From owner-freebsd-current@freebsd.org Sun Aug 25 06:24:21 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id BB426D69B8 for ; Sun, 25 Aug 2019 06:24:21 +0000 (UTC) (envelope-from kostikbel@gmail.com) Received: from kib.kiev.ua (kib.kiev.ua [IPv6:2001:470:d5e7:1::1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 46GQ8N39hmz4bdK for ; Sun, 25 Aug 2019 06:24:20 +0000 (UTC) (envelope-from kostikbel@gmail.com) Received: from tom.home (kib@localhost [127.0.0.1]) by kib.kiev.ua (8.15.2/8.15.2) with ESMTPS id x7P6O7k6018867 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO); Sun, 25 Aug 2019 09:24:11 +0300 (EEST) (envelope-from kostikbel@gmail.com) DKIM-Filter: OpenDKIM Filter v2.10.3 kib.kiev.ua x7P6O7k6018867 Received: (from kostik@localhost) by tom.home (8.15.2/8.15.2/Submit) id x7P6O7uI018866; Sun, 25 Aug 2019 09:24:07 +0300 (EEST) (envelope-from kostikbel@gmail.com) X-Authentication-Warning: tom.home: kostik set sender to kostikbel@gmail.com using -f Date: Sun, 25 Aug 2019 09:24:07 +0300 From: Konstantin Belousov To: Rebecca Cran Cc: FreeBSD Current Subject: Re: Panic on boot with r351461 (AMD ThreadRipper 2990WX) Message-ID: <20190825062407.GL71821@kib.kiev.ua> References: <6e5687b2-ab3f-a570-37ab-72c8a9776167@bsdio.com> <20190824203305.GF71821@kib.kiev.ua> <20190824230801.GK71821@kib.kiev.ua> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: User-Agent: Mutt/1.12.1 (2019-06-15) X-Spam-Status: No, score=-1.0 required=5.0 tests=ALL_TRUSTED,BAYES_00, DKIM_ADSP_CUSTOM_MED,FORGED_GMAIL_RCVD,FREEMAIL_FROM, NML_ADSP_CUSTOM_MED autolearn=no autolearn_force=no version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tom.home X-Rspamd-Queue-Id: 46GQ8N39hmz4bdK X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=fail reason="No valid SPF, No valid DKIM" header.from=gmail.com (policy=none); spf=softfail (mx1.freebsd.org: 2001:470:d5e7:1::1 is neither permitted nor denied by domain of kostikbel@gmail.com) smtp.mailfrom=kostikbel@gmail.com X-Spamd-Result: default: False [-2.98 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; RCVD_TLS_ALL(0.00)[]; FROM_HAS_DN(0.00)[]; FREEMAIL_FROM(0.00)[gmail.com]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; HAS_XAW(0.00)[]; R_SPF_SOFTFAIL(0.00)[~all]; IP_SCORE_FREEMAIL(0.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; TO_DN_ALL(0.00)[]; NEURAL_HAM_SHORT(-0.98)[-0.981,0]; RCPT_COUNT_TWO(0.00)[2]; IP_SCORE(0.00)[ip: (-2.54), ipnet: 2001:470::/32(-4.43), asn: 6939(-3.06), country: US(-0.05)]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:6939, ipnet:2001:470::/32, country:US]; RCVD_COUNT_TWO(0.00)[2]; FREEMAIL_ENVFROM(0.00)[gmail.com]; DMARC_POLICY_SOFTFAIL(0.10)[gmail.com : No valid SPF, No valid DKIM,none] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 25 Aug 2019 06:24:21 -0000 On Sat, Aug 24, 2019 at 05:29:23PM -0600, Rebecca Cran wrote: > On 2019-08-24 17:08, Konstantin Belousov wrote: > > > > Use gdb instead. > > Ah, thanks. > > (gdb) info line *0xffffffff8117f67c > Line 405 of "/usr/src/sys/amd64/amd64/mp_machdep.c" starts at address > 0xffffffff8117f674 and ends at > 0xffffffff8117f69a > > > > What was the previous bootable version of the kernel ? > > I attempted to upgrade from r350575. > > > Do you happen to have NUMA node without any local memory ? (Look at the > > SRAT table). If yes, try this patch. > > After applying the patch, I get a crash with the following backtrace: What are the panic messages ? > > > vm_domainset_iter_first() What is the source line ? > > vm_domainset_iter_policy_init() > > kmem_malloc_domainset() > > native_start_all_aps() What is the source line ? > > cpu_mp_start() > > mp_start() > > mi_startup() > > > (gdb) info line *0xffffffff80f1027c > Line 102 of "/usr/src/sys/vm/vm_domainset.c" starts at address > 0xffffffff80f10267 >    and ends at 0xffffffff80f1027f . > > The SRAT contains: > > >     Type=Memory >     Flags={ENABLED} >     Base Address=0x0000000000000000 >     Length=0x00000000000a0000 >     Proximity Domain=0 > >     Type=Memory >     Flags={ENABLED} >     Base Address=0x0000000000100000 >     Length=0x000000007ff00000 >     Proximity Domain=0 > >     Type=Memory >     Flags={ENABLED} >     Base Address=0x0000000100000000 >     Length=0x0000000f80000000 >     Proximity Domain=0 > >     Type=Memory >     Flags={ENABLED} >     Base Address=0x0000001080000000 >     Length=0x0000001000000000 >     Proximity Domain=2 > > > -- > > Rebecca Cran From owner-freebsd-current@freebsd.org Sun Aug 25 12:24:03 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id E23CADE695 for ; Sun, 25 Aug 2019 12:24:03 +0000 (UTC) (envelope-from etnapierala@gmail.com) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 46GZ7R2wmdz3PZM for ; Sun, 25 Aug 2019 12:24:03 +0000 (UTC) (envelope-from etnapierala@gmail.com) Received: by mailman.nyi.freebsd.org (Postfix) id 62916DE690; Sun, 25 Aug 2019 12:24:03 +0000 (UTC) Delivered-To: current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 6219ADE68F; Sun, 25 Aug 2019 12:24:03 +0000 (UTC) (envelope-from etnapierala@gmail.com) Received: from mail-wm1-x343.google.com (mail-wm1-x343.google.com [IPv6:2a00:1450:4864:20::343]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46GZ7Q1Vqyz3PZJ; Sun, 25 Aug 2019 12:24:01 +0000 (UTC) (envelope-from etnapierala@gmail.com) Received: by mail-wm1-x343.google.com with SMTP id l2so13277908wmg.0; Sun, 25 Aug 2019 05:24:01 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:date:from:to:cc:subject:message-id:mail-followup-to :mime-version:content-disposition:user-agent; bh=zZ6WKY3O8X4I+U6oBekimjTf5ka+TAXgayDSFu6iQRs=; b=bmpGMbUAl4cR+QwEAtPTiOjp1JQ55gECaQWvoOlj40YBZ06057yT7tRCVQ9zf0HB5w rxzvO7ARPq/jsIg3JluiI9ePmQ7CAvqhHe55tHa9JWVv/px1uNmeQIttlHZv37hO8HW5 U889TQc41GJRQs3874RZiFYtcilj/7WHrEwt7er09CFMc0ajzN92ys133bwWz+EfJCMS dVXsjU+pCuJ+brioe9LFDsl8E0o5RCCmSN0g1vYQqVjnFRj77bxhQP48xYCv5No8L4B5 UCAptOSAcbnEj7eJKf9FLGozhfGRvSyTd9RT7lKRTQU/4oMyI3GkaK+f9gqtHUKJNpnb oKuQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:from:to:cc:subject:message-id :mail-followup-to:mime-version:content-disposition:user-agent; bh=zZ6WKY3O8X4I+U6oBekimjTf5ka+TAXgayDSFu6iQRs=; b=OhNTW4fhovrITziqj44ToQmAnevWMXgZKGILObAsNV1uEnWmsztQVetlcGyjP5jIG7 9Ldfz+kKDYjcsHzGw4XTAReOj0GM8Gq50rdiJcxN6Q/VzC3mJLabn95msMCHh8yyY7d1 EZaUGgDbuzRJbkX/OIxoiEoicCTzAsoT6d/huc9OCP1fRvs/82P3YPgUHXZiaUt+XbZO f1AC+aGdbsWNATa5yMRqqCfuaxJauosQuiN6MV+AS+y+9COLoYnE61xe3QNIJW68pLoj YbPHYzsr/SgG42SE7+JKtism8deKpS1xH0NLsdhBSv9S5ZbbjBn+JO+ccfORzjJANNdH /ByQ== X-Gm-Message-State: APjAAAVm+qU3VBvB/gQJtVuuJBv4CnG4iFI3HVt5Ub2O6vHl6mFgCFDG Ezt9apEGWQZ0F38qi6MqWaGjLSiL X-Google-Smtp-Source: APXvYqx3fCVfqyhjoJXcSTXKcRM5xVmq/MUBcXfK3sh1OCAo5tmPwnFMYlMlABs/uEMtcUvtYLevew== X-Received: by 2002:a1c:9950:: with SMTP id b77mr16298780wme.46.1566735838523; Sun, 25 Aug 2019 05:23:58 -0700 (PDT) Received: from v2 (79.184.195.241.ipv4.supernova.orange.pl. [79.184.195.241]) by smtp.gmail.com with ESMTPSA id f6sm22755553wrh.30.2019.08.25.05.23.56 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 25 Aug 2019 05:23:57 -0700 (PDT) Sender: =?UTF-8?Q?Edward_Tomasz_Napiera=C5=82a?= Date: Sun, 25 Aug 2019 13:23:32 +0100 From: Edward Tomasz =?utf-8?Q?Napiera=C5=82a?= To: hackers@freebsd.org Cc: current@freebsd.org, stable@freebsd.org Subject: FreeBSD Quarterly Status Report - Second Quarter 2019 Message-ID: <20190825122332.GA16293@v2> Mail-Followup-To: hackers@freebsd.org, current@freebsd.org, stable@freebsd.org MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="WIyZ46R2i8wDzkSu" Content-Disposition: inline User-Agent: Mutt/1.12.1 (2019-06-15) X-Rspamd-Queue-Id: 46GZ7Q1Vqyz3PZJ X-Spamd-Bar: ----- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=bmpGMbUA; dmarc=none; spf=pass (mx1.freebsd.org: domain of etnapierala@gmail.com designates 2a00:1450:4864:20::343 as permitted sender) smtp.mailfrom=etnapierala@gmail.com X-Spamd-Result: default: False [-5.15 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2a00:1450:4000::/36]; TO_DN_NONE(0.00)[]; RCVD_COUNT_THREE(0.00)[3]; DKIM_TRACE(0.00)[gmail.com:+]; NEURAL_HAM_SHORT(-0.92)[-0.922,0]; SIGNED_PGP(-2.00)[]; FORGED_SENDER(0.30)[trasz@freebsd.org,etnapierala@gmail.com]; MIME_TRACE(0.00)[0:+,1:+,2:~]; IP_SCORE(-0.43)[ip: (3.27), ipnet: 2a00:1450::/32(-3.01), asn: 15169(-2.34), country: US(-0.05)]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2a00:1450::/32, country:US]; FROM_NEQ_ENVFROM(0.00)[trasz@freebsd.org,etnapierala@gmail.com]; FORGED_RECIPIENTS(0.00)[hackers@freebsd.org ..,hackers@freebsd.org ...]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.20)[multipart/signed,text/plain]; DMARC_NA(0.00)[freebsd.org]; RCVD_IN_DNSWL_NONE(0.00)[3.4.3.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.5.4.1.0.0.a.2.list.dnswl.org : 127.0.5.0]; MID_RHS_NOT_FQDN(0.50)[]; RCVD_TLS_ALL(0.00)[] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 25 Aug 2019 12:24:04 -0000 --WIyZ46R2i8wDzkSu Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable FreeBSD Project Quarterly Status Report - 2nd Quarter 2019 This quarter our report includes some interesting topics easily accessible to anyone, even if you are not a programmer: we report the link to a presentation of the 2019 FreeBSD survey results at BSDCan 2019 and describe an interesting experience of a 3-person hackaton, which might encourage you to host one yourself, possibly with more participants. We also provide some up to date information about the status of our IRC channels. For those who have some more technical skills, we give some news about the role of git in the FreeBSD project, describe the status of some tools to hunt bugs or enhance security and announce a clone of sysctl. Finally, those who are more experienced with programming will probably be interested in the great work that has been done with drivers: in particular, an aknowledgement is due to Alan Somers for having started to bring up to date our FUSE implementation, which was about 11 years behind. Other important improvements include a more user-friendly experience with trackpoints and touchpads enabled by default, much low level work on graphics, many new bhyve features, updates to the linux compatibility layer, various kernel improvements. Have a nice read! -- Lorenzo Salvadore __________________________________________________________________ FreeBSD Team Reports * Continuous Integration * FreeBSD Core Team * FreeBSD Graphics Team status report * IRC Admin * Ports Collection * Release Engineering Team Projects * bhyve - Live Migration * bhyve - Save/Restore * BIO_DELETE support for the swap pager * ENA FreeBSD Driver Update * FreeBSD SDIO and Broadcom FullMAC WiFi Support * FUSE * Fuzzing FreeBSD with syzkaller * Kernel ZLIB Update * Linux compatibility layer update * Lock-less delayed invalidation for amd64 pmap * Locking changes for vnodes during execve(2) * Mellanox Drivers Update * NFSv4.2 client/server implementation for FreeBSD * NUMA awareness in the FreeBSD kernel Architectures * Broadcom ARM64 SoC support * NXP ARM64 SoC support Third-Party Projects * Aberdeen Hackathon * Bring more Security Intelligence to FreeBSD * libvdsk - QCOW2 implementation * nsysctl 1.0 __________________________________________________________________ FreeBSD Team Reports Entries from the various official and semi-official teams, as found in the Administration Page. Continuous Integration Links FreeBSD Jenkins Instance URL: https://ci.FreeBSD.org FreeBSD CI artifact archive URL: https://artifact.ci.FreeBSD.org/ FreeBSD Jenkins wiki URL: https://wiki.freebsd.org/Jenkins freebsd-testing Mailing List URL: https://lists.FreeBSD.org/mailman/listinfo/freebsd-testing freebsd-ci Repository URL: https://github.com/freebsd/freebsd-ci Tickets related to freebsd-testing@ URL: https://preview.tinyurl.com/y9maauwg Hosted CI wiki URL: https://wiki.freebsd.org/HostedCI FreeBSD CI weekly report URL: https://hackfoldr.org/freebsd-ci-report/ Contact: Jenkins Admin Contact: Li-Wen Hsu The FreeBSD CI team maintains continuous integration system and related tasks for the FreeBSD project. The CI system regularly checks the committed changes can be successfully built, then performs various tests and analysis of the results. The results from build jobs are archived in an artifact server, for the further testing and debugging needs. The CI team members examine the failing builds and unstable tests, and work with the experts in that area to fix the code or adjust test infrastructure. The details are of these efforts are available in the weekly CI reports. The FCP for CI policy is in "feedback" state, please provide any comments to freebsd-testing@ or other suitable lists. We had a testing working group in 201905 DevSummit Please see freebsd-testing@ related tickets for more information. Work in progress: * Fixing the failing test cases and builds * Adding drm ports building test against -CURRENT * Adding powerpc64 tests job: https://github.com/freebsd/freebsd-ci/pull/33 * Implementing automatic tests on bare metal hardware * Extending and publishing the embedded testbed * Planning for running ztest and network stack tests * Help more 3rd software get CI on FreeBSD through a hosted CI solution __________________________________________________________________ FreeBSD Core Team Contact: FreeBSD Core Team The FreeBSD Core Team is the governing body of FreeBSD. * Core approved source commit bits for Doug Moore (dougm), Chuck Silvers (chs), Brandon Bergren (bdragon), and a vendor commit bit for Scott Phillips (scottph). * The annual developer survey closed on 2019-04-02. Of the 397 developers, 243 took the survey with an average completion time of 12 minutes. The public survey closed on 2019-05-13. It was taken by 3637 users and had a 79% completion rate. A presentation of the survey results took place at BSDCan 2019. * The core team voted to appoint a working group to explore transitioning our source code 'source of truth' from Subversion to Git. Core asked Ed Maste to chair the group as Ed has been researching this topic for some time. For example, Ed gave a MeetBSD 2018 talk on the topic. There is a variety of viewpoints within core regarding where and how to host a Git repository, however core feels that Git is the prudent path forward. * The project received many Season of Docs submissions and picked a top candidate. Google will announce the accepted technical writer projects on 2019-08-06. We are hoping for lots of new and refreshed man pages. __________________________________________________________________ FreeBSD Graphics Team status report Links Project GitHub page URL: https://github.com/FreeBSDDesktop Contact: FreeBSD Graphics Team Contact: Niclas Zeising The FreeBSD X11/Graphics team maintains the lower levels of the FreeBSD graphics stack. This includes graphics drivers, graphics libraries such as the MESA OpenGL implementation, the X.org xserver with related libraries and applications, and Wayland with related libraries and applications. In the last report, half a year ago, several updates and changes had been made to the FreeBSD graphics stack. To further improve the user experience, and to improve input device handling, evdev was enabled in the default configuration in late 2018. Building on that, we have enabled IBM/Lenovo trackpoints and elantech and synaptics touchpads by default as well. The input device library libinput has been updated as the last in a series of updates bringing the userland input stack up to date. This is work that was started in 2018. We have made several improvements to the drm kernel drivers. A long-standing memory leak in the Intel (i915) driver has been fixed, and several other updates and improvements have been made to the various drm kernel driver components. A port of the drm kernel drivers using the 5.0 Linux kernel sources has been created and committed to FreeBSD ports as graphics/drm-devel-kmod. This driver requires a recent Linux KPI and is only available on recent versions of FreeBSD CURRENT. This version of the driver contains several development improvements. The generic drm (drm.ko) driver as well as the i915 (i915kms.ko) driver can now be unloaded and reloaded to ease in development and testing. This causes issues with the virtual consoles, however, so an SSH connection is recommended. To aid debugging i915kms.ko use of debugfs has been improved, but there are still limitations preventing it from being fully functional. Since debugfs is based on pseudofs it is possible that this will prevent a fully functional debugfs in its current state, so we might have to look into adding the required functionality to pseudofs or use another framework. The new in-kernel drm driver for VirtualBox, vboxvideo.ko has been ported from Linux. Support is currently an experimental work in progress. For example the virtual console won't update after loading the driver, but X- and Wayland-based compositors are working. Mesa has been updated to 18.3.2 and switched from using devel/llvm60 to use the Ports default version of llvm, currently devel/llvm80. Several userland Xorg drivers, applications, and libraries have been updated, and other improvements to the various userland components that make up the Graphics Stack have been made. We have also continued our regularly scheduled bi-weekly meetings, although work remains in sending out timely meeting minutes afterwards. People who are interested in helping out can find us on the x11@FreeBSD.org mailing list, or on our gitter chat: https://gitter.im/FreeBSDDesktop/Lobby. We are also available in #freebsd-xorg on EFNet. We also have a team area on GitHub where our work repositories can be found: https://github.com/FreeBSDDesktop __________________________________________________________________ IRC Admin Contact: IRC Admin The FreeBSD IRC Admin team manages the FreeBSD Project's presence and activity on the freenode IRC network, looking after: * Registration and management of channels within the official namespace (#freebsd*) * Channel moderation * Liaising with freenode staff * Allocating freebsd/* hostmask cloaks for users * General user support relating to channel management While the FreeBSD Project does not currently endorse IRC as an official support channel (see here and here), as it has not been able to guarantee a consistent or positive user experience, IRC Admin has been working toward creating a high quality experience, by standardising channel administration and moderation expectations, and ensuring the projects ability to manage all channels within its namespace. In the last quarter, IRC Admin: * Cleaned up (deregistered) registrations for channels that were defunct, stale, out of date, or had founders that were inactive (not seen for > 1 year). Channels that were found to be otherwise active have been retained. FreeBSD now has ~40 channels registered from a previous total of over 150. * Documented baseline configuration settings in the Wiki for channels, including ChanServ settings, channel modes, registration policy, etc. * Established multiple documented methods for reporting user abuse or other channel issues to IRC Admin for resolution Upcoming changes: * Work with existing #freebsd* channels to standardise channel management, settings and access. * Migrate, forward and/or consolidate existing or duplicate #freebsd* channels to channels with a standard naming convention. * Work with unofficial ##freebsd* channels to migrate them to the official #freebsd* channels if suitable * Update existing IRC-related website and documentation sources the describe the official state of project managed IRC presence on freenode. Lastly, and to repeat a previous call, while the vast majority of the broader user community interacts on the freenode IRC network, the FreeBSD developer presence still needs to be significantly improved on freenode. There are many opportunities to be had by increasing the amount and quality of interaction between FreeBSD users and developers, both in terms of developers keeping their finger on the pulse of the community and in encouraging and cultivating greater contributions to the Project over the long term. It is critical to have a strong developer presence amongst users, and IRC Admin would like again to call on all developers to join the FreeBSD freenode channels to increase that presence. Users are invited to /join #freebsd-irc on the freenode IRC network if they have questions, ideas, constructive criticism, and feedback on how the FreeBSD Project can improve the service and experience it provides to the community on IRC. __________________________________________________________________ Ports Collection Links About FreeBSD Ports URL: https://www.FreeBSD.org/ports/ Contributing to Ports URL: https://www.freebsd.org/doc/en_US.ISO8859-1/articles/contributing/= ports-contributing.html FreeBSD Ports Monitoring URL: http://portsmon.freebsd.org/index.html Ports Management Team: URL: https://www.freebsd.org/portmgr/index.html Contact: Ren=E9 Ladan Contact: FreeBSD Ports Management Team The following was done during the last quarter by portmgr to keep things in the Ports Tree going: During the last quarter the number of ports rose to just under 37,000. At the end of the quarter, there were 2146 open PRs and 7837 commits (excluding 499 on the quarterly branch) from 172 committers. This shows a slight decrease in activity compared to previous quarter. People come and go, last quarter we welcomed Pedro Giffuni (pfg@), Piotr Kubaj (pkubaj@) and Hans Petter Selasky (hselasky@). Pedro and Hans Petter were already active as src committers. We said goodbye to gordon@, kan@, tobez@, and wosch@. On the infrastructure side, a new USES=3Dcabal was introduced and various default versions were updated: MySQL to 5.7, Python to 3.6, Ruby to 2.5, Samba to 4.8 and Julia gained a default version of 1.0. The web browsers were also updated: Firefox to 68.0 and Chromium to 75.0.3770.100 During the last quarter, antoine@ ran a total of 41 exp-runs to test various package updates, bump the stack protector level to "strong", switch the default Python version to 3.6 as opposed to 2.7, remove sys/dir.h from base which has been deprecated for over 20 years, and convert all Go ports to USES=3Dgo. __________________________________________________________________ Release Engineering Team Links FreeBSD 11.3-RELEASE schedule URL: https://www.freebsd.org/releases/11.3R/schedule.html FreeBSD 11.3-RELEASE announcement URL: https://www.freebsd.org/releases/11.3R/announce.html FreeBSD 12.1-RELEASE schedule URL: https://www.freebsd.org/releases/12.1R/schedule.html FreeBSD development snapshots URL: https://download.freebsd.org/ftp/snapshots/ISO-IMAGES/ Contact: FreeBSD Release Engineering Team The FreeBSD Release Engineering Team is responsible for setting and publishing release schedules for official project releases of FreeBSD, announcing code freezes and maintaining the respective branches, among other things. During the second quarter of 2019, the FreeBSD Release Engineering team started the 11.3-RELEASE cycle, with the code slush starting May 3rd. Throughout the cycle, there were three BETA builds and three RC builds, all of which in line with the originally-published schedule. The final RC build started June 28th, with the final release build targeted for July 5th. FreeBSD 11.3-RELEASE will be the fourth release from the stable/11 branch, building on the stability and reliability of 11.2-RELEASE. The FreeBSD Release Engineering Team also published the schedule for the 12.1-RELEASE, targeted to start September 6th. One important thing to note regarding the published schedule is it excludes a hard freeze on the stable/12 branch, as a test run for eliminating code freezes entirely during a release cycle. Commits to what will be the releng/12.1 branch will still require explicit approval from the Release Engineering Team, however. Additionally throughout the quarter, several development snapshots builds were released for the head, stable/12, and stable/11 branches. Much of this work was sponsored by the FreeBSD Foundation and Rubicon Communications, LLC (Netgate). __________________________________________________________________ Projects Projects that span multiple categories, from the kernel and userspace to the Ports Collection or external projects. bhyve - Live Migration Links Github wiki - How to Live and Warm Migrate a bhyve guest URL: https://github.com/FreeBSD-UPB/freebsd/wiki/Virtual-Machine-Migrat= ion-using-bhyve Github - Warm Migration branch URL: https://github.com/FreeBSD-UPB/freebsd/tree/projects/bhyve_migrati= on Github - Live Migration branch URL: https://github.com/FreeBSD-UPB/freebsd/tree/projects/bhyve_migrati= on_dev Contact: Elena Mihailescu Contact: Darius Mihai Contact: Mihai Carabas The Migration feature uses the Save/Restore feature to migrate a bhyve guest from a FreeBSD host to another FreeBSD host. To migrate a bhyve guest, one needs to start an empty guest on the destination host from a shared guest image using the bhyve tool with the -R option followed by the source host IP and the port to listen to migration request. On the source host, the migration is started by executing the bhyvectl command with the --migrate or --migrate-live option, followed by the destination host IP and the port to send to the messages. New features added: * Clear the dirty bit after each migration round * Extend live migration to highmem segment Future tasks: * Refactor live migration branch * Rebase live migration * Extend live migration to unwired memory This project was sponsored by Matthew Grooms. __________________________________________________________________ bhyve - Save/Restore Links Github repository for the snapshot feature for bhyve URL: https://github.com/FreeBSD-UPB/freebsd/tree/projects/bhyve_snapshot Github wiki - How to Save and Restore a bhyve guest URL: https://github.com/FreeBSD-UPB/freebsd/wiki/Save-and-Restore-a-virtual-m= achine-using-bhyve Github wiki - Suspend/resume test matrix URL: https://github.com/FreeBSD-UPB/freebsd/wiki/Suspend-Resume-test-ma= trix Phabricator review - bhyve Snapshot Save and Restore URL: https://reviews.freebsd.org/D19495 Contact: Elena Mihailescu Contact: Darius Mihai Contact: Mihai Carabas The Save/Restore for bhyve feature is a suspend and resume facility added to the FreeBSD/amd64's hypervisor, bhyve. The bhyvectl tool is used to save the guest state in three files (a file for the guest memory, a file for the states of various devices and the state of the CPU, and another one for some metadata that is used in the restore process). To suspend a bhyve guest, the bhyvectl tool must be run with the --suspend option followed by the guest name. To restore a bhyve guest from a checkpoint, one simply has to add the -r option followed by the main state file (the same file that was given to the --suspend option for bhyvectl) when starting the VM. New features added: * Open ticket on Phabricator * Apply feedback received from community Future tasks: * Add suspend/resume support for nvme * Add suspend/resume support for virtio-console * Add suspend/resume support for virtio-scsi * Add TSC offsetting for restore for AMD CPUs This project was sponsored by Matthew Grooms. __________________________________________________________________ BIO_DELETE support for the swap pager Contact: Doug Moore Contact: Alan Cox Contact: Mark Johnston An ongoing project aims to teach the swap pager to send SCSI UNMAP or ATA TRIM commands to the swap device when a block of swap space has been freed, for example when the application owning that block is exiting. SSDs have become commonplace and feature low latency for random I/O requests. This makes them appealing for use as swap devices, since lower latencies mean that applications spend less time blocked while waiting for a page-in from the swap device. To maximize write performance, some SSDs require the operating system to send a notification to the disk when a sector is no longer in use; this helps the disk optimize their usage of NAND flash cells. In FreeBSD such a notification is called a BIO_DELETE. FreeBSD's UFS and ZFS filesystems have for a long time been able to transmit BIO_DELETE requests to the devices backing the filesystem. For example, for UFS this support is enabled by specifying -t in newfs(8) or tunefs(8)'s parameters. However, FreeBSD has historically not had a corresponding implementation for swap devices. Thanks to Doug Moore, as of r349286 in -CURRENT and r349930 in stable/12 swapon(8) can send BIO_DELETE to all blocks on the specified device immediately prior to configuring it as a swap device. This is enabled by specifying -E in the swapon(8) parameters, or by adding the "trimonce" option to the swap device's /etc/fstab entry. Some in-progress work on the swap pager implements online block deletion, in which BIO_DELETE is transmitted for blocks as they are freed by applications; this will hopefully be implemented in FreeBSD 13.0. __________________________________________________________________ ENA FreeBSD Driver Update Links ENA README URL: https://github.com/amzn/amzn-drivers/blob/master/kernel/fbsd/ena/R= EADME Contact: Michal Krawczyk Contact: Maciej Bielski Contact: Marcin Wojtas ENA (Elastic Network Adapter) is the smart NIC available in the virtualized environment of Amazon Web Services (AWS). The ENA driver supports multiple transmit and receive queues and can handle up to 100 Gb/s of network traffic, depending on the instance type on which it is used. ENAv2 has been under development for FreeBSD, similar to Linux and DPDK. Since the last update internal review and improvements of the patches were done, followed by validation on various AWS instances. Completed since the last update: * Upstream of the ENAv2 patches - revisions r348383 - r348416 introduce a major driver upgrade to version v2.0.0. Along with various fixes and improvements, the most significant features are LLQ (Low Latency Queues) and independent queues reconfiguration using sysctl commands. * Implement NETMAP support for ENA Todo: * Internal review and upstream of NETMAP support This project was sponsored by Amazon.com Inc. __________________________________________________________________ FreeBSD SDIO and Broadcom FullMAC WiFi Support Links FreeBSD Wiki SDIO page URL: https://wiki.freebsd.org/SDIO Contact: Bjoern Zeeb SDIO is an interface designed as an extension to SD Cards to allow attachments of various other peripherals, e.g., WiFi or Bluetooth. Work has been ongoing by Ilya Bakulin on the MMCCAM stack to provide the infrastructure to be able to have SD cards and SDIO devices attached side-by-side facilitating FreeBSD's CAM framework. Based on this excellent work over the last years, SDIO support was finished earlier this year and committed to FreeBSD HEAD with the intention to merge to 12 at a later time. Facilitating the newly available SDIO bus, work started to port Broadcom's FullMAC WiFi driver. This work is still in progress and expected to complete later this year. With this WiFi support for the Raspberry Pi and other embedded boards will become available. Likewise drivers for other SDIO devices can be developed now. This project was sponsored by The FreeBSD Foundation. __________________________________________________________________ FUSE Contact: Alan Somers FUSE (File system in USErspace) allows a userspace program to implement a file system. It is widely used to support out-of-tree file systems like NTFS, as well as for exotic pseudo file systems like sshfs. FreeBSD's fuse driver was added as a GSoC project in 2012. Since that time, it has been largely neglected. The FUSE software is buggy and out-of-date. Our implementation is about 11 years behind. During Q2 I nearly finished the FUSE overhaul that I begain in Q1. I raised the protocol level from 7.8 to 7.23, fixed many bugs (see 199934, 216391, 233783, 234581, 235773, 235774, 235775, 236226, 236231, 236236, 239291, 236329, 236379, 236381, 236405, 236327, 236466, 236472, 236473, 236474, 236530, 236557, 236560, 236647, 236844, 237052, 237181, 237588, and 238565), and added the following features: * Optional kernel-side permissions checks (`-o default_permissions`) * Implement VOP_MKNOD, VOP_BMAP, and VOP_ADVLOCK * Allow interrupting FUSE operations * Support named pipes and unix-domain sockets in fusefs file systems * Forward UTIME_NOW during utimensat(2) to the daemon * kqueue support for /dev/fuse * Allow updating mounts with mount -u * Allow exporting fusefs file systems over NFS * Server-initiated invalidation of the name cache or data cache * Respect RLIMIT_FSIZE * Try to support servers as old as protocol 7.4 I also added the following performance enhancements: * Implement FUSE's FOPEN_KEEP_CACHE and FUSE_ASYNC_READ flags * Cache file attributes * Cache lookup entries, both positive and negative * Server-selectable cache modes: writethrough, writeback, or uncached * Write clustering * Readahead * Use counter(9) for statistical reporting All that remains is to finish merging the branch, and deal with any newly introduced bugs. This project was sponsored by The FreeBSD Foundation. __________________________________________________________________ Fuzzing FreeBSD with syzkaller Links syzkaller URL: https://github.com/google/syzkaller Contact: Mark Johnston Contact: Andrew Turner Contact: Michael Tuexen Contact: Ed Maste See the syzkaller entry in the 2019q1 quarterly report for an introduction to syzkaller. syzkaller continues to find FreeBSD kernel bugs. A number of such bugs have been fixed in the past quarter, and we continue to investigate and fix bug reports from syzkaller. Work to extend syzkaller's capabilites has progressed: Andrew Turner has implemented support for fuzzing the 32-bit compatibility layer in amd64 kernels, helping illuminate some of the darker corners of the kernel, and it is now possible to use bhyve as a VM backend to syzkaller, so it is now efficient and convenient to fuzz FreeBSD on FreeBSD. Some planned work includes: enabling the use of ZFS as the base filesystem for fuzzer VMs; extending the range of system calls and ioctls covered by syzkaller; enabling LLVM sanitizers in the kernel so as to catch more issues; and making use of netdump(4) to capture kernel dumps for panics found by syzkaller, making it much easier to diagnose bugs for which syzkaller was unable to find a reproducible test case. This project was sponsored by The FreeBSD Foundation. __________________________________________________________________ Kernel ZLIB Update Links Review D19706 URL: https://reviews.freebsd.org/D19706 Contact: Yoshihiro Ota Kernel zlib upgrade is in progress. Xin (delphij@) and I have been working closely for zlib upgrade. We relocated contrib/zlib to sys/contrib/zlib in order for kernel code to access zlib in the tree. We also deleted dead code that depended on zlib and inflate - inflate is a fork of unzip to uncompress gzip files. We also renamed crc.h to avoid conflicts with zlib/crc.h. Next goal is to compile both old zlib and new zlib into the kernel allowing to switch each zlib user independently. __________________________________________________________________ Linux compatibility layer update Contact: Edward Tomasz Napierala The project aims to improve the Linux compatibility layer, to make it more compatible with recent Linux releases, and also to lower the bar for potential developers who want to start contributing to it. The initial effort focused on tooling, to make it easier to debug problems and to prevent future regressions. The first part involved making it possible to use Linux strace(1) utility and providing it as linux-c7-strace package. The reason is that while FreeBSD truss(1) and ktrace(1) can trace Linux binaries, they cannot decode Linux-specific flags and structures. The second part involved providing Linux Test Project binaries as linux-ltp package. There is ongoing work to hook it up to the FreeBSD CI infrastructure http://ci.FreeBSD.org. There was also a number of improvements and fixes to bugs discovered in the process. One of them (not yet committed) fixes binaries linked against newer version of libc, effectively unbreaking binaries from recent Ubuntu releases. This project was sponsored by FreeBSD Foundation. __________________________________________________________________ Lock-less delayed invalidation for amd64 pmap Contact: Konstantin Belousov The Virtual Memory machine-dependent layer (pmap) on amd64 needs to track all mappings for the managed physical memory pages, to be able to either destroy all of them (for page-out), or change them from writeable to read-only (e.g. to sync the page content to file, without racing with modifications through user writes). The mappings are accounted by creating pv_entry which records the address space (implicitly, by linking the pv entry to pmap) and the virtual address of the mapping. Previous work split the lock protecting the pv entries lists from other VM locks into the pvh_global_lock lock, which was global for all address spaces. You can see it in i386 pmap.c still. Later, hashed per-page pv lists locks were introduced, which would reduce contention on pv lists maninulations for different pages, but unfortunately the pvh_global_lock was still needed to guarantee the safety of some operations. Problem arises because amd64 pmap uses pmap lock to protect page tables and TLB consistency, which is per-pmap locks different from pv lists locks. When updating page table entry, we never drop pmap lock until the necessary TLB invalidation is done globally, including signalling other CPUs with IPI. But pv list locks can be unlocked before the necessary invalidation is done. So for instance when pmap is asked to remove all mappings of the specific page (pmap_remove_all(9)), it checks pv list of the page to find the mappings. The list might appear empty despite other CPUs TLB were not yet invalidated. If such page is reused, other CPUs might change its content using cached TLB entries. Allowing that means allowing both silent data corruption and opening security hole. So the global pvh lock was held until all pmaps invalidated their TLBs. This mechanism has obvious scalability issues, and instead a generation-count based scheme for handling delayed invalidation (DI) was developed, where each thread that might remove entry from pv list acquired a generation number and marked the page with it, see pmap_delayed_invl_page(9). Then, on e.g. pmap_remove_all(9) or pmap_remove_write(9), pmap code waits for the maximum current thread's invalidation generation number to pass the page's generation, which guarantees that all required TLB invalidations are done. Original implementation of DI allowed to get rid of pvh_global_lock, and only used a private mutex to handle sequential queueing of the coming and leaving threads, protecting a bounded region. A problem with that appeared e.g. in scalability benchmarks which did massive parallel unmaps, causing most of the threads to contend on DI queueing. Current implementation of DI switched to lock-less queue algorithm using the approach proposed by T.L. Harris and relying on double-CAS to coalesce generation count and queueing. It uses ifuncs to select either previous locked DI or current lock-less implementation, only old AMD Athlons which did not implemented the CMPXCHG16B instruction falls to the locked implementation by default. Lock-less implementation still blocks the waiting thread on turnstile to avoid priority-inversion issues, but practically the wait occur very rare, typical parallel buildworld generates single-digit number of the events. The patch got a lot of testing from Peter Holm, continuous reviews by Mark Johnston while I worked out bugs and live-lock problems in the implementation, and additional testing by Mateusz Guzik who helped to identify a priority inversion bug with the wait. This project was sponsored by The FreeBSD Foundation. __________________________________________________________________ Locking changes for vnodes during execve(2) Contact: Konstantin Belousov The execve(2) family of syscalls replaces the executing image in the current process. The file containing the program text, data, and arbitrary other pre-initialized segments for the newly activated image is usually called the text file. FreeBSD marks the text file as such, the mark is mutually exclusive with any opening of the file for write. In other words, file opened for write cannot be executed, and text file cannot be opened for write. During the execve(2) syscall processing, kernel needs to lock the text file' vnode. This is done both to satisfy the VFS calls protocol, and to ensure that there is no incompatible parallel changes occuring to the text vnode. A vnode can be locked either in exclusive mode, which is mutually incompatible with any other lock acquisition, or in shared mode, which is only incompatible with exclusive requests, but allows other shared owners. In principle, there is no reason why would execve(2) need an exclusive vnode lock, since it does not modify neither content nor metadata for the text vnode. The only exception is the marking of the vnode as text, which was done using VV_TEXT flag in v_vflag and protected by the vnode lock. Since we modify v_vflag, the vnode lock protecting the modification should be taken exclusive. The end result is that execve(2)'s of the same file are serialized. For instance, if user runs parallel build, which executes more than one job for compiling, all invocation of the compiler are serialized during execve(2). The count of opens for write is contained in other struct vnode member named v_writecount, which was protected by the vnode lock as well. Since text is mutually exclusive with an open for write, I reused v_writecount to indicate text references. Now, negative v_writecount counts the number of text references. The v_writecount content is literally protected by the vnode interlock, but normally all mutators also own vnode lock at least in the shared mode. This way, we no longer need to acquire exclusive text vnode lock during execve(2), removing the serializing point. Additional positive effect is that we started to account the precise number of text references on the vnode. Before, we cleared VV_TEXT on the last unmap of the text vnode, potentially allowing obscure DoS where mapping the text file while it is executed prevented writes until the mapping is destroyed. Now we mark the mappings for text explicitly in the vm_map_entry and dereference v_writecount by +1 when such entry is unmapped. This project was sponsored by The FreeBSD Foundation. __________________________________________________________________ Mellanox Drivers Update Links Mellanox OFED for FreeBSD Documentation URL: http://www.mellanox.com/page/products_dyn?product_family=3D193&mta= g=3Dfreebsd_driver Contact: Slava Shwartsman Hans Petter Selasky Konstantin Belousov The mlx5 driver provides support for ConnectX-4 [Lx], ConnectX-5 [Ex] and ConnectX-6 [Dx] adapter cards. The mlx5en driver provides support for Ethernet adapter cards, whereas mlx5ib driver provides support for InfiniBand adapters and RDMA over Converged Ethernet (RoCE). Following updates done in mlx5 drivers: * 200Gb/s ConnectX-6 Ethernet: Added support for Mellanox Socket Direct Adapters which allows, among the rest of the capabilities, to run up to 200Gb/s on a PCIe Gen 3.0 on a LAG interface. * Support for "BlueField" - Multicore System On A Chip: Added support for RShim driver for BlueField Multicore System On A Chip(SOC). The RShim driver provides access to the RShim resources on the BlueField target accessible from an external host machine. The current RShim version provides device files for boot image push and virtual console access. It also creates virtual network interface to connect to the BlueField target and provides access to internal RShim registers. * Firmware Burning and Diagnostics Tools: Added MSTFLINT to ports, this package contains a burning and diagnostic tools for Mellanox NICs. This package contains following tools: mstflint - Tools which allows to query and burn firmware. mstconfig - This tool queries and sets non-volatile configurable options for Mellanox HCAs. mstregdump - This utility dumps hardware registers from Mellanox hardware. mstmcra - This debug utility reads/writes a to/from the device configuration register space. mstvpd - This utility dumps the on-card VPD. and more. * OFED-FreeBSD-v3.5.1 Upstream: Pushed upstream and MFCed OFED-FreeBSD-v3.5.1 driver - more details on the content of this update can be found in Mellanox OFED for FreeBSD documentation page. General updates: * Submitted papers for EuroBSDcon for a joint talk with Netflix titled "Kernel TLS and TLS Hardware Offload". The papers were accepted. * Mellanox is intensively working to improve its cooperation with the FreeBSD community. As part of this effort, FreeBSD users are invited to propose features and enhancements to further develop and enrich the end-user experience. In addition, Mellanox continues to identify and present the right solutions to meet customers' needs. This project was sponsored by Mellanox Technologies. __________________________________________________________________ NFSv4.2 client/server implementation for FreeBSD Links current sources URL: https://svnweb.freebsd.org/base/projects/nfsv42 Contact: Rick Macklem NFSv4.2 is a newer minor version of NFSv4, made up of a set of optional operations/features. A majority of these operations are related to the POSIX operations posix_fadvise(2), posix_fallocate(2) and lseek(2)'s support for SEEKHOLE/SEEKDATA. There is also a Copy operation that allows a byte range of a file to be copied to another file locally on the NFS server, avoiding data transfer over the wire in both directions. FreeBSD-current now has a Linux compatible copy_file_range(2) syscall that will invoke this Copy operation on NFSv4.2 mounts. There is also support for MAC labelling, but it requires changes to the RPCSEC_GSS implementation to add V3 support and, as such, may not happen soon. The implementation of NFSv4.2 (RFC-7862) is progressing nicely. At this time, the LayoutError, IOAdvise, Allocate and Copy operations have been implemented. There is still work to be done on Copy, to add asynchronous support, so that large copies do not result in a long delay for the RPC's reply. The major operation that will be implemented next is Seek, so that lseek(SEEKHOLE/SEEKDATA) will work for the NFSv4.2 mounts. It is hoped that this implementation will be ready for FreeBSD-current/head in time for the FreeBSD-13 release. Testing is always appreciated and can be done by downloading the modified kernel from the svn repository in base/rojects/nfsv42 and then building and testing it on a couple of recent FreeBSD-current systems. If anyone is conversant with Kerberos and wants to take on the challenge of adding RPCSEC_GSS_V3 support to the kernel RPC, a patch that does that would also be greatly appreciated. __________________________________________________________________ NUMA awareness in the FreeBSD kernel Contact: Jeff Roberson Contact: Andrew Gallatin Contact: Mark Johnston A set of patches to improve the state of NUMA awareness in the FreeBSD kernel are being developed and refined. This work also aims to generally improve the performance of FreeBSD's memory management subsystem on systems with many CPUs. FreeBSD 12.0 featured a number of large changes which improve its performance on systems with a non-uniform memory architecture. That is, systems in which memory access latency for a given address varies depending on the CPU. Another round of improvements is being developed and will soon be available in FreeBSD-CURRENT. Short descriptions of some of these patches follow; a few have already been committed to FreeBSD-CURRENT. In FreeBSD terminology, a memory page whose contents may not be evicted is referred to as "wired." Pages may be wired under different circumstances: for instance, all kernel memory is wired, and userland applications may request that ranges of memory be wired using the mlock(2) and mlockall(2) system calls. FreeBSD has historically defined a system-wide limit on the number of wired pages so as to avoid deadlocks that may arise when too much of a system's memory cannot be reclaimed to satisfy new memory allocations. This limit was applied only to userland wiring requests, but kernel wirings were counted against the limit, so a large source of kernel wirings could cause mlock(2) failures. This occurs frequently with a large ZFS ARC, for example. In FreeBSD-CURRENT this limit has been changed such that only userland wirings are counted against the limit; the kernel contains a number of mechanisms to apply back-pressure to kernel memory usage, so the use of a global limit on all wirings did not provide much benefit. This fixes a common problem on large ZFS systems, and helps enable some other architectural improvements to the code which manages page wirings. FreeBSD has historically maintained two separate reference counters in the structure which describes a single physical page of memory. These counters initially had quite different properties, but have over time become more and more similar. Some work to merge the two counters has landed in FreeBSD-CURRENT. This does not have any user-visible effects, but it simplifies the page management code and removes a large amount of code which existed solely to transform references of one type to the other. Such code also made use of heavily contended locks, so the simplification improved kernel scalability for some workloads and has enabled further scalability improvements. UMA is the slab allocator used in FreeBSD's kernel. It is the backend which services virtually all dynamic memory allocations performed in the kernel. The first round of NUMA improvements added NUMA awareness to the "keg" layer of UMA, which allocates and manages slabs. However, the frontend of UMA, which provides several layers of caching for objects, did not provide domain-aware caching, so over time the caches would become "polluted" with objects from different memory domains. However, this caching layer is being modified to ensure that objects from different memory domains are partitioned, helping ensure that consumers can perform domain-local allocations and frees efficiently. This will enable a global "first-touch" allocation policy for UMA-managed objects. During boot, the FreeBSD kernel allocates a number of static data structures to track physical memory. These structures have historically lived in the lowest available range of physical memory, so they many not inhabit the same NUMA domain as the memory that they track. This is suboptimal when one tries to affinitize a workload to a particular NUMA domain: if while executing the workload the kernel frequently accesses page structures for local memory, and the page structures themselves are not placed in local memory, the kernel will perform many remote memory accesses. Some in-progress work for the amd64 platform creates multiple arrays of page tracking structures, one per NUMA domain, and ensures that each array is local to its domain. This complicates the task of initializing kernel data structures during boot, but can substantially reduce the amount of cross-domain communication that occurs while the kernel is performing useful work. Similarly, some patches to affinitize per-CPU structures are being developed; while most per-CPU memory allocations already return CPU-local memory, some structures allocated during boot are not yet properly placed with respect to the accessing CPU's memory domain. This project was sponsored by Netflix. __________________________________________________________________ Architectures Updating platform-specific features and bringing in support for new hardware platforms. Broadcom ARM64 SoC support Contact: Michal Stanek Contact: Kornel Duleba Contact: Marcin Wojtas The Semihalf team continued working on FreeBSD support for the Broadcom BCM5871X SoC series BCM5871X are quad-core 64-bit ARMv8 Cortex-A57 communication processors targeted for networking applications such as 10G routers, gateways, control plane processing and NAS. Completed since the last update: * iProc PCIe root complex (internal and external buses): fixes and improvements, including adding a BCM58712 quirk to GICv2m driver * BNXT Ethernet support: sys/dev/bnxt.c driver has been extended to support the BCM58700 variant, and the iflib was made to work without IO cache coherency In progress: * Crypto engine acceleration for IPsec offloading. Todo: * Upstreaming of work. This work is expected to be submitted/merged to HEAD in the second half of 2019. This project was sponsored by Juniper Networks, Inc. __________________________________________________________________ NXP ARM64 SoC support Contact: Marcin Wojtas Contact: Artur Rojek The Semihalf team initiated working on FreeBSD support for the NXP LS1046A SoC LS1046A are quad-core 64-bit ARMv8 Cortex-A72 processors with integrated packet processing acceleration and high speed peripherals including 10 Gb Ethernet, PCIe 3.0, SATA 3.0 and USB 3.0 for a wide range of networking, storage, security and industrial applications. Already completed: * Platform base support (ramp-up multi-user SMP operation with UART) * SATA 3.0 In progress: * USB3.0 * SD/MMC * I2C Todo: * Ethernet support * GPIO * QSPI * Upstreaming of developed features. This work is expected to be submitted/merged to HEAD in the Q4 of 2019. This project was sponsored by Alstom Group. __________________________________________________________________ Third-Party Projects Many projects build upon FreeBSD or incorporate components of FreeBSD into their project. As these projects may be of interest to the broader FreeBSD community, we sometimes include brief updates submitted by these projects in our quarterly report. The FreeBSD project makes no representation as to the accuracy or veracity of any claims in these submissions. Aberdeen Hackathon At BSDCam in Cambridge last year we had a discussion to create a template Hackathon in the same way we have a template for Devsummits. To test out the idea I was convinced (I swear tricked is the correct word) to host a Hackathon in Aberdeen. As a project I think we benefit a lot from hackathons, but they do take a little organisation. The worst part of this is dealing with getting money from attendees so you can pay for events. I spoke with Deb Goodkin from the foundation at BSDCam and we arranged to use their new EventBrite based system to handle ticketing. Overall this system made it straight forward for attendees to register and get me their details and requirements. After the event the expenses were then recouped from the foundation. This was much easier than me putting together a custom system or even setting up and using EventBrite myself. The hackathon went well, you can read in Benedict and Kristof's reports that follow, but it was less well attended than I originally expected. For hackers planning future hackathons remember to take heed of common national holidays (we could have planned the event to not land at Easter) and expect major geopolitical events to make things unpredictable (we knew Brexit would do something, but not when). I need to thank the University of Aberdeen for providing the location for the Hackathon and to encourage you to run a hackathon where you are. The next one should be in your home town. Benedict Reuschling The hackathon in Aberdeen was happening in the week of Easter at the University of Aberdeen. Although only Kristof Provost (kp@) and myself joined our host Tom Jones, I still consider it a productive week for us. The overall theme of the hackathon was networking and each of us provided something towards that goal (be it PRs, submitting unfinished work, or other bits and pieces). We got together the night of Tuesday, April 16 over dinner and talked about what our plans were for the week. Kristof and I had talked at AsiaBSDcon when I took his tutorial about Testing in FreeBSD that we should add a chapter about it in the developers handbook. We also used our first meeting to synchronize each other about the latest news in FreeBSD from our developers viewpoint. The next day, we met up at the Frazer Noble building where the hackathon was taking place. It was one of the newer buildings on campus, nicely integrated into the older houses of the city. Since we were only a handful, we sat in Tom's office for the hackathon, which had plenty of room. He also showed us the room where we are supposed to be having the hackathon if we were more people and Tom gave us a little tour. Working in a university myself, I'm always interested in how other education organizations are structured and the rooms and equipment they provide for learning. Overall, my impression was that there is a good amount of space and equipment available, which we could have used in the hackathon. After returning, we decided to use a special tag in the commits we would be doing to identify them as coming from this hackathon. We chose "Event:" for it as it is a general enough term to be used at other events like conferences, too. The "Sponsored by:" line we used in the past is more for companies or individuals sponsoring certain features, so I created a review to add this line to the committers guide. Kristof had a couple of changes to the pf chapter in the FreeBSD handbook for me, so I started going through those. I created a review for him and the commit was made there and then, making use of the short feedback cycle. Originally, we thought about bringing in people via hangouts, but then resolved to contact people via our usual IRC channel if we needed their input. Kristof and Tom worked on some network specific stuff, whereas I started work on creating an initial draft for the testing chapter. We would occasionally start talking about something and then return to our work in silence. If we needed to coordinate or had questions, we simply asked and could continue once we got our answer. This provided a nice atmosphere to work in. I tackled some doc PRs while Kristof found a bug in pf and fixed it. The afternoons were spent at different locations within walking distance. Tom made sure we got a good impression on how it is to be a student and that there is both taste and variety of food available. In the evenings, Tom drove us into town to have dinner at various restaurants over the week. Aberdeen has a lot to offer as a city. Starting from the second day, Kristof and I would meet up at my hotel, which was close to the Aberdeen beach and walk along it to the University. According to Tom, it is possible to see Dolphins when the weather is right and the gulf stream provides the city with enough warmth that the winters aren't as bad as you'd think this far up north. Tom also gave us a tour of the zoological department of the university, which offered a beautiful garden with various plants and trees, as well as a museum with zoological specimen. This offered a great spot for photographs and to unwind a bit from the technical discussions we've had. Tom also had t-shirts made for the event, which are already rare collectors items. I had to return on Sunday, so Tom took us on a tour of the Scottish highlands in his car the day before. We stopped at a couple of places to take pictures and Tom would explain at lot to us having lived there all his life. We came to Stonehaven and had fish and chips there from a take-out restaurant that had a lot of awards for sustainable fishing. This was certainly a highlight for the week and even then, we couldn't stop talking about FreeBSD and networking. Although more people would maybe have produced more output, the three of us were certainly productive as a small group. It also made planning and coordination easier and more flexible. Tom Jones had done a lot of preparation and was an excellent guide. I would encourage him to host another such hackathon in the future and hope that next time, more people will take a trip to Aberdeen to spend some time hacking on FreeBSD Kristof Provost While I'd been to Scotland before I'd never seen Aberdeen. It's a charming city, and I enthusiastically recommend visiting. I arrived a little while after Benedict, but made it to my hotel easily, and turned up in time to join Benedict and Tom for dinner. Despite being small (or perhaps because of it), the hackathon was remarkably productive. Benedict and I went through the pf documentation in the handbook, so that Benedict could rework and improve it. (Benedict's doing the work, but I'm going to take credit anyway.) Tom and I looked at the GSoC proposals and tried to find potential mentors for two promising proposals. Both of us are candidate mentors as well. We should know soon if our students are awarded slots. Tom also proposed a patch to eliminate RFC 2675 IPv6 Jumbograms. It has my enthusiastic support. I managed to look at a couple of open pf issues: * pfctl's interface_group() function checks if a name is an interface or an interface group. It still thought that interface names always ended with a number, but this assumption has been wrong for several years now. That's fixed in r346370. * The DIOCRSETTFLAGS ioctl() misused copyin() (It held a lock calling it), which could result in panics. * That previous issue was actually discovered by my local instance of syzcaller, which I'd set up to add pf support to it. That support has now been merged, so we may see more issues detected by syzcaller soon. * Also for the DIOCRSETTFLAGS problem I extended the pf tests to check for this issue. * The pf tests will now fail if the pft_set_rules call fails to set the rules. That didn't actually cause issues yet, but it'll make debugging tests slightly easier, and they may catch more problems now. On Saturday Tom took us out to discover some of the pretty bits of Scotland. It turns out there are a lot of them. I can't really do it justice, but Tom has a promising career at the Scottish tourism board when this computers fad blows over. On my way home I passed through Oslo, and took the opportunity to meet with (have lunch with) two of the EuroBSDCon local organisers. EuroBSDCon is filling up fast, make sure to register now to secure your place! __________________________________________________________________ Bring more Security Intelligence to FreeBSD Links Maltrail - distributed Malware detection URL: https://github.com/stamparm/maltrail Wazuh - thread detection and incident response URL: https://wazuh.com/ Contact: Michael Muenz To bring more Security Intelligence we maintain the FreeBSD port of zmaltail. This open source project based on Python can act as a sensor and/or as a central server. It listens in defined ports or protocols and compares IP addresses and domains against static and dynamic feeds, contributed by the community. As you can install this piece of software on multiple firewalls and let them send to a central server, you are able to detect attacks and compromises very fast. Within Q2 we updated the port to the latest version and are constantly in contact with the core developer (also co-author of SQLmap) to bring out new features. The second project we are currently trying to add as a port is Wazuh. Wazuh is a fork of Ossec which is already in the ports tree. Compared to Ossec, Wazuh has some intelligent addition like full ELK-Stack integration with own apps and dashboards. With Wazuh installed on your webserver, or even on your windows desktop you can monitor file integrity or log files for most kind of attacks. Active response features let you e.g. send API calls to your firewalls to dynamically block this offender. As Wazuh offers a complete ELK-Stack you can use it also as a central logging solution for better security insights into your network. This project was sponsored by m.a.x. Informationstechnologie AG. __________________________________________________________________ libvdsk - QCOW2 implementation Links Github - libvdsk repo URL: https://github.com/xcllnt/libvdsk Contact: Sergiu Weisz Contact: Marcel Molenaar Contact: Marcelo Araujo Contact: Mihai Carabas Add support for using QCOW in bhyve using the libvdsk library. Libvdsk was used to substitute the regular disk operations from bhyve with a call to libvdsk which will in turn call the disk-specific handler for the operation. To use this feature one has to install the libvdsk-enabled bhyve version along with libvdsk from the libvdsk repo linked above. New features added: * Extend libvdsk to make it easier to implement new formats * Improve read/write performance and stability * Add support for Copy-On-Write Future tasks: * Integrate libvdsk in bhyve Matthew Grooms __________________________________________________________________ nsysctl 1.0 Links gitlab.com/alfix/nsysctl URL: https://gitlab.com/alfix/nsysctl sysutils/nsysctl port URL: https://www.freshports.org/sysutils/nsysctl/ Tutorial URL: https://alfix.gitlab.io/bsd/2019/02/19/nsysctl-tutorial.html Contact: Alfonso Sabato Siciliano The nsysctl utility is a /sbin/sysctl clone, to get or set the kernel state, supporting libxo and extra options. nsysctl [--libxo=3Dopts [-r tagname]] [-DdFGgIilmNpqTt[V|v[h[b|o|x]]]Wy] [-e sep] [-B ] [-f filename] name[=3Dvalue[,value]] ... nsysctl [--libxo=3Dopts [-r tagname]] [-DdFGgIlmNpqTt[V|v[h[b|o|x]]]Wy] [-e sep] [-B ] -A|a|X You could use nsysctl to explore the sysctl MIB showing the value and the info of an object. The output is explicitly indicated by the options and is printed via libxo in human and machine readable formats, moreover some value is parsed to display it in a structured mode (e.g., vm.phys_free). The support for efi_map_header was added but it is untested, someone could help by trying it via machdep.efi_map. Please refer to the tutorial for a more thorough description. __________________________________________________________________ --WIyZ46R2i8wDzkSu Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQGmBAEBCgCQFiEEbvjBe1hu6u1NeinjJCKD+Vwk/7oFAl1ifcRfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDZF RjhDMTdCNTg2RUVBRUQ0RDdBMjlFMzI0MjI4M0Y5NUMyNEZGQkESHHRyYXN6QGZy ZWVic2Qub3JnAAoJECQig/lcJP+68WQH+wQOBid2IwHXPyS+vxpl2YevaP+7yjmh ivNM3we+xwB5E8ETufE4ZkQvzDPXbQQ1mQp+SUbmAmoNT53XU35RPDTUH4Ine5+X mwu7arfgOU2vpr5ej0Q4rzzD9ZSYwvz4cqWeU3qqKDXwGh1rIU67hXdu2cq6nWd0 h8pR/k9CGsCt0HqbSSaBr1YSKxONASz0fhUyNykxoKCVcKhpN7ordY3kUawm1M9m fWBmIsnuRAAoBGk+mOb4H3qELTBLxI7sFoKFqNCzw15l9Cyw2nfDvtzeqB8/6CEO YylUTQ0qW/th24ODNNiZpU/6VvajPyC4Wl7Rs9uvRc8H3ebwUrrccQI= =bo0Y -----END PGP SIGNATURE----- --WIyZ46R2i8wDzkSu-- From owner-freebsd-current@freebsd.org Sun Aug 25 13:17:23 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id D77BADF960 for ; Sun, 25 Aug 2019 13:17:23 +0000 (UTC) (envelope-from rebecca@bsdio.com) Received: from muon.bsdio.com (muon.bluestop.org [65.103.231.193]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 46GbJy4g5Dz3xKD for ; Sun, 25 Aug 2019 13:17:22 +0000 (UTC) (envelope-from rebecca@bsdio.com) Received: from muon.bsdio.com (localhost [127.0.0.1]) by muon.bsdio.com (Postfix) with ESMTP id 4DD09F6121; Sun, 25 Aug 2019 07:17:24 -0600 (MDT) Received: from muon.bsdio.com ([127.0.0.1]) by muon.bsdio.com (muon.bsdio.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id QUGl8XuJ5uAM; Sun, 25 Aug 2019 07:17:23 -0600 (MDT) Received: from photon.int.bluestop.org (unknown [10.0.10.120]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by muon.bsdio.com (Postfix) with ESMTPSA; Sun, 25 Aug 2019 07:17:23 -0600 (MDT) Subject: Re: Panic on boot with r351461 (AMD ThreadRipper 2990WX) To: Konstantin Belousov Cc: FreeBSD Current References: <6e5687b2-ab3f-a570-37ab-72c8a9776167@bsdio.com> <20190824203305.GF71821@kib.kiev.ua> <20190824230801.GK71821@kib.kiev.ua> <20190825062407.GL71821@kib.kiev.ua> From: Rebecca Cran Autocrypt: addr=rebecca@bsdio.com; keydata= mQINBFrUMZ4BEADI1yUEGeZeXeTCPay1ZpTBdDEpGPAw1dq2VCSTc1VhsnrEBa1iZxAfaeSv Uu5Ti7jlhQ/3sQMl0bJMKGB/RtmIW7k8h2w476oZmG8gChk8su5ZEx/pV1gdqInyFmmJKTYc gabJz8pL+m82w07qPv+oalepZ4dbj+HF++RAK/iEju+q9UHlsjj8e3mMNsvtrOz1K6bnpveO jZ+ms/2H3Hs5a4k8y6buwe2RvwhJQaXa13cR3LhzL+nwj4B9PHZZEa2WpEyYpw/bI0V9YSQN QgC1CYRzDyakZge6BCM6wHOgZSUzRPufGilrNKUwIVbRoIBR9/85+0wR+PlFUOUOfOc6ox7T dWcIx6PuPhek48rh4uwmmwsPtPiH4Z3T5p+GmWQ9NLFZKA1YnEdaSkWtYZsDxwVZZeYG2plt MfhXP0Hj4rf9Y3eoUenCaGioxAbUOBCtXdTGNAhNjz1g5NGDBVyhjKkzwJQvt9UrYTseERit 5dX2CMTy8hYLvSXd/Ivy+HylUS5IslfZxW5z9LgWX7Z97kILgkH3N0ewtLkygkG+Y+x7uaAV dFqp9ASOyzaiwKbJdeOI+WxRSh+AqeCR0S+bpkcLudLmbjrPmaFwjKycy1H85Z5R2J3YHyXY oT6OYjD8vLbUU2GWp6Onkcy1Pu8EMbRuzKil6HnpYg3BexbPFwARAQABtCNSZWJlY2NhIENy YW4gPHJlYmVjY2FAYmx1ZXN0b3Aub3JnPokCVwQTAQgAQQIbIwUJCWYBgAULCQgHAgYVCgkI CwIEFgIDAQIeAQIXgBYhBB+5fZtkTdO940Yr4g0CK1MRvhAgBQJa2B9zAhkBAAoJEA0CK1MR vhAgzJEQAJUqVmTRO9OqCSS2CVKjrqnEWJMvyo0K8B+WiXo0nSQg9+uyoVU7h2s/kkWVGy4u IWbGy2Qe8LiXzBJjHC3TadGvOvakfdMeKKXcgxgX6KlhA9hA2LW6tg22aHUk7Flr/8diHpgf qIwrXhqJXZmK72GR1QfhgoHsOsTJ9GWPswo1kUMc0cJowq0qP1RDdua6BwvDHHPJwu9OmC/i oQlMNm9gkBDq8H2B+m125ANwCnqBizXaiTTLQdewTMbCSuxbsni2icDqwBfFXzEgcJGaYYfB cQeFsfCmtXQK3JUd4Myx128Dxk9P3X64I93SB7QzB0nmWlyvmCFBNoCp0PCLA4qbwbw2sMRX Wx4BqYa8nI/jg+Nqo+Ut2BfltNZIlsHxK+XhxejfLqAjRCZeLnu1otvFnFuGLaAVYx9x1Y1q J8VizZxq6ujio62Qpultp6KNhlkJ+OKoGwA0k4NHh26SxvlsNxlfg/2v9b1LqWRzNujnwbcF 8g4902XjyBLxV+9YpXZEa8H6zzEHxpeDPWT3QfvrT8JuoHa1IyYnUKvG674UKW5zEGEwkQc9 cuQwR1RHd1ZrKtH1duXzaLr/caMp8ZDfGDDxFpenJTRxNRlg4+K7HSdhpac7sBVMUA8uVdE+ iuTThOmdf0c4DorL3BIh6Yv3FV4/NSqT1Wn3CG2fgG1guQINBFrUMZ4BEADkc4mvMcMcDF1t dNxNQuIBE1F243oZamG3LACCKfc1Yur3CPzHwIk5LXCUmbq23iE5bowxMWw3mlVT0p5xM0Wn UidIBwCKu4kRyy/fY4NyWWBuwy9srpTdmUcKRBRNB8zEZE8xIlidD1ijjgqLBfeM7n9ylawA xHLxwU96sdpdHFzb7Z0yKY2e/bzDaHiG0fUvcCmkgLf+uwKKZid1j8zR5PzKpgPqfy/PF01e KyGV3MNu8Y90xMoiEMWfCI2IB1m+hTuzZoboFvGV54SiMuvfWK/VMQjhsL6K2ddOqwVuy2nI MI4G3xDQW/v8KVyn43OSIAyW1eaklhzu0Ir2sO60PXRkvbTUrouvmSvpJfIQS49rU0M/X6FS DgXQLKrZ3my94+g8ptz9KoVml6s4OAwYVz+sb49nuSxipFKkU5FwhKOLmzbsBxCtytcUJoLm juJPJPDQue6YJiIXyc86GVY2pH3DjemKdbB4dSgqAJIp+lCzKSJzz7bgueh2Ox8vzx1tSxKj 7V8Nal+UTKKbkxPmMh+e20YZ4esAVifO3bS6IJP/aDnfagghB71vA7+aWGXPbjPlc2UHpCBi RSsl+IgoQXvdvZBsKRyfBx8neODa2C6JIE5vcaCjilSeKF8SzsFXvimnndhQNhAPU/DwQwSX dCl4gTsFVi5d8Oxq1sce+wARAQABiQI8BBgBCAAmFiEEH7l9m2RN073jRiviDQIrUxG+ECAF AlrUMZ4CGwwFCQlmAYAACgkQDQIrUxG+ECAWnRAAsmZX+KgNxW3v7R/76Tz4Wjmh4AGeE+Ji 3p5QsdTYny1B6vYBL9vCzPJ/AK8pgKMDRaweUP5eZQpfrdWC8Q7SNGgi4Q+97KEs+i2xZLQ+ WJb8a+WEEIc716u0y4ITiHfOgM5jWcFO4MXQATbJgv0drLLesa+LQCvZgPBqupt307EsCubQ s+Sxt+RVjf6rOUolp1GJXEQYwGsKklVd6yqLC8M1BSG53/WE5tSv5GzBZ8fp6EtmjT7leuid FtEvKYHQz4DqG9ELpHUF0X0UUCBK/MgXe3kCVLKE060UrJ4M6uPSx57rmVFA2MvwQR8M7GsW C5UsSM4PYwPWBhwxE7vcx0691YKAHT/5q8LxRVBdUyzPSprMhSQFttsBt+ygm6wRi3Pi3TuC EARNubPkQefyeC34yr40SAUCkOl3eWxSXPF4NfXFQb4AAzZSE5hv3qbDuwo3lrL0LqpIpEQP Az+JZ1QZ6mMFQ5/JD9Gukj54kZc0X8w3sQt0a8vyE/qrJg8vKgv2rCHrPc5MeDkEUEFiiJiC EDdkJtMyoRlU3S4NrnbyLOLEcHE8fGe3hStPX8hY62id2ecdQ5WZ7vLZW5SFeLarbUciuHIk VL6MHnUjbV7XlY50N7ebeFCIdlCWhdum2FJs/Ni+SSxbZC564vrokwlBBGSo6WTPQTa8IWx1 DtU= Message-ID: <9e94aea8-7d63-0f9e-2f1e-c1492e9dc455@bsdio.com> Date: Sun, 25 Aug 2019 07:17:20 -0600 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:68.0) Gecko/20100101 Thunderbird/68.0 MIME-Version: 1.0 In-Reply-To: <20190825062407.GL71821@kib.kiev.ua> Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit Content-Language: en-US X-Rspamd-Queue-Id: 46GbJy4g5Dz3xKD X-Spamd-Bar: ---- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=none (mx1.freebsd.org: domain of rebecca@bsdio.com has no SPF policy when checking 65.103.231.193) smtp.mailfrom=rebecca@bsdio.com X-Spamd-Result: default: False [-4.01 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-0.999,0]; FROM_HAS_DN(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; RCVD_TLS_LAST(0.00)[]; DMARC_NA(0.00)[bsdio.com]; AUTH_NA(1.00)[]; RCVD_COUNT_THREE(0.00)[4]; TO_MATCH_ENVRCPT_SOME(0.00)[]; TO_DN_ALL(0.00)[]; NEURAL_HAM_SHORT(-0.98)[-0.984,0]; RCPT_COUNT_TWO(0.00)[2]; R_SPF_NA(0.00)[]; FREEMAIL_TO(0.00)[gmail.com]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:209, ipnet:65.103.224.0/19, country:US]; MID_RHS_MATCH_FROM(0.00)[]; IP_SCORE(-1.92)[ip: (-9.53), asn: 209(-0.04), country: US(-0.05)] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 25 Aug 2019 13:17:23 -0000 On 2019-08-25 00:24, Konstantin Belousov wrote: > What are the panic messages ? Fatal trap 18: integer divide fault while in kernel mode instruction pointer = 0x20:0xffffffff80f1027c stack pointer = 0x28:0xffffffff845809f0 frame pointer = 0x28:0xffffffff84580a00 code segment = base 0x0, limit 0xffffff, type 0x1b     = DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags = resume, IOPL = 0 current process = 0 () trap number = 18 panic: integer divide fault cpuid = 0 time = 1 > What is the source line ? (gdb) info line *0xffffffff80f1027c Line 102 of "/usr/src/sys/vm/vm_domainset.c" starts at address 0xffffffff80f10267    and ends at 0xffffffff80f1027f . -- Rebecca Cran From owner-freebsd-current@freebsd.org Sun Aug 25 14:30:48 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id E69A0E0F00 for ; Sun, 25 Aug 2019 14:30:48 +0000 (UTC) (envelope-from kostikbel@gmail.com) Received: from kib.kiev.ua (kib.kiev.ua [IPv6:2001:470:d5e7:1::1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 46Gcxg2cFbz41Nq; Sun, 25 Aug 2019 14:30:46 +0000 (UTC) (envelope-from kostikbel@gmail.com) Received: from tom.home (kib@localhost [127.0.0.1]) by kib.kiev.ua (8.15.2/8.15.2) with ESMTPS id x7PEUY4b043697 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO); Sun, 25 Aug 2019 17:30:37 +0300 (EEST) (envelope-from kostikbel@gmail.com) DKIM-Filter: OpenDKIM Filter v2.10.3 kib.kiev.ua x7PEUY4b043697 Received: (from kostik@localhost) by tom.home (8.15.2/8.15.2/Submit) id x7PEUYE3043688; Sun, 25 Aug 2019 17:30:34 +0300 (EEST) (envelope-from kostikbel@gmail.com) X-Authentication-Warning: tom.home: kostik set sender to kostikbel@gmail.com using -f Date: Sun, 25 Aug 2019 17:30:34 +0300 From: Konstantin Belousov To: Rebecca Cran , markj@freebsd.org Cc: FreeBSD Current Subject: Re: Panic on boot with r351461 (AMD ThreadRipper 2990WX) Message-ID: <20190825143034.GO71821@kib.kiev.ua> References: <6e5687b2-ab3f-a570-37ab-72c8a9776167@bsdio.com> <20190824203305.GF71821@kib.kiev.ua> <20190824230801.GK71821@kib.kiev.ua> <20190825062407.GL71821@kib.kiev.ua> <9e94aea8-7d63-0f9e-2f1e-c1492e9dc455@bsdio.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <9e94aea8-7d63-0f9e-2f1e-c1492e9dc455@bsdio.com> User-Agent: Mutt/1.12.1 (2019-06-15) X-Spam-Status: No, score=-1.0 required=5.0 tests=ALL_TRUSTED,BAYES_00, DKIM_ADSP_CUSTOM_MED,FORGED_GMAIL_RCVD,FREEMAIL_FROM, NML_ADSP_CUSTOM_MED autolearn=no autolearn_force=no version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tom.home X-Rspamd-Queue-Id: 46Gcxg2cFbz41Nq X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=fail reason="No valid SPF, No valid DKIM" header.from=gmail.com (policy=none); spf=softfail (mx1.freebsd.org: 2001:470:d5e7:1::1 is neither permitted nor denied by domain of kostikbel@gmail.com) smtp.mailfrom=kostikbel@gmail.com X-Spamd-Result: default: False [-2.96 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; RCVD_TLS_ALL(0.00)[]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; FREEMAIL_FROM(0.00)[gmail.com]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; HAS_XAW(0.00)[]; R_SPF_SOFTFAIL(0.00)[~all]; IP_SCORE_FREEMAIL(0.00)[]; TO_DN_SOME(0.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; NEURAL_HAM_SHORT(-0.96)[-0.956,0]; IP_SCORE(0.00)[ip: (-2.51), ipnet: 2001:470::/32(-4.43), asn: 6939(-3.06), country: US(-0.05)]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:6939, ipnet:2001:470::/32, country:US]; RCVD_COUNT_TWO(0.00)[2]; FREEMAIL_ENVFROM(0.00)[gmail.com]; DMARC_POLICY_SOFTFAIL(0.10)[gmail.com : No valid SPF, No valid DKIM,none] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 25 Aug 2019 14:30:49 -0000 On Sun, Aug 25, 2019 at 07:17:20AM -0600, Rebecca Cran wrote: > On 2019-08-25 00:24, Konstantin Belousov wrote: > > What are the panic messages ? > > Fatal trap 18: integer divide fault while in kernel mode > > instruction pointer = 0x20:0xffffffff80f1027c > > stack pointer = 0x28:0xffffffff845809f0 > > frame pointer = 0x28:0xffffffff84580a00 > > code segment = base 0x0, limit 0xffffff, type 0x1b > >     = DPL 0, pres 1, long 1, def32 0, gran 1 > > processor eflags = resume, IOPL = 0 > > current process = 0 () > > trap number = 18 > > panic: integer divide fault > > cpuid = 0 > > time = 1 > > > > What is the source line ? > > (gdb) info line *0xffffffff80f1027c > Line 102 of "/usr/src/sys/vm/vm_domainset.c" starts at address > 0xffffffff80f10267 >    and ends at 0xffffffff80f1027f . There was one more source line I asked about. So what happens, IMO, is that for memory-less domains ds_cnt is zero because ds_mask is zero, which causes the exception on divide. You can try the following combined patch, but I really dislike the fact that I cannot safely use DOMAINSET_FIXED (if my diagnosis is correct). I would prefer for kmem_malloc_domainset(DOMAINSET_FIXED(unpopulated domain)) to fail with NULL result, and then I would manually fall-back to DOMAINSET_PREF(). OTOH, I think the chunk for mp_realloc_cpu() is the final fix. diff --git a/sys/amd64/amd64/mp_machdep.c b/sys/amd64/amd64/mp_machdep.c index b38c688f8b4..2c3dc8744f6 100644 --- a/sys/amd64/amd64/mp_machdep.c +++ b/sys/amd64/amd64/mp_machdep.c @@ -402,6 +402,8 @@ mp_realloc_pcpu(int cpuid, int domain) return; m = vm_page_alloc_domain(NULL, 0, domain, VM_ALLOC_NORMAL | VM_ALLOC_NOOBJ); + if (m == NULL) + return; na = PHYS_TO_DMAP(VM_PAGE_TO_PHYS(m)); pagecopy((void *)oa, (void *)na); pmap_qenter((vm_offset_t)&__pcpu[cpuid], &m, 1); @@ -481,10 +483,10 @@ native_start_all_aps(void) M_ZERO); mce_stack = (char *)kmem_malloc(PAGE_SIZE, M_WAITOK | M_ZERO); nmi_stack = (char *)kmem_malloc_domainset( - DOMAINSET_FIXED(domain), PAGE_SIZE, M_WAITOK | M_ZERO); + DOMAINSET_PREF(domain), PAGE_SIZE, M_WAITOK | M_ZERO); dbg_stack = (char *)kmem_malloc_domainset( - DOMAINSET_FIXED(domain), PAGE_SIZE, M_WAITOK | M_ZERO); - dpcpu = (void *)kmem_malloc_domainset(DOMAINSET_FIXED(domain), + DOMAINSET_PREF(domain), PAGE_SIZE, M_WAITOK | M_ZERO); + dpcpu = (void *)kmem_malloc_domainset(DOMAINSET_PREF(domain), DPCPU_SIZE, M_WAITOK | M_ZERO); bootSTK = (char *)bootstacks[cpu] + From owner-freebsd-current@freebsd.org Sun Aug 25 16:15:21 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id EA984E2B48 for ; Sun, 25 Aug 2019 16:15:21 +0000 (UTC) (envelope-from markjdb@gmail.com) Received: from mail-io1-xd44.google.com (mail-io1-xd44.google.com [IPv6:2607:f8b0:4864:20::d44]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46GgGK2DyGz45Xt for ; Sun, 25 Aug 2019 16:15:20 +0000 (UTC) (envelope-from markjdb@gmail.com) Received: by mail-io1-xd44.google.com with SMTP id t6so31561758ios.7 for ; Sun, 25 Aug 2019 09:15:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:date:from:to:cc:subject:message-id:references:mime-version :content-disposition:content-transfer-encoding:in-reply-to :user-agent; bh=yslmllb3LykXSNkiFCbrqbI3snRvli133GndsBOTx3U=; b=aPHgLmTosE967SZRogqV9GwqbM8+SQt9Cn9v+eLOWwLTrfKOTWhqc7qXRp1860tjd3 ch4uTwFRiai3oPYkG2/HmMSwFWkNQKkS4slwAlxi4vtkBXhiIPt1Zm+0L3JM+sEhW6qN 2ANlY5jia5yYK8eP8jf6JVi2cybxyBaGoOufaq51zF1yMxRtkgFWMDR/gojy+zYrBVlT UWqubqVNOaKDYkimPCbN3g0BGtTc/Xeb3QDFIQ3nTm9R3GFdm4+5PwcEHelz7PfTf2qR xaCikNv5eqcjcJgWwDkawOmiUPHOoApuk1STENKps4GpwYi2KJVJtwGvvfz9MYAnm8Eg Q8iA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:from:to:cc:subject:message-id :references:mime-version:content-disposition :content-transfer-encoding:in-reply-to:user-agent; bh=yslmllb3LykXSNkiFCbrqbI3snRvli133GndsBOTx3U=; b=czr4kYoMNp+XyG91PMhwfWt3CZJ8b51MyeZPf4NN0LEc/lyslZlW/mgfjig2zliSDT 29cyykpMcaFweCCHZzKIy8O78CJvE7MUn7/Qn2jdesp/kJNHCGJpZrOZ0G1usNSeNUbH Bl/nQjV/qNSWwindL2Qv+Z6jWxV4Zkkli1SI/SSLKkAOyJ5IEMzh1FNwoBn7+APBidQS CrYvG3Ji1JeSV5QyB0uZs5xq/9i7h/UOy8okfhLVClJPHwJA8vjvOfAXwCDoBKzCbYYO RQESN/9qve/bwtnVtngVFt9ulxNUtcD4EohIWUSy0kbUVdPCKcGdvKCagtFTI8Zt91rh 2xag== X-Gm-Message-State: APjAAAXQm5BACIXA57pZBKSJLh4Z5XekLyOu8t6BkMqVjvxZFnMCihxN 7WfhkkuB1Z/tuPIFVlwkShU= X-Google-Smtp-Source: APXvYqyLWPPZ44rwkFpaOKq7VEwT1M1pCvU1yWoaaQdmJxcqJdJMx8Y3fNLY0f3YLGcAkOIB+ZMREA== X-Received: by 2002:a05:6602:2593:: with SMTP id p19mr12631926ioo.138.1566749719365; Sun, 25 Aug 2019 09:15:19 -0700 (PDT) Received: from raichu (toroon0560w-lp140-03-184-148-66-213.dsl.bell.ca. [184.148.66.213]) by smtp.gmail.com with ESMTPSA id f1sm8260488ioh.73.2019.08.25.09.15.18 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 25 Aug 2019 09:15:18 -0700 (PDT) Sender: Mark Johnston Date: Sun, 25 Aug 2019 12:15:13 -0400 From: Mark Johnston To: Konstantin Belousov Cc: Rebecca Cran , FreeBSD Current Subject: Re: Panic on boot with r351461 (AMD ThreadRipper 2990WX) Message-ID: <20190825161513.GA33382@raichu> References: <6e5687b2-ab3f-a570-37ab-72c8a9776167@bsdio.com> <20190824203305.GF71821@kib.kiev.ua> <20190824230801.GK71821@kib.kiev.ua> <20190825062407.GL71821@kib.kiev.ua> <9e94aea8-7d63-0f9e-2f1e-c1492e9dc455@bsdio.com> <20190825143034.GO71821@kib.kiev.ua> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20190825143034.GO71821@kib.kiev.ua> User-Agent: Mutt/1.12.1 (2019-06-15) X-Rspamd-Queue-Id: 46GgGK2DyGz45Xt X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=aPHgLmTo; dmarc=none; spf=pass (mx1.freebsd.org: domain of markjdb@gmail.com designates 2607:f8b0:4864:20::d44 as permitted sender) smtp.mailfrom=markjdb@gmail.com X-Spamd-Result: default: False [-3.25 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; RCVD_COUNT_THREE(0.00)[3]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[gmail.com:+]; NEURAL_HAM_SHORT(-0.98)[-0.978,0]; FORGED_SENDER(0.30)[markj@freebsd.org,markjdb@gmail.com]; FREEMAIL_TO(0.00)[gmail.com]; RECEIVED_SPAMHAUS_PBL(0.00)[213.66.148.184.khpj7ygk5idzvmvt5x4ziurxhy.zen.dq.spamhaus.net : 127.0.0.11]; MIME_TRACE(0.00)[0:+]; IP_SCORE(-0.57)[ip: (2.40), ipnet: 2607:f8b0::/32(-2.87), asn: 15169(-2.34), country: US(-0.05)]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; FROM_NEQ_ENVFROM(0.00)[markj@freebsd.org,markjdb@gmail.com]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; DMARC_NA(0.00)[freebsd.org]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[4.4.d.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; MID_RHS_NOT_FQDN(0.50)[]; RCVD_TLS_ALL(0.00)[] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 25 Aug 2019 16:15:22 -0000 On Sun, Aug 25, 2019 at 05:30:34PM +0300, Konstantin Belousov wrote: > On Sun, Aug 25, 2019 at 07:17:20AM -0600, Rebecca Cran wrote: > > On 2019-08-25 00:24, Konstantin Belousov wrote: > > > What are the panic messages ? > > > > Fatal trap 18: integer divide fault while in kernel mode > > > > instruction pointer = 0x20:0xffffffff80f1027c > > > > stack pointer = 0x28:0xffffffff845809f0 > > > > frame pointer = 0x28:0xffffffff84580a00 > > > > code segment = base 0x0, limit 0xffffff, type 0x1b > > > >     = DPL 0, pres 1, long 1, def32 0, gran 1 > > > > processor eflags = resume, IOPL = 0 > > > > current process = 0 () > > > > trap number = 18 > > > > panic: integer divide fault > > > > cpuid = 0 > > > > time = 1 > > > > > > > What is the source line ? > > > > (gdb) info line *0xffffffff80f1027c > > Line 102 of "/usr/src/sys/vm/vm_domainset.c" starts at address > > 0xffffffff80f10267 > >    and ends at 0xffffffff80f1027f . > > There was one more source line I asked about. > > So what happens, IMO, is that for memory-less domains ds_cnt is zero > because ds_mask is zero, which causes the exception on divide. You > can try the following combined patch, but I really dislike the fact > that I cannot safely use DOMAINSET_FIXED (if my diagnosis is correct). I think this is simply a bug. Something like the following hack should work: we want to leave the _FIXED domainsets unmodified, but they should be removed from the global list (to ensure that userspace cannot specify impossible policies). diff --git a/sys/kern/kern_cpuset.c b/sys/kern/kern_cpuset.c index 87f9333bf43b..931fe7e157e5 100644 --- a/sys/kern/kern_cpuset.c +++ b/sys/kern/kern_cpuset.c @@ -503,9 +503,17 @@ domainset_empty_vm(struct domainset *domain) int i, j, max; max = DOMAINSET_FLS(&domain->ds_mask) + 1; - for (i = 0; i < max; i++) - if (DOMAINSET_ISSET(i, &domain->ds_mask) && VM_DOMAIN_EMPTY(i)) + for (i = 0; i < max; i++) { + if (DOMAINSET_ISSET(i, &domain->ds_mask) && + VM_DOMAIN_EMPTY(i)) { + /* + * Leave the domainset unmodified, in case it is a + * static policy defined for use by the kernel. + */ + if (domain->ds_cnt == 1) + return (true); DOMAINSET_CLR(i, &domain->ds_mask); + } domain->ds_cnt = DOMAINSET_COUNT(&domain->ds_mask); max = DOMAINSET_FLS(&domain->ds_mask) + 1; for (i = j = 0; i < max; i++) { > I would prefer for kmem_malloc_domainset(DOMAINSET_FIXED(unpopulated domain)) > to fail with NULL result, and then I would manually fall-back to > DOMAINSET_PREF(). > > OTOH, I think the chunk for mp_realloc_cpu() is the final fix. Looks ok to me. From owner-freebsd-current@freebsd.org Sun Aug 25 16:27:51 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id B8A3EE2E5F for ; Sun, 25 Aug 2019 16:27:51 +0000 (UTC) (envelope-from rebecca@bsdio.com) Received: from muon.bsdio.com (muon.bluestop.org [65.103.231.193]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 46GgXk4Hrlz46JP; Sun, 25 Aug 2019 16:27:50 +0000 (UTC) (envelope-from rebecca@bsdio.com) Received: from muon.bsdio.com (localhost [127.0.0.1]) by muon.bsdio.com (Postfix) with ESMTP id 4A062F6217; Sun, 25 Aug 2019 10:27:52 -0600 (MDT) Received: from muon.bsdio.com ([127.0.0.1]) by muon.bsdio.com (muon.bsdio.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id JfmwmNkguBnU; Sun, 25 Aug 2019 10:27:51 -0600 (MDT) Received: from photon.int.bluestop.org (unknown [10.0.10.120]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by muon.bsdio.com (Postfix) with ESMTPSA; Sun, 25 Aug 2019 10:27:51 -0600 (MDT) Subject: Re: Panic on boot with r351461 (AMD ThreadRipper 2990WX) To: Konstantin Belousov , markj@freebsd.org Cc: FreeBSD Current References: <6e5687b2-ab3f-a570-37ab-72c8a9776167@bsdio.com> <20190824203305.GF71821@kib.kiev.ua> <20190824230801.GK71821@kib.kiev.ua> <20190825062407.GL71821@kib.kiev.ua> <9e94aea8-7d63-0f9e-2f1e-c1492e9dc455@bsdio.com> <20190825143034.GO71821@kib.kiev.ua> From: Rebecca Cran Autocrypt: addr=rebecca@bsdio.com; keydata= mQINBFrUMZ4BEADI1yUEGeZeXeTCPay1ZpTBdDEpGPAw1dq2VCSTc1VhsnrEBa1iZxAfaeSv Uu5Ti7jlhQ/3sQMl0bJMKGB/RtmIW7k8h2w476oZmG8gChk8su5ZEx/pV1gdqInyFmmJKTYc gabJz8pL+m82w07qPv+oalepZ4dbj+HF++RAK/iEju+q9UHlsjj8e3mMNsvtrOz1K6bnpveO jZ+ms/2H3Hs5a4k8y6buwe2RvwhJQaXa13cR3LhzL+nwj4B9PHZZEa2WpEyYpw/bI0V9YSQN QgC1CYRzDyakZge6BCM6wHOgZSUzRPufGilrNKUwIVbRoIBR9/85+0wR+PlFUOUOfOc6ox7T dWcIx6PuPhek48rh4uwmmwsPtPiH4Z3T5p+GmWQ9NLFZKA1YnEdaSkWtYZsDxwVZZeYG2plt MfhXP0Hj4rf9Y3eoUenCaGioxAbUOBCtXdTGNAhNjz1g5NGDBVyhjKkzwJQvt9UrYTseERit 5dX2CMTy8hYLvSXd/Ivy+HylUS5IslfZxW5z9LgWX7Z97kILgkH3N0ewtLkygkG+Y+x7uaAV dFqp9ASOyzaiwKbJdeOI+WxRSh+AqeCR0S+bpkcLudLmbjrPmaFwjKycy1H85Z5R2J3YHyXY oT6OYjD8vLbUU2GWp6Onkcy1Pu8EMbRuzKil6HnpYg3BexbPFwARAQABtCNSZWJlY2NhIENy YW4gPHJlYmVjY2FAYmx1ZXN0b3Aub3JnPokCVwQTAQgAQQIbIwUJCWYBgAULCQgHAgYVCgkI CwIEFgIDAQIeAQIXgBYhBB+5fZtkTdO940Yr4g0CK1MRvhAgBQJa2B9zAhkBAAoJEA0CK1MR vhAgzJEQAJUqVmTRO9OqCSS2CVKjrqnEWJMvyo0K8B+WiXo0nSQg9+uyoVU7h2s/kkWVGy4u IWbGy2Qe8LiXzBJjHC3TadGvOvakfdMeKKXcgxgX6KlhA9hA2LW6tg22aHUk7Flr/8diHpgf qIwrXhqJXZmK72GR1QfhgoHsOsTJ9GWPswo1kUMc0cJowq0qP1RDdua6BwvDHHPJwu9OmC/i oQlMNm9gkBDq8H2B+m125ANwCnqBizXaiTTLQdewTMbCSuxbsni2icDqwBfFXzEgcJGaYYfB cQeFsfCmtXQK3JUd4Myx128Dxk9P3X64I93SB7QzB0nmWlyvmCFBNoCp0PCLA4qbwbw2sMRX Wx4BqYa8nI/jg+Nqo+Ut2BfltNZIlsHxK+XhxejfLqAjRCZeLnu1otvFnFuGLaAVYx9x1Y1q J8VizZxq6ujio62Qpultp6KNhlkJ+OKoGwA0k4NHh26SxvlsNxlfg/2v9b1LqWRzNujnwbcF 8g4902XjyBLxV+9YpXZEa8H6zzEHxpeDPWT3QfvrT8JuoHa1IyYnUKvG674UKW5zEGEwkQc9 cuQwR1RHd1ZrKtH1duXzaLr/caMp8ZDfGDDxFpenJTRxNRlg4+K7HSdhpac7sBVMUA8uVdE+ iuTThOmdf0c4DorL3BIh6Yv3FV4/NSqT1Wn3CG2fgG1guQINBFrUMZ4BEADkc4mvMcMcDF1t dNxNQuIBE1F243oZamG3LACCKfc1Yur3CPzHwIk5LXCUmbq23iE5bowxMWw3mlVT0p5xM0Wn UidIBwCKu4kRyy/fY4NyWWBuwy9srpTdmUcKRBRNB8zEZE8xIlidD1ijjgqLBfeM7n9ylawA xHLxwU96sdpdHFzb7Z0yKY2e/bzDaHiG0fUvcCmkgLf+uwKKZid1j8zR5PzKpgPqfy/PF01e KyGV3MNu8Y90xMoiEMWfCI2IB1m+hTuzZoboFvGV54SiMuvfWK/VMQjhsL6K2ddOqwVuy2nI MI4G3xDQW/v8KVyn43OSIAyW1eaklhzu0Ir2sO60PXRkvbTUrouvmSvpJfIQS49rU0M/X6FS DgXQLKrZ3my94+g8ptz9KoVml6s4OAwYVz+sb49nuSxipFKkU5FwhKOLmzbsBxCtytcUJoLm juJPJPDQue6YJiIXyc86GVY2pH3DjemKdbB4dSgqAJIp+lCzKSJzz7bgueh2Ox8vzx1tSxKj 7V8Nal+UTKKbkxPmMh+e20YZ4esAVifO3bS6IJP/aDnfagghB71vA7+aWGXPbjPlc2UHpCBi RSsl+IgoQXvdvZBsKRyfBx8neODa2C6JIE5vcaCjilSeKF8SzsFXvimnndhQNhAPU/DwQwSX dCl4gTsFVi5d8Oxq1sce+wARAQABiQI8BBgBCAAmFiEEH7l9m2RN073jRiviDQIrUxG+ECAF AlrUMZ4CGwwFCQlmAYAACgkQDQIrUxG+ECAWnRAAsmZX+KgNxW3v7R/76Tz4Wjmh4AGeE+Ji 3p5QsdTYny1B6vYBL9vCzPJ/AK8pgKMDRaweUP5eZQpfrdWC8Q7SNGgi4Q+97KEs+i2xZLQ+ WJb8a+WEEIc716u0y4ITiHfOgM5jWcFO4MXQATbJgv0drLLesa+LQCvZgPBqupt307EsCubQ s+Sxt+RVjf6rOUolp1GJXEQYwGsKklVd6yqLC8M1BSG53/WE5tSv5GzBZ8fp6EtmjT7leuid FtEvKYHQz4DqG9ELpHUF0X0UUCBK/MgXe3kCVLKE060UrJ4M6uPSx57rmVFA2MvwQR8M7GsW C5UsSM4PYwPWBhwxE7vcx0691YKAHT/5q8LxRVBdUyzPSprMhSQFttsBt+ygm6wRi3Pi3TuC EARNubPkQefyeC34yr40SAUCkOl3eWxSXPF4NfXFQb4AAzZSE5hv3qbDuwo3lrL0LqpIpEQP Az+JZ1QZ6mMFQ5/JD9Gukj54kZc0X8w3sQt0a8vyE/qrJg8vKgv2rCHrPc5MeDkEUEFiiJiC EDdkJtMyoRlU3S4NrnbyLOLEcHE8fGe3hStPX8hY62id2ecdQ5WZ7vLZW5SFeLarbUciuHIk VL6MHnUjbV7XlY50N7ebeFCIdlCWhdum2FJs/Ni+SSxbZC564vrokwlBBGSo6WTPQTa8IWx1 DtU= Message-ID: <21865c12-9cb4-6560-1075-7cea5f83b30a@bsdio.com> Date: Sun, 25 Aug 2019 10:27:48 -0600 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:68.0) Gecko/20100101 Thunderbird/68.0 MIME-Version: 1.0 In-Reply-To: <20190825143034.GO71821@kib.kiev.ua> Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Content-Language: en-US X-Rspamd-Queue-Id: 46GgXk4Hrlz46JP X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=none (mx1.freebsd.org: domain of rebecca@bsdio.com has no SPF policy when checking 65.103.231.193) smtp.mailfrom=rebecca@bsdio.com X-Spamd-Result: default: False [-3.98 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-0.998,0]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; TO_DN_SOME(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; RCVD_TLS_LAST(0.00)[]; DMARC_NA(0.00)[bsdio.com]; AUTH_NA(1.00)[]; RCVD_COUNT_THREE(0.00)[4]; TO_MATCH_ENVRCPT_SOME(0.00)[]; NEURAL_HAM_SHORT(-0.96)[-0.965,0]; R_SPF_NA(0.00)[]; FREEMAIL_TO(0.00)[gmail.com]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:209, ipnet:65.103.224.0/19, country:US]; MID_RHS_MATCH_FROM(0.00)[]; IP_SCORE(-1.92)[ip: (-9.49), asn: 209(-0.04), country: US(-0.05)] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 25 Aug 2019 16:27:51 -0000 On 2019-08-25 08:30, Konstantin Belousov wrote: > > So what happens, IMO, is that for memory-less domains ds_cnt is zero > because ds_mask is zero, which causes the exception on divide. You > can try the following combined patch, but I really dislike the fact > that I cannot safely use DOMAINSET_FIXED (if my diagnosis is correct). With that patch applied, boot gets a lot further but eventually panics after probing pcm devices: panic: vm_domainset_iter_first: Unknown policy 0 cpuid = 49 time = 1 KDB: stack backtrace: ... vm_domainset_iter_first() vm_domainset_iter_page_init() vm_page_grab_pages() vm_thread_stack_create() kstack_import() uma_zalloc_arg() vm_thread_new() thread_alloc() kthread_add() vm_pageout() fork_exit() fork_trampoline() -- Rebecca Cran From owner-freebsd-current@freebsd.org Sun Aug 25 16:55:38 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 65EB1E37E6 for ; Sun, 25 Aug 2019 16:55:38 +0000 (UTC) (envelope-from markjdb@gmail.com) Received: from mail-io1-xd43.google.com (mail-io1-xd43.google.com [IPv6:2607:f8b0:4864:20::d43]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46Gh8n13fmz485V for ; Sun, 25 Aug 2019 16:55:36 +0000 (UTC) (envelope-from markjdb@gmail.com) Received: by mail-io1-xd43.google.com with SMTP id l7so31720185ioj.6 for ; Sun, 25 Aug 2019 09:55:36 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=vhinh3ClYbjdN9daHRMvJqwa+SeV0HCIcta6IcpyUb8=; b=ttawaH+mtyVJBbHCrF5SrXQA/ca7bYZYiVlvKtykPUuz3riXhqpmbA+K2OB9HujmxC RiEAJN92+mEsDTDyiqhj9Okm1+gjnzl6fXPW32czZBEfT+mNKHke0HMFeVVCgME4uRPQ kpEXQggCzEnnmOCcJ2HN+jOMkbbnyD4h5HAqK2xiR6kVdav2gxqn4R8OhS+DUTGLm0Ra 6sHNFWqjoOv35Vaw8ClJwvXuebuIJIiV5dgSxT80aAUUjxNdi7dCtPU+Thr9oG9eQgmN 6x+PlMSw9OTA/ocfzgS6tZ64AHOlZFPNPHYkXCT+dL3HtPkRpO46xYQ/X7qHVDWgChmz 2ICg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:from:to:cc:subject:message-id :references:mime-version:content-disposition:in-reply-to:user-agent; bh=vhinh3ClYbjdN9daHRMvJqwa+SeV0HCIcta6IcpyUb8=; b=sXpg1k1u5MBHkQd7SuYyVm3MP9C7mZaPL8UMgCmeGQCeJ7f5Cr8Sk8nE/ykIPBIeQr Vvz+EnZ3/gPMdW4TWlvEEyA3UH1WbHgFLBOAWGuXa3JNDt59iEWmGW6vM1btVieKkmRT Vio+UR+MpcX59lcEZoVkOrug4NmbGcwdT6/TIgEgkfTpvzQclHvts0S694hZE6yCl8ny 9VXBvJFgFXQds79JWK7ftMXtEaocVDFEtUWvI4cIjEIMc7SGOYAR/4GIX2hZaw0GnHF8 a2p8wtv+M70j6XC9KCWuI+Qll6dUn6biM1jf/lToZkOAUQoUPLXE8MHBeUqKRT5OL4NW Kdiw== X-Gm-Message-State: APjAAAVlSYkApVqsn4KX3L3b/aqN4Pjytz1HdHTRZhT9g7IFNbTA32Kt yQPL/S085kBqfECNMYJofOQ= X-Google-Smtp-Source: APXvYqzcL2XWjQAliKf7Q5o0c3J6nqMOgr7hhixp7/k0dZL8RJFfMUdMC/AYG6Ete8n8CtAfOwBHAg== X-Received: by 2002:a02:cc8f:: with SMTP id s15mr14573791jap.53.1566752135571; Sun, 25 Aug 2019 09:55:35 -0700 (PDT) Received: from raichu (toroon0560w-lp140-03-184-148-66-213.dsl.bell.ca. [184.148.66.213]) by smtp.gmail.com with ESMTPSA id m20sm7122448ioh.4.2019.08.25.09.55.34 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 25 Aug 2019 09:55:34 -0700 (PDT) Sender: Mark Johnston Date: Sun, 25 Aug 2019 12:55:32 -0400 From: Mark Johnston To: Rebecca Cran Cc: Konstantin Belousov , FreeBSD Current Subject: Re: Panic on boot with r351461 (AMD ThreadRipper 2990WX) Message-ID: <20190825165532.GB33382@raichu> References: <6e5687b2-ab3f-a570-37ab-72c8a9776167@bsdio.com> <20190824203305.GF71821@kib.kiev.ua> <20190824230801.GK71821@kib.kiev.ua> <20190825062407.GL71821@kib.kiev.ua> <9e94aea8-7d63-0f9e-2f1e-c1492e9dc455@bsdio.com> <20190825143034.GO71821@kib.kiev.ua> <21865c12-9cb4-6560-1075-7cea5f83b30a@bsdio.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <21865c12-9cb4-6560-1075-7cea5f83b30a@bsdio.com> User-Agent: Mutt/1.12.1 (2019-06-15) X-Rspamd-Queue-Id: 46Gh8n13fmz485V X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=ttawaH+m; dmarc=none; spf=pass (mx1.freebsd.org: domain of markjdb@gmail.com designates 2607:f8b0:4864:20::d43 as permitted sender) smtp.mailfrom=markjdb@gmail.com X-Spamd-Result: default: False [-3.30 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36:c]; RCVD_COUNT_THREE(0.00)[3]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[gmail.com:+]; NEURAL_HAM_SHORT(-0.98)[-0.981,0]; FORGED_SENDER(0.30)[markj@freebsd.org,markjdb@gmail.com]; RECEIVED_SPAMHAUS_PBL(0.00)[213.66.148.184.khpj7ygk5idzvmvt5x4ziurxhy.zen.dq.spamhaus.net : 127.0.0.11]; MIME_TRACE(0.00)[0:+]; IP_SCORE(-0.62)[ip: (2.17), ipnet: 2607:f8b0::/32(-2.87), asn: 15169(-2.33), country: US(-0.05)]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; FROM_NEQ_ENVFROM(0.00)[markj@freebsd.org,markjdb@gmail.com]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; DMARC_NA(0.00)[freebsd.org]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[3.4.d.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; MID_RHS_NOT_FQDN(0.50)[]; FREEMAIL_CC(0.00)[gmail.com]; RCVD_TLS_ALL(0.00)[] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 25 Aug 2019 16:55:38 -0000 On Sun, Aug 25, 2019 at 10:27:48AM -0600, Rebecca Cran wrote: > On 2019-08-25 08:30, Konstantin Belousov wrote: > > > > So what happens, IMO, is that for memory-less domains ds_cnt is zero > > because ds_mask is zero, which causes the exception on divide. You > > can try the following combined patch, but I really dislike the fact > > that I cannot safely use DOMAINSET_FIXED (if my diagnosis is correct). > > > With that patch applied, boot gets a lot further but eventually panics > after probing pcm devices: > > > panic: vm_domainset_iter_first: Unknown policy 0 Can you please try applying this patch as well? diff --git a/sys/vm/uma.h b/sys/vm/uma.h index be88c57a5c66..39749ac52e99 100644 --- a/sys/vm/uma.h +++ b/sys/vm/uma.h @@ -292,6 +292,8 @@ uma_zone_t uma_zcache_create(char *name, int size, uma_ctor ctor, uma_dtor dtor, #define UMA_ALIGN_CACHE (0 - 1) /* Cache line size align */ #define UMA_ALIGNOF(type) (_Alignof(type) - 1) /* Alignment fit for 'type' */ +#define UMA_ANYDOMAIN -1 /* Special value for domain search. */ + /* * Destroys an empty uma zone. If the zone is not empty uma complains loudly. * diff --git a/sys/vm/uma_core.c b/sys/vm/uma_core.c index 9d8752df7200..78eaa7b49f82 100644 --- a/sys/vm/uma_core.c +++ b/sys/vm/uma_core.c @@ -234,8 +234,6 @@ enum zfreeskip { SKIP_FINI = 0x00020000, }; -#define UMA_ANYDOMAIN -1 /* Special value for domain search. */ - /* Prototypes.. */ int uma_startup_count(int); diff --git a/sys/vm/vm_glue.c b/sys/vm/vm_glue.c index ed26f9607a8f..4a7bbc9770e9 100644 --- a/sys/vm/vm_glue.c +++ b/sys/vm/vm_glue.c @@ -454,12 +454,18 @@ vm_thread_dispose(struct thread *td) static int kstack_import(void *arg, void **store, int cnt, int domain, int flags) { + struct domainset *ds; vm_object_t ksobj; int i; + if (domain == UMA_ANYDOMAIN) + ds = DOMAINSET_RR(); + else + ds = DOMAINSET_PREF(domain); + for (i = 0; i < cnt; i++) { - store[i] = (void *)vm_thread_stack_create( - DOMAINSET_PREF(domain), &ksobj, kstack_pages); + store[i] = (void *)vm_thread_stack_create(ds, &ksobj, + kstack_pages); if (store[i] == NULL) break; } From owner-freebsd-current@freebsd.org Sun Aug 25 18:20:21 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 0F41FE59E8 for ; Sun, 25 Aug 2019 18:20:21 +0000 (UTC) (envelope-from rebecca@bsdio.com) Received: from muon.bsdio.com (muon.bluestop.org [65.103.231.193]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 46Gk2X0dJqz4FDH; Sun, 25 Aug 2019 18:20:19 +0000 (UTC) (envelope-from rebecca@bsdio.com) Received: from muon.bsdio.com (localhost [127.0.0.1]) by muon.bsdio.com (Postfix) with ESMTP id B845EF62CE; Sun, 25 Aug 2019 12:20:21 -0600 (MDT) Received: from muon.bsdio.com ([127.0.0.1]) by muon.bsdio.com (muon.bsdio.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id fsmwQnIodDAZ; Sun, 25 Aug 2019 12:20:21 -0600 (MDT) Received: from photon.int.bluestop.org (unknown [10.0.10.120]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by muon.bsdio.com (Postfix) with ESMTPSA; Sun, 25 Aug 2019 12:20:21 -0600 (MDT) Subject: Re: Panic on boot with r351461 (AMD ThreadRipper 2990WX) To: Mark Johnston Cc: Konstantin Belousov , FreeBSD Current References: <6e5687b2-ab3f-a570-37ab-72c8a9776167@bsdio.com> <20190824203305.GF71821@kib.kiev.ua> <20190824230801.GK71821@kib.kiev.ua> <20190825062407.GL71821@kib.kiev.ua> <9e94aea8-7d63-0f9e-2f1e-c1492e9dc455@bsdio.com> <20190825143034.GO71821@kib.kiev.ua> <21865c12-9cb4-6560-1075-7cea5f83b30a@bsdio.com> <20190825165532.GB33382@raichu> From: Rebecca Cran Autocrypt: addr=rebecca@bsdio.com; keydata= mQINBFrUMZ4BEADI1yUEGeZeXeTCPay1ZpTBdDEpGPAw1dq2VCSTc1VhsnrEBa1iZxAfaeSv Uu5Ti7jlhQ/3sQMl0bJMKGB/RtmIW7k8h2w476oZmG8gChk8su5ZEx/pV1gdqInyFmmJKTYc gabJz8pL+m82w07qPv+oalepZ4dbj+HF++RAK/iEju+q9UHlsjj8e3mMNsvtrOz1K6bnpveO jZ+ms/2H3Hs5a4k8y6buwe2RvwhJQaXa13cR3LhzL+nwj4B9PHZZEa2WpEyYpw/bI0V9YSQN QgC1CYRzDyakZge6BCM6wHOgZSUzRPufGilrNKUwIVbRoIBR9/85+0wR+PlFUOUOfOc6ox7T dWcIx6PuPhek48rh4uwmmwsPtPiH4Z3T5p+GmWQ9NLFZKA1YnEdaSkWtYZsDxwVZZeYG2plt MfhXP0Hj4rf9Y3eoUenCaGioxAbUOBCtXdTGNAhNjz1g5NGDBVyhjKkzwJQvt9UrYTseERit 5dX2CMTy8hYLvSXd/Ivy+HylUS5IslfZxW5z9LgWX7Z97kILgkH3N0ewtLkygkG+Y+x7uaAV dFqp9ASOyzaiwKbJdeOI+WxRSh+AqeCR0S+bpkcLudLmbjrPmaFwjKycy1H85Z5R2J3YHyXY oT6OYjD8vLbUU2GWp6Onkcy1Pu8EMbRuzKil6HnpYg3BexbPFwARAQABtCNSZWJlY2NhIENy YW4gPHJlYmVjY2FAYmx1ZXN0b3Aub3JnPokCVwQTAQgAQQIbIwUJCWYBgAULCQgHAgYVCgkI CwIEFgIDAQIeAQIXgBYhBB+5fZtkTdO940Yr4g0CK1MRvhAgBQJa2B9zAhkBAAoJEA0CK1MR vhAgzJEQAJUqVmTRO9OqCSS2CVKjrqnEWJMvyo0K8B+WiXo0nSQg9+uyoVU7h2s/kkWVGy4u IWbGy2Qe8LiXzBJjHC3TadGvOvakfdMeKKXcgxgX6KlhA9hA2LW6tg22aHUk7Flr/8diHpgf qIwrXhqJXZmK72GR1QfhgoHsOsTJ9GWPswo1kUMc0cJowq0qP1RDdua6BwvDHHPJwu9OmC/i oQlMNm9gkBDq8H2B+m125ANwCnqBizXaiTTLQdewTMbCSuxbsni2icDqwBfFXzEgcJGaYYfB cQeFsfCmtXQK3JUd4Myx128Dxk9P3X64I93SB7QzB0nmWlyvmCFBNoCp0PCLA4qbwbw2sMRX Wx4BqYa8nI/jg+Nqo+Ut2BfltNZIlsHxK+XhxejfLqAjRCZeLnu1otvFnFuGLaAVYx9x1Y1q J8VizZxq6ujio62Qpultp6KNhlkJ+OKoGwA0k4NHh26SxvlsNxlfg/2v9b1LqWRzNujnwbcF 8g4902XjyBLxV+9YpXZEa8H6zzEHxpeDPWT3QfvrT8JuoHa1IyYnUKvG674UKW5zEGEwkQc9 cuQwR1RHd1ZrKtH1duXzaLr/caMp8ZDfGDDxFpenJTRxNRlg4+K7HSdhpac7sBVMUA8uVdE+ iuTThOmdf0c4DorL3BIh6Yv3FV4/NSqT1Wn3CG2fgG1guQINBFrUMZ4BEADkc4mvMcMcDF1t dNxNQuIBE1F243oZamG3LACCKfc1Yur3CPzHwIk5LXCUmbq23iE5bowxMWw3mlVT0p5xM0Wn UidIBwCKu4kRyy/fY4NyWWBuwy9srpTdmUcKRBRNB8zEZE8xIlidD1ijjgqLBfeM7n9ylawA xHLxwU96sdpdHFzb7Z0yKY2e/bzDaHiG0fUvcCmkgLf+uwKKZid1j8zR5PzKpgPqfy/PF01e KyGV3MNu8Y90xMoiEMWfCI2IB1m+hTuzZoboFvGV54SiMuvfWK/VMQjhsL6K2ddOqwVuy2nI MI4G3xDQW/v8KVyn43OSIAyW1eaklhzu0Ir2sO60PXRkvbTUrouvmSvpJfIQS49rU0M/X6FS DgXQLKrZ3my94+g8ptz9KoVml6s4OAwYVz+sb49nuSxipFKkU5FwhKOLmzbsBxCtytcUJoLm juJPJPDQue6YJiIXyc86GVY2pH3DjemKdbB4dSgqAJIp+lCzKSJzz7bgueh2Ox8vzx1tSxKj 7V8Nal+UTKKbkxPmMh+e20YZ4esAVifO3bS6IJP/aDnfagghB71vA7+aWGXPbjPlc2UHpCBi RSsl+IgoQXvdvZBsKRyfBx8neODa2C6JIE5vcaCjilSeKF8SzsFXvimnndhQNhAPU/DwQwSX dCl4gTsFVi5d8Oxq1sce+wARAQABiQI8BBgBCAAmFiEEH7l9m2RN073jRiviDQIrUxG+ECAF AlrUMZ4CGwwFCQlmAYAACgkQDQIrUxG+ECAWnRAAsmZX+KgNxW3v7R/76Tz4Wjmh4AGeE+Ji 3p5QsdTYny1B6vYBL9vCzPJ/AK8pgKMDRaweUP5eZQpfrdWC8Q7SNGgi4Q+97KEs+i2xZLQ+ WJb8a+WEEIc716u0y4ITiHfOgM5jWcFO4MXQATbJgv0drLLesa+LQCvZgPBqupt307EsCubQ s+Sxt+RVjf6rOUolp1GJXEQYwGsKklVd6yqLC8M1BSG53/WE5tSv5GzBZ8fp6EtmjT7leuid FtEvKYHQz4DqG9ELpHUF0X0UUCBK/MgXe3kCVLKE060UrJ4M6uPSx57rmVFA2MvwQR8M7GsW C5UsSM4PYwPWBhwxE7vcx0691YKAHT/5q8LxRVBdUyzPSprMhSQFttsBt+ygm6wRi3Pi3TuC EARNubPkQefyeC34yr40SAUCkOl3eWxSXPF4NfXFQb4AAzZSE5hv3qbDuwo3lrL0LqpIpEQP Az+JZ1QZ6mMFQ5/JD9Gukj54kZc0X8w3sQt0a8vyE/qrJg8vKgv2rCHrPc5MeDkEUEFiiJiC EDdkJtMyoRlU3S4NrnbyLOLEcHE8fGe3hStPX8hY62id2ecdQ5WZ7vLZW5SFeLarbUciuHIk VL6MHnUjbV7XlY50N7ebeFCIdlCWhdum2FJs/Ni+SSxbZC564vrokwlBBGSo6WTPQTa8IWx1 DtU= Message-ID: <5ecbc990-8fd5-a365-2d0a-e43084cb3c77@bsdio.com> Date: Sun, 25 Aug 2019 12:20:17 -0600 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:68.0) Gecko/20100101 Thunderbird/68.0 MIME-Version: 1.0 In-Reply-To: <20190825165532.GB33382@raichu> Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Content-Language: en-US X-Rspamd-Queue-Id: 46Gk2X0dJqz4FDH X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=none (mx1.freebsd.org: domain of rebecca@bsdio.com has no SPF policy when checking 65.103.231.193) smtp.mailfrom=rebecca@bsdio.com X-Spamd-Result: default: False [-3.96 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; NEURAL_HAM_MEDIUM(-0.99)[-0.993,0]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; IP_SCORE(-1.91)[ip: (-9.45), asn: 209(-0.04), country: US(-0.05)]; MIME_GOOD(-0.10)[text/plain]; RCVD_TLS_LAST(0.00)[]; DMARC_NA(0.00)[bsdio.com]; AUTH_NA(1.00)[]; NEURAL_HAM_LONG(-1.00)[-0.999,0]; RCVD_COUNT_THREE(0.00)[4]; TO_MATCH_ENVRCPT_SOME(0.00)[]; TO_DN_ALL(0.00)[]; NEURAL_HAM_SHORT(-0.96)[-0.961,0]; R_SPF_NA(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:209, ipnet:65.103.224.0/19, country:US]; FREEMAIL_CC(0.00)[gmail.com]; MID_RHS_MATCH_FROM(0.00)[] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 25 Aug 2019 18:20:21 -0000 On 2019-08-25 10:55, Mark Johnston wrote: > > Can you please try applying this patch as well? Thanks, that fixed the panic and allows the system to fully boot again. -- Rebecca Cran From owner-freebsd-current@freebsd.org Mon Aug 26 05:09:34 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 37044CF976 for ; Mon, 26 Aug 2019 05:09:34 +0000 (UTC) (envelope-from mms.vanbreukelingen@gmail.com) Received: from mail-io1-xd43.google.com (mail-io1-xd43.google.com [IPv6:2607:f8b0:4864:20::d43]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46H0Rd2rrkz3P73 for ; Mon, 26 Aug 2019 05:09:33 +0000 (UTC) (envelope-from mms.vanbreukelingen@gmail.com) Received: by mail-io1-xd43.google.com with SMTP id 18so34265087ioe.10 for ; Sun, 25 Aug 2019 22:09:33 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=date:from:reply-to:to:message-id:subject:mime-version:references; bh=EZ0gnfX0aTlLWDPMnmJ74gmuBQML/7WBQahVzj5fWNw=; b=oA7kPpyll//POh8/RXSNIZSDYlqIqWqPVnRcZDRd6T8CGi7kOAeac8UC9z9Y0Z885o h5NiezMghaeNiQhlYz9YQcGuy6PoQCOwnLnOFocYiVy6iqZ8dH0FubFPU/dxjheHBWM5 HHBI1YlRvBniP3mjnKfgsULUqK6iezohT7jbacpDj8LYzNTvyN+nFBeW1FkNhDy36YnL qS3fYR4t87J5kDVohr9Xe1jFaAoY9O5+MPcGzu/F62tdHyu1T43Vgpg7+RZQtdy68kmb L6xpn1OmDHm6NBI+qjCqRYAY3f8twYofU5/y0c5SC5aTTUim+YHfc/YcVeR/YiBFG53e KagQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:reply-to:to:message-id:subject :mime-version:references; bh=EZ0gnfX0aTlLWDPMnmJ74gmuBQML/7WBQahVzj5fWNw=; b=fPguZ6DeNHsZ5RY+X0ZMe/mIjhrUAay/6Xe5k2X8vh8ZkeH1kIDe0CcBminWjRvtC4 qjxFbdX9zB7SZr9keIEhkSAGP3tfxYi5DTWvttFaNpJrBRJRGBYr1E79RxYzIdp/1dmf N9rdVG2nCDCAO/XuYpHNlxBJTQI7r4ZX19mXd4iT6Pb4GjH9E8yjFyAZFSlyR3YmX0Pj PNT/lPncX8OupkDU63Q883qW1NBq8ekju7DI8xO7sv2/v1JNO+fqDweh9xWyD4Wz6Yn3 ypC28kbU5eM8vyqbg2984I61EpRfWv+4mywzw0mFQFnlDkTT0KOLxxXhmwBBfCoatnfh UFWQ== X-Gm-Message-State: APjAAAVFi0/Bbbw247HJ0guaOwRilsnhAIZMqRYEUVmovWP4MFHusJUK 0xbZvZ9NdAjN+iC9eZFl2aiH7o85xgU= X-Google-Smtp-Source: APXvYqxsW12kJOKjU1feXMD8ChJuittK7IOKGIdXX4Z6ZqL1gNGGlyPijiQo2nm5z+XkizBkUFDmaw== X-Received: by 2002:a5d:9e06:: with SMTP id h6mr18516758ioh.207.1566796171531; Sun, 25 Aug 2019 22:09:31 -0700 (PDT) Received: from sonic301-30.consmr.mail.ne1.yahoo.com (sonic301-30.consmr.mail.ne1.yahoo.com. [66.163.184.199]) by smtp.gmail.com with ESMTPSA id v3sm9162123iom.53.2019.08.25.22.09.31 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sun, 25 Aug 2019 22:09:31 -0700 (PDT) X-YMail-OSG: .UmTZ3MVM1mrvEUlc6xY_z1JRuQllvLcUYTbk8sCc8V68iJwRDHfWQXbgd6ULUL oUd_c49N.wwzHYYdOYdpe.eoQTPiU5eEsDFeX9.WpByrTUYD0PL33soH4cfH7QupdbviXQmUZc.q kTYjPsL6z7g2HGxvBW5RQN8aqKyuheBv47HO8RGOhp_VH_DVZCNKtIgITToHfaCONxdWfO813jeh msYgAW_wh2kd6yKPUOUfZ5yUTpDBtP2FO5AEZ75.qfLnzPF_C3QKHANBSBkmB1BPDQUrrRzFOkvJ fzDN8BbPf9yOPEkkzBRIKiexkDC63qsE8AVuKGOmnu8b58yEJyqBn1tEGqHxcEZwQMAmwwrf3uHQ geKpO9J6zmEffMNQlZ2r5QGNTNYoLmfkwKnLSxHaAL.pwc.d6NCiZy.whLj.c5xjVDkPfEi3DJws DPW2aTN7Zmb15_kNpcvJ7kgLIU81hJBAD3oyxW0GBbuEQmmfc4my.xi.f3cXsU1Um7fOHJ6xjOby ZkoioTA2pUF4nqGhN4h9H7rmZw8G4Ag1eWH3tfXalJqjziQwufjKPsvYgn36Edau7GsFU5zWFGFs Q1xisOBZb2pVsbOO9Fh1vXrWC2cierlfcvA.pJEmPs_KyhkoUsNPpaUUnsqKEkrYWoeIMvgpHAkJ hlm2kWELVWvJUY1qh6yNZVK5QPHfTYnVRBN_TiGFM_Ck_wC0GK9AC1wFMs.fwgMfKvsnfRfYjFeK KqO5E02_jQlT8W4XzlHPYH5g9vX2uiPniArqRkjw7TYeSuR2HaB46Lc5rDF8JVmh5uxfJ25GV0Kl 2.iXG6gJQcjWFVdP66HffTC3mhF426Zk_tDFQXOd488wg.Ml20PgI31YJ2wDl.q9sul9hpPWxpro dY403C4HmKKD7X0bs8X4l5e0KmT78iLwKde4Pkk5zyZHIsxC35Xzcg3VL7t74iacXlyTgyw3OwPq qr8sqPwr1RJtdgPhjsBm8gT_mG78mgtzg77fAMfHiJTIMOnBbU.RjJ2RhrZ7tP9jQFVxsq1kp4kE 2iJXCmHcaRvmfnJly76llT.YgBsqxoHPeuN3uXRdusHG.ZDkuP9aar5KfuBXvbTUU5qnIAcURRoZ oULyVwBWVW6OOWX_27SbzGN0qVAth2Fl6b0r6NidJeeymFXYKpeP8c2IP30JmrZSgFnaMe2mm62Z AICEe70CVTkv5q75n4ibDteL_ah2VLFs8mMC8b3uJuuY.m6AOk1jJ9YT1SEjxdFR4kjjEFGoPnCd FKCX6bXTdkwJQSMkFgLKTWw3zY7VP7lxCGU2eKUQTYEneoNkPO9EHeXV7EUZqBEfJDLUKhd.C_AK rwgh23RK340pZ Received: from sonic.gate.mail.ne1.yahoo.com by sonic301.consmr.mail.ne1.yahoo.com with HTTP; Mon, 26 Aug 2019 05:09:30 +0000 Date: Mon, 26 Aug 2019 05:09:27 +0000 (UTC) From: "mms.vanbreukelingen@gmail.com" Reply-To: "mms.vanbreukelingen@gmail.com" To: "freebsd-current@freebsd.org" Message-ID: <47509401.1440476.1566796167857@mail.yahoo.com> Subject: Kernel-Crash when working with ubt0 MIME-Version: 1.0 References: <47509401.1440476.1566796167857.ref@mail.yahoo.com> X-Mailer: WebService/1.1.14219 YahooMailAndroidMobile YMobile/1.0 (com.yahoo.mobile.client.android.mail/5.43.3; Android/7.0; HUAWEIBLN-L21; hi6250; HUAWEI; HUAWEI BLN-L21; 5.3; 1843x1080; ) X-Rspamd-Queue-Id: 46H0Rd2rrkz3P73 X-Spamd-Bar: - Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=oA7kPpyl; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of mmsvanbreukelingen@gmail.com designates 2607:f8b0:4864:20::d43 as permitted sender) smtp.mailfrom=mmsvanbreukelingen@gmail.com X-Spamd-Result: default: False [-1.38 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; HAS_REPLYTO(0.00)[mms.vanbreukelingen@gmail.com]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; FREEMAIL_FROM(0.00)[gmail.com]; RCVD_COUNT_THREE(0.00)[4]; DKIM_TRACE(0.00)[gmail.com:+]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; NEURAL_HAM_SHORT(-0.98)[-0.976,0]; FROM_EQ_ENVFROM(0.00)[]; RCVD_TLS_LAST(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; TAGGED_FROM(0.00)[]; FREEMAIL_ENVFROM(0.00)[gmail.com]; DWL_DNSWL_NONE(0.00)[gmail.com.dwl.dnswl.org : 127.0.5.0]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; REPLYTO_EQ_FROM(0.00)[]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; FREEMAIL_REPLYTO(0.00)[gmail.com]; IP_SCORE_FREEMAIL(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; MANY_INVISIBLE_PARTS(0.40)[5]; IP_SCORE(0.00)[ip: (2.17), ipnet: 2607:f8b0::/32(-2.87), asn: 15169(-2.33), country: US(-0.05)]; RCVD_IN_DNSWL_NONE(0.00)[3.4.d.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; TO_DN_EQ_ADDR_ALL(0.00)[]; HFILTER_URL_ONLY(2.20)[1] Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 26 Aug 2019 05:09:34 -0000 I'm not repeating myself here:=C2=A0 kernel-crash with ubt0 =20 | =20 | =20 | =20 | | | | | | =20 | | =20 kernel-crash with ubt0 =20 I'm trying to setup a bluetooth-box with freeBSD 13. uname -a: FreeBSD free= BSD13 13.0-CURRENT FreeBSD 13.0-CURRENT #0 r351273M: Wed Aug 21 06:50:26 CE= ST 2019 root@freeBSD13:/usr/obj/usr/src/head/amd64.amd64/sys/GENERIC amd64 = loading ng_ubt.ko | | | | =20 I swear it has nothing to do with the kernel, with the stock one it's getti= ng to the same point.=C2=A0 Miranda From owner-freebsd-current@freebsd.org Mon Aug 26 07:22:52 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id CD2B3D2677 for ; Mon, 26 Aug 2019 07:22:52 +0000 (UTC) (envelope-from hps@selasky.org) Received: from mail.turbocat.net (turbocat.net [IPv6:2a01:4f8:c17:6c4b::2]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 46H3PR50kYz415V for ; Mon, 26 Aug 2019 07:22:51 +0000 (UTC) (envelope-from hps@selasky.org) Received: from hps2016.home.selasky.org (unknown [62.141.129.235]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits)) (No client certificate requested) by mail.turbocat.net (Postfix) with ESMTPSA id A7B3F260295; Mon, 26 Aug 2019 09:22:35 +0200 (CEST) Subject: Re: Kernel-Crash when working with ubt0 To: "mms.vanbreukelingen@gmail.com" , "freebsd-current@freebsd.org" References: <47509401.1440476.1566796167857.ref@mail.yahoo.com> <47509401.1440476.1566796167857@mail.yahoo.com> From: Hans Petter Selasky Message-ID: <5aa8faeb-5e8e-38be-4301-81f3d82c494a@selasky.org> Date: Mon, 26 Aug 2019 09:21:53 +0200 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:60.0) Gecko/20100101 Thunderbird/60.6.1 MIME-Version: 1.0 In-Reply-To: <47509401.1440476.1566796167857@mail.yahoo.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: 46H3PR50kYz415V X-Spamd-Bar: ----- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of hps@selasky.org designates 2a01:4f8:c17:6c4b::2 as permitted sender) smtp.mailfrom=hps@selasky.org X-Spamd-Result: default: False [-5.86 / 15.00]; ARC_NA(0.00)[]; TO_DN_EQ_ADDR_SOME(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+a:mail.turbocat.net]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; TAGGED_RCPT(0.00)[]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[selasky.org]; TO_MATCH_ENVRCPT_SOME(0.00)[]; NEURAL_HAM_SHORT(-0.98)[-0.981,0]; RCPT_COUNT_TWO(0.00)[2]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; IP_SCORE(-2.58)[ip: (-9.12), ipnet: 2a01:4f8::/29(-1.96), asn: 24940(-1.79), country: DE(-0.01)]; FREEMAIL_TO(0.00)[gmail.com]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:24940, ipnet:2a01:4f8::/29, country:DE]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_TLS_ALL(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 26 Aug 2019 07:22:52 -0000 Do you have a backtrace? --HPS From owner-freebsd-current@freebsd.org Mon Aug 26 11:47:31 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 3398FD8B67 for ; Mon, 26 Aug 2019 11:47:31 +0000 (UTC) (envelope-from ohartmann@walstatt.org) Received: from mout.gmx.net (mout.gmx.net [212.227.17.20]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "mout.gmx.net", Issuer "TeleSec ServerPass Class 2 CA" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46H9Gp0XLYz4HpJ for ; Mon, 26 Aug 2019 11:47:29 +0000 (UTC) (envelope-from ohartmann@walstatt.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net; s=badeba3b8450; t=1566820041; bh=NqbWNHP7sYBNabCmyhXFqSSqgIq5xhiogu4G5QVumiY=; h=X-UI-Sender-Class:Date:From:To:Cc:Subject:In-Reply-To:References; b=Ppt+6UUWxSf4XPxrB1SVUT9TWa3u8NYYoVwiC7gdrAsE4mOGQmO7DMxurq4meD1Zu J7vEdxmHlERlz9fz0uuCCjDzYphQxL4WAxNCsnNM2emKSHI0hSbyGu0ARBzF9lSbZN u8GgqFFJn6j/vQf0Cxi03K7kLYwdyHwgfVpB4JdY= X-UI-Sender-Class: 01bb95c1-4bf8-414a-932a-4f6e2808ef9c Received: from freyja ([46.88.81.15]) by mail.gmx.com (mrgmx105 [212.227.17.168]) with ESMTPSA (Nemesis) id 1MPogF-1ho8ZX1519-00MwMC; Mon, 26 Aug 2019 13:22:16 +0200 Date: Mon, 26 Aug 2019 13:22:07 +0200 From: "O. Hartmann" To: Toomas Soome Cc: greg@unrelenting.technology, "O. Hartmann" , Karl Denninger , freebsd-current@freebsd.org, Warner Losh Subject: Re: HELP: UEFI/ZFS Boot failure: Ignoring Boot000A: Only one DP found Message-ID: <20190826132150.6f748419@freyja> In-Reply-To: <12E83654-1104-408E-9A1E-BE79308B9A92@me.com> References: <20190821232334.433d285c@thor.intern.walstatt.dynvpn.de> <20190821195847.577a165b@thor.intern.walstatt.dynvpn.de> <48D9A1D1-5A54-4FED-8DC8-40C9A5C9BE3A@me.com> <20190821213052.25d61cb4@thor.intern.walstatt.dynvpn.de> <480F8DE0-A38F-4BCA-9F36-0D812CDB7DD8@me.com> <20190821223140.643f6c63@thor.intern.walstatt.dynvpn.de> <483d59b24a636d0214555610350b8d73@unrelenting.technology> <20190822050509.64c88a51@thor.intern.walstatt.dynvpn.de> <12E83654-1104-408E-9A1E-BE79308B9A92@me.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-Provags-ID: V03:K1:HOjqF+/LxdYVUQgk0fmoM4gMZ/3PILwFcUEnEeIDj+MegwI8IkU UJozwVmYkjEdaVpQpUJKazFKPThVF0cnHLlJMJ2BOn3dVD1adwuXJ3dQ+WHXw330rh5rJfy j4YAuQytNetS3d6qrRD8u9PugtpAic1RnwcanenTsyLguv72ZsayJgo4hfv6m86iFB2us1J OQ5Xs936kVQREkkHyxqTQ== X-Spam-Flag: NO X-UI-Out-Filterresults: notjunk:1;V03:K0:Lt8RW3dNnS8=:iugJhGJjT9wN9PTO7Ad9OG TD4HqyfJwUTTeab7okZScz8JWWGWp36r/widEMiEhfGEb4fz33u/poNlEBgBQlybqnFbeqBtf EF4CGeaWG06Z+H2jeeMQ4OZ8bFvc1XGBWihzbsYX9nj6z63vy7yQYhLUhNfsDX9ASIVJ/T19c WolLIilZmYBgpwuWFzXSoOqWOQpZnjX6xoJKA2YcbdguF+lnprW4N0mkkAi5aaoXONjpD55ON pQrfv/ANSJva9LRX+BN9oae3Yri6WhYy2CMcn0cp6hz6AD71EZ8TLuZgpbauDXe41aSzOOtJN ZzKqi+wwgY54xKWXXD7KQEEl1/HUd8lIgYOlLa13JComHmofj8WwEtki4w/KcwpeIA1FGxSoD 8tBioN5DOOS844PyvlmWlYWdOzB8VfIlQOGWFla2tXdIJpnHRI9IBmaiR1F7nLbKFx8CXa8wB 2K4RTYewAnyW/TMGt5s38hDBAiSwawhD57PFR3i/Sb1EwgZN7suDeL7IbvHzo7oma7KFvmhuk 90Qs9er9X2hToI1ghVbAW20D6m/zeTSZFykMOq3fuyFAsb865ipoif3UnPC9IDf29D7I3yOkB Lh6amDRaPUFAxslzUnSZ2ZHXKiMLXY6g4Lt77TT48OZChmVoE154gCzlpgOCfRkD9MCtqb3Gj dANUJxzB6J8J4RXd5ssQGsvkZd3CHpQGGQimv3ig7bEKt2ciWS3t08Ys+JDgGPPC5vAJIO2w5 wDHVCTzac5kQa3Xsf+//8F6WyGa7x8g24z7rIlkBn/5/D9JjVa0NB6cW3j6w9zegeQqVN+uF8 QSJxbncOcNmJuwREaCe32dbNiVfhHwyrDI8YI3vA/7l0cLbiANo/8R0ZfsYKYqP/tsFDn0h16 fWxT4CQmvlt9xxBZd8baD5GupJo+AwtIqNosQ8E14NMpV3nsAlprvjDEU9MxZPM9uCmwZniJZ 08LBrv69i3liwG6JTwFo3F7Izr5CeukAw4zaQvX51HIh+ANV8xEBJ3K2q+8uRYKv0WS8bK56w WjeY/jqUpUC+BTvc5Cf9cv7caRhpLy6wv6FLR4yGDlhbcWJlOrjzz3PccToaDXDs3K4KqmBNH 60HO7eMpDAVY3TEHT8PeXb22R9ykU6TiRYFj88HQ5jMQdJELCno1W9RaO9FkmZ7gG+idax9YG dLkUPIfwrw+3iDO6NndFQbkexg7UYfQP/Akii3vLbDFMhz6g== X-Rspamd-Queue-Id: 46H9Gp0XLYz4HpJ X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmx.net header.s=badeba3b8450 header.b=Ppt+6UUW; dmarc=none; spf=none (mx1.freebsd.org: domain of ohartmann@walstatt.org has no SPF policy when checking 212.227.17.20) smtp.mailfrom=ohartmann@walstatt.org X-Spamd-Result: default: False [-3.98 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_DKIM_ALLOW(-0.20)[gmx.net:s=badeba3b8450]; RECEIVED_SPAMHAUS_PBL(0.00)[15.81.88.46.khpj7ygk5idzvmvt5x4ziurxhy.zen.dq.spamhaus.net : 127.0.0.10]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; IP_SCORE(-1.11)[ip: (-6.38), ipnet: 212.227.0.0/16(-1.38), asn: 8560(2.20), country: DE(-0.01)]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[walstatt.org]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; RCPT_COUNT_FIVE(0.00)[6]; TO_MATCH_ENVRCPT_SOME(0.00)[]; DKIM_TRACE(0.00)[gmx.net:+]; NEURAL_HAM_SHORT(-0.96)[-0.963,0]; R_SPF_NA(0.00)[]; FREEMAIL_TO(0.00)[me.com]; RCVD_IN_DNSWL_LOW(-0.10)[20.17.227.212.list.dnswl.org : 127.0.3.1]; FROM_EQ_ENVFROM(0.00)[]; MID_RHS_NOT_FQDN(0.50)[]; ASN(0.00)[asn:8560, ipnet:212.227.0.0/16, country:DE]; MIME_TRACE(0.00)[0:+]; RCVD_TLS_ALL(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 26 Aug 2019 11:47:31 -0000 On Thu, 22 Aug 2019 08:58:55 +0300 Toomas Soome wrote: > > On 22 Aug 2019, at 06:04, O. Hartmann wrote: > >=20 > > -----BEGIN PGP SIGNED MESSAGE----- > > Hash: SHA256 > >=20 > > Am Wed, 21 Aug 2019 22:29:29 +0000 > > greg@unrelenting.technology schrieb: > > =20 > >> August 22, 2019 12:23 AM, "O. Hartmann" wrote: > >> =20 > >>> Am Wed, 21 Aug 2019 15:58:24 -0500 > >>> Karl Denninger schrieb: > >>> =20 > >>>> I would see if you can get REFIND loaded and use that. I have a Len= ovo > >>>> X1 Carbon Gen 6 and that's the answer I used, as it allows multi-boot > >>>> (e.g. Win10 and FreeBSD) easily. =20 > >>>=20 > >>> mmmhhh, Linux software to make FreeBSD boot? ;-) =20 > >>=20 > >> rEFInd is not "Linux software", I use it to get a nice menu to choose > >> between FreeBSD and Windows on my desktop. No Linux in sight. If anyth= ing, > >> rEFInd has its roots in Macs :) =20 > >=20 > > My apologizes; when searching the net, the first "logo" I see is this s= illy > > penguine face. I'm sorry about making such simple implications. > > =20 > >> =20 > >>> This Lenovo firmware seems very reluctant or the efibootmgr doesn't > >>> operate properly on setting variables: when trying to label the boot > >>> number (e.g. Boot000A) with "-L FreeBSD", it is always set back to > >>> "Boot000A ATA HDD0". On other platforms, like Fujitsu servers or even= the > >>> cheap crap from ASRock a label once set is permenent until deleted. = =20 > >>=20 > >> Many laptops just ignore the boot variables outright. My X240 is the s= ame. > >> I never switched to a proper efibootmgr setup on mine, I just have > >> loader.efi as bootx64.efi and that's it. =20 > >=20 > > I tried copying loader.efi as bootx64.efi - but didn't help. > > =20 > >>>> If there's a way to get into the EFI shell on Lenovo's laptops from = the > >>>> BIOS during the boot I've not found it yet. There's supposed to be = on > >>>> all EFI devices, but you know how "supposed to" works in many cases, > >>>> right? =20 > >>=20 > >> You can just download the EFI Shell from the internet, it's a normal .= efi > >> executable you can "boot". Put it as efi/boot/bootx64.efi onto a USB f= lash > >> drive and enjoy. =20 > >=20 > > I'll give this a chance as soon I have hands on the workitem again. > > =20 >=20 > The reason to try rEFInd and/or EFI shell is to see if we get extra error > messages otherwise hidden by GUI. >=20 > In any case, to get to the root cause, we would need to start to insert m= ore > debug printouts and see what we will find. Once you are ready to go with = it, > you can poke me directly and then we can start=E2=80=A6 >=20 > rgds, > toomas >=20 Hello. I spent the weekend fiddling around with the settings and I found out two things: the most important: my brain is leaking "emory", means: I had the same issue with an APU from PCengines because of enabling "WITH_BEARSSL" in /etc/src.c= onf on the machines where we built the main OS. I did so on the laptop we spoke= of in this thread - and forgot about that fact. the other thing is the weird Lenovo handling of the UEFI vars. The only way= to boot the E540 (after(!) disabling _BEARSSL in src.conf and rebuilding everything) was to set the loader's name to EFI/BOOT/BOOTx64.efi. Setting t= he variable to contain EFI/BOOT/loader.efi failed as well as setting EFI/FreeBSD/loader.efi.=20 I also had to delete the Boot000A variable - it seems Lenovo's UEFI implementation uses fixed variable sets (as I realized when not being able = to name label of the variable Boot000A by something I've choosen). Boot000A is always labeled "ATA HDD0", no matter what I've tried to set it to via option "-L" of efibootmgr. Kind regards, oh=20 From owner-freebsd-current@freebsd.org Mon Aug 26 16:14:37 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 8B24CDF2FE for ; Mon, 26 Aug 2019 16:14:37 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: from mail-qt1-x82f.google.com (mail-qt1-x82f.google.com [IPv6:2607:f8b0:4864:20::82f]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46HHC00lSyz4bg7 for ; Mon, 26 Aug 2019 16:14:35 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: by mail-qt1-x82f.google.com with SMTP id b11so18379114qtp.10 for ; Mon, 26 Aug 2019 09:14:35 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bsdimp-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=xMyQ5xDoTEZxY7kTzi7M+1L7W6oJCwjCIEv9L73bq+E=; b=AzTkMFulJ1Pu79iN5qulGcie7LQ0WaJ5R+qHW3Oeuu6r8ATK6BhPw8i0IUpOAI22jy 4iEILkdddv7y12mJsMn+fOoQ6iz263Poh8hauW4anCIDQ/Mk90R64Qlf/ybeY2nKqPEf ZfdlfkpSQ2lvhTufd3Etk4DnNXYMusgHR7pJPneqT8i4mEWN7JLeX+HkHuuisOY9Y+Tv /BN0ja+7b60nsYfDztbzi/3GTVAWynr+cFNjX61LYLpUjwVfqx5DWiNN0a78Xfr7Pdbh HW1uUMldkJkA7NsPzfe8TCGuV5UZYv54Eg82XtsGKfO7qGrOIOVreq2Y0Bt4bcUcPTfn ++jA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=xMyQ5xDoTEZxY7kTzi7M+1L7W6oJCwjCIEv9L73bq+E=; b=KmsoDuG94JCSjxlZgRbNeleLOCmOVid+wNfNgHlXrkJYKfO41VdJYMa+BOvFXn441e Lv4yvZAEcpiVqbdisKJPBeAHid4q+PZgvG62CeqoXsQ/ZOQD7ICpSeJCZB9xZNBZVaWL F3kVoMJFWhN3nzRXdtq+zIbFAPAAkOVH7K6TxtPj2OVxsSXhq0Avn2PTq2S8SKLj5Pu4 wH+PI5C/pyZYb2NMTVsUW2hAnCBqNZrc98tUiOOoKyP9PH1ZNbeU7n98FK4c4e7W5XHR T6Z/mjrtVDOQ7nVKxSq9nSSYSvUvzTMwylfAU6ph2P077od89D0Zr7musmJ5F9D4rZF6 LSbA== X-Gm-Message-State: APjAAAWGKvuBKAvwmseNGQIXF7w/JF6FruFUehVBL4Oxv4TSEj/wu1XI Fw81TuYKkGaAiyf4TaujGwj+jPebWXHzUXJlRUV4ew== X-Google-Smtp-Source: APXvYqwSGyOP8LML/moW7BwO2YPuLHNxENe4YiT8Z5x2ltjn0/ldJDK18JaDOstjwrYtsIzkgKbntjjbShm5e7gdq38= X-Received: by 2002:ac8:128c:: with SMTP id y12mr18281949qti.242.1566836074112; Mon, 26 Aug 2019 09:14:34 -0700 (PDT) MIME-Version: 1.0 References: <47509401.1440476.1566796167857.ref@mail.yahoo.com> <47509401.1440476.1566796167857@mail.yahoo.com> <5aa8faeb-5e8e-38be-4301-81f3d82c494a@selasky.org> In-Reply-To: <5aa8faeb-5e8e-38be-4301-81f3d82c494a@selasky.org> From: Warner Losh Date: Mon, 26 Aug 2019 10:14:22 -0600 Message-ID: Subject: Re: Kernel-Crash when working with ubt0 To: Hans Petter Selasky Cc: "mms.vanbreukelingen@gmail.com" , "freebsd-current@freebsd.org" X-Rspamd-Queue-Id: 46HHC00lSyz4bg7 X-Spamd-Bar: ---- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=bsdimp-com.20150623.gappssmtp.com header.s=20150623 header.b=AzTkMFul; dmarc=none; spf=none (mx1.freebsd.org: domain of wlosh@bsdimp.com has no SPF policy when checking 2607:f8b0:4864:20::82f) smtp.mailfrom=wlosh@bsdimp.com X-Spamd-Result: default: False [-4.92 / 15.00]; TO_DN_EQ_ADDR_SOME(0.00)[]; TO_DN_SOME(0.00)[]; URI_COUNT_ODD(1.00)[3]; DKIM_TRACE(0.00)[bsdimp-com.20150623.gappssmtp.com:+]; NEURAL_HAM_SHORT(-0.99)[-0.992,0]; FORGED_SENDER(0.30)[imp@bsdimp.com,wlosh@bsdimp.com]; MIME_TRACE(0.00)[0:+,1:+,2:~]; IP_SCORE(-2.92)[ip: (-9.37), ipnet: 2607:f8b0::/32(-2.86), asn: 15169(-2.33), country: US(-0.05)]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; FROM_NEQ_ENVFROM(0.00)[imp@bsdimp.com,wlosh@bsdimp.com]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[bsdimp-com.20150623.gappssmtp.com:s=20150623]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; TAGGED_RCPT(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; DMARC_NA(0.00)[bsdimp.com]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[f.2.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; R_SPF_NA(0.00)[]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[]; FREEMAIL_CC(0.00)[gmail.com] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 26 Aug 2019 16:14:37 -0000 Is it from read_connection_list? If so I have a 'patch' that I'm using but haven't committed because it's just too gross: drop the lock before the copyout and pick it up again after... Warner On Mon, Aug 26, 2019 at 1:23 AM Hans Petter Selasky wrote: > Do you have a backtrace? > > --HPS > _______________________________________________ > freebsd-current@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-current > To unsubscribe, send any mail to "freebsd-current-unsubscribe@freebsd.org" > From owner-freebsd-current@freebsd.org Mon Aug 26 16:56:30 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 3CFA1DFFD6 for ; Mon, 26 Aug 2019 16:56:30 +0000 (UTC) (envelope-from carpeddiem@gmail.com) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 46HJ7K6j0nz4dyN for ; Mon, 26 Aug 2019 16:56:29 +0000 (UTC) (envelope-from carpeddiem@gmail.com) Received: by mailman.nyi.freebsd.org (Postfix) id E4193DFFD1; Mon, 26 Aug 2019 16:56:29 +0000 (UTC) Delivered-To: current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id E3B33DFFD0; Mon, 26 Aug 2019 16:56:29 +0000 (UTC) (envelope-from carpeddiem@gmail.com) Received: from mail-io1-f44.google.com (mail-io1-f44.google.com [209.85.166.44]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46HJ7K0c6Fz4dyM; Mon, 26 Aug 2019 16:56:28 +0000 (UTC) (envelope-from carpeddiem@gmail.com) Received: by mail-io1-f44.google.com with SMTP id z3so39033573iog.0; Mon, 26 Aug 2019 09:56:28 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:content-transfer-encoding; bh=VanxT31TJS4nyEq2cRp13k5h7f6TmBbfy+MzqPZxmHQ=; b=LzCz8ku6ZU2t0/YROLGh3ykP41AAZecFN5R/OTHNnNLwh3sY4Szv/hRliEBkeF09zr 59+wJmNfTlaK0uu+l3tgg4rLjRXJId9gA9NpNcT+G/Lg337xTpmJVMbJzcZwEZU1OwyT MJYKlCyvFVXOt31urCKbUsV5OldbAIilASk7MoEhl5eHww9cDJ1dbMoGm6uETbz77vCO /iJuGZp1uQH2mvtCE6r0o7ymeZtGsqMEIbw38u10sjV/4s+mWRuQR8lEzKevx6mlIbv3 6pEycXSDbU05zYc2LjeWBjY3FSsLFoFyHMT9Hsra1l3YPVjY3OwLJtgKNZxNlV5FIlHi H16g== X-Gm-Message-State: APjAAAWZ4CvFnck0l7EgvVPDUzJUw3vU2vn1uCEOTtQNhtJcyUB8j8tz kMMj2jTf4DzcJpvFt+xJZaMctTwqnV4zOFI0YSHzN4a5 X-Google-Smtp-Source: APXvYqz5U9xXJSCKmRARMhTKS+fsQpNeZppY2a/xFa0pH0JPJIPxtqJBzECPNQnYAMfFqGksZS0GZsJuwglHlQtElG0= X-Received: by 2002:a6b:ea16:: with SMTP id m22mr24349319ioc.115.1566838586619; Mon, 26 Aug 2019 09:56:26 -0700 (PDT) MIME-Version: 1.0 References: <20190825122332.GA16293@v2> In-Reply-To: <20190825122332.GA16293@v2> From: Ed Maste Date: Mon, 26 Aug 2019 12:56:07 -0400 Message-ID: Subject: Re: FreeBSD Quarterly Status Report - Second Quarter 2019 To: hackers@freebsd.org, current , stable@freebsd.org Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Rspamd-Queue-Id: 46HJ7K0c6Fz4dyM X-Spamd-Bar: ----- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of carpeddiem@gmail.com designates 209.85.166.44 as permitted sender) smtp.mailfrom=carpeddiem@gmail.com X-Spamd-Result: default: False [-5.02 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; R_SPF_ALLOW(-0.20)[+ip4:209.85.128.0/17:c]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; MIME_TRACE(0.00)[0:+]; DMARC_NA(0.00)[freebsd.org]; TO_DN_SOME(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; IP_SCORE(-2.03)[ip: (-4.41), ipnet: 209.85.128.0/17(-3.35), asn: 15169(-2.33), country: US(-0.05)]; NEURAL_HAM_SHORT(-0.99)[-0.992,0]; RCVD_IN_DNSWL_NONE(0.00)[44.166.85.209.list.dnswl.org : 127.0.5.0]; FORGED_SENDER(0.30)[emaste@freebsd.org,carpeddiem@gmail.com]; R_DKIM_NA(0.00)[]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:209.85.128.0/17, country:US]; FROM_NEQ_ENVFROM(0.00)[emaste@freebsd.org,carpeddiem@gmail.com]; RCVD_TLS_ALL(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 26 Aug 2019 16:56:30 -0000 On Sun, 25 Aug 2019 at 08:24, Edward Tomasz Napiera=C5=82a wrote: > > FreeBSD Project Quarterly Status Report - 2nd Quarter 2019 Due to an oversight the FreeBSD Foundation's quartery status entry was omitted from this report. Contact: Deb Goodkin The FreeBSD Foundation is a 501(c)(3) non-profit organization dedicated to supporting and promoting the FreeBSD Project and community worldwide. Funding comes from individual and corporate donations and is used to fund and manage software development projects, conferences and developer summits, and provide travel grants to FreeBSD contributors. The Foundation purchases and supports hardware to improve and maintain FreeBSD infrastructure and provides resources to improve security, quality assurance, and release engineering efforts; publishes marketing material to promote, educate, and advocate for the FreeBSD Project; facilitates collaboration between commercial vendors and FreeBSD developers; and finally, represents the FreeBSD Project in executing contracts, license agreements, and other legal arrangements that require a recognized legal entity. Here are some highlights of what we did to help FreeBSD last quarter: We held our annual board meeting in Ottawa on May 14. Board Director and Officer elections take place each year at this meeting. Justin Gibbs was elected as the new President of the Board of Directors. The new FreeBSD Foundation Board of Directors includes President and Founder Justin T. Gibbs, Vice President Benedict Reuschling, Secretary Philip Paeps, Treasurer Marshall Kirk McKusick, and Directors Hiroki Sato, George Neville-Neil and Robert N. M. Watson. You can read more about the elections at: . After the elections, our management team gave updates to the board on their respective areas. We then discussed the key areas of the Project that need help, and where we can step in to fill those holes. We reviewed and updated our 12 month goals, and identified projects we should support. We then discussed conferences we are likely to attend, and went over the latest on our fundraising efforts. We followed that up with a discussion on how to get more users to contribute back to the Project. While discussing how to increase the number of users and contributors, we talked about methods for making for more training material available. Partnerships and Commercial User Support We help facilitate collaboration between commercial users and FreeBSD developers. We also meet with companies to discuss their needs and bring that information back to the Project. In Q2, Ed Maste and Deb Goodkin met with a few commercial users in Germany. It=E2=80=99s not only beneficial for the above, but it also helps us understand some of the applications where FreeBSD is used. Because BSDCan brings in a high number of commercial users, we have an excellent opportunity to have similar discussions about their needs during the four-day FreeBSD Summit and BSDCan. Fundraising Efforts Our work is 100% funded by your donations. We are grateful for the generous donations from Intel, NetApp, VMware and Stormshield last quarter. We are working hard to get more commercial users to give back to help us continue our work supporting FreeBSD. More importantly, we=E2=80=99d like to thank our individual donors, for making $10-$1,000 donations last quarter, for a total of $16,000! Please consider making a donation to help us continue and increase our support for FreeBSD: https://www.FreeBSDfoundation.org/donate/. We also have the Partnership Program, to provide more benefits for our larger commercial donors. Find out more information at https://www.FreeBSDfoundation.org/FreeBSD-foundation-partnership-program/ and share with your companies! OS Improvements The Foundation improves the FreeBSD operating system by employing our technical staff to maintain and improve critical kernel subsystems, add features and functionality, and fix problems. The Foundation also provides grants to fund individual projects. There were 243 commits to the FreeBSD base system repository sponsored by the Foundation during the quarter. These include improvements to the tmpfs in-memory, MSDOS, and UFS filesystems, device driver and hardware compatibility fixes, virtual memory (VM), tool chain, documentation, and testing and continuous integration improvements. We fixed a number of race conditions and security issues found by Syzkaller, Google=E2=80=99s code-coverage-guided system call fuzzer. Alan Somers=E2=80=99 work on updating FreeBSD=E2=80=99s support for FUSE (u= serspace filesystems) continued during the quarter; the full details are elsewhere in this quarterly report. At this point most of the work has been committed to the project branch but some bug fixes and improvements have been committed directly to the FreeBSD development branch. Edward Napierala=E2=80=99s Linuxulator project continued through the quarte= r, resulting in a number of improvements to the Linuxulator and linux-specific functionality such as linsysfs. This work is part of the path to supporting the Linux strace debugging tool in order to facilitate debugging failures of other Linux binaries under the Linuxulator. Mateusz Guzik continued with scalability and performance improvements during the quarter, and Bjoern Zeeb integrated the SDIO stack (with details elsewhere in the quarterly report). Progress was made on the online RAID-Z expansion project over the quarter. Matt Ahrens posted an alpha preview of the feature for further experimentation and review, and the FreeBSD Foundation will make an alpha release image available for testing in the near future. Foundation staff contributed to nine FreeBSD security advisories and errata updates over the quarter, including CPU vulnerability workarounds. Related work included improving Intel microcode update loading. Continuous Integration and Quality Assurance The Foundation provides a full-time staff member who is working on improving our automated testing, continuous integration, and overall quality assurance efforts. During the second quarter of 2019, Foundation staff continued to improve the project's CI infrastructure, worked with contributors to fix the failing build and test cases, and worked with other teams in the Project for their testing needs. We hosted a CI-focused working group at BSDcan and continue to publish the CI weekly report at freebsd-testing@ mailing list. See the FreeBSD CI section of this report for more information. Supporting FreeBSD Infrastructure The Foundation provides hardware and support to improve the FreeBSD infrastructure. Last quarter, we continued supporting FreeBSD hardware located around the world. FreeBSD Advocacy and Education A large part of our efforts are dedicated to advocating for the Project. This includes promoting work being done by others with FreeBSD; producing advocacy literature to teach people about FreeBSD and help make the path to starting using FreeBSD or contributing to the Project easier; and attending and getting other FreeBSD contributors to volunteer to run FreeBSD events, staff FreeBSD tables, and give FreeBSD presentations. The FreeBSD Foundation sponsors many conferences, events, and summits around the globe. These events can be BSD-related, open source, or technology events geared towards underrepresented groups. We support the FreeBSD-focused events to help provide a venue for sharing knowledge, to work together on projects, and to facilitate collaboration between developers and commercial users. This all helps provide a healthy ecosystem. We support the non-FreeBSD events to promote and raise awareness of FreeBSD, to increase the use of FreeBSD in different applications, and to recruit more contributors to the Project. Check out some of the advocacy and education work we did last quarter: - Represented FreeBSD at LinuxFest Northwest In Bellingham, Washington - Sponsored and helped organize the FreeBSD Developers Summit at BSDCan, in Ottawa, Canada - Sponsored and attended BSDCan 2019 - Set up registration and attended the Vienna FreeBSD Security Hackathon in Vienna, Austria - Represented FreeBSD at HKOSCON - Attended the Berlin FreeBSD Developers Summit - Presented at 2019 Comcast Labs Connect Open Source Conference Sponsored, presented and represented FreeBSD at RootConf 2019 in Bangalore, India - Committed to attend OSCON, and All Things Open - Committed to sponsor and help organize a Bay Area Developers Summit - Provided FreeBSD advocacy material - Provided travel grants to FreeBSD contributors to attend many of the above events We continued producing FreeBSD advocacy material to help people promote FreeBSD around the world. Read more about our conference adventures in the conference recaps and trip reports in our monthly newsletters: https://www.freebsdfoundation.org/news-and-events/newsletter/ We help educate the world about FreeBSD by publishing the professionally produced FreeBSD Journal. As we mentioned previously, the FreeBSD Journal is now a free publication. Find out more and access the latest issues at https://www.FreeBSDfoundation.org/journal/. You can find out more about events we attended and upcoming events at https://www.FreeBSDfoundation.org/news-and-events/. We have continued our work with a new website developer to help us improve our website. Work has begun to make it easier for community members to find information more easily and to make the site more efficient. Legal/FreeBSD IP The Foundation owns the FreeBSD trademarks, and it is our responsibility to protect them. We also provide legal support for the core team to investigate questions that arise. Go to http://www.FreeBSDfoundation.org to find out how we support FreeBSD and how we can help you! From owner-freebsd-current@freebsd.org Mon Aug 26 21:35:29 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 81682E5A97 for ; Mon, 26 Aug 2019 21:35:29 +0000 (UTC) (envelope-from maksim.yevmenkin@gmail.com) Received: from mail-pg1-x529.google.com (mail-pg1-x529.google.com [IPv6:2607:f8b0:4864:20::529]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46HQKD2v63z3x9N for ; Mon, 26 Aug 2019 21:35:28 +0000 (UTC) (envelope-from maksim.yevmenkin@gmail.com) Received: by mail-pg1-x529.google.com with SMTP id n190so11379611pgn.0 for ; Mon, 26 Aug 2019 14:35:28 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=0bdvEUcmugylDSrtWgwZ5n5dXLWVi6eiwvCsfhns3T8=; b=dQdUVzQ24wf2Rlr0BhW5/MLbuq3AODctISZhR233b9ZtiNSZHVPFzYKjPlixdqtF5U yIKAxAQ2AZlzgprihuMZa5TYUsHLM5oyJP2VpJ9p999nPv8IXrJwes6sSMKq4mxJV7bA OziI78NCdaqFjIGk2SzNCkTVdnR5Q/QDuytN2Rx/SdEMiSpAsB9dyY6deo6as6cS7Bes WfpptCIMMPZbGuaqQmn9k46qUEqzwQYo3HTPEIRzZ+7nopTr49h0kalgfNmg4kdqDZQa wkS4vVMoAr3XFA1cBpjB6EX1adZiXe3KctbgOkGDnusOlRsTNgjS14ecndK2uJ/DSoJR uisQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=0bdvEUcmugylDSrtWgwZ5n5dXLWVi6eiwvCsfhns3T8=; b=lSN/+zwXMYxz1y8ivjap4h7Y9RXfuAc/lVqoPjfKpYYjUUdpX0B6Bwle6MwX6fTBR5 baT6CJyG/EFtQFvpIaX/BSK6X5lSDj/BfE14+ulTSi9hShDChcsnm6HltFXmLcrqtPbl FComFtwO6AoogpoOLZYrw7wZ1W4Xx2uq9RyngdLL7n8H5172K0g0pDIZyS5iPUsLG2/8 QV+XmUlEYtjAzimLif+VvwHAgRfZEAwAUpBIx3UcFRQ+PX8dDWj7QWWqiIdyTschPrdW bcR/pYTXDxzKtMTRypuT7aqphAQtGuvzc3zPBHmkj63tuwktFSRYWuHnSYZLCkdLVlr1 LrCw== X-Gm-Message-State: APjAAAXIdWxys2X9EWs2s+gcuCqlo+sbdgtt4zJ710E8VDmpC+lExpK0 q5osu8OpCi4hgO1hdiJASp0opc5H X-Google-Smtp-Source: APXvYqyEEU9kvJYiuelKUHWFjo5QqNQOzeHICGFydKFeubm22wmJ2sP2lvPYkoyWuQ6sZDvpOINdhQ== X-Received: by 2002:a62:3644:: with SMTP id d65mr22626466pfa.128.1566855326665; Mon, 26 Aug 2019 14:35:26 -0700 (PDT) Received: from [10.0.31.67] ([12.25.173.26]) by smtp.gmail.com with ESMTPSA id a186sm13858559pge.0.2019.08.26.14.35.25 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 26 Aug 2019 14:35:26 -0700 (PDT) Content-Type: text/plain; charset=utf-8 Mime-Version: 1.0 (1.0) Subject: Re: Kernel-Crash when working with ubt0 From: maksim yevmenkin X-Mailer: iPhone Mail (16G77) In-Reply-To: Date: Mon, 26 Aug 2019 14:35:25 -0700 Cc: Hans Petter Selasky , "mms.vanbreukelingen@gmail.com" , "freebsd-current@freebsd.org" Content-Transfer-Encoding: quoted-printable Message-Id: <00E772F0-7231-44C4-B314-26730CC7DF21@gmail.com> References: <47509401.1440476.1566796167857.ref@mail.yahoo.com> <47509401.1440476.1566796167857@mail.yahoo.com> <5aa8faeb-5e8e-38be-4301-81f3d82c494a@selasky.org> To: Warner Losh X-Rspamd-Queue-Id: 46HQKD2v63z3x9N X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=dQdUVzQ2; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of maksimyevmenkin@gmail.com designates 2607:f8b0:4864:20::529 as permitted sender) smtp.mailfrom=maksimyevmenkin@gmail.com X-Spamd-Result: default: False [-3.50 / 15.00]; TO_DN_EQ_ADDR_SOME(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; FREEMAIL_FROM(0.00)[gmail.com]; MV_CASE(0.50)[]; RCVD_COUNT_THREE(0.00)[3]; DKIM_TRACE(0.00)[gmail.com:+]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; NEURAL_HAM_SHORT(-1.00)[-0.995,0]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; TAGGED_FROM(0.00)[]; MID_RHS_MATCH_FROM(0.00)[]; DWL_DNSWL_NONE(0.00)[gmail.com.dwl.dnswl.org : 127.0.5.0]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[4]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; TAGGED_RCPT(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; MIME_GOOD(-0.10)[text/plain]; IP_SCORE_FREEMAIL(0.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[9.2.5.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; IP_SCORE(0.00)[ip: (-9.37), ipnet: 2607:f8b0::/32(-2.86), asn: 15169(-2.33), country: US(-0.05)]; RCVD_TLS_ALL(0.00)[] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 26 Aug 2019 21:35:29 -0000 > On Aug 26, 2019, at 9:14 AM, Warner Losh wrote: >=20 > Is it from read_connection_list? If so I have a 'patch' that I'm using but= > haven't committed because it's just too gross: drop the lock before the > copyout and pick it up again after... >=20 Hmm... interesting....=20 I only took a brief look at it. I suppose I can ensure user space address is= wired and then copyout() can be called with mutex held It=E2=80=99s odd that I=E2=80=99ve never seen this before. I=E2=80=99m trave= ling at the moment will take a closer look this later this week Thanks Max= From owner-freebsd-current@freebsd.org Mon Aug 26 22:21:42 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 9B382E689E for ; Mon, 26 Aug 2019 22:21:42 +0000 (UTC) (envelope-from yuripv@yuripv.net) Received: from new2-smtp.messagingengine.com (new2-smtp.messagingengine.com [66.111.4.224]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 46HRLY1NR3z40GB for ; Mon, 26 Aug 2019 22:21:40 +0000 (UTC) (envelope-from yuripv@yuripv.net) Received: from compute5.internal (compute5.nyi.internal [10.202.2.45]) by mailnew.nyi.internal (Postfix) with ESMTP id 162B81921 for ; Mon, 26 Aug 2019 18:21:40 -0400 (EDT) Received: from mailfrontend2 ([10.202.2.163]) by compute5.internal (MEProxy); Mon, 26 Aug 2019 18:21:40 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yuripv.net; h= subject:to:references:from:message-id:date:mime-version :in-reply-to:content-type:content-transfer-encoding; s=fm1; bh=c LGsdDawJSHq1b8cVA9bZaQOkCSbnIwUicRENSm5OXA=; b=g8ddnD1hm/1KKEaZf Vb4bk23yX6HIrUDEJWsRjQkkSXnBCW4H7Ya46UD7PxYqngD4TsyyatDSjKpgOMWJ 2zoVcoe0obUbvP6LxpvfuWXYcUeM42iM8uBBVZfSFX0s4ZNqoNcinQsyQQWABRM1 REj8KEx2K6rEI755UY7W6jZsJteW8hZQUw8yG44Vw3YMe9n48PGixIQLbtaUfxrs Zxfn0y4u+RzW2SxZnqRoGlA1FmGuPbyl+vpNPpzzgOuVIFp8FIzdcDEyERJxclQV 9g0hbfSmhsRGOMnSN+82ciZu8Api5UZ81c6J9xvLx5Q7e9WZdEUni6zpzsd2cVD2 NxzHA== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-transfer-encoding:content-type :date:from:in-reply-to:message-id:mime-version:references :subject:to:x-me-proxy:x-me-proxy:x-me-sender:x-me-sender :x-sasl-enc; s=fm3; bh=cLGsdDawJSHq1b8cVA9bZaQOkCSbnIwUicRENSm5O XA=; b=vBaLnmKlCaNv4uNoRqi1LOzJ0YZgaWmuOWZAZP97PsZ4tHjF59Rsw0EMx knFQ4y8rE0/3dS0+Ix+eHbQZo9JAfsNTj2GKs3Cd5SviU9LPdGo3HuPz7JXzJy+8 D2atsOxCwWp8UQfj9/g5g602jLLIlNIVVgQ31xGute29+7sxQwfQN50ww9+LHsPq WZx/fLISq3uPwAhJ/lVlAL1eYWatBezDto3+w3kphTfMx9FjayeUuTi6XR5hWOp3 CsoYndyH4RS//Brp4ma922Bqrjy3KshUVrs4Ifkwk3cQunQCS+fJjSnijCkh1JEY 8McRQKrneqASr22moNppQfrZLJK4g== X-ME-Sender: X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduvddrudehhedguddtucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucenucfjughrpefuvfhfhffkffgfgggjtgfgsehtje ertddtfeejnecuhfhrohhmpegjuhhrihcurfgrnhhkohhvuceohihurhhiphhvseihuhhr ihhpvhdrnhgvtheqnecuffhomhgrihhnpehfrhgvvggsshgurdhorhhgnecukfhppedule ehrddvtdeirddukeefrdduieejnecurfgrrhgrmhepmhgrihhlfhhrohhmpeihuhhrihhp vheshihurhhiphhvrdhnvghtnecuvehluhhsthgvrhfuihiivgeptd X-ME-Proxy: Received: from [192.168.1.2] (unknown [195.206.183.167]) by mail.messagingengine.com (Postfix) with ESMTPA id D1152D6005B for ; Mon, 26 Aug 2019 18:21:38 -0400 (EDT) Subject: Re: Kernel-Crash when working with ubt0 To: freebsd-current References: <47509401.1440476.1566796167857.ref@mail.yahoo.com> <47509401.1440476.1566796167857@mail.yahoo.com> <5aa8faeb-5e8e-38be-4301-81f3d82c494a@selasky.org> From: Yuri Pankov Message-ID: <6d8e5357-fa9c-a03b-ccf3-b0dad53fe089@yuripv.net> Date: Tue, 27 Aug 2019 01:21:32 +0300 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: 46HRLY1NR3z40GB X-Spamd-Bar: ------ Authentication-Results: mx1.freebsd.org; dkim=none (invalid DKIM record) header.d=yuripv.net header.s=fm1 header.b=g8ddnD1h; dkim=pass header.d=messagingengine.com header.s=fm3 header.b=vBaLnmKl; dmarc=none; spf=pass (mx1.freebsd.org: domain of yuripv@yuripv.net designates 66.111.4.224 as permitted sender) smtp.mailfrom=yuripv@yuripv.net X-Spamd-Result: default: False [-6.32 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_DKIM_ALLOW(-0.20)[messagingengine.com:s=fm3]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:66.111.4.224]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; DMARC_NA(0.00)[yuripv.net]; RCPT_COUNT_ONE(0.00)[1]; DKIM_MIXED(0.00)[]; RCVD_COUNT_THREE(0.00)[4]; RCVD_TLS_LAST(0.00)[]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[yuripv.net:~,messagingengine.com:+]; NEURAL_HAM_SHORT(-0.99)[-0.991,0]; R_DKIM_PERMFAIL(0.00)[yuripv.net:s=fm1]; IP_SCORE(-2.73)[ip: (-6.10), ipnet: 66.111.4.0/24(-4.84), asn: 11403(-2.68), country: US(-0.05)]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; RCVD_IN_DNSWL_LOW(-0.10)[224.4.111.66.list.dnswl.org : 127.0.5.1]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:11403, ipnet:66.111.4.0/24, country:US]; MID_RHS_MATCH_FROM(0.00)[] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 26 Aug 2019 22:21:42 -0000 Warner Losh wrote: > Is it from read_connection_list? If so I have a 'patch' that I'm using but > haven't committed because it's just too gross: drop the lock before the > copyout and pick it up again after... > > Warner > > On Mon, Aug 26, 2019 at 1:23 AM Hans Petter Selasky wrote: > >> Do you have a backtrace? I think it's https://forums.freebsd.org/threads/kernel-crash-with-ubt0.72049/, not sure why OP didn't provide details here. From owner-freebsd-current@freebsd.org Mon Aug 26 23:33:04 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 3331DE7B66 for ; Mon, 26 Aug 2019 23:33:04 +0000 (UTC) (envelope-from rebecca@bsdio.com) Received: from muon.bsdio.com (muon.bluestop.org [65.103.231.193]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 46HSwv2JXPz42k2 for ; Mon, 26 Aug 2019 23:33:02 +0000 (UTC) (envelope-from rebecca@bsdio.com) Received: from muon.bsdio.com (localhost [127.0.0.1]) by muon.bsdio.com (Postfix) with ESMTP id B7803F6D7D; Mon, 26 Aug 2019 17:32:59 -0600 (MDT) Received: from muon.bsdio.com ([127.0.0.1]) by muon.bsdio.com (muon.bsdio.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id KLsOVaeBqKxz; Mon, 26 Aug 2019 17:32:58 -0600 (MDT) Received: from macbex.local (unknown [10.0.10.184]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by muon.bsdio.com (Postfix) with ESMTPSA; Mon, 26 Aug 2019 17:32:58 -0600 (MDT) Subject: Re: HELP: UEFI/ZFS Boot failure: Ignoring Boot000A: Only one DP found To: "O. Hartmann" , Toomas Soome Cc: greg@unrelenting.technology, Karl Denninger , freebsd-current@freebsd.org, Warner Losh References: <20190821232334.433d285c@thor.intern.walstatt.dynvpn.de> <20190821195847.577a165b@thor.intern.walstatt.dynvpn.de> <48D9A1D1-5A54-4FED-8DC8-40C9A5C9BE3A@me.com> <20190821213052.25d61cb4@thor.intern.walstatt.dynvpn.de> <480F8DE0-A38F-4BCA-9F36-0D812CDB7DD8@me.com> <20190821223140.643f6c63@thor.intern.walstatt.dynvpn.de> <483d59b24a636d0214555610350b8d73@unrelenting.technology> <20190822050509.64c88a51@thor.intern.walstatt.dynvpn.de> <12E83654-1104-408E-9A1E-BE79308B9A92@me.com> <20190826132150.6f748419@freyja> From: Rebecca Cran Message-ID: Date: Mon, 26 Aug 2019 17:32:54 -0600 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:60.0) Gecko/20100101 Thunderbird/60.8.0 MIME-Version: 1.0 In-Reply-To: <20190826132150.6f748419@freyja> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit Content-Language: en-US X-Rspamd-Queue-Id: 46HSwv2JXPz42k2 X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=none (mx1.freebsd.org: domain of rebecca@bsdio.com has no SPF policy when checking 65.103.231.193) smtp.mailfrom=rebecca@bsdio.com X-Spamd-Result: default: False [-3.98 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-0.998,0]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; RCVD_TLS_LAST(0.00)[]; DMARC_NA(0.00)[bsdio.com]; AUTH_NA(1.00)[]; RCPT_COUNT_FIVE(0.00)[6]; RCVD_COUNT_THREE(0.00)[4]; TO_MATCH_ENVRCPT_SOME(0.00)[]; NEURAL_HAM_SHORT(-0.98)[-0.979,0]; R_SPF_NA(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:209, ipnet:65.103.224.0/19, country:US]; MID_RHS_MATCH_FROM(0.00)[]; IP_SCORE(-1.90)[ip: (-9.42), asn: 209(-0.04), country: US(-0.05)] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 26 Aug 2019 23:33:04 -0000 On 8/26/19 5:22 AM, O. Hartmann wrote: > > the other thing is the weird Lenovo handling of the UEFI vars. The only way to > boot the E540 (after(!) disabling _BEARSSL in src.conf and rebuilding > everything) was to set the loader's name to EFI/BOOT/BOOTx64.efi. Setting the > variable to contain EFI/BOOT/loader.efi failed as well as setting > EFI/FreeBSD/loader.efi. I've been suggesting FreeBSD should install the loader as \EFI\BOOT\BOOTx64.efi for a while (as long as there's not already a different vendor's loader there), without much success. Hopefully this finding can cause us to reconsider. -- Rebecca Cran From owner-freebsd-current@freebsd.org Tue Aug 27 01:56:52 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id DC5B7C4717 for ; Tue, 27 Aug 2019 01:56:52 +0000 (UTC) (envelope-from clay.daniels.jr@gmail.com) Received: from mail-ua1-x92c.google.com (mail-ua1-x92c.google.com [IPv6:2607:f8b0:4864:20::92c]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46HX6q3Tpbz4C0T; Tue, 27 Aug 2019 01:56:51 +0000 (UTC) (envelope-from clay.daniels.jr@gmail.com) Received: by mail-ua1-x92c.google.com with SMTP id g13so6459296uap.5; Mon, 26 Aug 2019 18:56:51 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:from:date:message-id:subject:to; bh=i/z2t6joDoof2lIKijSHHvBJzLDI1x3WhBx79l70axs=; b=aFWlSWsbprSLcN1iTL6EQ/AnQQUoT5GExfQUPTLtle4J9m2GemLZQ1sEj7+oVOgfs/ LaTVpzthiXY7in3hcBhNSrhPUNSM0kKGv077VyyyVPQ7qwlQdgCDP+SI13CfmdALJMvs 7RY/Jjmd4vrmzZxErMiMxoKE0VHFqCfzlLGp75XlM1Aab0/mXYyYFhEdmVMF1ai0bmPn vJvCyb+VfEY0mz/VJEOrWqUMM5pkVX07NIwyTZBTtZvHEcENtGn22tMnZQGkaNOZfxl3 Lrx0p0c1MTBEe2b/j8xg37v+VyxOuIz9huzU7NL/neQMNKIpJiEv2rE8h+BmSFYC29L1 siSw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=i/z2t6joDoof2lIKijSHHvBJzLDI1x3WhBx79l70axs=; b=e/bPKVy7huMs2uFB4062fkMpjhbwv63Y5asRm9XfpRinYHg05uovGjYyDV8hyTCeb/ AQg60BfS0SblnuMbcBh6d7/jcScEKV0+6tfMyrMXUT1jUqfXekkDyAEXD0IT7t09psNi 889CbsleOtvHXlRMbXCQeqHkVWA2XUPMqWi5dG7rJE4m9i8Y+yzd/x/YTXIN9WFEUrI3 zH5Uf6qxa/AW8KB8B015hbdNNTQ0EZFr/q+FiSlI4qHuFB9iBessDzBN2+8Eu3y+JzTa Cctfx/h2a5DXemY2U9xURtBH5Qyp/mKhX4nHOBk3g0/ug/vOf7+aHWs44KDNPu93IVOB j+bw== X-Gm-Message-State: APjAAAUv1No4i+/PbIwKjDYEHsioOEjHAHmX1rhku8llQZI/jdM04Y1C BjiybFG8CDi6L1CqZ0cydCwWr/VL9TksoNpdk3OazLI= X-Google-Smtp-Source: APXvYqxM8di3Dt86gdF77wohQBYuZJb4ex1SgWzMzHKLr2ZAA4m0tYntf0yodEHV+yn0hAXeRssvvpHzufdXlnRlAcE= X-Received: by 2002:ab0:6911:: with SMTP id b17mr10298777uas.18.1566871009876; Mon, 26 Aug 2019 18:56:49 -0700 (PDT) MIME-Version: 1.0 From: "Clay Daniels Jr." Date: Mon, 26 Aug 2019 20:56:38 -0500 Message-ID: Subject: Adding DRM modules to /etc/rc.conf for 13.0 Current r351363 (drm-current-kmod g20190814) To: John Baldwin , "freebsd-current@freebsd.org" X-Rspamd-Queue-Id: 46HX6q3Tpbz4C0T X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=aFWlSWsb; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of claydanielsjr@gmail.com designates 2607:f8b0:4864:20::92c as permitted sender) smtp.mailfrom=claydanielsjr@gmail.com X-Spamd-Result: default: False [-4.00 / 15.00]; TO_DN_EQ_ADDR_SOME(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; FREEMAIL_FROM(0.00)[gmail.com]; DKIM_TRACE(0.00)[gmail.com:+]; RCPT_COUNT_TWO(0.00)[2]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; NEURAL_HAM_SHORT(-1.00)[-0.996,0]; FROM_EQ_ENVFROM(0.00)[]; IP_SCORE(0.00)[ip: (-9.54), ipnet: 2607:f8b0::/32(-2.86), asn: 15169(-2.33), country: US(-0.05)]; MIME_TRACE(0.00)[0:+,1:+,2:~]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; TAGGED_FROM(0.00)[]; DWL_DNSWL_NONE(0.00)[gmail.com.dwl.dnswl.org : 127.0.5.0]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; IP_SCORE_FREEMAIL(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[c.2.9.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 27 Aug 2019 01:56:52 -0000 RE: "In order to use these modules, you need to update the 'kld_list' lines in your rc.conf to just list the modules without a path, e.g. "kld_list=i915kms" just as you would for other modules. This will prefer the module built with your kernel if one exists and fall back to the module in /boot/modules otherwise." WORKED GREAT, even with my kld_list="amdgpu" without the path, but I must add that I needed to add a line in /boot/loader.conf to work around the known AMD problem: hw.syscons/disable=1 Clay Daniels From owner-freebsd-current@freebsd.org Tue Aug 27 02:53:08 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 855A9C62C1 for ; Tue, 27 Aug 2019 02:53:08 +0000 (UTC) (envelope-from clay.daniels.jr@gmail.com) Received: from mail-vk1-xa29.google.com (mail-vk1-xa29.google.com [IPv6:2607:f8b0:4864:20::a29]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46HYMl10rqz4FDk; Tue, 27 Aug 2019 02:53:06 +0000 (UTC) (envelope-from clay.daniels.jr@gmail.com) Received: by mail-vk1-xa29.google.com with SMTP id b184so4460097vkh.2; Mon, 26 Aug 2019 19:53:06 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to; bh=HtDddeItJt1OnpA6MRfwxjAt75XHF5xV8ELO2TWMxuQ=; b=iQbHai8UIJjMsOc76xAoFZ4BKsDC5op6rIWju8sNJ9VtoZY6GcZ4dGCraDQ+CKC3uf W6KicqdlNWAP2QshPXx4p5YWIsT9PbvPkh/Vuo2xa41Apu/8fWKIsMX3A0RGJ53BzaEm szBlj7nLCywsYXfIVzys0+0Fg3IG9jMq303ArX3bVCfE62Ix/42jugCrTNyRIB5SBAmZ tPlR8ycai7ejWhUkcgrUwpk/sUUZatfNYxcUHIikWTogM+I02vP+BvajGm3Bq47YiO4v 8T62k2TDNxV2ilgcdwoXCH8SLYH51o1Jix5AwjlofSr1fO/NHrtypfIFO4JFfCreCzXV 8J1Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=HtDddeItJt1OnpA6MRfwxjAt75XHF5xV8ELO2TWMxuQ=; b=lMvKBP4IXwy/zpa4FBVHnHpSDiBeuKLIVevFzGa7STWQUZShNqEtkOvzQCICa0ubIQ OLffoGV4JFgOicrATfW8gBEcGcSHpGNkthaajeW8f7UYrseD+XA9HqfxAUa5VmIYaQ+N 8Oa5gRwO5Cd8JdePtG0wbBA8iwJCtGoWdj5Wle7InGAYhZDVYWFIv4BfmJhKV9pGIn1L VC3pZYRfynLbf7/vLbRrLdlRu8uQpNNmUwGTbC2mfLOtOU7iZ1Gh1Z/8VAPnkFA0CnGg 7C8T/0JuZ1HNlFWyhOLXAJAPxpBNYDyU+FDHkgsXuhp3wpt1X6lejNMQgQ+yvK0uPlru yvbg== X-Gm-Message-State: APjAAAX1KIjdrxJH2gd1iF2ekSCZDEEuW0t80Fe4nRJxDR55bAguSG3f Bju35CbNZsj9XMZAMawmbao1fSRWeIkJxmKu1rrpQRM= X-Google-Smtp-Source: APXvYqyj22V+8T+jMz8dfMiksG7sjTUyKE/DAv3MkG9DPvTBdk4XkXv6+E28PGRnex8pVYZuriWdfKbj+5k7MMkG/0Q= X-Received: by 2002:ac5:cc4d:: with SMTP id l13mr9585154vkm.72.1566874385280; Mon, 26 Aug 2019 19:53:05 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: From: "Clay Daniels Jr." Date: Mon, 26 Aug 2019 21:52:53 -0500 Message-ID: Subject: Re: Adding DRM modules to /etc/rc.conf for 13.0 Current r351363 (drm-current-kmod g20190814) To: John Baldwin , "freebsd-current@freebsd.org" X-Rspamd-Queue-Id: 46HYMl10rqz4FDk X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=iQbHai8U; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of claydanielsjr@gmail.com designates 2607:f8b0:4864:20::a29 as permitted sender) smtp.mailfrom=claydanielsjr@gmail.com X-Spamd-Result: default: False [-4.00 / 15.00]; TO_DN_EQ_ADDR_SOME(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; FREEMAIL_FROM(0.00)[gmail.com]; DKIM_TRACE(0.00)[gmail.com:+]; RCPT_COUNT_TWO(0.00)[2]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; NEURAL_HAM_SHORT(-1.00)[-0.996,0]; FROM_EQ_ENVFROM(0.00)[]; IP_SCORE(0.00)[ip: (-9.64), ipnet: 2607:f8b0::/32(-2.86), asn: 15169(-2.33), country: US(-0.05)]; MIME_TRACE(0.00)[0:+,1:+,2:~]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; TAGGED_FROM(0.00)[]; DWL_DNSWL_NONE(0.00)[gmail.com.dwl.dnswl.org : 127.0.5.0]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; IP_SCORE_FREEMAIL(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[9.2.a.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 27 Aug 2019 02:53:08 -0000 Oops, should be *hw.syscons.disable=1* in /boot/loader.conf On Mon, Aug 26, 2019 at 8:56 PM Clay Daniels Jr. wrote: > RE: > "In order to use these modules, you need to update the 'kld_list' > lines in your rc.conf to just list the modules without a > path, e.g. "kld_list=i915kms" just as you would for other > modules. This will prefer the module built with your kernel if > one exists and fall back to the module in /boot/modules > otherwise." > > WORKED GREAT, even with my kld_list="amdgpu" without the path, but I must > add that I needed to add a line in /boot/loader.conf to work around the > known AMD problem: > hw.syscons/disable=1 > > Clay Daniels > From owner-freebsd-current@freebsd.org Tue Aug 27 05:08:36 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 22E73C9D8A for ; Tue, 27 Aug 2019 05:08:36 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: from mail-qk1-x72b.google.com (mail-qk1-x72b.google.com [IPv6:2607:f8b0:4864:20::72b]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46HcN25301z4Nk7 for ; Tue, 27 Aug 2019 05:08:34 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: by mail-qk1-x72b.google.com with SMTP id p13so16004399qkg.13 for ; Mon, 26 Aug 2019 22:08:34 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bsdimp-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=GHO99ukLRqnBpA3r1DWqYdFt7uFUO9wGKNber9ydiOw=; b=s2FmeKhqh2HKfVgDBehcAiQiDYMXURnGWByWlYYJmOEpCj+umiHRE9+7ac6tpYfbu4 sldsCKUXWc8iNLO1TkQB8BG+EFRcRe3eMK9AzYitwgEccRKPv+4hvazWB7WMICT+oCd8 bfdEmBu/yJqaKqeqYBYwv+8GRK72n958wp07meM9dOhBlfgCGA7a9GmKBMtd3iLMHlGe 7ro2PU07D5gwMeoJRFM8EqeFeokXrj5pKI0vl/59cf5DqZb+ZKLaEn7Jq+IIsrzamMKd HH6oOqTsPRWtxcBQ0Uv4EQrCQQUZmuVe+r/5ueSY/POQ0GXdOEMFU7X4cY7UWlKHXO6i kJzA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=GHO99ukLRqnBpA3r1DWqYdFt7uFUO9wGKNber9ydiOw=; b=SZqjDkjRa3o821ih7e/H1rygsv4xQmNQjb5B+I1Q77KN88qIJcvRtuWIHdlqMCn0JP JrcO6ujymAQ5hn2cawyYhyF9Bhx1IdK8uI8UiXqP/qPVwDoKkO1JdAZJugQ0rLcJK+HA qiqsgdpOq9UuH4/u6tjNBFbd8y6BbagcBntb5livQ+L0L5iCC/m8jlen/rp7YWt8ikZy Nk/WIggVUS0/5o/gdgBW/oI27EDp2FYe3VlmaEUTDzOiZqij0V94NHFtHAS12Okdfapm q89fnDr3aS/DhNmTQ/ooP95uIAcmWDqxQGx3K0U06cRI6X7k2xmRH64EQgyLDXuB1SH9 8v9w== X-Gm-Message-State: APjAAAUZquJUMHnilidvrGg0RMP9UXBBf4PBbGGiIf9xZMFGB3YVKo74 O6VhJECiEH2Sf59mb73mPJp3JNvBKGKwKbdAGdUVSXOf9xE= X-Google-Smtp-Source: APXvYqzjJ+hIy7HFtJ8cH3n9gTNXIROtYYpoY4K9LD6z5R1299r2Sk5Nbh28fGEpb5nHoL/SziOUOs/AUMJJnJmNT+Q= X-Received: by 2002:a37:4b03:: with SMTP id y3mr20253442qka.215.1566882513355; Mon, 26 Aug 2019 22:08:33 -0700 (PDT) MIME-Version: 1.0 References: <20190821232334.433d285c@thor.intern.walstatt.dynvpn.de> <20190821195847.577a165b@thor.intern.walstatt.dynvpn.de> <48D9A1D1-5A54-4FED-8DC8-40C9A5C9BE3A@me.com> <20190821213052.25d61cb4@thor.intern.walstatt.dynvpn.de> <480F8DE0-A38F-4BCA-9F36-0D812CDB7DD8@me.com> <20190821223140.643f6c63@thor.intern.walstatt.dynvpn.de> <483d59b24a636d0214555610350b8d73@unrelenting.technology> <20190822050509.64c88a51@thor.intern.walstatt.dynvpn.de> <12E83654-1104-408E-9A1E-BE79308B9A92@me.com> <20190826132150.6f748419@freyja> In-Reply-To: From: Warner Losh Date: Mon, 26 Aug 2019 23:08:21 -0600 Message-ID: Subject: Re: HELP: UEFI/ZFS Boot failure: Ignoring Boot000A: Only one DP found To: Rebecca Cran Cc: "O. Hartmann" , Toomas Soome , greg@unrelenting.technology, Karl Denninger , freebsd-current@freebsd.org X-Rspamd-Queue-Id: 46HcN25301z4Nk7 X-Spamd-Bar: ----- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=bsdimp-com.20150623.gappssmtp.com header.s=20150623 header.b=s2FmeKhq; dmarc=none; spf=none (mx1.freebsd.org: domain of wlosh@bsdimp.com has no SPF policy when checking 2607:f8b0:4864:20::72b) smtp.mailfrom=wlosh@bsdimp.com X-Spamd-Result: default: False [-5.94 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[bsdimp-com.20150623.gappssmtp.com:s=20150623]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; DMARC_NA(0.00)[bsdimp.com]; RCPT_COUNT_FIVE(0.00)[6]; TO_MATCH_ENVRCPT_SOME(0.00)[]; DKIM_TRACE(0.00)[bsdimp-com.20150623.gappssmtp.com:+]; NEURAL_HAM_SHORT(-1.00)[-0.996,0]; RCVD_IN_DNSWL_NONE(0.00)[b.2.7.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; R_SPF_NA(0.00)[]; FORGED_SENDER(0.30)[imp@bsdimp.com,wlosh@bsdimp.com]; MIME_TRACE(0.00)[0:+,1:+,2:~]; IP_SCORE(-2.94)[ip: (-9.48), ipnet: 2607:f8b0::/32(-2.86), asn: 15169(-2.33), country: US(-0.05)]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; FROM_NEQ_ENVFROM(0.00)[imp@bsdimp.com,wlosh@bsdimp.com]; RCVD_TLS_ALL(0.00)[]; RCVD_COUNT_TWO(0.00)[2] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 27 Aug 2019 05:08:36 -0000 On Mon, Aug 26, 2019, 5:32 PM Rebecca Cran wrote: > On 8/26/19 5:22 AM, O. Hartmann wrote: > > > > > the other thing is the weird Lenovo handling of the UEFI vars. The only > way to > > boot the E540 (after(!) disabling _BEARSSL in src.conf and rebuilding > > everything) was to set the loader's name to EFI/BOOT/BOOTx64.efi. > Setting the > > variable to contain EFI/BOOT/loader.efi failed as well as setting > > EFI/FreeBSD/loader.efi. > > > I've been suggesting FreeBSD should install the loader as > \EFI\BOOT\BOOTx64.efi for a while (as long as there's not already a > different vendor's loader there), without much success. Hopefully this > finding can cause us to reconsider. > That's the first machine I've seen where you have to set the name like that... there is a larger story here and we are getting incomplete reports because it doesn't quite make sense yet... But there are enough reasons not to do that by default. For one thing, it messes up rEFInd, or can. Windows doesn't install there. At most we should prompt for older machines. We shouldn't mortgage our future to cope with a legacy we know will sunset soon... Warner From owner-freebsd-current@freebsd.org Tue Aug 27 05:14:37 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 56F57CA16A for ; Tue, 27 Aug 2019 05:14:37 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: from mail-qk1-x734.google.com (mail-qk1-x734.google.com [IPv6:2607:f8b0:4864:20::734]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46HcW03GZQz4P7b for ; Tue, 27 Aug 2019 05:14:36 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: by mail-qk1-x734.google.com with SMTP id m10so16050402qkk.1 for ; Mon, 26 Aug 2019 22:14:36 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bsdimp-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=SSKFbhgzQHifRSI54QzVRxQ3lY+rFNG8JzMx2XmNcks=; b=n+lJojg9dCk4aO/PGC2lGyZjimVOfFfUy4BO7sM6zOMve4n3Sf5dh/sSCZg4AHIGLI jMNQsbcu4cQbyVCHt5NL6lu3XYIxVRfB2HrcH4SBBgKtZ28GQQXkja63BB9TZKmjZYhI TOr3WqnRKL7rpPtbCum4SzslqSmUaSAbB/Kz8bBXMfJtmus/YJds4snaKwDW/96pAYQ6 uEH+6y5K5tgIn1IgHKANLSb2Dj4AEemSks9U8VS1xh2/uKnOr5m8fbPVxrCfNCbeLg59 Qa7KLLFERPPUCCOgvuMaN7CdfvShkIOdJvQ2+m6Z73+WU2D4Qw+EZxY+nzalstnXwuiz 4qig== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=SSKFbhgzQHifRSI54QzVRxQ3lY+rFNG8JzMx2XmNcks=; b=YZ5J1TvoF6vS95+LY+23ujwTZuD3ZaFp0NiZiQSDPq5cJEE3ZCtHh/9EVNS9mDpf/b +5+Z43ykGHY5N9Ofofyotfs5G8t3VLqim1ZdQaVTOgQJZXhVwdnJOLdfdtXwGHBBtboZ rHbIs29WDSFx8o8LGHt/3RCOCn8/tfsPU2tOwMvJZWd1Vkrv2WXntuGZCTLZC1YbrW1t 3v4zSMNSJ7ePhLxBezovOpirGrnmXYe1wf1JTUs1pjRsdNYnQYyYu5lYx92Qc1gyb8PZ XQdw+nTJblpJUjFQ8usAdd1y9MRMAbj2nGfuLQdQfdNnhfGWohPHA/oqkvF6MtM0lfc7 imTw== X-Gm-Message-State: APjAAAX8RELA/DWj7dVrSukL5qlx+m1VddVFTUxIjfCxpww388Cbm/Vp dFqi6GwxZ6teu3NIUXLwfJKyTS7mLS2NGj3KJTlQ3w== X-Google-Smtp-Source: APXvYqz1OV8YDS7qNrT0rFlHjNkb33xJew3p4HVj6yLVXR+Sw/SQ5NumpLvsbn7WLH1mZNN9x6iKSgGrnDyc4q33KsU= X-Received: by 2002:a37:4b03:: with SMTP id y3mr20268210qka.215.1566882874900; Mon, 26 Aug 2019 22:14:34 -0700 (PDT) MIME-Version: 1.0 References: <47509401.1440476.1566796167857.ref@mail.yahoo.com> <00E772F0-7231-44C4-B314-26730CC7DF21@gmail.com> <2353856.SOzlSKDGKe@archlaptop> In-Reply-To: <2353856.SOzlSKDGKe@archlaptop> From: Warner Losh Date: Mon, 26 Aug 2019 23:14:23 -0600 Message-ID: Subject: Re: Kernel-Crash when working with ubt0 To: "Lizbeth Mutterhunt, Ph.D." Cc: maksim yevmenkin , Hans Petter Selasky , "freebsd-current@freebsd.org" Content-Type: multipart/mixed; boundary="00000000000029fb050591125922" X-Rspamd-Queue-Id: 46HcW03GZQz4P7b X-Spamd-Bar: ----- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=bsdimp-com.20150623.gappssmtp.com header.s=20150623 header.b=n+lJojg9; dmarc=none; spf=none (mx1.freebsd.org: domain of wlosh@bsdimp.com has no SPF policy when checking 2607:f8b0:4864:20::734) smtp.mailfrom=wlosh@bsdimp.com X-Spamd-Result: default: False [-5.83 / 15.00]; TO_DN_EQ_ADDR_SOME(0.00)[]; TO_DN_SOME(0.00)[]; HAS_ATTACHMENT(0.00)[]; DKIM_TRACE(0.00)[bsdimp-com.20150623.gappssmtp.com:+]; MIME_BASE64_TEXT(0.10)[]; NEURAL_HAM_SHORT(-1.00)[-0.996,0]; FORGED_SENDER(0.30)[imp@bsdimp.com,wlosh@bsdimp.com]; FREEMAIL_TO(0.00)[yahoo.com]; MIME_TRACE(0.00)[0:+,1:+,2:+,3:~,4:~]; IP_SCORE(-2.93)[ip: (-9.42), ipnet: 2607:f8b0::/32(-2.86), asn: 15169(-2.33), country: US(-0.05)]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; FROM_NEQ_ENVFROM(0.00)[imp@bsdimp.com,wlosh@bsdimp.com]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[bsdimp-com.20150623.gappssmtp.com:s=20150623]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[4]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; TAGGED_RCPT(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; DMARC_NA(0.00)[bsdimp.com]; MIME_GOOD(-0.10)[multipart/mixed,multipart/alternative,text/plain]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[4.3.7.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; R_SPF_NA(0.00)[]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[]; FREEMAIL_CC(0.00)[gmail.com] X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 27 Aug 2019 05:14:37 -0000 --00000000000029fb050591125922 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable On Mon, Aug 26, 2019 at 6:13 PM Lizbeth Mutterhunt, Ph.D. < mutterhunt_gesta@yahoo.com> wrote: > On Monday, 26 August 2019 23:35:25 CEST maksim yevmenkin wrote: > > > > On Aug 26, 2019, at 9:14 AM, Warner Losh wrote: > > > > > > > > Is it from read_connection_list? If so I have a 'patch' that I'm usin= g > but > > > > haven't committed because it's just too gross: drop the lock before t= he > > > > copyout and pick it up again after... > > > > > > Hmm... interesting.... > > > > > > I only took a brief look at it. I suppose I can ensure user space > address is > > > wired and then copyout() can be called with mutex held > > > > > > It=E2=80=99s odd that I=E2=80=99ve never seen this before. I=E2=80=99m = traveling at the moment > will > > > take a closer look this later this week > > > > > > Thanks > > > Max > > > > Sorry for late reply, suffering on a "VPN-Jetlag". > > > > Here's the promised vmcore.o(last) on > pastepin. It's not a "mini"-dump at all but a huge skirt up to the heals > :-) as it has 360M of text and the editor loads about ten minutes on > grandmother's laptop with her 70 years after 36 hours of being online. Th= e > options are with DEBUG=3D-g and VERBOSE set in the config. > > > > With the ubt1, a 2070X stack by Asus it's probably the kernel driver I'd > have to parse into the kernel as here at linux a quarrel about it is for > years systematically delaunching "bills driver"; you get the patch as a > .zip file on Arch, not as a .deb or .tar.gz or whatever and it must be > compiled by hand; after that you'd to reboot and install the A2DP-fix and > than you can pray (where ever you want to and think it might help you) wi= th > the initial pulseaudio-connect at boottime (sometimes it just doesn't > recognize the adapter) - so as a LiLo-substitute I prefer EFI-Clover not > the GRUB-stuff that doesn't work at all for BSD for many, many times) and= I > really don't know how many hours I spent with "sudo bluetoothctl" and on > kernel builts for this 'Ubitek Magic Box'. > > > > Hope someone can think it over, I know it's old hardware but she'd (the > laptop) to to spend 50 mankind-years in bills slavery when I got her > finally - probably one of the SALVAGED - messages at fsck -y in single mo= de > :-) > > > > So take care of it, it's not the way I normally act to sent guys boxing > about and for the box but much more than beeing dead can't happen, can it= ? > - This happened to my cat "Rambo" who just flew away from me and went > straight away under a car - buhuhuhu.... so far for the revenge thoughts, > > > > 'svn up' is good at this, subversion is much better than git --diff, whic= h > really doens't work at all here. > > > Here's the patches that I'm running with. I also have to restart bthidd after manually connecting my keyboard for reasons i've not had time to dig into. These patches aren't quite right, since dropping the lock to copy the data out that the lock seems to be protecting can't be 'right', it just satisfies the invariant that you can't hold a non-sleep-able lock around copyout. Warner --00000000000029fb050591125922 Content-Type: text/x-patch; charset="US-ASCII"; name="bt.diff" Content-Disposition: attachment; filename="bt.diff" Content-Transfer-Encoding: base64 Content-ID: X-Attachment-Id: f_jztdjkts0 Y29tbWl0IDEzNTJlYmFkZDI2NDFlOWE3YzllYjNiZDc2NDgxYTk1MDhhOGE4ZmMKQXV0aG9yOiBX YXJuZXIgTG9zaCA8aW1wQGJzZGltcC5jb20+CkRhdGU6ICAgU2F0IEF1ZyAyNCAxMToyNTowMCAy MDE5IC0wNjAwCgogICAgRHJvcCBsb2NrcyBhcm91bmQgY29weW91dC4gVGhpcyBpcyBsaWtlbHkg bGVzcyBzYWZlIHRoYW4gaXQgc291bmRzLgoKZGlmZiAtLWdpdCBhL3N5cy9uZXRncmFwaC9ibHVl dG9vdGgvc29ja2V0L25nX2J0c29ja2V0X2hjaV9yYXcuYyBiL3N5cy9uZXRncmFwaC9ibHVldG9v dGgvc29ja2V0L25nX2J0c29ja2V0X2hjaV9yYXcuYwppbmRleCA5NTIzZDg4YWY2My4uZjEzNDFi NDczOWEgMTAwNjQ0Ci0tLSBhL3N5cy9uZXRncmFwaC9ibHVldG9vdGgvc29ja2V0L25nX2J0c29j a2V0X2hjaV9yYXcuYworKysgYi9zeXMvbmV0Z3JhcGgvYmx1ZXRvb3RoL3NvY2tldC9uZ19idHNv Y2tldF9oY2lfcmF3LmMKQEAgLTEyNDgsMTAgKzEyNDgsMTQgQEAgbmdfYnRzb2NrZXRfaGNpX3Jh d19jb250cm9sKHN0cnVjdCBzb2NrZXQgKnNvLCB1X2xvbmcgY21kLCBjYWRkcl90IGRhdGEsCiAK IAkJCXAtPm51bV9jb25uZWN0aW9ucyA9IG1pbihwLT5udW1fY29ubmVjdGlvbnMsCiAJCQkJCQlw MS0+bnVtX2Nvbm5lY3Rpb25zKTsKLQkJCWlmIChwLT5udW1fY29ubmVjdGlvbnMgPiAwKQorCQkJ aWYgKHAtPm51bV9jb25uZWN0aW9ucyA+IDApIHsKKwkJCQkvKiBYWFggQmFkIC0tIGJ1dCBjYW4n dCBob2xkIHRoaXMgWFhYICovCisJCQkJbXR4X3VubG9jaygmcGNiLT5wY2JfbXR4KTsKIAkJCQll cnJvciA9IGNvcHlvdXQoKGNhZGRyX3QpIHAyLCAKIAkJCQkJKGNhZGRyX3QpIHAtPmNvbm5lY3Rp b25zLAogCQkJCQlwLT5udW1fY29ubmVjdGlvbnMgKiBzaXplb2YoKnAyKSk7CisJCQkJbXR4X2xv Y2soJnBjYi0+cGNiX210eCk7CisJCQl9CiAJCX0gZWxzZQogCQkJZXJyb3IgPSBFSU5WQUw7CiAK QEAgLTEzNjcsOSArMTM3MSwxMSBAQCBuZ19idHNvY2tldF9oY2lfcmF3X2NvbnRyb2woc3RydWN0 IHNvY2tldCAqc28sIHVfbG9uZyBjbWQsIGNhZGRyX3QgZGF0YSwKIAogCQkJd2hpbGUgKG5sLT5u dW1fbmFtZXMgPiAwICYmIG5sMS0+bnVtbmFtZXMgPiAwKSB7CiAJCQkJaWYgKHN0cmNtcChuaTEt PnR5cGUsIE5HX0hDSV9OT0RFX1RZUEUpID09IDApIHsKKwkJCQkJbXR4X3VubG9jaygmcGNiLT5w Y2JfbXR4KTsKIAkJCQkJZXJyb3IgPSBjb3B5b3V0KChjYWRkcl90KSBuaTEsCiAJCQkJCQkJKGNh ZGRyX3QpIG5pLAogCQkJCQkJCXNpemVvZigqbmkpKTsKKwkJCQkJbXR4X2xvY2soJnBjYi0+cGNi X210eCk7CiAJCQkJCWlmIChlcnJvciAhPSAwKQogCQkJCQkJYnJlYWs7CiAK --00000000000029fb050591125922-- From owner-freebsd-current@freebsd.org Tue Aug 27 05:26:04 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 534BDCA7A5 for ; Tue, 27 Aug 2019 05:26:04 +0000 (UTC) (envelope-from rebecca@bsdio.com) Received: from muon.bsdio.com (muon.bluestop.org [65.103.231.193]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 46HcmC2vnXz4Pqp for ; Tue, 27 Aug 2019 05:26:02 +0000 (UTC) (envelope-from rebecca@bsdio.com) Received: from muon.bsdio.com (localhost [127.0.0.1]) by muon.bsdio.com (Postfix) with ESMTP id 6FB4EF756E; Mon, 26 Aug 2019 23:26:04 -0600 (MDT) Received: from muon.bsdio.com ([127.0.0.1]) by muon.bsdio.com (muon.bsdio.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id 91MKuQLeA9r4; Mon, 26 Aug 2019 23:26:02 -0600 (MDT) Received: from photon.int.bluestop.org (unknown [10.0.10.120]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by muon.bsdio.com (Postfix) with ESMTPSA; Mon, 26 Aug 2019 23:26:02 -0600 (MDT) Subject: Re: HELP: UEFI/ZFS Boot failure: Ignoring Boot000A: Only one DP found To: Warner Losh Cc: "O. Hartmann" , Toomas Soome , greg@unrelenting.technology, Karl Denninger , freebsd-current@freebsd.org References: <20190821232334.433d285c@thor.intern.walstatt.dynvpn.de> <20190821195847.577a165b@thor.intern.walstatt.dynvpn.de> <48D9A1D1-5A54-4FED-8DC8-40C9A5C9BE3A@me.com> <20190821213052.25d61cb4@thor.intern.walstatt.dynvpn.de> <480F8DE0-A38F-4BCA-9F36-0D812CDB7DD8@me.com> <20190821223140.643f6c63@thor.intern.walstatt.dynvpn.de> <483d59b24a636d0214555610350b8d73@unrelenting.technology> <20190822050509.64c88a51@thor.intern.walstatt.dynvpn.de> <12E83654-1104-408E-9A1E-BE79308B9A92@me.com> <20190826132150.6f748419@freyja> From: Rebecca Cran Autocrypt: addr=rebecca@bsdio.com; keydata= mQINBFrUMZ4BEADI1yUEGeZeXeTCPay1ZpTBdDEpGPAw1dq2VCSTc1VhsnrEBa1iZxAfaeSv Uu5Ti7jlhQ/3sQMl0bJMKGB/RtmIW7k8h2w476oZmG8gChk8su5ZEx/pV1gdqInyFmmJKTYc gabJz8pL+m82w07qPv+oalepZ4dbj+HF++RAK/iEju+q9UHlsjj8e3mMNsvtrOz1K6bnpveO jZ+ms/2H3Hs5a4k8y6buwe2RvwhJQaXa13cR3LhzL+nwj4B9PHZZEa2WpEyYpw/bI0V9YSQN QgC1CYRzDyakZge6BCM6wHOgZSUzRPufGilrNKUwIVbRoIBR9/85+0wR+PlFUOUOfOc6ox7T dWcIx6PuPhek48rh4uwmmwsPtPiH4Z3T5p+GmWQ9NLFZKA1YnEdaSkWtYZsDxwVZZeYG2plt MfhXP0Hj4rf9Y3eoUenCaGioxAbUOBCtXdTGNAhNjz1g5NGDBVyhjKkzwJQvt9UrYTseERit 5dX2CMTy8hYLvSXd/Ivy+HylUS5IslfZxW5z9LgWX7Z97kILgkH3N0ewtLkygkG+Y+x7uaAV dFqp9ASOyzaiwKbJdeOI+WxRSh+AqeCR0S+bpkcLudLmbjrPmaFwjKycy1H85Z5R2J3YHyXY oT6OYjD8vLbUU2GWp6Onkcy1Pu8EMbRuzKil6HnpYg3BexbPFwARAQABtCNSZWJlY2NhIENy YW4gPHJlYmVjY2FAYmx1ZXN0b3Aub3JnPokCVwQTAQgAQQIbIwUJCWYBgAULCQgHAgYVCgkI CwIEFgIDAQIeAQIXgBYhBB+5fZtkTdO940Yr4g0CK1MRvhAgBQJa2B9zAhkBAAoJEA0CK1MR vhAgzJEQAJUqVmTRO9OqCSS2CVKjrqnEWJMvyo0K8B+WiXo0nSQg9+uyoVU7h2s/kkWVGy4u IWbGy2Qe8LiXzBJjHC3TadGvOvakfdMeKKXcgxgX6KlhA9hA2LW6tg22aHUk7Flr/8diHpgf qIwrXhqJXZmK72GR1QfhgoHsOsTJ9GWPswo1kUMc0cJowq0qP1RDdua6BwvDHHPJwu9OmC/i oQlMNm9gkBDq8H2B+m125ANwCnqBizXaiTTLQdewTMbCSuxbsni2icDqwBfFXzEgcJGaYYfB cQeFsfCmtXQK3JUd4Myx128Dxk9P3X64I93SB7QzB0nmWlyvmCFBNoCp0PCLA4qbwbw2sMRX Wx4BqYa8nI/jg+Nqo+Ut2BfltNZIlsHxK+XhxejfLqAjRCZeLnu1otvFnFuGLaAVYx9x1Y1q J8VizZxq6ujio62Qpultp6KNhlkJ+OKoGwA0k4NHh26SxvlsNxlfg/2v9b1LqWRzNujnwbcF 8g4902XjyBLxV+9YpXZEa8H6zzEHxpeDPWT3QfvrT8JuoHa1IyYnUKvG674UKW5zEGEwkQc9 cuQwR1RHd1ZrKtH1duXzaLr/caMp8ZDfGDDxFpenJTRxNRlg4+K7HSdhpac7sBVMUA8uVdE+ iuTThOmdf0c4DorL3BIh6Yv3FV4/NSqT1Wn3CG2fgG1guQINBFrUMZ4BEADkc4mvMcMcDF1t dNxNQuIBE1F243oZamG3LACCKfc1Yur3CPzHwIk5LXCUmbq23iE5bowxMWw3mlVT0p5xM0Wn UidIBwCKu4kRyy/fY4NyWWBuwy9srpTdmUcKRBRNB8zEZE8xIlidD1ijjgqLBfeM7n9ylawA xHLxwU96sdpdHFzb7Z0yKY2e/bzDaHiG0fUvcCmkgLf+uwKKZid1j8zR5PzKpgPqfy/PF01e KyGV3MNu8Y90xMoiEMWfCI2IB1m+hTuzZoboFvGV54SiMuvfWK/VMQjhsL6K2ddOqwVuy2nI MI4G3xDQW/v8KVyn43OSIAyW1eaklhzu0Ir2sO60PXRkvbTUrouvmSvpJfIQS49rU0M/X6FS DgXQLKrZ3my94+g8ptz9KoVml6s4OAwYVz+sb49nuSxipFKkU5FwhKOLmzbsBxCtytcUJoLm juJPJPDQue6YJiIXyc86GVY2pH3DjemKdbB4dSgqAJIp+lCzKSJzz7bgueh2Ox8vzx1tSxKj 7V8Nal+UTKKbkxPmMh+e20YZ4esAVifO3bS6IJP/aDnfagghB71vA7+aWGXPbjPlc2UHpCBi RSsl+IgoQXvdvZBsKRyfBx8neODa2C6JIE5vcaCjilSeKF8SzsFXvimnndhQNhAPU/DwQwSX dCl4gTsFVi5d8Oxq1sce+wARAQABiQI8BBgBCAAmFiEEH7l9m2RN073jRiviDQIrUxG+ECAF AlrUMZ4CGwwFCQlmAYAACgkQDQIrUxG+ECAWnRAAsmZX+KgNxW3v7R/76Tz4Wjmh4AGeE+Ji 3p5QsdTYny1B6vYBL9vCzPJ/AK8pgKMDRaweUP5eZQpfrdWC8Q7SNGgi4Q+97KEs+i2xZLQ+ WJb8a+WEEIc716u0y4ITiHfOgM5jWcFO4MXQATbJgv0drLLesa+LQCvZgPBqupt307EsCubQ s+Sxt+RVjf6rOUolp1GJXEQYwGsKklVd6yqLC8M1BSG53/WE5tSv5GzBZ8fp6EtmjT7leuid FtEvKYHQz4DqG9ELpHUF0X0UUCBK/MgXe3kCVLKE060UrJ4M6uPSx57rmVFA2MvwQR8M7GsW C5UsSM4PYwPWBhwxE7vcx0691YKAHT/5q8LxRVBdUyzPSprMhSQFttsBt+ygm6wRi3Pi3TuC EARNubPkQefyeC34yr40SAUCkOl3eWxSXPF4NfXFQb4AAzZSE5hv3qbDuwo3lrL0LqpIpEQP Az+JZ1QZ6mMFQ5/JD9Gukj54kZc0X8w3sQt0a8vyE/qrJg8vKgv2rCHrPc5MeDkEUEFiiJiC EDdkJtMyoRlU3S4NrnbyLOLEcHE8fGe3hStPX8hY62id2ecdQ5WZ7vLZW5SFeLarbUciuHIk VL6MHnUjbV7XlY50N7ebeFCIdlCWhdum2FJs/Ni+SSxbZC564vrokwlBBGSo6WTPQTa8IWx1 DtU= Message-ID: Date: Mon, 26 Aug 2019 23:25:58 -0600 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:68.0) Gecko/20100101 Thunderbird/68.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Content-Language: en-US X-Rspamd-Queue-Id: 46HcmC2vnXz4Pqp X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=none (mx1.freebsd.org: domain of rebecca@bsdio.com has no SPF policy when checking 65.103.231.193) smtp.mailfrom=rebecca@bsdio.com X-Spamd-Result: default: False [-3.97 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-0.999,0]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; RCVD_TLS_LAST(0.00)[]; DMARC_NA(0.00)[bsdio.com]; AUTH_NA(1.00)[]; RCPT_COUNT_FIVE(0.00)[6]; RCVD_COUNT_THREE(0.00)[4]; TO_MATCH_ENVRCPT_SOME(0.00)[]; NEURAL_HAM_SHORT(-0.98)[-0.980,0]; R_SPF_NA(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:209, ipnet:65.103.224.0/19, country:US]; MID_RHS_MATCH_FROM(0.00)[]; IP_SCORE(-1.89)[ip: (-9.38), asn: 209(-0.04), country: US(-0.05)] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 27 Aug 2019 05:26:04 -0000 On 2019-08-26 23:08, Warner Losh wrote: > > That's the first machine I've seen where you have to set the name like > that... there is a larger story here and we are getting incomplete reports > because it doesn't quite make sense yet... > > But there are enough reasons not to do that by default. For one thing, it > messes up rEFInd, or can. Windows doesn't install there. At most we should > prompt for older machines. We shouldn't mortgage our future to cope with a > legacy we know will sunset soon... Both Windows and Linux install \EFI\BOOT\BOOTx64.efi because that's the default that gets run if there aren't any BootXXXX variables. And yes, Windows 10 does install there. On my system I have /EFI/Boot/bootx64.efi and \EFI\Microsoft\{Boot,Recovery}, where /EFI/Boot/bootx64.efi is the same binary as bootmgfw.efi. I'm not convinced this is something that's about older systems, and that will go away. -- Rebecca Cran From owner-freebsd-current@freebsd.org Tue Aug 27 05:44:03 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id E81E3CACA6 for ; Tue, 27 Aug 2019 05:44:03 +0000 (UTC) (envelope-from tsoome@me.com) Received: from pv50p00im-tydg10011801.me.com (pv50p00im-tydg10011801.me.com [17.58.6.52]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 46Hd8y286vz4QVG for ; Tue, 27 Aug 2019 05:44:01 +0000 (UTC) (envelope-from tsoome@me.com) Received: from nazgul.lan (148-52-235-80.sta.estpak.ee [80.235.52.148]) by pv50p00im-tydg10011801.me.com (Postfix) with ESMTPSA id 474E66604D1; Tue, 27 Aug 2019 05:43:57 +0000 (UTC) From: Toomas Soome Message-Id: <2F3BAE06-4A3F-4FD2-94ED-886FEDA2ED93@me.com> Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\)) Subject: Re: HELP: UEFI/ZFS Boot failure: Ignoring Boot000A: Only one DP found Date: Tue, 27 Aug 2019 08:43:53 +0300 In-Reply-To: Cc: Rebecca Cran , "O. Hartmann" , greg@unrelenting.technology, Karl Denninger , freebsd-current@freebsd.org To: Warner Losh References: <20190821232334.433d285c@thor.intern.walstatt.dynvpn.de> <20190821195847.577a165b@thor.intern.walstatt.dynvpn.de> <48D9A1D1-5A54-4FED-8DC8-40C9A5C9BE3A@me.com> <20190821213052.25d61cb4@thor.intern.walstatt.dynvpn.de> <480F8DE0-A38F-4BCA-9F36-0D812CDB7DD8@me.com> <20190821223140.643f6c63@thor.intern.walstatt.dynvpn.de> <483d59b24a636d0214555610350b8d73@unrelenting.technology> <20190822050509.64c88a51@thor.intern.walstatt.dynvpn.de> <12E83654-1104-408E-9A1E-BE79308B9A92@me.com> <20190826132150.6f748419@freyja> X-Mailer: Apple Mail (2.3445.104.11) X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2019-08-26_08:, , signatures=0 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 mlxscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1812120000 definitions=main-1908270064 X-Rspamd-Queue-Id: 46Hd8y286vz4QVG X-Spamd-Bar: ---- X-Spamd-Result: default: False [-4.59 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:17.58.0.0/16]; FREEMAIL_FROM(0.00)[me.com]; MV_CASE(0.50)[]; RCPT_COUNT_FIVE(0.00)[6]; DKIM_TRACE(0.00)[me.com:+]; DMARC_POLICY_ALLOW(-0.50)[me.com,quarantine]; NEURAL_HAM_SHORT(-0.99)[-0.986,0]; RECEIVED_SPAMHAUS_PBL(0.00)[148.52.235.80.khpj7ygk5idzvmvt5x4ziurxhy.zen.dq.spamhaus.net : 127.0.0.10]; RCVD_IN_DNSWL_LOW(-0.10)[52.6.58.17.list.dnswl.org : 127.0.5.1]; MIME_TRACE(0.00)[0:+,1:+,2:~]; FROM_EQ_ENVFROM(0.00)[]; ASN(0.00)[asn:714, ipnet:17.58.0.0/20, country:US]; MID_RHS_MATCH_FROM(0.00)[]; ARC_NA(0.00)[]; FREEMAIL_ENVFROM(0.00)[me.com]; R_DKIM_ALLOW(-0.20)[me.com:s=1a1hai]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; FROM_HAS_DN(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; IP_SCORE(0.00)[ip: (-5.80), ipnet: 17.58.0.0/20(-3.03), asn: 714(-2.82), country: US(-0.05)]; IP_SCORE_FREEMAIL(0.00)[]; DWL_DNSWL_LOW(-1.00)[me.com.dwl.dnswl.org : 127.0.5.1]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[] Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 27 Aug 2019 05:44:04 -0000 > On 27 Aug 2019, at 08:08, Warner Losh wrote: >=20 > On Mon, Aug 26, 2019, 5:32 PM Rebecca Cran > wrote: >=20 >> On 8/26/19 5:22 AM, O. Hartmann wrote: >>=20 >>>=20 >>> the other thing is the weird Lenovo handling of the UEFI vars. The = only >> way to >>> boot the E540 (after(!) disabling _BEARSSL in src.conf and = rebuilding >>> everything) was to set the loader's name to EFI/BOOT/BOOTx64.efi. >> Setting the >>> variable to contain EFI/BOOT/loader.efi failed as well as setting >>> EFI/FreeBSD/loader.efi. >>=20 >>=20 >> I've been suggesting FreeBSD should install the loader as >> \EFI\BOOT\BOOTx64.efi for a while (as long as there's not already a >> different vendor's loader there), without much success. Hopefully = this >> finding can cause us to reconsider. >>=20 >=20 > That's the first machine I've seen where you have to set the name like > that... there is a larger story here and we are getting incomplete = reports > because it doesn't quite make sense yet... >=20 > But there are enough reasons not to do that by default. For one thing, = it > messes up rEFInd, or can. Windows doesn't install there. At most we = should > prompt for older machines. We shouldn't mortgage our future to cope = with a > legacy we know will sunset soon... >=20 > Warner >=20 For me it is still confusing if this is path versus upper-lower capital = chars.=20 If that vendor is using suggestion from UEFI Spec 2.7A section 3.5.1.1 = (page 91), then the file name should also end with .EFI. (and yes, I = know, that section is talking about removable media). Therefore the question is, does lenovo accept name like = EFI/FREEBSD/LOADER.EFI? Or what form is used there for windows paths? If we should or should not use EFI/BOOT path - perhaps the installer = should prefer vendor path by default. But till there is confusion, there = should be some notes in some documentation... rgds, toomas= From owner-freebsd-current@freebsd.org Tue Aug 27 05:47:45 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 35D46CB19A for ; Tue, 27 Aug 2019 05:47:45 +0000 (UTC) (envelope-from rebecca@bsdio.com) Received: from muon.bsdio.com (muon.bluestop.org [65.103.231.193]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 46HdFD1NdFz4QsP for ; Tue, 27 Aug 2019 05:47:43 +0000 (UTC) (envelope-from rebecca@bsdio.com) Received: from muon.bsdio.com (localhost [127.0.0.1]) by muon.bsdio.com (Postfix) with ESMTP id 38EB7F75A0; Mon, 26 Aug 2019 23:47:46 -0600 (MDT) Received: from muon.bsdio.com ([127.0.0.1]) by muon.bsdio.com (muon.bsdio.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id 2drlQXSnRJcR; Mon, 26 Aug 2019 23:47:45 -0600 (MDT) Received: from [10.0.10.197] (unknown [10.0.10.197]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by muon.bsdio.com (Postfix) with ESMTPSA; Mon, 26 Aug 2019 23:47:45 -0600 (MDT) Content-Type: text/plain; charset=utf-8 Mime-Version: 1.0 (1.0) Subject: Re: HELP: UEFI/ZFS Boot failure: Ignoring Boot000A: Only one DP found From: Rebecca Cran X-Mailer: iPhone Mail (16G77) In-Reply-To: <2F3BAE06-4A3F-4FD2-94ED-886FEDA2ED93@me.com> Date: Mon, 26 Aug 2019 23:47:40 -0600 Cc: Warner Losh , "O. Hartmann" , greg@unrelenting.technology, Karl Denninger , freebsd-current@freebsd.org Content-Transfer-Encoding: quoted-printable Message-Id: References: <20190821232334.433d285c@thor.intern.walstatt.dynvpn.de> <20190821195847.577a165b@thor.intern.walstatt.dynvpn.de> <48D9A1D1-5A54-4FED-8DC8-40C9A5C9BE3A@me.com> <20190821213052.25d61cb4@thor.intern.walstatt.dynvpn.de> <480F8DE0-A38F-4BCA-9F36-0D812CDB7DD8@me.com> <20190821223140.643f6c63@thor.intern.walstatt.dynvpn.de> <483d59b24a636d0214555610350b8d73@unrelenting.technology> <20190822050509.64c88a51@thor.intern.walstatt.dynvpn.de> <12E83654-1104-408E-9A1E-BE79308B9A92@me.com> <20190826132150.6f748419@freyja> <2F3BAE06-4A3F-4FD2-94ED-886FEDA2ED93@me.com> To: Toomas Soome X-Rspamd-Queue-Id: 46HdFD1NdFz4QsP X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=none (mx1.freebsd.org: domain of rebecca@bsdio.com has no SPF policy when checking 65.103.231.193) smtp.mailfrom=rebecca@bsdio.com X-Spamd-Result: default: False [-3.46 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-0.999,0]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; MV_CASE(0.50)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; RCVD_TLS_LAST(0.00)[]; DMARC_NA(0.00)[bsdio.com]; AUTH_NA(1.00)[]; RCPT_COUNT_FIVE(0.00)[6]; RCVD_COUNT_THREE(0.00)[4]; TO_MATCH_ENVRCPT_SOME(0.00)[]; NEURAL_HAM_SHORT(-0.98)[-0.977,0]; R_SPF_NA(0.00)[]; FREEMAIL_TO(0.00)[me.com]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:209, ipnet:65.103.224.0/19, country:US]; MID_RHS_MATCH_FROM(0.00)[]; IP_SCORE(-1.89)[ip: (-9.34), asn: 209(-0.04), country: US(-0.05)] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 27 Aug 2019 05:47:45 -0000 > On Aug 26, 2019, at 11:43 PM, Toomas Soome wrote: >=20 > For me it is still confusing if this is path versus upper-lower capital ch= ars.=20 >=20 > If that vendor is using suggestion from UEFI Spec 2.7A section 3.5.1.1 (pa= ge 91), then the file name should also end with .EFI. (and yes, I know, that= section is talking about removable media). >=20 > Therefore the question is, does lenovo accept name like EFI/FREEBSD/LOADER= .EFI? Or what form is used there for windows paths? >=20 > If we should or should not use EFI/BOOT path - perhaps the installer shoul= d prefer vendor path by default. But till there is confusion, there should b= e some notes in some documentation... Being a FAT filesystem I don=E2=80=99t think upper/lower case matters. Personally I think we should always install to the vendor path, and also ins= tall to EFI/BOOT if somebody else hasn=E2=80=99t already got files there. =E2=80=94=20 Rebecca=20= From owner-freebsd-current@freebsd.org Tue Aug 27 07:11:25 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 7180ACD073 for ; Tue, 27 Aug 2019 07:11:25 +0000 (UTC) (envelope-from kostikbel@gmail.com) Received: from kib.kiev.ua (kib.kiev.ua [IPv6:2001:470:d5e7:1::1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 46Hg5m1ryrz4Vtq for ; Tue, 27 Aug 2019 07:11:23 +0000 (UTC) (envelope-from kostikbel@gmail.com) Received: from tom.home (kib@localhost [127.0.0.1]) by kib.kiev.ua (8.15.2/8.15.2) with ESMTPS id x7R7AqYj017556 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO); Tue, 27 Aug 2019 10:10:55 +0300 (EEST) (envelope-from kostikbel@gmail.com) DKIM-Filter: OpenDKIM Filter v2.10.3 kib.kiev.ua x7R7AqYj017556 Received: (from kostik@localhost) by tom.home (8.15.2/8.15.2/Submit) id x7R7Aqs4017555; Tue, 27 Aug 2019 10:10:52 +0300 (EEST) (envelope-from kostikbel@gmail.com) X-Authentication-Warning: tom.home: kostik set sender to kostikbel@gmail.com using -f Date: Tue, 27 Aug 2019 10:10:52 +0300 From: Konstantin Belousov To: maksim yevmenkin Cc: Warner Losh , Hans Petter Selasky , "mms.vanbreukelingen@gmail.com" , "freebsd-current@freebsd.org" Subject: Re: Kernel-Crash when working with ubt0 Message-ID: <20190827071052.GT71821@kib.kiev.ua> References: <47509401.1440476.1566796167857.ref@mail.yahoo.com> <47509401.1440476.1566796167857@mail.yahoo.com> <5aa8faeb-5e8e-38be-4301-81f3d82c494a@selasky.org> <00E772F0-7231-44C4-B314-26730CC7DF21@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <00E772F0-7231-44C4-B314-26730CC7DF21@gmail.com> User-Agent: Mutt/1.12.1 (2019-06-15) X-Spam-Status: No, score=-1.0 required=5.0 tests=ALL_TRUSTED,BAYES_00, DKIM_ADSP_CUSTOM_MED,FORGED_GMAIL_RCVD,FREEMAIL_FROM, NML_ADSP_CUSTOM_MED autolearn=no autolearn_force=no version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tom.home X-Rspamd-Queue-Id: 46Hg5m1ryrz4Vtq X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=fail reason="No valid SPF, No valid DKIM" header.from=gmail.com (policy=none); spf=softfail (mx1.freebsd.org: 2001:470:d5e7:1::1 is neither permitted nor denied by domain of kostikbel@gmail.com) smtp.mailfrom=kostikbel@gmail.com X-Spamd-Result: default: False [-2.97 / 15.00]; ARC_NA(0.00)[]; TO_DN_EQ_ADDR_SOME(0.00)[]; DMARC_POLICY_SOFTFAIL(0.10)[gmail.com : No valid SPF, No valid DKIM,none]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; FREEMAIL_FROM(0.00)[gmail.com]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; TAGGED_RCPT(0.00)[]; HAS_XAW(0.00)[]; R_SPF_SOFTFAIL(0.00)[~all]; RCPT_COUNT_FIVE(0.00)[5]; IP_SCORE_FREEMAIL(0.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; NEURAL_HAM_SHORT(-0.97)[-0.974,0]; IP_SCORE(0.00)[ip: (-2.65), ipnet: 2001:470::/32(-4.45), asn: 6939(-3.09), country: US(-0.05)]; FREEMAIL_TO(0.00)[gmail.com]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:6939, ipnet:2001:470::/32, country:US]; MIME_TRACE(0.00)[0:+]; RCVD_TLS_ALL(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 27 Aug 2019 07:11:25 -0000 On Mon, Aug 26, 2019 at 02:35:25PM -0700, maksim yevmenkin wrote: > > > > On Aug 26, 2019, at 9:14 AM, Warner Losh wrote: > > > > Is it from read_connection_list? If so I have a 'patch' that I'm using but > > haven't committed because it's just too gross: drop the lock before the > > copyout and pick it up again after... > > > > Hmm... interesting.... > > I only took a brief look at it. I suppose I can ensure user space address is wired and then copyout() can be called with mutex held No, you cannot do this, at least without making the kernel to panic. User might unmap the wired mapping at any time still. > > It’s odd that I’ve never seen this before. I’m traveling at the moment will take a closer look this later this week > > Thanks > Max > _______________________________________________ > freebsd-current@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-current > To unsubscribe, send any mail to "freebsd-current-unsubscribe@freebsd.org" From owner-freebsd-current@freebsd.org Tue Aug 27 08:03:02 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 77627CF1B3 for ; Tue, 27 Aug 2019 08:03:02 +0000 (UTC) (envelope-from mms.vanbreukelingen@gmail.com) Received: from mail-qt1-x842.google.com (mail-qt1-x842.google.com [IPv6:2607:f8b0:4864:20::842]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46HhFK43sKz4Z2D for ; Tue, 27 Aug 2019 08:03:01 +0000 (UTC) (envelope-from mms.vanbreukelingen@gmail.com) Received: by mail-qt1-x842.google.com with SMTP id 44so20433386qtg.11 for ; Tue, 27 Aug 2019 01:03:01 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=date:from:reply-to:to:cc:message-id:in-reply-to:references:subject :mime-version; bh=cJIcB0ymkPC8FSq5S294OuIzAY/urnEDZM6jg4s/UwE=; b=psNvM7IX2P5lCIMoY6jl19+5pmwtV4YttPTr6twekrXX9kbrogfYRG/rSzQAJVdPn4 +FjUGLlB+RiR95wDRvlVB18tgcWesj4rBsV3JNP3/WlGaGEtUAdPPHIZlGwkmtvTbuH6 Dc3R1FwZ/Bw5Rwvnmgxh98DKogCl6117eeB5a1oQVWHXqisVABMEnP7aL7b8ac3lkLNV kpr3KrzwEAdcN8xt0dDEBQ39/5eoDNOhCgIlZST93u8lTkyq6zznVmnQqc+CEWaGz9hT BFUagbuecXtzHhl0b3En/s5lne1c2TjotDGIN7Gv6a3H2aEK9RmBCWdDZ1rTqultqxTj IzAg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:reply-to:to:cc:message-id:in-reply-to :references:subject:mime-version; bh=cJIcB0ymkPC8FSq5S294OuIzAY/urnEDZM6jg4s/UwE=; b=fsGz+/6GXxSHz5eVQ3zVG6iGNYlUrPT3bCiN9rVOZPYscM5gWNY61zrJ67PhLPNC9i 0P1FwkK2lZo7vByZDjmNuVFK6RMxRGuaTArSer0suYnZDI8n8lEy8bV8KsVWgSkLel76 B/yr6elESvmPDH+sqZ+G98XlziS/t19yzI6XBE/2yvATJbDh14s3YOmuRd/WH0vC5IDA 9Hg/3iJUrV6MSTATtmNeAdpYzNCM5oZTJzw2qczgrPS0pqD1MmcV7c8hq48Kqu6gdgXA aNE1b3oIige3KxJb+bLeTeJ/BgAZk2F2sPgHWW9+mvHoS5ll5A1IuOmbLK0j3tIDOqpy Zs4w== X-Gm-Message-State: APjAAAXUvGDdgmePAU2ZbVFqa+P4pDtHH0TVwPrGxybNb03fjDRBunzm LaNThZveE8pQdffX8c9/Y5k= X-Google-Smtp-Source: APXvYqx/tr2poQLdoFuFZsoTWuZxxwXhteVLUkfPERxvz2W51mSCN5BTz55GemEZqKJJlgd3N2s5Vg== X-Received: by 2002:ac8:5219:: with SMTP id r25mr80176qtn.43.1566892980326; Tue, 27 Aug 2019 01:03:00 -0700 (PDT) Received: from sonic312-20.consmr.mail.bf2.yahoo.com (sonic312-20.consmr.mail.bf2.yahoo.com. [74.6.128.82]) by smtp.gmail.com with ESMTPSA id u45sm9390383qta.13.2019.08.27.01.02.59 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 27 Aug 2019 01:02:59 -0700 (PDT) X-YMail-OSG: nfoUy08VM1kBzW8hAQVKaotQUB3A1hxKrSNRhafJjsgbgKViVM3Oxb98oCD0_i1 ABoF6qc_bQmAxxFLG8GX4RxIFU9sUzPrbMrhj.1amZoSq49yewSfxTBtwTzaa7NdP725abFOjiBC YbmMxYe5n2OZVKRxJIM0t9VrrFEiMiyYqoTJMLof1HcdjQsuqv3qyXfRFnBxX4dUwpzu61FUWx9C FliDlBO7qyRIhfUZoGZY1HfV9Ix4_wviX4EdYnv4dBfxk4xrSJn.33jfnkG8KTtRH3PNV7k_N_We JATPX7nwzDdkKqHv9U40lh2pd21Li9vA0U5OSR1NAYvMs86hpr0WIKIYTL0O1KpgFmNEJSIQFQ1F sVXRDn3wOwlsqLGrwyJ5R15x7ZrZJGzg_WfmDgv3lYQa0.utjS8AKEs8Q9ASqBNLk0P_M7aA69J3 N7jgiDed7mXL3sQVm2xB5P1HM8AnBQ4nQ6EaCbIUBbK9SnIDGgd4NV.bOFVO6zVD2HhCLudwuN5P TmChJL64eV3N42DVzbUiddkU9XMZRN.qymucfJbCwtCgj4GY7.WrkgSrOFRwPZkO8mADo.664gCK 66mq40A2tqMBv2o0quGy132__ffgvL8DPAtnWT8swCXZf7TxS4QuMDGWQiTWcpqSwwKC2XG42T9d sPIlCY4lFiIZIv4u2HwVM1h9J2BJAhG_BE5IpvPfnzL4A4yPti81GW8XvjZdMbmaLHWcNwmOr4hI pCQGH9Y8YmOkF5iTzaWsEjhFE9bzbz6oknHFaQeZ7K8Z9D6qrzCn3wAi9IDkSauKYRYzVtemJEU0 U0loX2huMxhByfAlorK.Xu8LDWnTQRHnweb6LpKgpuvwELKLAXRPMVie642MKe4.XK5nn83IK5p8 JZZWoiL2zxVHU4ung3mpZ7X2krUpe5HB3DZMJshii7fBsVhmoFndrw2gVHPZE_gyQzKkXC8ppAC3 m5bc47uycQfpKB4Wbxxe.xkv0oBN__arJzGSprlzMOv8O_Jy7A9S3ib_WKsoVN1RbkCCBZQWcDKO U1a2XprPmNj_gSpSXkUh7lv2.7PBxrJpMAFmnhFNY34YCzBv09t9wtFc1GxBHpXdYRwLxrrUwUC_ pP1kRe601tbymkD_sve2yIBxNt.C1EGfvr5XUFJ95FZMvaw54v5Uh52P95pEC5ysEgWTzHOAZ.ul bVfgSeORpZogiYsMshPMSlmTRwJdo0qXVPrFBoOJuQksp4l3naJED9ltifSBGQ1GbpFIyxmSE4n6 8mjm5ingkxbNU8SSgiPUv83Wi0bwMLzRIpaoeiUcAFGuqxg-- Received: from sonic.gate.mail.ne1.yahoo.com by sonic312.consmr.mail.bf2.yahoo.com with HTTP; Tue, 27 Aug 2019 08:02:58 +0000 Date: Tue, 27 Aug 2019 08:02:57 +0000 (UTC) From: "mms.vanbreukelingen@gmail.com" Reply-To: "mms.vanbreukelingen@gmail.com" To: "kostikbel@gmail.com" , maksim yevmenkin Cc: Warner Losh , Hans Petter Selasky , "freebsd-current@freebsd.org" Message-ID: <233039408.1857163.1566892977201@mail.yahoo.com> In-Reply-To: <20190827071052.GT71821@kib.kiev.ua> References: <47509401.1440476.1566796167857.ref@mail.yahoo.com> <47509401.1440476.1566796167857@mail.yahoo.com> <5aa8faeb-5e8e-38be-4301-81f3d82c494a@selasky.org> <00E772F0-7231-44C4-B314-26730CC7DF21@gmail.com> <20190827071052.GT71821@kib.kiev.ua> Subject: Re: Kernel-Crash when working with ubt0 MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="----=_Part_1857162_770114156.1566892977201" X-Mailer: WebService/1.1.14219 YahooMailAndroidMobile YMobile/1.0 (com.yahoo.mobile.client.android.mail/5.43.3; Android/7.0; HUAWEIBLN-L21; hi6250; HUAWEI; HUAWEI BLN-L21; 5.3; 1843x1080; ) X-Rspamd-Queue-Id: 46HhFK43sKz4Z2D X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=psNvM7IX; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of mmsvanbreukelingen@gmail.com designates 2607:f8b0:4864:20::842 as permitted sender) smtp.mailfrom=mmsvanbreukelingen@gmail.com X-Spamd-Result: default: False [-2.89 / 15.00]; TO_DN_EQ_ADDR_SOME(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; HAS_REPLYTO(0.00)[mms.vanbreukelingen@gmail.com]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; FREEMAIL_FROM(0.00)[gmail.com]; HAS_ATTACHMENT(0.00)[]; RCPT_COUNT_FIVE(0.00)[5]; RCVD_COUNT_THREE(0.00)[4]; DKIM_TRACE(0.00)[gmail.com:+]; CTYPE_MIXED_BOGUS(1.00)[]; MIME_BASE64_TEXT(0.10)[]; NEURAL_HAM_SHORT(-0.99)[-0.987,0]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; FREEMAIL_TO(0.00)[gmail.com]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:+,3:~,4:+]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; TAGGED_FROM(0.00)[]; DWL_DNSWL_NONE(0.00)[gmail.com.dwl.dnswl.org : 127.0.5.0]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; REPLYTO_EQ_FROM(0.00)[]; FROM_HAS_DN(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; TAGGED_RCPT(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; FREEMAIL_REPLYTO(0.00)[gmail.com]; MIME_GOOD(-0.10)[multipart/mixed,multipart/alternative,text/plain]; IP_SCORE_FREEMAIL(0.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[2.4.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; RCVD_TLS_LAST(0.00)[]; IP_SCORE(0.00)[ip: (2.23), ipnet: 2607:f8b0::/32(-2.86), asn: 15169(-2.33), country: US(-0.05)] X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 27 Aug 2019 08:03:02 -0000 ------=_Part_1857162_770114156.1566892977201 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable =20 On Tue, 27 Aug 2019 at 9:11, Konstantin Belousov wro= te: On Mon, Aug 26, 2019 at 02:35:25PM -0700, maksim yevmenkin wrote: >=20 >=20 > > On Aug 26, 2019, at 9:14 AM, Warner Losh wrote: > >=20 > > Is it from read_connection_list? If so I have a 'patch' that I'm using = but > > haven't committed because it's just too gross: drop the lock before the > > copyout and pick it up again after... > >=20 >=20 > Hmm... interesting....=20 >=20 > I only took a brief look at it. I suppose I can ensure user space address= is wired and then copyout() can be called with mutex held >No, you cannot do this, at least without making the kernel to panic. User might unmap the wired mapping at any time still. Is it a userspace specific issue,=C2=A0 I don't think so?=C2=A0 It's a page= fault because of aquired lock.=C2=A0 Well,=C2=A0 I try two things this evening:=C2=A0 1. I do the patch manually cut'n paste,=C2=A0 as git --diff is a weired thi= ng,=C2=A0 especially when you come from Arch - but ok,=C2=A0 I give this a = try.=C2=A0 2. Recompile with option MTX_SPIN=3Dy at the config at /usr/src/head/sys/x8= 6_64/conf/MIRANDA,=C2=A0 make with INSTKERNNAME=3DXYZ compiles ok,=C2=A0 but you just get an M at th= e reversion#, just the CURRENT appears with "uname -a". Would be a bit arro= gant,=C2=A0 insulant and egoistic calling our Kernel by your first name and= Helling everyone you've coded it,=C2=A0 IMO.=C2=A0 Btw,=C2=A0 you can't just mix up LINT and "stock" together,=C2=A0 since I d= id,=C2=A0 I know what the long run of -1=F0=9F=98=AD means. Not a cool thin= g,=C2=A0 when compiling 8 hours at a (3rd,=C2=A0 to be honest)=C2=A0 world = and then the kernel built just can't bootstrap.=C2=A0=C2=A0 I also built two worlds 28 simultaniously from different sources and compar= ed installation. mergemaster's -Ui (or -p) always's to be done at Single Mo= de with remounting root rw, system is very vulnerable at the moment masterp= wd is constructed and groups are merged (this not in Single Mode as it need= s the ELF64 for merging correctly (right?) and dbus missing some users afte= rwards normally. I had to recreate user not just once and to chown 775 it.= =C2=A0 It has something from an abortion when turning on after install Kernel and = screen remains black. This is what all of US fear.=C2=A0 zcat under Linux c= an be a black cat... >=20 > It=E2=80=99s odd that I=E2=80=99ve never seen this before. I=E2=80=99m tr= aveling at the moment will take a closer look this later this week >=20 > Thanks > Max > _______________________________________________ > freebsd-current@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-current > To unsubscribe, send any mail to "freebsd-current-unsubscribe@freebsd.org= " =20 ------=_Part_1857162_770114156.1566892977201 Content-Type: text/plain Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="Untitled" Content-ID: <72cb6152-947f-44d4-ab63-6e9efaabaf5a> T24gTW9uLCBBdWcgMjYsIDIwMTkgYXQgMDI6MzU6MjVQTSAtMDcwMCwgbWFrc2ltIHlldm1lbmtp biB3cm90ZToKPiAKPiAKPiA+IE9uIEF1ZyAyNiwgMjAxOSwgYXQgOToxNCBBTSwgV2FybmVyIExv c2ggPGltcEBic2RpbXAuY29tPiB3cm90ZToKPiA+IAo+ID4gSXMgaXQgZnJvbSByZWFkX2Nvbm5l Y3Rpb25fbGlzdD8gSWYgc28gSSBoYXZlIGEgJ3BhdGNoJyB0aGF0IEknbSB1c2luZyBidXQKPiA+ IGhhdmVuJ3QgY29tbWl0dGVkIGJlY2F1c2UgaXQncyBqdXN0IHRvbyBncm9zczogZHJvcCB0aGUg bG9jayBiZWZvcmUgdGhlCj4gPiBjb3B5b3V0IGFuZCBwaWNrIGl0IHVwIGFnYWluIGFmdGVyLi4u Cj4gPiAKPiAKPiBIbW0uLi4gaW50ZXJlc3RpbmcuLi4uIAo+IAo+IEkgb25seSB0b29rIGEgYnJp ZWYgbG9vayBhdCBpdC4gSSBzdXBwb3NlIEkgY2FuIGVuc3VyZSB1c2VyIHNwYWNlIGFkZHJlc3Mg aXMgd2lyZWQgYW5kIHRoZW4gY29weW91dCgpIGNhbiBiZSBjYWxsZWQgd2l0aCBtdXRleCBoZWxk CgpObywgeW91IGNhbm5vdCBkbyB0aGlzLCBhdCBsZWFzdCB3aXRob3V0IG1ha2luZyB0aGUga2Vy bmVsIHRvIHBhbmljLgpVc2VyIG1pZ2h0IHVubWFwIHRoZSB3aXJlZCBtYXBwaW5nIGF0IGFueSB0 aW1lIHN0aWxsLgoKPiAKPiBJdOKAmXMgb2RkIHRoYXQgSeKAmXZlIG5ldmVyIHNlZW4gdGhpcyBi ZWZvcmUuIEnigJltIHRyYXZlbGluZyBhdCB0aGUgbW9tZW50IHdpbGwgdGFrZSBhIGNsb3NlciBs b29rIHRoaXMgbGF0ZXIgdGhpcyB3ZWVrCj4gCj4gVGhhbmtzCj4gTWF4Cj4gX19fX19fX19fX19f X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KPiBmcmVlYnNkLWN1cnJlbnRAZnJl ZWJzZC5vcmcgbWFpbGluZyBsaXN0Cj4gaHR0cHM6Ly9saXN0cy5mcmVlYnNkLm9yZy9tYWlsbWFu L2xpc3RpbmZvL2ZyZWVic2QtY3VycmVudAo+IFRvIHVuc3Vic2NyaWJlLCBzZW5kIGFueSBtYWls IHRvICJmcmVlYnNkLWN1cnJlbnQtdW5zdWJzY3JpYmVAZnJlZWJzZC5vcmciCg== ------=_Part_1857162_770114156.1566892977201-- From owner-freebsd-current@freebsd.org Tue Aug 27 08:24:56 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 50394CFBFB for ; Tue, 27 Aug 2019 08:24:56 +0000 (UTC) (envelope-from ohartmann@walstatt.org) Received: from mout.gmx.net (mout.gmx.net [212.227.15.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "mout.gmx.net", Issuer "TeleSec ServerPass Class 2 CA" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46Hhkb1xP4z4bXW for ; Tue, 27 Aug 2019 08:24:54 +0000 (UTC) (envelope-from ohartmann@walstatt.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net; s=badeba3b8450; t=1566894284; bh=sS+kArh7Q+S/8jccFoCUYErb21PmniBjFWzJMB3F+X8=; h=X-UI-Sender-Class:Date:From:To:Subject; b=i/HetnP4SupqdrScuqQtwOcRp8hh/4/+sYfHPg4fe1zYVUu0x1MbvMr8wHMavyYFv emJYG0CUh600fAmmWPjtZnSDxr4NzkalETQEbd+ePqBkvDuVFUDcXE2dXxfuxrkWt+ SIpAhYBpDyulJcMnYmw9PKJiffROx7PPs8NgaeY8= X-UI-Sender-Class: 01bb95c1-4bf8-414a-932a-4f6e2808ef9c Received: from freyja ([46.88.81.15]) by mail.gmx.com (mrgmx004 [212.227.17.190]) with ESMTPSA (Nemesis) id 1M26vL-1i50UV1Jqj-002auH for ; Tue, 27 Aug 2019 10:12:02 +0200 Date: Tue, 27 Aug 2019 10:11:54 +0200 From: "O. Hartmann" To: freebsd-current Subject: jails, ZFS, deprecated jail variables and poudriere problems Message-ID: <20190827101149.1efcb946@freyja> MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: quoted-printable X-Provags-ID: V03:K1:HSJA1XKF4lHn/1jhhBLJ0Pwxzf2jqLlKI0MlXLWxyB3c6oximT3 3XknrmXBlSvqvyaJfWZ4WboXOTlip/0DfChJc1izD0puVu7cLP9HG9pyZl5b9lhptlOtBe7 P3H4qZZ1bugvsoPSW49Eo2M2SUnARPGnZiA4kJI7zN7Xb4zjQ+z0o/hboibdCeLb7rtxb3U BWfA/3y5TPqY6/pb0fKoQ== X-Spam-Flag: NO X-UI-Out-Filterresults: notjunk:1;V03:K0:zzWqoyGcQ80=:Pa/LIG0wAXdot0aOhl0Eol Cqw8V4X+Rkji7zwMosmxLqU7w0QACkUuKVk/Js+V/oFWRtQ9VX4PO2PlT4fD69CyVIz5qIDNS fb5W0vTEMWUXbKxR74iRTv5ORpiCs/iYsMjMhr3StlAxrYdoqAJ0bwZMNKnBrHjmzaPx4AzX5 iPCfpZ35vBVzYDlNTHruoPtSXO95pNdKTPsaei2K2PH+AcLhlPWawZdLq11NllqWCpN8nCY1s PnyTFWixn43iwGKm/y73SQMbs70TD1nNI3X+LHpWR37fO0cGH+ooRqQ3+yXAagbQEQ/9FZHjZ yonvxrw23Vn8qV6yQcXZP4jKzpbX8uJQ0If2fS/tgF1MFIxaW/jIzcj4QL0gIeMlNCz8lBF13 iQsL14jXaW1Ez7dELeDdbMq6SKCTtDNTFLLcF/150/K2n0gmhywN5FeKWe1SkUT2FoTcPvLRF wZw7LgwD0X/xD3O/suMBmDEdzlH52UaycnF14VkcxMmvc/yxels80mjkLDXB1EA0obOXJ4ZqE SenUdHxJaJ89Lt+qbQU1AOkwYyEc09qe1hokmHYTabQ5NokGJ3GMRuS9iVCKlf+i8ptL+k1XK uFO+IXP+KJ8H5YIE0d5ltATqiBNr/zHjFduYxrDXDI+NqkrPP4E58lh37fIIyCghg9epkAmCv FMasVRs5v9GT/iINPePd8LAesfjN7QgPC66WP15jok6TcNtkdwJIfH1VxuUe7xygbrKTTquMJ FfyBNWK66+aWa1yxhC2S4xsGe+8rtlHRcUsyDulK+Jvu1qoyc1eQjAu4/jfiPLndYsAKx+pQ/ UjVY5lPLBvXMX7KdCXfnw8SWBn4Nuh4Ek1IjZn88+L3DlltwbHYvpz09JgocIYoyK1QhMtNf8 nYo+VWDRztg0NEBcbV03Ubvd33H1459qAuta+KCrtLgGm8KiSXCK4kbkE7gvJW8K95/Q4lBfX 10fxXUm8Lvar8Pc31lo3lwHNe+t604WMnAezLJukYkaPHdJRrWN3s+TOsjE6/F9JGzSwJkRbv +9XgOONZ8++hEMieU1YYl5ooPIXQVfeqStPzWKbsCzLex5hASzkCBuiSm8eFbZC3qrccM6OA4 b6icb3d067EodSWe3XPCR+6B3rDiIEuyoNiRW3CGkgfZvbP586s5fwj/e34N1OIERQbkh8ZnR 0sfJw= X-Rspamd-Queue-Id: 46Hhkb1xP4z4bXW X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmx.net header.s=badeba3b8450 header.b=i/HetnP4; dmarc=none; spf=none (mx1.freebsd.org: domain of ohartmann@walstatt.org has no SPF policy when checking 212.227.15.19) smtp.mailfrom=ohartmann@walstatt.org X-Spamd-Result: default: False [-3.85 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_DKIM_ALLOW(-0.20)[gmx.net:s=badeba3b8450]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; DMARC_NA(0.00)[walstatt.org]; RCPT_COUNT_ONE(0.00)[1]; IP_SCORE(-1.08)[ip: (-6.21), ipnet: 212.227.0.0/16(-1.38), asn: 8560(2.20), country: DE(-0.01)]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[gmx.net:+]; NEURAL_HAM_SHORT(-0.97)[-0.970,0]; RCVD_IN_DNSWL_NONE(0.00)[19.15.227.212.list.dnswl.org : 127.0.3.0]; R_SPF_NA(0.00)[]; RECEIVED_SPAMHAUS_PBL(0.00)[15.81.88.46.khpj7ygk5idzvmvt5x4ziurxhy.zen.dq.spamhaus.net : 127.0.0.10]; FROM_EQ_ENVFROM(0.00)[]; MID_RHS_NOT_FQDN(0.50)[]; ASN(0.00)[asn:8560, ipnet:212.227.0.0/16, country:DE]; MIME_TRACE(0.00)[0:+]; RCVD_TLS_ALL(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 27 Aug 2019 08:24:56 -0000 Hello list, trying to setup a poudriere jail on recent CURRENT and have some severe tr= ouble. We have a single ZFS pool (raidz), call it pool00 and this pool00 conatins= a ZFS dataset pool00/poudriere which we want to exclusively attach to a jail= . pool00/poudriere contains a complete clone of a former, now decomissioned machine and is usable by the host bearing the jails. The jail, named poudr= iere, has these config parameters set in /etc/jail.conf as recommended: enforce_statfs=3D "0"; allow.raw_sockets=3D "1"; allow.mount=3D "1"; allow.mount.zfs=3D "1"; allow.mount.devfs=3D "1"; allow.mount.fdescfs=3D "1"; allow.mount.procfs=3D "1"; allow.mount.nullfs=3D "1"; allow.mount.fusefs=3D "1"; Here I find the first confusing observation. I can't interact with the dat= aset and its content within the jail. I've set the "jailed" property of pool00/poudriere via "zfs set jailed=3Don pool00/poudriere" and I also hav= e to attach the jailed dataset manually via "zfs jail poudriere pool00/poudrier= e" to the (running) jail. But within the jail, listing ZFS's mountpoints reveal: NAME USED AVAIL REFER MOUNTPOINT pool00 124G 8.62T 34.9K /pool00 pool00/poudriere 34.9K 8.62T 34.9K /pool/poudriere but nothing below /pool/poudriere is visible to the jail. Being confused I tried to check the appropriate security variables and found a set of sysct= l OIDs, which seem to have no documentation entry, like security.jail.param.allow.mount.zfs: 0 and a counterpart security.jail.mount_zfs_allowed: 1 Checking the description of security.jail.mount_zfs_allowed tells me that = this OID is deprecated: security.jail.mount_zfs_allowed: Jail may mount the zfs file system (depre= cated) So, we tried to set param.allow.mount.zfs=3D1 via /etc/jail.conf for the propper jail, but this results in an error. I c= an't find anything in jail(8) about these new ".param." OIDs, so maybe my troub= le is rooting in here. Is there a howto for the novices on howto setup a jail with ZFS capabiliti= es needed for poudriere with ZFS? Thank you in advance, oh From owner-freebsd-current@freebsd.org Tue Aug 27 13:03:59 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id CCB11D5771 for ; Tue, 27 Aug 2019 13:03:59 +0000 (UTC) (envelope-from maksim.yevmenkin@gmail.com) Received: from mail-qk1-x736.google.com (mail-qk1-x736.google.com [IPv6:2607:f8b0:4864:20::736]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46HpwZ6Gfyz3MWb for ; Tue, 27 Aug 2019 13:03:58 +0000 (UTC) (envelope-from maksim.yevmenkin@gmail.com) Received: by mail-qk1-x736.google.com with SMTP id y22so971038qkb.11 for ; Tue, 27 Aug 2019 06:03:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=LHxUrViDT12vb2WCrLNea15xvoa8Pot0kwYkG1kVRzk=; b=FN1YUVOEM+MO88doZo0HN98oj8o5wO+cVMoBRlX6/EESw+9Vj/nmT43vpjUQj5Q0cM 8E+DZimyWYBqsXT/UdYG4X/16qC7kY9GIT+GiFBOyjxqPrxTOX4qPrd9c2u9VBBBEx/d QnUMi3fTfIf49ZyP9wbmjWT2zgSo5Cr06D6jeeGrziFENSpKkx8/H4UQuELIyDSq+gWT VcCp+BQOKxmEGbz8muFG61iDtmXIZNKxylDGHoAVinYwYxF0QOmhkkNoHTDzvLAyTqxr 1IV7iLWFpCwp8lTIe2o8idgQpMaIE0BLPbdenXFPPWj+aPyLBWMm+DtHdt/xVfSPRrsQ t6jQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=LHxUrViDT12vb2WCrLNea15xvoa8Pot0kwYkG1kVRzk=; b=LCSNpz5nzmLvXPSis6ZA/argszHMR9PX0Ydmve6gQ1sruMW66SMzL83yljKXMZLd4y dT2NMEutJ7udllZHi94vPUrF7MMx1ofitJhoqKqSaNgA0houP+czWEnlQiFQijWMjMHe M7vSJCtuov/9/wuY7HREwc7dHI5xzXf2seksEgUyyg/EY3T54Oy750omU3iZ1I/Wuu0E +vuzxSIe0yZQmtlDfGkWa6jSlkg9xpEOyo/2QG6tU48qBKu2LCPSSm4p3rM7zRx2EOzk Cwpdw3w51EihJ4iyMtlxncGJtUw+dot1PPcMP0XRKNRZ/Aoex4K7ikrv9uMlUTIJO+i+ +ESw== X-Gm-Message-State: APjAAAVvvQ3eHaPUltvEO5q6w2rQQwMnEg7yt/IjRoPU9kkEowkbjXNy c2Bol6KsdgLxsbZGyfuToMbYXi8QRFW0ZpSmQPA= X-Google-Smtp-Source: APXvYqy5DfojYNwmfPHytafUlEXzhaw3I57o3/og5XfoFAI62CtFigo9BF0OuyPAPYyP0y+Z0BXHFLzTAaTGHECtwWQ= X-Received: by 2002:a37:7cc:: with SMTP id 195mr4129435qkh.387.1566911037241; Tue, 27 Aug 2019 06:03:57 -0700 (PDT) MIME-Version: 1.0 References: <47509401.1440476.1566796167857.ref@mail.yahoo.com> <47509401.1440476.1566796167857@mail.yahoo.com> <5aa8faeb-5e8e-38be-4301-81f3d82c494a@selasky.org> <00E772F0-7231-44C4-B314-26730CC7DF21@gmail.com> <20190827071052.GT71821@kib.kiev.ua> <233039408.1857163.1566892977201@mail.yahoo.com> In-Reply-To: <233039408.1857163.1566892977201@mail.yahoo.com> From: Maksim Yevmenkin Date: Tue, 27 Aug 2019 06:03:46 -0700 Message-ID: Subject: Re: Kernel-Crash when working with ubt0 To: "mms.vanbreukelingen@gmail.com" Cc: "kostikbel@gmail.com" , Warner Losh , Hans Petter Selasky , "freebsd-current@freebsd.org" Content-Type: text/plain; charset="UTF-8" X-Rspamd-Queue-Id: 46HpwZ6Gfyz3MWb X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=FN1YUVOE; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of maksimyevmenkin@gmail.com designates 2607:f8b0:4864:20::736 as permitted sender) smtp.mailfrom=maksimyevmenkin@gmail.com X-Spamd-Result: default: False [-4.00 / 15.00]; TO_DN_EQ_ADDR_SOME(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36:c]; FREEMAIL_FROM(0.00)[gmail.com]; RCPT_COUNT_FIVE(0.00)[5]; DKIM_TRACE(0.00)[gmail.com:+]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; NEURAL_HAM_SHORT(-1.00)[-0.997,0]; FREEMAIL_TO(0.00)[gmail.com]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; TAGGED_FROM(0.00)[]; DWL_DNSWL_NONE(0.00)[gmail.com.dwl.dnswl.org : 127.0.5.0]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; FROM_HAS_DN(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; TAGGED_RCPT(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; MIME_GOOD(-0.10)[text/plain]; IP_SCORE_FREEMAIL(0.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[6.3.7.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; IP_SCORE(0.00)[ip: (-9.37), ipnet: 2607:f8b0::/32(-2.86), asn: 15169(-2.33), country: US(-0.05)]; FREEMAIL_CC(0.00)[gmail.com]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 27 Aug 2019 13:03:59 -0000 > > Hmm... interesting.... > > > > I only took a brief look at it. I suppose I can ensure user space address is wired and then copyout() can be called with mutex held > > >No, you cannot do this, at least without making the kernel to panic. > User might unmap the wired mapping at any time still. Kostik, i was thinking along the lines of vslock/vsunlock and copyout_nofault. basically similar to the sysctl code. do you think this would not work? thanks, max From owner-freebsd-current@freebsd.org Tue Aug 27 13:38:22 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id A7659D5F8B for ; Tue, 27 Aug 2019 13:38:22 +0000 (UTC) (envelope-from kostikbel@gmail.com) Received: from kib.kiev.ua (kib.kiev.ua [IPv6:2001:470:d5e7:1::1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 46HqhD6f5qz3P1y for ; Tue, 27 Aug 2019 13:38:20 +0000 (UTC) (envelope-from kostikbel@gmail.com) Received: from tom.home (kib@localhost [127.0.0.1]) by kib.kiev.ua (8.15.2/8.15.2) with ESMTPS id x7RDcBnA006667 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO); Tue, 27 Aug 2019 16:38:14 +0300 (EEST) (envelope-from kostikbel@gmail.com) DKIM-Filter: OpenDKIM Filter v2.10.3 kib.kiev.ua x7RDcBnA006667 Received: (from kostik@localhost) by tom.home (8.15.2/8.15.2/Submit) id x7RDcBaH006666; Tue, 27 Aug 2019 16:38:11 +0300 (EEST) (envelope-from kostikbel@gmail.com) X-Authentication-Warning: tom.home: kostik set sender to kostikbel@gmail.com using -f Date: Tue, 27 Aug 2019 16:38:11 +0300 From: Konstantin Belousov To: Maksim Yevmenkin Cc: "mms.vanbreukelingen@gmail.com" , Warner Losh , Hans Petter Selasky , "freebsd-current@freebsd.org" Subject: Re: Kernel-Crash when working with ubt0 Message-ID: <20190827133811.GU71821@kib.kiev.ua> References: <47509401.1440476.1566796167857.ref@mail.yahoo.com> <47509401.1440476.1566796167857@mail.yahoo.com> <5aa8faeb-5e8e-38be-4301-81f3d82c494a@selasky.org> <00E772F0-7231-44C4-B314-26730CC7DF21@gmail.com> <20190827071052.GT71821@kib.kiev.ua> <233039408.1857163.1566892977201@mail.yahoo.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.12.1 (2019-06-15) X-Spam-Status: No, score=-1.0 required=5.0 tests=ALL_TRUSTED,BAYES_00, DKIM_ADSP_CUSTOM_MED,FORGED_GMAIL_RCVD,FREEMAIL_FROM, NML_ADSP_CUSTOM_MED autolearn=no autolearn_force=no version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tom.home X-Rspamd-Queue-Id: 46HqhD6f5qz3P1y X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=fail reason="No valid SPF, No valid DKIM" header.from=gmail.com (policy=none); spf=softfail (mx1.freebsd.org: 2001:470:d5e7:1::1 is neither permitted nor denied by domain of kostikbel@gmail.com) smtp.mailfrom=kostikbel@gmail.com X-Spamd-Result: default: False [-2.98 / 15.00]; TO_DN_EQ_ADDR_SOME(0.00)[]; RCVD_COUNT_TWO(0.00)[2]; TO_DN_SOME(0.00)[]; FREEMAIL_FROM(0.00)[gmail.com]; HAS_XAW(0.00)[]; R_SPF_SOFTFAIL(0.00)[~all]; RCPT_COUNT_FIVE(0.00)[5]; NEURAL_HAM_SHORT(-0.98)[-0.978,0]; FREEMAIL_TO(0.00)[gmail.com]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; R_DKIM_NA(0.00)[]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:6939, ipnet:2001:470::/32, country:US]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; FROM_HAS_DN(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; TAGGED_RCPT(0.00)[]; MIME_GOOD(-0.10)[text/plain]; IP_SCORE_FREEMAIL(0.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; IP_SCORE(0.00)[ip: (-2.63), ipnet: 2001:470::/32(-4.45), asn: 6939(-3.09), country: US(-0.05)]; FREEMAIL_CC(0.00)[gmail.com]; RCVD_TLS_ALL(0.00)[]; DMARC_POLICY_SOFTFAIL(0.10)[gmail.com : No valid SPF, No valid DKIM,none] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 27 Aug 2019 13:38:22 -0000 On Tue, Aug 27, 2019 at 06:03:46AM -0700, Maksim Yevmenkin wrote: > > > Hmm... interesting.... > > > > > > I only took a brief look at it. I suppose I can ensure user space address is wired and then copyout() can be called with mutex held > > > > >No, you cannot do this, at least without making the kernel to panic. > > User might unmap the wired mapping at any time still. > > Kostik, > > i was thinking along the lines of vslock/vsunlock and copyout_nofault. > basically similar to the sysctl code. do you think this would not > work? This would probably work, but at least causes fragmentation of userspace vm_map entries. If it is supposed to be used on high-frequency data path, then it would cause significant blow up of the VM structures used to keep user data map. From owner-freebsd-current@freebsd.org Tue Aug 27 13:51:08 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id E8EF4D6546 for ; Tue, 27 Aug 2019 13:51:08 +0000 (UTC) (envelope-from imb@protected-networks.net) Received: from mail.protected-networks.net (mail.protected-networks.net [IPv6:2001:470:8d59:1::8]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "mail.protected-networks.net", Issuer "Protected Networks CA" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 46Hqz00P11z3PjR for ; Tue, 27 Aug 2019 13:51:07 +0000 (UTC) (envelope-from imb@protected-networks.net) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d= protected-networks.net; h=content-transfer-encoding :content-language:content-type:content-type:in-reply-to :mime-version:user-agent:date:date:message-id:from:from :references:subject:subject; s=201508; t=1566913860; bh=uejxDFqn Qus0A71fyJseKlW+8EyK32lKNoLIG1+3WEA=; b=OJOgi2gCtZqjw9103TxfUXSa nsjb1a6thpL+MnYxX3cEYd80Ty1/sEK532UnFLxrBHXnVUlO50FSQBvgty8NxLvr QUforuroCRdeFinDMKrztCxeNjgR1HNU1f5BjC/KaYj3T/iJJj8M/8Zyj8zbuUTl yqyunkJvAubgyii/B3c= Received: from toshi.auburn.protected-networks.net (toshi.auburn.protected-networks.net [192.168.1.10]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (Client did not present a certificate) (Authenticated sender: imb@mail.protected-networks.net) by mail.protected-networks.net (Postfix) with ESMTPSA id 0678F258F for ; Tue, 27 Aug 2019 09:51:00 -0400 (EDT) Subject: Re: SVN r351457 breaks drm-current To: freebsd-current@freebsd.org References: <1ed2692e-9964-58f7-5af9-08fadf65dec7@protected-networks.net> <20190824180440.GD71821@kib.kiev.ua> <9dd5585d-3305-31fd-7f0c-826567fe5a12@protected-networks.net> From: Michael Butler Message-ID: <64394f54-1079-32ec-0af2-1d810c09d84e@protected-networks.net> Date: Tue, 27 Aug 2019 09:50:59 -0400 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:68.0) Gecko/20100101 Thunderbird/68.0 MIME-Version: 1.0 In-Reply-To: <9dd5585d-3305-31fd-7f0c-826567fe5a12@protected-networks.net> Content-Type: text/plain; charset=windows-1252 Content-Language: en-NZ Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: 46Hqz00P11z3PjR X-Spamd-Bar: ----- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=protected-networks.net header.s=201508 header.b=OJOgi2gC; dmarc=none; spf=pass (mx1.freebsd.org: domain of imb@protected-networks.net designates 2001:470:8d59:1::8 as permitted sender) smtp.mailfrom=imb@protected-networks.net X-Spamd-Result: default: False [-5.00 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_DKIM_ALLOW(-0.20)[protected-networks.net:s=201508]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+mx]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; TO_DN_NONE(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; DMARC_NA(0.00)[protected-networks.net]; DKIM_TRACE(0.00)[protected-networks.net:+]; NEURAL_HAM_SHORT(-0.98)[-0.982,0]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; IP_SCORE(-1.52)[ipnet: 2001:470::/32(-4.45), asn: 6939(-3.09), country: US(-0.05)]; ASN(0.00)[asn:6939, ipnet:2001:470::/32, country:US]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_TLS_ALL(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 27 Aug 2019 13:51:09 -0000 On 2019-08-24 19:09, Michael Butler wrote: > On 2019-08-24 14:04, Konstantin Belousov wrote: >> On Sat, Aug 24, 2019 at 11:02:20AM -0600, Warner Losh wrote: >>> forward declaring struct pcpu; in md_var.h "fixes" this, but I'm not sure >>> that's the right fix. >> More correct way to fix it is to include sys/pcpu.h before machine/md_var.h, >> same as all in-tree consumers of the header do, apparently. >> >> But another question is why the driver needs md_var.h, there are no >> externally usable definitions there. > > There are uses of other variables from machine/md_var.h, notably > cpu_feature, in linux_compat.c. > > Including sys/pcpu.h allows the build to continue .. as in .. > > *** linuxkpi/gplv2/src/linux_compat.c~ Wed Aug 7 14:36:56 2019 > --- linuxkpi/gplv2/src/linux_compat.c Sat Aug 24 18:58:08 2019 > *************** > *** 2,7 **** > --- 2,8 ---- > #include > #if defined(__i386__) || defined(__amd64__) > #include > + #include > #include > #endif > #include > > Locally, I've put this patch into graphics/drm-current-kmod/files so I > don't trip over it on subsequent builds, This is now resolved in-tree by ports SVN r510009 - thanks to all, imb From owner-freebsd-current@freebsd.org Tue Aug 27 16:52:32 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id F2F54DA1EC for ; Tue, 27 Aug 2019 16:52:32 +0000 (UTC) (envelope-from mizhka@gmail.com) Received: from mail-wr1-x42b.google.com (mail-wr1-x42b.google.com [IPv6:2a00:1450:4864:20::42b]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46Hw0H6g8sz455K for ; Tue, 27 Aug 2019 16:52:31 +0000 (UTC) (envelope-from mizhka@gmail.com) Received: by mail-wr1-x42b.google.com with SMTP id q12so19491528wrj.12 for ; Tue, 27 Aug 2019 09:52:31 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=tilN4Cc/dKDRVRln49m7XvmaZLYc1jvNOWEzpcr8WcI=; b=Z+CBS5qDwD/nNUGasxQQxDBZK7x210ZG0W0wcClRA2IERoMsWDV/AUqPtlWG13k7MQ fwznpbJf3hkwqQf4elj/ZqGslbfCHprxTvkMy59frFkJZl0JcYlftAjM5gpT880L9j9e 2/jqGFjLJOWZwgg/oocOw5uMs6vFpBCAQ2XSP2FZZpfVcJQLmrndxfG1lLsCsZ/1Vahe GXHw1Lzfa0n+lE0N2j9ikGT2LRj1QVhvrjo6xh6jkzMX7gdOmarC2hy/NTOJHZjR8jVJ zb1n9HrOT6bejBc4yhr+1KWyEjjH/Xk5DliZ4Ee1Erbb5/okKRIjImfTa5Ymi8mJz0BT sOyw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=tilN4Cc/dKDRVRln49m7XvmaZLYc1jvNOWEzpcr8WcI=; b=F+3mHMUpgLKjhiLOAb98sF7tIiBp0qTJphJFKHB7718rQFms1zO30aaXpBgfcFRvFn UBYuyolE2JU0XIzAx+ZI7A5xF5vB8fA3RJNJMQ1D5RwK2SvcGnXwN1Q6+xRbSXW23fXG iEtyMW2lStT0s9eQDiwi4yhNssC5IC8k6zQ7/ZuGrJRCbKOTmNWdN6UWr0eBpIiUxvV0 bWWUKwT2eBjnv5lrPfKagt88TnWThqQ1BR/aZzfzsD/Y5WWrX4njUk3D2UDvcuH9qsKO BTvE/DKuxY5xuJ6pH/s0pcFi+J82a7azfiHUNMoxMAeDzaIdqtiNHNnzT5osXJ44M/ig kQsg== X-Gm-Message-State: APjAAAW0P5gopLBMoZwGF9g7eq0OMrZ4gqkRSjm58C0wX9SMTgzYBJqX AadilJbQTEcjqFomTGT7NF0aBVHAaS1LUozH4vDscytF7SA= X-Google-Smtp-Source: APXvYqxSon3U9pG46+eCK2F8x4rrId0HLhIkrNhUM/M9FkUfm/ItLAy2Esc0Tv0JTdg7xhUvQMeR9xsgEZWl7kYyfvU= X-Received: by 2002:a5d:6911:: with SMTP id t17mr18782774wru.255.1566924749720; Tue, 27 Aug 2019 09:52:29 -0700 (PDT) MIME-Version: 1.0 References: <20190827101149.1efcb946@freyja> In-Reply-To: <20190827101149.1efcb946@freyja> From: Michael Zhilin Date: Tue, 27 Aug 2019 19:52:17 +0300 Message-ID: Subject: Re: jails, ZFS, deprecated jail variables and poudriere problems To: "O. Hartmann" Cc: freebsd-current X-Rspamd-Queue-Id: 46Hw0H6g8sz455K X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=Z+CBS5qD; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of mizhka@gmail.com designates 2a00:1450:4864:20::42b as permitted sender) smtp.mailfrom=mizhka@gmail.com X-Spamd-Result: default: False [-4.00 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2a00:1450:4000::/36:c]; FREEMAIL_FROM(0.00)[gmail.com]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; IP_SCORE_FREEMAIL(0.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[gmail.com:+]; RCPT_COUNT_TWO(0.00)[2]; RCVD_IN_DNSWL_NONE(0.00)[b.2.4.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.5.4.1.0.0.a.2.list.dnswl.org : 127.0.5.0]; NEURAL_HAM_SHORT(-1.00)[-0.998,0]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; IP_SCORE(0.00)[ip: (-9.30), ipnet: 2a00:1450::/32(-3.00), asn: 15169(-2.33), country: US(-0.05)]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2a00:1450::/32, country:US]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[]; DWL_DNSWL_NONE(0.00)[gmail.com.dwl.dnswl.org : 127.0.5.0] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 27 Aug 2019 16:52:33 -0000 Hi, I have no tried (but it's in progress) this article: http://zero-knowledge.org/post/126/ Hope it will help (for me too). Thanks! On Tue, Aug 27, 2019 at 11:25 AM O. Hartmann wrote: > Hello list, > > trying to setup a poudriere jail on recent CURRENT and have some severe > trouble. > > We have a single ZFS pool (raidz), call it pool00 and this pool00 conatins > a > ZFS dataset pool00/poudriere which we want to exclusively attach to a jail. > pool00/poudriere contains a complete clone of a former, now decomissioned > machine and is usable by the host bearing the jails. The jail, named > poudriere, > has these config parameters set in /etc/jail.conf as recommended: > > enforce_statfs= "0"; > > allow.raw_sockets= "1"; > > allow.mount= "1"; > allow.mount.zfs= "1"; > allow.mount.devfs= "1"; > allow.mount.fdescfs= "1"; > allow.mount.procfs= "1"; > allow.mount.nullfs= "1"; > allow.mount.fusefs= "1"; > > Here I find the first confusing observation. I can't interact with the > dataset > and its content within the jail. I've set the "jailed" property of > pool00/poudriere via "zfs set jailed=on pool00/poudriere" and I also have > to > attach the jailed dataset manually via "zfs jail poudriere > pool00/poudriere" to > the (running) jail. But within the jail, listing ZFS's mountpoints reveal: > > NAME USED AVAIL REFER MOUNTPOINT > pool00 124G 8.62T 34.9K /pool00 > pool00/poudriere 34.9K 8.62T 34.9K /pool/poudriere > > but nothing below /pool/poudriere is visible to the jail. Being confused I > tried to check the appropriate security variables and found a set of sysctl > OIDs, which seem to have no documentation entry, like > > security.jail.param.allow.mount.zfs: 0 > and a counterpart > security.jail.mount_zfs_allowed: 1 > > Checking the description of security.jail.mount_zfs_allowed tells me that > this > OID is deprecated: > > security.jail.mount_zfs_allowed: Jail may mount the zfs file system > (deprecated) > > So, we tried to set > > param.allow.mount.zfs=1 > > via /etc/jail.conf for the propper jail, but this results in an error. I > can't > find anything in jail(8) about these new ".param." OIDs, so maybe my > trouble is > rooting in here. > > Is there a howto for the novices on howto setup a jail with ZFS > capabilities > needed for poudriere with ZFS? > > Thank you in advance, > > oh > > > _______________________________________________ > freebsd-current@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-current > To unsubscribe, send any mail to "freebsd-current-unsubscribe@freebsd.org" > From owner-freebsd-current@freebsd.org Tue Aug 27 22:03:44 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 79135C9119 for ; Tue, 27 Aug 2019 22:03:44 +0000 (UTC) (envelope-from zeising@freebsd.org) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 46J2vN2f8yz4Pc6 for ; Tue, 27 Aug 2019 22:03:44 +0000 (UTC) (envelope-from zeising@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 5AB69C9118; Tue, 27 Aug 2019 22:03:44 +0000 (UTC) Delivered-To: current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 5A81EC9117 for ; Tue, 27 Aug 2019 22:03:44 +0000 (UTC) (envelope-from zeising@freebsd.org) Received: from mail.daemonic.se (mail.daemonic.se [IPv6:2607:f740:d:20::25]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 46J2vN0CWvz4Pc5; Tue, 27 Aug 2019 22:03:43 +0000 (UTC) (envelope-from zeising@freebsd.org) Received: from cid.daemonic.se (localhost [IPv6:::1]) by mail.daemonic.se (Postfix) with ESMTP id 46J2v96M5Gz3l68; Tue, 27 Aug 2019 22:03:33 +0000 (UTC) X-Virus-Scanned: amavisd-new at daemonic.se Received: from mail.daemonic.se ([127.0.0.1]) (using TLS with cipher ECDHE-RSA-AES128-GCM-SHA256) by cid.daemonic.se (mailscanner.daemonic.se [127.0.0.1]) (amavisd-new, port 10587) with ESMTPS id Bhn0IHNqIF40; Tue, 27 Aug 2019 22:03:33 +0000 (UTC) Received: from vivi.daemonic.se (vivi.daemonic.se [IPv6:2001:470:dca9:2::4]) by mail.daemonic.se (Postfix) with ESMTPSA id 46J2v92vSyz3c7W; Tue, 27 Aug 2019 22:03:33 +0000 (UTC) To: mav@FreeBSD.org Cc: current@FreeBSD.org From: Niclas Zeising Subject: ses no longer attaches Message-ID: <90483961-9da2-fba1-21da-c38b28e99e06@freebsd.org> Date: Wed, 28 Aug 2019 00:03:25 +0200 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:68.0) Gecko/20100101 Thunderbird/68.0 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: 46J2vN0CWvz4Pc5 X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; none X-Spamd-Result: default: False [-2.96 / 15.00]; local_wl_from(0.00)[freebsd.org]; NEURAL_HAM_MEDIUM(-1.00)[-0.999,0]; NEURAL_HAM_SHORT(-0.96)[-0.964,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; ASN(0.00)[asn:36236, ipnet:2607:f740:d::/48, country:US] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 27 Aug 2019 22:03:44 -0000 Hi! I have an issue where the ses driver no longer attaches. Last known good version was r351188, r351544 is broken. In that interval, something happened. I haven't had time to bisect yet. Thanks! Regards -- Niclas Zeising From owner-freebsd-current@freebsd.org Tue Aug 27 22:38:24 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 34349CA109 for ; Tue, 27 Aug 2019 22:38:24 +0000 (UTC) (envelope-from mavbsd@gmail.com) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 46J3gM5y83z4Rjb for ; Tue, 27 Aug 2019 22:38:23 +0000 (UTC) (envelope-from mavbsd@gmail.com) Received: by mailman.nyi.freebsd.org (Postfix) id CC466CA108; Tue, 27 Aug 2019 22:38:23 +0000 (UTC) Delivered-To: current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id CC078CA107 for ; Tue, 27 Aug 2019 22:38:23 +0000 (UTC) (envelope-from mavbsd@gmail.com) Received: from mail-oi1-x230.google.com (mail-oi1-x230.google.com [IPv6:2607:f8b0:4864:20::230]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46J3gL3zxLz4RjZ; Tue, 27 Aug 2019 22:38:22 +0000 (UTC) (envelope-from mavbsd@gmail.com) Received: by mail-oi1-x230.google.com with SMTP id v12so533039oic.12; Tue, 27 Aug 2019 15:38:22 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:subject:to:cc:references:from:autocrypt:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=xkz85oIsIlRfdfy3zLeijItflkKDCRnoB/LbZUbZnVU=; b=UeETzmI9D37MXH9kS+MUY8gSseotl21ZA/mgqNPR5qXyBTH/ADPHrySGI5FifAzWRw 7+123UvVcs9AidJ11IuvGDf0BjSdl3GOQMtGRffwKzO62rPi4HsR70QODcbLVpMWwj4n QpdIxpfcDg/85cLsBku9D5XmNGHY4Mms1S8rOBQMGKpplmccltQwMGy6QsAJnEanGE+a OcVxE3u6GCb7+LDKMq3H72h9Sa9/K1dp5vw///lHYgM977bs7TvNF14Qt5WnSHNhn3Jp sSfZfbq9J95e1Ou5SLOkRHBzg50ScLiP3bQSU8X/U5eEotTruDzqCeDwwSahTIDZ6Dxu SmNw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:subject:to:cc:references:from:autocrypt :message-id:date:user-agent:mime-version:in-reply-to :content-language:content-transfer-encoding; bh=xkz85oIsIlRfdfy3zLeijItflkKDCRnoB/LbZUbZnVU=; b=reCUi3ZiYdbBUKUZRoSgNWA0oiDqJNhxckyx3QDkh/hGG3MEI6LRcay3KnW/QoKnaj ZoYtvwhPk1wOsXGB0X6N0uJGidFvK6VFRMOTWKmAgBbObwyVtwGMeIcFRkrt4EU2ZVQc 43w4qgJvWPqGWErCqmsRBDktYw+54prpPfnZT97FeBICtAYiUAXG/swCifNGBT9a/1Rc 5+rECQScflUviCrAwHLmQN/14jbHM1NYy66JsF2ZUmVb7Bkx5/54ruO1JIg0kzaQ9Ryd RvZOFkOMBNL5b+an3SKAauowve3GDwQ6r0Notla7R12NV4WElThiGFh48iuDL9LZPSnm ZlIQ== X-Gm-Message-State: APjAAAWCoioeA27OgXxPQCQd/2y3FKgZNoo21gapWrkqQZipL52gG9qO XBHMZ6lOUrOQhzUxO34Ctnne8Ec4KA0= X-Google-Smtp-Source: APXvYqzlPZI/SFc4mkx4+RMYyKGrHeC8/2D+3M3JV1zQnmGOXYVvEt8SlXot0WJNcmKIWsEZdi+oYg== X-Received: by 2002:aca:fd92:: with SMTP id b140mr682175oii.79.1566945500686; Tue, 27 Aug 2019 15:38:20 -0700 (PDT) Received: from spectre.mavhome.dp.ua ([2600:1700:3580:3560:228:f8ff:fe04:d12]) by smtp.gmail.com with ESMTPSA id 63sm275077otr.75.2019.08.27.15.38.20 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 27 Aug 2019 15:38:20 -0700 (PDT) Sender: Alexander Motin Subject: Re: ses no longer attaches To: Niclas Zeising Cc: current@FreeBSD.org References: <90483961-9da2-fba1-21da-c38b28e99e06@freebsd.org> From: Alexander Motin Autocrypt: addr=mav@FreeBSD.org; prefer-encrypt=mutual; keydata= mQENBFOzxAwBCADkPrax0pI2W/ig0CK9nRJJwsHitAGEZ2HZiFEuti+6/4UVxj81yr4ak/4g 9bKUyC7rMEAp/ZHNhd+MFCPAAcHPvtovnfykqE/vuosCS3wlSLloix2iKVLks0CwbLHGAyne 46lTQW74Xl/33c3W1Z6d8jD9gVFT/xaVzZ0U9xdzOmsYAZaAj4ki0tuxO9F7L+ct9grRe7iP g8t9hai7BL4ee3VRwk2JXnKb7UvBiVITKYWKz1jRvZIrjPokgEcCLOSlv7x/1kjuFnj3xWZU 7HSFFT8J93epBbrSSCsYsppIk2fZH41kaaFXsMQfTPH8wkeM6qwrvOh4HiQM08R+9tThABEB AAG0IUFsZXhhbmRlciBNb3RpbiA8bWF2QEZyZWVCU0Qub3JnPokBVwQTAQoAQQIbAwULCQgH AwUVCgkICwUWAwIBAAIeAQIXgAIZARYhBOmM88TmnMPNDledVYMYw5VbqyJ/BQJZYMKuBQkN McyiAAoJEIMYw5VbqyJ/tuUIAOG3ONOSNYqjK4eTZ1TVh9jdUBAhWk5nhDFnODN49Wj0AbYm 7aIqy8O1hnCDSZG5LttjSAo3UfXJZDKQM0BLb0gpRMBnAYqO6tdolLNqAbPGJBnGoPjsh24y 6KcbDaNnis+lD4GwPXwQM+92wZGhCUFElPV9NciZGVS65TNIgk7X+yEjjhD1MSWKKijZ1r9Z zIt4OzUTxxNOvzdlABZS88nNRdJkatOQJPmFdd1mpP6UzTNCiLUo1pIqOEtJgvVVDYq5WHY6 tciWWYdmZG/tIBexJmv2mV2OLVjXR6ZeKmntVH14H72/wRHJuYHQC+r5SVRcWWayrThsY6jZ Yr4+raS5AQ0EU7PEDAEIAOZgWf2cJIu+58IzP2dkXE/urj3tr4OqrB/yHGWUf71Lz6D0Fi6Z AXgDtmcFLGPfMyWuLAvSM+xmoguk7zC4hRBYvQycmIhuqBq1jO1Wp/Z+lpoPM/1cDYLn8Flv mI/c40MhUZh345DA4jYWWaZNjQHUWVQ1fPf595vdVVMPT/abE8E5DaF6fSkRmqFTmfYRkfbt 3ytU8NdUapDcJVY7cEP2nJBVNZPnOIObR/ZIgSxjjrG5o34yXoqeup8JvwEv+/NylzzuyXEZ R1EdEIzQ/a1nh/0j4NXtzZEqKW4aTWlmSqb6wN8jh1OSOOqkYsfnE3nfxcZbxi4IRoNQYlm5 9R8AEQEAAYkBPAQYAQoAJgIbDBYhBOmM88TmnMPNDledVYMYw5VbqyJ/BQJZYMLYBQkNMczM AAoJEIMYw5VbqyJ/TqgH/RQHClkvecE0262lwKoP/m0Mh4I5TLRgoJJn8S7G1BnqohYJkiLq A6xe6urGD7OqdNAl12UbrjWbdJV+zvea3vJoM4MZuYiYrGaXWxzFXqWJcPwMU9sAh8MRghHu uC5vgPb45Tnftw9/+n0i8GfVhQhOqepUGdQg4NPcXviSkoAvig6pp9Lcxisn0groUQKt15Gc sS9YcQWg3j9Hnipc6Mu416HX98Fb113NHJqc2geTHLkRyuBFOoyIqB6N9GKjzOAIzxxsVdl9 TevwGsrp4M4/RFzWbSgsbOnbE7454lmuVZGfReEjnUm8RHp9Q2UWKXlp3exlZjvOp/uVEpCg lz65AQ0EU7PEDAEIAOZgWf2cJIu+58IzP2dkXE/urj3tr4OqrB/yHGWUf71Lz6D0Fi6ZAXgD tmcFLGPfMyWuLAvSM+xmoguk7zC4hRBYvQycmIhuqBq1jO1Wp/Z+lpoPM/1cDYLn8FlvmI/c 40MhUZh345DA4jYWWaZNjQHUWVQ1fPf595vdVVMPT/abE8E5DaF6fSkRmqFTmfYRkfbt3ytU 8NdUapDcJVY7cEP2nJBVNZPnOIObR/ZIgSxjjrG5o34yXoqeup8JvwEv+/NylzzuyXEZR1Ed EIzQ/a1nh/0j4NXtzZEqKW4aTWlmSqb6wN8jh1OSOOqkYsfnE3nfxcZbxi4IRoNQYlm59R8A EQEAAYkBPAQYAQoAJgIbDBYhBOmM88TmnMPNDledVYMYw5VbqyJ/BQJZYMLYBQkNMczMAAoJ EIMYw5VbqyJ/TqgH/RQHClkvecE0262lwKoP/m0Mh4I5TLRgoJJn8S7G1BnqohYJkiLqA6xe 6urGD7OqdNAl12UbrjWbdJV+zvea3vJoM4MZuYiYrGaXWxzFXqWJcPwMU9sAh8MRghHuuC5v gPb45Tnftw9/+n0i8GfVhQhOqepUGdQg4NPcXviSkoAvig6pp9Lcxisn0groUQKt15GcsS9Y cQWg3j9Hnipc6Mu416HX98Fb113NHJqc2geTHLkRyuBFOoyIqB6N9GKjzOAIzxxsVdl9Tevw Gsrp4M4/RFzWbSgsbOnbE7454lmuVZGfReEjnUm8RHp9Q2UWKXlp3exlZjvOp/uVEpCglz4= Message-ID: Date: Tue, 27 Aug 2019 18:38:19 -0400 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:68.0) Gecko/20100101 Thunderbird/68.0 MIME-Version: 1.0 In-Reply-To: <90483961-9da2-fba1-21da-c38b28e99e06@freebsd.org> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: 46J3gL3zxLz4RjZ X-Spamd-Bar: ----- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=UeETzmI9; dmarc=none; spf=pass (mx1.freebsd.org: domain of mavbsd@gmail.com designates 2607:f8b0:4864:20::230 as permitted sender) smtp.mailfrom=mavbsd@gmail.com X-Spamd-Result: default: False [-5.87 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; RCVD_TLS_ALL(0.00)[]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[FreeBSD.org]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; RCVD_COUNT_THREE(0.00)[3]; IP_SCORE(-2.68)[ip: (-8.15), ipnet: 2607:f8b0::/32(-2.86), asn: 15169(-2.33), country: US(-0.05)]; DKIM_TRACE(0.00)[gmail.com:+]; RCPT_COUNT_TWO(0.00)[2]; RCVD_IN_DNSWL_NONE(0.00)[0.3.2.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; NEURAL_HAM_SHORT(-0.99)[-0.989,0]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; FORGED_SENDER(0.30)[mav@FreeBSD.org,mavbsd@gmail.com]; MIME_TRACE(0.00)[0:+]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; FROM_NEQ_ENVFROM(0.00)[mav@FreeBSD.org,mavbsd@gmail.com]; MID_RHS_MATCH_FROM(0.00)[] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 27 Aug 2019 22:38:24 -0000 Hi. On 27.08.2019 18:03, Niclas Zeising wrote: > I have an issue where the ses driver no longer attaches.  Last known > good version was r351188, r351544 is broken.  In that interval, > something happened.  I haven't had time to bisect yet. I would appreciate some details, like dmesg, error messages, etc. On my test systems I see no problems. -- Alexander Motin From owner-freebsd-current@freebsd.org Tue Aug 27 23:15:13 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 16047CAA21 for ; Tue, 27 Aug 2019 23:15:13 +0000 (UTC) (envelope-from zeising@freebsd.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 46J4Tr6vX0z4T5F for ; Tue, 27 Aug 2019 23:15:12 +0000 (UTC) (envelope-from zeising@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id EAD67CAA20; Tue, 27 Aug 2019 23:15:12 +0000 (UTC) Delivered-To: current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id E9857CAA1F for ; Tue, 27 Aug 2019 23:15:12 +0000 (UTC) (envelope-from zeising@freebsd.org) Received: from mail.daemonic.se (mail.daemonic.se [176.58.89.161]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 46J4Tr5cyYz4T5D; Tue, 27 Aug 2019 23:15:12 +0000 (UTC) (envelope-from zeising@freebsd.org) Received: from cid.daemonic.se (localhost [IPv6:::1]) by mail.daemonic.se (Postfix) with ESMTP id 46J4Tq4bqrz3l68; Tue, 27 Aug 2019 23:15:11 +0000 (UTC) X-Virus-Scanned: amavisd-new at daemonic.se Received: from mail.daemonic.se ([127.0.0.1]) (using TLS with cipher ECDHE-RSA-AES128-GCM-SHA256) by cid.daemonic.se (mailscanner.daemonic.se [127.0.0.1]) (amavisd-new, port 10587) with ESMTPS id R5ojqTC--zmp; Tue, 27 Aug 2019 23:15:11 +0000 (UTC) Received: from vivi.daemonic.se (vivi.daemonic.se [IPv6:2001:470:dca9:2::4]) by mail.daemonic.se (Postfix) with ESMTPSA id 46J4Tq0sGcz3c7W; Tue, 27 Aug 2019 23:15:11 +0000 (UTC) Subject: Re: ses no longer attaches To: Alexander Motin , imp@FreeBSD.org Cc: current@FreeBSD.org References: <90483961-9da2-fba1-21da-c38b28e99e06@freebsd.org> From: Niclas Zeising Message-ID: <41c91917-13c2-f3a7-d8fd-6464c2ce3c6d@freebsd.org> Date: Wed, 28 Aug 2019 01:15:10 +0200 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:68.0) Gecko/20100101 Thunderbird/68.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: quoted-printable X-Rspamd-Queue-Id: 46J4Tr5cyYz4T5D X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; none X-Spamd-Result: default: False [-2.95 / 15.00]; local_wl_from(0.00)[freebsd.org]; NEURAL_HAM_MEDIUM(-1.00)[-0.999,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.95)[-0.954,0]; ASN(0.00)[asn:36236, ipnet:176.58.89.0/24, country:US] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 27 Aug 2019 23:15:13 -0000 On 2019-08-28 00:38, Alexander Motin wrote: > Hi. >=20 > On 27.08.2019 18:03, Niclas Zeising wrote: >> I have an issue where the ses driver no longer attaches.=C2=A0 Last kn= own >> good version was r351188, r351544 is broken.=C2=A0 In that interval, >> something happened.=C2=A0 I haven't had time to bisect yet. >=20 > I would appreciate some details, like dmesg, error messages, etc. On m= y > test systems I see no problems. >=20 Hi! I did some more digging. r351355 is ok, while r351356 is bad. This is=20 Warner's (CC:d) commit to add RST support to nvme, however, I'm using a=20 ssd drive connected to ahci. What happens is that the ses driver doesn't attach to the AHCI SGPIO=20 enclosure. This is on a laptop with an ssd (not an nvme) drive. I have=20 the same issue on another computer as well. On the broken kernel,=20 sesutil status complains about "No SES devices found", on the working=20 kernel it reports "ok". Regards --=20 Niclas Zeising From owner-freebsd-current@freebsd.org Tue Aug 27 23:39:29 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 486EFCB063 for ; Tue, 27 Aug 2019 23:39:29 +0000 (UTC) (envelope-from mms.vanbreukelingen@gmail.com) Received: from mail-ua1-x942.google.com (mail-ua1-x942.google.com [IPv6:2607:f8b0:4864:20::942]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46J51q74vZz4TtP for ; Tue, 27 Aug 2019 23:39:27 +0000 (UTC) (envelope-from mms.vanbreukelingen@gmail.com) Received: by mail-ua1-x942.google.com with SMTP id r10so227297uam.1 for ; Tue, 27 Aug 2019 16:39:27 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=JmyyL2xcAlDgOca7DEAZzmS5XRcgCFn+juqg1+SWmpM=; b=iqv2ZSIPse/78jnRFG4Urlg5TW1NeUiL9n0xHYk1Vkh93lSphpwQuD4/0WHhtrTspK 5BspGMxtOHIOWkppzqzQE1Qtqs1GXC6NYdmGgugcub3cUnKKOSPFd5XC/6ALVFUvDX7F qj7uaJ9I2Rczf6/jUkByb6wOt2Vb3ea7+CebTWdCqkbwgPq9EWYVKS3WH5FIwAtNyv5v zjr+2tuAvyoeglH+IBKg45k4QRb6M5kHhZ4qGlejSF2MR86f4dtguCVChrBRgtirttta FRkdP6kgkqM6nqADl+7l2uNOBMbl6pfmfA/jjBzBqmUOdSoE4j2byQs04owiY3me0Fgb GtLg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=JmyyL2xcAlDgOca7DEAZzmS5XRcgCFn+juqg1+SWmpM=; b=JZbodn6frolYIA7USyOgRMgbxRT1Yk4lTuMtp/OLBI2ZClQzs0N0qNnT77BQHUMO6P CUVAlZfo8OtiLIYj6odTK5QaxZhiZdC9/igWxv8e1HorqAJmblW0I0B93P+bi2oiLmLP ov/Q6wuQSG7/nxj+NLTpDcGp7L4moijYglR8NhsrEGcqLMfhI5DYcsOOd9+JLdR0V/Ck TmozhhLAHir8RE3Anueo9DQcFQ0VL4SQUSkCmXDsF4GkO0zrLKRKK51YMfRSf2gxmTZ7 zr3vf41YlRl490nnlcczqGEmv6UEvVScGsjJ1vUjMY+cwIHvYWfRi8TFCMnaFtE2rtMg zo6A== X-Gm-Message-State: APjAAAXKKGH6g2BqHAfkdK/H+i9uTAf2T2zJKgqBWrzXY+DJE+kS+GIv oP6ZDJNn02yfs32Cr9+SJMuER2pOA4CJQWeYQLk707K11qc= X-Google-Smtp-Source: APXvYqxghkF9V9ft0kTQoIbO1RTPMHjphW/vJbwDio1GrsQwzuEMTj2hueLB3ZUBTx//3iumhNA4ZdUYUhy7VnpN6TY= X-Received: by 2002:ab0:911:: with SMTP id w17mr509119uag.20.1566949166760; Tue, 27 Aug 2019 16:39:26 -0700 (PDT) MIME-Version: 1.0 References: <47509401.1440476.1566796167857.ref@mail.yahoo.com> <47509401.1440476.1566796167857@mail.yahoo.com> <5aa8faeb-5e8e-38be-4301-81f3d82c494a@selasky.org> <00E772F0-7231-44C4-B314-26730CC7DF21@gmail.com> <20190827071052.GT71821@kib.kiev.ua> <233039408.1857163.1566892977201@mail.yahoo.com> In-Reply-To: From: Miranda Maria Sophie Van den Breukelingen Date: Wed, 28 Aug 2019 01:39:15 +0200 Message-ID: Subject: Re: Kernel-Crash when working with ubt0 To: Maksim Yevmenkin Cc: "kostikbel@gmail.com" , Warner Losh , Hans Petter Selasky , "freebsd-current@freebsd.org" X-Rspamd-Queue-Id: 46J51q74vZz4TtP X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=iqv2ZSIP; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of mmsvanbreukelingen@gmail.com designates 2607:f8b0:4864:20::942 as permitted sender) smtp.mailfrom=mmsvanbreukelingen@gmail.com X-Spamd-Result: default: False [-3.99 / 15.00]; TO_DN_EQ_ADDR_SOME(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; FREEMAIL_FROM(0.00)[gmail.com]; RCPT_COUNT_FIVE(0.00)[5]; DKIM_TRACE(0.00)[gmail.com:+]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; NEURAL_HAM_SHORT(-0.99)[-0.991,0]; FREEMAIL_TO(0.00)[gmail.com]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; TAGGED_FROM(0.00)[]; DWL_DNSWL_NONE(0.00)[gmail.com.dwl.dnswl.org : 127.0.5.0]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; FROM_HAS_DN(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; TAGGED_RCPT(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; IP_SCORE_FREEMAIL(0.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[2.4.9.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; IP_SCORE(0.00)[ip: (2.49), ipnet: 2607:f8b0::/32(-2.86), asn: 15169(-2.33), country: US(-0.05)]; FREEMAIL_CC(0.00)[gmail.com]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 27 Aug 2019 23:39:29 -0000 I recompiled the kernel with the patch enabled and now we get at 'service bluetooth start ubt0 (ubt1...)' : */etc/rc.d/bluetooth: ERROR: Unable to setup Bluetooth stack for device ubt0root@freeBSD13:/usr/home/miranda # service bluetooth start ubt1/etc/rc.d/bluetooth: ERROR: Unable to setup Bluetooth stack for device ubt1* Should I recompile with the MTX_SPIN=y option now? kldstat: Id Refs Address Size Name 1 82 0xffffffff80200000 232ad30 kernel 2 1 0xffffffff8252b000 96f98 linux64.ko 3 3 0xffffffff825c2000 b760 linux_common.ko 4 1 0xffffffff825ce000 b4be8 linux.ko 5 1 0xffffffff82683000 3170 splash_bmp.ko * 6 1 0xffffffff826a9000 18c28 ng_l2cap.ko* 7 4 0xffffffff826c2000 2dc0 ng_bluetooth.ko 8 6 0xffffffff826c5000 18d50 netgraph.ko 9 1 0xffffffff826df000 68840 if_em_updated.ko 10 1 0xffffffff82748000 a468 ng_ubt.ko 11 3 0xffffffff82753000 12d10 ng_hci.ko 12 1 0xffffffff82d18000 7b040 i915kms.ko 13 1 0xffffffff82d94000 3d9e8 drm2.ko 14 4 0xffffffff82dd2000 1f40 iicbus.ko 15 1 0xffffffff82dd4000 f70 iic.ko 16 1 0xffffffff82dd5000 1570 iicbb.ko 17 1 0xffffffff82dd7000 15720 if_iwm.ko 18 1 0xffffffff82ded000 e045f iwm3160fw.ko 19 1 0xffffffff82ece000 1840 uhid.ko 20 1 0xffffffff82ed0000 2928 ums.ko 21 1 0xffffffff82ed3000 4570 autofs.ko 22 1 0xffffffff82ed8000 19600 ng_btsocket.ko 23 1 0xffffffff82ef2000 acf mac_ntpd.ko 24 1 0xffffffff82ef3000 19728 ext2fs.ko 25 1 0xffffffff82f0d000 3a8c geom_linux_lvm.ko 6 has to be started via /boot/loader.conf - I can't insert a driver into the kernel at all: kldload; pE: can't load wlan_xauth.ko: Operation not permitted (as root, probably some subroutine in permanent use? Is it a toggle at the startup services?) but it was good compilation training, svn up had some changes in the main files, so it was not a mistake upgrading to r351552M now. Fixed my Plasma5 and I added Enlightment as a DM. For my grafic card there's the drm-legacy-kmod-driver the best and this works, too now - but compositor's still on XRender as the most common problem is to loose the insights of the windows after some minutes with OpenGL (2 and 3.1). Any ideas except /dev/null the whole stuff from the beginnning on? btw, 'pkg: gstreamer1-plugins-lame has a missing dependency: lame' ... does this happen to everyone when using pkg install ? there's no dependency lame and lame means something like 'like a horse that's gone lame.' but freeBSD isn't, just read UPDATING! Gonna build some old darwin kernel now, the influence of BSD is magnificant in comparison to the mach-part - but that's another chapter. tomorrow, Miranda On Tue, 27 Aug 2019 at 15:03, Maksim Yevmenkin wrote: > > > Hmm... interesting.... > > > > > > I only took a brief look at it. I suppose I can ensure user space > address is wired and then copyout() can be called with mutex held > > > > >No, you cannot do this, at least without making the kernel to panic. > > User might unmap the wired mapping at any time still. > > Kostik, > > i was thinking along the lines of vslock/vsunlock and copyout_nofault. > basically similar to the sysctl code. do you think this would not > work? > > thanks, > max > From owner-freebsd-current@freebsd.org Tue Aug 27 23:42:08 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 53D5FCB391 for ; Tue, 27 Aug 2019 23:42:08 +0000 (UTC) (envelope-from imb@protected-networks.net) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 46J54w0YTwz4VGB for ; Tue, 27 Aug 2019 23:42:08 +0000 (UTC) (envelope-from imb@protected-networks.net) Received: by mailman.nyi.freebsd.org (Postfix) id 13001CB390; Tue, 27 Aug 2019 23:42:08 +0000 (UTC) Delivered-To: current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 12C70CB38E for ; Tue, 27 Aug 2019 23:42:08 +0000 (UTC) (envelope-from imb@protected-networks.net) Received: from mail.protected-networks.net (mail.protected-networks.net [202.12.127.228]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "mail.protected-networks.net", Issuer "Protected Networks CA" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 46J54v0Zmjz4VG7; Tue, 27 Aug 2019 23:42:06 +0000 (UTC) (envelope-from imb@protected-networks.net) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d= protected-networks.net; h=content-transfer-encoding :content-language:content-type:content-type:in-reply-to :mime-version:user-agent:date:date:message-id:from:from :references:subject:subject; s=201508; t=1566949317; bh=eUV6gb4I 8cHCXfCNX/jfbYrRC1LAsLaTOya8YfTV8hw=; b=iAw+KEmHFJKLVamMS08NB7IY gS/QcjC67Q67KOKgnpb8CaV8EtOJrG+nxP5J7oAOxSJX0+YKiPqG0zKhqDxnAhIw 1MJxtj5kkPu1Vosey9ejSw8jkBGo5SzskTOBPgv5nS1MkxpVQokmBWRcp6H3ya2k LP5Dx37wBDnBCfUV0GU= Received: from toshi.auburn.protected-networks.net (toshi.auburn.protected-networks.net [192.168.1.10]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (Client did not present a certificate) (Authenticated sender: imb@mail.protected-networks.net) by mail.protected-networks.net (Postfix) with ESMTPSA id CB83027B60; Tue, 27 Aug 2019 19:41:57 -0400 (EDT) Subject: Re: ses no longer attaches To: Niclas Zeising , imp@FreeBSD.org Cc: current@FreeBSD.org References: <90483961-9da2-fba1-21da-c38b28e99e06@freebsd.org> <41c91917-13c2-f3a7-d8fd-6464c2ce3c6d@freebsd.org> From: Michael Butler Message-ID: <3d769833-8e94-8922-2d95-16d25407f38c@protected-networks.net> Date: Tue, 27 Aug 2019 19:41:57 -0400 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:68.0) Gecko/20100101 Thunderbird/68.0 MIME-Version: 1.0 In-Reply-To: <41c91917-13c2-f3a7-d8fd-6464c2ce3c6d@freebsd.org> Content-Type: text/plain; charset=windows-1252 Content-Language: en-NZ Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: 46J54v0Zmjz4VG7 X-Spamd-Bar: ------- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=protected-networks.net header.s=201508 header.b=iAw+KEmH; dmarc=none; spf=pass (mx1.freebsd.org: domain of imb@protected-networks.net designates 202.12.127.228 as permitted sender) smtp.mailfrom=imb@protected-networks.net X-Spamd-Result: default: False [-7.18 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_DKIM_ALLOW(-0.20)[protected-networks.net:s=201508]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; R_SPF_ALLOW(-0.20)[+mx:c]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[protected-networks.net]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; TO_DN_SOME(0.00)[]; DKIM_TRACE(0.00)[protected-networks.net:+]; NEURAL_HAM_SHORT(-0.96)[-0.958,0]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; IP_SCORE(-3.72)[ip: (-9.79), ipnet: 202.12.127.0/24(-4.89), asn: 5716(-3.87), country: US(-0.05)]; ASN(0.00)[asn:5716, ipnet:202.12.127.0/24, country:US]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_TLS_ALL(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 27 Aug 2019 23:42:08 -0000 On 2019-08-27 19:15, Niclas Zeising wrote: > On 2019-08-28 00:38, Alexander Motin wrote: >> Hi. >> >> On 27.08.2019 18:03, Niclas Zeising wrote: >>> I have an issue where the ses driver no longer attaches.  Last known >>> good version was r351188, r351544 is broken.  In that interval, >>> something happened.  I haven't had time to bisect yet. >> >> I would appreciate some details, like dmesg, error messages, etc.  On my >> test systems I see no problems. >> > > Hi! > I did some more digging. r351355 is ok, while r351356 is bad.  This is > Warner's (CC:d) commit to add RST support to nvme, however, I'm using a > ssd drive connected to ahci. > > What happens is that the ses driver doesn't attach to the AHCI SGPIO > enclosure.  This is on a laptop with an ssd (not an nvme) drive.  I have > the same issue on another computer as well.  On the broken kernel, > sesutil status complains about "No SES devices found", on the working > kernel it reports "ok". I can confirm this behaviour (haven't checked versioning) .. working kernel yields .. Aug 20 17:40:06 toshi kernel: ses0 at ahciem0 bus 0 scbus4 target 0 lun 0 Aug 20 17:40:06 toshi kernel: ses0: SEMB S-E-S 2.00 device Aug 20 17:40:06 toshi kernel: ses0: SEMB SES Device Aug 20 17:40:06 toshi kernel: ses0: ada0,pass0 in 'Slot 00', SATA Slot: scbus0 target 0 Aug 20 17:40:06 toshi kernel: ses0: ada1,pass1 in 'Slot 01', SATA Slot: scbus1 target 0 [ .. other stuff .. ] Aug 20 17:40:06 toshi kernel: ses0 at ahciem0 bus 0 scbus4 target 0 lun 0 Aug 20 17:40:06 toshi kernel: ses0: SEMB S-E-S 2.00 device Aug 20 17:40:06 toshi kernel: ses0: SEMB SES Device Aug 20 17:40:06 toshi kernel: ses0: ada0,pass0 in 'Slot 00', SATA Slot: scbus0 target 0 Aug 20 17:40:06 toshi kernel: ses0: ada1,pass1 in 'Slot 01', SATA Slot: scbus1 target 0 .. non working reports .. Aug 27 11:06:28 toshi kernel: ahciem0: at channel 2147483647 on ahci0 Aug 27 11:06:28 toshi kernel: device_attach: ahciem0 attach returned 6 imb From owner-freebsd-current@freebsd.org Tue Aug 27 23:45:15 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id B2118CB4E4 for ; Tue, 27 Aug 2019 23:45:15 +0000 (UTC) (envelope-from imb@protected-networks.net) Received: from mail.protected-networks.net (mail.protected-networks.net [202.12.127.228]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "mail.protected-networks.net", Issuer "Protected Networks CA" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 46J58W0DhYz4VRL for ; Tue, 27 Aug 2019 23:45:14 +0000 (UTC) (envelope-from imb@protected-networks.net) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d= protected-networks.net; h=content-transfer-encoding :content-language:content-type:content-type:in-reply-to :mime-version:user-agent:date:date:message-id:from:from :references:subject:subject; s=201508; t=1566949512; bh=qGVqCkvn xvO8DbKM5mMIRQ1Oz/LraipDqC6NOZ9Nay0=; b=j6tSVz6AVNs4WaxR+NvDuP8S QE57tpJhBjbPnMXWzI6/ZelvfLs4NS/RWQCbNT7HshZPopBHqOiAWS3Rv+RKOYhf Z7H2qZkfY0JVY0Z0OVgTFfGuTlofvBuisD+Dog8qHhKHDoN4IaBx6FG/FAXZuyOt QTFfiGiy6FFbUfKyMGw= Received: from toshi.auburn.protected-networks.net (toshi.auburn.protected-networks.net [192.168.1.10]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (Client did not present a certificate) (Authenticated sender: imb@mail.protected-networks.net) by mail.protected-networks.net (Postfix) with ESMTPSA id E081228028 for ; Tue, 27 Aug 2019 19:45:12 -0400 (EDT) Subject: Re: ses no longer attaches To: freebsd-current@freebsd.org References: <90483961-9da2-fba1-21da-c38b28e99e06@freebsd.org> <41c91917-13c2-f3a7-d8fd-6464c2ce3c6d@freebsd.org> <3d769833-8e94-8922-2d95-16d25407f38c@protected-networks.net> From: Michael Butler Message-ID: <6940ee11-bb2c-eb19-e85f-6ba39536c1e2@protected-networks.net> Date: Tue, 27 Aug 2019 19:45:12 -0400 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:68.0) Gecko/20100101 Thunderbird/68.0 MIME-Version: 1.0 In-Reply-To: <3d769833-8e94-8922-2d95-16d25407f38c@protected-networks.net> Content-Type: text/plain; charset=windows-1252 Content-Language: en-NZ Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: 46J58W0DhYz4VRL X-Spamd-Bar: ------- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=protected-networks.net header.s=201508 header.b=j6tSVz6A; dmarc=none; spf=pass (mx1.freebsd.org: domain of imb@protected-networks.net designates 202.12.127.228 as permitted sender) smtp.mailfrom=imb@protected-networks.net X-Spamd-Result: default: False [-7.21 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_DKIM_ALLOW(-0.20)[protected-networks.net:s=201508]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+mx:c]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; TO_DN_NONE(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; DMARC_NA(0.00)[protected-networks.net]; DKIM_TRACE(0.00)[protected-networks.net:+]; NEURAL_HAM_SHORT(-0.99)[-0.985,0]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; IP_SCORE(-3.72)[ip: (-9.79), ipnet: 202.12.127.0/24(-4.89), asn: 5716(-3.87), country: US(-0.05)]; ASN(0.00)[asn:5716, ipnet:202.12.127.0/24, country:US]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_TLS_ALL(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 27 Aug 2019 23:45:15 -0000 On 2019-08-27 19:41, Michael Butler wrote: > On 2019-08-27 19:15, Niclas Zeising wrote: >> On 2019-08-28 00:38, Alexander Motin wrote: >>> Hi. >>> >>> On 27.08.2019 18:03, Niclas Zeising wrote: >>>> I have an issue where the ses driver no longer attaches.  Last known >>>> good version was r351188, r351544 is broken.  In that interval, >>>> something happened.  I haven't had time to bisect yet. >>> >>> I would appreciate some details, like dmesg, error messages, etc.  On my >>> test systems I see no problems. >>> >> >> Hi! >> I did some more digging. r351355 is ok, while r351356 is bad.  This is >> Warner's (CC:d) commit to add RST support to nvme, however, I'm using a >> ssd drive connected to ahci. >> >> What happens is that the ses driver doesn't attach to the AHCI SGPIO >> enclosure.  This is on a laptop with an ssd (not an nvme) drive.  I have >> the same issue on another computer as well.  On the broken kernel, >> sesutil status complains about "No SES devices found", on the working >> kernel it reports "ok". > > I can confirm this behaviour (haven't checked versioning) .. working > kernel yields .. > > Aug 20 17:40:06 toshi kernel: ses0 at ahciem0 bus 0 scbus4 target 0 lun 0 > Aug 20 17:40:06 toshi kernel: ses0: > SEMB S-E-S 2.00 device > Aug 20 17:40:06 toshi kernel: ses0: SEMB SES Device > Aug 20 17:40:06 toshi kernel: ses0: ada0,pass0 in 'Slot 00', SATA Slot: > scbus0 target 0 > Aug 20 17:40:06 toshi kernel: ses0: ada1,pass1 in 'Slot 01', SATA Slot: > scbus1 target 0 Should have been .. Aug 20 17:40:06 toshi kernel: ahci0: AHCI v1.30 with 6 6Gbps ports, Port Multiplier not supported Aug 20 17:40:06 toshi kernel: ahcich0: at channel 0 on ahci0 Aug 20 17:40:06 toshi kernel: ahcich1: at channel 1 on ahci0 Aug 20 17:40:06 toshi kernel: ahcich4: at channel 4 on ahci0 Aug 20 17:40:06 toshi kernel: ahcich5: at channel 5 on ahci0 Aug 20 17:40:06 toshi kernel: ahciem0: on ahci0 > > [ .. other stuff .. ] > > Aug 20 17:40:06 toshi kernel: ses0 at ahciem0 bus 0 scbus4 target 0 lun 0 > Aug 20 17:40:06 toshi kernel: ses0: > SEMB S-E-S 2.00 device > Aug 20 17:40:06 toshi kernel: ses0: SEMB SES Device > Aug 20 17:40:06 toshi kernel: ses0: ada0,pass0 in 'Slot 00', SATA Slot: > scbus0 target 0 > Aug 20 17:40:06 toshi kernel: ses0: ada1,pass1 in 'Slot 01', SATA Slot: > scbus1 target 0 > > .. non working reports .. > > Aug 27 11:06:28 toshi kernel: ahciem0: bridge> at channel 2147483647 on ahci0 > Aug 27 11:06:28 toshi kernel: device_attach: ahciem0 attach returned 6 > > imb > _______________________________________________ > freebsd-current@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-current > To unsubscribe, send any mail to "freebsd-current-unsubscribe@freebsd.org" > From owner-freebsd-current@freebsd.org Wed Aug 28 04:11:55 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 3328DD0068; Wed, 28 Aug 2019 04:11:55 +0000 (UTC) (envelope-from lwhsu@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2610:1c1:1:6074::16:84]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "freefall.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46JC4C0W15z3CZs; Wed, 28 Aug 2019 04:11:55 +0000 (UTC) (envelope-from lwhsu@freebsd.org) Received: by freefall.freebsd.org (Postfix, from userid 1129) id 006F419C63; Wed, 28 Aug 2019 04:11:54 +0000 (UTC) Date: Wed, 28 Aug 2019 04:11:54 +0000 From: Li-Wen Hsu To: freebsd-testing@freebsd.org Cc: freebsd-current@freebsd.org, freebsd-stable@freebsd.org Subject: FreeBSD CI Weekly Report 2019-08-25 Message-ID: <20190828041154.GA27858@freefall.freebsd.org> Reply-To: freebsd-testing@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.11.4 (2019-03-13) X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 28 Aug 2019 04:11:55 -0000 (Please send the followup to freebsd-testing@ and note Reply-To is set.) FreeBSD CI Weekly Report 2019-08-25 =================================== Here is a summary of the FreeBSD Continuous Integration results for the period from 2019-08-19 to 2019-08-25. During this period, we have: * 2262 builds (83% (-10.3) passed, 17% (+10.3) failed) were executed on aarch64, amd64, armv6, armv7, i386, mips, mips64, powerpc, powerpc64, powerpcspe, riscv64, sparc64 architectures for head, stable/12, stable/11 branches. * 403 test runs (45.2% (-18.1) passed, 48.8% (+14.1) unstable, 6% (+4) exception) were executed on amd64, i386, riscv64 architectures for head, stable/12, stable/11 branches. * 38 doc builds (100% (0) passed) Test case status (on 2019-08-25 23:59): | Branch/Architecture | Total | Pass | Fail | Skipped | | ------------------- | ---------- | ---------- | ------- | -------- | | head/amd64 | 7533 (+22) | 7463 (+17) | 0 (-2) | 70 (+7) | | head/i386 | 7531 (+22) | 7455 (+18) | 0 (-2) | 74 (+4) | | 12-STABLE/amd64 | 7392 (0) | 7345 (+4) | 0 (-2) | 47 (-2) | | 12-STABLE/i386 | 7390 (0) | 7336 (+4) | 0 (-2) | 54 (-2) | | 11-STABLE/amd64 | 6845 (0) | 6801 (+7) | 0 (0) | 44 (-7) | | 11-STABLE/i386 | 6843 (0) | 6763 (+7) | 34 (0) | 46 (-7) | (The statistics from experimental jobs are omitted) If any of the issues found by CI are in your area of interest or expertise please investigate the PRs listed below. The latest web version of this report is available at https://hackmd.io/s/HkcTCgnVB and archive is available at http://hackfoldr.org/freebsd-ci-report/, any help is welcome. ## News * [FCP 20190401-ci_policy: CI policy ](https://github.com/freebsd/fcp/blob/master/fcp-20190401-ci_policy.md) is in "feedback" state, please check and provide comments. * Per imp@ suggested [timeline of gcc 4.2.1 removal](https://lists.freebsd.org/pipermail/freebsd-arch/2019-August/019674.html): * -Werror has been turned off for gcc 4.2.1 in [r351429](https://svnweb.freebsd.org/changeset/base/351429) and [r351430](https://svnweb.freebsd.org/changeset/base/351430) * power*-build has been fixed in [r351485](https://svnweb.freebsd.org/changeset/base/351485) * amd64-gcc build still need fix, patch is being discussed in https://reviews.freebsd.org/D21418 * Some pf tests failing on i386 which may be related to bpf, need more help: * https://lists.freebsd.org/pipermail/freebsd-testing/2019-June/001933.html * https://lists.freebsd.org/pipermail/freebsd-testing/2019-June/001934.html ## Fixed Tests * https://ci.freebsd.org/job/FreeBSD-head-amd64-test/12237/ * https://ci.freebsd.org/job/FreeBSD-head-i386-test/6383/ * sys.acl.00.main * sys.acl.02.main Fixed by update package to perl5.30 * sys.netpfil.pf.forward.v4 * sys.netpfil.pf.icmp.cve_2019_5598 Due to [r351212](https://svnweb.freebsd.org/changeset/base/351212) changed options of ping6(8), fixed in [r351391](https://svnweb.freebsd.org/changeset/base/351391) ## Failing Tests * https://ci.freebsd.org/job/FreeBSD-stable-11-i386-test/ * local.kyua.* (31 cases) * local.lutok.* (3 cases) ## Failing and Flaky Tests (from experimental jobs) * https://ci.freebsd.org/job/FreeBSD-head-amd64-dtrace_test/ * Flakey test case: common.misc.t_dtrace_contrib.tst_dynopt_d https://bugs.freebsd.org/237641 * https://ci.freebsd.org/job/FreeBSD-head-amd64-test_zfs/ * There are ~60 failing cases, including flakey ones, see https://ci.freebsd.org/job/FreeBSD-head-amd64-test_zfs/lastCompletedBuild/testReport/ for more details ## Disabled Tests * lib.libc.sys.mmap_test.mmap_truncate_signal https://bugs.freebsd.org/211924 * sys.fs.tmpfs.mount_test.large https://bugs.freebsd.org/212862 * sys.fs.tmpfs.link_test.kqueue https://bugs.freebsd.org/213662 * sys.kqueue.libkqueue.kqueue_test.main https://bugs.freebsd.org/233586 * sys.kern.ptrace_test.ptrace__PT_KILL_competing_stop https://bugs.freebsd.org/220841 * usr.bin.procstat.procstat_test.command_loogle.com/ine_arguments https://bugs.freebsd.org/233587 * usr.bin.procstat.procstat_test.environment https://bugs.freebsd.org/233588 * lib.libc.regex.exhaust_test.regcomp_too_big (i386 only) https://bugs.freebsd.org/237450 * sys.netinet.socket_afinet.socket_afinet_bind_zero (new) https://bugs.freebsd.org/238781 * sys.netpfil.pf.names.names * sys.netpfil.pf.synproxy.synproxy https://bugs.freebsd.org/238870 * sys.kern.ptrace_test.ptrace__follow_fork_child_detached_unrelated_debugger https://bugs.freebsd.org/239292 * sys.netpfil.pf.forward.v4 (i386 only) * sys.netpfil.pf.forward.v6 (i386 only) * sys.netpfil.pf.set_tos.v4 (i386 only) https://bugs.freebsd.org/239380 * sys.kern.ptrace_test.ptrace__follow_fork_both_attached_unrelated_debugger https://bugs.freebsd.org/239397 * sys.kern.ptrace_test.ptrace__parent_sees_exit_after_child_debugger https://bugs.freebsd.org/239399 * sys.kern.ptrace_test.ptrace__follow_fork_parent_detached_unrelated_debugger https://bugs.freebsd.org/239425 * lib.libc.gen.getmntinfo_test.getmntinfo_test https://bugs.freebsd.org/240049 ## Issues ### New * Bug 240085 - Failing test: sys.netpfil.common.forward.pf_v4 on i386 * Bug 240086 - Failing test: sys.netpfil.common.tos.pf_tos on i386 ### Cause build fails * https://bugs.freebsd.org/233735 Possible build race: genoffset.o /usr/src/sys/sys/types.h: error: machine/endian.h: No such file or directory * https://bugs.freebsd.org/233769 Possible build race: ld: error: unable to find library -lgcc_s * https://bugs.freebsd.org/238828 Possible build race: lib/libsysdecode/tables.h:948: error: 'IPV6_MIN_MEMBERSHIPS' undeclared A fix is committed: https://svnweb.freebsd.org/changeset/base/351151 ### Cause kernel panics * https://bugs.freebsd.org/238870 sys.netpfil.pf.names.names and sys.netpfil.pf.synproxy.synproxy cause panic Patch exists: * https://reviews.freebsd.org/D20868 * https://reviews.freebsd.org/D20869 ### Open * https://bugs.freebsd.org/237403 Tests in sys/opencrypto should be converted to Python3 * https://bugs.freebsd.org/237641 Flakey test case: common.misc.t_dtrace_contrib.tst_dynopt_d * https://bugs.freebsd.org/237656 "Freed UMA keg (rtentry) was not empty (18 items). Lost 1 pages of memory." seen when running sys/netipsec tests * https://bugs.freebsd.org/237657 sys.kern.pdeathsig.signal_delivered_ptrace timing out periodically on i386 Fixed are committed: https://svnweb.freebsd.org/changeset/base/351210 https://svnweb.freebsd.org/changeset/base/351211 * https://bugs.freebsd.org/238781 sys.netinet.socket_afinet.socket_afinet_bind_zero does not work when mac_portacl(4) loaded * https://bugs.freebsd.org/239292 Flakey test case: sys.kern.ptrace_test.ptrace__follow_fork_child_detached_unrelated_debugger * https://bugs.freebsd.org/239380 sys.netpfil.pf.forward.{v4,v6} and sys.netpfil.pf.set_tos.v4 fail on i386 * https://bugs.freebsd.org/239397 Flakey test case: sys.kern.ptrace_test.ptrace__follow_fork_both_attached_unrelated_debugger * https://bugs.freebsd.org/239399 Flakey test case: sys.kern.ptrace_test.ptrace__parent_sees_exit_after_child_debugger * https://bugs.freebsd.org/239425 Flakey test case: sys.kern.ptrace_test.ptrace__follow_fork_parent_detached_unrelated_debugger ### Others * [Tickets related to testing@](https://preview.tinyurl.com/y9maauwg) From owner-freebsd-current@freebsd.org Wed Aug 28 08:07:29 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id EA1ACD5301 for ; Wed, 28 Aug 2019 08:07:29 +0000 (UTC) (envelope-from zeising@freebsd.org) Received: from mail.daemonic.se (mail.daemonic.se [IPv6:2607:f740:d:20::25]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 46JJJ147y0z3Pfy for ; Wed, 28 Aug 2019 08:07:29 +0000 (UTC) (envelope-from zeising@freebsd.org) Received: from cid.daemonic.se (localhost [IPv6:::1]) by mail.daemonic.se (Postfix) with ESMTP id 46JJHy1Y3cz3l68; Wed, 28 Aug 2019 08:07:26 +0000 (UTC) X-Virus-Scanned: amavisd-new at daemonic.se Received: from mail.daemonic.se ([127.0.0.1]) (using TLS with cipher ECDHE-RSA-AES128-GCM-SHA256) by cid.daemonic.se (mailscanner.daemonic.se [127.0.0.1]) (amavisd-new, port 10587) with ESMTPS id 0eavVTzjeUWz; Wed, 28 Aug 2019 08:07:25 +0000 (UTC) Received: from vivi.daemonic.se (vivi.daemonic.se [IPv6:2001:470:dca9:2::4]) by mail.daemonic.se (Postfix) with ESMTPSA id 46JJHx3hG7z3c7W; Wed, 28 Aug 2019 08:07:25 +0000 (UTC) Subject: Re: ses no longer attaches To: Michael Butler , freebsd-current@freebsd.org References: <90483961-9da2-fba1-21da-c38b28e99e06@freebsd.org> <41c91917-13c2-f3a7-d8fd-6464c2ce3c6d@freebsd.org> <3d769833-8e94-8922-2d95-16d25407f38c@protected-networks.net> <6940ee11-bb2c-eb19-e85f-6ba39536c1e2@protected-networks.net> From: Niclas Zeising Message-ID: Date: Wed, 28 Aug 2019 10:07:15 +0200 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:68.0) Gecko/20100101 Thunderbird/68.0 MIME-Version: 1.0 In-Reply-To: <6940ee11-bb2c-eb19-e85f-6ba39536c1e2@protected-networks.net> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Language: en-US Content-Transfer-Encoding: quoted-printable X-Rspamd-Queue-Id: 46JJJ147y0z3Pfy X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; none X-Spamd-Result: default: False [-2.98 / 15.00]; local_wl_from(0.00)[freebsd.org]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.98)[-0.983,0]; ASN(0.00)[asn:36236, ipnet:2607:f740:d::/48, country:US] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 28 Aug 2019 08:07:30 -0000 On 2019-08-28 01:45, Michael Butler wrote: > On 2019-08-27 19:41, Michael Butler wrote: >> On 2019-08-27 19:15, Niclas Zeising wrote: >>> On 2019-08-28 00:38, Alexander Motin wrote: >>>> Hi. >>>> >>>> On 27.08.2019 18:03, Niclas Zeising wrote: >>>>> I have an issue where the ses driver no longer attaches.=A0 Last kn= own >>>>> good version was r351188, r351544 is broken.=A0 In that interval, >>>>> something happened.=A0 I haven't had time to bisect yet. >>>> >>>> I would appreciate some details, like dmesg, error messages, etc.=A0= On my >>>> test systems I see no problems. >>>> >>> >>> Hi! >>> I did some more digging. r351355 is ok, while r351356 is bad.=A0 This= is >>> Warner's (CC:d) commit to add RST support to nvme, however, I'm using= a >>> ssd drive connected to ahci. >>> >>> What happens is that the ses driver doesn't attach to the AHCI SGPIO >>> enclosure.=A0 This is on a laptop with an ssd (not an nvme) drive.=A0= I have >>> the same issue on another computer as well.=A0 On the broken kernel, >>> sesutil status complains about "No SES devices found", on the working >>> kernel it reports "ok". >> >> I can confirm this behaviour (haven't checked versioning) .. working >> kernel yields .. >> >> Aug 20 17:40:06 toshi kernel: ses0 at ahciem0 bus 0 scbus4 target 0 lu= n 0 >> Aug 20 17:40:06 toshi kernel: ses0: >> SEMB S-E-S 2.00 device >> Aug 20 17:40:06 toshi kernel: ses0: SEMB SES Device >> Aug 20 17:40:06 toshi kernel: ses0: ada0,pass0 in 'Slot 00', SATA Slot= : >> scbus0 target 0 >> Aug 20 17:40:06 toshi kernel: ses0: ada1,pass1 in 'Slot 01', SATA Slot= : >> scbus1 target 0 >=20 > Should have been .. >=20 > Aug 20 17:40:06 toshi kernel: ahci0: AHCI v1.30 with 6 6Gbps ports, Por= t > Multiplier not supported > Aug 20 17:40:06 toshi kernel: ahcich0: at channel 0 on a= hci0 > Aug 20 17:40:06 toshi kernel: ahcich1: at channel 1 on a= hci0 > Aug 20 17:40:06 toshi kernel: ahcich4: at channel 4 on a= hci0 > Aug 20 17:40:06 toshi kernel: ahcich5: at channel 5 on a= hci0 > Aug 20 17:40:06 toshi kernel: ahciem0: bridge> on ahci0 >=20 >> >> [ .. other stuff .. ] >> >> Aug 20 17:40:06 toshi kernel: ses0 at ahciem0 bus 0 scbus4 target 0 lu= n 0 >> Aug 20 17:40:06 toshi kernel: ses0: >> SEMB S-E-S 2.00 device >> Aug 20 17:40:06 toshi kernel: ses0: SEMB SES Device >> Aug 20 17:40:06 toshi kernel: ses0: ada0,pass0 in 'Slot 00', SATA Slot= : >> scbus0 target 0 >> Aug 20 17:40:06 toshi kernel: ses0: ada1,pass1 in 'Slot 01', SATA Slot= : >> scbus1 target 0 >> >> .. non working reports .. >> >> Aug 27 11:06:28 toshi kernel: ahciem0: > bridge> at channel 2147483647 on ahci0 >> Aug 27 11:06:28 toshi kernel: device_attach: ahciem0 attach returned 6 >> Yeah, I'm seeing this also. Regards --=20 Niclas Zeising From owner-freebsd-current@freebsd.org Wed Aug 28 11:49:34 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 15D57D9F60 for ; Wed, 28 Aug 2019 11:49:34 +0000 (UTC) (envelope-from Alexander@leidinger.net) Received: from mailgate.Leidinger.net (mailgate.leidinger.net [IPv6:2a00:1828:2000:313::1:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 46JPDD6Vxfz46TZ for ; Wed, 28 Aug 2019 11:49:32 +0000 (UTC) (envelope-from Alexander@leidinger.net) Received: from outgoing.leidinger.net (p5B1657F2.dip0.t-ipconnect.de [91.22.87.242]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (Client did not present a certificate) by mailgate.Leidinger.net (Postfix) with ESMTPSA id EE03F14F0 for ; Wed, 28 Aug 2019 13:49:30 +0200 (CEST) Received: from webmail.leidinger.net (webmail.Leidinger.net [IPv6:fd73:10c7:2053:1::3:102]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (Client did not present a certificate) by outgoing.leidinger.net (Postfix) with ESMTPS id 82F90936D for ; Wed, 28 Aug 2019 13:49:28 +0200 (CEST) Received: (from www@localhost) by webmail.leidinger.net (8.15.2/8.14.4/Submit) id x7SBnSdf028004 for freebsd-current@freebsd.org; Wed, 28 Aug 2019 13:49:28 +0200 (CEST) (envelope-from Alexander@leidinger.net) X-Authentication-Warning: webmail.leidinger.net: www set sender to Alexander@leidinger.net using -f Received: from [::ffff:31.3.144.27] ([::ffff:31.3.144.27]) by webmail.leidinger.net (Horde Framework) with HTTPS; Wed, 28 Aug 2019 13:49:28 +0200 Date: Wed, 28 Aug 2019 13:49:28 +0200 Message-ID: <20190828134928.Horde.DiL31t_6di4RpY7cRJrPsBG@webmail.leidinger.net> From: Alexander Leidinger To: freebsd-current@freebsd.org Subject: Re: jails, ZFS, deprecated jail variables and poudriere problems In-Reply-To: <20190827101149.1efcb946@freyja> User-Agent: Horde Application Framework 5 Accept-Language: de,en Content-Type: multipart/signed; boundary="=_irKhjOFC29ARmahxCw5Jx0j"; protocol="application/pgp-signature"; micalg=pgp-sha1 MIME-Version: 1.0 ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=leidinger.net; s=outgoing-alex; t=1566992971; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to; bh=GLRRE4R3JCvc6t4+JK0APCW8CF2dUEYrGeo5DmG4mKc=; b=Jzp+ISjaNGd5jzwhsf7Vuy5Tr9irqTIElt2Abmm/RY/KVQXArIXxqIJhFglsLY3RKBGLFV 91Go8awPYeXGvzcf+NUjjvzsAgrXOUCB8+AVRaUN9cegbZJYLBPZHtU0zAqKdDuma4Y9dA T+cdH8fL5Bh3M32g0tEJ2bs2aKeckQa8SCGG34TWOllo02KAKCMZoF4qkLyyRquTuHQj34 cuz7obVC4L2uKyVvlXLWULVqyhl9NHLV0UTv70rX74I1hq66W38agUkUNwXbYyf3P+WCNA q0zLuqhMkvN4ik47J5U+4akdqexETYTffK0sB7NPD6LChBOgjPFCxZKduH5T7A== ARC-Seal: i=1; s=outgoing-alex; d=leidinger.net; t=1566992971; a=rsa-sha256; cv=none; b=pbeEA/INQxQP6e7QHLsJ6bwMSSJ82ptQdZ1c5eGEXSTszolOD4ixOjvgNX/GOrHx1yzdt4 7GxA0OiW0ttHQ3JvAwng2pXv9gCho9EXEkfsmShuPrChA2VRJ3kYC6lYx0RhW7QQ68MaZK XhX56rYAMr25vfuvNC9zj29oCOgXIXMUz60zamQUpocPX7GWn1V9aqRUYvjHSXO5cTzeGa AfNvgwv9OImUefx1HumTYN9jVSW+PZ79o5RzJUsMcJOEYmVSExogfWPNO1FeBo7sBb/2QB twXoW/nl0d2FHWsTnCE4wSGq+X4DbZ86tDd6ye5SGajj9FIKr29Z74FJcaY2yQ== ARC-Authentication-Results: i=1; mailgate.Leidinger.net; auth=pass smtp.auth=netchild@leidinger.net smtp.mailfrom=Alexander@leidinger.net X-Rspamd-Queue-Id: 46JPDD6Vxfz46TZ X-Spamd-Bar: --------- X-Spamd-Result: default: False [-9.81 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[leidinger.net:s=outgoing-alex]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+mx]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.20)[multipart/signed,text/plain]; HAS_XAW(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; XAW_SERVICE_ACCT(1.00)[]; TO_DN_NONE(0.00)[]; DKIM_TRACE(0.00)[leidinger.net:+]; DMARC_POLICY_ALLOW(-0.50)[leidinger.net,quarantine]; RCVD_COUNT_THREE(0.00)[4]; SIGNED_PGP(-2.00)[]; NEURAL_HAM_SHORT(-0.99)[-0.993,0]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; IP_SCORE(-3.72)[ip: (-9.80), ipnet: 2a00:1828::/32(-4.89), asn: 34240(-3.88), country: DE(-0.01)]; ASN(0.00)[asn:34240, ipnet:2a00:1828::/32, country:DE]; ARC_ALLOW(-1.00)[i=1]; RCVD_TLS_ALL(0.00)[]; RECEIVED_SPAMHAUS_PBL(0.00)[242.87.22.91.khpj7ygk5idzvmvt5x4ziurxhy.zen.dq.spamhaus.net : 127.0.0.10] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 28 Aug 2019 11:49:34 -0000 This message is in MIME format and has been PGP signed. --=_irKhjOFC29ARmahxCw5Jx0j Content-Type: text/plain; charset=utf-8; format=flowed; DelSp=Yes Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Quoting "O. Hartmann" (from Tue, 27 Aug 2019=20=20 10:11:54=20+0200): > We have a single ZFS pool (raidz), call it pool00 and this pool00 conatin= s a > ZFS dataset pool00/poudriere which we want to exclusively attach to a jai= l. > pool00/poudriere contains a complete clone of a former, now decomissioned > machine and is usable by the host bearing the jails. The jail, named=20= =20 >=20poudriere, > has these config parameters set in /etc/jail.conf as recommended: > > enforce_statfs=3D "0"; > > allow.raw_sockets=3D "1"; > > allow.mount=3D "1"; > allow.mount.zfs=3D "1"; > allow.mount.devfs=3D "1"; > allow.mount.fdescfs=3D "1"; > allow.mount.procfs=3D "1"; > allow.mount.nullfs=3D "1"; > allow.mount.fusefs=3D "1"; > > Here I find the first confusing observation. I can't interact with=20=20 >=20the dataset > and its content within the jail. I've set the "jailed" property of > pool00/poudriere via "zfs set jailed=3Don pool00/poudriere" and I also ha= ve to > attach the jailed dataset manually via "zfs jail poudriere=20=20 >=20pool00/poudriere" to > the (running) jail. But within the jail, listing ZFS's mountpoints reveal= : > > NAME USED AVAIL REFER MOUNTPOINT > pool00 124G 8.62T 34.9K /pool00 > pool00/poudriere 34.9K 8.62T 34.9K /pool/poudriere > > but nothing below /pool/poudriere is visible to the jail. Being confused = I Have you checked if it works if you add each dataset below the tree=20=20 you=20want to manage (=3D "sub-dataset")? Do the sub-datasets list the jailed property as inherited from the=20=20 parent=20(check on the host)? Bye, Alexander. --=20 http://www.Leidinger.net=20Alexander@Leidinger.net: PGP 0x8F31830F9F2772BF http://www.FreeBSD.org netchild@FreeBSD.org : PGP 0x8F31830F9F2772BF --=_irKhjOFC29ARmahxCw5Jx0j Content-Type: application/pgp-signature Content-Description: Digitale PGP-Signatur Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAABAgAGBQJdZmpIAAoJEBINsJsD+NiG744P/2Of7xDiKeMqWfDOxDciaxRd gMFAI1IWl2v/q/DHu+dqc5Ti/yJjFoanobs8j9DAXiVpl8tRqylucfDOzn2wE4mX 8PAcikclzpKrH4E5DplXXnRo7V/9cODNl+Y4icB6hcNpCD/InSgo8OUxHxI0iQZJ Ph+Oe/4JSeHsqTZEYhb2aiwscxa7X9d7WGTlPsN+fnh9hmCHJAp9vs7Ae5uydZQ1 6PcBbHnUEb8lPd5K0ZbRjk6ZdWM+S9j02hWDwwKVP9JDu4lgjUZjixSLtYWsl0LR jLDXazw2h5J1vzupnq3bqNfqI2WD1/3v/OHHcD0jA4EC4m7cwFLJY/a1MRKrf/fD NHQ3I+VzLLrLfLxDvfQ+x4z3SMF5XGvLrJX9LjZOIn3T9at1f7F2HIUR83gs8jZ+ /iJxhdYd7Imzyg+4RtTxa9Bc3UFE2uvuSNfAIm0px90eLlRvcGyD5Zq09PRQg7DR 2i72QfmnhSgn891LS0wh2d6AZoBMbNHu2vIZxnrVjz8fq1AiWz09KhZ1SGB4nGJ2 96AtcD2NvKZhzwgjT6DEJNSV5laKMGiemX6JCwhvlZ8YsMedFgrNeg6uqSBdD/rX y7FTz/LzvXwm+858VMCHxDbro+44EUlYRqG58xfWT0hHgab8alkZghrlDJpkoVYc hvhVZjIy5TeJa5FeHi3I =B8iu -----END PGP SIGNATURE----- --=_irKhjOFC29ARmahxCw5Jx0j-- From owner-freebsd-current@freebsd.org Wed Aug 28 11:57:36 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id E4279DA25C for ; Wed, 28 Aug 2019 11:57:36 +0000 (UTC) (envelope-from Alexander@leidinger.net) Received: from mailgate.Leidinger.net (bastille.leidinger.net [89.238.82.207]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 46JPPW6jLjz46v8 for ; Wed, 28 Aug 2019 11:57:35 +0000 (UTC) (envelope-from Alexander@leidinger.net) Received: from outgoing.leidinger.net (p5B1657F2.dip0.t-ipconnect.de [91.22.87.242]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (Client did not present a certificate) by mailgate.Leidinger.net (Postfix) with ESMTPSA id C9389150F for ; Wed, 28 Aug 2019 13:57:32 +0200 (CEST) Received: from webmail.leidinger.net (webmail.Leidinger.net [IPv6:fd73:10c7:2053:1::3:102]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (Client did not present a certificate) by outgoing.leidinger.net (Postfix) with ESMTPS id 632DF936E for ; Wed, 28 Aug 2019 13:57:00 +0200 (CEST) Received: (from www@localhost) by webmail.leidinger.net (8.15.2/8.14.4/Submit) id x7SBv0ca034798 for freebsd-current@freebsd.org; Wed, 28 Aug 2019 13:57:00 +0200 (CEST) (envelope-from Alexander@leidinger.net) X-Authentication-Warning: webmail.leidinger.net: www set sender to Alexander@leidinger.net using -f Received: from [::ffff:31.3.144.27] ([::ffff:31.3.144.27]) by webmail.leidinger.net (Horde Framework) with HTTPS; Wed, 28 Aug 2019 13:57:00 +0200 Date: Wed, 28 Aug 2019 13:57:00 +0200 Message-ID: <20190828135700.Horde.m2EjpS9j67KYn2E1oSeoK8f@webmail.leidinger.net> From: Alexander Leidinger To: freebsd-current@freebsd.org Subject: Re: jails, ZFS, deprecated jail variables and poudriere problems In-Reply-To: <20190827101149.1efcb946@freyja> User-Agent: Horde Application Framework 5 Accept-Language: de,en Content-Type: multipart/signed; boundary="=_QZT_6MVfrwyvmp3gtxgr8v5"; protocol="application/pgp-signature"; micalg=pgp-sha1 MIME-Version: 1.0 ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=leidinger.net; s=outgoing-alex; t=1566993453; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to; bh=1HsJbDioi6L7i8XNhnTtDer+7jqjZHL2zac8QDVFUK4=; b=shS9srFCjY3ZxEGFxIIgYyQs2ggavCt1OywMqIibUi8L52EGHq+5yxTaqN67jyBvgAaWaj BEVVoOy8cXknDpPaSSblMwKqxyR8cy6lYh34uPHImeJRZprypbOHoM0UtDRyvDJpvY28ta oUKLd7NANyjkXF7e+W2h0P8NKZO/Jld0wfqjrCWltyiedhJ4Cy28uTHXOe8UZQEY+Fd3UY VAKzRuW9T9Vit9Vuke05iHVYxcNtkf7wux08SrpFvl9yfThBQN1YnwJCC4VlUYWpGn+etg QjDMB1WUYvEtZkDwKy69M6WJ7mo2ERwvhwDBAusxVP9Y//xs4+ERKBrt+BP06Q== ARC-Seal: i=1; s=outgoing-alex; d=leidinger.net; t=1566993453; a=rsa-sha256; cv=none; b=20MhANUHzzCjJGWaWGvxMy8P0DpmJ3XDisObYJVP3TYB+pO6HnwTrIzlvz2sLALzy0StBJ qg2YCExa8qBkCsN8T05Wp1cE7ua+3kgAd/YEaPx57p6nR/fdB3nMvL37SSYuxpPHxuuKNX zCDG7n1jAY3Yp2QLfoI7pBKzR3pT5o72wxIrBNxAKsJuXAn+3mr5CdHnMW7oCBYkb8KzxK ivNxTZoT4maFjLI2n68Z4YY5oeicLl6mNyJWeclqwWDroWklWhXyEnDhLI1aJlS50hQ+Pq JDpO/v7upWCkHllAM2QMY2GEO6is+E8BEldeyWB/oi1qS7pcpYO36qWi0C33Hw== ARC-Authentication-Results: i=1; mailgate.Leidinger.net; auth=pass smtp.auth=netchild@leidinger.net smtp.mailfrom=Alexander@leidinger.net X-Rspamd-Queue-Id: 46JPPW6jLjz46v8 X-Spamd-Bar: --------- X-Spamd-Result: default: False [-9.76 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[leidinger.net:s=outgoing-alex]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+mx]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.20)[multipart/signed,text/plain]; HAS_XAW(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; XAW_SERVICE_ACCT(1.00)[]; TO_DN_NONE(0.00)[]; DKIM_TRACE(0.00)[leidinger.net:+]; DMARC_POLICY_ALLOW(-0.50)[leidinger.net,quarantine]; RCVD_COUNT_THREE(0.00)[4]; SIGNED_PGP(-2.00)[]; NEURAL_HAM_SHORT(-0.99)[-0.993,0]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; IP_SCORE(-3.66)[ip: (-9.62), ipnet: 89.238.64.0/18(-4.81), asn: 34240(-3.89), country: DE(-0.01)]; ASN(0.00)[asn:34240, ipnet:89.238.64.0/18, country:DE]; ARC_ALLOW(-1.00)[i=1]; RCVD_TLS_ALL(0.00)[]; RECEIVED_SPAMHAUS_PBL(0.00)[242.87.22.91.khpj7ygk5idzvmvt5x4ziurxhy.zen.dq.spamhaus.net : 127.0.0.10] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 28 Aug 2019 11:57:36 -0000 This message is in MIME format and has been PGP signed. --=_QZT_6MVfrwyvmp3gtxgr8v5 Content-Type: text/plain; charset=utf-8; format=flowed; DelSp=Yes Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Quoting "O. Hartmann" (from Tue, 27 Aug 2019=20=20 10:11:54=20+0200): > We have a single ZFS pool (raidz), call it pool00 and this pool00 conatin= s a > ZFS dataset pool00/poudriere which we want to exclusively attach to a jai= l. > pool00/poudriere contains a complete clone of a former, now decomissioned > machine and is usable by the host bearing the jails. The jail, named=20= =20 >=20poudriere, > has these config parameters set in /etc/jail.conf as recommended: > > enforce_statfs=3D "0"; > > allow.raw_sockets=3D "1"; > > allow.mount=3D "1"; > allow.mount.zfs=3D "1"; The line above is what is needed, and what is replacing the sysctl=20=20 you've=20found. > allow.mount.devfs=3D "1"; > allow.mount.fdescfs=3D "1"; > allow.mount.procfs=3D "1"; > allow.mount.nullfs=3D "1"; > allow.mount.fusefs=3D "1"; > > Here I find the first confusing observation. I can't interact with=20=20 >=20the dataset > and its content within the jail. I've set the "jailed" property of > pool00/poudriere via "zfs set jailed=3Don pool00/poudriere" and I also ha= ve to > attach the jailed dataset manually via "zfs jail poudriere=20=20 >=20pool00/poudriere" to > the (running) jail. But within the jail, listing ZFS's mountpoints reveal= : > > NAME USED AVAIL REFER MOUNTPOINT > pool00 124G 8.62T 34.9K /pool00 > pool00/poudriere 34.9K 8.62T 34.9K /pool/poudriere > > but nothing below /pool/poudriere is visible to the jail. Being confused = I Please be more verbose what you mean by "interact" and "is visible". Do zfs commands on the dataset work? Note, I don't remember if you can manage the root of the jail, but at=20=20 least=20subsequent jails should be possible to manage. I don't have a=20=20 jail=20where the root is managed in the jail, just additional ones.=20=20 Those=20need to have set a mountpoint after the initial jailing and then=20= =20 maybe=20even be mounted for the first time. Please also check /etc/defaults/devfs.rules if the jail rule contains=20=20 an=20unhide entry for zfs. Bye, Alexander. --=20 http://www.Leidinger.net=20Alexander@Leidinger.net: PGP 0x8F31830F9F2772BF http://www.FreeBSD.org netchild@FreeBSD.org : PGP 0x8F31830F9F2772BF --=_QZT_6MVfrwyvmp3gtxgr8v5 Content-Type: application/pgp-signature Content-Description: Digitale PGP-Signatur Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAABAgAGBQJdZmwMAAoJEBINsJsD+NiGKfUP/AwQiECsn5Os00z6O4rs2w6O iU2o9NbgP6TLKgoTnPy/vTv4TwnzLBgMJCmX88ddQBRdoANaBASztfro1QpNzUim Jpi1fNmmJW+LznskWYDWnEuPXVPUy645RgVUuTNTFOWcAh4438TgjJ0tc2IN2h+a eq1GnfRPRnof4PLDdpbOS/IdjP/ujZj5yawK03fG3I36usWooIIRPWUbBFlpVh4R Y6Yb4rZIWS6SAnbfzVFUQLx3TnglmnD84+NwkyDhDSObQwP/nPMwKByCE5QB/DhK mz2l0mEYuGV/cPfgMA0QqSL5R+IKgtA/BQ4JvUzrwjQ6nSFpqZQlGE8v3cryajd7 YKcAp099qtHn9vHvhLfgMVLqt97ktaq9PPpMRt364Ir9UtzO1FuH8pnLhirJklgu EAlrmGjd4RaYR1XFGcY6eIbNvnZm45nyMoZty3urqI11BTNeZ8Qqsn7RVbk+KQzq inCgt0pWgkVgMXloXYzZ70pqgZEawT7Q4mNf1CXB+1DnQUhbFbu890CVtzM9HNmo RwgpzB0jnq3LuqnRySv9xFD3odSJV+7N5qJm1gzyYuFOhKJMXbmtlMexfGN6qSuG eLPkujWza4q1kHxbMIaeiBjtATolNTyj3MHHcIxJ7a8VFoCBVVWYiBz+JMdLNgEJ 9L0wnDXIVSqB7hy1UJ/y =6y94 -----END PGP SIGNATURE----- --=_QZT_6MVfrwyvmp3gtxgr8v5-- From owner-freebsd-current@freebsd.org Wed Aug 28 17:10:48 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id AD60DE1D86 for ; Wed, 28 Aug 2019 17:10:48 +0000 (UTC) (envelope-from maksim.yevmenkin@gmail.com) Received: from mail-qk1-x743.google.com (mail-qk1-x743.google.com [IPv6:2607:f8b0:4864:20::743]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46JXLv4gRfz4Rxd for ; Wed, 28 Aug 2019 17:10:47 +0000 (UTC) (envelope-from maksim.yevmenkin@gmail.com) Received: by mail-qk1-x743.google.com with SMTP id d23so423178qko.3 for ; Wed, 28 Aug 2019 10:10:47 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=0Jcig/0W/kvOlCA4LcZH0OlyLwTXEqvmLlFwCXN6cAw=; b=KMFE100JA+q3AnWA+pdw9tVluYf5RfSdn/AQtpALN8quToPeyrgxZFX/73W0/jIpze Q4xKFjiWYERWpoYiV3BSSubGy1McqewQV/8ZfnpHChM/+wNMMTmWJ0W+SVdzUu1A10WQ J2kYhsNcrlk8DTyoyTVQJ2dCp5Hw8Qu5oYFf0ymSEuphFFleAygpPVd0w3t1lMOIVLBH zC49vjPdsVtMMJvSD7TB52hO3a5HvTlhuiApq0IDd+5tsACkry2j2WvKYWoBJPY3VQ4g wgzvvR3YYUUoSs2U7isnoxOyyNg5n31sny7qAxZHc5WUC/Bx5x1siF2f3aBDGHqPLTWx bRrA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=0Jcig/0W/kvOlCA4LcZH0OlyLwTXEqvmLlFwCXN6cAw=; b=JW0mr6vRhA1k8u7ZcQFLWVTnaw8zppvq9KKMM6cvgTMqLJaQrMlCY/DOEtc03+bUcA u2VwLZc7XZue8PRyfa9T5Y2dugoyxyfxAjXbujcx/akUspu/7NiCcTeMqAbSZNwqBKUx 5i71cJpWZoktwcQqHDd9yVUwzMPlbbKMRFL2b28GkrBqoalYJUo+e6F8zEQlxU8eDVEw wWjzwDlAc22UZoBhDdWehbHJUwTFxG1JXbNNOpvWICOeXT+N/+mLNWyhdKNuCOgf0Iib hDjsCX8oo9s1FVSahEMaEW3bpLUyB9G33xjg5R42PEd+g+DulXfmnjE36cVlCsbII+CN 7D+w== X-Gm-Message-State: APjAAAWHqvtapUV5/nZK4tu4MoAr7NSqTQJc2WIQ9sO3IUlBcxwhdJOs tMUKoUdlv0vWMuc1k5wQJeDbl/dX5QqK5fO2cIw= X-Google-Smtp-Source: APXvYqxUjLDW5OctR1FQEKlMQuTlx6vzZj1dNdYhGbyC4ZMUx7cIsCvjQVHySqGlkHWChKzdyTSN5jt1At7Hf9OOSRw= X-Received: by 2002:a37:6c8:: with SMTP id 191mr5207043qkg.102.1567012246423; Wed, 28 Aug 2019 10:10:46 -0700 (PDT) MIME-Version: 1.0 References: <47509401.1440476.1566796167857.ref@mail.yahoo.com> <47509401.1440476.1566796167857@mail.yahoo.com> <5aa8faeb-5e8e-38be-4301-81f3d82c494a@selasky.org> <00E772F0-7231-44C4-B314-26730CC7DF21@gmail.com> <20190827071052.GT71821@kib.kiev.ua> <233039408.1857163.1566892977201@mail.yahoo.com> In-Reply-To: From: Maksim Yevmenkin Date: Wed, 28 Aug 2019 10:10:35 -0700 Message-ID: Subject: Re: Kernel-Crash when working with ubt0 To: "mms.vanbreukelingen@gmail.com" Cc: "kostikbel@gmail.com" , Warner Losh , Hans Petter Selasky , "freebsd-current@freebsd.org" Content-Type: multipart/mixed; boundary="0000000000004eb85005913078ec" X-Rspamd-Queue-Id: 46JXLv4gRfz4Rxd X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=KMFE100J; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of maksimyevmenkin@gmail.com designates 2607:f8b0:4864:20::743 as permitted sender) smtp.mailfrom=maksimyevmenkin@gmail.com X-Spamd-Result: default: False [-2.89 / 15.00]; TO_DN_EQ_ADDR_SOME(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; FREEMAIL_FROM(0.00)[gmail.com]; HAS_ATTACHMENT(0.00)[]; RCPT_COUNT_FIVE(0.00)[5]; DKIM_TRACE(0.00)[gmail.com:+]; CTYPE_MIXED_BOGUS(1.00)[]; MIME_BASE64_TEXT(0.10)[]; NEURAL_HAM_SHORT(-0.99)[-0.992,0]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; FREEMAIL_TO(0.00)[gmail.com]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:+]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; TAGGED_FROM(0.00)[]; DWL_DNSWL_NONE(0.00)[gmail.com.dwl.dnswl.org : 127.0.5.0]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; FROM_HAS_DN(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; TAGGED_RCPT(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; MIME_GOOD(-0.10)[multipart/mixed,text/plain]; IP_SCORE_FREEMAIL(0.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[3.4.7.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; IP_SCORE(0.00)[ip: (2.87), ipnet: 2607:f8b0::/32(-2.85), asn: 15169(-2.32), country: US(-0.05)]; RCVD_COUNT_TWO(0.00)[2]; FREEMAIL_CC(0.00)[gmail.com]; RCVD_TLS_ALL(0.00)[] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 28 Aug 2019 17:10:48 -0000 --0000000000004eb85005913078ec Content-Type: text/plain; charset="UTF-8" > > > Hmm... interesting.... > > > > > > I only took a brief look at it. I suppose I can ensure user space address is wired and then copyout() can be called with mutex held > > > > >No, you cannot do this, at least without making the kernel to panic. > > User might unmap the wired mapping at any time still. > > Kostik, > > i was thinking along the lines of vslock/vsunlock and copyout_nofault. > basically similar to the sysctl code. do you think this would not > work? actually, i dont think i need to hold lock over copyout. attached is my version of the patch (untested) thanks, max --0000000000004eb85005913078ec Content-Type: text/plain; charset="US-ASCII"; name="ng_btsocket_hci_raw.c.diff.txt" Content-Disposition: attachment; filename="ng_btsocket_hci_raw.c.diff.txt" Content-Transfer-Encoding: base64 Content-ID: X-Attachment-Id: f_jzvimh7e0 SW5kZXg6IG5nX2J0c29ja2V0X2hjaV9yYXcuYwo9PT09PT09PT09PT09PT09PT09PT09PT09PT09 PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09CmRpZmYgLS1naXQgYS9oZWFk L3N5cy9uZXRncmFwaC9ibHVldG9vdGgvc29ja2V0L25nX2J0c29ja2V0X2hjaV9yYXcuYyBiL2hl YWQvc3lzL25ldGdyYXBoL2JsdWV0b290aC9zb2NrZXQvbmdfYnRzb2NrZXRfaGNpX3Jhdy5jCi0t LSBhL2hlYWQvc3lzL25ldGdyYXBoL2JsdWV0b290aC9zb2NrZXQvbmdfYnRzb2NrZXRfaGNpX3Jh dy5jCShyZXZpc2lvbiAzNTE1NjgpCisrKyBiL2hlYWQvc3lzL25ldGdyYXBoL2JsdWV0b290aC9z b2NrZXQvbmdfYnRzb2NrZXRfaGNpX3Jhdy5jCSh3b3JraW5nIGNvcHkpCkBAIC0xMTU2LDE1ICsx MTU2LDE1IEBACiAJCWlmIChwLT5udW1fZW50cmllcyA8PSAwIHx8IAogCQkgICAgcC0+bnVtX2Vu dHJpZXMgPiBOR19IQ0lfTUFYX05FSUdIQk9SX05VTSB8fAogCQkgICAgcC0+ZW50cmllcyA9PSBO VUxMKSB7Ci0JCQllcnJvciA9IEVJTlZBTDsKLQkJCWJyZWFrOworCQkJbXR4X3VubG9jaygmcGNi LT5wY2JfbXR4KTsKKwkJCXJldHVybiAoRUlOVkFMKTsKIAkJfQogCiAJCU5HX01LTUVTU0FHRSht c2csIE5HTV9IQ0lfQ09PS0lFLAogCQkJTkdNX0hDSV9OT0RFX0dFVF9ORUlHSEJPUl9DQUNIRSwg MCwgTV9OT1dBSVQpOwogCQlpZiAobXNnID09IE5VTEwpIHsKLQkJCWVycm9yID0gRU5PTUVNOwot CQkJYnJlYWs7CisJCQltdHhfdW5sb2NrKCZwY2ItPnBjYl9tdHgpOworCQkJcmV0dXJuIChFTk9N RU0pOwogCQl9CiAJCW5nX2J0c29ja2V0X2hjaV9yYXdfZ2V0X3Rva2VuKCZtc2ctPmhlYWRlci50 b2tlbik7CiAJCXBjYi0+dG9rZW4gPSBtc2ctPmhlYWRlci50b2tlbjsKQEAgLTExNzMsNyArMTE3 Myw4IEBACiAJCU5HX1NFTkRfTVNHX1BBVEgoZXJyb3IsIG5nX2J0c29ja2V0X2hjaV9yYXdfbm9k ZSwgbXNnLCBwYXRoLCAwKTsKIAkJaWYgKGVycm9yICE9IDApIHsKIAkJCXBjYi0+dG9rZW4gPSAw OwotCQkJYnJlYWs7CisJCQltdHhfdW5sb2NrKCZwY2ItPnBjYl9tdHgpOworCQkJcmV0dXJuIChl cnJvcik7CiAJCX0KIAogCQllcnJvciA9IG1zbGVlcCgmcGNiLT5tc2csICZwY2ItPnBjYl9tdHgs CkBAIC0xMTgxLDE2ICsxMTgyLDIxIEBACiAJCQkJbmdfYnRzb2NrZXRfaGNpX3Jhd19pb2N0bF90 aW1lb3V0ICogaHopOwogCQlwY2ItPnRva2VuID0gMDsKIAotCQlpZiAoZXJyb3IgIT0gMCkKLQkJ CWJyZWFrOworCQlpZiAoZXJyb3IgIT0gMCkgeworCQkJbXR4X3VubG9jaygmcGNiLT5wY2JfbXR4 KTsKKwkJCXJldHVybiAoZXJyb3IpOworCQl9CiAKLQkJaWYgKHBjYi0+bXNnICE9IE5VTEwgJiYK LQkJICAgIHBjYi0+bXNnLT5oZWFkZXIuY21kID09IE5HTV9IQ0lfTk9ERV9HRVRfTkVJR0hCT1Jf Q0FDSEUpIHsKKwkJbXNnID0gcGNiLT5tc2c7CisJCXBjYi0+bXNnID0gTlVMTDsKKworCQltdHhf dW5sb2NrKCZwY2ItPnBjYl9tdHgpOworCQkKKwkJaWYgKG1zZyAhPSBOVUxMICYmCisJCSAgICBt c2ctPmhlYWRlci5jbWQgPT0gTkdNX0hDSV9OT0RFX0dFVF9ORUlHSEJPUl9DQUNIRSkgewogCQkJ LyogUmV0dXJuIGRhdGEgYmFjayB0byB1c2VyIHNwYWNlICovCi0JCQlwMSA9IChuZ19oY2lfbm9k ZV9nZXRfbmVpZ2hib3JfY2FjaGVfZXAgKikKLQkJCQkocGNiLT5tc2ctPmRhdGEpOwotCQkJcDIg PSAobmdfaGNpX25vZGVfbmVpZ2hib3JfY2FjaGVfZW50cnlfZXAgKikKLQkJCQkocDEgKyAxKTsK KwkJCXAxID0gKG5nX2hjaV9ub2RlX2dldF9uZWlnaGJvcl9jYWNoZV9lcCAqKShtc2ctPmRhdGEp OworCQkJcDIgPSAobmdfaGNpX25vZGVfbmVpZ2hib3JfY2FjaGVfZW50cnlfZXAgKikocDEgKyAx KTsKIAogCQkJcC0+bnVtX2VudHJpZXMgPSBtaW4ocC0+bnVtX2VudHJpZXMsIHAxLT5udW1fZW50 cmllcyk7CiAJCQlpZiAocC0+bnVtX2VudHJpZXMgPiAwKQpAQCAtMTIwMCw4ICsxMjA2LDkgQEAK IAkJfSBlbHNlCiAJCQllcnJvciA9IEVJTlZBTDsKIAotCQlOR19GUkVFX01TRyhwY2ItPm1zZyk7 IC8qIGNoZWNrcyBmb3IgIT0gTlVMTCAqLwotCQl9YnJlYWs7CisJCU5HX0ZSRUVfTVNHKG1zZyk7 IC8qIGNoZWNrcyBmb3IgIT0gTlVMTCAqLworCQlyZXR1cm4gKGVycm9yKTsKKwkJfSAvKiBOT1RS RUFDSEVEICovCiAKIAljYXNlIFNJT0NfSENJX1JBV19OT0RFX0dFVF9DT05fTElTVDogewogCQlz dHJ1Y3QgbmdfYnRzb2NrZXRfaGNpX3Jhd19jb25fbGlzdAkqcCA9IApAQCAtMTIxMiwxNSArMTIx OSwxNSBAQAogCQlpZiAocC0+bnVtX2Nvbm5lY3Rpb25zID09IDAgfHwKIAkJICAgIHAtPm51bV9j b25uZWN0aW9ucyA+IE5HX0hDSV9NQVhfQ09OX05VTSB8fAogCQkgICAgcC0+Y29ubmVjdGlvbnMg PT0gTlVMTCkgewotCQkJZXJyb3IgPSBFSU5WQUw7Ci0JCQlicmVhazsKKwkJCW10eF91bmxvY2so JnBjYi0+cGNiX210eCk7CisJCQlyZXR1cm4gKEVJTlZBTCk7CiAJCX0KIAogCQlOR19NS01FU1NB R0UobXNnLCBOR01fSENJX0NPT0tJRSwgTkdNX0hDSV9OT0RFX0dFVF9DT05fTElTVCwKIAkJCTAs IE1fTk9XQUlUKTsKIAkJaWYgKG1zZyA9PSBOVUxMKSB7Ci0JCQllcnJvciA9IEVOT01FTTsKLQkJ CWJyZWFrOworCQkJbXR4X3VubG9jaygmcGNiLT5wY2JfbXR4KTsKKwkJCXJldHVybiAoRU5PTUVN KTsKIAkJfQogCQluZ19idHNvY2tldF9oY2lfcmF3X2dldF90b2tlbigmbXNnLT5oZWFkZXIudG9r ZW4pOwogCQlwY2ItPnRva2VuID0gbXNnLT5oZWFkZXIudG9rZW47CkBAIC0xMjI5LDcgKzEyMzYs OCBAQAogCQlOR19TRU5EX01TR19QQVRIKGVycm9yLCBuZ19idHNvY2tldF9oY2lfcmF3X25vZGUs IG1zZywgcGF0aCwgMCk7CiAJCWlmIChlcnJvciAhPSAwKSB7CiAJCQlwY2ItPnRva2VuID0gMDsK LQkJCWJyZWFrOworCQkJbXR4X3VubG9jaygmcGNiLT5wY2JfbXR4KTsKKwkJCXJldHVybiAoZXJy b3IpOwogCQl9CiAKIAkJZXJyb3IgPSBtc2xlZXAoJnBjYi0+bXNnLCAmcGNiLT5wY2JfbXR4LApA QCAtMTIzNywxMyArMTI0NSwyMCBAQAogCQkJCW5nX2J0c29ja2V0X2hjaV9yYXdfaW9jdGxfdGlt ZW91dCAqIGh6KTsKIAkJcGNiLT50b2tlbiA9IDA7CiAKLQkJaWYgKGVycm9yICE9IDApCi0JCQli cmVhazsKKwkJaWYgKGVycm9yICE9IDApIHsKKwkJCW10eF91bmxvY2soJnBjYi0+cGNiX210eCk7 CisJCQlyZXR1cm4gKGVycm9yKTsKKwkJfQogCi0JCWlmIChwY2ItPm1zZyAhPSBOVUxMICYmCi0J CSAgICBwY2ItPm1zZy0+aGVhZGVyLmNtZCA9PSBOR01fSENJX05PREVfR0VUX0NPTl9MSVNUKSB7 CisJCW1zZyA9IHBjYi0+bXNnOworCQlwY2ItPm1zZyA9IE5VTEw7CisKKwkJbXR4X3VubG9jaygm cGNiLT5wY2JfbXR4KTsKKworCQlpZiAobXNnICE9IE5VTEwgJiYKKwkJICAgIG1zZy0+aGVhZGVy LmNtZCA9PSBOR01fSENJX05PREVfR0VUX0NPTl9MSVNUKSB7CiAJCQkvKiBSZXR1cm4gZGF0YSBi YWNrIHRvIHVzZXIgc3BhY2UgKi8KLQkJCXAxID0gKG5nX2hjaV9ub2RlX2Nvbl9saXN0X2VwICop KHBjYi0+bXNnLT5kYXRhKTsKKwkJCXAxID0gKG5nX2hjaV9ub2RlX2Nvbl9saXN0X2VwICopKG1z Zy0+ZGF0YSk7CiAJCQlwMiA9IChuZ19oY2lfbm9kZV9jb25fZXAgKikocDEgKyAxKTsKIAogCQkJ cC0+bnVtX2Nvbm5lY3Rpb25zID0gbWluKHAtPm51bV9jb25uZWN0aW9ucywKQEAgLTEyNTUsOCAr MTI3MCw5IEBACiAJCX0gZWxzZQogCQkJZXJyb3IgPSBFSU5WQUw7CiAKLQkJTkdfRlJFRV9NU0co cGNiLT5tc2cpOyAvKiBjaGVja3MgZm9yICE9IE5VTEwgKi8KLQkJfSBicmVhazsKKwkJTkdfRlJF RV9NU0cobXNnKTsgLyogY2hlY2tzIGZvciAhPSBOVUxMICovCisJCXJldHVybiAoZXJyb3IpOwor CQl9IC8qIE5PVFJFQUNIRUQgKi8KIAogCWNhc2UgU0lPQ19IQ0lfUkFXX05PREVfR0VUX0xJTktf UE9MSUNZX01BU0s6IHsKIAkJc3RydWN0IG5nX2J0c29ja2V0X2hjaV9yYXdfbm9kZV9saW5rX3Bv bGljeV9tYXNrCSpwID0gCkBAIC0xMzMyLDE1ICsxMzQ4LDE1IEBACiAJCXN0cnVjdCBub2RlaW5m bwkJCQkJKm5pID0gbmwtPm5hbWVzOwogCiAJCWlmIChubC0+bnVtX25hbWVzID09IDApIHsKLQkJ CWVycm9yID0gRUlOVkFMOwotCQkJYnJlYWs7CisJCQltdHhfdW5sb2NrKCZwY2ItPnBjYl9tdHgp OworCQkJcmV0dXJuIChFSU5WQUwpOwogCQl9CiAKIAkJTkdfTUtNRVNTQUdFKG1zZywgTkdNX0dF TkVSSUNfQ09PS0lFLCBOR01fTElTVE5BTUVTLAogCQkJMCwgTV9OT1dBSVQpOwogCQlpZiAobXNn ID09IE5VTEwpIHsKLQkJCWVycm9yID0gRU5PTUVNOwotCQkJYnJlYWs7CisJCQltdHhfdW5sb2Nr KCZwY2ItPnBjYl9tdHgpOworCQkJcmV0dXJuIChFTk9NRU0pOwogCQl9CiAJCW5nX2J0c29ja2V0 X2hjaV9yYXdfZ2V0X3Rva2VuKCZtc2ctPmhlYWRlci50b2tlbik7CiAJCXBjYi0+dG9rZW4gPSBt c2ctPmhlYWRlci50b2tlbjsKQEAgLTEzNDksNyArMTM2NSw4IEBACiAJCU5HX1NFTkRfTVNHX1BB VEgoZXJyb3IsIG5nX2J0c29ja2V0X2hjaV9yYXdfbm9kZSwgbXNnLCAiLjoiLCAwKTsKIAkJaWYg KGVycm9yICE9IDApIHsKIAkJCXBjYi0+dG9rZW4gPSAwOwotCQkJYnJlYWs7CisJCQltdHhfdW5s b2NrKCZwY2ItPnBjYl9tdHgpOworCQkJcmV0dXJuIChlcnJvcik7CiAJCX0KIAogCQllcnJvciA9 IG1zbGVlcCgmcGNiLT5tc2csICZwY2ItPnBjYl9tdHgsCkBAIC0xMzU3LDEyICsxMzc0LDE5IEBA CiAJCQkJbmdfYnRzb2NrZXRfaGNpX3Jhd19pb2N0bF90aW1lb3V0ICogaHopOwogCQlwY2ItPnRv a2VuID0gMDsKIAotCQlpZiAoZXJyb3IgIT0gMCkKLQkJCWJyZWFrOworCQlpZiAoZXJyb3IgIT0g MCkgeworCQkJbXR4X3VubG9jaygmcGNiLT5wY2JfbXR4KTsKKwkJCXJldHVybiAoZXJyb3IpOwor CQl9CiAKLQkJaWYgKHBjYi0+bXNnICE9IE5VTEwgJiYgcGNiLT5tc2ctPmhlYWRlci5jbWQgPT0g TkdNX0xJU1ROQU1FUykgeworCQltc2cgPSBwY2ItPm1zZzsKKwkJcGNiLT5tc2cgPSBOVUxMOwor CisJCW10eF91bmxvY2soJnBjYi0+cGNiX210eCk7CisKKwkJaWYgKG1zZyAhPSBOVUxMICYmIG1z Zy0+aGVhZGVyLmNtZCA9PSBOR01fTElTVE5BTUVTKSB7CiAJCQkvKiBSZXR1cm4gZGF0YSBiYWNr IHRvIHVzZXIgc3BhY2UgKi8KLQkJCXN0cnVjdCBuYW1lbGlzdAkqbmwxID0gKHN0cnVjdCBuYW1l bGlzdCAqKSBwY2ItPm1zZy0+ZGF0YTsKKwkJCXN0cnVjdCBuYW1lbGlzdAkqbmwxID0gKHN0cnVj dCBuYW1lbGlzdCAqKSBtc2ctPmRhdGE7CiAJCQlzdHJ1Y3Qgbm9kZWluZm8JKm5pMSA9ICZubDEt Pm5vZGVpbmZvWzBdOwogCiAJCQl3aGlsZSAobmwtPm51bV9uYW1lcyA+IDAgJiYgbmwxLT5udW1u YW1lcyA+IDApIHsKQEAgLTEzODUsOCArMTQwOSw5IEBACiAJCX0gZWxzZQogCQkJZXJyb3IgPSBF SU5WQUw7CiAKLQkJTkdfRlJFRV9NU0cocGNiLT5tc2cpOyAvKiBjaGVja3MgZm9yICE9IE5VTEwg Ki8KLQkJfSBicmVhazsKKwkJTkdfRlJFRV9NU0cobXNnKTsgLyogY2hlY2tzIGZvciAhPSBOVUxM ICovCisJCXJldHVybiAoZXJyb3IpOworCQl9IC8qIE5PVFJFQUNIRUQgKi8KIAogCWRlZmF1bHQ6 CiAJCWVycm9yID0gRUlOVkFMOwo= --0000000000004eb85005913078ec-- From owner-freebsd-current@freebsd.org Wed Aug 28 17:28:27 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 630E7E2419 for ; Wed, 28 Aug 2019 17:28:27 +0000 (UTC) (envelope-from rysto32@gmail.com) Received: from mail-qk1-x729.google.com (mail-qk1-x729.google.com [IPv6:2607:f8b0:4864:20::729]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46JXlG1ynfz4T8Z for ; Wed, 28 Aug 2019 17:28:25 +0000 (UTC) (envelope-from rysto32@gmail.com) Received: by mail-qk1-x729.google.com with SMTP id m10so489517qkk.1 for ; Wed, 28 Aug 2019 10:28:25 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:from:date:message-id:subject:to; bh=x/NObVyR1XQZoum1OG4SVRSTWDaEwhsyQ1/hwC54Qws=; b=VAI5KYMrxILNCPYcrRrxWc+wmhbDR6ATGPgUjW2/raHVFYaOeihh5u94oeCExPfaGG osUeNTplU7X6IVGLsSGUkELdjMfvgNXs8rXsgvdYM01CliksgKXEaLd0s/XZ2eLfoX2Y N35p2GDrkRlZdpM0sqHVlINmGuWbilffjEl0kkIRpKJ5kcve9zmO1ruhjrlkfJu2wcT6 BSgdbNLXri1RBO4rnUakMfBtWcQ2HOH1lVW01kzqfr3WJ9aJXPn+6Fj+r5tjpgIRIkDq ZAHHRZ0ZEpVcRFSrHhm1RjUip9oCUYfYm4MCWwDaDgShWrUpYv6YV290FgqHW8wQID/t O+Kg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=x/NObVyR1XQZoum1OG4SVRSTWDaEwhsyQ1/hwC54Qws=; b=H+/kPlQ/HE4mC3blBXvmAqJ69EyMHRfDsjvYZuYOFWRkOpsw//LKLBBaRj/i6UdD2n jQWbkbhw2Wviihh6dcnzNnoTsD5jHT51KFWYtHxoQlfcMgD62RehMOxMSKu43iobUyBE UTBK8+nuwJUYFOoDlMn3F87kEPIxahCsKPzoRsK0Jh85InKoMdEJYo0azExh4Jfnxvd3 ULqWEjSlhSPDyv3AJyNfaXfBvjbtEq1zhbAKNYvUSPxWAtlC3eGRR4nf4K5CnBjfLVT8 IpIuiS1GbhvbsGC3BsZ+7TjwVhjEjvYSz8fogob10zccsUGjVkJvWDFM5sT+99DWoXuj AWew== X-Gm-Message-State: APjAAAV5hiLTghyf52Vi1lKKNV0xe/983BuOhh5ZRYAsQRvw++xauJsf eIkTaRoPTXB04qksu81XtLcA3kpEKKB4HEsxPOZqDM1p X-Google-Smtp-Source: APXvYqxYlWE/MXsUogD0jOKPE4+0noz0pXO2KwZkhSHZp4/Z+A1Oc8aFMDCvFkSLp502yh6MGF2NCuVM6R4NDn29goU= X-Received: by 2002:a05:620a:6cf:: with SMTP id 15mr4914237qky.98.1567013304736; Wed, 28 Aug 2019 10:28:24 -0700 (PDT) MIME-Version: 1.0 From: Ryan Stone Date: Wed, 28 Aug 2019 13:28:13 -0400 Message-ID: Subject: hwpmc: events don't seem to distinguish kernel and userland callchains anymore To: FreeBSD Current Content-Type: text/plain; charset="UTF-8" X-Rspamd-Queue-Id: 46JXlG1ynfz4T8Z X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=VAI5KYMr; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of rysto32@gmail.com designates 2607:f8b0:4864:20::729 as permitted sender) smtp.mailfrom=rysto32@gmail.com X-Spamd-Result: default: False [-4.00 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; FREEMAIL_FROM(0.00)[gmail.com]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; IP_SCORE_FREEMAIL(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; IP_SCORE(0.00)[ip: (-9.31), ipnet: 2607:f8b0::/32(-2.85), asn: 15169(-2.32), country: US(-0.05)]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[gmail.com:+]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; RCVD_IN_DNSWL_NONE(0.00)[9.2.7.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; NEURAL_HAM_SHORT(-1.00)[-0.998,0]; TO_MATCH_ENVRCPT_ALL(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[]; DWL_DNSWL_NONE(0.00)[gmail.com.dwl.dnswl.org : 127.0.5.0] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 28 Aug 2019 17:28:27 -0000 Historically when processing callchain events from hwpmc, you could use PMC_CALLCHAIN_CPUFLAGS_TO_USERMODE(ev..pl_u.pl_cc.pl_cpuflags) to distinguish callchains that were captured in user mode from those captured in kernel mode. However, on 12.0-RELEASE and a month-old head, I have noticed that this macro never returns true anymore. Is there any way to make this distinction now, beyond an architecture-specific hack based off of the sample address? From owner-freebsd-current@freebsd.org Wed Aug 28 19:29:33 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 4FD07E465A for ; Wed, 28 Aug 2019 19:29:33 +0000 (UTC) (envelope-from rebecca@bsdio.com) Received: from muon.bsdio.com (muon.bluestop.org [65.103.231.193]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 46JbR02JtQz4bJ7 for ; Wed, 28 Aug 2019 19:29:31 +0000 (UTC) (envelope-from rebecca@bsdio.com) Received: from muon.bsdio.com (localhost [127.0.0.1]) by muon.bsdio.com (Postfix) with ESMTP id AB68EF8554 for ; Wed, 28 Aug 2019 13:29:29 -0600 (MDT) Received: from muon.bsdio.com ([127.0.0.1]) by muon.bsdio.com (muon.bsdio.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id tOHftuj0L2Bc for ; Wed, 28 Aug 2019 13:29:29 -0600 (MDT) Received: from photon.int.bluestop.org (unknown [10.0.10.120]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by muon.bsdio.com (Postfix) with ESMTPSA for ; Wed, 28 Aug 2019 13:29:29 -0600 (MDT) To: FreeBSD Current From: Rebecca Cran Subject: Host machines reboots when running bhyve VM Autocrypt: addr=rebecca@bsdio.com; keydata= mQINBFrUMZ4BEADI1yUEGeZeXeTCPay1ZpTBdDEpGPAw1dq2VCSTc1VhsnrEBa1iZxAfaeSv Uu5Ti7jlhQ/3sQMl0bJMKGB/RtmIW7k8h2w476oZmG8gChk8su5ZEx/pV1gdqInyFmmJKTYc gabJz8pL+m82w07qPv+oalepZ4dbj+HF++RAK/iEju+q9UHlsjj8e3mMNsvtrOz1K6bnpveO jZ+ms/2H3Hs5a4k8y6buwe2RvwhJQaXa13cR3LhzL+nwj4B9PHZZEa2WpEyYpw/bI0V9YSQN QgC1CYRzDyakZge6BCM6wHOgZSUzRPufGilrNKUwIVbRoIBR9/85+0wR+PlFUOUOfOc6ox7T dWcIx6PuPhek48rh4uwmmwsPtPiH4Z3T5p+GmWQ9NLFZKA1YnEdaSkWtYZsDxwVZZeYG2plt MfhXP0Hj4rf9Y3eoUenCaGioxAbUOBCtXdTGNAhNjz1g5NGDBVyhjKkzwJQvt9UrYTseERit 5dX2CMTy8hYLvSXd/Ivy+HylUS5IslfZxW5z9LgWX7Z97kILgkH3N0ewtLkygkG+Y+x7uaAV dFqp9ASOyzaiwKbJdeOI+WxRSh+AqeCR0S+bpkcLudLmbjrPmaFwjKycy1H85Z5R2J3YHyXY oT6OYjD8vLbUU2GWp6Onkcy1Pu8EMbRuzKil6HnpYg3BexbPFwARAQABtCNSZWJlY2NhIENy YW4gPHJlYmVjY2FAYmx1ZXN0b3Aub3JnPokCVwQTAQgAQQIbIwUJCWYBgAULCQgHAgYVCgkI CwIEFgIDAQIeAQIXgBYhBB+5fZtkTdO940Yr4g0CK1MRvhAgBQJa2B9zAhkBAAoJEA0CK1MR vhAgzJEQAJUqVmTRO9OqCSS2CVKjrqnEWJMvyo0K8B+WiXo0nSQg9+uyoVU7h2s/kkWVGy4u IWbGy2Qe8LiXzBJjHC3TadGvOvakfdMeKKXcgxgX6KlhA9hA2LW6tg22aHUk7Flr/8diHpgf qIwrXhqJXZmK72GR1QfhgoHsOsTJ9GWPswo1kUMc0cJowq0qP1RDdua6BwvDHHPJwu9OmC/i oQlMNm9gkBDq8H2B+m125ANwCnqBizXaiTTLQdewTMbCSuxbsni2icDqwBfFXzEgcJGaYYfB cQeFsfCmtXQK3JUd4Myx128Dxk9P3X64I93SB7QzB0nmWlyvmCFBNoCp0PCLA4qbwbw2sMRX Wx4BqYa8nI/jg+Nqo+Ut2BfltNZIlsHxK+XhxejfLqAjRCZeLnu1otvFnFuGLaAVYx9x1Y1q J8VizZxq6ujio62Qpultp6KNhlkJ+OKoGwA0k4NHh26SxvlsNxlfg/2v9b1LqWRzNujnwbcF 8g4902XjyBLxV+9YpXZEa8H6zzEHxpeDPWT3QfvrT8JuoHa1IyYnUKvG674UKW5zEGEwkQc9 cuQwR1RHd1ZrKtH1duXzaLr/caMp8ZDfGDDxFpenJTRxNRlg4+K7HSdhpac7sBVMUA8uVdE+ iuTThOmdf0c4DorL3BIh6Yv3FV4/NSqT1Wn3CG2fgG1guQINBFrUMZ4BEADkc4mvMcMcDF1t dNxNQuIBE1F243oZamG3LACCKfc1Yur3CPzHwIk5LXCUmbq23iE5bowxMWw3mlVT0p5xM0Wn UidIBwCKu4kRyy/fY4NyWWBuwy9srpTdmUcKRBRNB8zEZE8xIlidD1ijjgqLBfeM7n9ylawA xHLxwU96sdpdHFzb7Z0yKY2e/bzDaHiG0fUvcCmkgLf+uwKKZid1j8zR5PzKpgPqfy/PF01e KyGV3MNu8Y90xMoiEMWfCI2IB1m+hTuzZoboFvGV54SiMuvfWK/VMQjhsL6K2ddOqwVuy2nI MI4G3xDQW/v8KVyn43OSIAyW1eaklhzu0Ir2sO60PXRkvbTUrouvmSvpJfIQS49rU0M/X6FS DgXQLKrZ3my94+g8ptz9KoVml6s4OAwYVz+sb49nuSxipFKkU5FwhKOLmzbsBxCtytcUJoLm juJPJPDQue6YJiIXyc86GVY2pH3DjemKdbB4dSgqAJIp+lCzKSJzz7bgueh2Ox8vzx1tSxKj 7V8Nal+UTKKbkxPmMh+e20YZ4esAVifO3bS6IJP/aDnfagghB71vA7+aWGXPbjPlc2UHpCBi RSsl+IgoQXvdvZBsKRyfBx8neODa2C6JIE5vcaCjilSeKF8SzsFXvimnndhQNhAPU/DwQwSX dCl4gTsFVi5d8Oxq1sce+wARAQABiQI8BBgBCAAmFiEEH7l9m2RN073jRiviDQIrUxG+ECAF AlrUMZ4CGwwFCQlmAYAACgkQDQIrUxG+ECAWnRAAsmZX+KgNxW3v7R/76Tz4Wjmh4AGeE+Ji 3p5QsdTYny1B6vYBL9vCzPJ/AK8pgKMDRaweUP5eZQpfrdWC8Q7SNGgi4Q+97KEs+i2xZLQ+ WJb8a+WEEIc716u0y4ITiHfOgM5jWcFO4MXQATbJgv0drLLesa+LQCvZgPBqupt307EsCubQ s+Sxt+RVjf6rOUolp1GJXEQYwGsKklVd6yqLC8M1BSG53/WE5tSv5GzBZ8fp6EtmjT7leuid FtEvKYHQz4DqG9ELpHUF0X0UUCBK/MgXe3kCVLKE060UrJ4M6uPSx57rmVFA2MvwQR8M7GsW C5UsSM4PYwPWBhwxE7vcx0691YKAHT/5q8LxRVBdUyzPSprMhSQFttsBt+ygm6wRi3Pi3TuC EARNubPkQefyeC34yr40SAUCkOl3eWxSXPF4NfXFQb4AAzZSE5hv3qbDuwo3lrL0LqpIpEQP Az+JZ1QZ6mMFQ5/JD9Gukj54kZc0X8w3sQt0a8vyE/qrJg8vKgv2rCHrPc5MeDkEUEFiiJiC EDdkJtMyoRlU3S4NrnbyLOLEcHE8fGe3hStPX8hY62id2ecdQ5WZ7vLZW5SFeLarbUciuHIk VL6MHnUjbV7XlY50N7ebeFCIdlCWhdum2FJs/Ni+SSxbZC564vrokwlBBGSo6WTPQTa8IWx1 DtU= Message-ID: <1a4ea6a8-dccc-f7fd-d75d-a5a48471d812@bsdio.com> Date: Wed, 28 Aug 2019 13:29:24 -0600 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:68.0) Gecko/20100101 Thunderbird/68.0 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit Content-Language: en-US X-Rspamd-Queue-Id: 46JbR02JtQz4bJ7 X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=none (mx1.freebsd.org: domain of rebecca@bsdio.com has no SPF policy when checking 65.103.231.193) smtp.mailfrom=rebecca@bsdio.com X-Spamd-Result: default: False [-3.96 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-0.999,0]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; DMARC_NA(0.00)[bsdio.com]; AUTH_NA(1.00)[]; RCPT_COUNT_ONE(0.00)[1]; RCVD_COUNT_THREE(0.00)[4]; RCVD_TLS_LAST(0.00)[]; TO_DN_ALL(0.00)[]; NEURAL_HAM_SHORT(-0.98)[-0.983,0]; R_SPF_NA(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:209, ipnet:65.103.224.0/19, country:US]; MID_RHS_MATCH_FROM(0.00)[]; IP_SCORE(-1.88)[ip: (-9.30), asn: 209(-0.04), country: US(-0.05)] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 28 Aug 2019 19:29:33 -0000 I recently upgraded to r351575 and now when I run a Bhyve VM, the host machine instantly reboots. The command-line I'm running is: bhyve -c 2 -m 8G -w -H -s 0,hostbridge -s 4,virtio-blk,/home/bcran/cube/opensuse-jenkins-node.img -s 15,virtio-net,tap0 -s 28,virtio-rnd -s 29,fbuf,tcp=0.0.0.0:5900,w=1024,h=768 -s 31,lpc -l com1,stdio -l bootrom,/usr/local/share/uefi-firmware/BHYVE_UEFI.fd vm0 And the system (I've tried both GENERIC-NODEBUG and GENERIC) is: FreeBSD 13.0-CURRENT r351575 GENERIC-NODEBUG amd64 FreeBSD clang version 8.0.1 (tags/RELEASE_801/final 366581) (based on LLVM 8.0.1) VT(efifb): resolution 1024x768 CPU: AMD Ryzen Threadripper 2990WX 32-Core Processor (2994.44-MHz K8-class CPU)   Origin="AuthenticAMD"  Id=0x800f82  Family=0x17  Model=0x8  Stepping=2   Features=0x178bfbff   Features2=0x7ed8320b   AMD Features=0x2e500800   AMD Features2=0x35c233ff   Structured Extended Features=0x209c01a9   XSAVE Features=0xf   AMD Extended Feature Extensions ID EBX=0x1007   SVM: NP,NRIP,VClean,AFlush,DAssist,NAsids=32768   TSC: P-state invariant, performance statistics real memory  = 137438953472 (131072 MB) avail memory = 133601013760 (127411 MB) Event timer "LAPIC" quality 600 ACPI APIC Table: FreeBSD/SMP: Multiprocessor System Detected: 64 CPUs FreeBSD/SMP: 1 package(s) x 4 groups x 2 cache groups x 4 core(s) x 2 hardware threads -- Rebecca Cran From owner-freebsd-current@freebsd.org Wed Aug 28 19:50:43 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 3B59AE4D24 for ; Wed, 28 Aug 2019 19:50:43 +0000 (UTC) (envelope-from kostikbel@gmail.com) Received: from kib.kiev.ua (kib.kiev.ua [IPv6:2001:470:d5e7:1::1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 46JbvQ2JW0z4cMt for ; Wed, 28 Aug 2019 19:50:41 +0000 (UTC) (envelope-from kostikbel@gmail.com) Received: from tom.home (kib@localhost [127.0.0.1]) by kib.kiev.ua (8.15.2/8.15.2) with ESMTPS id x7SJoOtE039705 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO); Wed, 28 Aug 2019 22:50:27 +0300 (EEST) (envelope-from kostikbel@gmail.com) DKIM-Filter: OpenDKIM Filter v2.10.3 kib.kiev.ua x7SJoOtE039705 Received: (from kostik@localhost) by tom.home (8.15.2/8.15.2/Submit) id x7SJoOts039704; Wed, 28 Aug 2019 22:50:24 +0300 (EEST) (envelope-from kostikbel@gmail.com) X-Authentication-Warning: tom.home: kostik set sender to kostikbel@gmail.com using -f Date: Wed, 28 Aug 2019 22:50:24 +0300 From: Konstantin Belousov To: Rebecca Cran Cc: FreeBSD Current Subject: Re: Host machines reboots when running bhyve VM Message-ID: <20190828195024.GX71821@kib.kiev.ua> References: <1a4ea6a8-dccc-f7fd-d75d-a5a48471d812@bsdio.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1a4ea6a8-dccc-f7fd-d75d-a5a48471d812@bsdio.com> User-Agent: Mutt/1.12.1 (2019-06-15) X-Spam-Status: No, score=-1.0 required=5.0 tests=ALL_TRUSTED,BAYES_00, DKIM_ADSP_CUSTOM_MED,FORGED_GMAIL_RCVD,FREEMAIL_FROM, NML_ADSP_CUSTOM_MED autolearn=no autolearn_force=no version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tom.home X-Rspamd-Queue-Id: 46JbvQ2JW0z4cMt X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=fail reason="No valid SPF, No valid DKIM" header.from=gmail.com (policy=none); spf=softfail (mx1.freebsd.org: 2001:470:d5e7:1::1 is neither permitted nor denied by domain of kostikbel@gmail.com) smtp.mailfrom=kostikbel@gmail.com X-Spamd-Result: default: False [-2.98 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; RCVD_TLS_ALL(0.00)[]; FROM_HAS_DN(0.00)[]; FREEMAIL_FROM(0.00)[gmail.com]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; HAS_XAW(0.00)[]; R_SPF_SOFTFAIL(0.00)[~all]; IP_SCORE_FREEMAIL(0.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; TO_DN_ALL(0.00)[]; NEURAL_HAM_SHORT(-0.98)[-0.975,0]; RCPT_COUNT_TWO(0.00)[2]; IP_SCORE(0.00)[ip: (-2.61), ipnet: 2001:470::/32(-4.44), asn: 6939(-3.09), country: US(-0.05)]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:6939, ipnet:2001:470::/32, country:US]; RCVD_COUNT_TWO(0.00)[2]; FREEMAIL_ENVFROM(0.00)[gmail.com]; DMARC_POLICY_SOFTFAIL(0.10)[gmail.com : No valid SPF, No valid DKIM,none] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 28 Aug 2019 19:50:43 -0000 On Wed, Aug 28, 2019 at 01:29:24PM -0600, Rebecca Cran wrote: > I recently upgraded to r351575 and now when I run a Bhyve VM, the host > machine instantly reboots. The command-line I'm running is: > > > bhyve -c 2 -m 8G -w -H -s 0,hostbridge -s > 4,virtio-blk,/home/bcran/cube/opensuse-jenkins-node.img -s > 15,virtio-net,tap0 -s 28,virtio-rnd -s > 29,fbuf,tcp=0.0.0.0:5900,w=1024,h=768 -s 31,lpc -l com1,stdio -l > bootrom,/usr/local/share/uefi-firmware/BHYVE_UEFI.fd vm0 > > And the system (I've tried both GENERIC-NODEBUG and GENERIC) is: > > > FreeBSD 13.0-CURRENT r351575 GENERIC-NODEBUG amd64 Try https://reviews.freebsd.org/D21418 From owner-freebsd-current@freebsd.org Wed Aug 28 20:02:41 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 7266BE5155 for ; Wed, 28 Aug 2019 20:02:41 +0000 (UTC) (envelope-from rebecca@bsdio.com) Received: from muon.bsdio.com (muon.bluestop.org [65.103.231.193]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 46Jc9D5KXsz4d5j for ; Wed, 28 Aug 2019 20:02:40 +0000 (UTC) (envelope-from rebecca@bsdio.com) Received: from muon.bsdio.com (localhost [127.0.0.1]) by muon.bsdio.com (Postfix) with ESMTP id 103BBF85BC; Wed, 28 Aug 2019 14:02:43 -0600 (MDT) Received: from muon.bsdio.com ([127.0.0.1]) by muon.bsdio.com (muon.bsdio.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id ITaZfwUjMayJ; Wed, 28 Aug 2019 14:02:42 -0600 (MDT) Received: from photon.int.bluestop.org (unknown [10.0.10.120]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by muon.bsdio.com (Postfix) with ESMTPSA; Wed, 28 Aug 2019 14:02:42 -0600 (MDT) Subject: Re: Host machines reboots when running bhyve VM To: Konstantin Belousov Cc: FreeBSD Current References: <1a4ea6a8-dccc-f7fd-d75d-a5a48471d812@bsdio.com> <20190828195024.GX71821@kib.kiev.ua> From: Rebecca Cran Autocrypt: addr=rebecca@bsdio.com; keydata= mQINBFrUMZ4BEADI1yUEGeZeXeTCPay1ZpTBdDEpGPAw1dq2VCSTc1VhsnrEBa1iZxAfaeSv Uu5Ti7jlhQ/3sQMl0bJMKGB/RtmIW7k8h2w476oZmG8gChk8su5ZEx/pV1gdqInyFmmJKTYc gabJz8pL+m82w07qPv+oalepZ4dbj+HF++RAK/iEju+q9UHlsjj8e3mMNsvtrOz1K6bnpveO jZ+ms/2H3Hs5a4k8y6buwe2RvwhJQaXa13cR3LhzL+nwj4B9PHZZEa2WpEyYpw/bI0V9YSQN QgC1CYRzDyakZge6BCM6wHOgZSUzRPufGilrNKUwIVbRoIBR9/85+0wR+PlFUOUOfOc6ox7T dWcIx6PuPhek48rh4uwmmwsPtPiH4Z3T5p+GmWQ9NLFZKA1YnEdaSkWtYZsDxwVZZeYG2plt MfhXP0Hj4rf9Y3eoUenCaGioxAbUOBCtXdTGNAhNjz1g5NGDBVyhjKkzwJQvt9UrYTseERit 5dX2CMTy8hYLvSXd/Ivy+HylUS5IslfZxW5z9LgWX7Z97kILgkH3N0ewtLkygkG+Y+x7uaAV dFqp9ASOyzaiwKbJdeOI+WxRSh+AqeCR0S+bpkcLudLmbjrPmaFwjKycy1H85Z5R2J3YHyXY oT6OYjD8vLbUU2GWp6Onkcy1Pu8EMbRuzKil6HnpYg3BexbPFwARAQABtCNSZWJlY2NhIENy YW4gPHJlYmVjY2FAYmx1ZXN0b3Aub3JnPokCVwQTAQgAQQIbIwUJCWYBgAULCQgHAgYVCgkI CwIEFgIDAQIeAQIXgBYhBB+5fZtkTdO940Yr4g0CK1MRvhAgBQJa2B9zAhkBAAoJEA0CK1MR vhAgzJEQAJUqVmTRO9OqCSS2CVKjrqnEWJMvyo0K8B+WiXo0nSQg9+uyoVU7h2s/kkWVGy4u IWbGy2Qe8LiXzBJjHC3TadGvOvakfdMeKKXcgxgX6KlhA9hA2LW6tg22aHUk7Flr/8diHpgf qIwrXhqJXZmK72GR1QfhgoHsOsTJ9GWPswo1kUMc0cJowq0qP1RDdua6BwvDHHPJwu9OmC/i oQlMNm9gkBDq8H2B+m125ANwCnqBizXaiTTLQdewTMbCSuxbsni2icDqwBfFXzEgcJGaYYfB cQeFsfCmtXQK3JUd4Myx128Dxk9P3X64I93SB7QzB0nmWlyvmCFBNoCp0PCLA4qbwbw2sMRX Wx4BqYa8nI/jg+Nqo+Ut2BfltNZIlsHxK+XhxejfLqAjRCZeLnu1otvFnFuGLaAVYx9x1Y1q J8VizZxq6ujio62Qpultp6KNhlkJ+OKoGwA0k4NHh26SxvlsNxlfg/2v9b1LqWRzNujnwbcF 8g4902XjyBLxV+9YpXZEa8H6zzEHxpeDPWT3QfvrT8JuoHa1IyYnUKvG674UKW5zEGEwkQc9 cuQwR1RHd1ZrKtH1duXzaLr/caMp8ZDfGDDxFpenJTRxNRlg4+K7HSdhpac7sBVMUA8uVdE+ iuTThOmdf0c4DorL3BIh6Yv3FV4/NSqT1Wn3CG2fgG1guQINBFrUMZ4BEADkc4mvMcMcDF1t dNxNQuIBE1F243oZamG3LACCKfc1Yur3CPzHwIk5LXCUmbq23iE5bowxMWw3mlVT0p5xM0Wn UidIBwCKu4kRyy/fY4NyWWBuwy9srpTdmUcKRBRNB8zEZE8xIlidD1ijjgqLBfeM7n9ylawA xHLxwU96sdpdHFzb7Z0yKY2e/bzDaHiG0fUvcCmkgLf+uwKKZid1j8zR5PzKpgPqfy/PF01e KyGV3MNu8Y90xMoiEMWfCI2IB1m+hTuzZoboFvGV54SiMuvfWK/VMQjhsL6K2ddOqwVuy2nI MI4G3xDQW/v8KVyn43OSIAyW1eaklhzu0Ir2sO60PXRkvbTUrouvmSvpJfIQS49rU0M/X6FS DgXQLKrZ3my94+g8ptz9KoVml6s4OAwYVz+sb49nuSxipFKkU5FwhKOLmzbsBxCtytcUJoLm juJPJPDQue6YJiIXyc86GVY2pH3DjemKdbB4dSgqAJIp+lCzKSJzz7bgueh2Ox8vzx1tSxKj 7V8Nal+UTKKbkxPmMh+e20YZ4esAVifO3bS6IJP/aDnfagghB71vA7+aWGXPbjPlc2UHpCBi RSsl+IgoQXvdvZBsKRyfBx8neODa2C6JIE5vcaCjilSeKF8SzsFXvimnndhQNhAPU/DwQwSX dCl4gTsFVi5d8Oxq1sce+wARAQABiQI8BBgBCAAmFiEEH7l9m2RN073jRiviDQIrUxG+ECAF AlrUMZ4CGwwFCQlmAYAACgkQDQIrUxG+ECAWnRAAsmZX+KgNxW3v7R/76Tz4Wjmh4AGeE+Ji 3p5QsdTYny1B6vYBL9vCzPJ/AK8pgKMDRaweUP5eZQpfrdWC8Q7SNGgi4Q+97KEs+i2xZLQ+ WJb8a+WEEIc716u0y4ITiHfOgM5jWcFO4MXQATbJgv0drLLesa+LQCvZgPBqupt307EsCubQ s+Sxt+RVjf6rOUolp1GJXEQYwGsKklVd6yqLC8M1BSG53/WE5tSv5GzBZ8fp6EtmjT7leuid FtEvKYHQz4DqG9ELpHUF0X0UUCBK/MgXe3kCVLKE060UrJ4M6uPSx57rmVFA2MvwQR8M7GsW C5UsSM4PYwPWBhwxE7vcx0691YKAHT/5q8LxRVBdUyzPSprMhSQFttsBt+ygm6wRi3Pi3TuC EARNubPkQefyeC34yr40SAUCkOl3eWxSXPF4NfXFQb4AAzZSE5hv3qbDuwo3lrL0LqpIpEQP Az+JZ1QZ6mMFQ5/JD9Gukj54kZc0X8w3sQt0a8vyE/qrJg8vKgv2rCHrPc5MeDkEUEFiiJiC EDdkJtMyoRlU3S4NrnbyLOLEcHE8fGe3hStPX8hY62id2ecdQ5WZ7vLZW5SFeLarbUciuHIk VL6MHnUjbV7XlY50N7ebeFCIdlCWhdum2FJs/Ni+SSxbZC564vrokwlBBGSo6WTPQTa8IWx1 DtU= Message-ID: <2cce63b7-a995-2a13-4f4f-752a98b513ef@bsdio.com> Date: Wed, 28 Aug 2019 14:02:38 -0600 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:68.0) Gecko/20100101 Thunderbird/68.0 MIME-Version: 1.0 In-Reply-To: <20190828195024.GX71821@kib.kiev.ua> Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Content-Language: en-US X-Rspamd-Queue-Id: 46Jc9D5KXsz4d5j X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=none (mx1.freebsd.org: domain of rebecca@bsdio.com has no SPF policy when checking 65.103.231.193) smtp.mailfrom=rebecca@bsdio.com X-Spamd-Result: default: False [-3.95 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; FROM_HAS_DN(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; RCVD_TLS_LAST(0.00)[]; DMARC_NA(0.00)[bsdio.com]; AUTH_NA(1.00)[]; RCVD_COUNT_THREE(0.00)[4]; TO_MATCH_ENVRCPT_SOME(0.00)[]; TO_DN_ALL(0.00)[]; NEURAL_HAM_SHORT(-0.98)[-0.980,0]; RCPT_COUNT_TWO(0.00)[2]; R_SPF_NA(0.00)[]; FREEMAIL_TO(0.00)[gmail.com]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:209, ipnet:65.103.224.0/19, country:US]; MID_RHS_MATCH_FROM(0.00)[]; IP_SCORE(-1.87)[ip: (-9.26), asn: 209(-0.04), country: US(-0.05)] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 28 Aug 2019 20:02:41 -0000 On 2019-08-28 13:50, Konstantin Belousov wrote: > > Try https://reviews.freebsd.org/D21418 Thanks! That fixed it. -- Rebecca Cran From owner-freebsd-current@freebsd.org Wed Aug 28 21:09:49 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 111D5E67EF for ; Wed, 28 Aug 2019 21:09:49 +0000 (UTC) (envelope-from rysto32@gmail.com) Received: from mail-qk1-x733.google.com (mail-qk1-x733.google.com [IPv6:2607:f8b0:4864:20::733]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46Jdfh1vGHz3F83 for ; Wed, 28 Aug 2019 21:09:48 +0000 (UTC) (envelope-from rysto32@gmail.com) Received: by mail-qk1-x733.google.com with SMTP id f13so998896qkm.9 for ; Wed, 28 Aug 2019 14:09:48 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:from:date:message-id:subject:to; bh=kJH8WrC29+J7VazjzJ40dOkjJFZWls/GjB/+SUjD61s=; b=IwW3zGe4p6dtVgknHr8PUu0CN1uXFJaSUTCC4A+aCIc3iXoH8vhzYa6cS0rfB1J792 9bh93+MEjAbsoX10LRDPnHe20RRVDv6R1wrgGWami0eMBY4gLqhJAYfrhDOx4SJ6b2OG CYk690stHkY2m7zqa5nicrF9gMc020iI2hsAtWPtGacyV6WpLjBEaaE3Aeha71QDpsQs ysgX33Pm1efs081xRjAATgTUeTtcNVITsf34lDudFx8tW0KOrOLN8Sj5JP2HLBqSKgzJ HZmPpOwzHjiRAtlPJQjAbE3hfBqRakpxIbdy8GPHHACFjwmOYyKP9E27cStDhYvmZ2SJ AKHg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=kJH8WrC29+J7VazjzJ40dOkjJFZWls/GjB/+SUjD61s=; b=OGvSSXAbSD5h5rZNYJHwEosoFDze8JvVJgNKotTiEuNNIOEN5qoZH5QhYKgk7vyhTk ynVnoHGcI92u3maFYIDvoMOi951TwbM18k3gW6W43ssrdrmlr/dEyHANaD0NR8V2dTJL VIWoUazhau2q3RZanGzaLYWneuOLk4laoYPpeepizCR9cxzrdwAj3b4IKVvK5LFKvt7a ZLWRFnc/kk5J/lhup8z+IZFUo2m35pJAQUTxDMP6v3MVixqUQh94eHaBpNmmnNf0Lm5t UQxMWYGVF9utZ55s6Vwu7wdnAIIlnXzaewQlWpPMgunV4ow5eHavNisKKH/bNKsUTm9P B8Tw== X-Gm-Message-State: APjAAAXEAM4KzlrI3dyfZhSFvSG/bp6uDSH3XHiDHVgX6dkeszHFMR8V ymSZDARd/CgSLwMuc6iWB7L05r4cfFj/m+RqupXCz0gT X-Google-Smtp-Source: APXvYqx/6kX6qmA7lpp/W4girhpJIAGJS1TAXhADiJm2cyTkArYiBZvXCEHIzm8wWmuF8ckpkpCEfWHQYaeztS1Zyqc= X-Received: by 2002:a37:4fcf:: with SMTP id d198mr6197072qkb.394.1567026587003; Wed, 28 Aug 2019 14:09:47 -0700 (PDT) MIME-Version: 1.0 From: Ryan Stone Date: Wed, 28 Aug 2019 17:09:35 -0400 Message-ID: Subject: Lost user database after bungled upgrade To: FreeBSD Current Content-Type: text/plain; charset="UTF-8" X-Rspamd-Queue-Id: 46Jdfh1vGHz3F83 X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=IwW3zGe4; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of rysto32@gmail.com designates 2607:f8b0:4864:20::733 as permitted sender) smtp.mailfrom=rysto32@gmail.com X-Spamd-Result: default: False [-4.00 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; FREEMAIL_FROM(0.00)[gmail.com]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; IP_SCORE_FREEMAIL(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; IP_SCORE(0.00)[ip: (-9.34), ipnet: 2607:f8b0::/32(-2.85), asn: 15169(-2.32), country: US(-0.05)]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[gmail.com:+]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; RCVD_IN_DNSWL_NONE(0.00)[3.3.7.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; NEURAL_HAM_SHORT(-1.00)[-0.998,0]; TO_MATCH_ENVRCPT_ALL(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[]; DWL_DNSWL_NONE(0.00)[gmail.com.dwl.dnswl.org : 127.0.5.0] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 28 Aug 2019 21:09:49 -0000 Hi everybody, I lost /etc/master.passwd and friends while trying to recover from an src upgrade gone wrong. I'm trying to run "pkg upgrade -f" to get all of the users and groups created by packages recreating, but pkg is hitting an assert related to uids: Checking integrity...Assertion failed: (strcmp(uid, p->uid) != 0), function pkg_conflicts_check_local_path, file pkg_jobs_conflicts.c, line 386. Is there any way to get past this, or is the system toast? From owner-freebsd-current@freebsd.org Wed Aug 28 21:20:38 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 1146EE6B5D for ; Wed, 28 Aug 2019 21:20:38 +0000 (UTC) (envelope-from gpalmer@freebsd.org) Received: from mail.in-addr.com (mail.in-addr.com [IPv6:2a01:4f8:191:61e8::2525:2525]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 46Jdv95324z3FkS for ; Wed, 28 Aug 2019 21:20:37 +0000 (UTC) (envelope-from gpalmer@freebsd.org) Received: from gjp by mail.in-addr.com with local (Exim 4.92.1 (FreeBSD)) (envelope-from ) id 1i35Mb-000K71-JG; Wed, 28 Aug 2019 22:20:21 +0100 Date: Wed, 28 Aug 2019 22:20:21 +0100 From: Gary Palmer To: Ryan Stone Cc: FreeBSD Current Subject: Re: Lost user database after bungled upgrade Message-ID: <20190828212021.GA66282@in-addr.com> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-SA-Exim-Connect-IP: X-SA-Exim-Mail-From: gpalmer@freebsd.org X-SA-Exim-Scanned: No (on mail.in-addr.com); SAEximRunCond expanded to false X-Rspamd-Queue-Id: 46Jdv95324z3FkS X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; none X-Spamd-Result: default: False [-2.98 / 15.00]; local_wl_from(0.00)[freebsd.org]; NEURAL_HAM_MEDIUM(-1.00)[-0.999,0]; NEURAL_HAM_SHORT(-0.98)[-0.981,0]; ASN(0.00)[asn:24940, ipnet:2a01:4f8::/29, country:DE]; NEURAL_HAM_LONG(-1.00)[-1.000,0] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 28 Aug 2019 21:20:38 -0000 On Wed, Aug 28, 2019 at 05:09:35PM -0400, Ryan Stone wrote: > Hi everybody, > > I lost /etc/master.passwd and friends while trying to recover from an > src upgrade gone wrong. I'm trying to run "pkg upgrade -f" to get all > of the users and groups created by packages recreating, but pkg is > hitting an assert related to uids: > > Checking integrity...Assertion failed: (strcmp(uid, p->uid) != 0), > function pkg_conflicts_check_local_path, file pkg_jobs_conflicts.c, > line 386. > > Is there any way to get past this, or is the system toast? Did you try restoring from the backups under /var/backups? There should be master.passwd in there which can be restored and /etc/passwd and the DB files regenarated with pwd_mkdb (I think, never tried) Regards, Gary From owner-freebsd-current@freebsd.org Wed Aug 28 22:07:31 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id D0E5FE7B5D for ; Wed, 28 Aug 2019 22:07:31 +0000 (UTC) (envelope-from mavbsd@gmail.com) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 46JfxH4BNHz3J9R for ; Wed, 28 Aug 2019 22:07:31 +0000 (UTC) (envelope-from mavbsd@gmail.com) Received: by mailman.nyi.freebsd.org (Postfix) id 8FB7DE7B5C; Wed, 28 Aug 2019 22:07:31 +0000 (UTC) Delivered-To: current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 8F77EE7B5B for ; Wed, 28 Aug 2019 22:07:31 +0000 (UTC) (envelope-from mavbsd@gmail.com) Received: from mail-yw1-xc33.google.com (mail-yw1-xc33.google.com [IPv6:2607:f8b0:4864:20::c33]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46JfxG4tdZz3J9Q; Wed, 28 Aug 2019 22:07:30 +0000 (UTC) (envelope-from mavbsd@gmail.com) Received: by mail-yw1-xc33.google.com with SMTP id e65so465374ywh.0; Wed, 28 Aug 2019 15:07:30 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:subject:to:cc:references:from:autocrypt:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=dNugOUBrIWgBjBKrmr1T7tzAdzJyELUPrRltYZ7/5S8=; b=OCH1+tCrEFpRWPqv+/xoV57roNBEEarQSK4F+orvMPh0yFnU7VCUnnTD/TkUZRqXKx YmpTVtQD4ZIFEaSj6gcAPVULWrITaiq/pu7Y+vXfgkVqy4/ZlY/MlTN1QzwoG7p+ILHf +IDWET2yWRjIPdu9TdhQSmfAdShO+ovnVes2irK3QvVEuQDotPEDU8RUE715MhgbLViG xSnc8Cr+pj7QKqHo/D89vaoxftxxON6GLGTkhtX8E+MlgByi3YU9dFc9w/zKZDlwPorw sR4JC9lp3rqE6JtRCR93fCfBAPF42NA/j8eXZU+s1nSThXN82DXqCn2EL1D3c+eUVEVR nDQw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:subject:to:cc:references:from:autocrypt :message-id:date:user-agent:mime-version:in-reply-to :content-language:content-transfer-encoding; bh=dNugOUBrIWgBjBKrmr1T7tzAdzJyELUPrRltYZ7/5S8=; b=OYxJXg3Ou1e7nbuiiNJWkWRAPadeXW1yaP0CzBV9AjsTnxGMWwtQgUratPyn4iN8hh MppRlpK/Qfth6JDu6U1OpCwMZrEaZsWCNomkd7O0mwWE2XPv8FE9Re/+xmtKNDcLKq8S 0y9fz12YstuNFPGvVsaou1asF2bujnMEVeGWichZUCdUMCKciNofBvr3w2PKxZX2dlT2 Gxe77WuQthKnmiuVU+B1mN/RxKv36Foi0XRh8wBwRFtHmPQliAWreh1OOWmmCCQA1kxa tHV6MC4eFttrnRxULXVH0/MGxB0Af77ED+MqTOeb3EesgamdJAjA2SNmN1p/jPNKmKhi 0bHw== X-Gm-Message-State: APjAAAXpaBE34O6pK07MnuoNl/TQFYl7Y+YOABAYZMgyTfS2HTmggOgc CRr1yKYkTCwjWX9LUxYp0899JqhPpxU= X-Google-Smtp-Source: APXvYqzRn2jwTjCfUs3otrJDropsbUv0X7w8ElQMAO3AUUNY5pfApBSbG2XBHtZqIdgEZh+N18Qcaw== X-Received: by 2002:a81:48c:: with SMTP id 134mr4514680ywe.387.1567030048970; Wed, 28 Aug 2019 15:07:28 -0700 (PDT) Received: from mavoffice.ixsystems.com ([12.189.233.129]) by smtp.gmail.com with ESMTPSA id v141sm110842ywe.66.2019.08.28.15.07.28 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Wed, 28 Aug 2019 15:07:28 -0700 (PDT) Sender: Alexander Motin Subject: Re: ses no longer attaches To: Niclas Zeising , imp@FreeBSD.org Cc: current@FreeBSD.org References: <90483961-9da2-fba1-21da-c38b28e99e06@freebsd.org> <41c91917-13c2-f3a7-d8fd-6464c2ce3c6d@freebsd.org> From: Alexander Motin Autocrypt: addr=mav@FreeBSD.org; prefer-encrypt=mutual; keydata= mQENBFOzxAwBCADkPrax0pI2W/ig0CK9nRJJwsHitAGEZ2HZiFEuti+6/4UVxj81yr4ak/4g 9bKUyC7rMEAp/ZHNhd+MFCPAAcHPvtovnfykqE/vuosCS3wlSLloix2iKVLks0CwbLHGAyne 46lTQW74Xl/33c3W1Z6d8jD9gVFT/xaVzZ0U9xdzOmsYAZaAj4ki0tuxO9F7L+ct9grRe7iP g8t9hai7BL4ee3VRwk2JXnKb7UvBiVITKYWKz1jRvZIrjPokgEcCLOSlv7x/1kjuFnj3xWZU 7HSFFT8J93epBbrSSCsYsppIk2fZH41kaaFXsMQfTPH8wkeM6qwrvOh4HiQM08R+9tThABEB AAG0IUFsZXhhbmRlciBNb3RpbiA8bWF2QEZyZWVCU0Qub3JnPokBVwQTAQoAQQIbAwULCQgH AwUVCgkICwUWAwIBAAIeAQIXgAIZARYhBOmM88TmnMPNDledVYMYw5VbqyJ/BQJZYMKuBQkN McyiAAoJEIMYw5VbqyJ/tuUIAOG3ONOSNYqjK4eTZ1TVh9jdUBAhWk5nhDFnODN49Wj0AbYm 7aIqy8O1hnCDSZG5LttjSAo3UfXJZDKQM0BLb0gpRMBnAYqO6tdolLNqAbPGJBnGoPjsh24y 6KcbDaNnis+lD4GwPXwQM+92wZGhCUFElPV9NciZGVS65TNIgk7X+yEjjhD1MSWKKijZ1r9Z zIt4OzUTxxNOvzdlABZS88nNRdJkatOQJPmFdd1mpP6UzTNCiLUo1pIqOEtJgvVVDYq5WHY6 tciWWYdmZG/tIBexJmv2mV2OLVjXR6ZeKmntVH14H72/wRHJuYHQC+r5SVRcWWayrThsY6jZ Yr4+raS5AQ0EU7PEDAEIAOZgWf2cJIu+58IzP2dkXE/urj3tr4OqrB/yHGWUf71Lz6D0Fi6Z AXgDtmcFLGPfMyWuLAvSM+xmoguk7zC4hRBYvQycmIhuqBq1jO1Wp/Z+lpoPM/1cDYLn8Flv mI/c40MhUZh345DA4jYWWaZNjQHUWVQ1fPf595vdVVMPT/abE8E5DaF6fSkRmqFTmfYRkfbt 3ytU8NdUapDcJVY7cEP2nJBVNZPnOIObR/ZIgSxjjrG5o34yXoqeup8JvwEv+/NylzzuyXEZ R1EdEIzQ/a1nh/0j4NXtzZEqKW4aTWlmSqb6wN8jh1OSOOqkYsfnE3nfxcZbxi4IRoNQYlm5 9R8AEQEAAYkBPAQYAQoAJgIbDBYhBOmM88TmnMPNDledVYMYw5VbqyJ/BQJZYMLYBQkNMczM AAoJEIMYw5VbqyJ/TqgH/RQHClkvecE0262lwKoP/m0Mh4I5TLRgoJJn8S7G1BnqohYJkiLq A6xe6urGD7OqdNAl12UbrjWbdJV+zvea3vJoM4MZuYiYrGaXWxzFXqWJcPwMU9sAh8MRghHu uC5vgPb45Tnftw9/+n0i8GfVhQhOqepUGdQg4NPcXviSkoAvig6pp9Lcxisn0groUQKt15Gc sS9YcQWg3j9Hnipc6Mu416HX98Fb113NHJqc2geTHLkRyuBFOoyIqB6N9GKjzOAIzxxsVdl9 TevwGsrp4M4/RFzWbSgsbOnbE7454lmuVZGfReEjnUm8RHp9Q2UWKXlp3exlZjvOp/uVEpCg lz65AQ0EU7PEDAEIAOZgWf2cJIu+58IzP2dkXE/urj3tr4OqrB/yHGWUf71Lz6D0Fi6ZAXgD tmcFLGPfMyWuLAvSM+xmoguk7zC4hRBYvQycmIhuqBq1jO1Wp/Z+lpoPM/1cDYLn8FlvmI/c 40MhUZh345DA4jYWWaZNjQHUWVQ1fPf595vdVVMPT/abE8E5DaF6fSkRmqFTmfYRkfbt3ytU 8NdUapDcJVY7cEP2nJBVNZPnOIObR/ZIgSxjjrG5o34yXoqeup8JvwEv+/NylzzuyXEZR1Ed EIzQ/a1nh/0j4NXtzZEqKW4aTWlmSqb6wN8jh1OSOOqkYsfnE3nfxcZbxi4IRoNQYlm59R8A EQEAAYkBPAQYAQoAJgIbDBYhBOmM88TmnMPNDledVYMYw5VbqyJ/BQJZYMLYBQkNMczMAAoJ EIMYw5VbqyJ/TqgH/RQHClkvecE0262lwKoP/m0Mh4I5TLRgoJJn8S7G1BnqohYJkiLqA6xe 6urGD7OqdNAl12UbrjWbdJV+zvea3vJoM4MZuYiYrGaXWxzFXqWJcPwMU9sAh8MRghHuuC5v gPb45Tnftw9/+n0i8GfVhQhOqepUGdQg4NPcXviSkoAvig6pp9Lcxisn0groUQKt15GcsS9Y cQWg3j9Hnipc6Mu416HX98Fb113NHJqc2geTHLkRyuBFOoyIqB6N9GKjzOAIzxxsVdl9Tevw Gsrp4M4/RFzWbSgsbOnbE7454lmuVZGfReEjnUm8RHp9Q2UWKXlp3exlZjvOp/uVEpCglz4= Message-ID: <2ecfba45-2819-947a-9744-1f06f3304eee@FreeBSD.org> Date: Wed, 28 Aug 2019 18:07:27 -0400 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:68.0) Gecko/20100101 Thunderbird/68.0 MIME-Version: 1.0 In-Reply-To: <41c91917-13c2-f3a7-d8fd-6464c2ce3c6d@freebsd.org> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: 46JfxG4tdZz3J9Q X-Spamd-Bar: ------ Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=OCH1+tCr; dmarc=none; spf=pass (mx1.freebsd.org: domain of mavbsd@gmail.com designates 2607:f8b0:4864:20::c33 as permitted sender) smtp.mailfrom=mavbsd@gmail.com X-Spamd-Result: default: False [-6.05 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; RCVD_TLS_ALL(0.00)[]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36:c]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[FreeBSD.org]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; TO_DN_SOME(0.00)[]; RCVD_COUNT_THREE(0.00)[3]; IP_SCORE(-2.87)[ip: (-9.12), ipnet: 2607:f8b0::/32(-2.85), asn: 15169(-2.32), country: US(-0.05)]; DKIM_TRACE(0.00)[gmail.com:+]; NEURAL_HAM_SHORT(-0.99)[-0.986,0]; RCVD_IN_DNSWL_NONE(0.00)[3.3.c.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; FORGED_SENDER(0.30)[mav@FreeBSD.org,mavbsd@gmail.com]; MIME_TRACE(0.00)[0:+]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; FROM_NEQ_ENVFROM(0.00)[mav@FreeBSD.org,mavbsd@gmail.com]; MID_RHS_MATCH_FROM(0.00)[] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 28 Aug 2019 22:07:31 -0000 On 27.08.2019 19:15, Niclas Zeising wrote: > I did some more digging. r351355 is ok, while r351356 is bad.  This is > Warner's (CC:d) commit to add RST support to nvme, however, I'm using a > ssd drive connected to ahci. > > What happens is that the ses driver doesn't attach to the AHCI SGPIO > enclosure.  This is on a laptop with an ssd (not an nvme) drive.  I have > the same issue on another computer as well.  On the broken kernel, > sesutil status complains about "No SES devices found", on the working > kernel it reports "ok". Thank you for the report. r351589 should fix it. -- Alexander Motin From owner-freebsd-current@freebsd.org Wed Aug 28 22:09:39 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 5F37EE7CA8 for ; Wed, 28 Aug 2019 22:09:39 +0000 (UTC) (envelope-from rysto32@gmail.com) Received: from mail-qk1-x729.google.com (mail-qk1-x729.google.com [IPv6:2607:f8b0:4864:20::729]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46Jfzl1wCGz3JKJ; Wed, 28 Aug 2019 22:09:39 +0000 (UTC) (envelope-from rysto32@gmail.com) Received: by mail-qk1-x729.google.com with SMTP id w18so1251400qki.0; Wed, 28 Aug 2019 15:09:38 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=/H2+PT7qoU9+RsCwNpqeH+9Bfz6VD4YOyMpGwsExoo0=; b=cs1t3+KQvoqmFzcjyMVnSaQsQI3HTqFOBoeSHe7EPjLI7cGyt3vRQDVGH4WGE0kqJk mgQMVPcZ4cdedfFNmj838tjH80sPozfdbcE6oIJSLFuN1bYvL11DQF/+qm8ZIfkZx/dL D2TTh++WFVVZfLJwZ/3om+PHooaV4JWrNXNNugD3DMEdFWkOFF8c4dRrWqyRoNnVbnu9 IuBY4LmKTBFTvl7bRKFAQDRoz1yzPSiav95WmTXybwd3U4fEyYo9gISUwWknCQEn3KnE Ck9Rt9QHD5vfJ9TMYxW4XYoeP+fR14v3EyAhfmJOSXbH9CWsRCRFmqbBPagc0INKIII9 I2Dg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=/H2+PT7qoU9+RsCwNpqeH+9Bfz6VD4YOyMpGwsExoo0=; b=R3Coxstcb8FBIJqjYaWS/n9SOfFv0kU/oe/bkgWWMp4jsD2LY/hjnXHmfzv+Jlfhgf CDB4RKmEpSU1m8WjtENriR89CHOSq7PHIi9ajbetb39yUWyp/+eCiLanrGw1KsNmJYi7 fwyXiAeLsYB1CQVVsuccMBTo/wHdrX662DwUj0vUE8IpefS2e+B3I01tQXY8W2SDFvRL PoLUjXsh2FZ6BPCytiSCyPsiTxuhlQI4XJ38VvXrYBSpiU4sXezPeRQJqG9waly0Hc4j PfMhSOc+MOjPNYt89KEG/aky1xp7r7JeuJn6RZgRxF9Neb2M3cwEIJTyMF3CR8iDzh+V 3OuQ== X-Gm-Message-State: APjAAAWSUN/WRGI4gJrxauxr7djW1Q0eoTvDLFpTGksnK8bW8XB4bsM8 LXrEf4eBFT3AlJGEeZ01TQ0+XyLx9ujZPYSOJ4PMKQ== X-Google-Smtp-Source: APXvYqyzljQw/xkNqcJkxaQcE/E7aA6NkZJHJR5gLOIpLOFRgTypDFyktxifzz9HwZ5pk8E3TcL3GwbPJzEHBVM8R1U= X-Received: by 2002:a37:883:: with SMTP id 125mr5799766qki.478.1567030177904; Wed, 28 Aug 2019 15:09:37 -0700 (PDT) MIME-Version: 1.0 References: <20190828212021.GA66282@in-addr.com> In-Reply-To: <20190828212021.GA66282@in-addr.com> From: Ryan Stone Date: Wed, 28 Aug 2019 18:09:26 -0400 Message-ID: Subject: Re: Lost user database after bungled upgrade To: Gary Palmer Cc: FreeBSD Current Content-Type: text/plain; charset="UTF-8" X-Rspamd-Queue-Id: 46Jfzl1wCGz3JKJ X-Spamd-Bar: ------ Authentication-Results: mx1.freebsd.org; none X-Spamd-Result: default: False [-6.99 / 15.00]; NEURAL_HAM_MEDIUM(-1.00)[-0.999,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; REPLY(-4.00)[]; NEURAL_HAM_SHORT(-0.99)[-0.988,0] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 28 Aug 2019 22:09:39 -0000 Thanks for the hint; I wasn't aware of /var/backups. Unfortunately fixing my user database at this point hasn't fixed pkg. I'm worried that it has some bad data cached somewhere now. I tried restoring the pkg databack from /var/backups but that hasn't helped. On Wed, Aug 28, 2019 at 5:20 PM Gary Palmer wrote: > > On Wed, Aug 28, 2019 at 05:09:35PM -0400, Ryan Stone wrote: > > Hi everybody, > > > > I lost /etc/master.passwd and friends while trying to recover from an > > src upgrade gone wrong. I'm trying to run "pkg upgrade -f" to get all > > of the users and groups created by packages recreating, but pkg is > > hitting an assert related to uids: > > > > Checking integrity...Assertion failed: (strcmp(uid, p->uid) != 0), > > function pkg_conflicts_check_local_path, file pkg_jobs_conflicts.c, > > line 386. > > > > Is there any way to get past this, or is the system toast? > > Did you try restoring from the backups under /var/backups? There should > be master.passwd in there which can be restored and /etc/passwd and > the DB files regenarated with pwd_mkdb (I think, never tried) > > Regards, > > Gary From owner-freebsd-current@freebsd.org Wed Aug 28 22:34:26 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 9442EE8386 for ; Wed, 28 Aug 2019 22:34:26 +0000 (UTC) (envelope-from mms.vanbreukelingen@gmail.com) Received: from mail-qt1-x842.google.com (mail-qt1-x842.google.com [IPv6:2607:f8b0:4864:20::842]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46JgXK56Bcz3KV7 for ; Wed, 28 Aug 2019 22:34:25 +0000 (UTC) (envelope-from mms.vanbreukelingen@gmail.com) Received: by mail-qt1-x842.google.com with SMTP id u34so1493879qte.2 for ; Wed, 28 Aug 2019 15:34:25 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=date:from:reply-to:to:cc:message-id:subject:mime-version:references; bh=0q3Yk1Hxyh2BnG/Codxj0+k4SCHONOKJayyVAIrGhZ0=; b=AqbOmjdSHpAgnsKzvA7sEqqF4fgoxxhFp1sBkUjJ4ZGH1x2gRlM6+adhQD259C6mur sVI+gcgOu5EWTTGDvwLWSveelFi7fpSJTMQjmJdM68kMJYWd46GGu8Ri/RKHmBzLlSlE 1+aW2TrWRfmYrRmrSEPzVAObiderkjGV5I5FRcq8qHyxKss3K0uNLBOAfnvLgr0pF64/ fvyQ+IUJH4IlaUV881vsTp75Cw1HaI+CW0SrrMHOaAaMHuJ9GmnrXZouYfArrDsP3dWb 5ZWLyFlSZBUZirwrNDSDNvBzxqMMUWU4/8iIqNROCQQM9qmAByjqYXzXSwCz9M1RwbF2 /zyw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:reply-to:to:cc:message-id:subject :mime-version:references; bh=0q3Yk1Hxyh2BnG/Codxj0+k4SCHONOKJayyVAIrGhZ0=; b=hXbDE5PeppGoQurTXCqgUwBj1KNJV1sUEzBFfO8qDP1op5ajaN4i7dERL8UuXfRnGw nx+01Kaw80ItexnnT1PSwbJGlz9hrvW+q4/CMDrFkYarXwDOWuUEZ7DgUXNITl9ytOY8 8538ke39mpl6P3DdMcLOhSJMvGRpOTE4T4LLHxPQVlQbIRc8cB6091NZHEBHhQMvxG8P pb3js+mm+nVi6hNQSJpA32pehoyKiZuWHqgqYaMZwWGen/uu+6ksTGMu8kUa9LaOdfUp NB0FK2HJfY91Tc2Uu3kEbmMmw2h37Q0dZwRD2lQO2w/zcMDqf7UgZ/6V0i1fcZAy2o5Z gpxw== X-Gm-Message-State: APjAAAVWAurDJe6264W5ENGzE4m9OEzteYN4FnzpsJQmDipWiWmbnyJW IzI5ILEJABs2pENHiuLyBkBvYwuqcmA8iA== X-Google-Smtp-Source: APXvYqzISMf/JKNokffyE5ZK2ERTDX2e6xVUBA4r2CO+nAr5upSjl5SsLZysiFOQ0vda/Ha1K7xwyQ== X-Received: by 2002:ac8:14f:: with SMTP id f15mr6987770qtg.295.1567031664593; Wed, 28 Aug 2019 15:34:24 -0700 (PDT) Received: from sonic302-3.consmr.mail.bf2.yahoo.com (sonic302-3.consmr.mail.bf2.yahoo.com. [74.6.135.42]) by smtp.gmail.com with ESMTPSA id u28sm395921qtu.22.2019.08.28.15.34.24 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 28 Aug 2019 15:34:24 -0700 (PDT) X-YMail-OSG: MoTQt1YVM1lwmCcOLW1deH5Btl4EK01M6e6mm1BUNqGdHcAt44IoGGUWx6aRbcP 3V8aL5ZWmbArSh_v9Th2Va0zL.vcgWZAKSJBXxe5hwK1toqixxWdNEs56R7rL4RctivuI4825bky BC_tT26K_9J94UBpb_DW4k.C0MvsVkbQNwkkiUbZhLcMxfMv3RFP0HGNV.PT0zCfrrTSAgBZzcuV 0OiNPfW6l9g9dTWvI7Puf4oJqiKRQZc8xqO5XleN0QZlqBxe32VETdMr3FuXZwPQzZpNlz5IOx_v 5QCR2I8vGYzknwd4ev8NnC.Mu6XARpUCDDURsPsssbyc288mEjOMFxQaA7VKc.9TSYdY7kDk17cH Ov2w2qW3tTGlVLTvIw1Uw0shnoDT6KgvdlaDAU_nfo5eqlzCGdxweAnmqQxGnIQMrR50udfN.Chw 3PG2rS.yszThwTwbE5Ks7DNrpRU14loFj9wj6T4RUlqmBt12oY3P23lZALcA_sDUrwJ_tgHO8UNB gUtdJRRQrQjFCvDBve5A3XEN_Pcys7NYwuKabo8bC49cmuKGSiDLh1W2BaLu6E62h3skhVAyKhcp 2KOPiDiJM5jlHcUkXU.HT3NarOeLfh1v8uh3aEJoe6FtPdYigplIx5AcVK0zoL1lGZdtFrczu5rw SDAoLrtUx6X.4ofbvNScjNpd6KlxMug4THSXfYt0.SF1bQqOe0hE.qmD9gv2QxMqHHwr.Wa3aQbY 6_lWgNVcngeEAPgEfNXjCRy2qJizs5m8XYv7BDNbIVRM9kQqkcpaXfY40JulC2nCmkv6bcx9XEX1 DUyQRsQbhxj9qLZO8.ovXtGLOuNbU1TM80Wqx5VL4bJr6e_8QNVRTDd7kO9SbwbPObnm9KLfl6Gz WWim0EWHvAmwi_GBItqHlmQZtfKorBxxsXiFjcFS5nTji2uK5f2YM.5FdhOsDLjE.Q2KfnMUD9cS ecmCDimmLfpHfhRyxNVGaiueuQKNQ0AwcLxRjMvImHvkAf6cK.io5jFnOkrhpstaYYsHI9ObeMEo HoO67AMV0P.rFexpHxQ3eNFXBa8vqwBFXMCby87j5KbnkVntoafMGnY5s9HAeocWxHIirN8Bqypx uihszLK0j7_GkF1N9eLnilWoQYQuoGt2O7OHwYuDh07QLNMiWD39aMC8z0psHx1jshsuVh8mvJLu t5JFDyfMSs4NJSyH1Mh7xCdFoRXs1LjlH3DGIkLDRGGCkft7G1ea.jl4CqDVDiwM7gFg- Received: from sonic.gate.mail.ne1.yahoo.com by sonic302.consmr.mail.bf2.yahoo.com with HTTP; Wed, 28 Aug 2019 22:34:23 +0000 Date: Wed, 28 Aug 2019 22:34:21 +0000 (UTC) From: "mms.vanbreukelingen@gmail.com" Reply-To: "mms.vanbreukelingen@gmail.com" To: Maksim Yevmenkin Cc: "kostikbel@gmail.com" , Warner Losh , Hans Petter Selasky , "freebsd-current@freebsd.org" Message-ID: <1115053193.64543.1567031661382@mail.yahoo.com> Subject: Re: Kernel-Crash when working with ubt0 MIME-Version: 1.0 References: <1115053193.64543.1567031661382.ref@mail.yahoo.com> X-Mailer: WebService/1.1.14253 YMailNorrin Mozilla/5.0 (X11; FreeBSD amd64; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.100 Safari/537.36 X-Rspamd-Queue-Id: 46JgXK56Bcz3KV7 X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=AqbOmjdS; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of mmsvanbreukelingen@gmail.com designates 2607:f8b0:4864:20::842 as permitted sender) smtp.mailfrom=mmsvanbreukelingen@gmail.com X-Spamd-Result: default: False [-3.98 / 15.00]; TO_DN_EQ_ADDR_SOME(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; HAS_REPLYTO(0.00)[mms.vanbreukelingen@gmail.com]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; FREEMAIL_FROM(0.00)[gmail.com]; RCPT_COUNT_FIVE(0.00)[5]; RCVD_COUNT_THREE(0.00)[4]; DKIM_TRACE(0.00)[gmail.com:+]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; NEURAL_HAM_SHORT(-0.98)[-0.984,0]; FREEMAIL_TO(0.00)[gmail.com]; FROM_EQ_ENVFROM(0.00)[]; RCVD_TLS_LAST(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; TAGGED_FROM(0.00)[]; DWL_DNSWL_NONE(0.00)[gmail.com.dwl.dnswl.org : 127.0.5.0]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; REPLYTO_EQ_FROM(0.00)[]; FROM_HAS_DN(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; TAGGED_RCPT(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; FREEMAIL_REPLYTO(0.00)[gmail.com]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; IP_SCORE_FREEMAIL(0.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[2.4.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; IP_SCORE(0.00)[ip: (2.23), ipnet: 2607:f8b0::/32(-2.85), asn: 15169(-2.32), country: US(-0.05)]; FREEMAIL_CC(0.00)[gmail.com] Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 28 Aug 2019 22:34:26 -0000 @Maksim, I first did a "git apply -R bt.diff" and then root@freeBSD13:/usr/src # git apply --stat --check --ignore-whitespace ng_btsocket_hci_raw.c.diff.txt error: patch failed: head/sys/netgraph/bluetooth/socket/ng_btsocket_hci_raw.c:1156 error: head/sys/netgraph/bluetooth/socket/ng_btsocket_hci_raw.c: patch does not apply Rebuilding with MTX_SPIN=y (withouth patch)...On Wed, 28 Aug 2019 at 19:10, Maksim Yevmenkin wrote: > > > Hmm... interesting.... > > > > > > I only took a brief look at it. I suppose I can ensure user space address is wired and then copyout() can be called with mutex held > > > > >No, you cannot do this, at least without making the kernel to panic. > > User might unmap the wired mapping at any time still. > > Kostik, > > i was thinking along the lines of vslock/vsunlock and copyout_nofault. > basically similar to the sysctl code. do you think this would not > work? actually, i dont think i need to hold lock over copyout. attached is my version of the patch (untested) thanks, max From owner-freebsd-current@freebsd.org Wed Aug 28 22:40:37 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 248E5E8504 for ; Wed, 28 Aug 2019 22:40:37 +0000 (UTC) (envelope-from ian@freebsd.org) Received: from outbound3d.ore.mailhop.org (outbound3d.ore.mailhop.org [54.186.57.195]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 46JggS2ZwZz3KgR for ; Wed, 28 Aug 2019 22:40:36 +0000 (UTC) (envelope-from ian@freebsd.org) ARC-Seal: i=1; a=rsa-sha256; t=1567032035; cv=none; d=outbound.mailhop.org; s=arc-outbound20181012; b=iCjjQ4EdFr/ChpTHggaKU8gvuvw5T1eD4+MzNouKEcxAQKNKwVIDBidtUmmXrj+RxbRqw1WwSUS8/ NeHJBLSNBDwv9xiqbyoZ7vPI/263XdyFwQ618X1u5uRE7bcjpFUkCjEG+4iWBi9pHuujf7ZjceKAIA 9NMRA5wrCS66QubFahbfczd6Ga+HJsD95A26HFF4XoewVgCSeU+fQpDfC3HgF4QpWv0l3/L9Sxx4ns LrYRAhD4EEUB2/Is4Zc0ddJP7LniKFWjh9Fm7atZzBcbAGpK5tzLoyxXYJNs583GiULt7w6uL446Jt RC23MJbU7q35+B2Vw6JApsyz/dB7hZQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=outbound.mailhop.org; s=arc-outbound20181012; h=content-transfer-encoding:mime-version:content-type:references:in-reply-to: date:cc:to:from:subject:message-id:dkim-signature:from; bh=V6FSlKw8hRXyFTKKDYBJL/eJrNDQP6u4ISW0TLIap0I=; b=t4sde2nDjTpdP/4Uu7qqNSfFLFrLgck/JlN3W015newv/AAFsfSV5Bv9F/tJYu/O3++lqyuKh1JYj XUFm85gH8CBG/kXGeItT1Ksx5N8Urz/JaVynC+3tkgZ322bkjhEKfsFKBIWkToBN5SqVjimZOu45pR pCHPiNWKPzwR5s2LKR4Lsz6jqAKYluUMIE//+S8fnMAZqpvj7XdDXpcdGzdUOD20Jlep3S+elyePbc IM7i7VYDTXt6nft/iUTzCdQEWiViH4787tuBCU9hsx30O6HXKEic6pLXe5p1yXD2tqO6TV6QrWA8QH 7ubcYlqi6w5bT0MORiUF3u/P9NQV4DQ== ARC-Authentication-Results: i=1; outbound3.ore.mailhop.org; spf=softfail smtp.mailfrom=freebsd.org smtp.remote-ip=67.177.211.60; dmarc=none header.from=freebsd.org; arc=none header.oldest-pass=0; DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=outbound.mailhop.org; s=dkim-high; h=content-transfer-encoding:mime-version:content-type:references:in-reply-to: date:cc:to:from:subject:message-id:from; bh=V6FSlKw8hRXyFTKKDYBJL/eJrNDQP6u4ISW0TLIap0I=; b=uKnWZ9ZMplG1BoXJUYqWKbYx3YettQ1mJxJOKJKfg/ECGupPxur7p9iH6ix7FzewP478q2g2UZzJ0 9KzuQMyjwCIvGY8v9gujOVwlXgRR1PU3rbOCttwTDQ6YT6lAH83WIWOHx/fejLoKBtRxJ1Uz0xpthx xNnoeNb2qKG7/LSwrPQndoSXfuqZAh+ejyrANhQcXVYsGxdjY0XNIncuGSCi5674mhTVU3ODgXaO1F 3nNBh9XNdCGyFuuVbhUer6DBlxOD4DOefTbb7WHxLlKZnLBort62KeuSvTLrV1WfJi+fBur1FmWN6B pM6WjItUWIu/40IpRJxcDZ7Z5olgH1Q== X-MHO-RoutePath: aGlwcGll X-MHO-User: d83deaaa-c9e4-11e9-b67b-cdd75d6ce7a8 X-Report-Abuse-To: https://support.duocircle.com/support/solutions/articles/5000540958-duocircle-standard-smtp-abuse-information X-Originating-IP: 67.177.211.60 X-Mail-Handler: DuoCircle Outbound SMTP Received: from ilsoft.org (unknown [67.177.211.60]) by outbound3.ore.mailhop.org (Halon) with ESMTPSA id d83deaaa-c9e4-11e9-b67b-cdd75d6ce7a8; Wed, 28 Aug 2019 22:40:34 +0000 (UTC) Received: from rev (rev [172.22.42.240]) by ilsoft.org (8.15.2/8.15.2) with ESMTP id x7SMeWK0014752; Wed, 28 Aug 2019 16:40:32 -0600 (MDT) (envelope-from ian@freebsd.org) Message-ID: Subject: Re: Lost user database after bungled upgrade From: Ian Lepore To: Ryan Stone , Gary Palmer Cc: FreeBSD Current Date: Wed, 28 Aug 2019 16:40:32 -0600 In-Reply-To: References: <20190828212021.GA66282@in-addr.com> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.28.5 FreeBSD GNOME Team Mime-Version: 1.0 Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: 46JggS2ZwZz3KgR X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; none X-Spamd-Result: default: False [-2.98 / 15.00]; local_wl_from(0.00)[freebsd.org]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.98)[-0.983,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; ASN(0.00)[asn:16509, ipnet:54.186.0.0/15, country:US] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 28 Aug 2019 22:40:37 -0000 On Wed, 2019-08-28 at 18:09 -0400, Ryan Stone wrote: > Thanks for the hint; I wasn't aware of /var/backups. Unfortunately > fixing my user database at this point hasn't fixed pkg. I'm worried > that it has some bad data cached somewhere now. I tried restoring the > pkg databack from /var/backups but that hasn't helped. > > PR 223751 suggests that perhaps the assert is a side effect of another problem such as a missing file, and fixing that may eliminate the assert. https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=223751 Or maybe in your case the files are fine and it really is a uid problem. But a "pkg check -s -a" as suggested in the PR couldn't hurt. :) -- Ian > On Wed, Aug 28, 2019 at 5:20 PM Gary Palmer > wrote: > > > > On Wed, Aug 28, 2019 at 05:09:35PM -0400, Ryan Stone wrote: > > > Hi everybody, > > > > > > I lost /etc/master.passwd and friends while trying to recover > > > from an > > > src upgrade gone wrong. I'm trying to run "pkg upgrade -f" to > > > get all > > > of the users and groups created by packages recreating, but pkg > > > is > > > hitting an assert related to uids: > > > > > > Checking integrity...Assertion failed: (strcmp(uid, p->uid) != > > > 0), > > > function pkg_conflicts_check_local_path, file > > > pkg_jobs_conflicts.c, > > > line 386. > > > > > > Is there any way to get past this, or is the system toast? > > > > Did you try restoring from the backups under /var/backups? There > > should > > be master.passwd in there which can be restored and /etc/passwd and > > the DB files regenarated with pwd_mkdb (I think, never tried) > > > > Regards, > > > > Gary > > _______________________________________________ > freebsd-current@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-current > To unsubscribe, send any mail to " > freebsd-current-unsubscribe@freebsd.org" From owner-freebsd-current@freebsd.org Thu Aug 29 00:09:59 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 1B3D1EA4ED for ; Thu, 29 Aug 2019 00:09:59 +0000 (UTC) (envelope-from rysto32@gmail.com) Received: from mail-qk1-x72c.google.com (mail-qk1-x72c.google.com [IPv6:2607:f8b0:4864:20::72c]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46JjfZ6Dlvz3wrX; Thu, 29 Aug 2019 00:09:58 +0000 (UTC) (envelope-from rysto32@gmail.com) Received: by mail-qk1-x72c.google.com with SMTP id g17so1411736qkk.8; Wed, 28 Aug 2019 17:09:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=UM+hmNdb7Jkqc0gaq2F14HJV99OXFxYpsJ6TM3pHyUA=; b=TRMKznAS5/AvSuD0Z6NioJaJ1aDmjPy05KlK24p79+kqX7mlSNYlszwOxdKkfEyxEU b55qsDVjvtgB/UYPRVZduqCukP82EbQGTl92RohWFffHW8WOMAsmBKDizzdeyGtqBb2B 4x6zY++EEgK3hZea5TMIOyU9C7Fg4dagusBae2eoTXYVzibTbq/xOU3yNTc/fWF+zIA6 wSCpJakpQ37USRIs5ukKAcONgHscsCBx8e60mW6/5lr+KnM+glQLwiP5z5rbWYrrhkWJ TliYTIvonOjBU995XCPpifkLydQBsnkz2P6zE1bRLKpW3m/xfx170BIzCO0pQcVeP3xo g0BQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=UM+hmNdb7Jkqc0gaq2F14HJV99OXFxYpsJ6TM3pHyUA=; b=bFb9Gvn9jZrIbnDZDZ0YQOZJJrk74ZmpqNfsJR6xxYN5h0wwsxYpeqK6v8CSNHs7gN gMoYNG7YddX2WGZ6RRcM1cYkQmFvPp9TTAFGzHZqTiCmfktPw2yF8HR5lC9U9n4MsDb+ eQT85P2gJ8MQO73UuxYb9+oL+9Be98N4CooqkQQtOoPiuRpt4FyHoIqLEDlVxsntXaps GrQ2eECGbmg3ZIkpM86SdULgonJk5anUy/tqJFLWXvFLz8SI2vthImKzCFvvqfQzLdt0 4dZbBq2uc8euX91VResSQMO1knreZ+NDA+x1d94Qywe68LocBpBnTctowwwcuJqNGq5D 73WQ== X-Gm-Message-State: APjAAAWR7udmAoU42/Pt0dmC4yAk+E1vqcPm90QEVgSg+NO5lcuXZfZo n4qwKcWsICe3XZH5ow8559CJEF96inEbJe1c1BBhBaIf X-Google-Smtp-Source: APXvYqw6g03VqHBopMVSoajNJisYDT1qmF0YUiDdIJJTs95Kchv3SEZR3srvJleiW5jW71CpViRMGlkPkJQpIgNGGOY= X-Received: by 2002:a37:a843:: with SMTP id r64mr5868252qke.363.1567037396903; Wed, 28 Aug 2019 17:09:56 -0700 (PDT) MIME-Version: 1.0 References: <20190828212021.GA66282@in-addr.com> In-Reply-To: From: Ryan Stone Date: Wed, 28 Aug 2019 20:09:45 -0400 Message-ID: Subject: Re: Lost user database after bungled upgrade To: Ian Lepore Cc: FreeBSD Current Content-Type: text/plain; charset="UTF-8" X-Rspamd-Queue-Id: 46JjfZ6Dlvz3wrX X-Spamd-Bar: ------ Authentication-Results: mx1.freebsd.org; none X-Spamd-Result: default: False [-6.99 / 15.00]; NEURAL_HAM_MEDIUM(-1.00)[-0.999,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; REPLY(-4.00)[]; NEURAL_HAM_SHORT(-0.99)[-0.988,0] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 29 Aug 2019 00:09:59 -0000 On Wed, Aug 28, 2019 at 6:40 PM Ian Lepore wrote: > Or maybe in your case the files are fine and it really is a uid > problem. But a "pkg check -s -a" as suggested in the PR couldn't hurt. > :) I did have some problems here, but unfortunately re-installing the affected packages (and confirming that a subsequent run of pkg check showed no more problems) didn't resolve my issue. I'm also seeing errors like this: pkg: sqlite error while executing UPDATE packages SET name=?1 WHERE name=?2; in file pkg_jobs.c:1731: UNIQUE constraint failed: packages.name pkg: sqlite error while executing UPDATE packages SET name=?1 WHERE name=?2; in file pkg_jobs.c:1731: UNIQUE constraint failed: packages.name pkg: sqlite error while executing UPDATE packages SET name=?1 WHERE name=?2; in file pkg_jobs.c:1731: UNIQUE constraint failed: packages.name pkg: sqlite error while executing UPDATE packages SET name=?1 WHERE name=?2; in file pkg_jobs.c:1731: UNIQUE constraint failed: packages.name pkg: sqlite error while executing UPDATE packages SET name=?1 WHERE name=?2; in file pkg_jobs.c:1731: UNIQUE constraint failed: packages.name So unfortunately it looks like something is corrupted somewhere. From owner-freebsd-current@freebsd.org Thu Aug 29 01:48:20 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id F3676EC72C for ; Thu, 29 Aug 2019 01:48:20 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: from mail-qt1-x832.google.com (mail-qt1-x832.google.com [IPv6:2607:f8b0:4864:20::832]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46Jlr36tSdz41bP for ; Thu, 29 Aug 2019 01:48:19 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: by mail-qt1-x832.google.com with SMTP id y26so1926645qto.4 for ; Wed, 28 Aug 2019 18:48:19 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bsdimp-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=ncujKWi8N4Bji8wzlfuAtDG1s7UzAwJNg4qA7irQXvw=; b=JTyX9la2O4EsMu3PKGp33zN569YE4l0MWNWsD1FU0xeeZej/paHQjprkUQjKX3L/tM efJntzMV9Fc0P9Z5htD1AGZOOB/XXpnp8yHx7KR8RiFWaVYq55zrMs4Fg+4oWviQqX+u KiT6POftJ/n/tZCrRqWJMpjvph2YwLelNmLksqb4AtAPV5TpvGaayVQde1rKxQqCXYYn l8Qdtx0ds/Gu0pHxocktEtz7+LTGp1FNvQ1kcgOjAd7xBYzXCGdeGm4XQMbphN1UTXjf i6RAS92kBOxds82b5Fb8tH2F3lSTklWsDN3Spi7Es7/yGXM4lHT2/xZBq5yAjU+yNKz4 M3ag== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=ncujKWi8N4Bji8wzlfuAtDG1s7UzAwJNg4qA7irQXvw=; b=BjSpPOgxQ8qu+ZRBE+hA7PDOCnYf+yDqhy7cbnIWSf+0QR+8bq0Ov8ShAj1QqLCDJ4 Z0KGWJiabbEJNiP1iamWhpVT+QKGh51Il0ZHkWNZHLsxzXZJeJ9Edd4wmppDBLlvKi+O CbW4a2nXl8zrtT1Wnfo0WB/8RctJH9vko756g4zg1gEzQu8Zf068Iqnr/V0yeaeFRa6l Kp0hSdY/31ME8/HMTTvb061u37dXJbksPLVZgFqZq8dN9co5ErV8npyVySwYqJAr2Dhp KzCH54/RgmXcLTPxeyeGxkphIUKgi5n59mcc9aOZ3iQt6QvG3jLm4mFM9zenJ3yxAdqD /lZQ== X-Gm-Message-State: APjAAAXbF1TSB+x6WXQ5vHPy+0PJ+CAELlw8XE2Br2UTODYjVOmVZcKv opliNTLIBtX7867PYpHNf68H6+biOL+FuU7Ec2zDfQ== X-Google-Smtp-Source: APXvYqxPi7iq9Zla+edeeKIxv92y+wjBwefBa+d3Xi9nbREBKLxCMk3EAYzDgSxDGfc7IeTWwp/2+vJZJH8l1TOVFUE= X-Received: by 2002:aed:34a6:: with SMTP id x35mr7377982qtd.187.1567043298279; Wed, 28 Aug 2019 18:48:18 -0700 (PDT) MIME-Version: 1.0 References: <1115053193.64543.1567031661382.ref@mail.yahoo.com> <1115053193.64543.1567031661382@mail.yahoo.com> In-Reply-To: <1115053193.64543.1567031661382@mail.yahoo.com> From: Warner Losh Date: Wed, 28 Aug 2019 19:48:06 -0600 Message-ID: Subject: Re: Kernel-Crash when working with ubt0 To: mms.vanbreukelingen@gmail.com Cc: Maksim Yevmenkin , Konstantin Belousov , Hans Petter Selasky , "freebsd-current@freebsd.org" X-Rspamd-Queue-Id: 46Jlr36tSdz41bP X-Spamd-Bar: ----- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=bsdimp-com.20150623.gappssmtp.com header.s=20150623 header.b=JTyX9la2; dmarc=none; spf=none (mx1.freebsd.org: domain of wlosh@bsdimp.com has no SPF policy when checking 2607:f8b0:4864:20::832) smtp.mailfrom=wlosh@bsdimp.com X-Spamd-Result: default: False [-5.92 / 15.00]; TO_DN_EQ_ADDR_SOME(0.00)[]; TO_DN_SOME(0.00)[]; RCPT_COUNT_FIVE(0.00)[5]; DKIM_TRACE(0.00)[bsdimp-com.20150623.gappssmtp.com:+]; NEURAL_HAM_SHORT(-1.00)[-0.996,0]; FORGED_SENDER(0.30)[imp@bsdimp.com,wlosh@bsdimp.com]; FREEMAIL_TO(0.00)[gmail.com]; MIME_TRACE(0.00)[0:+,1:+,2:~]; IP_SCORE(-2.93)[ip: (-9.41), ipnet: 2607:f8b0::/32(-2.85), asn: 15169(-2.32), country: US(-0.05)]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; FROM_NEQ_ENVFROM(0.00)[imp@bsdimp.com,wlosh@bsdimp.com]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[bsdimp-com.20150623.gappssmtp.com:s=20150623]; FROM_HAS_DN(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; TAGGED_RCPT(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; DMARC_NA(0.00)[bsdimp.com]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[2.3.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; R_SPF_NA(0.00)[]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[]; FREEMAIL_CC(0.00)[gmail.com] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 29 Aug 2019 01:48:21 -0000 On Wed, Aug 28, 2019, 4:34 PM mms.vanbreukelingen@gmail.com < mms.vanbreukelingen@gmail.com> wrote: > @Maksim, I first did a "git apply -R bt.diff" and then > > root@freeBSD13:/usr/src # git apply --stat --check --ignore-whitespace > ng_btsocket_hci_raw.c.diff.txt > error: patch failed: > head/sys/netgraph/bluetooth/socket/ng_btsocket_hci_raw.c:1156 > error: head/sys/netgraph/bluetooth/socket/ng_btsocket_hci_raw.c: patch > does not apply > patch -p1 worked for me to apply it. And it worked just fine for everything once I rebooted. The patch looked fine to my eye. Warner Rebuilding with MTX_SPIN=y (withouth patch)... > On Wed, 28 Aug 2019 at 19:10, Maksim Yevmenkin > wrote: > > > > > Hmm... interesting.... > > > > > > > > I only took a brief look at it. I suppose I can ensure user space > address is wired and then copyout() can be called with mutex held > > > > > > >No, you cannot do this, at least without making the kernel to panic. > > > User might unmap the wired mapping at any time still. > > > > Kostik, > > > > i was thinking along the lines of vslock/vsunlock and copyout_nofault. > > basically similar to the sysctl code. do you think this would not > > work? > > actually, i dont think i need to hold lock over copyout. attached is > my version of the patch (untested) > > thanks, > max > > From owner-freebsd-current@freebsd.org Thu Aug 29 02:57:49 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 1230AEE17D for ; Thu, 29 Aug 2019 02:57:49 +0000 (UTC) (envelope-from mms.vanbreukelingen@gmail.com) Received: from mail-ua1-x942.google.com (mail-ua1-x942.google.com [IPv6:2607:f8b0:4864:20::942]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46JnNC3rkdz44V4 for ; Thu, 29 Aug 2019 02:57:47 +0000 (UTC) (envelope-from mms.vanbreukelingen@gmail.com) Received: by mail-ua1-x942.google.com with SMTP id b2so707866uak.3 for ; Wed, 28 Aug 2019 19:57:47 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=QRVJd7AA1I/clfX9Q89skJiyWy9OdIQ09XfypPAFhzA=; b=klaLpY4T+MIFrvYLtIN5yrO9WWjsqKjHfyG+jSb78qSbmkwZB3qJNeVnM6foEsNZXr u/WOm0XwB/aOYdFmIS6zPxLusTh395bBRE5L52ijVyOZxt9+TiPG/Sf6aGa2tQeQzCg+ MHDkOPXQD+ZosLjhj2o1GWh5UEYgWvvewaMFjpRKiBEgtDsCthhSSKCFNO3qvDz57iVq nMT39wyOkVjgl0kWwoNbRv9ZvG5sKOqJx54YgTvolzWDtLcsC5kvwCEyvjigyt9oRV6/ VCrZiRhOHBzFnGBD2prN+fHKg4AUeWUuJ1mLFCYmV/LO2QOTgKRNyagGIDxhPkm/bEA/ brSw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=QRVJd7AA1I/clfX9Q89skJiyWy9OdIQ09XfypPAFhzA=; b=KrR1EjLpJdX1zRKaC6DiT8NZPrfto4wyGX4TkU3Gq1V758WjnUXEV3IbaAlyMOS1GW /P2sZ0PFm/6tZv7s730JeG0KZdMFlyYbudFrd/EFlosDYcngIJngUx//lC6f135PqUZ9 vqVt/iSygMLKF8gnzHav3hhBOzdkvJP3UY++tv7d968Eki2FBdt84VDTRchvfpz5Prd6 hcqd3ufkfDt4922FAadLFAGUQ30mm3DYdZERvO+OLQUgKMZdsFwm58XDCDFitTe8tKN6 DQ1WciaGicfJQW8B1lYBGQ9DvoR/EMZI6jq0me02VberMFL3CsmLiPflKxJPHHOx44o9 e5/A== X-Gm-Message-State: APjAAAXVeazGf8rIQ521XuEsMndvRsAGoJiRzOc7InfL7inA7gE+qFGP 3JIOTnuRsHjBc8SOsg2fIGi50Awp6GCcjNyIoaU= X-Google-Smtp-Source: APXvYqz5dYBlfGK06Og6MRYMiRwgAyS/D3ljlBkAlVcn1EjcVYdPHuUDaGIn3I7LH+Faidkd4JtFaFKOqrsLom23X8Q= X-Received: by 2002:ab0:911:: with SMTP id w17mr3642090uag.20.1567047466181; Wed, 28 Aug 2019 19:57:46 -0700 (PDT) MIME-Version: 1.0 References: <1115053193.64543.1567031661382.ref@mail.yahoo.com> <1115053193.64543.1567031661382@mail.yahoo.com> In-Reply-To: From: Miranda Maria Sophie Van den Breukelingen Date: Thu, 29 Aug 2019 04:57:34 +0200 Message-ID: Subject: Re: Kernel-Crash when working with ubt0 To: Warner Losh Cc: Maksim Yevmenkin , Konstantin Belousov , Hans Petter Selasky , "freebsd-current@freebsd.org" X-Rspamd-Queue-Id: 46JnNC3rkdz44V4 X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=klaLpY4T; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of mmsvanbreukelingen@gmail.com designates 2607:f8b0:4864:20::942 as permitted sender) smtp.mailfrom=mmsvanbreukelingen@gmail.com X-Spamd-Result: default: False [-3.99 / 15.00]; TO_DN_EQ_ADDR_SOME(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36:c]; FREEMAIL_FROM(0.00)[gmail.com]; RCPT_COUNT_FIVE(0.00)[5]; DKIM_TRACE(0.00)[gmail.com:+]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; NEURAL_HAM_SHORT(-0.99)[-0.992,0]; FROM_EQ_ENVFROM(0.00)[]; IP_SCORE(0.00)[ip: (2.39), ipnet: 2607:f8b0::/32(-2.85), asn: 15169(-2.32), country: US(-0.05)]; MIME_TRACE(0.00)[0:+,1:+,2:~]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; TAGGED_FROM(0.00)[]; DWL_DNSWL_NONE(0.00)[gmail.com.dwl.dnswl.org : 127.0.5.0]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; FROM_HAS_DN(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; TAGGED_RCPT(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; IP_SCORE_FREEMAIL(0.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[2.4.9.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; FREEMAIL_CC(0.00)[gmail.com]; RCVD_TLS_ALL(0.00)[]; RCVD_COUNT_TWO(0.00)[2] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 29 Aug 2019 02:57:49 -0000 On Thu, 29 Aug 2019 at 03:48, Warner Losh wrote: > > > On Wed, Aug 28, 2019, 4:34 PM mms.vanbreukelingen@gmail.com < > mms.vanbreukelingen@gmail.com> wrote: > >> @Maksim, I first did a "git apply -R bt.diff" and then >> >> root@freeBSD13:/usr/src # git apply --stat --check --ignore-whitespace >> ng_btsocket_hci_raw.c.diff.txt >> error: patch failed: >> head/sys/netgraph/bluetooth/socket/ng_btsocket_hci_raw.c:1156 >> error: head/sys/netgraph/bluetooth/socket/ng_btsocket_hci_raw.c: patch >> does not apply >> > > patch -p1 worked for me to apply it. > > And it worked just fine for everything once I rebooted. The patch looked > fine to my eye. > > Warner > > > Rebuilding with MTX_SPIN=y (withouth patch)... >> On Wed, 28 Aug 2019 at 19:10, Maksim Yevmenkin < >> maksim.yevmenkin@gmail.com> wrote: >> >> > > > Hmm... interesting.... >> > > > >> > > > I only took a brief look at it. I suppose I can ensure user space >> address is wired and then copyout() can be called with mutex held >> > > >> > > >No, you cannot do this, at least without making the kernel to panic. >> > > User might unmap the wired mapping at any time still. >> > >> > Kostik, >> > >> > i was thinking along the lines of vslock/vsunlock and copyout_nofault. >> > basically similar to the sysctl code. do you think this would not >> > work? >> >> actually, i dont think i need to hold lock over copyout. attached is >> my version of the patch (untested) >> >> thank >> max >> >> oh, didn't patch it with the -p1 option, maybe this is why. I rebuild the kernel and removed the WITNESS option, option MTX_SPIN # is an illtusion for not locking yourself out and it does work. When using the built-in-adapter you not just have to reboot but to turn it off for at least 10 secs., and then reboot into freeBSD again. Here's what I'm having right now: /etc/rc.d/bluetooth start ubt0 /etc/rc.d/bluetooth: ERROR: Unable to setup Bluetooth stack for device ubt0 *root@freeBSD13:/usr/home/miranda # /etc/rc.d/bluetooth start ubt0 root@freeBSD13:/usr/home/miranda # * So, you got to tell it at least twice because of dmesg often calling: *ng_hci_process_command_timeout: ubt0hci - unable to complete HCI command OGF=0x3, OCF=0x3. Timeout* The ubt0 is the Asus stack, I can't setup the internal ubt1 anymore at all. Maybe I'm gonna patch with the -p1 flag tomorrow. @warner Is there a way to patch a running kernel and just reboot or is it always in a new buildkernel environment? I did "patch bt.diff"; @maksim; special way to patch correctly? *bluetooth-config scan Scanning for new Bluetooth devices (Attempt 1 of 5) ... done. Found 1 new bluetooth device (now scanning for names): [ 1] c0:7a:a5:00:c7:11 "Ubittek MagicBox" (Ubittek_MagicBox) * *Select device to pair with [1, or 0 to rescan]: 1 * *Warning: An entry for device c0:7a:a5:00:c7:11 is already present in /etc/bluetooth/hcsecd.conf. To modify pairing information, edit this file and run service hcsecd restart Continue? [yes]: yes * Entry in /etc/bluetooth/hcsecd.conf: *device { bdaddr c0:7a:a5:00:c7:11; name "Ubittek MagicBox"; key nokey; pin nopin; }* l2ping: *l2ping -a c0:7a:a5:00:c7:11 * *16 bytes from Ubittek_MagicBox seq_no=0 time=2611.842 ms result=0 * *16 bytes from Ubittek_MagicBox seq_no=1 time=6.274 ms result=0 * *16 bytes from Ubittek_MagicBox seq_no=2 time=6.862 ms result=0 * [not 0 bytes??] *but*, and this is the status for now: *l2control -a c0:7a:a5:00:c7:11 read_channel_list l2control: Could not bind socket, bdaddr=c0:7a:a5:00:c7:11: Network is down * I think it is paired correctly but doesn't know how to connect; in linux with bluethothctl I get normally "device paired" ---- self-connection-trial ---- "device connected" and 5 secs later "device disconnected". It has to do a salvating "bip" at the box and then it's connected. kldstat: *Id Refs Address Size Name 1 87 0xffffffff80200000 2288f58 kernel 2 1 0xffffffff824ad000 3170 splash_bmp.ko 3 1 0xffffffff824b1000 a468 ng_ubt.ko 4 3 0xffffffff824bc000 12d10 ng_hci.ko 5 4 0xffffffff824cf000 2dc0 ng_bluetooth.ko 6 7 0xffffffff824d2000 18d50 netgraph.ko * * 7 1 0xffffffff824eb000 18c28 ng_l2cap.ko 8 1 0xffffffff82504000 68840 if_em_updated.ko 9 1 0xf**fffffff8256d000 96fa0 linux64.ko * *10 3 0xffffffff82604000 b760 linux_common.ko 11 1 0xffffffff82610000 b4bf0 linux.ko 12 1 0xffffffff826c5000 2a78 ubtbcmfw.ko 13 1 0xffffffff82d18000 7b040 i915kms.ko 14 1 0xffffffff82d94000 3d9e8 drm2.ko 15 4 0xffffffff82dd2000 1f40 iicbus.ko 16 1 0xffffffff82dd4000 f70 iic.ko 17 1 0xffffffff82dd5000 1570 iicbb.ko 18 1 0xffffffff82dd7000 15720 if_iwm.ko 19 1 0xffffffff82ded000 e045f iwm3160fw.ko 20 1 0xffffffff82ece000 1840 uhid.ko 21 1 0xffffffff82ed0000 2928 ums.ko * *22 1 0xffffffff82ed3000 19690 ng_btsocket.ko 23 1 0xffffffff82eed000 20f0 ng_socket.ko 24 1 0xffffffff82ef0000 4570 autofs.ko 25 1 0xffffffff82ef5000 acf mac_ntpd.ko * *26 1 0xffffffff82ef6000 19738 ext2fs.ko 27 1 0xffffffff82f10000 3a8c geom_linux_lvm.ko* 13 and 14 is new here with llvm-devel! *hccontrol -n ubt0hci read_connection_list Remote BD_ADDR Handle Type Mode Role Encrypt Pending Queue State Ubittek_MagicBox 12 ACL 0 MAST NONE 0 0 OPEN* *btsockstat Active L2CAP sockets PCB Recv-Q Send-Q Local address/PSM Foreign address CID State fffff8000331db00 0 0 * /1 * 0 LISTEN* So it's now a problem with the L2CAP and there's no A2DP-fix anymore for BSD, AFAIK. Suggestions? Miranda From owner-freebsd-current@freebsd.org Thu Aug 29 04:04:33 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 24AECC8344 for ; Thu, 29 Aug 2019 04:04:33 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: from mail-qt1-x82a.google.com (mail-qt1-x82a.google.com [IPv6:2607:f8b0:4864:20::82a]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46JpsC5QNBz48fY for ; Thu, 29 Aug 2019 04:04:31 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: by mail-qt1-x82a.google.com with SMTP id b11so2162990qtp.10 for ; Wed, 28 Aug 2019 21:04:31 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bsdimp-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=J0cvyNAzBhu4BKzCy2uifHgFJvZrDFN2AOQ6Qunjn90=; b=W9G/1p3ZlHAROEk5qKfPm5LlSSNSZmjnmeUzbK1WBD4Kkd26u0hpOLw291Zc4ItQn7 FiPLbEqyw7E/V+jU1dANi2hbwV2zC6v1lzlt/k7zFfNoizyj9vRjz2/JKrJMKmlzNEq7 L+GSto4o83AsC1OMA/Zcihi/6WIMf3Uc2z8HkO/iyAkSQe9dTOS00b/B/e69G+jhkLBN GUqGL2XjaQosbyvqPuPJhS2QfC3uPntdgzsIsqUbeyWqhcML6/XqfDoGbSvQ7QIs94NL wbH8feriQUOyyAMEGuGxi9St2lQEm8IaN5HVEQjyjUEONGY9k4rvxElM4N3CcMSLW6Ph 8dNA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=J0cvyNAzBhu4BKzCy2uifHgFJvZrDFN2AOQ6Qunjn90=; b=IgY2Vr2f2e6eixQRmLM5xW5iJBt5g9w5NLcBP0yaLWPELC+7bLfLXYqqbZwEGS1Ir/ xo5dJKeDuzfmTbfeDZI3uFHp2NHDuB0IBY5FoT92C1IdFeWK+gcrz2dqNYa9b8COLefX SvqlSNgdaFi6/QDyu2P+U69kuaLVE4lhIDMTZqmzihMsJir9g3WRK3n7mqPAWR7O0nBi NR4YdDA8GjlfRmodFlrpKkt4apIIEqPGJd5bJgcQ73D1/hBCeqHfHQOxjEKiB9SdYpqi RLkIi/vaKzfomK5M/U+i+LjMueBJmP7m2qOxPPXcltacNqmv8P7TKTfCjVeAPBd2aCiL UCPg== X-Gm-Message-State: APjAAAX0jaxzWWDM+IWij291v8aDryQy+Rb0UuJn7HdChLu8aQzNER6J CWKGXe+9j/mAiPfdj2rUO8rLmpql/7ZDYbwwogTg3Q== X-Google-Smtp-Source: APXvYqx5yFwpG46pDKRNy1HRRB82L0IYQlkZy+NpJZJuK9sm+NIC9XXTGRboaQ6uqmWlOC0Fho2SRUK3VKi4yYh25j4= X-Received: by 2002:ac8:760e:: with SMTP id t14mr3068449qtq.175.1567051470492; Wed, 28 Aug 2019 21:04:30 -0700 (PDT) MIME-Version: 1.0 References: <1115053193.64543.1567031661382.ref@mail.yahoo.com> <1115053193.64543.1567031661382@mail.yahoo.com> In-Reply-To: From: Warner Losh Date: Wed, 28 Aug 2019 22:04:17 -0600 Message-ID: Subject: Re: Kernel-Crash when working with ubt0 To: Miranda Maria Sophie Van den Breukelingen Cc: Maksim Yevmenkin , Konstantin Belousov , Hans Petter Selasky , "freebsd-current@freebsd.org" X-Rspamd-Queue-Id: 46JpsC5QNBz48fY X-Spamd-Bar: ---- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=bsdimp-com.20150623.gappssmtp.com header.s=20150623 header.b=W9G/1p3Z; dmarc=none; spf=none (mx1.freebsd.org: domain of wlosh@bsdimp.com has no SPF policy when checking 2607:f8b0:4864:20::82a) smtp.mailfrom=wlosh@bsdimp.com X-Spamd-Result: default: False [-4.92 / 15.00]; TO_DN_EQ_ADDR_SOME(0.00)[]; TO_DN_SOME(0.00)[]; URI_COUNT_ODD(1.00)[3]; RCPT_COUNT_FIVE(0.00)[5]; DKIM_TRACE(0.00)[bsdimp-com.20150623.gappssmtp.com:+]; NEURAL_HAM_SHORT(-0.99)[-0.992,0]; FORGED_SENDER(0.30)[imp@bsdimp.com,wlosh@bsdimp.com]; FREEMAIL_TO(0.00)[gmail.com]; MIME_TRACE(0.00)[0:+,1:+,2:~]; IP_SCORE(-2.93)[ip: (-9.44), ipnet: 2607:f8b0::/32(-2.85), asn: 15169(-2.32), country: US(-0.05)]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; FROM_NEQ_ENVFROM(0.00)[imp@bsdimp.com,wlosh@bsdimp.com]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[bsdimp-com.20150623.gappssmtp.com:s=20150623]; FROM_HAS_DN(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; TAGGED_RCPT(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; DMARC_NA(0.00)[bsdimp.com]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[a.2.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; R_SPF_NA(0.00)[]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[]; FREEMAIL_CC(0.00)[gmail.com] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 29 Aug 2019 04:04:33 -0000 On Wed, Aug 28, 2019, 8:57 PM Miranda Maria Sophie Van den Breukelingen < mms.vanbreukelingen@gmail.com> wrote: > > > On Thu, 29 Aug 2019 at 03:48, Warner Losh wrote: > >> >> >> On Wed, Aug 28, 2019, 4:34 PM mms.vanbreukelingen@gmail.com < >> mms.vanbreukelingen@gmail.com> wrote: >> >>> @Maksim, I first did a "git apply -R bt.diff" and then >>> >>> root@freeBSD13:/usr/src # git apply --stat --check --ignore-whitespace >>> ng_btsocket_hci_raw.c.diff.txt >>> error: patch failed: >>> head/sys/netgraph/bluetooth/socket/ng_btsocket_hci_raw.c:1156 >>> error: head/sys/netgraph/bluetooth/socket/ng_btsocket_hci_raw.c: patch >>> does not apply >>> >> >> patch -p1 worked for me to apply it. >> >> And it worked just fine for everything once I rebooted. The patch looked >> fine to my eye. >> >> Warner >> >> >> Rebuilding with MTX_SPIN=y (withouth patch)... >>> On Wed, 28 Aug 2019 at 19:10, Maksim Yevmenkin < >>> maksim.yevmenkin@gmail.com> wrote: >>> >>> > > > Hmm... interesting.... >>> > > > >>> > > > I only took a brief look at it. I suppose I can ensure user space >>> address is wired and then copyout() can be called with mutex held >>> > > >>> > > >No, you cannot do this, at least without making the kernel to panic. >>> > > User might unmap the wired mapping at any time still. >>> > >>> > Kostik, >>> > >>> > i was thinking along the lines of vslock/vsunlock and copyout_nofault. >>> > basically similar to the sysctl code. do you think this would not >>> > work? >>> >>> actually, i dont think i need to hold lock over copyout. attached is >>> my version of the patch (untested) >>> >>> thank >>> max >>> >>> > > > oh, didn't patch it with the -p1 option, maybe this is why. I rebuild the > kernel and removed the WITNESS option, > option MTX_SPIN # is an illtusion for > not locking yourself out > > and it does work. When using the built-in-adapter you not just have to > reboot but to turn it off for at least 10 secs., and then reboot into > freeBSD again. Here's what I'm having right now: > > /etc/rc.d/bluetooth start ubt0 > /etc/rc.d/bluetooth: ERROR: Unable to setup Bluetooth stack for device > ubt0 > > *root@freeBSD13:/usr/home/miranda # /etc/rc.d/bluetooth start ubt0 > root@freeBSD13:/usr/home/miranda # * > > So, you got to tell it at least twice because of dmesg often calling: > *ng_hci_process_command_timeout: ubt0hci - unable to complete HCI command > OGF=0x3, OCF=0x3. Timeout* > > The ubt0 is the Asus stack, I can't setup the internal ubt1 anymore at > all. Maybe I'm gonna patch with the -p1 flag tomorrow. > > @warner Is there a way to patch a running kernel and just reboot or is it > always in a new buildkernel environment? I did "patch bt.diff"; > > @maksim; special way to patch correctly? > > > > > *bluetooth-config scan Scanning for new Bluetooth devices (Attempt 1 of 5) > ... done. Found 1 new bluetooth device (now scanning for names): [ 1] > c0:7a:a5:00:c7:11 "Ubittek MagicBox" (Ubittek_MagicBox) * > > *Select device to pair with [1, or 0 to rescan]: 1 * > > > > > > *Warning: An entry for device c0:7a:a5:00:c7:11 is already present in > /etc/bluetooth/hcsecd.conf. To modify pairing information, edit this file > and run service hcsecd restart Continue? [yes]: yes * > Entry in /etc/bluetooth/hcsecd.conf: > > > > > > *device { bdaddr c0:7a:a5:00:c7:11; name "Ubittek > MagicBox"; key nokey; pin nopin; }* > > l2ping: > *l2ping -a c0:7a:a5:00:c7:11 * > *16 bytes from Ubittek_MagicBox seq_no=0 time=2611.842 ms result=0 * > *16 bytes from Ubittek_MagicBox seq_no=1 time=6.274 ms result=0 * > *16 bytes from Ubittek_MagicBox seq_no=2 time=6.862 ms result=0 * > [not 0 bytes??] > > *but*, and this is the status for now: > > > > *l2control -a c0:7a:a5:00:c7:11 read_channel_list l2control: Could not > bind socket, bdaddr=c0:7a:a5:00:c7:11: Network is down * > I think it is paired correctly but doesn't know how to connect; in linux > with bluethothctl I get normally "device paired" ---- self-connection-trial > ---- "device connected" and 5 secs later "device disconnected". It has to > do a salvating "bip" at the box and then it's connected. > > kldstat: > > > > > > > *Id Refs Address Size Name 1 87 0xffffffff80200000 > 2288f58 kernel 2 1 0xffffffff824ad000 3170 splash_bmp.ko 3 1 > 0xffffffff824b1000 a468 ng_ubt.ko 4 3 0xffffffff824bc000 12d10 > ng_hci.ko 5 4 0xffffffff824cf000 2dc0 ng_bluetooth.ko 6 7 > 0xffffffff824d2000 18d50 netgraph.ko * > > > * 7 1 0xffffffff824eb000 18c28 ng_l2cap.ko 8 1 0xffffffff82504000 > 68840 if_em_updated.ko 9 1 0xf**fffffff8256d000 96fa0 > linux64.ko * > > > > > > > > > > > > *10 3 0xffffffff82604000 b760 linux_common.ko 11 1 > 0xffffffff82610000 b4bf0 linux.ko 12 1 0xffffffff826c5000 2a78 > ubtbcmfw.ko 13 1 0xffffffff82d18000 7b040 i915kms.ko 14 1 > 0xffffffff82d94000 3d9e8 drm2.ko 15 4 0xffffffff82dd2000 1f40 > iicbus.ko 16 1 0xffffffff82dd4000 f70 iic.ko 17 1 > 0xffffffff82dd5000 1570 iicbb.ko 18 1 0xffffffff82dd7000 15720 > if_iwm.ko 19 1 0xffffffff82ded000 e045f iwm3160fw.ko 20 1 > 0xffffffff82ece000 1840 uhid.ko 21 1 0xffffffff82ed0000 2928 > ums.ko * > > > > *22 1 0xffffffff82ed3000 19690 ng_btsocket.ko 23 1 > 0xffffffff82eed000 20f0 ng_socket.ko 24 1 0xffffffff82ef0000 > 4570 autofs.ko 25 1 0xffffffff82ef5000 acf mac_ntpd.ko * > > *26 1 0xffffffff82ef6000 19738 ext2fs.ko 27 1 0xffffffff82f10000 > 3a8c geom_linux_lvm.ko* > > 13 and 14 is new here with llvm-devel! > > > > *hccontrol -n ubt0hci read_connection_list Remote BD_ADDR > Handle Type Mode Role Encrypt Pending Queue State Ubittek_MagicBox > 12 ACL 0 MAST NONE 0 0 OPEN* > > > > > *btsockstat Active L2CAP sockets PCB Recv-Q Send-Q Local address/PSM > Foreign address CID State fffff8000331db00 0 0 * > /1 * 0 LISTEN* > > So it's now a problem with the L2CAP and there's no A2DP-fix anymore for > BSD, AFAIK. Suggestions? > https://wiki.freebsd.org/SteveWills/BTSpeaker Might be interesting. I've not tried this yet, so I don't know if it is too old, but it references bluetooth-config, which is fairly new... My goals are more modest: I just want to get the keyboard I have working, with the modified keypad I have... :) Warner Miranda > From owner-freebsd-current@freebsd.org Thu Aug 29 05:34:33 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id EE38FCA370 for ; Thu, 29 Aug 2019 05:34:33 +0000 (UTC) (envelope-from mms.vanbreukelingen@gmail.com) Received: from mail-qt1-x844.google.com (mail-qt1-x844.google.com [IPv6:2607:f8b0:4864:20::844]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46Jrs50sTYz4DMM for ; Thu, 29 Aug 2019 05:34:32 +0000 (UTC) (envelope-from mms.vanbreukelingen@gmail.com) Received: by mail-qt1-x844.google.com with SMTP id a13so2406419qtj.1 for ; Wed, 28 Aug 2019 22:34:32 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=date:from:reply-to:to:cc:message-id:in-reply-to:references:subject :mime-version; bh=URzFMO1EXHw6AcDugTih2oxzPKsb+QiLb/JMiiKeK2o=; b=khX8M8nwtJUvb/7dutYfH/XnWvgEn0jxBvgWwo+mlgDJnKMuofjx8J0M+CnFDHRU/H 5/lO0h642U1kfJd2xEsNNl5zu7natBCnXDdKNmcpkJSZa+dvMdiBQzKnVuyYn3sh9g4M sPLTfRwK1lFMbJwK6a7ExBGF/EtMOp/6j+q1Ib+yn1FbS6a3bjMTskxDPrW1S50UjPST udQZHxq40+aBXpTGYNK/tP1KvXCmPzVtwFRC2y/JXmcd4PA2znwxEQpTe+agtU7Znu4i 2NV3wUI+yVS2OHWNqLB+orxaEt7J4WlF/6ggX0kYswH6+YE0qVPzoEj6wODnvUm2tkJ+ pUvA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:reply-to:to:cc:message-id:in-reply-to :references:subject:mime-version; bh=URzFMO1EXHw6AcDugTih2oxzPKsb+QiLb/JMiiKeK2o=; b=P4DRNlEZHlclfRztEZ43Jts+yA0AYK4vviWvVeWdmywTQFy1y1oWJe62a+him5dOue 2gCDyf+16bN6eTlTt60vV+QmKcTkHCgGThCA+JHXjwUv2dG/oxsjfcpNwxalYj+rT4Rf BjTtb59I/O59i++uLcyNwDGrjdHQ2FM7Gn4awpG7yBx0GCNvZuExKruxF1lnQiogT2Dn B3jHJbHm4lCO7RmiKfoZ/0p5JiOxhDVx/N0NKIQ2PKYpDDPMoYieCPLDv8XXKGq+mdu3 zPwK+zQO8FTzrEkeY862mjazj/PCjn2H1tHgi4PzJ1mC5DJgsGj1Rn/ZYG8xZr0wCAfO Hf7Q== X-Gm-Message-State: APjAAAVIhOvB8Rslk9Ekg+zZvcaV50ZWVGraa6X2aSTog6hsl+7knatd WiKCQGF2BXB9fjGDmcPCMFA= X-Google-Smtp-Source: APXvYqzkHIoTVpQBJnQXWKARNlfpSs+limw/FOXe2dm2PO6XbifaVBC2OlCGoQxWlkO8UJewnocLog== X-Received: by 2002:a0c:f410:: with SMTP id h16mr5201854qvl.95.1567056871972; Wed, 28 Aug 2019 22:34:31 -0700 (PDT) Received: from sonic312-22.consmr.mail.bf2.yahoo.com (sonic312-22.consmr.mail.bf2.yahoo.com. [74.6.128.84]) by smtp.gmail.com with ESMTPSA id o127sm686918qkd.104.2019.08.28.22.34.31 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 28 Aug 2019 22:34:31 -0700 (PDT) X-YMail-OSG: ycCXzWYVM1mC4V0AyT56pn2yRLBvPWfo0uHizkUvkdaEpNz6FRPsSIXnNWibl.m vZIwq4PSLRaoofUkKfWW04FoPBJC.Y6W5.d_25a2A2NYLT5fuT6YODO0.SoACG9odG.pMz3Y5ckX s8nZ7AwG6uT7yv4ZcSZSpvWEyWITzL11zhClJG2YGkkrcpzf7JIn_0p2lC4Pkkap8gHEnxaU2Gae rwld8dsSvR5xIFSDILB6XNzhEdpoC1d1_OMDYm1nwSgCEasfhEPZrllv62W_VL.UPJbOpx5x8cU6 ng0S7jWyVtjXUsEe8yUANCgpS9JGZcHup8zqkZHt8z4zXzKpJ0GpZU2b1Gv7TBhe2A8QUwKZ1Phm DihE5z9LnIGzzuTTGkdP06xiSviViuTjVNfNdSxummMOf7lk.Fc8web2NzjnA4DPk43GygK_lQSa rh.mAvWivvaVp7.hOTl3.L0rXGpiBf9eDp8TgI.1gV2pFpqP1gHJbKHbmmWsqbzFJ9_ogZWz7Wao JbvsKGmAczVzuq.LJJufTJcjIbCWVXIiRqi83BJ5mUqVKqOeSmjuf8oMEIte.M3gsz92mUTURHwJ 5_X8i33YccC9PoT6RUweuJwUH5UAiGcwa5hKhfpCBL52D05mpScR.CkvcZwhfo5mlAiljKi2N4mx n64J4lhTPdz2Uywnq_t8suG84PTL7pPbbLI0icm9imhGzGw_wRRXzIS35pktqmoCUR0GbKdOgtrU nHt1.hKiOuhlyR8_Z_0G1quF_X.pqSfKDTRc1kCuAsRxLabur7XaIOLDmj_RE25ZBUHKX0wGtqDA Qy3HK.JXzPO2X4hHMTKfJi32KYbU9AK3qoJwWcTbQGx_fTgVsqbX7r5VFGP3RLhnj3DQxy9Sb7uF LU22_ga12KxBYgbs4DEq.PP8_fMco.8bV9o4J6NYzj51EpjtDTuZEpYYxagU.WxIrVHb01rdvtqE c8EEPrkx6H6J3KkRaMkbpqhOzUxhB1e7c5rmkmYedYZvU44IS5_kckIdia57qLS_VZqCNpRRHg7m zJBR9yFIEX14VjfhrLRUZheQ8o5tPN3BAL3MDBcwF_6ahCKSLKcn41j_O8XW_malKW0l3Y58QBeT XKKP1ZGv0qIm3pFGCN4tN7P3D5ggwsV6FL4upWVc6mCs2ZECi14tbN6aBu6Qsyh_to.wfCP9DaBD wrdidL_8hHgZuFhcyr.RjhkoV1Vq6yxB9x4HEM5iNEy8U29DRwukbdFJ7nxCSV_1lkHG.ksY9c_9 d40d1UCZe0ZkoyOk45GKmN91kl5zecnuhFUSNELJNU44_CA-- Received: from sonic.gate.mail.ne1.yahoo.com by sonic312.consmr.mail.bf2.yahoo.com with HTTP; Thu, 29 Aug 2019 05:34:30 +0000 Date: Thu, 29 Aug 2019 05:34:28 +0000 (UTC) From: "mms.vanbreukelingen@gmail.com" Reply-To: "mms.vanbreukelingen@gmail.com" To: "imp@bsdimp.com" Cc: Maksim Yevmenkin , Konstantin Belousov , Hans Petter Selasky , "freebsd-current@freebsd.org" Message-ID: <101056958.134799.1567056868032@mail.yahoo.com> In-Reply-To: References: <1115053193.64543.1567031661382.ref@mail.yahoo.com> <1115053193.64543.1567031661382@mail.yahoo.com> Subject: Re: Kernel-Crash when working with ubt0 MIME-Version: 1.0 X-Mailer: WebService/1.1.14253 YahooMailAndroidMobile YMobile/1.0 (com.yahoo.mobile.client.android.mail/5.43.3; Android/7.0; HUAWEIBLN-L21; hi6250; HUAWEI; HUAWEI BLN-L21; 5.3; 1843x1080; ) X-Rspamd-Queue-Id: 46Jrs50sTYz4DMM X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=khX8M8nw; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of mmsvanbreukelingen@gmail.com designates 2607:f8b0:4864:20::844 as permitted sender) smtp.mailfrom=mmsvanbreukelingen@gmail.com X-Spamd-Result: default: False [-2.95 / 15.00]; TO_DN_EQ_ADDR_SOME(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; HAS_REPLYTO(0.00)[mms.vanbreukelingen@gmail.com]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36:c]; FREEMAIL_FROM(0.00)[gmail.com]; URI_COUNT_ODD(1.00)[3]; RCPT_COUNT_FIVE(0.00)[5]; RCVD_COUNT_THREE(0.00)[4]; DKIM_TRACE(0.00)[gmail.com:+]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; NEURAL_HAM_SHORT(-0.95)[-0.950,0]; FROM_EQ_ENVFROM(0.00)[]; RCVD_TLS_LAST(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; TAGGED_FROM(0.00)[]; DWL_DNSWL_NONE(0.00)[gmail.com.dwl.dnswl.org : 127.0.5.0]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; REPLYTO_EQ_FROM(0.00)[]; FROM_HAS_DN(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; TAGGED_RCPT(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; FREEMAIL_REPLYTO(0.00)[gmail.com]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; IP_SCORE_FREEMAIL(0.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[4.4.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; IP_SCORE(0.00)[ip: (2.63), ipnet: 2607:f8b0::/32(-2.85), asn: 15169(-2.32), country: US(-0.05)]; FREEMAIL_CC(0.00)[gmail.com] Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 29 Aug 2019 05:34:34 -0000 On Thu, 29 Aug 2019 at 6:04, Warner Losh wrote: =20 On Wed, Aug 28, 2019, 8:57 PM Miranda Maria Sophie Van den Breukelingen wrote: On Thu, 29 Aug 2019 at 03:48, Warner Losh wrote: On Wed, Aug 28, 2019, 4:34 PM mms.vanbreukelingen@gmail.com wrote: @Maksim, I first did a "git apply -R bt.diff" and then root@freeBSD13:/usr/src # git apply --stat --check --ignore-whitespace ng_b= tsocket_hci_raw.c.diff.txt error: patch failed: head/sys/netgraph/bluetooth/socket/ng_btsocket_hci_raw= .c:1156 error: head/sys/netgraph/bluetooth/socket/ng_btsocket_hci_raw.c: patch does= not apply patch -p1 worked for me to apply it. And it worked just fine for everything once I rebooted. The patch looked fi= ne to my eye. Warner=C2=A0 Rebuilding with MTX_SPIN=3Dy (withouth patch)...On Wed, 28 Aug 2019 at 19:1= 0, Maksim Yevmenkin wrote: > > > Hmm... interesting.... > > > > > > I only took a brief look at it. I suppose I can ensure user space add= ress is wired and then copyout() can be called with mutex held > > > > >No, you cannot do this, at least without making the kernel to panic. > > User might unmap the wired mapping at any time still. > > Kostik, > > i was thinking along the lines of vslock/vsunlock and copyout_nofault. > basically similar to the sysctl code. do you think this would not > work? actually, i dont think i need to hold lock over copyout. attached is my version of the patch (untested) thank max=C2=A0 oh, didn't patch it with the -p1 option, maybe this is why. I rebuild the k= ernel and removed the WITNESS option,=C2=A0option=C2=A0 =C2=A0 =C2=A0 =C2= =A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0MTX_SPIN=C2=A0 =C2=A0 =C2=A0 =C2=A0 = =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0# is an illtusion for not locking = yourself out and it does work. When using the built-in-adapter you not just have to rebo= ot but to turn it off for at least 10 secs., and then reboot into freeBSD a= gain. Here's what I'm having right now: /etc/rc.d/bluetooth start ubt0 /etc/rc.d/bluetooth: ERROR: Unable to setup Bluetooth stack for device ubt0 root@freeBSD13:/usr/home/miranda # /etc/rc.d/bluetooth start ubt0 root@freeBSD13:/usr/home/miranda #=20 =C2=A0So, you got to tell it at least twice because of dmesg often calling:= ng_hci_process_command_timeout: ubt0hci - unable to complete HCI command OG= F=3D0x3, OCF=3D0x3. Timeout The ubt0 is the Asus stack, I can't setup the internal ubt1 anymore at all.= Maybe I'm gonna patch with the -p1 flag tomorrow.=C2=A0 @warner Is there a way to patch a running kernel and just reboot or is it a= lways in a new buildkernel environment? I did "patch=C2=A0 =C2=A0bt.diff";= =C2=A0 @maksim; special way to patch correctly? bluetooth-config scan Scanning for new Bluetooth devices (Attempt 1 of 5) ... done. Found 1 new bluetooth device (now scanning for names): [ 1] c0:7a:a5:00:c7:11 =C2=A0"Ubittek MagicBox" (Ubittek_MagicBox) Select device to pair with [1, or 0 to rescan]: 1 Warning: An entry for device c0:7a:a5:00:c7:11 is already present in /etc/b= luetooth/hcsecd.conf. To modify pairing information, edit this file and run =C2=A0service hcsecd restart Continue? [yes]: yes Entry in /etc/bluetooth/hcsecd.conf:device { =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0bdaddr =C2=A0c0:7a:a5:00:c7:11; =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0name =C2=A0=C2=A0=C2=A0"Ubittek = MagicBox"; =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0key =C2=A0=C2=A0=C2=A0=C2=A0noke= y; =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0pin =C2=A0=C2=A0=C2=A0=C2=A0nopi= n; } l2ping:l2ping -a c0:7a:a5:00:c7:11 16 bytes from Ubittek_MagicBox seq_no=3D0 time=3D2611.842 ms result=3D0 =C2= =A0 16 bytes from Ubittek_MagicBox seq_no=3D1 time=3D6.274 ms result=3D0 =C2=A0 16 bytes from Ubittek_MagicBox seq_no=3D2 time=3D6.862 ms result=3D0=C2=A0 [not 0 bytes??] but, and this is the status for now:l2control -a c0:7a:a5:00:c7:11 read_cha= nnel_list l2control: Could not bind socket, bdaddr=3Dc0:7a:a5:00:c7:11: Network is do= wn I think it is paired correctly but doesn't know how to connect; in linux wi= th bluethothctl I get normally "device paired" ---- self-connection-trial -= --- "device connected" and 5 secs later "device disconnected". It has to do= a salvating "bip" at the box and then it's connected.=C2=A0 kldstat:Id Refs Address =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0Size Name 1 =C2=A0=C2=A087 0xffffffff80200000 =C2=A02288f58 kernel 2 =C2=A0=C2=A0=C2=A01 0xffffffff824ad000 =C2=A0=C2=A0=C2=A0=C2=A03170 spla= sh_bmp.ko 3 =C2=A0=C2=A0=C2=A01 0xffffffff824b1000 =C2=A0=C2=A0=C2=A0=C2=A0a468 ng_u= bt.ko 4 =C2=A0=C2=A0=C2=A03 0xffffffff824bc000 =C2=A0=C2=A0=C2=A012d10 ng_hci.ko 5 =C2=A0=C2=A0=C2=A04 0xffffffff824cf000 =C2=A0=C2=A0=C2=A0=C2=A02dc0 ng_b= luetooth.ko 6 =C2=A0=C2=A0=C2=A07 0xffffffff824d2000 =C2=A0=C2=A0=C2=A018d50 netgraph.= ko 7 =C2=A0=C2=A0=C2=A01 0xffffffff824eb000 =C2=A0=C2=A0=C2=A018c28 ng_l2cap.= ko 8 =C2=A0=C2=A0=C2=A01 0xffffffff82504000 =C2=A0=C2=A0=C2=A068840 if_em_upd= ated.ko 9 =C2=A0=C2=A0=C2=A01 0xffffffff8256d000 =C2=A0=C2=A0=C2=A096fa0 linux64.k= o=C2=A010 =C2=A0=C2=A0=C2=A03 0xffffffff82604000 =C2=A0=C2=A0=C2=A0=C2=A0b7= 60 linux_common.ko 11 =C2=A0=C2=A0=C2=A01 0xffffffff82610000 =C2=A0=C2=A0=C2=A0b4bf0 linux.ko 12 =C2=A0=C2=A0=C2=A01 0xffffffff826c5000 =C2=A0=C2=A0=C2=A0=C2=A02a78 ubtb= cmfw.ko 13 =C2=A0=C2=A0=C2=A01 0xffffffff82d18000 =C2=A0=C2=A0=C2=A07b040 i915kms.k= o 14 =C2=A0=C2=A0=C2=A01 0xffffffff82d94000 =C2=A0=C2=A0=C2=A03d9e8 drm2.ko 15 =C2=A0=C2=A0=C2=A04 0xffffffff82dd2000 =C2=A0=C2=A0=C2=A0=C2=A01f40 iicb= us.ko 16 =C2=A0=C2=A0=C2=A01 0xffffffff82dd4000 =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0f70= iic.ko 17 =C2=A0=C2=A0=C2=A01 0xffffffff82dd5000 =C2=A0=C2=A0=C2=A0=C2=A01570 iicb= b.ko 18 =C2=A0=C2=A0=C2=A01 0xffffffff82dd7000 =C2=A0=C2=A0=C2=A015720 if_iwm.ko 19 =C2=A0=C2=A0=C2=A01 0xffffffff82ded000 =C2=A0=C2=A0=C2=A0e045f iwm3160fw= .ko 20 =C2=A0=C2=A0=C2=A01 0xffffffff82ece000 =C2=A0=C2=A0=C2=A0=C2=A01840 uhid= .ko 21 =C2=A0=C2=A0=C2=A01 0xffffffff82ed0000 =C2=A0=C2=A0=C2=A0=C2=A02928 ums.= ko 22 =C2=A0=C2=A0=C2=A01 0xffffffff82ed3000 =C2=A0=C2=A0=C2=A019690 ng_btsock= et.ko 23 =C2=A0=C2=A0=C2=A01 0xffffffff82eed000 =C2=A0=C2=A0=C2=A0=C2=A020f0 ng_s= ocket.ko 24 =C2=A0=C2=A0=C2=A01 0xffffffff82ef0000 =C2=A0=C2=A0=C2=A0=C2=A04570 auto= fs.ko 25 =C2=A0=C2=A0=C2=A01 0xffffffff82ef5000 =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0acf= mac_ntpd.ko 26 =C2=A0=C2=A0=C2=A01 0xffffffff82ef6000 =C2=A0=C2=A0=C2=A019738 ext2fs.ko 27 =C2=A0=C2=A0=C2=A01 0xffffffff82f10000 =C2=A0=C2=A0=C2=A0=C2=A03a8c geom= _linux_lvm.ko 13 and 14 is new here with llvm-devel! hccontrol -n ubt0hci read_connection_list =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Remote BD_ADDR =C2=A0=C2=A0=C2=A0Handle Type Mode Role Encrypt Pending Queu= e State Ubittek_MagicBox =C2=A0=C2=A0=C2=A0=C2=A0=C2=A012 =C2=A0ACL =C2=A0=C2=A0=C2= =A00 MAST =C2=A0=C2=A0=C2=A0NONE =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A00 =C2= =A0=C2=A0=C2=A0=C2=A00 OPEN btsockstat=C2=A0=C2=A0 Active L2CAP sockets PCB =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0Recv-Q Send-Q Local address/PSM =C2=A0=C2= =A0=C2=A0=C2=A0=C2=A0=C2=A0Foreign address =C2=A0=C2=A0CID =C2=A0=C2=A0Stat= e fffff8000331db00 =C2=A0=C2=A0=C2=A0=C2=A0=C2=A00 =C2=A0=C2=A0=C2=A0=C2=A0= =C2=A00 * =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0=C2=A0=C2=A0=C2=A0/1 =C2=A0=C2=A0=C2=A0=C2=A0* =C2=A0=C2=A0=C2=A0= =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A00 =C2=A0=C2=A0=C2=A0=C2=A0LISTEN So it's now a problem with the L2CAP and there's no A2DP-fix anymore for BS= D, AFAIK. Suggestions? https://wiki.freebsd.org/SteveWills/BTSpeaker Might be interesting. I've not tried this yet, so I don't know if it is too= old, but it references bluetooth-config, which is fairly new... My goals are more modest: I just want to get the keyboard I have working, w= ith the modified keypad I have... :) Warner Miranda THX for the Tipp with bluetooth-config,=C2=A0 gotta try.=C2=A0 When I do pa= tch -p1 bt.diff there's an everlasting thinking without output no matter if= done in /usr/src or /usr/src/head...=C2=A0 When you do a pkg search bluetooth you'd probably desiluded.=C2=A0 I have some BT-keyboard,=C2=A0 too,=C2=A0 switching between usb-stack and u= bs-stack with Combo,=C2=A0 but not even working with Linux,=C2=A0 well,=C2= =A0 let's see what's happening,=C2=A0 when I attach and a Q13 Bluetooth in-= ear-headphone,=C2=A0 just for trying out the stack and maybe,=C2=A0 maybe o= ne day we all get rid of those cabels. Salad?=C2=A0 Miranda =20 From owner-freebsd-current@freebsd.org Thu Aug 29 08:01:14 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 0AA47CE41A for ; Thu, 29 Aug 2019 08:01:14 +0000 (UTC) (envelope-from zeising@freebsd.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 46Jw6K6cPhz4Mlc for ; Thu, 29 Aug 2019 08:01:13 +0000 (UTC) (envelope-from zeising@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id E2E24CE419; Thu, 29 Aug 2019 08:01:13 +0000 (UTC) Delivered-To: current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id E2A23CE418 for ; Thu, 29 Aug 2019 08:01:13 +0000 (UTC) (envelope-from zeising@freebsd.org) Received: from mail.daemonic.se (mail.daemonic.se [176.58.89.161]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 46Jw6K4Dh0z4Mlb; Thu, 29 Aug 2019 08:01:13 +0000 (UTC) (envelope-from zeising@freebsd.org) Received: from cid.daemonic.se (localhost [IPv6:::1]) by mail.daemonic.se (Postfix) with ESMTP id 46Jw696f6nz3l68; Thu, 29 Aug 2019 08:01:05 +0000 (UTC) X-Virus-Scanned: amavisd-new at daemonic.se Received: from mail.daemonic.se ([IPv6:::1]) (using TLS with cipher ECDHE-RSA-AES128-GCM-SHA256) by cid.daemonic.se (mailscanner.daemonic.se [IPv6:::1]) (amavisd-new, port 10587) with ESMTPS id MsXR_NuNYcpZ; Thu, 29 Aug 2019 08:01:05 +0000 (UTC) Received: from vivi.daemonic.se (vivi.daemonic.se [IPv6:2001:470:dca9:2::4]) by mail.daemonic.se (Postfix) with ESMTPSA id 46Jw6932bQz3c7W; Thu, 29 Aug 2019 08:01:05 +0000 (UTC) Subject: Re: ses no longer attaches To: Alexander Motin , imp@FreeBSD.org Cc: current@FreeBSD.org References: <90483961-9da2-fba1-21da-c38b28e99e06@freebsd.org> <41c91917-13c2-f3a7-d8fd-6464c2ce3c6d@freebsd.org> <2ecfba45-2819-947a-9744-1f06f3304eee@FreeBSD.org> From: Niclas Zeising Message-ID: <5a970845-11c1-07f6-5310-2e1101f0b83f@freebsd.org> Date: Thu, 29 Aug 2019 10:01:02 +0200 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:68.0) Gecko/20100101 Thunderbird/68.0 MIME-Version: 1.0 In-Reply-To: <2ecfba45-2819-947a-9744-1f06f3304eee@FreeBSD.org> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: quoted-printable X-Rspamd-Queue-Id: 46Jw6K4Dh0z4Mlb X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; none X-Spamd-Result: default: False [-2.95 / 15.00]; local_wl_from(0.00)[freebsd.org]; NEURAL_HAM_MEDIUM(-1.00)[-0.999,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.95)[-0.954,0]; ASN(0.00)[asn:36236, ipnet:176.58.89.0/24, country:US] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 29 Aug 2019 08:01:14 -0000 On 2019-08-29 00:07, Alexander Motin wrote: > On 27.08.2019 19:15, Niclas Zeising wrote: >> I did some more digging. r351355 is ok, while r351356 is bad.=C2=A0 Th= is is >> Warner's (CC:d) commit to add RST support to nvme, however, I'm using = a >> ssd drive connected to ahci. >> >> What happens is that the ses driver doesn't attach to the AHCI SGPIO >> enclosure.=C2=A0 This is on a laptop with an ssd (not an nvme) drive.=C2= =A0 I have >> the same issue on another computer as well.=C2=A0 On the broken kernel= , >> sesutil status complains about "No SES devices found", on the working >> kernel it reports "ok". >=20 > Thank you for the report. r351589 should fix it. >=20 I can confirm that it works. Thanks for fixing it! Regards --=20 Niclas Zeising From owner-freebsd-current@freebsd.org Thu Aug 29 12:32:10 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id B75CED4F3D for ; Thu, 29 Aug 2019 12:32:10 +0000 (UTC) (envelope-from ohartmann@walstatt.org) Received: from mout.gmx.net (mout.gmx.net [212.227.15.15]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "mout.gmx.net", Issuer "TeleSec ServerPass Class 2 CA" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46K26x4h0Nz4c00 for ; Thu, 29 Aug 2019 12:32:09 +0000 (UTC) (envelope-from ohartmann@walstatt.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net; s=badeba3b8450; t=1567081922; bh=6NhPUtbGJ98g+iILBxHvvT02+lf5BQm1NSICMsP9cQY=; h=X-UI-Sender-Class:Date:From:To:Cc:Subject:In-Reply-To:References; b=hs0csv4V5/3eLsbzrd/HQcdfTQVRu3tYOTVRPuBmyuUZjV48zy/VsBvwVUysIXyza az04zl38ETAoJ52DidYwEM/S5MqtIELOvG2IM4lmZAC3vwv8ziiNJuf4sq22NIsPI/ U1myJMeDTPU2AjsoXbEATiXQxUaRJEkAoY8i6twg= X-UI-Sender-Class: 01bb95c1-4bf8-414a-932a-4f6e2808ef9c Received: from freyja ([46.88.81.15]) by mail.gmx.com (mrgmx003 [212.227.17.190]) with ESMTPSA (Nemesis) id 0MBFUT-1htAdx3aRZ-00AEsE; Thu, 29 Aug 2019 14:26:49 +0200 Date: Thu, 29 Aug 2019 14:26:38 +0200 From: "O. Hartmann" To: Alexander Leidinger Cc: freebsd-current@freebsd.org, Michael Zhilin Subject: Re: jails, ZFS, deprecated jail variables and poudriere problems Message-ID: <20190829142632.6b93892b@freyja> In-Reply-To: <20190828135700.Horde.m2EjpS9j67KYn2E1oSeoK8f@webmail.leidinger.net> References: <20190827101149.1efcb946@freyja> <20190828135700.Horde.m2EjpS9j67KYn2E1oSeoK8f@webmail.leidinger.net> MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: quoted-printable X-Provags-ID: V03:K1:4rlocoKUBzh0L+IhuuA9caHkIM5TifLBsUfPAbzojNMYtKOvpe2 oRsI1fwlCdq8H+GULDnyWKrd+TBy3IiREmP20pkvApl+9ZLvP/2NJe/qcWjfW74AGgngYkJ /uFxcowY/oyqX5N1fT+6j7lKQ3rdLhEau4NXAUE4Cy929HvqZ/s/Hjq7B/bN9ak1LiV1sP7 q52uKfp11ylI97nSr/Z8w== X-Spam-Flag: NO X-UI-Out-Filterresults: notjunk:1;V03:K0:+K8F665sQ6I=:Q0vBspuatZg2X020Mjvntx 9Mlro2/zTkrv946uRX4dXaayHRTOxv5JQciWV+5z6Bk5Z5XnHJxq2xca74wzJIvf7PSsphXxt Ls91FArTqBiboQ+GKKFTF6PjClJzIwGUnAS9ljWvpyBjyiOS7eGNeK1pgCduBNP7L0BgZhchI 1rjOis6qPzuQesSacc56vKYnLaawlMx/+P0r8tvlsrQ/Ch3ons3UOpsYMC7Os8bDNXUkt/1/e fRGP/Klm3SQQxxRTMMdV/NOzbb94lW+dKOjIf//Rl/Lfa0fHuUX09qLGE+Z/8oNklYW+1E7EC GHZ94Ct+45YlHzjbC2RLpuIm0LnQEdHjMa+fzn0q/3ojEzg/87HHrdxGySbZ3B1d6iVLNDwrO EW/u+fEnR8UGhJRfCJSs0r6ouMiqMxV1uXWVUd8Wn2rXemwsnehia2hoFUeoIhW0sP3VDfwX/ J/Ta0psxbOqSX2K58MVjVmCd2+k65u+7fofk+q43/Vi7daQv1bB7NzwREiWMPBteUYIDJwBFt 9sNThchgNjlT9wQe2TNg3Hkjai9OYN+2lAZeqdLyL+fX8C/eywHXjeNXA+dLHs+Le/0wbmYx/ HMATAUJGztBhrp4PmpBJstSbq9i+QqJt5h2Ubh4uv7oeY0vSs6vYg2FQFauSxD5Xmk06gMh84 duD+mFi2mE4ubYUCYnr7yNV2nEvu+XqyOW/eT7DNqHWsTDyzYGNmY0fdr/tdUddxHy+zOSZit snaHRfxHsfaPySsEGl4KxUcEV2wUChhS6bdnr+ZhCi9E9H/awSDzmK1DswfOywfU1lPoIzDps ntegVMxF0us8DoqJZMG6Bpey96KrHyWl0Fhy46YKVo2UNmCrnLyfU4aHebfDRk9hPr+O/rV55 sxCgdwwIVxyGzoJKwx8vgHGhER+7w2tTFIfoHWgZ7Fob6uqyNvTDM+P0CqJdvDwzFgk5FBa6d 8JHUy/pP1q8vebiizVuLJ64MycFRM8yhcj4NP0XljCJ7yJtLeDrAtP7POreusv6fFvXOk98NU LF0HH9e3CEmzJX6jmvP1S6l489uyvUFd3o8OI8eN6mdO2wLiBDEOf1vvv+PFnK62Bqoso9Zi6 6JtMIPQXNai/QdQvTvRwyRnwt5jtbrIOzcXB1q4Z5COOLchd/snUz9ZFfFG+KXVKtI7nR50hM msiiFBrEUyxCt4nuECtBsnVwYHstbTAxTadM+tZvkQzjytPA== X-Rspamd-Queue-Id: 46K26x4h0Nz4c00 X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmx.net header.s=badeba3b8450 header.b=hs0csv4V; dmarc=none; spf=none (mx1.freebsd.org: domain of ohartmann@walstatt.org has no SPF policy when checking 212.227.15.15) smtp.mailfrom=ohartmann@walstatt.org X-Spamd-Result: default: False [-3.98 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_DKIM_ALLOW(-0.20)[gmx.net:s=badeba3b8450]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; TO_DN_SOME(0.00)[]; IP_SCORE(-1.21)[ip: (-6.84), ipnet: 212.227.0.0/16(-1.38), asn: 8560(2.19), country: DE(-0.01)]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[walstatt.org]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; TO_MATCH_ENVRCPT_SOME(0.00)[]; DKIM_TRACE(0.00)[gmx.net:+]; NEURAL_HAM_SHORT(-0.97)[-0.969,0]; RCVD_IN_DNSWL_NONE(0.00)[15.15.227.212.list.dnswl.org : 127.0.3.0]; R_SPF_NA(0.00)[]; RECEIVED_SPAMHAUS_PBL(0.00)[15.81.88.46.khpj7ygk5idzvmvt5x4ziurxhy.zen.dq.spamhaus.net : 127.0.0.10]; FROM_EQ_ENVFROM(0.00)[]; MID_RHS_NOT_FQDN(0.50)[]; ASN(0.00)[asn:8560, ipnet:212.227.0.0/16, country:DE]; MIME_TRACE(0.00)[0:+]; RCVD_TLS_ALL(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 29 Aug 2019 12:32:10 -0000 On Wed, 28 Aug 2019 13:57:00 +0200 Alexander Leidinger wrote: > Quoting "O. Hartmann" (from Tue, 27 Aug 2019 > 10:11:54 +0200): > > > We have a single ZFS pool (raidz), call it pool00 and this pool00 cona= tins a > > ZFS dataset pool00/poudriere which we want to exclusively attach to a = jail. > > pool00/poudriere contains a complete clone of a former, now decomissio= ned > > machine and is usable by the host bearing the jails. The jail, named > > poudriere, > > has these config parameters set in /etc/jail.conf as recommended: > > > > enforce_statfs=3D "0"; now set to enforce_statfs=3D "1"; > > > > allow.raw_sockets=3D "1"; > > > > allow.mount=3D "1"; > > allow.mount.zfs=3D "1"; > > The line above is what is needed, and what is replacing the sysctl > you've found. > > > allow.mount.devfs=3D "1"; > > allow.mount.fdescfs=3D "1"; > > allow.mount.procfs=3D "1"; > > allow.mount.nullfs=3D "1"; > > allow.mount.fusefs=3D "1"; ... and those extended with these allow.mount.tmpfs=3D "1"; allow.mount.linprocfs=3D "1"; > > > > Here I find the first confusing observation. I can't interact with > > the dataset > > and its content within the jail. I've set the "jailed" property of > > pool00/poudriere via "zfs set jailed=3Don pool00/poudriere" and I also= have to > > attach the jailed dataset manually via "zfs jail poudriere > > pool00/poudriere" to > > the (running) jail. But within the jail, listing ZFS's mountpoints rev= eal: > > > > NAME USED AVAIL REFER MOUNTPOINT > > pool00 124G 8.62T 34.9K /pool00 > > pool00/poudriere 34.9K 8.62T 34.9K /pool/poudriere > > > > but nothing below /pool/poudriere is visible to the jail. Being confus= ed I Since we use ezjail-admin for jail a rudimentary jail administration (just creating and/or deleting the jail, maintenance is done manually), jails ar= e rooting at pool00 /pool00 pool00/ezjail/ /pool/jails pool00/ezjail/pulverfass /pool/jails/pulverfass "pulverfass" is the jail supposed to do the poudriere's job. Since I got confused about the orientation of the "directory tree" - the r= oot is toplevel instead of downlevel - I corrected the ZFS dataset holding the poudriere stuff that way: pool00/ezjail/poudriere /pool/poudriere The jail "pulverfass" now is supposed to mount the dataset at /pool/jails/pulverfass/pool/poudriere > > Please be more verbose what you mean by "interact" and "is visible". > > Do zfs commands on the dataset work? After I corrected my mistake by not respecting the mountpoint according to statfs, with the changes explained above I'm able to mount /pool/poudriere within the jail "pulverfass", but I still have problems with the way how I= have to mount this dataset. When zfs-mounted (zfs mount -a), I'm able to use th= e dataset with poudriere as expected! But after rebooting the host and after= all jails has been restarted as well, I have to first make the dataset /pool/poudriere available to the jail via the command "zfs jail pulverfass ool00/ezjail/pulverfass" - which seems not to be done automatically by the startup process - and then from within the jail "pulverfass" I can mount t= he dataset as desribed above. This seems to be a big step ahead for me. > > Note, I don't remember if you can manage the root of the jail, but at > least subsequent jails should be possible to manage. I don't have a > jail where the root is managed in the jail, just additional ones. > Those need to have set a mountpoint after the initial jailing and then > maybe even be mounted for the first time. > > Please also check /etc/defaults/devfs.rules if the jail rule contains > an unhide entry for zfs. Within /etc/jail.conf devfs_ruleset=3D "4"; is configured as a common rulesset for all jails (in the common portion of /etc/jail.conf). There is no custom devfs.rules in /etc/, so /etc/defaults/devfs.rules shou= ld apply and as far as I can see, there is an "unhide" applied to zfs: [... /etc/defaults/devfs.rulse ...] # Devices usually found in a jail. # [devfsrules_jail=3D4] add include $devfsrules_hide_all add include $devfsrules_unhide_basic add include $devfsrules_unhide_login add path fuse unhide add path zfs unhide [...] So, I guess everything is all right from this perspective, isn't it? Is there a way to automatically provide the ZFS dataset of choice to the propper jail or do i have to either issue manually "zfs jail jailid/jailname pool/dataset" or put such a comma= nd as script-command in the jail's definition portion as exec.prestart+=3D "zfs jail ${name} pool00/ezjail/poudriere"; ? > > Bye, > Alexander. > Thank you very much and kind regards, oh From owner-freebsd-current@freebsd.org Thu Aug 29 20:56:03 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 87B90DFD16 for ; Thu, 29 Aug 2019 20:56:03 +0000 (UTC) (envelope-from maksim.yevmenkin@gmail.com) Received: from mail-qk1-x729.google.com (mail-qk1-x729.google.com [IPv6:2607:f8b0:4864:20::729]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46KFJL5kkJz4BTQ for ; Thu, 29 Aug 2019 20:56:02 +0000 (UTC) (envelope-from maksim.yevmenkin@gmail.com) Received: by mail-qk1-x729.google.com with SMTP id m10so4313755qkk.1 for ; Thu, 29 Aug 2019 13:56:02 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=QXKbZ6M+6ljIkOYy13deYH2j5ZG7K3RSm7b+ymziPY8=; b=fwEikZgXoAMO/W1hwsiOTeh3muiBOgBoxehxsO+LejNaNMwZ9Y8l/ussPDSjDUdh8b H5rk8/+8K+hSEDA5sv6FVI0BM5BrV99Nznbmf4Mc/1b35to7du2o276BRaIymwGzIbGp 2Ij0cicSCOA3lC2qU4EsLLhgp8ii8bxj35zz0lY01sHa00Ec0DqjcKIbJ88k/bL0ifPT iDgLXPLduNKv4OoN4U54Pqubtfj+ihxAL/5pqtO5wiEKEFBxxexcPHt7nm2wZATS2X2z 1EJ+gT/SztQRSPlrrlGjBifqEVCmSWJ9pHnp/3NmVhtd71FTPGzK5U+JNCXqK/NSBbY9 2DoA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=QXKbZ6M+6ljIkOYy13deYH2j5ZG7K3RSm7b+ymziPY8=; b=l0nD9x5+VHj8YoaN+OlmsTilLJpgC2HvTl/Y8ZiKTjTuKqWYqbjhDVWmNKZHI/GnEZ 73glpbpiR5NFPQTgFZLSK2Ogi85IYVusBWtibE2oyc/Kd5zWPq/fJ9RED43ARN2mtqbS rKXNH+IyvXGCh9s6EuIyRhETSJyhQLpLsWc8y04GBBjJCx0DagV/LKpLAkaGz3pW1AC/ IHuHzLZvLNgQxhBY/4LYojfIafKAoAnjBn7zdwaHkQJ2f7D9uahokWsMwYAyj/KWkA7R sp0Odjh4lBGHYhRdqJViZXZHiiBQkD92TEFMKm9ITCKu5HleHjIx3pYKl3bD3gfSDZAj xXyg== X-Gm-Message-State: APjAAAVDwBtAvl4RvZCXO88pb7wDdprSZ7SuucG0qTGbrYnzSbspxNBC sECFV/FB5C6v1PdNuQQiniMt7Sf8264yeBpf0n8= X-Google-Smtp-Source: APXvYqyjA7cyCxaFDkKCSlqe4ajMIFCIqWQsCR0jwIPgpQYzz0c0mB2oBXltekrgoji3DH+HlMZ2Wd3FOjfuG+XX6d4= X-Received: by 2002:a37:9202:: with SMTP id u2mr6810790qkd.102.1567112161509; Thu, 29 Aug 2019 13:56:01 -0700 (PDT) MIME-Version: 1.0 References: <1115053193.64543.1567031661382.ref@mail.yahoo.com> <1115053193.64543.1567031661382@mail.yahoo.com> In-Reply-To: From: Maksim Yevmenkin Date: Thu, 29 Aug 2019 13:55:50 -0700 Message-ID: Subject: Re: Kernel-Crash when working with ubt0 To: Warner Losh Cc: mms.vanbreukelingen@gmail.com, Konstantin Belousov , Hans Petter Selasky , "freebsd-current@freebsd.org" Content-Type: multipart/mixed; boundary="000000000000b5f150059147bbf7" X-Rspamd-Queue-Id: 46KFJL5kkJz4BTQ X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=fwEikZgX; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of maksimyevmenkin@gmail.com designates 2607:f8b0:4864:20::729 as permitted sender) smtp.mailfrom=maksimyevmenkin@gmail.com X-Spamd-Result: default: False [-2.90 / 15.00]; TO_DN_EQ_ADDR_SOME(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; FREEMAIL_FROM(0.00)[gmail.com]; HAS_ATTACHMENT(0.00)[]; RCPT_COUNT_FIVE(0.00)[5]; DKIM_TRACE(0.00)[gmail.com:+]; CTYPE_MIXED_BOGUS(1.00)[]; MIME_BASE64_TEXT(0.10)[]; NEURAL_HAM_SHORT(-1.00)[-0.998,0]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:+]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; TAGGED_FROM(0.00)[]; DWL_DNSWL_NONE(0.00)[gmail.com.dwl.dnswl.org : 127.0.5.0]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; FROM_HAS_DN(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; TAGGED_RCPT(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; MIME_GOOD(-0.10)[multipart/mixed,text/plain]; IP_SCORE_FREEMAIL(0.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[9.2.7.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; IP_SCORE(0.00)[ip: (-9.30), ipnet: 2607:f8b0::/32(-2.85), asn: 15169(-2.32), country: US(-0.05)]; FREEMAIL_CC(0.00)[gmail.com]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 29 Aug 2019 20:56:03 -0000 --000000000000b5f150059147bbf7 Content-Type: text/plain; charset="UTF-8" On Wed, Aug 28, 2019 at 6:48 PM Warner Losh wrote: > patch -p1 worked for me to apply it. > > And it worked just fine for everything once I rebooted. The patch looked fine to my eye. thanks Warner please find attached (more complete) patch that should address issue of holding lock over copyin/out (or so i claim). thanks max --000000000000b5f150059147bbf7 Content-Type: text/plain; charset="US-ASCII"; name="ng_btsocket.diff.txt" Content-Disposition: attachment; filename="ng_btsocket.diff.txt" Content-Transfer-Encoding: base64 Content-ID: X-Attachment-Id: f_jzx63ub20 SW5kZXg6IHN5cy9uZXRncmFwaC9ibHVldG9vdGgvc29ja2V0L25nX2J0c29ja2V0X2hjaV9yYXcu Ywo9PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09 PT09PT09PT09PT09Ci0tLSBzeXMvbmV0Z3JhcGgvYmx1ZXRvb3RoL3NvY2tldC9uZ19idHNvY2tl dF9oY2lfcmF3LmMJKHJldmlzaW9uIDM1MTYxMSkKKysrIHN5cy9uZXRncmFwaC9ibHVldG9vdGgv c29ja2V0L25nX2J0c29ja2V0X2hjaV9yYXcuYwkod29ya2luZyBjb3B5KQpAQCAtMTE1NiwxNSAr MTE1NiwxNSBAQAogCQlpZiAocC0+bnVtX2VudHJpZXMgPD0gMCB8fCAKIAkJICAgIHAtPm51bV9l bnRyaWVzID4gTkdfSENJX01BWF9ORUlHSEJPUl9OVU0gfHwKIAkJICAgIHAtPmVudHJpZXMgPT0g TlVMTCkgewotCQkJZXJyb3IgPSBFSU5WQUw7Ci0JCQlicmVhazsKKwkJCW10eF91bmxvY2soJnBj Yi0+cGNiX210eCk7CisJCQlyZXR1cm4gKEVJTlZBTCk7CiAJCX0KIAogCQlOR19NS01FU1NBR0Uo bXNnLCBOR01fSENJX0NPT0tJRSwKIAkJCU5HTV9IQ0lfTk9ERV9HRVRfTkVJR0hCT1JfQ0FDSEUs IDAsIE1fTk9XQUlUKTsKIAkJaWYgKG1zZyA9PSBOVUxMKSB7Ci0JCQllcnJvciA9IEVOT01FTTsK LQkJCWJyZWFrOworCQkJbXR4X3VubG9jaygmcGNiLT5wY2JfbXR4KTsKKwkJCXJldHVybiAoRU5P TUVNKTsKIAkJfQogCQluZ19idHNvY2tldF9oY2lfcmF3X2dldF90b2tlbigmbXNnLT5oZWFkZXIu dG9rZW4pOwogCQlwY2ItPnRva2VuID0gbXNnLT5oZWFkZXIudG9rZW47CkBAIC0xMTczLDcgKzEx NzMsOCBAQAogCQlOR19TRU5EX01TR19QQVRIKGVycm9yLCBuZ19idHNvY2tldF9oY2lfcmF3X25v ZGUsIG1zZywgcGF0aCwgMCk7CiAJCWlmIChlcnJvciAhPSAwKSB7CiAJCQlwY2ItPnRva2VuID0g MDsKLQkJCWJyZWFrOworCQkJbXR4X3VubG9jaygmcGNiLT5wY2JfbXR4KTsKKwkJCXJldHVybiAo ZXJyb3IpOwogCQl9CiAKIAkJZXJyb3IgPSBtc2xlZXAoJnBjYi0+bXNnLCAmcGNiLT5wY2JfbXR4 LApAQCAtMTE4MSwxNiArMTE4MiwyMSBAQAogCQkJCW5nX2J0c29ja2V0X2hjaV9yYXdfaW9jdGxf dGltZW91dCAqIGh6KTsKIAkJcGNiLT50b2tlbiA9IDA7CiAKLQkJaWYgKGVycm9yICE9IDApCi0J CQlicmVhazsKKwkJaWYgKGVycm9yICE9IDApIHsKKwkJCW10eF91bmxvY2soJnBjYi0+cGNiX210 eCk7CisJCQlyZXR1cm4gKGVycm9yKTsKKwkJfQogCi0JCWlmIChwY2ItPm1zZyAhPSBOVUxMICYm Ci0JCSAgICBwY2ItPm1zZy0+aGVhZGVyLmNtZCA9PSBOR01fSENJX05PREVfR0VUX05FSUdIQk9S X0NBQ0hFKSB7CisJCW1zZyA9IHBjYi0+bXNnOworCQlwY2ItPm1zZyA9IE5VTEw7CisKKwkJbXR4 X3VubG9jaygmcGNiLT5wY2JfbXR4KTsKKwkJCisJCWlmIChtc2cgIT0gTlVMTCAmJgorCQkgICAg bXNnLT5oZWFkZXIuY21kID09IE5HTV9IQ0lfTk9ERV9HRVRfTkVJR0hCT1JfQ0FDSEUpIHsKIAkJ CS8qIFJldHVybiBkYXRhIGJhY2sgdG8gdXNlciBzcGFjZSAqLwotCQkJcDEgPSAobmdfaGNpX25v ZGVfZ2V0X25laWdoYm9yX2NhY2hlX2VwICopCi0JCQkJKHBjYi0+bXNnLT5kYXRhKTsKLQkJCXAy ID0gKG5nX2hjaV9ub2RlX25laWdoYm9yX2NhY2hlX2VudHJ5X2VwICopCi0JCQkJKHAxICsgMSk7 CisJCQlwMSA9IChuZ19oY2lfbm9kZV9nZXRfbmVpZ2hib3JfY2FjaGVfZXAgKikobXNnLT5kYXRh KTsKKwkJCXAyID0gKG5nX2hjaV9ub2RlX25laWdoYm9yX2NhY2hlX2VudHJ5X2VwICopKHAxICsg MSk7CiAKIAkJCXAtPm51bV9lbnRyaWVzID0gbWluKHAtPm51bV9lbnRyaWVzLCBwMS0+bnVtX2Vu dHJpZXMpOwogCQkJaWYgKHAtPm51bV9lbnRyaWVzID4gMCkKQEAgLTEyMDAsOCArMTIwNiw5IEBA CiAJCX0gZWxzZQogCQkJZXJyb3IgPSBFSU5WQUw7CiAKLQkJTkdfRlJFRV9NU0cocGNiLT5tc2cp OyAvKiBjaGVja3MgZm9yICE9IE5VTEwgKi8KLQkJfWJyZWFrOworCQlOR19GUkVFX01TRyhtc2cp OyAvKiBjaGVja3MgZm9yICE9IE5VTEwgKi8KKwkJcmV0dXJuIChlcnJvcik7CisJCX0gLyogTk9U UkVBQ0hFRCAqLwogCiAJY2FzZSBTSU9DX0hDSV9SQVdfTk9ERV9HRVRfQ09OX0xJU1Q6IHsKIAkJ c3RydWN0IG5nX2J0c29ja2V0X2hjaV9yYXdfY29uX2xpc3QJKnAgPSAKQEAgLTEyMTIsMTUgKzEy MTksMTUgQEAKIAkJaWYgKHAtPm51bV9jb25uZWN0aW9ucyA9PSAwIHx8CiAJCSAgICBwLT5udW1f Y29ubmVjdGlvbnMgPiBOR19IQ0lfTUFYX0NPTl9OVU0gfHwKIAkJICAgIHAtPmNvbm5lY3Rpb25z ID09IE5VTEwpIHsKLQkJCWVycm9yID0gRUlOVkFMOwotCQkJYnJlYWs7CisJCQltdHhfdW5sb2Nr KCZwY2ItPnBjYl9tdHgpOworCQkJcmV0dXJuIChFSU5WQUwpOwogCQl9CiAKIAkJTkdfTUtNRVNT QUdFKG1zZywgTkdNX0hDSV9DT09LSUUsIE5HTV9IQ0lfTk9ERV9HRVRfQ09OX0xJU1QsCiAJCQkw LCBNX05PV0FJVCk7CiAJCWlmIChtc2cgPT0gTlVMTCkgewotCQkJZXJyb3IgPSBFTk9NRU07Ci0J CQlicmVhazsKKwkJCW10eF91bmxvY2soJnBjYi0+cGNiX210eCk7CisJCQlyZXR1cm4gKEVOT01F TSk7CiAJCX0KIAkJbmdfYnRzb2NrZXRfaGNpX3Jhd19nZXRfdG9rZW4oJm1zZy0+aGVhZGVyLnRv a2VuKTsKIAkJcGNiLT50b2tlbiA9IG1zZy0+aGVhZGVyLnRva2VuOwpAQCAtMTIyOSw3ICsxMjM2 LDggQEAKIAkJTkdfU0VORF9NU0dfUEFUSChlcnJvciwgbmdfYnRzb2NrZXRfaGNpX3Jhd19ub2Rl LCBtc2csIHBhdGgsIDApOwogCQlpZiAoZXJyb3IgIT0gMCkgewogCQkJcGNiLT50b2tlbiA9IDA7 Ci0JCQlicmVhazsKKwkJCW10eF91bmxvY2soJnBjYi0+cGNiX210eCk7CisJCQlyZXR1cm4gKGVy cm9yKTsKIAkJfQogCiAJCWVycm9yID0gbXNsZWVwKCZwY2ItPm1zZywgJnBjYi0+cGNiX210eCwK QEAgLTEyMzcsMTMgKzEyNDUsMjAgQEAKIAkJCQluZ19idHNvY2tldF9oY2lfcmF3X2lvY3RsX3Rp bWVvdXQgKiBoeik7CiAJCXBjYi0+dG9rZW4gPSAwOwogCi0JCWlmIChlcnJvciAhPSAwKQotCQkJ YnJlYWs7CisJCWlmIChlcnJvciAhPSAwKSB7CisJCQltdHhfdW5sb2NrKCZwY2ItPnBjYl9tdHgp OworCQkJcmV0dXJuIChlcnJvcik7CisJCX0KIAotCQlpZiAocGNiLT5tc2cgIT0gTlVMTCAmJgot CQkgICAgcGNiLT5tc2ctPmhlYWRlci5jbWQgPT0gTkdNX0hDSV9OT0RFX0dFVF9DT05fTElTVCkg eworCQltc2cgPSBwY2ItPm1zZzsKKwkJcGNiLT5tc2cgPSBOVUxMOworCisJCW10eF91bmxvY2so JnBjYi0+cGNiX210eCk7CisKKwkJaWYgKG1zZyAhPSBOVUxMICYmCisJCSAgICBtc2ctPmhlYWRl ci5jbWQgPT0gTkdNX0hDSV9OT0RFX0dFVF9DT05fTElTVCkgewogCQkJLyogUmV0dXJuIGRhdGEg YmFjayB0byB1c2VyIHNwYWNlICovCi0JCQlwMSA9IChuZ19oY2lfbm9kZV9jb25fbGlzdF9lcCAq KShwY2ItPm1zZy0+ZGF0YSk7CisJCQlwMSA9IChuZ19oY2lfbm9kZV9jb25fbGlzdF9lcCAqKSht c2ctPmRhdGEpOwogCQkJcDIgPSAobmdfaGNpX25vZGVfY29uX2VwICopKHAxICsgMSk7CiAKIAkJ CXAtPm51bV9jb25uZWN0aW9ucyA9IG1pbihwLT5udW1fY29ubmVjdGlvbnMsCkBAIC0xMjU1LDgg KzEyNzAsOSBAQAogCQl9IGVsc2UKIAkJCWVycm9yID0gRUlOVkFMOwogCi0JCU5HX0ZSRUVfTVNH KHBjYi0+bXNnKTsgLyogY2hlY2tzIGZvciAhPSBOVUxMICovCi0JCX0gYnJlYWs7CisJCU5HX0ZS RUVfTVNHKG1zZyk7IC8qIGNoZWNrcyBmb3IgIT0gTlVMTCAqLworCQlyZXR1cm4gKGVycm9yKTsK KwkJfSAvKiBOT1RSRUFDSEVEICovCiAKIAljYXNlIFNJT0NfSENJX1JBV19OT0RFX0dFVF9MSU5L X1BPTElDWV9NQVNLOiB7CiAJCXN0cnVjdCBuZ19idHNvY2tldF9oY2lfcmF3X25vZGVfbGlua19w b2xpY3lfbWFzawkqcCA9IApAQCAtMTMzMiwxNSArMTM0OCwxNSBAQAogCQlzdHJ1Y3Qgbm9kZWlu Zm8JCQkJCSpuaSA9IG5sLT5uYW1lczsKIAogCQlpZiAobmwtPm51bV9uYW1lcyA9PSAwKSB7Ci0J CQllcnJvciA9IEVJTlZBTDsKLQkJCWJyZWFrOworCQkJbXR4X3VubG9jaygmcGNiLT5wY2JfbXR4 KTsKKwkJCXJldHVybiAoRUlOVkFMKTsKIAkJfQogCiAJCU5HX01LTUVTU0FHRShtc2csIE5HTV9H RU5FUklDX0NPT0tJRSwgTkdNX0xJU1ROQU1FUywKIAkJCTAsIE1fTk9XQUlUKTsKIAkJaWYgKG1z ZyA9PSBOVUxMKSB7Ci0JCQllcnJvciA9IEVOT01FTTsKLQkJCWJyZWFrOworCQkJbXR4X3VubG9j aygmcGNiLT5wY2JfbXR4KTsKKwkJCXJldHVybiAoRU5PTUVNKTsKIAkJfQogCQluZ19idHNvY2tl dF9oY2lfcmF3X2dldF90b2tlbigmbXNnLT5oZWFkZXIudG9rZW4pOwogCQlwY2ItPnRva2VuID0g bXNnLT5oZWFkZXIudG9rZW47CkBAIC0xMzQ5LDcgKzEzNjUsOCBAQAogCQlOR19TRU5EX01TR19Q QVRIKGVycm9yLCBuZ19idHNvY2tldF9oY2lfcmF3X25vZGUsIG1zZywgIi46IiwgMCk7CiAJCWlm IChlcnJvciAhPSAwKSB7CiAJCQlwY2ItPnRva2VuID0gMDsKLQkJCWJyZWFrOworCQkJbXR4X3Vu bG9jaygmcGNiLT5wY2JfbXR4KTsKKwkJCXJldHVybiAoZXJyb3IpOwogCQl9CiAKIAkJZXJyb3Ig PSBtc2xlZXAoJnBjYi0+bXNnLCAmcGNiLT5wY2JfbXR4LApAQCAtMTM1NywxMiArMTM3NCwxOSBA QAogCQkJCW5nX2J0c29ja2V0X2hjaV9yYXdfaW9jdGxfdGltZW91dCAqIGh6KTsKIAkJcGNiLT50 b2tlbiA9IDA7CiAKLQkJaWYgKGVycm9yICE9IDApCi0JCQlicmVhazsKKwkJaWYgKGVycm9yICE9 IDApIHsKKwkJCW10eF91bmxvY2soJnBjYi0+cGNiX210eCk7CisJCQlyZXR1cm4gKGVycm9yKTsK KwkJfQogCi0JCWlmIChwY2ItPm1zZyAhPSBOVUxMICYmIHBjYi0+bXNnLT5oZWFkZXIuY21kID09 IE5HTV9MSVNUTkFNRVMpIHsKKwkJbXNnID0gcGNiLT5tc2c7CisJCXBjYi0+bXNnID0gTlVMTDsK KworCQltdHhfdW5sb2NrKCZwY2ItPnBjYl9tdHgpOworCisJCWlmIChtc2cgIT0gTlVMTCAmJiBt c2ctPmhlYWRlci5jbWQgPT0gTkdNX0xJU1ROQU1FUykgewogCQkJLyogUmV0dXJuIGRhdGEgYmFj ayB0byB1c2VyIHNwYWNlICovCi0JCQlzdHJ1Y3QgbmFtZWxpc3QJKm5sMSA9IChzdHJ1Y3QgbmFt ZWxpc3QgKikgcGNiLT5tc2ctPmRhdGE7CisJCQlzdHJ1Y3QgbmFtZWxpc3QJKm5sMSA9IChzdHJ1 Y3QgbmFtZWxpc3QgKikgbXNnLT5kYXRhOwogCQkJc3RydWN0IG5vZGVpbmZvCSpuaTEgPSAmbmwx LT5ub2RlaW5mb1swXTsKIAogCQkJd2hpbGUgKG5sLT5udW1fbmFtZXMgPiAwICYmIG5sMS0+bnVt bmFtZXMgPiAwKSB7CkBAIC0xMzg1LDggKzE0MDksOSBAQAogCQl9IGVsc2UKIAkJCWVycm9yID0g RUlOVkFMOwogCi0JCU5HX0ZSRUVfTVNHKHBjYi0+bXNnKTsgLyogY2hlY2tzIGZvciAhPSBOVUxM ICovCi0JCX0gYnJlYWs7CisJCU5HX0ZSRUVfTVNHKG1zZyk7IC8qIGNoZWNrcyBmb3IgIT0gTlVM TCAqLworCQlyZXR1cm4gKGVycm9yKTsKKwkJfSAvKiBOT1RSRUFDSEVEICovCiAKIAlkZWZhdWx0 OgogCQllcnJvciA9IEVJTlZBTDsKSW5kZXg6IHN5cy9uZXRncmFwaC9ibHVldG9vdGgvc29ja2V0 L25nX2J0c29ja2V0X2wyY2FwX3Jhdy5jCj09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09 PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT0KLS0tIHN5cy9uZXRncmFwaC9ibHVl dG9vdGgvc29ja2V0L25nX2J0c29ja2V0X2wyY2FwX3Jhdy5jCShyZXZpc2lvbiAzNTE2MTEpCisr KyBzeXMvbmV0Z3JhcGgvYmx1ZXRvb3RoL3NvY2tldC9uZ19idHNvY2tldF9sMmNhcF9yYXcuYwko d29ya2luZyBjb3B5KQpAQCAtODUyLDE1ICs4NTIsMTUgQEAKIAkJaWYgKHAtPm51bV9jb25uZWN0 aW9ucyA9PSAwIHx8CiAJCSAgICBwLT5udW1fY29ubmVjdGlvbnMgPiBOR19MMkNBUF9NQVhfQ09O X05VTSB8fAogCQkgICAgcC0+Y29ubmVjdGlvbnMgPT0gTlVMTCkgewotCQkJZXJyb3IgPSBFSU5W QUw7Ci0JCQlicmVhazsKKwkJCW10eF91bmxvY2soJnBjYi0+cGNiX210eCk7CisJCQlyZXR1cm4g KEVJTlZBTCk7CiAJCX0KIAogCQlOR19NS01FU1NBR0UobXNnLCBOR01fTDJDQVBfQ09PS0lFLCBO R01fTDJDQVBfTk9ERV9HRVRfQ09OX0xJU1QsCiAJCQkwLCBNX05PV0FJVCk7CiAJCWlmIChtc2cg PT0gTlVMTCkgewotCQkJZXJyb3IgPSBFTk9NRU07Ci0JCQlicmVhazsKKwkJCW10eF91bmxvY2so JnBjYi0+cGNiX210eCk7CisJCQlyZXR1cm4gKEVOT01FTSk7CiAJCX0KIAkJbmdfYnRzb2NrZXRf bDJjYXBfcmF3X2dldF90b2tlbigmbXNnLT5oZWFkZXIudG9rZW4pOwogCQlwY2ItPnRva2VuID0g bXNnLT5oZWFkZXIudG9rZW47CkBAIC04NzAsNyArODcwLDggQEAKIAkJCXBjYi0+cnQtPmhvb2ss IDApOwogCQlpZiAoZXJyb3IgIT0gMCkgewogCQkJcGNiLT50b2tlbiA9IDA7Ci0JCQlicmVhazsK KwkJCW10eF91bmxvY2soJnBjYi0+cGNiX210eCk7CisJCQlyZXR1cm4gKGVycm9yKTsKIAkJfQog CiAJCWVycm9yID0gbXNsZWVwKCZwY2ItPm1zZywgJnBjYi0+cGNiX210eCwgUFpFUk98UENBVENI LCAibDJjdGwiLApAQCAtODc3LDEzICs4NzgsMjAgQEAKIAkJCQluZ19idHNvY2tldF9sMmNhcF9y YXdfaW9jdGxfdGltZW91dCAqIGh6KTsKIAkJcGNiLT50b2tlbiA9IDA7CiAKLQkJaWYgKGVycm9y ICE9IDApCi0JCQlicmVhazsKKwkJaWYgKGVycm9yICE9IDApIHsKKwkJCW10eF91bmxvY2soJnBj Yi0+cGNiX210eCk7CisJCQlyZXR1cm4gKGVycm9yKTsKKwkJfQogCi0JCWlmIChwY2ItPm1zZyAh PSBOVUxMICYmCi0JCSAgICBwY2ItPm1zZy0+aGVhZGVyLmNtZCA9PSBOR01fTDJDQVBfTk9ERV9H RVRfQ09OX0xJU1QpIHsKKwkJbXNnID0gcGNiLT5tc2c7CisJCXBjYi0+bXNnID0gTlVMTDsKKwor CQltdHhfdW5sb2NrKCZwY2ItPnBjYl9tdHgpOworCisJCWlmIChtc2cgIT0gTlVMTCAmJgorCQkg ICAgbXNnLT5oZWFkZXIuY21kID09IE5HTV9MMkNBUF9OT0RFX0dFVF9DT05fTElTVCkgewogCQkJ LyogUmV0dXJuIGRhdGEgYmFjayB0byB1c2VyIHNwYWNlICovCi0JCQlwMSA9IChuZ19sMmNhcF9u b2RlX2Nvbl9saXN0X2VwICopKHBjYi0+bXNnLT5kYXRhKTsKKwkJCXAxID0gKG5nX2wyY2FwX25v ZGVfY29uX2xpc3RfZXAgKikobXNnLT5kYXRhKTsKIAkJCXAyID0gKG5nX2wyY2FwX25vZGVfY29u X2VwICopKHAxICsgMSk7CiAKIAkJCXAtPm51bV9jb25uZWN0aW9ucyA9IG1pbihwLT5udW1fY29u bmVjdGlvbnMsCkBAIC04OTUsOCArOTAzLDkgQEAKIAkJfSBlbHNlCiAJCQllcnJvciA9IEVJTlZB TDsKIAotCQlOR19GUkVFX01TRyhwY2ItPm1zZyk7IC8qIGNoZWNrcyBmb3IgIT0gTlVMTCAqLwot CQl9IGJyZWFrOworCQlOR19GUkVFX01TRyhtc2cpOyAvKiBjaGVja3MgZm9yICE9IE5VTEwgKi8K KwkJcmV0dXJuIChlcnJvcik7CisJCX0gLyogTk9UUkVBQ0hFRCAqLwogCiAJY2FzZSBTSU9DX0wy Q0FQX05PREVfR0VUX0NIQU5fTElTVDogewogCQlzdHJ1Y3QgbmdfYnRzb2NrZXRfbDJjYXBfcmF3 X2NoYW5fbGlzdAkqcCA9CkBAIC05MDcsMTUgKzkxNiwxNSBAQAogCQlpZiAocC0+bnVtX2NoYW5u ZWxzID09IDAgfHwKIAkJICAgIHAtPm51bV9jaGFubmVscyA+IE5HX0wyQ0FQX01BWF9DSEFOX05V TSB8fAogCQkgICAgcC0+Y2hhbm5lbHMgPT0gTlVMTCkgewotCQkJZXJyb3IgPSBFSU5WQUw7Ci0J CQlicmVhazsKKwkJCW10eF91bmxvY2soJnBjYi0+cGNiX210eCk7CisJCQlyZXR1cm4gKEVJTlZB TCk7CiAJCX0KICAKIAkJTkdfTUtNRVNTQUdFKG1zZywgTkdNX0wyQ0FQX0NPT0tJRSwKIAkJCU5H TV9MMkNBUF9OT0RFX0dFVF9DSEFOX0xJU1QsIDAsIE1fTk9XQUlUKTsKIAkJaWYgKG1zZyA9PSBO VUxMKSB7Ci0JCQllcnJvciA9IEVOT01FTTsKLQkJCWJyZWFrOworCQkJbXR4X3VubG9jaygmcGNi LT5wY2JfbXR4KTsKKwkJCXJldHVybiAoRU5PTUVNKTsKIAkJfQogCQluZ19idHNvY2tldF9sMmNh cF9yYXdfZ2V0X3Rva2VuKCZtc2ctPmhlYWRlci50b2tlbik7CiAJCXBjYi0+dG9rZW4gPSBtc2ct PmhlYWRlci50b2tlbjsKQEAgLTkyNSw3ICs5MzQsOCBAQAogCQkJcGNiLT5ydC0+aG9vaywgMCk7 CiAJCWlmIChlcnJvciAhPSAwKSB7CiAJCQlwY2ItPnRva2VuID0gMDsKLQkJCWJyZWFrOworCQkJ bXR4X3VubG9jaygmcGNiLT5wY2JfbXR4KTsKKwkJCXJldHVybiAoZXJyb3IpOwogCQl9CiAKIAkJ ZXJyb3IgPSBtc2xlZXAoJnBjYi0+bXNnLCAmcGNiLT5wY2JfbXR4LCBQWkVST3xQQ0FUQ0gsICJs MmN0bCIsCkBAIC05MzIsMTMgKzk0MiwyMCBAQAogCQkJCW5nX2J0c29ja2V0X2wyY2FwX3Jhd19p b2N0bF90aW1lb3V0ICogaHopOwogCQlwY2ItPnRva2VuID0gMDsKIAotCQlpZiAoZXJyb3IgIT0g MCkKLQkJCWJyZWFrOworCQlpZiAoZXJyb3IgIT0gMCkgeworCQkJbXR4X3VubG9jaygmcGNiLT5w Y2JfbXR4KTsKKwkJCXJldHVybiAoZXJyb3IpOworCQl9CiAKLQkJaWYgKHBjYi0+bXNnICE9IE5V TEwgJiYKLQkJICAgIHBjYi0+bXNnLT5oZWFkZXIuY21kID09IE5HTV9MMkNBUF9OT0RFX0dFVF9D SEFOX0xJU1QpIHsKKwkJbXNnID0gcGNiLT5tc2c7CisJCXBjYi0+bXNnID0gTlVMTDsKKworCQlt dHhfdW5sb2NrKCZwY2ItPnBjYl9tdHgpOworCisJCWlmIChtc2cgIT0gTlVMTCAmJgorCQkgICAg bXNnLT5oZWFkZXIuY21kID09IE5HTV9MMkNBUF9OT0RFX0dFVF9DSEFOX0xJU1QpIHsKIAkJCS8q IFJldHVybiBkYXRhIGJhY2sgdG8gdXNlciBzcGFjZSAqLwotCQkJcDEgPSAobmdfbDJjYXBfbm9k ZV9jaGFuX2xpc3RfZXAgKikocGNiLT5tc2ctPmRhdGEpOworCQkJcDEgPSAobmdfbDJjYXBfbm9k ZV9jaGFuX2xpc3RfZXAgKikobXNnLT5kYXRhKTsKIAkJCXAyID0gKG5nX2wyY2FwX25vZGVfY2hh bl9lcCAqKShwMSArIDEpOwogCiAJCQlwLT5udW1fY2hhbm5lbHMgPSBtaW4ocC0+bnVtX2NoYW5u ZWxzLCAKQEAgLTk1MCw4ICs5NjcsOSBAQAogCQl9IGVsc2UKIAkJCWVycm9yID0gRUlOVkFMOwog Ci0JCU5HX0ZSRUVfTVNHKHBjYi0+bXNnKTsgLyogY2hlY2tzIGZvciAhPSBOVUxMICovCi0JCX0g YnJlYWs7CisJCU5HX0ZSRUVfTVNHKG1zZyk7IC8qIGNoZWNrcyBmb3IgIT0gTlVMTCAqLworCQly ZXR1cm4gKGVycm9yKTsKKwkJfSAvKiBOT1RSRUFDSEVEICovCiAKIAljYXNlIFNJT0NfTDJDQVBf TDJDQV9QSU5HOiB7CiAJCXN0cnVjdCBuZ19idHNvY2tldF9sMmNhcF9yYXdfcGluZwkqcCA9IApA QCAtOTYxLDggKzk3OSw4IEBACiAKIAkJaWYgKChwLT5lY2hvX3NpemUgIT0gMCAmJiBwLT5lY2hv X2RhdGEgPT0gTlVMTCkgfHwKIAkJICAgICBwLT5lY2hvX3NpemUgPiBOR19MMkNBUF9NQVhfRUNI T19TSVpFKSB7Ci0JCQllcnJvciA9IEVJTlZBTDsKLQkJCWJyZWFrOworCQkJbXR4X3VubG9jaygm cGNiLT5wY2JfbXR4KTsKKwkJCXJldHVybiAoRUlOVkFMKTsKIAkJfQogCiAJCU5HX01LTUVTU0FH RShtc2csIE5HTV9MMkNBUF9DT09LSUUsCkBAIC05NjksOCArOTg3LDggQEAKIAkJCU5HTV9MMkNB UF9MMkNBX1BJTkcsIHNpemVvZigqaXApICsgcC0+ZWNob19zaXplLAogCQkJTV9OT1dBSVQpOwog CQlpZiAobXNnID09IE5VTEwpIHsKLQkJCWVycm9yID0gRU5PTUVNOwotCQkJYnJlYWs7CisJCQlt dHhfdW5sb2NrKCZwY2ItPnBjYl9tdHgpOworCQkJcmV0dXJuIChFTk9NRU0pOwogCQl9CiAJCW5n X2J0c29ja2V0X2wyY2FwX3Jhd19nZXRfdG9rZW4oJm1zZy0+aGVhZGVyLnRva2VuKTsKIAkJcGNi LT50b2tlbiA9IG1zZy0+aGVhZGVyLnRva2VuOwpAQCAtOTgxLDExICs5OTksMTUgQEAKIAkJaXAt PmVjaG9fc2l6ZSA9IHAtPmVjaG9fc2l6ZTsKIAogCQlpZiAoaXAtPmVjaG9fc2l6ZSA+IDApIHsK KwkJCW10eF91bmxvY2soJnBjYi0+cGNiX210eCk7CiAJCQllcnJvciA9IGNvcHlpbihwLT5lY2hv X2RhdGEsIGlwICsgMSwgcC0+ZWNob19zaXplKTsKKwkJCW10eF9sb2NrKCZwY2ItPnBjYl9tdHgp OworCiAJCQlpZiAoZXJyb3IgIT0gMCkgewogCQkJCU5HX0ZSRUVfTVNHKG1zZyk7CiAJCQkJcGNi LT50b2tlbiA9IDA7Ci0JCQkJYnJlYWs7CisJCQkJbXR4X3VubG9jaygmcGNiLT5wY2JfbXR4KTsK KwkJCQlyZXR1cm4gKGVycm9yKTsKIAkJCX0KIAkJfQogCkBAIC05OTMsNyArMTAxNSw4IEBACiAJ CQlwY2ItPnJ0LT5ob29rLCAwKTsKIAkJaWYgKGVycm9yICE9IDApIHsKIAkJCXBjYi0+dG9rZW4g PSAwOwotCQkJYnJlYWs7CisJCQltdHhfdW5sb2NrKCZwY2ItPnBjYl9tdHgpOworCQkJcmV0dXJu IChlcnJvcik7CiAJCX0KIAogCQllcnJvciA9IG1zbGVlcCgmcGNiLT5tc2csICZwY2ItPnBjYl9t dHgsIFBaRVJPfFBDQVRDSCwgImwyY3RsIiwKQEAgLTEwMDAsMTMgKzEwMjMsMjAgQEAKIAkJCQli bHVldG9vdGhfbDJjYXBfcnR4X3RpbWVvdXQoKSk7CiAJCXBjYi0+dG9rZW4gPSAwOwogCi0JCWlm IChlcnJvciAhPSAwKQotCQkJYnJlYWs7CisJCWlmIChlcnJvciAhPSAwKSB7CisJCQltdHhfdW5s b2NrKCZwY2ItPnBjYl9tdHgpOworCQkJcmV0dXJuIChlcnJvcik7CisJCX0KIAotCQlpZiAocGNi LT5tc2cgIT0gTlVMTCAmJgotCQkgICAgcGNiLT5tc2ctPmhlYWRlci5jbWQgPT0gTkdNX0wyQ0FQ X0wyQ0FfUElORykgeworCQltc2cgPSBwY2ItPm1zZzsKKwkJcGNiLT5tc2cgPSBOVUxMOworCisJ CW10eF91bmxvY2soJnBjYi0+cGNiX210eCk7CisKKwkJaWYgKG1zZyAhPSBOVUxMICYmCisJCSAg ICBtc2ctPmhlYWRlci5jbWQgPT0gTkdNX0wyQ0FQX0wyQ0FfUElORykgewogCQkJLyogUmV0dXJu IGRhdGEgYmFjayB0byB0aGUgdXNlciBzcGFjZSAqLwotCQkJb3AgPSAobmdfbDJjYXBfbDJjYV9w aW5nX29wICopKHBjYi0+bXNnLT5kYXRhKTsKKwkJCW9wID0gKG5nX2wyY2FwX2wyY2FfcGluZ19v cCAqKShtc2ctPmRhdGEpOwogCQkJcC0+cmVzdWx0ID0gb3AtPnJlc3VsdDsKIAkJCXAtPmVjaG9f c2l6ZSA9IG1pbihwLT5lY2hvX3NpemUsIG9wLT5lY2hvX3NpemUpOwogCkBAIC0xMDE2LDggKzEw NDYsOSBAQAogCQl9IGVsc2UKIAkJCWVycm9yID0gRUlOVkFMOwogCi0JCU5HX0ZSRUVfTVNHKHBj Yi0+bXNnKTsgLyogY2hlY2tzIGZvciAhPSBOVUxMICovCi0JCX0gYnJlYWs7CisJCU5HX0ZSRUVf TVNHKG1zZyk7IC8qIGNoZWNrcyBmb3IgIT0gTlVMTCAqLworCQlyZXR1cm4gKGVycm9yKTsKKwkJ fSAvKiBOT1RSRUFDSEVEICovCiAKIAljYXNlIFNJT0NfTDJDQVBfTDJDQV9HRVRfSU5GTzogewog CQlzdHJ1Y3QgbmdfYnRzb2NrZXRfbDJjYXBfcmF3X2dldF9pbmZvCSpwID0gCkBAIC0xMDI2LDEz ICsxMDU3LDEzIEBACiAJCW5nX2wyY2FwX2wyY2FfZ2V0X2luZm9fb3AJCSpvcCA9IE5VTEw7CiAK IAkJaWYgKCEocGNiLT5mbGFncyAmIE5HX0JUU09DS0VUX0wyQ0FQX1JBV19QUklWSUxFR0VEKSkg ewotCQkJZXJyb3IgPSBFUEVSTTsKLQkJCWJyZWFrOworCQkJbXR4X3VubG9jaygmcGNiLT5wY2Jf bXR4KTsKKwkJCXJldHVybiAoRVBFUk0pOwogCQl9CiAKIAkJaWYgKHAtPmluZm9fc2l6ZSAhPSAw ICYmIHAtPmluZm9fZGF0YSA9PSBOVUxMKSB7Ci0JCQllcnJvciA9IEVJTlZBTDsKLQkJCWJyZWFr OworCQkJbXR4X3VubG9jaygmcGNiLT5wY2JfbXR4KTsKKwkJCXJldHVybiAoRUlOVkFMKTsKIAkJ fQogCiAJCU5HX01LTUVTU0FHRShtc2csIE5HTV9MMkNBUF9DT09LSUUsCkBAIC0xMDM5LDggKzEw NzAsOCBAQAogCQkJTkdNX0wyQ0FQX0wyQ0FfR0VUX0lORk8sIHNpemVvZigqaXApICsgcC0+aW5m b19zaXplLAogCQkJTV9OT1dBSVQpOwogCQlpZiAobXNnID09IE5VTEwpIHsKLQkJCWVycm9yID0g RU5PTUVNOwotCQkJYnJlYWs7CisJCQltdHhfdW5sb2NrKCZwY2ItPnBjYl9tdHgpOworCQkJcmV0 dXJuIChFTk9NRU0pOwogCQl9CiAJCW5nX2J0c29ja2V0X2wyY2FwX3Jhd19nZXRfdG9rZW4oJm1z Zy0+aGVhZGVyLnRva2VuKTsKIAkJcGNiLT50b2tlbiA9IG1zZy0+aGVhZGVyLnRva2VuOwpAQCAt MTA1NCw3ICsxMDg1LDggQEAKIAkJCXBjYi0+cnQtPmhvb2ssIDApOwogCQlpZiAoZXJyb3IgIT0g MCkgewogCQkJcGNiLT50b2tlbiA9IDA7Ci0JCQlicmVhazsKKwkJCW10eF91bmxvY2soJnBjYi0+ cGNiX210eCk7CisJCQlyZXR1cm4gKGVycm9yKTsKIAkJfQogCiAJCWVycm9yID0gbXNsZWVwKCZw Y2ItPm1zZywgJnBjYi0+cGNiX210eCwgUFpFUk98UENBVENILCAibDJjdGwiLApAQCAtMTA2MSwx MyArMTA5MywyMCBAQAogCQkJCWJsdWV0b290aF9sMmNhcF9ydHhfdGltZW91dCgpKTsKIAkJcGNi LT50b2tlbiA9IDA7CiAKLQkJaWYgKGVycm9yICE9IDApCi0JCQlicmVhazsKKwkJaWYgKGVycm9y ICE9IDApIHsKKwkJCW10eF91bmxvY2soJnBjYi0+cGNiX210eCk7CisJCQlyZXR1cm4gKGVycm9y KTsKKwkJfQogCi0JCWlmIChwY2ItPm1zZyAhPSBOVUxMICYmCi0JCSAgICBwY2ItPm1zZy0+aGVh ZGVyLmNtZCA9PSBOR01fTDJDQVBfTDJDQV9HRVRfSU5GTykgeworCQltc2cgPSBwY2ItPm1zZzsK KwkJcGNiLT5tc2cgPSBOVUxMOworCisJCW10eF91bmxvY2soJnBjYi0+cGNiX210eCk7CisKKwkJ aWYgKG1zZyAhPSBOVUxMICYmCisJCSAgICBtc2ctPmhlYWRlci5jbWQgPT0gTkdNX0wyQ0FQX0wy Q0FfR0VUX0lORk8pIHsKIAkJCS8qIFJldHVybiBkYXRhIGJhY2sgdG8gdGhlIHVzZXIgc3BhY2Ug Ki8KLQkJCW9wID0gKG5nX2wyY2FwX2wyY2FfZ2V0X2luZm9fb3AgKikocGNiLT5tc2ctPmRhdGEp OworCQkJb3AgPSAobmdfbDJjYXBfbDJjYV9nZXRfaW5mb19vcCAqKShtc2ctPmRhdGEpOwogCQkJ cC0+cmVzdWx0ID0gb3AtPnJlc3VsdDsKIAkJCXAtPmluZm9fc2l6ZSA9IG1pbihwLT5pbmZvX3Np emUsIG9wLT5pbmZvX3NpemUpOwogCkBAIC0xMDc3LDggKzExMTYsOSBAQAogCQl9IGVsc2UKIAkJ CWVycm9yID0gRUlOVkFMOwogCi0JCU5HX0ZSRUVfTVNHKHBjYi0+bXNnKTsgLyogY2hlY2tzIGZv ciAhPSBOVUxMICovCi0JCX0gYnJlYWs7CisJCU5HX0ZSRUVfTVNHKG1zZyk7IC8qIGNoZWNrcyBm b3IgIT0gTlVMTCAqLworCQlyZXR1cm4gKGVycm9yKTsKKwkJfSAvKiBOT1RSRUFDSEVEICovCiAK IAljYXNlIFNJT0NfTDJDQVBfTk9ERV9HRVRfQVVUT19ESVNDT05fVElNTzogewogCQlzdHJ1Y3Qg bmdfYnRzb2NrZXRfbDJjYXBfcmF3X2F1dG9fZGlzY29uX3RpbW8JKnAgPQo= --000000000000b5f150059147bbf7-- From owner-freebsd-current@freebsd.org Fri Aug 30 03:23:35 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id C85D4E7DF5 for ; Fri, 30 Aug 2019 03:23:35 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: from mail-qt1-x832.google.com (mail-qt1-x832.google.com [IPv6:2607:f8b0:4864:20::832]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46KPvV4CMFz4Zf6 for ; Fri, 30 Aug 2019 03:23:34 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: by mail-qt1-x832.google.com with SMTP id t12so6145396qtp.9 for ; Thu, 29 Aug 2019 20:23:34 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bsdimp-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=+3dY3YV56t76h4TAbJHuSIWeuvhW7IKDeFYX3G4NfPw=; b=GKnsIsiqgxLYlw01YKZdfliehqpBpFa4wja9F1Y2EhzRf/l18aDoOiDh2oG6zW0sfY tG9PWv7iB77XNaGUR/YReF/1JHHKeTWUCQYPX6YbPSd48LHxSPD+ZriSD9olS/Nyfl0U 5h7hFaScE33H9Wsg7ipzlHxVwdKF4W5HDQo3r5EAAJJCPqtbZlB7FMlem7+LWB1sbGQM beRMT2plzHInMIh+0M7wiPCQQgrvc6avRwtBtfoJh5JE2NAshQ6cMKvfdK/1+Cp3ahkl xoPJbTR3dmHP/GbjHGh0UeP2ykSehXsPiMCmte+Am7A52r37YK48PBWMo5fjAPirIroE 5hPQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=+3dY3YV56t76h4TAbJHuSIWeuvhW7IKDeFYX3G4NfPw=; b=tmsMQUNdOFR/k7PdTOWn4rCAOfNwipfsol7NBVXxbPh8N0tId9sQfYWy3nNof+iQOu JFOy8XPtLDU3R5ltO3zdlxfrfK4PNIJ4hz/z4PVvRzsTX0PshFIwXy6qKkfjN5kbnvOb QKTaRnhFM14YvcI4sS/F6iJnvSNVahxAp5fT9I+hmUAdG04MorZK8bOOLkd6hd952EO7 /UP+wmszc2jR0uQDxBySvyW7+BELq42xovZjhT7OCwNBiYBBrkc0/4qI+sB8hbLskslh 7YrfREdTF8wCZ6ozDZJy3ALH0ffwn0QZNtprOJgQ+tU08KrNKxXXBWzsABgUnHAk0c7I 14mg== X-Gm-Message-State: APjAAAUvVWFG9LOXJX128gUOC8+LVUURBjhX9y10KWWQoCT78iJOtDjS ECf9HNxNQDPpqsAmxGBjL3q//HBFkZVWKhLS2LTQug== X-Google-Smtp-Source: APXvYqz77WxoEqnfYbmwjtb8qiMh+1ppEHpsr9jtKDodWRf3IrJCd7/9dHZp00p27/nE6rYOyQRHPi5TTD/22rd1qpY= X-Received: by 2002:ac8:760e:: with SMTP id t14mr8513876qtq.175.1567135413373; Thu, 29 Aug 2019 20:23:33 -0700 (PDT) MIME-Version: 1.0 References: <1115053193.64543.1567031661382.ref@mail.yahoo.com> <1115053193.64543.1567031661382@mail.yahoo.com> In-Reply-To: From: Warner Losh Date: Thu, 29 Aug 2019 21:23:22 -0600 Message-ID: Subject: Re: Kernel-Crash when working with ubt0 To: Maksim Yevmenkin Cc: Miranda Maria Sophie Van den Breukelingen , Konstantin Belousov , Hans Petter Selasky , "freebsd-current@freebsd.org" X-Rspamd-Queue-Id: 46KPvV4CMFz4Zf6 X-Spamd-Bar: ----- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=bsdimp-com.20150623.gappssmtp.com header.s=20150623 header.b=GKnsIsiq; dmarc=none; spf=none (mx1.freebsd.org: domain of wlosh@bsdimp.com has no SPF policy when checking 2607:f8b0:4864:20::832) smtp.mailfrom=wlosh@bsdimp.com X-Spamd-Result: default: False [-5.92 / 15.00]; TO_DN_EQ_ADDR_SOME(0.00)[]; TO_DN_SOME(0.00)[]; RCPT_COUNT_FIVE(0.00)[5]; DKIM_TRACE(0.00)[bsdimp-com.20150623.gappssmtp.com:+]; NEURAL_HAM_SHORT(-1.00)[-0.996,0]; FORGED_SENDER(0.30)[imp@bsdimp.com,wlosh@bsdimp.com]; FREEMAIL_TO(0.00)[gmail.com]; MIME_TRACE(0.00)[0:+,1:+,2:~]; IP_SCORE(-2.92)[ip: (-9.41), ipnet: 2607:f8b0::/32(-2.84), asn: 15169(-2.32), country: US(-0.05)]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; FROM_NEQ_ENVFROM(0.00)[imp@bsdimp.com,wlosh@bsdimp.com]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[bsdimp-com.20150623.gappssmtp.com:s=20150623]; FROM_HAS_DN(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; TAGGED_RCPT(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; DMARC_NA(0.00)[bsdimp.com]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[2.3.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; R_SPF_NA(0.00)[]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[]; FREEMAIL_CC(0.00)[gmail.com] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 30 Aug 2019 03:23:35 -0000 On Thu, Aug 29, 2019 at 2:56 PM Maksim Yevmenkin wrote: > On Wed, Aug 28, 2019 at 6:48 PM Warner Losh wrote: > > patch -p1 worked for me to apply it. > > > > And it worked just fine for everything once I rebooted. The patch looked > fine to my eye. > > thanks Warner > > please find attached (more complete) patch that should address issue > of holding lock over copyin/out (or so i claim). > Seems to be working fine now... Warner From owner-freebsd-current@freebsd.org Fri Aug 30 12:18:03 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 55415CD3C5 for ; Fri, 30 Aug 2019 12:18:03 +0000 (UTC) (envelope-from Alexander@leidinger.net) Received: from mailgate.Leidinger.net (bastille.leidinger.net [89.238.82.207]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 46KdmB0j2vz444j for ; Fri, 30 Aug 2019 12:18:01 +0000 (UTC) (envelope-from Alexander@leidinger.net) Received: from outgoing.leidinger.net (p5B16567B.dip0.t-ipconnect.de [91.22.86.123]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (Client did not present a certificate) by mailgate.Leidinger.net (Postfix) with ESMTPSA id 969AAAED6; Fri, 30 Aug 2019 14:17:53 +0200 (CEST) Received: from webmail.leidinger.net (webmail.Leidinger.net [IPv6:fd73:10c7:2053:1::3:102]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (Client did not present a certificate) by outgoing.leidinger.net (Postfix) with ESMTPS id 35E5893CE; Fri, 30 Aug 2019 14:17:21 +0200 (CEST) Received: (from www@localhost) by webmail.leidinger.net (8.15.2/8.14.4/Submit) id x7UCHKNb075909; Fri, 30 Aug 2019 14:17:20 +0200 (CEST) (envelope-from Alexander@leidinger.net) X-Authentication-Warning: webmail.leidinger.net: www set sender to Alexander@leidinger.net using -f Received: from [::ffff:31.3.144.27] ([::ffff:31.3.144.27]) by webmail.leidinger.net (Horde Framework) with HTTPS; Fri, 30 Aug 2019 14:17:20 +0200 Date: Fri, 30 Aug 2019 14:17:20 +0200 Message-ID: <20190830141720.Horde.yKnzT-Dd2OP1_BMC2-svTaC@webmail.leidinger.net> From: Alexander Leidinger To: "O. Hartmann" Cc: freebsd-current@freebsd.org, Michael Zhilin Subject: Re: jails, ZFS, deprecated jail variables and poudriere problems References: <20190827101149.1efcb946@freyja> <20190828135700.Horde.m2EjpS9j67KYn2E1oSeoK8f@webmail.leidinger.net> <20190829142632.6b93892b@freyja> In-Reply-To: <20190829142632.6b93892b@freyja> User-Agent: Horde Application Framework 5 Accept-Language: de,en Content-Type: multipart/signed; boundary="=_6KdtFXi7O3zedMNg8yM4xn9"; protocol="application/pgp-signature"; micalg=pgp-sha1 MIME-Version: 1.0 ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=leidinger.net; s=outgoing-alex; t=1567167474; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=I7n82Amev7UMmeh00P1bFUGZv13SovdwfvMwPh+03Do=; b=Q7ZlAe1XuekCe4YLKqwddOyck38erEIr90kz4Mazqvmn481cpcLzwIdvWPcRG5QgHDJ1uo AtZ0TVy9snGTSrbnm3hDPGI6oDudXqSZ1AhYU79X9GC334riljO92xDm1tTlpo/WuNGxsK iuBf3nG9/gkPkmOKBd3C15p36EJ08xQNnJwsnjr4VZ7pV6M8Fy/nzKh8+6YIk4xhUx2pGp xHPNjyNA3rNEfgX2DyczcqI3dAPVjjhb2mTte7SJhVEOsqjZqyahDXaioaApTiwNvdogXE /6NSsgpyaWm7EppUxmRh/8yhCT0XlIWtlbKjp2Ijp1JqtiiK8T16jpq0yQIRjA== ARC-Seal: i=1; s=outgoing-alex; d=leidinger.net; t=1567167474; a=rsa-sha256; cv=none; b=vdmxb2o3wm61/Xt7TTDIRedYGalcdsWQLShHmlvkcDLP+bfTaQ3OUkAdNP/eYRwY8xN2Wi gbqL3nDACJD9CucLAoce0ULvhQ6kNwb2lDrwRGGTrLjv1B6DLE1Wma5QVvQa89FVld0H2K jWvRlGdJggdYLo7JsaNStqQLhhmlyIcBBvxan5530JV0VFTUMHmtqhuN3REhdZeGLWZOoN 6ha/UNADVOOQ0LPADs0Jd7O1X5F0P+45fRPInHDxMHwycw05w1v8JYfrzP2HCaz8znmfEZ 3aXrkPrdZImMFifuwVlzOEDakSFI0zqnGu8uvcCP/X644WGFBtqjOI0z0NCnRw== ARC-Authentication-Results: i=1; mailgate.Leidinger.net; auth=pass smtp.auth=netchild@leidinger.net smtp.mailfrom=Alexander@leidinger.net X-Rspamd-Queue-Id: 46KdmB0j2vz444j X-Spamd-Bar: --------- X-Spamd-Result: default: False [-9.77 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[leidinger.net:s=outgoing-alex]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; R_SPF_ALLOW(-0.20)[+mx]; IP_SCORE(-3.68)[ip: (-9.66), ipnet: 89.238.64.0/18(-4.83), asn: 34240(-3.89), country: DE(-0.01)]; MIME_GOOD(-0.20)[multipart/signed,text/plain]; HAS_XAW(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; TO_DN_SOME(0.00)[]; XAW_SERVICE_ACCT(1.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; DKIM_TRACE(0.00)[leidinger.net:+]; DMARC_POLICY_ALLOW(-0.50)[leidinger.net,quarantine]; RCVD_COUNT_THREE(0.00)[4]; SIGNED_PGP(-2.00)[]; NEURAL_HAM_SHORT(-0.99)[-0.991,0]; RECEIVED_SPAMHAUS_PBL(0.00)[123.86.22.91.khpj7ygk5idzvmvt5x4ziurxhy.zen.dq.spamhaus.net : 127.0.0.10]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; ASN(0.00)[asn:34240, ipnet:89.238.64.0/18, country:DE]; ARC_ALLOW(-1.00)[i=1]; RCVD_TLS_ALL(0.00)[] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 30 Aug 2019 12:18:03 -0000 This message is in MIME format and has been PGP signed. --=_6KdtFXi7O3zedMNg8yM4xn9 Content-Type: text/plain; charset=utf-8; format=flowed; DelSp=Yes Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Quoting "O. Hartmann" (from Thu, 29 Aug 2019=20=20 14:26:38=20+0200): > On Wed, 28 Aug 2019 13:57:00 +0200 > Alexander Leidinger wrote: > >> Quoting "O. Hartmann" (from Tue, 27 Aug 2019 >> 10:11:54 +0200): >> >> > We have a single ZFS pool (raidz), call it pool00 and this pool00=20= =20 >>=20conatins a >> > ZFS dataset pool00/poudriere which we want to exclusively attach=20=20 >>=20to a jail. >> > pool00/poudriere contains a complete clone of a former, now decomissio= ned >> > machine and is usable by the host bearing the jails. The jail, named >> > poudriere, >> > has these config parameters set in /etc/jail.conf as recommended: >> > >> > enforce_statfs=3D "0"; > > now set to > enforce_statfs=3D "1"; From a security point of view this is off course better, but "0"=20=20 should=20have been OK for your problem case. [...] >> > Here I find the first confusing observation. I can't interact with >> > the dataset >> > and its content within the jail. I've set the "jailed" property of >> > pool00/poudriere via "zfs set jailed=3Don pool00/poudriere" and I=20= =20 >>=20also have to >> > attach the jailed dataset manually via "zfs jail poudriere >> > pool00/poudriere" to >> > the (running) jail. But within the jail, listing ZFS's mountpoints rev= eal: >> > >> > NAME USED AVAIL REFER MOUNTPOINT >> > pool00 124G 8.62T 34.9K /pool00 >> > pool00/poudriere 34.9K 8.62T 34.9K /pool/poudriere >> > >> > but nothing below /pool/poudriere is visible to the jail. Being confus= ed I > > Since we use ezjail-admin for jail a rudimentary jail administration (jus= t > creating and/or deleting the jail, maintenance is done manually), jails a= re > rooting at > > pool00 /pool00 > pool00/ezjail/ /pool/jails > pool00/ezjail/pulverfass /pool/jails/pulverfass > > "pulverfass" is the jail supposed to do the poudriere's job. > > Since I got confused about the orientation of the "directory tree" - the = root > is toplevel instead of downlevel - I corrected the ZFS dataset holding th= e > poudriere stuff that way: > > pool00/ezjail/poudriere /pool/poudriere > > The jail "pulverfass" now is supposed to mount the dataset at > > /pool/jails/pulverfass/pool/poudriere > >> >> Please be more verbose what you mean by "interact" and "is visible". >> >> Do zfs commands on the dataset work? > > After I corrected my mistake by not respecting the mountpoint according t= o > statfs, with the changes explained above I'm able to mount /pool/poudrier= e > within the jail "pulverfass", but I still have problems with the way=20= =20 >=20how I have > to mount this dataset. When zfs-mounted (zfs mount -a), I'm able to use t= he > dataset with poudriere as expected! But after rebooting the host and=20= =20 >=20after all > jails has been restarted as well, I have to first make the dataset > /pool/poudriere available to the jail via the command "zfs jail pulverfas= s > ool00/ezjail/pulverfass" - which seems not to be done automatically by th= e > startup process - and then from within the jail "pulverfass" I can mount = the > dataset as desribed above. This seems to be a big step ahead for me. Great. >> Note, I don't remember if you can manage the root of the jail, but at >> least subsequent jails should be possible to manage. I don't have a >> jail where the root is managed in the jail, just additional ones. >> Those need to have set a mountpoint after the initial jailing and then >> maybe even be mounted for the first time. >> >> Please also check /etc/defaults/devfs.rules if the jail rule contains >> an unhide entry for zfs. > > Within /etc/jail.conf > > devfs_ruleset=3D "4"; > > is configured as a common rulesset for all jails (in the common portion o= f > /etc/jail.conf). > There is no custom devfs.rules in /etc/, so /etc/defaults/devfs.rules sho= uld > apply and as far as I can see, there is an "unhide" applied to zfs: > > [... /etc/defaults/devfs.rulse ...] > > # Devices usually found in a jail. > # > [devfsrules_jail=3D4] > add include $devfsrules_hide_all > add include $devfsrules_unhide_basic > add include $devfsrules_unhide_login > add path fuse unhide > add path zfs unhide > [...] > > So, I guess everything is all right from this perspective, isn't it? Yes. And as you was able to do the zfs mount, you even had the proof. > Is there a way to automatically provide the ZFS dataset of choice to the > propper jail or do i have to either > > issue manually "zfs jail jailid/jailname pool/dataset" or put such a=20= =20 >=20command as > script-command in the jail's definition portion as > > exec.prestart+=3D "zfs jail ${name} pool00/ezjail/poudriere"; > ? I never tried that with plain jails. ezjail has the=20=20 jail_xxx_zfs_datasets=20variable in the config directory. Unfortunately=20= =20 the=20attachment of the datasets to the jail is not early enough to be=20= =20 picked=20up by the start scripts (so probably with exec.poststart, if=20=20 you=20use that you can also use it to launch "jexec ... service zfs=20=20 start"=20inside the jail). iocage works much better in this regard. Bye, Alexander. --=20 http://www.Leidinger.net Alexander@Leidinger.net: PGP 0x8F31830F9F2772BF http://www.FreeBSD.org netchild@FreeBSD.org : PGP 0x8F31830F9F2772BF --=_6KdtFXi7O3zedMNg8yM4xn9 Content-Type: application/pgp-signature Content-Description: Digitale PGP-Signatur Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAABAgAGBQJdaRPQAAoJEBINsJsD+NiGHs4P/ice82BNIeRlfwbQxzXjdVKL gH8HyrPPH9glfe20Pq/ByawoZhU+lEbayQUI0zzxVsC7VqCYYYI/DAWWEVZPVCkI XiKTdVt6+fjrtd2cnFcf6c1SWncxIKmO98Qe8fXBmPPp4Q+OcT9XhWEtlM/3SGxa vipXQvTVNEVaiuexKH7pa9QXEsyQ30YzQ58VTX12UNOue3LzoUsOu3QRgJGBdCzh 9Fd+G9+KOHurTfzLm9I1PAFmxQ7flwKT9pgh40q64I0/3M8hKDSfX/pqS/A+bz9O 9bdHnmbPlHQTrZ5YNbC/aWyg49pmGZWKbd6z1EGl+NYdQRjv61Xnuf7+d0WaOJ/6 Ulp5OIQ1VjLX6NxuMSvk6APWn4n5HwboO316WRTpIyDO+qf2KBztEi7Z1grvHIm5 qcI3D/YaDSjfOH90qYKp7pFwhP66ZHxcg2/1gI9HMBrunt/xcNpsibxsRf03fMX6 ECxKTfXgR1yxEQNuczLtllBMeWER6K0d6UWqoaXtRFYlGsgAHkUb4OneqavRiFhp TGRgb22BdVKlwCMdt0TtY+zn8YEUxIqUBNe7LhySM6j9rhRnh0mzQKEW85HxY75c AVHAd0pJJv1hB0DDfYmEj4GLWqwa5Yzk0m1krSlr/SmPUi+EG4Xaq3hAsG+dQ10V qu2cceo050kGtJUzG8wK =w+JP -----END PGP SIGNATURE----- --=_6KdtFXi7O3zedMNg8yM4xn9-- From owner-freebsd-current@freebsd.org Fri Aug 30 16:41:51 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id CA4C9D2E59 for ; Fri, 30 Aug 2019 16:41:51 +0000 (UTC) (envelope-from maksim.yevmenkin@gmail.com) Received: from mail-qt1-x830.google.com (mail-qt1-x830.google.com [IPv6:2607:f8b0:4864:20::830]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46KlcZ5FhMz4HwQ for ; Fri, 30 Aug 2019 16:41:50 +0000 (UTC) (envelope-from maksim.yevmenkin@gmail.com) Received: by mail-qt1-x830.google.com with SMTP id j15so8197705qtl.13 for ; Fri, 30 Aug 2019 09:41:50 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=VCI0peH3iqoVxVawIASq/eugIAPj3IVASAveHVvJHEM=; b=k6VBR1Nnf5XYP3tomoiwDQTKIO8xnVu439HksW5IxwguPbxNmbqV5jfx+R7x5qoVRh HnAfS00ipPiOjAywAB8O/1Frtlr4ymnR59SO8tOCLEYtm7ddTB4TzxhSNemNsDx/n4t7 PbFwJL2B47mOJAKPy0gekOk5Baz6kaZGiZxD3pq9Pe/Cvp2/hl8Pxrz1iQqTN64notWQ SDmg2rtmSRgGth6aTn0hUUFJDQh0/SRjZO8m9o0ZMWlNg0ZWSgA2PW5QaQBfd4fcIUqn xKGXfz3VlfPt4pU4l7iokIGGGKdMjBU1981cWmyxT7BxeGKLuZYFdCkZuXomsHMpcZOc EAdQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=VCI0peH3iqoVxVawIASq/eugIAPj3IVASAveHVvJHEM=; b=fhquG04eWh9NubNW0SvtXnNgJZQWss2NzQvGi3dDEOIOzgcH8EHfXU9kSODPtO4vfg JqG0JpjRcDW+VGUA/bhvpOYS51NPUpYf9k9SsVSP3D4xc77EHfETKGlP37k9k7QArMPC grNe6Sw3KSI3dZwvlwVNKnt8LPS/iWd2QE4+5PuGKGKllkU+U9mkSvKCVW0yOLJzFgxL i7BEknb09y5SMQqq5Mz/d+KstfjfaL0nyX1LThzqHUHFypVJqvn3saJKK9VYlsMoJzDW ozavGDiTLNMUJxZlxp1IrVFwZ8/5LGRUWFInRu1WLcev4u8C04GntlkZWvDe3vJzKQct 8liA== X-Gm-Message-State: APjAAAVfaDFjMuYtdHgeo/lZxJ2zpaN8UmUw5FNDctO46ETd2+/h3ddp gyScIqWR3do8zF9MbdrsyYr769bNAxiPOMtQT4UnYTD3gXY= X-Google-Smtp-Source: APXvYqzRznX7zUqTXBBg29vg4PbtfHJqHZWc8orh9aRwrX9LF0ZQrb645V3DZDrPkY6N8N0hM94RjmyVuSQZ4qYGNT0= X-Received: by 2002:a0c:d7ce:: with SMTP id g14mr10635511qvj.2.1567183309455; Fri, 30 Aug 2019 09:41:49 -0700 (PDT) MIME-Version: 1.0 References: <1115053193.64543.1567031661382.ref@mail.yahoo.com> <1115053193.64543.1567031661382@mail.yahoo.com> In-Reply-To: From: Maksim Yevmenkin Date: Fri, 30 Aug 2019 09:41:38 -0700 Message-ID: Subject: Re: Kernel-Crash when working with ubt0 To: Warner Losh Cc: Miranda Maria Sophie Van den Breukelingen , Konstantin Belousov , Hans Petter Selasky , "freebsd-current@freebsd.org" Content-Type: text/plain; charset="UTF-8" X-Rspamd-Queue-Id: 46KlcZ5FhMz4HwQ X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=k6VBR1Nn; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of maksimyevmenkin@gmail.com designates 2607:f8b0:4864:20::830 as permitted sender) smtp.mailfrom=maksimyevmenkin@gmail.com X-Spamd-Result: default: False [-4.00 / 15.00]; TO_DN_EQ_ADDR_SOME(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; FREEMAIL_FROM(0.00)[gmail.com]; RCPT_COUNT_FIVE(0.00)[5]; DKIM_TRACE(0.00)[gmail.com:+]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; NEURAL_HAM_SHORT(-1.00)[-0.998,0]; FROM_EQ_ENVFROM(0.00)[]; IP_SCORE(0.00)[ip: (-9.35), ipnet: 2607:f8b0::/32(-2.84), asn: 15169(-2.32), country: US(-0.05)]; MIME_TRACE(0.00)[0:+]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; TAGGED_FROM(0.00)[]; DWL_DNSWL_NONE(0.00)[gmail.com.dwl.dnswl.org : 127.0.5.0]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; FROM_HAS_DN(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; TAGGED_RCPT(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; MIME_GOOD(-0.10)[text/plain]; IP_SCORE_FREEMAIL(0.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[0.3.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; FREEMAIL_CC(0.00)[gmail.com]; RCVD_TLS_ALL(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 30 Aug 2019 16:41:51 -0000 >> > patch -p1 worked for me to apply it. >> > >> > And it worked just fine for everything once I rebooted. The patch looked fine to my eye. >> >> thanks Warner >> >> please find attached (more complete) patch that should address issue >> of holding lock over copyin/out (or so i claim). > > Seems to be working fine now... committed. thanks! max From owner-freebsd-current@freebsd.org Fri Aug 30 17:42:27 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 8ED43D465D for ; Fri, 30 Aug 2019 17:42:27 +0000 (UTC) (envelope-from kevans@freebsd.org) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 46KmyW1krgz4MHR for ; Fri, 30 Aug 2019 17:42:27 +0000 (UTC) (envelope-from kevans@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 3AE5FD465C; Fri, 30 Aug 2019 17:42:27 +0000 (UTC) Delivered-To: current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 3A9F3D465B for ; Fri, 30 Aug 2019 17:42:27 +0000 (UTC) (envelope-from kevans@freebsd.org) Received: from smtp.freebsd.org (smtp.freebsd.org [IPv6:2610:1c1:1:606c::24b:4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46KmyW0mFrz4MHQ; Fri, 30 Aug 2019 17:42:27 +0000 (UTC) (envelope-from kevans@freebsd.org) Received: from mail-wr1-f46.google.com (mail-wr1-f46.google.com [209.85.221.46]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) (Authenticated sender: kevans) by smtp.freebsd.org (Postfix) with ESMTPSA id C2BCB82FF; Fri, 30 Aug 2019 17:42:26 +0000 (UTC) (envelope-from kevans@freebsd.org) Received: by mail-wr1-f46.google.com with SMTP id t16so7787959wra.6; Fri, 30 Aug 2019 10:42:26 -0700 (PDT) X-Gm-Message-State: APjAAAUbNd90v6+wHXL0PzqRFdgd8Q1Om3YViQyHshIkOSA251U/IYN2 ResuoSYDmjHTPaSvllonp/DglJN5JvjQRs9zujw= X-Google-Smtp-Source: APXvYqzvJNHGkNOEkGx1N4CKNbrjMd9JeUcnRFdLQeGDYWbmv6oIuvHjvfldOEmRASu4ssM7+uKsIrSo+IdE2IQ4j7g= X-Received: by 2002:adf:f5c5:: with SMTP id k5mr15880513wrp.42.1567186945666; Fri, 30 Aug 2019 10:42:25 -0700 (PDT) MIME-Version: 1.0 References: <20190816120524.21b7fd19@ernst.home> In-Reply-To: From: Kyle Evans Date: Fri, 30 Aug 2019 12:42:13 -0500 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: problem with LOCAL_MODULES To: John Baldwin Cc: gljennjohn@gmail.com, current Content-Type: text/plain; charset="UTF-8" X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 30 Aug 2019 17:42:27 -0000 On Fri, Aug 16, 2019 at 7:38 PM John Baldwin wrote: > > On 8/16/19 3:05 AM, Gary Jennejohn wrote: > > I tried to build a kernel today and it failed in modules-all even > > though I had LOCAL_MODULES="" in /etc/src.conf, as recommended by > > jhb. > > > > That's wrong. It has to be LOCAL_MODULES=, otherwise > > /sys/conf/kern.post.mk seems to conclude that there should be a > > module under /usr/local/sys/modules with the name "". > > I think this will permit both versions to work: > > Index: sys/conf/kern.post.mk > =================================================================== > --- kern.post.mk (revision 351151) > +++ kern.post.mk (working copy) > @@ -76,6 +76,7 @@ modules-${target}: > cd $S/modules; ${MKMODULESENV} ${MAKE} \ > ${target:S/^reinstall$/install/:S/^clobber$/cleandir/} > .endif > +.if !empty(LOCAL_MODULES) > .for module in ${LOCAL_MODULES} > @${ECHODIR} "===> ${module} (${target:S/^reinstall$/install/:S/^clobber$/cleandir/})" > @cd ${LOCAL_MODULES_DIR}/${module}; ${MKMODULESENV} ${MAKE} \ > @@ -83,6 +84,7 @@ modules-${target}: > ${target:S/^reinstall$/install/:S/^clobber$/cleandir/} > .endfor > .endif > +.endif > .endfor > > # Handle ports (as defined by the user) that build kernel modules > I think I'd like to see this with !empty(LOCAL_MODULES) && EXISTS(${LOCAL_MODULES_DIR}) or maybe just the latter condition to prevent accidental foot-shooting... I was testing a problem with doing this stuff in a poudriere build for swills@ and set LOCAL_MODULES="" only to get an error because LOCAL_MODULES_DIR doesn't yet exist on the machine I was testing with -- which we can trivially avoid. Thanks, Kyle Evans From owner-freebsd-current@freebsd.org Fri Aug 30 17:48:04 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 6042ED49FF for ; Fri, 30 Aug 2019 17:48:04 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 46Kn501FLGz4MtN for ; Fri, 30 Aug 2019 17:48:04 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: by mailman.nyi.freebsd.org (Postfix) id 2A9DCD49FE; Fri, 30 Aug 2019 17:48:04 +0000 (UTC) Delivered-To: current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 2A535D49FD for ; Fri, 30 Aug 2019 17:48:04 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: from mail-qk1-x72c.google.com (mail-qk1-x72c.google.com [IPv6:2607:f8b0:4864:20::72c]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46Kn4z32Tsz4MtG for ; Fri, 30 Aug 2019 17:48:03 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: by mail-qk1-x72c.google.com with SMTP id m10so6904199qkk.1 for ; Fri, 30 Aug 2019 10:48:03 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bsdimp-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=nHIVjAFn4AuM6N+kXa1PaHgouSQuTBDoVjYrwtvz/l4=; b=AulxgfS06jhYskoI4KLbc/KR6JPpc588L2vi/e8njjyF7/dmSnHrPWk+Y8QOdlo+wo rwQWSNUHXDcDuNVIWQ75MVqnTSvlkLSSD5TsYNuIGmkqkkl+ZZi88xFuBF/7p1ox4+R3 wamLnN0APUriexvQCC8CJnkBePW3c0P7thcaqoR7Bm8xKtAJZm66+mteJz9zsE5vgoOi TrtIY9fs3yXTfkSD9PrmTObFzw7Foif5xsyypo/z6I9eBaR/MZaNsRaLqRbSp5KEg4iN vUfMTrEJTgbt38f8qhiGQBwOKA7sYyWB9ymnyf0jnLYI61Mjh1MU0Mi4RqS4v/S52F0N pXvQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=nHIVjAFn4AuM6N+kXa1PaHgouSQuTBDoVjYrwtvz/l4=; b=CWRNTahCIGErX//em0kA0tC6UBlGlOAuJ7uqCEVASl/+8jp9xEXzk5/g5OtddrTL8/ rq7P9V4HZkJEwk0m5xp3JxMuiSBe0+GIUmkMtkzutAFUASl6X796R+SRx2TQQgfa5fOO H9l53Hkb063J8+uE2wUFEjvEIPIVlRy/wkZ6sBFwa+Ec/t0fi87pUhIiGoELXgU+ic+b gc9FvmWEa5UvlueryoZB4YWYovdDH/H7UDA1FQaYDdk+BS+P94213WUBNQ73WuH7VdJk 26RHfL2wuVNtyRzsxBpPCj2WobMPIPiOLLxTHSRgRJBYgIZGZdSCRrJUrtMIbo1Z6Q60 lcjA== X-Gm-Message-State: APjAAAXhPDTitpOwsSdvANruxZztxvtvidt7IgbRS0LiaL4l0LPKLBGe lRYNDhOXx10m/nOT8WC5p4BXrw5dkK4ngZtcuDo0AZVcqgg= X-Google-Smtp-Source: APXvYqza2erQQTsejtfDESAtvOMivPkQZkRHbBUin6cbhjQJGly78fo3FdbHuvjU2QUepAWGFaQNfPgkaIYtRRVWNAo= X-Received: by 2002:a37:4804:: with SMTP id v4mr17172883qka.60.1567187282409; Fri, 30 Aug 2019 10:48:02 -0700 (PDT) MIME-Version: 1.0 References: <20190816120524.21b7fd19@ernst.home> In-Reply-To: From: Warner Losh Date: Fri, 30 Aug 2019 11:47:51 -0600 Message-ID: Subject: Re: problem with LOCAL_MODULES To: Kyle Evans Cc: John Baldwin , Gary Jennejohn , current X-Rspamd-Queue-Id: 46Kn4z32Tsz4MtG X-Spamd-Bar: ----- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=bsdimp-com.20150623.gappssmtp.com header.s=20150623 header.b=AulxgfS0; dmarc=none; spf=none (mx1.freebsd.org: domain of wlosh@bsdimp.com has no SPF policy when checking 2607:f8b0:4864:20::72c) smtp.mailfrom=wlosh@bsdimp.com X-Spamd-Result: default: False [-5.90 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[bsdimp-com.20150623.gappssmtp.com:s=20150623]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[4]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; PREVIOUSLY_DELIVERED(0.00)[current@freebsd.org]; DMARC_NA(0.00)[bsdimp.com]; TO_MATCH_ENVRCPT_SOME(0.00)[]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[bsdimp-com.20150623.gappssmtp.com:+]; NEURAL_HAM_SHORT(-1.00)[-0.996,0]; RCVD_IN_DNSWL_NONE(0.00)[c.2.7.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; R_SPF_NA(0.00)[]; FORGED_SENDER(0.30)[imp@bsdimp.com,wlosh@bsdimp.com]; MIME_TRACE(0.00)[0:+,1:+,2:~]; IP_SCORE(-2.91)[ip: (-9.32), ipnet: 2607:f8b0::/32(-2.84), asn: 15169(-2.32), country: US(-0.05)]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; FROM_NEQ_ENVFROM(0.00)[imp@bsdimp.com,wlosh@bsdimp.com]; RCVD_TLS_ALL(0.00)[]; RCVD_COUNT_TWO(0.00)[2] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 30 Aug 2019 17:48:04 -0000 On Fri, Aug 30, 2019 at 11:42 AM Kyle Evans wrote: > On Fri, Aug 16, 2019 at 7:38 PM John Baldwin wrote: > > > > On 8/16/19 3:05 AM, Gary Jennejohn wrote: > > > I tried to build a kernel today and it failed in modules-all even > > > though I had LOCAL_MODULES="" in /etc/src.conf, as recommended by > > > jhb. > > > > > > That's wrong. It has to be LOCAL_MODULES=, otherwise > > > /sys/conf/kern.post.mk seems to conclude that there should be a > > > module under /usr/local/sys/modules with the name "". > > > > I think this will permit both versions to work: > > > > Index: sys/conf/kern.post.mk > > =================================================================== > > --- kern.post.mk (revision 351151) > > +++ kern.post.mk (working copy) > > @@ -76,6 +76,7 @@ modules-${target}: > > cd $S/modules; ${MKMODULESENV} ${MAKE} \ > > ${target:S/^reinstall$/install/:S/^clobber$/cleandir/} > > .endif > > +.if !empty(LOCAL_MODULES) > > .for module in ${LOCAL_MODULES} > > @${ECHODIR} "===> ${module} > (${target:S/^reinstall$/install/:S/^clobber$/cleandir/})" > > @cd ${LOCAL_MODULES_DIR}/${module}; ${MKMODULESENV} ${MAKE} \ > > @@ -83,6 +84,7 @@ modules-${target}: > > ${target:S/^reinstall$/install/:S/^clobber$/cleandir/} > > .endfor > > .endif > > +.endif > > .endfor > > > > # Handle ports (as defined by the user) that build kernel modules > > > > I think I'd like to see this with !empty(LOCAL_MODULES) && > EXISTS(${LOCAL_MODULES_DIR}) or maybe just the latter condition to > prevent accidental foot-shooting... I was testing a problem with doing > this stuff in a poudriere build for swills@ and set LOCAL_MODULES="" > only to get an error because LOCAL_MODULES_DIR doesn't yet exist on > the machine I was testing with -- which we can trivially avoid. > There's also an unfortunate interaction with MODULES_OVERRIDE="" in that the local modules are built / installed. This breaks the workflow I've used in the past of 'make reinstallkernel MODULES_OVERRIDE=""' to get just the kernel reinstalled w/o messing with the modules that I know are fine and don't want to change. Not a huge deal, but still annoying. Warner From owner-freebsd-current@freebsd.org Fri Aug 30 18:45:21 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 4AD1AD5755 for ; Fri, 30 Aug 2019 18:45:21 +0000 (UTC) (envelope-from clay.daniels.jr@gmail.com) Received: from mail-vs1-xe36.google.com (mail-vs1-xe36.google.com [IPv6:2607:f8b0:4864:20::e36]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46KpM3646Xz4QK7; Fri, 30 Aug 2019 18:45:19 +0000 (UTC) (envelope-from clay.daniels.jr@gmail.com) Received: by mail-vs1-xe36.google.com with SMTP id r17so2507493vso.1; Fri, 30 Aug 2019 11:45:19 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:from:date:message-id:subject:to; bh=IQnXBpjT6eTpVQocbIOLOllqz8faLcuq5qUpO7cXknA=; b=TxNtFmAJ1Xklm9zA38ZwWGy4hIlwAPQSReFHKSfL5VZ+57RM4Io6lMS1SIeuS4dE3z t6vOSeIatfTtS+9DC3MOFzpYyA2ebURLzmAQP3WxA3sVsITH7+Di9CJJuncWGzpqErMC GXoSyqvrcdrTCScitdGE/pzPR9ybgVqZdBL6/FXH36s2UuYqwns+VCb8zmWrHUUyxrmv G3d6FjqYlvkQs9AvS+2cR6f23YYMo4qc20Df9HrnAxnHaDPzIulB6OPhHv3eokAJ516+ jM3aWgRDCA9Lw+f7xEGjQHmGgvhw8IrP/5mF960Zn+Xbc4kmNTN2H/rzC7ReVsl4M7dC LGBg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=IQnXBpjT6eTpVQocbIOLOllqz8faLcuq5qUpO7cXknA=; b=Fbv+mlkRTb1lOqjQXIV8cM7gZDdH+vHPkqRuZcWgrlSIL67cVUpPQf0NGwqZY+6rge SRlbpm52Fv6IH5jlQaoBdb7nRmWU8SVkJT0EtV6OH2dkAEHRNXvzjLhbyqPXDkgTjQD3 ppXTA9oxCwdBY1yvXaeXU1Nmp07qaEFQWSO8NP73ySFznB5pFmC/ZdcwRySCnI4aA/Jw eUIR2zNqWyNC7BjkbsT4zvTjU5hUgs3P4QDAdgKXWXrpUGAp6OeClULa595QgvyAjQ4c u0zH2hHSj2/4Rb3PFVl60Cuyc8F/gJQhGXYyeCihqiXpcPz6cZU0pu5JM1iFrhjDltJP NWYA== X-Gm-Message-State: APjAAAUEjxtDGL1HEwr78xcafRepKKGseQw9UfzpcBFXTTwnjo13Apoe uWfQSnJzrsJAhep3vw+Ow8W5dLA6GxyWFHa9x0vRNX0= X-Google-Smtp-Source: APXvYqz6oHELQ3UuurilsaLAF0vorlGsQfOZCfNXE2RmLQ1hDFEeODHz/ejup65l8SStvkLWW2+TxnD36lVp+CORQdE= X-Received: by 2002:a67:f887:: with SMTP id h7mr5663868vso.116.1567190718169; Fri, 30 Aug 2019 11:45:18 -0700 (PDT) MIME-Version: 1.0 From: "Clay Daniels Jr." Date: Fri, 30 Aug 2019 13:45:06 -0500 Message-ID: Subject: FUSE & fusefs-* To: "freebsd-current@freebsd.org" , "asomers@freebsd.org" X-Rspamd-Queue-Id: 46KpM3646Xz4QK7 X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=TxNtFmAJ; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of claydanielsjr@gmail.com designates 2607:f8b0:4864:20::e36 as permitted sender) smtp.mailfrom=claydanielsjr@gmail.com X-Spamd-Result: default: False [-4.00 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; FROM_HAS_DN(0.00)[]; DWL_DNSWL_NONE(0.00)[gmail.com.dwl.dnswl.org : 127.0.5.0]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36:c]; FREEMAIL_FROM(0.00)[gmail.com]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; IP_SCORE_FREEMAIL(0.00)[]; IP_SCORE(0.00)[ip: (-9.71), ipnet: 2607:f8b0::/32(-2.84), asn: 15169(-2.32), country: US(-0.05)]; DKIM_TRACE(0.00)[gmail.com:+]; RCPT_COUNT_TWO(0.00)[2]; RCVD_IN_DNSWL_NONE(0.00)[6.3.e.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; NEURAL_HAM_SHORT(-1.00)[-0.996,0]; TO_DN_EQ_ADDR_ALL(0.00)[]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; TAGGED_FROM(0.00)[]; RCVD_TLS_ALL(0.00)[]; RCVD_COUNT_TWO(0.00)[2] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 30 Aug 2019 18:45:21 -0000 I finally have a little time to play with the FUSE, and installed some fusefs utilities I might like to try, for ntfs & ext. This is what I have: --- clay@bsd13:~ $ pkg info -r fusefs-libs fusefs-libs-2.9.9: fusefs-ntfs-2017.3.23 fusefs-ext2-0.0.10_2 fusefs-ext4fuse-0.1.3_1,1 clay@bsd13:~ $ pkg info -r fusefs-libs3 pkg: No package(s) matching fusefs-libs3 clay@bsd13:~ $ kldstat Id Refs Address Size Name 1 70 0xffffffff80200000 2336a10 kernel 2 1 0xffffffff82720000 250c44 amdgpu.ko 3 2 0xffffffff82971000 76e90 drm.ko 4 5 0xffffffff829e8000 12470 linuxkpi.ko 5 3 0xffffffff829fb000 12f30 linuxkpi_gplv2.ko 6 2 0xffffffff82a0e000 8e0 lindebugfs.ko 7 1 0xffffffff82a0f000 f021 ttm.ko 8 1 0xffffffff82a1f000 23f7 radeon_kabini_pfp_bin.ko 9 1 0xffffffff82a22000 23f5 radeon_kabini_me_bin.ko 10 1 0xffffffff82a25000 23f5 radeon_kabini_ce_bin.ko 11 1 0xffffffff82a28000 43f7 radeon_kabini_mec_bin.ko 12 1 0xffffffff82a2d000 2a77 radeon_kabini_rlc_bin.ko 13 1 0xffffffff82a30000 12e9 radeon_kabini_sdma_bin.ko 14 1 0xffffffff82a32000 12eb radeon_kabini_sdma1_bin.ko 15 1 0xffffffff82a34000 38ea7 radeon_kabini_uvd_bin.ko 16 1 0xffffffff82a6d000 18c47 radeon_kabini_vce_bin.ko 17 1 0xffffffff82a86000 2538 intpm.ko 18 1 0xffffffff82a89000 a50 smbus.ko 19 1 0xffffffff82a8a000 1820 uhid.ko 20 1 0xffffffff82a8c000 2928 ums.ko 21 1 0xffffffff82a8f000 1b00 wmt.ko 22 1 0xffffffff82a91000 acf mac_ntpd.ko 23 1 0xffffffff82a92000 a9f8 tmpfs.ko clay@bsd13:~ $ kldload fuse kldload: can't load fuse: Operation not permitted clay@bsd13:~ $ su Password: root@bsd13:/home/clay # kldload fuse kldload: can't load fuse: No such file or directory --- The information I have on FUSE & fusefs is mostly from these sources: https://forums.freebsd.org/threads/how-to-mount-ntfs-partition-from-same-hdd.62888/ http://kflu.github.io/2018/02/03/2018-02-03-freebsd-ntfs/ They seem to indicate there is a fuse.ko driver module that can be loaded much like the drm-kmod video drivers. I don't see this on my install: FreeBSD bsd13 13.0-CURRENT FreeBSD 13.0-CURRENT r351591 GENERIC amd64 I'm missing a few clues, and I don't understand the relation of the fuse ports in the ports/emulators & ports/sysutil directories. There is nothing mission critical, but any help would be a appreciated. I think it would be handy to mount ntfs & ext partitions from my ufs FreeBSD partition. Clay Daniels From owner-freebsd-current@freebsd.org Fri Aug 30 19:08:52 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 57257D5D78 for ; Fri, 30 Aug 2019 19:08:52 +0000 (UTC) (envelope-from mms.vanbreukelingen@gmail.com) Received: from mail-vs1-xe42.google.com (mail-vs1-xe42.google.com [IPv6:2607:f8b0:4864:20::e42]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46KptC4vd8z4RH2 for ; Fri, 30 Aug 2019 19:08:51 +0000 (UTC) (envelope-from mms.vanbreukelingen@gmail.com) Received: by mail-vs1-xe42.google.com with SMTP id 62so5430123vsl.5 for ; Fri, 30 Aug 2019 12:08:51 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=f66lWD9h4Ruc1/S7z2VkLBVGmA0X2gA6AD3bSZw09d4=; b=L1KXjED5CGr34B8kchQvg5a8GccDkh5f8uRKhxVzTWuArAHZ2WvV2VSnibJlAHJwrG KOdDiNbSitcyDAgFjgnZg5pEA7cGf48JizpY5TdshrFkurgIH224UmOwl2v1Om1I17OI eHa/DJiQkwpI6TYUII08v9VRqssdlWVPLCQy6MksAIEzcszXU24Fu03Gg2MCgGQ9M1lO R37d9+GbYOvWOS1UyQ0llg4N2pF34pbVUM2IaoS4GDNd4PNggTTlY2X5fVKrtEAfw4Ye C7PBGXbsyO0vydBu6W/wZweAoyX4jW/ncW7XLkIwukksvH0Bw/7eJSBwLnN0W+F5ji/t OUvw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=f66lWD9h4Ruc1/S7z2VkLBVGmA0X2gA6AD3bSZw09d4=; b=JzjkfzE6tO9tTcihHMbjGQsVzfBMru/vQTLKaDuNASx1Tl1cwV+OF9kXYw0L6b7sBz ApAqNGWrH6oWbPWt+FPEod0RqRjV1L4RAjOgWa6qUySmvC6K5D7Ab94mLGzQecAT8lOp aG4ZTM6MzcxQb45Or+CYLuc4TL1gEPwXocT5CoA7ZP9WA7w4YCx68OetFFy2UGN56D5o Td2LbGG3rQafxmcqdDF4FOWgFh7yyW+efR9rakhCBZXMWRQx6rlvklyX8D1eF0IVWBJu UJw5djBj6RQ8B7E4jAwdtbWDbtaa/I8gmHcBhY0G81TiTRK2h4lTjkxAAdPe3LVXOFQz Gy5A== X-Gm-Message-State: APjAAAU8CDwzGPgwg9XwHB+3KvlGmp3RGwsuKbKaOsOv9+BXnD4jXdy/ qz6rRSSkA1XB1GKZzXRpTUS9+3X0hSZdkk5KrEc= X-Google-Smtp-Source: APXvYqxSBfXNMou6BgqntMJ9pAqLBKWH2RT3RJ7F26KejQ1BTBsUT0BEbIb98RCSf/yPOiRq7REA1PKXMiXjS+xmR7U= X-Received: by 2002:a67:fe4d:: with SMTP id m13mr9454956vsr.177.1567192130676; Fri, 30 Aug 2019 12:08:50 -0700 (PDT) MIME-Version: 1.0 References: <1115053193.64543.1567031661382.ref@mail.yahoo.com> <1115053193.64543.1567031661382@mail.yahoo.com> In-Reply-To: From: Miranda Maria Sophie Van den Breukelingen Date: Fri, 30 Aug 2019 21:08:39 +0200 Message-ID: Subject: Re: Kernel-Crash when working with ubt0 To: Maksim Yevmenkin Cc: Warner Losh , Konstantin Belousov , Hans Petter Selasky , "freebsd-current@freebsd.org" X-Rspamd-Queue-Id: 46KptC4vd8z4RH2 X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=L1KXjED5; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of mmsvanbreukelingen@gmail.com designates 2607:f8b0:4864:20::e42 as permitted sender) smtp.mailfrom=mmsvanbreukelingen@gmail.com X-Spamd-Result: default: False [-3.99 / 15.00]; TO_DN_EQ_ADDR_SOME(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; FREEMAIL_FROM(0.00)[gmail.com]; RCPT_COUNT_FIVE(0.00)[5]; DKIM_TRACE(0.00)[gmail.com:+]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; NEURAL_HAM_SHORT(-0.99)[-0.992,0]; FREEMAIL_TO(0.00)[gmail.com]; FROM_EQ_ENVFROM(0.00)[]; IP_SCORE(0.00)[ip: (2.21), ipnet: 2607:f8b0::/32(-2.84), asn: 15169(-2.32), country: US(-0.05)]; MIME_TRACE(0.00)[0:+,1:+,2:~]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; TAGGED_FROM(0.00)[]; DWL_DNSWL_NONE(0.00)[gmail.com.dwl.dnswl.org : 127.0.5.0]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; FROM_HAS_DN(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; TAGGED_RCPT(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; IP_SCORE_FREEMAIL(0.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[2.4.e.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 30 Aug 2019 19:08:52 -0000 works for me as far as pairing concernes (with patch -C > .diff.txt option LOCK_PROFILING option WITNESS is on in kern.config. My problem presists in the following form: *l2control -a c0:7a:a5:00:c7:11 read_channel_listl2control: Could not bind socket, bdaddr=c0:7a:a5:00:c7:11: Network is down* l2ping is ok; tried with different BT-headsets and "buttons", did *'patch -C < ng_btsocket.diff.txt'* in /usr/src/head; success with the chunks 1-19, removing a previous patch and looked satisfied after gitt --diff - 'ing it. Interferences are a big problem with that kinda technology as on 2.4Ghz like the "old" WLAN wave has been - and where I live it is still the same - even when we're getting IPv6 the download speed won't relatively be faster - it always took half an hour to download an .iSO at a distribution server and without VPN it is fast and effordable for about 10MB/s with .torrents - 5G we are coming, I think, the VR is gonna need lots and lots of data-transfers around the globe. So, what to do with the "network down" - problem? The 'bluetooth-config scan' command is practical but is just pairing, not connecting. Any ideas? MvB On Fri, 30 Aug 2019 at 18:41, Maksim Yevmenkin wrote: > >> > patch -p1 worked for me to apply it. > >> > > >> > And it worked just fine for everything once I rebooted. The patch > looked fine to my eye. > >> > >> thanks Warner > >> > >> please find attached (more complete) patch that should address issue > >> of holding lock over copyin/out (or so i claim). > > > > Seems to be working fine now... > > committed. thanks! > > max > From owner-freebsd-current@freebsd.org Fri Aug 30 19:11:18 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id D6EF5D5FF6 for ; Fri, 30 Aug 2019 19:11:18 +0000 (UTC) (envelope-from jhb@FreeBSD.org) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 46Kpx24qbzz4RYy for ; Fri, 30 Aug 2019 19:11:18 +0000 (UTC) (envelope-from jhb@FreeBSD.org) Received: by mailman.nyi.freebsd.org (Postfix) id A5772D5FF3; Fri, 30 Aug 2019 19:11:18 +0000 (UTC) Delivered-To: current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id A52ACD5FF2 for ; Fri, 30 Aug 2019 19:11:18 +0000 (UTC) (envelope-from jhb@FreeBSD.org) Received: from smtp.freebsd.org (smtp.freebsd.org [IPv6:2610:1c1:1:606c::24b:4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46Kpx23D1sz4RYx; Fri, 30 Aug 2019 19:11:18 +0000 (UTC) (envelope-from jhb@FreeBSD.org) Received: from John-Baldwins-MacBook-Pro-4.local (ralph.baldwin.cx [66.234.199.215]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) (Authenticated sender: jhb) by smtp.freebsd.org (Postfix) with ESMTPSA id E229B8C85; Fri, 30 Aug 2019 19:11:17 +0000 (UTC) (envelope-from jhb@FreeBSD.org) Subject: Re: problem with LOCAL_MODULES To: Kyle Evans Cc: gljennjohn@gmail.com, current References: <20190816120524.21b7fd19@ernst.home> From: John Baldwin Openpgp: preference=signencrypt Autocrypt: addr=jhb@FreeBSD.org; keydata= mQGiBETQ+XcRBADMFybiq69u+fJRy/0wzqTNS8jFfWaBTs5/OfcV7wWezVmf9sgwn8TW0Dk0 c9MBl0pz+H01dA2ZSGZ5fXlmFIsee1WEzqeJzpiwd/pejPgSzXB9ijbLHZ2/E0jhGBcVy5Yo /Tw5+U/+laeYKu2xb0XPvM0zMNls1ah5OnP9a6Ql6wCgupaoMySb7DXm2LHD1Z9jTsHcAQMD /1jzh2BoHriy/Q2s4KzzjVp/mQO5DSm2z14BvbQRcXU48oAosHA1u3Wrov6LfPY+0U1tG47X 1BGfnQH+rNAaH0livoSBQ0IPI/8WfIW7ub4qV6HYwWKVqkDkqwcpmGNDbz3gfaDht6nsie5Z pcuCcul4M9CW7Md6zzyvktjnbz61BADGDCopfZC4of0Z3Ka0u8Wik6UJOuqShBt1WcFS8ya1 oB4rc4tXfSHyMF63aPUBMxHR5DXeH+EO2edoSwViDMqWk1jTnYza51rbGY+pebLQOVOxAY7k do5Ordl3wklBPMVEPWoZ61SdbcjhHVwaC5zfiskcxj5wwXd2E9qYlBqRg7QeSm9obiBCYWxk d2luIDxqaGJARnJlZUJTRC5vcmc+iGAEExECACAFAkTQ+awCGwMGCwkIBwMCBBUCCAMEFgID AQIeAQIXgAAKCRBy3lIGd+N/BI6RAJ9S97fvbME+3hxzE3JUyUZ6vTewDACdE1stFuSfqMvM jomvZdYxIYyTUpC5Ag0ERND5ghAIAPwsO0B7BL+bz8sLlLoQktGxXwXQfS5cInvL17Dsgnr3 1AKa94j9EnXQyPEj7u0d+LmEe6CGEGDh1OcGFTMVrof2ZzkSy4+FkZwMKJpTiqeaShMh+Goj XlwIMDxyADYvBIg3eN5YdFKaPQpfgSqhT+7El7w+wSZZD8pPQuLAnie5iz9C8iKy4/cMSOrH YUK/tO+Nhw8Jjlw94Ik0T80iEhI2t+XBVjwdfjbq3HrJ0ehqdBwukyeJRYKmbn298KOFQVHO EVbHA4rF/37jzaMadK43FgJ0SAhPPF5l4l89z5oPu0b/+5e2inA3b8J3iGZxywjM+Csq1tqz hltEc7Q+E08AAwUIAL+15XH8bPbjNJdVyg2CMl10JNW2wWg2Q6qdljeaRqeR6zFus7EZTwtX sNzs5bP8y51PSUDJbeiy2RNCNKWFMndM22TZnk3GNG45nQd4OwYK0RZVrikalmJY5Q6m7Z16 4yrZgIXFdKj2t8F+x613/SJW1lIr9/bDp4U9tw0V1g3l2dFtD3p3ZrQ3hpoDtoK70ioIAjjH aIXIAcm3FGZFXy503DOA0KaTWwvOVdYCFLm3zWuSOmrX/GsEc7ovasOWwjPn878qVjbUKWwx Q4QkF4OhUV9zPtf9tDSAZ3x7QSwoKbCoRCZ/xbyTUPyQ1VvNy/mYrBcYlzHodsaqUDjHuW+I SQQYEQIACQUCRND5ggIbDAAKCRBy3lIGd+N/BCO8AJ9j1dWVQWxw/YdTbEyrRKOY8YZNwwCf afMAg8QvmOWnHx3wl8WslCaXaE8= Message-ID: <7b46b0a5-903f-5d8d-c7df-9eafda504445@FreeBSD.org> Date: Fri, 30 Aug 2019 12:11:13 -0700 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:60.0) Gecko/20100101 Thunderbird/60.8.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 30 Aug 2019 19:11:18 -0000 On 8/30/19 10:42 AM, Kyle Evans wrote: > On Fri, Aug 16, 2019 at 7:38 PM John Baldwin wrote: >> >> On 8/16/19 3:05 AM, Gary Jennejohn wrote: >>> I tried to build a kernel today and it failed in modules-all even >>> though I had LOCAL_MODULES="" in /etc/src.conf, as recommended by >>> jhb. >>> >>> That's wrong. It has to be LOCAL_MODULES=, otherwise >>> /sys/conf/kern.post.mk seems to conclude that there should be a >>> module under /usr/local/sys/modules with the name "". >> >> I think this will permit both versions to work: >> >> Index: sys/conf/kern.post.mk >> =================================================================== >> --- kern.post.mk (revision 351151) >> +++ kern.post.mk (working copy) >> @@ -76,6 +76,7 @@ modules-${target}: >> cd $S/modules; ${MKMODULESENV} ${MAKE} \ >> ${target:S/^reinstall$/install/:S/^clobber$/cleandir/} >> .endif >> +.if !empty(LOCAL_MODULES) >> .for module in ${LOCAL_MODULES} >> @${ECHODIR} "===> ${module} (${target:S/^reinstall$/install/:S/^clobber$/cleandir/})" >> @cd ${LOCAL_MODULES_DIR}/${module}; ${MKMODULESENV} ${MAKE} \ >> @@ -83,6 +84,7 @@ modules-${target}: >> ${target:S/^reinstall$/install/:S/^clobber$/cleandir/} >> .endfor >> .endif >> +.endif >> .endfor >> >> # Handle ports (as defined by the user) that build kernel modules >> > > I think I'd like to see this with !empty(LOCAL_MODULES) && > EXISTS(${LOCAL_MODULES_DIR}) or maybe just the latter condition to > prevent accidental foot-shooting... I was testing a problem with doing > this stuff in a poudriere build for swills@ and set LOCAL_MODULES="" > only to get an error because LOCAL_MODULES_DIR doesn't yet exist on > the machine I was testing with -- which we can trivially avoid. Did this work for you? Gary said in a followup that it didn't work, so that's why I hadn't committed it. -- John Baldwin From owner-freebsd-current@freebsd.org Fri Aug 30 19:23:20 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 5128BD62FD for ; Fri, 30 Aug 2019 19:23:20 +0000 (UTC) (envelope-from asomers@gmail.com) Received: from mail-lj1-f177.google.com (mail-lj1-f177.google.com [209.85.208.177]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46KqBv1ygYz4S5M; Fri, 30 Aug 2019 19:23:18 +0000 (UTC) (envelope-from asomers@gmail.com) Received: by mail-lj1-f177.google.com with SMTP id e27so7447070ljb.7; Fri, 30 Aug 2019 12:23:18 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=cuBdWuXeeXgAXDTvrPnl0UVEHfW6cPT2zvvKryXSD94=; b=umdZPfnTImIu8RxipSF3Xa9QvIXnxHYZCEcr/x9ZZnTIvGGL8QQOluCteAoEWQCO4+ yf0AyDuJNsU2l+dtCAeKCe6J6brWFbJ0clrxn6bY3Tgf71aeUgD74I7RB35a6B/D+4Vj FWfKAx3qj2pBaIikvy4hOOQ5vuCCnZKjnKGS2X4BqZqL1qBnKb8w3K9iHC9bLFuUIMvP YvlMFwC8cDZg8sHrCzxo1PfIKgshY+iPVGr6HdLB+6V68uIAF5/rEEeQct8wL3ErdK8g PzGIuTKAjE8UN1se4qyDc0kfYftZC6d5EDDf8O2TxS4K5CqQovnU9N0mzM8pDdaPBUN7 yAkg== X-Gm-Message-State: APjAAAW/gTmtAEjUtC+KkUkVpDXwK0RV0wlDkapt5IWWWSz3GxvdxGOy l9jK1BFNU/+Oc5CbLzBQ50Ju9lSZMOIFjpfgfc9M5g== X-Google-Smtp-Source: APXvYqxRIsccFz5Sh/WyaZ89maa8fBOC77jfEbLxEx0ia+P0Ikm4sIS4fkwRWKuWAGfuuHNR+Q61tamtFF6RIh5yVHY= X-Received: by 2002:a2e:80c2:: with SMTP id r2mr9578924ljg.44.1567192996949; Fri, 30 Aug 2019 12:23:16 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: From: Alan Somers Date: Fri, 30 Aug 2019 13:23:05 -0600 Message-ID: Subject: Re: FUSE & fusefs-* To: "Clay Daniels Jr." Cc: FreeBSD CURRENT , Alan Somers X-Rspamd-Queue-Id: 46KqBv1ygYz4S5M X-Spamd-Bar: ---- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of asomers@gmail.com designates 209.85.208.177 as permitted sender) smtp.mailfrom=asomers@gmail.com X-Spamd-Result: default: False [-4.24 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; R_SPF_ALLOW(-0.20)[+ip4:209.85.128.0/17]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; TAGGED_RCPT(0.00)[]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; DMARC_NA(0.00)[freebsd.org]; MIME_TRACE(0.00)[0:+,1:+,2:~]; TO_DN_ALL(0.00)[]; NEURAL_HAM_SHORT(-0.99)[-0.990,0]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[177.208.85.209.list.dnswl.org : 127.0.5.0]; IP_SCORE(-1.25)[ip: (-0.55), ipnet: 209.85.128.0/17(-3.34), asn: 15169(-2.32), country: US(-0.05)]; FORGED_SENDER(0.30)[asomers@freebsd.org,asomers@gmail.com]; FREEMAIL_TO(0.00)[gmail.com]; R_DKIM_NA(0.00)[]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:209.85.128.0/17, country:US]; FROM_NEQ_ENVFROM(0.00)[asomers@freebsd.org,asomers@gmail.com]; RCVD_TLS_ALL(0.00)[]; RCVD_COUNT_TWO(0.00)[2] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 30 Aug 2019 19:23:20 -0000 In freebsd head, the driver is now called fusefs.ko. Does that help? On Fri, Aug 30, 2019, 12:45 PM Clay Daniels Jr. wrote: > I finally have a little time to play with the FUSE, and installed some > fusefs utilities I might like to try, for ntfs & ext. This is what I have: > --- > clay@bsd13:~ $ pkg info -r fusefs-libs > fusefs-libs-2.9.9: > fusefs-ntfs-2017.3.23 > fusefs-ext2-0.0.10_2 > fusefs-ext4fuse-0.1.3_1,1 > clay@bsd13:~ $ pkg info -r fusefs-libs3 > pkg: No package(s) matching fusefs-libs3 > clay@bsd13:~ $ kldstat > Id Refs Address Size Name > 1 70 0xffffffff80200000 2336a10 kernel > 2 1 0xffffffff82720000 250c44 amdgpu.ko > 3 2 0xffffffff82971000 76e90 drm.ko > 4 5 0xffffffff829e8000 12470 linuxkpi.ko > 5 3 0xffffffff829fb000 12f30 linuxkpi_gplv2.ko > 6 2 0xffffffff82a0e000 8e0 lindebugfs.ko > 7 1 0xffffffff82a0f000 f021 ttm.ko > 8 1 0xffffffff82a1f000 23f7 radeon_kabini_pfp_bin.ko > 9 1 0xffffffff82a22000 23f5 radeon_kabini_me_bin.ko > 10 1 0xffffffff82a25000 23f5 radeon_kabini_ce_bin.ko > 11 1 0xffffffff82a28000 43f7 radeon_kabini_mec_bin.ko > 12 1 0xffffffff82a2d000 2a77 radeon_kabini_rlc_bin.ko > 13 1 0xffffffff82a30000 12e9 radeon_kabini_sdma_bin.ko > 14 1 0xffffffff82a32000 12eb radeon_kabini_sdma1_bin.ko > 15 1 0xffffffff82a34000 38ea7 radeon_kabini_uvd_bin.ko > 16 1 0xffffffff82a6d000 18c47 radeon_kabini_vce_bin.ko > 17 1 0xffffffff82a86000 2538 intpm.ko > 18 1 0xffffffff82a89000 a50 smbus.ko > 19 1 0xffffffff82a8a000 1820 uhid.ko > 20 1 0xffffffff82a8c000 2928 ums.ko > 21 1 0xffffffff82a8f000 1b00 wmt.ko > 22 1 0xffffffff82a91000 acf mac_ntpd.ko > 23 1 0xffffffff82a92000 a9f8 tmpfs.ko > clay@bsd13:~ $ kldload fuse > kldload: can't load fuse: Operation not permitted > clay@bsd13:~ $ su > Password: > root@bsd13:/home/clay # kldload fuse > kldload: can't load fuse: No such file or directory > --- > The information I have on FUSE & fusefs is mostly from these sources: > > https://forums.freebsd.org/threads/how-to-mount-ntfs-partition-from-same-hdd.62888/ > http://kflu.github.io/2018/02/03/2018-02-03-freebsd-ntfs/ > > They seem to indicate there is a fuse.ko driver module that can be loaded > much like the drm-kmod video drivers. I don't see this on my install: > FreeBSD bsd13 13.0-CURRENT FreeBSD 13.0-CURRENT r351591 GENERIC amd64 > > I'm missing a few clues, and I don't understand the relation of the fuse > ports in the ports/emulators & ports/sysutil directories. There is nothing > mission critical, but any help would be a appreciated. I think it would be > handy to mount ntfs & ext partitions from my ufs FreeBSD partition. > > Clay Daniels > From owner-freebsd-current@freebsd.org Fri Aug 30 19:26:13 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id C71D2D6426 for ; Fri, 30 Aug 2019 19:26:13 +0000 (UTC) (envelope-from kevans@freebsd.org) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 46KqGF4x7vz4SDv for ; Fri, 30 Aug 2019 19:26:13 +0000 (UTC) (envelope-from kevans@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id A75CCD6425; Fri, 30 Aug 2019 19:26:13 +0000 (UTC) Delivered-To: current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id A71EED6424 for ; Fri, 30 Aug 2019 19:26:13 +0000 (UTC) (envelope-from kevans@freebsd.org) Received: from smtp.freebsd.org (smtp.freebsd.org [IPv6:2610:1c1:1:606c::24b:4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46KqGF40hyz4SDs; Fri, 30 Aug 2019 19:26:13 +0000 (UTC) (envelope-from kevans@freebsd.org) Received: from mail-wm1-f48.google.com (mail-wm1-f48.google.com [209.85.128.48]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) (Authenticated sender: kevans) by smtp.freebsd.org (Postfix) with ESMTPSA id 3E1F08EE9; Fri, 30 Aug 2019 19:26:13 +0000 (UTC) (envelope-from kevans@freebsd.org) Received: by mail-wm1-f48.google.com with SMTP id k2so7027828wmj.4; Fri, 30 Aug 2019 12:26:13 -0700 (PDT) X-Gm-Message-State: APjAAAVU90AXudeaHazgludKgQYboQHlQxz2lL40Mk9OuvpLRTr13CIR HepUW7uaviucgpytuycRNIN8LV5tVVXbcfM2feg= X-Google-Smtp-Source: APXvYqwlex5pKJbRL7vIjWvaAaFcKe4IvRRF2gNRSnt1nbuxFHYBkP2KAXt3Q9m/xKJJ2lf5SCiT0OG7GnIZ/PybVuc= X-Received: by 2002:a1c:790b:: with SMTP id l11mr20845860wme.3.1567193172279; Fri, 30 Aug 2019 12:26:12 -0700 (PDT) MIME-Version: 1.0 References: <20190816120524.21b7fd19@ernst.home> <7b46b0a5-903f-5d8d-c7df-9eafda504445@FreeBSD.org> In-Reply-To: <7b46b0a5-903f-5d8d-c7df-9eafda504445@FreeBSD.org> From: Kyle Evans Date: Fri, 30 Aug 2019 14:26:00 -0500 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: problem with LOCAL_MODULES To: John Baldwin Cc: gljennjohn@gmail.com, current Content-Type: text/plain; charset="UTF-8" X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 30 Aug 2019 19:26:13 -0000 On Fri, Aug 30, 2019 at 2:11 PM John Baldwin wrote: > > On 8/30/19 10:42 AM, Kyle Evans wrote: > > On Fri, Aug 16, 2019 at 7:38 PM John Baldwin wrote: > >> > >> On 8/16/19 3:05 AM, Gary Jennejohn wrote: > >>> I tried to build a kernel today and it failed in modules-all even > >>> though I had LOCAL_MODULES="" in /etc/src.conf, as recommended by > >>> jhb. > >>> > >>> That's wrong. It has to be LOCAL_MODULES=, otherwise > >>> /sys/conf/kern.post.mk seems to conclude that there should be a > >>> module under /usr/local/sys/modules with the name "". > >> > >> I think this will permit both versions to work: > >> > >> Index: sys/conf/kern.post.mk > >> =================================================================== > >> --- kern.post.mk (revision 351151) > >> +++ kern.post.mk (working copy) > >> @@ -76,6 +76,7 @@ modules-${target}: > >> cd $S/modules; ${MKMODULESENV} ${MAKE} \ > >> ${target:S/^reinstall$/install/:S/^clobber$/cleandir/} > >> .endif > >> +.if !empty(LOCAL_MODULES) > >> .for module in ${LOCAL_MODULES} > >> @${ECHODIR} "===> ${module} (${target:S/^reinstall$/install/:S/^clobber$/cleandir/})" > >> @cd ${LOCAL_MODULES_DIR}/${module}; ${MKMODULESENV} ${MAKE} \ > >> @@ -83,6 +84,7 @@ modules-${target}: > >> ${target:S/^reinstall$/install/:S/^clobber$/cleandir/} > >> .endfor > >> .endif > >> +.endif > >> .endfor > >> > >> # Handle ports (as defined by the user) that build kernel modules > >> > > > > I think I'd like to see this with !empty(LOCAL_MODULES) && > > EXISTS(${LOCAL_MODULES_DIR}) or maybe just the latter condition to > > prevent accidental foot-shooting... I was testing a problem with doing > > this stuff in a poudriere build for swills@ and set LOCAL_MODULES="" > > only to get an error because LOCAL_MODULES_DIR doesn't yet exist on > > the machine I was testing with -- which we can trivially avoid. > > Did this work for you? Gary said in a followup that it didn't work, > so that's why I hadn't committed it. > Hmm... I went back and tested his exact scenario, and no- LOCAL_MODULES isn't empty at this point because word processing that leaves us with an empty string hasn't yet been done. An .if !empty(module) inside the loop is much happier- I'm not seeing any modifiers that would give us the behavior we wanted for figuring this out before entering the loop. From owner-freebsd-current@freebsd.org Fri Aug 30 19:33:20 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 72946D6759 for ; Fri, 30 Aug 2019 19:33:20 +0000 (UTC) (envelope-from kevans@freebsd.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 46KqQS2RtRz4Sfm for ; Fri, 30 Aug 2019 19:33:20 +0000 (UTC) (envelope-from kevans@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 53FF3D6758; Fri, 30 Aug 2019 19:33:20 +0000 (UTC) Delivered-To: current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 53C37D6757 for ; Fri, 30 Aug 2019 19:33:20 +0000 (UTC) (envelope-from kevans@freebsd.org) Received: from smtp.freebsd.org (smtp.freebsd.org [96.47.72.83]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46KqQS1b8Hz4Sfl; Fri, 30 Aug 2019 19:33:20 +0000 (UTC) (envelope-from kevans@freebsd.org) Received: from mail-wr1-f48.google.com (mail-wr1-f48.google.com [209.85.221.48]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) (Authenticated sender: kevans) by smtp.freebsd.org (Postfix) with ESMTPSA id E25559012; Fri, 30 Aug 2019 19:33:19 +0000 (UTC) (envelope-from kevans@freebsd.org) Received: by mail-wr1-f48.google.com with SMTP id j16so8036452wrr.8; Fri, 30 Aug 2019 12:33:19 -0700 (PDT) X-Gm-Message-State: APjAAAV1rNfadqvxUVhlMnYQRTVhOmtngu9m22nK8CLIKYqgDcD4pXJx IzhUyVGkGApycEvZ4A/8roUiQ8Dxjc9uFLdA5JY= X-Google-Smtp-Source: APXvYqylyey9HTnU6wDr0rkx5ARc5Xqk71TtApBdx7foLv9OJuqVy8Ro0CpGDzfJ0eNjQCYZQU4L2wIPMqokzND+tec= X-Received: by 2002:adf:a55d:: with SMTP id j29mr19558097wrb.275.1567193598927; Fri, 30 Aug 2019 12:33:18 -0700 (PDT) MIME-Version: 1.0 References: <20190816120524.21b7fd19@ernst.home> <7b46b0a5-903f-5d8d-c7df-9eafda504445@FreeBSD.org> In-Reply-To: From: Kyle Evans Date: Fri, 30 Aug 2019 14:33:06 -0500 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: problem with LOCAL_MODULES To: Kyle Evans Cc: John Baldwin , gljennjohn@gmail.com, current Content-Type: text/plain; charset="UTF-8" X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 30 Aug 2019 19:33:20 -0000 On Fri, Aug 30, 2019 at 2:26 PM Kyle Evans wrote: > > On Fri, Aug 30, 2019 at 2:11 PM John Baldwin wrote: > > > > On 8/30/19 10:42 AM, Kyle Evans wrote: > > > On Fri, Aug 16, 2019 at 7:38 PM John Baldwin wrote: > > >> > > >> On 8/16/19 3:05 AM, Gary Jennejohn wrote: > > >>> I tried to build a kernel today and it failed in modules-all even > > >>> though I had LOCAL_MODULES="" in /etc/src.conf, as recommended by > > >>> jhb. > > >>> > > >>> That's wrong. It has to be LOCAL_MODULES=, otherwise > > >>> /sys/conf/kern.post.mk seems to conclude that there should be a > > >>> module under /usr/local/sys/modules with the name "". > > >> > > >> I think this will permit both versions to work: > > >> > > >> Index: sys/conf/kern.post.mk > > >> =================================================================== > > >> --- kern.post.mk (revision 351151) > > >> +++ kern.post.mk (working copy) > > >> @@ -76,6 +76,7 @@ modules-${target}: > > >> cd $S/modules; ${MKMODULESENV} ${MAKE} \ > > >> ${target:S/^reinstall$/install/:S/^clobber$/cleandir/} > > >> .endif > > >> +.if !empty(LOCAL_MODULES) > > >> .for module in ${LOCAL_MODULES} > > >> @${ECHODIR} "===> ${module} (${target:S/^reinstall$/install/:S/^clobber$/cleandir/})" > > >> @cd ${LOCAL_MODULES_DIR}/${module}; ${MKMODULESENV} ${MAKE} \ > > >> @@ -83,6 +84,7 @@ modules-${target}: > > >> ${target:S/^reinstall$/install/:S/^clobber$/cleandir/} > > >> .endfor > > >> .endif > > >> +.endif > > >> .endfor > > >> > > >> # Handle ports (as defined by the user) that build kernel modules > > >> > > > > > > I think I'd like to see this with !empty(LOCAL_MODULES) && > > > EXISTS(${LOCAL_MODULES_DIR}) or maybe just the latter condition to > > > prevent accidental foot-shooting... I was testing a problem with doing > > > this stuff in a poudriere build for swills@ and set LOCAL_MODULES="" > > > only to get an error because LOCAL_MODULES_DIR doesn't yet exist on > > > the machine I was testing with -- which we can trivially avoid. > > > > Did this work for you? Gary said in a followup that it didn't work, > > so that's why I hadn't committed it. > > > > Hmm... I went back and tested his exact scenario, and no- > LOCAL_MODULES isn't empty at this point because word processing that > leaves us with an empty string hasn't yet been done. An .if > !empty(module) inside the loop is much happier- I'm not seeing any > modifiers that would give us the behavior we wanted for figuring this > out before entering the loop. It turns out I'm silly... this is sufficient for both of our problems (because it's the same problem) and hopefully my mail client doesn't goof this up: diff --git a/sys/conf/kern.post.mk b/sys/conf/kern.post.mk index ff10daf1a0a..09bfffad095 100644 --- a/sys/conf/kern.post.mk +++ b/sys/conf/kern.post.mk @@ -77,10 +77,12 @@ modules-${target}: ${target:S/^reinstall$/install/:S/^clobber$/cleandir/} .endif .for module in ${LOCAL_MODULES} +.if !empty(module) @${ECHODIR} "===> ${module} (${target:S/^reinstall$/install/:S/^clobber$/cleandir/})" @cd ${LOCAL_MODULES_DIR}/${module}; ${MKMODULESENV} ${MAKE} \ DIRPRFX="${module}/" \ ${target:S/^reinstall$/install/:S/^clobber$/cleandir/} +.endif .endfor .endif .endfor From owner-freebsd-current@freebsd.org Fri Aug 30 19:50:41 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id AB0F9D6E7F for ; Fri, 30 Aug 2019 19:50:41 +0000 (UTC) (envelope-from maksim.yevmenkin@gmail.com) Received: from mail-qt1-x833.google.com (mail-qt1-x833.google.com [IPv6:2607:f8b0:4864:20::833]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46KqpS70h5z4TVq for ; Fri, 30 Aug 2019 19:50:40 +0000 (UTC) (envelope-from maksim.yevmenkin@gmail.com) Received: by mail-qt1-x833.google.com with SMTP id j15so8836280qtl.13 for ; Fri, 30 Aug 2019 12:50:40 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=H4UfXhgiojvOP7tAaX265jg+KisO1Mrbe4Nl+xmfGvg=; b=LvI0xI7IoFbzgWLPaZ/PKpeiE+aqaOxKi2WrjfJcu9Dzjos4ho0ZWt9HgNuZiulvZB az+Vhs3+n0DX7xmu/yoWaRRJVGF8zC4qah5jvTneCiPA8wz3cChzyfbLZfRUIRAK5S8X 5c6Qv/KNd18qOppWUfGPgtMHEZ05Q9TZfShY6ONAL0spGeMVmRsfrAujScPwB2x+Oc3G 8QZA1Xat4anyjSvH/2hCorvB6Uiv64CduNrp5yfv6VI/L3VMb5dornYKkgCMNShcsFbr yICHdIQH+Q8lJNAsaZbokQKiR4dkPssZ7dakV2ClstlHH/dIy24xshtIZ7vCYcuOSWwP Lb7w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=H4UfXhgiojvOP7tAaX265jg+KisO1Mrbe4Nl+xmfGvg=; b=mnc+CeF6aop5mS6WxcbY3JzkskDup2wPwg64ePhIAac+Jj8N/uDW52G8E3sCimEj1O qYuqK+eq8bVOOKUAMtBVwVTDEb/7/KHQM2O6IwT6R2fsgWmcu33mg8rJA4FIEb3zjV/S X5xwRBxxhBG24CSltA9kVoTbcivurFXxlFoYwO5AwRgDKIA0rk5wA9Ji2G//Xqm7Pa4m vtLrmUwGROYtQWDnoyWmPzUM3ubo+hvbvqz8s1//2VMEV3xtXl8ef3IT2HzvukLGjF8K +523iwW/YSogIFrAFrVRK6GHxUaM2EqEAPjubL9GUgwUG30Usj7e8XQqDTGEdBhFF3h7 TD2Q== X-Gm-Message-State: APjAAAUClPQhuRVtpT1bukuBU9lEuiuZ7wm2ZkoLx81OKhu0XjxJiTiP /MoUQpkmVExDtvLmn6AsgH+y72ffxFKR87Y8iZE= X-Google-Smtp-Source: APXvYqzctDVtdNygj8Ges4DV6A5bxnHdHGuJ1RfSndOYZZUE6Fh6zetpAaIn/N4U0FBMfZgvZ3XZbESmVjaEwt07RMk= X-Received: by 2002:ac8:66ce:: with SMTP id m14mr16780247qtp.206.1567194639828; Fri, 30 Aug 2019 12:50:39 -0700 (PDT) MIME-Version: 1.0 References: <1115053193.64543.1567031661382.ref@mail.yahoo.com> <1115053193.64543.1567031661382@mail.yahoo.com> In-Reply-To: From: Maksim Yevmenkin Date: Fri, 30 Aug 2019 12:50:28 -0700 Message-ID: Subject: Re: Kernel-Crash when working with ubt0 To: Miranda Maria Sophie Van den Breukelingen Cc: "freebsd-current@freebsd.org" Content-Type: text/plain; charset="UTF-8" X-Rspamd-Queue-Id: 46KqpS70h5z4TVq X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=LvI0xI7I; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of maksimyevmenkin@gmail.com designates 2607:f8b0:4864:20::833 as permitted sender) smtp.mailfrom=maksimyevmenkin@gmail.com X-Spamd-Result: default: False [-4.00 / 15.00]; TO_DN_EQ_ADDR_SOME(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; FREEMAIL_FROM(0.00)[gmail.com]; DKIM_TRACE(0.00)[gmail.com:+]; RCPT_COUNT_TWO(0.00)[2]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; NEURAL_HAM_SHORT(-1.00)[-0.998,0]; FREEMAIL_TO(0.00)[gmail.com]; FROM_EQ_ENVFROM(0.00)[]; IP_SCORE(0.00)[ip: (-9.33), ipnet: 2607:f8b0::/32(-2.84), asn: 15169(-2.32), country: US(-0.05)]; MIME_TRACE(0.00)[0:+]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; TAGGED_FROM(0.00)[]; DWL_DNSWL_NONE(0.00)[gmail.com.dwl.dnswl.org : 127.0.5.0]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; FROM_HAS_DN(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; TAGGED_RCPT(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; MIME_GOOD(-0.10)[text/plain]; IP_SCORE_FREEMAIL(0.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[3.3.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 30 Aug 2019 19:50:41 -0000 [trimming the list of recipients] On Fri, Aug 30, 2019 at 12:08 PM Miranda Maria Sophie Van den Breukelingen wrote: > > works for me as far as pairing concernes (with patch -C > .diff.txt > > option LOCK_PROFILING > option WITNESS > > is on in kern.config. My problem presists in the following form: > > l2control -a c0:7a:a5:00:c7:11 read_channel_list > l2control: Could not bind socket, bdaddr=c0:7a:a5:00:c7:11: Network is down can you please tell what 'c0:7a:a5:00:c7:11' is? is this a remove address? looking at your previous emails, i *think*, 'c0:7a:a5:00:c7:11' is a remote address. if this is the case, then, l2control is not going to work. from the l2control(8) man page == -a local Connect to the local device with the specified BD_ADDR or name. Example: -a 00:01:02:03:04:05 or -a bt_device. == more specifically, the read_channel_list command will list l2cap channels open on the local device. i'm not exactly sure what are you trying to do here. > l2ping is ok; ok. this tells me that hci and l2cap communication works > So, what to do with the "network down" - problem? you have asked l2control to bind to the *local* bd_addr (c0:7a:a5:00:c7:11). and since there is no *local* bluetooth device with this bd_addr, l2control returns "network down". l2control will only work for *local* bd_addr's thanks max From owner-freebsd-current@freebsd.org Fri Aug 30 20:28:12 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 5A6F6D7B38 for ; Fri, 30 Aug 2019 20:28:12 +0000 (UTC) (envelope-from clay.daniels.jr@gmail.com) Received: from mail-vk1-xa29.google.com (mail-vk1-xa29.google.com [IPv6:2607:f8b0:4864:20::a29]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46Krdm1W4Sz4Wfx; Fri, 30 Aug 2019 20:28:11 +0000 (UTC) (envelope-from clay.daniels.jr@gmail.com) Received: by mail-vk1-xa29.google.com with SMTP id u203so1816877vku.3; Fri, 30 Aug 2019 13:28:11 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=1WLAT4OVIRObKRjvYY2gRxbpQDfr6lIzAD3r/PtQX34=; b=nEu0+1BjmqpPaxJh5CNKCWYFlmvngD5BdgRx3AalMK25t3ddC7d+2SvTyJd/7cZo6b 5CXAtEJ9V+hMBWsh7ZZp9b0ZwuZfyu+5+/YIH3kjle0wmIN9dOsDenQ0y6b3qCQTT195 WxTq6Iqd7pGsSlSLuVD65cmWPxt6GezkoWxt4hee82qWMcmOjWBQuPzfJBNKppEJYuia fa4TJ+tsX7ecoc4QwDU/Lv6cRzHm3A6PPcxegkTBNFg8ibEzXs3YN7hdxUMd5TvxxB47 OzAb9zIyqdZQxImVAnFYly2BDtpS0ISY80MCJfknfMBW4wB7rWMbu2v5l86nillrx6XJ Lo7w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=1WLAT4OVIRObKRjvYY2gRxbpQDfr6lIzAD3r/PtQX34=; b=BenVnDij3cqtgeTjiz2u+9/aXfZE6PvIHL0+lGhczGIb6ikwWaJwA0jytztZwA53rK 97O39eM1vGM5JHgPy9Q5e/BraYiPO7l/DoNEjy7AaD3tYN0MCCxS2upPnbygvEGs3N3z SE8Q3yBqq+NBKslPHKgQzhpL3ARfGCKbQdlKdoK7jc6uymRsQq0R8nmhHX1+fsNwPpX9 90HaXObYAjzL0erloJcdoO92mVAUEJ0uC02MTp5/LLr39aAaImDF7c4eH2e8XlRDYcwf mGcZ8pyJyIdB8IKpakEfLH8lSVabC1NRyxj+Fz1xZ4Y6stBf3ngV9FSOw/nf3irDvgp+ 3XaA== X-Gm-Message-State: APjAAAW/UDufu5ci4gHM9eitaH7ZpsgvBGqCQuhiZgiXIZoW/0GpFvCt oFjgoCe8WibAz3LUOVTTvhlJ261w0DlYBEsLMY26 X-Google-Smtp-Source: APXvYqwhDQFQBPymt2xy6Q/xd3aT5CbJg6z01etNvxZ/TanKV8fZm+YUbCwBDG5gOlCPvchK3mUdFdJp+cxTJl4IlEA= X-Received: by 2002:a1f:eb86:: with SMTP id j128mr8858585vkh.61.1567196890376; Fri, 30 Aug 2019 13:28:10 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: From: "Clay Daniels Jr." Date: Fri, 30 Aug 2019 15:27:57 -0500 Message-ID: Subject: Re: FUSE & fusefs-* To: Alan Somers Cc: FreeBSD CURRENT X-Rspamd-Queue-Id: 46Krdm1W4Sz4Wfx X-Spamd-Bar: ------ Authentication-Results: mx1.freebsd.org; none X-Spamd-Result: default: False [-6.99 / 15.00]; NEURAL_HAM_MEDIUM(-1.00)[-0.999,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; REPLY(-4.00)[]; NEURAL_HAM_SHORT(-0.99)[-0.989,0]; TAGGED_FROM(0.00)[] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 30 Aug 2019 20:28:12 -0000 Yes Alan that helps a lot! And am I to assume that the fuse ports in /emulators have NOTHING to do with the fuse.fs ports in /sysutils? Thanks, Clay On Fri, Aug 30, 2019 at 2:23 PM Alan Somers wrote: > In freebsd head, the driver is now called fusefs.ko. Does that help? > > On Fri, Aug 30, 2019, 12:45 PM Clay Daniels Jr. > wrote: > >> I finally have a little time to play with the FUSE, and installed some >> fusefs utilities I might like to try, for ntfs & ext. This is what I have: >> --- >> clay@bsd13:~ $ pkg info -r fusefs-libs >> fusefs-libs-2.9.9: >> fusefs-ntfs-2017.3.23 >> fusefs-ext2-0.0.10_2 >> fusefs-ext4fuse-0.1.3_1,1 >> clay@bsd13:~ $ pkg info -r fusefs-libs3 >> pkg: No package(s) matching fusefs-libs3 >> clay@bsd13:~ $ kldstat >> Id Refs Address Size Name >> 1 70 0xffffffff80200000 2336a10 kernel >> 2 1 0xffffffff82720000 250c44 amdgpu.ko >> 3 2 0xffffffff82971000 76e90 drm.ko >> 4 5 0xffffffff829e8000 12470 linuxkpi.ko >> 5 3 0xffffffff829fb000 12f30 linuxkpi_gplv2.ko >> 6 2 0xffffffff82a0e000 8e0 lindebugfs.ko >> 7 1 0xffffffff82a0f000 f021 ttm.ko >> 8 1 0xffffffff82a1f000 23f7 radeon_kabini_pfp_bin.ko >> 9 1 0xffffffff82a22000 23f5 radeon_kabini_me_bin.ko >> 10 1 0xffffffff82a25000 23f5 radeon_kabini_ce_bin.ko >> 11 1 0xffffffff82a28000 43f7 radeon_kabini_mec_bin.ko >> 12 1 0xffffffff82a2d000 2a77 radeon_kabini_rlc_bin.ko >> 13 1 0xffffffff82a30000 12e9 radeon_kabini_sdma_bin.ko >> 14 1 0xffffffff82a32000 12eb radeon_kabini_sdma1_bin.ko >> 15 1 0xffffffff82a34000 38ea7 radeon_kabini_uvd_bin.ko >> 16 1 0xffffffff82a6d000 18c47 radeon_kabini_vce_bin.ko >> 17 1 0xffffffff82a86000 2538 intpm.ko >> 18 1 0xffffffff82a89000 a50 smbus.ko >> 19 1 0xffffffff82a8a000 1820 uhid.ko >> 20 1 0xffffffff82a8c000 2928 ums.ko >> 21 1 0xffffffff82a8f000 1b00 wmt.ko >> 22 1 0xffffffff82a91000 acf mac_ntpd.ko >> 23 1 0xffffffff82a92000 a9f8 tmpfs.ko >> clay@bsd13:~ $ kldload fuse >> kldload: can't load fuse: Operation not permitted >> clay@bsd13:~ $ su >> Password: >> root@bsd13:/home/clay # kldload fuse >> kldload: can't load fuse: No such file or directory >> --- >> The information I have on FUSE & fusefs is mostly from these sources: >> >> https://forums.freebsd.org/threads/how-to-mount-ntfs-partition-from-same-hdd.62888/ >> http://kflu.github.io/2018/02/03/2018-02-03-freebsd-ntfs/ >> >> They seem to indicate there is a fuse.ko driver module that can be loaded >> much like the drm-kmod video drivers. I don't see this on my install: >> FreeBSD bsd13 13.0-CURRENT FreeBSD 13.0-CURRENT r351591 GENERIC amd64 >> >> I'm missing a few clues, and I don't understand the relation of the fuse >> ports in the ports/emulators & ports/sysutil directories. There is nothing >> mission critical, but any help would be a appreciated. I think it would be >> handy to mount ntfs & ext partitions from my ufs FreeBSD partition. >> >> Clay Daniels >> > From owner-freebsd-current@freebsd.org Fri Aug 30 20:32:32 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id DE61BD7E19 for ; Fri, 30 Aug 2019 20:32:32 +0000 (UTC) (envelope-from asomers@gmail.com) Received: from mail-lf1-f46.google.com (mail-lf1-f46.google.com [209.85.167.46]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46Krkl2LQgz4X3c for ; Fri, 30 Aug 2019 20:32:30 +0000 (UTC) (envelope-from asomers@gmail.com) Received: by mail-lf1-f46.google.com with SMTP id r134so5383644lff.12 for ; Fri, 30 Aug 2019 13:32:30 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=8CPWdMGKAAqfhD6UZf+DfVTNrvqX89li3qkwww9ZmTo=; b=JFp+uDYRTwdaxILxDlEKlrdf3Ud/Oi+zdfxr08NWa07bkPzu8DTronWDOwn9/lc4Hy WEGJdbvnjjJbVXctVOSEJgj2/3W/EVtgUpabo4wEST+Pam0C2XU9i3NWLAkyBFovaYlU 8bxo5i57poTiluqSNzOYapxEwh46lVYX/Z79oO1ptcNljez+s7KTh2GT7sIIDlpGr43c VVQhtHtGivt6WlT1dgKd8OLK+H2XYtZDpI1VK4Qd1ZpjnlN3WmxUsoCYeMtaP3eNjlSE Xcj2XbmcZbVPEYKJ5MM3pVJtANX5O4kZ21Ew1q3fdq6O9RBDbE2lVnbmVobfMgd7CmNL lLcw== X-Gm-Message-State: APjAAAW099UN3OTDg9KVhpNMfLnyvDCD4AB2sz43H3KDmqiauSnN85kf vkg+mwORC6NGOHsWo4M8Uj6nJQX/AehOYGpLvWo= X-Google-Smtp-Source: APXvYqw1w8/PMVzEX1u0nqC8FAMLJWB+e/mh7fSxcj/4ZJMhOL1AV1VDcvXuN9i1RxNmWTdizOYNTU/SfYnTdyfUjHs= X-Received: by 2002:a19:5218:: with SMTP id m24mr10686242lfb.164.1567197149184; Fri, 30 Aug 2019 13:32:29 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: From: Alan Somers Date: Fri, 30 Aug 2019 14:32:17 -0600 Message-ID: Subject: Re: FUSE & fusefs-* To: "Clay Daniels Jr." Cc: FreeBSD CURRENT X-Rspamd-Queue-Id: 46Krkl2LQgz4X3c X-Spamd-Bar: ---- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of asomers@gmail.com designates 209.85.167.46 as permitted sender) smtp.mailfrom=asomers@gmail.com X-Spamd-Result: default: False [-4.26 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:209.85.128.0/17]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; TAGGED_RCPT(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; DMARC_NA(0.00)[freebsd.org]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; MIME_TRACE(0.00)[0:+,1:+,2:~]; TO_DN_ALL(0.00)[]; NEURAL_HAM_SHORT(-1.00)[-0.996,0]; RCPT_COUNT_TWO(0.00)[2]; RCVD_IN_DNSWL_NONE(0.00)[46.167.85.209.list.dnswl.org : 127.0.5.0]; TO_MATCH_ENVRCPT_SOME(0.00)[]; IP_SCORE(-1.26)[ip: (-0.60), ipnet: 209.85.128.0/17(-3.34), asn: 15169(-2.32), country: US(-0.05)]; FREEMAIL_TO(0.00)[gmail.com]; FORGED_SENDER(0.30)[asomers@freebsd.org,asomers@gmail.com]; R_DKIM_NA(0.00)[]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:209.85.128.0/17, country:US]; FROM_NEQ_ENVFROM(0.00)[asomers@freebsd.org,asomers@gmail.com]; RCVD_TLS_ALL(0.00)[]; RCVD_COUNT_TWO(0.00)[2] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 30 Aug 2019 20:32:32 -0000 Correct. They're unrelated. On Fri, Aug 30, 2019 at 2:28 PM Clay Daniels Jr. wrote: > Yes Alan that helps a lot! And am I to assume that the fuse ports in > /emulators have NOTHING to do with the fuse.fs ports in /sysutils? > Thanks, > Clay > > On Fri, Aug 30, 2019 at 2:23 PM Alan Somers wrote: > >> In freebsd head, the driver is now called fusefs.ko. Does that help? >> >> On Fri, Aug 30, 2019, 12:45 PM Clay Daniels Jr. < >> clay.daniels.jr@gmail.com> wrote: >> >>> I finally have a little time to play with the FUSE, and installed some >>> fusefs utilities I might like to try, for ntfs & ext. This is what I have: >>> --- >>> clay@bsd13:~ $ pkg info -r fusefs-libs >>> fusefs-libs-2.9.9: >>> fusefs-ntfs-2017.3.23 >>> fusefs-ext2-0.0.10_2 >>> fusefs-ext4fuse-0.1.3_1,1 >>> clay@bsd13:~ $ pkg info -r fusefs-libs3 >>> pkg: No package(s) matching fusefs-libs3 >>> clay@bsd13:~ $ kldstat >>> Id Refs Address Size Name >>> 1 70 0xffffffff80200000 2336a10 kernel >>> 2 1 0xffffffff82720000 250c44 amdgpu.ko >>> 3 2 0xffffffff82971000 76e90 drm.ko >>> 4 5 0xffffffff829e8000 12470 linuxkpi.ko >>> 5 3 0xffffffff829fb000 12f30 linuxkpi_gplv2.ko >>> 6 2 0xffffffff82a0e000 8e0 lindebugfs.ko >>> 7 1 0xffffffff82a0f000 f021 ttm.ko >>> 8 1 0xffffffff82a1f000 23f7 radeon_kabini_pfp_bin.ko >>> 9 1 0xffffffff82a22000 23f5 radeon_kabini_me_bin.ko >>> 10 1 0xffffffff82a25000 23f5 radeon_kabini_ce_bin.ko >>> 11 1 0xffffffff82a28000 43f7 radeon_kabini_mec_bin.ko >>> 12 1 0xffffffff82a2d000 2a77 radeon_kabini_rlc_bin.ko >>> 13 1 0xffffffff82a30000 12e9 radeon_kabini_sdma_bin.ko >>> 14 1 0xffffffff82a32000 12eb radeon_kabini_sdma1_bin.ko >>> 15 1 0xffffffff82a34000 38ea7 radeon_kabini_uvd_bin.ko >>> 16 1 0xffffffff82a6d000 18c47 radeon_kabini_vce_bin.ko >>> 17 1 0xffffffff82a86000 2538 intpm.ko >>> 18 1 0xffffffff82a89000 a50 smbus.ko >>> 19 1 0xffffffff82a8a000 1820 uhid.ko >>> 20 1 0xffffffff82a8c000 2928 ums.ko >>> 21 1 0xffffffff82a8f000 1b00 wmt.ko >>> 22 1 0xffffffff82a91000 acf mac_ntpd.ko >>> 23 1 0xffffffff82a92000 a9f8 tmpfs.ko >>> clay@bsd13:~ $ kldload fuse >>> kldload: can't load fuse: Operation not permitted >>> clay@bsd13:~ $ su >>> Password: >>> root@bsd13:/home/clay # kldload fuse >>> kldload: can't load fuse: No such file or directory >>> --- >>> The information I have on FUSE & fusefs is mostly from these sources: >>> >>> https://forums.freebsd.org/threads/how-to-mount-ntfs-partition-from-same-hdd.62888/ >>> http://kflu.github.io/2018/02/03/2018-02-03-freebsd-ntfs/ >>> >>> They seem to indicate there is a fuse.ko driver module that can be >>> loaded much like the drm-kmod video drivers. I don't see this on my install: >>> FreeBSD bsd13 13.0-CURRENT FreeBSD 13.0-CURRENT r351591 GENERIC amd64 >>> >>> I'm missing a few clues, and I don't understand the relation of the fuse >>> ports in the ports/emulators & ports/sysutil directories. There is nothing >>> mission critical, but any help would be a appreciated. I think it would be >>> handy to mount ntfs & ext partitions from my ufs FreeBSD partition. >>> >>> Clay Daniels >>> >> From owner-freebsd-current@freebsd.org Sat Aug 31 01:36:56 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 23491DE9CE for ; Sat, 31 Aug 2019 01:36:56 +0000 (UTC) (envelope-from ler@FreeBSD.org) Received: from thebighonker.lerctr.org (ns-b.lerctr.org [IPv6:2001:470:1f0f:3ad::53:2]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "*.lerctr.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46KzTz49vbz3K8k for ; Sat, 31 Aug 2019 01:36:55 +0000 (UTC) (envelope-from ler@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lerctr.org; s=ler2019; h=Message-ID:Subject:To:From:Date:Content-Type:MIME-Version: Sender:Reply-To:Cc:Content-Transfer-Encoding:Content-ID:Content-Description: Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID: In-Reply-To:References:List-Id:List-Help:List-Unsubscribe:List-Subscribe: List-Post:List-Owner:List-Archive; bh=7BUbql2QcJDY+43sTnp29r7ex+PXiXG0EIs5AxsfSVw=; b=v0/X0bhx9x/vJAtmHfPfdgQ3jy /Ntc8Mw/oxtacJswbvj+eDd3b2cBgpyoQEXORZh55KJrXV2J3MINBBknSFTA84dKzLrPuxzM68FJM dl1VQ5u1SamJLvfh9dNMSOhFV+B/sT/NONUnHxU/FN1Nwe4iK7fKZ5IN/HwvIyfoFbPDl/9jxYjPZ DC0wjhWbqzgVW38jP1RCE6I1ruIWbngQ7z88bqfarhGn15NLXywi51b8MALUCDz8PXUt5ooJqkd25 X+NgYabrbWPn5lXjAZc73Q270h0cBCX0RHwy7E587xSueThXCAR0NCLS7dYzGvWG1DHmt9N7copcb JI7qUc6g==; Received: from thebighonker.lerctr.org ([2001:470:1f0f:3ad:bb:dcff:fe50:d900]:16080 helo=webmail.lerctr.org) by thebighonker.lerctr.org with esmtpsa (TLSv1.3:TLS_AES_256_GCM_SHA384:256) (Exim 4.92.1 (FreeBSD)) (envelope-from ) id 1i3sJx-000HF2-6k for freebsd-current@freebsd.org; Fri, 30 Aug 2019 20:36:53 -0500 Received: from 2600:1700:210:b180:a93d:f380:e1b8:2ac4 by webmail.lerctr.org with HTTP (HTTP/1.1 POST); Fri, 30 Aug 2019 20:36:50 -0500 MIME-Version: 1.0 Content-Type: multipart/signed; protocol="application/pgp-signature"; boundary="=_273bc9100141e3fd2c95592f32d3b6c9"; micalg=pgp-sha256 Date: Fri, 30 Aug 2019 20:36:50 -0500 From: Larry Rosenman To: Freebsd current Subject: sysutils/lsof: VOP_FSYNC definition moved? Message-ID: X-Sender: ler@FreeBSD.org User-Agent: Roundcube Webmail/1.3.9 X-Rspamd-Queue-Id: 46KzTz49vbz3K8k X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; none X-Spamd-Result: default: False [-2.99 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.99)[-0.986,0]; ASN(0.00)[asn:6939, ipnet:2001:470::/32, country:US]; NEURAL_HAM_LONG(-1.00)[-1.000,0] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 31 Aug 2019 01:36:56 -0000 This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --=_273bc9100141e3fd2c95592f32d3b6c9 Content-Transfer-Encoding: 7bit Content-Type: text/plain; charset=US-ASCII; format=flowed http://home.lerctr.org:8888/data/live-host-ports/2019-08-30_20h25m06s/logs/errors/lsof-4.93.2_4,8.log --- dnode2.o --- In file included from dnode2.c:56: In file included from /usr/src/sys/cddl/contrib/opensolaris/uts/common/fs/zfs/sys/zfs_znode.h:33: In file included from /usr/src/sys/cddl/contrib/opensolaris/uts/common/fs/zfs/sys/dmu.h:47: In file included from /usr/src/sys/cddl/contrib/opensolaris/uts/common/fs/zfs/sys/zfs_context.h:73: In file included from /usr/src/sys/cddl/compat/opensolaris/sys/vfs.h:37: /usr/src/sys/cddl/compat/opensolaris/sys/vnode.h:243:10: warning: implicit declaration of function 'VOP_FSYNC' is invalid in C99 [-Wimplicit-function-declaration] error = VOP_FSYNC(vp, MNT_WAIT, curthread); ^ 1 warning generated. A failure has been detected in another branch of the parallel make Can some of the kernel folks help me here? Thanks! -- Larry Rosenman http://people.freebsd.org/~ler Phone: +1 214-642-9640 E-Mail: ler@FreeBSD.org US Mail: 5708 Sabbia Dr, Round Rock, TX 78665-2106 --=_273bc9100141e3fd2c95592f32d3b6c9 Content-Type: application/pgp-signature; name=signature.asc Content-Disposition: attachment; filename=signature.asc; size=488 Content-Description: OpenPGP digital signature -----BEGIN PGP SIGNATURE----- iQEzBAEBCAAdFiEEHjgknedhWzvJgwVzaXyZsatIp30FAl1pzzQACgkQaXyZsatI p30+lQgApDHWbLxY00MQUKpEKWcK2ZHFhrKQoWPyvedrUQHMw4r1e884X01xrMeK ll0/CeK2W+FCuCrIm6fyOFS2qfdf5Bh3bJEyl9GYZ3C7wwgKXNkQYaGs6HJskmor UEyQjUN2f/44e5tb/l5/ViwRkfkHrenf4EAmi1YMXS74TqULlz19N0OcIqkEcG3X WEcOd19PsVkgavjW7tZLVImxaicIfFPjSZvqbyhyi9Hb1Bnu0e7WmhxYE8iQy5zs rJqmSvwi9NVc10e5wJ7ijIDi6FZEmCyA5++v2QWoT6mMl3JqY01qgbFqkgAy6vGf RxdNCnpckDfUfSiFS2aV/XQ4zZexZQ== =8D2j -----END PGP SIGNATURE----- --=_273bc9100141e3fd2c95592f32d3b6c9-- From owner-freebsd-current@freebsd.org Sat Aug 31 03:20:35 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 7E5B0E20BE for ; Sat, 31 Aug 2019 03:20:35 +0000 (UTC) (envelope-from yuripv@yuripv.net) Received: from wnew4-smtp.messagingengine.com (wnew4-smtp.messagingengine.com [64.147.123.18]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 46L1nZ2gvrz3QVr; Sat, 31 Aug 2019 03:20:33 +0000 (UTC) (envelope-from yuripv@yuripv.net) Received: from compute5.internal (compute5.nyi.internal [10.202.2.45]) by mailnew.west.internal (Postfix) with ESMTP id 5709046D; Fri, 30 Aug 2019 23:20:32 -0400 (EDT) Received: from mailfrontend1 ([10.202.2.162]) by compute5.internal (MEProxy); Fri, 30 Aug 2019 23:20:32 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yuripv.net; h= subject:to:references:from:message-id:date:mime-version :in-reply-to:content-type:content-transfer-encoding; s=fm1; bh=/ Gat1B6V/cuJNcIGWeQCqGvxr0Ff97HgODrgqww82/0=; b=V7ia6KTdJU1x78jIm uyZ+ZWaMF83DCwC4VQR/TAU/0s3nj96EF4PxhQgetCVjtroqvKPIS9ZUorwpBX2R Wpv/iL99YPgBiKPbNueX5bQnG8Hj8KBJ9TqeJAedlO98SVE6uVFeRBxnTcTGmLKm HaSo31d0YPXdi8bnaaD2jtF3NMoUl+AEdretktW+N2NA7EnoswewBif0g/6zk4Xr kmhrZSc4waUf5d4otB84fKanofTiSlwB0elWnuAXiSCSxrcpwBQnIVXcm3Ueb8Hl 0PP362mSUUflXX5ECSpgrWHiamqXEcSKeGcxmADRGiVPJjcdi6MQ4w4CrEJmLwqt 9zUUQ== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-transfer-encoding:content-type :date:from:in-reply-to:message-id:mime-version:references :subject:to:x-me-proxy:x-me-proxy:x-me-sender:x-me-sender :x-sasl-enc; s=fm3; bh=/Gat1B6V/cuJNcIGWeQCqGvxr0Ff97HgODrgqww82 /0=; b=iLguzMOw2yJzfceRU6gcnfUiP9lwcfBMnrt9+rNxLndaC9uGoXZgZZ/6C oOr7GLKoAM66cgqomjM/WJXRqidkjrTKIgPrnjB0KGWffaYeTMnAssnd1bp0oVNX hD/65TnBkcOVh21qhg8x8OcycYW5+arHys7JyNs53jJ1IIplOQYoKoVMjOij3Q1R Ww9NGCkalO3Zl7v3Fukf+XZ7gdIBldaCOFu0RSiA62fG85VEtGC4dWAvJlmX3IvU 8H7R7XtphRobbNG6oqJ7rMp3BkK20wpEw2mygMhJIldusFDKN/b8ocEXnEDzmMnO 3FKr5iBYbxrH6OAxecvwmdi89d7bw== X-ME-Sender: X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduvddrudeihedgjeduucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucesvcftvggtihhpihgvnhhtshculddquddttddmne cujfgurhepuffvfhfhkffffgggjggtgfesthejredttdefheenucfhrhhomhepjghurhhi ucfrrghnkhhovhcuoeihuhhrihhpvheshihurhhiphhvrdhnvghtqeenucffohhmrghinh eplhgvrhgtthhrrdhorhhgnecukfhppeduleehrddvtdeirddukeefrdduieejnecurfgr rhgrmhepmhgrihhlfhhrohhmpeihuhhrihhpvheshihurhhiphhvrdhnvghtnecuvehluh hsthgvrhfuihiivgeptd X-ME-Proxy: Received: from [192.168.1.2] (unknown [195.206.183.167]) by mail.messagingengine.com (Postfix) with ESMTPA id 83CA480059; Fri, 30 Aug 2019 23:20:29 -0400 (EDT) Subject: Re: sysutils/lsof: VOP_FSYNC definition moved? To: Larry Rosenman , Freebsd current References: From: Yuri Pankov Message-ID: <0aceb3c6-2f73-7b97-b3a9-d2598cd79d6c@yuripv.net> Date: Sat, 31 Aug 2019 06:20:27 +0300 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=windows-1252 Content-Language: en-US Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: 46L1nZ2gvrz3QVr X-Spamd-Bar: - Authentication-Results: mx1.freebsd.org; dkim=pass header.d=yuripv.net header.s=fm1 header.b=V7ia6KTd; dkim=pass header.d=messagingengine.com header.s=fm3 header.b=iLguzMOw; dmarc=none; spf=pass (mx1.freebsd.org: domain of yuripv@yuripv.net designates 64.147.123.18 as permitted sender) smtp.mailfrom=yuripv@yuripv.net X-Spamd-Result: default: False [-1.04 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_DKIM_ALLOW(0.00)[yuripv.net:s=fm1,messagingengine.com:s=fm3]; RSPAMD_URIBL(4.50)[lerctr.org]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(0.00)[+ip4:64.147.123.18]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; RCVD_TLS_LAST(0.00)[]; DMARC_NA(0.00)[yuripv.net]; BAD_REP_POLICIES(0.10)[]; NEURAL_HAM_LONG(-1.00)[-0.998,0]; RCVD_COUNT_THREE(0.00)[4]; IP_SCORE(-3.50)[ip: (-9.87), ipnet: 64.147.123.0/24(-4.89), asn: 11403(-2.68), country: US(-0.05)]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[yuripv.net:+,messagingengine.com:+]; RCPT_COUNT_TWO(0.00)[2]; NEURAL_HAM_SHORT(-0.96)[-0.965,0]; NEURAL_HAM_MEDIUM(-0.98)[-0.979,0]; RCVD_IN_DNSWL_LOW(-0.10)[18.123.147.64.list.dnswl.org : 127.0.5.1]; SUBJECT_ENDS_QUESTION(1.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:11403, ipnet:64.147.123.0/24, country:US]; MID_RHS_MATCH_FROM(0.00)[]; FROM_EQ_ENVFROM(0.00)[] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 31 Aug 2019 03:20:35 -0000 Larry Rosenman wrote: > http://home.lerctr.org:8888/data/live-host-ports/2019-08-30_20h25m06s/logs/errors/lsof-4.93.2_4,8.log > > --- dnode2.o --- > In file included from dnode2.c:56: > In file included from > /usr/src/sys/cddl/contrib/opensolaris/uts/common/fs/zfs/sys/zfs_znode.h:33: > In file included from > /usr/src/sys/cddl/contrib/opensolaris/uts/common/fs/zfs/sys/dmu.h:47: > In file included from > /usr/src/sys/cddl/contrib/opensolaris/uts/common/fs/zfs/sys/zfs_context.h:73: > In file included from /usr/src/sys/cddl/compat/opensolaris/sys/vfs.h:37: > /usr/src/sys/cddl/compat/opensolaris/sys/vnode.h:243:10: warning: > implicit declaration of function 'VOP_FSYNC' is invalid in C99 > [-Wimplicit-function-declaration] > error = VOP_FSYNC(vp, MNT_WAIT, curthread); > ^ > 1 warning generated. > A failure has been detected in another branch of the parallel make Real error seems to be way above that (see below), and VOP_FSYNC one is just a fallout from that. It is likely related to r351594 by Konstantin, but I didn't look into the details. You could try defining _SYS_PCPU_H_ before including in dlsof.h with _KERNEL defined -- this seems to fix the lsof build for me. ------------- In file included from ckkv.c:43: In file included from ./../lsof.h:221: In file included from ./../dlsof.h:412: In file included from /usr/src/sys/sys/file.h:44: In file included from /usr/src/sys/sys/refcount.h:36: In file included from /usr/src/sys/sys/systm.h:126: In file included from /usr/src/sys/sys/pcpu.h:223: /usr/include/machine/pcpu_aux.h:55:55: error: expected expression __asm("movq %%gs:%P1,%0" : "=r" (td) : "n" (offsetof(struct pcpu, ^ /usr/include/machine/pcpu_aux.h:56:6: error: use of undeclared identifier 'pc_curthread'; did you mean '__curthread'? pc_curthread))); ^ /usr/include/machine/pcpu_aux.h:51:1: note: '__curthread' declared here __curthread(void) ^ /usr/include/machine/pcpu_aux.h:66:56: error: expected expression __asm("movq %%gs:%P1,%0" : "=r" (pcb) : "n" (offsetof(struct pcpu, ^ /usr/include/machine/pcpu_aux.h:67:6: error: use of undeclared identifier 'pc_curpcb'; did you mean '__curpcb'? pc_curpcb))); ^ /usr/include/machine/pcpu_aux.h:62:1: note: '__curpcb' declared here __curpcb(void) From owner-freebsd-current@freebsd.org Sat Aug 31 03:23:19 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 85896E236A for ; Sat, 31 Aug 2019 03:23:19 +0000 (UTC) (envelope-from ler@FreeBSD.org) Received: from thebighonker.lerctr.org (ns-b.lerctr.org [IPv6:2001:470:1f0f:3ad::53:2]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "*.lerctr.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46L1rl2z1Tz3Qt1 for ; Sat, 31 Aug 2019 03:23:18 +0000 (UTC) (envelope-from ler@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lerctr.org; s=ler2019; h=Message-ID:References:In-Reply-To:Subject:Cc:To:From:Date: Content-Transfer-Encoding:Content-Type:MIME-Version:Sender:Reply-To: Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender: Resent-To:Resent-Cc:Resent-Message-ID:List-Id:List-Help:List-Unsubscribe: List-Subscribe:List-Post:List-Owner:List-Archive; bh=uk+wRXcTeyXE9nEH8jIQWe/igUS+TKD/i2dc1TYV0Eo=; b=FKH4LFUr0B5+ZYK+ABWMfGuGq0 nAicv0P380HtdhVx44fTT+HIJhRHRNWGaDj7BCyas6GcrHqwCLMF4ooPzWdkvF7oamL3GorUj41gY WowqBvdH41JUuxwzHye4oWb2bJEu5FhQ9bOaYGiOGdAWjOxUHo/09UCsmLFdz1d9z81gXEagZOqB1 a5rOIJyxK71DP/XpTItQ9zmM5FJgIhe0f9tz4dFajNyNrO6Xe6pC/RaltmZo2znZ8tLrb/zNOn4j0 mEqRbG9YuLSUD5Bv7+N5GBgH2twYFMmGXqrRZwSfYZ+6SYw1HSG/luUYX7gyXW6TRwslRx+MLu7ej WWN/yw7Q==; Received: from thebighonker.lerctr.org ([2001:470:1f0f:3ad:bb:dcff:fe50:d900]:11208 helo=webmail.lerctr.org) by thebighonker.lerctr.org with esmtpsa (TLSv1.3:TLS_AES_256_GCM_SHA384:256) (Exim 4.92.1 (FreeBSD)) (envelope-from ) id 1i3tyw-000IuA-2W; Fri, 30 Aug 2019 22:23:18 -0500 Received: from 2600:1700:210:b180:a93d:f380:e1b8:2ac4 by webmail.lerctr.org with HTTP (HTTP/1.1 POST); Fri, 30 Aug 2019 22:23:17 -0500 MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII; format=flowed Content-Transfer-Encoding: 7bit Date: Fri, 30 Aug 2019 22:23:17 -0500 From: Larry Rosenman To: Yuri Pankov Cc: Freebsd current Subject: Re: sysutils/lsof: VOP_FSYNC definition moved? In-Reply-To: <0aceb3c6-2f73-7b97-b3a9-d2598cd79d6c@yuripv.net> References: <0aceb3c6-2f73-7b97-b3a9-d2598cd79d6c@yuripv.net> Message-ID: <8cd7ddfa63b899b01f39b5c7e9074c7b@FreeBSD.org> X-Sender: ler@FreeBSD.org User-Agent: Roundcube Webmail/1.3.9 X-Rspamd-Queue-Id: 46L1rl2z1Tz3Qt1 X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; none X-Spamd-Result: default: False [-2.98 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.98)[-0.983,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; ASN(0.00)[asn:6939, ipnet:2001:470::/32, country:US] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 31 Aug 2019 03:23:19 -0000 On 08/30/2019 10:20 pm, Yuri Pankov wrote: > Larry Rosenman wrote: >> http://home.lerctr.org:8888/data/live-host-ports/2019-08-30_20h25m06s/logs/errors/lsof-4.93.2_4,8.log >> >> --- dnode2.o --- >> In file included from dnode2.c:56: >> In file included from >> /usr/src/sys/cddl/contrib/opensolaris/uts/common/fs/zfs/sys/zfs_znode.h:33: >> In file included from >> /usr/src/sys/cddl/contrib/opensolaris/uts/common/fs/zfs/sys/dmu.h:47: >> In file included from >> /usr/src/sys/cddl/contrib/opensolaris/uts/common/fs/zfs/sys/zfs_context.h:73: >> In file included from >> /usr/src/sys/cddl/compat/opensolaris/sys/vfs.h:37: >> /usr/src/sys/cddl/compat/opensolaris/sys/vnode.h:243:10: warning: >> implicit declaration of function 'VOP_FSYNC' is invalid in C99 >> [-Wimplicit-function-declaration] >> error = VOP_FSYNC(vp, MNT_WAIT, curthread); >> ^ >> 1 warning generated. >> A failure has been detected in another branch of the parallel make > > Real error seems to be way above that (see below), and VOP_FSYNC one is > just a fallout from that. It is likely related to r351594 by > Konstantin, but I didn't look into the details. You could try defining > _SYS_PCPU_H_ before including in dlsof.h with _KERNEL > defined -- this seems to fix the lsof build for me. > > ------------- > In file included from ckkv.c:43: > In file included from ./../lsof.h:221: > In file included from ./../dlsof.h:412: > In file included from /usr/src/sys/sys/file.h:44: > In file included from /usr/src/sys/sys/refcount.h:36: > In file included from /usr/src/sys/sys/systm.h:126: > In file included from /usr/src/sys/sys/pcpu.h:223: > /usr/include/machine/pcpu_aux.h:55:55: error: expected expression > __asm("movq %%gs:%P1,%0" : "=r" (td) : "n" (offsetof(struct > pcpu, > ^ > /usr/include/machine/pcpu_aux.h:56:6: error: use of undeclared > identifier 'pc_curthread'; did you mean '__curthread'? > pc_curthread))); > ^ > /usr/include/machine/pcpu_aux.h:51:1: note: '__curthread' declared here > __curthread(void) > ^ > /usr/include/machine/pcpu_aux.h:66:56: error: expected expression > __asm("movq %%gs:%P1,%0" : "=r" (pcb) : "n" (offsetof(struct > pcpu, > ^ > /usr/include/machine/pcpu_aux.h:67:6: error: use of undeclared > identifier 'pc_curpcb'; did you mean '__curpcb'? > pc_curpcb))); > ^ > /usr/include/machine/pcpu_aux.h:62:1: note: '__curpcb' declared here > __curpcb(void) Thanks, Yuri. I'd *REALLY* like someone with real kernel knowledge to look at lsof and help modernize the #ifdef mess. -- Larry Rosenman http://people.freebsd.org/~ler Phone: +1 214-642-9640 E-Mail: ler@FreeBSD.org US Mail: 5708 Sabbia Dr, Round Rock, TX 78665-2106 From owner-freebsd-current@freebsd.org Sat Aug 31 06:24:49 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 420A7E5A6D for ; Sat, 31 Aug 2019 06:24:49 +0000 (UTC) (envelope-from gljennjohn@gmail.com) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 46L5t869YWz457X for ; Sat, 31 Aug 2019 06:24:48 +0000 (UTC) (envelope-from gljennjohn@gmail.com) Received: by mailman.nyi.freebsd.org (Postfix) id D3CF8E5A6B; Sat, 31 Aug 2019 06:24:48 +0000 (UTC) Delivered-To: current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id D3940E5A6A for ; Sat, 31 Aug 2019 06:24:48 +0000 (UTC) (envelope-from gljennjohn@gmail.com) Received: from mail-wm1-x344.google.com (mail-wm1-x344.google.com [IPv6:2a00:1450:4864:20::344]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46L5t85GJ6z457W; Sat, 31 Aug 2019 06:24:48 +0000 (UTC) (envelope-from gljennjohn@gmail.com) Received: by mail-wm1-x344.google.com with SMTP id r17so7872897wme.0; Fri, 30 Aug 2019 23:24:48 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=date:from:to:cc:subject:message-id:in-reply-to:references:reply-to :mime-version:content-transfer-encoding; bh=1+FpmgZBFE/+U54KN0YubFW8xMbJwASnSpFIpB3AOyg=; b=kCRsAh+kP0oe+2NnTf6DUSDECmBThy7Ldxsd5eyWzxydM43aLJPzFAzbBNlA6rnhsA O1ioXR0kd71dxeWwSNP1vLVV4WXuw01hb4FCxcdrBSwlzhMG1NJiVts/CQ+LSEtlnqab kxsBiqBUH5aEYsheutN50pXCcutJnhkCDKFYk13+wg0BZSujoNpsnMskOVuTiqsdd85Q ECCNqt6Ce41Sk49c0jrpzt99Vd4/Tsjx2hSbWheY3tHhbIQVWNnScvBEMjxD/5viDSrt m/GwO7xlHIPX5XBR6v+5LPGzFX/o+5agX7nGyERwZwJESdwkNpBbj6F3wOnjYOssZ0fS s+fw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:in-reply-to :references:reply-to:mime-version:content-transfer-encoding; bh=1+FpmgZBFE/+U54KN0YubFW8xMbJwASnSpFIpB3AOyg=; b=ASuUjDnoREZPIYC5Dr96t4eMjF9aqGZ0LwoLEEVG49IOhSkY9BcMdA+YMuOcZgK2Yw exMnXlqC03e0kwLhpJUlAE4tGgpOxPsuUiN0p0Nu8pQJXXZYK01Una4dcYIehQXu9T8o 4qu8Y67ggWAJU6gd3qd7PtOd2UDKu1oWTtoWtm0FLn/awvP5/mrOUGIET8MOPnyoNKfC O3E8vL48UFMN8Dgxh6VFgekKNzvx4OYrgXeXbICyuMJs3ogyruVz2ukoBq5jDDlIwfi/ We8XLELh13aqCwGpBaH4fpz4aL67Dui3WfQGeMXSUeZGdhiziI8Eoo5IgA9bJ/QleHUO ccVg== X-Gm-Message-State: APjAAAXoZQVXHsw1MSsEOabLQWrZumsI8DZ6ia8jldY767X/x8e9uyzs pc//6D5jBv0TmLYF24P7Ta3IxfxTON8= X-Google-Smtp-Source: APXvYqwd6XUXgvaUCqYjpqJSUVy97pKagh3fxrHcQO2oSN8qs0XKwmH9WhAWJQXCFeXC0mxS5hnWZA== X-Received: by 2002:a7b:c303:: with SMTP id k3mr9146590wmj.47.1567232687462; Fri, 30 Aug 2019 23:24:47 -0700 (PDT) Received: from ernst.home (pD9E239A5.dip0.t-ipconnect.de. [217.226.57.165]) by smtp.gmail.com with ESMTPSA id c18sm1983882wrr.11.2019.08.30.23.24.46 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 30 Aug 2019 23:24:47 -0700 (PDT) Date: Sat, 31 Aug 2019 08:24:46 +0200 From: Gary Jennejohn To: Kyle Evans Cc: John Baldwin , current Subject: Re: problem with LOCAL_MODULES Message-ID: <20190831082446.2a8de0f0@ernst.home> In-Reply-To: References: <20190816120524.21b7fd19@ernst.home> <7b46b0a5-903f-5d8d-c7df-9eafda504445@FreeBSD.org> Reply-To: gljennjohn@gmail.com X-Mailer: Claws Mail 3.17.4 (GTK+ 2.24.32; amd64-portbld-freebsd13.0) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: 46L5t85GJ6z457W X-Spamd-Bar: ------ Authentication-Results: mx1.freebsd.org; none X-Spamd-Result: default: False [-6.97 / 15.00]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.97)[-0.974,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; REPLY(-4.00)[] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 31 Aug 2019 06:24:49 -0000 On Fri, 30 Aug 2019 14:33:06 -0500 Kyle Evans wrote: > On Fri, Aug 30, 2019 at 2:26 PM Kyle Evans wrote: > > > > On Fri, Aug 30, 2019 at 2:11 PM John Baldwin wrote: > > > > > > On 8/30/19 10:42 AM, Kyle Evans wrote: > > > > On Fri, Aug 16, 2019 at 7:38 PM John Baldwin wrote: > > > >> > > > >> On 8/16/19 3:05 AM, Gary Jennejohn wrote: > > > >>> I tried to build a kernel today and it failed in modules-all even > > > >>> though I had LOCAL_MODULES="" in /etc/src.conf, as recommended by > > > >>> jhb. > > > >>> > > > >>> That's wrong. It has to be LOCAL_MODULES=, otherwise > > > >>> /sys/conf/kern.post.mk seems to conclude that there should be a > > > >>> module under /usr/local/sys/modules with the name "". > > > >> > > > >> I think this will permit both versions to work: > > > >> > > > >> Index: sys/conf/kern.post.mk > > > >> =================================================================== > > > >> --- kern.post.mk (revision 351151) > > > >> +++ kern.post.mk (working copy) > > > >> @@ -76,6 +76,7 @@ modules-${target}: > > > >> cd $S/modules; ${MKMODULESENV} ${MAKE} \ > > > >> ${target:S/^reinstall$/install/:S/^clobber$/cleandir/} > > > >> .endif > > > >> +.if !empty(LOCAL_MODULES) > > > >> .for module in ${LOCAL_MODULES} > > > >> @${ECHODIR} "===> ${module} (${target:S/^reinstall$/install/:S/^clobber$/cleandir/})" > > > >> @cd ${LOCAL_MODULES_DIR}/${module}; ${MKMODULESENV} ${MAKE} \ > > > >> @@ -83,6 +84,7 @@ modules-${target}: > > > >> ${target:S/^reinstall$/install/:S/^clobber$/cleandir/} > > > >> .endfor > > > >> .endif > > > >> +.endif > > > >> .endfor > > > >> > > > >> # Handle ports (as defined by the user) that build kernel modules > > > >> > > > > > > > > I think I'd like to see this with !empty(LOCAL_MODULES) && > > > > EXISTS(${LOCAL_MODULES_DIR}) or maybe just the latter condition to > > > > prevent accidental foot-shooting... I was testing a problem with doing > > > > this stuff in a poudriere build for swills@ and set LOCAL_MODULES="" > > > > only to get an error because LOCAL_MODULES_DIR doesn't yet exist on > > > > the machine I was testing with -- which we can trivially avoid. > > > > > > Did this work for you? Gary said in a followup that it didn't work, > > > so that's why I hadn't committed it. > > > > > > > Hmm... I went back and tested his exact scenario, and no- > > LOCAL_MODULES isn't empty at this point because word processing that > > leaves us with an empty string hasn't yet been done. An .if > > !empty(module) inside the loop is much happier- I'm not seeing any > > modifiers that would give us the behavior we wanted for figuring this > > out before entering the loop. > > It turns out I'm silly... this is sufficient for both of our problems > (because it's the same problem) and hopefully my mail client doesn't > goof this up: > > diff --git a/sys/conf/kern.post.mk b/sys/conf/kern.post.mk > index ff10daf1a0a..09bfffad095 100644 > --- a/sys/conf/kern.post.mk > +++ b/sys/conf/kern.post.mk > @@ -77,10 +77,12 @@ modules-${target}: > ${target:S/^reinstall$/install/:S/^clobber$/cleandir/} > .endif > .for module in ${LOCAL_MODULES} > +.if !empty(module) > @${ECHODIR} "===> ${module} > (${target:S/^reinstall$/install/:S/^clobber$/cleandir/})" > @cd ${LOCAL_MODULES_DIR}/${module}; ${MKMODULESENV} ${MAKE} \ > DIRPRFX="${module}/" \ > ${target:S/^reinstall$/install/:S/^clobber$/cleandir/} > +.endif > .endfor > .endif > .endfor Yes, this patch works correctly. -- Gary Jennejohn