9pk5v1kRNNIRdRWGA7nWYq7lUN8zARlDSmHJ?= =?us-ascii?Q?Gd0qZx0w/65T2a91oG12nY8/ogXTRJFQ2iheJm3zazif3K4d1pBLvke3nd2y?= =?us-ascii?Q?lucKdHJjVRZi7Sq0oDJseMFmatLcGhxlq4zfckZOVkB6DbvG04VQs0nqgHhR?= =?us-ascii?Q?uq7V1E8bghSmoprOMQEurI90Vwpkmwi5h4NQvVTEqV6Cva5XKT5JjQWEKN67?= =?us-ascii?Q?MjHF7wWHZU039I3LCJsSavGnZVO+/2NGOdBYz30RlZppwubjz4CkZVyeILBf?= =?us-ascii?Q?YI1gnXtP0Te2V8bTO/+jQCj0tssAoiOIZkBG/zIU05G1pueLEdBmpO/IegY1?= =?us-ascii?Q?geYIlw4Z/YVdq9TEC3vghlCWYbKYHpJ8+PzbHBTauyTRpt5YP6psorCmuVFL?= =?us-ascii?Q?tGej0kCog9Hce2Ij5BHNfTZkCmeQr3Khtyj15MLBYT7PnF0uSMJ+4se+nj0o?= =?us-ascii?Q?CYiWv5E4cHKsPxYy9vxDHkb5ke5n7u3vqbz0EyDbS/jkX6hlP+/phKfEGenB?= =?us-ascii?Q?zI5vEYQyisuclRXi5OcNYfTTjO2+UrP3FAovrfwD72tTJhReNAhnhn2Sicuj?= =?us-ascii?Q?STQXvI54pscr1a1LYx4R8xV+rFCIxMeJ3Il4EZRYyTWUnysYaNsWZVs7zM51?= =?us-ascii?Q?YC6voN56Yw/AWLpM1lg7J9+MihH4GJHLdrCPg9wYb3V+4Ku98K0ifQwrrn6z?= =?us-ascii?Q?yj/mopCUemOe9Rb7GCydVnwmXLOU2kvhyhrxAEgrRIzuq3E?= X-Microsoft-Antispam-Message-Info: /mh0hWGdhepadYBic9AzNdNst66j/rBqiraQbVlBZbUaAZOFpW5U98ucg8wxswfgH4cK/D7lywILvl59vu4AkTlM0HW/IcEnvn5qKatcW2Q55SZrv2TleIaLMfsR6C9hkapauSgFMJEPWRzb07iAJ/VfNtJsMXV3Jxv6snLYpKyguOwZuYJaKk93rBVTfGGZR8sVq29Pk41Y21V7NYK6qD2izJCCu/1/ZEYNG461bOPWabV4PQ72QJeRSg+a9dObLmagnOb7TvJZdwId8TSMTMPS2mK2DygnHllxEsZ6/SKwoOUx5ztUOsZ1g+I6Fi6P9KoCBkMhIzaWuzI/vhhr7TEfp6IYgD85qJNjrVQ179fBrWF4a1tL5nS+v+MIwIlBDey/qrEUvBCK1Vxi2fF9qQ== X-Microsoft-Exchange-Diagnostics: 1; SN1PR05MB2317; 6:JkzLFawoccx94pI3PZKBaL7+wgPQlKmW7rjTTQsZVaL5pHaoFNcaM4hg13nikLwUws7auGMJ3pnna523JvYCehfCDPbPBC6w7gLVgNIsRec4XDx973VjecWbf3Wu4INdo97a44AAesMFYETU5RGFJx6LQJdqFY22nTc7MUwWwCZ3Bjwi71EMifovnxrAPAVo5U/w4G4wJggXzm3CdRpIaLihsMP5Z7IZOBOb/xlNjNRWxgpvamEAmcgRicwP8u4eG4LoFsG8cpovdJNH5bj6nMQl6LQsIp8ncEtEkavYQTOx4AkDCfQBZFTpaBtd+o2Fjt4rrinz/eeFHx2msIswu91RLXsjNRRK3bhRaJymPNu5YDluW458swYOlMFf26Gh6HVMf76OPVe2N6349jmh+FvsIIL77Fx69CP+2l1/uVe/jaIiA24vfDbeUDioRTjH5pzul9MMnbr7G4Y62RhUqA==; 5:DPY+Yw7fJAaWzLRhosALg9qwSKlwPHXq3GaXojzEUtkM0jrA/Qgtb+dCZmYohUKxSbtTuKg6gFkn0lfdz4S4LKnvvPKQ15QtZQP/gk9LaIl91/HKS1eyj9tMzicfLZ7373G4Ug1QuQuJZSznQEr7BP+GerRUwujRQiTbhR0WWuo=; 7:lshQYyDGkxitiMNF4jqfS7RSTSNhvYL0QAOAlD30wxV3/lq49ijDw5A+0j7aGeUVnz3I3AEAmOnG2pbeO9ma8OmzbByssPEXlvajbYRPkr+GNd16m/bxat5b6ETOuT8Hd59v0Iz8540os0wHZbnv9r8loXdyxADvPjPZkqy3GIZWyWn/IgjzYvQvxHrxhXCIiF0sm2itgWLFq2A/F41kreo0GOl6TboR2nYMZ4yvPc8+RcvdfxG+Epy65gjLlT1H SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-OriginatorOrg: juniper.net X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Aug 2018 19:01:12.4752 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 82a03e93-1517-4154-cfb4-08d5f8aa50d0 X-MS-Exchange-CrossTenant-Id: bea78b3c-4cdb-4130-854a-1d193232e5f4 X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=bea78b3c-4cdb-4130-854a-1d193232e5f4; Ip=[66.129.242.12]; Helo=[P-EXFEND-EQX-01.jnpr.net] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN1PR05MB2317 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2018-08-02_05:, , signatures=0 X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=827 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1807170000 definitions=main-1808020184 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 02 Aug 2018 19:01:19 -0000 Eric McCorkle wrote: > First, I want to convert some certs into C declarations and embed them > into a static library, which can in turn be used to embed them into FYI a mechanism to do this is in D16335 > Second, and a (somewhat) separate thing, I'm trying to see if I can get > a PoC of extracting the specific primitives out of OpenSSL and using > them in place of the current software crypto implementations in kernel > and loader. (objcopy ought to be able to do this to a static library in > theory) Um... ick ;-) From owner-freebsd-hackers@freebsd.org Thu Aug 2 19:04:51 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id A362C104ACA1 for ; Thu, 2 Aug 2018 19:04:51 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: from mail-it0-x22f.google.com (mail-it0-x22f.google.com [IPv6:2607:f8b0:4001:c0b::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 3424276989 for ; Thu, 2 Aug 2018 19:04:51 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: by mail-it0-x22f.google.com with SMTP id p81-v6so5025102itp.1 for ; Thu, 02 Aug 2018 12:04:51 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bsdimp-com.20150623.gappssmtp.com; s=20150623; h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc; bh=+qdLA376qDZW02032ZNxQmGVf19gEWbSILc4KXUhPR0=; b=2I07QybQkWI7QEFjNmgiuk3aiFH+qB/45d46zLXoY3ddBqg9wd3+CEs1mXdMfm2isI Eo4M5xJF2t9jmsimkdX9H2Tk0+zCYprvh5J/RuJmFtCZxunSj9l8qZ/2SLFsMyhd+RVX XZb8pW+XcfP8N7PbFDOuqGuysYrXKntTIkjL9QddWnhXmQoK2uQbc9DLcjsoDdeiwKJJ 7cbOgcEphMQbDslNSm1gxOUf8UlgltC6vzZ6csW5pwH5/wPdN+ndR1s/+hRjGUqo6SRi EmDu9HNJjEC3uM51OvklGwd4VMSwUcQGsTaIoRb9wXTHzlH+XoJsqWAz4s4TuW6y9mt5 V99g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:sender:in-reply-to:references:from :date:message-id:subject:to:cc; bh=+qdLA376qDZW02032ZNxQmGVf19gEWbSILc4KXUhPR0=; b=iUwsbd0NMbXzuTGquWltjTY1EgnkP/X3PPOHkXPfsqwSouanCyCn7Q5ymmeskKquPK fjV69o9qk2lkTchW5NlkpudIxpmoZppY9Sp199tu5aNHFxDMEtAd+j33PQs+Z5B8TUkW FvSFPdV0p13DJyJDmEiiv9zVS/o8YUtmkpDC2/52Pq4whCTzQ/aPTKm/jGup/CZVuy5m CxuqaVviWLM2jK4jO8u4AfV4aiTaiGe1D9t7tWu41wYsehfTmvWuuUg2yUtUN/E95uxZ lUCvnSFbxLvWbB1Zf45NoQDYZOiNbqLv/7GiFajrMysDjPk4nADbtWtiqys7Z5aF9PUA ejQQ== X-Gm-Message-State: AOUpUlE9MurMUT72usa31CyLdFv1PsXL/WHbtUBC4aCFDhUxjnX9khVT 2kuIEOhAIUFBvenRLZLlpibiGCq2krVs1rS57bW1oA== X-Google-Smtp-Source: AAOMgpd/DbgjbFe+SsX+/hc641Zyd9OvI2zTs0/BjppXdPYGpK2fiLksfchHTLqGVaT8urf66MaSRxeNZXnit8+pFGo= X-Received: by 2002:a24:4f52:: with SMTP id c79-v6mr3831544itb.36.1533236690458; Thu, 02 Aug 2018 12:04:50 -0700 (PDT) MIME-Version: 1.0 Sender: wlosh@bsdimp.com Received: by 2002:a4f:4485:0:0:0:0:0 with HTTP; Thu, 2 Aug 2018 12:04:49 -0700 (PDT) X-Originating-IP: [86.153.210.77] In-Reply-To: <7a14aee9-8205-4fc7-a7a0-a9ed2f33751d@metricspace.net> References: <20180802153357.GA25687@spindle.one-eyed-alien.net> <7f143985-2ebb-210a-e314-0deebd3d9f5b@metricspace.net> <7a14aee9-8205-4fc7-a7a0-a9ed2f33751d@metricspace.net> From: Warner Losh Date: Thu, 2 Aug 2018 13:04:49 -0600 X-Google-Sender-Auth: _jIFjBkqGjQYrbw8vjNX4wY6clY Message-ID: Subject: Re: A few build system questions To: Eric McCorkle Cc: Brooks Davis , FreeBSD Hackers Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.27 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 02 Aug 2018 19:04:51 -0000 On Thu, Aug 2, 2018 at 11:45 AM, Eric McCorkle wrote: > On 08/02/2018 12:56, Warner Losh wrote: > > > > > > On Thu, Aug 2, 2018, 5:19 PM Eric McCorkle > > wrote: > > > > On 08/02/2018 11:33, Brooks Davis wrote: > > > On Thu, Aug 02, 2018 at 11:17:06AM -0400, Eric McCorkle wrote: > > >> Hi, > > >> > > >> I have a few questions about how to accomplish some things with > the > > >> build system. > > >> > > >> First, I want to create some libraries that exist only as static > > >> archives, meaning no shared object (ex. libsomething.a, but no > > >> libsomething.so) > > > > > > If it's something for use by only the base system PRIVATELIB= will > > > do it (and change the name to libprivatesomethi.a). If you want > to be > > > broadly available outside the base system, NO_SHARED= should do it > > IIRC. > > > > If loader and kernel are able to use private libraries, then that is > > probably better, actually. > > > > > > They aren't. Src/stand depends on no objects in the system other than > > what is built in src/stand. What you are proposing is a non-starter. The > > loader > > I think you hit "send" too soon... > > Basically what I'm trying to do at this point is two things. > > First, I want to convert some certs into C declarations and embed them > into a static library, which can in turn be used to embed them into > applications. This is essentially the same thing that some drivers do, > where they embed the firmware binaries directly into the driver. > This is easy. > Second, and a (somewhat) separate thing, I'm trying to see if I can get > a PoC of extracting the specific primitives out of OpenSSL and using > them in place of the current software crypto implementations in kernel > and loader. (objcopy ought to be able to do this to a static library in > theory) > Such a strategy won't fly for various reasons. Userland, the loader and the kernel are all compiled with different options. You'll need to recompile for each and not do objcopy tricks because the current build model doesn't allow for that. Warner From owner-freebsd-hackers@freebsd.org Thu Aug 2 23:45:41 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 2551F1054D29; Thu, 2 Aug 2018 23:45:41 +0000 (UTC) (envelope-from kaduk@mit.edu) Received: from dmz-mailsec-scanner-5.mit.edu (dmz-mailsec-scanner-5.mit.edu [18.7.68.34]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 53D9F8421B; Thu, 2 Aug 2018 23:45:40 +0000 (UTC) (envelope-from kaduk@mit.edu) X-AuditID: 12074422-887ff7000000681f-63-5b63979bc4e7 Received: from mailhub-auth-2.mit.edu ( [18.7.62.36]) (using TLS with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by dmz-mailsec-scanner-5.mit.edu (Symantec Messaging Gateway) with SMTP id 4A.FF.26655.C97936B5; Thu, 2 Aug 2018 19:45:32 -0400 (EDT) Received: from outgoing.mit.edu (OUTGOING-AUTH-1.MIT.EDU [18.9.28.11]) by mailhub-auth-2.mit.edu (8.13.8/8.9.2) with ESMTP id w72NjQE6006707; Thu, 2 Aug 2018 19:45:27 -0400 Received: from kduck.kaduk.org (24-107-191-124.dhcp.stls.mo.charter.com [24.107.191.124]) (authenticated bits=56) (User authenticated as kaduk@ATHENA.MIT.EDU) by outgoing.mit.edu (8.13.8/8.12.4) with ESMTP id w72NjJkH013976 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Thu, 2 Aug 2018 19:45:22 -0400 Date: Thu, 2 Aug 2018 18:45:19 -0500 From: Benjamin Kaduk To: Eric McCorkle Cc: Warner Losh , FreeBSD Hackers , "freebsd-arch@freebsd.org" , freebsd-current , freebsd-security Subject: Re: Status of OpenSSL 1.1.1 Message-ID: <20180802234519.GD68224@kduck.kaduk.org> References: MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: User-Agent: Mutt/1.9.1 (2017-09-22) X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFlrOKsWRmVeSWpSXmKPExsUixG6nojtnenK0wd3zxhbfpv9lsZg9fRqT xZw3H5gstm/+x2jRs+kJm8XTrcsZHdg8Puz+yuox49N8Fo97OyYwBTBHcdmkpOZklqUW6dsl cGW8vLyOueASd8WBD6/YGhifcnQxcnJICJhI7F+4gamLkYtDSGAxk8SypiPMEM4GRomdjXOh MleYJD5sPsAO0sIioCLx49NBVhCbDchu6L4M1MHBISKgITF/tyBIPbNAF5PEr0lnWUBqhIFq ui/dB6vhBVp3cHY5xMxDjBL7N/eA1fAKCEqcnPkEzGYW0JHYufUOG0g9s4C0xPJ/HBBheYnm rbPBxnAKOEtM+uMDEhYVUJbY23eIfQKj4Cwkg2YhGTQLYdAsJIMWMLKsYpRNya3SzU3MzClO TdYtTk7My0st0jXVy80s0UtNKd3ECI4DF6UdjBP/eR1iFOBgVOLh1dBIjhZiTSwrrsw9xCjJ waQkystfDhTiS8pPqcxILM6ILyrNSS0Geo+DWUmE920nUI43JbGyKrUoHyYlzcGiJM57vyY8 WkggPbEkNTs1tSC1CCYrw8GhJMG7cRpQo2BRanpqRVpmTglCmomDE2Q4D9BwFZAa3uKCxNzi zHSI/ClGXY4/76dOYhZiycvPS5US5xUCKRIAKcoozYObA0pfEtn7a14xigO9Jcw7DaSKB5j6 4Ca9AlrCBLQk2zERZElJIkJKqoExo2f2n3aLPr2M1OT57Lez/KVzyjUd35uV/b75wlLp3TGt uKQA82sNTP/uv1r+7Mss5ap1dTcjthhHBzo/rth1emmdBnNrzr0+x+nx7+WL1XYUbipimPQr rTU838O3dlE//6QJr4WWvThrk1nl0lN0xHGt3YMpn5hdclg7Lu1aLRd+/NYqzT4lluKMREMt 5qLiRABbGPrYOgMAAA== X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 02 Aug 2018 23:45:41 -0000 On Wed, Aug 01, 2018 at 10:05:28AM -0400, Eric McCorkle wrote: > On 08/01/2018 09:02, Warner Losh wrote: > > > > > > On Wed, Aug 1, 2018, 12:31 PM Eric McCorkle > > wrote: > > > > Hi folks, > > > > I'm wondering what's the status of OpenSSL 1.1.1 integration into base? > > More specifically, is there a repo or a branch that's started the > > integration?  I'm aware of the wiki page and the list of port build > > issues, but that seems to be based on replacing the base OpenSSL with a > > port build (similar to the way one replaces it with LibreSSL). > > > > I have some work I'd like to do that's gating on sorting out the > > kernel/loader crypto situation, and I'd very much like to see OpenSSL > > 1.1.1 get merged, so I can start to look into doing that. > > > > > > There are patches to use bear SSL for the loader. OpenSSL is simply too > > large to use due to limits the loader operates under. > > I was going to look into the feasibility of doing something like what > LibreSSL does with portable, where they extract a subset of the full > library designed to be embedded in the kernel, loader, etc. > > I think it ought to be possible to do something like that, but it really > ought to be done in a tree with 1.1.1 integrated. > It wouldn't be terribly easy or effective, IMO. OpenSSL wasn't designed with such modularity in mind. -Ben From owner-freebsd-hackers@freebsd.org Fri Aug 3 02:30:07 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 384F41059855 for ; Fri, 3 Aug 2018 02:30:07 +0000 (UTC) (envelope-from eric@metricspace.net) Received: from mail.metricspace.net (static-98-116-200-172.nycmny.fios.verizon.net [98.116.200.172]) by mx1.freebsd.org (Postfix) with ESMTP id D27008BC13; Fri, 3 Aug 2018 02:30:06 +0000 (UTC) (envelope-from eric@metricspace.net) Received: from [172.16.0.23] (unknown [172.16.0.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) (Authenticated sender: eric) by mail.metricspace.net (Postfix) with ESMTPSA id 9998B6106; Fri, 3 Aug 2018 02:30:05 +0000 (UTC) Subject: Re: A few build system questions To: Warner Losh Cc: Brooks Davis , FreeBSD Hackers References: <20180802153357.GA25687@spindle.one-eyed-alien.net> <7f143985-2ebb-210a-e314-0deebd3d9f5b@metricspace.net> <7a14aee9-8205-4fc7-a7a0-a9ed2f33751d@metricspace.net> From: Eric McCorkle Openpgp: preference=signencrypt Autocrypt: addr=eric@metricspace.net; prefer-encrypt=mutual; keydata= mDMEWue2FBYJKwYBBAHaRw8BAQdAP/qVPlXodV6pYO5b1Jw0eFyMhyDD7B5y5eFsciutEfS0 JEVyaWMgTWNDb3JrbGUgPGVyaWNAbWV0cmljc3BhY2UubmV0PoiWBBMWCAA+FiEEDxi/0rkj zd6Uc6cFCN/CKRbBwmwFAlrnthQCGwMFCQHhM4AFCwkIBwIGFQoJCAsCBBYCAwECHgECF4AA CgkQCN/CKRbBwmyGKAD/XTSBOItCKcYCPTlsaS1aQYVEwWXXFgdjWE+WsNdZUS8A/AhYAbQZ kNZNimE2rQLoklkfTA74qF/V257NuQi4QDcLuDgEWue2FBIKKwYBBAGXVQEFAQEHQKpZVyCG ync/xqejm2C1HKGXLJTUu38RvnrR3UYECz9nAwEIB4h+BBgWCAAmFiEEDxi/0rkjzd6Uc6cF CN/CKRbBwmwFAlrnthQCGwwFCQHhM4AACgkQCN/CKRbBwmyi2wEAmvaGt8QMjGELzm27gP4c jJGUi7oigsLmTiFPkpJqPz0A+QFBSCvxJaxCMyoVru/xB6bunpJ+Wtsj8HD1EuJOn4EJ Message-ID: <9c3f08be-2a76-a726-16b2-c1e6a1aa4aa8@metricspace.net> Date: Thu, 2 Aug 2018 22:29:59 -0400 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:52.0) Gecko/20100101 Thunderbird/52.9.0 MIME-Version: 1.0 In-Reply-To: Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="JqaR5W3ewElEK0x1BT6GZzF4B12xrh8Us" X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 03 Aug 2018 02:30:07 -0000 This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --JqaR5W3ewElEK0x1BT6GZzF4B12xrh8Us Content-Type: multipart/mixed; boundary="jddM8aLdOHpkNQ0PjYirQ4Eah0klwzG4C"; protected-headers="v1" From: Eric McCorkle To: Warner Losh Cc: Brooks Davis , FreeBSD Hackers Message-ID: <9c3f08be-2a76-a726-16b2-c1e6a1aa4aa8@metricspace.net> Subject: Re: A few build system questions References: <20180802153357.GA25687@spindle.one-eyed-alien.net> <7f143985-2ebb-210a-e314-0deebd3d9f5b@metricspace.net> <7a14aee9-8205-4fc7-a7a0-a9ed2f33751d@metricspace.net> In-Reply-To: --jddM8aLdOHpkNQ0PjYirQ4Eah0klwzG4C Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: quoted-printable On 08/02/2018 15:04, Warner Losh wrote: > On Thu, Aug 2, 2018 at 11:45 AM, Eric McCorkle > wrote: >=20 > On 08/02/2018 12:56, Warner Losh wrote: > >=20 > >=20 > > On Thu, Aug 2, 2018, 5:19 PM Eric McCorkle > > >> wrot= e: > >=20 > >=C2=A0 =C2=A0 =C2=A0On 08/02/2018 11:33, Brooks Davis wrote: > >=C2=A0 =C2=A0 =C2=A0> On Thu, Aug 02, 2018 at 11:17:06AM -0400, Er= ic McCorkle wrote: > >=C2=A0 =C2=A0 =C2=A0>> Hi, > >=C2=A0 =C2=A0 =C2=A0>> > >=C2=A0 =C2=A0 =C2=A0>> I have a few questions about how to accompl= ish some things with the > >=C2=A0 =C2=A0 =C2=A0>> build system. > >=C2=A0 =C2=A0 =C2=A0>> > >=C2=A0 =C2=A0 =C2=A0>> First, I want to create some libraries that= exist only as static > >=C2=A0 =C2=A0 =C2=A0>> archives, meaning no shared object (ex. lib= something.a, but no > >=C2=A0 =C2=A0 =C2=A0>> libsomething.so) > >=C2=A0 =C2=A0 =C2=A0> > >=C2=A0 =C2=A0 =C2=A0> If it's something for use by only the base s= ystem PRIVATELIB=3D will > >=C2=A0 =C2=A0 =C2=A0> do it (and change the name to libprivatesome= thi.a).=C2=A0 If you want to be > >=C2=A0 =C2=A0 =C2=A0> broadly available outside the base system, N= O_SHARED=3D should do it > >=C2=A0 =C2=A0 =C2=A0IIRC. > >=20 > >=C2=A0 =C2=A0 =C2=A0If loader and kernel are able to use private l= ibraries, then that is > >=C2=A0 =C2=A0 =C2=A0probably better, actually. > >=20 > >=20 > > They aren't.=C2=A0 Src/stand depends on no objects in the system = other than > > what is built in src/stand. What you are proposing is a non-start= er. The > > loader >=20 > I think you hit "send" too soon... >=20 > Basically what I'm trying to do at this point is two things. >=20 > First, I want to convert some certs into C declarations and embed t= hem > into a static library, which can in turn be used to embed them into= > applications.=C2=A0 This is essentially the same thing that some dr= ivers do, > where they embed the firmware binaries directly into the driver. >=20 > This is easy. For future reference, this seems to be more or less what I'm after: for f in /etc/trust/root/certs/*.pub.pem; do echo -n "static const char `basename ${f%%.*}`_data[] =3D {"; openssl x509 -outform DER -in /etc/trust/root/certs/local.pub.pem | hexdump -v -e '1/1 "0x%02x,"'; echo "};"; done > Second, and a (somewhat) separate thing, I'm trying to see if I can= get > a PoC of extracting the specific primitives out of OpenSSL and usin= g > them in place of the current software crypto implementations in ker= nel > and loader.=C2=A0 (objcopy ought to be able to do this to a static = library in > theory) >=20 > Such a strategy won't fly for various reasons. Userland, the loader and= > the kernel are all compiled with different options. You'll need to > recompile for each and not do objcopy tricks because the current build > model doesn't allow for that. >=20 Yeah, I'd say that shipwrecks any hopes I'd had there :( --jddM8aLdOHpkNQ0PjYirQ4Eah0klwzG4C-- --JqaR5W3ewElEK0x1BT6GZzF4B12xrh8Us Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- iHUEARYIAB0WIQQPGL/SuSPN3pRzpwUI38IpFsHCbAUCW2O+JwAKCRAI38IpFsHC bMKeAP4y0OfomjWNy73Iaw0nDynjYLXVAjpNbdW5ABg54NNe5QEA6JYeTppaHyUg gv2OZFlq3KM7r8J6g9XG+vF9AxkXJgE= =vx61 -----END PGP SIGNATURE----- --JqaR5W3ewElEK0x1BT6GZzF4B12xrh8Us-- From owner-freebsd-hackers@freebsd.org Fri Aug 3 05:39:03 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id DE88C105DEA6 for ; Fri, 3 Aug 2018 05:39:02 +0000 (UTC) (envelope-from cse.cem@gmail.com) Received: from mail-io0-f177.google.com (mail-io0-f177.google.com [209.85.223.177]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 77FF67141D for ; Fri, 3 Aug 2018 05:39:02 +0000 (UTC) (envelope-from cse.cem@gmail.com) Received: by mail-io0-f177.google.com with SMTP id k16-v6so4020473iom.12 for ; Thu, 02 Aug 2018 22:39:02 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:reply-to:in-reply-to:references :from:date:message-id:subject:to:cc; bh=JVI8QECuzuORo3JovxsMsK6d3WLHnyGMR806uNSy/qc=; b=L3Ov+kHM3btSOcAQrx2TSX1xyu0iZ+t1RbBJxhSeu8nJws5YyoD7oNFrVBxUASNcuu qEjYxx+PGW91MTx5gFD1hH0O0ZGpB/zI7mZqjwvnvr85xpsbTe+glAfOEOXjsje4s5E8 xCBiwaaePff+TCwnVlvbAYYLVY3lytURbPSENZG7mziKEYbuhf3gD37fP0ucqRwXyfeB nn6mKmZyMPO/kN48APRwNwhRwXtdcY1fiQhwux61cX57gXUkvtjbXpNaaSusll6Kh66Z 2Z8Y/f8FsvQ1ouI1PwHqOPW4HWI+UIPnuusFIbfeJM+CwOblokNnLAHInOZyyVMSibLl 84og== X-Gm-Message-State: AOUpUlHZCUJ6y5eK8O9+s+Qxi+z14hohtPl+yXK38nSGuoeFrykOC5qM j30Tz5TdJNUW9dy3v82JWJkr8qh1 X-Google-Smtp-Source: AA+uWPwLD60sH3lbp0GMgNPvXEG1ugjdRcuKGdqHTNmganlRIDlG9uuIRuk+7mhcNMLAUGqyBL9SSQ== X-Received: by 2002:a6b:ef08:: with SMTP id k8-v6mr4883365ioh.12.1533274278660; Thu, 02 Aug 2018 22:31:18 -0700 (PDT) Received: from mail-io0-f175.google.com (mail-io0-f175.google.com. [209.85.223.175]) by smtp.gmail.com with ESMTPSA id v5-v6sm1618529ite.20.2018.08.02.22.31.18 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 02 Aug 2018 22:31:18 -0700 (PDT) Received: by mail-io0-f175.google.com with SMTP id o22-v6so4042833ioh.6 for ; Thu, 02 Aug 2018 22:31:18 -0700 (PDT) X-Received: by 2002:a6b:b0c5:: with SMTP id z188-v6mr4757177ioe.220.1533274277914; Thu, 02 Aug 2018 22:31:17 -0700 (PDT) MIME-Version: 1.0 Reply-To: cem@freebsd.org Received: by 2002:a02:7e0a:0:0:0:0:0 with HTTP; Thu, 2 Aug 2018 22:31:17 -0700 (PDT) In-Reply-To: <9c3f08be-2a76-a726-16b2-c1e6a1aa4aa8@metricspace.net> References: <20180802153357.GA25687@spindle.one-eyed-alien.net> <7f143985-2ebb-210a-e314-0deebd3d9f5b@metricspace.net> <7a14aee9-8205-4fc7-a7a0-a9ed2f33751d@metricspace.net> <9c3f08be-2a76-a726-16b2-c1e6a1aa4aa8@metricspace.net> From: Conrad Meyer Date: Thu, 2 Aug 2018 22:31:17 -0700 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: A few build system questions To: Eric McCorkle Cc: FreeBSD Hackers Content-Type: text/plain; charset="UTF-8" X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 03 Aug 2018 05:39:03 -0000 On Thu, Aug 2, 2018 at 7:29 PM, Eric McCorkle wrote: > For future reference, this seems to be more or less what I'm after: > > for f in /etc/trust/root/certs/*.pub.pem; do echo -n "static const char > `basename ${f%%.*}`_data[] = {"; openssl x509 -outform DER -in > /etc/trust/root/certs/local.pub.pem | hexdump -v -e '1/1 "0x%02x,"'; > echo "};"; done Another option instead of the hexdump format is just "xxd -i" (xxd is part of vim), although that works best if the intermediary output is written to a file (it populates the struct name automatically). Something like: for f in .../*pub.pem; do openssl x509 -outform DER -in ... > "$(basename "...")_data" && xxd -i "$(basename "...")_data" ; done Its output is nicely formatted with spaces and line wrapping. Best, Conrad From owner-freebsd-hackers@freebsd.org Fri Aug 3 07:28:49 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id B13BB106009F; Fri, 3 Aug 2018 07:28:49 +0000 (UTC) (envelope-from timo.voelker@fh-muenster.de) Received: from mail.fh-muenster.de (mail.fh-muenster.de [212.201.120.190]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "mail.fh-muenster.de", Issuer "DFN-Verein Global Issuing CA" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 475A774660; Fri, 3 Aug 2018 07:28:49 +0000 (UTC) (envelope-from timo.voelker@fh-muenster.de) Received: from fhad-ex13.fhad.fh-muenster.de (unknown [10.41.11.26]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by mail.fh-muenster.de (Postfix) with ESMTPS id 74E5028465E; Fri, 3 Aug 2018 09:28:47 +0200 (CEST) Received: from fhad-ex13.fhad.fh-muenster.de (10.41.11.26) by fhad-ex13.fhad.fh-muenster.de (10.41.11.26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1415.2; Fri, 3 Aug 2018 09:28:47 +0200 Received: from fhad-ex13.fhad.fh-muenster.de ([fe80::d9a6:349d:aadc:72e6]) by fhad-ex13.fhad.fh-muenster.de ([fe80::d9a6:349d:aadc:72e6%5]) with mapi id 15.01.1415.002; Fri, 3 Aug 2018 09:28:47 +0200 From: =?utf-8?B?VGltbyBWw7Zsa2Vy?= To: Toomas Soome CC: "freebsd-hackers@freebsd.org" , "freebsd-current@freebsd.org" Subject: Re: Unable to UEFI boot 11.2 via pxeboot Thread-Topic: Unable to UEFI boot 11.2 via pxeboot Thread-Index: AQHUKMhMn24QMJWRqkeXKQYwbojdqqSsQBQAgAAGdACAAAOogIABOfIA Date: Fri, 3 Aug 2018 07:28:47 +0000 Message-ID: References: <3DF39C46-977E-4D07-AF23-F0C7D5DAF2E6@fh-muenster.de> <9A67D337-ADC9-4B19-A44D-6C08135861D3@me.com> In-Reply-To: Accept-Language: en-US, de-DE Content-Language: en-US X-MS-Has-Attach: yes X-MS-TNEF-Correlator: x-originating-ip: [10.40.10.31] Content-Type: multipart/signed; boundary="Apple-Mail=_FF14ABAA-F971-491B-873C-2CDE51DF1955"; protocol="application/pkcs7-signature"; micalg=sha1 MIME-Version: 1.0 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 03 Aug 2018 07:28:49 -0000 --Apple-Mail=_FF14ABAA-F971-491B-873C-2CDE51DF1955 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=utf-8 Hi Toomas, it seems your fix works here. Some of the error messages remain, but I = was able to (pxe)boot without a USB stick plugged in. https://ibb.co/g8Bkfe Right after the moment from the screenshot, the FreeBSD boot manager = showed up. Thanks, Timo > On 2. Aug 2018, at 14:45, Toomas Soome wrote: >=20 > Could you check the current with = https://svnweb.freebsd.org/changeset/base/337131 >=20 > thanks, > toomas >=20 >> On 2 Aug 2018, at 15:32, Toomas Soome wrote: >>=20 >>=20 >>=20 >>> On 2 Aug 2018, at 15:08, Timo V=C3=B6lker = wrote: >>>=20 >>> It seems this issue is related to current as well. I did a quick = test and got this output, while I tried to (pxe)boot FreeBSD current = (without a USB stick plugged in) >>>=20 >>> https://ibb.co/no8Fve >>>=20 >>> Best regards >>>=20 >>> Timo >>=20 >> the hint is about efipart_inithandles() returning 2, thats errno code = for ENOENT. congratz, you have hit the corner case:D >>=20 >> Since efinet_dev is part of devsw, we can not skip the devswitch init = with such error, we still need to walk the list. Let me see if I can = provide quick fix. >>=20 >> rgds, >> toomas >>=20 >>=20 >>>=20 >>>> On 31. Jul 2018, at 14:16, Timo V=C3=B6lker = wrote: >>>>=20 >>>> Hi, >>>>=20 >>>> I'm unable to boot up the amd64 11.2 via pxeboot using UEFI on a = Dell PowerEdge R430. I get this output >>>>=20 >>>> https://ibb.co/h5ntuT >>>>=20 >>>> If I press a key to interrupt reboot, I get to the OK prompt. If I = enter lsdev -v, it prints nothing more than "net devices:". The variable = currdev is not set (show currdev prints variable 'currdev' not found). I = configured pxeboot to be the one and only boot medium in BIOS setup.=20 >>>>=20 >>>> However, I found a workaround that works for me. If I put an = (empty) USB stick in a USB port of the PowerEdge, it successfully boots = via pxeboot (which is still the one and only configured boot medium). I = then get this output >>>>=20 >>>> https://ibb.co/mU8SM8 >>>>=20 >>>> With FreeBSD 11.1 pxeboot worked on the Dell PowerEdge R430, even = without a USB stick plugged in. I couldn't test this with FreeBSD = 12-current. Hope this helps anyway to find an open issue. >>>>=20 >>>> I found this thread which seems to be related. >>>>=20 >>>> = https://lists.freebsd.org/pipermail/freebsd-current/2018-July/070082.html >>>>=20 >>>> Thanks, >>>>=20 >>>> Timo >>>=20 >>=20 >=20 --Apple-Mail=_FF14ABAA-F971-491B-873C-2CDE51DF1955 Content-Disposition: attachment; filename="smime.p7s" Content-Type: application/pkcs7-signature; name="smime.p7s" Content-Transfer-Encoding: base64 MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIQsDCCBRIw ggP6oAMCAQICCQDjC9X4ryXZgTANBgkqhkiG9w0BAQsFADCBgjELMAkGA1UEBhMCREUxKzApBgNV BAoMIlQtU3lzdGVtcyBFbnRlcnByaXNlIFNlcnZpY2VzIEdtYkgxHzAdBgNVBAsMFlQtU3lzdGVt cyBUcnVzdCBDZW50ZXIxJTAjBgNVBAMMHFQtVGVsZVNlYyBHbG9iYWxSb290IENsYXNzIDIwHhcN MTYwMjIyMTMzODIyWhcNMzEwMjIyMjM1OTU5WjCBlTELMAkGA1UEBhMCREUxRTBDBgNVBAoTPFZl cmVpbiB6dXIgRm9lcmRlcnVuZyBlaW5lcyBEZXV0c2NoZW4gRm9yc2NodW5nc25ldHplcyBlLiBW LjEQMA4GA1UECxMHREZOLVBLSTEtMCsGA1UEAxMkREZOLVZlcmVpbiBDZXJ0aWZpY2F0aW9uIEF1 dGhvcml0eSAyMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAy2DX/2ahQc3S+oeXinOr mU3qZzlaoWCARxVOjJWy5c/O01dLjc74VmwVVXYH6kb9yANFYz5w1KtUgLEjnL43KKkJ/wVdGA/E mJk3syD2ZngXh8KdDsxKMucWna4OjSl5BwAgVNwVX0qW13i2NNPBdLWd6b/Ad03qvVkH4FovbDyl ANw1vWUNj38ybfJaaktiAe6sODRZRTZJBdp4ymptW8CBaxHM0jyoi/hxGso74oDdFrRneos26k6R KT2zUVytqAy+nTTj0Q0Xg3XEOR6wlAsS8dVpjiX0uD0rv8COwx47pb9VEKsqrheXXjPOyPP0CQfj AoYxRmsBxRAMEcdZ6QIDAQABo4IBdDCCAXAwDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBST49gy JtrV8UqlkUrg6kviogzP4TAfBgNVHSMEGDAWgBS/WSA2AHmgoCJrjNXyYdK4LMuCSjASBgNVHRMB Af8ECDAGAQH/AgECMDMGA1UdIAQsMCowDwYNKwYBBAGBrSGCLAEBBDANBgsrBgEEAYGtIYIsHjAI BgZngQwBAgIwTAYDVR0fBEUwQzBBoD+gPYY7aHR0cDovL3BraTAzMzYudGVsZXNlYy5kZS9ybC9U ZWxlU2VjX0dsb2JhbFJvb3RfQ2xhc3NfMi5jcmwwgYYGCCsGAQUFBwEBBHoweDAsBggrBgEFBQcw AYYgaHR0cDovL29jc3AwMzM2LnRlbGVzZWMuZGUvb2NzcHIwSAYIKwYBBQUHMAKGPGh0dHA6Ly9w a2kwMzM2LnRlbGVzZWMuZGUvY3J0L1RlbGVTZWNfR2xvYmFsUm9vdF9DbGFzc18yLmNlcjANBgkq hkiG9w0BAQsFAAOCAQEAhwv/PgKbZchWLdY7mpiLcU/auimqIflGLvWypA+uETh5OLMOdLp2XZ7o GIKWYttMM+jd+WrfMr0sTEdgVX/ndGu0LIPYeWu2t01QC2YHte2zl63q7n8w5pn9IuJyTT6EW+75 z5nqf9dSOS6smABEfmk7v3Xu0As7Gs3l9w8ibEeE9qVHoP3QGjR9rdI9d7Pu9NdN/8Po5ZJPWT6Q RxBKsIVYwG9/+K7tCEKeHtTfFC5Nj7yelMPn7fYY+DxJ5yaopzbYLN4izYuC2Nl44lUSozuHRLYR C9UMUq9pjA8G39CiU4tXmHvP/Qck9Py9w/1KkgKXG/K3ts9lihqitXIZOTCCBawwggSUoAMCAQIC BxtjutAeLD0wDQYJKoZIhvcNAQELBQAwgZUxCzAJBgNVBAYTAkRFMUUwQwYDVQQKEzxWZXJlaW4g enVyIEZvZXJkZXJ1bmcgZWluZXMgRGV1dHNjaGVuIEZvcnNjaHVuZ3NuZXR6ZXMgZS4gVi4xEDAO BgNVBAsTB0RGTi1QS0kxLTArBgNVBAMTJERGTi1WZXJlaW4gQ2VydGlmaWNhdGlvbiBBdXRob3Jp dHkgMjAeFw0xNjA1MjQxMTM4NDBaFw0zMTAyMjIyMzU5NTlaMIGNMQswCQYDVQQGEwJERTFFMEMG A1UECgw8VmVyZWluIHp1ciBGb2VyZGVydW5nIGVpbmVzIERldXRzY2hlbiBGb3JzY2h1bmdzbmV0 emVzIGUuIFYuMRAwDgYDVQQLDAdERk4tUEtJMSUwIwYDVQQDDBxERk4tVmVyZWluIEdsb2JhbCBJ c3N1aW5nIENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAnTt5HEfeH4bLxmnXEJ45 19miMNtyHAV/KV9LaPGtGdZM4WsbsQt/oavge4uL2C3Obog6EO5X5R5/BFE267pwbWOgvpYuQOHR g0xmPRxkaeWbpK1yrmg5UYd5zBfTri9dY3FLOXrrQqeXkGkFv5D/pEBwvQPnv54YiB+fmYhNDkeN SF9lmRDS2SpJ7cG5LR2fEssV0z9/HlQvOq6TV6d+eMrVSuIa5e1BfVNfyLMq9YowrO0XBSQ/tqAL B/1NGpoDUqA2nN4kh2Xk5/rHlnMkFM3Q6BtonhhZrnZ+99EKeDyHS7A3z1PKOjgQ88tHbYxkPTxa RUq6yoB8uPPnp0xMzQIDAQABo4ICBTCCAgEwEgYDVR0TAQH/BAgwBgEB/wIBATAOBgNVHQ8BAf8E BAMCAQYwKQYDVR0gBCIwIDANBgsrBgEEAYGtIYIsHjAPBg0rBgEEAYGtIYIsAQEEMB0GA1UdDgQW BBRrOpiL+fJTidrgrbIyHgkf6Ko7dDAfBgNVHSMEGDAWgBST49gyJtrV8UqlkUrg6kviogzP4TCB jwYDVR0fBIGHMIGEMECgPqA8hjpodHRwOi8vY2RwMS5wY2EuZGZuLmRlL2dsb2JhbC1yb290LWcy LWNhL3B1Yi9jcmwvY2FjcmwuY3JsMECgPqA8hjpodHRwOi8vY2RwMi5wY2EuZGZuLmRlL2dsb2Jh bC1yb290LWcyLWNhL3B1Yi9jcmwvY2FjcmwuY3JsMIHdBggrBgEFBQcBAQSB0DCBzTAzBggrBgEF BQcwAYYnaHR0cDovL29jc3AucGNhLmRmbi5kZS9PQ1NQLVNlcnZlci9PQ1NQMEoGCCsGAQUFBzAC hj5odHRwOi8vY2RwMS5wY2EuZGZuLmRlL2dsb2JhbC1yb290LWcyLWNhL3B1Yi9jYWNlcnQvY2Fj ZXJ0LmNydDBKBggrBgEFBQcwAoY+aHR0cDovL2NkcDIucGNhLmRmbi5kZS9nbG9iYWwtcm9vdC1n Mi1jYS9wdWIvY2FjZXJ0L2NhY2VydC5jcnQwDQYJKoZIhvcNAQELBQADggEBAIF4RaROpH8OVfAJ sWo+eMxoNakc85WeP/P432s4d4ksjbWtPsfylM2gBq66zKixrTMItiSGYjZMeG5Q8NVuYI1PUjFD l0Z18GLkbmZRwUIxZ1DlSec5HsufyoZI3ggU/xVLK2aboDifAM79p+vRf1ctyExf3BARlz6WBAJc hKgpOWyU/BCSBnue7thGtBu1Aww42dywqT9xBguyAwczwo1IYyUlPHp7V273igU477igri/02wfV W4QYwam4S85skBqC5Lk9+nfx0h8zAr9T53b53CYlQW8vphv6pBOQ+nx+2QtgXey/ykGgYfsRSSnY qC11FdhKGOoW71U0IhoTjQYwggXmMIIEzqADAgECAgwdgtH8FJ0VCMZ26e4wDQYJKoZIhvcNAQEL BQAwgY0xCzAJBgNVBAYTAkRFMUUwQwYDVQQKDDxWZXJlaW4genVyIEZvZXJkZXJ1bmcgZWluZXMg RGV1dHNjaGVuIEZvcnNjaHVuZ3NuZXR6ZXMgZS4gVi4xEDAOBgNVBAsMB0RGTi1QS0kxJTAjBgNV BAMMHERGTi1WZXJlaW4gR2xvYmFsIElzc3VpbmcgQ0EwHhcNMTcwNzEwMTAxODIwWhcNMjAwNzA5 MTAxODIwWjB6MQswCQYDVQQGEwJERTEgMB4GA1UECgwXRmFjaGhvY2hzY2h1bGUgTXVlbnN0ZXIx MjAwBgNVBAsMKUZhY2hiZXJlaWNoIEVsZWt0cm90ZWNobmlrIHVuZCBJbmZvcm1hdGlrMRUwEwYD VQQDDAxUaW1vIFZvZWxrZXIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC/gQYu/Hjb 3078pLzYaFpcgo/JHZHLjOLe85YFMr056WFSN/Jwdh1Asny4ZKcLzHd7vMjr3fjg8Sgo04y+lBI4 8O5FJTgixYB1oV9DU5GlWcC/6eLhpIPNraOcK4KJVlwqw7uc1L8fbyjCMrTNtYHFEy23B9NFgxbS pxhQ6FCgS6kjziTgFL6s072+j6MMJi1RdZZUNZGq52gCyIKNAxMt2b42/Kk7PTWYCSA8HzxrLsQe YxmxoxLoGTlnZxuC8WKU+1V1pUiS+Ns3krHHBHIeeogR/JeILBX0OheqStUnnEABcsWj+4uGYxvP RdZXBXm8wKjcRcnJDrKizS4G6j27AgMBAAGjggJWMIICUjBABgNVHSAEOTA3MBEGDysGAQQBga0h giwBAQQDBTARBg8rBgEEAYGtIYIsAgEEAwEwDwYNKwYBBAGBrSGCLAEBBDAJBgNVHRMEAjAAMA4G A1UdDwEB/wQEAwIF4DAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwQwHQYDVR0OBBYEFOOJ r1RvTOvocygvlHm6xGfZS5dNMB8GA1UdIwQYMBaAFGs6mIv58lOJ2uCtsjIeCR/oqjt0MCYGA1Ud EQQfMB2BG3RpbW8udm9lbGtlckBmaC1tdWVuc3Rlci5kZTCBjQYDVR0fBIGFMIGCMD+gPaA7hjlo dHRwOi8vY2RwMS5wY2EuZGZuLmRlL2Rmbi1jYS1nbG9iYWwtZzIvcHViL2NybC9jYWNybC5jcmww P6A9oDuGOWh0dHA6Ly9jZHAyLnBjYS5kZm4uZGUvZGZuLWNhLWdsb2JhbC1nMi9wdWIvY3JsL2Nh Y3JsLmNybDCB2wYIKwYBBQUHAQEEgc4wgcswMwYIKwYBBQUHMAGGJ2h0dHA6Ly9vY3NwLnBjYS5k Zm4uZGUvT0NTUC1TZXJ2ZXIvT0NTUDBJBggrBgEFBQcwAoY9aHR0cDovL2NkcDEucGNhLmRmbi5k ZS9kZm4tY2EtZ2xvYmFsLWcyL3B1Yi9jYWNlcnQvY2FjZXJ0LmNydDBJBggrBgEFBQcwAoY9aHR0 cDovL2NkcDIucGNhLmRmbi5kZS9kZm4tY2EtZ2xvYmFsLWcyL3B1Yi9jYWNlcnQvY2FjZXJ0LmNy dDANBgkqhkiG9w0BAQsFAAOCAQEAGEYW34tG4ACeQk3vN6TBr9HRRE4Rc3tJoh5odaAx4UDnO6B7 EsTOSyZmJ5jdY6ui8ns9jiwwv6yZsuhopqSatS06aSlXoJ7GWBeTS9FbDu4Fa3+Hmfo+UiqG0cul MLOfKasuZx8bsoOq1kR7WdABUL3m7FuLhIVEeuJ39yQSiWxwJ4jZ5Cx0evaXIcGDIXOE9e+GcXz2 mm1yfFxITLHt5q37phfTDLH4IOgWt9GORlDBoatSu56QwfRGwhVYmkTRrUFss3QuQ/z3SwOt30Lj MNdVk6OkQBNj9QBH5PSH/Ok/JIQODVotZWG7HQ8/8nyzYTH0ccW/1HIrCwvKicZJcTGCA40wggOJ AgEBMIGeMIGNMQswCQYDVQQGEwJERTFFMEMGA1UECgw8VmVyZWluIHp1ciBGb2VyZGVydW5nIGVp bmVzIERldXRzY2hlbiBGb3JzY2h1bmdzbmV0emVzIGUuIFYuMRAwDgYDVQQLDAdERk4tUEtJMSUw IwYDVQQDDBxERk4tVmVyZWluIEdsb2JhbCBJc3N1aW5nIENBAgwdgtH8FJ0VCMZ26e4wCQYFKw4D AhoFAKCCAcMwGAYJKoZIhvcNAQkDMQsGCSqGSIb3DQEHATAcBgkqhkiG9w0BCQUxDxcNMTgwODAz MDcyODQ3WjAjBgkqhkiG9w0BCQQxFgQUwBuhS6b0G8iWHa+otjCUuQtvrFwwga8GCSsGAQQBgjcQ BDGBoTCBnjCBjTELMAkGA1UEBhMCREUxRTBDBgNVBAoMPFZlcmVpbiB6dXIgRm9lcmRlcnVuZyBl aW5lcyBEZXV0c2NoZW4gRm9yc2NodW5nc25ldHplcyBlLiBWLjEQMA4GA1UECwwHREZOLVBLSTEl MCMGA1UEAwwcREZOLVZlcmVpbiBHbG9iYWwgSXNzdWluZyBDQQIMHYLR/BSdFQjGdunuMIGxBgsq hkiG9w0BCRACCzGBoaCBnjCBjTELMAkGA1UEBhMCREUxRTBDBgNVBAoMPFZlcmVpbiB6dXIgRm9l cmRlcnVuZyBlaW5lcyBEZXV0c2NoZW4gRm9yc2NodW5nc25ldHplcyBlLiBWLjEQMA4GA1UECwwH REZOLVBLSTElMCMGA1UEAwwcREZOLVZlcmVpbiBHbG9iYWwgSXNzdWluZyBDQQIMHYLR/BSdFQjG dunuMA0GCSqGSIb3DQEBAQUABIIBAHkrOi1h3D3eX1jI8/QrruSP/EZJaLRf0ynPuhIyU/UwlgMR xaHrXu4/lysIccoLXDRyEDQL9gHEE1fGL7bs54dyOSvKIC7ehFhO8y2JRkNGvF3P5p+vibUX6z44 Y/A7klUB/iV2QrNxKbI8ZkN5l7ZCd7CD4r0LfDYTXWib7rEMISi2CYW5hkGSbtKl9GupXDgmKlZa vOXOAQijr+7PjR8yZrRPJqlMmJPk4TAaInlvNUFUILSTm4tGh9g7UNwHUscdUNO1EUZBhn1zmzvM TJwC1QZosfojlejhygmNXwrgDM0p7D1VG3yCzFNwPQ8KjMh/dUhZsppVyUg+ktwuP2kAAAAAAAA= --Apple-Mail=_FF14ABAA-F971-491B-873C-2CDE51DF1955-- From owner-freebsd-hackers@freebsd.org Fri Aug 3 08:44:11 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 6DD8010623FF for ; Fri, 3 Aug 2018 08:44:11 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: from mail-io0-x22a.google.com (mail-io0-x22a.google.com [IPv6:2607:f8b0:4001:c06::22a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 87ED577198 for ; Fri, 3 Aug 2018 08:44:10 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: by mail-io0-x22a.google.com with SMTP id q19-v6so4347360ioh.11 for ; Fri, 03 Aug 2018 01:44:10 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bsdimp-com.20150623.gappssmtp.com; s=20150623; h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc; bh=BAiAO4BN65wamN90CtGrC3g8xn03btAGQa9snL4okZQ=; b=AgMTGXLK+Jm7fyXoAok+LfpFrN9+zmvWAB8v6GV1RWkMUIfzUd4+da10WpE+aPBBgu zbsUXqKSs/e3aDV1giQLrA7ElR+OFj8z2087t1FF9Eaol0cYIeDW509p2cAuVP3EZ2mN 8arVoYI9ax8IB78J4rSQebSB2plZOVvrOZZAoPxSjMtuZb/OBzEUnjfPkL1ucAge4R1O wNEy9mapC8fyfnonYrcDEb0GdFnfY1KU/YkoQc4a5IDHYhDcx64AFF/aDg0B6SsNy4dw 1BSDXVc8p8JhB0LA9tjvWFI+kQ4Oad6MaXpQV75Qy6gqq6xpSRS8c/xM/5zuwYJBu9sg XJwg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:sender:in-reply-to:references:from :date:message-id:subject:to:cc; bh=BAiAO4BN65wamN90CtGrC3g8xn03btAGQa9snL4okZQ=; b=dpAwrAHhixt4xFeIvVdkrkbN5UFuAz9Xb9MAO/ZVXdZsOp6r9ZdCZHUlOEAAED22dV s/EGDWhaOn6P7pUJ/AnzNVWBE5KJlSvNaJj5+FO/xSDEeekjd3AbQzwZcIm93LtgqQMt 7x7Dx6AWhGOwTCVS14yxiBR4w3dic4+jJpvIjo3yor+CjqCCPOaUT6cVBb0DU3lIpi0p omhXUjzoXhqnwS0bFWdGX5lSS4k8CRp68BflqFbHBtsYfmyDhvcyg90+aqr/EzxUXr5a n1QW1wuQVqSebsuDPKhoXsm3UktJhG8aiWux3FbvaJyJT1op2ioQkO/kE2c+kL7Zka+7 71Hg== X-Gm-Message-State: AOUpUlFG6OLvXqvNGYGJzZ16kaTd3mDa7RB7pBiZO+3Tt/gr6NBewUXf HMm6F27D/erL8fLXdCegPjpiaoWNdkAQRDk0GU5i8VLLv55/YA== X-Google-Smtp-Source: AA+uWPxRtETiA0vQuvKOkan73dUmhjbC72QhIOzEYkHQ5bQhRNSsT2bApwIbofxOY4mxJwvfamQK9l4tbkP2Pn85yKQ= X-Received: by 2002:a6b:d004:: with SMTP id x4-v6mr5064998ioa.299.1533285849927; Fri, 03 Aug 2018 01:44:09 -0700 (PDT) MIME-Version: 1.0 Sender: wlosh@bsdimp.com Received: by 2002:a4f:4485:0:0:0:0:0 with HTTP; Fri, 3 Aug 2018 01:44:09 -0700 (PDT) X-Originating-IP: [86.153.210.77] In-Reply-To: <20180802234519.GD68224@kduck.kaduk.org> References: <20180802234519.GD68224@kduck.kaduk.org> From: Warner Losh Date: Fri, 3 Aug 2018 02:44:09 -0600 X-Google-Sender-Auth: ij_u90ZUmAUGxcJSfLBylG5FCvM Message-ID: Subject: Re: Status of OpenSSL 1.1.1 To: Benjamin Kaduk Cc: Eric McCorkle , FreeBSD Hackers , "freebsd-arch@freebsd.org" , freebsd-current , freebsd-security Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.27 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 03 Aug 2018 08:44:11 -0000 On Thu, Aug 2, 2018 at 5:45 PM, Benjamin Kaduk wrote: > On Wed, Aug 01, 2018 at 10:05:28AM -0400, Eric McCorkle wrote: > > On 08/01/2018 09:02, Warner Losh wrote: > > > > > > > > > On Wed, Aug 1, 2018, 12:31 PM Eric McCorkle > > > wrote: > > > > > > Hi folks, > > > > > > I'm wondering what's the status of OpenSSL 1.1.1 integration into > base? > > > More specifically, is there a repo or a branch that's started the > > > integration? I'm aware of the wiki page and the list of port build > > > issues, but that seems to be based on replacing the base OpenSSL > with a > > > port build (similar to the way one replaces it with LibreSSL). > > > > > > I have some work I'd like to do that's gating on sorting out the > > > kernel/loader crypto situation, and I'd very much like to see > OpenSSL > > > 1.1.1 get merged, so I can start to look into doing that. > > > > > > > > > There are patches to use bear SSL for the loader. OpenSSL is simply too > > > large to use due to limits the loader operates under. > > > > I was going to look into the feasibility of doing something like what > > LibreSSL does with portable, where they extract a subset of the full > > library designed to be embedded in the kernel, loader, etc. > > > > I think it ought to be possible to do something like that, but it really > > ought to be done in a tree with 1.1.1 integrated. > > > > It wouldn't be terribly easy or effective, IMO. OpenSSL wasn't designed > with such modularity in mind. > Others that have tried have found OpenSSL to be way too large for the boot loader and a completely impossible to subset enough to get things small enough due to the intertwingled nature of things. Warner From owner-freebsd-hackers@freebsd.org Fri Aug 3 08:17:31 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 429161061688; Fri, 3 Aug 2018 08:17:31 +0000 (UTC) (envelope-from tsoome@me.com) Received: from mr11p00im-asmtp003.me.com (mr11p00im-asmtp003.me.com [17.110.69.254]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id C60637615B; Fri, 3 Aug 2018 08:17:30 +0000 (UTC) (envelope-from tsoome@me.com) Received: from process-dkim-sign-daemon.mr11p00im-asmtp003.me.com by mr11p00im-asmtp003.me.com (Oracle Communications Messaging Server 8.0.2.2.20180531 64bit (built May 31 2018)) id <0PCV00100LGYU200@mr11p00im-asmtp003.me.com>; Fri, 03 Aug 2018 08:17:12 +0000 (GMT) Received: from icloud.com ([127.0.0.1]) by mr11p00im-asmtp003.me.com (Oracle Communications Messaging Server 8.0.2.2.20180531 64bit (built May 31 2018)) with ESMTPSA id <0PCV00GWULOHJJ40@mr11p00im-asmtp003.me.com>; Fri, 03 Aug 2018 08:17:08 +0000 (GMT) X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-08-03_03:,, signatures=0 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 clxscore=1015 suspectscore=27 malwarescore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1707230000 definitions=main-1808030093 Content-type: text/plain; charset=utf-8 MIME-version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\)) Subject: Re: Unable to UEFI boot 11.2 via pxeboot From: Toomas Soome In-reply-to: Date: Fri, 03 Aug 2018 11:17:04 +0300 Cc: "freebsd-hackers@freebsd.org" , "freebsd-current@freebsd.org" Content-transfer-encoding: quoted-printable Message-id: References: <3DF39C46-977E-4D07-AF23-F0C7D5DAF2E6@fh-muenster.de> <9A67D337-ADC9-4B19-A44D-6C08135861D3@me.com> To: =?utf-8?Q?Timo_V=C3=B6lker?= X-Mailer: Apple Mail (2.3445.9.1) X-Mailman-Approved-At: Fri, 03 Aug 2018 10:31:59 +0000 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 03 Aug 2018 08:17:31 -0000 > On 3 Aug 2018, at 10:28, Timo V=C3=B6lker = wrote: >=20 > Hi Toomas, >=20 > it seems your fix works here. Some of the error messages remain, but I = was able to (pxe)boot without a USB stick plugged in. >=20 > https://ibb.co/g8Bkfe >=20 > Right after the moment from the screenshot, the FreeBSD boot manager = showed up. >=20 > Thanks, >=20 > Timo Ok, so far so good. As seen from the screen dump, some cleanup is = required, I do not think we should print about efipart_inithandles() in = case of errno 2 - thats perfectly normal case if there are no block = devices. Update commited:) rgds, toomas >=20 >> On 2. Aug 2018, at 14:45, Toomas Soome wrote: >>=20 >> Could you check the current with = https://svnweb.freebsd.org/changeset/base/337131 >>=20 >> thanks, >> toomas >>=20 >>> On 2 Aug 2018, at 15:32, Toomas Soome wrote: >>>=20 >>>=20 >>>=20 >>>> On 2 Aug 2018, at 15:08, Timo V=C3=B6lker = wrote: >>>>=20 >>>> It seems this issue is related to current as well. I did a quick = test and got this output, while I tried to (pxe)boot FreeBSD current = (without a USB stick plugged in) >>>>=20 >>>> https://ibb.co/no8Fve >>>>=20 >>>> Best regards >>>>=20 >>>> Timo >>>=20 >>> the hint is about efipart_inithandles() returning 2, thats errno = code for ENOENT. congratz, you have hit the corner case:D >>>=20 >>> Since efinet_dev is part of devsw, we can not skip the devswitch = init with such error, we still need to walk the list. Let me see if I = can provide quick fix. >>>=20 >>> rgds, >>> toomas >>>=20 >>>=20 >>>>=20 >>>>> On 31. Jul 2018, at 14:16, Timo V=C3=B6lker = wrote: >>>>>=20 >>>>> Hi, >>>>>=20 >>>>> I'm unable to boot up the amd64 11.2 via pxeboot using UEFI on a = Dell PowerEdge R430. I get this output >>>>>=20 >>>>> https://ibb.co/h5ntuT >>>>>=20 >>>>> If I press a key to interrupt reboot, I get to the OK prompt. If I = enter lsdev -v, it prints nothing more than "net devices:". The variable = currdev is not set (show currdev prints variable 'currdev' not found). I = configured pxeboot to be the one and only boot medium in BIOS setup.=20 >>>>>=20 >>>>> However, I found a workaround that works for me. If I put an = (empty) USB stick in a USB port of the PowerEdge, it successfully boots = via pxeboot (which is still the one and only configured boot medium). I = then get this output >>>>>=20 >>>>> https://ibb.co/mU8SM8 >>>>>=20 >>>>> With FreeBSD 11.1 pxeboot worked on the Dell PowerEdge R430, even = without a USB stick plugged in. I couldn't test this with FreeBSD = 12-current. Hope this helps anyway to find an open issue. >>>>>=20 >>>>> I found this thread which seems to be related. >>>>>=20 >>>>> = https://lists.freebsd.org/pipermail/freebsd-current/2018-July/070082.html >>>>>=20 >>>>> Thanks, >>>>>=20 >>>>> Timo >>>>=20 >>>=20 >>=20 >=20 From owner-freebsd-hackers@freebsd.org Fri Aug 3 11:02:24 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 03AB31065CDE; Fri, 3 Aug 2018 11:02:24 +0000 (UTC) (envelope-from eric@metricspace.net) Received: from mail.metricspace.net (static-98-116-200-172.nycmny.fios.verizon.net [98.116.200.172]) by mx1.freebsd.org (Postfix) with ESMTP id A0FD67C467; Fri, 3 Aug 2018 11:02:23 +0000 (UTC) (envelope-from eric@metricspace.net) Received: from [172.16.0.23] (unknown [172.16.0.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) (Authenticated sender: eric) by mail.metricspace.net (Postfix) with ESMTPSA id 89930619A; Fri, 3 Aug 2018 11:02:22 +0000 (UTC) Subject: Re: Status of OpenSSL 1.1.1 To: Warner Losh , Benjamin Kaduk Cc: FreeBSD Hackers , "freebsd-arch@freebsd.org" , freebsd-current , freebsd-security References: <20180802234519.GD68224@kduck.kaduk.org> From: Eric McCorkle Openpgp: preference=signencrypt Autocrypt: addr=eric@metricspace.net; prefer-encrypt=mutual; keydata= mDMEWue2FBYJKwYBBAHaRw8BAQdAP/qVPlXodV6pYO5b1Jw0eFyMhyDD7B5y5eFsciutEfS0 JEVyaWMgTWNDb3JrbGUgPGVyaWNAbWV0cmljc3BhY2UubmV0PoiWBBMWCAA+FiEEDxi/0rkj zd6Uc6cFCN/CKRbBwmwFAlrnthQCGwMFCQHhM4AFCwkIBwIGFQoJCAsCBBYCAwECHgECF4AA CgkQCN/CKRbBwmyGKAD/XTSBOItCKcYCPTlsaS1aQYVEwWXXFgdjWE+WsNdZUS8A/AhYAbQZ kNZNimE2rQLoklkfTA74qF/V257NuQi4QDcLuDgEWue2FBIKKwYBBAGXVQEFAQEHQKpZVyCG ync/xqejm2C1HKGXLJTUu38RvnrR3UYECz9nAwEIB4h+BBgWCAAmFiEEDxi/0rkjzd6Uc6cF CN/CKRbBwmwFAlrnthQCGwwFCQHhM4AACgkQCN/CKRbBwmyi2wEAmvaGt8QMjGELzm27gP4c jJGUi7oigsLmTiFPkpJqPz0A+QFBSCvxJaxCMyoVru/xB6bunpJ+Wtsj8HD1EuJOn4EJ Message-ID: Date: Fri, 3 Aug 2018 07:02:18 -0400 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:52.0) Gecko/20100101 Thunderbird/52.9.0 MIME-Version: 1.0 In-Reply-To: Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="3Jlf5EtgHrBUwuVED8RcynGXM8EBmN3FH" X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 03 Aug 2018 11:02:24 -0000 This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --3Jlf5EtgHrBUwuVED8RcynGXM8EBmN3FH Content-Type: multipart/mixed; boundary="SgFMOIbWT0nMndG6NllvpPpohfXOlolaP"; protected-headers="v1" From: Eric McCorkle To: Warner Losh , Benjamin Kaduk Cc: FreeBSD Hackers , "freebsd-arch@freebsd.org" , freebsd-current , freebsd-security Message-ID: Subject: Re: Status of OpenSSL 1.1.1 References: <20180802234519.GD68224@kduck.kaduk.org> In-Reply-To: --SgFMOIbWT0nMndG6NllvpPpohfXOlolaP Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: quoted-printable On 08/03/2018 04:44, Warner Losh wrote: >=20 >=20 > On Thu, Aug 2, 2018 at 5:45 PM, Benjamin Kaduk > wrote: >=20 > On Wed, Aug 01, 2018 at 10:05:28AM -0400, Eric McCorkle wrote: > > On 08/01/2018 09:02, Warner Losh wrote: > > > > > > > > > On Wed, Aug 1, 2018, 12:31 PM Eric McCorkle > > > > >> wr= ote: > > > > > >=C2=A0 =C2=A0 =C2=A0Hi folks, > > > > > >=C2=A0 =C2=A0 =C2=A0I'm wondering what's the status of OpenSSL 1= =2E1.1 integration > into base? > > >=C2=A0 =C2=A0 =C2=A0More specifically, is there a repo or a bran= ch that's > started the > > >=C2=A0 =C2=A0 =C2=A0integration?=C2=A0 I'm aware of the wiki pag= e and the list of > port build > > >=C2=A0 =C2=A0 =C2=A0issues, but that seems to be based on replac= ing the base > OpenSSL with a > > >=C2=A0 =C2=A0 =C2=A0port build (similar to the way one replaces = it with LibreSSL). > > > > > >=C2=A0 =C2=A0 =C2=A0I have some work I'd like to do that's gatin= g on sorting out the > > >=C2=A0 =C2=A0 =C2=A0kernel/loader crypto situation, and I'd very= much like to > see OpenSSL > > >=C2=A0 =C2=A0 =C2=A01.1.1 get merged, so I can start to look int= o doing that. > > > > > > > > > There are patches to use bear SSL for the loader. OpenSSL is > simply too > > > large to use due to limits the loader operates under. > > > > I was going to look into the feasibility of doing something like = what > > LibreSSL does with portable, where they extract a subset of the f= ull > > library designed to be embedded in the kernel, loader, etc. > > > > I think it ought to be possible to do something like that, but it= > really > > ought to be done in a tree with 1.1.1 integrated. > > >=20 > It wouldn't be terribly easy or effective, IMO.=C2=A0 OpenSSL wasn'= t designed > with such modularity in mind. >=20 >=20 > Others that have tried have found OpenSSL to be way too large for the > boot loader and a completely impossible to subset enough to get things > small enough due to the intertwingled nature of things. To what extent, if any, does this change in 1.1.1, though? --SgFMOIbWT0nMndG6NllvpPpohfXOlolaP-- --3Jlf5EtgHrBUwuVED8RcynGXM8EBmN3FH Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- iHUEARYIAB0WIQQPGL/SuSPN3pRzpwUI38IpFsHCbAUCW2Q2OgAKCRAI38IpFsHC bHx7AQCF1Yu898/tbKfMJvXrPaJmDmV2wf66gtK5k+KJ1ulKmgEAuuXdSuUriYuK n3pc4P82OqfT9LnymaHfY6T9KM/6QAg= =tWx/ -----END PGP SIGNATURE----- --3Jlf5EtgHrBUwuVED8RcynGXM8EBmN3FH-- From owner-freebsd-hackers@freebsd.org Fri Aug 3 11:50:17 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 3F9F610672E3; Fri, 3 Aug 2018 11:50:17 +0000 (UTC) (envelope-from timo.voelker@fh-muenster.de) Received: from mail.fh-muenster.de (mail.fh-muenster.de [212.201.120.190]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "mail.fh-muenster.de", Issuer "DFN-Verein Global Issuing CA" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id B61EC7DBC3; Fri, 3 Aug 2018 11:50:16 +0000 (UTC) (envelope-from timo.voelker@fh-muenster.de) Received: from fhad-ex03.fhad.fh-muenster.de (unknown [10.40.11.26]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by mail.fh-muenster.de (Postfix) with ESMTPS id ACA9F284B7E; Fri, 3 Aug 2018 13:50:14 +0200 (CEST) Received: from fhad-ex13.fhad.fh-muenster.de (10.41.11.26) by fhad-ex03.fhad.fh-muenster.de (10.40.11.26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1415.2; Fri, 3 Aug 2018 13:50:14 +0200 Received: from fhad-ex13.fhad.fh-muenster.de ([fe80::d9a6:349d:aadc:72e6]) by fhad-ex13.fhad.fh-muenster.de ([fe80::d9a6:349d:aadc:72e6%5]) with mapi id 15.01.1415.002; Fri, 3 Aug 2018 13:50:14 +0200 From: =?utf-8?B?VGltbyBWw7Zsa2Vy?= To: Toomas Soome CC: "freebsd-hackers@freebsd.org" , "freebsd-current@freebsd.org" Subject: Re: Unable to UEFI boot 11.2 via pxeboot Thread-Topic: Unable to UEFI boot 11.2 via pxeboot Thread-Index: AQHUKMhMn24QMJWRqkeXKQYwbojdqqSsQBQAgAAGdACAAAOogIABOfIAgAANfwCAADuNgA== Date: Fri, 3 Aug 2018 11:50:14 +0000 Message-ID: <679C6D10-4951-4669-8B8A-53EAB358FAA3@fh-muenster.de> References: <3DF39C46-977E-4D07-AF23-F0C7D5DAF2E6@fh-muenster.de> <9A67D337-ADC9-4B19-A44D-6C08135861D3@me.com> In-Reply-To: Accept-Language: en-US, de-DE Content-Language: en-US X-MS-Has-Attach: yes X-MS-TNEF-Correlator: x-originating-ip: [10.40.10.31] Content-Type: multipart/signed; boundary="Apple-Mail=_CC385DA5-9338-491F-B7D1-F70CCCF6D922"; protocol="application/pkcs7-signature"; micalg=sha1 MIME-Version: 1.0 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 03 Aug 2018 11:50:17 -0000 --Apple-Mail=_CC385DA5-9338-491F-B7D1-F70CCCF6D922 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=utf-8 > On 3. Aug 2018, at 10:17, Toomas Soome wrote: >=20 >=20 >=20 >> On 3 Aug 2018, at 10:28, Timo V=C3=B6lker = wrote: >>=20 >> Hi Toomas, >>=20 >> it seems your fix works here. Some of the error messages remain, but = I was able to (pxe)boot without a USB stick plugged in. >>=20 >> https://ibb.co/g8Bkfe >>=20 >> Right after the moment from the screenshot, the FreeBSD boot manager = showed up. >>=20 >> Thanks, >>=20 >> Timo >=20 > Ok, so far so good. As seen from the screen dump, some cleanup is = required, I do not think we should print about efipart_inithandles() in = case of errno 2 - thats perfectly normal case if there are no block = devices. Update commited:) >=20 > rgds, > toomas It still works and it looks better with less error messages :-) https://ibb.co/bVv9Oz Thanks, Timo >=20 >>=20 >>> On 2. Aug 2018, at 14:45, Toomas Soome wrote: >>>=20 >>> Could you check the current with = https://svnweb.freebsd.org/changeset/base/337131 >>>=20 >>> thanks, >>> toomas >>>=20 >>>> On 2 Aug 2018, at 15:32, Toomas Soome wrote: >>>>=20 >>>>=20 >>>>=20 >>>>> On 2 Aug 2018, at 15:08, Timo V=C3=B6lker = wrote: >>>>>=20 >>>>> It seems this issue is related to current as well. I did a quick = test and got this output, while I tried to (pxe)boot FreeBSD current = (without a USB stick plugged in) >>>>>=20 >>>>> https://ibb.co/no8Fve >>>>>=20 >>>>> Best regards >>>>>=20 >>>>> Timo >>>>=20 >>>> the hint is about efipart_inithandles() returning 2, thats errno = code for ENOENT. congratz, you have hit the corner case:D >>>>=20 >>>> Since efinet_dev is part of devsw, we can not skip the devswitch = init with such error, we still need to walk the list. Let me see if I = can provide quick fix. >>>>=20 >>>> rgds, >>>> toomas >>>>=20 >>>>=20 >>>>>=20 >>>>>> On 31. Jul 2018, at 14:16, Timo V=C3=B6lker = wrote: >>>>>>=20 >>>>>> Hi, >>>>>>=20 >>>>>> I'm unable to boot up the amd64 11.2 via pxeboot using UEFI on a = Dell PowerEdge R430. I get this output >>>>>>=20 >>>>>> https://ibb.co/h5ntuT >>>>>>=20 >>>>>> If I press a key to interrupt reboot, I get to the OK prompt. If = I enter lsdev -v, it prints nothing more than "net devices:". The = variable currdev is not set (show currdev prints variable 'currdev' not = found). I configured pxeboot to be the one and only boot medium in BIOS = setup.=20 >>>>>>=20 >>>>>> However, I found a workaround that works for me. If I put an = (empty) USB stick in a USB port of the PowerEdge, it successfully boots = via pxeboot (which is still the one and only configured boot medium). I = then get this output >>>>>>=20 >>>>>> https://ibb.co/mU8SM8 >>>>>>=20 >>>>>> With FreeBSD 11.1 pxeboot worked on the Dell PowerEdge R430, even = without a USB stick plugged in. I couldn't test this with FreeBSD = 12-current. Hope this helps anyway to find an open issue. >>>>>>=20 >>>>>> I found this thread which seems to be related. >>>>>>=20 >>>>>> = https://lists.freebsd.org/pipermail/freebsd-current/2018-July/070082.html >>>>>>=20 >>>>>> Thanks, >>>>>>=20 >>>>>> Timo >>>>>=20 >>>>=20 >>>=20 >>=20 >=20 --Apple-Mail=_CC385DA5-9338-491F-B7D1-F70CCCF6D922 Content-Disposition: attachment; filename="smime.p7s" Content-Type: application/pkcs7-signature; name="smime.p7s" Content-Transfer-Encoding: base64 MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIQsDCCBRIw ggP6oAMCAQICCQDjC9X4ryXZgTANBgkqhkiG9w0BAQsFADCBgjELMAkGA1UEBhMCREUxKzApBgNV BAoMIlQtU3lzdGVtcyBFbnRlcnByaXNlIFNlcnZpY2VzIEdtYkgxHzAdBgNVBAsMFlQtU3lzdGVt cyBUcnVzdCBDZW50ZXIxJTAjBgNVBAMMHFQtVGVsZVNlYyBHbG9iYWxSb290IENsYXNzIDIwHhcN MTYwMjIyMTMzODIyWhcNMzEwMjIyMjM1OTU5WjCBlTELMAkGA1UEBhMCREUxRTBDBgNVBAoTPFZl cmVpbiB6dXIgRm9lcmRlcnVuZyBlaW5lcyBEZXV0c2NoZW4gRm9yc2NodW5nc25ldHplcyBlLiBW LjEQMA4GA1UECxMHREZOLVBLSTEtMCsGA1UEAxMkREZOLVZlcmVpbiBDZXJ0aWZpY2F0aW9uIEF1 dGhvcml0eSAyMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAy2DX/2ahQc3S+oeXinOr mU3qZzlaoWCARxVOjJWy5c/O01dLjc74VmwVVXYH6kb9yANFYz5w1KtUgLEjnL43KKkJ/wVdGA/E mJk3syD2ZngXh8KdDsxKMucWna4OjSl5BwAgVNwVX0qW13i2NNPBdLWd6b/Ad03qvVkH4FovbDyl ANw1vWUNj38ybfJaaktiAe6sODRZRTZJBdp4ymptW8CBaxHM0jyoi/hxGso74oDdFrRneos26k6R KT2zUVytqAy+nTTj0Q0Xg3XEOR6wlAsS8dVpjiX0uD0rv8COwx47pb9VEKsqrheXXjPOyPP0CQfj AoYxRmsBxRAMEcdZ6QIDAQABo4IBdDCCAXAwDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBST49gy JtrV8UqlkUrg6kviogzP4TAfBgNVHSMEGDAWgBS/WSA2AHmgoCJrjNXyYdK4LMuCSjASBgNVHRMB Af8ECDAGAQH/AgECMDMGA1UdIAQsMCowDwYNKwYBBAGBrSGCLAEBBDANBgsrBgEEAYGtIYIsHjAI BgZngQwBAgIwTAYDVR0fBEUwQzBBoD+gPYY7aHR0cDovL3BraTAzMzYudGVsZXNlYy5kZS9ybC9U ZWxlU2VjX0dsb2JhbFJvb3RfQ2xhc3NfMi5jcmwwgYYGCCsGAQUFBwEBBHoweDAsBggrBgEFBQcw AYYgaHR0cDovL29jc3AwMzM2LnRlbGVzZWMuZGUvb2NzcHIwSAYIKwYBBQUHMAKGPGh0dHA6Ly9w a2kwMzM2LnRlbGVzZWMuZGUvY3J0L1RlbGVTZWNfR2xvYmFsUm9vdF9DbGFzc18yLmNlcjANBgkq hkiG9w0BAQsFAAOCAQEAhwv/PgKbZchWLdY7mpiLcU/auimqIflGLvWypA+uETh5OLMOdLp2XZ7o GIKWYttMM+jd+WrfMr0sTEdgVX/ndGu0LIPYeWu2t01QC2YHte2zl63q7n8w5pn9IuJyTT6EW+75 z5nqf9dSOS6smABEfmk7v3Xu0As7Gs3l9w8ibEeE9qVHoP3QGjR9rdI9d7Pu9NdN/8Po5ZJPWT6Q RxBKsIVYwG9/+K7tCEKeHtTfFC5Nj7yelMPn7fYY+DxJ5yaopzbYLN4izYuC2Nl44lUSozuHRLYR C9UMUq9pjA8G39CiU4tXmHvP/Qck9Py9w/1KkgKXG/K3ts9lihqitXIZOTCCBawwggSUoAMCAQIC BxtjutAeLD0wDQYJKoZIhvcNAQELBQAwgZUxCzAJBgNVBAYTAkRFMUUwQwYDVQQKEzxWZXJlaW4g enVyIEZvZXJkZXJ1bmcgZWluZXMgRGV1dHNjaGVuIEZvcnNjaHVuZ3NuZXR6ZXMgZS4gVi4xEDAO BgNVBAsTB0RGTi1QS0kxLTArBgNVBAMTJERGTi1WZXJlaW4gQ2VydGlmaWNhdGlvbiBBdXRob3Jp dHkgMjAeFw0xNjA1MjQxMTM4NDBaFw0zMTAyMjIyMzU5NTlaMIGNMQswCQYDVQQGEwJERTFFMEMG A1UECgw8VmVyZWluIHp1ciBGb2VyZGVydW5nIGVpbmVzIERldXRzY2hlbiBGb3JzY2h1bmdzbmV0 emVzIGUuIFYuMRAwDgYDVQQLDAdERk4tUEtJMSUwIwYDVQQDDBxERk4tVmVyZWluIEdsb2JhbCBJ c3N1aW5nIENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAnTt5HEfeH4bLxmnXEJ45 19miMNtyHAV/KV9LaPGtGdZM4WsbsQt/oavge4uL2C3Obog6EO5X5R5/BFE267pwbWOgvpYuQOHR g0xmPRxkaeWbpK1yrmg5UYd5zBfTri9dY3FLOXrrQqeXkGkFv5D/pEBwvQPnv54YiB+fmYhNDkeN SF9lmRDS2SpJ7cG5LR2fEssV0z9/HlQvOq6TV6d+eMrVSuIa5e1BfVNfyLMq9YowrO0XBSQ/tqAL B/1NGpoDUqA2nN4kh2Xk5/rHlnMkFM3Q6BtonhhZrnZ+99EKeDyHS7A3z1PKOjgQ88tHbYxkPTxa RUq6yoB8uPPnp0xMzQIDAQABo4ICBTCCAgEwEgYDVR0TAQH/BAgwBgEB/wIBATAOBgNVHQ8BAf8E BAMCAQYwKQYDVR0gBCIwIDANBgsrBgEEAYGtIYIsHjAPBg0rBgEEAYGtIYIsAQEEMB0GA1UdDgQW BBRrOpiL+fJTidrgrbIyHgkf6Ko7dDAfBgNVHSMEGDAWgBST49gyJtrV8UqlkUrg6kviogzP4TCB jwYDVR0fBIGHMIGEMECgPqA8hjpodHRwOi8vY2RwMS5wY2EuZGZuLmRlL2dsb2JhbC1yb290LWcy LWNhL3B1Yi9jcmwvY2FjcmwuY3JsMECgPqA8hjpodHRwOi8vY2RwMi5wY2EuZGZuLmRlL2dsb2Jh bC1yb290LWcyLWNhL3B1Yi9jcmwvY2FjcmwuY3JsMIHdBggrBgEFBQcBAQSB0DCBzTAzBggrBgEF BQcwAYYnaHR0cDovL29jc3AucGNhLmRmbi5kZS9PQ1NQLVNlcnZlci9PQ1NQMEoGCCsGAQUFBzAC hj5odHRwOi8vY2RwMS5wY2EuZGZuLmRlL2dsb2JhbC1yb290LWcyLWNhL3B1Yi9jYWNlcnQvY2Fj ZXJ0LmNydDBKBggrBgEFBQcwAoY+aHR0cDovL2NkcDIucGNhLmRmbi5kZS9nbG9iYWwtcm9vdC1n Mi1jYS9wdWIvY2FjZXJ0L2NhY2VydC5jcnQwDQYJKoZIhvcNAQELBQADggEBAIF4RaROpH8OVfAJ sWo+eMxoNakc85WeP/P432s4d4ksjbWtPsfylM2gBq66zKixrTMItiSGYjZMeG5Q8NVuYI1PUjFD l0Z18GLkbmZRwUIxZ1DlSec5HsufyoZI3ggU/xVLK2aboDifAM79p+vRf1ctyExf3BARlz6WBAJc hKgpOWyU/BCSBnue7thGtBu1Aww42dywqT9xBguyAwczwo1IYyUlPHp7V273igU477igri/02wfV W4QYwam4S85skBqC5Lk9+nfx0h8zAr9T53b53CYlQW8vphv6pBOQ+nx+2QtgXey/ykGgYfsRSSnY qC11FdhKGOoW71U0IhoTjQYwggXmMIIEzqADAgECAgwdgtH8FJ0VCMZ26e4wDQYJKoZIhvcNAQEL BQAwgY0xCzAJBgNVBAYTAkRFMUUwQwYDVQQKDDxWZXJlaW4genVyIEZvZXJkZXJ1bmcgZWluZXMg RGV1dHNjaGVuIEZvcnNjaHVuZ3NuZXR6ZXMgZS4gVi4xEDAOBgNVBAsMB0RGTi1QS0kxJTAjBgNV BAMMHERGTi1WZXJlaW4gR2xvYmFsIElzc3VpbmcgQ0EwHhcNMTcwNzEwMTAxODIwWhcNMjAwNzA5 MTAxODIwWjB6MQswCQYDVQQGEwJERTEgMB4GA1UECgwXRmFjaGhvY2hzY2h1bGUgTXVlbnN0ZXIx MjAwBgNVBAsMKUZhY2hiZXJlaWNoIEVsZWt0cm90ZWNobmlrIHVuZCBJbmZvcm1hdGlrMRUwEwYD VQQDDAxUaW1vIFZvZWxrZXIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC/gQYu/Hjb 3078pLzYaFpcgo/JHZHLjOLe85YFMr056WFSN/Jwdh1Asny4ZKcLzHd7vMjr3fjg8Sgo04y+lBI4 8O5FJTgixYB1oV9DU5GlWcC/6eLhpIPNraOcK4KJVlwqw7uc1L8fbyjCMrTNtYHFEy23B9NFgxbS pxhQ6FCgS6kjziTgFL6s072+j6MMJi1RdZZUNZGq52gCyIKNAxMt2b42/Kk7PTWYCSA8HzxrLsQe YxmxoxLoGTlnZxuC8WKU+1V1pUiS+Ns3krHHBHIeeogR/JeILBX0OheqStUnnEABcsWj+4uGYxvP RdZXBXm8wKjcRcnJDrKizS4G6j27AgMBAAGjggJWMIICUjBABgNVHSAEOTA3MBEGDysGAQQBga0h giwBAQQDBTARBg8rBgEEAYGtIYIsAgEEAwEwDwYNKwYBBAGBrSGCLAEBBDAJBgNVHRMEAjAAMA4G A1UdDwEB/wQEAwIF4DAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwQwHQYDVR0OBBYEFOOJ r1RvTOvocygvlHm6xGfZS5dNMB8GA1UdIwQYMBaAFGs6mIv58lOJ2uCtsjIeCR/oqjt0MCYGA1Ud EQQfMB2BG3RpbW8udm9lbGtlckBmaC1tdWVuc3Rlci5kZTCBjQYDVR0fBIGFMIGCMD+gPaA7hjlo dHRwOi8vY2RwMS5wY2EuZGZuLmRlL2Rmbi1jYS1nbG9iYWwtZzIvcHViL2NybC9jYWNybC5jcmww P6A9oDuGOWh0dHA6Ly9jZHAyLnBjYS5kZm4uZGUvZGZuLWNhLWdsb2JhbC1nMi9wdWIvY3JsL2Nh Y3JsLmNybDCB2wYIKwYBBQUHAQEEgc4wgcswMwYIKwYBBQUHMAGGJ2h0dHA6Ly9vY3NwLnBjYS5k Zm4uZGUvT0NTUC1TZXJ2ZXIvT0NTUDBJBggrBgEFBQcwAoY9aHR0cDovL2NkcDEucGNhLmRmbi5k ZS9kZm4tY2EtZ2xvYmFsLWcyL3B1Yi9jYWNlcnQvY2FjZXJ0LmNydDBJBggrBgEFBQcwAoY9aHR0 cDovL2NkcDIucGNhLmRmbi5kZS9kZm4tY2EtZ2xvYmFsLWcyL3B1Yi9jYWNlcnQvY2FjZXJ0LmNy dDANBgkqhkiG9w0BAQsFAAOCAQEAGEYW34tG4ACeQk3vN6TBr9HRRE4Rc3tJoh5odaAx4UDnO6B7 EsTOSyZmJ5jdY6ui8ns9jiwwv6yZsuhopqSatS06aSlXoJ7GWBeTS9FbDu4Fa3+Hmfo+UiqG0cul MLOfKasuZx8bsoOq1kR7WdABUL3m7FuLhIVEeuJ39yQSiWxwJ4jZ5Cx0evaXIcGDIXOE9e+GcXz2 mm1yfFxITLHt5q37phfTDLH4IOgWt9GORlDBoatSu56QwfRGwhVYmkTRrUFss3QuQ/z3SwOt30Lj MNdVk6OkQBNj9QBH5PSH/Ok/JIQODVotZWG7HQ8/8nyzYTH0ccW/1HIrCwvKicZJcTGCA40wggOJ AgEBMIGeMIGNMQswCQYDVQQGEwJERTFFMEMGA1UECgw8VmVyZWluIHp1ciBGb2VyZGVydW5nIGVp bmVzIERldXRzY2hlbiBGb3JzY2h1bmdzbmV0emVzIGUuIFYuMRAwDgYDVQQLDAdERk4tUEtJMSUw IwYDVQQDDBxERk4tVmVyZWluIEdsb2JhbCBJc3N1aW5nIENBAgwdgtH8FJ0VCMZ26e4wCQYFKw4D AhoFAKCCAcMwGAYJKoZIhvcNAQkDMQsGCSqGSIb3DQEHATAcBgkqhkiG9w0BCQUxDxcNMTgwODAz MTE1MDE0WjAjBgkqhkiG9w0BCQQxFgQUBTLB6yhWFmmb6QWylSwlcseWPRIwga8GCSsGAQQBgjcQ BDGBoTCBnjCBjTELMAkGA1UEBhMCREUxRTBDBgNVBAoMPFZlcmVpbiB6dXIgRm9lcmRlcnVuZyBl aW5lcyBEZXV0c2NoZW4gRm9yc2NodW5nc25ldHplcyBlLiBWLjEQMA4GA1UECwwHREZOLVBLSTEl MCMGA1UEAwwcREZOLVZlcmVpbiBHbG9iYWwgSXNzdWluZyBDQQIMHYLR/BSdFQjGdunuMIGxBgsq hkiG9w0BCRACCzGBoaCBnjCBjTELMAkGA1UEBhMCREUxRTBDBgNVBAoMPFZlcmVpbiB6dXIgRm9l cmRlcnVuZyBlaW5lcyBEZXV0c2NoZW4gRm9yc2NodW5nc25ldHplcyBlLiBWLjEQMA4GA1UECwwH REZOLVBLSTElMCMGA1UEAwwcREZOLVZlcmVpbiBHbG9iYWwgSXNzdWluZyBDQQIMHYLR/BSdFQjG dunuMA0GCSqGSIb3DQEBAQUABIIBAJKTGVAIMRexQugbu3ZjScT4XFOK4MovisI4kIh4a8QXhcnt lGwQVXalIdbtBrIqDlWlYJM5AHpU8H0UqKoaLWj4jcjXP6lV8P2KIvsOUEdFjvbhpMQN2YjFV1An ZHq0IMXi33iv5klaxC7wmMyn/rVu7E6hGzbeCe4Mj6o/9dHqjv5yHvfLnOVSeMT1t4taHrBFYAom fNGtRFlCofidNxxdGJw9OBq3gMSEndWFeFXaJZ9T9Hd64qEAw0qY4Q2H5LibYABtwjq3LGRrwJBn 0TFaFtZIuuNWdRQqlWAEkn4i2ZLjTqh8GDx4K/+gaFTvKCqDXj7XhE/S0bQJDLTy+30AAAAAAAA= --Apple-Mail=_CC385DA5-9338-491F-B7D1-F70CCCF6D922-- From owner-freebsd-hackers@freebsd.org Fri Aug 3 21:13:10 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id CDE9D105100D for ; Fri, 3 Aug 2018 21:13:09 +0000 (UTC) (envelope-from marklmi@yahoo.com) Received: from sonic317-21.consmr.mail.gq1.yahoo.com (sonic317-21.consmr.mail.gq1.yahoo.com [98.137.66.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id EEE947587E for ; Fri, 3 Aug 2018 21:13:08 +0000 (UTC) (envelope-from marklmi@yahoo.com) X-YMail-OSG: 4WSHpvUVM1l7OpOTmJW3nxJmARMzGOhHWSWrA.d7Ww98uI.TKeEMGwToYb_Tvjj MBs1NkbV9r4zoWnt1rWlKm0FhLMt1Kqzvywq7tvrSb_QnX7AoxsKN4IMubB8Uz4W0ZtW.CdD8XkL jhIu4c7RP1VlM8JeQxwGdXEXJfJFBZN.y3DTliALakz724iZt6IabC_5MA8Y_jkNKWD6sqenI0wW uN1utFoLaoAW.diaGhX4tukuZNzutq0AxCabGYHplztxWCJJmWRWAGKpEHa2EsuxT873Gc7BJQrA bhDs0dKbdjUPCTAQ_RUPKFhkgTynqGMOOeODH7Mr11dRKKAriUR7FmT8e0r.4DaFMs_O8ZO8Fo.m RkR9d2RxhhSZw4cKmXrxUrduZEG9fG4GcYeErylxMgyyZhgP10NLYJEzjSmLtupZT1wwrn.EB61v limR_ZkETv4Dm6jJwlJ_McNvNP_SNxF.xEGn5OY30bednnj22Qyp5zQlsKFGQo25NiYCOiscweLl d7JriiHNOu2s3UcGbPuirzVeZTddCaaDdvQv7FVSdseGXOva3tzhdCzjfhLUbT9_rLDwIfpKVY1B acvachwn8N0VW3Z6XUZYO5Uypbn7W02oONgepVU3Cv8Quy9_sGSu2fmC9oP5OaPwxbjARHOnLmnm qokRjfyOjmsOgpWchPZRcJ3dfk0pF2WG05clwb0Oc2z9CchBr78KiezHgLdAENeFXl8FtXRxFXKT .Ydrslm0TlFSPKcwzHbOPG.QfRGCG.lhTApaMnXCxuVqWtkTuaWlLdC.fKcaXgvUh0URE9rPfZWk xAa0fSNB9J21eWRemM15MaMxsTVJTLGDm8kSYCN.XAvJSmiZsqUNEXwqtbmsM7OiVzjnNA8fvRqf uqm_dik4AwDUucZk5PULvGcQX_uz9ucXY0xQYcDqzdri8MsvH1co1IIZeu1WV7Ne3q1abdec0JME sOPSZwa1rxVzqtW2gwriSCDfwl0HLL7If1WJjPpzwZ0gx6kaJDCYKnhno4LIHVqmPhyvuN4lXPqJ gdf2plRAEgbwGEfo79g-- Received: from sonic.gate.mail.ne1.yahoo.com by sonic317.consmr.mail.gq1.yahoo.com with HTTP; Fri, 3 Aug 2018 21:13:01 +0000 Received: from ip70-189-131-151.lv.lv.cox.net (EHLO [192.168.0.105]) ([70.189.131.151]) by smtp412.mail.gq1.yahoo.com (Oath Hermes SMTP Server) with ESMTPA ID 37df12fa32bf2493899491448ee57466; Fri, 03 Aug 2018 21:12:56 +0000 (UTC) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\)) Subject: Re: svn commit: r335873 - in head: . sys/amd64/amd64 sys/amd64/include sys/conf sys/i386/i386 sys/i386/include sys/sys sys/vm From: Mark Millard In-Reply-To: <20180801075704.GS40119@kib.kiev.ua> Date: Fri, 3 Aug 2018 14:12:55 -0700 Cc: mmacy@FreeBSD.org, svn-src-head@freebsd.org, freebsd-hackers@freebsd.org, freebsd-amd64@freebsd.org Content-Transfer-Encoding: quoted-printable Message-Id: <3910BFAA-45CF-4A5F-AF08-A47585BFF9C2@yahoo.com> References: <226713AF-FC51-4A44-93E1-8264B1BD2C8A@yahoo.com> <20180801075704.GS40119@kib.kiev.ua> To: Konstantin Belousov X-Mailer: Apple Mail (2.3445.9.1) X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 03 Aug 2018 21:13:10 -0000 On 2018-Aug-1, at 12:57 AM, Konstantin Belousov = wrote: >=20 > On Tue, Jul 31, 2018 at 06:46:31PM -0700, Mark Millard via = freebsd-amd64 wrote: >>> Author: mmacy >>> Date: Mon Jul 2 19:48:38 2018 >>> New Revision: 335873 >>> URL:=20 >>> https://svnweb.freebsd.org/changeset/base/335873 >>>=20 >>>=20 >>> Log: >>> inline atomics and allow tied modules to inline locks >>>=20 >>> - inline atomics in modules on i386 and amd64 (they were always >>> inline on other arches) >>> - allow modules to opt in to inlining locks by specifying >>> MODULE_TIED=3D1 in the makefile >>=20 >> I recently found the following about ABI incompatibilities >> between clang and gcc relative to C11 language based >> atomics: >>=20 >> https://bugs.llvm.org/show_bug.cgi?id=3D26462 >>=20 >> 26462 ??? GCC/clang C11 _Atomic incompatibility >>=20 >>=20 >> So are there implications about building the kernel >> vs. modules that overall mix the toolchains once >> modules are loaded? Do the toolchains need to match, >> at least for amd64 and i386 TARGET_ARCH 's? > This is irrelevant since kernel does not use C11 atomics, we roll > our own version, which tries to follow C11 model. >=20 > Lack of the ABI for atomics is one of the reason to not use compiler > C11 atomics in kernel and C runtime. Thanks for the information: good to know. There are other things around that use C11 atomics, such as in: src/contrib/ofed/librdmacm/ (This is part of why https://reviews.freebsd.org/D16585 is out for updating stdatomic.h (and sys/cdefs.h ): so that fairly modern gcc vintages can build world with such involved.) =3D=3D=3D Mark Millard marklmi at yahoo.com ( dsl-only.net went away in early 2018-Mar) From owner-freebsd-hackers@freebsd.org Sat Aug 4 22:09:03 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 8811D1054952; Sat, 4 Aug 2018 22:09:03 +0000 (UTC) (envelope-from kaduk@mit.edu) Received: from dmz-mailsec-scanner-3.mit.edu (dmz-mailsec-scanner-3.mit.edu [18.9.25.14]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 1367D8A914; Sat, 4 Aug 2018 22:09:03 +0000 (UTC) (envelope-from kaduk@mit.edu) X-AuditID: 1209190e-57fff70000007f9c-29-5b6622cb2425 Received: from mailhub-auth-3.mit.edu ( [18.9.21.43]) (using TLS with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by dmz-mailsec-scanner-3.mit.edu (Symantec Messaging Gateway) with SMTP id 85.A9.32668.CC2266B5; Sat, 4 Aug 2018 18:03:56 -0400 (EDT) Received: from outgoing.mit.edu (OUTGOING-AUTH-1.MIT.EDU [18.9.28.11]) by mailhub-auth-3.mit.edu (8.13.8/8.9.2) with ESMTP id w74M3rZD021204; Sat, 4 Aug 2018 18:03:54 -0400 Received: from kduck.kaduk.org (24-107-191-124.dhcp.stls.mo.charter.com [24.107.191.124]) (authenticated bits=56) (User authenticated as kaduk@ATHENA.MIT.EDU) by outgoing.mit.edu (8.13.8/8.12.4) with ESMTP id w74M3nrs010151 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Sat, 4 Aug 2018 18:03:51 -0400 Date: Sat, 4 Aug 2018 17:03:49 -0500 From: Benjamin Kaduk To: Eric McCorkle Cc: Warner Losh , FreeBSD Hackers , "freebsd-arch@freebsd.org" , freebsd-current , freebsd-security Subject: Re: Status of OpenSSL 1.1.1 Message-ID: <20180804220349.GJ68224@kduck.kaduk.org> References: <20180802234519.GD68224@kduck.kaduk.org> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: User-Agent: Mutt/1.9.1 (2017-09-22) X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFlrOKsWRmVeSWpSXmKPExsUixCmqrXtGKS3aYE+PoMW36X9ZLGZPn8Zk MefNByaL7Zv/MVr0bHrCZvF063JGBzaPD7u/snrM+DSfxePejglMAcxRXDYpqTmZZalF+nYJ XBmbWqQKdghXbLh5lrmB8SVvFyMnh4SAicSzTx8Zuxi5OIQEFjNJLNw4EcrZwChx9OgLZgjn CpPEv642li5GDg4WARWJ2WcVQLrZgMyG7svMIGERAQ2J+bsFQcqZBbqYJH5NOssCUiMMVNN9 6T4ziM0LtO3BqitQM98ySTzZ8oQNIiEocXLmE7AGZgEdiZ1b77CBDGUWkJZY/o8DIiwv0bx1 NtgcTgFnibe7v7KD2KICyhJ7+w6xT2AUnIVk0iwkk2YhTJqFZNICRpZVjLIpuVW6uYmZOcWp ybrFyYl5ealFusZ6uZkleqkppZsYwXEgybeDcVKD9yFGAQ5GJR7eEzxp0UKsiWXFlbmHGCU5 mJREeU0vp0QL8SXlp1RmJBZnxBeV5qQWH2KU4GBWEuH935AaLcSbklhZlVqUD5OS5mBREue9 VxMeLSSQnliSmp2aWpBaBJOV4eBQkuA9oQi0R7AoNT21Ii0zpwQhzcTBCTKcB2i4H0gNb3FB Ym5xZjpE/hSjLsef91MnMQux5OXnpUqJ81aBFAmAFGWU5sHNAaUviez9Na8YxYHeEuaVASYz IR5g6oOb9ApoCRPQkmoTkA+KSxIRUlINjOq3b4TMurCu6EJmaMvyo/0P3f9kfuZ9+fvwzDUf /Sbu1PjxjC3xj/O8kIeWGk9fROzpnvBS5JjzliaRPT5ZTUqz08+GsaTdkNgr1vU45NJhX/Oo KGcJUZfm2tmbLARzrm7devDNwTYdoeOZBiJKBzlWFn3plK0MY376uubx9EnN5ue7/x6J01Fi Kc5INNRiLipOBACMabjjOgMAAA== X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 04 Aug 2018 22:09:03 -0000 On Fri, Aug 03, 2018 at 07:02:18AM -0400, Eric McCorkle wrote: > On 08/03/2018 04:44, Warner Losh wrote: > > > > > > On Thu, Aug 2, 2018 at 5:45 PM, Benjamin Kaduk > > wrote: > > > > On Wed, Aug 01, 2018 at 10:05:28AM -0400, Eric McCorkle wrote: > > > On 08/01/2018 09:02, Warner Losh wrote: > > > > > > > > > > > > On Wed, Aug 1, 2018, 12:31 PM Eric McCorkle > > > > > > >> wrote: > > > > > > > >     Hi folks, > > > > > > > >     I'm wondering what's the status of OpenSSL 1.1.1 integration > > into base? > > > >     More specifically, is there a repo or a branch that's > > started the > > > >     integration?  I'm aware of the wiki page and the list of > > port build > > > >     issues, but that seems to be based on replacing the base > > OpenSSL with a > > > >     port build (similar to the way one replaces it with LibreSSL). > > > > > > > >     I have some work I'd like to do that's gating on sorting out the > > > >     kernel/loader crypto situation, and I'd very much like to > > see OpenSSL > > > >     1.1.1 get merged, so I can start to look into doing that. > > > > > > > > > > > > There are patches to use bear SSL for the loader. OpenSSL is > > simply too > > > > large to use due to limits the loader operates under. > > > > > > I was going to look into the feasibility of doing something like what > > > LibreSSL does with portable, where they extract a subset of the full > > > library designed to be embedded in the kernel, loader, etc. > > > > > > I think it ought to be possible to do something like that, but it > > really > > > ought to be done in a tree with 1.1.1 integrated. > > > > > > > It wouldn't be terribly easy or effective, IMO.  OpenSSL wasn't designed > > with such modularity in mind. > > > > > > Others that have tried have found OpenSSL to be way too large for the > > boot loader and a completely impossible to subset enough to get things > > small enough due to the intertwingled nature of things. > > To what extent, if any, does this change in 1.1.1, though? > Probably not enough -- while libssl got a bit reorganized, libcrypto hasn't changed much. -Ben