From owner-freebsd-stable@freebsd.org Sun Sep 1 04:52:29 2019 Return-Path: Delivered-To: freebsd-stable@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 6E5AECB75C for ; Sun, 1 Sep 2019 04:52:29 +0000 (UTC) (envelope-from TERRY@glaver.org) Received: from server.glaver.org (server.glaver.org [204.141.35.63]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 46Lgn83t6Qz4gB3 for ; Sun, 1 Sep 2019 04:52:28 +0000 (UTC) (envelope-from TERRY@glaver.org) Received: from glaver.org by glaver.org (PMDF V6.7-x04 #37010) id <01RAWIATI54G00008I@glaver.org> for freebsd-stable@freebsd.org; Sun, 01 Sep 2019 00:46:49 -0400 (EDT) Date: Sun, 01 Sep 2019 00:06:55 -0400 (EDT) From: Terry Kennedy Subject: mpr causing a boot hang sometime after r348368 - NUMA related? To: freebsd-stable@freebsd.org Message-id: <01RAWPRY1VTW00008I@glaver.org> MIME-version: 1.0 Content-type: TEXT/PLAIN; CHARSET=us-ascii X-Rspamd-Queue-Id: 46Lgn83t6Qz4gB3 X-Spamd-Bar: - Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of TERRY@glaver.org designates 204.141.35.63 as permitted sender) smtp.mailfrom=TERRY@glaver.org X-Spamd-Result: default: False [-1.75 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-0.99)[-0.987,0]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:204.141.35.63]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; TO_DN_NONE(0.00)[]; DMARC_NA(0.00)[glaver.org]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-0.99)[-0.990,0]; MIME_TRACE(0.00)[0:+]; NEURAL_HAM_SHORT(-0.46)[-0.459,0]; RCVD_TLS_LAST(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; SUBJECT_ENDS_QUESTION(1.00)[]; ASN(0.00)[asn:22691, ipnet:204.141.35.0/24, country:US]; MID_RHS_MATCH_FROM(0.00)[]; IP_SCORE(-0.01)[country: US(-0.05)]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 01 Sep 2019 04:52:29 -0000 TL;DR - mpr controller becomes increasingly likely to hang boot when on the 2nd CPU as FreeBSD 12.0-STABLE moves forward. I have a Dell PowerEdge R730 (configuration details available if needed) with a PERC H730 mini (mrsas driver) and a "12Gbps external HBA", Dell part number T93GD (mpr driver). There is an external Dell LTO4 drive attached to the external HBA and is the only thing connected to it. r348368 boots normally, and the HBA and tape are recognized as: mpr0: port 0x8000-0x80ff mem 0xc9100000-0xc910ffff,0xc8000000-0xc80fffff irq 64 at device 0.0 numa-domain 1 on pci17 mpr0: Firmware: 16.00.04.00, Driver: 18.03.00.00-fbsd mpr0: IOCCapabilities: 7a85c mpr0: Found device ,End Device> <6.0Gbps> handle<0x0009> enclosureHandle<0x0001> slot 7 mpr0: At enclosure level 0 and connector name (1 ) sa0 at mpr0 bus 0 scbus14 target 7 lun 0 The next revision I tried was r350268. That boots most of the time, but sometimes hangs with various messages, not in any particular order, such as (forgive any typos, I could only get these as screen grabs): mpr_config_get_dpm_pg0: request for page completed with error 60 mpr0: Out of chain frames, consider increasing hw.mpr.max_chains (probe0:mpr0:0:7:0): Down reving Protocol Version from 4 to 0? mpr0: Calling Reinit from mpr_wait_command, timeout=60, elapsed=60) mpr0: Reinit success run_interrupt_driven_hooks: still waiting after 60 seconds for xpt_config This all happens whether or not the external tape drive is plugged into the system (unplugged at the system end, so no dangling cables). The problem goes away (with unacceptable loss of performance) if I boot in safe mode. Setting hw.mpr.disable_msi=1 and hw.mpr.disable_msix=1 has no effect. r350970 behaves in much the same way, working sometimes but needing safe mode to have a 100% successful chance of booting. r351637 seems to never boot unless I boot in safe mode, then works 100% of the time. Dell has replaced the controller and the problem persists. Since it still happens with the tape drive disconnected, I didn't have them replace the drive and cable. The one thing I noted when Dell had the chassis open was that the slot this card is in is labeled "CPU 2", which would seem to be confirmed by the "numa-domain 1" in the working dmesg output. Unfortunately, all of the low-profile slots in this chassis are on CPU 2, and the part number of my card (and the Dell spare) is a low-profile-only card. I had the tech put the card in one of the full-height CPU 1 slots (which involved removing the card bracket and installing it "naked", which he wasn't comfortable with). Lo and behold, it boots when the card is in numa-domain 0: mpr0: port 0x2000-0x20ff mem 0x93600000-0x9360ffff,0x92500000-0x925fffff irq 32 at device 0.0 numa-domain 0 on pci4 mpr0: Firmware: 16.00.04.00, Driver: 18.03.00.00-fbsd mpr0: IOCCapabilities: 7a85c mpr0: Found device ,End Device> <6.0Gbps> handle<0x0009> enclosureHandle<0x0001> slot 7 mpr0: At enclosure level 0 and connector name (1 ) sa0 at mpr0 bus 0 scbus2 target 7 lun 0 I was able to do 4 consecutive working boots before the tech got antsy and wanted to either put the card back in a low-profile slot or start the meter for billable time. Based on this, it seems to be a timing-related issue when the mpr card is on the 2nd CPU (and when SMP is enabled) Any suggestions for further diagnostic information, other things to try, or (preferably) "here. try this patch"? Terry Kennedy http://www.glaver.org New York, NY USA From owner-freebsd-stable@freebsd.org Sun Sep 1 05:02:00 2019 Return-Path: Delivered-To: freebsd-stable@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 303C2F504C for ; Sun, 1 Sep 2019 05:02:00 +0000 (UTC) (envelope-from TERRY@glaver.org) Received: from server.glaver.org (server.glaver.org [204.141.35.63]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 46Lh074FXYz4j0Q for ; Sun, 1 Sep 2019 05:01:59 +0000 (UTC) (envelope-from TERRY@glaver.org) Received: from glaver.org by glaver.org (PMDF V6.7-x04 #37010) id <01RAWIATI54G00008I@glaver.org> for freebsd-stable@freebsd.org; Sun, 01 Sep 2019 01:01:58 -0400 (EDT) Date: Sun, 01 Sep 2019 01:00:39 -0400 (EDT) From: Terry Kennedy Subject: Re: mpr causing a boot hang sometime after r348368 To: freebsd-stable@freebsd.org Message-id: <01RAWQBP9XHO00008I@glaver.org> MIME-version: 1.0 Content-type: TEXT/PLAIN; CHARSET=us-ascii X-Rspamd-Queue-Id: 46Lh074FXYz4j0Q X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of TERRY@glaver.org designates 204.141.35.63 as permitted sender) smtp.mailfrom=TERRY@glaver.org X-Spamd-Result: default: False [-2.30 / 15.00]; ARC_NA(0.00)[]; FAKE_REPLY(1.00)[]; NEURAL_HAM_MEDIUM(-0.99)[-0.995,0]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:204.141.35.63:c]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; TO_DN_NONE(0.00)[]; DMARC_NA(0.00)[glaver.org]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-1.00)[-0.999,0]; RCVD_TLS_LAST(0.00)[]; NEURAL_HAM_SHORT(-0.79)[-0.789,0]; IP_SCORE(-0.21)[asn: 22691(-1.01), country: US(-0.05)]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:22691, ipnet:204.141.35.0/24, country:US]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 01 Sep 2019 05:02:00 -0000 In case it wasn't clear from my original post, all of the successful boots with the card in a full-height CPU 1 slot were with r351637. Terry Kennedy http://www.glaver.org New York, NY USA From owner-freebsd-stable@freebsd.org Sun Sep 1 07:01:00 2019 Return-Path: Delivered-To: freebsd-stable@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 1BDE3D0995 for ; Sun, 1 Sep 2019 07:01:00 +0000 (UTC) (envelope-from darius@dons.net.au) Received: from ipmail02.adl2.internode.on.net (ipmail02.adl2.internode.on.net [150.101.137.139]) by mx1.freebsd.org (Postfix) with ESMTP id 46LkdP4Dqvz40xv for ; Sun, 1 Sep 2019 07:00:56 +0000 (UTC) (envelope-from darius@dons.net.au) Received: from ppp14-2-110-112.adl-apt-pir-bras32.tpg.internode.on.net (HELO midget.dons.net.au) ([14.2.110.112]) by ipmail02.adl2.internode.on.net with ESMTP; 01 Sep 2019 16:30:51 +0930 Received: from midget.dons.net.au (localhost [127.0.0.1]) by midget.dons.net.au (8.15.2/8.15.2) with ESMTPS id x8170bZD010756 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO) for ; Sun, 1 Sep 2019 16:30:46 +0930 (ACST) (envelope-from darius@dons.net.au) Received: (from mailnull@localhost) by midget.dons.net.au (8.15.2/8.15.2/Submit) id x816oivF003488 for ; Sun, 1 Sep 2019 16:20:44 +0930 (ACST) (envelope-from darius@dons.net.au) X-Authentication-Warning: midget.dons.net.au: mailnull set sender to using -f Received: from [10.0.2.38] ([10.0.2.38]) by ns.dons.net.au (envelope-sender ) (MIMEDefang) with ESMTP id x816ocZ6003482; Sun, 01 Sep 2019 16:20:44 +0930 Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\)) Subject: Re: FreeBSD 12 Xorg vs X11SSH-F / AST From: "O'Connor, Daniel" In-Reply-To: <2B354C0E-8F94-412B-B6B5-DCF681DAE5C8@dons.net.au> Date: Sun, 1 Sep 2019 16:20:38 +0930 Cc: freebsd-stable Content-Transfer-Encoding: quoted-printable Message-Id: References: <2EDB82D8-9EC5-4988-AD1C-21305E712E46@dons.net.au> <4dbdbf1e-b823-20e4-8516-55bb9fdfab88@nomadlogic.org> <7AC86383-2C8E-427D-88BD-48B91FE9ECBC@dons.net.au> <2EB91070-54F2-4046-BB5A-86FBE41FFBE1@dons.net.au> <2B354C0E-8F94-412B-B6B5-DCF681DAE5C8@dons.net.au> To: Pete Wright X-Mailer: Apple Mail (2.3445.104.11) X-Spam-Score: -1 () No, score=-1.0 required=5.0 tests=ALL_TRUSTED autolearn=unavailable autolearn_force=no version=3.4.1 X-Scanned-By: MIMEDefang 2.83 on 10.0.2.1 X-Rspamd-Queue-Id: 46LkdP4Dqvz40xv X-Spamd-Bar: ++++++ Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=none (mx1.freebsd.org: domain of darius@dons.net.au has no SPF policy when checking 150.101.137.139) smtp.mailfrom=darius@dons.net.au X-Spamd-Result: default: False [6.83 / 15.00]; ARC_NA(0.00)[]; FROM_HAS_DN(0.00)[]; MV_CASE(0.50)[]; NEURAL_SPAM_SHORT(0.94)[0.940,0]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-stable@freebsd.org]; HAS_XAW(0.00)[]; AUTH_NA(1.00)[]; DMARC_NA(0.00)[dons.net.au]; RCVD_COUNT_THREE(0.00)[4]; TO_MATCH_ENVRCPT_SOME(0.00)[]; TO_DN_ALL(0.00)[]; NEURAL_SPAM_MEDIUM(1.00)[1.000,0]; RCPT_COUNT_TWO(0.00)[2]; NEURAL_SPAM_LONG(1.00)[1.000,0]; R_SPF_NA(0.00)[]; RCVD_NO_TLS_LAST(0.10)[]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:4739, ipnet:150.101.0.0/16, country:AU]; MID_RHS_MATCH_FROM(0.00)[]; IP_SCORE(2.49)[ip: (7.92), ipnet: 150.101.0.0/16(3.06), asn: 4739(1.46), country: AU(0.01)]; RCVD_IN_DNSWL_LOW(-0.10)[139.137.101.150.list.dnswl.org : 127.0.5.1] X-Spam: Yes X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 01 Sep 2019 07:01:00 -0000 > On 27 Aug 2019, at 18:10, O'Connor, Daniel wrote: >=20 >> On 27 Aug 2019, at 13:45, O'Connor, Daniel = wrote: >>=20 >> Although I could set uncacheable (no difference). >>=20 >> Next stop will be obscure BIOS settings I suppose. >=20 > I couldn't find anything useful there. >=20 > I realised that my scfb failure was because I am booting BIOS rather = than UEFI but I will have to reinstall before I can fix that. I reinstalled with UEFI and scfb works now (not sure if it's any faster = yet). It didn't fix ast though. I rebuilt the AST driver with debugging and found it was stuck at.. 0x0000000801ae1d86 in ASTGetDRAMInfo (pScrn=3D0x801af7000) at = ast_vgatool.c:439 439 } while (*(volatile ULONG *) (pAST->MMIOVirtualAddr + = 0x10000) !=3D 0x01); (gdb) print/x *(volatile ULONG *) (pAST->MMIOVirtualAddr + 0x10000) $2 =3D 0xffffffff Reading around this area also reads 0xffffffff all the time. If I comment that out X runs but the AST driver then rejects every mode = line, eg [ 48784.246] (II) AST(0): Not using driver mode "1920x1080" (bad mode = clock/interlace/doublescan) I checked the code against what is working in FreeBSD 11 and it is = identical. That does use an older Xorg server though so I am not sure if = it is FreeBSD 12 (compiler or kernel or..) or an Xorg change that has = broken things. I modified the driver on the working system to dump the values that = ASTGetDRAMInfo extracts and hard coded them and it works(!) on the = FreeBSD 12 system. Obviously while this works for me it's not a long = term solution :) I added some debugging to the mapping process in ASTMapMMIO: [ 71021.555] (II) AST(0): pci_device_map_range Addr 0xdf000000 size = 0x20000, err 0 result 0x01b30000 But when I check ASTGetDRAMInfo().. (gdb) print/x pAST->MMIOVirtualAddr $2 =3D 0x801b30000 (gdb) print/x *(0x01b30000) Cannot access memory at address 0x1b30000 The mappings look to match dmesg: vgapci0: port 0xc000-0xc07f mem = 0xde000000-0xdeffffff,0xdf000000-0xdf01ffff irq 18 at device 0.0 on pci4 Curiously on the working machine with an identical motherboard it is at = a different location: vgapci0: port 0xd000-0xd07f mem = 0xf6000000-0xf6ffffff,0xf7000000-0xf701ffff irq 16 at device 0.0 on pci4 Any suggestions welcome :) -- Daniel O'Connor "The nice thing about standards is that there are so many of them to choose from." -- Andrew Tanenbaum From owner-freebsd-stable@freebsd.org Mon Sep 2 07:31:09 2019 Return-Path: Delivered-To: freebsd-stable@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 435BED4165 for ; Mon, 2 Sep 2019 07:31:09 +0000 (UTC) (envelope-from darius@dons.net.au) Received: from ipmail03.adl2.internode.on.net (ipmail03.adl2.internode.on.net [150.101.137.141]) by mx1.freebsd.org (Postfix) with ESMTP id 46MMFl0Vfjz4MWv for ; Mon, 2 Sep 2019 07:31:06 +0000 (UTC) (envelope-from darius@dons.net.au) Received: from ppp14-2-110-112.adl-apt-pir-bras32.tpg.internode.on.net (HELO midget.dons.net.au) ([14.2.110.112]) by ipmail03.adl2.internode.on.net with ESMTP; 02 Sep 2019 17:00:48 +0930 Received: from midget.dons.net.au (localhost [127.0.0.1]) by midget.dons.net.au (8.15.2/8.15.2) with ESMTPS id x827Uav7076876 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO) for ; Mon, 2 Sep 2019 17:00:37 +0930 (ACST) (envelope-from darius@dons.net.au) Received: (from mailnull@localhost) by midget.dons.net.au (8.15.2/8.15.2/Submit) id x8273rcc055329 for ; Mon, 2 Sep 2019 16:33:53 +0930 (ACST) (envelope-from darius@dons.net.au) X-Authentication-Warning: midget.dons.net.au: mailnull set sender to using -f Received: from [203.31.81.177] ([203.31.81.177]) by ppp14-2-110-112.adl-apt-pir-bras32.tpg.internode.on.net (envelope-sender ) (MIMEDefang) with ESMTP id x8273mf8055323; Mon, 02 Sep 2019 16:33:53 +0930 Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\)) Subject: Re: FreeBSD 12 Xorg vs X11SSH-F / AST From: "O'Connor, Daniel" In-Reply-To: Date: Mon, 2 Sep 2019 16:33:48 +0930 Cc: freebsd-stable Content-Transfer-Encoding: quoted-printable Message-Id: References: <2EDB82D8-9EC5-4988-AD1C-21305E712E46@dons.net.au> <4dbdbf1e-b823-20e4-8516-55bb9fdfab88@nomadlogic.org> <7AC86383-2C8E-427D-88BD-48B91FE9ECBC@dons.net.au> <2EB91070-54F2-4046-BB5A-86FBE41FFBE1@dons.net.au> <2B354C0E-8F94-412B-B6B5-DCF681DAE5C8@dons.net.au> To: Pete Wright X-Mailer: Apple Mail (2.3445.104.11) X-Spam-Score: 1.5 (*) No, score=1.5 required=5.0 tests=HELO_MISC_IP, RDNS_NONE, SPF_NONE autolearn=no autolearn_force=no version=3.4.1 X-Scanned-By: MIMEDefang 2.83 on 10.0.2.1 X-Rspamd-Queue-Id: 46MMFl0Vfjz4MWv X-Spamd-Bar: +++++ Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=none (mx1.freebsd.org: domain of darius@dons.net.au has no SPF policy when checking 150.101.137.141) smtp.mailfrom=darius@dons.net.au X-Spamd-Result: default: False [5.24 / 15.00]; ARC_NA(0.00)[]; FROM_HAS_DN(0.00)[]; MV_CASE(0.50)[]; NEURAL_SPAM_SHORT(0.83)[0.831,0]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-stable@freebsd.org]; HAS_XAW(0.00)[]; AUTH_NA(1.00)[]; DMARC_NA(0.00)[dons.net.au]; RCVD_COUNT_THREE(0.00)[4]; TO_MATCH_ENVRCPT_SOME(0.00)[]; TO_DN_ALL(0.00)[]; NEURAL_SPAM_MEDIUM(1.00)[0.998,0]; RCPT_COUNT_TWO(0.00)[2]; RCVD_IN_DNSWL_NONE(0.00)[141.137.101.150.list.dnswl.org : 127.0.5.0]; NEURAL_SPAM_LONG(1.00)[0.998,0]; R_SPF_NA(0.00)[]; RCVD_NO_TLS_LAST(0.10)[]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:4739, ipnet:150.101.0.0/16, country:AU]; MID_RHS_MATCH_FROM(0.00)[]; IP_SCORE(0.91)[ip: (0.03), ipnet: 150.101.0.0/16(3.05), asn: 4739(1.48), country: AU(0.01)]; RWL_MAILSPIKE_POSSIBLE(0.00)[141.137.101.150.rep.mailspike.net : 127.0.0.17] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 02 Sep 2019 07:31:09 -0000 > On 1 Sep 2019, at 16:20, O'Connor, Daniel wrote: > I modified the driver on the working system to dump the values that = ASTGetDRAMInfo extracts and hard coded them and it works(!) on the = FreeBSD 12 system. Obviously while this works for me it's not a long = term solution :) Also it turns out the performance still sucks, ie no better than VESA. I tried scfb but a) defaults to 1024x768 and b) it wasn't much faster = (if any). So, if anyone has any other ideas I'm all ears :( -- Daniel O'Connor "The nice thing about standards is that there are so many of them to choose from." -- Andrew Tanenbaum From owner-freebsd-stable@freebsd.org Tue Sep 3 06:01:30 2019 Return-Path: Delivered-To: freebsd-stable@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 9F943CC194 for ; Tue, 3 Sep 2019 06:01:30 +0000 (UTC) (envelope-from darius@dons.net.au) Received: from ipmail07.adl2.internode.on.net (ipmail07.adl2.internode.on.net [150.101.137.131]) by mx1.freebsd.org (Postfix) with ESMTP id 46MxCr6QQXz3MTL for ; Tue, 3 Sep 2019 06:01:27 +0000 (UTC) (envelope-from darius@dons.net.au) Received: from ppp14-2-110-112.adl-apt-pir-bras32.tpg.internode.on.net (HELO midget.dons.net.au) ([14.2.110.112]) by ipmail07.adl2.internode.on.net with ESMTP; 03 Sep 2019 15:30:47 +0930 Received: from midget.dons.net.au (localhost [127.0.0.1]) by midget.dons.net.au (8.15.2/8.15.2) with ESMTPS id x8360a3k050233 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO) for ; Tue, 3 Sep 2019 15:30:41 +0930 (ACST) (envelope-from darius@dons.net.au) Received: (from mailnull@localhost) by midget.dons.net.au (8.15.2/8.15.2/Submit) id x835tLts045151 for ; Tue, 3 Sep 2019 15:25:21 +0930 (ACST) (envelope-from darius@dons.net.au) X-Authentication-Warning: midget.dons.net.au: mailnull set sender to using -f Received: from [203.31.81.177] ([203.31.81.177]) by ppp14-2-110-112.adl-apt-pir-bras32.tpg.internode.on.net (envelope-sender ) (MIMEDefang) with ESMTP id x835tGbw044714; Tue, 03 Sep 2019 15:25:21 +0930 Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\)) Subject: Re: FreeBSD 12 Xorg vs X11SSH-F / AST From: "O'Connor, Daniel" In-Reply-To: Date: Tue, 3 Sep 2019 15:25:15 +0930 Cc: freebsd-stable Content-Transfer-Encoding: quoted-printable Message-Id: References: <2EDB82D8-9EC5-4988-AD1C-21305E712E46@dons.net.au> <4dbdbf1e-b823-20e4-8516-55bb9fdfab88@nomadlogic.org> <7AC86383-2C8E-427D-88BD-48B91FE9ECBC@dons.net.au> <2EB91070-54F2-4046-BB5A-86FBE41FFBE1@dons.net.au> <2B354C0E-8F94-412B-B6B5-DCF681DAE5C8@dons.net.au> To: Pete Wright X-Mailer: Apple Mail (2.3445.104.11) X-Spam-Score: 1.5 (*) No, score=1.5 required=5.0 tests=HELO_MISC_IP, RDNS_NONE, SPF_NONE autolearn=no autolearn_force=no version=3.4.1 X-Scanned-By: MIMEDefang 2.83 on 10.0.2.1 X-Rspamd-Queue-Id: 46MxCr6QQXz3MTL X-Spamd-Bar: ++++++ Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=none (mx1.freebsd.org: domain of darius@dons.net.au has no SPF policy when checking 150.101.137.131) smtp.mailfrom=darius@dons.net.au X-Spamd-Result: default: False [6.47 / 15.00]; ARC_NA(0.00)[]; FROM_HAS_DN(0.00)[]; MV_CASE(0.50)[]; NEURAL_SPAM_SHORT(0.94)[0.936,0]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-stable@freebsd.org]; HAS_XAW(0.00)[]; AUTH_NA(1.00)[]; DMARC_NA(0.00)[dons.net.au]; RCVD_COUNT_THREE(0.00)[4]; TO_MATCH_ENVRCPT_SOME(0.00)[]; TO_DN_ALL(0.00)[]; NEURAL_SPAM_MEDIUM(1.00)[1.000,0]; RCPT_COUNT_TWO(0.00)[2]; RCVD_IN_DNSWL_NONE(0.00)[131.137.101.150.list.dnswl.org : 127.0.5.0]; NEURAL_SPAM_LONG(1.00)[1.000,0]; R_SPF_NA(0.00)[]; RCVD_NO_TLS_LAST(0.10)[]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:4739, ipnet:150.101.0.0/16, country:AU]; MID_RHS_MATCH_FROM(0.00)[]; IP_SCORE(2.03)[ip: (5.61), ipnet: 150.101.0.0/16(3.05), asn: 4739(1.47), country: AU(0.01)] X-Spam: Yes X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 03 Sep 2019 06:01:30 -0000 > On 2 Sep 2019, at 16:33, O'Connor, Daniel wrote: >=20 >=20 >=20 >> On 1 Sep 2019, at 16:20, O'Connor, Daniel wrote: >> I modified the driver on the working system to dump the values that = ASTGetDRAMInfo extracts and hard coded them and it works(!) on the = FreeBSD 12 system. Obviously while this works for me it's not a long = term solution :) >=20 > Also it turns out the performance still sucks, ie no better than VESA. > I tried scfb but a) defaults to 1024x768 and b) it wasn't much faster = (if any). >=20 > So, if anyone has any other ideas I'm all ears :( I've filed a PR against the port (240294) although I suspect it's more = likely to be a kernel issue. -- Daniel O'Connor "The nice thing about standards is that there are so many of them to choose from." -- Andrew Tanenbaum From owner-freebsd-stable@freebsd.org Tue Sep 3 16:31:10 2019 Return-Path: Delivered-To: freebsd-stable@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 9DB33E2C7D for ; Tue, 3 Sep 2019 16:31:10 +0000 (UTC) (envelope-from pete@nomadlogic.org) Received: from mail.nomadlogic.org (mail.nomadlogic.org [174.136.98.114]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mail.nomadlogic.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46NCBP3Nrdz3M1G for ; Tue, 3 Sep 2019 16:31:08 +0000 (UTC) (envelope-from pete@nomadlogic.org) Received: from [192.168.1.206] (cpe-23-243-162-239.socal.res.rr.com [23.243.162.239]) by mail.nomadlogic.org (OpenSMTPD) with ESMTPSA id 14a8a67d TLS version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO; Tue, 3 Sep 2019 16:24:27 +0000 (UTC) Subject: Re: FreeBSD 12 Xorg vs X11SSH-F / AST To: "O'Connor, Daniel" Cc: freebsd-stable References: <2EDB82D8-9EC5-4988-AD1C-21305E712E46@dons.net.au> <4dbdbf1e-b823-20e4-8516-55bb9fdfab88@nomadlogic.org> <7AC86383-2C8E-427D-88BD-48B91FE9ECBC@dons.net.au> <2EB91070-54F2-4046-BB5A-86FBE41FFBE1@dons.net.au> <2B354C0E-8F94-412B-B6B5-DCF681DAE5C8@dons.net.au> From: Pete Wright Message-ID: <34c7bdfa-cd9b-935f-625c-169ab641ce94@nomadlogic.org> Date: Tue, 3 Sep 2019 09:24:26 -0700 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:68.0) Gecko/20100101 Thunderbird/68.1.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit Content-Language: en-US X-Rspamd-Queue-Id: 46NCBP3Nrdz3M1G X-Spamd-Bar: ----- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of pete@nomadlogic.org designates 174.136.98.114 as permitted sender) smtp.mailfrom=pete@nomadlogic.org X-Spamd-Result: default: False [-5.83 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; RECEIVED_SPAMHAUS_PBL(0.00)[239.162.243.23.khpj7ygk5idzvmvt5x4ziurxhy.zen.dq.spamhaus.net : 127.0.0.10]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+mx]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[nomadlogic.org]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; TO_MATCH_ENVRCPT_SOME(0.00)[]; TO_DN_ALL(0.00)[]; NEURAL_HAM_SHORT(-0.98)[-0.984,0]; RCPT_COUNT_TWO(0.00)[2]; IP_SCORE(-2.55)[ip: (-9.33), ipnet: 174.136.96.0/20(-3.08), asn: 25795(-0.27), country: US(-0.05)]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:25795, ipnet:174.136.96.0/20, country:US]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_TLS_ALL(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 03 Sep 2019 16:31:10 -0000 On 9/2/19 10:55 PM, O'Connor, Daniel wrote: > >> On 2 Sep 2019, at 16:33, O'Connor, Daniel wrote: >> >> >> >>> On 1 Sep 2019, at 16:20, O'Connor, Daniel wrote: >>> I modified the driver on the working system to dump the values that ASTGetDRAMInfo extracts and hard coded them and it works(!) on the FreeBSD 12 system. Obviously while this works for me it's not a long term solution :) >> Also it turns out the performance still sucks, ie no better than VESA. >> I tried scfb but a) defaults to 1024x768 and b) it wasn't much faster (if any). >> >> So, if anyone has any other ideas I'm all ears :( > I've filed a PR against the port (240294) although I suspect it's more likely to be a kernel issue. thanks, i think opening a bug report is probably the best way to go at this point.  there def seems to be something odd going on that's above my pay grade.  i'm going to bump the graphics team with this too to see if anyone has an idea. cheers, -pete -- Pete Wright pete@nomadlogic.org @nomadlogicLA From owner-freebsd-stable@freebsd.org Thu Sep 5 17:41:20 2019 Return-Path: Delivered-To: freebsd-stable@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id A6A73EE50F for ; Thu, 5 Sep 2019 17:41:20 +0000 (UTC) (envelope-from scaner@lavtech.ru) Received: from mail.lavtech.ru (mail3.mnogo.ru [212.158.160.79]) by mx1.freebsd.org (Postfix) with ESMTP id 46PSfQ3r0rz48h2 for ; Thu, 5 Sep 2019 17:41:17 +0000 (UTC) (envelope-from scaner@lavtech.ru) Received: from lavtech.ru (unknown [37.120.140.217]) by mail.lavtech.ru (Postfix) with ESMTPSA id 126B219E622C for ; Thu, 5 Sep 2019 20:24:09 +0300 (MSK) Reply-To: info@freebsd.org From: Admin Center To: freebsd-stable@freebsd.org Subject: Notice: New Inbox messages returned- failure to sync Date: 05 Sep 2019 10:24:02 -0700 Message-ID: <20190905102402.7773D810C4CC3D6D@lavtech.ru> X-Rspamd-Queue-Id: 46PSfQ3r0rz48h2 X-Spamd-Bar: ++++++++++ Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of scaner@lavtech.ru designates 212.158.160.79 as permitted sender) smtp.mailfrom=scaner@lavtech.ru X-Spamd-Result: default: False [10.63 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; HAS_REPLYTO(0.00)[info@freebsd.org]; R_SPF_ALLOW(0.00)[+ip4:212.158.160.79/32]; TO_DN_NONE(0.00)[]; HAS_WP_URI(0.00)[]; PH_SURBL_MULTI(5.50)[millermedtech.com.multi.surbl.org]; RCVD_NO_TLS_LAST(0.10)[]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:~,2:~]; R_DKIM_NA(0.00)[]; ASN(0.00)[asn:197695, ipnet:212.158.160.0/23, country:RU]; MID_RHS_MATCH_FROM(0.00)[]; ARC_NA(0.00)[]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_SPAM_SHORT(0.97)[0.968,0]; MIME_GOOD(-0.10)[multipart/related]; REPLYTO_DOM_NEQ_FROM_DOM(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-stable@freebsd.org]; NEURAL_SPAM_MEDIUM(1.00)[0.997,0]; RCPT_COUNT_ONE(0.00)[1]; BAD_REP_POLICIES(0.10)[]; MANY_INVISIBLE_PARTS(0.10)[2]; DMARC_NA(0.00)[lavtech.ru]; NEURAL_SPAM_LONG(1.00)[1.000,0]; RCVD_IN_DNSWL_NONE(0.00)[79.160.158.212.list.dnswl.org : 127.0.10.0]; MIME_HTML_ONLY(0.20)[]; IP_SCORE(0.76)[asn: 197695(3.80), country: RU(0.01)]; R_NO_SPACE_IN_FROM(1.00)[]; RCVD_COUNT_TWO(0.00)[2]; GREYLIST(0.00)[pass,body] X-Spam: Yes MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 05 Sep 2019 17:41:20 -0000 From owner-freebsd-stable@freebsd.org Thu Sep 5 18:08:42 2019 Return-Path: Delivered-To: freebsd-stable@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id EDAF8EF42E for ; Thu, 5 Sep 2019 18:08:42 +0000 (UTC) (envelope-from nvass@gmx.com) Received: from mout.gmx.net (mout.gmx.net [212.227.17.21]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "mout.gmx.net", Issuer "TeleSec ServerPass Class 2 CA" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46PTG12KFnz4Bmp for ; Thu, 5 Sep 2019 18:08:37 +0000 (UTC) (envelope-from nvass@gmx.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net; s=badeba3b8450; t=1567706906; bh=ScZxIOodl+8gUKoNKilYm1mkhwJrLQNIJRWruitpLg0=; h=X-UI-Sender-Class:From:To:Subject:Date; b=kJGH9q7VoPbDPkC7nZQXkuwJOgPFvgD/FWkhYEuGS8cjr/RWohwcvr3CD1Vm7YcQh bm3tw7Sx8Ci1WhEiYY7T3gtCRJpL840ZDdX3uf/5DFnEktNVVr6fBngqZ8ZvHeR669 RyoGXvQkEMEf5jQn9bZc3QR5LPQTdYETCr3BtSvw= X-UI-Sender-Class: 01bb95c1-4bf8-414a-932a-4f6e2808ef9c Received: from moby.local ([176.92.73.126]) by mail.gmx.com (mrgmx102 [212.227.17.174]) with ESMTPSA (Nemesis) id 0M0bo2-1iRRRS1RtO-00uuUu for ; Thu, 05 Sep 2019 19:55:32 +0200 From: Nikos Vassiliadis To: freeBSd-stable@freebsd.org Subject: devd rule wierd output Message-ID: <2c82b556-59e8-cee1-19ab-7b16666ee58a@gmx.com> Date: Thu, 5 Sep 2019 20:55:23 +0300 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Provags-ID: V03:K1:HSBLWfofzrEZz0Qx/sgp1JmSRC7zPqrO2x+xa1dyKTV30ZmUHC6 yyUbw7xSi/eUvw2jJdipp9KIHTHm2uJZEsAHxyBxRrP8zJiTzQybgu911a/UXhewGwlfzZL OZgNcLXrcGHr6fEsD9S3bcXPCmCcYDGYn5Bkkhoxt1szoQMF3/pVkhzpfKcrpb08cF66/o0 je4TWB6zKfSftLnipDjlQ== X-Spam-Flag: NO X-UI-Out-Filterresults: notjunk:1;V03:K0:m3H/IKdAnyI=:bpte4F3CWpe5nHFX30twpZ WKze85PYlUq6oEpF51inGFbIzWOiPT7YPzS8yuXRTCn3NW5zebMPQE6sZVzzYKT+kdqEZpMbX sJScVTG6BqvcJ14D66cynbaY3MT4iy7phfUoMxOk9WJR0JmDCB2l94cjHwbjH2J18RZOIIV2w mFTLnDUj4eA3nH4CUvQe6jXT/Y6ObJ1yx5id5+hWeFKf6Na1uejHXACVZzimnYeoBqIZGZMzA 2NLn/MUqY3ckMmqvQ7tIHUMcyl1loOuATmJFLG8gs5j378ddJdChgkpBxlg+nFWzXlVQc9+h+ eYJayrrjjj5JccSmwkqHirA2qGVWEGgnIok2yqY0Gc23aA5i1r70FB1OFXs4i2TBkQTaXbI/O K9HVEMfnQyY3FdWx9nH8UYJSsPUAr+QcZZoaAjj7dqbBHzjwUli2tvvZX06IVrGCsOEAfpocr mwC0H/lNOpzyOm0+1mtA5i2OWlU7/UJgAKq7tfs+gsZzBnD/PfFOodTCoDOyI9O68IH7/C4Tz JyrLwC9DRME5x2bEt+rSl77hoYzY5NC7e+EGfNBjwipV3PzSSig/1Nb+I1ccGv63KwT0OgRwA TMiLnqacsjuDJkPNlnu07bSdGRfVZgXteju+uUB5o5fEwgOlZr7sL5VU53j3riYEybHBgvM7L FBBwrywpOz+UW6oAOasEmxPXRCsz67TeUnai9nPCkdPoyNDm1hYFlV0C976CUPV+aU7ICEMK6 OpK+thzzkLz6jXh257utjkW7y6r5bvYNYl8m4ExwLMupws0tL4pRcHP7BMAqhMvF+sdrhPvvo sLJW3bK5ooycCWAGSA3GNGxwD1GFiifUqmV9Zvh7ofAjrvgTyR+5lEv2xIi/6TDB+AmT9LsS2 AB/F43fK5GkV2yr8e40cb7mVBbiVInAbasIpqmJI+EmqgYZDbeWrciNz89xB43vvLgG1yTIDS 2lz5FE/nO7xtXZfTzxEXYRyZDk7GIenxvn7rGODOxtPYEkSzdJtLxSrZj09w3inBA3+6JmWfy 6P85VTkVHTuIAqkX2dAtvhPctsqRIZbHpXzmwAYkPXhtJM94JwGhu0bKoJRmR55D4Ltqs1IU8 mSxvLRmgDFDSHvpMZnCf0Pi1/6jBn7lGHrxoZzWT5sTRg/H1N7eXQGyOPHgGy4kON0YusGkYF LROOIrFPR4FRbswmHmsVVO3uoM08bmZ0klri+NhAnqSVqumS1ZOcjTlME5lhhAuVS2Ry4= X-Rspamd-Queue-Id: 46PTG12KFnz4Bmp X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmx.net header.s=badeba3b8450 header.b=kJGH9q7V; dmarc=none; spf=pass (mx1.freebsd.org: domain of nvass@gmx.com designates 212.227.17.21 as permitted sender) smtp.mailfrom=nvass@gmx.com X-Spamd-Result: default: False [-3.58 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:212.227.17.0/27]; FREEMAIL_FROM(0.00)[gmx.com]; TO_DN_NONE(0.00)[]; DKIM_TRACE(0.00)[gmx.net:+]; NEURAL_HAM_SHORT(-0.98)[-0.978,0]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; IP_SCORE(0.00)[ip: (-7.17), ipnet: 212.227.0.0/16(-1.38), asn: 8560(2.17), country: DE(-0.01)]; RCVD_IN_DNSWL_LOW(-0.10)[21.17.227.212.list.dnswl.org : 127.0.3.1]; ASN(0.00)[asn:8560, ipnet:212.227.0.0/16, country:DE]; MID_RHS_MATCH_FROM(0.00)[]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[gmx.net:s=badeba3b8450]; FROM_HAS_DN(0.00)[]; FREEMAIL_ENVFROM(0.00)[gmx.com]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-stable@freebsd.org]; DMARC_NA(0.00)[gmx.com]; IP_SCORE_FREEMAIL(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 05 Sep 2019 18:08:43 -0000 Hi, I have this in my devd rules: > notify 10 { > match "system" "ZFS"; > match "type" "misc.fs.zfs.scrub_start"; > action "touch /var/run/scrub_$pool_name; logger -t ZFS 'zpool $pool_name started scrubbing'"; > }; While this is working OK on FreeBSD-10, on FreeBSD-12 I noticed that $pool_name is different. FreeBSD-10: Sep 5 20:35:56 clio ZFS: zpool clio started scrubbing FreeBSD-12: Sep 5 20:47:35 aurora ZFS[1302]: zpool $aurora-os started scrubbing While it assigns the value, it weirdly includes a dollar sign at the front. Thoughts? Should I open a PR? Nikos From owner-freebsd-stable@freebsd.org Thu Sep 5 18:26:08 2019 Return-Path: Delivered-To: freebsd-stable@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 7AF72EFBE8 for ; Thu, 5 Sep 2019 18:26:08 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: from mail-qk1-x733.google.com (mail-qk1-x733.google.com [IPv6:2607:f8b0:4864:20::733]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46PTf73jYmz4Crh for ; Thu, 5 Sep 2019 18:26:07 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: by mail-qk1-x733.google.com with SMTP id f10so3084535qkg.7 for ; Thu, 05 Sep 2019 11:26:07 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bsdimp-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=WuwBvSCbq7XNjYPa9aRahDcnlXfZRjq1lqFA+f0jAB8=; b=XetTcqYkTSdRhHRts5owiXmGaBEOzHV/KhUycDSfLWHpaNrFtVIz1Ts9W21/9ubaS9 uxrokOK58FnbKkq4Wa/T4jRKBagCwPFIzoi1Gr/SmNqRuwFckCyiFPTjNrE5YTV07DZE TO8Vw3VU2Zl7h8PveU7fXfUtYULpxwakgNOCQmPcRf7xwf55Bh+gHgNWCpdvmierUtbF QZDUJaGP0CSjmHaT1NoZfDW1V0HYtk4xu3uLYZgNJiEESWdPTHkIBJG2YL9nvNQrgLsF +pmTBNAAUH6MJOtdzxkFvmqsgRTd2KX98xMcJUSe8glXl/F5GaZpaviO1OUbGxbEWZHg fStw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=WuwBvSCbq7XNjYPa9aRahDcnlXfZRjq1lqFA+f0jAB8=; b=paf4nVe0TMrT3M68E1QbYK2p7c8J1YmWnMW83z9ska3shX9U1vVA5wz4EL+AfnWBOb qmOhecyMkB3QQ3oC7GrU6DKrCkFGWogAk6QvF4s8atZfTFKkDbyJSrflGxdgL/tpqoen l+pPs90OOU75JpUqD/ejh+xwzqwMNj5P9Pk/nPS9ky6rmrsN6UIX8yPTK2QbS8D+GLPU tmFjfCA7Z1fxCwqDwJ9DlQdUTU9njVprooZjn+sRbIINR5mjSM62k3YYJDaOQ+DdT4UC sHxwdx2jtayV6he4lKvVQB0W9Qen+ZXn9Vi9VeWW4pDGmyE0yiuv+UPCUle159rwxec/ zIqA== X-Gm-Message-State: APjAAAWgSSRT5pyLxaivpKzjPEJ3HDlDvZFHHWtf6Sl0/dhcuqsHcHXh 9f0rXqbUpwVbgNZG6Pezq6d+0CfAl5K7tFAVVPO1ZQ== X-Google-Smtp-Source: APXvYqwW3HNrPJDBRxMDx9janaV6JXIdzojBEPD605Kj4TMpZL+J2fSyugJL5N7BuuIwtHaA0BFFhnJZ/IV8LEXmPw8= X-Received: by 2002:a37:30f:: with SMTP id 15mr4063076qkd.240.1567707965834; Thu, 05 Sep 2019 11:26:05 -0700 (PDT) MIME-Version: 1.0 References: <2c82b556-59e8-cee1-19ab-7b16666ee58a@gmx.com> In-Reply-To: <2c82b556-59e8-cee1-19ab-7b16666ee58a@gmx.com> From: Warner Losh Date: Thu, 5 Sep 2019 12:25:54 -0600 Message-ID: Subject: Re: devd rule wierd output To: Nikos Vassiliadis Cc: FreeBSD-STABLE Mailing List X-Rspamd-Queue-Id: 46PTf73jYmz4Crh X-Spamd-Bar: ----- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=bsdimp-com.20150623.gappssmtp.com header.s=20150623 header.b=XetTcqYk; dmarc=none; spf=none (mx1.freebsd.org: domain of wlosh@bsdimp.com has no SPF policy when checking 2607:f8b0:4864:20::733) smtp.mailfrom=wlosh@bsdimp.com X-Spamd-Result: default: False [-5.88 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[bsdimp-com.20150623.gappssmtp.com:s=20150623]; FROM_HAS_DN(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-stable@freebsd.org]; DMARC_NA(0.00)[bsdimp.com]; TO_MATCH_ENVRCPT_SOME(0.00)[]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[bsdimp-com.20150623.gappssmtp.com:+]; RCPT_COUNT_TWO(0.00)[2]; RCVD_IN_DNSWL_NONE(0.00)[3.3.7.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; NEURAL_HAM_SHORT(-1.00)[-0.997,0]; R_SPF_NA(0.00)[]; FORGED_SENDER(0.30)[imp@bsdimp.com,wlosh@bsdimp.com]; FREEMAIL_TO(0.00)[gmx.com]; MIME_TRACE(0.00)[0:+,1:+,2:~]; IP_SCORE(-2.88)[ip: (-9.32), ipnet: 2607:f8b0::/32(-2.76), asn: 15169(-2.27), country: US(-0.05)]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; FROM_NEQ_ENVFROM(0.00)[imp@bsdimp.com,wlosh@bsdimp.com]; RCVD_TLS_ALL(0.00)[]; RCVD_COUNT_TWO(0.00)[2] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 05 Sep 2019 18:26:08 -0000 On Thu, Sep 5, 2019 at 12:08 PM Nikos Vassiliadis wrote: > Hi, > > I have this in my devd rules: > > notify 10 { > > match "system" "ZFS"; > > match "type" "misc.fs.zfs.scrub_start"; > > action "touch /var/run/scrub_$pool_name; logger -t ZFS 'zpool > $pool_name started scrubbing'"; > > }; > > While this is working OK on FreeBSD-10, on FreeBSD-12 I noticed that > $pool_name is different. FreeBSD-10: > Sep 5 20:35:56 clio ZFS: zpool clio started scrubbing > FreeBSD-12: > Sep 5 20:47:35 aurora ZFS[1302]: zpool $aurora-os started scrubbing > > While it assigns the value, it weirdly includes a dollar sign > at the front. > > Thoughts? > Should I open a PR? > Please file a PR. Ideally, if you could connect to /var/run/devd.pipe before starting the scrub and including the output on 10 and 12, that would be great. Warner From owner-freebsd-stable@freebsd.org Fri Sep 6 00:47:45 2019 Return-Path: Delivered-To: freebsd-stable@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 41D45DA078; Fri, 6 Sep 2019 00:47:45 +0000 (UTC) (envelope-from lwhsu@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [96.47.72.132]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "freefall.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46Pf6T0wKQz4cTp; Fri, 6 Sep 2019 00:47:45 +0000 (UTC) (envelope-from lwhsu@freebsd.org) Received: by freefall.freebsd.org (Postfix, from userid 1129) id F37609F99; Fri, 6 Sep 2019 00:47:44 +0000 (UTC) Date: Fri, 6 Sep 2019 00:47:44 +0000 From: Li-Wen Hsu To: freebsd-testing@freebsd.org Cc: freebsd-current@freebsd.org, freebsd-stable@freebsd.org Subject: FreeBSD CI Weekly Report 2019-09-01 Message-ID: <20190906004744.GA67907@freefall.freebsd.org> Reply-To: freebsd-testing@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.11.4 (2019-03-13) X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 06 Sep 2019 00:47:45 -0000 (Please send the followup to freebsd-testing@ and note Reply-To is set.) FreeBSD CI Weekly Report 2019-09-01 =================================== Here is a summary of the FreeBSD Continuous Integration results for the period from 2019-08-26 to 2019-09-01. During this period, we have: * 1625 builds (97.4% (+14.4) passed, 2.6% (-14.4) failed) were executed on aarch64, amd64, armv6, armv7, i386, mips, mips64, powerpc, powerpc64, powerpcspe, riscv64, sparc64 architectures for head, stable/12, stable/11 branches. * 276 test runs (59.8% (+14.6) passed, 40.2% (-8.6) unstable, 0% (-6) exception) were executed on amd64, i386, riscv64 architectures for head, stable/12, stable/11 branches. * 51 doc builds (98.0% (-2) passed, 2% (+2) failed) Test case status (on 2019-09-01 23:59): | Branch/Architecture | Total | Pass | Fail | Skipped | | ------------------- | ---------- | ---------- | ------- | ------- | | head/amd64 | 7550 (+17) | 7484 (+21) | 1 (+1) | 65 (-5) | | head/i386 | 7548 (+17) | 7477 (+22) | 2 (+2) | 69 (-5) | | 12-STABLE/amd64 | 7392 (0) | 7348 (+3) | 0 (0) | 44 (-3) | | 12-STABLE/i386 | 7390 (0) | 7339 (+3) | 0 (0) | 51 (-3) | | 11-STABLE/amd64 | 6845 (0) | 6798 (-3) | 0 (0) | 47 (+3) | | 11-STABLE/i386 | 6843 (0) | 6760 (-3) | 34 (0) | 49 (+3) | (The statistics from experimental jobs are omitted) If any of the issues found by CI are in your area of interest or expertise please investigate the PRs listed below. The latest web version of this report is available at https://hackmd.io/@FreeBSD-CI/report-20190901 and archive is available at http://hackfoldr.org/freebsd-ci-report/, any help is welcome. ## News * Faliure notification has been turned on for https://ci.freebsd.org/job/FreeBSD-head-amd64-gcc/ * [FCP 20190401-ci_policy: CI policy](https://github.com/freebsd/fcp/blob/master/fcp-20190401-ci_policy.md) is in "feedback" state, please check and provide comments on -fcp@ and -hackers@ mailing lists. ## Fixed Tests * https://ci.freebsd.org/job/FreeBSD-head-amd64-test/ * sys.kern.pdeathsig.signal_delivered_ptrace * Reported in https://bugs.freebsd.org/237657 * Fixed in https://svnweb.freebsd.org/changeset/base/351210 * https://ci.freebsd.org/job/FreeBSD-head-amd64-test_zfs/ * sys.cddl.zfs.tests.atime.atime_test.atime_001_pos * Reported in https://bugs.freebsd.org/240221 * Fixed in https://svnweb.freebsd.org/changeset/base/351642 ## Failing Tests * https://ci.freebsd.org/job/FreeBSD-head-amd64-test/ * (flaky) sys.sys.qmath_test.qdivq_s64q * https://bugs.freebsd.org/240219 * Disabled in https://svnweb.freebsd.org/changeset/base/351739 * https://ci.freebsd.org/job/FreeBSD-stable-11-i386-test/ * local.kyua.* (31 cases) * local.lutok.* (3 cases) ## Failing and Flaky Tests (from experimental jobs) * https://ci.freebsd.org/job/FreeBSD-head-amd64-dtrace_test/ * cddl.usr.sbin.dtrace.common.misc.t_dtrace_contrib.tst_dynopt_d * https://bugs.freebsd.org/237641 * cddl.usr.sbin.dtrace.amd64.arrays.t_dtrace_contrib.tst_uregsarray_d * https://bugs.freebsd.org/240358 * https://ci.freebsd.org/job/FreeBSD-head-amd64-test_zfs/ * There are ~60 failing cases, including flakey ones, see https://ci.freebsd.org/job/FreeBSD-head-amd64-test_zfs/lastCompletedBuild/testReport/ for more details ## Disabled Tests * lib.libc.sys.mmap_test.mmap_truncate_signal https://bugs.freebsd.org/211924 * sys.fs.tmpfs.mount_test.large https://bugs.freebsd.org/212862 * sys.fs.tmpfs.link_test.kqueue https://bugs.freebsd.org/213662 * sys.kqueue.libkqueue.kqueue_test.main https://bugs.freebsd.org/233586 * sys.kern.ptrace_test.ptrace__PT_KILL_competing_stop https://bugs.freebsd.org/220841 * lib.libc.regex.exhaust_test.regcomp_too_big (i386 only) https://bugs.freebsd.org/237450 * sys.netinet.socket_afinet.socket_afinet_bind_zero (new) https://bugs.freebsd.org/238781 * sys.netpfil.pf.names.names * sys.netpfil.pf.synproxy.synproxy https://bugs.freebsd.org/238870 * sys.kern.ptrace_test.ptrace__follow_fork_child_detached_unrelated_debugger https://bugs.freebsd.org/239292 * sys.netpfil.pf.forward.v4 (i386 only) * sys.netpfil.pf.forward.v6 (i386 only) * sys.netpfil.pf.set_tos.v4 (i386 only) https://bugs.freebsd.org/239380 (updating net/scapy to 2.4.3 may fix this) * sys.kern.ptrace_test.ptrace__follow_fork_both_attached_unrelated_debugger https://bugs.freebsd.org/239397 * sys.kern.ptrace_test.ptrace__parent_sees_exit_after_child_debugger https://bugs.freebsd.org/239399 * sys.kern.ptrace_test.ptrace__follow_fork_parent_detached_unrelated_debugger https://bugs.freebsd.org/239425 * lib.libc.gen.getmntinfo_test.getmntinfo_test https://bugs.freebsd.org/240049 * sys.sys.qmath_test.qdivq_s64q https://bugs.freebsd.org/240219 ## Issues ### Cause build fails * https://bugs.freebsd.org/233735 Possible build race: genoffset.o /usr/src/sys/sys/types.h: error: machine/endian.h: No such file or directory * https://bugs.freebsd.org/233769 Possible build race: ld: error: unable to find library -lgcc_s ### Cause kernel panics * https://bugs.freebsd.org/238870 sys.netpfil.pf.names.names and sys.netpfil.pf.synproxy.synproxy cause panic Patch exists: * https://reviews.freebsd.org/D20868 * https://reviews.freebsd.org/D20869 ### Open * https://bugs.freebsd.org/237403 Tests in sys/opencrypto should be converted to Python3 * https://bugs.freebsd.org/237641 Flakey test case: common.misc.t_dtrace_contrib.tst_dynopt_d * https://bugs.freebsd.org/237656 "Freed UMA keg (rtentry) was not empty (18 items). Lost 1 pages of memory." seen when running sys/netipsec tests * https://bugs.freebsd.org/238781 sys.netinet.socket_afinet.socket_afinet_bind_zero does not work when mac_portacl(4) loaded * https://bugs.freebsd.org/239292 Flakey test case: sys.kern.ptrace_test.ptrace__follow_fork_child_detached_unrelated_debugger * https://bugs.freebsd.org/239380 sys.netpfil.pf.forward.{v4,v6} and sys.netpfil.pf.set_tos.v4 fail on i386 * https://bugs.freebsd.org/239397 Flakey test case: sys.kern.ptrace_test.ptrace__follow_fork_both_attached_unrelated_debugger * https://bugs.freebsd.org/239399 Flakey test case: sys.kern.ptrace_test.ptrace__parent_sees_exit_after_child_debugger * https://bugs.freebsd.org/239425 Flakey test case: sys.kern.ptrace_test.ptrace__follow_fork_parent_detached_unrelated_debugger * https://bugs.freebsd.org/240085 Failing test: sys.netpfil.common.forward.pf_v4 on i386 * https://bugs.freebsd.org/240086 Failing test: sys.netpfil.common.tos.pf_tos on i386 ### Others * [Tickets related to testing@](https://preview.tinyurl.com/y9maauwg) From owner-freebsd-stable@freebsd.org Fri Sep 6 06:39:31 2019 Return-Path: Delivered-To: freebsd-stable@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 230F5EA774 for ; Fri, 6 Sep 2019 06:39:31 +0000 (UTC) (envelope-from cy.schubert@cschubert.com) Received: from smtp-out-no.shaw.ca (smtp-out-no.shaw.ca [64.59.134.9]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "Client", Issuer "CA" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 46PnwK5mc0z3xDv for ; Fri, 6 Sep 2019 06:39:29 +0000 (UTC) (envelope-from cy.schubert@cschubert.com) Received: from spqr.komquats.com ([70.67.125.17]) by shaw.ca with ESMTPA id 67u0iBXBssAGk67u1iEpRL; Fri, 06 Sep 2019 00:39:27 -0600 X-Authority-Analysis: v=2.3 cv=WeVylHpX c=1 sm=1 tr=0 a=VFtTW3WuZNDh6VkGe7fA3g==:117 a=VFtTW3WuZNDh6VkGe7fA3g==:17 a=kj9zAlcOel0A:10 a=J70Eh1EUuV4A:10 a=-i4I5E_jAAAA:8 a=YxBL1-UpAAAA:8 a=6I5d2MoRAAAA:8 a=FHsP4wcXtPd1rkqbxn8A:9 a=CjuIK1q_8ugA:10 a=YQreJwxzuLcQAHRr27xt:22 a=Ia-lj3WSrqcvXOmTRaiG:22 a=IjZwj45LgO3ly-622nXo:22 Received: from slippy.cwsent.com (slippy [10.1.1.91]) by spqr.komquats.com (Postfix) with ESMTPS id 1DF8C63A; Thu, 5 Sep 2019 23:39:24 -0700 (PDT) Received: from slippy.cwsent.com (localhost [127.0.0.1]) by slippy.cwsent.com (8.15.2/8.15.2) with ESMTP id x866dN0G090192; Thu, 5 Sep 2019 23:39:23 -0700 (PDT) (envelope-from Cy.Schubert@cschubert.com) Received: from slippy (cy@localhost) by slippy.cwsent.com (8.15.2/8.15.2/Submit) with ESMTP id x866dL68090189; Thu, 5 Sep 2019 23:39:23 -0700 (PDT) (envelope-from Cy.Schubert@cschubert.com) Message-Id: <201909060639.x866dL68090189@slippy.cwsent.com> X-Authentication-Warning: slippy.cwsent.com: cy owned process doing -bs X-Mailer: exmh version 2.9.0 11/07/2018 with nmh-1.7.1 Reply-to: Cy Schubert From: Cy Schubert X-os: FreeBSD X-Sender: cy@cwsent.com X-URL: http://www.cschubert.com/ To: =?UTF-8?Q?Trond_Endrest=C3=B8l?= cc: freebsd-stable@freebsd.org, Harlan Stenn Subject: Re: ntpd doesn't like ASLR on stable/12 post-r350672 In-reply-to: References: Comments: In-reply-to =?UTF-8?Q?Trond_Endrest=C3=B8l?= message dated "Sat, 24 Aug 2019 22:04:49 +0200." Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Date: Thu, 05 Sep 2019 23:39:21 -0700 X-CMAE-Envelope: MS4wfAjQo4r0jmIkho1jl1gB89MoBUARblJEScgg70KKp+pydyCiK1Aj/UEvkAHgijTKBEncbs5Rbs/fDtX4gfGKBdkCYC53PNqIDxQn6bEUSwNlGDYROGwe yjWVBOsac23LR8Mk5c1DQPGcHniVuQ0jieEKcqT5f8vBGyCvxV26hxLJiOJvy/Gz0CK2Epdy3yk3h1i0XZNcyqY/qndvtMVL/VP3eN0VmXIqPyf3EskPz4/i jdg87CnBRlhVHWNoKVUd2w== X-Rspamd-Queue-Id: 46PnwK5mc0z3xDv X-Spamd-Bar: ---- Authentication-Results: mx1.freebsd.org; dkim=none; spf=none (mx1.freebsd.org: domain of cy.schubert@cschubert.com has no SPF policy when checking 64.59.134.9) smtp.mailfrom=cy.schubert@cschubert.com X-Spamd-Result: default: False [-4.97 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; RCVD_COUNT_FIVE(0.00)[5]; HAS_REPLYTO(0.00)[Cy.Schubert@cschubert.com]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; TO_DN_SOME(0.00)[]; MV_CASE(0.50)[]; MIME_GOOD(-0.10)[text/plain]; HAS_XAW(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; REPLYTO_EQ_FROM(0.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; NEURAL_HAM_SHORT(-0.99)[-0.988,0]; RCVD_IN_DNSWL_NONE(0.00)[9.134.59.64.list.dnswl.org : 127.0.5.0]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_SPF_NA(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:6327, ipnet:64.59.128.0/20, country:CA]; RCVD_TLS_LAST(0.00)[]; IP_SCORE(-2.38)[ip: (-6.29), ipnet: 64.59.128.0/20(-3.10), asn: 6327(-2.41), country: CA(-0.09)]; RECEIVED_SPAMHAUS_PBL(0.00)[17.125.67.70.khpj7ygk5idzvmvt5x4ziurxhy.zen.dq.spamhaus.net : 127.0.0.11] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 06 Sep 2019 06:39:31 -0000 In message , =?UTF-8?Q?Trond_Endrest=C3=B8l?= writes: > Hi, > > I'm running stable/12 with ASLR enabled in /etc/sysctl.conf: > > kern.elf64.aslr.enable=1 > kern.elf64.aslr.pie_enable=1 > kern.elf32.aslr.enable=1 > kern.elf32.aslr.pie_enable=1 > > After upgrading to anything after r350672, now at r351450, ntpd > refuses to start at boot. > > Aug 24 21:25:42 HOSTNAME ntpd[5618]: ntpd 4.2.8p12-a (1): Starti > ng > Aug 24 21:25:43 HOSTNAME kernel: [406] pid 5619 (ntpd), jid 0, ui > d 123: exited on signal 11 > > Disabling ASLR, kern.elf64.aslr.enable=0, before starting ntpd > manually is a workaround, but this is not viable in the long run. > > I tried changing command="/usr/sbin/${name}" to > command="/usr/bin/proccontrol -m aslr -s disable /usr/sbin/${name}" in > /etc/rc.d/ntpd, but that didn't go well. For now, until this can be solved, add this to your rc.conf: ntpd_prepend="/usr/bin/proccontrol -m aslr -s disable" > > Running ntpd through gdb while ASLR was enabled, I narrowed it down to > /usr/src/contrib/ntp/ntpd/ntpd.c:1001 > > ntp_rlimit(RLIMIT_STACK, DFLT_RLIMIT_STACK * 4096, 4096, "4k"); > > which calls /usr/src/contrib/ntp/ntpd/ntp_config.c:5211 and proceeds > to /usr/src/contrib/ntp/ntpd/ntp_config.c:5254 > > if (-1 == getrlimit(RLIMIT_STACK, &rl)) { > > Single stepping from this point gave me: > > ==== > > (gdb) s > _thr_rtld_set_flag (mask=1) at /usr/src/lib/libthr/thread/thr_rtld.c:171 > 171 { > (gdb) > 176 return (0); > (gdb) > _thr_rtld_rlock_acquire (lock=0x80180d200) at /usr/src/lib/libthr/thread/thr_ > rtld.c:115 > 115 { > (gdb) > 120 curthread = _get_curthread(); > (gdb) > _get_curthread () at /usr/src/lib/libthr/arch/amd64/include/pthread_md.h:97 > 97 return (TCB_GET64(tcb_thread)); > (gdb) > _thr_rtld_rlock_acquire (lock=0x80180d200) at /usr/src/lib/libthr/thread/thr_ > rtld.c:121 > 121 SAVE_ERRNO(); > (gdb) > 124 THR_CRITICAL_ENTER(curthread); > (gdb) > _thr_rwlock_tryrdlock (rwlock=, flags=0) at /usr/src/lib/libth > r/thread/thr_umtx.h:192 > 192 (rwlock->rw_flags & URWLOCK_PREFER_READER) != 0) > (gdb) > 191 if ((flags & URWLOCK_PREFER_READER) != 0 || > (gdb) > 197 while (!(state & wrflags)) { > (gdb) > 201 if (atomic_cmpset_acq_32(&rwlock->rw_state, state, st > ate + 1)) > (gdb) > atomic_cmpset_int (dst=, expect=, src=1) at /us > r/obj/usr/src/amd64.amd64/tmp/usr/include/machine/atomic.h:220 > 220 ATOMIC_CMPSET(int); > (gdb) > _thr_rwlock_tryrdlock (rwlock=, flags=0) at /usr/src/lib/libth > r/thread/thr_umtx.h:201 > 201 if (atomic_cmpset_acq_32(&rwlock->rw_state, state, st > ate + 1)) > (gdb) > _thr_rtld_rlock_acquire (lock=0x80180d200) at /usr/src/lib/libthr/thread/thr_ > rtld.c:127 > 127 curthread->rdlock_count++; > (gdb) > 128 RESTORE_ERRNO(); > (gdb) > 129 } > (gdb) > _thr_rtld_clr_flag (mask=1) at /usr/src/lib/libthr/thread/thr_rtld.c:181 > 181 { > (gdb) > 182 return (0); > (gdb) > _thr_rtld_lock_release (lock=0x80180d200) at /usr/src/lib/libthr/thread/thr_r > tld.c:150 > 150 { > (gdb) > _get_curthread () at /usr/src/lib/libthr/arch/amd64/include/pthread_md.h:97 > 97 return (TCB_GET64(tcb_thread)); > (gdb) > _thr_rtld_lock_release (lock=0x80180d200) at /usr/src/lib/libthr/thread/thr_r > tld.c:157 > 157 SAVE_ERRNO(); > (gdb) > 160 state = l->lock.rw_state; > (gdb) > 161 if (_thr_rwlock_unlock(&l->lock) == 0) { > (gdb) > _thr_rwlock_unlock (rwlock=0x80180d200) at /usr/src/lib/libthr/thread/thr_umt > x.h:249 > 249 state = rwlock->rw_state; > (gdb) > 250 if ((state & URWLOCK_WRITE_OWNER) != 0) { > (gdb) > 256 if (__predict_false(URWLOCK_READER_COUNT(stat > e) == 0)) > (gdb) > 260 URWLOCK_READER_COUNT(state) == 1)) > { > (gdb) > 259 URWLOCK_READ_WAITERS)) != 0 && > (gdb) > 262 state, state - 1)) > (gdb) > 261 if (atomic_cmpset_rel_32(&rwlock->rw_ > state, > (gdb) > atomic_cmpset_int (dst=, expect=, src=0) at /us > r/obj/usr/src/amd64.amd64/tmp/usr/include/machine/atomic.h:220 > 220 ATOMIC_CMPSET(int); > (gdb) > _thr_rwlock_unlock (rwlock=0x80180d200) at /usr/src/lib/libthr/thread/thr_umt > x.h:261 > 261 if (atomic_cmpset_rel_32(&rwlock->rw_ > state, > (gdb) > _thr_rtld_lock_release (lock=) at /usr/src/lib/libthr/thread/t > hr_rtld.c:162 > 162 if ((state & URWLOCK_WRITE_OWNER) == 0) > (gdb) > 163 curthread->rdlock_count--; > (gdb) > 164 THR_CRITICAL_LEAVE(curthread); > (gdb) > _thr_ast (curthread=0x80864b000) at /usr/src/lib/libthr/thread/thr_sig.c:271 > 271 if (!THR_IN_CRITICAL(curthread)) { > (gdb) > 272 check_deferred_signal(curthread); > (gdb) > check_deferred_signal (curthread=0x80864b000) at /usr/src/lib/libthr/thread/t > hr_sig.c:332 > 332 if (__predict_true(curthread->deferred_siginfo.si_signo == 0 > || > (gdb) > 351 } > (gdb) > _thr_ast (curthread=0x80864b000) at /usr/src/lib/libthr/thread/thr_sig.c:273 > 273 check_suspend(curthread); > (gdb) > check_suspend (curthread=0x80864b000) at /usr/src/lib/libthr/thread/thr_sig.c > :358 > 358 if (__predict_true((curthread->flags & > (gdb) > 401 } > (gdb) > _thr_ast (curthread=0x80864b000) at /usr/src/lib/libthr/thread/thr_sig.c:274 > 274 check_cancel(curthread, NULL); > (gdb) > check_cancel (curthread=0x80864b000, ucp=0x0) at /usr/src/lib/libthr/thread/t > hr_sig.c:283 > 283 if (__predict_true(!curthread->cancel_pending || > (gdb) > _thr_ast (curthread=) at /usr/src/lib/libthr/thread/thr_sig.c: > 276 > 276 } > (gdb) > _thr_rtld_lock_release (lock=) at /usr/src/lib/libthr/thread/t > hr_rtld.c:166 > 166 RESTORE_ERRNO(); > (gdb) > 167 } > (gdb) > getrlimit () at getrlimit.S:3 > 3 RSYSCALL(getrlimit) > (gdb) > ntp_rlimit (rl_what=, rl_value=204800, rl_scale= >, rl_sstr=) at /usr/src/contrib/ntp/ntpd/ntp_config.c:5257 > 5257 if (rl_value > rl.rlim_max) { > (gdb) > 5264 rl.rlim_cur = rl_value; > (gdb) > 5265 if (-1 == setrlimit(RLIMIT_STACK, &rl)) { > (gdb) > _thr_rtld_set_flag (mask=1) at /usr/src/lib/libthr/thread/thr_rtld.c:171 > 171 { > (gdb) > 176 return (0); > (gdb) > _thr_rtld_rlock_acquire (lock=0x80180d200) at /usr/src/lib/libthr/thread/thr_ > rtld.c:115 > 115 { > (gdb) > 120 curthread = _get_curthread(); > (gdb) > _get_curthread () at /usr/src/lib/libthr/arch/amd64/include/pthread_md.h:97 > 97 return (TCB_GET64(tcb_thread)); > (gdb) > _thr_rtld_rlock_acquire (lock=0x80180d200) at /usr/src/lib/libthr/thread/thr_ > rtld.c:121 > 121 SAVE_ERRNO(); > (gdb) > 124 THR_CRITICAL_ENTER(curthread); > (gdb) > _thr_rwlock_tryrdlock (rwlock=, flags=0) at /usr/src/lib/libth > r/thread/thr_umtx.h:192 > 192 (rwlock->rw_flags & URWLOCK_PREFER_READER) != 0) > (gdb) > 191 if ((flags & URWLOCK_PREFER_READER) != 0 || > (gdb) > 197 while (!(state & wrflags)) { > (gdb) > 201 if (atomic_cmpset_acq_32(&rwlock->rw_state, state, st > ate + 1)) > (gdb) > atomic_cmpset_int (dst=, expect=, src=1) at /us > r/obj/usr/src/amd64.amd64/tmp/usr/include/machine/atomic.h:220 > 220 ATOMIC_CMPSET(int); > (gdb) > _thr_rwlock_tryrdlock (rwlock=, flags=0) at /usr/src/lib/libth > r/thread/thr_umtx.h:201 > 201 if (atomic_cmpset_acq_32(&rwlock->rw_state, state, st > ate + 1)) > (gdb) > _thr_rtld_rlock_acquire (lock=0x80180d200) at /usr/src/lib/libthr/thread/thr_ > rtld.c:127 > 127 curthread->rdlock_count++; > (gdb) > 128 RESTORE_ERRNO(); > (gdb) > 129 } > (gdb) > _thr_rtld_clr_flag (mask=1) at /usr/src/lib/libthr/thread/thr_rtld.c:181 > 181 { > (gdb) > 182 return (0); > (gdb) > _thr_rtld_lock_release (lock=0x80180d200) at /usr/src/lib/libthr/thread/thr_r > tld.c:150 > 150 { > (gdb) > _get_curthread () at /usr/src/lib/libthr/arch/amd64/include/pthread_md.h:97 > 97 return (TCB_GET64(tcb_thread)); > (gdb) > _thr_rtld_lock_release (lock=0x80180d200) at /usr/src/lib/libthr/thread/thr_r > tld.c:157 > 157 SAVE_ERRNO(); > (gdb) > 160 state = l->lock.rw_state; > (gdb) > 161 if (_thr_rwlock_unlock(&l->lock) == 0) { > (gdb) > _thr_rwlock_unlock (rwlock=0x80180d200) at /usr/src/lib/libthr/thread/thr_umt > x.h:249 > 249 state = rwlock->rw_state; > (gdb) > 250 if ((state & URWLOCK_WRITE_OWNER) != 0) { > (gdb) > 256 if (__predict_false(URWLOCK_READER_COUNT(stat > e) == 0)) > (gdb) > 260 URWLOCK_READER_COUNT(state) == 1)) { > (gdb) > 259 URWLOCK_READ_WAITERS)) != 0 && > (gdb) > 262 state, state - 1)) > (gdb) > 261 if (atomic_cmpset_rel_32(&rwlock->rw_ > state, > (gdb) > atomic_cmpset_int (dst=, expect=, src=0) at /us > r/obj/usr/src/amd64.amd64/tmp/usr/include/machine/atomic.h:220 > 220 ATOMIC_CMPSET(int); > (gdb) > _thr_rwlock_unlock (rwlock=0x80180d200) at /usr/src/lib/libthr/thread/thr_umt > x.h:261 > 261 if (atomic_cmpset_rel_32(&rwlock->rw_ > state, > (gdb) > _thr_rtld_lock_release (lock=) at /usr/src/lib/libthr/thread/t > hr_rtld.c:162 > 162 if ((state & URWLOCK_WRITE_OWNER) == 0) > (gdb) > 163 curthread->rdlock_count--; > (gdb) > 164 THR_CRITICAL_LEAVE(curthread); > (gdb) > _thr_ast (curthread=0x80864b000) at /usr/src/lib/libthr/thread/thr_sig.c:271 > 271 if (!THR_IN_CRITICAL(curthread)) { > (gdb) > 272 check_deferred_signal(curthread); > (gdb) > check_deferred_signal (curthread=0x80864b000) at /usr/src/lib/libthr/thread/t > hr_sig.c:332 > 332 if > (__predict_true(curthread->deferred_siginfo.si_signo == 0 || > (gdb) > 351 } > (gdb) > _thr_ast (curthread=0x80864b000) at /usr/src/lib/libthr/thread/thr_sig.c:273 > 273 check_suspend(curthread); > (gdb) > check_suspend (curthread=0x80864b000) at /usr/src/lib/libthr/thread/thr_sig.c > :358 > 358 if (__predict_true((curthread->flags & > (gdb) > 401 } > (gdb) > _thr_ast (curthread=0x80864b000) at /usr/src/lib/libthr/thread/thr_sig.c:274 > 274 check_cancel(curthread, NULL); > (gdb) > check_cancel (curthread=0x80864b000, ucp=0x0) at /usr/src/lib/libthr/thread/t > hr_sig.c:283 > 283 if (__predict_true(!curthread->cancel_pending || > (gdb) > _thr_ast (curthread=) at /usr/src/lib/libthr/thread/thr_sig.c: > 276 > 276 } > (gdb) > _thr_rtld_lock_release (lock=) at /usr/src/lib/libthr/thread/t > hr_rtld.c:166 > 166 RESTORE_ERRNO(); > (gdb) > 167 } > (gdb) > setrlimit () at setrlimit.S:3 > 3 RSYSCALL(setrlimit) > (gdb) > > Program received signal SIGSEGV, Segmentation fault. > setrlimit () at setrlimit.S:3 > 3 RSYSCALL(setrlimit) > (gdb) > > Program terminated with signal SIGSEGV, Segmentation fault. > The program no longer exists. > (gdb) q > > ==== > > I'm sorry for the long post. Is there anything (else) I can do to > further narrow it down? I've been able to confirm that kib@'s hunch regarding the gap is correct. Use the workaround until this can be solved. -- Cheers, Cy Schubert FreeBSD UNIX: Web: http://www.FreeBSD.org The need of the many outweighs the greed of the few. From owner-freebsd-stable@freebsd.org Fri Sep 6 17:51:54 2019 Return-Path: Delivered-To: freebsd-stable@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 77E30D1D32 for ; Fri, 6 Sep 2019 17:51:54 +0000 (UTC) (envelope-from stenn@nwtime.org) Received: from chessie.everett.org (chessie.everett.org [66.220.13.234]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 46Q4r74RYkz4fKD for ; Fri, 6 Sep 2019 17:51:51 +0000 (UTC) (envelope-from stenn@nwtime.org) Received: from [10.208.75.152] (75-139-194-196.dhcp.knwc.wa.charter.com [75.139.194.196]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by chessie.everett.org (Postfix) with ESMTPSA id 46Q4rv72QgzL7c; Fri, 6 Sep 2019 17:52:31 +0000 (UTC) Subject: Re: ntpd doesn't like ASLR on stable/12 post-r350672 To: Cy Schubert , =?UTF-8?Q?Trond_Endrest=c3=b8l?= Cc: freebsd-stable@freebsd.org References: <201909060639.x866dL68090189@slippy.cwsent.com> From: Harlan Stenn Openpgp: preference=signencrypt Autocrypt: addr=stenn@nwtime.org; prefer-encrypt=mutual; keydata= mQGNBFI2xmQBDACrPayw18eU4pIwCvKh7k0iMkAV9cvzs49kBppM+xoH+KKj4QWmkKELD39H ngQnT3RkKsTLlwxyLqPdUmeQNAY2M5fsOK+OF6EvwLPK9hbmE3Wx2moX+sbEUxJ2VzFhKSKb OPZALXwk1XxL0qBedz0xHYcDwaSAZZkEFXURv2pDIdrmnoUnq2gdC8GpoFJiXoUaCLSYzzaY ac4Njw7Mue8IqfzRQb70aMjXl/qmsmfmEVAyGXywDdc/ler4XSgiuYOV7Kf69bj9PFZZSMdJ MWgEyZH6lJ0TU5ccR2zp5ZRmWzQQkxJMyH2th7q0Nmz3aX4A0K4yE0Ba9/5Dr7ctpF15BrMF aEo4s5lwI6tUnkgMWo265mMzCz4mAPV/ac0w0OXQg7r9E2r0+dRapnzUlG43D0JLDqDr9uRR L6IrRQqoCWUC75lfmPYQYSlaTJaK68r3lXd0z1cXJUgVtEL5H3/Z71R2B20twcQVAnw2iIH6 L5vdrsIjHrMmkqRVbs9nNyEAEQEAAbQ5SGFybGFuIFN0ZW5uIChOZXR3b3JrIFRpbWUgRm91 bmRhdGlvbikgPHN0ZW5uQG53dGltZS5vcmc+iQG5BBMBAgAjBQJSNsblAhsvBwsJCAcDAgEG FQgCCQoLBBYCAwECHgECF4AACgkQyIwAt1pH+kBlzgv/QOg70vdj8wU/z97UPdlbxtN4THAB gfSX4N0VPKT5fjX1tFhuXZQAOv7wedR3Trh7TGteyg33TBAFf9A42mXZKi1IxAiQG118Hd8I 51rXwnugURIYQaIyQI+vbchRbwVyz+mVLTI/h6FdbsVzT4UFmir+ZMkb/XeZPu0HItk4OZHE 6hk+TuTiCnlqlCPLq371fXV54VOb91WZYD8EQFtK02QHGHsQqWvapdphiDVpYehmsPyiTESq NMKLVtjtyPkQ6S7QF3slSg+2q3j8lyxEA78Yl0MSFNU8B/BtKgzWP2itBOfi+rtUKg+jOY1V /s2uVk2kq2QmHJ/s5k5ldy3qVvoTpxvwBe0+EoBocTHYt+xxp0mTM6YY1xLiQpLznzluqg9z qtejX1gZOF4mgLiBIrhXzed3zsAazhTp5rNb1kn0brZFh6JC5Wk941eilnA4LqX8AWo0lmwo eb+mpwZK/5lNdage/anpVqft9wJ/8EcvST9TLUO4fPrmT3d/0LpWuQGNBFI2xmQBDADXLsBk I7CSa5UXlrNVFJQHER1VxRBKqjWWCh/8Qv9v3p3NrIc2UnhoZ1uWQ2voBGty5Xfy9k4afV5k WwDyRDUIb7PX+Tj4HjVVr7qvnOVe/0KzZpNq0Azd0ggFbsM+8mydktHIwJykW0NUsGwPRYuD OA0Lro0ohb5IiCt3sSQi1X1hYjo7O1Vmn8Gy/XYOnhnMux+5zDPO2yTkCNX5PocYi9IJJy6p Mq1yQV4Y2Dl8KtQzvtq55vCUxx6n0MMzFViGwNW6F4ge9ItO4tDScsgowDrHa208ehwOpv/i wjf93lCClQ6vaKmOBX872K/tdY/hwhxPPjgl1bcrOwMRYVemOPPehwnXH5bwclk1hvDQdkJQ 5pJOkE4VCryTF/iDAt4g2QnHocUwt3b6/ChUUWmj2GZ22OR12rbnCtLedwp0DpViKPUCQHBO vpgXdzE/L9zWar9fqM0EREMgfWbsJc9028qluCcFLIN1gYsq4cC+YGAcOu7HOI5orBBV4m9j XfsAEQEAAYkDPgQYAQIACQUCUjbGZAIbLgGpCRDIjAC3Wkf6QMDdIAQZAQIABgUCUjbGZAAK CRDfCQ/G52/8P/uWDACe7OEM+VETDRqjQgAwzX+RjCVPvtgrqc1SExS0fV7i1mUUxr/B8io3 Y1cRHFoFKmedxf8prHZq316Md5u4egjFdTT6ZqEqkK0hvv+i0pRpCa5EX9VIStcJStomZp8F cY34grA+EOWITaLQ4qNZUP7rf2e7gq1ubQTj7uLr6HZZvMZ5em+IvrOWEuWDI6yOiI6px04w RDfkoR2h6kgdw4V0PT4NjK9WYYKrVCf1bjLlVImNBEcXfvlUTrIYO8y6ptvoUsBQky5pQRvP 99Pn42WfyLy50aII6+vyudD4T0yLjXAz4KteUttxtIte64m/F9/7GEIZAxTUcLyOq/7bP4le h39jBckwc62iYzeK/VkU/bMMh2D68Z3QylMnhhcW27BcgQHPKsHhmFa2SNytYcuQiSdf9+pj 4i32ETz1nJAvYAAqgTF/0PL+8ZNQoEpe/n9woMKrlZrqD4EgFmhQ3bNVhlaXz1nuTZDrwPt1 yMxBuUNbCF4jFnaruwrSiGTRoIfUZQwAjQglahrV4/mcjfnvbNoseHX0PKd9q+wjg7MIjWqr f2CI8Fa6MdanqwYphz43I2yXANKFZuMWsWqyQYlvGuPUlUUcAL3stp24RkzDB1Q+JS0IZJST T2JSu0aTfUdWVNqr2UI19eX+zxbOTckSi3Ng14ezG8ZX194ZH10b8JzntQOwmA20pd5JDhug zQfASER+CZDiPPcQ4mvC4y7rMrfV6XGQbDynC3ekDxo8SC5SvjaczXMwXg6SZ8iFtEWmEwW9 r7zPjjIPDrX8w5LXBgxArM5o/HbERpc2EdAvMh1D7LC0SvmoE7fBKxsicVBe4h6vXjEZ+LLr /wuZiBld9OnxAUIpwptbBspO6WKTQYvgFH2OeDG27hiE5P4Xs4WSp5j9ez8OVB1iZnA2nCQ+ tNTjO8c+C/P92vPLx5+bpGRXTXMNaLh34PS3ZsYoUDkKZNhczRZUWJ7nynSbeeyF+QW7SLwA qY7O7dyk9LFTsfJqRQJ7tWnIAjJPCwmSgQ8Kl0UJ Message-ID: <9b0c95de-2d0e-89b4-32e6-63ec5af729b4@nwtime.org> Date: Fri, 6 Sep 2019 10:51:46 -0700 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0 MIME-Version: 1.0 In-Reply-To: <201909060639.x866dL68090189@slippy.cwsent.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: 46Q4r74RYkz4fKD X-Spamd-Bar: ------- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=pass (policy=none) header.from=nwtime.org; spf=pass (mx1.freebsd.org: domain of stenn@nwtime.org designates 66.220.13.234 as permitted sender) smtp.mailfrom=stenn@nwtime.org X-Spamd-Result: default: False [-7.29 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; R_SPF_ALLOW(-0.20)[+mx]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; IP_SCORE(-3.50)[ip: (-9.54), ipnet: 66.220.0.0/19(-4.77), asn: 6939(-3.14), country: US(-0.05)]; TO_DN_SOME(0.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; NEURAL_HAM_SHORT(-0.99)[-0.989,0]; DMARC_POLICY_ALLOW(-0.50)[nwtime.org,none]; RCVD_IN_DNSWL_NONE(0.00)[234.13.220.66.list.dnswl.org : 127.0.10.0]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:6939, ipnet:66.220.0.0/19, country:US]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_TLS_ALL(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 06 Sep 2019 17:51:54 -0000 Hi folks, It's easy for us to customize the default value for DFLT_RLIMIT_STACK on a per-version and per-OS basis. We do this in the "configure" machinery. The defaults are expected to be "generally sane", and were likely chosen a relatively long time ago. What would you like the value(s) to be for what versions of FreeBSD? H On 9/5/2019 11:39 PM, Cy Schubert wrote: > In message inf > o>, =?UTF-8?Q?Trond_Endrest=C3=B8l?= writes: >> Hi, >> >> I'm running stable/12 with ASLR enabled in /etc/sysctl.conf: >> >> kern.elf64.aslr.enable=1 >> kern.elf64.aslr.pie_enable=1 >> kern.elf32.aslr.enable=1 >> kern.elf32.aslr.pie_enable=1 >> >> After upgrading to anything after r350672, now at r351450, ntpd >> refuses to start at boot. >> >> Aug 24 21:25:42 HOSTNAME ntpd[5618]: ntpd 4.2.8p12-a (1): Starti >> ng >> Aug 24 21:25:43 HOSTNAME kernel: [406] pid 5619 (ntpd), jid 0, ui >> d 123: exited on signal 11 >> >> Disabling ASLR, kern.elf64.aslr.enable=0, before starting ntpd >> manually is a workaround, but this is not viable in the long run. >> >> I tried changing command="/usr/sbin/${name}" to >> command="/usr/bin/proccontrol -m aslr -s disable /usr/sbin/${name}" in >> /etc/rc.d/ntpd, but that didn't go well. > > For now, until this can be solved, add this to your rc.conf: > > ntpd_prepend="/usr/bin/proccontrol -m aslr -s disable" > >> >> Running ntpd through gdb while ASLR was enabled, I narrowed it down to >> /usr/src/contrib/ntp/ntpd/ntpd.c:1001 >> >> ntp_rlimit(RLIMIT_STACK, DFLT_RLIMIT_STACK * 4096, 4096, "4k"); >> >> which calls /usr/src/contrib/ntp/ntpd/ntp_config.c:5211 and proceeds >> to /usr/src/contrib/ntp/ntpd/ntp_config.c:5254 >> >> if (-1 == getrlimit(RLIMIT_STACK, &rl)) { >> >> Single stepping from this point gave me: >> >> ==== >> >> (gdb) s >> _thr_rtld_set_flag (mask=1) at /usr/src/lib/libthr/thread/thr_rtld.c:171 >> 171 { >> (gdb) >> 176 return (0); >> (gdb) >> _thr_rtld_rlock_acquire (lock=0x80180d200) at /usr/src/lib/libthr/thread/thr_ >> rtld.c:115 >> 115 { >> (gdb) >> 120 curthread = _get_curthread(); >> (gdb) >> _get_curthread () at /usr/src/lib/libthr/arch/amd64/include/pthread_md.h:97 >> 97 return (TCB_GET64(tcb_thread)); >> (gdb) >> _thr_rtld_rlock_acquire (lock=0x80180d200) at /usr/src/lib/libthr/thread/thr_ >> rtld.c:121 >> 121 SAVE_ERRNO(); >> (gdb) >> 124 THR_CRITICAL_ENTER(curthread); >> (gdb) >> _thr_rwlock_tryrdlock (rwlock=, flags=0) at /usr/src/lib/libth >> r/thread/thr_umtx.h:192 >> 192 (rwlock->rw_flags & URWLOCK_PREFER_READER) != 0) >> (gdb) >> 191 if ((flags & URWLOCK_PREFER_READER) != 0 || >> (gdb) >> 197 while (!(state & wrflags)) { >> (gdb) >> 201 if (atomic_cmpset_acq_32(&rwlock->rw_state, state, st >> ate + 1)) >> (gdb) >> atomic_cmpset_int (dst=, expect=, src=1) at /us >> r/obj/usr/src/amd64.amd64/tmp/usr/include/machine/atomic.h:220 >> 220 ATOMIC_CMPSET(int); >> (gdb) >> _thr_rwlock_tryrdlock (rwlock=, flags=0) at /usr/src/lib/libth >> r/thread/thr_umtx.h:201 >> 201 if (atomic_cmpset_acq_32(&rwlock->rw_state, state, st >> ate + 1)) >> (gdb) >> _thr_rtld_rlock_acquire (lock=0x80180d200) at /usr/src/lib/libthr/thread/thr_ >> rtld.c:127 >> 127 curthread->rdlock_count++; >> (gdb) >> 128 RESTORE_ERRNO(); >> (gdb) >> 129 } >> (gdb) >> _thr_rtld_clr_flag (mask=1) at /usr/src/lib/libthr/thread/thr_rtld.c:181 >> 181 { >> (gdb) >> 182 return (0); >> (gdb) >> _thr_rtld_lock_release (lock=0x80180d200) at /usr/src/lib/libthr/thread/thr_r >> tld.c:150 >> 150 { >> (gdb) >> _get_curthread () at /usr/src/lib/libthr/arch/amd64/include/pthread_md.h:97 >> 97 return (TCB_GET64(tcb_thread)); >> (gdb) >> _thr_rtld_lock_release (lock=0x80180d200) at /usr/src/lib/libthr/thread/thr_r >> tld.c:157 >> 157 SAVE_ERRNO(); >> (gdb) >> 160 state = l->lock.rw_state; >> (gdb) >> 161 if (_thr_rwlock_unlock(&l->lock) == 0) { >> (gdb) >> _thr_rwlock_unlock (rwlock=0x80180d200) at /usr/src/lib/libthr/thread/thr_umt >> x.h:249 >> 249 state = rwlock->rw_state; >> (gdb) >> 250 if ((state & URWLOCK_WRITE_OWNER) != 0) { >> (gdb) >> 256 if (__predict_false(URWLOCK_READER_COUNT(stat >> e) == 0)) >> (gdb) >> 260 URWLOCK_READER_COUNT(state) == 1)) >> { >> (gdb) >> 259 URWLOCK_READ_WAITERS)) != 0 && >> (gdb) >> 262 state, state - 1)) >> (gdb) >> 261 if (atomic_cmpset_rel_32(&rwlock->rw_ >> state, >> (gdb) >> atomic_cmpset_int (dst=, expect=, src=0) at /us >> r/obj/usr/src/amd64.amd64/tmp/usr/include/machine/atomic.h:220 >> 220 ATOMIC_CMPSET(int); >> (gdb) >> _thr_rwlock_unlock (rwlock=0x80180d200) at /usr/src/lib/libthr/thread/thr_umt >> x.h:261 >> 261 if (atomic_cmpset_rel_32(&rwlock->rw_ >> state, >> (gdb) >> _thr_rtld_lock_release (lock=) at /usr/src/lib/libthr/thread/t >> hr_rtld.c:162 >> 162 if ((state & URWLOCK_WRITE_OWNER) == 0) >> (gdb) >> 163 curthread->rdlock_count--; >> (gdb) >> 164 THR_CRITICAL_LEAVE(curthread); >> (gdb) >> _thr_ast (curthread=0x80864b000) at /usr/src/lib/libthr/thread/thr_sig.c:271 >> 271 if (!THR_IN_CRITICAL(curthread)) { >> (gdb) >> 272 check_deferred_signal(curthread); >> (gdb) >> check_deferred_signal (curthread=0x80864b000) at /usr/src/lib/libthr/thread/t >> hr_sig.c:332 >> 332 if (__predict_true(curthread->deferred_siginfo.si_signo == 0 >> || >> (gdb) >> 351 } >> (gdb) >> _thr_ast (curthread=0x80864b000) at /usr/src/lib/libthr/thread/thr_sig.c:273 >> 273 check_suspend(curthread); >> (gdb) >> check_suspend (curthread=0x80864b000) at /usr/src/lib/libthr/thread/thr_sig.c >> :358 >> 358 if (__predict_true((curthread->flags & >> (gdb) >> 401 } >> (gdb) >> _thr_ast (curthread=0x80864b000) at /usr/src/lib/libthr/thread/thr_sig.c:274 >> 274 check_cancel(curthread, NULL); >> (gdb) >> check_cancel (curthread=0x80864b000, ucp=0x0) at /usr/src/lib/libthr/thread/t >> hr_sig.c:283 >> 283 if (__predict_true(!curthread->cancel_pending || >> (gdb) >> _thr_ast (curthread=) at /usr/src/lib/libthr/thread/thr_sig.c: >> 276 >> 276 } >> (gdb) >> _thr_rtld_lock_release (lock=) at /usr/src/lib/libthr/thread/t >> hr_rtld.c:166 >> 166 RESTORE_ERRNO(); >> (gdb) >> 167 } >> (gdb) >> getrlimit () at getrlimit.S:3 >> 3 RSYSCALL(getrlimit) >> (gdb) >> ntp_rlimit (rl_what=, rl_value=204800, rl_scale=>> , rl_sstr=) at /usr/src/contrib/ntp/ntpd/ntp_config.c:5257 >> 5257 if (rl_value > rl.rlim_max) { >> (gdb) >> 5264 rl.rlim_cur = rl_value; >> (gdb) >> 5265 if (-1 == setrlimit(RLIMIT_STACK, &rl)) { >> (gdb) >> _thr_rtld_set_flag (mask=1) at /usr/src/lib/libthr/thread/thr_rtld.c:171 >> 171 { >> (gdb) >> 176 return (0); >> (gdb) >> _thr_rtld_rlock_acquire (lock=0x80180d200) at /usr/src/lib/libthr/thread/thr_ >> rtld.c:115 >> 115 { >> (gdb) >> 120 curthread = _get_curthread(); >> (gdb) >> _get_curthread () at /usr/src/lib/libthr/arch/amd64/include/pthread_md.h:97 >> 97 return (TCB_GET64(tcb_thread)); >> (gdb) >> _thr_rtld_rlock_acquire (lock=0x80180d200) at /usr/src/lib/libthr/thread/thr_ >> rtld.c:121 >> 121 SAVE_ERRNO(); >> (gdb) >> 124 THR_CRITICAL_ENTER(curthread); >> (gdb) >> _thr_rwlock_tryrdlock (rwlock=, flags=0) at /usr/src/lib/libth >> r/thread/thr_umtx.h:192 >> 192 (rwlock->rw_flags & URWLOCK_PREFER_READER) != 0) >> (gdb) >> 191 if ((flags & URWLOCK_PREFER_READER) != 0 || >> (gdb) >> 197 while (!(state & wrflags)) { >> (gdb) >> 201 if (atomic_cmpset_acq_32(&rwlock->rw_state, state, st >> ate + 1)) >> (gdb) >> atomic_cmpset_int (dst=, expect=, src=1) at /us >> r/obj/usr/src/amd64.amd64/tmp/usr/include/machine/atomic.h:220 >> 220 ATOMIC_CMPSET(int); >> (gdb) >> _thr_rwlock_tryrdlock (rwlock=, flags=0) at /usr/src/lib/libth >> r/thread/thr_umtx.h:201 >> 201 if (atomic_cmpset_acq_32(&rwlock->rw_state, state, st >> ate + 1)) >> (gdb) >> _thr_rtld_rlock_acquire (lock=0x80180d200) at /usr/src/lib/libthr/thread/thr_ >> rtld.c:127 >> 127 curthread->rdlock_count++; >> (gdb) >> 128 RESTORE_ERRNO(); >> (gdb) >> 129 } >> (gdb) >> _thr_rtld_clr_flag (mask=1) at /usr/src/lib/libthr/thread/thr_rtld.c:181 >> 181 { >> (gdb) >> 182 return (0); >> (gdb) >> _thr_rtld_lock_release (lock=0x80180d200) at /usr/src/lib/libthr/thread/thr_r >> tld.c:150 >> 150 { >> (gdb) >> _get_curthread () at /usr/src/lib/libthr/arch/amd64/include/pthread_md.h:97 >> 97 return (TCB_GET64(tcb_thread)); >> (gdb) >> _thr_rtld_lock_release (lock=0x80180d200) at /usr/src/lib/libthr/thread/thr_r >> tld.c:157 >> 157 SAVE_ERRNO(); >> (gdb) >> 160 state = l->lock.rw_state; >> (gdb) >> 161 if (_thr_rwlock_unlock(&l->lock) == 0) { >> (gdb) >> _thr_rwlock_unlock (rwlock=0x80180d200) at /usr/src/lib/libthr/thread/thr_umt >> x.h:249 >> 249 state = rwlock->rw_state; >> (gdb) >> 250 if ((state & URWLOCK_WRITE_OWNER) != 0) { >> (gdb) >> 256 if (__predict_false(URWLOCK_READER_COUNT(stat >> e) == 0)) >> (gdb) >> 260 URWLOCK_READER_COUNT(state) == 1)) { >> (gdb) >> 259 URWLOCK_READ_WAITERS)) != 0 && >> (gdb) >> 262 state, state - 1)) >> (gdb) >> 261 if (atomic_cmpset_rel_32(&rwlock->rw_ >> state, >> (gdb) >> atomic_cmpset_int (dst=, expect=, src=0) at /us >> r/obj/usr/src/amd64.amd64/tmp/usr/include/machine/atomic.h:220 >> 220 ATOMIC_CMPSET(int); >> (gdb) >> _thr_rwlock_unlock (rwlock=0x80180d200) at /usr/src/lib/libthr/thread/thr_umt >> x.h:261 >> 261 if (atomic_cmpset_rel_32(&rwlock->rw_ >> state, >> (gdb) >> _thr_rtld_lock_release (lock=) at /usr/src/lib/libthr/thread/t >> hr_rtld.c:162 >> 162 if ((state & URWLOCK_WRITE_OWNER) == 0) >> (gdb) >> 163 curthread->rdlock_count--; >> (gdb) >> 164 THR_CRITICAL_LEAVE(curthread); >> (gdb) >> _thr_ast (curthread=0x80864b000) at /usr/src/lib/libthr/thread/thr_sig.c:271 >> 271 if (!THR_IN_CRITICAL(curthread)) { >> (gdb) >> 272 check_deferred_signal(curthread); >> (gdb) >> check_deferred_signal (curthread=0x80864b000) at /usr/src/lib/libthr/thread/t >> hr_sig.c:332 >> 332 if >> (__predict_true(curthread->deferred_siginfo.si_signo == 0 || >> (gdb) >> 351 } >> (gdb) >> _thr_ast (curthread=0x80864b000) at /usr/src/lib/libthr/thread/thr_sig.c:273 >> 273 check_suspend(curthread); >> (gdb) >> check_suspend (curthread=0x80864b000) at /usr/src/lib/libthr/thread/thr_sig.c >> :358 >> 358 if (__predict_true((curthread->flags & >> (gdb) >> 401 } >> (gdb) >> _thr_ast (curthread=0x80864b000) at /usr/src/lib/libthr/thread/thr_sig.c:274 >> 274 check_cancel(curthread, NULL); >> (gdb) >> check_cancel (curthread=0x80864b000, ucp=0x0) at /usr/src/lib/libthr/thread/t >> hr_sig.c:283 >> 283 if (__predict_true(!curthread->cancel_pending || >> (gdb) >> _thr_ast (curthread=) at /usr/src/lib/libthr/thread/thr_sig.c: >> 276 >> 276 } >> (gdb) >> _thr_rtld_lock_release (lock=) at /usr/src/lib/libthr/thread/t >> hr_rtld.c:166 >> 166 RESTORE_ERRNO(); >> (gdb) >> 167 } >> (gdb) >> setrlimit () at setrlimit.S:3 >> 3 RSYSCALL(setrlimit) >> (gdb) >> >> Program received signal SIGSEGV, Segmentation fault. >> setrlimit () at setrlimit.S:3 >> 3 RSYSCALL(setrlimit) >> (gdb) >> >> Program terminated with signal SIGSEGV, Segmentation fault. >> The program no longer exists. >> (gdb) q >> >> ==== >> >> I'm sorry for the long post. Is there anything (else) I can do to >> further narrow it down? > > I've been able to confirm that kib@'s hunch regarding the gap is correct. > > Use the workaround until this can be solved. > > -- Harlan Stenn http://networktimefoundation.org - be a member! From owner-freebsd-stable@freebsd.org Fri Sep 6 23:55:04 2019 Return-Path: Delivered-To: freebsd-stable@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 0276BDB6B2 for ; Fri, 6 Sep 2019 23:55:04 +0000 (UTC) (envelope-from cy.schubert@cschubert.com) Received: from smtp-out-so.shaw.ca (smtp-out-so.shaw.ca [64.59.136.139]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "Client", Issuer "CA" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 46QDv71hplz3KXg for ; Fri, 6 Sep 2019 23:54:58 +0000 (UTC) (envelope-from cy.schubert@cschubert.com) Received: from spqr.komquats.com ([70.67.125.17]) by shaw.ca with ESMTPA id 6O40iKiNKIhW96O42iuFDd; Fri, 06 Sep 2019 17:54:54 -0600 X-Authority-Analysis: v=2.3 cv=FcFJO626 c=1 sm=1 tr=0 a=VFtTW3WuZNDh6VkGe7fA3g==:117 a=VFtTW3WuZNDh6VkGe7fA3g==:17 a=kj9zAlcOel0A:10 a=J70Eh1EUuV4A:10 a=EkcXrb_YAAAA:8 a=-i4I5E_jAAAA:8 a=YxBL1-UpAAAA:8 a=6I5d2MoRAAAA:8 a=J9wUqfX70oTMe43JHpkA:9 a=CjuIK1q_8ugA:10 a=LK5xJRSDVpKd5WXXoEvA:22 a=YQreJwxzuLcQAHRr27xt:22 a=Ia-lj3WSrqcvXOmTRaiG:22 a=IjZwj45LgO3ly-622nXo:22 a=pHzHmUro8NiASowvMSCR:22 a=nt3jZW36AmriUCFCBwmW:22 Received: from slippy.cwsent.com (slippy8 [10.2.2.6]) by spqr.komquats.com (Postfix) with ESMTPS id 26A058CC; Fri, 6 Sep 2019 16:54:48 -0700 (PDT) Received: from slippy.cwsent.com (localhost [127.0.0.1]) by slippy.cwsent.com (8.15.2/8.15.2) with ESMTP id x86Nslvd003751; Fri, 6 Sep 2019 16:54:47 -0700 (PDT) (envelope-from Cy.Schubert@cschubert.com) Received: from slippy (cy@localhost) by slippy.cwsent.com (8.15.2/8.15.2/Submit) with ESMTP id x86Nskfg003748; Fri, 6 Sep 2019 16:54:46 -0700 (PDT) (envelope-from Cy.Schubert@cschubert.com) Message-Id: <201909062354.x86Nskfg003748@slippy.cwsent.com> X-Authentication-Warning: slippy.cwsent.com: cy owned process doing -bs X-Mailer: exmh version 2.9.0 11/07/2018 with nmh-1.7.1 Reply-to: Cy Schubert From: Cy Schubert X-os: FreeBSD X-Sender: cy@cwsent.com X-URL: http://www.cschubert.com/ To: Harlan Stenn cc: Cy Schubert , =?UTF-8?Q?Trond_Endrest=c3=b8l?= , freebsd-stable@freebsd.org Subject: Re: ntpd doesn't like ASLR on stable/12 post-r350672 In-reply-to: <9b0c95de-2d0e-89b4-32e6-63ec5af729b4@nwtime.org> References: <201909060639.x866dL68090189@slippy.cwsent.com> <9b0c95de-2d0e-89b4-32e6-63ec5af729b4@nwtime.org> Comments: In-reply-to Harlan Stenn message dated "Fri, 06 Sep 2019 10:51:46 -0700." Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Date: Fri, 06 Sep 2019 16:54:46 -0700 X-CMAE-Envelope: MS4wfOZyr82Hy8MErF/jfvgiHh/3CSw8pkMPA8XXx1KhxZ/fQ+bxz0c2SBCTLpH/oiLdwUVv7qa8Eji/auMlLxPQFQz1UoIu70icuRuAhnwhCSJmo96Qhrwk KFfhtMfJc6wYhY8lM0VX11rQN6S3mZoY4Ycg1+rww4vs3ckWAjBr5LNK/UVR3ywKnR04GQ1NGfD8gX25xC9BgJG/u7hgQL+gs/YvOmHg9SsKAe7SHptt2t0+ sWmUZ4ttFWu1ywwprTrLsQ== X-Rspamd-Queue-Id: 46QDv71hplz3KXg X-Spamd-Bar: ---- Authentication-Results: mx1.freebsd.org; dkim=none; spf=none (mx1.freebsd.org: domain of cy.schubert@cschubert.com has no SPF policy when checking 64.59.136.139) smtp.mailfrom=cy.schubert@cschubert.com X-Spamd-Result: default: False [-4.82 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; RCVD_COUNT_FIVE(0.00)[5]; HAS_REPLYTO(0.00)[Cy.Schubert@cschubert.com]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[4]; TO_DN_SOME(0.00)[]; MV_CASE(0.50)[]; MIME_GOOD(-0.10)[text/plain]; HAS_XAW(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; REPLYTO_EQ_FROM(0.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; NEURAL_HAM_SHORT(-0.99)[-0.988,0]; RCVD_IN_DNSWL_NONE(0.00)[139.136.59.64.list.dnswl.org : 127.0.5.0]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_SPF_NA(0.00)[]; RECEIVED_SPAMHAUS_PBL(0.00)[17.125.67.70.khpj7ygk5idzvmvt5x4ziurxhy.zen.dq.spamhaus.net : 127.0.0.11]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:6327, ipnet:64.59.128.0/20, country:CA]; RCVD_TLS_LAST(0.00)[]; IP_SCORE(-2.23)[ip: (-5.58), ipnet: 64.59.128.0/20(-3.10), asn: 6327(-2.41), country: CA(-0.09)]; FROM_EQ_ENVFROM(0.00)[] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 06 Sep 2019 23:55:04 -0000 In message <9b0c95de-2d0e-89b4-32e6-63ec5af729b4@nwtime.org>, Harlan Stenn writ es: > Hi folks, > > It's easy for us to customize the default value for DFLT_RLIMIT_STACK on > a per-version and per-OS basis. We do this in the "configure" machinery. > > The defaults are expected to be "generally sane", and were likely chosen > a relatively long time ago. > > What would you like the value(s) to be for what versions of FreeBSD? > > H > > On 9/5/2019 11:39 PM, Cy Schubert wrote: > > In message . > > inf > > o>, =?UTF-8?Q?Trond_Endrest=C3=B8l?= writes: > >> Hi, > >> > >> I'm running stable/12 with ASLR enabled in /etc/sysctl.conf: > >> > >> kern.elf64.aslr.enable=1 > >> kern.elf64.aslr.pie_enable=1 > >> kern.elf32.aslr.enable=1 > >> kern.elf32.aslr.pie_enable=1 > >> > >> After upgrading to anything after r350672, now at r351450, ntpd > >> refuses to start at boot. > >> > >> Aug 24 21:25:42 HOSTNAME ntpd[5618]: ntpd 4.2.8p12-a (1): Sta > rti > >> ng > >> Aug 24 21:25:43 HOSTNAME kernel: [406] pid 5619 (ntpd), jid 0, > ui > >> d 123: exited on signal 11 > >> > >> Disabling ASLR, kern.elf64.aslr.enable=0, before starting ntpd > >> manually is a workaround, but this is not viable in the long run. > >> > >> I tried changing command="/usr/sbin/${name}" to > >> command="/usr/bin/proccontrol -m aslr -s disable /usr/sbin/${name}" in > >> /etc/rc.d/ntpd, but that didn't go well. > > > > For now, until this can be solved, add this to your rc.conf: > > > > ntpd_prepend="/usr/bin/proccontrol -m aslr -s disable" > > > >> > >> Running ntpd through gdb while ASLR was enabled, I narrowed it down to > >> /usr/src/contrib/ntp/ntpd/ntpd.c:1001 > >> > >> ntp_rlimit(RLIMIT_STACK, DFLT_RLIMIT_STACK * 4096, 4096, "4k"); > >> > >> which calls /usr/src/contrib/ntp/ntpd/ntp_config.c:5211 and proceeds > >> to /usr/src/contrib/ntp/ntpd/ntp_config.c:5254 > >> > >> if (-1 == getrlimit(RLIMIT_STACK, &rl)) { > >> > >> Single stepping from this point gave me: > >> > >> ==== > >> > >> (gdb) s > >> _thr_rtld_set_flag (mask=1) at /usr/src/lib/libthr/thread/thr_rtld.c:171 > >> 171 { > >> (gdb) > >> 176 return (0); > >> (gdb) > >> _thr_rtld_rlock_acquire (lock=0x80180d200) at /usr/src/lib/libthr/thread/t > hr_ > >> rtld.c:115 > >> 115 { > >> (gdb) > >> 120 curthread = _get_curthread(); > >> (gdb) > >> _get_curthread () at /usr/src/lib/libthr/arch/amd64/include/pthread_md.h:9 > 7 > >> 97 return (TCB_GET64(tcb_thread)); > >> (gdb) > >> _thr_rtld_rlock_acquire (lock=0x80180d200) at /usr/src/lib/libthr/thread/t > hr_ > >> rtld.c:121 > >> 121 SAVE_ERRNO(); > >> (gdb) > >> 124 THR_CRITICAL_ENTER(curthread); > >> (gdb) > >> _thr_rwlock_tryrdlock (rwlock=, flags=0) at /usr/src/lib/li > bth > >> r/thread/thr_umtx.h:192 > >> 192 (rwlock->rw_flags & URWLOCK_PREFER_READER) != 0) > >> (gdb) > >> 191 if ((flags & URWLOCK_PREFER_READER) != 0 || > >> (gdb) > >> 197 while (!(state & wrflags)) { > >> (gdb) > >> 201 if (atomic_cmpset_acq_32(&rwlock->rw_state, state, > st > >> ate + 1)) > >> (gdb) > >> atomic_cmpset_int (dst=, expect=, src=1) at > /us > >> r/obj/usr/src/amd64.amd64/tmp/usr/include/machine/atomic.h:220 > >> 220 ATOMIC_CMPSET(int); > >> (gdb) > >> _thr_rwlock_tryrdlock (rwlock=, flags=0) at /usr/src/lib/li > bth > >> r/thread/thr_umtx.h:201 > >> 201 if (atomic_cmpset_acq_32(&rwlock->rw_state, state, > st > >> ate + 1)) > >> (gdb) > >> _thr_rtld_rlock_acquire (lock=0x80180d200) at /usr/src/lib/libthr/thread/t > hr_ > >> rtld.c:127 > >> 127 curthread->rdlock_count++; > >> (gdb) > >> 128 RESTORE_ERRNO(); > >> (gdb) > >> 129 } > >> (gdb) > >> _thr_rtld_clr_flag (mask=1) at /usr/src/lib/libthr/thread/thr_rtld.c:181 > >> 181 { > >> (gdb) > >> 182 return (0); > >> (gdb) > >> _thr_rtld_lock_release (lock=0x80180d200) at /usr/src/lib/libthr/thread/th > r_r > >> tld.c:150 > >> 150 { > >> (gdb) > >> _get_curthread () at /usr/src/lib/libthr/arch/amd64/include/pthread_md.h:9 > 7 > >> 97 return (TCB_GET64(tcb_thread)); > >> (gdb) > >> _thr_rtld_lock_release (lock=0x80180d200) at /usr/src/lib/libthr/thread/th > r_r > >> tld.c:157 > >> 157 SAVE_ERRNO(); > >> (gdb) > >> 160 state = l->lock.rw_state; > >> (gdb) > >> 161 if (_thr_rwlock_unlock(&l->lock) == 0) { > >> (gdb) > >> _thr_rwlock_unlock (rwlock=0x80180d200) at /usr/src/lib/libthr/thread/thr_ > umt > >> x.h:249 > >> 249 state = rwlock->rw_state; > >> (gdb) > >> 250 if ((state & URWLOCK_WRITE_OWNER) != 0) { > >> (gdb) > >> 256 if (__predict_false(URWLOCK_READER_COUNT(s > tat > >> e) == 0)) > >> (gdb) > >> 260 URWLOCK_READER_COUNT(state) == 1)) > >> { > >> (gdb) > >> 259 URWLOCK_READ_WAITERS)) != 0 && > >> (gdb) > >> 262 state, state - 1)) > >> (gdb) > >> 261 if (atomic_cmpset_rel_32(&rwlock-> > rw_ > >> state, > >> (gdb) > >> atomic_cmpset_int (dst=, expect=, src=0) at > /us > >> r/obj/usr/src/amd64.amd64/tmp/usr/include/machine/atomic.h:220 > >> 220 ATOMIC_CMPSET(int); > >> (gdb) > >> _thr_rwlock_unlock (rwlock=0x80180d200) at /usr/src/lib/libthr/thread/thr_ > umt > >> x.h:261 > >> 261 if (atomic_cmpset_rel_32(&rwlock-> > rw_ > >> state, > >> (gdb) > >> _thr_rtld_lock_release (lock=) at /usr/src/lib/libthr/threa > d/t > >> hr_rtld.c:162 > >> 162 if ((state & URWLOCK_WRITE_OWNER) == 0) > >> (gdb) > >> 163 curthread->rdlock_count--; > >> (gdb) > >> 164 THR_CRITICAL_LEAVE(curthread); > >> (gdb) > >> _thr_ast (curthread=0x80864b000) at /usr/src/lib/libthr/thread/thr_sig.c:2 > 71 > >> 271 if (!THR_IN_CRITICAL(curthread)) { > >> (gdb) > >> 272 check_deferred_signal(curthread); > >> (gdb) > >> check_deferred_signal (curthread=0x80864b000) at /usr/src/lib/libthr/threa > d/t > >> hr_sig.c:332 > >> 332 if (__predict_true(curthread->deferred_siginfo.si_signo == > 0 > >> || > >> (gdb) > >> 351 } > >> (gdb) > >> _thr_ast (curthread=0x80864b000) at /usr/src/lib/libthr/thread/thr_sig.c:2 > 73 > >> 273 check_suspend(curthread); > >> (gdb) > >> check_suspend (curthread=0x80864b000) at /usr/src/lib/libthr/thread/thr_si > g.c > >> :358 > >> 358 if (__predict_true((curthread->flags & > >> (gdb) > >> 401 } > >> (gdb) > >> _thr_ast (curthread=0x80864b000) at /usr/src/lib/libthr/thread/thr_sig.c:2 > 74 > >> 274 check_cancel(curthread, NULL); > >> (gdb) > >> check_cancel (curthread=0x80864b000, ucp=0x0) at /usr/src/lib/libthr/threa > d/t > >> hr_sig.c:283 > >> 283 if (__predict_true(!curthread->cancel_pending || > >> (gdb) > >> _thr_ast (curthread=) at /usr/src/lib/libthr/thread/thr_sig > .c: > >> 276 > >> 276 } > >> (gdb) > >> _thr_rtld_lock_release (lock=) at /usr/src/lib/libthr/threa > d/t > >> hr_rtld.c:166 > >> 166 RESTORE_ERRNO(); > >> (gdb) > >> 167 } > >> (gdb) > >> getrlimit () at getrlimit.S:3 > >> 3 RSYSCALL(getrlimit) > >> (gdb) > >> ntp_rlimit (rl_what=, rl_value=204800, rl_scale= out > >>> , rl_sstr=) at /usr/src/contrib/ntp/ntpd/ntp_config.c:5257 > >> 5257 if (rl_value > rl.rlim_max) { > >> (gdb) > >> 5264 rl.rlim_cur = rl_value; > >> (gdb) > >> 5265 if (-1 == setrlimit(RLIMIT_STACK, &rl)) { > >> (gdb) > >> _thr_rtld_set_flag (mask=1) at /usr/src/lib/libthr/thread/thr_rtld.c:171 > >> 171 { > >> (gdb) > >> 176 return (0); > >> (gdb) > >> _thr_rtld_rlock_acquire (lock=0x80180d200) at /usr/src/lib/libthr/thread/t > hr_ > >> rtld.c:115 > >> 115 { > >> (gdb) > >> 120 curthread = _get_curthread(); > >> (gdb) > >> _get_curthread () at /usr/src/lib/libthr/arch/amd64/include/pthread_md.h:9 > 7 > >> 97 return (TCB_GET64(tcb_thread)); > >> (gdb) > >> _thr_rtld_rlock_acquire (lock=0x80180d200) at /usr/src/lib/libthr/thread/t > hr_ > >> rtld.c:121 > >> 121 SAVE_ERRNO(); > >> (gdb) > >> 124 THR_CRITICAL_ENTER(curthread); > >> (gdb) > >> _thr_rwlock_tryrdlock (rwlock=, flags=0) at /usr/src/lib/li > bth > >> r/thread/thr_umtx.h:192 > >> 192 (rwlock->rw_flags & URWLOCK_PREFER_READER) != 0) > >> (gdb) > >> 191 if ((flags & URWLOCK_PREFER_READER) != 0 || > >> (gdb) > >> 197 while (!(state & wrflags)) { > >> (gdb) > >> 201 if (atomic_cmpset_acq_32(&rwlock->rw_state, state, > st > >> ate + 1)) > >> (gdb) > >> atomic_cmpset_int (dst=, expect=, src=1) at > /us > >> r/obj/usr/src/amd64.amd64/tmp/usr/include/machine/atomic.h:220 > >> 220 ATOMIC_CMPSET(int); > >> (gdb) > >> _thr_rwlock_tryrdlock (rwlock=, flags=0) at /usr/src/lib/li > bth > >> r/thread/thr_umtx.h:201 > >> 201 if (atomic_cmpset_acq_32(&rwlock->rw_state, state, > st > >> ate + 1)) > >> (gdb) > >> _thr_rtld_rlock_acquire (lock=0x80180d200) at /usr/src/lib/libthr/thread/t > hr_ > >> rtld.c:127 > >> 127 curthread->rdlock_count++; > >> (gdb) > >> 128 RESTORE_ERRNO(); > >> (gdb) > >> 129 } > >> (gdb) > >> _thr_rtld_clr_flag (mask=1) at /usr/src/lib/libthr/thread/thr_rtld.c:181 > >> 181 { > >> (gdb) > >> 182 return (0); > >> (gdb) > >> _thr_rtld_lock_release (lock=0x80180d200) at /usr/src/lib/libthr/thread/th > r_r > >> tld.c:150 > >> 150 { > >> (gdb) > >> _get_curthread () at /usr/src/lib/libthr/arch/amd64/include/pthread_md.h:9 > 7 > >> 97 return (TCB_GET64(tcb_thread)); > >> (gdb) > >> _thr_rtld_lock_release (lock=0x80180d200) at /usr/src/lib/libthr/thread/th > r_r > >> tld.c:157 > >> 157 SAVE_ERRNO(); > >> (gdb) > >> 160 state = l->lock.rw_state; > >> (gdb) > >> 161 if (_thr_rwlock_unlock(&l->lock) == 0) { > >> (gdb) > >> _thr_rwlock_unlock (rwlock=0x80180d200) at /usr/src/lib/libthr/thread/thr_ > umt > >> x.h:249 > >> 249 state = rwlock->rw_state; > >> (gdb) > >> 250 if ((state & URWLOCK_WRITE_OWNER) != 0) { > >> (gdb) > >> 256 if (__predict_false(URWLOCK_READER_COUNT(s > tat > >> e) == 0)) > >> (gdb) > >> 260 URWLOCK_READER_COUNT(state) == 1)) { > >> (gdb) > >> 259 URWLOCK_READ_WAITERS)) != 0 && > >> (gdb) > >> 262 state, state - 1)) > >> (gdb) > >> 261 if (atomic_cmpset_rel_32(&rwlock-> > rw_ > >> state, > >> (gdb) > >> atomic_cmpset_int (dst=, expect=, src=0) at > /us > >> r/obj/usr/src/amd64.amd64/tmp/usr/include/machine/atomic.h:220 > >> 220 ATOMIC_CMPSET(int); > >> (gdb) > >> _thr_rwlock_unlock (rwlock=0x80180d200) at /usr/src/lib/libthr/thread/thr_ > umt > >> x.h:261 > >> 261 if (atomic_cmpset_rel_32(&rwlock-> > rw_ > >> state, > >> (gdb) > >> _thr_rtld_lock_release (lock=) at /usr/src/lib/libthr/threa > d/t > >> hr_rtld.c:162 > >> 162 if ((state & URWLOCK_WRITE_OWNER) == 0) > >> (gdb) > >> 163 curthread->rdlock_count--; > >> (gdb) > >> 164 THR_CRITICAL_LEAVE(curthread); > >> (gdb) > >> _thr_ast (curthread=0x80864b000) at /usr/src/lib/libthr/thread/thr_sig.c:2 > 71 > >> 271 if (!THR_IN_CRITICAL(curthread)) { > >> (gdb) > >> 272 check_deferred_signal(curthread); > >> (gdb) > >> check_deferred_signal (curthread=0x80864b000) at /usr/src/lib/libthr/threa > d/t > >> hr_sig.c:332 > >> 332 if > >> (__predict_true(curthread->deferred_siginfo.si_signo == 0 || > >> (gdb) > >> 351 } > >> (gdb) > >> _thr_ast (curthread=0x80864b000) at /usr/src/lib/libthr/thread/thr_sig.c:2 > 73 > >> 273 check_suspend(curthread); > >> (gdb) > >> check_suspend (curthread=0x80864b000) at /usr/src/lib/libthr/thread/thr_si > g.c > >> :358 > >> 358 if (__predict_true((curthread->flags & > >> (gdb) > >> 401 } > >> (gdb) > >> _thr_ast (curthread=0x80864b000) at /usr/src/lib/libthr/thread/thr_sig.c:2 > 74 > >> 274 check_cancel(curthread, NULL); > >> (gdb) > >> check_cancel (curthread=0x80864b000, ucp=0x0) at /usr/src/lib/libthr/threa > d/t > >> hr_sig.c:283 > >> 283 if (__predict_true(!curthread->cancel_pending || > >> (gdb) > >> _thr_ast (curthread=) at /usr/src/lib/libthr/thread/thr_sig > .c: > >> 276 > >> 276 } > >> (gdb) > >> _thr_rtld_lock_release (lock=) at /usr/src/lib/libthr/threa > d/t > >> hr_rtld.c:166 > >> 166 RESTORE_ERRNO(); > >> (gdb) > >> 167 } > >> (gdb) > >> setrlimit () at setrlimit.S:3 > >> 3 RSYSCALL(setrlimit) > >> (gdb) > >> > >> Program received signal SIGSEGV, Segmentation fault. > >> setrlimit () at setrlimit.S:3 > >> 3 RSYSCALL(setrlimit) > >> (gdb) > >> > >> Program terminated with signal SIGSEGV, Segmentation fault. > >> The program no longer exists. > >> (gdb) q > >> > >> ==== > >> > >> I'm sorry for the long post. Is there anything (else) I can do to > >> further narrow it down? > > > > I've been able to confirm that kib@'s hunch regarding the gap is correct. > > > > Use the workaround until this can be solved. > > > > A better workaround is, for people who wish to use ASLR, is to add this to /etc/ntp.conf: rlimit memlock 64 Currently the default is 32 MB. This sets the limit to 64. -- Cheers, Cy Schubert FreeBSD UNIX: Web: http://www.FreeBSD.org The need of the many outweighs the greed of the few.